X-Git-Url: http://git.madism.org/?p=apps%2Fmadmutt.git;a=blobdiff_plain;f=mutt_ssl.c;h=aeed4642eb598d5c249dcf76318b6dbc60ae2280;hp=801da7888b8cce808e3a5bce12ff2eee16227c87;hb=d9960a434f5c00a534a0dabe02ae5ab8d4881569;hpb=8e037c67a88cb4680c4391134c578e3b55a80f8a diff --git a/mutt_ssl.c b/mutt_ssl.c index 801da78..aeed464 100644 --- a/mutt_ssl.c +++ b/mutt_ssl.c @@ -18,11 +18,11 @@ #include #include -#undef _ - #include #include +#include +#include #include "mutt.h" #include "mutt_socket.h" @@ -30,9 +30,6 @@ #include "mutt_curses.h" #include "mutt_ssl.h" -#include "lib/mem.h" -#include "lib/intl.h" -#include "lib/str.h" #include "lib/debug.h" #if OPENSSL_VERSION_NUMBER >= 0x00904000L @@ -88,7 +85,7 @@ int mutt_ssl_starttls (CONNECTION * conn) if (ssl_init ()) goto bail; - ssldata = (sslsockdata *) mem_calloc (1, sizeof (sslsockdata)); + ssldata = p_new(sslsockdata, 1); /* the ssl_use_xxx protocol options don't apply. We must use TLS in TLS. */ if (!(ssldata->ctx = SSL_CTX_new (TLSv1_client_method ()))) { debug_print (1, ("Error allocating SSL_CTX\n")); @@ -260,7 +257,7 @@ static int ssl_socket_open (CONNECTION * conn) if (raw_socket_open (conn) < 0) return -1; - data = (sslsockdata *) mem_calloc (1, sizeof (sslsockdata)); + data = p_new(sslsockdata, 1); conn->sockdata = data; data->ctx = SSL_CTX_new (SSLv23_client_method ()); @@ -419,7 +416,7 @@ static char *x509_get_part (char *line, const char *ndx) c = strstr (line, ndx); if (c) { - c += str_len (ndx); + c += m_strlen(ndx); c2 = strchr (c, '/'); if (c2) *c2 = '\0'; @@ -438,14 +435,14 @@ static void x509_fingerprint (char *s, int l, X509 * cert) int j; if (!X509_digest (cert, EVP_md5 (), md, &n)) { - snprintf (s, l, "%s", _("[unable to calculate]")); + m_strcpy(s, l, _("[unable to calculate]")); } else { for (j = 0; j < (int) n; j++) { char ch[8]; - snprintf (ch, 8, "%02X%s", md[j], (j % 2 ? " " : "")); - str_cat (s, l, ch); + snprintf(ch, 8, "%02X%s", md[j], (j % 2 ? " " : "")); + m_strcat(s, l, ch); } } } @@ -586,9 +583,9 @@ static int ssl_check_certificate (sslsockdata * data) /* interactive check from user */ menu = mutt_new_menu (); menu->max = 19; - menu->dialog = (char **) mem_calloc (1, menu->max * sizeof (char *)); + menu->dialog = p_new(char *, menu->max); for (i = 0; i < menu->max; i++) - menu->dialog[i] = (char *) mem_calloc (1, SHORT_STRING * sizeof (char)); + menu->dialog[i] = p_new(char, SHORT_STRING); row = 0; strfcpy (menu->dialog[row], _("This certificate belongs to:"), @@ -639,9 +636,9 @@ static int ssl_check_certificate (sslsockdata * data) helpstr[0] = '\0'; mutt_make_help (buf, sizeof (buf), _("Exit "), MENU_GENERIC, OP_EXIT); - str_cat (helpstr, sizeof (helpstr), buf); + m_strcat(helpstr, sizeof(helpstr), buf); mutt_make_help (buf, sizeof (buf), _("Help"), MENU_GENERIC, OP_HELP); - str_cat (helpstr, sizeof (helpstr), buf); + m_strcat(helpstr, sizeof(helpstr), buf); menu->help = helpstr; done = 0;