diff options
author | Matthew Barnes <mbarnes@redhat.com> | 2009-07-13 11:33:07 +0800 |
---|---|---|
committer | Matthew Barnes <mbarnes@redhat.com> | 2009-07-13 11:33:07 +0800 |
commit | 0274669179600ac77475eed9870d2eab52c2cf14 (patch) | |
tree | 80f228649b670efac7f76ba5c0da5ed22a3a05c9 /smime/lib | |
parent | adb63f0f2156554a21dbfd8daba447001985e967 (diff) | |
download | gsoc2013-evolution-0274669179600ac77475eed9870d2eab52c2cf14.tar.gz gsoc2013-evolution-0274669179600ac77475eed9870d2eab52c2cf14.tar.zst gsoc2013-evolution-0274669179600ac77475eed9870d2eab52c2cf14.zip |
Fix excessive whitespace.
Diffstat (limited to 'smime/lib')
-rw-r--r-- | smime/lib/e-asn1-object.c | 1 | ||||
-rw-r--r-- | smime/lib/e-cert-db.c | 1 | ||||
-rw-r--r-- | smime/lib/e-cert-db.h | 1 | ||||
-rw-r--r-- | smime/lib/e-cert.c | 3 | ||||
-rw-r--r-- | smime/lib/e-pkcs12.h | 1 |
5 files changed, 0 insertions, 7 deletions
diff --git a/smime/lib/e-asn1-object.c b/smime/lib/e-asn1-object.c index e0d644344b..e8c51b6a24 100644 --- a/smime/lib/e-asn1-object.c +++ b/smime/lib/e-asn1-object.c @@ -306,7 +306,6 @@ e_asn1_object_new (void) return E_ASN1_OBJECT (g_object_new (E_TYPE_ASN1_OBJECT, NULL)); } - void e_asn1_object_set_valid_container (EASN1Object *obj, gboolean flag) { diff --git a/smime/lib/e-cert-db.c b/smime/lib/e-cert-db.c index d0528f7d2f..e0434754a8 100644 --- a/smime/lib/e-cert-db.c +++ b/smime/lib/e-cert-db.c @@ -407,7 +407,6 @@ e_cert_db_find_cert_by_nickname (ECertDB *certdb, cert = CERT_FindCertByNickname(CERT_GetDefaultCertDB(), (gchar *)nickname); } - if (cert) { /* PR_LOG(gPIPNSSLog, PR_LOG_DEBUG, ("got it\n"));*/ ECert *ecert = e_cert_new (cert); diff --git a/smime/lib/e-cert-db.h b/smime/lib/e-cert-db.h index 30d20448cb..0e19e002c5 100644 --- a/smime/lib/e-cert-db.h +++ b/smime/lib/e-cert-db.h @@ -81,7 +81,6 @@ GList* e_cert_db_get_cert_nicknames (ECertDB *certdb, ECertType cert_type, GError **error); - ECert* e_cert_db_find_email_encryption_cert (ECertDB *certdb, const gchar *nickname, GError **error); diff --git a/smime/lib/e-cert.c b/smime/lib/e-cert.c index 8367b7b8fd..0cea3c50fc 100644 --- a/smime/lib/e-cert.c +++ b/smime/lib/e-cert.c @@ -278,7 +278,6 @@ e_cert_new_from_der (gchar *data, guint32 len) return e_cert_new (cert); } - CERTCertificate* @@ -676,7 +675,6 @@ get_oid_text (SECItem *oid, gchar **text) return TRUE; } - static gboolean process_raw_bytes (SECItem *data, gchar **text) { @@ -1069,7 +1067,6 @@ create_tbs_certificate_asn1_struct (ECert *cert, EASN1Object **seq) e_asn1_object_append_child (sequence, subitem); g_object_unref (subitem); - if (!process_sec_algorithm_id (&cert->priv->cert->signature, &subitem)) return FALSE; e_asn1_object_set_display_name (subitem, _("Certificate Signature Algorithm")); diff --git a/smime/lib/e-pkcs12.h b/smime/lib/e-pkcs12.h index 444afcaadd..6e98fdb0cb 100644 --- a/smime/lib/e-pkcs12.h +++ b/smime/lib/e-pkcs12.h @@ -55,7 +55,6 @@ GType e_pkcs12_get_type (void); EPKCS12* e_pkcs12_new (void); - #if 0 /* XXX we're not going to support additional slots in the initial ssl stuff, so we just always default to the internal token (and thus |