mirror of the now-defunct rocklinux.org
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

86 lines
3.1 KiB

  1. [COPY] --- ROCK-COPYRIGHT-NOTE-BEGIN ---
  2. [COPY]
  3. [COPY] This copyright note is auto-generated by ./scripts/Create-CopyPatch.
  4. [COPY] Please add additional copyright information _after_ the line containing
  5. [COPY] the ROCK-COPYRIGHT-NOTE-END tag. Otherwise it might get removed by
  6. [COPY] the ./scripts/Create-CopyPatch script. Do not edit this copyright text!
  7. [COPY]
  8. [COPY] ROCK Linux: rock-src/package/base/gcc/gcc.desc
  9. [COPY] ROCK Linux is Copyright (C) 1998 - 2005 Clifford Wolf
  10. [COPY]
  11. [COPY] This program is free software; you can redistribute it and/or modify
  12. [COPY] it under the terms of the GNU General Public License as published by
  13. [COPY] the Free Software Foundation; either version 2 of the License, or
  14. [COPY] (at your option) any later version. A copy of the GNU General Public
  15. [COPY] License can be found at Documentation/COPYING.
  16. [COPY]
  17. [COPY] Many people helped and are helping developing ROCK Linux. Please
  18. [COPY] have a look at http://www.rocklinux.org/ and the Documentation/TEAM
  19. [COPY] file for details.
  20. [COPY]
  21. [COPY] --- ROCK-COPYRIGHT-NOTE-END ---
  22. [I] The GNU Compiler Collection (aka GNU C Compiler)
  23. [T] This package contains the GNU Compiler Collection. It includes compilers
  24. [T] for the languages C, C++, Objective C, Fortran 77, Java and others ...
  25. [T]
  26. [T] This GCC contains the Stack-Smashing Protector Patch which can be enabled
  27. [T] with the -fstack-protector command-line option. More information about it
  28. [T] ca be found at http://www.research.ibm.com/trl/projects/security/ssp/ .
  29. [U] http://gcc.gnu.org/ The GCC Homepage
  30. [A] The GNU Project / FSF
  31. [M] Clifford Wolf <clifford@clifford.at>
  32. [C] base/development
  33. [F] DIETLIBC CC KCC CXX F77
  34. [F] CORE
  35. [E] group compiler gcc2 gcc32 gcc33 gcc34
  36. [L] GPL
  37. [S] Stable
  38. [V] 0000
  39. [P] X 012------9 101.000
  40. #if xpkg == gcc2.*
  41. [V] 2.95.3
  42. [D] 354985877 gcc-2.95.3.tar.bz2 ftp://gcc.gnu.org/pub/gcc/releases/gcc-2.95.3/
  43. [D] 2603145003 protector-2.95.3-23.tar.gz http://www.research.ibm.com/trl/projects/security/ssp/gcc2_95_3/
  44. #endif
  45. #if xpkg == gcc32.*
  46. [V] 3.2.3
  47. [D] 4060808826 gcc-3.2.3.tar.bz2 ftp://gcc.gnu.org/pub/gcc/releases/gcc-3.2.3/
  48. [D] 2790839069 protector-3.2.2-10.tar.gz http://www.research.ibm.com/trl/projects/security/ssp/gcc3_2_2/
  49. #endif
  50. #if xpkg == gcc33.*
  51. [V] 3.3.5
  52. [D] 1892323860 gcc-3.3.5.tar.bz2 ftp://gcc.gnu.org/pub/gcc/releases/gcc-3.3.5/
  53. [D] 3472291992 protector-3.3-7.tar.gz http://www.research.ibm.com/trl/projects/security/ssp/gcc3_3/
  54. #endif
  55. #if xpkg == gcc34.*
  56. [V] 3.4.4
  57. [D] 1929991607 gcc-3.4.4.tar.bz2 ftp://gcc.gnu.org/pub/gcc/releases/gcc-3.4.4/
  58. [D] 365541092 protector-3.4.4-1.tar.gz http://www.research.ibm.com/trl/projects/security/ssp/gcc3_4_4/
  59. #endif
  60. #if xpkg == gcc40
  61. [V] 4.0.2
  62. [D] 2297749519 gcc-4.0.2.tar.bz2 ftp://gcc.gnu.org/pub/gcc/releases/gcc-4.0.2/
  63. # [D] 870641564 protector-3.4-2.tar.gz http://www.research.ibm.com/trl/projects/security/ssp/gcc3_4/
  64. #endif
  65. #if xpkg == gcc41
  66. [V] 4.1-20050424
  67. [D] 351759757 gcc-4.1-20050424.tar.bz2 ftp://gcc.gnu.org/pub/gcc/snapshots/4.1-20050424/
  68. # [D] 870641564 protector-3.4-2.tar.gz http://www.research.ibm.com/trl/projects/security/ssp/gcc3_4/
  69. #endif
  70. [CD] <COPY> for x in $cachedir/*.cache; do cp $x $confdir/$pkg.cache; done