2022-02-25 19:28:00 +01:00
|
|
|
/**
|
|
|
|
|
* \file config-ccm-psk-dtls1_2.h
|
|
|
|
|
*
|
|
|
|
|
* \brief Small configuration for DTLS 1.2 with PSK and AES-CCM ciphersuites
|
|
|
|
|
*/
|
|
|
|
|
/*
|
|
|
|
|
* Copyright The Mbed TLS Contributors
|
2023-11-02 19:47:20 +00:00
|
|
|
* SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
|
2022-02-25 19:28:00 +01:00
|
|
|
*/
|
|
|
|
|
/*
|
|
|
|
|
* Minimal configuration for DTLS 1.2 with PSK and AES-CCM ciphersuites
|
|
|
|
|
*
|
|
|
|
|
* Distinguishing features:
|
2022-04-05 21:52:14 +02:00
|
|
|
* - Optimized for small code size, low bandwidth (on an unreliable transport),
|
2022-02-25 19:28:00 +01:00
|
|
|
* and low RAM usage.
|
|
|
|
|
* - No asymmetric cryptography (no certificates, no Diffie-Hellman key
|
|
|
|
|
* exchange).
|
|
|
|
|
* - Fully modern and secure (provided the pre-shared keys are generated and
|
|
|
|
|
* stored securely).
|
|
|
|
|
* - Very low record overhead with CCM-8.
|
|
|
|
|
* - Includes several optional DTLS features typically used in IoT.
|
|
|
|
|
*
|
|
|
|
|
* See README.txt for usage instructions.
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
/* Mbed TLS modules */
|
|
|
|
|
#define MBEDTLS_NET_C
|
|
|
|
|
#define MBEDTLS_SSL_CLI_C
|
|
|
|
|
#define MBEDTLS_SSL_COOKIE_C
|
|
|
|
|
#define MBEDTLS_SSL_SRV_C
|
|
|
|
|
#define MBEDTLS_SSL_TLS_C
|
Have MBEDTLS_TIMING_C require MBEDTLS_HAVE_TIME
Nowadays, the timing module just builds on a function that provides a timer
with millisecond resolution. In terms of platform requirements, this is
almost exactly equivalent to `mbedtls_ms_time()`
provides (`mbedtls_ms_time()` is arguably a little stronger because it is
supposed to last longer than a single timer object, but an application could
start a timer when it starts, so there's no real difference.) So it's a bit
silly that `timing.c` essentially reimplements this. Rely on
`mbedtls_ms_time()` instead.
This is an API break because in Mbed TLS 4.0, it was possible to enable
`MBEDTLS_TIMING_C` without `MBEDTLS_HAVE_TIME`. However, `timing.c` only
provided an implementation for Windows and Unix-like platforms, and on those
platforms, it is very likely that the default implementation of
`MBEDTLS_HAVE_TIME` would also work. (The main exception would be a platform
that has the traditional Unix function `gettimeofday()`, but not the 1990s
novelty `clock_gettime()`.) So make this an official requirement, as a
belated change that really should have gone into 4.0 if we'd taken the time
to dig into it.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2026-02-19 16:26:18 +01:00
|
|
|
#define MBEDTLS_TIMING_C //Only used by test programs
|
2022-02-25 19:28:00 +01:00
|
|
|
|
|
|
|
|
/* TLS protocol feature support */
|
|
|
|
|
#define MBEDTLS_KEY_EXCHANGE_PSK_ENABLED
|
|
|
|
|
#define MBEDTLS_SSL_PROTO_TLS1_2
|
|
|
|
|
#define MBEDTLS_SSL_PROTO_DTLS
|
|
|
|
|
#define MBEDTLS_SSL_DTLS_ANTI_REPLAY
|
|
|
|
|
#define MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE
|
|
|
|
|
#define MBEDTLS_SSL_DTLS_CONNECTION_ID
|
|
|
|
|
#define MBEDTLS_SSL_DTLS_HELLO_VERIFY
|
|
|
|
|
#define MBEDTLS_SSL_MAX_FRAGMENT_LENGTH
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* Use only CCM_8 ciphersuites, and
|
|
|
|
|
* save ROM and a few bytes of RAM by specifying our own ciphersuite list
|
|
|
|
|
*/
|
|
|
|
|
#define MBEDTLS_SSL_CIPHERSUITES \
|
2023-01-11 14:50:10 +01:00
|
|
|
MBEDTLS_TLS_PSK_WITH_AES_256_CCM_8, \
|
|
|
|
|
MBEDTLS_TLS_PSK_WITH_AES_128_CCM_8
|
2022-02-25 19:28:00 +01:00
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* Save RAM at the expense of interoperability: do this only if you control
|
|
|
|
|
* both ends of the connection! (See comments in "mbedtls/ssl.h".)
|
|
|
|
|
* The optimal size here depends on the typical size of records.
|
|
|
|
|
*/
|
|
|
|
|
#define MBEDTLS_SSL_IN_CONTENT_LEN 256
|
|
|
|
|
#define MBEDTLS_SSL_OUT_CONTENT_LEN 256
|
|
|
|
|
|
|
|
|
|
/* Save some RAM by adjusting to your exact needs */
|
|
|
|
|
#define MBEDTLS_PSK_MAX_LEN 16 /* 128-bits keys are generally enough */
|
|
|
|
|
|
2022-02-25 21:00:16 +01:00
|
|
|
/* Error messages and TLS debugging traces
|
|
|
|
|
* (huge code size increase, needed for tests/ssl-opt.sh) */
|
|
|
|
|
//#define MBEDTLS_DEBUG_C
|
|
|
|
|
//#define MBEDTLS_ERROR_C
|