blob: f95bdb138bbf2cf64bf3df327d968dff88fb05c8 [file] [log] [blame]
# Copyright 2018-2020 NXP
#
# SPDX-License-Identifier: Apache-2.0
#
# #############################################################
# This file is generated using a script
# #############################################################
#
# The Secure Element Applet
#
# You can compile host library for different Applets listed below.
# Please note, some of these Applets may be for NXP Internal use only.
SSS_HAVE_APPLET_NONE := ${SSS_HAVE_APPLET_NONE}
SSS_HAVE_APPLET_A71CH := ${SSS_HAVE_APPLET_A71CH}
SSS_HAVE_APPLET_A71CL := ${SSS_HAVE_APPLET_A71CL}
SSS_HAVE_APPLET_A71CH_SIM := ${SSS_HAVE_APPLET_A71CH_SIM}
SSS_HAVE_APPLET_SE05X_A := ${SSS_HAVE_APPLET_SE05X_A}
SSS_HAVE_APPLET_SE05X_B := ${SSS_HAVE_APPLET_SE05X_B}
SSS_HAVE_APPLET_SE05X_C := ${SSS_HAVE_APPLET_SE05X_C}
SSS_HAVE_APPLET_SE05X_L := ${SSS_HAVE_APPLET_SE05X_L}
SSS_HAVE_APPLET_LOOPBACK := ${SSS_HAVE_APPLET_LOOPBACK}
# SE05X Applet version.
#
# Selection of Applet version 03_XX enables SE050 features.
# Selection of Applet version 06_00 enables SE051 features.
#
SSS_HAVE_SE05X_VER_03_XX := ${SSS_HAVE_SE05X_VER_03_XX}
SSS_HAVE_SE05X_VER_06_00 := ${SSS_HAVE_SE05X_VER_06_00}
# Host where the software stack is running
#
# e.g. Windows, PC Linux, Embedded Linux, Kinetis like embedded platform
SSS_HAVE_HOST_DARWIN := ${SSS_HAVE_HOST_DARWIN}
SSS_HAVE_HOST_PCLINUX32 := ${SSS_HAVE_HOST_PCLINUX32}
SSS_HAVE_HOST_PCLINUX64 := ${SSS_HAVE_HOST_PCLINUX64}
SSS_HAVE_HOST_PCWINDOWS := ${SSS_HAVE_HOST_PCWINDOWS}
SSS_HAVE_HOST_CYGWIN := ${SSS_HAVE_HOST_CYGWIN}
SSS_HAVE_HOST_FRDMK64F := ${SSS_HAVE_HOST_FRDMK64F}
SSS_HAVE_HOST_EVKMIMXRT1060 := ${SSS_HAVE_HOST_EVKMIMXRT1060}
SSS_HAVE_HOST_LPCXPRESSO55S := ${SSS_HAVE_HOST_LPCXPRESSO55S}
SSS_HAVE_HOST_LPCXPRESSO55S_NS := ${SSS_HAVE_HOST_LPCXPRESSO55S_NS}
SSS_HAVE_HOST_LPCXPRESSO55S_S := ${SSS_HAVE_HOST_LPCXPRESSO55S_S}
SSS_HAVE_HOST_IMXLINUX := ${SSS_HAVE_HOST_IMXLINUX}
SSS_HAVE_HOST_RASPBIAN := ${SSS_HAVE_HOST_RASPBIAN}
SSS_HAVE_HOST_ANDROID := ${SSS_HAVE_HOST_ANDROID}
SSS_HAVE_HOST_WIN10IOT := ${SSS_HAVE_HOST_WIN10IOT}
# Communication Interface
#
# How the host library communicates to the Secure Element.
# This may be directly over an I2C interface on embedded platform.
# Or sometimes over Remote protocol like JRCP_V1 / JRCP_V2 / VCOM from PC.
SSS_HAVE_SMCOM_NONE := ${SSS_HAVE_SMCOM_NONE}
SSS_HAVE_SMCOM_JRCP_V2 := ${SSS_HAVE_SMCOM_JRCP_V2}
SSS_HAVE_SMCOM_JRCP_V1 := ${SSS_HAVE_SMCOM_JRCP_V1}
SSS_HAVE_SMCOM_VCOM := ${SSS_HAVE_SMCOM_VCOM}
SSS_HAVE_SMCOM_SCI2C := ${SSS_HAVE_SMCOM_SCI2C}
SSS_HAVE_SMCOM_T1OI2C := ${SSS_HAVE_SMCOM_T1OI2C}
SSS_HAVE_SMCOM_T1OI2C_GP1_0 := ${SSS_HAVE_SMCOM_T1OI2C_GP1_0}
SSS_HAVE_SMCOM_RC663_VCOM := ${SSS_HAVE_SMCOM_RC663_VCOM}
SSS_HAVE_SMCOM_PN7150 := ${SSS_HAVE_SMCOM_PN7150}
SSS_HAVE_SMCOM_THREAD := ${SSS_HAVE_SMCOM_THREAD}
SSS_HAVE_SMCOM_PCSC := ${SSS_HAVE_SMCOM_PCSC}
# Counterpart Crypto on Host
#
# What is being used as a cryptographic library on the host.
# As of now only OpenSSL / mbedTLS is supported
SSS_HAVE_HOSTCRYPTO_MBEDTLS := ${SSS_HAVE_HOSTCRYPTO_MBEDTLS}
SSS_HAVE_HOSTCRYPTO_MBEDCRYPTO := ${SSS_HAVE_HOSTCRYPTO_MBEDCRYPTO}
SSS_HAVE_HOSTCRYPTO_OPENSSL := ${SSS_HAVE_HOSTCRYPTO_OPENSSL}
SSS_HAVE_HOSTCRYPTO_USER := ${SSS_HAVE_HOSTCRYPTO_USER}
SSS_HAVE_HOSTCRYPTO_NONE := ${SSS_HAVE_HOSTCRYPTO_NONE}
# Choice of Operating system
#
# Default would mean nothing special.
# i.e. Without any RTOS on embedded system, or default APIs on PC/Linux
SSS_HAVE_RTOS_DEFAULT := ${SSS_HAVE_RTOS_DEFAULT}
SSS_HAVE_RTOS_FREERTOS := ${SSS_HAVE_RTOS_FREERTOS}
# ALT Engine implementation for mbedTLS
#
# When set to None, mbedTLS would not use ALT Implementation to connect to / use Secure Element.
# This needs to be set to SSS for Cloud Demos over SSS APIs
SSS_HAVE_MBEDTLS_ALT_SSS := ${SSS_HAVE_MBEDTLS_ALT_SSS}
SSS_HAVE_MBEDTLS_ALT_A71CH := ${SSS_HAVE_MBEDTLS_ALT_A71CH}
SSS_HAVE_MBEDTLS_ALT_NONE := ${SSS_HAVE_MBEDTLS_ALT_NONE}
# Secure Channel Protocol
#
# In case we enable secure channel to Secure Element, which interface to be used.
SSS_HAVE_SCP_NONE := ${SSS_HAVE_SCP_NONE}
SSS_HAVE_SCP_SCP03_SSS := ${SSS_HAVE_SCP_SCP03_SSS}
SSS_HAVE_SCP_SCP03_HOSTCRYPTO := ${SSS_HAVE_SCP_SCP03_HOSTCRYPTO}
# Enable or disable FIPS
#
# This selection mostly impacts tests, and generally not the actual Middleware
SSS_HAVE_FIPS_NONE := ${SSS_HAVE_FIPS_NONE}
SSS_HAVE_FIPS_SE050 := ${SSS_HAVE_FIPS_SE050}
SSS_HAVE_FIPS_140_2 := ${SSS_HAVE_FIPS_140_2}
SSS_HAVE_FIPS_140_3 := ${SSS_HAVE_FIPS_140_3}
# SE050 Authentication
#
# This settings is used by examples to connect using various options
# to authenticate with the Applet.
# The SE05X_Auth options can be changed for KSDK Demos and Examples.
# To change SE05X_Auth option follow below steps.
# Set flag ``SSS_HAVE_SCP_SCP03_SSS`` to 1 and Reset flag ``SSS_HAVE_SCP_NONE`` to 0.
# To change SE05X_Auth option other than ``None`` and ``PlatfSCP03``,
# execute se05x_Delete_and_test_provision.exe in order to provision the Authentication Key.
# To change SE05X_Auth option to ``ECKey`` or ``ECKey_PlatfSCP03``,
# Set additional flag ``SSS_HAVE_HOSTCRYPTO_ANY`` to 1.
SSS_HAVE_SE05X_AUTH_NONE := ${SSS_HAVE_SE05X_AUTH_NONE}
SSS_HAVE_SE05X_AUTH_USERID := ${SSS_HAVE_SE05X_AUTH_USERID}
SSS_HAVE_SE05X_AUTH_PLATFSCP03 := ${SSS_HAVE_SE05X_AUTH_PLATFSCP03}
SSS_HAVE_SE05X_AUTH_AESKEY := ${SSS_HAVE_SE05X_AUTH_AESKEY}
SSS_HAVE_SE05X_AUTH_ECKEY := ${SSS_HAVE_SE05X_AUTH_ECKEY}
SSS_HAVE_SE05X_AUTH_USERID_PLATFSCP03 := ${SSS_HAVE_SE05X_AUTH_USERID_PLATFSCP03}
SSS_HAVE_SE05X_AUTH_AESKEY_PLATFSCP03 := ${SSS_HAVE_SE05X_AUTH_AESKEY_PLATFSCP03}
SSS_HAVE_SE05X_AUTH_ECKEY_PLATFSCP03 := ${SSS_HAVE_SE05X_AUTH_ECKEY_PLATFSCP03}
# A71CH Authentication
#
# This settings is used by SSS-API based examples to connect using either plain or authenticated to the A71CH.
SSS_HAVE_A71CH_AUTH_NONE := ${SSS_HAVE_A71CH_AUTH_NONE}
SSS_HAVE_A71CH_AUTH_SCP03 := ${SSS_HAVE_A71CH_AUTH_SCP03}
# Logging
SSS_HAVE_LOG_DEFAULT := ${SSS_HAVE_LOG_DEFAULT}
SSS_HAVE_LOG_VERBOSE := ${SSS_HAVE_LOG_VERBOSE}
SSS_HAVE_LOG_SILENT := ${SSS_HAVE_LOG_SILENT}
SSS_HAVE_LOG_SEGGERRTT := ${SSS_HAVE_LOG_SEGGERRTT}
# See https://cmake.org/cmake/help/latest/variable/CMAKE_BUILD_TYPE.html
#
# For embedded builds, this choices sets optimization levels.
# For MSVC builds, build type is selected from IDE As well
SSS_HAVE_CMAKE_BUILD_TYPE_DEBUG := ${SSS_HAVE_CMAKE_BUILD_TYPE_DEBUG}
SSS_HAVE_CMAKE_BUILD_TYPE_RELEASE := ${SSS_HAVE_CMAKE_BUILD_TYPE_RELEASE}
SSS_HAVE_CMAKE_BUILD_TYPE_RELWITHDEBINFO := ${SSS_HAVE_CMAKE_BUILD_TYPE_RELWITHDEBINFO}
SSS_HAVE_CMAKE_BUILD_TYPE_ := ${SSS_HAVE_CMAKE_BUILD_TYPE_}
# Compiling without any Applet Support
SSS_HAVE_APPLET_NONE := ${SSS_HAVE_APPLET_NONE}
# A71CH (ECC)
SSS_HAVE_APPLET_A71CH := ${SSS_HAVE_APPLET_A71CH}
# A71CL (RSA)
SSS_HAVE_APPLET_A71CL := ${SSS_HAVE_APPLET_A71CL}
# Similar to A71CH
SSS_HAVE_APPLET_A71CH_SIM := ${SSS_HAVE_APPLET_A71CH_SIM}
# SE050 Type A (ECC)
SSS_HAVE_APPLET_SE05X_A := ${SSS_HAVE_APPLET_SE05X_A}
# SE050 Type B (RSA)
SSS_HAVE_APPLET_SE05X_B := ${SSS_HAVE_APPLET_SE05X_B}
# SE050 (Super set of A + B)
SSS_HAVE_APPLET_SE05X_C := ${SSS_HAVE_APPLET_SE05X_C}
# SE050 (Similar to A71CL)
SSS_HAVE_APPLET_SE05X_L := ${SSS_HAVE_APPLET_SE05X_L}
# NXP Internal testing Applet
SSS_HAVE_APPLET_LOOPBACK := ${SSS_HAVE_APPLET_LOOPBACK}
# SE050
SSS_HAVE_SE05X_VER_03_XX := ${SSS_HAVE_SE05X_VER_03_XX}
# SE051
SSS_HAVE_SE05X_VER_06_00 := ${SSS_HAVE_SE05X_VER_06_00}
# OS X / Macintosh
SSS_HAVE_HOST_DARWIN := ${SSS_HAVE_HOST_DARWIN}
# PC/Laptop Linux with 32bit libraries
SSS_HAVE_HOST_PCLINUX32 := ${SSS_HAVE_HOST_PCLINUX32}
# PC/Laptop Linux with 64bit libraries
SSS_HAVE_HOST_PCLINUX64 := ${SSS_HAVE_HOST_PCLINUX64}
# PC/Laptop Windows
SSS_HAVE_HOST_PCWINDOWS := ${SSS_HAVE_HOST_PCWINDOWS}
# Using Cygwin
SSS_HAVE_HOST_CYGWIN := ${SSS_HAVE_HOST_CYGWIN}
# Embedded Kinetis Freedom K64F
SSS_HAVE_HOST_FRDMK64F := ${SSS_HAVE_HOST_FRDMK64F}
# Embedded Kinetis i.MX RT 1060
SSS_HAVE_HOST_EVKMIMXRT1060 := ${SSS_HAVE_HOST_EVKMIMXRT1060}
# Embedded LPCXpresso55s (No demarcation of secure/non-secure world)
SSS_HAVE_HOST_LPCXPRESSO55S := ${SSS_HAVE_HOST_LPCXPRESSO55S}
# Non Secure world of LPCXpresso55s
SSS_HAVE_HOST_LPCXPRESSO55S_NS := ${SSS_HAVE_HOST_LPCXPRESSO55S_NS}
# Secure world of LPCXpresso55s
SSS_HAVE_HOST_LPCXPRESSO55S_S := ${SSS_HAVE_HOST_LPCXPRESSO55S_S}
# Embedded Linux on i.MX
SSS_HAVE_HOST_IMXLINUX := ${SSS_HAVE_HOST_IMXLINUX}
# Embedded Linux on RaspBerry PI
SSS_HAVE_HOST_RASPBIAN := ${SSS_HAVE_HOST_RASPBIAN}
# Android
SSS_HAVE_HOST_ANDROID := ${SSS_HAVE_HOST_ANDROID}
# Windows 10 IoT Core
SSS_HAVE_HOST_WIN10IOT := ${SSS_HAVE_HOST_WIN10IOT}
# Not using any Communication layer
SSS_HAVE_SMCOM_NONE := ${SSS_HAVE_SMCOM_NONE}
# Socket Interface New Implementation
SSS_HAVE_SMCOM_JRCP_V2 := ${SSS_HAVE_SMCOM_JRCP_V2}
# Socket Interface Old Implementation.
# This is the interface used from Host PC when when we run jrcpv1_server
# from the linux PC.
SSS_HAVE_SMCOM_JRCP_V1 := ${SSS_HAVE_SMCOM_JRCP_V1}
# Virtual COM Port
SSS_HAVE_SMCOM_VCOM := ${SSS_HAVE_SMCOM_VCOM}
# Smart Card I2C for A71CH and A71CH
SSS_HAVE_SMCOM_SCI2C := ${SSS_HAVE_SMCOM_SCI2C}
# T=1 over I2C for SE050
SSS_HAVE_SMCOM_T1OI2C := ${SSS_HAVE_SMCOM_T1OI2C}
# GP Spec
SSS_HAVE_SMCOM_T1OI2C_GP1_0 := ${SSS_HAVE_SMCOM_T1OI2C_GP1_0}
# Via RC663 Over VCOM Interface from Windows PC
SSS_HAVE_SMCOM_RC663_VCOM := ${SSS_HAVE_SMCOM_RC663_VCOM}
# NFC Interface using PN7150
SSS_HAVE_SMCOM_PN7150 := ${SSS_HAVE_SMCOM_PN7150}
# Thread Mode interface
SSS_HAVE_SMCOM_THREAD := ${SSS_HAVE_SMCOM_THREAD}
# CCID PC/SC reader interface
SSS_HAVE_SMCOM_PCSC := ${SSS_HAVE_SMCOM_PCSC}
# Use mbedTLS as host crypto
SSS_HAVE_HOSTCRYPTO_MBEDTLS := ${SSS_HAVE_HOSTCRYPTO_MBEDTLS}
# Use mbed-crypto as host crypto
# Required for ARM-PSA / TF-M
SSS_HAVE_HOSTCRYPTO_MBEDCRYPTO := ${SSS_HAVE_HOSTCRYPTO_MBEDCRYPTO}
# Use OpenSSL as host crypto
SSS_HAVE_HOSTCRYPTO_OPENSSL := ${SSS_HAVE_HOSTCRYPTO_OPENSSL}
# User Implementation of Host Crypto
# e.g. Files at ``sss/src/user/crypto`` have low level AES/CMAC primitives.
# The files at ``sss/src/user`` use those primitives.
# This becomes an example for users with their own AES Implementation
# This then becomes integration without mbedTLS/OpenSSL for SCP03 / AESKey.
#
# .. note:: ECKey abstraction is not implemented/available yet.
SSS_HAVE_HOSTCRYPTO_USER := ${SSS_HAVE_HOSTCRYPTO_USER}
# NO Host Crypto
# Note, this is unsecure and only provided for experimentation
# on platforms that do not have an mbedTLS PORT
# Many :ref:`sssftr-control` have to be disabled to have a valid build.
SSS_HAVE_HOSTCRYPTO_NONE := ${SSS_HAVE_HOSTCRYPTO_NONE}
# No specific RTOS. Either bare matal on embedded system or native linux or Windows OS
SSS_HAVE_RTOS_DEFAULT := ${SSS_HAVE_RTOS_DEFAULT}
# Free RTOS for embedded systems
SSS_HAVE_RTOS_FREERTOS := ${SSS_HAVE_RTOS_FREERTOS}
# Use SSS Layer ALT implementation
SSS_HAVE_MBEDTLS_ALT_SSS := ${SSS_HAVE_MBEDTLS_ALT_SSS}
# Legacy implementation
SSS_HAVE_MBEDTLS_ALT_A71CH := ${SSS_HAVE_MBEDTLS_ALT_A71CH}
# Not using any mbedTLS_ALT
#
# When this is selected, cloud demos can not work with mbedTLS
SSS_HAVE_MBEDTLS_ALT_NONE := ${SSS_HAVE_MBEDTLS_ALT_NONE}
SSS_HAVE_SCP_NONE := ${SSS_HAVE_SCP_NONE}
# Use SSS Layer for SCP. Used for SE050 family.
SSS_HAVE_SCP_SCP03_SSS := ${SSS_HAVE_SCP_SCP03_SSS}
# Use Host Crypto Layer for SCP03. Legacy implementation. Used for older demos of A71CH Family.
SSS_HAVE_SCP_SCP03_HOSTCRYPTO := ${SSS_HAVE_SCP_SCP03_HOSTCRYPTO}
# NO FIPS
SSS_HAVE_FIPS_NONE := ${SSS_HAVE_FIPS_NONE}
# SE050 IC FIPS
SSS_HAVE_FIPS_SE050 := ${SSS_HAVE_FIPS_SE050}
# FIPS 140-2
SSS_HAVE_FIPS_140_2 := ${SSS_HAVE_FIPS_140_2}
# FIPS 140-3
SSS_HAVE_FIPS_140_3 := ${SSS_HAVE_FIPS_140_3}
# Use the default session (i.e. session less) login
SSS_HAVE_SE05X_AUTH_NONE := ${SSS_HAVE_SE05X_AUTH_NONE}
# Do User Authentication with UserID
SSS_HAVE_SE05X_AUTH_USERID := ${SSS_HAVE_SE05X_AUTH_USERID}
# Use Platform SCP for connection to SE
SSS_HAVE_SE05X_AUTH_PLATFSCP03 := ${SSS_HAVE_SE05X_AUTH_PLATFSCP03}
# Do User Authentication with AES Key
# Earlier this was called AppletSCP03
SSS_HAVE_SE05X_AUTH_AESKEY := ${SSS_HAVE_SE05X_AUTH_AESKEY}
# Do User Authentication with EC Key
# Earlier this was called FastSCP
SSS_HAVE_SE05X_AUTH_ECKEY := ${SSS_HAVE_SE05X_AUTH_ECKEY}
# UserID and PlatfSCP03
SSS_HAVE_SE05X_AUTH_USERID_PLATFSCP03 := ${SSS_HAVE_SE05X_AUTH_USERID_PLATFSCP03}
# AESKey and PlatfSCP03
SSS_HAVE_SE05X_AUTH_AESKEY_PLATFSCP03 := ${SSS_HAVE_SE05X_AUTH_AESKEY_PLATFSCP03}
# ECKey and PlatfSCP03
SSS_HAVE_SE05X_AUTH_ECKEY_PLATFSCP03 := ${SSS_HAVE_SE05X_AUTH_ECKEY_PLATFSCP03}
# Plain communication, not authenticated or encrypted
SSS_HAVE_A71CH_AUTH_NONE := ${SSS_HAVE_A71CH_AUTH_NONE}
# SCP03 enabled
SSS_HAVE_A71CH_AUTH_SCP03 := ${SSS_HAVE_A71CH_AUTH_SCP03}
# Default Logging
SSS_HAVE_LOG_DEFAULT := ${SSS_HAVE_LOG_DEFAULT}
# Very Verbose logging
SSS_HAVE_LOG_VERBOSE := ${SSS_HAVE_LOG_VERBOSE}
# Totally silent logging
SSS_HAVE_LOG_SILENT := ${SSS_HAVE_LOG_SILENT}
# Segger Real Time Transfer (For Test Automation, NXP Internal)
SSS_HAVE_LOG_SEGGERRTT := ${SSS_HAVE_LOG_SEGGERRTT}
# For developer
SSS_HAVE_CMAKE_BUILD_TYPE_DEBUG := ${SSS_HAVE_CMAKE_BUILD_TYPE_DEBUG}
# Optimization enabled and debug symbols removed
SSS_HAVE_CMAKE_BUILD_TYPE_RELEASE := ${SSS_HAVE_CMAKE_BUILD_TYPE_RELEASE}
# Optimization enabled but with debug symbols
SSS_HAVE_CMAKE_BUILD_TYPE_RELWITHDEBINFO := ${SSS_HAVE_CMAKE_BUILD_TYPE_RELWITHDEBINFO}
# Empty Allowed
# SE05X Secure Element : Symmetric AES
SSSFTR_SE05X_AES := ${SSSFTR_SE05X_AES}
# SE05X Secure Element : Elliptic Curve Cryptography
SSSFTR_SE05X_ECC := ${SSSFTR_SE05X_ECC}
# SE05X Secure Element : RSA
SSSFTR_SE05X_RSA := ${SSSFTR_SE05X_RSA}
# SE05X Secure Element : KEY operations : SET Key
SSSFTR_SE05X_KEY_SET := ${SSSFTR_SE05X_KEY_SET}
# SE05X Secure Element : KEY operations : GET Key
SSSFTR_SE05X_KEY_GET := ${SSSFTR_SE05X_KEY_GET}
# SE05X Secure Element : Authenticate via ECKey
SSSFTR_SE05X_AuthECKey := ${SSSFTR_SE05X_AuthECKey}
# SE05X Secure Element : Allow creation of user/authenticated session.
#
# If the intended deployment only uses Platform SCP
# Or it is a pure session less integration, this can
# save some code size.
SSSFTR_SE05X_AuthSession := ${SSSFTR_SE05X_AuthSession}
# SE05X Secure Element : Allow creation/deletion of Crypto Objects
#
# If disabled, new Crytpo Objects are neither created and
# old/existing Crypto Objects are not deleted.
# It is assumed that during provisioning phase, the required
# Crypto Objects are pre-created or they are never going to
# be needed.
SSSFTR_SE05X_CREATE_DELETE_CRYPTOOBJ := ${SSSFTR_SE05X_CREATE_DELETE_CRYPTOOBJ}
# Software : Symmetric AES
SSSFTR_SW_AES := ${SSSFTR_SW_AES}
# Software : Elliptic Curve Cryptography
SSSFTR_SW_ECC := ${SSSFTR_SW_ECC}
# Software : RSA
SSSFTR_SW_RSA := ${SSSFTR_SW_RSA}
# Software : KEY operations : SET Key
SSSFTR_SW_KEY_SET := ${SSSFTR_SW_KEY_SET}
# Software : KEY operations : GET Key
SSSFTR_SW_KEY_GET := ${SSSFTR_SW_KEY_GET}
# Software : Used as a test counterpart
#
# e.g. Major part of the mebdTLS SSS layer is purely used for
# testing of Secure Element implementation, and can be avoided
# fully during many production scenarios.
SSSFTR_SW_TESTCOUNTERPART := ${SSSFTR_SW_TESTCOUNTERPART}
# Deprecated items. Used here for backwards compatibility.
WithApplet_SE05X := ${SSS_HAVE_APPLET_SE05X_IOT}
WithApplet_SE050_A := ${SSS_HAVE_APPLET_SE05X_A}
WithApplet_SE050_B := ${SSS_HAVE_APPLET_SE05X_B}
WithApplet_SE050_C := ${SSS_HAVE_APPLET_SE05X_C}
SSS_HAVE_SE050_A := ${SSS_HAVE_APPLET_SE05X_A}
SSS_HAVE_SE050_B := ${SSS_HAVE_APPLET_SE05X_B}
SSS_HAVE_SE050_C := ${SSS_HAVE_APPLET_SE05X_C}
SSS_HAVE_SE05X := ${SSS_HAVE_APPLET_SE05X_IOT}
SSS_HAVE_SE := ${SSS_HAVE_APPLET}
SSS_HAVE_LOOPBACK := ${SSS_HAVE_APPLET_LOOPBACK}
SSS_HAVE_ALT := ${SSS_HAVE_MBEDTLS_ALT}
WithApplet_None := ${SSS_HAVE_APPLET_NONE}
SSS_HAVE_None := ${SSS_HAVE_APPLET_NONE}
WithApplet_A71CH := ${SSS_HAVE_APPLET_A71CH}
SSS_HAVE_A71CH := ${SSS_HAVE_APPLET_A71CH}
WithApplet_A71CL := ${SSS_HAVE_APPLET_A71CL}
SSS_HAVE_A71CL := ${SSS_HAVE_APPLET_A71CL}
WithApplet_A71CH_SIM := ${SSS_HAVE_APPLET_A71CH_SIM}
SSS_HAVE_A71CH_SIM := ${SSS_HAVE_APPLET_A71CH_SIM}
WithApplet_SE05X_A := ${SSS_HAVE_APPLET_SE05X_A}
SSS_HAVE_SE05X_A := ${SSS_HAVE_APPLET_SE05X_A}
WithApplet_SE05X_B := ${SSS_HAVE_APPLET_SE05X_B}
SSS_HAVE_SE05X_B := ${SSS_HAVE_APPLET_SE05X_B}
WithApplet_SE05X_C := ${SSS_HAVE_APPLET_SE05X_C}
SSS_HAVE_SE05X_C := ${SSS_HAVE_APPLET_SE05X_C}
WithApplet_SE05X_L := ${SSS_HAVE_APPLET_SE05X_L}
SSS_HAVE_SE05X_L := ${SSS_HAVE_APPLET_SE05X_L}
WithApplet_LoopBack := ${SSS_HAVE_APPLET_LOOPBACK}
SSS_HAVE_LoopBack := ${SSS_HAVE_APPLET_LOOPBACK}
SSS_HAVE_MBEDTLS := ${SSS_HAVE_HOSTCRYPTO_MBEDTLS}
SSS_HAVE_MBEDCRYPTO := ${SSS_HAVE_HOSTCRYPTO_MBEDCRYPTO}
SSS_HAVE_OPENSSL := ${SSS_HAVE_HOSTCRYPTO_OPENSSL}
SSS_HAVE_USER := ${SSS_HAVE_HOSTCRYPTO_USER}
SSS_HAVE_NONE := ${SSS_HAVE_HOSTCRYPTO_NONE}
SSS_HAVE_ALT_SSS := ${SSS_HAVE_MBEDTLS_ALT_SSS}
SSS_HAVE_ALT_A71CH := ${SSS_HAVE_MBEDTLS_ALT_A71CH}
SSS_HAVE_ALT_NONE := ${SSS_HAVE_MBEDTLS_ALT_NONE}
SSS_HAVE_SE05X_Auth_None := ${SSS_HAVE_SE05X_AUTH_NONE}
SSS_HAVE_SE05X_Auth_UserID := ${SSS_HAVE_SE05X_AUTH_USERID}
SSS_HAVE_SE05X_Auth_PlatfSCP03 := ${SSS_HAVE_SE05X_AUTH_PLATFSCP03}
SSS_HAVE_SE05X_Auth_AESKey := ${SSS_HAVE_SE05X_AUTH_AESKEY}
SSS_HAVE_SE05X_Auth_ECKey := ${SSS_HAVE_SE05X_AUTH_ECKEY}
SSS_HAVE_SE05X_Auth_UserID_PlatfSCP03 := ${SSS_HAVE_SE05X_AUTH_USERID_PLATFSCP03}
SSS_HAVE_SE05X_Auth_AESKey_PlatfSCP03 := ${SSS_HAVE_SE05X_AUTH_AESKEY_PLATFSCP03}
SSS_HAVE_SE05X_Auth_ECKey_PlatfSCP03 := ${SSS_HAVE_SE05X_AUTH_ECKEY_PLATFSCP03}