Manuel Pégourié-Gonnard | 73a0e1d | 2021-09-21 13:55:00 +0200 | [diff] [blame] | 1 | This document describes the compile-time configuration option |
Manuel Pégourié-Gonnard | b2bd34e | 2022-04-20 15:58:00 +0200 | [diff] [blame] | 2 | `MBEDTLS_USE_PSA_CRYPTO` from a user's perspective. |
Manuel Pégourié-Gonnard | 13b0beb | 2021-09-20 13:21:25 +0200 | [diff] [blame] | 3 | |
Manuel Pégourié-Gonnard | 2ca08c8 | 2023-03-24 09:21:46 +0100 | [diff] [blame] | 4 | This option: |
| 5 | - makes the X.509 and TLS libraries use PSA for cryptographic operations as |
| 6 | much as possible, see "Internal changes" below; |
| 7 | - enables new APIs for using keys handled by PSA Crypto, such as |
| 8 | `mbedtls_pk_setup_opaque()` and `mbedtls_ssl_conf_psk_opaque()`, see |
| 9 | "New APIs / API extensions" below. |
Manuel Pégourié-Gonnard | f3f79a0 | 2022-05-11 13:31:47 +0200 | [diff] [blame] | 10 | |
Manuel Pégourié-Gonnard | b5b27c1 | 2022-06-10 11:09:03 +0200 | [diff] [blame] | 11 | General considerations |
| 12 | ---------------------- |
Manuel Pégourié-Gonnard | 13b0beb | 2021-09-20 13:21:25 +0200 | [diff] [blame] | 13 | |
Manuel Pégourié-Gonnard | b5b27c1 | 2022-06-10 11:09:03 +0200 | [diff] [blame] | 14 | **Application code:** when this option is enabled, you need to call |
Manuel Pégourié-Gonnard | f3f79a0 | 2022-05-11 13:31:47 +0200 | [diff] [blame] | 15 | `psa_crypto_init()` before calling any function from the SSL/TLS, X.509 or PK |
valerio | 95e57c3 | 2023-04-20 12:28:18 +0200 | [diff] [blame] | 16 | modules, except for the various mbedtls_xxx_init() functions which can be called |
| 17 | at any time. |
Manuel Pégourié-Gonnard | 1b08c5f | 2021-09-21 11:21:23 +0200 | [diff] [blame] | 18 | |
Manuel Pégourié-Gonnard | 93b21e7 | 2023-03-29 10:30:26 +0200 | [diff] [blame] | 19 | **Why enable this option:** to fully take advantage of PSA drivers in PK, |
| 20 | X.509 and TLS. For example, enabling this option is what allows use of drivers |
Manuel Pégourié-Gonnard | 9463e78 | 2023-03-30 09:37:39 +0200 | [diff] [blame] | 21 | for ECDSA, ECDH and EC J-PAKE in those modules. However, note that even with |
Manuel Pégourié-Gonnard | 93b21e7 | 2023-03-29 10:30:26 +0200 | [diff] [blame] | 22 | this option disabled, some code in PK, X.509, TLS or the crypto library might |
| 23 | still use PSA drivers, if it can determine it's safe to do so; currently |
| 24 | that's the case for hashes. |
| 25 | |
Manuel Pégourié-Gonnard | 2ca08c8 | 2023-03-24 09:21:46 +0100 | [diff] [blame] | 26 | **Relationship with other options:** This option depends on |
| 27 | `MBEDTLS_PSA_CRYPTO_C`. These two options differ in the following way: |
| 28 | - `MBEDTLS_PSA_CRYPTO_C` enables the implementation of the PSA Crypto API. |
| 29 | When it is enabled, `psa_xxx()` APIs are available and you must call |
| 30 | `psa_crypto_init()` before you call any other `psa_xxx()` function. Other |
| 31 | modules in the library (non-PSA crypto APIs, X.509, TLS) may or may not use |
| 32 | PSA Crypto but you're not required to call `psa_crypto_init()` before calling |
Manuel Pégourié-Gonnard | 5c8c9e0 | 2023-03-29 10:33:03 +0200 | [diff] [blame] | 33 | non-PSA functions, unless explicitly documented (TLS 1.3). |
Manuel Pégourié-Gonnard | 2ca08c8 | 2023-03-24 09:21:46 +0100 | [diff] [blame] | 34 | - `MBEDTLS_USE_PSA_CRYPTO` means that X.509 and TLS will use PSA Crypto as |
| 35 | much as possible (that is, everywhere except for features that are not |
| 36 | supported by PSA Crypto, see "Internal Changes" below for a complete list of |
| 37 | exceptions). When it is enabled, you need to call `psa_crypto_init()` before |
| 38 | calling any function from PK, X.509 or TLS; however it doesn't change anything |
| 39 | for the rest of the library. |
| 40 | |
| 41 | **Scope:** `MBEDTLS_USE_PSA_CRYPTO` has no effect on modules other than PK, |
| 42 | X.509 and TLS. It also has no effect on most of the TLS 1.3 code, which always |
| 43 | uses PSA crypto. The parts of the TLS 1.3 code that will use PSA Crypto or not |
| 44 | depending on this option being set or not are: |
Manuel Pégourié-Gonnard | 439dbc5 | 2023-03-10 12:33:15 +0100 | [diff] [blame] | 45 | - record protection; |
| 46 | - running handshake hash; |
| 47 | - asymmetric signature verification & generation; |
| 48 | - X.509 certificate chain verification. |
| 49 | You need to enable `MBEDTLS_USE_PSA_CRYPTO` if you want TLS 1.3 to use PSA |
| 50 | everywhere. |
Manuel Pégourié-Gonnard | 1b08c5f | 2021-09-21 11:21:23 +0200 | [diff] [blame] | 51 | |
Manuel Pégourié-Gonnard | 2ca08c8 | 2023-03-24 09:21:46 +0100 | [diff] [blame] | 52 | **Historical note:** This option was introduced at a time when PSA Crypto was |
| 53 | still beta and not ready for production, so we made its use in X.509 and TLS |
| 54 | opt-in: by default, these modules would keep using the stable, |
| 55 | production-ready legacy (pre-PSA) crypto APIs. So, the scope of was X.509 and |
| 56 | TLS, as well as some of PK for technical reasons. Nowadays PSA Crypto is no |
| 57 | longer beta, and production quality, so there's no longer any reason to make |
| 58 | its use in other modules opt-in. However, PSA Crypto functions require that |
| 59 | `psa_crypto_init()` has been called before their use, and for backwards |
| 60 | compatibility reasons we can't impose this requirement on non-PSA functions |
| 61 | that didn't have such a requirement before. So, nowadays the main meaning of |
| 62 | `MBEDTLS_USE_PSA_CRYPTO` is that the user promises to call `psa_crypto_init()` |
| 63 | before calling any PK, X.509 or TLS functions. For the same compatibility |
| 64 | reasons, we can't extend its scope. However, new modules in the library, such |
| 65 | as TLS 1.3, can be introduced with a requirement to call `psa_crypto_init()`. |
Manuel Pégourié-Gonnard | 3dd9add | 2023-03-22 16:17:54 +0100 | [diff] [blame] | 66 | |
Manuel Pégourié-Gonnard | 1b08c5f | 2021-09-21 11:21:23 +0200 | [diff] [blame] | 67 | New APIs / API extensions |
| 68 | ------------------------- |
| 69 | |
Manuel Pégourié-Gonnard | 1b08c5f | 2021-09-21 11:21:23 +0200 | [diff] [blame] | 70 | ### PSA-held (opaque) keys in the PK layer |
| 71 | |
Manuel Pégourié-Gonnard | b5b27c1 | 2022-06-10 11:09:03 +0200 | [diff] [blame] | 72 | **New API function:** `mbedtls_pk_setup_opaque()` - can be used to |
| 73 | wrap a PSA key pair into a PK context. The key can be used for private-key |
Manuel Pégourié-Gonnard | ca91017 | 2021-09-24 10:14:32 +0200 | [diff] [blame] | 74 | operations and its public part can be exported. |
Manuel Pégourié-Gonnard | 1b08c5f | 2021-09-21 11:21:23 +0200 | [diff] [blame] | 75 | |
Manuel Pégourié-Gonnard | b5b27c1 | 2022-06-10 11:09:03 +0200 | [diff] [blame] | 76 | **Benefits:** isolation of long-term secrets, use of PSA Crypto drivers. |
Manuel Pégourié-Gonnard | 1b08c5f | 2021-09-21 11:21:23 +0200 | [diff] [blame] | 77 | |
Manuel Pégourié-Gonnard | b5b27c1 | 2022-06-10 11:09:03 +0200 | [diff] [blame] | 78 | **Limitations:** can only wrap a key pair, can only use it for private key |
Manuel Pégourié-Gonnard | b2bd34e | 2022-04-20 15:58:00 +0200 | [diff] [blame] | 79 | operations. (That is, signature generation, and for RSA decryption too.) |
| 80 | Note: for ECDSA, currently this uses randomized ECDSA while Mbed TLS uses |
| 81 | deterministic ECDSA by default. The following operations are not supported |
Manuel Pégourié-Gonnard | ca91017 | 2021-09-24 10:14:32 +0200 | [diff] [blame] | 82 | with a context set this way, while they would be available with a normal |
Manuel Pégourié-Gonnard | b5b27c1 | 2022-06-10 11:09:03 +0200 | [diff] [blame] | 83 | context: `mbedtls_pk_check_pair()`, `mbedtls_pk_debug()`, all public key |
| 84 | operations. |
Manuel Pégourié-Gonnard | 1b08c5f | 2021-09-21 11:21:23 +0200 | [diff] [blame] | 85 | |
Manuel Pégourié-Gonnard | b5b27c1 | 2022-06-10 11:09:03 +0200 | [diff] [blame] | 86 | **Use in X.509 and TLS:** opt-in. The application needs to construct the PK context |
Manuel Pégourié-Gonnard | 1b08c5f | 2021-09-21 11:21:23 +0200 | [diff] [blame] | 87 | using the new API in order to get the benefits; it can then pass the |
| 88 | resulting context to the following existing APIs: |
| 89 | |
| 90 | - `mbedtls_ssl_conf_own_cert()` or `mbedtls_ssl_set_hs_own_cert()` to use the |
Manuel Pégourié-Gonnard | b5b27c1 | 2022-06-10 11:09:03 +0200 | [diff] [blame] | 91 | key together with a certificate for certificate-based key exchanges; |
Manuel Pégourié-Gonnard | 1b08c5f | 2021-09-21 11:21:23 +0200 | [diff] [blame] | 92 | - `mbedtls_x509write_csr_set_key()` to generate a CSR (certificate signature |
Manuel Pégourié-Gonnard | b5b27c1 | 2022-06-10 11:09:03 +0200 | [diff] [blame] | 93 | request); |
Manuel Pégourié-Gonnard | b2bd34e | 2022-04-20 15:58:00 +0200 | [diff] [blame] | 94 | - `mbedtls_x509write_crt_set_issuer_key()` to generate a certificate. |
Manuel Pégourié-Gonnard | 1b08c5f | 2021-09-21 11:21:23 +0200 | [diff] [blame] | 95 | |
Manuel Pégourié-Gonnard | 9155b0e | 2021-09-24 10:17:07 +0200 | [diff] [blame] | 96 | ### PSA-held (opaque) keys for TLS pre-shared keys (PSK) |
Manuel Pégourié-Gonnard | 1b08c5f | 2021-09-21 11:21:23 +0200 | [diff] [blame] | 97 | |
Manuel Pégourié-Gonnard | b5b27c1 | 2022-06-10 11:09:03 +0200 | [diff] [blame] | 98 | **New API functions:** `mbedtls_ssl_conf_psk_opaque()` and |
Manuel Pégourié-Gonnard | ca91017 | 2021-09-24 10:14:32 +0200 | [diff] [blame] | 99 | `mbedtls_ssl_set_hs_psk_opaque()`. Call one of these from an application to |
Manuel Pégourié-Gonnard | 1b08c5f | 2021-09-21 11:21:23 +0200 | [diff] [blame] | 100 | register a PSA key for use with a PSK key exchange. |
| 101 | |
Manuel Pégourié-Gonnard | b5b27c1 | 2022-06-10 11:09:03 +0200 | [diff] [blame] | 102 | **Benefits:** isolation of long-term secrets. |
Manuel Pégourié-Gonnard | 1b08c5f | 2021-09-21 11:21:23 +0200 | [diff] [blame] | 103 | |
Manuel Pégourié-Gonnard | b5b27c1 | 2022-06-10 11:09:03 +0200 | [diff] [blame] | 104 | **Limitations:** none. |
Manuel Pégourié-Gonnard | 1b08c5f | 2021-09-21 11:21:23 +0200 | [diff] [blame] | 105 | |
Manuel Pégourié-Gonnard | b5b27c1 | 2022-06-10 11:09:03 +0200 | [diff] [blame] | 106 | **Use in TLS:** opt-in. The application needs to register the key using one of |
| 107 | the new APIs to get the benefits. |
Manuel Pégourié-Gonnard | 1b08c5f | 2021-09-21 11:21:23 +0200 | [diff] [blame] | 108 | |
Manuel Pégourié-Gonnard | 86efa85 | 2023-03-24 09:26:40 +0100 | [diff] [blame] | 109 | ### PSA-held (opaque) keys for TLS 1.2 EC J-PAKE key exchange |
| 110 | |
| 111 | **New API function:** `mbedtls_ssl_set_hs_ecjpake_password_opaque()`. |
| 112 | Call this function from an application to register a PSA key for use with the |
| 113 | TLS 1.2 EC J-PAKE key exchange. |
| 114 | |
| 115 | **Benefits:** isolation of long-term secrets. |
| 116 | |
| 117 | **Limitations:** none. |
| 118 | |
| 119 | **Use in TLS:** opt-in. The application needs to register the key using one of |
| 120 | the new APIs to get the benefits. |
| 121 | |
Manuel Pégourié-Gonnard | 1b08c5f | 2021-09-21 11:21:23 +0200 | [diff] [blame] | 122 | ### PSA-based operations in the Cipher layer |
| 123 | |
Manuel Pégourié-Gonnard | ca91017 | 2021-09-24 10:14:32 +0200 | [diff] [blame] | 124 | There is a new API function `mbedtls_cipher_setup_psa()` to set up a context |
| 125 | that will call PSA to store the key and perform the operations. |
Manuel Pégourié-Gonnard | 1b08c5f | 2021-09-21 11:21:23 +0200 | [diff] [blame] | 126 | |
Manuel Pégourié-Gonnard | b2bd34e | 2022-04-20 15:58:00 +0200 | [diff] [blame] | 127 | This function only worked for a small number of ciphers. It is now deprecated |
| 128 | and it is recommended to use `psa_cipher_xxx()` or `psa_aead_xxx()` functions |
| 129 | directly instead. |
Manuel Pégourié-Gonnard | 1b08c5f | 2021-09-21 11:21:23 +0200 | [diff] [blame] | 130 | |
Manuel Pégourié-Gonnard | b5b27c1 | 2022-06-10 11:09:03 +0200 | [diff] [blame] | 131 | **Warning:** This function will be removed in a future version of Mbed TLS. If |
| 132 | you are using it and would like us to keep it, please let us know about your |
| 133 | use case. |
Manuel Pégourié-Gonnard | 1b08c5f | 2021-09-21 11:21:23 +0200 | [diff] [blame] | 134 | |
| 135 | Internal changes |
| 136 | ---------------- |
| 137 | |
| 138 | All of these internal changes are active as soon as `MBEDTLS_USE_PSA_CRYPTO` |
| 139 | is enabled, no change required on the application side. |
| 140 | |
Manuel Pégourié-Gonnard | b2bd34e | 2022-04-20 15:58:00 +0200 | [diff] [blame] | 141 | ### TLS: most crypto operations based on PSA |
Manuel Pégourié-Gonnard | 1b08c5f | 2021-09-21 11:21:23 +0200 | [diff] [blame] | 142 | |
Manuel Pégourié-Gonnard | b2bd34e | 2022-04-20 15:58:00 +0200 | [diff] [blame] | 143 | Current exceptions: |
Manuel Pégourié-Gonnard | 1b08c5f | 2021-09-21 11:21:23 +0200 | [diff] [blame] | 144 | |
Manuel Pégourié-Gonnard | 55a188b | 2022-12-06 12:00:33 +0100 | [diff] [blame] | 145 | - Finite-field (non-EC) Diffie-Hellman (used in key exchanges: DHE-RSA, |
| 146 | DHE-PSK). |
| 147 | - Restartable operations when `MBEDTLS_ECP_RESTARTABLE` is also enabled (see |
| 148 | the documentation of that option). |
Manuel Pégourié-Gonnard | 1b08c5f | 2021-09-21 11:21:23 +0200 | [diff] [blame] | 149 | |
Manuel Pégourié-Gonnard | b2bd34e | 2022-04-20 15:58:00 +0200 | [diff] [blame] | 150 | Other than the above exceptions, all crypto operations are based on PSA when |
| 151 | `MBEDTLS_USE_PSA_CRYPTO` is enabled. |
Manuel Pégourié-Gonnard | 1b08c5f | 2021-09-21 11:21:23 +0200 | [diff] [blame] | 152 | |
Manuel Pégourié-Gonnard | b2bd34e | 2022-04-20 15:58:00 +0200 | [diff] [blame] | 153 | ### X.509: most crypto operations based on PSA |
Manuel Pégourié-Gonnard | 1b08c5f | 2021-09-21 11:21:23 +0200 | [diff] [blame] | 154 | |
Manuel Pégourié-Gonnard | 55a188b | 2022-12-06 12:00:33 +0100 | [diff] [blame] | 155 | Current exceptions: |
Manuel Pégourié-Gonnard | 1b08c5f | 2021-09-21 11:21:23 +0200 | [diff] [blame] | 156 | |
Manuel Pégourié-Gonnard | 55a188b | 2022-12-06 12:00:33 +0100 | [diff] [blame] | 157 | - Restartable operations when `MBEDTLS_ECP_RESTARTABLE` is also enabled (see |
| 158 | the documentation of that option). |
Manuel Pégourié-Gonnard | 1b08c5f | 2021-09-21 11:21:23 +0200 | [diff] [blame] | 159 | |
Manuel Pégourié-Gonnard | 481846c | 2022-07-12 09:27:39 +0200 | [diff] [blame] | 160 | Other than the above exception, all crypto operations are based on PSA when |
Manuel Pégourié-Gonnard | b2bd34e | 2022-04-20 15:58:00 +0200 | [diff] [blame] | 161 | `MBEDTLS_USE_PSA_CRYPTO` is enabled. |
Manuel Pégourié-Gonnard | 1b08c5f | 2021-09-21 11:21:23 +0200 | [diff] [blame] | 162 | |
Manuel Pégourié-Gonnard | b2bd34e | 2022-04-20 15:58:00 +0200 | [diff] [blame] | 163 | ### PK layer: most crypto operations based on PSA |
Manuel Pégourié-Gonnard | 1b08c5f | 2021-09-21 11:21:23 +0200 | [diff] [blame] | 164 | |
Manuel Pégourié-Gonnard | 55a188b | 2022-12-06 12:00:33 +0100 | [diff] [blame] | 165 | Current exceptions: |
Manuel Pégourié-Gonnard | 1b08c5f | 2021-09-21 11:21:23 +0200 | [diff] [blame] | 166 | |
Manuel Pégourié-Gonnard | a6e0291 | 2022-12-21 09:59:33 +0100 | [diff] [blame] | 167 | - Verification of RSA-PSS signatures with an MGF hash that's different from |
| 168 | the message hash. |
Manuel Pégourié-Gonnard | 55a188b | 2022-12-06 12:00:33 +0100 | [diff] [blame] | 169 | - Restartable operations when `MBEDTLS_ECP_RESTARTABLE` is also enabled (see |
| 170 | the documentation of that option). |
Manuel Pégourié-Gonnard | 1b08c5f | 2021-09-21 11:21:23 +0200 | [diff] [blame] | 171 | |
Manuel Pégourié-Gonnard | a6e0291 | 2022-12-21 09:59:33 +0100 | [diff] [blame] | 172 | Other than the above exceptions, all crypto operations are based on PSA when |
Manuel Pégourié-Gonnard | b2bd34e | 2022-04-20 15:58:00 +0200 | [diff] [blame] | 173 | `MBEDTLS_USE_PSA_CRYPTO` is enabled. |
Manuel Pégourié-Gonnard | 1b08c5f | 2021-09-21 11:21:23 +0200 | [diff] [blame] | 174 | |