+++ /dev/null
-AC_DEFUN([PDNS_ENABLE_KISS], [
- AC_ARG_ENABLE([unsafe-rng-kiss],
- AS_HELP_STRING([--enable-unsafe-rng-kiss],
- [Enable unsafe rng KISS]), [
- AC_DEFINE([HAVE_KISS_RNG], [1], [Define to 1 to enable unsafe rng KISS])
- ])
-])
subdir('meson' / 'lua') # Lua
subdir('meson' / 'lua-records') # Lua-based Records
subdir('meson' / 'hardening') # Hardening
-subdir('meson' / 'kiss-rng') # Unsafe KISS RNG
subdir('meson' / 'net-libs') # Network Libraries
subdir('meson' / 'tm-gmtoff') # Check for tm_gmtoff field in struct tm
subdir('meson' / 'mmap') # Check for mmap
+++ /dev/null
-opt_kiss_rng = get_option('rng-kiss')
-conf.set('HAVE_KISS_RNG', opt_kiss_rng, description: 'Use the unsafe KISS RNG')
-summary('Unsafe KISS RNG', opt_kiss_rng, bool_yn: true, section: 'Configuration')
option('hardening-experimental-cf', type: 'combo', choices: ['disabled', 'full', 'branch', 'return', 'check'], value: 'disabled', description: 'Control Flow hardening')
option('hardening-experimental-scp', type: 'feature', value: 'disabled', description: 'Stack Clash Protection')
option('hardening-fortify-source', type: 'combo', choices: ['auto', 'disabled', '1', '2', '3'], value: '2', description: 'Source fortification level')
-option('rng-kiss', type: 'boolean', value: false, description: 'Use the unsafe KISS RNG')
option('signers-libsodium', type: 'feature', value: 'auto', description: 'Enable libsodium-based signers')
option('signers-libcrypto', type: 'feature', value: 'auto', description: 'Enable OpenSSL libcrypto-based signers)')
option('signers-libcrypto-path', type: 'string', value: '', description: 'Custom path to find OpenSSL libcrypto')