Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bluetooth: Controller: Deprecate tinycrypt part2 (testing) #81221

Draft
wants to merge 28 commits into
base: main
Choose a base branch
from
Draft
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
28 commits
Select commit Hold shift + click to select a range
784eaf4
Bluetooth: Controller: Fix to reschedule before overlap when yielding
cvinayak Jul 14, 2024
0aa02e3
Bluetooth: Controller: Introduce ticker reschedule with drift
cvinayak Jul 11, 2024
120c64d
Bluetooth: Controller: Ext Adv Auxiliary PDUs with ticks_slot_window
cvinayak Jul 11, 2024
6810dd2
Bluetooth: Controller: Fix ISO Sync Receiver skipped ISO SDU
cvinayak Nov 3, 2024
716532c
Bluetooth: Controller: Fix ISO Sync Receiver time reservations
cvinayak Nov 3, 2024
b166e67
Bluetooth: Controller: Fix ISO Sync Receiver is_abort_cb
cvinayak Nov 3, 2024
ef729a7
tests: Bluetooth: Audio: Remove uses of K_FOREVER in syswg for TX
Thalley Oct 31, 2024
226dc43
tests: Bluetooth: CAP: Remove dup adv in acceptor bsim test
Thalley Nov 4, 2024
e09fd77
tests: Bluetooth: CAP: Acceptor bsim test use ext_adv
Thalley Nov 4, 2024
c1b8b7a
tests: bsim: Bluetooth: Align audio test Controller Kconfig
cvinayak Nov 2, 2024
5522ef0
tests: bsim: Bluetooth: Enable some high reliability CAP tests
cvinayak Nov 3, 2024
c3b36f6
temporary: squash of PR 80136
valeriosetti Nov 5, 2024
6905b8e
temporary: squash of PR 80368
valeriosetti Nov 5, 2024
3da61a3
test: bluetooth: bsim: mesh: test_access: Increase timeout between proc
PavelVPV Oct 30, 2024
d20b7f7
bt: crypto/host: remove CONFIG_BT_USE_PSA_API symbol
valeriosetti Oct 18, 2024
33cefd2
bt: use PSA for HCI ECC and rename BT_TINYCRYPT_ECC
valeriosetti Oct 18, 2024
53efa29
bt-mesh: remove BT_MESH_USES_TINYCRYPT
valeriosetti Oct 18, 2024
895dbe6
bt: change dependencies for BT_RPA
valeriosetti Oct 18, 2024
d13ea6d
samples: bt: some RAM footprint reductions
valeriosetti Oct 21, 2024
bc2b2e3
tests: bluetooth: replace TinyCrypt with PSA in unit tests
valeriosetti Oct 29, 2024
ca1628b
tests: bt: add Mbed TLS headers to the build
valeriosetti Nov 6, 2024
a4cd870
tests: bt: increase PSA key slots count when necessary
valeriosetti Nov 6, 2024
69395c1
tests: bt: enable entropy sources where missing
valeriosetti Nov 6, 2024
183420a
boards: qemu_cortex_m3: enable test random generator for BT
valeriosetti Nov 12, 2024
fe3d4da
tests: Bluetooth: Audio: Increase RX buf count for bsim
Thalley Nov 8, 2024
29e9d7f
drivers: entropy: ease runtime requirements on BT HCI
valeriosetti Nov 11, 2024
8cd09ae
boards: native_sim: enable ENTROPY_GENERATOR if BT
valeriosetti Nov 13, 2024
8f79404
tests: bt_crypto: fix kconfig for qemu_cortex_m3
valeriosetti Nov 14, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
9 changes: 9 additions & 0 deletions boards/native/native_sim/Kconfig.defconfig
Original file line number Diff line number Diff line change
Expand Up @@ -32,5 +32,14 @@ config UART_CONSOLE

endif # CONSOLE

# BT relies on PSA Crypto API to perform crypto operations. On this platform
# this is implemented by Mbed TLS which requires a (possibly true) random
# number generator to initialize properly. We enable ENTROPY_GENERATOR here
# instead of manually adding it to all samples/tests configuration files because
# it looks more compact and easier to maintain.
config ENTROPY_GENERATOR
bool
default y if BT


endif # BOARD_NATIVE_SIM
9 changes: 9 additions & 0 deletions boards/qemu/cortex_m3/Kconfig.defconfig
Original file line number Diff line number Diff line change
Expand Up @@ -12,4 +12,13 @@ choice NULL_POINTER_EXCEPTION_DETECTION
default NULL_POINTER_EXCEPTION_DETECTION_NONE
endchoice

# BT relies on PSA Crypto API to perform crypto operations and, on this platform,
# these APIs are provided thougth Mbed TLS. Unfortunately this platform is not
# provided with a true random number generator which is required to properly
# initialize the PSA Crypto core, so we need to enable the fake TEST_RANDOM_GENERATOR.
config TEST_RANDOM_GENERATOR
bool
depends on BT
default y

endif # BOARD_QEMU_CORTEX_M3
15 changes: 15 additions & 0 deletions doc/releases/migration-guide-4.0.rst
Original file line number Diff line number Diff line change
Expand Up @@ -76,6 +76,12 @@ Mbed TLS
corresponding build symbol was removed in Mbed TLS 3.1.0 and is now assumed to
be enabled. (:github:`77657`)

* If a platform has a CSPRNG source available (i.e. :kconfig:option:`CONFIG_CSPRNG_ENABLED`
is set), then the Kconfig option :kconfig:option:`CONFIG_MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG`
is the default choice for random number source instead of
:kconfig:option:`CONFIG_MBEDTLS_PSA_CRYPTO_LEGACY_RNG`. This helps in reducing
ROM/RAM footprint of the Mbed TLS library.

TinyCrypt
=========

Expand Down Expand Up @@ -218,6 +224,15 @@ Disk
Enhanced Serial Peripheral Interface (eSPI)
===========================================

Entropy
=======

* BT HCI based entropy driver now directly sends the HCI command to parse random
data instead of waiting for BT connection to be ready. This is helpful on
platforms where the BT controller owns the HW random generator and the application
processor needs to get random data before BT is fully enabled.
(:github:`79931`)

GNSS
====

Expand Down
12 changes: 12 additions & 0 deletions doc/releases/release-notes-4.0.rst
Original file line number Diff line number Diff line change
Expand Up @@ -1123,6 +1123,18 @@ Libraries / Subsystems
* :kconfig:option:`CONFIG_MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL_ENABLED`
for TLS 1.3 PSK ephemeral key exchange mode.

* The Kconfig symbol :kconfig:option:`CONFIG_MBEDTLS_PSA_STATIC_KEY_SLOTS` was
added to allow Mbed TLS to use pre-allocated static buffers to store key material
in its PSA Crypto core instead of heap allocated ones. This can help reducing
(or removing, if no other components makes use of it) heap memory requirements
from the final application.

* The Kconfig symbol :kconfig:option:`CONFIG_MBEDTLS_PSA_KEY_SLOT_COUNT` was
added to allow selecting the number of key slots available in the Mbed TLS's
implementation of the PSA Crypto core. The default value is 32, the same used in
Mbed TLS by default. Since each slot consumes RAM memory even if unused, this
value can be tweaked in order to minimize RAM usage.

* CMSIS-NN

* FPGA
Expand Down
1 change: 0 additions & 1 deletion drivers/bluetooth/hci/Kconfig
Original file line number Diff line number Diff line change
Expand Up @@ -112,7 +112,6 @@ config BT_SILABS_EFR32
select MBEDTLS
select MBEDTLS_PSA_CRYPTO_C
select MBEDTLS_ENTROPY_C
select MBEDTLS_ENTROPY_POLL_ZEPHYR
help
Use Silicon Labs binary Bluetooth library to connect to the
controller.
Expand Down
15 changes: 12 additions & 3 deletions drivers/entropy/entropy_bt_hci.c
Original file line number Diff line number Diff line change
Expand Up @@ -20,9 +20,18 @@ static int entropy_bt_init(const struct device *dev)
static int entropy_bt_get_entropy(const struct device *dev,
uint8_t *buffer, uint16_t length)
{
if (!bt_is_ready()) {
return -EAGAIN;
}
/* Do not wait for BT to be ready (i.e. bt_is_ready()) before issueing
* the command. The reason is that when crypto is enabled and the PSA
* Crypto API support is provided through Mbed TLS, random number generator
* needs to be available since the very first call to psa_crypto_init()
* which is usually done before BT is completely initialized.
* On the other hand, in devices like the nrf5340, the crytographically
* secure RNG is owned by the cpu_net, so the cpu_app needs to poll it
* to get random data. Again, there is no need to wait for BT to be
* completely initialized for this kind of support. Just try to send the
* request through HCI. If the command fails for any reason, then
* we return failure anyway.
*/

return bt_hci_le_rand(buffer, length);
}
Expand Down
1 change: 0 additions & 1 deletion drivers/wifi/esp32/Kconfig.esp32
Original file line number Diff line number Diff line change
Expand Up @@ -377,7 +377,6 @@ config ESP32_WIFI_MBEDTLS_CRYPTO
select MBEDTLS_CIPHER_MODE_CTR_ENABLED
select MBEDTLS_CMAC
select MBEDTLS_ENTROPY_C
select MBEDTLS_ENTROPY_POLL_ZEPHYR
help
Select this option to use MbedTLS crypto APIs which utilize hardware acceleration.

Expand Down
8 changes: 0 additions & 8 deletions include/zephyr/bluetooth/mesh/keys.h
Original file line number Diff line number Diff line change
Expand Up @@ -28,14 +28,6 @@ struct bt_mesh_key {
psa_key_id_t key;
};

#elif defined CONFIG_BT_MESH_USES_TINYCRYPT

/** The structure that keeps representation of key. */
struct bt_mesh_key {
/** tinycrypt key representation is the pure key value. */
uint8_t key[16];
};

#else
#error "Crypto library has not been chosen"
#endif
Expand Down
38 changes: 37 additions & 1 deletion modules/mbedtls/Kconfig.tls-generic
Original file line number Diff line number Diff line change
Expand Up @@ -246,6 +246,7 @@ config MBEDTLS_SOME_CIPHER_ENABLED

config MBEDTLS_CIPHER_AES_ENABLED
bool "AES block cipher"
default y if PSA_WANT_KEY_TYPE_AES && MBEDTLS_PSA_CRYPTO_C

if MBEDTLS_CIPHER_AES_ENABLED

Expand Down Expand Up @@ -397,6 +398,7 @@ config MBEDTLS_ENTROPY_C

config MBEDTLS_ENTROPY_POLL_ZEPHYR
bool "Provide entropy data to Mbed TLS through entropy driver or random generator"
default y
depends on MBEDTLS_ENTROPY_C
help
Provide entropy data to the Mbed TLS's entropy module through either
Expand Down Expand Up @@ -480,6 +482,7 @@ config MBEDTLS_SSL_EXTENDED_MASTER_SECRET
choice MBEDTLS_PSA_CRYPTO_RNG_SOURCE
prompt "Select random source for built-in PSA crypto"
depends on MBEDTLS_PSA_CRYPTO_C
default MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG if CSPRNG_ENABLED
default MBEDTLS_PSA_CRYPTO_LEGACY_RNG

config MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG
Expand Down Expand Up @@ -551,9 +554,10 @@ config MBEDTLS_LMS
depends on MBEDTLS_SHA256
select PSA_WANT_ALG_SHA_256

if MBEDTLS_PSA_CRYPTO_C

config MBEDTLS_PSA_P256M_DRIVER_ENABLED
bool "P256-M driver"
depends on MBEDTLS_PSA_CRYPTO_C
imply PSA_WANT_ALG_SHA_256
help
Enable support for the optimized sofware implementation of the secp256r1
Expand All @@ -567,6 +571,38 @@ config MBEDTLS_PSA_P256M_DRIVER_RAW
Warning: Usage of this Kconfig option is prohibited in Zephyr's codebase.
Users can enable it in case of very memory-constrained devices, but be aware that the p256-m interface is absolutely not guaranted to remain stable over time.

config MBEDTLS_PSA_STATIC_KEY_SLOTS
bool "Use statically allocated key buffers to store key material"
default y if !MBEDTLS_ENABLE_HEAP
help
By default Mbed TLS's PSA Crypto core uses heap memory to store the
key's material for each key slot. This might impose an undesired
requirement to support heap memory and its management code affecting
RAM and ROM footprints at the same time.
Enabling this symbol cause Mbed TLS to pre-allocate all the key slot
buffers that are used to store the key's material at built time, thus
removing the need for heap memory. Each buffer will be sized to
contain the largest asymmetric/symmetric key type enabled in the build
through PSA_WANT symbols.

config MBEDTLS_PSA_KEY_SLOT_COUNT
int "Number of key slots in PSA Crypto core"
default 16
depends on MBEDTLS_PSA_CRYPTO_C
help
Set the number of key slots that are available in the PSA Crypto core.
Be aware that each slots, even if unused, increases RAM memory
consumption as follows:
* if MBEDTLS_PSA_STATIC_KEY_SLOTS is set: ~40 bytes of overhead for each
slot + the length of the largest asymmetric/symmetric key type
enabled in the build through PSA_WANT symbols. All defined statically
at build time.
* if MBEDTLS_PSA_STATIC_KEY_SLOTS is not set: ~40 bytes of overhead
for each slot defined statically at build time + key material allocated
on heap memory at runtime.

endif # MBEDTLS_PSA_CRYPTO_C

config MBEDTLS_SSL_DTLS_CONNECTION_ID
bool "DTLS Connection ID extension"
depends on MBEDTLS_DTLS
Expand Down
9 changes: 8 additions & 1 deletion modules/mbedtls/configs/config-tls-generic.h
Original file line number Diff line number Diff line change
Expand Up @@ -483,7 +483,6 @@
#endif

#if defined(CONFIG_ARCH_POSIX) && !defined(CONFIG_PICOLIBC)
#define MBEDTLS_PSA_KEY_SLOT_COUNT 64 /* for BLE Mesh tests */
#define MBEDTLS_PSA_ITS_FILE_C
#define MBEDTLS_FS_IO
#endif
Expand All @@ -494,6 +493,14 @@

#endif /* CONFIG_MBEDTLS_PSA_CRYPTO_C */

#if defined(CONFIG_MBEDTLS_PSA_STATIC_KEY_SLOTS)
#define MBEDTLS_PSA_STATIC_KEY_SLOTS
#endif

#if defined(CONFIG_MBEDTLS_PSA_KEY_SLOT_COUNT)
#define MBEDTLS_PSA_KEY_SLOT_COUNT CONFIG_MBEDTLS_PSA_KEY_SLOT_COUNT
#endif

#if defined(CONFIG_MBEDTLS_USE_PSA_CRYPTO)
#define MBEDTLS_USE_PSA_CRYPTO
#endif
Expand Down
2 changes: 1 addition & 1 deletion samples/bluetooth/bap_broadcast_assistant/prj.conf
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ CONFIG_BT_BUF_ACL_RX_SIZE=255
CONFIG_BT_BUF_ACL_TX_SIZE=251
CONFIG_BT_CTLR_SCAN_DATA_LEN_MAX=191

CONFIG_BT_TINYCRYPT_ECC=y
CONFIG_BT_SEND_ECC_EMULATION=y

CONFIG_BT_EXT_ADV=y
CONFIG_BT_BAP_BASS_MAX_SUBGROUPS=2
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
CONFIG_ENTROPY_GENERATOR=y
Original file line number Diff line number Diff line change
@@ -1,3 +1,4 @@
# Use USB Audio as audio sink
CONFIG_USE_USB_AUDIO_OUTPUT=y
CONFIG_USB_DEVICE_PRODUCT="USB Broadcast Sink"
CONFIG_ENTROPY_GENERATOR=y
2 changes: 1 addition & 1 deletion samples/bluetooth/bap_broadcast_sink/prj.conf
Original file line number Diff line number Diff line change
Expand Up @@ -23,4 +23,4 @@ CONFIG_BT_AUDIO_CODEC_CAP_MAX_DATA_SIZE=64

CONFIG_BT_DEVICE_NAME="Broadcast Audio Sink"

CONFIG_BT_TINYCRYPT_ECC=y
CONFIG_BT_SEND_ECC_EMULATION=y
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
CONFIG_ENTROPY_GENERATOR=y
Original file line number Diff line number Diff line change
@@ -1,3 +1,4 @@
# Use USB Audio as audio source
CONFIG_USE_USB_AUDIO_INPUT=y
CONFIG_USB_DEVICE_PRODUCT="Zephyr Broadcast Source"
CONFIG_ENTROPY_GENERATOR=y
4 changes: 3 additions & 1 deletion samples/bluetooth/bap_unicast_client/boards/native_sim.conf
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
CONFIG_LOG_MODE_IMMEDIATE=y
CONFIG_BT_TINYCRYPT_ECC=y
CONFIG_BT_SEND_ECC_EMULATION=y

CONFIG_LIBLC3=y
CONFIG_FPU=y
Expand All @@ -8,3 +8,5 @@ CONFIG_FPU=y
# than every 10 ms as each PDU for some reason takes 2 ticks to process.
CONFIG_SYS_CLOCK_TICKS_PER_SEC=1000
CONFIG_NATIVE_POSIX_SLOWDOWN_TO_REAL_TIME=y

CONFIG_ENTROPY_GENERATOR=y
Original file line number Diff line number Diff line change
Expand Up @@ -10,4 +10,6 @@ CONFIG_BT_BUF_ACL_RX_SIZE=255
CONFIG_BT_BUF_ACL_TX_SIZE=251
CONFIG_BT_BUF_CMD_TX_SIZE=255

CONFIG_BT_TINYCRYPT_ECC=y
CONFIG_BT_SEND_ECC_EMULATION=y

CONFIG_ENTROPY_GENERATOR=y
Original file line number Diff line number Diff line change
Expand Up @@ -7,4 +7,4 @@ CONFIG_BT_BUF_ACL_RX_SIZE=255
CONFIG_BT_BUF_ACL_TX_SIZE=251
CONFIG_BT_BUF_CMD_TX_SIZE=255

CONFIG_BT_TINYCRYPT_ECC=y
CONFIG_BT_SEND_ECC_EMULATION=y
Original file line number Diff line number Diff line change
Expand Up @@ -10,4 +10,4 @@ CONFIG_BT_BUF_ACL_RX_SIZE=255
CONFIG_BT_BUF_ACL_TX_SIZE=251
CONFIG_BT_BUF_CMD_TX_SIZE=255

CONFIG_BT_TINYCRYPT_ECC=y
CONFIG_BT_SEND_ECC_EMULATION=y
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
CONFIG_LOG_MODE_IMMEDIATE=y
CONFIG_BT_TINYCRYPT_ECC=y
CONFIG_BT_SEND_ECC_EMULATION=y

CONFIG_LIBLC3=y
CONFIG_FPU=y
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,4 +7,4 @@ CONFIG_BT_BUF_ACL_RX_SIZE=255
CONFIG_BT_BUF_ACL_TX_SIZE=251
CONFIG_BT_BUF_CMD_TX_SIZE=255

CONFIG_BT_TINYCRYPT_ECC=y
CONFIG_BT_SEND_ECC_EMULATION=y
Original file line number Diff line number Diff line change
Expand Up @@ -7,4 +7,6 @@ CONFIG_BT_BUF_ACL_RX_SIZE=255
CONFIG_BT_BUF_ACL_TX_SIZE=251
CONFIG_BT_BUF_CMD_TX_SIZE=255

CONFIG_BT_TINYCRYPT_ECC=y
CONFIG_BT_SEND_ECC_EMULATION=y

CONFIG_ENTROPY_GENERATOR=y
Original file line number Diff line number Diff line change
Expand Up @@ -10,4 +10,4 @@ CONFIG_BT_BUF_ACL_RX_SIZE=255
CONFIG_BT_BUF_ACL_TX_SIZE=251
CONFIG_BT_BUF_CMD_TX_SIZE=255

CONFIG_BT_TINYCRYPT_ECC=y
CONFIG_BT_SEND_ECC_EMULATION=y
13 changes: 13 additions & 0 deletions samples/bluetooth/beacon/boards/nrf54l15dk_nrf54l15_cpuapp.conf
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
# We need a random number generator to properly initialize the PSA Crypto core
# implemented by Mbed TLS. The proper thing to do in this platform would be
# to enable ENTROPY_GENERATOR, but this is not supported right now for the
# following reasons:
# - at device-tree level (nrf54l15_cpuapp.dtsi) the only RNG source available
# is "zephyr,psa-crypto-rng" which means that TF-M is required in order for
# this to work. Unfortunately TF-M is still not supported for this platform, yet.
# - cpuapp does not have a direct access to the RNG without TF-M, so there's
# no other way it can make use of it as of now.
#
# Since both options are not viable, we fall back to the test random generator
# until further support is added to the platform.
CONFIG_TEST_RANDOM_GENERATOR=y
Original file line number Diff line number Diff line change
Expand Up @@ -3,4 +3,5 @@ CONFIG_BT_BUF_ACL_RX_SIZE=255
CONFIG_BT_BUF_ACL_TX_SIZE=251
CONFIG_BT_BUF_CMD_TX_SIZE=255

CONFIG_BT_TINYCRYPT_ECC=y
CONFIG_BT_SEND_ECC_EMULATION=y
CONFIG_ENTROPY_GENERATOR=y
Original file line number Diff line number Diff line change
Expand Up @@ -3,4 +3,5 @@ CONFIG_BT_BUF_ACL_RX_SIZE=255
CONFIG_BT_BUF_ACL_TX_SIZE=251
CONFIG_BT_BUF_CMD_TX_SIZE=255

CONFIG_BT_TINYCRYPT_ECC=y
CONFIG_BT_SEND_ECC_EMULATION=y
CONFIG_ENTROPY_GENERATOR=y
Original file line number Diff line number Diff line change
Expand Up @@ -3,4 +3,5 @@ CONFIG_BT_BUF_ACL_RX_SIZE=255
CONFIG_BT_BUF_ACL_TX_SIZE=251
CONFIG_BT_BUF_CMD_TX_SIZE=255

CONFIG_BT_TINYCRYPT_ECC=y
CONFIG_BT_SEND_ECC_EMULATION=y
CONFIG_ENTROPY_GENERATOR=y
Original file line number Diff line number Diff line change
Expand Up @@ -3,4 +3,5 @@ CONFIG_BT_BUF_ACL_RX_SIZE=255
CONFIG_BT_BUF_ACL_TX_SIZE=251
CONFIG_BT_BUF_CMD_TX_SIZE=255

CONFIG_BT_TINYCRYPT_ECC=y
CONFIG_BT_SEND_ECC_EMULATION=y
CONFIG_ENTROPY_GENERATOR=y
Original file line number Diff line number Diff line change
@@ -1,3 +1,4 @@
# Set same the ACL RX buffer size as in hci_ipc on netcore so that
# HCI Controller to Host Flowcontrol is supported.
CONFIG_BT_BUF_ACL_RX_SIZE=255
CONFIG_ENTROPY_GENERATOR=y
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
CONFIG_ENTROPY_GENERATOR=y
11 changes: 11 additions & 0 deletions samples/bluetooth/central_hr/prj_minimal.conf
Original file line number Diff line number Diff line change
Expand Up @@ -101,3 +101,14 @@ CONFIG_BT_L2CAP_TX_BUF_COUNT=2
CONFIG_BT_CTLR_RX_BUFFERS=1
CONFIG_BT_BUF_ACL_TX_COUNT=3
CONFIG_BT_BUF_ACL_TX_SIZE=27

# Limit the number of key slots in PSA Crypto core to reduce
# RAM footprint
CONFIG_MBEDTLS_PSA_KEY_SLOT_COUNT=5

# This is required because otherwise there won't be
# __heap_start/__heap_end symbols defined in the build. This
# is due to Mbed TLS which at boot uses standard calloc/free
# functions and only after the initialization done from Zephyr
# it switches to its internal memory management functions.
CONFIG_COMMON_LIBC_MALLOC=y
1 change: 1 addition & 0 deletions samples/bluetooth/central_ht/boards/frdm_rw612.conf
Original file line number Diff line number Diff line change
@@ -1 +1,2 @@
CONFIG_PM=y
CONFIG_ENTROPY_GENERATOR=y
1 change: 1 addition & 0 deletions samples/bluetooth/central_ht/boards/rd_rw612_bga.conf
Original file line number Diff line number Diff line change
@@ -1 +1,2 @@
CONFIG_PM=y
CONFIG_ENTROPY_GENERATOR=y
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
CONFIG_ENTROPY_GENERATOR=y
4 changes: 3 additions & 1 deletion samples/bluetooth/hap_ha/boards/native_sim.conf
Original file line number Diff line number Diff line change
@@ -1,7 +1,9 @@
CONFIG_LOG_MODE_IMMEDIATE=y
CONFIG_BT_TINYCRYPT_ECC=y
CONFIG_BT_SEND_ECC_EMULATION=y

# For LE-audio at 10ms intervals we need the tick counter to occur more frequently
# than every 10 ms as each PDU for some reason takes 2 ticks to process.
CONFIG_SYS_CLOCK_TICKS_PER_SEC=1000
CONFIG_NATIVE_SIM_SLOWDOWN_TO_REAL_TIME=y

CONFIG_TEST_RANDOM_GENERATOR=y
Loading
Loading