1 /* 2 * Copyright The TrustedFirmware-M Contributors 3 * 4 * SPDX-License-Identifier: BSD-3-Clause 5 * 6 */ 7 /** 8 * \file config.h 9 * 10 * \brief Configuration options (set of defines) 11 * 12 * This set of compile-time options may be used to enable 13 * or disable features selectively, and reduce the global 14 * memory footprint. 15 */ 16 17 #ifndef PROFILE_M_MBEDTLS_CONFIG_H 18 #define PROFILE_M_MBEDTLS_CONFIG_H 19 20 #include "config_tfm.h" 21 22 #if defined(_MSC_VER) && !defined(_CRT_SECURE_NO_DEPRECATE) 23 #define _CRT_SECURE_NO_DEPRECATE 1 24 #endif 25 26 /** 27 * \name SECTION: System support 28 * 29 * This section sets system specific settings. 30 * \{ 31 */ 32 33 /** 34 * \def MBEDTLS_HAVE_ASM 35 * 36 * The compiler has support for asm(). 37 * 38 * Requires support for asm() in compiler. 39 * 40 * Used in: 41 * library/aria.c 42 * library/timing.c 43 * include/mbedtls/bn_mul.h 44 * 45 * Required by: 46 * MBEDTLS_AESNI_C 47 * MBEDTLS_PADLOCK_C 48 * 49 * Comment to disable the use of assembly code. 50 */ 51 #define MBEDTLS_HAVE_ASM 52 53 /** 54 * \def MBEDTLS_PLATFORM_MEMORY 55 * 56 * Enable the memory allocation layer. 57 * 58 * By default mbed TLS uses the system-provided calloc() and free(). 59 * This allows different allocators (self-implemented or provided) to be 60 * provided to the platform abstraction layer. 61 * 62 * Enabling MBEDTLS_PLATFORM_MEMORY without the 63 * MBEDTLS_PLATFORM_{FREE,CALLOC}_MACROs will provide 64 * "mbedtls_platform_set_calloc_free()" allowing you to set an alternative calloc() and 65 * free() function pointer at runtime. 66 * 67 * Enabling MBEDTLS_PLATFORM_MEMORY and specifying 68 * MBEDTLS_PLATFORM_{CALLOC,FREE}_MACROs will allow you to specify the 69 * alternate function at compile time. 70 * 71 * Requires: MBEDTLS_PLATFORM_C 72 * 73 * Enable this layer to allow use of alternative memory allocators. 74 */ 75 #define MBEDTLS_PLATFORM_MEMORY 76 77 /* \} name SECTION: System support */ 78 79 /** 80 * \name SECTION: mbed TLS feature support 81 * 82 * This section sets support for features that are or are not needed 83 * within the modules that are enabled. 84 * \{ 85 */ 86 87 /** 88 * \def MBEDTLS_AES_ROM_TABLES 89 * 90 * Use precomputed AES tables stored in ROM. 91 * 92 * Uncomment this macro to use precomputed AES tables stored in ROM. 93 * Comment this macro to generate AES tables in RAM at runtime. 94 * 95 * Tradeoff: Using precomputed ROM tables reduces RAM usage by ~8kb 96 * (or ~2kb if \c MBEDTLS_AES_FEWER_TABLES is used) and reduces the 97 * initialization time before the first AES operation can be performed. 98 * It comes at the cost of additional ~8kb ROM use (resp. ~2kb if \c 99 * MBEDTLS_AES_FEWER_TABLES below is used), and potentially degraded 100 * performance if ROM access is slower than RAM access. 101 * 102 * This option is independent of \c MBEDTLS_AES_FEWER_TABLES. 103 * 104 */ 105 #define MBEDTLS_AES_ROM_TABLES 106 107 /** 108 * \def MBEDTLS_AES_FEWER_TABLES 109 * 110 * Use less ROM/RAM for AES tables. 111 * 112 * Uncommenting this macro omits 75% of the AES tables from 113 * ROM / RAM (depending on the value of \c MBEDTLS_AES_ROM_TABLES) 114 * by computing their values on the fly during operations 115 * (the tables are entry-wise rotations of one another). 116 * 117 * Tradeoff: Uncommenting this reduces the RAM / ROM footprint 118 * by ~6kb but at the cost of more arithmetic operations during 119 * runtime. Specifically, one has to compare 4 accesses within 120 * different tables to 4 accesses with additional arithmetic 121 * operations within the same table. The performance gain/loss 122 * depends on the system and memory details. 123 * 124 * This option is independent of \c MBEDTLS_AES_ROM_TABLES. 125 * 126 */ 127 #define MBEDTLS_AES_FEWER_TABLES 128 129 /** 130 * \def MBEDTLS_ECP_NIST_OPTIM 131 * 132 * Enable specific 'modulo p' routines for each NIST prime. 133 * Depending on the prime and architecture, makes operations 4 to 8 times 134 * faster on the corresponding curve. 135 * 136 * Comment this macro to disable NIST curves optimisation. 137 */ 138 #define MBEDTLS_ECP_NIST_OPTIM 139 140 /** 141 * \def MBEDTLS_NO_PLATFORM_ENTROPY 142 * 143 * Do not use built-in platform entropy functions. 144 * This is useful if your platform does not support 145 * standards like the /dev/urandom or Windows CryptoAPI. 146 * 147 * Uncomment this macro to disable the built-in platform entropy functions. 148 */ 149 #define MBEDTLS_NO_PLATFORM_ENTROPY 150 151 /** 152 * \def MBEDTLS_ENTROPY_NV_SEED 153 * 154 * Enable the non-volatile (NV) seed file-based entropy source. 155 * (Also enables the NV seed read/write functions in the platform layer) 156 * 157 * This is crucial (if not required) on systems that do not have a 158 * cryptographic entropy source (in hardware or kernel) available. 159 * 160 * Requires: MBEDTLS_ENTROPY_C, MBEDTLS_PLATFORM_C 161 * 162 * \note The read/write functions that are used by the entropy source are 163 * determined in the platform layer, and can be modified at runtime and/or 164 * compile-time depending on the flags (MBEDTLS_PLATFORM_NV_SEED_*) used. 165 * 166 * \note If you use the default implementation functions that read a seedfile 167 * with regular fopen(), please make sure you make a seedfile with the 168 * proper name (defined in MBEDTLS_PLATFORM_STD_NV_SEED_FILE) and at 169 * least MBEDTLS_ENTROPY_BLOCK_SIZE bytes in size that can be read from 170 * and written to or you will get an entropy source error! The default 171 * implementation will only use the first MBEDTLS_ENTROPY_BLOCK_SIZE 172 * bytes from the file. 173 * 174 * \note The entropy collector will write to the seed file before entropy is 175 * given to an external source, to update it. 176 */ 177 //#define MBEDTLS_ENTROPY_NV_SEED 178 179 /** 180 * \def MBEDTLS_SHA256_SMALLER 181 * 182 * Enable an implementation of SHA-256 that has lower ROM footprint but also 183 * lower performance. 184 * 185 * The default implementation is meant to be a reasonnable compromise between 186 * performance and size. This version optimizes more aggressively for size at 187 * the expense of performance. Eg on Cortex-M4 it reduces the size of 188 * mbedtls_sha256_process() from ~2KB to ~0.5KB for a performance hit of about 189 * 30%. 190 * 191 * Uncomment to enable the smaller implementation of SHA256. 192 */ 193 #define MBEDTLS_SHA256_SMALLER 194 195 /** \def MBEDTLS_PSA_CRYPTO_CLIENT 196 * 197 * Enable support for PSA crypto client. 198 * 199 * \note This option allows to include the code necessary for a PSA 200 * crypto client when the PSA crypto implementation is not included in 201 * the library (MBEDTLS_PSA_CRYPTO_C disabled). The code included is the 202 * code to set and get PSA key attributes. 203 * The development of PSA drivers partially relying on the library to 204 * fulfill the hardware gaps is another possible usage of this option. 205 * 206 * \warning This interface is experimental and may change or be removed 207 * without notice. 208 */ 209 #define MBEDTLS_PSA_CRYPTO_CLIENT 210 211 /** 212 * \def MBEDTLS_PSA_CRYPTO_CONFIG 213 * 214 * This setting allows support for cryptographic mechanisms through the PSA 215 * API to be configured separately from support through the mbedtls API. 216 * 217 * When this option is disabled, the PSA API exposes the cryptographic 218 * mechanisms that can be implemented on top of the `mbedtls_xxx` API 219 * configured with `MBEDTLS_XXX` symbols. 220 * 221 * When this option is enabled, the PSA API exposes the cryptographic 222 * mechanisms requested by the `PSA_WANT_XXX` symbols defined in 223 * include/psa/crypto_config.h. The corresponding `MBEDTLS_XXX` settings are 224 * automatically enabled if required (i.e. if no PSA driver provides the 225 * mechanism). You may still freely enable additional `MBEDTLS_XXX` symbols 226 * in mbedtls_config.h. 227 * 228 * If the symbol #MBEDTLS_PSA_CRYPTO_CONFIG_FILE is defined, it specifies 229 * an alternative header to include instead of include/psa/crypto_config.h. 230 * 231 * This feature is still experimental and is not ready for production since 232 * it is not completed. 233 */ 234 #define MBEDTLS_PSA_CRYPTO_CONFIG 235 236 /* \} name SECTION: mbed TLS feature support */ 237 238 /** 239 * \name SECTION: mbed TLS modules 240 * 241 * This section enables or disables entire modules in mbed TLS 242 * \{ 243 */ 244 245 /** 246 * \def MBEDTLS_AES_C 247 * 248 * Enable the AES block cipher. 249 * 250 * Module: library/aes.c 251 * Caller: library/cipher.c 252 * library/pem.c 253 * library/ctr_drbg.c 254 * 255 * This module is required to support the TLS ciphersuites that use the AES 256 * cipher. 257 * 258 * PEM_PARSE uses AES for decrypting encrypted keys. 259 */ 260 #define MBEDTLS_AES_C 261 262 /** 263 * \def MBEDTLS_AES_ONLY_128_BIT_KEY_LENGTH 264 * 265 * Use only 128-bit keys in AES operations to save ROM. 266 * 267 * Uncomment this macro to remove support for AES operations that use 192- 268 * or 256-bit keys. 269 * 270 * Uncommenting this macro reduces the size of AES code by ~300 bytes 271 * on v8-M/Thumb2. 272 * 273 * Module: library/aes.c 274 * 275 * Requires: MBEDTLS_AES_C 276 */ 277 #define MBEDTLS_AES_ONLY_128_BIT_KEY_LENGTH 278 279 /** 280 * \def MBEDTLS_CIPHER_C 281 * 282 * Enable the generic cipher layer. 283 * 284 * Module: library/cipher.c 285 * 286 * Uncomment to enable generic cipher wrappers. 287 */ 288 #define MBEDTLS_CIPHER_C 289 290 /** 291 * \def MBEDTLS_CTR_DRBG_C 292 * 293 * Enable the CTR_DRBG AES-based random generator. 294 * The CTR_DRBG generator uses AES-256 by default. 295 * To use AES-128 instead, enable MBEDTLS_CTR_DRBG_USE_128_BIT_KEY below. 296 * 297 * Module: library/ctr_drbg.c 298 * Caller: 299 * 300 * Requires: MBEDTLS_AES_C 301 * 302 * This module provides the CTR_DRBG AES random number generator. 303 */ 304 #define MBEDTLS_CTR_DRBG_C 305 306 /** 307 * \def MBEDTLS_ENTROPY_C 308 * 309 * Enable the platform-specific entropy code. 310 * 311 * Module: library/entropy.c 312 * Caller: 313 * 314 * Requires: MBEDTLS_SHA512_C or MBEDTLS_SHA256_C 315 * 316 * This module provides a generic entropy pool 317 */ 318 //#define MBEDTLS_ENTROPY_C 319 320 /** 321 * \def MBEDTLS_HKDF_C 322 * 323 * Enable the HKDF algorithm (RFC 5869). 324 * 325 * Module: library/hkdf.c 326 * Caller: 327 * 328 * Requires: MBEDTLS_MD_C 329 * 330 * This module adds support for the Hashed Message Authentication Code 331 * (HMAC)-based key derivation function (HKDF). 332 */ 333 //#define MBEDTLS_HKDF_C /* Used for HUK deriviation */ 334 335 /** 336 * \def MBEDTLS_MEMORY_BUFFER_ALLOC_C 337 * 338 * Enable the buffer allocator implementation that makes use of a (stack) 339 * based buffer to 'allocate' dynamic memory. (replaces calloc() and free() 340 * calls) 341 * 342 * Module: library/memory_buffer_alloc.c 343 * 344 * Requires: MBEDTLS_PLATFORM_C 345 * MBEDTLS_PLATFORM_MEMORY (to use it within mbed TLS) 346 * 347 * Enable this module to enable the buffer memory allocator. 348 */ 349 #define MBEDTLS_MEMORY_BUFFER_ALLOC_C 350 351 /** 352 * \def MBEDTLS_PLATFORM_C 353 * 354 * Enable the platform abstraction layer that allows you to re-assign 355 * functions like calloc(), free(), snprintf(), printf(), fprintf(), exit(). 356 * 357 * Enabling MBEDTLS_PLATFORM_C enables to use of MBEDTLS_PLATFORM_XXX_ALT 358 * or MBEDTLS_PLATFORM_XXX_MACRO directives, allowing the functions mentioned 359 * above to be specified at runtime or compile time respectively. 360 * 361 * \note This abstraction layer must be enabled on Windows (including MSYS2) 362 * as other module rely on it for a fixed snprintf implementation. 363 * 364 * Module: library/platform.c 365 * Caller: Most other .c files 366 * 367 * This module enables abstraction of common (libc) functions. 368 */ 369 #define MBEDTLS_PLATFORM_C 370 371 #define MBEDTLS_PLATFORM_NO_STD_FUNCTIONS 372 #define MBEDTLS_PLATFORM_STD_MEM_HDR <stdlib.h> 373 374 #include <stdio.h> 375 376 #define MBEDTLS_PLATFORM_SNPRINTF_MACRO snprintf 377 #define MBEDTLS_PLATFORM_PRINTF_ALT 378 #define MBEDTLS_PLATFORM_STD_EXIT_SUCCESS EXIT_SUCCESS 379 #define MBEDTLS_PLATFORM_STD_EXIT_FAILURE EXIT_FAILURE 380 381 /** 382 * \def MBEDTLS_PSA_CRYPTO_C 383 * 384 * Enable the Platform Security Architecture cryptography API. 385 * 386 * Module: library/psa_crypto.c 387 * 388 * Requires: MBEDTLS_CTR_DRBG_C, MBEDTLS_ENTROPY_C 389 * 390 */ 391 //#define MBEDTLS_PSA_CRYPTO_C 392 393 /** 394 * \def MBEDTLS_PSA_CRYPTO_STORAGE_C 395 * 396 * Enable the Platform Security Architecture persistent key storage. 397 * 398 * Module: library/psa_crypto_storage.c 399 * 400 * Requires: MBEDTLS_PSA_CRYPTO_C, 401 * either MBEDTLS_PSA_ITS_FILE_C or a native implementation of 402 * the PSA ITS interface 403 */ 404 //#define MBEDTLS_PSA_CRYPTO_STORAGE_C 405 406 /* \} name SECTION: mbed TLS modules */ 407 408 /** 409 * \name SECTION: General configuration options 410 * 411 * This section contains Mbed TLS build settings that are not associated 412 * with a particular module. 413 * 414 * \{ 415 */ 416 417 /** 418 * \def MBEDTLS_CONFIG_FILE 419 * 420 * If defined, this is a header which will be included instead of 421 * `"mbedtls/mbedtls_config.h"`. 422 * This header file specifies the compile-time configuration of Mbed TLS. 423 * Unlike other configuration options, this one must be defined on the 424 * compiler command line: a definition in `mbedtls_config.h` would have 425 * no effect. 426 * 427 * This macro is expanded after an <tt>\#include</tt> directive. This is a popular but 428 * non-standard feature of the C language, so this feature is only available 429 * with compilers that perform macro expansion on an <tt>\#include</tt> line. 430 * 431 * The value of this symbol is typically a path in double quotes, either 432 * absolute or relative to a directory on the include search path. 433 */ 434 //#define MBEDTLS_CONFIG_FILE "mbedtls/mbedtls_config.h" 435 436 /** 437 * \def MBEDTLS_USER_CONFIG_FILE 438 * 439 * If defined, this is a header which will be included after 440 * `"mbedtls/mbedtls_config.h"` or #MBEDTLS_CONFIG_FILE. 441 * This allows you to modify the default configuration, including the ability 442 * to undefine options that are enabled by default. 443 * 444 * This macro is expanded after an <tt>\#include</tt> directive. This is a popular but 445 * non-standard feature of the C language, so this feature is only available 446 * with compilers that perform macro expansion on an <tt>\#include</tt> line. 447 * 448 * The value of this symbol is typically a path in double quotes, either 449 * absolute or relative to a directory on the include search path. 450 */ 451 //#define MBEDTLS_USER_CONFIG_FILE "/dev/null" 452 453 /** 454 * \def MBEDTLS_PSA_CRYPTO_CONFIG_FILE 455 * 456 * If defined, this is a header which will be included instead of 457 * `"psa/crypto_config.h"`. 458 * This header file specifies which cryptographic mechanisms are available 459 * through the PSA API when #MBEDTLS_PSA_CRYPTO_CONFIG is enabled, and 460 * is not used when #MBEDTLS_PSA_CRYPTO_CONFIG is disabled. 461 * 462 * This macro is expanded after an <tt>\#include</tt> directive. This is a popular but 463 * non-standard feature of the C language, so this feature is only available 464 * with compilers that perform macro expansion on an <tt>\#include</tt> line. 465 * 466 * The value of this symbol is typically a path in double quotes, either 467 * absolute or relative to a directory on the include search path. 468 */ 469 //#define MBEDTLS_PSA_CRYPTO_CONFIG_FILE "psa/crypto_config.h" 470 471 /** 472 * \def MBEDTLS_PSA_CRYPTO_USER_CONFIG_FILE 473 * 474 * If defined, this is a header which will be included after 475 * `"psa/crypto_config.h"` or #MBEDTLS_PSA_CRYPTO_CONFIG_FILE. 476 * This allows you to modify the default configuration, including the ability 477 * to undefine options that are enabled by default. 478 * 479 * This macro is expanded after an <tt>\#include</tt> directive. This is a popular but 480 * non-standard feature of the C language, so this feature is only available 481 * with compilers that perform macro expansion on an <tt>\#include</tt> line. 482 * 483 * The value of this symbol is typically a path in double quotes, either 484 * absolute or relative to a directory on the include search path. 485 */ 486 //#define MBEDTLS_PSA_CRYPTO_USER_CONFIG_FILE "/dev/null" 487 488 /** \} name SECTION: General configuration options */ 489 490 /** 491 * \name SECTION: Module configuration options 492 * 493 * This section allows for the setting of module specific sizes and 494 * configuration options. The default values are already present in the 495 * relevant header files and should suffice for the regular use cases. 496 * 497 * Our advice is to enable options and change their values here 498 * only if you have a good reason and know the consequences. 499 * 500 * Please check the respective header file for documentation on these 501 * parameters (to prevent duplicate documentation). 502 * \{ 503 */ 504 505 /* ECP options */ 506 #define MBEDTLS_ECP_FIXED_POINT_OPTIM 0 /**< Disable fixed-point speed-up */ 507 508 /** 509 * Uncomment to enable p256-m. This is an alternative implementation of 510 * key generation, ECDH and (randomized) ECDSA on the curve SECP256R1. 511 * Compared to the default implementation: 512 * 513 * - p256-m has a much smaller code size and RAM footprint. 514 * - p256-m is only available via the PSA API. This includes the pk module 515 * when #MBEDTLS_USE_PSA_CRYPTO is enabled. 516 * - p256-m does not support deterministic ECDSA, EC-JPAKE, custom protocols 517 * over the core arithmetic, or deterministic derivation of keys. 518 * 519 * We recommend enabling this option if your application uses the PSA API 520 * and the only elliptic curve support it needs is ECDH and ECDSA over 521 * SECP256R1. 522 * 523 * If you enable this option, you do not need to enable any ECC-related 524 * MBEDTLS_xxx option. You do need to separately request support for the 525 * cryptographic mechanisms through the PSA API: 526 * - #MBEDTLS_PSA_CRYPTO_C and #MBEDTLS_PSA_CRYPTO_CONFIG for PSA-based 527 * configuration; 528 * - #MBEDTLS_USE_PSA_CRYPTO if you want to use p256-m from PK, X.509 or TLS; 529 * - #PSA_WANT_ECC_SECP_R1_256; 530 * - #PSA_WANT_ALG_ECDH and/or #PSA_WANT_ALG_ECDSA as needed; 531 * - #PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY, #PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC, 532 * #PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT, 533 * #PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT and/or 534 * #PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE as needed. 535 * 536 * \note To benefit from the smaller code size of p256-m, make sure that you 537 * do not enable any ECC-related option not supported by p256-m: this 538 * would cause the built-in ECC implementation to be built as well, in 539 * order to provide the required option. 540 * Make sure #PSA_WANT_ALG_DETERMINISTIC_ECDSA, #PSA_WANT_ALG_JPAKE and 541 * #PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE, and curves other than 542 * SECP256R1 are disabled as they are not supported by this driver. 543 * Also, avoid defining #MBEDTLS_PK_PARSE_EC_COMPRESSED or 544 * #MBEDTLS_PK_PARSE_EC_EXTENDED as those currently require a subset of 545 * the built-in ECC implementation, see docs/driver-only-builds.md. 546 */ 547 //#define MBEDTLS_PSA_P256M_DRIVER_ENABLED 548 549 /* \} name SECTION: Customisation configuration options */ 550 551 #endif /* PROFILE_M_MBEDTLS_CONFIG_H */ 552