blob: b1d386236efa6b204c774306fb61e00acaa9e11e [file] [log] [blame]
John Durkop6e33dbe2020-09-17 21:15:13 -07001/**
2 * \file mbedtls/config_psa.h
3 * \brief PSA crypto configuration options (set of defines)
4 *
John Durkop34818822020-10-12 21:36:22 -07005 * This set of compile-time options takes settings defined in
Bence Szépkútibb0cfeb2021-05-28 09:42:25 +02006 * include/mbedtls/mbedtls_config.h and include/psa/crypto_config.h and uses
John Durkop34818822020-10-12 21:36:22 -07007 * those definitions to define symbols used in the library code.
8 *
9 * Users and integrators should not edit this file, please edit
Tom Cosgrove1797b052022-12-04 17:19:59 +000010 * include/mbedtls/mbedtls_config.h for MBEDTLS_XXX settings or
John Durkop34818822020-10-12 21:36:22 -070011 * include/psa/crypto_config.h for PSA_WANT_XXX settings.
John Durkop6e33dbe2020-09-17 21:15:13 -070012 */
13/*
14 * Copyright The Mbed TLS Contributors
15 * SPDX-License-Identifier: Apache-2.0
16 *
17 * Licensed under the Apache License, Version 2.0 (the "License"); you may
18 * not use this file except in compliance with the License.
19 * You may obtain a copy of the License at
20 *
21 * http://www.apache.org/licenses/LICENSE-2.0
22 *
23 * Unless required by applicable law or agreed to in writing, software
24 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
25 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
26 * See the License for the specific language governing permissions and
27 * limitations under the License.
28 */
29
30#ifndef MBEDTLS_CONFIG_PSA_H
31#define MBEDTLS_CONFIG_PSA_H
32
John Durkop714e3a12020-09-29 22:07:04 -070033#if defined(MBEDTLS_PSA_CRYPTO_CONFIG)
Gilles Peskinef4c6eb02022-03-16 17:10:48 +010034#if defined(MBEDTLS_PSA_CRYPTO_CONFIG_FILE)
35#include MBEDTLS_PSA_CRYPTO_CONFIG_FILE
36#else
John Durkop6e33dbe2020-09-17 21:15:13 -070037#include "psa/crypto_config.h"
Gilles Peskinef4c6eb02022-03-16 17:10:48 +010038#endif
John Durkop76228ac2020-09-29 22:33:49 -070039#endif /* defined(MBEDTLS_PSA_CRYPTO_CONFIG) */
John Durkop6e33dbe2020-09-17 21:15:13 -070040
Gilles Peskinef4c6eb02022-03-16 17:10:48 +010041#if defined(MBEDTLS_PSA_CRYPTO_USER_CONFIG_FILE)
42#include MBEDTLS_PSA_CRYPTO_USER_CONFIG_FILE
43#endif
44
Valerio Settib7ef51a2023-06-06 14:32:58 +020045#include "psa/crypto_legacy.h"
46
John Durkop6e33dbe2020-09-17 21:15:13 -070047#ifdef __cplusplus
48extern "C" {
49#endif
50
Gilles Peskine1231eb52021-04-19 22:24:23 +020051
52
53/****************************************************************/
54/* De facto synonyms */
55/****************************************************************/
56
57#if defined(PSA_WANT_ALG_ECDSA_ANY) && !defined(PSA_WANT_ALG_ECDSA)
58#define PSA_WANT_ALG_ECDSA PSA_WANT_ALG_ECDSA_ANY
59#elif !defined(PSA_WANT_ALG_ECDSA_ANY) && defined(PSA_WANT_ALG_ECDSA)
60#define PSA_WANT_ALG_ECDSA_ANY PSA_WANT_ALG_ECDSA
61#endif
62
Gilles Peskine08622b62022-03-15 16:40:59 +010063#if defined(PSA_WANT_ALG_CCM_STAR_NO_TAG) && !defined(PSA_WANT_ALG_CCM)
64#define PSA_WANT_ALG_CCM PSA_WANT_ALG_CCM_STAR_NO_TAG
65#elif !defined(PSA_WANT_ALG_CCM_STAR_NO_TAG) && defined(PSA_WANT_ALG_CCM)
66#define PSA_WANT_ALG_CCM_STAR_NO_TAG PSA_WANT_ALG_CCM
67#endif
68
Gilles Peskine1231eb52021-04-19 22:24:23 +020069#if defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW) && !defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
70#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW
71#elif !defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW) && defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
72#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW PSA_WANT_ALG_RSA_PKCS1V15_SIGN
73#endif
74
Gilles Peskine44c96aa2021-10-04 18:33:56 +020075#if defined(PSA_WANT_ALG_RSA_PSS_ANY_SALT) && !defined(PSA_WANT_ALG_RSA_PSS)
76#define PSA_WANT_ALG_RSA_PSS PSA_WANT_ALG_RSA_PSS_ANY_SALT
77#elif !defined(PSA_WANT_ALG_RSA_PSS_ANY_SALT) && defined(PSA_WANT_ALG_RSA_PSS)
78#define PSA_WANT_ALG_RSA_PSS_ANY_SALT PSA_WANT_ALG_RSA_PSS
79#endif
80
Gilles Peskine1231eb52021-04-19 22:24:23 +020081
Manuel Pégourié-Gonnard235a9332023-03-14 18:01:23 +010082/****************************************************************/
83/* Hashes that are built in are also enabled in PSA.
84 * This simplifies dependency declarations especially
85 * for modules that obey MBEDTLS_USE_PSA_CRYPTO. */
86/****************************************************************/
87
88#if defined(MBEDTLS_MD5_C)
89#define PSA_WANT_ALG_MD5 1
90#endif
91
92#if defined(MBEDTLS_RIPEMD160_C)
93#define PSA_WANT_ALG_RIPEMD160 1
94#endif
95
96#if defined(MBEDTLS_SHA1_C)
97#define PSA_WANT_ALG_SHA_1 1
98#endif
99
100#if defined(MBEDTLS_SHA224_C)
101#define PSA_WANT_ALG_SHA_224 1
102#endif
103
104#if defined(MBEDTLS_SHA256_C)
105#define PSA_WANT_ALG_SHA_256 1
106#endif
107
108#if defined(MBEDTLS_SHA384_C)
109#define PSA_WANT_ALG_SHA_384 1
110#endif
111
112#if defined(MBEDTLS_SHA512_C)
113#define PSA_WANT_ALG_SHA_512 1
114#endif
115
Dave Rodgman98083c62023-06-25 23:27:45 +0100116#if defined(MBEDTLS_SHA3_C)
117#define PSA_WANT_ALG_SHA_3 1
118#endif
119
Gilles Peskine1231eb52021-04-19 22:24:23 +0200120
121/****************************************************************/
122/* Require built-in implementations based on PSA requirements */
123/****************************************************************/
124
John Durkop2dfaf9c2020-09-24 04:30:10 -0700125#if defined(MBEDTLS_PSA_CRYPTO_CONFIG)
John Durkopd8959392020-09-20 23:09:17 -0700126
John Durkopd62b6782020-11-30 21:06:05 -0800127#if defined(PSA_WANT_ALG_DETERMINISTIC_ECDSA)
128#if !defined(MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA)
129#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
130#define MBEDTLS_ECDSA_DETERMINISTIC
131#define MBEDTLS_ECDSA_C
132#define MBEDTLS_HMAC_DRBG_C
133#define MBEDTLS_MD_C
134#endif /* !MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA */
135#endif /* PSA_WANT_ALG_DETERMINISTIC_ECDSA */
136
137#if defined(PSA_WANT_ALG_ECDH)
138#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDH)
139#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
140#define MBEDTLS_ECDH_C
141#define MBEDTLS_ECP_C
142#define MBEDTLS_BIGNUM_C
143#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDH */
144#endif /* PSA_WANT_ALG_ECDH */
145
146#if defined(PSA_WANT_ALG_ECDSA)
147#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDSA)
148#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
149#define MBEDTLS_ECDSA_C
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200150#define MBEDTLS_ECP_C
151#define MBEDTLS_BIGNUM_C
152#define MBEDTLS_ASN1_PARSE_C
153#define MBEDTLS_ASN1_WRITE_C
John Durkopd62b6782020-11-30 21:06:05 -0800154#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDSA */
155#endif /* PSA_WANT_ALG_ECDSA */
156
Przemek Stekiel84ee3e22022-12-01 14:22:34 +0100157#if defined(PSA_WANT_ALG_FFDH)
158#if !defined(MBEDTLS_PSA_ACCEL_ALG_FFDH)
159#define MBEDTLS_PSA_BUILTIN_ALG_FFDH 1
Przemek Stekiel84ee3e22022-12-01 14:22:34 +0100160#define MBEDTLS_BIGNUM_C
161#endif /* !MBEDTLS_PSA_ACCEL_ALG_FFDH */
162#endif /* PSA_WANT_ALG_FFDH */
163
John Durkopd62b6782020-11-30 21:06:05 -0800164#if defined(PSA_WANT_ALG_HKDF)
165#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF)
166#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
167#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
168#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF */
169#endif /* PSA_WANT_ALG_HKDF */
170
Przemek Stekiel3e8249c2022-06-03 14:05:07 +0200171#if defined(PSA_WANT_ALG_HKDF_EXTRACT)
172#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF_EXTRACT)
173#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
174#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXTRACT 1
175#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF_EXTRACT */
176#endif /* PSA_WANT_ALG_HKDF_EXTRACT */
177
178#if defined(PSA_WANT_ALG_HKDF_EXPAND)
179#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF_EXPAND)
180#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
181#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXPAND 1
182#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF_EXPAND */
183#endif /* PSA_WANT_ALG_HKDF_EXPAND */
184
John Durkopd62b6782020-11-30 21:06:05 -0800185#if defined(PSA_WANT_ALG_HMAC)
186#if !defined(MBEDTLS_PSA_ACCEL_ALG_HMAC)
187#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
188#endif /* !MBEDTLS_PSA_ACCEL_ALG_HMAC */
189#endif /* PSA_WANT_ALG_HMAC */
190
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100191#if defined(PSA_WANT_ALG_MD5) && !defined(MBEDTLS_PSA_ACCEL_ALG_MD5)
192#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
193#define MBEDTLS_MD5_C
194#endif
195
Neil Armstronga557cb82022-06-10 08:58:32 +0200196#if defined(PSA_WANT_ALG_JPAKE)
Przemek Stekiel4aa99402023-02-27 13:00:57 +0100197#if !defined(MBEDTLS_PSA_ACCEL_ALG_JPAKE)
Neil Armstrong637d0a02022-05-25 11:28:22 +0200198#define MBEDTLS_PSA_BUILTIN_PAKE 1
Neil Armstronga557cb82022-06-10 08:58:32 +0200199#define MBEDTLS_PSA_BUILTIN_ALG_JPAKE 1
Neil Armstronged407822022-06-15 11:21:33 +0200200#define MBEDTLS_ECP_DP_SECP256R1_ENABLED
Neil Armstrong637d0a02022-05-25 11:28:22 +0200201#define MBEDTLS_BIGNUM_C
202#define MBEDTLS_ECP_C
Neil Armstrong637d0a02022-05-25 11:28:22 +0200203#define MBEDTLS_ECJPAKE_C
Przemek Stekiel4aa99402023-02-27 13:00:57 +0100204#endif /* MBEDTLS_PSA_ACCEL_ALG_JPAKE */
Neil Armstronga557cb82022-06-10 08:58:32 +0200205#endif /* PSA_WANT_ALG_JPAKE */
Neil Armstrong637d0a02022-05-25 11:28:22 +0200206
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100207#if defined(PSA_WANT_ALG_RIPEMD160) && !defined(MBEDTLS_PSA_ACCEL_ALG_RIPEMD160)
208#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
209#define MBEDTLS_RIPEMD160_C
210#endif
211
John Durkopd62b6782020-11-30 21:06:05 -0800212#if defined(PSA_WANT_ALG_RSA_OAEP)
213#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP)
214#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
215#define MBEDTLS_RSA_C
216#define MBEDTLS_BIGNUM_C
217#define MBEDTLS_OID_C
218#define MBEDTLS_PKCS1_V21
John Durkopd62b6782020-11-30 21:06:05 -0800219#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP */
220#endif /* PSA_WANT_ALG_RSA_OAEP */
221
222#if defined(PSA_WANT_ALG_RSA_PKCS1V15_CRYPT)
223#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT)
224#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
225#define MBEDTLS_RSA_C
226#define MBEDTLS_BIGNUM_C
227#define MBEDTLS_OID_C
228#define MBEDTLS_PKCS1_V15
229#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT */
230#endif /* PSA_WANT_ALG_RSA_PKCS1V15_CRYPT */
231
232#if defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
233#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN)
234#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
235#define MBEDTLS_RSA_C
236#define MBEDTLS_BIGNUM_C
237#define MBEDTLS_OID_C
238#define MBEDTLS_PKCS1_V15
John Durkopd62b6782020-11-30 21:06:05 -0800239#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN */
240#endif /* PSA_WANT_ALG_RSA_PKCS1V15_SIGN */
241
242#if defined(PSA_WANT_ALG_RSA_PSS)
243#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PSS)
244#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
245#define MBEDTLS_RSA_C
246#define MBEDTLS_BIGNUM_C
247#define MBEDTLS_OID_C
248#define MBEDTLS_PKCS1_V21
John Durkopd62b6782020-11-30 21:06:05 -0800249#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PSS */
250#endif /* PSA_WANT_ALG_RSA_PSS */
251
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100252#if defined(PSA_WANT_ALG_SHA_1) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_1)
253#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
254#define MBEDTLS_SHA1_C
255#endif
256
257#if defined(PSA_WANT_ALG_SHA_224) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_224)
258#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200259#define MBEDTLS_SHA224_C
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100260#endif
261
262#if defined(PSA_WANT_ALG_SHA_256) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_256)
263#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
264#define MBEDTLS_SHA256_C
265#endif
266
267#if defined(PSA_WANT_ALG_SHA_384) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_384)
268#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200269#define MBEDTLS_SHA384_C
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100270#endif
271
272#if defined(PSA_WANT_ALG_SHA_512) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_512)
273#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
274#define MBEDTLS_SHA512_C
275#endif
276
Dave Rodgman98083c62023-06-25 23:27:45 +0100277#if defined(PSA_WANT_ALG_SHA_3) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_3)
278#define MBEDTLS_PSA_BUILTIN_ALG_SHA_3 1
279#define MBEDTLS_SHA3_C
280#endif
281
Kusumit Ghoderao83baf892023-05-03 11:42:29 +0530282#if defined(PSA_WANT_ALG_PBKDF2_HMAC)
283#if !defined(MBEDTLS_PSA_ACCEL_ALG_PBKDF2_HMAC)
284#define MBEDTLS_PSA_BUILTIN_ALG_PBKDF2_HMAC 1
Kusumit Ghoderaob9410e82023-05-03 18:36:35 +0530285#if !defined(MBEDTLS_PSA_ACCEL_ALG_HMAC)
Kusumit Ghoderao83baf892023-05-03 11:42:29 +0530286#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
Kusumit Ghoderaob9410e82023-05-03 18:36:35 +0530287#endif /* !MBEDTLS_PSA_ACCEL_ALG_HMAC */
Kusumit Ghoderao83baf892023-05-03 11:42:29 +0530288#endif /* !MBEDTLS_PSA_BUILTIN_ALG_PBKDF2_HMAC */
289#endif /* PSA_WANT_ALG_PBKDF2_HMAC */
290
John Durkop07cc04a2020-11-16 22:08:34 -0800291#if defined(PSA_WANT_ALG_TLS12_PRF)
292#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF)
John Durkopd62b6782020-11-30 21:06:05 -0800293#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
John Durkop07cc04a2020-11-16 22:08:34 -0800294#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF */
295#endif /* PSA_WANT_ALG_TLS12_PRF */
296
297#if defined(PSA_WANT_ALG_TLS12_PSK_TO_MS)
298#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS)
John Durkopd62b6782020-11-30 21:06:05 -0800299#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
John Durkop07cc04a2020-11-16 22:08:34 -0800300#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS */
301#endif /* PSA_WANT_ALG_TLS12_PSK_TO_MS */
302
Andrzej Kurek08d34b82022-07-29 10:00:16 -0400303#if defined(PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS)
304#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_ECJPAKE_TO_PMS)
305#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_ECJPAKE_TO_PMS 1
306#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_ECJPAKE_TO_PMS */
307#endif /* PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS */
308
Valerio Setti4520a8f2023-06-13 12:34:12 +0200309#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200310#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200311#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_IMPORT)
312#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_IMPORT 1
313#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_IMPORT */
314#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT */
315
316#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200317#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200318#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_EXPORT)
319#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_EXPORT 1
320#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_EXPORT */
321#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT */
322
323#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200324#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200325#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_GENERATE)
326#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_GENERATE 1
327#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_GENERATE */
328#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE */
329
330#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200331#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200332#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_DERIVE)
333#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_DERIVE 1
334#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_DERIVE */
335#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE */
336
Valerio Setti01cc88a2023-06-15 11:53:08 +0200337#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC)
Valerio Settiaac957b2023-06-09 16:59:00 +0200338#define PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200339#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_BASIC)
340#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
341#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_BASIC */
342#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC */
John Durkop07cc04a2020-11-16 22:08:34 -0800343
Valerio Setti4520a8f2023-06-13 12:34:12 +0200344#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_IMPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200345#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200346#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_IMPORT)
347#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_IMPORT 1
348#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_IMPORT */
349#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_IMPORT */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200350
Valerio Setti4520a8f2023-06-13 12:34:12 +0200351#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_EXPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200352#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200353#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_EXPORT)
354#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_EXPORT 1
355#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_EXPORT */
356#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_EXPORT */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200357
Valerio Setti4520a8f2023-06-13 12:34:12 +0200358#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_GENERATE)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200359#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200360#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_GENERATE)
361#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_GENERATE 1
362#define MBEDTLS_GENPRIME
363#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_GENERATE */
364#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_GENERATE */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200365
Valerio Setti01cc88a2023-06-15 11:53:08 +0200366#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC)
Valerio Settiaac957b2023-06-09 16:59:00 +0200367#define PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200368#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_BASIC)
369#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
370#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_BASIC */
371#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200372
Valerio Setti4520a8f2023-06-13 12:34:12 +0200373#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_IMPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200374#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200375#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_IMPORT)
376#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_IMPORT 1
377#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_IMPORT */
378#endif /* PSA_WANT_KEY_TYPE_DH_KEY_PAIR_IMPORT */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200379
Valerio Setti4520a8f2023-06-13 12:34:12 +0200380#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_EXPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200381#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200382#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_EXPORT)
383#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT 1
384#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_EXPORT */
385#endif /* PSA_WANT_KEY_TYPE_DH_KEY_PAIR_EXPORT */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200386
Valerio Setti4520a8f2023-06-13 12:34:12 +0200387#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_GENERATE)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200388#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200389#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_GENERATE)
390#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE 1
391#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_GENERATE */
392#endif /* PSA_WANT_KEY_TYPE_DH_KEY_PAIR_GENERATE */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200393
Valerio Setti01cc88a2023-06-15 11:53:08 +0200394#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC)
Valerio Settiaac957b2023-06-09 16:59:00 +0200395#define PSA_WANT_KEY_TYPE_DH_PUBLIC_KEY 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200396#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_BASIC)
397#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_BASIC 1
398#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_BASIC */
399#endif /* PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200400
John Durkop07cc04a2020-11-16 22:08:34 -0800401#if defined(PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY)
402#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800403#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
John Durkop07cc04a2020-11-16 22:08:34 -0800404#define MBEDTLS_ECP_C
405#define MBEDTLS_BIGNUM_C
406#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY */
407#endif /* PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY */
408
Przemek Stekiel6d85afa2023-04-28 11:42:17 +0200409#if defined(PSA_WANT_KEY_TYPE_DH_PUBLIC_KEY)
410#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_PUBLIC_KEY)
411#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY 1
Przemek Stekiel87d9a4a2022-12-15 13:22:11 +0100412#define MBEDTLS_BIGNUM_C
Przemek Stekiel6d85afa2023-04-28 11:42:17 +0200413#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_PUBLIC_KEY */
414#endif /* PSA_WANT_KEY_TYPE_DH_PUBLIC_KEY */
Przemek Stekiel87d9a4a2022-12-15 13:22:11 +0100415
John Durkop9814fa22020-11-04 12:28:15 -0800416#if defined(PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkop0e005192020-10-31 22:06:54 -0700417#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800418#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
John Durkop0e005192020-10-31 22:06:54 -0700419#define MBEDTLS_RSA_C
420#define MBEDTLS_BIGNUM_C
421#define MBEDTLS_OID_C
John Durkop07cc04a2020-11-16 22:08:34 -0800422#define MBEDTLS_PK_PARSE_C
423#define MBEDTLS_PK_WRITE_C
424#define MBEDTLS_PK_C
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200425#define MBEDTLS_ASN1_PARSE_C
426#define MBEDTLS_ASN1_WRITE_C
John Durkop0e005192020-10-31 22:06:54 -0700427#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkop9814fa22020-11-04 12:28:15 -0800428#endif /* PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkopd0321952020-10-29 21:37:36 -0700429
David Brownb781f752021-02-08 15:44:52 -0700430/* If any of the block modes are requested that don't have an
431 * associated HW assist, define PSA_HAVE_SOFT_BLOCK_MODE for checking
432 * in the block cipher key types. */
433#if (defined(PSA_WANT_ALG_CTR) && !defined(MBEDTLS_PSA_ACCEL_ALG_CTR)) || \
Bence Szépkúti7921cce2021-02-17 11:46:50 +0100434 (defined(PSA_WANT_ALG_CFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_CFB)) || \
David Brownb781f752021-02-08 15:44:52 -0700435 (defined(PSA_WANT_ALG_OFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_OFB)) || \
David Brownb781f752021-02-08 15:44:52 -0700436 defined(PSA_WANT_ALG_ECB_NO_PADDING) || \
437 (defined(PSA_WANT_ALG_CBC_NO_PADDING) && \
Gilles Peskine449bd832023-01-11 14:50:10 +0100438 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING)) || \
David Brownb781f752021-02-08 15:44:52 -0700439 (defined(PSA_WANT_ALG_CBC_PKCS7) && \
Gilles Peskine449bd832023-01-11 14:50:10 +0100440 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7)) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100441 (defined(PSA_WANT_ALG_CMAC) && !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC))
David Brownb781f752021-02-08 15:44:52 -0700442#define PSA_HAVE_SOFT_BLOCK_MODE 1
443#endif
444
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100445#if (defined(PSA_WANT_ALG_GCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_GCM)) || \
446 (defined(PSA_WANT_ALG_CCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_CCM))
447#define PSA_HAVE_SOFT_BLOCK_AEAD 1
448#endif
449
David Brown94933082021-01-05 12:03:25 -0700450#if defined(PSA_WANT_KEY_TYPE_AES)
David Browne1f91f02021-02-09 15:56:22 -0700451#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_AES)
452#define PSA_HAVE_SOFT_KEY_TYPE_AES 1
453#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_AES */
454#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100455 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
456 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
David Brown78a429b2021-01-21 09:48:57 -0700457#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700458#define MBEDTLS_AES_C
David Browne1f91f02021-02-09 15:56:22 -0700459#endif /* PSA_HAVE_SOFT_KEY_TYPE_AES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown94933082021-01-05 12:03:25 -0700460#endif /* PSA_WANT_KEY_TYPE_AES */
461
Gilles Peskine09c46da2021-10-08 15:48:16 +0200462#if defined(PSA_WANT_KEY_TYPE_ARIA)
463#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA)
464#define PSA_HAVE_SOFT_KEY_TYPE_ARIA 1
465#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA */
466#if defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
467 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
468 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
469#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
470#define MBEDTLS_ARIA_C
471#endif /* PSA_HAVE_SOFT_KEY_TYPE_ARIA || PSA_HAVE_SOFT_BLOCK_MODE */
472#endif /* PSA_WANT_KEY_TYPE_ARIA */
473
David Brown686e6e82021-01-05 12:03:25 -0700474#if defined(PSA_WANT_KEY_TYPE_CAMELLIA)
David Browne1f91f02021-02-09 15:56:22 -0700475#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA)
476#define PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA 1
477#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA */
478#if defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100479 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
480 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
David Brown78a429b2021-01-21 09:48:57 -0700481#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700482#define MBEDTLS_CAMELLIA_C
David Browne1f91f02021-02-09 15:56:22 -0700483#endif /* PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown686e6e82021-01-05 12:03:25 -0700484#endif /* PSA_WANT_KEY_TYPE_CAMELLIA */
485
David Brownb65a7f72021-01-15 12:04:09 -0700486#if defined(PSA_WANT_KEY_TYPE_DES)
David Browne1f91f02021-02-09 15:56:22 -0700487#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DES)
488#define PSA_HAVE_SOFT_KEY_TYPE_DES 1
489#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DES */
490#if defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
David Brownb781f752021-02-08 15:44:52 -0700491 defined(PSA_HAVE_SOFT_BLOCK_MODE)
David Brown78a429b2021-01-21 09:48:57 -0700492#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700493#define MBEDTLS_DES_C
David Browne1f91f02021-02-09 15:56:22 -0700494#endif /*PSA_HAVE_SOFT_KEY_TYPE_DES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brownb65a7f72021-01-15 12:04:09 -0700495#endif /* PSA_WANT_KEY_TYPE_DES */
496
David Brownb16727a2021-02-08 16:31:46 -0700497#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
498#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20)
499#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
500#define MBEDTLS_CHACHA20_C
501#endif /*!MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20 */
502#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
503
David Brownf84a0f62021-02-09 15:59:41 -0700504/* If any of the software block ciphers are selected, define
505 * PSA_HAVE_SOFT_BLOCK_CIPHER, which can be used in any of these
506 * situations. */
507#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200508 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
David Brownf84a0f62021-02-09 15:59:41 -0700509 defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
510 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
511#define PSA_HAVE_SOFT_BLOCK_CIPHER 1
512#endif
513
David Brown99844272021-01-15 12:04:47 -0700514#if defined(PSA_WANT_ALG_STREAM_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700515#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brown99844272021-01-15 12:04:47 -0700516#endif /* PSA_WANT_ALG_STREAM_CIPHER */
517
Ronald Crond85e98d2021-03-25 15:32:32 +0100518#if defined(PSA_WANT_ALG_CBC_MAC)
519#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_MAC)
520#error "CBC-MAC is not yet supported via the PSA API in Mbed TLS."
521#define MBEDTLS_PSA_BUILTIN_ALG_CBC_MAC 1
522#endif /* !MBEDTLS_PSA_ACCEL_ALG_CBC_MAC */
523#endif /* PSA_WANT_ALG_CBC_MAC */
524
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100525#if defined(PSA_WANT_ALG_CMAC)
526#if !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC) || \
527 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
528#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
529#define MBEDTLS_CMAC_C
530#endif /* !MBEDTLS_PSA_ACCEL_ALG_CMAC */
531#endif /* PSA_WANT_ALG_CMAC */
532
David Brown99844272021-01-15 12:04:47 -0700533#if defined(PSA_WANT_ALG_CTR)
David Brown4b9ec7a2021-02-05 12:47:08 -0700534#if !defined(MBEDTLS_PSA_ACCEL_ALG_CTR) || \
David Brownf84a0f62021-02-09 15:59:41 -0700535 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700536#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700537#define MBEDTLS_CIPHER_MODE_CTR
David Brown4b9ec7a2021-02-05 12:47:08 -0700538#endif
David Brown99844272021-01-15 12:04:47 -0700539#endif /* PSA_WANT_ALG_CTR */
540
541#if defined(PSA_WANT_ALG_CFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700542#if !defined(MBEDTLS_PSA_ACCEL_ALG_CFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700543 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700544#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700545#define MBEDTLS_CIPHER_MODE_CFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700546#endif
David Brown99844272021-01-15 12:04:47 -0700547#endif /* PSA_WANT_ALG_CFB */
548
549#if defined(PSA_WANT_ALG_OFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700550#if !defined(MBEDTLS_PSA_ACCEL_ALG_OFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700551 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700552#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700553#define MBEDTLS_CIPHER_MODE_OFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700554#endif
David Brown99844272021-01-15 12:04:47 -0700555#endif /* PSA_WANT_ALG_OFB */
556
Gilles Peskine7a2e83b2022-03-17 11:09:23 +0100557#if defined(PSA_WANT_ALG_ECB_NO_PADDING) && \
558 !defined(MBEDTLS_PSA_ACCEL_ALG_ECB_NO_PADDING)
David Brownbe380c12021-02-11 10:55:48 -0700559#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700560#endif
561
David Brown12f45f92021-01-26 11:50:36 -0700562#if defined(PSA_WANT_ALG_CBC_NO_PADDING)
David Brown4b9ec7a2021-02-05 12:47:08 -0700563#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING) || \
David Brownfc468182021-02-09 16:23:34 -0700564 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700565#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700566#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown4b9ec7a2021-02-05 12:47:08 -0700567#endif
David Brown12f45f92021-01-26 11:50:36 -0700568#endif /* PSA_WANT_ALG_CBC_NO_PADDING */
569
570#if defined(PSA_WANT_ALG_CBC_PKCS7)
David Brown4b9ec7a2021-02-05 12:47:08 -0700571#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7) || \
David Brownfc468182021-02-09 16:23:34 -0700572 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700573#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700574#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brownfc468182021-02-09 16:23:34 -0700575#define MBEDTLS_CIPHER_PADDING_PKCS7
David Brown4b9ec7a2021-02-05 12:47:08 -0700576#endif
David Brown12f45f92021-01-26 11:50:36 -0700577#endif /* PSA_WANT_ALG_CBC_PKCS7 */
578
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100579#if defined(PSA_WANT_ALG_CCM)
580#if !defined(MBEDTLS_PSA_ACCEL_ALG_CCM) || \
581 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200582 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100583 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
584#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100585#define MBEDTLS_PSA_BUILTIN_ALG_CCM_STAR_NO_TAG 1
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100586#define MBEDTLS_CCM_C
587#endif
588#endif /* PSA_WANT_ALG_CCM */
589
590#if defined(PSA_WANT_ALG_GCM)
591#if !defined(MBEDTLS_PSA_ACCEL_ALG_GCM) || \
592 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200593 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100594 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
595#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
596#define MBEDTLS_GCM_C
597#endif
598#endif /* PSA_WANT_ALG_GCM */
599
David Brownac4fa072021-02-08 16:47:35 -0700600#if defined(PSA_WANT_ALG_CHACHA20_POLY1305)
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200601#if !defined(MBEDTLS_PSA_ACCEL_ALG_CHACHA20_POLY1305)
David Brownac4fa072021-02-08 16:47:35 -0700602#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
603#define MBEDTLS_CHACHAPOLY_C
Summer Qin9f2596f2022-06-17 12:50:32 +0800604#define MBEDTLS_CHACHA20_C
605#define MBEDTLS_POLY1305_C
David Brown86730a82021-02-09 16:24:11 -0700606#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700607#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200608#endif /* !MBEDTLS_PSA_ACCEL_ALG_CHACHA20_POLY1305 */
David Brownac4fa072021-02-08 16:47:35 -0700609#endif /* PSA_WANT_ALG_CHACHA20_POLY1305 */
610
David Browneed74df2021-03-15 15:53:57 -0600611#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_256)
612#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256)
613#define MBEDTLS_ECP_DP_BP256R1_ENABLED
614#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
615#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256 */
616#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_256 */
617
618#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_384)
619#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384)
620#define MBEDTLS_ECP_DP_BP384R1_ENABLED
621#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
622#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384 */
623#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_384 */
624
625#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_512)
626#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512)
627#define MBEDTLS_ECP_DP_BP512R1_ENABLED
628#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
629#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512 */
630#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_512 */
631
632#if defined(PSA_WANT_ECC_MONTGOMERY_255)
633#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255)
634#define MBEDTLS_ECP_DP_CURVE25519_ENABLED
635#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
636#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255 */
637#endif /* PSA_WANT_ECC_MONTGOMERY_255 */
638
639#if defined(PSA_WANT_ECC_MONTGOMERY_448)
640#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448)
641#define MBEDTLS_ECP_DP_CURVE448_ENABLED
642#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
643#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448 */
644#endif /* PSA_WANT_ECC_MONTGOMERY_448 */
645
David Brownc7b9b2b2021-02-19 21:05:52 -0700646#if defined(PSA_WANT_ECC_SECP_R1_192)
647#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192)
648#define MBEDTLS_ECP_DP_SECP192R1_ENABLED
649#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
650#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192 */
651#endif /* PSA_WANT_ECC_SECP_R1_192 */
652
653#if defined(PSA_WANT_ECC_SECP_R1_224)
654#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224)
655#define MBEDTLS_ECP_DP_SECP224R1_ENABLED
656#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
657#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224 */
658#endif /* PSA_WANT_ECC_SECP_R1_224 */
659
660#if defined(PSA_WANT_ECC_SECP_R1_256)
661#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256)
662#define MBEDTLS_ECP_DP_SECP256R1_ENABLED
663#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
664#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256 */
665#endif /* PSA_WANT_ECC_SECP_R1_256 */
666
667#if defined(PSA_WANT_ECC_SECP_R1_384)
668#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384)
669#define MBEDTLS_ECP_DP_SECP384R1_ENABLED
670#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
671#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384 */
672#endif /* PSA_WANT_ECC_SECP_R1_384 */
673
674#if defined(PSA_WANT_ECC_SECP_R1_521)
675#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521)
676#define MBEDTLS_ECP_DP_SECP521R1_ENABLED
677#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
678#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521 */
679#endif /* PSA_WANT_ECC_SECP_R1_521 */
680
681#if defined(PSA_WANT_ECC_SECP_K1_192)
682#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192)
David Brown8de143e2021-02-19 14:08:00 -0700683#define MBEDTLS_ECP_DP_SECP192K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700684#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
685#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192 */
686#endif /* PSA_WANT_ECC_SECP_K1_192 */
David Brown8de143e2021-02-19 14:08:00 -0700687
David Brownc7b9b2b2021-02-19 21:05:52 -0700688#if defined(PSA_WANT_ECC_SECP_K1_224)
689#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224)
Ronald Crone1f55162021-03-25 15:09:47 +0100690/*
691 * SECP224K1 is buggy via the PSA API in Mbed TLS
Dave Rodgman017a1992022-03-31 14:07:01 +0100692 * (https://github.com/Mbed-TLS/mbedtls/issues/3541).
Ronald Crone1f55162021-03-25 15:09:47 +0100693 */
694#error "SECP224K1 is buggy via the PSA API in Mbed TLS."
David Brown8de143e2021-02-19 14:08:00 -0700695#define MBEDTLS_ECP_DP_SECP224K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700696#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
697#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224 */
698#endif /* PSA_WANT_ECC_SECP_K1_224 */
David Brown8de143e2021-02-19 14:08:00 -0700699
David Brownc7b9b2b2021-02-19 21:05:52 -0700700#if defined(PSA_WANT_ECC_SECP_K1_256)
701#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256)
David Brown9b178de2021-03-10 13:14:48 -0700702#define MBEDTLS_ECP_DP_SECP256K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700703#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
704#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256 */
705#endif /* PSA_WANT_ECC_SECP_K1_256 */
David Brown8de143e2021-02-19 14:08:00 -0700706
Gilles Peskine1231eb52021-04-19 22:24:23 +0200707
708
709/****************************************************************/
710/* Infer PSA requirements from Mbed TLS capabilities */
711/****************************************************************/
712
John Durkop714e3a12020-09-29 22:07:04 -0700713#else /* MBEDTLS_PSA_CRYPTO_CONFIG */
714
715/*
716 * Ensure PSA_WANT_* defines are setup properly if MBEDTLS_PSA_CRYPTO_CONFIG
717 * is not defined
718 */
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100719
Ronald Cron3d471812021-03-18 13:40:31 +0100720#if defined(MBEDTLS_CCM_C)
721#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100722#define MBEDTLS_PSA_BUILTIN_ALG_CCM_STAR_NO_TAG 1
Ronald Cron3d471812021-03-18 13:40:31 +0100723#define PSA_WANT_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100724#define PSA_WANT_ALG_CCM_STAR_NO_TAG 1
Ronald Cron3d471812021-03-18 13:40:31 +0100725#endif /* MBEDTLS_CCM_C */
726
727#if defined(MBEDTLS_CMAC_C)
728#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
729#define PSA_WANT_ALG_CMAC 1
730#endif /* MBEDTLS_CMAC_C */
731
John Durkopd62b6782020-11-30 21:06:05 -0800732#if defined(MBEDTLS_ECDH_C)
733#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
734#define PSA_WANT_ALG_ECDH 1
735#endif /* MBEDTLS_ECDH_C */
736
737#if defined(MBEDTLS_ECDSA_C)
738#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
739#define PSA_WANT_ALG_ECDSA 1
Gilles Peskine1231eb52021-04-19 22:24:23 +0200740#define PSA_WANT_ALG_ECDSA_ANY 1
John Durkopd62b6782020-11-30 21:06:05 -0800741
742// Only add in DETERMINISTIC support if ECDSA is also enabled
743#if defined(MBEDTLS_ECDSA_DETERMINISTIC)
744#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
745#define PSA_WANT_ALG_DETERMINISTIC_ECDSA 1
746#endif /* MBEDTLS_ECDSA_DETERMINISTIC */
747
748#endif /* MBEDTLS_ECDSA_C */
749
750#if defined(MBEDTLS_ECP_C)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200751#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Settif87b5052023-05-26 13:47:09 +0200752#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT 1
753#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT 1
Valerio Settif87b5052023-05-26 13:47:09 +0200754#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200755#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Settiddb57762023-06-06 14:17:15 +0200756#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_IMPORT 1
757#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_EXPORT 1
758#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_GENERATE 1
John Durkopd62b6782020-11-30 21:06:05 -0800759#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
760#define PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY 1
761#endif /* MBEDTLS_ECP_C */
762
Przemek Stekiel746dfae2023-05-04 09:14:08 +0200763#if defined(MBEDTLS_DHM_C)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200764#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC 1
Valerio Settif87b5052023-05-26 13:47:09 +0200765#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_IMPORT 1
766#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_EXPORT 1
Valerio Settif87b5052023-05-26 13:47:09 +0200767#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_GENERATE 1
Przemek Stekiel746dfae2023-05-04 09:14:08 +0200768#define PSA_WANT_KEY_TYPE_DH_PUBLIC_KEY 1
769#define PSA_WANT_ALG_FFDH 1
770#define PSA_WANT_DH_FAMILY_RFC7919 1
771#define MBEDTLS_PSA_BUILTIN_ALG_FFDH 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200772#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_BASIC 1
Valerio Settif87b5052023-05-26 13:47:09 +0200773#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_IMPORT 1
774#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT 1
775#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE 1
Przemek Stekiel746dfae2023-05-04 09:14:08 +0200776#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY 1
777#endif /* MBEDTLS_DHM_C */
778
Ronald Cron3d471812021-03-18 13:40:31 +0100779#if defined(MBEDTLS_GCM_C)
780#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
781#define PSA_WANT_ALG_GCM 1
782#endif /* MBEDTLS_GCM_C */
783
Przemek Stekiel18399d82022-06-27 13:34:50 +0200784/* Enable PSA HKDF algorithm if mbedtls HKDF is supported.
785 * PSA HKDF EXTRACT and PSA HKDF EXPAND have minimal cost when
786 * PSA HKDF is enabled, so enable both algorithms together
787 * with PSA HKDF. */
John Durkopd62b6782020-11-30 21:06:05 -0800788#if defined(MBEDTLS_HKDF_C)
789#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
790#define PSA_WANT_ALG_HMAC 1
791#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
792#define PSA_WANT_ALG_HKDF 1
Przemek Stekielb33bd192022-06-21 09:58:51 +0200793#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXTRACT 1
794#define PSA_WANT_ALG_HKDF_EXTRACT 1
795#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXPAND 1
796#define PSA_WANT_ALG_HKDF_EXPAND 1
John Durkopd62b6782020-11-30 21:06:05 -0800797#endif /* MBEDTLS_HKDF_C */
798
John Durkopd62b6782020-11-30 21:06:05 -0800799#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
800#define PSA_WANT_ALG_HMAC 1
Gilles Peskine47a89332021-01-12 00:00:15 +0100801#define PSA_WANT_KEY_TYPE_HMAC
Andrzej Kurek65bf73e2022-08-31 14:59:31 -0400802
803#if defined(MBEDTLS_MD_C)
John Durkopd62b6782020-11-30 21:06:05 -0800804#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
805#define PSA_WANT_ALG_TLS12_PRF 1
806#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
807#define PSA_WANT_ALG_TLS12_PSK_TO_MS 1
808#endif /* MBEDTLS_MD_C */
809
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100810#if defined(MBEDTLS_MD5_C)
811#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
812#define PSA_WANT_ALG_MD5 1
813#endif
814
Neil Armstrong637d0a02022-05-25 11:28:22 +0200815#if defined(MBEDTLS_ECJPAKE_C)
816#define MBEDTLS_PSA_BUILTIN_PAKE 1
Neil Armstronga557cb82022-06-10 08:58:32 +0200817#define MBEDTLS_PSA_BUILTIN_ALG_JPAKE 1
818#define PSA_WANT_ALG_JPAKE 1
Neil Armstrong637d0a02022-05-25 11:28:22 +0200819#endif
820
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100821#if defined(MBEDTLS_RIPEMD160_C)
822#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
823#define PSA_WANT_ALG_RIPEMD160 1
824#endif
825
John Durkopd62b6782020-11-30 21:06:05 -0800826#if defined(MBEDTLS_RSA_C)
827#if defined(MBEDTLS_PKCS1_V15)
828#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
829#define PSA_WANT_ALG_RSA_PKCS1V15_CRYPT 1
830#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
831#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN 1
Gilles Peskine1231eb52021-04-19 22:24:23 +0200832#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW 1
Yuto Takano7828ca22021-08-10 11:26:15 +0100833#endif /* MBEDTLS_PKCS1_V15 */
John Durkopd62b6782020-11-30 21:06:05 -0800834#if defined(MBEDTLS_PKCS1_V21)
835#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
836#define PSA_WANT_ALG_RSA_OAEP 1
837#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
838#define PSA_WANT_ALG_RSA_PSS 1
839#endif /* MBEDTLS_PKCS1_V21 */
Valerio Setti01cc88a2023-06-15 11:53:08 +0200840#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
Valerio Settif87b5052023-05-26 13:47:09 +0200841#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_IMPORT 1
842#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_EXPORT 1
843#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_GENERATE 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200844#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
Valerio Settif87b5052023-05-26 13:47:09 +0200845#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_IMPORT 1
846#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_EXPORT 1
847#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_GENERATE 1
John Durkopd62b6782020-11-30 21:06:05 -0800848#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
849#define PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY 1
850#endif /* MBEDTLS_RSA_C */
851
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100852#if defined(MBEDTLS_SHA1_C)
853#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
854#define PSA_WANT_ALG_SHA_1 1
855#endif
856
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200857#if defined(MBEDTLS_SHA224_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100858#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
Gilles Peskineb65db072021-01-12 00:00:53 +0100859#define PSA_WANT_ALG_SHA_224 1
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200860#endif
861
862#if defined(MBEDTLS_SHA256_C)
863#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100864#define PSA_WANT_ALG_SHA_256 1
865#endif
866
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200867#if defined(MBEDTLS_SHA384_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100868#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
869#define PSA_WANT_ALG_SHA_384 1
870#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200871
872#if defined(MBEDTLS_SHA512_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100873#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
874#define PSA_WANT_ALG_SHA_512 1
875#endif
876
Dave Rodgman98083c62023-06-25 23:27:45 +0100877#if defined(MBEDTLS_SHA3_C)
878#define MBEDTLS_PSA_BUILTIN_ALG_SHA_3 1
879#define PSA_WANT_ALG_SHA_3 1
880#endif
881
David Brown94933082021-01-05 12:03:25 -0700882#if defined(MBEDTLS_AES_C)
883#define PSA_WANT_KEY_TYPE_AES 1
David Brownda7dbb72021-01-26 11:44:15 -0700884#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700885#endif
886
Gilles Peskine09c46da2021-10-08 15:48:16 +0200887#if defined(MBEDTLS_ARIA_C)
888#define PSA_WANT_KEY_TYPE_ARIA 1
889#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
890#endif
891
David Brown686e6e82021-01-05 12:03:25 -0700892#if defined(MBEDTLS_CAMELLIA_C)
893#define PSA_WANT_KEY_TYPE_CAMELLIA 1
David Brownda7dbb72021-01-26 11:44:15 -0700894#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700895#endif
896
David Brownb65a7f72021-01-15 12:04:09 -0700897#if defined(MBEDTLS_DES_C)
898#define PSA_WANT_KEY_TYPE_DES 1
David Brownda7dbb72021-01-26 11:44:15 -0700899#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700900#endif
901
Andrzej Kurekd60907b2022-09-14 10:02:30 -0400902#if defined(MBEDTLS_PSA_BUILTIN_ALG_SHA_256)
903#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_ECJPAKE_TO_PMS 1
904#define PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS 1
905#endif
906
David Brownb16727a2021-02-08 16:31:46 -0700907#if defined(MBEDTLS_CHACHA20_C)
908#define PSA_WANT_KEY_TYPE_CHACHA20 1
909#define PSA_WANT_ALG_STREAM_CIPHER 1
910#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
911#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brownac4fa072021-02-08 16:47:35 -0700912#if defined(MBEDTLS_CHACHAPOLY_C)
913#define PSA_WANT_ALG_CHACHA20_POLY1305 1
David Brown86730a82021-02-09 16:24:11 -0700914#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700915#endif
David Brownb16727a2021-02-08 16:31:46 -0700916#endif
917
David Brown99844272021-01-15 12:04:47 -0700918#if defined(MBEDTLS_CIPHER_MODE_CBC)
David Brown10cb81c2021-02-09 16:10:29 -0700919#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700920#define PSA_WANT_ALG_CBC_NO_PADDING 1
921#if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
David Brown12f45f92021-01-26 11:50:36 -0700922#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brown99844272021-01-15 12:04:47 -0700923#define PSA_WANT_ALG_CBC_PKCS7 1
924#endif
925#endif
926
927#if defined(MBEDTLS_AES_C) || defined(MBEDTLS_DES_C) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200928 defined(MBEDTLS_ARIA_C) || defined(MBEDTLS_CAMELLIA_C)
David Brown10cb81c2021-02-09 16:10:29 -0700929#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700930#define PSA_WANT_ALG_ECB_NO_PADDING 1
931#endif
932
933#if defined(MBEDTLS_CIPHER_MODE_CFB)
David Brown12f45f92021-01-26 11:50:36 -0700934#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700935#define PSA_WANT_ALG_CFB 1
936#endif
937
938#if defined(MBEDTLS_CIPHER_MODE_CTR)
David Brown12f45f92021-01-26 11:50:36 -0700939#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700940#define PSA_WANT_ALG_CTR 1
941#endif
942
943#if defined(MBEDTLS_CIPHER_MODE_OFB)
David Brown12f45f92021-01-26 11:50:36 -0700944#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700945#define PSA_WANT_ALG_OFB 1
946#endif
947
David Browneed74df2021-03-15 15:53:57 -0600948#if defined(MBEDTLS_ECP_DP_BP256R1_ENABLED)
949#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
950#define PSA_WANT_ECC_BRAINPOOL_P_R1_256
951#endif
952
953#if defined(MBEDTLS_ECP_DP_BP384R1_ENABLED)
954#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
955#define PSA_WANT_ECC_BRAINPOOL_P_R1_384
956#endif
957
958#if defined(MBEDTLS_ECP_DP_BP512R1_ENABLED)
959#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
960#define PSA_WANT_ECC_BRAINPOOL_P_R1_512
961#endif
962
963#if defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED)
964#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
965#define PSA_WANT_ECC_MONTGOMERY_255
966#endif
967
Archanaef6aa5c2021-06-08 11:40:10 +0530968#if defined(MBEDTLS_ECP_DP_CURVE448_ENABLED)
David Browneed74df2021-03-15 15:53:57 -0600969#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
970#define PSA_WANT_ECC_MONTGOMERY_448
971#endif
972
David Brown8de143e2021-02-19 14:08:00 -0700973#if defined(MBEDTLS_ECP_DP_SECP192R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700974#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
975#define PSA_WANT_ECC_SECP_R1_192
David Brown8de143e2021-02-19 14:08:00 -0700976#endif
977
978#if defined(MBEDTLS_ECP_DP_SECP224R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700979#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
980#define PSA_WANT_ECC_SECP_R1_224
David Brown8de143e2021-02-19 14:08:00 -0700981#endif
982
983#if defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700984#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
985#define PSA_WANT_ECC_SECP_R1_256
David Brown8de143e2021-02-19 14:08:00 -0700986#endif
987
988#if defined(MBEDTLS_ECP_DP_SECP384R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700989#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
990#define PSA_WANT_ECC_SECP_R1_384
David Brown8de143e2021-02-19 14:08:00 -0700991#endif
992
993#if defined(MBEDTLS_ECP_DP_SECP521R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700994#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
995#define PSA_WANT_ECC_SECP_R1_521
David Brown8de143e2021-02-19 14:08:00 -0700996#endif
997
998#if defined(MBEDTLS_ECP_DP_SECP192K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700999#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
1000#define PSA_WANT_ECC_SECP_K1_192
David Brown8de143e2021-02-19 14:08:00 -07001001#endif
1002
Dave Rodgman017a1992022-03-31 14:07:01 +01001003/* SECP224K1 is buggy via the PSA API (https://github.com/Mbed-TLS/mbedtls/issues/3541) */
Gilles Peskine39841302021-03-23 12:06:45 +01001004#if 0 && defined(MBEDTLS_ECP_DP_SECP224K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -07001005#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
1006#define PSA_WANT_ECC_SECP_K1_224
David Brown8de143e2021-02-19 14:08:00 -07001007#endif
1008
David Brown9b178de2021-03-10 13:14:48 -07001009#if defined(MBEDTLS_ECP_DP_SECP256K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -07001010#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
1011#define PSA_WANT_ECC_SECP_K1_256
David Brown8de143e2021-02-19 14:08:00 -07001012#endif
1013
John Durkop2dfaf9c2020-09-24 04:30:10 -07001014#endif /* MBEDTLS_PSA_CRYPTO_CONFIG */
John Durkopd8959392020-09-20 23:09:17 -07001015
Tom Cosgrove6d62fac2023-05-10 14:40:05 +01001016#if defined(PSA_WANT_ALG_JPAKE)
1017#define PSA_WANT_ALG_SOME_PAKE 1
1018#endif
1019
Valerio Setti89cb1442023-06-06 14:12:17 +02001020/* Temporary internal migration helpers */
Valerio Setti01cc88a2023-06-15 11:53:08 +02001021#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC) || \
Valerio Settif4d7ede2023-06-09 12:10:33 +02001022 defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT) || \
1023 defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT) || \
1024 defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE) || \
valerio36befce2023-05-31 14:43:06 +02001025 defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE)
Valerio Setti8d6e98c2023-05-26 13:46:13 +02001026#define MBEDTLS_PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_LEGACY
1027#endif
1028
Valerio Setti89cb1442023-06-06 14:12:17 +02001029/* Temporary internal migration helpers */
Valerio Setti01cc88a2023-06-15 11:53:08 +02001030#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC) || \
Valerio Settif4d7ede2023-06-09 12:10:33 +02001031 defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_IMPORT) || \
1032 defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_EXPORT) || \
Valerio Setti8d6e98c2023-05-26 13:46:13 +02001033 defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_GENERATE)
1034#define MBEDTLS_PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_LEGACY
1035#endif
1036
Valerio Setti89cb1442023-06-06 14:12:17 +02001037/* Temporary internal migration helpers */
Valerio Setti01cc88a2023-06-15 11:53:08 +02001038#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC) || \
Valerio Settif4d7ede2023-06-09 12:10:33 +02001039 defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_IMPORT) || \
1040 defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_EXPORT) || \
Valerio Setti602ee2e2023-06-06 14:10:15 +02001041 defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_GENERATE)
Valerio Setti8d6e98c2023-05-26 13:46:13 +02001042#define MBEDTLS_PSA_WANT_KEY_TYPE_DH_KEY_PAIR_LEGACY
1043#endif
1044
Valerio Setti89cb1442023-06-06 14:12:17 +02001045/* Temporary internal migration helpers */
Valerio Setti01cc88a2023-06-15 11:53:08 +02001046#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_BASIC) || \
Valerio Settif4d7ede2023-06-09 12:10:33 +02001047 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_IMPORT) || \
1048 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_EXPORT) || \
1049 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_GENERATE) || \
Valerio Setti8d6e98c2023-05-26 13:46:13 +02001050 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_DERIVE)
1051#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_LEGACY
1052#endif
1053
Valerio Setti89cb1442023-06-06 14:12:17 +02001054/* Temporary internal migration helpers */
Valerio Setti01cc88a2023-06-15 11:53:08 +02001055#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_BASIC) || \
Valerio Settif4d7ede2023-06-09 12:10:33 +02001056 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_IMPORT) || \
1057 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_EXPORT) || \
Valerio Setti8d6e98c2023-05-26 13:46:13 +02001058 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_GENERATE)
1059#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_LEGACY
1060#endif
1061
Valerio Setti89cb1442023-06-06 14:12:17 +02001062/* Temporary internal migration helpers */
Valerio Setti01cc88a2023-06-15 11:53:08 +02001063#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_BASIC) || \
Valerio Settif4d7ede2023-06-09 12:10:33 +02001064 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_IMPORT) || \
1065 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT) || \
Valerio Setti602ee2e2023-06-06 14:10:15 +02001066 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE)
Valerio Setti8d6e98c2023-05-26 13:46:13 +02001067#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_LEGACY
1068#endif
1069
Gilles Peskine60b29fe2021-02-16 14:06:50 +01001070/* These features are always enabled. */
1071#define PSA_WANT_KEY_TYPE_DERIVE 1
Gilles Peskinebba26302022-12-15 23:25:17 +01001072#define PSA_WANT_KEY_TYPE_PASSWORD 1
1073#define PSA_WANT_KEY_TYPE_PASSWORD_HASH 1
Gilles Peskine60b29fe2021-02-16 14:06:50 +01001074#define PSA_WANT_KEY_TYPE_RAW_DATA 1
1075
John Durkop6e33dbe2020-09-17 21:15:13 -07001076#ifdef __cplusplus
1077}
1078#endif
1079
1080#endif /* MBEDTLS_CONFIG_PSA_H */