blob: 7046c517a878fd6c8ae7580ce09a7270819d1801 [file] [log] [blame]
John Durkop6e33dbe2020-09-17 21:15:13 -07001/**
2 * \file mbedtls/config_psa.h
3 * \brief PSA crypto configuration options (set of defines)
4 *
John Durkop34818822020-10-12 21:36:22 -07005 * This set of compile-time options takes settings defined in
Bence Szépkútibb0cfeb2021-05-28 09:42:25 +02006 * include/mbedtls/mbedtls_config.h and include/psa/crypto_config.h and uses
John Durkop34818822020-10-12 21:36:22 -07007 * those definitions to define symbols used in the library code.
8 *
9 * Users and integrators should not edit this file, please edit
Tom Cosgrove1797b052022-12-04 17:19:59 +000010 * include/mbedtls/mbedtls_config.h for MBEDTLS_XXX settings or
John Durkop34818822020-10-12 21:36:22 -070011 * include/psa/crypto_config.h for PSA_WANT_XXX settings.
John Durkop6e33dbe2020-09-17 21:15:13 -070012 */
13/*
14 * Copyright The Mbed TLS Contributors
15 * SPDX-License-Identifier: Apache-2.0
16 *
17 * Licensed under the Apache License, Version 2.0 (the "License"); you may
18 * not use this file except in compliance with the License.
19 * You may obtain a copy of the License at
20 *
21 * http://www.apache.org/licenses/LICENSE-2.0
22 *
23 * Unless required by applicable law or agreed to in writing, software
24 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
25 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
26 * See the License for the specific language governing permissions and
27 * limitations under the License.
28 */
29
30#ifndef MBEDTLS_CONFIG_PSA_H
31#define MBEDTLS_CONFIG_PSA_H
32
John Durkop714e3a12020-09-29 22:07:04 -070033#if defined(MBEDTLS_PSA_CRYPTO_CONFIG)
Gilles Peskinef4c6eb02022-03-16 17:10:48 +010034#if defined(MBEDTLS_PSA_CRYPTO_CONFIG_FILE)
35#include MBEDTLS_PSA_CRYPTO_CONFIG_FILE
36#else
John Durkop6e33dbe2020-09-17 21:15:13 -070037#include "psa/crypto_config.h"
Gilles Peskinef4c6eb02022-03-16 17:10:48 +010038#endif
John Durkop76228ac2020-09-29 22:33:49 -070039#endif /* defined(MBEDTLS_PSA_CRYPTO_CONFIG) */
John Durkop6e33dbe2020-09-17 21:15:13 -070040
Gilles Peskinef4c6eb02022-03-16 17:10:48 +010041#if defined(MBEDTLS_PSA_CRYPTO_USER_CONFIG_FILE)
42#include MBEDTLS_PSA_CRYPTO_USER_CONFIG_FILE
43#endif
44
John Durkop6e33dbe2020-09-17 21:15:13 -070045#ifdef __cplusplus
46extern "C" {
47#endif
48
Gilles Peskine1231eb52021-04-19 22:24:23 +020049
50
51/****************************************************************/
52/* De facto synonyms */
53/****************************************************************/
54
55#if defined(PSA_WANT_ALG_ECDSA_ANY) && !defined(PSA_WANT_ALG_ECDSA)
56#define PSA_WANT_ALG_ECDSA PSA_WANT_ALG_ECDSA_ANY
57#elif !defined(PSA_WANT_ALG_ECDSA_ANY) && defined(PSA_WANT_ALG_ECDSA)
58#define PSA_WANT_ALG_ECDSA_ANY PSA_WANT_ALG_ECDSA
59#endif
60
Gilles Peskine08622b62022-03-15 16:40:59 +010061#if defined(PSA_WANT_ALG_CCM_STAR_NO_TAG) && !defined(PSA_WANT_ALG_CCM)
62#define PSA_WANT_ALG_CCM PSA_WANT_ALG_CCM_STAR_NO_TAG
63#elif !defined(PSA_WANT_ALG_CCM_STAR_NO_TAG) && defined(PSA_WANT_ALG_CCM)
64#define PSA_WANT_ALG_CCM_STAR_NO_TAG PSA_WANT_ALG_CCM
65#endif
66
Gilles Peskine1231eb52021-04-19 22:24:23 +020067#if defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW) && !defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
68#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW
69#elif !defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW) && defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
70#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW PSA_WANT_ALG_RSA_PKCS1V15_SIGN
71#endif
72
Gilles Peskine44c96aa2021-10-04 18:33:56 +020073#if defined(PSA_WANT_ALG_RSA_PSS_ANY_SALT) && !defined(PSA_WANT_ALG_RSA_PSS)
74#define PSA_WANT_ALG_RSA_PSS PSA_WANT_ALG_RSA_PSS_ANY_SALT
75#elif !defined(PSA_WANT_ALG_RSA_PSS_ANY_SALT) && defined(PSA_WANT_ALG_RSA_PSS)
76#define PSA_WANT_ALG_RSA_PSS_ANY_SALT PSA_WANT_ALG_RSA_PSS
77#endif
78
Gilles Peskine1231eb52021-04-19 22:24:23 +020079
Manuel Pégourié-Gonnard235a9332023-03-14 18:01:23 +010080/****************************************************************/
81/* Hashes that are built in are also enabled in PSA.
82 * This simplifies dependency declarations especially
83 * for modules that obey MBEDTLS_USE_PSA_CRYPTO. */
84/****************************************************************/
85
86#if defined(MBEDTLS_MD5_C)
87#define PSA_WANT_ALG_MD5 1
88#endif
89
90#if defined(MBEDTLS_RIPEMD160_C)
91#define PSA_WANT_ALG_RIPEMD160 1
92#endif
93
94#if defined(MBEDTLS_SHA1_C)
95#define PSA_WANT_ALG_SHA_1 1
96#endif
97
98#if defined(MBEDTLS_SHA224_C)
99#define PSA_WANT_ALG_SHA_224 1
100#endif
101
102#if defined(MBEDTLS_SHA256_C)
103#define PSA_WANT_ALG_SHA_256 1
104#endif
105
106#if defined(MBEDTLS_SHA384_C)
107#define PSA_WANT_ALG_SHA_384 1
108#endif
109
110#if defined(MBEDTLS_SHA512_C)
111#define PSA_WANT_ALG_SHA_512 1
112#endif
113
Gilles Peskine1231eb52021-04-19 22:24:23 +0200114
115/****************************************************************/
116/* Require built-in implementations based on PSA requirements */
117/****************************************************************/
118
John Durkop2dfaf9c2020-09-24 04:30:10 -0700119#if defined(MBEDTLS_PSA_CRYPTO_CONFIG)
John Durkopd8959392020-09-20 23:09:17 -0700120
John Durkopd62b6782020-11-30 21:06:05 -0800121#if defined(PSA_WANT_ALG_DETERMINISTIC_ECDSA)
122#if !defined(MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA)
123#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
124#define MBEDTLS_ECDSA_DETERMINISTIC
125#define MBEDTLS_ECDSA_C
126#define MBEDTLS_HMAC_DRBG_C
127#define MBEDTLS_MD_C
128#endif /* !MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA */
129#endif /* PSA_WANT_ALG_DETERMINISTIC_ECDSA */
130
131#if defined(PSA_WANT_ALG_ECDH)
132#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDH)
133#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
134#define MBEDTLS_ECDH_C
135#define MBEDTLS_ECP_C
136#define MBEDTLS_BIGNUM_C
137#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDH */
138#endif /* PSA_WANT_ALG_ECDH */
139
140#if defined(PSA_WANT_ALG_ECDSA)
141#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDSA)
142#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
143#define MBEDTLS_ECDSA_C
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200144#define MBEDTLS_ECP_C
145#define MBEDTLS_BIGNUM_C
146#define MBEDTLS_ASN1_PARSE_C
147#define MBEDTLS_ASN1_WRITE_C
John Durkopd62b6782020-11-30 21:06:05 -0800148#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDSA */
149#endif /* PSA_WANT_ALG_ECDSA */
150
Przemek Stekiel84ee3e22022-12-01 14:22:34 +0100151#if defined(PSA_WANT_ALG_FFDH)
152#if !defined(MBEDTLS_PSA_ACCEL_ALG_FFDH)
153#define MBEDTLS_PSA_BUILTIN_ALG_FFDH 1
154#define MBEDTLS_DHM_C
155#define MBEDTLS_BIGNUM_C
156#endif /* !MBEDTLS_PSA_ACCEL_ALG_FFDH */
157#endif /* PSA_WANT_ALG_FFDH */
158
John Durkopd62b6782020-11-30 21:06:05 -0800159#if defined(PSA_WANT_ALG_HKDF)
160#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF)
161#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
162#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
163#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF */
164#endif /* PSA_WANT_ALG_HKDF */
165
Przemek Stekiel3e8249c2022-06-03 14:05:07 +0200166#if defined(PSA_WANT_ALG_HKDF_EXTRACT)
167#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF_EXTRACT)
168#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
169#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXTRACT 1
170#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF_EXTRACT */
171#endif /* PSA_WANT_ALG_HKDF_EXTRACT */
172
173#if defined(PSA_WANT_ALG_HKDF_EXPAND)
174#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF_EXPAND)
175#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
176#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXPAND 1
177#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF_EXPAND */
178#endif /* PSA_WANT_ALG_HKDF_EXPAND */
179
John Durkopd62b6782020-11-30 21:06:05 -0800180#if defined(PSA_WANT_ALG_HMAC)
181#if !defined(MBEDTLS_PSA_ACCEL_ALG_HMAC)
182#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
183#endif /* !MBEDTLS_PSA_ACCEL_ALG_HMAC */
184#endif /* PSA_WANT_ALG_HMAC */
185
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100186#if defined(PSA_WANT_ALG_MD5) && !defined(MBEDTLS_PSA_ACCEL_ALG_MD5)
187#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
188#define MBEDTLS_MD5_C
189#endif
190
Neil Armstronga557cb82022-06-10 08:58:32 +0200191#if defined(PSA_WANT_ALG_JPAKE)
Przemek Stekiel4aa99402023-02-27 13:00:57 +0100192#if !defined(MBEDTLS_PSA_ACCEL_ALG_JPAKE)
Neil Armstrong637d0a02022-05-25 11:28:22 +0200193#define MBEDTLS_PSA_BUILTIN_PAKE 1
Neil Armstronga557cb82022-06-10 08:58:32 +0200194#define MBEDTLS_PSA_BUILTIN_ALG_JPAKE 1
Neil Armstronged407822022-06-15 11:21:33 +0200195#define MBEDTLS_ECP_DP_SECP256R1_ENABLED
Neil Armstrong637d0a02022-05-25 11:28:22 +0200196#define MBEDTLS_BIGNUM_C
197#define MBEDTLS_ECP_C
Neil Armstrong637d0a02022-05-25 11:28:22 +0200198#define MBEDTLS_ECJPAKE_C
Przemek Stekiel4aa99402023-02-27 13:00:57 +0100199#endif /* MBEDTLS_PSA_ACCEL_ALG_JPAKE */
Neil Armstronga557cb82022-06-10 08:58:32 +0200200#endif /* PSA_WANT_ALG_JPAKE */
Neil Armstrong637d0a02022-05-25 11:28:22 +0200201
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100202#if defined(PSA_WANT_ALG_RIPEMD160) && !defined(MBEDTLS_PSA_ACCEL_ALG_RIPEMD160)
203#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
204#define MBEDTLS_RIPEMD160_C
205#endif
206
John Durkopd62b6782020-11-30 21:06:05 -0800207#if defined(PSA_WANT_ALG_RSA_OAEP)
208#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP)
209#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
210#define MBEDTLS_RSA_C
211#define MBEDTLS_BIGNUM_C
212#define MBEDTLS_OID_C
213#define MBEDTLS_PKCS1_V21
John Durkopd62b6782020-11-30 21:06:05 -0800214#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP */
215#endif /* PSA_WANT_ALG_RSA_OAEP */
216
217#if defined(PSA_WANT_ALG_RSA_PKCS1V15_CRYPT)
218#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT)
219#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
220#define MBEDTLS_RSA_C
221#define MBEDTLS_BIGNUM_C
222#define MBEDTLS_OID_C
223#define MBEDTLS_PKCS1_V15
224#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT */
225#endif /* PSA_WANT_ALG_RSA_PKCS1V15_CRYPT */
226
227#if defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
228#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN)
229#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
230#define MBEDTLS_RSA_C
231#define MBEDTLS_BIGNUM_C
232#define MBEDTLS_OID_C
233#define MBEDTLS_PKCS1_V15
John Durkopd62b6782020-11-30 21:06:05 -0800234#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN */
235#endif /* PSA_WANT_ALG_RSA_PKCS1V15_SIGN */
236
237#if defined(PSA_WANT_ALG_RSA_PSS)
238#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PSS)
239#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
240#define MBEDTLS_RSA_C
241#define MBEDTLS_BIGNUM_C
242#define MBEDTLS_OID_C
243#define MBEDTLS_PKCS1_V21
John Durkopd62b6782020-11-30 21:06:05 -0800244#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PSS */
245#endif /* PSA_WANT_ALG_RSA_PSS */
246
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100247#if defined(PSA_WANT_ALG_SHA_1) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_1)
248#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
249#define MBEDTLS_SHA1_C
250#endif
251
252#if defined(PSA_WANT_ALG_SHA_224) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_224)
253#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200254#define MBEDTLS_SHA224_C
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100255#endif
256
257#if defined(PSA_WANT_ALG_SHA_256) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_256)
258#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
259#define MBEDTLS_SHA256_C
260#endif
261
262#if defined(PSA_WANT_ALG_SHA_384) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_384)
263#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200264#define MBEDTLS_SHA384_C
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100265#endif
266
267#if defined(PSA_WANT_ALG_SHA_512) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_512)
268#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
269#define MBEDTLS_SHA512_C
270#endif
271
John Durkop07cc04a2020-11-16 22:08:34 -0800272#if defined(PSA_WANT_ALG_TLS12_PRF)
273#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF)
John Durkopd62b6782020-11-30 21:06:05 -0800274#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
John Durkop07cc04a2020-11-16 22:08:34 -0800275#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF */
276#endif /* PSA_WANT_ALG_TLS12_PRF */
277
278#if defined(PSA_WANT_ALG_TLS12_PSK_TO_MS)
279#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS)
John Durkopd62b6782020-11-30 21:06:05 -0800280#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
John Durkop07cc04a2020-11-16 22:08:34 -0800281#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS */
282#endif /* PSA_WANT_ALG_TLS12_PSK_TO_MS */
283
Andrzej Kurek08d34b82022-07-29 10:00:16 -0400284#if defined(PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS)
285#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_ECJPAKE_TO_PMS)
286#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_ECJPAKE_TO_PMS 1
287#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_ECJPAKE_TO_PMS */
288#endif /* PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS */
289
John Durkop07cc04a2020-11-16 22:08:34 -0800290#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR)
291#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR)
John Durkopd62b6782020-11-30 21:06:05 -0800292#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR 1
John Durkop07cc04a2020-11-16 22:08:34 -0800293#define MBEDTLS_ECP_C
294#define MBEDTLS_BIGNUM_C
295#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR */
296#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR */
297
Przemek Stekiel6d85afa2023-04-28 11:42:17 +0200298#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR)
299#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR)
300#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR 1
Przemek Stekiel84ee3e22022-12-01 14:22:34 +0100301#define MBEDTLS_DHM_C
302#define MBEDTLS_BIGNUM_C
Przemek Stekiel6d85afa2023-04-28 11:42:17 +0200303#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR */
304#endif /* PSA_WANT_KEY_TYPE_DH_KEY_PAIR */
Przemek Stekiel84ee3e22022-12-01 14:22:34 +0100305
John Durkop07cc04a2020-11-16 22:08:34 -0800306#if defined(PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY)
307#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800308#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
John Durkop07cc04a2020-11-16 22:08:34 -0800309#define MBEDTLS_ECP_C
310#define MBEDTLS_BIGNUM_C
311#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY */
312#endif /* PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY */
313
Przemek Stekiel6d85afa2023-04-28 11:42:17 +0200314#if defined(PSA_WANT_KEY_TYPE_DH_PUBLIC_KEY)
315#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_PUBLIC_KEY)
316#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY 1
Przemek Stekiel87d9a4a2022-12-15 13:22:11 +0100317#define MBEDTLS_DHM_C
318#define MBEDTLS_BIGNUM_C
Przemek Stekiel6d85afa2023-04-28 11:42:17 +0200319#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_PUBLIC_KEY */
320#endif /* PSA_WANT_KEY_TYPE_DH_PUBLIC_KEY */
Przemek Stekiel87d9a4a2022-12-15 13:22:11 +0100321
John Durkop9814fa22020-11-04 12:28:15 -0800322#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR)
John Durkop0e005192020-10-31 22:06:54 -0700323#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR)
John Durkopd62b6782020-11-30 21:06:05 -0800324#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR 1
John Durkop0e005192020-10-31 22:06:54 -0700325#define MBEDTLS_RSA_C
326#define MBEDTLS_BIGNUM_C
327#define MBEDTLS_OID_C
328#define MBEDTLS_GENPRIME
John Durkop07cc04a2020-11-16 22:08:34 -0800329#define MBEDTLS_PK_PARSE_C
330#define MBEDTLS_PK_WRITE_C
331#define MBEDTLS_PK_C
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200332#define MBEDTLS_ASN1_PARSE_C
333#define MBEDTLS_ASN1_WRITE_C
John Durkop0e005192020-10-31 22:06:54 -0700334#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR */
John Durkop9814fa22020-11-04 12:28:15 -0800335#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR */
336
337#if defined(PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkop0e005192020-10-31 22:06:54 -0700338#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800339#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
John Durkop0e005192020-10-31 22:06:54 -0700340#define MBEDTLS_RSA_C
341#define MBEDTLS_BIGNUM_C
342#define MBEDTLS_OID_C
John Durkop07cc04a2020-11-16 22:08:34 -0800343#define MBEDTLS_PK_PARSE_C
344#define MBEDTLS_PK_WRITE_C
345#define MBEDTLS_PK_C
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200346#define MBEDTLS_ASN1_PARSE_C
347#define MBEDTLS_ASN1_WRITE_C
John Durkop0e005192020-10-31 22:06:54 -0700348#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkop9814fa22020-11-04 12:28:15 -0800349#endif /* PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkopd0321952020-10-29 21:37:36 -0700350
David Brownb781f752021-02-08 15:44:52 -0700351/* If any of the block modes are requested that don't have an
352 * associated HW assist, define PSA_HAVE_SOFT_BLOCK_MODE for checking
353 * in the block cipher key types. */
354#if (defined(PSA_WANT_ALG_CTR) && !defined(MBEDTLS_PSA_ACCEL_ALG_CTR)) || \
Bence Szépkúti7921cce2021-02-17 11:46:50 +0100355 (defined(PSA_WANT_ALG_CFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_CFB)) || \
David Brownb781f752021-02-08 15:44:52 -0700356 (defined(PSA_WANT_ALG_OFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_OFB)) || \
David Brownb781f752021-02-08 15:44:52 -0700357 defined(PSA_WANT_ALG_ECB_NO_PADDING) || \
358 (defined(PSA_WANT_ALG_CBC_NO_PADDING) && \
Gilles Peskine449bd832023-01-11 14:50:10 +0100359 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING)) || \
David Brownb781f752021-02-08 15:44:52 -0700360 (defined(PSA_WANT_ALG_CBC_PKCS7) && \
Gilles Peskine449bd832023-01-11 14:50:10 +0100361 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7)) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100362 (defined(PSA_WANT_ALG_CMAC) && !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC))
David Brownb781f752021-02-08 15:44:52 -0700363#define PSA_HAVE_SOFT_BLOCK_MODE 1
364#endif
365
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100366#if (defined(PSA_WANT_ALG_GCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_GCM)) || \
367 (defined(PSA_WANT_ALG_CCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_CCM))
368#define PSA_HAVE_SOFT_BLOCK_AEAD 1
369#endif
370
David Brown94933082021-01-05 12:03:25 -0700371#if defined(PSA_WANT_KEY_TYPE_AES)
David Browne1f91f02021-02-09 15:56:22 -0700372#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_AES)
373#define PSA_HAVE_SOFT_KEY_TYPE_AES 1
374#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_AES */
375#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100376 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
377 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
David Brown78a429b2021-01-21 09:48:57 -0700378#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700379#define MBEDTLS_AES_C
David Browne1f91f02021-02-09 15:56:22 -0700380#endif /* PSA_HAVE_SOFT_KEY_TYPE_AES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown94933082021-01-05 12:03:25 -0700381#endif /* PSA_WANT_KEY_TYPE_AES */
382
Gilles Peskine09c46da2021-10-08 15:48:16 +0200383#if defined(PSA_WANT_KEY_TYPE_ARIA)
384#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA)
385#define PSA_HAVE_SOFT_KEY_TYPE_ARIA 1
386#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA */
387#if defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
388 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
389 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
390#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
391#define MBEDTLS_ARIA_C
392#endif /* PSA_HAVE_SOFT_KEY_TYPE_ARIA || PSA_HAVE_SOFT_BLOCK_MODE */
393#endif /* PSA_WANT_KEY_TYPE_ARIA */
394
David Brown686e6e82021-01-05 12:03:25 -0700395#if defined(PSA_WANT_KEY_TYPE_CAMELLIA)
David Browne1f91f02021-02-09 15:56:22 -0700396#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA)
397#define PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA 1
398#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA */
399#if defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100400 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
401 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
David Brown78a429b2021-01-21 09:48:57 -0700402#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700403#define MBEDTLS_CAMELLIA_C
David Browne1f91f02021-02-09 15:56:22 -0700404#endif /* PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown686e6e82021-01-05 12:03:25 -0700405#endif /* PSA_WANT_KEY_TYPE_CAMELLIA */
406
David Brownb65a7f72021-01-15 12:04:09 -0700407#if defined(PSA_WANT_KEY_TYPE_DES)
David Browne1f91f02021-02-09 15:56:22 -0700408#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DES)
409#define PSA_HAVE_SOFT_KEY_TYPE_DES 1
410#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DES */
411#if defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
David Brownb781f752021-02-08 15:44:52 -0700412 defined(PSA_HAVE_SOFT_BLOCK_MODE)
David Brown78a429b2021-01-21 09:48:57 -0700413#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700414#define MBEDTLS_DES_C
David Browne1f91f02021-02-09 15:56:22 -0700415#endif /*PSA_HAVE_SOFT_KEY_TYPE_DES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brownb65a7f72021-01-15 12:04:09 -0700416#endif /* PSA_WANT_KEY_TYPE_DES */
417
David Brownb16727a2021-02-08 16:31:46 -0700418#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
419#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20)
420#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
421#define MBEDTLS_CHACHA20_C
422#endif /*!MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20 */
423#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
424
David Brownf84a0f62021-02-09 15:59:41 -0700425/* If any of the software block ciphers are selected, define
426 * PSA_HAVE_SOFT_BLOCK_CIPHER, which can be used in any of these
427 * situations. */
428#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200429 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
David Brownf84a0f62021-02-09 15:59:41 -0700430 defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
431 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
432#define PSA_HAVE_SOFT_BLOCK_CIPHER 1
433#endif
434
David Brown99844272021-01-15 12:04:47 -0700435#if defined(PSA_WANT_ALG_STREAM_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700436#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brown99844272021-01-15 12:04:47 -0700437#endif /* PSA_WANT_ALG_STREAM_CIPHER */
438
Ronald Crond85e98d2021-03-25 15:32:32 +0100439#if defined(PSA_WANT_ALG_CBC_MAC)
440#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_MAC)
441#error "CBC-MAC is not yet supported via the PSA API in Mbed TLS."
442#define MBEDTLS_PSA_BUILTIN_ALG_CBC_MAC 1
443#endif /* !MBEDTLS_PSA_ACCEL_ALG_CBC_MAC */
444#endif /* PSA_WANT_ALG_CBC_MAC */
445
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100446#if defined(PSA_WANT_ALG_CMAC)
447#if !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC) || \
448 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
449#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
450#define MBEDTLS_CMAC_C
451#endif /* !MBEDTLS_PSA_ACCEL_ALG_CMAC */
452#endif /* PSA_WANT_ALG_CMAC */
453
David Brown99844272021-01-15 12:04:47 -0700454#if defined(PSA_WANT_ALG_CTR)
David Brown4b9ec7a2021-02-05 12:47:08 -0700455#if !defined(MBEDTLS_PSA_ACCEL_ALG_CTR) || \
David Brownf84a0f62021-02-09 15:59:41 -0700456 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700457#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700458#define MBEDTLS_CIPHER_MODE_CTR
David Brown4b9ec7a2021-02-05 12:47:08 -0700459#endif
David Brown99844272021-01-15 12:04:47 -0700460#endif /* PSA_WANT_ALG_CTR */
461
462#if defined(PSA_WANT_ALG_CFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700463#if !defined(MBEDTLS_PSA_ACCEL_ALG_CFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700464 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700465#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700466#define MBEDTLS_CIPHER_MODE_CFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700467#endif
David Brown99844272021-01-15 12:04:47 -0700468#endif /* PSA_WANT_ALG_CFB */
469
470#if defined(PSA_WANT_ALG_OFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700471#if !defined(MBEDTLS_PSA_ACCEL_ALG_OFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700472 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700473#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700474#define MBEDTLS_CIPHER_MODE_OFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700475#endif
David Brown99844272021-01-15 12:04:47 -0700476#endif /* PSA_WANT_ALG_OFB */
477
Gilles Peskine7a2e83b2022-03-17 11:09:23 +0100478#if defined(PSA_WANT_ALG_ECB_NO_PADDING) && \
479 !defined(MBEDTLS_PSA_ACCEL_ALG_ECB_NO_PADDING)
David Brownbe380c12021-02-11 10:55:48 -0700480#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700481#endif
482
David Brown12f45f92021-01-26 11:50:36 -0700483#if defined(PSA_WANT_ALG_CBC_NO_PADDING)
David Brown4b9ec7a2021-02-05 12:47:08 -0700484#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING) || \
David Brownfc468182021-02-09 16:23:34 -0700485 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700486#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700487#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown4b9ec7a2021-02-05 12:47:08 -0700488#endif
David Brown12f45f92021-01-26 11:50:36 -0700489#endif /* PSA_WANT_ALG_CBC_NO_PADDING */
490
491#if defined(PSA_WANT_ALG_CBC_PKCS7)
David Brown4b9ec7a2021-02-05 12:47:08 -0700492#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7) || \
David Brownfc468182021-02-09 16:23:34 -0700493 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700494#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700495#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brownfc468182021-02-09 16:23:34 -0700496#define MBEDTLS_CIPHER_PADDING_PKCS7
David Brown4b9ec7a2021-02-05 12:47:08 -0700497#endif
David Brown12f45f92021-01-26 11:50:36 -0700498#endif /* PSA_WANT_ALG_CBC_PKCS7 */
499
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100500#if defined(PSA_WANT_ALG_CCM)
501#if !defined(MBEDTLS_PSA_ACCEL_ALG_CCM) || \
502 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200503 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100504 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
505#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100506#define MBEDTLS_PSA_BUILTIN_ALG_CCM_STAR_NO_TAG 1
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100507#define MBEDTLS_CCM_C
508#endif
509#endif /* PSA_WANT_ALG_CCM */
510
511#if defined(PSA_WANT_ALG_GCM)
512#if !defined(MBEDTLS_PSA_ACCEL_ALG_GCM) || \
513 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200514 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100515 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
516#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
517#define MBEDTLS_GCM_C
518#endif
519#endif /* PSA_WANT_ALG_GCM */
520
David Brownac4fa072021-02-08 16:47:35 -0700521#if defined(PSA_WANT_ALG_CHACHA20_POLY1305)
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200522#if !defined(MBEDTLS_PSA_ACCEL_ALG_CHACHA20_POLY1305)
David Brownac4fa072021-02-08 16:47:35 -0700523#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
524#define MBEDTLS_CHACHAPOLY_C
Summer Qin9f2596f2022-06-17 12:50:32 +0800525#define MBEDTLS_CHACHA20_C
526#define MBEDTLS_POLY1305_C
David Brown86730a82021-02-09 16:24:11 -0700527#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700528#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200529#endif /* !MBEDTLS_PSA_ACCEL_ALG_CHACHA20_POLY1305 */
David Brownac4fa072021-02-08 16:47:35 -0700530#endif /* PSA_WANT_ALG_CHACHA20_POLY1305 */
531
David Browneed74df2021-03-15 15:53:57 -0600532#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_256)
533#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256)
534#define MBEDTLS_ECP_DP_BP256R1_ENABLED
535#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
536#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256 */
537#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_256 */
538
539#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_384)
540#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384)
541#define MBEDTLS_ECP_DP_BP384R1_ENABLED
542#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
543#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384 */
544#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_384 */
545
546#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_512)
547#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512)
548#define MBEDTLS_ECP_DP_BP512R1_ENABLED
549#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
550#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512 */
551#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_512 */
552
553#if defined(PSA_WANT_ECC_MONTGOMERY_255)
554#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255)
555#define MBEDTLS_ECP_DP_CURVE25519_ENABLED
556#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
557#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255 */
558#endif /* PSA_WANT_ECC_MONTGOMERY_255 */
559
560#if defined(PSA_WANT_ECC_MONTGOMERY_448)
561#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448)
562#define MBEDTLS_ECP_DP_CURVE448_ENABLED
563#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
564#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448 */
565#endif /* PSA_WANT_ECC_MONTGOMERY_448 */
566
David Brownc7b9b2b2021-02-19 21:05:52 -0700567#if defined(PSA_WANT_ECC_SECP_R1_192)
568#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192)
569#define MBEDTLS_ECP_DP_SECP192R1_ENABLED
570#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
571#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192 */
572#endif /* PSA_WANT_ECC_SECP_R1_192 */
573
574#if defined(PSA_WANT_ECC_SECP_R1_224)
575#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224)
576#define MBEDTLS_ECP_DP_SECP224R1_ENABLED
577#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
578#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224 */
579#endif /* PSA_WANT_ECC_SECP_R1_224 */
580
581#if defined(PSA_WANT_ECC_SECP_R1_256)
582#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256)
583#define MBEDTLS_ECP_DP_SECP256R1_ENABLED
584#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
585#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256 */
586#endif /* PSA_WANT_ECC_SECP_R1_256 */
587
588#if defined(PSA_WANT_ECC_SECP_R1_384)
589#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384)
590#define MBEDTLS_ECP_DP_SECP384R1_ENABLED
591#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
592#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384 */
593#endif /* PSA_WANT_ECC_SECP_R1_384 */
594
595#if defined(PSA_WANT_ECC_SECP_R1_521)
596#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521)
597#define MBEDTLS_ECP_DP_SECP521R1_ENABLED
598#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
599#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521 */
600#endif /* PSA_WANT_ECC_SECP_R1_521 */
601
602#if defined(PSA_WANT_ECC_SECP_K1_192)
603#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192)
David Brown8de143e2021-02-19 14:08:00 -0700604#define MBEDTLS_ECP_DP_SECP192K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700605#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
606#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192 */
607#endif /* PSA_WANT_ECC_SECP_K1_192 */
David Brown8de143e2021-02-19 14:08:00 -0700608
David Brownc7b9b2b2021-02-19 21:05:52 -0700609#if defined(PSA_WANT_ECC_SECP_K1_224)
610#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224)
Ronald Crone1f55162021-03-25 15:09:47 +0100611/*
612 * SECP224K1 is buggy via the PSA API in Mbed TLS
Dave Rodgman017a1992022-03-31 14:07:01 +0100613 * (https://github.com/Mbed-TLS/mbedtls/issues/3541).
Ronald Crone1f55162021-03-25 15:09:47 +0100614 */
615#error "SECP224K1 is buggy via the PSA API in Mbed TLS."
David Brown8de143e2021-02-19 14:08:00 -0700616#define MBEDTLS_ECP_DP_SECP224K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700617#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
618#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224 */
619#endif /* PSA_WANT_ECC_SECP_K1_224 */
David Brown8de143e2021-02-19 14:08:00 -0700620
David Brownc7b9b2b2021-02-19 21:05:52 -0700621#if defined(PSA_WANT_ECC_SECP_K1_256)
622#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256)
David Brown9b178de2021-03-10 13:14:48 -0700623#define MBEDTLS_ECP_DP_SECP256K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700624#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
625#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256 */
626#endif /* PSA_WANT_ECC_SECP_K1_256 */
David Brown8de143e2021-02-19 14:08:00 -0700627
Gilles Peskine1231eb52021-04-19 22:24:23 +0200628
629
630/****************************************************************/
631/* Infer PSA requirements from Mbed TLS capabilities */
632/****************************************************************/
633
John Durkop714e3a12020-09-29 22:07:04 -0700634#else /* MBEDTLS_PSA_CRYPTO_CONFIG */
635
636/*
637 * Ensure PSA_WANT_* defines are setup properly if MBEDTLS_PSA_CRYPTO_CONFIG
638 * is not defined
639 */
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100640
Ronald Cron3d471812021-03-18 13:40:31 +0100641#if defined(MBEDTLS_CCM_C)
642#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100643#define MBEDTLS_PSA_BUILTIN_ALG_CCM_STAR_NO_TAG 1
Ronald Cron3d471812021-03-18 13:40:31 +0100644#define PSA_WANT_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100645#define PSA_WANT_ALG_CCM_STAR_NO_TAG 1
Ronald Cron3d471812021-03-18 13:40:31 +0100646#endif /* MBEDTLS_CCM_C */
647
648#if defined(MBEDTLS_CMAC_C)
649#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
650#define PSA_WANT_ALG_CMAC 1
651#endif /* MBEDTLS_CMAC_C */
652
John Durkopd62b6782020-11-30 21:06:05 -0800653#if defined(MBEDTLS_ECDH_C)
654#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
655#define PSA_WANT_ALG_ECDH 1
656#endif /* MBEDTLS_ECDH_C */
657
658#if defined(MBEDTLS_ECDSA_C)
659#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
660#define PSA_WANT_ALG_ECDSA 1
Gilles Peskine1231eb52021-04-19 22:24:23 +0200661#define PSA_WANT_ALG_ECDSA_ANY 1
John Durkopd62b6782020-11-30 21:06:05 -0800662
663// Only add in DETERMINISTIC support if ECDSA is also enabled
664#if defined(MBEDTLS_ECDSA_DETERMINISTIC)
665#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
666#define PSA_WANT_ALG_DETERMINISTIC_ECDSA 1
667#endif /* MBEDTLS_ECDSA_DETERMINISTIC */
668
669#endif /* MBEDTLS_ECDSA_C */
670
671#if defined(MBEDTLS_ECP_C)
672#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR 1
673#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR 1
674#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
675#define PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY 1
676#endif /* MBEDTLS_ECP_C */
677
Przemek Stekiel84ee3e22022-12-01 14:22:34 +0100678#if defined(MBEDTLS_DHM_C)
Przemek Stekiel6d85afa2023-04-28 11:42:17 +0200679#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR 1
680#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR 1
681#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY 1
682#define PSA_WANT_KEY_TYPE_DH_PUBLIC_KEY 1
Przemek Stekiel84ee3e22022-12-01 14:22:34 +0100683#define MBEDTLS_PSA_BUILTIN_ALG_FFDH 1
684#define PSA_WANT_ALG_FFDH 1
685#endif /* MBEDTLS_DHM_C */
686
Ronald Cron3d471812021-03-18 13:40:31 +0100687#if defined(MBEDTLS_GCM_C)
688#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
689#define PSA_WANT_ALG_GCM 1
690#endif /* MBEDTLS_GCM_C */
691
Przemek Stekiel18399d82022-06-27 13:34:50 +0200692/* Enable PSA HKDF algorithm if mbedtls HKDF is supported.
693 * PSA HKDF EXTRACT and PSA HKDF EXPAND have minimal cost when
694 * PSA HKDF is enabled, so enable both algorithms together
695 * with PSA HKDF. */
John Durkopd62b6782020-11-30 21:06:05 -0800696#if defined(MBEDTLS_HKDF_C)
697#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
698#define PSA_WANT_ALG_HMAC 1
699#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
700#define PSA_WANT_ALG_HKDF 1
Przemek Stekielb33bd192022-06-21 09:58:51 +0200701#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXTRACT 1
702#define PSA_WANT_ALG_HKDF_EXTRACT 1
703#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXPAND 1
704#define PSA_WANT_ALG_HKDF_EXPAND 1
John Durkopd62b6782020-11-30 21:06:05 -0800705#endif /* MBEDTLS_HKDF_C */
706
John Durkopd62b6782020-11-30 21:06:05 -0800707#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
708#define PSA_WANT_ALG_HMAC 1
Gilles Peskine47a89332021-01-12 00:00:15 +0100709#define PSA_WANT_KEY_TYPE_HMAC
Andrzej Kurek65bf73e2022-08-31 14:59:31 -0400710
711#if defined(MBEDTLS_MD_C)
John Durkopd62b6782020-11-30 21:06:05 -0800712#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
713#define PSA_WANT_ALG_TLS12_PRF 1
714#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
715#define PSA_WANT_ALG_TLS12_PSK_TO_MS 1
716#endif /* MBEDTLS_MD_C */
717
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100718#if defined(MBEDTLS_MD5_C)
719#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
720#define PSA_WANT_ALG_MD5 1
721#endif
722
Neil Armstrong637d0a02022-05-25 11:28:22 +0200723#if defined(MBEDTLS_ECJPAKE_C)
724#define MBEDTLS_PSA_BUILTIN_PAKE 1
Neil Armstronga557cb82022-06-10 08:58:32 +0200725#define MBEDTLS_PSA_BUILTIN_ALG_JPAKE 1
726#define PSA_WANT_ALG_JPAKE 1
Neil Armstrong637d0a02022-05-25 11:28:22 +0200727#endif
728
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100729#if defined(MBEDTLS_RIPEMD160_C)
730#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
731#define PSA_WANT_ALG_RIPEMD160 1
732#endif
733
John Durkopd62b6782020-11-30 21:06:05 -0800734#if defined(MBEDTLS_RSA_C)
735#if defined(MBEDTLS_PKCS1_V15)
736#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
737#define PSA_WANT_ALG_RSA_PKCS1V15_CRYPT 1
738#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
739#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN 1
Gilles Peskine1231eb52021-04-19 22:24:23 +0200740#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW 1
Yuto Takano7828ca22021-08-10 11:26:15 +0100741#endif /* MBEDTLS_PKCS1_V15 */
John Durkopd62b6782020-11-30 21:06:05 -0800742#if defined(MBEDTLS_PKCS1_V21)
743#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
744#define PSA_WANT_ALG_RSA_OAEP 1
745#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
746#define PSA_WANT_ALG_RSA_PSS 1
747#endif /* MBEDTLS_PKCS1_V21 */
748#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR 1
749#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR 1
750#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
751#define PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY 1
752#endif /* MBEDTLS_RSA_C */
753
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100754#if defined(MBEDTLS_SHA1_C)
755#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
756#define PSA_WANT_ALG_SHA_1 1
757#endif
758
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200759#if defined(MBEDTLS_SHA224_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100760#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
Gilles Peskineb65db072021-01-12 00:00:53 +0100761#define PSA_WANT_ALG_SHA_224 1
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200762#endif
763
764#if defined(MBEDTLS_SHA256_C)
765#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100766#define PSA_WANT_ALG_SHA_256 1
767#endif
768
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200769#if defined(MBEDTLS_SHA384_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100770#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
771#define PSA_WANT_ALG_SHA_384 1
772#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200773
774#if defined(MBEDTLS_SHA512_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100775#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
776#define PSA_WANT_ALG_SHA_512 1
777#endif
778
David Brown94933082021-01-05 12:03:25 -0700779#if defined(MBEDTLS_AES_C)
780#define PSA_WANT_KEY_TYPE_AES 1
David Brownda7dbb72021-01-26 11:44:15 -0700781#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700782#endif
783
Gilles Peskine09c46da2021-10-08 15:48:16 +0200784#if defined(MBEDTLS_ARIA_C)
785#define PSA_WANT_KEY_TYPE_ARIA 1
786#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
787#endif
788
David Brown686e6e82021-01-05 12:03:25 -0700789#if defined(MBEDTLS_CAMELLIA_C)
790#define PSA_WANT_KEY_TYPE_CAMELLIA 1
David Brownda7dbb72021-01-26 11:44:15 -0700791#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700792#endif
793
David Brownb65a7f72021-01-15 12:04:09 -0700794#if defined(MBEDTLS_DES_C)
795#define PSA_WANT_KEY_TYPE_DES 1
David Brownda7dbb72021-01-26 11:44:15 -0700796#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700797#endif
798
Andrzej Kurekd60907b2022-09-14 10:02:30 -0400799#if defined(MBEDTLS_PSA_BUILTIN_ALG_SHA_256)
800#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_ECJPAKE_TO_PMS 1
801#define PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS 1
802#endif
803
David Brownb16727a2021-02-08 16:31:46 -0700804#if defined(MBEDTLS_CHACHA20_C)
805#define PSA_WANT_KEY_TYPE_CHACHA20 1
806#define PSA_WANT_ALG_STREAM_CIPHER 1
807#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
808#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brownac4fa072021-02-08 16:47:35 -0700809#if defined(MBEDTLS_CHACHAPOLY_C)
810#define PSA_WANT_ALG_CHACHA20_POLY1305 1
David Brown86730a82021-02-09 16:24:11 -0700811#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700812#endif
David Brownb16727a2021-02-08 16:31:46 -0700813#endif
814
David Brown99844272021-01-15 12:04:47 -0700815#if defined(MBEDTLS_CIPHER_MODE_CBC)
David Brown10cb81c2021-02-09 16:10:29 -0700816#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700817#define PSA_WANT_ALG_CBC_NO_PADDING 1
818#if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
David Brown12f45f92021-01-26 11:50:36 -0700819#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brown99844272021-01-15 12:04:47 -0700820#define PSA_WANT_ALG_CBC_PKCS7 1
821#endif
822#endif
823
824#if defined(MBEDTLS_AES_C) || defined(MBEDTLS_DES_C) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200825 defined(MBEDTLS_ARIA_C) || defined(MBEDTLS_CAMELLIA_C)
David Brown10cb81c2021-02-09 16:10:29 -0700826#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700827#define PSA_WANT_ALG_ECB_NO_PADDING 1
828#endif
829
830#if defined(MBEDTLS_CIPHER_MODE_CFB)
David Brown12f45f92021-01-26 11:50:36 -0700831#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700832#define PSA_WANT_ALG_CFB 1
833#endif
834
835#if defined(MBEDTLS_CIPHER_MODE_CTR)
David Brown12f45f92021-01-26 11:50:36 -0700836#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700837#define PSA_WANT_ALG_CTR 1
838#endif
839
840#if defined(MBEDTLS_CIPHER_MODE_OFB)
David Brown12f45f92021-01-26 11:50:36 -0700841#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700842#define PSA_WANT_ALG_OFB 1
843#endif
844
David Browneed74df2021-03-15 15:53:57 -0600845#if defined(MBEDTLS_ECP_DP_BP256R1_ENABLED)
846#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
847#define PSA_WANT_ECC_BRAINPOOL_P_R1_256
848#endif
849
850#if defined(MBEDTLS_ECP_DP_BP384R1_ENABLED)
851#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
852#define PSA_WANT_ECC_BRAINPOOL_P_R1_384
853#endif
854
855#if defined(MBEDTLS_ECP_DP_BP512R1_ENABLED)
856#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
857#define PSA_WANT_ECC_BRAINPOOL_P_R1_512
858#endif
859
860#if defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED)
861#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
862#define PSA_WANT_ECC_MONTGOMERY_255
863#endif
864
Archanaef6aa5c2021-06-08 11:40:10 +0530865#if defined(MBEDTLS_ECP_DP_CURVE448_ENABLED)
David Browneed74df2021-03-15 15:53:57 -0600866#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
867#define PSA_WANT_ECC_MONTGOMERY_448
868#endif
869
David Brown8de143e2021-02-19 14:08:00 -0700870#if defined(MBEDTLS_ECP_DP_SECP192R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700871#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
872#define PSA_WANT_ECC_SECP_R1_192
David Brown8de143e2021-02-19 14:08:00 -0700873#endif
874
875#if defined(MBEDTLS_ECP_DP_SECP224R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700876#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
877#define PSA_WANT_ECC_SECP_R1_224
David Brown8de143e2021-02-19 14:08:00 -0700878#endif
879
880#if defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700881#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
882#define PSA_WANT_ECC_SECP_R1_256
David Brown8de143e2021-02-19 14:08:00 -0700883#endif
884
885#if defined(MBEDTLS_ECP_DP_SECP384R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700886#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
887#define PSA_WANT_ECC_SECP_R1_384
David Brown8de143e2021-02-19 14:08:00 -0700888#endif
889
890#if defined(MBEDTLS_ECP_DP_SECP521R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700891#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
892#define PSA_WANT_ECC_SECP_R1_521
David Brown8de143e2021-02-19 14:08:00 -0700893#endif
894
895#if defined(MBEDTLS_ECP_DP_SECP192K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700896#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
897#define PSA_WANT_ECC_SECP_K1_192
David Brown8de143e2021-02-19 14:08:00 -0700898#endif
899
Dave Rodgman017a1992022-03-31 14:07:01 +0100900/* SECP224K1 is buggy via the PSA API (https://github.com/Mbed-TLS/mbedtls/issues/3541) */
Gilles Peskine39841302021-03-23 12:06:45 +0100901#if 0 && defined(MBEDTLS_ECP_DP_SECP224K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700902#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
903#define PSA_WANT_ECC_SECP_K1_224
David Brown8de143e2021-02-19 14:08:00 -0700904#endif
905
David Brown9b178de2021-03-10 13:14:48 -0700906#if defined(MBEDTLS_ECP_DP_SECP256K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700907#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
908#define PSA_WANT_ECC_SECP_K1_256
David Brown8de143e2021-02-19 14:08:00 -0700909#endif
910
John Durkop2dfaf9c2020-09-24 04:30:10 -0700911#endif /* MBEDTLS_PSA_CRYPTO_CONFIG */
John Durkopd8959392020-09-20 23:09:17 -0700912
Gilles Peskine60b29fe2021-02-16 14:06:50 +0100913/* These features are always enabled. */
914#define PSA_WANT_KEY_TYPE_DERIVE 1
Gilles Peskinebba26302022-12-15 23:25:17 +0100915#define PSA_WANT_KEY_TYPE_PASSWORD 1
916#define PSA_WANT_KEY_TYPE_PASSWORD_HASH 1
Gilles Peskine60b29fe2021-02-16 14:06:50 +0100917#define PSA_WANT_KEY_TYPE_RAW_DATA 1
918
John Durkop6e33dbe2020-09-17 21:15:13 -0700919#ifdef __cplusplus
920}
921#endif
922
923#endif /* MBEDTLS_CONFIG_PSA_H */