[pkg-opensc-commit] [libp11] 37/51: Unified pointer declaration formatting

Eric Dorland eric at moszumanska.debian.org
Wed Dec 7 17:51:33 UTC 2016


This is an automated email from the git hooks/post-receive script.

eric pushed a commit to branch master
in repository libp11.

commit 22ec41a500eea08a8a6b9b67da8209916ef598fb
Author: Michał Trojnara <Michal.Trojnara at stunnel.org>
Date:   Fri Nov 25 23:07:28 2016 +0100

    Unified pointer declaration formatting
---
 src/eng_back.c  |  2 +-
 src/eng_front.c |  2 +-
 src/p11_cert.c  | 18 +++++++++---------
 src/p11_ec.c    |  6 +++---
 src/p11_key.c   | 30 +++++++++++++++---------------
 src/p11_load.c  | 13 ++++++-------
 src/p11_slot.c  | 32 ++++++++++++++++----------------
 7 files changed, 51 insertions(+), 52 deletions(-)

diff --git a/src/eng_back.c b/src/eng_back.c
index d210f28..b0be5b3 100644
--- a/src/eng_back.c
+++ b/src/eng_back.c
@@ -565,7 +565,7 @@ static int pkcs11_login(ENGINE_CTX *ctx, PKCS11_SLOT *slot, PKCS11_TOKEN *tok,
 }
 
 static EVP_PKEY *pkcs11_load_key(ENGINE_CTX *ctx, const char *s_slot_key_id,
-		UI_METHOD * ui_method, void *callback_data, int isPrivate)
+		UI_METHOD *ui_method, void *callback_data, int isPrivate)
 {
 	PKCS11_SLOT *slot;
 	PKCS11_SLOT *found_slot = NULL;
diff --git a/src/eng_front.c b/src/eng_front.c
index d0ea9b1..17c6140 100644
--- a/src/eng_front.c
+++ b/src/eng_front.c
@@ -221,7 +221,7 @@ static int bind_helper(ENGINE *e)
 	}
 }
 
-static int bind_fn(ENGINE * e, const char *id)
+static int bind_fn(ENGINE *e, const char *id)
 {
 	if (id && (strcmp(id, PKCS11_ENGINE_ID) != 0)) {
 		fprintf(stderr, "bad engine id\n");
diff --git a/src/p11_cert.c b/src/p11_cert.c
index 9103dd7..b007a5f 100644
--- a/src/p11_cert.c
+++ b/src/p11_cert.c
@@ -27,14 +27,14 @@
 
 static int pkcs11_find_certs(PKCS11_TOKEN *);
 static int pkcs11_next_cert(PKCS11_CTX *, PKCS11_TOKEN *, CK_SESSION_HANDLE);
-static int pkcs11_init_cert(PKCS11_CTX * ctx, PKCS11_TOKEN * token,
+static int pkcs11_init_cert(PKCS11_CTX *ctx, PKCS11_TOKEN *token,
 	CK_SESSION_HANDLE session, CK_OBJECT_HANDLE o, PKCS11_CERT **);
 
 /*
  * Enumerate all certs on the card
  */
-int pkcs11_enumerate_certs(PKCS11_TOKEN * token,
-		PKCS11_CERT ** certp, unsigned int *countp)
+int pkcs11_enumerate_certs(PKCS11_TOKEN *token,
+		PKCS11_CERT **certp, unsigned int *countp)
 {
 	PKCS11_SLOT *slot = TOKEN2SLOT(token);
 	PKCS11_CTX *ctx = SLOT2CTX(slot);
@@ -65,7 +65,7 @@ int pkcs11_enumerate_certs(PKCS11_TOKEN * token,
 /*
  * Find certificate matching a key
  */
-PKCS11_CERT *pkcs11_find_certificate(PKCS11_KEY * key)
+PKCS11_CERT *pkcs11_find_certificate(PKCS11_KEY *key)
 {
 	PKCS11_KEY_private *kpriv;
 	PKCS11_CERT_private *cpriv;
@@ -87,7 +87,7 @@ PKCS11_CERT *pkcs11_find_certificate(PKCS11_KEY * key)
 /*
  * Find all certs of a given type (public or private)
  */
-static int pkcs11_find_certs(PKCS11_TOKEN * token)
+static int pkcs11_find_certs(PKCS11_TOKEN *token)
 {
 	PKCS11_SLOT *slot = TOKEN2SLOT(token);
 	PKCS11_CTX *ctx = SLOT2CTX(slot);
@@ -114,7 +114,7 @@ static int pkcs11_find_certs(PKCS11_TOKEN * token)
 	return (res < 0) ? -1 : 0;
 }
 
-static int pkcs11_next_cert(PKCS11_CTX * ctx, PKCS11_TOKEN * token,
+static int pkcs11_next_cert(PKCS11_CTX *ctx, PKCS11_TOKEN *token,
 		CK_SESSION_HANDLE session)
 {
 	CK_OBJECT_HANDLE obj;
@@ -134,7 +134,7 @@ static int pkcs11_next_cert(PKCS11_CTX * ctx, PKCS11_TOKEN * token,
 	return 0;
 }
 
-static int pkcs11_init_cert(PKCS11_CTX * ctx, PKCS11_TOKEN * token,
+static int pkcs11_init_cert(PKCS11_CTX *ctx, PKCS11_TOKEN *token,
 		CK_SESSION_HANDLE session, CK_OBJECT_HANDLE obj, PKCS11_CERT ** ret)
 {
 	PKCS11_TOKEN_private *tpriv;
@@ -199,7 +199,7 @@ static int pkcs11_init_cert(PKCS11_CTX * ctx, PKCS11_TOKEN * token,
 /*
  * Destroy all certs
  */
-void pkcs11_destroy_certs(PKCS11_TOKEN * token)
+void pkcs11_destroy_certs(PKCS11_TOKEN *token)
 {
 	PKCS11_TOKEN_private *tpriv = PRIVTOKEN(token);
 
@@ -223,7 +223,7 @@ void pkcs11_destroy_certs(PKCS11_TOKEN * token)
 /*
  * Store certificate
  */
-int pkcs11_store_certificate(PKCS11_TOKEN * token, X509 * x509, char *label,
+int pkcs11_store_certificate(PKCS11_TOKEN *token, X509 *x509, char *label,
 		unsigned char *id, size_t id_len, PKCS11_CERT ** ret_cert)
 {
 	PKCS11_SLOT *slot = TOKEN2SLOT(token);
diff --git a/src/p11_ec.c b/src/p11_ec.c
index 110ba91..f7879e7 100644
--- a/src/p11_ec.c
+++ b/src/p11_ec.c
@@ -344,9 +344,9 @@ static void pkcs11_ecdh_params_free(CK_ECDH1_DERIVE_PARAMS *parms)
  */
 static int pkcs11_ecdh_derive(unsigned char **out, size_t *outlen,
 		const unsigned long ecdh_mechanism,
-		const void * ec_params,
+		const void *ec_params,
 		void *outnewkey,
-		PKCS11_KEY * key)
+		PKCS11_KEY *key)
 {
 	PKCS11_SLOT *slot = KEY2SLOT(key);
 	PKCS11_CTX *ctx = KEY2CTX(key);
@@ -361,7 +361,7 @@ static int pkcs11_ecdh_derive(unsigned char **out, size_t *outlen,
 	CK_OBJECT_HANDLE newkey = CK_INVALID_HANDLE;
 	CK_OBJECT_CLASS newkey_class= CKO_SECRET_KEY;
 	CK_KEY_TYPE newkey_type = CKK_GENERIC_SECRET;
-	CK_OBJECT_HANDLE * tmpnewkey = (CK_OBJECT_HANDLE *)outnewkey;
+	CK_OBJECT_HANDLE *tmpnewkey = (CK_OBJECT_HANDLE *)outnewkey;
 	CK_ATTRIBUTE newkey_template[] = {
 		{CKA_TOKEN, &false, sizeof(false)}, /* session only object */
 		{CKA_CLASS, &newkey_class, sizeof(newkey_class)},
diff --git a/src/p11_key.c b/src/p11_key.c
index 65667c2..a6090d7 100644
--- a/src/p11_key.c
+++ b/src/p11_key.c
@@ -30,9 +30,9 @@
 #define MAX_PIN_LENGTH   32
 
 static int pkcs11_find_keys(PKCS11_TOKEN *, unsigned int);
-static int pkcs11_next_key(PKCS11_CTX * ctx, PKCS11_TOKEN * token,
+static int pkcs11_next_key(PKCS11_CTX *ctx, PKCS11_TOKEN *token,
 	CK_SESSION_HANDLE session, CK_OBJECT_CLASS type);
-static int pkcs11_init_key(PKCS11_CTX * ctx, PKCS11_TOKEN * token,
+static int pkcs11_init_key(PKCS11_CTX *ctx, PKCS11_TOKEN *token,
 	CK_SESSION_HANDLE session, CK_OBJECT_HANDLE o,
 	CK_OBJECT_CLASS type, PKCS11_KEY **);
 static int pkcs11_store_key(PKCS11_TOKEN *, EVP_PKEY *, unsigned int,
@@ -75,7 +75,7 @@ PKCS11_KEY *pkcs11_find_key(PKCS11_CERT *cert)
 /*
  * Find key matching a key of the other type (public vs private)
  */
-PKCS11_KEY *pkcs11_find_key_from_key(PKCS11_KEY * keyin)
+PKCS11_KEY *pkcs11_find_key_from_key(PKCS11_KEY *keyin)
 {
 	PKCS11_KEY_private *kinpriv = PRIVKEY(keyin);
 	PKCS11_KEY *keys;
@@ -96,7 +96,7 @@ PKCS11_KEY *pkcs11_find_key_from_key(PKCS11_KEY * keyin)
 /*
  * Reopens the object associated with the key
  */
-int pkcs11_reload_key(PKCS11_KEY * key)
+int pkcs11_reload_key(PKCS11_KEY *key)
 {
 	PKCS11_KEY_private *kpriv = PRIVKEY(key);
 	PKCS11_SLOT *slot = KEY2SLOT(key);
@@ -131,7 +131,7 @@ int pkcs11_reload_key(PKCS11_KEY * key)
  * FIXME: We should check first whether the token supports
  * on-board key generation, and if it does, use its own algorithm
  */
-int pkcs11_generate_key(PKCS11_TOKEN * token, int algorithm, unsigned int bits,
+int pkcs11_generate_key(PKCS11_TOKEN *token, int algorithm, unsigned int bits,
 		char *label, unsigned char* id, size_t id_len)
 {
 	PKCS11_KEY *key_obj;
@@ -193,7 +193,7 @@ int pkcs11_generate_key(PKCS11_TOKEN * token, int algorithm, unsigned int bits,
 /*
  * Store a private key on the token
  */
-int pkcs11_store_private_key(PKCS11_TOKEN * token, EVP_PKEY * pk,
+int pkcs11_store_private_key(PKCS11_TOKEN *token, EVP_PKEY *pk,
 		char *label, unsigned char *id, size_t id_len)
 {
 	if (pkcs11_store_key(token, pk, CKO_PRIVATE_KEY, label, id, id_len, NULL))
@@ -201,7 +201,7 @@ int pkcs11_store_private_key(PKCS11_TOKEN * token, EVP_PKEY * pk,
 	return 0;
 }
 
-int pkcs11_store_public_key(PKCS11_TOKEN * token, EVP_PKEY * pk,
+int pkcs11_store_public_key(PKCS11_TOKEN *token, EVP_PKEY *pk,
 		char *label, unsigned char *id, size_t id_len)
 {
 	if (pkcs11_store_key(token, pk, CKO_PUBLIC_KEY, label, id, id_len, NULL))
@@ -212,7 +212,7 @@ int pkcs11_store_public_key(PKCS11_TOKEN * token, EVP_PKEY * pk,
 /*
  * Store private key
  */
-static int pkcs11_store_key(PKCS11_TOKEN * token, EVP_PKEY * pk,
+static int pkcs11_store_key(PKCS11_TOKEN *token, EVP_PKEY *pk,
 		unsigned int type, char *label, unsigned char *id, size_t id_len,
 		PKCS11_KEY ** ret_key)
 {
@@ -296,7 +296,7 @@ static int pkcs11_store_key(PKCS11_TOKEN * token, EVP_PKEY * pk,
 /*
  * Get the key type
  */
-int pkcs11_get_key_type(PKCS11_KEY * key)
+int pkcs11_get_key_type(PKCS11_KEY *key)
 {
 	PKCS11_KEY_private *kpriv = PRIVKEY(key);
 
@@ -384,8 +384,8 @@ int pkcs11_authenticate(PKCS11_KEY *key)
  * Return keys of a given type (public or private)
  * Use the cached values if available
  */
-int pkcs11_enumerate_keys(PKCS11_TOKEN * token, unsigned int type,
-		PKCS11_KEY ** keyp, unsigned int * countp)
+int pkcs11_enumerate_keys(PKCS11_TOKEN *token, unsigned int type,
+		PKCS11_KEY ** keyp, unsigned int *countp)
 {
 	PKCS11_SLOT *slot = TOKEN2SLOT(token);
 	PKCS11_CTX *ctx = TOKEN2CTX(token);
@@ -417,7 +417,7 @@ int pkcs11_enumerate_keys(PKCS11_TOKEN * token, unsigned int type,
 /*
  * Find all keys of a given type (public or private)
  */
-static int pkcs11_find_keys(PKCS11_TOKEN * token, unsigned int type)
+static int pkcs11_find_keys(PKCS11_TOKEN *token, unsigned int type)
 {
 	PKCS11_SLOT *slot = TOKEN2SLOT(token);
 	PKCS11_CTX *ctx = TOKEN2CTX(token);
@@ -446,7 +446,7 @@ static int pkcs11_find_keys(PKCS11_TOKEN * token, unsigned int type)
 	return (res < 0) ? -1 : 0;
 }
 
-static int pkcs11_next_key(PKCS11_CTX * ctx, PKCS11_TOKEN * token,
+static int pkcs11_next_key(PKCS11_CTX *ctx, PKCS11_TOKEN *token,
 		CK_SESSION_HANDLE session, CK_OBJECT_CLASS type)
 {
 	CK_OBJECT_HANDLE obj;
@@ -466,7 +466,7 @@ static int pkcs11_next_key(PKCS11_CTX * ctx, PKCS11_TOKEN * token,
 	return 0;
 }
 
-static int pkcs11_init_key(PKCS11_CTX * ctx, PKCS11_TOKEN * token,
+static int pkcs11_init_key(PKCS11_CTX *ctx, PKCS11_TOKEN *token,
 		CK_SESSION_HANDLE session, CK_OBJECT_HANDLE obj,
 		CK_OBJECT_CLASS type, PKCS11_KEY ** ret)
 {
@@ -536,7 +536,7 @@ static int pkcs11_init_key(PKCS11_CTX * ctx, PKCS11_TOKEN * token,
 /*
  * Destroy all keys of a given type (public or private)
  */
-void pkcs11_destroy_keys(PKCS11_TOKEN * token, unsigned int type)
+void pkcs11_destroy_keys(PKCS11_TOKEN *token, unsigned int type)
 {
 	PKCS11_TOKEN_private *tpriv = PRIVTOKEN(token);
 	PKCS11_keys *keys = (type == CKO_PRIVATE_KEY) ? &tpriv->prv : &tpriv->pub;
diff --git a/src/p11_load.c b/src/p11_load.c
index a914588..30e563f 100644
--- a/src/p11_load.c
+++ b/src/p11_load.c
@@ -52,7 +52,7 @@ fail:
 /*
  * Set private init args for module
  */
-void pkcs11_CTX_init_args(PKCS11_CTX * ctx, const char *init_args)
+void pkcs11_CTX_init_args(PKCS11_CTX *ctx, const char *init_args)
 {
 	PKCS11_CTX_private *cpriv = PRIVCTX(ctx);
 	/* Free previously duplicated string */
@@ -65,7 +65,7 @@ void pkcs11_CTX_init_args(PKCS11_CTX * ctx, const char *init_args)
 /*
  * Load the shared library, and initialize it.
  */
-int pkcs11_CTX_load(PKCS11_CTX * ctx, const char *name)
+int pkcs11_CTX_load(PKCS11_CTX *ctx, const char *name)
 {
 	PKCS11_CTX_private *cpriv = PRIVCTX(ctx);
 	CK_C_INITIALIZE_ARGS args;
@@ -102,7 +102,7 @@ int pkcs11_CTX_load(PKCS11_CTX * ctx, const char *name)
 /*
  * Reinitialize (e.g., after a fork).
  */
-int pkcs11_CTX_reload(PKCS11_CTX * ctx)
+int pkcs11_CTX_reload(PKCS11_CTX *ctx)
 {
 	PKCS11_CTX_private *cpriv = PRIVCTX(ctx);
 	CK_C_INITIALIZE_ARGS _args;
@@ -131,10 +131,9 @@ int pkcs11_CTX_reload(PKCS11_CTX * ctx)
 /*
  * Unload the shared library
  */
-void pkcs11_CTX_unload(PKCS11_CTX * ctx)
+void pkcs11_CTX_unload(PKCS11_CTX *ctx)
 {
-	PKCS11_CTX_private *cpriv;
-	cpriv = PRIVCTX(ctx);
+	PKCS11_CTX_private *cpriv = PRIVCTX(ctx);
 
 	/* Tell the PKCS11 library to shut down */
 	if (cpriv->forkid == _P11_get_forkid())
@@ -147,7 +146,7 @@ void pkcs11_CTX_unload(PKCS11_CTX * ctx)
 /*
  * Free a context
  */
-void pkcs11_CTX_free(PKCS11_CTX * ctx)
+void pkcs11_CTX_free(PKCS11_CTX *ctx)
 {
 	PKCS11_CTX_private *cpriv = PRIVCTX(ctx);
 
diff --git a/src/p11_slot.c b/src/p11_slot.c
index 1fe40ab..f907469 100644
--- a/src/p11_slot.c
+++ b/src/p11_slot.c
@@ -37,7 +37,7 @@ unsigned long pkcs11_get_slotid_from_slot(PKCS11_SLOT *slot)
 /*
  * Enumerate slots
  */
-int pkcs11_enumerate_slots(PKCS11_CTX * ctx, PKCS11_SLOT ** slotp, unsigned int *countp)
+int pkcs11_enumerate_slots(PKCS11_CTX *ctx, PKCS11_SLOT **slotp, unsigned int *countp)
 {
 	PKCS11_CTX_private *cpriv = PRIVCTX(ctx);
 	CK_SLOT_ID *slotid;
@@ -82,7 +82,7 @@ int pkcs11_enumerate_slots(PKCS11_CTX * ctx, PKCS11_SLOT ** slotp, unsigned int
 /*
  * Find a slot with a token that looks "valuable"
  */
-PKCS11_SLOT *pkcs11_find_token(PKCS11_CTX * ctx,  PKCS11_SLOT * slots, unsigned int nslots)
+PKCS11_SLOT *pkcs11_find_token(PKCS11_CTX *ctx,  PKCS11_SLOT *slots, unsigned int nslots)
 {
 	PKCS11_SLOT *slot, *best;
 	PKCS11_TOKEN *tok;
@@ -109,7 +109,7 @@ PKCS11_SLOT *pkcs11_find_token(PKCS11_CTX * ctx,  PKCS11_SLOT * slots, unsigned
 /*
  * Open a session with this slot
  */
-int pkcs11_open_session(PKCS11_SLOT * slot, int rw, int relogin)
+int pkcs11_open_session(PKCS11_SLOT *slot, int rw, int relogin)
 {
 	PKCS11_SLOT_private *spriv = PRIVSLOT(slot);
 	PKCS11_CTX *ctx = SLOT2CTX(slot);
@@ -132,7 +132,7 @@ int pkcs11_open_session(PKCS11_SLOT * slot, int rw, int relogin)
 	return 0;
 }
 
-int pkcs11_reopen_session(PKCS11_SLOT * slot)
+int pkcs11_reopen_session(PKCS11_SLOT *slot)
 {
 	PKCS11_SLOT_private *spriv = PRIVSLOT(slot);
 	PKCS11_CTX *ctx = SLOT2CTX(slot);
@@ -151,7 +151,7 @@ int pkcs11_reopen_session(PKCS11_SLOT * slot)
 /*
  * Determines if user is authenticated with token
  */
-int pkcs11_is_logged_in(PKCS11_SLOT * slot, int so, int * res)
+int pkcs11_is_logged_in(PKCS11_SLOT *slot, int so, int *res)
 {
 	PKCS11_CTX *ctx = SLOT2CTX(slot);
 	PKCS11_SLOT_private *spriv = PRIVSLOT(slot);
@@ -183,7 +183,7 @@ int pkcs11_is_logged_in(PKCS11_SLOT * slot, int so, int * res)
  * Authenticate with the card. relogin should be set if we automatically
  * relogin after a fork.
  */
-int pkcs11_login(PKCS11_SLOT * slot, int so, const char *pin, int relogin)
+int pkcs11_login(PKCS11_SLOT *slot, int so, const char *pin, int relogin)
 {
 	PKCS11_CTX *ctx = SLOT2CTX(slot);
 	PKCS11_SLOT_private *spriv = PRIVSLOT(slot);
@@ -231,7 +231,7 @@ int pkcs11_login(PKCS11_SLOT * slot, int so, const char *pin, int relogin)
 /*
  * Authenticate with the card
  */
-int pkcs11_relogin(PKCS11_SLOT * slot)
+int pkcs11_relogin(PKCS11_SLOT *slot)
 {
 	PKCS11_SLOT_private *spriv = PRIVSLOT(slot);
 
@@ -241,7 +241,7 @@ int pkcs11_relogin(PKCS11_SLOT * slot)
 /*
  * Log out
  */
-int pkcs11_logout(PKCS11_SLOT * slot)
+int pkcs11_logout(PKCS11_SLOT *slot)
 {
 	PKCS11_CTX *ctx = SLOT2CTX(slot);
 	PKCS11_SLOT_private *spriv = PRIVSLOT(slot);
@@ -268,7 +268,7 @@ int pkcs11_logout(PKCS11_SLOT * slot)
 /*
  * Initialize the token
  */
-int pkcs11_init_token(PKCS11_TOKEN * token, const char *pin, const char *label)
+int pkcs11_init_token(PKCS11_TOKEN *token, const char *pin, const char *label)
 {
 	PKCS11_SLOT *slot = TOKEN2SLOT(token);
 	PKCS11_CTX *ctx = SLOT2CTX(slot);
@@ -299,7 +299,7 @@ int pkcs11_init_token(PKCS11_TOKEN * token, const char *pin, const char *label)
 /*
  * Set the User PIN
  */
-int pkcs11_init_pin(PKCS11_TOKEN * token, const char *pin)
+int pkcs11_init_pin(PKCS11_TOKEN *token, const char *pin)
 {
 	PKCS11_SLOT *slot = TOKEN2SLOT(token);
 	PKCS11_CTX *ctx = SLOT2CTX(slot);
@@ -321,7 +321,7 @@ int pkcs11_init_pin(PKCS11_TOKEN * token, const char *pin)
 /*
  * Change the User PIN
  */
-int pkcs11_change_pin(PKCS11_SLOT * slot, const char *old_pin,
+int pkcs11_change_pin(PKCS11_SLOT *slot, const char *old_pin,
 		const char *new_pin)
 {
 	PKCS11_CTX *ctx = SLOT2CTX(slot);
@@ -390,7 +390,7 @@ int pkcs11_generate_random(PKCS11_SLOT *slot, unsigned char *r,
 /*
  * Helper functions
  */
-static int pkcs11_init_slot(PKCS11_CTX * ctx, PKCS11_SLOT * slot, CK_SLOT_ID id)
+static int pkcs11_init_slot(PKCS11_CTX *ctx, PKCS11_SLOT *slot, CK_SLOT_ID id)
 {
 	PKCS11_SLOT_private *spriv;
 	CK_SLOT_INFO info;
@@ -423,7 +423,7 @@ static int pkcs11_init_slot(PKCS11_CTX * ctx, PKCS11_SLOT * slot, CK_SLOT_ID id)
 	return 0;
 }
 
-void pkcs11_release_all_slots(PKCS11_CTX * ctx,  PKCS11_SLOT *slots, unsigned int nslots)
+void pkcs11_release_all_slots(PKCS11_CTX *ctx,  PKCS11_SLOT *slots, unsigned int nslots)
 {
 	unsigned int i;
 
@@ -432,7 +432,7 @@ void pkcs11_release_all_slots(PKCS11_CTX * ctx,  PKCS11_SLOT *slots, unsigned in
 	OPENSSL_free(slots);
 }
 
-void pkcs11_release_slot(PKCS11_CTX * ctx, PKCS11_SLOT * slot)
+void pkcs11_release_slot(PKCS11_CTX *ctx, PKCS11_SLOT *slot)
 {
 	PKCS11_SLOT_private *spriv = PRIVSLOT(slot);
 
@@ -455,7 +455,7 @@ void pkcs11_release_slot(PKCS11_CTX * ctx, PKCS11_SLOT * slot)
 	memset(slot, 0, sizeof(*slot));
 }
 
-static int pkcs11_check_token(PKCS11_CTX * ctx, PKCS11_SLOT * slot)
+static int pkcs11_check_token(PKCS11_CTX *ctx, PKCS11_SLOT *slot)
 {
 	PKCS11_SLOT_private *spriv = PRIVSLOT(slot);
 	PKCS11_TOKEN_private *tpriv;
@@ -514,7 +514,7 @@ static int pkcs11_check_token(PKCS11_CTX * ctx, PKCS11_SLOT * slot)
 	return 0;
 }
 
-static void pkcs11_destroy_token(PKCS11_TOKEN * token)
+static void pkcs11_destroy_token(PKCS11_TOKEN *token)
 {
 	pkcs11_destroy_keys(token, CKO_PRIVATE_KEY);
 	pkcs11_destroy_keys(token, CKO_PUBLIC_KEY);

-- 
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/pkg-opensc/libp11.git



More information about the pkg-opensc-commit mailing list