diff options
| -rw-r--r-- | p11-capi-builtin.c | 2 | ||||
| -rw-r--r-- | p11-capi-cert.c | 4 | ||||
| -rw-r--r-- | p11-capi-cert.h | 2 | ||||
| -rw-r--r-- | p11-capi-der.c | 2 | ||||
| -rw-r--r-- | p11-capi-key.c | 2 | ||||
| -rw-r--r-- | p11-capi-object.h | 2 | ||||
| -rw-r--r-- | p11-capi-rsa.c | 15 | ||||
| -rw-r--r-- | p11-capi-token.c | 16 | ||||
| -rw-r--r-- | p11-capi-trust.c | 2 | 
9 files changed, 23 insertions, 24 deletions
| diff --git a/p11-capi-builtin.c b/p11-capi-builtin.c index 2757cb3..95fd476 100644 --- a/p11-capi-builtin.c +++ b/p11-capi-builtin.c @@ -58,7 +58,7 @@ typedef struct _BuiltinMatch  BuiltinMatch;  static const BuiltinMatch all_builtins[] = { -	{ (CK_ATTRIBUTE_PTR)&builtin_root, P11c_SLOT_TRUSTED | P11c_SLOT_CA | P11c_SLOT_CERTS }, +	{ (CK_ATTRIBUTE_PTR)&builtin_root, P11C_SLOT_TRUSTED | P11C_SLOT_CA | P11C_SLOT_CERTS },  	{ NULL, 0 }  }; diff --git a/p11-capi-cert.c b/p11-capi-cert.c index 960073a..53e198f 100644 --- a/p11-capi-cert.c +++ b/p11-capi-cert.c @@ -259,7 +259,7 @@ cert_alloc_data(P11cSession* sess, P11cObject* obj, PCCERT_CONTEXT cert)  		return NULL;  	cdata->cert = cert; -	cdata->is_in_root = (p11c_token_get_flags(sess->slot) & P11c_SLOT_CA) ? TRUE : FALSE; +	cdata->is_in_root = (p11c_token_get_flags(sess->slot) & P11C_SLOT_CA) ? TRUE : FALSE;  	cdata->base.object = obj->id;  	cdata->base.data_funcs = &cert_objdata_vtable; @@ -677,7 +677,7 @@ p11c_cert_find(P11cSession* sess, CK_OBJECT_CLASS cls, CK_ATTRIBUTE_PTR match,  		return CKR_OK;  	/* Only work with slots that have certificates */ -	if(!(p11c_token_get_flags (sess->slot) & P11c_SLOT_CERTS)) +	if(!(p11c_token_get_flags (sess->slot) & P11C_SLOT_CERTS))  		return CKR_OK;  	/*  diff --git a/p11-capi-cert.h b/p11-capi-cert.h index a19b740..f85d7b3 100644 --- a/p11-capi-cert.h +++ b/p11-capi-cert.h @@ -24,7 +24,7 @@  #include "p11-capi-util.h"  /* Find certificates matching criteria */ -CK_R            p11c_cert_find                         (P11cSession* sess, CK_OBJECT_CLASS cls,  +CK_RV           p11c_cert_find                         (P11cSession* sess, CK_OBJECT_CLASS cls,                                                           CK_ATTRIBUTE_PTR match,  CK_ULONG count,                                                           P11cArray* arr); diff --git a/p11-capi-der.c b/p11-capi-der.c index db69b89..5698dff 100644 --- a/p11-capi-der.c +++ b/p11-capi-der.c @@ -135,7 +135,7 @@ p11c_der_read_oid(BYTE* oid_tag, DWORD n_oid_tag)  	DWORD n_oid;  	/* wasn't an oid */ -	if(P11c_DER_OBJECT_ID != *oid_tag)  +	if(P11C_DER_OBJECT_ID != *oid_tag)   		return NULL;  	oid = p11c_der_unwrap(oid_tag, n_oid_tag, &n_oid, NULL);; diff --git a/p11-capi-key.c b/p11-capi-key.c index bda2baf..ed306d4 100644 --- a/p11-capi-key.c +++ b/p11-capi-key.c @@ -1022,7 +1022,7 @@ p11c_key_find(P11cSession* sess, CK_OBJECT_CLASS cls,  	CK_RV ret = CKR_OK;  	/* Is this somewhere we have all keys present? */ -	if(p11c_token_get_flags(sess->slot) & P11c_SLOT_ANYKEY) +	if(p11c_token_get_flags(sess->slot) & P11C_SLOT_ANYKEY)  	{  		if((cls == CKO_PRIVATE_KEY || cls == CKO_ANY) && ret == CKR_OK)  			ret = find_any_keys(sess, CKO_PRIVATE_KEY, match, count, arr); diff --git a/p11-capi-object.h b/p11-capi-object.h index cd08ae9..e884ee1 100644 --- a/p11-capi-object.h +++ b/p11-capi-object.h @@ -82,7 +82,7 @@ struct _P11cObjectData  };  /* Match object data against all the given match attributes */ -CK_BBOO             p11c_object_data_match       (P11cObjectData* objdata,  +CK_BBOOL            p11c_object_data_match       (P11cObjectData* objdata,                                                     CK_ATTRIBUTE_PTR matches, CK_ULONG count);  /* Match a single attribute against object data */ diff --git a/p11-capi-rsa.c b/p11-capi-rsa.c index 1e22618..18fc4eb 100644 --- a/p11-capi-rsa.c +++ b/p11-capi-rsa.c @@ -17,8 +17,7 @@   * Boston, MA 02111-1307, USA.   */ -#include "p11c.h" - +#include "p11-capi.h"  #include "p11-capi-der.h"  #include "p11-capi-key.h"  #include "p11-capi-object.h" @@ -161,7 +160,7 @@ parse_rsa_pkcs_der_hash(CK_BYTE_PTR input, CK_ULONG n_input,  }  CK_RV -p11c_rsa_pkcs_sign_init(P11CObjectData *keydata, void** operation) +p11c_rsa_pkcs_sign_init(P11cObjectData *keydata, void** operation)  {  	CRYPT_KEY_PROV_INFO* prov_info; @@ -183,7 +182,7 @@ p11c_rsa_pkcs_sign_perform (CK_BYTE_PTR data, CK_ULONG n_data,                              void** operation)  {  	CRYPT_KEY_PROV_INFO* prov_info; -	P11CObjectData* keydata; +	P11cObjectData* keydata;  	ALG_ID algorithm;  	BYTE* hash_data;  	DWORD n_hash_data; @@ -202,7 +201,7 @@ p11c_rsa_pkcs_sign_perform (CK_BYTE_PTR data, CK_ULONG n_data,  	if(!data || !n_data)  		return CKR_ARGUMENTS_BAD; -	keydata = (P11CObjectData*)*operation; +	keydata = (P11cObjectData*)*operation;  	prov_info = p11c_key_object_data_get_prov_info(keydata);  	ASSERT(prov_info); @@ -293,7 +292,7 @@ p11c_rsa_pkcs_sign_cleanup (void* operation)  CK_RV -p11c_rsa_pkcs_decrypt_init(P11CObjectData* keydata, void** operation) +p11c_rsa_pkcs_decrypt_init(P11cObjectData* keydata, void** operation)  {  	CRYPT_KEY_PROV_INFO* prov_info; @@ -315,7 +314,7 @@ p11c_rsa_pkcs_decrypt_perform(CK_BYTE_PTR encdata, CK_ULONG n_encdata,                                void** operation)  {  	CRYPT_KEY_PROV_INFO* prov_info; -	P11CObjectData* keydata; +	P11cObjectData* keydata;  	BOOL capifail;  	DWORD bits, error;  	CK_RV ret; @@ -329,7 +328,7 @@ p11c_rsa_pkcs_decrypt_perform(CK_BYTE_PTR encdata, CK_ULONG n_encdata,  	ASSERT(encdata);  	ASSERT(n_encdata); -	keydata = (P11CObjectData*)*operation; +	keydata = (P11cObjectData*)*operation;  	prov_info = p11c_key_object_data_get_prov_info(keydata);  	ASSERT(prov_info); diff --git a/p11-capi-token.c b/p11-capi-token.c index 13a87d6..f6ef2ca 100644 --- a/p11-capi-token.c +++ b/p11-capi-token.c @@ -36,14 +36,14 @@ SlotInfo;  #define SLOT_OFFSET  0x00001000  static SlotInfo slot_info[] = { -	{ "My", "Personal Certificates", P11c_SLOT_TRUSTED | P11c_SLOT_CERTS }, -	{ "AddressBook", "Address Book Certificates", P11c_SLOT_CERTS }, -	{ "CA", "Certificate Authorities", P11c_SLOT_CA | P11c_SLOT_CERTS },   -	{ "Root", "Root Authorities", P11c_SLOT_TRUSTED | P11c_SLOT_CA | P11c_SLOT_CERTS },  -	{ "Trust", "Trust", P11c_SLOT_CERTS },  -	{ "TrustedPeople", "Trusted People", P11c_SLOT_TRUSTED | P11c_SLOT_CERTS },  -	{ "AuthRoot", "Auth Root", P11c_SLOT_CERTS }, -	{ NULL, "All User Keys", P11c_SLOT_ANYKEY } +	{ "My", "Personal Certificates", P11C_SLOT_TRUSTED | P11C_SLOT_CERTS }, +	{ "AddressBook", "Address Book Certificates", P11C_SLOT_CERTS }, +	{ "CA", "Certificate Authorities", P11C_SLOT_CA | P11C_SLOT_CERTS },   +	{ "Root", "Root Authorities", P11C_SLOT_TRUSTED | P11C_SLOT_CA | P11C_SLOT_CERTS },  +	{ "Trust", "Trust", P11C_SLOT_CERTS },  +	{ "TrustedPeople", "Trusted People", P11C_SLOT_TRUSTED | P11C_SLOT_CERTS },  +	{ "AuthRoot", "Auth Root", P11C_SLOT_CERTS }, +	{ NULL, "All User Keys", P11C_SLOT_ANYKEY }  };  #define SLOT_TO_OFFSET(slot) \ diff --git a/p11-capi-trust.c b/p11-capi-trust.c index e8bab5f..e45106a 100644 --- a/p11-capi-trust.c +++ b/p11-capi-trust.c @@ -527,7 +527,7 @@ p11c_trust_find(P11cSession* sess, CK_OBJECT_CLASS cls,  		return CKR_OK;  	/* Only work with slots that have certificates */ -	if(!(p11c_token_get_flags (sess->slot) & P11c_SLOT_CERTS)) +	if(!(p11c_token_get_flags (sess->slot) & P11C_SLOT_CERTS))  		return CKR_OK;  	/* Get a list of all certificates */ | 
