Overview
Comment: | Fixed issue with threads |
---|---|
Downloads: | Tarball | ZIP archive | SQL archive |
Timelines: | family | ancestors | descendants | both | trunk |
Files: | files | file ages | folders |
SHA3-256: |
f16ee55999964e2836e319f522627c53 |
User & Date: | rkeene on 2011-06-30 00:06:09 |
Other Links: | manifest | tags |
Context
2011-06-30
| ||
00:23 | TclPKCS11 0.9.9 check-in: a049dfe777 user: rkeene tags: release-0.9.9, trunk | |
00:06 | Fixed issue with threads check-in: f16ee55999 user: rkeene tags: trunk | |
2011-06-29
| ||
23:56 | Fixed bug with finalizing Encrypt/Sign operations check-in: e7904ef06a user: rkeene tags: trunk | |
Changes
Modified tclpkcs11.c from [b28d164d97] to [d1d4644b83].
︙ | ︙ | |||
324 325 326 327 328 329 330 331 332 333 334 | *mutex = retval; return(CKR_OK); } MODULE_SCOPE CK_RV tclpkcs11_lock_mutex(void *mutex) { if (!mutex) { return(CKR_GENERAL_ERROR); } | > > > > | > > > > | > > > > | | 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 | *mutex = retval; return(CKR_OK); } MODULE_SCOPE CK_RV tclpkcs11_lock_mutex(void *mutex) { Tcl_Mutex *tcl_mutex; if (!mutex) { return(CKR_GENERAL_ERROR); } tcl_mutex = mutex; Tcl_MutexLock(tcl_mutex); return(CKR_OK); } MODULE_SCOPE CK_RV tclpkcs11_unlock_mutex(void *mutex) { Tcl_Mutex *tcl_mutex; if (!mutex) { return(CKR_GENERAL_ERROR); } tcl_mutex = mutex; Tcl_MutexUnlock(tcl_mutex); return(CKR_OK); } MODULE_SCOPE CK_RV tclpkcs11_destroy_mutex(void *mutex) { Tcl_Mutex *tcl_mutex; if (!mutex) { return(CKR_GENERAL_ERROR); } tcl_mutex = mutex; Tcl_MutexFinalize(tcl_mutex); ckfree(mutex); return(CKR_OK); } /* Convience function to start a session if one is not already active */ MODULE_SCOPE int tclpkcs11_start_session(struct tclpkcs11_handle *handle, CK_SLOT_ID slot) { |
︙ | ︙ |