1 | dnl Process this file with autoconf to produce a configure script. |
1 | dnl Process this file with autoconf to produce a configure script. |
2 | |
2 | |
3 | AC_PREREQ(2.59) |
3 | AC_PREREQ([2.71]) |
4 | AC_INIT |
4 | AC_INIT([gvpe],[3.1]) |
5 | AC_CONFIG_SRCDIR([src/gvpe.C]) |
5 | AC_CONFIG_SRCDIR([src/gvpe.C]) |
6 | AC_CANONICAL_TARGET |
6 | AC_CANONICAL_TARGET |
7 | AM_INIT_AUTOMAKE(gvpe, 2.22) |
7 | AM_INIT_AUTOMAKE |
8 | AC_CONFIG_HEADERS([config.h]) |
8 | AC_CONFIG_HEADERS([config.h]) |
9 | AM_MAINTAINER_MODE |
9 | AM_MAINTAINER_MODE |
10 | |
10 | |
11 | AH_TOP([ |
11 | AH_TOP([ |
12 | #ifndef CONFIG_H__ |
12 | #ifndef CONFIG_H__ |
… | |
… | |
45 | # define CLOCALE <clocale> |
45 | # define CLOCALE <clocale> |
46 | #else |
46 | #else |
47 | # define CLOCALE <locale.h> |
47 | # define CLOCALE <locale.h> |
48 | #endif |
48 | #endif |
49 | ]) |
49 | ]) |
50 | |
|
|
51 | dnl Include the macros from the m4/ directory |
|
|
52 | AM_ACLOCAL_INCLUDE(m4) |
|
|
53 | |
50 | |
54 | AM_GNU_GETTEXT([external]) |
51 | AM_GNU_GETTEXT([external]) |
55 | AM_GNU_GETTEXT_VERSION(0.11.5) |
52 | AM_GNU_GETTEXT_VERSION(0.11.5) |
56 | |
53 | |
57 | # Enable GNU extensions. |
54 | # Enable GNU extensions. |
… | |
… | |
182 | |
179 | |
183 | dnl Checks for typedefs, structures, and compiler characteristics. |
180 | dnl Checks for typedefs, structures, and compiler characteristics. |
184 | AC_C_CONST |
181 | AC_C_CONST |
185 | AC_TYPE_PID_T |
182 | AC_TYPE_PID_T |
186 | AC_TYPE_SIZE_T |
183 | AC_TYPE_SIZE_T |
187 | AC_HEADER_TIME |
184 | AC_CHECK_HEADERS_ONCE([sys/time.h]) |
|
|
185 | |
188 | AC_STRUCT_TM |
186 | AC_STRUCT_TM |
189 | |
187 | |
190 | AC_CACHE_CHECK([for socklen_t], ac_cv_type_socklen_t, |
188 | AC_CACHE_CHECK([for socklen_t], ac_cv_type_socklen_t, |
191 | [ |
189 | [ |
192 | AC_COMPILE_IFELSE([AC_LANG_PROGRAM([[#include <sys/types.h> |
190 | AC_COMPILE_IFELSE([AC_LANG_PROGRAM([[#include <sys/types.h> |
… | |
… | |
204 | ]) |
202 | ]) |
205 | if test $ac_cv_struct_addrinfo = yes; then |
203 | if test $ac_cv_struct_addrinfo = yes; then |
206 | AC_DEFINE(HAVE_STRUCT_ADDRINFO, 1, [struct addrinfo available]) |
204 | AC_DEFINE(HAVE_STRUCT_ADDRINFO, 1, [struct addrinfo available]) |
207 | fi |
205 | fi |
208 | |
206 | |
209 | dnl Checks for library functions. |
|
|
210 | AC_TYPE_SIGNAL |
|
|
211 | |
|
|
212 | AC_LANG_PUSH(C) |
207 | AC_LANG_PUSH(C) |
213 | |
|
|
214 | AC_HEADER_STDC |
|
|
215 | |
208 | |
216 | dnl argl, could somebody catapult darwin into the 21st century??? |
209 | dnl argl, could somebody catapult darwin into the 21st century??? |
217 | AC_CHECK_FUNCS(asprintf daemon get_current_dir_name putenv select strerror strsignal strtol unsetenv mlockall) |
210 | AC_CHECK_FUNCS(asprintf daemon get_current_dir_name putenv select strerror strsignal strtol unsetenv mlockall) |
218 | |
211 | |
219 | AC_FUNC_ALLOCA |
212 | AC_FUNC_ALLOCA |
… | |
… | |
237 | AC_CACHE_SAVE |
230 | AC_CACHE_SAVE |
238 | |
231 | |
239 | dnl These are defined in files in m4/ |
232 | dnl These are defined in files in m4/ |
240 | tinc_TUNTAP |
233 | tinc_TUNTAP |
241 | |
234 | |
242 | tinc_OPENSSL |
235 | PKG_CHECK_MODULES([LIBCRYPTO], [libcrypto >= 1]) |
243 | if test "x$openssl_include" != x; then |
236 | |
244 | CXXFLAGS="$CXXFLAGS -I$openssl_include" |
237 | AC_ARG_ENABLE(threads, |
|
|
238 | [AS_HELP_STRING(--enable-threads,try to use threads for long-running asynchronous operations (default enabled).)], |
|
|
239 | [try_threads=$enableval], |
|
|
240 | [try_threads=yes] |
|
|
241 | ) |
|
|
242 | |
|
|
243 | if test "x$try_threads" = xyes; then |
|
|
244 | AC_CHECK_HEADER(pthread.h,[ |
|
|
245 | LIBS="$LIBS -lpthread" |
|
|
246 | AC_COMPILE_IFELSE( |
|
|
247 | [AC_LANG_PROGRAM([#include <pthread.h>], [pthread_t id; pthread_create (&id, 0, 0, 0);])], |
|
|
248 | [AC_DEFINE_UNQUOTED(ENABLE_PTHREADS, 1, [POSIX thread support.])] |
|
|
249 | ) |
|
|
250 | ]) |
245 | fi |
251 | fi |
246 | dnl tinc_ZLIB |
|
|
247 | |
252 | |
248 | AC_ARG_ENABLE(static-daemon, |
253 | AC_ARG_ENABLE(static-daemon, |
249 | [AS_HELP_STRING(--enable-static-daemon,enable statically linked daemon.)], |
254 | [AS_HELP_STRING(--enable-static-daemon,enable statically linked daemon.)], |
250 | [LDFLAGS_DAEMON=-static] |
255 | [LDFLAGS_DAEMON=-static] |
251 | ) |
256 | ) |
… | |
… | |
314 | |
319 | |
315 | AC_DEFINE_UNQUOTED(ENABLE_DNS, 1, [DNS tunnel protocol support.]) |
320 | AC_DEFINE_UNQUOTED(ENABLE_DNS, 1, [DNS tunnel protocol support.]) |
316 | ] |
321 | ] |
317 | ) |
322 | ) |
318 | |
323 | |
|
|
324 | RSA=3072 |
|
|
325 | AC_ARG_ENABLE(rsa-length, |
|
|
326 | [AS_HELP_STRING(--enable-rsa-length=BITS,[ |
|
|
327 | use BITS rsa keys (default 3072). Allowed values are 2048-10240.])], |
|
|
328 | RSA=$enableval |
|
|
329 | ) |
|
|
330 | AC_DEFINE_UNQUOTED(RSABITS, $RSA, [Size of RSA keys.]) |
|
|
331 | |
319 | HMAC=12 |
332 | HMACSIZE=12 |
320 | AC_ARG_ENABLE(hmac-length, |
333 | AC_ARG_ENABLE(hmac-length, |
321 | [AS_HELP_STRING(--enable-hmac-length=BYTES,[ |
334 | [AS_HELP_STRING(--enable-hmac-length=BYTES,[ |
322 | use a hmac of length BYTES bytes (default 12). Allowed values are 4, 8, 12, 16.])], |
335 | use a hmac of length BYTES bytes (default 12). Allowed values are 4, 8, 12, 16.])], |
323 | HMAC=$enableval |
336 | HMACSIZE=$enableval |
324 | ) |
337 | ) |
325 | AC_DEFINE_UNQUOTED(HMACLENGTH, $HMAC, [Size of HMAC in each packet in bytes.]) |
338 | AC_DEFINE_UNQUOTED(HMACLENGTH, $HMACSIZE, [Size of HMAC in each packet in bytes.]) |
326 | |
|
|
327 | RAND=8 |
|
|
328 | AC_ARG_ENABLE(rand-length, |
|
|
329 | [AS_HELP_STRING(--enable-rand-length=BYTES, |
|
|
330 | [use BYTES bytes of extra randomness (default 8). Allowed values are 0, 4, 8.])], |
|
|
331 | RAND=$enableval |
|
|
332 | ) |
|
|
333 | AC_DEFINE_UNQUOTED(RAND_SIZE, $RAND, [Add this many bytes of randomness to each packet.]) |
|
|
334 | |
339 | |
335 | MTU=1500 |
340 | MTU=1500 |
336 | AC_ARG_ENABLE(mtu, |
341 | AC_ARG_ENABLE(max-mtu, |
337 | [AS_HELP_STRING(--enable-max-mtu=BYTES,enable mtu sizes upto BYTES bytes (default 1500). Use 9100 for jumbogram support.)], |
342 | [AS_HELP_STRING(--enable-max-mtu=BYTES,enable mtu sizes upto BYTES bytes (default 1500). Use 9100 for jumbogram support.)], |
338 | MTU=$enableval |
343 | MTU=$enableval |
339 | ) |
344 | ) |
340 | AC_DEFINE_UNQUOTED(MAX_MTU, $MTU + 14, [Maximum MTU supported.]) |
345 | AC_DEFINE_UNQUOTED(MAX_MTU, ($MTU + 14), [Maximum MTU supported.]) |
341 | |
346 | |
342 | COMPRESS=1 |
347 | COMPRESS=1 |
343 | AC_ARG_ENABLE(compression, |
348 | AC_ARG_ENABLE(compression, |
344 | [AS_HELP_STRING(--disable-compression,Disable compression support.)], |
349 | [AS_HELP_STRING(--disable-compression,Disable compression support.)], |
345 | if test "x$enableval" = xno; then |
350 | if test "x$enableval" = xno; then |
346 | COMPRESS=0 |
351 | COMPRESS=0 |
347 | fi |
352 | fi |
348 | ) |
353 | ) |
349 | AC_DEFINE_UNQUOTED(ENABLE_COMPRESSION, $COMPRESS, [Enable compression support.]) |
354 | AC_DEFINE_UNQUOTED(ENABLE_COMPRESSION, $COMPRESS, [Enable compression support.]) |
350 | |
355 | |
351 | CIPHER=aes_128_cbc |
356 | CIPHER=aes_128_ctr |
352 | AC_ARG_ENABLE(cipher, |
357 | AC_ARG_ENABLE(cipher, |
353 | [AS_HELP_STRING(--enable-cipher=CIPHER,[ |
358 | [AS_HELP_STRING(--enable-cipher=CIPHER,[ |
354 | Select the symmetric cipher (default "aes-128"). |
359 | Select the symmetric cipher (default "aes-128"). |
355 | Must be one of "bf" (blowfish), "aes-128" (rijndael), "aes-192" or "aes-256".])], |
360 | Must be one of "aes-128" (rijndael), "aes-192", or "aes-256".])], |
356 | if test "x$enableval" = xbf ; then CIPHER=bf_cbc ; fi |
361 | #if test "x$enableval" = xbf ; then CIPHER=bf_ctr ; fi |
357 | if test "x$enableval" = xaes-128; then CIPHER=aes_128_cbc; fi |
362 | if test "x$enableval" = xaes-128 ; then CIPHER=aes_128_ctr ; fi |
358 | if test "x$enableval" = xaes-192; then CIPHER=aes_192_cbc; fi |
363 | if test "x$enableval" = xaes-192 ; then CIPHER=aes_192_ctr ; fi |
359 | if test "x$enableval" = xaes-256; then CIPHER=aes_256_cbc; fi |
364 | if test "x$enableval" = xaes-256 ; then CIPHER=aes_256_ctr ; fi |
|
|
365 | #if test "x$enableval" = xcamellia-128; then CIPHER=camellia_128_ctr; fi |
|
|
366 | #if test "x$enableval" = xcamellia-256; then CIPHER=camellia_256_ctr; fi |
360 | ) |
367 | ) |
361 | AC_DEFINE_UNQUOTED(ENABLE_CIPHER, EVP_${CIPHER}, [Select the symmetric cipher to use.]) |
368 | AC_DEFINE_UNQUOTED(ENABLE_CIPHER, EVP_${CIPHER}, [Select the symmetric cipher to use.]) |
362 | |
369 | |
363 | DIGEST=ripemd160 |
370 | HMAC=sha1 |
364 | AC_ARG_ENABLE(digest, |
371 | AC_ARG_ENABLE(hmac-digest, |
365 | [AS_HELP_STRING(--enable-digest=CIPHER,[ |
372 | [AS_HELP_STRING(--enable-hmac-digest=HMAC,[ |
366 | Select the digest algorithm to use (default "ripemd160"). Must be one of |
373 | Select the HMAC digest algorithm to use (default "sha1"). Must be one of |
367 | "sha512", "sha256", "sha1" (somewhat insecure), "ripemd160", "md5" (insecure) or "md4" (insecure).])], |
374 | "sha512", "sha256", "sha1", "ripemd160", "whirlpool".])], |
|
|
375 | if test "x$enableval" = xwhirlpool; then HMAC=whirlpool; fi |
|
|
376 | if test "x$enableval" = xsha512 ; then HMAC=sha512 ; fi |
|
|
377 | if test "x$enableval" = xsha256 ; then HMAC=sha256 ; fi |
|
|
378 | if test "x$enableval" = xsha1 ; then HMAC=sha1 ; fi |
|
|
379 | if test "x$enableval" = xripemd160; then HMAC=ripemd160; fi |
|
|
380 | ) |
|
|
381 | AC_DEFINE_UNQUOTED(ENABLE_HMAC, EVP_${HMAC}, [Select the HMAC digest algorithm to use.]) |
|
|
382 | |
|
|
383 | AUTH=sha512 |
|
|
384 | AC_ARG_ENABLE(auth-digest, |
|
|
385 | [AS_HELP_STRING(--enable-auth-digest=DIGEST,[ |
|
|
386 | Select the hmac algorithm to use (default "sha512"). Must be one of |
|
|
387 | "sha512", "sha256", "whirlpool".])], |
|
|
388 | if test "x$enableval" = xwhirlpool; then AUTH=whirlpool; fi |
368 | if test "x$enableval" = xsha512 ; then DIGEST=sha512 ; fi |
389 | if test "x$enableval" = xsha512 ; then AUTH=sha512 ; fi |
369 | if test "x$enableval" = xsha256 ; then DIGEST=sha256 ; fi |
390 | if test "x$enableval" = xsha256 ; then AUTH=sha256 ; fi |
370 | if test "x$enableval" = xsha1 ; then DIGEST=sha1 ; fi |
|
|
371 | if test "x$enableval" = xripemd160; then DIGEST=ripemd160; fi |
|
|
372 | if test "x$enableval" = xmd5 ; then DIGEST=md5 ; fi |
|
|
373 | if test "x$enableval" = xmd4 ; then DIGEST=md4 ; fi |
|
|
374 | ) |
391 | ) |
375 | AC_DEFINE_UNQUOTED(ENABLE_DIGEST, EVP_${DIGEST}, [Select the digest algorithm to use.]) |
392 | AC_DEFINE_UNQUOTED(ENABLE_AUTH, EVP_${AUTH}, [Select the auth digest algorithm to use.]) |
376 | |
393 | |
377 | if $CXX -v --help 2>&1 | grep -q fno-rtti; then |
394 | if $CXX -v --help 2>&1 | grep -q fno-rtti; then |
378 | CXXFLAGS="$CXXFLAGS -fno-rtti" |
395 | CXXFLAGS="$CXXFLAGS -fno-rtti" |
379 | fi |
396 | fi |
380 | |
397 | |
… | |
… | |
385 | LIBS="$EXTRA_LIBS $LIBS" |
402 | LIBS="$EXTRA_LIBS $LIBS" |
386 | |
403 | |
387 | dnl if $CXX -v --help 2>&1 | grep -q ffunction-sections; then |
404 | dnl if $CXX -v --help 2>&1 | grep -q ffunction-sections; then |
388 | dnl CXXFLAGS="$CXXFLAGS -ffunction-sections" |
405 | dnl CXXFLAGS="$CXXFLAGS -ffunction-sections" |
389 | dnl fi |
406 | dnl fi |
390 | dnl |
407 | dnl |
391 | dnl if $LD -v --help 2>&1 | grep -q gc-sections; then |
408 | dnl if $LD -v --help 2>&1 | grep -q gc-sections; then |
392 | dnl LDFLAGS="$LDFLAGS -Wl,--gc-sections" |
409 | dnl LDFLAGS="$LDFLAGS -Wl,--gc-sections" |
393 | dnl fi |
410 | dnl fi |
394 | |
411 | |
395 | AC_SUBST(INCLUDES) |
412 | AC_SUBST(AM_CPPFLAGS) |
396 | |
413 | |
397 | AC_CONFIG_FILES([Makefile po/Makefile.in |
414 | AC_CONFIG_FILES([Makefile po/Makefile.in |
398 | src/Makefile |
415 | src/Makefile |
399 | doc/Makefile |
416 | doc/Makefile |
400 | lib/Makefile |
417 | lib/Makefile |
… | |
… | |
405 | echo |
422 | echo |
406 | echo "***" |
423 | echo "***" |
407 | echo "*** Configuration Summary" |
424 | echo "*** Configuration Summary" |
408 | echo "***" |
425 | echo "***" |
409 | echo "*** Kernel Iface: $IFTYPE/$IFSUBTYPE" |
426 | echo "*** Kernel Iface: $IFTYPE/$IFSUBTYPE" |
|
|
427 | echo "*** RSA size: $RSA" |
410 | echo "*** Cipher used: $CIPHER" |
428 | echo "*** Cipher used: $CIPHER" |
411 | echo "*** Digest used: $DIGEST" |
429 | echo "*** Digest used: $DIGEST" |
|
|
430 | echo "*** Authdigest: $AUTH" |
412 | echo "*** HMAC length: $HMAC" |
431 | echo "*** HMAC length: $HMAC" |
413 | echo "*** RAND used: $RAND" |
|
|
414 | echo "*** Max. MTU: $MTU" |
432 | echo "*** Max. MTU: $MTU" |
415 | |
433 | |
416 | echo "***" |
434 | echo "***" |
417 | echo "*** Enable options:" |
435 | echo "*** Enable options:" |
418 | grep ENABLE_ config.h | sed -e 's/^/*** /' |
436 | grep ENABLE_ config.h | sed -e 's/^/*** /' |
419 | |
437 | |
420 | if test "x$DIGEST" = xmd4; then |
438 | if test "$HMACSIZE" -lt 12; then |
421 | echo "***" |
439 | echo "***" |
422 | echo "*** WARNING: The digest you have chosen ($DIGEST) is known to be insecure" |
|
|
423 | fi |
|
|
424 | |
|
|
425 | if test "$HMAC" -lt 12; then |
|
|
426 | echo "***" |
|
|
427 | echo "*** WARNING: The hmac length you have chosen ($HMAC) is probably insecure" |
440 | echo "*** WARNING: The hmac length you have chosen ($HMACSIZE) is quite insecure" |
428 | fi |
|
|
429 | |
|
|
430 | if test "$RAND" -lt 8; then |
|
|
431 | echo "***" |
|
|
432 | echo "*** WARNING: The random prefix you have chosen ($RAND) is probably insecure" |
|
|
433 | fi |
441 | fi |
434 | |
442 | |
435 | echo "***" |
443 | echo "***" |
436 | echo |
444 | echo |
437 | |
445 | |
|
|
446 | if pkg-config --exists 'libcrypto >= 1.1 libcrypto < 2.0'; then |
|
|
447 | cat <<EOF |
|
|
448 | @<:@33m |
|
|
449 | *** |
|
|
450 | *** WARNING WARNING WARNING WARNING WARNING WARNING WARNING |
|
|
451 | *** |
|
|
452 | *** You seem to configure gvpe with OpenSSL 1.1 or newer. |
|
|
453 | *** While this probably compiles, please note that this is not only |
|
|
454 | *** unsupported, but also discouraged. |
|
|
455 | *** |
|
|
456 | *** It is recommended to use either OpenSSL 1.0, as long as that is still |
|
|
457 | *** supported, or LibreSSL (https://www.libressl.org/). |
|
|
458 | *** |
|
|
459 | *** This is not a political issue - while porting GVPE to the newer |
|
|
460 | *** OpenSSL 1.1 API, I encountered two incompatible API changes that were |
|
|
461 | *** not documented, were not caught while compiling but caused security |
|
|
462 | *** issues. When reported, the reaction of the OpenSSL developers was to |
|
|
463 | *** update the documentation. |
|
|
464 | *** |
|
|
465 | *** As a result, I lost all confidence in the ability and desire of |
|
|
466 | *** OpenSSL developers to create a safe API, and would highly recommend |
|
|
467 | *** switching to LibreSSL which explicitly avoids such braking changes. |
|
|
468 | *** |
|
|
469 | *** WARNING WARNING WARNING WARNING WARNING WARNING WARNING |
|
|
470 | *** |
|
|
471 | *** Again, do not use OpenSSL 1.1 and complain if stuff breaks. |
|
|
472 | *** You have been warned, but your choice is respected. |
|
|
473 | *** |
|
|
474 | @<:@0m |
438 | |
475 | |
|
|
476 | EOF |
|
|
477 | fi |
|
|
478 | |
|
|
479 | |