patch-Makefile_inc 1.6 KB

1234567891011121314151617181920
  1. --- Openswan-3.0.0.orig/Makefile.inc 2021-01-22 19:25:50.000000000 +0100
  2. +++ Openswan-3.0.0/Makefile.inc 2022-03-21 19:40:09.287360911 +0100
  3. @@ -188,7 +188,7 @@ BISONOSFLAGS=
  4. # USER* should be empty for end users/vendors to use
  5. OPTIMIZE?=-g -O3
  6. -GCCOPTIONS=${OPTIMIZE} -fPIE -fstack-protector --param=ssp-buffer-size=4 -Wformat -Wformat-security -Werror=format-security -U_FORTIFY_SOURCE -D_FORTIFY_SOURCE=2 ${WERROR} $(GCC_LINT) ${USERCOMPILEEXTRA}
  7. +GCCOPTIONS=${OPTIMIZE} -fPIE -Wformat -Wformat-security -Werror=format-security -U_FORTIFY_SOURCE -D_FORTIFY_SOURCE=2 ${WERROR} $(GCC_LINT) ${USERCOMPILEEXTRA}
  8. # extra compile flags, for userland and kernel stuff, e.g. -g for debug info
  9. # you can add to this in the defaults file using +=
  10. # -DGCC_LINT uses gcc-specific declarations to improve compile-time diagnostics.
  11. @@ -199,7 +199,7 @@ GCC_LINT ?= -DGCC_LINT
  12. USERCOMPILE?=${GCCOPTIONS}
  13. # on fedora/rhel
  14. #USERCOMPILE?=-g -O2 -g -pipe -Wall -Wp,-U_FORTIFY_SOURCE -D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic -fPIE -pie -DSUPPORT_BROKEN_ANDROID_ICS
  15. -KLIPSCOMPILE=-O2 -fPIE -fstack-protector --param=ssp-buffer-size=4 -Wformat -Wformat-security -Werror=format-security -U_FORTIFY_SOURCE -D_FORTIFY_SOURCE=2 -DCONFIG_KLIPS_ALG -DDISABLE_UDP_CHECKSUM
  16. +KLIPSCOMPILE=-O2 -fPIE -Wformat -Wformat-security -Werror=format-security -U_FORTIFY_SOURCE -D_FORTIFY_SOURCE=2 -DCONFIG_KLIPS_ALG -DDISABLE_UDP_CHECKSUM
  17. # Additional debugging for developers (warning: can crash openswan!)
  18. #USERCOMPILE?=-g -DLEAK_DETECTIVE ${LIBEFENCE}
  19. # You can also run this before starting openswan on glibc systems: