struct Menu *menu = mutt_new_menu(MENU_GENERIC);
int done, row;
FILE *fp = NULL;
- int allow_skip = 0;
+ int ALLOW_SKIP = 0; /**< All caps tells Coverity that this is effectively a preproc condition */
mutt_push_current_menu(menu);
/* The leaf/host certificate can't be skipped. */
#ifdef HAVE_SSL_PARTIAL_CHAIN
if ((idx != 0) && (option(OPT_SSL_VERIFY_PARTIAL_CHAINS)))
- allow_skip = 1;
+ ALLOW_SKIP = 1;
#endif
/* Inside ssl_verify_callback(), this function is guarded by a call to
menu->keys = _("roas");
if (allow_always)
{
- if (allow_skip)
+ if (ALLOW_SKIP)
menu->prompt = _("(r)eject, accept (o)nce, (a)ccept always, (s)kip");
else
menu->prompt = _("(r)eject, accept (o)nce, (a)ccept always");
}
else
{
- if (allow_skip)
+ if (ALLOW_SKIP)
menu->prompt = _("(r)eject, accept (o)nce, (s)kip");
else
menu->prompt = _("(r)eject, accept (o)nce");
ssl_cache_trusted_cert(cert);
break;
case OP_MAX + 4: /* skip */
- if (!allow_skip)
+ if (!ALLOW_SKIP)
break;
done = 2;
SSL_set_ex_data(ssl, SkipModeExDataIndex, &SkipModeExDataIndex);