blob: 9d68a3428f8a667938913bcf83b71a45f2dbb9ae [file] [log] [blame]
John Durkop6e33dbe2020-09-17 21:15:13 -07001/**
2 * \file mbedtls/config_psa.h
3 * \brief PSA crypto configuration options (set of defines)
4 *
John Durkop34818822020-10-12 21:36:22 -07005 * This set of compile-time options takes settings defined in
Bence Szépkútibb0cfeb2021-05-28 09:42:25 +02006 * include/mbedtls/mbedtls_config.h and include/psa/crypto_config.h and uses
John Durkop34818822020-10-12 21:36:22 -07007 * those definitions to define symbols used in the library code.
8 *
9 * Users and integrators should not edit this file, please edit
Tom Cosgrove1797b052022-12-04 17:19:59 +000010 * include/mbedtls/mbedtls_config.h for MBEDTLS_XXX settings or
John Durkop34818822020-10-12 21:36:22 -070011 * include/psa/crypto_config.h for PSA_WANT_XXX settings.
John Durkop6e33dbe2020-09-17 21:15:13 -070012 */
13/*
14 * Copyright The Mbed TLS Contributors
15 * SPDX-License-Identifier: Apache-2.0
16 *
17 * Licensed under the Apache License, Version 2.0 (the "License"); you may
18 * not use this file except in compliance with the License.
19 * You may obtain a copy of the License at
20 *
21 * http://www.apache.org/licenses/LICENSE-2.0
22 *
23 * Unless required by applicable law or agreed to in writing, software
24 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
25 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
26 * See the License for the specific language governing permissions and
27 * limitations under the License.
28 */
29
30#ifndef MBEDTLS_CONFIG_PSA_H
31#define MBEDTLS_CONFIG_PSA_H
32
Valerio Settib7ef51a2023-06-06 14:32:58 +020033#include "psa/crypto_legacy.h"
34
Gilles Peskine1231eb52021-04-19 22:24:23 +020035
36
37/****************************************************************/
38/* De facto synonyms */
39/****************************************************************/
40
41#if defined(PSA_WANT_ALG_ECDSA_ANY) && !defined(PSA_WANT_ALG_ECDSA)
42#define PSA_WANT_ALG_ECDSA PSA_WANT_ALG_ECDSA_ANY
43#elif !defined(PSA_WANT_ALG_ECDSA_ANY) && defined(PSA_WANT_ALG_ECDSA)
44#define PSA_WANT_ALG_ECDSA_ANY PSA_WANT_ALG_ECDSA
45#endif
46
Gilles Peskine08622b62022-03-15 16:40:59 +010047#if defined(PSA_WANT_ALG_CCM_STAR_NO_TAG) && !defined(PSA_WANT_ALG_CCM)
48#define PSA_WANT_ALG_CCM PSA_WANT_ALG_CCM_STAR_NO_TAG
49#elif !defined(PSA_WANT_ALG_CCM_STAR_NO_TAG) && defined(PSA_WANT_ALG_CCM)
50#define PSA_WANT_ALG_CCM_STAR_NO_TAG PSA_WANT_ALG_CCM
51#endif
52
Gilles Peskine1231eb52021-04-19 22:24:23 +020053#if defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW) && !defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
54#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW
55#elif !defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW) && defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
56#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW PSA_WANT_ALG_RSA_PKCS1V15_SIGN
57#endif
58
Gilles Peskine44c96aa2021-10-04 18:33:56 +020059#if defined(PSA_WANT_ALG_RSA_PSS_ANY_SALT) && !defined(PSA_WANT_ALG_RSA_PSS)
60#define PSA_WANT_ALG_RSA_PSS PSA_WANT_ALG_RSA_PSS_ANY_SALT
61#elif !defined(PSA_WANT_ALG_RSA_PSS_ANY_SALT) && defined(PSA_WANT_ALG_RSA_PSS)
62#define PSA_WANT_ALG_RSA_PSS_ANY_SALT PSA_WANT_ALG_RSA_PSS
63#endif
64
Gilles Peskine1231eb52021-04-19 22:24:23 +020065
Manuel Pégourié-Gonnard235a9332023-03-14 18:01:23 +010066/****************************************************************/
67/* Hashes that are built in are also enabled in PSA.
68 * This simplifies dependency declarations especially
69 * for modules that obey MBEDTLS_USE_PSA_CRYPTO. */
70/****************************************************************/
71
72#if defined(MBEDTLS_MD5_C)
73#define PSA_WANT_ALG_MD5 1
74#endif
75
76#if defined(MBEDTLS_RIPEMD160_C)
77#define PSA_WANT_ALG_RIPEMD160 1
78#endif
79
80#if defined(MBEDTLS_SHA1_C)
81#define PSA_WANT_ALG_SHA_1 1
82#endif
83
84#if defined(MBEDTLS_SHA224_C)
85#define PSA_WANT_ALG_SHA_224 1
86#endif
87
88#if defined(MBEDTLS_SHA256_C)
89#define PSA_WANT_ALG_SHA_256 1
90#endif
91
92#if defined(MBEDTLS_SHA384_C)
93#define PSA_WANT_ALG_SHA_384 1
94#endif
95
96#if defined(MBEDTLS_SHA512_C)
97#define PSA_WANT_ALG_SHA_512 1
98#endif
99
Gilles Peskine1231eb52021-04-19 22:24:23 +0200100
101/****************************************************************/
102/* Require built-in implementations based on PSA requirements */
103/****************************************************************/
104
John Durkop2dfaf9c2020-09-24 04:30:10 -0700105#if defined(MBEDTLS_PSA_CRYPTO_CONFIG)
John Durkopd8959392020-09-20 23:09:17 -0700106
John Durkopd62b6782020-11-30 21:06:05 -0800107#if defined(PSA_WANT_ALG_DETERMINISTIC_ECDSA)
108#if !defined(MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA)
109#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
110#define MBEDTLS_ECDSA_DETERMINISTIC
111#define MBEDTLS_ECDSA_C
112#define MBEDTLS_HMAC_DRBG_C
113#define MBEDTLS_MD_C
114#endif /* !MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA */
115#endif /* PSA_WANT_ALG_DETERMINISTIC_ECDSA */
116
117#if defined(PSA_WANT_ALG_ECDH)
118#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDH)
119#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
120#define MBEDTLS_ECDH_C
121#define MBEDTLS_ECP_C
122#define MBEDTLS_BIGNUM_C
123#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDH */
124#endif /* PSA_WANT_ALG_ECDH */
125
126#if defined(PSA_WANT_ALG_ECDSA)
127#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDSA)
128#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
129#define MBEDTLS_ECDSA_C
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200130#define MBEDTLS_ECP_C
131#define MBEDTLS_BIGNUM_C
132#define MBEDTLS_ASN1_PARSE_C
133#define MBEDTLS_ASN1_WRITE_C
John Durkopd62b6782020-11-30 21:06:05 -0800134#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDSA */
135#endif /* PSA_WANT_ALG_ECDSA */
136
Przemek Stekiel84ee3e22022-12-01 14:22:34 +0100137#if defined(PSA_WANT_ALG_FFDH)
138#if !defined(MBEDTLS_PSA_ACCEL_ALG_FFDH)
139#define MBEDTLS_PSA_BUILTIN_ALG_FFDH 1
Przemek Stekiel84ee3e22022-12-01 14:22:34 +0100140#define MBEDTLS_BIGNUM_C
141#endif /* !MBEDTLS_PSA_ACCEL_ALG_FFDH */
142#endif /* PSA_WANT_ALG_FFDH */
143
John Durkopd62b6782020-11-30 21:06:05 -0800144#if defined(PSA_WANT_ALG_HKDF)
145#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF)
146#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
147#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
148#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF */
149#endif /* PSA_WANT_ALG_HKDF */
150
Przemek Stekiel3e8249c2022-06-03 14:05:07 +0200151#if defined(PSA_WANT_ALG_HKDF_EXTRACT)
152#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF_EXTRACT)
153#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
154#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXTRACT 1
155#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF_EXTRACT */
156#endif /* PSA_WANT_ALG_HKDF_EXTRACT */
157
158#if defined(PSA_WANT_ALG_HKDF_EXPAND)
159#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF_EXPAND)
160#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
161#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXPAND 1
162#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF_EXPAND */
163#endif /* PSA_WANT_ALG_HKDF_EXPAND */
164
John Durkopd62b6782020-11-30 21:06:05 -0800165#if defined(PSA_WANT_ALG_HMAC)
166#if !defined(MBEDTLS_PSA_ACCEL_ALG_HMAC)
167#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
168#endif /* !MBEDTLS_PSA_ACCEL_ALG_HMAC */
169#endif /* PSA_WANT_ALG_HMAC */
170
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100171#if defined(PSA_WANT_ALG_MD5) && !defined(MBEDTLS_PSA_ACCEL_ALG_MD5)
172#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
173#define MBEDTLS_MD5_C
174#endif
175
Neil Armstronga557cb82022-06-10 08:58:32 +0200176#if defined(PSA_WANT_ALG_JPAKE)
Przemek Stekiel4aa99402023-02-27 13:00:57 +0100177#if !defined(MBEDTLS_PSA_ACCEL_ALG_JPAKE)
Neil Armstrong637d0a02022-05-25 11:28:22 +0200178#define MBEDTLS_PSA_BUILTIN_PAKE 1
Neil Armstronga557cb82022-06-10 08:58:32 +0200179#define MBEDTLS_PSA_BUILTIN_ALG_JPAKE 1
Neil Armstronged407822022-06-15 11:21:33 +0200180#define MBEDTLS_ECP_DP_SECP256R1_ENABLED
Neil Armstrong637d0a02022-05-25 11:28:22 +0200181#define MBEDTLS_BIGNUM_C
182#define MBEDTLS_ECP_C
Neil Armstrong637d0a02022-05-25 11:28:22 +0200183#define MBEDTLS_ECJPAKE_C
Przemek Stekiel4aa99402023-02-27 13:00:57 +0100184#endif /* MBEDTLS_PSA_ACCEL_ALG_JPAKE */
Neil Armstronga557cb82022-06-10 08:58:32 +0200185#endif /* PSA_WANT_ALG_JPAKE */
Neil Armstrong637d0a02022-05-25 11:28:22 +0200186
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100187#if defined(PSA_WANT_ALG_RIPEMD160) && !defined(MBEDTLS_PSA_ACCEL_ALG_RIPEMD160)
188#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
189#define MBEDTLS_RIPEMD160_C
190#endif
191
John Durkopd62b6782020-11-30 21:06:05 -0800192#if defined(PSA_WANT_ALG_RSA_OAEP)
193#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP)
194#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
195#define MBEDTLS_RSA_C
196#define MBEDTLS_BIGNUM_C
197#define MBEDTLS_OID_C
198#define MBEDTLS_PKCS1_V21
John Durkopd62b6782020-11-30 21:06:05 -0800199#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP */
200#endif /* PSA_WANT_ALG_RSA_OAEP */
201
202#if defined(PSA_WANT_ALG_RSA_PKCS1V15_CRYPT)
203#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT)
204#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
205#define MBEDTLS_RSA_C
206#define MBEDTLS_BIGNUM_C
207#define MBEDTLS_OID_C
208#define MBEDTLS_PKCS1_V15
209#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT */
210#endif /* PSA_WANT_ALG_RSA_PKCS1V15_CRYPT */
211
212#if defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
213#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN)
214#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
215#define MBEDTLS_RSA_C
216#define MBEDTLS_BIGNUM_C
217#define MBEDTLS_OID_C
218#define MBEDTLS_PKCS1_V15
John Durkopd62b6782020-11-30 21:06:05 -0800219#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN */
220#endif /* PSA_WANT_ALG_RSA_PKCS1V15_SIGN */
221
222#if defined(PSA_WANT_ALG_RSA_PSS)
223#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PSS)
224#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
225#define MBEDTLS_RSA_C
226#define MBEDTLS_BIGNUM_C
227#define MBEDTLS_OID_C
228#define MBEDTLS_PKCS1_V21
John Durkopd62b6782020-11-30 21:06:05 -0800229#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PSS */
230#endif /* PSA_WANT_ALG_RSA_PSS */
231
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100232#if defined(PSA_WANT_ALG_SHA_1) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_1)
233#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
234#define MBEDTLS_SHA1_C
235#endif
236
237#if defined(PSA_WANT_ALG_SHA_224) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_224)
238#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200239#define MBEDTLS_SHA224_C
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100240#endif
241
242#if defined(PSA_WANT_ALG_SHA_256) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_256)
243#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
244#define MBEDTLS_SHA256_C
245#endif
246
247#if defined(PSA_WANT_ALG_SHA_384) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_384)
248#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200249#define MBEDTLS_SHA384_C
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100250#endif
251
252#if defined(PSA_WANT_ALG_SHA_512) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_512)
253#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
254#define MBEDTLS_SHA512_C
255#endif
256
Kusumit Ghoderao83baf892023-05-03 11:42:29 +0530257#if defined(PSA_WANT_ALG_PBKDF2_HMAC)
258#if !defined(MBEDTLS_PSA_ACCEL_ALG_PBKDF2_HMAC)
259#define MBEDTLS_PSA_BUILTIN_ALG_PBKDF2_HMAC 1
Kusumit Ghoderao105f7722023-07-27 21:03:06 +0530260#define PSA_HAVE_SOFT_PBKDF2_HMAC
Kusumit Ghoderaob9410e82023-05-03 18:36:35 +0530261#if !defined(MBEDTLS_PSA_ACCEL_ALG_HMAC)
Kusumit Ghoderao83baf892023-05-03 11:42:29 +0530262#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
Kusumit Ghoderaob9410e82023-05-03 18:36:35 +0530263#endif /* !MBEDTLS_PSA_ACCEL_ALG_HMAC */
Kusumit Ghoderao83baf892023-05-03 11:42:29 +0530264#endif /* !MBEDTLS_PSA_BUILTIN_ALG_PBKDF2_HMAC */
265#endif /* PSA_WANT_ALG_PBKDF2_HMAC */
266
John Durkop07cc04a2020-11-16 22:08:34 -0800267#if defined(PSA_WANT_ALG_TLS12_PRF)
268#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF)
John Durkopd62b6782020-11-30 21:06:05 -0800269#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
John Durkop07cc04a2020-11-16 22:08:34 -0800270#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF */
271#endif /* PSA_WANT_ALG_TLS12_PRF */
272
273#if defined(PSA_WANT_ALG_TLS12_PSK_TO_MS)
274#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS)
John Durkopd62b6782020-11-30 21:06:05 -0800275#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
John Durkop07cc04a2020-11-16 22:08:34 -0800276#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS */
277#endif /* PSA_WANT_ALG_TLS12_PSK_TO_MS */
278
Andrzej Kurek08d34b82022-07-29 10:00:16 -0400279#if defined(PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS)
280#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_ECJPAKE_TO_PMS)
281#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_ECJPAKE_TO_PMS 1
282#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_ECJPAKE_TO_PMS */
283#endif /* PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS */
284
Valerio Setti4520a8f2023-06-13 12:34:12 +0200285#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200286#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200287#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_IMPORT)
288#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_IMPORT 1
289#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_IMPORT */
290#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT */
291
292#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200293#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200294#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_EXPORT)
295#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_EXPORT 1
296#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_EXPORT */
297#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT */
298
299#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200300#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200301#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_GENERATE)
302#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_GENERATE 1
303#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_GENERATE */
304#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE */
305
306#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200307#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200308#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_DERIVE)
309#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_DERIVE 1
310#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_DERIVE */
311#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE */
312
Valerio Setti01cc88a2023-06-15 11:53:08 +0200313#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC)
Valerio Settiaac957b2023-06-09 16:59:00 +0200314#define PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200315#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_BASIC)
316#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
317#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_BASIC */
318#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC */
John Durkop07cc04a2020-11-16 22:08:34 -0800319
Valerio Setti4520a8f2023-06-13 12:34:12 +0200320#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_IMPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200321#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200322#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_IMPORT)
323#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_IMPORT 1
324#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_IMPORT */
325#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_IMPORT */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200326
Valerio Setti4520a8f2023-06-13 12:34:12 +0200327#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_EXPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200328#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200329#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_EXPORT)
330#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_EXPORT 1
331#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_EXPORT */
332#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_EXPORT */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200333
Valerio Setti4520a8f2023-06-13 12:34:12 +0200334#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_GENERATE)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200335#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200336#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_GENERATE)
337#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_GENERATE 1
338#define MBEDTLS_GENPRIME
339#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_GENERATE */
340#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_GENERATE */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200341
Valerio Setti01cc88a2023-06-15 11:53:08 +0200342#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC)
Valerio Settiaac957b2023-06-09 16:59:00 +0200343#define PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200344#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_BASIC)
345#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
346#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_BASIC */
347#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200348
Valerio Setti4520a8f2023-06-13 12:34:12 +0200349#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_IMPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200350#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200351#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_IMPORT)
352#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_IMPORT 1
353#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_IMPORT */
354#endif /* PSA_WANT_KEY_TYPE_DH_KEY_PAIR_IMPORT */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200355
Valerio Setti4520a8f2023-06-13 12:34:12 +0200356#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_EXPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200357#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200358#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_EXPORT)
359#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT 1
360#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_EXPORT */
361#endif /* PSA_WANT_KEY_TYPE_DH_KEY_PAIR_EXPORT */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200362
Valerio Setti4520a8f2023-06-13 12:34:12 +0200363#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_GENERATE)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200364#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200365#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_GENERATE)
366#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE 1
367#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_GENERATE */
368#endif /* PSA_WANT_KEY_TYPE_DH_KEY_PAIR_GENERATE */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200369
Valerio Setti01cc88a2023-06-15 11:53:08 +0200370#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC)
Valerio Settiaac957b2023-06-09 16:59:00 +0200371#define PSA_WANT_KEY_TYPE_DH_PUBLIC_KEY 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200372#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_BASIC)
373#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_BASIC 1
374#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_BASIC */
375#endif /* PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200376
John Durkop07cc04a2020-11-16 22:08:34 -0800377#if defined(PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY)
378#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800379#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
John Durkop07cc04a2020-11-16 22:08:34 -0800380#define MBEDTLS_ECP_C
381#define MBEDTLS_BIGNUM_C
382#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY */
383#endif /* PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY */
384
Przemek Stekiel6d85afa2023-04-28 11:42:17 +0200385#if defined(PSA_WANT_KEY_TYPE_DH_PUBLIC_KEY)
386#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_PUBLIC_KEY)
387#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY 1
Przemek Stekiel87d9a4a2022-12-15 13:22:11 +0100388#define MBEDTLS_BIGNUM_C
Przemek Stekiel6d85afa2023-04-28 11:42:17 +0200389#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_PUBLIC_KEY */
390#endif /* PSA_WANT_KEY_TYPE_DH_PUBLIC_KEY */
Przemek Stekiel87d9a4a2022-12-15 13:22:11 +0100391
John Durkop9814fa22020-11-04 12:28:15 -0800392#if defined(PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkop0e005192020-10-31 22:06:54 -0700393#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800394#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
John Durkop0e005192020-10-31 22:06:54 -0700395#define MBEDTLS_RSA_C
396#define MBEDTLS_BIGNUM_C
397#define MBEDTLS_OID_C
John Durkop07cc04a2020-11-16 22:08:34 -0800398#define MBEDTLS_PK_PARSE_C
399#define MBEDTLS_PK_WRITE_C
400#define MBEDTLS_PK_C
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200401#define MBEDTLS_ASN1_PARSE_C
402#define MBEDTLS_ASN1_WRITE_C
John Durkop0e005192020-10-31 22:06:54 -0700403#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkop9814fa22020-11-04 12:28:15 -0800404#endif /* PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkopd0321952020-10-29 21:37:36 -0700405
David Brownb781f752021-02-08 15:44:52 -0700406/* If any of the block modes are requested that don't have an
407 * associated HW assist, define PSA_HAVE_SOFT_BLOCK_MODE for checking
408 * in the block cipher key types. */
409#if (defined(PSA_WANT_ALG_CTR) && !defined(MBEDTLS_PSA_ACCEL_ALG_CTR)) || \
Bence Szépkúti7921cce2021-02-17 11:46:50 +0100410 (defined(PSA_WANT_ALG_CFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_CFB)) || \
David Brownb781f752021-02-08 15:44:52 -0700411 (defined(PSA_WANT_ALG_OFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_OFB)) || \
David Brownb781f752021-02-08 15:44:52 -0700412 defined(PSA_WANT_ALG_ECB_NO_PADDING) || \
413 (defined(PSA_WANT_ALG_CBC_NO_PADDING) && \
Gilles Peskine449bd832023-01-11 14:50:10 +0100414 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING)) || \
David Brownb781f752021-02-08 15:44:52 -0700415 (defined(PSA_WANT_ALG_CBC_PKCS7) && \
Gilles Peskine449bd832023-01-11 14:50:10 +0100416 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7)) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100417 (defined(PSA_WANT_ALG_CMAC) && !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC))
David Brownb781f752021-02-08 15:44:52 -0700418#define PSA_HAVE_SOFT_BLOCK_MODE 1
419#endif
420
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100421#if (defined(PSA_WANT_ALG_GCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_GCM)) || \
422 (defined(PSA_WANT_ALG_CCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_CCM))
423#define PSA_HAVE_SOFT_BLOCK_AEAD 1
424#endif
425
Kusumit Ghoderaoc22affd2023-07-28 13:31:58 +0530426#if defined(PSA_WANT_ALG_PBKDF2_AES_CMAC_PRF_128)
427#if !defined(MBEDTLS_PSA_ACCEL_ALG_PBKDF2_AES_CMAC_PRF_128)
428#define MBEDTLS_PSA_BUILTIN_ALG_PBKDF2_AES_CMAC_PRF_128 1
429#define PSA_HAVE_SOFT_PBKDF2_CMAC
430#endif /* !MBEDTLS_PSA_ACCEL_ALG_PBKDF2_AES_CMAC_PRF_128 */
431#endif /* PSA_WANT_ALG_PBKDF2_AES_CMAC_PRF_128 */
432
David Brown94933082021-01-05 12:03:25 -0700433#if defined(PSA_WANT_KEY_TYPE_AES)
David Browne1f91f02021-02-09 15:56:22 -0700434#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_AES)
435#define PSA_HAVE_SOFT_KEY_TYPE_AES 1
436#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_AES */
437#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100438 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
Kusumit Ghoderaoc22affd2023-07-28 13:31:58 +0530439 defined(PSA_HAVE_SOFT_BLOCK_AEAD) || \
440 defined(PSA_HAVE_SOFT_PBKDF2_CMAC)
David Brown78a429b2021-01-21 09:48:57 -0700441#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700442#define MBEDTLS_AES_C
David Browne1f91f02021-02-09 15:56:22 -0700443#endif /* PSA_HAVE_SOFT_KEY_TYPE_AES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown94933082021-01-05 12:03:25 -0700444#endif /* PSA_WANT_KEY_TYPE_AES */
445
Gilles Peskine09c46da2021-10-08 15:48:16 +0200446#if defined(PSA_WANT_KEY_TYPE_ARIA)
447#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA)
448#define PSA_HAVE_SOFT_KEY_TYPE_ARIA 1
449#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA */
450#if defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
451 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
452 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
453#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
454#define MBEDTLS_ARIA_C
455#endif /* PSA_HAVE_SOFT_KEY_TYPE_ARIA || PSA_HAVE_SOFT_BLOCK_MODE */
456#endif /* PSA_WANT_KEY_TYPE_ARIA */
457
David Brown686e6e82021-01-05 12:03:25 -0700458#if defined(PSA_WANT_KEY_TYPE_CAMELLIA)
David Browne1f91f02021-02-09 15:56:22 -0700459#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA)
460#define PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA 1
461#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA */
462#if defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100463 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
464 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
David Brown78a429b2021-01-21 09:48:57 -0700465#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700466#define MBEDTLS_CAMELLIA_C
David Browne1f91f02021-02-09 15:56:22 -0700467#endif /* PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown686e6e82021-01-05 12:03:25 -0700468#endif /* PSA_WANT_KEY_TYPE_CAMELLIA */
469
David Brownb65a7f72021-01-15 12:04:09 -0700470#if defined(PSA_WANT_KEY_TYPE_DES)
David Browne1f91f02021-02-09 15:56:22 -0700471#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DES)
472#define PSA_HAVE_SOFT_KEY_TYPE_DES 1
473#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DES */
474#if defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
David Brownb781f752021-02-08 15:44:52 -0700475 defined(PSA_HAVE_SOFT_BLOCK_MODE)
David Brown78a429b2021-01-21 09:48:57 -0700476#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700477#define MBEDTLS_DES_C
David Browne1f91f02021-02-09 15:56:22 -0700478#endif /*PSA_HAVE_SOFT_KEY_TYPE_DES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brownb65a7f72021-01-15 12:04:09 -0700479#endif /* PSA_WANT_KEY_TYPE_DES */
480
David Brownb16727a2021-02-08 16:31:46 -0700481#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
482#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20)
483#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
484#define MBEDTLS_CHACHA20_C
485#endif /*!MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20 */
486#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
487
David Brownf84a0f62021-02-09 15:59:41 -0700488/* If any of the software block ciphers are selected, define
489 * PSA_HAVE_SOFT_BLOCK_CIPHER, which can be used in any of these
490 * situations. */
491#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200492 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
David Brownf84a0f62021-02-09 15:59:41 -0700493 defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
494 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
495#define PSA_HAVE_SOFT_BLOCK_CIPHER 1
496#endif
497
David Brown99844272021-01-15 12:04:47 -0700498#if defined(PSA_WANT_ALG_STREAM_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700499#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brown99844272021-01-15 12:04:47 -0700500#endif /* PSA_WANT_ALG_STREAM_CIPHER */
501
Ronald Crond85e98d2021-03-25 15:32:32 +0100502#if defined(PSA_WANT_ALG_CBC_MAC)
503#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_MAC)
504#error "CBC-MAC is not yet supported via the PSA API in Mbed TLS."
505#define MBEDTLS_PSA_BUILTIN_ALG_CBC_MAC 1
506#endif /* !MBEDTLS_PSA_ACCEL_ALG_CBC_MAC */
507#endif /* PSA_WANT_ALG_CBC_MAC */
508
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100509#if defined(PSA_WANT_ALG_CMAC)
510#if !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC) || \
Kusumit Ghoderaoc22affd2023-07-28 13:31:58 +0530511 defined(PSA_HAVE_SOFT_BLOCK_CIPHER) || \
512 defined(PSA_HAVE_SOFT_PBKDF2_CMAC)
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100513#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
514#define MBEDTLS_CMAC_C
515#endif /* !MBEDTLS_PSA_ACCEL_ALG_CMAC */
516#endif /* PSA_WANT_ALG_CMAC */
517
Kusumit Ghoderao105f7722023-07-27 21:03:06 +0530518#if defined(PSA_HAVE_SOFT_PBKDF2_HMAC) || \
519 defined(PSA_HAVE_SOFT_PBKDF2_CMAC)
520#define PSA_HAVE_SOFT_PBKDF2 1
521#endif /* PSA_HAVE_SOFT_PBKDF2_HMAC || PSA_HAVE_SOFT_PBKDF2_CMAC */
David Brown99844272021-01-15 12:04:47 -0700522
523#if defined(PSA_WANT_ALG_CTR)
David Brown4b9ec7a2021-02-05 12:47:08 -0700524#if !defined(MBEDTLS_PSA_ACCEL_ALG_CTR) || \
David Brownf84a0f62021-02-09 15:59:41 -0700525 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700526#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700527#define MBEDTLS_CIPHER_MODE_CTR
David Brown4b9ec7a2021-02-05 12:47:08 -0700528#endif
David Brown99844272021-01-15 12:04:47 -0700529#endif /* PSA_WANT_ALG_CTR */
530
531#if defined(PSA_WANT_ALG_CFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700532#if !defined(MBEDTLS_PSA_ACCEL_ALG_CFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700533 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700534#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700535#define MBEDTLS_CIPHER_MODE_CFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700536#endif
David Brown99844272021-01-15 12:04:47 -0700537#endif /* PSA_WANT_ALG_CFB */
538
539#if defined(PSA_WANT_ALG_OFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700540#if !defined(MBEDTLS_PSA_ACCEL_ALG_OFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700541 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700542#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700543#define MBEDTLS_CIPHER_MODE_OFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700544#endif
David Brown99844272021-01-15 12:04:47 -0700545#endif /* PSA_WANT_ALG_OFB */
546
Gilles Peskine7a2e83b2022-03-17 11:09:23 +0100547#if defined(PSA_WANT_ALG_ECB_NO_PADDING) && \
548 !defined(MBEDTLS_PSA_ACCEL_ALG_ECB_NO_PADDING)
David Brownbe380c12021-02-11 10:55:48 -0700549#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700550#endif
551
David Brown12f45f92021-01-26 11:50:36 -0700552#if defined(PSA_WANT_ALG_CBC_NO_PADDING)
David Brown4b9ec7a2021-02-05 12:47:08 -0700553#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING) || \
David Brownfc468182021-02-09 16:23:34 -0700554 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700555#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700556#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown4b9ec7a2021-02-05 12:47:08 -0700557#endif
David Brown12f45f92021-01-26 11:50:36 -0700558#endif /* PSA_WANT_ALG_CBC_NO_PADDING */
559
560#if defined(PSA_WANT_ALG_CBC_PKCS7)
David Brown4b9ec7a2021-02-05 12:47:08 -0700561#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7) || \
David Brownfc468182021-02-09 16:23:34 -0700562 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700563#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700564#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brownfc468182021-02-09 16:23:34 -0700565#define MBEDTLS_CIPHER_PADDING_PKCS7
David Brown4b9ec7a2021-02-05 12:47:08 -0700566#endif
David Brown12f45f92021-01-26 11:50:36 -0700567#endif /* PSA_WANT_ALG_CBC_PKCS7 */
568
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100569#if defined(PSA_WANT_ALG_CCM)
570#if !defined(MBEDTLS_PSA_ACCEL_ALG_CCM) || \
571 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200572 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100573 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
574#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100575#define MBEDTLS_PSA_BUILTIN_ALG_CCM_STAR_NO_TAG 1
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100576#define MBEDTLS_CCM_C
577#endif
578#endif /* PSA_WANT_ALG_CCM */
579
580#if defined(PSA_WANT_ALG_GCM)
581#if !defined(MBEDTLS_PSA_ACCEL_ALG_GCM) || \
582 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200583 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100584 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
585#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
586#define MBEDTLS_GCM_C
587#endif
588#endif /* PSA_WANT_ALG_GCM */
589
David Brownac4fa072021-02-08 16:47:35 -0700590#if defined(PSA_WANT_ALG_CHACHA20_POLY1305)
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200591#if !defined(MBEDTLS_PSA_ACCEL_ALG_CHACHA20_POLY1305)
David Brownac4fa072021-02-08 16:47:35 -0700592#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
593#define MBEDTLS_CHACHAPOLY_C
Summer Qin9f2596f2022-06-17 12:50:32 +0800594#define MBEDTLS_CHACHA20_C
595#define MBEDTLS_POLY1305_C
David Brown86730a82021-02-09 16:24:11 -0700596#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700597#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200598#endif /* !MBEDTLS_PSA_ACCEL_ALG_CHACHA20_POLY1305 */
David Brownac4fa072021-02-08 16:47:35 -0700599#endif /* PSA_WANT_ALG_CHACHA20_POLY1305 */
600
Yanray Wang67208fd2023-05-15 18:02:46 +0800601/*
Yanray Wang72d7bb42023-08-30 13:58:15 +0800602 * ECB, CBC, XTS, KW modes require both ENCRYPT and DECRYPT directions.
603 * MBEDTLS_CIPHER_ENCRYPT_ONLY is only enabled when those modes
604 * are not requested via the PSA API and are not enabled in the legacy API.
Yanray Wang67208fd2023-05-15 18:02:46 +0800605 *
Yanray Wang72d7bb42023-08-30 13:58:15 +0800606 * Note: XTS, KW are not yet supported via the PSA API in Mbed TLS.
Yanray Wang67208fd2023-05-15 18:02:46 +0800607 */
608#if !defined(PSA_WANT_ALG_ECB_NO_PADDING) && \
609 !defined(PSA_WANT_ALG_CBC_NO_PADDING) && \
Yanray Wang72d7bb42023-08-30 13:58:15 +0800610 !defined(PSA_WANT_ALG_CBC_PKCS7) && \
611 !defined(MBEDTLS_CIPHER_MODE_CBC) && \
612 !defined(MBEDTLS_CIPHER_MODE_XTS) && \
613 !defined(MBEDTLS_NIST_KW_C)
Yanray Wang67208fd2023-05-15 18:02:46 +0800614#define MBEDTLS_CIPHER_ENCRYPT_ONLY 1
615#endif
616
David Browneed74df2021-03-15 15:53:57 -0600617#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_256)
618#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256)
619#define MBEDTLS_ECP_DP_BP256R1_ENABLED
620#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
621#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256 */
622#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_256 */
623
624#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_384)
625#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384)
626#define MBEDTLS_ECP_DP_BP384R1_ENABLED
627#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
628#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384 */
629#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_384 */
630
631#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_512)
632#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512)
633#define MBEDTLS_ECP_DP_BP512R1_ENABLED
634#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
635#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512 */
636#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_512 */
637
638#if defined(PSA_WANT_ECC_MONTGOMERY_255)
639#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255)
640#define MBEDTLS_ECP_DP_CURVE25519_ENABLED
641#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
642#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255 */
643#endif /* PSA_WANT_ECC_MONTGOMERY_255 */
644
645#if defined(PSA_WANT_ECC_MONTGOMERY_448)
646#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448)
647#define MBEDTLS_ECP_DP_CURVE448_ENABLED
648#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
649#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448 */
650#endif /* PSA_WANT_ECC_MONTGOMERY_448 */
651
David Brownc7b9b2b2021-02-19 21:05:52 -0700652#if defined(PSA_WANT_ECC_SECP_R1_192)
653#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192)
654#define MBEDTLS_ECP_DP_SECP192R1_ENABLED
655#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
656#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192 */
657#endif /* PSA_WANT_ECC_SECP_R1_192 */
658
659#if defined(PSA_WANT_ECC_SECP_R1_224)
660#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224)
661#define MBEDTLS_ECP_DP_SECP224R1_ENABLED
662#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
663#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224 */
664#endif /* PSA_WANT_ECC_SECP_R1_224 */
665
666#if defined(PSA_WANT_ECC_SECP_R1_256)
667#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256)
668#define MBEDTLS_ECP_DP_SECP256R1_ENABLED
669#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
670#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256 */
671#endif /* PSA_WANT_ECC_SECP_R1_256 */
672
673#if defined(PSA_WANT_ECC_SECP_R1_384)
674#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384)
675#define MBEDTLS_ECP_DP_SECP384R1_ENABLED
676#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
677#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384 */
678#endif /* PSA_WANT_ECC_SECP_R1_384 */
679
680#if defined(PSA_WANT_ECC_SECP_R1_521)
681#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521)
682#define MBEDTLS_ECP_DP_SECP521R1_ENABLED
683#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
684#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521 */
685#endif /* PSA_WANT_ECC_SECP_R1_521 */
686
687#if defined(PSA_WANT_ECC_SECP_K1_192)
688#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192)
David Brown8de143e2021-02-19 14:08:00 -0700689#define MBEDTLS_ECP_DP_SECP192K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700690#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
691#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192 */
692#endif /* PSA_WANT_ECC_SECP_K1_192 */
David Brown8de143e2021-02-19 14:08:00 -0700693
David Brownc7b9b2b2021-02-19 21:05:52 -0700694#if defined(PSA_WANT_ECC_SECP_K1_224)
695#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224)
Ronald Crone1f55162021-03-25 15:09:47 +0100696/*
697 * SECP224K1 is buggy via the PSA API in Mbed TLS
Dave Rodgman017a1992022-03-31 14:07:01 +0100698 * (https://github.com/Mbed-TLS/mbedtls/issues/3541).
Ronald Crone1f55162021-03-25 15:09:47 +0100699 */
700#error "SECP224K1 is buggy via the PSA API in Mbed TLS."
David Brown8de143e2021-02-19 14:08:00 -0700701#define MBEDTLS_ECP_DP_SECP224K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700702#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
703#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224 */
704#endif /* PSA_WANT_ECC_SECP_K1_224 */
David Brown8de143e2021-02-19 14:08:00 -0700705
David Brownc7b9b2b2021-02-19 21:05:52 -0700706#if defined(PSA_WANT_ECC_SECP_K1_256)
707#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256)
David Brown9b178de2021-03-10 13:14:48 -0700708#define MBEDTLS_ECP_DP_SECP256K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700709#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
710#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256 */
711#endif /* PSA_WANT_ECC_SECP_K1_256 */
David Brown8de143e2021-02-19 14:08:00 -0700712
Gilles Peskine1231eb52021-04-19 22:24:23 +0200713
714
715/****************************************************************/
716/* Infer PSA requirements from Mbed TLS capabilities */
717/****************************************************************/
718
John Durkop714e3a12020-09-29 22:07:04 -0700719#else /* MBEDTLS_PSA_CRYPTO_CONFIG */
720
721/*
722 * Ensure PSA_WANT_* defines are setup properly if MBEDTLS_PSA_CRYPTO_CONFIG
723 * is not defined
724 */
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100725
Ronald Cron3d471812021-03-18 13:40:31 +0100726#if defined(MBEDTLS_CCM_C)
727#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100728#define MBEDTLS_PSA_BUILTIN_ALG_CCM_STAR_NO_TAG 1
Ronald Cron3d471812021-03-18 13:40:31 +0100729#define PSA_WANT_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100730#define PSA_WANT_ALG_CCM_STAR_NO_TAG 1
Ronald Cron3d471812021-03-18 13:40:31 +0100731#endif /* MBEDTLS_CCM_C */
732
733#if defined(MBEDTLS_CMAC_C)
734#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
735#define PSA_WANT_ALG_CMAC 1
736#endif /* MBEDTLS_CMAC_C */
737
John Durkopd62b6782020-11-30 21:06:05 -0800738#if defined(MBEDTLS_ECDH_C)
739#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
740#define PSA_WANT_ALG_ECDH 1
741#endif /* MBEDTLS_ECDH_C */
742
743#if defined(MBEDTLS_ECDSA_C)
744#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
745#define PSA_WANT_ALG_ECDSA 1
Gilles Peskine1231eb52021-04-19 22:24:23 +0200746#define PSA_WANT_ALG_ECDSA_ANY 1
John Durkopd62b6782020-11-30 21:06:05 -0800747
748// Only add in DETERMINISTIC support if ECDSA is also enabled
749#if defined(MBEDTLS_ECDSA_DETERMINISTIC)
750#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
751#define PSA_WANT_ALG_DETERMINISTIC_ECDSA 1
752#endif /* MBEDTLS_ECDSA_DETERMINISTIC */
753
754#endif /* MBEDTLS_ECDSA_C */
755
756#if defined(MBEDTLS_ECP_C)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200757#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Settif87b5052023-05-26 13:47:09 +0200758#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT 1
759#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT 1
Valerio Settif87b5052023-05-26 13:47:09 +0200760#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE 1
Valerio Setti06dfba72023-06-30 10:09:36 +0200761/* Normally we wouldn't enable this because it's not implemented in ecp.c,
762 * but since it used to be available any time ECP_C was enabled, let's enable
763 * it anyway for the sake of backwards compatibility */
764#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200765#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Settiddb57762023-06-06 14:17:15 +0200766#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_IMPORT 1
767#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_EXPORT 1
768#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_GENERATE 1
Valerio Setti06dfba72023-06-30 10:09:36 +0200769/* See comment for PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE above. */
770#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_DERIVE 1
John Durkopd62b6782020-11-30 21:06:05 -0800771#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
772#define PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY 1
773#endif /* MBEDTLS_ECP_C */
774
Przemek Stekiel746dfae2023-05-04 09:14:08 +0200775#if defined(MBEDTLS_DHM_C)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200776#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC 1
Valerio Settif87b5052023-05-26 13:47:09 +0200777#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_IMPORT 1
778#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_EXPORT 1
Valerio Settif87b5052023-05-26 13:47:09 +0200779#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_GENERATE 1
Przemek Stekiel746dfae2023-05-04 09:14:08 +0200780#define PSA_WANT_KEY_TYPE_DH_PUBLIC_KEY 1
781#define PSA_WANT_ALG_FFDH 1
782#define PSA_WANT_DH_FAMILY_RFC7919 1
783#define MBEDTLS_PSA_BUILTIN_ALG_FFDH 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200784#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_BASIC 1
Valerio Settif87b5052023-05-26 13:47:09 +0200785#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_IMPORT 1
786#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT 1
787#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE 1
Przemek Stekiel746dfae2023-05-04 09:14:08 +0200788#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY 1
789#endif /* MBEDTLS_DHM_C */
790
Ronald Cron3d471812021-03-18 13:40:31 +0100791#if defined(MBEDTLS_GCM_C)
792#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
793#define PSA_WANT_ALG_GCM 1
794#endif /* MBEDTLS_GCM_C */
795
Przemek Stekiel18399d82022-06-27 13:34:50 +0200796/* Enable PSA HKDF algorithm if mbedtls HKDF is supported.
797 * PSA HKDF EXTRACT and PSA HKDF EXPAND have minimal cost when
798 * PSA HKDF is enabled, so enable both algorithms together
799 * with PSA HKDF. */
John Durkopd62b6782020-11-30 21:06:05 -0800800#if defined(MBEDTLS_HKDF_C)
801#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
802#define PSA_WANT_ALG_HMAC 1
803#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
804#define PSA_WANT_ALG_HKDF 1
Przemek Stekielb33bd192022-06-21 09:58:51 +0200805#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXTRACT 1
806#define PSA_WANT_ALG_HKDF_EXTRACT 1
807#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXPAND 1
808#define PSA_WANT_ALG_HKDF_EXPAND 1
John Durkopd62b6782020-11-30 21:06:05 -0800809#endif /* MBEDTLS_HKDF_C */
810
John Durkopd62b6782020-11-30 21:06:05 -0800811#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
812#define PSA_WANT_ALG_HMAC 1
Gilles Peskine47a89332021-01-12 00:00:15 +0100813#define PSA_WANT_KEY_TYPE_HMAC
Andrzej Kurek65bf73e2022-08-31 14:59:31 -0400814
815#if defined(MBEDTLS_MD_C)
John Durkopd62b6782020-11-30 21:06:05 -0800816#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
817#define PSA_WANT_ALG_TLS12_PRF 1
818#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
819#define PSA_WANT_ALG_TLS12_PSK_TO_MS 1
820#endif /* MBEDTLS_MD_C */
821
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100822#if defined(MBEDTLS_MD5_C)
823#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
824#define PSA_WANT_ALG_MD5 1
825#endif
826
Neil Armstrong637d0a02022-05-25 11:28:22 +0200827#if defined(MBEDTLS_ECJPAKE_C)
828#define MBEDTLS_PSA_BUILTIN_PAKE 1
Neil Armstronga557cb82022-06-10 08:58:32 +0200829#define MBEDTLS_PSA_BUILTIN_ALG_JPAKE 1
830#define PSA_WANT_ALG_JPAKE 1
Neil Armstrong637d0a02022-05-25 11:28:22 +0200831#endif
832
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100833#if defined(MBEDTLS_RIPEMD160_C)
834#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
835#define PSA_WANT_ALG_RIPEMD160 1
836#endif
837
John Durkopd62b6782020-11-30 21:06:05 -0800838#if defined(MBEDTLS_RSA_C)
839#if defined(MBEDTLS_PKCS1_V15)
840#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
841#define PSA_WANT_ALG_RSA_PKCS1V15_CRYPT 1
842#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
843#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN 1
Gilles Peskine1231eb52021-04-19 22:24:23 +0200844#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW 1
Yuto Takano7828ca22021-08-10 11:26:15 +0100845#endif /* MBEDTLS_PKCS1_V15 */
John Durkopd62b6782020-11-30 21:06:05 -0800846#if defined(MBEDTLS_PKCS1_V21)
847#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
848#define PSA_WANT_ALG_RSA_OAEP 1
849#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
850#define PSA_WANT_ALG_RSA_PSS 1
851#endif /* MBEDTLS_PKCS1_V21 */
Valerio Setti98038342023-07-11 16:30:24 +0200852#if defined(MBEDTLS_GENPRIME)
853#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_GENERATE 1
854#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_GENERATE 1
855#endif /* MBEDTLS_GENPRIME */
Valerio Setti01cc88a2023-06-15 11:53:08 +0200856#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
Valerio Settif87b5052023-05-26 13:47:09 +0200857#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_IMPORT 1
858#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_EXPORT 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200859#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
Valerio Settif87b5052023-05-26 13:47:09 +0200860#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_IMPORT 1
861#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_EXPORT 1
John Durkopd62b6782020-11-30 21:06:05 -0800862#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
863#define PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY 1
864#endif /* MBEDTLS_RSA_C */
865
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100866#if defined(MBEDTLS_SHA1_C)
867#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
868#define PSA_WANT_ALG_SHA_1 1
869#endif
870
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200871#if defined(MBEDTLS_SHA224_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100872#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
Gilles Peskineb65db072021-01-12 00:00:53 +0100873#define PSA_WANT_ALG_SHA_224 1
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200874#endif
875
876#if defined(MBEDTLS_SHA256_C)
877#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100878#define PSA_WANT_ALG_SHA_256 1
879#endif
880
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200881#if defined(MBEDTLS_SHA384_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100882#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
883#define PSA_WANT_ALG_SHA_384 1
884#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200885
886#if defined(MBEDTLS_SHA512_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100887#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
888#define PSA_WANT_ALG_SHA_512 1
889#endif
890
David Brown94933082021-01-05 12:03:25 -0700891#if defined(MBEDTLS_AES_C)
892#define PSA_WANT_KEY_TYPE_AES 1
David Brownda7dbb72021-01-26 11:44:15 -0700893#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700894#endif
895
Gilles Peskine09c46da2021-10-08 15:48:16 +0200896#if defined(MBEDTLS_ARIA_C)
897#define PSA_WANT_KEY_TYPE_ARIA 1
898#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
899#endif
900
David Brown686e6e82021-01-05 12:03:25 -0700901#if defined(MBEDTLS_CAMELLIA_C)
902#define PSA_WANT_KEY_TYPE_CAMELLIA 1
David Brownda7dbb72021-01-26 11:44:15 -0700903#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700904#endif
905
David Brownb65a7f72021-01-15 12:04:09 -0700906#if defined(MBEDTLS_DES_C)
907#define PSA_WANT_KEY_TYPE_DES 1
David Brownda7dbb72021-01-26 11:44:15 -0700908#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700909#endif
910
Andrzej Kurekd60907b2022-09-14 10:02:30 -0400911#if defined(MBEDTLS_PSA_BUILTIN_ALG_SHA_256)
912#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_ECJPAKE_TO_PMS 1
913#define PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS 1
914#endif
915
David Brownb16727a2021-02-08 16:31:46 -0700916#if defined(MBEDTLS_CHACHA20_C)
917#define PSA_WANT_KEY_TYPE_CHACHA20 1
918#define PSA_WANT_ALG_STREAM_CIPHER 1
919#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
920#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brownac4fa072021-02-08 16:47:35 -0700921#if defined(MBEDTLS_CHACHAPOLY_C)
922#define PSA_WANT_ALG_CHACHA20_POLY1305 1
David Brown86730a82021-02-09 16:24:11 -0700923#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700924#endif
David Brownb16727a2021-02-08 16:31:46 -0700925#endif
926
David Brown99844272021-01-15 12:04:47 -0700927#if defined(MBEDTLS_CIPHER_MODE_CBC)
David Brown10cb81c2021-02-09 16:10:29 -0700928#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700929#define PSA_WANT_ALG_CBC_NO_PADDING 1
930#if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
David Brown12f45f92021-01-26 11:50:36 -0700931#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brown99844272021-01-15 12:04:47 -0700932#define PSA_WANT_ALG_CBC_PKCS7 1
933#endif
934#endif
935
936#if defined(MBEDTLS_AES_C) || defined(MBEDTLS_DES_C) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200937 defined(MBEDTLS_ARIA_C) || defined(MBEDTLS_CAMELLIA_C)
David Brown10cb81c2021-02-09 16:10:29 -0700938#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700939#define PSA_WANT_ALG_ECB_NO_PADDING 1
940#endif
941
942#if defined(MBEDTLS_CIPHER_MODE_CFB)
David Brown12f45f92021-01-26 11:50:36 -0700943#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700944#define PSA_WANT_ALG_CFB 1
945#endif
946
947#if defined(MBEDTLS_CIPHER_MODE_CTR)
David Brown12f45f92021-01-26 11:50:36 -0700948#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700949#define PSA_WANT_ALG_CTR 1
950#endif
951
952#if defined(MBEDTLS_CIPHER_MODE_OFB)
David Brown12f45f92021-01-26 11:50:36 -0700953#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700954#define PSA_WANT_ALG_OFB 1
955#endif
956
David Browneed74df2021-03-15 15:53:57 -0600957#if defined(MBEDTLS_ECP_DP_BP256R1_ENABLED)
958#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
959#define PSA_WANT_ECC_BRAINPOOL_P_R1_256
960#endif
961
962#if defined(MBEDTLS_ECP_DP_BP384R1_ENABLED)
963#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
964#define PSA_WANT_ECC_BRAINPOOL_P_R1_384
965#endif
966
967#if defined(MBEDTLS_ECP_DP_BP512R1_ENABLED)
968#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
969#define PSA_WANT_ECC_BRAINPOOL_P_R1_512
970#endif
971
972#if defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED)
973#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
974#define PSA_WANT_ECC_MONTGOMERY_255
975#endif
976
Archanaef6aa5c2021-06-08 11:40:10 +0530977#if defined(MBEDTLS_ECP_DP_CURVE448_ENABLED)
David Browneed74df2021-03-15 15:53:57 -0600978#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
979#define PSA_WANT_ECC_MONTGOMERY_448
980#endif
981
David Brown8de143e2021-02-19 14:08:00 -0700982#if defined(MBEDTLS_ECP_DP_SECP192R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700983#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
984#define PSA_WANT_ECC_SECP_R1_192
David Brown8de143e2021-02-19 14:08:00 -0700985#endif
986
987#if defined(MBEDTLS_ECP_DP_SECP224R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700988#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
989#define PSA_WANT_ECC_SECP_R1_224
David Brown8de143e2021-02-19 14:08:00 -0700990#endif
991
992#if defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700993#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
994#define PSA_WANT_ECC_SECP_R1_256
David Brown8de143e2021-02-19 14:08:00 -0700995#endif
996
997#if defined(MBEDTLS_ECP_DP_SECP384R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700998#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
999#define PSA_WANT_ECC_SECP_R1_384
David Brown8de143e2021-02-19 14:08:00 -07001000#endif
1001
1002#if defined(MBEDTLS_ECP_DP_SECP521R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -07001003#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
1004#define PSA_WANT_ECC_SECP_R1_521
David Brown8de143e2021-02-19 14:08:00 -07001005#endif
1006
1007#if defined(MBEDTLS_ECP_DP_SECP192K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -07001008#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
1009#define PSA_WANT_ECC_SECP_K1_192
David Brown8de143e2021-02-19 14:08:00 -07001010#endif
1011
Dave Rodgman017a1992022-03-31 14:07:01 +01001012/* SECP224K1 is buggy via the PSA API (https://github.com/Mbed-TLS/mbedtls/issues/3541) */
Gilles Peskine39841302021-03-23 12:06:45 +01001013#if 0 && defined(MBEDTLS_ECP_DP_SECP224K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -07001014#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
1015#define PSA_WANT_ECC_SECP_K1_224
David Brown8de143e2021-02-19 14:08:00 -07001016#endif
1017
David Brown9b178de2021-03-10 13:14:48 -07001018#if defined(MBEDTLS_ECP_DP_SECP256K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -07001019#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
1020#define PSA_WANT_ECC_SECP_K1_256
David Brown8de143e2021-02-19 14:08:00 -07001021#endif
1022
John Durkop2dfaf9c2020-09-24 04:30:10 -07001023#endif /* MBEDTLS_PSA_CRYPTO_CONFIG */
John Durkopd8959392020-09-20 23:09:17 -07001024
Tom Cosgrove6d62fac2023-05-10 14:40:05 +01001025#if defined(PSA_WANT_ALG_JPAKE)
1026#define PSA_WANT_ALG_SOME_PAKE 1
1027#endif
1028
Valerio Setti73fc0822023-06-21 10:06:19 +02001029/* Even though KEY_PAIR symbols' feature several level of support (BASIC, IMPORT,
1030 * EXPORT, GENERATE, DERIVE) we're not planning to have support only for BASIC
1031 * without IMPORT/EXPORT since these last 2 features are strongly used in tests.
Valerio Setti27c501a2023-06-27 16:58:52 +02001032 * In general it is allowed to include more feature than what is strictly
1033 * requested.
1034 * As a consequence IMPORT and EXPORT features will be automatically enabled
1035 * as soon as the BASIC one is. */
Valerio Setti73fc0822023-06-21 10:06:19 +02001036#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC)
Valerio Setti27c501a2023-06-27 16:58:52 +02001037#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT 1
1038#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT 1
Valerio Setti73fc0822023-06-21 10:06:19 +02001039#endif
1040
Valerio Setti27c501a2023-06-27 16:58:52 +02001041/* See description above */
Valerio Setti73fc0822023-06-21 10:06:19 +02001042#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_BASIC)
Valerio Setti27c501a2023-06-27 16:58:52 +02001043#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_IMPORT 1
1044#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_EXPORT 1
Valerio Setti8d6e98c2023-05-26 13:46:13 +02001045#endif
1046
Valerio Setti0d5c5e52023-07-10 16:21:00 +02001047/* See description above */
1048#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC)
1049#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_IMPORT 1
1050#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_EXPORT 1
1051#endif
1052
1053/* See description above */
1054#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_BASIC)
1055#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_IMPORT 1
1056#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_EXPORT 1
1057#endif
1058
Valerio Settia55f0422023-07-10 15:34:41 +02001059/* See description above */
1060#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC)
1061#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_IMPORT 1
1062#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_EXPORT 1
Valerio Setti8d6e98c2023-05-26 13:46:13 +02001063#endif
1064
Valerio Settia55f0422023-07-10 15:34:41 +02001065/* See description above */
1066#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_BASIC)
1067#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_IMPORT 1
1068#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT 1
Valerio Setti8d6e98c2023-05-26 13:46:13 +02001069#endif
1070
Gilles Peskine60b29fe2021-02-16 14:06:50 +01001071/* These features are always enabled. */
1072#define PSA_WANT_KEY_TYPE_DERIVE 1
Gilles Peskinebba26302022-12-15 23:25:17 +01001073#define PSA_WANT_KEY_TYPE_PASSWORD 1
1074#define PSA_WANT_KEY_TYPE_PASSWORD_HASH 1
Gilles Peskine60b29fe2021-02-16 14:06:50 +01001075#define PSA_WANT_KEY_TYPE_RAW_DATA 1
1076
John Durkop6e33dbe2020-09-17 21:15:13 -07001077#endif /* MBEDTLS_CONFIG_PSA_H */