diff options
author | Jeffrey Stedfast <fejj@ximian.com> | 2003-03-15 01:44:20 +0800 |
---|---|---|
committer | Jeffrey Stedfast <fejj@src.gnome.org> | 2003-03-15 01:44:20 +0800 |
commit | 1df1d4aead3ebacf457f637c6df2a5e8539b7fbf (patch) | |
tree | 0d31b8877fc39052b20abc8434018ecaa1ef63c9 /camel/ChangeLog | |
parent | 0b82cc7a34271a145a45ff7f296304e19a9315cc (diff) | |
download | gsoc2013-evolution-1df1d4aead3ebacf457f637c6df2a5e8539b7fbf.tar gsoc2013-evolution-1df1d4aead3ebacf457f637c6df2a5e8539b7fbf.tar.gz gsoc2013-evolution-1df1d4aead3ebacf457f637c6df2a5e8539b7fbf.tar.bz2 gsoc2013-evolution-1df1d4aead3ebacf457f637c6df2a5e8539b7fbf.tar.lz gsoc2013-evolution-1df1d4aead3ebacf457f637c6df2a5e8539b7fbf.tar.xz gsoc2013-evolution-1df1d4aead3ebacf457f637c6df2a5e8539b7fbf.tar.zst gsoc2013-evolution-1df1d4aead3ebacf457f637c6df2a5e8539b7fbf.zip |
Use header_contentid_decode() as this new function should be safer than
2003-03-13 Jeffrey Stedfast <fejj@ximian.com>
* camel-mime-part.c (process_header): Use
header_contentid_decode() as this new function should be safer
than the hack that we had before.
* camel-mime-utils.c (header_contentid_decode): New function to
try and parse a content-id string in such a way as to work around
some of the known bugs in other MIME implementations. Try to be as
"safe" as we can - ie. don't allow for more than 1 @ (since the
mailer uses "@@@%d" as a fake content-id value for parts without
content-ids) and don't allow for invalid content-type chars.
svn path=/trunk/; revision=20295
Diffstat (limited to 'camel/ChangeLog')
-rw-r--r-- | camel/ChangeLog | 13 |
1 files changed, 13 insertions, 0 deletions
diff --git a/camel/ChangeLog b/camel/ChangeLog index 9785e0dbcf..c94f27a563 100644 --- a/camel/ChangeLog +++ b/camel/ChangeLog @@ -1,5 +1,18 @@ 2003-03-13 Jeffrey Stedfast <fejj@ximian.com> + * camel-mime-part.c (process_header): Use + header_contentid_decode() as this new function should be safer + than the hack that we had before. + + * camel-mime-utils.c (header_contentid_decode): New function to + try and parse a content-id string in such a way as to work around + some of the known bugs in other MIME implementations. Try to be as + "safe" as we can - ie. don't allow for more than 1 @ (since the + mailer uses "@@@%d" as a fake content-id value for parts without + content-ids) and don't allow for invalid content-type chars. + +2003-03-13 Jeffrey Stedfast <fejj@ximian.com> + * camel-folder.c (get_uids): Don't add bogus uids to the uid array. Might fix bug #38868 (it's the only way I can figure that camel_folder_get_message_info() could possibly return NULL for the |