blob: 48b2d3209ebc12aa3dac679e1c3d81efccf69950 [file] [log] [blame]
John Durkop6e33dbe2020-09-17 21:15:13 -07001/**
2 * \file mbedtls/config_psa.h
3 * \brief PSA crypto configuration options (set of defines)
4 *
John Durkop34818822020-10-12 21:36:22 -07005 * This set of compile-time options takes settings defined in
Bence Szépkútibb0cfeb2021-05-28 09:42:25 +02006 * include/mbedtls/mbedtls_config.h and include/psa/crypto_config.h and uses
John Durkop34818822020-10-12 21:36:22 -07007 * those definitions to define symbols used in the library code.
8 *
9 * Users and integrators should not edit this file, please edit
Tom Cosgrove1797b052022-12-04 17:19:59 +000010 * include/mbedtls/mbedtls_config.h for MBEDTLS_XXX settings or
John Durkop34818822020-10-12 21:36:22 -070011 * include/psa/crypto_config.h for PSA_WANT_XXX settings.
John Durkop6e33dbe2020-09-17 21:15:13 -070012 */
13/*
14 * Copyright The Mbed TLS Contributors
15 * SPDX-License-Identifier: Apache-2.0
16 *
17 * Licensed under the Apache License, Version 2.0 (the "License"); you may
18 * not use this file except in compliance with the License.
19 * You may obtain a copy of the License at
20 *
21 * http://www.apache.org/licenses/LICENSE-2.0
22 *
23 * Unless required by applicable law or agreed to in writing, software
24 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
25 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
26 * See the License for the specific language governing permissions and
27 * limitations under the License.
28 */
29
30#ifndef MBEDTLS_CONFIG_PSA_H
31#define MBEDTLS_CONFIG_PSA_H
32
John Durkop714e3a12020-09-29 22:07:04 -070033#if defined(MBEDTLS_PSA_CRYPTO_CONFIG)
Gilles Peskinef4c6eb02022-03-16 17:10:48 +010034#if defined(MBEDTLS_PSA_CRYPTO_CONFIG_FILE)
35#include MBEDTLS_PSA_CRYPTO_CONFIG_FILE
36#else
John Durkop6e33dbe2020-09-17 21:15:13 -070037#include "psa/crypto_config.h"
Gilles Peskinef4c6eb02022-03-16 17:10:48 +010038#endif
John Durkop76228ac2020-09-29 22:33:49 -070039#endif /* defined(MBEDTLS_PSA_CRYPTO_CONFIG) */
John Durkop6e33dbe2020-09-17 21:15:13 -070040
Gilles Peskinef4c6eb02022-03-16 17:10:48 +010041#if defined(MBEDTLS_PSA_CRYPTO_USER_CONFIG_FILE)
42#include MBEDTLS_PSA_CRYPTO_USER_CONFIG_FILE
43#endif
44
John Durkop6e33dbe2020-09-17 21:15:13 -070045#ifdef __cplusplus
46extern "C" {
47#endif
48
Gilles Peskine1231eb52021-04-19 22:24:23 +020049
50
51/****************************************************************/
52/* De facto synonyms */
53/****************************************************************/
54
55#if defined(PSA_WANT_ALG_ECDSA_ANY) && !defined(PSA_WANT_ALG_ECDSA)
56#define PSA_WANT_ALG_ECDSA PSA_WANT_ALG_ECDSA_ANY
57#elif !defined(PSA_WANT_ALG_ECDSA_ANY) && defined(PSA_WANT_ALG_ECDSA)
58#define PSA_WANT_ALG_ECDSA_ANY PSA_WANT_ALG_ECDSA
59#endif
60
Gilles Peskine08622b62022-03-15 16:40:59 +010061#if defined(PSA_WANT_ALG_CCM_STAR_NO_TAG) && !defined(PSA_WANT_ALG_CCM)
62#define PSA_WANT_ALG_CCM PSA_WANT_ALG_CCM_STAR_NO_TAG
63#elif !defined(PSA_WANT_ALG_CCM_STAR_NO_TAG) && defined(PSA_WANT_ALG_CCM)
64#define PSA_WANT_ALG_CCM_STAR_NO_TAG PSA_WANT_ALG_CCM
65#endif
66
Gilles Peskine1231eb52021-04-19 22:24:23 +020067#if defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW) && !defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
68#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW
69#elif !defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW) && defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
70#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW PSA_WANT_ALG_RSA_PKCS1V15_SIGN
71#endif
72
Gilles Peskine44c96aa2021-10-04 18:33:56 +020073#if defined(PSA_WANT_ALG_RSA_PSS_ANY_SALT) && !defined(PSA_WANT_ALG_RSA_PSS)
74#define PSA_WANT_ALG_RSA_PSS PSA_WANT_ALG_RSA_PSS_ANY_SALT
75#elif !defined(PSA_WANT_ALG_RSA_PSS_ANY_SALT) && defined(PSA_WANT_ALG_RSA_PSS)
76#define PSA_WANT_ALG_RSA_PSS_ANY_SALT PSA_WANT_ALG_RSA_PSS
77#endif
78
Gilles Peskine1231eb52021-04-19 22:24:23 +020079
80
81/****************************************************************/
82/* Require built-in implementations based on PSA requirements */
83/****************************************************************/
84
John Durkop2dfaf9c2020-09-24 04:30:10 -070085#if defined(MBEDTLS_PSA_CRYPTO_CONFIG)
John Durkopd8959392020-09-20 23:09:17 -070086
John Durkopd62b6782020-11-30 21:06:05 -080087#if defined(PSA_WANT_ALG_DETERMINISTIC_ECDSA)
88#if !defined(MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA)
89#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
90#define MBEDTLS_ECDSA_DETERMINISTIC
91#define MBEDTLS_ECDSA_C
92#define MBEDTLS_HMAC_DRBG_C
93#define MBEDTLS_MD_C
94#endif /* !MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA */
95#endif /* PSA_WANT_ALG_DETERMINISTIC_ECDSA */
96
97#if defined(PSA_WANT_ALG_ECDH)
98#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDH)
99#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
100#define MBEDTLS_ECDH_C
101#define MBEDTLS_ECP_C
102#define MBEDTLS_BIGNUM_C
103#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDH */
104#endif /* PSA_WANT_ALG_ECDH */
105
106#if defined(PSA_WANT_ALG_ECDSA)
107#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDSA)
108#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
109#define MBEDTLS_ECDSA_C
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200110#define MBEDTLS_ECP_C
111#define MBEDTLS_BIGNUM_C
112#define MBEDTLS_ASN1_PARSE_C
113#define MBEDTLS_ASN1_WRITE_C
John Durkopd62b6782020-11-30 21:06:05 -0800114#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDSA */
115#endif /* PSA_WANT_ALG_ECDSA */
116
117#if defined(PSA_WANT_ALG_HKDF)
118#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF)
119#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
120#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
121#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF */
122#endif /* PSA_WANT_ALG_HKDF */
123
Przemek Stekiel3e8249c2022-06-03 14:05:07 +0200124#if defined(PSA_WANT_ALG_HKDF_EXTRACT)
125#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF_EXTRACT)
126#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
127#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXTRACT 1
128#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF_EXTRACT */
129#endif /* PSA_WANT_ALG_HKDF_EXTRACT */
130
131#if defined(PSA_WANT_ALG_HKDF_EXPAND)
132#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF_EXPAND)
133#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
134#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXPAND 1
135#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF_EXPAND */
136#endif /* PSA_WANT_ALG_HKDF_EXPAND */
137
John Durkopd62b6782020-11-30 21:06:05 -0800138#if defined(PSA_WANT_ALG_HMAC)
139#if !defined(MBEDTLS_PSA_ACCEL_ALG_HMAC)
140#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
141#endif /* !MBEDTLS_PSA_ACCEL_ALG_HMAC */
142#endif /* PSA_WANT_ALG_HMAC */
143
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100144#if defined(PSA_WANT_ALG_MD5) && !defined(MBEDTLS_PSA_ACCEL_ALG_MD5)
145#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
146#define MBEDTLS_MD5_C
147#endif
148
Neil Armstronga557cb82022-06-10 08:58:32 +0200149#if defined(PSA_WANT_ALG_JPAKE)
Neil Armstrong637d0a02022-05-25 11:28:22 +0200150#define MBEDTLS_PSA_BUILTIN_PAKE 1
Neil Armstronga557cb82022-06-10 08:58:32 +0200151#define MBEDTLS_PSA_BUILTIN_ALG_JPAKE 1
Neil Armstronged407822022-06-15 11:21:33 +0200152#define MBEDTLS_ECP_DP_SECP256R1_ENABLED
Neil Armstrong637d0a02022-05-25 11:28:22 +0200153#define MBEDTLS_BIGNUM_C
154#define MBEDTLS_ECP_C
Neil Armstrong637d0a02022-05-25 11:28:22 +0200155#define MBEDTLS_ECJPAKE_C
Neil Armstronga557cb82022-06-10 08:58:32 +0200156#endif /* PSA_WANT_ALG_JPAKE */
Neil Armstrong637d0a02022-05-25 11:28:22 +0200157
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100158#if defined(PSA_WANT_ALG_RIPEMD160) && !defined(MBEDTLS_PSA_ACCEL_ALG_RIPEMD160)
159#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
160#define MBEDTLS_RIPEMD160_C
161#endif
162
John Durkopd62b6782020-11-30 21:06:05 -0800163#if defined(PSA_WANT_ALG_RSA_OAEP)
164#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP)
165#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
166#define MBEDTLS_RSA_C
167#define MBEDTLS_BIGNUM_C
168#define MBEDTLS_OID_C
169#define MBEDTLS_PKCS1_V21
John Durkopd62b6782020-11-30 21:06:05 -0800170#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP */
171#endif /* PSA_WANT_ALG_RSA_OAEP */
172
173#if defined(PSA_WANT_ALG_RSA_PKCS1V15_CRYPT)
174#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT)
175#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
176#define MBEDTLS_RSA_C
177#define MBEDTLS_BIGNUM_C
178#define MBEDTLS_OID_C
179#define MBEDTLS_PKCS1_V15
180#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT */
181#endif /* PSA_WANT_ALG_RSA_PKCS1V15_CRYPT */
182
183#if defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
184#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN)
185#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
186#define MBEDTLS_RSA_C
187#define MBEDTLS_BIGNUM_C
188#define MBEDTLS_OID_C
189#define MBEDTLS_PKCS1_V15
John Durkopd62b6782020-11-30 21:06:05 -0800190#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN */
191#endif /* PSA_WANT_ALG_RSA_PKCS1V15_SIGN */
192
193#if defined(PSA_WANT_ALG_RSA_PSS)
194#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PSS)
195#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
196#define MBEDTLS_RSA_C
197#define MBEDTLS_BIGNUM_C
198#define MBEDTLS_OID_C
199#define MBEDTLS_PKCS1_V21
John Durkopd62b6782020-11-30 21:06:05 -0800200#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PSS */
201#endif /* PSA_WANT_ALG_RSA_PSS */
202
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100203#if defined(PSA_WANT_ALG_SHA_1) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_1)
204#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
205#define MBEDTLS_SHA1_C
206#endif
207
208#if defined(PSA_WANT_ALG_SHA_224) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_224)
209#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200210#define MBEDTLS_SHA224_C
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100211#endif
212
213#if defined(PSA_WANT_ALG_SHA_256) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_256)
214#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
215#define MBEDTLS_SHA256_C
216#endif
217
218#if defined(PSA_WANT_ALG_SHA_384) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_384)
219#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200220#define MBEDTLS_SHA384_C
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100221#endif
222
223#if defined(PSA_WANT_ALG_SHA_512) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_512)
224#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
225#define MBEDTLS_SHA512_C
226#endif
227
John Durkop07cc04a2020-11-16 22:08:34 -0800228#if defined(PSA_WANT_ALG_TLS12_PRF)
229#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF)
John Durkopd62b6782020-11-30 21:06:05 -0800230#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
John Durkop07cc04a2020-11-16 22:08:34 -0800231#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF */
232#endif /* PSA_WANT_ALG_TLS12_PRF */
233
234#if defined(PSA_WANT_ALG_TLS12_PSK_TO_MS)
235#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS)
John Durkopd62b6782020-11-30 21:06:05 -0800236#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
John Durkop07cc04a2020-11-16 22:08:34 -0800237#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS */
238#endif /* PSA_WANT_ALG_TLS12_PSK_TO_MS */
239
Andrzej Kurek08d34b82022-07-29 10:00:16 -0400240#if defined(PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS)
241#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_ECJPAKE_TO_PMS)
242#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_ECJPAKE_TO_PMS 1
243#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_ECJPAKE_TO_PMS */
244#endif /* PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS */
245
John Durkop07cc04a2020-11-16 22:08:34 -0800246#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR)
247#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR)
John Durkopd62b6782020-11-30 21:06:05 -0800248#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR 1
John Durkop07cc04a2020-11-16 22:08:34 -0800249#define MBEDTLS_ECP_C
250#define MBEDTLS_BIGNUM_C
251#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR */
252#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR */
253
254#if defined(PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY)
255#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800256#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
John Durkop07cc04a2020-11-16 22:08:34 -0800257#define MBEDTLS_ECP_C
258#define MBEDTLS_BIGNUM_C
259#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY */
260#endif /* PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY */
261
John Durkop9814fa22020-11-04 12:28:15 -0800262#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR)
John Durkop0e005192020-10-31 22:06:54 -0700263#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR)
John Durkopd62b6782020-11-30 21:06:05 -0800264#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR 1
John Durkop0e005192020-10-31 22:06:54 -0700265#define MBEDTLS_RSA_C
266#define MBEDTLS_BIGNUM_C
267#define MBEDTLS_OID_C
268#define MBEDTLS_GENPRIME
John Durkop07cc04a2020-11-16 22:08:34 -0800269#define MBEDTLS_PK_PARSE_C
270#define MBEDTLS_PK_WRITE_C
271#define MBEDTLS_PK_C
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200272#define MBEDTLS_ASN1_PARSE_C
273#define MBEDTLS_ASN1_WRITE_C
John Durkop0e005192020-10-31 22:06:54 -0700274#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR */
John Durkop9814fa22020-11-04 12:28:15 -0800275#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR */
276
277#if defined(PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkop0e005192020-10-31 22:06:54 -0700278#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800279#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
John Durkop0e005192020-10-31 22:06:54 -0700280#define MBEDTLS_RSA_C
281#define MBEDTLS_BIGNUM_C
282#define MBEDTLS_OID_C
John Durkop07cc04a2020-11-16 22:08:34 -0800283#define MBEDTLS_PK_PARSE_C
284#define MBEDTLS_PK_WRITE_C
285#define MBEDTLS_PK_C
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200286#define MBEDTLS_ASN1_PARSE_C
287#define MBEDTLS_ASN1_WRITE_C
John Durkop0e005192020-10-31 22:06:54 -0700288#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkop9814fa22020-11-04 12:28:15 -0800289#endif /* PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkopd0321952020-10-29 21:37:36 -0700290
David Brownb781f752021-02-08 15:44:52 -0700291/* If any of the block modes are requested that don't have an
292 * associated HW assist, define PSA_HAVE_SOFT_BLOCK_MODE for checking
293 * in the block cipher key types. */
294#if (defined(PSA_WANT_ALG_CTR) && !defined(MBEDTLS_PSA_ACCEL_ALG_CTR)) || \
Bence Szépkúti7921cce2021-02-17 11:46:50 +0100295 (defined(PSA_WANT_ALG_CFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_CFB)) || \
David Brownb781f752021-02-08 15:44:52 -0700296 (defined(PSA_WANT_ALG_OFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_OFB)) || \
David Brownb781f752021-02-08 15:44:52 -0700297 defined(PSA_WANT_ALG_ECB_NO_PADDING) || \
298 (defined(PSA_WANT_ALG_CBC_NO_PADDING) && \
Gilles Peskine449bd832023-01-11 14:50:10 +0100299 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING)) || \
David Brownb781f752021-02-08 15:44:52 -0700300 (defined(PSA_WANT_ALG_CBC_PKCS7) && \
Gilles Peskine449bd832023-01-11 14:50:10 +0100301 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7)) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100302 (defined(PSA_WANT_ALG_CMAC) && !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC))
David Brownb781f752021-02-08 15:44:52 -0700303#define PSA_HAVE_SOFT_BLOCK_MODE 1
304#endif
305
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100306#if (defined(PSA_WANT_ALG_GCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_GCM)) || \
307 (defined(PSA_WANT_ALG_CCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_CCM))
308#define PSA_HAVE_SOFT_BLOCK_AEAD 1
309#endif
310
David Brown94933082021-01-05 12:03:25 -0700311#if defined(PSA_WANT_KEY_TYPE_AES)
David Browne1f91f02021-02-09 15:56:22 -0700312#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_AES)
313#define PSA_HAVE_SOFT_KEY_TYPE_AES 1
314#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_AES */
315#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100316 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
317 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
David Brown78a429b2021-01-21 09:48:57 -0700318#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700319#define MBEDTLS_AES_C
David Browne1f91f02021-02-09 15:56:22 -0700320#endif /* PSA_HAVE_SOFT_KEY_TYPE_AES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown94933082021-01-05 12:03:25 -0700321#endif /* PSA_WANT_KEY_TYPE_AES */
322
Gilles Peskine09c46da2021-10-08 15:48:16 +0200323#if defined(PSA_WANT_KEY_TYPE_ARIA)
324#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA)
325#define PSA_HAVE_SOFT_KEY_TYPE_ARIA 1
326#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA */
327#if defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
328 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
329 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
330#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
331#define MBEDTLS_ARIA_C
332#endif /* PSA_HAVE_SOFT_KEY_TYPE_ARIA || PSA_HAVE_SOFT_BLOCK_MODE */
333#endif /* PSA_WANT_KEY_TYPE_ARIA */
334
David Brown686e6e82021-01-05 12:03:25 -0700335#if defined(PSA_WANT_KEY_TYPE_CAMELLIA)
David Browne1f91f02021-02-09 15:56:22 -0700336#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA)
337#define PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA 1
338#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA */
339#if defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100340 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
341 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
David Brown78a429b2021-01-21 09:48:57 -0700342#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700343#define MBEDTLS_CAMELLIA_C
David Browne1f91f02021-02-09 15:56:22 -0700344#endif /* PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown686e6e82021-01-05 12:03:25 -0700345#endif /* PSA_WANT_KEY_TYPE_CAMELLIA */
346
David Brownb65a7f72021-01-15 12:04:09 -0700347#if defined(PSA_WANT_KEY_TYPE_DES)
David Browne1f91f02021-02-09 15:56:22 -0700348#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DES)
349#define PSA_HAVE_SOFT_KEY_TYPE_DES 1
350#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DES */
351#if defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
David Brownb781f752021-02-08 15:44:52 -0700352 defined(PSA_HAVE_SOFT_BLOCK_MODE)
David Brown78a429b2021-01-21 09:48:57 -0700353#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700354#define MBEDTLS_DES_C
David Browne1f91f02021-02-09 15:56:22 -0700355#endif /*PSA_HAVE_SOFT_KEY_TYPE_DES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brownb65a7f72021-01-15 12:04:09 -0700356#endif /* PSA_WANT_KEY_TYPE_DES */
357
David Brownb16727a2021-02-08 16:31:46 -0700358#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
359#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20)
360#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
361#define MBEDTLS_CHACHA20_C
362#endif /*!MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20 */
363#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
364
David Brownf84a0f62021-02-09 15:59:41 -0700365/* If any of the software block ciphers are selected, define
366 * PSA_HAVE_SOFT_BLOCK_CIPHER, which can be used in any of these
367 * situations. */
368#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200369 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
David Brownf84a0f62021-02-09 15:59:41 -0700370 defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
371 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
372#define PSA_HAVE_SOFT_BLOCK_CIPHER 1
373#endif
374
David Brown99844272021-01-15 12:04:47 -0700375#if defined(PSA_WANT_ALG_STREAM_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700376#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brown99844272021-01-15 12:04:47 -0700377#endif /* PSA_WANT_ALG_STREAM_CIPHER */
378
Ronald Crond85e98d2021-03-25 15:32:32 +0100379#if defined(PSA_WANT_ALG_CBC_MAC)
380#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_MAC)
381#error "CBC-MAC is not yet supported via the PSA API in Mbed TLS."
382#define MBEDTLS_PSA_BUILTIN_ALG_CBC_MAC 1
383#endif /* !MBEDTLS_PSA_ACCEL_ALG_CBC_MAC */
384#endif /* PSA_WANT_ALG_CBC_MAC */
385
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100386#if defined(PSA_WANT_ALG_CMAC)
387#if !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC) || \
388 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
389#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
390#define MBEDTLS_CMAC_C
391#endif /* !MBEDTLS_PSA_ACCEL_ALG_CMAC */
392#endif /* PSA_WANT_ALG_CMAC */
393
David Brown99844272021-01-15 12:04:47 -0700394#if defined(PSA_WANT_ALG_CTR)
David Brown4b9ec7a2021-02-05 12:47:08 -0700395#if !defined(MBEDTLS_PSA_ACCEL_ALG_CTR) || \
David Brownf84a0f62021-02-09 15:59:41 -0700396 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700397#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700398#define MBEDTLS_CIPHER_MODE_CTR
David Brown4b9ec7a2021-02-05 12:47:08 -0700399#endif
David Brown99844272021-01-15 12:04:47 -0700400#endif /* PSA_WANT_ALG_CTR */
401
402#if defined(PSA_WANT_ALG_CFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700403#if !defined(MBEDTLS_PSA_ACCEL_ALG_CFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700404 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700405#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700406#define MBEDTLS_CIPHER_MODE_CFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700407#endif
David Brown99844272021-01-15 12:04:47 -0700408#endif /* PSA_WANT_ALG_CFB */
409
410#if defined(PSA_WANT_ALG_OFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700411#if !defined(MBEDTLS_PSA_ACCEL_ALG_OFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700412 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700413#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700414#define MBEDTLS_CIPHER_MODE_OFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700415#endif
David Brown99844272021-01-15 12:04:47 -0700416#endif /* PSA_WANT_ALG_OFB */
417
Gilles Peskine7a2e83b2022-03-17 11:09:23 +0100418#if defined(PSA_WANT_ALG_ECB_NO_PADDING) && \
419 !defined(MBEDTLS_PSA_ACCEL_ALG_ECB_NO_PADDING)
David Brownbe380c12021-02-11 10:55:48 -0700420#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700421#endif
422
David Brown12f45f92021-01-26 11:50:36 -0700423#if defined(PSA_WANT_ALG_CBC_NO_PADDING)
David Brown4b9ec7a2021-02-05 12:47:08 -0700424#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING) || \
David Brownfc468182021-02-09 16:23:34 -0700425 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700426#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700427#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown4b9ec7a2021-02-05 12:47:08 -0700428#endif
David Brown12f45f92021-01-26 11:50:36 -0700429#endif /* PSA_WANT_ALG_CBC_NO_PADDING */
430
431#if defined(PSA_WANT_ALG_CBC_PKCS7)
David Brown4b9ec7a2021-02-05 12:47:08 -0700432#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7) || \
David Brownfc468182021-02-09 16:23:34 -0700433 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700434#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700435#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brownfc468182021-02-09 16:23:34 -0700436#define MBEDTLS_CIPHER_PADDING_PKCS7
David Brown4b9ec7a2021-02-05 12:47:08 -0700437#endif
David Brown12f45f92021-01-26 11:50:36 -0700438#endif /* PSA_WANT_ALG_CBC_PKCS7 */
439
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100440#if defined(PSA_WANT_ALG_CCM)
441#if !defined(MBEDTLS_PSA_ACCEL_ALG_CCM) || \
442 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200443 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100444 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
445#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100446#define MBEDTLS_PSA_BUILTIN_ALG_CCM_STAR_NO_TAG 1
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100447#define MBEDTLS_CCM_C
448#endif
449#endif /* PSA_WANT_ALG_CCM */
450
451#if defined(PSA_WANT_ALG_GCM)
452#if !defined(MBEDTLS_PSA_ACCEL_ALG_GCM) || \
453 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200454 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100455 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
456#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
457#define MBEDTLS_GCM_C
458#endif
459#endif /* PSA_WANT_ALG_GCM */
460
David Brownac4fa072021-02-08 16:47:35 -0700461#if defined(PSA_WANT_ALG_CHACHA20_POLY1305)
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200462#if !defined(MBEDTLS_PSA_ACCEL_ALG_CHACHA20_POLY1305)
David Brownac4fa072021-02-08 16:47:35 -0700463#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
464#define MBEDTLS_CHACHAPOLY_C
Summer Qin9f2596f2022-06-17 12:50:32 +0800465#define MBEDTLS_CHACHA20_C
466#define MBEDTLS_POLY1305_C
David Brown86730a82021-02-09 16:24:11 -0700467#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700468#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200469#endif /* !MBEDTLS_PSA_ACCEL_ALG_CHACHA20_POLY1305 */
David Brownac4fa072021-02-08 16:47:35 -0700470#endif /* PSA_WANT_ALG_CHACHA20_POLY1305 */
471
David Browneed74df2021-03-15 15:53:57 -0600472#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_256)
473#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256)
474#define MBEDTLS_ECP_DP_BP256R1_ENABLED
475#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
476#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256 */
477#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_256 */
478
479#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_384)
480#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384)
481#define MBEDTLS_ECP_DP_BP384R1_ENABLED
482#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
483#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384 */
484#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_384 */
485
486#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_512)
487#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512)
488#define MBEDTLS_ECP_DP_BP512R1_ENABLED
489#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
490#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512 */
491#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_512 */
492
493#if defined(PSA_WANT_ECC_MONTGOMERY_255)
494#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255)
495#define MBEDTLS_ECP_DP_CURVE25519_ENABLED
496#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
497#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255 */
498#endif /* PSA_WANT_ECC_MONTGOMERY_255 */
499
500#if defined(PSA_WANT_ECC_MONTGOMERY_448)
501#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448)
502#define MBEDTLS_ECP_DP_CURVE448_ENABLED
503#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
504#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448 */
505#endif /* PSA_WANT_ECC_MONTGOMERY_448 */
506
David Brownc7b9b2b2021-02-19 21:05:52 -0700507#if defined(PSA_WANT_ECC_SECP_R1_192)
508#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192)
509#define MBEDTLS_ECP_DP_SECP192R1_ENABLED
510#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
511#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192 */
512#endif /* PSA_WANT_ECC_SECP_R1_192 */
513
514#if defined(PSA_WANT_ECC_SECP_R1_224)
515#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224)
516#define MBEDTLS_ECP_DP_SECP224R1_ENABLED
517#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
518#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224 */
519#endif /* PSA_WANT_ECC_SECP_R1_224 */
520
521#if defined(PSA_WANT_ECC_SECP_R1_256)
522#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256)
523#define MBEDTLS_ECP_DP_SECP256R1_ENABLED
524#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
525#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256 */
526#endif /* PSA_WANT_ECC_SECP_R1_256 */
527
528#if defined(PSA_WANT_ECC_SECP_R1_384)
529#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384)
530#define MBEDTLS_ECP_DP_SECP384R1_ENABLED
531#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
532#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384 */
533#endif /* PSA_WANT_ECC_SECP_R1_384 */
534
535#if defined(PSA_WANT_ECC_SECP_R1_521)
536#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521)
537#define MBEDTLS_ECP_DP_SECP521R1_ENABLED
538#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
539#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521 */
540#endif /* PSA_WANT_ECC_SECP_R1_521 */
541
542#if defined(PSA_WANT_ECC_SECP_K1_192)
543#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192)
David Brown8de143e2021-02-19 14:08:00 -0700544#define MBEDTLS_ECP_DP_SECP192K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700545#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
546#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192 */
547#endif /* PSA_WANT_ECC_SECP_K1_192 */
David Brown8de143e2021-02-19 14:08:00 -0700548
David Brownc7b9b2b2021-02-19 21:05:52 -0700549#if defined(PSA_WANT_ECC_SECP_K1_224)
550#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224)
Ronald Crone1f55162021-03-25 15:09:47 +0100551/*
552 * SECP224K1 is buggy via the PSA API in Mbed TLS
Dave Rodgman017a1992022-03-31 14:07:01 +0100553 * (https://github.com/Mbed-TLS/mbedtls/issues/3541).
Ronald Crone1f55162021-03-25 15:09:47 +0100554 */
555#error "SECP224K1 is buggy via the PSA API in Mbed TLS."
David Brown8de143e2021-02-19 14:08:00 -0700556#define MBEDTLS_ECP_DP_SECP224K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700557#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
558#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224 */
559#endif /* PSA_WANT_ECC_SECP_K1_224 */
David Brown8de143e2021-02-19 14:08:00 -0700560
David Brownc7b9b2b2021-02-19 21:05:52 -0700561#if defined(PSA_WANT_ECC_SECP_K1_256)
562#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256)
David Brown9b178de2021-03-10 13:14:48 -0700563#define MBEDTLS_ECP_DP_SECP256K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700564#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
565#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256 */
566#endif /* PSA_WANT_ECC_SECP_K1_256 */
David Brown8de143e2021-02-19 14:08:00 -0700567
Gilles Peskine1231eb52021-04-19 22:24:23 +0200568
569
570/****************************************************************/
571/* Infer PSA requirements from Mbed TLS capabilities */
572/****************************************************************/
573
John Durkop714e3a12020-09-29 22:07:04 -0700574#else /* MBEDTLS_PSA_CRYPTO_CONFIG */
575
576/*
577 * Ensure PSA_WANT_* defines are setup properly if MBEDTLS_PSA_CRYPTO_CONFIG
578 * is not defined
579 */
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100580
Ronald Cron3d471812021-03-18 13:40:31 +0100581#if defined(MBEDTLS_CCM_C)
582#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100583#define MBEDTLS_PSA_BUILTIN_ALG_CCM_STAR_NO_TAG 1
Ronald Cron3d471812021-03-18 13:40:31 +0100584#define PSA_WANT_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100585#define PSA_WANT_ALG_CCM_STAR_NO_TAG 1
Ronald Cron3d471812021-03-18 13:40:31 +0100586#endif /* MBEDTLS_CCM_C */
587
588#if defined(MBEDTLS_CMAC_C)
589#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
590#define PSA_WANT_ALG_CMAC 1
591#endif /* MBEDTLS_CMAC_C */
592
John Durkopd62b6782020-11-30 21:06:05 -0800593#if defined(MBEDTLS_ECDH_C)
594#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
595#define PSA_WANT_ALG_ECDH 1
596#endif /* MBEDTLS_ECDH_C */
597
598#if defined(MBEDTLS_ECDSA_C)
599#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
600#define PSA_WANT_ALG_ECDSA 1
Gilles Peskine1231eb52021-04-19 22:24:23 +0200601#define PSA_WANT_ALG_ECDSA_ANY 1
John Durkopd62b6782020-11-30 21:06:05 -0800602
603// Only add in DETERMINISTIC support if ECDSA is also enabled
604#if defined(MBEDTLS_ECDSA_DETERMINISTIC)
605#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
606#define PSA_WANT_ALG_DETERMINISTIC_ECDSA 1
607#endif /* MBEDTLS_ECDSA_DETERMINISTIC */
608
609#endif /* MBEDTLS_ECDSA_C */
610
611#if defined(MBEDTLS_ECP_C)
612#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR 1
613#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR 1
614#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
615#define PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY 1
616#endif /* MBEDTLS_ECP_C */
617
Ronald Cron3d471812021-03-18 13:40:31 +0100618#if defined(MBEDTLS_GCM_C)
619#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
620#define PSA_WANT_ALG_GCM 1
621#endif /* MBEDTLS_GCM_C */
622
Przemek Stekiel18399d82022-06-27 13:34:50 +0200623/* Enable PSA HKDF algorithm if mbedtls HKDF is supported.
624 * PSA HKDF EXTRACT and PSA HKDF EXPAND have minimal cost when
625 * PSA HKDF is enabled, so enable both algorithms together
626 * with PSA HKDF. */
John Durkopd62b6782020-11-30 21:06:05 -0800627#if defined(MBEDTLS_HKDF_C)
628#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
629#define PSA_WANT_ALG_HMAC 1
630#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
631#define PSA_WANT_ALG_HKDF 1
Przemek Stekielb33bd192022-06-21 09:58:51 +0200632#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXTRACT 1
633#define PSA_WANT_ALG_HKDF_EXTRACT 1
634#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXPAND 1
635#define PSA_WANT_ALG_HKDF_EXPAND 1
John Durkopd62b6782020-11-30 21:06:05 -0800636#endif /* MBEDTLS_HKDF_C */
637
John Durkopd62b6782020-11-30 21:06:05 -0800638#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
639#define PSA_WANT_ALG_HMAC 1
Gilles Peskine47a89332021-01-12 00:00:15 +0100640#define PSA_WANT_KEY_TYPE_HMAC
Andrzej Kurek65bf73e2022-08-31 14:59:31 -0400641
642#if defined(MBEDTLS_MD_C)
John Durkopd62b6782020-11-30 21:06:05 -0800643#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
644#define PSA_WANT_ALG_TLS12_PRF 1
645#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
646#define PSA_WANT_ALG_TLS12_PSK_TO_MS 1
647#endif /* MBEDTLS_MD_C */
648
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100649#if defined(MBEDTLS_MD5_C)
650#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
651#define PSA_WANT_ALG_MD5 1
652#endif
653
Neil Armstrong637d0a02022-05-25 11:28:22 +0200654#if defined(MBEDTLS_ECJPAKE_C)
655#define MBEDTLS_PSA_BUILTIN_PAKE 1
Neil Armstronga557cb82022-06-10 08:58:32 +0200656#define MBEDTLS_PSA_BUILTIN_ALG_JPAKE 1
657#define PSA_WANT_ALG_JPAKE 1
Neil Armstrong637d0a02022-05-25 11:28:22 +0200658#endif
659
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100660#if defined(MBEDTLS_RIPEMD160_C)
661#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
662#define PSA_WANT_ALG_RIPEMD160 1
663#endif
664
John Durkopd62b6782020-11-30 21:06:05 -0800665#if defined(MBEDTLS_RSA_C)
666#if defined(MBEDTLS_PKCS1_V15)
667#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
668#define PSA_WANT_ALG_RSA_PKCS1V15_CRYPT 1
669#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
670#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN 1
Gilles Peskine1231eb52021-04-19 22:24:23 +0200671#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW 1
Yuto Takano7828ca22021-08-10 11:26:15 +0100672#endif /* MBEDTLS_PKCS1_V15 */
John Durkopd62b6782020-11-30 21:06:05 -0800673#if defined(MBEDTLS_PKCS1_V21)
674#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
675#define PSA_WANT_ALG_RSA_OAEP 1
676#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
677#define PSA_WANT_ALG_RSA_PSS 1
678#endif /* MBEDTLS_PKCS1_V21 */
679#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR 1
680#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR 1
681#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
682#define PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY 1
683#endif /* MBEDTLS_RSA_C */
684
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100685#if defined(MBEDTLS_SHA1_C)
686#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
687#define PSA_WANT_ALG_SHA_1 1
688#endif
689
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200690#if defined(MBEDTLS_SHA224_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100691#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
Gilles Peskineb65db072021-01-12 00:00:53 +0100692#define PSA_WANT_ALG_SHA_224 1
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200693#endif
694
695#if defined(MBEDTLS_SHA256_C)
696#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100697#define PSA_WANT_ALG_SHA_256 1
698#endif
699
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200700#if defined(MBEDTLS_SHA384_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100701#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
702#define PSA_WANT_ALG_SHA_384 1
703#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200704
705#if defined(MBEDTLS_SHA512_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100706#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
707#define PSA_WANT_ALG_SHA_512 1
708#endif
709
David Brown94933082021-01-05 12:03:25 -0700710#if defined(MBEDTLS_AES_C)
711#define PSA_WANT_KEY_TYPE_AES 1
David Brownda7dbb72021-01-26 11:44:15 -0700712#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700713#endif
714
Gilles Peskine09c46da2021-10-08 15:48:16 +0200715#if defined(MBEDTLS_ARIA_C)
716#define PSA_WANT_KEY_TYPE_ARIA 1
717#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
718#endif
719
David Brown686e6e82021-01-05 12:03:25 -0700720#if defined(MBEDTLS_CAMELLIA_C)
721#define PSA_WANT_KEY_TYPE_CAMELLIA 1
David Brownda7dbb72021-01-26 11:44:15 -0700722#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700723#endif
724
David Brownb65a7f72021-01-15 12:04:09 -0700725#if defined(MBEDTLS_DES_C)
726#define PSA_WANT_KEY_TYPE_DES 1
David Brownda7dbb72021-01-26 11:44:15 -0700727#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700728#endif
729
Andrzej Kurekd60907b2022-09-14 10:02:30 -0400730#if defined(MBEDTLS_PSA_BUILTIN_ALG_SHA_256)
731#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_ECJPAKE_TO_PMS 1
732#define PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS 1
733#endif
734
David Brownb16727a2021-02-08 16:31:46 -0700735#if defined(MBEDTLS_CHACHA20_C)
736#define PSA_WANT_KEY_TYPE_CHACHA20 1
737#define PSA_WANT_ALG_STREAM_CIPHER 1
738#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
739#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brownac4fa072021-02-08 16:47:35 -0700740#if defined(MBEDTLS_CHACHAPOLY_C)
741#define PSA_WANT_ALG_CHACHA20_POLY1305 1
David Brown86730a82021-02-09 16:24:11 -0700742#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700743#endif
David Brownb16727a2021-02-08 16:31:46 -0700744#endif
745
David Brown99844272021-01-15 12:04:47 -0700746#if defined(MBEDTLS_CIPHER_MODE_CBC)
David Brown10cb81c2021-02-09 16:10:29 -0700747#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700748#define PSA_WANT_ALG_CBC_NO_PADDING 1
749#if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
David Brown12f45f92021-01-26 11:50:36 -0700750#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brown99844272021-01-15 12:04:47 -0700751#define PSA_WANT_ALG_CBC_PKCS7 1
752#endif
753#endif
754
755#if defined(MBEDTLS_AES_C) || defined(MBEDTLS_DES_C) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200756 defined(MBEDTLS_ARIA_C) || defined(MBEDTLS_CAMELLIA_C)
David Brown10cb81c2021-02-09 16:10:29 -0700757#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700758#define PSA_WANT_ALG_ECB_NO_PADDING 1
759#endif
760
761#if defined(MBEDTLS_CIPHER_MODE_CFB)
David Brown12f45f92021-01-26 11:50:36 -0700762#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700763#define PSA_WANT_ALG_CFB 1
764#endif
765
766#if defined(MBEDTLS_CIPHER_MODE_CTR)
David Brown12f45f92021-01-26 11:50:36 -0700767#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700768#define PSA_WANT_ALG_CTR 1
769#endif
770
771#if defined(MBEDTLS_CIPHER_MODE_OFB)
David Brown12f45f92021-01-26 11:50:36 -0700772#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700773#define PSA_WANT_ALG_OFB 1
774#endif
775
David Browneed74df2021-03-15 15:53:57 -0600776#if defined(MBEDTLS_ECP_DP_BP256R1_ENABLED)
777#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
778#define PSA_WANT_ECC_BRAINPOOL_P_R1_256
779#endif
780
781#if defined(MBEDTLS_ECP_DP_BP384R1_ENABLED)
782#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
783#define PSA_WANT_ECC_BRAINPOOL_P_R1_384
784#endif
785
786#if defined(MBEDTLS_ECP_DP_BP512R1_ENABLED)
787#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
788#define PSA_WANT_ECC_BRAINPOOL_P_R1_512
789#endif
790
791#if defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED)
792#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
793#define PSA_WANT_ECC_MONTGOMERY_255
794#endif
795
Archanaef6aa5c2021-06-08 11:40:10 +0530796#if defined(MBEDTLS_ECP_DP_CURVE448_ENABLED)
David Browneed74df2021-03-15 15:53:57 -0600797#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
798#define PSA_WANT_ECC_MONTGOMERY_448
799#endif
800
David Brown8de143e2021-02-19 14:08:00 -0700801#if defined(MBEDTLS_ECP_DP_SECP192R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700802#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
803#define PSA_WANT_ECC_SECP_R1_192
David Brown8de143e2021-02-19 14:08:00 -0700804#endif
805
806#if defined(MBEDTLS_ECP_DP_SECP224R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700807#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
808#define PSA_WANT_ECC_SECP_R1_224
David Brown8de143e2021-02-19 14:08:00 -0700809#endif
810
811#if defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700812#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
813#define PSA_WANT_ECC_SECP_R1_256
David Brown8de143e2021-02-19 14:08:00 -0700814#endif
815
816#if defined(MBEDTLS_ECP_DP_SECP384R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700817#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
818#define PSA_WANT_ECC_SECP_R1_384
David Brown8de143e2021-02-19 14:08:00 -0700819#endif
820
821#if defined(MBEDTLS_ECP_DP_SECP521R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700822#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
823#define PSA_WANT_ECC_SECP_R1_521
David Brown8de143e2021-02-19 14:08:00 -0700824#endif
825
826#if defined(MBEDTLS_ECP_DP_SECP192K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700827#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
828#define PSA_WANT_ECC_SECP_K1_192
David Brown8de143e2021-02-19 14:08:00 -0700829#endif
830
Dave Rodgman017a1992022-03-31 14:07:01 +0100831/* SECP224K1 is buggy via the PSA API (https://github.com/Mbed-TLS/mbedtls/issues/3541) */
Gilles Peskine39841302021-03-23 12:06:45 +0100832#if 0 && defined(MBEDTLS_ECP_DP_SECP224K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700833#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
834#define PSA_WANT_ECC_SECP_K1_224
David Brown8de143e2021-02-19 14:08:00 -0700835#endif
836
David Brown9b178de2021-03-10 13:14:48 -0700837#if defined(MBEDTLS_ECP_DP_SECP256K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700838#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
839#define PSA_WANT_ECC_SECP_K1_256
David Brown8de143e2021-02-19 14:08:00 -0700840#endif
841
John Durkop2dfaf9c2020-09-24 04:30:10 -0700842#endif /* MBEDTLS_PSA_CRYPTO_CONFIG */
John Durkopd8959392020-09-20 23:09:17 -0700843
Gilles Peskine60b29fe2021-02-16 14:06:50 +0100844/* These features are always enabled. */
845#define PSA_WANT_KEY_TYPE_DERIVE 1
Gilles Peskinebba26302022-12-15 23:25:17 +0100846#define PSA_WANT_KEY_TYPE_PASSWORD 1
847#define PSA_WANT_KEY_TYPE_PASSWORD_HASH 1
Gilles Peskine60b29fe2021-02-16 14:06:50 +0100848#define PSA_WANT_KEY_TYPE_RAW_DATA 1
849
John Durkop6e33dbe2020-09-17 21:15:13 -0700850#ifdef __cplusplus
851}
852#endif
853
854#endif /* MBEDTLS_CONFIG_PSA_H */