X-Git-Url: http://git.madism.org/?p=apps%2Fmadmutt.git;a=blobdiff_plain;f=crypt-gpgme.c;h=8bb78669269734d6f8a9c4364afbd0c934360f58;hp=25f8f02d8432423882d9e55bae3e4c6f214de9cb;hb=617e7d83d14e14e6a520a48e75437211b16c8834;hpb=8e037c67a88cb4680c4391134c578e3b55a80f8a diff --git a/crypt-gpgme.c b/crypt-gpgme.c index 25f8f02..8bb7866 100644 --- a/crypt-gpgme.c +++ b/crypt-gpgme.c @@ -33,7 +33,6 @@ #include "recvattach.h" #include "sort.h" -#include "lib/mem.h" #include "lib/intl.h" #include "lib/str.h" #include "lib/debug.h" @@ -212,11 +211,11 @@ static char crypt_flags (int flags) } /* Return a copy of KEY. */ -static crypt_key_t *crypt_copy_key (crypt_key_t * key) +static crypt_key_t *crypt_copy_key (crypt_key_t *key) { crypt_key_t *k; - k = mem_calloc (1, sizeof *k); + k = p_new(crypt_key_t, 1); k->kobj = key->kobj; gpgme_key_ref (key->kobj); k->idx = key->idx; @@ -554,7 +553,7 @@ static gpgme_key_t *create_recipient_set (const char *keylist, err = gpgme_get_key (context, buf, &key, 0); if (!err) { - mem_realloc (&rset, sizeof (*rset) * (rset_n + 1)); + p_realloc(&rset, rset_n + 1); rset[rset_n++] = key; } else { @@ -568,7 +567,7 @@ static gpgme_key_t *create_recipient_set (const char *keylist, } /* NULL terminate. */ - mem_realloc (&rset, sizeof (*rset) * (rset_n + 1)); + p_realloc(&rset, rset_n + 1); rset[rset_n++] = NULL; if (context) @@ -3037,7 +3036,7 @@ static char *list_to_pattern (LIST * list) n++; /* delimiter or end of string */ } n++; /* make sure to allocate at least one byte */ - pattern = p = mem_calloc (1, n); + pattern = p = p_new(char, n); for (l = list; l; l = l->next) { s = l->data; if (*s) { @@ -3108,7 +3107,7 @@ static crypt_key_t *get_candidates (LIST * hints, unsigned int app, if (!n) goto no_pgphints; - patarr = mem_calloc (n + 1, sizeof *patarr); + patarr = p_new(char *, n + 1); for (l = hints, n = 0; l; l = l->next) { if (l->data && *l->data) patarr[n++] = str_dup (l->data); @@ -3154,7 +3153,7 @@ static crypt_key_t *get_candidates (LIST * hints, unsigned int app, #endif /* DISABLED code */ for (idx = 0, uid = key->uids; uid; idx++, uid = uid->next) { - k = mem_calloc (1, sizeof *k); + k = p_new(crypt_key_t, 1); k->kobj = key; k->idx = idx; k->uid = uid->uid; @@ -3190,7 +3189,7 @@ static crypt_key_t *get_candidates (LIST * hints, unsigned int app, flags |= KEYFLAG_CANSIGN; for (idx = 0, uid = key->uids; uid; idx++, uid = uid->next) { - k = mem_calloc (1, sizeof *k); + k = p_new(crypt_key_t, 1); k->kobj = key; k->idx = idx; k->uid = uid->uid; @@ -3259,7 +3258,7 @@ static crypt_key_t *crypt_select_key (crypt_key_t * keys, if (i == keymax) { keymax += 20; - mem_realloc (&key_table, sizeof (crypt_key_t *) * keymax); + p_realloc(&key_table, keymax); } key_table[i++] = k; @@ -3768,7 +3767,7 @@ static char *find_keys (ADDRESS * to, ADDRESS * cc, ADDRESS * bcc, #endif keylist_size += str_len (s) + 4 + 1; - mem_realloc (&keylist, keylist_size); + p_realloc(&keylist, keylist_size); sprintf (keylist + keylist_used, "%s0x%s%s", /* __SPRINTF_CHECKED__ */ keylist_used ? " " : "", s, forced_valid ? "!" : ""); }