blob: 88052d228bc578a06dcb579b29c5eded6423c2dd [file] [log] [blame]
John Durkop6e33dbe2020-09-17 21:15:13 -07001/**
2 * \file mbedtls/config_psa.h
3 * \brief PSA crypto configuration options (set of defines)
4 *
John Durkop34818822020-10-12 21:36:22 -07005 * This set of compile-time options takes settings defined in
Bence Szépkútibb0cfeb2021-05-28 09:42:25 +02006 * include/mbedtls/mbedtls_config.h and include/psa/crypto_config.h and uses
John Durkop34818822020-10-12 21:36:22 -07007 * those definitions to define symbols used in the library code.
8 *
9 * Users and integrators should not edit this file, please edit
Bence Szépkútibb0cfeb2021-05-28 09:42:25 +020010 * include/mbedtls/mbedtls_config.h for MBETLS_XXX settings or
John Durkop34818822020-10-12 21:36:22 -070011 * include/psa/crypto_config.h for PSA_WANT_XXX settings.
John Durkop6e33dbe2020-09-17 21:15:13 -070012 */
13/*
14 * Copyright The Mbed TLS Contributors
15 * SPDX-License-Identifier: Apache-2.0
16 *
17 * Licensed under the Apache License, Version 2.0 (the "License"); you may
18 * not use this file except in compliance with the License.
19 * You may obtain a copy of the License at
20 *
21 * http://www.apache.org/licenses/LICENSE-2.0
22 *
23 * Unless required by applicable law or agreed to in writing, software
24 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
25 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
26 * See the License for the specific language governing permissions and
27 * limitations under the License.
28 */
29
30#ifndef MBEDTLS_CONFIG_PSA_H
31#define MBEDTLS_CONFIG_PSA_H
32
John Durkop714e3a12020-09-29 22:07:04 -070033#if defined(MBEDTLS_PSA_CRYPTO_CONFIG)
Gilles Peskinef4c6eb02022-03-16 17:10:48 +010034#if defined(MBEDTLS_PSA_CRYPTO_CONFIG_FILE)
35#include MBEDTLS_PSA_CRYPTO_CONFIG_FILE
36#else
John Durkop6e33dbe2020-09-17 21:15:13 -070037#include "psa/crypto_config.h"
Gilles Peskinef4c6eb02022-03-16 17:10:48 +010038#endif
John Durkop76228ac2020-09-29 22:33:49 -070039#endif /* defined(MBEDTLS_PSA_CRYPTO_CONFIG) */
John Durkop6e33dbe2020-09-17 21:15:13 -070040
Gilles Peskinef4c6eb02022-03-16 17:10:48 +010041#if defined(MBEDTLS_PSA_CRYPTO_USER_CONFIG_FILE)
42#include MBEDTLS_PSA_CRYPTO_USER_CONFIG_FILE
43#endif
44
John Durkop6e33dbe2020-09-17 21:15:13 -070045#ifdef __cplusplus
46extern "C" {
47#endif
48
Gilles Peskine1231eb52021-04-19 22:24:23 +020049
50
51/****************************************************************/
52/* De facto synonyms */
53/****************************************************************/
54
55#if defined(PSA_WANT_ALG_ECDSA_ANY) && !defined(PSA_WANT_ALG_ECDSA)
56#define PSA_WANT_ALG_ECDSA PSA_WANT_ALG_ECDSA_ANY
57#elif !defined(PSA_WANT_ALG_ECDSA_ANY) && defined(PSA_WANT_ALG_ECDSA)
58#define PSA_WANT_ALG_ECDSA_ANY PSA_WANT_ALG_ECDSA
59#endif
60
Gilles Peskine08622b62022-03-15 16:40:59 +010061#if defined(PSA_WANT_ALG_CCM_STAR_NO_TAG) && !defined(PSA_WANT_ALG_CCM)
62#define PSA_WANT_ALG_CCM PSA_WANT_ALG_CCM_STAR_NO_TAG
63#elif !defined(PSA_WANT_ALG_CCM_STAR_NO_TAG) && defined(PSA_WANT_ALG_CCM)
64#define PSA_WANT_ALG_CCM_STAR_NO_TAG PSA_WANT_ALG_CCM
65#endif
66
Gilles Peskine1231eb52021-04-19 22:24:23 +020067#if defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW) && !defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
68#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW
69#elif !defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW) && defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
70#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW PSA_WANT_ALG_RSA_PKCS1V15_SIGN
71#endif
72
Gilles Peskine44c96aa2021-10-04 18:33:56 +020073#if defined(PSA_WANT_ALG_RSA_PSS_ANY_SALT) && !defined(PSA_WANT_ALG_RSA_PSS)
74#define PSA_WANT_ALG_RSA_PSS PSA_WANT_ALG_RSA_PSS_ANY_SALT
75#elif !defined(PSA_WANT_ALG_RSA_PSS_ANY_SALT) && defined(PSA_WANT_ALG_RSA_PSS)
76#define PSA_WANT_ALG_RSA_PSS_ANY_SALT PSA_WANT_ALG_RSA_PSS
77#endif
78
Gilles Peskine1231eb52021-04-19 22:24:23 +020079
80
81/****************************************************************/
82/* Require built-in implementations based on PSA requirements */
83/****************************************************************/
84
John Durkop2dfaf9c2020-09-24 04:30:10 -070085#if defined(MBEDTLS_PSA_CRYPTO_CONFIG)
John Durkopd8959392020-09-20 23:09:17 -070086
John Durkopd62b6782020-11-30 21:06:05 -080087#if defined(PSA_WANT_ALG_DETERMINISTIC_ECDSA)
88#if !defined(MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA)
89#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
90#define MBEDTLS_ECDSA_DETERMINISTIC
91#define MBEDTLS_ECDSA_C
92#define MBEDTLS_HMAC_DRBG_C
93#define MBEDTLS_MD_C
94#endif /* !MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA */
95#endif /* PSA_WANT_ALG_DETERMINISTIC_ECDSA */
96
97#if defined(PSA_WANT_ALG_ECDH)
98#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDH)
99#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
100#define MBEDTLS_ECDH_C
101#define MBEDTLS_ECP_C
102#define MBEDTLS_BIGNUM_C
103#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDH */
104#endif /* PSA_WANT_ALG_ECDH */
105
106#if defined(PSA_WANT_ALG_ECDSA)
107#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDSA)
108#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
109#define MBEDTLS_ECDSA_C
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200110#define MBEDTLS_ECP_C
111#define MBEDTLS_BIGNUM_C
112#define MBEDTLS_ASN1_PARSE_C
113#define MBEDTLS_ASN1_WRITE_C
John Durkopd62b6782020-11-30 21:06:05 -0800114#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDSA */
115#endif /* PSA_WANT_ALG_ECDSA */
116
117#if defined(PSA_WANT_ALG_HKDF)
118#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF)
119#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
120#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
121#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF */
122#endif /* PSA_WANT_ALG_HKDF */
123
Przemek Stekiel3e8249c2022-06-03 14:05:07 +0200124#if defined(PSA_WANT_ALG_HKDF_EXTRACT)
125#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF_EXTRACT)
126#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
127#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXTRACT 1
128#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF_EXTRACT */
129#endif /* PSA_WANT_ALG_HKDF_EXTRACT */
130
131#if defined(PSA_WANT_ALG_HKDF_EXPAND)
132#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF_EXPAND)
133#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
134#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXPAND 1
135#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF_EXPAND */
136#endif /* PSA_WANT_ALG_HKDF_EXPAND */
137
John Durkopd62b6782020-11-30 21:06:05 -0800138#if defined(PSA_WANT_ALG_HMAC)
139#if !defined(MBEDTLS_PSA_ACCEL_ALG_HMAC)
140#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
141#endif /* !MBEDTLS_PSA_ACCEL_ALG_HMAC */
142#endif /* PSA_WANT_ALG_HMAC */
143
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100144#if defined(PSA_WANT_ALG_MD5) && !defined(MBEDTLS_PSA_ACCEL_ALG_MD5)
145#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
146#define MBEDTLS_MD5_C
147#endif
148
149#if defined(PSA_WANT_ALG_RIPEMD160) && !defined(MBEDTLS_PSA_ACCEL_ALG_RIPEMD160)
150#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
151#define MBEDTLS_RIPEMD160_C
152#endif
153
John Durkopd62b6782020-11-30 21:06:05 -0800154#if defined(PSA_WANT_ALG_RSA_OAEP)
155#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP)
156#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
157#define MBEDTLS_RSA_C
158#define MBEDTLS_BIGNUM_C
159#define MBEDTLS_OID_C
160#define MBEDTLS_PKCS1_V21
John Durkopd62b6782020-11-30 21:06:05 -0800161#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP */
162#endif /* PSA_WANT_ALG_RSA_OAEP */
163
164#if defined(PSA_WANT_ALG_RSA_PKCS1V15_CRYPT)
165#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT)
166#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
167#define MBEDTLS_RSA_C
168#define MBEDTLS_BIGNUM_C
169#define MBEDTLS_OID_C
170#define MBEDTLS_PKCS1_V15
171#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT */
172#endif /* PSA_WANT_ALG_RSA_PKCS1V15_CRYPT */
173
174#if defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
175#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN)
176#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
177#define MBEDTLS_RSA_C
178#define MBEDTLS_BIGNUM_C
179#define MBEDTLS_OID_C
180#define MBEDTLS_PKCS1_V15
John Durkopd62b6782020-11-30 21:06:05 -0800181#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN */
182#endif /* PSA_WANT_ALG_RSA_PKCS1V15_SIGN */
183
184#if defined(PSA_WANT_ALG_RSA_PSS)
185#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PSS)
186#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
187#define MBEDTLS_RSA_C
188#define MBEDTLS_BIGNUM_C
189#define MBEDTLS_OID_C
190#define MBEDTLS_PKCS1_V21
John Durkopd62b6782020-11-30 21:06:05 -0800191#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PSS */
192#endif /* PSA_WANT_ALG_RSA_PSS */
193
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100194#if defined(PSA_WANT_ALG_SHA_1) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_1)
195#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
196#define MBEDTLS_SHA1_C
197#endif
198
199#if defined(PSA_WANT_ALG_SHA_224) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_224)
200#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200201#define MBEDTLS_SHA224_C
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100202#endif
203
204#if defined(PSA_WANT_ALG_SHA_256) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_256)
205#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
206#define MBEDTLS_SHA256_C
207#endif
208
209#if defined(PSA_WANT_ALG_SHA_384) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_384)
210#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200211#define MBEDTLS_SHA384_C
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100212#endif
213
214#if defined(PSA_WANT_ALG_SHA_512) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_512)
215#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
216#define MBEDTLS_SHA512_C
217#endif
218
John Durkop07cc04a2020-11-16 22:08:34 -0800219#if defined(PSA_WANT_ALG_TLS12_PRF)
220#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF)
John Durkopd62b6782020-11-30 21:06:05 -0800221#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
John Durkop07cc04a2020-11-16 22:08:34 -0800222#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF */
223#endif /* PSA_WANT_ALG_TLS12_PRF */
224
225#if defined(PSA_WANT_ALG_TLS12_PSK_TO_MS)
226#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS)
John Durkopd62b6782020-11-30 21:06:05 -0800227#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
John Durkop07cc04a2020-11-16 22:08:34 -0800228#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS */
229#endif /* PSA_WANT_ALG_TLS12_PSK_TO_MS */
230
Andrzej Kurek08d34b82022-07-29 10:00:16 -0400231#if defined(PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS)
232#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_ECJPAKE_TO_PMS)
233#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_ECJPAKE_TO_PMS 1
234#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_ECJPAKE_TO_PMS */
235#endif /* PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS */
236
John Durkop07cc04a2020-11-16 22:08:34 -0800237#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR)
238#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR)
John Durkopd62b6782020-11-30 21:06:05 -0800239#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR 1
John Durkop07cc04a2020-11-16 22:08:34 -0800240#define MBEDTLS_ECP_C
241#define MBEDTLS_BIGNUM_C
242#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR */
243#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR */
244
245#if defined(PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY)
246#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800247#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
John Durkop07cc04a2020-11-16 22:08:34 -0800248#define MBEDTLS_ECP_C
249#define MBEDTLS_BIGNUM_C
250#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY */
251#endif /* PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY */
252
John Durkop9814fa22020-11-04 12:28:15 -0800253#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR)
John Durkop0e005192020-10-31 22:06:54 -0700254#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR)
John Durkopd62b6782020-11-30 21:06:05 -0800255#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR 1
John Durkop0e005192020-10-31 22:06:54 -0700256#define MBEDTLS_RSA_C
257#define MBEDTLS_BIGNUM_C
258#define MBEDTLS_OID_C
259#define MBEDTLS_GENPRIME
John Durkop07cc04a2020-11-16 22:08:34 -0800260#define MBEDTLS_PK_PARSE_C
261#define MBEDTLS_PK_WRITE_C
262#define MBEDTLS_PK_C
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200263#define MBEDTLS_ASN1_PARSE_C
264#define MBEDTLS_ASN1_WRITE_C
John Durkop0e005192020-10-31 22:06:54 -0700265#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR */
John Durkop9814fa22020-11-04 12:28:15 -0800266#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR */
267
268#if defined(PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkop0e005192020-10-31 22:06:54 -0700269#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800270#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
John Durkop0e005192020-10-31 22:06:54 -0700271#define MBEDTLS_RSA_C
272#define MBEDTLS_BIGNUM_C
273#define MBEDTLS_OID_C
John Durkop07cc04a2020-11-16 22:08:34 -0800274#define MBEDTLS_PK_PARSE_C
275#define MBEDTLS_PK_WRITE_C
276#define MBEDTLS_PK_C
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200277#define MBEDTLS_ASN1_PARSE_C
278#define MBEDTLS_ASN1_WRITE_C
John Durkop0e005192020-10-31 22:06:54 -0700279#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkop9814fa22020-11-04 12:28:15 -0800280#endif /* PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkopd0321952020-10-29 21:37:36 -0700281
David Brownb781f752021-02-08 15:44:52 -0700282/* If any of the block modes are requested that don't have an
283 * associated HW assist, define PSA_HAVE_SOFT_BLOCK_MODE for checking
284 * in the block cipher key types. */
285#if (defined(PSA_WANT_ALG_CTR) && !defined(MBEDTLS_PSA_ACCEL_ALG_CTR)) || \
Bence Szépkúti7921cce2021-02-17 11:46:50 +0100286 (defined(PSA_WANT_ALG_CFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_CFB)) || \
David Brownb781f752021-02-08 15:44:52 -0700287 (defined(PSA_WANT_ALG_OFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_OFB)) || \
David Brownb781f752021-02-08 15:44:52 -0700288 defined(PSA_WANT_ALG_ECB_NO_PADDING) || \
289 (defined(PSA_WANT_ALG_CBC_NO_PADDING) && \
290 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING)) || \
291 (defined(PSA_WANT_ALG_CBC_PKCS7) && \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100292 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7)) || \
293 (defined(PSA_WANT_ALG_CMAC) && !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC))
David Brownb781f752021-02-08 15:44:52 -0700294#define PSA_HAVE_SOFT_BLOCK_MODE 1
295#endif
296
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100297#if (defined(PSA_WANT_ALG_GCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_GCM)) || \
298 (defined(PSA_WANT_ALG_CCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_CCM))
299#define PSA_HAVE_SOFT_BLOCK_AEAD 1
300#endif
301
David Brown94933082021-01-05 12:03:25 -0700302#if defined(PSA_WANT_KEY_TYPE_AES)
David Browne1f91f02021-02-09 15:56:22 -0700303#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_AES)
304#define PSA_HAVE_SOFT_KEY_TYPE_AES 1
305#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_AES */
306#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100307 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
308 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
David Brown78a429b2021-01-21 09:48:57 -0700309#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700310#define MBEDTLS_AES_C
David Browne1f91f02021-02-09 15:56:22 -0700311#endif /* PSA_HAVE_SOFT_KEY_TYPE_AES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown94933082021-01-05 12:03:25 -0700312#endif /* PSA_WANT_KEY_TYPE_AES */
313
Gilles Peskine09c46da2021-10-08 15:48:16 +0200314#if defined(PSA_WANT_KEY_TYPE_ARIA)
315#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA)
316#define PSA_HAVE_SOFT_KEY_TYPE_ARIA 1
317#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA */
318#if defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
319 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
320 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
321#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
322#define MBEDTLS_ARIA_C
323#endif /* PSA_HAVE_SOFT_KEY_TYPE_ARIA || PSA_HAVE_SOFT_BLOCK_MODE */
324#endif /* PSA_WANT_KEY_TYPE_ARIA */
325
David Brown686e6e82021-01-05 12:03:25 -0700326#if defined(PSA_WANT_KEY_TYPE_CAMELLIA)
David Browne1f91f02021-02-09 15:56:22 -0700327#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA)
328#define PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA 1
329#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA */
330#if defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100331 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
332 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
David Brown78a429b2021-01-21 09:48:57 -0700333#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700334#define MBEDTLS_CAMELLIA_C
David Browne1f91f02021-02-09 15:56:22 -0700335#endif /* PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown686e6e82021-01-05 12:03:25 -0700336#endif /* PSA_WANT_KEY_TYPE_CAMELLIA */
337
David Brownb65a7f72021-01-15 12:04:09 -0700338#if defined(PSA_WANT_KEY_TYPE_DES)
David Browne1f91f02021-02-09 15:56:22 -0700339#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DES)
340#define PSA_HAVE_SOFT_KEY_TYPE_DES 1
341#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DES */
342#if defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
David Brownb781f752021-02-08 15:44:52 -0700343 defined(PSA_HAVE_SOFT_BLOCK_MODE)
David Brown78a429b2021-01-21 09:48:57 -0700344#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700345#define MBEDTLS_DES_C
David Browne1f91f02021-02-09 15:56:22 -0700346#endif /*PSA_HAVE_SOFT_KEY_TYPE_DES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brownb65a7f72021-01-15 12:04:09 -0700347#endif /* PSA_WANT_KEY_TYPE_DES */
348
David Brownb16727a2021-02-08 16:31:46 -0700349#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
350#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20)
351#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
352#define MBEDTLS_CHACHA20_C
353#endif /*!MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20 */
354#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
355
David Brownf84a0f62021-02-09 15:59:41 -0700356/* If any of the software block ciphers are selected, define
357 * PSA_HAVE_SOFT_BLOCK_CIPHER, which can be used in any of these
358 * situations. */
359#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200360 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
David Brownf84a0f62021-02-09 15:59:41 -0700361 defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
362 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
363#define PSA_HAVE_SOFT_BLOCK_CIPHER 1
364#endif
365
David Brown99844272021-01-15 12:04:47 -0700366#if defined(PSA_WANT_ALG_STREAM_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700367#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brown99844272021-01-15 12:04:47 -0700368#endif /* PSA_WANT_ALG_STREAM_CIPHER */
369
Ronald Crond85e98d2021-03-25 15:32:32 +0100370#if defined(PSA_WANT_ALG_CBC_MAC)
371#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_MAC)
372#error "CBC-MAC is not yet supported via the PSA API in Mbed TLS."
373#define MBEDTLS_PSA_BUILTIN_ALG_CBC_MAC 1
374#endif /* !MBEDTLS_PSA_ACCEL_ALG_CBC_MAC */
375#endif /* PSA_WANT_ALG_CBC_MAC */
376
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100377#if defined(PSA_WANT_ALG_CMAC)
378#if !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC) || \
379 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
380#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
381#define MBEDTLS_CMAC_C
382#endif /* !MBEDTLS_PSA_ACCEL_ALG_CMAC */
383#endif /* PSA_WANT_ALG_CMAC */
384
David Brown99844272021-01-15 12:04:47 -0700385#if defined(PSA_WANT_ALG_CTR)
David Brown4b9ec7a2021-02-05 12:47:08 -0700386#if !defined(MBEDTLS_PSA_ACCEL_ALG_CTR) || \
David Brownf84a0f62021-02-09 15:59:41 -0700387 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700388#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700389#define MBEDTLS_CIPHER_MODE_CTR
David Brown4b9ec7a2021-02-05 12:47:08 -0700390#endif
David Brown99844272021-01-15 12:04:47 -0700391#endif /* PSA_WANT_ALG_CTR */
392
393#if defined(PSA_WANT_ALG_CFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700394#if !defined(MBEDTLS_PSA_ACCEL_ALG_CFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700395 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700396#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700397#define MBEDTLS_CIPHER_MODE_CFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700398#endif
David Brown99844272021-01-15 12:04:47 -0700399#endif /* PSA_WANT_ALG_CFB */
400
401#if defined(PSA_WANT_ALG_OFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700402#if !defined(MBEDTLS_PSA_ACCEL_ALG_OFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700403 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700404#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700405#define MBEDTLS_CIPHER_MODE_OFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700406#endif
David Brown99844272021-01-15 12:04:47 -0700407#endif /* PSA_WANT_ALG_OFB */
408
Gilles Peskine7a2e83b2022-03-17 11:09:23 +0100409#if defined(PSA_WANT_ALG_ECB_NO_PADDING) && \
410 !defined(MBEDTLS_PSA_ACCEL_ALG_ECB_NO_PADDING)
David Brownbe380c12021-02-11 10:55:48 -0700411#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700412#endif
413
David Brown12f45f92021-01-26 11:50:36 -0700414#if defined(PSA_WANT_ALG_CBC_NO_PADDING)
David Brown4b9ec7a2021-02-05 12:47:08 -0700415#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING) || \
David Brownfc468182021-02-09 16:23:34 -0700416 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700417#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700418#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown4b9ec7a2021-02-05 12:47:08 -0700419#endif
David Brown12f45f92021-01-26 11:50:36 -0700420#endif /* PSA_WANT_ALG_CBC_NO_PADDING */
421
422#if defined(PSA_WANT_ALG_CBC_PKCS7)
David Brown4b9ec7a2021-02-05 12:47:08 -0700423#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7) || \
David Brownfc468182021-02-09 16:23:34 -0700424 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700425#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700426#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brownfc468182021-02-09 16:23:34 -0700427#define MBEDTLS_CIPHER_PADDING_PKCS7
David Brown4b9ec7a2021-02-05 12:47:08 -0700428#endif
David Brown12f45f92021-01-26 11:50:36 -0700429#endif /* PSA_WANT_ALG_CBC_PKCS7 */
430
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100431#if defined(PSA_WANT_ALG_CCM)
432#if !defined(MBEDTLS_PSA_ACCEL_ALG_CCM) || \
433 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200434 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100435 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
436#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100437#define MBEDTLS_PSA_BUILTIN_ALG_CCM_STAR_NO_TAG 1
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100438#define MBEDTLS_CCM_C
439#endif
440#endif /* PSA_WANT_ALG_CCM */
441
442#if defined(PSA_WANT_ALG_GCM)
443#if !defined(MBEDTLS_PSA_ACCEL_ALG_GCM) || \
444 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200445 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100446 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
447#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
448#define MBEDTLS_GCM_C
449#endif
450#endif /* PSA_WANT_ALG_GCM */
451
David Brownac4fa072021-02-08 16:47:35 -0700452#if defined(PSA_WANT_ALG_CHACHA20_POLY1305)
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200453#if !defined(MBEDTLS_PSA_ACCEL_ALG_CHACHA20_POLY1305)
David Brownac4fa072021-02-08 16:47:35 -0700454#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
455#define MBEDTLS_CHACHAPOLY_C
Summer Qin9f2596f2022-06-17 12:50:32 +0800456#define MBEDTLS_CHACHA20_C
457#define MBEDTLS_POLY1305_C
David Brown86730a82021-02-09 16:24:11 -0700458#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700459#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200460#endif /* !MBEDTLS_PSA_ACCEL_ALG_CHACHA20_POLY1305 */
David Brownac4fa072021-02-08 16:47:35 -0700461#endif /* PSA_WANT_ALG_CHACHA20_POLY1305 */
462
David Browneed74df2021-03-15 15:53:57 -0600463#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_256)
464#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256)
465#define MBEDTLS_ECP_DP_BP256R1_ENABLED
466#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
467#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256 */
468#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_256 */
469
470#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_384)
471#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384)
472#define MBEDTLS_ECP_DP_BP384R1_ENABLED
473#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
474#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384 */
475#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_384 */
476
477#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_512)
478#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512)
479#define MBEDTLS_ECP_DP_BP512R1_ENABLED
480#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
481#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512 */
482#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_512 */
483
484#if defined(PSA_WANT_ECC_MONTGOMERY_255)
485#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255)
486#define MBEDTLS_ECP_DP_CURVE25519_ENABLED
487#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
488#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255 */
489#endif /* PSA_WANT_ECC_MONTGOMERY_255 */
490
491#if defined(PSA_WANT_ECC_MONTGOMERY_448)
492#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448)
493#define MBEDTLS_ECP_DP_CURVE448_ENABLED
494#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
495#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448 */
496#endif /* PSA_WANT_ECC_MONTGOMERY_448 */
497
David Brownc7b9b2b2021-02-19 21:05:52 -0700498#if defined(PSA_WANT_ECC_SECP_R1_192)
499#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192)
500#define MBEDTLS_ECP_DP_SECP192R1_ENABLED
501#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
502#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192 */
503#endif /* PSA_WANT_ECC_SECP_R1_192 */
504
505#if defined(PSA_WANT_ECC_SECP_R1_224)
506#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224)
507#define MBEDTLS_ECP_DP_SECP224R1_ENABLED
508#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
509#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224 */
510#endif /* PSA_WANT_ECC_SECP_R1_224 */
511
512#if defined(PSA_WANT_ECC_SECP_R1_256)
513#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256)
514#define MBEDTLS_ECP_DP_SECP256R1_ENABLED
515#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
516#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256 */
517#endif /* PSA_WANT_ECC_SECP_R1_256 */
518
519#if defined(PSA_WANT_ECC_SECP_R1_384)
520#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384)
521#define MBEDTLS_ECP_DP_SECP384R1_ENABLED
522#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
523#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384 */
524#endif /* PSA_WANT_ECC_SECP_R1_384 */
525
526#if defined(PSA_WANT_ECC_SECP_R1_521)
527#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521)
528#define MBEDTLS_ECP_DP_SECP521R1_ENABLED
529#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
530#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521 */
531#endif /* PSA_WANT_ECC_SECP_R1_521 */
532
533#if defined(PSA_WANT_ECC_SECP_K1_192)
534#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192)
David Brown8de143e2021-02-19 14:08:00 -0700535#define MBEDTLS_ECP_DP_SECP192K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700536#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
537#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192 */
538#endif /* PSA_WANT_ECC_SECP_K1_192 */
David Brown8de143e2021-02-19 14:08:00 -0700539
David Brownc7b9b2b2021-02-19 21:05:52 -0700540#if defined(PSA_WANT_ECC_SECP_K1_224)
541#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224)
Ronald Crone1f55162021-03-25 15:09:47 +0100542/*
543 * SECP224K1 is buggy via the PSA API in Mbed TLS
Dave Rodgman017a1992022-03-31 14:07:01 +0100544 * (https://github.com/Mbed-TLS/mbedtls/issues/3541).
Ronald Crone1f55162021-03-25 15:09:47 +0100545 */
546#error "SECP224K1 is buggy via the PSA API in Mbed TLS."
David Brown8de143e2021-02-19 14:08:00 -0700547#define MBEDTLS_ECP_DP_SECP224K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700548#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
549#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224 */
550#endif /* PSA_WANT_ECC_SECP_K1_224 */
David Brown8de143e2021-02-19 14:08:00 -0700551
David Brownc7b9b2b2021-02-19 21:05:52 -0700552#if defined(PSA_WANT_ECC_SECP_K1_256)
553#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256)
David Brown9b178de2021-03-10 13:14:48 -0700554#define MBEDTLS_ECP_DP_SECP256K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700555#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
556#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256 */
557#endif /* PSA_WANT_ECC_SECP_K1_256 */
David Brown8de143e2021-02-19 14:08:00 -0700558
Gilles Peskine1231eb52021-04-19 22:24:23 +0200559
560
561/****************************************************************/
562/* Infer PSA requirements from Mbed TLS capabilities */
563/****************************************************************/
564
John Durkop714e3a12020-09-29 22:07:04 -0700565#else /* MBEDTLS_PSA_CRYPTO_CONFIG */
566
567/*
568 * Ensure PSA_WANT_* defines are setup properly if MBEDTLS_PSA_CRYPTO_CONFIG
569 * is not defined
570 */
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100571
Ronald Cron3d471812021-03-18 13:40:31 +0100572#if defined(MBEDTLS_CCM_C)
573#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100574#define MBEDTLS_PSA_BUILTIN_ALG_CCM_STAR_NO_TAG 1
Ronald Cron3d471812021-03-18 13:40:31 +0100575#define PSA_WANT_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100576#define PSA_WANT_ALG_CCM_STAR_NO_TAG 1
Ronald Cron3d471812021-03-18 13:40:31 +0100577#endif /* MBEDTLS_CCM_C */
578
579#if defined(MBEDTLS_CMAC_C)
580#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
581#define PSA_WANT_ALG_CMAC 1
582#endif /* MBEDTLS_CMAC_C */
583
John Durkopd62b6782020-11-30 21:06:05 -0800584#if defined(MBEDTLS_ECDH_C)
585#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
586#define PSA_WANT_ALG_ECDH 1
587#endif /* MBEDTLS_ECDH_C */
588
589#if defined(MBEDTLS_ECDSA_C)
590#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
591#define PSA_WANT_ALG_ECDSA 1
Gilles Peskine1231eb52021-04-19 22:24:23 +0200592#define PSA_WANT_ALG_ECDSA_ANY 1
John Durkopd62b6782020-11-30 21:06:05 -0800593
594// Only add in DETERMINISTIC support if ECDSA is also enabled
595#if defined(MBEDTLS_ECDSA_DETERMINISTIC)
596#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
597#define PSA_WANT_ALG_DETERMINISTIC_ECDSA 1
598#endif /* MBEDTLS_ECDSA_DETERMINISTIC */
599
600#endif /* MBEDTLS_ECDSA_C */
601
602#if defined(MBEDTLS_ECP_C)
603#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR 1
604#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR 1
605#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
606#define PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY 1
607#endif /* MBEDTLS_ECP_C */
608
Ronald Cron3d471812021-03-18 13:40:31 +0100609#if defined(MBEDTLS_GCM_C)
610#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
611#define PSA_WANT_ALG_GCM 1
612#endif /* MBEDTLS_GCM_C */
613
Przemek Stekiel18399d82022-06-27 13:34:50 +0200614/* Enable PSA HKDF algorithm if mbedtls HKDF is supported.
615 * PSA HKDF EXTRACT and PSA HKDF EXPAND have minimal cost when
616 * PSA HKDF is enabled, so enable both algorithms together
617 * with PSA HKDF. */
John Durkopd62b6782020-11-30 21:06:05 -0800618#if defined(MBEDTLS_HKDF_C)
619#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
620#define PSA_WANT_ALG_HMAC 1
621#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
622#define PSA_WANT_ALG_HKDF 1
Przemek Stekielb33bd192022-06-21 09:58:51 +0200623#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXTRACT 1
624#define PSA_WANT_ALG_HKDF_EXTRACT 1
625#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXPAND 1
626#define PSA_WANT_ALG_HKDF_EXPAND 1
John Durkopd62b6782020-11-30 21:06:05 -0800627#endif /* MBEDTLS_HKDF_C */
628
John Durkopd62b6782020-11-30 21:06:05 -0800629#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
630#define PSA_WANT_ALG_HMAC 1
Gilles Peskine47a89332021-01-12 00:00:15 +0100631#define PSA_WANT_KEY_TYPE_HMAC
Andrzej Kurek65bf73e2022-08-31 14:59:31 -0400632
633#if defined(MBEDTLS_MD_C)
John Durkopd62b6782020-11-30 21:06:05 -0800634#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
635#define PSA_WANT_ALG_TLS12_PRF 1
636#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
637#define PSA_WANT_ALG_TLS12_PSK_TO_MS 1
Andrzej Kurek08d34b82022-07-29 10:00:16 -0400638#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_ECJPAKE_TO_PMS 1
639#define PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS 1
John Durkopd62b6782020-11-30 21:06:05 -0800640#endif /* MBEDTLS_MD_C */
641
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100642#if defined(MBEDTLS_MD5_C)
643#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
644#define PSA_WANT_ALG_MD5 1
645#endif
646
647#if defined(MBEDTLS_RIPEMD160_C)
648#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
649#define PSA_WANT_ALG_RIPEMD160 1
650#endif
651
John Durkopd62b6782020-11-30 21:06:05 -0800652#if defined(MBEDTLS_RSA_C)
653#if defined(MBEDTLS_PKCS1_V15)
654#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
655#define PSA_WANT_ALG_RSA_PKCS1V15_CRYPT 1
656#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
657#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN 1
Gilles Peskine1231eb52021-04-19 22:24:23 +0200658#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW 1
Yuto Takano7828ca22021-08-10 11:26:15 +0100659#endif /* MBEDTLS_PKCS1_V15 */
John Durkopd62b6782020-11-30 21:06:05 -0800660#if defined(MBEDTLS_PKCS1_V21)
661#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
662#define PSA_WANT_ALG_RSA_OAEP 1
663#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
664#define PSA_WANT_ALG_RSA_PSS 1
665#endif /* MBEDTLS_PKCS1_V21 */
666#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR 1
667#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR 1
668#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
669#define PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY 1
670#endif /* MBEDTLS_RSA_C */
671
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100672#if defined(MBEDTLS_SHA1_C)
673#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
674#define PSA_WANT_ALG_SHA_1 1
675#endif
676
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200677#if defined(MBEDTLS_SHA224_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100678#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
Gilles Peskineb65db072021-01-12 00:00:53 +0100679#define PSA_WANT_ALG_SHA_224 1
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200680#endif
681
682#if defined(MBEDTLS_SHA256_C)
683#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100684#define PSA_WANT_ALG_SHA_256 1
685#endif
686
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200687#if defined(MBEDTLS_SHA384_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100688#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
689#define PSA_WANT_ALG_SHA_384 1
690#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200691
692#if defined(MBEDTLS_SHA512_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100693#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
694#define PSA_WANT_ALG_SHA_512 1
695#endif
696
David Brown94933082021-01-05 12:03:25 -0700697#if defined(MBEDTLS_AES_C)
698#define PSA_WANT_KEY_TYPE_AES 1
David Brownda7dbb72021-01-26 11:44:15 -0700699#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700700#endif
701
Gilles Peskine09c46da2021-10-08 15:48:16 +0200702#if defined(MBEDTLS_ARIA_C)
703#define PSA_WANT_KEY_TYPE_ARIA 1
704#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
705#endif
706
David Brown686e6e82021-01-05 12:03:25 -0700707#if defined(MBEDTLS_CAMELLIA_C)
708#define PSA_WANT_KEY_TYPE_CAMELLIA 1
David Brownda7dbb72021-01-26 11:44:15 -0700709#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700710#endif
711
David Brownb65a7f72021-01-15 12:04:09 -0700712#if defined(MBEDTLS_DES_C)
713#define PSA_WANT_KEY_TYPE_DES 1
David Brownda7dbb72021-01-26 11:44:15 -0700714#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700715#endif
716
David Brownb16727a2021-02-08 16:31:46 -0700717#if defined(MBEDTLS_CHACHA20_C)
718#define PSA_WANT_KEY_TYPE_CHACHA20 1
719#define PSA_WANT_ALG_STREAM_CIPHER 1
720#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
721#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brownac4fa072021-02-08 16:47:35 -0700722#if defined(MBEDTLS_CHACHAPOLY_C)
723#define PSA_WANT_ALG_CHACHA20_POLY1305 1
David Brown86730a82021-02-09 16:24:11 -0700724#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700725#endif
David Brownb16727a2021-02-08 16:31:46 -0700726#endif
727
David Brown99844272021-01-15 12:04:47 -0700728#if defined(MBEDTLS_CIPHER_MODE_CBC)
David Brown10cb81c2021-02-09 16:10:29 -0700729#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700730#define PSA_WANT_ALG_CBC_NO_PADDING 1
731#if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
David Brown12f45f92021-01-26 11:50:36 -0700732#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brown99844272021-01-15 12:04:47 -0700733#define PSA_WANT_ALG_CBC_PKCS7 1
734#endif
735#endif
736
737#if defined(MBEDTLS_AES_C) || defined(MBEDTLS_DES_C) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200738 defined(MBEDTLS_ARIA_C) || defined(MBEDTLS_CAMELLIA_C)
David Brown10cb81c2021-02-09 16:10:29 -0700739#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700740#define PSA_WANT_ALG_ECB_NO_PADDING 1
741#endif
742
743#if defined(MBEDTLS_CIPHER_MODE_CFB)
David Brown12f45f92021-01-26 11:50:36 -0700744#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700745#define PSA_WANT_ALG_CFB 1
746#endif
747
748#if defined(MBEDTLS_CIPHER_MODE_CTR)
David Brown12f45f92021-01-26 11:50:36 -0700749#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700750#define PSA_WANT_ALG_CTR 1
751#endif
752
753#if defined(MBEDTLS_CIPHER_MODE_OFB)
David Brown12f45f92021-01-26 11:50:36 -0700754#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700755#define PSA_WANT_ALG_OFB 1
756#endif
757
David Browneed74df2021-03-15 15:53:57 -0600758#if defined(MBEDTLS_ECP_DP_BP256R1_ENABLED)
759#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
760#define PSA_WANT_ECC_BRAINPOOL_P_R1_256
761#endif
762
763#if defined(MBEDTLS_ECP_DP_BP384R1_ENABLED)
764#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
765#define PSA_WANT_ECC_BRAINPOOL_P_R1_384
766#endif
767
768#if defined(MBEDTLS_ECP_DP_BP512R1_ENABLED)
769#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
770#define PSA_WANT_ECC_BRAINPOOL_P_R1_512
771#endif
772
773#if defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED)
774#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
775#define PSA_WANT_ECC_MONTGOMERY_255
776#endif
777
Archanaef6aa5c2021-06-08 11:40:10 +0530778#if defined(MBEDTLS_ECP_DP_CURVE448_ENABLED)
David Browneed74df2021-03-15 15:53:57 -0600779#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
780#define PSA_WANT_ECC_MONTGOMERY_448
781#endif
782
David Brown8de143e2021-02-19 14:08:00 -0700783#if defined(MBEDTLS_ECP_DP_SECP192R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700784#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
785#define PSA_WANT_ECC_SECP_R1_192
David Brown8de143e2021-02-19 14:08:00 -0700786#endif
787
788#if defined(MBEDTLS_ECP_DP_SECP224R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700789#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
790#define PSA_WANT_ECC_SECP_R1_224
David Brown8de143e2021-02-19 14:08:00 -0700791#endif
792
793#if defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700794#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
795#define PSA_WANT_ECC_SECP_R1_256
David Brown8de143e2021-02-19 14:08:00 -0700796#endif
797
798#if defined(MBEDTLS_ECP_DP_SECP384R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700799#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
800#define PSA_WANT_ECC_SECP_R1_384
David Brown8de143e2021-02-19 14:08:00 -0700801#endif
802
803#if defined(MBEDTLS_ECP_DP_SECP521R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700804#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
805#define PSA_WANT_ECC_SECP_R1_521
David Brown8de143e2021-02-19 14:08:00 -0700806#endif
807
808#if defined(MBEDTLS_ECP_DP_SECP192K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700809#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
810#define PSA_WANT_ECC_SECP_K1_192
David Brown8de143e2021-02-19 14:08:00 -0700811#endif
812
Dave Rodgman017a1992022-03-31 14:07:01 +0100813/* SECP224K1 is buggy via the PSA API (https://github.com/Mbed-TLS/mbedtls/issues/3541) */
Gilles Peskine39841302021-03-23 12:06:45 +0100814#if 0 && defined(MBEDTLS_ECP_DP_SECP224K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700815#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
816#define PSA_WANT_ECC_SECP_K1_224
David Brown8de143e2021-02-19 14:08:00 -0700817#endif
818
David Brown9b178de2021-03-10 13:14:48 -0700819#if defined(MBEDTLS_ECP_DP_SECP256K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700820#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
821#define PSA_WANT_ECC_SECP_K1_256
David Brown8de143e2021-02-19 14:08:00 -0700822#endif
823
John Durkop2dfaf9c2020-09-24 04:30:10 -0700824#endif /* MBEDTLS_PSA_CRYPTO_CONFIG */
John Durkopd8959392020-09-20 23:09:17 -0700825
Gilles Peskine60b29fe2021-02-16 14:06:50 +0100826/* These features are always enabled. */
827#define PSA_WANT_KEY_TYPE_DERIVE 1
828#define PSA_WANT_KEY_TYPE_RAW_DATA 1
829
John Durkop6e33dbe2020-09-17 21:15:13 -0700830#ifdef __cplusplus
831}
832#endif
833
834#endif /* MBEDTLS_CONFIG_PSA_H */