{
if (current_hook_type)
{
- snprintf(err->data, err->dsize,
+ snprintf(err->data, err->dsize, "%s",
_("unhook: Can't do unhook * from within a hook."));
return -1;
}
#define CHECK_PAGER \
if ((CurrentMenu == MENU_PAGER) && (idx >= 0) && (MuttVars[idx].flags & R_RESORT)) \
{ \
- snprintf(err->data, err->dsize, _("Not available in this menu.")); \
+ snprintf(err->data, err->dsize, "%s", _("Not available in this menu.")); \
return -1; \
}
if (t->nmatch > t->rx->rx->re_nsub)
{
- snprintf(err->data, err->dsize, _("Not enough subexpressions for "
- "template"));
+ snprintf(err->data, err->dsize, "%s", _("Not enough subexpressions for "
+ "template"));
remove_from_replace_list(list, pat);
return -1;
}
{
if (query || unset || inv)
{
- snprintf(err->data, err->dsize, _("prefix is illegal with reset"));
+ snprintf(err->data, err->dsize, "%s", _("prefix is illegal with reset"));
return -1;
}
if (*s->dptr == '=')
{
- snprintf(err->data, err->dsize, _("value is illegal with reset"));
+ snprintf(err->data, err->dsize, "%s", _("value is illegal with reset"));
return -1;
}
{
if (CurrentMenu == MENU_PAGER)
{
- snprintf(err->data, err->dsize, _("Not available in this menu."));
+ snprintf(err->data, err->dsize, "%s", _("Not available in this menu."));
return -1;
}
for (idx = 0; MuttVars[idx].option; idx++)
{
if (unset || inv || query)
{
- snprintf(err->data, err->dsize, _("Usage: set variable=yes|no"));
+ snprintf(err->data, err->dsize, "%s", _("Usage: set variable=yes|no"));
return -1;
}
unset = 1;
else
{
- snprintf(err->data, err->dsize, _("Usage: set variable=yes|no"));
+ snprintf(err->data, err->dsize, "%s", _("Usage: set variable=yes|no"));
return -1;
}
}
}
printf(_("Debugging at level %d.\n"), debuglevel_cmdline);
#else
- printf(_("DEBUG was not defined during compilation. -d Ignored.\n"));
+ printf("%s", _("DEBUG was not defined during compilation. -d Ignored.\n"));
#endif
break;
if (!X509_digest(cert, hashfunc(), md, &n))
{
- snprintf(s, l, _("[unable to calculate]"));
+ snprintf(s, l, "%s", _("[unable to calculate]"));
}
else
{
x509_get_part(x509_issuer, part[u]));
row++;
- snprintf(menu->dialog[row++], SHORT_STRING, _("This certificate is valid"));
+ snprintf(menu->dialog[row++], SHORT_STRING, "%s", _("This certificate is valid"));
snprintf(menu->dialog[row++], SHORT_STRING, _(" from %s"),
asn1time_to_string(X509_get_notBefore(cert)));
snprintf(menu->dialog[row++], SHORT_STRING, _(" to %s"),
fprintf(fp, _("Key Type ..: %s, %lu bit %s\n"), s2, aval, s);
/* L10N: DOTFILL */
- fprintf(fp, _("Key Usage .: "));
+ fprintf(fp, "%s", _("Key Usage .: "));
delim = "";
if (key_check_cap(key, KEY_CAP_CAN_ENCRYPT))
if (s)
{
/* L10N: DOTFILL */
- fprintf(fp, _("Issued By .: "));
+ fprintf(fp, "%s", _("Issued By .: "));
parse_and_print_user_id(fp, s);
putc('\n', fp);
}
fprintf(fp, _("Key Type ..: %s, %lu bit %s\n"), "PGP", aval, s);
/* L10N: DOTFILL */
- fprintf(fp, _("Key Usage .: "));
+ fprintf(fp, "%s", _("Key Usage .: "));
delim = "";
if (subkey->can_encrypt)
}
if (!*buf.data)
{
- snprintf(err->data, err->dsize, _("Empty expression"));
+ snprintf(err->data, err->dsize, "%s", _("Empty expression"));
return false;
}
}
if (!*buffer.data)
{
- snprintf(err->data, err->dsize, _("Empty expression"));
+ snprintf(err->data, err->dsize, "%s", _("Empty expression"));
return false;
}
{
if (!*ps.dptr)
{
- snprintf(err->data, err->dsize, _("missing parameter"));
+ snprintf(err->data, err->dsize, "%s", _("missing parameter"));
mutt_pattern_free(&curlist);
return NULL;
}
pop_data->cmd_top = 0;
mutt_debug(1, "pop_read_header: unset TOP capability\n");
- snprintf(pop_data->err_msg, sizeof(pop_data->err_msg),
+ snprintf(pop_data->err_msg, sizeof(pop_data->err_msg), "%s",
_("Command TOP is not supported by server."));
}
}
pop_data->cmd_uidl = 0;
mutt_debug(1, "pop_fetch_headers: unset UIDL capability\n");
- snprintf(pop_data->err_msg, sizeof(pop_data->err_msg),
+ snprintf(pop_data->err_msg, sizeof(pop_data->err_msg), "%s",
_("Command UIDL is not supported by server."));
}
}
pop_data->cmd_user = 0;
mutt_debug(1, "pop_auth_user: unset USER capability\n");
- snprintf(pop_data->err_msg, sizeof(pop_data->err_msg),
+ snprintf(pop_data->err_msg, sizeof(pop_data->err_msg), "%s",
_("Command USER is not supported by server."));
}
}