Date: Wed, 26 Jan 2000 06:59:02 -0800 (PST) From: mike@fate.com To: FreeBSD-gnats-submit@freebsd.org Subject: ports/16377: new port for PGP 6.5.1i Message-ID: <200001261459.GAA31277@dresden.mocten.com>
next in thread | raw e-mail | index | archive | help
>Number: 16377 >Category: ports >Synopsis: new port for PGP 6.5.1i >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Wed Jan 26 07:00:01 PST 2000 >Closed-Date: >Last-Modified: >Originator: Mike Sherwood >Release: FreeBSD 3.4-RELEASE i386 >Organization: >Environment: >Description: # This is a shell archive. Save it in a file, remove anything before # this line, and then unpack it by entering "sh file". Note, it may # create directories; files and directories will be owned by you and # have default permissions. # # This archive contains: # # pgp6 # pgp6/Makefile # pgp6/README.html # pgp6/files # pgp6/files/build.Makefile # pgp6/files/md5 # pgp6/patches # pgp6/patches/patch-aa # pgp6/patches/patch-ab # pgp6/patches/patch-ac # pgp6/patches/patch-ad # pgp6/patches/patch-ae # pgp6/patches/patch-af # pgp6/patches/patch-ag # pgp6/patches/patch-ah # pgp6/patches/patch-ai # pgp6/patches/patch-aj # pgp6/patches/patch-ak # pgp6/pkg # pgp6/pkg/COMMENT # pgp6/pkg/DESCR # pgp6/pkg/PLIST # echo c - pgp6 mkdir -p pgp6 > /dev/null 2>&1 echo x - pgp6/Makefile sed 's/^X//' >pgp6/Makefile << 'END-of-pgp6/Makefile' X# New ports collection makefile for: pgp6 X# Version required: International PGP 6.5.1 X# International PGP homepage is http://www.pgpi.org/ X# X# Date created: 25 Jan 2000 X# Whom: mike@fate.com X# X# More information can be found at http://www.mocten.com/projects/pgpport/ X# X# $FreeBSD$ X# X XDISTNAME= pgp-6.5.1i XCATEGORIES= security XMASTER_SITES= ftp://ftp.no.pgpi.org/pub/pgp/6.5/6.5.1i/unix/ XEXTRACT_SUFX= -beta2.tar.gz X XMAINTAINER= mike@fate.com X XWRKSRC= ${WRKDIR}/${DISTNAME} XUSE_GMAKE= YES X XRESTRICTED= "Crypto" X Xdo-install: X cd ${WRKDIR}/${DISTNAME}/clients/pgp/cmdline ; ${GMAKE} install X Xpost-extract: X ${CP} ${FILESDIR}/build.Makefile ${WRKDIR}/${PKGNAME}/Makefile X X.include <bsd.port.mk> END-of-pgp6/Makefile echo x - pgp6/README.html sed 's/^X//' >pgp6/README.html << 'END-of-pgp6/README.html' X<html> X<title> The FreeBSD Ports Collection (security/pgp6)</title> X<head><h1> The FreeBSD Ports Collection ("security/pgp6")</h1> </head> <hr> X<body> X X<p>You are now in the directory for the port "security/pgp6" (package name "pgp-6.5.1i"). X X<p>This is the one-line description for this port: X X<p><hr><p> XPublic-Key encryption for the masses X<p><hr> X X<p>Please read the file "<a href="pkg/DESCR">pkg/DESCR</a>" for a Xlonger description. X X<p>Go to the <a href="../../README.html">top of the ports tree</a> for Xa summary on how to use the ports collection. X X<p> X X<p> X X X<p><hr><p> X<a href="../README.html"> Go up one level</a> X| X<a href="../../README.html"> Go to top of ports tree</a> X</body> X</html> END-of-pgp6/README.html echo c - pgp6/files mkdir -p pgp6/files > /dev/null 2>&1 echo x - pgp6/files/build.Makefile sed 's/^X//' >pgp6/files/build.Makefile << 'END-of-pgp6/files/build.Makefile' X# X# build.sh expressed as a makefile X# mike@fate.com X# X Xall: X cd libs/pfl ; ./configure X cd libs/pfl ; gmake X cd libs/pgpcdk ; ./configure X cd libs/pgpcdk ; gmake headers X cd libs/pgpcdk ; gmake X cd clients/pgp/shared ; ./configure X cd clients/pgp/shared ; gmake X cd clients/pgp/cmdline ; ./configure X cd clients/pgp/cmdline ; gmake X END-of-pgp6/files/build.Makefile echo x - pgp6/files/md5 sed 's/^X//' >pgp6/files/md5 << 'END-of-pgp6/files/md5' XMD5 (pgp-6.5.1i-beta2.tar.gz) = ccfbd70fd0e08a8c13e9c15ea1db085a END-of-pgp6/files/md5 echo c - pgp6/patches mkdir -p pgp6/patches > /dev/null 2>&1 echo x - pgp6/patches/patch-aa sed 's/^X//' >pgp6/patches/patch-aa << 'END-of-pgp6/patches/patch-aa' X*** libs/pfl/common/pgpRMWOLock.c 2000/01/25 23:30:04 1.1.1.1 X--- libs/pfl/common/pgpRMWOLock.c 2000/01/25 23:32:31 1.1.1.2 X*************** X*** 8,15 **** X ____________________________________________________________________________*/ X X #include "pgpBase.h" X X #include "pgpRMWOLock.h" X X #if PGP_UNIX_SOLARIS X /* X--- 8,19 ---- X ____________________________________________________________________________*/ X X #include "pgpBase.h" X X #include "pgpRMWOLock.h" X+ X+ #ifdef __FreeBSD__ X+ #define NULL 0 /* undefined for some reason */ X+ #endif X X #if PGP_UNIX_SOLARIS X /* END-of-pgp6/patches/patch-aa echo x - pgp6/patches/patch-ab sed 's/^X//' >pgp6/patches/patch-ab << 'END-of-pgp6/patches/patch-ab' X*** libs/pgpcdk/priv/crypto/bignum/Makefile.in 2000/01/26 03:17:45 1.1 X--- libs/pgpcdk/priv/crypto/bignum/Makefile.in 2000/01/26 03:19:25 1.2 X*************** X*** 10,16 **** X # Architecture-dependent asm code X .SUFFIXES: .s X .s.o: X! $(CC) -c $(CFLAGS) $< X X DEFS_sparc=-DBNINCLUDE=bnisparc.h X OBJS_sparc=bnisparc.o X--- 10,16 ---- X # Architecture-dependent asm code X .SUFFIXES: .s X .s.o: X! $(CC) -c -O -g $< X X DEFS_sparc=-DBNINCLUDE=bnisparc.h X OBJS_sparc=bnisparc.o END-of-pgp6/patches/patch-ab echo x - pgp6/patches/patch-ac sed 's/^X//' >pgp6/patches/patch-ac << 'END-of-pgp6/patches/patch-ac' X*** libs/pgpcdk/priv/crypto/bignum/bni80386_aout.s 2000/01/26 03:23:29 1.1 X--- libs/pgpcdk/priv/crypto/bignum/bni80386_aout.s 2000/01/26 03:23:59 1.2 X*************** X*** 16,24 **** X X # Different assemblers have different conventions here X # These conventions are for a.out format assembler X! align4=2 # could be 2 or 4 X! align8=3 # could be 3 or 8 X! align16=4 # cound be 4 or 16 X X X .text X--- 16,26 ---- X X # Different assemblers have different conventions here X # These conventions are for a.out format assembler X! X! # Changed from 2,3,4 to 4,8,16 for FreeBSD X! align4=4 # could be 2 or 4 X! align8=8 # could be 3 or 8 X! align16=16 # cound be 4 or 16 X X X .text END-of-pgp6/patches/patch-ac echo x - pgp6/patches/patch-ad sed 's/^X//' >pgp6/patches/patch-ad << 'END-of-pgp6/patches/patch-ad' X*** libs/pgpcdk/pub/include/pgpSockets.h 2000/01/26 03:10:46 1.1.1.1 X--- libs/pgpcdk/pub/include/pgpSockets.h 2000/01/26 03:13:58 1.1.1.2 X*************** X*** 30,35 **** X--- 30,39 ---- X # include <netdb.h> X #endif X X+ #ifdef __FreeBSD__ X+ # include <sys/ioctl.h> /* Need FIONREAD */ X+ #endif X+ X #if PGP_WIN32 X # include <winsock.h> X #endif END-of-pgp6/patches/patch-ad echo x - pgp6/patches/patch-ae sed 's/^X//' >pgp6/patches/patch-ae << 'END-of-pgp6/patches/patch-ae' X*** libs/pgpcdk/priv/networklib/keyserver/CCRSEntrustServer.cpp 2000/01/26 03:10:44 1.1.1.1 X--- libs/pgpcdk/priv/networklib/keyserver/CCRSEntrustServer.cpp 2000/01/26 03:13:47 1.1.1.2 X*************** X*** 147,153 **** X if (! PGPKeySetRefIsValid(inCAsKeySet)) { X ThrowPGPError_(kPGPError_OptionNotFound); X } X! if (accumulatedCRLs == 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X } X pgpErr = PGPGetCRLDistributionPoints(inCAKey, inCAsKeySet, &numPoints, &points, X--- 147,153 ---- X if (! PGPKeySetRefIsValid(inCAsKeySet)) { X ThrowPGPError_(kPGPError_OptionNotFound); X } X! if (accumulatedCRLs == (StPGPDataRef) 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X } X pgpErr = PGPGetCRLDistributionPoints(inCAKey, inCAsKeySet, &numPoints, &points, X*************** X*** 173,179 **** X #if PGP_COMPILER_SUN X pgpCopyMemory(static_cast<PGPByte *>(crl), static_cast<PGPByte *>(accumulatedCRLs) + accumulatedSize, crlSize); X #else X! pgpCopyMemory(crl, static_cast<PGPByte *>(accumulatedCRLs) + accumulatedSize, crlSize); X #endif X accumulatedSize += crlSize; X currPoint += *currPointSize; X--- 173,179 ---- X #if PGP_COMPILER_SUN X pgpCopyMemory(static_cast<PGPByte *>(crl), static_cast<PGPByte *>(accumulatedCRLs) + accumulatedSize, crlSize); X #else X! pgpCopyMemory((void *) crl, static_cast<PGPByte *>(accumulatedCRLs) + accumulatedSize, crlSize); X #endif X accumulatedSize += crlSize; X currPoint += *currPointSize; X*************** X*** 215,221 **** X PGPNewData( PGPGetContextMemoryMgr(mContext), X GetMaxBase64EncodedBufferSize(inMessageLength), X kPGPMemoryMgrFlags_None)); X! if (encodedBuffer == 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X } X encodedSize = Base64Encode( static_cast<const PGPByte *>(inMessage), X--- 215,221 ---- X PGPNewData( PGPGetContextMemoryMgr(mContext), X GetMaxBase64EncodedBufferSize(inMessageLength), X kPGPMemoryMgrFlags_None)); X! if (encodedBuffer == (StPGPDataRef) 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X } X encodedSize = Base64Encode( static_cast<const PGPByte *>(inMessage), X*************** X*** 226,232 **** X PGPNewData( PGPGetContextMemoryMgr(mContext), X GetMaxURLEncodedBufferSize(encodedSize) + bufSize, X kPGPMemoryMgrFlags_None)); X! if (encodedBuffer == 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X } X strcpy(urlEncodedBuffer, kMessagePrefix); X--- 226,232 ---- X PGPNewData( PGPGetContextMemoryMgr(mContext), X GetMaxURLEncodedBufferSize(encodedSize) + bufSize, X kPGPMemoryMgrFlags_None)); X! if (encodedBuffer == (StPGPDataRef) 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X } X strcpy(urlEncodedBuffer, kMessagePrefix); END-of-pgp6/patches/patch-ae echo x - pgp6/patches/patch-af sed 's/^X//' >pgp6/patches/patch-af << 'END-of-pgp6/patches/patch-af' X*** libs/pgpcdk/priv/networklib/keyserver/CHTTPKeyServer.cpp 2000/01/26 03:10:44 1.1.1.1 X--- libs/pgpcdk/priv/networklib/keyserver/CHTTPKeyServer.cpp 2000/01/26 03:13:48 1.1.1.2 X*************** X*** 341,353 **** X tempStorage = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext), X kTempStorageSize, X kPGPMemoryMgrFlags_None)); X! if (tempStorage == 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X } X buffer = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext), X result + 1, X kPGPMemoryMgrFlags_None)); X! if (buffer == 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X } X socketResult = PGPReceive( mSocket, X--- 341,353 ---- X tempStorage = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext), X kTempStorageSize, X kPGPMemoryMgrFlags_None)); X! if (tempStorage == (StPGPDataRef) 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X } X buffer = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext), X result + 1, X kPGPMemoryMgrFlags_None)); X! if (buffer == (StPGPDataRef) 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X } X socketResult = PGPReceive( mSocket, END-of-pgp6/patches/patch-af echo x - pgp6/patches/patch-ag sed 's/^X//' >pgp6/patches/patch-ag << 'END-of-pgp6/patches/patch-ag' X*** libs/pgpcdk/priv/networklib/keyserver/CHTTPPGPKeyServer.cpp 2000/01/26 03:10:44 1.1.1.1 X--- libs/pgpcdk/priv/networklib/keyserver/CHTTPPGPKeyServer.cpp 2000/01/26 03:13:48 1.1.1.2 X*************** X*** 92,98 **** X path = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext), X strlen(kQueryPrefix) + strlen(query) + 1, X kPGPMemoryMgrFlags_None)); X! if (path == 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X } X sprintf(path, "%s%s", kQueryPrefix, static_cast<char *>(query)); X--- 92,98 ---- X path = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext), X strlen(kQueryPrefix) + strlen(query) + 1, X kPGPMemoryMgrFlags_None)); X! if (path == (StPGPDataRef) 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X } X sprintf(path, "%s%s", kQueryPrefix, static_cast<char *>(query)); X*************** X*** 188,194 **** X PGPNewData( PGPGetContextMemoryMgr(mContext), X GetMaxURLEncodedBufferSize(bufSize) + postPrefixSize, X kPGPMemoryMgrFlags_None)); X! if (urlEncodedBuffer == 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X } X strcpy(urlEncodedBuffer, kPostPrefix); X--- 188,194 ---- X PGPNewData( PGPGetContextMemoryMgr(mContext), X GetMaxURLEncodedBufferSize(bufSize) + postPrefixSize, X kPGPMemoryMgrFlags_None)); X! if (urlEncodedBuffer == (StPGPDataRef) 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X } X strcpy(urlEncodedBuffer, kPostPrefix); END-of-pgp6/patches/patch-ag echo x - pgp6/patches/patch-ah sed 's/^X//' >pgp6/patches/patch-ah << 'END-of-pgp6/patches/patch-ah' X*** libs/pgpcdk/priv/networklib/keyserver/CHTTPXcertServer.cpp 2000/01/26 03:10:44 1.1.1.1 X--- libs/pgpcdk/priv/networklib/keyserver/CHTTPXcertServer.cpp 2000/01/26 03:13:49 1.1.1.2 X*************** X*** 89,95 **** X digest = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext), X GetMaxDigestedKeyBufferSize(), X kPGPMemoryMgrFlags_None)); X! if (digest == 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X }; X digestSize = DigestKey(inCAKey, digest); X--- 89,95 ---- X digest = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext), X GetMaxDigestedKeyBufferSize(), X kPGPMemoryMgrFlags_None)); X! if (digest == (StPGPDataRef) 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X }; X digestSize = DigestKey(inCAKey, digest); X*************** X*** 98,104 **** X PGPNewData( PGPGetContextMemoryMgr(mContext), X GetMaxBase64EncodedBufferSize(inBufferSize), X kPGPMemoryMgrFlags_None)); X! if (encodedBuffer == 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X }; X bufSize = Base64Encode( static_cast<const PGPByte *>(inBuffer), X--- 98,104 ---- X PGPNewData( PGPGetContextMemoryMgr(mContext), X GetMaxBase64EncodedBufferSize(inBufferSize), X kPGPMemoryMgrFlags_None)); X! if (encodedBuffer == (StPGPDataRef) 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X }; X bufSize = Base64Encode( static_cast<const PGPByte *>(inBuffer), X*************** X*** 109,115 **** X cnk = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext), X cnkSize, X kPGPMemoryMgrFlags_None)); X! if (cnk == 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X } X pgpErr = PGPGetKeyPropertyBuffer( inRequestKey, X--- 109,115 ---- X cnk = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext), X cnkSize, X kPGPMemoryMgrFlags_None)); X! if (cnk == (StPGPDataRef) 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X } X pgpErr = PGPGetKeyPropertyBuffer( inRequestKey, X*************** X*** 121,127 **** X encodedCNK = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext), X GetMaxHexEncodedBufferSize(cnkSize), X kPGPMemoryMgrFlags_None)); X! if (encodedCNK == 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X } X cnkSize = HexEncode(cnk, cnkSize, encodedCNK); X--- 121,127 ---- X encodedCNK = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext), X GetMaxHexEncodedBufferSize(cnkSize), X kPGPMemoryMgrFlags_None)); X! if (encodedCNK == (StPGPDataRef) 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X } X cnkSize = HexEncode(cnk, cnkSize, encodedCNK); X*************** X*** 131,137 **** X strlen(kCA) + digestSize + strlen(kCNK) + cnkSize X + strlen(kPKCS10_input) + GetMaxURLEncodedBufferSize(bufSize), X kPGPMemoryMgrFlags_None)); X! if (post == 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X }; X postSize = sprintf(post, "%s%s%s%s%s", kCA, static_cast<char *>(digest), kCNK, X--- 131,137 ---- X strlen(kCA) + digestSize + strlen(kCNK) + cnkSize X + strlen(kPKCS10_input) + GetMaxURLEncodedBufferSize(bufSize), X kPGPMemoryMgrFlags_None)); X! if (post == (StPGPDataRef) 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X }; X postSize = sprintf(post, "%s%s%s%s%s", kCA, static_cast<char *>(digest), kCNK, X*************** X*** 196,202 **** X path = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext), X strlen(prefix) + strlen(query) + 1, X kPGPMemoryMgrFlags_None)); X! if (path == 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X } X sprintf(path, "%s%s", prefix, static_cast<char *>(query)); X--- 196,202 ---- X path = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext), X strlen(prefix) + strlen(query) + 1, X kPGPMemoryMgrFlags_None)); X! if (path == (StPGPDataRef) 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X } X sprintf(path, "%s%s", prefix, static_cast<char *>(query)); X*************** X*** 258,271 **** X digest = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext), X GetMaxDigestedKeyBufferSize(), X kPGPMemoryMgrFlags_None)); X! if (digest == 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X }; X digestSize = DigestKey(inCAKey, digest); X path = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext), X strlen(prefix) + digestSize + 1, X kPGPMemoryMgrFlags_None)); X! if (path == 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X } X sprintf(path, "%s%s", prefix, static_cast<char *>(digest)); X--- 258,271 ---- X digest = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext), X GetMaxDigestedKeyBufferSize(), X kPGPMemoryMgrFlags_None)); X! if (digest == (StPGPDataRef) 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X }; X digestSize = DigestKey(inCAKey, digest); X path = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext), X strlen(prefix) + digestSize + 1, X kPGPMemoryMgrFlags_None)); X! if (path == (StPGPDataRef) 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X } X sprintf(path, "%s%s", prefix, static_cast<char *>(digest)); X*************** X*** 323,329 **** X PGPNewData( PGPGetContextMemoryMgr(mContext), X GetMaxBase64EncodedBufferSize(bufSize), X kPGPMemoryMgrFlags_None)); X! if (encodedBuffer == 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X }; X bufSize = Base64Encode( static_cast<const PGPByte *>(buffer), X--- 323,329 ---- X PGPNewData( PGPGetContextMemoryMgr(mContext), X GetMaxBase64EncodedBufferSize(bufSize), X kPGPMemoryMgrFlags_None)); X! if (encodedBuffer == (StPGPDataRef) 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X }; X bufSize = Base64Encode( static_cast<const PGPByte *>(buffer), X*************** X*** 351,357 **** X buffer = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext), X bufSize, X kPGPMemoryMgrFlags_None)); X! if (buffer == 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X }; X pgpErr = PGPFinalizeHash(hashContext, static_cast<char *>(buffer)); X--- 351,357 ---- X buffer = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext), X bufSize, X kPGPMemoryMgrFlags_None)); X! if (buffer == (StPGPDataRef) 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X }; X pgpErr = PGPFinalizeHash(hashContext, static_cast<char *>(buffer)); X*************** X*** 400,406 **** X result = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext), X resultSize + 1, X kPGPMemoryMgrFlags_None)); X! if (result == 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X }; X pgpCopyMemory(inResult, static_cast<char *>(result), resultSize + 1); X--- 400,406 ---- X result = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext), X resultSize + 1, X kPGPMemoryMgrFlags_None)); X! if (result == (StPGPDataRef) 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X }; X pgpCopyMemory(inResult, static_cast<char *>(result), resultSize + 1); X*************** X*** 426,432 **** X decodedResult = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext), X GetMaxBase64DecodedBufferSize(end - found), X kPGPMemoryMgrFlags_None)); X! if (decodedResult == 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X }; X X--- 426,432 ---- X decodedResult = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext), X GetMaxBase64DecodedBufferSize(end - found), X kPGPMemoryMgrFlags_None)); X! if (decodedResult == (StPGPDataRef) 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X }; X X*************** X*** 470,476 **** X result = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext), X GetMaxBase64DecodedBufferSize(end - found), X kPGPMemoryMgrFlags_None)); X! if (result == 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X }; X X--- 470,476 ---- X result = static_cast<PGPByte *>(PGPNewData( PGPGetContextMemoryMgr(mContext), X GetMaxBase64DecodedBufferSize(end - found), X kPGPMemoryMgrFlags_None)); X! if (result == (StPGPDataRef) 0) { X ThrowPGPError_(kPGPError_OutOfMemory); X }; X END-of-pgp6/patches/patch-ah echo x - pgp6/patches/patch-ai sed 's/^X//' >pgp6/patches/patch-ai << 'END-of-pgp6/patches/patch-ai' X*** libs/network/ldaplib/liblber/io.c 2000/01/26 03:10:31 1.1.1.1 X--- libs/network/ldaplib/liblber/io.c 2000/01/26 03:12:55 1.1.1.2 X*************** X*** 14,19 **** X--- 14,23 ---- X #include <stdio.h> X #include <ctype.h> X X+ #ifdef __FreeBSD__ X+ #include <sys/time.h> X+ #endif X+ X #if PGPSOCKETSLDAP /* jason */ X #include "pgpSocketsLDAP.h" X END-of-pgp6/patches/patch-ai echo x - pgp6/patches/patch-aj sed 's/^X//' >pgp6/patches/patch-aj << 'END-of-pgp6/patches/patch-aj' X*** clients/pgp/cmdline/Makefile.in 2000/01/26 03:55:17 1.1 X--- clients/pgp/cmdline/Makefile.in 2000/01/26 03:55:41 1.2 X*************** X*** 51,57 **** X CFLAGS=@CFLAGS@ X LDFLAGS=@LDFLAGS@ X X! CFLAGS+= -g X X TARGET=pgp X X--- 51,57 ---- X CFLAGS=@CFLAGS@ X LDFLAGS=@LDFLAGS@ X X! CFLAGS+= -g -pthread X X TARGET=pgp X END-of-pgp6/patches/patch-aj echo x - pgp6/patches/patch-ak sed 's/^X//' >pgp6/patches/patch-ak << 'END-of-pgp6/patches/patch-ak' X*** libs/network/ldaplib/include/ldap.h 2000/01/26 03:10:31 1.1.1.1 X--- libs/network/ldaplib/include/ldap.h 2000/01/26 03:12:53 1.1.1.2 X*************** X*** 90,95 **** X--- 90,99 ---- X #define GetThreadID pthread_self X #endif X X+ #ifdef __FreeBSD__ X+ #define GetThreadID pthread_self X+ #endif X+ X #if PGP_MACINTOSH X #define Debug( level, fmt, arg1, arg2, arg3 ) {} /* Nothing */ X #else END-of-pgp6/patches/patch-ak echo c - pgp6/pkg mkdir -p pgp6/pkg > /dev/null 2>&1 echo x - pgp6/pkg/COMMENT sed 's/^X//' >pgp6/pkg/COMMENT << 'END-of-pgp6/pkg/COMMENT' XPublic-Key encryption for the masses END-of-pgp6/pkg/COMMENT echo x - pgp6/pkg/DESCR sed 's/^X//' >pgp6/pkg/DESCR << 'END-of-pgp6/pkg/DESCR' XThis is PGP 6.5.1i. X XThis version is combines many of the new features of PGP 5.0 with the command Xline interface of PGP 2.6.x. X XI ported this in an effort to get the newer code working under FreeBSD. XThe port is fairly straightforward, but my main focus was being able to build Xa functioning executable. Also, this is a port of beta code. It seems to Xwork just fine, but keep in mind that it is a beta. X XMore information on this port can be found at: Xhttp://www.fate.com/projects/pgpport/ X XFor information on PGP in general: Xhttp://www.pgpi.org END-of-pgp6/pkg/DESCR echo x - pgp6/pkg/PLIST sed 's/^X//' >pgp6/pkg/PLIST << 'END-of-pgp6/pkg/PLIST' Xbin/pgp END-of-pgp6/pkg/PLIST exit >How-To-Repeat: >Fix: >Release-Note: >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-ports" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200001261459.GAA31277>