diff options
author | kste <kste@google.com> | 2020-07-09 01:20:47 -0700 |
---|---|---|
committer | Copybara-Service <copybara-worker@google.com> | 2020-07-09 01:21:23 -0700 |
commit | 3e782bba09d8f2f0e46bef292d64fc6bfe458db1 (patch) | |
tree | c4b7a88e2c7c8dfba0f900607b382fccb9c8732e /cc/daead | |
parent | 6780b66543e38f643ff9996219c6c642ffdba954 (diff) | |
download | tink-3e782bba09d8f2f0e46bef292d64fc6bfe458db1.tar.gz |
Use correct status check in test for deterministic AEAD when using FIPS only mode.
PiperOrigin-RevId: 320350919
Diffstat (limited to 'cc/daead')
-rw-r--r-- | cc/daead/deterministic_aead_config_test.cc | 14 |
1 files changed, 8 insertions, 6 deletions
diff --git a/cc/daead/deterministic_aead_config_test.cc b/cc/daead/deterministic_aead_config_test.cc index 87d22da0d..6683b69ab 100644 --- a/cc/daead/deterministic_aead_config_test.cc +++ b/cc/daead/deterministic_aead_config_test.cc @@ -97,7 +97,7 @@ TEST_F(DeterministicAeadConfigTest, WrappersRegistered) { EXPECT_THAT(decryption_result.ValueOrDie(), Eq("secret")); decryption_result = DummyDeterministicAead("dummy").DecryptDeterministically( - encryption_result.ValueOrDie(), "wrog"); + encryption_result.ValueOrDie(), "wrong"); EXPECT_FALSE(decryption_result.status().ok()); } @@ -106,14 +106,16 @@ TEST_F(DeterministicAeadConfigTest, RegisterFipsValidTemplates) { GTEST_SKIP() << "Only supported in FIPS-only mode"; } - EXPECT_THAT(AeadConfig::Register(), IsOk()); + EXPECT_THAT(DeterministicAeadConfig::Register(), IsOk()); - std::list<google::crypto::tink::KeyTemplate> fips_key_templates; - fips_key_templates.push_back(DeterministicAeadKeyTemplates::Aes256Siv()); + // Check that we can not retrieve non-FIPS key handle + std::list<google::crypto::tink::KeyTemplate> non_fips_key_templates; + non_fips_key_templates.push_back(DeterministicAeadKeyTemplates::Aes256Siv()); - for (auto key_template : fips_key_templates) { + for (auto key_template : non_fips_key_templates) { auto new_keyset_handle_result = KeysetHandle::GenerateNew(key_template); - EXPECT_THAT(new_keyset_handle_result.status(), IsOk()); + EXPECT_THAT(new_keyset_handle_result.status(), + StatusIs(util::error::NOT_FOUND)); } } |