Enno Rehling
|
01078460bb
|
Merge pull request #343 from ennorehling/feature/bug-2143-monsters-attack-buildings
bug 2143: monsters attack buildings
|
2015-11-02 16:40:32 +01:00 |
|
Enno Rehling
|
0b00bfecdf
|
Merge pull request #342 from TurnerSE/bug/CID22449
Bug/cid22449
|
2015-11-02 15:55:44 +01:00 |
|
Enno Rehling
|
f70b385bef
|
clean up plan_monsters and make it a bit more readable
|
2015-11-02 15:27:01 +01:00 |
|
Enno Rehling
|
072bfd3912
|
testin building_is_active
testing multiple units in one building
|
2015-11-02 15:06:30 +01:00 |
|
Enno Rehling
|
4bf2509fb3
|
test inside_building vs. overflow
fix default building capacity (should be 1 per size)
|
2015-11-02 14:56:58 +01:00 |
|
Enno Rehling
|
42ae086def
|
unit is inisde a building also when it was not paid for
|
2015-11-02 14:49:48 +01:00 |
|
Enno Rehling
|
24ff4c301d
|
refactor: separate building_is_active from inside_building
|
2015-11-02 14:18:50 +01:00 |
|
Philipp Dreher
|
2fe95f3d61
|
integration of the separate if-conditions and simplification of the loop
|
2015-11-02 13:12:19 +01:00 |
|
Philipp Dreher
|
bf779fc810
|
removed obsolete code
|
2015-11-02 13:06:14 +01:00 |
|
Enno Rehling
|
0b098dede6
|
remove invalid tests. uninitialized locales do not have default words
|
2015-11-01 05:35:10 +01:00 |
|
Enno Rehling
|
fbf483fb4e
|
CID 22518: Parse warning (PW.PARAM_SET_BUT_NOT_USED)
|
2015-10-30 15:21:06 +01:00 |
|
Enno Rehling
|
21a2313e2a
|
CID 22517: Parse warning (PW.PARAM_SET_BUT_NOT_USED)
|
2015-10-30 15:20:06 +01:00 |
|
Enno Rehling
|
a91a0f6a53
|
CID 22514: Out-of-bounds read (OVERRUN)
|
2015-10-30 15:17:39 +01:00 |
|
Enno Rehling
|
0da10ea490
|
CID 22513: Out-of-bounds read (OVERRUN)
|
2015-10-30 14:41:52 +01:00 |
|
Enno Rehling
|
674bc2b4c7
|
nope, the ticket is actually required.
|
2015-10-30 12:58:27 +01:00 |
|
Enno Rehling
|
e7ca5345d7
|
CID 22509: Dereference null return value (NULL_RETURNS)
potential problems at the edge of the map.
|
2015-10-30 12:57:07 +01:00 |
|
Enno Rehling
|
8f7f182c91
|
CID 22507: Dereference null return value (NULL_RETURNS)
checking fopen results
|
2015-10-30 12:55:30 +01:00 |
|
Enno Rehling
|
d6bc1c3119
|
CID 22506: Dereference null return value (NULL_RETURNS)
always check fopen success
|
2015-10-30 12:54:07 +01:00 |
|
Enno Rehling
|
204b4d6b93
|
CID 22505: Dereference null return value (NULL_RETURNS)
potential bugs at the edge of the map
|
2015-10-30 12:52:18 +01:00 |
|
Enno Rehling
|
1df0afc58a
|
CID 22550: Dereference before null check (REVERSE_INULL)
|
2015-10-30 12:50:32 +01:00 |
|
Enno Rehling
|
1d204b12f1
|
CID 22549: Dereference before null check (REVERSE_INULL)
|
2015-10-30 12:49:37 +01:00 |
|
Enno Rehling
|
e1eb5098d4
|
CID 22554: Improper use of negative value (REVERSE_NEGATIVE)
I believe this was a false positive, but more asserts can never hurt.
|
2015-10-30 12:40:48 +01:00 |
|
Enno Rehling
|
93b7bacff5
|
CID 22552: Dereference before null check (REVERSE_INULL)
|
2015-10-30 12:37:27 +01:00 |
|
Enno Rehling
|
54304af182
|
allocate space for null terminator
|
2015-10-30 12:08:09 +01:00 |
|
Enno Rehling
|
7fa12ae3af
|
CID 22556: String not null terminated (STRING_NULL)
add missing null-termination
|
2015-10-30 11:59:05 +01:00 |
|
Enno Rehling
|
68f8f0830e
|
CID 22561: Copy into fixed size buffer (STRING_OVERFLOW)
|
2015-10-30 11:45:20 +01:00 |
|
Enno Rehling
|
be0563c1f0
|
CID 22560: Copy into fixed size buffer (STRING_OVERFLOW)
|
2015-10-30 11:43:45 +01:00 |
|
Enno Rehling
|
5d273e475e
|
CID 22558: Copy into fixed size buffer (STRING_OVERFLOW)
bsdstring buffer size check
|
2015-10-30 11:41:59 +01:00 |
|
Enno Rehling
|
1fb04179dc
|
CID 22557: Copy into fixed size buffer (STRING_OVERFLOW)
eliminate code duplication. bsdstring is better than libc strings.
|
2015-10-30 11:39:47 +01:00 |
|
Enno Rehling
|
ca7d25858e
|
CID 22563: Copy into fixed size buffer (STRING_OVERFLOW)
bsdstring to the rescue, once again
|
2015-10-30 11:16:09 +01:00 |
|
Enno Rehling
|
0de6e5ecb8
|
CID 22564: Copy into fixed size buffer (STRING_OVERFLOW)
buffer sizes => bsdstring.h
|
2015-10-30 11:13:48 +01:00 |
|
Enno Rehling
|
df82a9795d
|
CID 22565: Copy into fixed size buffer (STRING_OVERFLOW)
bsdstring to the rescue
|
2015-10-30 11:11:54 +01:00 |
|
Enno Rehling
|
b8d7fa5bcc
|
CID 22567: Copy into fixed size buffer (STRING_OVERFLOW)
bsdstring replacements, again
|
2015-10-30 11:09:28 +01:00 |
|
Enno Rehling
|
51f66b8da8
|
CID 22568: Copy into fixed size buffer (STRING_OVERFLOW)
more bsdstring replacements
|
2015-10-30 11:06:24 +01:00 |
|
Enno Rehling
|
e69635d697
|
CID 22569: Copy into fixed size buffer (STRING_OVERFLOW)
bsdstring functions are the best.
|
2015-10-30 11:02:51 +01:00 |
|
Enno Rehling
|
4ee0f76927
|
CID 22570: Copy into fixed size buffer (STRING_OVERFLOW)
not only that, but strlcpy is the faster option here, too.
|
2015-10-30 10:57:52 +01:00 |
|
Enno Rehling
|
2f82cccea1
|
CID 22571: Copy into fixed size buffer (STRING_OVERFLOW)
replace strcat with strlcat
|
2015-10-30 10:55:06 +01:00 |
|
Enno Rehling
|
05ef6deb26
|
CID 22572: Copy into fixed size buffer (STRING_OVERFLOW)
|
2015-10-29 20:47:07 +01:00 |
|
Enno Rehling
|
4e431b41e2
|
CID 22575 (#2-1 of 2): Copy into fixed size buffer (STRING_OVERFLOW)
|
2015-10-29 20:45:36 +01:00 |
|
Enno Rehling
|
d3f7bd7b10
|
CID 22597: va_start/va_end mismatch
|
2015-10-29 20:43:37 +01:00 |
|
Enno Rehling
|
4eb6a89821
|
CID 26262: short and unsigned types are the devil, use int everywhere for fewer headaches
|
2015-10-29 20:39:44 +01:00 |
|
Enno Rehling
|
b3edd8dc5a
|
anerror in this bugfix was found by a lua test. sweet!
|
2015-10-29 18:55:47 +01:00 |
|
Enno Rehling
|
3bf5ba14bb
|
CID 26252: Memory - illegal accesses (BUFFER_SIZE_WARNING)
Calling strncpy with a maximum size argument of 5 bytes on destination array "code" of size 5 bytes might leave the destination string unterminated.
|
2015-10-29 16:51:39 +01:00 |
|
Enno Rehling
|
1a252bc994
|
CID 26253: Control flow issues (DEADCODE)
transformations gone wrong in previous commit
|
2015-10-29 16:50:55 +01:00 |
|
Enno Rehling
|
6113bc2144
|
CID 26254: Incorrect expression (DIVIDE_BY_ZERO)
magic should never be zero, but coverity doesn't know that.
|
2015-10-29 16:46:43 +01:00 |
|
Enno Rehling
|
7a01b58e8d
|
CID 26255: Null pointer dereferences (FORWARD_NULL)
|
2015-10-29 16:43:09 +01:00 |
|
Enno Rehling
|
0a67d53264
|
CID 26256: (NULL_RETURNS)
|
2015-10-29 16:41:53 +01:00 |
|
Enno Rehling
|
833a1e70be
|
CID 26257: Null pointer dereferences (NULL_RETURNS)
this test should never fire, but it shuts up coverity
|
2015-10-29 16:40:18 +01:00 |
|
Enno Rehling
|
9d9994811a
|
CID 26258: (NULL_RETURNS)
deal with bad connection data, static analysis doen't knwo that we never have that.
|
2015-10-29 16:38:29 +01:00 |
|
Enno Rehling
|
b7dce8071c
|
CID 26259: Memory - corruptions
I apparently don't know how strncat works.
|
2015-10-29 16:36:20 +01:00 |
|