blob: ae65829e15e72653fc13f73565d51dadc1e50ab0 [file] [log] [blame]
John Durkop6e33dbe2020-09-17 21:15:13 -07001/**
2 * \file mbedtls/config_psa.h
3 * \brief PSA crypto configuration options (set of defines)
4 *
John Durkop34818822020-10-12 21:36:22 -07005 * This set of compile-time options takes settings defined in
Bence Szépkútibb0cfeb2021-05-28 09:42:25 +02006 * include/mbedtls/mbedtls_config.h and include/psa/crypto_config.h and uses
John Durkop34818822020-10-12 21:36:22 -07007 * those definitions to define symbols used in the library code.
8 *
9 * Users and integrators should not edit this file, please edit
Tom Cosgrove1797b052022-12-04 17:19:59 +000010 * include/mbedtls/mbedtls_config.h for MBEDTLS_XXX settings or
John Durkop34818822020-10-12 21:36:22 -070011 * include/psa/crypto_config.h for PSA_WANT_XXX settings.
John Durkop6e33dbe2020-09-17 21:15:13 -070012 */
13/*
14 * Copyright The Mbed TLS Contributors
15 * SPDX-License-Identifier: Apache-2.0
16 *
17 * Licensed under the Apache License, Version 2.0 (the "License"); you may
18 * not use this file except in compliance with the License.
19 * You may obtain a copy of the License at
20 *
21 * http://www.apache.org/licenses/LICENSE-2.0
22 *
23 * Unless required by applicable law or agreed to in writing, software
24 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
25 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
26 * See the License for the specific language governing permissions and
27 * limitations under the License.
28 */
29
30#ifndef MBEDTLS_CONFIG_PSA_H
31#define MBEDTLS_CONFIG_PSA_H
32
John Durkop714e3a12020-09-29 22:07:04 -070033#if defined(MBEDTLS_PSA_CRYPTO_CONFIG)
Gilles Peskinef4c6eb02022-03-16 17:10:48 +010034#if defined(MBEDTLS_PSA_CRYPTO_CONFIG_FILE)
35#include MBEDTLS_PSA_CRYPTO_CONFIG_FILE
36#else
John Durkop6e33dbe2020-09-17 21:15:13 -070037#include "psa/crypto_config.h"
Gilles Peskinef4c6eb02022-03-16 17:10:48 +010038#endif
John Durkop76228ac2020-09-29 22:33:49 -070039#endif /* defined(MBEDTLS_PSA_CRYPTO_CONFIG) */
John Durkop6e33dbe2020-09-17 21:15:13 -070040
Gilles Peskinef4c6eb02022-03-16 17:10:48 +010041#if defined(MBEDTLS_PSA_CRYPTO_USER_CONFIG_FILE)
42#include MBEDTLS_PSA_CRYPTO_USER_CONFIG_FILE
43#endif
44
Valerio Settib7ef51a2023-06-06 14:32:58 +020045#include "psa/crypto_legacy.h"
46
John Durkop6e33dbe2020-09-17 21:15:13 -070047#ifdef __cplusplus
48extern "C" {
49#endif
50
Gilles Peskine1231eb52021-04-19 22:24:23 +020051
52
53/****************************************************************/
54/* De facto synonyms */
55/****************************************************************/
56
57#if defined(PSA_WANT_ALG_ECDSA_ANY) && !defined(PSA_WANT_ALG_ECDSA)
58#define PSA_WANT_ALG_ECDSA PSA_WANT_ALG_ECDSA_ANY
59#elif !defined(PSA_WANT_ALG_ECDSA_ANY) && defined(PSA_WANT_ALG_ECDSA)
60#define PSA_WANT_ALG_ECDSA_ANY PSA_WANT_ALG_ECDSA
61#endif
62
Gilles Peskine08622b62022-03-15 16:40:59 +010063#if defined(PSA_WANT_ALG_CCM_STAR_NO_TAG) && !defined(PSA_WANT_ALG_CCM)
64#define PSA_WANT_ALG_CCM PSA_WANT_ALG_CCM_STAR_NO_TAG
65#elif !defined(PSA_WANT_ALG_CCM_STAR_NO_TAG) && defined(PSA_WANT_ALG_CCM)
66#define PSA_WANT_ALG_CCM_STAR_NO_TAG PSA_WANT_ALG_CCM
67#endif
68
Gilles Peskine1231eb52021-04-19 22:24:23 +020069#if defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW) && !defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
70#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW
71#elif !defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW) && defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
72#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW PSA_WANT_ALG_RSA_PKCS1V15_SIGN
73#endif
74
Gilles Peskine44c96aa2021-10-04 18:33:56 +020075#if defined(PSA_WANT_ALG_RSA_PSS_ANY_SALT) && !defined(PSA_WANT_ALG_RSA_PSS)
76#define PSA_WANT_ALG_RSA_PSS PSA_WANT_ALG_RSA_PSS_ANY_SALT
77#elif !defined(PSA_WANT_ALG_RSA_PSS_ANY_SALT) && defined(PSA_WANT_ALG_RSA_PSS)
78#define PSA_WANT_ALG_RSA_PSS_ANY_SALT PSA_WANT_ALG_RSA_PSS
79#endif
80
Gilles Peskine1231eb52021-04-19 22:24:23 +020081
Manuel Pégourié-Gonnard235a9332023-03-14 18:01:23 +010082/****************************************************************/
83/* Hashes that are built in are also enabled in PSA.
84 * This simplifies dependency declarations especially
85 * for modules that obey MBEDTLS_USE_PSA_CRYPTO. */
86/****************************************************************/
87
88#if defined(MBEDTLS_MD5_C)
89#define PSA_WANT_ALG_MD5 1
90#endif
91
92#if defined(MBEDTLS_RIPEMD160_C)
93#define PSA_WANT_ALG_RIPEMD160 1
94#endif
95
96#if defined(MBEDTLS_SHA1_C)
97#define PSA_WANT_ALG_SHA_1 1
98#endif
99
100#if defined(MBEDTLS_SHA224_C)
101#define PSA_WANT_ALG_SHA_224 1
102#endif
103
104#if defined(MBEDTLS_SHA256_C)
105#define PSA_WANT_ALG_SHA_256 1
106#endif
107
108#if defined(MBEDTLS_SHA384_C)
109#define PSA_WANT_ALG_SHA_384 1
110#endif
111
112#if defined(MBEDTLS_SHA512_C)
113#define PSA_WANT_ALG_SHA_512 1
114#endif
115
Dave Rodgman98083c62023-06-25 23:27:45 +0100116#if defined(MBEDTLS_SHA3_C)
Dave Rodgmanf66cd612023-06-26 11:02:12 +0100117#define PSA_WANT_ALG_SHA3_224 1
118#define PSA_WANT_ALG_SHA3_256 1
119#define PSA_WANT_ALG_SHA3_384 1
120#define PSA_WANT_ALG_SHA3_512 1
Dave Rodgman98083c62023-06-25 23:27:45 +0100121#endif
122
Gilles Peskine1231eb52021-04-19 22:24:23 +0200123
124/****************************************************************/
125/* Require built-in implementations based on PSA requirements */
126/****************************************************************/
127
John Durkop2dfaf9c2020-09-24 04:30:10 -0700128#if defined(MBEDTLS_PSA_CRYPTO_CONFIG)
John Durkopd8959392020-09-20 23:09:17 -0700129
John Durkopd62b6782020-11-30 21:06:05 -0800130#if defined(PSA_WANT_ALG_DETERMINISTIC_ECDSA)
131#if !defined(MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA)
132#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
133#define MBEDTLS_ECDSA_DETERMINISTIC
134#define MBEDTLS_ECDSA_C
135#define MBEDTLS_HMAC_DRBG_C
136#define MBEDTLS_MD_C
137#endif /* !MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA */
138#endif /* PSA_WANT_ALG_DETERMINISTIC_ECDSA */
139
140#if defined(PSA_WANT_ALG_ECDH)
141#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDH)
142#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
143#define MBEDTLS_ECDH_C
144#define MBEDTLS_ECP_C
145#define MBEDTLS_BIGNUM_C
146#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDH */
147#endif /* PSA_WANT_ALG_ECDH */
148
149#if defined(PSA_WANT_ALG_ECDSA)
150#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDSA)
151#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
152#define MBEDTLS_ECDSA_C
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200153#define MBEDTLS_ECP_C
154#define MBEDTLS_BIGNUM_C
155#define MBEDTLS_ASN1_PARSE_C
156#define MBEDTLS_ASN1_WRITE_C
John Durkopd62b6782020-11-30 21:06:05 -0800157#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDSA */
158#endif /* PSA_WANT_ALG_ECDSA */
159
Przemek Stekiel84ee3e22022-12-01 14:22:34 +0100160#if defined(PSA_WANT_ALG_FFDH)
161#if !defined(MBEDTLS_PSA_ACCEL_ALG_FFDH)
162#define MBEDTLS_PSA_BUILTIN_ALG_FFDH 1
Przemek Stekiel84ee3e22022-12-01 14:22:34 +0100163#define MBEDTLS_BIGNUM_C
164#endif /* !MBEDTLS_PSA_ACCEL_ALG_FFDH */
165#endif /* PSA_WANT_ALG_FFDH */
166
John Durkopd62b6782020-11-30 21:06:05 -0800167#if defined(PSA_WANT_ALG_HKDF)
168#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF)
169#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
170#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
171#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF */
172#endif /* PSA_WANT_ALG_HKDF */
173
Przemek Stekiel3e8249c2022-06-03 14:05:07 +0200174#if defined(PSA_WANT_ALG_HKDF_EXTRACT)
175#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF_EXTRACT)
176#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
177#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXTRACT 1
178#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF_EXTRACT */
179#endif /* PSA_WANT_ALG_HKDF_EXTRACT */
180
181#if defined(PSA_WANT_ALG_HKDF_EXPAND)
182#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF_EXPAND)
183#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
184#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXPAND 1
185#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF_EXPAND */
186#endif /* PSA_WANT_ALG_HKDF_EXPAND */
187
John Durkopd62b6782020-11-30 21:06:05 -0800188#if defined(PSA_WANT_ALG_HMAC)
189#if !defined(MBEDTLS_PSA_ACCEL_ALG_HMAC)
190#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
191#endif /* !MBEDTLS_PSA_ACCEL_ALG_HMAC */
192#endif /* PSA_WANT_ALG_HMAC */
193
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100194#if defined(PSA_WANT_ALG_MD5) && !defined(MBEDTLS_PSA_ACCEL_ALG_MD5)
195#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
196#define MBEDTLS_MD5_C
197#endif
198
Neil Armstronga557cb82022-06-10 08:58:32 +0200199#if defined(PSA_WANT_ALG_JPAKE)
Przemek Stekiel4aa99402023-02-27 13:00:57 +0100200#if !defined(MBEDTLS_PSA_ACCEL_ALG_JPAKE)
Neil Armstrong637d0a02022-05-25 11:28:22 +0200201#define MBEDTLS_PSA_BUILTIN_PAKE 1
Neil Armstronga557cb82022-06-10 08:58:32 +0200202#define MBEDTLS_PSA_BUILTIN_ALG_JPAKE 1
Neil Armstronged407822022-06-15 11:21:33 +0200203#define MBEDTLS_ECP_DP_SECP256R1_ENABLED
Neil Armstrong637d0a02022-05-25 11:28:22 +0200204#define MBEDTLS_BIGNUM_C
205#define MBEDTLS_ECP_C
Neil Armstrong637d0a02022-05-25 11:28:22 +0200206#define MBEDTLS_ECJPAKE_C
Przemek Stekiel4aa99402023-02-27 13:00:57 +0100207#endif /* MBEDTLS_PSA_ACCEL_ALG_JPAKE */
Neil Armstronga557cb82022-06-10 08:58:32 +0200208#endif /* PSA_WANT_ALG_JPAKE */
Neil Armstrong637d0a02022-05-25 11:28:22 +0200209
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100210#if defined(PSA_WANT_ALG_RIPEMD160) && !defined(MBEDTLS_PSA_ACCEL_ALG_RIPEMD160)
211#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
212#define MBEDTLS_RIPEMD160_C
213#endif
214
John Durkopd62b6782020-11-30 21:06:05 -0800215#if defined(PSA_WANT_ALG_RSA_OAEP)
216#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP)
217#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
218#define MBEDTLS_RSA_C
219#define MBEDTLS_BIGNUM_C
220#define MBEDTLS_OID_C
221#define MBEDTLS_PKCS1_V21
John Durkopd62b6782020-11-30 21:06:05 -0800222#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP */
223#endif /* PSA_WANT_ALG_RSA_OAEP */
224
225#if defined(PSA_WANT_ALG_RSA_PKCS1V15_CRYPT)
226#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT)
227#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
228#define MBEDTLS_RSA_C
229#define MBEDTLS_BIGNUM_C
230#define MBEDTLS_OID_C
231#define MBEDTLS_PKCS1_V15
232#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT */
233#endif /* PSA_WANT_ALG_RSA_PKCS1V15_CRYPT */
234
235#if defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
236#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN)
237#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
238#define MBEDTLS_RSA_C
239#define MBEDTLS_BIGNUM_C
240#define MBEDTLS_OID_C
241#define MBEDTLS_PKCS1_V15
John Durkopd62b6782020-11-30 21:06:05 -0800242#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN */
243#endif /* PSA_WANT_ALG_RSA_PKCS1V15_SIGN */
244
245#if defined(PSA_WANT_ALG_RSA_PSS)
246#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PSS)
247#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
248#define MBEDTLS_RSA_C
249#define MBEDTLS_BIGNUM_C
250#define MBEDTLS_OID_C
251#define MBEDTLS_PKCS1_V21
John Durkopd62b6782020-11-30 21:06:05 -0800252#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PSS */
253#endif /* PSA_WANT_ALG_RSA_PSS */
254
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100255#if defined(PSA_WANT_ALG_SHA_1) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_1)
256#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
257#define MBEDTLS_SHA1_C
258#endif
259
260#if defined(PSA_WANT_ALG_SHA_224) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_224)
261#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200262#define MBEDTLS_SHA224_C
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100263#endif
264
265#if defined(PSA_WANT_ALG_SHA_256) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_256)
266#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
267#define MBEDTLS_SHA256_C
268#endif
269
270#if defined(PSA_WANT_ALG_SHA_384) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_384)
271#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200272#define MBEDTLS_SHA384_C
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100273#endif
274
275#if defined(PSA_WANT_ALG_SHA_512) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_512)
276#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
277#define MBEDTLS_SHA512_C
278#endif
279
Dave Rodgman47a2ac12023-06-26 18:39:42 +0100280#if defined(PSA_WANT_ALG_SHA3_224) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA3_224)
Dave Rodgmanf66cd612023-06-26 11:02:12 +0100281#define MBEDTLS_PSA_BUILTIN_ALG_SHA3_224 1
282#define MBEDTLS_SHA3_C
283#endif
284
Dave Rodgman47a2ac12023-06-26 18:39:42 +0100285#if defined(PSA_WANT_ALG_SHA3_256) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA3_256)
Dave Rodgmanf66cd612023-06-26 11:02:12 +0100286#define MBEDTLS_PSA_BUILTIN_ALG_SHA3_256 1
287#define MBEDTLS_SHA3_C
288#endif
289
Dave Rodgman47a2ac12023-06-26 18:39:42 +0100290#if defined(PSA_WANT_ALG_SHA3_384) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA3_384)
Dave Rodgmanf66cd612023-06-26 11:02:12 +0100291#define MBEDTLS_PSA_BUILTIN_ALG_SHA3_384 1
292#define MBEDTLS_SHA3_C
293#endif
294
Dave Rodgman47a2ac12023-06-26 18:39:42 +0100295#if defined(PSA_WANT_ALG_SHA3_512) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA3_512)
Dave Rodgmanf66cd612023-06-26 11:02:12 +0100296#define MBEDTLS_PSA_BUILTIN_ALG_SHA3_512 1
Dave Rodgman98083c62023-06-25 23:27:45 +0100297#define MBEDTLS_SHA3_C
298#endif
299
Kusumit Ghoderao83baf892023-05-03 11:42:29 +0530300#if defined(PSA_WANT_ALG_PBKDF2_HMAC)
301#if !defined(MBEDTLS_PSA_ACCEL_ALG_PBKDF2_HMAC)
302#define MBEDTLS_PSA_BUILTIN_ALG_PBKDF2_HMAC 1
Kusumit Ghoderaob9410e82023-05-03 18:36:35 +0530303#if !defined(MBEDTLS_PSA_ACCEL_ALG_HMAC)
Kusumit Ghoderao83baf892023-05-03 11:42:29 +0530304#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
Kusumit Ghoderaob9410e82023-05-03 18:36:35 +0530305#endif /* !MBEDTLS_PSA_ACCEL_ALG_HMAC */
Kusumit Ghoderao83baf892023-05-03 11:42:29 +0530306#endif /* !MBEDTLS_PSA_BUILTIN_ALG_PBKDF2_HMAC */
307#endif /* PSA_WANT_ALG_PBKDF2_HMAC */
308
John Durkop07cc04a2020-11-16 22:08:34 -0800309#if defined(PSA_WANT_ALG_TLS12_PRF)
310#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF)
John Durkopd62b6782020-11-30 21:06:05 -0800311#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
John Durkop07cc04a2020-11-16 22:08:34 -0800312#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF */
313#endif /* PSA_WANT_ALG_TLS12_PRF */
314
315#if defined(PSA_WANT_ALG_TLS12_PSK_TO_MS)
316#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS)
John Durkopd62b6782020-11-30 21:06:05 -0800317#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
John Durkop07cc04a2020-11-16 22:08:34 -0800318#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS */
319#endif /* PSA_WANT_ALG_TLS12_PSK_TO_MS */
320
Andrzej Kurek08d34b82022-07-29 10:00:16 -0400321#if defined(PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS)
322#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_ECJPAKE_TO_PMS)
323#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_ECJPAKE_TO_PMS 1
324#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_ECJPAKE_TO_PMS */
325#endif /* PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS */
326
Valerio Setti4520a8f2023-06-13 12:34:12 +0200327#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200328#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200329#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_IMPORT)
330#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_IMPORT 1
331#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_IMPORT */
332#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT */
333
334#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200335#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200336#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_EXPORT)
337#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_EXPORT 1
338#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_EXPORT */
339#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT */
340
341#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200342#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200343#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_GENERATE)
344#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_GENERATE 1
345#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_GENERATE */
346#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE */
347
348#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200349#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200350#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_DERIVE)
351#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_DERIVE 1
352#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_DERIVE */
353#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE */
354
Valerio Setti01cc88a2023-06-15 11:53:08 +0200355#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC)
Valerio Settiaac957b2023-06-09 16:59:00 +0200356#define PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200357#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_BASIC)
358#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
359#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR_BASIC */
360#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC */
John Durkop07cc04a2020-11-16 22:08:34 -0800361
Valerio Setti4520a8f2023-06-13 12:34:12 +0200362#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_IMPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200363#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200364#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_IMPORT)
365#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_IMPORT 1
366#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_IMPORT */
367#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_IMPORT */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200368
Valerio Setti4520a8f2023-06-13 12:34:12 +0200369#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_EXPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200370#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200371#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_EXPORT)
372#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_EXPORT 1
373#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_EXPORT */
374#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_EXPORT */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200375
Valerio Setti4520a8f2023-06-13 12:34:12 +0200376#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_GENERATE)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200377#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200378#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_GENERATE)
379#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_GENERATE 1
380#define MBEDTLS_GENPRIME
381#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_GENERATE */
382#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_GENERATE */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200383
Valerio Setti01cc88a2023-06-15 11:53:08 +0200384#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC)
Valerio Settiaac957b2023-06-09 16:59:00 +0200385#define PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200386#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_BASIC)
387#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
388#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR_BASIC */
389#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200390
Valerio Setti4520a8f2023-06-13 12:34:12 +0200391#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_IMPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200392#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200393#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_IMPORT)
394#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_IMPORT 1
395#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_IMPORT */
396#endif /* PSA_WANT_KEY_TYPE_DH_KEY_PAIR_IMPORT */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200397
Valerio Setti4520a8f2023-06-13 12:34:12 +0200398#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_EXPORT)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200399#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200400#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_EXPORT)
401#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT 1
402#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_EXPORT */
403#endif /* PSA_WANT_KEY_TYPE_DH_KEY_PAIR_EXPORT */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200404
Valerio Setti4520a8f2023-06-13 12:34:12 +0200405#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_GENERATE)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200406#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC 1
Valerio Setti4520a8f2023-06-13 12:34:12 +0200407#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_GENERATE)
408#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE 1
409#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_GENERATE */
410#endif /* PSA_WANT_KEY_TYPE_DH_KEY_PAIR_GENERATE */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200411
Valerio Setti01cc88a2023-06-15 11:53:08 +0200412#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC)
Valerio Settiaac957b2023-06-09 16:59:00 +0200413#define PSA_WANT_KEY_TYPE_DH_PUBLIC_KEY 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200414#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_BASIC)
415#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_BASIC 1
416#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_KEY_PAIR_BASIC */
417#endif /* PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC */
Valerio Setti67a3e3e2023-05-26 13:37:26 +0200418
John Durkop07cc04a2020-11-16 22:08:34 -0800419#if defined(PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY)
420#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800421#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
John Durkop07cc04a2020-11-16 22:08:34 -0800422#define MBEDTLS_ECP_C
423#define MBEDTLS_BIGNUM_C
424#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY */
425#endif /* PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY */
426
Przemek Stekiel6d85afa2023-04-28 11:42:17 +0200427#if defined(PSA_WANT_KEY_TYPE_DH_PUBLIC_KEY)
428#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_PUBLIC_KEY)
429#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY 1
Przemek Stekiel87d9a4a2022-12-15 13:22:11 +0100430#define MBEDTLS_BIGNUM_C
Przemek Stekiel6d85afa2023-04-28 11:42:17 +0200431#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DH_PUBLIC_KEY */
432#endif /* PSA_WANT_KEY_TYPE_DH_PUBLIC_KEY */
Przemek Stekiel87d9a4a2022-12-15 13:22:11 +0100433
John Durkop9814fa22020-11-04 12:28:15 -0800434#if defined(PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkop0e005192020-10-31 22:06:54 -0700435#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800436#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
John Durkop0e005192020-10-31 22:06:54 -0700437#define MBEDTLS_RSA_C
438#define MBEDTLS_BIGNUM_C
439#define MBEDTLS_OID_C
John Durkop07cc04a2020-11-16 22:08:34 -0800440#define MBEDTLS_PK_PARSE_C
441#define MBEDTLS_PK_WRITE_C
442#define MBEDTLS_PK_C
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200443#define MBEDTLS_ASN1_PARSE_C
444#define MBEDTLS_ASN1_WRITE_C
John Durkop0e005192020-10-31 22:06:54 -0700445#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkop9814fa22020-11-04 12:28:15 -0800446#endif /* PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkopd0321952020-10-29 21:37:36 -0700447
David Brownb781f752021-02-08 15:44:52 -0700448/* If any of the block modes are requested that don't have an
449 * associated HW assist, define PSA_HAVE_SOFT_BLOCK_MODE for checking
450 * in the block cipher key types. */
451#if (defined(PSA_WANT_ALG_CTR) && !defined(MBEDTLS_PSA_ACCEL_ALG_CTR)) || \
Bence Szépkúti7921cce2021-02-17 11:46:50 +0100452 (defined(PSA_WANT_ALG_CFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_CFB)) || \
David Brownb781f752021-02-08 15:44:52 -0700453 (defined(PSA_WANT_ALG_OFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_OFB)) || \
David Brownb781f752021-02-08 15:44:52 -0700454 defined(PSA_WANT_ALG_ECB_NO_PADDING) || \
455 (defined(PSA_WANT_ALG_CBC_NO_PADDING) && \
Gilles Peskine449bd832023-01-11 14:50:10 +0100456 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING)) || \
David Brownb781f752021-02-08 15:44:52 -0700457 (defined(PSA_WANT_ALG_CBC_PKCS7) && \
Gilles Peskine449bd832023-01-11 14:50:10 +0100458 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7)) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100459 (defined(PSA_WANT_ALG_CMAC) && !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC))
David Brownb781f752021-02-08 15:44:52 -0700460#define PSA_HAVE_SOFT_BLOCK_MODE 1
461#endif
462
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100463#if (defined(PSA_WANT_ALG_GCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_GCM)) || \
464 (defined(PSA_WANT_ALG_CCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_CCM))
465#define PSA_HAVE_SOFT_BLOCK_AEAD 1
466#endif
467
David Brown94933082021-01-05 12:03:25 -0700468#if defined(PSA_WANT_KEY_TYPE_AES)
David Browne1f91f02021-02-09 15:56:22 -0700469#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_AES)
470#define PSA_HAVE_SOFT_KEY_TYPE_AES 1
471#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_AES */
472#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100473 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
474 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
David Brown78a429b2021-01-21 09:48:57 -0700475#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700476#define MBEDTLS_AES_C
David Browne1f91f02021-02-09 15:56:22 -0700477#endif /* PSA_HAVE_SOFT_KEY_TYPE_AES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown94933082021-01-05 12:03:25 -0700478#endif /* PSA_WANT_KEY_TYPE_AES */
479
Gilles Peskine09c46da2021-10-08 15:48:16 +0200480#if defined(PSA_WANT_KEY_TYPE_ARIA)
481#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA)
482#define PSA_HAVE_SOFT_KEY_TYPE_ARIA 1
483#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA */
484#if defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
485 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
486 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
487#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
488#define MBEDTLS_ARIA_C
489#endif /* PSA_HAVE_SOFT_KEY_TYPE_ARIA || PSA_HAVE_SOFT_BLOCK_MODE */
490#endif /* PSA_WANT_KEY_TYPE_ARIA */
491
David Brown686e6e82021-01-05 12:03:25 -0700492#if defined(PSA_WANT_KEY_TYPE_CAMELLIA)
David Browne1f91f02021-02-09 15:56:22 -0700493#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA)
494#define PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA 1
495#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA */
496#if defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100497 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
498 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
David Brown78a429b2021-01-21 09:48:57 -0700499#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700500#define MBEDTLS_CAMELLIA_C
David Browne1f91f02021-02-09 15:56:22 -0700501#endif /* PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown686e6e82021-01-05 12:03:25 -0700502#endif /* PSA_WANT_KEY_TYPE_CAMELLIA */
503
David Brownb65a7f72021-01-15 12:04:09 -0700504#if defined(PSA_WANT_KEY_TYPE_DES)
David Browne1f91f02021-02-09 15:56:22 -0700505#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DES)
506#define PSA_HAVE_SOFT_KEY_TYPE_DES 1
507#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DES */
508#if defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
David Brownb781f752021-02-08 15:44:52 -0700509 defined(PSA_HAVE_SOFT_BLOCK_MODE)
David Brown78a429b2021-01-21 09:48:57 -0700510#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700511#define MBEDTLS_DES_C
David Browne1f91f02021-02-09 15:56:22 -0700512#endif /*PSA_HAVE_SOFT_KEY_TYPE_DES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brownb65a7f72021-01-15 12:04:09 -0700513#endif /* PSA_WANT_KEY_TYPE_DES */
514
David Brownb16727a2021-02-08 16:31:46 -0700515#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
516#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20)
517#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
518#define MBEDTLS_CHACHA20_C
519#endif /*!MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20 */
520#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
521
David Brownf84a0f62021-02-09 15:59:41 -0700522/* If any of the software block ciphers are selected, define
523 * PSA_HAVE_SOFT_BLOCK_CIPHER, which can be used in any of these
524 * situations. */
525#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200526 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
David Brownf84a0f62021-02-09 15:59:41 -0700527 defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
528 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
529#define PSA_HAVE_SOFT_BLOCK_CIPHER 1
530#endif
531
David Brown99844272021-01-15 12:04:47 -0700532#if defined(PSA_WANT_ALG_STREAM_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700533#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brown99844272021-01-15 12:04:47 -0700534#endif /* PSA_WANT_ALG_STREAM_CIPHER */
535
Ronald Crond85e98d2021-03-25 15:32:32 +0100536#if defined(PSA_WANT_ALG_CBC_MAC)
537#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_MAC)
538#error "CBC-MAC is not yet supported via the PSA API in Mbed TLS."
539#define MBEDTLS_PSA_BUILTIN_ALG_CBC_MAC 1
540#endif /* !MBEDTLS_PSA_ACCEL_ALG_CBC_MAC */
541#endif /* PSA_WANT_ALG_CBC_MAC */
542
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100543#if defined(PSA_WANT_ALG_CMAC)
544#if !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC) || \
545 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
546#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
547#define MBEDTLS_CMAC_C
548#endif /* !MBEDTLS_PSA_ACCEL_ALG_CMAC */
549#endif /* PSA_WANT_ALG_CMAC */
550
David Brown99844272021-01-15 12:04:47 -0700551#if defined(PSA_WANT_ALG_CTR)
David Brown4b9ec7a2021-02-05 12:47:08 -0700552#if !defined(MBEDTLS_PSA_ACCEL_ALG_CTR) || \
David Brownf84a0f62021-02-09 15:59:41 -0700553 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700554#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700555#define MBEDTLS_CIPHER_MODE_CTR
David Brown4b9ec7a2021-02-05 12:47:08 -0700556#endif
David Brown99844272021-01-15 12:04:47 -0700557#endif /* PSA_WANT_ALG_CTR */
558
559#if defined(PSA_WANT_ALG_CFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700560#if !defined(MBEDTLS_PSA_ACCEL_ALG_CFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700561 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700562#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700563#define MBEDTLS_CIPHER_MODE_CFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700564#endif
David Brown99844272021-01-15 12:04:47 -0700565#endif /* PSA_WANT_ALG_CFB */
566
567#if defined(PSA_WANT_ALG_OFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700568#if !defined(MBEDTLS_PSA_ACCEL_ALG_OFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700569 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700570#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700571#define MBEDTLS_CIPHER_MODE_OFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700572#endif
David Brown99844272021-01-15 12:04:47 -0700573#endif /* PSA_WANT_ALG_OFB */
574
Gilles Peskine7a2e83b2022-03-17 11:09:23 +0100575#if defined(PSA_WANT_ALG_ECB_NO_PADDING) && \
576 !defined(MBEDTLS_PSA_ACCEL_ALG_ECB_NO_PADDING)
David Brownbe380c12021-02-11 10:55:48 -0700577#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700578#endif
579
David Brown12f45f92021-01-26 11:50:36 -0700580#if defined(PSA_WANT_ALG_CBC_NO_PADDING)
David Brown4b9ec7a2021-02-05 12:47:08 -0700581#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING) || \
David Brownfc468182021-02-09 16:23:34 -0700582 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700583#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700584#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown4b9ec7a2021-02-05 12:47:08 -0700585#endif
David Brown12f45f92021-01-26 11:50:36 -0700586#endif /* PSA_WANT_ALG_CBC_NO_PADDING */
587
588#if defined(PSA_WANT_ALG_CBC_PKCS7)
David Brown4b9ec7a2021-02-05 12:47:08 -0700589#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7) || \
David Brownfc468182021-02-09 16:23:34 -0700590 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700591#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700592#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brownfc468182021-02-09 16:23:34 -0700593#define MBEDTLS_CIPHER_PADDING_PKCS7
David Brown4b9ec7a2021-02-05 12:47:08 -0700594#endif
David Brown12f45f92021-01-26 11:50:36 -0700595#endif /* PSA_WANT_ALG_CBC_PKCS7 */
596
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100597#if defined(PSA_WANT_ALG_CCM)
598#if !defined(MBEDTLS_PSA_ACCEL_ALG_CCM) || \
599 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200600 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100601 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
602#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100603#define MBEDTLS_PSA_BUILTIN_ALG_CCM_STAR_NO_TAG 1
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100604#define MBEDTLS_CCM_C
605#endif
606#endif /* PSA_WANT_ALG_CCM */
607
608#if defined(PSA_WANT_ALG_GCM)
609#if !defined(MBEDTLS_PSA_ACCEL_ALG_GCM) || \
610 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200611 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100612 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
613#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
614#define MBEDTLS_GCM_C
615#endif
616#endif /* PSA_WANT_ALG_GCM */
617
David Brownac4fa072021-02-08 16:47:35 -0700618#if defined(PSA_WANT_ALG_CHACHA20_POLY1305)
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200619#if !defined(MBEDTLS_PSA_ACCEL_ALG_CHACHA20_POLY1305)
David Brownac4fa072021-02-08 16:47:35 -0700620#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
621#define MBEDTLS_CHACHAPOLY_C
Summer Qin9f2596f2022-06-17 12:50:32 +0800622#define MBEDTLS_CHACHA20_C
623#define MBEDTLS_POLY1305_C
David Brown86730a82021-02-09 16:24:11 -0700624#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700625#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200626#endif /* !MBEDTLS_PSA_ACCEL_ALG_CHACHA20_POLY1305 */
David Brownac4fa072021-02-08 16:47:35 -0700627#endif /* PSA_WANT_ALG_CHACHA20_POLY1305 */
628
David Browneed74df2021-03-15 15:53:57 -0600629#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_256)
630#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256)
631#define MBEDTLS_ECP_DP_BP256R1_ENABLED
632#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
633#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256 */
634#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_256 */
635
636#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_384)
637#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384)
638#define MBEDTLS_ECP_DP_BP384R1_ENABLED
639#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
640#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384 */
641#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_384 */
642
643#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_512)
644#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512)
645#define MBEDTLS_ECP_DP_BP512R1_ENABLED
646#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
647#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512 */
648#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_512 */
649
650#if defined(PSA_WANT_ECC_MONTGOMERY_255)
651#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255)
652#define MBEDTLS_ECP_DP_CURVE25519_ENABLED
653#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
654#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255 */
655#endif /* PSA_WANT_ECC_MONTGOMERY_255 */
656
657#if defined(PSA_WANT_ECC_MONTGOMERY_448)
658#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448)
659#define MBEDTLS_ECP_DP_CURVE448_ENABLED
660#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
661#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448 */
662#endif /* PSA_WANT_ECC_MONTGOMERY_448 */
663
David Brownc7b9b2b2021-02-19 21:05:52 -0700664#if defined(PSA_WANT_ECC_SECP_R1_192)
665#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192)
666#define MBEDTLS_ECP_DP_SECP192R1_ENABLED
667#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
668#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192 */
669#endif /* PSA_WANT_ECC_SECP_R1_192 */
670
671#if defined(PSA_WANT_ECC_SECP_R1_224)
672#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224)
673#define MBEDTLS_ECP_DP_SECP224R1_ENABLED
674#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
675#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224 */
676#endif /* PSA_WANT_ECC_SECP_R1_224 */
677
678#if defined(PSA_WANT_ECC_SECP_R1_256)
679#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256)
680#define MBEDTLS_ECP_DP_SECP256R1_ENABLED
681#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
682#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256 */
683#endif /* PSA_WANT_ECC_SECP_R1_256 */
684
685#if defined(PSA_WANT_ECC_SECP_R1_384)
686#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384)
687#define MBEDTLS_ECP_DP_SECP384R1_ENABLED
688#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
689#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384 */
690#endif /* PSA_WANT_ECC_SECP_R1_384 */
691
692#if defined(PSA_WANT_ECC_SECP_R1_521)
693#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521)
694#define MBEDTLS_ECP_DP_SECP521R1_ENABLED
695#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
696#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521 */
697#endif /* PSA_WANT_ECC_SECP_R1_521 */
698
699#if defined(PSA_WANT_ECC_SECP_K1_192)
700#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192)
David Brown8de143e2021-02-19 14:08:00 -0700701#define MBEDTLS_ECP_DP_SECP192K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700702#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
703#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192 */
704#endif /* PSA_WANT_ECC_SECP_K1_192 */
David Brown8de143e2021-02-19 14:08:00 -0700705
David Brownc7b9b2b2021-02-19 21:05:52 -0700706#if defined(PSA_WANT_ECC_SECP_K1_224)
707#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224)
Ronald Crone1f55162021-03-25 15:09:47 +0100708/*
709 * SECP224K1 is buggy via the PSA API in Mbed TLS
Dave Rodgman017a1992022-03-31 14:07:01 +0100710 * (https://github.com/Mbed-TLS/mbedtls/issues/3541).
Ronald Crone1f55162021-03-25 15:09:47 +0100711 */
712#error "SECP224K1 is buggy via the PSA API in Mbed TLS."
David Brown8de143e2021-02-19 14:08:00 -0700713#define MBEDTLS_ECP_DP_SECP224K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700714#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
715#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224 */
716#endif /* PSA_WANT_ECC_SECP_K1_224 */
David Brown8de143e2021-02-19 14:08:00 -0700717
David Brownc7b9b2b2021-02-19 21:05:52 -0700718#if defined(PSA_WANT_ECC_SECP_K1_256)
719#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256)
David Brown9b178de2021-03-10 13:14:48 -0700720#define MBEDTLS_ECP_DP_SECP256K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700721#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
722#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256 */
723#endif /* PSA_WANT_ECC_SECP_K1_256 */
David Brown8de143e2021-02-19 14:08:00 -0700724
Gilles Peskine1231eb52021-04-19 22:24:23 +0200725
726
727/****************************************************************/
728/* Infer PSA requirements from Mbed TLS capabilities */
729/****************************************************************/
730
John Durkop714e3a12020-09-29 22:07:04 -0700731#else /* MBEDTLS_PSA_CRYPTO_CONFIG */
732
733/*
734 * Ensure PSA_WANT_* defines are setup properly if MBEDTLS_PSA_CRYPTO_CONFIG
735 * is not defined
736 */
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100737
Ronald Cron3d471812021-03-18 13:40:31 +0100738#if defined(MBEDTLS_CCM_C)
739#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100740#define MBEDTLS_PSA_BUILTIN_ALG_CCM_STAR_NO_TAG 1
Ronald Cron3d471812021-03-18 13:40:31 +0100741#define PSA_WANT_ALG_CCM 1
Gilles Peskine08622b62022-03-15 16:40:59 +0100742#define PSA_WANT_ALG_CCM_STAR_NO_TAG 1
Ronald Cron3d471812021-03-18 13:40:31 +0100743#endif /* MBEDTLS_CCM_C */
744
745#if defined(MBEDTLS_CMAC_C)
746#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
747#define PSA_WANT_ALG_CMAC 1
748#endif /* MBEDTLS_CMAC_C */
749
John Durkopd62b6782020-11-30 21:06:05 -0800750#if defined(MBEDTLS_ECDH_C)
751#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
752#define PSA_WANT_ALG_ECDH 1
753#endif /* MBEDTLS_ECDH_C */
754
755#if defined(MBEDTLS_ECDSA_C)
756#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
757#define PSA_WANT_ALG_ECDSA 1
Gilles Peskine1231eb52021-04-19 22:24:23 +0200758#define PSA_WANT_ALG_ECDSA_ANY 1
John Durkopd62b6782020-11-30 21:06:05 -0800759
760// Only add in DETERMINISTIC support if ECDSA is also enabled
761#if defined(MBEDTLS_ECDSA_DETERMINISTIC)
762#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
763#define PSA_WANT_ALG_DETERMINISTIC_ECDSA 1
764#endif /* MBEDTLS_ECDSA_DETERMINISTIC */
765
766#endif /* MBEDTLS_ECDSA_C */
767
768#if defined(MBEDTLS_ECP_C)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200769#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Settif87b5052023-05-26 13:47:09 +0200770#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT 1
771#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT 1
Valerio Settif87b5052023-05-26 13:47:09 +0200772#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE 1
Valerio Setti06dfba72023-06-30 10:09:36 +0200773/* Normally we wouldn't enable this because it's not implemented in ecp.c,
774 * but since it used to be available any time ECP_C was enabled, let's enable
775 * it anyway for the sake of backwards compatibility */
776#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200777#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_BASIC 1
Valerio Settiddb57762023-06-06 14:17:15 +0200778#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_IMPORT 1
779#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_EXPORT 1
780#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_GENERATE 1
Valerio Setti06dfba72023-06-30 10:09:36 +0200781/* See comment for PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE above. */
782#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_DERIVE 1
John Durkopd62b6782020-11-30 21:06:05 -0800783#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
784#define PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY 1
785#endif /* MBEDTLS_ECP_C */
786
Przemek Stekiel746dfae2023-05-04 09:14:08 +0200787#if defined(MBEDTLS_DHM_C)
Valerio Setti01cc88a2023-06-15 11:53:08 +0200788#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC 1
Valerio Settif87b5052023-05-26 13:47:09 +0200789#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_IMPORT 1
790#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_EXPORT 1
Valerio Settif87b5052023-05-26 13:47:09 +0200791#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_GENERATE 1
Przemek Stekiel746dfae2023-05-04 09:14:08 +0200792#define PSA_WANT_KEY_TYPE_DH_PUBLIC_KEY 1
793#define PSA_WANT_ALG_FFDH 1
794#define PSA_WANT_DH_FAMILY_RFC7919 1
795#define MBEDTLS_PSA_BUILTIN_ALG_FFDH 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200796#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_BASIC 1
Valerio Settif87b5052023-05-26 13:47:09 +0200797#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_IMPORT 1
798#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT 1
799#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE 1
Przemek Stekiel746dfae2023-05-04 09:14:08 +0200800#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_PUBLIC_KEY 1
801#endif /* MBEDTLS_DHM_C */
802
Ronald Cron3d471812021-03-18 13:40:31 +0100803#if defined(MBEDTLS_GCM_C)
804#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
805#define PSA_WANT_ALG_GCM 1
806#endif /* MBEDTLS_GCM_C */
807
Przemek Stekiel18399d82022-06-27 13:34:50 +0200808/* Enable PSA HKDF algorithm if mbedtls HKDF is supported.
809 * PSA HKDF EXTRACT and PSA HKDF EXPAND have minimal cost when
810 * PSA HKDF is enabled, so enable both algorithms together
811 * with PSA HKDF. */
John Durkopd62b6782020-11-30 21:06:05 -0800812#if defined(MBEDTLS_HKDF_C)
813#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
814#define PSA_WANT_ALG_HMAC 1
815#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
816#define PSA_WANT_ALG_HKDF 1
Przemek Stekielb33bd192022-06-21 09:58:51 +0200817#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXTRACT 1
818#define PSA_WANT_ALG_HKDF_EXTRACT 1
819#define MBEDTLS_PSA_BUILTIN_ALG_HKDF_EXPAND 1
820#define PSA_WANT_ALG_HKDF_EXPAND 1
John Durkopd62b6782020-11-30 21:06:05 -0800821#endif /* MBEDTLS_HKDF_C */
822
John Durkopd62b6782020-11-30 21:06:05 -0800823#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
824#define PSA_WANT_ALG_HMAC 1
Gilles Peskine47a89332021-01-12 00:00:15 +0100825#define PSA_WANT_KEY_TYPE_HMAC
Andrzej Kurek65bf73e2022-08-31 14:59:31 -0400826
827#if defined(MBEDTLS_MD_C)
John Durkopd62b6782020-11-30 21:06:05 -0800828#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
829#define PSA_WANT_ALG_TLS12_PRF 1
830#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
831#define PSA_WANT_ALG_TLS12_PSK_TO_MS 1
832#endif /* MBEDTLS_MD_C */
833
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100834#if defined(MBEDTLS_MD5_C)
835#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
836#define PSA_WANT_ALG_MD5 1
837#endif
838
Neil Armstrong637d0a02022-05-25 11:28:22 +0200839#if defined(MBEDTLS_ECJPAKE_C)
840#define MBEDTLS_PSA_BUILTIN_PAKE 1
Neil Armstronga557cb82022-06-10 08:58:32 +0200841#define MBEDTLS_PSA_BUILTIN_ALG_JPAKE 1
842#define PSA_WANT_ALG_JPAKE 1
Neil Armstrong637d0a02022-05-25 11:28:22 +0200843#endif
844
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100845#if defined(MBEDTLS_RIPEMD160_C)
846#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
847#define PSA_WANT_ALG_RIPEMD160 1
848#endif
849
John Durkopd62b6782020-11-30 21:06:05 -0800850#if defined(MBEDTLS_RSA_C)
851#if defined(MBEDTLS_PKCS1_V15)
852#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
853#define PSA_WANT_ALG_RSA_PKCS1V15_CRYPT 1
854#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
855#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN 1
Gilles Peskine1231eb52021-04-19 22:24:23 +0200856#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW 1
Yuto Takano7828ca22021-08-10 11:26:15 +0100857#endif /* MBEDTLS_PKCS1_V15 */
John Durkopd62b6782020-11-30 21:06:05 -0800858#if defined(MBEDTLS_PKCS1_V21)
859#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
860#define PSA_WANT_ALG_RSA_OAEP 1
861#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
862#define PSA_WANT_ALG_RSA_PSS 1
863#endif /* MBEDTLS_PKCS1_V21 */
Valerio Setti01cc88a2023-06-15 11:53:08 +0200864#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
Valerio Settif87b5052023-05-26 13:47:09 +0200865#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_IMPORT 1
866#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_EXPORT 1
867#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_GENERATE 1
Valerio Setti01cc88a2023-06-15 11:53:08 +0200868#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC 1
Valerio Settif87b5052023-05-26 13:47:09 +0200869#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_IMPORT 1
870#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_EXPORT 1
871#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_GENERATE 1
John Durkopd62b6782020-11-30 21:06:05 -0800872#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
873#define PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY 1
874#endif /* MBEDTLS_RSA_C */
875
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100876#if defined(MBEDTLS_SHA1_C)
877#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
878#define PSA_WANT_ALG_SHA_1 1
879#endif
880
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200881#if defined(MBEDTLS_SHA224_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100882#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
Gilles Peskineb65db072021-01-12 00:00:53 +0100883#define PSA_WANT_ALG_SHA_224 1
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200884#endif
885
886#if defined(MBEDTLS_SHA256_C)
887#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100888#define PSA_WANT_ALG_SHA_256 1
889#endif
890
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200891#if defined(MBEDTLS_SHA384_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100892#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
893#define PSA_WANT_ALG_SHA_384 1
894#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200895
896#if defined(MBEDTLS_SHA512_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100897#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
898#define PSA_WANT_ALG_SHA_512 1
899#endif
900
Dave Rodgman98083c62023-06-25 23:27:45 +0100901#if defined(MBEDTLS_SHA3_C)
Dave Rodgmanf66cd612023-06-26 11:02:12 +0100902#define MBEDTLS_PSA_BUILTIN_ALG_SHA3_224 1
903#define MBEDTLS_PSA_BUILTIN_ALG_SHA3_256 1
904#define MBEDTLS_PSA_BUILTIN_ALG_SHA3_384 1
905#define MBEDTLS_PSA_BUILTIN_ALG_SHA3_512 1
906#define PSA_WANT_ALG_SHA3_224 1
907#define PSA_WANT_ALG_SHA3_256 1
908#define PSA_WANT_ALG_SHA3_384 1
909#define PSA_WANT_ALG_SHA3_512 1
Dave Rodgman98083c62023-06-25 23:27:45 +0100910#endif
911
David Brown94933082021-01-05 12:03:25 -0700912#if defined(MBEDTLS_AES_C)
913#define PSA_WANT_KEY_TYPE_AES 1
David Brownda7dbb72021-01-26 11:44:15 -0700914#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700915#endif
916
Gilles Peskine09c46da2021-10-08 15:48:16 +0200917#if defined(MBEDTLS_ARIA_C)
918#define PSA_WANT_KEY_TYPE_ARIA 1
919#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
920#endif
921
David Brown686e6e82021-01-05 12:03:25 -0700922#if defined(MBEDTLS_CAMELLIA_C)
923#define PSA_WANT_KEY_TYPE_CAMELLIA 1
David Brownda7dbb72021-01-26 11:44:15 -0700924#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700925#endif
926
David Brownb65a7f72021-01-15 12:04:09 -0700927#if defined(MBEDTLS_DES_C)
928#define PSA_WANT_KEY_TYPE_DES 1
David Brownda7dbb72021-01-26 11:44:15 -0700929#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700930#endif
931
Andrzej Kurekd60907b2022-09-14 10:02:30 -0400932#if defined(MBEDTLS_PSA_BUILTIN_ALG_SHA_256)
933#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_ECJPAKE_TO_PMS 1
934#define PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS 1
935#endif
936
David Brownb16727a2021-02-08 16:31:46 -0700937#if defined(MBEDTLS_CHACHA20_C)
938#define PSA_WANT_KEY_TYPE_CHACHA20 1
939#define PSA_WANT_ALG_STREAM_CIPHER 1
940#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
941#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brownac4fa072021-02-08 16:47:35 -0700942#if defined(MBEDTLS_CHACHAPOLY_C)
943#define PSA_WANT_ALG_CHACHA20_POLY1305 1
David Brown86730a82021-02-09 16:24:11 -0700944#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700945#endif
David Brownb16727a2021-02-08 16:31:46 -0700946#endif
947
David Brown99844272021-01-15 12:04:47 -0700948#if defined(MBEDTLS_CIPHER_MODE_CBC)
David Brown10cb81c2021-02-09 16:10:29 -0700949#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700950#define PSA_WANT_ALG_CBC_NO_PADDING 1
951#if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
David Brown12f45f92021-01-26 11:50:36 -0700952#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brown99844272021-01-15 12:04:47 -0700953#define PSA_WANT_ALG_CBC_PKCS7 1
954#endif
955#endif
956
957#if defined(MBEDTLS_AES_C) || defined(MBEDTLS_DES_C) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200958 defined(MBEDTLS_ARIA_C) || defined(MBEDTLS_CAMELLIA_C)
David Brown10cb81c2021-02-09 16:10:29 -0700959#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700960#define PSA_WANT_ALG_ECB_NO_PADDING 1
961#endif
962
963#if defined(MBEDTLS_CIPHER_MODE_CFB)
David Brown12f45f92021-01-26 11:50:36 -0700964#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700965#define PSA_WANT_ALG_CFB 1
966#endif
967
968#if defined(MBEDTLS_CIPHER_MODE_CTR)
David Brown12f45f92021-01-26 11:50:36 -0700969#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700970#define PSA_WANT_ALG_CTR 1
971#endif
972
973#if defined(MBEDTLS_CIPHER_MODE_OFB)
David Brown12f45f92021-01-26 11:50:36 -0700974#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700975#define PSA_WANT_ALG_OFB 1
976#endif
977
David Browneed74df2021-03-15 15:53:57 -0600978#if defined(MBEDTLS_ECP_DP_BP256R1_ENABLED)
979#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
980#define PSA_WANT_ECC_BRAINPOOL_P_R1_256
981#endif
982
983#if defined(MBEDTLS_ECP_DP_BP384R1_ENABLED)
984#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
985#define PSA_WANT_ECC_BRAINPOOL_P_R1_384
986#endif
987
988#if defined(MBEDTLS_ECP_DP_BP512R1_ENABLED)
989#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
990#define PSA_WANT_ECC_BRAINPOOL_P_R1_512
991#endif
992
993#if defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED)
994#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
995#define PSA_WANT_ECC_MONTGOMERY_255
996#endif
997
Archanaef6aa5c2021-06-08 11:40:10 +0530998#if defined(MBEDTLS_ECP_DP_CURVE448_ENABLED)
David Browneed74df2021-03-15 15:53:57 -0600999#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
1000#define PSA_WANT_ECC_MONTGOMERY_448
1001#endif
1002
David Brown8de143e2021-02-19 14:08:00 -07001003#if defined(MBEDTLS_ECP_DP_SECP192R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -07001004#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
1005#define PSA_WANT_ECC_SECP_R1_192
David Brown8de143e2021-02-19 14:08:00 -07001006#endif
1007
1008#if defined(MBEDTLS_ECP_DP_SECP224R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -07001009#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
1010#define PSA_WANT_ECC_SECP_R1_224
David Brown8de143e2021-02-19 14:08:00 -07001011#endif
1012
1013#if defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -07001014#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
1015#define PSA_WANT_ECC_SECP_R1_256
David Brown8de143e2021-02-19 14:08:00 -07001016#endif
1017
1018#if defined(MBEDTLS_ECP_DP_SECP384R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -07001019#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
1020#define PSA_WANT_ECC_SECP_R1_384
David Brown8de143e2021-02-19 14:08:00 -07001021#endif
1022
1023#if defined(MBEDTLS_ECP_DP_SECP521R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -07001024#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
1025#define PSA_WANT_ECC_SECP_R1_521
David Brown8de143e2021-02-19 14:08:00 -07001026#endif
1027
1028#if defined(MBEDTLS_ECP_DP_SECP192K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -07001029#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
1030#define PSA_WANT_ECC_SECP_K1_192
David Brown8de143e2021-02-19 14:08:00 -07001031#endif
1032
Dave Rodgman017a1992022-03-31 14:07:01 +01001033/* SECP224K1 is buggy via the PSA API (https://github.com/Mbed-TLS/mbedtls/issues/3541) */
Gilles Peskine39841302021-03-23 12:06:45 +01001034#if 0 && defined(MBEDTLS_ECP_DP_SECP224K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -07001035#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
1036#define PSA_WANT_ECC_SECP_K1_224
David Brown8de143e2021-02-19 14:08:00 -07001037#endif
1038
David Brown9b178de2021-03-10 13:14:48 -07001039#if defined(MBEDTLS_ECP_DP_SECP256K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -07001040#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
1041#define PSA_WANT_ECC_SECP_K1_256
David Brown8de143e2021-02-19 14:08:00 -07001042#endif
1043
John Durkop2dfaf9c2020-09-24 04:30:10 -07001044#endif /* MBEDTLS_PSA_CRYPTO_CONFIG */
John Durkopd8959392020-09-20 23:09:17 -07001045
Tom Cosgrove6d62fac2023-05-10 14:40:05 +01001046#if defined(PSA_WANT_ALG_JPAKE)
1047#define PSA_WANT_ALG_SOME_PAKE 1
1048#endif
1049
Valerio Setti73fc0822023-06-21 10:06:19 +02001050/* Even though KEY_PAIR symbols' feature several level of support (BASIC, IMPORT,
1051 * EXPORT, GENERATE, DERIVE) we're not planning to have support only for BASIC
1052 * without IMPORT/EXPORT since these last 2 features are strongly used in tests.
Valerio Setti27c501a2023-06-27 16:58:52 +02001053 * In general it is allowed to include more feature than what is strictly
1054 * requested.
1055 * As a consequence IMPORT and EXPORT features will be automatically enabled
1056 * as soon as the BASIC one is. */
Valerio Setti73fc0822023-06-21 10:06:19 +02001057#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC)
Valerio Setti27c501a2023-06-27 16:58:52 +02001058#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT 1
1059#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT 1
Valerio Setti73fc0822023-06-21 10:06:19 +02001060#endif
1061
Valerio Setti27c501a2023-06-27 16:58:52 +02001062/* See description above */
Valerio Setti73fc0822023-06-21 10:06:19 +02001063#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_BASIC)
Valerio Setti27c501a2023-06-27 16:58:52 +02001064#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_IMPORT 1
1065#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR_EXPORT 1
Valerio Setti8d6e98c2023-05-26 13:46:13 +02001066#endif
1067
Valerio Setti89cb1442023-06-06 14:12:17 +02001068/* Temporary internal migration helpers */
Valerio Setti01cc88a2023-06-15 11:53:08 +02001069#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC) || \
Valerio Settif4d7ede2023-06-09 12:10:33 +02001070 defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_IMPORT) || \
1071 defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_EXPORT) || \
Valerio Setti8d6e98c2023-05-26 13:46:13 +02001072 defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_GENERATE)
1073#define MBEDTLS_PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_LEGACY
1074#endif
1075
Valerio Setti89cb1442023-06-06 14:12:17 +02001076/* Temporary internal migration helpers */
Valerio Setti01cc88a2023-06-15 11:53:08 +02001077#if defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC) || \
Valerio Settif4d7ede2023-06-09 12:10:33 +02001078 defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_IMPORT) || \
1079 defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_EXPORT) || \
Valerio Setti602ee2e2023-06-06 14:10:15 +02001080 defined(PSA_WANT_KEY_TYPE_DH_KEY_PAIR_GENERATE)
Valerio Setti8d6e98c2023-05-26 13:46:13 +02001081#define MBEDTLS_PSA_WANT_KEY_TYPE_DH_KEY_PAIR_LEGACY
1082#endif
1083
Valerio Setti89cb1442023-06-06 14:12:17 +02001084/* Temporary internal migration helpers */
Valerio Setti01cc88a2023-06-15 11:53:08 +02001085#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_BASIC) || \
Valerio Settif4d7ede2023-06-09 12:10:33 +02001086 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_IMPORT) || \
1087 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_EXPORT) || \
Valerio Setti8d6e98c2023-05-26 13:46:13 +02001088 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_GENERATE)
1089#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR_LEGACY
1090#endif
1091
Valerio Setti89cb1442023-06-06 14:12:17 +02001092/* Temporary internal migration helpers */
Valerio Setti01cc88a2023-06-15 11:53:08 +02001093#if defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_BASIC) || \
Valerio Settif4d7ede2023-06-09 12:10:33 +02001094 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_IMPORT) || \
1095 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_EXPORT) || \
Valerio Setti602ee2e2023-06-06 14:10:15 +02001096 defined(MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_GENERATE)
Valerio Setti8d6e98c2023-05-26 13:46:13 +02001097#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DH_KEY_PAIR_LEGACY
1098#endif
1099
Gilles Peskine60b29fe2021-02-16 14:06:50 +01001100/* These features are always enabled. */
1101#define PSA_WANT_KEY_TYPE_DERIVE 1
Gilles Peskinebba26302022-12-15 23:25:17 +01001102#define PSA_WANT_KEY_TYPE_PASSWORD 1
1103#define PSA_WANT_KEY_TYPE_PASSWORD_HASH 1
Gilles Peskine60b29fe2021-02-16 14:06:50 +01001104#define PSA_WANT_KEY_TYPE_RAW_DATA 1
1105
John Durkop6e33dbe2020-09-17 21:15:13 -07001106#ifdef __cplusplus
1107}
1108#endif
1109
1110#endif /* MBEDTLS_CONFIG_PSA_H */