blob: 87997c3891b816932ae7090b66f93a051eed6891 [file] [log] [blame]
John Durkop6e33dbe2020-09-17 21:15:13 -07001/**
2 * \file mbedtls/config_psa.h
3 * \brief PSA crypto configuration options (set of defines)
4 *
John Durkop34818822020-10-12 21:36:22 -07005 * This set of compile-time options takes settings defined in
Bence Szépkútibb0cfeb2021-05-28 09:42:25 +02006 * include/mbedtls/mbedtls_config.h and include/psa/crypto_config.h and uses
John Durkop34818822020-10-12 21:36:22 -07007 * those definitions to define symbols used in the library code.
8 *
9 * Users and integrators should not edit this file, please edit
Bence Szépkútibb0cfeb2021-05-28 09:42:25 +020010 * include/mbedtls/mbedtls_config.h for MBETLS_XXX settings or
John Durkop34818822020-10-12 21:36:22 -070011 * include/psa/crypto_config.h for PSA_WANT_XXX settings.
John Durkop6e33dbe2020-09-17 21:15:13 -070012 */
13/*
14 * Copyright The Mbed TLS Contributors
15 * SPDX-License-Identifier: Apache-2.0
16 *
17 * Licensed under the Apache License, Version 2.0 (the "License"); you may
18 * not use this file except in compliance with the License.
19 * You may obtain a copy of the License at
20 *
21 * http://www.apache.org/licenses/LICENSE-2.0
22 *
23 * Unless required by applicable law or agreed to in writing, software
24 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
25 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
26 * See the License for the specific language governing permissions and
27 * limitations under the License.
28 */
29
30#ifndef MBEDTLS_CONFIG_PSA_H
31#define MBEDTLS_CONFIG_PSA_H
32
John Durkop714e3a12020-09-29 22:07:04 -070033#if defined(MBEDTLS_PSA_CRYPTO_CONFIG)
John Durkop6e33dbe2020-09-17 21:15:13 -070034#include "psa/crypto_config.h"
John Durkop76228ac2020-09-29 22:33:49 -070035#endif /* defined(MBEDTLS_PSA_CRYPTO_CONFIG) */
John Durkop6e33dbe2020-09-17 21:15:13 -070036
37#ifdef __cplusplus
38extern "C" {
39#endif
40
Gilles Peskine1231eb52021-04-19 22:24:23 +020041
42
43/****************************************************************/
44/* De facto synonyms */
45/****************************************************************/
46
47#if defined(PSA_WANT_ALG_ECDSA_ANY) && !defined(PSA_WANT_ALG_ECDSA)
48#define PSA_WANT_ALG_ECDSA PSA_WANT_ALG_ECDSA_ANY
49#elif !defined(PSA_WANT_ALG_ECDSA_ANY) && defined(PSA_WANT_ALG_ECDSA)
50#define PSA_WANT_ALG_ECDSA_ANY PSA_WANT_ALG_ECDSA
51#endif
52
53#if defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW) && !defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
54#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW
55#elif !defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW) && defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
56#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW PSA_WANT_ALG_RSA_PKCS1V15_SIGN
57#endif
58
59
60
61/****************************************************************/
62/* Require built-in implementations based on PSA requirements */
63/****************************************************************/
64
John Durkop2dfaf9c2020-09-24 04:30:10 -070065#if defined(MBEDTLS_PSA_CRYPTO_CONFIG)
John Durkopd8959392020-09-20 23:09:17 -070066
John Durkopd62b6782020-11-30 21:06:05 -080067#if defined(PSA_WANT_ALG_DETERMINISTIC_ECDSA)
68#if !defined(MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA)
69#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
70#define MBEDTLS_ECDSA_DETERMINISTIC
71#define MBEDTLS_ECDSA_C
72#define MBEDTLS_HMAC_DRBG_C
73#define MBEDTLS_MD_C
74#endif /* !MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA */
75#endif /* PSA_WANT_ALG_DETERMINISTIC_ECDSA */
76
77#if defined(PSA_WANT_ALG_ECDH)
78#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDH)
79#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
80#define MBEDTLS_ECDH_C
81#define MBEDTLS_ECP_C
82#define MBEDTLS_BIGNUM_C
83#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDH */
84#endif /* PSA_WANT_ALG_ECDH */
85
86#if defined(PSA_WANT_ALG_ECDSA)
87#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDSA)
88#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
89#define MBEDTLS_ECDSA_C
90#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDSA */
91#endif /* PSA_WANT_ALG_ECDSA */
92
93#if defined(PSA_WANT_ALG_HKDF)
94#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF)
95#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
96#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
97#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF */
98#endif /* PSA_WANT_ALG_HKDF */
99
100#if defined(PSA_WANT_ALG_HMAC)
101#if !defined(MBEDTLS_PSA_ACCEL_ALG_HMAC)
102#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
103#endif /* !MBEDTLS_PSA_ACCEL_ALG_HMAC */
104#endif /* PSA_WANT_ALG_HMAC */
105
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100106#if defined(PSA_WANT_ALG_MD5) && !defined(MBEDTLS_PSA_ACCEL_ALG_MD5)
107#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
108#define MBEDTLS_MD5_C
109#endif
110
111#if defined(PSA_WANT_ALG_RIPEMD160) && !defined(MBEDTLS_PSA_ACCEL_ALG_RIPEMD160)
112#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
113#define MBEDTLS_RIPEMD160_C
114#endif
115
John Durkopd62b6782020-11-30 21:06:05 -0800116#if defined(PSA_WANT_ALG_RSA_OAEP)
117#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP)
118#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
119#define MBEDTLS_RSA_C
120#define MBEDTLS_BIGNUM_C
121#define MBEDTLS_OID_C
122#define MBEDTLS_PKCS1_V21
123#define MBEDTLS_MD_C
124#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP */
125#endif /* PSA_WANT_ALG_RSA_OAEP */
126
127#if defined(PSA_WANT_ALG_RSA_PKCS1V15_CRYPT)
128#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT)
129#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
130#define MBEDTLS_RSA_C
131#define MBEDTLS_BIGNUM_C
132#define MBEDTLS_OID_C
133#define MBEDTLS_PKCS1_V15
134#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT */
135#endif /* PSA_WANT_ALG_RSA_PKCS1V15_CRYPT */
136
137#if defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
138#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN)
139#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
140#define MBEDTLS_RSA_C
141#define MBEDTLS_BIGNUM_C
142#define MBEDTLS_OID_C
143#define MBEDTLS_PKCS1_V15
144#define MBEDTLS_MD_C
145#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN */
146#endif /* PSA_WANT_ALG_RSA_PKCS1V15_SIGN */
147
148#if defined(PSA_WANT_ALG_RSA_PSS)
149#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PSS)
150#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
151#define MBEDTLS_RSA_C
152#define MBEDTLS_BIGNUM_C
153#define MBEDTLS_OID_C
154#define MBEDTLS_PKCS1_V21
155#define MBEDTLS_MD_C
156#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PSS */
157#endif /* PSA_WANT_ALG_RSA_PSS */
158
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100159#if defined(PSA_WANT_ALG_SHA_1) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_1)
160#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
161#define MBEDTLS_SHA1_C
162#endif
163
164#if defined(PSA_WANT_ALG_SHA_224) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_224)
165#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200166#define MBEDTLS_SHA224_C
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100167#endif
168
169#if defined(PSA_WANT_ALG_SHA_256) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_256)
170#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
171#define MBEDTLS_SHA256_C
172#endif
173
174#if defined(PSA_WANT_ALG_SHA_384) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_384)
175#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200176#define MBEDTLS_SHA384_C
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100177#endif
178
179#if defined(PSA_WANT_ALG_SHA_512) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_512)
180#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
181#define MBEDTLS_SHA512_C
182#endif
183
John Durkop07cc04a2020-11-16 22:08:34 -0800184#if defined(PSA_WANT_ALG_TLS12_PRF)
185#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF)
John Durkopd62b6782020-11-30 21:06:05 -0800186#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
John Durkop07cc04a2020-11-16 22:08:34 -0800187#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF */
188#endif /* PSA_WANT_ALG_TLS12_PRF */
189
190#if defined(PSA_WANT_ALG_TLS12_PSK_TO_MS)
191#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS)
John Durkopd62b6782020-11-30 21:06:05 -0800192#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
John Durkop07cc04a2020-11-16 22:08:34 -0800193#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS */
194#endif /* PSA_WANT_ALG_TLS12_PSK_TO_MS */
195
196#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR)
197#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR)
John Durkopd62b6782020-11-30 21:06:05 -0800198#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR 1
John Durkop07cc04a2020-11-16 22:08:34 -0800199#define MBEDTLS_ECP_C
200#define MBEDTLS_BIGNUM_C
201#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR */
202#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR */
203
204#if defined(PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY)
205#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800206#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
John Durkop07cc04a2020-11-16 22:08:34 -0800207#define MBEDTLS_ECP_C
208#define MBEDTLS_BIGNUM_C
209#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY */
210#endif /* PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY */
211
John Durkop9814fa22020-11-04 12:28:15 -0800212#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR)
John Durkop0e005192020-10-31 22:06:54 -0700213#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR)
John Durkopd62b6782020-11-30 21:06:05 -0800214#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR 1
John Durkop0e005192020-10-31 22:06:54 -0700215#define MBEDTLS_RSA_C
216#define MBEDTLS_BIGNUM_C
217#define MBEDTLS_OID_C
218#define MBEDTLS_GENPRIME
John Durkop07cc04a2020-11-16 22:08:34 -0800219#define MBEDTLS_PK_PARSE_C
220#define MBEDTLS_PK_WRITE_C
221#define MBEDTLS_PK_C
John Durkop0e005192020-10-31 22:06:54 -0700222#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR */
John Durkop9814fa22020-11-04 12:28:15 -0800223#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR */
224
225#if defined(PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkop0e005192020-10-31 22:06:54 -0700226#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800227#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
John Durkop0e005192020-10-31 22:06:54 -0700228#define MBEDTLS_RSA_C
229#define MBEDTLS_BIGNUM_C
230#define MBEDTLS_OID_C
John Durkop07cc04a2020-11-16 22:08:34 -0800231#define MBEDTLS_PK_PARSE_C
232#define MBEDTLS_PK_WRITE_C
233#define MBEDTLS_PK_C
John Durkop0e005192020-10-31 22:06:54 -0700234#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkop9814fa22020-11-04 12:28:15 -0800235#endif /* PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkopd0321952020-10-29 21:37:36 -0700236
David Brownb781f752021-02-08 15:44:52 -0700237/* If any of the block modes are requested that don't have an
238 * associated HW assist, define PSA_HAVE_SOFT_BLOCK_MODE for checking
239 * in the block cipher key types. */
240#if (defined(PSA_WANT_ALG_CTR) && !defined(MBEDTLS_PSA_ACCEL_ALG_CTR)) || \
Bence Szépkúti7921cce2021-02-17 11:46:50 +0100241 (defined(PSA_WANT_ALG_CFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_CFB)) || \
David Brownb781f752021-02-08 15:44:52 -0700242 (defined(PSA_WANT_ALG_OFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_OFB)) || \
243 (defined(PSA_WANT_ALG_XTS) && !defined(MBEDTLS_PSA_ACCEL_ALG_XTS)) || \
244 defined(PSA_WANT_ALG_ECB_NO_PADDING) || \
245 (defined(PSA_WANT_ALG_CBC_NO_PADDING) && \
246 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING)) || \
247 (defined(PSA_WANT_ALG_CBC_PKCS7) && \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100248 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7)) || \
249 (defined(PSA_WANT_ALG_CMAC) && !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC))
David Brownb781f752021-02-08 15:44:52 -0700250#define PSA_HAVE_SOFT_BLOCK_MODE 1
251#endif
252
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100253#if (defined(PSA_WANT_ALG_GCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_GCM)) || \
254 (defined(PSA_WANT_ALG_CCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_CCM))
255#define PSA_HAVE_SOFT_BLOCK_AEAD 1
256#endif
257
David Brown94933082021-01-05 12:03:25 -0700258#if defined(PSA_WANT_KEY_TYPE_AES)
David Browne1f91f02021-02-09 15:56:22 -0700259#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_AES)
260#define PSA_HAVE_SOFT_KEY_TYPE_AES 1
261#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_AES */
262#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100263 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
264 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
David Brown78a429b2021-01-21 09:48:57 -0700265#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700266#define MBEDTLS_AES_C
David Browne1f91f02021-02-09 15:56:22 -0700267#endif /* PSA_HAVE_SOFT_KEY_TYPE_AES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown94933082021-01-05 12:03:25 -0700268#endif /* PSA_WANT_KEY_TYPE_AES */
269
Gilles Peskine09c46da2021-10-08 15:48:16 +0200270#if defined(PSA_WANT_KEY_TYPE_ARIA)
271#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA)
272#define PSA_HAVE_SOFT_KEY_TYPE_ARIA 1
273#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA */
274#if defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
275 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
276 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
277#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
278#define MBEDTLS_ARIA_C
279#endif /* PSA_HAVE_SOFT_KEY_TYPE_ARIA || PSA_HAVE_SOFT_BLOCK_MODE */
280#endif /* PSA_WANT_KEY_TYPE_ARIA */
281
David Brown686e6e82021-01-05 12:03:25 -0700282#if defined(PSA_WANT_KEY_TYPE_CAMELLIA)
David Browne1f91f02021-02-09 15:56:22 -0700283#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA)
284#define PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA 1
285#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA */
286#if defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100287 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
288 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
David Brown78a429b2021-01-21 09:48:57 -0700289#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700290#define MBEDTLS_CAMELLIA_C
David Browne1f91f02021-02-09 15:56:22 -0700291#endif /* PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown686e6e82021-01-05 12:03:25 -0700292#endif /* PSA_WANT_KEY_TYPE_CAMELLIA */
293
David Brownb65a7f72021-01-15 12:04:09 -0700294#if defined(PSA_WANT_KEY_TYPE_DES)
David Browne1f91f02021-02-09 15:56:22 -0700295#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DES)
296#define PSA_HAVE_SOFT_KEY_TYPE_DES 1
297#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DES */
298#if defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
David Brownb781f752021-02-08 15:44:52 -0700299 defined(PSA_HAVE_SOFT_BLOCK_MODE)
David Brown78a429b2021-01-21 09:48:57 -0700300#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700301#define MBEDTLS_DES_C
David Browne1f91f02021-02-09 15:56:22 -0700302#endif /*PSA_HAVE_SOFT_KEY_TYPE_DES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brownb65a7f72021-01-15 12:04:09 -0700303#endif /* PSA_WANT_KEY_TYPE_DES */
304
David Brownb16727a2021-02-08 16:31:46 -0700305#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
306#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20)
307#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
308#define MBEDTLS_CHACHA20_C
309#endif /*!MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20 */
310#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
311
David Brownf84a0f62021-02-09 15:59:41 -0700312/* If any of the software block ciphers are selected, define
313 * PSA_HAVE_SOFT_BLOCK_CIPHER, which can be used in any of these
314 * situations. */
315#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200316 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
David Brownf84a0f62021-02-09 15:59:41 -0700317 defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
318 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
319#define PSA_HAVE_SOFT_BLOCK_CIPHER 1
320#endif
321
David Brown99844272021-01-15 12:04:47 -0700322#if defined(PSA_WANT_ALG_STREAM_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700323#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brown99844272021-01-15 12:04:47 -0700324#endif /* PSA_WANT_ALG_STREAM_CIPHER */
325
Ronald Crond85e98d2021-03-25 15:32:32 +0100326#if defined(PSA_WANT_ALG_CBC_MAC)
327#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_MAC)
328#error "CBC-MAC is not yet supported via the PSA API in Mbed TLS."
329#define MBEDTLS_PSA_BUILTIN_ALG_CBC_MAC 1
330#endif /* !MBEDTLS_PSA_ACCEL_ALG_CBC_MAC */
331#endif /* PSA_WANT_ALG_CBC_MAC */
332
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100333#if defined(PSA_WANT_ALG_CMAC)
334#if !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC) || \
335 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
336#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
337#define MBEDTLS_CMAC_C
338#endif /* !MBEDTLS_PSA_ACCEL_ALG_CMAC */
339#endif /* PSA_WANT_ALG_CMAC */
340
David Brown99844272021-01-15 12:04:47 -0700341#if defined(PSA_WANT_ALG_CTR)
David Brown4b9ec7a2021-02-05 12:47:08 -0700342#if !defined(MBEDTLS_PSA_ACCEL_ALG_CTR) || \
David Brownf84a0f62021-02-09 15:59:41 -0700343 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700344#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700345#define MBEDTLS_CIPHER_MODE_CTR
David Brown4b9ec7a2021-02-05 12:47:08 -0700346#endif
David Brown99844272021-01-15 12:04:47 -0700347#endif /* PSA_WANT_ALG_CTR */
348
349#if defined(PSA_WANT_ALG_CFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700350#if !defined(MBEDTLS_PSA_ACCEL_ALG_CFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700351 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700352#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700353#define MBEDTLS_CIPHER_MODE_CFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700354#endif
David Brown99844272021-01-15 12:04:47 -0700355#endif /* PSA_WANT_ALG_CFB */
356
357#if defined(PSA_WANT_ALG_OFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700358#if !defined(MBEDTLS_PSA_ACCEL_ALG_OFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700359 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700360#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700361#define MBEDTLS_CIPHER_MODE_OFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700362#endif
David Brown99844272021-01-15 12:04:47 -0700363#endif /* PSA_WANT_ALG_OFB */
364
365#if defined(PSA_WANT_ALG_XTS)
David Brown4b9ec7a2021-02-05 12:47:08 -0700366#if !defined(MBEDTLS_PSA_ACCEL_ALG_XTS) || \
David Brownf84a0f62021-02-09 15:59:41 -0700367 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700368#define MBEDTLS_PSA_BUILTIN_ALG_XTS 1
David Brown99844272021-01-15 12:04:47 -0700369#define MBEDTLS_CIPHER_MODE_XTS
David Brown4b9ec7a2021-02-05 12:47:08 -0700370#endif
David Brown99844272021-01-15 12:04:47 -0700371#endif /* PSA_WANT_ALG_XTS */
372
373#if defined(PSA_WANT_ALG_ECB_NO_PADDING)
David Brownbe380c12021-02-11 10:55:48 -0700374#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700375#endif
376
David Brown12f45f92021-01-26 11:50:36 -0700377#if defined(PSA_WANT_ALG_CBC_NO_PADDING)
David Brown4b9ec7a2021-02-05 12:47:08 -0700378#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING) || \
David Brownfc468182021-02-09 16:23:34 -0700379 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700380#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700381#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown4b9ec7a2021-02-05 12:47:08 -0700382#endif
David Brown12f45f92021-01-26 11:50:36 -0700383#endif /* PSA_WANT_ALG_CBC_NO_PADDING */
384
385#if defined(PSA_WANT_ALG_CBC_PKCS7)
David Brown4b9ec7a2021-02-05 12:47:08 -0700386#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7) || \
David Brownfc468182021-02-09 16:23:34 -0700387 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700388#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700389#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brownfc468182021-02-09 16:23:34 -0700390#define MBEDTLS_CIPHER_PADDING_PKCS7
David Brown4b9ec7a2021-02-05 12:47:08 -0700391#endif
David Brown12f45f92021-01-26 11:50:36 -0700392#endif /* PSA_WANT_ALG_CBC_PKCS7 */
393
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100394#if defined(PSA_WANT_ALG_CCM)
395#if !defined(MBEDTLS_PSA_ACCEL_ALG_CCM) || \
396 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200397 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100398 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
399#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
400#define MBEDTLS_CCM_C
401#endif
402#endif /* PSA_WANT_ALG_CCM */
403
404#if defined(PSA_WANT_ALG_GCM)
405#if !defined(MBEDTLS_PSA_ACCEL_ALG_GCM) || \
406 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200407 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100408 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
409#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
410#define MBEDTLS_GCM_C
411#endif
412#endif /* PSA_WANT_ALG_GCM */
413
David Brownac4fa072021-02-08 16:47:35 -0700414#if defined(PSA_WANT_ALG_CHACHA20_POLY1305)
415#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
416#define MBEDTLS_CHACHAPOLY_C
David Brown86730a82021-02-09 16:24:11 -0700417#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700418#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
419#endif /* PSA_WANT_ALG_CHACHA20_POLY1305 */
420
David Browneed74df2021-03-15 15:53:57 -0600421#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_256)
422#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256)
423#define MBEDTLS_ECP_DP_BP256R1_ENABLED
424#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
425#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256 */
426#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_256 */
427
428#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_384)
429#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384)
430#define MBEDTLS_ECP_DP_BP384R1_ENABLED
431#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
432#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384 */
433#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_384 */
434
435#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_512)
436#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512)
437#define MBEDTLS_ECP_DP_BP512R1_ENABLED
438#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
439#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512 */
440#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_512 */
441
442#if defined(PSA_WANT_ECC_MONTGOMERY_255)
443#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255)
444#define MBEDTLS_ECP_DP_CURVE25519_ENABLED
445#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
446#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255 */
447#endif /* PSA_WANT_ECC_MONTGOMERY_255 */
448
449#if defined(PSA_WANT_ECC_MONTGOMERY_448)
450#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448)
451#define MBEDTLS_ECP_DP_CURVE448_ENABLED
452#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
453#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448 */
454#endif /* PSA_WANT_ECC_MONTGOMERY_448 */
455
David Brownc7b9b2b2021-02-19 21:05:52 -0700456#if defined(PSA_WANT_ECC_SECP_R1_192)
457#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192)
458#define MBEDTLS_ECP_DP_SECP192R1_ENABLED
459#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
460#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192 */
461#endif /* PSA_WANT_ECC_SECP_R1_192 */
462
463#if defined(PSA_WANT_ECC_SECP_R1_224)
464#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224)
465#define MBEDTLS_ECP_DP_SECP224R1_ENABLED
466#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
467#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224 */
468#endif /* PSA_WANT_ECC_SECP_R1_224 */
469
470#if defined(PSA_WANT_ECC_SECP_R1_256)
471#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256)
472#define MBEDTLS_ECP_DP_SECP256R1_ENABLED
473#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
474#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256 */
475#endif /* PSA_WANT_ECC_SECP_R1_256 */
476
477#if defined(PSA_WANT_ECC_SECP_R1_384)
478#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384)
479#define MBEDTLS_ECP_DP_SECP384R1_ENABLED
480#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
481#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384 */
482#endif /* PSA_WANT_ECC_SECP_R1_384 */
483
484#if defined(PSA_WANT_ECC_SECP_R1_521)
485#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521)
486#define MBEDTLS_ECP_DP_SECP521R1_ENABLED
487#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
488#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521 */
489#endif /* PSA_WANT_ECC_SECP_R1_521 */
490
491#if defined(PSA_WANT_ECC_SECP_K1_192)
492#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192)
David Brown8de143e2021-02-19 14:08:00 -0700493#define MBEDTLS_ECP_DP_SECP192K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700494#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
495#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192 */
496#endif /* PSA_WANT_ECC_SECP_K1_192 */
David Brown8de143e2021-02-19 14:08:00 -0700497
David Brownc7b9b2b2021-02-19 21:05:52 -0700498#if defined(PSA_WANT_ECC_SECP_K1_224)
499#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224)
Ronald Crone1f55162021-03-25 15:09:47 +0100500/*
501 * SECP224K1 is buggy via the PSA API in Mbed TLS
502 * (https://github.com/ARMmbed/mbedtls/issues/3541).
503 */
504#error "SECP224K1 is buggy via the PSA API in Mbed TLS."
David Brown8de143e2021-02-19 14:08:00 -0700505#define MBEDTLS_ECP_DP_SECP224K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700506#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
507#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224 */
508#endif /* PSA_WANT_ECC_SECP_K1_224 */
David Brown8de143e2021-02-19 14:08:00 -0700509
David Brownc7b9b2b2021-02-19 21:05:52 -0700510#if defined(PSA_WANT_ECC_SECP_K1_256)
511#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256)
David Brown9b178de2021-03-10 13:14:48 -0700512#define MBEDTLS_ECP_DP_SECP256K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700513#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
514#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256 */
515#endif /* PSA_WANT_ECC_SECP_K1_256 */
David Brown8de143e2021-02-19 14:08:00 -0700516
Gilles Peskine1231eb52021-04-19 22:24:23 +0200517
518
519/****************************************************************/
520/* Infer PSA requirements from Mbed TLS capabilities */
521/****************************************************************/
522
John Durkop714e3a12020-09-29 22:07:04 -0700523#else /* MBEDTLS_PSA_CRYPTO_CONFIG */
524
525/*
526 * Ensure PSA_WANT_* defines are setup properly if MBEDTLS_PSA_CRYPTO_CONFIG
527 * is not defined
528 */
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100529
Ronald Cron3d471812021-03-18 13:40:31 +0100530#if defined(MBEDTLS_CCM_C)
531#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
532#define PSA_WANT_ALG_CCM 1
533#endif /* MBEDTLS_CCM_C */
534
535#if defined(MBEDTLS_CMAC_C)
536#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
537#define PSA_WANT_ALG_CMAC 1
538#endif /* MBEDTLS_CMAC_C */
539
John Durkopd62b6782020-11-30 21:06:05 -0800540#if defined(MBEDTLS_ECDH_C)
541#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
542#define PSA_WANT_ALG_ECDH 1
543#endif /* MBEDTLS_ECDH_C */
544
545#if defined(MBEDTLS_ECDSA_C)
546#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
547#define PSA_WANT_ALG_ECDSA 1
Gilles Peskine1231eb52021-04-19 22:24:23 +0200548#define PSA_WANT_ALG_ECDSA_ANY 1
John Durkopd62b6782020-11-30 21:06:05 -0800549
550// Only add in DETERMINISTIC support if ECDSA is also enabled
551#if defined(MBEDTLS_ECDSA_DETERMINISTIC)
552#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
553#define PSA_WANT_ALG_DETERMINISTIC_ECDSA 1
554#endif /* MBEDTLS_ECDSA_DETERMINISTIC */
555
556#endif /* MBEDTLS_ECDSA_C */
557
558#if defined(MBEDTLS_ECP_C)
559#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR 1
560#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR 1
561#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
562#define PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY 1
563#endif /* MBEDTLS_ECP_C */
564
Ronald Cron3d471812021-03-18 13:40:31 +0100565#if defined(MBEDTLS_GCM_C)
566#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
567#define PSA_WANT_ALG_GCM 1
568#endif /* MBEDTLS_GCM_C */
569
John Durkopd62b6782020-11-30 21:06:05 -0800570#if defined(MBEDTLS_HKDF_C)
571#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
572#define PSA_WANT_ALG_HMAC 1
573#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
574#define PSA_WANT_ALG_HKDF 1
575#endif /* MBEDTLS_HKDF_C */
576
577#if defined(MBEDTLS_MD_C)
578#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
579#define PSA_WANT_ALG_HMAC 1
Gilles Peskine47a89332021-01-12 00:00:15 +0100580#define PSA_WANT_KEY_TYPE_HMAC
John Durkopd62b6782020-11-30 21:06:05 -0800581#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
582#define PSA_WANT_ALG_TLS12_PRF 1
583#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
584#define PSA_WANT_ALG_TLS12_PSK_TO_MS 1
585#endif /* MBEDTLS_MD_C */
586
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100587#if defined(MBEDTLS_MD5_C)
588#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
589#define PSA_WANT_ALG_MD5 1
590#endif
591
592#if defined(MBEDTLS_RIPEMD160_C)
593#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
594#define PSA_WANT_ALG_RIPEMD160 1
595#endif
596
John Durkopd62b6782020-11-30 21:06:05 -0800597#if defined(MBEDTLS_RSA_C)
598#if defined(MBEDTLS_PKCS1_V15)
599#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
600#define PSA_WANT_ALG_RSA_PKCS1V15_CRYPT 1
601#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
602#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN 1
Gilles Peskine1231eb52021-04-19 22:24:23 +0200603#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW 1
John Durkopd62b6782020-11-30 21:06:05 -0800604#endif /* MBEDTLSS_PKCS1_V15 */
605#if defined(MBEDTLS_PKCS1_V21)
606#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
607#define PSA_WANT_ALG_RSA_OAEP 1
608#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
609#define PSA_WANT_ALG_RSA_PSS 1
610#endif /* MBEDTLS_PKCS1_V21 */
611#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR 1
612#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR 1
613#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
614#define PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY 1
615#endif /* MBEDTLS_RSA_C */
616
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100617#if defined(MBEDTLS_SHA1_C)
618#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
619#define PSA_WANT_ALG_SHA_1 1
620#endif
621
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200622#if defined(MBEDTLS_SHA224_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100623#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
Gilles Peskineb65db072021-01-12 00:00:53 +0100624#define PSA_WANT_ALG_SHA_224 1
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200625#endif
626
627#if defined(MBEDTLS_SHA256_C)
628#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100629#define PSA_WANT_ALG_SHA_256 1
630#endif
631
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200632#if defined(MBEDTLS_SHA384_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100633#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
634#define PSA_WANT_ALG_SHA_384 1
635#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200636
637#if defined(MBEDTLS_SHA512_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100638#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
639#define PSA_WANT_ALG_SHA_512 1
640#endif
641
David Brown94933082021-01-05 12:03:25 -0700642#if defined(MBEDTLS_AES_C)
643#define PSA_WANT_KEY_TYPE_AES 1
David Brownda7dbb72021-01-26 11:44:15 -0700644#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700645#endif
646
Gilles Peskine09c46da2021-10-08 15:48:16 +0200647#if defined(MBEDTLS_ARIA_C)
648#define PSA_WANT_KEY_TYPE_ARIA 1
649#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
650#endif
651
David Brown686e6e82021-01-05 12:03:25 -0700652#if defined(MBEDTLS_CAMELLIA_C)
653#define PSA_WANT_KEY_TYPE_CAMELLIA 1
David Brownda7dbb72021-01-26 11:44:15 -0700654#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700655#endif
656
David Brownb65a7f72021-01-15 12:04:09 -0700657#if defined(MBEDTLS_DES_C)
658#define PSA_WANT_KEY_TYPE_DES 1
David Brownda7dbb72021-01-26 11:44:15 -0700659#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700660#endif
661
David Brownb16727a2021-02-08 16:31:46 -0700662#if defined(MBEDTLS_CHACHA20_C)
663#define PSA_WANT_KEY_TYPE_CHACHA20 1
664#define PSA_WANT_ALG_STREAM_CIPHER 1
665#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
666#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brownac4fa072021-02-08 16:47:35 -0700667#if defined(MBEDTLS_CHACHAPOLY_C)
668#define PSA_WANT_ALG_CHACHA20_POLY1305 1
David Brown86730a82021-02-09 16:24:11 -0700669#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700670#endif
David Brownb16727a2021-02-08 16:31:46 -0700671#endif
672
David Brown99844272021-01-15 12:04:47 -0700673#if defined(MBEDTLS_CIPHER_MODE_CBC)
David Brown10cb81c2021-02-09 16:10:29 -0700674#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700675#define PSA_WANT_ALG_CBC_NO_PADDING 1
676#if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
David Brown12f45f92021-01-26 11:50:36 -0700677#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brown99844272021-01-15 12:04:47 -0700678#define PSA_WANT_ALG_CBC_PKCS7 1
679#endif
680#endif
681
682#if defined(MBEDTLS_AES_C) || defined(MBEDTLS_DES_C) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200683 defined(MBEDTLS_ARIA_C) || defined(MBEDTLS_CAMELLIA_C)
David Brown10cb81c2021-02-09 16:10:29 -0700684#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700685#define PSA_WANT_ALG_ECB_NO_PADDING 1
686#endif
687
688#if defined(MBEDTLS_CIPHER_MODE_CFB)
David Brown12f45f92021-01-26 11:50:36 -0700689#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700690#define PSA_WANT_ALG_CFB 1
691#endif
692
693#if defined(MBEDTLS_CIPHER_MODE_CTR)
David Brown12f45f92021-01-26 11:50:36 -0700694#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700695#define PSA_WANT_ALG_CTR 1
696#endif
697
698#if defined(MBEDTLS_CIPHER_MODE_OFB)
David Brown12f45f92021-01-26 11:50:36 -0700699#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700700#define PSA_WANT_ALG_OFB 1
701#endif
702
703#if defined(MBEDTLS_CIPHER_MODE_XTS)
David Brown12f45f92021-01-26 11:50:36 -0700704#define MBEDTLS_PSA_BUILTIN_ALG_XTS 1
David Brown99844272021-01-15 12:04:47 -0700705#define PSA_WANT_ALG_XTS 1
706#endif
707
David Browneed74df2021-03-15 15:53:57 -0600708#if defined(MBEDTLS_ECP_DP_BP256R1_ENABLED)
709#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
710#define PSA_WANT_ECC_BRAINPOOL_P_R1_256
711#endif
712
713#if defined(MBEDTLS_ECP_DP_BP384R1_ENABLED)
714#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
715#define PSA_WANT_ECC_BRAINPOOL_P_R1_384
716#endif
717
718#if defined(MBEDTLS_ECP_DP_BP512R1_ENABLED)
719#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
720#define PSA_WANT_ECC_BRAINPOOL_P_R1_512
721#endif
722
723#if defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED)
724#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
725#define PSA_WANT_ECC_MONTGOMERY_255
726#endif
727
Archanaef6aa5c2021-06-08 11:40:10 +0530728#if defined(MBEDTLS_ECP_DP_CURVE448_ENABLED)
David Browneed74df2021-03-15 15:53:57 -0600729#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
730#define PSA_WANT_ECC_MONTGOMERY_448
731#endif
732
David Brown8de143e2021-02-19 14:08:00 -0700733#if defined(MBEDTLS_ECP_DP_SECP192R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700734#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
735#define PSA_WANT_ECC_SECP_R1_192
David Brown8de143e2021-02-19 14:08:00 -0700736#endif
737
738#if defined(MBEDTLS_ECP_DP_SECP224R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700739#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
740#define PSA_WANT_ECC_SECP_R1_224
David Brown8de143e2021-02-19 14:08:00 -0700741#endif
742
743#if defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700744#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
745#define PSA_WANT_ECC_SECP_R1_256
David Brown8de143e2021-02-19 14:08:00 -0700746#endif
747
748#if defined(MBEDTLS_ECP_DP_SECP384R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700749#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
750#define PSA_WANT_ECC_SECP_R1_384
David Brown8de143e2021-02-19 14:08:00 -0700751#endif
752
753#if defined(MBEDTLS_ECP_DP_SECP521R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700754#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
755#define PSA_WANT_ECC_SECP_R1_521
David Brown8de143e2021-02-19 14:08:00 -0700756#endif
757
758#if defined(MBEDTLS_ECP_DP_SECP192K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700759#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
760#define PSA_WANT_ECC_SECP_K1_192
David Brown8de143e2021-02-19 14:08:00 -0700761#endif
762
Gilles Peskine39841302021-03-23 12:06:45 +0100763/* SECP224K1 is buggy via the PSA API (https://github.com/ARMmbed/mbedtls/issues/3541) */
764#if 0 && defined(MBEDTLS_ECP_DP_SECP224K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700765#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
766#define PSA_WANT_ECC_SECP_K1_224
David Brown8de143e2021-02-19 14:08:00 -0700767#endif
768
David Brown9b178de2021-03-10 13:14:48 -0700769#if defined(MBEDTLS_ECP_DP_SECP256K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700770#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
771#define PSA_WANT_ECC_SECP_K1_256
David Brown8de143e2021-02-19 14:08:00 -0700772#endif
773
John Durkop2dfaf9c2020-09-24 04:30:10 -0700774#endif /* MBEDTLS_PSA_CRYPTO_CONFIG */
John Durkopd8959392020-09-20 23:09:17 -0700775
Gilles Peskine60b29fe2021-02-16 14:06:50 +0100776/* These features are always enabled. */
777#define PSA_WANT_KEY_TYPE_DERIVE 1
778#define PSA_WANT_KEY_TYPE_RAW_DATA 1
779
John Durkop6e33dbe2020-09-17 21:15:13 -0700780#ifdef __cplusplus
781}
782#endif
783
784#endif /* MBEDTLS_CONFIG_PSA_H */