1 /*
2  * Copyright The TrustedFirmware-M Contributors
3  *
4  * SPDX-License-Identifier: BSD-3-Clause
5  *
6  */
7 /**
8  * \file config.h
9  *
10  * \brief Configuration options (set of defines)
11  *
12  *  This set of compile-time options may be used to enable
13  *  or disable features selectively, and reduce the global
14  *  memory footprint.
15  */
16 
17 #ifndef PROFILE_M_MBEDTLS_CONFIG_H
18 #define PROFILE_M_MBEDTLS_CONFIG_H
19 
20 #include "config_tfm.h"
21 
22 #if defined(_MSC_VER) && !defined(_CRT_SECURE_NO_DEPRECATE)
23 #define _CRT_SECURE_NO_DEPRECATE 1
24 #endif
25 
26 /**
27  * \name SECTION: System support
28  *
29  * This section sets system specific settings.
30  * \{
31  */
32 
33 /**
34  * \def MBEDTLS_HAVE_ASM
35  *
36  * The compiler has support for asm().
37  *
38  * Requires support for asm() in compiler.
39  *
40  * Used in:
41  *      library/aria.c
42  *      library/timing.c
43  *      include/mbedtls/bn_mul.h
44  *
45  * Required by:
46  *      MBEDTLS_AESNI_C
47  *      MBEDTLS_PADLOCK_C
48  *
49  * Comment to disable the use of assembly code.
50  */
51 #define MBEDTLS_HAVE_ASM
52 
53 /**
54  * \def MBEDTLS_PLATFORM_MEMORY
55  *
56  * Enable the memory allocation layer.
57  *
58  * By default mbed TLS uses the system-provided calloc() and free().
59  * This allows different allocators (self-implemented or provided) to be
60  * provided to the platform abstraction layer.
61  *
62  * Enabling MBEDTLS_PLATFORM_MEMORY without the
63  * MBEDTLS_PLATFORM_{FREE,CALLOC}_MACROs will provide
64  * "mbedtls_platform_set_calloc_free()" allowing you to set an alternative calloc() and
65  * free() function pointer at runtime.
66  *
67  * Enabling MBEDTLS_PLATFORM_MEMORY and specifying
68  * MBEDTLS_PLATFORM_{CALLOC,FREE}_MACROs will allow you to specify the
69  * alternate function at compile time.
70  *
71  * Requires: MBEDTLS_PLATFORM_C
72  *
73  * Enable this layer to allow use of alternative memory allocators.
74  */
75 #define MBEDTLS_PLATFORM_MEMORY
76 
77 /* \} name SECTION: System support */
78 
79 /**
80  * \name SECTION: mbed TLS feature support
81  *
82  * This section sets support for features that are or are not needed
83  * within the modules that are enabled.
84  * \{
85  */
86 
87 /**
88  * \def MBEDTLS_AES_ROM_TABLES
89  *
90  * Use precomputed AES tables stored in ROM.
91  *
92  * Uncomment this macro to use precomputed AES tables stored in ROM.
93  * Comment this macro to generate AES tables in RAM at runtime.
94  *
95  * Tradeoff: Using precomputed ROM tables reduces RAM usage by ~8kb
96  * (or ~2kb if \c MBEDTLS_AES_FEWER_TABLES is used) and reduces the
97  * initialization time before the first AES operation can be performed.
98  * It comes at the cost of additional ~8kb ROM use (resp. ~2kb if \c
99  * MBEDTLS_AES_FEWER_TABLES below is used), and potentially degraded
100  * performance if ROM access is slower than RAM access.
101  *
102  * This option is independent of \c MBEDTLS_AES_FEWER_TABLES.
103  *
104  */
105 #define MBEDTLS_AES_ROM_TABLES
106 
107 /**
108  * \def MBEDTLS_AES_FEWER_TABLES
109  *
110  * Use less ROM/RAM for AES tables.
111  *
112  * Uncommenting this macro omits 75% of the AES tables from
113  * ROM / RAM (depending on the value of \c MBEDTLS_AES_ROM_TABLES)
114  * by computing their values on the fly during operations
115  * (the tables are entry-wise rotations of one another).
116  *
117  * Tradeoff: Uncommenting this reduces the RAM / ROM footprint
118  * by ~6kb but at the cost of more arithmetic operations during
119  * runtime. Specifically, one has to compare 4 accesses within
120  * different tables to 4 accesses with additional arithmetic
121  * operations within the same table. The performance gain/loss
122  * depends on the system and memory details.
123  *
124  * This option is independent of \c MBEDTLS_AES_ROM_TABLES.
125  *
126  */
127 #define MBEDTLS_AES_FEWER_TABLES
128 
129 /**
130  * \def MBEDTLS_ECP_NIST_OPTIM
131  *
132  * Enable specific 'modulo p' routines for each NIST prime.
133  * Depending on the prime and architecture, makes operations 4 to 8 times
134  * faster on the corresponding curve.
135  *
136  * Comment this macro to disable NIST curves optimisation.
137  */
138 #define MBEDTLS_ECP_NIST_OPTIM
139 
140 /**
141  * \def MBEDTLS_NO_PLATFORM_ENTROPY
142  *
143  * Do not use built-in platform entropy functions.
144  * This is useful if your platform does not support
145  * standards like the /dev/urandom or Windows CryptoAPI.
146  *
147  * Uncomment this macro to disable the built-in platform entropy functions.
148  */
149 #define MBEDTLS_NO_PLATFORM_ENTROPY
150 
151 /**
152  * \def MBEDTLS_ENTROPY_NV_SEED
153  *
154  * Enable the non-volatile (NV) seed file-based entropy source.
155  * (Also enables the NV seed read/write functions in the platform layer)
156  *
157  * This is crucial (if not required) on systems that do not have a
158  * cryptographic entropy source (in hardware or kernel) available.
159  *
160  * Requires: MBEDTLS_ENTROPY_C, MBEDTLS_PLATFORM_C
161  *
162  * \note The read/write functions that are used by the entropy source are
163  *       determined in the platform layer, and can be modified at runtime and/or
164  *       compile-time depending on the flags (MBEDTLS_PLATFORM_NV_SEED_*) used.
165  *
166  * \note If you use the default implementation functions that read a seedfile
167  *       with regular fopen(), please make sure you make a seedfile with the
168  *       proper name (defined in MBEDTLS_PLATFORM_STD_NV_SEED_FILE) and at
169  *       least MBEDTLS_ENTROPY_BLOCK_SIZE bytes in size that can be read from
170  *       and written to or you will get an entropy source error! The default
171  *       implementation will only use the first MBEDTLS_ENTROPY_BLOCK_SIZE
172  *       bytes from the file.
173  *
174  * \note The entropy collector will write to the seed file before entropy is
175  *       given to an external source, to update it.
176  */
177 //#define MBEDTLS_ENTROPY_NV_SEED
178 
179 /**
180  * \def MBEDTLS_SHA256_SMALLER
181  *
182  * Enable an implementation of SHA-256 that has lower ROM footprint but also
183  * lower performance.
184  *
185  * The default implementation is meant to be a reasonnable compromise between
186  * performance and size. This version optimizes more aggressively for size at
187  * the expense of performance. Eg on Cortex-M4 it reduces the size of
188  * mbedtls_sha256_process() from ~2KB to ~0.5KB for a performance hit of about
189  * 30%.
190  *
191  * Uncomment to enable the smaller implementation of SHA256.
192  */
193 #define MBEDTLS_SHA256_SMALLER
194 
195 /** \def MBEDTLS_PSA_CRYPTO_CLIENT
196  *
197  * Enable support for PSA crypto client.
198  *
199  * \note This option allows to include the code necessary for a PSA
200  *       crypto client when the PSA crypto implementation is not included in
201  *       the library (MBEDTLS_PSA_CRYPTO_C disabled). The code included is the
202  *       code to set and get PSA key attributes.
203  *       The development of PSA drivers partially relying on the library to
204  *       fulfill the hardware gaps is another possible usage of this option.
205  *
206  * \warning This interface is experimental and may change or be removed
207  * without notice.
208  */
209 #define MBEDTLS_PSA_CRYPTO_CLIENT
210 
211 /**
212  * \def MBEDTLS_PSA_CRYPTO_CONFIG
213  *
214  * This setting allows support for cryptographic mechanisms through the PSA
215  * API to be configured separately from support through the mbedtls API.
216  *
217  * When this option is disabled, the PSA API exposes the cryptographic
218  * mechanisms that can be implemented on top of the `mbedtls_xxx` API
219  * configured with `MBEDTLS_XXX` symbols.
220  *
221  * When this option is enabled, the PSA API exposes the cryptographic
222  * mechanisms requested by the `PSA_WANT_XXX` symbols defined in
223  * include/psa/crypto_config.h. The corresponding `MBEDTLS_XXX` settings are
224  * automatically enabled if required (i.e. if no PSA driver provides the
225  * mechanism). You may still freely enable additional `MBEDTLS_XXX` symbols
226  * in mbedtls_config.h.
227  *
228  * If the symbol #MBEDTLS_PSA_CRYPTO_CONFIG_FILE is defined, it specifies
229  * an alternative header to include instead of include/psa/crypto_config.h.
230  *
231  * This feature is still experimental and is not ready for production since
232  * it is not completed.
233  */
234 #define MBEDTLS_PSA_CRYPTO_CONFIG
235 
236 /* \} name SECTION: mbed TLS feature support */
237 
238 /**
239  * \name SECTION: mbed TLS modules
240  *
241  * This section enables or disables entire modules in mbed TLS
242  * \{
243  */
244 
245 /**
246  * \def MBEDTLS_AES_C
247  *
248  * Enable the AES block cipher.
249  *
250  * Module:  library/aes.c
251  * Caller:  library/cipher.c
252  *          library/pem.c
253  *          library/ctr_drbg.c
254  *
255  * This module is required to support the TLS ciphersuites that use the AES
256  * cipher.
257  *
258  * PEM_PARSE uses AES for decrypting encrypted keys.
259  */
260 #define MBEDTLS_AES_C
261 
262 /**
263  * \def MBEDTLS_AES_ONLY_128_BIT_KEY_LENGTH
264  *
265  * Use only 128-bit keys in AES operations to save ROM.
266  *
267  * Uncomment this macro to remove support for AES operations that use 192-
268  * or 256-bit keys.
269  *
270  * Uncommenting this macro reduces the size of AES code by ~300 bytes
271  * on v8-M/Thumb2.
272  *
273  * Module:  library/aes.c
274  *
275  * Requires: MBEDTLS_AES_C
276  */
277 #define MBEDTLS_AES_ONLY_128_BIT_KEY_LENGTH
278 
279 /**
280  * \def MBEDTLS_CIPHER_C
281  *
282  * Enable the generic cipher layer.
283  *
284  * Module:  library/cipher.c
285  *
286  * Uncomment to enable generic cipher wrappers.
287  */
288 #define MBEDTLS_CIPHER_C
289 
290 /**
291  * \def MBEDTLS_CTR_DRBG_C
292  *
293  * Enable the CTR_DRBG AES-based random generator.
294  * The CTR_DRBG generator uses AES-256 by default.
295  * To use AES-128 instead, enable MBEDTLS_CTR_DRBG_USE_128_BIT_KEY below.
296  *
297  * Module:  library/ctr_drbg.c
298  * Caller:
299  *
300  * Requires: MBEDTLS_AES_C
301  *
302  * This module provides the CTR_DRBG AES random number generator.
303  */
304 #define MBEDTLS_CTR_DRBG_C
305 
306 /**
307  * \def MBEDTLS_ENTROPY_C
308  *
309  * Enable the platform-specific entropy code.
310  *
311  * Module:  library/entropy.c
312  * Caller:
313  *
314  * Requires: MBEDTLS_SHA512_C or MBEDTLS_SHA256_C
315  *
316  * This module provides a generic entropy pool
317  */
318 //#define MBEDTLS_ENTROPY_C
319 
320 /**
321  * \def MBEDTLS_HKDF_C
322  *
323  * Enable the HKDF algorithm (RFC 5869).
324  *
325  * Module:  library/hkdf.c
326  * Caller:
327  *
328  * Requires: MBEDTLS_MD_C
329  *
330  * This module adds support for the Hashed Message Authentication Code
331  * (HMAC)-based key derivation function (HKDF).
332  */
333 //#define MBEDTLS_HKDF_C /* Used for HUK deriviation */
334 
335 /**
336  * \def MBEDTLS_MEMORY_BUFFER_ALLOC_C
337  *
338  * Enable the buffer allocator implementation that makes use of a (stack)
339  * based buffer to 'allocate' dynamic memory. (replaces calloc() and free()
340  * calls)
341  *
342  * Module:  library/memory_buffer_alloc.c
343  *
344  * Requires: MBEDTLS_PLATFORM_C
345  *           MBEDTLS_PLATFORM_MEMORY (to use it within mbed TLS)
346  *
347  * Enable this module to enable the buffer memory allocator.
348  */
349 #define MBEDTLS_MEMORY_BUFFER_ALLOC_C
350 
351 /**
352  * \def MBEDTLS_PLATFORM_C
353  *
354  * Enable the platform abstraction layer that allows you to re-assign
355  * functions like calloc(), free(), snprintf(), printf(), fprintf(), exit().
356  *
357  * Enabling MBEDTLS_PLATFORM_C enables to use of MBEDTLS_PLATFORM_XXX_ALT
358  * or MBEDTLS_PLATFORM_XXX_MACRO directives, allowing the functions mentioned
359  * above to be specified at runtime or compile time respectively.
360  *
361  * \note This abstraction layer must be enabled on Windows (including MSYS2)
362  * as other module rely on it for a fixed snprintf implementation.
363  *
364  * Module:  library/platform.c
365  * Caller:  Most other .c files
366  *
367  * This module enables abstraction of common (libc) functions.
368  */
369 #define MBEDTLS_PLATFORM_C
370 
371 #define MBEDTLS_PLATFORM_NO_STD_FUNCTIONS
372 #define MBEDTLS_PLATFORM_STD_MEM_HDR   <stdlib.h>
373 
374 #include <stdio.h>
375 
376 #define MBEDTLS_PLATFORM_SNPRINTF_MACRO      snprintf
377 #define MBEDTLS_PLATFORM_PRINTF_ALT
378 #define MBEDTLS_PLATFORM_STD_EXIT_SUCCESS  EXIT_SUCCESS
379 #define MBEDTLS_PLATFORM_STD_EXIT_FAILURE  EXIT_FAILURE
380 
381 /**
382  * \def MBEDTLS_PSA_CRYPTO_C
383  *
384  * Enable the Platform Security Architecture cryptography API.
385  *
386  * Module:  library/psa_crypto.c
387  *
388  * Requires: MBEDTLS_CTR_DRBG_C, MBEDTLS_ENTROPY_C
389  *
390  */
391 //#define MBEDTLS_PSA_CRYPTO_C
392 
393 /**
394  * \def MBEDTLS_PSA_CRYPTO_STORAGE_C
395  *
396  * Enable the Platform Security Architecture persistent key storage.
397  *
398  * Module:  library/psa_crypto_storage.c
399  *
400  * Requires: MBEDTLS_PSA_CRYPTO_C,
401  *           either MBEDTLS_PSA_ITS_FILE_C or a native implementation of
402  *           the PSA ITS interface
403  */
404 //#define MBEDTLS_PSA_CRYPTO_STORAGE_C
405 
406 /* \} name SECTION: mbed TLS modules */
407 
408 /**
409  * \name SECTION: General configuration options
410  *
411  * This section contains Mbed TLS build settings that are not associated
412  * with a particular module.
413  *
414  * \{
415  */
416 
417 /**
418  * \def MBEDTLS_CONFIG_FILE
419  *
420  * If defined, this is a header which will be included instead of
421  * `"mbedtls/mbedtls_config.h"`.
422  * This header file specifies the compile-time configuration of Mbed TLS.
423  * Unlike other configuration options, this one must be defined on the
424  * compiler command line: a definition in `mbedtls_config.h` would have
425  * no effect.
426  *
427  * This macro is expanded after an <tt>\#include</tt> directive. This is a popular but
428  * non-standard feature of the C language, so this feature is only available
429  * with compilers that perform macro expansion on an <tt>\#include</tt> line.
430  *
431  * The value of this symbol is typically a path in double quotes, either
432  * absolute or relative to a directory on the include search path.
433  */
434 //#define MBEDTLS_CONFIG_FILE "mbedtls/mbedtls_config.h"
435 
436 /**
437  * \def MBEDTLS_USER_CONFIG_FILE
438  *
439  * If defined, this is a header which will be included after
440  * `"mbedtls/mbedtls_config.h"` or #MBEDTLS_CONFIG_FILE.
441  * This allows you to modify the default configuration, including the ability
442  * to undefine options that are enabled by default.
443  *
444  * This macro is expanded after an <tt>\#include</tt> directive. This is a popular but
445  * non-standard feature of the C language, so this feature is only available
446  * with compilers that perform macro expansion on an <tt>\#include</tt> line.
447  *
448  * The value of this symbol is typically a path in double quotes, either
449  * absolute or relative to a directory on the include search path.
450  */
451 //#define MBEDTLS_USER_CONFIG_FILE "/dev/null"
452 
453 /**
454  * \def MBEDTLS_PSA_CRYPTO_CONFIG_FILE
455  *
456  * If defined, this is a header which will be included instead of
457  * `"psa/crypto_config.h"`.
458  * This header file specifies which cryptographic mechanisms are available
459  * through the PSA API when #MBEDTLS_PSA_CRYPTO_CONFIG is enabled, and
460  * is not used when #MBEDTLS_PSA_CRYPTO_CONFIG is disabled.
461  *
462  * This macro is expanded after an <tt>\#include</tt> directive. This is a popular but
463  * non-standard feature of the C language, so this feature is only available
464  * with compilers that perform macro expansion on an <tt>\#include</tt> line.
465  *
466  * The value of this symbol is typically a path in double quotes, either
467  * absolute or relative to a directory on the include search path.
468  */
469 //#define MBEDTLS_PSA_CRYPTO_CONFIG_FILE "psa/crypto_config.h"
470 
471 /**
472  * \def MBEDTLS_PSA_CRYPTO_USER_CONFIG_FILE
473  *
474  * If defined, this is a header which will be included after
475  * `"psa/crypto_config.h"` or #MBEDTLS_PSA_CRYPTO_CONFIG_FILE.
476  * This allows you to modify the default configuration, including the ability
477  * to undefine options that are enabled by default.
478  *
479  * This macro is expanded after an <tt>\#include</tt> directive. This is a popular but
480  * non-standard feature of the C language, so this feature is only available
481  * with compilers that perform macro expansion on an <tt>\#include</tt> line.
482  *
483  * The value of this symbol is typically a path in double quotes, either
484  * absolute or relative to a directory on the include search path.
485  */
486 //#define MBEDTLS_PSA_CRYPTO_USER_CONFIG_FILE "/dev/null"
487 
488 /** \} name SECTION: General configuration options */
489 
490 /**
491  * \name SECTION: Module configuration options
492  *
493  * This section allows for the setting of module specific sizes and
494  * configuration options. The default values are already present in the
495  * relevant header files and should suffice for the regular use cases.
496  *
497  * Our advice is to enable options and change their values here
498  * only if you have a good reason and know the consequences.
499  *
500  * Please check the respective header file for documentation on these
501  * parameters (to prevent duplicate documentation).
502  * \{
503  */
504 
505 /* ECP options */
506 #define MBEDTLS_ECP_FIXED_POINT_OPTIM        0 /**< Disable fixed-point speed-up */
507 
508 /**
509  * Uncomment to enable p256-m. This is an alternative implementation of
510  * key generation, ECDH and (randomized) ECDSA on the curve SECP256R1.
511  * Compared to the default implementation:
512  *
513  * - p256-m has a much smaller code size and RAM footprint.
514  * - p256-m is only available via the PSA API. This includes the pk module
515  *   when #MBEDTLS_USE_PSA_CRYPTO is enabled.
516  * - p256-m does not support deterministic ECDSA, EC-JPAKE, custom protocols
517  *   over the core arithmetic, or deterministic derivation of keys.
518  *
519  * We recommend enabling this option if your application uses the PSA API
520  * and the only elliptic curve support it needs is ECDH and ECDSA over
521  * SECP256R1.
522  *
523  * If you enable this option, you do not need to enable any ECC-related
524  * MBEDTLS_xxx option. You do need to separately request support for the
525  * cryptographic mechanisms through the PSA API:
526  * - #MBEDTLS_PSA_CRYPTO_C and #MBEDTLS_PSA_CRYPTO_CONFIG for PSA-based
527  *   configuration;
528  * - #MBEDTLS_USE_PSA_CRYPTO if you want to use p256-m from PK, X.509 or TLS;
529  * - #PSA_WANT_ECC_SECP_R1_256;
530  * - #PSA_WANT_ALG_ECDH and/or #PSA_WANT_ALG_ECDSA as needed;
531  * - #PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY, #PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC,
532  *   #PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT,
533  *   #PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT and/or
534  *   #PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE as needed.
535  *
536  * \note To benefit from the smaller code size of p256-m, make sure that you
537  *       do not enable any ECC-related option not supported by p256-m: this
538  *       would cause the built-in ECC implementation to be built as well, in
539  *       order to provide the required option.
540  *       Make sure #PSA_WANT_ALG_DETERMINISTIC_ECDSA, #PSA_WANT_ALG_JPAKE and
541  *       #PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE, and curves other than
542  *       SECP256R1 are disabled as they are not supported by this driver.
543  *       Also, avoid defining #MBEDTLS_PK_PARSE_EC_COMPRESSED or
544  *       #MBEDTLS_PK_PARSE_EC_EXTENDED as those currently require a subset of
545  *       the built-in ECC implementation, see docs/driver-only-builds.md.
546  */
547 //#define MBEDTLS_PSA_P256M_DRIVER_ENABLED
548 
549 /* \} name SECTION: Customisation configuration options */
550 
551 #endif /* PROFILE_M_MBEDTLS_CONFIG_H */
552