blob: 205d30343c4b7eb42af7b55252de701348006c2c [file] [log] [blame]
John Durkop6e33dbe2020-09-17 21:15:13 -07001/**
2 * \file mbedtls/config_psa.h
3 * \brief PSA crypto configuration options (set of defines)
4 *
John Durkop34818822020-10-12 21:36:22 -07005 * This set of compile-time options takes settings defined in
6 * include/mbedtls/config.h and include/psa/crypto_config.h and uses
7 * those definitions to define symbols used in the library code.
8 *
9 * Users and integrators should not edit this file, please edit
Tom Cosgrove49f99bc2022-12-04 16:44:21 +000010 * include/mbedtls/config.h for MBEDTLS_XXX settings or
John Durkop34818822020-10-12 21:36:22 -070011 * include/psa/crypto_config.h for PSA_WANT_XXX settings.
John Durkop6e33dbe2020-09-17 21:15:13 -070012 */
13/*
14 * Copyright The Mbed TLS Contributors
Dave Rodgman7ff79652023-11-03 12:04:52 +000015 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
John Durkop6e33dbe2020-09-17 21:15:13 -070016 */
17
18#ifndef MBEDTLS_CONFIG_PSA_H
19#define MBEDTLS_CONFIG_PSA_H
20
John Durkop714e3a12020-09-29 22:07:04 -070021#if defined(MBEDTLS_PSA_CRYPTO_CONFIG)
Gilles Peskine7e2a91f2022-03-16 17:10:48 +010022#if defined(MBEDTLS_PSA_CRYPTO_CONFIG_FILE)
23#include MBEDTLS_PSA_CRYPTO_CONFIG_FILE
24#else
John Durkop6e33dbe2020-09-17 21:15:13 -070025#include "psa/crypto_config.h"
Gilles Peskine7e2a91f2022-03-16 17:10:48 +010026#endif
John Durkop76228ac2020-09-29 22:33:49 -070027#endif /* defined(MBEDTLS_PSA_CRYPTO_CONFIG) */
John Durkop6e33dbe2020-09-17 21:15:13 -070028
Gilles Peskine7e2a91f2022-03-16 17:10:48 +010029#if defined(MBEDTLS_PSA_CRYPTO_USER_CONFIG_FILE)
30#include MBEDTLS_PSA_CRYPTO_USER_CONFIG_FILE
31#endif
32
John Durkop6e33dbe2020-09-17 21:15:13 -070033#ifdef __cplusplus
34extern "C" {
35#endif
36
Gilles Peskinecf70d072021-04-19 22:24:23 +020037
38
39/****************************************************************/
40/* De facto synonyms */
41/****************************************************************/
42
43#if defined(PSA_WANT_ALG_ECDSA_ANY) && !defined(PSA_WANT_ALG_ECDSA)
44#define PSA_WANT_ALG_ECDSA PSA_WANT_ALG_ECDSA_ANY
45#elif !defined(PSA_WANT_ALG_ECDSA_ANY) && defined(PSA_WANT_ALG_ECDSA)
46#define PSA_WANT_ALG_ECDSA_ANY PSA_WANT_ALG_ECDSA
47#endif
48
49#if defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW) && !defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
50#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW
51#elif !defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW) && defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
52#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW PSA_WANT_ALG_RSA_PKCS1V15_SIGN
53#endif
54
Gilles Peskinea2536092021-10-04 18:33:56 +020055#if defined(PSA_WANT_ALG_RSA_PSS_ANY_SALT) && !defined(PSA_WANT_ALG_RSA_PSS)
56#define PSA_WANT_ALG_RSA_PSS PSA_WANT_ALG_RSA_PSS_ANY_SALT
57#elif !defined(PSA_WANT_ALG_RSA_PSS_ANY_SALT) && defined(PSA_WANT_ALG_RSA_PSS)
58#define PSA_WANT_ALG_RSA_PSS_ANY_SALT PSA_WANT_ALG_RSA_PSS
59#endif
60
Gilles Peskinecf70d072021-04-19 22:24:23 +020061
62
63/****************************************************************/
64/* Require built-in implementations based on PSA requirements */
65/****************************************************************/
66
John Durkop2dfaf9c2020-09-24 04:30:10 -070067#if defined(MBEDTLS_PSA_CRYPTO_CONFIG)
John Durkopd8959392020-09-20 23:09:17 -070068
John Durkopd62b6782020-11-30 21:06:05 -080069#if defined(PSA_WANT_ALG_DETERMINISTIC_ECDSA)
70#if !defined(MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA)
71#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
72#define MBEDTLS_ECDSA_DETERMINISTIC
73#define MBEDTLS_ECDSA_C
74#define MBEDTLS_HMAC_DRBG_C
75#define MBEDTLS_MD_C
76#endif /* !MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA */
77#endif /* PSA_WANT_ALG_DETERMINISTIC_ECDSA */
78
79#if defined(PSA_WANT_ALG_ECDH)
80#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDH)
81#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
82#define MBEDTLS_ECDH_C
83#define MBEDTLS_ECP_C
84#define MBEDTLS_BIGNUM_C
85#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDH */
86#endif /* PSA_WANT_ALG_ECDH */
87
88#if defined(PSA_WANT_ALG_ECDSA)
89#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDSA)
90#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
91#define MBEDTLS_ECDSA_C
Ronald Crond98ec4b2021-04-28 18:28:46 +020092#define MBEDTLS_ECP_C
93#define MBEDTLS_BIGNUM_C
94#define MBEDTLS_ASN1_PARSE_C
95#define MBEDTLS_ASN1_WRITE_C
John Durkopd62b6782020-11-30 21:06:05 -080096#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDSA */
97#endif /* PSA_WANT_ALG_ECDSA */
98
99#if defined(PSA_WANT_ALG_HKDF)
100#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF)
Ronald Cronfa9392a2023-09-07 16:54:44 +0200101/*
102 * The PSA implementation has its own implementation of HKDF, separate from
103 * hkdf.c. No need to enable MBEDTLS_HKDF_C here.
104 */
John Durkopd62b6782020-11-30 21:06:05 -0800105#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
106#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
107#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF */
108#endif /* PSA_WANT_ALG_HKDF */
109
110#if defined(PSA_WANT_ALG_HMAC)
111#if !defined(MBEDTLS_PSA_ACCEL_ALG_HMAC)
112#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
113#endif /* !MBEDTLS_PSA_ACCEL_ALG_HMAC */
114#endif /* PSA_WANT_ALG_HMAC */
115
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100116#if defined(PSA_WANT_ALG_MD2) && !defined(MBEDTLS_PSA_ACCEL_ALG_MD2)
117#define MBEDTLS_PSA_BUILTIN_ALG_MD2 1
118#define MBEDTLS_MD2_C
119#endif
120
121#if defined(PSA_WANT_ALG_MD4) && !defined(MBEDTLS_PSA_ACCEL_ALG_MD4)
122#define MBEDTLS_PSA_BUILTIN_ALG_MD4 1
123#define MBEDTLS_MD4_C
124#endif
125
126#if defined(PSA_WANT_ALG_MD5) && !defined(MBEDTLS_PSA_ACCEL_ALG_MD5)
127#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
128#define MBEDTLS_MD5_C
129#endif
130
131#if defined(PSA_WANT_ALG_RIPEMD160) && !defined(MBEDTLS_PSA_ACCEL_ALG_RIPEMD160)
132#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
133#define MBEDTLS_RIPEMD160_C
134#endif
135
John Durkopd62b6782020-11-30 21:06:05 -0800136#if defined(PSA_WANT_ALG_RSA_OAEP)
137#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP)
138#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
139#define MBEDTLS_RSA_C
140#define MBEDTLS_BIGNUM_C
141#define MBEDTLS_OID_C
142#define MBEDTLS_PKCS1_V21
143#define MBEDTLS_MD_C
144#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP */
145#endif /* PSA_WANT_ALG_RSA_OAEP */
146
147#if defined(PSA_WANT_ALG_RSA_PKCS1V15_CRYPT)
148#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT)
149#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
150#define MBEDTLS_RSA_C
151#define MBEDTLS_BIGNUM_C
152#define MBEDTLS_OID_C
153#define MBEDTLS_PKCS1_V15
154#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT */
155#endif /* PSA_WANT_ALG_RSA_PKCS1V15_CRYPT */
156
157#if defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
158#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN)
159#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
160#define MBEDTLS_RSA_C
161#define MBEDTLS_BIGNUM_C
162#define MBEDTLS_OID_C
163#define MBEDTLS_PKCS1_V15
164#define MBEDTLS_MD_C
165#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN */
166#endif /* PSA_WANT_ALG_RSA_PKCS1V15_SIGN */
167
168#if defined(PSA_WANT_ALG_RSA_PSS)
169#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PSS)
170#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
171#define MBEDTLS_RSA_C
172#define MBEDTLS_BIGNUM_C
173#define MBEDTLS_OID_C
174#define MBEDTLS_PKCS1_V21
175#define MBEDTLS_MD_C
176#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PSS */
177#endif /* PSA_WANT_ALG_RSA_PSS */
178
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100179#if defined(PSA_WANT_ALG_SHA_1) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_1)
180#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
181#define MBEDTLS_SHA1_C
182#endif
183
184#if defined(PSA_WANT_ALG_SHA_224) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_224)
185#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
186#define MBEDTLS_SHA256_C
187#endif
188
189#if defined(PSA_WANT_ALG_SHA_256) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_256)
190#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
191#define MBEDTLS_SHA256_C
192#endif
193
194#if defined(PSA_WANT_ALG_SHA_384) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_384)
195#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
196#define MBEDTLS_SHA512_C
197#endif
198
199#if defined(PSA_WANT_ALG_SHA_512) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_512)
200#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
201#define MBEDTLS_SHA512_C
202#endif
203
John Durkop07cc04a2020-11-16 22:08:34 -0800204#if defined(PSA_WANT_ALG_TLS12_PRF)
205#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF)
John Durkopd62b6782020-11-30 21:06:05 -0800206#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
John Durkop07cc04a2020-11-16 22:08:34 -0800207#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF */
208#endif /* PSA_WANT_ALG_TLS12_PRF */
209
210#if defined(PSA_WANT_ALG_TLS12_PSK_TO_MS)
211#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS)
John Durkopd62b6782020-11-30 21:06:05 -0800212#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
John Durkop07cc04a2020-11-16 22:08:34 -0800213#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS */
214#endif /* PSA_WANT_ALG_TLS12_PSK_TO_MS */
215
216#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR)
217#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR)
John Durkopd62b6782020-11-30 21:06:05 -0800218#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR 1
John Durkop07cc04a2020-11-16 22:08:34 -0800219#define MBEDTLS_ECP_C
220#define MBEDTLS_BIGNUM_C
221#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR */
222#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR */
223
224#if defined(PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY)
225#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800226#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
John Durkop07cc04a2020-11-16 22:08:34 -0800227#define MBEDTLS_ECP_C
228#define MBEDTLS_BIGNUM_C
229#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY */
230#endif /* PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY */
231
John Durkop9814fa22020-11-04 12:28:15 -0800232#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR)
John Durkop0e005192020-10-31 22:06:54 -0700233#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR)
John Durkopd62b6782020-11-30 21:06:05 -0800234#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR 1
John Durkop0e005192020-10-31 22:06:54 -0700235#define MBEDTLS_RSA_C
236#define MBEDTLS_BIGNUM_C
237#define MBEDTLS_OID_C
238#define MBEDTLS_GENPRIME
John Durkop07cc04a2020-11-16 22:08:34 -0800239#define MBEDTLS_PK_PARSE_C
240#define MBEDTLS_PK_WRITE_C
241#define MBEDTLS_PK_C
Ronald Crond98ec4b2021-04-28 18:28:46 +0200242#define MBEDTLS_ASN1_PARSE_C
243#define MBEDTLS_ASN1_WRITE_C
John Durkop0e005192020-10-31 22:06:54 -0700244#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR */
John Durkop9814fa22020-11-04 12:28:15 -0800245#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR */
246
247#if defined(PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkop0e005192020-10-31 22:06:54 -0700248#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800249#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
John Durkop0e005192020-10-31 22:06:54 -0700250#define MBEDTLS_RSA_C
251#define MBEDTLS_BIGNUM_C
252#define MBEDTLS_OID_C
John Durkop07cc04a2020-11-16 22:08:34 -0800253#define MBEDTLS_PK_PARSE_C
254#define MBEDTLS_PK_WRITE_C
255#define MBEDTLS_PK_C
Ronald Crond98ec4b2021-04-28 18:28:46 +0200256#define MBEDTLS_ASN1_PARSE_C
257#define MBEDTLS_ASN1_WRITE_C
John Durkop0e005192020-10-31 22:06:54 -0700258#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkop9814fa22020-11-04 12:28:15 -0800259#endif /* PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkopd0321952020-10-29 21:37:36 -0700260
David Brownb781f752021-02-08 15:44:52 -0700261/* If any of the block modes are requested that don't have an
262 * associated HW assist, define PSA_HAVE_SOFT_BLOCK_MODE for checking
263 * in the block cipher key types. */
264#if (defined(PSA_WANT_ALG_CTR) && !defined(MBEDTLS_PSA_ACCEL_ALG_CTR)) || \
Bence Szépkúti7921cce2021-02-17 11:46:50 +0100265 (defined(PSA_WANT_ALG_CFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_CFB)) || \
David Brownb781f752021-02-08 15:44:52 -0700266 (defined(PSA_WANT_ALG_OFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_OFB)) || \
David Brownb781f752021-02-08 15:44:52 -0700267 defined(PSA_WANT_ALG_ECB_NO_PADDING) || \
268 (defined(PSA_WANT_ALG_CBC_NO_PADDING) && \
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100269 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING)) || \
David Brownb781f752021-02-08 15:44:52 -0700270 (defined(PSA_WANT_ALG_CBC_PKCS7) && \
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100271 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7)) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100272 (defined(PSA_WANT_ALG_CMAC) && !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC))
David Brownb781f752021-02-08 15:44:52 -0700273#define PSA_HAVE_SOFT_BLOCK_MODE 1
274#endif
275
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100276#if (defined(PSA_WANT_ALG_GCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_GCM)) || \
277 (defined(PSA_WANT_ALG_CCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_CCM))
278#define PSA_HAVE_SOFT_BLOCK_AEAD 1
279#endif
280
David Brown94933082021-01-05 12:03:25 -0700281#if defined(PSA_WANT_KEY_TYPE_AES)
David Browne1f91f02021-02-09 15:56:22 -0700282#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_AES)
283#define PSA_HAVE_SOFT_KEY_TYPE_AES 1
284#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_AES */
285#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100286 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
287 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
David Brown78a429b2021-01-21 09:48:57 -0700288#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700289#define MBEDTLS_AES_C
David Browne1f91f02021-02-09 15:56:22 -0700290#endif /* PSA_HAVE_SOFT_KEY_TYPE_AES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown94933082021-01-05 12:03:25 -0700291#endif /* PSA_WANT_KEY_TYPE_AES */
292
David Brownec258cf2021-01-05 12:03:25 -0700293#if defined(PSA_WANT_KEY_TYPE_ARC4)
294#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ARC4)
David Brown78a429b2021-01-21 09:48:57 -0700295#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARC4 1
David Brownec258cf2021-01-05 12:03:25 -0700296#define MBEDTLS_ARC4_C
297#endif /*!MBEDTLS_PSA_ACCEL_KEY_TYPE_ARC4 */
298#endif /* PSA_WANT_KEY_TYPE_ARC4 */
299
Gilles Peskine0d3d7422021-10-08 15:48:16 +0200300#if defined(PSA_WANT_KEY_TYPE_ARIA)
301#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA)
302#define PSA_HAVE_SOFT_KEY_TYPE_ARIA 1
303#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA */
304#if defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
305 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
306 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
307#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
308#define MBEDTLS_ARIA_C
309#endif /* PSA_HAVE_SOFT_KEY_TYPE_ARIA || PSA_HAVE_SOFT_BLOCK_MODE */
310#endif /* PSA_WANT_KEY_TYPE_ARIA */
311
David Brown686e6e82021-01-05 12:03:25 -0700312#if defined(PSA_WANT_KEY_TYPE_CAMELLIA)
David Browne1f91f02021-02-09 15:56:22 -0700313#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA)
314#define PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA 1
315#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA */
316#if defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100317 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
318 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
David Brown78a429b2021-01-21 09:48:57 -0700319#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700320#define MBEDTLS_CAMELLIA_C
David Browne1f91f02021-02-09 15:56:22 -0700321#endif /* PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown686e6e82021-01-05 12:03:25 -0700322#endif /* PSA_WANT_KEY_TYPE_CAMELLIA */
323
David Brownb65a7f72021-01-15 12:04:09 -0700324#if defined(PSA_WANT_KEY_TYPE_DES)
David Browne1f91f02021-02-09 15:56:22 -0700325#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DES)
326#define PSA_HAVE_SOFT_KEY_TYPE_DES 1
327#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DES */
328#if defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
David Brownb781f752021-02-08 15:44:52 -0700329 defined(PSA_HAVE_SOFT_BLOCK_MODE)
David Brown78a429b2021-01-21 09:48:57 -0700330#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700331#define MBEDTLS_DES_C
David Browne1f91f02021-02-09 15:56:22 -0700332#endif /*PSA_HAVE_SOFT_KEY_TYPE_DES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brownb65a7f72021-01-15 12:04:09 -0700333#endif /* PSA_WANT_KEY_TYPE_DES */
334
David Brownb16727a2021-02-08 16:31:46 -0700335#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
336#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20)
337#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
338#define MBEDTLS_CHACHA20_C
339#endif /*!MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20 */
340#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
341
David Brownf84a0f62021-02-09 15:59:41 -0700342/* If any of the software block ciphers are selected, define
343 * PSA_HAVE_SOFT_BLOCK_CIPHER, which can be used in any of these
344 * situations. */
345#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine0d3d7422021-10-08 15:48:16 +0200346 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
David Brownf84a0f62021-02-09 15:59:41 -0700347 defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
348 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
349#define PSA_HAVE_SOFT_BLOCK_CIPHER 1
350#endif
351
David Brown99844272021-01-15 12:04:47 -0700352#if defined(PSA_WANT_ALG_STREAM_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700353#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brown99844272021-01-15 12:04:47 -0700354#endif /* PSA_WANT_ALG_STREAM_CIPHER */
355
Ronald Crond85e98d2021-03-25 15:32:32 +0100356#if defined(PSA_WANT_ALG_CBC_MAC)
357#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_MAC)
358#error "CBC-MAC is not yet supported via the PSA API in Mbed TLS."
359#define MBEDTLS_PSA_BUILTIN_ALG_CBC_MAC 1
360#endif /* !MBEDTLS_PSA_ACCEL_ALG_CBC_MAC */
361#endif /* PSA_WANT_ALG_CBC_MAC */
362
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100363#if defined(PSA_WANT_ALG_CMAC)
364#if !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC) || \
365 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
366#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
367#define MBEDTLS_CMAC_C
368#endif /* !MBEDTLS_PSA_ACCEL_ALG_CMAC */
369#endif /* PSA_WANT_ALG_CMAC */
370
David Brown99844272021-01-15 12:04:47 -0700371#if defined(PSA_WANT_ALG_CTR)
David Brown4b9ec7a2021-02-05 12:47:08 -0700372#if !defined(MBEDTLS_PSA_ACCEL_ALG_CTR) || \
David Brownf84a0f62021-02-09 15:59:41 -0700373 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700374#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700375#define MBEDTLS_CIPHER_MODE_CTR
David Brown4b9ec7a2021-02-05 12:47:08 -0700376#endif
David Brown99844272021-01-15 12:04:47 -0700377#endif /* PSA_WANT_ALG_CTR */
378
379#if defined(PSA_WANT_ALG_CFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700380#if !defined(MBEDTLS_PSA_ACCEL_ALG_CFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700381 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700382#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700383#define MBEDTLS_CIPHER_MODE_CFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700384#endif
David Brown99844272021-01-15 12:04:47 -0700385#endif /* PSA_WANT_ALG_CFB */
386
387#if defined(PSA_WANT_ALG_OFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700388#if !defined(MBEDTLS_PSA_ACCEL_ALG_OFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700389 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700390#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700391#define MBEDTLS_CIPHER_MODE_OFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700392#endif
David Brown99844272021-01-15 12:04:47 -0700393#endif /* PSA_WANT_ALG_OFB */
394
Gilles Peskinedbeaad32022-03-17 11:09:23 +0100395#if defined(PSA_WANT_ALG_ECB_NO_PADDING) && \
396 !defined(MBEDTLS_PSA_ACCEL_ALG_ECB_NO_PADDING)
David Brownbe380c12021-02-11 10:55:48 -0700397#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700398#endif
399
David Brown12f45f92021-01-26 11:50:36 -0700400#if defined(PSA_WANT_ALG_CBC_NO_PADDING)
David Brown4b9ec7a2021-02-05 12:47:08 -0700401#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING) || \
David Brownfc468182021-02-09 16:23:34 -0700402 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700403#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700404#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown4b9ec7a2021-02-05 12:47:08 -0700405#endif
David Brown12f45f92021-01-26 11:50:36 -0700406#endif /* PSA_WANT_ALG_CBC_NO_PADDING */
407
408#if defined(PSA_WANT_ALG_CBC_PKCS7)
David Brown4b9ec7a2021-02-05 12:47:08 -0700409#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7) || \
David Brownfc468182021-02-09 16:23:34 -0700410 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700411#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700412#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brownfc468182021-02-09 16:23:34 -0700413#define MBEDTLS_CIPHER_PADDING_PKCS7
David Brown4b9ec7a2021-02-05 12:47:08 -0700414#endif
David Brown12f45f92021-01-26 11:50:36 -0700415#endif /* PSA_WANT_ALG_CBC_PKCS7 */
416
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100417#if defined(PSA_WANT_ALG_CCM)
418#if !defined(MBEDTLS_PSA_ACCEL_ALG_CCM) || \
419 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine0d3d7422021-10-08 15:48:16 +0200420 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100421 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
422#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
423#define MBEDTLS_CCM_C
424#endif
425#endif /* PSA_WANT_ALG_CCM */
426
427#if defined(PSA_WANT_ALG_GCM)
428#if !defined(MBEDTLS_PSA_ACCEL_ALG_GCM) || \
429 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine0d3d7422021-10-08 15:48:16 +0200430 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100431 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
432#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
433#define MBEDTLS_GCM_C
434#endif
435#endif /* PSA_WANT_ALG_GCM */
436
David Brownac4fa072021-02-08 16:47:35 -0700437#if defined(PSA_WANT_ALG_CHACHA20_POLY1305)
Ronald Crond98ec4b2021-04-28 18:28:46 +0200438#if !defined(MBEDTLS_PSA_ACCEL_ALG_CHACHA20_POLY1305)
David Brownac4fa072021-02-08 16:47:35 -0700439#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
440#define MBEDTLS_CHACHAPOLY_C
Summer Qinaba50442022-06-17 12:50:32 +0800441#define MBEDTLS_CHACHA20_C
442#define MBEDTLS_POLY1305_C
David Brown86730a82021-02-09 16:24:11 -0700443#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700444#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
Ronald Crond98ec4b2021-04-28 18:28:46 +0200445#endif /* !MBEDTLS_PSA_ACCEL_ALG_CHACHA20_POLY1305 */
David Brownac4fa072021-02-08 16:47:35 -0700446#endif /* PSA_WANT_ALG_CHACHA20_POLY1305 */
447
David Browneed74df2021-03-15 15:53:57 -0600448#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_256)
449#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256)
450#define MBEDTLS_ECP_DP_BP256R1_ENABLED
451#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
452#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256 */
453#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_256 */
454
455#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_384)
456#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384)
457#define MBEDTLS_ECP_DP_BP384R1_ENABLED
458#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
459#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384 */
460#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_384 */
461
462#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_512)
463#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512)
464#define MBEDTLS_ECP_DP_BP512R1_ENABLED
465#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
466#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512 */
467#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_512 */
468
469#if defined(PSA_WANT_ECC_MONTGOMERY_255)
470#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255)
471#define MBEDTLS_ECP_DP_CURVE25519_ENABLED
472#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
473#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255 */
474#endif /* PSA_WANT_ECC_MONTGOMERY_255 */
475
476#if defined(PSA_WANT_ECC_MONTGOMERY_448)
477#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448)
Ronald Crone1f55162021-03-25 15:09:47 +0100478/*
479 * Curve448 is not yet supported via the PSA API in Mbed TLS
Dave Rodgman52af7692022-03-31 14:27:24 +0100480 * (https://github.com/Mbed-TLS/mbedtls/issues/4249).
Ronald Crone1f55162021-03-25 15:09:47 +0100481 */
482#error "Curve448 is not yet supported via the PSA API in Mbed TLS."
David Browneed74df2021-03-15 15:53:57 -0600483#define MBEDTLS_ECP_DP_CURVE448_ENABLED
484#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
485#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448 */
486#endif /* PSA_WANT_ECC_MONTGOMERY_448 */
487
David Brownc7b9b2b2021-02-19 21:05:52 -0700488#if defined(PSA_WANT_ECC_SECP_R1_192)
489#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192)
490#define MBEDTLS_ECP_DP_SECP192R1_ENABLED
491#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
492#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192 */
493#endif /* PSA_WANT_ECC_SECP_R1_192 */
494
495#if defined(PSA_WANT_ECC_SECP_R1_224)
496#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224)
497#define MBEDTLS_ECP_DP_SECP224R1_ENABLED
498#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
499#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224 */
500#endif /* PSA_WANT_ECC_SECP_R1_224 */
501
502#if defined(PSA_WANT_ECC_SECP_R1_256)
503#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256)
504#define MBEDTLS_ECP_DP_SECP256R1_ENABLED
505#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
506#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256 */
507#endif /* PSA_WANT_ECC_SECP_R1_256 */
508
509#if defined(PSA_WANT_ECC_SECP_R1_384)
510#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384)
511#define MBEDTLS_ECP_DP_SECP384R1_ENABLED
512#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
513#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384 */
514#endif /* PSA_WANT_ECC_SECP_R1_384 */
515
516#if defined(PSA_WANT_ECC_SECP_R1_521)
517#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521)
518#define MBEDTLS_ECP_DP_SECP521R1_ENABLED
519#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
520#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521 */
521#endif /* PSA_WANT_ECC_SECP_R1_521 */
522
523#if defined(PSA_WANT_ECC_SECP_K1_192)
524#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192)
David Brown8de143e2021-02-19 14:08:00 -0700525#define MBEDTLS_ECP_DP_SECP192K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700526#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
527#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192 */
528#endif /* PSA_WANT_ECC_SECP_K1_192 */
David Brown8de143e2021-02-19 14:08:00 -0700529
David Brownc7b9b2b2021-02-19 21:05:52 -0700530#if defined(PSA_WANT_ECC_SECP_K1_224)
531#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224)
Ronald Crone1f55162021-03-25 15:09:47 +0100532/*
533 * SECP224K1 is buggy via the PSA API in Mbed TLS
Dave Rodgman52af7692022-03-31 14:27:24 +0100534 * (https://github.com/Mbed-TLS/mbedtls/issues/3541).
Ronald Crone1f55162021-03-25 15:09:47 +0100535 */
536#error "SECP224K1 is buggy via the PSA API in Mbed TLS."
David Brown8de143e2021-02-19 14:08:00 -0700537#define MBEDTLS_ECP_DP_SECP224K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700538#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
539#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224 */
540#endif /* PSA_WANT_ECC_SECP_K1_224 */
David Brown8de143e2021-02-19 14:08:00 -0700541
David Brownc7b9b2b2021-02-19 21:05:52 -0700542#if defined(PSA_WANT_ECC_SECP_K1_256)
543#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256)
David Brown9b178de2021-03-10 13:14:48 -0700544#define MBEDTLS_ECP_DP_SECP256K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700545#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
546#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256 */
547#endif /* PSA_WANT_ECC_SECP_K1_256 */
David Brown8de143e2021-02-19 14:08:00 -0700548
Gilles Peskinecf70d072021-04-19 22:24:23 +0200549
550
551/****************************************************************/
552/* Infer PSA requirements from Mbed TLS capabilities */
553/****************************************************************/
554
John Durkop714e3a12020-09-29 22:07:04 -0700555#else /* MBEDTLS_PSA_CRYPTO_CONFIG */
556
557/*
558 * Ensure PSA_WANT_* defines are setup properly if MBEDTLS_PSA_CRYPTO_CONFIG
559 * is not defined
560 */
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100561
Ronald Cron3d471812021-03-18 13:40:31 +0100562#if defined(MBEDTLS_CCM_C)
563#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
564#define PSA_WANT_ALG_CCM 1
565#endif /* MBEDTLS_CCM_C */
566
567#if defined(MBEDTLS_CMAC_C)
568#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
569#define PSA_WANT_ALG_CMAC 1
570#endif /* MBEDTLS_CMAC_C */
571
John Durkopd62b6782020-11-30 21:06:05 -0800572#if defined(MBEDTLS_ECDH_C)
573#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
574#define PSA_WANT_ALG_ECDH 1
575#endif /* MBEDTLS_ECDH_C */
576
577#if defined(MBEDTLS_ECDSA_C)
578#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
579#define PSA_WANT_ALG_ECDSA 1
Gilles Peskinecf70d072021-04-19 22:24:23 +0200580#define PSA_WANT_ALG_ECDSA_ANY 1
John Durkopd62b6782020-11-30 21:06:05 -0800581
582// Only add in DETERMINISTIC support if ECDSA is also enabled
583#if defined(MBEDTLS_ECDSA_DETERMINISTIC)
584#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
585#define PSA_WANT_ALG_DETERMINISTIC_ECDSA 1
586#endif /* MBEDTLS_ECDSA_DETERMINISTIC */
587
588#endif /* MBEDTLS_ECDSA_C */
589
590#if defined(MBEDTLS_ECP_C)
591#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR 1
592#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR 1
593#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
594#define PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY 1
595#endif /* MBEDTLS_ECP_C */
596
Ronald Cron3d471812021-03-18 13:40:31 +0100597#if defined(MBEDTLS_GCM_C)
598#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
599#define PSA_WANT_ALG_GCM 1
600#endif /* MBEDTLS_GCM_C */
601
John Durkopd62b6782020-11-30 21:06:05 -0800602#if defined(MBEDTLS_HKDF_C)
603#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
604#define PSA_WANT_ALG_HMAC 1
605#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
606#define PSA_WANT_ALG_HKDF 1
607#endif /* MBEDTLS_HKDF_C */
608
609#if defined(MBEDTLS_MD_C)
610#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
611#define PSA_WANT_ALG_HMAC 1
Tom Cosgrove73285cc2023-09-01 13:07:39 +0100612#define PSA_WANT_KEY_TYPE_HMAC 1
John Durkopd62b6782020-11-30 21:06:05 -0800613#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
614#define PSA_WANT_ALG_TLS12_PRF 1
615#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
616#define PSA_WANT_ALG_TLS12_PSK_TO_MS 1
617#endif /* MBEDTLS_MD_C */
618
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100619#if defined(MBEDTLS_MD2_C)
620#define MBEDTLS_PSA_BUILTIN_ALG_MD2 1
621#define PSA_WANT_ALG_MD2 1
622#endif
623
624#if defined(MBEDTLS_MD4_C)
625#define MBEDTLS_PSA_BUILTIN_ALG_MD4 1
626#define PSA_WANT_ALG_MD4 1
627#endif
628
629#if defined(MBEDTLS_MD5_C)
630#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
631#define PSA_WANT_ALG_MD5 1
632#endif
633
634#if defined(MBEDTLS_RIPEMD160_C)
635#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
636#define PSA_WANT_ALG_RIPEMD160 1
637#endif
638
John Durkopd62b6782020-11-30 21:06:05 -0800639#if defined(MBEDTLS_RSA_C)
640#if defined(MBEDTLS_PKCS1_V15)
641#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
642#define PSA_WANT_ALG_RSA_PKCS1V15_CRYPT 1
643#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
644#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN 1
Gilles Peskinecf70d072021-04-19 22:24:23 +0200645#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW 1
Yuto Takano5b4caf22021-08-10 11:26:15 +0100646#endif /* MBEDTLS_PKCS1_V15 */
John Durkopd62b6782020-11-30 21:06:05 -0800647#if defined(MBEDTLS_PKCS1_V21)
648#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
649#define PSA_WANT_ALG_RSA_OAEP 1
650#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
651#define PSA_WANT_ALG_RSA_PSS 1
652#endif /* MBEDTLS_PKCS1_V21 */
653#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR 1
654#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR 1
655#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
656#define PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY 1
657#endif /* MBEDTLS_RSA_C */
658
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100659#if defined(MBEDTLS_SHA1_C)
660#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
661#define PSA_WANT_ALG_SHA_1 1
662#endif
663
664#if defined(MBEDTLS_SHA256_C)
665#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
666#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
Gilles Peskineb65db072021-01-12 00:00:53 +0100667#define PSA_WANT_ALG_SHA_224 1
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100668#define PSA_WANT_ALG_SHA_256 1
669#endif
670
671#if defined(MBEDTLS_SHA512_C)
672#if !defined(MBEDTLS_SHA512_NO_SHA384)
673#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
674#define PSA_WANT_ALG_SHA_384 1
675#endif
676#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
677#define PSA_WANT_ALG_SHA_512 1
678#endif
679
David Brown94933082021-01-05 12:03:25 -0700680#if defined(MBEDTLS_AES_C)
681#define PSA_WANT_KEY_TYPE_AES 1
David Brownda7dbb72021-01-26 11:44:15 -0700682#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700683#endif
684
David Brownec258cf2021-01-05 12:03:25 -0700685#if defined(MBEDTLS_ARC4_C)
686#define PSA_WANT_KEY_TYPE_ARC4 1
David Brown99844272021-01-15 12:04:47 -0700687#define PSA_WANT_ALG_STREAM_CIPHER 1
David Brownda7dbb72021-01-26 11:44:15 -0700688#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARC4 1
David Brown12f45f92021-01-26 11:50:36 -0700689#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brownec258cf2021-01-05 12:03:25 -0700690#endif
691
Gilles Peskine0d3d7422021-10-08 15:48:16 +0200692#if defined(MBEDTLS_ARIA_C)
693#define PSA_WANT_KEY_TYPE_ARIA 1
694#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
695#endif
696
David Brown686e6e82021-01-05 12:03:25 -0700697#if defined(MBEDTLS_CAMELLIA_C)
698#define PSA_WANT_KEY_TYPE_CAMELLIA 1
David Brownda7dbb72021-01-26 11:44:15 -0700699#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700700#endif
701
David Brownb65a7f72021-01-15 12:04:09 -0700702#if defined(MBEDTLS_DES_C)
703#define PSA_WANT_KEY_TYPE_DES 1
David Brownda7dbb72021-01-26 11:44:15 -0700704#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700705#endif
706
David Brownb16727a2021-02-08 16:31:46 -0700707#if defined(MBEDTLS_CHACHA20_C)
708#define PSA_WANT_KEY_TYPE_CHACHA20 1
709#define PSA_WANT_ALG_STREAM_CIPHER 1
710#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
711#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brownac4fa072021-02-08 16:47:35 -0700712#if defined(MBEDTLS_CHACHAPOLY_C)
713#define PSA_WANT_ALG_CHACHA20_POLY1305 1
David Brown86730a82021-02-09 16:24:11 -0700714#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700715#endif
David Brownb16727a2021-02-08 16:31:46 -0700716#endif
717
David Brown99844272021-01-15 12:04:47 -0700718#if defined(MBEDTLS_CIPHER_MODE_CBC)
David Brown10cb81c2021-02-09 16:10:29 -0700719#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700720#define PSA_WANT_ALG_CBC_NO_PADDING 1
721#if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
David Brown12f45f92021-01-26 11:50:36 -0700722#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brown99844272021-01-15 12:04:47 -0700723#define PSA_WANT_ALG_CBC_PKCS7 1
724#endif
725#endif
726
727#if defined(MBEDTLS_AES_C) || defined(MBEDTLS_DES_C) || \
Gilles Peskine0d3d7422021-10-08 15:48:16 +0200728 defined(MBEDTLS_ARIA_C) || defined(MBEDTLS_CAMELLIA_C)
David Brown10cb81c2021-02-09 16:10:29 -0700729#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700730#define PSA_WANT_ALG_ECB_NO_PADDING 1
731#endif
732
733#if defined(MBEDTLS_CIPHER_MODE_CFB)
David Brown12f45f92021-01-26 11:50:36 -0700734#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700735#define PSA_WANT_ALG_CFB 1
736#endif
737
738#if defined(MBEDTLS_CIPHER_MODE_CTR)
David Brown12f45f92021-01-26 11:50:36 -0700739#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700740#define PSA_WANT_ALG_CTR 1
741#endif
742
743#if defined(MBEDTLS_CIPHER_MODE_OFB)
David Brown12f45f92021-01-26 11:50:36 -0700744#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700745#define PSA_WANT_ALG_OFB 1
746#endif
747
David Browneed74df2021-03-15 15:53:57 -0600748#if defined(MBEDTLS_ECP_DP_BP256R1_ENABLED)
749#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
Tom Cosgrove73285cc2023-09-01 13:07:39 +0100750#define PSA_WANT_ECC_BRAINPOOL_P_R1_256 1
David Browneed74df2021-03-15 15:53:57 -0600751#endif
752
753#if defined(MBEDTLS_ECP_DP_BP384R1_ENABLED)
754#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
Tom Cosgrove73285cc2023-09-01 13:07:39 +0100755#define PSA_WANT_ECC_BRAINPOOL_P_R1_384 1
David Browneed74df2021-03-15 15:53:57 -0600756#endif
757
758#if defined(MBEDTLS_ECP_DP_BP512R1_ENABLED)
759#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
Tom Cosgrove73285cc2023-09-01 13:07:39 +0100760#define PSA_WANT_ECC_BRAINPOOL_P_R1_512 1
David Browneed74df2021-03-15 15:53:57 -0600761#endif
762
763#if defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED)
764#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
Tom Cosgrove73285cc2023-09-01 13:07:39 +0100765#define PSA_WANT_ECC_MONTGOMERY_255 1
David Browneed74df2021-03-15 15:53:57 -0600766#endif
767
Dave Rodgman52af7692022-03-31 14:27:24 +0100768/* Curve448 is not yet supported via the PSA API (https://github.com/Mbed-TLS/mbedtls/issues/4249) */
Gilles Peskine82769862021-03-23 12:06:16 +0100769#if 0 && defined(MBEDTLS_ECP_DP_CURVE448_ENABLED)
David Browneed74df2021-03-15 15:53:57 -0600770#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
Tom Cosgrove73285cc2023-09-01 13:07:39 +0100771#define PSA_WANT_ECC_MONTGOMERY_448 1
David Browneed74df2021-03-15 15:53:57 -0600772#endif
773
David Brown8de143e2021-02-19 14:08:00 -0700774#if defined(MBEDTLS_ECP_DP_SECP192R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700775#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
Tom Cosgrove73285cc2023-09-01 13:07:39 +0100776#define PSA_WANT_ECC_SECP_R1_192 1
David Brown8de143e2021-02-19 14:08:00 -0700777#endif
778
779#if defined(MBEDTLS_ECP_DP_SECP224R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700780#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
Tom Cosgrove73285cc2023-09-01 13:07:39 +0100781#define PSA_WANT_ECC_SECP_R1_224 1
David Brown8de143e2021-02-19 14:08:00 -0700782#endif
783
784#if defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700785#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
Tom Cosgrove73285cc2023-09-01 13:07:39 +0100786#define PSA_WANT_ECC_SECP_R1_256 1
David Brown8de143e2021-02-19 14:08:00 -0700787#endif
788
789#if defined(MBEDTLS_ECP_DP_SECP384R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700790#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
Tom Cosgrove73285cc2023-09-01 13:07:39 +0100791#define PSA_WANT_ECC_SECP_R1_384 1
David Brown8de143e2021-02-19 14:08:00 -0700792#endif
793
794#if defined(MBEDTLS_ECP_DP_SECP521R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700795#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
Tom Cosgrove73285cc2023-09-01 13:07:39 +0100796#define PSA_WANT_ECC_SECP_R1_521 1
David Brown8de143e2021-02-19 14:08:00 -0700797#endif
798
799#if defined(MBEDTLS_ECP_DP_SECP192K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700800#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
Tom Cosgrove73285cc2023-09-01 13:07:39 +0100801#define PSA_WANT_ECC_SECP_K1_192 1
David Brown8de143e2021-02-19 14:08:00 -0700802#endif
803
Dave Rodgman52af7692022-03-31 14:27:24 +0100804/* SECP224K1 is buggy via the PSA API (https://github.com/Mbed-TLS/mbedtls/issues/3541) */
Gilles Peskine39841302021-03-23 12:06:45 +0100805#if 0 && defined(MBEDTLS_ECP_DP_SECP224K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700806#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
Tom Cosgrove73285cc2023-09-01 13:07:39 +0100807#define PSA_WANT_ECC_SECP_K1_224 1
David Brown8de143e2021-02-19 14:08:00 -0700808#endif
809
David Brown9b178de2021-03-10 13:14:48 -0700810#if defined(MBEDTLS_ECP_DP_SECP256K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700811#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
Tom Cosgrove73285cc2023-09-01 13:07:39 +0100812#define PSA_WANT_ECC_SECP_K1_256 1
David Brown8de143e2021-02-19 14:08:00 -0700813#endif
814
John Durkop2dfaf9c2020-09-24 04:30:10 -0700815#endif /* MBEDTLS_PSA_CRYPTO_CONFIG */
John Durkopd8959392020-09-20 23:09:17 -0700816
Gilles Peskine60b29fe2021-02-16 14:06:50 +0100817/* These features are always enabled. */
818#define PSA_WANT_KEY_TYPE_DERIVE 1
819#define PSA_WANT_KEY_TYPE_RAW_DATA 1
820
John Durkop6e33dbe2020-09-17 21:15:13 -0700821#ifdef __cplusplus
822}
823#endif
824
825#endif /* MBEDTLS_CONFIG_PSA_H */