Print this page
6658907 digest(1) and mac(1) could benefit from being 64-bit programs
*** 17,31 ****
* information: Portions Copyright [yyyy] [name of copyright owner]
*
* CDDL HEADER END
*/
/*
! * Copyright 2007 Sun Microsystems, Inc. All rights reserved.
* Use is subject to license terms.
*/
! #pragma ident "@(#)digest.c 1.11 07/10/04 SMI"
/*
* digest.c
*
* Implements digest(1) and mac(1) commands
--- 17,31 ----
* information: Portions Copyright [yyyy] [name of copyright owner]
*
* CDDL HEADER END
*/
/*
! * Copyright 2008 Sun Microsystems, Inc. All rights reserved.
* Use is subject to license terms.
*/
! #pragma ident "@(#)digest.c 1.12 08/03/20 SMI"
/*
* digest.c
*
* Implements digest(1) and mac(1) commands
*** 369,379 ****
CK_SESSION_HANDLE hSession = CK_INVALID_HANDLE;
CK_BYTE_PTR resultbuf = NULL;
CK_ULONG resultlen;
CK_BYTE_PTR pkeydata = NULL;
CK_OBJECT_HANDLE key = (CK_OBJECT_HANDLE) 0;
! int keylen = 0; /* key length */
char *resultstr = NULL; /* result in hex string */
int resultstrlen; /* result string length */
int i;
int exitcode = EXIT_SUCCESS; /* return code */
int slot, mek; /* index variables */
--- 369,379 ----
CK_SESSION_HANDLE hSession = CK_INVALID_HANDLE;
CK_BYTE_PTR resultbuf = NULL;
CK_ULONG resultlen;
CK_BYTE_PTR pkeydata = NULL;
CK_OBJECT_HANDLE key = (CK_OBJECT_HANDLE) 0;
! size_t keylen = 0; /* key length */
char *resultstr = NULL; /* result in hex string */
int resultstrlen; /* result string length */
int i;
int exitcode = EXIT_SUCCESS; /* return code */
int slot, mek; /* index variables */
*** 415,434 ****
!strlen(token_label)) {
token_label = pkcs11_default_token();
}
status = pkcs11_get_pass(token_label,
! (char **)&pkeydata, (size_t *)&keylen,
0, B_FALSE);
} else if (keyfile != NULL) {
/* get the key file */
status = pkcs11_read_data(keyfile,
! (void **)&pkeydata, (size_t *)&keylen);
} else {
/* get the key from input */
status = pkcs11_get_pass(NULL,
! (char **)&pkeydata, (size_t *)&keylen,
0, B_FALSE);
}
if (status == -1 || keylen == 0 || pkeydata == NULL) {
cryptoerror(LOG_STDERR,
--- 415,434 ----
!strlen(token_label)) {
token_label = pkcs11_default_token();
}
status = pkcs11_get_pass(token_label,
! (char **)&pkeydata, &keylen,
0, B_FALSE);
} else if (keyfile != NULL) {
/* get the key file */
status = pkcs11_read_data(keyfile,
! (void **)&pkeydata, &keylen);
} else {
/* get the key from input */
status = pkcs11_get_pass(NULL,
! (char **)&pkeydata, &keylen,
0, B_FALSE);
}
if (status == -1 || keylen == 0 || pkeydata == NULL) {
cryptoerror(LOG_STDERR,