Crypto: Add missing key derivation APIs in the interface

Following APIs are in psa/crypto.h hence they need to be linkable
by partitions/applications:

* psa_key_derivation_input_integer
* psa_key_derivation_verify_bytes
* psa_key_derivation_verify_key

Only psa_key_derivation_input_integer is currently implemented by
Mbed TLS 3.5.0 as the PSA Crypto backend hence it's the only one
requiring full plumbing from interface through service up to the
Crypto backend library call.

Signed-off-by: Summer Qin <summer.qin@arm.com>
Change-Id: I69f262e5a95e04935c8bec05b0b6b509f4b65ad4
diff --git a/interface/src/tfm_crypto_api.c b/interface/src/tfm_crypto_api.c
index 8c85732..d7e693e 100644
--- a/interface/src/tfm_crypto_api.c
+++ b/interface/src/tfm_crypto_api.c
@@ -1656,3 +1656,39 @@
 
     return API_DISPATCH(in_vec, out_vec);
 }
+
+TFM_CRYPTO_API(psa_status_t, psa_key_derivation_input_integer)(
+                                      psa_key_derivation_operation_t *operation,
+                                      psa_key_derivation_step_t step,
+                                      uint64_t value)
+{
+    struct tfm_crypto_pack_iovec iov = {
+        .function_id = TFM_CRYPTO_KEY_DERIVATION_INPUT_INTEGER_SID,
+        .step = step,
+        .value = value,
+        .op_handle = operation->handle,
+    };
+
+    psa_invec in_vec[] = {
+        {.base = &iov, .len = sizeof(struct tfm_crypto_pack_iovec)},
+    };
+
+    return API_DISPATCH_NO_OUTVEC(in_vec);
+}
+
+TFM_CRYPTO_API(psa_status_t, psa_key_derivation_verify_bytes)(
+                                      psa_key_derivation_operation_t *operation,
+                                      const uint8_t *expected_output,
+                                      size_t output_length)
+{
+    /* To be implemented when the PSA backend supports it */
+    return PSA_ERROR_NOT_SUPPORTED;
+}
+
+TFM_CRYPTO_API(psa_status_t, psa_key_derivation_verify_key)(
+                                      psa_key_derivation_operation_t *operation,
+                                      psa_key_id_t expected)
+{
+    /* To be implemented when the PSA backend supports it */
+    return PSA_ERROR_NOT_SUPPORTED;
+}