diff --git a/contracts/test/kmsVerifier/kmsVerifier.ts b/contracts/test/kmsVerifier/kmsVerifier.ts index 742a1bd..208cbfa 100644 --- a/contracts/test/kmsVerifier/kmsVerifier.ts +++ b/contracts/test/kmsVerifier/kmsVerifier.ts @@ -91,9 +91,7 @@ describe('KMSVerifier', function () { contract2.requestMixedBytes256Trustless(encryptedAmount2.handles[0], encryptedAmount2.inputProof, { gasLimit: 5_000_000, }), - ) - .to.revertedWithCustomError(kmsVerifier, 'KMSSignatureThresholdNotReached') - .withArgs(1n); // this should fail because in this case the InputVerifier received only one KMS signature (instead of at least 2); + ).to.revertedWith('Not enough unique KMS input signatures'); // this should fail because in this case the InputVerifier received only one KMS signature (instead of at least 2); if (process.env.IS_COPROCESSOR === 'true') { // different format of inputProof for native @@ -103,9 +101,7 @@ describe('KMSVerifier', function () { contract2.requestMixedBytes256Trustless(encryptedAmount2.handles[0], cheat, { gasLimit: 5_000_000, }), - ) - .to.revertedWithCustomError(kmsVerifier, 'KMSSignatureThresholdNotReached') - .withArgs(1n); // this should fail because in this case the InputVerifier received only one KMS signature (instead of at least 2) + ).to.revertedWith('Not enough unique KMS input signatures'); // this should fail because in this case the InputVerifier received only one KMS signature (instead of at least 2) } process.env.NUM_KMS_SIGNERS = '4'; const encryptedAmount = await inputAlice.encrypt();