version 1.63, 2007/10/08 23:15:27
|
version 1.64, 2009/02/26 20:51:54
|
Line 25
|
Line 25
|
/* use errno_location instead of errno */ |
/* use errno_location instead of errno */ |
#define WANT_THREAD_SAFE |
#define WANT_THREAD_SAFE |
|
|
|
/* support __thread */ |
|
#define WANT_TLS |
|
|
/* make the startcode, etc. dynamic aware ({con,de}structors) */ |
/* make the startcode, etc. dynamic aware ({con,de}structors) */ |
/* #define WANT_DYNAMIC */ |
/* #define WANT_DYNAMIC */ |
|
|
Line 111
|
Line 114
|
/* Include support for ProPolice/SSP, calls guard_setup */ |
/* Include support for ProPolice/SSP, calls guard_setup */ |
/* ProPolice is part of gcc 4.1 and up, there were patches for earlier |
/* ProPolice is part of gcc 4.1 and up, there were patches for earlier |
* versions. To make use of this, compile your application with |
* versions. To make use of this, compile your application with |
* -fstack-protector. On i386, enabling this option with |
* -fstack-protector. */ |
* WANT_SSP_URANDOM and then not using -fstack-protector enlarges a |
|
* binary by 152 bytes. */ |
|
#if (__GNUC__>4) || ((__GNUC__==4) && (__GNUC_MINOR__>=1)) |
#if (__GNUC__>4) || ((__GNUC__==4) && (__GNUC_MINOR__>=1)) |
#define WANT_SSP |
#define WANT_SSP |
#endif |
#endif |
/* Choose which canary seeder you want you can choose |
|
* both but it will check urandom first and use xor as |
|
* a fallback. xor is lighter but weaker */ |
|
#define WANT_SSP_URANDOM |
|
/* The XOR seeder is completely predictable and should not be used |
|
* unless you don't have a /dev/urandom, and even then it's a bad idea. */ |
|
/* #define WANT_SSP_XOR */ |
|
|
|
|
|
|
|
|
|