Overview
Comment: | Removed extraneous code |
---|---|
Downloads: | Tarball | ZIP archive | SQL archive |
Timelines: | family | ancestors | descendants | both | trunk |
Files: | files | file ages | folders |
SHA1: | 47251b740c83ba23a551157af92e49d45d2dd426 |
User & Date: | rkeene on 2015-03-05 16:09:51 |
Other Links: | manifest | tags |
Context
2015-03-05
| ||
16:20 | Updated ignores to ignore downloaded certificates and test driver check-in: d36685d176 user: rkeene tags: trunk | |
16:09 | Removed extraneous code check-in: 47251b740c user: rkeene tags: trunk | |
16:06 | Updated to deal with reading impossibly small TLV buffers sanely check-in: 614742ca67 user: rkeene tags: trunk | |
Changes
Modified cackey.c from [f036f2ae53] to [6ee4372cd9].
2959 2959 CACKEY_DEBUG_PRINTF("Security status not satisified (respcode = 0x%04x). Returning NEEDLOGIN", (int) respcode); 2960 2960 } 2961 2961 2962 2962 cackey_mark_slot_reset(slot); 2963 2963 2964 2964 slot->token_flags = CKF_LOGIN_REQUIRED; 2965 2965 2966 - return(CACKEY_PCSC_E_NEEDLOGIN); 2967 - } 2968 - 2969 - if (respcode == 0x6E00) { 2970 - CACKEY_DEBUG_PRINTF("Got \"WRONG CLASS\", this means we are talking to the wrong object (likely because the card went away) -- resetting"); 2971 - 2972 - cackey_mark_slot_reset(slot); 2973 - 2974 2966 return(CACKEY_PCSC_E_NEEDLOGIN); 2975 2967 } 2976 2968 2977 2969 if (send_ret == CACKEY_PCSC_E_TOKENABSENT) { 2978 2970 CACKEY_DEBUG_PRINTF("Token absent. Returning TOKENABSENT"); 2979 2971 2980 2972 cackey_mark_slot_reset(slot);