diff options
| author | Szczepan Zalega <szczepan@nitrokey.com> | 2017-10-10 17:47:30 +0200 | 
|---|---|---|
| committer | Szczepan Zalega <szczepan@nitrokey.com> | 2017-10-10 18:05:35 +0200 | 
| commit | be675e293fe94a4a6926125a61e67e92e8788d8a (patch) | |
| tree | f7aa02b4b1b13adb0c1f8a2a7bccac8d74096f08 | |
| parent | 2198d1b46d8bbfabc6e04b716ca89583044b277e (diff) | |
| download | libnitrokey-be675e293fe94a4a6926125a61e67e92e8788d8a.tar.gz libnitrokey-be675e293fe94a4a6926125a61e67e92e8788d8a.tar.bz2 | |
Do not set debug level in tests
Signed-off-by: Szczepan Zalega <szczepan@nitrokey.com>
| -rw-r--r-- | unittest/test_pro.py | 9 | 
1 files changed, 0 insertions, 9 deletions
| diff --git a/unittest/test_pro.py b/unittest/test_pro.py index 67fb5a3..830946d 100644 --- a/unittest/test_pro.py +++ b/unittest/test_pro.py @@ -130,7 +130,6 @@ def test_erase_password_safe_slot(C):  @pytest.mark.PWS  def test_password_safe_slot_status(C): -    C.NK_set_debug(True)      assert C.NK_enable_password_safe(DefaultPasswords.USER) == DeviceErrorCode.STATUS_OK      assert C.NK_erase_password_safe_slot(0) == DeviceErrorCode.STATUS_OK      assert C.NK_write_password_safe_slot(1, b'slotname2', b'login2', b'pass2') == DeviceErrorCode.STATUS_OK @@ -153,7 +152,6 @@ def test_issue_device_locks_on_second_key_generation_in_sequence(C):  @pytest.mark.aes  def test_regenerate_aes_key(C): -    C.NK_set_debug(True)      assert C.NK_first_authenticate(DefaultPasswords.ADMIN, DefaultPasswords.ADMIN_TEMP) == DeviceErrorCode.STATUS_OK      assert C.NK_build_aes_key(DefaultPasswords.ADMIN) == DeviceErrorCode.STATUS_OK      assert C.NK_enable_password_safe(DefaultPasswords.USER) == DeviceErrorCode.STATUS_OK @@ -185,7 +183,6 @@ def test_destroy_password_safe(C):      Sometimes fails on NK Pro - slot name is not cleared ergo key generation has not succeed despite the success result      returned from the device      """ -    C.NK_set_debug(True)      assert C.NK_enable_password_safe(DefaultPasswords.USER) == DeviceErrorCode.STATUS_OK      # write password safe slot      assert C.NK_write_password_safe_slot(0, b'slotname1', b'login1', b'pass1') == DeviceErrorCode.STATUS_OK @@ -279,7 +276,6 @@ def test_user_retry_counts_PWSafe(C):  @pytest.mark.pin  def test_unlock_user_password(C): -    C.NK_set_debug(True)      default_user_retry_count = 3      default_admin_retry_count = 3      new_password = b'123123123' @@ -491,7 +487,6 @@ def test_TOTP_RFC_usepin(C, PIN_protection):  @pytest.mark.otp  def test_get_slot_names(C): -    C.NK_set_debug(True)      assert C.NK_first_authenticate(DefaultPasswords.ADMIN, DefaultPasswords.ADMIN_TEMP) == DeviceErrorCode.STATUS_OK      assert C.NK_erase_totp_slot(0, DefaultPasswords.ADMIN_TEMP) == DeviceErrorCode.STATUS_OK      # erasing slot invalidates temporary password, so requesting authentication @@ -543,7 +538,6 @@ def test_get_OTP_code_from_not_programmed_slot(C):  @pytest.mark.otp  def test_get_code_user_authorize(C): -    C.NK_set_debug(True)      assert C.NK_first_authenticate(DefaultPasswords.ADMIN, DefaultPasswords.ADMIN_TEMP) == DeviceErrorCode.STATUS_OK      assert C.NK_write_totp_slot(0, b'python_otp_auth', bbRFC_SECRET, 30, True, False, False, b'',                                  DefaultPasswords.ADMIN_TEMP) == DeviceErrorCode.STATUS_OK @@ -569,8 +563,6 @@ def cast_pointer_to_tuple(obj, typen, len):  def test_read_write_config(C): -    C.NK_set_debug(True) -      # let's set sample config with pin protection and disabled scrolllock      assert C.NK_first_authenticate(DefaultPasswords.ADMIN, DefaultPasswords.ADMIN_TEMP) == DeviceErrorCode.STATUS_OK      assert C.NK_write_config(0, 1, 2, True, False, DefaultPasswords.ADMIN_TEMP) == DeviceErrorCode.STATUS_OK @@ -591,7 +583,6 @@ def test_read_write_config(C):  @pytest.mark.lock_device  @pytest.mark.factory_reset  def test_factory_reset(C): -    C.NK_set_debug(True)      assert C.NK_first_authenticate(DefaultPasswords.ADMIN, DefaultPasswords.ADMIN_TEMP) == DeviceErrorCode.STATUS_OK      assert C.NK_write_config(255, 255, 255, False, True, DefaultPasswords.ADMIN_TEMP) == DeviceErrorCode.STATUS_OK      assert C.NK_first_authenticate(DefaultPasswords.ADMIN, DefaultPasswords.ADMIN_TEMP) == DeviceErrorCode.STATUS_OK | 
