History log of /netbsd-src/external/bsd/fetch/lib/Makefile (Results 1 – 18 of 18)
Revision Date Author Comments
# c4b7a9e7 03-Jun-2023 lukem <lukem@NetBSD.org>

bsd.own.mk: rename GCC_NO_* to CC_WNO_*

Rename compiler-warning-disable variables from
GCC_NO_warning
to
CC_WNO_warning
where warning is the full warning name as used by the compiler.

GCC_NO_IMPL

bsd.own.mk: rename GCC_NO_* to CC_WNO_*

Rename compiler-warning-disable variables from
GCC_NO_warning
to
CC_WNO_warning
where warning is the full warning name as used by the compiler.

GCC_NO_IMPLICIT_FALLTHRU is CC_WNO_IMPLICIT_FALLTHROUGH

Using the convention CC_compilerflag, where compilerflag
is based on the full compiler flag name.

show more ...


# 58e6f341 01-Jun-2020 kamil <kamil@NetBSD.org>

Avoid redefining _REENTRANT under sanitizers

Switch away from -Wno-macro-redefined which was Clang/LLVM specific.


# cc056601 08-Feb-2020 kamil <kamil@NetBSD.org>

Expand the -Wno-macro-redefined usage to MKLIBCSANITIZER

_REENTRANT can be redefined and this is considered as an error.


# de11d876 13-Oct-2019 mrg <mrg@NetBSD.org>

introduce some common variables for use in GCC warning disables:

GCC_NO_FORMAT_TRUNCATION -Wno-format-truncation (GCC 7/8)
GCC_NO_STRINGOP_TRUNCATION -Wno-stringop-truncation (GCC 8)
GCC_NO_STRI

introduce some common variables for use in GCC warning disables:

GCC_NO_FORMAT_TRUNCATION -Wno-format-truncation (GCC 7/8)
GCC_NO_STRINGOP_TRUNCATION -Wno-stringop-truncation (GCC 8)
GCC_NO_STRINGOP_OVERFLOW -Wno-stringop-overflow (GCC 8)
GCC_NO_CAST_FUNCTION_TYPE -Wno-cast-function-type (GCC 8)

use these to turn off warnings for most GCC-8 complaints. many
of these are false positives, most of the real bugs are already
commited, or are yet to come.


we plan to introduce versions of (some?) of these that use the
"-Wno-error=" form, which still displays the warnings but does
not make it an error, and all of the above will be re-considered
as either being "fix me" (warning still displayed) or "warning
is wrong."

show more ...


# eb63746a 10-Oct-2019 kre <kre@NetBSD.org>

Only exclude ggc-8 warnings when the gcc we're using is gcc 8 or more.


# ec0d0d91 09-Oct-2019 christos <christos@NetBSD.org>

No error for stringop truncation.


# 1a5f018b 27-Aug-2019 kamil <kamil@NetBSD.org>

Enhance the support of LLVM sanitizers

Define _REENTRANT for MKSANITIZER build. This is needed for at least stdio
code. This caused new build issued with duplicated symbols in few places
and rump ke

Enhance the support of LLVM sanitizers

Define _REENTRANT for MKSANITIZER build. This is needed for at least stdio
code. This caused new build issued with duplicated symbols in few places
and rump kernel code picking different code paths borrowed from libc.
Handle all this in one go.

Add bsd.sanitizer.mk to share common code used by programs and libraries.

Switch from realall to beforeinstall target in .syms files. This is more
reliable in MKSANITIZER.

show more ...


# 0c048d5a 04-Feb-2018 christos <christos@NetBSD.org>

switch everyone to openssl.old


# ef315f79 21-May-2017 riastradh <riastradh@NetBSD.org>

Remove MKCRYPTO option.

Originally, MKCRYPTO was introduced because the United States
classified cryptography as a munition and restricted its export. The
export controls were substantially relaxed

Remove MKCRYPTO option.

Originally, MKCRYPTO was introduced because the United States
classified cryptography as a munition and restricted its export. The
export controls were substantially relaxed fifteen years ago, and are
essentially irrelevant for software with published source code.

In the intervening time, nobody bothered to remove the option after
its motivation -- the US export restriction -- was eliminated. I'm
not aware of any other operating system that has a similar option; I
expect it is mainly out of apathy for churn that we still have it.
Today, cryptography is an essential part of modern computing -- you
can't use the internet responsibly without cryptography.

The position of the TNF board of directors is that TNF makes no
representation that MKCRYPTO=no satisfies any country's cryptography
regulations.

My personal position is that the availability of cryptography is a
basic human right; that any local laws restricting it to a privileged
few are fundamentally immoral; and that it is wrong for developers to
spend effort crippling cryptography to work around such laws.

As proposed on tech-crypto, tech-security, and tech-userlevel to no
objections:

https://mail-index.netbsd.org/tech-crypto/2017/05/06/msg000719.html
https://mail-index.netbsd.org/tech-security/2017/05/06/msg000928.html
https://mail-index.netbsd.org/tech-userlevel/2017/05/06/msg010547.html

P.S. Reviewing all the uses of MKCRYPTO in src revealed a lot of
*bad* crypto that was conditional on it, e.g. DES in telnet... That
should probably be removed too, but on the grounds that it is bad,
not on the grounds that it is (nominally) crypto.

show more ...


# 8ec658f5 05-Jan-2016 christos <christos@NetBSD.org>

- Change LDADD/DPADD in library dependencies to LIBDPLIBS
- Fix some LDADD abuse and remove useless dependencies
- include <bsd.init.mk> in the right place where appropriate
From Rin Okuyama


# 5ae8764e 17-Aug-2011 christos <christos@NetBSD.org>

remove gcc hacks.


# d43405d3 09-Aug-2011 joerg <joerg@NetBSD.org>

-Wno-array-bounds is no longer needed for clang here


# 0a0dd75b 21-Jun-2011 mrg <mrg@NetBSD.org>

add some XXX'd -Wno-foo if HAVE_GCC >= 45.

XXX: someone should look at these.


# 8fd2cbd8 20-Oct-2009 joerg <joerg@NetBSD.org>

Fix RCS ID


# c5a57f55 20-Jul-2009 christos <christos@NetBSD.org>

Use the correct libcrypto.


# a2e586ee 28-May-2009 joerg <joerg@NetBSD.org>

Allow building with MKCRYPTO=no.


# faeb779f 25-Nov-2008 apb <apb@NetBSD.org>

Use ${HOST_SH}, not ${SH}. ${SH} is undefined, so acts like an
empty string. The build would sometimes work despite this error, if
errlist.sh happened to be executable and if the host's /bin/sh was

Use ${HOST_SH}, not ${SH}. ${SH} is undefined, so acts like an
empty string. The build would sometimes work despite this error, if
errlist.sh happened to be executable and if the host's /bin/sh was good
enough.

show more ...


# 27d0f2d3 30-Sep-2008 joerg <joerg@NetBSD.org>

Build glue for libfetch.