Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Spell "tomorrow" correctly. From Zafer Aydogan. | wiz | 2006-12-25 | 1 | -1/+1 |
| | |||||
* | Bump date for previous. Use mdoc macros. | wiz | 2006-12-23 | 1 | -3/+3 |
| | |||||
* | Add example of using -w. | reed | 2006-12-14 | 1 | -1/+4 |
| | |||||
* | s/existance/existence/, from Zafer. | wiz | 2006-11-24 | 2 | -3/+3 |
| | |||||
* | s/independant/independent/, from Zafer. | wiz | 2006-11-24 | 1 | -2/+2 |
| | |||||
* | s/exceded/exceeded/, from Zafer. | wiz | 2006-11-24 | 1 | -3/+3 |
| | |||||
* | fix spelling of accommodate; from Zapher. | christos | 2006-11-24 | 1 | -3/+3 |
| | |||||
* | fix spelling of accidentally; from Zapher | christos | 2006-11-24 | 1 | -2/+2 |
| | |||||
* | Check that -w width is not above maximum. (It already checks for zero or | reed | 2006-11-22 | 1 | -4/+4 |
| | | | | | | negative.) Using width above DWIDTH may cause overflow as noted by Gruzicki Wlodek on bugtraq. While here replace one use of 132 with DWIDTH. | ||||
* | don't discard const. GCC 4.1-20061021 doesn't like that... | mrg | 2006-10-22 | 1 | -3/+3 |
| | |||||
* | Typo, from David A. Holland on #NetBSD-code, thanks! | elad | 2006-10-08 | 2 | -2/+1 |
| | |||||
* | Input validation, from David A. Holland on #NetBSD-code | elad | 2006-10-07 | 1 | -6/+18 |
| | |||||
* | PR/18906: roskens at elfin dot net: misc. select() to poll() updates. | elad | 2006-10-07 | 1 | -5/+5 |
| | | | Adapted to -current by myself, thanks for the patch! | ||||
* | PR# 4305: [dM] boggle uses very incomplete wordlist. | jmcneill | 2006-09-24 | 1 | -2/+7 |
| | |||||
* | PR/34175: Zafer Aydogan: touch the window to cause a refresh after help | christos | 2006-08-09 | 2 | -18/+20 |
| | | | Also use CTRL instead of \xxx | ||||
* | Attribute ``A language that doesn't affect the way you think about | hubertf | 2006-06-24 | 1 | -0/+1 |
| | | | | programming is not worth knowing.'' to Alan Perlis, per Diomidis Spinellis' blog at http://www.spinellis.gr/blog/20060424/ | ||||
* | Fix typo or mispelling. | reed | 2006-06-17 | 1 | -2/+2 |
| | |||||
* | Increase username length to match modern systems, and create #defines for a | jnemeth | 2006-06-07 | 1 | -2/+4 |
| | | | couple of lengths. | ||||
* | Actually accept "?" argument as documented in the manpage. | jnemeth | 2006-06-07 | 1 | -16/+14 |
| | | | | Don't attempt to ignore an untrappable signal. Fix 6 possible buffer overflows. | ||||
* | Don't follow symlinks on systems that have O_NOFOLLOW. | jnemeth | 2006-06-07 | 1 | -5/+9 |
| | | | | Don't bother looping with lockf() since first iteration would return. Prevent two buffer overflows. | ||||
* | prevent "stack" overflow | jnemeth | 2006-06-07 | 2 | -3/+5 |
| | |||||
* | bracket else block | jnemeth | 2006-06-07 | 1 | -3/+4 |
| | |||||
* | WARNS=4 | jnemeth | 2006-06-07 | 1 | -2/+2 |
| | |||||
* | Better check data read from tetris.scores before use as array indices etc. | drochner | 2006-06-01 | 1 | -9/+12 |
| | | | | | | This is CVE-2006-1539, files against Gentoo Linux, the patch is from Gentoo. A standard NetBSD installation is not as much risk because tetris is sgid "games", and users shouldn't be in that group. | ||||
* | read config more strictly, from Maximillian Dornseif | dan | 2006-05-25 | 1 | -5/+5 |
| | |||||
* | don't try to switch a char and have a case of EOF - use an int. | mrg | 2006-05-18 | 2 | -8/+13 |
| | |||||
* | Remove dup Hitler fortune. One of the two fortunes I moved yesterday, was | christos | 2006-05-17 | 1 | -4/+0 |
| | | | already in the offensive set. From a NetBSD fan who prefers to be anonymous. | ||||
* | PR/33495: Daniel Weiss: Offensive quote in netbsd fortune package | christos | 2006-05-16 | 2 | -13/+13 |
| | | | | - Move 2 offensive to women Adolf Hitler quotes to fortune2-o - s/Adolph/Adolf/ | ||||
* | Add a virtual destructor to avoid "future ABI issues". I love c++. | christos | 2006-05-14 | 1 | -1/+2 |
| | |||||
* | add virtual destructors so that g++ shuts up. | christos | 2006-05-14 | 2 | -2/+4 |
| | |||||
* | Don't use iostream just for the usage message. Use stdio instead. | christos | 2006-05-14 | 1 | -5/+5 |
| | |||||
* | XXX: GCC uninitialized | christos | 2006-05-14 | 3 | -11/+14 |
| | |||||
* | Coverity CID 3382: Fix memory leak. | christos | 2006-05-13 | 1 | -2/+3 |
| | |||||
* | Coverity CID 3383: Fix memory leak. | christos | 2006-05-13 | 1 | -2/+3 |
| | |||||
* | Coverity CID 3508: Fix file leak. | christos | 2006-05-13 | 1 | -2/+3 |
| | |||||
* | Coverity CID 3269: Fix memory leak. | christos | 2006-05-13 | 1 | -5/+8 |
| | |||||
* | sprinkle some -fno-strict-aliasing and -Wno-pointer-sign with GCC4. | mrg | 2006-05-11 | 4 | -4/+24 |
| | |||||
* | lrint() -> larn_lrint(). | mrg | 2006-05-11 | 3 | -11/+11 |
| | |||||
* | end the argument list to exec*(3) with a NULL instead of a bare '0', as | mrg | 2006-05-11 | 1 | -3/+3 |
| | | | the latter isn't a pointer context in these varargs functions. | ||||
* | UC, PC and BC are provided my libtermcap, don't duplicate them. | mrg | 2006-05-11 | 1 | -15/+4 |
| | |||||
* | avoid a pointer sign difference. | mrg | 2006-05-11 | 1 | -3/+3 |
| | |||||
* | change (mostly) int to socklen_t. GCC 4 doesn't like that int and | mrg | 2006-05-09 | 3 | -11/+11 |
| | | | socklen_t are different signness. | ||||
* | Credit Alan Perlis for ``give him a lollipop'' programming language quote. | groo | 2006-04-26 | 1 | -0/+1 |
| | | | Hat tip: Jerry Leichter. | ||||
* | Coverity CID 3032: Prevent double free: Next to the call of page_more() | christos | 2006-04-24 | 1 | -3/+2 |
| | | | | there is a comment saying /* does fclose */, but the next line calls fclose(fp);. Go figure. | ||||
* | It's "its." | snj | 2006-04-24 | 1 | -3/+3 |
| | |||||
* | It's "its." | snj | 2006-04-24 | 3 | -7/+7 |
| | |||||
* | fix buffer overflow (CVE-2006-1744), from Debian | drochner | 2006-04-20 | 1 | -3/+3 |
| | |||||
* | Grammar nit. Never mind that it's still not true. | groo | 2006-04-06 | 1 | -1/+1 |
| | |||||
* | Coverity CID 2788: If no room gets returned, don't try to place a monster. | christos | 2006-04-02 | 1 | -3/+3 |
| | |||||
* | Coverity CID 2791: Fix file pointer leak. | christos | 2006-04-02 | 1 | -2/+4 |
| |