diff options
| author | Szczepan Zalega <szczepan@nitrokey.com> | 2016-08-01 22:11:07 +0200 | 
|---|---|---|
| committer | Szczepan Zalega <szczepan@nitrokey.com> | 2016-08-01 22:11:07 +0200 | 
| commit | 4ac5f8bbbd6e007ecd02be46bfbc0c11de010722 (patch) | |
| tree | 5baef202153147b396ba5b377da2e88cb62ae19a /unittest | |
| parent | 137a28c05ceacd0427fe1fb25b5a184d6b96985c (diff) | |
| download | libnitrokey-4ac5f8bbbd6e007ecd02be46bfbc0c11de010722.tar.gz libnitrokey-4ac5f8bbbd6e007ecd02be46bfbc0c11de010722.tar.bz2 | |
C++ tests: use get_payload() function to clear packet before using
Signed-off-by: Szczepan Zalega <szczepan@nitrokey.com>
Diffstat (limited to 'unittest')
| -rw-r--r-- | unittest/test.cc | 17 | ||||
| -rw-r--r-- | unittest/test_HOTP.cc | 13 | 
2 files changed, 17 insertions, 13 deletions
| diff --git a/unittest/test.cc b/unittest/test.cc index 02f742c..6267512 100644 --- a/unittest/test.cc +++ b/unittest/test.cc @@ -11,9 +11,11 @@ using namespace std;  using namespace nitrokey::device;  using namespace nitrokey::proto::stick10;  using namespace nitrokey::log; +using namespace nitrokey::misc; +  std::string getSlotName(Stick10 &stick, int slotNo) { -  ReadSlot::CommandTransaction::CommandPayload slot_req; +  auto slot_req = get_payload<ReadSlot>();    slot_req.slot_number = slotNo;    auto slot = ReadSlot::CommandTransaction::run(stick, slot_req);    std::string sName(reinterpret_cast<char *>(slot.slot_name)); @@ -29,16 +31,17 @@ TEST_CASE("Slot names are correct", "[slotNames]") {    auto resp = GetStatus::CommandTransaction::run(stick); -  FirstAuthenticate::CommandTransaction::CommandPayload authreq; +  auto authreq = get_payload<FirstAuthenticate>();    strcpy((char *)(authreq.card_password), "12345678");    FirstAuthenticate::CommandTransaction::run(stick, authreq);    { -    EnablePasswordSafe::CommandTransaction::CommandPayload authreq; -    strcpy((char *)(authreq.password), "123456"); +    auto authreq = get_payload<EnablePasswordSafe>(); +    strcpy((char *)(authreq.user_password), "123456");      EnablePasswordSafe::CommandTransaction::run(stick, authreq);    } +  //assuming these values were set earlier, thus failing on normal use    REQUIRE(getSlotName(stick, 0x20) == std::string("1"));    REQUIRE(getSlotName(stick, 0x21) == std::string("slot2")); @@ -52,7 +55,7 @@ TEST_CASE("Slot names are correct", "[slotNames]") {    }    { -    GetPasswordSafeSlotName::CommandTransaction::CommandPayload slot; +    auto slot = get_payload<GetPasswordSafeSlotName>();      slot.slot_number = 0;      auto resp2 = GetPasswordSafeSlotName::CommandTransaction::run(stick, slot);      std::string sName(reinterpret_cast<char *>(resp2.slot_name)); @@ -60,7 +63,7 @@ TEST_CASE("Slot names are correct", "[slotNames]") {    }    { -    GetPasswordSafeSlotPassword::CommandTransaction::CommandPayload slot; +    auto slot = get_payload<GetPasswordSafeSlotPassword>();      slot.slot_number = 0;      auto resp2 =          GetPasswordSafeSlotPassword::CommandTransaction::run(stick, slot); @@ -69,7 +72,7 @@ TEST_CASE("Slot names are correct", "[slotNames]") {    }    { -    GetPasswordSafeSlotLogin::CommandTransaction::CommandPayload slot; +    auto slot = get_payload<GetPasswordSafeSlotLogin>();      slot.slot_number = 0;      auto resp2 = GetPasswordSafeSlotLogin::CommandTransaction::run(stick, slot);      std::string sName(reinterpret_cast<char *>(resp2.slot_login)); diff --git a/unittest/test_HOTP.cc b/unittest/test_HOTP.cc index a961b24..f25bad4 100644 --- a/unittest/test_HOTP.cc +++ b/unittest/test_HOTP.cc @@ -5,11 +5,13 @@  #include "log.h"  #include "stick10_commands.h"  #include <cstdlib> +#include "misc.h"  using namespace std;  using namespace nitrokey::device;  using namespace nitrokey::proto::stick10;  using namespace nitrokey::log; +using namespace nitrokey::misc;  void hexStringToByte(uint8_t data[], const char* hexString){      assert(strlen(hexString)%2==0); @@ -43,7 +45,7 @@ TEST_CASE("Test HOTP codes according to RFC", "[HOTP]") {    const char * temporary_password = "123456789012345678901234";    { -      FirstAuthenticate::CommandTransaction::CommandPayload authreq; +      auto authreq = get_payload<FirstAuthenticate>();        strcpy((char *)(authreq.card_password), "12345678");        strcpy((char *)(authreq.temporary_password), temporary_password);        FirstAuthenticate::CommandTransaction::run(stick, authreq); @@ -51,21 +53,20 @@ TEST_CASE("Test HOTP codes according to RFC", "[HOTP]") {    //test according to https://tools.ietf.org/html/rfc4226#page-32    { -    WriteToHOTPSlot::CommandTransaction::CommandPayload hwrite; +    auto hwrite = get_payload<WriteToHOTPSlot>();      hwrite.slot_number = 0x10;      strcpy(reinterpret_cast<char *>(hwrite.slot_name), "rfc4226_lib");      //strcpy(reinterpret_cast<char *>(hwrite.slot_secret), "");      const char* secretHex = "3132333435363738393031323334353637383930";      hexStringToByte(hwrite.slot_secret, secretHex); -    // reset the HOTP counter -//    memset(hwrite.slot_counter, 0, 8); +      //hwrite.slot_config; //TODO check various configs in separate test cases      //strcpy(reinterpret_cast<char *>(hwrite.slot_token_id), "");      //strcpy(reinterpret_cast<char *>(hwrite.slot_counter), "");      //authorize writehotp first      { -        Authorize::CommandTransaction::CommandPayload auth; +        auto auth = get_payload<Authorize>();          strcpy((char *)(auth.temporary_password), temporary_password);          auth.crc_to_authorize = WriteToHOTPSlot::CommandTransaction::getCRC(hwrite);          Authorize::CommandTransaction::run(stick, auth); @@ -80,7 +81,7 @@ TEST_CASE("Test HOTP codes according to RFC", "[HOTP]") {      };      for( auto code: codes){ -        GetHOTP::CommandTransaction::CommandPayload gh; +        auto gh = get_payload<GetHOTP>();          gh.slot_number =  0x10;          auto resp = GetHOTP::CommandTransaction::run(stick, gh);          REQUIRE( resp.code == code); | 
