mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2026-03-20 11:11:08 +01:00
Nowadays, the timing module just builds on a function that provides a timer with millisecond resolution. In terms of platform requirements, this is almost exactly equivalent to `mbedtls_ms_time()` provides (`mbedtls_ms_time()` is arguably a little stronger because it is supposed to last longer than a single timer object, but an application could start a timer when it starts, so there's no real difference.) So it's a bit silly that `timing.c` essentially reimplements this. Rely on `mbedtls_ms_time()` instead. This is an API break because in Mbed TLS 4.0, it was possible to enable `MBEDTLS_TIMING_C` without `MBEDTLS_HAVE_TIME`. However, `timing.c` only provided an implementation for Windows and Unix-like platforms, and on those platforms, it is very likely that the default implementation of `MBEDTLS_HAVE_TIME` would also work. (The main exception would be a platform that has the traditional Unix function `gettimeofday()`, but not the 1990s novelty `clock_gettime()`.) So make this an official requirement, as a belated change that really should have gone into 4.0 if we'd taken the time to dig into it. Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
67 lines
2.2 KiB
C
67 lines
2.2 KiB
C
/**
|
|
* \file config-ccm-psk-dtls1_2.h
|
|
*
|
|
* \brief Small configuration for DTLS 1.2 with PSK and AES-CCM ciphersuites
|
|
*/
|
|
/*
|
|
* Copyright The Mbed TLS Contributors
|
|
* SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
|
|
*/
|
|
/*
|
|
* Minimal configuration for DTLS 1.2 with PSK and AES-CCM ciphersuites
|
|
*
|
|
* Distinguishing features:
|
|
* - Optimized for small code size, low bandwidth (on an unreliable transport),
|
|
* and low RAM usage.
|
|
* - No asymmetric cryptography (no certificates, no Diffie-Hellman key
|
|
* exchange).
|
|
* - Fully modern and secure (provided the pre-shared keys are generated and
|
|
* stored securely).
|
|
* - Very low record overhead with CCM-8.
|
|
* - Includes several optional DTLS features typically used in IoT.
|
|
*
|
|
* See README.txt for usage instructions.
|
|
*/
|
|
|
|
/* Mbed TLS modules */
|
|
#define MBEDTLS_NET_C
|
|
#define MBEDTLS_SSL_CLI_C
|
|
#define MBEDTLS_SSL_COOKIE_C
|
|
#define MBEDTLS_SSL_SRV_C
|
|
#define MBEDTLS_SSL_TLS_C
|
|
#define MBEDTLS_TIMING_C //Only used by test programs
|
|
|
|
/* TLS protocol feature support */
|
|
#define MBEDTLS_KEY_EXCHANGE_PSK_ENABLED
|
|
#define MBEDTLS_SSL_PROTO_TLS1_2
|
|
#define MBEDTLS_SSL_PROTO_DTLS
|
|
#define MBEDTLS_SSL_DTLS_ANTI_REPLAY
|
|
#define MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE
|
|
#define MBEDTLS_SSL_DTLS_CONNECTION_ID
|
|
#define MBEDTLS_SSL_DTLS_HELLO_VERIFY
|
|
#define MBEDTLS_SSL_MAX_FRAGMENT_LENGTH
|
|
|
|
/*
|
|
* Use only CCM_8 ciphersuites, and
|
|
* save ROM and a few bytes of RAM by specifying our own ciphersuite list
|
|
*/
|
|
#define MBEDTLS_SSL_CIPHERSUITES \
|
|
MBEDTLS_TLS_PSK_WITH_AES_256_CCM_8, \
|
|
MBEDTLS_TLS_PSK_WITH_AES_128_CCM_8
|
|
|
|
/*
|
|
* Save RAM at the expense of interoperability: do this only if you control
|
|
* both ends of the connection! (See comments in "mbedtls/ssl.h".)
|
|
* The optimal size here depends on the typical size of records.
|
|
*/
|
|
#define MBEDTLS_SSL_IN_CONTENT_LEN 256
|
|
#define MBEDTLS_SSL_OUT_CONTENT_LEN 256
|
|
|
|
/* Save some RAM by adjusting to your exact needs */
|
|
#define MBEDTLS_PSK_MAX_LEN 16 /* 128-bits keys are generally enough */
|
|
|
|
/* Error messages and TLS debugging traces
|
|
* (huge code size increase, needed for tests/ssl-opt.sh) */
|
|
//#define MBEDTLS_DEBUG_C
|
|
//#define MBEDTLS_ERROR_C
|