libmicrohttpd

HTTP/1.x server C library (MHD 1.x, stable)
Log | Files | Refs | Submodules | README | LICENSE

commit c7cbc6cfc0b37bff65879c8b93b120de39dd40b3
parent 7acc854b2bf4c29582bb1b0afaf108ceef4cad9e
Author: Evgeny Grin (Karlson2k) <k2k@narod.ru>
Date:   Sun, 24 Jan 2021 18:06:18 +0300

configure: use proper quoting

Diffstat:
Mconfigure.ac | 12++++++------
1 file changed, 6 insertions(+), 6 deletions(-)

diff --git a/configure.ac b/configure.ac @@ -97,8 +97,8 @@ AM_CONDITIONAL([HAVE_PO], [ test "$have_po" = yes ]) # Adam shostack suggests the following for Windows: # -D_FORTIFY_SOURCE=2 -fstack-protector-all -AC_ARG_ENABLE(gcc-hardening, - AS_HELP_STRING(--enable-gcc-hardening, enable compiler security checks), +AC_ARG_ENABLE([gcc-hardening], + [AS_HELP_STRING([--enable-gcc-hardening], [enable compiler security checks])], [AS_IF([test x$enableval = xyes],[ CFLAGS="$CFLAGS -U_FORTIFY_SOURCE -D_FORTIFY_SOURCE=2 -fstack-protector-all" CFLAGS="$CFLAGS -fwrapv -fPIE -Wstack-protector" @@ -108,14 +108,14 @@ AC_ARG_ENABLE(gcc-hardening, # Linker hardening options # Currently these options are ELF specific - you can't use this with MacOSX -AC_ARG_ENABLE(linker-hardening, - AS_HELP_STRING(--enable-linker-hardening, enable linker security fixups), +AC_ARG_ENABLE([linker-hardening], + [AS_HELP_STRING([--enable-linker-hardening], [enable linker security fixups])], [AS_IF([test x$enableval = xyes], [LDFLAGS="$LDFLAGS -z relro -z now"])]) -AC_ARG_ENABLE(sanitizer, - AS_HELP_STRING(--enable-sanitizer, enable Address Sanitizer and Undefined Behavior Sanitizer), +AC_ARG_ENABLE([sanitizer], + [AS_HELP_STRING([--enable-sanitizer], [enable Address Sanitizer and Undefined Behavior Sanitizer])], [AS_IF([test x$enableval = xyes],[ LDFLAGS="$CFLAGS -fsanitize=address,undefined -fno-omit-frame-pointer" ])])