summaryrefslogtreecommitdiffstats
path: root/toolchain/fortify-headers
Commit message (Collapse)AuthorAgeFilesLines
* fortify-headers: add __extension__ mark to strings.hMatthias Van Parys2023-07-121-0/+29
| | | | | | | | Add the __extension__ mark before #include_next in strings.h to avoid a compiler error when -pedantic is enabled. This has been done for all other headers in the past. Signed-off-by: Matthias Van Parys <matthias.vanparys@softathome.com>
* fortify-headers: fix build error when _REDIR_TIME64 is not definedGeorgi Valkov2023-05-132-2/+2
| | | | | | | | | | | | some targets do not define the _REDIR_TIME64 macro resulting in a build error regression since ddfe5678a448ac8875e94f2fb4ddca67416fa14a fix by checking if the macro is defined [1] https://github.com/openwrt/openwrt/issues/12587 Fixes: #12587 Fixes: ddfe5678a448 ("fortify-headers: fix inconsistent time_t version of ppoll") Signed-off-by: Georgi Valkov <gvalkov@gmail.com>
* fortify-headers: fix inconsistent time_t version of ppollGeorgi Valkov2023-05-122-1/+12
| | | | | | | | | | | | | | Bug: fortify/poll.h includes poll.h, which redirects ppoll to __ppoll_time64 if the _REDIR_TIME64 macro is 1. Then fortify/poll.h will #undef ppoll and use the 32 bit version. Fix: we should not do this when _REDIR_TIME64 is 1. [1] https://forum.openwrt.org/t/idle-cpu-usage-of-usbmuxd/140331/15 [2] https://github.com/openwrt/openwrt/issues/12574 Signed-off-by: Georgi Valkov <gvalkov@gmail.com>
* build: prefer HTTPS if available (for packages)Daniel Cousens2022-10-051-1/+1
| | | | | | | | Changes PKG_SOURCE_URL's for arptables, bsdiff, dnsmasq, fortify-headers, ipset, ipset-dns, libaudit, libpcap, libressl, lua, lua5.3, tcpdump and valgrind, to HTTPS Signed-off-by: Daniel Cousens <github@dcousens.com>
* toolchain/fortify-headers: Update to 1.1Kevin Darbyshire-Bryant2019-07-281-2/+2
| | | | | | Update fortify-headers to 1.1 Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
* toolchain/fortify-headers: Update to 1.0Daniel Engberg2018-10-071-2/+2
| | | | | | Update fortify-headers to 1.0 Signed-off-by: Daniel Engberg <daniel.engberg.lists@pyret.net>
* toolchain/fortify-headers: Update to 0.9Daniel Engberg2017-09-301-2/+2
| | | | | | Update fortify-headers to 0.9 Signed-off-by: Daniel Engberg <daniel.engberg.lists@pyret.net>
* treewide: clean up download hashesFelix Fietkau2016-12-161-1/+1
| | | | | | Replace *MD5SUM with *HASH, replace MD5 hashes with SHA256 Signed-off-by: Felix Fietkau <nbd@nbd.name>
* fortify-headers: update to 0.8Kevin Darbyshire-Bryant2016-09-271-2/+2
| | | | Signed-off-by: Kevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk>
* fortify-headers: update to 0.7Steven Barth2015-07-243-150/+2
| | | | | | Signed-off-by: Steven Barth <steven@midlink.org> SVN-Revision: 46480
* fortify-headers: fix compatibility with -pedanticSteven Barth2015-06-241-0/+122
| | | | | | Signed-off-by: Steven Barth <steven@midlink.org> SVN-Revision: 46122
* toolchain: add fortify-headers, enable FORTIFY_SOURCE by defaultSteven Barth2015-06-232-0/+54
Signed-off-by: Steven Barth <steven@midlink.org> SVN-Revision: 46117