summaryrefslogtreecommitdiff
path: root/unittest/test2.cc
diff options
context:
space:
mode:
authorSzczepan Zalega <szczepan@nitrokey.com>2016-10-22 18:12:37 +0200
committerSzczepan Zalega <szczepan@nitrokey.com>2016-11-26 15:54:05 +0100
commit89076a0c44dd12a73060dbfda419c20c4ce5285a (patch)
treec209da073ffb6d379f37f81592f740f0629d02ba /unittest/test2.cc
parentd841239bc9ece1ce969c293783219cceb001fc67 (diff)
downloadlibnitrokey-89076a0c44dd12a73060dbfda419c20c4ce5285a.tar.gz
libnitrokey-89076a0c44dd12a73060dbfda419c20c4ce5285a.tar.bz2
Migrate commands to new format
Signed-off-by: Szczepan Zalega <szczepan@nitrokey.com>
Diffstat (limited to 'unittest/test2.cc')
-rw-r--r--unittest/test2.cc83
1 files changed, 83 insertions, 0 deletions
diff --git a/unittest/test2.cc b/unittest/test2.cc
new file mode 100644
index 0000000..6744b45
--- /dev/null
+++ b/unittest/test2.cc
@@ -0,0 +1,83 @@
+#define CATCH_CONFIG_MAIN // This tells Catch to provide a main()
+#include "catch.hpp"
+
+#include <iostream>
+#include <string.h>
+#include "device_proto.h"
+#include "log.h"
+#include "stick10_commands.h"
+
+using namespace std;
+using namespace nitrokey::device;
+using namespace nitrokey::proto::stick10;
+using namespace nitrokey::log;
+using namespace nitrokey::misc;
+
+
+std::string getSlotName(Stick10 &stick, int slotNo) {
+ auto slot_req = get_payload<ReadSlot>();
+ slot_req.slot_number = slotNo;
+ auto slot = ReadSlot::CommandTransaction::run(stick, slot_req);
+ std::string sName(reinterpret_cast<char *>(slot.data().slot_name));
+ return sName;
+}
+
+TEST_CASE("Slot names are correct", "[slotNames]") {
+ Stick10 stick;
+ bool connected = stick.connect();
+ REQUIRE(connected == true);
+
+ Log::instance().set_loglevel(Loglevel::DEBUG);
+
+ auto resp = GetStatus::CommandTransaction::run(stick);
+
+ auto authreq = get_payload<FirstAuthenticate>();
+ strcpy((char *)(authreq.card_password), "12345678");
+ FirstAuthenticate::CommandTransaction::run(stick, authreq);
+
+ {
+ auto authreq = get_payload<EnablePasswordSafe>();
+ strcpy((char *)(authreq.user_password), "123456");
+ EnablePasswordSafe::CommandTransaction::run(stick, authreq);
+ }
+
+ //assuming these values were set earlier, thus failing on normal use
+ REQUIRE(getSlotName(stick, 0x20) == std::string("1"));
+ REQUIRE(getSlotName(stick, 0x21) == std::string("slot2"));
+
+ {
+ auto resp = GetPasswordRetryCount::CommandTransaction::run(stick);
+ REQUIRE(resp.data().password_retry_count == 3);
+ }
+ {
+ auto resp = GetUserPasswordRetryCount::CommandTransaction::run(stick);
+ REQUIRE(resp.data().password_retry_count == 3);
+ }
+
+ {
+ auto slot = get_payload<GetPasswordSafeSlotName>();
+ slot.slot_number = 0;
+ auto resp2 = GetPasswordSafeSlotName::CommandTransaction::run(stick, slot);
+ std::string sName(reinterpret_cast<char *>(resp2.data().slot_name));
+ REQUIRE(sName == std::string("web1"));
+ }
+
+ {
+ auto slot = get_payload<GetPasswordSafeSlotPassword>();
+ slot.slot_number = 0;
+ auto resp2 =
+ GetPasswordSafeSlotPassword::CommandTransaction::run(stick, slot);
+ std::string sName(reinterpret_cast<char *>(resp2.data().slot_password));
+ REQUIRE(sName == std::string("pass1"));
+ }
+
+ {
+ auto slot = get_payload<GetPasswordSafeSlotLogin>();
+ slot.slot_number = 0;
+ auto resp2 = GetPasswordSafeSlotLogin::CommandTransaction::run(stick, slot);
+ std::string sName(reinterpret_cast<char *>(resp2.data().slot_login));
+ REQUIRE(sName == std::string("login1"));
+ }
+
+ stick.disconnect();
+}