共有 2 個文件被更改,包括 519 次插入 和 14 次删除
@ -0,0 +1,495 @@
|
||||
*** libs/pfl/common/pgpRMWOLock.c 2000/01/25 23:30:04 1.1.1.1
|
||||
--- libs/pfl/common/pgpRMWOLock.c 2000/01/25 23:32:31 1.1.1.2
|
||||
***************
|
||||
*** 8,15 ****
|
||||
____________________________________________________________________________*/
|
||||
|
||||
#include "pgpBase.h"
|
||||
|
||||
#include "pgpRMWOLock.h"
|
||||
|
||||
#if PGP_UNIX_SOLARIS
|
||||
/*
|
||||
--- 8,19 ----
|
||||
____________________________________________________________________________*/
|
||||
|
||||
#include "pgpBase.h"
|
||||
|
||||
#include "pgpRMWOLock.h"
|
||||
+
|
||||
+ #ifdef __FreeBSD__
|
||||
+ #define NULL 0 /* undefined for some reason */
|
||||
+ #endif
|
||||
|
||||
#if PGP_UNIX_SOLARIS
|
||||
/*
|
||||
*** libs/pgpcdk/priv/crypto/bignum/bni80386_aout.s 2000/01/26 03:23:29 1.1
|
||||
--- libs/pgpcdk/priv/crypto/bignum/bni80386_aout.s 2000/01/26 03:23:59 1.2
|
||||
***************
|
||||
*** 16,24 ****
|
||||
|
||||
# Different assemblers have different conventions here
|
||||
# These conventions are for a.out format assembler
|
||||
! align4=2 # could be 2 or 4
|
||||
! align8=3 # could be 3 or 8
|
||||
! align16=4 # cound be 4 or 16
|
||||
|
||||
|
||||
.text
|
||||
--- 16,26 ----
|
||||
|
||||
# Different assemblers have different conventions here
|
||||
# These conventions are for a.out format assembler
|
||||
!
|
||||
! # Changed from 2,3,4 to 4,8,16 for FreeBSD
|
||||
! align4=4 # could be 2 or 4
|
||||
! align8=8 # could be 3 or 8
|
||||
! align16=16 # cound be 4 or 16
|
||||
|
||||
|
||||
.text
|
||||
*** libs/pgpcdk/pub/include/pgpSockets.h 2000/01/26 03:10:46 1.1.1.1
|
||||
--- libs/pgpcdk/pub/include/pgpSockets.h 2000/01/26 03:13:58 1.1.1.2
|
||||
***************
|
||||
*** 30,35 ****
|
||||
--- 30,39 ----
|
||||
# include <netdb.h>
|
||||
#endif
|
||||
|
||||
+ #ifdef __FreeBSD__
|
||||
+ # include <sys/ioctl.h> /* Need FIONREAD */
|
||||
+ #endif
|
||||
+
|
||||
#if PGP_WIN32
|
||||
# include <winsock.h>
|
||||
#endif
|
||||
*** libs/pgpcdk/priv/networklib/keyserver/CCRSEntrustServer.cpp 2000/01/26 03:10:44 1.1.1.1
|
||||
--- libs/pgpcdk/priv/networklib/keyserver/CCRSEntrustServer.cpp 2000/01/26 03:13:47 1.1.1.2
|
||||
***************
|
||||
*** 147,153 ****
|
||||
if (! PGPKeySetRefIsValid(inCAsKeySet)) {
|
||||
ThrowPGPError_(kPGPError_OptionNotFound);
|
||||
}
|
||||
! if (accumulatedCRLs == 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
}
|
||||
pgpErr = PGPGetCRLDistributionPoints(inCAKey, inCAsKeySet, &numPoints, &points,
|
||||
--- 147,153 ----
|
||||
if (! PGPKeySetRefIsValid(inCAsKeySet)) {
|
||||
ThrowPGPError_(kPGPError_OptionNotFound);
|
||||
}
|
||||
! if (accumulatedCRLs == (StPGPDataRef) 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
}
|
||||
pgpErr = PGPGetCRLDistributionPoints(inCAKey, inCAsKeySet, &numPoints, &points,
|
||||
***************
|
||||
*** 173,179 ****
|
||||
#if PGP_COMPILER_SUN
|
||||
pgpCopyMemory(static_cast<PGPByte *>(crl), static_cast<PGPByte *>(accumulatedCRLs) + accumulatedSize, crlSize);
|
||||
#else
|
||||
! pgpCopyMemory(crl, static_cast<PGPByte *>(accumulatedCRLs) + accumulatedSize, crlSize);
|
||||
#endif
|
||||
accumulatedSize += crlSize;
|
||||
currPoint += *currPointSize;
|
||||
--- 173,179 ----
|
||||
#if PGP_COMPILER_SUN
|
||||
pgpCopyMemory(static_cast<PGPByte *>(crl), static_cast<PGPByte *>(accumulatedCRLs) + accumulatedSize, crlSize);
|
||||
#else
|
||||
! pgpCopyMemory((void *) crl, static_cast<PGPByte *>(accumulatedCRLs) + accumulatedSize, crlSize);
|
||||
#endif
|
||||
accumulatedSize += crlSize;
|
||||
currPoint += *currPointSize;
|
||||
***************
|
||||
*** 215,221 ****
|
||||
PGPNewData( PGPGetContextMemoryMgr(mContext),
|
||||
GetMaxBase64EncodedBufferSize(inMessageLength),
|
||||
kPGPMemoryMgrFlags_None));
|
||||
! if (encodedBuffer == 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
}
|
||||
encodedSize = Base64Encode( static_cast<const PGPByte *>(inMessage),
|
||||
--- 215,221 ----
|
||||
PGPNewData( PGPGetContextMemoryMgr(mContext),
|
||||
GetMaxBase64EncodedBufferSize(inMessageLength),
|
||||
kPGPMemoryMgrFlags_None));
|
||||
! if (encodedBuffer == (StPGPDataRef) 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
}
|
||||
encodedSize = Base64Encode( static_cast<const PGPByte *>(inMessage),
|
||||
***************
|
||||
*** 226,232 ****
|
||||
PGPNewData( PGPGetContextMemoryMgr(mContext),
|
||||
GetMaxURLEncodedBufferSize(encodedSize) + bufSize,
|
||||
kPGPMemoryMgrFlags_None));
|
||||
! if (encodedBuffer == 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
}
|
||||
strcpy(urlEncodedBuffer, kMessagePrefix);
|
||||
--- 226,232 ----
|
||||
PGPNewData( PGPGetContextMemoryMgr(mContext),
|
||||
GetMaxURLEncodedBufferSize(encodedSize) + bufSize,
|
||||
kPGPMemoryMgrFlags_None));
|
||||
! if (encodedBuffer == (StPGPDataRef) 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
}
|
||||
strcpy(urlEncodedBuffer, kMessagePrefix);
|
||||
*** libs/pgpcdk/priv/networklib/keyserver/CHTTPKeyServer.cpp 2000/01/26 03:10:44 1.1.1.1
|
||||
--- libs/pgpcdk/priv/networklib/keyserver/CHTTPKeyServer.cpp 2000/01/26 03:13:48 1.1.1.2
|
||||
***************
|
||||
*** 341,353 ****
|
||||
tempStorage = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
|
||||
kTempStorageSize,
|
||||
kPGPMemoryMgrFlags_None));
|
||||
! if (tempStorage == 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
}
|
||||
buffer = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
|
||||
result + 1,
|
||||
kPGPMemoryMgrFlags_None));
|
||||
! if (buffer == 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
}
|
||||
socketResult = PGPReceive( mSocket,
|
||||
--- 341,353 ----
|
||||
tempStorage = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
|
||||
kTempStorageSize,
|
||||
kPGPMemoryMgrFlags_None));
|
||||
! if (tempStorage == (StPGPDataRef) 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
}
|
||||
buffer = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
|
||||
result + 1,
|
||||
kPGPMemoryMgrFlags_None));
|
||||
! if (buffer == (StPGPDataRef) 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
}
|
||||
socketResult = PGPReceive( mSocket,
|
||||
*** libs/pgpcdk/priv/networklib/keyserver/CHTTPPGPKeyServer.cpp 2000/01/26 03:10:44 1.1.1.1
|
||||
--- libs/pgpcdk/priv/networklib/keyserver/CHTTPPGPKeyServer.cpp 2000/01/26 03:13:48 1.1.1.2
|
||||
***************
|
||||
*** 92,98 ****
|
||||
path = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
|
||||
strlen(kQueryPrefix) + strlen(query) + 1,
|
||||
kPGPMemoryMgrFlags_None));
|
||||
! if (path == 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
}
|
||||
sprintf(path, "%s%s", kQueryPrefix, static_cast<char *>(query));
|
||||
--- 92,98 ----
|
||||
path = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
|
||||
strlen(kQueryPrefix) + strlen(query) + 1,
|
||||
kPGPMemoryMgrFlags_None));
|
||||
! if (path == (StPGPDataRef) 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
}
|
||||
sprintf(path, "%s%s", kQueryPrefix, static_cast<char *>(query));
|
||||
***************
|
||||
*** 188,194 ****
|
||||
PGPNewData( PGPGetContextMemoryMgr(mContext),
|
||||
GetMaxURLEncodedBufferSize(bufSize) + postPrefixSize,
|
||||
kPGPMemoryMgrFlags_None));
|
||||
! if (urlEncodedBuffer == 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
}
|
||||
strcpy(urlEncodedBuffer, kPostPrefix);
|
||||
--- 188,194 ----
|
||||
PGPNewData( PGPGetContextMemoryMgr(mContext),
|
||||
GetMaxURLEncodedBufferSize(bufSize) + postPrefixSize,
|
||||
kPGPMemoryMgrFlags_None));
|
||||
! if (urlEncodedBuffer == (StPGPDataRef) 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
}
|
||||
strcpy(urlEncodedBuffer, kPostPrefix);
|
||||
*** libs/pgpcdk/priv/networklib/keyserver/CHTTPXcertServer.cpp 2000/01/26 03:10:44 1.1.1.1
|
||||
--- libs/pgpcdk/priv/networklib/keyserver/CHTTPXcertServer.cpp 2000/01/26 03:13:49 1.1.1.2
|
||||
***************
|
||||
*** 89,95 ****
|
||||
digest = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
|
||||
GetMaxDigestedKeyBufferSize(),
|
||||
kPGPMemoryMgrFlags_None));
|
||||
! if (digest == 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
};
|
||||
digestSize = DigestKey(inCAKey, digest);
|
||||
--- 89,95 ----
|
||||
digest = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
|
||||
GetMaxDigestedKeyBufferSize(),
|
||||
kPGPMemoryMgrFlags_None));
|
||||
! if (digest == (StPGPDataRef) 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
};
|
||||
digestSize = DigestKey(inCAKey, digest);
|
||||
***************
|
||||
*** 98,104 ****
|
||||
PGPNewData( PGPGetContextMemoryMgr(mContext),
|
||||
GetMaxBase64EncodedBufferSize(inBufferSize),
|
||||
kPGPMemoryMgrFlags_None));
|
||||
! if (encodedBuffer == 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
};
|
||||
bufSize = Base64Encode( static_cast<const PGPByte *>(inBuffer),
|
||||
--- 98,104 ----
|
||||
PGPNewData( PGPGetContextMemoryMgr(mContext),
|
||||
GetMaxBase64EncodedBufferSize(inBufferSize),
|
||||
kPGPMemoryMgrFlags_None));
|
||||
! if (encodedBuffer == (StPGPDataRef) 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
};
|
||||
bufSize = Base64Encode( static_cast<const PGPByte *>(inBuffer),
|
||||
***************
|
||||
*** 109,115 ****
|
||||
cnk = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
|
||||
cnkSize,
|
||||
kPGPMemoryMgrFlags_None));
|
||||
! if (cnk == 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
}
|
||||
pgpErr = PGPGetKeyPropertyBuffer( inRequestKey,
|
||||
--- 109,115 ----
|
||||
cnk = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
|
||||
cnkSize,
|
||||
kPGPMemoryMgrFlags_None));
|
||||
! if (cnk == (StPGPDataRef) 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
}
|
||||
pgpErr = PGPGetKeyPropertyBuffer( inRequestKey,
|
||||
***************
|
||||
*** 121,127 ****
|
||||
encodedCNK = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
|
||||
GetMaxHexEncodedBufferSize(cnkSize),
|
||||
kPGPMemoryMgrFlags_None));
|
||||
! if (encodedCNK == 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
}
|
||||
cnkSize = HexEncode(cnk, cnkSize, encodedCNK);
|
||||
--- 121,127 ----
|
||||
encodedCNK = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
|
||||
GetMaxHexEncodedBufferSize(cnkSize),
|
||||
kPGPMemoryMgrFlags_None));
|
||||
! if (encodedCNK == (StPGPDataRef) 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
}
|
||||
cnkSize = HexEncode(cnk, cnkSize, encodedCNK);
|
||||
***************
|
||||
*** 131,137 ****
|
||||
strlen(kCA) + digestSize + strlen(kCNK) + cnkSize
|
||||
+ strlen(kPKCS10_input) + GetMaxURLEncodedBufferSize(bufSize),
|
||||
kPGPMemoryMgrFlags_None));
|
||||
! if (post == 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
};
|
||||
postSize = sprintf(post, "%s%s%s%s%s", kCA, static_cast<char *>(digest), kCNK,
|
||||
--- 131,137 ----
|
||||
strlen(kCA) + digestSize + strlen(kCNK) + cnkSize
|
||||
+ strlen(kPKCS10_input) + GetMaxURLEncodedBufferSize(bufSize),
|
||||
kPGPMemoryMgrFlags_None));
|
||||
! if (post == (StPGPDataRef) 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
};
|
||||
postSize = sprintf(post, "%s%s%s%s%s", kCA, static_cast<char *>(digest), kCNK,
|
||||
***************
|
||||
*** 196,202 ****
|
||||
path = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
|
||||
strlen(prefix) + strlen(query) + 1,
|
||||
kPGPMemoryMgrFlags_None));
|
||||
! if (path == 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
}
|
||||
sprintf(path, "%s%s", prefix, static_cast<char *>(query));
|
||||
--- 196,202 ----
|
||||
path = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
|
||||
strlen(prefix) + strlen(query) + 1,
|
||||
kPGPMemoryMgrFlags_None));
|
||||
! if (path == (StPGPDataRef) 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
}
|
||||
sprintf(path, "%s%s", prefix, static_cast<char *>(query));
|
||||
***************
|
||||
*** 258,271 ****
|
||||
digest = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
|
||||
GetMaxDigestedKeyBufferSize(),
|
||||
kPGPMemoryMgrFlags_None));
|
||||
! if (digest == 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
};
|
||||
digestSize = DigestKey(inCAKey, digest);
|
||||
path = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
|
||||
strlen(prefix) + digestSize + 1,
|
||||
kPGPMemoryMgrFlags_None));
|
||||
! if (path == 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
}
|
||||
sprintf(path, "%s%s", prefix, static_cast<char *>(digest));
|
||||
--- 258,271 ----
|
||||
digest = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
|
||||
GetMaxDigestedKeyBufferSize(),
|
||||
kPGPMemoryMgrFlags_None));
|
||||
! if (digest == (StPGPDataRef) 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
};
|
||||
digestSize = DigestKey(inCAKey, digest);
|
||||
path = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
|
||||
strlen(prefix) + digestSize + 1,
|
||||
kPGPMemoryMgrFlags_None));
|
||||
! if (path == (StPGPDataRef) 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
}
|
||||
sprintf(path, "%s%s", prefix, static_cast<char *>(digest));
|
||||
***************
|
||||
*** 323,329 ****
|
||||
PGPNewData( PGPGetContextMemoryMgr(mContext),
|
||||
GetMaxBase64EncodedBufferSize(bufSize),
|
||||
kPGPMemoryMgrFlags_None));
|
||||
! if (encodedBuffer == 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
};
|
||||
bufSize = Base64Encode( static_cast<const PGPByte *>(buffer),
|
||||
--- 323,329 ----
|
||||
PGPNewData( PGPGetContextMemoryMgr(mContext),
|
||||
GetMaxBase64EncodedBufferSize(bufSize),
|
||||
kPGPMemoryMgrFlags_None));
|
||||
! if (encodedBuffer == (StPGPDataRef) 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
};
|
||||
bufSize = Base64Encode( static_cast<const PGPByte *>(buffer),
|
||||
***************
|
||||
*** 351,357 ****
|
||||
buffer = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
|
||||
bufSize,
|
||||
kPGPMemoryMgrFlags_None));
|
||||
! if (buffer == 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
};
|
||||
pgpErr = PGPFinalizeHash(hashContext, static_cast<char *>(buffer));
|
||||
--- 351,357 ----
|
||||
buffer = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
|
||||
bufSize,
|
||||
kPGPMemoryMgrFlags_None));
|
||||
! if (buffer == (StPGPDataRef) 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
};
|
||||
pgpErr = PGPFinalizeHash(hashContext, static_cast<char *>(buffer));
|
||||
***************
|
||||
*** 400,406 ****
|
||||
result = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
|
||||
resultSize + 1,
|
||||
kPGPMemoryMgrFlags_None));
|
||||
! if (result == 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
};
|
||||
pgpCopyMemory(inResult, static_cast<char *>(result), resultSize + 1);
|
||||
--- 400,406 ----
|
||||
result = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
|
||||
resultSize + 1,
|
||||
kPGPMemoryMgrFlags_None));
|
||||
! if (result == (StPGPDataRef) 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
};
|
||||
pgpCopyMemory(inResult, static_cast<char *>(result), resultSize + 1);
|
||||
***************
|
||||
*** 426,432 ****
|
||||
decodedResult = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
|
||||
GetMaxBase64DecodedBufferSize(end - found),
|
||||
kPGPMemoryMgrFlags_None));
|
||||
! if (decodedResult == 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
};
|
||||
|
||||
--- 426,432 ----
|
||||
decodedResult = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
|
||||
GetMaxBase64DecodedBufferSize(end - found),
|
||||
kPGPMemoryMgrFlags_None));
|
||||
! if (decodedResult == (StPGPDataRef) 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
};
|
||||
|
||||
***************
|
||||
*** 470,476 ****
|
||||
result = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
|
||||
GetMaxBase64DecodedBufferSize(end - found),
|
||||
kPGPMemoryMgrFlags_None));
|
||||
! if (result == 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
};
|
||||
|
||||
--- 470,476 ----
|
||||
result = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
|
||||
GetMaxBase64DecodedBufferSize(end - found),
|
||||
kPGPMemoryMgrFlags_None));
|
||||
! if (result == (StPGPDataRef) 0) {
|
||||
ThrowPGPError_(kPGPError_OutOfMemory);
|
||||
};
|
||||
|
||||
*** libs/network/ldaplib/liblber/io.c 2000/01/26 03:10:31 1.1.1.1
|
||||
--- libs/network/ldaplib/liblber/io.c 2000/01/26 03:12:55 1.1.1.2
|
||||
***************
|
||||
*** 14,19 ****
|
||||
--- 14,23 ----
|
||||
#include <stdio.h>
|
||||
#include <ctype.h>
|
||||
|
||||
+ #ifdef __FreeBSD__
|
||||
+ #include <sys/time.h>
|
||||
+ #endif
|
||||
+
|
||||
#if PGPSOCKETSLDAP /* jason */
|
||||
#include "pgpSocketsLDAP.h"
|
||||
|
||||
*** libs/network/ldaplib/include/ldap.h 2000/01/26 03:10:31 1.1.1.1
|
||||
--- libs/network/ldaplib/include/ldap.h 2000/01/26 03:12:53 1.1.1.2
|
||||
***************
|
||||
*** 90,95 ****
|
||||
--- 90,99 ----
|
||||
#define GetThreadID pthread_self
|
||||
#endif
|
||||
|
||||
+ #ifdef __FreeBSD__
|
||||
+ #define GetThreadID pthread_self
|
||||
+ #endif
|
||||
+
|
||||
#if PGP_MACINTOSH
|
||||
#define Debug( level, fmt, arg1, arg2, arg3 ) {} /* Nothing */
|
||||
#else
|
||||
--- libs/pgpcdk/priv/crypto/random/pgpRandomPool.c.orig Fri Aug 6 13:56:49 1999
|
||||
+++ libs/pgpcdk/priv/crypto/random/pgpRandomPool.c Fri Sep 29 20:41:26 2000
|
||||
@@ -424,7 +424,7 @@
|
||||
* #define UMULH_32(r,a,b) (r) = 0
|
||||
*/
|
||||
#ifndef UMULH_32
|
||||
-#if defined(__GNUC__) && defined(__i386__)
|
||||
+#if 0
|
||||
/* Inline asm goodies */
|
||||
#define UMULH_32(r,a,b) __asm__("mull %2" : "=d"(r) : "%a"(a), "mr"(b) : "ax")
|
||||
#elif HAVE64
|
||||
--- libs/pgpcdk/unix/ui/PGPKeyServerDialogs.cpp.orig Tue Mar 9 18:52:17 1999
|
||||
+++ libs/pgpcdk/unix/ui/PGPKeyServerDialogs.cpp Fri Sep 29 20:51:02 2000
|
||||
@@ -5,6 +5,7 @@
|
||||
$Id: pgpsrc658unix.patch,v 1.2 2001/10/19 15:50:31 rse Exp $
|
||||
____________________________________________________________________________*/
|
||||
#include <string.h>
|
||||
+#include <stdlib.h>
|
||||
|
||||
#include "pgpDialogs.h"
|
||||
#include "pgpKeyServerDialogCommon.h"
|
||||
--- libs/pfl/common/pgpDebug.c.orig Wed Mar 10 03:49:24 1999
|
||||
+++ libs/pfl/common/pgpDebug.c Sun Aug 19 11:27:06 2001
|
||||
@@ -191,7 +191,7 @@
|
||||
|
||||
case 'c': /* Single character */
|
||||
{
|
||||
- char ch = va_arg(args, char);
|
||||
+ char ch = va_arg(args, int);
|
||||
|
||||
AppendChars(buffer, &bufferIndex, bufferSize,
|
||||
canonicalizeNLs, &ch, 1);
|
||||
--- clients/pgp/cmdline/Makefile.in.orig Fri Oct 19 14:53:23 2001
|
||||
+++ clients/pgp/cmdline/Makefile.in Fri Sep 1 23:11:16 2000
|
||||
@@ -50,7 +50,7 @@
|
||||
|
||||
LIBDIRS+=-L$(PFLDIR) -L$(SDKDIR)/unix -L$(RSALIBRARY)$(RSA_OS)
|
||||
|
||||
-LIBS=-lPGPui -lPGPsdkNetwork -lPGPsdk -lpfl @THREADLIB@ $(RSALIBS) @LIBS@
|
||||
+LIBS=-lPGPui -lPGPsdkNetwork -lPGPsdk -lPGPui -lpfl @THREADLIB@ $(RSALIBS) @LIBS@
|
||||
|
||||
SHAREDOBJS=$(SHAREDDIR)/pgpDiskWiper.o $(SHAREDDIR)/pgpClientErrors.o
|
||||
|
Loading…
Reference in new issue