Overview
Comment: | Added removable device flag to slot info |
---|---|
Downloads: | Tarball | ZIP archive | SQL archive |
Timelines: | family | ancestors | descendants | both | trunk |
Files: | files | file ages | folders |
SHA1: |
b4a6b9d68580fec1b7bb8abd2c2a9b1d |
User & Date: | rkeene on 2010-05-17 14:55:37 |
Other Links: | manifest | tags |
Context
2010-05-17
| ||
19:37 |
Updated to support determining key size from X.509 object (untested)
Updated to set HW TOKEN flag Updated to pad sign/decrypt message to key size (untested) check-in: a2ac84031e user: rkeene tags: trunk | |
14:55 | Added removable device flag to slot info check-in: b4a6b9d685 user: rkeene tags: trunk | |
14:44 | Updated version-script detection macro check-in: 3dee1a5953 user: rkeene tags: trunk | |
Changes
Modified cackey.c from [9bef8e6303] to [6b8855e22d].
︙ | ︙ | |||
2938 2939 2940 2941 2942 2943 2944 | bytes_to_copy = strlen(cackey_slots[slotID].pcsc_reader); if (sizeof(pInfo->manufacturerID) < bytes_to_copy) { bytes_to_copy = sizeof(pInfo->manufacturerID); } memcpy(pInfo->manufacturerID, cackey_slots[slotID].pcsc_reader, bytes_to_copy); | | | 2938 2939 2940 2941 2942 2943 2944 2945 2946 2947 2948 2949 2950 2951 2952 | bytes_to_copy = strlen(cackey_slots[slotID].pcsc_reader); if (sizeof(pInfo->manufacturerID) < bytes_to_copy) { bytes_to_copy = sizeof(pInfo->manufacturerID); } memcpy(pInfo->manufacturerID, cackey_slots[slotID].pcsc_reader, bytes_to_copy); pInfo->flags = CKF_REMOVABLE_DEVICE; if (cackey_token_present(&cackey_slots[slotID]) == CACKEY_PCSC_S_TOKENPRESENT) { pInfo->flags |= CKF_TOKEN_PRESENT; } pInfo->hardwareVersion.major = (cackey_getversion() >> 16) & 0xff; pInfo->hardwareVersion.minor = (cackey_getversion() >> 8) & 0xff; |
︙ | ︙ |