Ensure mk1mf.pl is aware of no-weak-ssl-ciphers option
authorMatt Caswell <matt@openssl.org>
Tue, 1 Mar 2016 12:08:33 +0000 (12:08 +0000)
committerMatt Caswell <matt@openssl.org>
Tue, 1 Mar 2016 12:42:12 +0000 (12:42 +0000)
Update mk1mf.pl to properly handle no-weak-ssl-ciphers

Reviewed-by: Richard Levitte <levitte@openssl.org>
util/mk1mf.pl

index 528078072335ad891991910917586b3c7b199b5f..e5fe37c426f61bd55161685ba37286095d93f2f3 100755 (executable)
@@ -281,6 +281,7 @@ $cflags.=" -DOPENSSL_NO_HW"   if $no_hw;
 $cflags.=" -DOPENSSL_FIPS"    if $fips;
 $cflags.=" -DOPENSSL_NO_JPAKE"    if $no_jpake;
 $cflags.=" -DOPENSSL_NO_EC2M"    if $no_ec2m;
+$cflags.=" -DOPENSSL_NO_WEAK_SSL_CIPHERS"   if $no_weak_ssl;
 $cflags.= " -DZLIB" if $zlib_opt;
 $cflags.= " -DZLIB_SHARED" if $zlib_opt == 2;
 
@@ -1122,6 +1123,7 @@ sub read_options
                "no-ec2m" => \$no_ec2m,
                "no-jpake" => \$no_jpake,
                "no-ec_nistp_64_gcc_128" => 0,
+               "no-weak-ssl-ciphers" => \$no_weak_ssl,
                "no-err" => \$no_err,
                "no-sock" => \$no_sock,
                "no-krb5" => \$no_krb5,