int mutt_display_message (HEADER * cur)
{
char tempfile[_POSIX_PATH_MAX], buf[LONG_STRING];
- int rc = 0, builtin = 0;
int cmflags = M_CM_DECODE | M_CM_DISPLAY | M_CM_CHARCONV;
FILE *fpout = NULL;
FILE *fpfilterout = NULL;
}
}
- if (!Pager || m_strcmp(Pager, "builtin") == 0)
- builtin = 1;
- else {
- mutt_make_string (buf, sizeof (buf), NONULL (PagerFmt), Context, cur);
- fputs (buf, fpout);
- fputs ("\n\n", fpout);
- }
-
msg = mx_open_message (Context, cur->msgno);
if (msg == NULL) res = -1;
}
else if (cur->security & SIGN) {
/* find out whether or not the verify signature */
- if (query_quadoption (OPT_VERIFYSIG, _("Verify PGP signature?")) ==
+ if (query_quadoption2(mod_crypt.verify_sig, _("Verify PGP signature?")) ==
M_YES) {
cmflags |= M_CM_VERIFY;
}
are color patterns for both ~g and ~V */
cur->pair = 0;
- if (builtin) {
- pager_t info;
-
- if ((cur->security & APPLICATION_SMIME) && (cmflags & M_CM_VERIFY)) {
- if (cur->security & GOODSIGN) {
- if (!crypt_smime_verify_sender (cur))
- mutt_message (_("S/MIME signature successfully verified."));
- else
- mutt_error (_("S/MIME certificate owner does not match sender."));
- }
- else if (cur->security & PARTSIGN)
- mutt_message (_
- ("Warning: Part of this message has not been signed."));
- else if (cur->security & SIGN || cur->security & BADSIGN)
- mutt_error (_("S/MIME signature could NOT be verified."));
+ if ((cur->security & APPLICATION_SMIME) && (cmflags & M_CM_VERIFY)) {
+ if (cur->security & GOODSIGN) {
+ if (!crypt_smime_verify_sender (cur))
+ mutt_message (_("S/MIME signature successfully verified."));
+ else
+ mutt_error (_("S/MIME certificate owner does not match sender."));
}
+ else if (cur->security & PARTSIGN)
+ mutt_message (_
+ ("Warning: Part of this message has not been signed."));
+ else if (cur->security & SIGN || cur->security & BADSIGN)
+ mutt_error (_("S/MIME signature could NOT be verified."));
+ }
- if ((cur->security & APPLICATION_PGP) && (cmflags & M_CM_VERIFY)) {
- if (cur->security & GOODSIGN)
- mutt_message (_("PGP signature successfully verified."));
- else if (cur->security & PARTSIGN)
- mutt_message (_
- ("Warning: Part of this message has not been signed."));
- else if (cur->security & SIGN)
- mutt_message (_("PGP signature could NOT be verified."));
- }
+ if ((cur->security & APPLICATION_PGP) && (cmflags & M_CM_VERIFY)) {
+ if (cur->security & GOODSIGN)
+ mutt_message (_("PGP signature successfully verified."));
+ else if (cur->security & PARTSIGN)
+ mutt_message (_
+ ("Warning: Part of this message has not been signed."));
+ else if (cur->security & SIGN)
+ mutt_message (_("PGP signature could NOT be verified."));
+ }
+
+ {
+ pager_t info;
- /* Invoke the builtin pager */
p_clear(&info, 1);
info.hdr = cur;
info.ctx = Context;
- rc = mutt_pager (NULL, tempfile, M_PAGER_MESSAGE, &info);
- }
- else {
- int r;
-
- mutt_endwin (NULL);
- snprintf (buf, sizeof (buf), "%s %s", NONULL (Pager), tempfile);
- if ((r = mutt_system (buf)) == -1)
- mutt_error (_("Error running \"%s\"!"), buf);
- unlink (tempfile);
- keypad (stdscr, TRUE);
- if (r != -1)
- mutt_set_flag (Context, cur, M_READ, 1);
- if (r != -1 && option (OPTPROMPTAFTER)) {
- mutt_ungetch (mutt_any_key_to_continue _("Command: "), 0);
- rc = km_dokey (MENU_PAGER);
- }
- else
- rc = 0;
+ return mutt_pager (NULL, tempfile, M_PAGER_MESSAGE, &info);
}
-
- return rc;
}
void ci_bounce_message (HEADER * h, int *redraw)
}
}
- need_buffy_cleanup = (ctx.magic == M_MBOX || ctx.magic == M_MMDF);
+ need_buffy_cleanup = (ctx.magic == M_MBOX);
mx_close_mailbox (&ctx, NULL);