| # Copyright 2018-2020 NXP |
| # |
| # SPDX-License-Identifier: Apache-2.0 |
| # |
| # ############################################################# |
| # This file is generated using a script |
| # ############################################################# |
| # |
| |
| # The Secure Element Applet |
| # |
| # You can compile host library for different Applets listed below. |
| # Please note, some of these Applets may be for NXP Internal use only. |
| SSS_HAVE_APPLET_NONE := ${SSS_HAVE_APPLET_NONE} |
| SSS_HAVE_APPLET_A71CH := ${SSS_HAVE_APPLET_A71CH} |
| SSS_HAVE_APPLET_A71CL := ${SSS_HAVE_APPLET_A71CL} |
| SSS_HAVE_APPLET_A71CH_SIM := ${SSS_HAVE_APPLET_A71CH_SIM} |
| SSS_HAVE_APPLET_SE05X_A := ${SSS_HAVE_APPLET_SE05X_A} |
| SSS_HAVE_APPLET_SE05X_B := ${SSS_HAVE_APPLET_SE05X_B} |
| SSS_HAVE_APPLET_SE05X_C := ${SSS_HAVE_APPLET_SE05X_C} |
| SSS_HAVE_APPLET_SE05X_L := ${SSS_HAVE_APPLET_SE05X_L} |
| SSS_HAVE_APPLET_LOOPBACK := ${SSS_HAVE_APPLET_LOOPBACK} |
| |
| # SE05X Applet version. |
| # |
| # Selection of Applet version 03_XX enables SE050 features. |
| # Selection of Applet version 06_00 enables SE051 features. |
| # |
| SSS_HAVE_SE05X_VER_03_XX := ${SSS_HAVE_SE05X_VER_03_XX} |
| SSS_HAVE_SE05X_VER_06_00 := ${SSS_HAVE_SE05X_VER_06_00} |
| |
| # Host where the software stack is running |
| # |
| # e.g. Windows, PC Linux, Embedded Linux, Kinetis like embedded platform |
| SSS_HAVE_HOST_DARWIN := ${SSS_HAVE_HOST_DARWIN} |
| SSS_HAVE_HOST_PCLINUX32 := ${SSS_HAVE_HOST_PCLINUX32} |
| SSS_HAVE_HOST_PCLINUX64 := ${SSS_HAVE_HOST_PCLINUX64} |
| SSS_HAVE_HOST_PCWINDOWS := ${SSS_HAVE_HOST_PCWINDOWS} |
| SSS_HAVE_HOST_CYGWIN := ${SSS_HAVE_HOST_CYGWIN} |
| SSS_HAVE_HOST_FRDMK64F := ${SSS_HAVE_HOST_FRDMK64F} |
| SSS_HAVE_HOST_EVKMIMXRT1060 := ${SSS_HAVE_HOST_EVKMIMXRT1060} |
| SSS_HAVE_HOST_LPCXPRESSO55S := ${SSS_HAVE_HOST_LPCXPRESSO55S} |
| SSS_HAVE_HOST_LPCXPRESSO55S_NS := ${SSS_HAVE_HOST_LPCXPRESSO55S_NS} |
| SSS_HAVE_HOST_LPCXPRESSO55S_S := ${SSS_HAVE_HOST_LPCXPRESSO55S_S} |
| SSS_HAVE_HOST_IMXLINUX := ${SSS_HAVE_HOST_IMXLINUX} |
| SSS_HAVE_HOST_RASPBIAN := ${SSS_HAVE_HOST_RASPBIAN} |
| SSS_HAVE_HOST_ANDROID := ${SSS_HAVE_HOST_ANDROID} |
| SSS_HAVE_HOST_WIN10IOT := ${SSS_HAVE_HOST_WIN10IOT} |
| |
| # Communication Interface |
| # |
| # How the host library communicates to the Secure Element. |
| # This may be directly over an I2C interface on embedded platform. |
| # Or sometimes over Remote protocol like JRCP_V1 / JRCP_V2 / VCOM from PC. |
| SSS_HAVE_SMCOM_NONE := ${SSS_HAVE_SMCOM_NONE} |
| SSS_HAVE_SMCOM_JRCP_V2 := ${SSS_HAVE_SMCOM_JRCP_V2} |
| SSS_HAVE_SMCOM_JRCP_V1 := ${SSS_HAVE_SMCOM_JRCP_V1} |
| SSS_HAVE_SMCOM_VCOM := ${SSS_HAVE_SMCOM_VCOM} |
| SSS_HAVE_SMCOM_SCI2C := ${SSS_HAVE_SMCOM_SCI2C} |
| SSS_HAVE_SMCOM_T1OI2C := ${SSS_HAVE_SMCOM_T1OI2C} |
| SSS_HAVE_SMCOM_T1OI2C_GP1_0 := ${SSS_HAVE_SMCOM_T1OI2C_GP1_0} |
| SSS_HAVE_SMCOM_RC663_VCOM := ${SSS_HAVE_SMCOM_RC663_VCOM} |
| SSS_HAVE_SMCOM_PN7150 := ${SSS_HAVE_SMCOM_PN7150} |
| SSS_HAVE_SMCOM_THREAD := ${SSS_HAVE_SMCOM_THREAD} |
| SSS_HAVE_SMCOM_PCSC := ${SSS_HAVE_SMCOM_PCSC} |
| |
| # Counterpart Crypto on Host |
| # |
| # What is being used as a cryptographic library on the host. |
| # As of now only OpenSSL / mbedTLS is supported |
| SSS_HAVE_HOSTCRYPTO_MBEDTLS := ${SSS_HAVE_HOSTCRYPTO_MBEDTLS} |
| SSS_HAVE_HOSTCRYPTO_MBEDCRYPTO := ${SSS_HAVE_HOSTCRYPTO_MBEDCRYPTO} |
| SSS_HAVE_HOSTCRYPTO_OPENSSL := ${SSS_HAVE_HOSTCRYPTO_OPENSSL} |
| SSS_HAVE_HOSTCRYPTO_USER := ${SSS_HAVE_HOSTCRYPTO_USER} |
| SSS_HAVE_HOSTCRYPTO_NONE := ${SSS_HAVE_HOSTCRYPTO_NONE} |
| |
| # Choice of Operating system |
| # |
| # Default would mean nothing special. |
| # i.e. Without any RTOS on embedded system, or default APIs on PC/Linux |
| SSS_HAVE_RTOS_DEFAULT := ${SSS_HAVE_RTOS_DEFAULT} |
| SSS_HAVE_RTOS_FREERTOS := ${SSS_HAVE_RTOS_FREERTOS} |
| |
| # ALT Engine implementation for mbedTLS |
| # |
| # When set to None, mbedTLS would not use ALT Implementation to connect to / use Secure Element. |
| # This needs to be set to SSS for Cloud Demos over SSS APIs |
| SSS_HAVE_MBEDTLS_ALT_SSS := ${SSS_HAVE_MBEDTLS_ALT_SSS} |
| SSS_HAVE_MBEDTLS_ALT_A71CH := ${SSS_HAVE_MBEDTLS_ALT_A71CH} |
| SSS_HAVE_MBEDTLS_ALT_NONE := ${SSS_HAVE_MBEDTLS_ALT_NONE} |
| |
| # Secure Channel Protocol |
| # |
| # In case we enable secure channel to Secure Element, which interface to be used. |
| SSS_HAVE_SCP_NONE := ${SSS_HAVE_SCP_NONE} |
| SSS_HAVE_SCP_SCP03_SSS := ${SSS_HAVE_SCP_SCP03_SSS} |
| SSS_HAVE_SCP_SCP03_HOSTCRYPTO := ${SSS_HAVE_SCP_SCP03_HOSTCRYPTO} |
| |
| # Enable or disable FIPS |
| # |
| # This selection mostly impacts tests, and generally not the actual Middleware |
| SSS_HAVE_FIPS_NONE := ${SSS_HAVE_FIPS_NONE} |
| SSS_HAVE_FIPS_SE050 := ${SSS_HAVE_FIPS_SE050} |
| SSS_HAVE_FIPS_140_2 := ${SSS_HAVE_FIPS_140_2} |
| SSS_HAVE_FIPS_140_3 := ${SSS_HAVE_FIPS_140_3} |
| |
| # SE050 Authentication |
| # |
| # This settings is used by examples to connect using various options |
| # to authenticate with the Applet. |
| # The SE05X_Auth options can be changed for KSDK Demos and Examples. |
| # To change SE05X_Auth option follow below steps. |
| # Set flag ``SSS_HAVE_SCP_SCP03_SSS`` to 1 and Reset flag ``SSS_HAVE_SCP_NONE`` to 0. |
| # To change SE05X_Auth option other than ``None`` and ``PlatfSCP03``, |
| # execute se05x_Delete_and_test_provision.exe in order to provision the Authentication Key. |
| # To change SE05X_Auth option to ``ECKey`` or ``ECKey_PlatfSCP03``, |
| # Set additional flag ``SSS_HAVE_HOSTCRYPTO_ANY`` to 1. |
| SSS_HAVE_SE05X_AUTH_NONE := ${SSS_HAVE_SE05X_AUTH_NONE} |
| SSS_HAVE_SE05X_AUTH_USERID := ${SSS_HAVE_SE05X_AUTH_USERID} |
| SSS_HAVE_SE05X_AUTH_PLATFSCP03 := ${SSS_HAVE_SE05X_AUTH_PLATFSCP03} |
| SSS_HAVE_SE05X_AUTH_AESKEY := ${SSS_HAVE_SE05X_AUTH_AESKEY} |
| SSS_HAVE_SE05X_AUTH_ECKEY := ${SSS_HAVE_SE05X_AUTH_ECKEY} |
| SSS_HAVE_SE05X_AUTH_USERID_PLATFSCP03 := ${SSS_HAVE_SE05X_AUTH_USERID_PLATFSCP03} |
| SSS_HAVE_SE05X_AUTH_AESKEY_PLATFSCP03 := ${SSS_HAVE_SE05X_AUTH_AESKEY_PLATFSCP03} |
| SSS_HAVE_SE05X_AUTH_ECKEY_PLATFSCP03 := ${SSS_HAVE_SE05X_AUTH_ECKEY_PLATFSCP03} |
| |
| # A71CH Authentication |
| # |
| # This settings is used by SSS-API based examples to connect using either plain or authenticated to the A71CH. |
| SSS_HAVE_A71CH_AUTH_NONE := ${SSS_HAVE_A71CH_AUTH_NONE} |
| SSS_HAVE_A71CH_AUTH_SCP03 := ${SSS_HAVE_A71CH_AUTH_SCP03} |
| |
| # Logging |
| SSS_HAVE_LOG_DEFAULT := ${SSS_HAVE_LOG_DEFAULT} |
| SSS_HAVE_LOG_VERBOSE := ${SSS_HAVE_LOG_VERBOSE} |
| SSS_HAVE_LOG_SILENT := ${SSS_HAVE_LOG_SILENT} |
| SSS_HAVE_LOG_SEGGERRTT := ${SSS_HAVE_LOG_SEGGERRTT} |
| |
| # See https://cmake.org/cmake/help/latest/variable/CMAKE_BUILD_TYPE.html |
| # |
| # For embedded builds, this choices sets optimization levels. |
| # For MSVC builds, build type is selected from IDE As well |
| SSS_HAVE_CMAKE_BUILD_TYPE_DEBUG := ${SSS_HAVE_CMAKE_BUILD_TYPE_DEBUG} |
| SSS_HAVE_CMAKE_BUILD_TYPE_RELEASE := ${SSS_HAVE_CMAKE_BUILD_TYPE_RELEASE} |
| SSS_HAVE_CMAKE_BUILD_TYPE_RELWITHDEBINFO := ${SSS_HAVE_CMAKE_BUILD_TYPE_RELWITHDEBINFO} |
| SSS_HAVE_CMAKE_BUILD_TYPE_ := ${SSS_HAVE_CMAKE_BUILD_TYPE_} |
| |
| # Compiling without any Applet Support |
| SSS_HAVE_APPLET_NONE := ${SSS_HAVE_APPLET_NONE} |
| |
| # A71CH (ECC) |
| SSS_HAVE_APPLET_A71CH := ${SSS_HAVE_APPLET_A71CH} |
| |
| # A71CL (RSA) |
| SSS_HAVE_APPLET_A71CL := ${SSS_HAVE_APPLET_A71CL} |
| |
| # Similar to A71CH |
| SSS_HAVE_APPLET_A71CH_SIM := ${SSS_HAVE_APPLET_A71CH_SIM} |
| |
| # SE050 Type A (ECC) |
| SSS_HAVE_APPLET_SE05X_A := ${SSS_HAVE_APPLET_SE05X_A} |
| |
| # SE050 Type B (RSA) |
| SSS_HAVE_APPLET_SE05X_B := ${SSS_HAVE_APPLET_SE05X_B} |
| |
| # SE050 (Super set of A + B) |
| SSS_HAVE_APPLET_SE05X_C := ${SSS_HAVE_APPLET_SE05X_C} |
| |
| # SE050 (Similar to A71CL) |
| SSS_HAVE_APPLET_SE05X_L := ${SSS_HAVE_APPLET_SE05X_L} |
| |
| # NXP Internal testing Applet |
| SSS_HAVE_APPLET_LOOPBACK := ${SSS_HAVE_APPLET_LOOPBACK} |
| |
| # SE050 |
| SSS_HAVE_SE05X_VER_03_XX := ${SSS_HAVE_SE05X_VER_03_XX} |
| |
| # SE051 |
| SSS_HAVE_SE05X_VER_06_00 := ${SSS_HAVE_SE05X_VER_06_00} |
| |
| # OS X / Macintosh |
| SSS_HAVE_HOST_DARWIN := ${SSS_HAVE_HOST_DARWIN} |
| |
| # PC/Laptop Linux with 32bit libraries |
| SSS_HAVE_HOST_PCLINUX32 := ${SSS_HAVE_HOST_PCLINUX32} |
| |
| # PC/Laptop Linux with 64bit libraries |
| SSS_HAVE_HOST_PCLINUX64 := ${SSS_HAVE_HOST_PCLINUX64} |
| |
| # PC/Laptop Windows |
| SSS_HAVE_HOST_PCWINDOWS := ${SSS_HAVE_HOST_PCWINDOWS} |
| |
| # Using Cygwin |
| SSS_HAVE_HOST_CYGWIN := ${SSS_HAVE_HOST_CYGWIN} |
| |
| # Embedded Kinetis Freedom K64F |
| SSS_HAVE_HOST_FRDMK64F := ${SSS_HAVE_HOST_FRDMK64F} |
| |
| # Embedded Kinetis i.MX RT 1060 |
| SSS_HAVE_HOST_EVKMIMXRT1060 := ${SSS_HAVE_HOST_EVKMIMXRT1060} |
| |
| # Embedded LPCXpresso55s (No demarcation of secure/non-secure world) |
| SSS_HAVE_HOST_LPCXPRESSO55S := ${SSS_HAVE_HOST_LPCXPRESSO55S} |
| |
| # Non Secure world of LPCXpresso55s |
| SSS_HAVE_HOST_LPCXPRESSO55S_NS := ${SSS_HAVE_HOST_LPCXPRESSO55S_NS} |
| |
| # Secure world of LPCXpresso55s |
| SSS_HAVE_HOST_LPCXPRESSO55S_S := ${SSS_HAVE_HOST_LPCXPRESSO55S_S} |
| |
| # Embedded Linux on i.MX |
| SSS_HAVE_HOST_IMXLINUX := ${SSS_HAVE_HOST_IMXLINUX} |
| |
| # Embedded Linux on RaspBerry PI |
| SSS_HAVE_HOST_RASPBIAN := ${SSS_HAVE_HOST_RASPBIAN} |
| |
| # Android |
| SSS_HAVE_HOST_ANDROID := ${SSS_HAVE_HOST_ANDROID} |
| |
| # Windows 10 IoT Core |
| SSS_HAVE_HOST_WIN10IOT := ${SSS_HAVE_HOST_WIN10IOT} |
| |
| # Not using any Communication layer |
| SSS_HAVE_SMCOM_NONE := ${SSS_HAVE_SMCOM_NONE} |
| |
| # Socket Interface New Implementation |
| SSS_HAVE_SMCOM_JRCP_V2 := ${SSS_HAVE_SMCOM_JRCP_V2} |
| |
| # Socket Interface Old Implementation. |
| # This is the interface used from Host PC when when we run jrcpv1_server |
| # from the linux PC. |
| SSS_HAVE_SMCOM_JRCP_V1 := ${SSS_HAVE_SMCOM_JRCP_V1} |
| |
| # Virtual COM Port |
| SSS_HAVE_SMCOM_VCOM := ${SSS_HAVE_SMCOM_VCOM} |
| |
| # Smart Card I2C for A71CH and A71CH |
| SSS_HAVE_SMCOM_SCI2C := ${SSS_HAVE_SMCOM_SCI2C} |
| |
| # T=1 over I2C for SE050 |
| SSS_HAVE_SMCOM_T1OI2C := ${SSS_HAVE_SMCOM_T1OI2C} |
| |
| # GP Spec |
| SSS_HAVE_SMCOM_T1OI2C_GP1_0 := ${SSS_HAVE_SMCOM_T1OI2C_GP1_0} |
| |
| # Via RC663 Over VCOM Interface from Windows PC |
| SSS_HAVE_SMCOM_RC663_VCOM := ${SSS_HAVE_SMCOM_RC663_VCOM} |
| |
| # NFC Interface using PN7150 |
| SSS_HAVE_SMCOM_PN7150 := ${SSS_HAVE_SMCOM_PN7150} |
| |
| # Thread Mode interface |
| SSS_HAVE_SMCOM_THREAD := ${SSS_HAVE_SMCOM_THREAD} |
| |
| # CCID PC/SC reader interface |
| SSS_HAVE_SMCOM_PCSC := ${SSS_HAVE_SMCOM_PCSC} |
| |
| # Use mbedTLS as host crypto |
| SSS_HAVE_HOSTCRYPTO_MBEDTLS := ${SSS_HAVE_HOSTCRYPTO_MBEDTLS} |
| |
| # Use mbed-crypto as host crypto |
| # Required for ARM-PSA / TF-M |
| SSS_HAVE_HOSTCRYPTO_MBEDCRYPTO := ${SSS_HAVE_HOSTCRYPTO_MBEDCRYPTO} |
| |
| # Use OpenSSL as host crypto |
| SSS_HAVE_HOSTCRYPTO_OPENSSL := ${SSS_HAVE_HOSTCRYPTO_OPENSSL} |
| |
| # User Implementation of Host Crypto |
| # e.g. Files at ``sss/src/user/crypto`` have low level AES/CMAC primitives. |
| # The files at ``sss/src/user`` use those primitives. |
| # This becomes an example for users with their own AES Implementation |
| # This then becomes integration without mbedTLS/OpenSSL for SCP03 / AESKey. |
| # |
| # .. note:: ECKey abstraction is not implemented/available yet. |
| SSS_HAVE_HOSTCRYPTO_USER := ${SSS_HAVE_HOSTCRYPTO_USER} |
| |
| # NO Host Crypto |
| # Note, this is unsecure and only provided for experimentation |
| # on platforms that do not have an mbedTLS PORT |
| # Many :ref:`sssftr-control` have to be disabled to have a valid build. |
| SSS_HAVE_HOSTCRYPTO_NONE := ${SSS_HAVE_HOSTCRYPTO_NONE} |
| |
| # No specific RTOS. Either bare matal on embedded system or native linux or Windows OS |
| SSS_HAVE_RTOS_DEFAULT := ${SSS_HAVE_RTOS_DEFAULT} |
| |
| # Free RTOS for embedded systems |
| SSS_HAVE_RTOS_FREERTOS := ${SSS_HAVE_RTOS_FREERTOS} |
| |
| # Use SSS Layer ALT implementation |
| SSS_HAVE_MBEDTLS_ALT_SSS := ${SSS_HAVE_MBEDTLS_ALT_SSS} |
| |
| # Legacy implementation |
| SSS_HAVE_MBEDTLS_ALT_A71CH := ${SSS_HAVE_MBEDTLS_ALT_A71CH} |
| |
| # Not using any mbedTLS_ALT |
| # |
| # When this is selected, cloud demos can not work with mbedTLS |
| SSS_HAVE_MBEDTLS_ALT_NONE := ${SSS_HAVE_MBEDTLS_ALT_NONE} |
| SSS_HAVE_SCP_NONE := ${SSS_HAVE_SCP_NONE} |
| |
| # Use SSS Layer for SCP. Used for SE050 family. |
| SSS_HAVE_SCP_SCP03_SSS := ${SSS_HAVE_SCP_SCP03_SSS} |
| |
| # Use Host Crypto Layer for SCP03. Legacy implementation. Used for older demos of A71CH Family. |
| SSS_HAVE_SCP_SCP03_HOSTCRYPTO := ${SSS_HAVE_SCP_SCP03_HOSTCRYPTO} |
| |
| # NO FIPS |
| SSS_HAVE_FIPS_NONE := ${SSS_HAVE_FIPS_NONE} |
| |
| # SE050 IC FIPS |
| SSS_HAVE_FIPS_SE050 := ${SSS_HAVE_FIPS_SE050} |
| |
| # FIPS 140-2 |
| SSS_HAVE_FIPS_140_2 := ${SSS_HAVE_FIPS_140_2} |
| |
| # FIPS 140-3 |
| SSS_HAVE_FIPS_140_3 := ${SSS_HAVE_FIPS_140_3} |
| |
| # Use the default session (i.e. session less) login |
| SSS_HAVE_SE05X_AUTH_NONE := ${SSS_HAVE_SE05X_AUTH_NONE} |
| |
| # Do User Authentication with UserID |
| SSS_HAVE_SE05X_AUTH_USERID := ${SSS_HAVE_SE05X_AUTH_USERID} |
| |
| # Use Platform SCP for connection to SE |
| SSS_HAVE_SE05X_AUTH_PLATFSCP03 := ${SSS_HAVE_SE05X_AUTH_PLATFSCP03} |
| |
| # Do User Authentication with AES Key |
| # Earlier this was called AppletSCP03 |
| SSS_HAVE_SE05X_AUTH_AESKEY := ${SSS_HAVE_SE05X_AUTH_AESKEY} |
| |
| # Do User Authentication with EC Key |
| # Earlier this was called FastSCP |
| SSS_HAVE_SE05X_AUTH_ECKEY := ${SSS_HAVE_SE05X_AUTH_ECKEY} |
| |
| # UserID and PlatfSCP03 |
| SSS_HAVE_SE05X_AUTH_USERID_PLATFSCP03 := ${SSS_HAVE_SE05X_AUTH_USERID_PLATFSCP03} |
| |
| # AESKey and PlatfSCP03 |
| SSS_HAVE_SE05X_AUTH_AESKEY_PLATFSCP03 := ${SSS_HAVE_SE05X_AUTH_AESKEY_PLATFSCP03} |
| |
| # ECKey and PlatfSCP03 |
| SSS_HAVE_SE05X_AUTH_ECKEY_PLATFSCP03 := ${SSS_HAVE_SE05X_AUTH_ECKEY_PLATFSCP03} |
| |
| # Plain communication, not authenticated or encrypted |
| SSS_HAVE_A71CH_AUTH_NONE := ${SSS_HAVE_A71CH_AUTH_NONE} |
| |
| # SCP03 enabled |
| SSS_HAVE_A71CH_AUTH_SCP03 := ${SSS_HAVE_A71CH_AUTH_SCP03} |
| |
| # Default Logging |
| SSS_HAVE_LOG_DEFAULT := ${SSS_HAVE_LOG_DEFAULT} |
| |
| # Very Verbose logging |
| SSS_HAVE_LOG_VERBOSE := ${SSS_HAVE_LOG_VERBOSE} |
| |
| # Totally silent logging |
| SSS_HAVE_LOG_SILENT := ${SSS_HAVE_LOG_SILENT} |
| |
| # Segger Real Time Transfer (For Test Automation, NXP Internal) |
| SSS_HAVE_LOG_SEGGERRTT := ${SSS_HAVE_LOG_SEGGERRTT} |
| |
| # For developer |
| SSS_HAVE_CMAKE_BUILD_TYPE_DEBUG := ${SSS_HAVE_CMAKE_BUILD_TYPE_DEBUG} |
| |
| # Optimization enabled and debug symbols removed |
| SSS_HAVE_CMAKE_BUILD_TYPE_RELEASE := ${SSS_HAVE_CMAKE_BUILD_TYPE_RELEASE} |
| |
| # Optimization enabled but with debug symbols |
| SSS_HAVE_CMAKE_BUILD_TYPE_RELWITHDEBINFO := ${SSS_HAVE_CMAKE_BUILD_TYPE_RELWITHDEBINFO} |
| |
| # Empty Allowed |
| # SE05X Secure Element : Symmetric AES |
| SSSFTR_SE05X_AES := ${SSSFTR_SE05X_AES} |
| # SE05X Secure Element : Elliptic Curve Cryptography |
| SSSFTR_SE05X_ECC := ${SSSFTR_SE05X_ECC} |
| # SE05X Secure Element : RSA |
| SSSFTR_SE05X_RSA := ${SSSFTR_SE05X_RSA} |
| # SE05X Secure Element : KEY operations : SET Key |
| SSSFTR_SE05X_KEY_SET := ${SSSFTR_SE05X_KEY_SET} |
| # SE05X Secure Element : KEY operations : GET Key |
| SSSFTR_SE05X_KEY_GET := ${SSSFTR_SE05X_KEY_GET} |
| # SE05X Secure Element : Authenticate via ECKey |
| SSSFTR_SE05X_AuthECKey := ${SSSFTR_SE05X_AuthECKey} |
| # SE05X Secure Element : Allow creation of user/authenticated session. |
| # |
| # If the intended deployment only uses Platform SCP |
| # Or it is a pure session less integration, this can |
| # save some code size. |
| SSSFTR_SE05X_AuthSession := ${SSSFTR_SE05X_AuthSession} |
| # SE05X Secure Element : Allow creation/deletion of Crypto Objects |
| # |
| # If disabled, new Crytpo Objects are neither created and |
| # old/existing Crypto Objects are not deleted. |
| # It is assumed that during provisioning phase, the required |
| # Crypto Objects are pre-created or they are never going to |
| # be needed. |
| SSSFTR_SE05X_CREATE_DELETE_CRYPTOOBJ := ${SSSFTR_SE05X_CREATE_DELETE_CRYPTOOBJ} |
| # Software : Symmetric AES |
| SSSFTR_SW_AES := ${SSSFTR_SW_AES} |
| # Software : Elliptic Curve Cryptography |
| SSSFTR_SW_ECC := ${SSSFTR_SW_ECC} |
| # Software : RSA |
| SSSFTR_SW_RSA := ${SSSFTR_SW_RSA} |
| # Software : KEY operations : SET Key |
| SSSFTR_SW_KEY_SET := ${SSSFTR_SW_KEY_SET} |
| # Software : KEY operations : GET Key |
| SSSFTR_SW_KEY_GET := ${SSSFTR_SW_KEY_GET} |
| # Software : Used as a test counterpart |
| # |
| # e.g. Major part of the mebdTLS SSS layer is purely used for |
| # testing of Secure Element implementation, and can be avoided |
| # fully during many production scenarios. |
| SSSFTR_SW_TESTCOUNTERPART := ${SSSFTR_SW_TESTCOUNTERPART} |
| |
| |
| |
| # Deprecated items. Used here for backwards compatibility. |
| |
| WithApplet_SE05X := ${SSS_HAVE_APPLET_SE05X_IOT} |
| WithApplet_SE050_A := ${SSS_HAVE_APPLET_SE05X_A} |
| WithApplet_SE050_B := ${SSS_HAVE_APPLET_SE05X_B} |
| WithApplet_SE050_C := ${SSS_HAVE_APPLET_SE05X_C} |
| SSS_HAVE_SE050_A := ${SSS_HAVE_APPLET_SE05X_A} |
| SSS_HAVE_SE050_B := ${SSS_HAVE_APPLET_SE05X_B} |
| SSS_HAVE_SE050_C := ${SSS_HAVE_APPLET_SE05X_C} |
| SSS_HAVE_SE05X := ${SSS_HAVE_APPLET_SE05X_IOT} |
| SSS_HAVE_SE := ${SSS_HAVE_APPLET} |
| SSS_HAVE_LOOPBACK := ${SSS_HAVE_APPLET_LOOPBACK} |
| SSS_HAVE_ALT := ${SSS_HAVE_MBEDTLS_ALT} |
| WithApplet_None := ${SSS_HAVE_APPLET_NONE} |
| SSS_HAVE_None := ${SSS_HAVE_APPLET_NONE} |
| WithApplet_A71CH := ${SSS_HAVE_APPLET_A71CH} |
| SSS_HAVE_A71CH := ${SSS_HAVE_APPLET_A71CH} |
| WithApplet_A71CL := ${SSS_HAVE_APPLET_A71CL} |
| SSS_HAVE_A71CL := ${SSS_HAVE_APPLET_A71CL} |
| WithApplet_A71CH_SIM := ${SSS_HAVE_APPLET_A71CH_SIM} |
| SSS_HAVE_A71CH_SIM := ${SSS_HAVE_APPLET_A71CH_SIM} |
| WithApplet_SE05X_A := ${SSS_HAVE_APPLET_SE05X_A} |
| SSS_HAVE_SE05X_A := ${SSS_HAVE_APPLET_SE05X_A} |
| WithApplet_SE05X_B := ${SSS_HAVE_APPLET_SE05X_B} |
| SSS_HAVE_SE05X_B := ${SSS_HAVE_APPLET_SE05X_B} |
| WithApplet_SE05X_C := ${SSS_HAVE_APPLET_SE05X_C} |
| SSS_HAVE_SE05X_C := ${SSS_HAVE_APPLET_SE05X_C} |
| WithApplet_SE05X_L := ${SSS_HAVE_APPLET_SE05X_L} |
| SSS_HAVE_SE05X_L := ${SSS_HAVE_APPLET_SE05X_L} |
| WithApplet_LoopBack := ${SSS_HAVE_APPLET_LOOPBACK} |
| SSS_HAVE_LoopBack := ${SSS_HAVE_APPLET_LOOPBACK} |
| SSS_HAVE_MBEDTLS := ${SSS_HAVE_HOSTCRYPTO_MBEDTLS} |
| SSS_HAVE_MBEDCRYPTO := ${SSS_HAVE_HOSTCRYPTO_MBEDCRYPTO} |
| SSS_HAVE_OPENSSL := ${SSS_HAVE_HOSTCRYPTO_OPENSSL} |
| SSS_HAVE_USER := ${SSS_HAVE_HOSTCRYPTO_USER} |
| SSS_HAVE_NONE := ${SSS_HAVE_HOSTCRYPTO_NONE} |
| SSS_HAVE_ALT_SSS := ${SSS_HAVE_MBEDTLS_ALT_SSS} |
| SSS_HAVE_ALT_A71CH := ${SSS_HAVE_MBEDTLS_ALT_A71CH} |
| SSS_HAVE_ALT_NONE := ${SSS_HAVE_MBEDTLS_ALT_NONE} |
| SSS_HAVE_SE05X_Auth_None := ${SSS_HAVE_SE05X_AUTH_NONE} |
| SSS_HAVE_SE05X_Auth_UserID := ${SSS_HAVE_SE05X_AUTH_USERID} |
| SSS_HAVE_SE05X_Auth_PlatfSCP03 := ${SSS_HAVE_SE05X_AUTH_PLATFSCP03} |
| SSS_HAVE_SE05X_Auth_AESKey := ${SSS_HAVE_SE05X_AUTH_AESKEY} |
| SSS_HAVE_SE05X_Auth_ECKey := ${SSS_HAVE_SE05X_AUTH_ECKEY} |
| SSS_HAVE_SE05X_Auth_UserID_PlatfSCP03 := ${SSS_HAVE_SE05X_AUTH_USERID_PLATFSCP03} |
| SSS_HAVE_SE05X_Auth_AESKey_PlatfSCP03 := ${SSS_HAVE_SE05X_AUTH_AESKEY_PLATFSCP03} |
| SSS_HAVE_SE05X_Auth_ECKey_PlatfSCP03 := ${SSS_HAVE_SE05X_AUTH_ECKEY_PLATFSCP03} |