1 /*
2  * Copyright The TrustedFirmware-M Contributors
3  *
4  * SPDX-License-Identifier: BSD-3-Clause
5  *
6  */
7 /**
8  * \file config.h
9  *
10  * \brief Configuration options (set of defines)
11  *
12  *  This set of compile-time options may be used to enable
13  *  or disable features selectively, and reduce the global
14  *  memory footprint.
15  */
16 
17 #ifndef PROFILE_M_MBEDTLS_CONFIG_H
18 #define PROFILE_M_MBEDTLS_CONFIG_H
19 
20 #include "config_tfm.h"
21 
22 #if defined(_MSC_VER) && !defined(_CRT_SECURE_NO_DEPRECATE)
23 #define _CRT_SECURE_NO_DEPRECATE 1
24 #endif
25 
26 /**
27  * \name SECTION: System support
28  *
29  * This section sets system specific settings.
30  * \{
31  */
32 
33 /**
34  * \def MBEDTLS_HAVE_ASM
35  *
36  * The compiler has support for asm().
37  *
38  * Requires support for asm() in compiler.
39  *
40  * Used in:
41  *      library/aria.c
42  *      library/timing.c
43  *      include/mbedtls/bn_mul.h
44  *
45  * Required by:
46  *      MBEDTLS_AESNI_C
47  *      MBEDTLS_PADLOCK_C
48  *
49  * Comment to disable the use of assembly code.
50  */
51 #define MBEDTLS_HAVE_ASM
52 
53 /**
54  * \def MBEDTLS_PLATFORM_MEMORY
55  *
56  * Enable the memory allocation layer.
57  *
58  * By default mbed TLS uses the system-provided calloc() and free().
59  * This allows different allocators (self-implemented or provided) to be
60  * provided to the platform abstraction layer.
61  *
62  * Enabling MBEDTLS_PLATFORM_MEMORY without the
63  * MBEDTLS_PLATFORM_{FREE,CALLOC}_MACROs will provide
64  * "mbedtls_platform_set_calloc_free()" allowing you to set an alternative calloc() and
65  * free() function pointer at runtime.
66  *
67  * Enabling MBEDTLS_PLATFORM_MEMORY and specifying
68  * MBEDTLS_PLATFORM_{CALLOC,FREE}_MACROs will allow you to specify the
69  * alternate function at compile time.
70  *
71  * Requires: MBEDTLS_PLATFORM_C
72  *
73  * Enable this layer to allow use of alternative memory allocators.
74  */
75 #define MBEDTLS_PLATFORM_MEMORY
76 
77 /* \} name SECTION: System support */
78 
79 /**
80  * \name SECTION: mbed TLS feature support
81  *
82  * This section sets support for features that are or are not needed
83  * within the modules that are enabled.
84  * \{
85  */
86 
87 /**
88  * \def MBEDTLS_AES_ROM_TABLES
89  *
90  * Use precomputed AES tables stored in ROM.
91  *
92  * Uncomment this macro to use precomputed AES tables stored in ROM.
93  * Comment this macro to generate AES tables in RAM at runtime.
94  *
95  * Tradeoff: Using precomputed ROM tables reduces RAM usage by ~8kb
96  * (or ~2kb if \c MBEDTLS_AES_FEWER_TABLES is used) and reduces the
97  * initialization time before the first AES operation can be performed.
98  * It comes at the cost of additional ~8kb ROM use (resp. ~2kb if \c
99  * MBEDTLS_AES_FEWER_TABLES below is used), and potentially degraded
100  * performance if ROM access is slower than RAM access.
101  *
102  * This option is independent of \c MBEDTLS_AES_FEWER_TABLES.
103  *
104  */
105 #define MBEDTLS_AES_ROM_TABLES
106 
107 /**
108  * \def MBEDTLS_AES_FEWER_TABLES
109  *
110  * Use less ROM/RAM for AES tables.
111  *
112  * Uncommenting this macro omits 75% of the AES tables from
113  * ROM / RAM (depending on the value of \c MBEDTLS_AES_ROM_TABLES)
114  * by computing their values on the fly during operations
115  * (the tables are entry-wise rotations of one another).
116  *
117  * Tradeoff: Uncommenting this reduces the RAM / ROM footprint
118  * by ~6kb but at the cost of more arithmetic operations during
119  * runtime. Specifically, one has to compare 4 accesses within
120  * different tables to 4 accesses with additional arithmetic
121  * operations within the same table. The performance gain/loss
122  * depends on the system and memory details.
123  *
124  * This option is independent of \c MBEDTLS_AES_ROM_TABLES.
125  *
126  */
127 #define MBEDTLS_AES_FEWER_TABLES
128 
129 /**
130  * \def MBEDTLS_ECP_NIST_OPTIM
131  *
132  * Enable specific 'modulo p' routines for each NIST prime.
133  * Depending on the prime and architecture, makes operations 4 to 8 times
134  * faster on the corresponding curve.
135  *
136  * Comment this macro to disable NIST curves optimisation.
137  */
138 #define MBEDTLS_ECP_NIST_OPTIM
139 
140 /**
141  * \def MBEDTLS_NO_PLATFORM_ENTROPY
142  *
143  * Do not use built-in platform entropy functions.
144  * This is useful if your platform does not support
145  * standards like the /dev/urandom or Windows CryptoAPI.
146  *
147  * Uncomment this macro to disable the built-in platform entropy functions.
148  */
149 #define MBEDTLS_NO_PLATFORM_ENTROPY
150 
151 /**
152  * \def MBEDTLS_ENTROPY_NV_SEED
153  *
154  * Enable the non-volatile (NV) seed file-based entropy source.
155  * (Also enables the NV seed read/write functions in the platform layer)
156  *
157  * This is crucial (if not required) on systems that do not have a
158  * cryptographic entropy source (in hardware or kernel) available.
159  *
160  * Requires: MBEDTLS_ENTROPY_C, MBEDTLS_PLATFORM_C
161  *
162  * \note The read/write functions that are used by the entropy source are
163  *       determined in the platform layer, and can be modified at runtime and/or
164  *       compile-time depending on the flags (MBEDTLS_PLATFORM_NV_SEED_*) used.
165  *
166  * \note If you use the default implementation functions that read a seedfile
167  *       with regular fopen(), please make sure you make a seedfile with the
168  *       proper name (defined in MBEDTLS_PLATFORM_STD_NV_SEED_FILE) and at
169  *       least MBEDTLS_ENTROPY_BLOCK_SIZE bytes in size that can be read from
170  *       and written to or you will get an entropy source error! The default
171  *       implementation will only use the first MBEDTLS_ENTROPY_BLOCK_SIZE
172  *       bytes from the file.
173  *
174  * \note The entropy collector will write to the seed file before entropy is
175  *       given to an external source, to update it.
176  */
177 #define MBEDTLS_ENTROPY_NV_SEED
178 
179 /**
180  * \def MBEDTLS_SHA256_SMALLER
181  *
182  * Enable an implementation of SHA-256 that has lower ROM footprint but also
183  * lower performance.
184  *
185  * The default implementation is meant to be a reasonnable compromise between
186  * performance and size. This version optimizes more aggressively for size at
187  * the expense of performance. Eg on Cortex-M4 it reduces the size of
188  * mbedtls_sha256_process() from ~2KB to ~0.5KB for a performance hit of about
189  * 30%.
190  *
191  * Uncomment to enable the smaller implementation of SHA256.
192  */
193 #define MBEDTLS_SHA256_SMALLER
194 
195 /**
196  * \def MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS
197  *
198  * Assume all buffers passed to PSA functions are owned exclusively by the
199  * PSA function and are not stored in shared memory.
200  *
201  * This option may be enabled if all buffers passed to any PSA function reside
202  * in memory that is accessible only to the PSA function during its execution.
203  *
204  * This option MUST be disabled whenever buffer arguments are in memory shared
205  * with an untrusted party, for example where arguments to PSA calls are passed
206  * across a trust boundary.
207  *
208  * \note Enabling this option reduces memory usage and code size.
209  *
210  * \note Enabling this option causes overlap of input and output buffers
211  *       not to be supported by PSA functions.
212  */
213 #define MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS
214 
215 /**
216  * \def MBEDTLS_PSA_CRYPTO_CONFIG
217  *
218  * This setting allows support for cryptographic mechanisms through the PSA
219  * API to be configured separately from support through the mbedtls API.
220  *
221  * When this option is disabled, the PSA API exposes the cryptographic
222  * mechanisms that can be implemented on top of the `mbedtls_xxx` API
223  * configured with `MBEDTLS_XXX` symbols.
224  *
225  * When this option is enabled, the PSA API exposes the cryptographic
226  * mechanisms requested by the `PSA_WANT_XXX` symbols defined in
227  * include/psa/crypto_config.h. The corresponding `MBEDTLS_XXX` settings are
228  * automatically enabled if required (i.e. if no PSA driver provides the
229  * mechanism). You may still freely enable additional `MBEDTLS_XXX` symbols
230  * in mbedtls_config.h.
231  *
232  * If the symbol #MBEDTLS_PSA_CRYPTO_CONFIG_FILE is defined, it specifies
233  * an alternative header to include instead of include/psa/crypto_config.h.
234  *
235  * This feature is still experimental and is not ready for production since
236  * it is not completed.
237  */
238 #define MBEDTLS_PSA_CRYPTO_CONFIG
239 
240 /* \} name SECTION: mbed TLS feature support */
241 
242 /**
243  * \name SECTION: mbed TLS modules
244  *
245  * This section enables or disables entire modules in mbed TLS
246  * \{
247  */
248 
249 /**
250  * \def MBEDTLS_AES_C
251  *
252  * Enable the AES block cipher.
253  *
254  * Module:  library/aes.c
255  * Caller:  library/cipher.c
256  *          library/pem.c
257  *          library/ctr_drbg.c
258  *
259  * This module is required to support the TLS ciphersuites that use the AES
260  * cipher.
261  *
262  * PEM_PARSE uses AES for decrypting encrypted keys.
263  */
264 #define MBEDTLS_AES_C
265 
266 /**
267  * \def MBEDTLS_AES_ONLY_128_BIT_KEY_LENGTH
268  *
269  * Use only 128-bit keys in AES operations to save ROM.
270  *
271  * Uncomment this macro to remove support for AES operations that use 192-
272  * or 256-bit keys.
273  *
274  * Uncommenting this macro reduces the size of AES code by ~300 bytes
275  * on v8-M/Thumb2.
276  *
277  * Module:  library/aes.c
278  *
279  * Requires: MBEDTLS_AES_C
280  */
281 #define MBEDTLS_AES_ONLY_128_BIT_KEY_LENGTH
282 
283 /**
284  * \def MBEDTLS_CIPHER_C
285  *
286  * Enable the generic cipher layer.
287  *
288  * Module:  library/cipher.c
289  *
290  * Uncomment to enable generic cipher wrappers.
291  */
292 #define MBEDTLS_CIPHER_C
293 
294 /**
295  * \def MBEDTLS_CTR_DRBG_C
296  *
297  * Enable the CTR_DRBG AES-based random generator.
298  * The CTR_DRBG generator uses AES-256 by default.
299  * To use AES-128 instead, enable MBEDTLS_CTR_DRBG_USE_128_BIT_KEY below.
300  *
301  * Module:  library/ctr_drbg.c
302  * Caller:
303  *
304  * Requires: MBEDTLS_AES_C
305  *
306  * This module provides the CTR_DRBG AES random number generator.
307  */
308 #define MBEDTLS_CTR_DRBG_C
309 
310 /**
311  * \def MBEDTLS_ENTROPY_C
312  *
313  * Enable the platform-specific entropy code.
314  *
315  * Module:  library/entropy.c
316  * Caller:
317  *
318  * Requires: MBEDTLS_SHA512_C or MBEDTLS_SHA256_C
319  *
320  * This module provides a generic entropy pool
321  */
322 #define MBEDTLS_ENTROPY_C
323 
324 /**
325  * \def MBEDTLS_HKDF_C
326  *
327  * Enable the HKDF algorithm (RFC 5869).
328  *
329  * Module:  library/hkdf.c
330  * Caller:
331  *
332  * Requires: MBEDTLS_MD_C
333  *
334  * This module adds support for the Hashed Message Authentication Code
335  * (HMAC)-based key derivation function (HKDF).
336  */
337 //#define MBEDTLS_HKDF_C /* Used for HUK deriviation */
338 
339 /**
340  * \def MBEDTLS_MEMORY_BUFFER_ALLOC_C
341  *
342  * Enable the buffer allocator implementation that makes use of a (stack)
343  * based buffer to 'allocate' dynamic memory. (replaces calloc() and free()
344  * calls)
345  *
346  * Module:  library/memory_buffer_alloc.c
347  *
348  * Requires: MBEDTLS_PLATFORM_C
349  *           MBEDTLS_PLATFORM_MEMORY (to use it within mbed TLS)
350  *
351  * Enable this module to enable the buffer memory allocator.
352  */
353 #define MBEDTLS_MEMORY_BUFFER_ALLOC_C
354 
355 /**
356  * \def MBEDTLS_PLATFORM_C
357  *
358  * Enable the platform abstraction layer that allows you to re-assign
359  * functions like calloc(), free(), snprintf(), printf(), fprintf(), exit().
360  *
361  * Enabling MBEDTLS_PLATFORM_C enables to use of MBEDTLS_PLATFORM_XXX_ALT
362  * or MBEDTLS_PLATFORM_XXX_MACRO directives, allowing the functions mentioned
363  * above to be specified at runtime or compile time respectively.
364  *
365  * \note This abstraction layer must be enabled on Windows (including MSYS2)
366  * as other module rely on it for a fixed snprintf implementation.
367  *
368  * Module:  library/platform.c
369  * Caller:  Most other .c files
370  *
371  * This module enables abstraction of common (libc) functions.
372  */
373 #define MBEDTLS_PLATFORM_C
374 
375 #define MBEDTLS_PLATFORM_NO_STD_FUNCTIONS
376 #define MBEDTLS_PLATFORM_STD_MEM_HDR   <stdlib.h>
377 
378 #include <stdio.h>
379 
380 #define MBEDTLS_PLATFORM_SNPRINTF_MACRO      snprintf
381 #define MBEDTLS_PLATFORM_PRINTF_ALT
382 #define MBEDTLS_PLATFORM_STD_EXIT_SUCCESS  EXIT_SUCCESS
383 #define MBEDTLS_PLATFORM_STD_EXIT_FAILURE  EXIT_FAILURE
384 
385 /**
386  * \def MBEDTLS_PSA_CRYPTO_C
387  *
388  * Enable the Platform Security Architecture cryptography API.
389  *
390  * Module:  library/psa_crypto.c
391  *
392  * Requires: MBEDTLS_CTR_DRBG_C, MBEDTLS_ENTROPY_C
393  *
394  */
395 #define MBEDTLS_PSA_CRYPTO_C
396 
397 /**
398  * \def MBEDTLS_PSA_CRYPTO_STORAGE_C
399  *
400  * Enable the Platform Security Architecture persistent key storage.
401  *
402  * Module:  library/psa_crypto_storage.c
403  *
404  * Requires: MBEDTLS_PSA_CRYPTO_C,
405  *           either MBEDTLS_PSA_ITS_FILE_C or a native implementation of
406  *           the PSA ITS interface
407  */
408 #define MBEDTLS_PSA_CRYPTO_STORAGE_C
409 
410 /**
411  * \def MBEDTLS_PSA_CRYPTO_SPM
412  *
413  * When MBEDTLS_PSA_CRYPTO_SPM is defined, the code is built for SPM (Secure
414  * Partition Manager) integration which separates the code into two parts: a
415  * NSPE (Non-Secure Process Environment) and an SPE (Secure Process
416  * Environment).
417  *
418  * If you enable this option, your build environment must include a header
419  * file `"crypto_spe.h"` (either in the `psa` subdirectory of the Mbed TLS
420  * header files, or in another directory on the compiler's include search
421  * path). Alternatively, your platform may customize the header
422  * `psa/crypto_platform.h`, in which case it can skip or replace the
423  * inclusion of `"crypto_spe.h"`.
424  *
425  * Module:  library/psa_crypto.c
426  * Requires: MBEDTLS_PSA_CRYPTO_C
427  *
428  */
429 #define MBEDTLS_PSA_CRYPTO_SPM
430 
431 /* MBEDTLS_PSA_CRYPTO_KEY_ID_ENCODES_OWNER
432  *
433  * Enable key identifiers that encode a key owner identifier.
434  *
435  * The owner of a key is identified by a value of type ::mbedtls_key_owner_id_t
436  * which is currently hard-coded to be int32_t.
437  *
438  * Note that this option is meant for internal use only and may be removed
439  * without notice.
440  */
441 #define MBEDTLS_PSA_CRYPTO_KEY_ID_ENCODES_OWNER
442 
443 /** \def MBEDTLS_PSA_CRYPTO_BUILTIN_KEYS
444  *
445  * Enable support for platform built-in keys. If you enable this feature,
446  * you must implement the function mbedtls_psa_platform_get_builtin_key().
447  * See the documentation of that function for more information.
448  *
449  * Built-in keys are typically derived from a hardware unique key or
450  * stored in a secure element.
451  *
452  * Requires: MBEDTLS_PSA_CRYPTO_C.
453  *
454  * \warning This interface is experimental and may change or be removed
455  * without notice.
456  */
457 #define MBEDTLS_PSA_CRYPTO_BUILTIN_KEYS
458 
459 /* \} name SECTION: mbed TLS modules */
460 
461 /**
462  * \name SECTION: General configuration options
463  *
464  * This section contains Mbed TLS build settings that are not associated
465  * with a particular module.
466  *
467  * \{
468  */
469 
470 /**
471  * \def MBEDTLS_CONFIG_FILE
472  *
473  * If defined, this is a header which will be included instead of
474  * `"mbedtls/mbedtls_config.h"`.
475  * This header file specifies the compile-time configuration of Mbed TLS.
476  * Unlike other configuration options, this one must be defined on the
477  * compiler command line: a definition in `mbedtls_config.h` would have
478  * no effect.
479  *
480  * This macro is expanded after an <tt>\#include</tt> directive. This is a popular but
481  * non-standard feature of the C language, so this feature is only available
482  * with compilers that perform macro expansion on an <tt>\#include</tt> line.
483  *
484  * The value of this symbol is typically a path in double quotes, either
485  * absolute or relative to a directory on the include search path.
486  */
487 //#define MBEDTLS_CONFIG_FILE "mbedtls/mbedtls_config.h"
488 
489 /**
490  * \def MBEDTLS_USER_CONFIG_FILE
491  *
492  * If defined, this is a header which will be included after
493  * `"mbedtls/mbedtls_config.h"` or #MBEDTLS_CONFIG_FILE.
494  * This allows you to modify the default configuration, including the ability
495  * to undefine options that are enabled by default.
496  *
497  * This macro is expanded after an <tt>\#include</tt> directive. This is a popular but
498  * non-standard feature of the C language, so this feature is only available
499  * with compilers that perform macro expansion on an <tt>\#include</tt> line.
500  *
501  * The value of this symbol is typically a path in double quotes, either
502  * absolute or relative to a directory on the include search path.
503  */
504 //#define MBEDTLS_USER_CONFIG_FILE "/dev/null"
505 
506 /**
507  * \def MBEDTLS_PSA_CRYPTO_CONFIG_FILE
508  *
509  * If defined, this is a header which will be included instead of
510  * `"psa/crypto_config.h"`.
511  * This header file specifies which cryptographic mechanisms are available
512  * through the PSA API when #MBEDTLS_PSA_CRYPTO_CONFIG is enabled, and
513  * is not used when #MBEDTLS_PSA_CRYPTO_CONFIG is disabled.
514  *
515  * This macro is expanded after an <tt>\#include</tt> directive. This is a popular but
516  * non-standard feature of the C language, so this feature is only available
517  * with compilers that perform macro expansion on an <tt>\#include</tt> line.
518  *
519  * The value of this symbol is typically a path in double quotes, either
520  * absolute or relative to a directory on the include search path.
521  */
522 //#define MBEDTLS_PSA_CRYPTO_CONFIG_FILE "psa/crypto_config.h"
523 
524 /**
525  * \def MBEDTLS_PSA_CRYPTO_USER_CONFIG_FILE
526  *
527  * If defined, this is a header which will be included after
528  * `"psa/crypto_config.h"` or #MBEDTLS_PSA_CRYPTO_CONFIG_FILE.
529  * This allows you to modify the default configuration, including the ability
530  * to undefine options that are enabled by default.
531  *
532  * This macro is expanded after an <tt>\#include</tt> directive. This is a popular but
533  * non-standard feature of the C language, so this feature is only available
534  * with compilers that perform macro expansion on an <tt>\#include</tt> line.
535  *
536  * The value of this symbol is typically a path in double quotes, either
537  * absolute or relative to a directory on the include search path.
538  */
539 //#define MBEDTLS_PSA_CRYPTO_USER_CONFIG_FILE "/dev/null"
540 
541 /** \} name SECTION: General configuration options */
542 
543 /**
544  * \name SECTION: Module configuration options
545  *
546  * This section allows for the setting of module specific sizes and
547  * configuration options. The default values are already present in the
548  * relevant header files and should suffice for the regular use cases.
549  *
550  * Our advice is to enable options and change their values here
551  * only if you have a good reason and know the consequences.
552  *
553  * Please check the respective header file for documentation on these
554  * parameters (to prevent duplicate documentation).
555  * \{
556  */
557 
558 /* ECP options */
559 #define MBEDTLS_ECP_FIXED_POINT_OPTIM        0 /**< Disable fixed-point speed-up */
560 
561 /**
562  * Uncomment to enable p256-m. This is an alternative implementation of
563  * key generation, ECDH and (randomized) ECDSA on the curve SECP256R1.
564  * Compared to the default implementation:
565  *
566  * - p256-m has a much smaller code size and RAM footprint.
567  * - p256-m is only available via the PSA API. This includes the pk module
568  *   when #MBEDTLS_USE_PSA_CRYPTO is enabled.
569  * - p256-m does not support deterministic ECDSA, EC-JPAKE, custom protocols
570  *   over the core arithmetic, or deterministic derivation of keys.
571  *
572  * We recommend enabling this option if your application uses the PSA API
573  * and the only elliptic curve support it needs is ECDH and ECDSA over
574  * SECP256R1.
575  *
576  * If you enable this option, you do not need to enable any ECC-related
577  * MBEDTLS_xxx option. You do need to separately request support for the
578  * cryptographic mechanisms through the PSA API:
579  * - #MBEDTLS_PSA_CRYPTO_C and #MBEDTLS_PSA_CRYPTO_CONFIG for PSA-based
580  *   configuration;
581  * - #MBEDTLS_USE_PSA_CRYPTO if you want to use p256-m from PK, X.509 or TLS;
582  * - #PSA_WANT_ECC_SECP_R1_256;
583  * - #PSA_WANT_ALG_ECDH and/or #PSA_WANT_ALG_ECDSA as needed;
584  * - #PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY, #PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC,
585  *   #PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT,
586  *   #PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT and/or
587  *   #PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE as needed.
588  *
589  * \note To benefit from the smaller code size of p256-m, make sure that you
590  *       do not enable any ECC-related option not supported by p256-m: this
591  *       would cause the built-in ECC implementation to be built as well, in
592  *       order to provide the required option.
593  *       Make sure #PSA_WANT_ALG_DETERMINISTIC_ECDSA, #PSA_WANT_ALG_JPAKE and
594  *       #PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE, and curves other than
595  *       SECP256R1 are disabled as they are not supported by this driver.
596  *       Also, avoid defining #MBEDTLS_PK_PARSE_EC_COMPRESSED or
597  *       #MBEDTLS_PK_PARSE_EC_EXTENDED as those currently require a subset of
598  *       the built-in ECC implementation, see docs/driver-only-builds.md.
599  */
600 #define MBEDTLS_PSA_P256M_DRIVER_ENABLED
601 
602 /* \} name SECTION: Customisation configuration options */
603 
604 #if CRYPTO_NV_SEED
605 #include "tfm_mbedcrypto_config_extra_nv_seed.h"
606 #endif /* CRYPTO_NV_SEED */
607 
608 #if !defined(CRYPTO_HW_ACCELERATOR) && defined(MBEDTLS_ENTROPY_NV_SEED)
609 #include "mbedtls_entropy_nv_seed_config.h"
610 #endif
611 
612 #ifdef CRYPTO_HW_ACCELERATOR
613 #include "mbedtls_accelerator_config.h"
614 #endif
615 
616 #endif /* PROFILE_M_MBEDTLS_CONFIG_H */
617