Check-in [824ac1bc2e]
Overview
Comment:Updated debugging output
Downloads: Tarball | ZIP archive | SQL archive
Timelines: family | ancestors | descendants | both | trunk
Files: files | file ages | folders
SHA1:824ac1bc2ea8ddec48cfec55eef38982d1a16fef
User & Date: rkeene on 2010-05-17 23:11:31
Other Links: manifest | tags
Context
2010-05-18
14:11
Updated to keep track of required token flags check-in: 93bbed97eb user: rkeene tags: trunk
2010-05-17
23:11
Updated debugging output check-in: 824ac1bc2e user: rkeene tags: trunk
22:22
Updated to support unpadding check-in: ebeffd66b4 user: rkeene tags: trunk
Changes

Modified cackey.c from [b1f39a9840] to [806bbf2a79].

  4990   4990   		
  4991   4991   		return(CKR_OPERATION_NOT_INITIALIZED);
  4992   4992   	}
  4993   4993   
  4994   4994   	switch (cackey_sessions[hSession].sign_mechanism) {
  4995   4995   		case CKM_RSA_PKCS:
  4996   4996   			/* Ask card to sign */
  4997         -			CACKEY_DEBUG_PRINTF("Asking to decrypt from identity %p in session %lu", cackey_sessions[hSession].sign_identity, (unsigned long) hSession);
         4997  +			CACKEY_DEBUG_PRINTF("Asking to sign from identity %p in session %lu", cackey_sessions[hSession].sign_identity, (unsigned long) hSession);
  4998   4998   			sigbuflen = cackey_signdecrypt(&cackey_slots[cackey_sessions[hSession].slotID], cackey_sessions[hSession].sign_identity, cackey_sessions[hSession].sign_buf, cackey_sessions[hSession].sign_buflen, sigbuf, sizeof(sigbuf), 1, 0);
  4999   4999   
  5000   5000   			if (sigbuflen < 0) {
  5001   5001   				/* Signing failed. */
  5002   5002   				retval = CKR_GENERAL_ERROR;
  5003   5003   			} else if (((unsigned long) sigbuflen) > *pulSignatureLen && pSignature) {
  5004   5004   				/* Signed data too large */
         5005  +				CACKEY_DEBUG_PRINTF("retval = CKR_BUFFER_TOO_SMALL;  sigbuflen = %lu, pulSignatureLen = %lu", (unsigned long) sigbuflen, (unsigned long) *pulSignatureLen);
         5006  +
  5005   5007   				retval = CKR_BUFFER_TOO_SMALL;
  5006   5008   
  5007   5009   				terminate_sign = 0;
  5008   5010   			} else {
  5009   5011   				terminate_sign = 0;
  5010   5012   
  5011   5013   				if (pSignature) {