diff options
Diffstat (limited to 'security/pgp6/files/patch-ak')
-rw-r--r-- | security/pgp6/files/patch-ak | 70 |
1 files changed, 0 insertions, 70 deletions
diff --git a/security/pgp6/files/patch-ak b/security/pgp6/files/patch-ak deleted file mode 100644 index bb074fa23891..000000000000 --- a/security/pgp6/files/patch-ak +++ /dev/null @@ -1,70 +0,0 @@ -*** libs/pgpcdk/priv/networklib/keyserver/CCRSEntrustServer.cpp 2000/01/26 03:10:44 1.1.1.1 ---- libs/pgpcdk/priv/networklib/keyserver/CCRSEntrustServer.cpp 2000/01/26 03:13:47 1.1.1.2 -*************** -*** 147,153 **** - if (! PGPKeySetRefIsValid(inCAsKeySet)) { - ThrowPGPError_(kPGPError_OptionNotFound); - } -! if (accumulatedCRLs == 0) { - ThrowPGPError_(kPGPError_OutOfMemory); - } - pgpErr = PGPGetCRLDistributionPoints(inCAKey, inCAsKeySet, &numPoints, &points, ---- 147,153 ---- - if (! PGPKeySetRefIsValid(inCAsKeySet)) { - ThrowPGPError_(kPGPError_OptionNotFound); - } -! if (accumulatedCRLs == (StPGPDataRef) 0) { - ThrowPGPError_(kPGPError_OutOfMemory); - } - pgpErr = PGPGetCRLDistributionPoints(inCAKey, inCAsKeySet, &numPoints, &points, -*************** -*** 173,179 **** - #if PGP_COMPILER_SUN - pgpCopyMemory(static_cast<PGPByte *>(crl), static_cast<PGPByte *>(accumulatedCRLs) + accumulatedSize, crlSize); - #else -! pgpCopyMemory(crl, static_cast<PGPByte *>(accumulatedCRLs) + accumulatedSize, crlSize); - #endif - accumulatedSize += crlSize; - currPoint += *currPointSize; ---- 173,179 ---- - #if PGP_COMPILER_SUN - pgpCopyMemory(static_cast<PGPByte *>(crl), static_cast<PGPByte *>(accumulatedCRLs) + accumulatedSize, crlSize); - #else -! pgpCopyMemory((void *) crl, static_cast<PGPByte *>(accumulatedCRLs) + accumulatedSize, crlSize); - #endif - accumulatedSize += crlSize; - currPoint += *currPointSize; -*************** -*** 215,221 **** - PGPNewData( PGPGetContextMemoryMgr(mContext), - GetMaxBase64EncodedBufferSize(inMessageLength), - kPGPMemoryMgrFlags_None)); -! if (encodedBuffer == 0) { - ThrowPGPError_(kPGPError_OutOfMemory); - } - encodedSize = Base64Encode( static_cast<const PGPByte *>(inMessage), ---- 215,221 ---- - PGPNewData( PGPGetContextMemoryMgr(mContext), - GetMaxBase64EncodedBufferSize(inMessageLength), - kPGPMemoryMgrFlags_None)); -! if (encodedBuffer == (StPGPDataRef) 0) { - ThrowPGPError_(kPGPError_OutOfMemory); - } - encodedSize = Base64Encode( static_cast<const PGPByte *>(inMessage), -*************** -*** 226,232 **** - PGPNewData( PGPGetContextMemoryMgr(mContext), - GetMaxURLEncodedBufferSize(encodedSize) + bufSize, - kPGPMemoryMgrFlags_None)); -! if (encodedBuffer == 0) { - ThrowPGPError_(kPGPError_OutOfMemory); - } - strcpy(urlEncodedBuffer, kMessagePrefix); ---- 226,232 ---- - PGPNewData( PGPGetContextMemoryMgr(mContext), - GetMaxURLEncodedBufferSize(encodedSize) + bufSize, - kPGPMemoryMgrFlags_None)); -! if (encodedBuffer == (StPGPDataRef) 0) { - ThrowPGPError_(kPGPError_OutOfMemory); - } - strcpy(urlEncodedBuffer, kMessagePrefix); |