always compile mbedtls_psa_inject_entropy
In case of dual core this function header must be enable for calling the
SPM entropy inject function without any use of NV_SEED
diff --git a/include/psa/crypto_extra.h b/include/psa/crypto_extra.h
index b6f5adc..b0ca76e 100644
--- a/include/psa/crypto_extra.h
+++ b/include/psa/crypto_extra.h
@@ -48,7 +48,6 @@
void mbedtls_psa_crypto_free( void );
-#if ( defined(MBEDTLS_ENTROPY_NV_SEED) && defined(MBEDTLS_PSA_HAS_ITS_IO) )
/**
* \brief Inject an initial entropy seed for the random generator into
* secure storage.
@@ -89,6 +88,13 @@
*
* This is an Mbed TLS extension.
*
+ * \note This function is only available on the following platforms:
+ * * If the compile-time options MBEDTLS_ENTROPY_NV_SEED and
+ * MBEDTLS_PSA_HAS_ITS_IO are both enabled. Note that you
+ * must provide compatible implementations of mbedtls_nv_seed_read
+ * and mbedtls_nv_seed_write.
+ * * In a client-server integration of PSA Cryptography, on the client side,
+ * if the server supports this feature.
* \param seed[in] Buffer containing the seed value to inject.
* \param seed_size Size of the \p seed buffer.
* The size of the seed in bytes must be greater
@@ -114,7 +120,6 @@
psa_status_t mbedtls_psa_inject_entropy(const unsigned char *seed,
size_t seed_size);
-#endif
#ifdef __cplusplus
}