mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-04-22 12:34:19 +00:00

The value assigned for the mbedtls heap size for large rsa keys was too small when PSA_CRYPTO is set to 1, leading to run-time failures if one was to attempt to use a large RSA key with PSA_CRYPTO=1. Change-Id: Id9b2648ae911879f483f1b88301f28694af0721d Signed-off-by: Ryan Everett <ryan.everett@arm.com>
37 lines
1.1 KiB
C
37 lines
1.1 KiB
C
/*
|
|
* Copyright (c) 2023-2024, Arm Ltd. All rights reserved.
|
|
*
|
|
* SPDX-License-Identifier: BSD-3-Clause
|
|
*/
|
|
|
|
#ifndef PSA_MBEDTLS_CONFIG_H
|
|
#define PSA_MBEDTLS_CONFIG_H
|
|
|
|
#include "default_mbedtls_config.h"
|
|
|
|
#define MBEDTLS_PSA_CRYPTO_C
|
|
#define MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS
|
|
|
|
/*
|
|
* Using PSA crypto API requires an RNG right now. If we don't define the macro
|
|
* below then we get build errors.
|
|
*
|
|
* This is a functionality gap in mbedTLS. The technical limitation is that
|
|
* psa_crypto_init() is all-or-nothing, and fixing that would require separate
|
|
* initialization of the keystore, the RNG, etc.
|
|
*
|
|
* By defining MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG, we pretend using an external
|
|
* RNG. As a result, the PSA crypto init code does nothing when it comes to
|
|
* initializing the RNG, as we are supposed to take care of that ourselves.
|
|
*/
|
|
#define MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG
|
|
|
|
/*
|
|
* Override heap size for PSA Crypto when RSA key size > 2048.
|
|
*/
|
|
#if TF_MBEDTLS_USE_RSA && TF_MBEDTLS_KEY_SIZE > 2048
|
|
#undef TF_MBEDTLS_HEAP_SIZE
|
|
#define TF_MBEDTLS_HEAP_SIZE U(12 * 1024)
|
|
#endif
|
|
|
|
#endif /* PSA_MBEDTLS_CONFIG_H */
|