diff options
author | matz <matz@b2dd03c8-39d4-4d8f-98ff-823fe69b080e> | 2001-07-27 09:12:12 +0000 |
---|---|---|
committer | matz <matz@b2dd03c8-39d4-4d8f-98ff-823fe69b080e> | 2001-07-27 09:12:12 +0000 |
commit | 0abedcd80770841475006342c96d348d78f91ab8 (patch) | |
tree | 289c8c48ee23c65aeac5a2983433c47cdee08f41 /file.c | |
parent | 980f8164797ce17f77be3e1ad9b5e4e96fdab4a3 (diff) |
* eval.c (rb_provided): extension should be guessed using
rb_find_file_noext().
* eval.c (rb_f_require): should call rb_feature_p() after
extension completion.
* eval.c (rb_eval): add CHECK_INTS before next, redo, retry to
avoid potential uninterruptable infinite loop.
* file.c (rb_file_s_expand_path): use CharNext() to expand.
git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@1653 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
Diffstat (limited to 'file.c')
-rw-r--r-- | file.c | 38 |
1 files changed, 26 insertions, 12 deletions
@@ -1332,7 +1332,7 @@ rb_file_s_expand_path(argc, argv) VALUE *argv; { VALUE fname, dname; - char *s, *p; + char *s, *p, *sbeg, *b; char buf[MAXPATHLEN+2]; char *bend = buf + sizeof(buf) - 2; int tainted; @@ -1340,7 +1340,7 @@ rb_file_s_expand_path(argc, argv) rb_scan_args(argc, argv, "11", &fname, &dname); tainted = OBJ_TAINTED(fname); - s = StringValuePtr(fname); + s = sbeg = StringValuePtr(fname); p = buf; if (s[0] == '~') { if (isdirsep(s[1]) || s[1] == '\0') { @@ -1360,10 +1360,13 @@ rb_file_s_expand_path(argc, argv) struct passwd *pwPtr; s++; #endif + b = s; while (*s && !isdirsep(*s)) { - *p++ = *s++; - if (p >= bend) goto toolong; + s = CharNext(s); } + if (p + (s-b) >= bend) goto toolong; + memcpy(p, b, s-b); + p += s-b; *p = '\0'; #ifdef HAVE_PWD_H pwPtr = getpwnam(buf); @@ -1381,10 +1384,13 @@ rb_file_s_expand_path(argc, argv) #if defined DOSISH /* skip drive letter */ else if (ISALPHA(s[0]) && s[1] == ':' && isdirsep(s[2])) { + b = s; while (*s && !isdirsep(*s)) { - *p++ = *s++; - if (p >= bend) goto toolong; + s = CharNext(s); } + if (p + (s-b) >= bend) goto toolong; + memcpy(p, b, s-b); + p += s-b; } #endif else if (!isdirsep(*s)) { @@ -1411,10 +1417,10 @@ rb_file_s_expand_path(argc, argv) } *p = '/'; - for ( ; *s; s++) { + while (*s) { switch (*s) { case '.': - if (*(s+1)) { + if (*(s+1) && (s == sbeg || isdirsep(*(s - 1)))) { switch (*++s) { case '.': if (*(s+1) == '\0' || isdirsep(*(s+1))) { @@ -1440,6 +1446,9 @@ rb_file_s_expand_path(argc, argv) default: *++p = '.'; *++p = *s; break; } + } + else { + *++p = '.'; } break; case '/': @@ -1448,9 +1457,14 @@ rb_file_s_expand_path(argc, argv) #endif if (!isdirsep(*p)) *++p = '/'; break; default: - *++p = *s; - if (p >= bend) goto toolong; + b = s; + s = CharNext(s); + p = CharNext(p); + if (p + (s-b) >= bend) goto toolong; + memcpy(p, b, s-b); + continue; } + s = CharNext(s); } /* Place a \0 at end. If path ends with a "/", delete it */ @@ -2278,7 +2292,7 @@ rb_find_file_noext(filep) if (rb_safe_level() >= 2 && OBJ_TAINTED(fname)) { rb_raise(rb_eSecurityError, "loading from unsafe file %s", f); } - f = STR2CSTR(fname); + f = StringValuePtr(fname); *filep = fname; } @@ -2329,7 +2343,7 @@ rb_find_file(path) if (rb_safe_level() >= 2 && OBJ_TAINTED(path)) { rb_raise(rb_eSecurityError, "loading from unsafe file %s", f); } - f = STR2CSTR(path); + f = StringValuePtr(path); } #if defined(__MACOS__) || defined(riscos) |