@@ -34,9 +34,9 @@ def test_lockout(device, resetdevice, client_pin):
|
|||||||
pin_token = client_pin.get_pin_token(pin)
|
pin_token = client_pin.get_pin_token(pin)
|
||||||
|
|
||||||
for i in range(1, 10):
|
for i in range(1, 10):
|
||||||
err = CtapError.ERR.PIN_INVALID
|
err = [CtapError.ERR.PIN_INVALID]
|
||||||
if i in (3, 6):
|
if 3 <= i <= 7:
|
||||||
err = CtapError.ERR.PIN_AUTH_BLOCKED
|
err = [CtapError.ERR.PIN_AUTH_BLOCKED]
|
||||||
elif i >= 8:
|
elif i >= 8:
|
||||||
err = [CtapError.ERR.PIN_BLOCKED, CtapError.ERR.PIN_INVALID]
|
err = [CtapError.ERR.PIN_BLOCKED, CtapError.ERR.PIN_INVALID]
|
||||||
|
|
||||||
@@ -180,5 +180,6 @@ def test_exclude_list_excluded(device):
|
|||||||
|
|
||||||
assert e.value.code == CtapError.ERR.CREDENTIAL_EXCLUDED
|
assert e.value.code == CtapError.ERR.CREDENTIAL_EXCLUDED
|
||||||
|
|
||||||
def test_unknown_option(resetdevice):
|
def test_unknown_option(device):
|
||||||
resetdevice.MC(options={"unknown": False})
|
device.reset()
|
||||||
|
device.MC(options={"unknown": False})
|
||||||
@@ -126,10 +126,7 @@ def test_credprotect_optional_and_list_works_no_uv(device, MCCredProtectOptional
|
|||||||
res1 = device.doGA(allow_list=allow_list)['res'].get_assertions()[0]
|
res1 = device.doGA(allow_list=allow_list)['res'].get_assertions()[0]
|
||||||
assert res1.number_of_credentials in (None, 2)
|
assert res1.number_of_credentials in (None, 2)
|
||||||
|
|
||||||
results = [res1]
|
results = device.doGA(allow_list=allow_list)['res'].get_assertions()
|
||||||
if res1.number_of_credentials == 2:
|
|
||||||
res2 = device.GNA()['res']
|
|
||||||
results.append(res2)
|
|
||||||
|
|
||||||
# the required credProtect is not returned.
|
# the required credProtect is not returned.
|
||||||
for res in results:
|
for res in results:
|
||||||
Reference in New Issue
Block a user