# -D_FORTIFY_SOURCE: detect some buffer overflow errors
# ***>> requires compiler optimization level 1 or above <<***
# see : https://gcc.gnu.org/legacy-ml/gcc-patches/2004-09/msg02055.html
-# The diffence between -D_FORTIFY_SOURCE=1 and -D_FORTIFY_SOURCE=2 is e.g. for
+# The difference between -D_FORTIFY_SOURCE=1 and -D_FORTIFY_SOURCE=2 is e.g. for
# struct S { struct T { char buf[5]; int x; } t; char buf[20]; } var;
# With -D_FORTIFY_SOURCE=1,
# strcpy (&var.t.buf[1], "abcdefg");
# --target: only used to build a cross-compiling toolchain.
./configure --host=i686-w64-mingw32 --enable-mingw32 --enable-zlib \
+ --enable-extended-statistics \
+ --enable-pcre-host-patterns \
--enable-static-linking \
--enable-strptime-sanity-checks \
--disable-pthread \
- --enable-extended-statistics \
- --enable-pcre-host-patterns \
--with-brotli \
--with-mbedtls \
--with-docbook=yes