pgpsrc658unix.patch 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496
  1. *** libs/pfl/common/pgpRMWOLock.c 2000/01/25 23:30:04 1.1.1.1
  2. --- libs/pfl/common/pgpRMWOLock.c 2000/01/25 23:32:31 1.1.1.2
  3. ***************
  4. *** 8,15 ****
  5. ____________________________________________________________________________*/
  6. #include "pgpBase.h"
  7. #include "pgpRMWOLock.h"
  8. #if PGP_UNIX_SOLARIS
  9. /*
  10. --- 8,19 ----
  11. ____________________________________________________________________________*/
  12. #include "pgpBase.h"
  13. #include "pgpRMWOLock.h"
  14. +
  15. + #ifdef __FreeBSD__
  16. + #define NULL 0 /* undefined for some reason */
  17. + #endif
  18. #if PGP_UNIX_SOLARIS
  19. /*
  20. *** libs/pgpcdk/priv/crypto/bignum/bni80386_aout.s 2000/01/26 03:23:29 1.1
  21. --- libs/pgpcdk/priv/crypto/bignum/bni80386_aout.s 2000/01/26 03:23:59 1.2
  22. ***************
  23. *** 16,24 ****
  24. # Different assemblers have different conventions here
  25. # These conventions are for a.out format assembler
  26. ! align4=2 # could be 2 or 4
  27. ! align8=3 # could be 3 or 8
  28. ! align16=4 # cound be 4 or 16
  29. .text
  30. --- 16,26 ----
  31. # Different assemblers have different conventions here
  32. # These conventions are for a.out format assembler
  33. !
  34. ! # Changed from 2,3,4 to 4,8,16 for FreeBSD
  35. ! align4=4 # could be 2 or 4
  36. ! align8=8 # could be 3 or 8
  37. ! align16=16 # cound be 4 or 16
  38. .text
  39. *** libs/pgpcdk/pub/include/pgpSockets.h 2000/01/26 03:10:46 1.1.1.1
  40. --- libs/pgpcdk/pub/include/pgpSockets.h 2000/01/26 03:13:58 1.1.1.2
  41. ***************
  42. *** 30,35 ****
  43. --- 30,39 ----
  44. # include <netdb.h>
  45. #endif
  46. + #ifdef __FreeBSD__
  47. + # include <sys/ioctl.h> /* Need FIONREAD */
  48. + #endif
  49. +
  50. #if PGP_WIN32
  51. # include <winsock.h>
  52. #endif
  53. *** libs/pgpcdk/priv/networklib/keyserver/CCRSEntrustServer.cpp 2000/01/26 03:10:44 1.1.1.1
  54. --- libs/pgpcdk/priv/networklib/keyserver/CCRSEntrustServer.cpp 2000/01/26 03:13:47 1.1.1.2
  55. ***************
  56. *** 147,153 ****
  57. if (! PGPKeySetRefIsValid(inCAsKeySet)) {
  58. ThrowPGPError_(kPGPError_OptionNotFound);
  59. }
  60. ! if (accumulatedCRLs == 0) {
  61. ThrowPGPError_(kPGPError_OutOfMemory);
  62. }
  63. pgpErr = PGPGetCRLDistributionPoints(inCAKey, inCAsKeySet, &numPoints, &points,
  64. --- 147,153 ----
  65. if (! PGPKeySetRefIsValid(inCAsKeySet)) {
  66. ThrowPGPError_(kPGPError_OptionNotFound);
  67. }
  68. ! if (accumulatedCRLs == (StPGPDataRef) 0) {
  69. ThrowPGPError_(kPGPError_OutOfMemory);
  70. }
  71. pgpErr = PGPGetCRLDistributionPoints(inCAKey, inCAsKeySet, &numPoints, &points,
  72. ***************
  73. *** 173,179 ****
  74. #if PGP_COMPILER_SUN
  75. pgpCopyMemory(static_cast<PGPByte *>(crl), static_cast<PGPByte *>(accumulatedCRLs) + accumulatedSize, crlSize);
  76. #else
  77. ! pgpCopyMemory(crl, static_cast<PGPByte *>(accumulatedCRLs) + accumulatedSize, crlSize);
  78. #endif
  79. accumulatedSize += crlSize;
  80. currPoint += *currPointSize;
  81. --- 173,179 ----
  82. #if PGP_COMPILER_SUN
  83. pgpCopyMemory(static_cast<PGPByte *>(crl), static_cast<PGPByte *>(accumulatedCRLs) + accumulatedSize, crlSize);
  84. #else
  85. ! pgpCopyMemory((void *) crl, static_cast<PGPByte *>(accumulatedCRLs) + accumulatedSize, crlSize);
  86. #endif
  87. accumulatedSize += crlSize;
  88. currPoint += *currPointSize;
  89. ***************
  90. *** 215,221 ****
  91. PGPNewData( PGPGetContextMemoryMgr(mContext),
  92. GetMaxBase64EncodedBufferSize(inMessageLength),
  93. kPGPMemoryMgrFlags_None));
  94. ! if (encodedBuffer == 0) {
  95. ThrowPGPError_(kPGPError_OutOfMemory);
  96. }
  97. encodedSize = Base64Encode( static_cast<const PGPByte *>(inMessage),
  98. --- 215,221 ----
  99. PGPNewData( PGPGetContextMemoryMgr(mContext),
  100. GetMaxBase64EncodedBufferSize(inMessageLength),
  101. kPGPMemoryMgrFlags_None));
  102. ! if (encodedBuffer == (StPGPDataRef) 0) {
  103. ThrowPGPError_(kPGPError_OutOfMemory);
  104. }
  105. encodedSize = Base64Encode( static_cast<const PGPByte *>(inMessage),
  106. ***************
  107. *** 226,232 ****
  108. PGPNewData( PGPGetContextMemoryMgr(mContext),
  109. GetMaxURLEncodedBufferSize(encodedSize) + bufSize,
  110. kPGPMemoryMgrFlags_None));
  111. ! if (encodedBuffer == 0) {
  112. ThrowPGPError_(kPGPError_OutOfMemory);
  113. }
  114. strcpy(urlEncodedBuffer, kMessagePrefix);
  115. --- 226,232 ----
  116. PGPNewData( PGPGetContextMemoryMgr(mContext),
  117. GetMaxURLEncodedBufferSize(encodedSize) + bufSize,
  118. kPGPMemoryMgrFlags_None));
  119. ! if (encodedBuffer == (StPGPDataRef) 0) {
  120. ThrowPGPError_(kPGPError_OutOfMemory);
  121. }
  122. strcpy(urlEncodedBuffer, kMessagePrefix);
  123. *** libs/pgpcdk/priv/networklib/keyserver/CHTTPKeyServer.cpp 2000/01/26 03:10:44 1.1.1.1
  124. --- libs/pgpcdk/priv/networklib/keyserver/CHTTPKeyServer.cpp 2000/01/26 03:13:48 1.1.1.2
  125. ***************
  126. *** 341,353 ****
  127. tempStorage = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
  128. kTempStorageSize,
  129. kPGPMemoryMgrFlags_None));
  130. ! if (tempStorage == 0) {
  131. ThrowPGPError_(kPGPError_OutOfMemory);
  132. }
  133. buffer = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
  134. result + 1,
  135. kPGPMemoryMgrFlags_None));
  136. ! if (buffer == 0) {
  137. ThrowPGPError_(kPGPError_OutOfMemory);
  138. }
  139. socketResult = PGPReceive( mSocket,
  140. --- 341,353 ----
  141. tempStorage = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
  142. kTempStorageSize,
  143. kPGPMemoryMgrFlags_None));
  144. ! if (tempStorage == (StPGPDataRef) 0) {
  145. ThrowPGPError_(kPGPError_OutOfMemory);
  146. }
  147. buffer = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
  148. result + 1,
  149. kPGPMemoryMgrFlags_None));
  150. ! if (buffer == (StPGPDataRef) 0) {
  151. ThrowPGPError_(kPGPError_OutOfMemory);
  152. }
  153. socketResult = PGPReceive( mSocket,
  154. *** libs/pgpcdk/priv/networklib/keyserver/CHTTPPGPKeyServer.cpp 2000/01/26 03:10:44 1.1.1.1
  155. --- libs/pgpcdk/priv/networklib/keyserver/CHTTPPGPKeyServer.cpp 2000/01/26 03:13:48 1.1.1.2
  156. ***************
  157. *** 92,98 ****
  158. path = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
  159. strlen(kQueryPrefix) + strlen(query) + 1,
  160. kPGPMemoryMgrFlags_None));
  161. ! if (path == 0) {
  162. ThrowPGPError_(kPGPError_OutOfMemory);
  163. }
  164. sprintf(path, "%s%s", kQueryPrefix, static_cast<char *>(query));
  165. --- 92,98 ----
  166. path = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
  167. strlen(kQueryPrefix) + strlen(query) + 1,
  168. kPGPMemoryMgrFlags_None));
  169. ! if (path == (StPGPDataRef) 0) {
  170. ThrowPGPError_(kPGPError_OutOfMemory);
  171. }
  172. sprintf(path, "%s%s", kQueryPrefix, static_cast<char *>(query));
  173. ***************
  174. *** 188,194 ****
  175. PGPNewData( PGPGetContextMemoryMgr(mContext),
  176. GetMaxURLEncodedBufferSize(bufSize) + postPrefixSize,
  177. kPGPMemoryMgrFlags_None));
  178. ! if (urlEncodedBuffer == 0) {
  179. ThrowPGPError_(kPGPError_OutOfMemory);
  180. }
  181. strcpy(urlEncodedBuffer, kPostPrefix);
  182. --- 188,194 ----
  183. PGPNewData( PGPGetContextMemoryMgr(mContext),
  184. GetMaxURLEncodedBufferSize(bufSize) + postPrefixSize,
  185. kPGPMemoryMgrFlags_None));
  186. ! if (urlEncodedBuffer == (StPGPDataRef) 0) {
  187. ThrowPGPError_(kPGPError_OutOfMemory);
  188. }
  189. strcpy(urlEncodedBuffer, kPostPrefix);
  190. *** libs/pgpcdk/priv/networklib/keyserver/CHTTPXcertServer.cpp 2000/01/26 03:10:44 1.1.1.1
  191. --- libs/pgpcdk/priv/networklib/keyserver/CHTTPXcertServer.cpp 2000/01/26 03:13:49 1.1.1.2
  192. ***************
  193. *** 89,95 ****
  194. digest = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
  195. GetMaxDigestedKeyBufferSize(),
  196. kPGPMemoryMgrFlags_None));
  197. ! if (digest == 0) {
  198. ThrowPGPError_(kPGPError_OutOfMemory);
  199. };
  200. digestSize = DigestKey(inCAKey, digest);
  201. --- 89,95 ----
  202. digest = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
  203. GetMaxDigestedKeyBufferSize(),
  204. kPGPMemoryMgrFlags_None));
  205. ! if (digest == (StPGPDataRef) 0) {
  206. ThrowPGPError_(kPGPError_OutOfMemory);
  207. };
  208. digestSize = DigestKey(inCAKey, digest);
  209. ***************
  210. *** 98,104 ****
  211. PGPNewData( PGPGetContextMemoryMgr(mContext),
  212. GetMaxBase64EncodedBufferSize(inBufferSize),
  213. kPGPMemoryMgrFlags_None));
  214. ! if (encodedBuffer == 0) {
  215. ThrowPGPError_(kPGPError_OutOfMemory);
  216. };
  217. bufSize = Base64Encode( static_cast<const PGPByte *>(inBuffer),
  218. --- 98,104 ----
  219. PGPNewData( PGPGetContextMemoryMgr(mContext),
  220. GetMaxBase64EncodedBufferSize(inBufferSize),
  221. kPGPMemoryMgrFlags_None));
  222. ! if (encodedBuffer == (StPGPDataRef) 0) {
  223. ThrowPGPError_(kPGPError_OutOfMemory);
  224. };
  225. bufSize = Base64Encode( static_cast<const PGPByte *>(inBuffer),
  226. ***************
  227. *** 109,115 ****
  228. cnk = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
  229. cnkSize,
  230. kPGPMemoryMgrFlags_None));
  231. ! if (cnk == 0) {
  232. ThrowPGPError_(kPGPError_OutOfMemory);
  233. }
  234. pgpErr = PGPGetKeyPropertyBuffer( inRequestKey,
  235. --- 109,115 ----
  236. cnk = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
  237. cnkSize,
  238. kPGPMemoryMgrFlags_None));
  239. ! if (cnk == (StPGPDataRef) 0) {
  240. ThrowPGPError_(kPGPError_OutOfMemory);
  241. }
  242. pgpErr = PGPGetKeyPropertyBuffer( inRequestKey,
  243. ***************
  244. *** 121,127 ****
  245. encodedCNK = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
  246. GetMaxHexEncodedBufferSize(cnkSize),
  247. kPGPMemoryMgrFlags_None));
  248. ! if (encodedCNK == 0) {
  249. ThrowPGPError_(kPGPError_OutOfMemory);
  250. }
  251. cnkSize = HexEncode(cnk, cnkSize, encodedCNK);
  252. --- 121,127 ----
  253. encodedCNK = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
  254. GetMaxHexEncodedBufferSize(cnkSize),
  255. kPGPMemoryMgrFlags_None));
  256. ! if (encodedCNK == (StPGPDataRef) 0) {
  257. ThrowPGPError_(kPGPError_OutOfMemory);
  258. }
  259. cnkSize = HexEncode(cnk, cnkSize, encodedCNK);
  260. ***************
  261. *** 131,137 ****
  262. strlen(kCA) + digestSize + strlen(kCNK) + cnkSize
  263. + strlen(kPKCS10_input) + GetMaxURLEncodedBufferSize(bufSize),
  264. kPGPMemoryMgrFlags_None));
  265. ! if (post == 0) {
  266. ThrowPGPError_(kPGPError_OutOfMemory);
  267. };
  268. postSize = sprintf(post, "%s%s%s%s%s", kCA, static_cast<char *>(digest), kCNK,
  269. --- 131,137 ----
  270. strlen(kCA) + digestSize + strlen(kCNK) + cnkSize
  271. + strlen(kPKCS10_input) + GetMaxURLEncodedBufferSize(bufSize),
  272. kPGPMemoryMgrFlags_None));
  273. ! if (post == (StPGPDataRef) 0) {
  274. ThrowPGPError_(kPGPError_OutOfMemory);
  275. };
  276. postSize = sprintf(post, "%s%s%s%s%s", kCA, static_cast<char *>(digest), kCNK,
  277. ***************
  278. *** 196,202 ****
  279. path = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
  280. strlen(prefix) + strlen(query) + 1,
  281. kPGPMemoryMgrFlags_None));
  282. ! if (path == 0) {
  283. ThrowPGPError_(kPGPError_OutOfMemory);
  284. }
  285. sprintf(path, "%s%s", prefix, static_cast<char *>(query));
  286. --- 196,202 ----
  287. path = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
  288. strlen(prefix) + strlen(query) + 1,
  289. kPGPMemoryMgrFlags_None));
  290. ! if (path == (StPGPDataRef) 0) {
  291. ThrowPGPError_(kPGPError_OutOfMemory);
  292. }
  293. sprintf(path, "%s%s", prefix, static_cast<char *>(query));
  294. ***************
  295. *** 258,271 ****
  296. digest = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
  297. GetMaxDigestedKeyBufferSize(),
  298. kPGPMemoryMgrFlags_None));
  299. ! if (digest == 0) {
  300. ThrowPGPError_(kPGPError_OutOfMemory);
  301. };
  302. digestSize = DigestKey(inCAKey, digest);
  303. path = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
  304. strlen(prefix) + digestSize + 1,
  305. kPGPMemoryMgrFlags_None));
  306. ! if (path == 0) {
  307. ThrowPGPError_(kPGPError_OutOfMemory);
  308. }
  309. sprintf(path, "%s%s", prefix, static_cast<char *>(digest));
  310. --- 258,271 ----
  311. digest = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
  312. GetMaxDigestedKeyBufferSize(),
  313. kPGPMemoryMgrFlags_None));
  314. ! if (digest == (StPGPDataRef) 0) {
  315. ThrowPGPError_(kPGPError_OutOfMemory);
  316. };
  317. digestSize = DigestKey(inCAKey, digest);
  318. path = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
  319. strlen(prefix) + digestSize + 1,
  320. kPGPMemoryMgrFlags_None));
  321. ! if (path == (StPGPDataRef) 0) {
  322. ThrowPGPError_(kPGPError_OutOfMemory);
  323. }
  324. sprintf(path, "%s%s", prefix, static_cast<char *>(digest));
  325. ***************
  326. *** 323,329 ****
  327. PGPNewData( PGPGetContextMemoryMgr(mContext),
  328. GetMaxBase64EncodedBufferSize(bufSize),
  329. kPGPMemoryMgrFlags_None));
  330. ! if (encodedBuffer == 0) {
  331. ThrowPGPError_(kPGPError_OutOfMemory);
  332. };
  333. bufSize = Base64Encode( static_cast<const PGPByte *>(buffer),
  334. --- 323,329 ----
  335. PGPNewData( PGPGetContextMemoryMgr(mContext),
  336. GetMaxBase64EncodedBufferSize(bufSize),
  337. kPGPMemoryMgrFlags_None));
  338. ! if (encodedBuffer == (StPGPDataRef) 0) {
  339. ThrowPGPError_(kPGPError_OutOfMemory);
  340. };
  341. bufSize = Base64Encode( static_cast<const PGPByte *>(buffer),
  342. ***************
  343. *** 351,357 ****
  344. buffer = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
  345. bufSize,
  346. kPGPMemoryMgrFlags_None));
  347. ! if (buffer == 0) {
  348. ThrowPGPError_(kPGPError_OutOfMemory);
  349. };
  350. pgpErr = PGPFinalizeHash(hashContext, static_cast<char *>(buffer));
  351. --- 351,357 ----
  352. buffer = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
  353. bufSize,
  354. kPGPMemoryMgrFlags_None));
  355. ! if (buffer == (StPGPDataRef) 0) {
  356. ThrowPGPError_(kPGPError_OutOfMemory);
  357. };
  358. pgpErr = PGPFinalizeHash(hashContext, static_cast<char *>(buffer));
  359. ***************
  360. *** 400,406 ****
  361. result = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
  362. resultSize + 1,
  363. kPGPMemoryMgrFlags_None));
  364. ! if (result == 0) {
  365. ThrowPGPError_(kPGPError_OutOfMemory);
  366. };
  367. pgpCopyMemory(inResult, static_cast<char *>(result), resultSize + 1);
  368. --- 400,406 ----
  369. result = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
  370. resultSize + 1,
  371. kPGPMemoryMgrFlags_None));
  372. ! if (result == (StPGPDataRef) 0) {
  373. ThrowPGPError_(kPGPError_OutOfMemory);
  374. };
  375. pgpCopyMemory(inResult, static_cast<char *>(result), resultSize + 1);
  376. ***************
  377. *** 426,432 ****
  378. decodedResult = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
  379. GetMaxBase64DecodedBufferSize(end - found),
  380. kPGPMemoryMgrFlags_None));
  381. ! if (decodedResult == 0) {
  382. ThrowPGPError_(kPGPError_OutOfMemory);
  383. };
  384. --- 426,432 ----
  385. decodedResult = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
  386. GetMaxBase64DecodedBufferSize(end - found),
  387. kPGPMemoryMgrFlags_None));
  388. ! if (decodedResult == (StPGPDataRef) 0) {
  389. ThrowPGPError_(kPGPError_OutOfMemory);
  390. };
  391. ***************
  392. *** 470,476 ****
  393. result = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
  394. GetMaxBase64DecodedBufferSize(end - found),
  395. kPGPMemoryMgrFlags_None));
  396. ! if (result == 0) {
  397. ThrowPGPError_(kPGPError_OutOfMemory);
  398. };
  399. --- 470,476 ----
  400. result = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext),
  401. GetMaxBase64DecodedBufferSize(end - found),
  402. kPGPMemoryMgrFlags_None));
  403. ! if (result == (StPGPDataRef) 0) {
  404. ThrowPGPError_(kPGPError_OutOfMemory);
  405. };
  406. *** libs/network/ldaplib/liblber/io.c 2000/01/26 03:10:31 1.1.1.1
  407. --- libs/network/ldaplib/liblber/io.c 2000/01/26 03:12:55 1.1.1.2
  408. ***************
  409. *** 14,19 ****
  410. --- 14,23 ----
  411. #include <stdio.h>
  412. #include <ctype.h>
  413. + #ifdef __FreeBSD__
  414. + #include <sys/time.h>
  415. + #endif
  416. +
  417. #if PGPSOCKETSLDAP /* jason */
  418. #include "pgpSocketsLDAP.h"
  419. *** libs/network/ldaplib/include/ldap.h 2000/01/26 03:10:31 1.1.1.1
  420. --- libs/network/ldaplib/include/ldap.h 2000/01/26 03:12:53 1.1.1.2
  421. ***************
  422. *** 90,95 ****
  423. --- 90,99 ----
  424. #define GetThreadID pthread_self
  425. #endif
  426. + #ifdef __FreeBSD__
  427. + #define GetThreadID pthread_self
  428. + #endif
  429. +
  430. #if PGP_MACINTOSH
  431. #define Debug( level, fmt, arg1, arg2, arg3 ) {} /* Nothing */
  432. #else
  433. --- libs/pgpcdk/priv/crypto/random/pgpRandomPool.c.orig Fri Aug 6 13:56:49 1999
  434. +++ libs/pgpcdk/priv/crypto/random/pgpRandomPool.c Fri Sep 29 20:41:26 2000
  435. @@ -424,7 +424,7 @@
  436. * #define UMULH_32(r,a,b) (r) = 0
  437. */
  438. #ifndef UMULH_32
  439. -#if defined(__GNUC__) && defined(__i386__)
  440. +#if 0
  441. /* Inline asm goodies */
  442. #define UMULH_32(r,a,b) __asm__("mull %2" : "=d"(r) : "%a"(a), "mr"(b) : "ax")
  443. #elif HAVE64
  444. --- libs/pgpcdk/unix/ui/PGPKeyServerDialogs.cpp.orig Tue Mar 9 18:52:17 1999
  445. +++ libs/pgpcdk/unix/ui/PGPKeyServerDialogs.cpp Fri Sep 29 20:51:02 2000
  446. @@ -5,6 +5,7 @@
  447. $Id: pgpsrc658unix.patch,v 1.2 2001/10/19 15:50:31 rse Exp $
  448. ____________________________________________________________________________*/
  449. #include <string.h>
  450. +#include <stdlib.h>
  451. #include "pgpDialogs.h"
  452. #include "pgpKeyServerDialogCommon.h"
  453. --- libs/pfl/common/pgpDebug.c.orig Wed Mar 10 03:49:24 1999
  454. +++ libs/pfl/common/pgpDebug.c Sun Aug 19 11:27:06 2001
  455. @@ -191,7 +191,7 @@
  456. case 'c': /* Single character */
  457. {
  458. - char ch = va_arg(args, char);
  459. + char ch = va_arg(args, int);
  460. AppendChars(buffer, &bufferIndex, bufferSize,
  461. canonicalizeNLs, &ch, 1);
  462. --- clients/pgp/cmdline/Makefile.in.orig Fri Oct 19 14:53:23 2001
  463. +++ clients/pgp/cmdline/Makefile.in Fri Sep 1 23:11:16 2000
  464. @@ -50,7 +50,7 @@
  465. LIBDIRS+=-L$(PFLDIR) -L$(SDKDIR)/unix -L$(RSALIBRARY)$(RSA_OS)
  466. -LIBS=-lPGPui -lPGPsdkNetwork -lPGPsdk -lpfl @THREADLIB@ $(RSALIBS) @LIBS@
  467. +LIBS=-lPGPui -lPGPsdkNetwork -lPGPsdk -lPGPui -lpfl @THREADLIB@ $(RSALIBS) @LIBS@
  468. SHAREDOBJS=$(SHAREDDIR)/pgpDiskWiper.o $(SHAREDDIR)/pgpClientErrors.o