blob: f7de6d1e5f4aad108e11d964ebc573ddcff4265b [file] [log] [blame]
John Durkop6e33dbe2020-09-17 21:15:13 -07001/**
2 * \file mbedtls/config_psa.h
3 * \brief PSA crypto configuration options (set of defines)
4 *
John Durkop34818822020-10-12 21:36:22 -07005 * This set of compile-time options takes settings defined in
Bence Szépkútibb0cfeb2021-05-28 09:42:25 +02006 * include/mbedtls/mbedtls_config.h and include/psa/crypto_config.h and uses
John Durkop34818822020-10-12 21:36:22 -07007 * those definitions to define symbols used in the library code.
8 *
9 * Users and integrators should not edit this file, please edit
Tom Cosgrove1797b052022-12-04 17:19:59 +000010 * include/mbedtls/mbedtls_config.h for MBEDTLS_XXX settings or
John Durkop34818822020-10-12 21:36:22 -070011 * include/psa/crypto_config.h for PSA_WANT_XXX settings.
John Durkop6e33dbe2020-09-17 21:15:13 -070012 */
13/*
14 * Copyright The Mbed TLS Contributors
15 * SPDX-License-Identifier: Apache-2.0
16 *
17 * Licensed under the Apache License, Version 2.0 (the "License"); you may
18 * not use this file except in compliance with the License.
19 * You may obtain a copy of the License at
20 *
21 * http://www.apache.org/licenses/LICENSE-2.0
22 *
23 * Unless required by applicable law or agreed to in writing, software
24 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
25 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
26 * See the License for the specific language governing permissions and
27 * limitations under the License.
28 */
29
30#ifndef MBEDTLS_CONFIG_PSA_H
31#define MBEDTLS_CONFIG_PSA_H
32
John Durkop714e3a12020-09-29 22:07:04 -070033#if defined(MBEDTLS_PSA_CRYPTO_CONFIG)
Gilles Peskinef4c6eb02022-03-16 17:10:48 +010034#if defined(MBEDTLS_PSA_CRYPTO_CONFIG_FILE)
35#include MBEDTLS_PSA_CRYPTO_CONFIG_FILE
36#else
John Durkop6e33dbe2020-09-17 21:15:13 -070037#include "psa/crypto_config.h"
Gilles Peskinef4c6eb02022-03-16 17:10:48 +010038#endif
John Durkop76228ac2020-09-29 22:33:49 -070039#endif /* defined(MBEDTLS_PSA_CRYPTO_CONFIG) */
John Durkop6e33dbe2020-09-17 21:15:13 -070040
Gilles Peskinef4c6eb02022-03-16 17:10:48 +010041#if defined(MBEDTLS_PSA_CRYPTO_USER_CONFIG_FILE)
42#include MBEDTLS_PSA_CRYPTO_USER_CONFIG_FILE
43#endif
44
John Durkop6e33dbe2020-09-17 21:15:13 -070045#ifdef __cplusplus
46extern "C" {
47#endif
48
Gilles Peskine1231eb52021-04-19 22:24:23 +020049
50
51/****************************************************************/
52/* De facto synonyms */
53/****************************************************************/
54
55#if defined(PSA_WANT_ALG_ECDSA_ANY) && !defined(PSA_WANT_ALG_ECDSA)
56#define PSA_WANT_ALG_ECDSA PSA_WANT_ALG_ECDSA_ANY
57#elif !defined(PSA_WANT_ALG_ECDSA_ANY) && defined(PSA_WANT_ALG_ECDSA)
58#define PSA_WANT_ALG_ECDSA_ANY PSA_WANT_ALG_ECDSA
59#endif
60
Gilles Peskine08622b62022-03-15 16:40:59 +010061#if defined(PSA_WANT_ALG_CCM_STAR_NO_TAG) && !defined(PSA_WANT_ALG_CCM)
62#define PSA_WANT_ALG_CCM PSA_WANT_ALG_CCM_STAR_NO_TAG
63#elif !defined(PSA_WANT_ALG_CCM_STAR_NO_TAG) && defined(PSA_WANT_ALG_CCM)
64#define PSA_WANT_ALG_CCM_STAR_NO_TAG PSA_WANT_ALG_CCM
65#endif
66
Gilles Peskine1231eb52021-04-19 22:24:23 +020067#if defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW) && !defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
68#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW
69#elif !defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW) && defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
70#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW PSA_WANT_ALG_RSA_PKCS1V15_SIGN
71#endif
72
Gilles Peskine44c96aa2021-10-04 18:33:56 +020073#if defined(PSA_WANT_ALG_RSA_PSS_ANY_SALT) && !defined(PSA_WANT_ALG_RSA_PSS)
74#define PSA_WANT_ALG_RSA_PSS PSA_WANT_ALG_RSA_PSS_ANY_SALT
75#elif !defined(PSA_WANT_ALG_RSA_PSS_ANY_SALT) && defined(PSA_WANT_ALG_RSA_PSS)
76#define PSA_WANT_ALG_RSA_PSS_ANY_SALT PSA_WANT_ALG_RSA_PSS
77#endif
78
Gilles Peskine1231eb52021-04-19 22:24:23 +020079
80
81/****************************************************************/
82/* Require built-in implementations based on PSA requirements */
83/****************************************************************/
84
John Durkop2dfaf9c2020-09-24 04:30:10 -070085#if defined(MBEDTLS_PSA_CRYPTO_CONFIG)
John Durkopd8959392020-09-20 23:09:17 -070086
John Durkopd62b6782020-11-30 21:06:05 -080087#if defined(PSA_WANT_ALG_DETERMINISTIC_ECDSA)
88#if !defined(MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA)
89#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
90#define MBEDTLS_ECDSA_DETERMINISTIC
91#define MBEDTLS_ECDSA_C
92#define MBEDTLS_HMAC_DRBG_C
93#define MBEDTLS_MD_C
94#endif /* !MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA */
95#endif /* PSA_WANT_ALG_DETERMINISTIC_ECDSA */
96
97#if defined(PSA_WANT_ALG_ECDH)
98#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDH)
99#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
100#define MBEDTLS_ECDH_C
101#define MBEDTLS_ECP_C
102#define MBEDTLS_BIGNUM_C
103#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDH */
104#endif /* PSA_WANT_ALG_ECDH */
105
106#if defined(PSA_WANT_ALG_ECDSA)
107#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDSA)
108#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
109#define MBEDTLS_ECDSA_C
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200110#define MBEDTLS_ECP_C
111#define MBEDTLS_BIGNUM_C
112#define MBEDTLS_ASN1_PARSE_C
113#define MBEDTLS_ASN1_WRITE_C
John Durkopd62b6782020-11-30 21:06:05 -0800114#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDSA */
115#endif /* PSA_WANT_ALG_ECDSA */
116
117#if defined(PSA_WANT_ALG_HKDF)
118#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF)
119#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
120#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
121#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF */
122#endif /* PSA_WANT_ALG_HKDF */
123
Przemek Stekiel3e8249c2022-06-03 14:05:07 +0200124#if defined(PSA_WANT_ALG_HKDF_EXTRACT)
125#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF_EXTRACT)
126#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
127#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXTRACT 1
128#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF_EXTRACT */
129#endif /* PSA_WANT_ALG_HKDF_EXTRACT */
130
131#if defined(PSA_WANT_ALG_HKDF_EXPAND)
132#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF_EXPAND)
133#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
134#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXPAND 1
135#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF_EXPAND */
136#endif /* PSA_WANT_ALG_HKDF_EXPAND */
137
John Durkopd62b6782020-11-30 21:06:05 -0800138#if defined(PSA_WANT_ALG_HMAC)
139#if !defined(MBEDTLS_PSA_ACCEL_ALG_HMAC)
140#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
141#endif /* !MBEDTLS_PSA_ACCEL_ALG_HMAC */
142#endif /* PSA_WANT_ALG_HMAC */
143
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100144#if defined(PSA_WANT_ALG_MD5) && !defined(MBEDTLS_PSA_ACCEL_ALG_MD5)
145#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
146#define MBEDTLS_MD5_C
147#endif
148
Neil Armstronga557cb82022-06-10 08:58:32 +0200149#if defined(PSA_WANT_ALG_JPAKE)
Przemek Stekiel4aa99402023-02-27 13:00:57 +0100150#if !defined(MBEDTLS_PSA_ACCEL_ALG_JPAKE)
Neil Armstrong637d0a02022-05-25 11:28:22 +0200151#define MBEDTLS_PSA_BUILTIN_PAKE 1
Neil Armstronga557cb82022-06-10 08:58:32 +0200152#define MBEDTLS_PSA_BUILTIN_ALG_JPAKE 1
Neil Armstronged407822022-06-15 11:21:33 +0200153#define MBEDTLS_ECP_DP_SECP256R1_ENABLED
Neil Armstrong637d0a02022-05-25 11:28:22 +0200154#define MBEDTLS_BIGNUM_C
155#define MBEDTLS_ECP_C
Neil Armstrong637d0a02022-05-25 11:28:22 +0200156#define MBEDTLS_ECJPAKE_C
Przemek Stekiel4aa99402023-02-27 13:00:57 +0100157#define MBEDTLS_SHA256_C
158#endif /* MBEDTLS_PSA_ACCEL_ALG_JPAKE */
Neil Armstronga557cb82022-06-10 08:58:32 +0200159#endif /* PSA_WANT_ALG_JPAKE */
Neil Armstrong637d0a02022-05-25 11:28:22 +0200160
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100161#if defined(PSA_WANT_ALG_RIPEMD160) && !defined(MBEDTLS_PSA_ACCEL_ALG_RIPEMD160)
162#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
163#define MBEDTLS_RIPEMD160_C
164#endif
165
John Durkopd62b6782020-11-30 21:06:05 -0800166#if defined(PSA_WANT_ALG_RSA_OAEP)
167#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP)
168#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
169#define MBEDTLS_RSA_C
170#define MBEDTLS_BIGNUM_C
171#define MBEDTLS_OID_C
172#define MBEDTLS_PKCS1_V21
John Durkopd62b6782020-11-30 21:06:05 -0800173#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP */
174#endif /* PSA_WANT_ALG_RSA_OAEP */
175
176#if defined(PSA_WANT_ALG_RSA_PKCS1V15_CRYPT)
177#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT)
178#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
179#define MBEDTLS_RSA_C
180#define MBEDTLS_BIGNUM_C
181#define MBEDTLS_OID_C
182#define MBEDTLS_PKCS1_V15
183#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT */
184#endif /* PSA_WANT_ALG_RSA_PKCS1V15_CRYPT */
185
186#if defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
187#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN)
188#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
189#define MBEDTLS_RSA_C
190#define MBEDTLS_BIGNUM_C
191#define MBEDTLS_OID_C
192#define MBEDTLS_PKCS1_V15
John Durkopd62b6782020-11-30 21:06:05 -0800193#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN */
194#endif /* PSA_WANT_ALG_RSA_PKCS1V15_SIGN */
195
196#if defined(PSA_WANT_ALG_RSA_PSS)
197#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PSS)
198#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
199#define MBEDTLS_RSA_C
200#define MBEDTLS_BIGNUM_C
201#define MBEDTLS_OID_C
202#define MBEDTLS_PKCS1_V21
John Durkopd62b6782020-11-30 21:06:05 -0800203#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PSS */
204#endif /* PSA_WANT_ALG_RSA_PSS */
205
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100206#if defined(PSA_WANT_ALG_SHA_1) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_1)
207#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
208#define MBEDTLS_SHA1_C
209#endif
210
211#if defined(PSA_WANT_ALG_SHA_224) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_224)
212#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200213#define MBEDTLS_SHA224_C
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100214#endif
215
216#if defined(PSA_WANT_ALG_SHA_256) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_256)
217#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
218#define MBEDTLS_SHA256_C
219#endif
220
221#if defined(PSA_WANT_ALG_SHA_384) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_384)
222#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200223#define MBEDTLS_SHA384_C
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100224#endif
225
226#if defined(PSA_WANT_ALG_SHA_512) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_512)
227#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
228#define MBEDTLS_SHA512_C
229#endif
230
John Durkop07cc04a2020-11-16 22:08:34 -0800231#if defined(PSA_WANT_ALG_TLS12_PRF)
232#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF)
John Durkopd62b6782020-11-30 21:06:05 -0800233#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
John Durkop07cc04a2020-11-16 22:08:34 -0800234#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF */
235#endif /* PSA_WANT_ALG_TLS12_PRF */
236
237#if defined(PSA_WANT_ALG_TLS12_PSK_TO_MS)
238#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS)
John Durkopd62b6782020-11-30 21:06:05 -0800239#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
John Durkop07cc04a2020-11-16 22:08:34 -0800240#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS */
241#endif /* PSA_WANT_ALG_TLS12_PSK_TO_MS */
242
Andrzej Kurek08d34b82022-07-29 10:00:16 -0400243#if defined(PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS)
244#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_ECJPAKE_TO_PMS)
245#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_ECJPAKE_TO_PMS 1
246#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_ECJPAKE_TO_PMS */
247#endif /* PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS */
248
John Durkop07cc04a2020-11-16 22:08:34 -0800249#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR)
250#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR)
John Durkopd62b6782020-11-30 21:06:05 -0800251#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR 1
John Durkop07cc04a2020-11-16 22:08:34 -0800252#define MBEDTLS_ECP_C
253#define MBEDTLS_BIGNUM_C
254#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR */
255#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR */
256
257#if defined(PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY)
258#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800259#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
John Durkop07cc04a2020-11-16 22:08:34 -0800260#define MBEDTLS_ECP_C
261#define MBEDTLS_BIGNUM_C
262#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY */
263#endif /* PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY */
264
John Durkop9814fa22020-11-04 12:28:15 -0800265#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR)
John Durkop0e005192020-10-31 22:06:54 -0700266#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR)
John Durkopd62b6782020-11-30 21:06:05 -0800267#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR 1
John Durkop0e005192020-10-31 22:06:54 -0700268#define MBEDTLS_RSA_C
269#define MBEDTLS_BIGNUM_C
270#define MBEDTLS_OID_C
271#define MBEDTLS_GENPRIME
John Durkop07cc04a2020-11-16 22:08:34 -0800272#define MBEDTLS_PK_PARSE_C
273#define MBEDTLS_PK_WRITE_C
274#define MBEDTLS_PK_C
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200275#define MBEDTLS_ASN1_PARSE_C
276#define MBEDTLS_ASN1_WRITE_C
John Durkop0e005192020-10-31 22:06:54 -0700277#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR */
John Durkop9814fa22020-11-04 12:28:15 -0800278#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR */
279
280#if defined(PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkop0e005192020-10-31 22:06:54 -0700281#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800282#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
John Durkop0e005192020-10-31 22:06:54 -0700283#define MBEDTLS_RSA_C
284#define MBEDTLS_BIGNUM_C
285#define MBEDTLS_OID_C
John Durkop07cc04a2020-11-16 22:08:34 -0800286#define MBEDTLS_PK_PARSE_C
287#define MBEDTLS_PK_WRITE_C
288#define MBEDTLS_PK_C
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200289#define MBEDTLS_ASN1_PARSE_C
290#define MBEDTLS_ASN1_WRITE_C
John Durkop0e005192020-10-31 22:06:54 -0700291#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkop9814fa22020-11-04 12:28:15 -0800292#endif /* PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkopd0321952020-10-29 21:37:36 -0700293
David Brownb781f752021-02-08 15:44:52 -0700294/* If any of the block modes are requested that don't have an
295 * associated HW assist, define PSA_HAVE_SOFT_BLOCK_MODE for checking
296 * in the block cipher key types. */
297#if (defined(PSA_WANT_ALG_CTR) && !defined(MBEDTLS_PSA_ACCEL_ALG_CTR)) || \
Bence Szépkúti7921cce2021-02-17 11:46:50 +0100298 (defined(PSA_WANT_ALG_CFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_CFB)) || \
David Brownb781f752021-02-08 15:44:52 -0700299 (defined(PSA_WANT_ALG_OFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_OFB)) || \
David Brownb781f752021-02-08 15:44:52 -0700300 defined(PSA_WANT_ALG_ECB_NO_PADDING) || \
301 (defined(PSA_WANT_ALG_CBC_NO_PADDING) && \
Gilles Peskine449bd832023-01-11 14:50:10 +0100302 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING)) || \
David Brownb781f752021-02-08 15:44:52 -0700303 (defined(PSA_WANT_ALG_CBC_PKCS7) && \
Gilles Peskine449bd832023-01-11 14:50:10 +0100304 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7)) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100305 (defined(PSA_WANT_ALG_CMAC) && !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC))
David Brownb781f752021-02-08 15:44:52 -0700306#define PSA_HAVE_SOFT_BLOCK_MODE 1
307#endif
308
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100309#if (defined(PSA_WANT_ALG_GCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_GCM)) || \
310 (defined(PSA_WANT_ALG_CCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_CCM))
311#define PSA_HAVE_SOFT_BLOCK_AEAD 1
312#endif
313
David Brown94933082021-01-05 12:03:25 -0700314#if defined(PSA_WANT_KEY_TYPE_AES)
David Browne1f91f02021-02-09 15:56:22 -0700315#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_AES)
316#define PSA_HAVE_SOFT_KEY_TYPE_AES 1
317#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_AES */
318#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100319 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
320 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
David Brown78a429b2021-01-21 09:48:57 -0700321#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700322#define MBEDTLS_AES_C
David Browne1f91f02021-02-09 15:56:22 -0700323#endif /* PSA_HAVE_SOFT_KEY_TYPE_AES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown94933082021-01-05 12:03:25 -0700324#endif /* PSA_WANT_KEY_TYPE_AES */
325
Gilles Peskine09c46da2021-10-08 15:48:16 +0200326#if defined(PSA_WANT_KEY_TYPE_ARIA)
327#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA)
328#define PSA_HAVE_SOFT_KEY_TYPE_ARIA 1
329#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA */
330#if defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
331 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
332 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
333#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
334#define MBEDTLS_ARIA_C
335#endif /* PSA_HAVE_SOFT_KEY_TYPE_ARIA || PSA_HAVE_SOFT_BLOCK_MODE */
336#endif /* PSA_WANT_KEY_TYPE_ARIA */
337
David Brown686e6e82021-01-05 12:03:25 -0700338#if defined(PSA_WANT_KEY_TYPE_CAMELLIA)
David Browne1f91f02021-02-09 15:56:22 -0700339#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA)
340#define PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA 1
341#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA */
342#if defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100343 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
344 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
David Brown78a429b2021-01-21 09:48:57 -0700345#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700346#define MBEDTLS_CAMELLIA_C
David Browne1f91f02021-02-09 15:56:22 -0700347#endif /* PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown686e6e82021-01-05 12:03:25 -0700348#endif /* PSA_WANT_KEY_TYPE_CAMELLIA */
349
David Brownb65a7f72021-01-15 12:04:09 -0700350#if defined(PSA_WANT_KEY_TYPE_DES)
David Browne1f91f02021-02-09 15:56:22 -0700351#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DES)
352#define PSA_HAVE_SOFT_KEY_TYPE_DES 1
353#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DES */
354#if defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
David Brownb781f752021-02-08 15:44:52 -0700355 defined(PSA_HAVE_SOFT_BLOCK_MODE)
David Brown78a429b2021-01-21 09:48:57 -0700356#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700357#define MBEDTLS_DES_C
David Browne1f91f02021-02-09 15:56:22 -0700358#endif /*PSA_HAVE_SOFT_KEY_TYPE_DES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brownb65a7f72021-01-15 12:04:09 -0700359#endif /* PSA_WANT_KEY_TYPE_DES */
360
David Brownb16727a2021-02-08 16:31:46 -0700361#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
362#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20)
363#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
364#define MBEDTLS_CHACHA20_C
365#endif /*!MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20 */
366#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
367
David Brownf84a0f62021-02-09 15:59:41 -0700368/* If any of the software block ciphers are selected, define
369 * PSA_HAVE_SOFT_BLOCK_CIPHER, which can be used in any of these
370 * situations. */
371#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200372 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
David Brownf84a0f62021-02-09 15:59:41 -0700373 defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
374 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
375#define PSA_HAVE_SOFT_BLOCK_CIPHER 1
376#endif
377
David Brown99844272021-01-15 12:04:47 -0700378#if defined(PSA_WANT_ALG_STREAM_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700379#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brown99844272021-01-15 12:04:47 -0700380#endif /* PSA_WANT_ALG_STREAM_CIPHER */
381
Ronald Crond85e98d2021-03-25 15:32:32 +0100382#if defined(PSA_WANT_ALG_CBC_MAC)
383#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_MAC)
384#error "CBC-MAC is not yet supported via the PSA API in Mbed TLS."
385#define MBEDTLS_PSA_BUILTIN_ALG_CBC_MAC 1
386#endif /* !MBEDTLS_PSA_ACCEL_ALG_CBC_MAC */
387#endif /* PSA_WANT_ALG_CBC_MAC */
388
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100389#if defined(PSA_WANT_ALG_CMAC)
390#if !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC) || \
391 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
392#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
393#define MBEDTLS_CMAC_C
394#endif /* !MBEDTLS_PSA_ACCEL_ALG_CMAC */
395#endif /* PSA_WANT_ALG_CMAC */
396
David Brown99844272021-01-15 12:04:47 -0700397#if defined(PSA_WANT_ALG_CTR)
David Brown4b9ec7a2021-02-05 12:47:08 -0700398#if !defined(MBEDTLS_PSA_ACCEL_ALG_CTR) || \
David Brownf84a0f62021-02-09 15:59:41 -0700399 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700400#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700401#define MBEDTLS_CIPHER_MODE_CTR
David Brown4b9ec7a2021-02-05 12:47:08 -0700402#endif
David Brown99844272021-01-15 12:04:47 -0700403#endif /* PSA_WANT_ALG_CTR */
404
405#if defined(PSA_WANT_ALG_CFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700406#if !defined(MBEDTLS_PSA_ACCEL_ALG_CFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700407 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700408#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700409#define MBEDTLS_CIPHER_MODE_CFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700410#endif
David Brown99844272021-01-15 12:04:47 -0700411#endif /* PSA_WANT_ALG_CFB */
412
413#if defined(PSA_WANT_ALG_OFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700414#if !defined(MBEDTLS_PSA_ACCEL_ALG_OFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700415 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700416#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700417#define MBEDTLS_CIPHER_MODE_OFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700418#endif
David Brown99844272021-01-15 12:04:47 -0700419#endif /* PSA_WANT_ALG_OFB */
420
Gilles Peskine7a2e83b2022-03-17 11:09:23 +0100421#if defined(PSA_WANT_ALG_ECB_NO_PADDING) && \
422 !defined(MBEDTLS_PSA_ACCEL_ALG_ECB_NO_PADDING)
David Brownbe380c12021-02-11 10:55:48 -0700423#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700424#endif
425
David Brown12f45f92021-01-26 11:50:36 -0700426#if defined(PSA_WANT_ALG_CBC_NO_PADDING)
David Brown4b9ec7a2021-02-05 12:47:08 -0700427#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING) || \
David Brownfc468182021-02-09 16:23:34 -0700428 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700429#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700430#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown4b9ec7a2021-02-05 12:47:08 -0700431#endif
David Brown12f45f92021-01-26 11:50:36 -0700432#endif /* PSA_WANT_ALG_CBC_NO_PADDING */
433
434#if defined(PSA_WANT_ALG_CBC_PKCS7)
David Brown4b9ec7a2021-02-05 12:47:08 -0700435#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7) || \
David Brownfc468182021-02-09 16:23:34 -0700436 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700437#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700438#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brownfc468182021-02-09 16:23:34 -0700439#define MBEDTLS_CIPHER_PADDING_PKCS7
David Brown4b9ec7a2021-02-05 12:47:08 -0700440#endif
David Brown12f45f92021-01-26 11:50:36 -0700441#endif /* PSA_WANT_ALG_CBC_PKCS7 */
442
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100443#if defined(PSA_WANT_ALG_CCM)
444#if !defined(MBEDTLS_PSA_ACCEL_ALG_CCM) || \
445 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200446 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100447 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
448#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100449#define MBEDTLS_PSA_BUILTIN_ALG_CCM_STAR_NO_TAG 1
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100450#define MBEDTLS_CCM_C
451#endif
452#endif /* PSA_WANT_ALG_CCM */
453
454#if defined(PSA_WANT_ALG_GCM)
455#if !defined(MBEDTLS_PSA_ACCEL_ALG_GCM) || \
456 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200457 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100458 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
459#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
460#define MBEDTLS_GCM_C
461#endif
462#endif /* PSA_WANT_ALG_GCM */
463
David Brownac4fa072021-02-08 16:47:35 -0700464#if defined(PSA_WANT_ALG_CHACHA20_POLY1305)
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200465#if !defined(MBEDTLS_PSA_ACCEL_ALG_CHACHA20_POLY1305)
David Brownac4fa072021-02-08 16:47:35 -0700466#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
467#define MBEDTLS_CHACHAPOLY_C
Summer Qin9f2596f2022-06-17 12:50:32 +0800468#define MBEDTLS_CHACHA20_C
469#define MBEDTLS_POLY1305_C
David Brown86730a82021-02-09 16:24:11 -0700470#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700471#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200472#endif /* !MBEDTLS_PSA_ACCEL_ALG_CHACHA20_POLY1305 */
David Brownac4fa072021-02-08 16:47:35 -0700473#endif /* PSA_WANT_ALG_CHACHA20_POLY1305 */
474
David Browneed74df2021-03-15 15:53:57 -0600475#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_256)
476#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256)
477#define MBEDTLS_ECP_DP_BP256R1_ENABLED
478#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
479#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256 */
480#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_256 */
481
482#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_384)
483#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384)
484#define MBEDTLS_ECP_DP_BP384R1_ENABLED
485#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
486#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384 */
487#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_384 */
488
489#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_512)
490#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512)
491#define MBEDTLS_ECP_DP_BP512R1_ENABLED
492#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
493#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512 */
494#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_512 */
495
496#if defined(PSA_WANT_ECC_MONTGOMERY_255)
497#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255)
498#define MBEDTLS_ECP_DP_CURVE25519_ENABLED
499#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
500#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255 */
501#endif /* PSA_WANT_ECC_MONTGOMERY_255 */
502
503#if defined(PSA_WANT_ECC_MONTGOMERY_448)
504#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448)
505#define MBEDTLS_ECP_DP_CURVE448_ENABLED
506#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
507#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448 */
508#endif /* PSA_WANT_ECC_MONTGOMERY_448 */
509
David Brownc7b9b2b2021-02-19 21:05:52 -0700510#if defined(PSA_WANT_ECC_SECP_R1_192)
511#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192)
512#define MBEDTLS_ECP_DP_SECP192R1_ENABLED
513#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
514#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192 */
515#endif /* PSA_WANT_ECC_SECP_R1_192 */
516
517#if defined(PSA_WANT_ECC_SECP_R1_224)
518#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224)
519#define MBEDTLS_ECP_DP_SECP224R1_ENABLED
520#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
521#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224 */
522#endif /* PSA_WANT_ECC_SECP_R1_224 */
523
524#if defined(PSA_WANT_ECC_SECP_R1_256)
525#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256)
526#define MBEDTLS_ECP_DP_SECP256R1_ENABLED
527#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
528#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256 */
529#endif /* PSA_WANT_ECC_SECP_R1_256 */
530
531#if defined(PSA_WANT_ECC_SECP_R1_384)
532#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384)
533#define MBEDTLS_ECP_DP_SECP384R1_ENABLED
534#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
535#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384 */
536#endif /* PSA_WANT_ECC_SECP_R1_384 */
537
538#if defined(PSA_WANT_ECC_SECP_R1_521)
539#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521)
540#define MBEDTLS_ECP_DP_SECP521R1_ENABLED
541#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
542#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521 */
543#endif /* PSA_WANT_ECC_SECP_R1_521 */
544
545#if defined(PSA_WANT_ECC_SECP_K1_192)
546#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192)
David Brown8de143e2021-02-19 14:08:00 -0700547#define MBEDTLS_ECP_DP_SECP192K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700548#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
549#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192 */
550#endif /* PSA_WANT_ECC_SECP_K1_192 */
David Brown8de143e2021-02-19 14:08:00 -0700551
David Brownc7b9b2b2021-02-19 21:05:52 -0700552#if defined(PSA_WANT_ECC_SECP_K1_224)
553#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224)
Ronald Crone1f55162021-03-25 15:09:47 +0100554/*
555 * SECP224K1 is buggy via the PSA API in Mbed TLS
Dave Rodgman017a1992022-03-31 14:07:01 +0100556 * (https://github.com/Mbed-TLS/mbedtls/issues/3541).
Ronald Crone1f55162021-03-25 15:09:47 +0100557 */
558#error "SECP224K1 is buggy via the PSA API in Mbed TLS."
David Brown8de143e2021-02-19 14:08:00 -0700559#define MBEDTLS_ECP_DP_SECP224K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700560#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
561#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224 */
562#endif /* PSA_WANT_ECC_SECP_K1_224 */
David Brown8de143e2021-02-19 14:08:00 -0700563
David Brownc7b9b2b2021-02-19 21:05:52 -0700564#if defined(PSA_WANT_ECC_SECP_K1_256)
565#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256)
David Brown9b178de2021-03-10 13:14:48 -0700566#define MBEDTLS_ECP_DP_SECP256K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700567#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
568#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256 */
569#endif /* PSA_WANT_ECC_SECP_K1_256 */
David Brown8de143e2021-02-19 14:08:00 -0700570
Gilles Peskine1231eb52021-04-19 22:24:23 +0200571
572
573/****************************************************************/
574/* Infer PSA requirements from Mbed TLS capabilities */
575/****************************************************************/
576
John Durkop714e3a12020-09-29 22:07:04 -0700577#else /* MBEDTLS_PSA_CRYPTO_CONFIG */
578
579/*
580 * Ensure PSA_WANT_* defines are setup properly if MBEDTLS_PSA_CRYPTO_CONFIG
581 * is not defined
582 */
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100583
Ronald Cron3d471812021-03-18 13:40:31 +0100584#if defined(MBEDTLS_CCM_C)
585#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100586#define MBEDTLS_PSA_BUILTIN_ALG_CCM_STAR_NO_TAG 1
Ronald Cron3d471812021-03-18 13:40:31 +0100587#define PSA_WANT_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100588#define PSA_WANT_ALG_CCM_STAR_NO_TAG 1
Ronald Cron3d471812021-03-18 13:40:31 +0100589#endif /* MBEDTLS_CCM_C */
590
591#if defined(MBEDTLS_CMAC_C)
592#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
593#define PSA_WANT_ALG_CMAC 1
594#endif /* MBEDTLS_CMAC_C */
595
John Durkopd62b6782020-11-30 21:06:05 -0800596#if defined(MBEDTLS_ECDH_C)
597#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
598#define PSA_WANT_ALG_ECDH 1
599#endif /* MBEDTLS_ECDH_C */
600
601#if defined(MBEDTLS_ECDSA_C)
602#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
603#define PSA_WANT_ALG_ECDSA 1
Gilles Peskine1231eb52021-04-19 22:24:23 +0200604#define PSA_WANT_ALG_ECDSA_ANY 1
John Durkopd62b6782020-11-30 21:06:05 -0800605
606// Only add in DETERMINISTIC support if ECDSA is also enabled
607#if defined(MBEDTLS_ECDSA_DETERMINISTIC)
608#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
609#define PSA_WANT_ALG_DETERMINISTIC_ECDSA 1
610#endif /* MBEDTLS_ECDSA_DETERMINISTIC */
611
612#endif /* MBEDTLS_ECDSA_C */
613
614#if defined(MBEDTLS_ECP_C)
615#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR 1
616#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR 1
617#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
618#define PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY 1
619#endif /* MBEDTLS_ECP_C */
620
Ronald Cron3d471812021-03-18 13:40:31 +0100621#if defined(MBEDTLS_GCM_C)
622#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
623#define PSA_WANT_ALG_GCM 1
624#endif /* MBEDTLS_GCM_C */
625
Przemek Stekiel18399d82022-06-27 13:34:50 +0200626/* Enable PSA HKDF algorithm if mbedtls HKDF is supported.
627 * PSA HKDF EXTRACT and PSA HKDF EXPAND have minimal cost when
628 * PSA HKDF is enabled, so enable both algorithms together
629 * with PSA HKDF. */
John Durkopd62b6782020-11-30 21:06:05 -0800630#if defined(MBEDTLS_HKDF_C)
631#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
632#define PSA_WANT_ALG_HMAC 1
633#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
634#define PSA_WANT_ALG_HKDF 1
Przemek Stekielb33bd192022-06-21 09:58:51 +0200635#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXTRACT 1
636#define PSA_WANT_ALG_HKDF_EXTRACT 1
637#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXPAND 1
638#define PSA_WANT_ALG_HKDF_EXPAND 1
John Durkopd62b6782020-11-30 21:06:05 -0800639#endif /* MBEDTLS_HKDF_C */
640
John Durkopd62b6782020-11-30 21:06:05 -0800641#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
642#define PSA_WANT_ALG_HMAC 1
Gilles Peskine47a89332021-01-12 00:00:15 +0100643#define PSA_WANT_KEY_TYPE_HMAC
Andrzej Kurek65bf73e2022-08-31 14:59:31 -0400644
645#if defined(MBEDTLS_MD_C)
John Durkopd62b6782020-11-30 21:06:05 -0800646#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
647#define PSA_WANT_ALG_TLS12_PRF 1
648#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
649#define PSA_WANT_ALG_TLS12_PSK_TO_MS 1
650#endif /* MBEDTLS_MD_C */
651
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100652#if defined(MBEDTLS_MD5_C)
653#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
654#define PSA_WANT_ALG_MD5 1
655#endif
656
Neil Armstrong637d0a02022-05-25 11:28:22 +0200657#if defined(MBEDTLS_ECJPAKE_C)
658#define MBEDTLS_PSA_BUILTIN_PAKE 1
Neil Armstronga557cb82022-06-10 08:58:32 +0200659#define MBEDTLS_PSA_BUILTIN_ALG_JPAKE 1
660#define PSA_WANT_ALG_JPAKE 1
Neil Armstrong637d0a02022-05-25 11:28:22 +0200661#endif
662
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100663#if defined(MBEDTLS_RIPEMD160_C)
664#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
665#define PSA_WANT_ALG_RIPEMD160 1
666#endif
667
John Durkopd62b6782020-11-30 21:06:05 -0800668#if defined(MBEDTLS_RSA_C)
669#if defined(MBEDTLS_PKCS1_V15)
670#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
671#define PSA_WANT_ALG_RSA_PKCS1V15_CRYPT 1
672#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
673#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN 1
Gilles Peskine1231eb52021-04-19 22:24:23 +0200674#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW 1
Yuto Takano7828ca22021-08-10 11:26:15 +0100675#endif /* MBEDTLS_PKCS1_V15 */
John Durkopd62b6782020-11-30 21:06:05 -0800676#if defined(MBEDTLS_PKCS1_V21)
677#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
678#define PSA_WANT_ALG_RSA_OAEP 1
679#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
680#define PSA_WANT_ALG_RSA_PSS 1
681#endif /* MBEDTLS_PKCS1_V21 */
682#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR 1
683#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR 1
684#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
685#define PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY 1
686#endif /* MBEDTLS_RSA_C */
687
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100688#if defined(MBEDTLS_SHA1_C)
689#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
690#define PSA_WANT_ALG_SHA_1 1
691#endif
692
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200693#if defined(MBEDTLS_SHA224_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100694#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
Gilles Peskineb65db072021-01-12 00:00:53 +0100695#define PSA_WANT_ALG_SHA_224 1
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200696#endif
697
698#if defined(MBEDTLS_SHA256_C)
699#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100700#define PSA_WANT_ALG_SHA_256 1
701#endif
702
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200703#if defined(MBEDTLS_SHA384_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100704#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
705#define PSA_WANT_ALG_SHA_384 1
706#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200707
708#if defined(MBEDTLS_SHA512_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100709#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
710#define PSA_WANT_ALG_SHA_512 1
711#endif
712
David Brown94933082021-01-05 12:03:25 -0700713#if defined(MBEDTLS_AES_C)
714#define PSA_WANT_KEY_TYPE_AES 1
David Brownda7dbb72021-01-26 11:44:15 -0700715#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700716#endif
717
Gilles Peskine09c46da2021-10-08 15:48:16 +0200718#if defined(MBEDTLS_ARIA_C)
719#define PSA_WANT_KEY_TYPE_ARIA 1
720#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
721#endif
722
David Brown686e6e82021-01-05 12:03:25 -0700723#if defined(MBEDTLS_CAMELLIA_C)
724#define PSA_WANT_KEY_TYPE_CAMELLIA 1
David Brownda7dbb72021-01-26 11:44:15 -0700725#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700726#endif
727
David Brownb65a7f72021-01-15 12:04:09 -0700728#if defined(MBEDTLS_DES_C)
729#define PSA_WANT_KEY_TYPE_DES 1
David Brownda7dbb72021-01-26 11:44:15 -0700730#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700731#endif
732
Andrzej Kurekd60907b2022-09-14 10:02:30 -0400733#if defined(MBEDTLS_PSA_BUILTIN_ALG_SHA_256)
734#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_ECJPAKE_TO_PMS 1
735#define PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS 1
736#endif
737
David Brownb16727a2021-02-08 16:31:46 -0700738#if defined(MBEDTLS_CHACHA20_C)
739#define PSA_WANT_KEY_TYPE_CHACHA20 1
740#define PSA_WANT_ALG_STREAM_CIPHER 1
741#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
742#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brownac4fa072021-02-08 16:47:35 -0700743#if defined(MBEDTLS_CHACHAPOLY_C)
744#define PSA_WANT_ALG_CHACHA20_POLY1305 1
David Brown86730a82021-02-09 16:24:11 -0700745#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700746#endif
David Brownb16727a2021-02-08 16:31:46 -0700747#endif
748
David Brown99844272021-01-15 12:04:47 -0700749#if defined(MBEDTLS_CIPHER_MODE_CBC)
David Brown10cb81c2021-02-09 16:10:29 -0700750#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700751#define PSA_WANT_ALG_CBC_NO_PADDING 1
752#if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
David Brown12f45f92021-01-26 11:50:36 -0700753#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brown99844272021-01-15 12:04:47 -0700754#define PSA_WANT_ALG_CBC_PKCS7 1
755#endif
756#endif
757
758#if defined(MBEDTLS_AES_C) || defined(MBEDTLS_DES_C) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200759 defined(MBEDTLS_ARIA_C) || defined(MBEDTLS_CAMELLIA_C)
David Brown10cb81c2021-02-09 16:10:29 -0700760#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700761#define PSA_WANT_ALG_ECB_NO_PADDING 1
762#endif
763
764#if defined(MBEDTLS_CIPHER_MODE_CFB)
David Brown12f45f92021-01-26 11:50:36 -0700765#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700766#define PSA_WANT_ALG_CFB 1
767#endif
768
769#if defined(MBEDTLS_CIPHER_MODE_CTR)
David Brown12f45f92021-01-26 11:50:36 -0700770#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700771#define PSA_WANT_ALG_CTR 1
772#endif
773
774#if defined(MBEDTLS_CIPHER_MODE_OFB)
David Brown12f45f92021-01-26 11:50:36 -0700775#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700776#define PSA_WANT_ALG_OFB 1
777#endif
778
David Browneed74df2021-03-15 15:53:57 -0600779#if defined(MBEDTLS_ECP_DP_BP256R1_ENABLED)
780#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
781#define PSA_WANT_ECC_BRAINPOOL_P_R1_256
782#endif
783
784#if defined(MBEDTLS_ECP_DP_BP384R1_ENABLED)
785#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
786#define PSA_WANT_ECC_BRAINPOOL_P_R1_384
787#endif
788
789#if defined(MBEDTLS_ECP_DP_BP512R1_ENABLED)
790#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
791#define PSA_WANT_ECC_BRAINPOOL_P_R1_512
792#endif
793
794#if defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED)
795#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
796#define PSA_WANT_ECC_MONTGOMERY_255
797#endif
798
Archanaef6aa5c2021-06-08 11:40:10 +0530799#if defined(MBEDTLS_ECP_DP_CURVE448_ENABLED)
David Browneed74df2021-03-15 15:53:57 -0600800#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
801#define PSA_WANT_ECC_MONTGOMERY_448
802#endif
803
David Brown8de143e2021-02-19 14:08:00 -0700804#if defined(MBEDTLS_ECP_DP_SECP192R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700805#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
806#define PSA_WANT_ECC_SECP_R1_192
David Brown8de143e2021-02-19 14:08:00 -0700807#endif
808
809#if defined(MBEDTLS_ECP_DP_SECP224R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700810#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
811#define PSA_WANT_ECC_SECP_R1_224
David Brown8de143e2021-02-19 14:08:00 -0700812#endif
813
814#if defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700815#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
816#define PSA_WANT_ECC_SECP_R1_256
David Brown8de143e2021-02-19 14:08:00 -0700817#endif
818
819#if defined(MBEDTLS_ECP_DP_SECP384R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700820#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
821#define PSA_WANT_ECC_SECP_R1_384
David Brown8de143e2021-02-19 14:08:00 -0700822#endif
823
824#if defined(MBEDTLS_ECP_DP_SECP521R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700825#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
826#define PSA_WANT_ECC_SECP_R1_521
David Brown8de143e2021-02-19 14:08:00 -0700827#endif
828
829#if defined(MBEDTLS_ECP_DP_SECP192K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700830#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
831#define PSA_WANT_ECC_SECP_K1_192
David Brown8de143e2021-02-19 14:08:00 -0700832#endif
833
Dave Rodgman017a1992022-03-31 14:07:01 +0100834/* SECP224K1 is buggy via the PSA API (https://github.com/Mbed-TLS/mbedtls/issues/3541) */
Gilles Peskine39841302021-03-23 12:06:45 +0100835#if 0 && defined(MBEDTLS_ECP_DP_SECP224K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700836#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
837#define PSA_WANT_ECC_SECP_K1_224
David Brown8de143e2021-02-19 14:08:00 -0700838#endif
839
David Brown9b178de2021-03-10 13:14:48 -0700840#if defined(MBEDTLS_ECP_DP_SECP256K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700841#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
842#define PSA_WANT_ECC_SECP_K1_256
David Brown8de143e2021-02-19 14:08:00 -0700843#endif
844
John Durkop2dfaf9c2020-09-24 04:30:10 -0700845#endif /* MBEDTLS_PSA_CRYPTO_CONFIG */
John Durkopd8959392020-09-20 23:09:17 -0700846
Gilles Peskine60b29fe2021-02-16 14:06:50 +0100847/* These features are always enabled. */
848#define PSA_WANT_KEY_TYPE_DERIVE 1
Gilles Peskinebba26302022-12-15 23:25:17 +0100849#define PSA_WANT_KEY_TYPE_PASSWORD 1
850#define PSA_WANT_KEY_TYPE_PASSWORD_HASH 1
Gilles Peskine60b29fe2021-02-16 14:06:50 +0100851#define PSA_WANT_KEY_TYPE_RAW_DATA 1
852
John Durkop6e33dbe2020-09-17 21:15:13 -0700853#ifdef __cplusplus
854}
855#endif
856
857#endif /* MBEDTLS_CONFIG_PSA_H */