Sun Jun 17 11:51:39 2001 Michael Jennings (mej)
Stupid stupid typo. Originally reported by Bas van Sisseren <bas@dnd.utwente.nl> in Debian Bug #101161. SVN revision: 4821
This commit is contained in:
parent
0c731576d4
commit
17210b693a
|
@ -200,7 +200,7 @@ action_dispatch(event_t *ev, KeySym keysym)
|
|||
of the current action. This means that we'll only run through
|
||||
the modifier checks below if we absolutely have to. */
|
||||
if ((ev->xany.type == ButtonPress && action_check_button(action->button, ev->xbutton.button))
|
||||
|| (ev->xany.type == KeyPress && action_check_keysym(action->keysym, action->keysym))) {
|
||||
|| (ev->xany.type == KeyPress && action_check_keysym(action->keysym, keysym))) {
|
||||
if (action_check_modifiers(action->mod, ev->xkey.state)) {
|
||||
D_ACTIONS(("Match found.\n"));
|
||||
/* If we've passed all the above tests, it's a match. Dispatch the handler. */
|
||||
|
|
|
@ -226,20 +226,6 @@
|
|||
/* Make it an option */
|
||||
#define MAPALERT_OPTION
|
||||
|
||||
/********************* Config file parser options *********************/
|
||||
|
||||
/* Allow evaluation of expressions like `echo hello` in config files. The
|
||||
* security-paranoid will not want to define this, but I have replaced the
|
||||
* OS system() call with a secure one that I have tested and verified, so
|
||||
* child processes run in this way will not run with any privileges, active
|
||||
* or attainable.
|
||||
*/
|
||||
#define ALLOW_BACKQUOTE_EXEC
|
||||
|
||||
/* This causes Eterm to warn you if a config file it's about to parse was
|
||||
* designed for an older version of Eterm. */
|
||||
/* #define WARN_OLDER */
|
||||
|
||||
/********************* Anti-cl00bie protection (sigh) *********************/
|
||||
/* EDITING THIS FILE BELOW THIS LINE IS UNSUPPORTED! YOU HAVE BEEN WARNED! */
|
||||
|
||||
|
|
Loading…
Reference in New Issue