Use SSL_CIPHERSUITES in example configs
diff --git a/configs/config-ccm-psk-tls1_2.h b/configs/config-ccm-psk-tls1_2.h
index f425391..c80c912 100644
--- a/configs/config-ccm-psk-tls1_2.h
+++ b/configs/config-ccm-psk-tls1_2.h
@@ -3,7 +3,7 @@
* Distinguishing features:
* - no bignum, no PK, no X509
* - fully modern and secure (provided the pre-shared keys have high entropy)
- * - very low record overhead if using the CCM-8 suites
+ * - very low record overhead with CCM-8
* - optimized for low RAM usage
*
* See README.txt for usage instructions.
@@ -44,6 +44,13 @@
#define ENTROPY_MAX_SOURCES 2
/*
+ * Use only CCM_8 ciphersuites, and
+ * save ROM and a few bytes of RAM by specifying our own ciphersuite list
+ */
+#define SSL_CIPHERSUITES \
+ TLS_PSK_WITH_AES_256_CCM_8, \
+ TLS_PSK_WITH_AES_128_CCM_8
+/*
* Save RAM at the expense of interoperability: do this only if you control
* both ends of the connection! (See coments in "polarssl/ssl.h".)
* The optimal size here depends on the typical size of records.
diff --git a/configs/config-suite-b.h b/configs/config-suite-b.h
index d10cf63..cd38f33 100644
--- a/configs/config-suite-b.h
+++ b/configs/config-suite-b.h
@@ -77,6 +77,11 @@
*/
#define ENTROPY_MAX_SOURCES 2
+/* Save ROM and a few bytes of RAM by specifying our own ciphersuite list */
+#define SSL_CIPHERSUITES \
+ TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, \
+ TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
+
/*
* Save RAM at the expense of interoperability: do this only if you control
* both ends of the connection! (See coments in "polarssl/ssl.h".)
diff --git a/tests/scripts/test-ref-configs.pl b/tests/scripts/test-ref-configs.pl
index 9b09e34..6546b05 100755
--- a/tests/scripts/test-ref-configs.pl
+++ b/tests/scripts/test-ref-configs.pl
@@ -20,7 +20,7 @@
'config-picocoin.h'
=> 0,
'config-ccm-psk-tls1_2.h'
- => '-m tls1_2 -f \'TLS-PSK.*AES.*CCM\'',
+ => '-m tls1_2 -f \'^TLS-PSK-WITH-AES-...-CCM-8\'',
);
# If no config-name is provided, use all known configs.