192 |
{ |
{ |
193 |
int r, ta, tf; |
int r, ta, tf; |
194 |
char *tok, *m, *mcp, *ndm; |
char *tok, *m, *mcp, *ndm; |
195 |
unsigned int n; |
char *flags, *date; |
196 |
|
unsigned int size; |
197 |
char buf[RESPONSE_BUF * 2 + 1]; |
char buf[RESPONSE_BUF * 2 + 1]; |
198 |
char dm[3][MBOX_NAME_LEN]; |
char dm[3][MBOX_NAME_LEN]; |
199 |
|
|
200 |
*dm[0] = *dm[1] = *dm[2] = '\0'; |
*dm[0] = *dm[1] = *dm[2] = '\0'; |
201 |
|
flags = date = NULL; |
202 |
|
|
203 |
if (init_connection(&connaux, destacc->server, destacc->port, |
if (init_connection(&connaux, destacc->server, destacc->port, |
204 |
destacc->ssl)) |
destacc->ssl)) |
271 |
} |
} |
272 |
xstrncpy(dm[0], dm[2], MBOX_NAME_LEN - 1); |
xstrncpy(dm[0], dm[2], MBOX_NAME_LEN - 1); |
273 |
|
|
274 |
fetchsize_response(&connpri, &n, |
fetchfast_response(&connpri, &flags, &date, &size, |
275 |
imap_fetch(&connpri, tok, "RFC822.SIZE")); |
imap_fetch(&connpri, tok, "FAST")); |
276 |
|
|
277 |
ta = imap_append(&connaux, ndm, n); |
ta = imap_append(&connaux, ndm, flags, date, size); |
278 |
|
|
279 |
|
xfree(flags); |
280 |
|
xfree(date); |
281 |
|
|
282 |
fetch_response(&connpri, 0, 1, NULL); |
fetch_response(&connpri, 0, 1, NULL); |
283 |
tf = imap_fetch(&connpri, tok, options & OPTION_PEEK ? |
tf = imap_fetch(&connpri, tok, options & OPTION_PEEK ? |