aboutsummaryrefslogtreecommitdiffstats
path: root/smime/gui
diff options
context:
space:
mode:
authorMatthew Barnes <mbarnes@redhat.com>2007-11-15 06:04:21 +0800
committerMatthew Barnes <mbarnes@src.gnome.org>2007-11-15 06:04:21 +0800
commit9e4fcb29cf7f05c18f7fd34e318f9e795fa32e91 (patch)
tree2e1e96f33404781354c422a7e9beaf458ebeb655 /smime/gui
parent7e8f8bb9e5167b0219b48ab3e8062080d3740b0a (diff)
downloadgsoc2013-evolution-9e4fcb29cf7f05c18f7fd34e318f9e795fa32e91.tar.gz
gsoc2013-evolution-9e4fcb29cf7f05c18f7fd34e318f9e795fa32e91.tar.zst
gsoc2013-evolution-9e4fcb29cf7f05c18f7fd34e318f9e795fa32e91.zip
** Remove trailing whitespace from source code.
2007-11-14 Matthew Barnes <mbarnes@redhat.com> ** Remove trailing whitespace from source code. svn path=/trunk/; revision=34537
Diffstat (limited to 'smime/gui')
-rw-r--r--smime/gui/cert-trust-dialog.c4
-rw-r--r--smime/gui/certificate-manager.c22
-rw-r--r--smime/gui/certificate-viewer.c8
-rw-r--r--smime/gui/e-cert-selector.c12
4 files changed, 23 insertions, 23 deletions
diff --git a/smime/gui/cert-trust-dialog.c b/smime/gui/cert-trust-dialog.c
index 43ab1b856a..9de35ae073 100644
--- a/smime/gui/cert-trust-dialog.c
+++ b/smime/gui/cert-trust-dialog.c
@@ -92,7 +92,7 @@ ctd_response(GtkWidget *w, guint id, CertTrustDialogData *data)
e_cert_trust_has_trusted_ca (icert->trust, TRUE, FALSE, FALSE),
e_cert_trust_has_trusted_ca (icert->trust, FALSE, TRUE, FALSE),
e_cert_trust_has_trusted_ca (icert->trust, FALSE, FALSE, TRUE));
-
+
if (gtk_dialog_run (GTK_DIALOG (dialog)) == GTK_RESPONSE_OK) {
gboolean trust_ssl, trust_email, trust_objsign;
@@ -105,7 +105,7 @@ ctd_response(GtkWidget *w, guint id, CertTrustDialogData *data)
trust_ssl,
trust_email,
trust_objsign);
-
+
CERT_ChangeCertTrust(CERT_GetDefaultCertDB(), icert, &trust);
}
diff --git a/smime/gui/certificate-manager.c b/smime/gui/certificate-manager.c
index e417407c42..8a3c64321c 100644
--- a/smime/gui/certificate-manager.c
+++ b/smime/gui/certificate-manager.c
@@ -154,7 +154,7 @@ import_your (GtkWidget *widget, CertificateManagerData *cfm)
if (GTK_RESPONSE_OK == gtk_dialog_run (GTK_DIALOG (filesel))) {
filename = gtk_file_chooser_get_filename (GTK_FILE_CHOOSER (filesel));
-
+
if (e_cert_db_import_pkcs12_file (e_cert_db_peek (),
filename, NULL /* XXX */)) {
/* there's no telling how many certificates were added during the import,
@@ -201,7 +201,7 @@ delete_your (GtkWidget *widget, CertificateManagerData *cfm)
g_object_unref (cert);
}
}
-
+
}
static void
@@ -447,7 +447,7 @@ delete_contact (GtkWidget *widget, CertificateManagerData *cfm)
g_object_unref (cert);
}
}
-
+
}
static void
@@ -527,7 +527,7 @@ static void
view_ca (GtkWidget *widget, CertificateManagerData *cfm)
{
GtkTreeIter iter;
-
+
if (gtk_tree_selection_get_selected (gtk_tree_view_get_selection (GTK_TREE_VIEW(cfm->authoritycerts_treeview)),
NULL,
&iter)) {
@@ -551,7 +551,7 @@ static void
edit_ca (GtkWidget *widget, CertificateManagerData *cfm)
{
GtkTreeIter iter;
-
+
if (gtk_tree_selection_get_selected (gtk_tree_view_get_selection (GTK_TREE_VIEW(cfm->authoritycerts_treeview)),
NULL,
&iter)) {
@@ -570,7 +570,7 @@ edit_ca (GtkWidget *widget, CertificateManagerData *cfm)
e_cert_trust_has_trusted_ca (icert->trust, TRUE, FALSE, FALSE),
e_cert_trust_has_trusted_ca (icert->trust, FALSE, TRUE, FALSE),
e_cert_trust_has_trusted_ca (icert->trust, FALSE, FALSE, TRUE));
-
+
if (gtk_dialog_run (GTK_DIALOG (dialog)) == GTK_RESPONSE_OK) {
gboolean trust_ssl, trust_email, trust_objsign;
CERTCertTrust trust;
@@ -584,7 +584,7 @@ edit_ca (GtkWidget *widget, CertificateManagerData *cfm)
trust_ssl,
trust_email,
trust_objsign);
-
+
CERT_ChangeCertTrust (CERT_GetDefaultCertDB(), icert, &trust);
}
@@ -670,7 +670,7 @@ delete_ca (GtkWidget *widget, CertificateManagerData *cfm)
g_object_unref (cert);
}
}
-
+
}
static void
@@ -736,7 +736,7 @@ add_user_cert (CertificateManagerData *cfm, ECert *cert)
if (!parent_iter) {
/* create a new toplevel node */
gtk_tree_store_append (GTK_TREE_STORE (model), &iter, NULL);
-
+
gtk_tree_store_set (GTK_TREE_STORE (model), &iter,
0, organization, -1);
@@ -780,7 +780,7 @@ add_contact_cert (CertificateManagerData *cfm, ECert *cert)
if (!parent_iter) {
/* create a new toplevel node */
gtk_tree_store_append (GTK_TREE_STORE (model), &iter, NULL);
-
+
gtk_tree_store_set (GTK_TREE_STORE (model), &iter,
0, organization, -1);
@@ -823,7 +823,7 @@ add_ca_cert (CertificateManagerData *cfm, ECert *cert)
/* create a new toplevel node */
gtk_tree_store_append (GTK_TREE_STORE (model),
&iter, NULL);
-
+
gtk_tree_store_set (GTK_TREE_STORE (model), &iter,
0, organization, -1);
diff --git a/smime/gui/certificate-viewer.c b/smime/gui/certificate-viewer.c
index 2580287042..342f3d8c95 100644
--- a/smime/gui/certificate-viewer.c
+++ b/smime/gui/certificate-viewer.c
@@ -115,7 +115,7 @@ fill_in_general (CertificateViewerData *cvm_data, ECert *cert)
else {
gtk_label_set_markup (GTK_LABEL (label), NOT_PART_OF_CERT_MARKUP);
}
-
+
label = glade_xml_get_widget (cvm_data->gui, "issued-by-ou");
if (e_cert_get_issuer_org_unit (cert)) {
gtk_label_set_text (GTK_LABEL (label), e_cert_get_issuer_org_unit (cert));
@@ -215,7 +215,7 @@ hierarchy_selection_changed (GtkTreeSelection *selection, CertificateViewerData
/* and blow away the field value */
gtk_text_buffer_set_text (gtk_text_view_get_buffer (GTK_TEXT_VIEW (cvm_data->field_text)),
"", 0);
- }
+ }
}
static void
@@ -242,7 +242,7 @@ fields_selection_changed (GtkTreeSelection *selection, CertificateViewerData *cv
if (value) {
GtkTextIter text_iter;
-
+
gtk_text_buffer_get_start_iter (gtk_text_view_get_buffer (GTK_TEXT_VIEW (cvm_data->field_text)),
&text_iter);
@@ -342,7 +342,7 @@ certificate_viewer_show (ECert *cert)
gtk_window_set_title (GTK_WINDOW (cvm_data->dialog),
title);
-
+
g_free (title);
fill_in_general (cvm_data, cert);
diff --git a/smime/gui/e-cert-selector.c b/smime/gui/e-cert-selector.c
index f9ca319509..d41be35ad6 100644
--- a/smime/gui/e-cert-selector.c
+++ b/smime/gui/e-cert-selector.c
@@ -129,13 +129,13 @@ ecs_cert_changed(GtkWidget *w, ECertSelector *ecs)
/**
* e_cert_selector_new:
- * @type:
- * @currentid:
- *
+ * @type:
+ * @currentid:
+ *
* Create a new ECertSelector dialog. @type specifies which type of cert to
* be selected, E_CERT_SELECTOR_SIGNER for signing certs, and
* E_CERT_SELECTOR_RECIPIENT for encrypting certs.
- *
+ *
* @currentid is the nickname of the cert currently selected for this user.
*
* You only need to connect to a single signal "selected" which will
@@ -199,7 +199,7 @@ e_cert_selector_new(int type, const char *currentid)
&& ((node->cert->nickname != NULL && strcmp(node->cert->nickname, currentid) == 0)
|| (node->cert->emailAddr != NULL && strcmp(node->cert->emailAddr, currentid) == 0)))
active = n;
-
+
n++;
}
@@ -236,7 +236,7 @@ e_cert_selector_finalise(GObject *o)
if (ecs->priv->certlist)
CERT_DestroyCertList(ecs->priv->certlist);
-
+
g_free(ecs->priv);
((GObjectClass *)e_cert_selector_parent_class)->finalize(o);