#ifdef USE_NNTP
OptNews ? FolderNewsHelp :
#endif
- FolderHelp);
+ FolderHelp);
mutt_menu_push_current(menu);
init_menu(&state, menu, title, sizeof(title), buffy);
int orig_count, orig_unread, orig_flagged;
#endif
- memset(&sb, 0, sizeof (sb));
+ memset(&sb, 0, sizeof(sb));
#ifdef USE_SIDEBAR
orig_new = tmp->new;
goto free_sasldata;
}
- /* disable SSL protocols as needed */
+ /* disable SSL protocols as needed */
#ifdef SSL_OP_NO_TLSv1_2
if (!SslUseTlsv12)
SSL_CTX_set_options(ssldata->ctx, SSL_OP_NO_TLSv1_2);
}
#define CHECK_ATTACH \
- if (OptAttachMsg) \
+ if (OptAttachMsg) \
{ \
mutt_flushinp(); \
mutt_error(_(Function_not_permitted_in_attach_message_mode)); \
FREE(&(*esp)->wbuf);
FREE(esp);
}
-
state_reset_prefix(s);
}
- /* ----------------------------------------------------------------------------
+/* ----------------------------------------------------------------------------
* A (not so) minimal implementation of RFC1563.
*/
break;
}
- if (OptAttachMsg &&
- (mutt_str_strcmp(MuttVars[idx].name, "reply_regex") == 0))
+ if (OptAttachMsg && (mutt_str_strcmp(MuttVars[idx].name, "reply_regex") == 0))
{
snprintf(err->data, err->dsize, "Operation not permitted when in attach-message mode.");
r = -1;
#endif
else
{
- snprintf(err->data, err->dsize, _("%s: unknown type"), (idx >= 0) ? MuttVars[idx].name : "unknown");
+ snprintf(err->data, err->dsize, _("%s: unknown type"),
+ (idx >= 0) ? MuttVars[idx].name : "unknown");
r = -1;
break;
}
/* now get FQDN. Use configured domain first, DNS next, then uname */
#ifdef DOMAIN
/* we have a compile-time domain name, use that for Hostname */
- Hostname = mutt_mem_malloc(mutt_str_strlen(DOMAIN) + mutt_str_strlen(ShortHostname) + 2);
+ Hostname =
+ mutt_mem_malloc(mutt_str_strlen(DOMAIN) + mutt_str_strlen(ShortHostname) + 2);
sprintf((char *) Hostname, "%s.%s", NONULL(ShortHostname), DOMAIN);
#else
Hostname = getmailname();
char buffer[LONG_STRING];
if (getdnsdomainname(buffer, sizeof(buffer)) == 0)
{
- Hostname = mutt_mem_malloc(mutt_str_strlen(buffer) + mutt_str_strlen(ShortHostname) + 2);
+ Hostname = mutt_mem_malloc(mutt_str_strlen(buffer) +
+ mutt_str_strlen(ShortHostname) + 2);
sprintf((char *) Hostname, "%s.%s", NONULL(ShortHostname), buffer);
}
else
if (!NewsServer)
{
char buffer[1024];
- char *server = mutt_file_read_keyword(SYSCONFDIR "/nntpserver", buffer, sizeof(buffer));
+ char *server =
+ mutt_file_read_keyword(SYSCONFDIR "/nntpserver", buffer, sizeof(buffer));
NewsServer = mutt_str_strdup(server);
}
if (NewsServer)
* @param cs1 First character set
* @param cs2 Second character set
* @retval 1 Names are equivalent
- * @retval 0 Names differ
+ * @retval 0 Names differ
*
* Charsets may have extensions that mutt_ch_canonical_charset() leaves intact;
* we expect 'cs2' to originate from neomutt code, not user input (i.e. 'cs2'
* If you're supplying inrepls, the source charset should be stateless;
* if you're supplying an outrepl, the target charset should be.
*/
-size_t mutt_ch_iconv(iconv_t cd, const char **inbuf, size_t *inbytesleft, char **outbuf,
- size_t *outbytesleft, const char **inrepls, const char *outrepl,
- int *iconverrno)
+size_t mutt_ch_iconv(iconv_t cd, const char **inbuf, size_t *inbytesleft,
+ char **outbuf, size_t *outbytesleft, const char **inrepls,
+ const char *outrepl, int *iconverrno)
{
size_t rc = 0;
const char *ib = *inbuf;
if (fc->ibl)
{
size_t obl = sizeof(fc->bufo);
- mutt_ch_iconv(fc->cd, (const char **) &fc->ib, &fc->ibl, &fc->ob, &obl, fc->inrepls, 0, NULL);
+ mutt_ch_iconv(fc->cd, (const char **) &fc->ib, &fc->ibl, &fc->ob, &obl,
+ fc->inrepls, 0, NULL);
if (fc->p < fc->ob)
return (unsigned char) *(fc->p)++;
}
return ((st.st_size == 0));
}
-
"\\?"
"([qQbB])" /* encoding */
"\\?"
- "([^?]+)" /* encoded text - we accept whitespace
+ "([^?]+)" /* encoded text - we accept whitespace
as some mailers do that, see #1189. */
"\\?=",
REG_EXTENDED);
url_tostring(&url, hook, sizeof(hook), 0);
mutt_account_hook(hook);
- struct Connection *conn = start ? TAILQ_NEXT(start, entries) : TAILQ_FIRST(mutt_socket_head());
+ struct Connection *conn =
+ start ? TAILQ_NEXT(start, entries) : TAILQ_FIRST(mutt_socket_head());
while (conn)
{
if (mutt_account_match(account, &(conn->account)))
*/
#include "config.h"
-#include "globals.h"
+#include <stdarg.h>
+#include <string.h>
#include "mutt/logging.h"
#include "mutt/mutt.h"
-#include "mutt_menu.h"
#include "mutt_window.h"
+#include "globals.h"
+#include "mutt_menu.h"
#include "options.h"
-#include <stdarg.h>
-#include <string.h>
struct MuttWindow *MuttHelpWindow = NULL; /**< Help Window */
struct MuttWindow *MuttIndexWindow = NULL; /**< Index Window */
if (!scratch)
return;
- for (char *t = strtok(scratch, " ,.:\"()<>\n"); t; t = strtok(NULL, " ,.:\"()<>\n"))
+ for (char *t = strtok(scratch, " ,.:\"()<>\n"); t;
+ t = strtok(NULL, " ,.:\"()<>\n"))
{
if (strlen(t) > 3)
mutt_list_insert_tail(hints, mutt_str_strdup(t));
}
if (OptPgpCheckTrust && (!crypt_id_is_valid(key_table[menu->current]) ||
- !crypt_id_is_strong(key_table[menu->current])))
+ !crypt_id_is_strong(key_table[menu->current])))
{
const char *warn_s = NULL;
char buf2[LONG_STRING];
if (key_table[menu->current]->flags & KEYFLAG_CANTUSE)
- warn_s = _("ID is expired/disabled/revoked. Do you really want to use the key?");
+ warn_s = _("ID is expired/disabled/revoked. Do you really want to "
+ "use the key?");
else
{
warn_s = "??";
switch (key_table[menu->current]->validity)
{
case GPGME_VALIDITY_NEVER:
- warn_s = _("ID is not valid. Do you really want to use the key?");
+ warn_s =
+ _("ID is not valid. Do you really want to use the key?");
break;
case GPGME_VALIDITY_MARGINAL:
- warn_s = _("ID is only marginally valid. Do you really want to use the key?");
+ warn_s = _("ID is only marginally valid. Do you really want to "
+ "use the key?");
break;
case GPGME_VALIDITY_FULL:
case GPGME_VALIDITY_ULTIMATE:
break;
case GPGME_VALIDITY_UNKNOWN:
case GPGME_VALIDITY_UNDEFINED:
- warn_s = _("ID has undefined validity. Do you really want to use the key?");
+ warn_s = _("ID has undefined validity. Do you really want to "
+ "use the key?");
break;
}
}
OptPgpCheckTrust = false;
- struct CryptKeyInfo *key = crypt_ask_for_key(_("Please enter the key ID: "), NULL, 0, APPLICATION_PGP, NULL);
+ struct CryptKeyInfo *key = crypt_ask_for_key(_("Please enter the key ID: "),
+ NULL, 0, APPLICATION_PGP, NULL);
if (!key)
goto bail;
export_keys[0] = key->kobj;
}
if (OptPgpCheckTrust && (!pgp_id_is_valid(KeyTable[menu->current]) ||
- !pgp_id_is_strong(KeyTable[menu->current])))
+ !pgp_id_is_strong(KeyTable[menu->current])))
{
char *str = "";
char buf2[LONG_STRING];
if (KeyTable[menu->current]->flags & KEYFLAG_CANTUSE)
- str = _("ID is expired/disabled/revoked. Do you really want to use the key?");
+ str = _("ID is expired/disabled/revoked. Do you really want to use "
+ "the key?");
else
switch (KeyTable[menu->current]->trust & 0x03)
{
case 0:
- str = _("ID has undefined validity. Do you really want to use the key?");
+ str = _("ID has undefined validity. Do you really want to use "
+ "the key?");
break;
case 1:
str = _("ID is not valid. Do you really want to use the key?");
break;
case 2:
- str = _("ID is only marginally valid. Do you really want to use the key?");
+ str = _("ID is only marginally valid. Do you really want to "
+ "use the key?");
break;
}
pid_t thepid;
OptPgpCheckTrust = false;
- struct PgpKeyInfo *key = pgp_ask_for_key(_("Please enter the key ID: "), NULL, 0, PGP_PUBRING);
+ struct PgpKeyInfo *key =
+ pgp_ask_for_key(_("Please enter the key ID: "), NULL, 0, PGP_PUBRING);
if (!key)
return NULL;
if (!scratch)
return;
- for (char *t = strtok(scratch, " ,.:\"()<>\n"); t; t = strtok(NULL, " ,.:\"()<>\n"))
+ for (char *t = strtok(scratch, " ,.:\"()<>\n"); t;
+ t = strtok(NULL, " ,.:\"()<>\n"))
{
if (strlen(t) > 3)
mutt_list_insert_tail(hints, mutt_str_strdup(t));
/* L10N: Describes the trust state of a S/MIME key.
This translation must be padded with spaces to the right such that it
has the same length as the other translations.
-
+
The translation strings which need to be padded are:
Expired, Invalid, Revoked, Trusted, Unverified, Verified, and Unknown.
*/
/* L10N: Describes the trust state of a S/MIME key.
This translation must be padded with spaces to the right such that it
has the same length as the other translations.
-
+
The translation strings which need to be padded are:
Expired, Invalid, Revoked, Trusted, Unverified, Verified, and Unknown.
*/
/* L10N: Describes the trust state of a S/MIME key.
This translation must be padded with spaces to the right such that it
has the same length as the other translations.
-
+
The translation strings which need to be padded are:
Expired, Invalid, Revoked, Trusted, Unverified, Verified, and Unknown.
*/
/* L10N: Describes the trust state of a S/MIME key.
This translation must be padded with spaces to the right such that it
has the same length as the other translations.
-
+
The translation strings which need to be padded are:
Expired, Invalid, Revoked, Trusted, Unverified, Verified, and Unknown.
*/
/* L10N: Describes the trust state of a S/MIME key.
This translation must be padded with spaces to the right such that it
has the same length as the other translations.
-
+
The translation strings which need to be padded are:
Expired, Invalid, Revoked, Trusted, Unverified, Verified, and Unknown.
*/
/* L10N: Describes the trust state of a S/MIME key.
This translation must be padded with spaces to the right such that it
has the same length as the other translations.
-
+
The translation strings which need to be padded are:
Expired, Invalid, Revoked, Trusted, Unverified, Verified, and Unknown.
*/
/* L10N: Describes the trust state of a S/MIME key.
This translation must be padded with spaces to the right such that it
has the same length as the other translations.
-
+
The translation strings which need to be padded are:
Expired, Invalid, Revoked, Trusted, Unverified, Verified, and Unknown.
*/
case 'e':
case 'i':
case 'r':
- s = _("ID is expired/disabled/revoked. Do you really want to use the key?");
+ s = _("ID is expired/disabled/revoked. Do you really want to use "
+ "the key?");
break;
case 'u':
- s = _("ID has undefined validity. Do you really want to use the key?");
+ s = _("ID has undefined validity. Do you really want to use the "
+ "key?");
break;
case 'v':
s = _("ID is not trusted. Do you really want to use the key?");
{
mutt_endwin();
- pid_t thepid = smime_invoke(&smimein, NULL, NULL, -1, fileno(fpout), fileno(fperr), certfile,
- NULL, NULL, NULL, NULL, NULL, NULL, SmimeImportCertCommand);
+ pid_t thepid = smime_invoke(&smimein, NULL, NULL, -1, fileno(fpout),
+ fileno(fperr), certfile, NULL, NULL, NULL, NULL,
+ NULL, NULL, SmimeImportCertCommand);
if (thepid == -1)
{
mutt_message(_("Error: unable to create OpenSSL subprocess!"));
}
#define CHECK_ATTACH \
- if (OptAttachMsg) \
+ if (OptAttachMsg) \
{ \
mutt_flushinp(); \
mutt_error(_(Function_not_permitted_in_attach_message_mode)); \
return 0;
}
-static int match_mime_content_type(const struct Pattern *pat, struct Context *ctx, struct Header *hdr)
+static int match_mime_content_type(const struct Pattern *pat,
+ struct Context *ctx, struct Header *hdr)
{
mutt_parse_mime_message(ctx, hdr);
return match_content_type(pat, hdr->content);
case MUTT_MIMETYPE:
if (!ctx)
return 0;
- return (pat->not ^ match_mime_content_type (pat, ctx, h));
+ return (pat->not ^ match_mime_content_type(pat, ctx, h));
case MUTT_UNREFERENCED:
return (pat->not ^ (h->thread && !h->thread->child));
case MUTT_BROKEN:
default:
{
- fprintf(
- stderr,
- "usage: %s [-k <key ring> | [-2 | -5] [ -s] [-S] [-f]] [hints]\n", argv[0]);
+ fprintf(stderr, "usage: %s [-k <key ring> | [-2 | -5] [ -s] [-S] [-f]] [hints]\n",
+ argv[0]);
exit(1);
}
}
goto out;
/* refresh if size > inc */
- if ((progress->flags & MUTT_PROGRESS_SIZE) && (pos >= (progress->pos + (progress->inc << 10))))
+ if ((progress->flags & MUTT_PROGRESS_SIZE) &&
+ (pos >= (progress->pos + (progress->inc << 10))))
update = true;
else if (pos >= (progress->pos + progress->inc))
update = true;
if (pos >= progress->size)
mutt_clear_error();
}
-
N_("Function not permitted in attach-message mode.");
#define CHECK_ATTACH \
- if (OptAttachMsg) \
+ if (OptAttachMsg) \
{ \
mutt_flushinp(); \
mutt_error(_(Function_not_permitted)); \
if (Context)
{
- i = OptAttachMsg ?
- 3 :
- ((Context->readonly || Context->dontwrite) ?
- 2 :
- (Context->changed ||
- /* deleted doesn't necessarily mean changed in IMAP */
- (Context->magic != MUTT_IMAP && Context->deleted)) ?
- 1 :
- 0);
+ i = OptAttachMsg ? 3 :
+ ((Context->readonly || Context->dontwrite) ?
+ 2 :
+ (Context->changed ||
+ /* deleted doesn't necessarily mean changed in IMAP */
+ (Context->magic != MUTT_IMAP && Context->deleted)) ?
+ 1 :
+ 0);
}
if (!StatusChars || !StatusChars->len)
#include "mutt/mutt.h"
#include "tags.h"
-char *HiddenTags; /**< Config: Private tags which should not be displayed */
+char *HiddenTags; /**< Config: Private tags which should not be displayed */
struct Hash *TagTransforms; /**< Lookup table of alternative tag names */
/**