comparison libpurple/dnsquery.c @ 28300:160b864e3d9b

Fix a string now that we're not in string freeze. Thanks, QuLogic!
author Paul Aurich <paul@darkrain42.org>
date Mon, 28 Sep 2009 02:30:09 +0000
parents 578b4048a501
children 213a3449bb3c
comparison
equal deleted inserted replaced
28298:60e4ef6801ff 28300:160b864e3d9b
772 772
773 #ifdef USE_IDN 773 #ifdef USE_IDN
774 if (!dns_str_is_ascii(query_data->hostname)) { 774 if (!dns_str_is_ascii(query_data->hostname)) {
775 rc = purple_network_convert_idn_to_ascii(query_data->hostname, &hostname); 775 rc = purple_network_convert_idn_to_ascii(query_data->hostname, &hostname);
776 if (rc != 0) { 776 if (rc != 0) {
777 /* FIXME: Dirty 2.6.0 string freeze hack */ 777 query_data->error_message = g_strdup_printf(_("Error converting %s "
778 char tmp[8]; 778 "to punycode: %d"), query_data->hostname, rc);
779 g_snprintf(tmp, sizeof(tmp), "%d", rc);
780 query_data->error_message = g_strdup_printf(_("Error resolving %s:\n%s"),
781 query_data->hostname, tmp);
782 /* back to main thread */ 779 /* back to main thread */
783 purple_timeout_add(0, dns_main_thread_cb, query_data); 780 purple_timeout_add(0, dns_main_thread_cb, query_data);
784 return 0; 781 return 0;
785 } 782 }
786 } else /* intentional fallthru */ 783 } else /* intentional fallthru */