diff options
author | Robin Krahl <robin.krahl@ireas.org> | 2018-05-21 23:04:20 +0000 |
---|---|---|
committer | Robin Krahl <robin.krahl@ireas.org> | 2018-05-22 01:05:41 +0200 |
commit | a9f51585b909c805bd441200c65e622217dc1a38 (patch) | |
tree | 65feabe4ab97def27f8e7125d056d9c079d9aaef | |
parent | 57cab82dc3063cb6608aaf2ee937ad7af231c52a (diff) | |
download | nitrokey-rs-a9f51585b909c805bd441200c65e622217dc1a38.tar.gz nitrokey-rs-a9f51585b909c805bd441200c65e622217dc1a38.tar.bz2 |
Activate tests for unauthorized OTP code generation
In a previous commit, we changed get_string_result to only free the
string if the operation was successful. Therefore we can re-enable the
tests in hotp_pin and totp_pin that cause failing OTP code generation
commands.
-rw-r--r-- | src/tests/pro.rs | 6 |
1 files changed, 2 insertions, 4 deletions
diff --git a/src/tests/pro.rs b/src/tests/pro.rs index d2132f8..732c248 100644 --- a/src/tests/pro.rs +++ b/src/tests/pro.rs @@ -108,8 +108,7 @@ fn hotp_pin() { let user = admin.device().authenticate_user(USER_PASSWORD).unwrap(); check_hotp_codes(&user); - // TODO: enable for newer libnitrokey - // assert!(user.device().get_hotp_code(1).is_err()); + assert!(user.device().get_hotp_code(1).is_err()); } #[test] @@ -209,8 +208,7 @@ fn totp_pin() { let user = admin.device().authenticate_user(USER_PASSWORD).unwrap(); check_totp_codes(&user); - // TODO: enable for newer libnitrokey - // assert!(user.device().get_totp_code(1).is_err()); + assert!(user.device().get_totp_code(1).is_err()); } #[test] |