2020-09-18 06:15:13 +02:00
|
|
|
/**
|
|
|
|
|
* \file mbedtls/config_psa.h
|
|
|
|
|
* \brief PSA crypto configuration options (set of defines)
|
|
|
|
|
*
|
2020-10-13 06:36:22 +02:00
|
|
|
* This set of compile-time options takes settings defined in
|
|
|
|
|
* include/mbedtls/config.h and include/psa/crypto_config.h and uses
|
|
|
|
|
* those definitions to define symbols used in the library code.
|
|
|
|
|
*
|
|
|
|
|
* Users and integrators should not edit this file, please edit
|
|
|
|
|
* include/mbedtls/config.h for MBETLS_XXX settings or
|
|
|
|
|
* include/psa/crypto_config.h for PSA_WANT_XXX settings.
|
2020-09-18 06:15:13 +02:00
|
|
|
*/
|
|
|
|
|
/*
|
|
|
|
|
* Copyright The Mbed TLS Contributors
|
|
|
|
|
* SPDX-License-Identifier: Apache-2.0
|
|
|
|
|
*
|
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
|
|
|
* not use this file except in compliance with the License.
|
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
|
*
|
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
*
|
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
|
|
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
|
* limitations under the License.
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
#ifndef MBEDTLS_CONFIG_PSA_H
|
|
|
|
|
#define MBEDTLS_CONFIG_PSA_H
|
|
|
|
|
|
2020-09-30 07:07:04 +02:00
|
|
|
#if defined(MBEDTLS_PSA_CRYPTO_CONFIG)
|
2020-09-18 06:15:13 +02:00
|
|
|
#include "psa/crypto_config.h"
|
2020-09-30 07:33:49 +02:00
|
|
|
#endif /* defined(MBEDTLS_PSA_CRYPTO_CONFIG) */
|
2020-09-18 06:15:13 +02:00
|
|
|
|
|
|
|
|
#ifdef __cplusplus
|
|
|
|
|
extern "C" {
|
|
|
|
|
#endif
|
|
|
|
|
|
2020-09-24 13:30:10 +02:00
|
|
|
#if defined(MBEDTLS_PSA_CRYPTO_CONFIG)
|
2020-09-21 08:09:17 +02:00
|
|
|
|
2020-10-14 04:58:20 +02:00
|
|
|
#if defined(PSA_WANT_ALG_DETERMINISTIC_ECDSA)
|
|
|
|
|
#if !defined(MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA)
|
2020-12-01 06:06:05 +01:00
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
|
2020-09-21 08:09:17 +02:00
|
|
|
#define MBEDTLS_ECDSA_DETERMINISTIC
|
2020-10-26 17:39:05 +01:00
|
|
|
#define MBEDTLS_ECDSA_C
|
2020-10-23 10:22:58 +02:00
|
|
|
#define MBEDTLS_HMAC_DRBG_C
|
|
|
|
|
#define MBEDTLS_MD_C
|
Phase 2 support for MBEDTLS_PSA_CRYPTO_CONFIG
This phase adds in support for the following features being
added to the list of features that can be configured in the
include/psa/crypto_config.h header file using the PSA_WANT_ALG_xxx
macros: ECDH, HMAC, HKDF, and RSA. These changes include changes to
the PSA crypto library to use the appropriate new guards that
will allow the feature to be compiled in or out either using
new PSA_WANT_ALG_xxx or the previous MBEDTLS_xxx macros.
For HKDF and HMAC, most of the PSA library code did not have a
specific matching MBEDTLS_xxx macro for that feature, but was instead
using the generic dependent MBEDTLS_MD_C macro. The ECDH and RSA
features more closely aligned with a direct replacement with a similar
macro.
The new tests for RSA, HMAC, and HKDF would normally unset additional
dependent macros, but when attempting to implement that level of
testing it required removal of too many core features like MD_C, PK_C,
ECP_C and other low level features. This may point to additional phases of
work to complete the transition of these features to the new model.
Signed-off-by: John Durkop <john.durkop@fermatsoftware.com>
2020-10-30 05:37:36 +01:00
|
|
|
#endif /* !MBEDTLS_PSA_ACCEL_ALG_DETERMINISTIC_ECDSA */
|
2020-10-13 06:36:22 +02:00
|
|
|
#endif /* PSA_WANT_ALG_DETERMINISTIC_ECDSA */
|
2020-09-24 13:30:10 +02:00
|
|
|
|
Phase 2 support for MBEDTLS_PSA_CRYPTO_CONFIG
This phase adds in support for the following features being
added to the list of features that can be configured in the
include/psa/crypto_config.h header file using the PSA_WANT_ALG_xxx
macros: ECDH, HMAC, HKDF, and RSA. These changes include changes to
the PSA crypto library to use the appropriate new guards that
will allow the feature to be compiled in or out either using
new PSA_WANT_ALG_xxx or the previous MBEDTLS_xxx macros.
For HKDF and HMAC, most of the PSA library code did not have a
specific matching MBEDTLS_xxx macro for that feature, but was instead
using the generic dependent MBEDTLS_MD_C macro. The ECDH and RSA
features more closely aligned with a direct replacement with a similar
macro.
The new tests for RSA, HMAC, and HKDF would normally unset additional
dependent macros, but when attempting to implement that level of
testing it required removal of too many core features like MD_C, PK_C,
ECP_C and other low level features. This may point to additional phases of
work to complete the transition of these features to the new model.
Signed-off-by: John Durkop <john.durkop@fermatsoftware.com>
2020-10-30 05:37:36 +01:00
|
|
|
#if defined(PSA_WANT_ALG_ECDH)
|
|
|
|
|
#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDH)
|
2020-12-01 06:06:05 +01:00
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
|
Phase 2 support for MBEDTLS_PSA_CRYPTO_CONFIG
This phase adds in support for the following features being
added to the list of features that can be configured in the
include/psa/crypto_config.h header file using the PSA_WANT_ALG_xxx
macros: ECDH, HMAC, HKDF, and RSA. These changes include changes to
the PSA crypto library to use the appropriate new guards that
will allow the feature to be compiled in or out either using
new PSA_WANT_ALG_xxx or the previous MBEDTLS_xxx macros.
For HKDF and HMAC, most of the PSA library code did not have a
specific matching MBEDTLS_xxx macro for that feature, but was instead
using the generic dependent MBEDTLS_MD_C macro. The ECDH and RSA
features more closely aligned with a direct replacement with a similar
macro.
The new tests for RSA, HMAC, and HKDF would normally unset additional
dependent macros, but when attempting to implement that level of
testing it required removal of too many core features like MD_C, PK_C,
ECP_C and other low level features. This may point to additional phases of
work to complete the transition of these features to the new model.
Signed-off-by: John Durkop <john.durkop@fermatsoftware.com>
2020-10-30 05:37:36 +01:00
|
|
|
#define MBEDTLS_ECDH_C
|
|
|
|
|
#define MBEDTLS_ECP_C
|
|
|
|
|
#define MBEDTLS_BIGNUM_C
|
2020-10-29 04:09:55 +01:00
|
|
|
#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDH */
|
|
|
|
|
#endif /* PSA_WANT_ALG_ECDH */
|
|
|
|
|
|
2020-11-17 07:08:34 +01:00
|
|
|
#if defined(PSA_WANT_ALG_ECDSA)
|
|
|
|
|
#if !defined(MBEDTLS_PSA_ACCEL_ALG_ECDSA)
|
2020-12-01 06:06:05 +01:00
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
|
2020-11-17 07:08:34 +01:00
|
|
|
#define MBEDTLS_ECDSA_C
|
|
|
|
|
#endif /* !MBEDTLS_PSA_ACCEL_ALG_ECDSA */
|
|
|
|
|
#endif /* PSA_WANT_ALG_ECDSA */
|
Phase 2 support for MBEDTLS_PSA_CRYPTO_CONFIG
This phase adds in support for the following features being
added to the list of features that can be configured in the
include/psa/crypto_config.h header file using the PSA_WANT_ALG_xxx
macros: ECDH, HMAC, HKDF, and RSA. These changes include changes to
the PSA crypto library to use the appropriate new guards that
will allow the feature to be compiled in or out either using
new PSA_WANT_ALG_xxx or the previous MBEDTLS_xxx macros.
For HKDF and HMAC, most of the PSA library code did not have a
specific matching MBEDTLS_xxx macro for that feature, but was instead
using the generic dependent MBEDTLS_MD_C macro. The ECDH and RSA
features more closely aligned with a direct replacement with a similar
macro.
The new tests for RSA, HMAC, and HKDF would normally unset additional
dependent macros, but when attempting to implement that level of
testing it required removal of too many core features like MD_C, PK_C,
ECP_C and other low level features. This may point to additional phases of
work to complete the transition of these features to the new model.
Signed-off-by: John Durkop <john.durkop@fermatsoftware.com>
2020-10-30 05:37:36 +01:00
|
|
|
|
|
|
|
|
#if defined(PSA_WANT_ALG_HKDF)
|
|
|
|
|
#if !defined(MBEDTLS_PSA_ACCEL_ALG_HKDF)
|
2020-12-01 06:06:05 +01:00
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
|
|
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
|
2020-10-29 04:09:55 +01:00
|
|
|
#endif /* !MBEDTLS_PSA_ACCEL_ALG_HKDF */
|
|
|
|
|
#endif /* PSA_WANT_ALG_HKDF */
|
Phase 2 support for MBEDTLS_PSA_CRYPTO_CONFIG
This phase adds in support for the following features being
added to the list of features that can be configured in the
include/psa/crypto_config.h header file using the PSA_WANT_ALG_xxx
macros: ECDH, HMAC, HKDF, and RSA. These changes include changes to
the PSA crypto library to use the appropriate new guards that
will allow the feature to be compiled in or out either using
new PSA_WANT_ALG_xxx or the previous MBEDTLS_xxx macros.
For HKDF and HMAC, most of the PSA library code did not have a
specific matching MBEDTLS_xxx macro for that feature, but was instead
using the generic dependent MBEDTLS_MD_C macro. The ECDH and RSA
features more closely aligned with a direct replacement with a similar
macro.
The new tests for RSA, HMAC, and HKDF would normally unset additional
dependent macros, but when attempting to implement that level of
testing it required removal of too many core features like MD_C, PK_C,
ECP_C and other low level features. This may point to additional phases of
work to complete the transition of these features to the new model.
Signed-off-by: John Durkop <john.durkop@fermatsoftware.com>
2020-10-30 05:37:36 +01:00
|
|
|
|
2020-11-17 07:08:34 +01:00
|
|
|
#if defined(PSA_WANT_ALG_HMAC)
|
|
|
|
|
#if !defined(MBEDTLS_PSA_ACCEL_ALG_HMAC)
|
2020-12-01 06:06:05 +01:00
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
|
2020-11-17 07:08:34 +01:00
|
|
|
#endif /* !MBEDTLS_PSA_ACCEL_ALG_HMAC */
|
|
|
|
|
#endif /* PSA_WANT_ALG_HMAC */
|
|
|
|
|
|
2020-12-01 06:06:05 +01:00
|
|
|
#if defined(PSA_WANT_ALG_MD2) && !defined(MBEDTLS_PSA_ACCEL_ALG_MD2)
|
|
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_MD2 1
|
|
|
|
|
#define MBEDTLS_MD2_C
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
#if defined(PSA_WANT_ALG_MD4) && !defined(MBEDTLS_PSA_ACCEL_ALG_MD4)
|
|
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_MD4 1
|
|
|
|
|
#define MBEDTLS_MD4_C
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
#if defined(PSA_WANT_ALG_MD5) && !defined(MBEDTLS_PSA_ACCEL_ALG_MD5)
|
|
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
|
|
|
|
|
#define MBEDTLS_MD5_C
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
#if defined(PSA_WANT_ALG_RIPEMD160) && !defined(MBEDTLS_PSA_ACCEL_ALG_RIPEMD160)
|
|
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
|
|
|
|
|
#define MBEDTLS_RIPEMD160_C
|
|
|
|
|
#endif
|
|
|
|
|
|
2020-11-04 21:28:15 +01:00
|
|
|
#if defined(PSA_WANT_ALG_RSA_OAEP)
|
2020-11-01 06:06:54 +01:00
|
|
|
#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP)
|
2020-12-01 06:06:05 +01:00
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
|
2020-11-01 06:06:54 +01:00
|
|
|
#define MBEDTLS_RSA_C
|
|
|
|
|
#define MBEDTLS_BIGNUM_C
|
|
|
|
|
#define MBEDTLS_OID_C
|
2020-11-04 21:28:15 +01:00
|
|
|
#define MBEDTLS_PKCS1_V21
|
2020-11-17 07:08:34 +01:00
|
|
|
#define MBEDTLS_MD_C
|
2020-11-01 06:06:54 +01:00
|
|
|
#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_OAEP */
|
2020-11-04 21:28:15 +01:00
|
|
|
#endif /* PSA_WANT_ALG_RSA_OAEP */
|
|
|
|
|
|
|
|
|
|
#if defined(PSA_WANT_ALG_RSA_PKCS1V15_CRYPT)
|
2020-11-01 06:06:54 +01:00
|
|
|
#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT)
|
2020-12-01 06:06:05 +01:00
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
|
2020-11-01 06:06:54 +01:00
|
|
|
#define MBEDTLS_RSA_C
|
|
|
|
|
#define MBEDTLS_BIGNUM_C
|
|
|
|
|
#define MBEDTLS_OID_C
|
|
|
|
|
#define MBEDTLS_PKCS1_V15
|
|
|
|
|
#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_CRYPT */
|
2020-11-04 21:28:15 +01:00
|
|
|
#endif /* PSA_WANT_ALG_RSA_PKCS1V15_CRYPT */
|
|
|
|
|
|
|
|
|
|
#if defined(PSA_WANT_ALG_RSA_PKCS1V15_SIGN)
|
2020-11-01 06:06:54 +01:00
|
|
|
#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN)
|
2020-12-01 06:06:05 +01:00
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
|
2020-11-01 06:06:54 +01:00
|
|
|
#define MBEDTLS_RSA_C
|
|
|
|
|
#define MBEDTLS_BIGNUM_C
|
|
|
|
|
#define MBEDTLS_OID_C
|
|
|
|
|
#define MBEDTLS_PKCS1_V15
|
2020-11-17 07:08:34 +01:00
|
|
|
#define MBEDTLS_MD_C
|
2020-11-01 06:06:54 +01:00
|
|
|
#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PKCS1V15_SIGN */
|
2020-11-04 21:28:15 +01:00
|
|
|
#endif /* PSA_WANT_ALG_RSA_PKCS1V15_SIGN */
|
2020-11-01 06:06:54 +01:00
|
|
|
|
2020-11-17 07:08:34 +01:00
|
|
|
#if defined(PSA_WANT_ALG_RSA_PSS)
|
|
|
|
|
#if !defined(MBEDTLS_PSA_ACCEL_ALG_RSA_PSS)
|
2020-12-01 06:06:05 +01:00
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
|
2020-11-17 07:08:34 +01:00
|
|
|
#define MBEDTLS_RSA_C
|
|
|
|
|
#define MBEDTLS_BIGNUM_C
|
|
|
|
|
#define MBEDTLS_OID_C
|
|
|
|
|
#define MBEDTLS_PKCS1_V21
|
|
|
|
|
#define MBEDTLS_MD_C
|
|
|
|
|
#endif /* !MBEDTLS_PSA_ACCEL_ALG_RSA_PSS */
|
|
|
|
|
#endif /* PSA_WANT_ALG_RSA_PSS */
|
|
|
|
|
|
2020-12-01 06:06:05 +01:00
|
|
|
#if defined(PSA_WANT_ALG_SHA_1) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_1)
|
|
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
|
|
|
|
|
#define MBEDTLS_SHA1_C
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
#if defined(PSA_WANT_ALG_SHA_224) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_224)
|
|
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
|
|
|
|
|
#define MBEDTLS_SHA256_C
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
#if defined(PSA_WANT_ALG_SHA_256) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_256)
|
|
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
|
|
|
|
|
#define MBEDTLS_SHA256_C
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
#if defined(PSA_WANT_ALG_SHA_384) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_384)
|
|
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
|
|
|
|
|
#define MBEDTLS_SHA512_C
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
#if defined(PSA_WANT_ALG_SHA_512) && !defined(MBEDTLS_PSA_ACCEL_ALG_SHA_512)
|
|
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
|
|
|
|
|
#define MBEDTLS_SHA512_C
|
|
|
|
|
#endif
|
|
|
|
|
|
2020-11-17 07:08:34 +01:00
|
|
|
#if defined(PSA_WANT_ALG_TLS12_PRF)
|
|
|
|
|
#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF)
|
2020-12-01 06:06:05 +01:00
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
|
2020-11-17 07:08:34 +01:00
|
|
|
#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PRF */
|
|
|
|
|
#endif /* PSA_WANT_ALG_TLS12_PRF */
|
|
|
|
|
|
|
|
|
|
#if defined(PSA_WANT_ALG_TLS12_PSK_TO_MS)
|
|
|
|
|
#if !defined(MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS)
|
2020-12-01 06:06:05 +01:00
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
|
2020-11-17 07:08:34 +01:00
|
|
|
#endif /* !MBEDTLS_PSA_ACCEL_ALG_TLS12_PSK_TO_MS */
|
|
|
|
|
#endif /* PSA_WANT_ALG_TLS12_PSK_TO_MS */
|
|
|
|
|
|
|
|
|
|
#if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR)
|
|
|
|
|
#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR)
|
2020-12-01 06:06:05 +01:00
|
|
|
#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR 1
|
2020-11-17 07:08:34 +01:00
|
|
|
#define MBEDTLS_ECP_C
|
|
|
|
|
#define MBEDTLS_BIGNUM_C
|
|
|
|
|
#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR */
|
|
|
|
|
#endif /* PSA_WANT_KEY_TYPE_ECC_KEY_PAIR */
|
|
|
|
|
|
|
|
|
|
#if defined(PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY)
|
|
|
|
|
#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY)
|
2020-12-01 06:06:05 +01:00
|
|
|
#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
|
2020-11-17 07:08:34 +01:00
|
|
|
#define MBEDTLS_ECP_C
|
|
|
|
|
#define MBEDTLS_BIGNUM_C
|
|
|
|
|
#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY */
|
|
|
|
|
#endif /* PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY */
|
|
|
|
|
|
2020-11-04 21:28:15 +01:00
|
|
|
#if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR)
|
2020-11-01 06:06:54 +01:00
|
|
|
#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR)
|
2020-12-01 06:06:05 +01:00
|
|
|
#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR 1
|
2020-11-01 06:06:54 +01:00
|
|
|
#define MBEDTLS_RSA_C
|
|
|
|
|
#define MBEDTLS_BIGNUM_C
|
|
|
|
|
#define MBEDTLS_OID_C
|
|
|
|
|
#define MBEDTLS_GENPRIME
|
2020-11-17 07:08:34 +01:00
|
|
|
#define MBEDTLS_PK_PARSE_C
|
|
|
|
|
#define MBEDTLS_PK_WRITE_C
|
|
|
|
|
#define MBEDTLS_PK_C
|
2020-11-01 06:06:54 +01:00
|
|
|
#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR */
|
2020-11-04 21:28:15 +01:00
|
|
|
#endif /* PSA_WANT_KEY_TYPE_RSA_KEY_PAIR */
|
|
|
|
|
|
|
|
|
|
#if defined(PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY)
|
2020-11-01 06:06:54 +01:00
|
|
|
#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY)
|
2020-12-01 06:06:05 +01:00
|
|
|
#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
|
Phase 2 support for MBEDTLS_PSA_CRYPTO_CONFIG
This phase adds in support for the following features being
added to the list of features that can be configured in the
include/psa/crypto_config.h header file using the PSA_WANT_ALG_xxx
macros: ECDH, HMAC, HKDF, and RSA. These changes include changes to
the PSA crypto library to use the appropriate new guards that
will allow the feature to be compiled in or out either using
new PSA_WANT_ALG_xxx or the previous MBEDTLS_xxx macros.
For HKDF and HMAC, most of the PSA library code did not have a
specific matching MBEDTLS_xxx macro for that feature, but was instead
using the generic dependent MBEDTLS_MD_C macro. The ECDH and RSA
features more closely aligned with a direct replacement with a similar
macro.
The new tests for RSA, HMAC, and HKDF would normally unset additional
dependent macros, but when attempting to implement that level of
testing it required removal of too many core features like MD_C, PK_C,
ECP_C and other low level features. This may point to additional phases of
work to complete the transition of these features to the new model.
Signed-off-by: John Durkop <john.durkop@fermatsoftware.com>
2020-10-30 05:37:36 +01:00
|
|
|
#define MBEDTLS_RSA_C
|
|
|
|
|
#define MBEDTLS_BIGNUM_C
|
|
|
|
|
#define MBEDTLS_OID_C
|
2020-11-17 07:08:34 +01:00
|
|
|
#define MBEDTLS_PK_PARSE_C
|
|
|
|
|
#define MBEDTLS_PK_WRITE_C
|
|
|
|
|
#define MBEDTLS_PK_C
|
2020-11-01 06:06:54 +01:00
|
|
|
#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY */
|
2020-11-04 21:28:15 +01:00
|
|
|
#endif /* PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY */
|
Phase 2 support for MBEDTLS_PSA_CRYPTO_CONFIG
This phase adds in support for the following features being
added to the list of features that can be configured in the
include/psa/crypto_config.h header file using the PSA_WANT_ALG_xxx
macros: ECDH, HMAC, HKDF, and RSA. These changes include changes to
the PSA crypto library to use the appropriate new guards that
will allow the feature to be compiled in or out either using
new PSA_WANT_ALG_xxx or the previous MBEDTLS_xxx macros.
For HKDF and HMAC, most of the PSA library code did not have a
specific matching MBEDTLS_xxx macro for that feature, but was instead
using the generic dependent MBEDTLS_MD_C macro. The ECDH and RSA
features more closely aligned with a direct replacement with a similar
macro.
The new tests for RSA, HMAC, and HKDF would normally unset additional
dependent macros, but when attempting to implement that level of
testing it required removal of too many core features like MD_C, PK_C,
ECP_C and other low level features. This may point to additional phases of
work to complete the transition of these features to the new model.
Signed-off-by: John Durkop <john.durkop@fermatsoftware.com>
2020-10-30 05:37:36 +01:00
|
|
|
|
2021-01-05 20:03:25 +01:00
|
|
|
#if defined(PSA_WANT_KEY_TYPE_AES)
|
|
|
|
|
#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_AES)
|
|
|
|
|
#define MBEDTLS_AES_C
|
|
|
|
|
#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_AES */
|
|
|
|
|
#endif /* PSA_WANT_KEY_TYPE_AES */
|
|
|
|
|
|
2021-01-05 20:03:25 +01:00
|
|
|
#if defined(PSA_WANT_KEY_TYPE_ARC4)
|
|
|
|
|
#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ARC4)
|
|
|
|
|
#define MBEDTLS_ARC4_C
|
|
|
|
|
#endif /*!MBEDTLS_PSA_ACCEL_KEY_TYPE_ARC4 */
|
|
|
|
|
#endif /* PSA_WANT_KEY_TYPE_ARC4 */
|
|
|
|
|
|
2021-01-05 20:03:25 +01:00
|
|
|
#if defined(PSA_WANT_KEY_TYPE_CAMELLIA)
|
|
|
|
|
#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA)
|
|
|
|
|
#define MBEDTLS_CAMELLIA_C
|
|
|
|
|
#endif /*!MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA */
|
|
|
|
|
#endif /* PSA_WANT_KEY_TYPE_CAMELLIA */
|
|
|
|
|
|
2020-09-30 07:07:04 +02:00
|
|
|
#else /* MBEDTLS_PSA_CRYPTO_CONFIG */
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* Ensure PSA_WANT_* defines are setup properly if MBEDTLS_PSA_CRYPTO_CONFIG
|
|
|
|
|
* is not defined
|
|
|
|
|
*/
|
2020-11-25 00:07:04 +01:00
|
|
|
|
2020-11-17 07:08:34 +01:00
|
|
|
#if defined(MBEDTLS_ECDH_C)
|
2020-12-01 06:06:05 +01:00
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
|
2020-11-25 00:07:18 +01:00
|
|
|
#define PSA_WANT_ALG_ECDH 1
|
2020-11-17 07:08:34 +01:00
|
|
|
#endif /* MBEDTLS_ECDH_C */
|
|
|
|
|
|
2020-10-13 06:36:22 +02:00
|
|
|
#if defined(MBEDTLS_ECDSA_C)
|
2020-12-01 06:06:05 +01:00
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_ECDSA 1
|
2020-11-25 00:07:18 +01:00
|
|
|
#define PSA_WANT_ALG_ECDSA 1
|
2020-09-30 07:07:04 +02:00
|
|
|
|
2020-10-26 23:25:23 +01:00
|
|
|
// Only add in DETERMINISTIC support if ECDSA is also enabled
|
2020-10-13 06:36:22 +02:00
|
|
|
#if defined(MBEDTLS_ECDSA_DETERMINISTIC)
|
2020-12-01 06:06:05 +01:00
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_DETERMINISTIC_ECDSA 1
|
2020-11-25 00:07:18 +01:00
|
|
|
#define PSA_WANT_ALG_DETERMINISTIC_ECDSA 1
|
2020-09-30 07:07:04 +02:00
|
|
|
#endif /* MBEDTLS_ECDSA_DETERMINISTIC */
|
|
|
|
|
|
2020-10-26 23:25:23 +01:00
|
|
|
#endif /* MBEDTLS_ECDSA_C */
|
|
|
|
|
|
2020-10-29 04:09:55 +01:00
|
|
|
#if defined(MBEDTLS_ECP_C)
|
2020-12-01 06:06:05 +01:00
|
|
|
#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_KEY_PAIR 1
|
2020-11-25 00:07:18 +01:00
|
|
|
#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR 1
|
2020-12-01 06:06:05 +01:00
|
|
|
#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ECC_PUBLIC_KEY 1
|
2020-11-25 00:07:18 +01:00
|
|
|
#define PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY 1
|
2020-10-29 04:09:55 +01:00
|
|
|
#endif /* MBEDTLS_ECP_C */
|
|
|
|
|
|
Phase 2 support for MBEDTLS_PSA_CRYPTO_CONFIG
This phase adds in support for the following features being
added to the list of features that can be configured in the
include/psa/crypto_config.h header file using the PSA_WANT_ALG_xxx
macros: ECDH, HMAC, HKDF, and RSA. These changes include changes to
the PSA crypto library to use the appropriate new guards that
will allow the feature to be compiled in or out either using
new PSA_WANT_ALG_xxx or the previous MBEDTLS_xxx macros.
For HKDF and HMAC, most of the PSA library code did not have a
specific matching MBEDTLS_xxx macro for that feature, but was instead
using the generic dependent MBEDTLS_MD_C macro. The ECDH and RSA
features more closely aligned with a direct replacement with a similar
macro.
The new tests for RSA, HMAC, and HKDF would normally unset additional
dependent macros, but when attempting to implement that level of
testing it required removal of too many core features like MD_C, PK_C,
ECP_C and other low level features. This may point to additional phases of
work to complete the transition of these features to the new model.
Signed-off-by: John Durkop <john.durkop@fermatsoftware.com>
2020-10-30 05:37:36 +01:00
|
|
|
#if defined(MBEDTLS_HKDF_C)
|
2020-12-01 06:06:05 +01:00
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
|
2020-11-25 00:07:18 +01:00
|
|
|
#define PSA_WANT_ALG_HMAC 1
|
2020-12-01 06:06:05 +01:00
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_HKDF 1
|
2020-11-25 00:07:18 +01:00
|
|
|
#define PSA_WANT_ALG_HKDF 1
|
Phase 2 support for MBEDTLS_PSA_CRYPTO_CONFIG
This phase adds in support for the following features being
added to the list of features that can be configured in the
include/psa/crypto_config.h header file using the PSA_WANT_ALG_xxx
macros: ECDH, HMAC, HKDF, and RSA. These changes include changes to
the PSA crypto library to use the appropriate new guards that
will allow the feature to be compiled in or out either using
new PSA_WANT_ALG_xxx or the previous MBEDTLS_xxx macros.
For HKDF and HMAC, most of the PSA library code did not have a
specific matching MBEDTLS_xxx macro for that feature, but was instead
using the generic dependent MBEDTLS_MD_C macro. The ECDH and RSA
features more closely aligned with a direct replacement with a similar
macro.
The new tests for RSA, HMAC, and HKDF would normally unset additional
dependent macros, but when attempting to implement that level of
testing it required removal of too many core features like MD_C, PK_C,
ECP_C and other low level features. This may point to additional phases of
work to complete the transition of these features to the new model.
Signed-off-by: John Durkop <john.durkop@fermatsoftware.com>
2020-10-30 05:37:36 +01:00
|
|
|
#endif /* MBEDTLS_HKDF_C */
|
|
|
|
|
|
2020-11-17 07:08:34 +01:00
|
|
|
#if defined(MBEDTLS_MD_C)
|
2020-12-01 06:06:05 +01:00
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
|
2020-11-25 00:07:18 +01:00
|
|
|
#define PSA_WANT_ALG_HMAC 1
|
2021-01-12 00:00:15 +01:00
|
|
|
#define PSA_WANT_KEY_TYPE_HMAC
|
2020-12-01 06:06:05 +01:00
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
|
2020-11-25 00:07:18 +01:00
|
|
|
#define PSA_WANT_ALG_TLS12_PRF 1
|
2020-12-01 06:06:05 +01:00
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
|
2020-11-25 00:07:18 +01:00
|
|
|
#define PSA_WANT_ALG_TLS12_PSK_TO_MS 1
|
2020-11-17 07:08:34 +01:00
|
|
|
#endif /* MBEDTLS_MD_C */
|
|
|
|
|
|
2020-12-01 06:06:05 +01:00
|
|
|
#if defined(MBEDTLS_MD2_C)
|
|
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_MD2 1
|
|
|
|
|
#define PSA_WANT_ALG_MD2 1
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_MD4_C)
|
|
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_MD4 1
|
|
|
|
|
#define PSA_WANT_ALG_MD4 1
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_MD5_C)
|
|
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_MD5 1
|
|
|
|
|
#define PSA_WANT_ALG_MD5 1
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_RIPEMD160_C)
|
|
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160 1
|
|
|
|
|
#define PSA_WANT_ALG_RIPEMD160 1
|
|
|
|
|
#endif
|
|
|
|
|
|
2020-10-29 04:09:55 +01:00
|
|
|
#if defined(MBEDTLS_RSA_C)
|
2020-11-01 06:06:54 +01:00
|
|
|
#if defined(MBEDTLS_PKCS1_V15)
|
2020-12-01 06:06:05 +01:00
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_CRYPT 1
|
2020-11-25 00:07:18 +01:00
|
|
|
#define PSA_WANT_ALG_RSA_PKCS1V15_CRYPT 1
|
2020-12-01 06:06:05 +01:00
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PKCS1V15_SIGN 1
|
2020-11-25 00:07:18 +01:00
|
|
|
#define PSA_WANT_ALG_RSA_PKCS1V15_SIGN 1
|
2020-11-01 06:06:54 +01:00
|
|
|
#endif /* MBEDTLSS_PKCS1_V15 */
|
|
|
|
|
#if defined(MBEDTLS_PKCS1_V21)
|
2020-12-01 06:06:05 +01:00
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_RSA_OAEP 1
|
2020-11-25 00:07:18 +01:00
|
|
|
#define PSA_WANT_ALG_RSA_OAEP 1
|
2020-12-01 06:06:05 +01:00
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_RSA_PSS 1
|
2020-11-25 00:07:18 +01:00
|
|
|
#define PSA_WANT_ALG_RSA_PSS 1
|
2020-11-01 06:06:54 +01:00
|
|
|
#endif /* MBEDTLS_PKCS1_V21 */
|
2020-12-01 06:06:05 +01:00
|
|
|
#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_KEY_PAIR 1
|
2020-11-25 00:07:18 +01:00
|
|
|
#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR 1
|
2020-12-01 06:06:05 +01:00
|
|
|
#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_RSA_PUBLIC_KEY 1
|
2020-11-25 00:07:18 +01:00
|
|
|
#define PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY 1
|
Phase 2 support for MBEDTLS_PSA_CRYPTO_CONFIG
This phase adds in support for the following features being
added to the list of features that can be configured in the
include/psa/crypto_config.h header file using the PSA_WANT_ALG_xxx
macros: ECDH, HMAC, HKDF, and RSA. These changes include changes to
the PSA crypto library to use the appropriate new guards that
will allow the feature to be compiled in or out either using
new PSA_WANT_ALG_xxx or the previous MBEDTLS_xxx macros.
For HKDF and HMAC, most of the PSA library code did not have a
specific matching MBEDTLS_xxx macro for that feature, but was instead
using the generic dependent MBEDTLS_MD_C macro. The ECDH and RSA
features more closely aligned with a direct replacement with a similar
macro.
The new tests for RSA, HMAC, and HKDF would normally unset additional
dependent macros, but when attempting to implement that level of
testing it required removal of too many core features like MD_C, PK_C,
ECP_C and other low level features. This may point to additional phases of
work to complete the transition of these features to the new model.
Signed-off-by: John Durkop <john.durkop@fermatsoftware.com>
2020-10-30 05:37:36 +01:00
|
|
|
#endif /* MBEDTLS_RSA_C */
|
|
|
|
|
|
2020-12-01 06:06:05 +01:00
|
|
|
#if defined(MBEDTLS_SHA1_C)
|
|
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_SHA_1 1
|
|
|
|
|
#define PSA_WANT_ALG_SHA_1 1
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_SHA256_C)
|
|
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
|
|
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
|
2021-01-12 00:00:53 +01:00
|
|
|
#define PSA_WANT_ALG_SHA_224 1
|
2020-12-01 06:06:05 +01:00
|
|
|
#define PSA_WANT_ALG_SHA_256 1
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_SHA512_C)
|
|
|
|
|
#if !defined(MBEDTLS_SHA512_NO_SHA384)
|
|
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_SHA_384 1
|
|
|
|
|
#define PSA_WANT_ALG_SHA_384 1
|
|
|
|
|
#endif
|
|
|
|
|
#define MBEDTLS_PSA_BUILTIN_ALG_SHA_512 1
|
|
|
|
|
#define PSA_WANT_ALG_SHA_512 1
|
|
|
|
|
#endif
|
|
|
|
|
|
2021-01-05 20:03:25 +01:00
|
|
|
#if defined(MBEDTLS_AES_C)
|
|
|
|
|
#define PSA_WANT_KEY_TYPE_AES 1
|
|
|
|
|
#endif
|
|
|
|
|
|
2021-01-05 20:03:25 +01:00
|
|
|
#if defined(MBEDTLS_ARC4_C)
|
|
|
|
|
#define PSA_WANT_KEY_TYPE_ARC4 1
|
|
|
|
|
#endif
|
|
|
|
|
|
2021-01-05 20:03:25 +01:00
|
|
|
#if defined(MBEDTLS_CAMELLIA_C)
|
|
|
|
|
#define PSA_WANT_KEY_TYPE_CAMELLIA 1
|
|
|
|
|
#endif
|
|
|
|
|
|
2020-09-24 13:30:10 +02:00
|
|
|
#endif /* MBEDTLS_PSA_CRYPTO_CONFIG */
|
2020-09-21 08:09:17 +02:00
|
|
|
|
2020-09-18 06:15:13 +02:00
|
|
|
#ifdef __cplusplus
|
|
|
|
|
}
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
#endif /* MBEDTLS_CONFIG_PSA_H */
|