diff options
author | Matthew Barnes <mbarnes@redhat.com> | 2007-11-15 06:04:21 +0800 |
---|---|---|
committer | Matthew Barnes <mbarnes@src.gnome.org> | 2007-11-15 06:04:21 +0800 |
commit | 9e4fcb29cf7f05c18f7fd34e318f9e795fa32e91 (patch) | |
tree | 2e1e96f33404781354c422a7e9beaf458ebeb655 /smime/gui | |
parent | 7e8f8bb9e5167b0219b48ab3e8062080d3740b0a (diff) | |
download | gsoc2013-evolution-9e4fcb29cf7f05c18f7fd34e318f9e795fa32e91.tar.gz gsoc2013-evolution-9e4fcb29cf7f05c18f7fd34e318f9e795fa32e91.tar.zst gsoc2013-evolution-9e4fcb29cf7f05c18f7fd34e318f9e795fa32e91.zip |
** Remove trailing whitespace from source code.
2007-11-14 Matthew Barnes <mbarnes@redhat.com>
** Remove trailing whitespace from source code.
svn path=/trunk/; revision=34537
Diffstat (limited to 'smime/gui')
-rw-r--r-- | smime/gui/cert-trust-dialog.c | 4 | ||||
-rw-r--r-- | smime/gui/certificate-manager.c | 22 | ||||
-rw-r--r-- | smime/gui/certificate-viewer.c | 8 | ||||
-rw-r--r-- | smime/gui/e-cert-selector.c | 12 |
4 files changed, 23 insertions, 23 deletions
diff --git a/smime/gui/cert-trust-dialog.c b/smime/gui/cert-trust-dialog.c index 43ab1b856a..9de35ae073 100644 --- a/smime/gui/cert-trust-dialog.c +++ b/smime/gui/cert-trust-dialog.c @@ -92,7 +92,7 @@ ctd_response(GtkWidget *w, guint id, CertTrustDialogData *data) e_cert_trust_has_trusted_ca (icert->trust, TRUE, FALSE, FALSE), e_cert_trust_has_trusted_ca (icert->trust, FALSE, TRUE, FALSE), e_cert_trust_has_trusted_ca (icert->trust, FALSE, FALSE, TRUE)); - + if (gtk_dialog_run (GTK_DIALOG (dialog)) == GTK_RESPONSE_OK) { gboolean trust_ssl, trust_email, trust_objsign; @@ -105,7 +105,7 @@ ctd_response(GtkWidget *w, guint id, CertTrustDialogData *data) trust_ssl, trust_email, trust_objsign); - + CERT_ChangeCertTrust(CERT_GetDefaultCertDB(), icert, &trust); } diff --git a/smime/gui/certificate-manager.c b/smime/gui/certificate-manager.c index e417407c42..8a3c64321c 100644 --- a/smime/gui/certificate-manager.c +++ b/smime/gui/certificate-manager.c @@ -154,7 +154,7 @@ import_your (GtkWidget *widget, CertificateManagerData *cfm) if (GTK_RESPONSE_OK == gtk_dialog_run (GTK_DIALOG (filesel))) { filename = gtk_file_chooser_get_filename (GTK_FILE_CHOOSER (filesel)); - + if (e_cert_db_import_pkcs12_file (e_cert_db_peek (), filename, NULL /* XXX */)) { /* there's no telling how many certificates were added during the import, @@ -201,7 +201,7 @@ delete_your (GtkWidget *widget, CertificateManagerData *cfm) g_object_unref (cert); } } - + } static void @@ -447,7 +447,7 @@ delete_contact (GtkWidget *widget, CertificateManagerData *cfm) g_object_unref (cert); } } - + } static void @@ -527,7 +527,7 @@ static void view_ca (GtkWidget *widget, CertificateManagerData *cfm) { GtkTreeIter iter; - + if (gtk_tree_selection_get_selected (gtk_tree_view_get_selection (GTK_TREE_VIEW(cfm->authoritycerts_treeview)), NULL, &iter)) { @@ -551,7 +551,7 @@ static void edit_ca (GtkWidget *widget, CertificateManagerData *cfm) { GtkTreeIter iter; - + if (gtk_tree_selection_get_selected (gtk_tree_view_get_selection (GTK_TREE_VIEW(cfm->authoritycerts_treeview)), NULL, &iter)) { @@ -570,7 +570,7 @@ edit_ca (GtkWidget *widget, CertificateManagerData *cfm) e_cert_trust_has_trusted_ca (icert->trust, TRUE, FALSE, FALSE), e_cert_trust_has_trusted_ca (icert->trust, FALSE, TRUE, FALSE), e_cert_trust_has_trusted_ca (icert->trust, FALSE, FALSE, TRUE)); - + if (gtk_dialog_run (GTK_DIALOG (dialog)) == GTK_RESPONSE_OK) { gboolean trust_ssl, trust_email, trust_objsign; CERTCertTrust trust; @@ -584,7 +584,7 @@ edit_ca (GtkWidget *widget, CertificateManagerData *cfm) trust_ssl, trust_email, trust_objsign); - + CERT_ChangeCertTrust (CERT_GetDefaultCertDB(), icert, &trust); } @@ -670,7 +670,7 @@ delete_ca (GtkWidget *widget, CertificateManagerData *cfm) g_object_unref (cert); } } - + } static void @@ -736,7 +736,7 @@ add_user_cert (CertificateManagerData *cfm, ECert *cert) if (!parent_iter) { /* create a new toplevel node */ gtk_tree_store_append (GTK_TREE_STORE (model), &iter, NULL); - + gtk_tree_store_set (GTK_TREE_STORE (model), &iter, 0, organization, -1); @@ -780,7 +780,7 @@ add_contact_cert (CertificateManagerData *cfm, ECert *cert) if (!parent_iter) { /* create a new toplevel node */ gtk_tree_store_append (GTK_TREE_STORE (model), &iter, NULL); - + gtk_tree_store_set (GTK_TREE_STORE (model), &iter, 0, organization, -1); @@ -823,7 +823,7 @@ add_ca_cert (CertificateManagerData *cfm, ECert *cert) /* create a new toplevel node */ gtk_tree_store_append (GTK_TREE_STORE (model), &iter, NULL); - + gtk_tree_store_set (GTK_TREE_STORE (model), &iter, 0, organization, -1); diff --git a/smime/gui/certificate-viewer.c b/smime/gui/certificate-viewer.c index 2580287042..342f3d8c95 100644 --- a/smime/gui/certificate-viewer.c +++ b/smime/gui/certificate-viewer.c @@ -115,7 +115,7 @@ fill_in_general (CertificateViewerData *cvm_data, ECert *cert) else { gtk_label_set_markup (GTK_LABEL (label), NOT_PART_OF_CERT_MARKUP); } - + label = glade_xml_get_widget (cvm_data->gui, "issued-by-ou"); if (e_cert_get_issuer_org_unit (cert)) { gtk_label_set_text (GTK_LABEL (label), e_cert_get_issuer_org_unit (cert)); @@ -215,7 +215,7 @@ hierarchy_selection_changed (GtkTreeSelection *selection, CertificateViewerData /* and blow away the field value */ gtk_text_buffer_set_text (gtk_text_view_get_buffer (GTK_TEXT_VIEW (cvm_data->field_text)), "", 0); - } + } } static void @@ -242,7 +242,7 @@ fields_selection_changed (GtkTreeSelection *selection, CertificateViewerData *cv if (value) { GtkTextIter text_iter; - + gtk_text_buffer_get_start_iter (gtk_text_view_get_buffer (GTK_TEXT_VIEW (cvm_data->field_text)), &text_iter); @@ -342,7 +342,7 @@ certificate_viewer_show (ECert *cert) gtk_window_set_title (GTK_WINDOW (cvm_data->dialog), title); - + g_free (title); fill_in_general (cvm_data, cert); diff --git a/smime/gui/e-cert-selector.c b/smime/gui/e-cert-selector.c index f9ca319509..d41be35ad6 100644 --- a/smime/gui/e-cert-selector.c +++ b/smime/gui/e-cert-selector.c @@ -129,13 +129,13 @@ ecs_cert_changed(GtkWidget *w, ECertSelector *ecs) /** * e_cert_selector_new: - * @type: - * @currentid: - * + * @type: + * @currentid: + * * Create a new ECertSelector dialog. @type specifies which type of cert to * be selected, E_CERT_SELECTOR_SIGNER for signing certs, and * E_CERT_SELECTOR_RECIPIENT for encrypting certs. - * + * * @currentid is the nickname of the cert currently selected for this user. * * You only need to connect to a single signal "selected" which will @@ -199,7 +199,7 @@ e_cert_selector_new(int type, const char *currentid) && ((node->cert->nickname != NULL && strcmp(node->cert->nickname, currentid) == 0) || (node->cert->emailAddr != NULL && strcmp(node->cert->emailAddr, currentid) == 0))) active = n; - + n++; } @@ -236,7 +236,7 @@ e_cert_selector_finalise(GObject *o) if (ecs->priv->certlist) CERT_DestroyCertList(ecs->priv->certlist); - + g_free(ecs->priv); ((GObjectClass *)e_cert_selector_parent_class)->finalize(o); |