summaryrefslogtreecommitdiff
path: root/security/nss/files/patch-certutil.c
diff options
context:
space:
mode:
authorJoe Marcus Clarke <marcus@FreeBSD.org>2005-07-31 00:06:49 +0000
committerJoe Marcus Clarke <marcus@FreeBSD.org>2005-07-31 00:06:49 +0000
commitba00a2c341f7ccb192cb82b7f8eb7f20b87d6b8c (patch)
tree820468fe2eb3ff9d29c0398ea2ea781a554c8213 /security/nss/files/patch-certutil.c
parentMark as broken on amd64 >= 6.0, as it does not build there. (diff)
* Update to 3.10 [1]
* Add a target for regression testing, and run that target automatically when building on the package build cluster [1] * Cleanup some portlint nits Submitted by: mi [1]
Notes
Notes: svn path=/head/; revision=140510
Diffstat (limited to 'security/nss/files/patch-certutil.c')
-rw-r--r--security/nss/files/patch-certutil.c72
1 files changed, 72 insertions, 0 deletions
diff --git a/security/nss/files/patch-certutil.c b/security/nss/files/patch-certutil.c
new file mode 100644
index 000000000000..357ddaf78e79
--- /dev/null
+++ b/security/nss/files/patch-certutil.c
@@ -0,0 +1,72 @@
+--- cmd/certutil/certutil.c Fri Apr 22 22:12:00 2005
++++ cmd/certutil/certutil.c Fri Jul 22 02:02:20 2005
+@@ -131,3 +131,3 @@
+ fflush (stdout);
+- if (gets (buffer) == NULL) {
++ if (fgets(buffer, sizeof buffer, stdin) == NULL) {
+ PORT_SetError(SEC_ERROR_INPUT_LEN);
+@@ -206,3 +206,3 @@
+ puts (prompt);
+- gets (buffer);
++ fgets(buffer, sizeof buffer, stdin);
+ if (strlen (buffer) > 0) {
+@@ -1424,3 +1424,3 @@
+ fprintf(stdout, "%-25s Other to finish\n", "");
+- if (gets (buffer)) {
++ if (fgets(buffer, sizeof buffer, stdin)) {
+ value = atoi (buffer);
+@@ -1439,3 +1439,3 @@
+ puts ("Is this a critical extension [y/n]? ");
+- gets (buffer);
++ fgets(buffer, sizeof buffer, stdin);
+
+@@ -1580,3 +1580,3 @@
+
+- if (gets(buffer) == NULL) {
++ if (fgets(buffer, sizeof buffer, stdin) == NULL) {
+ PORT_SetError(SEC_ERROR_INPUT_LEN);
+@@ -1621,3 +1621,3 @@
+ puts ("Is this a critical extension [y/n]? ");
+- gets (buffer);
++ fgets(buffer, sizeof buffer, stdin);
+
+@@ -1650,3 +1650,3 @@
+ fprintf(stdout, "%-25s Other to finish\n", "");
+- if (gets (buffer) == NULL) {
++ if (fgets(buffer, sizeof buffer, stdin) == NULL) {
+ PORT_SetError(SEC_ERROR_INPUT_LEN);
+@@ -1664,3 +1664,3 @@
+ puts ("Is this a critical extension [y/n]? ");
+- gets (buffer);
++ fgets(buffer, sizeof buffer, stdin);
+
+@@ -1769,3 +1769,3 @@
+ puts ("Is this a CA certificate [y/n]?");
+- gets (buffer);
++ fgets(buffer, sizeof buffer, stdin);
+ basicConstraint.isCA = (buffer[0] == 'Y' || buffer[0] == 'y') ?
+@@ -1774,3 +1774,3 @@
+ puts ("Enter the path length constraint, enter to skip [<0 for unlimited path]:");
+- gets (buffer);
++ fgets(buffer, sizeof buffer, stdin);
+ if (PORT_Strlen (buffer) > 0)
+@@ -1784,3 +1784,3 @@
+ puts ("Is this a critical extension [y/n]? ");
+- gets (buffer);
++ fgets(buffer, sizeof buffer, stdin);
+ rv = CERT_AddExtension
+@@ -1908,3 +1908,3 @@
+ puts ("Is this a critical extension [y/n]? ");
+- gets (buffer);
++ fgets(buffer, sizeof buffer, stdin);
+
+@@ -1963,3 +1963,3 @@
+ fflush (stdout);
+- gets (buffer);
++ fgets(buffer, sizeof buffer, stdin);
+ /* For simplicity, use CERT_AsciiToName to converse from a string
+@@ -2031,3 +2031,3 @@
+ puts ("Is this a critical extension [y/n]? ");
+- gets (buffer);
++ fgets(buffer, sizeof buffer, stdin);
+