Commit 70b1900d authored by Daniel Stenberg's avatar Daniel Stenberg
Browse files

'mytx' in bug report #1723194 (http://curl.haxx.se/bug/view.cgi?id=1723194)

pointed out that the warnf() function in the curl tool didn't properly deal
with the cases when excessively long words were used in the string to chop
up.
parent 380e132d
Loading
Loading
Loading
Loading
+6 −0
Original line number Diff line number Diff line
@@ -5,6 +5,12 @@
                             \___|\___/|_| \_\_____|

                                  Changelog
Daniel S (24 May 2007)
- 'mytx' in bug report #1723194 (http://curl.haxx.se/bug/view.cgi?id=1723194)
  pointed out that the warnf() function in the curl tool didn't properly deal
  with the cases when excessively long words were used in the string to chop
  up.

Daniel S (22 May 2007)
- Andre Guibert de Bruet fixed a memory leak in the function that verifies the
  peer's name in the SSL certificate when built for OpenSSL. The leak happens
+4 −0
Original line number Diff line number Diff line
@@ -501,6 +501,10 @@ static void warnf(struct Configurable *config, const char *fmt, ...)
        while(!ISSPACE(ptr[cut]) && cut) {
          cut--;
        }
        if(0 == cut)
          /* not a single cutting position was found, just cut it at the
             max text width then! */
          cut = WARN_TEXTWIDTH-1;

        fwrite(ptr, cut + 1, 1, config->errors);
        fputs("\n", config->errors);