head	1.2;
access;
symbols
	RELEASE_5_EOL:1.1
	RELEASE_7_0_0:1.1
	RELEASE_6_3_0:1.1
	PRE_XORG_7:1.1
	RELEASE_4_EOL:1.1
	RELEASE_6_2_0:1.1
	RELEASE_6_1_0:1.1
	RELEASE_5_5_0:1.1
	RELEASE_6_0_0:1.1
	RELEASE_5_4_0:1.1
	RELEASE_4_11_0:1.1
	RELEASE_5_3_0:1.1
	RELEASE_4_10_0:1.1
	RELEASE_5_2_1:1.1
	RELEASE_5_2_0:1.1
	RELEASE_4_9_0:1.1
	RELEASE_5_1_0:1.1
	RELEASE_4_8_0:1.1
	RELEASE_5_0_0:1.1
	RELEASE_4_7_0:1.1
	RELEASE_4_6_2:1.1
	RELEASE_4_6_1:1.1
	RELEASE_4_6_0:1.1
	RELEASE_5_0_DP1:1.1
	RELEASE_4_5_0:1.1
	RELEASE_4_4_0:1.1
	RELEASE_4_3_0:1.1
	RELEASE_4_2_0:1.1
	RELEASE_4_1_1:1.1
	RELEASE_4_1_0:1.1
	RELEASE_3_5_0:1.1;
locks; strict;
comment	@# @;


1.2
date	2008.09.01.17.56.05;	author obrien;	state dead;
branches;
next	1.1;

1.1
date	2000.05.29.06.17.54;	author will;	state Exp;
branches;
next	;


desc
@@


1.2
log
@Fix build on FreeBSD/i386 8-CURRENT.  (7.0 building with GCC 4.2)
@
text
@*** libs/pgpcdk/priv/networklib/keyserver/CHTTPXcertServer.cpp	2000/01/26 03:10:44	1.1.1.1
--- libs/pgpcdk/priv/networklib/keyserver/CHTTPXcertServer.cpp	2000/01/26 03:13:49	1.1.1.2
***************
*** 89,95 ****
  		digest = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
  													GetMaxDigestedKeyBufferSize(),
  													kPGPMemoryMgrFlags_None));
! 		if (digest == 0) {
  			ThrowPGPError_(kPGPError_OutOfMemory);
  		};
  		digestSize = DigestKey(inCAKey, digest);
--- 89,95 ----
  		digest = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
  													GetMaxDigestedKeyBufferSize(),
  													kPGPMemoryMgrFlags_None));
! 		if (digest == (StPGPDataRef) 0) {
  			ThrowPGPError_(kPGPError_OutOfMemory);
  		};
  		digestSize = DigestKey(inCAKey, digest);
***************
*** 98,104 ****
  			PGPNewData(	PGPGetContextMemoryMgr(mContext),
  						GetMaxBase64EncodedBufferSize(inBufferSize),
  						kPGPMemoryMgrFlags_None));
! 		if (encodedBuffer == 0) {
  			ThrowPGPError_(kPGPError_OutOfMemory);
  		};
  		bufSize = Base64Encode(	static_cast<const PGPByte *>(inBuffer),
--- 98,104 ----
  			PGPNewData(	PGPGetContextMemoryMgr(mContext),
  						GetMaxBase64EncodedBufferSize(inBufferSize),
  						kPGPMemoryMgrFlags_None));
! 		if (encodedBuffer == (StPGPDataRef) 0) {
  			ThrowPGPError_(kPGPError_OutOfMemory);
  		};
  		bufSize = Base64Encode(	static_cast<const PGPByte *>(inBuffer),
***************
*** 109,115 ****
  		cnk = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
  													cnkSize,
  													kPGPMemoryMgrFlags_None));
! 		if (cnk == 0) {
  			ThrowPGPError_(kPGPError_OutOfMemory);
  		}
  		pgpErr = PGPGetKeyPropertyBuffer(	inRequestKey,
--- 109,115 ----
  		cnk = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
  													cnkSize,
  													kPGPMemoryMgrFlags_None));
! 		if (cnk == (StPGPDataRef) 0) {
  			ThrowPGPError_(kPGPError_OutOfMemory);
  		}
  		pgpErr = PGPGetKeyPropertyBuffer(	inRequestKey,
***************
*** 121,127 ****
  		encodedCNK = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
  														GetMaxHexEncodedBufferSize(cnkSize),
  														kPGPMemoryMgrFlags_None));
! 		if (encodedCNK == 0) {
  			ThrowPGPError_(kPGPError_OutOfMemory);
  		}
  		cnkSize = HexEncode(cnk, cnkSize, encodedCNK);
--- 121,127 ----
  		encodedCNK = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
  														GetMaxHexEncodedBufferSize(cnkSize),
  														kPGPMemoryMgrFlags_None));
! 		if (encodedCNK == (StPGPDataRef) 0) {
  			ThrowPGPError_(kPGPError_OutOfMemory);
  		}
  		cnkSize = HexEncode(cnk, cnkSize, encodedCNK);
***************
*** 131,137 ****
  						strlen(kCA) + digestSize + strlen(kCNK) + cnkSize
  							+ strlen(kPKCS10_input) + GetMaxURLEncodedBufferSize(bufSize),
  						kPGPMemoryMgrFlags_None));
! 		if (post == 0) {
  			ThrowPGPError_(kPGPError_OutOfMemory);
  		};
  		postSize = sprintf(post, "%s%s%s%s%s", kCA, static_cast<char *>(digest), kCNK,
--- 131,137 ----
  						strlen(kCA) + digestSize + strlen(kCNK) + cnkSize
  							+ strlen(kPKCS10_input) + GetMaxURLEncodedBufferSize(bufSize),
  						kPGPMemoryMgrFlags_None));
! 		if (post == (StPGPDataRef) 0) {
  			ThrowPGPError_(kPGPError_OutOfMemory);
  		};
  		postSize = sprintf(post, "%s%s%s%s%s", kCA, static_cast<char *>(digest), kCNK,
***************
*** 196,202 ****
  		path = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
  													strlen(prefix) + strlen(query) + 1,
  													kPGPMemoryMgrFlags_None));
! 		if (path == 0) {
  			ThrowPGPError_(kPGPError_OutOfMemory);
  		}
  		sprintf(path, "%s%s", prefix, static_cast<char *>(query));
--- 196,202 ----
  		path = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
  													strlen(prefix) + strlen(query) + 1,
  													kPGPMemoryMgrFlags_None));
! 		if (path == (StPGPDataRef) 0) {
  			ThrowPGPError_(kPGPError_OutOfMemory);
  		}
  		sprintf(path, "%s%s", prefix, static_cast<char *>(query));
***************
*** 258,271 ****
  		digest = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
  													GetMaxDigestedKeyBufferSize(),
  													kPGPMemoryMgrFlags_None));
! 		if (digest == 0) {
  			ThrowPGPError_(kPGPError_OutOfMemory);
  		};
  		digestSize = DigestKey(inCAKey, digest);
  		path = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
  													strlen(prefix) + digestSize + 1,
  													kPGPMemoryMgrFlags_None));
! 		if (path == 0) {
  			ThrowPGPError_(kPGPError_OutOfMemory);
  		}
  		sprintf(path, "%s%s", prefix, static_cast<char *>(digest));
--- 258,271 ----
  		digest = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
  													GetMaxDigestedKeyBufferSize(),
  													kPGPMemoryMgrFlags_None));
! 		if (digest == (StPGPDataRef) 0) {
  			ThrowPGPError_(kPGPError_OutOfMemory);
  		};
  		digestSize = DigestKey(inCAKey, digest);
  		path = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
  													strlen(prefix) + digestSize + 1,
  													kPGPMemoryMgrFlags_None));
! 		if (path == (StPGPDataRef) 0) {
  			ThrowPGPError_(kPGPError_OutOfMemory);
  		}
  		sprintf(path, "%s%s", prefix, static_cast<char *>(digest));
***************
*** 323,329 ****
  		PGPNewData(	PGPGetContextMemoryMgr(mContext),
  					GetMaxBase64EncodedBufferSize(bufSize),
  					kPGPMemoryMgrFlags_None));
! 	if (encodedBuffer == 0) {
  		ThrowPGPError_(kPGPError_OutOfMemory);
  	};
  	bufSize = Base64Encode(	static_cast<const PGPByte *>(buffer),
--- 323,329 ----
  		PGPNewData(	PGPGetContextMemoryMgr(mContext),
  					GetMaxBase64EncodedBufferSize(bufSize),
  					kPGPMemoryMgrFlags_None));
! 	if (encodedBuffer == (StPGPDataRef) 0) {
  		ThrowPGPError_(kPGPError_OutOfMemory);
  	};
  	bufSize = Base64Encode(	static_cast<const PGPByte *>(buffer),
***************
*** 351,357 ****
  	buffer = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
  												bufSize,
  												kPGPMemoryMgrFlags_None));
! 	if (buffer == 0) {
  		ThrowPGPError_(kPGPError_OutOfMemory);
  	};
  	pgpErr = PGPFinalizeHash(hashContext, static_cast<char *>(buffer));
--- 351,357 ----
  	buffer = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
  												bufSize,
  												kPGPMemoryMgrFlags_None));
! 	if (buffer == (StPGPDataRef) 0) {
  		ThrowPGPError_(kPGPError_OutOfMemory);
  	};
  	pgpErr = PGPFinalizeHash(hashContext, static_cast<char *>(buffer));
***************
*** 400,406 ****
  	result = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
  												resultSize + 1,
  												kPGPMemoryMgrFlags_None));
! 	if (result == 0) {
  		ThrowPGPError_(kPGPError_OutOfMemory);
  	};
  	pgpCopyMemory(inResult, static_cast<char *>(result), resultSize + 1);
--- 400,406 ----
  	result = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
  												resultSize + 1,
  												kPGPMemoryMgrFlags_None));
! 	if (result == (StPGPDataRef) 0) {
  		ThrowPGPError_(kPGPError_OutOfMemory);
  	};
  	pgpCopyMemory(inResult, static_cast<char *>(result), resultSize + 1);
***************
*** 426,432 ****
  	decodedResult = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
  														GetMaxBase64DecodedBufferSize(end - found),
  														kPGPMemoryMgrFlags_None));
! 	if (decodedResult == 0) {
  		ThrowPGPError_(kPGPError_OutOfMemory);
  	};
  	
--- 426,432 ----
  	decodedResult = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
  														GetMaxBase64DecodedBufferSize(end - found),
  														kPGPMemoryMgrFlags_None));
! 	if (decodedResult == (StPGPDataRef) 0) {
  		ThrowPGPError_(kPGPError_OutOfMemory);
  	};
  	
***************
*** 470,476 ****
  	result = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
  												GetMaxBase64DecodedBufferSize(end - found),
  												kPGPMemoryMgrFlags_None));
! 	if (result == 0) {
  		ThrowPGPError_(kPGPError_OutOfMemory);
  	};
  	
--- 470,476 ----
  	result = static_cast<PGPByte *>(PGPNewData(	PGPGetContextMemoryMgr(mContext),
  												GetMaxBase64DecodedBufferSize(end - found),
  												kPGPMemoryMgrFlags_None));
! 	if (result == (StPGPDataRef) 0) {
  		ThrowPGPError_(kPGPError_OutOfMemory);
  	};
  	
@


1.1
log
@Update to PGP (International version) 6.5.1i.  This is actually a new
port, repo-copied from security/pgp5 by asami.

I added a bunch of the intl mirrors to make this port super-available.

PR:		16377
Submitted by:	Mike Sherwood <mike@@fate.com>
@
text
@@

