configure.ac (239849) | configure.ac (248613) |
---|---|
1# $Id: configure.ac,v 1.496 2012/07/06 01:49:29 djm Exp $ | 1# $Id: configure.ac,v 1.518 2013/03/20 01:55:15 djm Exp $ |
2# 3# Copyright (c) 1999-2004 Damien Miller 4# 5# Permission to use, copy, modify, and distribute this software for any 6# purpose with or without fee is hereby granted, provided that the above 7# copyright notice and this permission notice appear in all copies. 8# 9# THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES 10# WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF 11# MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR 12# ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES 13# WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN 14# ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF 15# OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 16 17AC_INIT([OpenSSH], [Portable], [openssh-unix-dev@mindrot.org]) | 2# 3# Copyright (c) 1999-2004 Damien Miller 4# 5# Permission to use, copy, modify, and distribute this software for any 6# purpose with or without fee is hereby granted, provided that the above 7# copyright notice and this permission notice appear in all copies. 8# 9# THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES 10# WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF 11# MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR 12# ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES 13# WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN 14# ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF 15# OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 16 17AC_INIT([OpenSSH], [Portable], [openssh-unix-dev@mindrot.org]) |
18AC_REVISION($Revision: 1.496 $) | 18AC_REVISION($Revision: 1.518 $) |
19AC_CONFIG_SRCDIR([ssh.c]) 20AC_LANG([C]) 21 22AC_CONFIG_HEADER([config.h]) 23AC_PROG_CC 24AC_CANONICAL_HOST 25AC_C_BIGENDIAN 26 --- 88 unchanged lines hidden (view full) --- 115 [AC_DEFINE([HAVE_RLIMIT_NPROC], [], [sys/resource.h has RLIMIT_NPROC])], , [ 116 #include <sys/types.h> 117 #include <sys/resource.h> 118]) 119AC_CHECK_DECL([PR_SET_NO_NEW_PRIVS], [have_linux_no_new_privs=1], , [ 120 #include <sys/types.h> 121 #include <linux/prctl.h> 122]) | 19AC_CONFIG_SRCDIR([ssh.c]) 20AC_LANG([C]) 21 22AC_CONFIG_HEADER([config.h]) 23AC_PROG_CC 24AC_CANONICAL_HOST 25AC_C_BIGENDIAN 26 --- 88 unchanged lines hidden (view full) --- 115 [AC_DEFINE([HAVE_RLIMIT_NPROC], [], [sys/resource.h has RLIMIT_NPROC])], , [ 116 #include <sys/types.h> 117 #include <sys/resource.h> 118]) 119AC_CHECK_DECL([PR_SET_NO_NEW_PRIVS], [have_linux_no_new_privs=1], , [ 120 #include <sys/types.h> 121 #include <linux/prctl.h> 122]) |
123if test "x$have_linux_no_new_privs" = "x1" ; then 124AC_CHECK_DECL([SECCOMP_MODE_FILTER], [have_seccomp_filter=1], , [ 125 #include <sys/types.h> 126 #include <linux/seccomp.h> 127]) 128fi 129if test "x$have_seccomp_filter" = "x1" ; then 130AC_MSG_CHECKING([kernel for seccomp_filter support]) 131AC_RUN_IFELSE([AC_LANG_PROGRAM([[ 132 #include <errno.h> 133 #include <linux/seccomp.h> 134 #include <stdlib.h> 135 #include <sys/prctl.h> 136 ]], 137 [[ errno = 0; 138 prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, NULL, 0, 0); 139 exit(errno == EFAULT ? 0 : 1); ]])], 140 [ AC_MSG_RESULT([yes]) ], [ 141 AC_MSG_RESULT([no]) 142 # Disable seccomp filter as a target 143 have_seccomp_filter=0 144 ], 145 [ AC_MSG_RESULT([cross-compiling, assuming yes]) ] 146) 147fi 148 | |
149use_stack_protector=1 150AC_ARG_WITH([stackprotect], 151 [ --without-stackprotect Don't use compiler's stack protection], [ 152 if test "x$withval" = "xno"; then 153 use_stack_protector=0 154 fi ]) 155 156 --- 77 unchanged lines hidden (view full) --- 234 AC_CHECK_DECL([LLONG_MAX], 235 [have_llong_max=1], 236 [CFLAGS="$saved_CFLAGS"], 237 [#include <limits.h>] 238 ) 239 fi 240fi 241 | 123use_stack_protector=1 124AC_ARG_WITH([stackprotect], 125 [ --without-stackprotect Don't use compiler's stack protection], [ 126 if test "x$withval" = "xno"; then 127 use_stack_protector=0 128 fi ]) 129 130 --- 77 unchanged lines hidden (view full) --- 208 AC_CHECK_DECL([LLONG_MAX], 209 [have_llong_max=1], 210 [CFLAGS="$saved_CFLAGS"], 211 [#include <limits.h>] 212 ) 213 fi 214fi 215 |
216AC_MSG_CHECKING([if compiler allows __attribute__ on return types]) 217AC_COMPILE_IFELSE( 218 [AC_LANG_PROGRAM([[ 219#include <stdlib.h> 220__attribute__((__unused__)) static void foo(void){return;}]], 221 [[ exit(0); ]])], 222 [ AC_MSG_RESULT([yes]) ], 223 [ AC_MSG_RESULT([no]) 224 AC_DEFINE(NO_ATTRIBUTE_ON_RETURN_TYPE, 1, 225 [compiler does not accept __attribute__ on return types]) ] 226) 227 |
|
242if test "x$no_attrib_nonnull" != "x1" ; then 243 AC_DEFINE([HAVE_ATTRIBUTE__NONNULL__], [1], [Have attribute nonnull]) 244fi 245 246AC_ARG_WITH([rpath], 247 [ --without-rpath Disable auto-added -R linker paths], 248 [ 249 if test "x$withval" = "xno" ; then --- 55 unchanged lines hidden (view full) --- 305) 306 307AC_CHECK_HEADERS([ \ 308 bstring.h \ 309 crypt.h \ 310 crypto/sha2.h \ 311 dirent.h \ 312 endian.h \ | 228if test "x$no_attrib_nonnull" != "x1" ; then 229 AC_DEFINE([HAVE_ATTRIBUTE__NONNULL__], [1], [Have attribute nonnull]) 230fi 231 232AC_ARG_WITH([rpath], 233 [ --without-rpath Disable auto-added -R linker paths], 234 [ 235 if test "x$withval" = "xno" ; then --- 55 unchanged lines hidden (view full) --- 291) 292 293AC_CHECK_HEADERS([ \ 294 bstring.h \ 295 crypt.h \ 296 crypto/sha2.h \ 297 dirent.h \ 298 endian.h \ |
299 elf.h \ |
|
313 features.h \ 314 fcntl.h \ 315 floatingpoint.h \ 316 getopt.h \ 317 glob.h \ 318 ia.h \ 319 iaf.h \ 320 limits.h \ --- 167 unchanged lines hidden (view full) --- 488 AC_DEFINE([LOGIN_NEEDS_UTMPX], [1], 489 [Some systems need a utmpx entry for /bin/login to work]) 490 AC_DEFINE([SPT_TYPE], [SPT_REUSEARGV], 491 [Define to a Set Process Title type if your system is 492 supported by bsd-setproctitle.c]) 493 AC_DEFINE([SSHPAM_CHAUTHTOK_NEEDS_RUID], [1], 494 [AIX 5.2 and 5.3 (and presumably newer) require this]) 495 AC_DEFINE([PTY_ZEROREAD], [1], [read(1) can return 0 for a non-closed fd]) | 300 features.h \ 301 fcntl.h \ 302 floatingpoint.h \ 303 getopt.h \ 304 glob.h \ 305 ia.h \ 306 iaf.h \ 307 limits.h \ --- 167 unchanged lines hidden (view full) --- 475 AC_DEFINE([LOGIN_NEEDS_UTMPX], [1], 476 [Some systems need a utmpx entry for /bin/login to work]) 477 AC_DEFINE([SPT_TYPE], [SPT_REUSEARGV], 478 [Define to a Set Process Title type if your system is 479 supported by bsd-setproctitle.c]) 480 AC_DEFINE([SSHPAM_CHAUTHTOK_NEEDS_RUID], [1], 481 [AIX 5.2 and 5.3 (and presumably newer) require this]) 482 AC_DEFINE([PTY_ZEROREAD], [1], [read(1) can return 0 for a non-closed fd]) |
483 AC_DEFINE([PLATFORM_SYS_DIR_UID], 2, [System dirs owned by bin (uid 2)]) |
|
496 ;; 497*-*-cygwin*) 498 check_for_libcrypt_later=1 499 LIBS="$LIBS /usr/lib/textreadmode.o" 500 AC_DEFINE([HAVE_CYGWIN], [1], [Define if you are on Cygwin]) 501 AC_DEFINE([USE_PIPES], [1], [Use PIPES instead of a socketpair()]) 502 AC_DEFINE([DISABLE_SHADOW], [1], 503 [Define if you want to disable shadow passwords]) --- 69 unchanged lines hidden (view full) --- 573 IPADDR_IN_DISPLAY=yes 574 AC_DEFINE([USE_PIPES]) 575 AC_DEFINE([LOGIN_NO_ENDOPT], [1], 576 [Define if your login program cannot handle end of options ("--")]) 577 AC_DEFINE([LOGIN_NEEDS_UTMPX]) 578 AC_DEFINE([LOCKED_PASSWD_STRING], ["*"], 579 [String used in /etc/passwd to denote locked account]) 580 AC_DEFINE([SPT_TYPE], [SPT_PSTAT]) | 484 ;; 485*-*-cygwin*) 486 check_for_libcrypt_later=1 487 LIBS="$LIBS /usr/lib/textreadmode.o" 488 AC_DEFINE([HAVE_CYGWIN], [1], [Define if you are on Cygwin]) 489 AC_DEFINE([USE_PIPES], [1], [Use PIPES instead of a socketpair()]) 490 AC_DEFINE([DISABLE_SHADOW], [1], 491 [Define if you want to disable shadow passwords]) --- 69 unchanged lines hidden (view full) --- 561 IPADDR_IN_DISPLAY=yes 562 AC_DEFINE([USE_PIPES]) 563 AC_DEFINE([LOGIN_NO_ENDOPT], [1], 564 [Define if your login program cannot handle end of options ("--")]) 565 AC_DEFINE([LOGIN_NEEDS_UTMPX]) 566 AC_DEFINE([LOCKED_PASSWD_STRING], ["*"], 567 [String used in /etc/passwd to denote locked account]) 568 AC_DEFINE([SPT_TYPE], [SPT_PSTAT]) |
569 AC_DEFINE([PLATFORM_SYS_DIR_UID], 2, [System dirs owned by bin (uid 2)]) |
|
581 maildir="/var/mail" 582 LIBS="$LIBS -lsec" 583 AC_CHECK_LIB([xnet], [t_error], , 584 [AC_MSG_ERROR([*** -lxnet needed on HP-UX - check config.log ***])]) 585 586 # next, we define all of the options specific to major releases 587 case "$host" in 588 *-*-hpux10*) --- 95 unchanged lines hidden (view full) --- 684 AC_DEFINE([SSH_TUN_COMPAT_AF], [1], 685 [Use tunnel device compatibility to OpenBSD]) 686 AC_DEFINE([SSH_TUN_PREPEND_AF], [1], 687 [Prepend the address family to IP tunnel traffic]) 688 fi 689 AC_CHECK_HEADERS([linux/seccomp.h linux/filter.h linux/audit.h], [], 690 [], [#include <linux/types.h>]) 691 AC_CHECK_FUNCS([prctl]) | 570 maildir="/var/mail" 571 LIBS="$LIBS -lsec" 572 AC_CHECK_LIB([xnet], [t_error], , 573 [AC_MSG_ERROR([*** -lxnet needed on HP-UX - check config.log ***])]) 574 575 # next, we define all of the options specific to major releases 576 case "$host" in 577 *-*-hpux10*) --- 95 unchanged lines hidden (view full) --- 673 AC_DEFINE([SSH_TUN_COMPAT_AF], [1], 674 [Use tunnel device compatibility to OpenBSD]) 675 AC_DEFINE([SSH_TUN_PREPEND_AF], [1], 676 [Prepend the address family to IP tunnel traffic]) 677 fi 678 AC_CHECK_HEADERS([linux/seccomp.h linux/filter.h linux/audit.h], [], 679 [], [#include <linux/types.h>]) 680 AC_CHECK_FUNCS([prctl]) |
692 have_seccomp_audit_arch=1 | 681 AC_MSG_CHECKING([for seccomp architecture]) 682 seccomp_audit_arch= |
693 case "$host" in 694 x86_64-*) | 683 case "$host" in 684 x86_64-*) |
695 AC_DEFINE([SECCOMP_AUDIT_ARCH], [AUDIT_ARCH_X86_64], 696 [Specify the system call convention in use]) | 685 seccomp_audit_arch=AUDIT_ARCH_X86_64 |
697 ;; 698 i*86-*) | 686 ;; 687 i*86-*) |
699 AC_DEFINE([SECCOMP_AUDIT_ARCH], [AUDIT_ARCH_I386], 700 [Specify the system call convention in use]) | 688 seccomp_audit_arch=AUDIT_ARCH_I386 |
701 ;; | 689 ;; |
702 *) 703 have_seccomp_audit_arch=0 704 ;; | 690 arm*-*) 691 seccomp_audit_arch=AUDIT_ARCH_ARM 692 ;; |
705 esac | 693 esac |
694 if test "x$seccomp_audit_arch" != "x" ; then 695 AC_MSG_RESULT(["$seccomp_audit_arch"]) 696 AC_DEFINE_UNQUOTED([SECCOMP_AUDIT_ARCH], [$seccomp_audit_arch], 697 [Specify the system call convention in use]) 698 else 699 AC_MSG_RESULT([architecture not supported]) 700 fi |
|
706 ;; 707mips-sony-bsd|mips-sony-newsos4) 708 AC_DEFINE([NEED_SETPGRP], [1], [Need setpgrp to acquire controlling tty]) 709 SONY=1 710 ;; 711*-*-netbsd*) 712 check_for_libcrypt_before=1 713 if test "x$withval" != "xno" ; then --- 7 unchanged lines hidden (view full) --- 721 ;; 722*-*-freebsd*) 723 check_for_libcrypt_later=1 724 AC_DEFINE([LOCKED_PASSWD_PREFIX], ["*LOCKED*"], [Account locked with pw(1)]) 725 AC_DEFINE([SSH_TUN_FREEBSD], [1], [Open tunnel devices the FreeBSD way]) 726 AC_CHECK_HEADER([net/if_tap.h], , 727 AC_DEFINE([SSH_TUN_NO_L2], [1], [No layer 2 tunnel support])) 728 AC_DEFINE([BROKEN_GLOB], [1], [FreeBSD glob does not do what we need]) | 701 ;; 702mips-sony-bsd|mips-sony-newsos4) 703 AC_DEFINE([NEED_SETPGRP], [1], [Need setpgrp to acquire controlling tty]) 704 SONY=1 705 ;; 706*-*-netbsd*) 707 check_for_libcrypt_before=1 708 if test "x$withval" != "xno" ; then --- 7 unchanged lines hidden (view full) --- 716 ;; 717*-*-freebsd*) 718 check_for_libcrypt_later=1 719 AC_DEFINE([LOCKED_PASSWD_PREFIX], ["*LOCKED*"], [Account locked with pw(1)]) 720 AC_DEFINE([SSH_TUN_FREEBSD], [1], [Open tunnel devices the FreeBSD way]) 721 AC_CHECK_HEADER([net/if_tap.h], , 722 AC_DEFINE([SSH_TUN_NO_L2], [1], [No layer 2 tunnel support])) 723 AC_DEFINE([BROKEN_GLOB], [1], [FreeBSD glob does not do what we need]) |
724 AC_DEFINE([BROKEN_STRNVIS], [1], [FreeBSD strnvis does not do what we need]) |
|
729 ;; 730*-*-bsdi*) 731 AC_DEFINE([SETEUID_BREAKS_SETUID]) 732 AC_DEFINE([BROKEN_SETREUID]) 733 AC_DEFINE([BROKEN_SETREGID]) 734 ;; 735*-next-*) 736 conf_lastlog_location="/usr/adm/lastlog" --- 160 unchanged lines hidden (view full) --- 897 AC_DEFINE([BROKEN_SETREUID]) 898 AC_DEFINE([BROKEN_SETREGID]) 899 AC_DEFINE([WITH_ABBREV_NO_TTY]) 900 AC_DEFINE([BROKEN_UPDWTMPX]) 901 AC_DEFINE([PASSWD_NEEDS_USERNAME]) 902 AC_CHECK_FUNCS([getluid setluid]) 903 MANTYPE=man 904 TEST_SHELL=ksh | 725 ;; 726*-*-bsdi*) 727 AC_DEFINE([SETEUID_BREAKS_SETUID]) 728 AC_DEFINE([BROKEN_SETREUID]) 729 AC_DEFINE([BROKEN_SETREGID]) 730 ;; 731*-next-*) 732 conf_lastlog_location="/usr/adm/lastlog" --- 160 unchanged lines hidden (view full) --- 893 AC_DEFINE([BROKEN_SETREUID]) 894 AC_DEFINE([BROKEN_SETREGID]) 895 AC_DEFINE([WITH_ABBREV_NO_TTY]) 896 AC_DEFINE([BROKEN_UPDWTMPX]) 897 AC_DEFINE([PASSWD_NEEDS_USERNAME]) 898 AC_CHECK_FUNCS([getluid setluid]) 899 MANTYPE=man 900 TEST_SHELL=ksh |
901 SKIP_DISABLE_LASTLOG_DEFINE=yes |
|
905 ;; 906*-*-unicosmk*) 907 AC_DEFINE([NO_SSH_LASTLOG], [1], 908 [Define if you don't want to use lastlog in session.c]) 909 AC_DEFINE([SETEUID_BREAKS_SETUID]) 910 AC_DEFINE([BROKEN_SETREUID]) 911 AC_DEFINE([BROKEN_SETREGID]) 912 AC_DEFINE([USE_PIPES]) --- 252 unchanged lines hidden (view full) --- 1165 [], [ AC_CHECK_LIB([resolv], [strcasecmp], [LIBS="$LIBS -lresolv"]) ] 1166) 1167AC_CHECK_FUNCS([utimes], 1168 [], [ AC_CHECK_LIB([c89], [utimes], [AC_DEFINE([HAVE_UTIMES]) 1169 LIBS="$LIBS -lc89"]) ] 1170) 1171 1172dnl Checks for libutil functions | 902 ;; 903*-*-unicosmk*) 904 AC_DEFINE([NO_SSH_LASTLOG], [1], 905 [Define if you don't want to use lastlog in session.c]) 906 AC_DEFINE([SETEUID_BREAKS_SETUID]) 907 AC_DEFINE([BROKEN_SETREUID]) 908 AC_DEFINE([BROKEN_SETREGID]) 909 AC_DEFINE([USE_PIPES]) --- 252 unchanged lines hidden (view full) --- 1162 [], [ AC_CHECK_LIB([resolv], [strcasecmp], [LIBS="$LIBS -lresolv"]) ] 1163) 1164AC_CHECK_FUNCS([utimes], 1165 [], [ AC_CHECK_LIB([c89], [utimes], [AC_DEFINE([HAVE_UTIMES]) 1166 LIBS="$LIBS -lc89"]) ] 1167) 1168 1169dnl Checks for libutil functions |
1173AC_CHECK_HEADERS([libutil.h]) | 1170AC_CHECK_HEADERS([bsd/libutil.h libutil.h]) |
1174AC_SEARCH_LIBS([fmt_scaled], [util bsd]) 1175AC_SEARCH_LIBS([login], [util bsd]) 1176AC_SEARCH_LIBS([logout], [util bsd]) 1177AC_SEARCH_LIBS([logwtmp], [util bsd]) 1178AC_SEARCH_LIBS([openpty], [util bsd]) 1179AC_SEARCH_LIBS([updwtmp], [util bsd]) 1180AC_CHECK_FUNCS([fmt_scaled login logout openpty updwtmp logwtmp]) 1181 --- 352 unchanged lines hidden (view full) --- 1534 futimes \ 1535 getaddrinfo \ 1536 getcwd \ 1537 getgrouplist \ 1538 getnameinfo \ 1539 getopt \ 1540 getpeereid \ 1541 getpeerucred \ | 1171AC_SEARCH_LIBS([fmt_scaled], [util bsd]) 1172AC_SEARCH_LIBS([login], [util bsd]) 1173AC_SEARCH_LIBS([logout], [util bsd]) 1174AC_SEARCH_LIBS([logwtmp], [util bsd]) 1175AC_SEARCH_LIBS([openpty], [util bsd]) 1176AC_SEARCH_LIBS([updwtmp], [util bsd]) 1177AC_CHECK_FUNCS([fmt_scaled login logout openpty updwtmp logwtmp]) 1178 --- 352 unchanged lines hidden (view full) --- 1531 futimes \ 1532 getaddrinfo \ 1533 getcwd \ 1534 getgrouplist \ 1535 getnameinfo \ 1536 getopt \ 1537 getpeereid \ 1538 getpeerucred \ |
1539 getpgid \ 1540 getpgrp \ |
|
1542 _getpty \ 1543 getrlimit \ 1544 getttyent \ 1545 glob \ 1546 group_from_gid \ 1547 inet_aton \ 1548 inet_ntoa \ 1549 inet_ntop \ --- 43 unchanged lines hidden (view full) --- 1593 strlcpy \ 1594 strmode \ 1595 strnlen \ 1596 strnvis \ 1597 strptime \ 1598 strtonum \ 1599 strtoll \ 1600 strtoul \ | 1541 _getpty \ 1542 getrlimit \ 1543 getttyent \ 1544 glob \ 1545 group_from_gid \ 1546 inet_aton \ 1547 inet_ntoa \ 1548 inet_ntop \ --- 43 unchanged lines hidden (view full) --- 1592 strlcpy \ 1593 strmode \ 1594 strnlen \ 1595 strnvis \ 1596 strptime \ 1597 strtonum \ 1598 strtoll \ 1599 strtoul \ |
1600 strtoull \ |
|
1601 swap32 \ 1602 sysconf \ 1603 tcgetpgrp \ 1604 timingsafe_bcmp \ 1605 truncate \ 1606 unsetenv \ 1607 updwtmpx \ 1608 user_from_uid \ | 1601 swap32 \ 1602 sysconf \ 1603 tcgetpgrp \ 1604 timingsafe_bcmp \ 1605 truncate \ 1606 unsetenv \ 1607 updwtmpx \ 1608 user_from_uid \ |
1609 usleep \ |
|
1609 vasprintf \ 1610 vhangup \ 1611 vsnprintf \ 1612 waitpid \ 1613]) 1614 1615AC_LINK_IFELSE( 1616 [AC_LANG_PROGRAM( --- 677 unchanged lines hidden (view full) --- 2294 ], 2295 [ 2296 AC_MSG_RESULT([yes]) 2297 AC_DEFINE([OPENSSL_LOBOTOMISED_AES], [1], 2298 [libcrypto is missing AES 192 and 256 bit functions]) 2299 ] 2300) 2301 | 1610 vasprintf \ 1611 vhangup \ 1612 vsnprintf \ 1613 waitpid \ 1614]) 1615 1616AC_LINK_IFELSE( 1617 [AC_LANG_PROGRAM( --- 677 unchanged lines hidden (view full) --- 2295 ], 2296 [ 2297 AC_MSG_RESULT([yes]) 2298 AC_DEFINE([OPENSSL_LOBOTOMISED_AES], [1], 2299 [libcrypto is missing AES 192 and 256 bit functions]) 2300 ] 2301) 2302 |
2303# Check for OpenSSL with EVP_aes_*ctr 2304AC_MSG_CHECKING([whether OpenSSL has AES CTR via EVP]) 2305AC_LINK_IFELSE( 2306 [AC_LANG_PROGRAM([[ 2307#include <string.h> 2308#include <openssl/evp.h> 2309 ]], [[ 2310 exit(EVP_aes_128_ctr() == NULL || 2311 EVP_aes_192_cbc() == NULL || 2312 EVP_aes_256_cbc() == NULL); 2313 ]])], 2314 [ 2315 AC_MSG_RESULT([yes]) 2316 AC_DEFINE([OPENSSL_HAVE_EVPCTR], [1], 2317 [libcrypto has EVP AES CTR]) 2318 ], 2319 [ 2320 AC_MSG_RESULT([no]) 2321 ] 2322) 2323 2324# Check for OpenSSL with EVP_aes_*gcm 2325AC_MSG_CHECKING([whether OpenSSL has AES GCM via EVP]) 2326AC_LINK_IFELSE( 2327 [AC_LANG_PROGRAM([[ 2328#include <string.h> 2329#include <openssl/evp.h> 2330 ]], [[ 2331 exit(EVP_aes_128_gcm() == NULL || 2332 EVP_aes_256_gcm() == NULL || 2333 EVP_CTRL_GCM_SET_IV_FIXED == 0 || 2334 EVP_CTRL_GCM_IV_GEN == 0 || 2335 EVP_CTRL_GCM_SET_TAG == 0 || 2336 EVP_CTRL_GCM_GET_TAG == 0 || 2337 EVP_CIPHER_CTX_ctrl(NULL, 0, 0, NULL) == 0); 2338 ]])], 2339 [ 2340 AC_MSG_RESULT([yes]) 2341 AC_DEFINE([OPENSSL_HAVE_EVPGCM], [1], 2342 [libcrypto has EVP AES GCM]) 2343 ], 2344 [ 2345 AC_MSG_RESULT([no]) 2346 ] 2347) 2348 2349AC_SEARCH_LIBS([EVP_CIPHER_CTX_ctrl], [crypto], 2350 [AC_DEFINE([HAVE_EVP_CIPHER_CTX_CTRL], [1], 2351 [Define if libcrypto has EVP_CIPHER_CTX_ctrl])]) 2352 |
|
2302AC_MSG_CHECKING([if EVP_DigestUpdate returns an int]) 2303AC_LINK_IFELSE( 2304 [AC_LANG_PROGRAM([[ 2305#include <string.h> 2306#include <openssl/evp.h> 2307 ]], [[ 2308 if(EVP_DigestUpdate(NULL, NULL,0)) 2309 exit(0); --- 250 unchanged lines hidden (view full) --- 2560 SSH_PRIVSEP_USER=$withval 2561 fi 2562 ] 2563) 2564AC_DEFINE_UNQUOTED([SSH_PRIVSEP_USER], ["$SSH_PRIVSEP_USER"], 2565 [non-privileged user for privilege separation]) 2566AC_SUBST([SSH_PRIVSEP_USER]) 2567 | 2353AC_MSG_CHECKING([if EVP_DigestUpdate returns an int]) 2354AC_LINK_IFELSE( 2355 [AC_LANG_PROGRAM([[ 2356#include <string.h> 2357#include <openssl/evp.h> 2358 ]], [[ 2359 if(EVP_DigestUpdate(NULL, NULL,0)) 2360 exit(0); --- 250 unchanged lines hidden (view full) --- 2611 SSH_PRIVSEP_USER=$withval 2612 fi 2613 ] 2614) 2615AC_DEFINE_UNQUOTED([SSH_PRIVSEP_USER], ["$SSH_PRIVSEP_USER"], 2616 [non-privileged user for privilege separation]) 2617AC_SUBST([SSH_PRIVSEP_USER]) 2618 |
2619if test "x$have_linux_no_new_privs" = "x1" ; then 2620AC_CHECK_DECL([SECCOMP_MODE_FILTER], [have_seccomp_filter=1], , [ 2621 #include <sys/types.h> 2622 #include <linux/seccomp.h> 2623]) 2624fi 2625if test "x$have_seccomp_filter" = "x1" ; then 2626AC_MSG_CHECKING([kernel for seccomp_filter support]) 2627AC_LINK_IFELSE([AC_LANG_PROGRAM([[ 2628 #include <errno.h> 2629 #include <elf.h> 2630 #include <linux/audit.h> 2631 #include <linux/seccomp.h> 2632 #include <stdlib.h> 2633 #include <sys/prctl.h> 2634 ]], 2635 [[ int i = $seccomp_audit_arch; 2636 errno = 0; 2637 prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, NULL, 0, 0); 2638 exit(errno == EFAULT ? 0 : 1); ]])], 2639 [ AC_MSG_RESULT([yes]) ], [ 2640 AC_MSG_RESULT([no]) 2641 # Disable seccomp filter as a target 2642 have_seccomp_filter=0 2643 ] 2644) 2645fi 2646 |
|
2568# Decide which sandbox style to use 2569sandbox_arg="" 2570AC_ARG_WITH([sandbox], 2571 [ --with-sandbox=style Specify privilege separation sandbox (no, darwin, rlimit, systrace, seccomp_filter)], 2572 [ 2573 if test "x$withval" = "xyes" ; then 2574 sandbox_arg="" 2575 else --- 18 unchanged lines hidden (view full) --- 2594#endif 2595#include <errno.h> 2596#include <fcntl.h> 2597#include <stdlib.h> 2598 ]],[[ 2599 struct rlimit rl_zero; 2600 int fd, r; 2601 fd_set fds; | 2647# Decide which sandbox style to use 2648sandbox_arg="" 2649AC_ARG_WITH([sandbox], 2650 [ --with-sandbox=style Specify privilege separation sandbox (no, darwin, rlimit, systrace, seccomp_filter)], 2651 [ 2652 if test "x$withval" = "xyes" ; then 2653 sandbox_arg="" 2654 else --- 18 unchanged lines hidden (view full) --- 2673#endif 2674#include <errno.h> 2675#include <fcntl.h> 2676#include <stdlib.h> 2677 ]],[[ 2678 struct rlimit rl_zero; 2679 int fd, r; 2680 fd_set fds; |
2681 struct timeval tv; |
|
2602 2603 fd = open("/dev/null", O_RDONLY); 2604 FD_ZERO(&fds); 2605 FD_SET(fd, &fds); 2606 rl_zero.rlim_cur = rl_zero.rlim_max = 0; 2607 setrlimit(RLIMIT_FSIZE, &rl_zero); 2608 setrlimit(RLIMIT_NOFILE, &rl_zero); | 2682 2683 fd = open("/dev/null", O_RDONLY); 2684 FD_ZERO(&fds); 2685 FD_SET(fd, &fds); 2686 rl_zero.rlim_cur = rl_zero.rlim_max = 0; 2687 setrlimit(RLIMIT_FSIZE, &rl_zero); 2688 setrlimit(RLIMIT_NOFILE, &rl_zero); |
2609 r = select(fd+1, &fds, NULL, NULL, NULL); | 2689 tv.tv_sec = 1; 2690 tv.tv_usec = 0; 2691 r = select(fd+1, &fds, NULL, NULL, &tv); |
2610 exit (r == -1 ? 1 : 0); 2611 ]])], 2612 [AC_MSG_RESULT([yes]) 2613 select_works_with_rlimit=yes], 2614 [AC_MSG_RESULT([no]) 2615 select_works_with_rlimit=no], 2616 [AC_MSG_WARN([cross compiling: assuming yes])] 2617) 2618 | 2692 exit (r == -1 ? 1 : 0); 2693 ]])], 2694 [AC_MSG_RESULT([yes]) 2695 select_works_with_rlimit=yes], 2696 [AC_MSG_RESULT([no]) 2697 select_works_with_rlimit=no], 2698 [AC_MSG_WARN([cross compiling: assuming yes])] 2699) 2700 |
2701AC_MSG_CHECKING([if setrlimit(RLIMIT_NOFILE,{0,0}) works]) 2702AC_RUN_IFELSE( 2703 [AC_LANG_PROGRAM([[ 2704#include <sys/types.h> 2705#ifdef HAVE_SYS_TIME_H 2706# include <sys/time.h> 2707#endif 2708#include <sys/resource.h> 2709#include <errno.h> 2710#include <stdlib.h> 2711 ]],[[ 2712 struct rlimit rl_zero; 2713 int fd, r; 2714 fd_set fds; 2715 2716 rl_zero.rlim_cur = rl_zero.rlim_max = 0; 2717 r = setrlimit(RLIMIT_NOFILE, &rl_zero); 2718 exit (r == -1 ? 1 : 0); 2719 ]])], 2720 [AC_MSG_RESULT([yes]) 2721 rlimit_nofile_zero_works=yes], 2722 [AC_MSG_RESULT([no]) 2723 rlimit_nofile_zero_works=no], 2724 [AC_MSG_WARN([cross compiling: assuming yes])] 2725) 2726 |
|
2619AC_MSG_CHECKING([if setrlimit RLIMIT_FSIZE works]) 2620AC_RUN_IFELSE( 2621 [AC_LANG_PROGRAM([[ 2622#include <sys/types.h> 2623#include <sys/resource.h> 2624#include <stdlib.h> 2625 ]],[[ 2626 struct rlimit rl_zero; --- 20 unchanged lines hidden (view full) --- 2647 test "x$ac_cv_func_sandbox_init" != "xyes" -o \ 2648 "x$ac_cv_header_sandbox_h" != "xyes" && \ 2649 AC_MSG_ERROR([Darwin seatbelt sandbox requires sandbox.h and sandbox_init function]) 2650 SANDBOX_STYLE="darwin" 2651 AC_DEFINE([SANDBOX_DARWIN], [1], [Sandbox using Darwin sandbox_init(3)]) 2652elif test "x$sandbox_arg" = "xseccomp_filter" || \ 2653 ( test -z "$sandbox_arg" && \ 2654 test "x$have_seccomp_filter" = "x1" && \ | 2727AC_MSG_CHECKING([if setrlimit RLIMIT_FSIZE works]) 2728AC_RUN_IFELSE( 2729 [AC_LANG_PROGRAM([[ 2730#include <sys/types.h> 2731#include <sys/resource.h> 2732#include <stdlib.h> 2733 ]],[[ 2734 struct rlimit rl_zero; --- 20 unchanged lines hidden (view full) --- 2755 test "x$ac_cv_func_sandbox_init" != "xyes" -o \ 2756 "x$ac_cv_header_sandbox_h" != "xyes" && \ 2757 AC_MSG_ERROR([Darwin seatbelt sandbox requires sandbox.h and sandbox_init function]) 2758 SANDBOX_STYLE="darwin" 2759 AC_DEFINE([SANDBOX_DARWIN], [1], [Sandbox using Darwin sandbox_init(3)]) 2760elif test "x$sandbox_arg" = "xseccomp_filter" || \ 2761 ( test -z "$sandbox_arg" && \ 2762 test "x$have_seccomp_filter" = "x1" && \ |
2763 test "x$ac_cv_header_elf_h" = "xyes" && \ |
|
2655 test "x$ac_cv_header_linux_audit_h" = "xyes" && \ | 2764 test "x$ac_cv_header_linux_audit_h" = "xyes" && \ |
2656 test "x$have_seccomp_audit_arch" = "x1" && \ | 2765 test "x$ac_cv_header_linux_filter_h" = "xyes" && \ 2766 test "x$seccomp_audit_arch" != "x" && \ |
2657 test "x$have_linux_no_new_privs" = "x1" && \ 2658 test "x$ac_cv_func_prctl" = "xyes" ) ; then | 2767 test "x$have_linux_no_new_privs" = "x1" && \ 2768 test "x$ac_cv_func_prctl" = "xyes" ) ; then |
2659 test "x$have_seccomp_audit_arch" != "x1" && \ | 2769 test "x$seccomp_audit_arch" = "x" && \ |
2660 AC_MSG_ERROR([seccomp_filter sandbox not supported on $host]) 2661 test "x$have_linux_no_new_privs" != "x1" && \ 2662 AC_MSG_ERROR([seccomp_filter sandbox requires PR_SET_NO_NEW_PRIVS]) 2663 test "x$have_seccomp_filter" != "x1" && \ 2664 AC_MSG_ERROR([seccomp_filter sandbox requires seccomp headers]) 2665 test "x$ac_cv_func_prctl" != "xyes" && \ 2666 AC_MSG_ERROR([seccomp_filter sandbox requires prctl function]) 2667 SANDBOX_STYLE="seccomp_filter" 2668 AC_DEFINE([SANDBOX_SECCOMP_FILTER], [1], [Sandbox using seccomp filter]) 2669elif test "x$sandbox_arg" = "xrlimit" || \ 2670 ( test -z "$sandbox_arg" && test "x$ac_cv_func_setrlimit" = "xyes" && \ | 2770 AC_MSG_ERROR([seccomp_filter sandbox not supported on $host]) 2771 test "x$have_linux_no_new_privs" != "x1" && \ 2772 AC_MSG_ERROR([seccomp_filter sandbox requires PR_SET_NO_NEW_PRIVS]) 2773 test "x$have_seccomp_filter" != "x1" && \ 2774 AC_MSG_ERROR([seccomp_filter sandbox requires seccomp headers]) 2775 test "x$ac_cv_func_prctl" != "xyes" && \ 2776 AC_MSG_ERROR([seccomp_filter sandbox requires prctl function]) 2777 SANDBOX_STYLE="seccomp_filter" 2778 AC_DEFINE([SANDBOX_SECCOMP_FILTER], [1], [Sandbox using seccomp filter]) 2779elif test "x$sandbox_arg" = "xrlimit" || \ 2780 ( test -z "$sandbox_arg" && test "x$ac_cv_func_setrlimit" = "xyes" && \ |
2671 test "x$select_works_with_rlimit" == "xyes" ) ; then | 2781 test "x$select_works_with_rlimit" = "xyes" && \ 2782 test "x$rlimit_nofile_zero_works" = "xyes" ) ; then |
2672 test "x$ac_cv_func_setrlimit" != "xyes" && \ 2673 AC_MSG_ERROR([rlimit sandbox requires setrlimit function]) 2674 test "x$select_works_with_rlimit" != "xyes" && \ 2675 AC_MSG_ERROR([rlimit sandbox requires select to work with rlimit]) 2676 SANDBOX_STYLE="rlimit" 2677 AC_DEFINE([SANDBOX_RLIMIT], [1], [Sandbox using setrlimit(2)]) 2678elif test -z "$sandbox_arg" || test "x$sandbox_arg" = "xno" || \ 2679 test "x$sandbox_arg" = "xnone" || test "x$sandbox_arg" = "xnull" ; then --- 875 unchanged lines hidden (view full) --- 3555 3556 AC_DEFINE([KRB5], [1], [Define if you want Kerberos 5 support]) 3557 KRB5_MSG="yes" 3558 3559 AC_PATH_PROG([KRB5CONF], [krb5-config], 3560 [$KRB5ROOT/bin/krb5-config], 3561 [$KRB5ROOT/bin:$PATH]) 3562 if test -x $KRB5CONF ; then | 2783 test "x$ac_cv_func_setrlimit" != "xyes" && \ 2784 AC_MSG_ERROR([rlimit sandbox requires setrlimit function]) 2785 test "x$select_works_with_rlimit" != "xyes" && \ 2786 AC_MSG_ERROR([rlimit sandbox requires select to work with rlimit]) 2787 SANDBOX_STYLE="rlimit" 2788 AC_DEFINE([SANDBOX_RLIMIT], [1], [Sandbox using setrlimit(2)]) 2789elif test -z "$sandbox_arg" || test "x$sandbox_arg" = "xno" || \ 2790 test "x$sandbox_arg" = "xnone" || test "x$sandbox_arg" = "xnull" ; then --- 875 unchanged lines hidden (view full) --- 3666 3667 AC_DEFINE([KRB5], [1], [Define if you want Kerberos 5 support]) 3668 KRB5_MSG="yes" 3669 3670 AC_PATH_PROG([KRB5CONF], [krb5-config], 3671 [$KRB5ROOT/bin/krb5-config], 3672 [$KRB5ROOT/bin:$PATH]) 3673 if test -x $KRB5CONF ; then |
3674 K5CFLAGS="`$KRB5CONF --cflags`" 3675 K5LIBS="`$KRB5CONF --libs`" 3676 CPPFLAGS="$CPPFLAGS $K5CFLAGS" |
|
3563 3564 AC_MSG_CHECKING([for gssapi support]) 3565 if $KRB5CONF | grep gssapi >/dev/null ; then 3566 AC_MSG_RESULT([yes]) 3567 AC_DEFINE([GSSAPI], [1], 3568 [Define this if you want GSSAPI 3569 support in the version 2 protocol]) | 3677 3678 AC_MSG_CHECKING([for gssapi support]) 3679 if $KRB5CONF | grep gssapi >/dev/null ; then 3680 AC_MSG_RESULT([yes]) 3681 AC_DEFINE([GSSAPI], [1], 3682 [Define this if you want GSSAPI 3683 support in the version 2 protocol]) |
3570 k5confopts=gssapi | 3684 GSSCFLAGS="`$KRB5CONF --cflags gssapi`" 3685 GSSLIBS="`$KRB5CONF --libs gssapi`" 3686 CPPFLAGS="$CPPFLAGS $GSSCFLAGS" |
3571 else 3572 AC_MSG_RESULT([no]) | 3687 else 3688 AC_MSG_RESULT([no]) |
3573 k5confopts="" | |
3574 fi | 3689 fi |
3575 K5CFLAGS="`$KRB5CONF --cflags $k5confopts`" 3576 K5LIBS="`$KRB5CONF --libs $k5confopts`" 3577 CPPFLAGS="$CPPFLAGS $K5CFLAGS" | |
3578 AC_MSG_CHECKING([whether we are using Heimdal]) 3579 AC_COMPILE_IFELSE([AC_LANG_PROGRAM([[ #include <krb5.h> 3580 ]], [[ char *tmp = heimdal_version; ]])], 3581 [ AC_MSG_RESULT([yes]) 3582 AC_DEFINE([HEIMDAL], [1], 3583 [Define this if you are using the Heimdal 3584 version of Kerberos V5]) ], 3585 [AC_MSG_RESULT([no]) --- 15 unchanged lines hidden (view full) --- 3601 ], [ AC_MSG_RESULT([no]) 3602 K5LIBS="-lkrb5 -lk5crypto -lcom_err" 3603 3604 ]) 3605 AC_SEARCH_LIBS([dn_expand], [resolv]) 3606 3607 AC_CHECK_LIB([gssapi_krb5], [gss_init_sec_context], 3608 [ AC_DEFINE([GSSAPI]) | 3690 AC_MSG_CHECKING([whether we are using Heimdal]) 3691 AC_COMPILE_IFELSE([AC_LANG_PROGRAM([[ #include <krb5.h> 3692 ]], [[ char *tmp = heimdal_version; ]])], 3693 [ AC_MSG_RESULT([yes]) 3694 AC_DEFINE([HEIMDAL], [1], 3695 [Define this if you are using the Heimdal 3696 version of Kerberos V5]) ], 3697 [AC_MSG_RESULT([no]) --- 15 unchanged lines hidden (view full) --- 3713 ], [ AC_MSG_RESULT([no]) 3714 K5LIBS="-lkrb5 -lk5crypto -lcom_err" 3715 3716 ]) 3717 AC_SEARCH_LIBS([dn_expand], [resolv]) 3718 3719 AC_CHECK_LIB([gssapi_krb5], [gss_init_sec_context], 3720 [ AC_DEFINE([GSSAPI]) |
3609 K5LIBS="-lgssapi_krb5 $K5LIBS" ], | 3721 GSSLIBS="-lgssapi_krb5" ], |
3610 [ AC_CHECK_LIB([gssapi], [gss_init_sec_context], 3611 [ AC_DEFINE([GSSAPI]) | 3722 [ AC_CHECK_LIB([gssapi], [gss_init_sec_context], 3723 [ AC_DEFINE([GSSAPI]) |
3612 K5LIBS="-lgssapi $K5LIBS" ], 3613 AC_MSG_WARN([Cannot find any suitable gss-api library - build may fail]), 3614 $K5LIBS) 3615 ], 3616 $K5LIBS) | 3724 GSSLIBS="-lgssapi" ], 3725 [ AC_CHECK_LIB([gss], [gss_init_sec_context], 3726 [ AC_DEFINE([GSSAPI]) 3727 GSSLIBS="-lgss" ], 3728 AC_MSG_WARN([Cannot find any suitable gss-api library - build may fail])) 3729 ]) 3730 ]) |
3617 3618 AC_CHECK_HEADER([gssapi.h], , 3619 [ unset ac_cv_header_gssapi_h 3620 CPPFLAGS="$CPPFLAGS -I${KRB5ROOT}/include/gssapi" 3621 AC_CHECK_HEADERS([gssapi.h], , 3622 AC_MSG_WARN([Cannot find any suitable gss-api header - build may fail]) 3623 ) 3624 ] --- 11 unchanged lines hidden (view full) --- 3636 if test ! -z "$blibpath" ; then 3637 blibpath="$blibpath:${KRB5ROOT}/lib" 3638 fi 3639 3640 AC_CHECK_HEADERS([gssapi.h gssapi/gssapi.h]) 3641 AC_CHECK_HEADERS([gssapi_krb5.h gssapi/gssapi_krb5.h]) 3642 AC_CHECK_HEADERS([gssapi_generic.h gssapi/gssapi_generic.h]) 3643 | 3731 3732 AC_CHECK_HEADER([gssapi.h], , 3733 [ unset ac_cv_header_gssapi_h 3734 CPPFLAGS="$CPPFLAGS -I${KRB5ROOT}/include/gssapi" 3735 AC_CHECK_HEADERS([gssapi.h], , 3736 AC_MSG_WARN([Cannot find any suitable gss-api header - build may fail]) 3737 ) 3738 ] --- 11 unchanged lines hidden (view full) --- 3750 if test ! -z "$blibpath" ; then 3751 blibpath="$blibpath:${KRB5ROOT}/lib" 3752 fi 3753 3754 AC_CHECK_HEADERS([gssapi.h gssapi/gssapi.h]) 3755 AC_CHECK_HEADERS([gssapi_krb5.h gssapi/gssapi_krb5.h]) 3756 AC_CHECK_HEADERS([gssapi_generic.h gssapi/gssapi_generic.h]) 3757 |
3644 LIBS="$LIBS $K5LIBS" | |
3645 AC_SEARCH_LIBS([k_hasafs], [kafs], [AC_DEFINE([USE_AFS], [1], 3646 [Define this if you want to use libkafs' AFS support])]) | 3758 AC_SEARCH_LIBS([k_hasafs], [kafs], [AC_DEFINE([USE_AFS], [1], 3759 [Define this if you want to use libkafs' AFS support])]) |
3760 3761 AC_CHECK_DECLS([GSS_C_NT_HOSTBASED_SERVICE], [], [], [[ 3762#ifdef HAVE_GSSAPI_H 3763# include <gssapi.h> 3764#elif defined(HAVE_GSSAPI_GSSAPI_H) 3765# include <gssapi/gssapi.h> 3766#endif 3767 3768#ifdef HAVE_GSSAPI_GENERIC_H 3769# include <gssapi_generic.h> 3770#elif defined(HAVE_GSSAPI_GSSAPI_GENERIC_H) 3771# include <gssapi/gssapi_generic.h> 3772#endif 3773 ]]) |
|
3647 fi 3648 ] 3649) | 3774 fi 3775 ] 3776) |
3777AC_SUBST([GSSLIBS]) 3778AC_SUBST([K5LIBS]) |
|
3650 3651# Looking for programs, paths and files 3652 3653PRIVSEP_PATH=/var/empty 3654AC_ARG_WITH([privsep-path], 3655 [ --with-privsep-path=xxx Path for privilege separation chroot (default=/var/empty)], 3656 [ 3657 if test -n "$withval" && test "x$withval" != "xno" && \ --- 650 unchanged lines hidden (view full) --- 4308 fi 4309 fi 4310fi 4311if test -n "$conf_wtmp_location"; then 4312 AC_DEFINE_UNQUOTED([CONF_WTMP_FILE], ["$conf_wtmp_location"], 4313 [Define if you want to specify the path to your wtmp file]) 4314fi 4315 | 3779 3780# Looking for programs, paths and files 3781 3782PRIVSEP_PATH=/var/empty 3783AC_ARG_WITH([privsep-path], 3784 [ --with-privsep-path=xxx Path for privilege separation chroot (default=/var/empty)], 3785 [ 3786 if test -n "$withval" && test "x$withval" != "xno" && \ --- 650 unchanged lines hidden (view full) --- 4437 fi 4438 fi 4439fi 4440if test -n "$conf_wtmp_location"; then 4441 AC_DEFINE_UNQUOTED([CONF_WTMP_FILE], ["$conf_wtmp_location"], 4442 [Define if you want to specify the path to your wtmp file]) 4443fi 4444 |
4316 | |
4317dnl wtmpx detection 4318AC_MSG_CHECKING([if your system defines WTMPX_FILE]) 4319AC_COMPILE_IFELSE([AC_LANG_PROGRAM([[ 4320#include <sys/types.h> 4321#include <utmp.h> 4322#ifdef HAVE_UTMPX_H 4323#include <utmpx.h> 4324#endif --- 15 unchanged lines hidden (view full) --- 4340fi 4341 4342 4343if test ! -z "$blibpath" ; then 4344 LDFLAGS="$LDFLAGS $blibflags$blibpath" 4345 AC_MSG_WARN([Please check and edit blibpath in LDFLAGS in Makefile]) 4346fi 4347 | 4445dnl wtmpx detection 4446AC_MSG_CHECKING([if your system defines WTMPX_FILE]) 4447AC_COMPILE_IFELSE([AC_LANG_PROGRAM([[ 4448#include <sys/types.h> 4449#include <utmp.h> 4450#ifdef HAVE_UTMPX_H 4451#include <utmpx.h> 4452#endif --- 15 unchanged lines hidden (view full) --- 4468fi 4469 4470 4471if test ! -z "$blibpath" ; then 4472 LDFLAGS="$LDFLAGS $blibflags$blibpath" 4473 AC_MSG_WARN([Please check and edit blibpath in LDFLAGS in Makefile]) 4474fi 4475 |
4476AC_CHECK_MEMBER([struct lastlog.ll_line], [], [ 4477 if test x$SKIP_DISABLE_LASTLOG_DEFINE != "xyes" ; then 4478 AC_DEFINE([DISABLE_LASTLOG]) 4479 fi 4480 ], [ 4481#ifdef HAVE_SYS_TYPES_H 4482#include <sys/types.h> 4483#endif 4484#ifdef HAVE_UTMP_H 4485#include <utmp.h> 4486#endif 4487#ifdef HAVE_UTMPX_H 4488#include <utmpx.h> 4489#endif 4490#ifdef HAVE_LASTLOG_H 4491#include <lastlog.h> 4492#endif 4493 ]) 4494 4495AC_CHECK_MEMBER([struct utmp.ut_line], [], [ 4496 AC_DEFINE([DISABLE_UTMP]) 4497 AC_DEFINE([DISABLE_WTMP]) 4498 ], [ 4499#ifdef HAVE_SYS_TYPES_H 4500#include <sys/types.h> 4501#endif 4502#ifdef HAVE_UTMP_H 4503#include <utmp.h> 4504#endif 4505#ifdef HAVE_UTMPX_H 4506#include <utmpx.h> 4507#endif 4508#ifdef HAVE_LASTLOG_H 4509#include <lastlog.h> 4510#endif 4511 ]) 4512 |
|
4348dnl Adding -Werror to CFLAGS early prevents configure tests from running. 4349dnl Add now. 4350CFLAGS="$CFLAGS $werror_flags" 4351 4352if test "x$ac_cv_func_getaddrinfo" != "xyes" ; then 4353 TEST_SSH_IPV6=no 4354else 4355 TEST_SSH_IPV6=yes --- 108 unchanged lines hidden --- | 4513dnl Adding -Werror to CFLAGS early prevents configure tests from running. 4514dnl Add now. 4515CFLAGS="$CFLAGS $werror_flags" 4516 4517if test "x$ac_cv_func_getaddrinfo" != "xyes" ; then 4518 TEST_SSH_IPV6=no 4519else 4520 TEST_SSH_IPV6=yes --- 108 unchanged lines hidden --- |