summaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* PR# 4305: [dM] boggle uses very incomplete wordlist.jmcneill2006-09-241-2/+7
|
* PR/34175: Zafer Aydogan: touch the window to cause a refresh after helpchristos2006-08-092-18/+20
| | | Also use CTRL instead of \xxx
* Attribute ``A language that doesn't affect the way you think abouthubertf2006-06-241-0/+1
| | | | programming is not worth knowing.'' to Alan Perlis, per Diomidis Spinellis' blog at http://www.spinellis.gr/blog/20060424/
* Fix typo or mispelling.reed2006-06-171-2/+2
|
* Increase username length to match modern systems, and create #defines for ajnemeth2006-06-071-2/+4
| | | couple of lengths.
* Actually accept "?" argument as documented in the manpage.jnemeth2006-06-071-16/+14
| | | | Don't attempt to ignore an untrappable signal. Fix 6 possible buffer overflows.
* Don't follow symlinks on systems that have O_NOFOLLOW.jnemeth2006-06-071-5/+9
| | | | Don't bother looping with lockf() since first iteration would return. Prevent two buffer overflows.
* prevent "stack" overflowjnemeth2006-06-072-3/+5
|
* bracket else blockjnemeth2006-06-071-3/+4
|
* WARNS=4jnemeth2006-06-071-2/+2
|
* Better check data read from tetris.scores before use as array indices etc.drochner2006-06-011-9/+12
| | | | | | This is CVE-2006-1539, files against Gentoo Linux, the patch is from Gentoo. A standard NetBSD installation is not as much risk because tetris is sgid "games", and users shouldn't be in that group.
* read config more strictly, from Maximillian Dornseifdan2006-05-251-5/+5
|
* don't try to switch a char and have a case of EOF - use an int.mrg2006-05-182-8/+13
|
* Remove dup Hitler fortune. One of the two fortunes I moved yesterday, waschristos2006-05-171-4/+0
| | | already in the offensive set. From a NetBSD fan who prefers to be anonymous.
* PR/33495: Daniel Weiss: Offensive quote in netbsd fortune packagechristos2006-05-162-13/+13
| | | | - Move 2 offensive to women Adolf Hitler quotes to fortune2-o - s/Adolph/Adolf/
* Add a virtual destructor to avoid "future ABI issues". I love c++.christos2006-05-141-1/+2
|
* add virtual destructors so that g++ shuts up.christos2006-05-142-2/+4
|
* Don't use iostream just for the usage message. Use stdio instead.christos2006-05-141-5/+5
|
* XXX: GCC uninitializedchristos2006-05-143-11/+14
|
* Coverity CID 3382: Fix memory leak.christos2006-05-131-2/+3
|
* Coverity CID 3383: Fix memory leak.christos2006-05-131-2/+3
|
* Coverity CID 3508: Fix file leak.christos2006-05-131-2/+3
|
* Coverity CID 3269: Fix memory leak.christos2006-05-131-5/+8
|
* sprinkle some -fno-strict-aliasing and -Wno-pointer-sign with GCC4.mrg2006-05-114-4/+24
|
* lrint() -> larn_lrint().mrg2006-05-113-11/+11
|
* end the argument list to exec*(3) with a NULL instead of a bare '0', asmrg2006-05-111-3/+3
| | | the latter isn't a pointer context in these varargs functions.
* UC, PC and BC are provided my libtermcap, don't duplicate them.mrg2006-05-111-15/+4
|
* avoid a pointer sign difference.mrg2006-05-111-3/+3
|
* change (mostly) int to socklen_t. GCC 4 doesn't like that int andmrg2006-05-093-11/+11
| | | socklen_t are different signness.
* Credit Alan Perlis for ``give him a lollipop'' programming language quote.groo2006-04-261-0/+1
| | | Hat tip: Jerry Leichter.
* Coverity CID 3032: Prevent double free: Next to the call of page_more()christos2006-04-241-3/+2
| | | | there is a comment saying /* does fclose */, but the next line calls fclose(fp);. Go figure.
* It's "its."snj2006-04-241-3/+3
|
* It's "its."snj2006-04-243-7/+7
|
* fix buffer overflow (CVE-2006-1744), from Debiandrochner2006-04-201-3/+3
|
* Grammar nit. Never mind that it's still not true.groo2006-04-061-1/+1
|
* Coverity CID 2788: If no room gets returned, don't try to place a monster.christos2006-04-021-3/+3
|
* Coverity CID 2791: Fix file pointer leak.christos2006-04-021-2/+4
|
* Coverity CID 2452: possible negative array index; CID 1518 and CID 1517: ↵jnemeth2006-03-301-2/+5
| | | | possible overrun of static array
* Coverity CID 1288: possible negative array indexjnemeth2006-03-301-2/+4
|
* Coverity CID 993: dereference of NULL pointerjnemeth2006-03-301-2/+3
|
* Coverity CID 1293: not checking for an error returnjnemeth2006-03-301-2/+4
|
* Coverity CID 1287: not checking for error returnjnemeth2006-03-301-2/+4
|
* Coverity CID 1327: check for error returnjnemeth2006-03-301-2/+4
|
* Bah! Compare, don't assign!jnemeth2006-03-301-3/+3
|
* Coverity CID 1328: check for error returnjnemeth2006-03-301-2/+4
|
* Coverity CID 1326: check for error returnjnemeth2006-03-301-2/+4
|
* Fix Coverity issue 891 -- FORWARD_NULL.jnemeth2006-03-291-2/+6
| | | Approved by christos@.
* Fix Coverity issues 2366 and 2365 -- REVERSE_INULL.jnemeth2006-03-291-6/+12
| | | Approved by Christos@.
* Fix Coverity issue 2584 -- USE_AFTER_FREE and issue 889 -- FORWARD_NULL.jnemeth2006-03-291-5/+9
| | | Approved by christos@.
* Add missing parens.christos2006-03-221-4/+4
|