twisterp2pblockchainnetworkbittorrentmicrobloggingipv6social-networkdhtdecentralizedtwisterarmyp2p-networktwister-servertwister-ipv6twister-core
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
135 lines
3.3 KiB
135 lines
3.3 KiB
# Copyright (c) 2009-2010 Satoshi Nakamoto |
|
# Distributed under the MIT/X11 software license, see the accompanying |
|
# file license.txt or http://www.opensource.org/licenses/mit-license.php. |
|
|
|
CXX=g++ |
|
|
|
USE_UPNP:=0 |
|
|
|
DEFS=-DNOPCH -DUSE_SSL |
|
|
|
# for boost 1.37, add -mt to the boost libraries |
|
LIBS= \ |
|
-Wl,-Bstatic \ |
|
-l boost_system \ |
|
-l boost_filesystem \ |
|
-l boost_program_options \ |
|
-l boost_thread \ |
|
-l db_cxx \ |
|
-l ssl \ |
|
-l crypto |
|
|
|
ifdef USE_UPNP |
|
LIBS += -l miniupnpc |
|
DEFS += -DUSE_UPNP=$(USE_UPNP) |
|
endif |
|
|
|
LIBS+= \ |
|
-Wl,-Bdynamic \ |
|
-l gthread-2.0 \ |
|
-l z \ |
|
-l dl \ |
|
-l pthread |
|
|
|
|
|
# Hardening |
|
# Make some classes of vulnerabilities unexploitable in case one is discovered. |
|
# |
|
# Stack Canaries |
|
# Put numbers at the beginning of each stack frame and check that they are the same. |
|
# If a stack buffer if overflowed, it writes over the canary number and then on return |
|
# when that number is checked, it won't be the same and the program will exit with |
|
# a "Stack smashing detected" error instead of being exploited. |
|
HARDENING=-fstack-protector-all -Wstack-protector |
|
|
|
# Make some important things such as the global offset table read only as soon as |
|
# the dynamic linker is finished building it. This will prevent overwriting of addresses |
|
# which would later be jumped to. |
|
HARDENING+=-Wl,-z,relro -Wl,-z,now |
|
|
|
# Build position independent code to take advantage of Address Space Layout Randomization |
|
# offered by some kernels. |
|
# see doc/build-unix.txt for more information. |
|
ifdef PIE |
|
HARDENING+=-fPIE -pie |
|
endif |
|
|
|
# -D_FORTIFY_SOURCE=2 does some checking for potentially exploitable code patterns in |
|
# the source such overflowing a statically defined buffer. |
|
HARDENING+=-D_FORTIFY_SOURCE=2 |
|
# |
|
|
|
|
|
DEBUGFLAGS=-g |
|
CXXFLAGS=-O2 -Wno-invalid-offsetof -Wformat $(DEBUGFLAGS) $(DEFS) $(HARDENING) |
|
HEADERS = \ |
|
base58.h \ |
|
bignum.h \ |
|
crypter.h \ |
|
db.h \ |
|
headers.h \ |
|
init.h \ |
|
irc.h \ |
|
key.h \ |
|
keystore.h \ |
|
main.h \ |
|
net.h \ |
|
noui.h \ |
|
protocol.h \ |
|
bitcoinrpc.h \ |
|
script.h \ |
|
serialize.h \ |
|
strlcpy.h \ |
|
uint256.h \ |
|
util.h \ |
|
wallet.h |
|
|
|
OBJS= \ |
|
obj/crypter.o \ |
|
obj/db.o \ |
|
obj/init.o \ |
|
obj/irc.o \ |
|
obj/keystore.o \ |
|
obj/main.o \ |
|
obj/net.o \ |
|
obj/protocol.o \ |
|
obj/bitcoinrpc.o \ |
|
obj/script.o \ |
|
obj/util.o \ |
|
obj/wallet.o |
|
|
|
|
|
all: bitcoind |
|
|
|
# auto-generated dependencies: |
|
-include obj/nogui/*.P |
|
-include obj/test/*.P |
|
|
|
obj/nogui/%.o: %.cpp |
|
$(CXX) -c $(CXXFLAGS) -MMD -o $@ $< |
|
@cp $(@:%.o=%.d) $(@:%.o=%.P); \ |
|
sed -e 's/#.*//' -e 's/^[^:]*: *//' -e 's/ *\\$$//' \ |
|
-e '/^$$/ d' -e 's/$$/ :/' < $(@:%.o=%.d) >> $(@:%.o=%.P); \ |
|
rm -f $(@:%.o=%.d) |
|
|
|
bitcoind: $(OBJS:obj/%=obj/nogui/%) |
|
$(CXX) $(CXXFLAGS) -o $@ $^ $(LIBS) |
|
|
|
obj/test/%.o: test/%.cpp |
|
$(CXX) -c $(CXXFLAGS) -MMD -o $@ $< |
|
@cp $(@:%.o=%.d) $(@:%.o=%.P); \ |
|
sed -e 's/#.*//' -e 's/^[^:]*: *//' -e 's/ *\\$$//' \ |
|
-e '/^$$/ d' -e 's/$$/ :/' < $(@:%.o=%.d) >> $(@:%.o=%.P); \ |
|
rm -f $(@:%.o=%.d) |
|
|
|
test_bitcoin: obj/test/test_bitcoin.o $(filter-out obj/nogui/init.o,$(OBJS:obj/%=obj/nogui/%)) |
|
$(CXX) $(CXXFLAGS) -o $@ $(LIBPATHS) $^ -Wl,-Bstatic -lboost_unit_test_framework $(LIBS) |
|
|
|
clean: |
|
-rm -f bitcoind test_bitcoin |
|
-rm -f obj/*.o |
|
-rm -f obj/nogui/*.o |
|
-rm -f obj/test/*.o |
|
-rm -f obj/*.P |
|
-rm -f obj/nogui/*.P |
|
-rm -f obj/test/*.P
|
|
|