27
27
use RobThree \Auth \Providers \Time \ITimeProvider ;
28
28
29
29
30
- class TwoFactorAuthTest extends PHPUnit_Framework_TestCase
30
+ class TwoFactorAuthTest extends PHPUnit \ Framework \TestCase
31
31
{
32
32
/**
33
33
* @expectedException \RobThree\Auth\TwoFactorAuthException
@@ -102,6 +102,7 @@ public function testEnsureCorrectTimeDoesNotThrowForCorrectTime() {
102
102
103
103
$ tfa = new TwoFactorAuth ('Test ' , 6 , 30 , 'sha1 ' , null , null , $ tpr1 );
104
104
$ tfa ->ensureCorrectTime (array ($ tpr2 )); // 128 - 123 = 5 => within default leniency
105
+ $ this ->assertTrue (true );
105
106
}
106
107
107
108
/**
@@ -119,6 +120,7 @@ public function testEnsureCorrectTimeThrowsOnIncorrectTime() {
119
120
public function testEnsureDefaultTimeProviderReturnsCorrectTime () {
120
121
$ tfa = new TwoFactorAuth ('Test ' , 6 , 30 , 'sha1 ' );
121
122
$ tfa ->ensureCorrectTime (array (new TestTimeProvider (time ())), 1 ); // Use a leniency of 1, should the time change between both time() calls
123
+ $ this ->assertTrue (true );
122
124
}
123
125
124
126
public function testEnsureAllTimeProvidersReturnCorrectTime () {
@@ -130,6 +132,7 @@ public function testEnsureAllTimeProvidersReturnCorrectTime() {
130
132
new RobThree \Auth \Providers \Time \HttpTimeProvider ('https://github.com ' ),
131
133
new RobThree \Auth \Providers \Time \HttpTimeProvider ('https://yahoo.com ' ),
132
134
));
135
+ $ this ->assertTrue (true );
133
136
}
134
137
135
138
public function testVerifyCodeWorksCorrectly () {
@@ -327,6 +330,7 @@ public function testMCryptRNGProvidersReturnExpectedNumberOfBytes() {
327
330
$ this ->assertEquals ($ l , strlen ($ rng ->getRandomBytes ($ l )));
328
331
$ this ->assertEquals (true , $ rng ->isCryptographicallySecure ());
329
332
}
333
+ $ this ->assertTrue (true );
330
334
}
331
335
332
336
/**
0 commit comments