Check-in [0233c7b5fe]
Overview
Comment:Updated to censor PIN in debugging output
Downloads: Tarball | ZIP archive | SQL archive
Timelines: family | ancestors | descendants | both | trunk
Files: files | file ages | folders
SHA1: 0233c7b5fe74bd9bcee455d5d61b61a8233ff6cd
User & Date: rkeene on 2010-05-15 00:39:44
Other Links: manifest | tags
Context
2010-05-15
00:48
Renamed leakcheck tool

Added documentation for leakcheck tool check-in: 168d86b82b user: rkeene tags: trunk

00:39
Updated to censor PIN in debugging output check-in: 0233c7b5fe user: rkeene tags: trunk
00:34
Added line numbers to debugging output

Added overloaded debugging strdup to check for leaks check-in: 709b50760d user: rkeene tags: trunk

Changes

Modified cackey.c from [e77001954d] to [e8f3ee7748].

1032
1033
1034
1035
1036
1037
1038



1039


1040
1041
1042
1043
1044
1045
1046
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041

1042
1043
1044
1045
1046
1047
1048
1049
1050







+
+
+
-
+
+







	if (le != 0x00) {
		xmit_buf[xmit_len++] = le;
	}

	/* Begin Smartcard Transaction */
	cackey_begin_transaction(slot);

	if (class == GSCIS_CLASS_ISO7816 && instruction == GSCIS_INSTR_VERIFY && p1 == 0x00 && p2 == 0x00) {
		CACKEY_DEBUG_PRINTF("Sending APDU: <<censored>>");
	} else {
	CACKEY_DEBUG_PRINTBUF("Sending APDU:", xmit_buf, xmit_len);
		CACKEY_DEBUG_PRINTBUF("Sending APDU:", xmit_buf, xmit_len);
	}

	recv_len = sizeof(recv_buf);
	scard_xmit_ret = SCardTransmit(slot->pcsc_card, SCARD_PCI_T0, xmit_buf, xmit_len, SCARD_PCI_T1, recv_buf, &recv_len);
	if (scard_xmit_ret != SCARD_S_SUCCESS) {
		CACKEY_DEBUG_PRINTF("Failed to send APDU to card (SCardTransmit() = %s/%lx)", CACKEY_DEBUG_FUNC_SCARDERR_TO_STR(scard_xmit_ret), (unsigned long) scard_xmit_ret);
		CACKEY_DEBUG_PRINTF("Marking slot as having been reset");