diff options
author | Will Andrews <will@FreeBSD.org> | 2000-05-29 06:17:54 +0000 |
---|---|---|
committer | Will Andrews <will@FreeBSD.org> | 2000-05-29 06:17:54 +0000 |
commit | 46bf503a0a2a3bc7dd3d70ee2f5c9f795333fbb2 (patch) | |
tree | 7e18f02d8c0b9e2769c06e44139472ea14b22466 /security/pgp6/files/patch-ak | |
parent | Add xtrojka, a skill game similar to T*tris. (diff) |
Update to PGP (International version) 6.5.1i. This is actually a new
port, repo-copied from security/pgp5 by asami.
I added a bunch of the intl mirrors to make this port super-available.
PR: 16377
Submitted by: Mike Sherwood <mike@fate.com>
Notes
Notes:
svn path=/head/; revision=28909
Diffstat (limited to 'security/pgp6/files/patch-ak')
-rw-r--r-- | security/pgp6/files/patch-ak | 70 |
1 files changed, 70 insertions, 0 deletions
diff --git a/security/pgp6/files/patch-ak b/security/pgp6/files/patch-ak new file mode 100644 index 000000000000..bb074fa23891 --- /dev/null +++ b/security/pgp6/files/patch-ak @@ -0,0 +1,70 @@ +*** libs/pgpcdk/priv/networklib/keyserver/CCRSEntrustServer.cpp 2000/01/26 03:10:44 1.1.1.1 +--- libs/pgpcdk/priv/networklib/keyserver/CCRSEntrustServer.cpp 2000/01/26 03:13:47 1.1.1.2 +*************** +*** 147,153 **** + if (! PGPKeySetRefIsValid(inCAsKeySet)) { + ThrowPGPError_(kPGPError_OptionNotFound); + } +! if (accumulatedCRLs == 0) { + ThrowPGPError_(kPGPError_OutOfMemory); + } + pgpErr = PGPGetCRLDistributionPoints(inCAKey, inCAsKeySet, &numPoints, &points, +--- 147,153 ---- + if (! PGPKeySetRefIsValid(inCAsKeySet)) { + ThrowPGPError_(kPGPError_OptionNotFound); + } +! if (accumulatedCRLs == (StPGPDataRef) 0) { + ThrowPGPError_(kPGPError_OutOfMemory); + } + pgpErr = PGPGetCRLDistributionPoints(inCAKey, inCAsKeySet, &numPoints, &points, +*************** +*** 173,179 **** + #if PGP_COMPILER_SUN + pgpCopyMemory(static_cast<PGPByte *>(crl), static_cast<PGPByte *>(accumulatedCRLs) + accumulatedSize, crlSize); + #else +! pgpCopyMemory(crl, static_cast<PGPByte *>(accumulatedCRLs) + accumulatedSize, crlSize); + #endif + accumulatedSize += crlSize; + currPoint += *currPointSize; +--- 173,179 ---- + #if PGP_COMPILER_SUN + pgpCopyMemory(static_cast<PGPByte *>(crl), static_cast<PGPByte *>(accumulatedCRLs) + accumulatedSize, crlSize); + #else +! pgpCopyMemory((void *) crl, static_cast<PGPByte *>(accumulatedCRLs) + accumulatedSize, crlSize); + #endif + accumulatedSize += crlSize; + currPoint += *currPointSize; +*************** +*** 215,221 **** + PGPNewData( PGPGetContextMemoryMgr(mContext), + GetMaxBase64EncodedBufferSize(inMessageLength), + kPGPMemoryMgrFlags_None)); +! if (encodedBuffer == 0) { + ThrowPGPError_(kPGPError_OutOfMemory); + } + encodedSize = Base64Encode( static_cast<const PGPByte *>(inMessage), +--- 215,221 ---- + PGPNewData( PGPGetContextMemoryMgr(mContext), + GetMaxBase64EncodedBufferSize(inMessageLength), + kPGPMemoryMgrFlags_None)); +! if (encodedBuffer == (StPGPDataRef) 0) { + ThrowPGPError_(kPGPError_OutOfMemory); + } + encodedSize = Base64Encode( static_cast<const PGPByte *>(inMessage), +*************** +*** 226,232 **** + PGPNewData( PGPGetContextMemoryMgr(mContext), + GetMaxURLEncodedBufferSize(encodedSize) + bufSize, + kPGPMemoryMgrFlags_None)); +! if (encodedBuffer == 0) { + ThrowPGPError_(kPGPError_OutOfMemory); + } + strcpy(urlEncodedBuffer, kMessagePrefix); +--- 226,232 ---- + PGPNewData( PGPGetContextMemoryMgr(mContext), + GetMaxURLEncodedBufferSize(encodedSize) + bufSize, + kPGPMemoryMgrFlags_None)); +! if (encodedBuffer == (StPGPDataRef) 0) { + ThrowPGPError_(kPGPError_OutOfMemory); + } + strcpy(urlEncodedBuffer, kMessagePrefix); |