blob: fedead4f186d8794f69026f189ed45a73d02f3b3 [file] [log] [blame]
John Durkop6e33dbe2020-09-17 21:15:13 -07001/**
2 * \file mbedtls/config_psa.h
3 * \brief PSA crypto configuration options (set of defines)
4 *
John Durkop34818822020-10-12 21:36:22 -07005 * This set of compile-time options takes settings defined in
Bence Szépkútibb0cfeb2021-05-28 09:42:25 +02006 * include/mbedtls/mbedtls_config.h and include/psa/crypto_config.h and uses
John Durkop34818822020-10-12 21:36:22 -07007 * those definitions to define symbols used in the library code.
8 *
9 * Users and integrators should not edit this file, please edit
Tom Cosgrove1797b052022-12-04 17:19:59 +000010 * include/mbedtls/mbedtls_config.h for MBEDTLS_XXX settings or
John Durkop34818822020-10-12 21:36:22 -070011 * include/psa/crypto_config.h for PSA_WANT_XXX settings.
John Durkop6e33dbe2020-09-17 21:15:13 -070012 */
13/*
14 * Copyright The Mbed TLS Contributors
15 * SPDX-License-Identifier: Apache-2.0
16 *
17 * Licensed under the Apache License, Version 2.0 (the "License"); you may
18 * not use this file except in compliance with the License.
19 * You may obtain a copy of the License at
20 *
21 * http://www.apache.org/licenses/LICENSE-2.0
22 *
23 * Unless required by applicable law or agreed to in writing, software
24 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
25 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
26 * See the License for the specific language governing permissions and
27 * limitations under the License.
28 */
29
30#ifndef MBEDTLS_CONFIG_PSA_H
31#define MBEDTLS_CONFIG_PSA_H
32
Valerio Settib7ef51a2023-06-06 14:32:58 +020033#include "psa/crypto_legacy.h"
34
Gilles Peskine7b7d9032023-09-04 16:55:14 +020035#include "psa/crypto_adjust_config_synonyms.h"
Gilles Peskine44c96aa2021-10-04 18:33:56 +020036
Gilles Peskine1231eb52021-04-19 22:24:23 +020037
Manuel Pégourié-Gonnard235a9332023-03-14 18:01:23 +010038/****************************************************************/
39/* Hashes that are built in are also enabled in PSA.
40 * This simplifies dependency declarations especially
41 * for modules that obey MBEDTLS_USE_PSA_CRYPTO. */
42/****************************************************************/
43
44#if defined(MBEDTLS_MD5_C)
45#define PSA_WANT_ALG_MD5 1
46#endif
47
48#if defined(MBEDTLS_RIPEMD160_C)
49#define PSA_WANT_ALG_RIPEMD160 1
50#endif
51
52#if defined(MBEDTLS_SHA1_C)
53#define PSA_WANT_ALG_SHA_1 1
54#endif
55
56#if defined(MBEDTLS_SHA224_C)
57#define PSA_WANT_ALG_SHA_224 1
58#endif
59
60#if defined(MBEDTLS_SHA256_C)
61#define PSA_WANT_ALG_SHA_256 1
62#endif
63
64#if defined(MBEDTLS_SHA384_C)
65#define PSA_WANT_ALG_SHA_384 1
66#endif
67
68#if defined(MBEDTLS_SHA512_C)
69#define PSA_WANT_ALG_SHA_512 1
70#endif
71
Dave Rodgman98083c62023-06-25 23:27:45 +010072#if defined(MBEDTLS_SHA3_C)
Dave Rodgmanf66cd612023-06-26 11:02:12 +010073#define PSA_WANT_ALG_SHA3_224 1
74#define PSA_WANT_ALG_SHA3_256 1
75#define PSA_WANT_ALG_SHA3_384 1
76#define PSA_WANT_ALG_SHA3_512 1
Dave Rodgman98083c62023-06-25 23:27:45 +010077#endif
78
Gilles Peskine1231eb52021-04-19 22:24:23 +020079
80/****************************************************************/
81/* Require built-in implementations based on PSA requirements */
82/****************************************************************/
83
John Durkop2dfaf9c2020-09-24 04:30:10 -070084#if defined(MBEDTLS_PSA_CRYPTO_CONFIG)
John Durkopd8959392020-09-20 23:09:17 -070085
John Durkopd62b6782020-11-30 21:06:05 -080086#if defined(PSA_WANT_ALG_DETERMINISTIC_ECDSA)
87#if !defined(MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA)
88#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
89#define MBEDTLS_ECDSA_DETERMINISTIC
90#define MBEDTLS_ECDSA_C
91#define MBEDTLS_HMAC_DRBG_C
92#define MBEDTLS_MD_C
93#endif /* !MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA */
94#endif /* PSA_WANT_ALG_DETERMINISTIC_ECDSA */
95
96#if defined(PSA_WANT_ALG_ECDH)
97#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDH)
98#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
99#define MBEDTLS_ECDH_C
100#define MBEDTLS_ECP_C
101#define MBEDTLS_BIGNUM_C
102#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDH */
103#endif /* PSA_WANT_ALG_ECDH */
104
105#if defined(PSA_WANT_ALG_ECDSA)
106#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDSA)
107#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
108#define MBEDTLS_ECDSA_C
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200109#define MBEDTLS_ECP_C
110#define MBEDTLS_BIGNUM_C
111#define MBEDTLS_ASN1_PARSE_C
112#define MBEDTLS_ASN1_WRITE_C
John Durkopd62b6782020-11-30 21:06:05 -0800113#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDSA */
114#endif /* PSA_WANT_ALG_ECDSA */
115
Przemek Stekiel84ee3e22022-12-01 14:22:34 +0100116#if defined(PSA_WANT_ALG_FFDH)
117#if !defined(MBEDTLS_PSA_ACCEL_ALG_FFDH)
118#define MBEDTLS_PSA_BUILTIN_ALG_FFDH 1
Przemek Stekiel84ee3e22022-12-01 14:22:34 +0100119#define MBEDTLS_BIGNUM_C
120#endif /* !MBEDTLS_PSA_ACCEL_ALG_FFDH */
121#endif /* PSA_WANT_ALG_FFDH */
122
John Durkopd62b6782020-11-30 21:06:05 -0800123#if defined(PSA_WANT_ALG_HKDF)
124#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF)
125#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
126#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
127#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF */
128#endif /* PSA_WANT_ALG_HKDF */
129
Przemek Stekiel3e8249c2022-06-03 14:05:07 +0200130#if defined(PSA_WANT_ALG_HKDF_EXTRACT)
131#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF_EXTRACT)
132#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
133#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXTRACT 1
134#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF_EXTRACT */
135#endif /* PSA_WANT_ALG_HKDF_EXTRACT */
136
137#if defined(PSA_WANT_ALG_HKDF_EXPAND)
138#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF_EXPAND)
139#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
140#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXPAND 1
141#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF_EXPAND */
142#endif /* PSA_WANT_ALG_HKDF_EXPAND */
143
John Durkopd62b6782020-11-30 21:06:05 -0800144#if defined(PSA_WANT_ALG_HMAC)
145#if !defined(MBEDTLS_PSA_ACCEL_ALG_HMAC)
146#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
147#endif /* !MBEDTLS_PSA_ACCEL_ALG_HMAC */
148#endif /* PSA_WANT_ALG_HMAC */
149
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100150#if defined(PSA_WANT_ALG_MD5) && !defined(MBEDTLS_PSA_ACCEL_ALG_MD5)
151#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
152#define MBEDTLS_MD5_C
153#endif
154
Neil Armstronga557cb82022-06-10 08:58:32 +0200155#if defined(PSA_WANT_ALG_JPAKE)
Przemek Stekiel4aa99402023-02-27 13:00:57 +0100156#if !defined(MBEDTLS_PSA_ACCEL_ALG_JPAKE)
Neil Armstrong637d0a02022-05-25 11:28:22 +0200157#define MBEDTLS_PSA_BUILTIN_PAKE 1
Neil Armstronga557cb82022-06-10 08:58:32 +0200158#define MBEDTLS_PSA_BUILTIN_ALG_JPAKE 1
Neil Armstronged407822022-06-15 11:21:33 +0200159#define MBEDTLS_ECP_DP_SECP256R1_ENABLED
Neil Armstrong637d0a02022-05-25 11:28:22 +0200160#define MBEDTLS_BIGNUM_C
161#define MBEDTLS_ECP_C
Neil Armstrong637d0a02022-05-25 11:28:22 +0200162#define MBEDTLS_ECJPAKE_C
Przemek Stekiel4aa99402023-02-27 13:00:57 +0100163#endif /* MBEDTLS_PSA_ACCEL_ALG_JPAKE */
Neil Armstronga557cb82022-06-10 08:58:32 +0200164#endif /* PSA_WANT_ALG_JPAKE */
Neil Armstrong637d0a02022-05-25 11:28:22 +0200165
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100166#if defined(PSA_WANT_ALG_RIPEMD160) && !defined(MBEDTLS_PSA_ACCEL_ALG_RIPEMD160)
167#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
168#define MBEDTLS_RIPEMD160_C
169#endif
170
John Durkopd62b6782020-11-30 21:06:05 -0800171#if defined(PSA_WANT_ALG_RSA_OAEP)
172#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP)
173#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
174#define MBEDTLS_RSA_C
175#define MBEDTLS_BIGNUM_C
176#define MBEDTLS_OID_C
177#define MBEDTLS_PKCS1_V21
John Durkopd62b6782020-11-30 21:06:05 -0800178#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP */
179#endif /* PSA_WANT_ALG_RSA_OAEP */
180
181#if defined(PSA_WANT_ALG_RSA_PKCS1V15_CRYPT)
182#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT)
183#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
184#define MBEDTLS_RSA_C
185#define MBEDTLS_BIGNUM_C
186#define MBEDTLS_OID_C
187#define MBEDTLS_PKCS1_V15
188#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT */
189#endif /* PSA_WANT_ALG_RSA_PKCS1V15_CRYPT */
190
191#if defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
192#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN)
193#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
194#define MBEDTLS_RSA_C
195#define MBEDTLS_BIGNUM_C
196#define MBEDTLS_OID_C
197#define MBEDTLS_PKCS1_V15
John Durkopd62b6782020-11-30 21:06:05 -0800198#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN */
199#endif /* PSA_WANT_ALG_RSA_PKCS1V15_SIGN */
200
201#if defined(PSA_WANT_ALG_RSA_PSS)
202#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PSS)
203#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
204#define MBEDTLS_RSA_C
205#define MBEDTLS_BIGNUM_C
206#define MBEDTLS_OID_C
207#define MBEDTLS_PKCS1_V21
John Durkopd62b6782020-11-30 21:06:05 -0800208#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PSS */
209#endif /* PSA_WANT_ALG_RSA_PSS */
210
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100211#if defined(PSA_WANT_ALG_SHA_1) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_1)
212#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
213#define MBEDTLS_SHA1_C
214#endif
215
216#if defined(PSA_WANT_ALG_SHA_224) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_224)
217#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200218#define MBEDTLS_SHA224_C
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100219#endif
220
221#if defined(PSA_WANT_ALG_SHA_256) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_256)
222#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
223#define MBEDTLS_SHA256_C
224#endif
225
226#if defined(PSA_WANT_ALG_SHA_384) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_384)
227#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200228#define MBEDTLS_SHA384_C
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100229#endif
230
231#if defined(PSA_WANT_ALG_SHA_512) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_512)
232#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
233#define MBEDTLS_SHA512_C
234#endif
235
Dave Rodgman47a2ac12023-06-26 18:39:42 +0100236#if defined(PSA_WANT_ALG_SHA3_224) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA3_224)
Dave Rodgmanf66cd612023-06-26 11:02:12 +0100237#define MBEDTLS_PSA_BUILTIN_ALG_SHA3_224 1
238#define MBEDTLS_SHA3_C
239#endif
240
Dave Rodgman47a2ac12023-06-26 18:39:42 +0100241#if defined(PSA_WANT_ALG_SHA3_256) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA3_256)
Dave Rodgmanf66cd612023-06-26 11:02:12 +0100242#define MBEDTLS_PSA_BUILTIN_ALG_SHA3_256 1
243#define MBEDTLS_SHA3_C
244#endif
245
Dave Rodgman47a2ac12023-06-26 18:39:42 +0100246#if defined(PSA_WANT_ALG_SHA3_384) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA3_384)
Dave Rodgmanf66cd612023-06-26 11:02:12 +0100247#define MBEDTLS_PSA_BUILTIN_ALG_SHA3_384 1
248#define MBEDTLS_SHA3_C
249#endif
250
Dave Rodgman47a2ac12023-06-26 18:39:42 +0100251#if defined(PSA_WANT_ALG_SHA3_512) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA3_512)
Dave Rodgmanf66cd612023-06-26 11:02:12 +0100252#define MBEDTLS_PSA_BUILTIN_ALG_SHA3_512 1
Dave Rodgman98083c62023-06-25 23:27:45 +0100253#define MBEDTLS_SHA3_C
254#endif
255
Kusumit Ghoderao83baf892023-05-03 11:42:29 +0530256#if defined(PSA_WANT_ALG_PBKDF2_HMAC)
257#if !defined(MBEDTLS_PSA_ACCEL_ALG_PBKDF2_HMAC)
258#define MBEDTLS_PSA_BUILTIN_ALG_PBKDF2_HMAC 1
Tom Cosgrovec43c3aa2023-08-31 17:06:58 +0100259#define PSA_HAVE_SOFT_PBKDF2_HMAC 1
Kusumit Ghoderaob9410e82023-05-03 18:36:35 +0530260#if !defined(MBEDTLS_PSA_ACCEL_ALG_HMAC)
Kusumit Ghoderao83baf892023-05-03 11:42:29 +0530261#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
Kusumit Ghoderaob9410e82023-05-03 18:36:35 +0530262#endif /* !MBEDTLS_PSA_ACCEL_ALG_HMAC */
Kusumit Ghoderao83baf892023-05-03 11:42:29 +0530263#endif /* !MBEDTLS_PSA_BUILTIN_ALG_PBKDF2_HMAC */
264#endif /* PSA_WANT_ALG_PBKDF2_HMAC */
265
John Durkop07cc04a2020-11-16 22:08:34 -0800266#if defined(PSA_WANT_ALG_TLS12_PRF)
267#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF)
John Durkopd62b6782020-11-30 21:06:05 -0800268#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
John Durkop07cc04a2020-11-16 22:08:34 -0800269#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF */
270#endif /* PSA_WANT_ALG_TLS12_PRF */
271
272#if defined(PSA_WANT_ALG_TLS12_PSK_TO_MS)
273#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS)
John Durkopd62b6782020-11-30 21:06:05 -0800274#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
John Durkop07cc04a2020-11-16 22:08:34 -0800275#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS */
276#endif /* PSA_WANT_ALG_TLS12_PSK_TO_MS */
277
Andrzej Kurek08d34b82022-07-29 10:00:16 -0400278#if defined(PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS)
279#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_ECJPAKE_TO_PMS)
280#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_ECJPAKE_TO_PMS 1
281#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_ECJPAKE_TO_PMS */
282#endif /* PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS */
283
Valerio Setti4520a8f2023-06-13 12:34:12 +0200284#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200285#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200286#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_IMPORT)
287#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_IMPORT 1
288#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_IMPORT */
289#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT */
290
291#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200292#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200293#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_EXPORT)
294#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_EXPORT 1
295#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_EXPORT */
296#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT */
297
298#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200299#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200300#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_GENERATE)
301#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_GENERATE 1
302#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_GENERATE */
303#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE */
304
305#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200306#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200307#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_DERIVE)
308#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_DERIVE 1
309#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_DERIVE */
310#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE */
311
Valerio Setti01cc88a2023-06-15 11:53:08 +0200312#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC)
Valerio Settiaac957b2023-06-09 16:59:00 +0200313#define PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200314#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_BASIC)
315#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
316#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_BASIC */
317#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC */
John Durkop07cc04a2020-11-16 22:08:34 -0800318
Valerio Setti4520a8f2023-06-13 12:34:12 +0200319#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_IMPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200320#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200321#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_IMPORT)
322#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_IMPORT 1
323#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_IMPORT */
324#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_IMPORT */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200325
Valerio Setti4520a8f2023-06-13 12:34:12 +0200326#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_EXPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200327#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200328#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_EXPORT)
329#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_EXPORT 1
330#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_EXPORT */
331#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_EXPORT */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200332
Valerio Setti4520a8f2023-06-13 12:34:12 +0200333#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_GENERATE)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200334#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200335#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_GENERATE)
336#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_GENERATE 1
337#define MBEDTLS_GENPRIME
338#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_GENERATE */
339#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_GENERATE */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200340
Valerio Setti01cc88a2023-06-15 11:53:08 +0200341#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC)
Valerio Settiaac957b2023-06-09 16:59:00 +0200342#define PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200343#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_BASIC)
344#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
345#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_BASIC */
346#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200347
Valerio Setti4520a8f2023-06-13 12:34:12 +0200348#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_IMPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200349#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200350#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_IMPORT)
351#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_IMPORT 1
352#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_IMPORT */
353#endif /* PSA_WANT_KEY_TYPE_DH_KEY_PAIR_IMPORT */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200354
Valerio Setti4520a8f2023-06-13 12:34:12 +0200355#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_EXPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200356#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200357#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_EXPORT)
358#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT 1
359#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_EXPORT */
360#endif /* PSA_WANT_KEY_TYPE_DH_KEY_PAIR_EXPORT */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200361
Valerio Setti4520a8f2023-06-13 12:34:12 +0200362#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_GENERATE)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200363#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200364#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_GENERATE)
365#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE 1
366#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_GENERATE */
367#endif /* PSA_WANT_KEY_TYPE_DH_KEY_PAIR_GENERATE */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200368
Valerio Setti01cc88a2023-06-15 11:53:08 +0200369#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC)
Valerio Settiaac957b2023-06-09 16:59:00 +0200370#define PSA_WANT_KEY_TYPE_DH_PUBLIC_KEY 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200371#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_BASIC)
372#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_BASIC 1
373#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_BASIC */
374#endif /* PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200375
John Durkop07cc04a2020-11-16 22:08:34 -0800376#if defined(PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY)
377#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800378#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
John Durkop07cc04a2020-11-16 22:08:34 -0800379#define MBEDTLS_ECP_C
380#define MBEDTLS_BIGNUM_C
381#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY */
382#endif /* PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY */
383
Przemek Stekiel6d85afa2023-04-28 11:42:17 +0200384#if defined(PSA_WANT_KEY_TYPE_DH_PUBLIC_KEY)
385#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_PUBLIC_KEY)
386#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY 1
Przemek Stekiel87d9a4a2022-12-15 13:22:11 +0100387#define MBEDTLS_BIGNUM_C
Przemek Stekiel6d85afa2023-04-28 11:42:17 +0200388#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_PUBLIC_KEY */
389#endif /* PSA_WANT_KEY_TYPE_DH_PUBLIC_KEY */
Przemek Stekiel87d9a4a2022-12-15 13:22:11 +0100390
John Durkop9814fa22020-11-04 12:28:15 -0800391#if defined(PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkop0e005192020-10-31 22:06:54 -0700392#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800393#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
John Durkop0e005192020-10-31 22:06:54 -0700394#define MBEDTLS_RSA_C
395#define MBEDTLS_BIGNUM_C
396#define MBEDTLS_OID_C
John Durkop07cc04a2020-11-16 22:08:34 -0800397#define MBEDTLS_PK_PARSE_C
398#define MBEDTLS_PK_WRITE_C
399#define MBEDTLS_PK_C
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200400#define MBEDTLS_ASN1_PARSE_C
401#define MBEDTLS_ASN1_WRITE_C
John Durkop0e005192020-10-31 22:06:54 -0700402#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkop9814fa22020-11-04 12:28:15 -0800403#endif /* PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkopd0321952020-10-29 21:37:36 -0700404
David Brownb781f752021-02-08 15:44:52 -0700405/* If any of the block modes are requested that don't have an
406 * associated HW assist, define PSA_HAVE_SOFT_BLOCK_MODE for checking
407 * in the block cipher key types. */
408#if (defined(PSA_WANT_ALG_CTR) && !defined(MBEDTLS_PSA_ACCEL_ALG_CTR)) || \
Bence Szépkúti7921cce2021-02-17 11:46:50 +0100409 (defined(PSA_WANT_ALG_CFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_CFB)) || \
David Brownb781f752021-02-08 15:44:52 -0700410 (defined(PSA_WANT_ALG_OFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_OFB)) || \
David Brownb781f752021-02-08 15:44:52 -0700411 defined(PSA_WANT_ALG_ECB_NO_PADDING) || \
412 (defined(PSA_WANT_ALG_CBC_NO_PADDING) && \
Gilles Peskine449bd832023-01-11 14:50:10 +0100413 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING)) || \
David Brownb781f752021-02-08 15:44:52 -0700414 (defined(PSA_WANT_ALG_CBC_PKCS7) && \
Gilles Peskine449bd832023-01-11 14:50:10 +0100415 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7)) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100416 (defined(PSA_WANT_ALG_CMAC) && !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC))
David Brownb781f752021-02-08 15:44:52 -0700417#define PSA_HAVE_SOFT_BLOCK_MODE 1
418#endif
419
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100420#if (defined(PSA_WANT_ALG_GCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_GCM)) || \
421 (defined(PSA_WANT_ALG_CCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_CCM))
422#define PSA_HAVE_SOFT_BLOCK_AEAD 1
423#endif
424
Kusumit Ghoderaoc22affd2023-07-28 13:31:58 +0530425#if defined(PSA_WANT_ALG_PBKDF2_AES_CMAC_PRF_128)
426#if !defined(MBEDTLS_PSA_ACCEL_ALG_PBKDF2_AES_CMAC_PRF_128)
427#define MBEDTLS_PSA_BUILTIN_ALG_PBKDF2_AES_CMAC_PRF_128 1
Tom Cosgrovec43c3aa2023-08-31 17:06:58 +0100428#define PSA_HAVE_SOFT_PBKDF2_CMAC 1
Kusumit Ghoderaoc22affd2023-07-28 13:31:58 +0530429#endif /* !MBEDTLS_PSA_ACCEL_ALG_PBKDF2_AES_CMAC_PRF_128 */
430#endif /* PSA_WANT_ALG_PBKDF2_AES_CMAC_PRF_128 */
431
David Brown94933082021-01-05 12:03:25 -0700432#if defined(PSA_WANT_KEY_TYPE_AES)
David Browne1f91f02021-02-09 15:56:22 -0700433#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_AES)
434#define PSA_HAVE_SOFT_KEY_TYPE_AES 1
435#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_AES */
436#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100437 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
Kusumit Ghoderaoc22affd2023-07-28 13:31:58 +0530438 defined(PSA_HAVE_SOFT_BLOCK_AEAD) || \
439 defined(PSA_HAVE_SOFT_PBKDF2_CMAC)
David Brown78a429b2021-01-21 09:48:57 -0700440#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700441#define MBEDTLS_AES_C
David Browne1f91f02021-02-09 15:56:22 -0700442#endif /* PSA_HAVE_SOFT_KEY_TYPE_AES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown94933082021-01-05 12:03:25 -0700443#endif /* PSA_WANT_KEY_TYPE_AES */
444
Gilles Peskine09c46da2021-10-08 15:48:16 +0200445#if defined(PSA_WANT_KEY_TYPE_ARIA)
446#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA)
447#define PSA_HAVE_SOFT_KEY_TYPE_ARIA 1
448#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA */
449#if defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
450 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
451 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
452#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
453#define MBEDTLS_ARIA_C
454#endif /* PSA_HAVE_SOFT_KEY_TYPE_ARIA || PSA_HAVE_SOFT_BLOCK_MODE */
455#endif /* PSA_WANT_KEY_TYPE_ARIA */
456
David Brown686e6e82021-01-05 12:03:25 -0700457#if defined(PSA_WANT_KEY_TYPE_CAMELLIA)
David Browne1f91f02021-02-09 15:56:22 -0700458#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA)
459#define PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA 1
460#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA */
461#if defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100462 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
463 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
David Brown78a429b2021-01-21 09:48:57 -0700464#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700465#define MBEDTLS_CAMELLIA_C
David Browne1f91f02021-02-09 15:56:22 -0700466#endif /* PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown686e6e82021-01-05 12:03:25 -0700467#endif /* PSA_WANT_KEY_TYPE_CAMELLIA */
468
David Brownb65a7f72021-01-15 12:04:09 -0700469#if defined(PSA_WANT_KEY_TYPE_DES)
David Browne1f91f02021-02-09 15:56:22 -0700470#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DES)
471#define PSA_HAVE_SOFT_KEY_TYPE_DES 1
472#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DES */
473#if defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
David Brownb781f752021-02-08 15:44:52 -0700474 defined(PSA_HAVE_SOFT_BLOCK_MODE)
David Brown78a429b2021-01-21 09:48:57 -0700475#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700476#define MBEDTLS_DES_C
David Browne1f91f02021-02-09 15:56:22 -0700477#endif /*PSA_HAVE_SOFT_KEY_TYPE_DES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brownb65a7f72021-01-15 12:04:09 -0700478#endif /* PSA_WANT_KEY_TYPE_DES */
479
David Brownb16727a2021-02-08 16:31:46 -0700480#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
481#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20)
482#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
483#define MBEDTLS_CHACHA20_C
484#endif /*!MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20 */
485#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
486
David Brownf84a0f62021-02-09 15:59:41 -0700487/* If any of the software block ciphers are selected, define
488 * PSA_HAVE_SOFT_BLOCK_CIPHER, which can be used in any of these
489 * situations. */
490#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200491 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
David Brownf84a0f62021-02-09 15:59:41 -0700492 defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
493 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
494#define PSA_HAVE_SOFT_BLOCK_CIPHER 1
495#endif
496
David Brown99844272021-01-15 12:04:47 -0700497#if defined(PSA_WANT_ALG_STREAM_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700498#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brown99844272021-01-15 12:04:47 -0700499#endif /* PSA_WANT_ALG_STREAM_CIPHER */
500
Ronald Crond85e98d2021-03-25 15:32:32 +0100501#if defined(PSA_WANT_ALG_CBC_MAC)
502#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_MAC)
503#error "CBC-MAC is not yet supported via the PSA API in Mbed TLS."
504#define MBEDTLS_PSA_BUILTIN_ALG_CBC_MAC 1
505#endif /* !MBEDTLS_PSA_ACCEL_ALG_CBC_MAC */
506#endif /* PSA_WANT_ALG_CBC_MAC */
507
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100508#if defined(PSA_WANT_ALG_CMAC)
509#if !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC) || \
Kusumit Ghoderaoc22affd2023-07-28 13:31:58 +0530510 defined(PSA_HAVE_SOFT_BLOCK_CIPHER) || \
511 defined(PSA_HAVE_SOFT_PBKDF2_CMAC)
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100512#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
513#define MBEDTLS_CMAC_C
514#endif /* !MBEDTLS_PSA_ACCEL_ALG_CMAC */
515#endif /* PSA_WANT_ALG_CMAC */
516
Kusumit Ghoderao105f7722023-07-27 21:03:06 +0530517#if defined(PSA_HAVE_SOFT_PBKDF2_HMAC) || \
518 defined(PSA_HAVE_SOFT_PBKDF2_CMAC)
519#define PSA_HAVE_SOFT_PBKDF2 1
520#endif /* PSA_HAVE_SOFT_PBKDF2_HMAC || PSA_HAVE_SOFT_PBKDF2_CMAC */
David Brown99844272021-01-15 12:04:47 -0700521
522#if defined(PSA_WANT_ALG_CTR)
David Brown4b9ec7a2021-02-05 12:47:08 -0700523#if !defined(MBEDTLS_PSA_ACCEL_ALG_CTR) || \
David Brownf84a0f62021-02-09 15:59:41 -0700524 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700525#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700526#define MBEDTLS_CIPHER_MODE_CTR
David Brown4b9ec7a2021-02-05 12:47:08 -0700527#endif
David Brown99844272021-01-15 12:04:47 -0700528#endif /* PSA_WANT_ALG_CTR */
529
530#if defined(PSA_WANT_ALG_CFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700531#if !defined(MBEDTLS_PSA_ACCEL_ALG_CFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700532 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700533#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700534#define MBEDTLS_CIPHER_MODE_CFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700535#endif
David Brown99844272021-01-15 12:04:47 -0700536#endif /* PSA_WANT_ALG_CFB */
537
538#if defined(PSA_WANT_ALG_OFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700539#if !defined(MBEDTLS_PSA_ACCEL_ALG_OFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700540 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700541#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700542#define MBEDTLS_CIPHER_MODE_OFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700543#endif
David Brown99844272021-01-15 12:04:47 -0700544#endif /* PSA_WANT_ALG_OFB */
545
Gilles Peskine7a2e83b2022-03-17 11:09:23 +0100546#if defined(PSA_WANT_ALG_ECB_NO_PADDING) && \
547 !defined(MBEDTLS_PSA_ACCEL_ALG_ECB_NO_PADDING)
David Brownbe380c12021-02-11 10:55:48 -0700548#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700549#endif
550
David Brown12f45f92021-01-26 11:50:36 -0700551#if defined(PSA_WANT_ALG_CBC_NO_PADDING)
David Brown4b9ec7a2021-02-05 12:47:08 -0700552#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING) || \
David Brownfc468182021-02-09 16:23:34 -0700553 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700554#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700555#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown4b9ec7a2021-02-05 12:47:08 -0700556#endif
David Brown12f45f92021-01-26 11:50:36 -0700557#endif /* PSA_WANT_ALG_CBC_NO_PADDING */
558
559#if defined(PSA_WANT_ALG_CBC_PKCS7)
David Brown4b9ec7a2021-02-05 12:47:08 -0700560#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7) || \
David Brownfc468182021-02-09 16:23:34 -0700561 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700562#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700563#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brownfc468182021-02-09 16:23:34 -0700564#define MBEDTLS_CIPHER_PADDING_PKCS7
David Brown4b9ec7a2021-02-05 12:47:08 -0700565#endif
David Brown12f45f92021-01-26 11:50:36 -0700566#endif /* PSA_WANT_ALG_CBC_PKCS7 */
567
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100568#if defined(PSA_WANT_ALG_CCM)
569#if !defined(MBEDTLS_PSA_ACCEL_ALG_CCM) || \
570 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200571 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100572 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
573#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100574#define MBEDTLS_PSA_BUILTIN_ALG_CCM_STAR_NO_TAG 1
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100575#define MBEDTLS_CCM_C
576#endif
577#endif /* PSA_WANT_ALG_CCM */
578
579#if defined(PSA_WANT_ALG_GCM)
580#if !defined(MBEDTLS_PSA_ACCEL_ALG_GCM) || \
581 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200582 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100583 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
584#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
585#define MBEDTLS_GCM_C
586#endif
587#endif /* PSA_WANT_ALG_GCM */
588
David Brownac4fa072021-02-08 16:47:35 -0700589#if defined(PSA_WANT_ALG_CHACHA20_POLY1305)
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200590#if !defined(MBEDTLS_PSA_ACCEL_ALG_CHACHA20_POLY1305)
David Brownac4fa072021-02-08 16:47:35 -0700591#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
592#define MBEDTLS_CHACHAPOLY_C
Summer Qin9f2596f2022-06-17 12:50:32 +0800593#define MBEDTLS_CHACHA20_C
594#define MBEDTLS_POLY1305_C
David Brown86730a82021-02-09 16:24:11 -0700595#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700596#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200597#endif /* !MBEDTLS_PSA_ACCEL_ALG_CHACHA20_POLY1305 */
David Brownac4fa072021-02-08 16:47:35 -0700598#endif /* PSA_WANT_ALG_CHACHA20_POLY1305 */
599
David Browneed74df2021-03-15 15:53:57 -0600600#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_256)
601#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256)
602#define MBEDTLS_ECP_DP_BP256R1_ENABLED
603#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
604#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256 */
605#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_256 */
606
607#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_384)
608#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384)
609#define MBEDTLS_ECP_DP_BP384R1_ENABLED
610#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
611#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384 */
612#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_384 */
613
614#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_512)
615#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512)
616#define MBEDTLS_ECP_DP_BP512R1_ENABLED
617#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
618#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512 */
619#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_512 */
620
621#if defined(PSA_WANT_ECC_MONTGOMERY_255)
622#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255)
623#define MBEDTLS_ECP_DP_CURVE25519_ENABLED
624#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
625#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255 */
626#endif /* PSA_WANT_ECC_MONTGOMERY_255 */
627
628#if defined(PSA_WANT_ECC_MONTGOMERY_448)
629#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448)
630#define MBEDTLS_ECP_DP_CURVE448_ENABLED
631#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
632#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448 */
633#endif /* PSA_WANT_ECC_MONTGOMERY_448 */
634
David Brownc7b9b2b2021-02-19 21:05:52 -0700635#if defined(PSA_WANT_ECC_SECP_R1_192)
636#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192)
637#define MBEDTLS_ECP_DP_SECP192R1_ENABLED
638#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
639#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192 */
640#endif /* PSA_WANT_ECC_SECP_R1_192 */
641
642#if defined(PSA_WANT_ECC_SECP_R1_224)
643#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224)
644#define MBEDTLS_ECP_DP_SECP224R1_ENABLED
645#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
646#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224 */
647#endif /* PSA_WANT_ECC_SECP_R1_224 */
648
649#if defined(PSA_WANT_ECC_SECP_R1_256)
650#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256)
651#define MBEDTLS_ECP_DP_SECP256R1_ENABLED
652#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
653#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256 */
654#endif /* PSA_WANT_ECC_SECP_R1_256 */
655
656#if defined(PSA_WANT_ECC_SECP_R1_384)
657#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384)
658#define MBEDTLS_ECP_DP_SECP384R1_ENABLED
659#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
660#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384 */
661#endif /* PSA_WANT_ECC_SECP_R1_384 */
662
663#if defined(PSA_WANT_ECC_SECP_R1_521)
664#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521)
665#define MBEDTLS_ECP_DP_SECP521R1_ENABLED
666#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
667#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521 */
668#endif /* PSA_WANT_ECC_SECP_R1_521 */
669
670#if defined(PSA_WANT_ECC_SECP_K1_192)
671#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192)
David Brown8de143e2021-02-19 14:08:00 -0700672#define MBEDTLS_ECP_DP_SECP192K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700673#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
674#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192 */
675#endif /* PSA_WANT_ECC_SECP_K1_192 */
David Brown8de143e2021-02-19 14:08:00 -0700676
David Brownc7b9b2b2021-02-19 21:05:52 -0700677#if defined(PSA_WANT_ECC_SECP_K1_224)
678#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224)
Ronald Crone1f55162021-03-25 15:09:47 +0100679/*
680 * SECP224K1 is buggy via the PSA API in Mbed TLS
Dave Rodgman017a1992022-03-31 14:07:01 +0100681 * (https://github.com/Mbed-TLS/mbedtls/issues/3541).
Ronald Crone1f55162021-03-25 15:09:47 +0100682 */
683#error "SECP224K1 is buggy via the PSA API in Mbed TLS."
David Brown8de143e2021-02-19 14:08:00 -0700684#define MBEDTLS_ECP_DP_SECP224K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700685#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
686#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224 */
687#endif /* PSA_WANT_ECC_SECP_K1_224 */
David Brown8de143e2021-02-19 14:08:00 -0700688
David Brownc7b9b2b2021-02-19 21:05:52 -0700689#if defined(PSA_WANT_ECC_SECP_K1_256)
690#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256)
David Brown9b178de2021-03-10 13:14:48 -0700691#define MBEDTLS_ECP_DP_SECP256K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700692#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
693#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256 */
694#endif /* PSA_WANT_ECC_SECP_K1_256 */
David Brown8de143e2021-02-19 14:08:00 -0700695
Gilles Peskine1231eb52021-04-19 22:24:23 +0200696
697
698/****************************************************************/
699/* Infer PSA requirements from Mbed TLS capabilities */
700/****************************************************************/
701
John Durkop714e3a12020-09-29 22:07:04 -0700702#else /* MBEDTLS_PSA_CRYPTO_CONFIG */
703
704/*
705 * Ensure PSA_WANT_* defines are setup properly if MBEDTLS_PSA_CRYPTO_CONFIG
706 * is not defined
707 */
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100708
Ronald Cron3d471812021-03-18 13:40:31 +0100709#if defined(MBEDTLS_CCM_C)
710#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100711#define MBEDTLS_PSA_BUILTIN_ALG_CCM_STAR_NO_TAG 1
Ronald Cron3d471812021-03-18 13:40:31 +0100712#define PSA_WANT_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100713#define PSA_WANT_ALG_CCM_STAR_NO_TAG 1
Ronald Cron3d471812021-03-18 13:40:31 +0100714#endif /* MBEDTLS_CCM_C */
715
716#if defined(MBEDTLS_CMAC_C)
717#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
718#define PSA_WANT_ALG_CMAC 1
719#endif /* MBEDTLS_CMAC_C */
720
John Durkopd62b6782020-11-30 21:06:05 -0800721#if defined(MBEDTLS_ECDH_C)
722#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
723#define PSA_WANT_ALG_ECDH 1
724#endif /* MBEDTLS_ECDH_C */
725
726#if defined(MBEDTLS_ECDSA_C)
727#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
728#define PSA_WANT_ALG_ECDSA 1
Gilles Peskine1231eb52021-04-19 22:24:23 +0200729#define PSA_WANT_ALG_ECDSA_ANY 1
John Durkopd62b6782020-11-30 21:06:05 -0800730
731// Only add in DETERMINISTIC support if ECDSA is also enabled
732#if defined(MBEDTLS_ECDSA_DETERMINISTIC)
733#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
734#define PSA_WANT_ALG_DETERMINISTIC_ECDSA 1
735#endif /* MBEDTLS_ECDSA_DETERMINISTIC */
736
737#endif /* MBEDTLS_ECDSA_C */
738
739#if defined(MBEDTLS_ECP_C)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200740#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Settif87b5052023-05-26 13:47:09 +0200741#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT 1
742#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT 1
Valerio Settif87b5052023-05-26 13:47:09 +0200743#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE 1
Valerio Setti06dfba72023-06-30 10:09:36 +0200744/* Normally we wouldn't enable this because it's not implemented in ecp.c,
745 * but since it used to be available any time ECP_C was enabled, let's enable
746 * it anyway for the sake of backwards compatibility */
747#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200748#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Settiddb57762023-06-06 14:17:15 +0200749#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_IMPORT 1
750#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_EXPORT 1
751#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_GENERATE 1
Valerio Setti06dfba72023-06-30 10:09:36 +0200752/* See comment for PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE above. */
753#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_DERIVE 1
John Durkopd62b6782020-11-30 21:06:05 -0800754#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
755#define PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY 1
756#endif /* MBEDTLS_ECP_C */
757
Przemek Stekiel746dfae2023-05-04 09:14:08 +0200758#if defined(MBEDTLS_DHM_C)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200759#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC 1
Valerio Settif87b5052023-05-26 13:47:09 +0200760#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_IMPORT 1
761#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_EXPORT 1
Valerio Settif87b5052023-05-26 13:47:09 +0200762#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_GENERATE 1
Przemek Stekiel746dfae2023-05-04 09:14:08 +0200763#define PSA_WANT_KEY_TYPE_DH_PUBLIC_KEY 1
764#define PSA_WANT_ALG_FFDH 1
765#define PSA_WANT_DH_FAMILY_RFC7919 1
766#define MBEDTLS_PSA_BUILTIN_ALG_FFDH 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200767#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_BASIC 1
Valerio Settif87b5052023-05-26 13:47:09 +0200768#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_IMPORT 1
769#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT 1
770#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE 1
Przemek Stekiel746dfae2023-05-04 09:14:08 +0200771#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY 1
772#endif /* MBEDTLS_DHM_C */
773
Ronald Cron3d471812021-03-18 13:40:31 +0100774#if defined(MBEDTLS_GCM_C)
775#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
776#define PSA_WANT_ALG_GCM 1
777#endif /* MBEDTLS_GCM_C */
778
Przemek Stekiel18399d82022-06-27 13:34:50 +0200779/* Enable PSA HKDF algorithm if mbedtls HKDF is supported.
780 * PSA HKDF EXTRACT and PSA HKDF EXPAND have minimal cost when
781 * PSA HKDF is enabled, so enable both algorithms together
782 * with PSA HKDF. */
John Durkopd62b6782020-11-30 21:06:05 -0800783#if defined(MBEDTLS_HKDF_C)
784#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
785#define PSA_WANT_ALG_HMAC 1
786#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
787#define PSA_WANT_ALG_HKDF 1
Przemek Stekielb33bd192022-06-21 09:58:51 +0200788#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXTRACT 1
789#define PSA_WANT_ALG_HKDF_EXTRACT 1
790#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXPAND 1
791#define PSA_WANT_ALG_HKDF_EXPAND 1
John Durkopd62b6782020-11-30 21:06:05 -0800792#endif /* MBEDTLS_HKDF_C */
793
John Durkopd62b6782020-11-30 21:06:05 -0800794#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
795#define PSA_WANT_ALG_HMAC 1
Tom Cosgrovec43c3aa2023-08-31 17:06:58 +0100796#define PSA_WANT_KEY_TYPE_HMAC 1
Andrzej Kurek65bf73e2022-08-31 14:59:31 -0400797
798#if defined(MBEDTLS_MD_C)
John Durkopd62b6782020-11-30 21:06:05 -0800799#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
800#define PSA_WANT_ALG_TLS12_PRF 1
801#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
802#define PSA_WANT_ALG_TLS12_PSK_TO_MS 1
803#endif /* MBEDTLS_MD_C */
804
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100805#if defined(MBEDTLS_MD5_C)
806#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
807#define PSA_WANT_ALG_MD5 1
808#endif
809
Neil Armstrong637d0a02022-05-25 11:28:22 +0200810#if defined(MBEDTLS_ECJPAKE_C)
811#define MBEDTLS_PSA_BUILTIN_PAKE 1
Neil Armstronga557cb82022-06-10 08:58:32 +0200812#define MBEDTLS_PSA_BUILTIN_ALG_JPAKE 1
813#define PSA_WANT_ALG_JPAKE 1
Neil Armstrong637d0a02022-05-25 11:28:22 +0200814#endif
815
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100816#if defined(MBEDTLS_RIPEMD160_C)
817#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
818#define PSA_WANT_ALG_RIPEMD160 1
819#endif
820
John Durkopd62b6782020-11-30 21:06:05 -0800821#if defined(MBEDTLS_RSA_C)
822#if defined(MBEDTLS_PKCS1_V15)
823#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
824#define PSA_WANT_ALG_RSA_PKCS1V15_CRYPT 1
825#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
826#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN 1
Gilles Peskine1231eb52021-04-19 22:24:23 +0200827#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW 1
Yuto Takano7828ca22021-08-10 11:26:15 +0100828#endif /* MBEDTLS_PKCS1_V15 */
John Durkopd62b6782020-11-30 21:06:05 -0800829#if defined(MBEDTLS_PKCS1_V21)
830#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
831#define PSA_WANT_ALG_RSA_OAEP 1
832#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
833#define PSA_WANT_ALG_RSA_PSS 1
834#endif /* MBEDTLS_PKCS1_V21 */
Valerio Setti98038342023-07-11 16:30:24 +0200835#if defined(MBEDTLS_GENPRIME)
836#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_GENERATE 1
837#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_GENERATE 1
838#endif /* MBEDTLS_GENPRIME */
Valerio Setti01cc88a2023-06-15 11:53:08 +0200839#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
Valerio Settif87b5052023-05-26 13:47:09 +0200840#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_IMPORT 1
841#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_EXPORT 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200842#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
Valerio Settif87b5052023-05-26 13:47:09 +0200843#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_IMPORT 1
844#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_EXPORT 1
John Durkopd62b6782020-11-30 21:06:05 -0800845#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
846#define PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY 1
847#endif /* MBEDTLS_RSA_C */
848
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100849#if defined(MBEDTLS_SHA1_C)
850#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
851#define PSA_WANT_ALG_SHA_1 1
852#endif
853
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200854#if defined(MBEDTLS_SHA224_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100855#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
Gilles Peskineb65db072021-01-12 00:00:53 +0100856#define PSA_WANT_ALG_SHA_224 1
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200857#endif
858
859#if defined(MBEDTLS_SHA256_C)
860#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100861#define PSA_WANT_ALG_SHA_256 1
862#endif
863
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200864#if defined(MBEDTLS_SHA384_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100865#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
866#define PSA_WANT_ALG_SHA_384 1
867#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200868
869#if defined(MBEDTLS_SHA512_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100870#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
871#define PSA_WANT_ALG_SHA_512 1
872#endif
873
Dave Rodgman98083c62023-06-25 23:27:45 +0100874#if defined(MBEDTLS_SHA3_C)
Dave Rodgmanf66cd612023-06-26 11:02:12 +0100875#define MBEDTLS_PSA_BUILTIN_ALG_SHA3_224 1
876#define MBEDTLS_PSA_BUILTIN_ALG_SHA3_256 1
877#define MBEDTLS_PSA_BUILTIN_ALG_SHA3_384 1
878#define MBEDTLS_PSA_BUILTIN_ALG_SHA3_512 1
879#define PSA_WANT_ALG_SHA3_224 1
880#define PSA_WANT_ALG_SHA3_256 1
881#define PSA_WANT_ALG_SHA3_384 1
882#define PSA_WANT_ALG_SHA3_512 1
Dave Rodgman98083c62023-06-25 23:27:45 +0100883#endif
884
David Brown94933082021-01-05 12:03:25 -0700885#if defined(MBEDTLS_AES_C)
886#define PSA_WANT_KEY_TYPE_AES 1
David Brownda7dbb72021-01-26 11:44:15 -0700887#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700888#endif
889
Gilles Peskine09c46da2021-10-08 15:48:16 +0200890#if defined(MBEDTLS_ARIA_C)
891#define PSA_WANT_KEY_TYPE_ARIA 1
892#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
893#endif
894
David Brown686e6e82021-01-05 12:03:25 -0700895#if defined(MBEDTLS_CAMELLIA_C)
896#define PSA_WANT_KEY_TYPE_CAMELLIA 1
David Brownda7dbb72021-01-26 11:44:15 -0700897#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700898#endif
899
David Brownb65a7f72021-01-15 12:04:09 -0700900#if defined(MBEDTLS_DES_C)
901#define PSA_WANT_KEY_TYPE_DES 1
David Brownda7dbb72021-01-26 11:44:15 -0700902#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700903#endif
904
Andrzej Kurekd60907b2022-09-14 10:02:30 -0400905#if defined(MBEDTLS_PSA_BUILTIN_ALG_SHA_256)
906#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_ECJPAKE_TO_PMS 1
907#define PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS 1
908#endif
909
David Brownb16727a2021-02-08 16:31:46 -0700910#if defined(MBEDTLS_CHACHA20_C)
911#define PSA_WANT_KEY_TYPE_CHACHA20 1
912#define PSA_WANT_ALG_STREAM_CIPHER 1
913#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
914#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brownac4fa072021-02-08 16:47:35 -0700915#if defined(MBEDTLS_CHACHAPOLY_C)
916#define PSA_WANT_ALG_CHACHA20_POLY1305 1
David Brown86730a82021-02-09 16:24:11 -0700917#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700918#endif
David Brownb16727a2021-02-08 16:31:46 -0700919#endif
920
David Brown99844272021-01-15 12:04:47 -0700921#if defined(MBEDTLS_CIPHER_MODE_CBC)
David Brown10cb81c2021-02-09 16:10:29 -0700922#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700923#define PSA_WANT_ALG_CBC_NO_PADDING 1
924#if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
David Brown12f45f92021-01-26 11:50:36 -0700925#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brown99844272021-01-15 12:04:47 -0700926#define PSA_WANT_ALG_CBC_PKCS7 1
927#endif
928#endif
929
930#if defined(MBEDTLS_AES_C) || defined(MBEDTLS_DES_C) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200931 defined(MBEDTLS_ARIA_C) || defined(MBEDTLS_CAMELLIA_C)
David Brown10cb81c2021-02-09 16:10:29 -0700932#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700933#define PSA_WANT_ALG_ECB_NO_PADDING 1
934#endif
935
936#if defined(MBEDTLS_CIPHER_MODE_CFB)
David Brown12f45f92021-01-26 11:50:36 -0700937#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700938#define PSA_WANT_ALG_CFB 1
939#endif
940
941#if defined(MBEDTLS_CIPHER_MODE_CTR)
David Brown12f45f92021-01-26 11:50:36 -0700942#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700943#define PSA_WANT_ALG_CTR 1
944#endif
945
946#if defined(MBEDTLS_CIPHER_MODE_OFB)
David Brown12f45f92021-01-26 11:50:36 -0700947#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700948#define PSA_WANT_ALG_OFB 1
949#endif
950
David Browneed74df2021-03-15 15:53:57 -0600951#if defined(MBEDTLS_ECP_DP_BP256R1_ENABLED)
952#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
Tom Cosgrovec43c3aa2023-08-31 17:06:58 +0100953#define PSA_WANT_ECC_BRAINPOOL_P_R1_256 1
David Browneed74df2021-03-15 15:53:57 -0600954#endif
955
956#if defined(MBEDTLS_ECP_DP_BP384R1_ENABLED)
957#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
Tom Cosgrovec43c3aa2023-08-31 17:06:58 +0100958#define PSA_WANT_ECC_BRAINPOOL_P_R1_384 1
David Browneed74df2021-03-15 15:53:57 -0600959#endif
960
961#if defined(MBEDTLS_ECP_DP_BP512R1_ENABLED)
962#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
Tom Cosgrovec43c3aa2023-08-31 17:06:58 +0100963#define PSA_WANT_ECC_BRAINPOOL_P_R1_512 1
David Browneed74df2021-03-15 15:53:57 -0600964#endif
965
966#if defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED)
967#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
Tom Cosgrovec43c3aa2023-08-31 17:06:58 +0100968#define PSA_WANT_ECC_MONTGOMERY_255 1
David Browneed74df2021-03-15 15:53:57 -0600969#endif
970
Archanaef6aa5c2021-06-08 11:40:10 +0530971#if defined(MBEDTLS_ECP_DP_CURVE448_ENABLED)
David Browneed74df2021-03-15 15:53:57 -0600972#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
Tom Cosgrovec43c3aa2023-08-31 17:06:58 +0100973#define PSA_WANT_ECC_MONTGOMERY_448 1
David Browneed74df2021-03-15 15:53:57 -0600974#endif
975
David Brown8de143e2021-02-19 14:08:00 -0700976#if defined(MBEDTLS_ECP_DP_SECP192R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700977#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
Tom Cosgrovec43c3aa2023-08-31 17:06:58 +0100978#define PSA_WANT_ECC_SECP_R1_192 1
David Brown8de143e2021-02-19 14:08:00 -0700979#endif
980
981#if defined(MBEDTLS_ECP_DP_SECP224R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700982#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
Tom Cosgrovec43c3aa2023-08-31 17:06:58 +0100983#define PSA_WANT_ECC_SECP_R1_224 1
David Brown8de143e2021-02-19 14:08:00 -0700984#endif
985
986#if defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700987#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
Tom Cosgrovec43c3aa2023-08-31 17:06:58 +0100988#define PSA_WANT_ECC_SECP_R1_256 1
David Brown8de143e2021-02-19 14:08:00 -0700989#endif
990
991#if defined(MBEDTLS_ECP_DP_SECP384R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700992#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
Tom Cosgrovec43c3aa2023-08-31 17:06:58 +0100993#define PSA_WANT_ECC_SECP_R1_384 1
David Brown8de143e2021-02-19 14:08:00 -0700994#endif
995
996#if defined(MBEDTLS_ECP_DP_SECP521R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700997#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
Tom Cosgrovec43c3aa2023-08-31 17:06:58 +0100998#define PSA_WANT_ECC_SECP_R1_521 1
David Brown8de143e2021-02-19 14:08:00 -0700999#endif
1000
1001#if defined(MBEDTLS_ECP_DP_SECP192K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -07001002#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
Tom Cosgrovec43c3aa2023-08-31 17:06:58 +01001003#define PSA_WANT_ECC_SECP_K1_192 1
David Brown8de143e2021-02-19 14:08:00 -07001004#endif
1005
Dave Rodgman017a1992022-03-31 14:07:01 +01001006/* SECP224K1 is buggy via the PSA API (https://github.com/Mbed-TLS/mbedtls/issues/3541) */
Gilles Peskine39841302021-03-23 12:06:45 +01001007#if 0 && defined(MBEDTLS_ECP_DP_SECP224K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -07001008#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
Tom Cosgrovec43c3aa2023-08-31 17:06:58 +01001009#define PSA_WANT_ECC_SECP_K1_224 1
David Brown8de143e2021-02-19 14:08:00 -07001010#endif
1011
David Brown9b178de2021-03-10 13:14:48 -07001012#if defined(MBEDTLS_ECP_DP_SECP256K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -07001013#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
Tom Cosgrovec43c3aa2023-08-31 17:06:58 +01001014#define PSA_WANT_ECC_SECP_K1_256 1
David Brown8de143e2021-02-19 14:08:00 -07001015#endif
1016
John Durkop2dfaf9c2020-09-24 04:30:10 -07001017#endif /* MBEDTLS_PSA_CRYPTO_CONFIG */
John Durkopd8959392020-09-20 23:09:17 -07001018
Tom Cosgrove6d62fac2023-05-10 14:40:05 +01001019#if defined(PSA_WANT_ALG_JPAKE)
1020#define PSA_WANT_ALG_SOME_PAKE 1
1021#endif
1022
Valerio Setti73fc0822023-06-21 10:06:19 +02001023/* Even though KEY_PAIR symbols' feature several level of support (BASIC, IMPORT,
1024 * EXPORT, GENERATE, DERIVE) we're not planning to have support only for BASIC
1025 * without IMPORT/EXPORT since these last 2 features are strongly used in tests.
Valerio Setti27c501a2023-06-27 16:58:52 +02001026 * In general it is allowed to include more feature than what is strictly
1027 * requested.
1028 * As a consequence IMPORT and EXPORT features will be automatically enabled
1029 * as soon as the BASIC one is. */
Valerio Setti73fc0822023-06-21 10:06:19 +02001030#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC)
Valerio Setti27c501a2023-06-27 16:58:52 +02001031#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT 1
1032#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT 1
Valerio Setti73fc0822023-06-21 10:06:19 +02001033#endif
1034
Valerio Setti27c501a2023-06-27 16:58:52 +02001035/* See description above */
Valerio Setti73fc0822023-06-21 10:06:19 +02001036#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_BASIC)
Valerio Setti27c501a2023-06-27 16:58:52 +02001037#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_IMPORT 1
1038#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_EXPORT 1
Valerio Setti8d6e98c2023-05-26 13:46:13 +02001039#endif
1040
Valerio Setti0d5c5e52023-07-10 16:21:00 +02001041/* See description above */
1042#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC)
1043#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_IMPORT 1
1044#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_EXPORT 1
1045#endif
1046
1047/* See description above */
1048#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_BASIC)
1049#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_IMPORT 1
1050#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_EXPORT 1
1051#endif
1052
Valerio Settia55f0422023-07-10 15:34:41 +02001053/* See description above */
1054#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC)
1055#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_IMPORT 1
1056#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_EXPORT 1
Valerio Setti8d6e98c2023-05-26 13:46:13 +02001057#endif
1058
Valerio Settia55f0422023-07-10 15:34:41 +02001059/* See description above */
1060#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_BASIC)
1061#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_IMPORT 1
1062#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT 1
Valerio Setti8d6e98c2023-05-26 13:46:13 +02001063#endif
1064
Gilles Peskine60b29fe2021-02-16 14:06:50 +01001065/* These features are always enabled. */
1066#define PSA_WANT_KEY_TYPE_DERIVE 1
Gilles Peskinebba26302022-12-15 23:25:17 +01001067#define PSA_WANT_KEY_TYPE_PASSWORD 1
1068#define PSA_WANT_KEY_TYPE_PASSWORD_HASH 1
Gilles Peskine60b29fe2021-02-16 14:06:50 +01001069#define PSA_WANT_KEY_TYPE_RAW_DATA 1
1070
John Durkop6e33dbe2020-09-17 21:15:13 -07001071#endif /* MBEDTLS_CONFIG_PSA_H */