summaryrefslogtreecommitdiff
path: root/security/pgp6/files/patch-ak
diff options
context:
space:
mode:
Diffstat (limited to 'security/pgp6/files/patch-ak')
-rw-r--r--security/pgp6/files/patch-ak70
1 files changed, 70 insertions, 0 deletions
diff --git a/security/pgp6/files/patch-ak b/security/pgp6/files/patch-ak
new file mode 100644
index 000000000000..bb074fa23891
--- /dev/null
+++ b/security/pgp6/files/patch-ak
@@ -0,0 +1,70 @@
+*** libs/pgpcdk/priv/networklib/keyserver/CCRSEntrustServer.cpp 2000/01/26 03:10:44 1.1.1.1
+--- libs/pgpcdk/priv/networklib/keyserver/CCRSEntrustServer.cpp 2000/01/26 03:13:47 1.1.1.2
+***************
+*** 147,153 ****
+ if (! PGPKeySetRefIsValid(inCAsKeySet)) {
+ ThrowPGPError_(kPGPError_OptionNotFound);
+ }
+! if (accumulatedCRLs == 0) {
+ ThrowPGPError_(kPGPError_OutOfMemory);
+ }
+ pgpErr = PGPGetCRLDistributionPoints(inCAKey, inCAsKeySet, &numPoints, &points,
+--- 147,153 ----
+ if (! PGPKeySetRefIsValid(inCAsKeySet)) {
+ ThrowPGPError_(kPGPError_OptionNotFound);
+ }
+! if (accumulatedCRLs == (StPGPDataRef) 0) {
+ ThrowPGPError_(kPGPError_OutOfMemory);
+ }
+ pgpErr = PGPGetCRLDistributionPoints(inCAKey, inCAsKeySet, &numPoints, &points,
+***************
+*** 173,179 ****
+ #if PGP_COMPILER_SUN
+ pgpCopyMemory(static_cast<PGPByte *>(crl), static_cast<PGPByte *>(accumulatedCRLs) + accumulatedSize, crlSize);
+ #else
+! pgpCopyMemory(crl, static_cast<PGPByte *>(accumulatedCRLs) + accumulatedSize, crlSize);
+ #endif
+ accumulatedSize += crlSize;
+ currPoint += *currPointSize;
+--- 173,179 ----
+ #if PGP_COMPILER_SUN
+ pgpCopyMemory(static_cast<PGPByte *>(crl), static_cast<PGPByte *>(accumulatedCRLs) + accumulatedSize, crlSize);
+ #else
+! pgpCopyMemory((void *) crl, static_cast<PGPByte *>(accumulatedCRLs) + accumulatedSize, crlSize);
+ #endif
+ accumulatedSize += crlSize;
+ currPoint += *currPointSize;
+***************
+*** 215,221 ****
+ PGPNewData( PGPGetContextMemoryMgr(mContext),
+ GetMaxBase64EncodedBufferSize(inMessageLength),
+ kPGPMemoryMgrFlags_None));
+! if (encodedBuffer == 0) {
+ ThrowPGPError_(kPGPError_OutOfMemory);
+ }
+ encodedSize = Base64Encode( static_cast<const PGPByte *>(inMessage),
+--- 215,221 ----
+ PGPNewData( PGPGetContextMemoryMgr(mContext),
+ GetMaxBase64EncodedBufferSize(inMessageLength),
+ kPGPMemoryMgrFlags_None));
+! if (encodedBuffer == (StPGPDataRef) 0) {
+ ThrowPGPError_(kPGPError_OutOfMemory);
+ }
+ encodedSize = Base64Encode( static_cast<const PGPByte *>(inMessage),
+***************
+*** 226,232 ****
+ PGPNewData( PGPGetContextMemoryMgr(mContext),
+ GetMaxURLEncodedBufferSize(encodedSize) + bufSize,
+ kPGPMemoryMgrFlags_None));
+! if (encodedBuffer == 0) {
+ ThrowPGPError_(kPGPError_OutOfMemory);
+ }
+ strcpy(urlEncodedBuffer, kMessagePrefix);
+--- 226,232 ----
+ PGPNewData( PGPGetContextMemoryMgr(mContext),
+ GetMaxURLEncodedBufferSize(encodedSize) + bufSize,
+ kPGPMemoryMgrFlags_None));
+! if (encodedBuffer == (StPGPDataRef) 0) {
+ ThrowPGPError_(kPGPError_OutOfMemory);
+ }
+ strcpy(urlEncodedBuffer, kMessagePrefix);