blob: bbad0c4af1d8aa1909a69b955acb5bdaff95338e [file] [log] [blame]
John Durkop6e33dbe2020-09-17 21:15:13 -07001/**
2 * \file mbedtls/config_psa.h
3 * \brief PSA crypto configuration options (set of defines)
4 *
John Durkop34818822020-10-12 21:36:22 -07005 * This set of compile-time options takes settings defined in
Bence Szépkútibb0cfeb2021-05-28 09:42:25 +02006 * include/mbedtls/mbedtls_config.h and include/psa/crypto_config.h and uses
John Durkop34818822020-10-12 21:36:22 -07007 * those definitions to define symbols used in the library code.
8 *
9 * Users and integrators should not edit this file, please edit
Tom Cosgrove1797b052022-12-04 17:19:59 +000010 * include/mbedtls/mbedtls_config.h for MBEDTLS_XXX settings or
John Durkop34818822020-10-12 21:36:22 -070011 * include/psa/crypto_config.h for PSA_WANT_XXX settings.
John Durkop6e33dbe2020-09-17 21:15:13 -070012 */
13/*
14 * Copyright The Mbed TLS Contributors
15 * SPDX-License-Identifier: Apache-2.0
16 *
17 * Licensed under the Apache License, Version 2.0 (the "License"); you may
18 * not use this file except in compliance with the License.
19 * You may obtain a copy of the License at
20 *
21 * http://www.apache.org/licenses/LICENSE-2.0
22 *
23 * Unless required by applicable law or agreed to in writing, software
24 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
25 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
26 * See the License for the specific language governing permissions and
27 * limitations under the License.
28 */
29
30#ifndef MBEDTLS_CONFIG_PSA_H
31#define MBEDTLS_CONFIG_PSA_H
32
John Durkop714e3a12020-09-29 22:07:04 -070033#if defined(MBEDTLS_PSA_CRYPTO_CONFIG)
Gilles Peskinef4c6eb02022-03-16 17:10:48 +010034#if defined(MBEDTLS_PSA_CRYPTO_CONFIG_FILE)
35#include MBEDTLS_PSA_CRYPTO_CONFIG_FILE
36#else
John Durkop6e33dbe2020-09-17 21:15:13 -070037#include "psa/crypto_config.h"
Gilles Peskinef4c6eb02022-03-16 17:10:48 +010038#endif
John Durkop76228ac2020-09-29 22:33:49 -070039#endif /* defined(MBEDTLS_PSA_CRYPTO_CONFIG) */
John Durkop6e33dbe2020-09-17 21:15:13 -070040
Gilles Peskinef4c6eb02022-03-16 17:10:48 +010041#if defined(MBEDTLS_PSA_CRYPTO_USER_CONFIG_FILE)
42#include MBEDTLS_PSA_CRYPTO_USER_CONFIG_FILE
43#endif
44
John Durkop6e33dbe2020-09-17 21:15:13 -070045#ifdef __cplusplus
46extern "C" {
47#endif
48
Gilles Peskine1231eb52021-04-19 22:24:23 +020049
50
51/****************************************************************/
52/* De facto synonyms */
53/****************************************************************/
54
55#if defined(PSA_WANT_ALG_ECDSA_ANY) && !defined(PSA_WANT_ALG_ECDSA)
56#define PSA_WANT_ALG_ECDSA PSA_WANT_ALG_ECDSA_ANY
57#elif !defined(PSA_WANT_ALG_ECDSA_ANY) && defined(PSA_WANT_ALG_ECDSA)
58#define PSA_WANT_ALG_ECDSA_ANY PSA_WANT_ALG_ECDSA
59#endif
60
Gilles Peskine08622b62022-03-15 16:40:59 +010061#if defined(PSA_WANT_ALG_CCM_STAR_NO_TAG) && !defined(PSA_WANT_ALG_CCM)
62#define PSA_WANT_ALG_CCM PSA_WANT_ALG_CCM_STAR_NO_TAG
63#elif !defined(PSA_WANT_ALG_CCM_STAR_NO_TAG) && defined(PSA_WANT_ALG_CCM)
64#define PSA_WANT_ALG_CCM_STAR_NO_TAG PSA_WANT_ALG_CCM
65#endif
66
Gilles Peskine1231eb52021-04-19 22:24:23 +020067#if defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW) && !defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
68#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW
69#elif !defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW) && defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
70#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW PSA_WANT_ALG_RSA_PKCS1V15_SIGN
71#endif
72
Gilles Peskine44c96aa2021-10-04 18:33:56 +020073#if defined(PSA_WANT_ALG_RSA_PSS_ANY_SALT) && !defined(PSA_WANT_ALG_RSA_PSS)
74#define PSA_WANT_ALG_RSA_PSS PSA_WANT_ALG_RSA_PSS_ANY_SALT
75#elif !defined(PSA_WANT_ALG_RSA_PSS_ANY_SALT) && defined(PSA_WANT_ALG_RSA_PSS)
76#define PSA_WANT_ALG_RSA_PSS_ANY_SALT PSA_WANT_ALG_RSA_PSS
77#endif
78
Gilles Peskine1231eb52021-04-19 22:24:23 +020079
Manuel Pégourié-Gonnard235a9332023-03-14 18:01:23 +010080/****************************************************************/
81/* Hashes that are built in are also enabled in PSA.
82 * This simplifies dependency declarations especially
83 * for modules that obey MBEDTLS_USE_PSA_CRYPTO. */
84/****************************************************************/
85
86#if defined(MBEDTLS_MD5_C)
87#define PSA_WANT_ALG_MD5 1
88#endif
89
90#if defined(MBEDTLS_RIPEMD160_C)
91#define PSA_WANT_ALG_RIPEMD160 1
92#endif
93
94#if defined(MBEDTLS_SHA1_C)
95#define PSA_WANT_ALG_SHA_1 1
96#endif
97
98#if defined(MBEDTLS_SHA224_C)
99#define PSA_WANT_ALG_SHA_224 1
100#endif
101
102#if defined(MBEDTLS_SHA256_C)
103#define PSA_WANT_ALG_SHA_256 1
104#endif
105
106#if defined(MBEDTLS_SHA384_C)
107#define PSA_WANT_ALG_SHA_384 1
108#endif
109
110#if defined(MBEDTLS_SHA512_C)
111#define PSA_WANT_ALG_SHA_512 1
112#endif
113
Gilles Peskine1231eb52021-04-19 22:24:23 +0200114
115/****************************************************************/
116/* Require built-in implementations based on PSA requirements */
117/****************************************************************/
118
John Durkop2dfaf9c2020-09-24 04:30:10 -0700119#if defined(MBEDTLS_PSA_CRYPTO_CONFIG)
John Durkopd8959392020-09-20 23:09:17 -0700120
John Durkopd62b6782020-11-30 21:06:05 -0800121#if defined(PSA_WANT_ALG_DETERMINISTIC_ECDSA)
122#if !defined(MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA)
123#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
124#define MBEDTLS_ECDSA_DETERMINISTIC
125#define MBEDTLS_ECDSA_C
126#define MBEDTLS_HMAC_DRBG_C
127#define MBEDTLS_MD_C
128#endif /* !MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA */
129#endif /* PSA_WANT_ALG_DETERMINISTIC_ECDSA */
130
131#if defined(PSA_WANT_ALG_ECDH)
132#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDH)
133#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
134#define MBEDTLS_ECDH_C
135#define MBEDTLS_ECP_C
136#define MBEDTLS_BIGNUM_C
137#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDH */
138#endif /* PSA_WANT_ALG_ECDH */
139
140#if defined(PSA_WANT_ALG_ECDSA)
141#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDSA)
142#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
143#define MBEDTLS_ECDSA_C
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200144#define MBEDTLS_ECP_C
145#define MBEDTLS_BIGNUM_C
146#define MBEDTLS_ASN1_PARSE_C
147#define MBEDTLS_ASN1_WRITE_C
John Durkopd62b6782020-11-30 21:06:05 -0800148#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDSA */
149#endif /* PSA_WANT_ALG_ECDSA */
150
151#if defined(PSA_WANT_ALG_HKDF)
152#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF)
153#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
154#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
155#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF */
156#endif /* PSA_WANT_ALG_HKDF */
157
Przemek Stekiel3e8249c2022-06-03 14:05:07 +0200158#if defined(PSA_WANT_ALG_HKDF_EXTRACT)
159#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF_EXTRACT)
160#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
161#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXTRACT 1
162#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF_EXTRACT */
163#endif /* PSA_WANT_ALG_HKDF_EXTRACT */
164
165#if defined(PSA_WANT_ALG_HKDF_EXPAND)
166#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF_EXPAND)
167#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
168#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXPAND 1
169#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF_EXPAND */
170#endif /* PSA_WANT_ALG_HKDF_EXPAND */
171
John Durkopd62b6782020-11-30 21:06:05 -0800172#if defined(PSA_WANT_ALG_HMAC)
173#if !defined(MBEDTLS_PSA_ACCEL_ALG_HMAC)
174#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
175#endif /* !MBEDTLS_PSA_ACCEL_ALG_HMAC */
176#endif /* PSA_WANT_ALG_HMAC */
177
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100178#if defined(PSA_WANT_ALG_MD5) && !defined(MBEDTLS_PSA_ACCEL_ALG_MD5)
179#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
180#define MBEDTLS_MD5_C
181#endif
182
Neil Armstronga557cb82022-06-10 08:58:32 +0200183#if defined(PSA_WANT_ALG_JPAKE)
Przemek Stekiel4aa99402023-02-27 13:00:57 +0100184#if !defined(MBEDTLS_PSA_ACCEL_ALG_JPAKE)
Neil Armstrong637d0a02022-05-25 11:28:22 +0200185#define MBEDTLS_PSA_BUILTIN_PAKE 1
Neil Armstronga557cb82022-06-10 08:58:32 +0200186#define MBEDTLS_PSA_BUILTIN_ALG_JPAKE 1
Neil Armstronged407822022-06-15 11:21:33 +0200187#define MBEDTLS_ECP_DP_SECP256R1_ENABLED
Neil Armstrong637d0a02022-05-25 11:28:22 +0200188#define MBEDTLS_BIGNUM_C
189#define MBEDTLS_ECP_C
Neil Armstrong637d0a02022-05-25 11:28:22 +0200190#define MBEDTLS_ECJPAKE_C
Przemek Stekiel4aa99402023-02-27 13:00:57 +0100191#endif /* MBEDTLS_PSA_ACCEL_ALG_JPAKE */
Neil Armstronga557cb82022-06-10 08:58:32 +0200192#endif /* PSA_WANT_ALG_JPAKE */
Neil Armstrong637d0a02022-05-25 11:28:22 +0200193
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100194#if defined(PSA_WANT_ALG_RIPEMD160) && !defined(MBEDTLS_PSA_ACCEL_ALG_RIPEMD160)
195#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
196#define MBEDTLS_RIPEMD160_C
197#endif
198
John Durkopd62b6782020-11-30 21:06:05 -0800199#if defined(PSA_WANT_ALG_RSA_OAEP)
200#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP)
201#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
202#define MBEDTLS_RSA_C
203#define MBEDTLS_BIGNUM_C
204#define MBEDTLS_OID_C
205#define MBEDTLS_PKCS1_V21
John Durkopd62b6782020-11-30 21:06:05 -0800206#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP */
207#endif /* PSA_WANT_ALG_RSA_OAEP */
208
209#if defined(PSA_WANT_ALG_RSA_PKCS1V15_CRYPT)
210#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT)
211#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
212#define MBEDTLS_RSA_C
213#define MBEDTLS_BIGNUM_C
214#define MBEDTLS_OID_C
215#define MBEDTLS_PKCS1_V15
216#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT */
217#endif /* PSA_WANT_ALG_RSA_PKCS1V15_CRYPT */
218
219#if defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
220#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN)
221#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
222#define MBEDTLS_RSA_C
223#define MBEDTLS_BIGNUM_C
224#define MBEDTLS_OID_C
225#define MBEDTLS_PKCS1_V15
John Durkopd62b6782020-11-30 21:06:05 -0800226#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN */
227#endif /* PSA_WANT_ALG_RSA_PKCS1V15_SIGN */
228
229#if defined(PSA_WANT_ALG_RSA_PSS)
230#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PSS)
231#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
232#define MBEDTLS_RSA_C
233#define MBEDTLS_BIGNUM_C
234#define MBEDTLS_OID_C
235#define MBEDTLS_PKCS1_V21
John Durkopd62b6782020-11-30 21:06:05 -0800236#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PSS */
237#endif /* PSA_WANT_ALG_RSA_PSS */
238
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100239#if defined(PSA_WANT_ALG_SHA_1) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_1)
240#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
241#define MBEDTLS_SHA1_C
242#endif
243
244#if defined(PSA_WANT_ALG_SHA_224) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_224)
245#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200246#define MBEDTLS_SHA224_C
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100247#endif
248
249#if defined(PSA_WANT_ALG_SHA_256) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_256)
250#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
251#define MBEDTLS_SHA256_C
252#endif
253
254#if defined(PSA_WANT_ALG_SHA_384) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_384)
255#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200256#define MBEDTLS_SHA384_C
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100257#endif
258
259#if defined(PSA_WANT_ALG_SHA_512) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_512)
260#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
261#define MBEDTLS_SHA512_C
262#endif
263
Kusumit Ghoderao83baf892023-05-03 11:42:29 +0530264#if defined(PSA_WANT_ALG_PBKDF2_HMAC)
265#if !defined(MBEDTLS_PSA_ACCEL_ALG_PBKDF2_HMAC)
266#define MBEDTLS_PSA_BUILTIN_ALG_PBKDF2_HMAC 1
267#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
268#endif /* !MBEDTLS_PSA_BUILTIN_ALG_PBKDF2_HMAC */
269#endif /* PSA_WANT_ALG_PBKDF2_HMAC */
270
John Durkop07cc04a2020-11-16 22:08:34 -0800271#if defined(PSA_WANT_ALG_TLS12_PRF)
272#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF)
John Durkopd62b6782020-11-30 21:06:05 -0800273#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
John Durkop07cc04a2020-11-16 22:08:34 -0800274#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF */
275#endif /* PSA_WANT_ALG_TLS12_PRF */
276
277#if defined(PSA_WANT_ALG_TLS12_PSK_TO_MS)
278#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS)
John Durkopd62b6782020-11-30 21:06:05 -0800279#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
John Durkop07cc04a2020-11-16 22:08:34 -0800280#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS */
281#endif /* PSA_WANT_ALG_TLS12_PSK_TO_MS */
282
Andrzej Kurek08d34b82022-07-29 10:00:16 -0400283#if defined(PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS)
284#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_ECJPAKE_TO_PMS)
285#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_ECJPAKE_TO_PMS 1
286#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_ECJPAKE_TO_PMS */
287#endif /* PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS */
288
John Durkop07cc04a2020-11-16 22:08:34 -0800289#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR)
290#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR)
John Durkopd62b6782020-11-30 21:06:05 -0800291#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR 1
John Durkop07cc04a2020-11-16 22:08:34 -0800292#define MBEDTLS_ECP_C
293#define MBEDTLS_BIGNUM_C
294#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR */
295#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR */
296
297#if defined(PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY)
298#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800299#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
John Durkop07cc04a2020-11-16 22:08:34 -0800300#define MBEDTLS_ECP_C
301#define MBEDTLS_BIGNUM_C
302#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY */
303#endif /* PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY */
304
John Durkop9814fa22020-11-04 12:28:15 -0800305#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR)
John Durkop0e005192020-10-31 22:06:54 -0700306#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR)
John Durkopd62b6782020-11-30 21:06:05 -0800307#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR 1
John Durkop0e005192020-10-31 22:06:54 -0700308#define MBEDTLS_RSA_C
309#define MBEDTLS_BIGNUM_C
310#define MBEDTLS_OID_C
311#define MBEDTLS_GENPRIME
John Durkop07cc04a2020-11-16 22:08:34 -0800312#define MBEDTLS_PK_PARSE_C
313#define MBEDTLS_PK_WRITE_C
314#define MBEDTLS_PK_C
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200315#define MBEDTLS_ASN1_PARSE_C
316#define MBEDTLS_ASN1_WRITE_C
John Durkop0e005192020-10-31 22:06:54 -0700317#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR */
John Durkop9814fa22020-11-04 12:28:15 -0800318#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR */
319
320#if defined(PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkop0e005192020-10-31 22:06:54 -0700321#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800322#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
John Durkop0e005192020-10-31 22:06:54 -0700323#define MBEDTLS_RSA_C
324#define MBEDTLS_BIGNUM_C
325#define MBEDTLS_OID_C
John Durkop07cc04a2020-11-16 22:08:34 -0800326#define MBEDTLS_PK_PARSE_C
327#define MBEDTLS_PK_WRITE_C
328#define MBEDTLS_PK_C
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200329#define MBEDTLS_ASN1_PARSE_C
330#define MBEDTLS_ASN1_WRITE_C
John Durkop0e005192020-10-31 22:06:54 -0700331#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkop9814fa22020-11-04 12:28:15 -0800332#endif /* PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkopd0321952020-10-29 21:37:36 -0700333
David Brownb781f752021-02-08 15:44:52 -0700334/* If any of the block modes are requested that don't have an
335 * associated HW assist, define PSA_HAVE_SOFT_BLOCK_MODE for checking
336 * in the block cipher key types. */
337#if (defined(PSA_WANT_ALG_CTR) && !defined(MBEDTLS_PSA_ACCEL_ALG_CTR)) || \
Bence Szépkúti7921cce2021-02-17 11:46:50 +0100338 (defined(PSA_WANT_ALG_CFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_CFB)) || \
David Brownb781f752021-02-08 15:44:52 -0700339 (defined(PSA_WANT_ALG_OFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_OFB)) || \
David Brownb781f752021-02-08 15:44:52 -0700340 defined(PSA_WANT_ALG_ECB_NO_PADDING) || \
341 (defined(PSA_WANT_ALG_CBC_NO_PADDING) && \
Gilles Peskine449bd832023-01-11 14:50:10 +0100342 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING)) || \
David Brownb781f752021-02-08 15:44:52 -0700343 (defined(PSA_WANT_ALG_CBC_PKCS7) && \
Gilles Peskine449bd832023-01-11 14:50:10 +0100344 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7)) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100345 (defined(PSA_WANT_ALG_CMAC) && !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC))
David Brownb781f752021-02-08 15:44:52 -0700346#define PSA_HAVE_SOFT_BLOCK_MODE 1
347#endif
348
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100349#if (defined(PSA_WANT_ALG_GCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_GCM)) || \
350 (defined(PSA_WANT_ALG_CCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_CCM))
351#define PSA_HAVE_SOFT_BLOCK_AEAD 1
352#endif
353
David Brown94933082021-01-05 12:03:25 -0700354#if defined(PSA_WANT_KEY_TYPE_AES)
David Browne1f91f02021-02-09 15:56:22 -0700355#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_AES)
356#define PSA_HAVE_SOFT_KEY_TYPE_AES 1
357#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_AES */
358#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100359 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
360 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
David Brown78a429b2021-01-21 09:48:57 -0700361#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700362#define MBEDTLS_AES_C
David Browne1f91f02021-02-09 15:56:22 -0700363#endif /* PSA_HAVE_SOFT_KEY_TYPE_AES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown94933082021-01-05 12:03:25 -0700364#endif /* PSA_WANT_KEY_TYPE_AES */
365
Gilles Peskine09c46da2021-10-08 15:48:16 +0200366#if defined(PSA_WANT_KEY_TYPE_ARIA)
367#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA)
368#define PSA_HAVE_SOFT_KEY_TYPE_ARIA 1
369#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA */
370#if defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
371 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
372 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
373#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
374#define MBEDTLS_ARIA_C
375#endif /* PSA_HAVE_SOFT_KEY_TYPE_ARIA || PSA_HAVE_SOFT_BLOCK_MODE */
376#endif /* PSA_WANT_KEY_TYPE_ARIA */
377
David Brown686e6e82021-01-05 12:03:25 -0700378#if defined(PSA_WANT_KEY_TYPE_CAMELLIA)
David Browne1f91f02021-02-09 15:56:22 -0700379#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA)
380#define PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA 1
381#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA */
382#if defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100383 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
384 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
David Brown78a429b2021-01-21 09:48:57 -0700385#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700386#define MBEDTLS_CAMELLIA_C
David Browne1f91f02021-02-09 15:56:22 -0700387#endif /* PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown686e6e82021-01-05 12:03:25 -0700388#endif /* PSA_WANT_KEY_TYPE_CAMELLIA */
389
David Brownb65a7f72021-01-15 12:04:09 -0700390#if defined(PSA_WANT_KEY_TYPE_DES)
David Browne1f91f02021-02-09 15:56:22 -0700391#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DES)
392#define PSA_HAVE_SOFT_KEY_TYPE_DES 1
393#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DES */
394#if defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
David Brownb781f752021-02-08 15:44:52 -0700395 defined(PSA_HAVE_SOFT_BLOCK_MODE)
David Brown78a429b2021-01-21 09:48:57 -0700396#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700397#define MBEDTLS_DES_C
David Browne1f91f02021-02-09 15:56:22 -0700398#endif /*PSA_HAVE_SOFT_KEY_TYPE_DES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brownb65a7f72021-01-15 12:04:09 -0700399#endif /* PSA_WANT_KEY_TYPE_DES */
400
David Brownb16727a2021-02-08 16:31:46 -0700401#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
402#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20)
403#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
404#define MBEDTLS_CHACHA20_C
405#endif /*!MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20 */
406#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
407
David Brownf84a0f62021-02-09 15:59:41 -0700408/* If any of the software block ciphers are selected, define
409 * PSA_HAVE_SOFT_BLOCK_CIPHER, which can be used in any of these
410 * situations. */
411#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200412 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
David Brownf84a0f62021-02-09 15:59:41 -0700413 defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
414 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
415#define PSA_HAVE_SOFT_BLOCK_CIPHER 1
416#endif
417
David Brown99844272021-01-15 12:04:47 -0700418#if defined(PSA_WANT_ALG_STREAM_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700419#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brown99844272021-01-15 12:04:47 -0700420#endif /* PSA_WANT_ALG_STREAM_CIPHER */
421
Ronald Crond85e98d2021-03-25 15:32:32 +0100422#if defined(PSA_WANT_ALG_CBC_MAC)
423#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_MAC)
424#error "CBC-MAC is not yet supported via the PSA API in Mbed TLS."
425#define MBEDTLS_PSA_BUILTIN_ALG_CBC_MAC 1
426#endif /* !MBEDTLS_PSA_ACCEL_ALG_CBC_MAC */
427#endif /* PSA_WANT_ALG_CBC_MAC */
428
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100429#if defined(PSA_WANT_ALG_CMAC)
430#if !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC) || \
431 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
432#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
433#define MBEDTLS_CMAC_C
434#endif /* !MBEDTLS_PSA_ACCEL_ALG_CMAC */
435#endif /* PSA_WANT_ALG_CMAC */
436
David Brown99844272021-01-15 12:04:47 -0700437#if defined(PSA_WANT_ALG_CTR)
David Brown4b9ec7a2021-02-05 12:47:08 -0700438#if !defined(MBEDTLS_PSA_ACCEL_ALG_CTR) || \
David Brownf84a0f62021-02-09 15:59:41 -0700439 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700440#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700441#define MBEDTLS_CIPHER_MODE_CTR
David Brown4b9ec7a2021-02-05 12:47:08 -0700442#endif
David Brown99844272021-01-15 12:04:47 -0700443#endif /* PSA_WANT_ALG_CTR */
444
445#if defined(PSA_WANT_ALG_CFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700446#if !defined(MBEDTLS_PSA_ACCEL_ALG_CFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700447 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700448#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700449#define MBEDTLS_CIPHER_MODE_CFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700450#endif
David Brown99844272021-01-15 12:04:47 -0700451#endif /* PSA_WANT_ALG_CFB */
452
453#if defined(PSA_WANT_ALG_OFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700454#if !defined(MBEDTLS_PSA_ACCEL_ALG_OFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700455 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700456#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700457#define MBEDTLS_CIPHER_MODE_OFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700458#endif
David Brown99844272021-01-15 12:04:47 -0700459#endif /* PSA_WANT_ALG_OFB */
460
Gilles Peskine7a2e83b2022-03-17 11:09:23 +0100461#if defined(PSA_WANT_ALG_ECB_NO_PADDING) && \
462 !defined(MBEDTLS_PSA_ACCEL_ALG_ECB_NO_PADDING)
David Brownbe380c12021-02-11 10:55:48 -0700463#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700464#endif
465
David Brown12f45f92021-01-26 11:50:36 -0700466#if defined(PSA_WANT_ALG_CBC_NO_PADDING)
David Brown4b9ec7a2021-02-05 12:47:08 -0700467#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING) || \
David Brownfc468182021-02-09 16:23:34 -0700468 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700469#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700470#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown4b9ec7a2021-02-05 12:47:08 -0700471#endif
David Brown12f45f92021-01-26 11:50:36 -0700472#endif /* PSA_WANT_ALG_CBC_NO_PADDING */
473
474#if defined(PSA_WANT_ALG_CBC_PKCS7)
David Brown4b9ec7a2021-02-05 12:47:08 -0700475#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7) || \
David Brownfc468182021-02-09 16:23:34 -0700476 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700477#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700478#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brownfc468182021-02-09 16:23:34 -0700479#define MBEDTLS_CIPHER_PADDING_PKCS7
David Brown4b9ec7a2021-02-05 12:47:08 -0700480#endif
David Brown12f45f92021-01-26 11:50:36 -0700481#endif /* PSA_WANT_ALG_CBC_PKCS7 */
482
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100483#if defined(PSA_WANT_ALG_CCM)
484#if !defined(MBEDTLS_PSA_ACCEL_ALG_CCM) || \
485 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200486 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100487 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
488#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100489#define MBEDTLS_PSA_BUILTIN_ALG_CCM_STAR_NO_TAG 1
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100490#define MBEDTLS_CCM_C
491#endif
492#endif /* PSA_WANT_ALG_CCM */
493
494#if defined(PSA_WANT_ALG_GCM)
495#if !defined(MBEDTLS_PSA_ACCEL_ALG_GCM) || \
496 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200497 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100498 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
499#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
500#define MBEDTLS_GCM_C
501#endif
502#endif /* PSA_WANT_ALG_GCM */
503
David Brownac4fa072021-02-08 16:47:35 -0700504#if defined(PSA_WANT_ALG_CHACHA20_POLY1305)
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200505#if !defined(MBEDTLS_PSA_ACCEL_ALG_CHACHA20_POLY1305)
David Brownac4fa072021-02-08 16:47:35 -0700506#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
507#define MBEDTLS_CHACHAPOLY_C
Summer Qin9f2596f2022-06-17 12:50:32 +0800508#define MBEDTLS_CHACHA20_C
509#define MBEDTLS_POLY1305_C
David Brown86730a82021-02-09 16:24:11 -0700510#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700511#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200512#endif /* !MBEDTLS_PSA_ACCEL_ALG_CHACHA20_POLY1305 */
David Brownac4fa072021-02-08 16:47:35 -0700513#endif /* PSA_WANT_ALG_CHACHA20_POLY1305 */
514
David Browneed74df2021-03-15 15:53:57 -0600515#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_256)
516#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256)
517#define MBEDTLS_ECP_DP_BP256R1_ENABLED
518#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
519#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256 */
520#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_256 */
521
522#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_384)
523#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384)
524#define MBEDTLS_ECP_DP_BP384R1_ENABLED
525#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
526#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384 */
527#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_384 */
528
529#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_512)
530#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512)
531#define MBEDTLS_ECP_DP_BP512R1_ENABLED
532#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
533#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512 */
534#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_512 */
535
536#if defined(PSA_WANT_ECC_MONTGOMERY_255)
537#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255)
538#define MBEDTLS_ECP_DP_CURVE25519_ENABLED
539#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
540#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255 */
541#endif /* PSA_WANT_ECC_MONTGOMERY_255 */
542
543#if defined(PSA_WANT_ECC_MONTGOMERY_448)
544#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448)
545#define MBEDTLS_ECP_DP_CURVE448_ENABLED
546#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
547#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448 */
548#endif /* PSA_WANT_ECC_MONTGOMERY_448 */
549
David Brownc7b9b2b2021-02-19 21:05:52 -0700550#if defined(PSA_WANT_ECC_SECP_R1_192)
551#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192)
552#define MBEDTLS_ECP_DP_SECP192R1_ENABLED
553#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
554#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192 */
555#endif /* PSA_WANT_ECC_SECP_R1_192 */
556
557#if defined(PSA_WANT_ECC_SECP_R1_224)
558#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224)
559#define MBEDTLS_ECP_DP_SECP224R1_ENABLED
560#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
561#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224 */
562#endif /* PSA_WANT_ECC_SECP_R1_224 */
563
564#if defined(PSA_WANT_ECC_SECP_R1_256)
565#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256)
566#define MBEDTLS_ECP_DP_SECP256R1_ENABLED
567#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
568#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256 */
569#endif /* PSA_WANT_ECC_SECP_R1_256 */
570
571#if defined(PSA_WANT_ECC_SECP_R1_384)
572#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384)
573#define MBEDTLS_ECP_DP_SECP384R1_ENABLED
574#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
575#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384 */
576#endif /* PSA_WANT_ECC_SECP_R1_384 */
577
578#if defined(PSA_WANT_ECC_SECP_R1_521)
579#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521)
580#define MBEDTLS_ECP_DP_SECP521R1_ENABLED
581#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
582#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521 */
583#endif /* PSA_WANT_ECC_SECP_R1_521 */
584
585#if defined(PSA_WANT_ECC_SECP_K1_192)
586#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192)
David Brown8de143e2021-02-19 14:08:00 -0700587#define MBEDTLS_ECP_DP_SECP192K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700588#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
589#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192 */
590#endif /* PSA_WANT_ECC_SECP_K1_192 */
David Brown8de143e2021-02-19 14:08:00 -0700591
David Brownc7b9b2b2021-02-19 21:05:52 -0700592#if defined(PSA_WANT_ECC_SECP_K1_224)
593#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224)
Ronald Crone1f55162021-03-25 15:09:47 +0100594/*
595 * SECP224K1 is buggy via the PSA API in Mbed TLS
Dave Rodgman017a1992022-03-31 14:07:01 +0100596 * (https://github.com/Mbed-TLS/mbedtls/issues/3541).
Ronald Crone1f55162021-03-25 15:09:47 +0100597 */
598#error "SECP224K1 is buggy via the PSA API in Mbed TLS."
David Brown8de143e2021-02-19 14:08:00 -0700599#define MBEDTLS_ECP_DP_SECP224K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700600#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
601#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224 */
602#endif /* PSA_WANT_ECC_SECP_K1_224 */
David Brown8de143e2021-02-19 14:08:00 -0700603
David Brownc7b9b2b2021-02-19 21:05:52 -0700604#if defined(PSA_WANT_ECC_SECP_K1_256)
605#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256)
David Brown9b178de2021-03-10 13:14:48 -0700606#define MBEDTLS_ECP_DP_SECP256K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700607#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
608#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256 */
609#endif /* PSA_WANT_ECC_SECP_K1_256 */
David Brown8de143e2021-02-19 14:08:00 -0700610
Gilles Peskine1231eb52021-04-19 22:24:23 +0200611
612
613/****************************************************************/
614/* Infer PSA requirements from Mbed TLS capabilities */
615/****************************************************************/
616
John Durkop714e3a12020-09-29 22:07:04 -0700617#else /* MBEDTLS_PSA_CRYPTO_CONFIG */
618
619/*
620 * Ensure PSA_WANT_* defines are setup properly if MBEDTLS_PSA_CRYPTO_CONFIG
621 * is not defined
622 */
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100623
Ronald Cron3d471812021-03-18 13:40:31 +0100624#if defined(MBEDTLS_CCM_C)
625#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100626#define MBEDTLS_PSA_BUILTIN_ALG_CCM_STAR_NO_TAG 1
Ronald Cron3d471812021-03-18 13:40:31 +0100627#define PSA_WANT_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100628#define PSA_WANT_ALG_CCM_STAR_NO_TAG 1
Ronald Cron3d471812021-03-18 13:40:31 +0100629#endif /* MBEDTLS_CCM_C */
630
631#if defined(MBEDTLS_CMAC_C)
632#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
633#define PSA_WANT_ALG_CMAC 1
634#endif /* MBEDTLS_CMAC_C */
635
John Durkopd62b6782020-11-30 21:06:05 -0800636#if defined(MBEDTLS_ECDH_C)
637#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
638#define PSA_WANT_ALG_ECDH 1
639#endif /* MBEDTLS_ECDH_C */
640
641#if defined(MBEDTLS_ECDSA_C)
642#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
643#define PSA_WANT_ALG_ECDSA 1
Gilles Peskine1231eb52021-04-19 22:24:23 +0200644#define PSA_WANT_ALG_ECDSA_ANY 1
John Durkopd62b6782020-11-30 21:06:05 -0800645
646// Only add in DETERMINISTIC support if ECDSA is also enabled
647#if defined(MBEDTLS_ECDSA_DETERMINISTIC)
648#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
649#define PSA_WANT_ALG_DETERMINISTIC_ECDSA 1
650#endif /* MBEDTLS_ECDSA_DETERMINISTIC */
651
652#endif /* MBEDTLS_ECDSA_C */
653
654#if defined(MBEDTLS_ECP_C)
655#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR 1
656#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR 1
657#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
658#define PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY 1
659#endif /* MBEDTLS_ECP_C */
660
Ronald Cron3d471812021-03-18 13:40:31 +0100661#if defined(MBEDTLS_GCM_C)
662#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
663#define PSA_WANT_ALG_GCM 1
664#endif /* MBEDTLS_GCM_C */
665
Przemek Stekiel18399d82022-06-27 13:34:50 +0200666/* Enable PSA HKDF algorithm if mbedtls HKDF is supported.
667 * PSA HKDF EXTRACT and PSA HKDF EXPAND have minimal cost when
668 * PSA HKDF is enabled, so enable both algorithms together
669 * with PSA HKDF. */
John Durkopd62b6782020-11-30 21:06:05 -0800670#if defined(MBEDTLS_HKDF_C)
671#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
672#define PSA_WANT_ALG_HMAC 1
673#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
674#define PSA_WANT_ALG_HKDF 1
Przemek Stekielb33bd192022-06-21 09:58:51 +0200675#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXTRACT 1
676#define PSA_WANT_ALG_HKDF_EXTRACT 1
677#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXPAND 1
678#define PSA_WANT_ALG_HKDF_EXPAND 1
John Durkopd62b6782020-11-30 21:06:05 -0800679#endif /* MBEDTLS_HKDF_C */
680
John Durkopd62b6782020-11-30 21:06:05 -0800681#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
682#define PSA_WANT_ALG_HMAC 1
Gilles Peskine47a89332021-01-12 00:00:15 +0100683#define PSA_WANT_KEY_TYPE_HMAC
Andrzej Kurek65bf73e2022-08-31 14:59:31 -0400684
Kusumit Ghoderao83baf892023-05-03 11:42:29 +0530685#if defined(MBEDTLS_PKCS5_C)
686#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
687#define PSA_WANT_ALG_HMAC 1
688#define MBEDTLS_PSA_BUILTIN_ALG_PBKDF2_HMAC 1
689#define PSA_WANT_ALG_PBKDF2_HMAC 1
690#endif /* MBEDTLS_PKCS5_C */
691
Andrzej Kurek65bf73e2022-08-31 14:59:31 -0400692#if defined(MBEDTLS_MD_C)
John Durkopd62b6782020-11-30 21:06:05 -0800693#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
694#define PSA_WANT_ALG_TLS12_PRF 1
695#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
696#define PSA_WANT_ALG_TLS12_PSK_TO_MS 1
697#endif /* MBEDTLS_MD_C */
698
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100699#if defined(MBEDTLS_MD5_C)
700#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
701#define PSA_WANT_ALG_MD5 1
702#endif
703
Neil Armstrong637d0a02022-05-25 11:28:22 +0200704#if defined(MBEDTLS_ECJPAKE_C)
705#define MBEDTLS_PSA_BUILTIN_PAKE 1
Neil Armstronga557cb82022-06-10 08:58:32 +0200706#define MBEDTLS_PSA_BUILTIN_ALG_JPAKE 1
707#define PSA_WANT_ALG_JPAKE 1
Neil Armstrong637d0a02022-05-25 11:28:22 +0200708#endif
709
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100710#if defined(MBEDTLS_RIPEMD160_C)
711#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
712#define PSA_WANT_ALG_RIPEMD160 1
713#endif
714
John Durkopd62b6782020-11-30 21:06:05 -0800715#if defined(MBEDTLS_RSA_C)
716#if defined(MBEDTLS_PKCS1_V15)
717#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
718#define PSA_WANT_ALG_RSA_PKCS1V15_CRYPT 1
719#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
720#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN 1
Gilles Peskine1231eb52021-04-19 22:24:23 +0200721#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW 1
Yuto Takano7828ca22021-08-10 11:26:15 +0100722#endif /* MBEDTLS_PKCS1_V15 */
John Durkopd62b6782020-11-30 21:06:05 -0800723#if defined(MBEDTLS_PKCS1_V21)
724#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
725#define PSA_WANT_ALG_RSA_OAEP 1
726#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
727#define PSA_WANT_ALG_RSA_PSS 1
728#endif /* MBEDTLS_PKCS1_V21 */
729#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR 1
730#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR 1
731#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
732#define PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY 1
733#endif /* MBEDTLS_RSA_C */
734
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100735#if defined(MBEDTLS_SHA1_C)
736#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
737#define PSA_WANT_ALG_SHA_1 1
738#endif
739
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200740#if defined(MBEDTLS_SHA224_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100741#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
Gilles Peskineb65db072021-01-12 00:00:53 +0100742#define PSA_WANT_ALG_SHA_224 1
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200743#endif
744
745#if defined(MBEDTLS_SHA256_C)
746#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100747#define PSA_WANT_ALG_SHA_256 1
748#endif
749
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200750#if defined(MBEDTLS_SHA384_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100751#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
752#define PSA_WANT_ALG_SHA_384 1
753#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200754
755#if defined(MBEDTLS_SHA512_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100756#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
757#define PSA_WANT_ALG_SHA_512 1
758#endif
759
David Brown94933082021-01-05 12:03:25 -0700760#if defined(MBEDTLS_AES_C)
761#define PSA_WANT_KEY_TYPE_AES 1
David Brownda7dbb72021-01-26 11:44:15 -0700762#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700763#endif
764
Gilles Peskine09c46da2021-10-08 15:48:16 +0200765#if defined(MBEDTLS_ARIA_C)
766#define PSA_WANT_KEY_TYPE_ARIA 1
767#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
768#endif
769
David Brown686e6e82021-01-05 12:03:25 -0700770#if defined(MBEDTLS_CAMELLIA_C)
771#define PSA_WANT_KEY_TYPE_CAMELLIA 1
David Brownda7dbb72021-01-26 11:44:15 -0700772#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700773#endif
774
David Brownb65a7f72021-01-15 12:04:09 -0700775#if defined(MBEDTLS_DES_C)
776#define PSA_WANT_KEY_TYPE_DES 1
David Brownda7dbb72021-01-26 11:44:15 -0700777#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700778#endif
779
Andrzej Kurekd60907b2022-09-14 10:02:30 -0400780#if defined(MBEDTLS_PSA_BUILTIN_ALG_SHA_256)
781#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_ECJPAKE_TO_PMS 1
782#define PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS 1
783#endif
784
David Brownb16727a2021-02-08 16:31:46 -0700785#if defined(MBEDTLS_CHACHA20_C)
786#define PSA_WANT_KEY_TYPE_CHACHA20 1
787#define PSA_WANT_ALG_STREAM_CIPHER 1
788#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
789#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brownac4fa072021-02-08 16:47:35 -0700790#if defined(MBEDTLS_CHACHAPOLY_C)
791#define PSA_WANT_ALG_CHACHA20_POLY1305 1
David Brown86730a82021-02-09 16:24:11 -0700792#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700793#endif
David Brownb16727a2021-02-08 16:31:46 -0700794#endif
795
David Brown99844272021-01-15 12:04:47 -0700796#if defined(MBEDTLS_CIPHER_MODE_CBC)
David Brown10cb81c2021-02-09 16:10:29 -0700797#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700798#define PSA_WANT_ALG_CBC_NO_PADDING 1
799#if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
David Brown12f45f92021-01-26 11:50:36 -0700800#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brown99844272021-01-15 12:04:47 -0700801#define PSA_WANT_ALG_CBC_PKCS7 1
802#endif
803#endif
804
805#if defined(MBEDTLS_AES_C) || defined(MBEDTLS_DES_C) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200806 defined(MBEDTLS_ARIA_C) || defined(MBEDTLS_CAMELLIA_C)
David Brown10cb81c2021-02-09 16:10:29 -0700807#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700808#define PSA_WANT_ALG_ECB_NO_PADDING 1
809#endif
810
811#if defined(MBEDTLS_CIPHER_MODE_CFB)
David Brown12f45f92021-01-26 11:50:36 -0700812#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700813#define PSA_WANT_ALG_CFB 1
814#endif
815
816#if defined(MBEDTLS_CIPHER_MODE_CTR)
David Brown12f45f92021-01-26 11:50:36 -0700817#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700818#define PSA_WANT_ALG_CTR 1
819#endif
820
821#if defined(MBEDTLS_CIPHER_MODE_OFB)
David Brown12f45f92021-01-26 11:50:36 -0700822#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700823#define PSA_WANT_ALG_OFB 1
824#endif
825
David Browneed74df2021-03-15 15:53:57 -0600826#if defined(MBEDTLS_ECP_DP_BP256R1_ENABLED)
827#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
828#define PSA_WANT_ECC_BRAINPOOL_P_R1_256
829#endif
830
831#if defined(MBEDTLS_ECP_DP_BP384R1_ENABLED)
832#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
833#define PSA_WANT_ECC_BRAINPOOL_P_R1_384
834#endif
835
836#if defined(MBEDTLS_ECP_DP_BP512R1_ENABLED)
837#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
838#define PSA_WANT_ECC_BRAINPOOL_P_R1_512
839#endif
840
841#if defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED)
842#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
843#define PSA_WANT_ECC_MONTGOMERY_255
844#endif
845
Archanaef6aa5c2021-06-08 11:40:10 +0530846#if defined(MBEDTLS_ECP_DP_CURVE448_ENABLED)
David Browneed74df2021-03-15 15:53:57 -0600847#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
848#define PSA_WANT_ECC_MONTGOMERY_448
849#endif
850
David Brown8de143e2021-02-19 14:08:00 -0700851#if defined(MBEDTLS_ECP_DP_SECP192R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700852#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
853#define PSA_WANT_ECC_SECP_R1_192
David Brown8de143e2021-02-19 14:08:00 -0700854#endif
855
856#if defined(MBEDTLS_ECP_DP_SECP224R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700857#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
858#define PSA_WANT_ECC_SECP_R1_224
David Brown8de143e2021-02-19 14:08:00 -0700859#endif
860
861#if defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700862#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
863#define PSA_WANT_ECC_SECP_R1_256
David Brown8de143e2021-02-19 14:08:00 -0700864#endif
865
866#if defined(MBEDTLS_ECP_DP_SECP384R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700867#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
868#define PSA_WANT_ECC_SECP_R1_384
David Brown8de143e2021-02-19 14:08:00 -0700869#endif
870
871#if defined(MBEDTLS_ECP_DP_SECP521R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700872#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
873#define PSA_WANT_ECC_SECP_R1_521
David Brown8de143e2021-02-19 14:08:00 -0700874#endif
875
876#if defined(MBEDTLS_ECP_DP_SECP192K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700877#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
878#define PSA_WANT_ECC_SECP_K1_192
David Brown8de143e2021-02-19 14:08:00 -0700879#endif
880
Dave Rodgman017a1992022-03-31 14:07:01 +0100881/* SECP224K1 is buggy via the PSA API (https://github.com/Mbed-TLS/mbedtls/issues/3541) */
Gilles Peskine39841302021-03-23 12:06:45 +0100882#if 0 && defined(MBEDTLS_ECP_DP_SECP224K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700883#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
884#define PSA_WANT_ECC_SECP_K1_224
David Brown8de143e2021-02-19 14:08:00 -0700885#endif
886
David Brown9b178de2021-03-10 13:14:48 -0700887#if defined(MBEDTLS_ECP_DP_SECP256K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700888#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
889#define PSA_WANT_ECC_SECP_K1_256
David Brown8de143e2021-02-19 14:08:00 -0700890#endif
891
John Durkop2dfaf9c2020-09-24 04:30:10 -0700892#endif /* MBEDTLS_PSA_CRYPTO_CONFIG */
John Durkopd8959392020-09-20 23:09:17 -0700893
Gilles Peskine60b29fe2021-02-16 14:06:50 +0100894/* These features are always enabled. */
895#define PSA_WANT_KEY_TYPE_DERIVE 1
Gilles Peskinebba26302022-12-15 23:25:17 +0100896#define PSA_WANT_KEY_TYPE_PASSWORD 1
897#define PSA_WANT_KEY_TYPE_PASSWORD_HASH 1
Gilles Peskine60b29fe2021-02-16 14:06:50 +0100898#define PSA_WANT_KEY_TYPE_RAW_DATA 1
899
John Durkop6e33dbe2020-09-17 21:15:13 -0700900#ifdef __cplusplus
901}
902#endif
903
904#endif /* MBEDTLS_CONFIG_PSA_H */