openbsd-ports/security/metasploit/patches/patch-lib_rbreadline_rb

22 lines
1017 B
Plaintext
Raw Normal View History

$OpenBSD: patch-lib_rbreadline_rb,v 1.1.1.1 2010/12/23 12:39:17 stephan Exp $
--- lib/rbreadline.rb.orig Wed Oct 20 15:19:56 2010
+++ lib/rbreadline.rb Fri Nov 19 14:37:36 2010
@@ -1818,7 +1818,7 @@ module RbReadline
def get_term_capabilities(buffer)
hash = {}
- `infocmp -C`.split(':').select{|x| x =~ /(.*)=(.*)/ and hash[$1]=$2.gsub('\\E',"\e").gsub(/\^(.)/){($1[0].ord ^ ((?a..?z).include?($1[0]) ? 0x60 : 0x40)).chr}}
+ `infocmp -x -C`.split(':').select{|x| x =~ /(.*)=(.*)/ and hash[$1]=$2.gsub('\\E',"\e").gsub(/\^(.)/){($1[0].ord ^ ((?a..?z).include?($1[0]) ? 0x60 : 0x40)).chr}}
@_rl_term_at7 = hash["@7"]
@_rl_term_DC = hash["DC"]
@_rl_term_IC = hash["IC"]
@@ -1902,7 +1902,7 @@ module RbReadline
end
def tgetflag(name)
- `infocmp -C -r`.scan(/\w{2}/).include?(name)
+ `infocmp -x -C -r`.scan(/\w{2}/).include?(name)
end
# Return the function (or macro) definition which would be invoked via