? Makefile ? Makefile.in ? aclocal.m4 ? autom4te.cache ? config.guess ? config.h ? config.h.in ? config.log ? config.status ? config.sub ? configure ? depcomp ? install-sh ? libotr.patch ? libtool ? ltmain.sh ? missing ? stamp-h1 ? src/.deps ? src/.libs ? src/Makefile ? src/Makefile.in ? src/auth.lo ? src/b64.lo ? src/context.lo ? src/dh.lo ? src/libotr.la ? src/mem.lo ? src/message.lo ? src/privkey.lo ? src/proto.lo ? src/tlv.lo ? src/userstate.lo ? toolkit/.deps ? toolkit/.libs ? toolkit/Makefile ? toolkit/Makefile.in Index: src/auth.c =================================================================== RCS file: /cvsroot/otr/libotr/src/auth.c,v retrieving revision 1.4 diff -u -p -r1.4 auth.c --- src/auth.c 9 Feb 2006 15:19:56 -0000 1.4 +++ src/auth.c 7 Feb 2007 22:56:25 -0000 @@ -120,7 +120,7 @@ gcry_error_t otrl_auth_start_v2(OtrlAuth /* Allocate space for the encrypted g^x */ gcry_mpi_print(format, NULL, 0, &npub, auth->our_dh.pub); - auth->encgx = malloc(4+npub); + auth->encgx = (unsigned char*)malloc(4+npub); if (auth->encgx == NULL) goto memerr; auth->encgx_len = 4+npub; bufp = auth->encgx; @@ -152,7 +152,7 @@ gcry_error_t otrl_auth_start_v2(OtrlAuth /* Now serialize the message */ lenp = 3 + 4 + auth->encgx_len + 4 + 32; - bufp = malloc(lenp); + bufp = (unsigned char*)malloc(lenp); if (bufp == NULL) goto memerr; buf = bufp; buflen = lenp; @@ -206,7 +206,7 @@ static gcry_error_t create_key_message(O gcry_mpi_print(format, NULL, 0, &npub, auth->our_dh.pub); buflen = 3 + 4 + npub; - buf = malloc(buflen); + buf = (unsigned char*)malloc(buflen); if (buf == NULL) goto memerr; bufp = buf; lenp = buflen; @@ -261,7 +261,7 @@ gcry_error_t otrl_auth_handle_commit(Otr /* Encrypted g^x */ read_int(enclen); require_len(enclen); - encbuf = malloc(enclen); + encbuf = (unsigned char*)malloc(enclen); if (encbuf == NULL && enclen > 0) goto memerr; memmove(encbuf, bufp, enclen); bufp += enclen; lenp -= enclen; @@ -373,7 +373,7 @@ static gcry_error_t calculate_pubkey_aut /* How big is the total structure to be MAC'd? */ totallen = 4 + ourpublen + 4 + theirpublen + 2 + privkey->pubkey_datalen + 4; - buf = malloc(totallen); + buf = (unsigned char*)malloc(totallen); if (buf == NULL) goto memerr; bufp = buf; @@ -407,7 +407,7 @@ static gcry_error_t calculate_pubkey_aut /* Calculate the total size of the structure to be encrypted */ totallen = 2 + privkey->pubkey_datalen + 4 + siglen; - buf = malloc(totallen); + buf = (unsigned char*)malloc(totallen); if (buf == NULL) goto memerr; bufp = buf; lenp = totallen; @@ -512,7 +512,7 @@ static gcry_error_t check_pubkey_auth(un /* Now calculate the message to be MAC'd. */ totallen = 4 + ourpublen + 4 + theirpublen + 2 + (fingerprintend - fingerprintstart) + 4; - buf = malloc(totallen); + buf = (unsigned char*)malloc(totallen); if (buf == NULL) goto memerr; bufp = buf; @@ -582,7 +582,7 @@ static gcry_error_t create_revealsig_mes if (err) goto err; buflen = 3 + 4 + 16 + 4 + authlen + 20; - buf = malloc(buflen); + buf = (unsigned char*)malloc(buflen); if (buf == NULL) goto memerr; bufp = buf; @@ -654,7 +654,7 @@ static gcry_error_t create_signature_mes if (err) goto err; buflen = 3 + 4 + authlen + 20; - buf = malloc(buflen); + buf = (unsigned char*)malloc(buflen); if (buf == NULL) goto memerr; bufp = buf; @@ -844,7 +844,7 @@ gcry_error_t otrl_auth_handle_revealsig( switch(auth->authstate) { case OTRL_AUTHSTATE_AWAITING_REVEALSIG: - gxbuf = malloc(auth->encgx_len); + gxbuf = (unsigned char*)malloc(auth->encgx_len); if (auth->encgx_len && gxbuf == NULL) goto memerr; /* Use r to decrypt the value of g^x we received earlier */ @@ -1080,7 +1080,7 @@ static gcry_error_t create_v1_key_exchan gcry_mpi_print(format, NULL, 0, &ourpublen, auth->our_dh.pub); totallen = 3 + 1 + privkey->pubkey_datalen + 4 + 4 + ourpublen + 40; - buf = malloc(totallen); + buf = (unsigned char*)malloc(totallen); if (buf == NULL) goto memerr; bufp = buf; Index: src/b64.c =================================================================== RCS file: /cvsroot/otr/libotr/src/b64.c,v retrieving revision 1.2 diff -u -p -r1.2 b64.c --- src/b64.c 16 Oct 2005 15:51:11 -0000 1.2 +++ src/b64.c 7 Feb 2007 22:56:25 -0000 @@ -151,7 +151,7 @@ static size_t decode(unsigned char *out, * The buffer data must contain at least (base64len / 4) * 3 bytes of * space. This function will return the number of bytes actually used. */ -size_t otrl_base64_decode(char *data, const unsigned char *base64data, +size_t otrl_base64_decode(unsigned char *data, const unsigned char *base64data, size_t base64len) { size_t datalen = 0; @@ -199,7 +199,7 @@ char *otrl_base64_otr_encode(const unsig /* Make the base64-encoding. */ base64len = ((buflen + 2) / 3) * 4; - base64buf = malloc(5 + base64len + 1 + 1); + base64buf = (char*)malloc(5 + base64len + 1 + 1); if (base64buf == NULL) { return NULL; } @@ -237,11 +237,11 @@ int otrl_base64_otr_decode(const char *m /* Base64-decode the message */ rawlen = ((msglen-5) / 4) * 3; /* maximum possible */ - rawmsg = malloc(rawlen); + rawmsg = (unsigned char*)malloc(rawlen); if (!rawmsg && rawlen > 0) { return -1; } - rawlen = otrl_base64_decode(rawmsg, otrtag+5, msglen-5); /* actual size */ + rawlen = otrl_base64_decode(rawmsg, (unsigned char*)otrtag+5, msglen-5); /* actual size */ *bufp = rawmsg; *lenp = rawlen; Index: src/b64.h =================================================================== RCS file: /cvsroot/otr/libotr/src/b64.h,v retrieving revision 1.2 diff -u -p -r1.2 b64.h --- src/b64.h 16 Oct 2005 15:51:11 -0000 1.2 +++ src/b64.h 7 Feb 2007 22:56:25 -0000 @@ -36,7 +36,7 @@ size_t otrl_base64_encode(char *base64da * The buffer data must contain at least (base64len / 4) * 3 bytes of * space. This function will return the number of bytes actually used. */ -size_t otrl_base64_decode(char *data, const unsigned char *base64data, +size_t otrl_base64_decode(unsigned char *data, const unsigned char *base64data, size_t base64len); /* Index: src/context.c =================================================================== RCS file: /cvsroot/otr/libotr/src/context.c,v retrieving revision 1.6 diff -u -p -r1.6 context.c --- src/context.c 19 Oct 2005 17:24:57 -0000 1.6 +++ src/context.c 7 Feb 2007 22:56:26 -0000 @@ -32,7 +32,7 @@ static ConnContext * new_context(const c const char * protocol) { ConnContext * context; - context = malloc(sizeof(*context)); + context = (ConnContext*)malloc(sizeof(*context)); assert(context != NULL); context->username = strdup(user); context->accountname = strdup(accountname); @@ -140,9 +140,9 @@ Fingerprint *otrl_context_find_fingerpri /* Didn't find it. */ if (add_if_missing) { if (addedp) *addedp = 1; - f = malloc(sizeof(*f)); + f = (Fingerprint*)malloc(sizeof(*f)); assert(f != NULL); - f->fingerprint = malloc(20); + f->fingerprint = (unsigned char *)malloc(20); assert(f->fingerprint != NULL); memmove(f->fingerprint, fingerprint, 20); f->context = context; @@ -178,7 +178,7 @@ void otrl_context_set_preshared_secret(C context->preshared_secret_len = 0; if (secret_len) { - context->preshared_secret = malloc(secret_len); + context->preshared_secret = (unsigned char*)malloc(secret_len); if (context->preshared_secret) { memmove(context->preshared_secret, secret, secret_len); context->preshared_secret_len = secret_len; Index: src/dh.c =================================================================== RCS file: /cvsroot/otr/libotr/src/dh.c,v retrieving revision 1.4 diff -u -p -r1.4 dh.c --- src/dh.c 16 Oct 2005 15:51:11 -0000 1.4 +++ src/dh.c 7 Feb 2007 22:56:26 -0000 @@ -49,8 +49,8 @@ static gcry_mpi_t DH1536_GENERATOR = NUL */ void otrl_dh_init(void) { - gcry_mpi_scan(&DH1536_MODULUS, GCRYMPI_FMT_HEX, DH1536_MODULUS_S, 0, NULL); - gcry_mpi_scan(&DH1536_GENERATOR, GCRYMPI_FMT_HEX, DH1536_GENERATOR_S, + gcry_mpi_scan(&DH1536_MODULUS, GCRYMPI_FMT_HEX, (unsigned char*)DH1536_MODULUS_S, 0, NULL); + gcry_mpi_scan(&DH1536_GENERATOR, GCRYMPI_FMT_HEX, (unsigned char*)DH1536_GENERATOR_S, 0, NULL); DH1536_MODULUS_MINUS_2 = gcry_mpi_new(DH1536_MOD_LEN_BITS); gcry_mpi_sub_ui(DH1536_MODULUS_MINUS_2, DH1536_MODULUS, 2); @@ -102,7 +102,7 @@ gcry_error_t otrl_dh_gen_keypair(unsigne } /* Generate the secret key: a random 320-bit value */ - secbuf = gcry_random_bytes_secure(40, GCRY_STRONG_RANDOM); + secbuf = (unsigned char*)gcry_random_bytes_secure(40, GCRY_STRONG_RANDOM); gcry_mpi_scan(&privkey, GCRYMPI_FMT_USG, secbuf, 40, NULL); gcry_free(secbuf); @@ -140,7 +140,7 @@ gcry_error_t otrl_dh_session(DH_sesskeys /* Output it in the right format */ gcry_mpi_print(GCRYMPI_FMT_USG, NULL, 0, &gablen, gab); - gabdata = gcry_malloc_secure(gablen + 5); + gabdata = (unsigned char*)gcry_malloc_secure(gablen + 5); if (!gabdata) { gcry_mpi_release(gab); return gcry_error(GPG_ERR_ENOMEM); @@ -152,7 +152,7 @@ gcry_error_t otrl_dh_session(DH_sesskeys gcry_mpi_print(GCRYMPI_FMT_USG, gabdata+5, gablen, NULL, gab); gcry_mpi_release(gab); - hashdata = gcry_malloc_secure(20); + hashdata = (unsigned char*)gcry_malloc_secure(20); if (!hashdata) { gcry_free(gabdata); return gcry_error(GPG_ERR_ENOMEM); @@ -253,7 +253,7 @@ gcry_error_t otrl_dh_compute_v2_auth_key /* Output it in the right format */ gcry_mpi_print(GCRYMPI_FMT_USG, NULL, 0, &slen, s); - sdata = gcry_malloc_secure(slen + 5); + sdata = (unsigned char*)gcry_malloc_secure(slen + 5); if (!sdata) { gcry_mpi_release(s); return gcry_error(GPG_ERR_ENOMEM); @@ -266,7 +266,7 @@ gcry_error_t otrl_dh_compute_v2_auth_key gcry_mpi_release(s); /* Calculate the session id */ - hashdata = gcry_malloc_secure(32); + hashdata = (unsigned char*)gcry_malloc_secure(32); if (!hashdata) { gcry_free(sdata); return gcry_error(GPG_ERR_ENOMEM); @@ -378,7 +378,7 @@ gcry_error_t otrl_dh_compute_v1_session_ /* Output it in the right format */ gcry_mpi_print(GCRYMPI_FMT_USG, NULL, 0, &slen, s); - sdata = gcry_malloc_secure(slen + 5); + sdata = (unsigned char*)gcry_malloc_secure(slen + 5); if (!sdata) { gcry_mpi_release(s); return gcry_error(GPG_ERR_ENOMEM); @@ -391,7 +391,7 @@ gcry_error_t otrl_dh_compute_v1_session_ gcry_mpi_release(s); /* Calculate the session id */ - hashdata = gcry_malloc_secure(20); + hashdata = (unsigned char*)gcry_malloc_secure(20); if (!hashdata) { gcry_free(sdata); return gcry_error(GPG_ERR_ENOMEM); Index: src/message.c =================================================================== RCS file: /cvsroot/otr/libotr/src/message.c,v retrieving revision 1.9 diff -u -p -r1.9 message.c --- src/message.c 31 Dec 2005 04:39:52 -0000 1.9 +++ src/message.c 7 Feb 2007 22:56:28 -0000 @@ -125,7 +125,7 @@ gcry_error_t otrl_message_sending(OtrlUs "private conversation...")) && ops->notify) { const char *format = "You attempted to send an " "unencrypted message to %s"; - char *primary = malloc(strlen(format) + + char *primary = (char *)malloc(strlen(format) + strlen(recipient) - 1); if (primary) { sprintf(primary, format, recipient); @@ -140,7 +140,7 @@ gcry_error_t otrl_message_sending(OtrlUs free(primary); } } - context->lastmessage = gcry_malloc_secure(strlen(message) + 1); + context->lastmessage = (char *)gcry_malloc_secure(strlen(message) + 1); if (context->lastmessage) { char *bettermsg = otrl_proto_default_query_msg(accountname, policy); @@ -165,7 +165,7 @@ gcry_error_t otrl_message_sending(OtrlUs strlen(OTRL_MESSAGE_TAG_V1) : 0; size_t v2taglen = (policy & OTRL_POLICY_ALLOW_V2) ? strlen(OTRL_MESSAGE_TAG_V2) : 0; - char *taggedmsg = malloc(msglen + basetaglen + v1taglen + char *taggedmsg = (char *)malloc(msglen + basetaglen + v1taglen +v2taglen + 1); if (taggedmsg) { strcpy(taggedmsg, message); @@ -223,7 +223,7 @@ gcry_error_t otrl_message_sending(OtrlUs "it.")) && ops->notify) { const char *fmt = "%s has already closed his private " "connection to you"; - char *primary = malloc(strlen(fmt) + strlen(recipient) - 1); + char *primary = (char *)malloc(strlen(fmt) + strlen(recipient) - 1); if (primary) { sprintf(primary, fmt, recipient); ops->notify(opdata, OTRL_NOTIFY_ERROR, @@ -269,7 +269,7 @@ static gcry_error_t send_or_error_auth(c strerr = gcry_strerror(err); break; } - buf = malloc(strlen(buf_format) + strlen(strerr) - 1); + buf = (char *)malloc(strlen(buf_format) + strlen(strerr) - 1); if (buf) { sprintf(buf, buf_format, strerr); } @@ -298,7 +298,7 @@ typedef struct { static gcry_error_t go_encrypted(const OtrlAuthInfo *auth, void *asdata) { - EncrData *edata = asdata; + EncrData *edata = (EncrData *)asdata; gcry_error_t err = gcry_error(GPG_ERR_NO_ERROR); Fingerprint *found_print = NULL; int fprint_added = 0; @@ -470,7 +470,7 @@ static void maybe_resend(EncrData *edata edata->ignore_message = 1; } else { /* Let the user know we resent it */ - buf = malloc(strlen(format) + + buf = (char *)malloc(strlen(format) + strlen(edata->context->username) - 1); if (buf) { sprintf(buf, format, edata->context->username); @@ -769,7 +769,7 @@ int otrl_message_receiving(OtrlUserState OtrlTLV *tlvs; char *plaintext; char *buf; - char *format; + const char *format; unsigned char flags; case OTRL_MSGSTATE_PLAINTEXT: case OTRL_MSGSTATE_FINISHED: @@ -787,7 +787,7 @@ int otrl_message_receiving(OtrlUserState format = "The encrypted message received from %s is " "unreadable, as you are not currently communicating " "privately."; - buf = malloc(strlen(format) + strlen(context->username) + buf = (char*)malloc(strlen(format) + strlen(context->username) - 1); /* Remove "%s", add username + '\0' */ if (buf) { sprintf(buf, format, context->username); @@ -806,7 +806,7 @@ int otrl_message_receiving(OtrlUserState } format = "?OTR Error: You sent encrypted " "data to %s, who wasn't expecting it."; - buf = malloc(strlen(format) + strlen(context->accountname) + buf = (char *)malloc(strlen(format) + strlen(context->accountname) - 1); if (buf) { sprintf(buf, format, context->accountname); @@ -829,10 +829,8 @@ int otrl_message_receiving(OtrlUserState edata.ignore_message = 1; break; } - format = is_conflict ? "We received an unreadable " - "encrypted message from %s." : - "We received a malformed data message from %s."; - buf = malloc(strlen(format) + strlen(sender) - 1); + format = is_conflict ? "We received an unreadable encrypted message from %s." : "We received a malformed data message from %s."; + buf = (char *)malloc(strlen(format) + strlen(sender) - 1); if (buf) { sprintf(buf, format, sender); if ((!(ops->display_otr_message) || @@ -868,7 +866,7 @@ int otrl_message_receiving(OtrlUserState /* If it's a heartbeat (an empty message), don't * display it to the user, but log a debug message. */ format = "Heartbeat received from %s.\n"; - buf = malloc(strlen(format) + strlen(sender) - 1); + buf = (char *)malloc(strlen(format) + strlen(sender) - 1); if (buf) { sprintf(buf, format, sender); if (ops->log_message) { @@ -902,7 +900,7 @@ int otrl_message_receiving(OtrlUserState /* Log a debug message */ format = "Heartbeat sent to %s.\n"; - buf = malloc(strlen(format) + strlen(sender) + buf = (char *)malloc(strlen(format) + strlen(sender) - 1); if (buf) { sprintf(buf, format, sender); @@ -1029,7 +1027,7 @@ int otrl_message_receiving(OtrlUserState const char *plainmsg = (*newmessagep) ? *newmessagep : message; const char *format = "The following message received " "from %s was not encrypted: [%s]"; - char *buf = malloc(strlen(format) + strlen(context->username) + char *buf = (char *)malloc(strlen(format) + strlen(context->username) + strlen(plainmsg) - 3); /* Remove "%s%s", add username + message + '\0' */ if (buf) { @@ -1059,7 +1057,7 @@ int otrl_message_receiving(OtrlUserState if (ops->log_message) { const char *format = "Unrecognized OTR message received " "from %s.\n"; - char *buf = malloc(strlen(format) + strlen(sender) - 1); + char *buf = (char *)malloc(strlen(format) + strlen(sender) - 1); if (buf) { sprintf(buf, format, sender); ops->log_message(opdata, buf); Index: src/privkey.c =================================================================== RCS file: /cvsroot/otr/libotr/src/privkey.c,v retrieving revision 1.7 diff -u -p -r1.7 privkey.c --- src/privkey.c 24 Jul 2006 14:26:05 -0000 1.7 +++ src/privkey.c 7 Feb 2007 22:56:28 -0000 @@ -128,7 +128,7 @@ static gcry_error_t make_pubkey(unsigned gcry_mpi_print(format, NULL, 0, &ny, y); *publenp += ny + 4; - *pubbufp = malloc(*publenp); + *pubbufp = (unsigned char*)malloc(*publenp); if (*pubbufp == NULL) { gcry_mpi_release(p); gcry_mpi_release(q); @@ -198,7 +198,7 @@ gcry_error_t otrl_privkey_read_FILEp(Otr err = gcry_error_from_errno(errno); return err; } - buf = malloc(st.st_size); + buf = (char *)malloc(st.st_size); if (!buf && st.st_size > 0) { return gcry_error(GPG_ERR_ENOMEM); } @@ -258,7 +258,7 @@ gcry_error_t otrl_privkey_read_FILEp(Otr gcry_sexp_release(allkeys); return gcry_error(GPG_ERR_UNUSABLE_SECKEY); } - name = malloc(tokenlen + 1); + name = (char *)malloc(tokenlen + 1); if (!name) { gcry_sexp_release(names); gcry_sexp_release(protos); @@ -278,7 +278,7 @@ gcry_error_t otrl_privkey_read_FILEp(Otr gcry_sexp_release(allkeys); return gcry_error(GPG_ERR_UNUSABLE_SECKEY); } - proto = malloc(tokenlen + 1); + proto = (char *)malloc(tokenlen + 1); if (!proto) { free(name); gcry_sexp_release(protos); @@ -291,7 +291,7 @@ gcry_error_t otrl_privkey_read_FILEp(Otr gcry_sexp_release(protos); /* Make a new OtrlPrivKey entry */ - p = malloc(sizeof(*p)); + p = (OtrlPrivKey *)malloc(sizeof(*p)); if (!p) { free(name); free(proto); @@ -329,7 +329,7 @@ static gcry_error_t sexp_write(FILE *pri char *buf; buflen = gcry_sexp_sprint(sexp, GCRYSEXP_FMT_ADVANCED, NULL, 0); - buf = malloc(buflen); + buf = (char *)malloc(buflen); if (buf == NULL && buflen > 0) { return gcry_error(GPG_ERR_ENOMEM); } @@ -659,7 +659,7 @@ gcry_error_t otrl_privkey_sign(unsigned if (privkey->pubkey_type != OTRL_PUBKEY_TYPE_DSA) return gcry_error(GPG_ERR_INV_VALUE); - *sigp = malloc(40); + *sigp = (unsigned char *)malloc(40); if (sigp == NULL) return gcry_error(GPG_ERR_ENOMEM); *siglenp = 40; Index: src/proto.c =================================================================== RCS file: /cvsroot/otr/libotr/src/proto.c,v retrieving revision 1.7 diff -u -p -r1.7 proto.c --- src/proto.c 27 Oct 2005 16:01:04 -0000 1.7 +++ src/proto.c 7 Feb 2007 22:56:29 -0000 @@ -79,7 +79,7 @@ static gcry_error_t reveal_macs(ConnCont if (numnew == 0) return gcry_error(GPG_ERR_NO_ERROR); newnumsaved = context->numsavedkeys + numnew; - newmacs = realloc(context->saved_mac_keys, + newmacs = (unsigned char*)realloc(context->saved_mac_keys, newnumsaved * 20); if (!newmacs) { return gcry_error(GPG_ERR_ENOMEM); @@ -222,7 +222,7 @@ char *otrl_proto_default_query_msg(const } /* Remove two "%s", add '\0' */ - msg = malloc(strlen(format) + strlen(version_tag) + strlen(ourname) - 3); + msg = (char *)malloc(strlen(format) + strlen(version_tag) + strlen(ourname) - 3); if (!msg) return NULL; sprintf(msg, format, version_tag, ourname); return msg; @@ -373,7 +373,7 @@ gcry_error_t otrl_proto_create_data(char /* We need to copy the incoming msg, since it might be an alias for * context->lastmessage, which we'll be freeing soon. */ - msgdup = gcry_malloc_secure(justmsglen + 1); + msgdup = (char *)gcry_malloc_secure(justmsglen + 1); if (msgdup == NULL) { return gcry_error(GPG_ERR_ENOMEM); } @@ -387,8 +387,8 @@ gcry_error_t otrl_proto_create_data(char 4 + reveallen + 20; gcry_mpi_print(format, NULL, 0, &pubkeylen, context->our_dh_key.pub); buflen += pubkeylen + 4; - buf = malloc(buflen); - msgbuf = gcry_malloc_secure(msglen); + buf = (unsigned char *)malloc(buflen); + msgbuf = (char *)gcry_malloc_secure(msglen); if (buf == NULL || msgbuf == NULL) { free(buf); gcry_free(msgbuf); @@ -397,7 +397,7 @@ gcry_error_t otrl_proto_create_data(char } memmove(msgbuf, msgdup, justmsglen); msgbuf[justmsglen] = '\0'; - otrl_tlv_serialize(msgbuf + justmsglen + 1, tlvs); + otrl_tlv_serialize((unsigned char *)(msgbuf + justmsglen + 1), tlvs); bufp = buf; lenp = buflen; if (version == 1) { Index: src/proto.h =================================================================== RCS file: /cvsroot/otr/libotr/src/proto.h,v retrieving revision 1.6 diff -u -p -r1.6 proto.h --- src/proto.h 20 Nov 2005 20:31:45 -0000 1.6 +++ src/proto.h 7 Feb 2007 22:56:30 -0000 @@ -36,12 +36,14 @@ typedef unsigned int OtrlPolicy; -#define OTRL_POLICY_ALLOW_V1 0x01 -#define OTRL_POLICY_ALLOW_V2 0x02 +#define OTRL_POLICY_ALLOW_V1 0x01 +#define OTRL_POLICY_ALLOW_V2 0x02 #define OTRL_POLICY_REQUIRE_ENCRYPTION 0x04 #define OTRL_POLICY_SEND_WHITESPACE_TAG 0x08 #define OTRL_POLICY_WHITESPACE_START_AKE 0x10 -#define OTRL_POLICY_ERROR_START_AKE 0x20 +#define OTRL_POLICY_ERROR_START_AKE 0x20 + +#define OTRL_POLICY_NOHTML 0x40 #define OTRL_POLICY_VERSION_MASK (OTRL_POLICY_ALLOW_V1 | OTRL_POLICY_ALLOW_V2)