summaryrefslogtreecommitdiff
path: root/extra/Configs/Config.in
diff options
context:
space:
mode:
authorWaldemar Brodkorb <wbx@uclibc-ng.org>2016-06-07 04:14:23 +0200
committerWaldemar Brodkorb <wbx@uclibc-ng.org>2016-06-07 04:14:23 +0200
commit4fee9155f396cb2bcfe707f78aa4332837520f93 (patch)
tree5df718b52bfcdf91a0de8c880dc9e9d47bdb3432 /extra/Configs/Config.in
parent2e045f9867bfc62e64412bc039400d411da1d2d2 (diff)
ssp: remove SSP legacy code
Nobody should use gcc 3.3 nowadays.
Diffstat (limited to 'extra/Configs/Config.in')
-rw-r--r--extra/Configs/Config.in16
1 files changed, 0 insertions, 16 deletions
diff --git a/extra/Configs/Config.in b/extra/Configs/Config.in
index f3494db99..a21bdac2f 100644
--- a/extra/Configs/Config.in
+++ b/extra/Configs/Config.in
@@ -2151,22 +2151,6 @@ config UCLIBC_HAS_SSP
Most people will answer N.
-config UCLIBC_HAS_SSP_COMPAT
- bool "Support for gcc-3.x propolice smashing stack protector"
- depends on UCLIBC_HAS_SSP
- help
- Add gcc-3.x propolice smashing stack protector to the library.
-
- This requires a patched version of GCC, supporting the
- -fstack-protector[-all] options, with the __guard and
- __stack_smash_handler functions removed from libgcc.
- These functions are added to ldso/libc instead.
-
- More information at:
- <http://www.research.ibm.com/trl/projects/security/ssp/>
-
- Most people will answer N.
-
config SSP_QUICK_CANARY
bool "Use simple guard values without accessing /dev/urandom"
depends on UCLIBC_HAS_SSP