Matthias Van Parys
26093cbc88
fortify-headers: add __extension__ mark to strings.h
...
Add the __extension__ mark before #include_next in strings.h
to avoid a compiler error when -pedantic is enabled.
This has been done for all other headers in the past.
Signed-off-by: Matthias Van Parys <matthias.vanparys@softathome.com>
(cherry picked from commit 2425d6df12
)
2023-08-11 12:53:33 +02:00
Georgi Valkov
9145c4fbcb
fortify-headers: fix build error when _REDIR_TIME64 is not defined
...
some targets do not define the _REDIR_TIME64 macro resulting in a
build error regression since ddfe5678a4
fix by checking if the macro is defined
[1] https://github.com/openwrt/openwrt/issues/12587
Fixes : #12587
Fixes: ddfe5678a4
("fortify-headers: fix inconsistent time_t version of ppoll")
Signed-off-by: Georgi Valkov <gvalkov@gmail.com>
2023-05-13 14:09:53 +02:00
Georgi Valkov
ddfe5678a4
fortify-headers: fix inconsistent time_t version of ppoll
...
Bug:
fortify/poll.h includes poll.h, which redirects ppoll to __ppoll_time64
if the _REDIR_TIME64 macro is 1. Then fortify/poll.h will #undef ppoll
and use the 32 bit version.
Fix: we should not do this when _REDIR_TIME64 is 1.
[1] https://forum.openwrt.org/t/idle-cpu-usage-of-usbmuxd/140331/15
[2] https://github.com/openwrt/openwrt/issues/12574
Signed-off-by: Georgi Valkov <gvalkov@gmail.com>
2023-05-12 12:16:11 +02:00
Daniel Cousens
3bd04767ba
build: prefer HTTPS if available (for packages)
...
Changes PKG_SOURCE_URL's for arptables, bsdiff, dnsmasq,
fortify-headers, ipset, ipset-dns, libaudit, libpcap, libressl,
lua, lua5.3, tcpdump and valgrind, to HTTPS
Signed-off-by: Daniel Cousens <github@dcousens.com>
2022-10-05 17:37:07 +02:00
Kevin Darbyshire-Bryant
cbe08e6b56
toolchain/fortify-headers: Update to 1.1
...
Update fortify-headers to 1.1
Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
2019-07-28 09:43:49 +01:00
Daniel Engberg
969d052e96
toolchain/fortify-headers: Update to 1.0
...
Update fortify-headers to 1.0
Signed-off-by: Daniel Engberg <daniel.engberg.lists@pyret.net>
2018-10-07 02:10:15 +02:00
Daniel Engberg
e95f22da36
toolchain/fortify-headers: Update to 0.9
...
Update fortify-headers to 0.9
Signed-off-by: Daniel Engberg <daniel.engberg.lists@pyret.net>
2017-09-30 22:44:18 +02:00
Felix Fietkau
720b99215d
treewide: clean up download hashes
...
Replace *MD5SUM with *HASH, replace MD5 hashes with SHA256
Signed-off-by: Felix Fietkau <nbd@nbd.name>
2016-12-16 22:39:22 +01:00
Kevin Darbyshire-Bryant
1bc68e1379
fortify-headers: update to 0.8
...
Signed-off-by: Kevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk>
2016-09-27 17:50:22 +02:00
Steven Barth
bee26ca0de
fortify-headers: update to 0.7
...
Signed-off-by: Steven Barth <steven@midlink.org>
SVN-Revision: 46480
2015-07-24 13:51:45 +00:00
Steven Barth
9bdae8fc1e
fortify-headers: fix compatibility with -pedantic
...
Signed-off-by: Steven Barth <steven@midlink.org>
SVN-Revision: 46122
2015-06-24 18:52:13 +00:00
Steven Barth
2738526a16
toolchain: add fortify-headers, enable FORTIFY_SOURCE by default
...
Signed-off-by: Steven Barth <steven@midlink.org>
SVN-Revision: 46117
2015-06-23 14:38:03 +00:00