blob: 4c380884252f82a567b12a7204c0602287f72f61 [file] [log] [blame]
John Durkop6e33dbe2020-09-17 21:15:13 -07001/**
2 * \file mbedtls/config_psa.h
3 * \brief PSA crypto configuration options (set of defines)
4 *
John Durkop34818822020-10-12 21:36:22 -07005 * This set of compile-time options takes settings defined in
6 * include/mbedtls/config.h and include/psa/crypto_config.h and uses
7 * those definitions to define symbols used in the library code.
8 *
9 * Users and integrators should not edit this file, please edit
10 * include/mbedtls/config.h for MBETLS_XXX settings or
11 * include/psa/crypto_config.h for PSA_WANT_XXX settings.
John Durkop6e33dbe2020-09-17 21:15:13 -070012 */
13/*
14 * Copyright The Mbed TLS Contributors
15 * SPDX-License-Identifier: Apache-2.0
16 *
17 * Licensed under the Apache License, Version 2.0 (the "License"); you may
18 * not use this file except in compliance with the License.
19 * You may obtain a copy of the License at
20 *
21 * http://www.apache.org/licenses/LICENSE-2.0
22 *
23 * Unless required by applicable law or agreed to in writing, software
24 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
25 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
26 * See the License for the specific language governing permissions and
27 * limitations under the License.
28 */
29
30#ifndef MBEDTLS_CONFIG_PSA_H
31#define MBEDTLS_CONFIG_PSA_H
32
John Durkop714e3a12020-09-29 22:07:04 -070033#if defined(MBEDTLS_PSA_CRYPTO_CONFIG)
Gilles Peskine7e2a91f2022-03-16 17:10:48 +010034#if defined(MBEDTLS_PSA_CRYPTO_CONFIG_FILE)
35#include MBEDTLS_PSA_CRYPTO_CONFIG_FILE
36#else
John Durkop6e33dbe2020-09-17 21:15:13 -070037#include "psa/crypto_config.h"
Gilles Peskine7e2a91f2022-03-16 17:10:48 +010038#endif
John Durkop76228ac2020-09-29 22:33:49 -070039#endif /* defined(MBEDTLS_PSA_CRYPTO_CONFIG) */
John Durkop6e33dbe2020-09-17 21:15:13 -070040
Gilles Peskine7e2a91f2022-03-16 17:10:48 +010041#if defined(MBEDTLS_PSA_CRYPTO_USER_CONFIG_FILE)
42#include MBEDTLS_PSA_CRYPTO_USER_CONFIG_FILE
43#endif
44
John Durkop6e33dbe2020-09-17 21:15:13 -070045#ifdef __cplusplus
46extern "C" {
47#endif
48
Gilles Peskinecf70d072021-04-19 22:24:23 +020049
50
51/****************************************************************/
52/* De facto synonyms */
53/****************************************************************/
54
55#if defined(PSA_WANT_ALG_ECDSA_ANY) && !defined(PSA_WANT_ALG_ECDSA)
56#define PSA_WANT_ALG_ECDSA PSA_WANT_ALG_ECDSA_ANY
57#elif !defined(PSA_WANT_ALG_ECDSA_ANY) && defined(PSA_WANT_ALG_ECDSA)
58#define PSA_WANT_ALG_ECDSA_ANY PSA_WANT_ALG_ECDSA
59#endif
60
61#if defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW) && !defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
62#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW
63#elif !defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW) && defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
64#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW PSA_WANT_ALG_RSA_PKCS1V15_SIGN
65#endif
66
Gilles Peskinea2536092021-10-04 18:33:56 +020067#if defined(PSA_WANT_ALG_RSA_PSS_ANY_SALT) && !defined(PSA_WANT_ALG_RSA_PSS)
68#define PSA_WANT_ALG_RSA_PSS PSA_WANT_ALG_RSA_PSS_ANY_SALT
69#elif !defined(PSA_WANT_ALG_RSA_PSS_ANY_SALT) && defined(PSA_WANT_ALG_RSA_PSS)
70#define PSA_WANT_ALG_RSA_PSS_ANY_SALT PSA_WANT_ALG_RSA_PSS
71#endif
72
Gilles Peskinecf70d072021-04-19 22:24:23 +020073
74
75/****************************************************************/
76/* Require built-in implementations based on PSA requirements */
77/****************************************************************/
78
John Durkop2dfaf9c2020-09-24 04:30:10 -070079#if defined(MBEDTLS_PSA_CRYPTO_CONFIG)
John Durkopd8959392020-09-20 23:09:17 -070080
John Durkopd62b6782020-11-30 21:06:05 -080081#if defined(PSA_WANT_ALG_DETERMINISTIC_ECDSA)
82#if !defined(MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA)
83#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
84#define MBEDTLS_ECDSA_DETERMINISTIC
85#define MBEDTLS_ECDSA_C
86#define MBEDTLS_HMAC_DRBG_C
87#define MBEDTLS_MD_C
88#endif /* !MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA */
89#endif /* PSA_WANT_ALG_DETERMINISTIC_ECDSA */
90
91#if defined(PSA_WANT_ALG_ECDH)
92#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDH)
93#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
94#define MBEDTLS_ECDH_C
95#define MBEDTLS_ECP_C
96#define MBEDTLS_BIGNUM_C
97#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDH */
98#endif /* PSA_WANT_ALG_ECDH */
99
100#if defined(PSA_WANT_ALG_ECDSA)
101#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDSA)
102#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
103#define MBEDTLS_ECDSA_C
Ronald Crond98ec4b2021-04-28 18:28:46 +0200104#define MBEDTLS_ECP_C
105#define MBEDTLS_BIGNUM_C
106#define MBEDTLS_ASN1_PARSE_C
107#define MBEDTLS_ASN1_WRITE_C
John Durkopd62b6782020-11-30 21:06:05 -0800108#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDSA */
109#endif /* PSA_WANT_ALG_ECDSA */
110
111#if defined(PSA_WANT_ALG_HKDF)
112#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF)
113#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
114#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
115#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF */
116#endif /* PSA_WANT_ALG_HKDF */
117
118#if defined(PSA_WANT_ALG_HMAC)
119#if !defined(MBEDTLS_PSA_ACCEL_ALG_HMAC)
120#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
121#endif /* !MBEDTLS_PSA_ACCEL_ALG_HMAC */
122#endif /* PSA_WANT_ALG_HMAC */
123
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100124#if defined(PSA_WANT_ALG_MD2) && !defined(MBEDTLS_PSA_ACCEL_ALG_MD2)
125#define MBEDTLS_PSA_BUILTIN_ALG_MD2 1
126#define MBEDTLS_MD2_C
127#endif
128
129#if defined(PSA_WANT_ALG_MD4) && !defined(MBEDTLS_PSA_ACCEL_ALG_MD4)
130#define MBEDTLS_PSA_BUILTIN_ALG_MD4 1
131#define MBEDTLS_MD4_C
132#endif
133
134#if defined(PSA_WANT_ALG_MD5) && !defined(MBEDTLS_PSA_ACCEL_ALG_MD5)
135#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
136#define MBEDTLS_MD5_C
137#endif
138
139#if defined(PSA_WANT_ALG_RIPEMD160) && !defined(MBEDTLS_PSA_ACCEL_ALG_RIPEMD160)
140#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
141#define MBEDTLS_RIPEMD160_C
142#endif
143
John Durkopd62b6782020-11-30 21:06:05 -0800144#if defined(PSA_WANT_ALG_RSA_OAEP)
145#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP)
146#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
147#define MBEDTLS_RSA_C
148#define MBEDTLS_BIGNUM_C
149#define MBEDTLS_OID_C
150#define MBEDTLS_PKCS1_V21
151#define MBEDTLS_MD_C
152#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP */
153#endif /* PSA_WANT_ALG_RSA_OAEP */
154
155#if defined(PSA_WANT_ALG_RSA_PKCS1V15_CRYPT)
156#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT)
157#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
158#define MBEDTLS_RSA_C
159#define MBEDTLS_BIGNUM_C
160#define MBEDTLS_OID_C
161#define MBEDTLS_PKCS1_V15
162#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT */
163#endif /* PSA_WANT_ALG_RSA_PKCS1V15_CRYPT */
164
165#if defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
166#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN)
167#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
168#define MBEDTLS_RSA_C
169#define MBEDTLS_BIGNUM_C
170#define MBEDTLS_OID_C
171#define MBEDTLS_PKCS1_V15
172#define MBEDTLS_MD_C
173#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN */
174#endif /* PSA_WANT_ALG_RSA_PKCS1V15_SIGN */
175
176#if defined(PSA_WANT_ALG_RSA_PSS)
177#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PSS)
178#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
179#define MBEDTLS_RSA_C
180#define MBEDTLS_BIGNUM_C
181#define MBEDTLS_OID_C
182#define MBEDTLS_PKCS1_V21
183#define MBEDTLS_MD_C
184#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PSS */
185#endif /* PSA_WANT_ALG_RSA_PSS */
186
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100187#if defined(PSA_WANT_ALG_SHA_1) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_1)
188#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
189#define MBEDTLS_SHA1_C
190#endif
191
192#if defined(PSA_WANT_ALG_SHA_224) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_224)
193#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
194#define MBEDTLS_SHA256_C
195#endif
196
197#if defined(PSA_WANT_ALG_SHA_256) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_256)
198#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
199#define MBEDTLS_SHA256_C
200#endif
201
202#if defined(PSA_WANT_ALG_SHA_384) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_384)
203#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
204#define MBEDTLS_SHA512_C
205#endif
206
207#if defined(PSA_WANT_ALG_SHA_512) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_512)
208#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
209#define MBEDTLS_SHA512_C
210#endif
211
John Durkop07cc04a2020-11-16 22:08:34 -0800212#if defined(PSA_WANT_ALG_TLS12_PRF)
213#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF)
John Durkopd62b6782020-11-30 21:06:05 -0800214#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
John Durkop07cc04a2020-11-16 22:08:34 -0800215#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF */
216#endif /* PSA_WANT_ALG_TLS12_PRF */
217
218#if defined(PSA_WANT_ALG_TLS12_PSK_TO_MS)
219#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS)
John Durkopd62b6782020-11-30 21:06:05 -0800220#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
John Durkop07cc04a2020-11-16 22:08:34 -0800221#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS */
222#endif /* PSA_WANT_ALG_TLS12_PSK_TO_MS */
223
224#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR)
225#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR)
John Durkopd62b6782020-11-30 21:06:05 -0800226#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR 1
John Durkop07cc04a2020-11-16 22:08:34 -0800227#define MBEDTLS_ECP_C
228#define MBEDTLS_BIGNUM_C
229#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR */
230#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR */
231
232#if defined(PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY)
233#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800234#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
John Durkop07cc04a2020-11-16 22:08:34 -0800235#define MBEDTLS_ECP_C
236#define MBEDTLS_BIGNUM_C
237#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY */
238#endif /* PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY */
239
John Durkop9814fa22020-11-04 12:28:15 -0800240#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR)
John Durkop0e005192020-10-31 22:06:54 -0700241#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR)
John Durkopd62b6782020-11-30 21:06:05 -0800242#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR 1
John Durkop0e005192020-10-31 22:06:54 -0700243#define MBEDTLS_RSA_C
244#define MBEDTLS_BIGNUM_C
245#define MBEDTLS_OID_C
246#define MBEDTLS_GENPRIME
John Durkop07cc04a2020-11-16 22:08:34 -0800247#define MBEDTLS_PK_PARSE_C
248#define MBEDTLS_PK_WRITE_C
249#define MBEDTLS_PK_C
Ronald Crond98ec4b2021-04-28 18:28:46 +0200250#define MBEDTLS_ASN1_PARSE_C
251#define MBEDTLS_ASN1_WRITE_C
John Durkop0e005192020-10-31 22:06:54 -0700252#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR */
John Durkop9814fa22020-11-04 12:28:15 -0800253#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR */
254
255#if defined(PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkop0e005192020-10-31 22:06:54 -0700256#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800257#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
John Durkop0e005192020-10-31 22:06:54 -0700258#define MBEDTLS_RSA_C
259#define MBEDTLS_BIGNUM_C
260#define MBEDTLS_OID_C
John Durkop07cc04a2020-11-16 22:08:34 -0800261#define MBEDTLS_PK_PARSE_C
262#define MBEDTLS_PK_WRITE_C
263#define MBEDTLS_PK_C
Ronald Crond98ec4b2021-04-28 18:28:46 +0200264#define MBEDTLS_ASN1_PARSE_C
265#define MBEDTLS_ASN1_WRITE_C
John Durkop0e005192020-10-31 22:06:54 -0700266#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkop9814fa22020-11-04 12:28:15 -0800267#endif /* PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkopd0321952020-10-29 21:37:36 -0700268
David Brownb781f752021-02-08 15:44:52 -0700269/* If any of the block modes are requested that don't have an
270 * associated HW assist, define PSA_HAVE_SOFT_BLOCK_MODE for checking
271 * in the block cipher key types. */
272#if (defined(PSA_WANT_ALG_CTR) && !defined(MBEDTLS_PSA_ACCEL_ALG_CTR)) || \
Bence Szépkúti7921cce2021-02-17 11:46:50 +0100273 (defined(PSA_WANT_ALG_CFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_CFB)) || \
David Brownb781f752021-02-08 15:44:52 -0700274 (defined(PSA_WANT_ALG_OFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_OFB)) || \
275 (defined(PSA_WANT_ALG_XTS) && !defined(MBEDTLS_PSA_ACCEL_ALG_XTS)) || \
276 defined(PSA_WANT_ALG_ECB_NO_PADDING) || \
277 (defined(PSA_WANT_ALG_CBC_NO_PADDING) && \
278 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING)) || \
279 (defined(PSA_WANT_ALG_CBC_PKCS7) && \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100280 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7)) || \
281 (defined(PSA_WANT_ALG_CMAC) && !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC))
David Brownb781f752021-02-08 15:44:52 -0700282#define PSA_HAVE_SOFT_BLOCK_MODE 1
283#endif
284
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100285#if (defined(PSA_WANT_ALG_GCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_GCM)) || \
286 (defined(PSA_WANT_ALG_CCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_CCM))
287#define PSA_HAVE_SOFT_BLOCK_AEAD 1
288#endif
289
David Brown94933082021-01-05 12:03:25 -0700290#if defined(PSA_WANT_KEY_TYPE_AES)
David Browne1f91f02021-02-09 15:56:22 -0700291#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_AES)
292#define PSA_HAVE_SOFT_KEY_TYPE_AES 1
293#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_AES */
294#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100295 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
296 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
David Brown78a429b2021-01-21 09:48:57 -0700297#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700298#define MBEDTLS_AES_C
David Browne1f91f02021-02-09 15:56:22 -0700299#endif /* PSA_HAVE_SOFT_KEY_TYPE_AES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown94933082021-01-05 12:03:25 -0700300#endif /* PSA_WANT_KEY_TYPE_AES */
301
David Brownec258cf2021-01-05 12:03:25 -0700302#if defined(PSA_WANT_KEY_TYPE_ARC4)
303#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ARC4)
David Brown78a429b2021-01-21 09:48:57 -0700304#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARC4 1
David Brownec258cf2021-01-05 12:03:25 -0700305#define MBEDTLS_ARC4_C
306#endif /*!MBEDTLS_PSA_ACCEL_KEY_TYPE_ARC4 */
307#endif /* PSA_WANT_KEY_TYPE_ARC4 */
308
Gilles Peskine0d3d7422021-10-08 15:48:16 +0200309#if defined(PSA_WANT_KEY_TYPE_ARIA)
310#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA)
311#define PSA_HAVE_SOFT_KEY_TYPE_ARIA 1
312#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA */
313#if defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
314 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
315 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
316#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
317#define MBEDTLS_ARIA_C
318#endif /* PSA_HAVE_SOFT_KEY_TYPE_ARIA || PSA_HAVE_SOFT_BLOCK_MODE */
319#endif /* PSA_WANT_KEY_TYPE_ARIA */
320
David Brown686e6e82021-01-05 12:03:25 -0700321#if defined(PSA_WANT_KEY_TYPE_CAMELLIA)
David Browne1f91f02021-02-09 15:56:22 -0700322#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA)
323#define PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA 1
324#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA */
325#if defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100326 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
327 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
David Brown78a429b2021-01-21 09:48:57 -0700328#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700329#define MBEDTLS_CAMELLIA_C
David Browne1f91f02021-02-09 15:56:22 -0700330#endif /* PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown686e6e82021-01-05 12:03:25 -0700331#endif /* PSA_WANT_KEY_TYPE_CAMELLIA */
332
David Brownb65a7f72021-01-15 12:04:09 -0700333#if defined(PSA_WANT_KEY_TYPE_DES)
David Browne1f91f02021-02-09 15:56:22 -0700334#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DES)
335#define PSA_HAVE_SOFT_KEY_TYPE_DES 1
336#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DES */
337#if defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
David Brownb781f752021-02-08 15:44:52 -0700338 defined(PSA_HAVE_SOFT_BLOCK_MODE)
David Brown78a429b2021-01-21 09:48:57 -0700339#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700340#define MBEDTLS_DES_C
David Browne1f91f02021-02-09 15:56:22 -0700341#endif /*PSA_HAVE_SOFT_KEY_TYPE_DES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brownb65a7f72021-01-15 12:04:09 -0700342#endif /* PSA_WANT_KEY_TYPE_DES */
343
David Brownb16727a2021-02-08 16:31:46 -0700344#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
345#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20)
346#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
347#define MBEDTLS_CHACHA20_C
348#endif /*!MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20 */
349#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
350
David Brownf84a0f62021-02-09 15:59:41 -0700351/* If any of the software block ciphers are selected, define
352 * PSA_HAVE_SOFT_BLOCK_CIPHER, which can be used in any of these
353 * situations. */
354#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine0d3d7422021-10-08 15:48:16 +0200355 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
David Brownf84a0f62021-02-09 15:59:41 -0700356 defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
357 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
358#define PSA_HAVE_SOFT_BLOCK_CIPHER 1
359#endif
360
David Brown99844272021-01-15 12:04:47 -0700361#if defined(PSA_WANT_ALG_STREAM_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700362#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brown99844272021-01-15 12:04:47 -0700363#endif /* PSA_WANT_ALG_STREAM_CIPHER */
364
Ronald Crond85e98d2021-03-25 15:32:32 +0100365#if defined(PSA_WANT_ALG_CBC_MAC)
366#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_MAC)
367#error "CBC-MAC is not yet supported via the PSA API in Mbed TLS."
368#define MBEDTLS_PSA_BUILTIN_ALG_CBC_MAC 1
369#endif /* !MBEDTLS_PSA_ACCEL_ALG_CBC_MAC */
370#endif /* PSA_WANT_ALG_CBC_MAC */
371
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100372#if defined(PSA_WANT_ALG_CMAC)
373#if !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC) || \
374 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
375#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
376#define MBEDTLS_CMAC_C
377#endif /* !MBEDTLS_PSA_ACCEL_ALG_CMAC */
378#endif /* PSA_WANT_ALG_CMAC */
379
David Brown99844272021-01-15 12:04:47 -0700380#if defined(PSA_WANT_ALG_CTR)
David Brown4b9ec7a2021-02-05 12:47:08 -0700381#if !defined(MBEDTLS_PSA_ACCEL_ALG_CTR) || \
David Brownf84a0f62021-02-09 15:59:41 -0700382 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700383#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700384#define MBEDTLS_CIPHER_MODE_CTR
David Brown4b9ec7a2021-02-05 12:47:08 -0700385#endif
David Brown99844272021-01-15 12:04:47 -0700386#endif /* PSA_WANT_ALG_CTR */
387
388#if defined(PSA_WANT_ALG_CFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700389#if !defined(MBEDTLS_PSA_ACCEL_ALG_CFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700390 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700391#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700392#define MBEDTLS_CIPHER_MODE_CFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700393#endif
David Brown99844272021-01-15 12:04:47 -0700394#endif /* PSA_WANT_ALG_CFB */
395
396#if defined(PSA_WANT_ALG_OFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700397#if !defined(MBEDTLS_PSA_ACCEL_ALG_OFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700398 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700399#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700400#define MBEDTLS_CIPHER_MODE_OFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700401#endif
David Brown99844272021-01-15 12:04:47 -0700402#endif /* PSA_WANT_ALG_OFB */
403
404#if defined(PSA_WANT_ALG_XTS)
David Brown4b9ec7a2021-02-05 12:47:08 -0700405#if !defined(MBEDTLS_PSA_ACCEL_ALG_XTS) || \
David Brownf84a0f62021-02-09 15:59:41 -0700406 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700407#define MBEDTLS_PSA_BUILTIN_ALG_XTS 1
David Brown99844272021-01-15 12:04:47 -0700408#define MBEDTLS_CIPHER_MODE_XTS
David Brown4b9ec7a2021-02-05 12:47:08 -0700409#endif
David Brown99844272021-01-15 12:04:47 -0700410#endif /* PSA_WANT_ALG_XTS */
411
412#if defined(PSA_WANT_ALG_ECB_NO_PADDING)
David Brownbe380c12021-02-11 10:55:48 -0700413#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700414#endif
415
David Brown12f45f92021-01-26 11:50:36 -0700416#if defined(PSA_WANT_ALG_CBC_NO_PADDING)
David Brown4b9ec7a2021-02-05 12:47:08 -0700417#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING) || \
David Brownfc468182021-02-09 16:23:34 -0700418 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700419#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700420#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown4b9ec7a2021-02-05 12:47:08 -0700421#endif
David Brown12f45f92021-01-26 11:50:36 -0700422#endif /* PSA_WANT_ALG_CBC_NO_PADDING */
423
424#if defined(PSA_WANT_ALG_CBC_PKCS7)
David Brown4b9ec7a2021-02-05 12:47:08 -0700425#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7) || \
David Brownfc468182021-02-09 16:23:34 -0700426 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700427#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700428#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brownfc468182021-02-09 16:23:34 -0700429#define MBEDTLS_CIPHER_PADDING_PKCS7
David Brown4b9ec7a2021-02-05 12:47:08 -0700430#endif
David Brown12f45f92021-01-26 11:50:36 -0700431#endif /* PSA_WANT_ALG_CBC_PKCS7 */
432
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100433#if defined(PSA_WANT_ALG_CCM)
434#if !defined(MBEDTLS_PSA_ACCEL_ALG_CCM) || \
435 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine0d3d7422021-10-08 15:48:16 +0200436 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100437 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
438#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
439#define MBEDTLS_CCM_C
440#endif
441#endif /* PSA_WANT_ALG_CCM */
442
443#if defined(PSA_WANT_ALG_GCM)
444#if !defined(MBEDTLS_PSA_ACCEL_ALG_GCM) || \
445 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine0d3d7422021-10-08 15:48:16 +0200446 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100447 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
448#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
449#define MBEDTLS_GCM_C
450#endif
451#endif /* PSA_WANT_ALG_GCM */
452
David Brownac4fa072021-02-08 16:47:35 -0700453#if defined(PSA_WANT_ALG_CHACHA20_POLY1305)
Ronald Crond98ec4b2021-04-28 18:28:46 +0200454#if !defined(MBEDTLS_PSA_ACCEL_ALG_CHACHA20_POLY1305)
David Brownac4fa072021-02-08 16:47:35 -0700455#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
456#define MBEDTLS_CHACHAPOLY_C
David Brown86730a82021-02-09 16:24:11 -0700457#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700458#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
Ronald Crond98ec4b2021-04-28 18:28:46 +0200459#endif /* !MBEDTLS_PSA_ACCEL_ALG_CHACHA20_POLY1305 */
David Brownac4fa072021-02-08 16:47:35 -0700460#endif /* PSA_WANT_ALG_CHACHA20_POLY1305 */
461
David Browneed74df2021-03-15 15:53:57 -0600462#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_256)
463#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256)
464#define MBEDTLS_ECP_DP_BP256R1_ENABLED
465#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
466#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256 */
467#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_256 */
468
469#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_384)
470#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384)
471#define MBEDTLS_ECP_DP_BP384R1_ENABLED
472#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
473#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384 */
474#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_384 */
475
476#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_512)
477#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512)
478#define MBEDTLS_ECP_DP_BP512R1_ENABLED
479#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
480#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512 */
481#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_512 */
482
483#if defined(PSA_WANT_ECC_MONTGOMERY_255)
484#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255)
485#define MBEDTLS_ECP_DP_CURVE25519_ENABLED
486#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
487#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255 */
488#endif /* PSA_WANT_ECC_MONTGOMERY_255 */
489
490#if defined(PSA_WANT_ECC_MONTGOMERY_448)
491#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448)
Ronald Crone1f55162021-03-25 15:09:47 +0100492/*
493 * Curve448 is not yet supported via the PSA API in Mbed TLS
Dave Rodgman52af7692022-03-31 14:27:24 +0100494 * (https://github.com/Mbed-TLS/mbedtls/issues/4249).
Ronald Crone1f55162021-03-25 15:09:47 +0100495 */
496#error "Curve448 is not yet supported via the PSA API in Mbed TLS."
David Browneed74df2021-03-15 15:53:57 -0600497#define MBEDTLS_ECP_DP_CURVE448_ENABLED
498#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
499#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448 */
500#endif /* PSA_WANT_ECC_MONTGOMERY_448 */
501
David Brownc7b9b2b2021-02-19 21:05:52 -0700502#if defined(PSA_WANT_ECC_SECP_R1_192)
503#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192)
504#define MBEDTLS_ECP_DP_SECP192R1_ENABLED
505#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
506#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192 */
507#endif /* PSA_WANT_ECC_SECP_R1_192 */
508
509#if defined(PSA_WANT_ECC_SECP_R1_224)
510#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224)
511#define MBEDTLS_ECP_DP_SECP224R1_ENABLED
512#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
513#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224 */
514#endif /* PSA_WANT_ECC_SECP_R1_224 */
515
516#if defined(PSA_WANT_ECC_SECP_R1_256)
517#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256)
518#define MBEDTLS_ECP_DP_SECP256R1_ENABLED
519#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
520#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256 */
521#endif /* PSA_WANT_ECC_SECP_R1_256 */
522
523#if defined(PSA_WANT_ECC_SECP_R1_384)
524#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384)
525#define MBEDTLS_ECP_DP_SECP384R1_ENABLED
526#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
527#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384 */
528#endif /* PSA_WANT_ECC_SECP_R1_384 */
529
530#if defined(PSA_WANT_ECC_SECP_R1_521)
531#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521)
532#define MBEDTLS_ECP_DP_SECP521R1_ENABLED
533#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
534#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521 */
535#endif /* PSA_WANT_ECC_SECP_R1_521 */
536
537#if defined(PSA_WANT_ECC_SECP_K1_192)
538#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192)
David Brown8de143e2021-02-19 14:08:00 -0700539#define MBEDTLS_ECP_DP_SECP192K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700540#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
541#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192 */
542#endif /* PSA_WANT_ECC_SECP_K1_192 */
David Brown8de143e2021-02-19 14:08:00 -0700543
David Brownc7b9b2b2021-02-19 21:05:52 -0700544#if defined(PSA_WANT_ECC_SECP_K1_224)
545#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224)
Ronald Crone1f55162021-03-25 15:09:47 +0100546/*
547 * SECP224K1 is buggy via the PSA API in Mbed TLS
Dave Rodgman52af7692022-03-31 14:27:24 +0100548 * (https://github.com/Mbed-TLS/mbedtls/issues/3541).
Ronald Crone1f55162021-03-25 15:09:47 +0100549 */
550#error "SECP224K1 is buggy via the PSA API in Mbed TLS."
David Brown8de143e2021-02-19 14:08:00 -0700551#define MBEDTLS_ECP_DP_SECP224K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700552#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
553#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224 */
554#endif /* PSA_WANT_ECC_SECP_K1_224 */
David Brown8de143e2021-02-19 14:08:00 -0700555
David Brownc7b9b2b2021-02-19 21:05:52 -0700556#if defined(PSA_WANT_ECC_SECP_K1_256)
557#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256)
David Brown9b178de2021-03-10 13:14:48 -0700558#define MBEDTLS_ECP_DP_SECP256K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700559#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
560#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256 */
561#endif /* PSA_WANT_ECC_SECP_K1_256 */
David Brown8de143e2021-02-19 14:08:00 -0700562
Gilles Peskinecf70d072021-04-19 22:24:23 +0200563
564
565/****************************************************************/
566/* Infer PSA requirements from Mbed TLS capabilities */
567/****************************************************************/
568
John Durkop714e3a12020-09-29 22:07:04 -0700569#else /* MBEDTLS_PSA_CRYPTO_CONFIG */
570
571/*
572 * Ensure PSA_WANT_* defines are setup properly if MBEDTLS_PSA_CRYPTO_CONFIG
573 * is not defined
574 */
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100575
Ronald Cron3d471812021-03-18 13:40:31 +0100576#if defined(MBEDTLS_CCM_C)
577#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
578#define PSA_WANT_ALG_CCM 1
579#endif /* MBEDTLS_CCM_C */
580
581#if defined(MBEDTLS_CMAC_C)
582#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
583#define PSA_WANT_ALG_CMAC 1
584#endif /* MBEDTLS_CMAC_C */
585
John Durkopd62b6782020-11-30 21:06:05 -0800586#if defined(MBEDTLS_ECDH_C)
587#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
588#define PSA_WANT_ALG_ECDH 1
589#endif /* MBEDTLS_ECDH_C */
590
591#if defined(MBEDTLS_ECDSA_C)
592#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
593#define PSA_WANT_ALG_ECDSA 1
Gilles Peskinecf70d072021-04-19 22:24:23 +0200594#define PSA_WANT_ALG_ECDSA_ANY 1
John Durkopd62b6782020-11-30 21:06:05 -0800595
596// Only add in DETERMINISTIC support if ECDSA is also enabled
597#if defined(MBEDTLS_ECDSA_DETERMINISTIC)
598#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
599#define PSA_WANT_ALG_DETERMINISTIC_ECDSA 1
600#endif /* MBEDTLS_ECDSA_DETERMINISTIC */
601
602#endif /* MBEDTLS_ECDSA_C */
603
604#if defined(MBEDTLS_ECP_C)
605#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR 1
606#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR 1
607#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
608#define PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY 1
609#endif /* MBEDTLS_ECP_C */
610
Ronald Cron3d471812021-03-18 13:40:31 +0100611#if defined(MBEDTLS_GCM_C)
612#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
613#define PSA_WANT_ALG_GCM 1
614#endif /* MBEDTLS_GCM_C */
615
John Durkopd62b6782020-11-30 21:06:05 -0800616#if defined(MBEDTLS_HKDF_C)
617#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
618#define PSA_WANT_ALG_HMAC 1
619#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
620#define PSA_WANT_ALG_HKDF 1
621#endif /* MBEDTLS_HKDF_C */
622
623#if defined(MBEDTLS_MD_C)
624#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
625#define PSA_WANT_ALG_HMAC 1
Gilles Peskine47a89332021-01-12 00:00:15 +0100626#define PSA_WANT_KEY_TYPE_HMAC
John Durkopd62b6782020-11-30 21:06:05 -0800627#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
628#define PSA_WANT_ALG_TLS12_PRF 1
629#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
630#define PSA_WANT_ALG_TLS12_PSK_TO_MS 1
631#endif /* MBEDTLS_MD_C */
632
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100633#if defined(MBEDTLS_MD2_C)
634#define MBEDTLS_PSA_BUILTIN_ALG_MD2 1
635#define PSA_WANT_ALG_MD2 1
636#endif
637
638#if defined(MBEDTLS_MD4_C)
639#define MBEDTLS_PSA_BUILTIN_ALG_MD4 1
640#define PSA_WANT_ALG_MD4 1
641#endif
642
643#if defined(MBEDTLS_MD5_C)
644#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
645#define PSA_WANT_ALG_MD5 1
646#endif
647
648#if defined(MBEDTLS_RIPEMD160_C)
649#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
650#define PSA_WANT_ALG_RIPEMD160 1
651#endif
652
John Durkopd62b6782020-11-30 21:06:05 -0800653#if defined(MBEDTLS_RSA_C)
654#if defined(MBEDTLS_PKCS1_V15)
655#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
656#define PSA_WANT_ALG_RSA_PKCS1V15_CRYPT 1
657#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
658#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN 1
Gilles Peskinecf70d072021-04-19 22:24:23 +0200659#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW 1
Yuto Takano5b4caf22021-08-10 11:26:15 +0100660#endif /* MBEDTLS_PKCS1_V15 */
John Durkopd62b6782020-11-30 21:06:05 -0800661#if defined(MBEDTLS_PKCS1_V21)
662#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
663#define PSA_WANT_ALG_RSA_OAEP 1
664#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
665#define PSA_WANT_ALG_RSA_PSS 1
666#endif /* MBEDTLS_PKCS1_V21 */
667#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR 1
668#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR 1
669#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
670#define PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY 1
671#endif /* MBEDTLS_RSA_C */
672
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100673#if defined(MBEDTLS_SHA1_C)
674#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
675#define PSA_WANT_ALG_SHA_1 1
676#endif
677
678#if defined(MBEDTLS_SHA256_C)
679#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
680#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
Gilles Peskineb65db072021-01-12 00:00:53 +0100681#define PSA_WANT_ALG_SHA_224 1
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100682#define PSA_WANT_ALG_SHA_256 1
683#endif
684
685#if defined(MBEDTLS_SHA512_C)
686#if !defined(MBEDTLS_SHA512_NO_SHA384)
687#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
688#define PSA_WANT_ALG_SHA_384 1
689#endif
690#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
691#define PSA_WANT_ALG_SHA_512 1
692#endif
693
David Brown94933082021-01-05 12:03:25 -0700694#if defined(MBEDTLS_AES_C)
695#define PSA_WANT_KEY_TYPE_AES 1
David Brownda7dbb72021-01-26 11:44:15 -0700696#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700697#endif
698
David Brownec258cf2021-01-05 12:03:25 -0700699#if defined(MBEDTLS_ARC4_C)
700#define PSA_WANT_KEY_TYPE_ARC4 1
David Brown99844272021-01-15 12:04:47 -0700701#define PSA_WANT_ALG_STREAM_CIPHER 1
David Brownda7dbb72021-01-26 11:44:15 -0700702#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARC4 1
David Brown12f45f92021-01-26 11:50:36 -0700703#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brownec258cf2021-01-05 12:03:25 -0700704#endif
705
Gilles Peskine0d3d7422021-10-08 15:48:16 +0200706#if defined(MBEDTLS_ARIA_C)
707#define PSA_WANT_KEY_TYPE_ARIA 1
708#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
709#endif
710
David Brown686e6e82021-01-05 12:03:25 -0700711#if defined(MBEDTLS_CAMELLIA_C)
712#define PSA_WANT_KEY_TYPE_CAMELLIA 1
David Brownda7dbb72021-01-26 11:44:15 -0700713#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700714#endif
715
David Brownb65a7f72021-01-15 12:04:09 -0700716#if defined(MBEDTLS_DES_C)
717#define PSA_WANT_KEY_TYPE_DES 1
David Brownda7dbb72021-01-26 11:44:15 -0700718#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700719#endif
720
David Brownb16727a2021-02-08 16:31:46 -0700721#if defined(MBEDTLS_CHACHA20_C)
722#define PSA_WANT_KEY_TYPE_CHACHA20 1
723#define PSA_WANT_ALG_STREAM_CIPHER 1
724#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
725#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brownac4fa072021-02-08 16:47:35 -0700726#if defined(MBEDTLS_CHACHAPOLY_C)
727#define PSA_WANT_ALG_CHACHA20_POLY1305 1
David Brown86730a82021-02-09 16:24:11 -0700728#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700729#endif
David Brownb16727a2021-02-08 16:31:46 -0700730#endif
731
David Brown99844272021-01-15 12:04:47 -0700732#if defined(MBEDTLS_CIPHER_MODE_CBC)
David Brown10cb81c2021-02-09 16:10:29 -0700733#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700734#define PSA_WANT_ALG_CBC_NO_PADDING 1
735#if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
David Brown12f45f92021-01-26 11:50:36 -0700736#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brown99844272021-01-15 12:04:47 -0700737#define PSA_WANT_ALG_CBC_PKCS7 1
738#endif
739#endif
740
741#if defined(MBEDTLS_AES_C) || defined(MBEDTLS_DES_C) || \
Gilles Peskine0d3d7422021-10-08 15:48:16 +0200742 defined(MBEDTLS_ARIA_C) || defined(MBEDTLS_CAMELLIA_C)
David Brown10cb81c2021-02-09 16:10:29 -0700743#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700744#define PSA_WANT_ALG_ECB_NO_PADDING 1
745#endif
746
747#if defined(MBEDTLS_CIPHER_MODE_CFB)
David Brown12f45f92021-01-26 11:50:36 -0700748#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700749#define PSA_WANT_ALG_CFB 1
750#endif
751
752#if defined(MBEDTLS_CIPHER_MODE_CTR)
David Brown12f45f92021-01-26 11:50:36 -0700753#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700754#define PSA_WANT_ALG_CTR 1
755#endif
756
757#if defined(MBEDTLS_CIPHER_MODE_OFB)
David Brown12f45f92021-01-26 11:50:36 -0700758#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700759#define PSA_WANT_ALG_OFB 1
760#endif
761
762#if defined(MBEDTLS_CIPHER_MODE_XTS)
David Brown12f45f92021-01-26 11:50:36 -0700763#define MBEDTLS_PSA_BUILTIN_ALG_XTS 1
David Brown99844272021-01-15 12:04:47 -0700764#define PSA_WANT_ALG_XTS 1
765#endif
766
David Browneed74df2021-03-15 15:53:57 -0600767#if defined(MBEDTLS_ECP_DP_BP256R1_ENABLED)
768#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
769#define PSA_WANT_ECC_BRAINPOOL_P_R1_256
770#endif
771
772#if defined(MBEDTLS_ECP_DP_BP384R1_ENABLED)
773#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
774#define PSA_WANT_ECC_BRAINPOOL_P_R1_384
775#endif
776
777#if defined(MBEDTLS_ECP_DP_BP512R1_ENABLED)
778#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
779#define PSA_WANT_ECC_BRAINPOOL_P_R1_512
780#endif
781
782#if defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED)
783#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
784#define PSA_WANT_ECC_MONTGOMERY_255
785#endif
786
Dave Rodgman52af7692022-03-31 14:27:24 +0100787/* Curve448 is not yet supported via the PSA API (https://github.com/Mbed-TLS/mbedtls/issues/4249) */
Gilles Peskine82769862021-03-23 12:06:16 +0100788#if 0 && defined(MBEDTLS_ECP_DP_CURVE448_ENABLED)
David Browneed74df2021-03-15 15:53:57 -0600789#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
790#define PSA_WANT_ECC_MONTGOMERY_448
791#endif
792
David Brown8de143e2021-02-19 14:08:00 -0700793#if defined(MBEDTLS_ECP_DP_SECP192R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700794#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
795#define PSA_WANT_ECC_SECP_R1_192
David Brown8de143e2021-02-19 14:08:00 -0700796#endif
797
798#if defined(MBEDTLS_ECP_DP_SECP224R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700799#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
800#define PSA_WANT_ECC_SECP_R1_224
David Brown8de143e2021-02-19 14:08:00 -0700801#endif
802
803#if defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700804#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
805#define PSA_WANT_ECC_SECP_R1_256
David Brown8de143e2021-02-19 14:08:00 -0700806#endif
807
808#if defined(MBEDTLS_ECP_DP_SECP384R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700809#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
810#define PSA_WANT_ECC_SECP_R1_384
David Brown8de143e2021-02-19 14:08:00 -0700811#endif
812
813#if defined(MBEDTLS_ECP_DP_SECP521R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700814#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
815#define PSA_WANT_ECC_SECP_R1_521
David Brown8de143e2021-02-19 14:08:00 -0700816#endif
817
818#if defined(MBEDTLS_ECP_DP_SECP192K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700819#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
820#define PSA_WANT_ECC_SECP_K1_192
David Brown8de143e2021-02-19 14:08:00 -0700821#endif
822
Dave Rodgman52af7692022-03-31 14:27:24 +0100823/* SECP224K1 is buggy via the PSA API (https://github.com/Mbed-TLS/mbedtls/issues/3541) */
Gilles Peskine39841302021-03-23 12:06:45 +0100824#if 0 && defined(MBEDTLS_ECP_DP_SECP224K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700825#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
826#define PSA_WANT_ECC_SECP_K1_224
David Brown8de143e2021-02-19 14:08:00 -0700827#endif
828
David Brown9b178de2021-03-10 13:14:48 -0700829#if defined(MBEDTLS_ECP_DP_SECP256K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700830#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
831#define PSA_WANT_ECC_SECP_K1_256
David Brown8de143e2021-02-19 14:08:00 -0700832#endif
833
John Durkop2dfaf9c2020-09-24 04:30:10 -0700834#endif /* MBEDTLS_PSA_CRYPTO_CONFIG */
John Durkopd8959392020-09-20 23:09:17 -0700835
Gilles Peskine60b29fe2021-02-16 14:06:50 +0100836/* These features are always enabled. */
837#define PSA_WANT_KEY_TYPE_DERIVE 1
838#define PSA_WANT_KEY_TYPE_RAW_DATA 1
839
John Durkop6e33dbe2020-09-17 21:15:13 -0700840#ifdef __cplusplus
841}
842#endif
843
844#endif /* MBEDTLS_CONFIG_PSA_H */