diff options
Diffstat (limited to 'src/libs/3rdparty/botan/src/build-data/buildh.in')
-rw-r--r-- | src/libs/3rdparty/botan/src/build-data/buildh.in | 262 |
1 files changed, 0 insertions, 262 deletions
diff --git a/src/libs/3rdparty/botan/src/build-data/buildh.in b/src/libs/3rdparty/botan/src/build-data/buildh.in deleted file mode 100644 index 17df7791b9..0000000000 --- a/src/libs/3rdparty/botan/src/build-data/buildh.in +++ /dev/null @@ -1,262 +0,0 @@ -#ifndef BOTAN_BUILD_CONFIG_H_ -#define BOTAN_BUILD_CONFIG_H_ - -/* -* This file was automatically generated running -* '%{command_line}' -* -* Target -* - Compiler: %{cxx} %{cxx_abi_flags} %{cc_lang_flags} %{cc_compile_flags} -* - Arch: %{arch} -* - OS: %{os} -*/ - -#define BOTAN_VERSION_MAJOR %{version_major} -#define BOTAN_VERSION_MINOR %{version_minor} -#define BOTAN_VERSION_PATCH %{version_patch} -#define BOTAN_VERSION_DATESTAMP %{version_datestamp} - -#define BOTAN_VERSION_RELEASE_TYPE "%{release_type}" - -#define BOTAN_VERSION_VC_REVISION "%{version_vc_rev}" - -#define BOTAN_DISTRIBUTION_INFO "%{distribution_info}" - -/* How many bits per limb in a BigInt */ -#define BOTAN_MP_WORD_BITS %{mp_bits} - -%{if fuzzer_mode} -#define BOTAN_UNSAFE_FUZZER_MODE -%{endif} -%{if fuzzer_type} -#define BOTAN_FUZZER_IS_%{fuzzer_type} -%{endif} - -#define BOTAN_INSTALL_PREFIX R"(%{prefix})" -#define BOTAN_INSTALL_HEADER_DIR "%{includedir}/botan-%{version_major}" -#define BOTAN_INSTALL_LIB_DIR "%{libdir}" -#define BOTAN_LIB_LINK "%{link_to}" -#define BOTAN_LINK_FLAGS "%{cxx_abi_flags}" - -#ifndef BOTAN_DLL - #define BOTAN_DLL %{visibility_attribute} -#endif - -/* Target identification and feature test macros */ - -#define BOTAN_TARGET_OS_IS_%{os_name|upper} - -%{for os_features} -#define BOTAN_TARGET_OS_HAS_%{i|upper} -%{endfor} - -#define BOTAN_BUILD_COMPILER_IS_%{cc_macro} - -%{for sanitizer_types} -#define BOTAN_HAS_SANITIZER_%{i|upper} -%{endfor} - -%{if test_mode} -#define BOTAN_TEST_MODE -%{endif} - -#define BOTAN_TARGET_ARCH_IS_%{arch|upper} -%{if endian} -#define BOTAN_TARGET_CPU_IS_%{endian|upper}_ENDIAN -%{endif} -%{if cpu_family} -#define BOTAN_TARGET_CPU_IS_%{cpu_family|upper}_FAMILY -%{endif} -%{if cpu_is_64bit} -#define BOTAN_TARGET_CPU_HAS_NATIVE_64BIT -%{endif} - -%{for cpu_features} -#define BOTAN_TARGET_SUPPORTS_%{i|upper} -%{endfor} - -%{if with_valgrind} -#define BOTAN_HAS_VALGRIND -%{endif} - -%{if with_openmp} -#define BOTAN_TARGET_HAS_OPENMP -%{endif} - -%{if with_debug_asserts} -#define BOTAN_ENABLE_DEBUG_ASSERTS -%{endif} - -%{if optimize_for_size} -#define BOTAN_OPTIMIZE_FOR_SIZE -%{endif} - -/* -* Module availability definitions -*/ -%{for module_defines} -#define BOTAN_HAS_%{i} -%{endfor} - -/* -* Local/misc configuration options (if any) follow -*/ -%{local_config} - -/* -* Things you can edit (but probably shouldn't) -*/ - -#if !defined(BOTAN_DEPRECATED_PUBLIC_MEMBER_VARIABLES) - - #if defined(BOTAN_NO_DEPRECATED) - #define BOTAN_DEPRECATED_PUBLIC_MEMBER_VARIABLES private - #else - #define BOTAN_DEPRECATED_PUBLIC_MEMBER_VARIABLES public - #endif - -#endif - -/* How much to allocate for a buffer of no particular size */ -#define BOTAN_DEFAULT_BUFFER_SIZE 1024 - -/* Minimum and maximum sizes to allocate out of the mlock pool (bytes) - Default min is 16 as smaller values are easily bruteforceable and thus - likely not cryptographic keys. -*/ -#define BOTAN_MLOCK_ALLOCATOR_MIN_ALLOCATION 16 -#define BOTAN_MLOCK_ALLOCATOR_MAX_ALLOCATION 128 - -/* -* Total maximum amount of RAM (in KiB) we will lock into memory, even -* if the OS would let us lock more -*/ -#define BOTAN_MLOCK_ALLOCATOR_MAX_LOCKED_KB 512 - -/* -* If enabled uses memset via volatile function pointer to zero memory, -* otherwise does a byte at a time write via a volatile pointer. -*/ -#define BOTAN_USE_VOLATILE_MEMSET_FOR_ZERO 1 - -/* -* Normally blinding is performed by choosing a random starting point (plus -* its inverse, of a form appropriate to the algorithm being blinded), and -* then choosing new blinding operands by successive squaring of both -* values. This is much faster than computing a new starting point but -* introduces some possible corelation -* -* To avoid possible leakage problems in long-running processes, the blinder -* periodically reinitializes the sequence. This value specifies how often -* a new sequence should be started. -*/ -#define BOTAN_BLINDING_REINIT_INTERVAL 64 - -/* -* Userspace RNGs like HMAC_DRBG will reseed after a specified number -* of outputs are generated. Set to zero to disable automatic reseeding. -*/ -#define BOTAN_RNG_DEFAULT_RESEED_INTERVAL 1024 -#define BOTAN_RNG_RESEED_POLL_BITS 256 - -#define BOTAN_RNG_AUTO_RESEED_TIMEOUT std::chrono::milliseconds(10) -#define BOTAN_RNG_RESEED_DEFAULT_TIMEOUT std::chrono::milliseconds(50) - -/* -* Specifies (in order) the list of entropy sources that will be used -* to seed an in-memory RNG. The first in the default list: "rdseed" -* and "rdrand" do not count as contributing any entropy but are -* included as they are fast and help protect against a seriously -* broken system RNG. -*/ -#define BOTAN_ENTROPY_DEFAULT_SOURCES \ - { "rdseed", "rdrand", "getentropy", "dev_random", \ - "system_rng", "proc_walk", "system_stats" } - -/* Multiplier on a block cipher's native parallelism */ -#define BOTAN_BLOCK_CIPHER_PAR_MULT 4 - -/* -* These control the RNG used by the system RNG interface -*/ -#define BOTAN_SYSTEM_RNG_DEVICE "/dev/urandom" -#define BOTAN_SYSTEM_RNG_POLL_DEVICES { "/dev/urandom", "/dev/random" } - -/* -* This directory will be monitored by ProcWalking_EntropySource and -* the contents provided as entropy inputs to the RNG. May also be -* usefully set to something like "/sys", depending on the system being -* deployed to. Set to an empty string to disable. -*/ -#define BOTAN_ENTROPY_PROC_FS_PATH "/proc" - -/* -* These paramaters control how many bytes to read from the system -* PRNG, and how long to block if applicable. The timeout only applies -* to reading /dev/urandom and company. -*/ -#define BOTAN_SYSTEM_RNG_POLL_REQUEST 64 -#define BOTAN_SYSTEM_RNG_POLL_TIMEOUT_MS 20 - -/* -How many times to read from the RDRAND/RDSEED RNGs. -Each read generates 32 bits of output -*/ -#define BOTAN_ENTROPY_INTEL_RNG_POLLS 32 - -// According to Intel, RDRAND is guaranteed to generate a random number within 10 retries on a working CPU -#define BOTAN_ENTROPY_RDRAND_RETRIES 10 - -/* -* RdSeed is not guaranteed to generate a random number within a specific number of retries -* Define the number of retries here -*/ -#define BOTAN_ENTROPY_RDSEED_RETRIES 20 - -/* -* If no way of dynamically determining the cache line size for the -* system exists, this value is used as the default. Used by the side -* channel countermeasures rather than for alignment purposes, so it is -* better to be on the smaller side if the exact value cannot be -* determined. Typically 32 or 64 bytes on modern CPUs. -*/ -#if !defined(BOTAN_TARGET_CPU_DEFAULT_CACHE_LINE_SIZE) - #define BOTAN_TARGET_CPU_DEFAULT_CACHE_LINE_SIZE 32 -#endif - -/** -* Controls how AutoSeeded_RNG is instantiated -*/ -#if !defined(BOTAN_AUTO_RNG_HMAC) - - #if defined(BOTAN_HAS_SHA2_64) - #define BOTAN_AUTO_RNG_HMAC "HMAC(SHA-384)" - #elif defined(BOTAN_HAS_SHA2_32) - #define BOTAN_AUTO_RNG_HMAC "HMAC(SHA-256)" - #elif defined(BOTAN_HAS_SHA3) - #define BOTAN_AUTO_RNG_HMAC "HMAC(SHA-3(256))" - #elif defined(BOTAN_HAS_SHA1) - #define BOTAN_AUTO_RNG_HMAC "HMAC(SHA-1)" - #endif - // Otherwise, no hash found: leave BOTAN_AUTO_RNG_HMAC undefined - -#endif - -// Check for a common build problem: - -#if defined(BOTAN_TARGET_ARCH_IS_X86_64) && ((defined(_MSC_VER) && !defined(_WIN64)) || \ - (defined(__clang__) && !defined(__x86_64__)) || \ - (defined(__GNUG__) && !defined(__x86_64__))) - #error "Trying to compile Botan configured as x86_64 with non-x86_64 compiler." -#endif - -#if defined(BOTAN_TARGET_ARCH_IS_X86_32) && ((defined(_MSC_VER) && defined(_WIN64)) || \ - (defined(__clang__) && !defined(__i386__)) || \ - (defined(__GNUG__) && !defined(__i386__))) - - #error "Trying to compile Botan configured as x86_32 with non-x86_32 compiler." -#endif - -#include <botan/compiler.h> - -#endif |