blob: 628ce87238d1d17ca69827f716c6fe084cf8ea33 [file] [log] [blame]
John Durkop6e33dbe2020-09-17 21:15:13 -07001/**
2 * \file mbedtls/config_psa.h
3 * \brief PSA crypto configuration options (set of defines)
4 *
John Durkop34818822020-10-12 21:36:22 -07005 * This set of compile-time options takes settings defined in
6 * include/mbedtls/config.h and include/psa/crypto_config.h and uses
7 * those definitions to define symbols used in the library code.
8 *
9 * Users and integrators should not edit this file, please edit
10 * include/mbedtls/config.h for MBETLS_XXX settings or
11 * include/psa/crypto_config.h for PSA_WANT_XXX settings.
John Durkop6e33dbe2020-09-17 21:15:13 -070012 */
13/*
14 * Copyright The Mbed TLS Contributors
15 * SPDX-License-Identifier: Apache-2.0
16 *
17 * Licensed under the Apache License, Version 2.0 (the "License"); you may
18 * not use this file except in compliance with the License.
19 * You may obtain a copy of the License at
20 *
21 * http://www.apache.org/licenses/LICENSE-2.0
22 *
23 * Unless required by applicable law or agreed to in writing, software
24 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
25 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
26 * See the License for the specific language governing permissions and
27 * limitations under the License.
28 */
29
30#ifndef MBEDTLS_CONFIG_PSA_H
31#define MBEDTLS_CONFIG_PSA_H
32
John Durkop714e3a12020-09-29 22:07:04 -070033#if defined(MBEDTLS_PSA_CRYPTO_CONFIG)
John Durkop6e33dbe2020-09-17 21:15:13 -070034#include "psa/crypto_config.h"
John Durkop76228ac2020-09-29 22:33:49 -070035#endif /* defined(MBEDTLS_PSA_CRYPTO_CONFIG) */
John Durkop6e33dbe2020-09-17 21:15:13 -070036
37#ifdef __cplusplus
38extern "C" {
39#endif
40
Gilles Peskinecf70d072021-04-19 22:24:23 +020041
42
43/****************************************************************/
44/* De facto synonyms */
45/****************************************************************/
46
47#if defined(PSA_WANT_ALG_ECDSA_ANY) && !defined(PSA_WANT_ALG_ECDSA)
48#define PSA_WANT_ALG_ECDSA PSA_WANT_ALG_ECDSA_ANY
49#elif !defined(PSA_WANT_ALG_ECDSA_ANY) && defined(PSA_WANT_ALG_ECDSA)
50#define PSA_WANT_ALG_ECDSA_ANY PSA_WANT_ALG_ECDSA
51#endif
52
53#if defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW) && !defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
54#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW
55#elif !defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW) && defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
56#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW PSA_WANT_ALG_RSA_PKCS1V15_SIGN
57#endif
58
59
60
61/****************************************************************/
62/* Require built-in implementations based on PSA requirements */
63/****************************************************************/
64
John Durkop2dfaf9c2020-09-24 04:30:10 -070065#if defined(MBEDTLS_PSA_CRYPTO_CONFIG)
John Durkopd8959392020-09-20 23:09:17 -070066
John Durkopd62b6782020-11-30 21:06:05 -080067#if defined(PSA_WANT_ALG_DETERMINISTIC_ECDSA)
68#if !defined(MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA)
69#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
70#define MBEDTLS_ECDSA_DETERMINISTIC
71#define MBEDTLS_ECDSA_C
72#define MBEDTLS_HMAC_DRBG_C
73#define MBEDTLS_MD_C
74#endif /* !MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA */
75#endif /* PSA_WANT_ALG_DETERMINISTIC_ECDSA */
76
77#if defined(PSA_WANT_ALG_ECDH)
78#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDH)
79#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
80#define MBEDTLS_ECDH_C
81#define MBEDTLS_ECP_C
82#define MBEDTLS_BIGNUM_C
83#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDH */
84#endif /* PSA_WANT_ALG_ECDH */
85
86#if defined(PSA_WANT_ALG_ECDSA)
87#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDSA)
88#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
89#define MBEDTLS_ECDSA_C
90#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDSA */
91#endif /* PSA_WANT_ALG_ECDSA */
92
93#if defined(PSA_WANT_ALG_HKDF)
94#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF)
95#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
96#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
97#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF */
98#endif /* PSA_WANT_ALG_HKDF */
99
100#if defined(PSA_WANT_ALG_HMAC)
101#if !defined(MBEDTLS_PSA_ACCEL_ALG_HMAC)
102#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
103#endif /* !MBEDTLS_PSA_ACCEL_ALG_HMAC */
104#endif /* PSA_WANT_ALG_HMAC */
105
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100106#if defined(PSA_WANT_ALG_MD2) && !defined(MBEDTLS_PSA_ACCEL_ALG_MD2)
107#define MBEDTLS_PSA_BUILTIN_ALG_MD2 1
108#define MBEDTLS_MD2_C
109#endif
110
111#if defined(PSA_WANT_ALG_MD4) && !defined(MBEDTLS_PSA_ACCEL_ALG_MD4)
112#define MBEDTLS_PSA_BUILTIN_ALG_MD4 1
113#define MBEDTLS_MD4_C
114#endif
115
116#if defined(PSA_WANT_ALG_MD5) && !defined(MBEDTLS_PSA_ACCEL_ALG_MD5)
117#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
118#define MBEDTLS_MD5_C
119#endif
120
121#if defined(PSA_WANT_ALG_RIPEMD160) && !defined(MBEDTLS_PSA_ACCEL_ALG_RIPEMD160)
122#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
123#define MBEDTLS_RIPEMD160_C
124#endif
125
John Durkopd62b6782020-11-30 21:06:05 -0800126#if defined(PSA_WANT_ALG_RSA_OAEP)
127#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP)
128#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
129#define MBEDTLS_RSA_C
130#define MBEDTLS_BIGNUM_C
131#define MBEDTLS_OID_C
132#define MBEDTLS_PKCS1_V21
133#define MBEDTLS_MD_C
134#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP */
135#endif /* PSA_WANT_ALG_RSA_OAEP */
136
137#if defined(PSA_WANT_ALG_RSA_PKCS1V15_CRYPT)
138#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT)
139#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
140#define MBEDTLS_RSA_C
141#define MBEDTLS_BIGNUM_C
142#define MBEDTLS_OID_C
143#define MBEDTLS_PKCS1_V15
144#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT */
145#endif /* PSA_WANT_ALG_RSA_PKCS1V15_CRYPT */
146
147#if defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
148#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN)
149#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
150#define MBEDTLS_RSA_C
151#define MBEDTLS_BIGNUM_C
152#define MBEDTLS_OID_C
153#define MBEDTLS_PKCS1_V15
154#define MBEDTLS_MD_C
155#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN */
156#endif /* PSA_WANT_ALG_RSA_PKCS1V15_SIGN */
157
158#if defined(PSA_WANT_ALG_RSA_PSS)
159#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PSS)
160#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
161#define MBEDTLS_RSA_C
162#define MBEDTLS_BIGNUM_C
163#define MBEDTLS_OID_C
164#define MBEDTLS_PKCS1_V21
165#define MBEDTLS_MD_C
166#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PSS */
167#endif /* PSA_WANT_ALG_RSA_PSS */
168
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100169#if defined(PSA_WANT_ALG_SHA_1) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_1)
170#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
171#define MBEDTLS_SHA1_C
172#endif
173
174#if defined(PSA_WANT_ALG_SHA_224) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_224)
175#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
176#define MBEDTLS_SHA256_C
177#endif
178
179#if defined(PSA_WANT_ALG_SHA_256) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_256)
180#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
181#define MBEDTLS_SHA256_C
182#endif
183
184#if defined(PSA_WANT_ALG_SHA_384) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_384)
185#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
186#define MBEDTLS_SHA512_C
187#endif
188
189#if defined(PSA_WANT_ALG_SHA_512) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_512)
190#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
191#define MBEDTLS_SHA512_C
192#endif
193
John Durkop07cc04a2020-11-16 22:08:34 -0800194#if defined(PSA_WANT_ALG_TLS12_PRF)
195#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF)
John Durkopd62b6782020-11-30 21:06:05 -0800196#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
John Durkop07cc04a2020-11-16 22:08:34 -0800197#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF */
198#endif /* PSA_WANT_ALG_TLS12_PRF */
199
200#if defined(PSA_WANT_ALG_TLS12_PSK_TO_MS)
201#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS)
John Durkopd62b6782020-11-30 21:06:05 -0800202#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
John Durkop07cc04a2020-11-16 22:08:34 -0800203#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS */
204#endif /* PSA_WANT_ALG_TLS12_PSK_TO_MS */
205
206#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR)
207#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR)
John Durkopd62b6782020-11-30 21:06:05 -0800208#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR 1
John Durkop07cc04a2020-11-16 22:08:34 -0800209#define MBEDTLS_ECP_C
210#define MBEDTLS_BIGNUM_C
211#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR */
212#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR */
213
214#if defined(PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY)
215#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800216#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
John Durkop07cc04a2020-11-16 22:08:34 -0800217#define MBEDTLS_ECP_C
218#define MBEDTLS_BIGNUM_C
219#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY */
220#endif /* PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY */
221
John Durkop9814fa22020-11-04 12:28:15 -0800222#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR)
John Durkop0e005192020-10-31 22:06:54 -0700223#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR)
John Durkopd62b6782020-11-30 21:06:05 -0800224#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR 1
John Durkop0e005192020-10-31 22:06:54 -0700225#define MBEDTLS_RSA_C
226#define MBEDTLS_BIGNUM_C
227#define MBEDTLS_OID_C
228#define MBEDTLS_GENPRIME
John Durkop07cc04a2020-11-16 22:08:34 -0800229#define MBEDTLS_PK_PARSE_C
230#define MBEDTLS_PK_WRITE_C
231#define MBEDTLS_PK_C
John Durkop0e005192020-10-31 22:06:54 -0700232#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR */
John Durkop9814fa22020-11-04 12:28:15 -0800233#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR */
234
235#if defined(PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkop0e005192020-10-31 22:06:54 -0700236#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800237#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
John Durkop0e005192020-10-31 22:06:54 -0700238#define MBEDTLS_RSA_C
239#define MBEDTLS_BIGNUM_C
240#define MBEDTLS_OID_C
John Durkop07cc04a2020-11-16 22:08:34 -0800241#define MBEDTLS_PK_PARSE_C
242#define MBEDTLS_PK_WRITE_C
243#define MBEDTLS_PK_C
John Durkop0e005192020-10-31 22:06:54 -0700244#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkop9814fa22020-11-04 12:28:15 -0800245#endif /* PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkopd0321952020-10-29 21:37:36 -0700246
David Brownb781f752021-02-08 15:44:52 -0700247/* If any of the block modes are requested that don't have an
248 * associated HW assist, define PSA_HAVE_SOFT_BLOCK_MODE for checking
249 * in the block cipher key types. */
250#if (defined(PSA_WANT_ALG_CTR) && !defined(MBEDTLS_PSA_ACCEL_ALG_CTR)) || \
Bence Szépkúti7921cce2021-02-17 11:46:50 +0100251 (defined(PSA_WANT_ALG_CFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_CFB)) || \
David Brownb781f752021-02-08 15:44:52 -0700252 (defined(PSA_WANT_ALG_OFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_OFB)) || \
253 (defined(PSA_WANT_ALG_XTS) && !defined(MBEDTLS_PSA_ACCEL_ALG_XTS)) || \
254 defined(PSA_WANT_ALG_ECB_NO_PADDING) || \
255 (defined(PSA_WANT_ALG_CBC_NO_PADDING) && \
256 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING)) || \
257 (defined(PSA_WANT_ALG_CBC_PKCS7) && \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100258 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7)) || \
259 (defined(PSA_WANT_ALG_CMAC) && !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC))
David Brownb781f752021-02-08 15:44:52 -0700260#define PSA_HAVE_SOFT_BLOCK_MODE 1
261#endif
262
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100263#if (defined(PSA_WANT_ALG_GCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_GCM)) || \
264 (defined(PSA_WANT_ALG_CCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_CCM))
265#define PSA_HAVE_SOFT_BLOCK_AEAD 1
266#endif
267
David Brown94933082021-01-05 12:03:25 -0700268#if defined(PSA_WANT_KEY_TYPE_AES)
David Browne1f91f02021-02-09 15:56:22 -0700269#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_AES)
270#define PSA_HAVE_SOFT_KEY_TYPE_AES 1
271#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_AES */
272#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100273 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
274 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
David Brown78a429b2021-01-21 09:48:57 -0700275#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700276#define MBEDTLS_AES_C
David Browne1f91f02021-02-09 15:56:22 -0700277#endif /* PSA_HAVE_SOFT_KEY_TYPE_AES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown94933082021-01-05 12:03:25 -0700278#endif /* PSA_WANT_KEY_TYPE_AES */
279
David Brownec258cf2021-01-05 12:03:25 -0700280#if defined(PSA_WANT_KEY_TYPE_ARC4)
281#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ARC4)
David Brown78a429b2021-01-21 09:48:57 -0700282#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARC4 1
David Brownec258cf2021-01-05 12:03:25 -0700283#define MBEDTLS_ARC4_C
284#endif /*!MBEDTLS_PSA_ACCEL_KEY_TYPE_ARC4 */
285#endif /* PSA_WANT_KEY_TYPE_ARC4 */
286
Gilles Peskine0d3d7422021-10-08 15:48:16 +0200287#if defined(PSA_WANT_KEY_TYPE_ARIA)
288#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA)
289#define PSA_HAVE_SOFT_KEY_TYPE_ARIA 1
290#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA */
291#if defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
292 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
293 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
294#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
295#define MBEDTLS_ARIA_C
296#endif /* PSA_HAVE_SOFT_KEY_TYPE_ARIA || PSA_HAVE_SOFT_BLOCK_MODE */
297#endif /* PSA_WANT_KEY_TYPE_ARIA */
298
David Brown686e6e82021-01-05 12:03:25 -0700299#if defined(PSA_WANT_KEY_TYPE_CAMELLIA)
David Browne1f91f02021-02-09 15:56:22 -0700300#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA)
301#define PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA 1
302#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA */
303#if defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100304 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
305 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
David Brown78a429b2021-01-21 09:48:57 -0700306#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700307#define MBEDTLS_CAMELLIA_C
David Browne1f91f02021-02-09 15:56:22 -0700308#endif /* PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown686e6e82021-01-05 12:03:25 -0700309#endif /* PSA_WANT_KEY_TYPE_CAMELLIA */
310
David Brownb65a7f72021-01-15 12:04:09 -0700311#if defined(PSA_WANT_KEY_TYPE_DES)
David Browne1f91f02021-02-09 15:56:22 -0700312#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DES)
313#define PSA_HAVE_SOFT_KEY_TYPE_DES 1
314#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DES */
315#if defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
David Brownb781f752021-02-08 15:44:52 -0700316 defined(PSA_HAVE_SOFT_BLOCK_MODE)
David Brown78a429b2021-01-21 09:48:57 -0700317#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700318#define MBEDTLS_DES_C
David Browne1f91f02021-02-09 15:56:22 -0700319#endif /*PSA_HAVE_SOFT_KEY_TYPE_DES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brownb65a7f72021-01-15 12:04:09 -0700320#endif /* PSA_WANT_KEY_TYPE_DES */
321
David Brownb16727a2021-02-08 16:31:46 -0700322#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
323#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20)
324#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
325#define MBEDTLS_CHACHA20_C
326#endif /*!MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20 */
327#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
328
David Brownf84a0f62021-02-09 15:59:41 -0700329/* If any of the software block ciphers are selected, define
330 * PSA_HAVE_SOFT_BLOCK_CIPHER, which can be used in any of these
331 * situations. */
332#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine0d3d7422021-10-08 15:48:16 +0200333 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
David Brownf84a0f62021-02-09 15:59:41 -0700334 defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
335 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
336#define PSA_HAVE_SOFT_BLOCK_CIPHER 1
337#endif
338
David Brown99844272021-01-15 12:04:47 -0700339#if defined(PSA_WANT_ALG_STREAM_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700340#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brown99844272021-01-15 12:04:47 -0700341#endif /* PSA_WANT_ALG_STREAM_CIPHER */
342
Ronald Crond85e98d2021-03-25 15:32:32 +0100343#if defined(PSA_WANT_ALG_CBC_MAC)
344#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_MAC)
345#error "CBC-MAC is not yet supported via the PSA API in Mbed TLS."
346#define MBEDTLS_PSA_BUILTIN_ALG_CBC_MAC 1
347#endif /* !MBEDTLS_PSA_ACCEL_ALG_CBC_MAC */
348#endif /* PSA_WANT_ALG_CBC_MAC */
349
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100350#if defined(PSA_WANT_ALG_CMAC)
351#if !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC) || \
352 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
353#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
354#define MBEDTLS_CMAC_C
355#endif /* !MBEDTLS_PSA_ACCEL_ALG_CMAC */
356#endif /* PSA_WANT_ALG_CMAC */
357
David Brown99844272021-01-15 12:04:47 -0700358#if defined(PSA_WANT_ALG_CTR)
David Brown4b9ec7a2021-02-05 12:47:08 -0700359#if !defined(MBEDTLS_PSA_ACCEL_ALG_CTR) || \
David Brownf84a0f62021-02-09 15:59:41 -0700360 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700361#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700362#define MBEDTLS_CIPHER_MODE_CTR
David Brown4b9ec7a2021-02-05 12:47:08 -0700363#endif
David Brown99844272021-01-15 12:04:47 -0700364#endif /* PSA_WANT_ALG_CTR */
365
366#if defined(PSA_WANT_ALG_CFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700367#if !defined(MBEDTLS_PSA_ACCEL_ALG_CFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700368 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700369#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700370#define MBEDTLS_CIPHER_MODE_CFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700371#endif
David Brown99844272021-01-15 12:04:47 -0700372#endif /* PSA_WANT_ALG_CFB */
373
374#if defined(PSA_WANT_ALG_OFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700375#if !defined(MBEDTLS_PSA_ACCEL_ALG_OFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700376 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700377#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700378#define MBEDTLS_CIPHER_MODE_OFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700379#endif
David Brown99844272021-01-15 12:04:47 -0700380#endif /* PSA_WANT_ALG_OFB */
381
382#if defined(PSA_WANT_ALG_XTS)
David Brown4b9ec7a2021-02-05 12:47:08 -0700383#if !defined(MBEDTLS_PSA_ACCEL_ALG_XTS) || \
David Brownf84a0f62021-02-09 15:59:41 -0700384 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700385#define MBEDTLS_PSA_BUILTIN_ALG_XTS 1
David Brown99844272021-01-15 12:04:47 -0700386#define MBEDTLS_CIPHER_MODE_XTS
David Brown4b9ec7a2021-02-05 12:47:08 -0700387#endif
David Brown99844272021-01-15 12:04:47 -0700388#endif /* PSA_WANT_ALG_XTS */
389
390#if defined(PSA_WANT_ALG_ECB_NO_PADDING)
David Brownbe380c12021-02-11 10:55:48 -0700391#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700392#endif
393
David Brown12f45f92021-01-26 11:50:36 -0700394#if defined(PSA_WANT_ALG_CBC_NO_PADDING)
David Brown4b9ec7a2021-02-05 12:47:08 -0700395#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING) || \
David Brownfc468182021-02-09 16:23:34 -0700396 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700397#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700398#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown4b9ec7a2021-02-05 12:47:08 -0700399#endif
David Brown12f45f92021-01-26 11:50:36 -0700400#endif /* PSA_WANT_ALG_CBC_NO_PADDING */
401
402#if defined(PSA_WANT_ALG_CBC_PKCS7)
David Brown4b9ec7a2021-02-05 12:47:08 -0700403#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7) || \
David Brownfc468182021-02-09 16:23:34 -0700404 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700405#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700406#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brownfc468182021-02-09 16:23:34 -0700407#define MBEDTLS_CIPHER_PADDING_PKCS7
David Brown4b9ec7a2021-02-05 12:47:08 -0700408#endif
David Brown12f45f92021-01-26 11:50:36 -0700409#endif /* PSA_WANT_ALG_CBC_PKCS7 */
410
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100411#if defined(PSA_WANT_ALG_CCM)
412#if !defined(MBEDTLS_PSA_ACCEL_ALG_CCM) || \
413 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine0d3d7422021-10-08 15:48:16 +0200414 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100415 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
416#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
417#define MBEDTLS_CCM_C
418#endif
419#endif /* PSA_WANT_ALG_CCM */
420
421#if defined(PSA_WANT_ALG_GCM)
422#if !defined(MBEDTLS_PSA_ACCEL_ALG_GCM) || \
423 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine0d3d7422021-10-08 15:48:16 +0200424 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100425 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
426#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
427#define MBEDTLS_GCM_C
428#endif
429#endif /* PSA_WANT_ALG_GCM */
430
David Brownac4fa072021-02-08 16:47:35 -0700431#if defined(PSA_WANT_ALG_CHACHA20_POLY1305)
432#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
433#define MBEDTLS_CHACHAPOLY_C
David Brown86730a82021-02-09 16:24:11 -0700434#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700435#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
436#endif /* PSA_WANT_ALG_CHACHA20_POLY1305 */
437
David Browneed74df2021-03-15 15:53:57 -0600438#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_256)
439#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256)
440#define MBEDTLS_ECP_DP_BP256R1_ENABLED
441#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
442#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256 */
443#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_256 */
444
445#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_384)
446#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384)
447#define MBEDTLS_ECP_DP_BP384R1_ENABLED
448#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
449#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384 */
450#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_384 */
451
452#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_512)
453#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512)
454#define MBEDTLS_ECP_DP_BP512R1_ENABLED
455#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
456#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512 */
457#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_512 */
458
459#if defined(PSA_WANT_ECC_MONTGOMERY_255)
460#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255)
461#define MBEDTLS_ECP_DP_CURVE25519_ENABLED
462#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
463#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255 */
464#endif /* PSA_WANT_ECC_MONTGOMERY_255 */
465
466#if defined(PSA_WANT_ECC_MONTGOMERY_448)
467#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448)
Ronald Crone1f55162021-03-25 15:09:47 +0100468/*
469 * Curve448 is not yet supported via the PSA API in Mbed TLS
470 * (https://github.com/ARMmbed/mbedtls/issues/4249).
471 */
472#error "Curve448 is not yet supported via the PSA API in Mbed TLS."
David Browneed74df2021-03-15 15:53:57 -0600473#define MBEDTLS_ECP_DP_CURVE448_ENABLED
474#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
475#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448 */
476#endif /* PSA_WANT_ECC_MONTGOMERY_448 */
477
David Brownc7b9b2b2021-02-19 21:05:52 -0700478#if defined(PSA_WANT_ECC_SECP_R1_192)
479#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192)
480#define MBEDTLS_ECP_DP_SECP192R1_ENABLED
481#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
482#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192 */
483#endif /* PSA_WANT_ECC_SECP_R1_192 */
484
485#if defined(PSA_WANT_ECC_SECP_R1_224)
486#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224)
487#define MBEDTLS_ECP_DP_SECP224R1_ENABLED
488#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
489#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224 */
490#endif /* PSA_WANT_ECC_SECP_R1_224 */
491
492#if defined(PSA_WANT_ECC_SECP_R1_256)
493#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256)
494#define MBEDTLS_ECP_DP_SECP256R1_ENABLED
495#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
496#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256 */
497#endif /* PSA_WANT_ECC_SECP_R1_256 */
498
499#if defined(PSA_WANT_ECC_SECP_R1_384)
500#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384)
501#define MBEDTLS_ECP_DP_SECP384R1_ENABLED
502#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
503#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384 */
504#endif /* PSA_WANT_ECC_SECP_R1_384 */
505
506#if defined(PSA_WANT_ECC_SECP_R1_521)
507#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521)
508#define MBEDTLS_ECP_DP_SECP521R1_ENABLED
509#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
510#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521 */
511#endif /* PSA_WANT_ECC_SECP_R1_521 */
512
513#if defined(PSA_WANT_ECC_SECP_K1_192)
514#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192)
David Brown8de143e2021-02-19 14:08:00 -0700515#define MBEDTLS_ECP_DP_SECP192K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700516#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
517#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192 */
518#endif /* PSA_WANT_ECC_SECP_K1_192 */
David Brown8de143e2021-02-19 14:08:00 -0700519
David Brownc7b9b2b2021-02-19 21:05:52 -0700520#if defined(PSA_WANT_ECC_SECP_K1_224)
521#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224)
Ronald Crone1f55162021-03-25 15:09:47 +0100522/*
523 * SECP224K1 is buggy via the PSA API in Mbed TLS
524 * (https://github.com/ARMmbed/mbedtls/issues/3541).
525 */
526#error "SECP224K1 is buggy via the PSA API in Mbed TLS."
David Brown8de143e2021-02-19 14:08:00 -0700527#define MBEDTLS_ECP_DP_SECP224K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700528#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
529#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224 */
530#endif /* PSA_WANT_ECC_SECP_K1_224 */
David Brown8de143e2021-02-19 14:08:00 -0700531
David Brownc7b9b2b2021-02-19 21:05:52 -0700532#if defined(PSA_WANT_ECC_SECP_K1_256)
533#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256)
David Brown9b178de2021-03-10 13:14:48 -0700534#define MBEDTLS_ECP_DP_SECP256K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700535#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
536#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256 */
537#endif /* PSA_WANT_ECC_SECP_K1_256 */
David Brown8de143e2021-02-19 14:08:00 -0700538
Gilles Peskinecf70d072021-04-19 22:24:23 +0200539
540
541/****************************************************************/
542/* Infer PSA requirements from Mbed TLS capabilities */
543/****************************************************************/
544
John Durkop714e3a12020-09-29 22:07:04 -0700545#else /* MBEDTLS_PSA_CRYPTO_CONFIG */
546
547/*
548 * Ensure PSA_WANT_* defines are setup properly if MBEDTLS_PSA_CRYPTO_CONFIG
549 * is not defined
550 */
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100551
Ronald Cron3d471812021-03-18 13:40:31 +0100552#if defined(MBEDTLS_CCM_C)
553#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
554#define PSA_WANT_ALG_CCM 1
555#endif /* MBEDTLS_CCM_C */
556
557#if defined(MBEDTLS_CMAC_C)
558#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
559#define PSA_WANT_ALG_CMAC 1
560#endif /* MBEDTLS_CMAC_C */
561
John Durkopd62b6782020-11-30 21:06:05 -0800562#if defined(MBEDTLS_ECDH_C)
563#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
564#define PSA_WANT_ALG_ECDH 1
565#endif /* MBEDTLS_ECDH_C */
566
567#if defined(MBEDTLS_ECDSA_C)
568#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
569#define PSA_WANT_ALG_ECDSA 1
Gilles Peskinecf70d072021-04-19 22:24:23 +0200570#define PSA_WANT_ALG_ECDSA_ANY 1
John Durkopd62b6782020-11-30 21:06:05 -0800571
572// Only add in DETERMINISTIC support if ECDSA is also enabled
573#if defined(MBEDTLS_ECDSA_DETERMINISTIC)
574#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
575#define PSA_WANT_ALG_DETERMINISTIC_ECDSA 1
576#endif /* MBEDTLS_ECDSA_DETERMINISTIC */
577
578#endif /* MBEDTLS_ECDSA_C */
579
580#if defined(MBEDTLS_ECP_C)
581#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR 1
582#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR 1
583#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
584#define PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY 1
585#endif /* MBEDTLS_ECP_C */
586
Ronald Cron3d471812021-03-18 13:40:31 +0100587#if defined(MBEDTLS_GCM_C)
588#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
589#define PSA_WANT_ALG_GCM 1
590#endif /* MBEDTLS_GCM_C */
591
John Durkopd62b6782020-11-30 21:06:05 -0800592#if defined(MBEDTLS_HKDF_C)
593#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
594#define PSA_WANT_ALG_HMAC 1
595#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
596#define PSA_WANT_ALG_HKDF 1
597#endif /* MBEDTLS_HKDF_C */
598
599#if defined(MBEDTLS_MD_C)
600#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
601#define PSA_WANT_ALG_HMAC 1
Gilles Peskine47a89332021-01-12 00:00:15 +0100602#define PSA_WANT_KEY_TYPE_HMAC
John Durkopd62b6782020-11-30 21:06:05 -0800603#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
604#define PSA_WANT_ALG_TLS12_PRF 1
605#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
606#define PSA_WANT_ALG_TLS12_PSK_TO_MS 1
607#endif /* MBEDTLS_MD_C */
608
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100609#if defined(MBEDTLS_MD2_C)
610#define MBEDTLS_PSA_BUILTIN_ALG_MD2 1
611#define PSA_WANT_ALG_MD2 1
612#endif
613
614#if defined(MBEDTLS_MD4_C)
615#define MBEDTLS_PSA_BUILTIN_ALG_MD4 1
616#define PSA_WANT_ALG_MD4 1
617#endif
618
619#if defined(MBEDTLS_MD5_C)
620#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
621#define PSA_WANT_ALG_MD5 1
622#endif
623
624#if defined(MBEDTLS_RIPEMD160_C)
625#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
626#define PSA_WANT_ALG_RIPEMD160 1
627#endif
628
John Durkopd62b6782020-11-30 21:06:05 -0800629#if defined(MBEDTLS_RSA_C)
630#if defined(MBEDTLS_PKCS1_V15)
631#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
632#define PSA_WANT_ALG_RSA_PKCS1V15_CRYPT 1
633#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
634#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN 1
Gilles Peskinecf70d072021-04-19 22:24:23 +0200635#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW 1
Yuto Takano5b4caf22021-08-10 11:26:15 +0100636#endif /* MBEDTLS_PKCS1_V15 */
John Durkopd62b6782020-11-30 21:06:05 -0800637#if defined(MBEDTLS_PKCS1_V21)
638#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
639#define PSA_WANT_ALG_RSA_OAEP 1
640#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
641#define PSA_WANT_ALG_RSA_PSS 1
642#endif /* MBEDTLS_PKCS1_V21 */
643#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR 1
644#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR 1
645#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
646#define PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY 1
647#endif /* MBEDTLS_RSA_C */
648
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100649#if defined(MBEDTLS_SHA1_C)
650#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
651#define PSA_WANT_ALG_SHA_1 1
652#endif
653
654#if defined(MBEDTLS_SHA256_C)
655#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
656#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
Gilles Peskineb65db072021-01-12 00:00:53 +0100657#define PSA_WANT_ALG_SHA_224 1
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100658#define PSA_WANT_ALG_SHA_256 1
659#endif
660
661#if defined(MBEDTLS_SHA512_C)
662#if !defined(MBEDTLS_SHA512_NO_SHA384)
663#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
664#define PSA_WANT_ALG_SHA_384 1
665#endif
666#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
667#define PSA_WANT_ALG_SHA_512 1
668#endif
669
David Brown94933082021-01-05 12:03:25 -0700670#if defined(MBEDTLS_AES_C)
671#define PSA_WANT_KEY_TYPE_AES 1
David Brownda7dbb72021-01-26 11:44:15 -0700672#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700673#endif
674
David Brownec258cf2021-01-05 12:03:25 -0700675#if defined(MBEDTLS_ARC4_C)
676#define PSA_WANT_KEY_TYPE_ARC4 1
David Brown99844272021-01-15 12:04:47 -0700677#define PSA_WANT_ALG_STREAM_CIPHER 1
David Brownda7dbb72021-01-26 11:44:15 -0700678#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARC4 1
David Brown12f45f92021-01-26 11:50:36 -0700679#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brownec258cf2021-01-05 12:03:25 -0700680#endif
681
Gilles Peskine0d3d7422021-10-08 15:48:16 +0200682#if defined(MBEDTLS_ARIA_C)
683#define PSA_WANT_KEY_TYPE_ARIA 1
684#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
685#endif
686
David Brown686e6e82021-01-05 12:03:25 -0700687#if defined(MBEDTLS_CAMELLIA_C)
688#define PSA_WANT_KEY_TYPE_CAMELLIA 1
David Brownda7dbb72021-01-26 11:44:15 -0700689#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700690#endif
691
David Brownb65a7f72021-01-15 12:04:09 -0700692#if defined(MBEDTLS_DES_C)
693#define PSA_WANT_KEY_TYPE_DES 1
David Brownda7dbb72021-01-26 11:44:15 -0700694#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700695#endif
696
David Brownb16727a2021-02-08 16:31:46 -0700697#if defined(MBEDTLS_CHACHA20_C)
698#define PSA_WANT_KEY_TYPE_CHACHA20 1
699#define PSA_WANT_ALG_STREAM_CIPHER 1
700#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
701#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brownac4fa072021-02-08 16:47:35 -0700702#if defined(MBEDTLS_CHACHAPOLY_C)
703#define PSA_WANT_ALG_CHACHA20_POLY1305 1
David Brown86730a82021-02-09 16:24:11 -0700704#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700705#endif
David Brownb16727a2021-02-08 16:31:46 -0700706#endif
707
David Brown99844272021-01-15 12:04:47 -0700708#if defined(MBEDTLS_CIPHER_MODE_CBC)
David Brown10cb81c2021-02-09 16:10:29 -0700709#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700710#define PSA_WANT_ALG_CBC_NO_PADDING 1
711#if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
David Brown12f45f92021-01-26 11:50:36 -0700712#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brown99844272021-01-15 12:04:47 -0700713#define PSA_WANT_ALG_CBC_PKCS7 1
714#endif
715#endif
716
717#if defined(MBEDTLS_AES_C) || defined(MBEDTLS_DES_C) || \
Gilles Peskine0d3d7422021-10-08 15:48:16 +0200718 defined(MBEDTLS_ARIA_C) || defined(MBEDTLS_CAMELLIA_C)
David Brown10cb81c2021-02-09 16:10:29 -0700719#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700720#define PSA_WANT_ALG_ECB_NO_PADDING 1
721#endif
722
723#if defined(MBEDTLS_CIPHER_MODE_CFB)
David Brown12f45f92021-01-26 11:50:36 -0700724#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700725#define PSA_WANT_ALG_CFB 1
726#endif
727
728#if defined(MBEDTLS_CIPHER_MODE_CTR)
David Brown12f45f92021-01-26 11:50:36 -0700729#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700730#define PSA_WANT_ALG_CTR 1
731#endif
732
733#if defined(MBEDTLS_CIPHER_MODE_OFB)
David Brown12f45f92021-01-26 11:50:36 -0700734#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700735#define PSA_WANT_ALG_OFB 1
736#endif
737
738#if defined(MBEDTLS_CIPHER_MODE_XTS)
David Brown12f45f92021-01-26 11:50:36 -0700739#define MBEDTLS_PSA_BUILTIN_ALG_XTS 1
David Brown99844272021-01-15 12:04:47 -0700740#define PSA_WANT_ALG_XTS 1
741#endif
742
David Browneed74df2021-03-15 15:53:57 -0600743#if defined(MBEDTLS_ECP_DP_BP256R1_ENABLED)
744#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
745#define PSA_WANT_ECC_BRAINPOOL_P_R1_256
746#endif
747
748#if defined(MBEDTLS_ECP_DP_BP384R1_ENABLED)
749#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
750#define PSA_WANT_ECC_BRAINPOOL_P_R1_384
751#endif
752
753#if defined(MBEDTLS_ECP_DP_BP512R1_ENABLED)
754#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
755#define PSA_WANT_ECC_BRAINPOOL_P_R1_512
756#endif
757
758#if defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED)
759#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
760#define PSA_WANT_ECC_MONTGOMERY_255
761#endif
762
Gilles Peskine82769862021-03-23 12:06:16 +0100763/* Curve448 is not yet supported via the PSA API (https://github.com/ARMmbed/mbedtls/issues/4249) */
764#if 0 && defined(MBEDTLS_ECP_DP_CURVE448_ENABLED)
David Browneed74df2021-03-15 15:53:57 -0600765#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
766#define PSA_WANT_ECC_MONTGOMERY_448
767#endif
768
David Brown8de143e2021-02-19 14:08:00 -0700769#if defined(MBEDTLS_ECP_DP_SECP192R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700770#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
771#define PSA_WANT_ECC_SECP_R1_192
David Brown8de143e2021-02-19 14:08:00 -0700772#endif
773
774#if defined(MBEDTLS_ECP_DP_SECP224R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700775#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
776#define PSA_WANT_ECC_SECP_R1_224
David Brown8de143e2021-02-19 14:08:00 -0700777#endif
778
779#if defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700780#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
781#define PSA_WANT_ECC_SECP_R1_256
David Brown8de143e2021-02-19 14:08:00 -0700782#endif
783
784#if defined(MBEDTLS_ECP_DP_SECP384R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700785#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
786#define PSA_WANT_ECC_SECP_R1_384
David Brown8de143e2021-02-19 14:08:00 -0700787#endif
788
789#if defined(MBEDTLS_ECP_DP_SECP521R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700790#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
791#define PSA_WANT_ECC_SECP_R1_521
David Brown8de143e2021-02-19 14:08:00 -0700792#endif
793
794#if defined(MBEDTLS_ECP_DP_SECP192K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700795#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
796#define PSA_WANT_ECC_SECP_K1_192
David Brown8de143e2021-02-19 14:08:00 -0700797#endif
798
Gilles Peskine39841302021-03-23 12:06:45 +0100799/* SECP224K1 is buggy via the PSA API (https://github.com/ARMmbed/mbedtls/issues/3541) */
800#if 0 && defined(MBEDTLS_ECP_DP_SECP224K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700801#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
802#define PSA_WANT_ECC_SECP_K1_224
David Brown8de143e2021-02-19 14:08:00 -0700803#endif
804
David Brown9b178de2021-03-10 13:14:48 -0700805#if defined(MBEDTLS_ECP_DP_SECP256K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700806#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
807#define PSA_WANT_ECC_SECP_K1_256
David Brown8de143e2021-02-19 14:08:00 -0700808#endif
809
John Durkop2dfaf9c2020-09-24 04:30:10 -0700810#endif /* MBEDTLS_PSA_CRYPTO_CONFIG */
John Durkopd8959392020-09-20 23:09:17 -0700811
Gilles Peskine60b29fe2021-02-16 14:06:50 +0100812/* These features are always enabled. */
813#define PSA_WANT_KEY_TYPE_DERIVE 1
814#define PSA_WANT_KEY_TYPE_RAW_DATA 1
815
John Durkop6e33dbe2020-09-17 21:15:13 -0700816#ifdef __cplusplus
817}
818#endif
819
820#endif /* MBEDTLS_CONFIG_PSA_H */