File:  [ELWIX - Embedded LightWeight unIX -] / embedaddon / axTLS / ssl / Config.in
Revision 1.1.1.1 (vendor branch): download - view: text, annotated - select for diffs - revision graph
Fri Sep 28 11:55:55 2012 UTC (12 years, 6 months ago) by misho
Branches: v1_4_8, MAIN
CVS tags: datecs, HEAD
axTLS

    1: #
    2: # For a description of the syntax of this configuration file,
    3: # see scripts/config/Kconfig-language.txt
    4: #
    5: 
    6: menu "SSL Library"
    7: 
    8: choice
    9:     prompt "Mode"
   10:     default CONFIG_SSL_FULL_MODE
   11: 
   12: config CONFIG_SSL_SERVER_ONLY
   13:     bool "Server only - no verification"
   14:     help
   15:         Enable server functionality (no client functionality). 
   16:         This mode still supports sessions and chaining (which can be turned
   17:         off in configuration).
   18: 
   19:         The axssl sample runs with the minimum of features.
   20:                 
   21:         This is the most space efficient of the modes with the library 
   22:         about 45kB in size. Use this mode if you are doing standard SSL server
   23:         work.
   24: 
   25: config CONFIG_SSL_CERT_VERIFICATION
   26:     bool "Server only - with verification"
   27:     help
   28:         Enable server functionality with client authentication (no client
   29:         functionality). 
   30: 
   31:         The axssl sample runs with the "-verify" and "-CAfile" options.
   32: 
   33:         This mode produces a library about 49kB in size. Use this mode if you
   34:         have an SSL server which requires client authentication (which is 
   35:         uncommon in browser applications).
   36: 
   37: config CONFIG_SSL_ENABLE_CLIENT
   38:     bool "Client/Server enabled"
   39:     help
   40:         Enable client/server functionality (including peer authentication).
   41: 
   42:         The axssl sample runs with the "s_client" option enabled.
   43: 
   44:         This mode produces a library about 51kB in size. Use this mode if you
   45:         require axTLS to use SSL client functionality (the SSL server code
   46:         is always enabled).
   47: 
   48: config CONFIG_SSL_FULL_MODE
   49:     bool "Client/Server enabled with diagnostics"
   50:     help
   51:         Enable client/server functionality including diagnostics. Most of the
   52:         extra size in this mode is due to the storage of various strings that
   53:         are used.
   54: 
   55:         The axssl sample has 3 more options, "-debug", "-state" and "-show-rsa"
   56: 
   57:         This mode produces a library about 58kB in size. It is suggested that 
   58:         this mode is used only during development, or systems that have more
   59:         generous memory limits.
   60: 
   61:         It is the default to demonstrate the features of axTLS.
   62: 
   63: config CONFIG_SSL_SKELETON_MODE
   64:     bool "Skeleton mode - the smallest server mode"
   65:     help
   66:         This is an experiment to build the smallest library at the expense of
   67:         features and speed.
   68: 
   69:         * Server mode only.
   70:         * The AES cipher is disabled.
   71:         * No session resumption.
   72:         * No external keys/certificates are supported.
   73:         * The bigint library has most of the performance features disabled.
   74:         * Some other features/API calls may not work.
   75: 
   76:         This mode produces a library about 37kB in size. The main
   77:         disadvantage of this mode is speed - it will be much slower than the 
   78:         other build modes.
   79: 
   80: endchoice
   81: 
   82: choice
   83:     prompt "Protocol Preference"
   84:     depends on !CONFIG_SSL_SKELETON_MODE
   85:     default CONFIG_SSL_PROT_MEDIUM
   86: 
   87: config CONFIG_SSL_PROT_LOW
   88:     bool "Low"
   89:     help
   90:         Chooses the cipher in the order of RC4-SHA, AES128-SHA, AES256-SHA.
   91:       
   92:         This will use the fastest cipher(s) but at the expense of security.
   93: 
   94: config CONFIG_SSL_PROT_MEDIUM
   95:     bool "Medium"
   96:     help
   97:         Chooses the cipher in the order of AES128-SHA, AES256-SHA, RC4-SHA.
   98:        
   99:         This mode is a balance between speed and security and is the default.
  100: 
  101: config CONFIG_SSL_PROT_HIGH
  102:     bool "High"
  103:     help
  104:         Chooses the cipher in the order of AES256-SHA, AES128-SHA, RC4-SHA.
  105:         
  106:         This will use the strongest cipher(s) at the cost of speed.
  107: 
  108: endchoice
  109: 
  110: config CONFIG_SSL_USE_DEFAULT_KEY
  111:     bool "Enable default key"
  112:     depends on !CONFIG_SSL_SKELETON_MODE
  113:     default y 
  114:     help
  115:         Some applications will not require the default private key/certificate
  116:         that is built in. This is one way to save on a couple of kB's if an
  117:         external private key/certificate is used.
  118: 
  119:         The private key is in ssl/private_key.h and the certificate is in
  120:         ssl/cert.h.
  121: 
  122:         The advantage of a built-in private key/certificate is that no file
  123:         system is required for access. Both the certificate and the private
  124:         key will be automatically loaded on a ssl_ctx_new().
  125:         
  126:         However this private key/certificate can never be changed (without a
  127:         code update).
  128: 
  129:         This mode is enabled by default. Disable this mode if the 
  130:         built-in key/certificate is not used.
  131: 
  132: config CONFIG_SSL_PRIVATE_KEY_LOCATION
  133:     string "Private key file location"
  134:     depends on !CONFIG_SSL_USE_DEFAULT_KEY && !CONFIG_SSL_SKELETON_MODE
  135:     help
  136:         The file location of the private key which will be automatically
  137:         loaded on a ssl_ctx_new().
  138: 
  139: config CONFIG_SSL_PRIVATE_KEY_PASSWORD
  140:     string "Private key password"
  141:     depends on !CONFIG_SSL_USE_DEFAULT_KEY && CONFIG_SSL_HAS_PEM
  142:     help
  143:         The password required to decrypt a PEM-encoded password file.
  144: 
  145: config CONFIG_SSL_X509_CERT_LOCATION
  146:     string "X.509 certificate file location"
  147:     depends on !CONFIG_SSL_GENERATE_X509_CERT && !CONFIG_SSL_USE_DEFAULT_KEY && !CONFIG_SSL_SKELETON_MODE
  148:     help
  149:         The file location of the X.509 certificate which will be automatically
  150:         loaded on a ssl_ctx_new().
  151: 
  152: config CONFIG_SSL_GENERATE_X509_CERT
  153:     bool "Generate X.509 Certificate"
  154:     default n
  155:     help
  156:         An X.509 certificate can be automatically generated on a
  157:         ssl_ctx_new(). A private key still needs to be provided (the private
  158:         key in ss/private_key.h will be used unless 
  159:         CONFIG_SSL_PRIVATE_KEY_LOCATION is set).
  160: 
  161:         The certificate is generated on the fly, and so a minor start-up time
  162:         penalty is to be expected. This feature adds around 5kB to the
  163:         library.
  164: 
  165:         This feature is disabled by default.
  166: 
  167: config CONFIG_SSL_X509_COMMON_NAME
  168:     string "X.509 Common Name"
  169:     depends on CONFIG_SSL_GENERATE_X509_CERT
  170:     help
  171:         The common name for the X.509 certificate. This should be the fully 
  172:         qualified domain name (FQDN), e.g. www.foo.com.
  173: 
  174:         If this is blank, then this will be value from gethostname() and
  175:         getdomainname().
  176: 
  177: config CONFIG_SSL_X509_ORGANIZATION_NAME
  178:     string "X.509 Organization Name"
  179:     depends on CONFIG_SSL_GENERATE_X509_CERT
  180:     help
  181:         The organization name for the generated X.509 certificate. 
  182: 
  183:         This field is optional.
  184: 
  185: config CONFIG_SSL_X509_ORGANIZATION_UNIT_NAME
  186:     string "X.509 Organization Unit Name"
  187:     depends on CONFIG_SSL_GENERATE_X509_CERT
  188:     help
  189:         The organization unit name for the generated X.509 certificate. 
  190: 
  191:         This field is optional.
  192: 
  193: config CONFIG_SSL_ENABLE_V23_HANDSHAKE
  194:     bool "Enable v23 Handshake"
  195:     default n
  196:     help
  197:         Some browsers use the v23 handshake client hello message 
  198:         (an SSL2 format message which all SSL servers can understand). 
  199:         It may be used if SSL2 is enabled in the browser.
  200: 
  201:         Since this feature takes a kB or so, this feature may be disabled - at
  202:         the risk of making it incompatible with some browsers (IE6 is ok,
  203:         Firefox 1.5 and below use it).
  204: 
  205:         Disable if backwards compatibility is not an issue (i.e. the client is
  206:         always using TLS1.0)
  207: 
  208: config CONFIG_SSL_HAS_PEM
  209:     bool "Enable PEM"
  210:     default n if !CONFIG_SSL_FULL_MODE
  211:     default y if CONFIG_SSL_FULL_MODE
  212:     depends on !CONFIG_SSL_SKELETON_MODE
  213:     help
  214:         Enable the use of PEM format for certificates and private keys.
  215: 
  216:         PEM is not normally needed - PEM files can be converted into DER files
  217:         quite easily. However they have the convenience of allowing multiple
  218:         certificates/keys in the same file.
  219:         
  220:         This feature will add a couple of kB to the library. 
  221: 
  222:         Disable if PEM is not used (which will be in most cases).
  223: 
  224: config CONFIG_SSL_USE_PKCS12
  225:     bool "Use PKCS8/PKCS12"
  226:     default n if !CONFIG_SSL_FULL_MODE
  227:     default y if CONFIG_SSL_FULL_MODE
  228:     depends on !CONFIG_SSL_SKELETON_MODE
  229:     help
  230:         PKCS#12 certificates combine private keys and certificates together in
  231:         one file.
  232: 
  233:         PKCS#8 private keys are also suppported (as it is a subset of PKCS#12).
  234: 
  235:         The decryption of these certificates uses RC4-128 (and these
  236:         certificates must be encrypted using this cipher). The actual
  237:         algorithm is "PBE-SHA1-RC4-128".
  238: 
  239:         Disable if PKCS#12 is not used (which will be in most cases).
  240: 
  241: config CONFIG_SSL_EXPIRY_TIME
  242:     int "Session expiry time (in hours)"
  243:     depends on !CONFIG_SSL_SKELETON_MODE
  244:     default 24 
  245:     help
  246:         The time (in hours) before a session expires. 
  247:         
  248:         A longer time means that the expensive parts of a handshake don't 
  249:         need to be run when a client reconnects later.
  250: 
  251:         The default is 1 day.
  252: 
  253: config CONFIG_X509_MAX_CA_CERTS
  254:     int "Maximum number of certificate authorites"
  255:     default 150
  256:     depends on !CONFIG_SSL_SERVER_ONLY && !CONFIG_SSL_SKELETON_MODE
  257:     help
  258:         Determines the number of CA's allowed. 
  259: 
  260:         Increase this figure if more trusted sites are allowed. Each
  261:         certificate adds about 300 bytes (when added).
  262: 
  263:         The default is to allow the Debian cert bundle to be parsed.
  264: 
  265: config CONFIG_SSL_MAX_CERTS
  266:     int "Maximum number of chained certificates"
  267:     default 3
  268:     help
  269:         Determines the number of certificates used in a certificate
  270:         chain. The chain length must be at least 1.
  271: 
  272:         Increase this figure if more certificates are to be added to the 
  273:         chain. Each certificate adds about 300 bytes (when added).
  274: 
  275:         The default is to allow one certificate + 2 certificates in the chain.
  276: 
  277: config CONFIG_SSL_CTX_MUTEXING
  278:     bool "Enable SSL_CTX mutexing"
  279:     default n
  280:     help
  281:         Normally mutexing is not required - each SSL_CTX object can deal with
  282:         many SSL objects (as long as each SSL_CTX object is using a single
  283:         thread).
  284: 
  285:         If the SSL_CTX object is not thread safe e.g. the case where a 
  286:         new thread is created for each SSL object, then mutexing is required. 
  287: 
  288:         Select y when a mutex on the SSL_CTX object is required.
  289: 
  290: config CONFIG_USE_DEV_URANDOM
  291:     bool "Use /dev/urandom"
  292:     default y
  293:     depends on !CONFIG_PLATFORM_WIN32
  294:     help 
  295:         Use /dev/urandom. Otherwise a custom RNG is used.
  296: 
  297:         This will be the default on most Linux systems.
  298: 
  299: config CONFIG_WIN32_USE_CRYPTO_LIB
  300:     bool "Use Win32 Crypto Library"
  301:     depends on CONFIG_PLATFORM_WIN32
  302:     help 
  303:         Microsoft produce a Crypto API which requires the Platform SDK to be
  304:         installed. It's used for the RNG.
  305: 
  306:         This will be the default on most Win32 systems.
  307: 
  308: config CONFIG_OPENSSL_COMPATIBLE
  309:     bool "Enable openssl API compatibility"
  310:     default n
  311:     help 
  312:         To ease the porting of openssl applications, a subset of the openssl
  313:         API is wrapped around the axTLS API.
  314: 
  315:         Note: not all the API is implemented, so parts may still break. And
  316:         it's definitely not 100% compatible.
  317: 
  318: config CONFIG_PERFORMANCE_TESTING
  319:     bool "Build the bigint performance test tool"
  320:     default n
  321:     depends on CONFIG_SSL_CERT_VERIFICATION
  322:     help
  323:         Used for performance testing of bigint.
  324: 
  325:         This is a testing tool and is normally disabled.
  326: 
  327: config CONFIG_SSL_TEST
  328:     bool "Build the SSL testing tool"
  329:     default n
  330:     depends on CONFIG_SSL_FULL_MODE && !CONFIG_SSL_GENERATE_X509_CERT 
  331:     help
  332:         Used for sanity checking the SSL handshaking.
  333: 
  334:         This is a testing tool and is normally disabled.
  335: 
  336: endmenu

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>