@@ -1,5 +1,3 @@
|
||||
from fido2.attestation import FidoU2FAttestation
|
||||
|
||||
# Test U2F register works with FIDO2 auth
|
||||
def test_ctap1_register(RegRes):
|
||||
pass
|
||||
@@ -8,7 +6,7 @@ def test_ctap1_authenticate(RegRes, AuthRes):
|
||||
pass
|
||||
|
||||
def test_authenticate_ctap1_through_ctap2(device, RegRes):
|
||||
res = device.doGA(allow_list=[
|
||||
res = device.doGA(ctap1=False, allow_list=[
|
||||
{"id": RegRes['res'].attestation_object.auth_data.credential_data.credential_id, "type": "public-key"}
|
||||
])
|
||||
assert res['res'].get_response(0).credential_id == RegRes['res'].attestation_object.auth_data.credential_data.credential_id
|
||||
|
||||
@@ -1,18 +1,12 @@
|
||||
import os
|
||||
import pytest
|
||||
from fido2.ctap import CtapError
|
||||
from fido2.ctap2.pin import PinProtocolV1
|
||||
from fido2.client import ClientPin
|
||||
from fido2.webauthn import UserVerificationRequirement
|
||||
from fido2.utils import hmac_sha256
|
||||
|
||||
from utils import *
|
||||
|
||||
|
||||
@pytest.fixture(scope="class")
|
||||
def client_pin(resetdevice):
|
||||
return ClientPin(resetdevice.client()._backend.ctap2)
|
||||
|
||||
def test_lockout(device, resetdevice, client_pin):
|
||||
pin = "TestPin"
|
||||
client_pin.set_pin(pin)
|
||||
|
||||
Reference in New Issue
Block a user