Overview
| Comment: | Updated to censor PIN in debugging output | 
|---|---|
| Downloads: | Tarball | ZIP archive | SQL archive | 
| Timelines: | family | ancestors | descendants | both | trunk | 
| Files: | files | file ages | folders | 
| SHA1: | 0233c7b5fe74bd9bcee455d5d61b61a8 | 
| User & Date: | rkeene on 2010-05-15 00:39:44 | 
| Other Links: | manifest | tags | 
Context
| 2010-05-15 | ||
| 00:48 | Renamed leakcheck tool Added documentation for leakcheck toolcheck-in: 168d86b82b user: rkeene tags: trunk | |
| 00:39 | Updated to censor PIN in debugging output check-in: 0233c7b5fe user: rkeene tags: trunk | |
| 00:34 | Added line numbers to debugging output Added overloaded debugging strdup to check for leakscheck-in: 709b50760d user: rkeene tags: trunk | |
Changes
Modified cackey.c from [e77001954d] to [e8f3ee7748].
| ︙ | ︙ | |||
| 1032 1033 1034 1035 1036 1037 1038 | 
	if (le != 0x00) {
		xmit_buf[xmit_len++] = le;
	}
	/* Begin Smartcard Transaction */
	cackey_begin_transaction(slot);
 | > > > | > | 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 | 
	if (le != 0x00) {
		xmit_buf[xmit_len++] = le;
	}
	/* Begin Smartcard Transaction */
	cackey_begin_transaction(slot);
	if (class == GSCIS_CLASS_ISO7816 && instruction == GSCIS_INSTR_VERIFY && p1 == 0x00 && p2 == 0x00) {
		CACKEY_DEBUG_PRINTF("Sending APDU: <<censored>>");
	} else {
		CACKEY_DEBUG_PRINTBUF("Sending APDU:", xmit_buf, xmit_len);
	}
	recv_len = sizeof(recv_buf);
	scard_xmit_ret = SCardTransmit(slot->pcsc_card, SCARD_PCI_T0, xmit_buf, xmit_len, SCARD_PCI_T1, recv_buf, &recv_len);
	if (scard_xmit_ret != SCARD_S_SUCCESS) {
		CACKEY_DEBUG_PRINTF("Failed to send APDU to card (SCardTransmit() = %s/%lx)", CACKEY_DEBUG_FUNC_SCARDERR_TO_STR(scard_xmit_ret), (unsigned long) scard_xmit_ret);
		CACKEY_DEBUG_PRINTF("Marking slot as having been reset");
 | 
| ︙ | ︙ |