Hello Alexander, I don't quite understand what you are indending with this patch:
https://github.com/mbait/fricas/commit/35ff9a71b838440fcf16eee5aee14d5726086a09#diff-1 It is inherently unsafe when the -eval's become longer than 1024 bytes. http://en.wikipedia.org/wiki/Strcpy#Buffer_overflows Same problem for augmented_ws_path. There it's even only 256 bytes long. Also https://github.com/mbait/fricas/commit/81359c8186a4de6a3ee2d0d745328372c9f97de9#diff-1 can cause a buffer overflow. Ralf -- You received this message because you are subscribed to the Google Groups "FriCAS - computer algebra system" group. To post to this group, send email to [email protected]. To unsubscribe from this group, send email to [email protected]. For more options, visit this group at http://groups.google.com/group/fricas-devel?hl=en.
