Check-in [dbd79de227]
Overview
Comment:Fixed issue with C_GetMechanismList rejecting valid buffer sizes
Downloads: Tarball | ZIP archive | SQL archive
Timelines: family | ancestors | descendants | both | trunk
Files: files | file ages | folders
SHA1:dbd79de2272c3010ff434fd345f173123cb64675
User & Date: rkeene on 2012-04-21 01:14:20
Other Links: manifest | tags
Context
2012-04-26
01:10
Updated to support an environment variable named CACKEY_NO_EXTRA_CERTS to inhibit DoD certs from being presented check-in: b9bcff12a6 user: rkeene tags: trunk
2012-04-21
01:14
Fixed issue with C_GetMechanismList rejecting valid buffer sizes check-in: dbd79de227 user: rkeene tags: trunk
01:13
Fixed issue with C_GetMechanismList reporting wrong number of mechanisms when asked check-in: 66ea8c8073 user: rkeene tags: trunk
Changes

Modified cackey.c from [0c1884cff7] to [e9059b3fc8].

3849
3850
3851
3852
3853
3854
3855
3856
3857
3858
3859
3860
3861
3862
3863
		*pulCount = 1;

		CACKEY_DEBUG_PRINTF("Returning CKR_OK (%i)", CKR_OK);

		return(CKR_OK);
	}

	if (*pulCount < 2) {
		CACKEY_DEBUG_PRINTF("Error.  Buffer too small.");

		return(CKR_BUFFER_TOO_SMALL);
	}

	pMechanismList[0] = CKM_RSA_PKCS;
	*pulCount = 1;







|







3849
3850
3851
3852
3853
3854
3855
3856
3857
3858
3859
3860
3861
3862
3863
		*pulCount = 1;

		CACKEY_DEBUG_PRINTF("Returning CKR_OK (%i)", CKR_OK);

		return(CKR_OK);
	}

	if (*pulCount < 1) {
		CACKEY_DEBUG_PRINTF("Error.  Buffer too small.");

		return(CKR_BUFFER_TOO_SMALL);
	}

	pMechanismList[0] = CKM_RSA_PKCS;
	*pulCount = 1;