Overview
Comment: | Updated to determine subject from certificate |
---|---|
Downloads: | Tarball | ZIP archive | SQL archive |
Timelines: | family | ancestors | descendants | both | trunk |
Files: | files | file ages | folders |
SHA1: |
5534d640e4905708adef5361fc99beba |
User & Date: | rkeene on 2010-05-13 16:19:01 |
Other Links: | manifest | tags |
Context
2010-05-13
| ||
18:22 | Updated to use unified return codes check-in: 123c71d946 user: rkeene tags: trunk | |
16:19 | Updated to determine subject from certificate check-in: 5534d640e4 user: rkeene tags: trunk | |
15:58 |
Updated to use certificate from identity in attribute finding
Updated to correctly pass certificate number check-in: 9b6cdd281c user: rkeene tags: trunk | |
Changes
Modified cackey.c from [2223838f44] to [cf1bec3529].
︙ | ︙ | |||
1515 1516 1517 1518 1519 1520 1521 | CACKEY_DEBUG_PRINTF(" ... returning %lu (%p/%lu)", (unsigned long) *((CK_BBOOL *) pValue), pValue, (unsigned long) ulValueLen); break; case CKA_LABEL: CACKEY_DEBUG_PRINTF("Requesting attribute CKA_LABEL (0x%08lx) ...", (unsigned long) curr_attr_type); | | > > > > > > | > > | | 1515 1516 1517 1518 1519 1520 1521 1522 1523 1524 1525 1526 1527 1528 1529 1530 1531 1532 1533 1534 1535 1536 1537 1538 1539 | CACKEY_DEBUG_PRINTF(" ... returning %lu (%p/%lu)", (unsigned long) *((CK_BBOOL *) pValue), pValue, (unsigned long) ulValueLen); break; case CKA_LABEL: CACKEY_DEBUG_PRINTF("Requesting attribute CKA_LABEL (0x%08lx) ...", (unsigned long) curr_attr_type); /* Determine name */ if (certificate_len >= 0) { x509_read_ret = x509_to_subject(certificate, certificate_len, &pValue); if (x509_read_ret < 0) { pValue = NULL; } else { ulValueLen = x509_read_ret; } } CACKEY_DEBUG_PRINTF(" ... returning (%p/%lu)", pValue, (unsigned long) ulValueLen); break; case CKA_VALUE: CACKEY_DEBUG_PRINTF("Requesting attribute CKA_VALUE (0x%08lx) ...", (unsigned long) curr_attr_type); switch (objectclass) { case CKO_PRIVATE_KEY: |
︙ | ︙ |