aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--NitrokeyManager.cc1
-rw-r--r--include/stick10_commands_0.8.h2
-rw-r--r--unittest/test3.cc6
3 files changed, 0 insertions, 9 deletions
diff --git a/NitrokeyManager.cc b/NitrokeyManager.cc
index 7cc88eb..b991af1 100644
--- a/NitrokeyManager.cc
+++ b/NitrokeyManager.cc
@@ -323,7 +323,6 @@ namespace nitrokey{
auto payload2 = get_payload<stick10_08::SendOTPData>();
strcpyT(payload2.temporary_admin_password, temporary_password);
strcpyT(payload2.data, slot_name);
- payload2.length = strlen((const char *) payload2.data);
payload2.setTypeName();
stick10_08::SendOTPData::CommandTransaction::run(*device, payload2);
diff --git a/include/stick10_commands_0.8.h b/include/stick10_commands_0.8.h
index f0e28a6..f905794 100644
--- a/include/stick10_commands_0.8.h
+++ b/include/stick10_commands_0.8.h
@@ -51,7 +51,6 @@ namespace nitrokey {
uint8_t temporary_admin_password[25];
uint8_t type; //0-secret, 1-name
uint8_t id; //multiple reports for values longer than 30 bytes
- uint8_t length; //data length
uint8_t data[30]; //data, does not need null termination
bool isValid() const { return true; }
@@ -68,7 +67,6 @@ namespace nitrokey {
ss << "temporary_admin_password:\t" << temporary_admin_password << std::endl;
ss << "type:\t" << type << std::endl;
ss << "id:\t" << (int)id << std::endl;
- ss << "length:\t" << (int)length << std::endl;
ss << "data:" << std::endl
<< ::nitrokey::misc::hexdump((const char *) (&data), sizeof data);
return ss.str();
diff --git a/unittest/test3.cc b/unittest/test3.cc
index 7b37a60..9049365 100644
--- a/unittest/test3.cc
+++ b/unittest/test3.cc
@@ -53,13 +53,11 @@ TEST_CASE("write slot", "[pronew]"){
strcpyT(p2.temporary_admin_password, temporary_password);
p2.setTypeName();
strcpyT(p2.data, "test name aaa");
- p2.length = strlen((const char *) p2.data);
stick10_08::SendOTPData::CommandTransaction::run(stick, p2);
p2 = get_payload<SendOTPData>();
strcpyT(p2.temporary_admin_password, temporary_password);
strcpyT(p2.data, RFC_SECRET);
- p2.length = strlen(RFC_SECRET);
p2.setTypeSecret();
stick10_08::SendOTPData::CommandTransaction::run(stick, p2);
@@ -138,13 +136,11 @@ TEST_CASE("authorize user HOTP", "[pronew]") {
strcpyT(p2.temporary_admin_password, temporary_password);
p2.setTypeName();
strcpyT(p2.data, "test name aaa");
- p2.length = strlen((const char *) p2.data);
stick10_08::SendOTPData::CommandTransaction::run(stick, p2);
p2 = get_payload<SendOTPData>();
strcpyT(p2.temporary_admin_password, temporary_password);
strcpyT(p2.data, RFC_SECRET);
- p2.length = strlen(RFC_SECRET);
p2.setTypeSecret();
stick10_08::SendOTPData::CommandTransaction::run(stick, p2);
@@ -191,13 +187,11 @@ TEST_CASE("authorize user TOTP", "[pronew]") {
strcpyT(p2.temporary_admin_password, temporary_password);
p2.setTypeName();
strcpyT(p2.data, "test name TOTP");
- p2.length = strlen((const char *) p2.data);
stick10_08::SendOTPData::CommandTransaction::run(stick, p2);
p2 = get_payload<SendOTPData>();
strcpyT(p2.temporary_admin_password, temporary_password);
strcpyT(p2.data, RFC_SECRET);
- p2.length = strlen(RFC_SECRET);
p2.setTypeSecret();
stick10_08::SendOTPData::CommandTransaction::run(stick, p2);