diff options
| author | Robin Krahl <robin.krahl@ireas.org> | 2018-05-21 23:04:20 +0000 | 
|---|---|---|
| committer | Robin Krahl <robin.krahl@ireas.org> | 2018-05-22 01:05:41 +0200 | 
| commit | a9f51585b909c805bd441200c65e622217dc1a38 (patch) | |
| tree | 65feabe4ab97def27f8e7125d056d9c079d9aaef /src/tests | |
| parent | 57cab82dc3063cb6608aaf2ee937ad7af231c52a (diff) | |
| download | nitrokey-rs-a9f51585b909c805bd441200c65e622217dc1a38.tar.gz nitrokey-rs-a9f51585b909c805bd441200c65e622217dc1a38.tar.bz2 | |
Activate tests for unauthorized OTP code generation
In a previous commit, we changed get_string_result to only free the
string if the operation was successful.  Therefore we can re-enable the
tests in hotp_pin and totp_pin that cause failing OTP code generation
commands.
Diffstat (limited to 'src/tests')
| -rw-r--r-- | src/tests/pro.rs | 6 | 
1 files changed, 2 insertions, 4 deletions
| diff --git a/src/tests/pro.rs b/src/tests/pro.rs index d2132f8..732c248 100644 --- a/src/tests/pro.rs +++ b/src/tests/pro.rs @@ -108,8 +108,7 @@ fn hotp_pin() {      let user = admin.device().authenticate_user(USER_PASSWORD).unwrap();      check_hotp_codes(&user); -    // TODO: enable for newer libnitrokey -    // assert!(user.device().get_hotp_code(1).is_err()); +    assert!(user.device().get_hotp_code(1).is_err());  }  #[test] @@ -209,8 +208,7 @@ fn totp_pin() {      let user = admin.device().authenticate_user(USER_PASSWORD).unwrap();      check_totp_codes(&user); -    // TODO: enable for newer libnitrokey -    // assert!(user.device().get_totp_code(1).is_err()); +    assert!(user.device().get_totp_code(1).is_err());  }  #[test] | 
