mirror of
https://github.com/espressif/ESP8266_RTOS_SDK.git
synced 2025-05-22 01:27:11 +08:00
feat(mbedtls): Add mbedtls menuconfig
This commit is contained in:

committed by
Zhang Jun Hao

parent
a4dbfa0cc2
commit
3693d42993
@ -16,4 +16,467 @@ config SSL_USING_WOLFSSL
|
||||
bool "wolfSSL"
|
||||
endchoice
|
||||
|
||||
menu "mbedTLS"
|
||||
depends on SSL_USING_MBEDTLS
|
||||
|
||||
config MBEDTLS_SSL_MAX_CONTENT_LEN
|
||||
int "TLS maximum message content length"
|
||||
default 16384
|
||||
range 512 16384
|
||||
help
|
||||
Maximum TLS message length (in bytes) supported by mbedTLS.
|
||||
|
||||
16384 is the default and this value is required to comply
|
||||
fully with TLS standards.
|
||||
|
||||
However you can set a lower value in order to save RAM. This
|
||||
is safe if the other end of the connection supports Maximum
|
||||
Fragment Length Negotiation Extension (max_fragment_length,
|
||||
see RFC6066) or you know for certain that it will never send a
|
||||
message longer than a certain number of bytes.
|
||||
|
||||
If the value is set too low, symptoms are a failed TLS
|
||||
handshake or a return value of MBEDTLS_ERR_SSL_INVALID_RECORD
|
||||
(-0x7200).
|
||||
|
||||
config MBEDTLS_DEBUG
|
||||
bool "Enable mbedTLS debugging"
|
||||
default n
|
||||
help
|
||||
Enable mbedTLS debugging functions at compile time.
|
||||
|
||||
If this option is enabled, you can include
|
||||
"mbedtls/esp_debug.h" and call mbedtls_esp_enable_debug_log()
|
||||
at runtime in order to enable mbedTLS debug output via the ESP
|
||||
log mechanism.
|
||||
|
||||
config MBEDTLS_HAVE_TIME
|
||||
bool "Enable mbedtls time"
|
||||
default n
|
||||
help
|
||||
System has time.h and time().
|
||||
The time does not need to be correct, only time differences are used,
|
||||
|
||||
config MBEDTLS_HAVE_TIME_DATE
|
||||
bool "Enable mbedtls time data"
|
||||
depends on MBEDTLS_HAVE_TIME
|
||||
default n
|
||||
help
|
||||
System has time.h and time(), gmtime() and the clock is correct.
|
||||
The time needs to be correct (not necesarily very accurate, but at least
|
||||
the date should be correct). This is used to verify the validity period of
|
||||
X.509 certificates.
|
||||
|
||||
It is suggested that you should get the real time by "SNTP".
|
||||
|
||||
choice MBEDTLS_TLS_MODE
|
||||
bool "TLS Protocol Role"
|
||||
default MBEDTLS_TLS_SERVER_AND_CLIENT
|
||||
help
|
||||
mbedTLS can be compiled with protocol support for the TLS
|
||||
server, TLS client, or both server and client.
|
||||
|
||||
Reducing the number of TLS roles supported saves code size.
|
||||
|
||||
config MBEDTLS_TLS_SERVER_AND_CLIENT
|
||||
bool "Server & Client"
|
||||
select MBEDTLS_TLS_SERVER
|
||||
select MBEDTLS_TLS_CLIENT
|
||||
config MBEDTLS_TLS_SERVER_ONLY
|
||||
bool "Server"
|
||||
select MBEDTLS_TLS_SERVER
|
||||
config MBEDTLS_TLS_CLIENT_ONLY
|
||||
bool "Client"
|
||||
select MBEDTLS_TLS_CLIENT
|
||||
config MBEDTLS_TLS_DISABLED
|
||||
bool "None"
|
||||
|
||||
endchoice
|
||||
|
||||
config MBEDTLS_TLS_SERVER
|
||||
bool
|
||||
select MBEDTLS_TLS_ENABLED
|
||||
config MBEDTLS_TLS_CLIENT
|
||||
bool
|
||||
select MBEDTLS_TLS_ENABLED
|
||||
config MBEDTLS_TLS_ENABLED
|
||||
bool
|
||||
|
||||
menu "TLS Key Exchange Methods"
|
||||
depends on MBEDTLS_TLS_ENABLED
|
||||
|
||||
config MBEDTLS_PSK_MODES
|
||||
bool "Enable pre-shared-key ciphersuites"
|
||||
default n
|
||||
help
|
||||
Enable to show configuration for different types of pre-shared-key TLS authentatication methods.
|
||||
|
||||
Leaving this options disabled will save code size if they are not used.
|
||||
|
||||
config MBEDTLS_KEY_EXCHANGE_PSK
|
||||
bool "Enable PSK based ciphersuite modes"
|
||||
depends on MBEDTLS_PSK_MODES
|
||||
default n
|
||||
help
|
||||
Enable to support symmetric key PSK (pre-shared-key) TLS key exchange modes.
|
||||
|
||||
config MBEDTLS_KEY_EXCHANGE_DHE_PSK
|
||||
bool "Enable DHE-PSK based ciphersuite modes"
|
||||
depends on MBEDTLS_PSK_MODES
|
||||
default n
|
||||
help
|
||||
Enable to support Diffie-Hellman PSK (pre-shared-key) TLS authentication modes.
|
||||
|
||||
config MBEDTLS_KEY_EXCHANGE_ECDHE_PSK
|
||||
bool "Enable ECDHE-PSK based ciphersuite modes"
|
||||
depends on MBEDTLS_PSK_MODES
|
||||
default n
|
||||
help
|
||||
Enable to support Elliptic-Curve-Diffie-Hellman PSK (pre-shared-key) TLS authentication modes.
|
||||
|
||||
config MBEDTLS_KEY_EXCHANGE_RSA_PSK
|
||||
bool "Enable RSA-PSK based ciphersuite modes"
|
||||
depends on MBEDTLS_PSK_MODES
|
||||
default y
|
||||
help
|
||||
Enable to support RSA PSK (pre-shared-key) TLS authentication modes.
|
||||
|
||||
config MBEDTLS_KEY_EXCHANGE_RSA
|
||||
bool "Enable RSA-only based ciphersuite modes"
|
||||
default y
|
||||
help
|
||||
Enable to support ciphersuites with prefix TLS-RSA-WITH-
|
||||
|
||||
config MBEDTLS_KEY_EXCHANGE_DHE_RSA
|
||||
bool "Enable DHE-RSA based ciphersuite modes"
|
||||
default n
|
||||
help
|
||||
Enable to support ciphersuites with prefix TLS-DHE-RSA-WITH-
|
||||
|
||||
config MBEDTLS_KEY_EXCHANGE_ELLIPTIC_CURVE
|
||||
bool "Support Elliptic Curve based ciphersuites"
|
||||
depends on MBEDTLS_ECP_C
|
||||
default n
|
||||
help
|
||||
Enable to show Elliptic Curve based ciphersuite mode options.
|
||||
|
||||
Disabling all Elliptic Curve ciphersuites saves code size and
|
||||
can give slightly faster TLS handshakes, provided the server supports
|
||||
RSA-only ciphersuite modes.
|
||||
|
||||
config MBEDTLS_KEY_EXCHANGE_ECDHE_RSA
|
||||
bool "Enable ECDHE-RSA based ciphersuite modes"
|
||||
depends on MBEDTLS_KEY_EXCHANGE_ELLIPTIC_CURVE && MBEDTLS_ECDH_C
|
||||
default n
|
||||
help
|
||||
Enable to support ciphersuites with prefix TLS-ECDHE-RSA-WITH-
|
||||
|
||||
config MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA
|
||||
bool "Enable ECDHE-ECDSA based ciphersuite modes"
|
||||
depends on MBEDTLS_KEY_EXCHANGE_ELLIPTIC_CURVE && MBEDTLS_ECDH_C && MBEDTLS_ECDSA_C
|
||||
default n
|
||||
help
|
||||
Enable to support ciphersuites with prefix TLS-ECDHE-RSA-WITH-
|
||||
|
||||
config MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA
|
||||
bool "Enable ECDH-ECDSA based ciphersuite modes"
|
||||
depends on MBEDTLS_KEY_EXCHANGE_ELLIPTIC_CURVE && MBEDTLS_ECDH_C && MBEDTLS_ECDSA_C
|
||||
default n
|
||||
help
|
||||
Enable to support ciphersuites with prefix TLS-ECDHE-RSA-WITH-
|
||||
|
||||
config MBEDTLS_KEY_EXCHANGE_ECDH_RSA
|
||||
bool "Enable ECDH-RSA based ciphersuite modes"
|
||||
depends on MBEDTLS_KEY_EXCHANGE_ELLIPTIC_CURVE && MBEDTLS_ECDH_C
|
||||
default n
|
||||
help
|
||||
Enable to support ciphersuites with prefix TLS-ECDHE-RSA-WITH-
|
||||
|
||||
endmenu # TLS key exchange modes
|
||||
|
||||
config MBEDTLS_SSL_RENEGOTIATION
|
||||
bool "Support TLS renegotiation"
|
||||
depends on MBEDTLS_TLS_ENABLED
|
||||
default n
|
||||
help
|
||||
The two main uses of renegotiation are (1) refresh keys on long-lived
|
||||
connections and (2) client authentication after the initial handshake.
|
||||
If you don't need renegotiation, disabling it will save code size and
|
||||
reduce the possibility of abuse/vulnerability.
|
||||
|
||||
config MBEDTLS_SSL_PROTO_SSL3
|
||||
bool "Legacy SSL 3.0 support"
|
||||
depends on MBEDTLS_TLS_ENABLED
|
||||
default n
|
||||
help
|
||||
Support the legacy SSL 3.0 protocol. Most servers will speak a newer
|
||||
TLS protocol these days.
|
||||
|
||||
config MBEDTLS_SSL_PROTO_TLS1
|
||||
bool "Support TLS 1.0 protocol"
|
||||
depends on MBEDTLS_TLS_ENABLED
|
||||
default y
|
||||
|
||||
config MBEDTLS_SSL_PROTO_TLS1_1
|
||||
bool "Support TLS 1.1 protocol"
|
||||
depends on MBEDTLS_TLS_ENABLED
|
||||
default y
|
||||
|
||||
config MBEDTLS_SSL_PROTO_TLS1_2
|
||||
bool "Support TLS 1.2 protocol"
|
||||
depends on MBEDTLS_TLS_ENABLED
|
||||
default y
|
||||
|
||||
config MBEDTLS_SSL_PROTO_DTLS
|
||||
bool "Support DTLS protocol (all versions)"
|
||||
default n
|
||||
depends on MBEDTLS_SSL_PROTO_TLS1_1 || MBEDTLS_SSL_PROTO_TLS1_2
|
||||
help
|
||||
Requires TLS 1.1 to be enabled for DTLS 1.0
|
||||
Requires TLS 1.2 to be enabled for DTLS 1.2
|
||||
|
||||
config MBEDTLS_SSL_ALPN
|
||||
bool "Support ALPN (Application Layer Protocol Negotiation)"
|
||||
depends on MBEDTLS_TLS_ENABLED
|
||||
default n
|
||||
help
|
||||
Disabling this option will save some code size if it is not needed.
|
||||
|
||||
config MBEDTLS_SSL_SESSION_TICKETS
|
||||
bool "TLS: Support RFC 5077 SSL session tickets"
|
||||
default n
|
||||
depends on MBEDTLS_TLS_ENABLED
|
||||
help
|
||||
Support RFC 5077 session tickets. See mbedTLS documentation for more details.
|
||||
|
||||
Disabling this option will save some code size.
|
||||
|
||||
menu "Symmetric Ciphers"
|
||||
|
||||
config MBEDTLS_AES_C
|
||||
bool "AES block cipher"
|
||||
default y
|
||||
|
||||
config MBEDTLS_CAMELLIA_C
|
||||
bool "Camellia block cipher"
|
||||
default n
|
||||
|
||||
config MBEDTLS_DES_C
|
||||
bool "DES block cipher (legacy, insecure)"
|
||||
default n
|
||||
help
|
||||
Enables the DES block cipher to support 3DES-based TLS ciphersuites.
|
||||
|
||||
3DES is vulnerable to the Sweet32 attack and should only be enabled
|
||||
if absolutely necessary.
|
||||
|
||||
choice MBEDTLS_RC4_MODE
|
||||
prompt "RC4 Stream Cipher (legacy, insecure)"
|
||||
default MBEDTLS_RC4_DISABLED
|
||||
help
|
||||
ARCFOUR (RC4) stream cipher can be disabled entirely, enabled but not
|
||||
added to default ciphersuites, or enabled completely.
|
||||
|
||||
Please consider the security implications before enabling RC4.
|
||||
|
||||
config MBEDTLS_RC4_DISABLED
|
||||
bool "Disabled"
|
||||
config MBEDTLS_RC4_ENABLED_NO_DEFAULT
|
||||
bool "Enabled, not in default ciphersuites"
|
||||
config MBEDTLS_RC4_ENABLED
|
||||
bool "Enabled"
|
||||
endchoice
|
||||
|
||||
config MBEDTLS_BLOWFISH_C
|
||||
bool "Blowfish block cipher (read help)"
|
||||
default n
|
||||
help
|
||||
Enables the Blowfish block cipher (not used for TLS sessions.)
|
||||
|
||||
The Blowfish cipher is not used for mbedTLS TLS sessions but can be
|
||||
used for other purposes. Read up on the limitations of Blowfish (including
|
||||
Sweet32) before enabling.
|
||||
|
||||
config MBEDTLS_XTEA_C
|
||||
bool "XTEA block cipher"
|
||||
default y
|
||||
help
|
||||
Enables the XTEA block cipher.
|
||||
|
||||
|
||||
config MBEDTLS_CCM_C
|
||||
bool "CCM (Counter with CBC-MAC) block cipher modes"
|
||||
default n
|
||||
depends on MBEDTLS_AES_C || MBEDTLS_CAMELLIA_C
|
||||
help
|
||||
Enable Counter with CBC-MAC (CCM) modes for AES and/or Camellia ciphers.
|
||||
|
||||
Disabling this option saves some code size.
|
||||
|
||||
config MBEDTLS_GCM_C
|
||||
bool "GCM (Galois/Counter) block cipher modes"
|
||||
default n
|
||||
depends on MBEDTLS_AES_C || MBEDTLS_CAMELLIA_C
|
||||
help
|
||||
Enable Galois/Counter Mode for AES and/or Camellia ciphers.
|
||||
|
||||
This option is generally faster than CCM.
|
||||
|
||||
endmenu # Symmetric Ciphers
|
||||
|
||||
config MBEDTLS_RIPEMD160_C
|
||||
bool "Enable RIPEMD-160 hash algorithm"
|
||||
default n
|
||||
help
|
||||
Enable the RIPEMD-160 hash algorithm.
|
||||
|
||||
menu "Certificates"
|
||||
|
||||
config MBEDTLS_PEM_PARSE_C
|
||||
bool "Read & Parse PEM formatted certificates"
|
||||
default y
|
||||
help
|
||||
Enable decoding/parsing of PEM formatted certificates.
|
||||
|
||||
If your certificates are all in the simpler DER format, disabling
|
||||
this option will save some code size.
|
||||
|
||||
config MBEDTLS_PEM_WRITE_C
|
||||
bool "Write PEM formatted certificates"
|
||||
default y
|
||||
help
|
||||
Enable writing of PEM formatted certificates.
|
||||
|
||||
If writing certificate data only in DER format, disabling this
|
||||
option will save some code size.
|
||||
|
||||
config MBEDTLS_X509_CRL_PARSE_C
|
||||
bool "X.509 CRL parsing"
|
||||
default y
|
||||
help
|
||||
Support for parsing X.509 Certifificate Revocation Lists.
|
||||
|
||||
config MBEDTLS_X509_CSR_PARSE_C
|
||||
bool "X.509 CSR parsing"
|
||||
default y
|
||||
help
|
||||
Support for parsing X.509 Certifificate Signing Requests
|
||||
|
||||
endmenu # Certificates
|
||||
|
||||
menuconfig MBEDTLS_ECP_C
|
||||
bool "Elliptic Curve Ciphers"
|
||||
default n
|
||||
|
||||
config MBEDTLS_ECDH_C
|
||||
bool "Elliptic Curve Diffie-Hellman (ECDH)"
|
||||
depends on MBEDTLS_ECP_C
|
||||
default y
|
||||
help
|
||||
Enable ECDH. Needed to use ECDHE-xxx TLS ciphersuites.
|
||||
|
||||
config MBEDTLS_ECDSA_C
|
||||
bool "Elliptic Curve DSA"
|
||||
depends on MBEDTLS_ECDH_C
|
||||
default y
|
||||
help
|
||||
Enable ECDSA. Needed to use ECDSA-xxx TLS ciphersuites.
|
||||
|
||||
config MBEDTLS_ECP_DP_SECP192R1_ENABLED
|
||||
bool "Enable SECP192R1 curve"
|
||||
depends on MBEDTLS_ECP_C
|
||||
default y
|
||||
help
|
||||
Enable support for SECP192R1 Elliptic Curve.
|
||||
|
||||
config MBEDTLS_ECP_DP_SECP224R1_ENABLED
|
||||
bool "Enable SECP224R1 curve"
|
||||
depends on MBEDTLS_ECP_C
|
||||
default y
|
||||
help
|
||||
Enable support for SECP224R1 Elliptic Curve.
|
||||
|
||||
config MBEDTLS_ECP_DP_SECP256R1_ENABLED
|
||||
bool "Enable SECP256R1 curve"
|
||||
depends on MBEDTLS_ECP_C
|
||||
default y
|
||||
help
|
||||
Enable support for SECP256R1 Elliptic Curve.
|
||||
|
||||
config MBEDTLS_ECP_DP_SECP384R1_ENABLED
|
||||
bool "Enable SECP384R1 curve"
|
||||
depends on MBEDTLS_ECP_C
|
||||
default y
|
||||
help
|
||||
Enable support for SECP384R1 Elliptic Curve.
|
||||
|
||||
config MBEDTLS_ECP_DP_SECP521R1_ENABLED
|
||||
bool "Enable SECP521R1 curve"
|
||||
depends on MBEDTLS_ECP_C
|
||||
default y
|
||||
help
|
||||
Enable support for SECP521R1 Elliptic Curve.
|
||||
|
||||
config MBEDTLS_ECP_DP_SECP192K1_ENABLED
|
||||
bool "Enable SECP192K1 curve"
|
||||
depends on MBEDTLS_ECP_C
|
||||
default y
|
||||
help
|
||||
Enable support for SECP192K1 Elliptic Curve.
|
||||
|
||||
config MBEDTLS_ECP_DP_SECP224K1_ENABLED
|
||||
bool "Enable SECP224K1 curve"
|
||||
depends on MBEDTLS_ECP_C
|
||||
default y
|
||||
help
|
||||
Enable support for SECP224K1 Elliptic Curve.
|
||||
|
||||
config MBEDTLS_ECP_DP_SECP256K1_ENABLED
|
||||
bool "Enable SECP256K1 curve"
|
||||
depends on MBEDTLS_ECP_C
|
||||
default y
|
||||
help
|
||||
Enable support for SECP256K1 Elliptic Curve.
|
||||
|
||||
config MBEDTLS_ECP_DP_BP256R1_ENABLED
|
||||
bool "Enable BP256R1 curve"
|
||||
depends on MBEDTLS_ECP_C
|
||||
default y
|
||||
help
|
||||
support for DP Elliptic Curve.
|
||||
|
||||
config MBEDTLS_ECP_DP_BP384R1_ENABLED
|
||||
bool "Enable BP384R1 curve"
|
||||
depends on MBEDTLS_ECP_C
|
||||
default y
|
||||
help
|
||||
support for DP Elliptic Curve.
|
||||
|
||||
config MBEDTLS_ECP_DP_BP512R1_ENABLED
|
||||
bool "Enable BP512R1 curve"
|
||||
depends on MBEDTLS_ECP_C
|
||||
default y
|
||||
help
|
||||
support for DP Elliptic Curve.
|
||||
|
||||
config MBEDTLS_ECP_DP_CURVE25519_ENABLED
|
||||
bool "Enable CURVE25519 curve"
|
||||
depends on MBEDTLS_ECP_C
|
||||
default y
|
||||
help
|
||||
Enable support for CURVE25519 Elliptic Curve.
|
||||
|
||||
config MBEDTLS_ECP_NIST_OPTIM
|
||||
bool "NIST 'modulo p' optimisations"
|
||||
depends on MBEDTLS_ECP_C
|
||||
default y
|
||||
help
|
||||
NIST 'modulo p' optimisations increase Elliptic Curve operation performance.
|
||||
|
||||
Disabling this option saves some code size.
|
||||
|
||||
# end of Elliptic Curve options
|
||||
|
||||
endmenu # mbedTLS
|
||||
|
||||
endmenu
|
||||
|
@ -30,6 +30,7 @@
|
||||
#define MBEDTLS_CONFIG_H
|
||||
|
||||
#include "c_types.h"
|
||||
#include "sdkconfig.h"
|
||||
|
||||
#if defined(_MSC_VER) && !defined(_CRT_SECURE_NO_DEPRECATE)
|
||||
#define _CRT_SECURE_NO_DEPRECATE 1
|
||||
@ -108,7 +109,9 @@
|
||||
*
|
||||
* Comment if your system does not support time functions
|
||||
*/
|
||||
//#define MBEDTLS_HAVE_TIME
|
||||
#ifdef CONFIG_MBEDTLS_HAVE_TIME
|
||||
#define MBEDTLS_HAVE_TIME
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_HAVE_TIME_DATE
|
||||
@ -120,7 +123,9 @@
|
||||
*
|
||||
* Comment if your system does not have a correct clock.
|
||||
*/
|
||||
//#define MBEDTLS_HAVE_TIME_DATE
|
||||
#ifdef CONFIG_MBEDTLS_HAVE_TIME_DATE
|
||||
#define MBEDTLS_HAVE_TIME_DATE
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_PLATFORM_MEMORY
|
||||
@ -556,7 +561,9 @@
|
||||
*
|
||||
* Uncomment this macro to remove RC4 ciphersuites by default.
|
||||
*/
|
||||
#ifdef CONFIG_MBEDTLS_RC4_ENABLED
|
||||
#define MBEDTLS_REMOVE_ARC4_CIPHERSUITES
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_ECP_DP_SECP192R1_ENABLED
|
||||
@ -566,18 +573,42 @@
|
||||
*
|
||||
* Comment macros to disable the curve and functions for it
|
||||
*/
|
||||
//#define MBEDTLS_ECP_DP_SECP192R1_ENABLED
|
||||
//#define MBEDTLS_ECP_DP_SECP224R1_ENABLED
|
||||
//#define MBEDTLS_ECP_DP_SECP256R1_ENABLED
|
||||
//#define MBEDTLS_ECP_DP_SECP384R1_ENABLED
|
||||
//#define MBEDTLS_ECP_DP_SECP521R1_ENABLED
|
||||
//#define MBEDTLS_ECP_DP_SECP192K1_ENABLED
|
||||
//#define MBEDTLS_ECP_DP_SECP224K1_ENABLED
|
||||
//#define MBEDTLS_ECP_DP_SECP256K1_ENABLED
|
||||
//#define MBEDTLS_ECP_DP_BP256R1_ENABLED
|
||||
//#define MBEDTLS_ECP_DP_BP384R1_ENABLED
|
||||
//#define MBEDTLS_ECP_DP_BP512R1_ENABLED
|
||||
//#define MBEDTLS_ECP_DP_CURVE25519_ENABLED
|
||||
#ifdef CONFIG_MBEDTLS_ECP_DP_SECP192R1_ENABLED
|
||||
#define MBEDTLS_ECP_DP_SECP192R1_ENABLED
|
||||
#endif
|
||||
#ifdef CONFIG_MBEDTLS_ECP_DP_SECP224R1_ENABLED
|
||||
#define MBEDTLS_ECP_DP_SECP224R1_ENABLED
|
||||
#endif
|
||||
#ifdef CONFIG_MBEDTLS_ECP_DP_SECP256R1_ENABLED
|
||||
#define MBEDTLS_ECP_DP_SECP256R1_ENABLED
|
||||
#endif
|
||||
#ifdef CONFIG_MBEDTLS_ECP_DP_SECP384R1_ENABLED
|
||||
#define MBEDTLS_ECP_DP_SECP384R1_ENABLED
|
||||
#endif
|
||||
#ifdef CONFIG_MBEDTLS_ECP_DP_SECP521R1_ENABLED
|
||||
#define MBEDTLS_ECP_DP_SECP521R1_ENABLED
|
||||
#endif
|
||||
#ifdef CONFIG_MBEDTLS_ECP_DP_SECP192K1_ENABLED
|
||||
#define MBEDTLS_ECP_DP_SECP192K1_ENABLED
|
||||
#endif
|
||||
#ifdef CONFIG_MBEDTLS_ECP_DP_SECP224K1_ENABLED
|
||||
#define MBEDTLS_ECP_DP_SECP224K1_ENABLED
|
||||
#endif
|
||||
#ifdef CONFIG_MBEDTLS_ECP_DP_SECP256K1_ENABLED
|
||||
#define MBEDTLS_ECP_DP_SECP256K1_ENABLED
|
||||
#endif
|
||||
#ifdef CONFIG_MBEDTLS_ECP_DP_BP256R1_ENABLED
|
||||
#define MBEDTLS_ECP_DP_BP256R1_ENABLED
|
||||
#endif
|
||||
#ifdef CONFIG_MBEDTLS_ECP_DP_BP384R1_ENABLED
|
||||
#define MBEDTLS_ECP_DP_BP384R1_ENABLED
|
||||
#endif
|
||||
#ifdef CONFIG_MBEDTLS_ECP_DP_BP512R1_ENABLED
|
||||
#define MBEDTLS_ECP_DP_BP512R1_ENABLED
|
||||
#endif
|
||||
#ifdef CONFIG_MBEDTLS_ECP_DP_CURVE25519_ENABLED
|
||||
#define MBEDTLS_ECP_DP_CURVE25519_ENABLED
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_ECP_NIST_OPTIM
|
||||
@ -588,7 +619,9 @@
|
||||
*
|
||||
* Comment this macro to disable NIST curves optimisation.
|
||||
*/
|
||||
//#define MBEDTLS_ECP_NIST_OPTIM
|
||||
#ifdef CONFIG_MBEDTLS_ECP_NIST_OPTIM
|
||||
#define MBEDTLS_ECP_NIST_OPTIM
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_ECDSA_DETERMINISTIC
|
||||
@ -624,7 +657,9 @@
|
||||
* MBEDTLS_TLS_PSK_WITH_3DES_EDE_CBC_SHA
|
||||
* MBEDTLS_TLS_PSK_WITH_RC4_128_SHA
|
||||
*/
|
||||
//#define MBEDTLS_KEY_EXCHANGE_PSK_ENABLED
|
||||
#ifdef CONFIG_MBEDTLS_KEY_EXCHANGE_PSK
|
||||
#define MBEDTLS_KEY_EXCHANGE_PSK_ENABLED
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED
|
||||
@ -655,7 +690,9 @@
|
||||
* See dhm.h for more details.
|
||||
*
|
||||
*/
|
||||
//#define MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED
|
||||
#ifdef CONFIG_MBEDTLS_KEY_EXCHANGE_DHE_PSK
|
||||
#define MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED
|
||||
@ -675,7 +712,9 @@
|
||||
* MBEDTLS_TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA
|
||||
* MBEDTLS_TLS_ECDHE_PSK_WITH_RC4_128_SHA
|
||||
*/
|
||||
//#define MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED
|
||||
#ifdef CONFIG_MBEDTLS_KEY_EXCHANGE_ECDHE_PSK
|
||||
#define MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED
|
||||
@ -700,7 +739,9 @@
|
||||
* MBEDTLS_TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA
|
||||
* MBEDTLS_TLS_RSA_PSK_WITH_RC4_128_SHA
|
||||
*/
|
||||
#ifdef CONFIG_MBEDTLS_KEY_EXCHANGE_RSA_PSK
|
||||
#define MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_KEY_EXCHANGE_RSA_ENABLED
|
||||
@ -728,7 +769,9 @@
|
||||
* MBEDTLS_TLS_RSA_WITH_RC4_128_SHA
|
||||
* MBEDTLS_TLS_RSA_WITH_RC4_128_MD5
|
||||
*/
|
||||
#ifdef CONFIG_MBEDTLS_KEY_EXCHANGE_RSA
|
||||
#define MBEDTLS_KEY_EXCHANGE_RSA_ENABLED
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED
|
||||
@ -761,7 +804,9 @@
|
||||
* See dhm.h for more details.
|
||||
*
|
||||
*/
|
||||
//#define MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED
|
||||
#ifdef CONFIG_MBEDTLS_KEY_EXCHANGE_DHE_RSA
|
||||
#define MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED
|
||||
@ -786,7 +831,9 @@
|
||||
* MBEDTLS_TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
|
||||
* MBEDTLS_TLS_ECDHE_RSA_WITH_RC4_128_SHA
|
||||
*/
|
||||
//#define MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED
|
||||
#ifdef CONFIG_MBEDTLS_KEY_EXCHANGE_ECDHE_RSA
|
||||
#define MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED
|
||||
@ -810,7 +857,9 @@
|
||||
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
|
||||
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
|
||||
*/
|
||||
//#define MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED
|
||||
#ifdef CONFIG_MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA
|
||||
#define MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED
|
||||
@ -834,7 +883,9 @@
|
||||
* MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256
|
||||
* MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384
|
||||
*/
|
||||
//#define MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED
|
||||
#ifdef CONFIG_MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA
|
||||
#define MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED
|
||||
@ -858,7 +909,9 @@
|
||||
* MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256
|
||||
* MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384
|
||||
*/
|
||||
//#define MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED
|
||||
#ifdef CONFIG_MBEDTLS_KEY_EXCHANGE_ECDH_RSA
|
||||
#define MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED
|
||||
@ -1146,7 +1199,9 @@
|
||||
*
|
||||
* Comment this macro to disable support for Extended Master Secret.
|
||||
*/
|
||||
//#define MBEDTLS_SSL_EXTENDED_MASTER_SECRET
|
||||
#ifdef CONFIG_MBEDTLS_TLS_ENABLED
|
||||
#define MBEDTLS_SSL_EXTENDED_MASTER_SECRET
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_SSL_FALLBACK_SCSV
|
||||
@ -1185,7 +1240,9 @@
|
||||
*
|
||||
* Comment this macro to disable 1/n-1 record splitting.
|
||||
*/
|
||||
#if defined(MBEDTLS_SSL_PROTO_SSL3) || defined(MBEDTLS_SSL_PROTO_TLS1)
|
||||
#define MBEDTLS_SSL_CBC_RECORD_SPLITTING
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_SSL_RENEGOTIATION
|
||||
@ -1207,7 +1264,9 @@
|
||||
* configuration of this extension).
|
||||
*
|
||||
*/
|
||||
//#define MBEDTLS_SSL_RENEGOTIATION
|
||||
#ifdef CONFIG_MBEDTLS_SSL_RENEGOTIATION
|
||||
#define MBEDTLS_SSL_RENEGOTIATION
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_SSL_SRV_SUPPORT_SSLV2_CLIENT_HELLO
|
||||
@ -1248,7 +1307,9 @@
|
||||
*
|
||||
* Comment this macro to disable support for SSL 3.0
|
||||
*/
|
||||
//#define MBEDTLS_SSL_PROTO_SSL3
|
||||
#ifdef CONFIG_MBEDTLS_SSL_PROTO_SSL3
|
||||
#define MBEDTLS_SSL_PROTO_SSL3
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_SSL_PROTO_TLS1
|
||||
@ -1260,7 +1321,9 @@
|
||||
*
|
||||
* Comment this macro to disable support for TLS 1.0
|
||||
*/
|
||||
#ifdef CONFIG_MBEDTLS_SSL_PROTO_TLS1
|
||||
#define MBEDTLS_SSL_PROTO_TLS1
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_SSL_PROTO_TLS1_1
|
||||
@ -1272,7 +1335,9 @@
|
||||
*
|
||||
* Comment this macro to disable support for TLS 1.1 / DTLS 1.0
|
||||
*/
|
||||
#ifdef CONFIG_MBEDTLS_SSL_PROTO_TLS1_1
|
||||
#define MBEDTLS_SSL_PROTO_TLS1_1
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_SSL_PROTO_TLS1_2
|
||||
@ -1284,7 +1349,9 @@
|
||||
*
|
||||
* Comment this macro to disable support for TLS 1.2 / DTLS 1.2
|
||||
*/
|
||||
#ifdef CONFIG_MBEDTLS_SSL_PROTO_TLS1_2
|
||||
#define MBEDTLS_SSL_PROTO_TLS1_2
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_SSL_PROTO_DTLS
|
||||
@ -1299,7 +1366,9 @@
|
||||
*
|
||||
* Comment this macro to disable support for DTLS
|
||||
*/
|
||||
//#define MBEDTLS_SSL_PROTO_DTLS
|
||||
#ifdef CONFIG_MBEDTLS_SSL_PROTO_DTLS
|
||||
#define MBEDTLS_SSL_PROTO_DTLS
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_SSL_ALPN
|
||||
@ -1308,7 +1377,9 @@
|
||||
*
|
||||
* Comment this macro to disable support for ALPN.
|
||||
*/
|
||||
//#define MBEDTLS_SSL_ALPN
|
||||
#ifdef CONFIG_MBEDTLS_SSL_ALPN
|
||||
#define MBEDTLS_SSL_ALPN
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_SSL_DTLS_ANTI_REPLAY
|
||||
@ -1323,7 +1394,9 @@
|
||||
*
|
||||
* Comment this to disable anti-replay in DTLS.
|
||||
*/
|
||||
//#define MBEDTLS_SSL_DTLS_ANTI_REPLAY
|
||||
#ifdef CONFIG_MBEDTLS_SSL_PROTO_DTLS
|
||||
#define MBEDTLS_SSL_DTLS_ANTI_REPLAY
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_SSL_DTLS_HELLO_VERIFY
|
||||
@ -1341,7 +1414,9 @@
|
||||
*
|
||||
* Comment this to disable support for HelloVerifyRequest.
|
||||
*/
|
||||
//#define MBEDTLS_SSL_DTLS_HELLO_VERIFY
|
||||
#ifdef CONFIG_MBEDTLS_SSL_PROTO_DTLS
|
||||
#define MBEDTLS_SSL_DTLS_HELLO_VERIFY
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE
|
||||
@ -1357,7 +1432,9 @@
|
||||
*
|
||||
* Comment this to disable support for clients reusing the source port.
|
||||
*/
|
||||
//#define MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE
|
||||
#ifdef CONFIG_MBEDTLS_SSL_PROTO_DTLS
|
||||
#define MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_SSL_DTLS_BADMAC_LIMIT
|
||||
@ -1368,7 +1445,9 @@
|
||||
*
|
||||
* Requires: MBEDTLS_SSL_PROTO_DTLS
|
||||
*/
|
||||
//#define MBEDTLS_SSL_DTLS_BADMAC_LIMIT
|
||||
#ifdef CONFIG_MBEDTLS_SSL_PROTO_DTLS
|
||||
#define MBEDTLS_SSL_DTLS_BADMAC_LIMIT
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_SSL_SESSION_TICKETS
|
||||
@ -1382,7 +1461,9 @@
|
||||
*
|
||||
* Comment this macro to disable support for SSL session tickets
|
||||
*/
|
||||
//#define MBEDTLS_SSL_SESSION_TICKETS
|
||||
#ifdef CONFIG_MBEDTLS_SSL_SESSION_TICKETS
|
||||
#define MBEDTLS_SSL_SESSION_TICKETS
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_SSL_EXPORT_KEYS
|
||||
@ -1652,7 +1733,9 @@
|
||||
*
|
||||
* PEM_PARSE uses AES for decrypting encrypted keys.
|
||||
*/
|
||||
#ifdef CONFIG_MBEDTLS_AES_C
|
||||
#define MBEDTLS_AES_C
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_ARC4_C
|
||||
@ -1680,7 +1763,9 @@
|
||||
* it, and considering stronger ciphers instead.
|
||||
*
|
||||
*/
|
||||
#if defined(CONFIG_MBEDTLS_RC4_ENABLED_NO_DEFAULT) || defined(CONFIG_MBEDTLS_RC4_ENABLED)
|
||||
//#define MBEDTLS_ARC4_C
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_ASN1_PARSE_C
|
||||
@ -1746,7 +1831,9 @@
|
||||
*
|
||||
* Module: library/blowfish.c
|
||||
*/
|
||||
//#define MBEDTLS_BLOWFISH_C
|
||||
#ifdef CONFIG_MBEDTLS_BLOWFISH_C
|
||||
#define MBEDTLS_BLOWFISH_C
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_CAMELLIA_C
|
||||
@ -1801,7 +1888,9 @@
|
||||
* MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256
|
||||
* MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256
|
||||
*/
|
||||
//#define MBEDTLS_CAMELLIA_C
|
||||
#ifdef CONFIG_MBEDTLS_CAMELLIA_C
|
||||
#define MBEDTLS_CAMELLIA_C
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_CCM_C
|
||||
@ -1815,7 +1904,9 @@
|
||||
* This module enables the AES-CCM ciphersuites, if other requisites are
|
||||
* enabled as well.
|
||||
*/
|
||||
//#define MBEDTLS_CCM_C
|
||||
#ifdef CONFIG_MBEDTLS_CCM_C
|
||||
#define MBEDTLS_CCM_C
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_CERTS_C
|
||||
@ -1880,7 +1971,9 @@
|
||||
*
|
||||
* This module provides debugging functions.
|
||||
*/
|
||||
#if CONFIG_MBEDTLS_DEBUG
|
||||
//#define MBEDTLS_DEBUG_C
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_DES_C
|
||||
@ -1909,7 +2002,9 @@
|
||||
* \warning DES is considered a weak cipher and its use constitutes a
|
||||
* security risk. We recommend considering stronger ciphers instead.
|
||||
*/
|
||||
//#define MBEDTLS_DES_C
|
||||
#ifdef CONFIG_MBEDTLS_DES_C
|
||||
#define MBEDTLS_DES_C
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_DHM_C
|
||||
@ -1946,7 +2041,9 @@
|
||||
*
|
||||
* Requires: MBEDTLS_ECP_C
|
||||
*/
|
||||
//#define MBEDTLS_ECDH_C
|
||||
#ifdef CONFIG_MBEDTLS_ECDH_C
|
||||
#define MBEDTLS_ECDH_C
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_ECDSA_C
|
||||
@ -1961,7 +2058,9 @@
|
||||
*
|
||||
* Requires: MBEDTLS_ECP_C, MBEDTLS_ASN1_WRITE_C, MBEDTLS_ASN1_PARSE_C
|
||||
*/
|
||||
//#define MBEDTLS_ECDSA_C
|
||||
#ifdef CONFIG_MBEDTLS_ECDSA_C
|
||||
#define MBEDTLS_ECDSA_C
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_ECJPAKE_C
|
||||
@ -1994,7 +2093,9 @@
|
||||
*
|
||||
* Requires: MBEDTLS_BIGNUM_C and at least one MBEDTLS_ECP_DP_XXX_ENABLED
|
||||
*/
|
||||
//#define MBEDTLS_ECP_C
|
||||
#ifdef CONFIG_MBEDTLS_ECP_C
|
||||
#define MBEDTLS_ECP_C
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_ENTROPY_C
|
||||
@ -2034,7 +2135,9 @@
|
||||
* This module enables the AES-GCM and CAMELLIA-GCM ciphersuites, if other
|
||||
* requisites are enabled as well.
|
||||
*/
|
||||
//#define MBEDTLS_GCM_C //764 Byte
|
||||
#ifdef CONFIG_MBEDTLS_GCM_C
|
||||
#define MBEDTLS_GCM_C
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_HAVEGE_C
|
||||
@ -2229,7 +2332,9 @@
|
||||
*
|
||||
* This modules adds support for decoding / parsing PEM files.
|
||||
*/
|
||||
#ifdef CONFIG_MBEDTLS_PEM_PARSE_C
|
||||
#define MBEDTLS_PEM_PARSE_C
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_PEM_WRITE_C
|
||||
@ -2245,7 +2350,9 @@
|
||||
*
|
||||
* This modules adds support for encoding / writing PEM files.
|
||||
*/
|
||||
#ifdef CONFIG_MBEDTLS_PEM_WRITE_C
|
||||
#define MBEDTLS_PEM_WRITE_C
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_PK_C
|
||||
@ -2365,7 +2472,9 @@
|
||||
* Caller: library/md.c
|
||||
*
|
||||
*/
|
||||
//#define MBEDTLS_RIPEMD160_C
|
||||
#ifdef CONFIG_MBEDTLS_RIPEMD160_C
|
||||
#define MBEDTLS_RIPEMD160_C
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_RSA_C
|
||||
@ -2486,7 +2595,9 @@
|
||||
*
|
||||
* This module is required for SSL/TLS client support.
|
||||
*/
|
||||
#ifdef CONFIG_MBEDTLS_TLS_CLIENT
|
||||
#define MBEDTLS_SSL_CLI_C
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_SSL_SRV_C
|
||||
@ -2500,7 +2611,9 @@
|
||||
*
|
||||
* This module is required for SSL/TLS server support.
|
||||
*/
|
||||
#ifdef CONFIG_MBEDTLS_TLS_SERVER
|
||||
#define MBEDTLS_SSL_SRV_C
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_SSL_TLS_C
|
||||
@ -2516,7 +2629,9 @@
|
||||
*
|
||||
* This module is required for SSL/TLS.
|
||||
*/
|
||||
#ifdef CONFIG_MBEDTLS_TLS_ENABLED
|
||||
#define MBEDTLS_SSL_TLS_C
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_THREADING_C
|
||||
@ -2619,7 +2734,9 @@
|
||||
*
|
||||
* This module is required for X.509 CRL parsing.
|
||||
*/
|
||||
#ifdef CONFIG_MBEDTLS_X509_CRL_PARSE_C
|
||||
#define MBEDTLS_X509_CRL_PARSE_C
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_X509_CSR_PARSE_C
|
||||
@ -2633,7 +2750,9 @@
|
||||
*
|
||||
* This module is used for reading X.509 certificate request.
|
||||
*/
|
||||
#ifdef CONFIG_MBEDTLS_X509_CSR_PARSE_C
|
||||
#define MBEDTLS_X509_CSR_PARSE_C
|
||||
#endif
|
||||
|
||||
/**
|
||||
* \def MBEDTLS_X509_CREATE_C
|
||||
@ -2682,7 +2801,9 @@
|
||||
* Module: library/xtea.c
|
||||
* Caller:
|
||||
*/
|
||||
#ifdef CONFIG_MBEDTLS_XTEA_C
|
||||
#define MBEDTLS_XTEA_C
|
||||
#endif
|
||||
|
||||
/* \} name SECTION: mbed TLS modules */
|
||||
|
||||
@ -2766,7 +2887,8 @@
|
||||
//#define MBEDTLS_SSL_CACHE_DEFAULT_MAX_ENTRIES 50 /**< Maximum entries in cache */
|
||||
|
||||
/* SSL options */
|
||||
#define MBEDTLS_SSL_MAX_CONTENT_LEN 8192 /**< Maxium fragment length in bytes, determines the size of each of the two internal I/O buffers */
|
||||
extern unsigned int max_content_len;
|
||||
#define MBEDTLS_SSL_MAX_CONTENT_LEN CONFIG_MBEDTLS_SSL_MAX_CONTENT_LEN /**< Maxium fragment length in bytes, determines the size of each of the two internal I/O buffers */
|
||||
//#define MBEDTLS_SSL_DEFAULT_TICKET_LIFETIME 86400 /**< Lifetime of session tickets (if enabled) */
|
||||
//#define MBEDTLS_PSK_MAX_LEN 32 /**< Max size of TLS pre-shared keys, in bytes (default 256 bits) */
|
||||
//#define MBEDTLS_SSL_COOKIE_TIMEOUT 60 /**< Default expiration delay of DTLS cookies, in seconds if HAVE_TIME, or in number of cookies issued */
|
||||
|
Reference in New Issue
Block a user