1This document describes the compile-time configuration option
2`MBEDTLS_USE_PSA_CRYPTO` from a user's perspective.
3
4This option:
5- makes the X.509 and TLS libraries use PSA for cryptographic operations as
6  much as possible, see "Internal changes" below;
7- enables new APIs for using keys handled by PSA Crypto, such as
8  `mbedtls_pk_setup_opaque()` and `mbedtls_ssl_conf_psk_opaque()`, see
9"New APIs / API extensions" below.
10
11General considerations
12----------------------
13
14**Application code:** when this option is enabled, you need to call
15`psa_crypto_init()` before calling any function from the SSL/TLS, X.509 or PK
16modules, except for the various mbedtls_xxx_init() functions which can be called
17at any time.
18
19**Why enable this option:** to fully take advantage of PSA drivers in PK,
20X.509 and TLS. For example, enabling this option is what allows use of drivers
21for ECDSA, ECDH and EC J-PAKE in those modules. However, note that even with
22this option disabled, some code in PK, X.509, TLS or the crypto library might
23still use PSA drivers, if it can determine it's safe to do so; currently
24that's the case for hashes.
25
26**Relationship with other options:** This option depends on
27`MBEDTLS_PSA_CRYPTO_C`. These two options differ in the following way:
28- `MBEDTLS_PSA_CRYPTO_C` enables the implementation of the PSA Crypto API.
29  When it is enabled, `psa_xxx()` APIs are available and you must call
30`psa_crypto_init()` before you call any other `psa_xxx()` function. Other
31modules in the library (non-PSA crypto APIs, X.509, TLS) may or may not use
32PSA Crypto but you're not required to call `psa_crypto_init()` before calling
33non-PSA functions, unless explicitly documented (TLS 1.3).
34- `MBEDTLS_USE_PSA_CRYPTO` means that X.509 and TLS will use PSA Crypto as
35  much as possible (that is, everywhere except for features that are not
36supported by PSA Crypto, see "Internal Changes" below for a complete list of
37exceptions). When it is enabled, you need to call `psa_crypto_init()` before
38calling any function from PK, X.509 or TLS; however it doesn't change anything
39for the rest of the library.
40
41**Scope:** `MBEDTLS_USE_PSA_CRYPTO` has no effect on modules other than PK,
42X.509 and TLS. It also has no effect on most of the TLS 1.3 code, which always
43uses PSA crypto. The parts of the TLS 1.3 code that will use PSA Crypto or not
44depending on this option being set or not are:
45- record protection;
46- running handshake hash;
47- asymmetric signature verification & generation;
48- X.509 certificate chain verification.
49You need to enable `MBEDTLS_USE_PSA_CRYPTO` if you want TLS 1.3 to use PSA
50everywhere.
51
52**Historical note:** This option was introduced at a time when PSA Crypto was
53still beta and not ready for production, so we made its use in X.509 and TLS
54opt-in: by default, these modules would keep using the stable,
55production-ready legacy (pre-PSA) crypto APIs. So, the scope of was X.509 and
56TLS, as well as some of PK for technical reasons. Nowadays PSA Crypto is no
57longer beta, and production quality, so there's no longer any reason to make
58its use in other modules opt-in. However, PSA Crypto functions require that
59`psa_crypto_init()` has been called before their use, and for backwards
60compatibility reasons we can't impose this requirement on non-PSA functions
61that didn't have such a requirement before. So, nowadays the main meaning of
62`MBEDTLS_USE_PSA_CRYPTO` is that the user promises to call `psa_crypto_init()`
63before calling any PK, X.509 or TLS functions. For the same compatibility
64reasons, we can't extend its scope. However, new modules in the library, such
65as TLS 1.3, can be introduced with a requirement to call `psa_crypto_init()`.
66
67New APIs / API extensions
68-------------------------
69
70### PSA-held (opaque) keys in the PK layer
71
72**New API function:** `mbedtls_pk_setup_opaque()` - can be used to
73wrap a PSA key pair into a PK context. The key can be used for private-key
74operations and its public part can be exported.
75
76**Benefits:** isolation of long-term secrets, use of PSA Crypto drivers.
77
78**Limitations:** can only wrap a key pair, can only use it for private key
79operations. (That is, signature generation, and for RSA decryption too.)
80Note: for ECDSA, currently this uses randomized ECDSA while Mbed TLS uses
81deterministic ECDSA by default. The following operations are not supported
82with a context set this way, while they would be available with a normal
83context: `mbedtls_pk_check_pair()`, `mbedtls_pk_debug()`, all public key
84operations.
85
86**Use in X.509 and TLS:** opt-in. The application needs to construct the PK context
87using the new API in order to get the benefits; it can then pass the
88resulting context to the following existing APIs:
89
90- `mbedtls_ssl_conf_own_cert()` or `mbedtls_ssl_set_hs_own_cert()` to use the
91  key together with a certificate for certificate-based key exchanges;
92- `mbedtls_x509write_csr_set_key()` to generate a CSR (certificate signature
93  request);
94- `mbedtls_x509write_crt_set_issuer_key()` to generate a certificate.
95
96### PSA-held (opaque) keys for TLS pre-shared keys (PSK)
97
98**New API functions:** `mbedtls_ssl_conf_psk_opaque()` and
99`mbedtls_ssl_set_hs_psk_opaque()`. Call one of these from an application to
100register a PSA key for use with a PSK key exchange.
101
102**Benefits:** isolation of long-term secrets.
103
104**Limitations:** none.
105
106**Use in TLS:** opt-in. The application needs to register the key using one of
107the new APIs to get the benefits.
108
109### PSA-held (opaque) keys for TLS 1.2 EC J-PAKE key exchange
110
111**New API function:** `mbedtls_ssl_set_hs_ecjpake_password_opaque()`.
112Call this function from an application to register a PSA key for use with the
113TLS 1.2 EC J-PAKE key exchange.
114
115**Benefits:** isolation of long-term secrets.
116
117**Limitations:** none.
118
119**Use in TLS:** opt-in. The application needs to register the key using one of
120the new APIs to get the benefits.
121
122### PSA-based operations in the Cipher layer
123
124There is a new API function `mbedtls_cipher_setup_psa()` to set up a context
125that will call PSA to store the key and perform the operations.
126
127This function only worked for a small number of ciphers. It is now deprecated
128and it is recommended to use `psa_cipher_xxx()` or `psa_aead_xxx()` functions
129directly instead.
130
131**Warning:** This function will be removed in a future version of Mbed TLS. If
132you are using it and would like us to keep it, please let us know about your
133use case.
134
135Internal changes
136----------------
137
138All of these internal changes are active as soon as `MBEDTLS_USE_PSA_CRYPTO`
139is enabled, no change required on the application side.
140
141### TLS: most crypto operations based on PSA
142
143Current exceptions:
144
145- Finite-field (non-EC) Diffie-Hellman (used in key exchanges: DHE-RSA,
146  DHE-PSK).
147- Restartable operations when `MBEDTLS_ECP_RESTARTABLE` is also enabled (see
148  the documentation of that option).
149
150Other than the above exceptions, all crypto operations are based on PSA when
151`MBEDTLS_USE_PSA_CRYPTO` is enabled.
152
153### X.509: most crypto operations based on PSA
154
155Current exceptions:
156
157- Restartable operations when `MBEDTLS_ECP_RESTARTABLE` is also enabled (see
158  the documentation of that option).
159
160Other than the above exception, all crypto operations are based on PSA when
161`MBEDTLS_USE_PSA_CRYPTO` is enabled.
162
163### PK layer: most crypto operations based on PSA
164
165Current exceptions:
166
167- Verification of RSA-PSS signatures with an MGF hash that's different from
168  the message hash.
169- Restartable operations when `MBEDTLS_ECP_RESTARTABLE` is also enabled (see
170  the documentation of that option).
171
172Other than the above exceptions, all crypto operations are based on PSA when
173`MBEDTLS_USE_PSA_CRYPTO` is enabled.
174
175