|
776 | 776 | *
|
777 | 777 | * \note This option only works with the default software implementation of
|
778 | 778 | * elliptic curve functionality. It is incompatible with
|
779 |
| - * MBEDTLS_ECP_ALT, MBEDTLS_ECDH_XXX_ALT and MBEDTLS_ECDSA_XXX_ALT. |
| 779 | + * MBEDTLS_ECP_ALT, MBEDTLS_ECDH_XXX_ALT, MBEDTLS_ECDSA_XXX_ALT |
| 780 | + * and MBEDTLS_ECDH_LEGACY_CONTEXT. |
780 | 781 | */
|
781 | 782 | //#define MBEDTLS_ECP_RESTARTABLE
|
782 | 783 |
|
| 784 | +/** |
| 785 | + * \def MBEDTLS_ECDH_LEGACY_CONTEXT |
| 786 | + * |
| 787 | + * Use a backward compatible ECDH context. |
| 788 | + * |
| 789 | + * Mbed TLS supports two formats for ECDH contexts (#mbedtls_ecdh_context |
| 790 | + * defined in `ecdh.h`). For most applications, the choice of format makes |
| 791 | + * no difference, since all library functions can work with either format, |
| 792 | + * except that the new format is incompatible with MBEDTLS_ECP_RESTARTABLE. |
| 793 | +
|
| 794 | + * The new format used when this option is disabled is smaller |
| 795 | + * (56 bytes on a 32-bit platform). In future versions of the library, it |
| 796 | + * will support alternative implementations of ECDH operations. |
| 797 | + * The new format is incompatible with applications that access |
| 798 | + * context fields directly and with restartable ECP operations. |
| 799 | + * |
| 800 | + * Define this macro if you enable MBEDTLS_ECP_RESTARTABLE or if you |
| 801 | + * want to access ECDH context fields directly. Otherwise you should |
| 802 | + * comment out this macro definition. |
| 803 | + * |
| 804 | + * This option has no effect if #MBEDTLS_ECDH_C is not enabled. |
| 805 | + * |
| 806 | + * \note This configuration option is experimental. Future versions of the |
| 807 | + * library may modify the way the ECDH context layout is configured |
| 808 | + * and may modify the layout of the new context type. |
| 809 | + */ |
| 810 | +#define MBEDTLS_ECDH_LEGACY_CONTEXT |
| 811 | + |
783 | 812 | /**
|
784 | 813 | * \def MBEDTLS_ECDSA_DETERMINISTIC
|
785 | 814 | *
|
|
1253 | 1282 | //#define MBEDTLS_PSA_CRYPTO_SPM
|
1254 | 1283 |
|
1255 | 1284 | /**
|
1256 |
| - * \def MBEDTLS_PSA_HAS_ITS_IO |
| 1285 | + * \def MBEDTLS_PSA_INJECT_ENTROPY |
1257 | 1286 | *
|
1258 |
| - * Enable the non-volatile secure storage usage. |
| 1287 | + * Enable support for entropy injection at first boot. This feature is |
| 1288 | + * required on systems that do not have a built-in entropy source (TRNG). |
| 1289 | + * This feature is currently not supported on systems that have a built-in |
| 1290 | + * entropy source. |
1259 | 1291 | *
|
1260 |
| - * This is crucial on systems that do not have a HW TRNG support. |
| 1292 | + * Requires: MBEDTLS_PSA_CRYPTO_STORAGE_C, MBEDTLS_ENTROPY_NV_SEED |
1261 | 1293 | *
|
1262 | 1294 | */
|
1263 |
| -//#define MBEDTLS_PSA_HAS_ITS_IO |
| 1295 | +//#define MBEDTLS_PSA_INJECT_ENTROPY |
1264 | 1296 |
|
1265 | 1297 | /**
|
1266 | 1298 | * \def MBEDTLS_RSA_NO_CRT
|
|
1760 | 1792 | */
|
1761 | 1793 | //#define MBEDTLS_X509_ALLOW_UNSUPPORTED_CRITICAL_EXTENSION
|
1762 | 1794 |
|
| 1795 | +/** |
| 1796 | + * \def MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK |
| 1797 | + * |
| 1798 | + * If set, this enables the X.509 API `mbedtls_x509_crt_verify_with_ca_cb()` |
| 1799 | + * and the SSL API `mbedtls_ssl_conf_ca_cb()` which allow users to configure |
| 1800 | + * the set of trusted certificates through a callback instead of a linked |
| 1801 | + * list. |
| 1802 | + * |
| 1803 | + * This is useful for example in environments where a large number of trusted |
| 1804 | + * certificates is present and storing them in a linked list isn't efficient |
| 1805 | + * enough, or when the set of trusted certificates changes frequently. |
| 1806 | + * |
| 1807 | + * See the documentation of `mbedtls_x509_crt_verify_with_ca_cb()` and |
| 1808 | + * `mbedtls_ssl_conf_ca_cb()` for more information. |
| 1809 | + * |
| 1810 | + * Uncomment to enable trusted certificate callbacks. |
| 1811 | + */ |
| 1812 | +//#define MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK |
| 1813 | + |
1763 | 1814 | /**
|
1764 | 1815 | * \def MBEDTLS_X509_CHECK_KEY_USAGE
|
1765 | 1816 | *
|
|
2757 | 2808 | *
|
2758 | 2809 | * Enable the Platform Security Architecture persistent key storage.
|
2759 | 2810 | *
|
2760 |
| - * Module: library/psa_crypto_storage.c |
2761 |
| - * |
2762 |
| - * Requires: MBEDTLS_PSA_CRYPTO_C and one of either |
2763 |
| - * MBEDTLS_PSA_CRYPTO_STORAGE_FILE_C or MBEDTLS_PSA_CRYPTO_STORAGE_ITS_C |
2764 |
| - * (but not both) |
| 2811 | + * Module: crypto/library/psa_crypto_storage.c |
2765 | 2812 | *
|
| 2813 | + * Requires: MBEDTLS_PSA_CRYPTO_C, |
| 2814 | + * either MBEDTLS_PSA_ITS_FILE_C or a native implementation of |
| 2815 | + * the PSA ITS interface |
2766 | 2816 | */
|
2767 | 2817 | //#define MBEDTLS_PSA_CRYPTO_STORAGE_C
|
2768 | 2818 |
|
2769 | 2819 | /**
|
2770 |
| - * \def MBEDTLS_PSA_CRYPTO_STORAGE_FILE_C |
2771 |
| - * |
2772 |
| - * Enable persistent key storage over files for the |
2773 |
| - * Platform Security Architecture cryptography API. |
2774 |
| - * |
2775 |
| - * Module: library/psa_crypto_storage_file.c |
2776 |
| - * |
2777 |
| - * Requires: MBEDTLS_PSA_CRYPTO_C, MBEDTLS_FS_IO |
2778 |
| - * |
2779 |
| - */ |
2780 |
| -//#define MBEDTLS_PSA_CRYPTO_STORAGE_FILE_C |
2781 |
| - |
2782 |
| -/** |
2783 |
| - * \def MBEDTLS_PSA_CRYPTO_STORAGE_ITS_C |
| 2820 | + * \def MBEDTLS_PSA_ITS_FILE_C |
2784 | 2821 | *
|
2785 |
| - * Enable persistent key storage over PSA ITS for the |
2786 |
| - * Platform Security Architecture cryptography API. |
| 2822 | + * Enable the emulation of the Platform Security Architecture |
| 2823 | + * Internal Trusted Storage (PSA ITS) over files. |
2787 | 2824 | *
|
2788 |
| - * Module: library/psa_crypto_storage_its.c |
| 2825 | + * Module: crypto/library/psa_its_file.c |
2789 | 2826 | *
|
2790 |
| - * Requires: MBEDTLS_PSA_CRYPTO_C, MBEDTLS_PSA_HAS_ITS_IO |
| 2827 | + * Requires: MBEDTLS_FS_IO |
2791 | 2828 | *
|
2792 | 2829 | */
|
2793 |
| -//#define MBEDTLS_PSA_CRYPTO_STORAGE_ITS_C |
| 2830 | +//#define MBEDTLS_PSA_ITS_FILE_C |
2794 | 2831 |
|
2795 | 2832 | /**
|
2796 | 2833 | * \def MBEDTLS_RIPEMD160_C
|
|
0 commit comments