Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

TinyCrypt deprecation - library's usage removal part 2 (bluetooth) #79931

Open
wants to merge 20 commits into
base: main
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
20 commits
Select commit Hold shift + click to select a range
afd422d
temporary: squash of PR 80136
valeriosetti Nov 5, 2024
3ad6be3
temporary: squash of PR 80368
valeriosetti Nov 5, 2024
4ab21b2
test: bluetooth: bsim: mesh: test_access: Increase timeout between proc
PavelVPV Oct 30, 2024
02b0bb0
bt: crypto/host: remove CONFIG_BT_USE_PSA_API symbol
valeriosetti Oct 18, 2024
23662a5
bt: use PSA for HCI ECC and rename BT_TINYCRYPT_ECC
valeriosetti Oct 18, 2024
b0c61a2
bt-mesh: remove BT_MESH_USES_TINYCRYPT
valeriosetti Oct 18, 2024
3355dd2
bt: change dependencies for BT_RPA
valeriosetti Oct 18, 2024
e5cf4b7
samples: bt: some RAM footprint reductions
valeriosetti Oct 21, 2024
8e6c022
tests: bluetooth: replace TinyCrypt with PSA in unit tests
valeriosetti Oct 29, 2024
e9b0bc3
bt: audio: comment AC failing test cases
valeriosetti Nov 5, 2024
8b16d1b
tests: bt: add Mbed TLS headers to the build
valeriosetti Nov 6, 2024
61b8f9e
tests: bt: increase PSA key slots count when necessary
valeriosetti Nov 6, 2024
5681a3a
tests: bt: enable entropy sources where missing
valeriosetti Nov 6, 2024
84fc539
boards: qemu_cortex_m3: enable test random generator for BT
valeriosetti Nov 12, 2024
c348a13
tests: Bluetooth: Audio: Increase RX buf count for bsim
Thalley Nov 8, 2024
2ce965d
drivers: entropy: ease runtime requirements on BT HCI
valeriosetti Nov 11, 2024
ece1483
samles: bt: cherry-pick a fix from PR 80788
valeriosetti Nov 12, 2024
4563732
boards: native_sim: enable ENTROPY_GENERATOR if BT
valeriosetti Nov 13, 2024
15b1b85
tests: bt_crypto: fix kconfig for qemu_cortex_m3
valeriosetti Nov 14, 2024
d1a2b82
samples: bt: reduce system heap memory for the hci_ipc sample
valeriosetti Nov 14, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
9 changes: 9 additions & 0 deletions boards/native/native_sim/Kconfig.defconfig
Original file line number Diff line number Diff line change
Expand Up @@ -32,5 +32,14 @@ config UART_CONSOLE

endif # CONSOLE

# BT relies on PSA Crypto API to perform crypto operations. On this platform
# this is implemented by Mbed TLS which requires a (possibly true) random
# number generator to initialize properly. We enable ENTROPY_GENERATOR here
# instead of manually adding it to all samples/tests configuration files because
# it looks more compact and easier to maintain.
config ENTROPY_GENERATOR
bool
default y if BT


endif # BOARD_NATIVE_SIM
9 changes: 9 additions & 0 deletions boards/qemu/cortex_m3/Kconfig.defconfig
Original file line number Diff line number Diff line change
Expand Up @@ -12,4 +12,13 @@ choice NULL_POINTER_EXCEPTION_DETECTION
default NULL_POINTER_EXCEPTION_DETECTION_NONE
endchoice

# BT relies on PSA Crypto API to perform crypto operations and, on this platform,
# these APIs are provided thougth Mbed TLS. Unfortunately this platform is not
# provided with a true random number generator which is required to properly
# initialize the PSA Crypto core, so we need to enable the fake TEST_RANDOM_GENERATOR.
config TEST_RANDOM_GENERATOR
bool
depends on BT
default y

endif # BOARD_QEMU_CORTEX_M3
15 changes: 15 additions & 0 deletions doc/releases/migration-guide-4.0.rst
Original file line number Diff line number Diff line change
Expand Up @@ -75,6 +75,12 @@ Mbed TLS
corresponding build symbol was removed in Mbed TLS 3.1.0 and is now assumed to
be enabled. (:github:`77657`)

* If a platform has a CSPRNG source available (i.e. :kconfig:option:`CONFIG_CSPRNG_ENABLED`
is set), then the Kconfig option :kconfig:option:`CONFIG_MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG`
is the default choice for random number source instead of
:kconfig:option:`CONFIG_MBEDTLS_PSA_CRYPTO_LEGACY_RNG`. This helps in reducing
ROM/RAM footprint of the Mbed TLS library.

TinyCrypt
=========

Expand Down Expand Up @@ -227,6 +233,15 @@ Disk
Enhanced Serial Peripheral Interface (eSPI)
===========================================

Entropy
=======

* BT HCI based entropy driver now directly sends the HCI command to parse random
data instead of waiting for BT connection to be ready. This is helpful on
platforms where the BT controller owns the HW random generator and the application
processor needs to get random data before BT is fully enabled.
(:github:`79931`)

GNSS
====

Expand Down
12 changes: 12 additions & 0 deletions doc/releases/release-notes-4.0.rst
Original file line number Diff line number Diff line change
Expand Up @@ -572,6 +572,18 @@ Libraries / Subsystems
* :kconfig:option:`CONFIG_MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL_ENABLED`
for TLS 1.3 PSK ephemeral key exchange mode.

* The Kconfig symbol :kconfig:option:`CONFIG_MBEDTLS_PSA_STATIC_KEY_SLOTS` was
added to allow Mbed TLS to use pre-allocated static buffers to store key material
in its PSA Crypto core instead of heap allocated ones. This can help reducing
(or removing, if no other components makes use of it) heap memory requirements
from the final application.

* The Kconfig symbol :kconfig:option:`CONFIG_MBEDTLS_PSA_KEY_SLOT_COUNT` was
added to allow selecting the number of key slots available in the Mbed TLS's
implementation of the PSA Crypto core. The default value is 32, the same used in
Mbed TLS by default. Since each slot consumes RAM memory even if unused, this
value can be tweaked in order to minimize RAM usage.

* CMSIS-NN

* FPGA
Expand Down
1 change: 0 additions & 1 deletion drivers/bluetooth/hci/Kconfig
Original file line number Diff line number Diff line change
Expand Up @@ -112,7 +112,6 @@ config BT_SILABS_EFR32
select MBEDTLS
select MBEDTLS_PSA_CRYPTO_C
select MBEDTLS_ENTROPY_C
select MBEDTLS_ENTROPY_POLL_ZEPHYR
help
Use Silicon Labs binary Bluetooth library to connect to the
controller.
Expand Down
15 changes: 12 additions & 3 deletions drivers/entropy/entropy_bt_hci.c
Original file line number Diff line number Diff line change
Expand Up @@ -20,9 +20,18 @@ static int entropy_bt_init(const struct device *dev)
static int entropy_bt_get_entropy(const struct device *dev,
uint8_t *buffer, uint16_t length)
{
if (!bt_is_ready()) {
return -EAGAIN;
}
/* Do not wait for BT to be ready (i.e. bt_is_ready()) before issueing
* the command. The reason is that when crypto is enabled and the PSA
* Crypto API support is provided through Mbed TLS, random number generator
* needs to be available since the very first call to psa_crypto_init()
* which is usually done before BT is completely initialized.
* On the other hand, in devices like the nrf5340, the crytographically
* secure RNG is owned by the cpu_net, so the cpu_app needs to poll it
* to get random data. Again, there is no need to wait for BT to be
* completely initialized for this kind of support. Just try to send the
* request through HCI. If the command fails for any reason, then
* we return failure anyway.
*/
Comment on lines +23 to +34
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

As the return value could be different, we need API documentation change?

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Right! I didn't thought about this because I was using this through the random_entropy_device.c (which always returns -EIO in case of failures), but there might be users directly calling this driver, so a documentation update would be really nice indeed. Thanks

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I added the documentation to the migration-guide-4.0 document. I know it's not the right place because this won't be part of 4.0, but in the current status of the PR there's no 4.1 version of that document yet and rebasing the PR is a bit too much IMO just for this change. I will move the documentation to the proper document once
I can finalize the PR (i.e. solving all the issues with the CI).


return bt_hci_le_rand(buffer, length);
}
Expand Down
1 change: 0 additions & 1 deletion drivers/wifi/esp32/Kconfig.esp32
Original file line number Diff line number Diff line change
Expand Up @@ -377,7 +377,6 @@ config ESP32_WIFI_MBEDTLS_CRYPTO
select MBEDTLS_CIPHER_MODE_CTR_ENABLED
select MBEDTLS_CMAC
select MBEDTLS_ENTROPY_C
select MBEDTLS_ENTROPY_POLL_ZEPHYR
help
Select this option to use MbedTLS crypto APIs which utilize hardware acceleration.

Expand Down
8 changes: 0 additions & 8 deletions include/zephyr/bluetooth/mesh/keys.h
Original file line number Diff line number Diff line change
Expand Up @@ -28,14 +28,6 @@ struct bt_mesh_key {
psa_key_id_t key;
};

#elif defined CONFIG_BT_MESH_USES_TINYCRYPT

/** The structure that keeps representation of key. */
struct bt_mesh_key {
/** tinycrypt key representation is the pure key value. */
uint8_t key[16];
};

#else
#error "Crypto library has not been chosen"
#endif
Expand Down
38 changes: 37 additions & 1 deletion modules/mbedtls/Kconfig.tls-generic
Original file line number Diff line number Diff line change
Expand Up @@ -246,6 +246,7 @@ config MBEDTLS_SOME_CIPHER_ENABLED

config MBEDTLS_CIPHER_AES_ENABLED
bool "AES block cipher"
default y if PSA_WANT_KEY_TYPE_AES && MBEDTLS_PSA_CRYPTO_C

if MBEDTLS_CIPHER_AES_ENABLED

Expand Down Expand Up @@ -397,6 +398,7 @@ config MBEDTLS_ENTROPY_C

config MBEDTLS_ENTROPY_POLL_ZEPHYR
bool "Provide entropy data to Mbed TLS through entropy driver or random generator"
default y
depends on MBEDTLS_ENTROPY_C
help
Provide entropy data to the Mbed TLS's entropy module through either
Expand Down Expand Up @@ -480,6 +482,7 @@ config MBEDTLS_SSL_EXTENDED_MASTER_SECRET
choice MBEDTLS_PSA_CRYPTO_RNG_SOURCE
prompt "Select random source for built-in PSA crypto"
depends on MBEDTLS_PSA_CRYPTO_C
default MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG if CSPRNG_ENABLED
default MBEDTLS_PSA_CRYPTO_LEGACY_RNG

config MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG
Expand Down Expand Up @@ -551,9 +554,10 @@ config MBEDTLS_LMS
depends on MBEDTLS_SHA256
select PSA_WANT_ALG_SHA_256

if MBEDTLS_PSA_CRYPTO_C

config MBEDTLS_PSA_P256M_DRIVER_ENABLED
bool "P256-M driver"
depends on MBEDTLS_PSA_CRYPTO_C
imply PSA_WANT_ALG_SHA_256
help
Enable support for the optimized sofware implementation of the secp256r1
Expand All @@ -567,6 +571,38 @@ config MBEDTLS_PSA_P256M_DRIVER_RAW
Warning: Usage of this Kconfig option is prohibited in Zephyr's codebase.
Users can enable it in case of very memory-constrained devices, but be aware that the p256-m interface is absolutely not guaranted to remain stable over time.

config MBEDTLS_PSA_STATIC_KEY_SLOTS
bool "Use statically allocated key buffers to store key material"
default y if !MBEDTLS_ENABLE_HEAP
help
By default Mbed TLS's PSA Crypto core uses heap memory to store the
key's material for each key slot. This might impose an undesired
requirement to support heap memory and its management code affecting
RAM and ROM footprints at the same time.
Enabling this symbol cause Mbed TLS to pre-allocate all the key slot
buffers that are used to store the key's material at built time, thus
removing the need for heap memory. Each buffer will be sized to
contain the largest asymmetric/symmetric key type enabled in the build
through PSA_WANT symbols.

config MBEDTLS_PSA_KEY_SLOT_COUNT
int "Number of key slots in PSA Crypto core"
default 16
depends on MBEDTLS_PSA_CRYPTO_C
help
Set the number of key slots that are available in the PSA Crypto core.
Be aware that each slots, even if unused, increases RAM memory
consumption as follows:
* if MBEDTLS_PSA_STATIC_KEY_SLOTS is set: ~40 bytes of overhead for each
slot + the length of the largest asymmetric/symmetric key type
enabled in the build through PSA_WANT symbols. All defined statically
at build time.
* if MBEDTLS_PSA_STATIC_KEY_SLOTS is not set: ~40 bytes of overhead
for each slot defined statically at build time + key material allocated
on heap memory at runtime.

endif # MBEDTLS_PSA_CRYPTO_C

config MBEDTLS_SSL_DTLS_CONNECTION_ID
bool "DTLS Connection ID extension"
depends on MBEDTLS_DTLS
Expand Down
9 changes: 8 additions & 1 deletion modules/mbedtls/configs/config-tls-generic.h
Original file line number Diff line number Diff line change
Expand Up @@ -483,7 +483,6 @@
#endif

#if defined(CONFIG_ARCH_POSIX) && !defined(CONFIG_PICOLIBC)
#define MBEDTLS_PSA_KEY_SLOT_COUNT 64 /* for BLE Mesh tests */
#define MBEDTLS_PSA_ITS_FILE_C
#define MBEDTLS_FS_IO
#endif
Expand All @@ -494,6 +493,14 @@

#endif /* CONFIG_MBEDTLS_PSA_CRYPTO_C */

#if defined(CONFIG_MBEDTLS_PSA_STATIC_KEY_SLOTS)
#define MBEDTLS_PSA_STATIC_KEY_SLOTS
#endif

#if defined(CONFIG_MBEDTLS_PSA_KEY_SLOT_COUNT)
#define MBEDTLS_PSA_KEY_SLOT_COUNT CONFIG_MBEDTLS_PSA_KEY_SLOT_COUNT
#endif

#if defined(CONFIG_MBEDTLS_USE_PSA_CRYPTO)
#define MBEDTLS_USE_PSA_CRYPTO
#endif
Expand Down
2 changes: 1 addition & 1 deletion samples/bluetooth/bap_broadcast_assistant/prj.conf
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ CONFIG_BT_BUF_ACL_RX_SIZE=255
CONFIG_BT_BUF_ACL_TX_SIZE=251
CONFIG_BT_CTLR_SCAN_DATA_LEN_MAX=191

CONFIG_BT_TINYCRYPT_ECC=y
CONFIG_BT_SEND_ECC_EMULATION=y

CONFIG_BT_EXT_ADV=y
CONFIG_BT_BAP_BASS_MAX_SUBGROUPS=2
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
CONFIG_ENTROPY_GENERATOR=y
Original file line number Diff line number Diff line change
@@ -1,3 +1,4 @@
# Use USB Audio as audio sink
CONFIG_USE_USB_AUDIO_OUTPUT=y
CONFIG_USB_DEVICE_PRODUCT="USB Broadcast Sink"
CONFIG_ENTROPY_GENERATOR=y
2 changes: 1 addition & 1 deletion samples/bluetooth/bap_broadcast_sink/prj.conf
Original file line number Diff line number Diff line change
Expand Up @@ -23,4 +23,4 @@ CONFIG_BT_AUDIO_CODEC_CAP_MAX_DATA_SIZE=64

CONFIG_BT_DEVICE_NAME="Broadcast Audio Sink"

CONFIG_BT_TINYCRYPT_ECC=y
CONFIG_BT_SEND_ECC_EMULATION=y
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
CONFIG_ENTROPY_GENERATOR=y
Original file line number Diff line number Diff line change
@@ -1,3 +1,4 @@
# Use USB Audio as audio source
CONFIG_USE_USB_AUDIO_INPUT=y
CONFIG_USB_DEVICE_PRODUCT="Zephyr Broadcast Source"
CONFIG_ENTROPY_GENERATOR=y
4 changes: 3 additions & 1 deletion samples/bluetooth/bap_unicast_client/boards/native_sim.conf
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
CONFIG_LOG_MODE_IMMEDIATE=y
CONFIG_BT_TINYCRYPT_ECC=y
CONFIG_BT_SEND_ECC_EMULATION=y

CONFIG_LIBLC3=y
CONFIG_FPU=y
Expand All @@ -8,3 +8,5 @@ CONFIG_FPU=y
# than every 10 ms as each PDU for some reason takes 2 ticks to process.
CONFIG_SYS_CLOCK_TICKS_PER_SEC=1000
CONFIG_NATIVE_POSIX_SLOWDOWN_TO_REAL_TIME=y

CONFIG_ENTROPY_GENERATOR=y
Original file line number Diff line number Diff line change
Expand Up @@ -10,4 +10,6 @@ CONFIG_BT_BUF_ACL_RX_SIZE=255
CONFIG_BT_BUF_ACL_TX_SIZE=251
CONFIG_BT_BUF_CMD_TX_SIZE=255

CONFIG_BT_TINYCRYPT_ECC=y
CONFIG_BT_SEND_ECC_EMULATION=y

CONFIG_ENTROPY_GENERATOR=y
Original file line number Diff line number Diff line change
Expand Up @@ -7,4 +7,4 @@ CONFIG_BT_BUF_ACL_RX_SIZE=255
CONFIG_BT_BUF_ACL_TX_SIZE=251
CONFIG_BT_BUF_CMD_TX_SIZE=255

CONFIG_BT_TINYCRYPT_ECC=y
CONFIG_BT_SEND_ECC_EMULATION=y
Original file line number Diff line number Diff line change
Expand Up @@ -10,4 +10,6 @@ CONFIG_BT_BUF_ACL_RX_SIZE=255
CONFIG_BT_BUF_ACL_TX_SIZE=251
CONFIG_BT_BUF_CMD_TX_SIZE=255

CONFIG_BT_TINYCRYPT_ECC=y
CONFIG_BT_SEND_ECC_EMULATION=y

CONFIG_ENTROPY_GENERATOR=y
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
CONFIG_LOG_MODE_IMMEDIATE=y
CONFIG_BT_TINYCRYPT_ECC=y
CONFIG_BT_SEND_ECC_EMULATION=y

CONFIG_LIBLC3=y
CONFIG_FPU=y
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,4 +7,4 @@ CONFIG_BT_BUF_ACL_RX_SIZE=255
CONFIG_BT_BUF_ACL_TX_SIZE=251
CONFIG_BT_BUF_CMD_TX_SIZE=255

CONFIG_BT_TINYCRYPT_ECC=y
CONFIG_BT_SEND_ECC_EMULATION=y
Original file line number Diff line number Diff line change
Expand Up @@ -7,4 +7,6 @@ CONFIG_BT_BUF_ACL_RX_SIZE=255
CONFIG_BT_BUF_ACL_TX_SIZE=251
CONFIG_BT_BUF_CMD_TX_SIZE=255

CONFIG_BT_TINYCRYPT_ECC=y
CONFIG_BT_SEND_ECC_EMULATION=y

CONFIG_ENTROPY_GENERATOR=y
Original file line number Diff line number Diff line change
Expand Up @@ -10,4 +10,6 @@ CONFIG_BT_BUF_ACL_RX_SIZE=255
CONFIG_BT_BUF_ACL_TX_SIZE=251
CONFIG_BT_BUF_CMD_TX_SIZE=255

CONFIG_BT_TINYCRYPT_ECC=y
CONFIG_BT_SEND_ECC_EMULATION=y

CONFIG_ENTROPY_GENERATOR=y
13 changes: 13 additions & 0 deletions samples/bluetooth/beacon/boards/nrf54l15dk_nrf54l15_cpuapp.conf
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
# We need a random number generator to properly initialize the PSA Crypto core
# implemented by Mbed TLS. The proper thing to do in this platform would be
# to enable ENTROPY_GENERATOR, but this is not supported right now for the
# following reasons:
# - at device-tree level (nrf54l15_cpuapp.dtsi) the only RNG source available
# is "zephyr,psa-crypto-rng" which means that TF-M is required in order for
# this to work. Unfortunately TF-M is still not supported for this platform, yet.
# - cpuapp does not have a direct access to the RNG without TF-M, so there's
# no other way it can make use of it as of now.
#
# Since both options are not viable, we fall back to the test random generator
# until further support is added to the platform.
CONFIG_TEST_RANDOM_GENERATOR=y
Original file line number Diff line number Diff line change
Expand Up @@ -3,4 +3,5 @@ CONFIG_BT_BUF_ACL_RX_SIZE=255
CONFIG_BT_BUF_ACL_TX_SIZE=251
CONFIG_BT_BUF_CMD_TX_SIZE=255

CONFIG_BT_TINYCRYPT_ECC=y
CONFIG_BT_SEND_ECC_EMULATION=y
CONFIG_ENTROPY_GENERATOR=y
Original file line number Diff line number Diff line change
Expand Up @@ -3,4 +3,5 @@ CONFIG_BT_BUF_ACL_RX_SIZE=255
CONFIG_BT_BUF_ACL_TX_SIZE=251
CONFIG_BT_BUF_CMD_TX_SIZE=255

CONFIG_BT_TINYCRYPT_ECC=y
CONFIG_BT_SEND_ECC_EMULATION=y
CONFIG_ENTROPY_GENERATOR=y
Original file line number Diff line number Diff line change
Expand Up @@ -3,4 +3,5 @@ CONFIG_BT_BUF_ACL_RX_SIZE=255
CONFIG_BT_BUF_ACL_TX_SIZE=251
CONFIG_BT_BUF_CMD_TX_SIZE=255

CONFIG_BT_TINYCRYPT_ECC=y
CONFIG_BT_SEND_ECC_EMULATION=y
CONFIG_ENTROPY_GENERATOR=y
Original file line number Diff line number Diff line change
Expand Up @@ -3,4 +3,5 @@ CONFIG_BT_BUF_ACL_RX_SIZE=255
CONFIG_BT_BUF_ACL_TX_SIZE=251
CONFIG_BT_BUF_CMD_TX_SIZE=255

CONFIG_BT_TINYCRYPT_ECC=y
CONFIG_BT_SEND_ECC_EMULATION=y
CONFIG_ENTROPY_GENERATOR=y
Original file line number Diff line number Diff line change
@@ -1,3 +1,4 @@
# Set same the ACL RX buffer size as in hci_ipc on netcore so that
# HCI Controller to Host Flowcontrol is supported.
CONFIG_BT_BUF_ACL_RX_SIZE=255
CONFIG_ENTROPY_GENERATOR=y
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
CONFIG_ENTROPY_GENERATOR=y
11 changes: 11 additions & 0 deletions samples/bluetooth/central_hr/prj_minimal.conf
Original file line number Diff line number Diff line change
Expand Up @@ -101,3 +101,14 @@ CONFIG_BT_L2CAP_TX_BUF_COUNT=2
CONFIG_BT_CTLR_RX_BUFFERS=1
CONFIG_BT_BUF_ACL_TX_COUNT=3
CONFIG_BT_BUF_ACL_TX_SIZE=27

# Limit the number of key slots in PSA Crypto core to reduce
# RAM footprint
CONFIG_MBEDTLS_PSA_KEY_SLOT_COUNT=5

# This is required because otherwise there won't be
# __heap_start/__heap_end symbols defined in the build. This
# is due to Mbed TLS which at boot uses standard calloc/free
# functions and only after the initialization done from Zephyr
# it switches to its internal memory management functions.
CONFIG_COMMON_LIBC_MALLOC=y
PavelVPV marked this conversation as resolved.
Show resolved Hide resolved
1 change: 1 addition & 0 deletions samples/bluetooth/central_ht/boards/frdm_rw612.conf
Original file line number Diff line number Diff line change
@@ -1 +1,2 @@
CONFIG_PM=y
CONFIG_ENTROPY_GENERATOR=y
1 change: 1 addition & 0 deletions samples/bluetooth/central_ht/boards/rd_rw612_bga.conf
Original file line number Diff line number Diff line change
@@ -1 +1,2 @@
CONFIG_PM=y
CONFIG_ENTROPY_GENERATOR=y
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
CONFIG_ENTROPY_GENERATOR=y
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
CONFIG_ENTROPY_GENERATOR=y
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
CONFIG_ENTROPY_GENERATOR=y
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
CONFIG_ENTROPY_GENERATOR=y
Loading
Loading