aboutsummaryrefslogtreecommitdiff
path: root/NitrokeyManager.cc
diff options
context:
space:
mode:
authorSzczepan Zalega <szczepan@nitrokey.com>2016-07-27 08:40:57 +0200
committerSzczepan Zalega <szczepan@nitrokey.com>2016-08-01 13:54:57 +0200
commitae8f2596895ba27539409b2399d985b2c613e2d7 (patch)
tree2ab661678c4bf838a79b0b4a4acd4942e8b34f36 /NitrokeyManager.cc
parent37d833828746b2437479123866d5c54ae78e2b14 (diff)
downloadlibnitrokey-ae8f2596895ba27539409b2399d985b2c613e2d7.tar.gz
libnitrokey-ae8f2596895ba27539409b2399d985b2c613e2d7.tar.bz2
Getting password safe data does not need admin temp
Signed-off-by: Szczepan Zalega <szczepan@nitrokey.com>
Diffstat (limited to 'NitrokeyManager.cc')
-rw-r--r--NitrokeyManager.cc6
1 files changed, 3 insertions, 3 deletions
diff --git a/NitrokeyManager.cc b/NitrokeyManager.cc
index 4446d38..31436e5 100644
--- a/NitrokeyManager.cc
+++ b/NitrokeyManager.cc
@@ -246,7 +246,7 @@ namespace nitrokey{
LockDevice::CommandTransaction::run(*device);
}
- const char *NitrokeyManager::get_password_safe_slot_name(uint8_t slot_number, const char *temporary_password) {
+ const char *NitrokeyManager::get_password_safe_slot_name(uint8_t slot_number) {
assert (is_valid_password_safe_slot_number(slot_number));
auto p = get_payload<GetPasswordSafeSlotName>();
p.slot_number = slot_number;
@@ -256,7 +256,7 @@ namespace nitrokey{
bool NitrokeyManager::is_valid_password_safe_slot_number(uint8_t slot_number) const { return slot_number < 16; }
- const char *NitrokeyManager::get_password_safe_slot_login(uint8_t slot_number, const char *temporary_password) {
+ const char *NitrokeyManager::get_password_safe_slot_login(uint8_t slot_number) {
assert (is_valid_password_safe_slot_number(slot_number));
auto p = get_payload<GetPasswordSafeSlotLogin>();
p.slot_number = slot_number;
@@ -264,7 +264,7 @@ namespace nitrokey{
return strdup((const char *) response.slot_login);
}
- const char *NitrokeyManager::get_password_safe_slot_password(uint8_t slot_number, const char *temporary_password) {
+ const char *NitrokeyManager::get_password_safe_slot_password(uint8_t slot_number) {
assert (is_valid_password_safe_slot_number(slot_number));
auto p = get_payload<GetPasswordSafeSlotPassword>();
p.slot_number = slot_number;