summaryrefslogtreecommitdiff
path: root/security/pgp6/files/patch-an
diff options
context:
space:
mode:
Diffstat (limited to 'security/pgp6/files/patch-an')
-rw-r--r--security/pgp6/files/patch-an220
1 files changed, 0 insertions, 220 deletions
diff --git a/security/pgp6/files/patch-an b/security/pgp6/files/patch-an
deleted file mode 100644
index 3b149f2b1917..000000000000
--- a/security/pgp6/files/patch-an
+++ /dev/null
@@ -1,220 +0,0 @@
-*** libs/pgpcdk/priv/networklib/keyserver/CHTTPXcertServer.cpp 2000/01/26 03:10:44 1.1.1.1
---- libs/pgpcdk/priv/networklib/keyserver/CHTTPXcertServer.cpp 2000/01/26 03:13:49 1.1.1.2
-***************
-*** 89,95 ****
- digest = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
- GetMaxDigestedKeyBufferSize(),
- kPGPMemoryMgrFlags_None));
-! if (digest == 0) {
- ThrowPGPError_(kPGPError_OutOfMemory);
- };
- digestSize = DigestKey(inCAKey, digest);
---- 89,95 ----
- digest = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
- GetMaxDigestedKeyBufferSize(),
- kPGPMemoryMgrFlags_None));
-! if (digest == (StPGPDataRef) 0) {
- ThrowPGPError_(kPGPError_OutOfMemory);
- };
- digestSize = DigestKey(inCAKey, digest);
-***************
-*** 98,104 ****
- PGPNewData( PGPGetContextMemoryMgr(mContext),
- GetMaxBase64EncodedBufferSize(inBufferSize),
- kPGPMemoryMgrFlags_None));
-! if (encodedBuffer == 0) {
- ThrowPGPError_(kPGPError_OutOfMemory);
- };
- bufSize = Base64Encode( static_cast<const PGPByte *>(inBuffer),
---- 98,104 ----
- PGPNewData( PGPGetContextMemoryMgr(mContext),
- GetMaxBase64EncodedBufferSize(inBufferSize),
- kPGPMemoryMgrFlags_None));
-! if (encodedBuffer == (StPGPDataRef) 0) {
- ThrowPGPError_(kPGPError_OutOfMemory);
- };
- bufSize = Base64Encode( static_cast<const PGPByte *>(inBuffer),
-***************
-*** 109,115 ****
- cnk = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
- cnkSize,
- kPGPMemoryMgrFlags_None));
-! if (cnk == 0) {
- ThrowPGPError_(kPGPError_OutOfMemory);
- }
- pgpErr = PGPGetKeyPropertyBuffer( inRequestKey,
---- 109,115 ----
- cnk = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
- cnkSize,
- kPGPMemoryMgrFlags_None));
-! if (cnk == (StPGPDataRef) 0) {
- ThrowPGPError_(kPGPError_OutOfMemory);
- }
- pgpErr = PGPGetKeyPropertyBuffer( inRequestKey,
-***************
-*** 121,127 ****
- encodedCNK = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
- GetMaxHexEncodedBufferSize(cnkSize),
- kPGPMemoryMgrFlags_None));
-! if (encodedCNK == 0) {
- ThrowPGPError_(kPGPError_OutOfMemory);
- }
- cnkSize = HexEncode(cnk, cnkSize, encodedCNK);
---- 121,127 ----
- encodedCNK = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
- GetMaxHexEncodedBufferSize(cnkSize),
- kPGPMemoryMgrFlags_None));
-! if (encodedCNK == (StPGPDataRef) 0) {
- ThrowPGPError_(kPGPError_OutOfMemory);
- }
- cnkSize = HexEncode(cnk, cnkSize, encodedCNK);
-***************
-*** 131,137 ****
- strlen(kCA) + digestSize + strlen(kCNK) + cnkSize
- + strlen(kPKCS10_input) + GetMaxURLEncodedBufferSize(bufSize),
- kPGPMemoryMgrFlags_None));
-! if (post == 0) {
- ThrowPGPError_(kPGPError_OutOfMemory);
- };
- postSize = sprintf(post, "%s%s%s%s%s", kCA, static_cast<char *>(digest), kCNK,
---- 131,137 ----
- strlen(kCA) + digestSize + strlen(kCNK) + cnkSize
- + strlen(kPKCS10_input) + GetMaxURLEncodedBufferSize(bufSize),
- kPGPMemoryMgrFlags_None));
-! if (post == (StPGPDataRef) 0) {
- ThrowPGPError_(kPGPError_OutOfMemory);
- };
- postSize = sprintf(post, "%s%s%s%s%s", kCA, static_cast<char *>(digest), kCNK,
-***************
-*** 196,202 ****
- path = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
- strlen(prefix) + strlen(query) + 1,
- kPGPMemoryMgrFlags_None));
-! if (path == 0) {
- ThrowPGPError_(kPGPError_OutOfMemory);
- }
- sprintf(path, "%s%s", prefix, static_cast<char *>(query));
---- 196,202 ----
- path = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
- strlen(prefix) + strlen(query) + 1,
- kPGPMemoryMgrFlags_None));
-! if (path == (StPGPDataRef) 0) {
- ThrowPGPError_(kPGPError_OutOfMemory);
- }
- sprintf(path, "%s%s", prefix, static_cast<char *>(query));
-***************
-*** 258,271 ****
- digest = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
- GetMaxDigestedKeyBufferSize(),
- kPGPMemoryMgrFlags_None));
-! if (digest == 0) {
- ThrowPGPError_(kPGPError_OutOfMemory);
- };
- digestSize = DigestKey(inCAKey, digest);
- path = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
- strlen(prefix) + digestSize + 1,
- kPGPMemoryMgrFlags_None));
-! if (path == 0) {
- ThrowPGPError_(kPGPError_OutOfMemory);
- }
- sprintf(path, "%s%s", prefix, static_cast<char *>(digest));
---- 258,271 ----
- digest = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
- GetMaxDigestedKeyBufferSize(),
- kPGPMemoryMgrFlags_None));
-! if (digest == (StPGPDataRef) 0) {
- ThrowPGPError_(kPGPError_OutOfMemory);
- };
- digestSize = DigestKey(inCAKey, digest);
- path = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
- strlen(prefix) + digestSize + 1,
- kPGPMemoryMgrFlags_None));
-! if (path == (StPGPDataRef) 0) {
- ThrowPGPError_(kPGPError_OutOfMemory);
- }
- sprintf(path, "%s%s", prefix, static_cast<char *>(digest));
-***************
-*** 323,329 ****
- PGPNewData( PGPGetContextMemoryMgr(mContext),
- GetMaxBase64EncodedBufferSize(bufSize),
- kPGPMemoryMgrFlags_None));
-! if (encodedBuffer == 0) {
- ThrowPGPError_(kPGPError_OutOfMemory);
- };
- bufSize = Base64Encode( static_cast<const PGPByte *>(buffer),
---- 323,329 ----
- PGPNewData( PGPGetContextMemoryMgr(mContext),
- GetMaxBase64EncodedBufferSize(bufSize),
- kPGPMemoryMgrFlags_None));
-! if (encodedBuffer == (StPGPDataRef) 0) {
- ThrowPGPError_(kPGPError_OutOfMemory);
- };
- bufSize = Base64Encode( static_cast<const PGPByte *>(buffer),
-***************
-*** 351,357 ****
- buffer = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
- bufSize,
- kPGPMemoryMgrFlags_None));
-! if (buffer == 0) {
- ThrowPGPError_(kPGPError_OutOfMemory);
- };
- pgpErr = PGPFinalizeHash(hashContext, static_cast<char *>(buffer));
---- 351,357 ----
- buffer = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
- bufSize,
- kPGPMemoryMgrFlags_None));
-! if (buffer == (StPGPDataRef) 0) {
- ThrowPGPError_(kPGPError_OutOfMemory);
- };
- pgpErr = PGPFinalizeHash(hashContext, static_cast<char *>(buffer));
-***************
-*** 400,406 ****
- result = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
- resultSize + 1,
- kPGPMemoryMgrFlags_None));
-! if (result == 0) {
- ThrowPGPError_(kPGPError_OutOfMemory);
- };
- pgpCopyMemory(inResult, static_cast<char *>(result), resultSize + 1);
---- 400,406 ----
- result = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
- resultSize + 1,
- kPGPMemoryMgrFlags_None));
-! if (result == (StPGPDataRef) 0) {
- ThrowPGPError_(kPGPError_OutOfMemory);
- };
- pgpCopyMemory(inResult, static_cast<char *>(result), resultSize + 1);
-***************
-*** 426,432 ****
- decodedResult = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
- GetMaxBase64DecodedBufferSize(end - found),
- kPGPMemoryMgrFlags_None));
-! if (decodedResult == 0) {
- ThrowPGPError_(kPGPError_OutOfMemory);
- };
-
---- 426,432 ----
- decodedResult = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
- GetMaxBase64DecodedBufferSize(end - found),
- kPGPMemoryMgrFlags_None));
-! if (decodedResult == (StPGPDataRef) 0) {
- ThrowPGPError_(kPGPError_OutOfMemory);
- };
-
-***************
-*** 470,476 ****
- result = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
- GetMaxBase64DecodedBufferSize(end - found),
- kPGPMemoryMgrFlags_None));
-! if (result == 0) {
- ThrowPGPError_(kPGPError_OutOfMemory);
- };
-
---- 470,476 ----
- result = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
- GetMaxBase64DecodedBufferSize(end - found),
- kPGPMemoryMgrFlags_None));
-! if (result == (StPGPDataRef) 0) {
- ThrowPGPError_(kPGPError_OutOfMemory);
- };
-