Overview
| Comment: | Fixed memory leak when checking PIV certificates | 
|---|---|
| Downloads: | Tarball | ZIP archive | SQL archive | 
| Timelines: | family | ancestors | descendants | both | piv | 
| Files: | files | file ages | folders | 
| SHA1: | 
182c88b98838c1ee441e6ed9257d3551 | 
| User & Date: | rkeene on 2013-08-19 03:19:45 | 
| Other Links: | branch diff | manifest | tags | 
Context
| 
   2013-08-19 
 | ||
| 03:25 | Fixed order of processing PIN command options check-in: 0e841c8724 user: rkeene tags: piv | |
| 03:19 | Fixed memory leak when checking PIV certificates check-in: 182c88b988 user: rkeene tags: piv | |
| 
   2013-08-14 
 | ||
| 04:54 | Added support for enabling the PROTECTED_AUTHENTICATION_PATH flag for the token if a command to provide the PIN is configured check-in: 8a76f09a85 user: rkeene tags: piv | |
Changes
Modified cackey.c from [ce38432e82] to [2e881e3150].
| ︙ | |||
2449 2450 2451 2452 2453 2454 2455  | 2449 2450 2451 2452 2453 2454 2455 2456 2457 2458 2459 2460 2461 2462  | -  | 
	}
	if (!slot->slot_reset) {
		if (slot->cached_certs) {
			if (certs == NULL) {
				certs = malloc(sizeof(*certs) * slot->cached_certs_count);
				*count = slot->cached_certs_count;
 | 
| ︙ | |||
3078 3079 3080 3081 3082 3083 3084 3085 3086 3087 3088 3089 3090 3091  | 3077 3078 3079 3080 3081 3082 3083 3084 3085 3086 3087 3088 3089 3090 3091 3092  | + +  | 
				CACKEY_DEBUG_PRINTF("We recently had a PIV card, so we will attempt to authenticate using the PIV Application key reference");
				key_reference = 0x80;
				break;
			default:
				break;
		}
		cackey_free_certs(pcsc_identities, num_certs, 1);
	}
	/* Issue PIN Verify */
	send_ret = cackey_send_apdu(slot, GSCIS_CLASS_ISO7816, GSCIS_INSTR_VERIFY, 0x00, key_reference, sizeof(cac_pin), cac_pin, 0x00, &response_code, NULL, NULL);
	if (send_ret != CACKEY_PCSC_S_OK) {
		if ((response_code & 0x63C0) == 0x63C0) {
 | 
| ︙ |