Hi,
I just submitted a bug report but the dopey webpage didn't accept my
attachment, nor my email address, and it won't recognise that I'm logged
in once I go back to the bug database from my personal page. You guys
should use gnats or something. Anyhow, here is the patch I tried to
submit on the bug report.  Hopefully someone (Danny?) will be able to
deal with it.

Here's the tracker ID.

[ #520765 ] XbaeInput pattern bug | in [ ]

I'm not subscribed to this list so Cc me on any replies.

    C

(c)2002 Callum Gibson                       [EMAIL PROTECTED]
Global Markets IT, Deutsche Bank, Australia       61 2 9258 1620
### The opinions in this message are mine and not Deutsche's ###

--- Input.c     Thu Feb 21 12:22:04 2002
+++ /fid/contrib/widgets/Xbae-4.9.1/src/Input.c Thu Feb 21 12:28:10 2002
@@ -605,8 +605,10 @@
                       If tptr is | then we already had success on the previous
                       char so skip it and then next.
                    */
+                   if (*ntptr == CHAR_ESCAPE)
+                       ntptr++;
                    tptr = ntptr + 1;
-                   equal = False;
+                   /*equal = False;*/
                    continue;
                case CHAR_ESCAPE:
                    tptr++;
@@ -799,8 +801,20 @@
 #endif
     }
 
-    if (optional && *tptr && *tptr == CHAR_EOPTION) /* step over last ']' */
+    /* skip over the remain optional part which has been matched */
+    /* XXX don't know whether optional blocks should be treated need to
+       match entirely if exact is true. If this is the case, we should only
+       skip over CHAR_OR inside the optional. This code was more complicated
+       however, so I didn't bother. -cg
+    */
+    while (optional && *tptr)
+    {
+       if (*tptr == CHAR_ESCAPE)
        tptr++;
+       else if (*tptr == CHAR_EOPTION)
+           optional = 0;
+       tptr++;
+    }
 
     /*
      * Determine whether any (and how many) literals are about to be inserted
_______________________________________________
Lesstif mailing list
[EMAIL PROTECTED]
https://terror.hungry.com/mailman/listinfo/lesstif

Reply via email to