blob: a906844ee0d3c740ea3a3cb8dd48b6092154034e [file] [log] [blame]
/* Copyright 2019 NXP
*
* SPDX-License-Identifier: Apache-2.0
*/
#ifndef SSS_MBEDTLS_EVKB_H
#define SSS_MBEDTLS_EVKB_H
#include <sss_mbedtls_frdmk64f_config.h>
#ifndef MBEDTLS_CTR_DRBG_C
/* We need this for mbedTLS sw crypto counterpart */
#define MBEDTLS_CTR_DRBG_C
#endif
#if USE_RTOS && defined(FSL_RTOS_FREE_RTOS)
#undef MBEDTLS_PLATFORM_MEMORY
#undef MBEDTLS_PLATFORM_STD_CALLOC
#undef MBEDTLS_PLATFORM_STD_FREE
#endif /* USE_RTOS*/
/* IF We use ALT from the EVKB, anything that is related to
* AES256 would get skipped and because of this TLS Handshake
* would not pass
*
* Disabling this altogather. May be there's a way to use AES256
* on EVKB with mbedTLS but need to Check.
*/
// #undef MBEDTLS_AES_ALT
// #undef MBEDTLS_AES_SETKEY_ENC_ALT
// #undef MBEDTLS_AES_SETKEY_DEC_ALT
// #undef MBEDTLS_AES_ENCRYPT_ALT
// #undef MBEDTLS_AES_DECRYPT_ALT
// #undef MBEDTLS_AES_ALT_NO_192
// #undef MBEDTLS_AES_CRYPT_CBC_ALT
// #undef MBEDTLS_AES_ALT_NO_256
// #undef MBEDTLS_FREESCALE_DCP_AES
#endif /* SSS_MBEDTLS_EVKB_H */