if (param)
{
X509_VERIFY_PARAM_set_flags(param, X509_V_FLAG_PARTIAL_CHAIN);
- if (0 == SSL_CTX_set1_param(ctx, param))
+ if (SSL_CTX_set1_param(ctx, param) == 0)
{
mutt_debug(2, "SSL_CTX_set1_param() failed.\n");
rc = -1;
restore_char(&e->subject, d, off, convert);
restore_int((unsigned int *) (&real_subj_off), d, off);
- if (0 <= real_subj_off)
+ if (real_subj_off >= 0)
e->real_subj = e->subject + real_subj_off;
else
e->real_subj = NULL;
}
else if (wc < 0x20 || wc == 0x7f)
{
- if (2 > n)
+ if (n < 2)
break;
n -= 2;
if (wc == '\033')
}
else
{
- if (1 > n)
+ if (n < 1)
break;
n -= 1;
fprintf(f, "?");
{
tmploc = loc + hdr->content->length;
- if (0 < tmploc && tmploc < ctx->size)
+ if ((tmploc > 0) && (tmploc < ctx->size))
{
if (fseeko(ctx->fp, tmploc, SEEK_SET) != 0 ||
fgets(buf, sizeof(buf) - 1, ctx->fp) == NULL ||
loc = ftello(ctx->fp);
tmploc = loc + curhdr->content->length + 1;
- if (0 < tmploc && tmploc < ctx->size)
+ if ((tmploc > 0) && (tmploc < ctx->size))
{
/*
* check to see if the content-length looks valid. we expect to
for (uid = key->uids; uid && rc; uid = uid->next)
{
uid_length = strlen(uid->email);
- if (1 && (uid->email[0] == '<') && (uid->email[uid_length - 1] == '>') &&
- (uid_length == sender_length + 2))
+ if ((uid->email[0] == '<') && (uid->email[uid_length - 1] == '>') &&
+ (uid_length == (sender_length + 2)))
{
const char *at_sign = strchr(uid->email + 1, '@');
if (!at_sign)
{
rindex = actx->v2r[vindex];
actx->idx[rindex]->num = vindex;
- if (2 * (actx->idx[rindex]->level + 2) < sizeof(buf))
+ if ((2 * (actx->idx[rindex]->level + 2)) < sizeof(buf))
{
if (actx->idx[rindex]->level)
{
else
actx->idx[rindex]->tree = mutt_str_strdup(buf);
- if (2 * (actx->idx[rindex]->level + 2) < sizeof(buf) && actx->idx[rindex]->level)
+ if ((2 * (actx->idx[rindex]->level + 2)) < sizeof(buf) && actx->idx[rindex]->level)
{
s = buf + 2 * (actx->idx[rindex]->level - 1);
*s++ = (actx->idx[rindex]->content->next) ? '\005' : '\006';