36 |
OPENPGP_CONTAINER_INFO Containers[] = |
OPENPGP_CONTAINER_INFO Containers[] = |
37 |
{ |
{ |
38 |
{ROLE_SIGNATURE, AT_SIGNATURE}, |
{ROLE_SIGNATURE, AT_SIGNATURE}, |
39 |
{ROLE_CONFIDENTIALITY, AT_KEYEXCHANGE}, |
{ROLE_AUTHENTICATION, AT_KEYEXCHANGE}, |
40 |
{ROLE_AUTHENTICATION, AT_SIGNATURE} |
{ROLE_AUTHENTICATION, AT_SIGNATURE} |
41 |
}; |
}; |
42 |
typedef struct _OPENPGP_SUPPORTED_SIGNATURE_ALGORITHM |
typedef struct _OPENPGP_SUPPORTED_SIGNATURE_ALGORITHM |
833 |
__leave; |
__leave; |
834 |
} |
} |
835 |
// key len |
// key len |
836 |
Attributes.wModulusLengthInBit = (unsigned short)dwBitLen * 8; |
Attributes.wModulusLengthInBit = (unsigned short)dwBitLen; |
837 |
Attributes.wExponentLengthInBit = 4 * 8; |
Attributes.wExponentLengthInBit = 4 * 8; |
838 |
Attributes.bAlgoId = 1; |
Attributes.bAlgoId = 1; |
839 |
Attributes.bFormat = 0; |
Attributes.bFormat = 0; |
1104 |
dwReturn = SCARD_E_INVALID_PARAMETER; |
dwReturn = SCARD_E_INVALID_PARAMETER; |
1105 |
__leave; |
__leave; |
1106 |
} |
} |
1107 |
|
if (pInfo->cbData > 256) |
1108 |
|
{ |
1109 |
|
Trace(WINEVENT_LEVEL_ERROR, L"Error failure pInfo->cbData = %d",pInfo->cbData); |
1110 |
|
dwReturn = SCARD_E_INVALID_PARAMETER; |
1111 |
|
__leave; |
1112 |
|
} |
1113 |
if (pInfo->dwSigningFlags & CARD_PADDING_INFO_PRESENT) |
if (pInfo->dwSigningFlags & CARD_PADDING_INFO_PRESENT) |
1114 |
{ |
{ |
1115 |
if ( pInfo->dwPaddingType == CARD_PADDING_PKCS1) |
if ( pInfo->dwPaddingType == CARD_PADDING_PKCS1) |