summaryrefslogtreecommitdiff
path: root/src/tests/pro.rs
diff options
context:
space:
mode:
authorRobin Krahl <robin.krahl@ireas.org>2018-05-21 23:04:20 +0000
committerRobin Krahl <robin.krahl@ireas.org>2018-05-22 01:05:41 +0200
commita9f51585b909c805bd441200c65e622217dc1a38 (patch)
tree65feabe4ab97def27f8e7125d056d9c079d9aaef /src/tests/pro.rs
parent57cab82dc3063cb6608aaf2ee937ad7af231c52a (diff)
downloadnitrokey-rs-a9f51585b909c805bd441200c65e622217dc1a38.tar.gz
nitrokey-rs-a9f51585b909c805bd441200c65e622217dc1a38.tar.bz2
Activate tests for unauthorized OTP code generation
In a previous commit, we changed get_string_result to only free the string if the operation was successful. Therefore we can re-enable the tests in hotp_pin and totp_pin that cause failing OTP code generation commands.
Diffstat (limited to 'src/tests/pro.rs')
-rw-r--r--src/tests/pro.rs6
1 files changed, 2 insertions, 4 deletions
diff --git a/src/tests/pro.rs b/src/tests/pro.rs
index d2132f8..732c248 100644
--- a/src/tests/pro.rs
+++ b/src/tests/pro.rs
@@ -108,8 +108,7 @@ fn hotp_pin() {
let user = admin.device().authenticate_user(USER_PASSWORD).unwrap();
check_hotp_codes(&user);
- // TODO: enable for newer libnitrokey
- // assert!(user.device().get_hotp_code(1).is_err());
+ assert!(user.device().get_hotp_code(1).is_err());
}
#[test]
@@ -209,8 +208,7 @@ fn totp_pin() {
let user = admin.device().authenticate_user(USER_PASSWORD).unwrap();
check_totp_codes(&user);
- // TODO: enable for newer libnitrokey
- // assert!(user.device().get_totp_code(1).is_err());
+ assert!(user.device().get_totp_code(1).is_err());
}
#[test]