MimeInfo *msgcontent, *sigmultipart, *newinfo;
gchar *textstr, *micalg;
FILE *fp;
- gchar *boundary, *sigcontent;
+ gchar *boundary = NULL;
+ gchar *sigcontent;
gpgme_ctx_t ctx;
gpgme_data_t gpgtext, gpgsig;
size_t len;
struct passphrase_cb_info_s info;
gpgme_sign_result_t result = NULL;
+ gchar *test_msg;
+
+ fp = my_tmpfile();
+ if (fp == NULL) {
+ perror("my_tmpfile");
+ return FALSE;
+ }
+ procmime_write_mimeinfo(mimeinfo, fp);
+ rewind(fp);
+ /* read temporary file into memory */
+ test_msg = file_read_stream_to_str(fp);
+ fclose(fp);
+
memset (&info, 0, sizeof info);
/* remove content node from message */
sigmultipart = procmime_mimeinfo_new();
sigmultipart->type = MIMETYPE_MULTIPART;
sigmultipart->subtype = g_strdup("signed");
- boundary = generate_mime_boundary("Signature");
+
+ do {
+ if (boundary)
+ g_free(boundary);
+ boundary = generate_mime_boundary("Sig");
+ } while (strstr(test_msg, boundary) != NULL);
+
+ g_free(test_msg);
+
g_hash_table_insert(sigmultipart->typeparameters, g_strdup("boundary"),
g_strdup(boundary));
g_hash_table_insert(sigmultipart->typeparameters, g_strdup("protocol"),
/* write message content to temporary file */
fp = my_tmpfile();
+ if (fp == NULL) {
+ perror("my_tmpfile");
+ return FALSE;
+ }
procmime_write_mimeinfo(sigmultipart, fp);
rewind(fp);
newinfo = procmime_mimeinfo_new();
newinfo->type = MIMETYPE_APPLICATION;
newinfo->subtype = g_strdup("pgp-signature");
+ g_hash_table_insert(newinfo->typeparameters, g_strdup("name"),
+ g_strdup("signature.asc"));
newinfo->content = MIMECONTENT_MEM;
+ newinfo->disposition = DISPOSITIONTYPE_ATTACHMENT;
+ g_hash_table_insert(newinfo->dispositionparameters, g_strdup("filename"),
+ g_strdup("signature.asc"));
newinfo->data.mem = g_malloc(len + 1);
g_memmove(newinfo->data.mem, sigcontent, len);
newinfo->data.mem[len] = '\0';
/* write message content to temporary file */
fp = my_tmpfile();
+ if (fp == NULL) {
+ perror("my_tmpfile");
+ return FALSE;
+ }
procmime_write_mimeinfo(encmultipart, fp);
rewind(fp);