From 374bd42f69aca2e132fd854c9619f3d7491f1f96 Mon Sep 17 00:00:00 2001 From: Matthew Barnes Date: Sun, 12 Jul 2009 23:33:07 -0400 Subject: Fix excessive whitespace. --- smime/gui/cert-trust-dialog.c | 1 - smime/gui/certificate-manager.c | 2 -- smime/lib/e-asn1-object.c | 1 - smime/lib/e-cert-db.c | 1 - smime/lib/e-cert-db.h | 1 - smime/lib/e-cert.c | 3 --- smime/lib/e-pkcs12.h | 1 - 7 files changed, 10 deletions(-) (limited to 'smime') diff --git a/smime/gui/cert-trust-dialog.c b/smime/gui/cert-trust-dialog.c index b32a7c58c7..c22c7e6a4a 100644 --- a/smime/gui/cert-trust-dialog.c +++ b/smime/gui/cert-trust-dialog.c @@ -144,7 +144,6 @@ cert_trust_dialog_show (ECert *cert) else gtk_toggle_button_set_active(GTK_TOGGLE_BUTTON (ctd_data->notrust_button), TRUE); - icert = e_cert_get_internal_cert(ctd_data->cacert); if (e_cert_trust_has_trusted_ca(icert->trust, FALSE, TRUE, FALSE)) gtk_label_set_text((GtkLabel *)ctd_data->label, diff --git a/smime/gui/certificate-manager.c b/smime/gui/certificate-manager.c index 6e09b504fd..030946e3cb 100644 --- a/smime/gui/certificate-manager.c +++ b/smime/gui/certificate-manager.c @@ -846,7 +846,6 @@ add_ca_cert (CertificateManagerData *cfm, ECert *cert) } } - gtk_tree_store_append (GTK_TREE_STORE (model), &iter, parent_iter); if (e_cert_get_cn (cert)) @@ -942,7 +941,6 @@ unload_certs (CertificateManagerData *cfm, cfm->authoritycerts_root_hash = g_hash_table_new_full (g_str_hash, g_str_equal, destroy_key, destroy_value); - break; case E_CERT_UNKNOWN: /* nothing to do here */ diff --git a/smime/lib/e-asn1-object.c b/smime/lib/e-asn1-object.c index e0d644344b..e8c51b6a24 100644 --- a/smime/lib/e-asn1-object.c +++ b/smime/lib/e-asn1-object.c @@ -306,7 +306,6 @@ e_asn1_object_new (void) return E_ASN1_OBJECT (g_object_new (E_TYPE_ASN1_OBJECT, NULL)); } - void e_asn1_object_set_valid_container (EASN1Object *obj, gboolean flag) { diff --git a/smime/lib/e-cert-db.c b/smime/lib/e-cert-db.c index d0528f7d2f..e0434754a8 100644 --- a/smime/lib/e-cert-db.c +++ b/smime/lib/e-cert-db.c @@ -407,7 +407,6 @@ e_cert_db_find_cert_by_nickname (ECertDB *certdb, cert = CERT_FindCertByNickname(CERT_GetDefaultCertDB(), (gchar *)nickname); } - if (cert) { /* PR_LOG(gPIPNSSLog, PR_LOG_DEBUG, ("got it\n"));*/ ECert *ecert = e_cert_new (cert); diff --git a/smime/lib/e-cert-db.h b/smime/lib/e-cert-db.h index 30d20448cb..0e19e002c5 100644 --- a/smime/lib/e-cert-db.h +++ b/smime/lib/e-cert-db.h @@ -81,7 +81,6 @@ GList* e_cert_db_get_cert_nicknames (ECertDB *certdb, ECertType cert_type, GError **error); - ECert* e_cert_db_find_email_encryption_cert (ECertDB *certdb, const gchar *nickname, GError **error); diff --git a/smime/lib/e-cert.c b/smime/lib/e-cert.c index 8367b7b8fd..0cea3c50fc 100644 --- a/smime/lib/e-cert.c +++ b/smime/lib/e-cert.c @@ -278,7 +278,6 @@ e_cert_new_from_der (gchar *data, guint32 len) return e_cert_new (cert); } - CERTCertificate* @@ -676,7 +675,6 @@ get_oid_text (SECItem *oid, gchar **text) return TRUE; } - static gboolean process_raw_bytes (SECItem *data, gchar **text) { @@ -1069,7 +1067,6 @@ create_tbs_certificate_asn1_struct (ECert *cert, EASN1Object **seq) e_asn1_object_append_child (sequence, subitem); g_object_unref (subitem); - if (!process_sec_algorithm_id (&cert->priv->cert->signature, &subitem)) return FALSE; e_asn1_object_set_display_name (subitem, _("Certificate Signature Algorithm")); diff --git a/smime/lib/e-pkcs12.h b/smime/lib/e-pkcs12.h index 444afcaadd..6e98fdb0cb 100644 --- a/smime/lib/e-pkcs12.h +++ b/smime/lib/e-pkcs12.h @@ -55,7 +55,6 @@ GType e_pkcs12_get_type (void); EPKCS12* e_pkcs12_new (void); - #if 0 /* XXX we're not going to support additional slots in the initial ssl stuff, so we just always default to the internal token (and thus -- cgit