blob: 74e81894838c83bde4bb8ab8efedabceb0b62321 [file] [log] [blame]
Paul Bakker5121ce52009-01-03 21:22:43 +00001/**
2 * \file config.h
3 *
Paul Bakker37ca75d2011-01-06 12:28:03 +00004 * \brief Configuration options (set of defines)
5 *
Paul Bakkerdefc0ca2014-02-04 17:30:24 +01006 * Copyright (C) 2006-2014, Brainspark B.V.
Paul Bakkerb96f1542010-07-18 20:36:00 +00007 *
8 * This file is part of PolarSSL (http://www.polarssl.org)
Paul Bakker84f12b72010-07-18 10:13:04 +00009 * Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org>
Paul Bakkerb96f1542010-07-18 20:36:00 +000010 *
Paul Bakker77b385e2009-07-28 17:23:11 +000011 * All rights reserved.
Paul Bakkere0ccd0a2009-01-04 16:27:10 +000012 *
Paul Bakkere0ccd0a2009-01-04 16:27:10 +000013 * This program is free software; you can redistribute it and/or modify
14 * it under the terms of the GNU General Public License as published by
15 * the Free Software Foundation; either version 2 of the License, or
16 * (at your option) any later version.
17 *
18 * This program is distributed in the hope that it will be useful,
19 * but WITHOUT ANY WARRANTY; without even the implied warranty of
20 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21 * GNU General Public License for more details.
22 *
23 * You should have received a copy of the GNU General Public License along
24 * with this program; if not, write to the Free Software Foundation, Inc.,
25 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
26 *
Paul Bakker5121ce52009-01-03 21:22:43 +000027 * This set of compile-time options may be used to enable
28 * or disable features selectively, and reduce the global
29 * memory footprint.
30 */
Paul Bakker40e46942009-01-03 21:51:57 +000031#ifndef POLARSSL_CONFIG_H
32#define POLARSSL_CONFIG_H
Paul Bakker5121ce52009-01-03 21:22:43 +000033
Paul Bakkercce9d772011-11-18 14:26:47 +000034#if defined(_MSC_VER) && !defined(_CRT_SECURE_NO_DEPRECATE)
Paul Bakker5121ce52009-01-03 21:22:43 +000035#define _CRT_SECURE_NO_DEPRECATE 1
36#endif
37
Paul Bakkerf3b86c12011-01-27 15:24:17 +000038/**
Paul Bakker0a62cd12011-01-21 11:00:08 +000039 * \name SECTION: System support
40 *
41 * This section sets system specific settings.
42 * \{
43 */
44
Paul Bakkerf3b86c12011-01-27 15:24:17 +000045/**
46 * \def POLARSSL_HAVE_INT8
Paul Bakker5121ce52009-01-03 21:22:43 +000047 *
Paul Bakkerf3b86c12011-01-27 15:24:17 +000048 * The system uses 8-bit wide native integers.
49 *
50 * Uncomment if native integers are 8-bit wide.
Paul Bakker5121ce52009-01-03 21:22:43 +000051 */
Paul Bakkera7ea6a52013-10-15 11:55:10 +020052//#define POLARSSL_HAVE_INT8
Paul Bakker5121ce52009-01-03 21:22:43 +000053
Paul Bakkerf3b86c12011-01-27 15:24:17 +000054/**
55 * \def POLARSSL_HAVE_INT16
Paul Bakker5121ce52009-01-03 21:22:43 +000056 *
Paul Bakkerf3b86c12011-01-27 15:24:17 +000057 * The system uses 16-bit wide native integers.
58 *
59 * Uncomment if native integers are 16-bit wide.
Paul Bakker5121ce52009-01-03 21:22:43 +000060 */
Paul Bakkera7ea6a52013-10-15 11:55:10 +020061//#define POLARSSL_HAVE_INT16
Paul Bakker5121ce52009-01-03 21:22:43 +000062
Paul Bakkerf3b86c12011-01-27 15:24:17 +000063/**
Paul Bakker62261d62012-10-02 12:19:31 +000064 * \def POLARSSL_HAVE_LONGLONG
Paul Bakker5121ce52009-01-03 21:22:43 +000065 *
Paul Bakker62261d62012-10-02 12:19:31 +000066 * The compiler supports the 'long long' type.
67 * (Only used on 32-bit platforms)
Paul Bakker5121ce52009-01-03 21:22:43 +000068 */
Paul Bakker62261d62012-10-02 12:19:31 +000069#define POLARSSL_HAVE_LONGLONG
Paul Bakker5121ce52009-01-03 21:22:43 +000070
Paul Bakkerf3b86c12011-01-27 15:24:17 +000071/**
72 * \def POLARSSL_HAVE_ASM
73 *
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +020074 * The compiler has support for asm().
Paul Bakker68041ec2009-04-19 21:17:55 +000075 *
76 * Requires support for asm() in compiler.
77 *
78 * Used in:
79 * library/timing.c
80 * library/padlock.c
81 * include/polarssl/bn_mul.h
82 *
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +020083 * Comment to disable the use of assembly code.
Paul Bakker5121ce52009-01-03 21:22:43 +000084 */
Paul Bakker40e46942009-01-03 21:51:57 +000085#define POLARSSL_HAVE_ASM
Paul Bakker5121ce52009-01-03 21:22:43 +000086
Paul Bakkerf3b86c12011-01-27 15:24:17 +000087/**
88 * \def POLARSSL_HAVE_SSE2
89 *
Paul Bakkere23c3152012-10-01 14:42:47 +000090 * CPU supports SSE2 instruction set.
Paul Bakkerf3b86c12011-01-27 15:24:17 +000091 *
Paul Bakker5121ce52009-01-03 21:22:43 +000092 * Uncomment if the CPU supports SSE2 (IA-32 specific).
Paul Bakker5121ce52009-01-03 21:22:43 +000093 */
Paul Bakkera7ea6a52013-10-15 11:55:10 +020094//#define POLARSSL_HAVE_SSE2
Paul Bakkerfa9b1002013-07-03 15:31:03 +020095
96/**
97 * \def POLARSSL_HAVE_TIME
98 *
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +020099 * System has time.h and time() / localtime() / gettimeofday().
Paul Bakkerfa9b1002013-07-03 15:31:03 +0200100 *
101 * Comment if your system does not support time functions
102 */
103#define POLARSSL_HAVE_TIME
Manuel Pégourié-Gonnard10934de2013-12-13 12:54:09 +0100104
105/**
106 * \def POLARSSL_HAVE_IPV6
107 *
108 * System supports the basic socket interface for IPv6 (RFC 3493),
Manuel Pégourié-Gonnard767f02c2013-12-13 16:23:39 +0100109 * specifically getaddrinfo(), freeaddrinfo() and struct sockaddr_storage.
Manuel Pégourié-Gonnard10934de2013-12-13 12:54:09 +0100110 *
Manuel Pégourié-Gonnard13211352013-12-17 17:38:55 +0100111 * Note: on Windows/MingW, XP or higher is required.
112 *
Manuel Pégourié-Gonnard10934de2013-12-13 12:54:09 +0100113 * Comment if your system does not support the IPv6 socket interface
114 */
115#define POLARSSL_HAVE_IPV6
Paul Bakker747a83a2014-02-01 22:50:07 +0100116
117/**
Paul Bakkerdefc0ca2014-02-04 17:30:24 +0100118 * \def POLARSSL_PLATFORM_MEMORY
119 *
120 * Enable the memory allocation layer.
121 *
122 * By default PolarSSL uses the system-provided malloc() and free().
123 * This allows different allocators (self-implemented or provided) to be
124 * provided to the platform abstraction layer.
125 *
126 * Enabling POLARSSL_PLATFORM_MEMORY will provide "platform_set_malloc_free()"
127 * to allow you to set an alternative malloc() and free() function pointer.
128 *
129 * Requires: POLARSSL_PLATFORM_C
130 *
131 * Enable this layer to allow use of alternative memory allocators.
132 */
133//#define POLARSSL_PLATFORM_MEMORY
134
135/**
Paul Bakker747a83a2014-02-01 22:50:07 +0100136 * \def POLARSSL_PLATFORM_XXX_ALT
137 *
138 * Uncomment a macro to let PolarSSL support the function in the platform
139 * abstraction layer.
140 *
141 * Example: In case you uncomment POLARSSL_PLATFORM_PRINTF_ALT, PolarSSL will
142 * provide a function "platform_set_printf()" that allows you to set an
143 * alternative printf function pointer.
144 *
145 * All these define require POLARSSL_PLATFORM_C to be defined!
146 *
147 * Uncomment a macro to enable alternate implementation of specific base
148 * platform function
149 */
150//#define POLARSSL_PLATFORM_PRINTF_ALT
151//#define POLARSSL_PLATFORM_FPRINTF_ALT
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +0200152/* \} name SECTION: System support */
Paul Bakker0a62cd12011-01-21 11:00:08 +0000153
Paul Bakkerf3b86c12011-01-27 15:24:17 +0000154/**
Paul Bakker0a62cd12011-01-21 11:00:08 +0000155 * \name SECTION: PolarSSL feature support
156 *
157 * This section sets support for features that are or are not needed
158 * within the modules that are enabled.
159 * \{
160 */
Paul Bakker5121ce52009-01-03 21:22:43 +0000161
Paul Bakkerf3b86c12011-01-27 15:24:17 +0000162/**
Paul Bakkerf2561b32014-02-06 15:11:55 +0100163 * \def POLARSSL_TIMING_ALT
164 *
165 * Uncomment to provide your own alternate implementation for hardclock(),
166 * get_timer(), set_alarm() and m_sleep().
167 *
168 * Only works if you have POLARSSL_TIMING_C enabled.
169 *
170 * You will need to provide a header "timing_alt.h" and an implementation at
171 * compile time.
172 */
173//#define POLARSSL_TIMING_ALT
174
175/**
Paul Bakker90995b52013-06-24 19:20:35 +0200176 * \def POLARSSL_XXX_ALT
177 *
178 * Uncomment a macro to let PolarSSL use your alternate core implementation of
179 * a symmetric or hash algorithm (e.g. platform specific assembly optimized
180 * implementations). Keep in mind that the function prototypes should remain
181 * the same.
182 *
183 * Example: In case you uncomment POLARSSL_AES_ALT, PolarSSL will no longer
184 * provide the "struct aes_context" definition and omit the base function
185 * declarations and implementations. "aes_alt.h" will be included from
186 * "aes.h" to include the new function definitions.
187 *
188 * Uncomment a macro to enable alternate implementation for core algorithm
189 * functions
Paul Bakker90995b52013-06-24 19:20:35 +0200190 */
Paul Bakkera7ea6a52013-10-15 11:55:10 +0200191//#define POLARSSL_AES_ALT
192//#define POLARSSL_ARC4_ALT
193//#define POLARSSL_BLOWFISH_ALT
194//#define POLARSSL_CAMELLIA_ALT
195//#define POLARSSL_DES_ALT
196//#define POLARSSL_XTEA_ALT
197//#define POLARSSL_MD2_ALT
198//#define POLARSSL_MD4_ALT
199//#define POLARSSL_MD5_ALT
Paul Bakker9f4c1622014-01-22 14:14:26 +0100200//#define POLARSSL_RIPEMD160_ALT
Paul Bakkera7ea6a52013-10-15 11:55:10 +0200201//#define POLARSSL_SHA1_ALT
202//#define POLARSSL_SHA256_ALT
203//#define POLARSSL_SHA512_ALT
Paul Bakker90995b52013-06-24 19:20:35 +0200204
205/**
Paul Bakker15566e42011-04-24 21:19:15 +0000206 * \def POLARSSL_AES_ROM_TABLES
207 *
208 * Store the AES tables in ROM.
209 *
210 * Uncomment this macro to store the AES tables in ROM.
211 *
Paul Bakker15566e42011-04-24 21:19:15 +0000212 */
Paul Bakkera7ea6a52013-10-15 11:55:10 +0200213//#define POLARSSL_AES_ROM_TABLES
Paul Bakker15566e42011-04-24 21:19:15 +0000214
215/**
Manuel Pégourié-Gonnardf7dc3782013-09-13 14:10:44 +0200216 * \def POLARSSL_CIPHER_MODE_CBC
217 *
218 * Enable Cipher Block Chaining mode (CBC) for symmetric ciphers.
219 */
220#define POLARSSL_CIPHER_MODE_CBC
221
222/**
Paul Bakkerb6ecaf52011-04-19 14:29:23 +0000223 * \def POLARSSL_CIPHER_MODE_CFB
224 *
225 * Enable Cipher Feedback mode (CFB) for symmetric ciphers.
226 */
227#define POLARSSL_CIPHER_MODE_CFB
228
229/**
230 * \def POLARSSL_CIPHER_MODE_CTR
231 *
232 * Enable Counter Block Cipher mode (CTR) for symmetric ciphers.
233 */
234#define POLARSSL_CIPHER_MODE_CTR
235
236/**
Paul Bakkerfab5c822012-02-06 16:45:10 +0000237 * \def POLARSSL_CIPHER_NULL_CIPHER
238 *
239 * Enable NULL cipher.
240 * Warning: Only do so when you know what you are doing. This allows for
241 * encryption or channels without any security!
242 *
243 * Requires POLARSSL_ENABLE_WEAK_CIPHERSUITES as well to enable
244 * the following ciphersuites:
Manuel Pégourié-Gonnard25781b22013-12-11 16:17:10 +0100245 * TLS_ECDH_ECDSA_WITH_NULL_SHA
246 * TLS_ECDH_RSA_WITH_NULL_SHA
Manuel Pégourié-Gonnard9d703732013-10-25 18:01:50 +0200247 * TLS_ECDHE_ECDSA_WITH_NULL_SHA
Paul Bakker41c83d32013-03-20 14:39:14 +0100248 * TLS_ECDHE_RSA_WITH_NULL_SHA
Manuel Pégourié-Gonnard225d6aa2013-10-11 19:07:56 +0200249 * TLS_ECDHE_PSK_WITH_NULL_SHA384
Manuel Pégourié-Gonnard9d703732013-10-25 18:01:50 +0200250 * TLS_ECDHE_PSK_WITH_NULL_SHA256
251 * TLS_ECDHE_PSK_WITH_NULL_SHA
252 * TLS_DHE_PSK_WITH_NULL_SHA384
253 * TLS_DHE_PSK_WITH_NULL_SHA256
254 * TLS_DHE_PSK_WITH_NULL_SHA
255 * TLS_RSA_WITH_NULL_SHA256
256 * TLS_RSA_WITH_NULL_SHA
257 * TLS_RSA_WITH_NULL_MD5
258 * TLS_RSA_PSK_WITH_NULL_SHA384
259 * TLS_RSA_PSK_WITH_NULL_SHA256
260 * TLS_RSA_PSK_WITH_NULL_SHA
261 * TLS_PSK_WITH_NULL_SHA384
262 * TLS_PSK_WITH_NULL_SHA256
263 * TLS_PSK_WITH_NULL_SHA
Paul Bakkerfab5c822012-02-06 16:45:10 +0000264 *
265 * Uncomment this macro to enable the NULL cipher and ciphersuites
Manuel Pégourié-Gonnard9d703732013-10-25 18:01:50 +0200266#define POLARSSL_CIPHER_NULL_CIPHER
Paul Bakkerfab5c822012-02-06 16:45:10 +0000267 */
268
269/**
Paul Bakker48e93c82013-08-14 12:21:18 +0200270 * \def POLARSSL_CIPHER_PADDING_XXX
271 *
272 * Uncomment or comment macros to add support for specific padding modes
273 * in the cipher layer with cipher modes that support padding (e.g. CBC)
274 *
275 * If you disable all padding modes, only full blocks can be used with CBC.
276 *
277 * Enable padding modes in the cipher layer.
278 */
279#define POLARSSL_CIPHER_PADDING_PKCS7
280#define POLARSSL_CIPHER_PADDING_ONE_AND_ZEROS
281#define POLARSSL_CIPHER_PADDING_ZEROS_AND_LEN
282#define POLARSSL_CIPHER_PADDING_ZEROS
283
284/**
Paul Bakkerfab5c822012-02-06 16:45:10 +0000285 * \def POLARSSL_ENABLE_WEAK_CIPHERSUITES
286 *
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +0200287 * Enable weak ciphersuites in SSL / TLS.
Paul Bakkerfab5c822012-02-06 16:45:10 +0000288 * Warning: Only do so when you know what you are doing. This allows for
Paul Bakker9a736322012-11-14 12:39:52 +0000289 * channels with virtually no security at all!
Paul Bakkerfab5c822012-02-06 16:45:10 +0000290 *
291 * This enables the following ciphersuites:
Paul Bakker645ce3a2012-10-31 12:32:41 +0000292 * TLS_RSA_WITH_DES_CBC_SHA
293 * TLS_DHE_RSA_WITH_DES_CBC_SHA
Paul Bakkerfab5c822012-02-06 16:45:10 +0000294 *
295 * Uncomment this macro to enable weak ciphersuites
Manuel Pégourié-Gonnard9d703732013-10-25 18:01:50 +0200296#define POLARSSL_ENABLE_WEAK_CIPHERSUITES
Paul Bakkerfab5c822012-02-06 16:45:10 +0000297 */
298
299/**
Paul Bakker5dc6b5f2013-06-29 23:26:34 +0200300 * \def POLARSSL_ECP_XXXX_ENABLED
301 *
302 * Enables specific curves within the Elliptic Curve module.
Manuel Pégourié-Gonnard9d703732013-10-25 18:01:50 +0200303 * By default all supported curves are enabled.
Paul Bakker5dc6b5f2013-06-29 23:26:34 +0200304 *
305 * Comment macros to disable the curve and functions for it
306 */
307#define POLARSSL_ECP_DP_SECP192R1_ENABLED
308#define POLARSSL_ECP_DP_SECP224R1_ENABLED
309#define POLARSSL_ECP_DP_SECP256R1_ENABLED
310#define POLARSSL_ECP_DP_SECP384R1_ENABLED
311#define POLARSSL_ECP_DP_SECP521R1_ENABLED
Manuel Pégourié-Gonnardea499a72014-01-11 15:58:47 +0100312#define POLARSSL_ECP_DP_SECP192K1_ENABLED
Manuel Pégourié-Gonnard18e3ec92014-01-11 15:22:07 +0100313#define POLARSSL_ECP_DP_SECP224K1_ENABLED
Manuel Pégourié-Gonnardf51c8fc2014-01-10 18:17:18 +0100314#define POLARSSL_ECP_DP_SECP256K1_ENABLED
Manuel Pégourié-Gonnard8195c1a2013-10-07 19:40:41 +0200315#define POLARSSL_ECP_DP_BP256R1_ENABLED
316#define POLARSSL_ECP_DP_BP384R1_ENABLED
317#define POLARSSL_ECP_DP_BP512R1_ENABLED
Manuel Pégourié-Gonnard66153662013-12-03 14:12:26 +0100318//#define POLARSSL_ECP_DP_M221_ENABLED // Not implemented yet!
319#define POLARSSL_ECP_DP_M255_ENABLED
320//#define POLARSSL_ECP_DP_M383_ENABLED // Not implemented yet!
321//#define POLARSSL_ECP_DP_M511_ENABLED // Not implemented yet!
Paul Bakker5dc6b5f2013-06-29 23:26:34 +0200322
323/**
Manuel Pégourié-Gonnardc04c5302013-10-23 16:11:52 +0200324 * \def POLARSSL_ECP_NIST_OPTIM
325 *
326 * Enable specific 'modulo p' routines for each NIST prime.
327 * Depending on the prime and architecture, makes operations 4 to 8 times
328 * faster on the corresponding curve.
329 *
330 * Comment this macro to disable NIST curves optimisation.
331 */
332#define POLARSSL_ECP_NIST_OPTIM
333
334/**
Manuel Pégourié-Gonnard461d4162014-01-06 10:16:28 +0100335 * \def POLARSSL_ECDSA_DETERMINISTIC
336 *
337 * Enable deterministic ECDSA (RFC 6979).
338 * Standard ECDSA is "fragile" in the sense that lack of entropy when signing
339 * may result in a compromise of the long-term signing key. This is avoided by
340 * the deterministic variant.
341 *
Manuel Pégourié-Gonnard7845fc02014-01-27 14:24:03 +0100342 * Requires: POLARSSL_HMAC_DRBG_C
Manuel Pégourié-Gonnard5b1a5732014-01-07 16:46:17 +0100343 *
Manuel Pégourié-Gonnard461d4162014-01-06 10:16:28 +0100344 * Comment this macro to disable deterministic ECDSA.
345 */
346#define POLARSSL_ECDSA_DETERMINISTIC
347
348/**
Paul Bakkerd4a56ec2013-04-16 18:05:29 +0200349 * \def POLARSSL_KEY_EXCHANGE_PSK_ENABLED
350 *
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +0200351 * Enable the PSK based ciphersuite modes in SSL / TLS.
Paul Bakkerd4a56ec2013-04-16 18:05:29 +0200352 *
Paul Bakkere07f41d2013-04-19 09:08:57 +0200353 * This enables the following ciphersuites (if other requisites are
354 * enabled as well):
Paul Bakker45bda902013-04-19 22:28:21 +0200355 * TLS_PSK_WITH_AES_256_GCM_SHA384
Manuel Pégourié-Gonnard9d703732013-10-25 18:01:50 +0200356 * TLS_PSK_WITH_AES_256_CBC_SHA384
357 * TLS_PSK_WITH_AES_256_CBC_SHA
358 * TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384
359 * TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384
360 * TLS_PSK_WITH_AES_128_GCM_SHA256
361 * TLS_PSK_WITH_AES_128_CBC_SHA256
362 * TLS_PSK_WITH_AES_128_CBC_SHA
363 * TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256
364 * TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256
365 * TLS_PSK_WITH_3DES_EDE_CBC_SHA
366 * TLS_PSK_WITH_RC4_128_SHA
Paul Bakkerd4a56ec2013-04-16 18:05:29 +0200367 */
368#define POLARSSL_KEY_EXCHANGE_PSK_ENABLED
369
370/**
Paul Bakkere07f41d2013-04-19 09:08:57 +0200371 * \def POLARSSL_KEY_EXCHANGE_DHE_PSK_ENABLED
372 *
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +0200373 * Enable the DHE-PSK based ciphersuite modes in SSL / TLS.
Paul Bakkere07f41d2013-04-19 09:08:57 +0200374 *
375 * Requires: POLARSSL_DHM_C
376 *
377 * This enables the following ciphersuites (if other requisites are
378 * enabled as well):
Paul Bakker45bda902013-04-19 22:28:21 +0200379 * TLS_DHE_PSK_WITH_AES_256_GCM_SHA384
Manuel Pégourié-Gonnard9d703732013-10-25 18:01:50 +0200380 * TLS_DHE_PSK_WITH_AES_256_CBC_SHA384
381 * TLS_DHE_PSK_WITH_AES_256_CBC_SHA
382 * TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384
383 * TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384
384 * TLS_DHE_PSK_WITH_AES_128_GCM_SHA256
385 * TLS_DHE_PSK_WITH_AES_128_CBC_SHA256
386 * TLS_DHE_PSK_WITH_AES_128_CBC_SHA
387 * TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256
388 * TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256
389 * TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA
390 * TLS_DHE_PSK_WITH_RC4_128_SHA
Paul Bakkere07f41d2013-04-19 09:08:57 +0200391 */
Paul Bakker48f7a5d2013-04-19 14:30:58 +0200392#define POLARSSL_KEY_EXCHANGE_DHE_PSK_ENABLED
Paul Bakkere07f41d2013-04-19 09:08:57 +0200393
394/**
Manuel Pégourié-Gonnard3ce3bbd2013-10-11 16:53:50 +0200395 * \def POLARSSL_KEY_EXCHANGE_ECDHE_PSK_ENABLED
396 *
397 * Enable the ECDHE-PSK based ciphersuite modes in SSL / TLS.
398 *
399 * Requires: POLARSSL_ECDH_C
400 *
401 * This enables the following ciphersuites (if other requisites are
402 * enabled as well):
Manuel Pégourié-Gonnard225d6aa2013-10-11 19:07:56 +0200403 * TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384
Manuel Pégourié-Gonnard9d703732013-10-25 18:01:50 +0200404 * TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA
Manuel Pégourié-Gonnard225d6aa2013-10-11 19:07:56 +0200405 * TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384
Manuel Pégourié-Gonnard9d703732013-10-25 18:01:50 +0200406 * TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256
407 * TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA
408 * TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256
409 * TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA
410 * TLS_ECDHE_PSK_WITH_RC4_128_SHA
Manuel Pégourié-Gonnard3ce3bbd2013-10-11 16:53:50 +0200411 */
412#define POLARSSL_KEY_EXCHANGE_ECDHE_PSK_ENABLED
413
414/**
Paul Bakkere07f41d2013-04-19 09:08:57 +0200415 * \def POLARSSL_KEY_EXCHANGE_RSA_PSK_ENABLED
416 *
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +0200417 * Enable the RSA-PSK based ciphersuite modes in SSL / TLS.
Manuel Pégourié-Gonnard0fae60b2013-10-14 17:39:48 +0200418 *
Manuel Pégourié-Gonnard1032c1d2013-09-18 17:18:34 +0200419 * Requires: POLARSSL_RSA_C, POLARSSL_PKCS1_V15,
Manuel Pégourié-Gonnardcbf3ef32013-09-23 12:20:02 +0200420 * POLARSSL_X509_CRT_PARSE_C
Paul Bakkere07f41d2013-04-19 09:08:57 +0200421 *
422 * This enables the following ciphersuites (if other requisites are
423 * enabled as well):
Paul Bakker45bda902013-04-19 22:28:21 +0200424 * TLS_RSA_PSK_WITH_AES_256_GCM_SHA384
Manuel Pégourié-Gonnard9d703732013-10-25 18:01:50 +0200425 * TLS_RSA_PSK_WITH_AES_256_CBC_SHA384
426 * TLS_RSA_PSK_WITH_AES_256_CBC_SHA
427 * TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384
428 * TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384
429 * TLS_RSA_PSK_WITH_AES_128_GCM_SHA256
430 * TLS_RSA_PSK_WITH_AES_128_CBC_SHA256
431 * TLS_RSA_PSK_WITH_AES_128_CBC_SHA
432 * TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256
433 * TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256
434 * TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA
435 * TLS_RSA_PSK_WITH_RC4_128_SHA
Paul Bakkere07f41d2013-04-19 09:08:57 +0200436 */
Manuel Pégourié-Gonnard0fae60b2013-10-14 17:39:48 +0200437#define POLARSSL_KEY_EXCHANGE_RSA_PSK_ENABLED
Paul Bakkere07f41d2013-04-19 09:08:57 +0200438
439/**
440 * \def POLARSSL_KEY_EXCHANGE_RSA_ENABLED
441 *
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +0200442 * Enable the RSA-only based ciphersuite modes in SSL / TLS.
Paul Bakkere07f41d2013-04-19 09:08:57 +0200443 *
Manuel Pégourié-Gonnard1032c1d2013-09-18 17:18:34 +0200444 * Requires: POLARSSL_RSA_C, POLARSSL_PKCS1_V15,
Manuel Pégourié-Gonnardcbf3ef32013-09-23 12:20:02 +0200445 * POLARSSL_X509_CRT_PARSE_C
Paul Bakkere07f41d2013-04-19 09:08:57 +0200446 *
447 * This enables the following ciphersuites (if other requisites are
448 * enabled as well):
Paul Bakkere07f41d2013-04-19 09:08:57 +0200449 * TLS_RSA_WITH_AES_256_GCM_SHA384
Manuel Pégourié-Gonnard9d703732013-10-25 18:01:50 +0200450 * TLS_RSA_WITH_AES_256_CBC_SHA256
451 * TLS_RSA_WITH_AES_256_CBC_SHA
452 * TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384
Paul Bakkere07f41d2013-04-19 09:08:57 +0200453 * TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
Manuel Pégourié-Gonnard9d703732013-10-25 18:01:50 +0200454 * TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
455 * TLS_RSA_WITH_AES_128_GCM_SHA256
456 * TLS_RSA_WITH_AES_128_CBC_SHA256
457 * TLS_RSA_WITH_AES_128_CBC_SHA
458 * TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256
459 * TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
460 * TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
Paul Bakkere07f41d2013-04-19 09:08:57 +0200461 * TLS_RSA_WITH_3DES_EDE_CBC_SHA
Manuel Pégourié-Gonnard9d703732013-10-25 18:01:50 +0200462 * TLS_RSA_WITH_RC4_128_SHA
463 * TLS_RSA_WITH_RC4_128_MD5
Paul Bakkere07f41d2013-04-19 09:08:57 +0200464 */
465#define POLARSSL_KEY_EXCHANGE_RSA_ENABLED
466
467/**
468 * \def POLARSSL_KEY_EXCHANGE_DHE_RSA_ENABLED
469 *
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +0200470 * Enable the DHE-RSA based ciphersuite modes in SSL / TLS.
Paul Bakkere07f41d2013-04-19 09:08:57 +0200471 *
Manuel Pégourié-Gonnard1032c1d2013-09-18 17:18:34 +0200472 * Requires: POLARSSL_DHM_C, POLARSSL_RSA_C, POLARSSL_PKCS1_V15,
Manuel Pégourié-Gonnardcbf3ef32013-09-23 12:20:02 +0200473 * POLARSSL_X509_CRT_PARSE_C
Paul Bakkere07f41d2013-04-19 09:08:57 +0200474 *
475 * This enables the following ciphersuites (if other requisites are
476 * enabled as well):
Manuel Pégourié-Gonnard9d703732013-10-25 18:01:50 +0200477 * TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Paul Bakkere07f41d2013-04-19 09:08:57 +0200478 * TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
Manuel Pégourié-Gonnard9d703732013-10-25 18:01:50 +0200479 * TLS_DHE_RSA_WITH_AES_256_CBC_SHA
480 * TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384
Paul Bakkere07f41d2013-04-19 09:08:57 +0200481 * TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
Manuel Pégourié-Gonnard9d703732013-10-25 18:01:50 +0200482 * TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
483 * TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
484 * TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
485 * TLS_DHE_RSA_WITH_AES_128_CBC_SHA
486 * TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256
487 * TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
488 * TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
Paul Bakkere07f41d2013-04-19 09:08:57 +0200489 * TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
490 */
491#define POLARSSL_KEY_EXCHANGE_DHE_RSA_ENABLED
492
493/**
494 * \def POLARSSL_KEY_EXCHANGE_ECDHE_RSA_ENABLED
495 *
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +0200496 * Enable the ECDHE-RSA based ciphersuite modes in SSL / TLS.
Paul Bakkere07f41d2013-04-19 09:08:57 +0200497 *
Manuel Pégourié-Gonnard1032c1d2013-09-18 17:18:34 +0200498 * Requires: POLARSSL_ECDH_C, POLARSSL_RSA_C, POLARSSL_PKCS1_V15,
Manuel Pégourié-Gonnardcbf3ef32013-09-23 12:20:02 +0200499 * POLARSSL_X509_CRT_PARSE_C
Paul Bakkere07f41d2013-04-19 09:08:57 +0200500 *
501 * This enables the following ciphersuites (if other requisites are
502 * enabled as well):
Paul Bakkere07f41d2013-04-19 09:08:57 +0200503 * TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
Manuel Pégourié-Gonnard9d703732013-10-25 18:01:50 +0200504 * TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
505 * TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
506 * TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384
Paul Bakkere07f41d2013-04-19 09:08:57 +0200507 * TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
Manuel Pégourié-Gonnard9d703732013-10-25 18:01:50 +0200508 * TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
509 * TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
510 * TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
511 * TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256
512 * TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
513 * TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
514 * TLS_ECDHE_RSA_WITH_RC4_128_SHA
Paul Bakkere07f41d2013-04-19 09:08:57 +0200515 */
516#define POLARSSL_KEY_EXCHANGE_ECDHE_RSA_ENABLED
517
518/**
Manuel Pégourié-Gonnard32ea60a2013-08-17 17:39:04 +0200519 * \def POLARSSL_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED
520 *
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +0200521 * Enable the ECDHE-ECDSA based ciphersuite modes in SSL / TLS.
Manuel Pégourié-Gonnard32ea60a2013-08-17 17:39:04 +0200522 *
Manuel Pégourié-Gonnard1032c1d2013-09-18 17:18:34 +0200523 * Requires: POLARSSL_ECDH_C, POLARSSL_ECDSA_C, POLARSSL_X509_CRT_PARSE_C,
Manuel Pégourié-Gonnard32ea60a2013-08-17 17:39:04 +0200524 *
525 * This enables the following ciphersuites (if other requisites are
526 * enabled as well):
Manuel Pégourié-Gonnard9d703732013-10-25 18:01:50 +0200527 * TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
528 * TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
529 * TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
530 * TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384
531 * TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384
532 * TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
533 * TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
534 * TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
535 * TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256
536 * TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256
537 * TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
538 * TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
Manuel Pégourié-Gonnard32ea60a2013-08-17 17:39:04 +0200539 */
540#define POLARSSL_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED
541
542/**
Manuel Pégourié-Gonnard25781b22013-12-11 16:17:10 +0100543 * \def POLARSSL_KEY_EXCHANGE_ECDH_ECDSA_ENABLED
544 *
545 * Enable the ECDH-ECDSA based ciphersuite modes in SSL / TLS.
546 *
547 * Requires: POLARSSL_ECDH_C, POLARSSL_X509_CRT_PARSE_C
548 *
549 * This enables the following ciphersuites (if other requisites are
550 * enabled as well):
551 * TLS_ECDH_ECDSA_WITH_RC4_128_SHA
552 * TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
553 * TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
554 * TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
555 * TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
556 * TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
557 * TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256
558 * TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384
559 * TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256
560 * TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384
561 * TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256
562 * TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384
563 */
564#define POLARSSL_KEY_EXCHANGE_ECDH_ECDSA_ENABLED
565
566/**
567 * \def POLARSSL_KEY_EXCHANGE_ECDH_RSA_ENABLED
568 *
569 * Enable the ECDH-RSA based ciphersuite modes in SSL / TLS.
570 *
571 * Requires: POLARSSL_ECDH_C, POLARSSL_X509_CRT_PARSE_C
572 *
573 * This enables the following ciphersuites (if other requisites are
574 * enabled as well):
575 * TLS_ECDH_RSA_WITH_RC4_128_SHA
576 * TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
577 * TLS_ECDH_RSA_WITH_AES_128_CBC_SHA
578 * TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
579 * TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256
580 * TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
581 * TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256
582 * TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384
583 * TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256
584 * TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384
585 * TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256
586 * TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384
587 */
588#define POLARSSL_KEY_EXCHANGE_ECDH_RSA_ENABLED
589
590/**
Paul Bakkere2ab84f2013-06-29 18:24:32 +0200591 * \def POLARSSL_ERROR_STRERROR_BC
592 *
593 * Make available the backward compatible error_strerror() next to the
594 * current polarssl_strerror().
595 *
596 * Disable if you run into name conflicts and want to really remove the
597 * error_strerror()
598 */
599#define POLARSSL_ERROR_STRERROR_BC
600
601/**
Paul Bakker8fe40dc2013-02-02 12:43:08 +0100602 * \def POLARSSL_ERROR_STRERROR_DUMMY
603 *
Paul Bakkereba3ccf2013-09-09 15:55:12 +0200604 * Enable a dummy error function to make use of polarssl_strerror() in
Paul Bakker8fe40dc2013-02-02 12:43:08 +0100605 * third party libraries easier.
606 *
607 * Disable if you run into name conflicts and want to really remove the
Paul Bakkereba3ccf2013-09-09 15:55:12 +0200608 * polarssl_strerror()
Paul Bakker8fe40dc2013-02-02 12:43:08 +0100609 */
610#define POLARSSL_ERROR_STRERROR_DUMMY
611
612/**
Paul Bakker15566e42011-04-24 21:19:15 +0000613 * \def POLARSSL_GENPRIME
Paul Bakkerf3b86c12011-01-27 15:24:17 +0000614 *
Manuel Pégourié-Gonnardfe286462013-09-20 14:10:14 +0200615 * Enable the prime-number generation code.
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +0200616 *
Manuel Pégourié-Gonnardfe286462013-09-20 14:10:14 +0200617 * Requires: POLARSSL_BIGNUM_C
Paul Bakker5121ce52009-01-03 21:22:43 +0000618 */
Paul Bakker15566e42011-04-24 21:19:15 +0000619#define POLARSSL_GENPRIME
Paul Bakker5121ce52009-01-03 21:22:43 +0000620
Paul Bakkerf3b86c12011-01-27 15:24:17 +0000621/**
Paul Bakker335db3f2011-04-25 15:28:35 +0000622 * \def POLARSSL_FS_IO
623 *
624 * Enable functions that use the filesystem.
625 */
626#define POLARSSL_FS_IO
627
628/**
Paul Bakker43655f42011-12-15 20:11:16 +0000629 * \def POLARSSL_NO_DEFAULT_ENTROPY_SOURCES
630 *
631 * Do not add default entropy sources. These are the platform specific,
632 * hardclock and HAVEGE based poll functions.
633 *
634 * This is useful to have more control over the added entropy sources in an
635 * application.
636 *
637 * Uncomment this macro to prevent loading of default entropy functions.
Paul Bakker43655f42011-12-15 20:11:16 +0000638 */
Paul Bakkera7ea6a52013-10-15 11:55:10 +0200639//#define POLARSSL_NO_DEFAULT_ENTROPY_SOURCES
Paul Bakker43655f42011-12-15 20:11:16 +0000640
641/**
Paul Bakker6083fd22011-12-03 21:45:14 +0000642 * \def POLARSSL_NO_PLATFORM_ENTROPY
643 *
644 * Do not use built-in platform entropy functions.
645 * This is useful if your platform does not support
646 * standards like the /dev/urandom or Windows CryptoAPI.
647 *
648 * Uncomment this macro to disable the built-in platform entropy functions.
Paul Bakker6083fd22011-12-03 21:45:14 +0000649 */
Paul Bakkera7ea6a52013-10-15 11:55:10 +0200650//#define POLARSSL_NO_PLATFORM_ENTROPY
Paul Bakker6083fd22011-12-03 21:45:14 +0000651
652/**
Paul Bakker2ceda572014-02-06 15:55:25 +0100653 * \def POLARSSL_ENTROPY_FORCE_SHA256
654 *
655 * Force the entropy accumulator to use a SHA-256 accumulator instead of the
656 * default SHA-512 based one (if both are available).
657 *
658 * Requires: POLARSSL_SHA256_C
659 *
660 * On 32-bit systems SHA-256 can be much faster than SHA-512. Use this option
661 * if you have performance concerns.
662 *
663 * This option is only useful if both POLARSSL_SHA256_C and
664 * POLARSSL_SHA512_C are defined. Otherwise the available hash module is used.
665 */
666//#define POLARSSL_ENTROPY_FORCE_SHA256
667
668/**
Paul Bakker6e339b52013-07-03 13:37:05 +0200669 * \def POLARSSL_MEMORY_DEBUG
670 *
671 * Enable debugging of buffer allocator memory issues. Automatically prints
672 * (to stderr) all (fatal) messages on memory allocation issues. Enables
673 * function for 'debug output' of allocated memory.
674 *
675 * Requires: POLARSSL_MEMORY_BUFFER_ALLOC_C
Paul Bakker6e339b52013-07-03 13:37:05 +0200676 *
677 * Uncomment this macro to let the buffer allocator print out error messages.
Paul Bakkera7ea6a52013-10-15 11:55:10 +0200678 */
679//#define POLARSSL_MEMORY_DEBUG
Paul Bakker6e339b52013-07-03 13:37:05 +0200680
681/**
682 * \def POLARSSL_MEMORY_BACKTRACE
683 *
684 * Include backtrace information with each allocated block.
685 *
686 * Requires: POLARSSL_MEMORY_BUFFER_ALLOC_C
687 * GLIBC-compatible backtrace() an backtrace_symbols() support
688 *
689 * Uncomment this macro to include backtrace information
Paul Bakker6e339b52013-07-03 13:37:05 +0200690 */
Paul Bakkera7ea6a52013-10-15 11:55:10 +0200691//#define POLARSSL_MEMORY_BACKTRACE
Paul Bakker6e339b52013-07-03 13:37:05 +0200692
693/**
Paul Bakker48377d92013-08-30 12:06:24 +0200694 * \def POLARSSL_PKCS1_V15
695 *
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +0200696 * Enable support for PKCS#1 v1.5 encoding.
697 *
Paul Bakker48377d92013-08-30 12:06:24 +0200698 * Requires: POLARSSL_RSA_C
699 *
Paul Bakker48377d92013-08-30 12:06:24 +0200700 * This enables support for PKCS#1 v1.5 operations.
701 */
702#define POLARSSL_PKCS1_V15
703
704/**
Paul Bakker9dcc3222011-03-08 14:16:06 +0000705 * \def POLARSSL_PKCS1_V21
706 *
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +0200707 * Enable support for PKCS#1 v2.1 encoding.
708 *
Paul Bakker5690efc2011-05-26 13:16:06 +0000709 * Requires: POLARSSL_MD_C, POLARSSL_RSA_C
710 *
Paul Bakker9dcc3222011-03-08 14:16:06 +0000711 * This enables support for RSAES-OAEP and RSASSA-PSS operations.
712 */
713#define POLARSSL_PKCS1_V21
714
715/**
Paul Bakker0216cc12011-03-26 13:40:23 +0000716 * \def POLARSSL_RSA_NO_CRT
717 *
718 * Do not use the Chinese Remainder Theorem for the RSA private operation.
719 *
720 * Uncomment this macro to disable the use of CRT in RSA.
721 *
Paul Bakker0216cc12011-03-26 13:40:23 +0000722 */
Paul Bakkera7ea6a52013-10-15 11:55:10 +0200723//#define POLARSSL_RSA_NO_CRT
Paul Bakker15566e42011-04-24 21:19:15 +0000724
725/**
726 * \def POLARSSL_SELF_TEST
727 *
728 * Enable the checkup functions (*_self_test).
729 */
730#define POLARSSL_SELF_TEST
Paul Bakker5c721f92011-07-27 16:51:09 +0000731
732/**
Paul Bakker40865c82013-01-31 17:13:13 +0100733 * \def POLARSSL_SSL_ALL_ALERT_MESSAGES
734 *
735 * Enable sending of alert messages in case of encountered errors as per RFC.
736 * If you choose not to send the alert messages, PolarSSL can still communicate
737 * with other servers, only debugging of failures is harder.
738 *
739 * The advantage of not sending alert messages, is that no information is given
740 * about reasons for failures thus preventing adversaries of gaining intel.
741 *
742 * Enable sending of all alert messages
743 */
744#define POLARSSL_SSL_ALERT_MESSAGES
745
746/**
Paul Bakkerd66f0702013-01-31 16:57:45 +0100747 * \def POLARSSL_SSL_DEBUG_ALL
748 *
749 * Enable the debug messages in SSL module for all issues.
750 * Debug messages have been disabled in some places to prevent timing
751 * attacks due to (unbalanced) debugging function calls.
752 *
753 * If you need all error reporting you should enable this during debugging,
754 * but remove this for production servers that should log as well.
755 *
756 * Uncomment this macro to report all debug messages on errors introducing
757 * a timing side-channel.
758 *
Paul Bakkerd66f0702013-01-31 16:57:45 +0100759 */
Paul Bakkera7ea6a52013-10-15 11:55:10 +0200760//#define POLARSSL_SSL_DEBUG_ALL
Paul Bakkerd66f0702013-01-31 16:57:45 +0100761
762/**
Paul Bakker05ef8352012-05-08 09:17:57 +0000763 * \def POLARSSL_SSL_HW_RECORD_ACCEL
764 *
765 * Enable hooking functions in SSL module for hardware acceleration of
766 * individual records.
767 *
768 * Uncomment this macro to enable hooking functions.
Paul Bakker05ef8352012-05-08 09:17:57 +0000769 */
Paul Bakkera7ea6a52013-10-15 11:55:10 +0200770//#define POLARSSL_SSL_HW_RECORD_ACCEL
Paul Bakker05ef8352012-05-08 09:17:57 +0000771
772/**
Paul Bakker78a8c712013-03-06 17:01:52 +0100773 * \def POLARSSL_SSL_SRV_SUPPORT_SSLV2_CLIENT_HELLO
774 *
775 * Enable support for receiving and parsing SSLv2 Client Hello messages for the
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +0200776 * SSL Server module (POLARSSL_SSL_SRV_C).
Paul Bakker78a8c712013-03-06 17:01:52 +0100777 *
778 * Comment this macro to disable support for SSLv2 Client Hello messages.
779 */
780#define POLARSSL_SSL_SRV_SUPPORT_SSLV2_CLIENT_HELLO
781
782/**
Manuel Pégourié-Gonnard1a9f2c72013-11-30 18:30:06 +0100783 * \def POLARSSL_SSL_SRV_RESPECT_CLIENT_PREFERENCE
784 *
785 * Pick the ciphersuite according to the client's preferences rather than ours
786 * in the SSL Server module (POLARSSL_SSL_SRV_C).
787 *
788 * Uncomment this macro to respect client's ciphersuite order
789 */
790//#define POLARSSL_SSL_SRV_RESPECT_CLIENT_PREFERENCE
791
792/**
Paul Bakker05decb22013-08-15 13:33:48 +0200793 * \def POLARSSL_SSL_MAX_FRAGMENT_LENGTH
794 *
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +0200795 * Enable support for RFC 6066 max_fragment_length extension in SSL.
Paul Bakker05decb22013-08-15 13:33:48 +0200796 *
797 * Comment this macro to disable support for the max_fragment_length extension
798 */
799#define POLARSSL_SSL_MAX_FRAGMENT_LENGTH
800
801/**
Paul Bakkerd2f068e2013-08-27 21:19:20 +0200802 * \def POLARSSL_SSL_PROTO_SSL3
803 *
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +0200804 * Enable support for SSL 3.0.
Paul Bakkerd2f068e2013-08-27 21:19:20 +0200805 *
806 * Requires: POLARSSL_MD5_C
807 * POLARSSL_SHA1_C
808 *
809 * Comment this macro to disable support for SSL 3.0
810 */
811#define POLARSSL_SSL_PROTO_SSL3
812
813/**
814 * \def POLARSSL_SSL_PROTO_TLS1
815 *
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +0200816 * Enable support for TLS 1.0.
Paul Bakkerd2f068e2013-08-27 21:19:20 +0200817 *
818 * Requires: POLARSSL_MD5_C
819 * POLARSSL_SHA1_C
820 *
821 * Comment this macro to disable support for TLS 1.0
822 */
823#define POLARSSL_SSL_PROTO_TLS1
824
825/**
826 * \def POLARSSL_SSL_PROTO_TLS1_1
827 *
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +0200828 * Enable support for TLS 1.1.
Paul Bakkerd2f068e2013-08-27 21:19:20 +0200829 *
830 * Requires: POLARSSL_MD5_C
831 * POLARSSL_SHA1_C
832 *
833 * Comment this macro to disable support for TLS 1.1
834 */
835#define POLARSSL_SSL_PROTO_TLS1_1
836
837/**
838 * \def POLARSSL_SSL_PROTO_TLS1_2
839 *
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +0200840 * Enable support for TLS 1.2.
Paul Bakkerd2f068e2013-08-27 21:19:20 +0200841 *
Manuel Pégourié-Gonnard7c3291e2013-10-27 14:29:51 +0100842 * Requires: POLARSSL_SHA1_C or POLARSSL_SHA256_C or POLARSSL_SHA512_C
Paul Bakkerd2f068e2013-08-27 21:19:20 +0200843 * (Depends on ciphersuites)
844 *
845 * Comment this macro to disable support for TLS 1.2
846 */
847#define POLARSSL_SSL_PROTO_TLS1_2
848
849/**
Paul Bakkera503a632013-08-14 13:48:06 +0200850 * \def POLARSSL_SSL_SESSION_TICKETS
851 *
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +0200852 * Enable support for RFC 5077 session tickets in SSL.
Paul Bakkera503a632013-08-14 13:48:06 +0200853 *
854 * Requires: POLARSSL_AES_C
855 * POLARSSL_SHA256_C
Manuel Pégourié-Gonnard92cb1d32013-09-13 16:24:20 +0200856 * POLARSSL_CIPHER_MODE_CBC
Paul Bakkera503a632013-08-14 13:48:06 +0200857 *
858 * Comment this macro to disable support for SSL session tickets
859 */
860#define POLARSSL_SSL_SESSION_TICKETS
861
862/**
Paul Bakker0be444a2013-08-27 21:55:01 +0200863 * \def POLARSSL_SSL_SERVER_NAME_INDICATION
864 *
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +0200865 * Enable support for RFC 6066 server name indication (SNI) in SSL.
Paul Bakker0be444a2013-08-27 21:55:01 +0200866 *
867 * Comment this macro to disable support for server name indication in SSL
868 */
869#define POLARSSL_SSL_SERVER_NAME_INDICATION
870
871/**
Paul Bakker1f2bc622013-08-15 13:45:55 +0200872 * \def POLARSSL_SSL_TRUNCATED_HMAC
873 *
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +0200874 * Enable support for RFC 6066 truncated HMAC in SSL.
Paul Bakker1f2bc622013-08-15 13:45:55 +0200875 *
876 * Comment this macro to disable support for truncated HMAC in SSL
877 */
878#define POLARSSL_SSL_TRUNCATED_HMAC
879
880/**
Manuel Pégourié-Gonnardde053902014-02-04 13:58:39 +0100881 * \def POLARSSL_SSL_SET_CURVES
Manuel Pégourié-Gonnard5de25802014-02-03 15:56:49 +0100882 *
Manuel Pégourié-Gonnardde053902014-02-04 13:58:39 +0100883 * Enable ssl_set_curves().
Manuel Pégourié-Gonnard5de25802014-02-03 15:56:49 +0100884 *
885 * This is disabled by default since it breaks binary compatibility with the
886 * 1.3.x line. If you choose to enable it, you will need to rebuild your
887 * application against the new header files, relinking will not be enough.
888 * It will be enabled by default, or no longer an option, in the 1.4 branch.
889 *
Manuel Pégourié-Gonnardde053902014-02-04 13:58:39 +0100890 * Uncomment to make ssl_set_curves() available.
Manuel Pégourié-Gonnard5de25802014-02-03 15:56:49 +0100891 */
Manuel Pégourié-Gonnard79265702014-02-06 10:23:14 +0100892//#define POLARSSL_SSL_SET_CURVES
Manuel Pégourié-Gonnard5de25802014-02-03 15:56:49 +0100893
894/**
Paul Bakker2466d932013-09-28 14:40:38 +0200895 * \def POLARSSL_THREADING_ALT
896 *
897 * Provide your own alternate threading implementation.
898 *
899 * Requires: POLARSSL_THREADING_C
900 *
901 * Uncomment this to allow your own alternate threading implementation.
Paul Bakker2466d932013-09-28 14:40:38 +0200902 */
Paul Bakkera7ea6a52013-10-15 11:55:10 +0200903//#define POLARSSL_THREADING_ALT
Paul Bakker2466d932013-09-28 14:40:38 +0200904
905/**
Paul Bakker2466d932013-09-28 14:40:38 +0200906 * \def POLARSSL_THREADING_PTHREAD
907 *
908 * Enable the pthread wrapper layer for the threading layer.
909 *
910 * Requires: POLARSSL_THREADING_C
911 *
912 * Uncomment this to enable pthread mutexes.
Paul Bakker2466d932013-09-28 14:40:38 +0200913 */
Paul Bakkera7ea6a52013-10-15 11:55:10 +0200914//#define POLARSSL_THREADING_PTHREAD
Paul Bakker2466d932013-09-28 14:40:38 +0200915
916/**
Paul Bakkerc27c4e22013-09-23 15:01:36 +0200917 * \def POLARSSL_X509_ALLOW_EXTENSIONS_NON_V3
918 *
919 * If set, the X509 parser will not break-off when parsing an X509 certificate
920 * and encountering an extension in a v1 or v2 certificate.
921 *
922 * Uncomment to prevent an error.
Paul Bakkerc27c4e22013-09-23 15:01:36 +0200923 */
Paul Bakkera7ea6a52013-10-15 11:55:10 +0200924//#define POLARSSL_X509_ALLOW_EXTENSIONS_NON_V3
Paul Bakkerc27c4e22013-09-23 15:01:36 +0200925
926/**
Paul Bakker5c721f92011-07-27 16:51:09 +0000927 * \def POLARSSL_X509_ALLOW_UNSUPPORTED_CRITICAL_EXTENSION
928 *
929 * If set, the X509 parser will not break-off when parsing an X509 certificate
930 * and encountering an unknown critical extension.
931 *
932 * Uncomment to prevent an error.
Paul Bakker5c721f92011-07-27 16:51:09 +0000933 */
Paul Bakkera7ea6a52013-10-15 11:55:10 +0200934//#define POLARSSL_X509_ALLOW_UNSUPPORTED_CRITICAL_EXTENSION
Paul Bakker2770fbd2012-07-03 13:30:23 +0000935
936/**
937 * \def POLARSSL_ZLIB_SUPPORT
938 *
939 * If set, the SSL/TLS module uses ZLIB to support compression and
940 * decompression of packet data.
941 *
Manuel Pégourié-Gonnardbb4dd372014-03-11 10:30:38 +0100942 * \warning TLS-level compression MAY REDUCE SECURITY! See for example the
943 * CRIME attack. Before enabling this option, you should examine with care if
944 * CRIME or similar exploits may be a applicable to your use case.
945 *
Paul Bakker2770fbd2012-07-03 13:30:23 +0000946 * Used in: library/ssl_tls.c
947 * library/ssl_cli.c
948 * library/ssl_srv.c
949 *
950 * This feature requires zlib library and headers to be present.
951 *
952 * Uncomment to enable use of ZLIB
Paul Bakker2770fbd2012-07-03 13:30:23 +0000953 */
Paul Bakkera7ea6a52013-10-15 11:55:10 +0200954//#define POLARSSL_ZLIB_SUPPORT
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +0200955/* \} name SECTION: PolarSSL feature support */
Paul Bakker0a62cd12011-01-21 11:00:08 +0000956
Paul Bakkerf3b86c12011-01-27 15:24:17 +0000957/**
Paul Bakker0a62cd12011-01-21 11:00:08 +0000958 * \name SECTION: PolarSSL modules
959 *
960 * This section enables or disables entire modules in PolarSSL
961 * \{
962 */
Paul Bakker5121ce52009-01-03 21:22:43 +0000963
Paul Bakkerf3b86c12011-01-27 15:24:17 +0000964/**
Manuel Pégourié-Gonnard92ac76f2013-12-16 17:12:53 +0100965 * \def POLARSSL_AESNI_C
966 *
967 * Enable AES-NI support on x86-64.
968 *
969 * Module: library/aesni.c
970 * Caller: library/aes.c
971 *
972 * Requires: POLARSSL_HAVE_ASM
973 *
974 * This modules adds support for the AES-NI instructions on x86-64
975 */
976#define POLARSSL_AESNI_C
977
978/**
Paul Bakkerf3b86c12011-01-27 15:24:17 +0000979 * \def POLARSSL_AES_C
980 *
981 * Enable the AES block cipher.
982 *
Paul Bakker5121ce52009-01-03 21:22:43 +0000983 * Module: library/aes.c
984 * Caller: library/ssl_tls.c
Paul Bakker96743fc2011-02-12 14:30:57 +0000985 * library/pem.c
Paul Bakker6083fd22011-12-03 21:45:14 +0000986 * library/ctr_drbg.c
Paul Bakker5121ce52009-01-03 21:22:43 +0000987 *
Paul Bakker645ce3a2012-10-31 12:32:41 +0000988 * This module enables the following ciphersuites (if other requisites are
989 * enabled as well):
Manuel Pégourié-Gonnard25781b22013-12-11 16:17:10 +0100990 * TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
991 * TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
992 * TLS_ECDH_RSA_WITH_AES_128_CBC_SHA
993 * TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
994 * TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
995 * TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
996 * TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256
997 * TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
998 * TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256
999 * TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384
1000 * TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256
1001 * TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384
Manuel Pégourié-Gonnard9d703732013-10-25 18:01:50 +02001002 * TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
1003 * TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
1004 * TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
1005 * TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
1006 * TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
Paul Bakker645ce3a2012-10-31 12:32:41 +00001007 * TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
Manuel Pégourié-Gonnard9d703732013-10-25 18:01:50 +02001008 * TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
Paul Bakker41c83d32013-03-20 14:39:14 +01001009 * TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
Manuel Pégourié-Gonnard9d703732013-10-25 18:01:50 +02001010 * TLS_DHE_RSA_WITH_AES_256_CBC_SHA
1011 * TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
1012 * TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
1013 * TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
1014 * TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
1015 * TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
1016 * TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
1017 * TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
1018 * TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
1019 * TLS_DHE_RSA_WITH_AES_128_CBC_SHA
1020 * TLS_DHE_PSK_WITH_AES_256_GCM_SHA384
1021 * TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384
1022 * TLS_DHE_PSK_WITH_AES_256_CBC_SHA384
1023 * TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA
1024 * TLS_DHE_PSK_WITH_AES_256_CBC_SHA
1025 * TLS_DHE_PSK_WITH_AES_128_GCM_SHA256
1026 * TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256
1027 * TLS_DHE_PSK_WITH_AES_128_CBC_SHA256
1028 * TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA
1029 * TLS_DHE_PSK_WITH_AES_128_CBC_SHA
1030 * TLS_RSA_WITH_AES_256_GCM_SHA384
1031 * TLS_RSA_WITH_AES_256_CBC_SHA256
1032 * TLS_RSA_WITH_AES_256_CBC_SHA
1033 * TLS_RSA_WITH_AES_128_GCM_SHA256
1034 * TLS_RSA_WITH_AES_128_CBC_SHA256
1035 * TLS_RSA_WITH_AES_128_CBC_SHA
1036 * TLS_RSA_PSK_WITH_AES_256_GCM_SHA384
1037 * TLS_RSA_PSK_WITH_AES_256_CBC_SHA384
1038 * TLS_RSA_PSK_WITH_AES_256_CBC_SHA
1039 * TLS_RSA_PSK_WITH_AES_128_GCM_SHA256
1040 * TLS_RSA_PSK_WITH_AES_128_CBC_SHA256
1041 * TLS_RSA_PSK_WITH_AES_128_CBC_SHA
1042 * TLS_PSK_WITH_AES_256_GCM_SHA384
1043 * TLS_PSK_WITH_AES_256_CBC_SHA384
Paul Bakkerd4a56ec2013-04-16 18:05:29 +02001044 * TLS_PSK_WITH_AES_256_CBC_SHA
Manuel Pégourié-Gonnard9d703732013-10-25 18:01:50 +02001045 * TLS_PSK_WITH_AES_128_GCM_SHA256
1046 * TLS_PSK_WITH_AES_128_CBC_SHA256
1047 * TLS_PSK_WITH_AES_128_CBC_SHA
Paul Bakker6deb37e2013-02-19 13:17:08 +01001048 *
Paul Bakkercff68422013-09-15 20:43:33 +02001049 * PEM_PARSE uses AES for decrypting encrypted keys.
Paul Bakker5121ce52009-01-03 21:22:43 +00001050 */
Paul Bakker40e46942009-01-03 21:51:57 +00001051#define POLARSSL_AES_C
Paul Bakker5121ce52009-01-03 21:22:43 +00001052
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001053/**
1054 * \def POLARSSL_ARC4_C
1055 *
1056 * Enable the ARCFOUR stream cipher.
1057 *
Paul Bakker5121ce52009-01-03 21:22:43 +00001058 * Module: library/arc4.c
1059 * Caller: library/ssl_tls.c
1060 *
Paul Bakker41c83d32013-03-20 14:39:14 +01001061 * This module enables the following ciphersuites (if other requisites are
1062 * enabled as well):
Manuel Pégourié-Gonnard25781b22013-12-11 16:17:10 +01001063 * TLS_ECDH_ECDSA_WITH_RC4_128_SHA
1064 * TLS_ECDH_RSA_WITH_RC4_128_SHA
Manuel Pégourié-Gonnard9d703732013-10-25 18:01:50 +02001065 * TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
Paul Bakker41c83d32013-03-20 14:39:14 +01001066 * TLS_ECDHE_RSA_WITH_RC4_128_SHA
Manuel Pégourié-Gonnard9d703732013-10-25 18:01:50 +02001067 * TLS_ECDHE_PSK_WITH_RC4_128_SHA
1068 * TLS_DHE_PSK_WITH_RC4_128_SHA
1069 * TLS_RSA_WITH_RC4_128_SHA
1070 * TLS_RSA_WITH_RC4_128_MD5
1071 * TLS_RSA_PSK_WITH_RC4_128_SHA
Paul Bakkerd4a56ec2013-04-16 18:05:29 +02001072 * TLS_PSK_WITH_RC4_128_SHA
Paul Bakker5121ce52009-01-03 21:22:43 +00001073 */
Paul Bakker40e46942009-01-03 21:51:57 +00001074#define POLARSSL_ARC4_C
Paul Bakker5121ce52009-01-03 21:22:43 +00001075
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001076/**
Paul Bakkerefc30292011-11-10 14:43:23 +00001077 * \def POLARSSL_ASN1_PARSE_C
1078 *
1079 * Enable the generic ASN1 parser.
1080 *
1081 * Module: library/asn1.c
Manuel Pégourié-Gonnardfe286462013-09-20 14:10:14 +02001082 * Caller: library/x509.c
1083 * library/dhm.c
1084 * library/pkcs12.c
1085 * library/pkcs5.c
1086 * library/pkparse.c
Paul Bakkerefc30292011-11-10 14:43:23 +00001087 */
1088#define POLARSSL_ASN1_PARSE_C
1089
1090/**
Paul Bakkerbdb912d2012-02-13 23:11:30 +00001091 * \def POLARSSL_ASN1_WRITE_C
1092 *
1093 * Enable the generic ASN1 writer.
1094 *
1095 * Module: library/asn1write.c
Manuel Pégourié-Gonnardfe286462013-09-20 14:10:14 +02001096 * Caller: library/ecdsa.c
1097 * library/pkwrite.c
1098 * library/x509_create.c
1099 * library/x509write_crt.c
1100 * library/x509write_csr.c
Paul Bakkerbdb912d2012-02-13 23:11:30 +00001101 */
1102#define POLARSSL_ASN1_WRITE_C
1103
1104/**
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001105 * \def POLARSSL_BASE64_C
1106 *
1107 * Enable the Base64 module.
1108 *
Paul Bakker5121ce52009-01-03 21:22:43 +00001109 * Module: library/base64.c
Paul Bakker5690efc2011-05-26 13:16:06 +00001110 * Caller: library/pem.c
Paul Bakker5121ce52009-01-03 21:22:43 +00001111 *
Paul Bakker5690efc2011-05-26 13:16:06 +00001112 * This module is required for PEM support (required by X.509).
Paul Bakker5121ce52009-01-03 21:22:43 +00001113 */
Paul Bakker40e46942009-01-03 21:51:57 +00001114#define POLARSSL_BASE64_C
Paul Bakker5121ce52009-01-03 21:22:43 +00001115
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001116/**
1117 * \def POLARSSL_BIGNUM_C
1118 *
Paul Bakker9a736322012-11-14 12:39:52 +00001119 * Enable the multi-precision integer library.
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001120 *
Paul Bakker5121ce52009-01-03 21:22:43 +00001121 * Module: library/bignum.c
1122 * Caller: library/dhm.c
Manuel Pégourié-Gonnardfe286462013-09-20 14:10:14 +02001123 * library/ecp.c
Paul Bakker5121ce52009-01-03 21:22:43 +00001124 * library/rsa.c
1125 * library/ssl_tls.c
Paul Bakker5121ce52009-01-03 21:22:43 +00001126 *
1127 * This module is required for RSA and DHM support.
1128 */
Paul Bakker40e46942009-01-03 21:51:57 +00001129#define POLARSSL_BIGNUM_C
Paul Bakker5121ce52009-01-03 21:22:43 +00001130
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001131/**
Paul Bakkera9379c02012-07-04 11:02:11 +00001132 * \def POLARSSL_BLOWFISH_C
1133 *
1134 * Enable the Blowfish block cipher.
1135 *
1136 * Module: library/blowfish.c
1137 */
1138#define POLARSSL_BLOWFISH_C
1139
1140/**
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001141 * \def POLARSSL_CAMELLIA_C
1142 *
1143 * Enable the Camellia block cipher.
1144 *
Paul Bakker38119b12009-01-10 23:31:23 +00001145 * Module: library/camellia.c
Paul Bakker13e2dfe2009-07-28 07:18:38 +00001146 * Caller: library/ssl_tls.c
Paul Bakker38119b12009-01-10 23:31:23 +00001147 *
Paul Bakker645ce3a2012-10-31 12:32:41 +00001148 * This module enables the following ciphersuites (if other requisites are
1149 * enabled as well):
Manuel Pégourié-Gonnard25781b22013-12-11 16:17:10 +01001150 * TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256
1151 * TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384
1152 * TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256
1153 * TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384
1154 * TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256
1155 * TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384
1156 * TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256
1157 * TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384
Manuel Pégourié-Gonnard9d703732013-10-25 18:01:50 +02001158 * TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384
1159 * TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384
1160 * TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384
1161 * TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384
1162 * TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
Paul Bakker645ce3a2012-10-31 12:32:41 +00001163 * TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
Manuel Pégourié-Gonnard9d703732013-10-25 18:01:50 +02001164 * TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
1165 * TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256
1166 * TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256
1167 * TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256
1168 * TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256
1169 * TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
1170 * TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
1171 * TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
1172 * TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384
1173 * TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384
1174 * TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384
1175 * TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256
1176 * TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256
1177 * TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256
1178 * TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384
1179 * TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
1180 * TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
1181 * TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256
1182 * TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
1183 * TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
1184 * TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384
1185 * TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384
1186 * TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256
1187 * TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256
1188 * TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384
1189 * TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384
1190 * TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256
1191 * TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256
Paul Bakker38119b12009-01-10 23:31:23 +00001192 */
1193#define POLARSSL_CAMELLIA_C
1194
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001195/**
1196 * \def POLARSSL_CERTS_C
1197 *
1198 * Enable the test certificates.
1199 *
Paul Bakker5121ce52009-01-03 21:22:43 +00001200 * Module: library/certs.c
1201 * Caller:
1202 *
Manuel Pégourié-Gonnard18dc0e22013-10-27 14:35:02 +01001203 * Requires: POLARSSL_PEM_PARSE_C
1204 *
Paul Bakker5121ce52009-01-03 21:22:43 +00001205 * This module is used for testing (ssl_client/server).
1206 */
Paul Bakker40e46942009-01-03 21:51:57 +00001207#define POLARSSL_CERTS_C
Paul Bakker5121ce52009-01-03 21:22:43 +00001208
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001209/**
1210 * \def POLARSSL_CIPHER_C
1211 *
1212 * Enable the generic cipher layer.
1213 *
Paul Bakker8123e9d2011-01-06 15:37:30 +00001214 * Module: library/cipher.c
Paul Bakker04784f52013-08-19 13:30:57 +02001215 * Caller: library/ssl_tls.c
Paul Bakker8123e9d2011-01-06 15:37:30 +00001216 *
1217 * Uncomment to enable generic cipher wrappers.
1218 */
1219#define POLARSSL_CIPHER_C
1220
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001221/**
Paul Bakker0e04d0e2011-11-27 14:46:59 +00001222 * \def POLARSSL_CTR_DRBG_C
1223 *
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +02001224 * Enable the CTR_DRBG AES-256-based random generator.
Paul Bakker0e04d0e2011-11-27 14:46:59 +00001225 *
1226 * Module: library/ctr_drbg.c
1227 * Caller:
1228 *
Paul Bakker6083fd22011-12-03 21:45:14 +00001229 * Requires: POLARSSL_AES_C
1230 *
Paul Bakker0e04d0e2011-11-27 14:46:59 +00001231 * This module provides the CTR_DRBG AES-256 random number generator.
1232 */
1233#define POLARSSL_CTR_DRBG_C
1234
1235/**
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001236 * \def POLARSSL_DEBUG_C
1237 *
1238 * Enable the debug functions.
1239 *
Paul Bakker5121ce52009-01-03 21:22:43 +00001240 * Module: library/debug.c
1241 * Caller: library/ssl_cli.c
1242 * library/ssl_srv.c
1243 * library/ssl_tls.c
1244 *
1245 * This module provides debugging functions.
1246 */
Paul Bakker40e46942009-01-03 21:51:57 +00001247#define POLARSSL_DEBUG_C
Paul Bakker5121ce52009-01-03 21:22:43 +00001248
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001249/**
1250 * \def POLARSSL_DES_C
1251 *
1252 * Enable the DES block cipher.
1253 *
Paul Bakker5121ce52009-01-03 21:22:43 +00001254 * Module: library/des.c
Paul Bakker6deb37e2013-02-19 13:17:08 +01001255 * Caller: library/pem.c
1256 * library/ssl_tls.c
Paul Bakker5121ce52009-01-03 21:22:43 +00001257 *
Paul Bakker645ce3a2012-10-31 12:32:41 +00001258 * This module enables the following ciphersuites (if other requisites are
1259 * enabled as well):
Manuel Pégourié-Gonnard25781b22013-12-11 16:17:10 +01001260 * TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
1261 * TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
Manuel Pégourié-Gonnard9d703732013-10-25 18:01:50 +02001262 * TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
Paul Bakker41c83d32013-03-20 14:39:14 +01001263 * TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
Manuel Pégourié-Gonnard9d703732013-10-25 18:01:50 +02001264 * TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
1265 * TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA
1266 * TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA
1267 * TLS_RSA_WITH_3DES_EDE_CBC_SHA
1268 * TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA
Paul Bakkerd4a56ec2013-04-16 18:05:29 +02001269 * TLS_PSK_WITH_3DES_EDE_CBC_SHA
Paul Bakker6deb37e2013-02-19 13:17:08 +01001270 *
Paul Bakkercff68422013-09-15 20:43:33 +02001271 * PEM_PARSE uses DES/3DES for decrypting encrypted keys.
Paul Bakker5121ce52009-01-03 21:22:43 +00001272 */
Paul Bakker40e46942009-01-03 21:51:57 +00001273#define POLARSSL_DES_C
Paul Bakker5121ce52009-01-03 21:22:43 +00001274
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001275/**
1276 * \def POLARSSL_DHM_C
1277 *
Manuel Pégourié-Gonnard9d703732013-10-25 18:01:50 +02001278 * Enable the Diffie-Hellman-Merkle module.
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001279 *
Paul Bakker5121ce52009-01-03 21:22:43 +00001280 * Module: library/dhm.c
1281 * Caller: library/ssl_cli.c
1282 * library/ssl_srv.c
1283 *
Manuel Pégourié-Gonnard9d703732013-10-25 18:01:50 +02001284 * This module is used by the following key exchanges:
1285 * DHE-RSA, DHE-PSK
Paul Bakker5121ce52009-01-03 21:22:43 +00001286 */
Paul Bakker40e46942009-01-03 21:51:57 +00001287#define POLARSSL_DHM_C
Paul Bakker5121ce52009-01-03 21:22:43 +00001288
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001289/**
Paul Bakkerd589a0d2013-03-13 16:30:17 +01001290 * \def POLARSSL_ECDH_C
1291 *
1292 * Enable the elliptic curve Diffie-Hellman library.
1293 *
1294 * Module: library/ecdh.c
Paul Bakker41c83d32013-03-20 14:39:14 +01001295 * Caller: library/ssl_cli.c
1296 * library/ssl_srv.c
1297 *
Manuel Pégourié-Gonnard9d703732013-10-25 18:01:50 +02001298 * This module is used by the following key exchanges:
1299 * ECDHE-ECDSA, ECDHE-RSA, DHE-PSK
Paul Bakkerd589a0d2013-03-13 16:30:17 +01001300 *
1301 * Requires: POLARSSL_ECP_C
1302 */
1303#define POLARSSL_ECDH_C
1304
1305/**
1306 * \def POLARSSL_ECDSA_C
1307 *
1308 * Enable the elliptic curve DSA library.
1309 *
1310 * Module: library/ecdsa.c
1311 * Caller:
1312 *
Manuel Pégourié-Gonnard9d703732013-10-25 18:01:50 +02001313 * This module is used by the following key exchanges:
1314 * ECDHE-ECDSA
1315 *
Manuel Pégourié-Gonnard4846f5e2013-08-08 14:36:15 +02001316 * Requires: POLARSSL_ECP_C, POLARSSL_ASN1_WRITE_C, POLARSSL_ASN1_PARSE_C
Paul Bakkerd589a0d2013-03-13 16:30:17 +01001317 */
1318#define POLARSSL_ECDSA_C
1319
1320/**
1321 * \def POLARSSL_ECP_C
1322 *
1323 * Enable the elliptic curve over GF(p) library.
1324 *
1325 * Module: library/ecp.c
1326 * Caller: library/ecdh.c
1327 * library/ecdsa.c
1328 *
Manuel Pégourié-Gonnardb8012fc2013-10-10 15:40:49 +02001329 * Requires: POLARSSL_BIGNUM_C and at least one POLARSSL_ECP_DP_XXX_ENABLED
Paul Bakkerd589a0d2013-03-13 16:30:17 +01001330 */
1331#define POLARSSL_ECP_C
1332
1333/**
Paul Bakker6083fd22011-12-03 21:45:14 +00001334 * \def POLARSSL_ENTROPY_C
1335 *
1336 * Enable the platform-specific entropy code.
1337 *
1338 * Module: library/entropy.c
1339 * Caller:
1340 *
Paul Bakker2ceda572014-02-06 15:55:25 +01001341 * Requires: POLARSSL_SHA512_C or POLARSSL_SHA256_C
Paul Bakker6083fd22011-12-03 21:45:14 +00001342 *
1343 * This module provides a generic entropy pool
1344 */
1345#define POLARSSL_ENTROPY_C
1346
1347/**
Paul Bakker9d781402011-05-09 16:17:09 +00001348 * \def POLARSSL_ERROR_C
1349 *
1350 * Enable error code to error string conversion.
1351 *
1352 * Module: library/error.c
1353 * Caller:
1354 *
1355 * This module enables err_strerror().
1356 */
1357#define POLARSSL_ERROR_C
1358
1359/**
Paul Bakker89e80c92012-03-20 13:50:09 +00001360 * \def POLARSSL_GCM_C
1361 *
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +02001362 * Enable the Galois/Counter Mode (GCM) for AES.
Paul Bakker89e80c92012-03-20 13:50:09 +00001363 *
1364 * Module: library/gcm.c
1365 *
Manuel Pégourié-Gonnard7bd8a992013-10-24 13:39:39 +02001366 * Requires: POLARSSL_AES_C or POLARSSL_CAMELLIA_C
Paul Bakker645ce3a2012-10-31 12:32:41 +00001367 *
Manuel Pégourié-Gonnard9d703732013-10-25 18:01:50 +02001368 * This module enables the AES-GCM and CAMELLIA-GCM ciphersuites, if other
1369 * requisites are enabled as well.
Paul Bakker89e80c92012-03-20 13:50:09 +00001370 */
1371#define POLARSSL_GCM_C
1372
1373/**
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001374 * \def POLARSSL_HAVEGE_C
1375 *
1376 * Enable the HAVEGE random generator.
1377 *
Paul Bakker2a844242013-06-24 13:01:53 +02001378 * Warning: the HAVEGE random generator is not suitable for virtualized
1379 * environments
1380 *
1381 * Warning: the HAVEGE random generator is dependent on timing and specific
1382 * processor traits. It is therefore not advised to use HAVEGE as
1383 * your applications primary random generator or primary entropy pool
1384 * input. As a secondary input to your entropy pool, it IS able add
1385 * the (limited) extra entropy it provides.
1386 *
Paul Bakker5121ce52009-01-03 21:22:43 +00001387 * Module: library/havege.c
1388 * Caller:
1389 *
Paul Bakker5690efc2011-05-26 13:16:06 +00001390 * Requires: POLARSSL_TIMING_C
1391 *
Paul Bakker2a844242013-06-24 13:01:53 +02001392 * Uncomment to enable the HAVEGE random generator.
Paul Bakker2a844242013-06-24 13:01:53 +02001393 */
Paul Bakkera7ea6a52013-10-15 11:55:10 +02001394//#define POLARSSL_HAVEGE_C
Paul Bakker5121ce52009-01-03 21:22:43 +00001395
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001396/**
Manuel Pégourié-Gonnard490bdf32014-01-27 14:03:10 +01001397 * \def POLARSSL_HMAC_DRBG_C
1398 *
1399 * Enable the HMAC_DRBG random generator.
1400 *
1401 * Module: library/hmac_drbg.c
1402 * Caller:
1403 *
1404 * Requires: POLARSSL_MD_C
1405 *
1406 * Uncomment to enable the HMAC_DRBG random number geerator.
1407 */
1408#define POLARSSL_HMAC_DRBG_C
1409
1410/**
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001411 * \def POLARSSL_MD_C
1412 *
1413 * Enable the generic message digest layer.
1414 *
Paul Bakker17373852011-01-06 14:20:01 +00001415 * Module: library/md.c
1416 * Caller:
1417 *
1418 * Uncomment to enable generic message digest wrappers.
1419 */
1420#define POLARSSL_MD_C
1421
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001422/**
1423 * \def POLARSSL_MD2_C
1424 *
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +02001425 * Enable the MD2 hash algorithm.
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001426 *
Paul Bakker5121ce52009-01-03 21:22:43 +00001427 * Module: library/md2.c
Manuel Pégourié-Gonnardfe286462013-09-20 14:10:14 +02001428 * Caller:
Paul Bakker5121ce52009-01-03 21:22:43 +00001429 *
1430 * Uncomment to enable support for (rare) MD2-signed X.509 certs.
Paul Bakker6506aff2009-07-28 20:52:02 +00001431 */
Paul Bakkera7ea6a52013-10-15 11:55:10 +02001432//#define POLARSSL_MD2_C
Paul Bakker5121ce52009-01-03 21:22:43 +00001433
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001434/**
1435 * \def POLARSSL_MD4_C
1436 *
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +02001437 * Enable the MD4 hash algorithm.
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001438 *
Paul Bakker5121ce52009-01-03 21:22:43 +00001439 * Module: library/md4.c
Manuel Pégourié-Gonnardfe286462013-09-20 14:10:14 +02001440 * Caller:
Paul Bakker5121ce52009-01-03 21:22:43 +00001441 *
1442 * Uncomment to enable support for (rare) MD4-signed X.509 certs.
Paul Bakker6506aff2009-07-28 20:52:02 +00001443 */
Paul Bakkera7ea6a52013-10-15 11:55:10 +02001444//#define POLARSSL_MD4_C
Paul Bakker5121ce52009-01-03 21:22:43 +00001445
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001446/**
1447 * \def POLARSSL_MD5_C
1448 *
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +02001449 * Enable the MD5 hash algorithm.
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001450 *
Paul Bakker5121ce52009-01-03 21:22:43 +00001451 * Module: library/md5.c
Manuel Pégourié-Gonnardfe286462013-09-20 14:10:14 +02001452 * Caller: library/md.c
1453 * library/pem.c
Paul Bakker6deb37e2013-02-19 13:17:08 +01001454 * library/ssl_tls.c
Paul Bakker5121ce52009-01-03 21:22:43 +00001455 *
1456 * This module is required for SSL/TLS and X.509.
Paul Bakkercff68422013-09-15 20:43:33 +02001457 * PEM_PARSE uses MD5 for decrypting encrypted keys.
Paul Bakker5121ce52009-01-03 21:22:43 +00001458 */
Paul Bakker40e46942009-01-03 21:51:57 +00001459#define POLARSSL_MD5_C
Paul Bakker5121ce52009-01-03 21:22:43 +00001460
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001461/**
Paul Bakker6e339b52013-07-03 13:37:05 +02001462 * \def POLARSSL_MEMORY_C
Paul Bakkerdefc0ca2014-02-04 17:30:24 +01001463 * Deprecated since 1.3.5. Please use POLARSSL_PLATFORM_MEMORY instead.
Paul Bakker6e339b52013-07-03 13:37:05 +02001464 */
Paul Bakkera7ea6a52013-10-15 11:55:10 +02001465//#define POLARSSL_MEMORY_C
Paul Bakker6e339b52013-07-03 13:37:05 +02001466
1467/**
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +02001468 * \def POLARSSL_MEMORY_BUFFER_ALLOC_C
1469 *
1470 * Enable the buffer allocator implementation that makes use of a (stack)
1471 * based buffer to 'allocate' dynamic memory. (replaces malloc() and free()
1472 * calls)
Paul Bakker6e339b52013-07-03 13:37:05 +02001473 *
1474 * Module: library/memory_buffer_alloc.c
1475 *
Paul Bakkerdefc0ca2014-02-04 17:30:24 +01001476 * Requires: POLARSSL_PLATFORM_C
1477 * POLARSSL_PLATFORM_MEMORY (to use it within PolarSSL)
Paul Bakker6e339b52013-07-03 13:37:05 +02001478 *
1479 * Enable this module to enable the buffer memory allocator.
Paul Bakker6e339b52013-07-03 13:37:05 +02001480 */
Paul Bakkera7ea6a52013-10-15 11:55:10 +02001481//#define POLARSSL_MEMORY_BUFFER_ALLOC_C
Paul Bakker6e339b52013-07-03 13:37:05 +02001482
1483/**
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001484 * \def POLARSSL_NET_C
1485 *
1486 * Enable the TCP/IP networking routines.
1487 *
Paul Bakker5121ce52009-01-03 21:22:43 +00001488 * Module: library/net.c
Paul Bakker5121ce52009-01-03 21:22:43 +00001489 *
1490 * This module provides TCP/IP networking routines.
1491 */
Paul Bakker40e46942009-01-03 21:51:57 +00001492#define POLARSSL_NET_C
Paul Bakker5121ce52009-01-03 21:22:43 +00001493
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001494/**
Paul Bakkerc70b9822013-04-07 22:00:46 +02001495 * \def POLARSSL_OID_C
1496 *
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +02001497 * Enable the OID database.
Paul Bakkerc70b9822013-04-07 22:00:46 +02001498 *
1499 * Module: library/oid.c
Manuel Pégourié-Gonnardfe286462013-09-20 14:10:14 +02001500 * Caller: library/asn1write.c
1501 * library/pkcs5.c
1502 * library/pkparse.c
1503 * library/pkwrite.c
1504 * library/rsa.c
1505 * library/x509.c
1506 * library/x509_create.c
1507 * library/x509_crl.c
1508 * library/x509_crt.c
1509 * library/x509_csr.c
1510 * library/x509write_crt.c
1511 * library/x509write_csr.c
Paul Bakkerc70b9822013-04-07 22:00:46 +02001512 *
1513 * This modules translates between OIDs and internal values.
1514 */
1515#define POLARSSL_OID_C
1516
1517/**
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001518 * \def POLARSSL_PADLOCK_C
1519 *
1520 * Enable VIA Padlock support on x86.
1521 *
Paul Bakker5121ce52009-01-03 21:22:43 +00001522 * Module: library/padlock.c
1523 * Caller: library/aes.c
1524 *
Manuel Pégourié-Gonnard92ac76f2013-12-16 17:12:53 +01001525 * Requires: POLARSSL_HAVE_ASM
1526 *
Paul Bakker5121ce52009-01-03 21:22:43 +00001527 * This modules adds support for the VIA PadLock on x86.
1528 */
Paul Bakker40e46942009-01-03 21:51:57 +00001529#define POLARSSL_PADLOCK_C
Paul Bakker5121ce52009-01-03 21:22:43 +00001530
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001531/**
Paul Bakkerf518b162012-08-23 13:03:18 +00001532 * \def POLARSSL_PBKDF2_C
1533 *
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +02001534 * Enable PKCS#5 PBKDF2 key derivation function.
Paul Bakkerb0c19a42013-06-24 19:26:38 +02001535 * DEPRECATED: Use POLARSSL_PKCS5_C instead
Paul Bakkerf518b162012-08-23 13:03:18 +00001536 *
1537 * Module: library/pbkdf2.c
1538 *
Paul Bakkerb0c19a42013-06-24 19:26:38 +02001539 * Requires: POLARSSL_PKCS5_C
Paul Bakkerf518b162012-08-23 13:03:18 +00001540 *
1541 * This module adds support for the PKCS#5 PBKDF2 key derivation function.
Paul Bakkerf518b162012-08-23 13:03:18 +00001542 */
Paul Bakker370e90c2013-04-08 15:19:43 +02001543#define POLARSSL_PBKDF2_C
Paul Bakkerf518b162012-08-23 13:03:18 +00001544
1545/**
Paul Bakkercff68422013-09-15 20:43:33 +02001546 * \def POLARSSL_PEM_PARSE_C
Paul Bakker96743fc2011-02-12 14:30:57 +00001547 *
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +02001548 * Enable PEM decoding / parsing.
Paul Bakker96743fc2011-02-12 14:30:57 +00001549 *
1550 * Module: library/pem.c
Manuel Pégourié-Gonnardfe286462013-09-20 14:10:14 +02001551 * Caller: library/dhm.c
Paul Bakkercff68422013-09-15 20:43:33 +02001552 * library/pkparse.c
Manuel Pégourié-Gonnardfe286462013-09-20 14:10:14 +02001553 * library/x509_crl.c
1554 * library/x509_crt.c
1555 * library/x509_csr.c
Paul Bakker96743fc2011-02-12 14:30:57 +00001556 *
Paul Bakker5690efc2011-05-26 13:16:06 +00001557 * Requires: POLARSSL_BASE64_C
1558 *
Paul Bakkercff68422013-09-15 20:43:33 +02001559 * This modules adds support for decoding / parsing PEM files.
Paul Bakker96743fc2011-02-12 14:30:57 +00001560 */
Paul Bakkercff68422013-09-15 20:43:33 +02001561#define POLARSSL_PEM_PARSE_C
1562
1563/**
1564 * \def POLARSSL_PEM_WRITE_C
1565 *
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +02001566 * Enable PEM encoding / writing.
Paul Bakkercff68422013-09-15 20:43:33 +02001567 *
1568 * Module: library/pem.c
Manuel Pégourié-Gonnardfe286462013-09-20 14:10:14 +02001569 * Caller: library/pkwrite.c
1570 * library/x509write_crt.c
1571 * library/x509write_csr.c
Paul Bakkercff68422013-09-15 20:43:33 +02001572 *
1573 * Requires: POLARSSL_BASE64_C
1574 *
1575 * This modules adds support for encoding / writing PEM files.
1576 */
1577#define POLARSSL_PEM_WRITE_C
Paul Bakker96743fc2011-02-12 14:30:57 +00001578
1579/**
Manuel Pégourié-Gonnardc40b4c32013-08-22 13:29:31 +02001580 * \def POLARSSL_PK_C
1581 *
1582 * Enable the generic public (asymetric) key layer.
1583 *
1584 * Module: library/pk.c
Manuel Pégourié-Gonnard1a483832013-09-20 12:29:15 +02001585 * Caller: library/ssl_tls.c
Manuel Pégourié-Gonnardc40b4c32013-08-22 13:29:31 +02001586 * library/ssl_cli.c
1587 * library/ssl_srv.c
1588 *
Manuel Pégourié-Gonnard1a483832013-09-20 12:29:15 +02001589 * Requires: POLARSSL_RSA_C or POLARSSL_ECP_C
1590 *
Manuel Pégourié-Gonnardc40b4c32013-08-22 13:29:31 +02001591 * Uncomment to enable generic public key wrappers.
1592 */
1593#define POLARSSL_PK_C
1594
1595/**
Paul Bakker4606c732013-09-15 17:04:23 +02001596 * \def POLARSSL_PK_PARSE_C
1597 *
1598 * Enable the generic public (asymetric) key parser.
1599 *
1600 * Module: library/pkparse.c
Manuel Pégourié-Gonnardfe286462013-09-20 14:10:14 +02001601 * Caller: library/x509_crt.c
1602 * library/x509_csr.c
Paul Bakker4606c732013-09-15 17:04:23 +02001603 *
1604 * Requires: POLARSSL_PK_C
1605 *
1606 * Uncomment to enable generic public key parse functions.
1607 */
1608#define POLARSSL_PK_PARSE_C
1609
1610/**
1611 * \def POLARSSL_PK_WRITE_C
1612 *
Paul Bakkerf20ba4b2013-09-16 22:46:20 +02001613 * Enable the generic public (asymetric) key writer.
Paul Bakker4606c732013-09-15 17:04:23 +02001614 *
1615 * Module: library/pkwrite.c
1616 * Caller: library/x509write.c
1617 *
1618 * Requires: POLARSSL_PK_C
1619 *
1620 * Uncomment to enable generic public key write functions.
1621 */
1622#define POLARSSL_PK_WRITE_C
1623
1624/**
Paul Bakkerb0c19a42013-06-24 19:26:38 +02001625 * \def POLARSSL_PKCS5_C
1626 *
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +02001627 * Enable PKCS#5 functions.
Paul Bakkerb0c19a42013-06-24 19:26:38 +02001628 *
1629 * Module: library/pkcs5.c
1630 *
1631 * Requires: POLARSSL_MD_C
1632 *
1633 * This module adds support for the PKCS#5 functions.
1634 */
1635#define POLARSSL_PKCS5_C
1636
1637/**
Paul Bakker5690efc2011-05-26 13:16:06 +00001638 * \def POLARSSL_PKCS11_C
1639 *
Paul Bakkereb2c6582012-09-27 19:15:01 +00001640 * Enable wrapper for PKCS#11 smartcard support.
Paul Bakker5690efc2011-05-26 13:16:06 +00001641 *
Manuel Pégourié-Gonnard51be5592013-08-22 13:35:53 +02001642 * Module: library/pkcs11.c
1643 * Caller: library/pk.c
Paul Bakker5690efc2011-05-26 13:16:06 +00001644 *
Manuel Pégourié-Gonnard51be5592013-08-22 13:35:53 +02001645 * Requires: POLARSSL_PK_C
Paul Bakker5690efc2011-05-26 13:16:06 +00001646 *
Paul Bakkereb2c6582012-09-27 19:15:01 +00001647 * This module enables SSL/TLS PKCS #11 smartcard support.
Paul Bakker5690efc2011-05-26 13:16:06 +00001648 * Requires the presence of the PKCS#11 helper library (libpkcs11-helper)
Paul Bakker5690efc2011-05-26 13:16:06 +00001649 */
Paul Bakkera7ea6a52013-10-15 11:55:10 +02001650//#define POLARSSL_PKCS11_C
Paul Bakker5690efc2011-05-26 13:16:06 +00001651
1652/**
Paul Bakkerf1f21fe2013-06-24 19:17:19 +02001653 * \def POLARSSL_PKCS12_C
1654 *
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +02001655 * Enable PKCS#12 PBE functions.
Paul Bakkerf1f21fe2013-06-24 19:17:19 +02001656 * Adds algorithms for parsing PKCS#8 encrypted private keys
1657 *
1658 * Module: library/pkcs12.c
Manuel Pégourié-Gonnardfe286462013-09-20 14:10:14 +02001659 * Caller: library/pkparse.c
Paul Bakkerf1f21fe2013-06-24 19:17:19 +02001660 *
Paul Bakkerb0713c72013-06-24 19:34:08 +02001661 * Requires: POLARSSL_ASN1_PARSE_C, POLARSSL_CIPHER_C, POLARSSL_MD_C
1662 * Can use: POLARSSL_ARC4_C
Paul Bakkerf1f21fe2013-06-24 19:17:19 +02001663 *
1664 * This module enables PKCS#12 functions.
1665 */
1666#define POLARSSL_PKCS12_C
1667
1668/**
Paul Bakker747a83a2014-02-01 22:50:07 +01001669 * \def POLARSSL_PLATFORM_C
1670 *
1671 * Enable the platform abstraction layer that allows you to re-assign
1672 * functions like malloc(), free(), printf(), fprintf()
1673 *
1674 * Module: library/platform.c
1675 * Caller: Most other .c files
1676 *
1677 * This module enables abstraction of common (libc) functions.
1678 */
1679#define POLARSSL_PLATFORM_C
1680
1681/**
Paul Bakker61b699e2014-01-22 13:35:29 +01001682 * \def POLARSSL_RIPEMD160_C
Manuel Pégourié-Gonnardcab4a882014-01-17 12:42:35 +01001683 *
1684 * Enable the RIPEMD-160 hash algorithm.
1685 *
Paul Bakker61b699e2014-01-22 13:35:29 +01001686 * Module: library/ripemd160.c
Manuel Pégourié-Gonnardcab4a882014-01-17 12:42:35 +01001687 * Caller: library/md.c
1688 *
1689 */
Paul Bakker61b699e2014-01-22 13:35:29 +01001690#define POLARSSL_RIPEMD160_C
Manuel Pégourié-Gonnardcab4a882014-01-17 12:42:35 +01001691
1692/**
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001693 * \def POLARSSL_RSA_C
1694 *
1695 * Enable the RSA public-key cryptosystem.
1696 *
Paul Bakker5121ce52009-01-03 21:22:43 +00001697 * Module: library/rsa.c
1698 * Caller: library/ssl_cli.c
1699 * library/ssl_srv.c
1700 * library/ssl_tls.c
1701 * library/x509.c
1702 *
Manuel Pégourié-Gonnard9d703732013-10-25 18:01:50 +02001703 * This module is used by the following key exchanges:
1704 * RSA, DHE-RSA, ECDHE-RSA, RSA-PSK
Paul Bakker5690efc2011-05-26 13:16:06 +00001705 *
Manuel Pégourié-Gonnard9d703732013-10-25 18:01:50 +02001706 * Requires: POLARSSL_BIGNUM_C, POLARSSL_OID_C
Paul Bakker5121ce52009-01-03 21:22:43 +00001707 */
Paul Bakker40e46942009-01-03 21:51:57 +00001708#define POLARSSL_RSA_C
Paul Bakker5121ce52009-01-03 21:22:43 +00001709
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001710/**
1711 * \def POLARSSL_SHA1_C
1712 *
1713 * Enable the SHA1 cryptographic hash algorithm.
1714 *
Paul Bakker5121ce52009-01-03 21:22:43 +00001715 * Module: library/sha1.c
Manuel Pégourié-Gonnardfe286462013-09-20 14:10:14 +02001716 * Caller: library/md.c
1717 * library/ssl_cli.c
Paul Bakker5121ce52009-01-03 21:22:43 +00001718 * library/ssl_srv.c
1719 * library/ssl_tls.c
Manuel Pégourié-Gonnardfe286462013-09-20 14:10:14 +02001720 * library/x509write_crt.c
Paul Bakker5121ce52009-01-03 21:22:43 +00001721 *
1722 * This module is required for SSL/TLS and SHA1-signed certificates.
1723 */
Paul Bakker40e46942009-01-03 21:51:57 +00001724#define POLARSSL_SHA1_C
Paul Bakker5121ce52009-01-03 21:22:43 +00001725
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001726/**
Paul Bakker9e36f042013-06-30 14:34:05 +02001727 * \def POLARSSL_SHA256_C
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001728 *
1729 * Enable the SHA-224 and SHA-256 cryptographic hash algorithms.
Paul Bakker9e36f042013-06-30 14:34:05 +02001730 * (Used to be POLARSSL_SHA2_C)
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001731 *
Paul Bakker9e36f042013-06-30 14:34:05 +02001732 * Module: library/sha256.c
Manuel Pégourié-Gonnardfe286462013-09-20 14:10:14 +02001733 * Caller: library/entropy.c
1734 * library/md.c
1735 * library/ssl_cli.c
1736 * library/ssl_srv.c
1737 * library/ssl_tls.c
Paul Bakker5121ce52009-01-03 21:22:43 +00001738 *
1739 * This module adds support for SHA-224 and SHA-256.
Paul Bakker769075d2012-11-24 11:26:46 +01001740 * This module is required for the SSL/TLS 1.2 PRF function.
Paul Bakker5121ce52009-01-03 21:22:43 +00001741 */
Paul Bakker9e36f042013-06-30 14:34:05 +02001742#define POLARSSL_SHA256_C
Paul Bakker5121ce52009-01-03 21:22:43 +00001743
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001744/**
Paul Bakker9e36f042013-06-30 14:34:05 +02001745 * \def POLARSSL_SHA512_C
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001746 *
1747 * Enable the SHA-384 and SHA-512 cryptographic hash algorithms.
Paul Bakker9e36f042013-06-30 14:34:05 +02001748 * (Used to be POLARSSL_SHA4_C)
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001749 *
Paul Bakker9e36f042013-06-30 14:34:05 +02001750 * Module: library/sha512.c
Manuel Pégourié-Gonnardfe286462013-09-20 14:10:14 +02001751 * Caller: library/entropy.c
1752 * library/md.c
1753 * library/ssl_cli.c
1754 * library/ssl_srv.c
Paul Bakker5121ce52009-01-03 21:22:43 +00001755 *
1756 * This module adds support for SHA-384 and SHA-512.
1757 */
Paul Bakker9e36f042013-06-30 14:34:05 +02001758#define POLARSSL_SHA512_C
Paul Bakker5121ce52009-01-03 21:22:43 +00001759
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001760/**
Paul Bakker0a597072012-09-25 21:55:46 +00001761 * \def POLARSSL_SSL_CACHE_C
1762 *
1763 * Enable simple SSL cache implementation.
1764 *
1765 * Module: library/ssl_cache.c
1766 * Caller:
1767 *
1768 * Requires: POLARSSL_SSL_CACHE_C
1769 */
1770#define POLARSSL_SSL_CACHE_C
1771
1772/**
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001773 * \def POLARSSL_SSL_CLI_C
1774 *
1775 * Enable the SSL/TLS client code.
1776 *
Paul Bakker5121ce52009-01-03 21:22:43 +00001777 * Module: library/ssl_cli.c
1778 * Caller:
1779 *
Paul Bakker5690efc2011-05-26 13:16:06 +00001780 * Requires: POLARSSL_SSL_TLS_C
1781 *
Paul Bakker5121ce52009-01-03 21:22:43 +00001782 * This module is required for SSL/TLS client support.
1783 */
Paul Bakker40e46942009-01-03 21:51:57 +00001784#define POLARSSL_SSL_CLI_C
Paul Bakker5121ce52009-01-03 21:22:43 +00001785
Paul Bakker9a736322012-11-14 12:39:52 +00001786/**
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001787 * \def POLARSSL_SSL_SRV_C
1788 *
1789 * Enable the SSL/TLS server code.
1790 *
Paul Bakker5121ce52009-01-03 21:22:43 +00001791 * Module: library/ssl_srv.c
1792 * Caller:
1793 *
Paul Bakker5690efc2011-05-26 13:16:06 +00001794 * Requires: POLARSSL_SSL_TLS_C
1795 *
Paul Bakker5121ce52009-01-03 21:22:43 +00001796 * This module is required for SSL/TLS server support.
1797 */
Paul Bakker40e46942009-01-03 21:51:57 +00001798#define POLARSSL_SSL_SRV_C
Paul Bakker5121ce52009-01-03 21:22:43 +00001799
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001800/**
1801 * \def POLARSSL_SSL_TLS_C
1802 *
Paul Bakkere29ab062011-05-18 13:26:54 +00001803 * Enable the generic SSL/TLS code.
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001804 *
Paul Bakker5121ce52009-01-03 21:22:43 +00001805 * Module: library/ssl_tls.c
1806 * Caller: library/ssl_cli.c
1807 * library/ssl_srv.c
1808 *
Manuel Pégourié-Gonnard1a483832013-09-20 12:29:15 +02001809 * Requires: POLARSSL_CIPHER_C, POLARSSL_MD_C
Paul Bakker577e0062013-08-28 11:57:20 +02001810 * and at least one of the POLARSSL_SSL_PROTO_* defines
Paul Bakker5690efc2011-05-26 13:16:06 +00001811 *
Paul Bakker5121ce52009-01-03 21:22:43 +00001812 * This module is required for SSL/TLS.
1813 */
Paul Bakker40e46942009-01-03 21:51:57 +00001814#define POLARSSL_SSL_TLS_C
Paul Bakker5121ce52009-01-03 21:22:43 +00001815
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001816/**
Paul Bakker2466d932013-09-28 14:40:38 +02001817 * \def POLARSSL_THREADING_C
1818 *
1819 * Enable the threading abstraction layer.
1820 * By default PolarSSL assumes it is used in a non-threaded environment or that
1821 * contexts are not shared between threads. If you do intend to use contexts
1822 * between threads, you will need to enable this layer to prevent race
1823 * conditions.
1824 *
1825 * Module: library/threading.c
1826 *
1827 * This allows different threading implementations (self-implemented or
1828 * provided).
1829 *
Paul Bakkera8fd3e32013-12-31 11:54:08 +01001830 * You will have to enable either POLARSSL_THREADING_ALT or
1831 * POLARSSL_THREADING_PTHREAD.
Paul Bakker2466d932013-09-28 14:40:38 +02001832 *
1833 * Enable this layer to allow use of mutexes within PolarSSL
Paul Bakker2466d932013-09-28 14:40:38 +02001834 */
Paul Bakkera7ea6a52013-10-15 11:55:10 +02001835//#define POLARSSL_THREADING_C
Paul Bakker2466d932013-09-28 14:40:38 +02001836
1837/**
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001838 * \def POLARSSL_TIMING_C
1839 *
1840 * Enable the portable timing interface.
1841 *
Paul Bakker5121ce52009-01-03 21:22:43 +00001842 * Module: library/timing.c
1843 * Caller: library/havege.c
1844 *
1845 * This module is used by the HAVEGE random number generator.
Paul Bakkerecd54fb2013-07-03 14:48:29 +02001846 */
Paul Bakkerdcbfdcc2013-09-10 16:16:50 +02001847#define POLARSSL_TIMING_C
Paul Bakker5121ce52009-01-03 21:22:43 +00001848
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001849/**
1850 * \def POLARSSL_VERSION_C
1851 *
1852 * Enable run-time version information.
1853 *
Paul Bakker0a62cd12011-01-21 11:00:08 +00001854 * Module: library/version.c
1855 *
1856 * This module provides run-time version information.
1857 */
1858#define POLARSSL_VERSION_C
1859
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001860/**
Paul Bakker7c6b2c32013-09-16 13:49:26 +02001861 * \def POLARSSL_X509_USE_C
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001862 *
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +02001863 * Enable X.509 core for using certificates.
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001864 *
Paul Bakker7c6b2c32013-09-16 13:49:26 +02001865 * Module: library/x509.c
1866 * Caller: library/x509_crl.c
1867 * library/x509_crt.c
1868 * library/x509_csr.c
Paul Bakker5121ce52009-01-03 21:22:43 +00001869 *
Paul Bakkerc70b9822013-04-07 22:00:46 +02001870 * Requires: POLARSSL_ASN1_PARSE_C, POLARSSL_BIGNUM_C, POLARSSL_OID_C,
Paul Bakker4606c732013-09-15 17:04:23 +02001871 * POLARSSL_PK_PARSE_C
Paul Bakker5690efc2011-05-26 13:16:06 +00001872 *
Paul Bakker7c6b2c32013-09-16 13:49:26 +02001873 * This module is required for the X.509 parsing modules.
Paul Bakker5121ce52009-01-03 21:22:43 +00001874 */
Paul Bakker7c6b2c32013-09-16 13:49:26 +02001875#define POLARSSL_X509_USE_C
Paul Bakker5121ce52009-01-03 21:22:43 +00001876
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001877/**
Paul Bakker7c6b2c32013-09-16 13:49:26 +02001878 * \def POLARSSL_X509_CRT_PARSE_C
Paul Bakkerbdb912d2012-02-13 23:11:30 +00001879 *
Paul Bakker7c6b2c32013-09-16 13:49:26 +02001880 * Enable X.509 certificate parsing.
Paul Bakkerbdb912d2012-02-13 23:11:30 +00001881 *
Paul Bakker7c6b2c32013-09-16 13:49:26 +02001882 * Module: library/x509_crt.c
1883 * Caller: library/ssl_cli.c
1884 * library/ssl_srv.c
1885 * library/ssl_tls.c
1886 *
1887 * Requires: POLARSSL_X509_USE_C
1888 *
1889 * This module is required for X.509 certificate parsing.
1890 */
1891#define POLARSSL_X509_CRT_PARSE_C
1892
1893/**
1894 * \def POLARSSL_X509_CRL_PARSE_C
1895 *
1896 * Enable X.509 CRL parsing.
1897 *
1898 * Module: library/x509_crl.c
1899 * Caller: library/x509_crt.c
1900 *
1901 * Requires: POLARSSL_X509_USE_C
1902 *
1903 * This module is required for X.509 CRL parsing.
1904 */
1905#define POLARSSL_X509_CRL_PARSE_C
1906
1907/**
1908 * \def POLARSSL_X509_CSR_PARSE_C
1909 *
1910 * Enable X.509 Certificate Signing Request (CSR) parsing.
1911 *
1912 * Module: library/x509_csr.c
1913 * Caller: library/x509_crt_write.c
1914 *
1915 * Requires: POLARSSL_X509_USE_C
1916 *
1917 * This module is used for reading X.509 certificate request.
1918 */
1919#define POLARSSL_X509_CSR_PARSE_C
1920
1921/**
1922 * \def POLARSSL_X509_CREATE_C
1923 *
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +02001924 * Enable X.509 core for creating certificates.
Paul Bakker7c6b2c32013-09-16 13:49:26 +02001925 *
1926 * Module: library/x509_create.c
Paul Bakkerbdb912d2012-02-13 23:11:30 +00001927 *
Paul Bakker4606c732013-09-15 17:04:23 +02001928 * Requires: POLARSSL_BIGNUM_C, POLARSSL_OID_C, POLARSSL_PK_WRITE_C
Paul Bakkerbdb912d2012-02-13 23:11:30 +00001929 *
Paul Bakker7c6b2c32013-09-16 13:49:26 +02001930 * This module is the basis for creating X.509 certificates and CSRs.
1931 */
1932#define POLARSSL_X509_CREATE_C
1933
1934/**
1935 * \def POLARSSL_X509_CRT_WRITE_C
1936 *
1937 * Enable creating X.509 certificates.
1938 *
1939 * Module: library/x509_crt_write.c
1940 *
1941 * Requires: POLARSSL_CREATE_C
1942 *
1943 * This module is required for X.509 certificate creation.
1944 */
1945#define POLARSSL_X509_CRT_WRITE_C
1946
1947/**
1948 * \def POLARSSL_X509_CSR_WRITE_C
1949 *
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +02001950 * Enable creating X.509 Certificate Signing Requests (CSR).
Paul Bakker7c6b2c32013-09-16 13:49:26 +02001951 *
1952 * Module: library/x509_csr_write.c
1953 *
1954 * Requires: POLARSSL_CREATE_C
1955 *
Paul Bakkerbdb912d2012-02-13 23:11:30 +00001956 * This module is required for X.509 certificate request writing.
1957 */
Paul Bakker7c6b2c32013-09-16 13:49:26 +02001958#define POLARSSL_X509_CSR_WRITE_C
Paul Bakkerbdb912d2012-02-13 23:11:30 +00001959
1960/**
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001961 * \def POLARSSL_XTEA_C
Paul Bakker5121ce52009-01-03 21:22:43 +00001962 *
Paul Bakkerf3b86c12011-01-27 15:24:17 +00001963 * Enable the XTEA block cipher.
1964 *
Paul Bakker7a7c78f2009-01-04 18:15:48 +00001965 * Module: library/xtea.c
1966 * Caller:
1967 */
1968#define POLARSSL_XTEA_C
Manuel Pégourié-Gonnard39d2adb2012-10-31 09:26:55 +01001969
Manuel Pégourié-Gonnard09fff7e2013-09-20 13:45:36 +02001970/* \} name SECTION: PolarSSL modules */
Paul Bakker7a7c78f2009-01-04 18:15:48 +00001971
Paul Bakker9bcf16c2013-06-24 19:31:17 +02001972/**
1973 * \name SECTION: Module configuration options
1974 *
1975 * This section allows for the setting of module specific sizes and
1976 * configuration options. The default values are already present in the
1977 * relevant header files and should suffice for the regular use cases.
1978 * Our advice is to enable POLARSSL_CONFIG_OPTIONS and change values here
1979 * only if you have a good reason and know the consequences.
1980 *
1981 * If POLARSSL_CONFIG_OPTIONS is undefined here the options in the module
1982 * header file take precedence.
1983 *
1984 * Please check the respective header file for documentation on these
1985 * parameters (to prevent duplicate documentation).
1986 *
1987 * Uncomment POLARSSL_CONFIG_OPTIONS to enable using the values defined here.
1988 * \{
1989 */
1990//#define POLARSSL_CONFIG_OPTIONS /**< Enable config.h module value configuration */
1991
1992#if defined(POLARSSL_CONFIG_OPTIONS)
1993
1994// MPI / BIGNUM options
1995//
1996#define POLARSSL_MPI_WINDOW_SIZE 6 /**< Maximum windows size used. */
1997#define POLARSSL_MPI_MAX_SIZE 512 /**< Maximum number of bytes for usable MPIs. */
1998
1999// CTR_DRBG options
2000//
Paul Bakkerfb08fd22013-08-27 15:06:26 +02002001#define CTR_DRBG_ENTROPY_LEN 48 /**< Amount of entropy used per seed by default (48 with SHA-512, 32 with SHA-256) */
Paul Bakker9bcf16c2013-06-24 19:31:17 +02002002#define CTR_DRBG_RESEED_INTERVAL 10000 /**< Interval before reseed is performed by default */
2003#define CTR_DRBG_MAX_INPUT 256 /**< Maximum number of additional input bytes */
2004#define CTR_DRBG_MAX_REQUEST 1024 /**< Maximum number of requested bytes per call */
2005#define CTR_DRBG_MAX_SEED_INPUT 384 /**< Maximum size of (re)seed buffer */
2006
Manuel Pégourié-Gonnard0520b602014-01-30 19:43:46 +01002007// HMAC_DRBG options
2008//
2009#define POLARSSL_HMAC_DRBG_RESEED_INTERVAL 10000 /**< Interval before reseed is performed by default */
2010#define POLARSSL_HMAC_DRBG_MAX_INPUT 256 /**< Maximum number of additional input bytes */
2011#define POLARSSL_HMAC_DRBG_MAX_REQUEST 1024 /**< Maximum number of requested bytes per call */
2012#define POLARSSL_HMAC_DRBG_MAX_SEED_INPUT 384 /**< Maximum size of (re)seed buffer */
2013
Paul Bakkere1b665e2013-12-11 16:02:58 +01002014// ECP options
2015//
2016#define POLARSSL_ECP_MAX_BITS 521 /**< Maximum bit size of groups */
2017#define POLARSSL_ECP_WINDOW_SIZE 6 /**< Maximum window size used */
Manuel Pégourié-Gonnard9e4191c2013-12-30 18:41:16 +01002018#define POLARSSL_ECP_FIXED_POINT_OPTIM 1 /**< Enable fixed-point speed-up */
Paul Bakkere1b665e2013-12-11 16:02:58 +01002019
Paul Bakker9bcf16c2013-06-24 19:31:17 +02002020// Entropy options
2021//
2022#define ENTROPY_MAX_SOURCES 20 /**< Maximum number of sources supported */
2023#define ENTROPY_MAX_GATHER 128 /**< Maximum amount requested from entropy sources */
2024
Paul Bakkerdefc0ca2014-02-04 17:30:24 +01002025// Memory buffer allocator options
Paul Bakker6e339b52013-07-03 13:37:05 +02002026#define MEMORY_ALIGN_MULTIPLE 4 /**< Align on multiples of this value */
Paul Bakker6e339b52013-07-03 13:37:05 +02002027
Paul Bakker747a83a2014-02-01 22:50:07 +01002028// Platform options
Paul Bakkerdefc0ca2014-02-04 17:30:24 +01002029#define POLARSSL_PLATFORM_STD_MALLOC malloc /**< Default allocator to use, can be undefined */
2030#define POLARSSL_PLATFORM_STD_FREE free /**< Default free to use, can be undefined */
Paul Bakker747a83a2014-02-01 22:50:07 +01002031#define POLARSSL_PLATFORM_STD_PRINTF printf /**< Default printf to use, can be undefined */
2032#define POLARSSL_PLATFORM_STD_FPRINTF fprintf /**< Default fprintf to use, can be undefined */
Paul Bakker9bcf16c2013-06-24 19:31:17 +02002033
2034// SSL Cache options
2035//
2036#define SSL_CACHE_DEFAULT_TIMEOUT 86400 /**< 1 day */
2037#define SSL_CACHE_DEFAULT_MAX_ENTRIES 50 /**< Maximum entries in cache */
2038
2039// SSL options
2040//
2041#define SSL_MAX_CONTENT_LEN 16384 /**< Size of the input / output buffer */
Paul Bakker606b4ba2013-08-14 16:52:14 +02002042#define SSL_DEFAULT_TICKET_LIFETIME 86400 /**< Lifetime of session tickets (if enabled) */
Paul Bakker9bcf16c2013-06-24 19:31:17 +02002043
2044#endif /* POLARSSL_CONFIG_OPTIONS */
2045
2046/* \} name */
2047
Paul Bakker7ad00f92013-04-18 23:05:25 +02002048/*
2049 * Sanity checks on defines and dependencies
2050 */
Manuel Pégourié-Gonnard92ac76f2013-12-16 17:12:53 +01002051#if defined(POLARSSL_AESNI_C) && !defined(POLARSSL_HAVE_ASM)
2052#error "POLARSSL_AESNI_C defined, but not all prerequisites"
2053#endif
2054
Manuel Pégourié-Gonnard18dc0e22013-10-27 14:35:02 +01002055#if defined(POLARSSL_CERTS_C) && !defined(POLARSSL_PEM_PARSE_C)
2056#error "POLARSSL_CERTS_C defined, but not all prerequisites"
Paul Bakker7ad00f92013-04-18 23:05:25 +02002057#endif
2058
2059#if defined(POLARSSL_CTR_DRBG_C) && !defined(POLARSSL_AES_C)
2060#error "POLARSSL_CTR_DRBG_C defined, but not all prerequisites"
2061#endif
2062
Manuel Pégourié-Gonnard18dc0e22013-10-27 14:35:02 +01002063#if defined(POLARSSL_DHM_C) && !defined(POLARSSL_BIGNUM_C)
2064#error "POLARSSL_DHM_C defined, but not all prerequisites"
2065#endif
2066
Paul Bakker7ad00f92013-04-18 23:05:25 +02002067#if defined(POLARSSL_ECDH_C) && !defined(POLARSSL_ECP_C)
2068#error "POLARSSL_ECDH_C defined, but not all prerequisites"
2069#endif
2070
Manuel Pégourié-Gonnard4846f5e2013-08-08 14:36:15 +02002071#if defined(POLARSSL_ECDSA_C) && \
2072 ( !defined(POLARSSL_ECP_C) || \
2073 !defined(POLARSSL_ASN1_PARSE_C) || \
2074 !defined(POLARSSL_ASN1_WRITE_C) )
Paul Bakker7ad00f92013-04-18 23:05:25 +02002075#error "POLARSSL_ECDSA_C defined, but not all prerequisites"
2076#endif
2077
Manuel Pégourié-Gonnard7845fc02014-01-27 14:24:03 +01002078#if defined(POLARSSL_ECDSA_DETERMINISTIC) && !defined(POLARSSL_HMAC_DRBG_C)
Manuel Pégourié-Gonnard5b1a5732014-01-07 16:46:17 +01002079#error "POLARSSL_ECDSA_DETERMINISTIC defined, but not all prerequisites"
2080#endif
2081
Manuel Pégourié-Gonnardc59c9c12013-10-27 14:04:59 +01002082#if defined(POLARSSL_ECP_C) && ( !defined(POLARSSL_BIGNUM_C) || ( \
2083 !defined(POLARSSL_ECP_DP_SECP192R1_ENABLED) && \
2084 !defined(POLARSSL_ECP_DP_SECP224R1_ENABLED) && \
2085 !defined(POLARSSL_ECP_DP_SECP256R1_ENABLED) && \
2086 !defined(POLARSSL_ECP_DP_SECP384R1_ENABLED) && \
2087 !defined(POLARSSL_ECP_DP_SECP521R1_ENABLED) && \
2088 !defined(POLARSSL_ECP_DP_BP256R1_ENABLED) && \
2089 !defined(POLARSSL_ECP_DP_BP384R1_ENABLED) && \
Manuel Pégourié-Gonnardffd94cc2014-01-28 20:11:07 +01002090 !defined(POLARSSL_ECP_DP_BP512R1_ENABLED) && \
2091 !defined(POLARSSL_ECP_DP_M255_ENABLED) && \
2092 !defined(POLARSSL_ECP_DP_SECP192K1_ENABLED) && \
2093 !defined(POLARSSL_ECP_DP_SECP224K1_ENABLED) && \
2094 !defined(POLARSSL_ECP_DP_SECP256K1_ENABLED) ) )
Paul Bakker7ad00f92013-04-18 23:05:25 +02002095#error "POLARSSL_ECP_C defined, but not all prerequisites"
2096#endif
2097
Paul Bakkerfb08fd22013-08-27 15:06:26 +02002098#if defined(POLARSSL_ENTROPY_C) && (!defined(POLARSSL_SHA512_C) && \
2099 !defined(POLARSSL_SHA256_C))
Paul Bakker7ad00f92013-04-18 23:05:25 +02002100#error "POLARSSL_ENTROPY_C defined, but not all prerequisites"
2101#endif
Paul Bakkerfb08fd22013-08-27 15:06:26 +02002102#if defined(POLARSSL_ENTROPY_C) && defined(POLARSSL_SHA512_C) && \
2103 defined(POLARSSL_CONFIG_OPTIONS) && (CTR_DRBG_ENTROPY_LEN > 64)
2104#error "CTR_DRBG_ENTROPY_LEN value too high"
2105#endif
2106#if defined(POLARSSL_ENTROPY_C) && !defined(POLARSSL_SHA512_C) && \
2107 defined(POLARSSL_CONFIG_OPTIONS) && (CTR_DRBG_ENTROPY_LEN > 32)
2108#error "CTR_DRBG_ENTROPY_LEN value too high"
2109#endif
Paul Bakker2ceda572014-02-06 15:55:25 +01002110#if defined(POLARSSL_ENTROPY_C) && \
2111 defined(POLARSSL_ENTROPY_FORCE_SHA256) && !defined(POLARSSL_SHA256_C)
2112#error "POLARSSL_ENTROPY_FORCE_SHA256 defined, but not all prerequisites"
2113#endif
Paul Bakker7ad00f92013-04-18 23:05:25 +02002114
Manuel Pégourié-Gonnard7bd8a992013-10-24 13:39:39 +02002115#if defined(POLARSSL_GCM_C) && ( \
2116 !defined(POLARSSL_AES_C) && !defined(POLARSSL_CAMELLIA_C) )
Paul Bakker7ad00f92013-04-18 23:05:25 +02002117#error "POLARSSL_GCM_C defined, but not all prerequisites"
2118#endif
2119
Paul Bakkerecd54fb2013-07-03 14:48:29 +02002120#if defined(POLARSSL_HAVEGE_C) && !defined(POLARSSL_TIMING_C)
2121#error "POLARSSL_HAVEGE_C defined, but not all prerequisites"
2122#endif
2123
Manuel Pégourié-Gonnard490bdf32014-01-27 14:03:10 +01002124#if defined(POLARSSL_HMAC_DRBG) && !defined(POLARSSL_MD_C)
2125#error "POLARSSL_HMAC_DRBG_C defined, but not all prerequisites"
2126#endif
2127
Manuel Pégourié-Gonnard25781b22013-12-11 16:17:10 +01002128#if defined(POLARSSL_KEY_EXCHANGE_ECDH_ECDSA_ENABLED) && \
2129 ( !defined(POLARSSL_ECDH_C) || !defined(POLARSSL_X509_CRT_PARSE_C) )
2130#error "POLARSSL_KEY_EXCHANGE_ECDH_ECDSA_ENABLED defined, but not all prerequisites"
2131#endif
2132
2133#if defined(POLARSSL_KEY_EXCHANGE_ECDH_RSA_ENABLED) && \
2134 ( !defined(POLARSSL_ECDH_C) || !defined(POLARSSL_X509_CRT_PARSE_C) )
2135#error "POLARSSL_KEY_EXCHANGE_ECDH_RSA_ENABLED defined, but not all prerequisites"
2136#endif
2137
Paul Bakkere07f41d2013-04-19 09:08:57 +02002138#if defined(POLARSSL_KEY_EXCHANGE_DHE_PSK_ENABLED) && !defined(POLARSSL_DHM_C)
2139#error "POLARSSL_KEY_EXCHANGE_DHE_PSK_ENABLED defined, but not all prerequisites"
2140#endif
2141
Manuel Pégourié-Gonnard3ce3bbd2013-10-11 16:53:50 +02002142#if defined(POLARSSL_KEY_EXCHANGE_ECDHE_PSK_ENABLED) && \
2143 !defined(POLARSSL_ECDH_C)
2144#error "POLARSSL_KEY_EXCHANGE_ECDHE_PSK_ENABLED defined, but not all prerequisites"
2145#endif
2146
Paul Bakkere07f41d2013-04-19 09:08:57 +02002147#if defined(POLARSSL_KEY_EXCHANGE_DHE_RSA_ENABLED) && \
2148 ( !defined(POLARSSL_DHM_C) || !defined(POLARSSL_RSA_C) || \
Manuel Pégourié-Gonnardcbf3ef32013-09-23 12:20:02 +02002149 !defined(POLARSSL_X509_CRT_PARSE_C) || !defined(POLARSSL_PKCS1_V15) )
Paul Bakkere07f41d2013-04-19 09:08:57 +02002150#error "POLARSSL_KEY_EXCHANGE_DHE_RSA_ENABLED defined, but not all prerequisites"
2151#endif
2152
2153#if defined(POLARSSL_KEY_EXCHANGE_ECDHE_RSA_ENABLED) && \
2154 ( !defined(POLARSSL_ECDH_C) || !defined(POLARSSL_RSA_C) || \
Manuel Pégourié-Gonnardcbf3ef32013-09-23 12:20:02 +02002155 !defined(POLARSSL_X509_CRT_PARSE_C) || !defined(POLARSSL_PKCS1_V15) )
Paul Bakkere07f41d2013-04-19 09:08:57 +02002156#error "POLARSSL_KEY_EXCHANGE_ECDHE_RSA_ENABLED defined, but not all prerequisites"
2157#endif
2158
Manuel Pégourié-Gonnard32ea60a2013-08-17 17:39:04 +02002159#if defined(POLARSSL_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) && \
2160 ( !defined(POLARSSL_ECDH_C) || !defined(POLARSSL_ECDSA_C) || \
Manuel Pégourié-Gonnardcbf3ef32013-09-23 12:20:02 +02002161 !defined(POLARSSL_X509_CRT_PARSE_C) )
Manuel Pégourié-Gonnard32ea60a2013-08-17 17:39:04 +02002162#error "POLARSSL_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED defined, but not all prerequisites"
2163#endif
2164
Paul Bakkere07f41d2013-04-19 09:08:57 +02002165#if defined(POLARSSL_KEY_EXCHANGE_RSA_PSK_ENABLED) && \
Paul Bakker7c6b2c32013-09-16 13:49:26 +02002166 ( !defined(POLARSSL_RSA_C) || !defined(POLARSSL_X509_CRT_PARSE_C) ||\
Manuel Pégourié-Gonnardcbf3ef32013-09-23 12:20:02 +02002167 !defined(POLARSSL_PKCS1_V15) )
Paul Bakkere07f41d2013-04-19 09:08:57 +02002168#error "POLARSSL_KEY_EXCHANGE_RSA_PSK_ENABLED defined, but not all prerequisites"
2169#endif
2170
2171#if defined(POLARSSL_KEY_EXCHANGE_RSA_ENABLED) && \
Paul Bakker7c6b2c32013-09-16 13:49:26 +02002172 ( !defined(POLARSSL_RSA_C) || !defined(POLARSSL_X509_CRT_PARSE_C) ||\
Manuel Pégourié-Gonnardcbf3ef32013-09-23 12:20:02 +02002173 !defined(POLARSSL_PKCS1_V15) )
Paul Bakkere07f41d2013-04-19 09:08:57 +02002174#error "POLARSSL_KEY_EXCHANGE_RSA_ENABLED defined, but not all prerequisites"
2175#endif
2176
Paul Bakkerdefc0ca2014-02-04 17:30:24 +01002177#if defined(POLARSSL_MEMORY_BUFFER_ALLOC_C) && \
2178 ( !defined(POLARSSL_PLATFORM_C) || !defined(POLARSSL_PLATFORM_MEMORY) )
Paul Bakker6e339b52013-07-03 13:37:05 +02002179#error "POLARSSL_MEMORY_BUFFER_ALLOC_C defined, but not all prerequisites"
2180#endif
2181
Manuel Pégourié-Gonnard92ac76f2013-12-16 17:12:53 +01002182#if defined(POLARSSL_PADLOCK_C) && !defined(POLARSSL_HAVE_ASM)
2183#error "POLARSSL_PADLOCK_C defined, but not all prerequisites"
2184#endif
2185
Paul Bakker7ad00f92013-04-18 23:05:25 +02002186#if defined(POLARSSL_PBKDF2_C) && !defined(POLARSSL_MD_C)
2187#error "POLARSSL_PBKDF2_C defined, but not all prerequisites"
2188#endif
2189
Paul Bakkercff68422013-09-15 20:43:33 +02002190#if defined(POLARSSL_PEM_PARSE_C) && !defined(POLARSSL_BASE64_C)
2191#error "POLARSSL_PEM_PARSE_C defined, but not all prerequisites"
2192#endif
2193
2194#if defined(POLARSSL_PEM_WRITE_C) && !defined(POLARSSL_BASE64_C)
2195#error "POLARSSL_PEM_WRITE_C defined, but not all prerequisites"
Paul Bakker7ad00f92013-04-18 23:05:25 +02002196#endif
2197
Paul Bakker4606c732013-09-15 17:04:23 +02002198#if defined(POLARSSL_PK_PARSE_C) && !defined(POLARSSL_PK_C)
2199#error "POLARSSL_PK_PARSE_C defined, but not all prerequisites"
2200#endif
2201
2202#if defined(POLARSSL_PK_WRITE_C) && !defined(POLARSSL_PK_C)
2203#error "POLARSSL_PK_WRITE_C defined, but not all prerequisites"
2204#endif
2205
Manuel Pégourié-Gonnard51be5592013-08-22 13:35:53 +02002206#if defined(POLARSSL_PKCS11_C) && !defined(POLARSSL_PK_C)
Paul Bakker7ad00f92013-04-18 23:05:25 +02002207#error "POLARSSL_PKCS11_C defined, but not all prerequisites"
2208#endif
2209
2210#if defined(POLARSSL_RSA_C) && ( !defined(POLARSSL_BIGNUM_C) || \
2211 !defined(POLARSSL_OID_C) )
2212#error "POLARSSL_RSA_C defined, but not all prerequisites"
2213#endif
2214
Manuel Pégourié-Gonnard7c3291e2013-10-27 14:29:51 +01002215#if defined(POLARSSL_SSL_PROTO_SSL3) && ( !defined(POLARSSL_MD5_C) || \
2216 !defined(POLARSSL_SHA1_C) )
2217#error "POLARSSL_SSL_PROTO_SSL3 defined, but not all prerequisites"
2218#endif
2219
2220#if defined(POLARSSL_SSL_PROTO_TLS1) && ( !defined(POLARSSL_MD5_C) || \
2221 !defined(POLARSSL_SHA1_C) )
2222#error "POLARSSL_SSL_PROTO_TLS1 defined, but not all prerequisites"
2223#endif
2224
2225#if defined(POLARSSL_SSL_PROTO_TLS1_1) && ( !defined(POLARSSL_MD5_C) || \
2226 !defined(POLARSSL_SHA1_C) )
2227#error "POLARSSL_SSL_PROTO_TLS1_1 defined, but not all prerequisites"
2228#endif
2229
2230#if defined(POLARSSL_SSL_PROTO_TLS1_2) && ( !defined(POLARSSL_SHA1_C) && \
2231 !defined(POLARSSL_SHA256_C) && !defined(POLARSSL_SHA512_C) )
2232#error "POLARSSL_SSL_PROTO_TLS1_2 defined, but not all prerequisites"
2233#endif
2234
Paul Bakker7ad00f92013-04-18 23:05:25 +02002235#if defined(POLARSSL_SSL_CLI_C) && !defined(POLARSSL_SSL_TLS_C)
2236#error "POLARSSL_SSL_CLI_C defined, but not all prerequisites"
2237#endif
2238
Paul Bakker577e0062013-08-28 11:57:20 +02002239#if defined(POLARSSL_SSL_TLS_C) && ( !defined(POLARSSL_CIPHER_C) || \
Manuel Pégourié-Gonnard1a483832013-09-20 12:29:15 +02002240 !defined(POLARSSL_MD_C) )
Paul Bakker7ad00f92013-04-18 23:05:25 +02002241#error "POLARSSL_SSL_TLS_C defined, but not all prerequisites"
2242#endif
2243
2244#if defined(POLARSSL_SSL_SRV_C) && !defined(POLARSSL_SSL_TLS_C)
2245#error "POLARSSL_SSL_SRV_C defined, but not all prerequisites"
2246#endif
2247
Paul Bakkerd2f068e2013-08-27 21:19:20 +02002248#if defined(POLARSSL_SSL_TLS_C) && (!defined(POLARSSL_SSL_PROTO_SSL3) && \
2249 !defined(POLARSSL_SSL_PROTO_TLS1) && !defined(POLARSSL_SSL_PROTO_TLS1_1) && \
2250 !defined(POLARSSL_SSL_PROTO_TLS1_2))
2251#error "POLARSSL_SSL_TLS_C defined, but no protocols are active"
2252#endif
2253
2254#if defined(POLARSSL_SSL_TLS_C) && (defined(POLARSSL_SSL_PROTO_SSL3) && \
2255 defined(POLARSSL_SSL_PROTO_TLS1_1) && !defined(POLARSSL_SSL_PROTO_TLS1))
2256#error "Illegal protocol selection"
2257#endif
2258
2259#if defined(POLARSSL_SSL_TLS_C) && (defined(POLARSSL_SSL_PROTO_TLS1) && \
2260 defined(POLARSSL_SSL_PROTO_TLS1_2) && !defined(POLARSSL_SSL_PROTO_TLS1_1))
2261#error "Illegal protocol selection"
2262#endif
2263
2264#if defined(POLARSSL_SSL_TLS_C) && (defined(POLARSSL_SSL_PROTO_SSL3) && \
2265 defined(POLARSSL_SSL_PROTO_TLS1_2) && (!defined(POLARSSL_SSL_PROTO_TLS1) || \
2266 !defined(POLARSSL_SSL_PROTO_TLS1_1)))
2267#error "Illegal protocol selection"
2268#endif
2269
Paul Bakker59da0a42013-08-19 13:27:17 +02002270#if defined(POLARSSL_SSL_SESSION_TICKETS) && defined(POLARSSL_SSL_TLS_C) && \
Manuel Pégourié-Gonnard92cb1d32013-09-13 16:24:20 +02002271 ( !defined(POLARSSL_AES_C) || !defined(POLARSSL_SHA256_C) || \
2272 !defined(POLARSSL_CIPHER_MODE_CBC) )
Paul Bakker59da0a42013-08-19 13:27:17 +02002273#error "POLARSSL_SSL_SESSION_TICKETS_C defined, but not all prerequisites"
2274#endif
2275
Paul Bakker2466d932013-09-28 14:40:38 +02002276#if defined(POLARSSL_THREADING_PTHREAD)
2277#if !defined(POLARSSL_THREADING_C) || defined(POLARSSL_THREADING_IMPL)
2278#error "POLARSSL_THREADING_PTHREAD defined, but not all prerequisites"
2279#endif
2280#define POLARSSL_THREADING_IMPL
2281#endif
2282
2283#if defined(POLARSSL_THREADING_ALT)
2284#if !defined(POLARSSL_THREADING_C) || defined(POLARSSL_THREADING_IMPL)
2285#error "POLARSSL_THREADING_ALT defined, but not all prerequisites"
2286#endif
2287#define POLARSSL_THREADING_IMPL
2288#endif
2289
2290#if defined(POLARSSL_THREADING_C) && !defined(POLARSSL_THREADING_IMPL)
2291#error "POLARSSL_THREADING_C defined, single threading implementation required"
2292#endif
2293#undef POLARSSL_THREADING_IMPL
2294
Paul Bakker7c6b2c32013-09-16 13:49:26 +02002295#if defined(POLARSSL_X509_USE_C) && ( !defined(POLARSSL_BIGNUM_C) || \
Paul Bakker7ad00f92013-04-18 23:05:25 +02002296 !defined(POLARSSL_OID_C) || !defined(POLARSSL_ASN1_PARSE_C) || \
Paul Bakker4606c732013-09-15 17:04:23 +02002297 !defined(POLARSSL_PK_PARSE_C) )
Paul Bakker7c6b2c32013-09-16 13:49:26 +02002298#error "POLARSSL_X509_USE_C defined, but not all prerequisites"
Paul Bakker7ad00f92013-04-18 23:05:25 +02002299#endif
2300
Paul Bakker7c6b2c32013-09-16 13:49:26 +02002301#if defined(POLARSSL_X509_CREATE_C) && ( !defined(POLARSSL_BIGNUM_C) || \
2302 !defined(POLARSSL_OID_C) || !defined(POLARSSL_ASN1_WRITE_C) || \
2303 !defined(POLARSSL_PK_WRITE_C) )
2304#error "POLARSSL_X509_CREATE_C defined, but not all prerequisites"
2305#endif
2306
2307#if defined(POLARSSL_X509_CRT_PARSE_C) && ( !defined(POLARSSL_X509_USE_C) )
2308#error "POLARSSL_X509_CRT_PARSE_C defined, but not all prerequisites"
2309#endif
2310
2311#if defined(POLARSSL_X509_CRL_PARSE_C) && ( !defined(POLARSSL_X509_USE_C) )
2312#error "POLARSSL_X509_CRL_PARSE_C defined, but not all prerequisites"
2313#endif
2314
2315#if defined(POLARSSL_X509_CSR_PARSE_C) && ( !defined(POLARSSL_X509_USE_C) )
2316#error "POLARSSL_X509_CSR_PARSE_C defined, but not all prerequisites"
2317#endif
2318
2319#if defined(POLARSSL_X509_CRT_WRITE_C) && ( !defined(POLARSSL_X509_CREATE_C) )
2320#error "POLARSSL_X509_CRT_WRITE_C defined, but not all prerequisites"
2321#endif
2322
2323#if defined(POLARSSL_X509_CSR_WRITE_C) && ( !defined(POLARSSL_X509_CREATE_C) )
2324#error "POLARSSL_X509_CSR_WRITE_C defined, but not all prerequisites"
Paul Bakker7ad00f92013-04-18 23:05:25 +02002325#endif
2326
Paul Bakker5121ce52009-01-03 21:22:43 +00002327#endif /* config.h */