of text_to_server_qp()
* Added in an ifdef block around the call to endtls() to make it
safe to compile on non-OpenSSL hosts
/* hard line break */
if (output_len > 0) {
if (isspace(buf[output_len-1])) {
/* hard line break */
if (output_len > 0) {
if (isspace(buf[output_len-1])) {
- sprintf(&buf[output_len-1], "=%02X", buf[output_len-1]);
+ sprintf((char *)&buf[output_len-1], "=%02X", buf[output_len-1]);
output_len += 2;
}
}
buf[output_len++] = 0;
output_len += 2;
}
}
buf[output_len++] = 0;
+ serv_puts((char *)buf);
output_len = 0;
}
else if (ch == 9) {
output_len = 0;
}
else if (ch == 9) {
buf[output_len++] = ch;
}
else {
buf[output_len++] = ch;
}
else {
- sprintf(&buf[output_len], "=%02X", ch);
+ sprintf((char *)&buf[output_len], "=%02X", ch);
output_len += 3;
}
if (output_len > 72) {
/* soft line break */
if (isspace(buf[output_len-1])) {
output_len += 3;
}
if (output_len > 72) {
/* soft line break */
if (isspace(buf[output_len-1])) {
- sprintf(&buf[output_len-1], "=%02X", buf[output_len-1]);
+ sprintf((char *)&buf[output_len-1], "=%02X", buf[output_len-1]);
output_len += 2;
}
buf[output_len++] = '=';
buf[output_len++] = 0;
output_len += 2;
}
buf[output_len++] = '=';
buf[output_len++] = 0;
+ serv_puts((char *)buf);
/* end of data - transmit anything that's left */
if (output_len > 0) {
if (isspace(buf[output_len-1])) {
/* end of data - transmit anything that's left */
if (output_len > 0) {
if (isspace(buf[output_len-1])) {
- sprintf(&buf[output_len-1], "=%02X", buf[output_len-1]);
+ sprintf((char *)&buf[output_len-1], "=%02X", buf[output_len-1]);
output_len += 2;
}
buf[output_len++] = 0;
output_len += 2;
}
buf[output_len++] = 0;
+ serv_puts((char *)buf);
context_loop(ssock);
/** Shut down SSL/TLS if required... */
context_loop(ssock);
/** Shut down SSL/TLS if required... */
if (is_https) {
endtls();
}
if (is_https) {
endtls();
}
/** ...and close the socket. */
lingering_close(ssock);
/** ...and close the socket. */
lingering_close(ssock);