As patches are verified to be interesting, please create new issues
for them, and note that they have been checked and which issue here.
If a patch is determined to be NOT interesting, do the same (except
I don't see a need to produce a new issue).
Nemui Ailin writes:
there is binary package for xemacs on suse @
if you look, there are several patches that get applied to XEmacs. I
wonder if these have been brought to any one's attention, and if they
are rubbish, distribution specific, or maybe some that should go up
stream? I see from the file name some date back to version 21.4
List of patches:
This patch seems to be a mixed bag, adds some "safeopen" function to
mmencode.c, redefined pop to pop3 on linux in pop.c, adds exit 1 to
failing mktemp call in vcdiff, maybe contains some useful terminal key
bindings or maybe not?
and definitely looks like some useless bits and some distro customization
- this is most likely distro-specific, sets some default fonts for the
menu or so?
- uses XLookupString instead of XLookupKeysym in src/event-Xt.c, might
this be a real fix for some problem?
- adds a m/powerpc64.h file
- move some getpt() code in src/process-unix.c, possibly prefering openpty?
- adds codes for XK_Num_Lock and XK_ISO_Lock to event-Xt.c
- makes "fatal" function take 3 arguments in movemail.c
- adds some checks for ncursesw to configure.ac
- messes with chinese and japanese mule charset lists
- replace :bold with :bold t in cus-edit.el
- changes a loop in mule-wnnfns.c to do len-- first, might this be a
- move ic++ outside of macro in mule-ccl.el, maybe just a style nitpick?
I don't understand a lot or any of these patches so I would be
interested in the experienced XEmacs hackers' opinions. I have
summarized some of the patch contents where I can approximately tell
what it does. In some other cases, the patch file name gives a pretty
good idea of what it is doing. Yet in some cases I have no clue what
it is doing. I would especially like to know if any of the patches are
actually breaking XEmacs in some subtle way (remember the Debian
random number generator ;-)).