X-Git-Url: http://git.madism.org/?p=apps%2Fmadmutt.git;a=blobdiff_plain;f=pgppubring.c;h=7b297edcea69599ea40ee02752701a72ff62be55;hp=88b11e42392ab85780a87d958b294e364fb49d2e;hb=2a2f2f9a5bad73c883b7f9c9b4166d932b6aaf37;hpb=ef7b80006ebb47372d69c64e8b2b2f0764333d55 diff --git a/pgppubring.c b/pgppubring.c index 88b11e4..7b297ed 100644 --- a/pgppubring.c +++ b/pgppubring.c @@ -26,8 +26,9 @@ # include "config.h" #endif -#include "lib/mem.h" -#include "lib/str.h" +#include +#include +#include #include #include @@ -36,19 +37,17 @@ #include #ifdef HAVE_GETOPT_H # include -#endif -#include - +#else extern char *optarg; extern int optind; +#endif +#include -short Umask; /* dirty hack because we need Umask in lib.c but don't want globals.h there */ +short Umask; /* dirty hack because we need Umask in lib.c but don't want globals.h there */ -#include "sha1.h" -#include "md5.h" #include "lib.h" -#include "pgplib.h" -#include "pgppacket.h" +#include +#include #define MD5_DIGEST_LENGTH 16 @@ -126,10 +125,10 @@ int main (int argc, char *const argv[]) } if (_kring) - strfcpy (kring, _kring, sizeof (kring)); + m_strcpy(kring, sizeof(kring), _kring); else { if ((env_pgppath = getenv ("PGPPATH"))) - strfcpy (pgppath, env_pgppath, sizeof (pgppath)); + m_strcpy(pgppath, sizeof(pgppath), env_pgppath); else if ((env_home = getenv ("HOME"))) snprintf (pgppath, sizeof (pgppath), "%s/.pgp", env_home); else { @@ -223,7 +222,7 @@ static pgp_key_t pgp_parse_pgp2_key (unsigned char *buff, size_t l) memcpy (p->fingerprint, digest, MD5_DIGEST_LENGTH); } else /* just to be usre */ - memset (p->fingerprint, 0, MD5_DIGEST_LENGTH); + p_clear(p->fingerprint, MD5_DIGEST_LENGTH); expl = 0; for (i = 0; i < 2; i++) @@ -246,13 +245,13 @@ static pgp_key_t pgp_parse_pgp2_key (unsigned char *buff, size_t l) "%08lX", id); } - p->keyid = str_dup ((char *) scratch); + p->keyid = m_strdup((char *) scratch); return p; bailout: - mem_free (&p); + p_delete(&p); return NULL; } @@ -348,7 +347,7 @@ static pgp_key_t pgp_parse_pgp3_key (unsigned char *buff, size_t l) id); } - p->keyid = str_dup ((char *) scratch); + p->keyid = m_strdup((char *) scratch); return p; } @@ -636,7 +635,7 @@ static pgp_key_t pgp_parse_keyblock (FILE * fp) case PT_SIG: { if (lsig) { - pgp_sig_t *signature = mem_calloc (sizeof (pgp_sig_t), 1); + pgp_sig_t *signature = p_new(pgp_sig_t, 1); *lsig = signature; lsig = &signature->next; @@ -667,12 +666,9 @@ static pgp_key_t pgp_parse_keyblock (FILE * fp) if (!addr) break; - chr = mem_malloc (l); - memcpy (chr, buff + 1, l - 1); - chr[l - 1] = '\0'; + chr = p_dupstr(buff + 1, l - 1); - - *addr = uid = mem_calloc (1, sizeof (pgp_uid_t)); /* XXX */ + *addr = uid = p_new(pgp_uid_t, 1); /* XXX */ uid->addr = chr; uid->parent = p; uid->trust = 0; @@ -710,7 +706,7 @@ static int pgpring_string_matches_hint (const char *s, const char *hints[], return 1; for (i = 0; i < nhints; i++) { - if (str_isstr (s, hints[i]) != NULL) + if (m_stristr(s, hints[i]) != NULL) return 1; } @@ -743,11 +739,11 @@ static void pgpring_find_candidates (char *ringfile, const char *hints[], char *error_buf; size_t error_buf_len; - error_buf_len = sizeof ("fopen: ") - 1 + str_len (ringfile) + 1; - error_buf = mem_malloc (error_buf_len); + error_buf_len = sizeof ("fopen: ") - 1 + m_strlen(ringfile) + 1; + error_buf = p_new(char, error_buf_len); snprintf (error_buf, error_buf_len, "fopen: %s", ringfile); perror (error_buf); - mem_free (&error_buf); + p_delete(&error_buf); return; } @@ -764,10 +760,7 @@ static void pgpring_find_candidates (char *ringfile, const char *hints[], keypos = pos; } else if (pt == PT_NAME) { - char *tmp = mem_malloc (l); - - memcpy (tmp, buff + 1, l - 1); - tmp[l - 1] = '\0'; + char *tmp = p_dupstr(buff + 1, l - 1); /* mutt_decode_utf8_string (tmp, chs); */ @@ -785,7 +778,7 @@ static void pgpring_find_candidates (char *ringfile, const char *hints[], pgp_free_key (&p); } - mem_free (&tmp); + p_delete(&tmp); } FGETPOS (rfp, pos);