diff options
| -rw-r--r-- | NitrokeyManager.cc | 1 | ||||
| -rw-r--r-- | include/stick10_commands_0.8.h | 2 | ||||
| -rw-r--r-- | unittest/test3.cc | 6 | 
3 files changed, 0 insertions, 9 deletions
| diff --git a/NitrokeyManager.cc b/NitrokeyManager.cc index 7cc88eb..b991af1 100644 --- a/NitrokeyManager.cc +++ b/NitrokeyManager.cc @@ -323,7 +323,6 @@ namespace nitrokey{        auto payload2 = get_payload<stick10_08::SendOTPData>();        strcpyT(payload2.temporary_admin_password, temporary_password);        strcpyT(payload2.data, slot_name); -      payload2.length = strlen((const char *) payload2.data);        payload2.setTypeName();        stick10_08::SendOTPData::CommandTransaction::run(*device, payload2); diff --git a/include/stick10_commands_0.8.h b/include/stick10_commands_0.8.h index f0e28a6..f905794 100644 --- a/include/stick10_commands_0.8.h +++ b/include/stick10_commands_0.8.h @@ -51,7 +51,6 @@ namespace nitrokey {                      uint8_t temporary_admin_password[25];                      uint8_t type; //0-secret, 1-name                      uint8_t id; //multiple reports for values longer than 30 bytes -                    uint8_t length; //data length                      uint8_t data[30]; //data, does not need null termination                      bool isValid() const { return true; } @@ -68,7 +67,6 @@ namespace nitrokey {                        ss << "temporary_admin_password:\t" << temporary_admin_password << std::endl;                        ss << "type:\t" << type << std::endl;                        ss << "id:\t" << (int)id << std::endl; -                      ss << "length:\t" << (int)length << std::endl;                        ss << "data:" << std::endl                           << ::nitrokey::misc::hexdump((const char *) (&data), sizeof data);                        return ss.str(); diff --git a/unittest/test3.cc b/unittest/test3.cc index 7b37a60..9049365 100644 --- a/unittest/test3.cc +++ b/unittest/test3.cc @@ -53,13 +53,11 @@ TEST_CASE("write slot", "[pronew]"){    strcpyT(p2.temporary_admin_password, temporary_password);    p2.setTypeName();    strcpyT(p2.data, "test name aaa"); -  p2.length = strlen((const char *) p2.data);    stick10_08::SendOTPData::CommandTransaction::run(stick, p2);    p2 = get_payload<SendOTPData>();    strcpyT(p2.temporary_admin_password, temporary_password);    strcpyT(p2.data, RFC_SECRET); -  p2.length = strlen(RFC_SECRET);    p2.setTypeSecret();    stick10_08::SendOTPData::CommandTransaction::run(stick, p2); @@ -138,13 +136,11 @@ TEST_CASE("authorize user HOTP", "[pronew]") {    strcpyT(p2.temporary_admin_password, temporary_password);    p2.setTypeName();    strcpyT(p2.data, "test name aaa"); -  p2.length = strlen((const char *) p2.data);    stick10_08::SendOTPData::CommandTransaction::run(stick, p2);    p2 = get_payload<SendOTPData>();    strcpyT(p2.temporary_admin_password, temporary_password);    strcpyT(p2.data, RFC_SECRET); -  p2.length = strlen(RFC_SECRET);    p2.setTypeSecret();    stick10_08::SendOTPData::CommandTransaction::run(stick, p2); @@ -191,13 +187,11 @@ TEST_CASE("authorize user TOTP", "[pronew]") {    strcpyT(p2.temporary_admin_password, temporary_password);    p2.setTypeName();    strcpyT(p2.data, "test name TOTP"); -  p2.length = strlen((const char *) p2.data);    stick10_08::SendOTPData::CommandTransaction::run(stick, p2);    p2 = get_payload<SendOTPData>();    strcpyT(p2.temporary_admin_password, temporary_password);    strcpyT(p2.data, RFC_SECRET); -  p2.length = strlen(RFC_SECRET);    p2.setTypeSecret();    stick10_08::SendOTPData::CommandTransaction::run(stick, p2); | 
