fixes formatting
This commit is contained in:
164
src/ctap/mod.rs
164
src/ctap/mod.rs
@@ -1097,44 +1097,11 @@ mod test {
|
||||
// The expected response is split to only assert the non-random parts.
|
||||
assert_eq!(fmt, "packed");
|
||||
let mut expected_auth_data = vec![
|
||||
0xA3,
|
||||
0x79,
|
||||
0xA6,
|
||||
0xF6,
|
||||
0xEE,
|
||||
0xAF,
|
||||
0xB9,
|
||||
0xA5,
|
||||
0x5E,
|
||||
0x37,
|
||||
0x8C,
|
||||
0x11,
|
||||
0x80,
|
||||
0x34,
|
||||
0xE2,
|
||||
0x75,
|
||||
0x1E,
|
||||
0x68,
|
||||
0x2F,
|
||||
0xAB,
|
||||
0x9F,
|
||||
0x2D,
|
||||
0x30,
|
||||
0xAB,
|
||||
0x13,
|
||||
0xD2,
|
||||
0x12,
|
||||
0x55,
|
||||
0x86,
|
||||
0xCE,
|
||||
0x19,
|
||||
0x47,
|
||||
0x41,
|
||||
0x00,
|
||||
0x00,
|
||||
0x00,
|
||||
INITIAL_SIGNATURE_COUNTER as u8,
|
||||
0xA3, 0x79, 0xA6, 0xF6, 0xEE, 0xAF, 0xB9, 0xA5, 0x5E, 0x37, 0x8C, 0x11, 0x80,
|
||||
0x34, 0xE2, 0x75, 0x1E, 0x68, 0x2F, 0xAB, 0x9F, 0x2D, 0x30, 0xAB, 0x13, 0xD2,
|
||||
0x12, 0x55, 0x86, 0xCE, 0x19, 0x47, 0x41, 0x00, 0x00, 0x00,
|
||||
];
|
||||
expected_auth_data.push(INITIAL_SIGNATURE_COUNTER as u8);
|
||||
expected_auth_data.extend(&ctap_state.persistent_store.aaguid().unwrap());
|
||||
expected_auth_data.extend(&[0x00, 0x20]);
|
||||
assert_eq!(
|
||||
@@ -1168,44 +1135,11 @@ mod test {
|
||||
// The expected response is split to only assert the non-random parts.
|
||||
assert_eq!(fmt, "packed");
|
||||
let mut expected_auth_data = vec![
|
||||
0xA3,
|
||||
0x79,
|
||||
0xA6,
|
||||
0xF6,
|
||||
0xEE,
|
||||
0xAF,
|
||||
0xB9,
|
||||
0xA5,
|
||||
0x5E,
|
||||
0x37,
|
||||
0x8C,
|
||||
0x11,
|
||||
0x80,
|
||||
0x34,
|
||||
0xE2,
|
||||
0x75,
|
||||
0x1E,
|
||||
0x68,
|
||||
0x2F,
|
||||
0xAB,
|
||||
0x9F,
|
||||
0x2D,
|
||||
0x30,
|
||||
0xAB,
|
||||
0x13,
|
||||
0xD2,
|
||||
0x12,
|
||||
0x55,
|
||||
0x86,
|
||||
0xCE,
|
||||
0x19,
|
||||
0x47,
|
||||
0x41,
|
||||
0x00,
|
||||
0x00,
|
||||
0x00,
|
||||
INITIAL_SIGNATURE_COUNTER as u8,
|
||||
0xA3, 0x79, 0xA6, 0xF6, 0xEE, 0xAF, 0xB9, 0xA5, 0x5E, 0x37, 0x8C, 0x11, 0x80,
|
||||
0x34, 0xE2, 0x75, 0x1E, 0x68, 0x2F, 0xAB, 0x9F, 0x2D, 0x30, 0xAB, 0x13, 0xD2,
|
||||
0x12, 0x55, 0x86, 0xCE, 0x19, 0x47, 0x41, 0x00, 0x00, 0x00,
|
||||
];
|
||||
expected_auth_data.push(INITIAL_SIGNATURE_COUNTER as u8);
|
||||
expected_auth_data.extend(&ctap_state.persistent_store.aaguid().unwrap());
|
||||
expected_auth_data.extend(&[0x00, CREDENTIAL_ID_BASE_SIZE as u8]);
|
||||
assert_eq!(
|
||||
@@ -1351,44 +1285,11 @@ mod test {
|
||||
// The expected response is split to only assert the non-random parts.
|
||||
assert_eq!(fmt, "packed");
|
||||
let mut expected_auth_data = vec![
|
||||
0xA3,
|
||||
0x79,
|
||||
0xA6,
|
||||
0xF6,
|
||||
0xEE,
|
||||
0xAF,
|
||||
0xB9,
|
||||
0xA5,
|
||||
0x5E,
|
||||
0x37,
|
||||
0x8C,
|
||||
0x11,
|
||||
0x80,
|
||||
0x34,
|
||||
0xE2,
|
||||
0x75,
|
||||
0x1E,
|
||||
0x68,
|
||||
0x2F,
|
||||
0xAB,
|
||||
0x9F,
|
||||
0x2D,
|
||||
0x30,
|
||||
0xAB,
|
||||
0x13,
|
||||
0xD2,
|
||||
0x12,
|
||||
0x55,
|
||||
0x86,
|
||||
0xCE,
|
||||
0x19,
|
||||
0x47,
|
||||
0xC1,
|
||||
0x00,
|
||||
0x00,
|
||||
0x00,
|
||||
INITIAL_SIGNATURE_COUNTER as u8,
|
||||
0xA3, 0x79, 0xA6, 0xF6, 0xEE, 0xAF, 0xB9, 0xA5, 0x5E, 0x37, 0x8C, 0x11, 0x80,
|
||||
0x34, 0xE2, 0x75, 0x1E, 0x68, 0x2F, 0xAB, 0x9F, 0x2D, 0x30, 0xAB, 0x13, 0xD2,
|
||||
0x12, 0x55, 0x86, 0xCE, 0x19, 0x47, 0xC1, 0x00, 0x00, 0x00,
|
||||
];
|
||||
expected_auth_data.push(INITIAL_SIGNATURE_COUNTER as u8);
|
||||
expected_auth_data.extend(&ctap_state.persistent_store.aaguid().unwrap());
|
||||
expected_auth_data.extend(&[0x00, CREDENTIAL_ID_MAX_SIZE as u8]);
|
||||
assert_eq!(
|
||||
@@ -1434,44 +1335,11 @@ mod test {
|
||||
// The expected response is split to only assert the non-random parts.
|
||||
assert_eq!(fmt, "packed");
|
||||
let mut expected_auth_data = vec![
|
||||
0xA3,
|
||||
0x79,
|
||||
0xA6,
|
||||
0xF6,
|
||||
0xEE,
|
||||
0xAF,
|
||||
0xB9,
|
||||
0xA5,
|
||||
0x5E,
|
||||
0x37,
|
||||
0x8C,
|
||||
0x11,
|
||||
0x80,
|
||||
0x34,
|
||||
0xE2,
|
||||
0x75,
|
||||
0x1E,
|
||||
0x68,
|
||||
0x2F,
|
||||
0xAB,
|
||||
0x9F,
|
||||
0x2D,
|
||||
0x30,
|
||||
0xAB,
|
||||
0x13,
|
||||
0xD2,
|
||||
0x12,
|
||||
0x55,
|
||||
0x86,
|
||||
0xCE,
|
||||
0x19,
|
||||
0x47,
|
||||
0xC1,
|
||||
0x00,
|
||||
0x00,
|
||||
0x00,
|
||||
INITIAL_SIGNATURE_COUNTER as u8,
|
||||
0xA3, 0x79, 0xA6, 0xF6, 0xEE, 0xAF, 0xB9, 0xA5, 0x5E, 0x37, 0x8C, 0x11, 0x80,
|
||||
0x34, 0xE2, 0x75, 0x1E, 0x68, 0x2F, 0xAB, 0x9F, 0x2D, 0x30, 0xAB, 0x13, 0xD2,
|
||||
0x12, 0x55, 0x86, 0xCE, 0x19, 0x47, 0xC1, 0x00, 0x00, 0x00,
|
||||
];
|
||||
expected_auth_data.push(INITIAL_SIGNATURE_COUNTER as u8);
|
||||
expected_auth_data.extend(&ctap_state.persistent_store.aaguid().unwrap());
|
||||
expected_auth_data.extend(&[0x00, 0x20]);
|
||||
assert_eq!(
|
||||
|
||||
Reference in New Issue
Block a user