diff options
| -rw-r--r-- | unittest/test_bindings.py | 9 | 
1 files changed, 6 insertions, 3 deletions
| diff --git a/unittest/test_bindings.py b/unittest/test_bindings.py index 205fc22..654bb2c 100644 --- a/unittest/test_bindings.py +++ b/unittest/test_bindings.py @@ -128,6 +128,7 @@ def test_regenerate_aes_key(C):      assert C.NK_enable_password_safe(DefaultPasswords.USER) == DeviceErrorCode.STATUS_OK +@pytest.mark.xfail(reason="firmware bug: regenerating AES key command not always results in cleared slot data")  def test_destroy_password_safe(C):      """      Sometimes fails on NK Pro - slot name is not cleared ergo key generation has not succeed despite the success result @@ -236,9 +237,9 @@ def check_HOTP_RFC_codes(C, func, prep=None, use_8_digits=False):      assert C.NK_write_hotp_slot(1, 'python_test', RFC_SECRET, 0, use_8_digits, False, False, "",                                  DefaultPasswords.ADMIN_TEMP) == DeviceErrorCode.STATUS_OK      test_data = [ -            1284755224, 1094287082, 137359152, 1726969429, 1640338314, 868254676, 1918287922, 82162583, 673399871, -            645520489, -        ] +        1284755224, 1094287082, 137359152, 1726969429, 1640338314, 868254676, 1918287922, 82162583, 673399871, +        645520489, +    ]      for code in test_data:          if prep:              prep() @@ -262,6 +263,8 @@ def test_HOTP_RFC_8digits_pin(C, use_8_digits, use_pin_protection):          check_HOTP_RFC_codes(C, C.NK_get_hotp_code, use_8_digits=use_8_digits) +@pytest.mark.xfail(reason="firmware bug: set time command not always changes the time on stick thus failing this test, " +                          "this does not influence normal use since setting time is not done every TOTP code request")  @pytest.mark.parametrize("PIN_protection", [False, True, ])  def test_TOTP_RFC(C, PIN_protection):      assert C.NK_first_authenticate(DefaultPasswords.ADMIN, DefaultPasswords.ADMIN_TEMP) == DeviceErrorCode.STATUS_OK | 
