CVE-2023-3603 has never affected any release, but NVD decided to document it as affecting all versions up to 0.8.9. While this is incorrect, we don't really care much, as we're now using 0.11 which according to NVD is not affected, making our ignore CVE entry stale. Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com> Signed-off-by: Julien Olivain <ju.o@free.fr>
48 lines
1.3 KiB
Makefile
48 lines
1.3 KiB
Makefile
################################################################################
|
|
#
|
|
# libssh
|
|
#
|
|
################################################################################
|
|
|
|
LIBSSH_VERSION_MAJOR = 0.11
|
|
LIBSSH_VERSION = $(LIBSSH_VERSION_MAJOR).1
|
|
LIBSSH_SOURCE = libssh-$(LIBSSH_VERSION).tar.xz
|
|
LIBSSH_SITE = https://www.libssh.org/files/$(LIBSSH_VERSION_MAJOR)
|
|
LIBSSH_LICENSE = LGPL-2.1
|
|
LIBSSH_LICENSE_FILES = COPYING
|
|
LIBSSH_CPE_ID_VENDOR = libssh
|
|
LIBSSH_INSTALL_STAGING = YES
|
|
LIBSSH_SUPPORTS_IN_SOURCE_BUILD = NO
|
|
LIBSSH_CONF_OPTS = \
|
|
-DWITH_STACK_PROTECTOR=OFF \
|
|
-DWITH_EXAMPLES=OFF
|
|
|
|
ifeq ($(BR2_ARM_INSTRUCTIONS_THUMB),y)
|
|
LIBSSH_CONF_OPTS += -DWITH_STACK_CLASH_PROTECTION=OFF
|
|
endif
|
|
|
|
ifeq ($(BR2_PACKAGE_LIBSSH_SERVER),y)
|
|
LIBSSH_CONF_OPTS += -DWITH_SERVER=ON
|
|
else
|
|
LIBSSH_CONF_OPTS += -DWITH_SERVER=OFF
|
|
endif
|
|
|
|
ifeq ($(BR2_PACKAGE_ZLIB),y)
|
|
LIBSSH_CONF_OPTS += -DWITH_ZLIB=ON
|
|
LIBSSH_DEPENDENCIES += zlib
|
|
else
|
|
LIBSSH_CONF_OPTS += -DWITH_ZLIB=OFF
|
|
endif
|
|
|
|
ifeq ($(BR2_PACKAGE_LIBSSH_MBEDTLS),y)
|
|
LIBSSH_CONF_OPTS += -DWITH_MBEDTLS=ON
|
|
LIBSSH_DEPENDENCIES += mbedtls
|
|
else ifeq ($(BR2_PACKAGE_LIBSSH_LIBGCRYPT),y)
|
|
LIBSSH_CONF_OPTS += -DWITH_GCRYPT=ON
|
|
LIBSSH_DEPENDENCIES += libgcrypt
|
|
else ifeq ($(BR2_PACKAGE_LIBSSH_OPENSSL),y)
|
|
LIBSSH_DEPENDENCIES += openssl
|
|
endif
|
|
|
|
$(eval $(cmake-package))
|