blob: 64e226144213951ca9e206b1e447ef12399c2ae8 [file] [log] [blame]
John Durkop6e33dbe2020-09-17 21:15:13 -07001/**
2 * \file mbedtls/config_psa.h
3 * \brief PSA crypto configuration options (set of defines)
4 *
John Durkop34818822020-10-12 21:36:22 -07005 * This set of compile-time options takes settings defined in
Bence Szépkútibb0cfeb2021-05-28 09:42:25 +02006 * include/mbedtls/mbedtls_config.h and include/psa/crypto_config.h and uses
John Durkop34818822020-10-12 21:36:22 -07007 * those definitions to define symbols used in the library code.
8 *
9 * Users and integrators should not edit this file, please edit
Tom Cosgrove1797b052022-12-04 17:19:59 +000010 * include/mbedtls/mbedtls_config.h for MBEDTLS_XXX settings or
John Durkop34818822020-10-12 21:36:22 -070011 * include/psa/crypto_config.h for PSA_WANT_XXX settings.
John Durkop6e33dbe2020-09-17 21:15:13 -070012 */
13/*
14 * Copyright The Mbed TLS Contributors
15 * SPDX-License-Identifier: Apache-2.0
16 *
17 * Licensed under the Apache License, Version 2.0 (the "License"); you may
18 * not use this file except in compliance with the License.
19 * You may obtain a copy of the License at
20 *
21 * http://www.apache.org/licenses/LICENSE-2.0
22 *
23 * Unless required by applicable law or agreed to in writing, software
24 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
25 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
26 * See the License for the specific language governing permissions and
27 * limitations under the License.
28 */
29
30#ifndef MBEDTLS_CONFIG_PSA_H
31#define MBEDTLS_CONFIG_PSA_H
32
John Durkop714e3a12020-09-29 22:07:04 -070033#if defined(MBEDTLS_PSA_CRYPTO_CONFIG)
Gilles Peskinef4c6eb02022-03-16 17:10:48 +010034#if defined(MBEDTLS_PSA_CRYPTO_CONFIG_FILE)
35#include MBEDTLS_PSA_CRYPTO_CONFIG_FILE
36#else
John Durkop6e33dbe2020-09-17 21:15:13 -070037#include "psa/crypto_config.h"
Gilles Peskinef4c6eb02022-03-16 17:10:48 +010038#endif
John Durkop76228ac2020-09-29 22:33:49 -070039#endif /* defined(MBEDTLS_PSA_CRYPTO_CONFIG) */
John Durkop6e33dbe2020-09-17 21:15:13 -070040
Gilles Peskinef4c6eb02022-03-16 17:10:48 +010041#if defined(MBEDTLS_PSA_CRYPTO_USER_CONFIG_FILE)
42#include MBEDTLS_PSA_CRYPTO_USER_CONFIG_FILE
43#endif
44
Valerio Settib7ef51a2023-06-06 14:32:58 +020045#include "psa/crypto_legacy.h"
46
John Durkop6e33dbe2020-09-17 21:15:13 -070047#ifdef __cplusplus
48extern "C" {
49#endif
50
Gilles Peskine1231eb52021-04-19 22:24:23 +020051
52
53/****************************************************************/
54/* De facto synonyms */
55/****************************************************************/
56
57#if defined(PSA_WANT_ALG_ECDSA_ANY) && !defined(PSA_WANT_ALG_ECDSA)
58#define PSA_WANT_ALG_ECDSA PSA_WANT_ALG_ECDSA_ANY
59#elif !defined(PSA_WANT_ALG_ECDSA_ANY) && defined(PSA_WANT_ALG_ECDSA)
60#define PSA_WANT_ALG_ECDSA_ANY PSA_WANT_ALG_ECDSA
61#endif
62
Gilles Peskine08622b62022-03-15 16:40:59 +010063#if defined(PSA_WANT_ALG_CCM_STAR_NO_TAG) && !defined(PSA_WANT_ALG_CCM)
64#define PSA_WANT_ALG_CCM PSA_WANT_ALG_CCM_STAR_NO_TAG
65#elif !defined(PSA_WANT_ALG_CCM_STAR_NO_TAG) && defined(PSA_WANT_ALG_CCM)
66#define PSA_WANT_ALG_CCM_STAR_NO_TAG PSA_WANT_ALG_CCM
67#endif
68
Gilles Peskine1231eb52021-04-19 22:24:23 +020069#if defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW) && !defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
70#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW
71#elif !defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW) && defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
72#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW PSA_WANT_ALG_RSA_PKCS1V15_SIGN
73#endif
74
Gilles Peskine44c96aa2021-10-04 18:33:56 +020075#if defined(PSA_WANT_ALG_RSA_PSS_ANY_SALT) && !defined(PSA_WANT_ALG_RSA_PSS)
76#define PSA_WANT_ALG_RSA_PSS PSA_WANT_ALG_RSA_PSS_ANY_SALT
77#elif !defined(PSA_WANT_ALG_RSA_PSS_ANY_SALT) && defined(PSA_WANT_ALG_RSA_PSS)
78#define PSA_WANT_ALG_RSA_PSS_ANY_SALT PSA_WANT_ALG_RSA_PSS
79#endif
80
Gilles Peskine1231eb52021-04-19 22:24:23 +020081
Manuel Pégourié-Gonnard235a9332023-03-14 18:01:23 +010082/****************************************************************/
83/* Hashes that are built in are also enabled in PSA.
84 * This simplifies dependency declarations especially
85 * for modules that obey MBEDTLS_USE_PSA_CRYPTO. */
86/****************************************************************/
87
88#if defined(MBEDTLS_MD5_C)
89#define PSA_WANT_ALG_MD5 1
90#endif
91
92#if defined(MBEDTLS_RIPEMD160_C)
93#define PSA_WANT_ALG_RIPEMD160 1
94#endif
95
96#if defined(MBEDTLS_SHA1_C)
97#define PSA_WANT_ALG_SHA_1 1
98#endif
99
100#if defined(MBEDTLS_SHA224_C)
101#define PSA_WANT_ALG_SHA_224 1
102#endif
103
104#if defined(MBEDTLS_SHA256_C)
105#define PSA_WANT_ALG_SHA_256 1
106#endif
107
108#if defined(MBEDTLS_SHA384_C)
109#define PSA_WANT_ALG_SHA_384 1
110#endif
111
112#if defined(MBEDTLS_SHA512_C)
113#define PSA_WANT_ALG_SHA_512 1
114#endif
115
Gilles Peskine1231eb52021-04-19 22:24:23 +0200116
117/****************************************************************/
118/* Require built-in implementations based on PSA requirements */
119/****************************************************************/
120
John Durkop2dfaf9c2020-09-24 04:30:10 -0700121#if defined(MBEDTLS_PSA_CRYPTO_CONFIG)
John Durkopd8959392020-09-20 23:09:17 -0700122
John Durkopd62b6782020-11-30 21:06:05 -0800123#if defined(PSA_WANT_ALG_DETERMINISTIC_ECDSA)
124#if !defined(MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA)
125#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
126#define MBEDTLS_ECDSA_DETERMINISTIC
127#define MBEDTLS_ECDSA_C
128#define MBEDTLS_HMAC_DRBG_C
129#define MBEDTLS_MD_C
130#endif /* !MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA */
131#endif /* PSA_WANT_ALG_DETERMINISTIC_ECDSA */
132
133#if defined(PSA_WANT_ALG_ECDH)
134#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDH)
135#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
136#define MBEDTLS_ECDH_C
137#define MBEDTLS_ECP_C
138#define MBEDTLS_BIGNUM_C
139#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDH */
140#endif /* PSA_WANT_ALG_ECDH */
141
142#if defined(PSA_WANT_ALG_ECDSA)
143#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDSA)
144#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
145#define MBEDTLS_ECDSA_C
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200146#define MBEDTLS_ECP_C
147#define MBEDTLS_BIGNUM_C
148#define MBEDTLS_ASN1_PARSE_C
149#define MBEDTLS_ASN1_WRITE_C
John Durkopd62b6782020-11-30 21:06:05 -0800150#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDSA */
151#endif /* PSA_WANT_ALG_ECDSA */
152
Przemek Stekiel84ee3e22022-12-01 14:22:34 +0100153#if defined(PSA_WANT_ALG_FFDH)
154#if !defined(MBEDTLS_PSA_ACCEL_ALG_FFDH)
155#define MBEDTLS_PSA_BUILTIN_ALG_FFDH 1
Przemek Stekiel84ee3e22022-12-01 14:22:34 +0100156#define MBEDTLS_BIGNUM_C
157#endif /* !MBEDTLS_PSA_ACCEL_ALG_FFDH */
158#endif /* PSA_WANT_ALG_FFDH */
159
John Durkopd62b6782020-11-30 21:06:05 -0800160#if defined(PSA_WANT_ALG_HKDF)
161#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF)
162#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
163#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
164#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF */
165#endif /* PSA_WANT_ALG_HKDF */
166
Przemek Stekiel3e8249c2022-06-03 14:05:07 +0200167#if defined(PSA_WANT_ALG_HKDF_EXTRACT)
168#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF_EXTRACT)
169#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
170#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXTRACT 1
171#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF_EXTRACT */
172#endif /* PSA_WANT_ALG_HKDF_EXTRACT */
173
174#if defined(PSA_WANT_ALG_HKDF_EXPAND)
175#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF_EXPAND)
176#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
177#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXPAND 1
178#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF_EXPAND */
179#endif /* PSA_WANT_ALG_HKDF_EXPAND */
180
John Durkopd62b6782020-11-30 21:06:05 -0800181#if defined(PSA_WANT_ALG_HMAC)
182#if !defined(MBEDTLS_PSA_ACCEL_ALG_HMAC)
183#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
184#endif /* !MBEDTLS_PSA_ACCEL_ALG_HMAC */
185#endif /* PSA_WANT_ALG_HMAC */
186
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100187#if defined(PSA_WANT_ALG_MD5) && !defined(MBEDTLS_PSA_ACCEL_ALG_MD5)
188#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
189#define MBEDTLS_MD5_C
190#endif
191
Neil Armstronga557cb82022-06-10 08:58:32 +0200192#if defined(PSA_WANT_ALG_JPAKE)
Przemek Stekiel4aa99402023-02-27 13:00:57 +0100193#if !defined(MBEDTLS_PSA_ACCEL_ALG_JPAKE)
Neil Armstrong637d0a02022-05-25 11:28:22 +0200194#define MBEDTLS_PSA_BUILTIN_PAKE 1
Neil Armstronga557cb82022-06-10 08:58:32 +0200195#define MBEDTLS_PSA_BUILTIN_ALG_JPAKE 1
Neil Armstronged407822022-06-15 11:21:33 +0200196#define MBEDTLS_ECP_DP_SECP256R1_ENABLED
Neil Armstrong637d0a02022-05-25 11:28:22 +0200197#define MBEDTLS_BIGNUM_C
198#define MBEDTLS_ECP_C
Neil Armstrong637d0a02022-05-25 11:28:22 +0200199#define MBEDTLS_ECJPAKE_C
Przemek Stekiel4aa99402023-02-27 13:00:57 +0100200#endif /* MBEDTLS_PSA_ACCEL_ALG_JPAKE */
Neil Armstronga557cb82022-06-10 08:58:32 +0200201#endif /* PSA_WANT_ALG_JPAKE */
Neil Armstrong637d0a02022-05-25 11:28:22 +0200202
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100203#if defined(PSA_WANT_ALG_RIPEMD160) && !defined(MBEDTLS_PSA_ACCEL_ALG_RIPEMD160)
204#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
205#define MBEDTLS_RIPEMD160_C
206#endif
207
John Durkopd62b6782020-11-30 21:06:05 -0800208#if defined(PSA_WANT_ALG_RSA_OAEP)
209#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP)
210#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
211#define MBEDTLS_RSA_C
212#define MBEDTLS_BIGNUM_C
213#define MBEDTLS_OID_C
214#define MBEDTLS_PKCS1_V21
John Durkopd62b6782020-11-30 21:06:05 -0800215#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP */
216#endif /* PSA_WANT_ALG_RSA_OAEP */
217
218#if defined(PSA_WANT_ALG_RSA_PKCS1V15_CRYPT)
219#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT)
220#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
221#define MBEDTLS_RSA_C
222#define MBEDTLS_BIGNUM_C
223#define MBEDTLS_OID_C
224#define MBEDTLS_PKCS1_V15
225#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT */
226#endif /* PSA_WANT_ALG_RSA_PKCS1V15_CRYPT */
227
228#if defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
229#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN)
230#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
231#define MBEDTLS_RSA_C
232#define MBEDTLS_BIGNUM_C
233#define MBEDTLS_OID_C
234#define MBEDTLS_PKCS1_V15
John Durkopd62b6782020-11-30 21:06:05 -0800235#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN */
236#endif /* PSA_WANT_ALG_RSA_PKCS1V15_SIGN */
237
238#if defined(PSA_WANT_ALG_RSA_PSS)
239#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PSS)
240#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
241#define MBEDTLS_RSA_C
242#define MBEDTLS_BIGNUM_C
243#define MBEDTLS_OID_C
244#define MBEDTLS_PKCS1_V21
John Durkopd62b6782020-11-30 21:06:05 -0800245#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PSS */
246#endif /* PSA_WANT_ALG_RSA_PSS */
247
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100248#if defined(PSA_WANT_ALG_SHA_1) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_1)
249#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
250#define MBEDTLS_SHA1_C
251#endif
252
253#if defined(PSA_WANT_ALG_SHA_224) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_224)
254#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200255#define MBEDTLS_SHA224_C
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100256#endif
257
258#if defined(PSA_WANT_ALG_SHA_256) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_256)
259#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
260#define MBEDTLS_SHA256_C
261#endif
262
263#if defined(PSA_WANT_ALG_SHA_384) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_384)
264#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200265#define MBEDTLS_SHA384_C
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100266#endif
267
268#if defined(PSA_WANT_ALG_SHA_512) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_512)
269#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
270#define MBEDTLS_SHA512_C
271#endif
272
Kusumit Ghoderao83baf892023-05-03 11:42:29 +0530273#if defined(PSA_WANT_ALG_PBKDF2_HMAC)
274#if !defined(MBEDTLS_PSA_ACCEL_ALG_PBKDF2_HMAC)
275#define MBEDTLS_PSA_BUILTIN_ALG_PBKDF2_HMAC 1
Kusumit Ghoderao105f7722023-07-27 21:03:06 +0530276#define PSA_HAVE_SOFT_PBKDF2_HMAC
Kusumit Ghoderaob9410e82023-05-03 18:36:35 +0530277#if !defined(MBEDTLS_PSA_ACCEL_ALG_HMAC)
Kusumit Ghoderao83baf892023-05-03 11:42:29 +0530278#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
Kusumit Ghoderaob9410e82023-05-03 18:36:35 +0530279#endif /* !MBEDTLS_PSA_ACCEL_ALG_HMAC */
Kusumit Ghoderao83baf892023-05-03 11:42:29 +0530280#endif /* !MBEDTLS_PSA_BUILTIN_ALG_PBKDF2_HMAC */
281#endif /* PSA_WANT_ALG_PBKDF2_HMAC */
282
John Durkop07cc04a2020-11-16 22:08:34 -0800283#if defined(PSA_WANT_ALG_TLS12_PRF)
284#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF)
John Durkopd62b6782020-11-30 21:06:05 -0800285#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
John Durkop07cc04a2020-11-16 22:08:34 -0800286#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF */
287#endif /* PSA_WANT_ALG_TLS12_PRF */
288
289#if defined(PSA_WANT_ALG_TLS12_PSK_TO_MS)
290#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS)
John Durkopd62b6782020-11-30 21:06:05 -0800291#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
John Durkop07cc04a2020-11-16 22:08:34 -0800292#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS */
293#endif /* PSA_WANT_ALG_TLS12_PSK_TO_MS */
294
Andrzej Kurek08d34b82022-07-29 10:00:16 -0400295#if defined(PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS)
296#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_ECJPAKE_TO_PMS)
297#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_ECJPAKE_TO_PMS 1
298#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_ECJPAKE_TO_PMS */
299#endif /* PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS */
300
Valerio Setti4520a8f2023-06-13 12:34:12 +0200301#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200302#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200303#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_IMPORT)
304#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_IMPORT 1
305#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_IMPORT */
306#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT */
307
308#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200309#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200310#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_EXPORT)
311#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_EXPORT 1
312#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_EXPORT */
313#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT */
314
315#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200316#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200317#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_GENERATE)
318#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_GENERATE 1
319#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_GENERATE */
320#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE */
321
322#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200323#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200324#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_DERIVE)
325#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_DERIVE 1
326#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_DERIVE */
327#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE */
328
Valerio Setti01cc88a2023-06-15 11:53:08 +0200329#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC)
Valerio Settiaac957b2023-06-09 16:59:00 +0200330#define PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200331#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_BASIC)
332#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
333#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_BASIC */
334#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC */
John Durkop07cc04a2020-11-16 22:08:34 -0800335
Valerio Setti4520a8f2023-06-13 12:34:12 +0200336#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_IMPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200337#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200338#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_IMPORT)
339#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_IMPORT 1
340#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_IMPORT */
341#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_IMPORT */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200342
Valerio Setti4520a8f2023-06-13 12:34:12 +0200343#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_EXPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200344#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200345#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_EXPORT)
346#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_EXPORT 1
347#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_EXPORT */
348#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_EXPORT */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200349
Valerio Setti4520a8f2023-06-13 12:34:12 +0200350#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_GENERATE)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200351#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200352#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_GENERATE)
353#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_GENERATE 1
354#define MBEDTLS_GENPRIME
355#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_GENERATE */
356#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_GENERATE */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200357
Valerio Setti01cc88a2023-06-15 11:53:08 +0200358#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC)
Valerio Settiaac957b2023-06-09 16:59:00 +0200359#define PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200360#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_BASIC)
361#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
362#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_BASIC */
363#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200364
Valerio Setti4520a8f2023-06-13 12:34:12 +0200365#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_IMPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200366#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200367#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_IMPORT)
368#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_IMPORT 1
369#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_IMPORT */
370#endif /* PSA_WANT_KEY_TYPE_DH_KEY_PAIR_IMPORT */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200371
Valerio Setti4520a8f2023-06-13 12:34:12 +0200372#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_EXPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200373#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200374#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_EXPORT)
375#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT 1
376#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_EXPORT */
377#endif /* PSA_WANT_KEY_TYPE_DH_KEY_PAIR_EXPORT */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200378
Valerio Setti4520a8f2023-06-13 12:34:12 +0200379#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_GENERATE)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200380#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200381#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_GENERATE)
382#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE 1
383#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_GENERATE */
384#endif /* PSA_WANT_KEY_TYPE_DH_KEY_PAIR_GENERATE */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200385
Valerio Setti01cc88a2023-06-15 11:53:08 +0200386#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC)
Valerio Settiaac957b2023-06-09 16:59:00 +0200387#define PSA_WANT_KEY_TYPE_DH_PUBLIC_KEY 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200388#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_BASIC)
389#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_BASIC 1
390#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_BASIC */
391#endif /* PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200392
John Durkop07cc04a2020-11-16 22:08:34 -0800393#if defined(PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY)
394#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800395#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
John Durkop07cc04a2020-11-16 22:08:34 -0800396#define MBEDTLS_ECP_C
397#define MBEDTLS_BIGNUM_C
398#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY */
399#endif /* PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY */
400
Przemek Stekiel6d85afa2023-04-28 11:42:17 +0200401#if defined(PSA_WANT_KEY_TYPE_DH_PUBLIC_KEY)
402#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_PUBLIC_KEY)
403#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY 1
Przemek Stekiel87d9a4a2022-12-15 13:22:11 +0100404#define MBEDTLS_BIGNUM_C
Przemek Stekiel6d85afa2023-04-28 11:42:17 +0200405#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_PUBLIC_KEY */
406#endif /* PSA_WANT_KEY_TYPE_DH_PUBLIC_KEY */
Przemek Stekiel87d9a4a2022-12-15 13:22:11 +0100407
John Durkop9814fa22020-11-04 12:28:15 -0800408#if defined(PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkop0e005192020-10-31 22:06:54 -0700409#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800410#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
John Durkop0e005192020-10-31 22:06:54 -0700411#define MBEDTLS_RSA_C
412#define MBEDTLS_BIGNUM_C
413#define MBEDTLS_OID_C
John Durkop07cc04a2020-11-16 22:08:34 -0800414#define MBEDTLS_PK_PARSE_C
415#define MBEDTLS_PK_WRITE_C
416#define MBEDTLS_PK_C
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200417#define MBEDTLS_ASN1_PARSE_C
418#define MBEDTLS_ASN1_WRITE_C
John Durkop0e005192020-10-31 22:06:54 -0700419#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkop9814fa22020-11-04 12:28:15 -0800420#endif /* PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkopd0321952020-10-29 21:37:36 -0700421
David Brownb781f752021-02-08 15:44:52 -0700422/* If any of the block modes are requested that don't have an
423 * associated HW assist, define PSA_HAVE_SOFT_BLOCK_MODE for checking
424 * in the block cipher key types. */
425#if (defined(PSA_WANT_ALG_CTR) && !defined(MBEDTLS_PSA_ACCEL_ALG_CTR)) || \
Bence Szépkúti7921cce2021-02-17 11:46:50 +0100426 (defined(PSA_WANT_ALG_CFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_CFB)) || \
David Brownb781f752021-02-08 15:44:52 -0700427 (defined(PSA_WANT_ALG_OFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_OFB)) || \
David Brownb781f752021-02-08 15:44:52 -0700428 defined(PSA_WANT_ALG_ECB_NO_PADDING) || \
429 (defined(PSA_WANT_ALG_CBC_NO_PADDING) && \
Gilles Peskine449bd832023-01-11 14:50:10 +0100430 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING)) || \
David Brownb781f752021-02-08 15:44:52 -0700431 (defined(PSA_WANT_ALG_CBC_PKCS7) && \
Gilles Peskine449bd832023-01-11 14:50:10 +0100432 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7)) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100433 (defined(PSA_WANT_ALG_CMAC) && !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC))
David Brownb781f752021-02-08 15:44:52 -0700434#define PSA_HAVE_SOFT_BLOCK_MODE 1
435#endif
436
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100437#if (defined(PSA_WANT_ALG_GCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_GCM)) || \
438 (defined(PSA_WANT_ALG_CCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_CCM))
439#define PSA_HAVE_SOFT_BLOCK_AEAD 1
440#endif
441
Kusumit Ghoderaoc22affd2023-07-28 13:31:58 +0530442#if defined(PSA_WANT_ALG_PBKDF2_AES_CMAC_PRF_128)
443#if !defined(MBEDTLS_PSA_ACCEL_ALG_PBKDF2_AES_CMAC_PRF_128)
444#define MBEDTLS_PSA_BUILTIN_ALG_PBKDF2_AES_CMAC_PRF_128 1
445#define PSA_HAVE_SOFT_PBKDF2_CMAC
446#endif /* !MBEDTLS_PSA_ACCEL_ALG_PBKDF2_AES_CMAC_PRF_128 */
447#endif /* PSA_WANT_ALG_PBKDF2_AES_CMAC_PRF_128 */
448
David Brown94933082021-01-05 12:03:25 -0700449#if defined(PSA_WANT_KEY_TYPE_AES)
David Browne1f91f02021-02-09 15:56:22 -0700450#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_AES)
451#define PSA_HAVE_SOFT_KEY_TYPE_AES 1
452#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_AES */
453#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100454 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
Kusumit Ghoderaoc22affd2023-07-28 13:31:58 +0530455 defined(PSA_HAVE_SOFT_BLOCK_AEAD) || \
456 defined(PSA_HAVE_SOFT_PBKDF2_CMAC)
David Brown78a429b2021-01-21 09:48:57 -0700457#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700458#define MBEDTLS_AES_C
David Browne1f91f02021-02-09 15:56:22 -0700459#endif /* PSA_HAVE_SOFT_KEY_TYPE_AES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown94933082021-01-05 12:03:25 -0700460#endif /* PSA_WANT_KEY_TYPE_AES */
461
Gilles Peskine09c46da2021-10-08 15:48:16 +0200462#if defined(PSA_WANT_KEY_TYPE_ARIA)
463#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA)
464#define PSA_HAVE_SOFT_KEY_TYPE_ARIA 1
465#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA */
466#if defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
467 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
468 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
469#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
470#define MBEDTLS_ARIA_C
471#endif /* PSA_HAVE_SOFT_KEY_TYPE_ARIA || PSA_HAVE_SOFT_BLOCK_MODE */
472#endif /* PSA_WANT_KEY_TYPE_ARIA */
473
David Brown686e6e82021-01-05 12:03:25 -0700474#if defined(PSA_WANT_KEY_TYPE_CAMELLIA)
David Browne1f91f02021-02-09 15:56:22 -0700475#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA)
476#define PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA 1
477#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA */
478#if defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100479 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
480 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
David Brown78a429b2021-01-21 09:48:57 -0700481#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700482#define MBEDTLS_CAMELLIA_C
David Browne1f91f02021-02-09 15:56:22 -0700483#endif /* PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown686e6e82021-01-05 12:03:25 -0700484#endif /* PSA_WANT_KEY_TYPE_CAMELLIA */
485
David Brownb65a7f72021-01-15 12:04:09 -0700486#if defined(PSA_WANT_KEY_TYPE_DES)
David Browne1f91f02021-02-09 15:56:22 -0700487#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DES)
488#define PSA_HAVE_SOFT_KEY_TYPE_DES 1
489#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DES */
490#if defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
David Brownb781f752021-02-08 15:44:52 -0700491 defined(PSA_HAVE_SOFT_BLOCK_MODE)
David Brown78a429b2021-01-21 09:48:57 -0700492#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700493#define MBEDTLS_DES_C
David Browne1f91f02021-02-09 15:56:22 -0700494#endif /*PSA_HAVE_SOFT_KEY_TYPE_DES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brownb65a7f72021-01-15 12:04:09 -0700495#endif /* PSA_WANT_KEY_TYPE_DES */
496
David Brownb16727a2021-02-08 16:31:46 -0700497#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
498#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20)
499#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
500#define MBEDTLS_CHACHA20_C
501#endif /*!MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20 */
502#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
503
David Brownf84a0f62021-02-09 15:59:41 -0700504/* If any of the software block ciphers are selected, define
505 * PSA_HAVE_SOFT_BLOCK_CIPHER, which can be used in any of these
506 * situations. */
507#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200508 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
David Brownf84a0f62021-02-09 15:59:41 -0700509 defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
510 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
511#define PSA_HAVE_SOFT_BLOCK_CIPHER 1
512#endif
513
David Brown99844272021-01-15 12:04:47 -0700514#if defined(PSA_WANT_ALG_STREAM_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700515#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brown99844272021-01-15 12:04:47 -0700516#endif /* PSA_WANT_ALG_STREAM_CIPHER */
517
Ronald Crond85e98d2021-03-25 15:32:32 +0100518#if defined(PSA_WANT_ALG_CBC_MAC)
519#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_MAC)
520#error "CBC-MAC is not yet supported via the PSA API in Mbed TLS."
521#define MBEDTLS_PSA_BUILTIN_ALG_CBC_MAC 1
522#endif /* !MBEDTLS_PSA_ACCEL_ALG_CBC_MAC */
523#endif /* PSA_WANT_ALG_CBC_MAC */
524
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100525#if defined(PSA_WANT_ALG_CMAC)
526#if !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC) || \
Kusumit Ghoderaoc22affd2023-07-28 13:31:58 +0530527 defined(PSA_HAVE_SOFT_BLOCK_CIPHER) || \
528 defined(PSA_HAVE_SOFT_PBKDF2_CMAC)
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100529#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
530#define MBEDTLS_CMAC_C
531#endif /* !MBEDTLS_PSA_ACCEL_ALG_CMAC */
Kusumit Ghoderaoce38db12023-07-27 21:01:03 +0530532#endif /* PSA_WANT_ALG_CMAC */
533
Kusumit Ghoderao105f7722023-07-27 21:03:06 +0530534#if defined(PSA_HAVE_SOFT_PBKDF2_HMAC) || \
535 defined(PSA_HAVE_SOFT_PBKDF2_CMAC)
536#define PSA_HAVE_SOFT_PBKDF2 1
537#endif /* PSA_HAVE_SOFT_PBKDF2_HMAC || PSA_HAVE_SOFT_PBKDF2_CMAC */
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100538
David Brown99844272021-01-15 12:04:47 -0700539#if defined(PSA_WANT_ALG_CTR)
David Brown4b9ec7a2021-02-05 12:47:08 -0700540#if !defined(MBEDTLS_PSA_ACCEL_ALG_CTR) || \
David Brownf84a0f62021-02-09 15:59:41 -0700541 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700542#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700543#define MBEDTLS_CIPHER_MODE_CTR
David Brown4b9ec7a2021-02-05 12:47:08 -0700544#endif
David Brown99844272021-01-15 12:04:47 -0700545#endif /* PSA_WANT_ALG_CTR */
546
547#if defined(PSA_WANT_ALG_CFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700548#if !defined(MBEDTLS_PSA_ACCEL_ALG_CFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700549 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700550#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700551#define MBEDTLS_CIPHER_MODE_CFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700552#endif
David Brown99844272021-01-15 12:04:47 -0700553#endif /* PSA_WANT_ALG_CFB */
554
555#if defined(PSA_WANT_ALG_OFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700556#if !defined(MBEDTLS_PSA_ACCEL_ALG_OFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700557 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700558#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700559#define MBEDTLS_CIPHER_MODE_OFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700560#endif
David Brown99844272021-01-15 12:04:47 -0700561#endif /* PSA_WANT_ALG_OFB */
562
Gilles Peskine7a2e83b2022-03-17 11:09:23 +0100563#if defined(PSA_WANT_ALG_ECB_NO_PADDING) && \
564 !defined(MBEDTLS_PSA_ACCEL_ALG_ECB_NO_PADDING)
David Brownbe380c12021-02-11 10:55:48 -0700565#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700566#endif
567
David Brown12f45f92021-01-26 11:50:36 -0700568#if defined(PSA_WANT_ALG_CBC_NO_PADDING)
David Brown4b9ec7a2021-02-05 12:47:08 -0700569#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING) || \
David Brownfc468182021-02-09 16:23:34 -0700570 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700571#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700572#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown4b9ec7a2021-02-05 12:47:08 -0700573#endif
David Brown12f45f92021-01-26 11:50:36 -0700574#endif /* PSA_WANT_ALG_CBC_NO_PADDING */
575
576#if defined(PSA_WANT_ALG_CBC_PKCS7)
David Brown4b9ec7a2021-02-05 12:47:08 -0700577#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7) || \
David Brownfc468182021-02-09 16:23:34 -0700578 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700579#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700580#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brownfc468182021-02-09 16:23:34 -0700581#define MBEDTLS_CIPHER_PADDING_PKCS7
David Brown4b9ec7a2021-02-05 12:47:08 -0700582#endif
David Brown12f45f92021-01-26 11:50:36 -0700583#endif /* PSA_WANT_ALG_CBC_PKCS7 */
584
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100585#if defined(PSA_WANT_ALG_CCM)
586#if !defined(MBEDTLS_PSA_ACCEL_ALG_CCM) || \
587 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200588 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100589 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
590#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100591#define MBEDTLS_PSA_BUILTIN_ALG_CCM_STAR_NO_TAG 1
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100592#define MBEDTLS_CCM_C
593#endif
594#endif /* PSA_WANT_ALG_CCM */
595
596#if defined(PSA_WANT_ALG_GCM)
597#if !defined(MBEDTLS_PSA_ACCEL_ALG_GCM) || \
598 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200599 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100600 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
601#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
602#define MBEDTLS_GCM_C
603#endif
604#endif /* PSA_WANT_ALG_GCM */
605
David Brownac4fa072021-02-08 16:47:35 -0700606#if defined(PSA_WANT_ALG_CHACHA20_POLY1305)
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200607#if !defined(MBEDTLS_PSA_ACCEL_ALG_CHACHA20_POLY1305)
David Brownac4fa072021-02-08 16:47:35 -0700608#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
609#define MBEDTLS_CHACHAPOLY_C
Summer Qin9f2596f2022-06-17 12:50:32 +0800610#define MBEDTLS_CHACHA20_C
611#define MBEDTLS_POLY1305_C
David Brown86730a82021-02-09 16:24:11 -0700612#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700613#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200614#endif /* !MBEDTLS_PSA_ACCEL_ALG_CHACHA20_POLY1305 */
David Brownac4fa072021-02-08 16:47:35 -0700615#endif /* PSA_WANT_ALG_CHACHA20_POLY1305 */
616
David Browneed74df2021-03-15 15:53:57 -0600617#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_256)
618#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256)
619#define MBEDTLS_ECP_DP_BP256R1_ENABLED
620#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
621#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256 */
622#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_256 */
623
624#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_384)
625#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384)
626#define MBEDTLS_ECP_DP_BP384R1_ENABLED
627#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
628#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384 */
629#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_384 */
630
631#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_512)
632#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512)
633#define MBEDTLS_ECP_DP_BP512R1_ENABLED
634#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
635#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512 */
636#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_512 */
637
638#if defined(PSA_WANT_ECC_MONTGOMERY_255)
639#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255)
640#define MBEDTLS_ECP_DP_CURVE25519_ENABLED
641#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
642#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255 */
643#endif /* PSA_WANT_ECC_MONTGOMERY_255 */
644
645#if defined(PSA_WANT_ECC_MONTGOMERY_448)
646#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448)
647#define MBEDTLS_ECP_DP_CURVE448_ENABLED
648#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
649#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448 */
650#endif /* PSA_WANT_ECC_MONTGOMERY_448 */
651
David Brownc7b9b2b2021-02-19 21:05:52 -0700652#if defined(PSA_WANT_ECC_SECP_R1_192)
653#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192)
654#define MBEDTLS_ECP_DP_SECP192R1_ENABLED
655#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
656#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192 */
657#endif /* PSA_WANT_ECC_SECP_R1_192 */
658
659#if defined(PSA_WANT_ECC_SECP_R1_224)
660#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224)
661#define MBEDTLS_ECP_DP_SECP224R1_ENABLED
662#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
663#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224 */
664#endif /* PSA_WANT_ECC_SECP_R1_224 */
665
666#if defined(PSA_WANT_ECC_SECP_R1_256)
667#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256)
668#define MBEDTLS_ECP_DP_SECP256R1_ENABLED
669#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
670#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256 */
671#endif /* PSA_WANT_ECC_SECP_R1_256 */
672
673#if defined(PSA_WANT_ECC_SECP_R1_384)
674#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384)
675#define MBEDTLS_ECP_DP_SECP384R1_ENABLED
676#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
677#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384 */
678#endif /* PSA_WANT_ECC_SECP_R1_384 */
679
680#if defined(PSA_WANT_ECC_SECP_R1_521)
681#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521)
682#define MBEDTLS_ECP_DP_SECP521R1_ENABLED
683#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
684#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521 */
685#endif /* PSA_WANT_ECC_SECP_R1_521 */
686
687#if defined(PSA_WANT_ECC_SECP_K1_192)
688#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192)
David Brown8de143e2021-02-19 14:08:00 -0700689#define MBEDTLS_ECP_DP_SECP192K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700690#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
691#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192 */
692#endif /* PSA_WANT_ECC_SECP_K1_192 */
David Brown8de143e2021-02-19 14:08:00 -0700693
David Brownc7b9b2b2021-02-19 21:05:52 -0700694#if defined(PSA_WANT_ECC_SECP_K1_224)
695#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224)
Ronald Crone1f55162021-03-25 15:09:47 +0100696/*
697 * SECP224K1 is buggy via the PSA API in Mbed TLS
Dave Rodgman017a1992022-03-31 14:07:01 +0100698 * (https://github.com/Mbed-TLS/mbedtls/issues/3541).
Ronald Crone1f55162021-03-25 15:09:47 +0100699 */
700#error "SECP224K1 is buggy via the PSA API in Mbed TLS."
David Brown8de143e2021-02-19 14:08:00 -0700701#define MBEDTLS_ECP_DP_SECP224K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700702#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
703#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224 */
704#endif /* PSA_WANT_ECC_SECP_K1_224 */
David Brown8de143e2021-02-19 14:08:00 -0700705
David Brownc7b9b2b2021-02-19 21:05:52 -0700706#if defined(PSA_WANT_ECC_SECP_K1_256)
707#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256)
David Brown9b178de2021-03-10 13:14:48 -0700708#define MBEDTLS_ECP_DP_SECP256K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700709#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
710#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256 */
711#endif /* PSA_WANT_ECC_SECP_K1_256 */
David Brown8de143e2021-02-19 14:08:00 -0700712
Gilles Peskine1231eb52021-04-19 22:24:23 +0200713
714
715/****************************************************************/
716/* Infer PSA requirements from Mbed TLS capabilities */
717/****************************************************************/
718
John Durkop714e3a12020-09-29 22:07:04 -0700719#else /* MBEDTLS_PSA_CRYPTO_CONFIG */
720
721/*
722 * Ensure PSA_WANT_* defines are setup properly if MBEDTLS_PSA_CRYPTO_CONFIG
723 * is not defined
724 */
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100725
Ronald Cron3d471812021-03-18 13:40:31 +0100726#if defined(MBEDTLS_CCM_C)
727#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100728#define MBEDTLS_PSA_BUILTIN_ALG_CCM_STAR_NO_TAG 1
Ronald Cron3d471812021-03-18 13:40:31 +0100729#define PSA_WANT_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100730#define PSA_WANT_ALG_CCM_STAR_NO_TAG 1
Ronald Cron3d471812021-03-18 13:40:31 +0100731#endif /* MBEDTLS_CCM_C */
732
733#if defined(MBEDTLS_CMAC_C)
734#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
735#define PSA_WANT_ALG_CMAC 1
736#endif /* MBEDTLS_CMAC_C */
737
John Durkopd62b6782020-11-30 21:06:05 -0800738#if defined(MBEDTLS_ECDH_C)
739#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
740#define PSA_WANT_ALG_ECDH 1
741#endif /* MBEDTLS_ECDH_C */
742
743#if defined(MBEDTLS_ECDSA_C)
744#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
745#define PSA_WANT_ALG_ECDSA 1
Gilles Peskine1231eb52021-04-19 22:24:23 +0200746#define PSA_WANT_ALG_ECDSA_ANY 1
John Durkopd62b6782020-11-30 21:06:05 -0800747
748// Only add in DETERMINISTIC support if ECDSA is also enabled
749#if defined(MBEDTLS_ECDSA_DETERMINISTIC)
750#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
751#define PSA_WANT_ALG_DETERMINISTIC_ECDSA 1
752#endif /* MBEDTLS_ECDSA_DETERMINISTIC */
753
754#endif /* MBEDTLS_ECDSA_C */
755
756#if defined(MBEDTLS_ECP_C)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200757#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Settif87b5052023-05-26 13:47:09 +0200758#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT 1
759#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT 1
Valerio Settif87b5052023-05-26 13:47:09 +0200760#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200761#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Settiddb57762023-06-06 14:17:15 +0200762#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_IMPORT 1
763#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_EXPORT 1
764#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_GENERATE 1
John Durkopd62b6782020-11-30 21:06:05 -0800765#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
766#define PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY 1
767#endif /* MBEDTLS_ECP_C */
768
Przemek Stekiel746dfae2023-05-04 09:14:08 +0200769#if defined(MBEDTLS_DHM_C)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200770#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC 1
Valerio Settif87b5052023-05-26 13:47:09 +0200771#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_IMPORT 1
772#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_EXPORT 1
Valerio Settif87b5052023-05-26 13:47:09 +0200773#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_GENERATE 1
Przemek Stekiel746dfae2023-05-04 09:14:08 +0200774#define PSA_WANT_KEY_TYPE_DH_PUBLIC_KEY 1
775#define PSA_WANT_ALG_FFDH 1
776#define PSA_WANT_DH_FAMILY_RFC7919 1
777#define MBEDTLS_PSA_BUILTIN_ALG_FFDH 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200778#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_BASIC 1
Valerio Settif87b5052023-05-26 13:47:09 +0200779#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_IMPORT 1
780#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT 1
781#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE 1
Przemek Stekiel746dfae2023-05-04 09:14:08 +0200782#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY 1
783#endif /* MBEDTLS_DHM_C */
784
Ronald Cron3d471812021-03-18 13:40:31 +0100785#if defined(MBEDTLS_GCM_C)
786#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
787#define PSA_WANT_ALG_GCM 1
788#endif /* MBEDTLS_GCM_C */
789
Przemek Stekiel18399d82022-06-27 13:34:50 +0200790/* Enable PSA HKDF algorithm if mbedtls HKDF is supported.
791 * PSA HKDF EXTRACT and PSA HKDF EXPAND have minimal cost when
792 * PSA HKDF is enabled, so enable both algorithms together
793 * with PSA HKDF. */
John Durkopd62b6782020-11-30 21:06:05 -0800794#if defined(MBEDTLS_HKDF_C)
795#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
796#define PSA_WANT_ALG_HMAC 1
797#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
798#define PSA_WANT_ALG_HKDF 1
Przemek Stekielb33bd192022-06-21 09:58:51 +0200799#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXTRACT 1
800#define PSA_WANT_ALG_HKDF_EXTRACT 1
801#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXPAND 1
802#define PSA_WANT_ALG_HKDF_EXPAND 1
John Durkopd62b6782020-11-30 21:06:05 -0800803#endif /* MBEDTLS_HKDF_C */
804
John Durkopd62b6782020-11-30 21:06:05 -0800805#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
806#define PSA_WANT_ALG_HMAC 1
Gilles Peskine47a89332021-01-12 00:00:15 +0100807#define PSA_WANT_KEY_TYPE_HMAC
Andrzej Kurek65bf73e2022-08-31 14:59:31 -0400808
809#if defined(MBEDTLS_MD_C)
John Durkopd62b6782020-11-30 21:06:05 -0800810#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
811#define PSA_WANT_ALG_TLS12_PRF 1
812#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
813#define PSA_WANT_ALG_TLS12_PSK_TO_MS 1
814#endif /* MBEDTLS_MD_C */
815
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100816#if defined(MBEDTLS_MD5_C)
817#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
818#define PSA_WANT_ALG_MD5 1
819#endif
820
Neil Armstrong637d0a02022-05-25 11:28:22 +0200821#if defined(MBEDTLS_ECJPAKE_C)
822#define MBEDTLS_PSA_BUILTIN_PAKE 1
Neil Armstronga557cb82022-06-10 08:58:32 +0200823#define MBEDTLS_PSA_BUILTIN_ALG_JPAKE 1
824#define PSA_WANT_ALG_JPAKE 1
Neil Armstrong637d0a02022-05-25 11:28:22 +0200825#endif
826
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100827#if defined(MBEDTLS_RIPEMD160_C)
828#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
829#define PSA_WANT_ALG_RIPEMD160 1
830#endif
831
John Durkopd62b6782020-11-30 21:06:05 -0800832#if defined(MBEDTLS_RSA_C)
833#if defined(MBEDTLS_PKCS1_V15)
834#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
835#define PSA_WANT_ALG_RSA_PKCS1V15_CRYPT 1
836#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
837#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN 1
Gilles Peskine1231eb52021-04-19 22:24:23 +0200838#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW 1
Yuto Takano7828ca22021-08-10 11:26:15 +0100839#endif /* MBEDTLS_PKCS1_V15 */
John Durkopd62b6782020-11-30 21:06:05 -0800840#if defined(MBEDTLS_PKCS1_V21)
841#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
842#define PSA_WANT_ALG_RSA_OAEP 1
843#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
844#define PSA_WANT_ALG_RSA_PSS 1
845#endif /* MBEDTLS_PKCS1_V21 */
Valerio Setti01cc88a2023-06-15 11:53:08 +0200846#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
Valerio Settif87b5052023-05-26 13:47:09 +0200847#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_IMPORT 1
848#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_EXPORT 1
849#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_GENERATE 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200850#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
Valerio Settif87b5052023-05-26 13:47:09 +0200851#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_IMPORT 1
852#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_EXPORT 1
853#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_GENERATE 1
John Durkopd62b6782020-11-30 21:06:05 -0800854#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
855#define PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY 1
856#endif /* MBEDTLS_RSA_C */
857
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100858#if defined(MBEDTLS_SHA1_C)
859#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
860#define PSA_WANT_ALG_SHA_1 1
861#endif
862
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200863#if defined(MBEDTLS_SHA224_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100864#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
Gilles Peskineb65db072021-01-12 00:00:53 +0100865#define PSA_WANT_ALG_SHA_224 1
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200866#endif
867
868#if defined(MBEDTLS_SHA256_C)
869#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100870#define PSA_WANT_ALG_SHA_256 1
871#endif
872
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200873#if defined(MBEDTLS_SHA384_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100874#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
875#define PSA_WANT_ALG_SHA_384 1
876#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200877
878#if defined(MBEDTLS_SHA512_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100879#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
880#define PSA_WANT_ALG_SHA_512 1
881#endif
882
David Brown94933082021-01-05 12:03:25 -0700883#if defined(MBEDTLS_AES_C)
884#define PSA_WANT_KEY_TYPE_AES 1
David Brownda7dbb72021-01-26 11:44:15 -0700885#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700886#endif
887
Gilles Peskine09c46da2021-10-08 15:48:16 +0200888#if defined(MBEDTLS_ARIA_C)
889#define PSA_WANT_KEY_TYPE_ARIA 1
890#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
891#endif
892
David Brown686e6e82021-01-05 12:03:25 -0700893#if defined(MBEDTLS_CAMELLIA_C)
894#define PSA_WANT_KEY_TYPE_CAMELLIA 1
David Brownda7dbb72021-01-26 11:44:15 -0700895#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700896#endif
897
David Brownb65a7f72021-01-15 12:04:09 -0700898#if defined(MBEDTLS_DES_C)
899#define PSA_WANT_KEY_TYPE_DES 1
David Brownda7dbb72021-01-26 11:44:15 -0700900#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700901#endif
902
Andrzej Kurekd60907b2022-09-14 10:02:30 -0400903#if defined(MBEDTLS_PSA_BUILTIN_ALG_SHA_256)
904#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_ECJPAKE_TO_PMS 1
905#define PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS 1
906#endif
907
David Brownb16727a2021-02-08 16:31:46 -0700908#if defined(MBEDTLS_CHACHA20_C)
909#define PSA_WANT_KEY_TYPE_CHACHA20 1
910#define PSA_WANT_ALG_STREAM_CIPHER 1
911#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
912#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brownac4fa072021-02-08 16:47:35 -0700913#if defined(MBEDTLS_CHACHAPOLY_C)
914#define PSA_WANT_ALG_CHACHA20_POLY1305 1
David Brown86730a82021-02-09 16:24:11 -0700915#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700916#endif
David Brownb16727a2021-02-08 16:31:46 -0700917#endif
918
David Brown99844272021-01-15 12:04:47 -0700919#if defined(MBEDTLS_CIPHER_MODE_CBC)
David Brown10cb81c2021-02-09 16:10:29 -0700920#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700921#define PSA_WANT_ALG_CBC_NO_PADDING 1
922#if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
David Brown12f45f92021-01-26 11:50:36 -0700923#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brown99844272021-01-15 12:04:47 -0700924#define PSA_WANT_ALG_CBC_PKCS7 1
925#endif
926#endif
927
928#if defined(MBEDTLS_AES_C) || defined(MBEDTLS_DES_C) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200929 defined(MBEDTLS_ARIA_C) || defined(MBEDTLS_CAMELLIA_C)
David Brown10cb81c2021-02-09 16:10:29 -0700930#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700931#define PSA_WANT_ALG_ECB_NO_PADDING 1
932#endif
933
934#if defined(MBEDTLS_CIPHER_MODE_CFB)
David Brown12f45f92021-01-26 11:50:36 -0700935#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700936#define PSA_WANT_ALG_CFB 1
937#endif
938
939#if defined(MBEDTLS_CIPHER_MODE_CTR)
David Brown12f45f92021-01-26 11:50:36 -0700940#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700941#define PSA_WANT_ALG_CTR 1
942#endif
943
944#if defined(MBEDTLS_CIPHER_MODE_OFB)
David Brown12f45f92021-01-26 11:50:36 -0700945#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700946#define PSA_WANT_ALG_OFB 1
947#endif
948
David Browneed74df2021-03-15 15:53:57 -0600949#if defined(MBEDTLS_ECP_DP_BP256R1_ENABLED)
950#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
951#define PSA_WANT_ECC_BRAINPOOL_P_R1_256
952#endif
953
954#if defined(MBEDTLS_ECP_DP_BP384R1_ENABLED)
955#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
956#define PSA_WANT_ECC_BRAINPOOL_P_R1_384
957#endif
958
959#if defined(MBEDTLS_ECP_DP_BP512R1_ENABLED)
960#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
961#define PSA_WANT_ECC_BRAINPOOL_P_R1_512
962#endif
963
964#if defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED)
965#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
966#define PSA_WANT_ECC_MONTGOMERY_255
967#endif
968
Archanaef6aa5c2021-06-08 11:40:10 +0530969#if defined(MBEDTLS_ECP_DP_CURVE448_ENABLED)
David Browneed74df2021-03-15 15:53:57 -0600970#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
971#define PSA_WANT_ECC_MONTGOMERY_448
972#endif
973
David Brown8de143e2021-02-19 14:08:00 -0700974#if defined(MBEDTLS_ECP_DP_SECP192R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700975#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
976#define PSA_WANT_ECC_SECP_R1_192
David Brown8de143e2021-02-19 14:08:00 -0700977#endif
978
979#if defined(MBEDTLS_ECP_DP_SECP224R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700980#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
981#define PSA_WANT_ECC_SECP_R1_224
David Brown8de143e2021-02-19 14:08:00 -0700982#endif
983
984#if defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700985#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
986#define PSA_WANT_ECC_SECP_R1_256
David Brown8de143e2021-02-19 14:08:00 -0700987#endif
988
989#if defined(MBEDTLS_ECP_DP_SECP384R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700990#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
991#define PSA_WANT_ECC_SECP_R1_384
David Brown8de143e2021-02-19 14:08:00 -0700992#endif
993
994#if defined(MBEDTLS_ECP_DP_SECP521R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700995#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
996#define PSA_WANT_ECC_SECP_R1_521
David Brown8de143e2021-02-19 14:08:00 -0700997#endif
998
999#if defined(MBEDTLS_ECP_DP_SECP192K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -07001000#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
1001#define PSA_WANT_ECC_SECP_K1_192
David Brown8de143e2021-02-19 14:08:00 -07001002#endif
1003
Dave Rodgman017a1992022-03-31 14:07:01 +01001004/* SECP224K1 is buggy via the PSA API (https://github.com/Mbed-TLS/mbedtls/issues/3541) */
Gilles Peskine39841302021-03-23 12:06:45 +01001005#if 0 && defined(MBEDTLS_ECP_DP_SECP224K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -07001006#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
1007#define PSA_WANT_ECC_SECP_K1_224
David Brown8de143e2021-02-19 14:08:00 -07001008#endif
1009
David Brown9b178de2021-03-10 13:14:48 -07001010#if defined(MBEDTLS_ECP_DP_SECP256K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -07001011#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
1012#define PSA_WANT_ECC_SECP_K1_256
David Brown8de143e2021-02-19 14:08:00 -07001013#endif
1014
John Durkop2dfaf9c2020-09-24 04:30:10 -07001015#endif /* MBEDTLS_PSA_CRYPTO_CONFIG */
John Durkopd8959392020-09-20 23:09:17 -07001016
Tom Cosgrove6d62fac2023-05-10 14:40:05 +01001017#if defined(PSA_WANT_ALG_JPAKE)
1018#define PSA_WANT_ALG_SOME_PAKE 1
1019#endif
1020
Valerio Setti89cb1442023-06-06 14:12:17 +02001021/* Temporary internal migration helpers */
Valerio Setti01cc88a2023-06-15 11:53:08 +02001022#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC) || \
Valerio Settif4d7ede2023-06-09 12:10:33 +02001023 defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT) || \
1024 defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT) || \
1025 defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE) || \
valerio36befce2023-05-31 14:43:06 +02001026 defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE)
Valerio Setti8d6e98c2023-05-26 13:46:13 +02001027#define MBEDTLS_PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_LEGACY
1028#endif
1029
Valerio Setti89cb1442023-06-06 14:12:17 +02001030/* Temporary internal migration helpers */
Valerio Setti01cc88a2023-06-15 11:53:08 +02001031#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC) || \
Valerio Settif4d7ede2023-06-09 12:10:33 +02001032 defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_IMPORT) || \
1033 defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_EXPORT) || \
Valerio Setti8d6e98c2023-05-26 13:46:13 +02001034 defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_GENERATE)
1035#define MBEDTLS_PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_LEGACY
1036#endif
1037
Valerio Setti89cb1442023-06-06 14:12:17 +02001038/* Temporary internal migration helpers */
Valerio Setti01cc88a2023-06-15 11:53:08 +02001039#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC) || \
Valerio Settif4d7ede2023-06-09 12:10:33 +02001040 defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_IMPORT) || \
1041 defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_EXPORT) || \
Valerio Setti602ee2e2023-06-06 14:10:15 +02001042 defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_GENERATE)
Valerio Setti8d6e98c2023-05-26 13:46:13 +02001043#define MBEDTLS_PSA_WANT_KEY_TYPE_DH_KEY_PAIR_LEGACY
1044#endif
1045
Valerio Setti89cb1442023-06-06 14:12:17 +02001046/* Temporary internal migration helpers */
Valerio Setti01cc88a2023-06-15 11:53:08 +02001047#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_BASIC) || \
Valerio Settif4d7ede2023-06-09 12:10:33 +02001048 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_IMPORT) || \
1049 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_EXPORT) || \
1050 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_GENERATE) || \
Valerio Setti8d6e98c2023-05-26 13:46:13 +02001051 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_DERIVE)
1052#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_LEGACY
1053#endif
1054
Valerio Setti89cb1442023-06-06 14:12:17 +02001055/* Temporary internal migration helpers */
Valerio Setti01cc88a2023-06-15 11:53:08 +02001056#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_BASIC) || \
Valerio Settif4d7ede2023-06-09 12:10:33 +02001057 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_IMPORT) || \
1058 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_EXPORT) || \
Valerio Setti8d6e98c2023-05-26 13:46:13 +02001059 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_GENERATE)
1060#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_LEGACY
1061#endif
1062
Valerio Setti89cb1442023-06-06 14:12:17 +02001063/* Temporary internal migration helpers */
Valerio Setti01cc88a2023-06-15 11:53:08 +02001064#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_BASIC) || \
Valerio Settif4d7ede2023-06-09 12:10:33 +02001065 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_IMPORT) || \
1066 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT) || \
Valerio Setti602ee2e2023-06-06 14:10:15 +02001067 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE)
Valerio Setti8d6e98c2023-05-26 13:46:13 +02001068#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_LEGACY
1069#endif
1070
Gilles Peskine60b29fe2021-02-16 14:06:50 +01001071/* These features are always enabled. */
1072#define PSA_WANT_KEY_TYPE_DERIVE 1
Gilles Peskinebba26302022-12-15 23:25:17 +01001073#define PSA_WANT_KEY_TYPE_PASSWORD 1
1074#define PSA_WANT_KEY_TYPE_PASSWORD_HASH 1
Gilles Peskine60b29fe2021-02-16 14:06:50 +01001075#define PSA_WANT_KEY_TYPE_RAW_DATA 1
1076
John Durkop6e33dbe2020-09-17 21:15:13 -07001077#ifdef __cplusplus
1078}
1079#endif
1080
1081#endif /* MBEDTLS_CONFIG_PSA_H */