John Durkop | 6e33dbe | 2020-09-17 21:15:13 -0700 | [diff] [blame] | 1 | /** |
| 2 | * \file psa/crypto_config.h |
| 3 | * \brief PSA crypto configuration options (set of defines) |
| 4 | * |
John Durkop | 7b45313 | 2020-10-12 21:56:26 -0700 | [diff] [blame] | 5 | */ |
John Durkop | c7c03b7 | 2020-10-12 21:42:03 -0700 | [diff] [blame] | 6 | #if defined(MBEDTLS_PSA_CRYPTO_CONFIG) |
| 7 | /** |
Bence Szépkúti | bb0cfeb | 2021-05-28 09:42:25 +0200 | [diff] [blame] | 8 | * When #MBEDTLS_PSA_CRYPTO_CONFIG is enabled in mbedtls_config.h, |
John Durkop | c7c03b7 | 2020-10-12 21:42:03 -0700 | [diff] [blame] | 9 | * this file determines which cryptographic mechanisms are enabled |
| 10 | * through the PSA Cryptography API (\c psa_xxx() functions). |
| 11 | * |
| 12 | * To enable a cryptographic mechanism, uncomment the definition of |
| 13 | * the corresponding \c PSA_WANT_xxx preprocessor symbol. |
| 14 | * To disable a cryptographic mechanism, comment out the definition of |
| 15 | * the corresponding \c PSA_WANT_xxx preprocessor symbol. |
| 16 | * The names of cryptographic mechanisms correspond to values |
| 17 | * defined in psa/crypto_values.h, with the prefix \c PSA_WANT_ instead |
| 18 | * of \c PSA_. |
| 19 | * |
| 20 | * Note that many cryptographic mechanisms involve two symbols: one for |
| 21 | * the key type (\c PSA_WANT_KEY_TYPE_xxx) and one for the algorithm |
| 22 | * (\c PSA_WANT_ALG_xxx). Mechanisms with additional parameters may involve |
| 23 | * additional symbols. |
John Durkop | 6e33dbe | 2020-09-17 21:15:13 -0700 | [diff] [blame] | 24 | */ |
John Durkop | c7c03b7 | 2020-10-12 21:42:03 -0700 | [diff] [blame] | 25 | #else |
| 26 | /** |
Bence Szépkúti | bb0cfeb | 2021-05-28 09:42:25 +0200 | [diff] [blame] | 27 | * When \c MBEDTLS_PSA_CRYPTO_CONFIG is disabled in mbedtls_config.h, |
John Durkop | c7c03b7 | 2020-10-12 21:42:03 -0700 | [diff] [blame] | 28 | * this file is not used, and cryptographic mechanisms are supported |
| 29 | * through the PSA API if and only if they are supported through the |
| 30 | * mbedtls_xxx API. |
| 31 | */ |
| 32 | #endif |
John Durkop | 6e33dbe | 2020-09-17 21:15:13 -0700 | [diff] [blame] | 33 | /* |
| 34 | * Copyright The Mbed TLS Contributors |
| 35 | * SPDX-License-Identifier: Apache-2.0 |
| 36 | * |
| 37 | * Licensed under the Apache License, Version 2.0 (the "License"); you may |
| 38 | * not use this file except in compliance with the License. |
| 39 | * You may obtain a copy of the License at |
| 40 | * |
| 41 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 42 | * |
| 43 | * Unless required by applicable law or agreed to in writing, software |
| 44 | * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| 45 | * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 46 | * See the License for the specific language governing permissions and |
| 47 | * limitations under the License. |
| 48 | */ |
| 49 | |
| 50 | #ifndef PSA_CRYPTO_CONFIG_H |
| 51 | #define PSA_CRYPTO_CONFIG_H |
| 52 | |
Ronald Cron | d85e98d | 2021-03-25 15:32:32 +0100 | [diff] [blame] | 53 | /* |
| 54 | * CBC-MAC is not yet supported via the PSA API in Mbed TLS. |
| 55 | */ |
| 56 | //#define PSA_WANT_ALG_CBC_MAC 1 |
David Brown | a9f1d83 | 2021-01-15 11:40:25 -0700 | [diff] [blame] | 57 | #define PSA_WANT_ALG_CBC_NO_PADDING 1 |
| 58 | #define PSA_WANT_ALG_CBC_PKCS7 1 |
Ronald Cron | 3d47181 | 2021-03-18 13:40:31 +0100 | [diff] [blame] | 59 | #define PSA_WANT_ALG_CCM 1 |
Gilles Peskine | ecaa7ca | 2022-12-15 22:16:00 +0100 | [diff] [blame] | 60 | #define PSA_WANT_ALG_CCM_STAR_NO_TAG 1 |
Steven Cooreman | 939102e | 2021-03-22 15:09:44 +0100 | [diff] [blame] | 61 | #define PSA_WANT_ALG_CMAC 1 |
David Brown | a9f1d83 | 2021-01-15 11:40:25 -0700 | [diff] [blame] | 62 | #define PSA_WANT_ALG_CFB 1 |
David Brown | 9a594e8 | 2021-02-16 12:57:27 -0700 | [diff] [blame] | 63 | #define PSA_WANT_ALG_CHACHA20_POLY1305 1 |
| 64 | #define PSA_WANT_ALG_CTR 1 |
John Durkop | 0ea39e0 | 2020-10-13 19:58:20 -0700 | [diff] [blame] | 65 | #define PSA_WANT_ALG_DETERMINISTIC_ECDSA 1 |
David Brown | a9f1d83 | 2021-01-15 11:40:25 -0700 | [diff] [blame] | 66 | #define PSA_WANT_ALG_ECB_NO_PADDING 1 |
John Durkop | d032195 | 2020-10-29 21:37:36 -0700 | [diff] [blame] | 67 | #define PSA_WANT_ALG_ECDH 1 |
Przemek Stekiel | eb511a4 | 2023-04-28 13:20:16 +0200 | [diff] [blame] | 68 | #define PSA_WANT_ALG_FFDH 1 |
John Durkop | 07cc04a | 2020-11-16 22:08:34 -0800 | [diff] [blame] | 69 | #define PSA_WANT_ALG_ECDSA 1 |
Neil Armstrong | a557cb8 | 2022-06-10 08:58:32 +0200 | [diff] [blame] | 70 | #define PSA_WANT_ALG_JPAKE 1 |
Ronald Cron | 3d47181 | 2021-03-18 13:40:31 +0100 | [diff] [blame] | 71 | #define PSA_WANT_ALG_GCM 1 |
John Durkop | d032195 | 2020-10-29 21:37:36 -0700 | [diff] [blame] | 72 | #define PSA_WANT_ALG_HKDF 1 |
Przemek Stekiel | 3e8249c | 2022-06-03 14:05:07 +0200 | [diff] [blame] | 73 | #define PSA_WANT_ALG_HKDF_EXTRACT 1 |
| 74 | #define PSA_WANT_ALG_HKDF_EXPAND 1 |
John Durkop | 07cc04a | 2020-11-16 22:08:34 -0800 | [diff] [blame] | 75 | #define PSA_WANT_ALG_HMAC 1 |
John Durkop | fb764a6 | 2020-11-27 08:43:28 -0800 | [diff] [blame] | 76 | #define PSA_WANT_ALG_MD5 1 |
David Brown | a9f1d83 | 2021-01-15 11:40:25 -0700 | [diff] [blame] | 77 | #define PSA_WANT_ALG_OFB 1 |
Kusumit Ghoderao | aca3165 | 2023-05-03 11:35:50 +0530 | [diff] [blame] | 78 | #define PSA_WANT_ALG_PBKDF2_HMAC 1 |
John Durkop | fb764a6 | 2020-11-27 08:43:28 -0800 | [diff] [blame] | 79 | #define PSA_WANT_ALG_RIPEMD160 1 |
John Durkop | 07cc04a | 2020-11-16 22:08:34 -0800 | [diff] [blame] | 80 | #define PSA_WANT_ALG_RSA_OAEP 1 |
John Durkop | 7fc75ea | 2020-11-03 19:05:36 -0800 | [diff] [blame] | 81 | #define PSA_WANT_ALG_RSA_PKCS1V15_CRYPT 1 |
| 82 | #define PSA_WANT_ALG_RSA_PKCS1V15_SIGN 1 |
John Durkop | 7fc75ea | 2020-11-03 19:05:36 -0800 | [diff] [blame] | 83 | #define PSA_WANT_ALG_RSA_PSS 1 |
John Durkop | fb764a6 | 2020-11-27 08:43:28 -0800 | [diff] [blame] | 84 | #define PSA_WANT_ALG_SHA_1 1 |
| 85 | #define PSA_WANT_ALG_SHA_224 1 |
| 86 | #define PSA_WANT_ALG_SHA_256 1 |
| 87 | #define PSA_WANT_ALG_SHA_384 1 |
| 88 | #define PSA_WANT_ALG_SHA_512 1 |
David Brown | a9f1d83 | 2021-01-15 11:40:25 -0700 | [diff] [blame] | 89 | #define PSA_WANT_ALG_STREAM_CIPHER 1 |
John Durkop | 07cc04a | 2020-11-16 22:08:34 -0800 | [diff] [blame] | 90 | #define PSA_WANT_ALG_TLS12_PRF 1 |
| 91 | #define PSA_WANT_ALG_TLS12_PSK_TO_MS 1 |
Andrzej Kurek | 08d34b8 | 2022-07-29 10:00:16 -0400 | [diff] [blame] | 92 | #define PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS 1 |
| 93 | |
Kusumit Ghoderao | aca3165 | 2023-05-03 11:35:50 +0530 | [diff] [blame] | 94 | /* Note: when adding support, also adjust include/mbedtls/config_psa.h */ |
Gilles Peskine | 6d187af | 2022-03-19 10:56:13 +0100 | [diff] [blame] | 95 | //#define PSA_WANT_ALG_XTS 1 |
Gilles Peskine | 60b29fe | 2021-02-16 14:06:50 +0100 | [diff] [blame] | 96 | |
David Brown | 3298851 | 2021-03-16 10:44:22 -0600 | [diff] [blame] | 97 | #define PSA_WANT_ECC_BRAINPOOL_P_R1_256 1 |
| 98 | #define PSA_WANT_ECC_BRAINPOOL_P_R1_384 1 |
| 99 | #define PSA_WANT_ECC_BRAINPOOL_P_R1_512 1 |
David Brown | 3353f81 | 2021-03-02 18:36:35 -0700 | [diff] [blame] | 100 | #define PSA_WANT_ECC_MONTGOMERY_255 1 |
Archana | ef6aa5c | 2021-06-08 11:40:10 +0530 | [diff] [blame] | 101 | #define PSA_WANT_ECC_MONTGOMERY_448 1 |
David Brown | 3353f81 | 2021-03-02 18:36:35 -0700 | [diff] [blame] | 102 | #define PSA_WANT_ECC_SECP_K1_192 1 |
Ronald Cron | e1f5516 | 2021-03-25 15:09:47 +0100 | [diff] [blame] | 103 | /* |
| 104 | * SECP224K1 is buggy via the PSA API in Mbed TLS |
Dave Rodgman | 017a199 | 2022-03-31 14:07:01 +0100 | [diff] [blame] | 105 | * (https://github.com/Mbed-TLS/mbedtls/issues/3541). Thus, do not enable it by |
Ronald Cron | e1f5516 | 2021-03-25 15:09:47 +0100 | [diff] [blame] | 106 | * default. |
| 107 | */ |
Gilles Peskine | 3984130 | 2021-03-23 12:06:45 +0100 | [diff] [blame] | 108 | //#define PSA_WANT_ECC_SECP_K1_224 1 |
David Brown | 3353f81 | 2021-03-02 18:36:35 -0700 | [diff] [blame] | 109 | #define PSA_WANT_ECC_SECP_K1_256 1 |
| 110 | #define PSA_WANT_ECC_SECP_R1_192 1 |
| 111 | #define PSA_WANT_ECC_SECP_R1_224 1 |
| 112 | #define PSA_WANT_ECC_SECP_R1_256 1 |
| 113 | #define PSA_WANT_ECC_SECP_R1_384 1 |
| 114 | #define PSA_WANT_ECC_SECP_R1_521 1 |
David Brown | 20a8c43 | 2021-02-19 14:12:27 -0700 | [diff] [blame] | 115 | |
Gilles Peskine | 51b8bb0 | 2021-01-12 00:01:16 +0100 | [diff] [blame] | 116 | #define PSA_WANT_KEY_TYPE_DERIVE 1 |
Gilles Peskine | bba2630 | 2022-12-15 23:25:17 +0100 | [diff] [blame] | 117 | #define PSA_WANT_KEY_TYPE_PASSWORD 1 |
| 118 | #define PSA_WANT_KEY_TYPE_PASSWORD_HASH 1 |
Gilles Peskine | 47a8933 | 2021-01-12 00:00:15 +0100 | [diff] [blame] | 119 | #define PSA_WANT_KEY_TYPE_HMAC 1 |
David Brown | a9f1d83 | 2021-01-15 11:40:25 -0700 | [diff] [blame] | 120 | #define PSA_WANT_KEY_TYPE_AES 1 |
Gilles Peskine | 09c46da | 2021-10-08 15:48:16 +0200 | [diff] [blame] | 121 | #define PSA_WANT_KEY_TYPE_ARIA 1 |
David Brown | a9f1d83 | 2021-01-15 11:40:25 -0700 | [diff] [blame] | 122 | #define PSA_WANT_KEY_TYPE_CAMELLIA 1 |
David Brown | 9a594e8 | 2021-02-16 12:57:27 -0700 | [diff] [blame] | 123 | #define PSA_WANT_KEY_TYPE_CHACHA20 1 |
David Brown | a9f1d83 | 2021-01-15 11:40:25 -0700 | [diff] [blame] | 124 | #define PSA_WANT_KEY_TYPE_DES 1 |
Valerio Setti | 67a3e3e | 2023-05-26 13:37:26 +0200 | [diff] [blame^] | 125 | //#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR 1 /* Deprecated */ |
John Durkop | 07cc04a | 2020-11-16 22:08:34 -0800 | [diff] [blame] | 126 | #define PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY 1 |
Przemek Stekiel | eb511a4 | 2023-04-28 13:20:16 +0200 | [diff] [blame] | 127 | #define PSA_WANT_KEY_TYPE_DH_PUBLIC_KEY 1 |
Gilles Peskine | 60b29fe | 2021-02-16 14:06:50 +0100 | [diff] [blame] | 128 | #define PSA_WANT_KEY_TYPE_RAW_DATA 1 |
Valerio Setti | 67a3e3e | 2023-05-26 13:37:26 +0200 | [diff] [blame^] | 129 | //#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR 1 /* Deprecated */ |
John Durkop | 7fc75ea | 2020-11-03 19:05:36 -0800 | [diff] [blame] | 130 | #define PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY 1 |
John Durkop | 6e33dbe | 2020-09-17 21:15:13 -0700 | [diff] [blame] | 131 | |
Valerio Setti | 67a3e3e | 2023-05-26 13:37:26 +0200 | [diff] [blame^] | 132 | /* |
| 133 | * The following symbols extend and deprecate the legacy |
| 134 | * PSA_WANT_KEY_TYPE_xxx_KEY_PAIR ones. They include the usage of that key in |
| 135 | * the name's suffix. "_USE" is the most generic and it can be used to describe |
| 136 | * a generic suport, whereas other ones add more features on top of that and |
| 137 | * they are more specific. |
| 138 | */ |
| 139 | #define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_USE 1 |
| 140 | #define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT 1 |
| 141 | #define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT 1 |
| 142 | #define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE 1 |
| 143 | #define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE 1 |
| 144 | |
| 145 | #define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_USE 1 |
| 146 | #define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_IMPORT 1 |
| 147 | #define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_EXPORT 1 |
| 148 | #define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_GENERATE 1 |
| 149 | //#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_DERIVE 1 /* Not supported */ |
| 150 | |
| 151 | #define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_USE 1 |
| 152 | #define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_IMPORT 1 |
| 153 | #define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_EXPORT 1 |
| 154 | #define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_GENERATE 1 |
| 155 | #define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_DERIVE 1 |
| 156 | |
John Durkop | 6e33dbe | 2020-09-17 21:15:13 -0700 | [diff] [blame] | 157 | #endif /* PSA_CRYPTO_CONFIG_H */ |