aboutsummaryrefslogtreecommitdiffstats
path: root/smime/lib
diff options
context:
space:
mode:
Diffstat (limited to 'smime/lib')
-rw-r--r--smime/lib/e-cert-db.c14
-rw-r--r--smime/lib/e-cert.c20
2 files changed, 17 insertions, 17 deletions
diff --git a/smime/lib/e-cert-db.c b/smime/lib/e-cert-db.c
index c9dc1cae24..c74ac0a176 100644
--- a/smime/lib/e-cert-db.c
+++ b/smime/lib/e-cert-db.c
@@ -495,7 +495,7 @@ install_loadable_roots (void)
};
for (i = 0; i < G_N_ELEMENTS (paths_to_check); i++) {
- gchar *dll_path = g_module_build_path (paths_to_check [i], "nssckbi");
+ gchar *dll_path = g_module_build_path (paths_to_check[i], "nssckbi");
if (g_file_test (dll_path, G_FILE_TEST_EXISTS)) {
PRInt32 modType;
@@ -503,7 +503,7 @@ install_loadable_roots (void)
/* Delete the existing module */
SECMOD_DeleteModule ("Mozilla Root Certs", &modType);
- SECMOD_AddNewModule("Mozilla Root Certs",dll_path, 0, 0);
+ SECMOD_AddNewModule ("Mozilla Root Certs",dll_path, 0, 0);
g_free (dll_path);
break;
}
@@ -937,7 +937,7 @@ handle_ca_cert_download (ECertDB *cert_db,
CERT_NewTempCertificate (certdb, &der, nsnull, PR_FALSE, PR_TRUE);
if (!tmpCert2) {
- NS_ASSERTION(0, "Couldn't create temp cert from DER blob\n");
+ NS_ASSERTION (0, "Couldn't create temp cert from DER blob\n");
continue; /* Let's try to import the rest of 'em */
}
nickname.Adopt (CERT_MakeCANickname (tmpCert2));
@@ -1163,14 +1163,14 @@ default_nickname (CERTCertificate *cert)
username = CERT_GetCommonName (&cert->subject);
if (username == NULL)
- username = PL_strdup("");
+ username = PL_strdup ("");
if (username == NULL)
goto loser;
caname = CERT_GetOrgName (&cert->issuer);
if (caname == NULL)
- caname = PL_strdup("");
+ caname = PL_strdup ("");
if (caname == NULL)
goto loser;
@@ -1190,7 +1190,7 @@ default_nickname (CERTCertificate *cert)
goto loser;
}
if (!PK11_IsInternal (slot)) {
- tmp = PR_smprintf("%s:%s", PK11_GetTokenName(slot), nickname);
+ tmp = PR_smprintf ("%s:%s", PK11_GetTokenName (slot), nickname);
PR_Free (nickname);
nickname = tmp;
tmp = NULL;
@@ -1198,7 +1198,7 @@ default_nickname (CERTCertificate *cert)
tmp = nickname;
while (1) {
if (count > 1) {
- nickname = PR_smprintf("%s #%d", tmp, count);
+ nickname = PR_smprintf ("%s #%d", tmp, count);
}
if (nickname == NULL)
diff --git a/smime/lib/e-cert.c b/smime/lib/e-cert.c
index c3d0b7e351..7b06a80b59 100644
--- a/smime/lib/e-cert.c
+++ b/smime/lib/e-cert.c
@@ -198,7 +198,7 @@ e_cert_populate (ECert *cert)
exploded_tm.tm_mday = explodedTime.tm_mday;
exploded_tm.tm_mon = explodedTime.tm_month;
exploded_tm.tm_year = explodedTime.tm_year - 1900;
- e_utf8_strftime (buf, sizeof(buf), _("%d/%m/%Y"), &exploded_tm);
+ e_utf8_strftime (buf, sizeof (buf), _("%d/%m/%Y"), &exploded_tm);
cert->priv->issued_on_string = g_strdup (buf);
PR_ExplodeTime (
@@ -210,7 +210,7 @@ e_cert_populate (ECert *cert)
exploded_tm.tm_mday = explodedTime.tm_mday;
exploded_tm.tm_mon = explodedTime.tm_month;
exploded_tm.tm_year = explodedTime.tm_year - 1900;
- e_utf8_strftime (buf, sizeof(buf), _("%d/%m/%Y"), &exploded_tm);
+ e_utf8_strftime (buf, sizeof (buf), _("%d/%m/%Y"), &exploded_tm);
cert->priv->expires_on_string = g_strdup (buf);
}
@@ -396,13 +396,13 @@ e_cert_get_usage (ECert *cert)
{
if (cert->priv->usage_string == NULL) {
gint i;
- GString *str = g_string_new("");
+ GString *str = g_string_new ("");
CERTCertificate *icert = e_cert_get_internal_cert (cert);
for (i = 0; i < G_N_ELEMENTS (usageinfo); i++) {
if (icert->keyUsage & usageinfo[i].bit) {
if (str->len != 0)
- g_string_append(str, ", ");
+ g_string_append (str, ", ");
g_string_append (str, _(usageinfo[i].text));
}
}
@@ -561,7 +561,7 @@ get_default_oid_format (SECItem *oid,
gulong val = oid->data[0];
guint i = val % 40;
val /= 40;
- written = PR_snprintf(buf, 300, "%lu %u ", val, i);
+ written = PR_snprintf (buf, 300, "%lu %u ", val, i);
if (written < 0)
return FALSE;
len = written;
@@ -581,7 +581,7 @@ get_default_oid_format (SECItem *oid,
val = (val << 7) | (j & 0x7f);
if (j & 0x80)
continue;
- written = PR_snprintf(&buf[len], sizeof(buf)-len, "%lu ", val);
+ written = PR_snprintf (&buf[len], sizeof (buf) - len, "%lu ", val);
if (written < 0)
return FALSE;
@@ -690,7 +690,7 @@ process_raw_bytes (SECItem *data,
PRUint32 i;
gchar buffer[5];
for (i = 0; i < data->len; i++) {
- PR_snprintf(buffer, 5, "%02x ", data->data[i]);
+ PR_snprintf (buffer, 5, "%02x ", data->data[i]);
g_string_append (str, buffer);
if ((i + 1) % 16 == 0) {
g_string_append (str, "\n");
@@ -1097,11 +1097,11 @@ create_tbs_certificate_asn1_struct (ECert *cert,
#ifdef notyet
nsCOMPtr < nsIASN1Sequence> validitySequence = new nsNSSASN1Sequence ();
- nssComponent->GetPIPNSSBundleString(NS_LITERAL_STRING("CertDumpValidity").get(),
+ nssComponent->GetPIPNSSBundleString (NS_LITERAL_STRING ("CertDumpValidity").get (),
text);
validitySequence->SetDisplayName (text);
asn1Objects->AppendElement (validitySequence, PR_FALSE);
- nssComponent->GetPIPNSSBundleString(NS_LITERAL_STRING("CertDumpNotBefore").get(),
+ nssComponent->GetPIPNSSBundleString (NS_LITERAL_STRING ("CertDumpNotBefore").get (),
text);
nsCOMPtr < nsIX509CertValidity> validityData;
GetValidity (getter_AddRefs (validityData));
@@ -1114,7 +1114,7 @@ create_tbs_certificate_asn1_struct (ECert *cert,
if (NS_FAILED (rv))
return rv;
- nssComponent->GetPIPNSSBundleString(NS_LITERAL_STRING("CertDumpNotAfter").get(),
+ nssComponent->GetPIPNSSBundleString (NS_LITERAL_STRING ("CertDumpNotAfter").get (),
text);
rv = ProcessTime (notAfter, text.get (), validitySequence);
if (NS_FAILED (rv))