blob: a792f400bd26606d9ae45333c22d71dad1df78bd [file] [log] [blame]
/*
*
* Copyright (c) 2023 Project CHIP Authors
* All rights reserved.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#ifndef TFM_PROJECT_CONFIG_H
#define TFM_PROJECT_CONFIG_H
/* Platform Partition Configs */
/* Size of input buffer in platform service */
#define PLATFORM_SERVICE_INPUT_BUFFER_SIZE 64
/* Size of output buffer in platform service */
#define PLATFORM_SERVICE_OUTPUT_BUFFER_SIZE 64
/* The stack size of the Platform Secure Partition */
#define PLATFORM_SP_STACK_SIZE 0x500
/* Disable Non-volatile counter module */
#define PLATFORM_NV_COUNTER_MODULE_DISABLED 0
/* Crypto Partition Configs */
/*
* Heap size for the crypto backend
* CRYPTO_ENGINE_BUF_SIZE needs to be >8KB for EC signing by attest module.
*/
#define CRYPTO_ENGINE_BUF_SIZE 0x2080
/* The max number of concurrent operations that can be active (allocated) at any time in Crypto */
#define CRYPTO_CONC_OPER_NUM 8
/* Enable PSA Crypto random number generator module */
#define CRYPTO_RNG_MODULE_ENABLED 1
/* Enable PSA Crypto Key module */
#define CRYPTO_KEY_MODULE_ENABLED 1
/* Enable PSA Crypto AEAD module */
#define CRYPTO_AEAD_MODULE_ENABLED 1
/* Enable PSA Crypto MAC module */
#define CRYPTO_MAC_MODULE_ENABLED 1
/* Enable PSA Crypto Hash module */
#define CRYPTO_HASH_MODULE_ENABLED 1
/* Enable PSA Crypto Cipher module */
#define CRYPTO_CIPHER_MODULE_ENABLED 1
/* Enable PSA Crypto asymmetric key signature module */
#define CRYPTO_ASYM_SIGN_MODULE_ENABLED 1
/* Enable PSA Crypto asymmetric key encryption module */
#define CRYPTO_ASYM_ENCRYPT_MODULE_ENABLED 0
/* Enable PSA Crypto key derivation module */
#define CRYPTO_KEY_DERIVATION_MODULE_ENABLED 1
/* Default size of the internal scratch buffer used for PSA FF IOVec allocations */
#define CRYPTO_IOVEC_BUFFER_SIZE 5120
/* Use stored NV seed to provide entropy */
#define CRYPTO_NV_SEED 1
/*
* Only enable multi-part operations in Hash, MAC, AEAD and symmetric ciphers,
* to optimize memory footprint in resource-constrained devices.
*/
#define CRYPTO_SINGLE_PART_FUNCS_DISABLED 0
/* The stack size of the Crypto Secure Partition */
#define CRYPTO_STACK_SIZE 0x1B00
/* FWU Partition Configs */
/* Size of the FWU internal data transfer buffer */
#define TFM_FWU_BUF_SIZE PSA_FWU_MAX_WRITE_SIZE
/* The stack size of the Firmware Update Secure Partition */
#define FWU_STACK_SIZE 0x600
/* Attest Partition Configs */
/* Include optional claims in initial attestation token */
#define ATTEST_INCLUDE_OPTIONAL_CLAIMS 1
/* Include COSE key-id in initial attestation token */
#define ATTEST_INCLUDE_COSE_KEY_ID 0
/* The stack size of the Initial Attestation Secure Partition */
#define ATTEST_STACK_SIZE 0x700
/* Set the initial attestation token profile */
#define ATTEST_TOKEN_PROFILE_PSA_IOT_1 1
/* ITS Partition Configs */
/* Create flash FS if it doesn't exist for Internal Trusted Storage partition */
#define ITS_CREATE_FLASH_LAYOUT 1
/* Enable emulated RAM FS for platforms that don't have flash for Internal Trusted Storage partition */
#define ITS_RAM_FS 0
/* Validate filesystem metadata every time it is read from flash */
#define ITS_VALIDATE_METADATA_FROM_FLASH 1
/* The maximum asset size to be stored in the Internal Trusted Storage */
#define ITS_MAX_ASSET_SIZE 512
/* Size of the ITS internal data transfer buffer */
#define ITS_BUF_SIZE 32
/* The maximum number of assets to be stored in the Internal Trusted Storage */
#define ITS_NUM_ASSETS 10
/* The stack size of the Internal Trusted Storage Secure Partition */
#define ITS_STACK_SIZE 0x720
/* PS Partition Configs */
/* Create flash FS if it doesn't exist for Protected Storage partition */
#define PS_CREATE_FLASH_LAYOUT 1
/* Enable emulated RAM FS for platforms that don't have flash for Protected Storage partition */
#define PS_RAM_FS 0
/* Enable rollback protection for Protected Storage partition */
#define PS_ROLLBACK_PROTECTION 1
/* Validate filesystem metadata every time it is read from flash */
#define PS_VALIDATE_METADATA_FROM_FLASH 1
/* The maximum asset size to be stored in the Protected Storage */
#define PS_MAX_ASSET_SIZE 2048
/* The maximum number of assets to be stored in the Protected Storage */
#define PS_NUM_ASSETS 30
/* The stack size of the Protected Storage Secure Partition */
#define PS_STACK_SIZE 0x700
/* SPM Partition Configs */
/* The maximal number of secure services that are connected or requested at the same time */
#define CONFIG_TFM_CONN_HANDLE_MAX_NUM 8
/* Enable the doorbell APIs */
#define CONFIG_TFM_DOORBELL_API 1
#endif /* TFM_PROJECT_CONFIG_H */