[#7653] parse.y: literal strings for tokens — Robin Stocker <robin@...>
Hi,
Hi,
Yukihiro Matsumoto wrote:
[#7674] Re: [PATCH] parse.y: literal strings for tokens — ville.mattila@...
ville.mattila@stonesoft.com wrote:
Hi again,
Hi,
[#7692] Socket Documentation commit ? — zdennis <zdennis@...>
-----BEGIN PGP SIGNED MESSAGE-----
[#7708] Bug in libsnmp-ruby1.8 — Hadmut Danisch <hadmut@...>
Hi,
On Apr 11, 2006, at 6:23 AM, Hadmut Danisch wrote:
On 2006-04-12 02:04:32 +0900, Eric Hodel wrote:
On Apr 11, 2006, at 10:20 AM, Marcus Rueckert wrote:
[#7721] Ruby mentor in Googe's Summer of Code — "Evan Phoenix" <evan@...>
We missed out on it last year, so lets this year try to get ruby
[#7725] readpartial not working on ARM — Joel VanderWerf <vjoel@...>
[#7727] Stack trace doesn't include class — noreply@...
Bugs item #4151, was opened at 2006-04-17 23:10
On Apr 17, 2006, at 1:11 PM, noreply@rubyforge.org wrote:
On Wed, 19 Apr 2006, Eric Hodel wrote:
Hi --
[#7729] xmlrpc and charset=utf-8 — "Phil Tomson" <rubyfan@...>
I'm needed to interact with an XMLRPC server written using the
>>>>> On Sun, 18 Jun 2006 12:00:19 +0900
I first sent this from the wrong email account, so if that post somehow makes
On 6/19/06, Sean Russell <ser@germane-software.com> wrote:
[#7738] RDoc patches for GetoptLong — mathew <meta@...>
I added RDoc documentation to GetoptLong. The patches are attached. As
[#7744] Coverity Scan — "Pat Eyler" <rubypate@...>
I don't know if anyone else has signed up for access to the coverity
[#7765] possible defect in array.c — "Pat Eyler" <rubypate@...>
This one may be a false positive, I'm not sure. If it is, I'll happily mark
On 4/25/06, Pat Eyler <rubypate@gmail.com> wrote:
[#7770] Re: possible defect in array.c — "Brown, Warren" <warrenbrown@...>
> rb_range_beg_len (in range.c) does set beg and len.
On 4/26/06, Brown, Warren <warrenbrown@aquire.com> wrote:
On 4/26/06, Pat Eyler <rubypate@gmail.com> wrote:
On 4/26/06, Jacob Fugal <lukfugl@gmail.com> wrote:
On Thu, Apr 27, 2006 at 01:15:24AM +0900, Pat Eyler wrote:
Hi,
On Thu, Apr 27, 2006 at 09:41:00AM +0900, Nobuyoshi Nakada wrote:
[#7799] Patch: code-cleanup (k&r style) — Stefan Huehner <stefan@...>
Hi,
Hi,
possible defect in ext/openssl/ossl_ans1.c (with fix)
768 VALUE klass = *ossl_asn1_info[tag].klass;
Event var_decl: Declared variable "flag" without initializer
Also see events: [uninit_use_in_call]
769 long flag;
At conditional (1): "rb_obj_is_kind_of == 0" taking false path
770 if(!rb_obj_is_kind_of(value, rb_cArray)){
771 switch(tag){
772 case V_ASN1_BOOLEAN:
773 value = decode_bool(start, hlen+len);
774 break;
775 case V_ASN1_INTEGER:
776 value = decode_int(start, hlen+len);
777 break;
778 case V_ASN1_BIT_STRING:
779 value = decode_bstr(start, hlen+len, &flag);
780 break;
781 case V_ASN1_NULL:
782 value = decode_null(start, hlen+len);
783 break;
784 case V_ASN1_ENUMERATED:
785 value = decode_enum(start, hlen+len);
786 break;
787 case V_ASN1_OBJECT:
788 value = decode_obj(start, hlen+len);
789 break;
790 case V_ASN1_UTCTIME: /* FALLTHROUGH */
791 case V_ASN1_GENERALIZEDTIME:
792 value = decode_time(start, hlen+len);
793 break;
794 default:
795 /* use original value */
796 break;
797 }
798 }
799 asn1data = rb_funcall(klass, rb_intern("new"), 1, value);
At conditional (2): "tag == 3" taking true path
800 if(tag == V_ASN1_BIT_STRING){
Event uninit_use_in_call: Using uninitialized value "flag" in call to
function "rb_int2inum" [model]
Also see events: [var_decl]
801 rb_iv_set(asn1data, "@unused_bits", LONG2NUM(flag));
802 }
803 }
here's the diff (which follows the advice I received from everyone after
the last one.)
diff -c -r1.13 ossl_asn1.c
*** ext/openssl/ossl_asn1.c 3 Feb 2006 09:15:38 -0000 1.13
--- ext/openssl/ossl_asn1.c 27 Apr 2006 03:49:37 -0000
***************
*** 766,772 ****
if(tag_class == sUNIVERSAL &&
tag < ossl_asn1_info_size && ossl_asn1_info[tag].klass){
VALUE klass = *ossl_asn1_info[tag].klass;
! long flag;
if(!rb_obj_is_kind_of(value, rb_cArray)){
switch(tag){
case V_ASN1_BOOLEAN:
--- 766,772 ----
if(tag_class == sUNIVERSAL &&
tag < ossl_asn1_info_size && ossl_asn1_info[tag].klass){
VALUE klass = *ossl_asn1_info[tag].klass;
! long flag = 0;
if(!rb_obj_is_kind_of(value, rb_cArray)){
switch(tag){
case V_ASN1_BOOLEAN: