Overview
Comment: | Updated to censor PIN in debugging output |
---|---|
Downloads: | Tarball | ZIP archive | SQL archive |
Timelines: | family | ancestors | descendants | both | trunk |
Files: | files | file ages | folders |
SHA1: |
0233c7b5fe74bd9bcee455d5d61b61a8 |
User & Date: | rkeene on 2010-05-15 00:39:44 |
Other Links: | manifest | tags |
Context
2010-05-15
| ||
00:48 |
Renamed leakcheck tool
Added documentation for leakcheck tool check-in: 168d86b82b user: rkeene tags: trunk | |
00:39 | Updated to censor PIN in debugging output check-in: 0233c7b5fe user: rkeene tags: trunk | |
00:34 |
Added line numbers to debugging output
Added overloaded debugging strdup to check for leaks check-in: 709b50760d user: rkeene tags: trunk | |
Changes
Modified cackey.c from [e77001954d] to [e8f3ee7748].
︙ | ︙ | |||
1032 1033 1034 1035 1036 1037 1038 | if (le != 0x00) { xmit_buf[xmit_len++] = le; } /* Begin Smartcard Transaction */ cackey_begin_transaction(slot); | > > > | > | 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 | if (le != 0x00) { xmit_buf[xmit_len++] = le; } /* Begin Smartcard Transaction */ cackey_begin_transaction(slot); if (class == GSCIS_CLASS_ISO7816 && instruction == GSCIS_INSTR_VERIFY && p1 == 0x00 && p2 == 0x00) { CACKEY_DEBUG_PRINTF("Sending APDU: <<censored>>"); } else { CACKEY_DEBUG_PRINTBUF("Sending APDU:", xmit_buf, xmit_len); } recv_len = sizeof(recv_buf); scard_xmit_ret = SCardTransmit(slot->pcsc_card, SCARD_PCI_T0, xmit_buf, xmit_len, SCARD_PCI_T1, recv_buf, &recv_len); if (scard_xmit_ret != SCARD_S_SUCCESS) { CACKEY_DEBUG_PRINTF("Failed to send APDU to card (SCardTransmit() = %s/%lx)", CACKEY_DEBUG_FUNC_SCARDERR_TO_STR(scard_xmit_ret), (unsigned long) scard_xmit_ret); CACKEY_DEBUG_PRINTF("Marking slot as having been reset"); |
︙ | ︙ |