looks good... but: + while ((state = camel_mime_parser_step(cmp, &buf, &len)) != CAMEL_MIME_PARSER_STATE_MULTIPART_END) { what happens here if we get EOS for example? will things work out ok? + if (mps->start1 == -1) { + head = camel_mime_parser_tell_start_boundary(cmp); + mps->start1 = camel_mime_parser_tell_start_headers(cmp); + } else if (mps->start2 == -1) { + mps->start2 = camel_mime_parser_tell_start_headers(cmp); + mps->end1 = camel_mime_parser_tell_start_boundary(cmp); + if (mps->end1 > mps->start1 && mem->buffer->data[mps->end1-1] == '\n') + mps->end1--; + if (mps->end1 > mps->start1 && mem->buffer->data[mps->end1-1] == '\r') + mps->end1--; + } else { + g_warning("multipart/signed has more than 2 parts, remaining parts ignored"); + break; + } On Wed, 2005-01-12 at 16:32 +0800, Not Zed wrote: > > this includes the 64 bit patches from a previous mail too, too hard to > extract right now. > > for stable, and same needs to go into head. > > includes fixes for tests too. > -- Jeffrey Stedfast Evolution Hacker - Novell, Inc. fejj ximian com - www.novell.com
Attachment:
smime.p7s
Description: S/MIME cryptographic signature