blob: c52acc57a2999bf0d0427914b45339953d95f646 [file] [log] [blame]
John Durkop6e33dbe2020-09-17 21:15:13 -07001/**
2 * \file mbedtls/config_psa.h
3 * \brief PSA crypto configuration options (set of defines)
4 *
John Durkop34818822020-10-12 21:36:22 -07005 * This set of compile-time options takes settings defined in
Bence Szépkútibb0cfeb2021-05-28 09:42:25 +02006 * include/mbedtls/mbedtls_config.h and include/psa/crypto_config.h and uses
John Durkop34818822020-10-12 21:36:22 -07007 * those definitions to define symbols used in the library code.
8 *
9 * Users and integrators should not edit this file, please edit
Bence Szépkútibb0cfeb2021-05-28 09:42:25 +020010 * include/mbedtls/mbedtls_config.h for MBETLS_XXX settings or
John Durkop34818822020-10-12 21:36:22 -070011 * include/psa/crypto_config.h for PSA_WANT_XXX settings.
John Durkop6e33dbe2020-09-17 21:15:13 -070012 */
13/*
14 * Copyright The Mbed TLS Contributors
15 * SPDX-License-Identifier: Apache-2.0
16 *
17 * Licensed under the Apache License, Version 2.0 (the "License"); you may
18 * not use this file except in compliance with the License.
19 * You may obtain a copy of the License at
20 *
21 * http://www.apache.org/licenses/LICENSE-2.0
22 *
23 * Unless required by applicable law or agreed to in writing, software
24 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
25 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
26 * See the License for the specific language governing permissions and
27 * limitations under the License.
28 */
29
30#ifndef MBEDTLS_CONFIG_PSA_H
31#define MBEDTLS_CONFIG_PSA_H
32
John Durkop714e3a12020-09-29 22:07:04 -070033#if defined(MBEDTLS_PSA_CRYPTO_CONFIG)
John Durkop6e33dbe2020-09-17 21:15:13 -070034#include "psa/crypto_config.h"
John Durkop76228ac2020-09-29 22:33:49 -070035#endif /* defined(MBEDTLS_PSA_CRYPTO_CONFIG) */
John Durkop6e33dbe2020-09-17 21:15:13 -070036
37#ifdef __cplusplus
38extern "C" {
39#endif
40
Gilles Peskine1231eb52021-04-19 22:24:23 +020041
42
43/****************************************************************/
44/* De facto synonyms */
45/****************************************************************/
46
47#if defined(PSA_WANT_ALG_ECDSA_ANY) && !defined(PSA_WANT_ALG_ECDSA)
48#define PSA_WANT_ALG_ECDSA PSA_WANT_ALG_ECDSA_ANY
49#elif !defined(PSA_WANT_ALG_ECDSA_ANY) && defined(PSA_WANT_ALG_ECDSA)
50#define PSA_WANT_ALG_ECDSA_ANY PSA_WANT_ALG_ECDSA
51#endif
52
Gilles Peskine08622b62022-03-15 16:40:59 +010053#if defined(PSA_WANT_ALG_CCM_STAR_NO_TAG) && !defined(PSA_WANT_ALG_CCM)
54#define PSA_WANT_ALG_CCM PSA_WANT_ALG_CCM_STAR_NO_TAG
55#elif !defined(PSA_WANT_ALG_CCM_STAR_NO_TAG) && defined(PSA_WANT_ALG_CCM)
56#define PSA_WANT_ALG_CCM_STAR_NO_TAG PSA_WANT_ALG_CCM
57#endif
58
Gilles Peskine1231eb52021-04-19 22:24:23 +020059#if defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW) && !defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
60#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW
61#elif !defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW) && defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
62#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW PSA_WANT_ALG_RSA_PKCS1V15_SIGN
63#endif
64
Gilles Peskine44c96aa2021-10-04 18:33:56 +020065#if defined(PSA_WANT_ALG_RSA_PSS_ANY_SALT) && !defined(PSA_WANT_ALG_RSA_PSS)
66#define PSA_WANT_ALG_RSA_PSS PSA_WANT_ALG_RSA_PSS_ANY_SALT
67#elif !defined(PSA_WANT_ALG_RSA_PSS_ANY_SALT) && defined(PSA_WANT_ALG_RSA_PSS)
68#define PSA_WANT_ALG_RSA_PSS_ANY_SALT PSA_WANT_ALG_RSA_PSS
69#endif
70
Gilles Peskine1231eb52021-04-19 22:24:23 +020071
72
73/****************************************************************/
74/* Require built-in implementations based on PSA requirements */
75/****************************************************************/
76
John Durkop2dfaf9c2020-09-24 04:30:10 -070077#if defined(MBEDTLS_PSA_CRYPTO_CONFIG)
John Durkopd8959392020-09-20 23:09:17 -070078
John Durkopd62b6782020-11-30 21:06:05 -080079#if defined(PSA_WANT_ALG_DETERMINISTIC_ECDSA)
80#if !defined(MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA)
81#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
82#define MBEDTLS_ECDSA_DETERMINISTIC
83#define MBEDTLS_ECDSA_C
84#define MBEDTLS_HMAC_DRBG_C
85#define MBEDTLS_MD_C
86#endif /* !MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA */
87#endif /* PSA_WANT_ALG_DETERMINISTIC_ECDSA */
88
89#if defined(PSA_WANT_ALG_ECDH)
90#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDH)
91#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
92#define MBEDTLS_ECDH_C
93#define MBEDTLS_ECP_C
94#define MBEDTLS_BIGNUM_C
95#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDH */
96#endif /* PSA_WANT_ALG_ECDH */
97
98#if defined(PSA_WANT_ALG_ECDSA)
99#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDSA)
100#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
101#define MBEDTLS_ECDSA_C
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200102#define MBEDTLS_ECP_C
103#define MBEDTLS_BIGNUM_C
104#define MBEDTLS_ASN1_PARSE_C
105#define MBEDTLS_ASN1_WRITE_C
John Durkopd62b6782020-11-30 21:06:05 -0800106#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDSA */
107#endif /* PSA_WANT_ALG_ECDSA */
108
109#if defined(PSA_WANT_ALG_HKDF)
110#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF)
111#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
112#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
113#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF */
114#endif /* PSA_WANT_ALG_HKDF */
115
116#if defined(PSA_WANT_ALG_HMAC)
117#if !defined(MBEDTLS_PSA_ACCEL_ALG_HMAC)
118#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
119#endif /* !MBEDTLS_PSA_ACCEL_ALG_HMAC */
120#endif /* PSA_WANT_ALG_HMAC */
121
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100122#if defined(PSA_WANT_ALG_MD5) && !defined(MBEDTLS_PSA_ACCEL_ALG_MD5)
123#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
124#define MBEDTLS_MD5_C
125#endif
126
127#if defined(PSA_WANT_ALG_RIPEMD160) && !defined(MBEDTLS_PSA_ACCEL_ALG_RIPEMD160)
128#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
129#define MBEDTLS_RIPEMD160_C
130#endif
131
John Durkopd62b6782020-11-30 21:06:05 -0800132#if defined(PSA_WANT_ALG_RSA_OAEP)
133#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP)
134#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
135#define MBEDTLS_RSA_C
136#define MBEDTLS_BIGNUM_C
137#define MBEDTLS_OID_C
138#define MBEDTLS_PKCS1_V21
139#define MBEDTLS_MD_C
140#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP */
141#endif /* PSA_WANT_ALG_RSA_OAEP */
142
143#if defined(PSA_WANT_ALG_RSA_PKCS1V15_CRYPT)
144#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT)
145#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
146#define MBEDTLS_RSA_C
147#define MBEDTLS_BIGNUM_C
148#define MBEDTLS_OID_C
149#define MBEDTLS_PKCS1_V15
150#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT */
151#endif /* PSA_WANT_ALG_RSA_PKCS1V15_CRYPT */
152
153#if defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
154#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN)
155#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
156#define MBEDTLS_RSA_C
157#define MBEDTLS_BIGNUM_C
158#define MBEDTLS_OID_C
159#define MBEDTLS_PKCS1_V15
160#define MBEDTLS_MD_C
161#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN */
162#endif /* PSA_WANT_ALG_RSA_PKCS1V15_SIGN */
163
164#if defined(PSA_WANT_ALG_RSA_PSS)
165#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PSS)
166#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
167#define MBEDTLS_RSA_C
168#define MBEDTLS_BIGNUM_C
169#define MBEDTLS_OID_C
170#define MBEDTLS_PKCS1_V21
171#define MBEDTLS_MD_C
172#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PSS */
173#endif /* PSA_WANT_ALG_RSA_PSS */
174
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100175#if defined(PSA_WANT_ALG_SHA_1) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_1)
176#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
177#define MBEDTLS_SHA1_C
178#endif
179
180#if defined(PSA_WANT_ALG_SHA_224) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_224)
181#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200182#define MBEDTLS_SHA224_C
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100183#endif
184
185#if defined(PSA_WANT_ALG_SHA_256) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_256)
186#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
187#define MBEDTLS_SHA256_C
188#endif
189
190#if defined(PSA_WANT_ALG_SHA_384) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_384)
191#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200192#define MBEDTLS_SHA384_C
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100193#endif
194
195#if defined(PSA_WANT_ALG_SHA_512) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_512)
196#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
197#define MBEDTLS_SHA512_C
198#endif
199
John Durkop07cc04a2020-11-16 22:08:34 -0800200#if defined(PSA_WANT_ALG_TLS12_PRF)
201#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF)
John Durkopd62b6782020-11-30 21:06:05 -0800202#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
John Durkop07cc04a2020-11-16 22:08:34 -0800203#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF */
204#endif /* PSA_WANT_ALG_TLS12_PRF */
205
206#if defined(PSA_WANT_ALG_TLS12_PSK_TO_MS)
207#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS)
John Durkopd62b6782020-11-30 21:06:05 -0800208#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
John Durkop07cc04a2020-11-16 22:08:34 -0800209#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS */
210#endif /* PSA_WANT_ALG_TLS12_PSK_TO_MS */
211
212#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR)
213#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR)
John Durkopd62b6782020-11-30 21:06:05 -0800214#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR 1
John Durkop07cc04a2020-11-16 22:08:34 -0800215#define MBEDTLS_ECP_C
216#define MBEDTLS_BIGNUM_C
217#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR */
218#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR */
219
220#if defined(PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY)
221#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800222#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
John Durkop07cc04a2020-11-16 22:08:34 -0800223#define MBEDTLS_ECP_C
224#define MBEDTLS_BIGNUM_C
225#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY */
226#endif /* PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY */
227
John Durkop9814fa22020-11-04 12:28:15 -0800228#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR)
John Durkop0e005192020-10-31 22:06:54 -0700229#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR)
John Durkopd62b6782020-11-30 21:06:05 -0800230#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR 1
John Durkop0e005192020-10-31 22:06:54 -0700231#define MBEDTLS_RSA_C
232#define MBEDTLS_BIGNUM_C
233#define MBEDTLS_OID_C
234#define MBEDTLS_GENPRIME
John Durkop07cc04a2020-11-16 22:08:34 -0800235#define MBEDTLS_PK_PARSE_C
236#define MBEDTLS_PK_WRITE_C
237#define MBEDTLS_PK_C
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200238#define MBEDTLS_ASN1_PARSE_C
239#define MBEDTLS_ASN1_WRITE_C
John Durkop0e005192020-10-31 22:06:54 -0700240#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR */
John Durkop9814fa22020-11-04 12:28:15 -0800241#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR */
242
243#if defined(PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkop0e005192020-10-31 22:06:54 -0700244#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800245#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
John Durkop0e005192020-10-31 22:06:54 -0700246#define MBEDTLS_RSA_C
247#define MBEDTLS_BIGNUM_C
248#define MBEDTLS_OID_C
John Durkop07cc04a2020-11-16 22:08:34 -0800249#define MBEDTLS_PK_PARSE_C
250#define MBEDTLS_PK_WRITE_C
251#define MBEDTLS_PK_C
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200252#define MBEDTLS_ASN1_PARSE_C
253#define MBEDTLS_ASN1_WRITE_C
John Durkop0e005192020-10-31 22:06:54 -0700254#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkop9814fa22020-11-04 12:28:15 -0800255#endif /* PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkopd0321952020-10-29 21:37:36 -0700256
David Brownb781f752021-02-08 15:44:52 -0700257/* If any of the block modes are requested that don't have an
258 * associated HW assist, define PSA_HAVE_SOFT_BLOCK_MODE for checking
259 * in the block cipher key types. */
260#if (defined(PSA_WANT_ALG_CTR) && !defined(MBEDTLS_PSA_ACCEL_ALG_CTR)) || \
Bence Szépkúti7921cce2021-02-17 11:46:50 +0100261 (defined(PSA_WANT_ALG_CFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_CFB)) || \
David Brownb781f752021-02-08 15:44:52 -0700262 (defined(PSA_WANT_ALG_OFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_OFB)) || \
263 (defined(PSA_WANT_ALG_XTS) && !defined(MBEDTLS_PSA_ACCEL_ALG_XTS)) || \
264 defined(PSA_WANT_ALG_ECB_NO_PADDING) || \
265 (defined(PSA_WANT_ALG_CBC_NO_PADDING) && \
266 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING)) || \
267 (defined(PSA_WANT_ALG_CBC_PKCS7) && \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100268 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7)) || \
269 (defined(PSA_WANT_ALG_CMAC) && !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC))
David Brownb781f752021-02-08 15:44:52 -0700270#define PSA_HAVE_SOFT_BLOCK_MODE 1
271#endif
272
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100273#if (defined(PSA_WANT_ALG_GCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_GCM)) || \
274 (defined(PSA_WANT_ALG_CCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_CCM))
275#define PSA_HAVE_SOFT_BLOCK_AEAD 1
276#endif
277
David Brown94933082021-01-05 12:03:25 -0700278#if defined(PSA_WANT_KEY_TYPE_AES)
David Browne1f91f02021-02-09 15:56:22 -0700279#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_AES)
280#define PSA_HAVE_SOFT_KEY_TYPE_AES 1
281#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_AES */
282#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100283 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
284 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
David Brown78a429b2021-01-21 09:48:57 -0700285#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700286#define MBEDTLS_AES_C
David Browne1f91f02021-02-09 15:56:22 -0700287#endif /* PSA_HAVE_SOFT_KEY_TYPE_AES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown94933082021-01-05 12:03:25 -0700288#endif /* PSA_WANT_KEY_TYPE_AES */
289
Gilles Peskine09c46da2021-10-08 15:48:16 +0200290#if defined(PSA_WANT_KEY_TYPE_ARIA)
291#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA)
292#define PSA_HAVE_SOFT_KEY_TYPE_ARIA 1
293#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA */
294#if defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
295 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
296 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
297#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
298#define MBEDTLS_ARIA_C
299#endif /* PSA_HAVE_SOFT_KEY_TYPE_ARIA || PSA_HAVE_SOFT_BLOCK_MODE */
300#endif /* PSA_WANT_KEY_TYPE_ARIA */
301
David Brown686e6e82021-01-05 12:03:25 -0700302#if defined(PSA_WANT_KEY_TYPE_CAMELLIA)
David Browne1f91f02021-02-09 15:56:22 -0700303#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA)
304#define PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA 1
305#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA */
306#if defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100307 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
308 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
David Brown78a429b2021-01-21 09:48:57 -0700309#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700310#define MBEDTLS_CAMELLIA_C
David Browne1f91f02021-02-09 15:56:22 -0700311#endif /* PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown686e6e82021-01-05 12:03:25 -0700312#endif /* PSA_WANT_KEY_TYPE_CAMELLIA */
313
David Brownb65a7f72021-01-15 12:04:09 -0700314#if defined(PSA_WANT_KEY_TYPE_DES)
David Browne1f91f02021-02-09 15:56:22 -0700315#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DES)
316#define PSA_HAVE_SOFT_KEY_TYPE_DES 1
317#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DES */
318#if defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
David Brownb781f752021-02-08 15:44:52 -0700319 defined(PSA_HAVE_SOFT_BLOCK_MODE)
David Brown78a429b2021-01-21 09:48:57 -0700320#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700321#define MBEDTLS_DES_C
David Browne1f91f02021-02-09 15:56:22 -0700322#endif /*PSA_HAVE_SOFT_KEY_TYPE_DES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brownb65a7f72021-01-15 12:04:09 -0700323#endif /* PSA_WANT_KEY_TYPE_DES */
324
David Brownb16727a2021-02-08 16:31:46 -0700325#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
326#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20)
327#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
328#define MBEDTLS_CHACHA20_C
329#endif /*!MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20 */
330#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
331
David Brownf84a0f62021-02-09 15:59:41 -0700332/* If any of the software block ciphers are selected, define
333 * PSA_HAVE_SOFT_BLOCK_CIPHER, which can be used in any of these
334 * situations. */
335#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200336 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
David Brownf84a0f62021-02-09 15:59:41 -0700337 defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
338 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
339#define PSA_HAVE_SOFT_BLOCK_CIPHER 1
340#endif
341
David Brown99844272021-01-15 12:04:47 -0700342#if defined(PSA_WANT_ALG_STREAM_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700343#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brown99844272021-01-15 12:04:47 -0700344#endif /* PSA_WANT_ALG_STREAM_CIPHER */
345
Ronald Crond85e98d2021-03-25 15:32:32 +0100346#if defined(PSA_WANT_ALG_CBC_MAC)
347#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_MAC)
348#error "CBC-MAC is not yet supported via the PSA API in Mbed TLS."
349#define MBEDTLS_PSA_BUILTIN_ALG_CBC_MAC 1
350#endif /* !MBEDTLS_PSA_ACCEL_ALG_CBC_MAC */
351#endif /* PSA_WANT_ALG_CBC_MAC */
352
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100353#if defined(PSA_WANT_ALG_CMAC)
354#if !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC) || \
355 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
356#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
357#define MBEDTLS_CMAC_C
358#endif /* !MBEDTLS_PSA_ACCEL_ALG_CMAC */
359#endif /* PSA_WANT_ALG_CMAC */
360
David Brown99844272021-01-15 12:04:47 -0700361#if defined(PSA_WANT_ALG_CTR)
David Brown4b9ec7a2021-02-05 12:47:08 -0700362#if !defined(MBEDTLS_PSA_ACCEL_ALG_CTR) || \
David Brownf84a0f62021-02-09 15:59:41 -0700363 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700364#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700365#define MBEDTLS_CIPHER_MODE_CTR
David Brown4b9ec7a2021-02-05 12:47:08 -0700366#endif
David Brown99844272021-01-15 12:04:47 -0700367#endif /* PSA_WANT_ALG_CTR */
368
369#if defined(PSA_WANT_ALG_CFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700370#if !defined(MBEDTLS_PSA_ACCEL_ALG_CFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700371 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700372#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700373#define MBEDTLS_CIPHER_MODE_CFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700374#endif
David Brown99844272021-01-15 12:04:47 -0700375#endif /* PSA_WANT_ALG_CFB */
376
377#if defined(PSA_WANT_ALG_OFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700378#if !defined(MBEDTLS_PSA_ACCEL_ALG_OFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700379 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700380#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700381#define MBEDTLS_CIPHER_MODE_OFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700382#endif
David Brown99844272021-01-15 12:04:47 -0700383#endif /* PSA_WANT_ALG_OFB */
384
385#if defined(PSA_WANT_ALG_XTS)
David Brown4b9ec7a2021-02-05 12:47:08 -0700386#if !defined(MBEDTLS_PSA_ACCEL_ALG_XTS) || \
David Brownf84a0f62021-02-09 15:59:41 -0700387 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700388#define MBEDTLS_PSA_BUILTIN_ALG_XTS 1
David Brown99844272021-01-15 12:04:47 -0700389#define MBEDTLS_CIPHER_MODE_XTS
David Brown4b9ec7a2021-02-05 12:47:08 -0700390#endif
David Brown99844272021-01-15 12:04:47 -0700391#endif /* PSA_WANT_ALG_XTS */
392
Gilles Peskine7a2e83b2022-03-17 11:09:23 +0100393#if defined(PSA_WANT_ALG_ECB_NO_PADDING) && \
394 !defined(MBEDTLS_PSA_ACCEL_ALG_ECB_NO_PADDING)
David Brownbe380c12021-02-11 10:55:48 -0700395#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700396#endif
397
David Brown12f45f92021-01-26 11:50:36 -0700398#if defined(PSA_WANT_ALG_CBC_NO_PADDING)
David Brown4b9ec7a2021-02-05 12:47:08 -0700399#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING) || \
David Brownfc468182021-02-09 16:23:34 -0700400 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700401#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700402#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown4b9ec7a2021-02-05 12:47:08 -0700403#endif
David Brown12f45f92021-01-26 11:50:36 -0700404#endif /* PSA_WANT_ALG_CBC_NO_PADDING */
405
406#if defined(PSA_WANT_ALG_CBC_PKCS7)
David Brown4b9ec7a2021-02-05 12:47:08 -0700407#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7) || \
David Brownfc468182021-02-09 16:23:34 -0700408 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700409#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700410#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brownfc468182021-02-09 16:23:34 -0700411#define MBEDTLS_CIPHER_PADDING_PKCS7
David Brown4b9ec7a2021-02-05 12:47:08 -0700412#endif
David Brown12f45f92021-01-26 11:50:36 -0700413#endif /* PSA_WANT_ALG_CBC_PKCS7 */
414
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100415#if defined(PSA_WANT_ALG_CCM)
416#if !defined(MBEDTLS_PSA_ACCEL_ALG_CCM) || \
417 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200418 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100419 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
420#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100421#define MBEDTLS_PSA_BUILTIN_ALG_CCM_STAR_NO_TAG 1
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100422#define MBEDTLS_CCM_C
423#endif
424#endif /* PSA_WANT_ALG_CCM */
425
426#if defined(PSA_WANT_ALG_GCM)
427#if !defined(MBEDTLS_PSA_ACCEL_ALG_GCM) || \
428 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200429 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100430 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
431#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
432#define MBEDTLS_GCM_C
433#endif
434#endif /* PSA_WANT_ALG_GCM */
435
David Brownac4fa072021-02-08 16:47:35 -0700436#if defined(PSA_WANT_ALG_CHACHA20_POLY1305)
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200437#if !defined(MBEDTLS_PSA_ACCEL_ALG_CHACHA20_POLY1305)
David Brownac4fa072021-02-08 16:47:35 -0700438#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
439#define MBEDTLS_CHACHAPOLY_C
David Brown86730a82021-02-09 16:24:11 -0700440#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700441#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200442#endif /* !MBEDTLS_PSA_ACCEL_ALG_CHACHA20_POLY1305 */
David Brownac4fa072021-02-08 16:47:35 -0700443#endif /* PSA_WANT_ALG_CHACHA20_POLY1305 */
444
David Browneed74df2021-03-15 15:53:57 -0600445#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_256)
446#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256)
447#define MBEDTLS_ECP_DP_BP256R1_ENABLED
448#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
449#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256 */
450#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_256 */
451
452#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_384)
453#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384)
454#define MBEDTLS_ECP_DP_BP384R1_ENABLED
455#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
456#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384 */
457#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_384 */
458
459#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_512)
460#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512)
461#define MBEDTLS_ECP_DP_BP512R1_ENABLED
462#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
463#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512 */
464#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_512 */
465
466#if defined(PSA_WANT_ECC_MONTGOMERY_255)
467#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255)
468#define MBEDTLS_ECP_DP_CURVE25519_ENABLED
469#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
470#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255 */
471#endif /* PSA_WANT_ECC_MONTGOMERY_255 */
472
473#if defined(PSA_WANT_ECC_MONTGOMERY_448)
474#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448)
475#define MBEDTLS_ECP_DP_CURVE448_ENABLED
476#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
477#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448 */
478#endif /* PSA_WANT_ECC_MONTGOMERY_448 */
479
David Brownc7b9b2b2021-02-19 21:05:52 -0700480#if defined(PSA_WANT_ECC_SECP_R1_192)
481#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192)
482#define MBEDTLS_ECP_DP_SECP192R1_ENABLED
483#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
484#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192 */
485#endif /* PSA_WANT_ECC_SECP_R1_192 */
486
487#if defined(PSA_WANT_ECC_SECP_R1_224)
488#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224)
489#define MBEDTLS_ECP_DP_SECP224R1_ENABLED
490#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
491#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224 */
492#endif /* PSA_WANT_ECC_SECP_R1_224 */
493
494#if defined(PSA_WANT_ECC_SECP_R1_256)
495#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256)
496#define MBEDTLS_ECP_DP_SECP256R1_ENABLED
497#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
498#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256 */
499#endif /* PSA_WANT_ECC_SECP_R1_256 */
500
501#if defined(PSA_WANT_ECC_SECP_R1_384)
502#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384)
503#define MBEDTLS_ECP_DP_SECP384R1_ENABLED
504#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
505#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384 */
506#endif /* PSA_WANT_ECC_SECP_R1_384 */
507
508#if defined(PSA_WANT_ECC_SECP_R1_521)
509#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521)
510#define MBEDTLS_ECP_DP_SECP521R1_ENABLED
511#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
512#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521 */
513#endif /* PSA_WANT_ECC_SECP_R1_521 */
514
515#if defined(PSA_WANT_ECC_SECP_K1_192)
516#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192)
David Brown8de143e2021-02-19 14:08:00 -0700517#define MBEDTLS_ECP_DP_SECP192K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700518#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
519#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192 */
520#endif /* PSA_WANT_ECC_SECP_K1_192 */
David Brown8de143e2021-02-19 14:08:00 -0700521
David Brownc7b9b2b2021-02-19 21:05:52 -0700522#if defined(PSA_WANT_ECC_SECP_K1_224)
523#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224)
Ronald Crone1f55162021-03-25 15:09:47 +0100524/*
525 * SECP224K1 is buggy via the PSA API in Mbed TLS
526 * (https://github.com/ARMmbed/mbedtls/issues/3541).
527 */
528#error "SECP224K1 is buggy via the PSA API in Mbed TLS."
David Brown8de143e2021-02-19 14:08:00 -0700529#define MBEDTLS_ECP_DP_SECP224K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700530#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
531#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224 */
532#endif /* PSA_WANT_ECC_SECP_K1_224 */
David Brown8de143e2021-02-19 14:08:00 -0700533
David Brownc7b9b2b2021-02-19 21:05:52 -0700534#if defined(PSA_WANT_ECC_SECP_K1_256)
535#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256)
David Brown9b178de2021-03-10 13:14:48 -0700536#define MBEDTLS_ECP_DP_SECP256K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700537#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
538#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256 */
539#endif /* PSA_WANT_ECC_SECP_K1_256 */
David Brown8de143e2021-02-19 14:08:00 -0700540
Gilles Peskine1231eb52021-04-19 22:24:23 +0200541
542
543/****************************************************************/
544/* Infer PSA requirements from Mbed TLS capabilities */
545/****************************************************************/
546
John Durkop714e3a12020-09-29 22:07:04 -0700547#else /* MBEDTLS_PSA_CRYPTO_CONFIG */
548
549/*
550 * Ensure PSA_WANT_* defines are setup properly if MBEDTLS_PSA_CRYPTO_CONFIG
551 * is not defined
552 */
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100553
Ronald Cron3d471812021-03-18 13:40:31 +0100554#if defined(MBEDTLS_CCM_C)
555#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100556#define MBEDTLS_PSA_BUILTIN_ALG_CCM_STAR_NO_TAG 1
Ronald Cron3d471812021-03-18 13:40:31 +0100557#define PSA_WANT_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100558#define PSA_WANT_ALG_CCM_STAR_NO_TAG 1
Ronald Cron3d471812021-03-18 13:40:31 +0100559#endif /* MBEDTLS_CCM_C */
560
561#if defined(MBEDTLS_CMAC_C)
562#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
563#define PSA_WANT_ALG_CMAC 1
564#endif /* MBEDTLS_CMAC_C */
565
John Durkopd62b6782020-11-30 21:06:05 -0800566#if defined(MBEDTLS_ECDH_C)
567#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
568#define PSA_WANT_ALG_ECDH 1
569#endif /* MBEDTLS_ECDH_C */
570
571#if defined(MBEDTLS_ECDSA_C)
572#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
573#define PSA_WANT_ALG_ECDSA 1
Gilles Peskine1231eb52021-04-19 22:24:23 +0200574#define PSA_WANT_ALG_ECDSA_ANY 1
John Durkopd62b6782020-11-30 21:06:05 -0800575
576// Only add in DETERMINISTIC support if ECDSA is also enabled
577#if defined(MBEDTLS_ECDSA_DETERMINISTIC)
578#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
579#define PSA_WANT_ALG_DETERMINISTIC_ECDSA 1
580#endif /* MBEDTLS_ECDSA_DETERMINISTIC */
581
582#endif /* MBEDTLS_ECDSA_C */
583
584#if defined(MBEDTLS_ECP_C)
585#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR 1
586#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR 1
587#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
588#define PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY 1
589#endif /* MBEDTLS_ECP_C */
590
Ronald Cron3d471812021-03-18 13:40:31 +0100591#if defined(MBEDTLS_GCM_C)
592#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
593#define PSA_WANT_ALG_GCM 1
594#endif /* MBEDTLS_GCM_C */
595
John Durkopd62b6782020-11-30 21:06:05 -0800596#if defined(MBEDTLS_HKDF_C)
597#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
598#define PSA_WANT_ALG_HMAC 1
599#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
600#define PSA_WANT_ALG_HKDF 1
601#endif /* MBEDTLS_HKDF_C */
602
603#if defined(MBEDTLS_MD_C)
604#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
605#define PSA_WANT_ALG_HMAC 1
Gilles Peskine47a89332021-01-12 00:00:15 +0100606#define PSA_WANT_KEY_TYPE_HMAC
John Durkopd62b6782020-11-30 21:06:05 -0800607#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
608#define PSA_WANT_ALG_TLS12_PRF 1
609#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
610#define PSA_WANT_ALG_TLS12_PSK_TO_MS 1
611#endif /* MBEDTLS_MD_C */
612
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100613#if defined(MBEDTLS_MD5_C)
614#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
615#define PSA_WANT_ALG_MD5 1
616#endif
617
618#if defined(MBEDTLS_RIPEMD160_C)
619#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
620#define PSA_WANT_ALG_RIPEMD160 1
621#endif
622
John Durkopd62b6782020-11-30 21:06:05 -0800623#if defined(MBEDTLS_RSA_C)
624#if defined(MBEDTLS_PKCS1_V15)
625#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
626#define PSA_WANT_ALG_RSA_PKCS1V15_CRYPT 1
627#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
628#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN 1
Gilles Peskine1231eb52021-04-19 22:24:23 +0200629#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW 1
Yuto Takano7828ca22021-08-10 11:26:15 +0100630#endif /* MBEDTLS_PKCS1_V15 */
John Durkopd62b6782020-11-30 21:06:05 -0800631#if defined(MBEDTLS_PKCS1_V21)
632#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
633#define PSA_WANT_ALG_RSA_OAEP 1
634#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
635#define PSA_WANT_ALG_RSA_PSS 1
636#endif /* MBEDTLS_PKCS1_V21 */
637#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR 1
638#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR 1
639#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
640#define PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY 1
641#endif /* MBEDTLS_RSA_C */
642
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100643#if defined(MBEDTLS_SHA1_C)
644#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
645#define PSA_WANT_ALG_SHA_1 1
646#endif
647
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200648#if defined(MBEDTLS_SHA224_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100649#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
Gilles Peskineb65db072021-01-12 00:00:53 +0100650#define PSA_WANT_ALG_SHA_224 1
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200651#endif
652
653#if defined(MBEDTLS_SHA256_C)
654#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100655#define PSA_WANT_ALG_SHA_256 1
656#endif
657
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200658#if defined(MBEDTLS_SHA384_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100659#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
660#define PSA_WANT_ALG_SHA_384 1
661#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200662
663#if defined(MBEDTLS_SHA512_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100664#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
665#define PSA_WANT_ALG_SHA_512 1
666#endif
667
David Brown94933082021-01-05 12:03:25 -0700668#if defined(MBEDTLS_AES_C)
669#define PSA_WANT_KEY_TYPE_AES 1
David Brownda7dbb72021-01-26 11:44:15 -0700670#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700671#endif
672
Gilles Peskine09c46da2021-10-08 15:48:16 +0200673#if defined(MBEDTLS_ARIA_C)
674#define PSA_WANT_KEY_TYPE_ARIA 1
675#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
676#endif
677
David Brown686e6e82021-01-05 12:03:25 -0700678#if defined(MBEDTLS_CAMELLIA_C)
679#define PSA_WANT_KEY_TYPE_CAMELLIA 1
David Brownda7dbb72021-01-26 11:44:15 -0700680#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700681#endif
682
David Brownb65a7f72021-01-15 12:04:09 -0700683#if defined(MBEDTLS_DES_C)
684#define PSA_WANT_KEY_TYPE_DES 1
David Brownda7dbb72021-01-26 11:44:15 -0700685#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700686#endif
687
David Brownb16727a2021-02-08 16:31:46 -0700688#if defined(MBEDTLS_CHACHA20_C)
689#define PSA_WANT_KEY_TYPE_CHACHA20 1
690#define PSA_WANT_ALG_STREAM_CIPHER 1
691#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
692#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brownac4fa072021-02-08 16:47:35 -0700693#if defined(MBEDTLS_CHACHAPOLY_C)
694#define PSA_WANT_ALG_CHACHA20_POLY1305 1
David Brown86730a82021-02-09 16:24:11 -0700695#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700696#endif
David Brownb16727a2021-02-08 16:31:46 -0700697#endif
698
David Brown99844272021-01-15 12:04:47 -0700699#if defined(MBEDTLS_CIPHER_MODE_CBC)
David Brown10cb81c2021-02-09 16:10:29 -0700700#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700701#define PSA_WANT_ALG_CBC_NO_PADDING 1
702#if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
David Brown12f45f92021-01-26 11:50:36 -0700703#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brown99844272021-01-15 12:04:47 -0700704#define PSA_WANT_ALG_CBC_PKCS7 1
705#endif
706#endif
707
708#if defined(MBEDTLS_AES_C) || defined(MBEDTLS_DES_C) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200709 defined(MBEDTLS_ARIA_C) || defined(MBEDTLS_CAMELLIA_C)
David Brown10cb81c2021-02-09 16:10:29 -0700710#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700711#define PSA_WANT_ALG_ECB_NO_PADDING 1
712#endif
713
714#if defined(MBEDTLS_CIPHER_MODE_CFB)
David Brown12f45f92021-01-26 11:50:36 -0700715#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700716#define PSA_WANT_ALG_CFB 1
717#endif
718
719#if defined(MBEDTLS_CIPHER_MODE_CTR)
David Brown12f45f92021-01-26 11:50:36 -0700720#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700721#define PSA_WANT_ALG_CTR 1
722#endif
723
724#if defined(MBEDTLS_CIPHER_MODE_OFB)
David Brown12f45f92021-01-26 11:50:36 -0700725#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700726#define PSA_WANT_ALG_OFB 1
727#endif
728
729#if defined(MBEDTLS_CIPHER_MODE_XTS)
David Brown12f45f92021-01-26 11:50:36 -0700730#define MBEDTLS_PSA_BUILTIN_ALG_XTS 1
David Brown99844272021-01-15 12:04:47 -0700731#define PSA_WANT_ALG_XTS 1
732#endif
733
David Browneed74df2021-03-15 15:53:57 -0600734#if defined(MBEDTLS_ECP_DP_BP256R1_ENABLED)
735#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
736#define PSA_WANT_ECC_BRAINPOOL_P_R1_256
737#endif
738
739#if defined(MBEDTLS_ECP_DP_BP384R1_ENABLED)
740#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
741#define PSA_WANT_ECC_BRAINPOOL_P_R1_384
742#endif
743
744#if defined(MBEDTLS_ECP_DP_BP512R1_ENABLED)
745#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
746#define PSA_WANT_ECC_BRAINPOOL_P_R1_512
747#endif
748
749#if defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED)
750#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
751#define PSA_WANT_ECC_MONTGOMERY_255
752#endif
753
Archanaef6aa5c2021-06-08 11:40:10 +0530754#if defined(MBEDTLS_ECP_DP_CURVE448_ENABLED)
David Browneed74df2021-03-15 15:53:57 -0600755#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
756#define PSA_WANT_ECC_MONTGOMERY_448
757#endif
758
David Brown8de143e2021-02-19 14:08:00 -0700759#if defined(MBEDTLS_ECP_DP_SECP192R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700760#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
761#define PSA_WANT_ECC_SECP_R1_192
David Brown8de143e2021-02-19 14:08:00 -0700762#endif
763
764#if defined(MBEDTLS_ECP_DP_SECP224R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700765#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
766#define PSA_WANT_ECC_SECP_R1_224
David Brown8de143e2021-02-19 14:08:00 -0700767#endif
768
769#if defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700770#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
771#define PSA_WANT_ECC_SECP_R1_256
David Brown8de143e2021-02-19 14:08:00 -0700772#endif
773
774#if defined(MBEDTLS_ECP_DP_SECP384R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700775#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
776#define PSA_WANT_ECC_SECP_R1_384
David Brown8de143e2021-02-19 14:08:00 -0700777#endif
778
779#if defined(MBEDTLS_ECP_DP_SECP521R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700780#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
781#define PSA_WANT_ECC_SECP_R1_521
David Brown8de143e2021-02-19 14:08:00 -0700782#endif
783
784#if defined(MBEDTLS_ECP_DP_SECP192K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700785#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
786#define PSA_WANT_ECC_SECP_K1_192
David Brown8de143e2021-02-19 14:08:00 -0700787#endif
788
Gilles Peskine39841302021-03-23 12:06:45 +0100789/* SECP224K1 is buggy via the PSA API (https://github.com/ARMmbed/mbedtls/issues/3541) */
790#if 0 && defined(MBEDTLS_ECP_DP_SECP224K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700791#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
792#define PSA_WANT_ECC_SECP_K1_224
David Brown8de143e2021-02-19 14:08:00 -0700793#endif
794
David Brown9b178de2021-03-10 13:14:48 -0700795#if defined(MBEDTLS_ECP_DP_SECP256K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700796#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
797#define PSA_WANT_ECC_SECP_K1_256
David Brown8de143e2021-02-19 14:08:00 -0700798#endif
799
John Durkop2dfaf9c2020-09-24 04:30:10 -0700800#endif /* MBEDTLS_PSA_CRYPTO_CONFIG */
John Durkopd8959392020-09-20 23:09:17 -0700801
Gilles Peskine60b29fe2021-02-16 14:06:50 +0100802/* These features are always enabled. */
803#define PSA_WANT_KEY_TYPE_DERIVE 1
804#define PSA_WANT_KEY_TYPE_RAW_DATA 1
805
John Durkop6e33dbe2020-09-17 21:15:13 -0700806#ifdef __cplusplus
807}
808#endif
809
810#endif /* MBEDTLS_CONFIG_PSA_H */