blob: fb0e7c4fafc9732d96ab676615efacd400850cbf [file] [log] [blame]
John Durkop6e33dbe2020-09-17 21:15:13 -07001/**
2 * \file mbedtls/config_psa.h
3 * \brief PSA crypto configuration options (set of defines)
4 *
John Durkop34818822020-10-12 21:36:22 -07005 * This set of compile-time options takes settings defined in
Bence Szépkútibb0cfeb2021-05-28 09:42:25 +02006 * include/mbedtls/mbedtls_config.h and include/psa/crypto_config.h and uses
John Durkop34818822020-10-12 21:36:22 -07007 * those definitions to define symbols used in the library code.
8 *
9 * Users and integrators should not edit this file, please edit
Tom Cosgrove1797b052022-12-04 17:19:59 +000010 * include/mbedtls/mbedtls_config.h for MBEDTLS_XXX settings or
John Durkop34818822020-10-12 21:36:22 -070011 * include/psa/crypto_config.h for PSA_WANT_XXX settings.
John Durkop6e33dbe2020-09-17 21:15:13 -070012 */
13/*
14 * Copyright The Mbed TLS Contributors
15 * SPDX-License-Identifier: Apache-2.0
16 *
17 * Licensed under the Apache License, Version 2.0 (the "License"); you may
18 * not use this file except in compliance with the License.
19 * You may obtain a copy of the License at
20 *
21 * http://www.apache.org/licenses/LICENSE-2.0
22 *
23 * Unless required by applicable law or agreed to in writing, software
24 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
25 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
26 * See the License for the specific language governing permissions and
27 * limitations under the License.
28 */
29
30#ifndef MBEDTLS_CONFIG_PSA_H
31#define MBEDTLS_CONFIG_PSA_H
32
John Durkop714e3a12020-09-29 22:07:04 -070033#if defined(MBEDTLS_PSA_CRYPTO_CONFIG)
Gilles Peskinef4c6eb02022-03-16 17:10:48 +010034#if defined(MBEDTLS_PSA_CRYPTO_CONFIG_FILE)
35#include MBEDTLS_PSA_CRYPTO_CONFIG_FILE
36#else
John Durkop6e33dbe2020-09-17 21:15:13 -070037#include "psa/crypto_config.h"
Gilles Peskinef4c6eb02022-03-16 17:10:48 +010038#endif
John Durkop76228ac2020-09-29 22:33:49 -070039#endif /* defined(MBEDTLS_PSA_CRYPTO_CONFIG) */
John Durkop6e33dbe2020-09-17 21:15:13 -070040
Gilles Peskinef4c6eb02022-03-16 17:10:48 +010041#if defined(MBEDTLS_PSA_CRYPTO_USER_CONFIG_FILE)
42#include MBEDTLS_PSA_CRYPTO_USER_CONFIG_FILE
43#endif
44
John Durkop6e33dbe2020-09-17 21:15:13 -070045#ifdef __cplusplus
46extern "C" {
47#endif
48
Gilles Peskine1231eb52021-04-19 22:24:23 +020049
50
51/****************************************************************/
52/* De facto synonyms */
53/****************************************************************/
54
55#if defined(PSA_WANT_ALG_ECDSA_ANY) && !defined(PSA_WANT_ALG_ECDSA)
56#define PSA_WANT_ALG_ECDSA PSA_WANT_ALG_ECDSA_ANY
57#elif !defined(PSA_WANT_ALG_ECDSA_ANY) && defined(PSA_WANT_ALG_ECDSA)
58#define PSA_WANT_ALG_ECDSA_ANY PSA_WANT_ALG_ECDSA
59#endif
60
Gilles Peskine08622b62022-03-15 16:40:59 +010061#if defined(PSA_WANT_ALG_CCM_STAR_NO_TAG) && !defined(PSA_WANT_ALG_CCM)
62#define PSA_WANT_ALG_CCM PSA_WANT_ALG_CCM_STAR_NO_TAG
63#elif !defined(PSA_WANT_ALG_CCM_STAR_NO_TAG) && defined(PSA_WANT_ALG_CCM)
64#define PSA_WANT_ALG_CCM_STAR_NO_TAG PSA_WANT_ALG_CCM
65#endif
66
Gilles Peskine1231eb52021-04-19 22:24:23 +020067#if defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW) && !defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
68#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW
69#elif !defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW) && defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
70#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW PSA_WANT_ALG_RSA_PKCS1V15_SIGN
71#endif
72
Gilles Peskine44c96aa2021-10-04 18:33:56 +020073#if defined(PSA_WANT_ALG_RSA_PSS_ANY_SALT) && !defined(PSA_WANT_ALG_RSA_PSS)
74#define PSA_WANT_ALG_RSA_PSS PSA_WANT_ALG_RSA_PSS_ANY_SALT
75#elif !defined(PSA_WANT_ALG_RSA_PSS_ANY_SALT) && defined(PSA_WANT_ALG_RSA_PSS)
76#define PSA_WANT_ALG_RSA_PSS_ANY_SALT PSA_WANT_ALG_RSA_PSS
77#endif
78
Gilles Peskine1231eb52021-04-19 22:24:23 +020079
Manuel Pégourié-Gonnard235a9332023-03-14 18:01:23 +010080/****************************************************************/
81/* Hashes that are built in are also enabled in PSA.
82 * This simplifies dependency declarations especially
83 * for modules that obey MBEDTLS_USE_PSA_CRYPTO. */
84/****************************************************************/
85
86#if defined(MBEDTLS_MD5_C)
87#define PSA_WANT_ALG_MD5 1
88#endif
89
90#if defined(MBEDTLS_RIPEMD160_C)
91#define PSA_WANT_ALG_RIPEMD160 1
92#endif
93
94#if defined(MBEDTLS_SHA1_C)
95#define PSA_WANT_ALG_SHA_1 1
96#endif
97
98#if defined(MBEDTLS_SHA224_C)
99#define PSA_WANT_ALG_SHA_224 1
100#endif
101
102#if defined(MBEDTLS_SHA256_C)
103#define PSA_WANT_ALG_SHA_256 1
104#endif
105
106#if defined(MBEDTLS_SHA384_C)
107#define PSA_WANT_ALG_SHA_384 1
108#endif
109
110#if defined(MBEDTLS_SHA512_C)
111#define PSA_WANT_ALG_SHA_512 1
112#endif
113
Gilles Peskine1231eb52021-04-19 22:24:23 +0200114
115/****************************************************************/
116/* Require built-in implementations based on PSA requirements */
117/****************************************************************/
118
John Durkop2dfaf9c2020-09-24 04:30:10 -0700119#if defined(MBEDTLS_PSA_CRYPTO_CONFIG)
John Durkopd8959392020-09-20 23:09:17 -0700120
John Durkopd62b6782020-11-30 21:06:05 -0800121#if defined(PSA_WANT_ALG_DETERMINISTIC_ECDSA)
122#if !defined(MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA)
123#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
124#define MBEDTLS_ECDSA_DETERMINISTIC
125#define MBEDTLS_ECDSA_C
126#define MBEDTLS_HMAC_DRBG_C
127#define MBEDTLS_MD_C
128#endif /* !MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA */
129#endif /* PSA_WANT_ALG_DETERMINISTIC_ECDSA */
130
131#if defined(PSA_WANT_ALG_ECDH)
132#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDH)
133#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
134#define MBEDTLS_ECDH_C
135#define MBEDTLS_ECP_C
136#define MBEDTLS_BIGNUM_C
137#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDH */
138#endif /* PSA_WANT_ALG_ECDH */
139
140#if defined(PSA_WANT_ALG_ECDSA)
141#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDSA)
142#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
143#define MBEDTLS_ECDSA_C
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200144#define MBEDTLS_ECP_C
145#define MBEDTLS_BIGNUM_C
146#define MBEDTLS_ASN1_PARSE_C
147#define MBEDTLS_ASN1_WRITE_C
John Durkopd62b6782020-11-30 21:06:05 -0800148#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDSA */
149#endif /* PSA_WANT_ALG_ECDSA */
150
Przemek Stekiel84ee3e22022-12-01 14:22:34 +0100151#if defined(PSA_WANT_ALG_FFDH)
152#if !defined(MBEDTLS_PSA_ACCEL_ALG_FFDH)
153#define MBEDTLS_PSA_BUILTIN_ALG_FFDH 1
Przemek Stekiel84ee3e22022-12-01 14:22:34 +0100154#define MBEDTLS_BIGNUM_C
155#endif /* !MBEDTLS_PSA_ACCEL_ALG_FFDH */
156#endif /* PSA_WANT_ALG_FFDH */
157
John Durkopd62b6782020-11-30 21:06:05 -0800158#if defined(PSA_WANT_ALG_HKDF)
159#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF)
160#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
161#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
162#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF */
163#endif /* PSA_WANT_ALG_HKDF */
164
Przemek Stekiel3e8249c2022-06-03 14:05:07 +0200165#if defined(PSA_WANT_ALG_HKDF_EXTRACT)
166#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF_EXTRACT)
167#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
168#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXTRACT 1
169#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF_EXTRACT */
170#endif /* PSA_WANT_ALG_HKDF_EXTRACT */
171
172#if defined(PSA_WANT_ALG_HKDF_EXPAND)
173#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF_EXPAND)
174#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
175#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXPAND 1
176#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF_EXPAND */
177#endif /* PSA_WANT_ALG_HKDF_EXPAND */
178
John Durkopd62b6782020-11-30 21:06:05 -0800179#if defined(PSA_WANT_ALG_HMAC)
180#if !defined(MBEDTLS_PSA_ACCEL_ALG_HMAC)
181#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
182#endif /* !MBEDTLS_PSA_ACCEL_ALG_HMAC */
183#endif /* PSA_WANT_ALG_HMAC */
184
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100185#if defined(PSA_WANT_ALG_MD5) && !defined(MBEDTLS_PSA_ACCEL_ALG_MD5)
186#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
187#define MBEDTLS_MD5_C
188#endif
189
Neil Armstronga557cb82022-06-10 08:58:32 +0200190#if defined(PSA_WANT_ALG_JPAKE)
Przemek Stekiel4aa99402023-02-27 13:00:57 +0100191#if !defined(MBEDTLS_PSA_ACCEL_ALG_JPAKE)
Neil Armstrong637d0a02022-05-25 11:28:22 +0200192#define MBEDTLS_PSA_BUILTIN_PAKE 1
Neil Armstronga557cb82022-06-10 08:58:32 +0200193#define MBEDTLS_PSA_BUILTIN_ALG_JPAKE 1
Neil Armstronged407822022-06-15 11:21:33 +0200194#define MBEDTLS_ECP_DP_SECP256R1_ENABLED
Neil Armstrong637d0a02022-05-25 11:28:22 +0200195#define MBEDTLS_BIGNUM_C
196#define MBEDTLS_ECP_C
Neil Armstrong637d0a02022-05-25 11:28:22 +0200197#define MBEDTLS_ECJPAKE_C
Przemek Stekiel4aa99402023-02-27 13:00:57 +0100198#endif /* MBEDTLS_PSA_ACCEL_ALG_JPAKE */
Neil Armstronga557cb82022-06-10 08:58:32 +0200199#endif /* PSA_WANT_ALG_JPAKE */
Neil Armstrong637d0a02022-05-25 11:28:22 +0200200
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100201#if defined(PSA_WANT_ALG_RIPEMD160) && !defined(MBEDTLS_PSA_ACCEL_ALG_RIPEMD160)
202#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
203#define MBEDTLS_RIPEMD160_C
204#endif
205
John Durkopd62b6782020-11-30 21:06:05 -0800206#if defined(PSA_WANT_ALG_RSA_OAEP)
207#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP)
208#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
209#define MBEDTLS_RSA_C
210#define MBEDTLS_BIGNUM_C
211#define MBEDTLS_OID_C
212#define MBEDTLS_PKCS1_V21
John Durkopd62b6782020-11-30 21:06:05 -0800213#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP */
214#endif /* PSA_WANT_ALG_RSA_OAEP */
215
216#if defined(PSA_WANT_ALG_RSA_PKCS1V15_CRYPT)
217#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT)
218#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
219#define MBEDTLS_RSA_C
220#define MBEDTLS_BIGNUM_C
221#define MBEDTLS_OID_C
222#define MBEDTLS_PKCS1_V15
223#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT */
224#endif /* PSA_WANT_ALG_RSA_PKCS1V15_CRYPT */
225
226#if defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
227#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN)
228#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
229#define MBEDTLS_RSA_C
230#define MBEDTLS_BIGNUM_C
231#define MBEDTLS_OID_C
232#define MBEDTLS_PKCS1_V15
John Durkopd62b6782020-11-30 21:06:05 -0800233#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN */
234#endif /* PSA_WANT_ALG_RSA_PKCS1V15_SIGN */
235
236#if defined(PSA_WANT_ALG_RSA_PSS)
237#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PSS)
238#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
239#define MBEDTLS_RSA_C
240#define MBEDTLS_BIGNUM_C
241#define MBEDTLS_OID_C
242#define MBEDTLS_PKCS1_V21
John Durkopd62b6782020-11-30 21:06:05 -0800243#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PSS */
244#endif /* PSA_WANT_ALG_RSA_PSS */
245
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100246#if defined(PSA_WANT_ALG_SHA_1) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_1)
247#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
248#define MBEDTLS_SHA1_C
249#endif
250
251#if defined(PSA_WANT_ALG_SHA_224) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_224)
252#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200253#define MBEDTLS_SHA224_C
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100254#endif
255
256#if defined(PSA_WANT_ALG_SHA_256) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_256)
257#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
258#define MBEDTLS_SHA256_C
259#endif
260
261#if defined(PSA_WANT_ALG_SHA_384) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_384)
262#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200263#define MBEDTLS_SHA384_C
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100264#endif
265
266#if defined(PSA_WANT_ALG_SHA_512) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_512)
267#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
268#define MBEDTLS_SHA512_C
269#endif
270
Kusumit Ghoderao83baf892023-05-03 11:42:29 +0530271#if defined(PSA_WANT_ALG_PBKDF2_HMAC)
272#if !defined(MBEDTLS_PSA_ACCEL_ALG_PBKDF2_HMAC)
273#define MBEDTLS_PSA_BUILTIN_ALG_PBKDF2_HMAC 1
Kusumit Ghoderaob9410e82023-05-03 18:36:35 +0530274#if !defined(MBEDTLS_PSA_ACCEL_ALG_HMAC)
Kusumit Ghoderao83baf892023-05-03 11:42:29 +0530275#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
Kusumit Ghoderaob9410e82023-05-03 18:36:35 +0530276#endif /* !MBEDTLS_PSA_ACCEL_ALG_HMAC */
Kusumit Ghoderao83baf892023-05-03 11:42:29 +0530277#endif /* !MBEDTLS_PSA_BUILTIN_ALG_PBKDF2_HMAC */
278#endif /* PSA_WANT_ALG_PBKDF2_HMAC */
279
John Durkop07cc04a2020-11-16 22:08:34 -0800280#if defined(PSA_WANT_ALG_TLS12_PRF)
281#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF)
John Durkopd62b6782020-11-30 21:06:05 -0800282#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
John Durkop07cc04a2020-11-16 22:08:34 -0800283#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF */
284#endif /* PSA_WANT_ALG_TLS12_PRF */
285
286#if defined(PSA_WANT_ALG_TLS12_PSK_TO_MS)
287#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS)
John Durkopd62b6782020-11-30 21:06:05 -0800288#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
John Durkop07cc04a2020-11-16 22:08:34 -0800289#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS */
290#endif /* PSA_WANT_ALG_TLS12_PSK_TO_MS */
291
Andrzej Kurek08d34b82022-07-29 10:00:16 -0400292#if defined(PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS)
293#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_ECJPAKE_TO_PMS)
294#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_ECJPAKE_TO_PMS 1
295#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_ECJPAKE_TO_PMS */
296#endif /* PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS */
297
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200298#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_USE)
299#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_USE)
300#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_USE 1
John Durkop07cc04a2020-11-16 22:08:34 -0800301#define MBEDTLS_ECP_C
302#define MBEDTLS_BIGNUM_C
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200303#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_USE */
304#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_USE */
John Durkop07cc04a2020-11-16 22:08:34 -0800305
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200306#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT)
307#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_IMPORT)
308#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_IMPORT 1
309#define MBEDTLS_ECP_C
Przemek Stekiel84ee3e22022-12-01 14:22:34 +0100310#define MBEDTLS_BIGNUM_C
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200311#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_IMPORT */
312#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT */
313
314#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT)
315#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_EXPORT)
316#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_EXPORT 1
317#define MBEDTLS_ECP_C
318#define MBEDTLS_BIGNUM_C
319#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_EXPORT */
320#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT */
321
322#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE)
323#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_GENERATE)
324#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_GENERATE 1
325#define MBEDTLS_ECP_C
326#define MBEDTLS_BIGNUM_C
327#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_GENERATE */
328#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE */
329
330#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE)
331#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_DERIVE)
332#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_DERIVE 1
333#define MBEDTLS_ECP_C
334#define MBEDTLS_BIGNUM_C
335#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_DERIVE */
336#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE */
337
338#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_USE)
339#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_USE)
340#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_USE 1
341#define MBEDTLS_RSA_C
342#define MBEDTLS_BIGNUM_C
343#define MBEDTLS_OID_C
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200344#define MBEDTLS_PK_PARSE_C
345#define MBEDTLS_PK_WRITE_C
346#define MBEDTLS_PK_C
347#define MBEDTLS_ASN1_PARSE_C
348#define MBEDTLS_ASN1_WRITE_C
349#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_USE */
350#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_USE */
351
352#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_IMPORT)
353#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_IMPORT)
354#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_IMPORT 1
355#define MBEDTLS_RSA_C
356#define MBEDTLS_BIGNUM_C
357#define MBEDTLS_OID_C
358#define MBEDTLS_PK_PARSE_C
359#define MBEDTLS_PK_WRITE_C
360#define MBEDTLS_PK_C
361#define MBEDTLS_ASN1_PARSE_C
362#define MBEDTLS_ASN1_WRITE_C
363#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_IMPORT */
364#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_IMPORT */
365
366#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_EXPORT)
367#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_EXPORT)
368#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_EXPORT 1
369#define MBEDTLS_RSA_C
370#define MBEDTLS_BIGNUM_C
371#define MBEDTLS_OID_C
372#define MBEDTLS_PK_PARSE_C
373#define MBEDTLS_PK_WRITE_C
374#define MBEDTLS_PK_C
375#define MBEDTLS_ASN1_PARSE_C
376#define MBEDTLS_ASN1_WRITE_C
377#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_EXPORT */
378#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_EXPORT */
379
380#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_GENERATE)
381#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_GENERATE)
382#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_GENERATE 1
383#define MBEDTLS_RSA_C
384#define MBEDTLS_BIGNUM_C
385#define MBEDTLS_OID_C
386#define MBEDTLS_GENPRIME
387#define MBEDTLS_PK_PARSE_C
388#define MBEDTLS_PK_WRITE_C
389#define MBEDTLS_PK_C
390#define MBEDTLS_ASN1_PARSE_C
391#define MBEDTLS_ASN1_WRITE_C
392#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_GENERATE */
393#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_GENERATE */
394
395#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_USE)
396#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_USE)
397#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_USE 1
398#define MBEDTLS_BIGNUM_C
399#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_USE */
400#endif /* PSA_WANT_KEY_TYPE_DH_KEY_PAIR_USE */
401
402#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_IMPORT)
403#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_IMPORT)
404#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_IMPORT 1
405#define MBEDTLS_BIGNUM_C
406#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_IMPORT */
407#endif /* PSA_WANT_KEY_TYPE_DH_KEY_PAIR_IMPORT */
408
409#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_EXPORT)
410#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_EXPORT)
411#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT 1
412#define MBEDTLS_BIGNUM_C
413#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_EXPORT */
414#endif /* PSA_WANT_KEY_TYPE_DH_KEY_PAIR_EXPORT */
415
416#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_GENERATE)
417#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_GENERATE)
418#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE 1
419#define MBEDTLS_BIGNUM_C
420#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_GENERATE */
421#endif /* PSA_WANT_KEY_TYPE_DH_KEY_PAIR_GENERATE */
422
John Durkop07cc04a2020-11-16 22:08:34 -0800423#if defined(PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY)
424#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800425#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
John Durkop07cc04a2020-11-16 22:08:34 -0800426#define MBEDTLS_ECP_C
427#define MBEDTLS_BIGNUM_C
428#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY */
429#endif /* PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY */
430
Przemek Stekiel6d85afa2023-04-28 11:42:17 +0200431#if defined(PSA_WANT_KEY_TYPE_DH_PUBLIC_KEY)
432#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_PUBLIC_KEY)
433#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY 1
Przemek Stekiel87d9a4a2022-12-15 13:22:11 +0100434#define MBEDTLS_BIGNUM_C
Przemek Stekiel6d85afa2023-04-28 11:42:17 +0200435#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_PUBLIC_KEY */
436#endif /* PSA_WANT_KEY_TYPE_DH_PUBLIC_KEY */
Przemek Stekiel87d9a4a2022-12-15 13:22:11 +0100437
John Durkop9814fa22020-11-04 12:28:15 -0800438#if defined(PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkop0e005192020-10-31 22:06:54 -0700439#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800440#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
John Durkop0e005192020-10-31 22:06:54 -0700441#define MBEDTLS_RSA_C
442#define MBEDTLS_BIGNUM_C
443#define MBEDTLS_OID_C
John Durkop07cc04a2020-11-16 22:08:34 -0800444#define MBEDTLS_PK_PARSE_C
445#define MBEDTLS_PK_WRITE_C
446#define MBEDTLS_PK_C
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200447#define MBEDTLS_ASN1_PARSE_C
448#define MBEDTLS_ASN1_WRITE_C
John Durkop0e005192020-10-31 22:06:54 -0700449#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkop9814fa22020-11-04 12:28:15 -0800450#endif /* PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkopd0321952020-10-29 21:37:36 -0700451
David Brownb781f752021-02-08 15:44:52 -0700452/* If any of the block modes are requested that don't have an
453 * associated HW assist, define PSA_HAVE_SOFT_BLOCK_MODE for checking
454 * in the block cipher key types. */
455#if (defined(PSA_WANT_ALG_CTR) && !defined(MBEDTLS_PSA_ACCEL_ALG_CTR)) || \
Bence Szépkúti7921cce2021-02-17 11:46:50 +0100456 (defined(PSA_WANT_ALG_CFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_CFB)) || \
David Brownb781f752021-02-08 15:44:52 -0700457 (defined(PSA_WANT_ALG_OFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_OFB)) || \
David Brownb781f752021-02-08 15:44:52 -0700458 defined(PSA_WANT_ALG_ECB_NO_PADDING) || \
459 (defined(PSA_WANT_ALG_CBC_NO_PADDING) && \
Gilles Peskine449bd832023-01-11 14:50:10 +0100460 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING)) || \
David Brownb781f752021-02-08 15:44:52 -0700461 (defined(PSA_WANT_ALG_CBC_PKCS7) && \
Gilles Peskine449bd832023-01-11 14:50:10 +0100462 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7)) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100463 (defined(PSA_WANT_ALG_CMAC) && !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC))
David Brownb781f752021-02-08 15:44:52 -0700464#define PSA_HAVE_SOFT_BLOCK_MODE 1
465#endif
466
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100467#if (defined(PSA_WANT_ALG_GCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_GCM)) || \
468 (defined(PSA_WANT_ALG_CCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_CCM))
469#define PSA_HAVE_SOFT_BLOCK_AEAD 1
470#endif
471
David Brown94933082021-01-05 12:03:25 -0700472#if defined(PSA_WANT_KEY_TYPE_AES)
David Browne1f91f02021-02-09 15:56:22 -0700473#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_AES)
474#define PSA_HAVE_SOFT_KEY_TYPE_AES 1
475#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_AES */
476#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100477 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
478 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
David Brown78a429b2021-01-21 09:48:57 -0700479#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700480#define MBEDTLS_AES_C
David Browne1f91f02021-02-09 15:56:22 -0700481#endif /* PSA_HAVE_SOFT_KEY_TYPE_AES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown94933082021-01-05 12:03:25 -0700482#endif /* PSA_WANT_KEY_TYPE_AES */
483
Gilles Peskine09c46da2021-10-08 15:48:16 +0200484#if defined(PSA_WANT_KEY_TYPE_ARIA)
485#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA)
486#define PSA_HAVE_SOFT_KEY_TYPE_ARIA 1
487#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA */
488#if defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
489 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
490 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
491#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
492#define MBEDTLS_ARIA_C
493#endif /* PSA_HAVE_SOFT_KEY_TYPE_ARIA || PSA_HAVE_SOFT_BLOCK_MODE */
494#endif /* PSA_WANT_KEY_TYPE_ARIA */
495
David Brown686e6e82021-01-05 12:03:25 -0700496#if defined(PSA_WANT_KEY_TYPE_CAMELLIA)
David Browne1f91f02021-02-09 15:56:22 -0700497#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA)
498#define PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA 1
499#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA */
500#if defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100501 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
502 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
David Brown78a429b2021-01-21 09:48:57 -0700503#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700504#define MBEDTLS_CAMELLIA_C
David Browne1f91f02021-02-09 15:56:22 -0700505#endif /* PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown686e6e82021-01-05 12:03:25 -0700506#endif /* PSA_WANT_KEY_TYPE_CAMELLIA */
507
David Brownb65a7f72021-01-15 12:04:09 -0700508#if defined(PSA_WANT_KEY_TYPE_DES)
David Browne1f91f02021-02-09 15:56:22 -0700509#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DES)
510#define PSA_HAVE_SOFT_KEY_TYPE_DES 1
511#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DES */
512#if defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
David Brownb781f752021-02-08 15:44:52 -0700513 defined(PSA_HAVE_SOFT_BLOCK_MODE)
David Brown78a429b2021-01-21 09:48:57 -0700514#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700515#define MBEDTLS_DES_C
David Browne1f91f02021-02-09 15:56:22 -0700516#endif /*PSA_HAVE_SOFT_KEY_TYPE_DES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brownb65a7f72021-01-15 12:04:09 -0700517#endif /* PSA_WANT_KEY_TYPE_DES */
518
David Brownb16727a2021-02-08 16:31:46 -0700519#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
520#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20)
521#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
522#define MBEDTLS_CHACHA20_C
523#endif /*!MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20 */
524#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
525
David Brownf84a0f62021-02-09 15:59:41 -0700526/* If any of the software block ciphers are selected, define
527 * PSA_HAVE_SOFT_BLOCK_CIPHER, which can be used in any of these
528 * situations. */
529#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200530 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
David Brownf84a0f62021-02-09 15:59:41 -0700531 defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
532 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
533#define PSA_HAVE_SOFT_BLOCK_CIPHER 1
534#endif
535
David Brown99844272021-01-15 12:04:47 -0700536#if defined(PSA_WANT_ALG_STREAM_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700537#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brown99844272021-01-15 12:04:47 -0700538#endif /* PSA_WANT_ALG_STREAM_CIPHER */
539
Ronald Crond85e98d2021-03-25 15:32:32 +0100540#if defined(PSA_WANT_ALG_CBC_MAC)
541#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_MAC)
542#error "CBC-MAC is not yet supported via the PSA API in Mbed TLS."
543#define MBEDTLS_PSA_BUILTIN_ALG_CBC_MAC 1
544#endif /* !MBEDTLS_PSA_ACCEL_ALG_CBC_MAC */
545#endif /* PSA_WANT_ALG_CBC_MAC */
546
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100547#if defined(PSA_WANT_ALG_CMAC)
548#if !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC) || \
549 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
550#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
551#define MBEDTLS_CMAC_C
552#endif /* !MBEDTLS_PSA_ACCEL_ALG_CMAC */
553#endif /* PSA_WANT_ALG_CMAC */
554
David Brown99844272021-01-15 12:04:47 -0700555#if defined(PSA_WANT_ALG_CTR)
David Brown4b9ec7a2021-02-05 12:47:08 -0700556#if !defined(MBEDTLS_PSA_ACCEL_ALG_CTR) || \
David Brownf84a0f62021-02-09 15:59:41 -0700557 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700558#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700559#define MBEDTLS_CIPHER_MODE_CTR
David Brown4b9ec7a2021-02-05 12:47:08 -0700560#endif
David Brown99844272021-01-15 12:04:47 -0700561#endif /* PSA_WANT_ALG_CTR */
562
563#if defined(PSA_WANT_ALG_CFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700564#if !defined(MBEDTLS_PSA_ACCEL_ALG_CFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700565 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700566#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700567#define MBEDTLS_CIPHER_MODE_CFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700568#endif
David Brown99844272021-01-15 12:04:47 -0700569#endif /* PSA_WANT_ALG_CFB */
570
571#if defined(PSA_WANT_ALG_OFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700572#if !defined(MBEDTLS_PSA_ACCEL_ALG_OFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700573 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700574#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700575#define MBEDTLS_CIPHER_MODE_OFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700576#endif
David Brown99844272021-01-15 12:04:47 -0700577#endif /* PSA_WANT_ALG_OFB */
578
Gilles Peskine7a2e83b2022-03-17 11:09:23 +0100579#if defined(PSA_WANT_ALG_ECB_NO_PADDING) && \
580 !defined(MBEDTLS_PSA_ACCEL_ALG_ECB_NO_PADDING)
David Brownbe380c12021-02-11 10:55:48 -0700581#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700582#endif
583
David Brown12f45f92021-01-26 11:50:36 -0700584#if defined(PSA_WANT_ALG_CBC_NO_PADDING)
David Brown4b9ec7a2021-02-05 12:47:08 -0700585#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING) || \
David Brownfc468182021-02-09 16:23:34 -0700586 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700587#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700588#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown4b9ec7a2021-02-05 12:47:08 -0700589#endif
David Brown12f45f92021-01-26 11:50:36 -0700590#endif /* PSA_WANT_ALG_CBC_NO_PADDING */
591
592#if defined(PSA_WANT_ALG_CBC_PKCS7)
David Brown4b9ec7a2021-02-05 12:47:08 -0700593#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7) || \
David Brownfc468182021-02-09 16:23:34 -0700594 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700595#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700596#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brownfc468182021-02-09 16:23:34 -0700597#define MBEDTLS_CIPHER_PADDING_PKCS7
David Brown4b9ec7a2021-02-05 12:47:08 -0700598#endif
David Brown12f45f92021-01-26 11:50:36 -0700599#endif /* PSA_WANT_ALG_CBC_PKCS7 */
600
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100601#if defined(PSA_WANT_ALG_CCM)
602#if !defined(MBEDTLS_PSA_ACCEL_ALG_CCM) || \
603 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200604 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100605 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
606#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100607#define MBEDTLS_PSA_BUILTIN_ALG_CCM_STAR_NO_TAG 1
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100608#define MBEDTLS_CCM_C
609#endif
610#endif /* PSA_WANT_ALG_CCM */
611
612#if defined(PSA_WANT_ALG_GCM)
613#if !defined(MBEDTLS_PSA_ACCEL_ALG_GCM) || \
614 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200615 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100616 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
617#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
618#define MBEDTLS_GCM_C
619#endif
620#endif /* PSA_WANT_ALG_GCM */
621
David Brownac4fa072021-02-08 16:47:35 -0700622#if defined(PSA_WANT_ALG_CHACHA20_POLY1305)
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200623#if !defined(MBEDTLS_PSA_ACCEL_ALG_CHACHA20_POLY1305)
David Brownac4fa072021-02-08 16:47:35 -0700624#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
625#define MBEDTLS_CHACHAPOLY_C
Summer Qin9f2596f2022-06-17 12:50:32 +0800626#define MBEDTLS_CHACHA20_C
627#define MBEDTLS_POLY1305_C
David Brown86730a82021-02-09 16:24:11 -0700628#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700629#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200630#endif /* !MBEDTLS_PSA_ACCEL_ALG_CHACHA20_POLY1305 */
David Brownac4fa072021-02-08 16:47:35 -0700631#endif /* PSA_WANT_ALG_CHACHA20_POLY1305 */
632
David Browneed74df2021-03-15 15:53:57 -0600633#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_256)
634#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256)
635#define MBEDTLS_ECP_DP_BP256R1_ENABLED
636#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
637#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256 */
638#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_256 */
639
640#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_384)
641#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384)
642#define MBEDTLS_ECP_DP_BP384R1_ENABLED
643#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
644#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384 */
645#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_384 */
646
647#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_512)
648#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512)
649#define MBEDTLS_ECP_DP_BP512R1_ENABLED
650#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
651#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512 */
652#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_512 */
653
654#if defined(PSA_WANT_ECC_MONTGOMERY_255)
655#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255)
656#define MBEDTLS_ECP_DP_CURVE25519_ENABLED
657#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
658#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255 */
659#endif /* PSA_WANT_ECC_MONTGOMERY_255 */
660
661#if defined(PSA_WANT_ECC_MONTGOMERY_448)
662#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448)
663#define MBEDTLS_ECP_DP_CURVE448_ENABLED
664#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
665#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448 */
666#endif /* PSA_WANT_ECC_MONTGOMERY_448 */
667
David Brownc7b9b2b2021-02-19 21:05:52 -0700668#if defined(PSA_WANT_ECC_SECP_R1_192)
669#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192)
670#define MBEDTLS_ECP_DP_SECP192R1_ENABLED
671#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
672#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192 */
673#endif /* PSA_WANT_ECC_SECP_R1_192 */
674
675#if defined(PSA_WANT_ECC_SECP_R1_224)
676#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224)
677#define MBEDTLS_ECP_DP_SECP224R1_ENABLED
678#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
679#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224 */
680#endif /* PSA_WANT_ECC_SECP_R1_224 */
681
682#if defined(PSA_WANT_ECC_SECP_R1_256)
683#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256)
684#define MBEDTLS_ECP_DP_SECP256R1_ENABLED
685#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
686#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256 */
687#endif /* PSA_WANT_ECC_SECP_R1_256 */
688
689#if defined(PSA_WANT_ECC_SECP_R1_384)
690#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384)
691#define MBEDTLS_ECP_DP_SECP384R1_ENABLED
692#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
693#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384 */
694#endif /* PSA_WANT_ECC_SECP_R1_384 */
695
696#if defined(PSA_WANT_ECC_SECP_R1_521)
697#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521)
698#define MBEDTLS_ECP_DP_SECP521R1_ENABLED
699#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
700#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521 */
701#endif /* PSA_WANT_ECC_SECP_R1_521 */
702
703#if defined(PSA_WANT_ECC_SECP_K1_192)
704#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192)
David Brown8de143e2021-02-19 14:08:00 -0700705#define MBEDTLS_ECP_DP_SECP192K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700706#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
707#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192 */
708#endif /* PSA_WANT_ECC_SECP_K1_192 */
David Brown8de143e2021-02-19 14:08:00 -0700709
David Brownc7b9b2b2021-02-19 21:05:52 -0700710#if defined(PSA_WANT_ECC_SECP_K1_224)
711#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224)
Ronald Crone1f55162021-03-25 15:09:47 +0100712/*
713 * SECP224K1 is buggy via the PSA API in Mbed TLS
Dave Rodgman017a1992022-03-31 14:07:01 +0100714 * (https://github.com/Mbed-TLS/mbedtls/issues/3541).
Ronald Crone1f55162021-03-25 15:09:47 +0100715 */
716#error "SECP224K1 is buggy via the PSA API in Mbed TLS."
David Brown8de143e2021-02-19 14:08:00 -0700717#define MBEDTLS_ECP_DP_SECP224K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700718#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
719#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224 */
720#endif /* PSA_WANT_ECC_SECP_K1_224 */
David Brown8de143e2021-02-19 14:08:00 -0700721
David Brownc7b9b2b2021-02-19 21:05:52 -0700722#if defined(PSA_WANT_ECC_SECP_K1_256)
723#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256)
David Brown9b178de2021-03-10 13:14:48 -0700724#define MBEDTLS_ECP_DP_SECP256K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700725#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
726#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256 */
727#endif /* PSA_WANT_ECC_SECP_K1_256 */
David Brown8de143e2021-02-19 14:08:00 -0700728
Gilles Peskine1231eb52021-04-19 22:24:23 +0200729
730
731/****************************************************************/
732/* Infer PSA requirements from Mbed TLS capabilities */
733/****************************************************************/
734
John Durkop714e3a12020-09-29 22:07:04 -0700735#else /* MBEDTLS_PSA_CRYPTO_CONFIG */
736
737/*
738 * Ensure PSA_WANT_* defines are setup properly if MBEDTLS_PSA_CRYPTO_CONFIG
739 * is not defined
740 */
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100741
Ronald Cron3d471812021-03-18 13:40:31 +0100742#if defined(MBEDTLS_CCM_C)
743#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100744#define MBEDTLS_PSA_BUILTIN_ALG_CCM_STAR_NO_TAG 1
Ronald Cron3d471812021-03-18 13:40:31 +0100745#define PSA_WANT_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100746#define PSA_WANT_ALG_CCM_STAR_NO_TAG 1
Ronald Cron3d471812021-03-18 13:40:31 +0100747#endif /* MBEDTLS_CCM_C */
748
749#if defined(MBEDTLS_CMAC_C)
750#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
751#define PSA_WANT_ALG_CMAC 1
752#endif /* MBEDTLS_CMAC_C */
753
John Durkopd62b6782020-11-30 21:06:05 -0800754#if defined(MBEDTLS_ECDH_C)
755#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
756#define PSA_WANT_ALG_ECDH 1
757#endif /* MBEDTLS_ECDH_C */
758
759#if defined(MBEDTLS_ECDSA_C)
760#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
761#define PSA_WANT_ALG_ECDSA 1
Gilles Peskine1231eb52021-04-19 22:24:23 +0200762#define PSA_WANT_ALG_ECDSA_ANY 1
John Durkopd62b6782020-11-30 21:06:05 -0800763
764// Only add in DETERMINISTIC support if ECDSA is also enabled
765#if defined(MBEDTLS_ECDSA_DETERMINISTIC)
766#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
767#define PSA_WANT_ALG_DETERMINISTIC_ECDSA 1
768#endif /* MBEDTLS_ECDSA_DETERMINISTIC */
769
770#endif /* MBEDTLS_ECDSA_C */
771
772#if defined(MBEDTLS_ECP_C)
Valerio Settif87b5052023-05-26 13:47:09 +0200773#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_LEGACY 1
774#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_USE 1
775#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT 1
776#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT 1
777#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE 1
778#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE 1
John Durkopd62b6782020-11-30 21:06:05 -0800779#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
780#define PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY 1
781#endif /* MBEDTLS_ECP_C */
782
Przemek Stekiel746dfae2023-05-04 09:14:08 +0200783#if defined(MBEDTLS_DHM_C)
Valerio Settif87b5052023-05-26 13:47:09 +0200784#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_USE 1
785#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_IMPORT 1
786#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_EXPORT 1
Valerio Settif87b5052023-05-26 13:47:09 +0200787#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_GENERATE 1
Przemek Stekiel746dfae2023-05-04 09:14:08 +0200788#define PSA_WANT_KEY_TYPE_DH_PUBLIC_KEY 1
789#define PSA_WANT_ALG_FFDH 1
790#define PSA_WANT_DH_FAMILY_RFC7919 1
791#define MBEDTLS_PSA_BUILTIN_ALG_FFDH 1
Valerio Settif87b5052023-05-26 13:47:09 +0200792#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_USE 1
793#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_IMPORT 1
794#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT 1
795#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE 1
Przemek Stekiel746dfae2023-05-04 09:14:08 +0200796#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY 1
797#endif /* MBEDTLS_DHM_C */
798
Ronald Cron3d471812021-03-18 13:40:31 +0100799#if defined(MBEDTLS_GCM_C)
800#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
801#define PSA_WANT_ALG_GCM 1
802#endif /* MBEDTLS_GCM_C */
803
Przemek Stekiel18399d82022-06-27 13:34:50 +0200804/* Enable PSA HKDF algorithm if mbedtls HKDF is supported.
805 * PSA HKDF EXTRACT and PSA HKDF EXPAND have minimal cost when
806 * PSA HKDF is enabled, so enable both algorithms together
807 * with PSA HKDF. */
John Durkopd62b6782020-11-30 21:06:05 -0800808#if defined(MBEDTLS_HKDF_C)
809#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
810#define PSA_WANT_ALG_HMAC 1
811#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
812#define PSA_WANT_ALG_HKDF 1
Przemek Stekielb33bd192022-06-21 09:58:51 +0200813#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXTRACT 1
814#define PSA_WANT_ALG_HKDF_EXTRACT 1
815#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXPAND 1
816#define PSA_WANT_ALG_HKDF_EXPAND 1
John Durkopd62b6782020-11-30 21:06:05 -0800817#endif /* MBEDTLS_HKDF_C */
818
John Durkopd62b6782020-11-30 21:06:05 -0800819#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
820#define PSA_WANT_ALG_HMAC 1
Gilles Peskine47a89332021-01-12 00:00:15 +0100821#define PSA_WANT_KEY_TYPE_HMAC
Andrzej Kurek65bf73e2022-08-31 14:59:31 -0400822
823#if defined(MBEDTLS_MD_C)
John Durkopd62b6782020-11-30 21:06:05 -0800824#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
825#define PSA_WANT_ALG_TLS12_PRF 1
826#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
827#define PSA_WANT_ALG_TLS12_PSK_TO_MS 1
828#endif /* MBEDTLS_MD_C */
829
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100830#if defined(MBEDTLS_MD5_C)
831#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
832#define PSA_WANT_ALG_MD5 1
833#endif
834
Neil Armstrong637d0a02022-05-25 11:28:22 +0200835#if defined(MBEDTLS_ECJPAKE_C)
836#define MBEDTLS_PSA_BUILTIN_PAKE 1
Neil Armstronga557cb82022-06-10 08:58:32 +0200837#define MBEDTLS_PSA_BUILTIN_ALG_JPAKE 1
838#define PSA_WANT_ALG_JPAKE 1
Neil Armstrong637d0a02022-05-25 11:28:22 +0200839#endif
840
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100841#if defined(MBEDTLS_RIPEMD160_C)
842#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
843#define PSA_WANT_ALG_RIPEMD160 1
844#endif
845
John Durkopd62b6782020-11-30 21:06:05 -0800846#if defined(MBEDTLS_RSA_C)
847#if defined(MBEDTLS_PKCS1_V15)
848#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
849#define PSA_WANT_ALG_RSA_PKCS1V15_CRYPT 1
850#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
851#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN 1
Gilles Peskine1231eb52021-04-19 22:24:23 +0200852#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW 1
Yuto Takano7828ca22021-08-10 11:26:15 +0100853#endif /* MBEDTLS_PKCS1_V15 */
John Durkopd62b6782020-11-30 21:06:05 -0800854#if defined(MBEDTLS_PKCS1_V21)
855#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
856#define PSA_WANT_ALG_RSA_OAEP 1
857#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
858#define PSA_WANT_ALG_RSA_PSS 1
859#endif /* MBEDTLS_PKCS1_V21 */
Valerio Settif87b5052023-05-26 13:47:09 +0200860#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_USE 1
861#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_IMPORT 1
862#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_EXPORT 1
863#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_GENERATE 1
864#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_USE 1
865#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_IMPORT 1
866#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_EXPORT 1
867#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_GENERATE 1
John Durkopd62b6782020-11-30 21:06:05 -0800868#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
869#define PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY 1
870#endif /* MBEDTLS_RSA_C */
871
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100872#if defined(MBEDTLS_SHA1_C)
873#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
874#define PSA_WANT_ALG_SHA_1 1
875#endif
876
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200877#if defined(MBEDTLS_SHA224_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100878#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
Gilles Peskineb65db072021-01-12 00:00:53 +0100879#define PSA_WANT_ALG_SHA_224 1
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200880#endif
881
882#if defined(MBEDTLS_SHA256_C)
883#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100884#define PSA_WANT_ALG_SHA_256 1
885#endif
886
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200887#if defined(MBEDTLS_SHA384_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100888#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
889#define PSA_WANT_ALG_SHA_384 1
890#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200891
892#if defined(MBEDTLS_SHA512_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100893#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
894#define PSA_WANT_ALG_SHA_512 1
895#endif
896
David Brown94933082021-01-05 12:03:25 -0700897#if defined(MBEDTLS_AES_C)
898#define PSA_WANT_KEY_TYPE_AES 1
David Brownda7dbb72021-01-26 11:44:15 -0700899#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700900#endif
901
Gilles Peskine09c46da2021-10-08 15:48:16 +0200902#if defined(MBEDTLS_ARIA_C)
903#define PSA_WANT_KEY_TYPE_ARIA 1
904#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
905#endif
906
David Brown686e6e82021-01-05 12:03:25 -0700907#if defined(MBEDTLS_CAMELLIA_C)
908#define PSA_WANT_KEY_TYPE_CAMELLIA 1
David Brownda7dbb72021-01-26 11:44:15 -0700909#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700910#endif
911
David Brownb65a7f72021-01-15 12:04:09 -0700912#if defined(MBEDTLS_DES_C)
913#define PSA_WANT_KEY_TYPE_DES 1
David Brownda7dbb72021-01-26 11:44:15 -0700914#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700915#endif
916
Andrzej Kurekd60907b2022-09-14 10:02:30 -0400917#if defined(MBEDTLS_PSA_BUILTIN_ALG_SHA_256)
918#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_ECJPAKE_TO_PMS 1
919#define PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS 1
920#endif
921
David Brownb16727a2021-02-08 16:31:46 -0700922#if defined(MBEDTLS_CHACHA20_C)
923#define PSA_WANT_KEY_TYPE_CHACHA20 1
924#define PSA_WANT_ALG_STREAM_CIPHER 1
925#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
926#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brownac4fa072021-02-08 16:47:35 -0700927#if defined(MBEDTLS_CHACHAPOLY_C)
928#define PSA_WANT_ALG_CHACHA20_POLY1305 1
David Brown86730a82021-02-09 16:24:11 -0700929#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700930#endif
David Brownb16727a2021-02-08 16:31:46 -0700931#endif
932
David Brown99844272021-01-15 12:04:47 -0700933#if defined(MBEDTLS_CIPHER_MODE_CBC)
David Brown10cb81c2021-02-09 16:10:29 -0700934#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700935#define PSA_WANT_ALG_CBC_NO_PADDING 1
936#if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
David Brown12f45f92021-01-26 11:50:36 -0700937#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brown99844272021-01-15 12:04:47 -0700938#define PSA_WANT_ALG_CBC_PKCS7 1
939#endif
940#endif
941
942#if defined(MBEDTLS_AES_C) || defined(MBEDTLS_DES_C) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200943 defined(MBEDTLS_ARIA_C) || defined(MBEDTLS_CAMELLIA_C)
David Brown10cb81c2021-02-09 16:10:29 -0700944#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700945#define PSA_WANT_ALG_ECB_NO_PADDING 1
946#endif
947
948#if defined(MBEDTLS_CIPHER_MODE_CFB)
David Brown12f45f92021-01-26 11:50:36 -0700949#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700950#define PSA_WANT_ALG_CFB 1
951#endif
952
953#if defined(MBEDTLS_CIPHER_MODE_CTR)
David Brown12f45f92021-01-26 11:50:36 -0700954#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700955#define PSA_WANT_ALG_CTR 1
956#endif
957
958#if defined(MBEDTLS_CIPHER_MODE_OFB)
David Brown12f45f92021-01-26 11:50:36 -0700959#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700960#define PSA_WANT_ALG_OFB 1
961#endif
962
David Browneed74df2021-03-15 15:53:57 -0600963#if defined(MBEDTLS_ECP_DP_BP256R1_ENABLED)
964#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
965#define PSA_WANT_ECC_BRAINPOOL_P_R1_256
966#endif
967
968#if defined(MBEDTLS_ECP_DP_BP384R1_ENABLED)
969#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
970#define PSA_WANT_ECC_BRAINPOOL_P_R1_384
971#endif
972
973#if defined(MBEDTLS_ECP_DP_BP512R1_ENABLED)
974#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
975#define PSA_WANT_ECC_BRAINPOOL_P_R1_512
976#endif
977
978#if defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED)
979#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
980#define PSA_WANT_ECC_MONTGOMERY_255
981#endif
982
Archanaef6aa5c2021-06-08 11:40:10 +0530983#if defined(MBEDTLS_ECP_DP_CURVE448_ENABLED)
David Browneed74df2021-03-15 15:53:57 -0600984#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
985#define PSA_WANT_ECC_MONTGOMERY_448
986#endif
987
David Brown8de143e2021-02-19 14:08:00 -0700988#if defined(MBEDTLS_ECP_DP_SECP192R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700989#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
990#define PSA_WANT_ECC_SECP_R1_192
David Brown8de143e2021-02-19 14:08:00 -0700991#endif
992
993#if defined(MBEDTLS_ECP_DP_SECP224R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700994#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
995#define PSA_WANT_ECC_SECP_R1_224
David Brown8de143e2021-02-19 14:08:00 -0700996#endif
997
998#if defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700999#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
1000#define PSA_WANT_ECC_SECP_R1_256
David Brown8de143e2021-02-19 14:08:00 -07001001#endif
1002
1003#if defined(MBEDTLS_ECP_DP_SECP384R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -07001004#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
1005#define PSA_WANT_ECC_SECP_R1_384
David Brown8de143e2021-02-19 14:08:00 -07001006#endif
1007
1008#if defined(MBEDTLS_ECP_DP_SECP521R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -07001009#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
1010#define PSA_WANT_ECC_SECP_R1_521
David Brown8de143e2021-02-19 14:08:00 -07001011#endif
1012
1013#if defined(MBEDTLS_ECP_DP_SECP192K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -07001014#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
1015#define PSA_WANT_ECC_SECP_K1_192
David Brown8de143e2021-02-19 14:08:00 -07001016#endif
1017
Dave Rodgman017a1992022-03-31 14:07:01 +01001018/* SECP224K1 is buggy via the PSA API (https://github.com/Mbed-TLS/mbedtls/issues/3541) */
Gilles Peskine39841302021-03-23 12:06:45 +01001019#if 0 && defined(MBEDTLS_ECP_DP_SECP224K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -07001020#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
1021#define PSA_WANT_ECC_SECP_K1_224
David Brown8de143e2021-02-19 14:08:00 -07001022#endif
1023
David Brown9b178de2021-03-10 13:14:48 -07001024#if defined(MBEDTLS_ECP_DP_SECP256K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -07001025#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
1026#define PSA_WANT_ECC_SECP_K1_256
David Brown8de143e2021-02-19 14:08:00 -07001027#endif
1028
John Durkop2dfaf9c2020-09-24 04:30:10 -07001029#endif /* MBEDTLS_PSA_CRYPTO_CONFIG */
John Durkopd8959392020-09-20 23:09:17 -07001030
Tom Cosgrove6d62fac2023-05-10 14:40:05 +01001031#if defined(PSA_WANT_ALG_JPAKE)
1032#define PSA_WANT_ALG_SOME_PAKE 1
1033#endif
1034
Valerio Setti89cb1442023-06-06 14:12:17 +02001035/* Temporary internal migration helpers */
Valerio Setti8d6e98c2023-05-26 13:46:13 +02001036#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_USE) && \
1037 defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT) && \
1038 defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT) && \
valerio36befce2023-05-31 14:43:06 +02001039 defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE) && \
1040 defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE)
Valerio Setti8d6e98c2023-05-26 13:46:13 +02001041#define MBEDTLS_PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_LEGACY
1042#endif
1043
Valerio Setti89cb1442023-06-06 14:12:17 +02001044/* Temporary internal migration helpers */
Valerio Setti8d6e98c2023-05-26 13:46:13 +02001045#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_USE) && \
1046 defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_IMPORT) && \
1047 defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_EXPORT) && \
1048 defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_GENERATE)
1049#define MBEDTLS_PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_LEGACY
1050#endif
1051
Valerio Setti89cb1442023-06-06 14:12:17 +02001052/* Temporary internal migration helpers */
Valerio Setti8d6e98c2023-05-26 13:46:13 +02001053#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_USE) && \
1054 defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_IMPORT) && \
1055 defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_EXPORT) && \
Valerio Setti602ee2e2023-06-06 14:10:15 +02001056 defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_GENERATE)
Valerio Setti8d6e98c2023-05-26 13:46:13 +02001057#define MBEDTLS_PSA_WANT_KEY_TYPE_DH_KEY_PAIR_LEGACY
1058#endif
1059
Valerio Setti89cb1442023-06-06 14:12:17 +02001060/* Temporary internal migration helpers */
Valerio Setti8d6e98c2023-05-26 13:46:13 +02001061#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_USE) && \
1062 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_IMPORT) && \
1063 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_EXPORT) && \
1064 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_GENERATE) && \
1065 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_DERIVE)
1066#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_LEGACY
1067#endif
1068
Valerio Setti89cb1442023-06-06 14:12:17 +02001069/* Temporary internal migration helpers */
Valerio Setti8d6e98c2023-05-26 13:46:13 +02001070#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_USE) && \
1071 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_IMPORT) && \
1072 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_EXPORT) && \
1073 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_GENERATE)
1074#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_LEGACY
1075#endif
1076
Valerio Setti89cb1442023-06-06 14:12:17 +02001077/* Temporary internal migration helpers */
Valerio Setti8d6e98c2023-05-26 13:46:13 +02001078#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_USE) && \
1079 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_IMPORT) && \
1080 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT) && \
Valerio Setti602ee2e2023-06-06 14:10:15 +02001081 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE)
Valerio Setti8d6e98c2023-05-26 13:46:13 +02001082#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_LEGACY
1083#endif
1084
Gilles Peskine60b29fe2021-02-16 14:06:50 +01001085/* These features are always enabled. */
1086#define PSA_WANT_KEY_TYPE_DERIVE 1
Gilles Peskinebba26302022-12-15 23:25:17 +01001087#define PSA_WANT_KEY_TYPE_PASSWORD 1
1088#define PSA_WANT_KEY_TYPE_PASSWORD_HASH 1
Gilles Peskine60b29fe2021-02-16 14:06:50 +01001089#define PSA_WANT_KEY_TYPE_RAW_DATA 1
1090
John Durkop6e33dbe2020-09-17 21:15:13 -07001091#ifdef __cplusplus
1092}
1093#endif
1094
1095#endif /* MBEDTLS_CONFIG_PSA_H */