blob: 5609fa64a53623f692efe3acef75c65a6e83c678 [file] [log] [blame]
John Durkop6e33dbe2020-09-17 21:15:13 -07001/**
2 * \file mbedtls/config_psa.h
3 * \brief PSA crypto configuration options (set of defines)
4 *
John Durkop34818822020-10-12 21:36:22 -07005 * This set of compile-time options takes settings defined in
6 * include/mbedtls/config.h and include/psa/crypto_config.h and uses
7 * those definitions to define symbols used in the library code.
8 *
9 * Users and integrators should not edit this file, please edit
10 * include/mbedtls/config.h for MBETLS_XXX settings or
11 * include/psa/crypto_config.h for PSA_WANT_XXX settings.
John Durkop6e33dbe2020-09-17 21:15:13 -070012 */
13/*
14 * Copyright The Mbed TLS Contributors
15 * SPDX-License-Identifier: Apache-2.0
16 *
17 * Licensed under the Apache License, Version 2.0 (the "License"); you may
18 * not use this file except in compliance with the License.
19 * You may obtain a copy of the License at
20 *
21 * http://www.apache.org/licenses/LICENSE-2.0
22 *
23 * Unless required by applicable law or agreed to in writing, software
24 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
25 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
26 * See the License for the specific language governing permissions and
27 * limitations under the License.
28 */
29
30#ifndef MBEDTLS_CONFIG_PSA_H
31#define MBEDTLS_CONFIG_PSA_H
32
John Durkop714e3a12020-09-29 22:07:04 -070033#if defined(MBEDTLS_PSA_CRYPTO_CONFIG)
John Durkop6e33dbe2020-09-17 21:15:13 -070034#include "psa/crypto_config.h"
John Durkop76228ac2020-09-29 22:33:49 -070035#endif /* defined(MBEDTLS_PSA_CRYPTO_CONFIG) */
John Durkop6e33dbe2020-09-17 21:15:13 -070036
37#ifdef __cplusplus
38extern "C" {
39#endif
40
Gilles Peskinecf70d072021-04-19 22:24:23 +020041
42
43/****************************************************************/
44/* De facto synonyms */
45/****************************************************************/
46
47#if defined(PSA_WANT_ALG_ECDSA_ANY) && !defined(PSA_WANT_ALG_ECDSA)
48#define PSA_WANT_ALG_ECDSA PSA_WANT_ALG_ECDSA_ANY
49#elif !defined(PSA_WANT_ALG_ECDSA_ANY) && defined(PSA_WANT_ALG_ECDSA)
50#define PSA_WANT_ALG_ECDSA_ANY PSA_WANT_ALG_ECDSA
51#endif
52
53#if defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW) && !defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
54#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW
55#elif !defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW) && defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
56#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW PSA_WANT_ALG_RSA_PKCS1V15_SIGN
57#endif
58
Gilles Peskinea2536092021-10-04 18:33:56 +020059#if defined(PSA_WANT_ALG_RSA_PSS_ANY_SALT) && !defined(PSA_WANT_ALG_RSA_PSS)
60#define PSA_WANT_ALG_RSA_PSS PSA_WANT_ALG_RSA_PSS_ANY_SALT
61#elif !defined(PSA_WANT_ALG_RSA_PSS_ANY_SALT) && defined(PSA_WANT_ALG_RSA_PSS)
62#define PSA_WANT_ALG_RSA_PSS_ANY_SALT PSA_WANT_ALG_RSA_PSS
63#endif
64
Gilles Peskinecf70d072021-04-19 22:24:23 +020065
66
67/****************************************************************/
68/* Require built-in implementations based on PSA requirements */
69/****************************************************************/
70
John Durkop2dfaf9c2020-09-24 04:30:10 -070071#if defined(MBEDTLS_PSA_CRYPTO_CONFIG)
John Durkopd8959392020-09-20 23:09:17 -070072
John Durkopd62b6782020-11-30 21:06:05 -080073#if defined(PSA_WANT_ALG_DETERMINISTIC_ECDSA)
74#if !defined(MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA)
75#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
76#define MBEDTLS_ECDSA_DETERMINISTIC
77#define MBEDTLS_ECDSA_C
78#define MBEDTLS_HMAC_DRBG_C
79#define MBEDTLS_MD_C
80#endif /* !MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA */
81#endif /* PSA_WANT_ALG_DETERMINISTIC_ECDSA */
82
83#if defined(PSA_WANT_ALG_ECDH)
84#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDH)
85#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
86#define MBEDTLS_ECDH_C
87#define MBEDTLS_ECP_C
88#define MBEDTLS_BIGNUM_C
89#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDH */
90#endif /* PSA_WANT_ALG_ECDH */
91
92#if defined(PSA_WANT_ALG_ECDSA)
93#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDSA)
94#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
95#define MBEDTLS_ECDSA_C
Ronald Crond98ec4b2021-04-28 18:28:46 +020096#define MBEDTLS_ECP_C
97#define MBEDTLS_BIGNUM_C
98#define MBEDTLS_ASN1_PARSE_C
99#define MBEDTLS_ASN1_WRITE_C
John Durkopd62b6782020-11-30 21:06:05 -0800100#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDSA */
101#endif /* PSA_WANT_ALG_ECDSA */
102
103#if defined(PSA_WANT_ALG_HKDF)
104#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF)
105#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
106#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
107#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF */
108#endif /* PSA_WANT_ALG_HKDF */
109
110#if defined(PSA_WANT_ALG_HMAC)
111#if !defined(MBEDTLS_PSA_ACCEL_ALG_HMAC)
112#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
113#endif /* !MBEDTLS_PSA_ACCEL_ALG_HMAC */
114#endif /* PSA_WANT_ALG_HMAC */
115
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100116#if defined(PSA_WANT_ALG_MD2) && !defined(MBEDTLS_PSA_ACCEL_ALG_MD2)
117#define MBEDTLS_PSA_BUILTIN_ALG_MD2 1
118#define MBEDTLS_MD2_C
119#endif
120
121#if defined(PSA_WANT_ALG_MD4) && !defined(MBEDTLS_PSA_ACCEL_ALG_MD4)
122#define MBEDTLS_PSA_BUILTIN_ALG_MD4 1
123#define MBEDTLS_MD4_C
124#endif
125
126#if defined(PSA_WANT_ALG_MD5) && !defined(MBEDTLS_PSA_ACCEL_ALG_MD5)
127#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
128#define MBEDTLS_MD5_C
129#endif
130
131#if defined(PSA_WANT_ALG_RIPEMD160) && !defined(MBEDTLS_PSA_ACCEL_ALG_RIPEMD160)
132#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
133#define MBEDTLS_RIPEMD160_C
134#endif
135
John Durkopd62b6782020-11-30 21:06:05 -0800136#if defined(PSA_WANT_ALG_RSA_OAEP)
137#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP)
138#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
139#define MBEDTLS_RSA_C
140#define MBEDTLS_BIGNUM_C
141#define MBEDTLS_OID_C
142#define MBEDTLS_PKCS1_V21
143#define MBEDTLS_MD_C
144#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP */
145#endif /* PSA_WANT_ALG_RSA_OAEP */
146
147#if defined(PSA_WANT_ALG_RSA_PKCS1V15_CRYPT)
148#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT)
149#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
150#define MBEDTLS_RSA_C
151#define MBEDTLS_BIGNUM_C
152#define MBEDTLS_OID_C
153#define MBEDTLS_PKCS1_V15
154#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT */
155#endif /* PSA_WANT_ALG_RSA_PKCS1V15_CRYPT */
156
157#if defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
158#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN)
159#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
160#define MBEDTLS_RSA_C
161#define MBEDTLS_BIGNUM_C
162#define MBEDTLS_OID_C
163#define MBEDTLS_PKCS1_V15
164#define MBEDTLS_MD_C
165#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN */
166#endif /* PSA_WANT_ALG_RSA_PKCS1V15_SIGN */
167
168#if defined(PSA_WANT_ALG_RSA_PSS)
169#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PSS)
170#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
171#define MBEDTLS_RSA_C
172#define MBEDTLS_BIGNUM_C
173#define MBEDTLS_OID_C
174#define MBEDTLS_PKCS1_V21
175#define MBEDTLS_MD_C
176#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PSS */
177#endif /* PSA_WANT_ALG_RSA_PSS */
178
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100179#if defined(PSA_WANT_ALG_SHA_1) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_1)
180#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
181#define MBEDTLS_SHA1_C
182#endif
183
184#if defined(PSA_WANT_ALG_SHA_224) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_224)
185#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
186#define MBEDTLS_SHA256_C
187#endif
188
189#if defined(PSA_WANT_ALG_SHA_256) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_256)
190#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
191#define MBEDTLS_SHA256_C
192#endif
193
194#if defined(PSA_WANT_ALG_SHA_384) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_384)
195#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
196#define MBEDTLS_SHA512_C
197#endif
198
199#if defined(PSA_WANT_ALG_SHA_512) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_512)
200#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
201#define MBEDTLS_SHA512_C
202#endif
203
John Durkop07cc04a2020-11-16 22:08:34 -0800204#if defined(PSA_WANT_ALG_TLS12_PRF)
205#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF)
John Durkopd62b6782020-11-30 21:06:05 -0800206#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
John Durkop07cc04a2020-11-16 22:08:34 -0800207#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF */
208#endif /* PSA_WANT_ALG_TLS12_PRF */
209
210#if defined(PSA_WANT_ALG_TLS12_PSK_TO_MS)
211#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS)
John Durkopd62b6782020-11-30 21:06:05 -0800212#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
John Durkop07cc04a2020-11-16 22:08:34 -0800213#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS */
214#endif /* PSA_WANT_ALG_TLS12_PSK_TO_MS */
215
216#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR)
217#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR)
John Durkopd62b6782020-11-30 21:06:05 -0800218#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR 1
John Durkop07cc04a2020-11-16 22:08:34 -0800219#define MBEDTLS_ECP_C
220#define MBEDTLS_BIGNUM_C
221#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR */
222#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR */
223
224#if defined(PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY)
225#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800226#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
John Durkop07cc04a2020-11-16 22:08:34 -0800227#define MBEDTLS_ECP_C
228#define MBEDTLS_BIGNUM_C
229#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY */
230#endif /* PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY */
231
John Durkop9814fa22020-11-04 12:28:15 -0800232#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR)
John Durkop0e005192020-10-31 22:06:54 -0700233#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR)
John Durkopd62b6782020-11-30 21:06:05 -0800234#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR 1
John Durkop0e005192020-10-31 22:06:54 -0700235#define MBEDTLS_RSA_C
236#define MBEDTLS_BIGNUM_C
237#define MBEDTLS_OID_C
238#define MBEDTLS_GENPRIME
John Durkop07cc04a2020-11-16 22:08:34 -0800239#define MBEDTLS_PK_PARSE_C
240#define MBEDTLS_PK_WRITE_C
241#define MBEDTLS_PK_C
Ronald Crond98ec4b2021-04-28 18:28:46 +0200242#define MBEDTLS_ASN1_PARSE_C
243#define MBEDTLS_ASN1_WRITE_C
John Durkop0e005192020-10-31 22:06:54 -0700244#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR */
John Durkop9814fa22020-11-04 12:28:15 -0800245#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR */
246
247#if defined(PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkop0e005192020-10-31 22:06:54 -0700248#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800249#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
John Durkop0e005192020-10-31 22:06:54 -0700250#define MBEDTLS_RSA_C
251#define MBEDTLS_BIGNUM_C
252#define MBEDTLS_OID_C
John Durkop07cc04a2020-11-16 22:08:34 -0800253#define MBEDTLS_PK_PARSE_C
254#define MBEDTLS_PK_WRITE_C
255#define MBEDTLS_PK_C
Ronald Crond98ec4b2021-04-28 18:28:46 +0200256#define MBEDTLS_ASN1_PARSE_C
257#define MBEDTLS_ASN1_WRITE_C
John Durkop0e005192020-10-31 22:06:54 -0700258#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkop9814fa22020-11-04 12:28:15 -0800259#endif /* PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkopd0321952020-10-29 21:37:36 -0700260
David Brownb781f752021-02-08 15:44:52 -0700261/* If any of the block modes are requested that don't have an
262 * associated HW assist, define PSA_HAVE_SOFT_BLOCK_MODE for checking
263 * in the block cipher key types. */
264#if (defined(PSA_WANT_ALG_CTR) && !defined(MBEDTLS_PSA_ACCEL_ALG_CTR)) || \
Bence Szépkúti7921cce2021-02-17 11:46:50 +0100265 (defined(PSA_WANT_ALG_CFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_CFB)) || \
David Brownb781f752021-02-08 15:44:52 -0700266 (defined(PSA_WANT_ALG_OFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_OFB)) || \
267 (defined(PSA_WANT_ALG_XTS) && !defined(MBEDTLS_PSA_ACCEL_ALG_XTS)) || \
268 defined(PSA_WANT_ALG_ECB_NO_PADDING) || \
269 (defined(PSA_WANT_ALG_CBC_NO_PADDING) && \
270 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING)) || \
271 (defined(PSA_WANT_ALG_CBC_PKCS7) && \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100272 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7)) || \
273 (defined(PSA_WANT_ALG_CMAC) && !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC))
David Brownb781f752021-02-08 15:44:52 -0700274#define PSA_HAVE_SOFT_BLOCK_MODE 1
275#endif
276
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100277#if (defined(PSA_WANT_ALG_GCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_GCM)) || \
278 (defined(PSA_WANT_ALG_CCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_CCM))
279#define PSA_HAVE_SOFT_BLOCK_AEAD 1
280#endif
281
David Brown94933082021-01-05 12:03:25 -0700282#if defined(PSA_WANT_KEY_TYPE_AES)
David Browne1f91f02021-02-09 15:56:22 -0700283#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_AES)
284#define PSA_HAVE_SOFT_KEY_TYPE_AES 1
285#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_AES */
286#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100287 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
288 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
David Brown78a429b2021-01-21 09:48:57 -0700289#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700290#define MBEDTLS_AES_C
David Browne1f91f02021-02-09 15:56:22 -0700291#endif /* PSA_HAVE_SOFT_KEY_TYPE_AES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown94933082021-01-05 12:03:25 -0700292#endif /* PSA_WANT_KEY_TYPE_AES */
293
David Brownec258cf2021-01-05 12:03:25 -0700294#if defined(PSA_WANT_KEY_TYPE_ARC4)
295#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ARC4)
David Brown78a429b2021-01-21 09:48:57 -0700296#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARC4 1
David Brownec258cf2021-01-05 12:03:25 -0700297#define MBEDTLS_ARC4_C
298#endif /*!MBEDTLS_PSA_ACCEL_KEY_TYPE_ARC4 */
299#endif /* PSA_WANT_KEY_TYPE_ARC4 */
300
Gilles Peskine0d3d7422021-10-08 15:48:16 +0200301#if defined(PSA_WANT_KEY_TYPE_ARIA)
302#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA)
303#define PSA_HAVE_SOFT_KEY_TYPE_ARIA 1
304#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA */
305#if defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
306 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
307 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
308#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
309#define MBEDTLS_ARIA_C
310#endif /* PSA_HAVE_SOFT_KEY_TYPE_ARIA || PSA_HAVE_SOFT_BLOCK_MODE */
311#endif /* PSA_WANT_KEY_TYPE_ARIA */
312
David Brown686e6e82021-01-05 12:03:25 -0700313#if defined(PSA_WANT_KEY_TYPE_CAMELLIA)
David Browne1f91f02021-02-09 15:56:22 -0700314#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA)
315#define PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA 1
316#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA */
317#if defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100318 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
319 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
David Brown78a429b2021-01-21 09:48:57 -0700320#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700321#define MBEDTLS_CAMELLIA_C
David Browne1f91f02021-02-09 15:56:22 -0700322#endif /* PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown686e6e82021-01-05 12:03:25 -0700323#endif /* PSA_WANT_KEY_TYPE_CAMELLIA */
324
David Brownb65a7f72021-01-15 12:04:09 -0700325#if defined(PSA_WANT_KEY_TYPE_DES)
David Browne1f91f02021-02-09 15:56:22 -0700326#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DES)
327#define PSA_HAVE_SOFT_KEY_TYPE_DES 1
328#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DES */
329#if defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
David Brownb781f752021-02-08 15:44:52 -0700330 defined(PSA_HAVE_SOFT_BLOCK_MODE)
David Brown78a429b2021-01-21 09:48:57 -0700331#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700332#define MBEDTLS_DES_C
David Browne1f91f02021-02-09 15:56:22 -0700333#endif /*PSA_HAVE_SOFT_KEY_TYPE_DES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brownb65a7f72021-01-15 12:04:09 -0700334#endif /* PSA_WANT_KEY_TYPE_DES */
335
David Brownb16727a2021-02-08 16:31:46 -0700336#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
337#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20)
338#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
339#define MBEDTLS_CHACHA20_C
340#endif /*!MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20 */
341#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
342
David Brownf84a0f62021-02-09 15:59:41 -0700343/* If any of the software block ciphers are selected, define
344 * PSA_HAVE_SOFT_BLOCK_CIPHER, which can be used in any of these
345 * situations. */
346#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine0d3d7422021-10-08 15:48:16 +0200347 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
David Brownf84a0f62021-02-09 15:59:41 -0700348 defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
349 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
350#define PSA_HAVE_SOFT_BLOCK_CIPHER 1
351#endif
352
David Brown99844272021-01-15 12:04:47 -0700353#if defined(PSA_WANT_ALG_STREAM_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700354#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brown99844272021-01-15 12:04:47 -0700355#endif /* PSA_WANT_ALG_STREAM_CIPHER */
356
Ronald Crond85e98d2021-03-25 15:32:32 +0100357#if defined(PSA_WANT_ALG_CBC_MAC)
358#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_MAC)
359#error "CBC-MAC is not yet supported via the PSA API in Mbed TLS."
360#define MBEDTLS_PSA_BUILTIN_ALG_CBC_MAC 1
361#endif /* !MBEDTLS_PSA_ACCEL_ALG_CBC_MAC */
362#endif /* PSA_WANT_ALG_CBC_MAC */
363
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100364#if defined(PSA_WANT_ALG_CMAC)
365#if !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC) || \
366 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
367#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
368#define MBEDTLS_CMAC_C
369#endif /* !MBEDTLS_PSA_ACCEL_ALG_CMAC */
370#endif /* PSA_WANT_ALG_CMAC */
371
David Brown99844272021-01-15 12:04:47 -0700372#if defined(PSA_WANT_ALG_CTR)
David Brown4b9ec7a2021-02-05 12:47:08 -0700373#if !defined(MBEDTLS_PSA_ACCEL_ALG_CTR) || \
David Brownf84a0f62021-02-09 15:59:41 -0700374 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700375#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700376#define MBEDTLS_CIPHER_MODE_CTR
David Brown4b9ec7a2021-02-05 12:47:08 -0700377#endif
David Brown99844272021-01-15 12:04:47 -0700378#endif /* PSA_WANT_ALG_CTR */
379
380#if defined(PSA_WANT_ALG_CFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700381#if !defined(MBEDTLS_PSA_ACCEL_ALG_CFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700382 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700383#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700384#define MBEDTLS_CIPHER_MODE_CFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700385#endif
David Brown99844272021-01-15 12:04:47 -0700386#endif /* PSA_WANT_ALG_CFB */
387
388#if defined(PSA_WANT_ALG_OFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700389#if !defined(MBEDTLS_PSA_ACCEL_ALG_OFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700390 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700391#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700392#define MBEDTLS_CIPHER_MODE_OFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700393#endif
David Brown99844272021-01-15 12:04:47 -0700394#endif /* PSA_WANT_ALG_OFB */
395
396#if defined(PSA_WANT_ALG_XTS)
David Brown4b9ec7a2021-02-05 12:47:08 -0700397#if !defined(MBEDTLS_PSA_ACCEL_ALG_XTS) || \
David Brownf84a0f62021-02-09 15:59:41 -0700398 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700399#define MBEDTLS_PSA_BUILTIN_ALG_XTS 1
David Brown99844272021-01-15 12:04:47 -0700400#define MBEDTLS_CIPHER_MODE_XTS
David Brown4b9ec7a2021-02-05 12:47:08 -0700401#endif
David Brown99844272021-01-15 12:04:47 -0700402#endif /* PSA_WANT_ALG_XTS */
403
404#if defined(PSA_WANT_ALG_ECB_NO_PADDING)
David Brownbe380c12021-02-11 10:55:48 -0700405#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700406#endif
407
David Brown12f45f92021-01-26 11:50:36 -0700408#if defined(PSA_WANT_ALG_CBC_NO_PADDING)
David Brown4b9ec7a2021-02-05 12:47:08 -0700409#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING) || \
David Brownfc468182021-02-09 16:23:34 -0700410 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700411#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700412#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown4b9ec7a2021-02-05 12:47:08 -0700413#endif
David Brown12f45f92021-01-26 11:50:36 -0700414#endif /* PSA_WANT_ALG_CBC_NO_PADDING */
415
416#if defined(PSA_WANT_ALG_CBC_PKCS7)
David Brown4b9ec7a2021-02-05 12:47:08 -0700417#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7) || \
David Brownfc468182021-02-09 16:23:34 -0700418 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700419#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700420#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brownfc468182021-02-09 16:23:34 -0700421#define MBEDTLS_CIPHER_PADDING_PKCS7
David Brown4b9ec7a2021-02-05 12:47:08 -0700422#endif
David Brown12f45f92021-01-26 11:50:36 -0700423#endif /* PSA_WANT_ALG_CBC_PKCS7 */
424
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100425#if defined(PSA_WANT_ALG_CCM)
426#if !defined(MBEDTLS_PSA_ACCEL_ALG_CCM) || \
427 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine0d3d7422021-10-08 15:48:16 +0200428 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100429 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
430#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
431#define MBEDTLS_CCM_C
432#endif
433#endif /* PSA_WANT_ALG_CCM */
434
435#if defined(PSA_WANT_ALG_GCM)
436#if !defined(MBEDTLS_PSA_ACCEL_ALG_GCM) || \
437 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine0d3d7422021-10-08 15:48:16 +0200438 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100439 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
440#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
441#define MBEDTLS_GCM_C
442#endif
443#endif /* PSA_WANT_ALG_GCM */
444
David Brownac4fa072021-02-08 16:47:35 -0700445#if defined(PSA_WANT_ALG_CHACHA20_POLY1305)
Ronald Crond98ec4b2021-04-28 18:28:46 +0200446#if !defined(MBEDTLS_PSA_ACCEL_ALG_CHACHA20_POLY1305)
David Brownac4fa072021-02-08 16:47:35 -0700447#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
448#define MBEDTLS_CHACHAPOLY_C
David Brown86730a82021-02-09 16:24:11 -0700449#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700450#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
Ronald Crond98ec4b2021-04-28 18:28:46 +0200451#endif /* !MBEDTLS_PSA_ACCEL_ALG_CHACHA20_POLY1305 */
David Brownac4fa072021-02-08 16:47:35 -0700452#endif /* PSA_WANT_ALG_CHACHA20_POLY1305 */
453
David Browneed74df2021-03-15 15:53:57 -0600454#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_256)
455#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256)
456#define MBEDTLS_ECP_DP_BP256R1_ENABLED
457#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
458#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256 */
459#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_256 */
460
461#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_384)
462#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384)
463#define MBEDTLS_ECP_DP_BP384R1_ENABLED
464#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
465#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384 */
466#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_384 */
467
468#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_512)
469#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512)
470#define MBEDTLS_ECP_DP_BP512R1_ENABLED
471#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
472#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512 */
473#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_512 */
474
475#if defined(PSA_WANT_ECC_MONTGOMERY_255)
476#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255)
477#define MBEDTLS_ECP_DP_CURVE25519_ENABLED
478#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
479#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255 */
480#endif /* PSA_WANT_ECC_MONTGOMERY_255 */
481
482#if defined(PSA_WANT_ECC_MONTGOMERY_448)
483#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448)
Ronald Crone1f55162021-03-25 15:09:47 +0100484/*
485 * Curve448 is not yet supported via the PSA API in Mbed TLS
Dave Rodgman52af7692022-03-31 14:27:24 +0100486 * (https://github.com/Mbed-TLS/mbedtls/issues/4249).
Ronald Crone1f55162021-03-25 15:09:47 +0100487 */
488#error "Curve448 is not yet supported via the PSA API in Mbed TLS."
David Browneed74df2021-03-15 15:53:57 -0600489#define MBEDTLS_ECP_DP_CURVE448_ENABLED
490#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
491#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448 */
492#endif /* PSA_WANT_ECC_MONTGOMERY_448 */
493
David Brownc7b9b2b2021-02-19 21:05:52 -0700494#if defined(PSA_WANT_ECC_SECP_R1_192)
495#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192)
496#define MBEDTLS_ECP_DP_SECP192R1_ENABLED
497#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
498#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192 */
499#endif /* PSA_WANT_ECC_SECP_R1_192 */
500
501#if defined(PSA_WANT_ECC_SECP_R1_224)
502#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224)
503#define MBEDTLS_ECP_DP_SECP224R1_ENABLED
504#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
505#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224 */
506#endif /* PSA_WANT_ECC_SECP_R1_224 */
507
508#if defined(PSA_WANT_ECC_SECP_R1_256)
509#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256)
510#define MBEDTLS_ECP_DP_SECP256R1_ENABLED
511#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
512#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256 */
513#endif /* PSA_WANT_ECC_SECP_R1_256 */
514
515#if defined(PSA_WANT_ECC_SECP_R1_384)
516#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384)
517#define MBEDTLS_ECP_DP_SECP384R1_ENABLED
518#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
519#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384 */
520#endif /* PSA_WANT_ECC_SECP_R1_384 */
521
522#if defined(PSA_WANT_ECC_SECP_R1_521)
523#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521)
524#define MBEDTLS_ECP_DP_SECP521R1_ENABLED
525#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
526#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521 */
527#endif /* PSA_WANT_ECC_SECP_R1_521 */
528
529#if defined(PSA_WANT_ECC_SECP_K1_192)
530#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192)
David Brown8de143e2021-02-19 14:08:00 -0700531#define MBEDTLS_ECP_DP_SECP192K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700532#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
533#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192 */
534#endif /* PSA_WANT_ECC_SECP_K1_192 */
David Brown8de143e2021-02-19 14:08:00 -0700535
David Brownc7b9b2b2021-02-19 21:05:52 -0700536#if defined(PSA_WANT_ECC_SECP_K1_224)
537#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224)
Ronald Crone1f55162021-03-25 15:09:47 +0100538/*
539 * SECP224K1 is buggy via the PSA API in Mbed TLS
Dave Rodgman52af7692022-03-31 14:27:24 +0100540 * (https://github.com/Mbed-TLS/mbedtls/issues/3541).
Ronald Crone1f55162021-03-25 15:09:47 +0100541 */
542#error "SECP224K1 is buggy via the PSA API in Mbed TLS."
David Brown8de143e2021-02-19 14:08:00 -0700543#define MBEDTLS_ECP_DP_SECP224K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700544#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
545#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224 */
546#endif /* PSA_WANT_ECC_SECP_K1_224 */
David Brown8de143e2021-02-19 14:08:00 -0700547
David Brownc7b9b2b2021-02-19 21:05:52 -0700548#if defined(PSA_WANT_ECC_SECP_K1_256)
549#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256)
David Brown9b178de2021-03-10 13:14:48 -0700550#define MBEDTLS_ECP_DP_SECP256K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700551#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
552#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256 */
553#endif /* PSA_WANT_ECC_SECP_K1_256 */
David Brown8de143e2021-02-19 14:08:00 -0700554
Gilles Peskinecf70d072021-04-19 22:24:23 +0200555
556
557/****************************************************************/
558/* Infer PSA requirements from Mbed TLS capabilities */
559/****************************************************************/
560
John Durkop714e3a12020-09-29 22:07:04 -0700561#else /* MBEDTLS_PSA_CRYPTO_CONFIG */
562
563/*
564 * Ensure PSA_WANT_* defines are setup properly if MBEDTLS_PSA_CRYPTO_CONFIG
565 * is not defined
566 */
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100567
Ronald Cron3d471812021-03-18 13:40:31 +0100568#if defined(MBEDTLS_CCM_C)
569#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
570#define PSA_WANT_ALG_CCM 1
571#endif /* MBEDTLS_CCM_C */
572
573#if defined(MBEDTLS_CMAC_C)
574#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
575#define PSA_WANT_ALG_CMAC 1
576#endif /* MBEDTLS_CMAC_C */
577
John Durkopd62b6782020-11-30 21:06:05 -0800578#if defined(MBEDTLS_ECDH_C)
579#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
580#define PSA_WANT_ALG_ECDH 1
581#endif /* MBEDTLS_ECDH_C */
582
583#if defined(MBEDTLS_ECDSA_C)
584#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
585#define PSA_WANT_ALG_ECDSA 1
Gilles Peskinecf70d072021-04-19 22:24:23 +0200586#define PSA_WANT_ALG_ECDSA_ANY 1
John Durkopd62b6782020-11-30 21:06:05 -0800587
588// Only add in DETERMINISTIC support if ECDSA is also enabled
589#if defined(MBEDTLS_ECDSA_DETERMINISTIC)
590#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
591#define PSA_WANT_ALG_DETERMINISTIC_ECDSA 1
592#endif /* MBEDTLS_ECDSA_DETERMINISTIC */
593
594#endif /* MBEDTLS_ECDSA_C */
595
596#if defined(MBEDTLS_ECP_C)
597#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR 1
598#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR 1
599#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
600#define PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY 1
601#endif /* MBEDTLS_ECP_C */
602
Ronald Cron3d471812021-03-18 13:40:31 +0100603#if defined(MBEDTLS_GCM_C)
604#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
605#define PSA_WANT_ALG_GCM 1
606#endif /* MBEDTLS_GCM_C */
607
John Durkopd62b6782020-11-30 21:06:05 -0800608#if defined(MBEDTLS_HKDF_C)
609#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
610#define PSA_WANT_ALG_HMAC 1
611#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
612#define PSA_WANT_ALG_HKDF 1
613#endif /* MBEDTLS_HKDF_C */
614
615#if defined(MBEDTLS_MD_C)
616#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
617#define PSA_WANT_ALG_HMAC 1
Gilles Peskine47a89332021-01-12 00:00:15 +0100618#define PSA_WANT_KEY_TYPE_HMAC
John Durkopd62b6782020-11-30 21:06:05 -0800619#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
620#define PSA_WANT_ALG_TLS12_PRF 1
621#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
622#define PSA_WANT_ALG_TLS12_PSK_TO_MS 1
623#endif /* MBEDTLS_MD_C */
624
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100625#if defined(MBEDTLS_MD2_C)
626#define MBEDTLS_PSA_BUILTIN_ALG_MD2 1
627#define PSA_WANT_ALG_MD2 1
628#endif
629
630#if defined(MBEDTLS_MD4_C)
631#define MBEDTLS_PSA_BUILTIN_ALG_MD4 1
632#define PSA_WANT_ALG_MD4 1
633#endif
634
635#if defined(MBEDTLS_MD5_C)
636#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
637#define PSA_WANT_ALG_MD5 1
638#endif
639
640#if defined(MBEDTLS_RIPEMD160_C)
641#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
642#define PSA_WANT_ALG_RIPEMD160 1
643#endif
644
John Durkopd62b6782020-11-30 21:06:05 -0800645#if defined(MBEDTLS_RSA_C)
646#if defined(MBEDTLS_PKCS1_V15)
647#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
648#define PSA_WANT_ALG_RSA_PKCS1V15_CRYPT 1
649#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
650#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN 1
Gilles Peskinecf70d072021-04-19 22:24:23 +0200651#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW 1
Yuto Takano5b4caf22021-08-10 11:26:15 +0100652#endif /* MBEDTLS_PKCS1_V15 */
John Durkopd62b6782020-11-30 21:06:05 -0800653#if defined(MBEDTLS_PKCS1_V21)
654#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
655#define PSA_WANT_ALG_RSA_OAEP 1
656#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
657#define PSA_WANT_ALG_RSA_PSS 1
658#endif /* MBEDTLS_PKCS1_V21 */
659#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR 1
660#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR 1
661#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
662#define PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY 1
663#endif /* MBEDTLS_RSA_C */
664
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100665#if defined(MBEDTLS_SHA1_C)
666#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
667#define PSA_WANT_ALG_SHA_1 1
668#endif
669
670#if defined(MBEDTLS_SHA256_C)
671#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
672#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
Gilles Peskineb65db072021-01-12 00:00:53 +0100673#define PSA_WANT_ALG_SHA_224 1
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100674#define PSA_WANT_ALG_SHA_256 1
675#endif
676
677#if defined(MBEDTLS_SHA512_C)
678#if !defined(MBEDTLS_SHA512_NO_SHA384)
679#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
680#define PSA_WANT_ALG_SHA_384 1
681#endif
682#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
683#define PSA_WANT_ALG_SHA_512 1
684#endif
685
David Brown94933082021-01-05 12:03:25 -0700686#if defined(MBEDTLS_AES_C)
687#define PSA_WANT_KEY_TYPE_AES 1
David Brownda7dbb72021-01-26 11:44:15 -0700688#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700689#endif
690
David Brownec258cf2021-01-05 12:03:25 -0700691#if defined(MBEDTLS_ARC4_C)
692#define PSA_WANT_KEY_TYPE_ARC4 1
David Brown99844272021-01-15 12:04:47 -0700693#define PSA_WANT_ALG_STREAM_CIPHER 1
David Brownda7dbb72021-01-26 11:44:15 -0700694#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARC4 1
David Brown12f45f92021-01-26 11:50:36 -0700695#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brownec258cf2021-01-05 12:03:25 -0700696#endif
697
Gilles Peskine0d3d7422021-10-08 15:48:16 +0200698#if defined(MBEDTLS_ARIA_C)
699#define PSA_WANT_KEY_TYPE_ARIA 1
700#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
701#endif
702
David Brown686e6e82021-01-05 12:03:25 -0700703#if defined(MBEDTLS_CAMELLIA_C)
704#define PSA_WANT_KEY_TYPE_CAMELLIA 1
David Brownda7dbb72021-01-26 11:44:15 -0700705#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700706#endif
707
David Brownb65a7f72021-01-15 12:04:09 -0700708#if defined(MBEDTLS_DES_C)
709#define PSA_WANT_KEY_TYPE_DES 1
David Brownda7dbb72021-01-26 11:44:15 -0700710#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700711#endif
712
David Brownb16727a2021-02-08 16:31:46 -0700713#if defined(MBEDTLS_CHACHA20_C)
714#define PSA_WANT_KEY_TYPE_CHACHA20 1
715#define PSA_WANT_ALG_STREAM_CIPHER 1
716#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
717#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brownac4fa072021-02-08 16:47:35 -0700718#if defined(MBEDTLS_CHACHAPOLY_C)
719#define PSA_WANT_ALG_CHACHA20_POLY1305 1
David Brown86730a82021-02-09 16:24:11 -0700720#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700721#endif
David Brownb16727a2021-02-08 16:31:46 -0700722#endif
723
David Brown99844272021-01-15 12:04:47 -0700724#if defined(MBEDTLS_CIPHER_MODE_CBC)
David Brown10cb81c2021-02-09 16:10:29 -0700725#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700726#define PSA_WANT_ALG_CBC_NO_PADDING 1
727#if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
David Brown12f45f92021-01-26 11:50:36 -0700728#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brown99844272021-01-15 12:04:47 -0700729#define PSA_WANT_ALG_CBC_PKCS7 1
730#endif
731#endif
732
733#if defined(MBEDTLS_AES_C) || defined(MBEDTLS_DES_C) || \
Gilles Peskine0d3d7422021-10-08 15:48:16 +0200734 defined(MBEDTLS_ARIA_C) || defined(MBEDTLS_CAMELLIA_C)
David Brown10cb81c2021-02-09 16:10:29 -0700735#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700736#define PSA_WANT_ALG_ECB_NO_PADDING 1
737#endif
738
739#if defined(MBEDTLS_CIPHER_MODE_CFB)
David Brown12f45f92021-01-26 11:50:36 -0700740#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700741#define PSA_WANT_ALG_CFB 1
742#endif
743
744#if defined(MBEDTLS_CIPHER_MODE_CTR)
David Brown12f45f92021-01-26 11:50:36 -0700745#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700746#define PSA_WANT_ALG_CTR 1
747#endif
748
749#if defined(MBEDTLS_CIPHER_MODE_OFB)
David Brown12f45f92021-01-26 11:50:36 -0700750#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700751#define PSA_WANT_ALG_OFB 1
752#endif
753
754#if defined(MBEDTLS_CIPHER_MODE_XTS)
David Brown12f45f92021-01-26 11:50:36 -0700755#define MBEDTLS_PSA_BUILTIN_ALG_XTS 1
David Brown99844272021-01-15 12:04:47 -0700756#define PSA_WANT_ALG_XTS 1
757#endif
758
David Browneed74df2021-03-15 15:53:57 -0600759#if defined(MBEDTLS_ECP_DP_BP256R1_ENABLED)
760#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
761#define PSA_WANT_ECC_BRAINPOOL_P_R1_256
762#endif
763
764#if defined(MBEDTLS_ECP_DP_BP384R1_ENABLED)
765#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
766#define PSA_WANT_ECC_BRAINPOOL_P_R1_384
767#endif
768
769#if defined(MBEDTLS_ECP_DP_BP512R1_ENABLED)
770#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
771#define PSA_WANT_ECC_BRAINPOOL_P_R1_512
772#endif
773
774#if defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED)
775#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
776#define PSA_WANT_ECC_MONTGOMERY_255
777#endif
778
Dave Rodgman52af7692022-03-31 14:27:24 +0100779/* Curve448 is not yet supported via the PSA API (https://github.com/Mbed-TLS/mbedtls/issues/4249) */
Gilles Peskine82769862021-03-23 12:06:16 +0100780#if 0 && defined(MBEDTLS_ECP_DP_CURVE448_ENABLED)
David Browneed74df2021-03-15 15:53:57 -0600781#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
782#define PSA_WANT_ECC_MONTGOMERY_448
783#endif
784
David Brown8de143e2021-02-19 14:08:00 -0700785#if defined(MBEDTLS_ECP_DP_SECP192R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700786#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
787#define PSA_WANT_ECC_SECP_R1_192
David Brown8de143e2021-02-19 14:08:00 -0700788#endif
789
790#if defined(MBEDTLS_ECP_DP_SECP224R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700791#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
792#define PSA_WANT_ECC_SECP_R1_224
David Brown8de143e2021-02-19 14:08:00 -0700793#endif
794
795#if defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700796#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
797#define PSA_WANT_ECC_SECP_R1_256
David Brown8de143e2021-02-19 14:08:00 -0700798#endif
799
800#if defined(MBEDTLS_ECP_DP_SECP384R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700801#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
802#define PSA_WANT_ECC_SECP_R1_384
David Brown8de143e2021-02-19 14:08:00 -0700803#endif
804
805#if defined(MBEDTLS_ECP_DP_SECP521R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700806#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
807#define PSA_WANT_ECC_SECP_R1_521
David Brown8de143e2021-02-19 14:08:00 -0700808#endif
809
810#if defined(MBEDTLS_ECP_DP_SECP192K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700811#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
812#define PSA_WANT_ECC_SECP_K1_192
David Brown8de143e2021-02-19 14:08:00 -0700813#endif
814
Dave Rodgman52af7692022-03-31 14:27:24 +0100815/* SECP224K1 is buggy via the PSA API (https://github.com/Mbed-TLS/mbedtls/issues/3541) */
Gilles Peskine39841302021-03-23 12:06:45 +0100816#if 0 && defined(MBEDTLS_ECP_DP_SECP224K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700817#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
818#define PSA_WANT_ECC_SECP_K1_224
David Brown8de143e2021-02-19 14:08:00 -0700819#endif
820
David Brown9b178de2021-03-10 13:14:48 -0700821#if defined(MBEDTLS_ECP_DP_SECP256K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700822#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
823#define PSA_WANT_ECC_SECP_K1_256
David Brown8de143e2021-02-19 14:08:00 -0700824#endif
825
John Durkop2dfaf9c2020-09-24 04:30:10 -0700826#endif /* MBEDTLS_PSA_CRYPTO_CONFIG */
John Durkopd8959392020-09-20 23:09:17 -0700827
Gilles Peskine60b29fe2021-02-16 14:06:50 +0100828/* These features are always enabled. */
829#define PSA_WANT_KEY_TYPE_DERIVE 1
830#define PSA_WANT_KEY_TYPE_RAW_DATA 1
831
John Durkop6e33dbe2020-09-17 21:15:13 -0700832#ifdef __cplusplus
833}
834#endif
835
836#endif /* MBEDTLS_CONFIG_PSA_H */