… | |
… | |
2 | |
2 | |
3 | AC_PREREQ(2.69) |
3 | AC_PREREQ(2.69) |
4 | AC_INIT |
4 | AC_INIT |
5 | AC_CONFIG_SRCDIR([src/gvpe.C]) |
5 | AC_CONFIG_SRCDIR([src/gvpe.C]) |
6 | AC_CANONICAL_TARGET |
6 | AC_CANONICAL_TARGET |
7 | AM_INIT_AUTOMAKE(gvpe, 2.25) |
7 | AM_INIT_AUTOMAKE(gvpe, 3.1) |
8 | AC_CONFIG_HEADERS([config.h]) |
8 | AC_CONFIG_HEADERS([config.h]) |
9 | AM_MAINTAINER_MODE |
9 | AM_MAINTAINER_MODE |
10 | |
10 | |
11 | AH_TOP([ |
11 | AH_TOP([ |
12 | #ifndef CONFIG_H__ |
12 | #ifndef CONFIG_H__ |
… | |
… | |
234 | AC_CACHE_SAVE |
234 | AC_CACHE_SAVE |
235 | |
235 | |
236 | dnl These are defined in files in m4/ |
236 | dnl These are defined in files in m4/ |
237 | tinc_TUNTAP |
237 | tinc_TUNTAP |
238 | |
238 | |
239 | tinc_OPENSSL |
239 | PKG_CHECK_MODULES([LIBCRYPTO], [libcrypto >= 1]) |
240 | if test "x$openssl_include" != x; then |
|
|
241 | CXXFLAGS="$CXXFLAGS -I$openssl_include" |
|
|
242 | fi |
|
|
243 | dnl tinc_ZLIB |
|
|
244 | |
240 | |
245 | AC_ARG_ENABLE(threads, |
241 | AC_ARG_ENABLE(threads, |
246 | [AS_HELP_STRING(--enable-threads,try to use threads for long-running asynchronous operations (default enabled).)], |
242 | [AS_HELP_STRING(--enable-threads,try to use threads for long-running asynchronous operations (default enabled).)], |
247 | [try_threads=$enableval], |
243 | [try_threads=$enableval], |
248 | [try_threads=yes] |
244 | [try_threads=yes] |
… | |
… | |
343 | use a hmac of length BYTES bytes (default 12). Allowed values are 4, 8, 12, 16.])], |
339 | use a hmac of length BYTES bytes (default 12). Allowed values are 4, 8, 12, 16.])], |
344 | HMACSIZE=$enableval |
340 | HMACSIZE=$enableval |
345 | ) |
341 | ) |
346 | AC_DEFINE_UNQUOTED(HMACLENGTH, $HMACSIZE, [Size of HMAC in each packet in bytes.]) |
342 | AC_DEFINE_UNQUOTED(HMACLENGTH, $HMACSIZE, [Size of HMAC in each packet in bytes.]) |
347 | |
343 | |
348 | RANDSIZE=12 |
|
|
349 | AC_ARG_ENABLE(rand-length, |
|
|
350 | [AS_HELP_STRING(--enable-rand-length=BYTES, |
|
|
351 | [use BYTES bytes of extra randomness (default 12). Allowed values are 0, 4, 8, 12.])], |
|
|
352 | RANDSIZE=$enableval |
|
|
353 | ) |
|
|
354 | AC_DEFINE_UNQUOTED(RAND_SIZE, $RANDSIZE, [Add this many bytes of randomness to each packet.]) |
|
|
355 | |
|
|
356 | MTU=1500 |
344 | MTU=1500 |
357 | AC_ARG_ENABLE(max-mtu, |
345 | AC_ARG_ENABLE(max-mtu, |
358 | [AS_HELP_STRING(--enable-max-mtu=BYTES,enable mtu sizes upto BYTES bytes (default 1500). Use 9100 for jumbogram support.)], |
346 | [AS_HELP_STRING(--enable-max-mtu=BYTES,enable mtu sizes upto BYTES bytes (default 1500). Use 9100 for jumbogram support.)], |
359 | MTU=$enableval |
347 | MTU=$enableval |
360 | ) |
348 | ) |
… | |
… | |
367 | COMPRESS=0 |
355 | COMPRESS=0 |
368 | fi |
356 | fi |
369 | ) |
357 | ) |
370 | AC_DEFINE_UNQUOTED(ENABLE_COMPRESSION, $COMPRESS, [Enable compression support.]) |
358 | AC_DEFINE_UNQUOTED(ENABLE_COMPRESSION, $COMPRESS, [Enable compression support.]) |
371 | |
359 | |
372 | CIPHER=aes_128_cbc |
360 | CIPHER=aes_128_ctr |
373 | AC_ARG_ENABLE(cipher, |
361 | AC_ARG_ENABLE(cipher, |
374 | [AS_HELP_STRING(--enable-cipher=CIPHER,[ |
362 | [AS_HELP_STRING(--enable-cipher=CIPHER,[ |
375 | Select the symmetric cipher (default "aes-128"). |
363 | Select the symmetric cipher (default "aes-128"). |
376 | Must be one of "bf" (blowfish), "aes-128" (rijndael), "aes-192", "aes-256", "camellia-128" or "camellia-256".])], |
364 | Must be one of "aes-128" (rijndael), "aes-192", or "aes-256".])], |
377 | if test "x$enableval" = xbf ; then CIPHER=bf_cbc ; fi |
365 | #if test "x$enableval" = xbf ; then CIPHER=bf_ctr ; fi |
378 | if test "x$enableval" = xaes-128 ; then CIPHER=aes_128_cbc ; fi |
366 | if test "x$enableval" = xaes-128 ; then CIPHER=aes_128_ctr ; fi |
379 | if test "x$enableval" = xaes-192 ; then CIPHER=aes_192_cbc ; fi |
367 | if test "x$enableval" = xaes-192 ; then CIPHER=aes_192_ctr ; fi |
380 | if test "x$enableval" = xaes-256 ; then CIPHER=aes_256_cbc ; fi |
368 | if test "x$enableval" = xaes-256 ; then CIPHER=aes_256_ctr ; fi |
381 | if test "x$enableval" = xcamellia-128; then CIPHER=camellia_128_cbc; fi |
369 | #if test "x$enableval" = xcamellia-128; then CIPHER=camellia_128_ctr; fi |
382 | if test "x$enableval" = xcamellia-256; then CIPHER=camellia_256_cbc; fi |
370 | #if test "x$enableval" = xcamellia-256; then CIPHER=camellia_256_ctr; fi |
383 | ) |
371 | ) |
384 | AC_DEFINE_UNQUOTED(ENABLE_CIPHER, EVP_${CIPHER}, [Select the symmetric cipher to use.]) |
372 | AC_DEFINE_UNQUOTED(ENABLE_CIPHER, EVP_${CIPHER}, [Select the symmetric cipher to use.]) |
385 | |
373 | |
386 | HMAC=sha1 |
374 | HMAC=sha1 |
387 | AC_ARG_ENABLE(hmac-digest, |
375 | AC_ARG_ENABLE(hmac-digest, |
… | |
… | |
418 | LIBS="$EXTRA_LIBS $LIBS" |
406 | LIBS="$EXTRA_LIBS $LIBS" |
419 | |
407 | |
420 | dnl if $CXX -v --help 2>&1 | grep -q ffunction-sections; then |
408 | dnl if $CXX -v --help 2>&1 | grep -q ffunction-sections; then |
421 | dnl CXXFLAGS="$CXXFLAGS -ffunction-sections" |
409 | dnl CXXFLAGS="$CXXFLAGS -ffunction-sections" |
422 | dnl fi |
410 | dnl fi |
423 | dnl |
411 | dnl |
424 | dnl if $LD -v --help 2>&1 | grep -q gc-sections; then |
412 | dnl if $LD -v --help 2>&1 | grep -q gc-sections; then |
425 | dnl LDFLAGS="$LDFLAGS -Wl,--gc-sections" |
413 | dnl LDFLAGS="$LDFLAGS -Wl,--gc-sections" |
426 | dnl fi |
414 | dnl fi |
427 | |
415 | |
428 | AC_SUBST(INCLUDES) |
416 | AC_SUBST(INCLUDES) |
… | |
… | |
443 | echo "*** RSA size: $RSA" |
431 | echo "*** RSA size: $RSA" |
444 | echo "*** Cipher used: $CIPHER" |
432 | echo "*** Cipher used: $CIPHER" |
445 | echo "*** Digest used: $DIGEST" |
433 | echo "*** Digest used: $DIGEST" |
446 | echo "*** Authdigest: $AUTH" |
434 | echo "*** Authdigest: $AUTH" |
447 | echo "*** HMAC length: $HMAC" |
435 | echo "*** HMAC length: $HMAC" |
448 | echo "*** RAND used: $RAND" |
|
|
449 | echo "*** Max. MTU: $MTU" |
436 | echo "*** Max. MTU: $MTU" |
450 | |
437 | |
451 | echo "***" |
438 | echo "***" |
452 | echo "*** Enable options:" |
439 | echo "*** Enable options:" |
453 | grep ENABLE_ config.h | sed -e 's/^/*** /' |
440 | grep ENABLE_ config.h | sed -e 's/^/*** /' |
… | |
… | |
455 | if test "$HMACSIZE" -lt 12; then |
442 | if test "$HMACSIZE" -lt 12; then |
456 | echo "***" |
443 | echo "***" |
457 | echo "*** WARNING: The hmac length you have chosen ($HMACSIZE) is quite insecure" |
444 | echo "*** WARNING: The hmac length you have chosen ($HMACSIZE) is quite insecure" |
458 | fi |
445 | fi |
459 | |
446 | |
460 | if test "$RANDSIZE" -lt 12; then |
|
|
461 | echo "***" |
|
|
462 | echo "*** WARNING: The random prefix you have chosen ($RANDSIZE) is probably insecure" |
|
|
463 | fi |
|
|
464 | |
|
|
465 | echo "***" |
447 | echo "***" |
466 | echo |
448 | echo |
467 | |
449 | |
|
|
450 | if pkg-config --exists 'libcrypto >= 1.1 libcrypto < 2.0'; then |
|
|
451 | cat <<EOF |
|
|
452 | @<:@33m |
|
|
453 | *** |
|
|
454 | *** WARNING WARNING WARNING WARNING WARNING WARNING WARNING |
|
|
455 | *** |
|
|
456 | *** You seem to configure gvpe with OpenSSL 1.1 or newer. |
|
|
457 | *** While this probably compiles, please note that this is not only |
|
|
458 | *** unsupported, but also discouraged. |
|
|
459 | *** |
|
|
460 | *** It is recommended to use either OpenSSL 1.0, as long as that is still |
|
|
461 | *** supported, or LibreSSL (https://www.libressl.org/). |
|
|
462 | *** |
|
|
463 | *** This is not a political issue - while porting GVPE to the newer |
|
|
464 | *** OpenSSL 1.1 API, I encountered two incompatible API changes that were |
|
|
465 | *** not documented, were not caught while compiling but caused security |
|
|
466 | *** issues. When reported, the reaction of the OpenSSL developers was to |
|
|
467 | *** update the documentation. |
|
|
468 | *** |
|
|
469 | *** As a result, I lost all confidence in the ability and desire of |
|
|
470 | *** OpenSSL developers to create a safe API, and would highly recommend |
|
|
471 | *** switching to LibreSSL which explicitly avoids such braking changes. |
|
|
472 | *** |
|
|
473 | *** WARNING WARNING WARNING WARNING WARNING WARNING WARNING |
|
|
474 | *** |
|
|
475 | *** Again, do not use OpenSSL 1.1 and complain if stuff breaks. |
|
|
476 | *** You have been warned, but your choice is respected. |
|
|
477 | *** |
|
|
478 | @<:@0m |
468 | |
479 | |
|
|
480 | EOF |
|
|
481 | fi |
|
|
482 | |
|
|
483 | |