]> granicus.if.org Git - neomutt/commitdiff
reformat
authorRichard Russon <rich@flatcap.org>
Thu, 18 Aug 2016 16:08:49 +0000 (17:08 +0100)
committerRichard Russon <rich@flatcap.org>
Thu, 18 Aug 2016 16:08:49 +0000 (17:08 +0100)
crypt.c

diff --git a/crypt.c b/crypt.c
index 4d36680037de20890a6ee77888981891e6aa78e2..5aa8266b26efe564010e63da6ca77f8f3f559546 100644 (file)
--- a/crypt.c
+++ b/crypt.c
@@ -231,21 +231,21 @@ int mutt_protect (HEADER *msg, char *keylist)
     if ((WithCrypto & APPLICATION_SMIME)
         && (msg->security & APPLICATION_SMIME))
     {
-                         char *new_keylist = keylist;
-                         if (SmimeDefaultKey && query_quadoption(OPT_SMIMEENCRYPTSELF, _("Encrypt message to S/MIME Default Key also?")) == MUTT_YES)
-                                 {
-                                         /* +1 for NULL, +1 for \n */
-                                         int size = mutt_strlen(keylist) + mutt_strlen(SmimeDefaultKey) + 2;
-                                         new_keylist = safe_malloc(size);
-                                         snprintf(new_keylist, size, "%s%s\n", keylist, SmimeDefaultKey);
-                                 }
-                
-                         tmp_pbody = crypt_smime_build_smime_entity (tmp_smime_pbody, new_keylist);
-                         if (new_keylist != keylist)
-                                 FREE(&new_keylist);
-                         
-                         if (!tmp_pbody)
+      char *new_keylist = keylist;
+
+      if (SmimeDefaultKey && query_quadoption(OPT_SMIMEENCRYPTSELF, _("Encrypt message to S/MIME Default Key also?")) == MUTT_YES)
+      {
+        /* +1 for NULL, +1 for \n */
+        int size = mutt_strlen(keylist) + mutt_strlen(SmimeDefaultKey) + 2;
+        new_keylist = safe_malloc(size);
+        snprintf(new_keylist, size, "%s%s\n", keylist, SmimeDefaultKey);
+      }
+
+      tmp_pbody = crypt_smime_build_smime_entity (tmp_smime_pbody, new_keylist);
+      if (new_keylist != keylist)
+        FREE(&new_keylist);
+
+      if (!tmp_pbody)
       {
        /* signed ? free it! */
        return (-1);