|
880 | 880 | * may result in a compromise of the long-term signing key. This is avoided by
|
881 | 881 | * the deterministic variant.
|
882 | 882 | *
|
883 |
| - * Requires: MBEDTLS_HMAC_DRBG_C |
| 883 | + * Requires: MBEDTLS_HMAC_DRBG_C, MBEDTLS_ECDSA_C |
884 | 884 | *
|
885 | 885 | * Comment this macro to disable deterministic ECDSA.
|
886 | 886 | */
|
|
1274 | 1274 | */
|
1275 | 1275 | //#define MBEDTLS_ENTROPY_NV_SEED
|
1276 | 1276 |
|
1277 |
| -/* MBEDTLS_PSA_CRYPTO_KEY_FILE_ID_ENCODES_OWNER |
| 1277 | +/* MBEDTLS_PSA_CRYPTO_KEY_ID_ENCODES_OWNER |
1278 | 1278 | *
|
1279 |
| - * In PSA key storage, encode the owner of the key. |
| 1279 | + * Enable key identifiers that encode a key owner identifier. |
1280 | 1280 | *
|
1281 |
| - * This is only meaningful when building the library as part of a |
1282 |
| - * multi-client service. When you activate this option, you must provide |
1283 |
| - * an implementation of the type psa_key_owner_id_t and a translation |
1284 |
| - * from psa_key_file_id_t to file name in all the storage backends that |
1285 |
| - * you wish to support. |
| 1281 | + * The owner of a key is identified by a value of type ::mbedtls_key_owner_id_t |
| 1282 | + * which is currently hard-coded to be int32_t. |
1286 | 1283 | *
|
1287 | 1284 | * Note that this option is meant for internal use only and may be removed
|
1288 |
| - * without notice. |
| 1285 | + * without notice. It is incompatible with MBEDTLS_USE_PSA_CRYPTO. |
1289 | 1286 | */
|
1290 |
| -//#define MBEDTLS_PSA_CRYPTO_KEY_FILE_ID_ENCODES_OWNER |
| 1287 | +//#define MBEDTLS_PSA_CRYPTO_KEY_ID_ENCODES_OWNER |
1291 | 1288 |
|
1292 | 1289 | /**
|
1293 | 1290 | * \def MBEDTLS_MEMORY_DEBUG
|
|
1345 | 1342 | */
|
1346 | 1343 | #define MBEDTLS_PKCS1_V21
|
1347 | 1344 |
|
| 1345 | +/** \def MBEDTLS_PSA_CRYPTO_DRIVERS |
| 1346 | + * |
| 1347 | + * Enable support for the experimental PSA crypto driver interface. |
| 1348 | + * |
| 1349 | + * Requires: MBEDTLS_PSA_CRYPTO_C |
| 1350 | + * |
| 1351 | + * \warning This interface is experimental and may change or be removed |
| 1352 | + * without notice. |
| 1353 | + */ |
| 1354 | +//#define MBEDTLS_PSA_CRYPTO_DRIVERS |
| 1355 | + |
1348 | 1356 | /**
|
1349 | 1357 | * \def MBEDTLS_PSA_CRYPTO_SPM
|
1350 | 1358 | *
|
|
1820 | 1828 | */
|
1821 | 1829 | #define MBEDTLS_SSL_DTLS_HELLO_VERIFY
|
1822 | 1830 |
|
| 1831 | +/** |
| 1832 | + * \def MBEDTLS_SSL_DTLS_SRTP |
| 1833 | + * |
| 1834 | + * Enable support for negotation of DTLS-SRTP (RFC 5764) |
| 1835 | + * through the use_srtp extension. |
| 1836 | + * |
| 1837 | + * \note This feature provides the minimum functionality required |
| 1838 | + * to negotiate the use of DTLS-SRTP and to allow the derivation of |
| 1839 | + * the associated SRTP packet protection key material. |
| 1840 | + * In particular, the SRTP packet protection itself, as well as the |
| 1841 | + * demultiplexing of RTP and DTLS packets at the datagram layer |
| 1842 | + * (see Section 5 of RFC 5764), are not handled by this feature. |
| 1843 | + * Instead, after successful completion of a handshake negotiating |
| 1844 | + * the use of DTLS-SRTP, the extended key exporter API |
| 1845 | + * mbedtls_ssl_conf_export_keys_ext_cb() should be used to implement |
| 1846 | + * the key exporter described in Section 4.2 of RFC 5764 and RFC 5705 |
| 1847 | + * (this is implemented in the SSL example programs). |
| 1848 | + * The resulting key should then be passed to an SRTP stack. |
| 1849 | + * |
| 1850 | + * Setting this option enables the runtime API |
| 1851 | + * mbedtls_ssl_conf_dtls_srtp_protection_profiles() |
| 1852 | + * through which the supported DTLS-SRTP protection |
| 1853 | + * profiles can be configured. You must call this API at |
| 1854 | + * runtime if you wish to negotiate the use of DTLS-SRTP. |
| 1855 | + * |
| 1856 | + * Requires: MBEDTLS_SSL_PROTO_DTLS |
| 1857 | + * |
| 1858 | + * Uncomment this to enable support for use_srtp extension. |
| 1859 | + */ |
| 1860 | +//#define MBEDTLS_SSL_DTLS_SRTP |
| 1861 | + |
1823 | 1862 | /**
|
1824 | 1863 | * \def MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE
|
1825 | 1864 | *
|
|
2027 | 2066 | */
|
2028 | 2067 | //#define MBEDTLS_USE_PSA_CRYPTO
|
2029 | 2068 |
|
| 2069 | +/** |
| 2070 | + * \def MBEDTLS_PSA_CRYPTO_CONFIG |
| 2071 | + * |
| 2072 | + * This setting allows support for cryptographic mechanisms through the PSA |
| 2073 | + * API to be configured separately from support through the mbedtls API. |
| 2074 | + * |
| 2075 | + * Uncomment this to enable use of PSA Crypto configuration settings which |
| 2076 | + * can be found in include/psa/crypto_config.h. |
| 2077 | + * |
| 2078 | + * If you enable this option and write your own configuration file, you must |
| 2079 | + * include mbedtls/config_psa.h in your configuration file. The default |
| 2080 | + * provided mbedtls/config.h contains the necessary inclusion. |
| 2081 | + * |
| 2082 | + * This feature is still experimental and is not ready for production since |
| 2083 | + * it is not completed. |
| 2084 | + */ |
| 2085 | +//#define MBEDTLS_PSA_CRYPTO_CONFIG |
| 2086 | + |
2030 | 2087 | /**
|
2031 | 2088 | * \def MBEDTLS_VERSION_FEATURES
|
2032 | 2089 | *
|
|
3466 | 3523 | */
|
3467 | 3524 |
|
3468 | 3525 | /* MPI / BIGNUM options */
|
3469 |
| -//#define MBEDTLS_MPI_WINDOW_SIZE 6 /**< Maximum windows size used. */ |
| 3526 | +//#define MBEDTLS_MPI_WINDOW_SIZE 6 /**< Maximum window size used. */ |
3470 | 3527 | #define MBEDTLS_MPI_MAX_SIZE 512
|
3471 | 3528 |
|
3472 | 3529 | /* CTR_DRBG options */
|
|
3819 | 3876 | #include MBEDTLS_USER_CONFIG_FILE
|
3820 | 3877 | #endif
|
3821 | 3878 |
|
| 3879 | +#if defined(MBEDTLS_PSA_CRYPTO_CONFIG) |
| 3880 | +#include "mbedtls/config_psa.h" |
| 3881 | +#endif |
| 3882 | + |
3822 | 3883 | #include "mbedtls/check_config.h"
|
3823 | 3884 |
|
3824 | 3885 |
|
|
0 commit comments