Check-in [0233c7b5fe]
Overview
Comment:Updated to censor PIN in debugging output
Downloads: Tarball | ZIP archive | SQL archive
Timelines: family | ancestors | descendants | both | trunk
Files: files | file ages | folders
SHA1:0233c7b5fe74bd9bcee455d5d61b61a8233ff6cd
User & Date: rkeene on 2010-05-15 00:39:44
Other Links: manifest | tags
Context
2010-05-15
00:48
Renamed leakcheck tool

Added documentation for leakcheck tool check-in: 168d86b82b user: rkeene tags: trunk

00:39
Updated to censor PIN in debugging output check-in: 0233c7b5fe user: rkeene tags: trunk
00:34
Added line numbers to debugging output

Added overloaded debugging strdup to check for leaks check-in: 709b50760d user: rkeene tags: trunk

Changes

Modified cackey.c from [e77001954d] to [e8f3ee7748].

  1032   1032   	if (le != 0x00) {
  1033   1033   		xmit_buf[xmit_len++] = le;
  1034   1034   	}
  1035   1035   
  1036   1036   	/* Begin Smartcard Transaction */
  1037   1037   	cackey_begin_transaction(slot);
  1038   1038   
  1039         -	CACKEY_DEBUG_PRINTBUF("Sending APDU:", xmit_buf, xmit_len);
         1039  +	if (class == GSCIS_CLASS_ISO7816 && instruction == GSCIS_INSTR_VERIFY && p1 == 0x00 && p2 == 0x00) {
         1040  +		CACKEY_DEBUG_PRINTF("Sending APDU: <<censored>>");
         1041  +	} else {
         1042  +		CACKEY_DEBUG_PRINTBUF("Sending APDU:", xmit_buf, xmit_len);
         1043  +	}
  1040   1044   
  1041   1045   	recv_len = sizeof(recv_buf);
  1042   1046   	scard_xmit_ret = SCardTransmit(slot->pcsc_card, SCARD_PCI_T0, xmit_buf, xmit_len, SCARD_PCI_T1, recv_buf, &recv_len);
  1043   1047   	if (scard_xmit_ret != SCARD_S_SUCCESS) {
  1044   1048   		CACKEY_DEBUG_PRINTF("Failed to send APDU to card (SCardTransmit() = %s/%lx)", CACKEY_DEBUG_FUNC_SCARDERR_TO_STR(scard_xmit_ret), (unsigned long) scard_xmit_ret);
  1045   1049   		CACKEY_DEBUG_PRINTF("Marking slot as having been reset");
  1046   1050