Bence Szépkúti | 5ab7303 | 2021-05-27 11:25:03 +0200 | [diff] [blame] | 1 | /** |
Ronald Cron | 135f2ae | 2023-02-08 12:25:38 +0100 | [diff] [blame] | 2 | * \file mbedtls/build_info.h |
Bence Szépkúti | 5ab7303 | 2021-05-27 11:25:03 +0200 | [diff] [blame] | 3 | * |
| 4 | * \brief Build-time configuration info |
| 5 | * |
| 6 | * Include this file if you need to depend on the |
Bence Szépkúti | e55a821 | 2021-06-28 15:15:56 +0100 | [diff] [blame] | 7 | * configuration options defined in mbedtls_config.h or MBEDTLS_CONFIG_FILE |
Bence Szépkúti | 5ab7303 | 2021-05-27 11:25:03 +0200 | [diff] [blame] | 8 | */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 9 | /* |
| 10 | * Copyright The Mbed TLS Contributors |
| 11 | * SPDX-License-Identifier: Apache-2.0 |
| 12 | * |
| 13 | * Licensed under the Apache License, Version 2.0 (the "License"); you may |
| 14 | * not use this file except in compliance with the License. |
| 15 | * You may obtain a copy of the License at |
| 16 | * |
| 17 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 18 | * |
| 19 | * Unless required by applicable law or agreed to in writing, software |
| 20 | * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| 21 | * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 22 | * See the License for the specific language governing permissions and |
| 23 | * limitations under the License. |
| 24 | */ |
Bence Szépkúti | 5ab7303 | 2021-05-27 11:25:03 +0200 | [diff] [blame] | 25 | |
| 26 | #ifndef MBEDTLS_BUILD_INFO_H |
| 27 | #define MBEDTLS_BUILD_INFO_H |
| 28 | |
Bence Szépkúti | 04982f7 | 2021-06-21 14:40:51 +0200 | [diff] [blame] | 29 | /* |
| 30 | * This set of compile-time defines can be used to determine the version number |
Bence Szépkúti | 1b2a883 | 2021-06-28 10:26:11 +0100 | [diff] [blame] | 31 | * of the Mbed TLS library used. Run-time variables for the same can be found in |
Bence Szépkúti | 04982f7 | 2021-06-21 14:40:51 +0200 | [diff] [blame] | 32 | * version.h |
| 33 | */ |
| 34 | |
| 35 | /** |
| 36 | * The version number x.y.z is split into three parts. |
| 37 | * Major, Minor, Patchlevel |
| 38 | */ |
Dave Rodgman | 1bc9e93 | 2021-07-01 09:20:13 +0100 | [diff] [blame] | 39 | #define MBEDTLS_VERSION_MAJOR 3 |
Paul Elliott | db67e99 | 2023-03-23 10:57:39 +0000 | [diff] [blame] | 40 | #define MBEDTLS_VERSION_MINOR 4 |
Dave Rodgman | 48223bc | 2022-12-08 14:43:19 +0000 | [diff] [blame] | 41 | #define MBEDTLS_VERSION_PATCH 0 |
Bence Szépkúti | 04982f7 | 2021-06-21 14:40:51 +0200 | [diff] [blame] | 42 | |
| 43 | /** |
| 44 | * The single version number has the following structure: |
| 45 | * MMNNPP00 |
| 46 | * Major version | Minor version | Patch version |
| 47 | */ |
Paul Elliott | db67e99 | 2023-03-23 10:57:39 +0000 | [diff] [blame] | 48 | #define MBEDTLS_VERSION_NUMBER 0x03040000 |
| 49 | #define MBEDTLS_VERSION_STRING "3.4.0" |
| 50 | #define MBEDTLS_VERSION_STRING_FULL "mbed TLS 3.4.0" |
Bence Szépkúti | 04982f7 | 2021-06-21 14:40:51 +0200 | [diff] [blame] | 51 | |
Bence Szépkúti | c5c9eb4 | 2021-05-27 23:31:30 +0200 | [diff] [blame] | 52 | #if defined(_MSC_VER) && !defined(_CRT_SECURE_NO_DEPRECATE) |
| 53 | #define _CRT_SECURE_NO_DEPRECATE 1 |
| 54 | #endif |
| 55 | |
Gilles Peskine | 6157fee | 2022-11-23 16:13:13 +0100 | [diff] [blame] | 56 | /* Define `inline` on some non-C99-compliant compilers. */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 57 | #if (defined(__ARMCC_VERSION) || defined(_MSC_VER)) && \ |
Gilles Peskine | 6157fee | 2022-11-23 16:13:13 +0100 | [diff] [blame] | 58 | !defined(inline) && !defined(__cplusplus) |
| 59 | #define inline __inline |
| 60 | #endif |
| 61 | |
Bence Szépkúti | 5ab7303 | 2021-05-27 11:25:03 +0200 | [diff] [blame] | 62 | #if !defined(MBEDTLS_CONFIG_FILE) |
Bence Szépkúti | bb0cfeb | 2021-05-28 09:42:25 +0200 | [diff] [blame] | 63 | #include "mbedtls/mbedtls_config.h" |
Bence Szépkúti | 5ab7303 | 2021-05-27 11:25:03 +0200 | [diff] [blame] | 64 | #else |
| 65 | #include MBEDTLS_CONFIG_FILE |
| 66 | #endif |
| 67 | |
Bence Szépkúti | 1cafe5c | 2021-06-22 09:30:08 +0200 | [diff] [blame] | 68 | #if defined(MBEDTLS_CONFIG_VERSION) && ( \ |
| 69 | MBEDTLS_CONFIG_VERSION < 0x03000000 || \ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 70 | MBEDTLS_CONFIG_VERSION > MBEDTLS_VERSION_NUMBER) |
Bence Szépkúti | b2e23de | 2021-06-21 15:53:07 +0200 | [diff] [blame] | 71 | #error "Invalid config version, defined value of MBEDTLS_CONFIG_VERSION is unsupported" |
Bence Szépkúti | ba7248a | 2021-05-31 16:53:56 +0200 | [diff] [blame] | 72 | #endif |
| 73 | |
Bence Szépkúti | c5c9eb4 | 2021-05-27 23:31:30 +0200 | [diff] [blame] | 74 | /* Target and application specific configurations |
| 75 | * |
| 76 | * Allow user to override any previous default. |
| 77 | * |
| 78 | */ |
| 79 | #if defined(MBEDTLS_USER_CONFIG_FILE) |
| 80 | #include MBEDTLS_USER_CONFIG_FILE |
| 81 | #endif |
| 82 | |
Yanray Wang | 1ed226f | 2023-05-05 11:31:11 +0800 | [diff] [blame] | 83 | /* Auto-enable MBEDTLS_CTR_DRBG_USE_128_BIT_KEY if |
| 84 | * MBEDTLS_AES_ONLY_128_BIT_KEY_LENGTH and MBEDTLS_CTR_DRBG_C defined |
| 85 | * to ensure a 128-bit key size in CTR_DRBG. |
| 86 | */ |
| 87 | #if defined(MBEDTLS_AES_ONLY_128_BIT_KEY_LENGTH) && defined(MBEDTLS_CTR_DRBG_C) |
| 88 | #define MBEDTLS_CTR_DRBG_USE_128_BIT_KEY |
| 89 | #endif |
| 90 | |
Manuel Pégourié-Gonnard | 49e67f8 | 2023-03-16 11:39:20 +0100 | [diff] [blame] | 91 | /* Auto-enable MBEDTLS_MD_C if needed by a module that didn't require it |
| 92 | * in a previous release, to ensure backwards compatibility. |
| 93 | */ |
| 94 | #if defined(MBEDTLS_PKCS5_C) |
| 95 | #define MBEDTLS_MD_C |
| 96 | #endif |
| 97 | |
Yanray Wang | 419a55e | 2023-05-17 18:22:00 +0800 | [diff] [blame] | 98 | /* PSA crypto specific configuration options |
| 99 | * - If config_psa.h reads a configuration option in preprocessor directive, |
Yanray Wang | 37db332 | 2023-05-22 16:50:35 +0800 | [diff] [blame] | 100 | * this symbol should be set before its inclusion. (e.g. MBEDTLS_MD_C) |
Yanray Wang | 419a55e | 2023-05-17 18:22:00 +0800 | [diff] [blame] | 101 | * - If config_psa.h writes a configuration option in conditional directive, |
| 102 | * this symbol should be consulted after its inclusion. |
| 103 | * (e.g. MBEDTLS_MD_LIGHT) |
| 104 | */ |
Yanray Wang | 6397673 | 2023-05-17 12:41:25 +0800 | [diff] [blame] | 105 | #if defined(MBEDTLS_PSA_CRYPTO_CONFIG) /* PSA_WANT_xxx influences MBEDTLS_xxx */ || \ |
| 106 | defined(MBEDTLS_PSA_CRYPTO_C) /* MBEDTLS_xxx influences PSA_WANT_xxx */ |
| 107 | #include "mbedtls/config_psa.h" |
| 108 | #endif |
| 109 | |
Manuel Pégourié-Gonnard | b9b630d | 2023-02-16 19:07:31 +0100 | [diff] [blame] | 110 | /* Auto-enable MBEDTLS_MD_LIGHT based on MBEDTLS_MD_C. |
| 111 | * This allows checking for MD_LIGHT rather than MD_LIGHT || MD_C. |
| 112 | */ |
| 113 | #if defined(MBEDTLS_MD_C) |
| 114 | #define MBEDTLS_MD_LIGHT |
| 115 | #endif |
| 116 | |
Manuel Pégourié-Gonnard | 49e67f8 | 2023-03-16 11:39:20 +0100 | [diff] [blame] | 117 | /* Auto-enable MBEDTLS_MD_LIGHT if needed by a module that didn't require it |
| 118 | * in a previous release, to ensure backwards compatibility. |
Manuel Pégourié-Gonnard | 8316209 | 2023-03-06 23:58:50 +0100 | [diff] [blame] | 119 | */ |
Manuel Pégourié-Gonnard | 41bc8b6 | 2023-03-14 23:59:24 +0100 | [diff] [blame] | 120 | #if defined(MBEDTLS_ECJPAKE_C) || \ |
| 121 | defined(MBEDTLS_PEM_PARSE_C) || \ |
Manuel Pégourié-Gonnard | 5cd4b64 | 2023-02-02 13:14:59 +0100 | [diff] [blame] | 122 | defined(MBEDTLS_ENTROPY_C) || \ |
Manuel Pégourié-Gonnard | 9b41eb8 | 2023-03-28 11:14:24 +0200 | [diff] [blame] | 123 | defined(MBEDTLS_PK_C) || \ |
Manuel Pégourié-Gonnard | be97afe | 2023-03-16 10:00:54 +0100 | [diff] [blame] | 124 | defined(MBEDTLS_PKCS12_C) || \ |
Manuel Pégourié-Gonnard | 9b41eb8 | 2023-03-28 11:14:24 +0200 | [diff] [blame] | 125 | defined(MBEDTLS_RSA_C) || \ |
Manuel Pégourié-Gonnard | 2d6d993 | 2023-03-28 11:38:08 +0200 | [diff] [blame] | 126 | defined(MBEDTLS_SSL_TLS_C) || \ |
| 127 | defined(MBEDTLS_X509_USE_C) || \ |
| 128 | defined(MBEDTLS_X509_CREATE_C) |
Manuel Pégourié-Gonnard | 8316209 | 2023-03-06 23:58:50 +0100 | [diff] [blame] | 129 | #define MBEDTLS_MD_LIGHT |
| 130 | #endif |
| 131 | |
Valerio Setti | 4922ba1 | 2023-06-14 11:30:30 +0200 | [diff] [blame] | 132 | /* MBEDTLS_ECP_LIGHT is auto-enabled by the following symbols: |
| 133 | * - MBEDTLS_ECP_C because now it consists of MBEDTLS_ECP_LIGHT plus functions |
| 134 | * for curve arithmetic. As a consequence if MBEDTLS_ECP_C is required for |
| 135 | * some reason, then MBEDTLS_ECP_LIGHT should be enabled as well. |
| 136 | * - MBEDTLS_PK_PARSE_EC_EXTENDED and MBEDTLS_PK_PARSE_EC_COMPRESSED because |
| 137 | * these features are not supported in PSA so the only way to have them is |
| 138 | * to enable the built-in solution. |
Valerio Setti | a18385b | 2023-06-19 11:34:28 +0200 | [diff] [blame] | 139 | * Both of them are temporary dependencies: |
| 140 | * - PK_PARSE_EC_EXTENDED will be removed after #7779 and #7789 |
| 141 | * - support for compressed points should also be added to PSA, but in this |
| 142 | * case there is no associated issue to track it yet. |
Valerio Setti | 4922ba1 | 2023-06-14 11:30:30 +0200 | [diff] [blame] | 143 | * - PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE because Weierstrass key derivation |
Valerio Setti | a18385b | 2023-06-19 11:34:28 +0200 | [diff] [blame] | 144 | * still depends on ECP_LIGHT. |
Valerio Setti | 4922ba1 | 2023-06-14 11:30:30 +0200 | [diff] [blame] | 145 | * - PK_C + USE_PSA + PSA_WANT_ALG_ECDSA is a temporary dependency which will |
Valerio Setti | a18385b | 2023-06-19 11:34:28 +0200 | [diff] [blame] | 146 | * be fixed by #7453. |
Valerio Setti | 4922ba1 | 2023-06-14 11:30:30 +0200 | [diff] [blame] | 147 | */ |
| 148 | #if defined(MBEDTLS_ECP_C) || \ |
| 149 | defined(MBEDTLS_PK_PARSE_EC_EXTENDED) || \ |
| 150 | defined(MBEDTLS_PK_PARSE_EC_COMPRESSED) || \ |
Valerio Setti | f54ca35 | 2023-06-15 12:09:30 +0200 | [diff] [blame] | 151 | defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_DERIVE) |
Valerio Setti | fd122f4 | 2023-04-05 18:15:32 +0200 | [diff] [blame] | 152 | #define MBEDTLS_ECP_LIGHT |
| 153 | #endif |
| 154 | |
Valerio Setti | fdf15dd | 2023-06-16 12:50:34 +0200 | [diff] [blame] | 155 | /* MBEDTLS_PK_PARSE_EC_COMPRESSED is introduced in MbedTLS version 3.5, while |
| 156 | * in previous version compressed points were automatically supported as long |
| 157 | * as PK_PARSE_C and ECP_C were enabled. As a consequence, for backward |
| 158 | * compatibility, we auto-enable PK_PARSE_EC_COMPRESSED when these conditions |
| 159 | * are met. */ |
| 160 | #if defined(MBEDTLS_PK_PARSE_C) && defined(MBEDTLS_ECP_C) |
| 161 | #define MBEDTLS_PK_PARSE_EC_COMPRESSED |
| 162 | #endif |
| 163 | |
Valerio Setti | a15078b | 2023-07-06 14:52:45 +0200 | [diff] [blame^] | 164 | /* PK module can achieve ECDH and ECDSA functionalities by means of either |
| 165 | * software implementations (ECDH_C and ECDSA_C) or through a PSA driver. The |
| 166 | * following defines are meant to list these capabilities in a general way |
| 167 | * which abstracts how they are implemented under the hood. */ |
| 168 | #if (defined(MBEDTLS_USE_PSA_CRYPTO) && defined(PSA_WANT_ALG_ECDH)) || \ |
| 169 | (!defined(MBEDTLS_USE_PSA_CRYPTO) && defined(MBEDTLS_ECDH_C)) |
| 170 | #define MBEDTLS_PK_CAN_ECDH |
| 171 | #endif |
| 172 | |
| 173 | #if !defined(MBEDTLS_USE_PSA_CRYPTO) |
| 174 | #if defined(MBEDTLS_ECDSA_C) |
| 175 | #define MBEDTLS_PK_CAN_ECDSA_SIGN |
| 176 | #define MBEDTLS_PK_CAN_ECDSA_VERIFY |
| 177 | #endif /* MBEDTLS_ECDSA_C */ |
| 178 | #else /* MBEDTLS_USE_PSA_CRYPTO */ |
| 179 | #if defined(PSA_WANT_ALG_ECDSA) |
| 180 | #if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC) |
| 181 | #define MBEDTLS_PK_CAN_ECDSA_SIGN |
| 182 | #endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC */ |
| 183 | #if defined(PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY) |
| 184 | #define MBEDTLS_PK_CAN_ECDSA_VERIFY |
| 185 | #endif /* PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY */ |
| 186 | #endif /* PSA_WANT_ALG_ECDSA */ |
| 187 | #endif /* MBEDTLS_USE_PSA_CRYPTO */ |
| 188 | |
| 189 | #if defined(MBEDTLS_PK_CAN_ECDSA_VERIFY) || defined(MBEDTLS_PK_CAN_ECDSA_SIGN) |
| 190 | #define MBEDTLS_PK_CAN_ECDSA_SOME |
| 191 | #endif |
| 192 | |
Gilles Peskine | 95c9152 | 2023-02-22 22:20:24 +0100 | [diff] [blame] | 193 | /* If MBEDTLS_PSA_CRYPTO_C is defined, make sure MBEDTLS_PSA_CRYPTO_CLIENT |
| 194 | * is defined as well to include all PSA code. |
| 195 | */ |
| 196 | #if defined(MBEDTLS_PSA_CRYPTO_C) |
| 197 | #define MBEDTLS_PSA_CRYPTO_CLIENT |
| 198 | #endif /* MBEDTLS_PSA_CRYPTO_C */ |
| 199 | |
Gilles Peskine | fd94304 | 2022-10-11 20:59:29 +0200 | [diff] [blame] | 200 | /* The PK wrappers need pk_write functions to format RSA key objects |
| 201 | * when they are dispatching to the PSA API. This happens under USE_PSA_CRYPTO, |
Gilles Peskine | bbccdd4 | 2022-10-04 23:00:42 +0200 | [diff] [blame] | 202 | * and also even without USE_PSA_CRYPTO for mbedtls_pk_sign_ext(). */ |
Gilles Peskine | fd94304 | 2022-10-11 20:59:29 +0200 | [diff] [blame] | 203 | #if defined(MBEDTLS_PSA_CRYPTO_C) && defined(MBEDTLS_RSA_C) |
| 204 | #define MBEDTLS_PK_C |
| 205 | #define MBEDTLS_PK_WRITE_C |
Gilles Peskine | fcee740 | 2022-10-11 21:15:24 +0200 | [diff] [blame] | 206 | #define MBEDTLS_PK_PARSE_C |
Gilles Peskine | fd94304 | 2022-10-11 20:59:29 +0200 | [diff] [blame] | 207 | #endif |
| 208 | |
Manuel Pégourié-Gonnard | 5a51d0d | 2023-03-22 13:04:08 +0100 | [diff] [blame] | 209 | /* The following blocks make it easier to disable all of TLS, |
| 210 | * or of TLS 1.2 or 1.3 or DTLS, without having to manually disable all |
Manuel Pégourié-Gonnard | 70a1b6d | 2023-03-24 10:30:40 +0100 | [diff] [blame] | 211 | * key exchanges, options and extensions related to them. */ |
Manuel Pégourié-Gonnard | 5a51d0d | 2023-03-22 13:04:08 +0100 | [diff] [blame] | 212 | |
| 213 | #if !defined(MBEDTLS_SSL_TLS_C) |
| 214 | #undef MBEDTLS_SSL_CLI_C |
| 215 | #undef MBEDTLS_SSL_SRV_C |
| 216 | #undef MBEDTLS_SSL_PROTO_TLS1_3 |
| 217 | #undef MBEDTLS_SSL_PROTO_TLS1_2 |
| 218 | #undef MBEDTLS_SSL_PROTO_DTLS |
| 219 | #endif |
| 220 | |
| 221 | #if !defined(MBEDTLS_SSL_PROTO_DTLS) |
| 222 | #undef MBEDTLS_SSL_DTLS_ANTI_REPLAY |
| 223 | #undef MBEDTLS_SSL_DTLS_CONNECTION_ID |
| 224 | #undef MBEDTLS_SSL_DTLS_CONNECTION_ID_COMPAT |
| 225 | #undef MBEDTLS_SSL_DTLS_HELLO_VERIFY |
| 226 | #undef MBEDTLS_SSL_DTLS_SRTP |
| 227 | #undef MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE |
| 228 | #endif |
| 229 | |
Ronald Cron | 571f1ff | 2022-10-04 09:33:27 +0200 | [diff] [blame] | 230 | #if !defined(MBEDTLS_SSL_PROTO_TLS1_2) |
Manuel Pégourié-Gonnard | 5a51d0d | 2023-03-22 13:04:08 +0100 | [diff] [blame] | 231 | #undef MBEDTLS_SSL_ENCRYPT_THEN_MAC |
| 232 | #undef MBEDTLS_SSL_EXTENDED_MASTER_SECRET |
| 233 | #undef MBEDTLS_SSL_RENEGOTIATION |
Ronald Cron | 571f1ff | 2022-10-04 09:33:27 +0200 | [diff] [blame] | 234 | #undef MBEDTLS_KEY_EXCHANGE_RSA_ENABLED |
| 235 | #undef MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED |
| 236 | #undef MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED |
| 237 | #undef MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED |
| 238 | #undef MBEDTLS_KEY_EXCHANGE_PSK_ENABLED |
| 239 | #undef MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED |
| 240 | #undef MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED |
| 241 | #undef MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED |
| 242 | #undef MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED |
| 243 | #undef MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED |
| 244 | #undef MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED |
| 245 | #endif |
| 246 | |
Ronald Cron | d8d2ea5 | 2022-10-04 15:48:06 +0200 | [diff] [blame] | 247 | #if !defined(MBEDTLS_SSL_PROTO_TLS1_3) |
| 248 | #undef MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_ENABLED |
| 249 | #undef MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED |
| 250 | #undef MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL_ENABLED |
Xiaokang Qian | 4ef4c89 | 2022-10-25 13:39:16 +0000 | [diff] [blame] | 251 | #undef MBEDTLS_SSL_EARLY_DATA |
Ronald Cron | d8d2ea5 | 2022-10-04 15:48:06 +0200 | [diff] [blame] | 252 | #endif |
| 253 | |
| 254 | #if defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_ENABLED) || \ |
| 255 | defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL_ENABLED) |
| 256 | #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_SOME_PSK_ENABLED |
| 257 | #endif |
| 258 | |
| 259 | #if defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED) || \ |
| 260 | defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL_ENABLED) |
| 261 | #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_SOME_EPHEMERAL_ENABLED |
| 262 | #endif |
| 263 | |
Przemek Stekiel | 98d7933 | 2023-06-26 12:44:33 +0200 | [diff] [blame] | 264 | #if defined(MBEDTLS_SSL_PROTO_TLS1_2) && \ |
| 265 | (defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C) || \ |
| 266 | defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)) |
| 267 | #define MBEDTLS_SSL_TLS1_2_SOME_ECC |
| 268 | #endif |
| 269 | |
Przemek Stekiel | a06787a | 2022-09-02 14:41:44 +0200 | [diff] [blame] | 270 | /* Make sure all configuration symbols are set before including check_config.h, |
| 271 | * even the ones that are calculated programmatically. */ |
Bence Szépkúti | c5c9eb4 | 2021-05-27 23:31:30 +0200 | [diff] [blame] | 272 | #include "mbedtls/check_config.h" |
| 273 | |
Bence Szépkúti | 5ab7303 | 2021-05-27 11:25:03 +0200 | [diff] [blame] | 274 | #endif /* MBEDTLS_BUILD_INFO_H */ |