Overview
| Comment: | Fixed issue with C_GetMechanismList rejecting valid buffer sizes |
|---|---|
| Downloads: | Tarball | ZIP archive | SQL archive |
| Timelines: | family | ancestors | descendants | both | trunk |
| Files: | files | file ages | folders |
| SHA1: |
dbd79de2272c3010ff434fd345f17312 |
| User & Date: | rkeene on 2012-04-21 01:14:20 |
| Other Links: | manifest | tags |
Context
|
2012-04-26
| ||
| 01:10 | Updated to support an environment variable named CACKEY_NO_EXTRA_CERTS to inhibit DoD certs from being presented check-in: b9bcff12a6 user: rkeene tags: trunk | |
|
2012-04-21
| ||
| 01:14 | Fixed issue with C_GetMechanismList rejecting valid buffer sizes check-in: dbd79de227 user: rkeene tags: trunk | |
| 01:13 | Fixed issue with C_GetMechanismList reporting wrong number of mechanisms when asked check-in: 66ea8c8073 user: rkeene tags: trunk | |
Changes
Modified cackey.c from [0c1884cff7] to [e9059b3fc8].
| ︙ | ︙ | |||
3849 3850 3851 3852 3853 3854 3855 |
*pulCount = 1;
CACKEY_DEBUG_PRINTF("Returning CKR_OK (%i)", CKR_OK);
return(CKR_OK);
}
| | | 3849 3850 3851 3852 3853 3854 3855 3856 3857 3858 3859 3860 3861 3862 3863 |
*pulCount = 1;
CACKEY_DEBUG_PRINTF("Returning CKR_OK (%i)", CKR_OK);
return(CKR_OK);
}
if (*pulCount < 1) {
CACKEY_DEBUG_PRINTF("Error. Buffer too small.");
return(CKR_BUFFER_TOO_SMALL);
}
pMechanismList[0] = CKM_RSA_PKCS;
*pulCount = 1;
|
| ︙ | ︙ |