blob: a5d001bf7e0dcd4057ccc6207a5952d002ee9927 [file] [log] [blame]
John Durkop6e33dbe2020-09-17 21:15:13 -07001/**
2 * \file mbedtls/config_psa.h
3 * \brief PSA crypto configuration options (set of defines)
4 *
John Durkop34818822020-10-12 21:36:22 -07005 * This set of compile-time options takes settings defined in
Bence Szépkútibb0cfeb2021-05-28 09:42:25 +02006 * include/mbedtls/mbedtls_config.h and include/psa/crypto_config.h and uses
John Durkop34818822020-10-12 21:36:22 -07007 * those definitions to define symbols used in the library code.
8 *
9 * Users and integrators should not edit this file, please edit
Tom Cosgrove1797b052022-12-04 17:19:59 +000010 * include/mbedtls/mbedtls_config.h for MBEDTLS_XXX settings or
John Durkop34818822020-10-12 21:36:22 -070011 * include/psa/crypto_config.h for PSA_WANT_XXX settings.
John Durkop6e33dbe2020-09-17 21:15:13 -070012 */
13/*
14 * Copyright The Mbed TLS Contributors
15 * SPDX-License-Identifier: Apache-2.0
16 *
17 * Licensed under the Apache License, Version 2.0 (the "License"); you may
18 * not use this file except in compliance with the License.
19 * You may obtain a copy of the License at
20 *
21 * http://www.apache.org/licenses/LICENSE-2.0
22 *
23 * Unless required by applicable law or agreed to in writing, software
24 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
25 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
26 * See the License for the specific language governing permissions and
27 * limitations under the License.
28 */
29
30#ifndef MBEDTLS_CONFIG_PSA_H
31#define MBEDTLS_CONFIG_PSA_H
32
Valerio Settib7ef51a2023-06-06 14:32:58 +020033#include "psa/crypto_legacy.h"
34
Gilles Peskine1231eb52021-04-19 22:24:23 +020035
36
37/****************************************************************/
38/* De facto synonyms */
39/****************************************************************/
40
41#if defined(PSA_WANT_ALG_ECDSA_ANY) && !defined(PSA_WANT_ALG_ECDSA)
42#define PSA_WANT_ALG_ECDSA PSA_WANT_ALG_ECDSA_ANY
43#elif !defined(PSA_WANT_ALG_ECDSA_ANY) && defined(PSA_WANT_ALG_ECDSA)
44#define PSA_WANT_ALG_ECDSA_ANY PSA_WANT_ALG_ECDSA
45#endif
46
Gilles Peskine08622b62022-03-15 16:40:59 +010047#if defined(PSA_WANT_ALG_CCM_STAR_NO_TAG) && !defined(PSA_WANT_ALG_CCM)
48#define PSA_WANT_ALG_CCM PSA_WANT_ALG_CCM_STAR_NO_TAG
49#elif !defined(PSA_WANT_ALG_CCM_STAR_NO_TAG) && defined(PSA_WANT_ALG_CCM)
50#define PSA_WANT_ALG_CCM_STAR_NO_TAG PSA_WANT_ALG_CCM
51#endif
52
Gilles Peskine1231eb52021-04-19 22:24:23 +020053#if defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW) && !defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
54#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW
55#elif !defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW) && defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
56#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW PSA_WANT_ALG_RSA_PKCS1V15_SIGN
57#endif
58
Gilles Peskine44c96aa2021-10-04 18:33:56 +020059#if defined(PSA_WANT_ALG_RSA_PSS_ANY_SALT) && !defined(PSA_WANT_ALG_RSA_PSS)
60#define PSA_WANT_ALG_RSA_PSS PSA_WANT_ALG_RSA_PSS_ANY_SALT
61#elif !defined(PSA_WANT_ALG_RSA_PSS_ANY_SALT) && defined(PSA_WANT_ALG_RSA_PSS)
62#define PSA_WANT_ALG_RSA_PSS_ANY_SALT PSA_WANT_ALG_RSA_PSS
63#endif
64
Gilles Peskine1231eb52021-04-19 22:24:23 +020065
Manuel Pégourié-Gonnard235a9332023-03-14 18:01:23 +010066/****************************************************************/
67/* Hashes that are built in are also enabled in PSA.
68 * This simplifies dependency declarations especially
69 * for modules that obey MBEDTLS_USE_PSA_CRYPTO. */
70/****************************************************************/
71
72#if defined(MBEDTLS_MD5_C)
73#define PSA_WANT_ALG_MD5 1
74#endif
75
76#if defined(MBEDTLS_RIPEMD160_C)
77#define PSA_WANT_ALG_RIPEMD160 1
78#endif
79
80#if defined(MBEDTLS_SHA1_C)
81#define PSA_WANT_ALG_SHA_1 1
82#endif
83
84#if defined(MBEDTLS_SHA224_C)
85#define PSA_WANT_ALG_SHA_224 1
86#endif
87
88#if defined(MBEDTLS_SHA256_C)
89#define PSA_WANT_ALG_SHA_256 1
90#endif
91
92#if defined(MBEDTLS_SHA384_C)
93#define PSA_WANT_ALG_SHA_384 1
94#endif
95
96#if defined(MBEDTLS_SHA512_C)
97#define PSA_WANT_ALG_SHA_512 1
98#endif
99
Dave Rodgman98083c62023-06-25 23:27:45 +0100100#if defined(MBEDTLS_SHA3_C)
Dave Rodgmanf66cd612023-06-26 11:02:12 +0100101#define PSA_WANT_ALG_SHA3_224 1
102#define PSA_WANT_ALG_SHA3_256 1
103#define PSA_WANT_ALG_SHA3_384 1
104#define PSA_WANT_ALG_SHA3_512 1
Dave Rodgman98083c62023-06-25 23:27:45 +0100105#endif
106
Gilles Peskine1231eb52021-04-19 22:24:23 +0200107
108/****************************************************************/
109/* Require built-in implementations based on PSA requirements */
110/****************************************************************/
111
John Durkop2dfaf9c2020-09-24 04:30:10 -0700112#if defined(MBEDTLS_PSA_CRYPTO_CONFIG)
John Durkopd8959392020-09-20 23:09:17 -0700113
John Durkopd62b6782020-11-30 21:06:05 -0800114#if defined(PSA_WANT_ALG_DETERMINISTIC_ECDSA)
115#if !defined(MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA)
116#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
117#define MBEDTLS_ECDSA_DETERMINISTIC
118#define MBEDTLS_ECDSA_C
119#define MBEDTLS_HMAC_DRBG_C
120#define MBEDTLS_MD_C
121#endif /* !MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA */
122#endif /* PSA_WANT_ALG_DETERMINISTIC_ECDSA */
123
124#if defined(PSA_WANT_ALG_ECDH)
125#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDH)
126#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
127#define MBEDTLS_ECDH_C
128#define MBEDTLS_ECP_C
129#define MBEDTLS_BIGNUM_C
130#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDH */
131#endif /* PSA_WANT_ALG_ECDH */
132
133#if defined(PSA_WANT_ALG_ECDSA)
134#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDSA)
135#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
136#define MBEDTLS_ECDSA_C
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200137#define MBEDTLS_ECP_C
138#define MBEDTLS_BIGNUM_C
139#define MBEDTLS_ASN1_PARSE_C
140#define MBEDTLS_ASN1_WRITE_C
John Durkopd62b6782020-11-30 21:06:05 -0800141#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDSA */
142#endif /* PSA_WANT_ALG_ECDSA */
143
Przemek Stekiel84ee3e22022-12-01 14:22:34 +0100144#if defined(PSA_WANT_ALG_FFDH)
145#if !defined(MBEDTLS_PSA_ACCEL_ALG_FFDH)
146#define MBEDTLS_PSA_BUILTIN_ALG_FFDH 1
Przemek Stekiel84ee3e22022-12-01 14:22:34 +0100147#define MBEDTLS_BIGNUM_C
148#endif /* !MBEDTLS_PSA_ACCEL_ALG_FFDH */
149#endif /* PSA_WANT_ALG_FFDH */
150
John Durkopd62b6782020-11-30 21:06:05 -0800151#if defined(PSA_WANT_ALG_HKDF)
152#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF)
153#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
154#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
155#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF */
156#endif /* PSA_WANT_ALG_HKDF */
157
Przemek Stekiel3e8249c2022-06-03 14:05:07 +0200158#if defined(PSA_WANT_ALG_HKDF_EXTRACT)
159#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF_EXTRACT)
160#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
161#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXTRACT 1
162#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF_EXTRACT */
163#endif /* PSA_WANT_ALG_HKDF_EXTRACT */
164
165#if defined(PSA_WANT_ALG_HKDF_EXPAND)
166#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF_EXPAND)
167#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
168#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXPAND 1
169#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF_EXPAND */
170#endif /* PSA_WANT_ALG_HKDF_EXPAND */
171
John Durkopd62b6782020-11-30 21:06:05 -0800172#if defined(PSA_WANT_ALG_HMAC)
173#if !defined(MBEDTLS_PSA_ACCEL_ALG_HMAC)
174#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
175#endif /* !MBEDTLS_PSA_ACCEL_ALG_HMAC */
176#endif /* PSA_WANT_ALG_HMAC */
177
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100178#if defined(PSA_WANT_ALG_MD5) && !defined(MBEDTLS_PSA_ACCEL_ALG_MD5)
179#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
180#define MBEDTLS_MD5_C
181#endif
182
Neil Armstronga557cb82022-06-10 08:58:32 +0200183#if defined(PSA_WANT_ALG_JPAKE)
Przemek Stekiel4aa99402023-02-27 13:00:57 +0100184#if !defined(MBEDTLS_PSA_ACCEL_ALG_JPAKE)
Neil Armstrong637d0a02022-05-25 11:28:22 +0200185#define MBEDTLS_PSA_BUILTIN_PAKE 1
Neil Armstronga557cb82022-06-10 08:58:32 +0200186#define MBEDTLS_PSA_BUILTIN_ALG_JPAKE 1
Neil Armstronged407822022-06-15 11:21:33 +0200187#define MBEDTLS_ECP_DP_SECP256R1_ENABLED
Neil Armstrong637d0a02022-05-25 11:28:22 +0200188#define MBEDTLS_BIGNUM_C
189#define MBEDTLS_ECP_C
Neil Armstrong637d0a02022-05-25 11:28:22 +0200190#define MBEDTLS_ECJPAKE_C
Przemek Stekiel4aa99402023-02-27 13:00:57 +0100191#endif /* MBEDTLS_PSA_ACCEL_ALG_JPAKE */
Neil Armstronga557cb82022-06-10 08:58:32 +0200192#endif /* PSA_WANT_ALG_JPAKE */
Neil Armstrong637d0a02022-05-25 11:28:22 +0200193
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100194#if defined(PSA_WANT_ALG_RIPEMD160) && !defined(MBEDTLS_PSA_ACCEL_ALG_RIPEMD160)
195#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
196#define MBEDTLS_RIPEMD160_C
197#endif
198
John Durkopd62b6782020-11-30 21:06:05 -0800199#if defined(PSA_WANT_ALG_RSA_OAEP)
200#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP)
201#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
202#define MBEDTLS_RSA_C
203#define MBEDTLS_BIGNUM_C
204#define MBEDTLS_OID_C
205#define MBEDTLS_PKCS1_V21
John Durkopd62b6782020-11-30 21:06:05 -0800206#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP */
207#endif /* PSA_WANT_ALG_RSA_OAEP */
208
209#if defined(PSA_WANT_ALG_RSA_PKCS1V15_CRYPT)
210#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT)
211#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
212#define MBEDTLS_RSA_C
213#define MBEDTLS_BIGNUM_C
214#define MBEDTLS_OID_C
215#define MBEDTLS_PKCS1_V15
216#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT */
217#endif /* PSA_WANT_ALG_RSA_PKCS1V15_CRYPT */
218
219#if defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
220#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN)
221#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
222#define MBEDTLS_RSA_C
223#define MBEDTLS_BIGNUM_C
224#define MBEDTLS_OID_C
225#define MBEDTLS_PKCS1_V15
John Durkopd62b6782020-11-30 21:06:05 -0800226#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN */
227#endif /* PSA_WANT_ALG_RSA_PKCS1V15_SIGN */
228
229#if defined(PSA_WANT_ALG_RSA_PSS)
230#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PSS)
231#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
232#define MBEDTLS_RSA_C
233#define MBEDTLS_BIGNUM_C
234#define MBEDTLS_OID_C
235#define MBEDTLS_PKCS1_V21
John Durkopd62b6782020-11-30 21:06:05 -0800236#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PSS */
237#endif /* PSA_WANT_ALG_RSA_PSS */
238
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100239#if defined(PSA_WANT_ALG_SHA_1) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_1)
240#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
241#define MBEDTLS_SHA1_C
242#endif
243
244#if defined(PSA_WANT_ALG_SHA_224) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_224)
245#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200246#define MBEDTLS_SHA224_C
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100247#endif
248
249#if defined(PSA_WANT_ALG_SHA_256) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_256)
250#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
251#define MBEDTLS_SHA256_C
252#endif
253
254#if defined(PSA_WANT_ALG_SHA_384) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_384)
255#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200256#define MBEDTLS_SHA384_C
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100257#endif
258
259#if defined(PSA_WANT_ALG_SHA_512) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_512)
260#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
261#define MBEDTLS_SHA512_C
262#endif
263
Dave Rodgman47a2ac12023-06-26 18:39:42 +0100264#if defined(PSA_WANT_ALG_SHA3_224) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA3_224)
Dave Rodgmanf66cd612023-06-26 11:02:12 +0100265#define MBEDTLS_PSA_BUILTIN_ALG_SHA3_224 1
266#define MBEDTLS_SHA3_C
267#endif
268
Dave Rodgman47a2ac12023-06-26 18:39:42 +0100269#if defined(PSA_WANT_ALG_SHA3_256) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA3_256)
Dave Rodgmanf66cd612023-06-26 11:02:12 +0100270#define MBEDTLS_PSA_BUILTIN_ALG_SHA3_256 1
271#define MBEDTLS_SHA3_C
272#endif
273
Dave Rodgman47a2ac12023-06-26 18:39:42 +0100274#if defined(PSA_WANT_ALG_SHA3_384) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA3_384)
Dave Rodgmanf66cd612023-06-26 11:02:12 +0100275#define MBEDTLS_PSA_BUILTIN_ALG_SHA3_384 1
276#define MBEDTLS_SHA3_C
277#endif
278
Dave Rodgman47a2ac12023-06-26 18:39:42 +0100279#if defined(PSA_WANT_ALG_SHA3_512) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA3_512)
Dave Rodgmanf66cd612023-06-26 11:02:12 +0100280#define MBEDTLS_PSA_BUILTIN_ALG_SHA3_512 1
Dave Rodgman98083c62023-06-25 23:27:45 +0100281#define MBEDTLS_SHA3_C
282#endif
283
Kusumit Ghoderao83baf892023-05-03 11:42:29 +0530284#if defined(PSA_WANT_ALG_PBKDF2_HMAC)
285#if !defined(MBEDTLS_PSA_ACCEL_ALG_PBKDF2_HMAC)
286#define MBEDTLS_PSA_BUILTIN_ALG_PBKDF2_HMAC 1
Kusumit Ghoderao105f7722023-07-27 21:03:06 +0530287#define PSA_HAVE_SOFT_PBKDF2_HMAC
Kusumit Ghoderaob9410e82023-05-03 18:36:35 +0530288#if !defined(MBEDTLS_PSA_ACCEL_ALG_HMAC)
Kusumit Ghoderao83baf892023-05-03 11:42:29 +0530289#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
Kusumit Ghoderaob9410e82023-05-03 18:36:35 +0530290#endif /* !MBEDTLS_PSA_ACCEL_ALG_HMAC */
Kusumit Ghoderao83baf892023-05-03 11:42:29 +0530291#endif /* !MBEDTLS_PSA_BUILTIN_ALG_PBKDF2_HMAC */
292#endif /* PSA_WANT_ALG_PBKDF2_HMAC */
293
John Durkop07cc04a2020-11-16 22:08:34 -0800294#if defined(PSA_WANT_ALG_TLS12_PRF)
295#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF)
John Durkopd62b6782020-11-30 21:06:05 -0800296#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
John Durkop07cc04a2020-11-16 22:08:34 -0800297#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF */
298#endif /* PSA_WANT_ALG_TLS12_PRF */
299
300#if defined(PSA_WANT_ALG_TLS12_PSK_TO_MS)
301#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS)
John Durkopd62b6782020-11-30 21:06:05 -0800302#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
John Durkop07cc04a2020-11-16 22:08:34 -0800303#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS */
304#endif /* PSA_WANT_ALG_TLS12_PSK_TO_MS */
305
Andrzej Kurek08d34b82022-07-29 10:00:16 -0400306#if defined(PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS)
307#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_ECJPAKE_TO_PMS)
308#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_ECJPAKE_TO_PMS 1
309#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_ECJPAKE_TO_PMS */
310#endif /* PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS */
311
Valerio Setti4520a8f2023-06-13 12:34:12 +0200312#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200313#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200314#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_IMPORT)
315#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_IMPORT 1
316#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_IMPORT */
317#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT */
318
319#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200320#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200321#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_EXPORT)
322#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_EXPORT 1
323#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_EXPORT */
324#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT */
325
326#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200327#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200328#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_GENERATE)
329#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_GENERATE 1
330#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_GENERATE */
331#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE */
332
333#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200334#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200335#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_DERIVE)
336#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_DERIVE 1
337#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_DERIVE */
338#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE */
339
Valerio Setti01cc88a2023-06-15 11:53:08 +0200340#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC)
Valerio Settiaac957b2023-06-09 16:59:00 +0200341#define PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200342#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_BASIC)
343#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
344#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_BASIC */
345#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC */
John Durkop07cc04a2020-11-16 22:08:34 -0800346
Valerio Setti4520a8f2023-06-13 12:34:12 +0200347#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_IMPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200348#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200349#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_IMPORT)
350#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_IMPORT 1
351#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_IMPORT */
352#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_IMPORT */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200353
Valerio Setti4520a8f2023-06-13 12:34:12 +0200354#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_EXPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200355#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200356#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_EXPORT)
357#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_EXPORT 1
358#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_EXPORT */
359#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_EXPORT */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200360
Valerio Setti4520a8f2023-06-13 12:34:12 +0200361#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_GENERATE)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200362#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200363#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_GENERATE)
364#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_GENERATE 1
365#define MBEDTLS_GENPRIME
366#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_GENERATE */
367#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_GENERATE */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200368
Valerio Setti01cc88a2023-06-15 11:53:08 +0200369#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC)
Valerio Settiaac957b2023-06-09 16:59:00 +0200370#define PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200371#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_BASIC)
372#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
373#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_BASIC */
374#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200375
Valerio Setti4520a8f2023-06-13 12:34:12 +0200376#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_IMPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200377#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200378#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_IMPORT)
379#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_IMPORT 1
380#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_IMPORT */
381#endif /* PSA_WANT_KEY_TYPE_DH_KEY_PAIR_IMPORT */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200382
Valerio Setti4520a8f2023-06-13 12:34:12 +0200383#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_EXPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200384#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200385#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_EXPORT)
386#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT 1
387#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_EXPORT */
388#endif /* PSA_WANT_KEY_TYPE_DH_KEY_PAIR_EXPORT */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200389
Valerio Setti4520a8f2023-06-13 12:34:12 +0200390#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_GENERATE)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200391#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200392#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_GENERATE)
393#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE 1
394#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_GENERATE */
395#endif /* PSA_WANT_KEY_TYPE_DH_KEY_PAIR_GENERATE */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200396
Valerio Setti01cc88a2023-06-15 11:53:08 +0200397#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC)
Valerio Settiaac957b2023-06-09 16:59:00 +0200398#define PSA_WANT_KEY_TYPE_DH_PUBLIC_KEY 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200399#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_BASIC)
400#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_BASIC 1
401#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_BASIC */
402#endif /* PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200403
John Durkop07cc04a2020-11-16 22:08:34 -0800404#if defined(PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY)
405#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800406#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
John Durkop07cc04a2020-11-16 22:08:34 -0800407#define MBEDTLS_ECP_C
408#define MBEDTLS_BIGNUM_C
409#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY */
410#endif /* PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY */
411
Przemek Stekiel6d85afa2023-04-28 11:42:17 +0200412#if defined(PSA_WANT_KEY_TYPE_DH_PUBLIC_KEY)
413#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_PUBLIC_KEY)
414#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY 1
Przemek Stekiel87d9a4a2022-12-15 13:22:11 +0100415#define MBEDTLS_BIGNUM_C
Przemek Stekiel6d85afa2023-04-28 11:42:17 +0200416#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_PUBLIC_KEY */
417#endif /* PSA_WANT_KEY_TYPE_DH_PUBLIC_KEY */
Przemek Stekiel87d9a4a2022-12-15 13:22:11 +0100418
John Durkop9814fa22020-11-04 12:28:15 -0800419#if defined(PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkop0e005192020-10-31 22:06:54 -0700420#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800421#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
John Durkop0e005192020-10-31 22:06:54 -0700422#define MBEDTLS_RSA_C
423#define MBEDTLS_BIGNUM_C
424#define MBEDTLS_OID_C
John Durkop07cc04a2020-11-16 22:08:34 -0800425#define MBEDTLS_PK_PARSE_C
426#define MBEDTLS_PK_WRITE_C
427#define MBEDTLS_PK_C
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200428#define MBEDTLS_ASN1_PARSE_C
429#define MBEDTLS_ASN1_WRITE_C
John Durkop0e005192020-10-31 22:06:54 -0700430#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkop9814fa22020-11-04 12:28:15 -0800431#endif /* PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkopd0321952020-10-29 21:37:36 -0700432
David Brownb781f752021-02-08 15:44:52 -0700433/* If any of the block modes are requested that don't have an
434 * associated HW assist, define PSA_HAVE_SOFT_BLOCK_MODE for checking
435 * in the block cipher key types. */
436#if (defined(PSA_WANT_ALG_CTR) && !defined(MBEDTLS_PSA_ACCEL_ALG_CTR)) || \
Bence Szépkúti7921cce2021-02-17 11:46:50 +0100437 (defined(PSA_WANT_ALG_CFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_CFB)) || \
David Brownb781f752021-02-08 15:44:52 -0700438 (defined(PSA_WANT_ALG_OFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_OFB)) || \
David Brownb781f752021-02-08 15:44:52 -0700439 defined(PSA_WANT_ALG_ECB_NO_PADDING) || \
440 (defined(PSA_WANT_ALG_CBC_NO_PADDING) && \
Gilles Peskine449bd832023-01-11 14:50:10 +0100441 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING)) || \
David Brownb781f752021-02-08 15:44:52 -0700442 (defined(PSA_WANT_ALG_CBC_PKCS7) && \
Gilles Peskine449bd832023-01-11 14:50:10 +0100443 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7)) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100444 (defined(PSA_WANT_ALG_CMAC) && !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC))
David Brownb781f752021-02-08 15:44:52 -0700445#define PSA_HAVE_SOFT_BLOCK_MODE 1
446#endif
447
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100448#if (defined(PSA_WANT_ALG_GCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_GCM)) || \
449 (defined(PSA_WANT_ALG_CCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_CCM))
450#define PSA_HAVE_SOFT_BLOCK_AEAD 1
451#endif
452
Kusumit Ghoderaoc22affd2023-07-28 13:31:58 +0530453#if defined(PSA_WANT_ALG_PBKDF2_AES_CMAC_PRF_128)
454#if !defined(MBEDTLS_PSA_ACCEL_ALG_PBKDF2_AES_CMAC_PRF_128)
455#define MBEDTLS_PSA_BUILTIN_ALG_PBKDF2_AES_CMAC_PRF_128 1
456#define PSA_HAVE_SOFT_PBKDF2_CMAC
457#endif /* !MBEDTLS_PSA_ACCEL_ALG_PBKDF2_AES_CMAC_PRF_128 */
458#endif /* PSA_WANT_ALG_PBKDF2_AES_CMAC_PRF_128 */
459
David Brown94933082021-01-05 12:03:25 -0700460#if defined(PSA_WANT_KEY_TYPE_AES)
David Browne1f91f02021-02-09 15:56:22 -0700461#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_AES)
462#define PSA_HAVE_SOFT_KEY_TYPE_AES 1
463#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_AES */
464#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100465 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
Kusumit Ghoderaoc22affd2023-07-28 13:31:58 +0530466 defined(PSA_HAVE_SOFT_BLOCK_AEAD) || \
467 defined(PSA_HAVE_SOFT_PBKDF2_CMAC)
David Brown78a429b2021-01-21 09:48:57 -0700468#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700469#define MBEDTLS_AES_C
David Browne1f91f02021-02-09 15:56:22 -0700470#endif /* PSA_HAVE_SOFT_KEY_TYPE_AES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown94933082021-01-05 12:03:25 -0700471#endif /* PSA_WANT_KEY_TYPE_AES */
472
Gilles Peskine09c46da2021-10-08 15:48:16 +0200473#if defined(PSA_WANT_KEY_TYPE_ARIA)
474#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA)
475#define PSA_HAVE_SOFT_KEY_TYPE_ARIA 1
476#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA */
477#if defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
478 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
479 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
480#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
481#define MBEDTLS_ARIA_C
482#endif /* PSA_HAVE_SOFT_KEY_TYPE_ARIA || PSA_HAVE_SOFT_BLOCK_MODE */
483#endif /* PSA_WANT_KEY_TYPE_ARIA */
484
David Brown686e6e82021-01-05 12:03:25 -0700485#if defined(PSA_WANT_KEY_TYPE_CAMELLIA)
David Browne1f91f02021-02-09 15:56:22 -0700486#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA)
487#define PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA 1
488#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA */
489#if defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100490 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
491 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
David Brown78a429b2021-01-21 09:48:57 -0700492#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700493#define MBEDTLS_CAMELLIA_C
David Browne1f91f02021-02-09 15:56:22 -0700494#endif /* PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown686e6e82021-01-05 12:03:25 -0700495#endif /* PSA_WANT_KEY_TYPE_CAMELLIA */
496
David Brownb65a7f72021-01-15 12:04:09 -0700497#if defined(PSA_WANT_KEY_TYPE_DES)
David Browne1f91f02021-02-09 15:56:22 -0700498#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DES)
499#define PSA_HAVE_SOFT_KEY_TYPE_DES 1
500#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DES */
501#if defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
David Brownb781f752021-02-08 15:44:52 -0700502 defined(PSA_HAVE_SOFT_BLOCK_MODE)
David Brown78a429b2021-01-21 09:48:57 -0700503#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700504#define MBEDTLS_DES_C
David Browne1f91f02021-02-09 15:56:22 -0700505#endif /*PSA_HAVE_SOFT_KEY_TYPE_DES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brownb65a7f72021-01-15 12:04:09 -0700506#endif /* PSA_WANT_KEY_TYPE_DES */
507
David Brownb16727a2021-02-08 16:31:46 -0700508#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
509#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20)
510#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
511#define MBEDTLS_CHACHA20_C
512#endif /*!MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20 */
513#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
514
David Brownf84a0f62021-02-09 15:59:41 -0700515/* If any of the software block ciphers are selected, define
516 * PSA_HAVE_SOFT_BLOCK_CIPHER, which can be used in any of these
517 * situations. */
518#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200519 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
David Brownf84a0f62021-02-09 15:59:41 -0700520 defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
521 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
522#define PSA_HAVE_SOFT_BLOCK_CIPHER 1
523#endif
524
David Brown99844272021-01-15 12:04:47 -0700525#if defined(PSA_WANT_ALG_STREAM_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700526#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brown99844272021-01-15 12:04:47 -0700527#endif /* PSA_WANT_ALG_STREAM_CIPHER */
528
Ronald Crond85e98d2021-03-25 15:32:32 +0100529#if defined(PSA_WANT_ALG_CBC_MAC)
530#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_MAC)
531#error "CBC-MAC is not yet supported via the PSA API in Mbed TLS."
532#define MBEDTLS_PSA_BUILTIN_ALG_CBC_MAC 1
533#endif /* !MBEDTLS_PSA_ACCEL_ALG_CBC_MAC */
534#endif /* PSA_WANT_ALG_CBC_MAC */
535
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100536#if defined(PSA_WANT_ALG_CMAC)
537#if !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC) || \
Kusumit Ghoderaoc22affd2023-07-28 13:31:58 +0530538 defined(PSA_HAVE_SOFT_BLOCK_CIPHER) || \
539 defined(PSA_HAVE_SOFT_PBKDF2_CMAC)
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100540#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
541#define MBEDTLS_CMAC_C
542#endif /* !MBEDTLS_PSA_ACCEL_ALG_CMAC */
543#endif /* PSA_WANT_ALG_CMAC */
544
Kusumit Ghoderao105f7722023-07-27 21:03:06 +0530545#if defined(PSA_HAVE_SOFT_PBKDF2_HMAC) || \
546 defined(PSA_HAVE_SOFT_PBKDF2_CMAC)
547#define PSA_HAVE_SOFT_PBKDF2 1
548#endif /* PSA_HAVE_SOFT_PBKDF2_HMAC || PSA_HAVE_SOFT_PBKDF2_CMAC */
David Brown99844272021-01-15 12:04:47 -0700549
550#if defined(PSA_WANT_ALG_CTR)
David Brown4b9ec7a2021-02-05 12:47:08 -0700551#if !defined(MBEDTLS_PSA_ACCEL_ALG_CTR) || \
David Brownf84a0f62021-02-09 15:59:41 -0700552 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700553#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700554#define MBEDTLS_CIPHER_MODE_CTR
David Brown4b9ec7a2021-02-05 12:47:08 -0700555#endif
David Brown99844272021-01-15 12:04:47 -0700556#endif /* PSA_WANT_ALG_CTR */
557
558#if defined(PSA_WANT_ALG_CFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700559#if !defined(MBEDTLS_PSA_ACCEL_ALG_CFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700560 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700561#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700562#define MBEDTLS_CIPHER_MODE_CFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700563#endif
David Brown99844272021-01-15 12:04:47 -0700564#endif /* PSA_WANT_ALG_CFB */
565
566#if defined(PSA_WANT_ALG_OFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700567#if !defined(MBEDTLS_PSA_ACCEL_ALG_OFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700568 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700569#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700570#define MBEDTLS_CIPHER_MODE_OFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700571#endif
David Brown99844272021-01-15 12:04:47 -0700572#endif /* PSA_WANT_ALG_OFB */
573
Gilles Peskine7a2e83b2022-03-17 11:09:23 +0100574#if defined(PSA_WANT_ALG_ECB_NO_PADDING) && \
575 !defined(MBEDTLS_PSA_ACCEL_ALG_ECB_NO_PADDING)
David Brownbe380c12021-02-11 10:55:48 -0700576#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700577#endif
578
David Brown12f45f92021-01-26 11:50:36 -0700579#if defined(PSA_WANT_ALG_CBC_NO_PADDING)
David Brown4b9ec7a2021-02-05 12:47:08 -0700580#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING) || \
David Brownfc468182021-02-09 16:23:34 -0700581 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700582#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700583#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown4b9ec7a2021-02-05 12:47:08 -0700584#endif
David Brown12f45f92021-01-26 11:50:36 -0700585#endif /* PSA_WANT_ALG_CBC_NO_PADDING */
586
587#if defined(PSA_WANT_ALG_CBC_PKCS7)
David Brown4b9ec7a2021-02-05 12:47:08 -0700588#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7) || \
David Brownfc468182021-02-09 16:23:34 -0700589 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700590#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700591#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brownfc468182021-02-09 16:23:34 -0700592#define MBEDTLS_CIPHER_PADDING_PKCS7
David Brown4b9ec7a2021-02-05 12:47:08 -0700593#endif
David Brown12f45f92021-01-26 11:50:36 -0700594#endif /* PSA_WANT_ALG_CBC_PKCS7 */
595
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100596#if defined(PSA_WANT_ALG_CCM)
597#if !defined(MBEDTLS_PSA_ACCEL_ALG_CCM) || \
598 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200599 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100600 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
601#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100602#define MBEDTLS_PSA_BUILTIN_ALG_CCM_STAR_NO_TAG 1
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100603#define MBEDTLS_CCM_C
604#endif
605#endif /* PSA_WANT_ALG_CCM */
606
607#if defined(PSA_WANT_ALG_GCM)
608#if !defined(MBEDTLS_PSA_ACCEL_ALG_GCM) || \
609 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200610 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100611 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
612#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
613#define MBEDTLS_GCM_C
614#endif
615#endif /* PSA_WANT_ALG_GCM */
616
David Brownac4fa072021-02-08 16:47:35 -0700617#if defined(PSA_WANT_ALG_CHACHA20_POLY1305)
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200618#if !defined(MBEDTLS_PSA_ACCEL_ALG_CHACHA20_POLY1305)
David Brownac4fa072021-02-08 16:47:35 -0700619#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
620#define MBEDTLS_CHACHAPOLY_C
Summer Qin9f2596f2022-06-17 12:50:32 +0800621#define MBEDTLS_CHACHA20_C
622#define MBEDTLS_POLY1305_C
David Brown86730a82021-02-09 16:24:11 -0700623#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700624#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200625#endif /* !MBEDTLS_PSA_ACCEL_ALG_CHACHA20_POLY1305 */
David Brownac4fa072021-02-08 16:47:35 -0700626#endif /* PSA_WANT_ALG_CHACHA20_POLY1305 */
627
David Browneed74df2021-03-15 15:53:57 -0600628#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_256)
629#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256)
630#define MBEDTLS_ECP_DP_BP256R1_ENABLED
631#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
632#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256 */
633#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_256 */
634
635#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_384)
636#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384)
637#define MBEDTLS_ECP_DP_BP384R1_ENABLED
638#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
639#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384 */
640#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_384 */
641
642#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_512)
643#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512)
644#define MBEDTLS_ECP_DP_BP512R1_ENABLED
645#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
646#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512 */
647#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_512 */
648
649#if defined(PSA_WANT_ECC_MONTGOMERY_255)
650#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255)
651#define MBEDTLS_ECP_DP_CURVE25519_ENABLED
652#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
653#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255 */
654#endif /* PSA_WANT_ECC_MONTGOMERY_255 */
655
656#if defined(PSA_WANT_ECC_MONTGOMERY_448)
657#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448)
658#define MBEDTLS_ECP_DP_CURVE448_ENABLED
659#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
660#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448 */
661#endif /* PSA_WANT_ECC_MONTGOMERY_448 */
662
David Brownc7b9b2b2021-02-19 21:05:52 -0700663#if defined(PSA_WANT_ECC_SECP_R1_192)
664#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192)
665#define MBEDTLS_ECP_DP_SECP192R1_ENABLED
666#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
667#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192 */
668#endif /* PSA_WANT_ECC_SECP_R1_192 */
669
670#if defined(PSA_WANT_ECC_SECP_R1_224)
671#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224)
672#define MBEDTLS_ECP_DP_SECP224R1_ENABLED
673#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
674#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224 */
675#endif /* PSA_WANT_ECC_SECP_R1_224 */
676
677#if defined(PSA_WANT_ECC_SECP_R1_256)
678#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256)
679#define MBEDTLS_ECP_DP_SECP256R1_ENABLED
680#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
681#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256 */
682#endif /* PSA_WANT_ECC_SECP_R1_256 */
683
684#if defined(PSA_WANT_ECC_SECP_R1_384)
685#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384)
686#define MBEDTLS_ECP_DP_SECP384R1_ENABLED
687#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
688#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384 */
689#endif /* PSA_WANT_ECC_SECP_R1_384 */
690
691#if defined(PSA_WANT_ECC_SECP_R1_521)
692#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521)
693#define MBEDTLS_ECP_DP_SECP521R1_ENABLED
694#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
695#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521 */
696#endif /* PSA_WANT_ECC_SECP_R1_521 */
697
698#if defined(PSA_WANT_ECC_SECP_K1_192)
699#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192)
David Brown8de143e2021-02-19 14:08:00 -0700700#define MBEDTLS_ECP_DP_SECP192K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700701#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
702#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192 */
703#endif /* PSA_WANT_ECC_SECP_K1_192 */
David Brown8de143e2021-02-19 14:08:00 -0700704
David Brownc7b9b2b2021-02-19 21:05:52 -0700705#if defined(PSA_WANT_ECC_SECP_K1_224)
706#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224)
Ronald Crone1f55162021-03-25 15:09:47 +0100707/*
708 * SECP224K1 is buggy via the PSA API in Mbed TLS
Dave Rodgman017a1992022-03-31 14:07:01 +0100709 * (https://github.com/Mbed-TLS/mbedtls/issues/3541).
Ronald Crone1f55162021-03-25 15:09:47 +0100710 */
711#error "SECP224K1 is buggy via the PSA API in Mbed TLS."
David Brown8de143e2021-02-19 14:08:00 -0700712#define MBEDTLS_ECP_DP_SECP224K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700713#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
714#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224 */
715#endif /* PSA_WANT_ECC_SECP_K1_224 */
David Brown8de143e2021-02-19 14:08:00 -0700716
David Brownc7b9b2b2021-02-19 21:05:52 -0700717#if defined(PSA_WANT_ECC_SECP_K1_256)
718#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256)
David Brown9b178de2021-03-10 13:14:48 -0700719#define MBEDTLS_ECP_DP_SECP256K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700720#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
721#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256 */
722#endif /* PSA_WANT_ECC_SECP_K1_256 */
David Brown8de143e2021-02-19 14:08:00 -0700723
Gilles Peskine1231eb52021-04-19 22:24:23 +0200724
725
726/****************************************************************/
727/* Infer PSA requirements from Mbed TLS capabilities */
728/****************************************************************/
729
John Durkop714e3a12020-09-29 22:07:04 -0700730#else /* MBEDTLS_PSA_CRYPTO_CONFIG */
731
732/*
733 * Ensure PSA_WANT_* defines are setup properly if MBEDTLS_PSA_CRYPTO_CONFIG
734 * is not defined
735 */
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100736
Ronald Cron3d471812021-03-18 13:40:31 +0100737#if defined(MBEDTLS_CCM_C)
738#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100739#define MBEDTLS_PSA_BUILTIN_ALG_CCM_STAR_NO_TAG 1
Ronald Cron3d471812021-03-18 13:40:31 +0100740#define PSA_WANT_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100741#define PSA_WANT_ALG_CCM_STAR_NO_TAG 1
Ronald Cron3d471812021-03-18 13:40:31 +0100742#endif /* MBEDTLS_CCM_C */
743
744#if defined(MBEDTLS_CMAC_C)
745#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
746#define PSA_WANT_ALG_CMAC 1
747#endif /* MBEDTLS_CMAC_C */
748
John Durkopd62b6782020-11-30 21:06:05 -0800749#if defined(MBEDTLS_ECDH_C)
750#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
751#define PSA_WANT_ALG_ECDH 1
752#endif /* MBEDTLS_ECDH_C */
753
754#if defined(MBEDTLS_ECDSA_C)
755#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
756#define PSA_WANT_ALG_ECDSA 1
Gilles Peskine1231eb52021-04-19 22:24:23 +0200757#define PSA_WANT_ALG_ECDSA_ANY 1
John Durkopd62b6782020-11-30 21:06:05 -0800758
759// Only add in DETERMINISTIC support if ECDSA is also enabled
760#if defined(MBEDTLS_ECDSA_DETERMINISTIC)
761#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
762#define PSA_WANT_ALG_DETERMINISTIC_ECDSA 1
763#endif /* MBEDTLS_ECDSA_DETERMINISTIC */
764
765#endif /* MBEDTLS_ECDSA_C */
766
767#if defined(MBEDTLS_ECP_C)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200768#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Settif87b5052023-05-26 13:47:09 +0200769#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT 1
770#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT 1
Valerio Settif87b5052023-05-26 13:47:09 +0200771#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE 1
Valerio Setti06dfba72023-06-30 10:09:36 +0200772/* Normally we wouldn't enable this because it's not implemented in ecp.c,
773 * but since it used to be available any time ECP_C was enabled, let's enable
774 * it anyway for the sake of backwards compatibility */
775#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200776#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Settiddb57762023-06-06 14:17:15 +0200777#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_IMPORT 1
778#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_EXPORT 1
779#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_GENERATE 1
Valerio Setti06dfba72023-06-30 10:09:36 +0200780/* See comment for PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE above. */
781#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_DERIVE 1
John Durkopd62b6782020-11-30 21:06:05 -0800782#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
783#define PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY 1
784#endif /* MBEDTLS_ECP_C */
785
Przemek Stekiel746dfae2023-05-04 09:14:08 +0200786#if defined(MBEDTLS_DHM_C)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200787#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC 1
Valerio Settif87b5052023-05-26 13:47:09 +0200788#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_IMPORT 1
789#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_EXPORT 1
Valerio Settif87b5052023-05-26 13:47:09 +0200790#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_GENERATE 1
Przemek Stekiel746dfae2023-05-04 09:14:08 +0200791#define PSA_WANT_KEY_TYPE_DH_PUBLIC_KEY 1
792#define PSA_WANT_ALG_FFDH 1
793#define PSA_WANT_DH_FAMILY_RFC7919 1
794#define MBEDTLS_PSA_BUILTIN_ALG_FFDH 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200795#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_BASIC 1
Valerio Settif87b5052023-05-26 13:47:09 +0200796#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_IMPORT 1
797#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT 1
798#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE 1
Przemek Stekiel746dfae2023-05-04 09:14:08 +0200799#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY 1
800#endif /* MBEDTLS_DHM_C */
801
Ronald Cron3d471812021-03-18 13:40:31 +0100802#if defined(MBEDTLS_GCM_C)
803#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
804#define PSA_WANT_ALG_GCM 1
805#endif /* MBEDTLS_GCM_C */
806
Przemek Stekiel18399d82022-06-27 13:34:50 +0200807/* Enable PSA HKDF algorithm if mbedtls HKDF is supported.
808 * PSA HKDF EXTRACT and PSA HKDF EXPAND have minimal cost when
809 * PSA HKDF is enabled, so enable both algorithms together
810 * with PSA HKDF. */
John Durkopd62b6782020-11-30 21:06:05 -0800811#if defined(MBEDTLS_HKDF_C)
812#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
813#define PSA_WANT_ALG_HMAC 1
814#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
815#define PSA_WANT_ALG_HKDF 1
Przemek Stekielb33bd192022-06-21 09:58:51 +0200816#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXTRACT 1
817#define PSA_WANT_ALG_HKDF_EXTRACT 1
818#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXPAND 1
819#define PSA_WANT_ALG_HKDF_EXPAND 1
John Durkopd62b6782020-11-30 21:06:05 -0800820#endif /* MBEDTLS_HKDF_C */
821
John Durkopd62b6782020-11-30 21:06:05 -0800822#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
823#define PSA_WANT_ALG_HMAC 1
Gilles Peskine47a89332021-01-12 00:00:15 +0100824#define PSA_WANT_KEY_TYPE_HMAC
Andrzej Kurek65bf73e2022-08-31 14:59:31 -0400825
826#if defined(MBEDTLS_MD_C)
John Durkopd62b6782020-11-30 21:06:05 -0800827#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
828#define PSA_WANT_ALG_TLS12_PRF 1
829#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
830#define PSA_WANT_ALG_TLS12_PSK_TO_MS 1
831#endif /* MBEDTLS_MD_C */
832
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100833#if defined(MBEDTLS_MD5_C)
834#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
835#define PSA_WANT_ALG_MD5 1
836#endif
837
Neil Armstrong637d0a02022-05-25 11:28:22 +0200838#if defined(MBEDTLS_ECJPAKE_C)
839#define MBEDTLS_PSA_BUILTIN_PAKE 1
Neil Armstronga557cb82022-06-10 08:58:32 +0200840#define MBEDTLS_PSA_BUILTIN_ALG_JPAKE 1
841#define PSA_WANT_ALG_JPAKE 1
Neil Armstrong637d0a02022-05-25 11:28:22 +0200842#endif
843
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100844#if defined(MBEDTLS_RIPEMD160_C)
845#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
846#define PSA_WANT_ALG_RIPEMD160 1
847#endif
848
John Durkopd62b6782020-11-30 21:06:05 -0800849#if defined(MBEDTLS_RSA_C)
850#if defined(MBEDTLS_PKCS1_V15)
851#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
852#define PSA_WANT_ALG_RSA_PKCS1V15_CRYPT 1
853#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
854#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN 1
Gilles Peskine1231eb52021-04-19 22:24:23 +0200855#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW 1
Yuto Takano7828ca22021-08-10 11:26:15 +0100856#endif /* MBEDTLS_PKCS1_V15 */
John Durkopd62b6782020-11-30 21:06:05 -0800857#if defined(MBEDTLS_PKCS1_V21)
858#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
859#define PSA_WANT_ALG_RSA_OAEP 1
860#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
861#define PSA_WANT_ALG_RSA_PSS 1
862#endif /* MBEDTLS_PKCS1_V21 */
Valerio Setti98038342023-07-11 16:30:24 +0200863#if defined(MBEDTLS_GENPRIME)
864#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_GENERATE 1
865#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_GENERATE 1
866#endif /* MBEDTLS_GENPRIME */
Valerio Setti01cc88a2023-06-15 11:53:08 +0200867#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
Valerio Settif87b5052023-05-26 13:47:09 +0200868#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_IMPORT 1
869#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_EXPORT 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200870#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
Valerio Settif87b5052023-05-26 13:47:09 +0200871#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_IMPORT 1
872#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_EXPORT 1
John Durkopd62b6782020-11-30 21:06:05 -0800873#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
874#define PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY 1
875#endif /* MBEDTLS_RSA_C */
876
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100877#if defined(MBEDTLS_SHA1_C)
878#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
879#define PSA_WANT_ALG_SHA_1 1
880#endif
881
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200882#if defined(MBEDTLS_SHA224_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100883#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
Gilles Peskineb65db072021-01-12 00:00:53 +0100884#define PSA_WANT_ALG_SHA_224 1
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200885#endif
886
887#if defined(MBEDTLS_SHA256_C)
888#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100889#define PSA_WANT_ALG_SHA_256 1
890#endif
891
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200892#if defined(MBEDTLS_SHA384_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100893#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
894#define PSA_WANT_ALG_SHA_384 1
895#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200896
897#if defined(MBEDTLS_SHA512_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100898#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
899#define PSA_WANT_ALG_SHA_512 1
900#endif
901
Dave Rodgman98083c62023-06-25 23:27:45 +0100902#if defined(MBEDTLS_SHA3_C)
Dave Rodgmanf66cd612023-06-26 11:02:12 +0100903#define MBEDTLS_PSA_BUILTIN_ALG_SHA3_224 1
904#define MBEDTLS_PSA_BUILTIN_ALG_SHA3_256 1
905#define MBEDTLS_PSA_BUILTIN_ALG_SHA3_384 1
906#define MBEDTLS_PSA_BUILTIN_ALG_SHA3_512 1
907#define PSA_WANT_ALG_SHA3_224 1
908#define PSA_WANT_ALG_SHA3_256 1
909#define PSA_WANT_ALG_SHA3_384 1
910#define PSA_WANT_ALG_SHA3_512 1
Dave Rodgman98083c62023-06-25 23:27:45 +0100911#endif
912
David Brown94933082021-01-05 12:03:25 -0700913#if defined(MBEDTLS_AES_C)
914#define PSA_WANT_KEY_TYPE_AES 1
David Brownda7dbb72021-01-26 11:44:15 -0700915#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700916#endif
917
Gilles Peskine09c46da2021-10-08 15:48:16 +0200918#if defined(MBEDTLS_ARIA_C)
919#define PSA_WANT_KEY_TYPE_ARIA 1
920#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
921#endif
922
David Brown686e6e82021-01-05 12:03:25 -0700923#if defined(MBEDTLS_CAMELLIA_C)
924#define PSA_WANT_KEY_TYPE_CAMELLIA 1
David Brownda7dbb72021-01-26 11:44:15 -0700925#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700926#endif
927
David Brownb65a7f72021-01-15 12:04:09 -0700928#if defined(MBEDTLS_DES_C)
929#define PSA_WANT_KEY_TYPE_DES 1
David Brownda7dbb72021-01-26 11:44:15 -0700930#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700931#endif
932
Andrzej Kurekd60907b2022-09-14 10:02:30 -0400933#if defined(MBEDTLS_PSA_BUILTIN_ALG_SHA_256)
934#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_ECJPAKE_TO_PMS 1
935#define PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS 1
936#endif
937
David Brownb16727a2021-02-08 16:31:46 -0700938#if defined(MBEDTLS_CHACHA20_C)
939#define PSA_WANT_KEY_TYPE_CHACHA20 1
940#define PSA_WANT_ALG_STREAM_CIPHER 1
941#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
942#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brownac4fa072021-02-08 16:47:35 -0700943#if defined(MBEDTLS_CHACHAPOLY_C)
944#define PSA_WANT_ALG_CHACHA20_POLY1305 1
David Brown86730a82021-02-09 16:24:11 -0700945#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700946#endif
David Brownb16727a2021-02-08 16:31:46 -0700947#endif
948
David Brown99844272021-01-15 12:04:47 -0700949#if defined(MBEDTLS_CIPHER_MODE_CBC)
David Brown10cb81c2021-02-09 16:10:29 -0700950#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700951#define PSA_WANT_ALG_CBC_NO_PADDING 1
952#if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
David Brown12f45f92021-01-26 11:50:36 -0700953#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brown99844272021-01-15 12:04:47 -0700954#define PSA_WANT_ALG_CBC_PKCS7 1
955#endif
956#endif
957
958#if defined(MBEDTLS_AES_C) || defined(MBEDTLS_DES_C) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200959 defined(MBEDTLS_ARIA_C) || defined(MBEDTLS_CAMELLIA_C)
David Brown10cb81c2021-02-09 16:10:29 -0700960#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700961#define PSA_WANT_ALG_ECB_NO_PADDING 1
962#endif
963
964#if defined(MBEDTLS_CIPHER_MODE_CFB)
David Brown12f45f92021-01-26 11:50:36 -0700965#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700966#define PSA_WANT_ALG_CFB 1
967#endif
968
969#if defined(MBEDTLS_CIPHER_MODE_CTR)
David Brown12f45f92021-01-26 11:50:36 -0700970#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700971#define PSA_WANT_ALG_CTR 1
972#endif
973
974#if defined(MBEDTLS_CIPHER_MODE_OFB)
David Brown12f45f92021-01-26 11:50:36 -0700975#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700976#define PSA_WANT_ALG_OFB 1
977#endif
978
David Browneed74df2021-03-15 15:53:57 -0600979#if defined(MBEDTLS_ECP_DP_BP256R1_ENABLED)
980#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
981#define PSA_WANT_ECC_BRAINPOOL_P_R1_256
982#endif
983
984#if defined(MBEDTLS_ECP_DP_BP384R1_ENABLED)
985#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
986#define PSA_WANT_ECC_BRAINPOOL_P_R1_384
987#endif
988
989#if defined(MBEDTLS_ECP_DP_BP512R1_ENABLED)
990#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
991#define PSA_WANT_ECC_BRAINPOOL_P_R1_512
992#endif
993
994#if defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED)
995#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
996#define PSA_WANT_ECC_MONTGOMERY_255
997#endif
998
Archanaef6aa5c2021-06-08 11:40:10 +0530999#if defined(MBEDTLS_ECP_DP_CURVE448_ENABLED)
David Browneed74df2021-03-15 15:53:57 -06001000#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
1001#define PSA_WANT_ECC_MONTGOMERY_448
1002#endif
1003
David Brown8de143e2021-02-19 14:08:00 -07001004#if defined(MBEDTLS_ECP_DP_SECP192R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -07001005#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
1006#define PSA_WANT_ECC_SECP_R1_192
David Brown8de143e2021-02-19 14:08:00 -07001007#endif
1008
1009#if defined(MBEDTLS_ECP_DP_SECP224R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -07001010#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
1011#define PSA_WANT_ECC_SECP_R1_224
David Brown8de143e2021-02-19 14:08:00 -07001012#endif
1013
1014#if defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -07001015#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
1016#define PSA_WANT_ECC_SECP_R1_256
David Brown8de143e2021-02-19 14:08:00 -07001017#endif
1018
1019#if defined(MBEDTLS_ECP_DP_SECP384R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -07001020#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
1021#define PSA_WANT_ECC_SECP_R1_384
David Brown8de143e2021-02-19 14:08:00 -07001022#endif
1023
1024#if defined(MBEDTLS_ECP_DP_SECP521R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -07001025#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
1026#define PSA_WANT_ECC_SECP_R1_521
David Brown8de143e2021-02-19 14:08:00 -07001027#endif
1028
1029#if defined(MBEDTLS_ECP_DP_SECP192K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -07001030#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
1031#define PSA_WANT_ECC_SECP_K1_192
David Brown8de143e2021-02-19 14:08:00 -07001032#endif
1033
Dave Rodgman017a1992022-03-31 14:07:01 +01001034/* SECP224K1 is buggy via the PSA API (https://github.com/Mbed-TLS/mbedtls/issues/3541) */
Gilles Peskine39841302021-03-23 12:06:45 +01001035#if 0 && defined(MBEDTLS_ECP_DP_SECP224K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -07001036#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
1037#define PSA_WANT_ECC_SECP_K1_224
David Brown8de143e2021-02-19 14:08:00 -07001038#endif
1039
David Brown9b178de2021-03-10 13:14:48 -07001040#if defined(MBEDTLS_ECP_DP_SECP256K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -07001041#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
1042#define PSA_WANT_ECC_SECP_K1_256
David Brown8de143e2021-02-19 14:08:00 -07001043#endif
1044
John Durkop2dfaf9c2020-09-24 04:30:10 -07001045#endif /* MBEDTLS_PSA_CRYPTO_CONFIG */
John Durkopd8959392020-09-20 23:09:17 -07001046
Tom Cosgrove6d62fac2023-05-10 14:40:05 +01001047#if defined(PSA_WANT_ALG_JPAKE)
1048#define PSA_WANT_ALG_SOME_PAKE 1
1049#endif
1050
Valerio Setti73fc0822023-06-21 10:06:19 +02001051/* Even though KEY_PAIR symbols' feature several level of support (BASIC, IMPORT,
1052 * EXPORT, GENERATE, DERIVE) we're not planning to have support only for BASIC
1053 * without IMPORT/EXPORT since these last 2 features are strongly used in tests.
Valerio Setti27c501a2023-06-27 16:58:52 +02001054 * In general it is allowed to include more feature than what is strictly
1055 * requested.
1056 * As a consequence IMPORT and EXPORT features will be automatically enabled
1057 * as soon as the BASIC one is. */
Valerio Setti73fc0822023-06-21 10:06:19 +02001058#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC)
Valerio Setti27c501a2023-06-27 16:58:52 +02001059#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT 1
1060#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT 1
Valerio Setti73fc0822023-06-21 10:06:19 +02001061#endif
1062
Valerio Setti27c501a2023-06-27 16:58:52 +02001063/* See description above */
Valerio Setti73fc0822023-06-21 10:06:19 +02001064#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_BASIC)
Valerio Setti27c501a2023-06-27 16:58:52 +02001065#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_IMPORT 1
1066#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_EXPORT 1
Valerio Setti8d6e98c2023-05-26 13:46:13 +02001067#endif
1068
Valerio Setti0d5c5e52023-07-10 16:21:00 +02001069/* See description above */
1070#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC)
1071#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_IMPORT 1
1072#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_EXPORT 1
1073#endif
1074
1075/* See description above */
1076#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_BASIC)
1077#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_IMPORT 1
1078#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_EXPORT 1
1079#endif
1080
Valerio Settia55f0422023-07-10 15:34:41 +02001081/* See description above */
1082#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC)
1083#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_IMPORT 1
1084#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_EXPORT 1
Valerio Setti8d6e98c2023-05-26 13:46:13 +02001085#endif
1086
Valerio Settia55f0422023-07-10 15:34:41 +02001087/* See description above */
1088#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_BASIC)
1089#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_IMPORT 1
1090#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT 1
Valerio Setti8d6e98c2023-05-26 13:46:13 +02001091#endif
1092
Gilles Peskine60b29fe2021-02-16 14:06:50 +01001093/* These features are always enabled. */
1094#define PSA_WANT_KEY_TYPE_DERIVE 1
Gilles Peskinebba26302022-12-15 23:25:17 +01001095#define PSA_WANT_KEY_TYPE_PASSWORD 1
1096#define PSA_WANT_KEY_TYPE_PASSWORD_HASH 1
Gilles Peskine60b29fe2021-02-16 14:06:50 +01001097#define PSA_WANT_KEY_TYPE_RAW_DATA 1
1098
John Durkop6e33dbe2020-09-17 21:15:13 -07001099#endif /* MBEDTLS_CONFIG_PSA_H */