Ensure mk1mf.pl is aware of no-weak-ssl-ciphers option
authorMatt Caswell <matt@openssl.org>
Tue, 1 Mar 2016 12:08:33 +0000 (12:08 +0000)
committerMatt Caswell <matt@openssl.org>
Tue, 1 Mar 2016 12:41:49 +0000 (12:41 +0000)
Update mk1mf.pl to properly handle no-weak-ssl-ciphers

Reviewed-by: Richard Levitte <levitte@openssl.org>
util/mk1mf.pl

index 973ad75b111e0f2c4b93bc6ff8b135cddb984841..2629a1c5dd645bfdaa2955a25746e4126e4305ee 100755 (executable)
@@ -290,6 +290,7 @@ $cflags.=" -DOPENSSL_NO_HW"   if $no_hw;
 $cflags.=" -DOPENSSL_FIPS"    if $fips;
 $cflags.=" -DOPENSSL_NO_JPAKE"    if $no_jpake;
 $cflags.=" -DOPENSSL_NO_EC2M"    if $no_ec2m;
+$cflags.=" -DOPENSSL_NO_WEAK_SSL_CIPHERS"   if $no_weak_ssl;
 $cflags.= " -DZLIB" if $zlib_opt;
 $cflags.= " -DZLIB_SHARED" if $zlib_opt == 2;
 
@@ -1205,6 +1206,7 @@ sub read_options
                "no-jpake" => \$no_jpake,
                "no-ec2m" => \$no_ec2m,
                "no-ec_nistp_64_gcc_128" => 0,
+               "no-weak-ssl-ciphers" => \$no_weak_ssl,
                "no-err" => \$no_err,
                "no-sock" => \$no_sock,
                "no-krb5" => \$no_krb5,