John Durkop | 6e33dbe | 2020-09-17 21:15:13 -0700 | [diff] [blame] | 1 | /** |
| 2 | * \file psa/crypto_config.h |
| 3 | * \brief PSA crypto configuration options (set of defines) |
| 4 | * |
John Durkop | 7b45313 | 2020-10-12 21:56:26 -0700 | [diff] [blame] | 5 | */ |
John Durkop | c7c03b7 | 2020-10-12 21:42:03 -0700 | [diff] [blame] | 6 | #if defined(MBEDTLS_PSA_CRYPTO_CONFIG) |
| 7 | /** |
Bence Szépkúti | bb0cfeb | 2021-05-28 09:42:25 +0200 | [diff] [blame] | 8 | * When #MBEDTLS_PSA_CRYPTO_CONFIG is enabled in mbedtls_config.h, |
John Durkop | c7c03b7 | 2020-10-12 21:42:03 -0700 | [diff] [blame] | 9 | * this file determines which cryptographic mechanisms are enabled |
| 10 | * through the PSA Cryptography API (\c psa_xxx() functions). |
| 11 | * |
| 12 | * To enable a cryptographic mechanism, uncomment the definition of |
| 13 | * the corresponding \c PSA_WANT_xxx preprocessor symbol. |
| 14 | * To disable a cryptographic mechanism, comment out the definition of |
| 15 | * the corresponding \c PSA_WANT_xxx preprocessor symbol. |
| 16 | * The names of cryptographic mechanisms correspond to values |
| 17 | * defined in psa/crypto_values.h, with the prefix \c PSA_WANT_ instead |
| 18 | * of \c PSA_. |
| 19 | * |
| 20 | * Note that many cryptographic mechanisms involve two symbols: one for |
| 21 | * the key type (\c PSA_WANT_KEY_TYPE_xxx) and one for the algorithm |
| 22 | * (\c PSA_WANT_ALG_xxx). Mechanisms with additional parameters may involve |
| 23 | * additional symbols. |
John Durkop | 6e33dbe | 2020-09-17 21:15:13 -0700 | [diff] [blame] | 24 | */ |
John Durkop | c7c03b7 | 2020-10-12 21:42:03 -0700 | [diff] [blame] | 25 | #else |
| 26 | /** |
Bence Szépkúti | bb0cfeb | 2021-05-28 09:42:25 +0200 | [diff] [blame] | 27 | * When \c MBEDTLS_PSA_CRYPTO_CONFIG is disabled in mbedtls_config.h, |
John Durkop | c7c03b7 | 2020-10-12 21:42:03 -0700 | [diff] [blame] | 28 | * this file is not used, and cryptographic mechanisms are supported |
| 29 | * through the PSA API if and only if they are supported through the |
| 30 | * mbedtls_xxx API. |
| 31 | */ |
| 32 | #endif |
John Durkop | 6e33dbe | 2020-09-17 21:15:13 -0700 | [diff] [blame] | 33 | /* |
| 34 | * Copyright The Mbed TLS Contributors |
Dave Rodgman | 16799db | 2023-11-02 19:47:20 +0000 | [diff] [blame] | 35 | * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later |
John Durkop | 6e33dbe | 2020-09-17 21:15:13 -0700 | [diff] [blame] | 36 | */ |
| 37 | |
| 38 | #ifndef PSA_CRYPTO_CONFIG_H |
| 39 | #define PSA_CRYPTO_CONFIG_H |
| 40 | |
David Brown | a9f1d83 | 2021-01-15 11:40:25 -0700 | [diff] [blame] | 41 | #define PSA_WANT_ALG_CBC_NO_PADDING 1 |
| 42 | #define PSA_WANT_ALG_CBC_PKCS7 1 |
Ronald Cron | 3d47181 | 2021-03-18 13:40:31 +0100 | [diff] [blame] | 43 | #define PSA_WANT_ALG_CCM 1 |
Gilles Peskine | ecaa7ca | 2022-12-15 22:16:00 +0100 | [diff] [blame] | 44 | #define PSA_WANT_ALG_CCM_STAR_NO_TAG 1 |
Steven Cooreman | 939102e | 2021-03-22 15:09:44 +0100 | [diff] [blame] | 45 | #define PSA_WANT_ALG_CMAC 1 |
David Brown | a9f1d83 | 2021-01-15 11:40:25 -0700 | [diff] [blame] | 46 | #define PSA_WANT_ALG_CFB 1 |
David Brown | 9a594e8 | 2021-02-16 12:57:27 -0700 | [diff] [blame] | 47 | #define PSA_WANT_ALG_CHACHA20_POLY1305 1 |
| 48 | #define PSA_WANT_ALG_CTR 1 |
John Durkop | 0ea39e0 | 2020-10-13 19:58:20 -0700 | [diff] [blame] | 49 | #define PSA_WANT_ALG_DETERMINISTIC_ECDSA 1 |
David Brown | a9f1d83 | 2021-01-15 11:40:25 -0700 | [diff] [blame] | 50 | #define PSA_WANT_ALG_ECB_NO_PADDING 1 |
John Durkop | d032195 | 2020-10-29 21:37:36 -0700 | [diff] [blame] | 51 | #define PSA_WANT_ALG_ECDH 1 |
Przemek Stekiel | eb511a4 | 2023-04-28 13:20:16 +0200 | [diff] [blame] | 52 | #define PSA_WANT_ALG_FFDH 1 |
John Durkop | 07cc04a | 2020-11-16 22:08:34 -0800 | [diff] [blame] | 53 | #define PSA_WANT_ALG_ECDSA 1 |
Neil Armstrong | a557cb8 | 2022-06-10 08:58:32 +0200 | [diff] [blame] | 54 | #define PSA_WANT_ALG_JPAKE 1 |
Ronald Cron | 3d47181 | 2021-03-18 13:40:31 +0100 | [diff] [blame] | 55 | #define PSA_WANT_ALG_GCM 1 |
John Durkop | d032195 | 2020-10-29 21:37:36 -0700 | [diff] [blame] | 56 | #define PSA_WANT_ALG_HKDF 1 |
Przemek Stekiel | 3e8249c | 2022-06-03 14:05:07 +0200 | [diff] [blame] | 57 | #define PSA_WANT_ALG_HKDF_EXTRACT 1 |
| 58 | #define PSA_WANT_ALG_HKDF_EXPAND 1 |
John Durkop | 07cc04a | 2020-11-16 22:08:34 -0800 | [diff] [blame] | 59 | #define PSA_WANT_ALG_HMAC 1 |
John Durkop | fb764a6 | 2020-11-27 08:43:28 -0800 | [diff] [blame] | 60 | #define PSA_WANT_ALG_MD5 1 |
David Brown | a9f1d83 | 2021-01-15 11:40:25 -0700 | [diff] [blame] | 61 | #define PSA_WANT_ALG_OFB 1 |
Kusumit Ghoderao | aca3165 | 2023-05-03 11:35:50 +0530 | [diff] [blame] | 62 | #define PSA_WANT_ALG_PBKDF2_HMAC 1 |
Kusumit Ghoderao | b3042c3 | 2023-06-27 10:39:47 +0530 | [diff] [blame] | 63 | #define PSA_WANT_ALG_PBKDF2_AES_CMAC_PRF_128 1 |
John Durkop | fb764a6 | 2020-11-27 08:43:28 -0800 | [diff] [blame] | 64 | #define PSA_WANT_ALG_RIPEMD160 1 |
John Durkop | 07cc04a | 2020-11-16 22:08:34 -0800 | [diff] [blame] | 65 | #define PSA_WANT_ALG_RSA_OAEP 1 |
John Durkop | 7fc75ea | 2020-11-03 19:05:36 -0800 | [diff] [blame] | 66 | #define PSA_WANT_ALG_RSA_PKCS1V15_CRYPT 1 |
| 67 | #define PSA_WANT_ALG_RSA_PKCS1V15_SIGN 1 |
John Durkop | 7fc75ea | 2020-11-03 19:05:36 -0800 | [diff] [blame] | 68 | #define PSA_WANT_ALG_RSA_PSS 1 |
John Durkop | fb764a6 | 2020-11-27 08:43:28 -0800 | [diff] [blame] | 69 | #define PSA_WANT_ALG_SHA_1 1 |
| 70 | #define PSA_WANT_ALG_SHA_224 1 |
| 71 | #define PSA_WANT_ALG_SHA_256 1 |
| 72 | #define PSA_WANT_ALG_SHA_384 1 |
| 73 | #define PSA_WANT_ALG_SHA_512 1 |
Dave Rodgman | 09822a3 | 2023-06-26 11:11:23 +0100 | [diff] [blame] | 74 | #define PSA_WANT_ALG_SHA3_224 1 |
Dave Rodgman | f66cd61 | 2023-06-26 11:02:12 +0100 | [diff] [blame] | 75 | #define PSA_WANT_ALG_SHA3_256 1 |
Dave Rodgman | 09822a3 | 2023-06-26 11:11:23 +0100 | [diff] [blame] | 76 | #define PSA_WANT_ALG_SHA3_384 1 |
| 77 | #define PSA_WANT_ALG_SHA3_512 1 |
David Brown | a9f1d83 | 2021-01-15 11:40:25 -0700 | [diff] [blame] | 78 | #define PSA_WANT_ALG_STREAM_CIPHER 1 |
John Durkop | 07cc04a | 2020-11-16 22:08:34 -0800 | [diff] [blame] | 79 | #define PSA_WANT_ALG_TLS12_PRF 1 |
| 80 | #define PSA_WANT_ALG_TLS12_PSK_TO_MS 1 |
Andrzej Kurek | 08d34b8 | 2022-07-29 10:00:16 -0400 | [diff] [blame] | 81 | #define PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS 1 |
| 82 | |
David Brown | 3298851 | 2021-03-16 10:44:22 -0600 | [diff] [blame] | 83 | #define PSA_WANT_ECC_BRAINPOOL_P_R1_256 1 |
| 84 | #define PSA_WANT_ECC_BRAINPOOL_P_R1_384 1 |
| 85 | #define PSA_WANT_ECC_BRAINPOOL_P_R1_512 1 |
David Brown | 3353f81 | 2021-03-02 18:36:35 -0700 | [diff] [blame] | 86 | #define PSA_WANT_ECC_MONTGOMERY_255 1 |
Archana | ef6aa5c | 2021-06-08 11:40:10 +0530 | [diff] [blame] | 87 | #define PSA_WANT_ECC_MONTGOMERY_448 1 |
David Brown | 3353f81 | 2021-03-02 18:36:35 -0700 | [diff] [blame] | 88 | #define PSA_WANT_ECC_SECP_K1_192 1 |
David Brown | 3353f81 | 2021-03-02 18:36:35 -0700 | [diff] [blame] | 89 | #define PSA_WANT_ECC_SECP_K1_256 1 |
| 90 | #define PSA_WANT_ECC_SECP_R1_192 1 |
| 91 | #define PSA_WANT_ECC_SECP_R1_224 1 |
Gilles Peskine | 3aa7969 | 2023-09-20 20:54:50 +0200 | [diff] [blame] | 92 | /* For secp256r1, consider enabling #MBEDTLS_PSA_P256M_DRIVER_ENABLED |
| 93 | * (see the description in mbedtls/mbedtls_config.h for details). */ |
David Brown | 3353f81 | 2021-03-02 18:36:35 -0700 | [diff] [blame] | 94 | #define PSA_WANT_ECC_SECP_R1_256 1 |
| 95 | #define PSA_WANT_ECC_SECP_R1_384 1 |
| 96 | #define PSA_WANT_ECC_SECP_R1_521 1 |
David Brown | 20a8c43 | 2021-02-19 14:12:27 -0700 | [diff] [blame] | 97 | |
Valerio Setti | bbff303 | 2024-01-17 11:47:44 +0100 | [diff] [blame] | 98 | #define PSA_WANT_DH_RFC7919_2048 1 |
| 99 | #define PSA_WANT_DH_RFC7919_3072 1 |
| 100 | #define PSA_WANT_DH_RFC7919_4096 1 |
| 101 | #define PSA_WANT_DH_RFC7919_6144 1 |
| 102 | #define PSA_WANT_DH_RFC7919_8192 1 |
| 103 | |
Gilles Peskine | 51b8bb0 | 2021-01-12 00:01:16 +0100 | [diff] [blame] | 104 | #define PSA_WANT_KEY_TYPE_DERIVE 1 |
Gilles Peskine | bba2630 | 2022-12-15 23:25:17 +0100 | [diff] [blame] | 105 | #define PSA_WANT_KEY_TYPE_PASSWORD 1 |
| 106 | #define PSA_WANT_KEY_TYPE_PASSWORD_HASH 1 |
Gilles Peskine | 47a8933 | 2021-01-12 00:00:15 +0100 | [diff] [blame] | 107 | #define PSA_WANT_KEY_TYPE_HMAC 1 |
David Brown | a9f1d83 | 2021-01-15 11:40:25 -0700 | [diff] [blame] | 108 | #define PSA_WANT_KEY_TYPE_AES 1 |
Gilles Peskine | 09c46da | 2021-10-08 15:48:16 +0200 | [diff] [blame] | 109 | #define PSA_WANT_KEY_TYPE_ARIA 1 |
David Brown | a9f1d83 | 2021-01-15 11:40:25 -0700 | [diff] [blame] | 110 | #define PSA_WANT_KEY_TYPE_CAMELLIA 1 |
David Brown | 9a594e8 | 2021-02-16 12:57:27 -0700 | [diff] [blame] | 111 | #define PSA_WANT_KEY_TYPE_CHACHA20 1 |
David Brown | a9f1d83 | 2021-01-15 11:40:25 -0700 | [diff] [blame] | 112 | #define PSA_WANT_KEY_TYPE_DES 1 |
Valerio Setti | 67a3e3e | 2023-05-26 13:37:26 +0200 | [diff] [blame] | 113 | //#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR 1 /* Deprecated */ |
John Durkop | 07cc04a | 2020-11-16 22:08:34 -0800 | [diff] [blame] | 114 | #define PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY 1 |
Przemek Stekiel | eb511a4 | 2023-04-28 13:20:16 +0200 | [diff] [blame] | 115 | #define PSA_WANT_KEY_TYPE_DH_PUBLIC_KEY 1 |
Gilles Peskine | 60b29fe | 2021-02-16 14:06:50 +0100 | [diff] [blame] | 116 | #define PSA_WANT_KEY_TYPE_RAW_DATA 1 |
Valerio Setti | 67a3e3e | 2023-05-26 13:37:26 +0200 | [diff] [blame] | 117 | //#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR 1 /* Deprecated */ |
John Durkop | 7fc75ea | 2020-11-03 19:05:36 -0800 | [diff] [blame] | 118 | #define PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY 1 |
John Durkop | 6e33dbe | 2020-09-17 21:15:13 -0700 | [diff] [blame] | 119 | |
Valerio Setti | 67a3e3e | 2023-05-26 13:37:26 +0200 | [diff] [blame] | 120 | /* |
| 121 | * The following symbols extend and deprecate the legacy |
| 122 | * PSA_WANT_KEY_TYPE_xxx_KEY_PAIR ones. They include the usage of that key in |
| 123 | * the name's suffix. "_USE" is the most generic and it can be used to describe |
| 124 | * a generic suport, whereas other ones add more features on top of that and |
| 125 | * they are more specific. |
| 126 | */ |
Valerio Setti | 01cc88a | 2023-06-15 11:53:08 +0200 | [diff] [blame] | 127 | #define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC 1 |
Valerio Setti | 67a3e3e | 2023-05-26 13:37:26 +0200 | [diff] [blame] | 128 | #define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT 1 |
| 129 | #define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT 1 |
| 130 | #define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE 1 |
| 131 | #define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE 1 |
| 132 | |
Valerio Setti | 01cc88a | 2023-06-15 11:53:08 +0200 | [diff] [blame] | 133 | #define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC 1 |
Valerio Setti | 67a3e3e | 2023-05-26 13:37:26 +0200 | [diff] [blame] | 134 | #define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_IMPORT 1 |
| 135 | #define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_EXPORT 1 |
| 136 | #define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_GENERATE 1 |
| 137 | //#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_DERIVE 1 /* Not supported */ |
| 138 | |
Valerio Setti | 01cc88a | 2023-06-15 11:53:08 +0200 | [diff] [blame] | 139 | #define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_BASIC 1 |
Valerio Setti | 67a3e3e | 2023-05-26 13:37:26 +0200 | [diff] [blame] | 140 | #define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_IMPORT 1 |
| 141 | #define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_EXPORT 1 |
| 142 | #define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_GENERATE 1 |
Valerio Setti | 602ee2e | 2023-06-06 14:10:15 +0200 | [diff] [blame] | 143 | //#define PSA_WANT_KEY_TYPE_DH_KEY_PAIR_DERIVE 1 /* Not supported */ |
Valerio Setti | 67a3e3e | 2023-05-26 13:37:26 +0200 | [diff] [blame] | 144 | |
John Durkop | 6e33dbe | 2020-09-17 21:15:13 -0700 | [diff] [blame] | 145 | #endif /* PSA_CRYPTO_CONFIG_H */ |