X-Git-Url: http://git.madism.org/?p=apps%2Fmadmutt.git;a=blobdiff_plain;f=lib-crypt%2Fpgpkey.c;h=637e32233ea25e49e01b99c8a84268e41135ef71;hp=b8ceda579133ea5197e8beb67d26ab4405d41b6b;hb=a16b0e24a0e811e35943c9f2d553a02d156d4961;hpb=4a0b020a3048f079979bea43c04f9fe388f9354d diff --git a/lib-crypt/pgpkey.c b/lib-crypt/pgpkey.c index b8ceda5..637e322 100644 --- a/lib-crypt/pgpkey.c +++ b/lib-crypt/pgpkey.c @@ -8,39 +8,20 @@ * please see the file GPL in the top level source directory. */ -#if HAVE_CONFIG_H -# include "config.h" -#endif - -#include -#include -#include -#include -#include +#include #include +#include #include #include #include -#include "mutt.h" #include "recvattach.h" #include "pgp.h" #include "pager.h" #include "sort.h" -#include "lib/debug.h" - -#include -#include -#include -#include -#include -#include - -#include - struct pgp_cache { char *what; char *dflt; @@ -111,18 +92,15 @@ static pgp_key_t pgp_principal_key (pgp_key_t key) */ typedef struct pgp_entry { - size_t num; + ssize_t num; pgp_uid_t *uid; } pgp_entry_t; -static const char *pgp_entry_fmt (char *dest, - size_t destlen, - char op, - const char *src, - const char *prefix, - const char *ifstring, - const char *elsestring, - unsigned long data, format_flag flags) +static const char * +pgp_entry_fmt (char *dest, ssize_t destlen, char op, + const char *src, const char *prefix, + const char *ifstring, const char *elsestring, + unsigned long data, format_flag flags) { char fmt[16]; pgp_entry_t *entry; @@ -150,7 +128,7 @@ static const char *pgp_entry_fmt (char *dest, char buf2[SHORT_STRING], *p; int do_locales; struct tm *tm; - size_t len; + ssize_t len; p = dest; @@ -264,7 +242,7 @@ static const char *pgp_entry_fmt (char *dest, return (src); } -static void pgp_entry (char *s, size_t l, MUTTMENU * menu, int num) +static void pgp_entry (char *s, ssize_t l, MUTTMENU * menu, int num) { pgp_uid_t **KeyTable = (pgp_uid_t **) menu->data; pgp_entry_t entry; @@ -583,26 +561,26 @@ static pgp_key_t pgp_select_key (pgp_key_t keys, address_t * p, const char *s) if (option (OPTPGPCHECKTRUST) && (!pgp_id_is_valid (KeyTable[menu->current]) || !pgp_id_is_strong (KeyTable[menu->current]))) { - const char *s = ""; + const char *q = ""; char buff[LONG_STRING]; if (KeyTable[menu->current]->flags & KEYFLAG_CANTUSE) - s = N_("ID is expired/disabled/revoked."); + q = N_("ID is expired/disabled/revoked."); else switch (KeyTable[menu->current]->trust & 0x03) { case 0: - s = N_("ID has undefined validity."); + q = N_("ID has undefined validity."); break; case 1: - s = N_("ID is not valid."); + q = N_("ID is not valid."); break; case 2: - s = N_("ID is only marginally valid."); + q = N_("ID is only marginally valid."); break; } snprintf (buff, sizeof (buff), - _("%s Do you really want to use the key?"), _(s)); + _("%s Do you really want to use the key?"), _(q)); if (mutt_yesorno (buff, M_NO) != M_YES) { mutt_clear_error (); @@ -742,7 +720,7 @@ BODY *pgp_make_key_attachment (char *tempf) fclose (tempfp); fclose (devnull); - att = mutt_new_body (); + att = body_new(); att->filename = m_strdup(tempf); att->unlink = 1; att->use_disp = 0; @@ -758,7 +736,7 @@ BODY *pgp_make_key_attachment (char *tempf) return att; } -static LIST *pgp_add_string_to_hints (LIST * hints, const char *str) +static string_list_t *pgp_add_string_to_hints (string_list_t * hints, const char *str) { char *scratch; char *t; @@ -788,7 +766,7 @@ static pgp_key_t *pgp_get_lastp (pgp_key_t p) pgp_key_t pgp_getkeybyaddr (address_t * a, short abilities, pgp_ring_t keyring) { address_t *r, *p; - LIST *hints = NULL; + string_list_t *hints = NULL; int weak = 0; int invalid = 0; @@ -812,21 +790,15 @@ pgp_key_t pgp_getkeybyaddr (address_t * a, short abilities, pgp_ring_t keyring) mutt_message (_("Looking for keys matching \"%s\"..."), a->mailbox); keys = pgp_get_candidates (keyring, hints); - mutt_free_list (&hints); + string_list_wipe(&hints); if (!keys) return NULL; - debug_print (5, ("looking for %s <%s>\n", a->personal, a->mailbox)); - for (k = keys; k; k = kn) { kn = k->next; - debug_print (5, (" looking at key: %s\n", pgp_keyid (k))); - if (abilities && !(k->flags & abilities)) { - debug_print (5, (" insufficient abilities: Has %x, want %x\n", - k->flags, abilities)); continue; } @@ -860,7 +832,7 @@ pgp_key_t pgp_getkeybyaddr (address_t * a, short abilities, pgp_ring_t keyring) this_key_has_weak = 1; } - address_delete (&r); + address_list_wipe(&r); } if (match && !this_key_has_strong && this_key_has_invalid) @@ -904,9 +876,9 @@ pgp_key_t pgp_getkeybyaddr (address_t * a, short abilities, pgp_ring_t keyring) return NULL; } -pgp_key_t pgp_getkeybystr (char *p, short abilities, pgp_ring_t keyring) +pgp_key_t pgp_getkeybystr (const char *p, short abilities, pgp_ring_t keyring) { - LIST *hints = NULL; + string_list_t *hints = NULL; pgp_key_t keys; pgp_key_t matches = NULL; pgp_key_t *last = &matches; @@ -918,7 +890,7 @@ pgp_key_t pgp_getkeybystr (char *p, short abilities, pgp_ring_t keyring) hints = pgp_add_string_to_hints (hints, p); keys = pgp_get_candidates (keyring, hints); - mutt_free_list (&hints); + string_list_wipe(&hints); if (!keys) return NULL; @@ -932,14 +904,12 @@ pgp_key_t pgp_getkeybystr (char *p, short abilities, pgp_ring_t keyring) match = 0; for (a = k->address; a; a = a->next) { - debug_print (5, ("matching \"%s\" against key %s, \"%s\":\n", p, pgp_keyid (k), a->addr)); if (!*p || m_strcasecmp(p, pgp_keyid (k)) == 0 || (!m_strncasecmp(p, "0x", 2) && !m_strcasecmp(p + 2, pgp_keyid (k))) || (option (OPTPGPLONGIDS) && !m_strncasecmp(p, "0x", 2) && !m_strcasecmp(p + 2, k->keyid + 8)) || m_stristr(a->addr, p)) { - debug_print (5, ("match.\n")); match = 1; break; }