- added comment/question

git-svn-id: https://www.opensc-project.org/svnp/opensc/trunk@648 c6295689-39f2-0310-b995-f0e70906c6a9
This commit is contained in:
okir 2002-06-13 11:20:11 +00:00
parent 85aeed256f
commit 657bfa74e0
1 changed files with 9 additions and 0 deletions

View File

@ -320,6 +320,15 @@ int sc_pkcs15_compute_signature(struct sc_pkcs15_card *p15card,
#endif
r = sc_set_security_env(p15card->card, &senv, 0);
SC_TEST_RET(ctx, r, "sc_set_security_env() failed");
/* XXX: Should we adjust outlen to match the size of
* the signature we expect? CardOS for instance will
* barf if the LE value doesn't match the size of the
* signature exactly.
*
* Right now we work around this by assuming that eToken keys
* always have algorithm RSA_PURE_SIG so the input buffer
* is padded and has the same length as the signature. --okir */
r = sc_compute_signature(p15card->card, in, inlen, out, outlen);
if (pad_flags)
memset(buf, 0, inlen);