… | |
… | |
335 | use BITS rsa keys (default 3072). Allowed values are 2048-10240.])], |
335 | use BITS rsa keys (default 3072). Allowed values are 2048-10240.])], |
336 | RSA=$enableval |
336 | RSA=$enableval |
337 | ) |
337 | ) |
338 | AC_DEFINE_UNQUOTED(RSABITS, $RSA, [Size of RSA keys.]) |
338 | AC_DEFINE_UNQUOTED(RSABITS, $RSA, [Size of RSA keys.]) |
339 | |
339 | |
340 | HMAC=12 |
340 | HMACSIZE=12 |
341 | AC_ARG_ENABLE(hmac-length, |
341 | AC_ARG_ENABLE(hmac-length, |
342 | [AS_HELP_STRING(--enable-hmac-length=BYTES,[ |
342 | [AS_HELP_STRING(--enable-hmac-length=BYTES,[ |
343 | use a hmac of length BYTES bytes (default 12). Allowed values are 4, 8, 12, 16.])], |
343 | use a hmac of length BYTES bytes (default 12). Allowed values are 4, 8, 12, 16.])], |
344 | HMAC=$enableval |
344 | HMACSIZE=$enableval |
345 | ) |
345 | ) |
346 | AC_DEFINE_UNQUOTED(HMACLENGTH, $HMAC, [Size of HMAC in each packet in bytes.]) |
346 | AC_DEFINE_UNQUOTED(HMACLENGTH, $HMACSIZE, [Size of HMAC in each packet in bytes.]) |
347 | |
347 | |
348 | RAND=8 |
348 | RANDSIZE=12 |
349 | AC_ARG_ENABLE(rand-length, |
349 | AC_ARG_ENABLE(rand-length, |
350 | [AS_HELP_STRING(--enable-rand-length=BYTES, |
350 | [AS_HELP_STRING(--enable-rand-length=BYTES, |
351 | [use BYTES bytes of extra randomness (default 8). Allowed values are 0, 4, 8.])], |
351 | [use BYTES bytes of extra randomness (default 12). Allowed values are 0, 4, 8, 12.])], |
352 | RAND=$enableval |
352 | RANDSIZE=$enableval |
353 | ) |
353 | ) |
354 | AC_DEFINE_UNQUOTED(RAND_SIZE, $RAND, [Add this many bytes of randomness to each packet.]) |
354 | AC_DEFINE_UNQUOTED(RAND_SIZE, $RANDSIZE, [Add this many bytes of randomness to each packet.]) |
355 | |
355 | |
356 | MTU=1500 |
356 | MTU=1500 |
357 | AC_ARG_ENABLE(max-mtu, |
357 | AC_ARG_ENABLE(max-mtu, |
358 | [AS_HELP_STRING(--enable-max-mtu=BYTES,enable mtu sizes upto BYTES bytes (default 1500). Use 9100 for jumbogram support.)], |
358 | [AS_HELP_STRING(--enable-max-mtu=BYTES,enable mtu sizes upto BYTES bytes (default 1500). Use 9100 for jumbogram support.)], |
359 | MTU=$enableval |
359 | MTU=$enableval |
… | |
… | |
381 | if test "x$enableval" = xcamellia-128; then CIPHER=camellia_128_cbc; fi |
381 | if test "x$enableval" = xcamellia-128; then CIPHER=camellia_128_cbc; fi |
382 | if test "x$enableval" = xcamellia-256; then CIPHER=camellia_256_cbc; fi |
382 | if test "x$enableval" = xcamellia-256; then CIPHER=camellia_256_cbc; fi |
383 | ) |
383 | ) |
384 | AC_DEFINE_UNQUOTED(ENABLE_CIPHER, EVP_${CIPHER}, [Select the symmetric cipher to use.]) |
384 | AC_DEFINE_UNQUOTED(ENABLE_CIPHER, EVP_${CIPHER}, [Select the symmetric cipher to use.]) |
385 | |
385 | |
386 | DIGEST=sha1 |
386 | HMAC=sha1 |
387 | AC_ARG_ENABLE(digest, |
387 | AC_ARG_ENABLE(hmac-digest, |
388 | [AS_HELP_STRING(--enable-digest=DIGEST,[ |
388 | [AS_HELP_STRING(--enable-hmac-digest=HMAC,[ |
389 | Select the digest algorithm to use (default "sha1"). Must be one of |
389 | Select the HMAC digest algorithm to use (default "sha1"). Must be one of |
390 | "sha512", "sha256", "sha1", "ripemd160", "whirlpool".])], |
390 | "sha512", "sha256", "sha1", "ripemd160", "whirlpool".])], |
391 | if test "x$enableval" = xwhirlpool; then DIGEST=whirlpool; fi |
391 | if test "x$enableval" = xwhirlpool; then HMAC=whirlpool; fi |
392 | if test "x$enableval" = xsha512 ; then DIGEST=sha512 ; fi |
392 | if test "x$enableval" = xsha512 ; then HMAC=sha512 ; fi |
393 | if test "x$enableval" = xsha256 ; then DIGEST=sha256 ; fi |
393 | if test "x$enableval" = xsha256 ; then HMAC=sha256 ; fi |
394 | if test "x$enableval" = xsha1 ; then DIGEST=sha1 ; fi |
394 | if test "x$enableval" = xsha1 ; then HMAC=sha1 ; fi |
395 | if test "x$enableval" = xripemd160; then DIGEST=ripemd160; fi |
395 | if test "x$enableval" = xripemd160; then HMAC=ripemd160; fi |
396 | ) |
396 | ) |
397 | AC_DEFINE_UNQUOTED(ENABLE_DIGEST, EVP_${DIGEST}, [Select the digest algorithm to use.]) |
397 | AC_DEFINE_UNQUOTED(ENABLE_HMAC, EVP_${HMAC}, [Select the HMAC digest algorithm to use.]) |
398 | |
398 | |
399 | AUTH=sha512 |
399 | AUTH=sha512 |
400 | AC_ARG_ENABLE(auth-digest, |
400 | AC_ARG_ENABLE(auth-digest, |
401 | [AS_HELP_STRING(--enable-auth-digest=DIGEST,[ |
401 | [AS_HELP_STRING(--enable-auth-digest=DIGEST,[ |
402 | Select the hmac algorithm to use (default "sha512"). Must be one of |
402 | Select the hmac algorithm to use (default "sha512"). Must be one of |
… | |
… | |
450 | |
450 | |
451 | echo "***" |
451 | echo "***" |
452 | echo "*** Enable options:" |
452 | echo "*** Enable options:" |
453 | grep ENABLE_ config.h | sed -e 's/^/*** /' |
453 | grep ENABLE_ config.h | sed -e 's/^/*** /' |
454 | |
454 | |
455 | if test "$HMAC" -lt 12; then |
455 | if test "$HMACSIZE" -lt 12; then |
456 | echo "***" |
456 | echo "***" |
457 | echo "*** WARNING: The hmac length you have chosen ($HMAC) is quite insecure" |
457 | echo "*** WARNING: The hmac length you have chosen ($HMACSIZE) is quite insecure" |
458 | fi |
458 | fi |
459 | |
459 | |
460 | if test "$RAND" -lt 8; then |
460 | if test "$RANDSIZE" -lt 12; then |
461 | echo "***" |
461 | echo "***" |
462 | echo "*** WARNING: The random prefix you have chosen ($RAND) is probably insecure" |
462 | echo "*** WARNING: The random prefix you have chosen ($RANDSIZE) is probably insecure" |
463 | fi |
463 | fi |
464 | |
464 | |
465 | echo "***" |
465 | echo "***" |
466 | echo |
466 | echo |
467 | |
467 | |