mutt stable branch with some hacks
0
fork

Configure Feed

Select the types of activity you want to include in your feed.

Change ssl_init to use buffer pool for rand filename.

+9 -5
+9 -5
mutt_ssl.c
··· 326 326 */ 327 327 static int ssl_init (void) 328 328 { 329 - char path[_POSIX_PATH_MAX]; 329 + BUFFER *path = NULL; 330 330 static unsigned char init_complete = 0; 331 331 332 332 if (init_complete) ··· 336 336 { 337 337 /* load entropy from files */ 338 338 add_entropy (SslEntropyFile); 339 - add_entropy (RAND_file_name (path, sizeof (path))); 339 + 340 + path = mutt_buffer_pool_get (); 341 + add_entropy (RAND_file_name (path->data, path->dsize)); 340 342 341 343 /* load entropy from egd sockets */ 342 344 #ifdef HAVE_RAND_EGD 343 345 add_entropy (getenv ("EGDSOCKET")); 344 - snprintf (path, sizeof(path), "%s/.entropy", NONULL(Homedir)); 345 - add_entropy (path); 346 + mutt_buffer_printf (path, "%s/.entropy", NONULL(Homedir)); 347 + add_entropy (mutt_b2s (path)); 346 348 add_entropy ("/tmp/entropy"); 347 349 #endif 348 350 349 351 /* shuffle $RANDFILE (or ~/.rnd if unset) */ 350 - RAND_write_file (RAND_file_name (path, sizeof (path))); 352 + RAND_write_file (RAND_file_name (path->data, path->dsize)); 353 + mutt_buffer_pool_release (&path); 354 + 351 355 mutt_clear_error (); 352 356 if (! HAVE_ENTROPY()) 353 357 {