Overview
Comment: | Updated debugging output |
---|---|
Downloads: | Tarball | ZIP archive | SQL archive |
Timelines: | family | ancestors | descendants | both | trunk |
Files: | files | file ages | folders |
SHA1: | 824ac1bc2ea8ddec48cfec55eef38982d1a16fef |
User & Date: | rkeene on 2010-05-17 23:11:31 |
Other Links: | manifest | tags |
Context
2010-05-18
| ||
14:11 | Updated to keep track of required token flags check-in: 93bbed97eb user: rkeene tags: trunk | |
2010-05-17
| ||
23:11 | Updated debugging output check-in: 824ac1bc2e user: rkeene tags: trunk | |
22:22 | Updated to support unpadding check-in: ebeffd66b4 user: rkeene tags: trunk | |
Changes
Modified cackey.c from [b1f39a9840] to [806bbf2a79].
4990 4990 4991 4991 return(CKR_OPERATION_NOT_INITIALIZED); 4992 4992 } 4993 4993 4994 4994 switch (cackey_sessions[hSession].sign_mechanism) { 4995 4995 case CKM_RSA_PKCS: 4996 4996 /* Ask card to sign */ 4997 - CACKEY_DEBUG_PRINTF("Asking to decrypt from identity %p in session %lu", cackey_sessions[hSession].sign_identity, (unsigned long) hSession); 4997 + CACKEY_DEBUG_PRINTF("Asking to sign from identity %p in session %lu", cackey_sessions[hSession].sign_identity, (unsigned long) hSession); 4998 4998 sigbuflen = cackey_signdecrypt(&cackey_slots[cackey_sessions[hSession].slotID], cackey_sessions[hSession].sign_identity, cackey_sessions[hSession].sign_buf, cackey_sessions[hSession].sign_buflen, sigbuf, sizeof(sigbuf), 1, 0); 4999 4999 5000 5000 if (sigbuflen < 0) { 5001 5001 /* Signing failed. */ 5002 5002 retval = CKR_GENERAL_ERROR; 5003 5003 } else if (((unsigned long) sigbuflen) > *pulSignatureLen && pSignature) { 5004 5004 /* Signed data too large */ 5005 + CACKEY_DEBUG_PRINTF("retval = CKR_BUFFER_TOO_SMALL; sigbuflen = %lu, pulSignatureLen = %lu", (unsigned long) sigbuflen, (unsigned long) *pulSignatureLen); 5006 + 5005 5007 retval = CKR_BUFFER_TOO_SMALL; 5006 5008 5007 5009 terminate_sign = 0; 5008 5010 } else { 5009 5011 terminate_sign = 0; 5010 5012 5011 5013 if (pSignature) {