blob: 5fe36df0cf93fccbc5b48db16b6edbe3d9403bc8 [file] [log] [blame]
John Durkop6e33dbe2020-09-17 21:15:13 -07001/**
2 * \file mbedtls/config_psa.h
3 * \brief PSA crypto configuration options (set of defines)
4 *
John Durkop34818822020-10-12 21:36:22 -07005 * This set of compile-time options takes settings defined in
Bence Szépkútibb0cfeb2021-05-28 09:42:25 +02006 * include/mbedtls/mbedtls_config.h and include/psa/crypto_config.h and uses
John Durkop34818822020-10-12 21:36:22 -07007 * those definitions to define symbols used in the library code.
8 *
9 * Users and integrators should not edit this file, please edit
Tom Cosgrove1797b052022-12-04 17:19:59 +000010 * include/mbedtls/mbedtls_config.h for MBEDTLS_XXX settings or
John Durkop34818822020-10-12 21:36:22 -070011 * include/psa/crypto_config.h for PSA_WANT_XXX settings.
John Durkop6e33dbe2020-09-17 21:15:13 -070012 */
13/*
14 * Copyright The Mbed TLS Contributors
15 * SPDX-License-Identifier: Apache-2.0
16 *
17 * Licensed under the Apache License, Version 2.0 (the "License"); you may
18 * not use this file except in compliance with the License.
19 * You may obtain a copy of the License at
20 *
21 * http://www.apache.org/licenses/LICENSE-2.0
22 *
23 * Unless required by applicable law or agreed to in writing, software
24 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
25 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
26 * See the License for the specific language governing permissions and
27 * limitations under the License.
28 */
29
30#ifndef MBEDTLS_CONFIG_PSA_H
31#define MBEDTLS_CONFIG_PSA_H
32
Valerio Settib7ef51a2023-06-06 14:32:58 +020033#include "psa/crypto_legacy.h"
34
Gilles Peskine7b7d9032023-09-04 16:55:14 +020035#include "psa/crypto_adjust_config_synonyms.h"
Gilles Peskine44c96aa2021-10-04 18:33:56 +020036
Gilles Peskineeca01782023-09-04 16:58:54 +020037#include "mbedtls/config_adjust_psa_superset_legacy.h"
Gilles Peskine1231eb52021-04-19 22:24:23 +020038
39/****************************************************************/
40/* Require built-in implementations based on PSA requirements */
41/****************************************************************/
42
John Durkop2dfaf9c2020-09-24 04:30:10 -070043#if defined(MBEDTLS_PSA_CRYPTO_CONFIG)
John Durkopd8959392020-09-20 23:09:17 -070044
John Durkopd62b6782020-11-30 21:06:05 -080045#if defined(PSA_WANT_ALG_DETERMINISTIC_ECDSA)
46#if !defined(MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA)
47#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
48#define MBEDTLS_ECDSA_DETERMINISTIC
49#define MBEDTLS_ECDSA_C
50#define MBEDTLS_HMAC_DRBG_C
51#define MBEDTLS_MD_C
52#endif /* !MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA */
53#endif /* PSA_WANT_ALG_DETERMINISTIC_ECDSA */
54
55#if defined(PSA_WANT_ALG_ECDH)
56#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDH)
57#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
58#define MBEDTLS_ECDH_C
59#define MBEDTLS_ECP_C
60#define MBEDTLS_BIGNUM_C
61#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDH */
62#endif /* PSA_WANT_ALG_ECDH */
63
64#if defined(PSA_WANT_ALG_ECDSA)
65#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDSA)
66#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
67#define MBEDTLS_ECDSA_C
Ronald Crond4c2c9b2021-04-28 18:28:46 +020068#define MBEDTLS_ECP_C
69#define MBEDTLS_BIGNUM_C
70#define MBEDTLS_ASN1_PARSE_C
71#define MBEDTLS_ASN1_WRITE_C
John Durkopd62b6782020-11-30 21:06:05 -080072#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDSA */
73#endif /* PSA_WANT_ALG_ECDSA */
74
Przemek Stekiel84ee3e22022-12-01 14:22:34 +010075#if defined(PSA_WANT_ALG_FFDH)
76#if !defined(MBEDTLS_PSA_ACCEL_ALG_FFDH)
77#define MBEDTLS_PSA_BUILTIN_ALG_FFDH 1
Przemek Stekiel84ee3e22022-12-01 14:22:34 +010078#define MBEDTLS_BIGNUM_C
79#endif /* !MBEDTLS_PSA_ACCEL_ALG_FFDH */
80#endif /* PSA_WANT_ALG_FFDH */
81
John Durkopd62b6782020-11-30 21:06:05 -080082#if defined(PSA_WANT_ALG_HKDF)
83#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF)
84#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
85#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
86#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF */
87#endif /* PSA_WANT_ALG_HKDF */
88
Przemek Stekiel3e8249c2022-06-03 14:05:07 +020089#if defined(PSA_WANT_ALG_HKDF_EXTRACT)
90#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF_EXTRACT)
91#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
92#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXTRACT 1
93#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF_EXTRACT */
94#endif /* PSA_WANT_ALG_HKDF_EXTRACT */
95
96#if defined(PSA_WANT_ALG_HKDF_EXPAND)
97#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF_EXPAND)
98#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
99#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXPAND 1
100#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF_EXPAND */
101#endif /* PSA_WANT_ALG_HKDF_EXPAND */
102
John Durkopd62b6782020-11-30 21:06:05 -0800103#if defined(PSA_WANT_ALG_HMAC)
104#if !defined(MBEDTLS_PSA_ACCEL_ALG_HMAC)
105#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
106#endif /* !MBEDTLS_PSA_ACCEL_ALG_HMAC */
107#endif /* PSA_WANT_ALG_HMAC */
108
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100109#if defined(PSA_WANT_ALG_MD5) && !defined(MBEDTLS_PSA_ACCEL_ALG_MD5)
110#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
111#define MBEDTLS_MD5_C
112#endif
113
Neil Armstronga557cb82022-06-10 08:58:32 +0200114#if defined(PSA_WANT_ALG_JPAKE)
Przemek Stekiel4aa99402023-02-27 13:00:57 +0100115#if !defined(MBEDTLS_PSA_ACCEL_ALG_JPAKE)
Neil Armstrong637d0a02022-05-25 11:28:22 +0200116#define MBEDTLS_PSA_BUILTIN_PAKE 1
Neil Armstronga557cb82022-06-10 08:58:32 +0200117#define MBEDTLS_PSA_BUILTIN_ALG_JPAKE 1
Neil Armstronged407822022-06-15 11:21:33 +0200118#define MBEDTLS_ECP_DP_SECP256R1_ENABLED
Neil Armstrong637d0a02022-05-25 11:28:22 +0200119#define MBEDTLS_BIGNUM_C
120#define MBEDTLS_ECP_C
Neil Armstrong637d0a02022-05-25 11:28:22 +0200121#define MBEDTLS_ECJPAKE_C
Przemek Stekiel4aa99402023-02-27 13:00:57 +0100122#endif /* MBEDTLS_PSA_ACCEL_ALG_JPAKE */
Neil Armstronga557cb82022-06-10 08:58:32 +0200123#endif /* PSA_WANT_ALG_JPAKE */
Neil Armstrong637d0a02022-05-25 11:28:22 +0200124
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100125#if defined(PSA_WANT_ALG_RIPEMD160) && !defined(MBEDTLS_PSA_ACCEL_ALG_RIPEMD160)
126#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
127#define MBEDTLS_RIPEMD160_C
128#endif
129
John Durkopd62b6782020-11-30 21:06:05 -0800130#if defined(PSA_WANT_ALG_RSA_OAEP)
131#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP)
132#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
133#define MBEDTLS_RSA_C
134#define MBEDTLS_BIGNUM_C
135#define MBEDTLS_OID_C
136#define MBEDTLS_PKCS1_V21
John Durkopd62b6782020-11-30 21:06:05 -0800137#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP */
138#endif /* PSA_WANT_ALG_RSA_OAEP */
139
140#if defined(PSA_WANT_ALG_RSA_PKCS1V15_CRYPT)
141#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT)
142#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
143#define MBEDTLS_RSA_C
144#define MBEDTLS_BIGNUM_C
145#define MBEDTLS_OID_C
146#define MBEDTLS_PKCS1_V15
147#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT */
148#endif /* PSA_WANT_ALG_RSA_PKCS1V15_CRYPT */
149
150#if defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
151#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN)
152#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
153#define MBEDTLS_RSA_C
154#define MBEDTLS_BIGNUM_C
155#define MBEDTLS_OID_C
156#define MBEDTLS_PKCS1_V15
John Durkopd62b6782020-11-30 21:06:05 -0800157#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN */
158#endif /* PSA_WANT_ALG_RSA_PKCS1V15_SIGN */
159
160#if defined(PSA_WANT_ALG_RSA_PSS)
161#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PSS)
162#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
163#define MBEDTLS_RSA_C
164#define MBEDTLS_BIGNUM_C
165#define MBEDTLS_OID_C
166#define MBEDTLS_PKCS1_V21
John Durkopd62b6782020-11-30 21:06:05 -0800167#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PSS */
168#endif /* PSA_WANT_ALG_RSA_PSS */
169
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100170#if defined(PSA_WANT_ALG_SHA_1) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_1)
171#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
172#define MBEDTLS_SHA1_C
173#endif
174
175#if defined(PSA_WANT_ALG_SHA_224) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_224)
176#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200177#define MBEDTLS_SHA224_C
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100178#endif
179
180#if defined(PSA_WANT_ALG_SHA_256) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_256)
181#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
182#define MBEDTLS_SHA256_C
183#endif
184
185#if defined(PSA_WANT_ALG_SHA_384) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_384)
186#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200187#define MBEDTLS_SHA384_C
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100188#endif
189
190#if defined(PSA_WANT_ALG_SHA_512) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_512)
191#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
192#define MBEDTLS_SHA512_C
193#endif
194
Dave Rodgman47a2ac12023-06-26 18:39:42 +0100195#if defined(PSA_WANT_ALG_SHA3_224) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA3_224)
Dave Rodgmanf66cd612023-06-26 11:02:12 +0100196#define MBEDTLS_PSA_BUILTIN_ALG_SHA3_224 1
197#define MBEDTLS_SHA3_C
198#endif
199
Dave Rodgman47a2ac12023-06-26 18:39:42 +0100200#if defined(PSA_WANT_ALG_SHA3_256) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA3_256)
Dave Rodgmanf66cd612023-06-26 11:02:12 +0100201#define MBEDTLS_PSA_BUILTIN_ALG_SHA3_256 1
202#define MBEDTLS_SHA3_C
203#endif
204
Dave Rodgman47a2ac12023-06-26 18:39:42 +0100205#if defined(PSA_WANT_ALG_SHA3_384) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA3_384)
Dave Rodgmanf66cd612023-06-26 11:02:12 +0100206#define MBEDTLS_PSA_BUILTIN_ALG_SHA3_384 1
207#define MBEDTLS_SHA3_C
208#endif
209
Dave Rodgman47a2ac12023-06-26 18:39:42 +0100210#if defined(PSA_WANT_ALG_SHA3_512) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA3_512)
Dave Rodgmanf66cd612023-06-26 11:02:12 +0100211#define MBEDTLS_PSA_BUILTIN_ALG_SHA3_512 1
Dave Rodgman98083c62023-06-25 23:27:45 +0100212#define MBEDTLS_SHA3_C
213#endif
214
Kusumit Ghoderao83baf892023-05-03 11:42:29 +0530215#if defined(PSA_WANT_ALG_PBKDF2_HMAC)
216#if !defined(MBEDTLS_PSA_ACCEL_ALG_PBKDF2_HMAC)
217#define MBEDTLS_PSA_BUILTIN_ALG_PBKDF2_HMAC 1
Tom Cosgrovec43c3aa2023-08-31 17:06:58 +0100218#define PSA_HAVE_SOFT_PBKDF2_HMAC 1
Kusumit Ghoderaob9410e82023-05-03 18:36:35 +0530219#if !defined(MBEDTLS_PSA_ACCEL_ALG_HMAC)
Kusumit Ghoderao83baf892023-05-03 11:42:29 +0530220#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
Kusumit Ghoderaob9410e82023-05-03 18:36:35 +0530221#endif /* !MBEDTLS_PSA_ACCEL_ALG_HMAC */
Kusumit Ghoderao83baf892023-05-03 11:42:29 +0530222#endif /* !MBEDTLS_PSA_BUILTIN_ALG_PBKDF2_HMAC */
223#endif /* PSA_WANT_ALG_PBKDF2_HMAC */
224
John Durkop07cc04a2020-11-16 22:08:34 -0800225#if defined(PSA_WANT_ALG_TLS12_PRF)
226#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF)
John Durkopd62b6782020-11-30 21:06:05 -0800227#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
John Durkop07cc04a2020-11-16 22:08:34 -0800228#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF */
229#endif /* PSA_WANT_ALG_TLS12_PRF */
230
231#if defined(PSA_WANT_ALG_TLS12_PSK_TO_MS)
232#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS)
John Durkopd62b6782020-11-30 21:06:05 -0800233#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
John Durkop07cc04a2020-11-16 22:08:34 -0800234#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS */
235#endif /* PSA_WANT_ALG_TLS12_PSK_TO_MS */
236
Andrzej Kurek08d34b82022-07-29 10:00:16 -0400237#if defined(PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS)
238#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_ECJPAKE_TO_PMS)
239#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_ECJPAKE_TO_PMS 1
240#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_ECJPAKE_TO_PMS */
241#endif /* PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS */
242
Valerio Setti4520a8f2023-06-13 12:34:12 +0200243#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200244#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200245#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_IMPORT)
246#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_IMPORT 1
247#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_IMPORT */
248#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT */
249
250#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200251#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200252#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_EXPORT)
253#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_EXPORT 1
254#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_EXPORT */
255#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT */
256
257#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200258#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200259#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_GENERATE)
260#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_GENERATE 1
261#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_GENERATE */
262#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE */
263
264#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200265#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200266#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_DERIVE)
267#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_DERIVE 1
268#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_DERIVE */
269#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE */
270
Valerio Setti01cc88a2023-06-15 11:53:08 +0200271#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC)
Valerio Settiaac957b2023-06-09 16:59:00 +0200272#define PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200273#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_BASIC)
274#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
275#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_BASIC */
276#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC */
John Durkop07cc04a2020-11-16 22:08:34 -0800277
Valerio Setti4520a8f2023-06-13 12:34:12 +0200278#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_IMPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200279#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200280#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_IMPORT)
281#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_IMPORT 1
282#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_IMPORT */
283#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_IMPORT */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200284
Valerio Setti4520a8f2023-06-13 12:34:12 +0200285#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_EXPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200286#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200287#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_EXPORT)
288#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_EXPORT 1
289#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_EXPORT */
290#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_EXPORT */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200291
Valerio Setti4520a8f2023-06-13 12:34:12 +0200292#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_GENERATE)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200293#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200294#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_GENERATE)
295#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_GENERATE 1
296#define MBEDTLS_GENPRIME
297#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_GENERATE */
298#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_GENERATE */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200299
Valerio Setti01cc88a2023-06-15 11:53:08 +0200300#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC)
Valerio Settiaac957b2023-06-09 16:59:00 +0200301#define PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200302#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_BASIC)
303#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
304#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_BASIC */
305#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200306
Valerio Setti4520a8f2023-06-13 12:34:12 +0200307#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_IMPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200308#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200309#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_IMPORT)
310#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_IMPORT 1
311#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_IMPORT */
312#endif /* PSA_WANT_KEY_TYPE_DH_KEY_PAIR_IMPORT */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200313
Valerio Setti4520a8f2023-06-13 12:34:12 +0200314#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_EXPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200315#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200316#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_EXPORT)
317#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT 1
318#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_EXPORT */
319#endif /* PSA_WANT_KEY_TYPE_DH_KEY_PAIR_EXPORT */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200320
Valerio Setti4520a8f2023-06-13 12:34:12 +0200321#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_GENERATE)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200322#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200323#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_GENERATE)
324#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE 1
325#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_GENERATE */
326#endif /* PSA_WANT_KEY_TYPE_DH_KEY_PAIR_GENERATE */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200327
Valerio Setti01cc88a2023-06-15 11:53:08 +0200328#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC)
Valerio Settiaac957b2023-06-09 16:59:00 +0200329#define PSA_WANT_KEY_TYPE_DH_PUBLIC_KEY 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200330#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_BASIC)
331#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_BASIC 1
332#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_BASIC */
333#endif /* PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200334
John Durkop07cc04a2020-11-16 22:08:34 -0800335#if defined(PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY)
336#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800337#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
John Durkop07cc04a2020-11-16 22:08:34 -0800338#define MBEDTLS_ECP_C
339#define MBEDTLS_BIGNUM_C
340#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY */
341#endif /* PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY */
342
Przemek Stekiel6d85afa2023-04-28 11:42:17 +0200343#if defined(PSA_WANT_KEY_TYPE_DH_PUBLIC_KEY)
344#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_PUBLIC_KEY)
345#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY 1
Przemek Stekiel87d9a4a2022-12-15 13:22:11 +0100346#define MBEDTLS_BIGNUM_C
Przemek Stekiel6d85afa2023-04-28 11:42:17 +0200347#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_PUBLIC_KEY */
348#endif /* PSA_WANT_KEY_TYPE_DH_PUBLIC_KEY */
Przemek Stekiel87d9a4a2022-12-15 13:22:11 +0100349
John Durkop9814fa22020-11-04 12:28:15 -0800350#if defined(PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkop0e005192020-10-31 22:06:54 -0700351#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800352#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
John Durkop0e005192020-10-31 22:06:54 -0700353#define MBEDTLS_RSA_C
354#define MBEDTLS_BIGNUM_C
355#define MBEDTLS_OID_C
John Durkop07cc04a2020-11-16 22:08:34 -0800356#define MBEDTLS_PK_PARSE_C
357#define MBEDTLS_PK_WRITE_C
358#define MBEDTLS_PK_C
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200359#define MBEDTLS_ASN1_PARSE_C
360#define MBEDTLS_ASN1_WRITE_C
John Durkop0e005192020-10-31 22:06:54 -0700361#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkop9814fa22020-11-04 12:28:15 -0800362#endif /* PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkopd0321952020-10-29 21:37:36 -0700363
David Brownb781f752021-02-08 15:44:52 -0700364/* If any of the block modes are requested that don't have an
365 * associated HW assist, define PSA_HAVE_SOFT_BLOCK_MODE for checking
366 * in the block cipher key types. */
367#if (defined(PSA_WANT_ALG_CTR) && !defined(MBEDTLS_PSA_ACCEL_ALG_CTR)) || \
Bence Szépkúti7921cce2021-02-17 11:46:50 +0100368 (defined(PSA_WANT_ALG_CFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_CFB)) || \
David Brownb781f752021-02-08 15:44:52 -0700369 (defined(PSA_WANT_ALG_OFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_OFB)) || \
David Brownb781f752021-02-08 15:44:52 -0700370 defined(PSA_WANT_ALG_ECB_NO_PADDING) || \
371 (defined(PSA_WANT_ALG_CBC_NO_PADDING) && \
Gilles Peskine449bd832023-01-11 14:50:10 +0100372 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING)) || \
David Brownb781f752021-02-08 15:44:52 -0700373 (defined(PSA_WANT_ALG_CBC_PKCS7) && \
Gilles Peskine449bd832023-01-11 14:50:10 +0100374 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7)) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100375 (defined(PSA_WANT_ALG_CMAC) && !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC))
David Brownb781f752021-02-08 15:44:52 -0700376#define PSA_HAVE_SOFT_BLOCK_MODE 1
377#endif
378
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100379#if (defined(PSA_WANT_ALG_GCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_GCM)) || \
380 (defined(PSA_WANT_ALG_CCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_CCM))
381#define PSA_HAVE_SOFT_BLOCK_AEAD 1
382#endif
383
Kusumit Ghoderaoc22affd2023-07-28 13:31:58 +0530384#if defined(PSA_WANT_ALG_PBKDF2_AES_CMAC_PRF_128)
385#if !defined(MBEDTLS_PSA_ACCEL_ALG_PBKDF2_AES_CMAC_PRF_128)
386#define MBEDTLS_PSA_BUILTIN_ALG_PBKDF2_AES_CMAC_PRF_128 1
Tom Cosgrovec43c3aa2023-08-31 17:06:58 +0100387#define PSA_HAVE_SOFT_PBKDF2_CMAC 1
Kusumit Ghoderaoc22affd2023-07-28 13:31:58 +0530388#endif /* !MBEDTLS_PSA_ACCEL_ALG_PBKDF2_AES_CMAC_PRF_128 */
389#endif /* PSA_WANT_ALG_PBKDF2_AES_CMAC_PRF_128 */
390
David Brown94933082021-01-05 12:03:25 -0700391#if defined(PSA_WANT_KEY_TYPE_AES)
David Browne1f91f02021-02-09 15:56:22 -0700392#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_AES)
393#define PSA_HAVE_SOFT_KEY_TYPE_AES 1
394#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_AES */
395#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100396 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
Kusumit Ghoderaoc22affd2023-07-28 13:31:58 +0530397 defined(PSA_HAVE_SOFT_BLOCK_AEAD) || \
398 defined(PSA_HAVE_SOFT_PBKDF2_CMAC)
David Brown78a429b2021-01-21 09:48:57 -0700399#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700400#define MBEDTLS_AES_C
David Browne1f91f02021-02-09 15:56:22 -0700401#endif /* PSA_HAVE_SOFT_KEY_TYPE_AES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown94933082021-01-05 12:03:25 -0700402#endif /* PSA_WANT_KEY_TYPE_AES */
403
Gilles Peskine09c46da2021-10-08 15:48:16 +0200404#if defined(PSA_WANT_KEY_TYPE_ARIA)
405#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA)
406#define PSA_HAVE_SOFT_KEY_TYPE_ARIA 1
407#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA */
408#if defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
409 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
410 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
411#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
412#define MBEDTLS_ARIA_C
413#endif /* PSA_HAVE_SOFT_KEY_TYPE_ARIA || PSA_HAVE_SOFT_BLOCK_MODE */
414#endif /* PSA_WANT_KEY_TYPE_ARIA */
415
David Brown686e6e82021-01-05 12:03:25 -0700416#if defined(PSA_WANT_KEY_TYPE_CAMELLIA)
David Browne1f91f02021-02-09 15:56:22 -0700417#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA)
418#define PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA 1
419#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA */
420#if defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100421 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
422 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
David Brown78a429b2021-01-21 09:48:57 -0700423#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700424#define MBEDTLS_CAMELLIA_C
David Browne1f91f02021-02-09 15:56:22 -0700425#endif /* PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown686e6e82021-01-05 12:03:25 -0700426#endif /* PSA_WANT_KEY_TYPE_CAMELLIA */
427
David Brownb65a7f72021-01-15 12:04:09 -0700428#if defined(PSA_WANT_KEY_TYPE_DES)
David Browne1f91f02021-02-09 15:56:22 -0700429#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DES)
430#define PSA_HAVE_SOFT_KEY_TYPE_DES 1
431#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DES */
432#if defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
David Brownb781f752021-02-08 15:44:52 -0700433 defined(PSA_HAVE_SOFT_BLOCK_MODE)
David Brown78a429b2021-01-21 09:48:57 -0700434#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700435#define MBEDTLS_DES_C
David Browne1f91f02021-02-09 15:56:22 -0700436#endif /*PSA_HAVE_SOFT_KEY_TYPE_DES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brownb65a7f72021-01-15 12:04:09 -0700437#endif /* PSA_WANT_KEY_TYPE_DES */
438
David Brownb16727a2021-02-08 16:31:46 -0700439#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
440#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20)
441#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
442#define MBEDTLS_CHACHA20_C
443#endif /*!MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20 */
444#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
445
David Brownf84a0f62021-02-09 15:59:41 -0700446/* If any of the software block ciphers are selected, define
447 * PSA_HAVE_SOFT_BLOCK_CIPHER, which can be used in any of these
448 * situations. */
449#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200450 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
David Brownf84a0f62021-02-09 15:59:41 -0700451 defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
452 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
453#define PSA_HAVE_SOFT_BLOCK_CIPHER 1
454#endif
455
David Brown99844272021-01-15 12:04:47 -0700456#if defined(PSA_WANT_ALG_STREAM_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700457#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brown99844272021-01-15 12:04:47 -0700458#endif /* PSA_WANT_ALG_STREAM_CIPHER */
459
Ronald Crond85e98d2021-03-25 15:32:32 +0100460#if defined(PSA_WANT_ALG_CBC_MAC)
461#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_MAC)
462#error "CBC-MAC is not yet supported via the PSA API in Mbed TLS."
463#define MBEDTLS_PSA_BUILTIN_ALG_CBC_MAC 1
464#endif /* !MBEDTLS_PSA_ACCEL_ALG_CBC_MAC */
465#endif /* PSA_WANT_ALG_CBC_MAC */
466
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100467#if defined(PSA_WANT_ALG_CMAC)
468#if !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC) || \
Kusumit Ghoderaoc22affd2023-07-28 13:31:58 +0530469 defined(PSA_HAVE_SOFT_BLOCK_CIPHER) || \
470 defined(PSA_HAVE_SOFT_PBKDF2_CMAC)
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100471#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
472#define MBEDTLS_CMAC_C
473#endif /* !MBEDTLS_PSA_ACCEL_ALG_CMAC */
474#endif /* PSA_WANT_ALG_CMAC */
475
Kusumit Ghoderao105f7722023-07-27 21:03:06 +0530476#if defined(PSA_HAVE_SOFT_PBKDF2_HMAC) || \
477 defined(PSA_HAVE_SOFT_PBKDF2_CMAC)
478#define PSA_HAVE_SOFT_PBKDF2 1
479#endif /* PSA_HAVE_SOFT_PBKDF2_HMAC || PSA_HAVE_SOFT_PBKDF2_CMAC */
David Brown99844272021-01-15 12:04:47 -0700480
481#if defined(PSA_WANT_ALG_CTR)
David Brown4b9ec7a2021-02-05 12:47:08 -0700482#if !defined(MBEDTLS_PSA_ACCEL_ALG_CTR) || \
David Brownf84a0f62021-02-09 15:59:41 -0700483 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700484#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700485#define MBEDTLS_CIPHER_MODE_CTR
David Brown4b9ec7a2021-02-05 12:47:08 -0700486#endif
David Brown99844272021-01-15 12:04:47 -0700487#endif /* PSA_WANT_ALG_CTR */
488
489#if defined(PSA_WANT_ALG_CFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700490#if !defined(MBEDTLS_PSA_ACCEL_ALG_CFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700491 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700492#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700493#define MBEDTLS_CIPHER_MODE_CFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700494#endif
David Brown99844272021-01-15 12:04:47 -0700495#endif /* PSA_WANT_ALG_CFB */
496
497#if defined(PSA_WANT_ALG_OFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700498#if !defined(MBEDTLS_PSA_ACCEL_ALG_OFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700499 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700500#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700501#define MBEDTLS_CIPHER_MODE_OFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700502#endif
David Brown99844272021-01-15 12:04:47 -0700503#endif /* PSA_WANT_ALG_OFB */
504
Gilles Peskine7a2e83b2022-03-17 11:09:23 +0100505#if defined(PSA_WANT_ALG_ECB_NO_PADDING) && \
506 !defined(MBEDTLS_PSA_ACCEL_ALG_ECB_NO_PADDING)
David Brownbe380c12021-02-11 10:55:48 -0700507#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700508#endif
509
David Brown12f45f92021-01-26 11:50:36 -0700510#if defined(PSA_WANT_ALG_CBC_NO_PADDING)
David Brown4b9ec7a2021-02-05 12:47:08 -0700511#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING) || \
David Brownfc468182021-02-09 16:23:34 -0700512 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700513#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700514#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown4b9ec7a2021-02-05 12:47:08 -0700515#endif
David Brown12f45f92021-01-26 11:50:36 -0700516#endif /* PSA_WANT_ALG_CBC_NO_PADDING */
517
518#if defined(PSA_WANT_ALG_CBC_PKCS7)
David Brown4b9ec7a2021-02-05 12:47:08 -0700519#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7) || \
David Brownfc468182021-02-09 16:23:34 -0700520 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700521#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700522#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brownfc468182021-02-09 16:23:34 -0700523#define MBEDTLS_CIPHER_PADDING_PKCS7
David Brown4b9ec7a2021-02-05 12:47:08 -0700524#endif
David Brown12f45f92021-01-26 11:50:36 -0700525#endif /* PSA_WANT_ALG_CBC_PKCS7 */
526
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100527#if defined(PSA_WANT_ALG_CCM)
528#if !defined(MBEDTLS_PSA_ACCEL_ALG_CCM) || \
529 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200530 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100531 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
532#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100533#define MBEDTLS_PSA_BUILTIN_ALG_CCM_STAR_NO_TAG 1
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100534#define MBEDTLS_CCM_C
535#endif
536#endif /* PSA_WANT_ALG_CCM */
537
538#if defined(PSA_WANT_ALG_GCM)
539#if !defined(MBEDTLS_PSA_ACCEL_ALG_GCM) || \
540 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200541 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100542 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
543#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
544#define MBEDTLS_GCM_C
545#endif
546#endif /* PSA_WANT_ALG_GCM */
547
David Brownac4fa072021-02-08 16:47:35 -0700548#if defined(PSA_WANT_ALG_CHACHA20_POLY1305)
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200549#if !defined(MBEDTLS_PSA_ACCEL_ALG_CHACHA20_POLY1305)
David Brownac4fa072021-02-08 16:47:35 -0700550#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
551#define MBEDTLS_CHACHAPOLY_C
Summer Qin9f2596f2022-06-17 12:50:32 +0800552#define MBEDTLS_CHACHA20_C
553#define MBEDTLS_POLY1305_C
David Brown86730a82021-02-09 16:24:11 -0700554#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700555#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200556#endif /* !MBEDTLS_PSA_ACCEL_ALG_CHACHA20_POLY1305 */
David Brownac4fa072021-02-08 16:47:35 -0700557#endif /* PSA_WANT_ALG_CHACHA20_POLY1305 */
558
David Browneed74df2021-03-15 15:53:57 -0600559#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_256)
560#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256)
561#define MBEDTLS_ECP_DP_BP256R1_ENABLED
562#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
563#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256 */
564#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_256 */
565
566#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_384)
567#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384)
568#define MBEDTLS_ECP_DP_BP384R1_ENABLED
569#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
570#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384 */
571#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_384 */
572
573#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_512)
574#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512)
575#define MBEDTLS_ECP_DP_BP512R1_ENABLED
576#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
577#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512 */
578#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_512 */
579
580#if defined(PSA_WANT_ECC_MONTGOMERY_255)
581#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255)
582#define MBEDTLS_ECP_DP_CURVE25519_ENABLED
583#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
584#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255 */
585#endif /* PSA_WANT_ECC_MONTGOMERY_255 */
586
587#if defined(PSA_WANT_ECC_MONTGOMERY_448)
588#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448)
589#define MBEDTLS_ECP_DP_CURVE448_ENABLED
590#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
591#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448 */
592#endif /* PSA_WANT_ECC_MONTGOMERY_448 */
593
David Brownc7b9b2b2021-02-19 21:05:52 -0700594#if defined(PSA_WANT_ECC_SECP_R1_192)
595#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192)
596#define MBEDTLS_ECP_DP_SECP192R1_ENABLED
597#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
598#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192 */
599#endif /* PSA_WANT_ECC_SECP_R1_192 */
600
601#if defined(PSA_WANT_ECC_SECP_R1_224)
602#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224)
603#define MBEDTLS_ECP_DP_SECP224R1_ENABLED
604#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
605#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224 */
606#endif /* PSA_WANT_ECC_SECP_R1_224 */
607
608#if defined(PSA_WANT_ECC_SECP_R1_256)
609#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256)
610#define MBEDTLS_ECP_DP_SECP256R1_ENABLED
611#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
612#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256 */
613#endif /* PSA_WANT_ECC_SECP_R1_256 */
614
615#if defined(PSA_WANT_ECC_SECP_R1_384)
616#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384)
617#define MBEDTLS_ECP_DP_SECP384R1_ENABLED
618#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
619#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384 */
620#endif /* PSA_WANT_ECC_SECP_R1_384 */
621
622#if defined(PSA_WANT_ECC_SECP_R1_521)
623#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521)
624#define MBEDTLS_ECP_DP_SECP521R1_ENABLED
625#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
626#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521 */
627#endif /* PSA_WANT_ECC_SECP_R1_521 */
628
629#if defined(PSA_WANT_ECC_SECP_K1_192)
630#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192)
David Brown8de143e2021-02-19 14:08:00 -0700631#define MBEDTLS_ECP_DP_SECP192K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700632#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
633#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192 */
634#endif /* PSA_WANT_ECC_SECP_K1_192 */
David Brown8de143e2021-02-19 14:08:00 -0700635
David Brownc7b9b2b2021-02-19 21:05:52 -0700636#if defined(PSA_WANT_ECC_SECP_K1_224)
637#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224)
Ronald Crone1f55162021-03-25 15:09:47 +0100638/*
639 * SECP224K1 is buggy via the PSA API in Mbed TLS
Dave Rodgman017a1992022-03-31 14:07:01 +0100640 * (https://github.com/Mbed-TLS/mbedtls/issues/3541).
Ronald Crone1f55162021-03-25 15:09:47 +0100641 */
642#error "SECP224K1 is buggy via the PSA API in Mbed TLS."
David Brown8de143e2021-02-19 14:08:00 -0700643#define MBEDTLS_ECP_DP_SECP224K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700644#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
645#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224 */
646#endif /* PSA_WANT_ECC_SECP_K1_224 */
David Brown8de143e2021-02-19 14:08:00 -0700647
David Brownc7b9b2b2021-02-19 21:05:52 -0700648#if defined(PSA_WANT_ECC_SECP_K1_256)
649#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256)
David Brown9b178de2021-03-10 13:14:48 -0700650#define MBEDTLS_ECP_DP_SECP256K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700651#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
652#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256 */
653#endif /* PSA_WANT_ECC_SECP_K1_256 */
David Brown8de143e2021-02-19 14:08:00 -0700654
Gilles Peskine1231eb52021-04-19 22:24:23 +0200655
656
657/****************************************************************/
658/* Infer PSA requirements from Mbed TLS capabilities */
659/****************************************************************/
660
John Durkop714e3a12020-09-29 22:07:04 -0700661#else /* MBEDTLS_PSA_CRYPTO_CONFIG */
662
663/*
664 * Ensure PSA_WANT_* defines are setup properly if MBEDTLS_PSA_CRYPTO_CONFIG
665 * is not defined
666 */
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100667
Ronald Cron3d471812021-03-18 13:40:31 +0100668#if defined(MBEDTLS_CCM_C)
669#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100670#define MBEDTLS_PSA_BUILTIN_ALG_CCM_STAR_NO_TAG 1
Ronald Cron3d471812021-03-18 13:40:31 +0100671#define PSA_WANT_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100672#define PSA_WANT_ALG_CCM_STAR_NO_TAG 1
Ronald Cron3d471812021-03-18 13:40:31 +0100673#endif /* MBEDTLS_CCM_C */
674
675#if defined(MBEDTLS_CMAC_C)
676#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
677#define PSA_WANT_ALG_CMAC 1
678#endif /* MBEDTLS_CMAC_C */
679
John Durkopd62b6782020-11-30 21:06:05 -0800680#if defined(MBEDTLS_ECDH_C)
681#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
682#define PSA_WANT_ALG_ECDH 1
683#endif /* MBEDTLS_ECDH_C */
684
685#if defined(MBEDTLS_ECDSA_C)
686#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
687#define PSA_WANT_ALG_ECDSA 1
Gilles Peskine1231eb52021-04-19 22:24:23 +0200688#define PSA_WANT_ALG_ECDSA_ANY 1
John Durkopd62b6782020-11-30 21:06:05 -0800689
690// Only add in DETERMINISTIC support if ECDSA is also enabled
691#if defined(MBEDTLS_ECDSA_DETERMINISTIC)
692#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
693#define PSA_WANT_ALG_DETERMINISTIC_ECDSA 1
694#endif /* MBEDTLS_ECDSA_DETERMINISTIC */
695
696#endif /* MBEDTLS_ECDSA_C */
697
698#if defined(MBEDTLS_ECP_C)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200699#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Settif87b5052023-05-26 13:47:09 +0200700#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT 1
701#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT 1
Valerio Settif87b5052023-05-26 13:47:09 +0200702#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE 1
Valerio Setti06dfba72023-06-30 10:09:36 +0200703/* Normally we wouldn't enable this because it's not implemented in ecp.c,
704 * but since it used to be available any time ECP_C was enabled, let's enable
705 * it anyway for the sake of backwards compatibility */
706#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200707#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Settiddb57762023-06-06 14:17:15 +0200708#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_IMPORT 1
709#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_EXPORT 1
710#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_GENERATE 1
Valerio Setti06dfba72023-06-30 10:09:36 +0200711/* See comment for PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE above. */
712#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_DERIVE 1
John Durkopd62b6782020-11-30 21:06:05 -0800713#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
714#define PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY 1
715#endif /* MBEDTLS_ECP_C */
716
Przemek Stekiel746dfae2023-05-04 09:14:08 +0200717#if defined(MBEDTLS_DHM_C)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200718#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC 1
Valerio Settif87b5052023-05-26 13:47:09 +0200719#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_IMPORT 1
720#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_EXPORT 1
Valerio Settif87b5052023-05-26 13:47:09 +0200721#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_GENERATE 1
Przemek Stekiel746dfae2023-05-04 09:14:08 +0200722#define PSA_WANT_KEY_TYPE_DH_PUBLIC_KEY 1
723#define PSA_WANT_ALG_FFDH 1
724#define PSA_WANT_DH_FAMILY_RFC7919 1
725#define MBEDTLS_PSA_BUILTIN_ALG_FFDH 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200726#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_BASIC 1
Valerio Settif87b5052023-05-26 13:47:09 +0200727#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_IMPORT 1
728#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT 1
729#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE 1
Przemek Stekiel746dfae2023-05-04 09:14:08 +0200730#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY 1
731#endif /* MBEDTLS_DHM_C */
732
Ronald Cron3d471812021-03-18 13:40:31 +0100733#if defined(MBEDTLS_GCM_C)
734#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
735#define PSA_WANT_ALG_GCM 1
736#endif /* MBEDTLS_GCM_C */
737
Przemek Stekiel18399d82022-06-27 13:34:50 +0200738/* Enable PSA HKDF algorithm if mbedtls HKDF is supported.
739 * PSA HKDF EXTRACT and PSA HKDF EXPAND have minimal cost when
740 * PSA HKDF is enabled, so enable both algorithms together
741 * with PSA HKDF. */
John Durkopd62b6782020-11-30 21:06:05 -0800742#if defined(MBEDTLS_HKDF_C)
743#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
744#define PSA_WANT_ALG_HMAC 1
745#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
746#define PSA_WANT_ALG_HKDF 1
Przemek Stekielb33bd192022-06-21 09:58:51 +0200747#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXTRACT 1
748#define PSA_WANT_ALG_HKDF_EXTRACT 1
749#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXPAND 1
750#define PSA_WANT_ALG_HKDF_EXPAND 1
John Durkopd62b6782020-11-30 21:06:05 -0800751#endif /* MBEDTLS_HKDF_C */
752
John Durkopd62b6782020-11-30 21:06:05 -0800753#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
754#define PSA_WANT_ALG_HMAC 1
Tom Cosgrovec43c3aa2023-08-31 17:06:58 +0100755#define PSA_WANT_KEY_TYPE_HMAC 1
Andrzej Kurek65bf73e2022-08-31 14:59:31 -0400756
757#if defined(MBEDTLS_MD_C)
John Durkopd62b6782020-11-30 21:06:05 -0800758#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
759#define PSA_WANT_ALG_TLS12_PRF 1
760#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
761#define PSA_WANT_ALG_TLS12_PSK_TO_MS 1
762#endif /* MBEDTLS_MD_C */
763
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100764#if defined(MBEDTLS_MD5_C)
765#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
766#define PSA_WANT_ALG_MD5 1
767#endif
768
Neil Armstrong637d0a02022-05-25 11:28:22 +0200769#if defined(MBEDTLS_ECJPAKE_C)
770#define MBEDTLS_PSA_BUILTIN_PAKE 1
Neil Armstronga557cb82022-06-10 08:58:32 +0200771#define MBEDTLS_PSA_BUILTIN_ALG_JPAKE 1
772#define PSA_WANT_ALG_JPAKE 1
Neil Armstrong637d0a02022-05-25 11:28:22 +0200773#endif
774
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100775#if defined(MBEDTLS_RIPEMD160_C)
776#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
777#define PSA_WANT_ALG_RIPEMD160 1
778#endif
779
John Durkopd62b6782020-11-30 21:06:05 -0800780#if defined(MBEDTLS_RSA_C)
781#if defined(MBEDTLS_PKCS1_V15)
782#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
783#define PSA_WANT_ALG_RSA_PKCS1V15_CRYPT 1
784#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
785#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN 1
Gilles Peskine1231eb52021-04-19 22:24:23 +0200786#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW 1
Yuto Takano7828ca22021-08-10 11:26:15 +0100787#endif /* MBEDTLS_PKCS1_V15 */
John Durkopd62b6782020-11-30 21:06:05 -0800788#if defined(MBEDTLS_PKCS1_V21)
789#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
790#define PSA_WANT_ALG_RSA_OAEP 1
791#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
792#define PSA_WANT_ALG_RSA_PSS 1
793#endif /* MBEDTLS_PKCS1_V21 */
Valerio Setti98038342023-07-11 16:30:24 +0200794#if defined(MBEDTLS_GENPRIME)
795#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_GENERATE 1
796#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_GENERATE 1
797#endif /* MBEDTLS_GENPRIME */
Valerio Setti01cc88a2023-06-15 11:53:08 +0200798#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
Valerio Settif87b5052023-05-26 13:47:09 +0200799#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_IMPORT 1
800#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_EXPORT 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200801#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
Valerio Settif87b5052023-05-26 13:47:09 +0200802#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_IMPORT 1
803#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_EXPORT 1
John Durkopd62b6782020-11-30 21:06:05 -0800804#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
805#define PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY 1
806#endif /* MBEDTLS_RSA_C */
807
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100808#if defined(MBEDTLS_SHA1_C)
809#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
810#define PSA_WANT_ALG_SHA_1 1
811#endif
812
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200813#if defined(MBEDTLS_SHA224_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100814#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
Gilles Peskineb65db072021-01-12 00:00:53 +0100815#define PSA_WANT_ALG_SHA_224 1
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200816#endif
817
818#if defined(MBEDTLS_SHA256_C)
819#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100820#define PSA_WANT_ALG_SHA_256 1
821#endif
822
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200823#if defined(MBEDTLS_SHA384_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100824#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
825#define PSA_WANT_ALG_SHA_384 1
826#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200827
828#if defined(MBEDTLS_SHA512_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100829#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
830#define PSA_WANT_ALG_SHA_512 1
831#endif
832
Dave Rodgman98083c62023-06-25 23:27:45 +0100833#if defined(MBEDTLS_SHA3_C)
Dave Rodgmanf66cd612023-06-26 11:02:12 +0100834#define MBEDTLS_PSA_BUILTIN_ALG_SHA3_224 1
835#define MBEDTLS_PSA_BUILTIN_ALG_SHA3_256 1
836#define MBEDTLS_PSA_BUILTIN_ALG_SHA3_384 1
837#define MBEDTLS_PSA_BUILTIN_ALG_SHA3_512 1
838#define PSA_WANT_ALG_SHA3_224 1
839#define PSA_WANT_ALG_SHA3_256 1
840#define PSA_WANT_ALG_SHA3_384 1
841#define PSA_WANT_ALG_SHA3_512 1
Dave Rodgman98083c62023-06-25 23:27:45 +0100842#endif
843
David Brown94933082021-01-05 12:03:25 -0700844#if defined(MBEDTLS_AES_C)
845#define PSA_WANT_KEY_TYPE_AES 1
David Brownda7dbb72021-01-26 11:44:15 -0700846#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700847#endif
848
Gilles Peskine09c46da2021-10-08 15:48:16 +0200849#if defined(MBEDTLS_ARIA_C)
850#define PSA_WANT_KEY_TYPE_ARIA 1
851#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
852#endif
853
David Brown686e6e82021-01-05 12:03:25 -0700854#if defined(MBEDTLS_CAMELLIA_C)
855#define PSA_WANT_KEY_TYPE_CAMELLIA 1
David Brownda7dbb72021-01-26 11:44:15 -0700856#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700857#endif
858
David Brownb65a7f72021-01-15 12:04:09 -0700859#if defined(MBEDTLS_DES_C)
860#define PSA_WANT_KEY_TYPE_DES 1
David Brownda7dbb72021-01-26 11:44:15 -0700861#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700862#endif
863
Andrzej Kurekd60907b2022-09-14 10:02:30 -0400864#if defined(MBEDTLS_PSA_BUILTIN_ALG_SHA_256)
865#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_ECJPAKE_TO_PMS 1
866#define PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS 1
867#endif
868
David Brownb16727a2021-02-08 16:31:46 -0700869#if defined(MBEDTLS_CHACHA20_C)
870#define PSA_WANT_KEY_TYPE_CHACHA20 1
871#define PSA_WANT_ALG_STREAM_CIPHER 1
872#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
873#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brownac4fa072021-02-08 16:47:35 -0700874#if defined(MBEDTLS_CHACHAPOLY_C)
875#define PSA_WANT_ALG_CHACHA20_POLY1305 1
David Brown86730a82021-02-09 16:24:11 -0700876#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700877#endif
David Brownb16727a2021-02-08 16:31:46 -0700878#endif
879
David Brown99844272021-01-15 12:04:47 -0700880#if defined(MBEDTLS_CIPHER_MODE_CBC)
David Brown10cb81c2021-02-09 16:10:29 -0700881#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700882#define PSA_WANT_ALG_CBC_NO_PADDING 1
883#if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
David Brown12f45f92021-01-26 11:50:36 -0700884#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brown99844272021-01-15 12:04:47 -0700885#define PSA_WANT_ALG_CBC_PKCS7 1
886#endif
887#endif
888
889#if defined(MBEDTLS_AES_C) || defined(MBEDTLS_DES_C) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200890 defined(MBEDTLS_ARIA_C) || defined(MBEDTLS_CAMELLIA_C)
David Brown10cb81c2021-02-09 16:10:29 -0700891#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700892#define PSA_WANT_ALG_ECB_NO_PADDING 1
893#endif
894
895#if defined(MBEDTLS_CIPHER_MODE_CFB)
David Brown12f45f92021-01-26 11:50:36 -0700896#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700897#define PSA_WANT_ALG_CFB 1
898#endif
899
900#if defined(MBEDTLS_CIPHER_MODE_CTR)
David Brown12f45f92021-01-26 11:50:36 -0700901#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700902#define PSA_WANT_ALG_CTR 1
903#endif
904
905#if defined(MBEDTLS_CIPHER_MODE_OFB)
David Brown12f45f92021-01-26 11:50:36 -0700906#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700907#define PSA_WANT_ALG_OFB 1
908#endif
909
David Browneed74df2021-03-15 15:53:57 -0600910#if defined(MBEDTLS_ECP_DP_BP256R1_ENABLED)
911#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
Tom Cosgrovec43c3aa2023-08-31 17:06:58 +0100912#define PSA_WANT_ECC_BRAINPOOL_P_R1_256 1
David Browneed74df2021-03-15 15:53:57 -0600913#endif
914
915#if defined(MBEDTLS_ECP_DP_BP384R1_ENABLED)
916#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
Tom Cosgrovec43c3aa2023-08-31 17:06:58 +0100917#define PSA_WANT_ECC_BRAINPOOL_P_R1_384 1
David Browneed74df2021-03-15 15:53:57 -0600918#endif
919
920#if defined(MBEDTLS_ECP_DP_BP512R1_ENABLED)
921#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
Tom Cosgrovec43c3aa2023-08-31 17:06:58 +0100922#define PSA_WANT_ECC_BRAINPOOL_P_R1_512 1
David Browneed74df2021-03-15 15:53:57 -0600923#endif
924
925#if defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED)
926#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
Tom Cosgrovec43c3aa2023-08-31 17:06:58 +0100927#define PSA_WANT_ECC_MONTGOMERY_255 1
David Browneed74df2021-03-15 15:53:57 -0600928#endif
929
Archanaef6aa5c2021-06-08 11:40:10 +0530930#if defined(MBEDTLS_ECP_DP_CURVE448_ENABLED)
David Browneed74df2021-03-15 15:53:57 -0600931#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
Tom Cosgrovec43c3aa2023-08-31 17:06:58 +0100932#define PSA_WANT_ECC_MONTGOMERY_448 1
David Browneed74df2021-03-15 15:53:57 -0600933#endif
934
David Brown8de143e2021-02-19 14:08:00 -0700935#if defined(MBEDTLS_ECP_DP_SECP192R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700936#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
Tom Cosgrovec43c3aa2023-08-31 17:06:58 +0100937#define PSA_WANT_ECC_SECP_R1_192 1
David Brown8de143e2021-02-19 14:08:00 -0700938#endif
939
940#if defined(MBEDTLS_ECP_DP_SECP224R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700941#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
Tom Cosgrovec43c3aa2023-08-31 17:06:58 +0100942#define PSA_WANT_ECC_SECP_R1_224 1
David Brown8de143e2021-02-19 14:08:00 -0700943#endif
944
945#if defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700946#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
Tom Cosgrovec43c3aa2023-08-31 17:06:58 +0100947#define PSA_WANT_ECC_SECP_R1_256 1
David Brown8de143e2021-02-19 14:08:00 -0700948#endif
949
950#if defined(MBEDTLS_ECP_DP_SECP384R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700951#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
Tom Cosgrovec43c3aa2023-08-31 17:06:58 +0100952#define PSA_WANT_ECC_SECP_R1_384 1
David Brown8de143e2021-02-19 14:08:00 -0700953#endif
954
955#if defined(MBEDTLS_ECP_DP_SECP521R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700956#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
Tom Cosgrovec43c3aa2023-08-31 17:06:58 +0100957#define PSA_WANT_ECC_SECP_R1_521 1
David Brown8de143e2021-02-19 14:08:00 -0700958#endif
959
960#if defined(MBEDTLS_ECP_DP_SECP192K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700961#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
Tom Cosgrovec43c3aa2023-08-31 17:06:58 +0100962#define PSA_WANT_ECC_SECP_K1_192 1
David Brown8de143e2021-02-19 14:08:00 -0700963#endif
964
Dave Rodgman017a1992022-03-31 14:07:01 +0100965/* SECP224K1 is buggy via the PSA API (https://github.com/Mbed-TLS/mbedtls/issues/3541) */
Gilles Peskine39841302021-03-23 12:06:45 +0100966#if 0 && defined(MBEDTLS_ECP_DP_SECP224K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700967#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
Tom Cosgrovec43c3aa2023-08-31 17:06:58 +0100968#define PSA_WANT_ECC_SECP_K1_224 1
David Brown8de143e2021-02-19 14:08:00 -0700969#endif
970
David Brown9b178de2021-03-10 13:14:48 -0700971#if defined(MBEDTLS_ECP_DP_SECP256K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700972#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
Tom Cosgrovec43c3aa2023-08-31 17:06:58 +0100973#define PSA_WANT_ECC_SECP_K1_256 1
David Brown8de143e2021-02-19 14:08:00 -0700974#endif
975
John Durkop2dfaf9c2020-09-24 04:30:10 -0700976#endif /* MBEDTLS_PSA_CRYPTO_CONFIG */
John Durkopd8959392020-09-20 23:09:17 -0700977
Tom Cosgrove6d62fac2023-05-10 14:40:05 +0100978#if defined(PSA_WANT_ALG_JPAKE)
979#define PSA_WANT_ALG_SOME_PAKE 1
980#endif
981
Valerio Setti73fc0822023-06-21 10:06:19 +0200982/* Even though KEY_PAIR symbols' feature several level of support (BASIC, IMPORT,
983 * EXPORT, GENERATE, DERIVE) we're not planning to have support only for BASIC
984 * without IMPORT/EXPORT since these last 2 features are strongly used in tests.
Valerio Setti27c501a2023-06-27 16:58:52 +0200985 * In general it is allowed to include more feature than what is strictly
986 * requested.
987 * As a consequence IMPORT and EXPORT features will be automatically enabled
988 * as soon as the BASIC one is. */
Valerio Setti73fc0822023-06-21 10:06:19 +0200989#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC)
Valerio Setti27c501a2023-06-27 16:58:52 +0200990#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT 1
991#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT 1
Valerio Setti73fc0822023-06-21 10:06:19 +0200992#endif
993
Valerio Setti27c501a2023-06-27 16:58:52 +0200994/* See description above */
Valerio Setti73fc0822023-06-21 10:06:19 +0200995#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_BASIC)
Valerio Setti27c501a2023-06-27 16:58:52 +0200996#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_IMPORT 1
997#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_EXPORT 1
Valerio Setti8d6e98c2023-05-26 13:46:13 +0200998#endif
999
Valerio Setti0d5c5e52023-07-10 16:21:00 +02001000/* See description above */
1001#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC)
1002#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_IMPORT 1
1003#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_EXPORT 1
1004#endif
1005
1006/* See description above */
1007#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_BASIC)
1008#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_IMPORT 1
1009#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_EXPORT 1
1010#endif
1011
Valerio Settia55f0422023-07-10 15:34:41 +02001012/* See description above */
1013#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC)
1014#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_IMPORT 1
1015#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_EXPORT 1
Valerio Setti8d6e98c2023-05-26 13:46:13 +02001016#endif
1017
Valerio Settia55f0422023-07-10 15:34:41 +02001018/* See description above */
1019#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_BASIC)
1020#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_IMPORT 1
1021#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT 1
Valerio Setti8d6e98c2023-05-26 13:46:13 +02001022#endif
1023
Gilles Peskine58239772023-09-04 16:56:06 +02001024#include "psa/crypto_adjust_auto_enabled.h"
Gilles Peskine60b29fe2021-02-16 14:06:50 +01001025
John Durkop6e33dbe2020-09-17 21:15:13 -07001026#endif /* MBEDTLS_CONFIG_PSA_H */