1/**
2 * \file config.h
3 *
4 * \brief Configuration options (set of defines)
5 *
6 *  This set of compile-time options may be used to enable
7 *  or disable features selectively, and reduce the global
8 *  memory footprint.
9 */
10/*
11 *  Copyright (C) 2006-2023, ARM Limited, All Rights Reserved
12 *  SPDX-License-Identifier: Apache-2.0
13 *
14 *  Licensed under the Apache License, Version 2.0 (the "License"); you may
15 *  not use this file except in compliance with the License.
16 *  You may obtain a copy of the License at
17 *
18 *  http://www.apache.org/licenses/LICENSE-2.0
19 *
20 *  Unless required by applicable law or agreed to in writing, software
21 *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
22 *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
23 *  See the License for the specific language governing permissions and
24 *  limitations under the License.
25 *
26 *  This file is part of mbed TLS (https://tls.mbed.org)
27 */
28
29#ifndef PROFILE_M_MBEDTLS_CONFIG_H
30#define PROFILE_M_MBEDTLS_CONFIG_H
31
32#include "config_tfm.h"
33
34#if defined(_MSC_VER) && !defined(_CRT_SECURE_NO_DEPRECATE)
35#define _CRT_SECURE_NO_DEPRECATE 1
36#endif
37
38/**
39 * \name SECTION: System support
40 *
41 * This section sets system specific settings.
42 * \{
43 */
44
45/**
46 * \def MBEDTLS_HAVE_ASM
47 *
48 * The compiler has support for asm().
49 *
50 * Requires support for asm() in compiler.
51 *
52 * Used in:
53 *      library/aria.c
54 *      library/timing.c
55 *      include/mbedtls/bn_mul.h
56 *
57 * Required by:
58 *      MBEDTLS_AESNI_C
59 *      MBEDTLS_PADLOCK_C
60 *
61 * Comment to disable the use of assembly code.
62 */
63#define MBEDTLS_HAVE_ASM
64
65/**
66 * \def MBEDTLS_PLATFORM_MEMORY
67 *
68 * Enable the memory allocation layer.
69 *
70 * By default mbed TLS uses the system-provided calloc() and free().
71 * This allows different allocators (self-implemented or provided) to be
72 * provided to the platform abstraction layer.
73 *
74 * Enabling MBEDTLS_PLATFORM_MEMORY without the
75 * MBEDTLS_PLATFORM_{FREE,CALLOC}_MACROs will provide
76 * "mbedtls_platform_set_calloc_free()" allowing you to set an alternative calloc() and
77 * free() function pointer at runtime.
78 *
79 * Enabling MBEDTLS_PLATFORM_MEMORY and specifying
80 * MBEDTLS_PLATFORM_{CALLOC,FREE}_MACROs will allow you to specify the
81 * alternate function at compile time.
82 *
83 * Requires: MBEDTLS_PLATFORM_C
84 *
85 * Enable this layer to allow use of alternative memory allocators.
86 */
87#define MBEDTLS_PLATFORM_MEMORY
88
89/* \} name SECTION: System support */
90
91/**
92 * \name SECTION: mbed TLS feature support
93 *
94 * This section sets support for features that are or are not needed
95 * within the modules that are enabled.
96 * \{
97 */
98
99/**
100 * \def MBEDTLS_AES_ROM_TABLES
101 *
102 * Use precomputed AES tables stored in ROM.
103 *
104 * Uncomment this macro to use precomputed AES tables stored in ROM.
105 * Comment this macro to generate AES tables in RAM at runtime.
106 *
107 * Tradeoff: Using precomputed ROM tables reduces RAM usage by ~8kb
108 * (or ~2kb if \c MBEDTLS_AES_FEWER_TABLES is used) and reduces the
109 * initialization time before the first AES operation can be performed.
110 * It comes at the cost of additional ~8kb ROM use (resp. ~2kb if \c
111 * MBEDTLS_AES_FEWER_TABLES below is used), and potentially degraded
112 * performance if ROM access is slower than RAM access.
113 *
114 * This option is independent of \c MBEDTLS_AES_FEWER_TABLES.
115 *
116 */
117#define MBEDTLS_AES_ROM_TABLES
118
119/**
120 * \def MBEDTLS_AES_FEWER_TABLES
121 *
122 * Use less ROM/RAM for AES tables.
123 *
124 * Uncommenting this macro omits 75% of the AES tables from
125 * ROM / RAM (depending on the value of \c MBEDTLS_AES_ROM_TABLES)
126 * by computing their values on the fly during operations
127 * (the tables are entry-wise rotations of one another).
128 *
129 * Tradeoff: Uncommenting this reduces the RAM / ROM footprint
130 * by ~6kb but at the cost of more arithmetic operations during
131 * runtime. Specifically, one has to compare 4 accesses within
132 * different tables to 4 accesses with additional arithmetic
133 * operations within the same table. The performance gain/loss
134 * depends on the system and memory details.
135 *
136 * This option is independent of \c MBEDTLS_AES_ROM_TABLES.
137 *
138 */
139#define MBEDTLS_AES_FEWER_TABLES
140
141/**
142 * \def MBEDTLS_ECP_NIST_OPTIM
143 *
144 * Enable specific 'modulo p' routines for each NIST prime.
145 * Depending on the prime and architecture, makes operations 4 to 8 times
146 * faster on the corresponding curve.
147 *
148 * Comment this macro to disable NIST curves optimisation.
149 */
150#define MBEDTLS_ECP_NIST_OPTIM
151
152/**
153 * \def MBEDTLS_NO_PLATFORM_ENTROPY
154 *
155 * Do not use built-in platform entropy functions.
156 * This is useful if your platform does not support
157 * standards like the /dev/urandom or Windows CryptoAPI.
158 *
159 * Uncomment this macro to disable the built-in platform entropy functions.
160 */
161#define MBEDTLS_NO_PLATFORM_ENTROPY
162
163/**
164 * \def MBEDTLS_ENTROPY_NV_SEED
165 *
166 * Enable the non-volatile (NV) seed file-based entropy source.
167 * (Also enables the NV seed read/write functions in the platform layer)
168 *
169 * This is crucial (if not required) on systems that do not have a
170 * cryptographic entropy source (in hardware or kernel) available.
171 *
172 * Requires: MBEDTLS_ENTROPY_C, MBEDTLS_PLATFORM_C
173 *
174 * \note The read/write functions that are used by the entropy source are
175 *       determined in the platform layer, and can be modified at runtime and/or
176 *       compile-time depending on the flags (MBEDTLS_PLATFORM_NV_SEED_*) used.
177 *
178 * \note If you use the default implementation functions that read a seedfile
179 *       with regular fopen(), please make sure you make a seedfile with the
180 *       proper name (defined in MBEDTLS_PLATFORM_STD_NV_SEED_FILE) and at
181 *       least MBEDTLS_ENTROPY_BLOCK_SIZE bytes in size that can be read from
182 *       and written to or you will get an entropy source error! The default
183 *       implementation will only use the first MBEDTLS_ENTROPY_BLOCK_SIZE
184 *       bytes from the file.
185 *
186 * \note The entropy collector will write to the seed file before entropy is
187 *       given to an external source, to update it.
188 */
189#define MBEDTLS_ENTROPY_NV_SEED
190
191/**
192 * \def MBEDTLS_PSA_CRYPTO_SPM
193 *
194 * When MBEDTLS_PSA_CRYPTO_SPM is defined, the code is built for SPM (Secure
195 * Partition Manager) integration which separates the code into two parts: a
196 * NSPE (Non-Secure Process Environment) and an SPE (Secure Process
197 * Environment).
198 *
199 * Module:  library/psa_crypto.c
200 * Requires: MBEDTLS_PSA_CRYPTO_C
201 *
202 */
203#define MBEDTLS_PSA_CRYPTO_SPM
204
205/**
206 * \def MBEDTLS_SHA256_SMALLER
207 *
208 * Enable an implementation of SHA-256 that has lower ROM footprint but also
209 * lower performance.
210 *
211 * The default implementation is meant to be a reasonnable compromise between
212 * performance and size. This version optimizes more aggressively for size at
213 * the expense of performance. Eg on Cortex-M4 it reduces the size of
214 * mbedtls_sha256_process() from ~2KB to ~0.5KB for a performance hit of about
215 * 30%.
216 *
217 * Uncomment to enable the smaller implementation of SHA256.
218 */
219#define MBEDTLS_SHA256_SMALLER
220
221/**
222 * \def MBEDTLS_PSA_CRYPTO_CONFIG
223 *
224 * This setting allows support for cryptographic mechanisms through the PSA
225 * API to be configured separately from support through the mbedtls API.
226 *
227 * When this option is disabled, the PSA API exposes the cryptographic
228 * mechanisms that can be implemented on top of the `mbedtls_xxx` API
229 * configured with `MBEDTLS_XXX` symbols.
230 *
231 * When this option is enabled, the PSA API exposes the cryptographic
232 * mechanisms requested by the `PSA_WANT_XXX` symbols defined in
233 * include/psa/crypto_config.h. The corresponding `MBEDTLS_XXX` settings are
234 * automatically enabled if required (i.e. if no PSA driver provides the
235 * mechanism). You may still freely enable additional `MBEDTLS_XXX` symbols
236 * in mbedtls_config.h.
237 *
238 * If the symbol #MBEDTLS_PSA_CRYPTO_CONFIG_FILE is defined, it specifies
239 * an alternative header to include instead of include/psa/crypto_config.h.
240 *
241 * This feature is still experimental and is not ready for production since
242 * it is not completed.
243 */
244#define MBEDTLS_PSA_CRYPTO_CONFIG
245
246/* \} name SECTION: mbed TLS feature support */
247
248/**
249 * \name SECTION: mbed TLS modules
250 *
251 * This section enables or disables entire modules in mbed TLS
252 * \{
253 */
254
255/**
256 * \def MBEDTLS_AES_C
257 *
258 * Enable the AES block cipher.
259 *
260 * Module:  library/aes.c
261 * Caller:  library/cipher.c
262 *          library/pem.c
263 *          library/ctr_drbg.c
264 *
265 * This module is required to support the TLS ciphersuites that use the AES
266 * cipher.
267 *
268 * PEM_PARSE uses AES for decrypting encrypted keys.
269 */
270#define MBEDTLS_AES_C
271
272/**
273 * \def MBEDTLS_AES_ONLY_128_BIT_KEY_LENGTH
274 *
275 * Use only 128-bit keys in AES operations to save ROM.
276 *
277 * Uncomment this macro to remove support for AES operations that use 192-
278 * or 256-bit keys.
279 *
280 * Uncommenting this macro reduces the size of AES code by ~300 bytes
281 * on v8-M/Thumb2.
282 *
283 * Module:  library/aes.c
284 *
285 * Requires: MBEDTLS_AES_C
286 */
287#define MBEDTLS_AES_ONLY_128_BIT_KEY_LENGTH
288
289/**
290 * \def MBEDTLS_CIPHER_C
291 *
292 * Enable the generic cipher layer.
293 *
294 * Module:  library/cipher.c
295 *
296 * Uncomment to enable generic cipher wrappers.
297 */
298#define MBEDTLS_CIPHER_C
299
300/**
301 * \def MBEDTLS_CTR_DRBG_C
302 *
303 * Enable the CTR_DRBG AES-based random generator.
304 * The CTR_DRBG generator uses AES-256 by default.
305 * To use AES-128 instead, enable MBEDTLS_CTR_DRBG_USE_128_BIT_KEY below.
306 *
307 * Module:  library/ctr_drbg.c
308 * Caller:
309 *
310 * Requires: MBEDTLS_AES_C
311 *
312 * This module provides the CTR_DRBG AES random number generator.
313 */
314#define MBEDTLS_CTR_DRBG_C
315
316/**
317 * \def MBEDTLS_ENTROPY_C
318 *
319 * Enable the platform-specific entropy code.
320 *
321 * Module:  library/entropy.c
322 * Caller:
323 *
324 * Requires: MBEDTLS_SHA512_C or MBEDTLS_SHA256_C
325 *
326 * This module provides a generic entropy pool
327 */
328#define MBEDTLS_ENTROPY_C
329
330/**
331 * \def MBEDTLS_HKDF_C
332 *
333 * Enable the HKDF algorithm (RFC 5869).
334 *
335 * Module:  library/hkdf.c
336 * Caller:
337 *
338 * Requires: MBEDTLS_MD_C
339 *
340 * This module adds support for the Hashed Message Authentication Code
341 * (HMAC)-based key derivation function (HKDF).
342 */
343//#define MBEDTLS_HKDF_C /* Used for HUK deriviation */
344
345/**
346 * \def MBEDTLS_MEMORY_BUFFER_ALLOC_C
347 *
348 * Enable the buffer allocator implementation that makes use of a (stack)
349 * based buffer to 'allocate' dynamic memory. (replaces calloc() and free()
350 * calls)
351 *
352 * Module:  library/memory_buffer_alloc.c
353 *
354 * Requires: MBEDTLS_PLATFORM_C
355 *           MBEDTLS_PLATFORM_MEMORY (to use it within mbed TLS)
356 *
357 * Enable this module to enable the buffer memory allocator.
358 */
359#define MBEDTLS_MEMORY_BUFFER_ALLOC_C
360
361/**
362 * \def MBEDTLS_PLATFORM_C
363 *
364 * Enable the platform abstraction layer that allows you to re-assign
365 * functions like calloc(), free(), snprintf(), printf(), fprintf(), exit().
366 *
367 * Enabling MBEDTLS_PLATFORM_C enables to use of MBEDTLS_PLATFORM_XXX_ALT
368 * or MBEDTLS_PLATFORM_XXX_MACRO directives, allowing the functions mentioned
369 * above to be specified at runtime or compile time respectively.
370 *
371 * \note This abstraction layer must be enabled on Windows (including MSYS2)
372 * as other module rely on it for a fixed snprintf implementation.
373 *
374 * Module:  library/platform.c
375 * Caller:  Most other .c files
376 *
377 * This module enables abstraction of common (libc) functions.
378 */
379#define MBEDTLS_PLATFORM_C
380
381#define MBEDTLS_PLATFORM_NO_STD_FUNCTIONS
382#define MBEDTLS_PLATFORM_STD_MEM_HDR   <stdlib.h>
383
384#include <stdio.h>
385
386#define MBEDTLS_PLATFORM_SNPRINTF_MACRO      snprintf
387#define MBEDTLS_PLATFORM_PRINTF_ALT
388#define MBEDTLS_PLATFORM_STD_EXIT_SUCCESS  EXIT_SUCCESS
389#define MBEDTLS_PLATFORM_STD_EXIT_FAILURE  EXIT_FAILURE
390
391/**
392 * \def MBEDTLS_PSA_CRYPTO_C
393 *
394 * Enable the Platform Security Architecture cryptography API.
395 *
396 * Module:  library/psa_crypto.c
397 *
398 * Requires: MBEDTLS_CTR_DRBG_C, MBEDTLS_ENTROPY_C
399 *
400 */
401#define MBEDTLS_PSA_CRYPTO_C
402
403/**
404 * \def MBEDTLS_PSA_CRYPTO_STORAGE_C
405 *
406 * Enable the Platform Security Architecture persistent key storage.
407 *
408 * Module:  library/psa_crypto_storage.c
409 *
410 * Requires: MBEDTLS_PSA_CRYPTO_C,
411 *           either MBEDTLS_PSA_ITS_FILE_C or a native implementation of
412 *           the PSA ITS interface
413 */
414#define MBEDTLS_PSA_CRYPTO_STORAGE_C
415
416/* \} name SECTION: mbed TLS modules */
417
418/**
419 * \name SECTION: General configuration options
420 *
421 * This section contains Mbed TLS build settings that are not associated
422 * with a particular module.
423 *
424 * \{
425 */
426
427/**
428 * \def MBEDTLS_CONFIG_FILE
429 *
430 * If defined, this is a header which will be included instead of
431 * `"mbedtls/mbedtls_config.h"`.
432 * This header file specifies the compile-time configuration of Mbed TLS.
433 * Unlike other configuration options, this one must be defined on the
434 * compiler command line: a definition in `mbedtls_config.h` would have
435 * no effect.
436 *
437 * This macro is expanded after an <tt>\#include</tt> directive. This is a popular but
438 * non-standard feature of the C language, so this feature is only available
439 * with compilers that perform macro expansion on an <tt>\#include</tt> line.
440 *
441 * The value of this symbol is typically a path in double quotes, either
442 * absolute or relative to a directory on the include search path.
443 */
444//#define MBEDTLS_CONFIG_FILE "mbedtls/mbedtls_config.h"
445
446/**
447 * \def MBEDTLS_USER_CONFIG_FILE
448 *
449 * If defined, this is a header which will be included after
450 * `"mbedtls/mbedtls_config.h"` or #MBEDTLS_CONFIG_FILE.
451 * This allows you to modify the default configuration, including the ability
452 * to undefine options that are enabled by default.
453 *
454 * This macro is expanded after an <tt>\#include</tt> directive. This is a popular but
455 * non-standard feature of the C language, so this feature is only available
456 * with compilers that perform macro expansion on an <tt>\#include</tt> line.
457 *
458 * The value of this symbol is typically a path in double quotes, either
459 * absolute or relative to a directory on the include search path.
460 */
461//#define MBEDTLS_USER_CONFIG_FILE "/dev/null"
462
463/**
464 * \def MBEDTLS_PSA_CRYPTO_CONFIG_FILE
465 *
466 * If defined, this is a header which will be included instead of
467 * `"psa/crypto_config.h"`.
468 * This header file specifies which cryptographic mechanisms are available
469 * through the PSA API when #MBEDTLS_PSA_CRYPTO_CONFIG is enabled, and
470 * is not used when #MBEDTLS_PSA_CRYPTO_CONFIG is disabled.
471 *
472 * This macro is expanded after an <tt>\#include</tt> directive. This is a popular but
473 * non-standard feature of the C language, so this feature is only available
474 * with compilers that perform macro expansion on an <tt>\#include</tt> line.
475 *
476 * The value of this symbol is typically a path in double quotes, either
477 * absolute or relative to a directory on the include search path.
478 */
479//#define MBEDTLS_PSA_CRYPTO_CONFIG_FILE "psa/crypto_config.h"
480
481/**
482 * \def MBEDTLS_PSA_CRYPTO_USER_CONFIG_FILE
483 *
484 * If defined, this is a header which will be included after
485 * `"psa/crypto_config.h"` or #MBEDTLS_PSA_CRYPTO_CONFIG_FILE.
486 * This allows you to modify the default configuration, including the ability
487 * to undefine options that are enabled by default.
488 *
489 * This macro is expanded after an <tt>\#include</tt> directive. This is a popular but
490 * non-standard feature of the C language, so this feature is only available
491 * with compilers that perform macro expansion on an <tt>\#include</tt> line.
492 *
493 * The value of this symbol is typically a path in double quotes, either
494 * absolute or relative to a directory on the include search path.
495 */
496//#define MBEDTLS_PSA_CRYPTO_USER_CONFIG_FILE "/dev/null"
497
498/** \} name SECTION: General configuration options */
499
500/**
501 * \name SECTION: Module configuration options
502 *
503 * This section allows for the setting of module specific sizes and
504 * configuration options. The default values are already present in the
505 * relevant header files and should suffice for the regular use cases.
506 *
507 * Our advice is to enable options and change their values here
508 * only if you have a good reason and know the consequences.
509 *
510 * Please check the respective header file for documentation on these
511 * parameters (to prevent duplicate documentation).
512 * \{
513 */
514
515/* ECP options */
516#define MBEDTLS_ECP_FIXED_POINT_OPTIM        0 /**< Disable fixed-point speed-up */
517
518/**
519 * Uncomment to enable p256-m. This is an alternative implementation of
520 * key generation, ECDH and (randomized) ECDSA on the curve SECP256R1.
521 * Compared to the default implementation:
522 *
523 * - p256-m has a much smaller code size and RAM footprint.
524 * - p256-m is only available via the PSA API. This includes the pk module
525 *   when #MBEDTLS_USE_PSA_CRYPTO is enabled.
526 * - p256-m does not support deterministic ECDSA, EC-JPAKE, custom protocols
527 *   over the core arithmetic, or deterministic derivation of keys.
528 *
529 * We recommend enabling this option if your application uses the PSA API
530 * and the only elliptic curve support it needs is ECDH and ECDSA over
531 * SECP256R1.
532 *
533 * If you enable this option, you do not need to enable any ECC-related
534 * MBEDTLS_xxx option. You do need to separately request support for the
535 * cryptographic mechanisms through the PSA API:
536 * - #MBEDTLS_PSA_CRYPTO_C and #MBEDTLS_PSA_CRYPTO_CONFIG for PSA-based
537 *   configuration;
538 * - #MBEDTLS_USE_PSA_CRYPTO if you want to use p256-m from PK, X.509 or TLS;
539 * - #PSA_WANT_ECC_SECP_R1_256;
540 * - #PSA_WANT_ALG_ECDH and/or #PSA_WANT_ALG_ECDSA as needed;
541 * - #PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY, #PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC,
542 *   #PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT,
543 *   #PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT and/or
544 *   #PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE as needed.
545 *
546 * \note To benefit from the smaller code size of p256-m, make sure that you
547 *       do not enable any ECC-related option not supported by p256-m: this
548 *       would cause the built-in ECC implementation to be built as well, in
549 *       order to provide the required option.
550 *       Make sure #PSA_WANT_ALG_DETERMINISTIC_ECDSA, #PSA_WANT_ALG_JPAKE and
551 *       #PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE, and curves other than
552 *       SECP256R1 are disabled as they are not supported by this driver.
553 *       Also, avoid defining #MBEDTLS_PK_PARSE_EC_COMPRESSED or
554 *       #MBEDTLS_PK_PARSE_EC_EXTENDED as those currently require a subset of
555 *       the built-in ECC implementation, see docs/driver-only-builds.md.
556 */
557#define MBEDTLS_PSA_P256M_DRIVER_ENABLED
558
559/* \} name SECTION: Customisation configuration options */
560
561#if CRYPTO_NV_SEED
562#include "tfm_mbedcrypto_config_extra_nv_seed.h"
563#endif /* CRYPTO_NV_SEED */
564
565#if !defined(CRYPTO_HW_ACCELERATOR) && defined(MBEDTLS_ENTROPY_NV_SEED)
566#include "mbedtls_entropy_nv_seed_config.h"
567#endif
568
569#ifdef CRYPTO_HW_ACCELERATOR
570#include "mbedtls_accelerator_config.h"
571#endif
572
573#endif /* PROFILE_M_MBEDTLS_CONFIG_H */
574