/* Return a bit vector describing how well the addresses ADDR and
U_ADDR match and whether KEY is valid. */
/* Return a bit vector describing how well the addresses ADDR and
U_ADDR match and whether KEY is valid. */
if (!m_strcmp("MESSAGE-----\n", buf + 15))
enc = 1;
else if (!m_strcmp("SIGNED MESSAGE-----\n", buf + 15))
if (!m_strcmp("MESSAGE-----\n", buf + 15))
enc = 1;
else if (!m_strcmp("SIGNED MESSAGE-----\n", buf + 15))
but we know that this may only be text thus we assume Latin-1
here. */
if (!mutt_get_body_charset (body_charset, sizeof (body_charset), m))
but we know that this may only be text thus we assume Latin-1
here. */
if (!mutt_get_body_charset (body_charset, sizeof (body_charset), m))
for (t = strtok (scratch, " ,.:\"()<>\n"); t;
t = strtok (NULL, " ,.:\"()<>\n")) {
if (m_strlen(t) > 3)
for (t = strtok (scratch, " ,.:\"()<>\n"); t;
t = strtok (NULL, " ,.:\"()<>\n")) {
if (m_strlen(t) > 3)
will be set to true on return if the user did override the the
key's validity. */
static crypt_key_t *crypt_select_key (crypt_key_t * keys,
will be set to true on return if the user did override the the
key's validity. */
static crypt_key_t *crypt_select_key (crypt_key_t * keys,
match = 0;
debug_print (5, ("matching \"%s\" against " "key %s, \"%s\":\n", p, crypt_keyid (k), k->uid));
match = 0;
debug_print (5, ("matching \"%s\" against " "key %s, \"%s\":\n", p, crypt_keyid (k), k->uid));
- if (!*p || !str_casecmp (p, crypt_keyid (k))
- || (!str_ncasecmp (p, "0x", 2)
- && !str_casecmp (p + 2, crypt_keyid (k)))
+ if (!*p || !m_strcasecmp(p, crypt_keyid (k))
+ || (!m_strncasecmp(p, "0x", 2)
+ && !m_strcasecmp(p + 2, crypt_keyid (k)))
- && !str_ncasecmp (p, "0x", 2)
- && !str_casecmp (p + 2, crypt_keyid (k) + 8))
- || str_isstr (k->uid, p)) {
+ && !m_strncasecmp(p, "0x", 2)
+ && !m_strcasecmp(p + 2, crypt_keyid (k) + 8))
+ || m_stristr(k->uid, p)) {
- if (!str_casecmp (whatfor, l->what)) {
- strfcpy (resp, NONULL (l->dflt), sizeof (resp));
+ if (!m_strcasecmp(whatfor, l->what)) {
+ m_strcpy(resp, sizeof(resp), NONULL(l->dflt));
/* This routine attempts to find the keyids of the recipients of a
message. It returns NULL if any of the keys can not be found. */
/* This routine attempts to find the keyids of the recipients of a
message. It returns NULL if any of the keys can not be found. */
-static char *find_keys (ADDRESS * to, ADDRESS * cc, ADDRESS * bcc,
+static char *find_keys (address_t * to, address_t * cc, address_t * bcc,
int i;
crypt_key_t *k_info, *key;
const char *fqdn = mutt_fqdn (1);
int i;
crypt_key_t *k_info, *key;
const char *fqdn = mutt_fqdn (1);
{
return find_keys (to, cc, bcc, APPLICATION_PGP);
}
{
return find_keys (to, cc, bcc, APPLICATION_PGP);
}
{
return find_keys (to, cc, bcc, APPLICATION_SMIME);
}
{
return find_keys (to, cc, bcc, APPLICATION_SMIME);
}
is_smime ? APPLICATION_SMIME :
APPLICATION_PGP, NULL))) {
snprintf (input_signas, sizeof (input_signas), "0x%s", crypt_keyid (p));
is_smime ? APPLICATION_SMIME :
APPLICATION_PGP, NULL))) {
snprintf (input_signas, sizeof (input_signas), "0x%s", crypt_keyid (p));