2009-01-03 22:22:43 +01:00
/**
* \ file config . h
*
2011-01-06 13:28:03 +01:00
* \ brief Configuration options ( set of defines )
*
2016-01-03 17:14:14 +01:00
* This set of compile - time options may be used to enable
* or disable features selectively , and reduce the global
* memory footprint .
2018-01-05 16:33:17 +01:00
*/
/*
2020-08-07 13:07:28 +02:00
* Copyright The Mbed TLS Contributors
2015-09-04 14:21:07 +02:00
* SPDX - License - Identifier : Apache - 2.0
2010-07-18 22:36:00 +02:00
*
2015-09-04 14:21:07 +02:00
* Licensed under the Apache License , Version 2.0 ( the " License " ) ; you may
* not use this file except in compliance with the License .
* You may obtain a copy of the License at
2009-01-04 17:27:10 +01:00
*
2015-09-04 14:21:07 +02:00
* http : //www.apache.org/licenses/LICENSE-2.0
2009-01-04 17:27:10 +01:00
*
2015-09-04 14:21:07 +02:00
* Unless required by applicable law or agreed to in writing , software
* distributed under the License is distributed on an " AS IS " BASIS , WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND , either express or implied .
* See the License for the specific language governing permissions and
* limitations under the License .
2015-08-11 10:38:37 +02:00
*/
2015-04-08 12:49:31 +02:00
# ifndef MBEDTLS_CONFIG_H
# define MBEDTLS_CONFIG_H
2009-01-03 22:22:43 +01:00
2011-11-18 15:26:47 +01:00
# if defined(_MSC_VER) && !defined(_CRT_SECURE_NO_DEPRECATE)
2009-01-03 22:22:43 +01:00
# define _CRT_SECURE_NO_DEPRECATE 1
# endif
2011-01-27 16:24:17 +01:00
/**
2011-01-21 12:00:08 +01:00
* \ name SECTION : System support
*
* This section sets system specific settings .
* \ {
*/
2011-01-27 16:24:17 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_HAVE_ASM
2011-01-27 16:24:17 +01:00
*
2013-09-20 13:45:36 +02:00
* The compiler has support for asm ( ) .
2009-04-19 23:17:55 +02:00
*
* Requires support for asm ( ) in compiler .
*
* Used in :
2018-02-27 12:20:20 +01:00
* library / aria . c
2009-04-19 23:17:55 +02:00
* library / timing . c
2015-03-09 18:05:11 +01:00
* include / mbedtls / bn_mul . h
2009-04-19 23:17:55 +02:00
*
2018-02-27 12:20:20 +01:00
* Required by :
* MBEDTLS_AESNI_C
* MBEDTLS_PADLOCK_C
*
2013-09-20 13:45:36 +02:00
* Comment to disable the use of assembly code .
2009-01-03 22:22:43 +01:00
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_HAVE_ASM
2009-01-03 22:22:43 +01:00
2017-06-08 15:19:20 +02:00
/**
* \ def MBEDTLS_NO_UDBL_DIVISION
*
* The platform lacks support for double - width integer division ( 64 - bit
* division on a 32 - bit platform , 128 - bit division on a 64 - bit platform ) .
*
* Used in :
* include / mbedtls / bignum . h
* library / bignum . c
*
* The bignum code uses double - width division to speed up some operations .
* Double - width division is often implemented in software that needs to
* be linked with the program . The presence of a double - width integer
* type is usually detected automatically through preprocessor macros ,
* but the automatic detection cannot know whether the code needs to
* and can be linked with an implementation of division for that type .
* By default division is assumed to be usable if the type is present .
* Uncomment this option to prevent the use of double - width division .
*
* Note that division for the native integer type is always required .
* Furthermore , a 64 - bit type is always required even on a 32 - bit
2017-07-21 11:56:22 +02:00
* platform , but it need not support multiplication or division . In some
* cases it is also desirable to disable some double - width operations . For
* example , if double - width division is implemented in software , disabling
* it can reduce code size in some embedded targets .
2017-06-08 15:19:20 +02:00
*/
//#define MBEDTLS_NO_UDBL_DIVISION
2018-06-07 10:51:44 +02:00
/**
* \ def MBEDTLS_NO_64BIT_MULTIPLICATION
*
* The platform lacks support for 32 x32 - > 64 - bit multiplication .
*
* Used in :
* library / poly1305 . c
*
* Some parts of the library may use multiplication of two unsigned 32 - bit
* operands with a 64 - bit result in order to speed up computations . On some
* platforms , this is not available in hardware and has to be implemented in
* software , usually in a library provided by the toolchain .
*
* Sometimes it is not desirable to have to link to that library . This option
* removes the dependency of that library on platforms that lack a hardware
* 64 - bit multiplier by embedding a software implementation in Mbed TLS .
*
* Note that depending on the compiler , this may decrease performance compared
* to using the library function provided by the toolchain .
*/
//#define MBEDTLS_NO_64BIT_MULTIPLICATION
2011-01-27 16:24:17 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_HAVE_SSE2
2011-01-27 16:24:17 +01:00
*
2012-10-01 16:42:47 +02:00
* CPU supports SSE2 instruction set .
2011-01-27 16:24:17 +01:00
*
2009-01-03 22:22:43 +01:00
* Uncomment if the CPU supports SSE2 ( IA - 32 specific ) .
*/
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_HAVE_SSE2
2013-07-03 15:31:03 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_HAVE_TIME
2013-07-03 15:31:03 +02:00
*
2015-06-18 20:52:58 +02:00
* System has time . h and time ( ) .
* The time does not need to be correct , only time differences are used ,
* by contrast with MBEDTLS_HAVE_TIME_DATE
2013-07-03 15:31:03 +02:00
*
2016-07-20 11:16:25 +02:00
* Defining MBEDTLS_HAVE_TIME allows you to specify MBEDTLS_PLATFORM_TIME_ALT ,
* MBEDTLS_PLATFORM_TIME_MACRO , MBEDTLS_PLATFORM_TIME_TYPE_MACRO and
* MBEDTLS_PLATFORM_STD_TIME .
*
2013-07-03 15:31:03 +02:00
* Comment if your system does not support time functions
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_HAVE_TIME
2013-12-13 12:54:09 +01:00
2015-06-18 20:52:58 +02:00
/**
* \ def MBEDTLS_HAVE_TIME_DATE
*
2018-09-05 17:18:38 +02:00
* System has time . h , time ( ) , and an implementation for
* mbedtls_platform_gmtime_r ( ) ( see below ) .
2019-01-23 15:24:37 +01:00
* The time needs to be correct ( not necessarily very accurate , but at least
2015-06-18 20:52:58 +02:00
* the date should be correct ) . This is used to verify the validity period of
* X .509 certificates .
*
* Comment if your system does not have a correct clock .
2018-08-07 21:39:27 +02:00
*
2018-09-05 16:06:19 +02:00
* \ note mbedtls_platform_gmtime_r ( ) is an abstraction in platform_util . h that
2018-09-05 17:28:59 +02:00
* behaves similarly to the gmtime_r ( ) function from the C standard . Refer to
* the documentation for mbedtls_platform_gmtime_r ( ) for more information .
2018-08-21 20:32:44 +02:00
*
* \ note It is possible to configure an implementation for
2018-09-05 16:06:19 +02:00
* mbedtls_platform_gmtime_r ( ) at compile - time by using the macro
* MBEDTLS_PLATFORM_GMTIME_R_ALT .
2015-06-18 20:52:58 +02:00
*/
# define MBEDTLS_HAVE_TIME_DATE
2014-02-04 17:30:24 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_PLATFORM_MEMORY
2014-02-04 17:30:24 +01:00
*
* Enable the memory allocation layer .
*
2015-05-26 16:15:20 +02:00
* By default mbed TLS uses the system - provided calloc ( ) and free ( ) .
2014-02-04 17:30:24 +01:00
* This allows different allocators ( self - implemented or provided ) to be
* provided to the platform abstraction layer .
*
2015-04-08 12:49:31 +02:00
* Enabling MBEDTLS_PLATFORM_MEMORY without the
2015-05-26 16:15:20 +02:00
* MBEDTLS_PLATFORM_ { FREE , CALLOC } _MACROs will provide
* " mbedtls_platform_set_calloc_free() " allowing you to set an alternative calloc ( ) and
2015-02-06 17:14:34 +01:00
* free ( ) function pointer at runtime .
*
2015-04-08 12:49:31 +02:00
* Enabling MBEDTLS_PLATFORM_MEMORY and specifying
2015-05-26 16:15:20 +02:00
* MBEDTLS_PLATFORM_ { CALLOC , FREE } _MACROs will allow you to specify the
2015-02-06 17:14:34 +01:00
* alternate function at compile time .
2014-02-04 17:30:24 +01:00
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_PLATFORM_C
2014-02-04 17:30:24 +01:00
*
* Enable this layer to allow use of alternative memory allocators .
*/
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_PLATFORM_MEMORY
2014-02-04 17:30:24 +01:00
2014-04-25 11:11:10 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_PLATFORM_NO_STD_FUNCTIONS
2014-04-25 11:11:10 +02:00
*
2015-05-26 16:15:20 +02:00
* Do not assign standard functions in the platform layer ( e . g . calloc ( ) to
* MBEDTLS_PLATFORM_STD_CALLOC and printf ( ) to MBEDTLS_PLATFORM_STD_PRINTF )
2014-04-25 11:11:10 +02:00
*
* This makes sure there are no linking errors on platforms that do not support
* these functions . You will HAVE to provide alternatives , either at runtime
* via the platform_set_xxx ( ) functions or at compile time by setting
2015-04-08 12:49:31 +02:00
* the MBEDTLS_PLATFORM_STD_XXX defines , or enabling a
* MBEDTLS_PLATFORM_XXX_MACRO .
2014-04-25 11:11:10 +02:00
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_PLATFORM_C
2014-04-25 11:11:10 +02:00
*
* Uncomment to prevent default assignment of standard functions in the
* platform layer .
*/
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_PLATFORM_NO_STD_FUNCTIONS
2014-04-25 11:11:10 +02:00
2014-02-01 22:50:07 +01:00
/**
2016-03-21 09:43:59 +01:00
* \ def MBEDTLS_PLATFORM_EXIT_ALT
2014-02-01 22:50:07 +01:00
*
2016-01-04 13:51:01 +01:00
* MBEDTLS_PLATFORM_XXX_ALT : Uncomment a macro to let mbed TLS support the
* function in the platform abstraction layer .
2014-02-01 22:50:07 +01:00
*
2015-04-08 12:49:31 +02:00
* Example : In case you uncomment MBEDTLS_PLATFORM_PRINTF_ALT , mbed TLS will
* provide a function " mbedtls_platform_set_printf() " that allows you to set an
2014-02-01 22:50:07 +01:00
* alternative printf function pointer .
*
2015-04-08 12:49:31 +02:00
* All these define require MBEDTLS_PLATFORM_C to be defined !
2014-02-01 22:50:07 +01:00
*
2015-06-26 10:52:01 +02:00
* \ note MBEDTLS_PLATFORM_SNPRINTF_ALT is required on Windows ;
* it will be enabled automatically by check_config . h
*
2015-06-22 10:23:34 +02:00
* \ warning MBEDTLS_PLATFORM_XXX_ALT cannot be defined at the same time as
2015-04-08 12:49:31 +02:00
* MBEDTLS_PLATFORM_XXX_MACRO !
2015-02-06 17:14:34 +01:00
*
2016-07-20 11:16:25 +02:00
* Requires : MBEDTLS_PLATFORM_TIME_ALT requires MBEDTLS_HAVE_TIME
*
2014-02-01 22:50:07 +01:00
* Uncomment a macro to enable alternate implementation of specific base
* platform function
*/
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_PLATFORM_EXIT_ALT
2016-04-26 08:43:27 +02:00
//#define MBEDTLS_PLATFORM_TIME_ALT
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_PLATFORM_FPRINTF_ALT
//#define MBEDTLS_PLATFORM_PRINTF_ALT
//#define MBEDTLS_PLATFORM_SNPRINTF_ALT
2018-07-16 14:27:07 +02:00
//#define MBEDTLS_PLATFORM_VSNPRINTF_ALT
2016-06-01 12:25:44 +02:00
//#define MBEDTLS_PLATFORM_NV_SEED_ALT
2017-07-18 11:23:04 +02:00
//#define MBEDTLS_PLATFORM_SETUP_TEARDOWN_ALT
2015-03-23 13:58:27 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_DEPRECATED_WARNING
2015-03-23 13:58:27 +01:00
*
2018-11-29 10:55:41 +01:00
* Mark deprecated functions and features so that they generate a warning if
* used . Functionality deprecated in one version will usually be removed in the
* next version . You can enable this to help you prepare the transition to a
* new major version by making sure your code is not using this functionality .
2015-03-23 13:58:27 +01:00
*
* This only works with GCC and Clang . With other compilers , you may want to
2015-04-08 12:49:31 +02:00
* use MBEDTLS_DEPRECATED_REMOVED
2015-03-23 13:58:27 +01:00
*
2018-11-29 10:55:41 +01:00
* Uncomment to get warnings on using deprecated functions and features .
2015-03-23 13:58:27 +01:00
*/
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_DEPRECATED_WARNING
2015-03-23 13:58:27 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_DEPRECATED_REMOVED
2015-03-23 13:58:27 +01:00
*
2018-11-29 10:55:41 +01:00
* Remove deprecated functions and features so that they generate an error if
* used . Functionality deprecated in one version will usually be removed in the
* next version . You can enable this to help you prepare the transition to a
* new major version by making sure your code is not using this functionality .
2015-03-23 13:58:27 +01:00
*
2018-11-29 10:55:41 +01:00
* Uncomment to get errors on using deprecated functions and features .
2015-03-23 13:58:27 +01:00
*/
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_DEPRECATED_REMOVED
2015-03-23 13:58:27 +01:00
2019-01-31 14:20:20 +01:00
/**
* \ def MBEDTLS_CHECK_PARAMS
*
* This configuration option controls whether the library validates more of
* the parameters passed to it .
*
* When this flag is not defined , the library only attempts to validate an
* input parameter if : ( 1 ) they may come from the outside world ( such as the
* network , the filesystem , etc . ) or ( 2 ) not validating them could result in
* internal memory errors such as overflowing a buffer controlled by the
* library . On the other hand , it doesn ' t attempt to validate parameters whose
* values are fully controlled by the application ( such as pointers ) .
*
* When this flag is defined , the library additionally attempts to validate
* parameters that are fully controlled by the application , and should always
* be valid if the application code is fully correct and trusted .
*
* For example , when a function accepts as input a pointer to a buffer that may
* contain untrusted data , and its documentation mentions that this pointer
* must not be NULL :
2019-06-13 16:44:19 +02:00
* - The pointer is checked to be non - NULL only if this option is enabled .
* - The content of the buffer is always validated .
2019-01-31 14:20:20 +01:00
*
* When this flag is defined , if a library function receives a parameter that
2019-06-13 16:44:19 +02:00
* is invalid :
* 1. The function will invoke the macro MBEDTLS_PARAM_FAILED ( ) .
* 2. If MBEDTLS_PARAM_FAILED ( ) did not terminate the program , the function
* will immediately return . If the function returns an Mbed TLS error code ,
* the error code in this case is MBEDTLS_ERR_xxx_BAD_INPUT_DATA .
*
* When defining this flag , you also need to arrange a definition for
* MBEDTLS_PARAM_FAILED ( ) . You can do this by any of the following methods :
* - By default , the library defines MBEDTLS_PARAM_FAILED ( ) to call a
* function mbedtls_param_failed ( ) , but the library does not define this
* function . If you do not make any other arrangements , you must provide
* the function mbedtls_param_failed ( ) in your application .
* See ` platform_util . h ` for its prototype .
* - If you enable the macro # MBEDTLS_CHECK_PARAMS_ASSERT , then the
2019-07-04 22:15:37 +02:00
* library defines MBEDTLS_PARAM_FAILED ( \ c cond ) to be ` assert ( cond ) ` .
2019-06-13 16:44:19 +02:00
* You can still supply an alternative definition of
* MBEDTLS_PARAM_FAILED ( ) , which may call ` assert ` .
* - If you define a macro MBEDTLS_PARAM_FAILED ( ) before including ` config . h `
* or you uncomment the definition of MBEDTLS_PARAM_FAILED ( ) in ` config . h ` ,
* the library will call the macro that you defined and will not supply
* its own version . Note that if MBEDTLS_PARAM_FAILED ( ) calls ` assert ` ,
* you need to enable # MBEDTLS_CHECK_PARAMS_ASSERT so that library source
* files include ` < assert . h > ` .
2019-01-31 14:20:20 +01:00
*
* Uncomment to enable validation of application - controlled parameters .
*/
//#define MBEDTLS_CHECK_PARAMS
2019-06-13 16:44:19 +02:00
/**
* \ def MBEDTLS_CHECK_PARAMS_ASSERT
*
* Allow MBEDTLS_PARAM_FAILED ( ) to call ` assert ` , and make it default to
* ` assert ` . This macro is only used if # MBEDTLS_CHECK_PARAMS is defined .
*
* If this macro is not defined , then MBEDTLS_PARAM_FAILED ( ) defaults to
* calling a function mbedtls_param_failed ( ) . See the documentation of
* # MBEDTLS_CHECK_PARAMS for details .
*
* Uncomment to allow MBEDTLS_PARAM_FAILED ( ) to call ` assert ` .
*/
//#define MBEDTLS_CHECK_PARAMS_ASSERT
2013-09-20 13:45:36 +02:00
/* \} name SECTION: System support */
2011-01-21 12:00:08 +01:00
2011-01-27 16:24:17 +01:00
/**
2015-01-22 17:11:05 +01:00
* \ name SECTION : mbed TLS feature support
2011-01-21 12:00:08 +01:00
*
* This section sets support for features that are or are not needed
* within the modules that are enabled .
* \ {
*/
2009-01-03 22:22:43 +01:00
2014-02-06 15:11:55 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_TIMING_ALT
2014-02-06 15:11:55 +01:00
*
2015-04-08 12:49:31 +02:00
* Uncomment to provide your own alternate implementation for mbedtls_timing_hardclock ( ) ,
2015-05-14 18:22:47 +02:00
* mbedtls_timing_get_timer ( ) , mbedtls_set_alarm ( ) , mbedtls_set / get_delay ( )
2014-02-06 15:11:55 +01:00
*
2015-04-08 12:49:31 +02:00
* Only works if you have MBEDTLS_TIMING_C enabled .
2014-02-06 15:11:55 +01:00
*
* You will need to provide a header " timing_alt.h " and an implementation at
* compile time .
*/
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_TIMING_ALT
2014-02-06 15:11:55 +01:00
2013-06-24 19:20:35 +02:00
/**
2016-01-04 13:51:01 +01:00
* \ def MBEDTLS_AES_ALT
2013-06-24 19:20:35 +02:00
*
2016-01-04 13:51:01 +01:00
* MBEDTLS__MODULE_NAME__ALT : Uncomment a macro to let mbed TLS use your
2016-08-18 13:38:46 +02:00
* alternate core implementation of a symmetric crypto , an arithmetic or hash
* module ( e . g . platform specific assembly optimized implementations ) . Keep
* in mind that the function prototypes should remain the same .
2013-06-24 19:20:35 +02:00
*
2015-03-31 18:32:50 +02:00
* This replaces the whole module . If you only want to replace one of the
2015-04-08 12:49:31 +02:00
* functions , use one of the MBEDTLS__FUNCTION_NAME__ALT flags .
2015-03-31 18:32:50 +02:00
*
2015-04-08 12:49:31 +02:00
* Example : In case you uncomment MBEDTLS_AES_ALT , mbed TLS will no longer
2016-11-07 16:41:26 +01:00
* provide the " struct mbedtls_aes_context " definition and omit the base
* function declarations and implementations . " aes_alt.h " will be included from
2013-06-24 19:20:35 +02:00
* " aes.h " to include the new function definitions .
*
2015-03-31 18:32:50 +02:00
* Uncomment a macro to enable alternate implementation of the corresponding
* module .
2017-09-25 15:53:51 +02:00
*
* \ warning MD2 , MD4 , MD5 , ARC4 , DES and SHA - 1 are considered weak and their
* use constitutes a security risk . If possible , we recommend
* avoiding dependencies on them , and considering stronger message
* digests and ciphers instead .
*
2013-06-24 19:20:35 +02:00
*/
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_AES_ALT
//#define MBEDTLS_ARC4_ALT
2017-12-01 16:41:38 +01:00
//#define MBEDTLS_ARIA_ALT
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_BLOWFISH_ALT
//#define MBEDTLS_CAMELLIA_ALT
2017-04-04 11:37:15 +02:00
//#define MBEDTLS_CCM_ALT
2016-05-15 22:28:08 +02:00
//#define MBEDTLS_CHACHA20_ALT
2018-06-04 12:23:19 +02:00
//#define MBEDTLS_CHACHAPOLY_ALT
2017-04-04 11:47:16 +02:00
//#define MBEDTLS_CMAC_ALT
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_DES_ALT
2018-01-09 17:43:21 +01:00
//#define MBEDTLS_DHM_ALT
2018-01-24 11:25:05 +01:00
//#define MBEDTLS_ECJPAKE_ALT
2017-09-21 13:53:48 +02:00
//#define MBEDTLS_GCM_ALT
2018-05-03 15:54:28 +02:00
//#define MBEDTLS_NIST_KW_ALT
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_MD2_ALT
//#define MBEDTLS_MD4_ALT
//#define MBEDTLS_MD5_ALT
2016-05-16 23:25:45 +02:00
//#define MBEDTLS_POLY1305_ALT
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_RIPEMD160_ALT
2018-01-04 19:26:54 +01:00
//#define MBEDTLS_RSA_ALT
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_SHA1_ALT
//#define MBEDTLS_SHA256_ALT
//#define MBEDTLS_SHA512_ALT
2018-01-04 19:26:54 +01:00
//#define MBEDTLS_XTEA_ALT
2017-12-01 16:41:38 +01:00
2016-08-18 13:38:46 +02:00
/*
* When replacing the elliptic curve module , pleace consider , that it is
* implemented with two . c files :
* - ecp . c
* - ecp_curves . c
2016-11-07 16:41:26 +01:00
* You can replace them very much like all the other MBEDTLS__MODULE_NAME__ALT
* macros as described above . The only difference is that you have to make sure
* that you provide functionality for both . c files .
2016-08-18 13:38:46 +02:00
*/
//#define MBEDTLS_ECP_ALT
2013-06-24 19:20:35 +02:00
2015-03-31 18:32:50 +02:00
/**
2016-01-04 13:51:01 +01:00
* \ def MBEDTLS_MD2_PROCESS_ALT
2015-03-31 18:32:50 +02:00
*
2016-01-04 13:51:01 +01:00
* MBEDTLS__FUNCTION_NAME__ALT : Uncomment a macro to let mbed TLS use you
* alternate core implementation of symmetric crypto or hash function . Keep in
* mind that function prototypes should remain the same .
2015-03-31 18:32:50 +02:00
*
* This replaces only one function . The header file from mbed TLS is still
2015-04-08 12:49:31 +02:00
* used , in contrast to the MBEDTLS__MODULE_NAME__ALT flags .
2015-03-31 18:32:50 +02:00
*
2015-04-08 12:49:31 +02:00
* Example : In case you uncomment MBEDTLS_SHA256_PROCESS_ALT , mbed TLS will
* no longer provide the mbedtls_sha1_process ( ) function , but it will still provide
* the other function ( using your mbedtls_sha1_process ( ) function ) and the definition
* of mbedtls_sha1_context , so your implementation of mbedtls_sha1_process must be compatible
2015-03-31 18:32:50 +02:00
* with this definition .
*
2017-06-26 13:46:19 +02:00
* \ note Because of a signature change , the core AES encryption and decryption routines are
* currently named mbedtls_aes_internal_encrypt and mbedtls_aes_internal_decrypt ,
* respectively . When setting up alternative implementations , these functions should
2019-01-23 15:24:37 +01:00
* be overridden , but the wrapper functions mbedtls_aes_decrypt and mbedtls_aes_encrypt
2017-07-20 10:50:59 +02:00
* must stay untouched .
2017-06-26 13:46:19 +02:00
*
* \ note If you use the AES_xxx_ALT macros , then is is recommended to also set
* MBEDTLS_AES_ROM_TABLES in order to help the linker garbage - collect the AES
* tables .
2015-05-12 15:41:08 +02:00
*
2015-03-31 18:32:50 +02:00
* Uncomment a macro to enable alternate implementation of the corresponding
* function .
2017-09-25 15:53:51 +02:00
*
* \ warning MD2 , MD4 , MD5 , DES and SHA - 1 are considered weak and their use
* constitutes a security risk . If possible , we recommend avoiding
* dependencies on them , and considering stronger message digests
* and ciphers instead .
*
2019-01-07 16:01:32 +01:00
* \ warning If both MBEDTLS_ECDSA_SIGN_ALT and MBEDTLS_ECDSA_DETERMINISTIC are
* enabled , then the deterministic ECDH signature functions pass the
* the static HMAC - DRBG as RNG to mbedtls_ecdsa_sign ( ) . Therefore
* alternative implementations should use the RNG only for generating
* the ephemeral key and nothing else . If this is not possible , then
* MBEDTLS_ECDSA_DETERMINISTIC should be disabled and an alternative
* implementation should be provided for mbedtls_ecdsa_sign_det_ext ( )
* ( and for mbedtls_ecdsa_sign_det ( ) too if backward compatibility is
* desirable ) .
*
2015-03-31 18:32:50 +02:00
*/
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_MD2_PROCESS_ALT
//#define MBEDTLS_MD4_PROCESS_ALT
//#define MBEDTLS_MD5_PROCESS_ALT
//#define MBEDTLS_RIPEMD160_PROCESS_ALT
//#define MBEDTLS_SHA1_PROCESS_ALT
//#define MBEDTLS_SHA256_PROCESS_ALT
//#define MBEDTLS_SHA512_PROCESS_ALT
2015-05-12 15:02:45 +02:00
//#define MBEDTLS_DES_SETKEY_ALT
//#define MBEDTLS_DES_CRYPT_ECB_ALT
//#define MBEDTLS_DES3_CRYPT_ECB_ALT
2015-05-12 15:41:08 +02:00
//#define MBEDTLS_AES_SETKEY_ENC_ALT
//#define MBEDTLS_AES_SETKEY_DEC_ALT
//#define MBEDTLS_AES_ENCRYPT_ALT
//#define MBEDTLS_AES_DECRYPT_ALT
2017-10-10 18:04:27 +02:00
//#define MBEDTLS_ECDH_GEN_PUBLIC_ALT
2017-10-12 13:17:48 +02:00
//#define MBEDTLS_ECDH_COMPUTE_SHARED_ALT
2017-10-10 17:28:25 +02:00
//#define MBEDTLS_ECDSA_VERIFY_ALT
//#define MBEDTLS_ECDSA_SIGN_ALT
//#define MBEDTLS_ECDSA_GENKEY_ALT
2015-03-31 18:32:50 +02:00
2016-08-18 13:38:46 +02:00
/**
2016-11-18 17:38:23 +01:00
* \ def MBEDTLS_ECP_INTERNAL_ALT
*
* Expose a part of the internal interface of the Elliptic Curve Point module .
2016-08-18 13:38:46 +02:00
*
* MBEDTLS_ECP__FUNCTION_NAME__ALT : Uncomment a macro to let mbed TLS use your
2016-10-28 17:53:11 +02:00
* alternative core implementation of elliptic curve arithmetic . Keep in mind
* that function prototypes should remain the same .
2016-08-18 13:38:46 +02:00
*
* This partially replaces one function . The header file from mbed TLS is still
* used , in contrast to the MBEDTLS_ECP_ALT flag . The original implementation
* is still present and it is used for group structures not supported by the
* alternative .
*
2016-11-18 17:38:23 +01:00
* Any of these options become available by defining MBEDTLS_ECP_INTERNAL_ALT
* and implementing the following functions :
* unsigned char mbedtls_internal_ecp_grp_capable (
* const mbedtls_ecp_group * grp )
* int mbedtls_internal_ecp_init ( const mbedtls_ecp_group * grp )
2019-01-31 14:20:20 +01:00
* void mbedtls_internal_ecp_free ( const mbedtls_ecp_group * grp )
2016-11-18 17:38:23 +01:00
* The mbedtls_internal_ecp_grp_capable function should return 1 if the
* replacement functions implement arithmetic for the given group and 0
* otherwise .
2019-01-31 14:20:20 +01:00
* The functions mbedtls_internal_ecp_init and mbedtls_internal_ecp_free are
2016-11-18 17:38:23 +01:00
* called before and after each point operation and provide an opportunity to
* implement optimized set up and tear down instructions .
*
* Example : In case you uncomment MBEDTLS_ECP_INTERNAL_ALT and
2016-11-01 14:27:03 +01:00
* MBEDTLS_ECP_DOUBLE_JAC_ALT , mbed TLS will still provide the ecp_double_jac
2016-11-18 17:38:23 +01:00
* function , but will use your mbedtls_internal_ecp_double_jac if the group is
* supported ( your mbedtls_internal_ecp_grp_capable function returns 1 when
* receives it as an argument ) . If the group is not supported then the original
2016-11-07 16:41:26 +01:00
* implementation is used . The other functions and the definition of
* mbedtls_ecp_group and mbedtls_ecp_point will not change , so your
2016-11-18 17:38:23 +01:00
* implementation of mbedtls_internal_ecp_double_jac and
* mbedtls_internal_ecp_grp_capable must be compatible with this definition .
2016-08-18 13:38:46 +02:00
*
* Uncomment a macro to enable alternate implementation of the corresponding
* function .
*/
/* Required for all the functions in this section */
2016-11-18 17:38:23 +01:00
//#define MBEDTLS_ECP_INTERNAL_ALT
2016-08-18 13:38:46 +02:00
/* Support for Weierstrass curves with Jacobi representation */
//#define MBEDTLS_ECP_RANDOMIZE_JAC_ALT
//#define MBEDTLS_ECP_ADD_MIXED_ALT
//#define MBEDTLS_ECP_DOUBLE_JAC_ALT
//#define MBEDTLS_ECP_NORMALIZE_JAC_MANY_ALT
//#define MBEDTLS_ECP_NORMALIZE_JAC_ALT
/* Support for curves with Montgomery arithmetic */
//#define MBEDTLS_ECP_DOUBLE_ADD_MXZ_ALT
//#define MBEDTLS_ECP_RANDOMIZE_MXZ_ALT
//#define MBEDTLS_ECP_NORMALIZE_MXZ_ALT
2016-06-08 16:29:18 +02:00
/**
2016-06-11 03:31:21 +02:00
* \ def MBEDTLS_TEST_NULL_ENTROPY
2016-06-08 16:29:18 +02:00
*
2016-06-11 03:31:21 +02:00
* Enables testing and use of mbed TLS without any configured entropy sources .
* This permits use of the library on platforms before an entropy source has
* been integrated ( see for example the MBEDTLS_ENTROPY_HARDWARE_ALT or the
* MBEDTLS_ENTROPY_NV_SEED switches ) .
2016-06-08 16:29:18 +02:00
*
2016-06-11 03:31:21 +02:00
* WARNING ! This switch MUST be disabled in production builds , and is suitable
* only for development .
* Enabling the switch negates any security provided by the library .
2016-06-09 14:54:15 +02:00
*
2016-06-11 03:31:21 +02:00
* Requires MBEDTLS_ENTROPY_C , MBEDTLS_NO_DEFAULT_ENTROPY_SOURCES
2016-06-08 16:29:18 +02:00
*
*/
2016-06-11 03:31:21 +02:00
//#define MBEDTLS_TEST_NULL_ENTROPY
2016-06-08 16:29:18 +02:00
2015-06-19 10:06:21 +02:00
/**
2015-06-22 12:14:20 +02:00
* \ def MBEDTLS_ENTROPY_HARDWARE_ALT
2015-06-19 10:06:21 +02:00
*
* Uncomment this macro to let mbed TLS use your own implementation of a
* hardware entropy collector .
*
* Your function must be called \ c mbedtls_hardware_poll ( ) , have the same
* prototype as declared in entropy_poll . h , and accept NULL as first argument .
*
* Uncomment to use your own hardware entropy collector .
*/
//#define MBEDTLS_ENTROPY_HARDWARE_ALT
2011-04-24 23:19:15 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_AES_ROM_TABLES
2011-04-24 23:19:15 +02:00
*
2017-06-07 16:52:48 +02:00
* Use precomputed AES tables stored in ROM .
*
* Uncomment this macro to use precomputed AES tables stored in ROM .
* Comment this macro to generate AES tables in RAM at runtime .
*
2018-03-27 17:52:03 +02:00
* Tradeoff : Using precomputed ROM tables reduces RAM usage by ~ 8 kb
* ( or ~ 2 kb if \ c MBEDTLS_AES_FEWER_TABLES is used ) and reduces the
2018-03-28 12:42:05 +02:00
* initialization time before the first AES operation can be performed .
* It comes at the cost of additional ~ 8 kb ROM use ( resp . ~ 2 kb if \ c
* MBEDTLS_AES_FEWER_TABLES below is used ) , and potentially degraded
* performance if ROM access is slower than RAM access .
2017-06-07 16:52:48 +02:00
*
* This option is independent of \ c MBEDTLS_AES_FEWER_TABLES .
2011-04-24 23:19:15 +02:00
*
*/
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_AES_ROM_TABLES
2011-04-24 23:19:15 +02:00
Add option to use smaller AES tables (table sizes reduced by 6144 bytes)
This patch adds MBEDTLS_AES_SMALL_TABLES option to reduce number of AES
look-up tables and thus save 6 KiB of memory. Enabling this option
cause performance hit MBEDTLS_AES_SMALL_TABLES of ~7% on ARM and ~15%
on x86-64.
Benchmark on Cortex-A7 (armhf):
Before:
AES-CBC-128 : 14394 Kb/s, 0 cycles/byte
AES-CBC-192 : 12442 Kb/s, 0 cycles/byte
AES-CBC-256 : 10958 Kb/s, 0 cycles/byte
After:
AES-CBC-128 : 13342 Kb/s, 0 cycles/byte
AES-CBC-192 : 11469 Kb/s, 0 cycles/byte
AES-CBC-256 : 10058 Kb/s, 0 cycles/byte
Benchmark on Intel Core i5-4570 (x86_64, 3.2 Ghz, no turbo):
Before:
AES-CBC-128 : 215759 Kb/s, 14 cycles/byte
AES-CBC-192 : 190884 Kb/s, 16 cycles/byte
AES-CBC-256 : 171536 Kb/s, 18 cycles/byte
After:
AES-CBC-128 : 185108 Kb/s, 16 cycles/byte
AES-CBC-192 : 162839 Kb/s, 19 cycles/byte
AES-CBC-256 : 144700 Kb/s, 21 cycles/byte
2015-11-12 15:38:31 +01:00
/**
2017-06-07 16:52:48 +02:00
* \ def MBEDTLS_AES_FEWER_TABLES
*
* Use less ROM / RAM for AES tables .
*
* Uncommenting this macro omits 75 % of the AES tables from
* ROM / RAM ( depending on the value of \ c MBEDTLS_AES_ROM_TABLES )
* by computing their values on the fly during operations
* ( the tables are entry - wise rotations of one another ) .
*
* Tradeoff : Uncommenting this reduces the RAM / ROM footprint
2017-06-19 17:33:58 +02:00
* by ~ 6 kb but at the cost of more arithmetic operations during
2017-06-07 16:52:48 +02:00
* runtime . Specifically , one has to compare 4 accesses within
* different tables to 4 accesses with additional arithmetic
* operations within the same table . The performance gain / loss
* depends on the system and memory details .
Add option to use smaller AES tables (table sizes reduced by 6144 bytes)
This patch adds MBEDTLS_AES_SMALL_TABLES option to reduce number of AES
look-up tables and thus save 6 KiB of memory. Enabling this option
cause performance hit MBEDTLS_AES_SMALL_TABLES of ~7% on ARM and ~15%
on x86-64.
Benchmark on Cortex-A7 (armhf):
Before:
AES-CBC-128 : 14394 Kb/s, 0 cycles/byte
AES-CBC-192 : 12442 Kb/s, 0 cycles/byte
AES-CBC-256 : 10958 Kb/s, 0 cycles/byte
After:
AES-CBC-128 : 13342 Kb/s, 0 cycles/byte
AES-CBC-192 : 11469 Kb/s, 0 cycles/byte
AES-CBC-256 : 10058 Kb/s, 0 cycles/byte
Benchmark on Intel Core i5-4570 (x86_64, 3.2 Ghz, no turbo):
Before:
AES-CBC-128 : 215759 Kb/s, 14 cycles/byte
AES-CBC-192 : 190884 Kb/s, 16 cycles/byte
AES-CBC-256 : 171536 Kb/s, 18 cycles/byte
After:
AES-CBC-128 : 185108 Kb/s, 16 cycles/byte
AES-CBC-192 : 162839 Kb/s, 19 cycles/byte
AES-CBC-256 : 144700 Kb/s, 21 cycles/byte
2015-11-12 15:38:31 +01:00
*
2017-06-07 16:52:48 +02:00
* This option is independent of \ c MBEDTLS_AES_ROM_TABLES .
Add option to use smaller AES tables (table sizes reduced by 6144 bytes)
This patch adds MBEDTLS_AES_SMALL_TABLES option to reduce number of AES
look-up tables and thus save 6 KiB of memory. Enabling this option
cause performance hit MBEDTLS_AES_SMALL_TABLES of ~7% on ARM and ~15%
on x86-64.
Benchmark on Cortex-A7 (armhf):
Before:
AES-CBC-128 : 14394 Kb/s, 0 cycles/byte
AES-CBC-192 : 12442 Kb/s, 0 cycles/byte
AES-CBC-256 : 10958 Kb/s, 0 cycles/byte
After:
AES-CBC-128 : 13342 Kb/s, 0 cycles/byte
AES-CBC-192 : 11469 Kb/s, 0 cycles/byte
AES-CBC-256 : 10058 Kb/s, 0 cycles/byte
Benchmark on Intel Core i5-4570 (x86_64, 3.2 Ghz, no turbo):
Before:
AES-CBC-128 : 215759 Kb/s, 14 cycles/byte
AES-CBC-192 : 190884 Kb/s, 16 cycles/byte
AES-CBC-256 : 171536 Kb/s, 18 cycles/byte
After:
AES-CBC-128 : 185108 Kb/s, 16 cycles/byte
AES-CBC-192 : 162839 Kb/s, 19 cycles/byte
AES-CBC-256 : 144700 Kb/s, 21 cycles/byte
2015-11-12 15:38:31 +01:00
*
*/
2017-06-07 16:52:48 +02:00
//#define MBEDTLS_AES_FEWER_TABLES
Add option to use smaller AES tables (table sizes reduced by 6144 bytes)
This patch adds MBEDTLS_AES_SMALL_TABLES option to reduce number of AES
look-up tables and thus save 6 KiB of memory. Enabling this option
cause performance hit MBEDTLS_AES_SMALL_TABLES of ~7% on ARM and ~15%
on x86-64.
Benchmark on Cortex-A7 (armhf):
Before:
AES-CBC-128 : 14394 Kb/s, 0 cycles/byte
AES-CBC-192 : 12442 Kb/s, 0 cycles/byte
AES-CBC-256 : 10958 Kb/s, 0 cycles/byte
After:
AES-CBC-128 : 13342 Kb/s, 0 cycles/byte
AES-CBC-192 : 11469 Kb/s, 0 cycles/byte
AES-CBC-256 : 10058 Kb/s, 0 cycles/byte
Benchmark on Intel Core i5-4570 (x86_64, 3.2 Ghz, no turbo):
Before:
AES-CBC-128 : 215759 Kb/s, 14 cycles/byte
AES-CBC-192 : 190884 Kb/s, 16 cycles/byte
AES-CBC-256 : 171536 Kb/s, 18 cycles/byte
After:
AES-CBC-128 : 185108 Kb/s, 16 cycles/byte
AES-CBC-192 : 162839 Kb/s, 19 cycles/byte
AES-CBC-256 : 144700 Kb/s, 21 cycles/byte
2015-11-12 15:38:31 +01:00
2015-04-03 16:28:19 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_CAMELLIA_SMALL_MEMORY
2015-04-03 16:28:19 +02:00
*
* Use less ROM for the Camellia implementation ( saves about 768 bytes ) .
*
* Uncomment this macro to use less memory for Camellia .
*/
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_CAMELLIA_SMALL_MEMORY
2015-04-03 16:28:19 +02:00
2013-09-13 14:10:44 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_CIPHER_MODE_CBC
2013-09-13 14:10:44 +02:00
*
* Enable Cipher Block Chaining mode ( CBC ) for symmetric ciphers .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_CIPHER_MODE_CBC
2013-09-13 14:10:44 +02:00
2011-04-19 16:29:23 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_CIPHER_MODE_CFB
2011-04-19 16:29:23 +02:00
*
* Enable Cipher Feedback mode ( CFB ) for symmetric ciphers .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_CIPHER_MODE_CFB
2011-04-19 16:29:23 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_CIPHER_MODE_CTR
2011-04-19 16:29:23 +02:00
*
* Enable Counter Block Cipher mode ( CTR ) for symmetric ciphers .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_CIPHER_MODE_CTR
2011-04-19 16:29:23 +02:00
/**
2018-06-14 12:38:50 +02:00
* \ def MBEDTLS_CIPHER_MODE_OFB
2011-04-19 16:29:23 +02:00
*
2018-06-14 12:38:50 +02:00
* Enable Output Feedback mode ( OFB ) for symmetric ciphers .
2011-04-19 16:29:23 +02:00
*/
2018-06-14 12:38:50 +02:00
# define MBEDTLS_CIPHER_MODE_OFB
2011-04-19 16:29:23 +02:00
/**
2018-06-14 12:38:50 +02:00
* \ def MBEDTLS_CIPHER_MODE_XTS
2011-04-19 16:29:23 +02:00
*
2018-06-14 12:38:50 +02:00
* Enable Xor - encrypt - xor with ciphertext stealing mode ( XTS ) for AES .
2011-04-19 16:29:23 +02:00
*/
2018-06-14 12:38:50 +02:00
# define MBEDTLS_CIPHER_MODE_XTS
2011-04-19 16:29:23 +02:00
2012-02-06 17:45:10 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_CIPHER_NULL_CIPHER
2012-02-06 17:45:10 +01:00
*
* Enable NULL cipher .
* Warning : Only do so when you know what you are doing . This allows for
* encryption or channels without any security !
*
2015-04-08 12:49:31 +02:00
* Requires MBEDTLS_ENABLE_WEAK_CIPHERSUITES as well to enable
2012-02-06 17:45:10 +01:00
* the following ciphersuites :
2015-04-08 12:49:31 +02:00
* MBEDTLS_TLS_ECDH_ECDSA_WITH_NULL_SHA
* MBEDTLS_TLS_ECDH_RSA_WITH_NULL_SHA
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_NULL_SHA
* MBEDTLS_TLS_ECDHE_RSA_WITH_NULL_SHA
* MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA384
* MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA256
* MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA
* MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA384
* MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA256
* MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA
* MBEDTLS_TLS_RSA_WITH_NULL_SHA256
* MBEDTLS_TLS_RSA_WITH_NULL_SHA
* MBEDTLS_TLS_RSA_WITH_NULL_MD5
* MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA384
* MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA256
* MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA
* MBEDTLS_TLS_PSK_WITH_NULL_SHA384
* MBEDTLS_TLS_PSK_WITH_NULL_SHA256
* MBEDTLS_TLS_PSK_WITH_NULL_SHA
2012-02-06 17:45:10 +01:00
*
* Uncomment this macro to enable the NULL cipher and ciphersuites
*/
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_CIPHER_NULL_CIPHER
2012-02-06 17:45:10 +01:00
2013-08-14 12:21:18 +02:00
/**
2016-01-04 13:51:01 +01:00
* \ def MBEDTLS_CIPHER_PADDING_PKCS7
2013-08-14 12:21:18 +02:00
*
2016-01-04 13:51:01 +01:00
* MBEDTLS_CIPHER_PADDING_XXX : Uncomment or comment macros to add support for
* specific padding modes in the cipher layer with cipher modes that support
* padding ( e . g . CBC )
2013-08-14 12:21:18 +02:00
*
* If you disable all padding modes , only full blocks can be used with CBC .
*
* Enable padding modes in the cipher layer .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_CIPHER_PADDING_PKCS7
# define MBEDTLS_CIPHER_PADDING_ONE_AND_ZEROS
# define MBEDTLS_CIPHER_PADDING_ZEROS_AND_LEN
# define MBEDTLS_CIPHER_PADDING_ZEROS
2013-08-14 12:21:18 +02:00
2019-10-03 14:21:14 +02:00
/** \def MBEDTLS_CTR_DRBG_USE_128_BIT_KEY
*
* Uncomment this macro to use a 128 - bit key in the CTR_DRBG module .
* By default , CTR_DRBG uses a 256 - bit key .
*/
//#define MBEDTLS_CTR_DRBG_USE_128_BIT_KEY
2012-02-06 17:45:10 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_ENABLE_WEAK_CIPHERSUITES
2012-02-06 17:45:10 +01:00
*
2013-09-20 13:45:36 +02:00
* Enable weak ciphersuites in SSL / TLS .
2012-02-06 17:45:10 +01:00
* Warning : Only do so when you know what you are doing . This allows for
2012-11-14 13:39:52 +01:00
* channels with virtually no security at all !
2012-02-06 17:45:10 +01:00
*
* This enables the following ciphersuites :
2015-04-08 12:49:31 +02:00
* MBEDTLS_TLS_RSA_WITH_DES_CBC_SHA
* MBEDTLS_TLS_DHE_RSA_WITH_DES_CBC_SHA
2012-02-06 17:45:10 +01:00
*
* Uncomment this macro to enable weak ciphersuites
2017-09-25 15:53:51 +02:00
*
* \ warning DES is considered a weak cipher and its use constitutes a
* security risk . We recommend considering stronger ciphers instead .
2012-02-06 17:45:10 +01:00
*/
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_ENABLE_WEAK_CIPHERSUITES
2012-02-06 17:45:10 +01:00
2014-06-24 22:42:34 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_REMOVE_ARC4_CIPHERSUITES
2014-06-24 22:42:34 +02:00
*
* Remove RC4 ciphersuites by default in SSL / TLS .
* This flag removes the ciphersuites based on RC4 from the default list as
2015-04-08 12:49:31 +02:00
* returned by mbedtls_ssl_list_ciphersuites ( ) . However , it is still possible to
2015-05-11 09:50:24 +02:00
* enable ( some of ) them with mbedtls_ssl_conf_ciphersuites ( ) by including them
2014-06-24 22:42:34 +02:00
* explicitly .
*
* Uncomment this macro to remove RC4 ciphersuites by default .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_REMOVE_ARC4_CIPHERSUITES
2014-06-24 22:42:34 +02:00
2018-10-30 19:21:41 +01:00
/**
* \ def MBEDTLS_REMOVE_3DES_CIPHERSUITES
*
* Remove 3 DES ciphersuites by default in SSL / TLS .
* This flag removes the ciphersuites based on 3 DES from the default list as
* returned by mbedtls_ssl_list_ciphersuites ( ) . However , it is still possible
* to enable ( some of ) them with mbedtls_ssl_conf_ciphersuites ( ) by including
* them explicitly .
*
2019-02-11 22:47:30 +01:00
* A man - in - the - browser attacker can recover authentication tokens sent through
2018-11-26 21:57:49 +01:00
* a TLS connection using a 3 DES based cipher suite ( see " On the Practical
* ( In - ) Security of 64 - bit Block Ciphers " by Karthikeyan Bhargavan and Gaëtan
* Leurent , see https : //sweet32.info/SWEET32_CCS16.pdf). If this attack falls
* in your threat model or you are unsure , then you should keep this option
* enabled to remove 3 DES based cipher suites .
*
2018-10-30 19:21:41 +01:00
* Comment this macro to keep 3 DES in the default ciphersuite list .
*/
# define MBEDTLS_REMOVE_3DES_CIPHERSUITES
2013-06-29 23:26:34 +02:00
/**
2016-01-04 13:51:01 +01:00
* \ def MBEDTLS_ECP_DP_SECP192R1_ENABLED
2013-06-29 23:26:34 +02:00
*
2016-01-04 13:51:01 +01:00
* MBEDTLS_ECP_XXXX_ENABLED : Enables specific curves within the Elliptic Curve
* module . By default all supported curves are enabled .
2013-06-29 23:26:34 +02:00
*
* Comment macros to disable the curve and functions for it
*/
2018-09-14 17:34:00 +02:00
/* Short Weierstrass curves (supporting ECP, ECDH, ECDSA) */
2015-04-08 12:49:31 +02:00
# define MBEDTLS_ECP_DP_SECP192R1_ENABLED
# define MBEDTLS_ECP_DP_SECP224R1_ENABLED
# define MBEDTLS_ECP_DP_SECP256R1_ENABLED
# define MBEDTLS_ECP_DP_SECP384R1_ENABLED
# define MBEDTLS_ECP_DP_SECP521R1_ENABLED
# define MBEDTLS_ECP_DP_SECP192K1_ENABLED
# define MBEDTLS_ECP_DP_SECP224K1_ENABLED
# define MBEDTLS_ECP_DP_SECP256K1_ENABLED
# define MBEDTLS_ECP_DP_BP256R1_ENABLED
# define MBEDTLS_ECP_DP_BP384R1_ENABLED
# define MBEDTLS_ECP_DP_BP512R1_ENABLED
2018-09-14 17:34:00 +02:00
/* Montgomery curves (supporting ECP) */
2015-06-23 00:18:41 +02:00
# define MBEDTLS_ECP_DP_CURVE25519_ENABLED
2015-11-10 14:10:01 +01:00
# define MBEDTLS_ECP_DP_CURVE448_ENABLED
2015-04-08 12:49:31 +02:00
/**
* \ def MBEDTLS_ECP_NIST_OPTIM
2013-10-23 16:11:52 +02:00
*
* Enable specific ' modulo p ' routines for each NIST prime .
* Depending on the prime and architecture , makes operations 4 to 8 times
* faster on the corresponding curve .
*
* Comment this macro to disable NIST curves optimisation .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_ECP_NIST_OPTIM
2013-10-23 16:11:52 +02:00
2020-05-19 12:38:31 +02:00
/**
* \ def MBEDTLS_ECP_NO_INTERNAL_RNG
*
* When this option is disabled , mbedtls_ecp_mul ( ) will make use of an
* internal RNG when called with a NULL \ c f_rng argument , in order to protect
* against some side - channel attacks .
*
* This protection introduces a dependency of the ECP module on one of the
* DRBG modules . For very constrained implementations that don ' t require this
* protection ( for example , because you ' re only doing signature verification ,
* so not manipulating any secret , or because local / physical side - channel
* attacks are outside your threat model ) , it might be desirable to get rid of
* that dependency .
*
* \ warning Enabling this option makes some uses of ECP vulnerable to some
* side - channel attacks . Only enable it if you know that ' s not a problem for
* your use case .
*
* Uncomment this macro to disable some counter - measures in ECP .
*/
//#define MBEDTLS_ECP_NO_INTERNAL_RNG
2017-03-22 11:17:51 +01:00
/**
2017-04-20 15:50:26 +02:00
* \ def MBEDTLS_ECP_RESTARTABLE
2017-03-22 11:17:51 +01:00
*
* Enable " non-blocking " ECC operations that can return early and be resumed .
*
2018-10-15 13:22:41 +02:00
* This allows various functions to pause by returning
* # MBEDTLS_ERR_ECP_IN_PROGRESS ( or , for functions in the SSL module ,
* # MBEDTLS_ERR_SSL_CRYPTO_IN_PROGRESS ) and then be called later again in
* order to further progress and eventually complete their operation . This is
* controlled through mbedtls_ecp_set_max_ops ( ) which limits the maximum
* number of ECC operations a function may perform before pausing ; see
* mbedtls_ecp_set_max_ops ( ) for more information .
2017-03-22 11:17:51 +01:00
*
2017-08-23 10:02:51 +02:00
* This is useful in non - threaded environments if you want to avoid blocking
2018-10-15 13:22:41 +02:00
* for too long on ECC ( and , hence , X .509 or SSL / TLS ) operations .
2017-03-22 11:17:51 +01:00
*
2017-08-15 14:30:59 +02:00
* Uncomment this macro to enable restartable ECC computations .
2018-11-05 13:04:26 +01:00
*
2018-11-05 15:58:13 +01:00
* \ note This option only works with the default software implementation of
* elliptic curve functionality . It is incompatible with
2019-02-22 12:14:02 +01:00
* MBEDTLS_ECP_ALT , MBEDTLS_ECDH_XXX_ALT , MBEDTLS_ECDSA_XXX_ALT
* and MBEDTLS_ECDH_LEGACY_CONTEXT .
2017-03-22 11:17:51 +01:00
*/
2017-08-15 14:30:59 +02:00
//#define MBEDTLS_ECP_RESTARTABLE
2017-03-22 11:17:51 +01:00
2019-02-22 12:14:02 +01:00
/**
* \ def MBEDTLS_ECDH_LEGACY_CONTEXT
*
* Use a backward compatible ECDH context .
*
* Mbed TLS supports two formats for ECDH contexts ( # mbedtls_ecdh_context
* defined in ` ecdh . h ` ) . For most applications , the choice of format makes
* no difference , since all library functions can work with either format ,
* except that the new format is incompatible with MBEDTLS_ECP_RESTARTABLE .
* The new format used when this option is disabled is smaller
* ( 56 bytes on a 32 - bit platform ) . In future versions of the library , it
* will support alternative implementations of ECDH operations .
* The new format is incompatible with applications that access
* context fields directly and with restartable ECP operations .
*
* Define this macro if you enable MBEDTLS_ECP_RESTARTABLE or if you
* want to access ECDH context fields directly . Otherwise you should
* comment out this macro definition .
*
* This option has no effect if # MBEDTLS_ECDH_C is not enabled .
*
* \ note This configuration option is experimental . Future versions of the
* library may modify the way the ECDH context layout is configured
* and may modify the layout of the new context type .
*/
# define MBEDTLS_ECDH_LEGACY_CONTEXT
2014-01-06 10:16:28 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_ECDSA_DETERMINISTIC
2014-01-06 10:16:28 +01:00
*
* Enable deterministic ECDSA ( RFC 6979 ) .
* Standard ECDSA is " fragile " in the sense that lack of entropy when signing
* may result in a compromise of the long - term signing key . This is avoided by
* the deterministic variant .
*
2020-10-26 17:39:05 +01:00
* Requires : MBEDTLS_HMAC_DRBG_C , MBEDTLS_ECDSA_C
2014-01-07 16:46:17 +01:00
*
2014-01-06 10:16:28 +01:00
* Comment this macro to disable deterministic ECDSA .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_ECDSA_DETERMINISTIC
2014-01-06 10:16:28 +01:00
2013-04-16 18:05:29 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_KEY_EXCHANGE_PSK_ENABLED
2013-04-16 18:05:29 +02:00
*
2013-09-20 13:45:36 +02:00
* Enable the PSK based ciphersuite modes in SSL / TLS .
2013-04-16 18:05:29 +02:00
*
2013-04-19 09:08:57 +02:00
* This enables the following ciphersuites ( if other requisites are
* enabled as well ) :
2015-04-08 12:49:31 +02:00
* MBEDTLS_TLS_PSK_WITH_AES_256_GCM_SHA384
* MBEDTLS_TLS_PSK_WITH_AES_256_CBC_SHA384
* MBEDTLS_TLS_PSK_WITH_AES_256_CBC_SHA
* MBEDTLS_TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384
* MBEDTLS_TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384
* MBEDTLS_TLS_PSK_WITH_AES_128_GCM_SHA256
* MBEDTLS_TLS_PSK_WITH_AES_128_CBC_SHA256
* MBEDTLS_TLS_PSK_WITH_AES_128_CBC_SHA
* MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256
* MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256
* MBEDTLS_TLS_PSK_WITH_3DES_EDE_CBC_SHA
* MBEDTLS_TLS_PSK_WITH_RC4_128_SHA
2013-04-16 18:05:29 +02:00
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_KEY_EXCHANGE_PSK_ENABLED
2013-04-16 18:05:29 +02:00
2013-04-19 09:08:57 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED
2013-04-19 09:08:57 +02:00
*
2013-09-20 13:45:36 +02:00
* Enable the DHE - PSK based ciphersuite modes in SSL / TLS .
2013-04-19 09:08:57 +02:00
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_DHM_C
2013-04-19 09:08:57 +02:00
*
* This enables the following ciphersuites ( if other requisites are
* enabled as well ) :
2015-04-08 12:49:31 +02:00
* MBEDTLS_TLS_DHE_PSK_WITH_AES_256_GCM_SHA384
* MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CBC_SHA384
* MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CBC_SHA
* MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384
* MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384
* MBEDTLS_TLS_DHE_PSK_WITH_AES_128_GCM_SHA256
* MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CBC_SHA256
* MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CBC_SHA
* MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256
* MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256
* MBEDTLS_TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA
* MBEDTLS_TLS_DHE_PSK_WITH_RC4_128_SHA
2017-09-28 11:33:29 +02:00
*
2017-10-03 13:09:22 +02:00
* \ warning Using DHE constitutes a security risk as it
* is not possible to validate custom DH parameters .
* If possible , it is recommended users should consider
* preferring other methods of key exchange .
* See dhm . h for more details .
2017-09-28 11:33:29 +02:00
*
2013-04-19 09:08:57 +02:00
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED
2013-04-19 09:08:57 +02:00
2013-10-11 16:53:50 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED
2013-10-11 16:53:50 +02:00
*
* Enable the ECDHE - PSK based ciphersuite modes in SSL / TLS .
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_ECDH_C
2013-10-11 16:53:50 +02:00
*
* This enables the following ciphersuites ( if other requisites are
* enabled as well ) :
2015-04-08 12:49:31 +02:00
* MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384
* MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA
* MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384
* MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256
* MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA
* MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256
* MBEDTLS_TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA
* MBEDTLS_TLS_ECDHE_PSK_WITH_RC4_128_SHA
2013-10-11 16:53:50 +02:00
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED
2013-10-11 16:53:50 +02:00
2013-04-19 09:08:57 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED
2013-04-19 09:08:57 +02:00
*
2013-09-20 13:45:36 +02:00
* Enable the RSA - PSK based ciphersuite modes in SSL / TLS .
2013-10-14 17:39:48 +02:00
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_RSA_C , MBEDTLS_PKCS1_V15 ,
* MBEDTLS_X509_CRT_PARSE_C
2013-04-19 09:08:57 +02:00
*
* This enables the following ciphersuites ( if other requisites are
* enabled as well ) :
2015-04-08 12:49:31 +02:00
* MBEDTLS_TLS_RSA_PSK_WITH_AES_256_GCM_SHA384
* MBEDTLS_TLS_RSA_PSK_WITH_AES_256_CBC_SHA384
* MBEDTLS_TLS_RSA_PSK_WITH_AES_256_CBC_SHA
* MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384
* MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384
* MBEDTLS_TLS_RSA_PSK_WITH_AES_128_GCM_SHA256
* MBEDTLS_TLS_RSA_PSK_WITH_AES_128_CBC_SHA256
* MBEDTLS_TLS_RSA_PSK_WITH_AES_128_CBC_SHA
* MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256
* MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256
* MBEDTLS_TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA
* MBEDTLS_TLS_RSA_PSK_WITH_RC4_128_SHA
2013-04-19 09:08:57 +02:00
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED
2013-04-19 09:08:57 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_KEY_EXCHANGE_RSA_ENABLED
2013-04-19 09:08:57 +02:00
*
2013-09-20 13:45:36 +02:00
* Enable the RSA - only based ciphersuite modes in SSL / TLS .
2013-04-19 09:08:57 +02:00
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_RSA_C , MBEDTLS_PKCS1_V15 ,
* MBEDTLS_X509_CRT_PARSE_C
2013-04-19 09:08:57 +02:00
*
* This enables the following ciphersuites ( if other requisites are
* enabled as well ) :
2015-04-08 12:49:31 +02:00
* MBEDTLS_TLS_RSA_WITH_AES_256_GCM_SHA384
* MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA256
* MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA
* MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384
* MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
* MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
* MBEDTLS_TLS_RSA_WITH_AES_128_GCM_SHA256
* MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA256
* MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA
* MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256
* MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
* MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
* MBEDTLS_TLS_RSA_WITH_3DES_EDE_CBC_SHA
* MBEDTLS_TLS_RSA_WITH_RC4_128_SHA
* MBEDTLS_TLS_RSA_WITH_RC4_128_MD5
*/
# define MBEDTLS_KEY_EXCHANGE_RSA_ENABLED
/**
* \ def MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED
2013-04-19 09:08:57 +02:00
*
2013-09-20 13:45:36 +02:00
* Enable the DHE - RSA based ciphersuite modes in SSL / TLS .
2013-04-19 09:08:57 +02:00
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_DHM_C , MBEDTLS_RSA_C , MBEDTLS_PKCS1_V15 ,
* MBEDTLS_X509_CRT_PARSE_C
2013-04-19 09:08:57 +02:00
*
* This enables the following ciphersuites ( if other requisites are
* enabled as well ) :
2015-04-08 12:49:31 +02:00
* MBEDTLS_TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
* MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
* MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA
* MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384
* MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
* MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
* MBEDTLS_TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
* MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
* MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA
* MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256
* MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
* MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
* MBEDTLS_TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
2017-09-28 11:33:29 +02:00
*
2017-10-03 13:09:22 +02:00
* \ warning Using DHE constitutes a security risk as it
* is not possible to validate custom DH parameters .
* If possible , it is recommended users should consider
* preferring other methods of key exchange .
* See dhm . h for more details .
2017-09-28 11:33:29 +02:00
*
2013-04-19 09:08:57 +02:00
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED
2013-04-19 09:08:57 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED
2013-04-19 09:08:57 +02:00
*
2013-09-20 13:45:36 +02:00
* Enable the ECDHE - RSA based ciphersuite modes in SSL / TLS .
2013-04-19 09:08:57 +02:00
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_ECDH_C , MBEDTLS_RSA_C , MBEDTLS_PKCS1_V15 ,
* MBEDTLS_X509_CRT_PARSE_C
2013-04-19 09:08:57 +02:00
*
* This enables the following ciphersuites ( if other requisites are
* enabled as well ) :
2015-04-08 12:49:31 +02:00
* MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
* MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
* MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
* MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384
* MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
* MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
* MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
* MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
* MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256
* MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
* MBEDTLS_TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
* MBEDTLS_TLS_ECDHE_RSA_WITH_RC4_128_SHA
2013-04-19 09:08:57 +02:00
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED
2013-04-19 09:08:57 +02:00
2013-08-17 17:39:04 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED
2013-08-17 17:39:04 +02:00
*
2013-09-20 13:45:36 +02:00
* Enable the ECDHE - ECDSA based ciphersuite modes in SSL / TLS .
2013-08-17 17:39:04 +02:00
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_ECDH_C , MBEDTLS_ECDSA_C , MBEDTLS_X509_CRT_PARSE_C ,
2013-08-17 17:39:04 +02:00
*
* This enables the following ciphersuites ( if other requisites are
* enabled as well ) :
2015-04-08 12:49:31 +02:00
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
2013-08-17 17:39:04 +02:00
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED
2013-08-17 17:39:04 +02:00
2013-12-11 16:17:10 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED
2013-12-11 16:17:10 +01:00
*
* Enable the ECDH - ECDSA based ciphersuite modes in SSL / TLS .
*
2018-09-14 17:47:41 +02:00
* Requires : MBEDTLS_ECDH_C , MBEDTLS_ECDSA_C , MBEDTLS_X509_CRT_PARSE_C
2013-12-11 16:17:10 +01:00
*
* This enables the following ciphersuites ( if other requisites are
* enabled as well ) :
2015-04-08 12:49:31 +02:00
* MBEDTLS_TLS_ECDH_ECDSA_WITH_RC4_128_SHA
* MBEDTLS_TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
* MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
* MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
* MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
* MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
* MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256
* MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384
* MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256
* MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384
* MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256
* MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384
2013-12-11 16:17:10 +01:00
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED
2013-12-11 16:17:10 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED
2013-12-11 16:17:10 +01:00
*
* Enable the ECDH - RSA based ciphersuite modes in SSL / TLS .
*
2018-09-14 17:47:41 +02:00
* Requires : MBEDTLS_ECDH_C , MBEDTLS_RSA_C , MBEDTLS_X509_CRT_PARSE_C
2013-12-11 16:17:10 +01:00
*
* This enables the following ciphersuites ( if other requisites are
* enabled as well ) :
2015-04-08 12:49:31 +02:00
* MBEDTLS_TLS_ECDH_RSA_WITH_RC4_128_SHA
* MBEDTLS_TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
* MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA
* MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
* MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256
* MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
* MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256
* MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384
* MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256
* MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384
* MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256
* MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384
2013-12-11 16:17:10 +01:00
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED
2013-12-11 16:17:10 +01:00
2015-09-15 17:53:32 +02:00
/**
* \ def MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED
*
* Enable the ECJPAKE based ciphersuite modes in SSL / TLS .
*
2015-09-16 23:21:01 +02:00
* \ warning This is currently experimental . EC J - PAKE support is based on the
* Thread v1 .0 .0 specification ; incompatible changes to the specification
* might still happen . For this reason , this is disabled by default .
2015-09-15 17:53:32 +02:00
*
* Requires : MBEDTLS_ECJPAKE_C
* MBEDTLS_SHA256_C
* MBEDTLS_ECP_DP_SECP256R1_ENABLED
*
* This enables the following ciphersuites ( if other requisites are
* enabled as well ) :
* MBEDTLS_TLS_ECJPAKE_WITH_AES_128_CCM_8
*/
2015-10-20 14:57:00 +02:00
//#define MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED
2015-09-15 17:53:32 +02:00
2014-03-19 16:39:52 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_PK_PARSE_EC_EXTENDED
2014-03-19 16:39:52 +01:00
*
* Enhance support for reading EC keys using variants of SEC1 not allowed by
* RFC 5915 and RFC 5480.
*
* Currently this means parsing the SpecifiedECDomain choice of EC
* parameters ( only known groups are supported , not arbitrary domains , to
* avoid validation issues ) .
*
* Disable if you only need to support RFC 5915 + 5480 key formats .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_PK_PARSE_EC_EXTENDED
2014-03-19 16:39:52 +01:00
2013-02-02 12:43:08 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_ERROR_STRERROR_DUMMY
2013-02-02 12:43:08 +01:00
*
2015-04-08 12:49:31 +02:00
* Enable a dummy error function to make use of mbedtls_strerror ( ) in
* third party libraries easier when MBEDTLS_ERROR_C is disabled
* ( no effect when MBEDTLS_ERROR_C is enabled ) .
2014-06-25 12:55:12 +02:00
*
2015-04-08 12:49:31 +02:00
* You can safely disable this if MBEDTLS_ERROR_C is enabled , or if you ' re
* not using mbedtls_strerror ( ) or error_strerror ( ) in your application .
2013-02-02 12:43:08 +01:00
*
* Disable if you run into name conflicts and want to really remove the
2015-04-08 12:49:31 +02:00
* mbedtls_strerror ( )
2013-02-02 12:43:08 +01:00
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_ERROR_STRERROR_DUMMY
2013-02-02 12:43:08 +01:00
2011-01-27 16:24:17 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_GENPRIME
2011-01-27 16:24:17 +01:00
*
2013-09-20 14:10:14 +02:00
* Enable the prime - number generation code .
2013-09-20 13:45:36 +02:00
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_BIGNUM_C
2009-01-03 22:22:43 +01:00
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_GENPRIME
2009-01-03 22:22:43 +01:00
2011-04-25 17:28:35 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_FS_IO
2011-04-25 17:28:35 +02:00
*
* Enable functions that use the filesystem .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_FS_IO
2011-04-25 17:28:35 +02:00
2011-12-15 21:11:16 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_NO_DEFAULT_ENTROPY_SOURCES
2011-12-15 21:11:16 +01:00
*
* Do not add default entropy sources . These are the platform specific ,
2015-04-08 12:49:31 +02:00
* mbedtls_timing_hardclock and HAVEGE based poll functions .
2011-12-15 21:11:16 +01:00
*
2014-04-05 06:04:40 +02:00
* This is useful to have more control over the added entropy sources in an
2011-12-15 21:11:16 +01:00
* application .
*
* Uncomment this macro to prevent loading of default entropy functions .
*/
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_NO_DEFAULT_ENTROPY_SOURCES
2011-12-15 21:11:16 +01:00
2011-12-03 22:45:14 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_NO_PLATFORM_ENTROPY
2011-12-03 22:45:14 +01:00
*
* Do not use built - in platform entropy functions .
* This is useful if your platform does not support
* standards like the / dev / urandom or Windows CryptoAPI .
*
* Uncomment this macro to disable the built - in platform entropy functions .
*/
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_NO_PLATFORM_ENTROPY
2011-12-03 22:45:14 +01:00
2014-02-06 15:55:25 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_ENTROPY_FORCE_SHA256
2014-02-06 15:55:25 +01:00
*
* Force the entropy accumulator to use a SHA - 256 accumulator instead of the
* default SHA - 512 based one ( if both are available ) .
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_SHA256_C
2014-02-06 15:55:25 +01:00
*
* On 32 - bit systems SHA - 256 can be much faster than SHA - 512. Use this option
* if you have performance concerns .
*
2015-04-08 12:49:31 +02:00
* This option is only useful if both MBEDTLS_SHA256_C and
* MBEDTLS_SHA512_C are defined . Otherwise the available hash module is used .
2014-02-06 15:55:25 +01:00
*/
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_ENTROPY_FORCE_SHA256
2014-02-06 15:55:25 +01:00
2016-06-01 12:25:44 +02:00
/**
* \ def MBEDTLS_ENTROPY_NV_SEED
*
* Enable the non - volatile ( NV ) seed file - based entropy source .
* ( Also enables the NV seed read / write functions in the platform layer )
*
* This is crucial ( if not required ) on systems that do not have a
* cryptographic entropy source ( in hardware or kernel ) available .
*
* Requires : MBEDTLS_ENTROPY_C , MBEDTLS_PLATFORM_C
*
2016-06-07 11:59:03 +02:00
* \ note The read / write functions that are used by the entropy source are
* determined in the platform layer , and can be modified at runtime and / or
* compile - time depending on the flags ( MBEDTLS_PLATFORM_NV_SEED_ * ) used .
*
* \ note If you use the default implementation functions that read a seedfile
2016-06-01 12:25:44 +02:00
* with regular fopen ( ) , please make sure you make a seedfile with the
* proper name ( defined in MBEDTLS_PLATFORM_STD_NV_SEED_FILE ) and at
* least MBEDTLS_ENTROPY_BLOCK_SIZE bytes in size that can be read from
2016-06-07 11:59:03 +02:00
* and written to or you will get an entropy source error ! The default
* implementation will only use the first MBEDTLS_ENTROPY_BLOCK_SIZE
* bytes from the file .
*
* \ note The entropy collector will write to the seed file before entropy is
* given to an external source , to update it .
2016-06-01 12:25:44 +02:00
*/
//#define MBEDTLS_ENTROPY_NV_SEED
2020-08-28 19:01:50 +02:00
/* MBEDTLS_PSA_CRYPTO_KEY_ID_ENCODES_OWNER
2019-02-19 14:00:31 +01:00
*
2020-08-28 19:01:50 +02:00
* Enable key identifiers that encode a key owner identifier .
2019-02-19 14:00:31 +01:00
*
2020-09-14 10:02:56 +02:00
* The owner of a key is identified by a value of type : : mbedtls_key_owner_id_t
* which is currently hard - coded to be int32_t .
2019-02-19 14:00:31 +01:00
*
* Note that this option is meant for internal use only and may be removed
* without notice .
*/
2020-08-28 19:01:50 +02:00
//#define MBEDTLS_PSA_CRYPTO_KEY_ID_ENCODES_OWNER
2019-02-19 14:00:31 +01:00
2013-07-03 13:37:05 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_MEMORY_DEBUG
2013-07-03 13:37:05 +02:00
*
* Enable debugging of buffer allocator memory issues . Automatically prints
* ( to stderr ) all ( fatal ) messages on memory allocation issues . Enables
* function for ' debug output ' of allocated memory .
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_MEMORY_BUFFER_ALLOC_C
2013-07-03 13:37:05 +02:00
*
* Uncomment this macro to let the buffer allocator print out error messages .
2013-10-15 11:55:10 +02:00
*/
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_MEMORY_DEBUG
2013-07-03 13:37:05 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_MEMORY_BACKTRACE
2013-07-03 13:37:05 +02:00
*
* Include backtrace information with each allocated block .
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_MEMORY_BUFFER_ALLOC_C
2013-07-03 13:37:05 +02:00
* GLIBC - compatible backtrace ( ) an backtrace_symbols ( ) support
*
* Uncomment this macro to include backtrace information
*/
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_MEMORY_BACKTRACE
2013-07-03 13:37:05 +02:00
2015-03-31 14:01:33 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_PK_RSA_ALT_SUPPORT
2015-03-31 14:01:33 +02:00
*
* Support external private RSA keys ( eg from a HSM ) in the PK layer .
*
* Comment this macro to disable support for external private RSA keys .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_PK_RSA_ALT_SUPPORT
2015-03-31 14:01:33 +02:00
2013-08-30 12:06:24 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_PKCS1_V15
2013-08-30 12:06:24 +02:00
*
2013-09-20 13:45:36 +02:00
* Enable support for PKCS # 1 v1 .5 encoding .
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_RSA_C
2013-08-30 12:06:24 +02:00
*
* This enables support for PKCS # 1 v1 .5 operations .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_PKCS1_V15
2013-08-30 12:06:24 +02:00
2011-03-08 15:16:06 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_PKCS1_V21
2011-03-08 15:16:06 +01:00
*
2013-09-20 13:45:36 +02:00
* Enable support for PKCS # 1 v2 .1 encoding .
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_MD_C , MBEDTLS_RSA_C
2011-05-26 15:16:06 +02:00
*
2011-03-08 15:16:06 +01:00
* This enables support for RSAES - OAEP and RSASSA - PSS operations .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_PKCS1_V21
2011-03-08 15:16:06 +01:00
2020-07-16 20:27:57 +02:00
/** \def MBEDTLS_PSA_CRYPTO_DRIVERS
*
* Enable support for the experimental PSA crypto driver interface .
*
2020-10-13 06:32:12 +02:00
* Requires : MBEDTLS_PSA_CRYPTO_C
2020-07-16 20:27:57 +02:00
*
* \ warning This interface is experimental and may change or be removed
* without notice .
*/
//#define MBEDTLS_PSA_CRYPTO_DRIVERS
2019-02-05 11:23:41 +01:00
/**
* \ def MBEDTLS_PSA_CRYPTO_SPM
*
* When MBEDTLS_PSA_CRYPTO_SPM is defined , the code is built for SPM ( Secure
* Partition Manager ) integration which separates the code into two parts : a
* NSPE ( Non - Secure Process Environment ) and an SPE ( Secure Process
* Environment ) .
*
* Module : library / psa_crypto . c
* Requires : MBEDTLS_PSA_CRYPTO_C
*
*/
//#define MBEDTLS_PSA_CRYPTO_SPM
/**
2019-03-15 17:14:19 +01:00
* \ def MBEDTLS_PSA_INJECT_ENTROPY
2019-02-05 11:23:41 +01:00
*
2019-03-15 17:14:19 +01:00
* Enable support for entropy injection at first boot . This feature is
* required on systems that do not have a built - in entropy source ( TRNG ) .
* This feature is currently not supported on systems that have a built - in
* entropy source .
2019-02-05 11:23:41 +01:00
*
2019-03-15 17:14:19 +01:00
* Requires : MBEDTLS_PSA_CRYPTO_STORAGE_C , MBEDTLS_ENTROPY_NV_SEED
2019-02-05 11:23:41 +01:00
*
*/
2019-03-15 17:14:19 +01:00
//#define MBEDTLS_PSA_INJECT_ENTROPY
2019-02-05 11:23:41 +01:00
2011-03-26 14:40:23 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_RSA_NO_CRT
2011-03-26 14:40:23 +01:00
*
2017-05-03 14:51:16 +02:00
* Do not use the Chinese Remainder Theorem
* for the RSA private operation .
2011-03-26 14:40:23 +01:00
*
* Uncomment this macro to disable the use of CRT in RSA .
*
*/
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_RSA_NO_CRT
2011-04-24 23:19:15 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_SELF_TEST
2011-04-24 23:19:15 +02:00
*
* Enable the checkup functions ( * _self_test ) .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_SELF_TEST
2011-07-27 18:51:09 +02:00
2015-05-28 12:54:04 +02:00
/**
* \ def MBEDTLS_SHA256_SMALLER
*
* Enable an implementation of SHA - 256 that has lower ROM footprint but also
* lower performance .
*
* The default implementation is meant to be a reasonnable compromise between
* performance and size . This version optimizes more aggressively for size at
* the expense of performance . Eg on Cortex - M4 it reduces the size of
* mbedtls_sha256_process ( ) from ~ 2 KB to ~ 0.5 KB for a performance hit of about
* 30 % .
*
* Uncomment to enable the smaller implementation of SHA256 .
*/
//#define MBEDTLS_SHA256_SMALLER
2013-01-31 17:13:13 +01:00
/**
2019-07-17 12:36:53 +02:00
* \ def MBEDTLS_SHA512_SMALLER
2013-01-31 17:13:13 +01:00
*
2019-07-17 12:36:53 +02:00
* Enable an implementation of SHA - 512 that has lower ROM footprint but also
* lower performance .
2013-01-31 17:13:13 +01:00
*
2019-07-17 12:36:53 +02:00
* Uncomment to enable the smaller implementation of SHA512 .
2013-01-31 17:13:13 +01:00
*/
2019-07-17 12:36:53 +02:00
//#define MBEDTLS_SHA512_SMALLER
2013-01-31 17:13:13 +01:00
2019-07-03 17:13:00 +02:00
/**
2019-07-17 14:58:03 +02:00
* \ def MBEDTLS_SHA512_NO_SHA384
2019-07-03 17:13:00 +02:00
*
2019-07-17 14:58:03 +02:00
* Disable the SHA - 384 option of the SHA - 512 module . Use this to save some
* code size on devices that don ' t use SHA - 384.
2019-07-03 17:13:00 +02:00
*
2020-01-07 11:00:34 +01:00
* Requires : MBEDTLS_SHA512_C
2019-07-03 17:13:00 +02:00
*
2019-07-17 14:58:03 +02:00
* Uncomment to disable SHA - 384
2019-07-03 17:13:00 +02:00
*/
2019-07-17 14:58:03 +02:00
//#define MBEDTLS_SHA512_NO_SHA384
2019-07-03 17:13:00 +02:00
2019-04-09 16:12:41 +02:00
/**
2020-02-26 18:56:08 +01:00
* \ def MBEDTLS_SSL_ALL_ALERT_MESSAGES
2019-04-09 16:12:41 +02:00
*
2020-02-26 18:56:08 +01:00
* Enable sending of alert messages in case of encountered errors as per RFC .
* If you choose not to send the alert messages , mbed TLS can still communicate
* with other servers , only debugging of failures is harder .
2019-04-09 16:12:41 +02:00
*
2020-02-26 18:56:08 +01:00
* The advantage of not sending alert messages , is that no information is given
* about reasons for failures thus preventing adversaries of gaining intel .
2019-04-09 16:12:41 +02:00
*
2020-02-26 18:56:08 +01:00
* Enable sending of all alert messages
2019-04-09 16:12:41 +02:00
*/
2020-02-26 18:56:08 +01:00
# define MBEDTLS_SSL_ALL_ALERT_MESSAGES
2019-04-09 16:12:41 +02:00
2020-03-04 21:35:27 +01:00
/**
* \ def MBEDTLS_SSL_RECORD_CHECKING
*
* Enable the function mbedtls_ssl_check_record ( ) which can be used to check
* the validity and authenticity of an incoming record , to verify that it has
* not been seen before . These checks are performed without modifying the
* externally visible state of the SSL context .
*
* See mbedtls_ssl_check_record ( ) for more information .
*
* Uncomment to enable support for record checking .
*/
# define MBEDTLS_SSL_RECORD_CHECKING
/**
* \ def MBEDTLS_SSL_DTLS_CONNECTION_ID
*
* Enable support for the DTLS Connection ID extension
* ( version draft - ietf - tls - dtls - connection - id - 05 ,
* https : //tools.ietf.org/html/draft-ietf-tls-dtls-connection-id-05)
* which allows to identify DTLS connections across changes
* in the underlying transport .
*
* Setting this option enables the SSL APIs ` mbedtls_ssl_set_cid ( ) ` ,
* ` mbedtls_ssl_get_peer_cid ( ) ` and ` mbedtls_ssl_conf_cid ( ) ` .
* See the corresponding documentation for more information .
*
* \ warning The Connection ID extension is still in draft state .
* We make no stability promises for the availability
* or the shape of the API controlled by this option .
*
* The maximum lengths of outgoing and incoming CIDs can be configured
* through the options
* - MBEDTLS_SSL_CID_OUT_LEN_MAX
* - MBEDTLS_SSL_CID_IN_LEN_MAX .
*
* Requires : MBEDTLS_SSL_PROTO_DTLS
*
* Uncomment to enable the Connection ID extension .
*/
//#define MBEDTLS_SSL_DTLS_CONNECTION_ID
2018-04-24 13:09:22 +02:00
/**
* \ def MBEDTLS_SSL_ASYNC_PRIVATE
*
* Enable asynchronous external private key operations in SSL . This allows
* you to configure an SSL connection to call an external cryptographic
* module to perform private key operations instead of performing the
* operation inside the library .
*
*/
2018-06-15 21:31:26 +02:00
//#define MBEDTLS_SSL_ASYNC_PRIVATE
2018-04-24 13:09:22 +02:00
2020-03-04 21:35:27 +01:00
/**
* \ def MBEDTLS_SSL_CONTEXT_SERIALIZATION
*
* Enable serialization of the TLS context structures , through use of the
* functions mbedtls_ssl_context_save ( ) and mbedtls_ssl_context_load ( ) .
*
* This pair of functions allows one side of a connection to serialize the
* context associated with the connection , then free or re - use that context
* while the serialized state is persisted elsewhere , and finally deserialize
* that state to a live context for resuming read / write operations on the
* connection . From a protocol perspective , the state of the connection is
* unaffected , in particular this is entirely transparent to the peer .
*
* Note : this is distinct from TLS session resumption , which is part of the
* protocol and fully visible by the peer . TLS session resumption enables
* establishing new connections associated to a saved session with shorter ,
* lighter handshakes , while context serialization is a local optimization in
* handling a single , potentially long - lived connection .
*
* Enabling these APIs makes some SSL structures larger , as 64 extra bytes are
* saved after the handshake to allow for more efficient serialization , so if
* you don ' t need this feature you ' ll save RAM by disabling it .
*
* Comment to disable the context serialization APIs .
*/
# define MBEDTLS_SSL_CONTEXT_SERIALIZATION
2013-01-31 16:57:45 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_SSL_DEBUG_ALL
2013-01-31 16:57:45 +01:00
*
* Enable the debug messages in SSL module for all issues .
* Debug messages have been disabled in some places to prevent timing
* attacks due to ( unbalanced ) debugging function calls .
*
* If you need all error reporting you should enable this during debugging ,
* but remove this for production servers that should log as well .
*
* Uncomment this macro to report all debug messages on errors introducing
* a timing side - channel .
*
*/
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_SSL_DEBUG_ALL
2013-01-31 16:57:45 +01:00
2015-04-08 12:49:31 +02:00
/** \def MBEDTLS_SSL_ENCRYPT_THEN_MAC
2014-10-27 13:57:03 +01:00
*
* Enable support for Encrypt - then - MAC , RFC 7366.
*
* This allows peers that both support it to use a more robust protection for
* ciphersuites using CBC , providing deep resistance against timing attacks
* on the padding or underlying cipher .
*
* This only affects CBC ciphersuites , and is useless if none is defined .
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_SSL_PROTO_TLS1 or
* MBEDTLS_SSL_PROTO_TLS1_1 or
* MBEDTLS_SSL_PROTO_TLS1_2
2014-10-27 13:57:03 +01:00
*
* Comment this macro to disable support for Encrypt - then - MAC
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_SSL_ENCRYPT_THEN_MAC
2014-10-27 13:57:03 +01:00
2015-04-08 12:49:31 +02:00
/** \def MBEDTLS_SSL_EXTENDED_MASTER_SECRET
2014-10-20 18:40:56 +02:00
*
2020-03-24 12:11:49 +01:00
* Enable support for RFC 7627 : Session Hash and Extended Master Secret
* Extension .
2014-10-20 18:40:56 +02:00
*
* This was introduced as " the proper fix " to the Triple Handshake familiy of
* attacks , but it is recommended to always use it ( even if you disable
* renegotiation ) , since it actually fixes a more fundamental issue in the
* original SSL / TLS design , and has implications beyond Triple Handshake .
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_SSL_PROTO_TLS1 or
* MBEDTLS_SSL_PROTO_TLS1_1 or
* MBEDTLS_SSL_PROTO_TLS1_2
2014-10-28 14:13:55 +01:00
*
2014-10-20 18:40:56 +02:00
* Comment this macro to disable support for Extended Master Secret .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_SSL_EXTENDED_MASTER_SECRET
2014-10-20 18:40:56 +02:00
2014-10-20 13:34:59 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_SSL_FALLBACK_SCSV
2014-10-20 13:34:59 +02:00
*
2020-03-24 12:11:49 +01:00
* Enable support for RFC 7507 : Fallback Signaling Cipher Suite Value ( SCSV )
* for Preventing Protocol Downgrade Attacks .
2014-10-20 13:34:59 +02:00
*
* For servers , it is recommended to always enable this , unless you support
* only one version of TLS , or know for sure that none of your clients
* implements a fallback strategy .
*
* For clients , you only need this if you ' re using a fallback strategy , which
* is not recommended in the first place , unless you absolutely need it to
* interoperate with buggy ( version - intolerant ) servers .
*
* Comment this macro to disable support for FALLBACK_SCSV
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_SSL_FALLBACK_SCSV
2014-10-20 13:34:59 +02:00
2019-02-05 18:04:00 +01:00
/**
* \ def MBEDTLS_SSL_KEEP_PEER_CERTIFICATE
*
2019-02-25 11:13:33 +01:00
* This option controls the availability of the API mbedtls_ssl_get_peer_cert ( )
2019-02-05 18:04:00 +01:00
* giving access to the peer ' s certificate after completion of the handshake .
*
* Unless you need mbedtls_ssl_peer_cert ( ) in your application , it is
* recommended to disable this option for reduced RAM usage .
*
* \ note If this option is disabled , mbedtls_ssl_get_peer_cert ( ) is still
* defined , but always returns \ c NULL .
*
* \ note This option has no influence on the protection against the
* triple handshake attack . Even if it is disabled , Mbed TLS will
* still ensure that certificates do not change during renegotiation ,
* for exaple by keeping a hash of the peer ' s certificate .
*
* Comment this macro to disable storing the peer ' s certificate
* after the handshake .
*/
# define MBEDTLS_SSL_KEEP_PEER_CERTIFICATE
2012-05-08 11:17:57 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_SSL_HW_RECORD_ACCEL
2012-05-08 11:17:57 +02:00
*
* Enable hooking functions in SSL module for hardware acceleration of
* individual records .
*
2019-01-15 19:43:48 +01:00
* \ deprecated This option is deprecated and will be removed in a future
* version of Mbed TLS .
2018-12-05 23:39:38 +01:00
*
2012-05-08 11:17:57 +02:00
* Uncomment this macro to enable hooking functions .
*/
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_SSL_HW_RECORD_ACCEL
2012-05-08 11:17:57 +02:00
2015-01-07 12:39:44 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_SSL_CBC_RECORD_SPLITTING
2015-01-07 12:39:44 +01:00
*
* Enable 1 / n - 1 record splitting for CBC mode in SSLv3 and TLS 1.0 .
*
* This is a countermeasure to the BEAST attack , which also minimizes the risk
* of interoperability issues compared to sending 0 - length records .
*
* Comment this macro to disable 1 / n - 1 record splitting .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_SSL_CBC_RECORD_SPLITTING
2015-01-07 12:39:44 +01:00
2014-11-03 08:23:14 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_SSL_RENEGOTIATION
2014-11-03 08:23:14 +01:00
*
2018-10-26 10:53:16 +02:00
* Enable support for TLS renegotiation .
2014-11-03 08:23:14 +01:00
*
* The two main uses of renegotiation are ( 1 ) refresh keys on long - lived
* connections and ( 2 ) client authentication after the initial handshake .
* If you don ' t need renegotiation , it ' s probably better to disable it , since
* it has been associated with security issues in the past and is easy to
* misuse / misunderstand .
2014-11-04 19:52:10 +01:00
*
2015-03-09 17:23:15 +01:00
* Comment this to disable support for renegotiation .
2017-10-12 15:57:48 +02:00
*
* \ note Even if this option is disabled , both client and server are aware
* of the Renegotiation Indication Extension ( RFC 5746 ) used to
* prevent the SSL renegotiation attack ( see RFC 5746 Sect . 1 ) .
* ( See \ c mbedtls_ssl_conf_legacy_renegotiation for the
* configuration of this extension ) .
*
2014-11-03 08:23:14 +01:00
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_SSL_RENEGOTIATION
2014-11-03 08:23:14 +01:00
2013-03-06 17:01:52 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_SSL_SRV_SUPPORT_SSLV2_CLIENT_HELLO
2013-03-06 17:01:52 +01:00
*
* Enable support for receiving and parsing SSLv2 Client Hello messages for the
2015-04-08 12:49:31 +02:00
* SSL Server module ( MBEDTLS_SSL_SRV_C ) .
2013-03-06 17:01:52 +01:00
*
2019-01-15 20:36:00 +01:00
* \ deprecated This option is deprecated and will be removed in a future
* version of Mbed TLS .
2018-11-29 10:55:41 +01:00
*
2015-03-10 14:48:34 +01:00
* Uncomment this macro to enable support for SSLv2 Client Hello messages .
2013-03-06 17:01:52 +01:00
*/
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_SSL_SRV_SUPPORT_SSLV2_CLIENT_HELLO
2013-03-06 17:01:52 +01:00
2013-11-30 18:30:06 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_SSL_SRV_RESPECT_CLIENT_PREFERENCE
2013-11-30 18:30:06 +01:00
*
* Pick the ciphersuite according to the client ' s preferences rather than ours
2015-04-08 12:49:31 +02:00
* in the SSL Server module ( MBEDTLS_SSL_SRV_C ) .
2013-11-30 18:30:06 +01:00
*
* Uncomment this macro to respect client ' s ciphersuite order
*/
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_SSL_SRV_RESPECT_CLIENT_PREFERENCE
2013-11-30 18:30:06 +01:00
2013-08-15 13:33:48 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_SSL_MAX_FRAGMENT_LENGTH
2013-08-15 13:33:48 +02:00
*
2013-09-20 13:45:36 +02:00
* Enable support for RFC 6066 max_fragment_length extension in SSL .
2013-08-15 13:33:48 +02:00
*
* Comment this macro to disable support for the max_fragment_length extension
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_SSL_MAX_FRAGMENT_LENGTH
2013-08-15 13:33:48 +02:00
2013-08-27 21:19:20 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_SSL_PROTO_SSL3
2013-08-27 21:19:20 +02:00
*
2013-09-20 13:45:36 +02:00
* Enable support for SSL 3.0 .
2013-08-27 21:19:20 +02:00
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_MD5_C
* MBEDTLS_SHA1_C
2013-08-27 21:19:20 +02:00
*
2019-01-15 20:36:00 +01:00
* \ deprecated This option is deprecated and will be removed in a future
* version of Mbed TLS .
2018-11-29 10:56:02 +01:00
*
2013-08-27 21:19:20 +02:00
* Comment this macro to disable support for SSL 3.0
*/
2016-03-07 16:57:05 +01:00
//#define MBEDTLS_SSL_PROTO_SSL3
2013-08-27 21:19:20 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_SSL_PROTO_TLS1
2013-08-27 21:19:20 +02:00
*
2013-09-20 13:45:36 +02:00
* Enable support for TLS 1.0 .
2013-08-27 21:19:20 +02:00
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_MD5_C
* MBEDTLS_SHA1_C
2013-08-27 21:19:20 +02:00
*
* Comment this macro to disable support for TLS 1.0
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_SSL_PROTO_TLS1
2013-08-27 21:19:20 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_SSL_PROTO_TLS1_1
2013-08-27 21:19:20 +02:00
*
2014-02-06 13:04:16 +01:00
* Enable support for TLS 1.1 ( and DTLS 1.0 if DTLS is enabled ) .
2013-08-27 21:19:20 +02:00
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_MD5_C
* MBEDTLS_SHA1_C
2013-08-27 21:19:20 +02:00
*
2014-02-06 13:04:16 +01:00
* Comment this macro to disable support for TLS 1.1 / DTLS 1.0
2013-08-27 21:19:20 +02:00
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_SSL_PROTO_TLS1_1
2013-08-27 21:19:20 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_SSL_PROTO_TLS1_2
2013-08-27 21:19:20 +02:00
*
2014-02-06 13:04:16 +01:00
* Enable support for TLS 1.2 ( and DTLS 1.2 if DTLS is enabled ) .
2013-08-27 21:19:20 +02:00
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_SHA1_C or MBEDTLS_SHA256_C or MBEDTLS_SHA512_C
2013-08-27 21:19:20 +02:00
* ( Depends on ciphersuites )
*
2014-02-06 13:04:16 +01:00
* Comment this macro to disable support for TLS 1.2 / DTLS 1.2
2013-08-27 21:19:20 +02:00
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_SSL_PROTO_TLS1_2
2013-08-27 21:19:20 +02:00
2020-05-04 13:00:47 +02:00
/**
* \ def MBEDTLS_SSL_PROTO_TLS1_3_EXPERIMENTAL
*
2020-05-20 14:54:41 +02:00
* This macro is used to selectively enable experimental parts
* of the code that contribute to the ongoing development of
* the prototype TLS 1.3 and DTLS 1.3 implementation , and provide
* no other purpose .
*
* \ warning TLS 1.3 and DTLS 1.3 aren ' t yet supported in Mbed TLS ,
* and no feature exposed through this macro is part of the
* public API . In particular , features under the control
* of this macro are experimental and don ' t come with any
* stability guarantees .
2020-05-04 13:00:47 +02:00
*
* Uncomment this macro to enable experimental and partial
* functionality specific to TLS 1.3 .
*/
2020-05-07 16:11:45 +02:00
//#define MBEDTLS_SSL_PROTO_TLS1_3_EXPERIMENTAL
2020-05-04 13:00:47 +02:00
2014-02-06 13:04:16 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_SSL_PROTO_DTLS
2014-02-06 13:04:16 +01:00
*
* Enable support for DTLS ( all available versions ) .
*
2015-04-08 12:49:31 +02:00
* Enable this and MBEDTLS_SSL_PROTO_TLS1_1 to enable DTLS 1.0 ,
* and / or this and MBEDTLS_SSL_PROTO_TLS1_2 to enable DTLS 1.2 .
2014-02-06 13:04:16 +01:00
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_SSL_PROTO_TLS1_1
* or MBEDTLS_SSL_PROTO_TLS1_2
2014-02-06 13:04:16 +01:00
*
* Comment this macro to disable support for DTLS
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_SSL_PROTO_DTLS
2014-02-06 13:04:16 +01:00
2014-04-04 16:08:41 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_SSL_ALPN
2014-04-04 16:08:41 +02:00
*
2014-11-20 18:28:50 +01:00
* Enable support for RFC 7301 Application Layer Protocol Negotiation .
2014-04-04 16:08:41 +02:00
*
2014-04-08 12:33:37 +02:00
* Comment this macro to disable support for ALPN .
2014-04-04 16:08:41 +02:00
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_SSL_ALPN
2014-04-04 16:08:41 +02:00
2014-09-24 14:05:32 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_SSL_DTLS_ANTI_REPLAY
2014-09-24 14:05:32 +02:00
*
* Enable support for the anti - replay mechanism in DTLS .
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_SSL_TLS_C
* MBEDTLS_SSL_PROTO_DTLS
2014-09-24 14:05:32 +02:00
*
2014-10-13 18:15:52 +02:00
* \ warning Disabling this is often a security risk !
2015-05-11 09:50:24 +02:00
* See mbedtls_ssl_conf_dtls_anti_replay ( ) for details .
2014-10-13 18:15:52 +02:00
*
2014-09-24 14:05:32 +02:00
* Comment this to disable anti - replay in DTLS .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_SSL_DTLS_ANTI_REPLAY
2014-09-24 14:05:32 +02:00
2014-07-23 00:28:58 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_SSL_DTLS_HELLO_VERIFY
2014-07-23 00:28:58 +02:00
*
* Enable support for HelloVerifyRequest on DTLS servers .
*
* This feature is highly recommended to prevent DTLS servers being used as
* amplifiers in DoS attacks against other hosts . It should always be enabled
* unless you know for sure amplification cannot be a problem in the
* environment in which your server operates .
*
2014-10-13 18:15:52 +02:00
* \ warning Disabling this can ba a security risk ! ( see above )
*
2015-05-20 10:59:43 +02:00
* Requires : MBEDTLS_SSL_PROTO_DTLS
2014-07-23 00:28:58 +02:00
*
* Comment this to disable support for HelloVerifyRequest .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_SSL_DTLS_HELLO_VERIFY
2014-07-23 00:28:58 +02:00
2015-09-04 10:53:25 +02:00
/**
* \ def MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE
*
* Enable server - side support for clients that reconnect from the same port .
*
* Some clients unexpectedly close the connection and try to reconnect using the
* same source port . This needs special support from the server to handle the
2015-09-11 18:12:46 +02:00
* new connection securely , as described in section 4.2 .8 of RFC 6347. This
2015-09-04 10:53:25 +02:00
* flag enables that support .
*
2015-09-08 17:50:29 +02:00
* Requires : MBEDTLS_SSL_DTLS_HELLO_VERIFY
*
2015-09-04 10:53:25 +02:00
* Comment this to disable support for clients reusing the source port .
*/
# define MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE
2014-10-14 18:30:36 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_SSL_DTLS_BADMAC_LIMIT
2014-10-14 18:30:36 +02:00
*
* Enable support for a limit of records with bad MAC .
*
2015-05-11 09:50:24 +02:00
* See mbedtls_ssl_conf_dtls_badmac_limit ( ) .
2014-10-14 18:30:36 +02:00
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_SSL_PROTO_DTLS
2014-10-14 18:30:36 +02:00
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_SSL_DTLS_BADMAC_LIMIT
2014-10-14 18:30:36 +02:00
2013-08-14 13:48:06 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_SSL_SESSION_TICKETS
2013-08-14 13:48:06 +02:00
*
2013-09-20 13:45:36 +02:00
* Enable support for RFC 5077 session tickets in SSL .
2019-01-23 15:24:37 +01:00
* Client - side , provides full support for session tickets ( maintenance of a
2015-05-20 09:55:50 +02:00
* session store remains the responsibility of the application , though ) .
* Server - side , you also need to provide callbacks for writing and parsing
* tickets , including authenticated encryption and key management . Example
* callbacks are provided by MBEDTLS_SSL_TICKET_C .
2013-08-14 13:48:06 +02:00
*
* Comment this macro to disable support for SSL session tickets
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_SSL_SESSION_TICKETS
2013-08-14 13:48:06 +02:00
2015-10-02 14:33:37 +02:00
/**
* \ def MBEDTLS_SSL_EXPORT_KEYS
*
2015-10-19 13:52:53 +02:00
* Enable support for exporting key block and master secret .
2015-10-02 14:33:37 +02:00
* This is required for certain users of TLS , e . g . EAP - TLS .
*
* Comment this macro to disable support for key export
*/
# define MBEDTLS_SSL_EXPORT_KEYS
2013-08-27 21:55:01 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_SSL_SERVER_NAME_INDICATION
2013-08-27 21:55:01 +02:00
*
2013-09-20 13:45:36 +02:00
* Enable support for RFC 6066 server name indication ( SNI ) in SSL .
2013-08-27 21:55:01 +02:00
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_X509_CRT_PARSE_C
2015-01-28 17:44:37 +01:00
*
2013-08-27 21:55:01 +02:00
* Comment this macro to disable support for server name indication in SSL
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_SSL_SERVER_NAME_INDICATION
2013-08-27 21:55:01 +02:00
2013-08-15 13:45:55 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_SSL_TRUNCATED_HMAC
2013-08-15 13:45:55 +02:00
*
2013-09-20 13:45:36 +02:00
* Enable support for RFC 6066 truncated HMAC in SSL .
2013-08-15 13:45:55 +02:00
*
* Comment this macro to disable support for truncated HMAC in SSL
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_SSL_TRUNCATED_HMAC
2013-08-15 13:45:55 +02:00
2017-11-20 17:36:41 +01:00
/**
* \ def MBEDTLS_SSL_TRUNCATED_HMAC_COMPAT
*
2017-11-29 17:35:46 +01:00
* Fallback to old ( pre - 2.7 ) , non - conforming implementation of the truncated
* HMAC extension which also truncates the HMAC key . Note that this option is
2020-02-25 12:46:10 +01:00
* only meant for a transitory upgrade period and will be removed in a future
* version of the library .
2017-11-29 17:35:46 +01:00
*
* \ warning The old implementation is non - compliant and has a security weakness
* ( 2 ^ 80 brute force attack on the HMAC key used for a single ,
* uninterrupted connection ) . This should only be enabled temporarily
* when ( 1 ) the use of truncated HMAC is essential in order to save
* bandwidth , and ( 2 ) the peer is an Mbed TLS stack that doesn ' t use
* the fixed implementation yet ( pre - 2.7 ) .
2017-11-20 17:36:41 +01:00
*
2020-02-25 12:46:10 +01:00
* \ deprecated This option is deprecated and will be removed in a
2017-11-21 19:22:53 +01:00
* future version of Mbed TLS .
*
2017-11-20 17:36:41 +01:00
* Uncomment to fallback to old , non - compliant truncated HMAC implementation .
*
* Requires : MBEDTLS_SSL_TRUNCATED_HMAC
*/
//#define MBEDTLS_SSL_TRUNCATED_HMAC_COMPAT
2020-03-23 18:13:58 +01:00
/**
* \ def MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH
*
* Enable modifying the maximum I / O buffer size .
*/
//#define MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH
2020-07-10 09:35:54 +02:00
/**
* \ def MBEDTLS_TEST_CONSTANT_FLOW_MEMSAN
*
* Enable testing of the constant - flow nature of some sensitive functions with
* clang ' s MemorySanitizer . This causes some existing tests to also test
2020-08-24 12:58:36 +02:00
* this non - functional property of the code under test .
2020-07-10 09:35:54 +02:00
*
2020-08-24 12:58:36 +02:00
* This setting requires compiling with clang - fsanitize = memory . The test
* suites can then be run normally .
2020-07-10 09:35:54 +02:00
*
2020-07-31 12:59:34 +02:00
* \ warning This macro is only used for extended testing ; it is not considered
* part of the library ' s API , so it may change or disappear at any time .
*
2020-07-24 11:08:40 +02:00
* Uncomment to enable testing of the constant - flow nature of selected code .
2020-07-10 09:35:54 +02:00
*/
//#define MBEDTLS_TEST_CONSTANT_FLOW_MEMSAN
2020-08-19 10:27:38 +02:00
/**
* \ def MBEDTLS_TEST_CONSTANT_FLOW_VALGRIND
*
* Enable testing of the constant - flow nature of some sensitive functions with
* valgrind ' s memcheck tool . This causes some existing tests to also test
2020-08-24 12:58:36 +02:00
* this non - functional property of the code under test .
2020-08-19 10:27:38 +02:00
*
* This setting requires valgrind headers for building , and is only useful for
2020-08-24 12:58:36 +02:00
* testing if the tests suites are run with valgrind ' s memcheck . This can be
* done for an individual test suite with ' valgrind . / test_suite_xxx ' , or when
* using CMake , this can be done for all test suites with ' make memcheck ' .
2020-08-19 10:27:38 +02:00
*
* \ warning This macro is only used for extended testing ; it is not considered
* part of the library ' s API , so it may change or disappear at any time .
*
* Uncomment to enable testing of the constant - flow nature of selected code .
*/
//#define MBEDTLS_TEST_CONSTANT_FLOW_VALGRIND
2019-09-11 13:27:48 +02:00
/**
* \ def MBEDTLS_TEST_HOOKS
*
* Enable features for invasive testing such as introspection functions and
* hooks for fault injection . This enables additional unit tests .
*
* Merely enabling this feature should not change the behavior of the product .
* It only adds new code , and new branching points where the default behavior
* is the same as when this feature is disabled .
* However , this feature increases the attack surface : there is an added
* risk of vulnerabilities , and more gadgets that can make exploits easier .
* Therefore this feature must never be enabled in production .
*
* See ` docs / architecture / testing / mbed - crypto - invasive - testing . md ` for more
* information .
*
* Uncomment to enable invasive tests .
*/
//#define MBEDTLS_TEST_HOOKS
2013-09-28 14:40:38 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_THREADING_ALT
2013-09-28 14:40:38 +02:00
*
* Provide your own alternate threading implementation .
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_THREADING_C
2013-09-28 14:40:38 +02:00
*
* Uncomment this to allow your own alternate threading implementation .
*/
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_THREADING_ALT
2013-09-28 14:40:38 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_THREADING_PTHREAD
2013-09-28 14:40:38 +02:00
*
* Enable the pthread wrapper layer for the threading layer .
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_THREADING_C
2013-09-28 14:40:38 +02:00
*
* Uncomment this to enable pthread mutexes .
*/
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_THREADING_PTHREAD
2013-09-28 14:40:38 +02:00
2018-10-22 12:14:52 +02:00
/**
* \ def MBEDTLS_USE_PSA_CRYPTO
*
2019-02-01 12:38:40 +01:00
* Make the X .509 and TLS library use PSA for cryptographic operations , and
* enable new APIs for using keys handled by PSA Crypto .
2018-10-22 12:14:52 +02:00
*
Merge remote-tracking branch 'tls/development' into development
Resolve conflicts by performing the following operations:
- Reject changes related to building a crypto submodule, since Mbed
Crypto is the crypto submodule.
- Reject X.509, NET, and SSL changes.
- Reject changes to README, as Mbed Crypto is a different project from
Mbed TLS, with a different README.
- Avoid adding mention of ssl-opt.sh in a comment near some modified
code in include/CMakeLists.txt (around where ENABLE_TESTING as added).
- Align config.pl in Mbed TLS with config.pl in Mbed Crypto where PSA
options are concerned, to make future merging easier. There is no
reason for the two to be different in this regard, now that Mbed TLS
always depends on Mbed Crypto. Remaining differences are only the
PSA_CRYPTO_KEY_FILE_ID_ENCODES_OWNER option and the absence of X.509,
NET, and SSL related options in Mbed Crypto's config.pl.
- Align config.h in Mbed Crypto with Mbed TLS's copy, with a few notable
exceptions:
- Leave CMAC on by default.
- Leave storage on by default (including ITS emulation).
- Avoid documenting the PSA Crypto API as is in beta stage in
documentation for MBEDTLS_PSA_CRYPTO_C.
The only remaining differences are a lack of X.509, NET, and SSL
options in Mbed Crypto's config.h, as well as an additional
Mbed-Crypto-specific PSA_CRYPTO_KEY_FILE_ID_ENCODES_OWNER option.
Documentation for the check params feature and related macros is also
updated to match Mbed TLS's description.
- Reject tests/data_files/Makefile changes to generate DER versions of
CRTs and keys, as none of those are used by Mbed Crypto tests.
- Add the "no PEM and no filesystem" test to all.sh, without ssl-opt.sh
run, as Mbed Crypto doesn't have ssl-opt.sh. Also remove use of PSA
Crypto storage and ITS emulation, since those depend on filesystem
support.
- Reject addition of test when no ciphersuites have MAC to all.sh, as
the option being tested, MBEDTLS_SSL_SOME_MODES_USE_MAC, is not
present in Mbed Crypto.
- Use baremetal config in all.sh, as Mbed Crypto's baremetal
configuration does exclude the net module (as it doesn't exist in Mbed
Crypto)
- Reject cmake_subproject_build changes, continuing to link only
libmbedcrypto.
- Reject changes to visualc and associated templates. Mbed Crypto
doesn't need additional logic to handle submodule-sourced headers.
- Avoid adding fuzzers from Mbed TLS. The only relevant fuzzers are the
privkey and pubkey fuzzers, but non-trivial work would be required to
integrate those into Mbed Crypto (more than is comfortable in a merge
commit).
- Reject addition of Docker wrappers for compat.sh and ssl-opt.sh, as
those are not present in Mbed Crypto.
- Remove calls to SSL-related scripts from basic-in-docker.sh
Fix test errors by performing the following:
- Avoid using a link that Doxygen can't seem to resolve in Mbed Crypto,
but can resolve in Mbed TLS. In documentation for
MBEDTLS_CHECK_PARAMS, don't attempt to link to MBEDTLS_PARAM_FAILED.
* origin/development: (339 commits)
Do not build fuzz on windows
No booleans and import config
Removing space before opening parenthesis
Style corrections
Syntax fix
Fixes warnings from MSVC
Add a linker flag to enable gcov in basic-build-test.sh
Update crypto submodule to a revision with the HAVEGE header changes
Test with MBEDTLS_ECP_RESTARTABLE
Allow TODO in code
Use the docstring in the command line help
Split _abi_compliance_command into smaller functions
Record the commits that were compared
Document how to build the typical argument for -s
Allow running /somewhere/else/path/to/abi_check.py
tests: Limit each log to 10 GiB
Warn if VLAs are used
Remove redundant compiler flag
Consistently spell -Wextra
Fix parsing issue when int parameter is in base 16
...
2019-07-22 17:39:49 +02:00
* \ note Development of this option is currently in progress , and parts of Mbed
* TLS ' s X .509 and TLS modules are not ported to PSA yet . However , these parts
2019-04-16 10:20:24 +02:00
* will still continue to work as usual , so enabling this option should not
* break backwards compatibility .
2018-10-22 12:14:52 +02:00
*
2020-03-04 21:35:27 +01:00
* \ warning The PSA Crypto API is in beta stage . While you ' re welcome to
* experiment using it , incompatible API changes are still possible , and some
* parts may not have reached the same quality as the rest of Mbed TLS yet .
2019-02-01 12:38:40 +01:00
*
* \ warning This option enables new Mbed TLS APIs that are dependent on the
* PSA Crypto API , so can ' t come with the same stability guarantees as the
* rest of the Mbed TLS APIs . You ' re welcome to experiment with them , but for
2019-04-16 10:14:48 +02:00
* now , access to these APIs is opt - in ( via enabling the present option ) , in
2019-02-01 12:38:40 +01:00
* order to clearly differentiate them from the stable Mbed TLS APIs .
2018-11-19 10:46:26 +01:00
*
2018-10-22 12:14:52 +02:00
* Requires : MBEDTLS_PSA_CRYPTO_C .
2019-02-01 12:38:40 +01:00
*
2019-04-16 10:14:48 +02:00
* Uncomment this to enable internal use of PSA Crypto and new associated APIs .
2018-10-22 12:14:52 +02:00
*/
//#define MBEDTLS_USE_PSA_CRYPTO
2020-09-18 06:15:13 +02:00
/**
* \ def MBEDTLS_PSA_CRYPTO_CONFIG
*
2020-10-13 06:32:12 +02:00
* This setting allows support for cryptographic mechanisms through the PSA
* API to be configured separately from support through the mbedtls API .
*
* Uncomment this to enable use of PSA Crypto configuration settings which
* can be found in include / psa / crypto_config . h
2020-09-18 06:15:13 +02:00
*
2020-10-13 06:32:12 +02:00
* This feature is still experimental and is not ready for production since
* it is not completed .
2020-09-18 06:15:13 +02:00
*/
//#define MBEDTLS_PSA_CRYPTO_CONFIG
2014-04-30 11:49:44 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_VERSION_FEATURES
2014-04-30 11:49:44 +02:00
*
* Allow run - time checking of compile - time enabled features . Thus allowing users
* to check at run - time if the library is for instance compiled with threading
2015-04-08 12:49:31 +02:00
* support via mbedtls_version_check_feature ( ) .
2014-04-30 11:49:44 +02:00
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_VERSION_C
2014-04-30 11:49:44 +02:00
*
* Comment this to disable run - time checking and save ROM space
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_VERSION_FEATURES
2014-04-30 11:49:44 +02:00
2013-09-23 15:01:36 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_X509_ALLOW_EXTENSIONS_NON_V3
2013-09-23 15:01:36 +02:00
*
* If set , the X509 parser will not break - off when parsing an X509 certificate
* and encountering an extension in a v1 or v2 certificate .
*
* Uncomment to prevent an error .
*/
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_X509_ALLOW_EXTENSIONS_NON_V3
2013-09-23 15:01:36 +02:00
2011-07-27 18:51:09 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_X509_ALLOW_UNSUPPORTED_CRITICAL_EXTENSION
2011-07-27 18:51:09 +02:00
*
* If set , the X509 parser will not break - off when parsing an X509 certificate
* and encountering an unknown critical extension .
*
2015-10-05 13:12:39 +02:00
* \ warning Depending on your PKI use , enabling this can be a security risk !
*
2011-07-27 18:51:09 +02:00
* Uncomment to prevent an error .
*/
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_X509_ALLOW_UNSUPPORTED_CRITICAL_EXTENSION
2012-07-03 15:30:23 +02:00
2019-03-27 12:00:53 +01:00
/**
* \ def MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK
*
2019-04-01 13:58:30 +02:00
* If set , this enables the X .509 API ` mbedtls_x509_crt_verify_with_ca_cb ( ) `
2019-03-27 12:00:53 +01:00
* and the SSL API ` mbedtls_ssl_conf_ca_cb ( ) ` which allow users to configure
* the set of trusted certificates through a callback instead of a linked
* list .
*
* This is useful for example in environments where a large number of trusted
* certificates is present and storing them in a linked list isn ' t efficient
* enough , or when the set of trusted certificates changes frequently .
*
2019-04-01 13:58:30 +02:00
* See the documentation of ` mbedtls_x509_crt_verify_with_ca_cb ( ) ` and
2019-03-27 12:00:53 +01:00
* ` mbedtls_ssl_conf_ca_cb ( ) ` for more information .
*
* Uncomment to enable trusted certificate callbacks .
*/
//#define MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK
2014-04-09 09:50:03 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_X509_CHECK_KEY_USAGE
2014-04-09 09:50:03 +02:00
*
* Enable verification of the keyUsage extension ( CA and leaf certificates ) .
*
* Disabling this avoids problems with mis - issued and / or misused
* ( intermediate ) CA and leaf certificates .
*
* \ warning Depending on your PKI use , disabling this can be a security risk !
*
* Comment to skip keyUsage checking for both CA and leaf certificates .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_X509_CHECK_KEY_USAGE
2014-04-09 09:50:03 +02:00
2014-04-10 17:53:56 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_X509_CHECK_EXTENDED_KEY_USAGE
2014-04-10 17:53:56 +02:00
*
* Enable verification of the extendedKeyUsage extension ( leaf certificates ) .
*
* Disabling this avoids problems with mis - issued and / or misused certificates .
*
* \ warning Depending on your PKI use , disabling this can be a security risk !
*
* Comment to skip extendedKeyUsage checking for certificates .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_X509_CHECK_EXTENDED_KEY_USAGE
2014-04-10 17:53:56 +02:00
2014-06-06 16:42:37 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_X509_RSASSA_PSS_SUPPORT
2014-06-06 16:42:37 +02:00
*
* Enable parsing and verification of X .509 certificates , CRLs and CSRS
* signed with RSASSA - PSS ( aka PKCS # 1 v2 .1 ) .
*
* Comment this macro to disallow using RSASSA - PSS in certificates .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_X509_RSASSA_PSS_SUPPORT
2014-06-06 16:42:37 +02:00
2012-07-03 15:30:23 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_ZLIB_SUPPORT
2012-07-03 15:30:23 +02:00
*
* If set , the SSL / TLS module uses ZLIB to support compression and
* decompression of packet data .
*
2014-03-11 10:30:38 +01:00
* \ warning TLS - level compression MAY REDUCE SECURITY ! See for example the
* CRIME attack . Before enabling this option , you should examine with care if
2019-01-23 15:24:37 +01:00
* CRIME or similar exploits may be applicable to your use case .
2014-03-11 10:30:38 +01:00
*
2015-07-02 17:59:52 +02:00
* \ note Currently compression can ' t be used with DTLS .
2014-07-14 17:38:41 +02:00
*
2018-03-08 14:26:12 +01:00
* \ deprecated This feature is deprecated and will be removed
* in the next major revision of the library .
2018-03-06 15:23:38 +01:00
*
2012-07-03 15:30:23 +02:00
* Used in : library / ssl_tls . c
* library / ssl_cli . c
* library / ssl_srv . c
*
* This feature requires zlib library and headers to be present .
*
* Uncomment to enable use of ZLIB
*/
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_ZLIB_SUPPORT
2015-01-22 17:11:05 +01:00
/* \} name SECTION: mbed TLS feature support */
2011-01-21 12:00:08 +01:00
2011-01-27 16:24:17 +01:00
/**
2015-01-22 17:11:05 +01:00
* \ name SECTION : mbed TLS modules
2011-01-21 12:00:08 +01:00
*
2015-01-22 17:11:05 +01:00
* This section enables or disables entire modules in mbed TLS
2011-01-21 12:00:08 +01:00
* \ {
*/
2009-01-03 22:22:43 +01:00
2013-12-16 17:12:53 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_AESNI_C
2013-12-16 17:12:53 +01:00
*
* Enable AES - NI support on x86 - 64.
*
* Module : library / aesni . c
* Caller : library / aes . c
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_HAVE_ASM
2013-12-16 17:12:53 +01:00
*
* This modules adds support for the AES - NI instructions on x86 - 64
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_AESNI_C
2013-12-16 17:12:53 +01:00
2011-01-27 16:24:17 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_AES_C
2011-01-27 16:24:17 +01:00
*
* Enable the AES block cipher .
*
2009-01-03 22:22:43 +01:00
* Module : library / aes . c
2018-02-28 10:49:02 +01:00
* Caller : library / cipher . c
2011-02-12 15:30:57 +01:00
* library / pem . c
2011-12-03 22:45:14 +01:00
* library / ctr_drbg . c
2009-01-03 22:22:43 +01:00
*
2012-10-31 13:32:41 +01:00
* This module enables the following ciphersuites ( if other requisites are
* enabled as well ) :
2015-04-08 12:49:31 +02:00
* MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
* MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
* MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA
* MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
* MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
* MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
* MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256
* MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
* MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256
* MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384
* MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256
* MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
* MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
* MBEDTLS_TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
* MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
* MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
* MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
* MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
* MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
* MBEDTLS_TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
* MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
* MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
* MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
* MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA
* MBEDTLS_TLS_DHE_PSK_WITH_AES_256_GCM_SHA384
* MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384
* MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CBC_SHA384
* MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA
* MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CBC_SHA
* MBEDTLS_TLS_DHE_PSK_WITH_AES_128_GCM_SHA256
* MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256
* MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CBC_SHA256
* MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA
* MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CBC_SHA
* MBEDTLS_TLS_RSA_WITH_AES_256_GCM_SHA384
* MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA256
* MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA
* MBEDTLS_TLS_RSA_WITH_AES_128_GCM_SHA256
* MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA256
* MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA
* MBEDTLS_TLS_RSA_PSK_WITH_AES_256_GCM_SHA384
* MBEDTLS_TLS_RSA_PSK_WITH_AES_256_CBC_SHA384
* MBEDTLS_TLS_RSA_PSK_WITH_AES_256_CBC_SHA
* MBEDTLS_TLS_RSA_PSK_WITH_AES_128_GCM_SHA256
* MBEDTLS_TLS_RSA_PSK_WITH_AES_128_CBC_SHA256
* MBEDTLS_TLS_RSA_PSK_WITH_AES_128_CBC_SHA
* MBEDTLS_TLS_PSK_WITH_AES_256_GCM_SHA384
* MBEDTLS_TLS_PSK_WITH_AES_256_CBC_SHA384
* MBEDTLS_TLS_PSK_WITH_AES_256_CBC_SHA
* MBEDTLS_TLS_PSK_WITH_AES_128_GCM_SHA256
* MBEDTLS_TLS_PSK_WITH_AES_128_CBC_SHA256
* MBEDTLS_TLS_PSK_WITH_AES_128_CBC_SHA
2013-02-19 13:17:08 +01:00
*
2013-09-15 20:43:33 +02:00
* PEM_PARSE uses AES for decrypting encrypted keys .
2009-01-03 22:22:43 +01:00
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_AES_C
2009-01-03 22:22:43 +01:00
2011-01-27 16:24:17 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_ARC4_C
2011-01-27 16:24:17 +01:00
*
* Enable the ARCFOUR stream cipher .
*
2009-01-03 22:22:43 +01:00
* Module : library / arc4 . c
2018-02-28 10:49:02 +01:00
* Caller : library / cipher . c
2009-01-03 22:22:43 +01:00
*
2013-03-20 14:39:14 +01:00
* This module enables the following ciphersuites ( if other requisites are
* enabled as well ) :
2015-04-08 12:49:31 +02:00
* MBEDTLS_TLS_ECDH_ECDSA_WITH_RC4_128_SHA
* MBEDTLS_TLS_ECDH_RSA_WITH_RC4_128_SHA
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
* MBEDTLS_TLS_ECDHE_RSA_WITH_RC4_128_SHA
* MBEDTLS_TLS_ECDHE_PSK_WITH_RC4_128_SHA
* MBEDTLS_TLS_DHE_PSK_WITH_RC4_128_SHA
* MBEDTLS_TLS_RSA_WITH_RC4_128_SHA
* MBEDTLS_TLS_RSA_WITH_RC4_128_MD5
* MBEDTLS_TLS_RSA_PSK_WITH_RC4_128_SHA
* MBEDTLS_TLS_PSK_WITH_RC4_128_SHA
2017-09-25 15:53:51 +02:00
*
* \ warning ARC4 is considered a weak cipher and its use constitutes a
* security risk . If possible , we recommend avoidng dependencies on
* it , and considering stronger ciphers instead .
*
2009-01-03 22:22:43 +01:00
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_ARC4_C
2009-01-03 22:22:43 +01:00
2011-11-10 15:43:23 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_ASN1_PARSE_C
2011-11-10 15:43:23 +01:00
*
* Enable the generic ASN1 parser .
*
* Module : library / asn1 . c
2013-09-20 14:10:14 +02:00
* Caller : library / x509 . c
* library / dhm . c
* library / pkcs12 . c
* library / pkcs5 . c
* library / pkparse . c
2011-11-10 15:43:23 +01:00
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_ASN1_PARSE_C
2011-11-10 15:43:23 +01:00
2012-02-14 00:11:30 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_ASN1_WRITE_C
2012-02-14 00:11:30 +01:00
*
* Enable the generic ASN1 writer .
*
* Module : library / asn1write . c
2013-09-20 14:10:14 +02:00
* Caller : library / ecdsa . c
* library / pkwrite . c
* library / x509_create . c
* library / x509write_crt . c
2016-11-04 13:23:11 +01:00
* library / x509write_csr . c
2012-02-14 00:11:30 +01:00
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_ASN1_WRITE_C
2012-02-14 00:11:30 +01:00
2011-01-27 16:24:17 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_BASE64_C
2011-01-27 16:24:17 +01:00
*
* Enable the Base64 module .
*
2009-01-03 22:22:43 +01:00
* Module : library / base64 . c
2011-05-26 15:16:06 +02:00
* Caller : library / pem . c
2009-01-03 22:22:43 +01:00
*
2011-05-26 15:16:06 +02:00
* This module is required for PEM support ( required by X .509 ) .
2009-01-03 22:22:43 +01:00
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_BASE64_C
2009-01-03 22:22:43 +01:00
2011-01-27 16:24:17 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_BIGNUM_C
2011-01-27 16:24:17 +01:00
*
2012-11-14 13:39:52 +01:00
* Enable the multi - precision integer library .
2011-01-27 16:24:17 +01:00
*
2009-01-03 22:22:43 +01:00
* Module : library / bignum . c
* Caller : library / dhm . c
2013-09-20 14:10:14 +02:00
* library / ecp . c
2014-06-25 13:00:17 +02:00
* library / ecdsa . c
2009-01-03 22:22:43 +01:00
* library / rsa . c
2017-10-11 12:00:19 +02:00
* library / rsa_internal . c
2009-01-03 22:22:43 +01:00
* library / ssl_tls . c
*
2014-06-25 13:00:17 +02:00
* This module is required for RSA , DHM and ECC ( ECDH , ECDSA ) support .
2009-01-03 22:22:43 +01:00
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_BIGNUM_C
2009-01-03 22:22:43 +01:00
2012-07-04 13:02:11 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_BLOWFISH_C
2012-07-04 13:02:11 +02:00
*
* Enable the Blowfish block cipher .
*
* Module : library / blowfish . c
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_BLOWFISH_C
2012-07-04 13:02:11 +02:00
2011-01-27 16:24:17 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_CAMELLIA_C
2011-01-27 16:24:17 +01:00
*
* Enable the Camellia block cipher .
*
2009-01-11 00:31:23 +01:00
* Module : library / camellia . c
2018-02-28 10:49:02 +01:00
* Caller : library / cipher . c
2009-01-11 00:31:23 +01:00
*
2012-10-31 13:32:41 +01:00
* This module enables the following ciphersuites ( if other requisites are
* enabled as well ) :
2015-04-08 12:49:31 +02:00
* MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256
* MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384
* MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256
* MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384
* MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256
* MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384
* MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256
* MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384
* MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384
* MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384
* MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
* MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
* MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256
* MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256
* MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256
* MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
* MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
* MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
* MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384
* MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384
* MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384
* MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256
* MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256
* MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256
* MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384
* MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
* MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
* MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256
* MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
* MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
* MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384
* MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384
* MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256
* MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256
* MBEDTLS_TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384
* MBEDTLS_TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384
* MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256
* MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256
*/
# define MBEDTLS_CAMELLIA_C
2017-11-30 17:00:34 +01:00
/**
* \ def MBEDTLS_ARIA_C
*
2018-02-28 10:47:02 +01:00
* Enable the ARIA block cipher .
2017-11-30 17:00:34 +01:00
*
* Module : library / aria . c
2018-02-28 10:47:02 +01:00
* Caller : library / cipher . c
*
* This module enables the following ciphersuites ( if other requisites are
* enabled as well ) :
*
* MBEDTLS_TLS_RSA_WITH_ARIA_128_CBC_SHA256
* MBEDTLS_TLS_RSA_WITH_ARIA_256_CBC_SHA384
* MBEDTLS_TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256
* MBEDTLS_TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384
* MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256
* MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384
* MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256
* MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384
* MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256
* MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384
* MBEDTLS_TLS_RSA_WITH_ARIA_128_GCM_SHA256
* MBEDTLS_TLS_RSA_WITH_ARIA_256_GCM_SHA384
* MBEDTLS_TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256
* MBEDTLS_TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384
* MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256
* MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384
* MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256
* MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384
* MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256
* MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384
* MBEDTLS_TLS_PSK_WITH_ARIA_128_CBC_SHA256
* MBEDTLS_TLS_PSK_WITH_ARIA_256_CBC_SHA384
* MBEDTLS_TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256
* MBEDTLS_TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384
* MBEDTLS_TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256
* MBEDTLS_TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384
* MBEDTLS_TLS_PSK_WITH_ARIA_128_GCM_SHA256
* MBEDTLS_TLS_PSK_WITH_ARIA_256_GCM_SHA384
* MBEDTLS_TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256
* MBEDTLS_TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384
* MBEDTLS_TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256
* MBEDTLS_TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384
* MBEDTLS_TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256
* MBEDTLS_TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384
2017-11-30 17:00:34 +01:00
*/
2018-02-27 12:22:36 +01:00
//#define MBEDTLS_ARIA_C
2017-11-30 17:00:34 +01:00
2015-04-08 12:49:31 +02:00
/**
* \ def MBEDTLS_CCM_C
2014-05-02 15:17:29 +02:00
*
* Enable the Counter with CBC - MAC ( CCM ) mode for 128 - bit block cipher .
*
* Module : library / ccm . c
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_AES_C or MBEDTLS_CAMELLIA_C
2014-05-02 15:17:29 +02:00
*
* This module enables the AES - CCM ciphersuites , if other requisites are
* enabled as well .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_CCM_C
2014-05-02 15:17:29 +02:00
2011-01-27 16:24:17 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_CERTS_C
2011-01-27 16:24:17 +01:00
*
* Enable the test certificates .
*
2009-01-03 22:22:43 +01:00
* Module : library / certs . c
* Caller :
*
* This module is used for testing ( ssl_client / server ) .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_CERTS_C
2009-01-03 22:22:43 +01:00
2016-05-15 22:28:08 +02:00
/**
* \ def MBEDTLS_CHACHA20_C
*
* Enable the ChaCha20 stream cipher .
*
* Module : library / chacha20 . c
*/
# define MBEDTLS_CHACHA20_C
2018-06-04 12:23:19 +02:00
/**
* \ def MBEDTLS_CHACHAPOLY_C
*
* Enable the ChaCha20 - Poly1305 AEAD algorithm .
*
* Module : library / chachapoly . c
*
* This module requires : MBEDTLS_CHACHA20_C , MBEDTLS_POLY1305_C
*/
# define MBEDTLS_CHACHAPOLY_C
2011-01-27 16:24:17 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_CIPHER_C
2011-01-27 16:24:17 +01:00
*
* Enable the generic cipher layer .
*
2011-01-06 16:37:30 +01:00
* Module : library / cipher . c
2013-08-19 13:30:57 +02:00
* Caller : library / ssl_tls . c
2011-01-06 16:37:30 +01:00
*
* Uncomment to enable generic cipher wrappers .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_CIPHER_C
2011-01-06 16:37:30 +01:00
2015-12-11 16:49:45 +01:00
/**
* \ def MBEDTLS_CMAC_C
*
2016-10-05 15:09:11 +02:00
* Enable the CMAC ( Cipher - based Message Authentication Code ) mode for block
* ciphers .
2015-12-11 16:49:45 +01:00
*
* Module : library / cmac . c
*
2016-10-06 13:49:58 +02:00
* Requires : MBEDTLS_AES_C or MBEDTLS_DES_C
2015-12-11 16:49:45 +01:00
*
*/
2020-03-04 21:35:27 +01:00
//#define MBEDTLS_CMAC_C
2015-12-11 16:49:45 +01:00
2011-11-27 15:46:59 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_CTR_DRBG_C
2011-11-27 15:46:59 +01:00
*
2018-08-29 09:11:46 +02:00
* Enable the CTR_DRBG AES - based random generator .
* The CTR_DRBG generator uses AES - 256 by default .
2019-10-03 14:21:14 +02:00
* To use AES - 128 instead , enable \ c MBEDTLS_CTR_DRBG_USE_128_BIT_KEY above .
2011-11-27 15:46:59 +01:00
*
2019-10-03 14:21:39 +02:00
* \ note To achieve a 256 - bit security strength with CTR_DRBG ,
* you must use AES - 256 * and * use sufficient entropy .
* See ctr_drbg . h for more details .
2011-11-27 15:46:59 +01:00
*
* Module : library / ctr_drbg . c
* Caller :
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_AES_C
2011-12-03 22:45:14 +01:00
*
2018-09-03 13:10:52 +02:00
* This module provides the CTR_DRBG AES random number generator .
2011-11-27 15:46:59 +01:00
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_CTR_DRBG_C
2011-11-27 15:46:59 +01:00
2011-01-27 16:24:17 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_DEBUG_C
2011-01-27 16:24:17 +01:00
*
* Enable the debug functions .
*
2009-01-03 22:22:43 +01:00
* Module : library / debug . c
* Caller : library / ssl_cli . c
* library / ssl_srv . c
* library / ssl_tls . c
*
* This module provides debugging functions .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_DEBUG_C
2009-01-03 22:22:43 +01:00
2011-01-27 16:24:17 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_DES_C
2011-01-27 16:24:17 +01:00
*
* Enable the DES block cipher .
*
2009-01-03 22:22:43 +01:00
* Module : library / des . c
2013-02-19 13:17:08 +01:00
* Caller : library / pem . c
2018-02-28 10:49:02 +01:00
* library / cipher . c
2009-01-03 22:22:43 +01:00
*
2012-10-31 13:32:41 +01:00
* This module enables the following ciphersuites ( if other requisites are
* enabled as well ) :
2015-04-08 12:49:31 +02:00
* MBEDTLS_TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
* MBEDTLS_TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
* MBEDTLS_TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
* MBEDTLS_TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
* MBEDTLS_TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA
* MBEDTLS_TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA
* MBEDTLS_TLS_RSA_WITH_3DES_EDE_CBC_SHA
* MBEDTLS_TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA
* MBEDTLS_TLS_PSK_WITH_3DES_EDE_CBC_SHA
2013-02-19 13:17:08 +01:00
*
2013-09-15 20:43:33 +02:00
* PEM_PARSE uses DES / 3 DES for decrypting encrypted keys .
2017-09-25 15:53:51 +02:00
*
* \ warning DES is considered a weak cipher and its use constitutes a
* security risk . We recommend considering stronger ciphers instead .
2009-01-03 22:22:43 +01:00
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_DES_C
2009-01-03 22:22:43 +01:00
2011-01-27 16:24:17 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_DHM_C
2011-01-27 16:24:17 +01:00
*
2013-10-25 18:01:50 +02:00
* Enable the Diffie - Hellman - Merkle module .
2011-01-27 16:24:17 +01:00
*
2009-01-03 22:22:43 +01:00
* Module : library / dhm . c
* Caller : library / ssl_cli . c
* library / ssl_srv . c
*
2013-10-25 18:01:50 +02:00
* This module is used by the following key exchanges :
* DHE - RSA , DHE - PSK
2017-09-28 11:33:29 +02:00
*
2017-10-03 13:09:22 +02:00
* \ warning Using DHE constitutes a security risk as it
* is not possible to validate custom DH parameters .
* If possible , it is recommended users should consider
* preferring other methods of key exchange .
* See dhm . h for more details .
2017-09-28 11:33:29 +02:00
*
2009-01-03 22:22:43 +01:00
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_DHM_C
2009-01-03 22:22:43 +01:00
2013-03-13 16:30:17 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_ECDH_C
2013-03-13 16:30:17 +01:00
*
* Enable the elliptic curve Diffie - Hellman library .
*
* Module : library / ecdh . c
2013-03-20 14:39:14 +01:00
* Caller : library / ssl_cli . c
* library / ssl_srv . c
*
2013-10-25 18:01:50 +02:00
* This module is used by the following key exchanges :
* ECDHE - ECDSA , ECDHE - RSA , DHE - PSK
2013-03-13 16:30:17 +01:00
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_ECP_C
2013-03-13 16:30:17 +01:00
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_ECDH_C
2013-03-13 16:30:17 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_ECDSA_C
2013-03-13 16:30:17 +01:00
*
* Enable the elliptic curve DSA library .
*
* Module : library / ecdsa . c
* Caller :
*
2013-10-25 18:01:50 +02:00
* This module is used by the following key exchanges :
* ECDHE - ECDSA
*
2018-09-14 17:34:00 +02:00
* Requires : MBEDTLS_ECP_C , MBEDTLS_ASN1_WRITE_C , MBEDTLS_ASN1_PARSE_C ,
* and at least one MBEDTLS_ECP_DP_XXX_ENABLED for a
* short Weierstrass curve .
2013-03-13 16:30:17 +01:00
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_ECDSA_C
2013-03-13 16:30:17 +01:00
2015-08-05 15:44:42 +02:00
/**
* \ def MBEDTLS_ECJPAKE_C
*
* Enable the elliptic curve J - PAKE library .
*
2015-09-16 23:21:01 +02:00
* \ warning This is currently experimental . EC J - PAKE support is based on the
* Thread v1 .0 .0 specification ; incompatible changes to the specification
* might still happen . For this reason , this is disabled by default .
*
2015-08-05 15:44:42 +02:00
* Module : library / ecjpake . c
* Caller :
*
* This module is used by the following key exchanges :
* ECJPAKE
*
* Requires : MBEDTLS_ECP_C , MBEDTLS_MD_C
*/
2015-10-20 14:57:00 +02:00
//#define MBEDTLS_ECJPAKE_C
2015-08-05 15:44:42 +02:00
2013-03-13 16:30:17 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_ECP_C
2013-03-13 16:30:17 +01:00
*
* Enable the elliptic curve over GF ( p ) library .
*
* Module : library / ecp . c
* Caller : library / ecdh . c
* library / ecdsa . c
2015-08-05 15:44:42 +02:00
* library / ecjpake . c
2013-03-13 16:30:17 +01:00
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_BIGNUM_C and at least one MBEDTLS_ECP_DP_XXX_ENABLED
2013-03-13 16:30:17 +01:00
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_ECP_C
2013-03-13 16:30:17 +01:00
2011-12-03 22:45:14 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_ENTROPY_C
2011-12-03 22:45:14 +01:00
*
* Enable the platform - specific entropy code .
*
* Module : library / entropy . c
* Caller :
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_SHA512_C or MBEDTLS_SHA256_C
2011-12-03 22:45:14 +01:00
*
* This module provides a generic entropy pool
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_ENTROPY_C
2011-12-03 22:45:14 +01:00
2011-05-09 18:17:09 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_ERROR_C
2011-05-09 18:17:09 +02:00
*
* Enable error code to error string conversion .
*
* Module : library / error . c
* Caller :
*
2015-04-08 12:49:31 +02:00
* This module enables mbedtls_strerror ( ) .
2011-05-09 18:17:09 +02:00
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_ERROR_C
2011-05-09 18:17:09 +02:00
2012-03-20 14:50:09 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_GCM_C
2012-03-20 14:50:09 +01:00
*
2019-04-10 19:13:57 +02:00
* Enable the Galois / Counter Mode ( GCM ) .
2012-03-20 14:50:09 +01:00
*
* Module : library / gcm . c
*
2019-04-10 19:19:16 +02:00
* Requires : MBEDTLS_AES_C or MBEDTLS_CAMELLIA_C or MBEDTLS_ARIA_C
2012-10-31 13:32:41 +01:00
*
2013-10-25 18:01:50 +02:00
* This module enables the AES - GCM and CAMELLIA - GCM ciphersuites , if other
* requisites are enabled as well .
2012-03-20 14:50:09 +01:00
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_GCM_C
2012-03-20 14:50:09 +01:00
2011-01-27 16:24:17 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_HAVEGE_C
2011-01-27 16:24:17 +01:00
*
* Enable the HAVEGE random generator .
*
2013-06-24 13:01:53 +02:00
* Warning : the HAVEGE random generator is not suitable for virtualized
* environments
*
* Warning : the HAVEGE random generator is dependent on timing and specific
* processor traits . It is therefore not advised to use HAVEGE as
* your applications primary random generator or primary entropy pool
* input . As a secondary input to your entropy pool , it IS able add
* the ( limited ) extra entropy it provides .
*
2009-01-03 22:22:43 +01:00
* Module : library / havege . c
* Caller :
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_TIMING_C
2011-05-26 15:16:06 +02:00
*
2013-06-24 13:01:53 +02:00
* Uncomment to enable the HAVEGE random generator .
*/
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_HAVEGE_C
2009-01-03 22:22:43 +01:00
2016-07-17 09:51:22 +02:00
/**
* \ def MBEDTLS_HKDF_C
*
* Enable the HKDF algorithm ( RFC 5869 ) .
*
* Module : library / hkdf . c
* Caller :
*
* Requires : MBEDTLS_MD_C
*
* This module adds support for the Hashed Message Authentication Code
* ( HMAC ) - based key derivation function ( HKDF ) .
*/
# define MBEDTLS_HKDF_C
2014-01-27 14:03:10 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_HMAC_DRBG_C
2014-01-27 14:03:10 +01:00
*
* Enable the HMAC_DRBG random generator .
*
* Module : library / hmac_drbg . c
* Caller :
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_MD_C
2014-01-27 14:03:10 +01:00
*
* Uncomment to enable the HMAC_DRBG random number geerator .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_HMAC_DRBG_C
2014-01-27 14:03:10 +01:00
2018-05-03 15:54:28 +02:00
/**
* \ def MBEDTLS_NIST_KW_C
*
* Enable the Key Wrapping mode for 128 - bit block ciphers ,
* as defined in NIST SP 800 - 38F . Only KW and KWP modes
* are supported . At the moment , only AES is approved by NIST .
*
* Module : library / nist_kw . c
*
* Requires : MBEDTLS_AES_C and MBEDTLS_CIPHER_C
*/
//#define MBEDTLS_NIST_KW_C
2011-01-27 16:24:17 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_MD_C
2011-01-27 16:24:17 +01:00
*
* Enable the generic message digest layer .
*
2016-11-04 13:23:11 +01:00
* Module : library / md . c
2011-01-06 15:20:01 +01:00
* Caller :
*
* Uncomment to enable generic message digest wrappers .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_MD_C
2011-01-06 15:20:01 +01:00
2011-01-27 16:24:17 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_MD2_C
2011-01-27 16:24:17 +01:00
*
2013-09-20 13:45:36 +02:00
* Enable the MD2 hash algorithm .
2011-01-27 16:24:17 +01:00
*
2016-11-04 13:23:11 +01:00
* Module : library / md2 . c
2013-09-20 14:10:14 +02:00
* Caller :
2009-01-03 22:22:43 +01:00
*
* Uncomment to enable support for ( rare ) MD2 - signed X .509 certs .
2017-09-25 15:53:51 +02:00
*
* \ warning MD2 is considered a weak message digest and its use constitutes a
* security risk . If possible , we recommend avoiding dependencies on
* it , and considering stronger message digests instead .
*
2009-07-28 22:52:02 +02:00
*/
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_MD2_C
2009-01-03 22:22:43 +01:00
2011-01-27 16:24:17 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_MD4_C
2011-01-27 16:24:17 +01:00
*
2013-09-20 13:45:36 +02:00
* Enable the MD4 hash algorithm .
2011-01-27 16:24:17 +01:00
*
2016-11-04 13:23:11 +01:00
* Module : library / md4 . c
2013-09-20 14:10:14 +02:00
* Caller :
2009-01-03 22:22:43 +01:00
*
* Uncomment to enable support for ( rare ) MD4 - signed X .509 certs .
2017-09-25 15:53:51 +02:00
*
* \ warning MD4 is considered a weak message digest and its use constitutes a
* security risk . If possible , we recommend avoiding dependencies on
* it , and considering stronger message digests instead .
*
2009-07-28 22:52:02 +02:00
*/
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_MD4_C
2009-01-03 22:22:43 +01:00
2011-01-27 16:24:17 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_MD5_C
2011-01-27 16:24:17 +01:00
*
2013-09-20 13:45:36 +02:00
* Enable the MD5 hash algorithm .
2011-01-27 16:24:17 +01:00
*
2016-11-04 13:23:11 +01:00
* Module : library / md5 . c
* Caller : library / md . c
2013-09-20 14:10:14 +02:00
* library / pem . c
2013-02-19 13:17:08 +01:00
* library / ssl_tls . c
2009-01-03 22:22:43 +01:00
*
2017-09-25 15:53:51 +02:00
* This module is required for SSL / TLS up to version 1.1 , and for TLS 1.2
* depending on the handshake parameters . Further , it is used for checking
* MD5 - signed certificates , and for PBKDF1 when decrypting PEM - encoded
* encrypted keys .
*
* \ warning MD5 is considered a weak message digest and its use constitutes a
* security risk . If possible , we recommend avoiding dependencies on
* it , and considering stronger message digests instead .
*
2009-01-03 22:22:43 +01:00
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_MD5_C
2009-01-03 22:22:43 +01:00
2013-07-03 13:37:05 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_MEMORY_BUFFER_ALLOC_C
2013-09-20 13:45:36 +02:00
*
* Enable the buffer allocator implementation that makes use of a ( stack )
2015-05-26 16:15:20 +02:00
* based buffer to ' allocate ' dynamic memory . ( replaces calloc ( ) and free ( )
2013-09-20 13:45:36 +02:00
* calls )
2013-07-03 13:37:05 +02:00
*
* Module : library / memory_buffer_alloc . c
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_PLATFORM_C
* MBEDTLS_PLATFORM_MEMORY ( to use it within mbed TLS )
2013-07-03 13:37:05 +02:00
*
* Enable this module to enable the buffer memory allocator .
*/
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_MEMORY_BUFFER_ALLOC_C
2013-07-03 13:37:05 +02:00
2011-01-27 16:24:17 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_NET_C
2011-01-27 16:24:17 +01:00
*
2016-02-22 10:33:34 +01:00
* Enable the TCP and UDP over IPv6 / IPv4 networking routines .
*
2016-03-09 21:19:21 +01:00
* \ note This module only works on POSIX / Unix ( including Linux , BSD and OS X )
* and Windows . For other platforms , you ' ll want to disable it , and write your
2016-02-22 10:33:34 +01:00
* own networking callbacks to be passed to \ c mbedtls_ssl_set_bio ( ) .
2011-01-27 16:24:17 +01:00
*
2016-02-22 17:42:51 +01:00
* \ note See also our Knowledge Base article about porting to a new
* environment :
* https : //tls.mbed.org/kb/how-to/how-do-i-port-mbed-tls-to-a-new-environment-OS
*
2016-09-14 15:32:09 +02:00
* Module : library / net_sockets . c
2009-01-03 22:22:43 +01:00
*
2016-02-22 10:33:34 +01:00
* This module provides networking routines .
2009-01-03 22:22:43 +01:00
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_NET_C
2009-01-03 22:22:43 +01:00
2013-04-07 22:00:46 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_OID_C
2013-04-07 22:00:46 +02:00
*
2013-09-20 13:45:36 +02:00
* Enable the OID database .
2013-04-07 22:00:46 +02:00
*
* Module : library / oid . c
2013-09-20 14:10:14 +02:00
* Caller : library / asn1write . c
* library / pkcs5 . c
* library / pkparse . c
* library / pkwrite . c
* library / rsa . c
* library / x509 . c
* library / x509_create . c
2016-11-04 13:23:11 +01:00
* library / x509_crl . c
* library / x509_crt . c
* library / x509_csr . c
2013-09-20 14:10:14 +02:00
* library / x509write_crt . c
2016-11-04 13:23:11 +01:00
* library / x509write_csr . c
2013-04-07 22:00:46 +02:00
*
* This modules translates between OIDs and internal values .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_OID_C
2013-04-07 22:00:46 +02:00
2011-01-27 16:24:17 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_PADLOCK_C
2011-01-27 16:24:17 +01:00
*
* Enable VIA Padlock support on x86 .
*
2009-01-03 22:22:43 +01:00
* Module : library / padlock . c
* Caller : library / aes . c
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_HAVE_ASM
2013-12-16 17:12:53 +01:00
*
2009-01-03 22:22:43 +01:00
* This modules adds support for the VIA PadLock on x86 .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_PADLOCK_C
2009-01-03 22:22:43 +01:00
2011-02-12 15:30:57 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_PEM_PARSE_C
2011-02-12 15:30:57 +01:00
*
2013-09-20 13:45:36 +02:00
* Enable PEM decoding / parsing .
2011-02-12 15:30:57 +01:00
*
* Module : library / pem . c
2013-09-20 14:10:14 +02:00
* Caller : library / dhm . c
2013-09-15 20:43:33 +02:00
* library / pkparse . c
2016-11-04 13:23:11 +01:00
* library / x509_crl . c
* library / x509_crt . c
* library / x509_csr . c
2011-02-12 15:30:57 +01:00
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_BASE64_C
2011-05-26 15:16:06 +02:00
*
2013-09-15 20:43:33 +02:00
* This modules adds support for decoding / parsing PEM files .
2011-02-12 15:30:57 +01:00
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_PEM_PARSE_C
2013-09-15 20:43:33 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_PEM_WRITE_C
2013-09-15 20:43:33 +02:00
*
2013-09-20 13:45:36 +02:00
* Enable PEM encoding / writing .
2013-09-15 20:43:33 +02:00
*
* Module : library / pem . c
2013-09-20 14:10:14 +02:00
* Caller : library / pkwrite . c
* library / x509write_crt . c
2016-11-04 13:23:11 +01:00
* library / x509write_csr . c
2013-09-15 20:43:33 +02:00
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_BASE64_C
2013-09-15 20:43:33 +02:00
*
* This modules adds support for encoding / writing PEM files .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_PEM_WRITE_C
2011-02-12 15:30:57 +01:00
2013-08-22 13:29:31 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_PK_C
2013-08-22 13:29:31 +02:00
*
* Enable the generic public ( asymetric ) key layer .
*
* Module : library / pk . c
2013-09-20 12:29:15 +02:00
* Caller : library / ssl_tls . c
2013-08-22 13:29:31 +02:00
* library / ssl_cli . c
* library / ssl_srv . c
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_RSA_C or MBEDTLS_ECP_C
2013-09-20 12:29:15 +02:00
*
2013-08-22 13:29:31 +02:00
* Uncomment to enable generic public key wrappers .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_PK_C
2013-08-22 13:29:31 +02:00
2013-09-15 17:04:23 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_PK_PARSE_C
2013-09-15 17:04:23 +02:00
*
* Enable the generic public ( asymetric ) key parser .
*
* Module : library / pkparse . c
2016-11-04 13:23:11 +01:00
* Caller : library / x509_crt . c
* library / x509_csr . c
2013-09-15 17:04:23 +02:00
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_PK_C
2013-09-15 17:04:23 +02:00
*
* Uncomment to enable generic public key parse functions .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_PK_PARSE_C
2013-09-15 17:04:23 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_PK_WRITE_C
2013-09-15 17:04:23 +02:00
*
2013-09-16 22:46:20 +02:00
* Enable the generic public ( asymetric ) key writer .
2013-09-15 17:04:23 +02:00
*
* Module : library / pkwrite . c
* Caller : library / x509write . c
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_PK_C
2013-09-15 17:04:23 +02:00
*
* Uncomment to enable generic public key write functions .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_PK_WRITE_C
2013-09-15 17:04:23 +02:00
2013-06-24 19:26:38 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_PKCS5_C
2013-06-24 19:26:38 +02:00
*
2013-09-20 13:45:36 +02:00
* Enable PKCS # 5 functions .
2013-06-24 19:26:38 +02:00
*
* Module : library / pkcs5 . c
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_MD_C
2013-06-24 19:26:38 +02:00
*
* This module adds support for the PKCS # 5 functions .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_PKCS5_C
2013-06-24 19:26:38 +02:00
2011-05-26 15:16:06 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_PKCS11_C
2011-05-26 15:16:06 +02:00
*
2020-01-23 15:51:40 +01:00
* Enable wrapper for PKCS # 11 smartcard support via the pkcs11 - helper library .
2011-05-26 15:16:06 +02:00
*
2019-01-15 20:07:43 +01:00
* \ deprecated This option is deprecated and will be removed in a future
* version of Mbed TLS .
2011-05-26 15:16:06 +02:00
*
2013-08-22 13:35:53 +02:00
* Module : library / pkcs11 . c
* Caller : library / pk . c
2011-05-26 15:16:06 +02:00
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_PK_C
2011-05-26 15:16:06 +02:00
*
2012-09-27 21:15:01 +02:00
* This module enables SSL / TLS PKCS # 11 smartcard support .
2011-05-26 15:16:06 +02:00
* Requires the presence of the PKCS # 11 helper library ( libpkcs11 - helper )
*/
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_PKCS11_C
2011-05-26 15:16:06 +02:00
2013-06-24 19:17:19 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_PKCS12_C
2013-06-24 19:17:19 +02:00
*
2013-09-20 13:45:36 +02:00
* Enable PKCS # 12 PBE functions .
2013-06-24 19:17:19 +02:00
* Adds algorithms for parsing PKCS # 8 encrypted private keys
*
* Module : library / pkcs12 . c
2013-09-20 14:10:14 +02:00
* Caller : library / pkparse . c
2013-06-24 19:17:19 +02:00
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_ASN1_PARSE_C , MBEDTLS_CIPHER_C , MBEDTLS_MD_C
* Can use : MBEDTLS_ARC4_C
2013-06-24 19:17:19 +02:00
*
* This module enables PKCS # 12 functions .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_PKCS12_C
2013-06-24 19:17:19 +02:00
2014-02-01 22:50:07 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_PLATFORM_C
2014-02-01 22:50:07 +01:00
*
* Enable the platform abstraction layer that allows you to re - assign
2015-06-22 10:23:34 +02:00
* functions like calloc ( ) , free ( ) , snprintf ( ) , printf ( ) , fprintf ( ) , exit ( ) .
2014-02-01 22:50:07 +01:00
*
2015-04-08 12:49:31 +02:00
* Enabling MBEDTLS_PLATFORM_C enables to use of MBEDTLS_PLATFORM_XXX_ALT
* or MBEDTLS_PLATFORM_XXX_MACRO directives , allowing the functions mentioned
2015-02-06 17:14:34 +01:00
* above to be specified at runtime or compile time respectively .
2014-02-01 22:50:07 +01:00
*
2015-06-22 10:23:34 +02:00
* \ note This abstraction layer must be enabled on Windows ( including MSYS2 )
* as other module rely on it for a fixed snprintf implementation .
*
2014-02-01 22:50:07 +01:00
* Module : library / platform . c
* Caller : Most other . c files
*
* This module enables abstraction of common ( libc ) functions .
*/
2015-05-26 16:15:20 +02:00
# define MBEDTLS_PLATFORM_C
2014-02-01 22:50:07 +01:00
2016-05-16 23:25:45 +02:00
/**
* \ def MBEDTLS_POLY1305_C
*
* Enable the Poly1305 MAC algorithm .
*
* Module : library / poly1305 . c
2018-05-07 10:43:27 +02:00
* Caller : library / chachapoly . c
2016-05-16 23:25:45 +02:00
*/
# define MBEDTLS_POLY1305_C
2018-10-25 18:38:05 +02:00
/**
* \ def MBEDTLS_PSA_CRYPTO_C
*
* Enable the Platform Security Architecture cryptography API .
*
2019-02-01 12:33:29 +01:00
* \ warning The PSA Crypto API is still beta status . While you ' re welcome to
* experiment using it , incompatible API changes are still possible , and some
* parts may not have reached the same quality as the rest of Mbed TLS yet .
2018-10-25 18:38:05 +02:00
*
2018-01-27 23:32:46 +01:00
* Module : library / psa_crypto . c
2018-10-25 18:38:05 +02:00
*
* Requires : MBEDTLS_CTR_DRBG_C , MBEDTLS_ENTROPY_C
*
*/
2019-02-01 12:33:29 +01:00
# define MBEDTLS_PSA_CRYPTO_C
2018-10-25 18:38:05 +02:00
2019-06-26 11:24:49 +02:00
/**
* \ def MBEDTLS_PSA_CRYPTO_SE_C
*
* Enable secure element support in the Platform Security Architecture
* cryptography API .
*
2019-07-24 13:52:51 +02:00
* \ warning This feature is not yet suitable for production . It is provided
* for API evaluation and testing purposes only .
*
2019-06-26 11:24:49 +02:00
* Module : library / psa_crypto_se . c
*
* Requires : MBEDTLS_PSA_CRYPTO_C , MBEDTLS_PSA_CRYPTO_STORAGE_C
*
*/
2019-07-24 13:52:51 +02:00
//#define MBEDTLS_PSA_CRYPTO_SE_C
2019-06-26 11:24:49 +02:00
2019-02-05 11:23:41 +01:00
/**
* \ def MBEDTLS_PSA_CRYPTO_STORAGE_C
*
* Enable the Platform Security Architecture persistent key storage .
*
2018-06-15 14:06:04 +02:00
* Module : library / psa_crypto_storage . c
2019-02-05 11:23:41 +01:00
*
2019-03-15 17:14:19 +01:00
* Requires : MBEDTLS_PSA_CRYPTO_C ,
* either MBEDTLS_PSA_ITS_FILE_C or a native implementation of
* the PSA ITS interface
2019-02-05 11:23:41 +01:00
*/
2019-02-24 17:00:27 +01:00
# define MBEDTLS_PSA_CRYPTO_STORAGE_C
2019-02-05 11:23:41 +01:00
/**
2019-03-15 17:14:19 +01:00
* \ def MBEDTLS_PSA_ITS_FILE_C
2019-02-05 11:23:41 +01:00
*
2019-03-15 17:14:19 +01:00
* Enable the emulation of the Platform Security Architecture
* Internal Trusted Storage ( PSA ITS ) over files .
2019-02-05 11:23:41 +01:00
*
2018-11-16 22:24:15 +01:00
* Module : library / psa_its_file . c
2019-02-05 11:23:41 +01:00
*
2019-03-15 17:14:19 +01:00
* Requires : MBEDTLS_FS_IO
2019-02-05 11:23:41 +01:00
*/
2018-11-16 22:24:15 +01:00
# define MBEDTLS_PSA_ITS_FILE_C
2019-02-05 11:23:41 +01:00
2014-01-17 12:42:35 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_RIPEMD160_C
2014-01-17 12:42:35 +01:00
*
* Enable the RIPEMD - 160 hash algorithm .
*
2016-11-04 13:23:11 +01:00
* Module : library / ripemd160 . c
* Caller : library / md . c
2014-01-17 12:42:35 +01:00
*
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_RIPEMD160_C
2014-01-17 12:42:35 +01:00
2011-01-27 16:24:17 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_RSA_C
2011-01-27 16:24:17 +01:00
*
* Enable the RSA public - key cryptosystem .
*
2009-01-03 22:22:43 +01:00
* Module : library / rsa . c
2017-10-11 12:00:19 +02:00
* library / rsa_internal . c
2009-01-03 22:22:43 +01:00
* Caller : library / ssl_cli . c
* library / ssl_srv . c
* library / ssl_tls . c
* library / x509 . c
*
2013-10-25 18:01:50 +02:00
* This module is used by the following key exchanges :
* RSA , DHE - RSA , ECDHE - RSA , RSA - PSK
2011-05-26 15:16:06 +02:00
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_BIGNUM_C , MBEDTLS_OID_C
2009-01-03 22:22:43 +01:00
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_RSA_C
2009-01-03 22:22:43 +01:00
2011-01-27 16:24:17 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_SHA1_C
2011-01-27 16:24:17 +01:00
*
* Enable the SHA1 cryptographic hash algorithm .
*
2016-11-04 13:23:11 +01:00
* Module : library / sha1 . c
* Caller : library / md . c
2013-09-20 14:10:14 +02:00
* library / ssl_cli . c
2009-01-03 22:22:43 +01:00
* library / ssl_srv . c
* library / ssl_tls . c
2013-09-20 14:10:14 +02:00
* library / x509write_crt . c
2009-01-03 22:22:43 +01:00
*
2017-05-04 16:17:21 +02:00
* This module is required for SSL / TLS up to version 1.1 , for TLS 1.2
* depending on the handshake parameters , and for SHA1 - signed certificates .
2017-09-25 15:53:51 +02:00
*
* \ warning SHA - 1 is considered a weak message digest and its use constitutes
* a security risk . If possible , we recommend avoiding dependencies
* on it , and considering stronger message digests instead .
*
2009-01-03 22:22:43 +01:00
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_SHA1_C
2009-01-03 22:22:43 +01:00
2011-01-27 16:24:17 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_SHA256_C
2011-01-27 16:24:17 +01:00
*
* Enable the SHA - 224 and SHA - 256 cryptographic hash algorithms .
*
2016-11-04 13:23:11 +01:00
* Module : library / sha256 . c
2013-09-20 14:10:14 +02:00
* Caller : library / entropy . c
2016-11-04 13:23:11 +01:00
* library / md . c
2013-09-20 14:10:14 +02:00
* library / ssl_cli . c
* library / ssl_srv . c
* library / ssl_tls . c
2009-01-03 22:22:43 +01:00
*
* This module adds support for SHA - 224 and SHA - 256.
2012-11-24 11:26:46 +01:00
* This module is required for the SSL / TLS 1.2 PRF function .
2009-01-03 22:22:43 +01:00
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_SHA256_C
2009-01-03 22:22:43 +01:00
2011-01-27 16:24:17 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_SHA512_C
2011-01-27 16:24:17 +01:00
*
* Enable the SHA - 384 and SHA - 512 cryptographic hash algorithms .
*
2016-11-04 13:23:11 +01:00
* Module : library / sha512 . c
2013-09-20 14:10:14 +02:00
* Caller : library / entropy . c
2016-11-04 13:23:11 +01:00
* library / md . c
2013-09-20 14:10:14 +02:00
* library / ssl_cli . c
* library / ssl_srv . c
2009-01-03 22:22:43 +01:00
*
* This module adds support for SHA - 384 and SHA - 512.
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_SHA512_C
2009-01-03 22:22:43 +01:00
2012-09-25 23:55:46 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_SSL_CACHE_C
2012-09-25 23:55:46 +02:00
*
* Enable simple SSL cache implementation .
*
* Module : library / ssl_cache . c
* Caller :
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_SSL_CACHE_C
2012-09-25 23:55:46 +02:00
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_SSL_CACHE_C
2012-09-25 23:55:46 +02:00
2014-07-23 18:30:45 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_SSL_COOKIE_C
2014-07-23 18:30:45 +02:00
*
* Enable basic implementation of DTLS cookies for hello verification .
*
* Module : library / ssl_cookie . c
* Caller :
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_SSL_COOKIE_C
2014-07-23 18:30:45 +02:00
2015-05-15 12:09:00 +02:00
/**
* \ def MBEDTLS_SSL_TICKET_C
*
* Enable an implementation of TLS server - side callbacks for session tickets .
*
* Module : library / ssl_ticket . c
* Caller :
2015-05-20 09:55:50 +02:00
*
2015-05-25 19:34:49 +02:00
* Requires : MBEDTLS_CIPHER_C
2015-05-15 12:09:00 +02:00
*/
# define MBEDTLS_SSL_TICKET_C
2011-01-27 16:24:17 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_SSL_CLI_C
2011-01-27 16:24:17 +01:00
*
* Enable the SSL / TLS client code .
*
2009-01-03 22:22:43 +01:00
* Module : library / ssl_cli . c
* Caller :
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_SSL_TLS_C
2011-05-26 15:16:06 +02:00
*
2009-01-03 22:22:43 +01:00
* This module is required for SSL / TLS client support .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_SSL_CLI_C
2009-01-03 22:22:43 +01:00
2012-11-14 13:39:52 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_SSL_SRV_C
2011-01-27 16:24:17 +01:00
*
* Enable the SSL / TLS server code .
*
2009-01-03 22:22:43 +01:00
* Module : library / ssl_srv . c
* Caller :
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_SSL_TLS_C
2011-05-26 15:16:06 +02:00
*
2009-01-03 22:22:43 +01:00
* This module is required for SSL / TLS server support .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_SSL_SRV_C
2009-01-03 22:22:43 +01:00
2011-01-27 16:24:17 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_SSL_TLS_C
2011-01-27 16:24:17 +01:00
*
2011-05-18 15:26:54 +02:00
* Enable the generic SSL / TLS code .
2011-01-27 16:24:17 +01:00
*
2009-01-03 22:22:43 +01:00
* Module : library / ssl_tls . c
* Caller : library / ssl_cli . c
* library / ssl_srv . c
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_CIPHER_C , MBEDTLS_MD_C
* and at least one of the MBEDTLS_SSL_PROTO_XXX defines
2011-05-26 15:16:06 +02:00
*
2009-01-03 22:22:43 +01:00
* This module is required for SSL / TLS .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_SSL_TLS_C
2009-01-03 22:22:43 +01:00
2013-09-28 14:40:38 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_THREADING_C
2013-09-28 14:40:38 +02:00
*
* Enable the threading abstraction layer .
2015-01-22 17:11:05 +01:00
* By default mbed TLS assumes it is used in a non - threaded environment or that
2013-09-28 14:40:38 +02:00
* contexts are not shared between threads . If you do intend to use contexts
* between threads , you will need to enable this layer to prevent race
2016-02-22 17:42:51 +01:00
* conditions . See also our Knowledge Base article about threading :
* https : //tls.mbed.org/kb/development/thread-safety-and-multi-threading
2013-09-28 14:40:38 +02:00
*
* Module : library / threading . c
*
* This allows different threading implementations ( self - implemented or
* provided ) .
*
2015-04-08 12:49:31 +02:00
* You will have to enable either MBEDTLS_THREADING_ALT or
* MBEDTLS_THREADING_PTHREAD .
2013-09-28 14:40:38 +02:00
*
2015-01-22 17:11:05 +01:00
* Enable this layer to allow use of mutexes within mbed TLS
2013-09-28 14:40:38 +02:00
*/
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_THREADING_C
2013-09-28 14:40:38 +02:00
2011-01-27 16:24:17 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_TIMING_C
2011-01-27 16:24:17 +01:00
*
2016-02-22 10:33:34 +01:00
* Enable the semi - portable timing interface .
*
2016-03-09 21:19:21 +01:00
* \ note The provided implementation only works on POSIX / Unix ( including Linux ,
* BSD and OS X ) and Windows . On other platforms , you can either disable that
2016-02-22 10:33:34 +01:00
* module and provide your own implementations of the callbacks needed by
* \ c mbedtls_ssl_set_timer_cb ( ) for DTLS , or leave it enabled and provide
* your own implementation of the whole module by setting
* \ c MBEDTLS_TIMING_ALT in the current file .
2011-01-27 16:24:17 +01:00
*
2016-02-22 17:42:51 +01:00
* \ note See also our Knowledge Base article about porting to a new
* environment :
* https : //tls.mbed.org/kb/how-to/how-do-i-port-mbed-tls-to-a-new-environment-OS
*
2009-01-03 22:22:43 +01:00
* Module : library / timing . c
* Caller : library / havege . c
*
* This module is used by the HAVEGE random number generator .
2013-07-03 14:48:29 +02:00
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_TIMING_C
2009-01-03 22:22:43 +01:00
2011-01-27 16:24:17 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_VERSION_C
2011-01-27 16:24:17 +01:00
*
* Enable run - time version information .
*
2011-01-21 12:00:08 +01:00
* Module : library / version . c
*
* This module provides run - time version information .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_VERSION_C
2011-01-21 12:00:08 +01:00
2011-01-27 16:24:17 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_X509_USE_C
2013-09-16 13:49:26 +02:00
*
2013-09-20 13:45:36 +02:00
* Enable X .509 core for using certificates .
2013-09-16 13:49:26 +02:00
*
* Module : library / x509 . c
2016-11-04 13:23:11 +01:00
* Caller : library / x509_crl . c
* library / x509_crt . c
* library / x509_csr . c
2013-09-16 13:49:26 +02:00
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_ASN1_PARSE_C , MBEDTLS_BIGNUM_C , MBEDTLS_OID_C ,
* MBEDTLS_PK_PARSE_C
2013-09-16 13:49:26 +02:00
*
* This module is required for the X .509 parsing modules .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_X509_USE_C
2013-09-16 13:49:26 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_X509_CRT_PARSE_C
2011-01-27 16:24:17 +01:00
*
* Enable X .509 certificate parsing .
*
2016-11-04 13:23:11 +01:00
* Module : library / x509_crt . c
2009-01-03 22:22:43 +01:00
* Caller : library / ssl_cli . c
* library / ssl_srv . c
* library / ssl_tls . c
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_X509_USE_C
2011-05-26 15:16:06 +02:00
*
2009-01-03 22:22:43 +01:00
* This module is required for X .509 certificate parsing .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_X509_CRT_PARSE_C
2013-09-16 13:49:26 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_X509_CRL_PARSE_C
2013-09-16 13:49:26 +02:00
*
* Enable X .509 CRL parsing .
*
2016-11-04 13:23:11 +01:00
* Module : library / x509_crl . c
* Caller : library / x509_crt . c
2013-09-16 13:49:26 +02:00
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_X509_USE_C
2013-09-16 13:49:26 +02:00
*
* This module is required for X .509 CRL parsing .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_X509_CRL_PARSE_C
2013-09-16 13:49:26 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_X509_CSR_PARSE_C
2013-09-16 13:49:26 +02:00
*
* Enable X .509 Certificate Signing Request ( CSR ) parsing .
*
2016-11-04 13:23:11 +01:00
* Module : library / x509_csr . c
2013-09-16 13:49:26 +02:00
* Caller : library / x509_crt_write . c
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_X509_USE_C
2013-09-16 13:49:26 +02:00
*
* This module is used for reading X .509 certificate request .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_X509_CSR_PARSE_C
2009-01-03 22:22:43 +01:00
2012-02-14 00:11:30 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_X509_CREATE_C
2012-02-14 00:11:30 +01:00
*
2013-09-20 13:45:36 +02:00
* Enable X .509 core for creating certificates .
2012-02-14 00:11:30 +01:00
*
2013-09-16 13:49:26 +02:00
* Module : library / x509_create . c
2012-02-14 00:11:30 +01:00
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_BIGNUM_C , MBEDTLS_OID_C , MBEDTLS_PK_WRITE_C
2012-02-14 00:11:30 +01:00
*
2013-09-16 13:49:26 +02:00
* This module is the basis for creating X .509 certificates and CSRs .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_X509_CREATE_C
2013-09-16 13:49:26 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_X509_CRT_WRITE_C
2013-09-16 13:49:26 +02:00
*
* Enable creating X .509 certificates .
*
* Module : library / x509_crt_write . c
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_X509_CREATE_C
2013-09-16 13:49:26 +02:00
*
* This module is required for X .509 certificate creation .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_X509_CRT_WRITE_C
2013-09-16 13:49:26 +02:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_X509_CSR_WRITE_C
2013-09-16 13:49:26 +02:00
*
2013-09-20 13:45:36 +02:00
* Enable creating X .509 Certificate Signing Requests ( CSR ) .
2013-09-16 13:49:26 +02:00
*
* Module : library / x509_csr_write . c
*
2015-04-08 12:49:31 +02:00
* Requires : MBEDTLS_X509_CREATE_C
2013-09-16 13:49:26 +02:00
*
2012-02-14 00:11:30 +01:00
* This module is required for X .509 certificate request writing .
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_X509_CSR_WRITE_C
2012-02-14 00:11:30 +01:00
2011-01-27 16:24:17 +01:00
/**
2015-04-08 12:49:31 +02:00
* \ def MBEDTLS_XTEA_C
2011-01-27 16:24:17 +01:00
*
* Enable the XTEA block cipher .
2009-01-03 22:22:43 +01:00
*
2009-01-04 19:15:48 +01:00
* Module : library / xtea . c
* Caller :
*/
2015-04-08 12:49:31 +02:00
# define MBEDTLS_XTEA_C
2012-10-31 09:26:55 +01:00
2015-01-22 17:11:05 +01:00
/* \} name SECTION: mbed TLS modules */
2009-01-04 19:15:48 +01:00
2013-06-24 19:31:17 +02:00
/**
* \ name SECTION : Module configuration options
*
* This section allows for the setting of module specific sizes and
* configuration options . The default values are already present in the
* relevant header files and should suffice for the regular use cases .
*
2014-04-25 11:11:10 +02:00
* Our advice is to enable options and change their values here
* only if you have a good reason and know the consequences .
2013-06-24 19:31:17 +02:00
*
* Please check the respective header file for documentation on these
* parameters ( to prevent duplicate documentation ) .
* \ {
*/
2014-04-25 11:11:10 +02:00
/* MPI / BIGNUM options */
2020-09-07 13:06:40 +02:00
//#define MBEDTLS_MPI_WINDOW_SIZE 6 /**< Maximum window size used. */
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_MPI_MAX_SIZE 1024 /**< Maximum number of bytes for usable MPIs. */
2014-04-25 11:11:10 +02:00
/* CTR_DRBG options */
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_CTR_DRBG_ENTROPY_LEN 48 /**< Amount of entropy used per seed by default (48 with SHA-512, 32 with SHA-256) */
//#define MBEDTLS_CTR_DRBG_RESEED_INTERVAL 10000 /**< Interval before reseed is performed by default */
//#define MBEDTLS_CTR_DRBG_MAX_INPUT 256 /**< Maximum number of additional input bytes */
//#define MBEDTLS_CTR_DRBG_MAX_REQUEST 1024 /**< Maximum number of requested bytes per call */
//#define MBEDTLS_CTR_DRBG_MAX_SEED_INPUT 384 /**< Maximum size of (re)seed buffer */
2014-04-25 11:11:10 +02:00
/* HMAC_DRBG options */
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_HMAC_DRBG_RESEED_INTERVAL 10000 /**< Interval before reseed is performed by default */
//#define MBEDTLS_HMAC_DRBG_MAX_INPUT 256 /**< Maximum number of additional input bytes */
//#define MBEDTLS_HMAC_DRBG_MAX_REQUEST 1024 /**< Maximum number of requested bytes per call */
//#define MBEDTLS_HMAC_DRBG_MAX_SEED_INPUT 384 /**< Maximum size of (re)seed buffer */
2014-04-25 11:11:10 +02:00
/* ECP options */
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_ECP_MAX_BITS 521 /**< Maximum bit size of groups */
//#define MBEDTLS_ECP_WINDOW_SIZE 6 /**< Maximum window size used */
//#define MBEDTLS_ECP_FIXED_POINT_OPTIM 1 /**< Enable fixed-point speed-up */
2014-04-25 11:11:10 +02:00
/* Entropy options */
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_ENTROPY_MAX_SOURCES 20 /**< Maximum number of sources supported */
//#define MBEDTLS_ENTROPY_MAX_GATHER 128 /**< Maximum amount requested from entropy sources */
2016-09-23 18:58:49 +02:00
//#define MBEDTLS_ENTROPY_MIN_HARDWARE 32 /**< Default minimum number of bytes required for the hardware entropy source mbedtls_hardware_poll() before entropy is released */
2014-04-25 11:11:10 +02:00
/* Memory buffer allocator options */
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_MEMORY_ALIGN_MULTIPLE 4 /**< Align on multiples of this value */
2014-04-25 11:11:10 +02:00
/* Platform options */
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_PLATFORM_STD_MEM_HDR <stdlib.h> /**< Header to include if MBEDTLS_PLATFORM_NO_STD_FUNCTIONS is defined. Don't define if no header is needed. */
2015-05-26 16:15:20 +02:00
//#define MBEDTLS_PLATFORM_STD_CALLOC calloc /**< Default allocator to use, can be undefined */
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_PLATFORM_STD_FREE free /**< Default free to use, can be undefined */
//#define MBEDTLS_PLATFORM_STD_EXIT exit /**< Default exit to use, can be undefined */
2016-07-20 11:16:25 +02:00
//#define MBEDTLS_PLATFORM_STD_TIME time /**< Default time to use, can be undefined. MBEDTLS_HAVE_TIME must be enabled */
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_PLATFORM_STD_FPRINTF fprintf /**< Default fprintf to use, can be undefined */
//#define MBEDTLS_PLATFORM_STD_PRINTF printf /**< Default printf to use, can be undefined */
2019-01-23 15:24:37 +01:00
/* Note: your snprintf must correctly zero-terminate the buffer! */
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_PLATFORM_STD_SNPRINTF snprintf /**< Default snprintf to use, can be undefined */
2016-03-18 14:49:27 +01:00
//#define MBEDTLS_PLATFORM_STD_EXIT_SUCCESS 0 /**< Default exit value to use, can be undefined */
//#define MBEDTLS_PLATFORM_STD_EXIT_FAILURE 1 /**< Default exit value to use, can be undefined */
2016-06-01 12:25:44 +02:00
//#define MBEDTLS_PLATFORM_STD_NV_SEED_READ mbedtls_platform_std_nv_seed_read /**< Default nv_seed_read function to use, can be undefined */
//#define MBEDTLS_PLATFORM_STD_NV_SEED_WRITE mbedtls_platform_std_nv_seed_write /**< Default nv_seed_write function to use, can be undefined */
//#define MBEDTLS_PLATFORM_STD_NV_SEED_FILE "seedfile" /**< Seed file to read/write with default implementation */
2015-04-08 12:49:31 +02:00
/* To Use Function Macros MBEDTLS_PLATFORM_C must be enabled */
/* MBEDTLS_PLATFORM_XXX_MACRO and MBEDTLS_PLATFORM_XXX_ALT cannot both be defined */
2015-05-26 16:15:20 +02:00
//#define MBEDTLS_PLATFORM_CALLOC_MACRO calloc /**< Default allocator macro to use, can be undefined */
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_PLATFORM_FREE_MACRO free /**< Default free macro to use, can be undefined */
//#define MBEDTLS_PLATFORM_EXIT_MACRO exit /**< Default exit macro to use, can be undefined */
2016-07-20 11:16:25 +02:00
//#define MBEDTLS_PLATFORM_TIME_MACRO time /**< Default time macro to use, can be undefined. MBEDTLS_HAVE_TIME must be enabled */
//#define MBEDTLS_PLATFORM_TIME_TYPE_MACRO time_t /**< Default time macro to use, can be undefined. MBEDTLS_HAVE_TIME must be enabled */
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_PLATFORM_FPRINTF_MACRO fprintf /**< Default fprintf macro to use, can be undefined */
//#define MBEDTLS_PLATFORM_PRINTF_MACRO printf /**< Default printf macro to use, can be undefined */
2019-01-23 15:24:37 +01:00
/* Note: your snprintf must correctly zero-terminate the buffer! */
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_PLATFORM_SNPRINTF_MACRO snprintf /**< Default snprintf macro to use, can be undefined */
2018-07-16 14:27:07 +02:00
//#define MBEDTLS_PLATFORM_VSNPRINTF_MACRO vsnprintf /**< Default vsnprintf macro to use, can be undefined */
2016-06-01 12:25:44 +02:00
//#define MBEDTLS_PLATFORM_NV_SEED_READ_MACRO mbedtls_platform_std_nv_seed_read /**< Default nv_seed_read function to use, can be undefined */
//#define MBEDTLS_PLATFORM_NV_SEED_WRITE_MACRO mbedtls_platform_std_nv_seed_write /**< Default nv_seed_write function to use, can be undefined */
2014-04-25 11:11:10 +02:00
2019-01-31 14:20:20 +01:00
/**
* \ brief This macro is invoked by the library when an invalid parameter
2019-06-13 16:44:19 +02:00
* is detected that is only checked with # MBEDTLS_CHECK_PARAMS
2019-01-31 14:20:20 +01:00
* ( see the documentation of that option for context ) .
*
2019-06-13 16:44:19 +02:00
* When you leave this undefined here , the library provides
* a default definition . If the macro # MBEDTLS_CHECK_PARAMS_ASSERT
* is defined , the default definition is ` assert ( cond ) ` ,
* otherwise the default definition calls a function
* mbedtls_param_failed ( ) . This function is declared in
* ` platform_util . h ` for the benefit of the library , but
* you need to define in your application .
2019-01-31 14:20:20 +01:00
*
* When you define this here , this replaces the default
* definition in platform_util . h ( which no longer declares the
* function mbedtls_param_failed ( ) ) and it is your responsibility
* to make sure this macro expands to something suitable ( in
* particular , that all the necessary declarations are visible
* from within the library - you can ensure that by providing
* them in this file next to the macro definition ) .
2019-06-13 16:44:19 +02:00
* If you define this macro to call ` assert ` , also define
* # MBEDTLS_CHECK_PARAMS_ASSERT so that library source files
* include ` < assert . h > ` .
2019-01-31 14:20:20 +01:00
*
* Note that you may define this macro to expand to nothing , in
* which case you don ' t have to worry about declarations or
* definitions . However , you will then be notified about invalid
* parameters only in non - void functions , and void function will
* just silently return early on invalid parameters , which
* partially negates the benefits of enabling
* # MBEDTLS_CHECK_PARAMS in the first place , so is discouraged .
*
* \ param cond The expression that should evaluate to true , but doesn ' t .
*/
//#define MBEDTLS_PARAM_FAILED( cond ) assert( cond )
2014-04-25 11:11:10 +02:00
/* SSL Cache options */
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_SSL_CACHE_DEFAULT_TIMEOUT 86400 /**< 1 day */
//#define MBEDTLS_SSL_CACHE_DEFAULT_MAX_ENTRIES 50 /**< Maximum entries in cache */
2014-04-25 11:11:10 +02:00
/* SSL options */
2016-05-25 12:56:48 +02:00
/** \def MBEDTLS_SSL_MAX_CONTENT_LEN
*
2019-01-31 14:20:20 +01:00
* Maximum length ( in bytes ) of incoming and outgoing plaintext fragments .
*
* This determines the size of both the incoming and outgoing TLS I / O buffers
* in such a way that both are capable of holding the specified amount of
* plaintext data , regardless of the protection mechanism used .
2016-05-25 12:56:48 +02:00
*
2019-01-31 14:20:20 +01:00
* To configure incoming and outgoing I / O buffers separately , use
* # MBEDTLS_SSL_IN_CONTENT_LEN and # MBEDTLS_SSL_OUT_CONTENT_LEN ,
* which overwrite the value set by this option .
2016-05-25 12:56:48 +02:00
*
2019-01-31 14:20:20 +01:00
* \ note When using a value less than the default of 16 KB on the client , it is
* recommended to use the Maximum Fragment Length ( MFL ) extension to
* inform the server about this limitation . On the server , there
* is no supported , standardized way of informing the client about
* restriction on the maximum size of incoming messages , and unless
* the limitation has been communicated by other means , it is recommended
* to only change the outgoing buffer size # MBEDTLS_SSL_OUT_CONTENT_LEN
* while keeping the default value of 16 KB for the incoming buffer .
*
* Uncomment to set the maximum plaintext size of both
* incoming and outgoing I / O buffers .
2016-05-25 12:56:48 +02:00
*/
//#define MBEDTLS_SSL_MAX_CONTENT_LEN 16384
/** \def MBEDTLS_SSL_IN_CONTENT_LEN
*
2019-01-31 14:20:20 +01:00
* Maximum length ( in bytes ) of incoming plaintext fragments .
*
* This determines the size of the incoming TLS I / O buffer in such a way
* that it is capable of holding the specified amount of plaintext data ,
* regardless of the protection mechanism used .
*
* If this option is undefined , it inherits its value from
* # MBEDTLS_SSL_MAX_CONTENT_LEN .
2016-05-25 12:56:48 +02:00
*
2019-01-31 14:20:20 +01:00
* \ note When using a value less than the default of 16 KB on the client , it is
* recommended to use the Maximum Fragment Length ( MFL ) extension to
* inform the server about this limitation . On the server , there
* is no supported , standardized way of informing the client about
* restriction on the maximum size of incoming messages , and unless
* the limitation has been communicated by other means , it is recommended
* to only change the outgoing buffer size # MBEDTLS_SSL_OUT_CONTENT_LEN
* while keeping the default value of 16 KB for the incoming buffer .
*
* Uncomment to set the maximum plaintext size of the incoming I / O buffer
* independently of the outgoing I / O buffer .
2016-05-25 12:56:48 +02:00
*/
//#define MBEDTLS_SSL_IN_CONTENT_LEN 16384
2020-03-04 21:35:27 +01:00
/** \def MBEDTLS_SSL_CID_IN_LEN_MAX
*
* The maximum length of CIDs used for incoming DTLS messages .
*
*/
//#define MBEDTLS_SSL_CID_IN_LEN_MAX 32
/** \def MBEDTLS_SSL_CID_OUT_LEN_MAX
*
* The maximum length of CIDs used for outgoing DTLS messages .
*
*/
//#define MBEDTLS_SSL_CID_OUT_LEN_MAX 32
/** \def MBEDTLS_SSL_CID_PADDING_GRANULARITY
*
* This option controls the use of record plaintext padding
* when using the Connection ID extension in DTLS 1.2 .
*
* The padding will always be chosen so that the length of the
* padded plaintext is a multiple of the value of this option .
*
* Note : A value of \ c 1 means that no padding will be used
* for outgoing records .
*
* Note : On systems lacking division instructions ,
* a power of two should be preferred .
*
*/
//#define MBEDTLS_SSL_CID_PADDING_GRANULARITY 16
2020-06-02 07:16:00 +02:00
/** \def MBEDTLS_SSL_TLS1_3_PADDING_GRANULARITY
2020-05-28 17:15:19 +02:00
*
* This option controls the use of record plaintext padding
* in TLS 1.3 .
*
* The padding will always be chosen so that the length of the
* padded plaintext is a multiple of the value of this option .
*
* Note : A value of \ c 1 means that no padding will be used
* for outgoing records .
*
* Note : On systems lacking division instructions ,
* a power of two should be preferred .
*/
2020-06-02 07:16:00 +02:00
//#define MBEDTLS_SSL_TLS1_3_PADDING_GRANULARITY 1
2020-05-28 17:15:19 +02:00
2016-05-25 12:56:48 +02:00
/** \def MBEDTLS_SSL_OUT_CONTENT_LEN
*
2019-01-31 14:20:20 +01:00
* Maximum length ( in bytes ) of outgoing plaintext fragments .
*
* This determines the size of the outgoing TLS I / O buffer in such a way
* that it is capable of holding the specified amount of plaintext data ,
* regardless of the protection mechanism used .
2016-05-25 12:56:48 +02:00
*
2019-01-31 14:20:20 +01:00
* If this option undefined , it inherits its value from
* # MBEDTLS_SSL_MAX_CONTENT_LEN .
2016-05-25 12:56:48 +02:00
*
* It is possible to save RAM by setting a smaller outward buffer , while keeping
* the default inward 16384 byte buffer to conform to the TLS specification .
*
* The minimum required outward buffer size is determined by the handshake
* protocol ' s usage . Handshaking will fail if the outward buffer is too small .
* The specific size requirement depends on the configured ciphers and any
* certificate data which is sent during the handshake .
*
2019-01-31 14:20:20 +01:00
* Uncomment to set the maximum plaintext size of the outgoing I / O buffer
* independently of the incoming I / O buffer .
2016-05-25 12:56:48 +02:00
*/
//#define MBEDTLS_SSL_OUT_CONTENT_LEN 16384
2018-08-21 16:51:03 +02:00
/** \def MBEDTLS_SSL_DTLS_MAX_BUFFERING
*
* Maximum number of heap - allocated bytes for the purpose of
* DTLS handshake message reassembly and future message buffering .
*
2018-08-28 15:42:15 +02:00
* This should be at least 9 / 8 * MBEDTLSSL_IN_CONTENT_LEN
2018-08-28 10:46:44 +02:00
* to account for a reassembled handshake message of maximum size ,
* together with its reassembly bitmap .
*
2018-08-28 15:42:15 +02:00
* A value of 2 * MBEDTLS_SSL_IN_CONTENT_LEN ( 32768 by default )
2018-08-28 10:46:44 +02:00
* should be sufficient for all practical situations as it allows
* to reassembly a large handshake message ( such as a certificate )
* while buffering multiple smaller handshake messages .
*
2018-08-21 16:51:03 +02:00
*/
2018-08-24 16:07:29 +02:00
//#define MBEDTLS_SSL_DTLS_MAX_BUFFERING 32768
2018-08-21 16:51:03 +02:00
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_SSL_DEFAULT_TICKET_LIFETIME 86400 /**< Lifetime of session tickets (if enabled) */
//#define MBEDTLS_PSK_MAX_LEN 32 /**< Max size of TLS pre-shared keys, in bytes (default 256 bits) */
//#define MBEDTLS_SSL_COOKIE_TIMEOUT 60 /**< Default expiration delay of DTLS cookies, in seconds if HAVE_TIME, or in number of cookies issued */
2013-06-24 19:31:17 +02:00
2014-06-30 17:59:55 +02:00
/**
* Complete list of ciphersuites to use , in order of preference .
*
* \ warning No dependency checking is done on that field ! This option can only
* be used to restrict the set of available ciphersuites . It is your
* responsibility to make sure the needed modules are active .
*
* Use this to save a few hundred bytes of ROM ( default ordering of all
* available ciphersuites ) and a few to a few hundred bytes of RAM .
*
* The value below is only an example , not the default .
*/
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_SSL_CIPHERSUITES MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
2014-06-30 17:59:55 +02:00
2014-11-20 16:34:20 +01:00
/* X509 options */
2015-04-08 12:49:31 +02:00
//#define MBEDTLS_X509_MAX_INTERMEDIATE_CA 8 /**< Maximum number of intermediate CAs in a verification chain. */
2016-09-02 15:06:04 +02:00
//#define MBEDTLS_X509_MAX_FILE_PATH_LEN 512 /**< Maximum length of a path/filename string in bytes including the null terminator character ('\0'). */
2014-11-20 16:34:20 +01:00
2017-05-04 16:17:21 +02:00
/**
2017-05-12 13:16:40 +02:00
* Allow SHA - 1 in the default TLS configuration for certificate signing .
* Without this build - time option , SHA - 1 support must be activated explicitly
* through mbedtls_ssl_conf_cert_profile . Turning on this option is not
2017-09-25 15:53:51 +02:00
* recommended because of it is possible to generate SHA - 1 collisions , however
2017-05-12 13:16:40 +02:00
* this may be safe for legacy infrastructure where additional controls apply .
2017-09-25 15:53:51 +02:00
*
* \ warning SHA - 1 is considered a weak message digest and its use constitutes
* a security risk . If possible , we recommend avoiding dependencies
* on it , and considering stronger message digests instead .
*
2017-05-04 16:17:21 +02:00
*/
2020-03-04 21:35:27 +01:00
//#define MBEDTLS_TLS_DEFAULT_ALLOW_SHA1_IN_CERTIFICATES
2017-05-12 13:16:40 +02:00
/**
* Allow SHA - 1 in the default TLS configuration for TLS 1.2 handshake
* signature and ciphersuite selection . Without this build - time option , SHA - 1
* support must be activated explicitly through mbedtls_ssl_conf_sig_hashes .
* The use of SHA - 1 in TLS < = 1.1 and in HMAC - SHA - 1 is always allowed by
* default . At the time of writing , there is no practical attack on the use
* of SHA - 1 in handshake signatures , hence this option is turned on by default
2017-09-25 15:53:51 +02:00
* to preserve compatibility with existing peers , but the general
* warning applies nonetheless :
*
* \ warning SHA - 1 is considered a weak message digest and its use constitutes
* a security risk . If possible , we recommend avoiding dependencies
* on it , and considering stronger message digests instead .
*
2017-05-12 13:16:40 +02:00
*/
# define MBEDTLS_TLS_DEFAULT_ALLOW_SHA1_IN_KEY_EXCHANGE
2017-05-04 16:17:21 +02:00
2017-10-25 10:51:14 +02:00
/**
* Uncomment the macro to let mbed TLS use your alternate implementation of
2018-04-17 17:21:45 +02:00
* mbedtls_platform_zeroize ( ) . This replaces the default implementation in
* platform_util . c .
*
* mbedtls_platform_zeroize ( ) is a widely used function across the library to
* zero a block of memory . The implementation is expected to be secure in the
* sense that it has been written to prevent the compiler from removing calls
* to mbedtls_platform_zeroize ( ) as part of redundant code elimination
* optimizations . However , it is difficult to guarantee that calls to
* mbedtls_platform_zeroize ( ) will not be optimized by the compiler as older
* versions of the C language standards do not provide a secure implementation
* of memset ( ) . Therefore , MBEDTLS_PLATFORM_ZEROIZE_ALT enables users to
* configure their own implementation of mbedtls_platform_zeroize ( ) , for
2018-04-24 15:31:34 +02:00
* example by using directives specific to their compiler , features from newer
* C standards ( e . g using memset_s ( ) in C11 ) or calling a secure memset ( ) from
2018-04-17 17:21:45 +02:00
* their system ( e . g explicit_bzero ( ) in BSD ) .
*/
//#define MBEDTLS_PLATFORM_ZEROIZE_ALT
2017-10-25 10:51:14 +02:00
2018-08-16 22:42:09 +02:00
/**
* Uncomment the macro to let Mbed TLS use your alternate implementation of
2018-09-05 16:06:19 +02:00
* mbedtls_platform_gmtime_r ( ) . This replaces the default implementation in
2018-08-16 22:42:09 +02:00
* platform_util . c .
*
2018-09-05 17:21:36 +02:00
* gmtime ( ) is not a thread - safe function as defined in the C standard . The
2018-08-16 22:42:09 +02:00
* library will try to use safer implementations of this function , such as
* gmtime_r ( ) when available . However , if Mbed TLS cannot identify the target
2018-09-05 16:06:19 +02:00
* system , the implementation of mbedtls_platform_gmtime_r ( ) will default to
2018-08-16 22:42:09 +02:00
* using the standard gmtime ( ) . In this case , calls from the library to
* gmtime ( ) will be guarded by the global mutex mbedtls_threading_gmtime_mutex
2018-09-05 17:23:02 +02:00
* if MBEDTLS_THREADING_C is enabled . We recommend that calls from outside the
2018-08-16 22:42:09 +02:00
* library are also guarded with this mutex to avoid race conditions . However ,
2018-09-05 16:06:19 +02:00
* if the macro MBEDTLS_PLATFORM_GMTIME_R_ALT is defined , Mbed TLS will
* unconditionally use the implementation for mbedtls_platform_gmtime_r ( )
* supplied at compile time .
2018-08-16 22:42:09 +02:00
*/
2018-09-05 16:06:19 +02:00
//#define MBEDTLS_PLATFORM_GMTIME_R_ALT
2018-08-16 22:42:09 +02:00
2018-12-14 12:03:02 +01:00
/**
2019-02-15 13:49:27 +01:00
* Enable the verified implementations of ECDH primitives from Project Everest
* ( currently only Curve25519 ) . This feature changes the layout of ECDH
* contexts and therefore is a compatibility break for applications that access
* fields of a mbedtls_ecdh_context structure directly . See also
* MBEDTLS_ECDH_LEGACY_CONTEXT in include / mbedtls / ecdh . h .
2018-10-25 13:41:04 +02:00
*/
2019-01-17 13:17:54 +01:00
//#define MBEDTLS_ECDH_VARIANT_EVEREST_ENABLED
2018-10-25 13:41:04 +02:00
2016-06-08 20:00:23 +02:00
/* \} name SECTION: Customisation configuration options */
2015-07-31 15:37:29 +02:00
2018-05-02 15:49:38 +02:00
/* Target and application specific configurations
*
2015-07-31 15:52:30 +02:00
* Allow user to override any previous default .
*
*/
2018-05-02 15:49:38 +02:00
# if defined(MBEDTLS_USER_CONFIG_FILE)
2015-07-31 15:52:30 +02:00
# include MBEDTLS_USER_CONFIG_FILE
# endif
2020-09-18 06:15:13 +02:00
# include "mbedtls/config_psa.h"
2019-07-04 21:01:14 +02:00
# include "mbedtls/check_config.h"
2014-04-30 11:49:44 +02:00
2015-04-08 12:49:31 +02:00
# endif /* MBEDTLS_CONFIG_H */