Programming Assignment Help-MAH_040516_75725_1_148559

/*-
* Copyright (c) 1992, 1993
*    The Regents of the University of California.  All rights reserved.
*
* This software was developed by the Computer Systems Engineering group
* at Lawrence Berkeley Laboratory under DARPA contract BG 91-66 and
* contributed to Berkeley.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
*    notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
*    notice, this list of conditions and the following disclaimer in the
*    documentation and/or other materials provided with the distribution.
* 3. Neither the name of the University nor the names of its contributors
*    may be used to endorse or promote products derived from this software
*    without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS “AS IS” AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
* From:
*     @(#)adddi3.c    8.1 (Berkeley) 6/4/93
*    NetBSD: adddi3.c,v 1.1 2005/12/20 19:28:51 christos Exp
*/

#include “longlong.h”

/*
* Add two long longs. This is trivial since a one-bit carry from a
* single unsigned int addition x+y occurs if and only if the sum x+y
* is less than either x or y (the choice to compare with x or y is
* arbitrary).
*/
long long
__adddi3(long long a, long long b)
{
union uu aa, bb, sum;

aa.ll = a;
bb.ll = b;
sum.ui[L] = aa.ui[L] + bb.ui[L];
sum.ui[H] = aa.ui[H] + bb.ui[H] + (sum.ui[L] < bb.ui[L]);
return (sum.ll);
}
/*-
* Copyright (c) 1992, 1993
*    The Regents of the University of California.  All rights reserved.
*
* This software was developed by the Computer Systems Engineering group
* at Lawrence Berkeley Laboratory under DARPA contract BG 91-66 and
* contributed to Berkeley.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
*    notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
*    notice, this list of conditions and the following disclaimer in the
*    documentation and/or other materials provided with the distribution.
* 3. Neither the name of the University nor the names of its contributors
*    may be used to endorse or promote products derived from this software
*    without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS “AS IS” AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
* From:
*     @(#)anddi3.c    8.1 (Berkeley) 6/4/93
*    NetBSD: anddi3.c,v 1.1 2005/12/20 19:28:51 christos Exp
*/

#include “longlong.h”

/*
* Return a & b, in long long.
*/
long long
__anddi3(long long a, long long b)
{
union uu aa, bb;

aa.ll = a;
bb.ll = b;
aa.ui[0] &= bb.ui[0];
aa.ui[1] &= bb.ui[1];
return (aa.ll);
}
/*-
* Copyright (c) 1992, 1993
*    The Regents of the University of California.  All rights reserved.
*
* This software was developed by the Computer Systems Engineering group
* at Lawrence Berkeley Laboratory under DARPA contract BG 91-66 and
* contributed to Berkeley.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
*    notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
*    notice, this list of conditions and the following disclaimer in the
*    documentation and/or other materials provided with the distribution.
* 3. Neither the name of the University nor the names of its contributors
*    may be used to endorse or promote products derived from this software
*    without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS “AS IS” AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
* From:
*      @(#)ashldi3.c    8.1 (Berkeley) 6/4/93
*    NetBSD: ashldi3.c,v 1.1 2005/12/20 19:28:51 christos Exp
*/

#include “longlong.h”

/*
* Shift a (signed) long long value left (arithmetic shift left).
* This is the same as logical shift left!
*/
long long
__ashldi3(long long a, unsigned int shift)
{
union uu aa;

if (shift == 0)
return(a);
aa.ll = a;
if (shift >= INT_BITS) {
aa.ui[H] = aa.ui[L] << (shift – INT_BITS);
aa.ui[L] = 0;
} else {
aa.ui[H] = (aa.ui[H] << shift) |
(aa.ui[L] >> (INT_BITS – shift));
aa.ui[L] <<= shift;
}
return (aa.ll);
}
/*
* Copyright (c) 2000, 2001, 2002, 2003, 2004, 2005, 2008, 2009
*    The President and Fellows of Harvard College.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
*    notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
*    notice, this list of conditions and the following disclaimer in the
*    documentation and/or other materials provided with the distribution.
* 3. Neither the name of the University nor the names of its contributors
*    may be used to endorse or promote products derived from this software
*    without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE UNIVERSITY AND CONTRIBUTORS “AS IS” AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED.  IN NO EVENT SHALL THE UNIVERSITY OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*/

/*
* setjmp and longjmp for MIPS.
*/

#include <kern/mips/regdefs.h>

.text
.set noreorder

/*
* int setjmp(jmp_buf jb);
*
* Save the current state so we can return again from the call later
* if/when longjmp is called. (If the function that called setjmp
* returns before longjmp is called, the results are undefined. We
* only need to save registers, not the whole contents of the stack.)
*/

.globl setjmp
.type setjmp,@function
.ent setjmp
setjmp:
/*
* jmp_buf is in a0. We need to save s0-s8, sp, and ra in it.
* Don’t store more registers without adjusting machine/setjmp.h.
*/

sw sp, 0(a0)        /* save registers */
sw ra, 4(a0)
sw s0, 8(a0)
sw s1, 12(a0)
sw s2, 16(a0)
sw s3, 20(a0)
sw s4, 24(a0)
sw s5, 28(a0)
sw s6, 32(a0)
sw s7, 36(a0)
sw s8, 40(a0)

j ra            /* done */
li v0, 0        /* return 0 (in delay slot) */
.end setjmp

/*
* void longjmp(jmp_buf jb, int code);
*/
.globl longjmp
.type longjmp,@function
.ent longjmp
longjmp:
/*
* jmp_buf is in a0. Return code is in a1.
* We need to restore s0-s8, sp, and ra from the jmp_buf.
* The return code is forced to 1 if 0 is passed in.
*/

sltiu t0, a1, 1    /* set t0 to 1 if return code is 0… otherwise 0 */
addu a1, a1, t0    /* update the return code */

lw sp, 0(a0)        /* restore registers */
lw ra, 4(a0)
lw s0, 8(a0)
lw s1, 12(a0)
lw s2, 16(a0)
lw s3, 20(a0)
lw s4, 24(a0)
lw s5, 28(a0)
lw s6, 32(a0)
lw s7, 36(a0)
lw s8, 40(a0)

j ra            /* return, to where setjmp was called from */
move v0, a1        /* set return value */
.end longjmp
/**
* \file config.h
*
* \brief Configuration options (set of defines)
*
*  This set of compile-time options may be used to enable
*  or disable features selectively, and reduce the global
*  memory footprint.
*
*  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved
*  SPDX-License-Identifier: Apache-2.0
*
*  Licensed under the Apache License, Version 2.0 (the “License”); you may
*  not use this file except in compliance with the License.
*  You may obtain a copy of the License at
*
*  http://www.apache.org/licenses/LICENSE-2.0
*
*  Unless required by applicable law or agreed to in writing, software
*  distributed under the License is distributed on an “AS IS” BASIS, WITHOUT
*  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
*  See the License for the specific language governing permissions and
*  limitations under the License.
*
*  This file is part of mbed TLS (https://tls.mbed.org)
*/

#ifndef MBEDTLS_CONFIG_H
#define MBEDTLS_CONFIG_H

#if defined(_MSC_VER) && !defined(_CRT_SECURE_NO_DEPRECATE)
#define _CRT_SECURE_NO_DEPRECATE 1
#endif

/**
* \name SECTION: System support
*
* This section sets system specific settings.
* \{
*/

/**
* \def MBEDTLS_HAVE_ASM
*
* The compiler has support for asm().
*
* Requires support for asm() in compiler.
*
* Used in:
*      library/timing.c
*      library/padlock.c
*      include/mbedtls/bn_mul.h
*
* Comment to disable the use of assembly code.
*/
#define MBEDTLS_HAVE_ASM

/**
* \def MBEDTLS_HAVE_SSE2
*
* CPU supports SSE2 instruction set.
*
* Uncomment if the CPU supports SSE2 (IA-32 specific).
*/
//#define MBEDTLS_HAVE_SSE2

/**
* \def MBEDTLS_HAVE_TIME
*
* System has time.h and time().
* The time does not need to be correct, only time differences are used,
* by contrast with MBEDTLS_HAVE_TIME_DATE
*
* Comment if your system does not support time functions
*/
#define MBEDTLS_HAVE_TIME

/**
* \def MBEDTLS_HAVE_TIME_DATE
*
* System has time.h and time(), gmtime() and the clock is correct.
* The time needs to be correct (not necesarily very accurate, but at least
* the date should be correct). This is used to verify the validity period of
* X.509 certificates.
*
* Comment if your system does not have a correct clock.
*/
#define MBEDTLS_HAVE_TIME_DATE

/**
* \def MBEDTLS_PLATFORM_MEMORY
*
* Enable the memory allocation layer.
*
* By default mbed TLS uses the system-provided calloc() and free().
* This allows different allocators (self-implemented or provided) to be
* provided to the platform abstraction layer.
*
* Enabling MBEDTLS_PLATFORM_MEMORY without the
* MBEDTLS_PLATFORM_{FREE,CALLOC}_MACROs will provide
* “mbedtls_platform_set_calloc_free()” allowing you to set an alternative calloc() and
* free() function pointer at runtime.
*
* Enabling MBEDTLS_PLATFORM_MEMORY and specifying
* MBEDTLS_PLATFORM_{CALLOC,FREE}_MACROs will allow you to specify the
* alternate function at compile time.
*
* Requires: MBEDTLS_PLATFORM_C
*
* Enable this layer to allow use of alternative memory allocators.
*/
//#define MBEDTLS_PLATFORM_MEMORY

/**
* \def MBEDTLS_PLATFORM_NO_STD_FUNCTIONS
*
* Do not assign standard functions in the platform layer (e.g. calloc() to
* MBEDTLS_PLATFORM_STD_CALLOC and printf() to MBEDTLS_PLATFORM_STD_PRINTF)
*
* This makes sure there are no linking errors on platforms that do not support
* these functions. You will HAVE to provide alternatives, either at runtime
* via the platform_set_xxx() functions or at compile time by setting
* the MBEDTLS_PLATFORM_STD_XXX defines, or enabling a
* MBEDTLS_PLATFORM_XXX_MACRO.
*
* Requires: MBEDTLS_PLATFORM_C
*
* Uncomment to prevent default assignment of standard functions in the
* platform layer.
*/
//#define MBEDTLS_PLATFORM_NO_STD_FUNCTIONS

/**
* \def MBEDTLS_PLATFORM_EXIT_ALT
*
* MBEDTLS_PLATFORM_XXX_ALT: Uncomment a macro to let mbed TLS support the
* function in the platform abstraction layer.
*
* Example: In case you uncomment MBEDTLS_PLATFORM_PRINTF_ALT, mbed TLS will
* provide a function “mbedtls_platform_set_printf()” that allows you to set an
* alternative printf function pointer.
*
* All these define require MBEDTLS_PLATFORM_C to be defined!
*
* \note MBEDTLS_PLATFORM_SNPRINTF_ALT is required on Windows;
* it will be enabled automatically by check_config.h
*
* \warning MBEDTLS_PLATFORM_XXX_ALT cannot be defined at the same time as
* MBEDTLS_PLATFORM_XXX_MACRO!
*
* Uncomment a macro to enable alternate implementation of specific base
* platform function
*/
//#define MBEDTLS_PLATFORM_EXIT_ALT
//#define MBEDTLS_PLATFORM_FPRINTF_ALT
//#define MBEDTLS_PLATFORM_PRINTF_ALT
//#define MBEDTLS_PLATFORM_SNPRINTF_ALT

/**
* \def MBEDTLS_DEPRECATED_WARNING
*
* Mark deprecated functions so that they generate a warning if used.
* Functions deprecated in one version will usually be removed in the next
* version. You can enable this to help you prepare the transition to a new
* major version by making sure your code is not using these functions.
*
* This only works with GCC and Clang. With other compilers, you may want to
* use MBEDTLS_DEPRECATED_REMOVED
*
* Uncomment to get warnings on using deprecated functions.
*/
//#define MBEDTLS_DEPRECATED_WARNING

/**
* \def MBEDTLS_DEPRECATED_REMOVED
*
* Remove deprecated functions so that they generate an error if used.
* Functions deprecated in one version will usually be removed in the next
* version. You can enable this to help you prepare the transition to a new
* major version by making sure your code is not using these functions.
*
* Uncomment to get errors on using deprecated functions.
*/
//#define MBEDTLS_DEPRECATED_REMOVED

/* \} name SECTION: System support */

/**
* \name SECTION: mbed TLS feature support
*
* This section sets support for features that are or are not needed
* within the modules that are enabled.
* \{
*/

/**
* \def MBEDTLS_TIMING_ALT
*
* Uncomment to provide your own alternate implementation for mbedtls_timing_hardclock(),
* mbedtls_timing_get_timer(), mbedtls_set_alarm(), mbedtls_set/get_delay()
*
* Only works if you have MBEDTLS_TIMING_C enabled.
*
* You will need to provide a header “timing_alt.h” and an implementation at
* compile time.
*/
//#define MBEDTLS_TIMING_ALT

/**
* \def MBEDTLS_AES_ALT
*
* MBEDTLS__MODULE_NAME__ALT: Uncomment a macro to let mbed TLS use your
* alternate core implementation of a symmetric crypto or hash module (e.g.
* platform specific assembly optimized implementations). Keep in mind that
* the function prototypes should remain the same.
*
* This replaces the whole module. If you only want to replace one of the
* functions, use one of the MBEDTLS__FUNCTION_NAME__ALT flags.
*
* Example: In case you uncomment MBEDTLS_AES_ALT, mbed TLS will no longer
* provide the “struct mbedtls_aes_context” definition and omit the base function
* declarations and implementations. “aes_alt.h” will be included from
* “aes.h” to include the new function definitions.
*
* Uncomment a macro to enable alternate implementation of the corresponding
* module.
*/
//#define MBEDTLS_AES_ALT
//#define MBEDTLS_ARC4_ALT
//#define MBEDTLS_BLOWFISH_ALT
//#define MBEDTLS_CAMELLIA_ALT
//#define MBEDTLS_DES_ALT
//#define MBEDTLS_XTEA_ALT
//#define MBEDTLS_MD2_ALT
//#define MBEDTLS_MD4_ALT
//#define MBEDTLS_MD5_ALT
//#define MBEDTLS_RIPEMD160_ALT
//#define MBEDTLS_SHA1_ALT
//#define MBEDTLS_SHA256_ALT
//#define MBEDTLS_SHA512_ALT

/**
* \def MBEDTLS_MD2_PROCESS_ALT
*
* MBEDTLS__FUNCTION_NAME__ALT: Uncomment a macro to let mbed TLS use you
* alternate core implementation of symmetric crypto or hash function. Keep in
* mind that function prototypes should remain the same.
*
* This replaces only one function. The header file from mbed TLS is still
* used, in contrast to the MBEDTLS__MODULE_NAME__ALT flags.
*
* Example: In case you uncomment MBEDTLS_SHA256_PROCESS_ALT, mbed TLS will
* no longer provide the mbedtls_sha1_process() function, but it will still provide
* the other function (using your mbedtls_sha1_process() function) and the definition
* of mbedtls_sha1_context, so your implementation of mbedtls_sha1_process must be compatible
* with this definition.
*
* Note: if you use the AES_xxx_ALT macros, then is is recommended to also set
* MBEDTLS_AES_ROM_TABLES in order to help the linker garbage-collect the AES
* tables.
*
* Uncomment a macro to enable alternate implementation of the corresponding
* function.
*/
//#define MBEDTLS_MD2_PROCESS_ALT
//#define MBEDTLS_MD4_PROCESS_ALT
//#define MBEDTLS_MD5_PROCESS_ALT
//#define MBEDTLS_RIPEMD160_PROCESS_ALT
//#define MBEDTLS_SHA1_PROCESS_ALT
//#define MBEDTLS_SHA256_PROCESS_ALT
//#define MBEDTLS_SHA512_PROCESS_ALT
//#define MBEDTLS_DES_SETKEY_ALT
//#define MBEDTLS_DES_CRYPT_ECB_ALT
//#define MBEDTLS_DES3_CRYPT_ECB_ALT
//#define MBEDTLS_AES_SETKEY_ENC_ALT
//#define MBEDTLS_AES_SETKEY_DEC_ALT
//#define MBEDTLS_AES_ENCRYPT_ALT
//#define MBEDTLS_AES_DECRYPT_ALT

/**
* \def MBEDTLS_ENTROPY_HARDWARE_ALT
*
* Uncomment this macro to let mbed TLS use your own implementation of a
* hardware entropy collector.
*
* Your function must be called \c mbedtls_hardware_poll(), have the same
* prototype as declared in entropy_poll.h, and accept NULL as first argument.
*
* Uncomment to use your own hardware entropy collector.
*/
//#define MBEDTLS_ENTROPY_HARDWARE_ALT

/**
* \def MBEDTLS_AES_ROM_TABLES
*
* Store the AES tables in ROM.
*
* Uncomment this macro to store the AES tables in ROM.
*/
//#define MBEDTLS_AES_ROM_TABLES

/**
* \def MBEDTLS_CAMELLIA_SMALL_MEMORY
*
* Use less ROM for the Camellia implementation (saves about 768 bytes).
*
* Uncomment this macro to use less memory for Camellia.
*/
//#define MBEDTLS_CAMELLIA_SMALL_MEMORY

/**
* \def MBEDTLS_CIPHER_MODE_CBC
*
* Enable Cipher Block Chaining mode (CBC) for symmetric ciphers.
*/
#define MBEDTLS_CIPHER_MODE_CBC

/**
* \def MBEDTLS_CIPHER_MODE_CFB
*
* Enable Cipher Feedback mode (CFB) for symmetric ciphers.
*/
#define MBEDTLS_CIPHER_MODE_CFB

/**
* \def MBEDTLS_CIPHER_MODE_CTR
*
* Enable Counter Block Cipher mode (CTR) for symmetric ciphers.
*/
#define MBEDTLS_CIPHER_MODE_CTR

/**
* \def MBEDTLS_CIPHER_NULL_CIPHER
*
* Enable NULL cipher.
* Warning: Only do so when you know what you are doing. This allows for
* encryption or channels without any security!
*
* Requires MBEDTLS_ENABLE_WEAK_CIPHERSUITES as well to enable
* the following ciphersuites:
*      MBEDTLS_TLS_ECDH_ECDSA_WITH_NULL_SHA
*      MBEDTLS_TLS_ECDH_RSA_WITH_NULL_SHA
*      MBEDTLS_TLS_ECDHE_ECDSA_WITH_NULL_SHA
*      MBEDTLS_TLS_ECDHE_RSA_WITH_NULL_SHA
*      MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA384
*      MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA256
*      MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA
*      MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA384
*      MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA256
*      MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA
*      MBEDTLS_TLS_RSA_WITH_NULL_SHA256
*      MBEDTLS_TLS_RSA_WITH_NULL_SHA
*      MBEDTLS_TLS_RSA_WITH_NULL_MD5
*      MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA384
*      MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA256
*      MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA
*      MBEDTLS_TLS_PSK_WITH_NULL_SHA384
*      MBEDTLS_TLS_PSK_WITH_NULL_SHA256
*      MBEDTLS_TLS_PSK_WITH_NULL_SHA
*
* Uncomment this macro to enable the NULL cipher and ciphersuites
*/
//#define MBEDTLS_CIPHER_NULL_CIPHER

/**
* \def MBEDTLS_CIPHER_PADDING_PKCS7
*
* MBEDTLS_CIPHER_PADDING_XXX: Uncomment or comment macros to add support for
* specific padding modes in the cipher layer with cipher modes that support
* padding (e.g. CBC)
*
* If you disable all padding modes, only full blocks can be used with CBC.
*
* Enable padding modes in the cipher layer.
*/
#define MBEDTLS_CIPHER_PADDING_PKCS7
#define MBEDTLS_CIPHER_PADDING_ONE_AND_ZEROS
#define MBEDTLS_CIPHER_PADDING_ZEROS_AND_LEN
#define MBEDTLS_CIPHER_PADDING_ZEROS

/**
* \def MBEDTLS_ENABLE_WEAK_CIPHERSUITES
*
* Enable weak ciphersuites in SSL / TLS.
* Warning: Only do so when you know what you are doing. This allows for
* channels with virtually no security at all!
*
* This enables the following ciphersuites:
*      MBEDTLS_TLS_RSA_WITH_DES_CBC_SHA
*      MBEDTLS_TLS_DHE_RSA_WITH_DES_CBC_SHA
*
* Uncomment this macro to enable weak ciphersuites
*/
//#define MBEDTLS_ENABLE_WEAK_CIPHERSUITES

/**
* \def MBEDTLS_REMOVE_ARC4_CIPHERSUITES
*
* Remove RC4 ciphersuites by default in SSL / TLS.
* This flag removes the ciphersuites based on RC4 from the default list as
* returned by mbedtls_ssl_list_ciphersuites(). However, it is still possible to
* enable (some of) them with mbedtls_ssl_conf_ciphersuites() by including them
* explicitly.
*
* Uncomment this macro to remove RC4 ciphersuites by default.
*/
#define MBEDTLS_REMOVE_ARC4_CIPHERSUITES

/**
* \def MBEDTLS_ECP_DP_SECP192R1_ENABLED
*
* MBEDTLS_ECP_XXXX_ENABLED: Enables specific curves within the Elliptic Curve
* module.  By default all supported curves are enabled.
*
* Comment macros to disable the curve and functions for it
*/
#define MBEDTLS_ECP_DP_SECP192R1_ENABLED
#define MBEDTLS_ECP_DP_SECP224R1_ENABLED
#define MBEDTLS_ECP_DP_SECP256R1_ENABLED
#define MBEDTLS_ECP_DP_SECP384R1_ENABLED
#define MBEDTLS_ECP_DP_SECP521R1_ENABLED
#define MBEDTLS_ECP_DP_SECP192K1_ENABLED
#define MBEDTLS_ECP_DP_SECP224K1_ENABLED
#define MBEDTLS_ECP_DP_SECP256K1_ENABLED
#define MBEDTLS_ECP_DP_BP256R1_ENABLED
#define MBEDTLS_ECP_DP_BP384R1_ENABLED
#define MBEDTLS_ECP_DP_BP512R1_ENABLED
#define MBEDTLS_ECP_DP_CURVE25519_ENABLED

/**
* \def MBEDTLS_ECP_NIST_OPTIM
*
* Enable specific ‘modulo p’ routines for each NIST prime.
* Depending on the prime and architecture, makes operations 4 to 8 times
* faster on the corresponding curve.
*
* Comment this macro to disable NIST curves optimisation.
*/
#define MBEDTLS_ECP_NIST_OPTIM

/**
* \def MBEDTLS_ECDSA_DETERMINISTIC
*
* Enable deterministic ECDSA (RFC 6979).
* Standard ECDSA is “fragile” in the sense that lack of entropy when signing
* may result in a compromise of the long-term signing key. This is avoided by
* the deterministic variant.
*
* Requires: MBEDTLS_HMAC_DRBG_C
*
* Comment this macro to disable deterministic ECDSA.
*/
#define MBEDTLS_ECDSA_DETERMINISTIC

/**
* \def MBEDTLS_KEY_EXCHANGE_PSK_ENABLED
*
* Enable the PSK based ciphersuite modes in SSL / TLS.
*
* This enables the following ciphersuites (if other requisites are
* enabled as well):
*      MBEDTLS_TLS_PSK_WITH_AES_256_GCM_SHA384
*      MBEDTLS_TLS_PSK_WITH_AES_256_CBC_SHA384
*      MBEDTLS_TLS_PSK_WITH_AES_256_CBC_SHA
*      MBEDTLS_TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384
*      MBEDTLS_TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384
*      MBEDTLS_TLS_PSK_WITH_AES_128_GCM_SHA256
*      MBEDTLS_TLS_PSK_WITH_AES_128_CBC_SHA256
*      MBEDTLS_TLS_PSK_WITH_AES_128_CBC_SHA
*      MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256
*      MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256
*      MBEDTLS_TLS_PSK_WITH_3DES_EDE_CBC_SHA
*      MBEDTLS_TLS_PSK_WITH_RC4_128_SHA
*/
#define MBEDTLS_KEY_EXCHANGE_PSK_ENABLED

/**
* \def MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED
*
* Enable the DHE-PSK based ciphersuite modes in SSL / TLS.
*
* Requires: MBEDTLS_DHM_C
*
* This enables the following ciphersuites (if other requisites are
* enabled as well):
*      MBEDTLS_TLS_DHE_PSK_WITH_AES_256_GCM_SHA384
*      MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CBC_SHA384
*      MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CBC_SHA
*      MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384
*      MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384
*      MBEDTLS_TLS_DHE_PSK_WITH_AES_128_GCM_SHA256
*      MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CBC_SHA256
*      MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CBC_SHA
*      MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256
*      MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256
*      MBEDTLS_TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA
*      MBEDTLS_TLS_DHE_PSK_WITH_RC4_128_SHA
*/
#define MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED

/**
* \def MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED
*
* Enable the ECDHE-PSK based ciphersuite modes in SSL / TLS.
*
* Requires: MBEDTLS_ECDH_C
*
* This enables the following ciphersuites (if other requisites are
* enabled as well):
*      MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384
*      MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA
*      MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384
*      MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256
*      MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA
*      MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256
*      MBEDTLS_TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA
*      MBEDTLS_TLS_ECDHE_PSK_WITH_RC4_128_SHA
*/
#define MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED

/**
* \def MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED
*
* Enable the RSA-PSK based ciphersuite modes in SSL / TLS.
*
* Requires: MBEDTLS_RSA_C, MBEDTLS_PKCS1_V15,
*           MBEDTLS_X509_CRT_PARSE_C
*
* This enables the following ciphersuites (if other requisites are
* enabled as well):
*      MBEDTLS_TLS_RSA_PSK_WITH_AES_256_GCM_SHA384
*      MBEDTLS_TLS_RSA_PSK_WITH_AES_256_CBC_SHA384
*      MBEDTLS_TLS_RSA_PSK_WITH_AES_256_CBC_SHA
*      MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384
*      MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384
*      MBEDTLS_TLS_RSA_PSK_WITH_AES_128_GCM_SHA256
*      MBEDTLS_TLS_RSA_PSK_WITH_AES_128_CBC_SHA256
*      MBEDTLS_TLS_RSA_PSK_WITH_AES_128_CBC_SHA
*      MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256
*      MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256
*      MBEDTLS_TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA
*      MBEDTLS_TLS_RSA_PSK_WITH_RC4_128_SHA
*/
#define MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED

/**
* \def MBEDTLS_KEY_EXCHANGE_RSA_ENABLED
*
* Enable the RSA-only based ciphersuite modes in SSL / TLS.
*
* Requires: MBEDTLS_RSA_C, MBEDTLS_PKCS1_V15,
*           MBEDTLS_X509_CRT_PARSE_C
*
* This enables the following ciphersuites (if other requisites are
* enabled as well):
*      MBEDTLS_TLS_RSA_WITH_AES_256_GCM_SHA384
*      MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA256
*      MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA
*      MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384
*      MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
*      MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
*      MBEDTLS_TLS_RSA_WITH_AES_128_GCM_SHA256
*      MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA256
*      MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA
*      MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256
*      MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
*      MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
*      MBEDTLS_TLS_RSA_WITH_3DES_EDE_CBC_SHA
*      MBEDTLS_TLS_RSA_WITH_RC4_128_SHA
*      MBEDTLS_TLS_RSA_WITH_RC4_128_MD5
*/
#define MBEDTLS_KEY_EXCHANGE_RSA_ENABLED

/**
* \def MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED
*
* Enable the DHE-RSA based ciphersuite modes in SSL / TLS.
*
* Requires: MBEDTLS_DHM_C, MBEDTLS_RSA_C, MBEDTLS_PKCS1_V15,
*           MBEDTLS_X509_CRT_PARSE_C
*
* This enables the following ciphersuites (if other requisites are
* enabled as well):
*      MBEDTLS_TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*      MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
*      MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA
*      MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384
*      MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
*      MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
*      MBEDTLS_TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
*      MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
*      MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA
*      MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256
*      MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
*      MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
*      MBEDTLS_TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
*/
#define MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED

/**
* \def MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED
*
* Enable the ECDHE-RSA based ciphersuite modes in SSL / TLS.
*
* Requires: MBEDTLS_ECDH_C, MBEDTLS_RSA_C, MBEDTLS_PKCS1_V15,
*           MBEDTLS_X509_CRT_PARSE_C
*
* This enables the following ciphersuites (if other requisites are
* enabled as well):
*      MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
*      MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
*      MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
*      MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384
*      MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
*      MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
*      MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
*      MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
*      MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256
*      MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
*      MBEDTLS_TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
*      MBEDTLS_TLS_ECDHE_RSA_WITH_RC4_128_SHA
*/
#define MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED

/**
* \def MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED
*
* Enable the ECDHE-ECDSA based ciphersuite modes in SSL / TLS.
*
* Requires: MBEDTLS_ECDH_C, MBEDTLS_ECDSA_C, MBEDTLS_X509_CRT_PARSE_C,
*
* This enables the following ciphersuites (if other requisites are
* enabled as well):
*      MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
*      MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
*      MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
*      MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384
*      MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384
*      MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
*      MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
*      MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
*      MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256
*      MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256
*      MBEDTLS_TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
*      MBEDTLS_TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
*/
#define MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED

/**
* \def MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED
*
* Enable the ECDH-ECDSA based ciphersuite modes in SSL / TLS.
*
* Requires: MBEDTLS_ECDH_C, MBEDTLS_X509_CRT_PARSE_C
*
* This enables the following ciphersuites (if other requisites are
* enabled as well):
*      MBEDTLS_TLS_ECDH_ECDSA_WITH_RC4_128_SHA
*      MBEDTLS_TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
*      MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
*      MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
*      MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
*      MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
*      MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256
*      MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384
*      MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256
*      MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384
*      MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256
*      MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384
*/
#define MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED

/**
* \def MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED
*
* Enable the ECDH-RSA based ciphersuite modes in SSL / TLS.
*
* Requires: MBEDTLS_ECDH_C, MBEDTLS_X509_CRT_PARSE_C
*
* This enables the following ciphersuites (if other requisites are
* enabled as well):
*      MBEDTLS_TLS_ECDH_RSA_WITH_RC4_128_SHA
*      MBEDTLS_TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
*      MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA
*      MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
*      MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256
*      MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
*      MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256
*      MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384
*      MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256
*      MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384
*      MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256
*      MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384
*/
#define MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED

/**
* \def MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED
*
* Enable the ECJPAKE based ciphersuite modes in SSL / TLS.
*
* \warning This is currently experimental. EC J-PAKE support is based on the
* Thread v1.0.0 specification; incompatible changes to the specification
* might still happen. For this reason, this is disabled by default.
*
* Requires: MBEDTLS_ECJPAKE_C
*           MBEDTLS_SHA256_C
*           MBEDTLS_ECP_DP_SECP256R1_ENABLED
*
* This enables the following ciphersuites (if other requisites are
* enabled as well):
*      MBEDTLS_TLS_ECJPAKE_WITH_AES_128_CCM_8
*/
//#define MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED

/**
* \def MBEDTLS_PK_PARSE_EC_EXTENDED
*
* Enhance support for reading EC keys using variants of SEC1 not allowed by
* RFC 5915 and RFC 5480.
*
* Currently this means parsing the SpecifiedECDomain choice of EC
* parameters (only known groups are supported, not arbitrary domains, to
* avoid validation issues).
*
* Disable if you only need to support RFC 5915 + 5480 key formats.
*/
#define MBEDTLS_PK_PARSE_EC_EXTENDED

/**
* \def MBEDTLS_ERROR_STRERROR_DUMMY
*
* Enable a dummy error function to make use of mbedtls_strerror() in
* third party libraries easier when MBEDTLS_ERROR_C is disabled
* (no effect when MBEDTLS_ERROR_C is enabled).
*
* You can safely disable this if MBEDTLS_ERROR_C is enabled, or if you’re
* not using mbedtls_strerror() or error_strerror() in your application.
*
* Disable if you run into name conflicts and want to really remove the
* mbedtls_strerror()
*/
#define MBEDTLS_ERROR_STRERROR_DUMMY

/**
* \def MBEDTLS_GENPRIME
*
* Enable the prime-number generation code.
*
* Requires: MBEDTLS_BIGNUM_C
*/
#define MBEDTLS_GENPRIME

/**
* \def MBEDTLS_FS_IO
*
* Enable functions that use the filesystem.
*/
#define MBEDTLS_FS_IO

/**
* \def MBEDTLS_NO_DEFAULT_ENTROPY_SOURCES
*
* Do not add default entropy sources. These are the platform specific,
* mbedtls_timing_hardclock and HAVEGE based poll functions.
*
* This is useful to have more control over the added entropy sources in an
* application.
*
* Uncomment this macro to prevent loading of default entropy functions.
*/
//#define MBEDTLS_NO_DEFAULT_ENTROPY_SOURCES

/**
* \def MBEDTLS_NO_PLATFORM_ENTROPY
*
* Do not use built-in platform entropy functions.
* This is useful if your platform does not support
* standards like the /dev/urandom or Windows CryptoAPI.
*
* Uncomment this macro to disable the built-in platform entropy functions.
*/
//#define MBEDTLS_NO_PLATFORM_ENTROPY

/**
* \def MBEDTLS_ENTROPY_FORCE_SHA256
*
* Force the entropy accumulator to use a SHA-256 accumulator instead of the
* default SHA-512 based one (if both are available).
*
* Requires: MBEDTLS_SHA256_C
*
* On 32-bit systems SHA-256 can be much faster than SHA-512. Use this option
* if you have performance concerns.
*
* This option is only useful if both MBEDTLS_SHA256_C and
* MBEDTLS_SHA512_C are defined. Otherwise the available hash module is used.
*/
//#define MBEDTLS_ENTROPY_FORCE_SHA256

/**
* \def MBEDTLS_MEMORY_DEBUG
*
* Enable debugging of buffer allocator memory issues. Automatically prints
* (to stderr) all (fatal) messages on memory allocation issues. Enables
* function for ‘debug output’ of allocated memory.
*
* Requires: MBEDTLS_MEMORY_BUFFER_ALLOC_C
*
* Uncomment this macro to let the buffer allocator print out error messages.
*/
//#define MBEDTLS_MEMORY_DEBUG

/**
* \def MBEDTLS_MEMORY_BACKTRACE
*
* Include backtrace information with each allocated block.
*
* Requires: MBEDTLS_MEMORY_BUFFER_ALLOC_C
*           GLIBC-compatible backtrace() an backtrace_symbols() support
*
* Uncomment this macro to include backtrace information
*/
//#define MBEDTLS_MEMORY_BACKTRACE

/**
* \def MBEDTLS_PK_RSA_ALT_SUPPORT
*
* Support external private RSA keys (eg from a HSM) in the PK layer.
*
* Comment this macro to disable support for external private RSA keys.
*/
#define MBEDTLS_PK_RSA_ALT_SUPPORT

/**
* \def MBEDTLS_PKCS1_V15
*
* Enable support for PKCS#1 v1.5 encoding.
*
* Requires: MBEDTLS_RSA_C
*
* This enables support for PKCS#1 v1.5 operations.
*/
#define MBEDTLS_PKCS1_V15

/**
* \def MBEDTLS_PKCS1_V21
*
* Enable support for PKCS#1 v2.1 encoding.
*
* Requires: MBEDTLS_MD_C, MBEDTLS_RSA_C
*
* This enables support for RSAES-OAEP and RSASSA-PSS operations.
*/
#define MBEDTLS_PKCS1_V21

/**
* \def MBEDTLS_RSA_NO_CRT
*
* Do not use the Chinese Remainder Theorem for the RSA private operation.
*
* Uncomment this macro to disable the use of CRT in RSA.
*
*/
//#define MBEDTLS_RSA_NO_CRT

/**
* \def MBEDTLS_SELF_TEST
*
* Enable the checkup functions (*_self_test).
*/
//#define MBEDTLS_SELF_TEST

/**
* \def MBEDTLS_SHA256_SMALLER
*
* Enable an implementation of SHA-256 that has lower ROM footprint but also
* lower performance.
*
* The default implementation is meant to be a reasonnable compromise between
* performance and size. This version optimizes more aggressively for size at
* the expense of performance. Eg on Cortex-M4 it reduces the size of
* mbedtls_sha256_process() from ~2KB to ~0.5KB for a performance hit of about
* 30%.
*
* Uncomment to enable the smaller implementation of SHA256.
*/
//#define MBEDTLS_SHA256_SMALLER

/**
* \def MBEDTLS_SSL_AEAD_RANDOM_IV
*
* Generate a random IV rather than using the record sequence number as a
* nonce for ciphersuites using and AEAD algorithm (GCM or CCM).
*
* Using the sequence number is generally recommended.
*
* Uncomment this macro to always use random IVs with AEAD ciphersuites.
*/
//#define MBEDTLS_SSL_AEAD_RANDOM_IV

/**
* \def MBEDTLS_SSL_ALL_ALERT_MESSAGES
*
* Enable sending of alert messages in case of encountered errors as per RFC.
* If you choose not to send the alert messages, mbed TLS can still communicate
* with other servers, only debugging of failures is harder.
*
* The advantage of not sending alert messages, is that no information is given
* about reasons for failures thus preventing adversaries of gaining intel.
*
* Enable sending of all alert messages
*/
#define MBEDTLS_SSL_ALL_ALERT_MESSAGES

/**
* \def MBEDTLS_SSL_DEBUG_ALL
*
* Enable the debug messages in SSL module for all issues.
* Debug messages have been disabled in some places to prevent timing
* attacks due to (unbalanced) debugging function calls.
*
* If you need all error reporting you should enable this during debugging,
* but remove this for production servers that should log as well.
*
* Uncomment this macro to report all debug messages on errors introducing
* a timing side-channel.
*
*/
//#define MBEDTLS_SSL_DEBUG_ALL

/** \def MBEDTLS_SSL_ENCRYPT_THEN_MAC
*
* Enable support for Encrypt-then-MAC, RFC 7366.
*
* This allows peers that both support it to use a more robust protection for
* ciphersuites using CBC, providing deep resistance against timing attacks
* on the padding or underlying cipher.
*
* This only affects CBC ciphersuites, and is useless if none is defined.
*
* Requires: MBEDTLS_SSL_PROTO_TLS1    or
*           MBEDTLS_SSL_PROTO_TLS1_1  or
*           MBEDTLS_SSL_PROTO_TLS1_2
*
* Comment this macro to disable support for Encrypt-then-MAC
*/
#define MBEDTLS_SSL_ENCRYPT_THEN_MAC

/** \def MBEDTLS_SSL_EXTENDED_MASTER_SECRET
*
* Enable support for Extended Master Secret, aka Session Hash
* (draft-ietf-tls-session-hash-02).
*
* This was introduced as “the proper fix” to the Triple Handshake familiy of
* attacks, but it is recommended to always use it (even if you disable
* renegotiation), since it actually fixes a more fundamental issue in the
* original SSL/TLS design, and has implications beyond Triple Handshake.
*
* Requires: MBEDTLS_SSL_PROTO_TLS1    or
*           MBEDTLS_SSL_PROTO_TLS1_1  or
*           MBEDTLS_SSL_PROTO_TLS1_2
*
* Comment this macro to disable support for Extended Master Secret.
*/
#define MBEDTLS_SSL_EXTENDED_MASTER_SECRET

/**
* \def MBEDTLS_SSL_FALLBACK_SCSV
*
* Enable support for FALLBACK_SCSV (draft-ietf-tls-downgrade-scsv-00).
*
* For servers, it is recommended to always enable this, unless you support
* only one version of TLS, or know for sure that none of your clients
* implements a fallback strategy.
*
* For clients, you only need this if you’re using a fallback strategy, which
* is not recommended in the first place, unless you absolutely need it to
* interoperate with buggy (version-intolerant) servers.
*
* Comment this macro to disable support for FALLBACK_SCSV
*/
#define MBEDTLS_SSL_FALLBACK_SCSV

/**
* \def MBEDTLS_SSL_HW_RECORD_ACCEL
*
* Enable hooking functions in SSL module for hardware acceleration of
* individual records.
*
* Uncomment this macro to enable hooking functions.
*/
//#define MBEDTLS_SSL_HW_RECORD_ACCEL

/**
* \def MBEDTLS_SSL_CBC_RECORD_SPLITTING
*
* Enable 1/n-1 record splitting for CBC mode in SSLv3 and TLS 1.0.
*
* This is a countermeasure to the BEAST attack, which also minimizes the risk
* of interoperability issues compared to sending 0-length records.
*
* Comment this macro to disable 1/n-1 record splitting.
*/
#define MBEDTLS_SSL_CBC_RECORD_SPLITTING

/**
* \def MBEDTLS_SSL_RENEGOTIATION
*
* Disable support for TLS renegotiation.
*
* The two main uses of renegotiation are (1) refresh keys on long-lived
* connections and (2) client authentication after the initial handshake.
* If you don’t need renegotiation, it’s probably better to disable it, since
* it has been associated with security issues in the past and is easy to
* misuse/misunderstand.
*
* Comment this to disable support for renegotiation.
*/
#define MBEDTLS_SSL_RENEGOTIATION

/**
* \def MBEDTLS_SSL_SRV_SUPPORT_SSLV2_CLIENT_HELLO
*
* Enable support for receiving and parsing SSLv2 Client Hello messages for the
* SSL Server module (MBEDTLS_SSL_SRV_C).
*
* Uncomment this macro to enable support for SSLv2 Client Hello messages.
*/
//#define MBEDTLS_SSL_SRV_SUPPORT_SSLV2_CLIENT_HELLO

/**
* \def MBEDTLS_SSL_SRV_RESPECT_CLIENT_PREFERENCE
*
* Pick the ciphersuite according to the client’s preferences rather than ours
* in the SSL Server module (MBEDTLS_SSL_SRV_C).
*
* Uncomment this macro to respect client’s ciphersuite order
*/
//#define MBEDTLS_SSL_SRV_RESPECT_CLIENT_PREFERENCE

/**
* \def MBEDTLS_SSL_MAX_FRAGMENT_LENGTH
*
* Enable support for RFC 6066 max_fragment_length extension in SSL.
*
* Comment this macro to disable support for the max_fragment_length extension
*/
#define MBEDTLS_SSL_MAX_FRAGMENT_LENGTH

/**
* \def MBEDTLS_SSL_PROTO_SSL3
*
* Enable support for SSL 3.0.
*
* Requires: MBEDTLS_MD5_C
*           MBEDTLS_SHA1_C
*
* Comment this macro to disable support for SSL 3.0
*/
#define MBEDTLS_SSL_PROTO_SSL3

/**
* \def MBEDTLS_SSL_PROTO_TLS1
*
* Enable support for TLS 1.0.
*
* Requires: MBEDTLS_MD5_C
*           MBEDTLS_SHA1_C
*
* Comment this macro to disable support for TLS 1.0
*/
#define MBEDTLS_SSL_PROTO_TLS1

/**
* \def MBEDTLS_SSL_PROTO_TLS1_1
*
* Enable support for TLS 1.1 (and DTLS 1.0 if DTLS is enabled).
*
* Requires: MBEDTLS_MD5_C
*           MBEDTLS_SHA1_C
*
* Comment this macro to disable support for TLS 1.1 / DTLS 1.0
*/
#define MBEDTLS_SSL_PROTO_TLS1_1

/**
* \def MBEDTLS_SSL_PROTO_TLS1_2
*
* Enable support for TLS 1.2 (and DTLS 1.2 if DTLS is enabled).
*
* Requires: MBEDTLS_SHA1_C or MBEDTLS_SHA256_C or MBEDTLS_SHA512_C
*           (Depends on ciphersuites)
*
* Comment this macro to disable support for TLS 1.2 / DTLS 1.2
*/
#define MBEDTLS_SSL_PROTO_TLS1_2

/**
* \def MBEDTLS_SSL_PROTO_DTLS
*
* Enable support for DTLS (all available versions).
*
* Enable this and MBEDTLS_SSL_PROTO_TLS1_1 to enable DTLS 1.0,
* and/or this and MBEDTLS_SSL_PROTO_TLS1_2 to enable DTLS 1.2.
*
* Requires: MBEDTLS_SSL_PROTO_TLS1_1
*        or MBEDTLS_SSL_PROTO_TLS1_2
*
* Comment this macro to disable support for DTLS
*/
#define MBEDTLS_SSL_PROTO_DTLS

/**
* \def MBEDTLS_SSL_ALPN
*
* Enable support for RFC 7301 Application Layer Protocol Negotiation.
*
* Comment this macro to disable support for ALPN.
*/
#define MBEDTLS_SSL_ALPN

/**
* \def MBEDTLS_SSL_DTLS_ANTI_REPLAY
*
* Enable support for the anti-replay mechanism in DTLS.
*
* Requires: MBEDTLS_SSL_TLS_C
*           MBEDTLS_SSL_PROTO_DTLS
*
* \warning Disabling this is often a security risk!
* See mbedtls_ssl_conf_dtls_anti_replay() for details.
*
* Comment this to disable anti-replay in DTLS.
*/
#define MBEDTLS_SSL_DTLS_ANTI_REPLAY

/**
* \def MBEDTLS_SSL_DTLS_HELLO_VERIFY
*
* Enable support for HelloVerifyRequest on DTLS servers.
*
* This feature is highly recommended to prevent DTLS servers being used as
* amplifiers in DoS attacks against other hosts. It should always be enabled
* unless you know for sure amplification cannot be a problem in the
* environment in which your server operates.
*
* \warning Disabling this can ba a security risk! (see above)
*
* Requires: MBEDTLS_SSL_PROTO_DTLS
*
* Comment this to disable support for HelloVerifyRequest.
*/
#define MBEDTLS_SSL_DTLS_HELLO_VERIFY

/**
* \def MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE
*
* Enable server-side support for clients that reconnect from the same port.
*
* Some clients unexpectedly close the connection and try to reconnect using the
* same source port. This needs special support from the server to handle the
* new connection securely, as described in section 4.2.8 of RFC 6347. This
* flag enables that support.
*
* Requires: MBEDTLS_SSL_DTLS_HELLO_VERIFY
*
* Comment this to disable support for clients reusing the source port.
*/
#define MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE

/**
* \def MBEDTLS_SSL_DTLS_BADMAC_LIMIT
*
* Enable support for a limit of records with bad MAC.
*
* See mbedtls_ssl_conf_dtls_badmac_limit().
*
* Requires: MBEDTLS_SSL_PROTO_DTLS
*/
#define MBEDTLS_SSL_DTLS_BADMAC_LIMIT

/**
* \def MBEDTLS_SSL_SESSION_TICKETS
*
* Enable support for RFC 5077 session tickets in SSL.
* Client-side, provides full support for session tickets (maintainance of a
* session store remains the responsibility of the application, though).
* Server-side, you also need to provide callbacks for writing and parsing
* tickets, including authenticated encryption and key management. Example
* callbacks are provided by MBEDTLS_SSL_TICKET_C.
*
* Comment this macro to disable support for SSL session tickets
*/
#define MBEDTLS_SSL_SESSION_TICKETS

/**
* \def MBEDTLS_SSL_EXPORT_KEYS
*
* Enable support for exporting key block and master secret.
* This is required for certain users of TLS, e.g. EAP-TLS.
*
* Comment this macro to disable support for key export
*/
#define MBEDTLS_SSL_EXPORT_KEYS

/**
* \def MBEDTLS_SSL_SERVER_NAME_INDICATION
*
* Enable support for RFC 6066 server name indication (SNI) in SSL.
*
* Requires: MBEDTLS_X509_CRT_PARSE_C
*
* Comment this macro to disable support for server name indication in SSL
*/
#define MBEDTLS_SSL_SERVER_NAME_INDICATION

/**
* \def MBEDTLS_SSL_TRUNCATED_HMAC
*
* Enable support for RFC 6066 truncated HMAC in SSL.
*
* Comment this macro to disable support for truncated HMAC in SSL
*/
#define MBEDTLS_SSL_TRUNCATED_HMAC

/**
* \def MBEDTLS_THREADING_ALT
*
* Provide your own alternate threading implementation.
*
* Requires: MBEDTLS_THREADING_C
*
* Uncomment this to allow your own alternate threading implementation.
*/
//#define MBEDTLS_THREADING_ALT

/**
* \def MBEDTLS_THREADING_PTHREAD
*
* Enable the pthread wrapper layer for the threading layer.
*
* Requires: MBEDTLS_THREADING_C
*
* Uncomment this to enable pthread mutexes.
*/
//#define MBEDTLS_THREADING_PTHREAD

/**
* \def MBEDTLS_VERSION_FEATURES
*
* Allow run-time checking of compile-time enabled features. Thus allowing users
* to check at run-time if the library is for instance compiled with threading
* support via mbedtls_version_check_feature().
*
* Requires: MBEDTLS_VERSION_C
*
* Comment this to disable run-time checking and save ROM space
*/
#define MBEDTLS_VERSION_FEATURES

/**
* \def MBEDTLS_X509_ALLOW_EXTENSIONS_NON_V3
*
* If set, the X509 parser will not break-off when parsing an X509 certificate
* and encountering an extension in a v1 or v2 certificate.
*
* Uncomment to prevent an error.
*/
//#define MBEDTLS_X509_ALLOW_EXTENSIONS_NON_V3

/**
* \def MBEDTLS_X509_ALLOW_UNSUPPORTED_CRITICAL_EXTENSION
*
* If set, the X509 parser will not break-off when parsing an X509 certificate
* and encountering an unknown critical extension.
*
* \warning Depending on your PKI use, enabling this can be a security risk!
*
* Uncomment to prevent an error.
*/
//#define MBEDTLS_X509_ALLOW_UNSUPPORTED_CRITICAL_EXTENSION

/**
* \def MBEDTLS_X509_CHECK_KEY_USAGE
*
* Enable verification of the keyUsage extension (CA and leaf certificates).
*
* Disabling this avoids problems with mis-issued and/or misused
* (intermediate) CA and leaf certificates.
*
* \warning Depending on your PKI use, disabling this can be a security risk!
*
* Comment to skip keyUsage checking for both CA and leaf certificates.
*/
#define MBEDTLS_X509_CHECK_KEY_USAGE

/**
* \def MBEDTLS_X509_CHECK_EXTENDED_KEY_USAGE
*
* Enable verification of the extendedKeyUsage extension (leaf certificates).
*
* Disabling this avoids problems with mis-issued and/or misused certificates.
*
* \warning Depending on your PKI use, disabling this can be a security risk!
*
* Comment to skip extendedKeyUsage checking for certificates.
*/
#define MBEDTLS_X509_CHECK_EXTENDED_KEY_USAGE

/**
* \def MBEDTLS_X509_RSASSA_PSS_SUPPORT
*
* Enable parsing and verification of X.509 certificates, CRLs and CSRS
* signed with RSASSA-PSS (aka PKCS#1 v2.1).
*
* Comment this macro to disallow using RSASSA-PSS in certificates.
*/
#define MBEDTLS_X509_RSASSA_PSS_SUPPORT

/**
* \def MBEDTLS_ZLIB_SUPPORT
*
* If set, the SSL/TLS module uses ZLIB to support compression and
* decompression of packet data.
*
* \warning TLS-level compression MAY REDUCE SECURITY! See for example the
* CRIME attack. Before enabling this option, you should examine with care if
* CRIME or similar exploits may be a applicable to your use case.
*
* \note Currently compression can’t be used with DTLS.
*
* Used in: library/ssl_tls.c
*          library/ssl_cli.c
*          library/ssl_srv.c
*
* This feature requires zlib library and headers to be present.
*
* Uncomment to enable use of ZLIB
*/
//#define MBEDTLS_ZLIB_SUPPORT
/* \} name SECTION: mbed TLS feature support */

/**
* \name SECTION: mbed TLS modules
*
* This section enables or disables entire modules in mbed TLS
* \{
*/

/**
* \def MBEDTLS_AESNI_C
*
* Enable AES-NI support on x86-64.
*
* Module:  library/aesni.c
* Caller:  library/aes.c
*
* Requires: MBEDTLS_HAVE_ASM
*
* This modules adds support for the AES-NI instructions on x86-64
*/
#define MBEDTLS_AESNI_C

/**
* \def MBEDTLS_AES_C
*
* Enable the AES block cipher.
*
* Module:  library/aes.c
* Caller:  library/ssl_tls.c
*          library/pem.c
*          library/ctr_drbg.c
*
* This module enables the following ciphersuites (if other requisites are
* enabled as well):
*      MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
*      MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
*      MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA
*      MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
*      MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
*      MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
*      MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256
*      MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
*      MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256
*      MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384
*      MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256
*      MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384
*      MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
*      MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
*      MBEDTLS_TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*      MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
*      MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
*      MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
*      MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
*      MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
*      MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA
*      MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
*      MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
*      MBEDTLS_TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
*      MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
*      MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
*      MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
*      MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
*      MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
*      MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA
*      MBEDTLS_TLS_DHE_PSK_WITH_AES_256_GCM_SHA384
*      MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384
*      MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CBC_SHA384
*      MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA
*      MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CBC_SHA
*      MBEDTLS_TLS_DHE_PSK_WITH_AES_128_GCM_SHA256
*      MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256
*      MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CBC_SHA256
*      MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA
*      MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CBC_SHA
*      MBEDTLS_TLS_RSA_WITH_AES_256_GCM_SHA384
*      MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA256
*      MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA
*      MBEDTLS_TLS_RSA_WITH_AES_128_GCM_SHA256
*      MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA256
*      MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA
*      MBEDTLS_TLS_RSA_PSK_WITH_AES_256_GCM_SHA384
*      MBEDTLS_TLS_RSA_PSK_WITH_AES_256_CBC_SHA384
*      MBEDTLS_TLS_RSA_PSK_WITH_AES_256_CBC_SHA
*      MBEDTLS_TLS_RSA_PSK_WITH_AES_128_GCM_SHA256
*      MBEDTLS_TLS_RSA_PSK_WITH_AES_128_CBC_SHA256
*      MBEDTLS_TLS_RSA_PSK_WITH_AES_128_CBC_SHA
*      MBEDTLS_TLS_PSK_WITH_AES_256_GCM_SHA384
*      MBEDTLS_TLS_PSK_WITH_AES_256_CBC_SHA384
*      MBEDTLS_TLS_PSK_WITH_AES_256_CBC_SHA
*      MBEDTLS_TLS_PSK_WITH_AES_128_GCM_SHA256
*      MBEDTLS_TLS_PSK_WITH_AES_128_CBC_SHA256
*      MBEDTLS_TLS_PSK_WITH_AES_128_CBC_SHA
*
* PEM_PARSE uses AES for decrypting encrypted keys.
*/
#define MBEDTLS_AES_C

/**
* \def MBEDTLS_ARC4_C
*
* Enable the ARCFOUR stream cipher.
*
* Module:  library/arc4.c
* Caller:  library/ssl_tls.c
*
* This module enables the following ciphersuites (if other requisites are
* enabled as well):
*      MBEDTLS_TLS_ECDH_ECDSA_WITH_RC4_128_SHA
*      MBEDTLS_TLS_ECDH_RSA_WITH_RC4_128_SHA
*      MBEDTLS_TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
*      MBEDTLS_TLS_ECDHE_RSA_WITH_RC4_128_SHA
*      MBEDTLS_TLS_ECDHE_PSK_WITH_RC4_128_SHA
*      MBEDTLS_TLS_DHE_PSK_WITH_RC4_128_SHA
*      MBEDTLS_TLS_RSA_WITH_RC4_128_SHA
*      MBEDTLS_TLS_RSA_WITH_RC4_128_MD5
*      MBEDTLS_TLS_RSA_PSK_WITH_RC4_128_SHA
*      MBEDTLS_TLS_PSK_WITH_RC4_128_SHA
*/
#define MBEDTLS_ARC4_C

/**
* \def MBEDTLS_ASN1_PARSE_C
*
* Enable the generic ASN1 parser.
*
* Module:  library/asn1.c
* Caller:  library/x509.c
*          library/dhm.c
*          library/pkcs12.c
*          library/pkcs5.c
*          library/pkparse.c
*/
#define MBEDTLS_ASN1_PARSE_C

/**
* \def MBEDTLS_ASN1_WRITE_C
*
* Enable the generic ASN1 writer.
*
* Module:  library/asn1write.c
* Caller:  library/ecdsa.c
*          library/pkwrite.c
*          library/x509_create.c
*          library/x509write_crt.c
*          library/mbedtls_x509write_csr.c
*/
#define MBEDTLS_ASN1_WRITE_C

/**
* \def MBEDTLS_BASE64_C
*
* Enable the Base64 module.
*
* Module:  library/base64.c
* Caller:  library/pem.c
*
* This module is required for PEM support (required by X.509).
*/
#define MBEDTLS_BASE64_C

/**
* \def MBEDTLS_BIGNUM_C
*
* Enable the multi-precision integer library.
*
* Module:  library/bignum.c
* Caller:  library/dhm.c
*          library/ecp.c
*          library/ecdsa.c
*          library/rsa.c
*          library/ssl_tls.c
*
* This module is required for RSA, DHM and ECC (ECDH, ECDSA) support.
*/
#define MBEDTLS_BIGNUM_C

/**
* \def MBEDTLS_BLOWFISH_C
*
* Enable the Blowfish block cipher.
*
* Module:  library/blowfish.c
*/
#define MBEDTLS_BLOWFISH_C

/**
* \def MBEDTLS_CAMELLIA_C
*
* Enable the Camellia block cipher.
*
* Module:  library/camellia.c
* Caller:  library/ssl_tls.c
*
* This module enables the following ciphersuites (if other requisites are
* enabled as well):
*      MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256
*      MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384
*      MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256
*      MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384
*      MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256
*      MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384
*      MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256
*      MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384
*      MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384
*      MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384
*      MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384
*      MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384
*      MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
*      MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
*      MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
*      MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256
*      MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256
*      MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256
*      MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256
*      MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
*      MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
*      MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
*      MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384
*      MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384
*      MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384
*      MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256
*      MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256
*      MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256
*      MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384
*      MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
*      MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
*      MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256
*      MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
*      MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
*      MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384
*      MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384
*      MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256
*      MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256
*      MBEDTLS_TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384
*      MBEDTLS_TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384
*      MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256
*      MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256
*/
#define MBEDTLS_CAMELLIA_C

/**
* \def MBEDTLS_CCM_C
*
* Enable the Counter with CBC-MAC (CCM) mode for 128-bit block cipher.
*
* Module:  library/ccm.c
*
* Requires: MBEDTLS_AES_C or MBEDTLS_CAMELLIA_C
*
* This module enables the AES-CCM ciphersuites, if other requisites are
* enabled as well.
*/
#define MBEDTLS_CCM_C

/**
* \def MBEDTLS_CERTS_C
*
* Enable the test certificates.
*
* Module:  library/certs.c
* Caller:
*
* This module is used for testing (ssl_client/server).
*/
#define MBEDTLS_CERTS_C

/**
* \def MBEDTLS_CIPHER_C
*
* Enable the generic cipher layer.
*
* Module:  library/cipher.c
* Caller:  library/ssl_tls.c
*
* Uncomment to enable generic cipher wrappers.
*/
#define MBEDTLS_CIPHER_C

/**
* \def MBEDTLS_CTR_DRBG_C
*
* Enable the CTR_DRBG AES-256-based random generator.
*
* Module:  library/ctr_drbg.c
* Caller:
*
* Requires: MBEDTLS_AES_C
*
* This module provides the CTR_DRBG AES-256 random number generator.
*/
#define MBEDTLS_CTR_DRBG_C

/**
* \def MBEDTLS_DEBUG_C
*
* Enable the debug functions.
*
* Module:  library/debug.c
* Caller:  library/ssl_cli.c
*          library/ssl_srv.c
*          library/ssl_tls.c
*
* This module provides debugging functions.
*/
#define MBEDTLS_DEBUG_C

/**
* \def MBEDTLS_DES_C
*
* Enable the DES block cipher.
*
* Module:  library/des.c
* Caller:  library/pem.c
*          library/ssl_tls.c
*
* This module enables the following ciphersuites (if other requisites are
* enabled as well):
*      MBEDTLS_TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
*      MBEDTLS_TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
*      MBEDTLS_TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
*      MBEDTLS_TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
*      MBEDTLS_TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
*      MBEDTLS_TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA
*      MBEDTLS_TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA
*      MBEDTLS_TLS_RSA_WITH_3DES_EDE_CBC_SHA
*      MBEDTLS_TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA
*      MBEDTLS_TLS_PSK_WITH_3DES_EDE_CBC_SHA
*
* PEM_PARSE uses DES/3DES for decrypting encrypted keys.
*/
#define MBEDTLS_DES_C

/**
* \def MBEDTLS_DHM_C
*
* Enable the Diffie-Hellman-Merkle module.
*
* Module:  library/dhm.c
* Caller:  library/ssl_cli.c
*          library/ssl_srv.c
*
* This module is used by the following key exchanges:
*      DHE-RSA, DHE-PSK
*/
#define MBEDTLS_DHM_C

/**
* \def MBEDTLS_ECDH_C
*
* Enable the elliptic curve Diffie-Hellman library.
*
* Module:  library/ecdh.c
* Caller:  library/ssl_cli.c
*          library/ssl_srv.c
*
* This module is used by the following key exchanges:
*      ECDHE-ECDSA, ECDHE-RSA, DHE-PSK
*
* Requires: MBEDTLS_ECP_C
*/
#define MBEDTLS_ECDH_C

/**
* \def MBEDTLS_ECDSA_C
*
* Enable the elliptic curve DSA library.
*
* Module:  library/ecdsa.c
* Caller:
*
* This module is used by the following key exchanges:
*      ECDHE-ECDSA
*
* Requires: MBEDTLS_ECP_C, MBEDTLS_ASN1_WRITE_C, MBEDTLS_ASN1_PARSE_C
*/
#define MBEDTLS_ECDSA_C

/**
* \def MBEDTLS_ECJPAKE_C
*
* Enable the elliptic curve J-PAKE library.
*
* \warning This is currently experimental. EC J-PAKE support is based on the
* Thread v1.0.0 specification; incompatible changes to the specification
* might still happen. For this reason, this is disabled by default.
*
* Module:  library/ecjpake.c
* Caller:
*
* This module is used by the following key exchanges:
*      ECJPAKE
*
* Requires: MBEDTLS_ECP_C, MBEDTLS_MD_C
*/
//#define MBEDTLS_ECJPAKE_C

/**
* \def MBEDTLS_ECP_C
*
* Enable the elliptic curve over GF(p) library.
*
* Module:  library/ecp.c
* Caller:  library/ecdh.c
*          library/ecdsa.c
*          library/ecjpake.c
*
* Requires: MBEDTLS_BIGNUM_C and at least one MBEDTLS_ECP_DP_XXX_ENABLED
*/
#define MBEDTLS_ECP_C

/**
* \def MBEDTLS_ENTROPY_C
*
* Enable the platform-specific entropy code.
*
* Module:  library/entropy.c
* Caller:
*
* Requires: MBEDTLS_SHA512_C or MBEDTLS_SHA256_C
*
* This module provides a generic entropy pool
*/
#define MBEDTLS_ENTROPY_C

/**
* \def MBEDTLS_ERROR_C
*
* Enable error code to error string conversion.
*
* Module:  library/error.c
* Caller:
*
* This module enables mbedtls_strerror().
*/
#define MBEDTLS_ERROR_C

/**
* \def MBEDTLS_GCM_C
*
* Enable the Galois/Counter Mode (GCM) for AES.
*
* Module:  library/gcm.c
*
* Requires: MBEDTLS_AES_C or MBEDTLS_CAMELLIA_C
*
* This module enables the AES-GCM and CAMELLIA-GCM ciphersuites, if other
* requisites are enabled as well.
*/
#define MBEDTLS_GCM_C

/**
* \def MBEDTLS_HAVEGE_C
*
* Enable the HAVEGE random generator.
*
* Warning: the HAVEGE random generator is not suitable for virtualized
*          environments
*
* Warning: the HAVEGE random generator is dependent on timing and specific
*          processor traits. It is therefore not advised to use HAVEGE as
*          your applications primary random generator or primary entropy pool
*          input. As a secondary input to your entropy pool, it IS able add
*          the (limited) extra entropy it provides.
*
* Module:  library/havege.c
* Caller:
*
* Requires: MBEDTLS_TIMING_C
*
* Uncomment to enable the HAVEGE random generator.
*/
//#define MBEDTLS_HAVEGE_C

/**
* \def MBEDTLS_HMAC_DRBG_C
*
* Enable the HMAC_DRBG random generator.
*
* Module:  library/hmac_drbg.c
* Caller:
*
* Requires: MBEDTLS_MD_C
*
* Uncomment to enable the HMAC_DRBG random number geerator.
*/
#define MBEDTLS_HMAC_DRBG_C

/**
* \def MBEDTLS_MD_C
*
* Enable the generic message digest layer.
*
* Module:  library/mbedtls_md.c
* Caller:
*
* Uncomment to enable generic message digest wrappers.
*/
#define MBEDTLS_MD_C

/**
* \def MBEDTLS_MD2_C
*
* Enable the MD2 hash algorithm.
*
* Module:  library/mbedtls_md2.c
* Caller:
*
* Uncomment to enable support for (rare) MD2-signed X.509 certs.
*/
//#define MBEDTLS_MD2_C

/**
* \def MBEDTLS_MD4_C
*
* Enable the MD4 hash algorithm.
*
* Module:  library/mbedtls_md4.c
* Caller:
*
* Uncomment to enable support for (rare) MD4-signed X.509 certs.
*/
//#define MBEDTLS_MD4_C

/**
* \def MBEDTLS_MD5_C
*
* Enable the MD5 hash algorithm.
*
* Module:  library/mbedtls_md5.c
* Caller:  library/mbedtls_md.c
*          library/pem.c
*          library/ssl_tls.c
*
* This module is required for SSL/TLS and X.509.
* PEM_PARSE uses MD5 for decrypting encrypted keys.
*/
#define MBEDTLS_MD5_C

/**
* \def MBEDTLS_MEMORY_BUFFER_ALLOC_C
*
* Enable the buffer allocator implementation that makes use of a (stack)
* based buffer to ‘allocate’ dynamic memory. (replaces calloc() and free()
* calls)
*
* Module:  library/memory_buffer_alloc.c
*
* Requires: MBEDTLS_PLATFORM_C
*           MBEDTLS_PLATFORM_MEMORY (to use it within mbed TLS)
*
* Enable this module to enable the buffer memory allocator.
*/
//#define MBEDTLS_MEMORY_BUFFER_ALLOC_C

/**
* \def MBEDTLS_NET_C
*
* Enable the TCP/IP networking routines.
*
* Module:  library/net.c
*
* This module provides TCP/IP networking routines.
*/
#define MBEDTLS_NET_C

/**
* \def MBEDTLS_OID_C
*
* Enable the OID database.
*
* Module:  library/oid.c
* Caller:  library/asn1write.c
*          library/pkcs5.c
*          library/pkparse.c
*          library/pkwrite.c
*          library/rsa.c
*          library/x509.c
*          library/x509_create.c
*          library/mbedtls_x509_crl.c
*          library/mbedtls_x509_crt.c
*          library/mbedtls_x509_csr.c
*          library/x509write_crt.c
*          library/mbedtls_x509write_csr.c
*
* This modules translates between OIDs and internal values.
*/
#define MBEDTLS_OID_C

/**
* \def MBEDTLS_PADLOCK_C
*
* Enable VIA Padlock support on x86.
*
* Module:  library/padlock.c
* Caller:  library/aes.c
*
* Requires: MBEDTLS_HAVE_ASM
*
* This modules adds support for the VIA PadLock on x86.
*/
#define MBEDTLS_PADLOCK_C

/**
* \def MBEDTLS_PEM_PARSE_C
*
* Enable PEM decoding / parsing.
*
* Module:  library/pem.c
* Caller:  library/dhm.c
*          library/pkparse.c
*          library/mbedtls_x509_crl.c
*          library/mbedtls_x509_crt.c
*          library/mbedtls_x509_csr.c
*
* Requires: MBEDTLS_BASE64_C
*
* This modules adds support for decoding / parsing PEM files.
*/
#define MBEDTLS_PEM_PARSE_C

/**
* \def MBEDTLS_PEM_WRITE_C
*
* Enable PEM encoding / writing.
*
* Module:  library/pem.c
* Caller:  library/pkwrite.c
*          library/x509write_crt.c
*          library/mbedtls_x509write_csr.c
*
* Requires: MBEDTLS_BASE64_C
*
* This modules adds support for encoding / writing PEM files.
*/
#define MBEDTLS_PEM_WRITE_C

/**
* \def MBEDTLS_PK_C
*
* Enable the generic public (asymetric) key layer.
*
* Module:  library/pk.c
* Caller:  library/ssl_tls.c
*          library/ssl_cli.c
*          library/ssl_srv.c
*
* Requires: MBEDTLS_RSA_C or MBEDTLS_ECP_C
*
* Uncomment to enable generic public key wrappers.
*/
#define MBEDTLS_PK_C

/**
* \def MBEDTLS_PK_PARSE_C
*
* Enable the generic public (asymetric) key parser.
*
* Module:  library/pkparse.c
* Caller:  library/mbedtls_x509_crt.c
*          library/mbedtls_x509_csr.c
*
* Requires: MBEDTLS_PK_C
*
* Uncomment to enable generic public key parse functions.
*/
#define MBEDTLS_PK_PARSE_C

/**
* \def MBEDTLS_PK_WRITE_C
*
* Enable the generic public (asymetric) key writer.
*
* Module:  library/pkwrite.c
* Caller:  library/x509write.c
*
* Requires: MBEDTLS_PK_C
*
* Uncomment to enable generic public key write functions.
*/
#define MBEDTLS_PK_WRITE_C

/**
* \def MBEDTLS_PKCS5_C
*
* Enable PKCS#5 functions.
*
* Module:  library/pkcs5.c
*
* Requires: MBEDTLS_MD_C
*
* This module adds support for the PKCS#5 functions.
*/
#define MBEDTLS_PKCS5_C

/**
* \def MBEDTLS_PKCS11_C
*
* Enable wrapper for PKCS#11 smartcard support.
*
* Module:  library/pkcs11.c
* Caller:  library/pk.c
*
* Requires: MBEDTLS_PK_C
*
* This module enables SSL/TLS PKCS #11 smartcard support.
* Requires the presence of the PKCS#11 helper library (libpkcs11-helper)
*/
//#define MBEDTLS_PKCS11_C

/**
* \def MBEDTLS_PKCS12_C
*
* Enable PKCS#12 PBE functions.
* Adds algorithms for parsing PKCS#8 encrypted private keys
*
* Module:  library/pkcs12.c
* Caller:  library/pkparse.c
*
* Requires: MBEDTLS_ASN1_PARSE_C, MBEDTLS_CIPHER_C, MBEDTLS_MD_C
* Can use:  MBEDTLS_ARC4_C
*
* This module enables PKCS#12 functions.
*/
#define MBEDTLS_PKCS12_C

/**
* \def MBEDTLS_PLATFORM_C
*
* Enable the platform abstraction layer that allows you to re-assign
* functions like calloc(), free(), snprintf(), printf(), fprintf(), exit().
*
* Enabling MBEDTLS_PLATFORM_C enables to use of MBEDTLS_PLATFORM_XXX_ALT
* or MBEDTLS_PLATFORM_XXX_MACRO directives, allowing the functions mentioned
* above to be specified at runtime or compile time respectively.
*
* \note This abstraction layer must be enabled on Windows (including MSYS2)
* as other module rely on it for a fixed snprintf implementation.
*
* Module:  library/platform.c
* Caller:  Most other .c files
*
* This module enables abstraction of common (libc) functions.
*/
#define MBEDTLS_PLATFORM_C

/**
* \def MBEDTLS_RIPEMD160_C
*
* Enable the RIPEMD-160 hash algorithm.
*
* Module:  library/mbedtls_ripemd160.c
* Caller:  library/mbedtls_md.c
*
*/
#define MBEDTLS_RIPEMD160_C

/**
* \def MBEDTLS_RSA_C
*
* Enable the RSA public-key cryptosystem.
*
* Module:  library/rsa.c
* Caller:  library/ssl_cli.c
*          library/ssl_srv.c
*          library/ssl_tls.c
*          library/x509.c
*
* This module is used by the following key exchanges:
*      RSA, DHE-RSA, ECDHE-RSA, RSA-PSK
*
* Requires: MBEDTLS_BIGNUM_C, MBEDTLS_OID_C
*/
#define MBEDTLS_RSA_C

/**
* \def MBEDTLS_SHA1_C
*
* Enable the SHA1 cryptographic hash algorithm.
*
* Module:  library/mbedtls_sha1.c
* Caller:  library/mbedtls_md.c
*          library/ssl_cli.c
*          library/ssl_srv.c
*          library/ssl_tls.c
*          library/x509write_crt.c
*
* This module is required for SSL/TLS and SHA1-signed certificates.
*/
#define MBEDTLS_SHA1_C

/**
* \def MBEDTLS_SHA256_C
*
* Enable the SHA-224 and SHA-256 cryptographic hash algorithms.
*
* Module:  library/mbedtls_sha256.c
* Caller:  library/entropy.c
*          library/mbedtls_md.c
*          library/ssl_cli.c
*          library/ssl_srv.c
*          library/ssl_tls.c
*
* This module adds support for SHA-224 and SHA-256.
* This module is required for the SSL/TLS 1.2 PRF function.
*/
#define MBEDTLS_SHA256_C

/**
* \def MBEDTLS_SHA512_C
*
* Enable the SHA-384 and SHA-512 cryptographic hash algorithms.
*
* Module:  library/mbedtls_sha512.c
* Caller:  library/entropy.c
*          library/mbedtls_md.c
*          library/ssl_cli.c
*          library/ssl_srv.c
*
* This module adds support for SHA-384 and SHA-512.
*/
#define MBEDTLS_SHA512_C

/**
* \def MBEDTLS_SSL_CACHE_C
*
* Enable simple SSL cache implementation.
*
* Module:  library/ssl_cache.c
* Caller:
*
* Requires: MBEDTLS_SSL_CACHE_C
*/
#define MBEDTLS_SSL_CACHE_C

/**
* \def MBEDTLS_SSL_COOKIE_C
*
* Enable basic implementation of DTLS cookies for hello verification.
*
* Module:  library/ssl_cookie.c
* Caller:
*/
#define MBEDTLS_SSL_COOKIE_C

/**
* \def MBEDTLS_SSL_TICKET_C
*
* Enable an implementation of TLS server-side callbacks for session tickets.
*
* Module:  library/ssl_ticket.c
* Caller:
*
* Requires: MBEDTLS_CIPHER_C
*/
#define MBEDTLS_SSL_TICKET_C

/**
* \def MBEDTLS_SSL_CLI_C
*
* Enable the SSL/TLS client code.
*
* Module:  library/ssl_cli.c
* Caller:
*
* Requires: MBEDTLS_SSL_TLS_C
*
* This module is required for SSL/TLS client support.
*/
#define MBEDTLS_SSL_CLI_C

/**
* \def MBEDTLS_SSL_SRV_C
*
* Enable the SSL/TLS server code.
*
* Module:  library/ssl_srv.c
* Caller:
*
* Requires: MBEDTLS_SSL_TLS_C
*
* This module is required for SSL/TLS server support.
*/
#define MBEDTLS_SSL_SRV_C

/**
* \def MBEDTLS_SSL_TLS_C
*
* Enable the generic SSL/TLS code.
*
* Module:  library/ssl_tls.c
* Caller:  library/ssl_cli.c
*          library/ssl_srv.c
*
* Requires: MBEDTLS_CIPHER_C, MBEDTLS_MD_C
*           and at least one of the MBEDTLS_SSL_PROTO_XXX defines
*
* This module is required for SSL/TLS.
*/
#define MBEDTLS_SSL_TLS_C

/**
* \def MBEDTLS_THREADING_C
*
* Enable the threading abstraction layer.
* By default mbed TLS assumes it is used in a non-threaded environment or that
* contexts are not shared between threads. If you do intend to use contexts
* between threads, you will need to enable this layer to prevent race
* conditions.
*
* Module:  library/threading.c
*
* This allows different threading implementations (self-implemented or
* provided).
*
* You will have to enable either MBEDTLS_THREADING_ALT or
* MBEDTLS_THREADING_PTHREAD.
*
* Enable this layer to allow use of mutexes within mbed TLS
*/
//#define MBEDTLS_THREADING_C

/**
* \def MBEDTLS_TIMING_C
*
* Enable the portable timing interface.
*
* Module:  library/timing.c
* Caller:  library/havege.c
*
* This module is used by the HAVEGE random number generator.
*/
#define MBEDTLS_TIMING_C

/**
* \def MBEDTLS_VERSION_C
*
* Enable run-time version information.
*
* Module:  library/version.c
*
* This module provides run-time version information.
*/
#define MBEDTLS_VERSION_C

/**
* \def MBEDTLS_X509_USE_C
*
* Enable X.509 core for using certificates.
*
* Module:  library/x509.c
* Caller:  library/mbedtls_x509_crl.c
*          library/mbedtls_x509_crt.c
*          library/mbedtls_x509_csr.c
*
* Requires: MBEDTLS_ASN1_PARSE_C, MBEDTLS_BIGNUM_C, MBEDTLS_OID_C,
*           MBEDTLS_PK_PARSE_C
*
* This module is required for the X.509 parsing modules.
*/
#define MBEDTLS_X509_USE_C

/**
* \def MBEDTLS_X509_CRT_PARSE_C
*
* Enable X.509 certificate parsing.
*
* Module:  library/mbedtls_x509_crt.c
* Caller:  library/ssl_cli.c
*          library/ssl_srv.c
*          library/ssl_tls.c
*
* Requires: MBEDTLS_X509_USE_C
*
* This module is required for X.509 certificate parsing.
*/
#define MBEDTLS_X509_CRT_PARSE_C

/**
* \def MBEDTLS_X509_CRL_PARSE_C
*
* Enable X.509 CRL parsing.
*
* Module:  library/mbedtls_x509_crl.c
* Caller:  library/mbedtls_x509_crt.c
*
* Requires: MBEDTLS_X509_USE_C
*
* This module is required for X.509 CRL parsing.
*/
#define MBEDTLS_X509_CRL_PARSE_C

/**
* \def MBEDTLS_X509_CSR_PARSE_C
*
* Enable X.509 Certificate Signing Request (CSR) parsing.
*
* Module:  library/mbedtls_x509_csr.c
* Caller:  library/x509_crt_write.c
*
* Requires: MBEDTLS_X509_USE_C
*
* This module is used for reading X.509 certificate request.
*/
#define MBEDTLS_X509_CSR_PARSE_C

/**
* \def MBEDTLS_X509_CREATE_C
*
* Enable X.509 core for creating certificates.
*
* Module:  library/x509_create.c
*
* Requires: MBEDTLS_BIGNUM_C, MBEDTLS_OID_C, MBEDTLS_PK_WRITE_C
*
* This module is the basis for creating X.509 certificates and CSRs.
*/
#define MBEDTLS_X509_CREATE_C

/**
* \def MBEDTLS_X509_CRT_WRITE_C
*
* Enable creating X.509 certificates.
*
* Module:  library/x509_crt_write.c
*
* Requires: MBEDTLS_X509_CREATE_C
*
* This module is required for X.509 certificate creation.
*/
#define MBEDTLS_X509_CRT_WRITE_C

/**
* \def MBEDTLS_X509_CSR_WRITE_C
*
* Enable creating X.509 Certificate Signing Requests (CSR).
*
* Module:  library/x509_csr_write.c
*
* Requires: MBEDTLS_X509_CREATE_C
*
* This module is required for X.509 certificate request writing.
*/
#define MBEDTLS_X509_CSR_WRITE_C

/**
* \def MBEDTLS_XTEA_C
*
* Enable the XTEA block cipher.
*
* Module:  library/xtea.c
* Caller:
*/
#define MBEDTLS_XTEA_C

/* \} name SECTION: mbed TLS modules */

/**
* \name SECTION: Module configuration options
*
* This section allows for the setting of module specific sizes and
* configuration options. The default values are already present in the
* relevant header files and should suffice for the regular use cases.
*
* Our advice is to enable options and change their values here
* only if you have a good reason and know the consequences.
*
* Please check the respective header file for documentation on these
* parameters (to prevent duplicate documentation).
* \{
*/

/* MPI / BIGNUM options */
//#define MBEDTLS_MPI_WINDOW_SIZE            6 /**< Maximum windows size used. */
//#define MBEDTLS_MPI_MAX_SIZE            1024 /**< Maximum number of bytes for usable MPIs. */

/* CTR_DRBG options */
//#define MBEDTLS_CTR_DRBG_ENTROPY_LEN               48 /**< Amount of entropy used per seed by default (48 with SHA-512, 32 with SHA-256) */
//#define MBEDTLS_CTR_DRBG_RESEED_INTERVAL        10000 /**< Interval before reseed is performed by default */
//#define MBEDTLS_CTR_DRBG_MAX_INPUT                256 /**< Maximum number of additional input bytes */
//#define MBEDTLS_CTR_DRBG_MAX_REQUEST             1024 /**< Maximum number of requested bytes per call */
//#define MBEDTLS_CTR_DRBG_MAX_SEED_INPUT           384 /**< Maximum size of (re)seed buffer */

/* HMAC_DRBG options */
//#define MBEDTLS_HMAC_DRBG_RESEED_INTERVAL   10000 /**< Interval before reseed is performed by default */
//#define MBEDTLS_HMAC_DRBG_MAX_INPUT           256 /**< Maximum number of additional input bytes */
//#define MBEDTLS_HMAC_DRBG_MAX_REQUEST        1024 /**< Maximum number of requested bytes per call */
//#define MBEDTLS_HMAC_DRBG_MAX_SEED_INPUT      384 /**< Maximum size of (re)seed buffer */

/* ECP options */
//#define MBEDTLS_ECP_MAX_BITS             521 /**< Maximum bit size of groups */
//#define MBEDTLS_ECP_WINDOW_SIZE            6 /**< Maximum window size used */
//#define MBEDTLS_ECP_FIXED_POINT_OPTIM      1 /**< Enable fixed-point speed-up */

/* Entropy options */
//#define MBEDTLS_ENTROPY_MAX_SOURCES                20 /**< Maximum number of sources supported */
//#define MBEDTLS_ENTROPY_MAX_GATHER                128 /**< Maximum amount requested from entropy sources */

/* Memory buffer allocator options */
//#define MBEDTLS_MEMORY_ALIGN_MULTIPLE      4 /**< Align on multiples of this value */

/* Platform options */
//#define MBEDTLS_PLATFORM_STD_MEM_HDR   <stdlib.h> /**< Header to include if MBEDTLS_PLATFORM_NO_STD_FUNCTIONS is defined. Don’t define if no header is needed. */
//#define MBEDTLS_PLATFORM_STD_CALLOC        calloc /**< Default allocator to use, can be undefined */
//#define MBEDTLS_PLATFORM_STD_FREE            free /**< Default free to use, can be undefined */
//#define MBEDTLS_PLATFORM_STD_EXIT            exit /**< Default exit to use, can be undefined */
//#define MBEDTLS_PLATFORM_STD_FPRINTF      fprintf /**< Default fprintf to use, can be undefined */
//#define MBEDTLS_PLATFORM_STD_PRINTF        printf /**< Default printf to use, can be undefined */
/* Note: your snprintf must correclty zero-terminate the buffer! */
//#define MBEDTLS_PLATFORM_STD_SNPRINTF    snprintf /**< Default snprintf to use, can be undefined */

/* To Use Function Macros MBEDTLS_PLATFORM_C must be enabled */
/* MBEDTLS_PLATFORM_XXX_MACRO and MBEDTLS_PLATFORM_XXX_ALT cannot both be defined */
//#define MBEDTLS_PLATFORM_CALLOC_MACRO        calloc /**< Default allocator macro to use, can be undefined */
//#define MBEDTLS_PLATFORM_FREE_MACRO            free /**< Default free macro to use, can be undefined */
//#define MBEDTLS_PLATFORM_EXIT_MACRO            exit /**< Default exit macro to use, can be undefined */
//#define MBEDTLS_PLATFORM_FPRINTF_MACRO      fprintf /**< Default fprintf macro to use, can be undefined */
//#define MBEDTLS_PLATFORM_PRINTF_MACRO        printf /**< Default printf macro to use, can be undefined */
/* Note: your snprintf must correclty zero-terminate the buffer! */
//#define MBEDTLS_PLATFORM_SNPRINTF_MACRO    snprintf /**< Default snprintf macro to use, can be undefined */

/* SSL Cache options */
//#define MBEDTLS_SSL_CACHE_DEFAULT_TIMEOUT       86400 /**< 1 day  */
//#define MBEDTLS_SSL_CACHE_DEFAULT_MAX_ENTRIES      50 /**< Maximum entries in cache */

/* SSL options */
//#define MBEDTLS_SSL_MAX_CONTENT_LEN             16384 /**< Maxium fragment length in bytes, determines the size of each of the two internal I/O buffers */
//#define MBEDTLS_SSL_DEFAULT_TICKET_LIFETIME     86400 /**< Lifetime of session tickets (if enabled) */
//#define MBEDTLS_PSK_MAX_LEN               32 /**< Max size of TLS pre-shared keys, in bytes (default 256 bits) */
//#define MBEDTLS_SSL_COOKIE_TIMEOUT        60 /**< Default expiration delay of DTLS cookies, in seconds if HAVE_TIME, or in number of cookies issued */

/**
* Complete list of ciphersuites to use, in order of preference.
*
* \warning No dependency checking is done on that field! This option can only
* be used to restrict the set of available ciphersuites. It is your
* responsibility to make sure the needed modules are active.
*
* Use this to save a few hundred bytes of ROM (default ordering of all
* available ciphersuites) and a few to a few hundred bytes of RAM.
*
* The value below is only an example, not the default.
*/
//#define MBEDTLS_SSL_CIPHERSUITES MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256

/* X509 options */
//#define MBEDTLS_X509_MAX_INTERMEDIATE_CA   8   /**< Maximum number of intermediate CAs in a verification chain. */

/* \} name SECTION: Module configuration options */

#if defined(TARGET_LIKE_MBED)
#include “mbedtls/target_config.h”
#endif

/*
* Allow user to override any previous default.
*
* Use two macro names for that, as:
* – with yotta the prefix YOTTA_CFG_ is forced
* – without yotta is looks weird to have a YOTTA prefix.
*/
#if defined(YOTTA_CFG_MBEDTLS_USER_CONFIG_FILE)
#include YOTTA_CFG_MBEDTLS_USER_CONFIG_FILE
#elif defined(MBEDTLS_USER_CONFIG_FILE)
#include MBEDTLS_USER_CONFIG_FILE
#endif

//#include “check_config.h”

#endif /* MBEDTLS_CONFIG_H */

// Beware, this code is shared between the kernel and userspace.

#ifdef _KERNEL
#include <types.h>
#include <lib.h>
#include <kern/errno.h>
#else
#include <string.h>
#include <stdlib.h>
#include <errno.h>
#include <unistd.h>
#include <time.h>
#include <stdio.h>
#endif

#include <kern/secure.h>
#include “sha256.h”

// The full length (with null) of the hex string of a byte array
#define HEXLEN(a) 2*a+1

#define SHA256_BLOCK_SIZE 64
#define SHA256_OUTPUT_SIZE 32

// Keep this divisible by 4, or else change make_salt()
#define SALT_BYTES 8

// inner and outer padding for HMAC.
static const unsigned char ipad[SHA256_BLOCK_SIZE] = { [0 … SHA256_BLOCK_SIZE-1] = 0x36 };
static const unsigned char opad[SHA256_BLOCK_SIZE] = { [0 … SHA256_BLOCK_SIZE-1] = 0x5c };

// Hack for not having a userspace malloc until ASST3. We ‘allocate’ these statuc buffers.
// This works because the process single-threaded.
#define NUM_BUFFERS 4
#define BUFFER_LEN 1024

static char temp_buffers[NUM_BUFFERS][BUFFER_LEN];
static int buf_num = 0;

#ifndef _KERNEL
static int did_random = 0;
#define NSEC_PER_MSEC 1000000ULL
#define MSEC_PER_SEC 1000ULL
#endif

// Both userspace and the kernel are using the temp buffers now.
static void * _alloc(size_t size)
{
(void)size;
void *ptr = temp_buffers[buf_num];
buf_num++;
buf_num = buf_num % NUM_BUFFERS;
return ptr;
}

static void _free(void *ptr)
{
(void)ptr;
}

/*
* hamc_sha256 follows FIPS 198-1 HMAC using sha256.
* See http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf for details.
* NOTE: This is only thread-safe if called from within secprintf()!!!
*/
static int hmac_sha256(const char *msg, size_t msg_len, const char *key, size_t key_len,
unsigned char output[SHA256_OUTPUT_SIZE])
{
// We use a total of 320 bytes of array data on the stack
unsigned char k0[SHA256_BLOCK_SIZE];

// Steps 1-3.  Anything less than 64 bytes gets 0s appended.
memset(k0, 0, SHA256_BLOCK_SIZE);

if (key_len <= SHA256_BLOCK_SIZE) {
memcpy(k0, key, key_len);
} else {
mbedtls_sha256((unsigned char *)key, key_len, k0, 0);
}

// Steps 4 and 7.
unsigned char k_ipad[SHA256_BLOCK_SIZE];
unsigned char k_opad[SHA256_BLOCK_SIZE];

int i;
for (i = 0; i < SHA256_BLOCK_SIZE; i++) {
k_ipad[i] = k0[i] ^ ipad[i];
k_opad[i] = k0[i] ^ opad[i];
}

// Step 5 (K0 xor ipad) || msg
// We have no idea how big the message is so we allocate this on the heap.
unsigned char *data = (unsigned char *)_alloc(msg_len + SHA256_BLOCK_SIZE);
if (!data)
return ENOMEM;

memcpy(data, k_ipad, SHA256_BLOCK_SIZE);
memcpy(data+SHA256_BLOCK_SIZE, msg, msg_len);

// Step6: H((k0 xor ipad) || msg)
unsigned char h1[SHA256_OUTPUT_SIZE];
mbedtls_sha256(data, msg_len + SHA256_BLOCK_SIZE, h1, 0);
_free(data);

// Step 8: (k0 xor opad) || H((k0 xor ipad) || msg)
unsigned char inner[SHA256_OUTPUT_SIZE + SHA256_BLOCK_SIZE];
memcpy(inner, k_opad, SHA256_BLOCK_SIZE);
memcpy(inner + SHA256_BLOCK_SIZE, h1, SHA256_OUTPUT_SIZE);

// Step 9: Finally, H((k0 xor opad) || H((k0 xor ipad) || msg))
mbedtls_sha256(inner, SHA256_OUTPUT_SIZE + SHA256_BLOCK_SIZE, output, 0);

return 0;
}

static inline char to_hex(int n)
{
return n < 10 ? ‘0’+n : ‘a’ + (n-10);
}

static void array_to_hex(unsigned char *a, size_t len, char *res)
{
size_t i, j;
j = 0;
for (i = 0; i < len; i++) {
res[j++] = to_hex(a[i] >> 4);
res[j++] = to_hex(a[i] & 0xF);
}
res[j] = ‘\0’;
}

static void make_salt(char *salt_str)
{
#ifndef _KERNEL
if (!did_random) {
did_random = 1;
time_t sec;
unsigned long ns;
unsigned long long ms;

__time(&sec, &ns);
ms = (unsigned long long)sec * MSEC_PER_SEC;
ms += (ns / NSEC_PER_MSEC);
srandom((unsigned long)ms);
}
#endif

// Compute salt value
uint32_t salt[SALT_BYTES/sizeof(uint32_t)];

size_t i;
for (i = 0; i < SALT_BYTES/sizeof(uint32_t); i++)
{
salt[i] = random();
}

// Convert to hex string
array_to_hex((unsigned char *)salt, SALT_BYTES, salt_str);
}

int hmac(const char *msg, size_t msg_len, const char *key, size_t key_len,
char **hash_str)
{
*hash_str = _alloc(HEXLEN(SHA256_OUTPUT_SIZE));

if (!(*hash_str))
return ENOMEM;

// Hash it
unsigned char hash[SHA256_OUTPUT_SIZE];
int res = hmac_sha256(msg, msg_len, key, key_len, hash);
if (res)
return res;

// Convert to hex string
array_to_hex(hash, SHA256_OUTPUT_SIZE, *hash_str);

return 0;
}

// NOTE: This is only thread-safe if called from within secprintf()!!!
int hmac_salted(const char *msg, size_t msg_len, const char *key, size_t key_len,
char **hash_str, char **salt_str)
{
*salt_str = _alloc(HEXLEN(SALT_BYTES));

if (!(*salt_str))
return ENOMEM;

// Create the salt value
make_salt(*salt_str);

// Concatenate the key and salt, with the resulting string being null-terminated
size_t key2_len = key_len + HEXLEN(SALT_BYTES)-1;
char *key2 = (char *)_alloc(key2_len+1);
if (!key2)
return ENOMEM;

strcpy(key2, key);
strcpy(key2+key_len, *salt_str);
key2[key2_len] = ‘\0′;

// Hash it
return hmac(msg, msg_len, key2, key2_len, hash_str);
}

The (potential) OS/161 assignments
———————————-

OS/161 is used by a wide variety of courses at a wide variety of
schools, no two of which have the exact same set of assignments and
assignment requirements. The code base has been (to the extent
reasonably possible) structured to allow this and not assume any
particular structure or (particularly) numbering of assignments.

That said, in various places comments and documentation must (to be
helpful, at least) refer to particular assignments and things that are
(typically) done in particular assignments. These are written in
fairly general terms. This file is provided as an index for those
terms.

***  Always refer to the course materials provided by your     ***
***  instructors when trying to figure out what functionality  ***
***  you are and are not required to implement.                ***

Note that the OS/161 code base you are given may include solutions for
some parts of the assignments described below, or even some whole
assignments.

Also note that the text below refers to assorted technical terms and
OS concepts without much or any explanation; you may not be familiar
with most of them at first and that’s perfectly ok.

OS/161 is intended to support six basic assignments, most of which can
be divided into smaller pieces. These six assignments are:

– synchronization;
– basic system calls;
– virtual memory;
– basic file system functionality;
– file system recovery via journaling;
– some additional piece of OS functionality.

Synchronization.

This assignment has (potentially) three parts:
– Implement (sleep) locks and condition variables.
– Implement reader-writer locks.
– Solve some synchronization problems of the dining-philosophers
variety.

Basic system calls. (And processes.)

This assignment has (potentially) up to six parts:
– Implement file tables and open-file objects.
– Implement the basic system calls for files, normally:
– open()
– dup2()
– read()
– write()
– lseek()
– close()
– chdir()
– __getcwd()
– Implement processes, process IDs, and the basic process system
calls, normally:
– getpid()
– fork()
– _exit()
– waitpid()
– Implement the execv() system call.
– Implement a scheduler.

Virtual memory.

This assignment entails replacing a provided very simple virtual
memory system with a real one. This possibly includes providing the
sbrk() system call. It does not split into parts readily.

Basic file system functionality.

This assignment has (potentially) up to five parts:
– Add more system calls for file system operations, typically taken
from these:
– sync()
– mkdir()
– rmdir()
– remove()
– link()
– rename()
– getdirentry()
– fstat()
– fsync()
– ftruncate()
– flock()
although others may be chosen.
– Implement a buffer cache.
– Replace a biglock with fine-grained locking in the VFS layer
and/or the SFS file system.
– Add support for subdirectories to SFS.
– Implement cross-directory rename in SFS.
– Implement larger files in SFS.

File system recovery via journaling.

This assignment has (potentially) five parts:
– Implement an on-disk container for a file system journal.
– Instrument the buffer cache to support write-ahead journaling.
– Design a system of journal records suitable for recovering the
file system after a crash.
– Add code to SFS to issue these journal records.
– Implement code to read the on-disk journal and recover from a
crash.

Additional projects.

There is a wide variety of things that can be done to build on the
above assignments. None are listed here, because this file is not
the place for it.
SHELL DESIGN NOTES
——————

The shell has few bells and whistles. It allows up to 128
backgrounded jobs (after this point you have to wait for some to exit,
because the table it uses to track these cannot be resized.)

The background jobs are tracked in an array of MAXBG pid_t’s. If an
open slot is found, a background job’s pid can be stashed there.
Background jobs can be collected using the “wait” built-in command,
which removes any pids whose exit status it collects from the
background jobs table.

The wait built-in command takes an optional argument, the process
id to wait for. The shell will attempt to wait for any process, not
just the ones it actually started as its own background jobs. However,
since no facility exists for looking up the pids of running processes,
this ability is not necessarily useful. If no argument is provided,
wait waits for all outstanding background jobs.

The shell uses WNOHANG if WNOHANG is defined, in which case
background jobs are polled after every command, like in Unix shells.
If WNOHANG is not defined, background jobs are polled only by user
request. In OS/161 2.0, WNOHANG is always defined in the kernel header
files, but the implementation is only suggested, not required. To make
the shell stop trying to use WNOHANG, patch it, or remove WNOHANG from
kern/wait.h.

There are two other built-in commands: chdir, which uses the chdir
system call to change directory, and can also be accessed as just cd,
and exit, which causes the shell to exit with a specified exit status
(0 if not supplied).

Note that all these built-in commands must be built into the shell
in order to work usefully.

The shell processes commands by reading lines and then splitting
them up into words using whitespace characters (space, tab, carriage
return, and newline) as separators. No punctuation characters are
interpreted, except for `&’. No variable substitution or argument
wildcard expansion (“globbing”) is performed.

The `&’ character, if present as the last word on a command line,
is treated as the “background” operator: the command is run as a
background job, that is, after starting it the shell immediately
prints another prompt and accepts more commands. Note that the `&’
must be preceded by whitespace to be recognized. The process id of the
background job is printed as it starts. Note that shell builtins
cannot be backgrounded; furthermore, because the OS/161 console does
not support job control, starting background jobs that perform
terminal input (or, to a lesser extent, terminal output) may produce
confusing and/or unwanted results.

The shell also supports the “sh -c COMMAND” syntax in the hopes
that it will be useful.
User-level malloc
—————–

The user-level malloc implementation is defined to be simple, not
fast or efficient. It uses a very basic first-fit block algorithm.

There’s an 8-byte header which holds the offsets to the previous
and next blocks, a used/free bit, and some magic numbers (for
consistency checking) in the remaining available header bits. It also
allocates in units of 8 bytes to guarantee proper alignment of
doubles. (It also assumes its own headers are aligned on 8-byte
boundaries.)

On malloc(), it searches the entire heap starting at the beginning
for the first block big enough to hold the allocation. If it doesn’t
find one, it calls sbrk() to get more memory. If it does find one, it
marks the block in use. It splits the remaining portion of the block
off as a new free block only if said portion is large enough to hold
both a header and some data.

On free(), it marks the block free and then tries to merge it with
the adjacent blocks (both above and below) if they’re free.

That’s about all there is to it.