X-Git-Url: http://git.madism.org/?p=apps%2Fmadmutt.git;a=blobdiff_plain;f=mutt_ssl_gnutls.c;h=1080fafcc7d9112d503ef2bc294d4ab53e1502ab;hp=7b6cb094a0fda42b3d1b249df76e72043e6be2a5;hb=fb514a63a7f58b76577fb30bfa260ad1b9239c41;hpb=fa7f733a61a6fe3143198791ab470ddf4d08fdbe diff --git a/mutt_ssl_gnutls.c b/mutt_ssl_gnutls.c index 7b6cb09..1080faf 100644 --- a/mutt_ssl_gnutls.c +++ b/mutt_ssl_gnutls.c @@ -56,7 +56,7 @@ static int tls_init (void) err = gnutls_global_init (); if (err < 0) { - mutt_error ("gnutls_global_init: %s", gnutls_strerror (err)); + mutt_error (_("gnutls_global_init: %s"), gnutls_strerror (err)); mutt_sleep (2); return -1; } @@ -84,14 +84,14 @@ static int tls_socket_read (CONNECTION * conn, char *buf, size_t len) int ret; if (!data) { - mutt_error ("Error: no TLS socket open"); + mutt_error (_("Error: no TLS socket open")); mutt_sleep (2); return -1; } ret = gnutls_record_recv (data->state, buf, len); if (gnutls_error_is_fatal (ret) == 1) { - mutt_error ("tls_socket_read (%s)", gnutls_strerror (ret)); + mutt_error (_("tls_socket_read (%s)"), gnutls_strerror (ret)); mutt_sleep (4); return -1; } @@ -104,14 +104,14 @@ static int tls_socket_write (CONNECTION * conn, const char *buf, size_t len) int ret; if (!data) { - mutt_error ("Error: no TLS socket open"); + mutt_error (_("Error: no TLS socket open")); mutt_sleep (2); return -1; } ret = gnutls_record_send (data->state, buf, len); if (gnutls_error_is_fatal (ret) == 1) { - mutt_error ("tls_socket_write (%s)", gnutls_strerror (ret)); + mutt_error (_("tls_socket_write (%s)"), gnutls_strerror (ret)); mutt_sleep (4); return -1; } @@ -160,7 +160,7 @@ static int tls_negotiate (CONNECTION * conn) err = gnutls_certificate_allocate_credentials (&data->xcred); if (err < 0) { FREE (&conn->sockdata); - mutt_error ("gnutls_certificate_allocate_credentials: %s", + mutt_error (_("gnutls_certificate_allocate_credentials: %s"), gnutls_strerror (err)); mutt_sleep (2); return -1; @@ -225,11 +225,11 @@ static int tls_negotiate (CONNECTION * conn) } if (err < 0) { if (err == GNUTLS_E_FATAL_ALERT_RECEIVED) { - mutt_error ("gnutls_handshake: %s(%s)", gnutls_strerror (err), + mutt_error (_("gnutls_handshake: %s(%s)"), gnutls_strerror (err), gnutls_alert_get_name (gnutls_alert_get (data->state))); } else { - mutt_error ("gnutls_handshake: %s", gnutls_strerror (err)); + mutt_error (_("gnutls_handshake: %s"), gnutls_strerror (err)); } mutt_sleep (2); goto fail; @@ -323,8 +323,8 @@ static int tls_compare_certificates (const gnutls_datum * peercert) return 0; } - ptr = (unsigned char *) strstr (b64_data.data, CERT_SEP) + 1; - ptr = (unsigned char *) strstr (ptr, CERT_SEP); + ptr = (unsigned char *) strstr ((char*) b64_data.data, CERT_SEP) + 1; + ptr = (unsigned char *) strstr ((char*) ptr, CERT_SEP); b64_data.size = b64_data.size - (ptr - b64_data.data); b64_data.data = ptr; @@ -449,10 +449,9 @@ static int tls_check_certificate (CONNECTION * conn) MUTTMENU *menu; int done, row, i, ret; FILE *fp; - gnutls_x509_dn dn; time_t t; const gnutls_datum *cert_list; - int cert_list_size = 0; + unsigned int cert_list_size = 0; gnutls_certificate_status certstat; char datestr[30]; gnutls_x509_crt cert;