def test_19_pin_otp_functions(self): db_token = Token.query.filter_by(serial=self.serial1).first() db_token.set_pin("test") token = DaplugTokenClass(db_token) # check OTP according to RFC 4226 """ Truncated Count Hexadecimal Decimal HOTP 0 4c93cf18 1284755224 755224 1 41397eea 1094287082 287082 2 82fef30 137359152 359152 3 66ef7655 1726969429 969429 4 61c5938a 1640338314 338314 5 33c083d4 868254676 254676 6 7256c032 1918287922 287922 7 4e5b397 82162583 162583 8 2823443f 673399871 399871 9 2679dc69 645520489 520489 """ token.update({"otpkey": self.otpkey}) self.assertTrue(db_token.otplen == 6, 6) set_prepend_pin() res, pin, otp = token.split_pin_pass("test" + _digi2daplug("123456")) self.assertTrue(pin == "test", pin) self.assertTrue(otp == _digi2daplug("123456"), otp) self.assertTrue(token.check_pin(pin), pin) check = token.check_otp(_digi2daplug("755224"), counter=0, window=10) self.assertTrue(check == 0, check) self.assertTrue(token.check_otp(_digi2daplug("287082"), counter=1, window=10) == 1) # The 6th counter: self.assertTrue(token.check_otp(_digi2daplug("287922"), counter=2, window=10) == 6) # The tokenclass itself saves the counter to the database self.assertTrue(token.token.count == 7, token.token.count) # successful authentication res = token.authenticate("test" + _digi2daplug("399871")) # This is the OTP value of the counter=8 self.assertTrue(res == (True, 8, None), res) token.set_otp_count(0) # get the OTP value for counter 0 res = token.get_otp() self.assertTrue(res[0] == 1, res) self.assertTrue(res[1] == -1, res) self.assertTrue(res[2] == _digi2daplug("755224"), res) res = token.get_multi_otp() self.assertTrue(res[0] is False, res) token.update({"otpkey": self.otpkey, "otplen": 6}) token.token.count = 0 res = token.get_multi_otp(count=5) self.assertTrue(res[0], res) self.assertTrue(res[1] == "OK", res) self.assertTrue(res[2].get("otp").get(1) == _digi2daplug("287082"), res[2]) self.assertTrue(res[2].get("type") == "daplug", res) # do some failing otp checks token.token.otplen = "invalid otp counter" self.assertRaises(Exception, token.check_otp, _digi2daplug("123456")) token.token.otplen = 0
def test_14_split_pin_pass(self): db_token = Token.query.filter_by(serial=self.serial1).first() token = EmailTokenClass(db_token) token.token.otplen = 6 # postpend pin set_prepend_pin(False) _res, pin, value = token.split_pin_pass("222333test") self.assertTrue(pin == "test", pin) self.assertTrue(value == "222333", value) # prepend pin set_prepend_pin(True) _res, pin, value = token.split_pin_pass("test222333") self.assertTrue(pin == "test", pin) self.assertTrue(value == "222333", value)
def test_14_split_pin_pass(self): db_token = Token.query.filter_by(serial=self.serial1).first() token = TotpTokenClass(db_token) token.token.otplen = 6 # postpend pin set_prepend_pin(False) _res, pin, value = token.split_pin_pass("222333test") self.assertTrue(pin == "test", pin) self.assertTrue(value == "222333", value) # prepend pin set_prepend_pin() _res, pin, value = token.split_pin_pass("test222333") self.assertTrue(pin == "test", pin) self.assertTrue(value == "222333", value)
def test_14_split_pin_pass(self): db_token = Token.query.filter_by(serial=self.serial1).first() token = TokenClass(db_token) token.token.otplen = 6 # postpend pin from privacyidea.lib.config import set_prepend_pin set_prepend_pin(False) (_res, pin, value) = token.split_pin_pass("123456test") self.assertTrue(pin == "test", pin) self.assertTrue(value == "123456", value) # prepend pin set_prepend_pin(True) res, pin, value = token.split_pin_pass("test123456") self.assertTrue(pin == "test", pin) self.assertTrue(value == "123456", value)
def test_19_pin_otp_functions(self): db_token = Token.query.filter_by(serial=self.serial1).first() db_token.set_pin("test") token = HotpTokenClass(db_token) # check OTP according to RFC 4226 """ Truncated Count Hexadecimal Decimal HOTP 0 4c93cf18 1284755224 755224 1 41397eea 1094287082 287082 2 82fef30 137359152 359152 3 66ef7655 1726969429 969429 4 61c5938a 1640338314 338314 5 33c083d4 868254676 254676 6 7256c032 1918287922 287922 7 4e5b397 82162583 162583 8 2823443f 673399871 399871 9 2679dc69 645520489 520489 """ token.update({"otpkey": self.otpkey}) self.assertTrue(db_token.otplen == 6, 6) set_prepend_pin() res, pin, otp = token.split_pin_pass("test123456") self.assertTrue(pin == "test", pin) self.assertTrue(otp == "123456", otp) self.assertTrue(token.check_pin(pin), pin) check = token.check_otp("755224", counter=0, window=10) self.assertTrue(check == 0, check) self.assertTrue(token.check_otp("287082", counter=1, window=10) == 1) # The 6th counter: self.assertTrue(token.check_otp("287922", counter=2, window=10) == 6) # The tokenclass itself saves the counter to the database self.assertTrue(token.token.count == 7, token.token.count) # successful authentication res = token.authenticate("test399871") # This is the OTP value of the counter=8 self.assertTrue(res == (True, 8, None), res) # try the same otp value again, will fail! res = token.authenticate("test399871") # This is the OTP value of the counter=8 self.assertTrue(res == (True, -1, None), res) token.set_otp_count(0) # get the OTP value for counter 0 res = token.get_otp() self.assertTrue(res[0] == 1, res) self.assertTrue(res[1] == -1, res) self.assertTrue(res[2] == "755224", res) res = token.get_multi_otp() self.assertTrue(res[0] is False, res) token.update({"otpkey": self.otpkey, "otplen": 6}) token.token.count = 0 res = token.get_multi_otp(count=5) self.assertTrue(res[0], res) self.assertTrue(res[1] == "OK", res) self.assertTrue(res[2].get("otp").get(1) == "287082", res) self.assertTrue(res[2].get("type") == "hotp", res) # do some failing otp checks token.token.otplen = "invalid otp counter" self.assertRaises(Exception, token.check_otp, "123456") token.token.otplen = 0
def test_19_pin_otp_functions(self): db_token = Token.query.filter_by(serial=self.serial1).first() db_token.set_pin("test") token = TotpTokenClass(db_token) # check OTP according to RFC 4226 token.update({"otpkey": self.otpkey}) self.assertTrue(db_token.otplen == 6, 6) set_prepend_pin() res, pin, otp = token.split_pin_pass("test123456") self.assertTrue(pin == "test", pin) self.assertTrue(otp == "123456", otp) self.assertTrue(token.check_pin(pin), pin) # get the OTP value for counter 1417549521 res = token.get_otp(time_seconds=1417549521) self.assertTrue(res[0] == 1, res) self.assertTrue(res[2] == "589836", res) check = token.check_otp("722053", counter=47251647) # The OTP 722053 is of counter 47251647 self.assertTrue(check == 47251647, check) # The tokenclass saves the counter to the database self.assertTrue(token.token.count == 47251647, token.token.count) check = token.check_otp("705493", counter=47251648) # The OTP 705493 is of counter 47251649, but it matches also. self.assertTrue(check == 47251649, check) # successful authentication res = token.authenticate("test589836") # This is the OTP value of the counter=47251650 self.assertTrue(res == (True, 47251650, None), res) # try the same OTP value again will fail! res = token.authenticate("test589836") # This is the OTP value of the counter=47251650 self.assertTrue(res == (True, -1, None), res) res = token.get_multi_otp() self.assertTrue(res[0] is False, res) token.update({"otpkey": self.otpkey, "otplen": 6, "timeShift": 0}) token.token.count = 0 res = token.get_multi_otp(count=5) self.assertTrue(res[0], res) self.assertTrue(res[1] == "OK", res) self.assertTrue(len(res[2].get("otp")) == 5, res[2].get("otp")) # Simulate the server time res = token.get_multi_otp(count=5, timestamp=47251644 * 30) self.assertTrue(res[0], res) self.assertTrue(res[1] == "OK", res) self.assertTrue(len(res[2].get("otp")) == 5, res[2].get("otp")) self.assertTrue(47251648 in res[2].get("otp"), res[2].get("otp")) self.assertTrue(47251647 in res[2].get("otp"), res[2].get("otp")) self.assertTrue(47251646 in res[2].get("otp"), res[2].get("otp")) self.assertTrue(47251645 in res[2].get("otp"), res[2].get("otp")) self.assertTrue(47251644 in res[2].get("otp"), res[2].get("otp")) # Simulate the server time res = token.get_multi_otp(count=5, curTime=datetime.datetime(2014, 12,12)) self.assertTrue(res[0], res) self.assertTrue(res[1] == "OK", res) self.assertTrue(len(res[2].get("otp")) == 5, res[2].get("otp")) self.assertTrue(47278080 in res[2].get("otp"), res[2].get("otp")) self.assertTrue(47278081 in res[2].get("otp"), res[2].get("otp")) self.assertTrue(47278082 in res[2].get("otp"), res[2].get("otp")) self.assertTrue(47278083 in res[2].get("otp"), res[2].get("otp")) self.assertTrue(47278084 in res[2].get("otp"), res[2].get("otp")) # do some failing otp checks token.token.otplen = "invalid otp counter" self.assertRaises(Exception, token.check_otp, "123456") token.token.otplen = 0 # Previous OTP value used again token.token.otplen = 6 #token.token.count = 47251640 # The OTP for this counter was already presented to the server token.token.count = 47251648 # 47251647 -> 722053 res = token.check_otp("722053", options={"initTime": 47251649 * 30}) #self.assertTrue(res == 47251647, res) self.assertTrue(res == -1, res) # simple get_otp of current time r = token.get_otp() self.assertTrue(r > 47251648, r) r = token.get_otp(current_time=datetime.datetime.now()) self.assertTrue(r > 47251648, r)
def test_19_pin_otp_functions(self): db_token = Token.query.filter_by(serial=self.serial1).first() db_token.set_pin("test") token = TotpTokenClass(db_token) # check OTP according to RFC 4226 token.update({"otpkey": self.otpkey}) self.assertTrue(db_token.otplen == 6, 6) set_prepend_pin() res, pin, otp = token.split_pin_pass("test123456") self.assertTrue(pin == "test", pin) self.assertTrue(otp == "123456", otp) self.assertTrue(token.check_pin(pin), pin) # get the OTP value for counter 1417549521 res = token.get_otp(time_seconds=1417549521) self.assertTrue(res[0] == 1, res) self.assertTrue(res[2] == "589836", res) check = token.check_otp("722053", counter=47251647) # The OTP 722053 is of counter 47251647 self.assertTrue(check == 47251647, check) # The tokenclass saves the counter to the database self.assertTrue(token.token.count == 47251647, token.token.count) check = token.check_otp("705493", counter=47251648) # The OTP 705493 is of counter 47251649, but it matches also. self.assertTrue(check == 47251649, check) # successful authentication res = token.authenticate("test589836") # This is the OTP value of the counter=47251650 self.assertTrue(res == (True, 47251650, None), res) # try the same OTP value again will fail! res = token.authenticate("test589836") # This is the OTP value of the counter=47251650 self.assertTrue(res == (True, -1, None), res) res = token.get_multi_otp() self.assertTrue(res[0] is False, res) token.update({"otpkey": self.otpkey, "otplen": 6}) token.token.count = 0 res = token.get_multi_otp(count=5) self.assertTrue(res[0], res) self.assertTrue(res[1] == "OK", res) self.assertTrue(len(res[2].get("otp")) == 5, res[2].get("otp")) # Simulate the server time res = token.get_multi_otp(count=5, timestamp=47251644 * 30) self.assertTrue(res[0], res) self.assertTrue(res[1] == "OK", res) self.assertTrue(len(res[2].get("otp")) == 5, res[2].get("otp")) self.assertTrue(47251648 in res[2].get("otp"), res[2].get("otp")) self.assertTrue(47251647 in res[2].get("otp"), res[2].get("otp")) self.assertTrue(47251646 in res[2].get("otp"), res[2].get("otp")) self.assertTrue(47251645 in res[2].get("otp"), res[2].get("otp")) self.assertTrue(47251644 in res[2].get("otp"), res[2].get("otp")) # Simulate the server time res = token.get_multi_otp(count=5, curTime=datetime.datetime(2014, 12,12)) self.assertTrue(res[0], res) self.assertTrue(res[1] == "OK", res) self.assertTrue(len(res[2].get("otp")) == 5, res[2].get("otp")) self.assertTrue(47278080 in res[2].get("otp"), res[2].get("otp")) self.assertTrue(47278081 in res[2].get("otp"), res[2].get("otp")) self.assertTrue(47278082 in res[2].get("otp"), res[2].get("otp")) self.assertTrue(47278083 in res[2].get("otp"), res[2].get("otp")) self.assertTrue(47278084 in res[2].get("otp"), res[2].get("otp")) # do some failing otp checks token.token.otplen = "invalid otp counter" self.assertRaises(Exception, token.check_otp, "123456") token.token.otplen = 0 # Previous OTP value used again token.token.otplen = 6 #token.token.count = 47251640 # The OTP for this counter was already presented to the server token.token.count = 47251648 # 47251647 -> 722053 res = token.check_otp("722053", options={"initTime": 47251649 * 30}) #self.assertTrue(res == 47251647, res) self.assertTrue(res == -1, res) # simple get_otp of current time r = token.get_otp() self.assertTrue(r > 47251648, r) r = token.get_otp(current_time=datetime.datetime.now()) self.assertTrue(r > 47251648, r)