mutt stable branch with some hacks
0
fork

Configure Feed

Select the types of activity you want to include in your feed.

pledge() on OpenBSD, hoisting SSL call up

Patches from OpenBSD ports tree

+27 -1
+26
main.c
··· 818 818 } 819 819 } 820 820 821 + #ifdef USE_SASL 822 + { 823 + int ret; 824 + if ((ret = mutt_sasl_start()) != SASL_OK) { 825 + fprintf(stderr, "%s: mutt_sasl_start: %d\n", argv[0], ret); 826 + exit(1); 827 + } 828 + } 829 + #endif 830 + 831 + #ifdef __OpenBSD__ 832 + #ifdef CRYPT_BACKEND_GPGME 833 + if (pledge("stdio rpath wpath cpath flock fattr getpw tty inet dns " 834 + "proc exec sendfd recvfd", NULL) == -1) { 835 + fprintf(stderr, "%s: pledge: %s\n", argv[0], strerror(errno)); 836 + exit(1); 837 + } 838 + #else 839 + if (pledge("stdio rpath wpath cpath flock fattr getpw tty inet dns " 840 + "proc exec", NULL) == -1) { 841 + fprintf(stderr, "%s: pledge: %s\n", argv[0], strerror(errno)); 842 + exit(1); 843 + } 844 + #endif /* CRYPT_BACKEND_GPGME */ 845 + #endif 846 + 821 847 /* collapse remaining argv */ 822 848 while (optind < argc) 823 849 argv[nargc++] = argv[optind++];
-1
mutt_sasl.c
··· 86 86 87 87 static sasl_secret_t *secret_ptr = NULL; 88 88 89 - static int mutt_sasl_start (void); 90 89 91 90 /* callbacks */ 92 91 static int mutt_sasl_cb_log (void* context, int priority, const char* message);
+1
mutt_sasl.h
··· 25 25 26 26 #include "mutt_socket.h" 27 27 28 + int mutt_sasl_start (void); 28 29 int mutt_sasl_client_new (CONNECTION*, sasl_conn_t**); 29 30 sasl_callback_t* mutt_sasl_get_callbacks (ACCOUNT*); 30 31 int mutt_sasl_interact (sasl_interact_t*);