[pkg-opensc-commit] [libp11] 37/51: Unified pointer declaration formatting
Eric Dorland
eric at moszumanska.debian.org
Wed Dec 7 17:51:33 UTC 2016
This is an automated email from the git hooks/post-receive script.
eric pushed a commit to branch master
in repository libp11.
commit 22ec41a500eea08a8a6b9b67da8209916ef598fb
Author: Michał Trojnara <Michal.Trojnara at stunnel.org>
Date: Fri Nov 25 23:07:28 2016 +0100
Unified pointer declaration formatting
---
src/eng_back.c | 2 +-
src/eng_front.c | 2 +-
src/p11_cert.c | 18 +++++++++---------
src/p11_ec.c | 6 +++---
src/p11_key.c | 30 +++++++++++++++---------------
src/p11_load.c | 13 ++++++-------
src/p11_slot.c | 32 ++++++++++++++++----------------
7 files changed, 51 insertions(+), 52 deletions(-)
diff --git a/src/eng_back.c b/src/eng_back.c
index d210f28..b0be5b3 100644
--- a/src/eng_back.c
+++ b/src/eng_back.c
@@ -565,7 +565,7 @@ static int pkcs11_login(ENGINE_CTX *ctx, PKCS11_SLOT *slot, PKCS11_TOKEN *tok,
}
static EVP_PKEY *pkcs11_load_key(ENGINE_CTX *ctx, const char *s_slot_key_id,
- UI_METHOD * ui_method, void *callback_data, int isPrivate)
+ UI_METHOD *ui_method, void *callback_data, int isPrivate)
{
PKCS11_SLOT *slot;
PKCS11_SLOT *found_slot = NULL;
diff --git a/src/eng_front.c b/src/eng_front.c
index d0ea9b1..17c6140 100644
--- a/src/eng_front.c
+++ b/src/eng_front.c
@@ -221,7 +221,7 @@ static int bind_helper(ENGINE *e)
}
}
-static int bind_fn(ENGINE * e, const char *id)
+static int bind_fn(ENGINE *e, const char *id)
{
if (id && (strcmp(id, PKCS11_ENGINE_ID) != 0)) {
fprintf(stderr, "bad engine id\n");
diff --git a/src/p11_cert.c b/src/p11_cert.c
index 9103dd7..b007a5f 100644
--- a/src/p11_cert.c
+++ b/src/p11_cert.c
@@ -27,14 +27,14 @@
static int pkcs11_find_certs(PKCS11_TOKEN *);
static int pkcs11_next_cert(PKCS11_CTX *, PKCS11_TOKEN *, CK_SESSION_HANDLE);
-static int pkcs11_init_cert(PKCS11_CTX * ctx, PKCS11_TOKEN * token,
+static int pkcs11_init_cert(PKCS11_CTX *ctx, PKCS11_TOKEN *token,
CK_SESSION_HANDLE session, CK_OBJECT_HANDLE o, PKCS11_CERT **);
/*
* Enumerate all certs on the card
*/
-int pkcs11_enumerate_certs(PKCS11_TOKEN * token,
- PKCS11_CERT ** certp, unsigned int *countp)
+int pkcs11_enumerate_certs(PKCS11_TOKEN *token,
+ PKCS11_CERT **certp, unsigned int *countp)
{
PKCS11_SLOT *slot = TOKEN2SLOT(token);
PKCS11_CTX *ctx = SLOT2CTX(slot);
@@ -65,7 +65,7 @@ int pkcs11_enumerate_certs(PKCS11_TOKEN * token,
/*
* Find certificate matching a key
*/
-PKCS11_CERT *pkcs11_find_certificate(PKCS11_KEY * key)
+PKCS11_CERT *pkcs11_find_certificate(PKCS11_KEY *key)
{
PKCS11_KEY_private *kpriv;
PKCS11_CERT_private *cpriv;
@@ -87,7 +87,7 @@ PKCS11_CERT *pkcs11_find_certificate(PKCS11_KEY * key)
/*
* Find all certs of a given type (public or private)
*/
-static int pkcs11_find_certs(PKCS11_TOKEN * token)
+static int pkcs11_find_certs(PKCS11_TOKEN *token)
{
PKCS11_SLOT *slot = TOKEN2SLOT(token);
PKCS11_CTX *ctx = SLOT2CTX(slot);
@@ -114,7 +114,7 @@ static int pkcs11_find_certs(PKCS11_TOKEN * token)
return (res < 0) ? -1 : 0;
}
-static int pkcs11_next_cert(PKCS11_CTX * ctx, PKCS11_TOKEN * token,
+static int pkcs11_next_cert(PKCS11_CTX *ctx, PKCS11_TOKEN *token,
CK_SESSION_HANDLE session)
{
CK_OBJECT_HANDLE obj;
@@ -134,7 +134,7 @@ static int pkcs11_next_cert(PKCS11_CTX * ctx, PKCS11_TOKEN * token,
return 0;
}
-static int pkcs11_init_cert(PKCS11_CTX * ctx, PKCS11_TOKEN * token,
+static int pkcs11_init_cert(PKCS11_CTX *ctx, PKCS11_TOKEN *token,
CK_SESSION_HANDLE session, CK_OBJECT_HANDLE obj, PKCS11_CERT ** ret)
{
PKCS11_TOKEN_private *tpriv;
@@ -199,7 +199,7 @@ static int pkcs11_init_cert(PKCS11_CTX * ctx, PKCS11_TOKEN * token,
/*
* Destroy all certs
*/
-void pkcs11_destroy_certs(PKCS11_TOKEN * token)
+void pkcs11_destroy_certs(PKCS11_TOKEN *token)
{
PKCS11_TOKEN_private *tpriv = PRIVTOKEN(token);
@@ -223,7 +223,7 @@ void pkcs11_destroy_certs(PKCS11_TOKEN * token)
/*
* Store certificate
*/
-int pkcs11_store_certificate(PKCS11_TOKEN * token, X509 * x509, char *label,
+int pkcs11_store_certificate(PKCS11_TOKEN *token, X509 *x509, char *label,
unsigned char *id, size_t id_len, PKCS11_CERT ** ret_cert)
{
PKCS11_SLOT *slot = TOKEN2SLOT(token);
diff --git a/src/p11_ec.c b/src/p11_ec.c
index 110ba91..f7879e7 100644
--- a/src/p11_ec.c
+++ b/src/p11_ec.c
@@ -344,9 +344,9 @@ static void pkcs11_ecdh_params_free(CK_ECDH1_DERIVE_PARAMS *parms)
*/
static int pkcs11_ecdh_derive(unsigned char **out, size_t *outlen,
const unsigned long ecdh_mechanism,
- const void * ec_params,
+ const void *ec_params,
void *outnewkey,
- PKCS11_KEY * key)
+ PKCS11_KEY *key)
{
PKCS11_SLOT *slot = KEY2SLOT(key);
PKCS11_CTX *ctx = KEY2CTX(key);
@@ -361,7 +361,7 @@ static int pkcs11_ecdh_derive(unsigned char **out, size_t *outlen,
CK_OBJECT_HANDLE newkey = CK_INVALID_HANDLE;
CK_OBJECT_CLASS newkey_class= CKO_SECRET_KEY;
CK_KEY_TYPE newkey_type = CKK_GENERIC_SECRET;
- CK_OBJECT_HANDLE * tmpnewkey = (CK_OBJECT_HANDLE *)outnewkey;
+ CK_OBJECT_HANDLE *tmpnewkey = (CK_OBJECT_HANDLE *)outnewkey;
CK_ATTRIBUTE newkey_template[] = {
{CKA_TOKEN, &false, sizeof(false)}, /* session only object */
{CKA_CLASS, &newkey_class, sizeof(newkey_class)},
diff --git a/src/p11_key.c b/src/p11_key.c
index 65667c2..a6090d7 100644
--- a/src/p11_key.c
+++ b/src/p11_key.c
@@ -30,9 +30,9 @@
#define MAX_PIN_LENGTH 32
static int pkcs11_find_keys(PKCS11_TOKEN *, unsigned int);
-static int pkcs11_next_key(PKCS11_CTX * ctx, PKCS11_TOKEN * token,
+static int pkcs11_next_key(PKCS11_CTX *ctx, PKCS11_TOKEN *token,
CK_SESSION_HANDLE session, CK_OBJECT_CLASS type);
-static int pkcs11_init_key(PKCS11_CTX * ctx, PKCS11_TOKEN * token,
+static int pkcs11_init_key(PKCS11_CTX *ctx, PKCS11_TOKEN *token,
CK_SESSION_HANDLE session, CK_OBJECT_HANDLE o,
CK_OBJECT_CLASS type, PKCS11_KEY **);
static int pkcs11_store_key(PKCS11_TOKEN *, EVP_PKEY *, unsigned int,
@@ -75,7 +75,7 @@ PKCS11_KEY *pkcs11_find_key(PKCS11_CERT *cert)
/*
* Find key matching a key of the other type (public vs private)
*/
-PKCS11_KEY *pkcs11_find_key_from_key(PKCS11_KEY * keyin)
+PKCS11_KEY *pkcs11_find_key_from_key(PKCS11_KEY *keyin)
{
PKCS11_KEY_private *kinpriv = PRIVKEY(keyin);
PKCS11_KEY *keys;
@@ -96,7 +96,7 @@ PKCS11_KEY *pkcs11_find_key_from_key(PKCS11_KEY * keyin)
/*
* Reopens the object associated with the key
*/
-int pkcs11_reload_key(PKCS11_KEY * key)
+int pkcs11_reload_key(PKCS11_KEY *key)
{
PKCS11_KEY_private *kpriv = PRIVKEY(key);
PKCS11_SLOT *slot = KEY2SLOT(key);
@@ -131,7 +131,7 @@ int pkcs11_reload_key(PKCS11_KEY * key)
* FIXME: We should check first whether the token supports
* on-board key generation, and if it does, use its own algorithm
*/
-int pkcs11_generate_key(PKCS11_TOKEN * token, int algorithm, unsigned int bits,
+int pkcs11_generate_key(PKCS11_TOKEN *token, int algorithm, unsigned int bits,
char *label, unsigned char* id, size_t id_len)
{
PKCS11_KEY *key_obj;
@@ -193,7 +193,7 @@ int pkcs11_generate_key(PKCS11_TOKEN * token, int algorithm, unsigned int bits,
/*
* Store a private key on the token
*/
-int pkcs11_store_private_key(PKCS11_TOKEN * token, EVP_PKEY * pk,
+int pkcs11_store_private_key(PKCS11_TOKEN *token, EVP_PKEY *pk,
char *label, unsigned char *id, size_t id_len)
{
if (pkcs11_store_key(token, pk, CKO_PRIVATE_KEY, label, id, id_len, NULL))
@@ -201,7 +201,7 @@ int pkcs11_store_private_key(PKCS11_TOKEN * token, EVP_PKEY * pk,
return 0;
}
-int pkcs11_store_public_key(PKCS11_TOKEN * token, EVP_PKEY * pk,
+int pkcs11_store_public_key(PKCS11_TOKEN *token, EVP_PKEY *pk,
char *label, unsigned char *id, size_t id_len)
{
if (pkcs11_store_key(token, pk, CKO_PUBLIC_KEY, label, id, id_len, NULL))
@@ -212,7 +212,7 @@ int pkcs11_store_public_key(PKCS11_TOKEN * token, EVP_PKEY * pk,
/*
* Store private key
*/
-static int pkcs11_store_key(PKCS11_TOKEN * token, EVP_PKEY * pk,
+static int pkcs11_store_key(PKCS11_TOKEN *token, EVP_PKEY *pk,
unsigned int type, char *label, unsigned char *id, size_t id_len,
PKCS11_KEY ** ret_key)
{
@@ -296,7 +296,7 @@ static int pkcs11_store_key(PKCS11_TOKEN * token, EVP_PKEY * pk,
/*
* Get the key type
*/
-int pkcs11_get_key_type(PKCS11_KEY * key)
+int pkcs11_get_key_type(PKCS11_KEY *key)
{
PKCS11_KEY_private *kpriv = PRIVKEY(key);
@@ -384,8 +384,8 @@ int pkcs11_authenticate(PKCS11_KEY *key)
* Return keys of a given type (public or private)
* Use the cached values if available
*/
-int pkcs11_enumerate_keys(PKCS11_TOKEN * token, unsigned int type,
- PKCS11_KEY ** keyp, unsigned int * countp)
+int pkcs11_enumerate_keys(PKCS11_TOKEN *token, unsigned int type,
+ PKCS11_KEY ** keyp, unsigned int *countp)
{
PKCS11_SLOT *slot = TOKEN2SLOT(token);
PKCS11_CTX *ctx = TOKEN2CTX(token);
@@ -417,7 +417,7 @@ int pkcs11_enumerate_keys(PKCS11_TOKEN * token, unsigned int type,
/*
* Find all keys of a given type (public or private)
*/
-static int pkcs11_find_keys(PKCS11_TOKEN * token, unsigned int type)
+static int pkcs11_find_keys(PKCS11_TOKEN *token, unsigned int type)
{
PKCS11_SLOT *slot = TOKEN2SLOT(token);
PKCS11_CTX *ctx = TOKEN2CTX(token);
@@ -446,7 +446,7 @@ static int pkcs11_find_keys(PKCS11_TOKEN * token, unsigned int type)
return (res < 0) ? -1 : 0;
}
-static int pkcs11_next_key(PKCS11_CTX * ctx, PKCS11_TOKEN * token,
+static int pkcs11_next_key(PKCS11_CTX *ctx, PKCS11_TOKEN *token,
CK_SESSION_HANDLE session, CK_OBJECT_CLASS type)
{
CK_OBJECT_HANDLE obj;
@@ -466,7 +466,7 @@ static int pkcs11_next_key(PKCS11_CTX * ctx, PKCS11_TOKEN * token,
return 0;
}
-static int pkcs11_init_key(PKCS11_CTX * ctx, PKCS11_TOKEN * token,
+static int pkcs11_init_key(PKCS11_CTX *ctx, PKCS11_TOKEN *token,
CK_SESSION_HANDLE session, CK_OBJECT_HANDLE obj,
CK_OBJECT_CLASS type, PKCS11_KEY ** ret)
{
@@ -536,7 +536,7 @@ static int pkcs11_init_key(PKCS11_CTX * ctx, PKCS11_TOKEN * token,
/*
* Destroy all keys of a given type (public or private)
*/
-void pkcs11_destroy_keys(PKCS11_TOKEN * token, unsigned int type)
+void pkcs11_destroy_keys(PKCS11_TOKEN *token, unsigned int type)
{
PKCS11_TOKEN_private *tpriv = PRIVTOKEN(token);
PKCS11_keys *keys = (type == CKO_PRIVATE_KEY) ? &tpriv->prv : &tpriv->pub;
diff --git a/src/p11_load.c b/src/p11_load.c
index a914588..30e563f 100644
--- a/src/p11_load.c
+++ b/src/p11_load.c
@@ -52,7 +52,7 @@ fail:
/*
* Set private init args for module
*/
-void pkcs11_CTX_init_args(PKCS11_CTX * ctx, const char *init_args)
+void pkcs11_CTX_init_args(PKCS11_CTX *ctx, const char *init_args)
{
PKCS11_CTX_private *cpriv = PRIVCTX(ctx);
/* Free previously duplicated string */
@@ -65,7 +65,7 @@ void pkcs11_CTX_init_args(PKCS11_CTX * ctx, const char *init_args)
/*
* Load the shared library, and initialize it.
*/
-int pkcs11_CTX_load(PKCS11_CTX * ctx, const char *name)
+int pkcs11_CTX_load(PKCS11_CTX *ctx, const char *name)
{
PKCS11_CTX_private *cpriv = PRIVCTX(ctx);
CK_C_INITIALIZE_ARGS args;
@@ -102,7 +102,7 @@ int pkcs11_CTX_load(PKCS11_CTX * ctx, const char *name)
/*
* Reinitialize (e.g., after a fork).
*/
-int pkcs11_CTX_reload(PKCS11_CTX * ctx)
+int pkcs11_CTX_reload(PKCS11_CTX *ctx)
{
PKCS11_CTX_private *cpriv = PRIVCTX(ctx);
CK_C_INITIALIZE_ARGS _args;
@@ -131,10 +131,9 @@ int pkcs11_CTX_reload(PKCS11_CTX * ctx)
/*
* Unload the shared library
*/
-void pkcs11_CTX_unload(PKCS11_CTX * ctx)
+void pkcs11_CTX_unload(PKCS11_CTX *ctx)
{
- PKCS11_CTX_private *cpriv;
- cpriv = PRIVCTX(ctx);
+ PKCS11_CTX_private *cpriv = PRIVCTX(ctx);
/* Tell the PKCS11 library to shut down */
if (cpriv->forkid == _P11_get_forkid())
@@ -147,7 +146,7 @@ void pkcs11_CTX_unload(PKCS11_CTX * ctx)
/*
* Free a context
*/
-void pkcs11_CTX_free(PKCS11_CTX * ctx)
+void pkcs11_CTX_free(PKCS11_CTX *ctx)
{
PKCS11_CTX_private *cpriv = PRIVCTX(ctx);
diff --git a/src/p11_slot.c b/src/p11_slot.c
index 1fe40ab..f907469 100644
--- a/src/p11_slot.c
+++ b/src/p11_slot.c
@@ -37,7 +37,7 @@ unsigned long pkcs11_get_slotid_from_slot(PKCS11_SLOT *slot)
/*
* Enumerate slots
*/
-int pkcs11_enumerate_slots(PKCS11_CTX * ctx, PKCS11_SLOT ** slotp, unsigned int *countp)
+int pkcs11_enumerate_slots(PKCS11_CTX *ctx, PKCS11_SLOT **slotp, unsigned int *countp)
{
PKCS11_CTX_private *cpriv = PRIVCTX(ctx);
CK_SLOT_ID *slotid;
@@ -82,7 +82,7 @@ int pkcs11_enumerate_slots(PKCS11_CTX * ctx, PKCS11_SLOT ** slotp, unsigned int
/*
* Find a slot with a token that looks "valuable"
*/
-PKCS11_SLOT *pkcs11_find_token(PKCS11_CTX * ctx, PKCS11_SLOT * slots, unsigned int nslots)
+PKCS11_SLOT *pkcs11_find_token(PKCS11_CTX *ctx, PKCS11_SLOT *slots, unsigned int nslots)
{
PKCS11_SLOT *slot, *best;
PKCS11_TOKEN *tok;
@@ -109,7 +109,7 @@ PKCS11_SLOT *pkcs11_find_token(PKCS11_CTX * ctx, PKCS11_SLOT * slots, unsigned
/*
* Open a session with this slot
*/
-int pkcs11_open_session(PKCS11_SLOT * slot, int rw, int relogin)
+int pkcs11_open_session(PKCS11_SLOT *slot, int rw, int relogin)
{
PKCS11_SLOT_private *spriv = PRIVSLOT(slot);
PKCS11_CTX *ctx = SLOT2CTX(slot);
@@ -132,7 +132,7 @@ int pkcs11_open_session(PKCS11_SLOT * slot, int rw, int relogin)
return 0;
}
-int pkcs11_reopen_session(PKCS11_SLOT * slot)
+int pkcs11_reopen_session(PKCS11_SLOT *slot)
{
PKCS11_SLOT_private *spriv = PRIVSLOT(slot);
PKCS11_CTX *ctx = SLOT2CTX(slot);
@@ -151,7 +151,7 @@ int pkcs11_reopen_session(PKCS11_SLOT * slot)
/*
* Determines if user is authenticated with token
*/
-int pkcs11_is_logged_in(PKCS11_SLOT * slot, int so, int * res)
+int pkcs11_is_logged_in(PKCS11_SLOT *slot, int so, int *res)
{
PKCS11_CTX *ctx = SLOT2CTX(slot);
PKCS11_SLOT_private *spriv = PRIVSLOT(slot);
@@ -183,7 +183,7 @@ int pkcs11_is_logged_in(PKCS11_SLOT * slot, int so, int * res)
* Authenticate with the card. relogin should be set if we automatically
* relogin after a fork.
*/
-int pkcs11_login(PKCS11_SLOT * slot, int so, const char *pin, int relogin)
+int pkcs11_login(PKCS11_SLOT *slot, int so, const char *pin, int relogin)
{
PKCS11_CTX *ctx = SLOT2CTX(slot);
PKCS11_SLOT_private *spriv = PRIVSLOT(slot);
@@ -231,7 +231,7 @@ int pkcs11_login(PKCS11_SLOT * slot, int so, const char *pin, int relogin)
/*
* Authenticate with the card
*/
-int pkcs11_relogin(PKCS11_SLOT * slot)
+int pkcs11_relogin(PKCS11_SLOT *slot)
{
PKCS11_SLOT_private *spriv = PRIVSLOT(slot);
@@ -241,7 +241,7 @@ int pkcs11_relogin(PKCS11_SLOT * slot)
/*
* Log out
*/
-int pkcs11_logout(PKCS11_SLOT * slot)
+int pkcs11_logout(PKCS11_SLOT *slot)
{
PKCS11_CTX *ctx = SLOT2CTX(slot);
PKCS11_SLOT_private *spriv = PRIVSLOT(slot);
@@ -268,7 +268,7 @@ int pkcs11_logout(PKCS11_SLOT * slot)
/*
* Initialize the token
*/
-int pkcs11_init_token(PKCS11_TOKEN * token, const char *pin, const char *label)
+int pkcs11_init_token(PKCS11_TOKEN *token, const char *pin, const char *label)
{
PKCS11_SLOT *slot = TOKEN2SLOT(token);
PKCS11_CTX *ctx = SLOT2CTX(slot);
@@ -299,7 +299,7 @@ int pkcs11_init_token(PKCS11_TOKEN * token, const char *pin, const char *label)
/*
* Set the User PIN
*/
-int pkcs11_init_pin(PKCS11_TOKEN * token, const char *pin)
+int pkcs11_init_pin(PKCS11_TOKEN *token, const char *pin)
{
PKCS11_SLOT *slot = TOKEN2SLOT(token);
PKCS11_CTX *ctx = SLOT2CTX(slot);
@@ -321,7 +321,7 @@ int pkcs11_init_pin(PKCS11_TOKEN * token, const char *pin)
/*
* Change the User PIN
*/
-int pkcs11_change_pin(PKCS11_SLOT * slot, const char *old_pin,
+int pkcs11_change_pin(PKCS11_SLOT *slot, const char *old_pin,
const char *new_pin)
{
PKCS11_CTX *ctx = SLOT2CTX(slot);
@@ -390,7 +390,7 @@ int pkcs11_generate_random(PKCS11_SLOT *slot, unsigned char *r,
/*
* Helper functions
*/
-static int pkcs11_init_slot(PKCS11_CTX * ctx, PKCS11_SLOT * slot, CK_SLOT_ID id)
+static int pkcs11_init_slot(PKCS11_CTX *ctx, PKCS11_SLOT *slot, CK_SLOT_ID id)
{
PKCS11_SLOT_private *spriv;
CK_SLOT_INFO info;
@@ -423,7 +423,7 @@ static int pkcs11_init_slot(PKCS11_CTX * ctx, PKCS11_SLOT * slot, CK_SLOT_ID id)
return 0;
}
-void pkcs11_release_all_slots(PKCS11_CTX * ctx, PKCS11_SLOT *slots, unsigned int nslots)
+void pkcs11_release_all_slots(PKCS11_CTX *ctx, PKCS11_SLOT *slots, unsigned int nslots)
{
unsigned int i;
@@ -432,7 +432,7 @@ void pkcs11_release_all_slots(PKCS11_CTX * ctx, PKCS11_SLOT *slots, unsigned in
OPENSSL_free(slots);
}
-void pkcs11_release_slot(PKCS11_CTX * ctx, PKCS11_SLOT * slot)
+void pkcs11_release_slot(PKCS11_CTX *ctx, PKCS11_SLOT *slot)
{
PKCS11_SLOT_private *spriv = PRIVSLOT(slot);
@@ -455,7 +455,7 @@ void pkcs11_release_slot(PKCS11_CTX * ctx, PKCS11_SLOT * slot)
memset(slot, 0, sizeof(*slot));
}
-static int pkcs11_check_token(PKCS11_CTX * ctx, PKCS11_SLOT * slot)
+static int pkcs11_check_token(PKCS11_CTX *ctx, PKCS11_SLOT *slot)
{
PKCS11_SLOT_private *spriv = PRIVSLOT(slot);
PKCS11_TOKEN_private *tpriv;
@@ -514,7 +514,7 @@ static int pkcs11_check_token(PKCS11_CTX * ctx, PKCS11_SLOT * slot)
return 0;
}
-static void pkcs11_destroy_token(PKCS11_TOKEN * token)
+static void pkcs11_destroy_token(PKCS11_TOKEN *token)
{
pkcs11_destroy_keys(token, CKO_PRIVATE_KEY);
pkcs11_destroy_keys(token, CKO_PUBLIC_KEY);
--
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/pkg-opensc/libp11.git
More information about the pkg-opensc-commit
mailing list