X-Git-Url: http://git.madism.org/?p=apps%2Fmadmutt.git;a=blobdiff_plain;f=crypt.c;h=c0c64ad4ab46d6edc3552251d4c3722ef2df23b9;hp=dad41c3cc44d4ec43e0e2b7094ef54ebe0622af5;hb=df5b14084b39821395408679a2fb6f74605182ce;hpb=8e037c67a88cb4680c4391134c578e3b55a80f8a diff --git a/crypt.c b/crypt.c index dad41c3..c0c64ad 100644 --- a/crypt.c +++ b/crypt.c @@ -16,20 +16,21 @@ # include "config.h" #endif +#include +#include +#include #include +#include + +#include #include "mutt.h" -#include "ascii.h" #include "handler.h" #include "mutt_curses.h" -#include "mime.h" #include "copy.h" #include "mutt_crypt.h" #include "pgp.h" -#include "lib/mem.h" -#include "lib/intl.h" -#include "lib/str.h" #include #include @@ -390,7 +391,7 @@ int mutt_is_application_smime (BODY * m) /* no .p7c, .p10 support yet. */ - len = str_len (t) - 4; + len = m_strlen(t) - 4; if (len > 0 && *(t + len) == '.') { len++; if (!ascii_strcasecmp ((t + len), "p7m")) @@ -532,7 +533,7 @@ void convert_to_7bit (BODY * a) convert_to_7bit (a->parts); } else if (a->type == TYPEMESSAGE && - str_casecmp (a->subtype, "delivery-status")) { + m_strcasecmp(a->subtype, "delivery-status")) { if (a->encoding != ENC7BIT) mutt_message_to_7bit (a, NULL); } @@ -555,7 +556,7 @@ void crypt_extract_keys_from_messages (HEADER * h) { int i; char tempfname[_POSIX_PATH_MAX], *mbox; - ADDRESS *tmp = NULL; + address_t *tmp = NULL; FILE *fpout; if (!WithCrypto) @@ -699,7 +700,7 @@ int crypt_get_keys (HEADER * msg, char **keylist) -static void crypt_fetch_signatures (BODY *** signatures, BODY * a, int *n) +static void crypt_fetch_signatures (BODY ***signatures, BODY * a, int *n) { if (!WithCrypto) return; @@ -709,7 +710,7 @@ static void crypt_fetch_signatures (BODY *** signatures, BODY * a, int *n) crypt_fetch_signatures (signatures, a->parts, n); else { if ((*n % 5) == 0) - mem_realloc (signatures, (*n + 6) * sizeof (BODY **)); + p_realloc(signatures, *n + 6); (*signatures)[(*n)++] = a; } @@ -750,7 +751,7 @@ int mutt_signed_handler (BODY * a, STATE * s) if ((protocol_minor = strchr (protocol, '/'))) protocol_minor++; - strfcpy (major, protocol, sizeof (major)); + m_strcpy(major, sizeof(major), protocol); if ((t = strchr (major, '/'))) *t = '\0'; @@ -760,7 +761,7 @@ int mutt_signed_handler (BODY * a, STATE * s) /* consistency check */ if (!(a && a->next && a->next->type == protocol_major && - !str_casecmp (a->next->subtype, protocol_minor))) { + !m_strcasecmp(a->next->subtype, protocol_minor))) { state_attach_puts (_("[-- Error: " "Inconsistent multipart/signed structure! --]\n\n"), s); @@ -770,13 +771,13 @@ int mutt_signed_handler (BODY * a, STATE * s) if ((WithCrypto & APPLICATION_PGP) && protocol_major == TYPEAPPLICATION - && !str_casecmp (protocol_minor, "pgp-signature")); + && !m_strcasecmp(protocol_minor, "pgp-signature")); else if ((WithCrypto & APPLICATION_SMIME) && protocol_major == TYPEAPPLICATION - && !(str_casecmp (protocol_minor, "x-pkcs7-signature") - && str_casecmp (protocol_minor, "pkcs7-signature"))); + && !(m_strcasecmp(protocol_minor, "x-pkcs7-signature") + && m_strcasecmp(protocol_minor, "pkcs7-signature"))); else if (protocol_major == TYPEMULTIPART - && !str_casecmp (protocol_minor, "mixed")); + && !m_strcasecmp(protocol_minor, "mixed")); else { state_printf (s, _("[-- Error: " "Unknown multipart/signed protocol %s! --]\n\n"), @@ -794,7 +795,7 @@ int mutt_signed_handler (BODY * a, STATE * s) for (i = 0; i < sigcnt; i++) { if ((WithCrypto & APPLICATION_PGP) && signatures[i]->type == TYPEAPPLICATION - && !str_casecmp (signatures[i]->subtype, "pgp-signature")) { + && !m_strcasecmp(signatures[i]->subtype, "pgp-signature")) { if (crypt_pgp_verify_one (signatures[i], s, tempfile) != 0) goodsig = 0; @@ -804,8 +805,8 @@ int mutt_signed_handler (BODY * a, STATE * s) if ((WithCrypto & APPLICATION_SMIME) && signatures[i]->type == TYPEAPPLICATION && - (!str_casecmp (signatures[i]->subtype, "x-pkcs7-signature") - || !str_casecmp (signatures[i]->subtype, + (!m_strcasecmp(signatures[i]->subtype, "x-pkcs7-signature") + || !m_strcasecmp(signatures[i]->subtype, "pkcs7-signature"))) { if (crypt_smime_verify_one (signatures[i], s, tempfile) != 0) goodsig = 0;