X-Git-Url: http://git.madism.org/?p=apps%2Fmadmutt.git;a=blobdiff_plain;f=lib-crypt%2Fpgp.c;h=297eb73764c12b24a4767ab32c2a12f9bdb6562c;hp=ea63f2c76eb33833e0589e0352bacef8d8deb146;hb=a4e6d1eb7521b75921259ae370607074dde0e765;hpb=9ed7a487e3a922f2cbb222961c2c9710c3a65f91 diff --git a/lib-crypt/pgp.c b/lib-crypt/pgp.c index ea63f2c..297eb73 100644 --- a/lib-crypt/pgp.c +++ b/lib-crypt/pgp.c @@ -130,7 +130,7 @@ static int pgp_copy_checksig (FILE * fpin, FILE * fpout) rv = 0; } - if (strncmp (line, "[GNUPG:] ", 9) == 0) + if (m_strncmp (line, "[GNUPG:] ", 9) == 0) continue; fputs (line, fpout); fputc ('\n', fpout); @@ -454,6 +454,7 @@ static int pgp_check_traditional_one_body (FILE * fp, BODY * b, char tempfile[_POSIX_PATH_MAX]; char buf[HUGE_STRING]; FILE *tfp; + int tempfd; short sgn = 0; short enc = 0; @@ -465,14 +466,14 @@ static int pgp_check_traditional_one_body (FILE * fp, BODY * b, if (tagged_only && !b->tagged) return 0; - mutt_mktemp (tempfile); - if (mutt_decode_save_attachment (fp, b, tempfile, 0, 0) != 0) { + tempfd = m_tempfd(tempfile, sizeof(tempfile), NONULL(Tempdir), NULL); + if (mutt_decode_save_attachment (fp, b, tempfd, 0) != 0) { unlink (tempfile); return 0; } - if ((tfp = fopen (tempfile, "r")) == NULL) { - unlink (tempfile); + if (!(tfp = fopen(tempfile, "r"))) { + unlink(tempfile); return 0; } @@ -595,7 +596,7 @@ static void pgp_extract_keys_from_attachment (FILE * fp, BODY * top) tempfp = m_tempfile(tempfname, sizeof(tempfname), NONULL(Tempdir), NULL); if (tempfp == NULL) { - mutt_perror (tempfname); + mutt_perror (_("Can't create temporary file")); return; } @@ -649,14 +650,14 @@ BODY *pgp_decrypt_part (BODY * a, STATE * s, FILE * fpout, BODY * p) int rv; pgperr = m_tempfile(pgperrfile, sizeof(pgperrfile), NONULL(Tempdir), NULL); - if (pgperr == NULL) { + if (!pgperr) { mutt_perror (pgperrfile); return NULL; } unlink (pgperrfile); pgptmp = m_tempfile(pgptmpfile, sizeof(pgptmpfile), NONULL(Tempdir), NULL); - if (!pgptmp == NULL) { + if (!pgptmp) { mutt_perror (pgptmpfile); m_fclose(&pgperr); return NULL; @@ -695,7 +696,7 @@ BODY *pgp_decrypt_part (BODY * a, STATE * s, FILE * fpout, BODY * p) while (fgets (buf, sizeof (buf) - 1, pgpout) != NULL) { len = m_strlen(buf); if (len > 1 && buf[len - 2] == '\r') - strcpy (buf + len - 2, "\n"); /* __STRCPY_CHECKED__ */ + m_strcpy(buf + len - 2, len - 2, "\n"); fputs (buf, fpout); } @@ -758,7 +759,7 @@ int pgp_decrypt_mime (FILE * fpin, FILE ** fpout, BODY * b, BODY ** cur) s.fpin = fpin; *fpout = m_tempfile(tempfile, sizeof(tempfile), NONULL(Tempdir), NULL); if (*fpout == NULL) { - mutt_perror (tempfile); + mutt_perror (_("Can't create temporary file")); return (-1); } unlink (tempfile); @@ -974,7 +975,7 @@ BODY *pgp_sign_message (BODY * a) static short is_numerical_keyid (const char *s) { /* or should we require the "0x"? */ - if (strncmp (s, "0x", 2) == 0) + if (m_strncmp (s, "0x", 2) == 0) s += 2; if (m_strlen(s) % 8) return 0; @@ -1022,8 +1023,7 @@ char *pgp_findKeys (address_t * to, address_t * cc, address_t * bcc) last = &((*last)->next); } - if (fqdn) - rfc822_qualify (tmp, fqdn); + rfc822_qualify (tmp, fqdn); address_list_uniq(tmp); @@ -1040,7 +1040,7 @@ char *pgp_findKeys (address_t * to, address_t * cc, address_t * bcc) p->mailbox); if ((r = mutt_yesorno (buf, M_YES)) == M_YES) { if (is_numerical_keyid (keyID)) { - if (strncmp (keyID, "0x", 2) == 0) + if (m_strncmp (keyID, "0x", 2) == 0) keyID += 2; goto bypass_selection; /* you don't see this. */ } @@ -1048,8 +1048,7 @@ char *pgp_findKeys (address_t * to, address_t * cc, address_t * bcc) /* check for e-mail address */ if ((t = strchr (keyID, '@')) && (addr = rfc822_parse_adrlist (NULL, keyID))) { - if (fqdn) - rfc822_qualify (addr, fqdn); + rfc822_qualify (addr, fqdn); q = addr; } else @@ -1087,7 +1086,7 @@ char *pgp_findKeys (address_t * to, address_t * cc, address_t * bcc) bypass_selection: keylist_size += m_strlen(keyID) + 4; p_realloc(&keylist, keylist_size); - sprintf (keylist + keylist_used, "%s0x%s", keylist_used ? " " : "", /* __SPRINTF_CHECKED__ */ + sprintf (keylist + keylist_used, "%s0x%s", keylist_used ? " " : "", keyID); keylist_used = m_strlen(keylist); @@ -1115,7 +1114,7 @@ BODY *pgp_encrypt_message (BODY * a, char *keylist, int sign) fpout = m_tempfile(tempfile, sizeof(tempfile), NONULL(Tempdir), NULL); if (fpout == NULL) { - mutt_perror (tempfile); + mutt_perror (_("Can't create temporary file")); return (NULL); } @@ -1388,7 +1387,7 @@ BODY *pgp_traditional_encryptsign (BODY * a, int flags, char *keylist) int pgp_send_menu (HEADER * msg, int *redraw) { pgp_key_t p; - char input_signas[SHORT_STRING]; + char input_signas[STRING]; char prompt[LONG_STRING]; @@ -1426,11 +1425,6 @@ int pgp_send_menu (HEADER * msg, int *redraw) crypt_pgp_void_passphrase (); /* probably need a different passphrase */ } -#if 0 - else { - msg->security &= ~SIGN; - } -#endif *redraw = REDRAW_FULL; break;