1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
|
#define CATCH_CONFIG_MAIN // This tells Catch to provide a main()
#include "catch.hpp"
#include <iostream>
//#include <string.h>
#include "device_proto.h"
#include "log.h"
#include "stick10_commands.h"
#include <cstdlib>
using namespace std;
using namespace nitrokey::device;
using namespace nitrokey::proto::stick10;
using namespace nitrokey::log;
std::string getSlotName(Stick10 &stick, int slotNo) {
ReadSlot::CommandTransaction::CommandPayload slot_req;
slot_req.slot_number = slotNo;
auto slot = ReadSlot::CommandTransaction::run(stick, slot_req);
std::string sName(reinterpret_cast<char *>(slot.slot_name));
return sName;
}
void setSecret (uint8_t slot_secret[], const char* secretHex){
assert(strlen(secretHex)%2==0);
//assert(strlen(secretHex)==(sizeof slot_secret)*2);
char buf[2];
for(int i=0; i<strlen(secretHex); i++){
buf[i%2] = secretHex[i];
if (i%2==1){
slot_secret[i/2] = strtoul(buf, NULL, 16) & 0xFF;
}
}
};
TEST_CASE("test secret", "[functions]") {
uint8_t slot_secret[21];
slot_secret[20] = 0;
const char* secretHex = "3132333435363738393031323334353637383930";
setSecret(slot_secret, secretHex);
CAPTURE(slot_secret);
REQUIRE(strcmp("12345678901234567890",reinterpret_cast<char *>(slot_secret) ) == 0 );
}
TEST_CASE("Slot names are correct", "[slotNames]") {
Stick10 stick;
bool connected = stick.connect();
REQUIRE(connected == true);
Log::instance().set_loglevel(Loglevel::DEBUG);
auto resp = GetStatus::CommandTransaction::run(stick);
const char * temporary_password = "123456789012345678901234";
{
FirstAuthenticate::CommandTransaction::CommandPayload authreq;
strcpy((char *)(authreq.card_password), "12345678");
// strcpy((char *)(authreq.temporary_password), temporary_password);
FirstAuthenticate::CommandTransaction::run(stick, authreq);
}
{
WriteToHOTPSlot::CommandTransaction::CommandPayload hwrite;
hwrite.slot_number = 0x10;
strcpy(reinterpret_cast<char *>(hwrite.slot_name), "rfc_test");
//strcpy(reinterpret_cast<char *>(hwrite.slot_secret), "");
const char* secretHex = "3132333435363738393031323334353637383930";
setSecret(hwrite.slot_secret, secretHex);
//hwrite.slot_config;
strcpy(reinterpret_cast<char *>(hwrite.slot_token_id), "");
strcpy(reinterpret_cast<char *>(hwrite.slot_counter), "");
//authorize writehotp first
{
Authorize::CommandTransaction::CommandPayload auth;
// strcpy((char *)(auth.temporary_password), temporary_password);
auth.crc_to_authorize = WriteToHOTPSlot::CommandTransaction::getCRC(hwrite);
Authorize::CommandTransaction::run(stick, auth);
}
//run hotp command
WriteToHOTPSlot::CommandTransaction::run(stick, hwrite);
uint32_t codes[] = {
755224,
287082,
359152,
969429,
338314,
254676,
287922,
162583,
399871,
520489
};
for( auto code: codes){
GetHOTP::CommandTransaction::CommandPayload gh;
gh.slot_number = 0x10;
auto resp = GetHOTP::CommandTransaction::run(stick, gh);
REQUIRE( resp.code == code);
}
}
stick.disconnect();
}
|