Add two new configure flags:
    --enable-gcc-hardening
        This turns on gcc compile time hardening options. It ensures that
        signed ints have defined behavior (-fwrapv), -D_FORTIFY_SOURCE=2 is
        enabled (requiring -O2), stack smashing protection with canaries
        (-fstack-protector-all), ASLR protection if supported by the kernel
        (-fPIE, -pie). Additional security related warnings are enabled.
        Verified as working on Mac OS X and Debian Lenny.

    --enable-linker-hardening
        This turns on ELF specific hardening features (relro, now). This does
        not work with Mac OS X or any other non-ELF binary format.