Mercurial > pidgin
diff libpurple/plugins/ssl/ssl-nss.c @ 31086:a8cc50c2279f
Remove trailing whitespace
author | Richard Laager <rlaager@wiktel.com> |
---|---|
date | Tue, 04 Jan 2011 06:55:30 +0000 |
parents | fc4bacb35cbc |
children | 105202d802db |
line wrap: on
line diff
--- a/libpurple/plugins/ssl/ssl-nss.c Tue Jan 04 06:42:45 2011 +0000 +++ b/libpurple/plugins/ssl/ssl-nss.c Tue Jan 04 06:55:30 2011 +0000 @@ -289,13 +289,13 @@ GList * peer_certs = NULL; int count; int64 now = PR_Now(); - + curcert = SSL_PeerCertificate(socket); if (curcert == NULL) { purple_debug_error("nss", "could not DupCertificate\n"); return NULL; } - + for (count = 0 ; count < CERT_MAX_CERT_CHAIN ; count++) { purple_debug_info("nss", "subject=%s issuer=%s\n", curcert->subjectName, curcert->issuerName ? curcert->issuerName : "(null)"); @@ -530,7 +530,7 @@ CERT_DestroyCertificate(cert); #endif - + return NULL; } @@ -587,7 +587,7 @@ crt = g_new0(PurpleCertificate, 1); crt->scheme = &x509_nss; crt->data = crt_dat; - + return crt; } @@ -672,7 +672,7 @@ purple_debug_info("nss/x509", "Exporting certificate to %s\n", filename); - + /* First, use NSS voodoo to create a DER-formatted certificate */ dercrt = SEC_ASN1EncodeItem(NULL, NULL, crt_dat, SEC_ASN1_GET(SEC_SignedCertificateTemplate)); @@ -692,7 +692,7 @@ ret = purple_util_write_data_to_file_absolute(filename, pemcrt, -1); g_free(pemcrt); - + return ret; } @@ -713,7 +713,7 @@ newcrt->scheme = &x509_nss; /* NSS does refcounting automatically */ newcrt->data = CERT_DupCertificate(crt_dat); - + return newcrt; } @@ -759,7 +759,7 @@ CERTCertificate *subjectCert; CERTCertificate *issuerCert; SECStatus st; - + issuerCert = X509_NSS_DATA(issuer); g_return_val_if_fail(issuerCert, FALSE); @@ -795,7 +795,7 @@ sha1sum = g_byte_array_sized_new(hashlen); /* glib leaves the size as 0 by default */ sha1sum->len = hashlen; - + st = PK11_HashBuf(SEC_OID_SHA1, sha1sum->data, derCert->data, derCert->len); @@ -814,7 +814,7 @@ x509_dn (PurpleCertificate *crt) { CERTCertificate *crt_dat; - + g_return_val_if_fail(crt, NULL); g_return_val_if_fail(crt->scheme == &x509_nss, NULL); @@ -828,7 +828,7 @@ x509_issuer_dn (PurpleCertificate *crt) { CERTCertificate *crt_dat; - + g_return_val_if_fail(crt, NULL); g_return_val_if_fail(crt->scheme == &x509_nss, NULL); @@ -844,7 +844,7 @@ CERTCertificate *crt_dat; char *nss_cn; gchar *ret_cn; - + g_return_val_if_fail(crt, NULL); g_return_val_if_fail(crt->scheme == &x509_nss, NULL); @@ -875,7 +875,7 @@ { CERTCertificate *crt_dat; SECStatus st; - + g_return_val_if_fail(crt, FALSE); g_return_val_if_fail(crt->scheme == &x509_nss, FALSE); @@ -890,7 +890,7 @@ else if (st == SECFailure) { return FALSE; } - + /* If we get here...bad things! */ purple_debug_error("nss/x509", "x509_check_name fell through where it shouldn't " @@ -903,7 +903,7 @@ { CERTCertificate *crt_dat; PRTime nss_activ, nss_expir; - + g_return_val_if_fail(crt, FALSE); g_return_val_if_fail(crt->scheme == &x509_nss, FALSE); @@ -926,7 +926,7 @@ if (expiration) { *expiration = nss_expir / 1000000; } - + return TRUE; }