aboutsummaryrefslogtreecommitdiffstats
path: root/smime/lib
diff options
context:
space:
mode:
authorMatthew Barnes <mbarnes@redhat.com>2009-07-13 11:33:07 +0800
committerMatthew Barnes <mbarnes@redhat.com>2009-07-13 11:33:07 +0800
commit0274669179600ac77475eed9870d2eab52c2cf14 (patch)
tree80f228649b670efac7f76ba5c0da5ed22a3a05c9 /smime/lib
parentadb63f0f2156554a21dbfd8daba447001985e967 (diff)
downloadgsoc2013-evolution-0274669179600ac77475eed9870d2eab52c2cf14.tar.gz
gsoc2013-evolution-0274669179600ac77475eed9870d2eab52c2cf14.tar.zst
gsoc2013-evolution-0274669179600ac77475eed9870d2eab52c2cf14.zip
Fix excessive whitespace.
Diffstat (limited to 'smime/lib')
-rw-r--r--smime/lib/e-asn1-object.c1
-rw-r--r--smime/lib/e-cert-db.c1
-rw-r--r--smime/lib/e-cert-db.h1
-rw-r--r--smime/lib/e-cert.c3
-rw-r--r--smime/lib/e-pkcs12.h1
5 files changed, 0 insertions, 7 deletions
diff --git a/smime/lib/e-asn1-object.c b/smime/lib/e-asn1-object.c
index e0d644344b..e8c51b6a24 100644
--- a/smime/lib/e-asn1-object.c
+++ b/smime/lib/e-asn1-object.c
@@ -306,7 +306,6 @@ e_asn1_object_new (void)
return E_ASN1_OBJECT (g_object_new (E_TYPE_ASN1_OBJECT, NULL));
}
-
void
e_asn1_object_set_valid_container (EASN1Object *obj, gboolean flag)
{
diff --git a/smime/lib/e-cert-db.c b/smime/lib/e-cert-db.c
index d0528f7d2f..e0434754a8 100644
--- a/smime/lib/e-cert-db.c
+++ b/smime/lib/e-cert-db.c
@@ -407,7 +407,6 @@ e_cert_db_find_cert_by_nickname (ECertDB *certdb,
cert = CERT_FindCertByNickname(CERT_GetDefaultCertDB(), (gchar *)nickname);
}
-
if (cert) {
/* PR_LOG(gPIPNSSLog, PR_LOG_DEBUG, ("got it\n"));*/
ECert *ecert = e_cert_new (cert);
diff --git a/smime/lib/e-cert-db.h b/smime/lib/e-cert-db.h
index 30d20448cb..0e19e002c5 100644
--- a/smime/lib/e-cert-db.h
+++ b/smime/lib/e-cert-db.h
@@ -81,7 +81,6 @@ GList* e_cert_db_get_cert_nicknames (ECertDB *certdb,
ECertType cert_type,
GError **error);
-
ECert* e_cert_db_find_email_encryption_cert (ECertDB *certdb,
const gchar *nickname,
GError **error);
diff --git a/smime/lib/e-cert.c b/smime/lib/e-cert.c
index 8367b7b8fd..0cea3c50fc 100644
--- a/smime/lib/e-cert.c
+++ b/smime/lib/e-cert.c
@@ -278,7 +278,6 @@ e_cert_new_from_der (gchar *data, guint32 len)
return e_cert_new (cert);
}
-
CERTCertificate*
@@ -676,7 +675,6 @@ get_oid_text (SECItem *oid, gchar **text)
return TRUE;
}
-
static gboolean
process_raw_bytes (SECItem *data, gchar **text)
{
@@ -1069,7 +1067,6 @@ create_tbs_certificate_asn1_struct (ECert *cert, EASN1Object **seq)
e_asn1_object_append_child (sequence, subitem);
g_object_unref (subitem);
-
if (!process_sec_algorithm_id (&cert->priv->cert->signature, &subitem))
return FALSE;
e_asn1_object_set_display_name (subitem, _("Certificate Signature Algorithm"));
diff --git a/smime/lib/e-pkcs12.h b/smime/lib/e-pkcs12.h
index 444afcaadd..6e98fdb0cb 100644
--- a/smime/lib/e-pkcs12.h
+++ b/smime/lib/e-pkcs12.h
@@ -55,7 +55,6 @@ GType e_pkcs12_get_type (void);
EPKCS12* e_pkcs12_new (void);
-
#if 0
/* XXX we're not going to support additional slots in the initial ssl
stuff, so we just always default to the internal token (and thus