blob: 68dda0f395b7bf5bf713eabb6c3ab7f8a4cf3b2a [file] [log] [blame]
John Durkop6e33dbe2020-09-17 21:15:13 -07001/**
2 * \file mbedtls/config_psa.h
3 * \brief PSA crypto configuration options (set of defines)
4 *
John Durkop34818822020-10-12 21:36:22 -07005 * This set of compile-time options takes settings defined in
Bence Szépkútibb0cfeb2021-05-28 09:42:25 +02006 * include/mbedtls/mbedtls_config.h and include/psa/crypto_config.h and uses
John Durkop34818822020-10-12 21:36:22 -07007 * those definitions to define symbols used in the library code.
8 *
9 * Users and integrators should not edit this file, please edit
Bence Szépkútibb0cfeb2021-05-28 09:42:25 +020010 * include/mbedtls/mbedtls_config.h for MBETLS_XXX settings or
John Durkop34818822020-10-12 21:36:22 -070011 * include/psa/crypto_config.h for PSA_WANT_XXX settings.
John Durkop6e33dbe2020-09-17 21:15:13 -070012 */
13/*
14 * Copyright The Mbed TLS Contributors
15 * SPDX-License-Identifier: Apache-2.0
16 *
17 * Licensed under the Apache License, Version 2.0 (the "License"); you may
18 * not use this file except in compliance with the License.
19 * You may obtain a copy of the License at
20 *
21 * http://www.apache.org/licenses/LICENSE-2.0
22 *
23 * Unless required by applicable law or agreed to in writing, software
24 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
25 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
26 * See the License for the specific language governing permissions and
27 * limitations under the License.
28 */
29
30#ifndef MBEDTLS_CONFIG_PSA_H
31#define MBEDTLS_CONFIG_PSA_H
32
John Durkop714e3a12020-09-29 22:07:04 -070033#if defined(MBEDTLS_PSA_CRYPTO_CONFIG)
John Durkop6e33dbe2020-09-17 21:15:13 -070034#include "psa/crypto_config.h"
John Durkop76228ac2020-09-29 22:33:49 -070035#endif /* defined(MBEDTLS_PSA_CRYPTO_CONFIG) */
John Durkop6e33dbe2020-09-17 21:15:13 -070036
37#ifdef __cplusplus
38extern "C" {
39#endif
40
Gilles Peskine1231eb52021-04-19 22:24:23 +020041
42
43/****************************************************************/
44/* De facto synonyms */
45/****************************************************************/
46
47#if defined(PSA_WANT_ALG_ECDSA_ANY) && !defined(PSA_WANT_ALG_ECDSA)
48#define PSA_WANT_ALG_ECDSA PSA_WANT_ALG_ECDSA_ANY
49#elif !defined(PSA_WANT_ALG_ECDSA_ANY) && defined(PSA_WANT_ALG_ECDSA)
50#define PSA_WANT_ALG_ECDSA_ANY PSA_WANT_ALG_ECDSA
51#endif
52
53#if defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW) && !defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
54#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW
55#elif !defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW) && defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
56#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW PSA_WANT_ALG_RSA_PKCS1V15_SIGN
57#endif
58
Gilles Peskine44c96aa2021-10-04 18:33:56 +020059#if defined(PSA_WANT_ALG_RSA_PSS_ANY_SALT) && !defined(PSA_WANT_ALG_RSA_PSS)
60#define PSA_WANT_ALG_RSA_PSS PSA_WANT_ALG_RSA_PSS_ANY_SALT
61#elif !defined(PSA_WANT_ALG_RSA_PSS_ANY_SALT) && defined(PSA_WANT_ALG_RSA_PSS)
62#define PSA_WANT_ALG_RSA_PSS_ANY_SALT PSA_WANT_ALG_RSA_PSS
63#endif
64
Gilles Peskine1231eb52021-04-19 22:24:23 +020065
66
67/****************************************************************/
68/* Require built-in implementations based on PSA requirements */
69/****************************************************************/
70
John Durkop2dfaf9c2020-09-24 04:30:10 -070071#if defined(MBEDTLS_PSA_CRYPTO_CONFIG)
John Durkopd8959392020-09-20 23:09:17 -070072
John Durkopd62b6782020-11-30 21:06:05 -080073#if defined(PSA_WANT_ALG_DETERMINISTIC_ECDSA)
74#if !defined(MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA)
75#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
76#define MBEDTLS_ECDSA_DETERMINISTIC
77#define MBEDTLS_ECDSA_C
78#define MBEDTLS_HMAC_DRBG_C
79#define MBEDTLS_MD_C
80#endif /* !MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA */
81#endif /* PSA_WANT_ALG_DETERMINISTIC_ECDSA */
82
83#if defined(PSA_WANT_ALG_ECDH)
84#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDH)
85#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
86#define MBEDTLS_ECDH_C
87#define MBEDTLS_ECP_C
88#define MBEDTLS_BIGNUM_C
89#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDH */
90#endif /* PSA_WANT_ALG_ECDH */
91
92#if defined(PSA_WANT_ALG_ECDSA)
93#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDSA)
94#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
95#define MBEDTLS_ECDSA_C
Ronald Crond4c2c9b2021-04-28 18:28:46 +020096#define MBEDTLS_ECP_C
97#define MBEDTLS_BIGNUM_C
98#define MBEDTLS_ASN1_PARSE_C
99#define MBEDTLS_ASN1_WRITE_C
John Durkopd62b6782020-11-30 21:06:05 -0800100#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDSA */
101#endif /* PSA_WANT_ALG_ECDSA */
102
103#if defined(PSA_WANT_ALG_HKDF)
104#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF)
105#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
106#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
107#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF */
108#endif /* PSA_WANT_ALG_HKDF */
109
110#if defined(PSA_WANT_ALG_HMAC)
111#if !defined(MBEDTLS_PSA_ACCEL_ALG_HMAC)
112#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
113#endif /* !MBEDTLS_PSA_ACCEL_ALG_HMAC */
114#endif /* PSA_WANT_ALG_HMAC */
115
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100116#if defined(PSA_WANT_ALG_MD5) && !defined(MBEDTLS_PSA_ACCEL_ALG_MD5)
117#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
118#define MBEDTLS_MD5_C
119#endif
120
121#if defined(PSA_WANT_ALG_RIPEMD160) && !defined(MBEDTLS_PSA_ACCEL_ALG_RIPEMD160)
122#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
123#define MBEDTLS_RIPEMD160_C
124#endif
125
John Durkopd62b6782020-11-30 21:06:05 -0800126#if defined(PSA_WANT_ALG_RSA_OAEP)
127#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP)
128#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
129#define MBEDTLS_RSA_C
130#define MBEDTLS_BIGNUM_C
131#define MBEDTLS_OID_C
132#define MBEDTLS_PKCS1_V21
133#define MBEDTLS_MD_C
134#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP */
135#endif /* PSA_WANT_ALG_RSA_OAEP */
136
137#if defined(PSA_WANT_ALG_RSA_PKCS1V15_CRYPT)
138#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT)
139#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
140#define MBEDTLS_RSA_C
141#define MBEDTLS_BIGNUM_C
142#define MBEDTLS_OID_C
143#define MBEDTLS_PKCS1_V15
144#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT */
145#endif /* PSA_WANT_ALG_RSA_PKCS1V15_CRYPT */
146
147#if defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
148#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN)
149#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
150#define MBEDTLS_RSA_C
151#define MBEDTLS_BIGNUM_C
152#define MBEDTLS_OID_C
153#define MBEDTLS_PKCS1_V15
154#define MBEDTLS_MD_C
155#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN */
156#endif /* PSA_WANT_ALG_RSA_PKCS1V15_SIGN */
157
158#if defined(PSA_WANT_ALG_RSA_PSS)
159#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PSS)
160#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
161#define MBEDTLS_RSA_C
162#define MBEDTLS_BIGNUM_C
163#define MBEDTLS_OID_C
164#define MBEDTLS_PKCS1_V21
165#define MBEDTLS_MD_C
166#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PSS */
167#endif /* PSA_WANT_ALG_RSA_PSS */
168
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100169#if defined(PSA_WANT_ALG_SHA_1) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_1)
170#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
171#define MBEDTLS_SHA1_C
172#endif
173
174#if defined(PSA_WANT_ALG_SHA_224) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_224)
175#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200176#define MBEDTLS_SHA224_C
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100177#endif
178
179#if defined(PSA_WANT_ALG_SHA_256) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_256)
180#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
181#define MBEDTLS_SHA256_C
182#endif
183
184#if defined(PSA_WANT_ALG_SHA_384) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_384)
185#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200186#define MBEDTLS_SHA384_C
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100187#endif
188
189#if defined(PSA_WANT_ALG_SHA_512) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_512)
190#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
191#define MBEDTLS_SHA512_C
192#endif
193
John Durkop07cc04a2020-11-16 22:08:34 -0800194#if defined(PSA_WANT_ALG_TLS12_PRF)
195#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF)
John Durkopd62b6782020-11-30 21:06:05 -0800196#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
John Durkop07cc04a2020-11-16 22:08:34 -0800197#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF */
198#endif /* PSA_WANT_ALG_TLS12_PRF */
199
200#if defined(PSA_WANT_ALG_TLS12_PSK_TO_MS)
201#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS)
John Durkopd62b6782020-11-30 21:06:05 -0800202#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
John Durkop07cc04a2020-11-16 22:08:34 -0800203#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS */
204#endif /* PSA_WANT_ALG_TLS12_PSK_TO_MS */
205
206#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR)
207#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR)
John Durkopd62b6782020-11-30 21:06:05 -0800208#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR 1
John Durkop07cc04a2020-11-16 22:08:34 -0800209#define MBEDTLS_ECP_C
210#define MBEDTLS_BIGNUM_C
211#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR */
212#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR */
213
214#if defined(PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY)
215#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800216#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
John Durkop07cc04a2020-11-16 22:08:34 -0800217#define MBEDTLS_ECP_C
218#define MBEDTLS_BIGNUM_C
219#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY */
220#endif /* PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY */
221
John Durkop9814fa22020-11-04 12:28:15 -0800222#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR)
John Durkop0e005192020-10-31 22:06:54 -0700223#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR)
John Durkopd62b6782020-11-30 21:06:05 -0800224#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR 1
John Durkop0e005192020-10-31 22:06:54 -0700225#define MBEDTLS_RSA_C
226#define MBEDTLS_BIGNUM_C
227#define MBEDTLS_OID_C
228#define MBEDTLS_GENPRIME
John Durkop07cc04a2020-11-16 22:08:34 -0800229#define MBEDTLS_PK_PARSE_C
230#define MBEDTLS_PK_WRITE_C
231#define MBEDTLS_PK_C
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200232#define MBEDTLS_ASN1_PARSE_C
233#define MBEDTLS_ASN1_WRITE_C
John Durkop0e005192020-10-31 22:06:54 -0700234#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR */
John Durkop9814fa22020-11-04 12:28:15 -0800235#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR */
236
237#if defined(PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkop0e005192020-10-31 22:06:54 -0700238#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY)
John Durkopd62b6782020-11-30 21:06:05 -0800239#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
John Durkop0e005192020-10-31 22:06:54 -0700240#define MBEDTLS_RSA_C
241#define MBEDTLS_BIGNUM_C
242#define MBEDTLS_OID_C
John Durkop07cc04a2020-11-16 22:08:34 -0800243#define MBEDTLS_PK_PARSE_C
244#define MBEDTLS_PK_WRITE_C
245#define MBEDTLS_PK_C
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200246#define MBEDTLS_ASN1_PARSE_C
247#define MBEDTLS_ASN1_WRITE_C
John Durkop0e005192020-10-31 22:06:54 -0700248#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkop9814fa22020-11-04 12:28:15 -0800249#endif /* PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY */
John Durkopd0321952020-10-29 21:37:36 -0700250
David Brownb781f752021-02-08 15:44:52 -0700251/* If any of the block modes are requested that don't have an
252 * associated HW assist, define PSA_HAVE_SOFT_BLOCK_MODE for checking
253 * in the block cipher key types. */
254#if (defined(PSA_WANT_ALG_CTR) && !defined(MBEDTLS_PSA_ACCEL_ALG_CTR)) || \
Bence Szépkúti7921cce2021-02-17 11:46:50 +0100255 (defined(PSA_WANT_ALG_CFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_CFB)) || \
David Brownb781f752021-02-08 15:44:52 -0700256 (defined(PSA_WANT_ALG_OFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_OFB)) || \
257 (defined(PSA_WANT_ALG_XTS) && !defined(MBEDTLS_PSA_ACCEL_ALG_XTS)) || \
258 defined(PSA_WANT_ALG_ECB_NO_PADDING) || \
259 (defined(PSA_WANT_ALG_CBC_NO_PADDING) && \
260 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING)) || \
261 (defined(PSA_WANT_ALG_CBC_PKCS7) && \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100262 !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7)) || \
263 (defined(PSA_WANT_ALG_CMAC) && !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC))
David Brownb781f752021-02-08 15:44:52 -0700264#define PSA_HAVE_SOFT_BLOCK_MODE 1
265#endif
266
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100267#if (defined(PSA_WANT_ALG_GCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_GCM)) || \
268 (defined(PSA_WANT_ALG_CCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_CCM))
269#define PSA_HAVE_SOFT_BLOCK_AEAD 1
270#endif
271
David Brown94933082021-01-05 12:03:25 -0700272#if defined(PSA_WANT_KEY_TYPE_AES)
David Browne1f91f02021-02-09 15:56:22 -0700273#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_AES)
274#define PSA_HAVE_SOFT_KEY_TYPE_AES 1
275#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_AES */
276#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100277 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
278 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
David Brown78a429b2021-01-21 09:48:57 -0700279#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700280#define MBEDTLS_AES_C
David Browne1f91f02021-02-09 15:56:22 -0700281#endif /* PSA_HAVE_SOFT_KEY_TYPE_AES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown94933082021-01-05 12:03:25 -0700282#endif /* PSA_WANT_KEY_TYPE_AES */
283
Gilles Peskine09c46da2021-10-08 15:48:16 +0200284#if defined(PSA_WANT_KEY_TYPE_ARIA)
285#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA)
286#define PSA_HAVE_SOFT_KEY_TYPE_ARIA 1
287#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ARIA */
288#if defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
289 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
290 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
291#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
292#define MBEDTLS_ARIA_C
293#endif /* PSA_HAVE_SOFT_KEY_TYPE_ARIA || PSA_HAVE_SOFT_BLOCK_MODE */
294#endif /* PSA_WANT_KEY_TYPE_ARIA */
295
David Brown686e6e82021-01-05 12:03:25 -0700296#if defined(PSA_WANT_KEY_TYPE_CAMELLIA)
David Browne1f91f02021-02-09 15:56:22 -0700297#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA)
298#define PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA 1
299#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA */
300#if defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100301 defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
302 defined(PSA_HAVE_SOFT_BLOCK_AEAD)
David Brown78a429b2021-01-21 09:48:57 -0700303#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700304#define MBEDTLS_CAMELLIA_C
David Browne1f91f02021-02-09 15:56:22 -0700305#endif /* PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA || PSA_HAVE_SOFT_BLOCK_MODE */
David Brown686e6e82021-01-05 12:03:25 -0700306#endif /* PSA_WANT_KEY_TYPE_CAMELLIA */
307
David Brownb65a7f72021-01-15 12:04:09 -0700308#if defined(PSA_WANT_KEY_TYPE_DES)
David Browne1f91f02021-02-09 15:56:22 -0700309#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DES)
310#define PSA_HAVE_SOFT_KEY_TYPE_DES 1
311#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DES */
312#if defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
David Brownb781f752021-02-08 15:44:52 -0700313 defined(PSA_HAVE_SOFT_BLOCK_MODE)
David Brown78a429b2021-01-21 09:48:57 -0700314#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700315#define MBEDTLS_DES_C
David Browne1f91f02021-02-09 15:56:22 -0700316#endif /*PSA_HAVE_SOFT_KEY_TYPE_DES || PSA_HAVE_SOFT_BLOCK_MODE */
David Brownb65a7f72021-01-15 12:04:09 -0700317#endif /* PSA_WANT_KEY_TYPE_DES */
318
David Brownb16727a2021-02-08 16:31:46 -0700319#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
320#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20)
321#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
322#define MBEDTLS_CHACHA20_C
323#endif /*!MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20 */
324#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
325
David Brownf84a0f62021-02-09 15:59:41 -0700326/* If any of the software block ciphers are selected, define
327 * PSA_HAVE_SOFT_BLOCK_CIPHER, which can be used in any of these
328 * situations. */
329#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200330 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
David Brownf84a0f62021-02-09 15:59:41 -0700331 defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
332 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
333#define PSA_HAVE_SOFT_BLOCK_CIPHER 1
334#endif
335
David Brown99844272021-01-15 12:04:47 -0700336#if defined(PSA_WANT_ALG_STREAM_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700337#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brown99844272021-01-15 12:04:47 -0700338#endif /* PSA_WANT_ALG_STREAM_CIPHER */
339
Ronald Crond85e98d2021-03-25 15:32:32 +0100340#if defined(PSA_WANT_ALG_CBC_MAC)
341#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_MAC)
342#error "CBC-MAC is not yet supported via the PSA API in Mbed TLS."
343#define MBEDTLS_PSA_BUILTIN_ALG_CBC_MAC 1
344#endif /* !MBEDTLS_PSA_ACCEL_ALG_CBC_MAC */
345#endif /* PSA_WANT_ALG_CBC_MAC */
346
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100347#if defined(PSA_WANT_ALG_CMAC)
348#if !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC) || \
349 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
350#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
351#define MBEDTLS_CMAC_C
352#endif /* !MBEDTLS_PSA_ACCEL_ALG_CMAC */
353#endif /* PSA_WANT_ALG_CMAC */
354
David Brown99844272021-01-15 12:04:47 -0700355#if defined(PSA_WANT_ALG_CTR)
David Brown4b9ec7a2021-02-05 12:47:08 -0700356#if !defined(MBEDTLS_PSA_ACCEL_ALG_CTR) || \
David Brownf84a0f62021-02-09 15:59:41 -0700357 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700358#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700359#define MBEDTLS_CIPHER_MODE_CTR
David Brown4b9ec7a2021-02-05 12:47:08 -0700360#endif
David Brown99844272021-01-15 12:04:47 -0700361#endif /* PSA_WANT_ALG_CTR */
362
363#if defined(PSA_WANT_ALG_CFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700364#if !defined(MBEDTLS_PSA_ACCEL_ALG_CFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700365 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700366#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700367#define MBEDTLS_CIPHER_MODE_CFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700368#endif
David Brown99844272021-01-15 12:04:47 -0700369#endif /* PSA_WANT_ALG_CFB */
370
371#if defined(PSA_WANT_ALG_OFB)
David Brown4b9ec7a2021-02-05 12:47:08 -0700372#if !defined(MBEDTLS_PSA_ACCEL_ALG_OFB) || \
David Brownf84a0f62021-02-09 15:59:41 -0700373 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700374#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700375#define MBEDTLS_CIPHER_MODE_OFB
David Brown4b9ec7a2021-02-05 12:47:08 -0700376#endif
David Brown99844272021-01-15 12:04:47 -0700377#endif /* PSA_WANT_ALG_OFB */
378
379#if defined(PSA_WANT_ALG_XTS)
David Brown4b9ec7a2021-02-05 12:47:08 -0700380#if !defined(MBEDTLS_PSA_ACCEL_ALG_XTS) || \
David Brownf84a0f62021-02-09 15:59:41 -0700381 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown12f45f92021-01-26 11:50:36 -0700382#define MBEDTLS_PSA_BUILTIN_ALG_XTS 1
David Brown99844272021-01-15 12:04:47 -0700383#define MBEDTLS_CIPHER_MODE_XTS
David Brown4b9ec7a2021-02-05 12:47:08 -0700384#endif
David Brown99844272021-01-15 12:04:47 -0700385#endif /* PSA_WANT_ALG_XTS */
386
387#if defined(PSA_WANT_ALG_ECB_NO_PADDING)
David Brownbe380c12021-02-11 10:55:48 -0700388#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700389#endif
390
David Brown12f45f92021-01-26 11:50:36 -0700391#if defined(PSA_WANT_ALG_CBC_NO_PADDING)
David Brown4b9ec7a2021-02-05 12:47:08 -0700392#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING) || \
David Brownfc468182021-02-09 16:23:34 -0700393 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700394#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700395#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown4b9ec7a2021-02-05 12:47:08 -0700396#endif
David Brown12f45f92021-01-26 11:50:36 -0700397#endif /* PSA_WANT_ALG_CBC_NO_PADDING */
398
399#if defined(PSA_WANT_ALG_CBC_PKCS7)
David Brown4b9ec7a2021-02-05 12:47:08 -0700400#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7) || \
David Brownfc468182021-02-09 16:23:34 -0700401 defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
David Brown8de64372021-02-11 10:53:23 -0700402#define MBEDTLS_CIPHER_MODE_CBC
David Brown12f45f92021-01-26 11:50:36 -0700403#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brownfc468182021-02-09 16:23:34 -0700404#define MBEDTLS_CIPHER_PADDING_PKCS7
David Brown4b9ec7a2021-02-05 12:47:08 -0700405#endif
David Brown12f45f92021-01-26 11:50:36 -0700406#endif /* PSA_WANT_ALG_CBC_PKCS7 */
407
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100408#if defined(PSA_WANT_ALG_CCM)
409#if !defined(MBEDTLS_PSA_ACCEL_ALG_CCM) || \
410 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200411 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100412 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
413#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
414#define MBEDTLS_CCM_C
415#endif
416#endif /* PSA_WANT_ALG_CCM */
417
418#if defined(PSA_WANT_ALG_GCM)
419#if !defined(MBEDTLS_PSA_ACCEL_ALG_GCM) || \
420 defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200421 defined(PSA_HAVE_SOFT_KEY_TYPE_ARIA) || \
Ronald Cronb9df5ce2021-03-25 09:25:38 +0100422 defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
423#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
424#define MBEDTLS_GCM_C
425#endif
426#endif /* PSA_WANT_ALG_GCM */
427
David Brownac4fa072021-02-08 16:47:35 -0700428#if defined(PSA_WANT_ALG_CHACHA20_POLY1305)
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200429#if !defined(MBEDTLS_PSA_ACCEL_ALG_CHACHA20_POLY1305)
David Brownac4fa072021-02-08 16:47:35 -0700430#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
431#define MBEDTLS_CHACHAPOLY_C
David Brown86730a82021-02-09 16:24:11 -0700432#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700433#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
Ronald Crond4c2c9b2021-04-28 18:28:46 +0200434#endif /* !MBEDTLS_PSA_ACCEL_ALG_CHACHA20_POLY1305 */
David Brownac4fa072021-02-08 16:47:35 -0700435#endif /* PSA_WANT_ALG_CHACHA20_POLY1305 */
436
David Browneed74df2021-03-15 15:53:57 -0600437#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_256)
438#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256)
439#define MBEDTLS_ECP_DP_BP256R1_ENABLED
440#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
441#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256 */
442#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_256 */
443
444#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_384)
445#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384)
446#define MBEDTLS_ECP_DP_BP384R1_ENABLED
447#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
448#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384 */
449#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_384 */
450
451#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_512)
452#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512)
453#define MBEDTLS_ECP_DP_BP512R1_ENABLED
454#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
455#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512 */
456#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_512 */
457
458#if defined(PSA_WANT_ECC_MONTGOMERY_255)
459#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255)
460#define MBEDTLS_ECP_DP_CURVE25519_ENABLED
461#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
462#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255 */
463#endif /* PSA_WANT_ECC_MONTGOMERY_255 */
464
465#if defined(PSA_WANT_ECC_MONTGOMERY_448)
466#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448)
467#define MBEDTLS_ECP_DP_CURVE448_ENABLED
468#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
469#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448 */
470#endif /* PSA_WANT_ECC_MONTGOMERY_448 */
471
David Brownc7b9b2b2021-02-19 21:05:52 -0700472#if defined(PSA_WANT_ECC_SECP_R1_192)
473#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192)
474#define MBEDTLS_ECP_DP_SECP192R1_ENABLED
475#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
476#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192 */
477#endif /* PSA_WANT_ECC_SECP_R1_192 */
478
479#if defined(PSA_WANT_ECC_SECP_R1_224)
480#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224)
481#define MBEDTLS_ECP_DP_SECP224R1_ENABLED
482#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
483#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224 */
484#endif /* PSA_WANT_ECC_SECP_R1_224 */
485
486#if defined(PSA_WANT_ECC_SECP_R1_256)
487#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256)
488#define MBEDTLS_ECP_DP_SECP256R1_ENABLED
489#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
490#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256 */
491#endif /* PSA_WANT_ECC_SECP_R1_256 */
492
493#if defined(PSA_WANT_ECC_SECP_R1_384)
494#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384)
495#define MBEDTLS_ECP_DP_SECP384R1_ENABLED
496#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
497#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384 */
498#endif /* PSA_WANT_ECC_SECP_R1_384 */
499
500#if defined(PSA_WANT_ECC_SECP_R1_521)
501#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521)
502#define MBEDTLS_ECP_DP_SECP521R1_ENABLED
503#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
504#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521 */
505#endif /* PSA_WANT_ECC_SECP_R1_521 */
506
507#if defined(PSA_WANT_ECC_SECP_K1_192)
508#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192)
David Brown8de143e2021-02-19 14:08:00 -0700509#define MBEDTLS_ECP_DP_SECP192K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700510#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
511#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192 */
512#endif /* PSA_WANT_ECC_SECP_K1_192 */
David Brown8de143e2021-02-19 14:08:00 -0700513
David Brownc7b9b2b2021-02-19 21:05:52 -0700514#if defined(PSA_WANT_ECC_SECP_K1_224)
515#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224)
Ronald Crone1f55162021-03-25 15:09:47 +0100516/*
517 * SECP224K1 is buggy via the PSA API in Mbed TLS
518 * (https://github.com/ARMmbed/mbedtls/issues/3541).
519 */
520#error "SECP224K1 is buggy via the PSA API in Mbed TLS."
David Brown8de143e2021-02-19 14:08:00 -0700521#define MBEDTLS_ECP_DP_SECP224K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700522#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
523#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224 */
524#endif /* PSA_WANT_ECC_SECP_K1_224 */
David Brown8de143e2021-02-19 14:08:00 -0700525
David Brownc7b9b2b2021-02-19 21:05:52 -0700526#if defined(PSA_WANT_ECC_SECP_K1_256)
527#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256)
David Brown9b178de2021-03-10 13:14:48 -0700528#define MBEDTLS_ECP_DP_SECP256K1_ENABLED
David Brownc7b9b2b2021-02-19 21:05:52 -0700529#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
530#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256 */
531#endif /* PSA_WANT_ECC_SECP_K1_256 */
David Brown8de143e2021-02-19 14:08:00 -0700532
Gilles Peskine1231eb52021-04-19 22:24:23 +0200533
534
535/****************************************************************/
536/* Infer PSA requirements from Mbed TLS capabilities */
537/****************************************************************/
538
John Durkop714e3a12020-09-29 22:07:04 -0700539#else /* MBEDTLS_PSA_CRYPTO_CONFIG */
540
541/*
542 * Ensure PSA_WANT_* defines are setup properly if MBEDTLS_PSA_CRYPTO_CONFIG
543 * is not defined
544 */
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100545
Ronald Cron3d471812021-03-18 13:40:31 +0100546#if defined(MBEDTLS_CCM_C)
547#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
548#define PSA_WANT_ALG_CCM 1
549#endif /* MBEDTLS_CCM_C */
550
551#if defined(MBEDTLS_CMAC_C)
552#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
553#define PSA_WANT_ALG_CMAC 1
554#endif /* MBEDTLS_CMAC_C */
555
John Durkopd62b6782020-11-30 21:06:05 -0800556#if defined(MBEDTLS_ECDH_C)
557#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
558#define PSA_WANT_ALG_ECDH 1
559#endif /* MBEDTLS_ECDH_C */
560
561#if defined(MBEDTLS_ECDSA_C)
562#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
563#define PSA_WANT_ALG_ECDSA 1
Gilles Peskine1231eb52021-04-19 22:24:23 +0200564#define PSA_WANT_ALG_ECDSA_ANY 1
John Durkopd62b6782020-11-30 21:06:05 -0800565
566// Only add in DETERMINISTIC support if ECDSA is also enabled
567#if defined(MBEDTLS_ECDSA_DETERMINISTIC)
568#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
569#define PSA_WANT_ALG_DETERMINISTIC_ECDSA 1
570#endif /* MBEDTLS_ECDSA_DETERMINISTIC */
571
572#endif /* MBEDTLS_ECDSA_C */
573
574#if defined(MBEDTLS_ECP_C)
575#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR 1
576#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR 1
577#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
578#define PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY 1
579#endif /* MBEDTLS_ECP_C */
580
Ronald Cron3d471812021-03-18 13:40:31 +0100581#if defined(MBEDTLS_GCM_C)
582#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
583#define PSA_WANT_ALG_GCM 1
584#endif /* MBEDTLS_GCM_C */
585
John Durkopd62b6782020-11-30 21:06:05 -0800586#if defined(MBEDTLS_HKDF_C)
587#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
588#define PSA_WANT_ALG_HMAC 1
589#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
590#define PSA_WANT_ALG_HKDF 1
591#endif /* MBEDTLS_HKDF_C */
592
593#if defined(MBEDTLS_MD_C)
594#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
595#define PSA_WANT_ALG_HMAC 1
Gilles Peskine47a89332021-01-12 00:00:15 +0100596#define PSA_WANT_KEY_TYPE_HMAC
John Durkopd62b6782020-11-30 21:06:05 -0800597#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
598#define PSA_WANT_ALG_TLS12_PRF 1
599#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
600#define PSA_WANT_ALG_TLS12_PSK_TO_MS 1
601#endif /* MBEDTLS_MD_C */
602
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100603#if defined(MBEDTLS_MD5_C)
604#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
605#define PSA_WANT_ALG_MD5 1
606#endif
607
608#if defined(MBEDTLS_RIPEMD160_C)
609#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
610#define PSA_WANT_ALG_RIPEMD160 1
611#endif
612
John Durkopd62b6782020-11-30 21:06:05 -0800613#if defined(MBEDTLS_RSA_C)
614#if defined(MBEDTLS_PKCS1_V15)
615#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
616#define PSA_WANT_ALG_RSA_PKCS1V15_CRYPT 1
617#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
618#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN 1
Gilles Peskine1231eb52021-04-19 22:24:23 +0200619#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN_RAW 1
Yuto Takano7828ca22021-08-10 11:26:15 +0100620#endif /* MBEDTLS_PKCS1_V15 */
John Durkopd62b6782020-11-30 21:06:05 -0800621#if defined(MBEDTLS_PKCS1_V21)
622#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
623#define PSA_WANT_ALG_RSA_OAEP 1
624#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
625#define PSA_WANT_ALG_RSA_PSS 1
626#endif /* MBEDTLS_PKCS1_V21 */
627#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR 1
628#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR 1
629#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
630#define PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY 1
631#endif /* MBEDTLS_RSA_C */
632
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100633#if defined(MBEDTLS_SHA1_C)
634#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
635#define PSA_WANT_ALG_SHA_1 1
636#endif
637
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200638#if defined(MBEDTLS_SHA224_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100639#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
Gilles Peskineb65db072021-01-12 00:00:53 +0100640#define PSA_WANT_ALG_SHA_224 1
Mateusz Starzyke3c48b42021-04-19 16:46:28 +0200641#endif
642
643#if defined(MBEDTLS_SHA256_C)
644#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100645#define PSA_WANT_ALG_SHA_256 1
646#endif
647
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200648#if defined(MBEDTLS_SHA384_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100649#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
650#define PSA_WANT_ALG_SHA_384 1
651#endif
Mateusz Starzyk3352a532021-04-06 14:28:22 +0200652
653#if defined(MBEDTLS_SHA512_C)
Gilles Peskine2cecfba2020-11-25 00:07:04 +0100654#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
655#define PSA_WANT_ALG_SHA_512 1
656#endif
657
David Brown94933082021-01-05 12:03:25 -0700658#if defined(MBEDTLS_AES_C)
659#define PSA_WANT_KEY_TYPE_AES 1
David Brownda7dbb72021-01-26 11:44:15 -0700660#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
David Brown94933082021-01-05 12:03:25 -0700661#endif
662
Gilles Peskine09c46da2021-10-08 15:48:16 +0200663#if defined(MBEDTLS_ARIA_C)
664#define PSA_WANT_KEY_TYPE_ARIA 1
665#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARIA 1
666#endif
667
David Brown686e6e82021-01-05 12:03:25 -0700668#if defined(MBEDTLS_CAMELLIA_C)
669#define PSA_WANT_KEY_TYPE_CAMELLIA 1
David Brownda7dbb72021-01-26 11:44:15 -0700670#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
David Brown686e6e82021-01-05 12:03:25 -0700671#endif
672
David Brownb65a7f72021-01-15 12:04:09 -0700673#if defined(MBEDTLS_DES_C)
674#define PSA_WANT_KEY_TYPE_DES 1
David Brownda7dbb72021-01-26 11:44:15 -0700675#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
David Brownb65a7f72021-01-15 12:04:09 -0700676#endif
677
David Brownb16727a2021-02-08 16:31:46 -0700678#if defined(MBEDTLS_CHACHA20_C)
679#define PSA_WANT_KEY_TYPE_CHACHA20 1
680#define PSA_WANT_ALG_STREAM_CIPHER 1
681#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
682#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
David Brownac4fa072021-02-08 16:47:35 -0700683#if defined(MBEDTLS_CHACHAPOLY_C)
684#define PSA_WANT_ALG_CHACHA20_POLY1305 1
David Brown86730a82021-02-09 16:24:11 -0700685#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
David Brownac4fa072021-02-08 16:47:35 -0700686#endif
David Brownb16727a2021-02-08 16:31:46 -0700687#endif
688
David Brown99844272021-01-15 12:04:47 -0700689#if defined(MBEDTLS_CIPHER_MODE_CBC)
David Brown10cb81c2021-02-09 16:10:29 -0700690#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700691#define PSA_WANT_ALG_CBC_NO_PADDING 1
692#if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
David Brown12f45f92021-01-26 11:50:36 -0700693#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
David Brown99844272021-01-15 12:04:47 -0700694#define PSA_WANT_ALG_CBC_PKCS7 1
695#endif
696#endif
697
698#if defined(MBEDTLS_AES_C) || defined(MBEDTLS_DES_C) || \
Gilles Peskine09c46da2021-10-08 15:48:16 +0200699 defined(MBEDTLS_ARIA_C) || defined(MBEDTLS_CAMELLIA_C)
David Brown10cb81c2021-02-09 16:10:29 -0700700#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
David Brown99844272021-01-15 12:04:47 -0700701#define PSA_WANT_ALG_ECB_NO_PADDING 1
702#endif
703
704#if defined(MBEDTLS_CIPHER_MODE_CFB)
David Brown12f45f92021-01-26 11:50:36 -0700705#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
David Brown99844272021-01-15 12:04:47 -0700706#define PSA_WANT_ALG_CFB 1
707#endif
708
709#if defined(MBEDTLS_CIPHER_MODE_CTR)
David Brown12f45f92021-01-26 11:50:36 -0700710#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
David Brown99844272021-01-15 12:04:47 -0700711#define PSA_WANT_ALG_CTR 1
712#endif
713
714#if defined(MBEDTLS_CIPHER_MODE_OFB)
David Brown12f45f92021-01-26 11:50:36 -0700715#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
David Brown99844272021-01-15 12:04:47 -0700716#define PSA_WANT_ALG_OFB 1
717#endif
718
719#if defined(MBEDTLS_CIPHER_MODE_XTS)
David Brown12f45f92021-01-26 11:50:36 -0700720#define MBEDTLS_PSA_BUILTIN_ALG_XTS 1
David Brown99844272021-01-15 12:04:47 -0700721#define PSA_WANT_ALG_XTS 1
722#endif
723
David Browneed74df2021-03-15 15:53:57 -0600724#if defined(MBEDTLS_ECP_DP_BP256R1_ENABLED)
725#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
726#define PSA_WANT_ECC_BRAINPOOL_P_R1_256
727#endif
728
729#if defined(MBEDTLS_ECP_DP_BP384R1_ENABLED)
730#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
731#define PSA_WANT_ECC_BRAINPOOL_P_R1_384
732#endif
733
734#if defined(MBEDTLS_ECP_DP_BP512R1_ENABLED)
735#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
736#define PSA_WANT_ECC_BRAINPOOL_P_R1_512
737#endif
738
739#if defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED)
740#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
741#define PSA_WANT_ECC_MONTGOMERY_255
742#endif
743
Archanaef6aa5c2021-06-08 11:40:10 +0530744#if defined(MBEDTLS_ECP_DP_CURVE448_ENABLED)
David Browneed74df2021-03-15 15:53:57 -0600745#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
746#define PSA_WANT_ECC_MONTGOMERY_448
747#endif
748
David Brown8de143e2021-02-19 14:08:00 -0700749#if defined(MBEDTLS_ECP_DP_SECP192R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700750#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
751#define PSA_WANT_ECC_SECP_R1_192
David Brown8de143e2021-02-19 14:08:00 -0700752#endif
753
754#if defined(MBEDTLS_ECP_DP_SECP224R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700755#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
756#define PSA_WANT_ECC_SECP_R1_224
David Brown8de143e2021-02-19 14:08:00 -0700757#endif
758
759#if defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700760#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
761#define PSA_WANT_ECC_SECP_R1_256
David Brown8de143e2021-02-19 14:08:00 -0700762#endif
763
764#if defined(MBEDTLS_ECP_DP_SECP384R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700765#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
766#define PSA_WANT_ECC_SECP_R1_384
David Brown8de143e2021-02-19 14:08:00 -0700767#endif
768
769#if defined(MBEDTLS_ECP_DP_SECP521R1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700770#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
771#define PSA_WANT_ECC_SECP_R1_521
David Brown8de143e2021-02-19 14:08:00 -0700772#endif
773
774#if defined(MBEDTLS_ECP_DP_SECP192K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700775#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
776#define PSA_WANT_ECC_SECP_K1_192
David Brown8de143e2021-02-19 14:08:00 -0700777#endif
778
Gilles Peskine39841302021-03-23 12:06:45 +0100779/* SECP224K1 is buggy via the PSA API (https://github.com/ARMmbed/mbedtls/issues/3541) */
780#if 0 && defined(MBEDTLS_ECP_DP_SECP224K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700781#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
782#define PSA_WANT_ECC_SECP_K1_224
David Brown8de143e2021-02-19 14:08:00 -0700783#endif
784
David Brown9b178de2021-03-10 13:14:48 -0700785#if defined(MBEDTLS_ECP_DP_SECP256K1_ENABLED)
David Brownc7b9b2b2021-02-19 21:05:52 -0700786#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
787#define PSA_WANT_ECC_SECP_K1_256
David Brown8de143e2021-02-19 14:08:00 -0700788#endif
789
John Durkop2dfaf9c2020-09-24 04:30:10 -0700790#endif /* MBEDTLS_PSA_CRYPTO_CONFIG */
John Durkopd8959392020-09-20 23:09:17 -0700791
Gilles Peskine60b29fe2021-02-16 14:06:50 +0100792/* These features are always enabled. */
793#define PSA_WANT_KEY_TYPE_DERIVE 1
794#define PSA_WANT_KEY_TYPE_RAW_DATA 1
795
John Durkop6e33dbe2020-09-17 21:15:13 -0700796#ifdef __cplusplus
797}
798#endif
799
800#endif /* MBEDTLS_CONFIG_PSA_H */