1 /**
2  * \file config-suite-b.h
3  *
4  * \brief Minimal configuration for TLS NSA Suite B Profile (RFC 6460)
5  */
6 /*
7  *  Copyright The Mbed TLS Contributors
8  *  SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
9  *
10  *  This file is provided under the Apache License 2.0, or the
11  *  GNU General Public License v2.0 or later.
12  *
13  *  **********
14  *  Apache License 2.0:
15  *
16  *  Licensed under the Apache License, Version 2.0 (the "License"); you may
17  *  not use this file except in compliance with the License.
18  *  You may obtain a copy of the License at
19  *
20  *  http://www.apache.org/licenses/LICENSE-2.0
21  *
22  *  Unless required by applicable law or agreed to in writing, software
23  *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
24  *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
25  *  See the License for the specific language governing permissions and
26  *  limitations under the License.
27  *
28  *  **********
29  *
30  *  **********
31  *  GNU General Public License v2.0 or later:
32  *
33  *  This program is free software; you can redistribute it and/or modify
34  *  it under the terms of the GNU General Public License as published by
35  *  the Free Software Foundation; either version 2 of the License, or
36  *  (at your option) any later version.
37  *
38  *  This program is distributed in the hope that it will be useful,
39  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
40  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
41  *  GNU General Public License for more details.
42  *
43  *  You should have received a copy of the GNU General Public License along
44  *  with this program; if not, write to the Free Software Foundation, Inc.,
45  *  51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
46  *
47  *  **********
48  */
49 /*
50  * Minimal configuration for TLS NSA Suite B Profile (RFC 6460)
51  *
52  * Distinguishing features:
53  * - no RSA or classic DH, fully based on ECC
54  * - optimized for low RAM usage
55  *
56  * Possible improvements:
57  * - if 128-bit security is enough, disable secp384r1 and SHA-512
58  * - use embedded certs in DER format and disable PEM_PARSE_C and BASE64_C
59  *
60  * See README.txt for usage instructions.
61  */
62 
63 #ifndef MBEDTLS_CONFIG_H
64 #define MBEDTLS_CONFIG_H
65 
66 /* System support */
67 #define MBEDTLS_HAVE_ASM
68 #define MBEDTLS_HAVE_TIME
69 #define MBEDTLS_PLATFORM_MS_TIME_ALT
70 
71 /* mbed TLS feature support */
72 #define MBEDTLS_ECP_DP_SECP256R1_ENABLED
73 #define MBEDTLS_ECP_DP_SECP384R1_ENABLED
74 #define MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED
75 #define MBEDTLS_SSL_PROTO_TLS1_2
76 
77 /* mbed TLS modules */
78 #define MBEDTLS_AES_C
79 #define MBEDTLS_ASN1_PARSE_C
80 #define MBEDTLS_ASN1_WRITE_C
81 #define MBEDTLS_BIGNUM_C
82 #define MBEDTLS_CIPHER_C
83 #define MBEDTLS_CTR_DRBG_C
84 #define MBEDTLS_ECDH_C
85 #define MBEDTLS_ECDSA_C
86 #define MBEDTLS_ECP_C
87 #define MBEDTLS_ENTROPY_C
88 #define MBEDTLS_GCM_C
89 #define MBEDTLS_MD_C
90 #define MBEDTLS_NET_C
91 #define MBEDTLS_OID_C
92 #define MBEDTLS_PK_C
93 #define MBEDTLS_PK_PARSE_C
94 #define MBEDTLS_SHA224_C
95 #define MBEDTLS_SHA256_C
96 #define MBEDTLS_SHA384_C
97 #define MBEDTLS_SHA512_C
98 #define MBEDTLS_SSL_CLI_C
99 #define MBEDTLS_SSL_SRV_C
100 #define MBEDTLS_SSL_TLS_C
101 #define MBEDTLS_X509_CRT_PARSE_C
102 #define MBEDTLS_X509_USE_C
103 
104 /* For test certificates */
105 #define MBEDTLS_BASE64_C
106 #define MBEDTLS_CERTS_C
107 #define MBEDTLS_PEM_PARSE_C
108 
109 /* Save RAM at the expense of ROM */
110 #define MBEDTLS_AES_ROM_TABLES
111 
112 /* Save RAM by adjusting to our exact needs */
113 #define MBEDTLS_MPI_MAX_SIZE    48 // 384 bits is 48 bytes
114 
115 /* Save RAM at the expense of speed, see ecp.h */
116 #define MBEDTLS_ECP_WINDOW_SIZE        2
117 #define MBEDTLS_ECP_FIXED_POINT_OPTIM  0
118 
119 /* Significant speed benefit at the expense of some ROM */
120 #define MBEDTLS_ECP_NIST_OPTIM
121 
122 /*
123  * You should adjust this to the exact number of sources you're using: default
124  * is the "mbedtls_platform_entropy_poll" source, but you may want to add other ones.
125  * Minimum is 2 for the entropy test suite.
126  */
127 #define MBEDTLS_ENTROPY_MAX_SOURCES 2
128 
129 /* Save ROM and a few bytes of RAM by specifying our own ciphersuite list */
130 #define MBEDTLS_SSL_CIPHERSUITES                        \
131     MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,    \
132     MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
133 
134 /*
135  * Save RAM at the expense of interoperability: do this only if you control
136  * both ends of the connection!  (See comments in "mbedtls/ssl.h".)
137  * The minimum size here depends on the certificate chain used as well as the
138  * typical size of records.
139  */
140 #define MBEDTLS_SSL_MAX_CONTENT_LEN             1024
141 
142 #include "mbedtls/check_config.h"
143 
144 #endif /* MBEDTLS_CONFIG_H */
145