Overview
| Comment: | Updated to determine subject from certificate |
|---|---|
| Downloads: | Tarball | ZIP archive | SQL archive |
| Timelines: | family | ancestors | descendants | both | trunk |
| Files: | files | file ages | folders |
| SHA1: |
5534d640e4905708adef5361fc99beba |
| User & Date: | rkeene on 2010-05-13 16:19:01 |
| Other Links: | manifest | tags |
Context
|
2010-05-13
| ||
| 18:22 | Updated to use unified return codes check-in: 123c71d946 user: rkeene tags: trunk | |
| 16:19 | Updated to determine subject from certificate check-in: 5534d640e4 user: rkeene tags: trunk | |
| 15:58 |
Updated to use certificate from identity in attribute finding
Updated to correctly pass certificate number check-in: 9b6cdd281c user: rkeene tags: trunk | |
Changes
Modified cackey.c from [2223838f44] to [cf1bec3529].
| ︙ | ︙ | |||
1515 1516 1517 1518 1519 1520 1521 |
CACKEY_DEBUG_PRINTF(" ... returning %lu (%p/%lu)", (unsigned long) *((CK_BBOOL *) pValue), pValue, (unsigned long) ulValueLen);
break;
case CKA_LABEL:
CACKEY_DEBUG_PRINTF("Requesting attribute CKA_LABEL (0x%08lx) ...", (unsigned long) curr_attr_type);
| | > > > > > > | > > | | 1515 1516 1517 1518 1519 1520 1521 1522 1523 1524 1525 1526 1527 1528 1529 1530 1531 1532 1533 1534 1535 1536 1537 1538 1539 |
CACKEY_DEBUG_PRINTF(" ... returning %lu (%p/%lu)", (unsigned long) *((CK_BBOOL *) pValue), pValue, (unsigned long) ulValueLen);
break;
case CKA_LABEL:
CACKEY_DEBUG_PRINTF("Requesting attribute CKA_LABEL (0x%08lx) ...", (unsigned long) curr_attr_type);
/* Determine name */
if (certificate_len >= 0) {
x509_read_ret = x509_to_subject(certificate, certificate_len, &pValue);
if (x509_read_ret < 0) {
pValue = NULL;
} else {
ulValueLen = x509_read_ret;
}
}
CACKEY_DEBUG_PRINTF(" ... returning (%p/%lu)", pValue, (unsigned long) ulValueLen);
break;
case CKA_VALUE:
CACKEY_DEBUG_PRINTF("Requesting attribute CKA_VALUE (0x%08lx) ...", (unsigned long) curr_attr_type);
switch (objectclass) {
case CKO_PRIVATE_KEY:
|
| ︙ | ︙ |