History log of /netbsd-src/usr.sbin/syslogd/Makefile (Results 1 – 25 of 33)
Revision Date Author Comments
# c4b7a9e7 03-Jun-2023 lukem <lukem@NetBSD.org>

bsd.own.mk: rename GCC_NO_* to CC_WNO_*

Rename compiler-warning-disable variables from
GCC_NO_warning
to
CC_WNO_warning
where warning is the full warning name as used by the compiler.

GCC_NO_IMPL

bsd.own.mk: rename GCC_NO_* to CC_WNO_*

Rename compiler-warning-disable variables from
GCC_NO_warning
to
CC_WNO_warning
where warning is the full warning name as used by the compiler.

GCC_NO_IMPLICIT_FALLTHRU is CC_WNO_IMPLICIT_FALLTHROUGH

Using the convention CC_compilerflag, where compilerflag
is based on the full compiler flag name.

show more ...


# 8499346d 09-May-2023 christos <christos@NetBSD.org>

Handle OpenSSL-3.x


# d54a6e0c 07-Mar-2021 christos <christos@NetBSD.org>

Add blocklist support to libwrap which enables all programs using libwrap
to block access from hosts we deny. (libwrap support from Greg A. Woods)


# de11d876 13-Oct-2019 mrg <mrg@NetBSD.org>

introduce some common variables for use in GCC warning disables:

GCC_NO_FORMAT_TRUNCATION -Wno-format-truncation (GCC 7/8)
GCC_NO_STRINGOP_TRUNCATION -Wno-stringop-truncation (GCC 8)
GCC_NO_STRI

introduce some common variables for use in GCC warning disables:

GCC_NO_FORMAT_TRUNCATION -Wno-format-truncation (GCC 7/8)
GCC_NO_STRINGOP_TRUNCATION -Wno-stringop-truncation (GCC 8)
GCC_NO_STRINGOP_OVERFLOW -Wno-stringop-overflow (GCC 8)
GCC_NO_CAST_FUNCTION_TYPE -Wno-cast-function-type (GCC 8)

use these to turn off warnings for most GCC-8 complaints. many
of these are false positives, most of the real bugs are already
commited, or are yet to come.


we plan to introduce versions of (some?) of these that use the
"-Wno-error=" form, which still displays the warnings but does
not make it an error, and all of the above will be re-considered
as either being "fix me" (warning still displayed) or "warning
is wrong."

show more ...


# 21303c93 29-Sep-2019 mrg <mrg@NetBSD.org>

convert HAVE_GCC == 7 to HAVE_GCC >= 7.


# 5e5bf48e 04-Feb-2019 mrg <mrg@NetBSD.org>

use -Wno-error=format-truncation for code that seems particularly annoying
or unlikely to actually fail. some of the syslogd ones are not too hard
to fix, but most remain.


# a00715fd 09-Feb-2018 christos <christos@NetBSD.org>

only set api compat for 1.0


# 57ef9611 08-Feb-2018 jakllsch <jakllsch@NetBSD.org>

define OPENSSL_API_COMPAT

(doesn't entirely unbreak build yet)


# ef315f79 21-May-2017 riastradh <riastradh@NetBSD.org>

Remove MKCRYPTO option.

Originally, MKCRYPTO was introduced because the United States
classified cryptography as a munition and restricted its export. The
export controls were substantially relaxed

Remove MKCRYPTO option.

Originally, MKCRYPTO was introduced because the United States
classified cryptography as a munition and restricted its export. The
export controls were substantially relaxed fifteen years ago, and are
essentially irrelevant for software with published source code.

In the intervening time, nobody bothered to remove the option after
its motivation -- the US export restriction -- was eliminated. I'm
not aware of any other operating system that has a similar option; I
expect it is mainly out of apathy for churn that we still have it.
Today, cryptography is an essential part of modern computing -- you
can't use the internet responsibly without cryptography.

The position of the TNF board of directors is that TNF makes no
representation that MKCRYPTO=no satisfies any country's cryptography
regulations.

My personal position is that the availability of cryptography is a
basic human right; that any local laws restricting it to a privileged
few are fundamentally immoral; and that it is wrong for developers to
spend effort crippling cryptography to work around such laws.

As proposed on tech-crypto, tech-security, and tech-userlevel to no
objections:

https://mail-index.netbsd.org/tech-crypto/2017/05/06/msg000719.html
https://mail-index.netbsd.org/tech-security/2017/05/06/msg000928.html
https://mail-index.netbsd.org/tech-userlevel/2017/05/06/msg010547.html

P.S. Reviewing all the uses of MKCRYPTO in src revealed a lot of
*bad* crypto that was conditional on it, e.g. DES in telnet... That
should probably be removed too, but on the grounds that it is bad,
not on the grounds that it is (nominally) crypto.

show more ...


# 92dd0698 06-Jun-2012 christos <christos@NetBSD.org>

WARNS=4


# 634f514e 09-Jun-2010 riz <riz@NetBSD.org>

Allow syslogd to compile when MKCRYPTO=no. No promises as to whether
it works or not, as this has been broken since late 2008, when the
"encrypted connections" support was added to syslogd.


# d877c4c3 22-Apr-2009 lukem <lukem@NetBSD.org>

Enable WARNS=4 by default, except for:
cpuctl dumplfs hprop ipf iprop-log kadmin kcm kdc kdigest
kimpersonate kstash ktutil makefs ndbootd ntp pppd quot
racoon racoonctl rtadvd s

Enable WARNS=4 by default, except for:
cpuctl dumplfs hprop ipf iprop-log kadmin kcm kdc kdigest
kimpersonate kstash ktutil makefs ndbootd ntp pppd quot
racoon racoonctl rtadvd sntp sup tcpdchk tcpdmatch tcpdump
traceroute traceroute6 user veriexecgen wsmoused zic
(Mostly third-party applications)

show more ...


# 1c6aec20 31-Oct-2008 christos <christos@NetBSD.org>

Import syslogd SoC project by Martin Schuette:
- new syslog protocol api syslogp(3) that supports structured data
and draft-rfc timestamps
- reliable tcp connections with queueing
- encrypted c

Import syslogd SoC project by Martin Schuette:
- new syslog protocol api syslogp(3) that supports structured data
and draft-rfc timestamps
- reliable tcp connections with queueing
- encrypted connections

show more ...


# 4147a3c5 28-May-2007 tls <tls@NetBSD.org>

Add new Makefile knob, USE_FORT, which extends USE_SSP by turning on the
FORTIFY_SOURCE feature of libssp, thus checking the size of arguments to
various string and memory copy and set functions (as

Add new Makefile knob, USE_FORT, which extends USE_SSP by turning on the
FORTIFY_SOURCE feature of libssp, thus checking the size of arguments to
various string and memory copy and set functions (as well as a few system
calls and other miscellany) where known at function entry. RedHat has
evidently built all "core system packages" with this option for some time.

This option should be used at the top of Makefiles (or Makefile.inc where
this is used for subdirectories) but after any setting of LIB.

This is only useful for userland code, and cannot be used in libc or in
any code which includes the libc internals, because it overrides certain
libc functions with macros. Some effort has been made to make USE_FORT=yes
work correctly for a full-system build by having the bsd.sys.mk logic
disable the feature where it should not be used (libc, libssp iteself,
the kernel) but no attempt has been made to build the entire system with
USE_FORT and doing so will doubtless expose numerous bugs and misfeatures.

Adjust the system build so that all programs and libraries that are setuid,
directly handle network data (including serial comm data), perform
authentication, or appear likely to have (or have a history of having)
data-driven bugs (e.g. file(1)) are built with USE_FORT=yes by default,
with the exception of libc, which cannot use USE_FORT and thus uses
only USE_SSP by default. Tested on i386 with no ill results; USE_FORT=no
per-directory or in a system build will disable if desired.

show more ...


# 71570115 10-Jan-2005 lukem <lukem@NetBSD.org>

Only compile in IPv6 support if ${USE_INET6} != "no"

MKINET6 is for providing IPv6 infrastructure.
USE_INET6 is for compiling IPv6 support into the programs (needs MKINET6).


# 17d72c8a 18-Sep-2002 lukem <lukem@NetBSD.org>

use NETBSDSRCDIR as appropriate


# d116a0bb 02-Aug-2002 christos <christos@NetBSD.org>

add utmpx support;


# 6ed86728 09-Jun-2002 itojun <itojun@NetBSD.org>

no need for KAME_SCOPEID any longer


# 338aa1c6 01-Jul-2001 itojun <itojun@NetBSD.org>

-DLIBWRAP will enable libwrap-based filtering on UDP socket messages.
PR 13348


# 9d1c5f0b 02-Dec-1999 itojun <itojun@NetBSD.org>

IPv6 support in syslogd. actually we need library update as well.
NetBSD PR #8934 from Feico Dillema <dillema@acm.org> (with memory leak fix).


# 98c39393 19-Mar-1999 perry <perry@NetBSD.org>

symlink /var/run/log to /dev/log for transition period.


# 8a174389 10-Feb-1998 mrg <mrg@NetBSD.org>

nit: order rcsid/sccsids


# f5bf267d 18-Oct-1997 lukem <lukem@NetBSD.org>

enable WARNS=1 by default, but disable in unclean 3rd party code


# a838817b 01-Jul-1997 christos <christos@NetBSD.org>

Add WARNS=1


# 3c795cb2 29-Jun-1997 christos <christos@NetBSD.org>

- Fix warnings
- Use ttymsg from libutil.


12