mirror of
https://github.com/moparisthebest/curl
synced 2024-12-22 08:08:50 -05:00
'mytx' in bug report #1723194 (http://curl.haxx.se/bug/view.cgi?id=1723194)
pointed out that the warnf() function in the curl tool didn't properly deal with the cases when excessively long words were used in the string to chop up.
This commit is contained in:
parent
380e132da3
commit
70b1900dd1
6
CHANGES
6
CHANGES
@ -5,6 +5,12 @@
|
||||
\___|\___/|_| \_\_____|
|
||||
|
||||
Changelog
|
||||
Daniel S (24 May 2007)
|
||||
- 'mytx' in bug report #1723194 (http://curl.haxx.se/bug/view.cgi?id=1723194)
|
||||
pointed out that the warnf() function in the curl tool didn't properly deal
|
||||
with the cases when excessively long words were used in the string to chop
|
||||
up.
|
||||
|
||||
Daniel S (22 May 2007)
|
||||
- Andre Guibert de Bruet fixed a memory leak in the function that verifies the
|
||||
peer's name in the SSL certificate when built for OpenSSL. The leak happens
|
||||
|
@ -501,6 +501,10 @@ static void warnf(struct Configurable *config, const char *fmt, ...)
|
||||
while(!ISSPACE(ptr[cut]) && cut) {
|
||||
cut--;
|
||||
}
|
||||
if(0 == cut)
|
||||
/* not a single cutting position was found, just cut it at the
|
||||
max text width then! */
|
||||
cut = WARN_TEXTWIDTH-1;
|
||||
|
||||
fwrite(ptr, cut + 1, 1, config->errors);
|
||||
fputs("\n", config->errors);
|
||||
|
Loading…
Reference in New Issue
Block a user