Loading CHANGES +6 −0 Original line number Diff line number Diff line Loading @@ -5,6 +5,12 @@ \___|\___/|_| \_\_____| Changelog Daniel S (24 May 2007) - 'mytx' in bug report #1723194 (http://curl.haxx.se/bug/view.cgi?id=1723194) pointed out that the warnf() function in the curl tool didn't properly deal with the cases when excessively long words were used in the string to chop up. Daniel S (22 May 2007) - Andre Guibert de Bruet fixed a memory leak in the function that verifies the peer's name in the SSL certificate when built for OpenSSL. The leak happens Loading src/main.c +4 −0 Original line number Diff line number Diff line Loading @@ -501,6 +501,10 @@ static void warnf(struct Configurable *config, const char *fmt, ...) while(!ISSPACE(ptr[cut]) && cut) { cut--; } if(0 == cut) /* not a single cutting position was found, just cut it at the max text width then! */ cut = WARN_TEXTWIDTH-1; fwrite(ptr, cut + 1, 1, config->errors); fputs("\n", config->errors); Loading Loading
CHANGES +6 −0 Original line number Diff line number Diff line Loading @@ -5,6 +5,12 @@ \___|\___/|_| \_\_____| Changelog Daniel S (24 May 2007) - 'mytx' in bug report #1723194 (http://curl.haxx.se/bug/view.cgi?id=1723194) pointed out that the warnf() function in the curl tool didn't properly deal with the cases when excessively long words were used in the string to chop up. Daniel S (22 May 2007) - Andre Guibert de Bruet fixed a memory leak in the function that verifies the peer's name in the SSL certificate when built for OpenSSL. The leak happens Loading
src/main.c +4 −0 Original line number Diff line number Diff line Loading @@ -501,6 +501,10 @@ static void warnf(struct Configurable *config, const char *fmt, ...) while(!ISSPACE(ptr[cut]) && cut) { cut--; } if(0 == cut) /* not a single cutting position was found, just cut it at the max text width then! */ cut = WARN_TEXTWIDTH-1; fwrite(ptr, cut + 1, 1, config->errors); fputs("\n", config->errors); Loading