#ifndef BOTAN_BUILD_CONFIG_H_ #define BOTAN_BUILD_CONFIG_H_ /* * This file was automatically generated running * '%{command_line}' * * Target * - Compiler: %{cxx} %{cxx_abi_flags} %{cc_lang_flags} %{cc_compile_flags} * - Arch: %{arch} * - OS: %{os} */ #define BOTAN_VERSION_MAJOR %{version_major} #define BOTAN_VERSION_MINOR %{version_minor} #define BOTAN_VERSION_PATCH %{version_patch} #define BOTAN_VERSION_DATESTAMP %{version_datestamp} #define BOTAN_VERSION_RELEASE_TYPE "%{release_type}" #define BOTAN_VERSION_VC_REVISION "%{version_vc_rev}" #define BOTAN_DISTRIBUTION_INFO "%{distribution_info}" /* How many bits per limb in a BigInt */ #define BOTAN_MP_WORD_BITS %{mp_bits} %{if fuzzer_mode} #define BOTAN_UNSAFE_FUZZER_MODE %{endif} %{if fuzzer_type} #define BOTAN_FUZZER_IS_%{fuzzer_type} %{endif} #define BOTAN_INSTALL_PREFIX R"(%{prefix})" #define BOTAN_INSTALL_HEADER_DIR "%{includedir}/botan-%{version_major}" #define BOTAN_INSTALL_LIB_DIR "%{libdir}" #define BOTAN_LIB_LINK "%{link_to}" #define BOTAN_LINK_FLAGS "%{cxx_abi_flags}" #ifndef BOTAN_DLL #define BOTAN_DLL %{visibility_attribute} #endif /* Target identification and feature test macros */ #define BOTAN_TARGET_OS_IS_%{os_name|upper} %{for os_features} #define BOTAN_TARGET_OS_HAS_%{i|upper} %{endfor} #define BOTAN_BUILD_COMPILER_IS_%{cc_macro} %{for sanitizer_types} #define BOTAN_HAS_SANITIZER_%{i|upper} %{endfor} %{if test_mode} #define BOTAN_TEST_MODE %{endif} #define BOTAN_TARGET_ARCH_IS_%{arch|upper} %{if endian} #define BOTAN_TARGET_CPU_IS_%{endian|upper}_ENDIAN %{endif} %{if cpu_family} #define BOTAN_TARGET_CPU_IS_%{cpu_family|upper}_FAMILY %{endif} %{if cpu_is_64bit} #define BOTAN_TARGET_CPU_HAS_NATIVE_64BIT %{endif} %{for cpu_features} #define BOTAN_TARGET_SUPPORTS_%{i|upper} %{endfor} %{if with_valgrind} #define BOTAN_HAS_VALGRIND %{endif} %{if with_openmp} #define BOTAN_TARGET_HAS_OPENMP %{endif} %{if with_debug_asserts} #define BOTAN_ENABLE_DEBUG_ASSERTS %{endif} /* * Module availability definitions */ %{for module_defines} #define BOTAN_HAS_%{i} %{endfor} /* * Local/misc configuration options (if any) follow */ %{local_config} /* * Things you can edit (but probably shouldn't) */ #if !defined(BOTAN_DEPRECATED_PUBLIC_MEMBER_VARIABLES) #if defined(BOTAN_NO_DEPRECATED) #define BOTAN_DEPRECATED_PUBLIC_MEMBER_VARIABLES private #else #define BOTAN_DEPRECATED_PUBLIC_MEMBER_VARIABLES public #endif #endif /* How much to allocate for a buffer of no particular size */ #define BOTAN_DEFAULT_BUFFER_SIZE 1024 /* Minimum and maximum sizes to allocate out of the mlock pool (bytes) Default min is 16 as smaller values are easily bruteforceable and thus likely not cryptographic keys. */ #define BOTAN_MLOCK_ALLOCATOR_MIN_ALLOCATION 16 #define BOTAN_MLOCK_ALLOCATOR_MAX_ALLOCATION 128 /* * Total maximum amount of RAM (in KiB) we will lock into memory, even * if the OS would let us lock more */ #define BOTAN_MLOCK_ALLOCATOR_MAX_LOCKED_KB 512 /* * If enabled uses memset via volatile function pointer to zero memory, * otherwise does a byte at a time write via a volatile pointer. */ #define BOTAN_USE_VOLATILE_MEMSET_FOR_ZERO 1 /* * Normally blinding is performed by choosing a random starting point (plus * its inverse, of a form appropriate to the algorithm being blinded), and * then choosing new blinding operands by successive squaring of both * values. This is much faster than computing a new starting point but * introduces some possible corelation * * To avoid possible leakage problems in long-running processes, the blinder * periodically reinitializes the sequence. This value specifies how often * a new sequence should be started. */ #define BOTAN_BLINDING_REINIT_INTERVAL 64 /* * Userspace RNGs like HMAC_DRBG will reseed after a specified number * of outputs are generated. Set to zero to disable automatic reseeding. */ #define BOTAN_RNG_DEFAULT_RESEED_INTERVAL 1024 #define BOTAN_RNG_RESEED_POLL_BITS 256 #define BOTAN_RNG_AUTO_RESEED_TIMEOUT std::chrono::milliseconds(10) #define BOTAN_RNG_RESEED_DEFAULT_TIMEOUT std::chrono::milliseconds(50) /* * Specifies (in order) the list of entropy sources that will be used * to seed an in-memory RNG. The first in the default list: "rdseed" * and "rdrand" do not count as contributing any entropy but are * included as they are fast and help protect against a seriously * broken system RNG. */ #define BOTAN_ENTROPY_DEFAULT_SOURCES \ { "rdseed", "rdrand", "darwin_secrandom", "getentropy", \ "dev_random", "system_rng", "proc_walk", "system_stats" } /* Multiplier on a block cipher's native parallelism */ #define BOTAN_BLOCK_CIPHER_PAR_MULT 4 /* * These control the RNG used by the system RNG interface */ #define BOTAN_SYSTEM_RNG_DEVICE "/dev/urandom" #define BOTAN_SYSTEM_RNG_POLL_DEVICES { "/dev/urandom", "/dev/random", "/dev/srandom" } /* * This directory will be monitored by ProcWalking_EntropySource and * the contents provided as entropy inputs to the RNG. May also be * usefully set to something like "/sys", depending on the system being * deployed to. Set to an empty string to disable. */ #define BOTAN_ENTROPY_PROC_FS_PATH "/proc" /* * These paramaters control how many bytes to read from the system * PRNG, and how long to block if applicable. The timeout only applies * to reading /dev/urandom and company. */ #define BOTAN_SYSTEM_RNG_POLL_REQUEST 64 #define BOTAN_SYSTEM_RNG_POLL_TIMEOUT_MS 20 /* How many times to read from the RDRAND/RDSEED RNGs. Each read generates 32 bits of output */ #define BOTAN_ENTROPY_INTEL_RNG_POLLS 32 // According to Intel, RDRAND is guaranteed to generate a random number within 10 retries on a working CPU #define BOTAN_ENTROPY_RDRAND_RETRIES 10 /* * RdSeed is not guaranteed to generate a random number within a specific number of retries * Define the number of retries here */ #define BOTAN_ENTROPY_RDSEED_RETRIES 20 /* * If no way of dynamically determining the cache line size for the * system exists, this value is used as the default. Used by the side * channel countermeasures rather than for alignment purposes, so it is * better to be on the smaller side if the exact value cannot be * determined. Typically 32 or 64 bytes on modern CPUs. */ #if !defined(BOTAN_TARGET_CPU_DEFAULT_CACHE_LINE_SIZE) #define BOTAN_TARGET_CPU_DEFAULT_CACHE_LINE_SIZE 32 #endif /** * Controls how AutoSeeded_RNG is instantiated */ #if !defined(BOTAN_AUTO_RNG_HMAC) #if defined(BOTAN_HAS_SHA2_64) #define BOTAN_AUTO_RNG_HMAC "HMAC(SHA-384)" #elif defined(BOTAN_HAS_SHA2_32) #define BOTAN_AUTO_RNG_HMAC "HMAC(SHA-256)" #elif defined(BOTAN_HAS_SHA3) #define BOTAN_AUTO_RNG_HMAC "HMAC(SHA-3(256))" #elif defined(BOTAN_HAS_SHA1) #define BOTAN_AUTO_RNG_HMAC "HMAC(SHA-1)" #endif // Otherwise, no hash found: leave BOTAN_AUTO_RNG_HMAC undefined #endif // Check for a common build problem: #if defined(BOTAN_TARGET_ARCH_IS_X86_64) && ((defined(_MSC_VER) && !defined(_WIN64)) || \ (defined(__clang__) && !defined(__x86_64__)) || \ (defined(__GNUG__) && !defined(__x86_64__))) #error "Trying to compile Botan configured as x86_64 with non-x86_64 compiler." #endif #if defined(BOTAN_TARGET_ARCH_IS_X86_32) && ((defined(_MSC_VER) && defined(_WIN64)) || \ (defined(__clang__) && !defined(__i386__)) || \ (defined(__GNUG__) && !defined(__i386__))) #error "Trying to compile Botan configured as x86_32 with non-x86_32 compiler." #endif #include #endif