From c85109fc322137596bf34cffc5445d568223c60d Mon Sep 17 00:00:00 2001 From: Matthew Barnes Date: Thu, 12 Jul 2012 08:02:18 -0400 Subject: Coding style and whitespace cleanup. --- smime/lib/e-cert-db.c | 14 +++++++------- smime/lib/e-cert.c | 20 ++++++++++---------- 2 files changed, 17 insertions(+), 17 deletions(-) (limited to 'smime/lib') diff --git a/smime/lib/e-cert-db.c b/smime/lib/e-cert-db.c index c9dc1cae24..c74ac0a176 100644 --- a/smime/lib/e-cert-db.c +++ b/smime/lib/e-cert-db.c @@ -495,7 +495,7 @@ install_loadable_roots (void) }; for (i = 0; i < G_N_ELEMENTS (paths_to_check); i++) { - gchar *dll_path = g_module_build_path (paths_to_check [i], "nssckbi"); + gchar *dll_path = g_module_build_path (paths_to_check[i], "nssckbi"); if (g_file_test (dll_path, G_FILE_TEST_EXISTS)) { PRInt32 modType; @@ -503,7 +503,7 @@ install_loadable_roots (void) /* Delete the existing module */ SECMOD_DeleteModule ("Mozilla Root Certs", &modType); - SECMOD_AddNewModule("Mozilla Root Certs",dll_path, 0, 0); + SECMOD_AddNewModule ("Mozilla Root Certs",dll_path, 0, 0); g_free (dll_path); break; } @@ -937,7 +937,7 @@ handle_ca_cert_download (ECertDB *cert_db, CERT_NewTempCertificate (certdb, &der, nsnull, PR_FALSE, PR_TRUE); if (!tmpCert2) { - NS_ASSERTION(0, "Couldn't create temp cert from DER blob\n"); + NS_ASSERTION (0, "Couldn't create temp cert from DER blob\n"); continue; /* Let's try to import the rest of 'em */ } nickname.Adopt (CERT_MakeCANickname (tmpCert2)); @@ -1163,14 +1163,14 @@ default_nickname (CERTCertificate *cert) username = CERT_GetCommonName (&cert->subject); if (username == NULL) - username = PL_strdup(""); + username = PL_strdup (""); if (username == NULL) goto loser; caname = CERT_GetOrgName (&cert->issuer); if (caname == NULL) - caname = PL_strdup(""); + caname = PL_strdup (""); if (caname == NULL) goto loser; @@ -1190,7 +1190,7 @@ default_nickname (CERTCertificate *cert) goto loser; } if (!PK11_IsInternal (slot)) { - tmp = PR_smprintf("%s:%s", PK11_GetTokenName(slot), nickname); + tmp = PR_smprintf ("%s:%s", PK11_GetTokenName (slot), nickname); PR_Free (nickname); nickname = tmp; tmp = NULL; @@ -1198,7 +1198,7 @@ default_nickname (CERTCertificate *cert) tmp = nickname; while (1) { if (count > 1) { - nickname = PR_smprintf("%s #%d", tmp, count); + nickname = PR_smprintf ("%s #%d", tmp, count); } if (nickname == NULL) diff --git a/smime/lib/e-cert.c b/smime/lib/e-cert.c index c3d0b7e351..7b06a80b59 100644 --- a/smime/lib/e-cert.c +++ b/smime/lib/e-cert.c @@ -198,7 +198,7 @@ e_cert_populate (ECert *cert) exploded_tm.tm_mday = explodedTime.tm_mday; exploded_tm.tm_mon = explodedTime.tm_month; exploded_tm.tm_year = explodedTime.tm_year - 1900; - e_utf8_strftime (buf, sizeof(buf), _("%d/%m/%Y"), &exploded_tm); + e_utf8_strftime (buf, sizeof (buf), _("%d/%m/%Y"), &exploded_tm); cert->priv->issued_on_string = g_strdup (buf); PR_ExplodeTime ( @@ -210,7 +210,7 @@ e_cert_populate (ECert *cert) exploded_tm.tm_mday = explodedTime.tm_mday; exploded_tm.tm_mon = explodedTime.tm_month; exploded_tm.tm_year = explodedTime.tm_year - 1900; - e_utf8_strftime (buf, sizeof(buf), _("%d/%m/%Y"), &exploded_tm); + e_utf8_strftime (buf, sizeof (buf), _("%d/%m/%Y"), &exploded_tm); cert->priv->expires_on_string = g_strdup (buf); } @@ -396,13 +396,13 @@ e_cert_get_usage (ECert *cert) { if (cert->priv->usage_string == NULL) { gint i; - GString *str = g_string_new(""); + GString *str = g_string_new (""); CERTCertificate *icert = e_cert_get_internal_cert (cert); for (i = 0; i < G_N_ELEMENTS (usageinfo); i++) { if (icert->keyUsage & usageinfo[i].bit) { if (str->len != 0) - g_string_append(str, ", "); + g_string_append (str, ", "); g_string_append (str, _(usageinfo[i].text)); } } @@ -561,7 +561,7 @@ get_default_oid_format (SECItem *oid, gulong val = oid->data[0]; guint i = val % 40; val /= 40; - written = PR_snprintf(buf, 300, "%lu %u ", val, i); + written = PR_snprintf (buf, 300, "%lu %u ", val, i); if (written < 0) return FALSE; len = written; @@ -581,7 +581,7 @@ get_default_oid_format (SECItem *oid, val = (val << 7) | (j & 0x7f); if (j & 0x80) continue; - written = PR_snprintf(&buf[len], sizeof(buf)-len, "%lu ", val); + written = PR_snprintf (&buf[len], sizeof (buf) - len, "%lu ", val); if (written < 0) return FALSE; @@ -690,7 +690,7 @@ process_raw_bytes (SECItem *data, PRUint32 i; gchar buffer[5]; for (i = 0; i < data->len; i++) { - PR_snprintf(buffer, 5, "%02x ", data->data[i]); + PR_snprintf (buffer, 5, "%02x ", data->data[i]); g_string_append (str, buffer); if ((i + 1) % 16 == 0) { g_string_append (str, "\n"); @@ -1097,11 +1097,11 @@ create_tbs_certificate_asn1_struct (ECert *cert, #ifdef notyet nsCOMPtr < nsIASN1Sequence> validitySequence = new nsNSSASN1Sequence (); - nssComponent->GetPIPNSSBundleString(NS_LITERAL_STRING("CertDumpValidity").get(), + nssComponent->GetPIPNSSBundleString (NS_LITERAL_STRING ("CertDumpValidity").get (), text); validitySequence->SetDisplayName (text); asn1Objects->AppendElement (validitySequence, PR_FALSE); - nssComponent->GetPIPNSSBundleString(NS_LITERAL_STRING("CertDumpNotBefore").get(), + nssComponent->GetPIPNSSBundleString (NS_LITERAL_STRING ("CertDumpNotBefore").get (), text); nsCOMPtr < nsIX509CertValidity> validityData; GetValidity (getter_AddRefs (validityData)); @@ -1114,7 +1114,7 @@ create_tbs_certificate_asn1_struct (ECert *cert, if (NS_FAILED (rv)) return rv; - nssComponent->GetPIPNSSBundleString(NS_LITERAL_STRING("CertDumpNotAfter").get(), + nssComponent->GetPIPNSSBundleString (NS_LITERAL_STRING ("CertDumpNotAfter").get (), text); rv = ProcessTime (notAfter, text.get (), validitySequence); if (NS_FAILED (rv)) -- cgit v1.2.3