Overview
| Comment: | Updated to treat a return code of 0x6E00 (wrong instruction class) the same as 0x6982 (security status not satisified) |
|---|---|
| Downloads: | Tarball | ZIP archive | SQL archive |
| Timelines: | family | ancestors | descendants | both | piv |
| Files: | files | file ages | folders |
| SHA1: |
2e1e0bfc20dc205985189059f20224cf |
| User & Date: | rkeene on 2013-09-14 02:50:16 |
| Other Links: | branch diff | manifest | tags |
Context
|
2013-10-17
| ||
| 20:29 | Updated to deal with 6E00 and added support for win32 build options check-in: 6ba1dff55a user: rkeene tags: piv | |
|
2013-09-14
| ||
| 04:11 | Merged in changes from piv check-in: 5f8f3e59a7 user: rkeene tags: protected-auth-path | |
| 02:50 | Updated to treat a return code of 0x6E00 (wrong instruction class) the same as 0x6982 (security status not satisified) check-in: 2e1e0bfc20 user: rkeene tags: piv | |
|
2013-08-19
| ||
| 03:33 | Updated to exclude USG certificates slot if compiled without it check-in: eba8a2346a user: rkeene tags: piv | |
Changes
Modified cackey.c from [b9c502e6af] to [c06e51ee9b].
| ︙ | ︙ | |||
2864 2865 2866 2867 2868 2869 2870 | free(tmpbuf_s); } } /* End transaction */ cackey_end_transaction(slot); | | | | 2864 2865 2866 2867 2868 2869 2870 2871 2872 2873 2874 2875 2876 2877 2878 2879 |
free(tmpbuf_s);
}
}
/* End transaction */
cackey_end_transaction(slot);
if (respcode == 0x6982 || respcode == 0x6e00) {
CACKEY_DEBUG_PRINTF("Security status not satisified (respcode = 0x%04x). Returning NEEDLOGIN", (int) respcode);
cackey_mark_slot_reset(slot);
slot->token_flags = CKF_LOGIN_REQUIRED;
return(CACKEY_PCSC_E_NEEDLOGIN);
}
|
| ︙ | ︙ |