aboutsummaryrefslogtreecommitdiffstats
path: root/smime
diff options
context:
space:
mode:
Diffstat (limited to 'smime')
-rw-r--r--smime/gui/cert-trust-dialog.c1
-rw-r--r--smime/gui/certificate-manager.c2
-rw-r--r--smime/lib/e-asn1-object.c1
-rw-r--r--smime/lib/e-cert-db.c1
-rw-r--r--smime/lib/e-cert-db.h1
-rw-r--r--smime/lib/e-cert.c3
-rw-r--r--smime/lib/e-pkcs12.h1
7 files changed, 0 insertions, 10 deletions
diff --git a/smime/gui/cert-trust-dialog.c b/smime/gui/cert-trust-dialog.c
index b32a7c58c7..c22c7e6a4a 100644
--- a/smime/gui/cert-trust-dialog.c
+++ b/smime/gui/cert-trust-dialog.c
@@ -144,7 +144,6 @@ cert_trust_dialog_show (ECert *cert)
else
gtk_toggle_button_set_active(GTK_TOGGLE_BUTTON (ctd_data->notrust_button), TRUE);
-
icert = e_cert_get_internal_cert(ctd_data->cacert);
if (e_cert_trust_has_trusted_ca(icert->trust, FALSE, TRUE, FALSE))
gtk_label_set_text((GtkLabel *)ctd_data->label,
diff --git a/smime/gui/certificate-manager.c b/smime/gui/certificate-manager.c
index 6e09b504fd..030946e3cb 100644
--- a/smime/gui/certificate-manager.c
+++ b/smime/gui/certificate-manager.c
@@ -846,7 +846,6 @@ add_ca_cert (CertificateManagerData *cfm, ECert *cert)
}
}
-
gtk_tree_store_append (GTK_TREE_STORE (model), &iter, parent_iter);
if (e_cert_get_cn (cert))
@@ -942,7 +941,6 @@ unload_certs (CertificateManagerData *cfm,
cfm->authoritycerts_root_hash = g_hash_table_new_full (g_str_hash, g_str_equal,
destroy_key, destroy_value);
-
break;
case E_CERT_UNKNOWN:
/* nothing to do here */
diff --git a/smime/lib/e-asn1-object.c b/smime/lib/e-asn1-object.c
index e0d644344b..e8c51b6a24 100644
--- a/smime/lib/e-asn1-object.c
+++ b/smime/lib/e-asn1-object.c
@@ -306,7 +306,6 @@ e_asn1_object_new (void)
return E_ASN1_OBJECT (g_object_new (E_TYPE_ASN1_OBJECT, NULL));
}
-
void
e_asn1_object_set_valid_container (EASN1Object *obj, gboolean flag)
{
diff --git a/smime/lib/e-cert-db.c b/smime/lib/e-cert-db.c
index d0528f7d2f..e0434754a8 100644
--- a/smime/lib/e-cert-db.c
+++ b/smime/lib/e-cert-db.c
@@ -407,7 +407,6 @@ e_cert_db_find_cert_by_nickname (ECertDB *certdb,
cert = CERT_FindCertByNickname(CERT_GetDefaultCertDB(), (gchar *)nickname);
}
-
if (cert) {
/* PR_LOG(gPIPNSSLog, PR_LOG_DEBUG, ("got it\n"));*/
ECert *ecert = e_cert_new (cert);
diff --git a/smime/lib/e-cert-db.h b/smime/lib/e-cert-db.h
index 30d20448cb..0e19e002c5 100644
--- a/smime/lib/e-cert-db.h
+++ b/smime/lib/e-cert-db.h
@@ -81,7 +81,6 @@ GList* e_cert_db_get_cert_nicknames (ECertDB *certdb,
ECertType cert_type,
GError **error);
-
ECert* e_cert_db_find_email_encryption_cert (ECertDB *certdb,
const gchar *nickname,
GError **error);
diff --git a/smime/lib/e-cert.c b/smime/lib/e-cert.c
index 8367b7b8fd..0cea3c50fc 100644
--- a/smime/lib/e-cert.c
+++ b/smime/lib/e-cert.c
@@ -278,7 +278,6 @@ e_cert_new_from_der (gchar *data, guint32 len)
return e_cert_new (cert);
}
-
CERTCertificate*
@@ -676,7 +675,6 @@ get_oid_text (SECItem *oid, gchar **text)
return TRUE;
}
-
static gboolean
process_raw_bytes (SECItem *data, gchar **text)
{
@@ -1069,7 +1067,6 @@ create_tbs_certificate_asn1_struct (ECert *cert, EASN1Object **seq)
e_asn1_object_append_child (sequence, subitem);
g_object_unref (subitem);
-
if (!process_sec_algorithm_id (&cert->priv->cert->signature, &subitem))
return FALSE;
e_asn1_object_set_display_name (subitem, _("Certificate Signature Algorithm"));
diff --git a/smime/lib/e-pkcs12.h b/smime/lib/e-pkcs12.h
index 444afcaadd..6e98fdb0cb 100644
--- a/smime/lib/e-pkcs12.h
+++ b/smime/lib/e-pkcs12.h
@@ -55,7 +55,6 @@ GType e_pkcs12_get_type (void);
EPKCS12* e_pkcs12_new (void);
-
#if 0
/* XXX we're not going to support additional slots in the initial ssl
stuff, so we just always default to the internal token (and thus