Lines Matching refs:enabled
18 the following compile-time configuration options enabled:
20 - `MBEDTLS_PSA_CRYPTO_C` (enabled by default) - this enables PSA Crypto.
50 `MBEDTLS_USE_PSA_CRYPTO` is enabled, so in most cases your application will
74 (including PK, X.509 and TLS if `MBEDTLS_USE_PSA_CRYPTO` is enabled) should
87 you have `MBEDTLS_PSA_ACCEL_ALG_SHA_256` enabled;
143 `MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_BASIC` are enabled), and
144 - you have driver support for all ECC curves that are enabled (that is, for
145 each `PSA_WANT_ECC_xxx` macro enabled, the corresponding
146 `MBEDTLS_PSA_ACCEL_ECC_xxx` macros is enabled as well);
151 `MBEDTLS_PSA_ACCEL_ALG_ECDH` is enabled
153 `MBEDTLS_PSA_ACCEL_ALG_ECDSA` is enabled;
155 `MBEDTLS_PSA_ACCEL_ALG_JPAKE` is enabled.
159 - none of `MBEDTLS_ECDH_C`, `MBEDTLS_ECDSA_C`, `MBEDTLS_ECJPAKE_C` are enabled
161 - you have driver support for all enabled ECC key pair operations - that is,
162 for each `PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_xxx` macro enabled, the
164 enabled,
181 enabled, with the following exceptions:
204 A limited subset of `ecp.c` will still be automatically re-enabled if any of
205 the following is enabled:
214 Note: when any of the above options is enabled, a subset of `ecp.c` will
218 above features are enabled.
245 want to have more enabled in you build?
267 Key management and usage can be enabled by means of the usual `PSA_WANT` +
287 - all the RSA algorithms that are enabled (`PSA_WANT_ALG_RSA_*`) are also
289 - and all the RSA key types that are enabled (`PSA_WANT_KEY_TYPE_RSA_*`) are
299 driver-only RSA even if `MBEDTLS_USE_PSA_CRYPTO` is enabled.
351 will work, as well as X.509 and TLS (with `MBEDTLS_USE_PSA_CRYPTO` enabled) but
359 is enabled but not accelerated, then all key types that can be used with it
361 - If a key type is enabled but not accelerated, then all algorithms that can be
372 is enabled, then only the corresponding cipher will be available at runtime
374 CMAC and all compatible key types, then `PSA_WANT_ALG_CMAC` can be enabled
393 - ECB mode is always enabled in the legacy configuration for each key type that
394 allows it (AES, ARIA, Camellia, DES), whereas it must be explicitly enabled
408 In case legacy CCM/GCM algorithms are enabled, it is still possible to benefit
427 The legacy CTR-DRBG module (enabled by `MBEDTLS_CTR_DRBG_C`) can also benefit
430 - The legacy AES module (`MBEDTLS_AES_C`) is not enabled and
442 - Either TLS is disabled, or `MBEDTLS_USE_PSA_CRYPTO` is enabled.