1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56
|
package protocol
import (
"reflect"
"testing"
)
func TestPublicKeyCredentialRequestOptions_GetAllowedCredentialIDs(t *testing.T) {
type fields struct {
Challenge Challenge
Timeout int
RelyingPartyID string
AllowedCredentials []CredentialDescriptor
UserVerification UserVerificationRequirement
Extensions AuthenticationExtensions
}
tests := []struct {
name string
fields fields
want [][]byte
}{
{
"Correct Credential IDs",
fields{
Challenge: Challenge([]byte{0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}),
Timeout: 60,
AllowedCredentials: []CredentialDescriptor{
{
"public-key", []byte("1234"), []AuthenticatorTransport{"usb"},
},
},
RelyingPartyID: "test.org",
UserVerification: VerificationPreferred,
Extensions: AuthenticationExtensions{},
},
[][]byte{
[]byte("1234"),
},
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
a := &PublicKeyCredentialRequestOptions{
Challenge: tt.fields.Challenge,
Timeout: tt.fields.Timeout,
RelyingPartyID: tt.fields.RelyingPartyID,
AllowedCredentials: tt.fields.AllowedCredentials,
UserVerification: tt.fields.UserVerification,
Extensions: tt.fields.Extensions,
}
if got := a.GetAllowedCredentialIDs(); !reflect.DeepEqual(got, tt.want) {
t.Errorf("PublicKeyCredentialRequestOptions.GetAllowedCredentialIDs() = %v, want %v", got, tt.want)
}
})
}
}
|