X-Git-Url: http://git.madism.org/?p=apps%2Fmadmutt.git;a=blobdiff_plain;f=mutt_ssl.c;h=2354cd98d1ff933ed06ac60142ca861f7224905a;hp=37e46b652a51cf1882b7356a98ed56e6004acf25;hb=a8808601c98c76ec8344c8e4ba5a607d72c2805e;hpb=617e7d83d14e14e6a520a48e75437211b16c8834 diff --git a/mutt_ssl.c b/mutt_ssl.c index 37e46b6..2354cd9 100644 --- a/mutt_ssl.c +++ b/mutt_ssl.c @@ -18,11 +18,11 @@ #include #include -#undef _ - #include #include +#include +#include #include "mutt.h" #include "mutt_socket.h" @@ -30,8 +30,6 @@ #include "mutt_curses.h" #include "mutt_ssl.h" -#include "lib/intl.h" -#include "lib/str.h" #include "lib/debug.h" #if OPENSSL_VERSION_NUMBER >= 0x00904000L @@ -414,15 +412,15 @@ static char *x509_get_part (char *line, const char *ndx) static char ret[SHORT_STRING]; char *c, *c2; - strfcpy (ret, _("Unknown"), sizeof (ret)); + m_strcpy(ret, sizeof(ret), _("Unknown")); c = strstr (line, ndx); if (c) { - c += str_len (ndx); + c += m_strlen(ndx); c2 = strchr (c, '/'); if (c2) *c2 = '\0'; - strfcpy (ret, c, sizeof (ret)); + m_strcpy(ret, sizeof(ret), c); if (c2) *c2 = '/'; } @@ -437,14 +435,14 @@ static void x509_fingerprint (char *s, int l, X509 * cert) int j; if (!X509_digest (cert, EVP_md5 (), md, &n)) { - snprintf (s, l, "%s", _("[unable to calculate]")); + m_strcpy(s, l, _("[unable to calculate]")); } else { for (j = 0; j < (int) n; j++) { char ch[8]; - snprintf (ch, 8, "%02X%s", md[j], (j % 2 ? " " : "")); - str_cat (s, l, ch); + snprintf(ch, 8, "%02X%s", md[j], (j % 2 ? " " : "")); + m_strcat(s, l, ch); } } } @@ -454,7 +452,7 @@ static char *asn1time_to_string (ASN1_UTCTIME * tm) static char buf[64]; BIO *bio; - strfcpy (buf, _("[invalid date]"), sizeof (buf)); + m_strcpy(buf, sizeof(buf), _("[invalid date]")); bio = BIO_new (BIO_s_mem ()); if (bio) { @@ -590,8 +588,8 @@ static int ssl_check_certificate (sslsockdata * data) menu->dialog[i] = p_new(char, SHORT_STRING); row = 0; - strfcpy (menu->dialog[row], _("This certificate belongs to:"), - SHORT_STRING); + m_strcpy(menu->dialog[row], SHORT_STRING, + _("This certificate belongs to:")); row++; name = X509_NAME_oneline (X509_get_subject_name (data->cert), buf, sizeof (buf)); @@ -601,8 +599,8 @@ static int ssl_check_certificate (sslsockdata * data) } row++; - strfcpy (menu->dialog[row], _("This certificate was issued by:"), - SHORT_STRING); + m_strcpy(menu->dialog[row], SHORT_STRING, + _("This certificate was issued by:")); row++; name = X509_NAME_oneline (X509_get_issuer_name (data->cert), buf, sizeof (buf)); @@ -638,9 +636,9 @@ static int ssl_check_certificate (sslsockdata * data) helpstr[0] = '\0'; mutt_make_help (buf, sizeof (buf), _("Exit "), MENU_GENERIC, OP_EXIT); - str_cat (helpstr, sizeof (helpstr), buf); + m_strcat(helpstr, sizeof(helpstr), buf); mutt_make_help (buf, sizeof (buf), _("Help"), MENU_GENERIC, OP_HELP); - str_cat (helpstr, sizeof (helpstr), buf); + m_strcat(helpstr, sizeof(helpstr), buf); menu->help = helpstr; done = 0;