Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 26 Jan 2000 06:59:02 -0800 (PST)
From:      mike@fate.com
To:        FreeBSD-gnats-submit@freebsd.org
Subject:   ports/16377: new port for PGP 6.5.1i
Message-ID:  <200001261459.GAA31277@dresden.mocten.com>

next in thread | raw e-mail | index | archive | help

>Number:         16377
>Category:       ports
>Synopsis:       new port for PGP 6.5.1i
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-ports
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          change-request
>Submitter-Id:   current-users
>Arrival-Date:   Wed Jan 26 07:00:01 PST 2000
>Closed-Date:
>Last-Modified:
>Originator:     Mike Sherwood
>Release:        FreeBSD 3.4-RELEASE i386
>Organization:
>Environment:


>Description:

# This is a shell archive.  Save it in a file, remove anything before
# this line, and then unpack it by entering "sh file".  Note, it may
# create directories; files and directories will be owned by you and
# have default permissions.
#
# This archive contains:
#
#	pgp6
#	pgp6/Makefile
#	pgp6/README.html
#	pgp6/files
#	pgp6/files/build.Makefile
#	pgp6/files/md5
#	pgp6/patches
#	pgp6/patches/patch-aa
#	pgp6/patches/patch-ab
#	pgp6/patches/patch-ac
#	pgp6/patches/patch-ad
#	pgp6/patches/patch-ae
#	pgp6/patches/patch-af
#	pgp6/patches/patch-ag
#	pgp6/patches/patch-ah
#	pgp6/patches/patch-ai
#	pgp6/patches/patch-aj
#	pgp6/patches/patch-ak
#	pgp6/pkg
#	pgp6/pkg/COMMENT
#	pgp6/pkg/DESCR
#	pgp6/pkg/PLIST
#
echo c - pgp6
mkdir -p pgp6 > /dev/null 2>&1
echo x - pgp6/Makefile
sed 's/^X//' >pgp6/Makefile << 'END-of-pgp6/Makefile'
X# New ports collection makefile for: pgp6
X# Version required:     International PGP 6.5.1
X# International PGP homepage is http://www.pgpi.org/
X#
X# Date created:         25 Jan 2000
X# Whom:                 mike@fate.com
X#
X# More information can be found at http://www.mocten.com/projects/pgpport/
X#
X# $FreeBSD$
X#
X
XDISTNAME=	pgp-6.5.1i
XCATEGORIES=	security
XMASTER_SITES=   ftp://ftp.no.pgpi.org/pub/pgp/6.5/6.5.1i/unix/
XEXTRACT_SUFX=   -beta2.tar.gz
X
XMAINTAINER=	mike@fate.com
X
XWRKSRC=		${WRKDIR}/${DISTNAME}
XUSE_GMAKE=      YES
X
XRESTRICTED=     "Crypto"
X
Xdo-install:
X	cd ${WRKDIR}/${DISTNAME}/clients/pgp/cmdline ; ${GMAKE} install
X
Xpost-extract:
X	${CP} ${FILESDIR}/build.Makefile ${WRKDIR}/${PKGNAME}/Makefile
X
X.include <bsd.port.mk>
END-of-pgp6/Makefile
echo x - pgp6/README.html
sed 's/^X//' >pgp6/README.html << 'END-of-pgp6/README.html'
X<html>
X<title> The FreeBSD Ports Collection (security/pgp6)</title>
X<head><h1> The FreeBSD Ports Collection ("security/pgp6")</h1> </head> <hr>
X<body>
X
X<p>You are now in the directory for the port "security/pgp6" (package name "pgp-6.5.1i").
X
X<p>This is the one-line description for this port:
X
X<p><hr><p>
XPublic-Key encryption for the masses
X<p><hr>
X
X<p>Please read the file "<a href="pkg/DESCR">pkg/DESCR</a>" for a
Xlonger description.
X
X<p>Go to the <a href="../../README.html">top of the ports tree</a> for
Xa summary on how to use the ports collection.
X
X<p>
X
X<p>
X
X
X<p><hr><p>
X<a href="../README.html"> Go up one level</a>
X|
X<a href="../../README.html"> Go to top of ports tree</a>
X</body>
X</html>
END-of-pgp6/README.html
echo c - pgp6/files
mkdir -p pgp6/files > /dev/null 2>&1
echo x - pgp6/files/build.Makefile
sed 's/^X//' >pgp6/files/build.Makefile << 'END-of-pgp6/files/build.Makefile'
X#
X# build.sh expressed as a makefile
X# mike@fate.com
X#
X
Xall:
X	cd libs/pfl ; ./configure
X	cd libs/pfl ; gmake
X	cd libs/pgpcdk ; ./configure
X	cd libs/pgpcdk ; gmake headers
X	cd libs/pgpcdk ; gmake
X	cd clients/pgp/shared ; ./configure
X	cd clients/pgp/shared ; gmake
X	cd clients/pgp/cmdline ; ./configure
X	cd clients/pgp/cmdline ; gmake
X
END-of-pgp6/files/build.Makefile
echo x - pgp6/files/md5
sed 's/^X//' >pgp6/files/md5 << 'END-of-pgp6/files/md5'
XMD5 (pgp-6.5.1i-beta2.tar.gz) = ccfbd70fd0e08a8c13e9c15ea1db085a
END-of-pgp6/files/md5
echo c - pgp6/patches
mkdir -p pgp6/patches > /dev/null 2>&1
echo x - pgp6/patches/patch-aa
sed 's/^X//' >pgp6/patches/patch-aa << 'END-of-pgp6/patches/patch-aa'
X*** libs/pfl/common/pgpRMWOLock.c	2000/01/25 23:30:04	1.1.1.1
X--- libs/pfl/common/pgpRMWOLock.c	2000/01/25 23:32:31	1.1.1.2
X***************
X*** 8,15 ****
X  ____________________________________________________________________________*/
X  
X  #include "pgpBase.h"
X  
X  #include "pgpRMWOLock.h"
X  
X  #if PGP_UNIX_SOLARIS
X  /*
X--- 8,19 ----
X  ____________________________________________________________________________*/
X  
X  #include "pgpBase.h"
X  
X  #include "pgpRMWOLock.h"
X+ 
X+ #ifdef __FreeBSD__
X+ #define	NULL	0 /* undefined for some reason */
X+ #endif
X  
X  #if PGP_UNIX_SOLARIS
X  /*
END-of-pgp6/patches/patch-aa
echo x - pgp6/patches/patch-ab
sed 's/^X//' >pgp6/patches/patch-ab << 'END-of-pgp6/patches/patch-ab'
X*** libs/pgpcdk/priv/crypto/bignum/Makefile.in	2000/01/26 03:17:45	1.1
X--- libs/pgpcdk/priv/crypto/bignum/Makefile.in	2000/01/26 03:19:25	1.2
X***************
X*** 10,16 ****
X  # Architecture-dependent asm code
X  .SUFFIXES: .s
X  .s.o:
X! 	$(CC) -c $(CFLAGS) $<
X  
X  DEFS_sparc=-DBNINCLUDE=bnisparc.h
X  OBJS_sparc=bnisparc.o
X--- 10,16 ----
X  # Architecture-dependent asm code
X  .SUFFIXES: .s
X  .s.o:
X! 	$(CC) -c -O -g $<
X  
X  DEFS_sparc=-DBNINCLUDE=bnisparc.h
X  OBJS_sparc=bnisparc.o
END-of-pgp6/patches/patch-ab
echo x - pgp6/patches/patch-ac
sed 's/^X//' >pgp6/patches/patch-ac << 'END-of-pgp6/patches/patch-ac'
X*** libs/pgpcdk/priv/crypto/bignum/bni80386_aout.s	2000/01/26 03:23:29	1.1
X--- libs/pgpcdk/priv/crypto/bignum/bni80386_aout.s	2000/01/26 03:23:59	1.2
X***************
X*** 16,24 ****
X  
X  # Different assemblers have different conventions here
X  # These conventions are for a.out format assembler
X! align4=2	# could be 2 or 4
X! align8=3	# could be 3 or 8
X! align16=4	# cound be 4 or 16
X  
X  
X  .text
X--- 16,26 ----
X  
X  # Different assemblers have different conventions here
X  # These conventions are for a.out format assembler
X! 
X! # Changed from 2,3,4 to 4,8,16 for FreeBSD
X! align4=4	# could be 2 or 4
X! align8=8	# could be 3 or 8
X! align16=16	# cound be 4 or 16
X  
X  
X  .text
END-of-pgp6/patches/patch-ac
echo x - pgp6/patches/patch-ad
sed 's/^X//' >pgp6/patches/patch-ad << 'END-of-pgp6/patches/patch-ad'
X*** libs/pgpcdk/pub/include/pgpSockets.h	2000/01/26 03:10:46	1.1.1.1
X--- libs/pgpcdk/pub/include/pgpSockets.h	2000/01/26 03:13:58	1.1.1.2
X***************
X*** 30,35 ****
X--- 30,39 ----
X  # include <netdb.h>
X  #endif
X  
X+ #ifdef __FreeBSD__
X+ # include <sys/ioctl.h>		/* Need FIONREAD */
X+ #endif
X+ 
X  #if PGP_WIN32
X  # include <winsock.h>
X  #endif
END-of-pgp6/patches/patch-ad
echo x - pgp6/patches/patch-ae
sed 's/^X//' >pgp6/patches/patch-ae << 'END-of-pgp6/patches/patch-ae'
X*** libs/pgpcdk/priv/networklib/keyserver/CCRSEntrustServer.cpp	2000/01/26 03:10:44	1.1.1.1
X--- libs/pgpcdk/priv/networklib/keyserver/CCRSEntrustServer.cpp	2000/01/26 03:13:47	1.1.1.2
X***************
X*** 147,153 ****
X  		if (! PGPKeySetRefIsValid(inCAsKeySet)) {
X  			ThrowPGPError_(kPGPError_OptionNotFound);
X  		}
X! 		if (accumulatedCRLs == 0) {
X  			ThrowPGPError_(kPGPError_OutOfMemory);
X  		}
X  		pgpErr = PGPGetCRLDistributionPoints(inCAKey, inCAsKeySet, &numPoints, &points,
X--- 147,153 ----
X  		if (! PGPKeySetRefIsValid(inCAsKeySet)) {
X  			ThrowPGPError_(kPGPError_OptionNotFound);
X  		}
X! 		if (accumulatedCRLs == (StPGPDataRef) 0) {
X  			ThrowPGPError_(kPGPError_OutOfMemory);
X  		}
X  		pgpErr = PGPGetCRLDistributionPoints(inCAKey, inCAsKeySet, &numPoints, &points,
X***************
X*** 173,179 ****
X  #if PGP_COMPILER_SUN
X  			pgpCopyMemory(static_cast<PGPByte *>(crl), static_cast<PGPByte *>(accumulatedCRLs) + accumulatedSize, crlSize);
X  #else
X! 			pgpCopyMemory(crl, static_cast<PGPByte *>(accumulatedCRLs) + accumulatedSize, crlSize);
X  #endif
X  			accumulatedSize += crlSize;
X  			currPoint += *currPointSize;
X--- 173,179 ----
X  #if PGP_COMPILER_SUN
X  			pgpCopyMemory(static_cast<PGPByte *>(crl), static_cast<PGPByte *>(accumulatedCRLs) + accumulatedSize, crlSize);
X  #else
X! 			pgpCopyMemory((void *) crl, static_cast<PGPByte *>(accumulatedCRLs) + accumulatedSize, crlSize);
X  #endif
X  			accumulatedSize += crlSize;
X  			currPoint += *currPointSize;
X***************
X*** 215,221 ****
X  						PGPNewData(	PGPGetContextMemoryMgr(mContext),
X  									GetMaxBase64EncodedBufferSize(inMessageLength),
X  									kPGPMemoryMgrFlags_None));
X! 	if (encodedBuffer == 0) {
X  		ThrowPGPError_(kPGPError_OutOfMemory);
X  	}
X  	encodedSize = Base64Encode(	static_cast<const PGPByte *>(inMessage),
X--- 215,221 ----
X  						PGPNewData(	PGPGetContextMemoryMgr(mContext),
X  									GetMaxBase64EncodedBufferSize(inMessageLength),
X  									kPGPMemoryMgrFlags_None));
X! 	if (encodedBuffer == (StPGPDataRef) 0) {
X  		ThrowPGPError_(kPGPError_OutOfMemory);
X  	}
X  	encodedSize = Base64Encode(	static_cast<const PGPByte *>(inMessage),
X***************
X*** 226,232 ****
X  						PGPNewData(	PGPGetContextMemoryMgr(mContext),
X  									GetMaxURLEncodedBufferSize(encodedSize) + bufSize,
X  									kPGPMemoryMgrFlags_None));
X! 	if (encodedBuffer == 0) {
X  		ThrowPGPError_(kPGPError_OutOfMemory);
X  	}
X  	strcpy(urlEncodedBuffer, kMessagePrefix);
X--- 226,232 ----
X  						PGPNewData(	PGPGetContextMemoryMgr(mContext),
X  									GetMaxURLEncodedBufferSize(encodedSize) + bufSize,
X  									kPGPMemoryMgrFlags_None));
X! 	if (encodedBuffer == (StPGPDataRef) 0) {
X  		ThrowPGPError_(kPGPError_OutOfMemory);
X  	}
X  	strcpy(urlEncodedBuffer, kMessagePrefix);
END-of-pgp6/patches/patch-ae
echo x - pgp6/patches/patch-af
sed 's/^X//' >pgp6/patches/patch-af << 'END-of-pgp6/patches/patch-af'
X*** libs/pgpcdk/priv/networklib/keyserver/CHTTPKeyServer.cpp	2000/01/26 03:10:44	1.1.1.1
X--- libs/pgpcdk/priv/networklib/keyserver/CHTTPKeyServer.cpp	2000/01/26 03:13:48	1.1.1.2
X***************
X*** 341,353 ****
X  	tempStorage = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
X  														kTempStorageSize,
X  														kPGPMemoryMgrFlags_None));
X! 	if (tempStorage == 0) {
X  		ThrowPGPError_(kPGPError_OutOfMemory);
X  	}
X  	buffer = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
X  												result + 1,
X  												kPGPMemoryMgrFlags_None));
X! 	if (buffer == 0) {
X  		ThrowPGPError_(kPGPError_OutOfMemory);
X  	}
X  	socketResult = PGPReceive(	mSocket,
X--- 341,353 ----
X  	tempStorage = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
X  														kTempStorageSize,
X  														kPGPMemoryMgrFlags_None));
X! 	if (tempStorage == (StPGPDataRef) 0) {
X  		ThrowPGPError_(kPGPError_OutOfMemory);
X  	}
X  	buffer = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
X  												result + 1,
X  												kPGPMemoryMgrFlags_None));
X! 	if (buffer == (StPGPDataRef) 0) {
X  		ThrowPGPError_(kPGPError_OutOfMemory);
X  	}
X  	socketResult = PGPReceive(	mSocket,
END-of-pgp6/patches/patch-af
echo x - pgp6/patches/patch-ag
sed 's/^X//' >pgp6/patches/patch-ag << 'END-of-pgp6/patches/patch-ag'
X*** libs/pgpcdk/priv/networklib/keyserver/CHTTPPGPKeyServer.cpp	2000/01/26 03:10:44	1.1.1.1
X--- libs/pgpcdk/priv/networklib/keyserver/CHTTPPGPKeyServer.cpp	2000/01/26 03:13:48	1.1.1.2
X***************
X*** 92,98 ****
X  		path = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
X  													strlen(kQueryPrefix) + strlen(query) + 1,
X  													kPGPMemoryMgrFlags_None));
X! 		if (path == 0) {
X  			ThrowPGPError_(kPGPError_OutOfMemory);
X  		}
X  		sprintf(path, "%s%s", kQueryPrefix, static_cast<char *>(query));
X--- 92,98 ----
X  		path = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
X  													strlen(kQueryPrefix) + strlen(query) + 1,
X  													kPGPMemoryMgrFlags_None));
X! 		if (path == (StPGPDataRef) 0) {
X  			ThrowPGPError_(kPGPError_OutOfMemory);
X  		}
X  		sprintf(path, "%s%s", kQueryPrefix, static_cast<char *>(query));
X***************
X*** 188,194 ****
X  				PGPNewData(	PGPGetContextMemoryMgr(mContext),
X  							GetMaxURLEncodedBufferSize(bufSize) + postPrefixSize,
X  							kPGPMemoryMgrFlags_None));
X! 			if (urlEncodedBuffer == 0) {
X  				ThrowPGPError_(kPGPError_OutOfMemory);
X  			}
X  			strcpy(urlEncodedBuffer, kPostPrefix);
X--- 188,194 ----
X  				PGPNewData(	PGPGetContextMemoryMgr(mContext),
X  							GetMaxURLEncodedBufferSize(bufSize) + postPrefixSize,
X  							kPGPMemoryMgrFlags_None));
X! 			if (urlEncodedBuffer == (StPGPDataRef) 0) {
X  				ThrowPGPError_(kPGPError_OutOfMemory);
X  			}
X  			strcpy(urlEncodedBuffer, kPostPrefix);
END-of-pgp6/patches/patch-ag
echo x - pgp6/patches/patch-ah
sed 's/^X//' >pgp6/patches/patch-ah << 'END-of-pgp6/patches/patch-ah'
X*** libs/pgpcdk/priv/networklib/keyserver/CHTTPXcertServer.cpp	2000/01/26 03:10:44	1.1.1.1
X--- libs/pgpcdk/priv/networklib/keyserver/CHTTPXcertServer.cpp	2000/01/26 03:13:49	1.1.1.2
X***************
X*** 89,95 ****
X  		digest = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
X  													GetMaxDigestedKeyBufferSize(),
X  													kPGPMemoryMgrFlags_None));
X! 		if (digest == 0) {
X  			ThrowPGPError_(kPGPError_OutOfMemory);
X  		};
X  		digestSize = DigestKey(inCAKey, digest);
X--- 89,95 ----
X  		digest = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
X  													GetMaxDigestedKeyBufferSize(),
X  													kPGPMemoryMgrFlags_None));
X! 		if (digest == (StPGPDataRef) 0) {
X  			ThrowPGPError_(kPGPError_OutOfMemory);
X  		};
X  		digestSize = DigestKey(inCAKey, digest);
X***************
X*** 98,104 ****
X  			PGPNewData(	PGPGetContextMemoryMgr(mContext),
X  						GetMaxBase64EncodedBufferSize(inBufferSize),
X  						kPGPMemoryMgrFlags_None));
X! 		if (encodedBuffer == 0) {
X  			ThrowPGPError_(kPGPError_OutOfMemory);
X  		};
X  		bufSize = Base64Encode(	static_cast<const PGPByte *>(inBuffer),
X--- 98,104 ----
X  			PGPNewData(	PGPGetContextMemoryMgr(mContext),
X  						GetMaxBase64EncodedBufferSize(inBufferSize),
X  						kPGPMemoryMgrFlags_None));
X! 		if (encodedBuffer == (StPGPDataRef) 0) {
X  			ThrowPGPError_(kPGPError_OutOfMemory);
X  		};
X  		bufSize = Base64Encode(	static_cast<const PGPByte *>(inBuffer),
X***************
X*** 109,115 ****
X  		cnk = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
X  													cnkSize,
X  													kPGPMemoryMgrFlags_None));
X! 		if (cnk == 0) {
X  			ThrowPGPError_(kPGPError_OutOfMemory);
X  		}
X  		pgpErr = PGPGetKeyPropertyBuffer(	inRequestKey,
X--- 109,115 ----
X  		cnk = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
X  													cnkSize,
X  													kPGPMemoryMgrFlags_None));
X! 		if (cnk == (StPGPDataRef) 0) {
X  			ThrowPGPError_(kPGPError_OutOfMemory);
X  		}
X  		pgpErr = PGPGetKeyPropertyBuffer(	inRequestKey,
X***************
X*** 121,127 ****
X  		encodedCNK = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
X  														GetMaxHexEncodedBufferSize(cnkSize),
X  														kPGPMemoryMgrFlags_None));
X! 		if (encodedCNK == 0) {
X  			ThrowPGPError_(kPGPError_OutOfMemory);
X  		}
X  		cnkSize = HexEncode(cnk, cnkSize, encodedCNK);
X--- 121,127 ----
X  		encodedCNK = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
X  														GetMaxHexEncodedBufferSize(cnkSize),
X  														kPGPMemoryMgrFlags_None));
X! 		if (encodedCNK == (StPGPDataRef) 0) {
X  			ThrowPGPError_(kPGPError_OutOfMemory);
X  		}
X  		cnkSize = HexEncode(cnk, cnkSize, encodedCNK);
X***************
X*** 131,137 ****
X  						strlen(kCA) + digestSize + strlen(kCNK) + cnkSize
X  							+ strlen(kPKCS10_input) + GetMaxURLEncodedBufferSize(bufSize),
X  						kPGPMemoryMgrFlags_None));
X! 		if (post == 0) {
X  			ThrowPGPError_(kPGPError_OutOfMemory);
X  		};
X  		postSize = sprintf(post, "%s%s%s%s%s", kCA, static_cast<char *>(digest), kCNK,
X--- 131,137 ----
X  						strlen(kCA) + digestSize + strlen(kCNK) + cnkSize
X  							+ strlen(kPKCS10_input) + GetMaxURLEncodedBufferSize(bufSize),
X  						kPGPMemoryMgrFlags_None));
X! 		if (post == (StPGPDataRef) 0) {
X  			ThrowPGPError_(kPGPError_OutOfMemory);
X  		};
X  		postSize = sprintf(post, "%s%s%s%s%s", kCA, static_cast<char *>(digest), kCNK,
X***************
X*** 196,202 ****
X  		path = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
X  													strlen(prefix) + strlen(query) + 1,
X  													kPGPMemoryMgrFlags_None));
X! 		if (path == 0) {
X  			ThrowPGPError_(kPGPError_OutOfMemory);
X  		}
X  		sprintf(path, "%s%s", prefix, static_cast<char *>(query));
X--- 196,202 ----
X  		path = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
X  													strlen(prefix) + strlen(query) + 1,
X  													kPGPMemoryMgrFlags_None));
X! 		if (path == (StPGPDataRef) 0) {
X  			ThrowPGPError_(kPGPError_OutOfMemory);
X  		}
X  		sprintf(path, "%s%s", prefix, static_cast<char *>(query));
X***************
X*** 258,271 ****
X  		digest = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
X  													GetMaxDigestedKeyBufferSize(),
X  													kPGPMemoryMgrFlags_None));
X! 		if (digest == 0) {
X  			ThrowPGPError_(kPGPError_OutOfMemory);
X  		};
X  		digestSize = DigestKey(inCAKey, digest);
X  		path = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
X  													strlen(prefix) + digestSize + 1,
X  													kPGPMemoryMgrFlags_None));
X! 		if (path == 0) {
X  			ThrowPGPError_(kPGPError_OutOfMemory);
X  		}
X  		sprintf(path, "%s%s", prefix, static_cast<char *>(digest));
X--- 258,271 ----
X  		digest = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
X  													GetMaxDigestedKeyBufferSize(),
X  													kPGPMemoryMgrFlags_None));
X! 		if (digest == (StPGPDataRef) 0) {
X  			ThrowPGPError_(kPGPError_OutOfMemory);
X  		};
X  		digestSize = DigestKey(inCAKey, digest);
X  		path = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
X  													strlen(prefix) + digestSize + 1,
X  													kPGPMemoryMgrFlags_None));
X! 		if (path == (StPGPDataRef) 0) {
X  			ThrowPGPError_(kPGPError_OutOfMemory);
X  		}
X  		sprintf(path, "%s%s", prefix, static_cast<char *>(digest));
X***************
X*** 323,329 ****
X  		PGPNewData(	PGPGetContextMemoryMgr(mContext),
X  					GetMaxBase64EncodedBufferSize(bufSize),
X  					kPGPMemoryMgrFlags_None));
X! 	if (encodedBuffer == 0) {
X  		ThrowPGPError_(kPGPError_OutOfMemory);
X  	};
X  	bufSize = Base64Encode(	static_cast<const PGPByte *>(buffer),
X--- 323,329 ----
X  		PGPNewData(	PGPGetContextMemoryMgr(mContext),
X  					GetMaxBase64EncodedBufferSize(bufSize),
X  					kPGPMemoryMgrFlags_None));
X! 	if (encodedBuffer == (StPGPDataRef) 0) {
X  		ThrowPGPError_(kPGPError_OutOfMemory);
X  	};
X  	bufSize = Base64Encode(	static_cast<const PGPByte *>(buffer),
X***************
X*** 351,357 ****
X  	buffer = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
X  												bufSize,
X  												kPGPMemoryMgrFlags_None));
X! 	if (buffer == 0) {
X  		ThrowPGPError_(kPGPError_OutOfMemory);
X  	};
X  	pgpErr = PGPFinalizeHash(hashContext, static_cast<char *>(buffer));
X--- 351,357 ----
X  	buffer = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
X  												bufSize,
X  												kPGPMemoryMgrFlags_None));
X! 	if (buffer == (StPGPDataRef) 0) {
X  		ThrowPGPError_(kPGPError_OutOfMemory);
X  	};
X  	pgpErr = PGPFinalizeHash(hashContext, static_cast<char *>(buffer));
X***************
X*** 400,406 ****
X  	result = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
X  												resultSize + 1,
X  												kPGPMemoryMgrFlags_None));
X! 	if (result == 0) {
X  		ThrowPGPError_(kPGPError_OutOfMemory);
X  	};
X  	pgpCopyMemory(inResult, static_cast<char *>(result), resultSize + 1);
X--- 400,406 ----
X  	result = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
X  												resultSize + 1,
X  												kPGPMemoryMgrFlags_None));
X! 	if (result == (StPGPDataRef) 0) {
X  		ThrowPGPError_(kPGPError_OutOfMemory);
X  	};
X  	pgpCopyMemory(inResult, static_cast<char *>(result), resultSize + 1);
X***************
X*** 426,432 ****
X  	decodedResult = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
X  														GetMaxBase64DecodedBufferSize(end - found),
X  														kPGPMemoryMgrFlags_None));
X! 	if (decodedResult == 0) {
X  		ThrowPGPError_(kPGPError_OutOfMemory);
X  	};
X  	
X--- 426,432 ----
X  	decodedResult = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
X  														GetMaxBase64DecodedBufferSize(end - found),
X  														kPGPMemoryMgrFlags_None));
X! 	if (decodedResult == (StPGPDataRef) 0) {
X  		ThrowPGPError_(kPGPError_OutOfMemory);
X  	};
X  	
X***************
X*** 470,476 ****
X  	result = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
X  												GetMaxBase64DecodedBufferSize(end - found),
X  												kPGPMemoryMgrFlags_None));
X! 	if (result == 0) {
X  		ThrowPGPError_(kPGPError_OutOfMemory);
X  	};
X  	
X--- 470,476 ----
X  	result = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
X  												GetMaxBase64DecodedBufferSize(end - found),
X  												kPGPMemoryMgrFlags_None));
X! 	if (result == (StPGPDataRef) 0) {
X  		ThrowPGPError_(kPGPError_OutOfMemory);
X  	};
X  	
END-of-pgp6/patches/patch-ah
echo x - pgp6/patches/patch-ai
sed 's/^X//' >pgp6/patches/patch-ai << 'END-of-pgp6/patches/patch-ai'
X*** libs/network/ldaplib/liblber/io.c	2000/01/26 03:10:31	1.1.1.1
X--- libs/network/ldaplib/liblber/io.c	2000/01/26 03:12:55	1.1.1.2
X***************
X*** 14,19 ****
X--- 14,23 ----
X  #include <stdio.h>
X  #include <ctype.h>
X  
X+ #ifdef __FreeBSD__
X+ #include <sys/time.h>
X+ #endif
X+ 
X  #if PGPSOCKETSLDAP		/* jason */
X  #include "pgpSocketsLDAP.h"
X  
END-of-pgp6/patches/patch-ai
echo x - pgp6/patches/patch-aj
sed 's/^X//' >pgp6/patches/patch-aj << 'END-of-pgp6/patches/patch-aj'
X*** clients/pgp/cmdline/Makefile.in	2000/01/26 03:55:17	1.1
X--- clients/pgp/cmdline/Makefile.in	2000/01/26 03:55:41	1.2
X***************
X*** 51,57 ****
X  CFLAGS=@CFLAGS@
X  LDFLAGS=@LDFLAGS@
X  
X! CFLAGS+= -g
X  
X  TARGET=pgp
X  
X--- 51,57 ----
X  CFLAGS=@CFLAGS@
X  LDFLAGS=@LDFLAGS@
X  
X! CFLAGS+= -g -pthread
X  
X  TARGET=pgp
X  
END-of-pgp6/patches/patch-aj
echo x - pgp6/patches/patch-ak
sed 's/^X//' >pgp6/patches/patch-ak << 'END-of-pgp6/patches/patch-ak'
X*** libs/network/ldaplib/include/ldap.h	2000/01/26 03:10:31	1.1.1.1
X--- libs/network/ldaplib/include/ldap.h	2000/01/26 03:12:53	1.1.1.2
X***************
X*** 90,95 ****
X--- 90,99 ----
X  #define GetThreadID		pthread_self
X  #endif
X  
X+ #ifdef __FreeBSD__
X+ #define GetThreadID		pthread_self
X+ #endif
X+ 
X  #if PGP_MACINTOSH
X  #define Debug( level, fmt, arg1, arg2, arg3 )	{}	/* Nothing */
X  #else
END-of-pgp6/patches/patch-ak
echo c - pgp6/pkg
mkdir -p pgp6/pkg > /dev/null 2>&1
echo x - pgp6/pkg/COMMENT
sed 's/^X//' >pgp6/pkg/COMMENT << 'END-of-pgp6/pkg/COMMENT'
XPublic-Key encryption for the masses
END-of-pgp6/pkg/COMMENT
echo x - pgp6/pkg/DESCR
sed 's/^X//' >pgp6/pkg/DESCR << 'END-of-pgp6/pkg/DESCR'
XThis is PGP 6.5.1i.
X
XThis version is combines many of the new features of PGP 5.0 with the command
Xline interface of PGP 2.6.x.
X
XI ported this in an effort to get the newer code working under FreeBSD.  
XThe port is fairly straightforward, but my main focus was being able to build
Xa functioning executable.  Also, this is a port of beta code.  It seems to
Xwork just fine, but keep in mind that it is a beta.
X
XMore information on this port can be found at:
Xhttp://www.fate.com/projects/pgpport/
X
XFor information on PGP in general:
Xhttp://www.pgpi.org
END-of-pgp6/pkg/DESCR
echo x - pgp6/pkg/PLIST
sed 's/^X//' >pgp6/pkg/PLIST << 'END-of-pgp6/pkg/PLIST'
Xbin/pgp
END-of-pgp6/pkg/PLIST
exit

>How-To-Repeat:

>Fix:
	

>Release-Note:
>Audit-Trail:
>Unformatted:


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-ports" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200001261459.GAA31277>