[gmime/gmime-2-4] Fixed to use g_set_error_literal
- From: Jeffrey Stedfast <fejj src gnome org>
- To: commits-list gnome org
- Cc:
- Subject: [gmime/gmime-2-4] Fixed to use g_set_error_literal
- Date: Tue, 13 Apr 2010 13:15:31 +0000 (UTC)
commit 7c18e7176a24321063901ace70f56d0ac3df33d8
Author: Jeffrey Stedfast <fejj gnome org>
Date: Tue Apr 13 09:14:36 2010 -0400
Fixed to use g_set_error_literal
2010-04-13 Jeffrey Stedfast <fejj novell com>
* gmime/gmime-gpg-context.c: Use g_set_error_literal() when no
printf-style arguments are needed. Fixes bug #615594. Thanks to
Tobias Mueller and Christian Persch.
ChangeLog | 4 ++++
gmime/gmime-gpg-context.c | 38 ++++++++++++++++++--------------------
2 files changed, 22 insertions(+), 20 deletions(-)
---
diff --git a/ChangeLog b/ChangeLog
index 9049d4b..1b4f09b 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,5 +1,9 @@
2010-04-13 Jeffrey Stedfast <fejj novell com>
+ * gmime/gmime-gpg-context.c: Use g_set_error_literal() when no
+ printf-style arguments are needed. Fixes bug #615594. Thanks to
+ Tobias Mueller and Christian Persch.
+
* Applied patch by pier11 operamail com to fix the build for
MingW. Fixes bug #615068.
diff --git a/gmime/gmime-gpg-context.c b/gmime/gmime-gpg-context.c
index d6c3e36..4f415a9 100644
--- a/gmime/gmime-gpg-context.c
+++ b/gmime/gmime-gpg-context.c
@@ -966,8 +966,8 @@ gpg_ctx_parse_status (struct _GpgCtx *gpg, GError **err)
status = next_token (status, &hint);
if (!hint) {
- g_set_error (err, GMIME_ERROR, GMIME_ERROR_PARSE_ERROR,
- _("Failed to parse gpg userid hint."));
+ g_set_error_literal (err, GMIME_ERROR, GMIME_ERROR_PARSE_ERROR,
+ _("Failed to parse gpg userid hint."));
return -1;
}
@@ -990,8 +990,8 @@ gpg_ctx_parse_status (struct _GpgCtx *gpg, GError **err)
status = next_token (status, &userid);
if (!userid) {
- g_set_error (err, GMIME_ERROR, GMIME_ERROR_PARSE_ERROR,
- _("Failed to parse gpg passphrase request."));
+ g_set_error_literal (err, GMIME_ERROR, GMIME_ERROR_PARSE_ERROR,
+ _("Failed to parse gpg passphrase request."));
return -1;
}
@@ -1004,8 +1004,8 @@ gpg_ctx_parse_status (struct _GpgCtx *gpg, GError **err)
status = next_token (status, &userid);
if (!userid) {
- g_set_error (err, GMIME_ERROR, GMIME_ERROR_PARSE_ERROR,
- _("Failed to parse gpg passphrase request."));
+ g_set_error_literal (err, GMIME_ERROR, GMIME_ERROR_PARSE_ERROR,
+ _("Failed to parse gpg passphrase request."));
return -1;
}
@@ -1055,7 +1055,7 @@ gpg_ctx_parse_status (struct _GpgCtx *gpg, GError **err)
gpg->send_passwd = TRUE;
} else {
if (err && *err == NULL)
- g_set_error (err, GMIME_ERROR, ECANCELED, _("Canceled."));
+ g_set_error_literal (err, GMIME_ERROR, ECANCELED, _("Canceled."));
g_free (prompt);
@@ -1069,8 +1069,8 @@ gpg_ctx_parse_status (struct _GpgCtx *gpg, GError **err)
g_mime_session_forget_passwd (gpg->session, gpg->userid, NULL);
if (gpg->bad_passwds == 3) {
- g_set_error (err, GMIME_ERROR, GMIME_ERROR_BAD_PASSWORD,
- _("Failed to unlock secret key: 3 bad passphrases given."));
+ g_set_error_literal (err, GMIME_ERROR, GMIME_ERROR_BAD_PASSWORD,
+ _("Failed to unlock secret key: 3 bad passphrases given."));
return -1;
}
} else if (!strncmp (status, "UNEXPECTED ", 11)) {
@@ -1094,11 +1094,9 @@ gpg_ctx_parse_status (struct _GpgCtx *gpg, GError **err)
diagnostics = gpg_ctx_get_diagnostics (gpg);
if (diagnostics && *diagnostics)
- g_set_error (err, GMIME_ERROR, GMIME_ERROR_GENERAL,
- "%s", diagnostics);
+ g_set_error_literal (err, GMIME_ERROR, GMIME_ERROR_GENERAL, diagnostics);
else
- g_set_error (err, GMIME_ERROR, GMIME_ERROR_GENERAL,
- _("No data provided"));
+ g_set_error_literal (err, GMIME_ERROR, GMIME_ERROR_GENERAL, _("No data provided"));
gpg->nodata = TRUE;
@@ -1142,8 +1140,8 @@ gpg_ctx_parse_status (struct _GpgCtx *gpg, GError **err)
} else if (!strncmp (status, "END_ENCRYPTION", 14)) {
/* nothing to do, but we know the end is near? */
} else if (!strncmp (status, "NO_RECP", 7)) {
- g_set_error (err, GMIME_ERROR, GMIME_ERROR_NO_VALID_RECIPIENTS,
- _("Failed to encrypt: No valid recipients specified."));
+ g_set_error_literal (err, GMIME_ERROR, GMIME_ERROR_NO_VALID_RECIPIENTS,
+ _("Failed to encrypt: No valid recipients specified."));
return -1;
}
break;
@@ -1670,7 +1668,7 @@ gpg_sign (GMimeCipherContext *context, const char *userid, GMimeCipherHash hash,
diagnostics = gpg_ctx_get_diagnostics (gpg);
errno = save;
- g_set_error (err, GMIME_ERROR, errno, diagnostics);
+ g_set_error_literal (err, GMIME_ERROR, errno, diagnostics);
gpg_ctx_free (gpg);
return -1;
@@ -1850,7 +1848,7 @@ gpg_encrypt (GMimeCipherContext *context, gboolean sign, const char *userid,
diagnostics = gpg_ctx_get_diagnostics (gpg);
errno = save;
- g_set_error (err, GMIME_ERROR, errno, diagnostics);
+ g_set_error_literal (err, GMIME_ERROR, errno, diagnostics);
gpg_ctx_free (gpg);
return -1;
@@ -1900,7 +1898,7 @@ gpg_decrypt (GMimeCipherContext *context, GMimeStream *istream,
diagnostics = gpg_ctx_get_diagnostics (gpg);
errno = save;
- g_set_error (err, GMIME_ERROR, errno, diagnostics);
+ g_set_error_literal (err, GMIME_ERROR, errno, diagnostics);
gpg_ctx_free (gpg);
return NULL;
@@ -1969,7 +1967,7 @@ gpg_import_keys (GMimeCipherContext *context, GMimeStream *istream, GError **err
diagnostics = gpg_ctx_get_diagnostics (gpg);
errno = save;
- g_set_error (err, GMIME_ERROR, errno, diagnostics);
+ g_set_error_literal (err, GMIME_ERROR, errno, diagnostics);
gpg_ctx_free (gpg);
return -1;
@@ -2022,7 +2020,7 @@ gpg_export_keys (GMimeCipherContext *context, GPtrArray *keys, GMimeStream *ostr
diagnostics = gpg_ctx_get_diagnostics (gpg);
errno = save;
- g_set_error (err, GMIME_ERROR, errno, diagnostics);
+ g_set_error_literal (err, GMIME_ERROR, errno, diagnostics);
gpg_ctx_free (gpg);
return -1;
[
Date Prev][
Date Next] [
Thread Prev][
Thread Next]
[
Thread Index]
[
Date Index]
[
Author Index]