Overview
| Comment: | Added removable device flag to slot info | 
|---|---|
| Downloads: | Tarball | ZIP archive | SQL archive | 
| Timelines: | family | ancestors | descendants | both | trunk | 
| Files: | files | file ages | folders | 
| SHA1: | b4a6b9d68580fec1b7bb8abd2c2a9b1d | 
| User & Date: | rkeene on 2010-05-17 14:55:37 | 
| Other Links: | manifest | tags | 
Context
| 2010-05-17 | ||
| 19:37 | Updated to support determining key size from X.509 object (untested) Updated to set HW TOKEN flag Updated to pad sign/decrypt message to key size (untested)check-in: a2ac84031e user: rkeene tags: trunk | |
| 14:55 | Added removable device flag to slot info check-in: b4a6b9d685 user: rkeene tags: trunk | |
| 14:44 | Updated version-script detection macro check-in: 3dee1a5953 user: rkeene tags: trunk | |
Changes
Modified cackey.c from [9bef8e6303] to [6b8855e22d].
| ︙ | ︙ | |||
| 2938 2939 2940 2941 2942 2943 2944 | 
	bytes_to_copy = strlen(cackey_slots[slotID].pcsc_reader);
	if (sizeof(pInfo->manufacturerID) < bytes_to_copy) {
		bytes_to_copy = sizeof(pInfo->manufacturerID);
	}
	memcpy(pInfo->manufacturerID, cackey_slots[slotID].pcsc_reader, bytes_to_copy);
 | | | 2938 2939 2940 2941 2942 2943 2944 2945 2946 2947 2948 2949 2950 2951 2952 | 
	bytes_to_copy = strlen(cackey_slots[slotID].pcsc_reader);
	if (sizeof(pInfo->manufacturerID) < bytes_to_copy) {
		bytes_to_copy = sizeof(pInfo->manufacturerID);
	}
	memcpy(pInfo->manufacturerID, cackey_slots[slotID].pcsc_reader, bytes_to_copy);
	pInfo->flags = CKF_REMOVABLE_DEVICE;
	if (cackey_token_present(&cackey_slots[slotID]) == CACKEY_PCSC_S_TOKENPRESENT) {
		pInfo->flags |= CKF_TOKEN_PRESENT;
	}
	pInfo->hardwareVersion.major = (cackey_getversion() >> 16) & 0xff;
	pInfo->hardwareVersion.minor = (cackey_getversion() >> 8) & 0xff;
 | 
| ︙ | ︙ |