blob: 3df07723a2e850d0311a756f3454857dc04d7c24 [file] [log] [blame]
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001/* Automatically generated by generate_psa_wrappers.py, do not edit! */
2
3/* Copyright The Mbed TLS Contributors
4 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
5 */
6
7#include <mbedtls/build_info.h>
8
Gilles Peskine4411c9c2024-01-04 20:51:38 +01009#if defined(MBEDTLS_PSA_CRYPTO_C) && defined(MBEDTLS_TEST_HOOKS) && \
10 !defined(RECORD_PSA_STATUS_COVERAGE_LOG)
Gilles Peskine6e4332c2024-01-04 16:42:40 +010011
12#include <psa/crypto.h>
Gilles Peskine90d14d72024-01-04 16:59:28 +010013#include <test/memory.h>
Gilles Peskine6e4332c2024-01-04 16:42:40 +010014#include <test/psa_crypto_helpers.h>
15#include <test/psa_test_wrappers.h>
16
17/* Wrapper for mbedtls_psa_inject_entropy */
18#if defined(MBEDTLS_PSA_INJECT_ENTROPY)
19psa_status_t mbedtls_test_wrap_mbedtls_psa_inject_entropy(
20 const uint8_t *arg0_seed,
21 size_t arg1_seed_size)
22{
23 psa_status_t status = (mbedtls_psa_inject_entropy)(arg0_seed, arg1_seed_size);
24 return status;
25}
26#endif /* defined(MBEDTLS_PSA_INJECT_ENTROPY) */
27
28/* Wrapper for mbedtls_psa_platform_get_builtin_key */
29#if defined(MBEDTLS_PSA_CRYPTO_BUILTIN_KEYS)
30psa_status_t mbedtls_test_wrap_mbedtls_psa_platform_get_builtin_key(
31 mbedtls_svc_key_id_t arg0_key_id,
32 psa_key_lifetime_t *arg1_lifetime,
33 psa_drv_slot_number_t *arg2_slot_number)
34{
35 psa_status_t status = (mbedtls_psa_platform_get_builtin_key)(arg0_key_id, arg1_lifetime, arg2_slot_number);
36 return status;
37}
38#endif /* defined(MBEDTLS_PSA_CRYPTO_BUILTIN_KEYS) */
39
40/* Wrapper for mbedtls_psa_register_se_key */
41#if defined(MBEDTLS_PSA_CRYPTO_SE_C)
42psa_status_t mbedtls_test_wrap_mbedtls_psa_register_se_key(
43 const psa_key_attributes_t *arg0_attributes)
44{
45 psa_status_t status = (mbedtls_psa_register_se_key)(arg0_attributes);
46 return status;
47}
48#endif /* defined(MBEDTLS_PSA_CRYPTO_SE_C) */
49
50/* Wrapper for psa_aead_abort */
51psa_status_t mbedtls_test_wrap_psa_aead_abort(
52 psa_aead_operation_t *arg0_operation)
53{
54 psa_status_t status = (psa_aead_abort)(arg0_operation);
55 return status;
56}
57
58/* Wrapper for psa_aead_decrypt */
59psa_status_t mbedtls_test_wrap_psa_aead_decrypt(
60 mbedtls_svc_key_id_t arg0_key,
61 psa_algorithm_t arg1_alg,
62 const uint8_t *arg2_nonce,
63 size_t arg3_nonce_length,
64 const uint8_t *arg4_additional_data,
65 size_t arg5_additional_data_length,
66 const uint8_t *arg6_ciphertext,
67 size_t arg7_ciphertext_length,
68 uint8_t *arg8_plaintext,
69 size_t arg9_plaintext_size,
70 size_t *arg10_plaintext_length)
71{
David Horstmann0a8abde2024-03-13 15:57:46 +000072#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
David Horstmann86e6fe02024-01-22 14:36:01 +000073 MBEDTLS_TEST_MEMORY_POISON(arg2_nonce, arg3_nonce_length);
74 MBEDTLS_TEST_MEMORY_POISON(arg4_additional_data, arg5_additional_data_length);
75 MBEDTLS_TEST_MEMORY_POISON(arg6_ciphertext, arg7_ciphertext_length);
76 MBEDTLS_TEST_MEMORY_POISON(arg8_plaintext, arg9_plaintext_size);
David Horstmann0a8abde2024-03-13 15:57:46 +000077#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +010078 psa_status_t status = (psa_aead_decrypt)(arg0_key, arg1_alg, arg2_nonce, arg3_nonce_length, arg4_additional_data, arg5_additional_data_length, arg6_ciphertext, arg7_ciphertext_length, arg8_plaintext, arg9_plaintext_size, arg10_plaintext_length);
David Horstmann0a8abde2024-03-13 15:57:46 +000079#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
David Horstmann86e6fe02024-01-22 14:36:01 +000080 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_nonce, arg3_nonce_length);
81 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_additional_data, arg5_additional_data_length);
82 MBEDTLS_TEST_MEMORY_UNPOISON(arg6_ciphertext, arg7_ciphertext_length);
83 MBEDTLS_TEST_MEMORY_UNPOISON(arg8_plaintext, arg9_plaintext_size);
David Horstmann0a8abde2024-03-13 15:57:46 +000084#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +010085 return status;
86}
87
88/* Wrapper for psa_aead_decrypt_setup */
89psa_status_t mbedtls_test_wrap_psa_aead_decrypt_setup(
90 psa_aead_operation_t *arg0_operation,
91 mbedtls_svc_key_id_t arg1_key,
92 psa_algorithm_t arg2_alg)
93{
94 psa_status_t status = (psa_aead_decrypt_setup)(arg0_operation, arg1_key, arg2_alg);
95 return status;
96}
97
98/* Wrapper for psa_aead_encrypt */
99psa_status_t mbedtls_test_wrap_psa_aead_encrypt(
100 mbedtls_svc_key_id_t arg0_key,
101 psa_algorithm_t arg1_alg,
102 const uint8_t *arg2_nonce,
103 size_t arg3_nonce_length,
104 const uint8_t *arg4_additional_data,
105 size_t arg5_additional_data_length,
106 const uint8_t *arg6_plaintext,
107 size_t arg7_plaintext_length,
108 uint8_t *arg8_ciphertext,
109 size_t arg9_ciphertext_size,
110 size_t *arg10_ciphertext_length)
111{
David Horstmann0a8abde2024-03-13 15:57:46 +0000112#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
David Horstmann86e6fe02024-01-22 14:36:01 +0000113 MBEDTLS_TEST_MEMORY_POISON(arg2_nonce, arg3_nonce_length);
114 MBEDTLS_TEST_MEMORY_POISON(arg4_additional_data, arg5_additional_data_length);
115 MBEDTLS_TEST_MEMORY_POISON(arg6_plaintext, arg7_plaintext_length);
116 MBEDTLS_TEST_MEMORY_POISON(arg8_ciphertext, arg9_ciphertext_size);
David Horstmann0a8abde2024-03-13 15:57:46 +0000117#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100118 psa_status_t status = (psa_aead_encrypt)(arg0_key, arg1_alg, arg2_nonce, arg3_nonce_length, arg4_additional_data, arg5_additional_data_length, arg6_plaintext, arg7_plaintext_length, arg8_ciphertext, arg9_ciphertext_size, arg10_ciphertext_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000119#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
David Horstmann86e6fe02024-01-22 14:36:01 +0000120 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_nonce, arg3_nonce_length);
121 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_additional_data, arg5_additional_data_length);
122 MBEDTLS_TEST_MEMORY_UNPOISON(arg6_plaintext, arg7_plaintext_length);
123 MBEDTLS_TEST_MEMORY_UNPOISON(arg8_ciphertext, arg9_ciphertext_size);
David Horstmann0a8abde2024-03-13 15:57:46 +0000124#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100125 return status;
126}
127
128/* Wrapper for psa_aead_encrypt_setup */
129psa_status_t mbedtls_test_wrap_psa_aead_encrypt_setup(
130 psa_aead_operation_t *arg0_operation,
131 mbedtls_svc_key_id_t arg1_key,
132 psa_algorithm_t arg2_alg)
133{
134 psa_status_t status = (psa_aead_encrypt_setup)(arg0_operation, arg1_key, arg2_alg);
135 return status;
136}
137
138/* Wrapper for psa_aead_finish */
139psa_status_t mbedtls_test_wrap_psa_aead_finish(
140 psa_aead_operation_t *arg0_operation,
141 uint8_t *arg1_ciphertext,
142 size_t arg2_ciphertext_size,
143 size_t *arg3_ciphertext_length,
144 uint8_t *arg4_tag,
145 size_t arg5_tag_size,
146 size_t *arg6_tag_length)
147{
David Horstmann0a8abde2024-03-13 15:57:46 +0000148#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
David Horstmann86e6fe02024-01-22 14:36:01 +0000149 MBEDTLS_TEST_MEMORY_POISON(arg1_ciphertext, arg2_ciphertext_size);
150 MBEDTLS_TEST_MEMORY_POISON(arg4_tag, arg5_tag_size);
David Horstmann0a8abde2024-03-13 15:57:46 +0000151#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100152 psa_status_t status = (psa_aead_finish)(arg0_operation, arg1_ciphertext, arg2_ciphertext_size, arg3_ciphertext_length, arg4_tag, arg5_tag_size, arg6_tag_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000153#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
David Horstmann86e6fe02024-01-22 14:36:01 +0000154 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_ciphertext, arg2_ciphertext_size);
155 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_tag, arg5_tag_size);
David Horstmann0a8abde2024-03-13 15:57:46 +0000156#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100157 return status;
158}
159
160/* Wrapper for psa_aead_generate_nonce */
161psa_status_t mbedtls_test_wrap_psa_aead_generate_nonce(
162 psa_aead_operation_t *arg0_operation,
163 uint8_t *arg1_nonce,
164 size_t arg2_nonce_size,
165 size_t *arg3_nonce_length)
166{
David Horstmann0a8abde2024-03-13 15:57:46 +0000167#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
David Horstmann86e6fe02024-01-22 14:36:01 +0000168 MBEDTLS_TEST_MEMORY_POISON(arg1_nonce, arg2_nonce_size);
David Horstmann0a8abde2024-03-13 15:57:46 +0000169#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100170 psa_status_t status = (psa_aead_generate_nonce)(arg0_operation, arg1_nonce, arg2_nonce_size, arg3_nonce_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000171#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
David Horstmann86e6fe02024-01-22 14:36:01 +0000172 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_nonce, arg2_nonce_size);
David Horstmann0a8abde2024-03-13 15:57:46 +0000173#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100174 return status;
175}
176
177/* Wrapper for psa_aead_set_lengths */
178psa_status_t mbedtls_test_wrap_psa_aead_set_lengths(
179 psa_aead_operation_t *arg0_operation,
180 size_t arg1_ad_length,
181 size_t arg2_plaintext_length)
182{
183 psa_status_t status = (psa_aead_set_lengths)(arg0_operation, arg1_ad_length, arg2_plaintext_length);
184 return status;
185}
186
187/* Wrapper for psa_aead_set_nonce */
188psa_status_t mbedtls_test_wrap_psa_aead_set_nonce(
189 psa_aead_operation_t *arg0_operation,
190 const uint8_t *arg1_nonce,
191 size_t arg2_nonce_length)
192{
David Horstmann0a8abde2024-03-13 15:57:46 +0000193#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
David Horstmann86e6fe02024-01-22 14:36:01 +0000194 MBEDTLS_TEST_MEMORY_POISON(arg1_nonce, arg2_nonce_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000195#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100196 psa_status_t status = (psa_aead_set_nonce)(arg0_operation, arg1_nonce, arg2_nonce_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000197#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
David Horstmann86e6fe02024-01-22 14:36:01 +0000198 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_nonce, arg2_nonce_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000199#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100200 return status;
201}
202
203/* Wrapper for psa_aead_update */
204psa_status_t mbedtls_test_wrap_psa_aead_update(
205 psa_aead_operation_t *arg0_operation,
206 const uint8_t *arg1_input,
207 size_t arg2_input_length,
208 uint8_t *arg3_output,
209 size_t arg4_output_size,
210 size_t *arg5_output_length)
211{
David Horstmann0a8abde2024-03-13 15:57:46 +0000212#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
David Horstmann86e6fe02024-01-22 14:36:01 +0000213 MBEDTLS_TEST_MEMORY_POISON(arg1_input, arg2_input_length);
214 MBEDTLS_TEST_MEMORY_POISON(arg3_output, arg4_output_size);
David Horstmann0a8abde2024-03-13 15:57:46 +0000215#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100216 psa_status_t status = (psa_aead_update)(arg0_operation, arg1_input, arg2_input_length, arg3_output, arg4_output_size, arg5_output_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000217#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
David Horstmann86e6fe02024-01-22 14:36:01 +0000218 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_input, arg2_input_length);
219 MBEDTLS_TEST_MEMORY_UNPOISON(arg3_output, arg4_output_size);
David Horstmann0a8abde2024-03-13 15:57:46 +0000220#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100221 return status;
222}
223
224/* Wrapper for psa_aead_update_ad */
225psa_status_t mbedtls_test_wrap_psa_aead_update_ad(
226 psa_aead_operation_t *arg0_operation,
227 const uint8_t *arg1_input,
228 size_t arg2_input_length)
229{
David Horstmann0a8abde2024-03-13 15:57:46 +0000230#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
David Horstmann86e6fe02024-01-22 14:36:01 +0000231 MBEDTLS_TEST_MEMORY_POISON(arg1_input, arg2_input_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000232#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100233 psa_status_t status = (psa_aead_update_ad)(arg0_operation, arg1_input, arg2_input_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000234#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
David Horstmann86e6fe02024-01-22 14:36:01 +0000235 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_input, arg2_input_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000236#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100237 return status;
238}
239
240/* Wrapper for psa_aead_verify */
241psa_status_t mbedtls_test_wrap_psa_aead_verify(
242 psa_aead_operation_t *arg0_operation,
243 uint8_t *arg1_plaintext,
244 size_t arg2_plaintext_size,
245 size_t *arg3_plaintext_length,
246 const uint8_t *arg4_tag,
247 size_t arg5_tag_length)
248{
David Horstmann0a8abde2024-03-13 15:57:46 +0000249#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
David Horstmann86e6fe02024-01-22 14:36:01 +0000250 MBEDTLS_TEST_MEMORY_POISON(arg1_plaintext, arg2_plaintext_size);
251 MBEDTLS_TEST_MEMORY_POISON(arg4_tag, arg5_tag_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000252#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100253 psa_status_t status = (psa_aead_verify)(arg0_operation, arg1_plaintext, arg2_plaintext_size, arg3_plaintext_length, arg4_tag, arg5_tag_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000254#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
David Horstmann86e6fe02024-01-22 14:36:01 +0000255 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_plaintext, arg2_plaintext_size);
256 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_tag, arg5_tag_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000257#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100258 return status;
259}
260
261/* Wrapper for psa_asymmetric_decrypt */
262psa_status_t mbedtls_test_wrap_psa_asymmetric_decrypt(
263 mbedtls_svc_key_id_t arg0_key,
264 psa_algorithm_t arg1_alg,
265 const uint8_t *arg2_input,
266 size_t arg3_input_length,
267 const uint8_t *arg4_salt,
268 size_t arg5_salt_length,
269 uint8_t *arg6_output,
270 size_t arg7_output_size,
271 size_t *arg8_output_length)
272{
David Horstmann0a8abde2024-03-13 15:57:46 +0000273#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Thomas Daubney54e6b412024-01-31 16:56:17 +0000274 MBEDTLS_TEST_MEMORY_POISON(arg2_input, arg3_input_length);
275 MBEDTLS_TEST_MEMORY_POISON(arg4_salt, arg5_salt_length);
276 MBEDTLS_TEST_MEMORY_POISON(arg6_output, arg7_output_size);
David Horstmann0a8abde2024-03-13 15:57:46 +0000277#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100278 psa_status_t status = (psa_asymmetric_decrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_salt, arg5_salt_length, arg6_output, arg7_output_size, arg8_output_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000279#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Thomas Daubney54e6b412024-01-31 16:56:17 +0000280 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_input, arg3_input_length);
281 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_salt, arg5_salt_length);
282 MBEDTLS_TEST_MEMORY_UNPOISON(arg6_output, arg7_output_size);
David Horstmann0a8abde2024-03-13 15:57:46 +0000283#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100284 return status;
285}
286
287/* Wrapper for psa_asymmetric_encrypt */
288psa_status_t mbedtls_test_wrap_psa_asymmetric_encrypt(
289 mbedtls_svc_key_id_t arg0_key,
290 psa_algorithm_t arg1_alg,
291 const uint8_t *arg2_input,
292 size_t arg3_input_length,
293 const uint8_t *arg4_salt,
294 size_t arg5_salt_length,
295 uint8_t *arg6_output,
296 size_t arg7_output_size,
297 size_t *arg8_output_length)
298{
David Horstmann0a8abde2024-03-13 15:57:46 +0000299#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Thomas Daubney27b48a32024-01-30 14:04:47 +0000300 MBEDTLS_TEST_MEMORY_POISON(arg2_input, arg3_input_length);
301 MBEDTLS_TEST_MEMORY_POISON(arg4_salt, arg5_salt_length);
302 MBEDTLS_TEST_MEMORY_POISON(arg6_output, arg7_output_size);
David Horstmann0a8abde2024-03-13 15:57:46 +0000303#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100304 psa_status_t status = (psa_asymmetric_encrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_salt, arg5_salt_length, arg6_output, arg7_output_size, arg8_output_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000305#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Thomas Daubney27b48a32024-01-30 14:04:47 +0000306 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_input, arg3_input_length);
307 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_salt, arg5_salt_length);
308 MBEDTLS_TEST_MEMORY_UNPOISON(arg6_output, arg7_output_size);
David Horstmann0a8abde2024-03-13 15:57:46 +0000309#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100310 return status;
311}
312
313/* Wrapper for psa_cipher_abort */
314psa_status_t mbedtls_test_wrap_psa_cipher_abort(
315 psa_cipher_operation_t *arg0_operation)
316{
317 psa_status_t status = (psa_cipher_abort)(arg0_operation);
318 return status;
319}
320
321/* Wrapper for psa_cipher_decrypt */
322psa_status_t mbedtls_test_wrap_psa_cipher_decrypt(
323 mbedtls_svc_key_id_t arg0_key,
324 psa_algorithm_t arg1_alg,
325 const uint8_t *arg2_input,
326 size_t arg3_input_length,
327 uint8_t *arg4_output,
328 size_t arg5_output_size,
329 size_t *arg6_output_length)
330{
David Horstmann0a8abde2024-03-13 15:57:46 +0000331#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Gabor Mezeib8f97a12024-01-24 16:58:40 +0100332 MBEDTLS_TEST_MEMORY_POISON(arg2_input, arg3_input_length);
333 MBEDTLS_TEST_MEMORY_POISON(arg4_output, arg5_output_size);
David Horstmann0a8abde2024-03-13 15:57:46 +0000334#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100335 psa_status_t status = (psa_cipher_decrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_output, arg5_output_size, arg6_output_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000336#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Gabor Mezeib8f97a12024-01-24 16:58:40 +0100337 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_input, arg3_input_length);
338 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_output, arg5_output_size);
David Horstmann0a8abde2024-03-13 15:57:46 +0000339#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100340 return status;
341}
342
343/* Wrapper for psa_cipher_decrypt_setup */
344psa_status_t mbedtls_test_wrap_psa_cipher_decrypt_setup(
345 psa_cipher_operation_t *arg0_operation,
346 mbedtls_svc_key_id_t arg1_key,
347 psa_algorithm_t arg2_alg)
348{
349 psa_status_t status = (psa_cipher_decrypt_setup)(arg0_operation, arg1_key, arg2_alg);
350 return status;
351}
352
353/* Wrapper for psa_cipher_encrypt */
354psa_status_t mbedtls_test_wrap_psa_cipher_encrypt(
355 mbedtls_svc_key_id_t arg0_key,
356 psa_algorithm_t arg1_alg,
357 const uint8_t *arg2_input,
358 size_t arg3_input_length,
359 uint8_t *arg4_output,
360 size_t arg5_output_size,
361 size_t *arg6_output_length)
362{
David Horstmann0a8abde2024-03-13 15:57:46 +0000363#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Gilles Peskine90d14d72024-01-04 16:59:28 +0100364 MBEDTLS_TEST_MEMORY_POISON(arg2_input, arg3_input_length);
365 MBEDTLS_TEST_MEMORY_POISON(arg4_output, arg5_output_size);
David Horstmann0a8abde2024-03-13 15:57:46 +0000366#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100367 psa_status_t status = (psa_cipher_encrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_output, arg5_output_size, arg6_output_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000368#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Gilles Peskine90d14d72024-01-04 16:59:28 +0100369 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_input, arg3_input_length);
370 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_output, arg5_output_size);
David Horstmann0a8abde2024-03-13 15:57:46 +0000371#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100372 return status;
373}
374
375/* Wrapper for psa_cipher_encrypt_setup */
376psa_status_t mbedtls_test_wrap_psa_cipher_encrypt_setup(
377 psa_cipher_operation_t *arg0_operation,
378 mbedtls_svc_key_id_t arg1_key,
379 psa_algorithm_t arg2_alg)
380{
381 psa_status_t status = (psa_cipher_encrypt_setup)(arg0_operation, arg1_key, arg2_alg);
382 return status;
383}
384
385/* Wrapper for psa_cipher_finish */
386psa_status_t mbedtls_test_wrap_psa_cipher_finish(
387 psa_cipher_operation_t *arg0_operation,
388 uint8_t *arg1_output,
389 size_t arg2_output_size,
390 size_t *arg3_output_length)
391{
David Horstmann0a8abde2024-03-13 15:57:46 +0000392#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Gabor Mezeib8f97a12024-01-24 16:58:40 +0100393 MBEDTLS_TEST_MEMORY_POISON(arg1_output, arg2_output_size);
David Horstmann0a8abde2024-03-13 15:57:46 +0000394#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100395 psa_status_t status = (psa_cipher_finish)(arg0_operation, arg1_output, arg2_output_size, arg3_output_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000396#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Gabor Mezeib8f97a12024-01-24 16:58:40 +0100397 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_output, arg2_output_size);
David Horstmann0a8abde2024-03-13 15:57:46 +0000398#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100399 return status;
400}
401
402/* Wrapper for psa_cipher_generate_iv */
403psa_status_t mbedtls_test_wrap_psa_cipher_generate_iv(
404 psa_cipher_operation_t *arg0_operation,
405 uint8_t *arg1_iv,
406 size_t arg2_iv_size,
407 size_t *arg3_iv_length)
408{
David Horstmann0a8abde2024-03-13 15:57:46 +0000409#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Gabor Mezeib74ac662024-02-01 10:39:56 +0100410 MBEDTLS_TEST_MEMORY_POISON(arg1_iv, arg2_iv_size);
David Horstmann0a8abde2024-03-13 15:57:46 +0000411#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100412 psa_status_t status = (psa_cipher_generate_iv)(arg0_operation, arg1_iv, arg2_iv_size, arg3_iv_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000413#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Gabor Mezeib74ac662024-02-01 10:39:56 +0100414 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_iv, arg2_iv_size);
David Horstmann0a8abde2024-03-13 15:57:46 +0000415#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100416 return status;
417}
418
419/* Wrapper for psa_cipher_set_iv */
420psa_status_t mbedtls_test_wrap_psa_cipher_set_iv(
421 psa_cipher_operation_t *arg0_operation,
422 const uint8_t *arg1_iv,
423 size_t arg2_iv_length)
424{
David Horstmann0a8abde2024-03-13 15:57:46 +0000425#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Gabor Mezeib74ac662024-02-01 10:39:56 +0100426 MBEDTLS_TEST_MEMORY_POISON(arg1_iv, arg2_iv_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000427#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100428 psa_status_t status = (psa_cipher_set_iv)(arg0_operation, arg1_iv, arg2_iv_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000429#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Gabor Mezeib74ac662024-02-01 10:39:56 +0100430 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_iv, arg2_iv_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000431#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100432 return status;
433}
434
435/* Wrapper for psa_cipher_update */
436psa_status_t mbedtls_test_wrap_psa_cipher_update(
437 psa_cipher_operation_t *arg0_operation,
438 const uint8_t *arg1_input,
439 size_t arg2_input_length,
440 uint8_t *arg3_output,
441 size_t arg4_output_size,
442 size_t *arg5_output_length)
443{
David Horstmann0a8abde2024-03-13 15:57:46 +0000444#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Gabor Mezeib8f97a12024-01-24 16:58:40 +0100445 MBEDTLS_TEST_MEMORY_POISON(arg1_input, arg2_input_length);
446 MBEDTLS_TEST_MEMORY_POISON(arg3_output, arg4_output_size);
David Horstmann0a8abde2024-03-13 15:57:46 +0000447#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100448 psa_status_t status = (psa_cipher_update)(arg0_operation, arg1_input, arg2_input_length, arg3_output, arg4_output_size, arg5_output_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000449#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Gabor Mezeib8f97a12024-01-24 16:58:40 +0100450 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_input, arg2_input_length);
451 MBEDTLS_TEST_MEMORY_UNPOISON(arg3_output, arg4_output_size);
David Horstmann0a8abde2024-03-13 15:57:46 +0000452#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100453 return status;
454}
455
456/* Wrapper for psa_copy_key */
457psa_status_t mbedtls_test_wrap_psa_copy_key(
458 mbedtls_svc_key_id_t arg0_source_key,
459 const psa_key_attributes_t *arg1_attributes,
460 mbedtls_svc_key_id_t *arg2_target_key)
461{
462 psa_status_t status = (psa_copy_key)(arg0_source_key, arg1_attributes, arg2_target_key);
463 return status;
464}
465
466/* Wrapper for psa_crypto_driver_pake_get_cipher_suite */
Ronald Cron7062d3d2024-05-24 10:28:15 +0200467#if defined(PSA_WANT_ALG_SOME_PAKE)
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100468psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_cipher_suite(
469 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
470 psa_pake_cipher_suite_t *arg1_cipher_suite)
471{
472 psa_status_t status = (psa_crypto_driver_pake_get_cipher_suite)(arg0_inputs, arg1_cipher_suite);
473 return status;
474}
Ronald Cron7062d3d2024-05-24 10:28:15 +0200475#endif /* defined(PSA_WANT_ALG_SOME_PAKE) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100476
477/* Wrapper for psa_crypto_driver_pake_get_password */
Ronald Cron7062d3d2024-05-24 10:28:15 +0200478#if defined(PSA_WANT_ALG_SOME_PAKE)
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100479psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_password(
480 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
481 uint8_t *arg1_buffer,
482 size_t arg2_buffer_size,
483 size_t *arg3_buffer_length)
484{
485 psa_status_t status = (psa_crypto_driver_pake_get_password)(arg0_inputs, arg1_buffer, arg2_buffer_size, arg3_buffer_length);
486 return status;
487}
Ronald Cron7062d3d2024-05-24 10:28:15 +0200488#endif /* defined(PSA_WANT_ALG_SOME_PAKE) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100489
490/* Wrapper for psa_crypto_driver_pake_get_password_len */
Ronald Cron7062d3d2024-05-24 10:28:15 +0200491#if defined(PSA_WANT_ALG_SOME_PAKE)
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100492psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_password_len(
493 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
494 size_t *arg1_password_len)
495{
496 psa_status_t status = (psa_crypto_driver_pake_get_password_len)(arg0_inputs, arg1_password_len);
497 return status;
498}
Ronald Cron7062d3d2024-05-24 10:28:15 +0200499#endif /* defined(PSA_WANT_ALG_SOME_PAKE) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100500
501/* Wrapper for psa_crypto_driver_pake_get_peer */
Ronald Cron7062d3d2024-05-24 10:28:15 +0200502#if defined(PSA_WANT_ALG_SOME_PAKE)
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100503psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_peer(
504 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
505 uint8_t *arg1_peer_id,
506 size_t arg2_peer_id_size,
507 size_t *arg3_peer_id_length)
508{
509 psa_status_t status = (psa_crypto_driver_pake_get_peer)(arg0_inputs, arg1_peer_id, arg2_peer_id_size, arg3_peer_id_length);
510 return status;
511}
Ronald Cron7062d3d2024-05-24 10:28:15 +0200512#endif /* defined(PSA_WANT_ALG_SOME_PAKE) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100513
514/* Wrapper for psa_crypto_driver_pake_get_peer_len */
Ronald Cron7062d3d2024-05-24 10:28:15 +0200515#if defined(PSA_WANT_ALG_SOME_PAKE)
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100516psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_peer_len(
517 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
518 size_t *arg1_peer_len)
519{
520 psa_status_t status = (psa_crypto_driver_pake_get_peer_len)(arg0_inputs, arg1_peer_len);
521 return status;
522}
Ronald Cron7062d3d2024-05-24 10:28:15 +0200523#endif /* defined(PSA_WANT_ALG_SOME_PAKE) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100524
525/* Wrapper for psa_crypto_driver_pake_get_user */
Ronald Cron7062d3d2024-05-24 10:28:15 +0200526#if defined(PSA_WANT_ALG_SOME_PAKE)
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100527psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_user(
528 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
529 uint8_t *arg1_user_id,
530 size_t arg2_user_id_size,
531 size_t *arg3_user_id_len)
532{
533 psa_status_t status = (psa_crypto_driver_pake_get_user)(arg0_inputs, arg1_user_id, arg2_user_id_size, arg3_user_id_len);
534 return status;
535}
Ronald Cron7062d3d2024-05-24 10:28:15 +0200536#endif /* defined(PSA_WANT_ALG_SOME_PAKE) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100537
538/* Wrapper for psa_crypto_driver_pake_get_user_len */
Ronald Cron7062d3d2024-05-24 10:28:15 +0200539#if defined(PSA_WANT_ALG_SOME_PAKE)
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100540psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_user_len(
541 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
542 size_t *arg1_user_len)
543{
544 psa_status_t status = (psa_crypto_driver_pake_get_user_len)(arg0_inputs, arg1_user_len);
545 return status;
546}
Ronald Cron7062d3d2024-05-24 10:28:15 +0200547#endif /* defined(PSA_WANT_ALG_SOME_PAKE) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100548
549/* Wrapper for psa_crypto_init */
550psa_status_t mbedtls_test_wrap_psa_crypto_init(void)
551{
552 psa_status_t status = (psa_crypto_init)();
553 return status;
554}
555
556/* Wrapper for psa_destroy_key */
557psa_status_t mbedtls_test_wrap_psa_destroy_key(
558 mbedtls_svc_key_id_t arg0_key)
559{
560 psa_status_t status = (psa_destroy_key)(arg0_key);
561 return status;
562}
563
564/* Wrapper for psa_export_key */
565psa_status_t mbedtls_test_wrap_psa_export_key(
566 mbedtls_svc_key_id_t arg0_key,
567 uint8_t *arg1_data,
568 size_t arg2_data_size,
569 size_t *arg3_data_length)
570{
David Horstmann0a8abde2024-03-13 15:57:46 +0000571#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Ryan Everett77b91e32024-01-25 10:58:06 +0000572 MBEDTLS_TEST_MEMORY_POISON(arg1_data, arg2_data_size);
David Horstmann0a8abde2024-03-13 15:57:46 +0000573#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100574 psa_status_t status = (psa_export_key)(arg0_key, arg1_data, arg2_data_size, arg3_data_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000575#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Ryan Everett77b91e32024-01-25 10:58:06 +0000576 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_data, arg2_data_size);
David Horstmann0a8abde2024-03-13 15:57:46 +0000577#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100578 return status;
579}
580
581/* Wrapper for psa_export_public_key */
582psa_status_t mbedtls_test_wrap_psa_export_public_key(
583 mbedtls_svc_key_id_t arg0_key,
584 uint8_t *arg1_data,
585 size_t arg2_data_size,
586 size_t *arg3_data_length)
587{
David Horstmann0a8abde2024-03-13 15:57:46 +0000588#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Ryan Everett77b91e32024-01-25 10:58:06 +0000589 MBEDTLS_TEST_MEMORY_POISON(arg1_data, arg2_data_size);
David Horstmann0a8abde2024-03-13 15:57:46 +0000590#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100591 psa_status_t status = (psa_export_public_key)(arg0_key, arg1_data, arg2_data_size, arg3_data_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000592#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Ryan Everett77b91e32024-01-25 10:58:06 +0000593 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_data, arg2_data_size);
David Horstmann0a8abde2024-03-13 15:57:46 +0000594#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100595 return status;
596}
597
Waleed Elmelegyfad77f12024-11-15 17:27:36 +0000598/* Wrapper for psa_export_public_key_iop_abort */
599psa_status_t mbedtls_test_wrap_psa_export_public_key_iop_abort(
600 psa_export_public_key_iop_t *arg0_operation)
601{
602 psa_status_t status = (psa_export_public_key_iop_abort)(arg0_operation);
603 return status;
604}
605
606/* Wrapper for psa_export_public_key_iop_complete */
607psa_status_t mbedtls_test_wrap_psa_export_public_key_iop_complete(
608 psa_export_public_key_iop_t *arg0_operation,
609 uint8_t *arg1_data,
610 size_t arg2_data_size,
611 size_t *arg3_data_length)
612{
613#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
614 MBEDTLS_TEST_MEMORY_POISON(arg1_data, arg2_data_size);
615#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
616 psa_status_t status = (psa_export_public_key_iop_complete)(arg0_operation, arg1_data, arg2_data_size, arg3_data_length);
617#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
618 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_data, arg2_data_size);
619#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
620 return status;
621}
622
623/* Wrapper for psa_export_public_key_iop_setup */
624psa_status_t mbedtls_test_wrap_psa_export_public_key_iop_setup(
625 psa_export_public_key_iop_t *arg0_operation,
Waleed Elmelegyb30233f2024-11-20 15:41:08 +0000626 mbedtls_svc_key_id_t arg1_key)
Waleed Elmelegyfad77f12024-11-15 17:27:36 +0000627{
628 psa_status_t status = (psa_export_public_key_iop_setup)(arg0_operation, arg1_key);
629 return status;
630}
631
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100632/* Wrapper for psa_generate_key */
633psa_status_t mbedtls_test_wrap_psa_generate_key(
634 const psa_key_attributes_t *arg0_attributes,
635 mbedtls_svc_key_id_t *arg1_key)
636{
637 psa_status_t status = (psa_generate_key)(arg0_attributes, arg1_key);
638 return status;
639}
640
Gilles Peskineb45af2f2024-06-07 08:29:44 +0200641/* Wrapper for psa_generate_key_custom */
642psa_status_t mbedtls_test_wrap_psa_generate_key_custom(
643 const psa_key_attributes_t *arg0_attributes,
644 const psa_custom_key_parameters_t *arg1_custom,
645 const uint8_t *arg2_custom_data,
646 size_t arg3_custom_data_length,
647 mbedtls_svc_key_id_t *arg4_key)
648{
649#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
650 MBEDTLS_TEST_MEMORY_POISON(arg2_custom_data, arg3_custom_data_length);
651#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
652 psa_status_t status = (psa_generate_key_custom)(arg0_attributes, arg1_custom, arg2_custom_data, arg3_custom_data_length, arg4_key);
653#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
654 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_custom_data, arg3_custom_data_length);
655#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
656 return status;
657}
658
Paul Elliott2dc5fa32024-07-19 17:32:42 +0100659/* Wrapper for psa_generate_key_iop_abort */
660psa_status_t mbedtls_test_wrap_psa_generate_key_iop_abort(
661 psa_generate_key_iop_t *arg0_operation)
662{
663 psa_status_t status = (psa_generate_key_iop_abort)(arg0_operation);
664 return status;
665}
666
667/* Wrapper for psa_generate_key_iop_complete */
668psa_status_t mbedtls_test_wrap_psa_generate_key_iop_complete(
669 psa_generate_key_iop_t *arg0_operation,
Paul Elliottd118cd22024-11-14 12:49:20 +0000670 mbedtls_svc_key_id_t *arg1_key)
Paul Elliott2dc5fa32024-07-19 17:32:42 +0100671{
672 psa_status_t status = (psa_generate_key_iop_complete)(arg0_operation, arg1_key);
673 return status;
674}
675
676/* Wrapper for psa_generate_key_iop_setup */
677psa_status_t mbedtls_test_wrap_psa_generate_key_iop_setup(
678 psa_generate_key_iop_t *arg0_operation,
679 const psa_key_attributes_t *arg1_attributes)
680{
681 psa_status_t status = (psa_generate_key_iop_setup)(arg0_operation, arg1_attributes);
682 return status;
683}
684
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100685/* Wrapper for psa_generate_random */
686psa_status_t mbedtls_test_wrap_psa_generate_random(
687 uint8_t *arg0_output,
688 size_t arg1_output_size)
689{
David Horstmann0a8abde2024-03-13 15:57:46 +0000690#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
David Horstmann075c5fb2024-02-06 15:44:08 +0000691 MBEDTLS_TEST_MEMORY_POISON(arg0_output, arg1_output_size);
David Horstmann0a8abde2024-03-13 15:57:46 +0000692#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100693 psa_status_t status = (psa_generate_random)(arg0_output, arg1_output_size);
David Horstmann0a8abde2024-03-13 15:57:46 +0000694#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
David Horstmann075c5fb2024-02-06 15:44:08 +0000695 MBEDTLS_TEST_MEMORY_UNPOISON(arg0_output, arg1_output_size);
David Horstmann0a8abde2024-03-13 15:57:46 +0000696#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100697 return status;
698}
699
700/* Wrapper for psa_get_key_attributes */
701psa_status_t mbedtls_test_wrap_psa_get_key_attributes(
702 mbedtls_svc_key_id_t arg0_key,
703 psa_key_attributes_t *arg1_attributes)
704{
705 psa_status_t status = (psa_get_key_attributes)(arg0_key, arg1_attributes);
706 return status;
707}
708
709/* Wrapper for psa_hash_abort */
710psa_status_t mbedtls_test_wrap_psa_hash_abort(
711 psa_hash_operation_t *arg0_operation)
712{
713 psa_status_t status = (psa_hash_abort)(arg0_operation);
714 return status;
715}
716
717/* Wrapper for psa_hash_clone */
718psa_status_t mbedtls_test_wrap_psa_hash_clone(
719 const psa_hash_operation_t *arg0_source_operation,
720 psa_hash_operation_t *arg1_target_operation)
721{
722 psa_status_t status = (psa_hash_clone)(arg0_source_operation, arg1_target_operation);
723 return status;
724}
725
726/* Wrapper for psa_hash_compare */
727psa_status_t mbedtls_test_wrap_psa_hash_compare(
728 psa_algorithm_t arg0_alg,
729 const uint8_t *arg1_input,
730 size_t arg2_input_length,
731 const uint8_t *arg3_hash,
732 size_t arg4_hash_length)
733{
David Horstmann0a8abde2024-03-13 15:57:46 +0000734#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Thomas Daubney45c85862024-01-25 16:48:09 +0000735 MBEDTLS_TEST_MEMORY_POISON(arg1_input, arg2_input_length);
736 MBEDTLS_TEST_MEMORY_POISON(arg3_hash, arg4_hash_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000737#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100738 psa_status_t status = (psa_hash_compare)(arg0_alg, arg1_input, arg2_input_length, arg3_hash, arg4_hash_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000739#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Thomas Daubney45c85862024-01-25 16:48:09 +0000740 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_input, arg2_input_length);
741 MBEDTLS_TEST_MEMORY_UNPOISON(arg3_hash, arg4_hash_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000742#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100743 return status;
744}
745
746/* Wrapper for psa_hash_compute */
747psa_status_t mbedtls_test_wrap_psa_hash_compute(
748 psa_algorithm_t arg0_alg,
749 const uint8_t *arg1_input,
750 size_t arg2_input_length,
751 uint8_t *arg3_hash,
752 size_t arg4_hash_size,
753 size_t *arg5_hash_length)
754{
David Horstmann0a8abde2024-03-13 15:57:46 +0000755#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Thomas Daubney45c85862024-01-25 16:48:09 +0000756 MBEDTLS_TEST_MEMORY_POISON(arg1_input, arg2_input_length);
757 MBEDTLS_TEST_MEMORY_POISON(arg3_hash, arg4_hash_size);
David Horstmann0a8abde2024-03-13 15:57:46 +0000758#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100759 psa_status_t status = (psa_hash_compute)(arg0_alg, arg1_input, arg2_input_length, arg3_hash, arg4_hash_size, arg5_hash_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000760#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Thomas Daubney45c85862024-01-25 16:48:09 +0000761 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_input, arg2_input_length);
762 MBEDTLS_TEST_MEMORY_UNPOISON(arg3_hash, arg4_hash_size);
David Horstmann0a8abde2024-03-13 15:57:46 +0000763#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100764 return status;
765}
766
767/* Wrapper for psa_hash_finish */
768psa_status_t mbedtls_test_wrap_psa_hash_finish(
769 psa_hash_operation_t *arg0_operation,
770 uint8_t *arg1_hash,
771 size_t arg2_hash_size,
772 size_t *arg3_hash_length)
773{
David Horstmann0a8abde2024-03-13 15:57:46 +0000774#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Thomas Daubney45c85862024-01-25 16:48:09 +0000775 MBEDTLS_TEST_MEMORY_POISON(arg1_hash, arg2_hash_size);
David Horstmann0a8abde2024-03-13 15:57:46 +0000776#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100777 psa_status_t status = (psa_hash_finish)(arg0_operation, arg1_hash, arg2_hash_size, arg3_hash_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000778#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Thomas Daubney45c85862024-01-25 16:48:09 +0000779 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_hash, arg2_hash_size);
David Horstmann0a8abde2024-03-13 15:57:46 +0000780#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100781 return status;
782}
783
784/* Wrapper for psa_hash_setup */
785psa_status_t mbedtls_test_wrap_psa_hash_setup(
786 psa_hash_operation_t *arg0_operation,
787 psa_algorithm_t arg1_alg)
788{
789 psa_status_t status = (psa_hash_setup)(arg0_operation, arg1_alg);
790 return status;
791}
792
793/* Wrapper for psa_hash_update */
794psa_status_t mbedtls_test_wrap_psa_hash_update(
795 psa_hash_operation_t *arg0_operation,
796 const uint8_t *arg1_input,
797 size_t arg2_input_length)
798{
David Horstmann0a8abde2024-03-13 15:57:46 +0000799#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Thomas Daubney45c85862024-01-25 16:48:09 +0000800 MBEDTLS_TEST_MEMORY_POISON(arg1_input, arg2_input_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000801#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100802 psa_status_t status = (psa_hash_update)(arg0_operation, arg1_input, arg2_input_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000803#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Thomas Daubney45c85862024-01-25 16:48:09 +0000804 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_input, arg2_input_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000805#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100806 return status;
807}
808
809/* Wrapper for psa_hash_verify */
810psa_status_t mbedtls_test_wrap_psa_hash_verify(
811 psa_hash_operation_t *arg0_operation,
812 const uint8_t *arg1_hash,
813 size_t arg2_hash_length)
814{
David Horstmann0a8abde2024-03-13 15:57:46 +0000815#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Thomas Daubney45c85862024-01-25 16:48:09 +0000816 MBEDTLS_TEST_MEMORY_POISON(arg1_hash, arg2_hash_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000817#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100818 psa_status_t status = (psa_hash_verify)(arg0_operation, arg1_hash, arg2_hash_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000819#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Thomas Daubney45c85862024-01-25 16:48:09 +0000820 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_hash, arg2_hash_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000821#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100822 return status;
823}
824
825/* Wrapper for psa_import_key */
826psa_status_t mbedtls_test_wrap_psa_import_key(
827 const psa_key_attributes_t *arg0_attributes,
828 const uint8_t *arg1_data,
829 size_t arg2_data_length,
830 mbedtls_svc_key_id_t *arg3_key)
831{
David Horstmann0a8abde2024-03-13 15:57:46 +0000832#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Ryan Everett77b91e32024-01-25 10:58:06 +0000833 MBEDTLS_TEST_MEMORY_POISON(arg1_data, arg2_data_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000834#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100835 psa_status_t status = (psa_import_key)(arg0_attributes, arg1_data, arg2_data_length, arg3_key);
David Horstmann0a8abde2024-03-13 15:57:46 +0000836#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Ryan Everett77b91e32024-01-25 10:58:06 +0000837 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_data, arg2_data_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000838#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100839 return status;
840}
841
Waleed Elmelegybdf2c982024-08-08 21:09:05 +0100842/* Wrapper for psa_key_agreement */
843psa_status_t mbedtls_test_wrap_psa_key_agreement(
844 mbedtls_svc_key_id_t arg0_private_key,
845 const uint8_t *arg1_peer_key,
846 size_t arg2_peer_key_length,
847 psa_algorithm_t arg3_alg,
848 const psa_key_attributes_t *arg4_attributes,
849 mbedtls_svc_key_id_t *arg5_key)
850{
851#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
852 MBEDTLS_TEST_MEMORY_POISON(arg1_peer_key, arg2_peer_key_length);
853#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
854 psa_status_t status = (psa_key_agreement)(arg0_private_key, arg1_peer_key, arg2_peer_key_length, arg3_alg, arg4_attributes, arg5_key);
855#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
856 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_peer_key, arg2_peer_key_length);
857#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
858 return status;
859}
860
Paul Elliottc884b292024-07-19 17:32:42 +0100861/* Wrapper for psa_key_agreement_iop_abort */
862psa_status_t mbedtls_test_wrap_psa_key_agreement_iop_abort(
863 psa_key_agreement_iop_t *arg0_operation)
864{
865 psa_status_t status = (psa_key_agreement_iop_abort)(arg0_operation);
866 return status;
867}
868
869/* Wrapper for psa_key_agreement_iop_complete */
870psa_status_t mbedtls_test_wrap_psa_key_agreement_iop_complete(
871 psa_key_agreement_iop_t *arg0_operation,
Waleed Elmelegya2891a92024-08-06 10:55:09 +0100872 mbedtls_svc_key_id_t *arg1_key)
Paul Elliottc884b292024-07-19 17:32:42 +0100873{
874 psa_status_t status = (psa_key_agreement_iop_complete)(arg0_operation, arg1_key);
875 return status;
876}
877
878/* Wrapper for psa_key_agreement_iop_setup */
879psa_status_t mbedtls_test_wrap_psa_key_agreement_iop_setup(
880 psa_key_agreement_iop_t *arg0_operation,
Waleed Elmelegya2891a92024-08-06 10:55:09 +0100881 mbedtls_svc_key_id_t arg1_private_key,
Paul Elliottc884b292024-07-19 17:32:42 +0100882 const uint8_t *arg2_peer_key,
883 size_t arg3_peer_key_length,
884 psa_algorithm_t arg4_alg,
885 const psa_key_attributes_t *arg5_attributes)
886{
887#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
888 MBEDTLS_TEST_MEMORY_POISON(arg2_peer_key, arg3_peer_key_length);
889#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
890 psa_status_t status = (psa_key_agreement_iop_setup)(arg0_operation, arg1_private_key, arg2_peer_key, arg3_peer_key_length, arg4_alg, arg5_attributes);
891#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
892 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_peer_key, arg3_peer_key_length);
893#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
894 return status;
895}
896
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100897/* Wrapper for psa_key_derivation_abort */
898psa_status_t mbedtls_test_wrap_psa_key_derivation_abort(
899 psa_key_derivation_operation_t *arg0_operation)
900{
901 psa_status_t status = (psa_key_derivation_abort)(arg0_operation);
902 return status;
903}
904
905/* Wrapper for psa_key_derivation_get_capacity */
906psa_status_t mbedtls_test_wrap_psa_key_derivation_get_capacity(
907 const psa_key_derivation_operation_t *arg0_operation,
908 size_t *arg1_capacity)
909{
910 psa_status_t status = (psa_key_derivation_get_capacity)(arg0_operation, arg1_capacity);
911 return status;
912}
913
914/* Wrapper for psa_key_derivation_input_bytes */
915psa_status_t mbedtls_test_wrap_psa_key_derivation_input_bytes(
916 psa_key_derivation_operation_t *arg0_operation,
917 psa_key_derivation_step_t arg1_step,
918 const uint8_t *arg2_data,
919 size_t arg3_data_length)
920{
David Horstmann0a8abde2024-03-13 15:57:46 +0000921#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Ryan Everett198a4d92024-01-25 11:44:56 +0000922 MBEDTLS_TEST_MEMORY_POISON(arg2_data, arg3_data_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000923#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100924 psa_status_t status = (psa_key_derivation_input_bytes)(arg0_operation, arg1_step, arg2_data, arg3_data_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000925#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Ryan Everett198a4d92024-01-25 11:44:56 +0000926 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_data, arg3_data_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000927#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100928 return status;
929}
930
931/* Wrapper for psa_key_derivation_input_integer */
932psa_status_t mbedtls_test_wrap_psa_key_derivation_input_integer(
933 psa_key_derivation_operation_t *arg0_operation,
934 psa_key_derivation_step_t arg1_step,
935 uint64_t arg2_value)
936{
937 psa_status_t status = (psa_key_derivation_input_integer)(arg0_operation, arg1_step, arg2_value);
938 return status;
939}
940
941/* Wrapper for psa_key_derivation_input_key */
942psa_status_t mbedtls_test_wrap_psa_key_derivation_input_key(
943 psa_key_derivation_operation_t *arg0_operation,
944 psa_key_derivation_step_t arg1_step,
945 mbedtls_svc_key_id_t arg2_key)
946{
947 psa_status_t status = (psa_key_derivation_input_key)(arg0_operation, arg1_step, arg2_key);
948 return status;
949}
950
951/* Wrapper for psa_key_derivation_key_agreement */
952psa_status_t mbedtls_test_wrap_psa_key_derivation_key_agreement(
953 psa_key_derivation_operation_t *arg0_operation,
954 psa_key_derivation_step_t arg1_step,
955 mbedtls_svc_key_id_t arg2_private_key,
956 const uint8_t *arg3_peer_key,
957 size_t arg4_peer_key_length)
958{
David Horstmann0a8abde2024-03-13 15:57:46 +0000959#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Thomas Daubneyfe2bda32024-02-15 13:35:06 +0000960 MBEDTLS_TEST_MEMORY_POISON(arg3_peer_key, arg4_peer_key_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000961#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100962 psa_status_t status = (psa_key_derivation_key_agreement)(arg0_operation, arg1_step, arg2_private_key, arg3_peer_key, arg4_peer_key_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000963#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Thomas Daubneyfe2bda32024-02-15 13:35:06 +0000964 MBEDTLS_TEST_MEMORY_UNPOISON(arg3_peer_key, arg4_peer_key_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000965#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100966 return status;
967}
968
969/* Wrapper for psa_key_derivation_output_bytes */
970psa_status_t mbedtls_test_wrap_psa_key_derivation_output_bytes(
971 psa_key_derivation_operation_t *arg0_operation,
972 uint8_t *arg1_output,
973 size_t arg2_output_length)
974{
David Horstmann0a8abde2024-03-13 15:57:46 +0000975#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Ryan Everett198a4d92024-01-25 11:44:56 +0000976 MBEDTLS_TEST_MEMORY_POISON(arg1_output, arg2_output_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000977#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100978 psa_status_t status = (psa_key_derivation_output_bytes)(arg0_operation, arg1_output, arg2_output_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000979#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Ryan Everett198a4d92024-01-25 11:44:56 +0000980 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_output, arg2_output_length);
David Horstmann0a8abde2024-03-13 15:57:46 +0000981#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100982 return status;
983}
984
985/* Wrapper for psa_key_derivation_output_key */
986psa_status_t mbedtls_test_wrap_psa_key_derivation_output_key(
987 const psa_key_attributes_t *arg0_attributes,
988 psa_key_derivation_operation_t *arg1_operation,
989 mbedtls_svc_key_id_t *arg2_key)
990{
991 psa_status_t status = (psa_key_derivation_output_key)(arg0_attributes, arg1_operation, arg2_key);
992 return status;
993}
994
Gilles Peskineb45af2f2024-06-07 08:29:44 +0200995/* Wrapper for psa_key_derivation_output_key_custom */
996psa_status_t mbedtls_test_wrap_psa_key_derivation_output_key_custom(
997 const psa_key_attributes_t *arg0_attributes,
998 psa_key_derivation_operation_t *arg1_operation,
999 const psa_custom_key_parameters_t *arg2_custom,
1000 const uint8_t *arg3_custom_data,
1001 size_t arg4_custom_data_length,
1002 mbedtls_svc_key_id_t *arg5_key)
1003{
1004#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
1005 MBEDTLS_TEST_MEMORY_POISON(arg3_custom_data, arg4_custom_data_length);
1006#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
1007 psa_status_t status = (psa_key_derivation_output_key_custom)(arg0_attributes, arg1_operation, arg2_custom, arg3_custom_data, arg4_custom_data_length, arg5_key);
1008#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
1009 MBEDTLS_TEST_MEMORY_UNPOISON(arg3_custom_data, arg4_custom_data_length);
1010#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
1011 return status;
1012}
1013
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001014/* Wrapper for psa_key_derivation_set_capacity */
1015psa_status_t mbedtls_test_wrap_psa_key_derivation_set_capacity(
1016 psa_key_derivation_operation_t *arg0_operation,
1017 size_t arg1_capacity)
1018{
1019 psa_status_t status = (psa_key_derivation_set_capacity)(arg0_operation, arg1_capacity);
1020 return status;
1021}
1022
1023/* Wrapper for psa_key_derivation_setup */
1024psa_status_t mbedtls_test_wrap_psa_key_derivation_setup(
1025 psa_key_derivation_operation_t *arg0_operation,
1026 psa_algorithm_t arg1_alg)
1027{
1028 psa_status_t status = (psa_key_derivation_setup)(arg0_operation, arg1_alg);
1029 return status;
1030}
1031
1032/* Wrapper for psa_mac_abort */
1033psa_status_t mbedtls_test_wrap_psa_mac_abort(
1034 psa_mac_operation_t *arg0_operation)
1035{
1036 psa_status_t status = (psa_mac_abort)(arg0_operation);
1037 return status;
1038}
1039
1040/* Wrapper for psa_mac_compute */
1041psa_status_t mbedtls_test_wrap_psa_mac_compute(
1042 mbedtls_svc_key_id_t arg0_key,
1043 psa_algorithm_t arg1_alg,
1044 const uint8_t *arg2_input,
1045 size_t arg3_input_length,
1046 uint8_t *arg4_mac,
1047 size_t arg5_mac_size,
1048 size_t *arg6_mac_length)
1049{
David Horstmann0a8abde2024-03-13 15:57:46 +00001050#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Thomas Daubneya1cf1012024-01-30 11:18:54 +00001051 MBEDTLS_TEST_MEMORY_POISON(arg2_input, arg3_input_length);
1052 MBEDTLS_TEST_MEMORY_POISON(arg4_mac, arg5_mac_size);
David Horstmann0a8abde2024-03-13 15:57:46 +00001053#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001054 psa_status_t status = (psa_mac_compute)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_mac, arg5_mac_size, arg6_mac_length);
David Horstmann0a8abde2024-03-13 15:57:46 +00001055#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Thomas Daubneya1cf1012024-01-30 11:18:54 +00001056 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_input, arg3_input_length);
1057 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_mac, arg5_mac_size);
David Horstmann0a8abde2024-03-13 15:57:46 +00001058#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001059 return status;
1060}
1061
1062/* Wrapper for psa_mac_sign_finish */
1063psa_status_t mbedtls_test_wrap_psa_mac_sign_finish(
1064 psa_mac_operation_t *arg0_operation,
1065 uint8_t *arg1_mac,
1066 size_t arg2_mac_size,
1067 size_t *arg3_mac_length)
1068{
David Horstmann0a8abde2024-03-13 15:57:46 +00001069#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Thomas Daubneya1cf1012024-01-30 11:18:54 +00001070 MBEDTLS_TEST_MEMORY_POISON(arg1_mac, arg2_mac_size);
David Horstmann0a8abde2024-03-13 15:57:46 +00001071#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001072 psa_status_t status = (psa_mac_sign_finish)(arg0_operation, arg1_mac, arg2_mac_size, arg3_mac_length);
David Horstmann0a8abde2024-03-13 15:57:46 +00001073#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Thomas Daubneya1cf1012024-01-30 11:18:54 +00001074 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_mac, arg2_mac_size);
David Horstmann0a8abde2024-03-13 15:57:46 +00001075#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001076 return status;
1077}
1078
1079/* Wrapper for psa_mac_sign_setup */
1080psa_status_t mbedtls_test_wrap_psa_mac_sign_setup(
1081 psa_mac_operation_t *arg0_operation,
1082 mbedtls_svc_key_id_t arg1_key,
1083 psa_algorithm_t arg2_alg)
1084{
1085 psa_status_t status = (psa_mac_sign_setup)(arg0_operation, arg1_key, arg2_alg);
1086 return status;
1087}
1088
1089/* Wrapper for psa_mac_update */
1090psa_status_t mbedtls_test_wrap_psa_mac_update(
1091 psa_mac_operation_t *arg0_operation,
1092 const uint8_t *arg1_input,
1093 size_t arg2_input_length)
1094{
David Horstmann0a8abde2024-03-13 15:57:46 +00001095#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Thomas Daubneya1cf1012024-01-30 11:18:54 +00001096 MBEDTLS_TEST_MEMORY_POISON(arg1_input, arg2_input_length);
David Horstmann0a8abde2024-03-13 15:57:46 +00001097#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001098 psa_status_t status = (psa_mac_update)(arg0_operation, arg1_input, arg2_input_length);
David Horstmann0a8abde2024-03-13 15:57:46 +00001099#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Thomas Daubneya1cf1012024-01-30 11:18:54 +00001100 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_input, arg2_input_length);
David Horstmann0a8abde2024-03-13 15:57:46 +00001101#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001102 return status;
1103}
1104
1105/* Wrapper for psa_mac_verify */
1106psa_status_t mbedtls_test_wrap_psa_mac_verify(
1107 mbedtls_svc_key_id_t arg0_key,
1108 psa_algorithm_t arg1_alg,
1109 const uint8_t *arg2_input,
1110 size_t arg3_input_length,
1111 const uint8_t *arg4_mac,
1112 size_t arg5_mac_length)
1113{
David Horstmann0a8abde2024-03-13 15:57:46 +00001114#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Thomas Daubneya1cf1012024-01-30 11:18:54 +00001115 MBEDTLS_TEST_MEMORY_POISON(arg2_input, arg3_input_length);
1116 MBEDTLS_TEST_MEMORY_POISON(arg4_mac, arg5_mac_length);
David Horstmann0a8abde2024-03-13 15:57:46 +00001117#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001118 psa_status_t status = (psa_mac_verify)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_mac, arg5_mac_length);
David Horstmann0a8abde2024-03-13 15:57:46 +00001119#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Thomas Daubneya1cf1012024-01-30 11:18:54 +00001120 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_input, arg3_input_length);
1121 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_mac, arg5_mac_length);
David Horstmann0a8abde2024-03-13 15:57:46 +00001122#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001123 return status;
1124}
1125
1126/* Wrapper for psa_mac_verify_finish */
1127psa_status_t mbedtls_test_wrap_psa_mac_verify_finish(
1128 psa_mac_operation_t *arg0_operation,
1129 const uint8_t *arg1_mac,
1130 size_t arg2_mac_length)
1131{
David Horstmann0a8abde2024-03-13 15:57:46 +00001132#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Thomas Daubneya1cf1012024-01-30 11:18:54 +00001133 MBEDTLS_TEST_MEMORY_POISON(arg1_mac, arg2_mac_length);
David Horstmann0a8abde2024-03-13 15:57:46 +00001134#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001135 psa_status_t status = (psa_mac_verify_finish)(arg0_operation, arg1_mac, arg2_mac_length);
David Horstmann0a8abde2024-03-13 15:57:46 +00001136#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Thomas Daubneya1cf1012024-01-30 11:18:54 +00001137 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_mac, arg2_mac_length);
David Horstmann0a8abde2024-03-13 15:57:46 +00001138#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001139 return status;
1140}
1141
1142/* Wrapper for psa_mac_verify_setup */
1143psa_status_t mbedtls_test_wrap_psa_mac_verify_setup(
1144 psa_mac_operation_t *arg0_operation,
1145 mbedtls_svc_key_id_t arg1_key,
1146 psa_algorithm_t arg2_alg)
1147{
1148 psa_status_t status = (psa_mac_verify_setup)(arg0_operation, arg1_key, arg2_alg);
1149 return status;
1150}
1151
1152/* Wrapper for psa_pake_abort */
Ronald Cron7062d3d2024-05-24 10:28:15 +02001153#if defined(PSA_WANT_ALG_SOME_PAKE)
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001154psa_status_t mbedtls_test_wrap_psa_pake_abort(
1155 psa_pake_operation_t *arg0_operation)
1156{
1157 psa_status_t status = (psa_pake_abort)(arg0_operation);
1158 return status;
1159}
Ronald Cron7062d3d2024-05-24 10:28:15 +02001160#endif /* defined(PSA_WANT_ALG_SOME_PAKE) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001161
1162/* Wrapper for psa_pake_get_implicit_key */
Ronald Cron7062d3d2024-05-24 10:28:15 +02001163#if defined(PSA_WANT_ALG_SOME_PAKE)
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001164psa_status_t mbedtls_test_wrap_psa_pake_get_implicit_key(
1165 psa_pake_operation_t *arg0_operation,
1166 psa_key_derivation_operation_t *arg1_output)
1167{
1168 psa_status_t status = (psa_pake_get_implicit_key)(arg0_operation, arg1_output);
1169 return status;
1170}
Ronald Cron7062d3d2024-05-24 10:28:15 +02001171#endif /* defined(PSA_WANT_ALG_SOME_PAKE) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001172
1173/* Wrapper for psa_pake_input */
Ronald Cron7062d3d2024-05-24 10:28:15 +02001174#if defined(PSA_WANT_ALG_SOME_PAKE)
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001175psa_status_t mbedtls_test_wrap_psa_pake_input(
1176 psa_pake_operation_t *arg0_operation,
1177 psa_pake_step_t arg1_step,
1178 const uint8_t *arg2_input,
1179 size_t arg3_input_length)
1180{
David Horstmann0a8abde2024-03-13 15:57:46 +00001181#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
David Horstmann6076fe42024-01-23 15:28:51 +00001182 MBEDTLS_TEST_MEMORY_POISON(arg2_input, arg3_input_length);
David Horstmann0a8abde2024-03-13 15:57:46 +00001183#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001184 psa_status_t status = (psa_pake_input)(arg0_operation, arg1_step, arg2_input, arg3_input_length);
David Horstmann0a8abde2024-03-13 15:57:46 +00001185#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
David Horstmann6076fe42024-01-23 15:28:51 +00001186 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_input, arg3_input_length);
David Horstmann0a8abde2024-03-13 15:57:46 +00001187#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001188 return status;
1189}
Ronald Cron7062d3d2024-05-24 10:28:15 +02001190#endif /* defined(PSA_WANT_ALG_SOME_PAKE) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001191
1192/* Wrapper for psa_pake_output */
Ronald Cron7062d3d2024-05-24 10:28:15 +02001193#if defined(PSA_WANT_ALG_SOME_PAKE)
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001194psa_status_t mbedtls_test_wrap_psa_pake_output(
1195 psa_pake_operation_t *arg0_operation,
1196 psa_pake_step_t arg1_step,
1197 uint8_t *arg2_output,
1198 size_t arg3_output_size,
1199 size_t *arg4_output_length)
1200{
David Horstmann0a8abde2024-03-13 15:57:46 +00001201#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
David Horstmann6076fe42024-01-23 15:28:51 +00001202 MBEDTLS_TEST_MEMORY_POISON(arg2_output, arg3_output_size);
David Horstmann0a8abde2024-03-13 15:57:46 +00001203#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001204 psa_status_t status = (psa_pake_output)(arg0_operation, arg1_step, arg2_output, arg3_output_size, arg4_output_length);
David Horstmann0a8abde2024-03-13 15:57:46 +00001205#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
David Horstmann6076fe42024-01-23 15:28:51 +00001206 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_output, arg3_output_size);
David Horstmann0a8abde2024-03-13 15:57:46 +00001207#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001208 return status;
1209}
Ronald Cron7062d3d2024-05-24 10:28:15 +02001210#endif /* defined(PSA_WANT_ALG_SOME_PAKE) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001211
1212/* Wrapper for psa_pake_set_password_key */
Ronald Cron7062d3d2024-05-24 10:28:15 +02001213#if defined(PSA_WANT_ALG_SOME_PAKE)
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001214psa_status_t mbedtls_test_wrap_psa_pake_set_password_key(
1215 psa_pake_operation_t *arg0_operation,
1216 mbedtls_svc_key_id_t arg1_password)
1217{
1218 psa_status_t status = (psa_pake_set_password_key)(arg0_operation, arg1_password);
1219 return status;
1220}
Ronald Cron7062d3d2024-05-24 10:28:15 +02001221#endif /* defined(PSA_WANT_ALG_SOME_PAKE) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001222
1223/* Wrapper for psa_pake_set_peer */
Ronald Cron7062d3d2024-05-24 10:28:15 +02001224#if defined(PSA_WANT_ALG_SOME_PAKE)
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001225psa_status_t mbedtls_test_wrap_psa_pake_set_peer(
1226 psa_pake_operation_t *arg0_operation,
1227 const uint8_t *arg1_peer_id,
1228 size_t arg2_peer_id_len)
1229{
David Horstmann0a8abde2024-03-13 15:57:46 +00001230#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
David Horstmann6076fe42024-01-23 15:28:51 +00001231 MBEDTLS_TEST_MEMORY_POISON(arg1_peer_id, arg2_peer_id_len);
David Horstmann0a8abde2024-03-13 15:57:46 +00001232#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001233 psa_status_t status = (psa_pake_set_peer)(arg0_operation, arg1_peer_id, arg2_peer_id_len);
David Horstmann0a8abde2024-03-13 15:57:46 +00001234#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
David Horstmann6076fe42024-01-23 15:28:51 +00001235 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_peer_id, arg2_peer_id_len);
David Horstmann0a8abde2024-03-13 15:57:46 +00001236#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001237 return status;
1238}
Ronald Cron7062d3d2024-05-24 10:28:15 +02001239#endif /* defined(PSA_WANT_ALG_SOME_PAKE) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001240
1241/* Wrapper for psa_pake_set_role */
Ronald Cron7062d3d2024-05-24 10:28:15 +02001242#if defined(PSA_WANT_ALG_SOME_PAKE)
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001243psa_status_t mbedtls_test_wrap_psa_pake_set_role(
1244 psa_pake_operation_t *arg0_operation,
1245 psa_pake_role_t arg1_role)
1246{
1247 psa_status_t status = (psa_pake_set_role)(arg0_operation, arg1_role);
1248 return status;
1249}
Ronald Cron7062d3d2024-05-24 10:28:15 +02001250#endif /* defined(PSA_WANT_ALG_SOME_PAKE) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001251
1252/* Wrapper for psa_pake_set_user */
Ronald Cron7062d3d2024-05-24 10:28:15 +02001253#if defined(PSA_WANT_ALG_SOME_PAKE)
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001254psa_status_t mbedtls_test_wrap_psa_pake_set_user(
1255 psa_pake_operation_t *arg0_operation,
1256 const uint8_t *arg1_user_id,
1257 size_t arg2_user_id_len)
1258{
David Horstmann0a8abde2024-03-13 15:57:46 +00001259#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
David Horstmann6076fe42024-01-23 15:28:51 +00001260 MBEDTLS_TEST_MEMORY_POISON(arg1_user_id, arg2_user_id_len);
David Horstmann0a8abde2024-03-13 15:57:46 +00001261#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001262 psa_status_t status = (psa_pake_set_user)(arg0_operation, arg1_user_id, arg2_user_id_len);
David Horstmann0a8abde2024-03-13 15:57:46 +00001263#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
David Horstmann6076fe42024-01-23 15:28:51 +00001264 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_user_id, arg2_user_id_len);
David Horstmann0a8abde2024-03-13 15:57:46 +00001265#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001266 return status;
1267}
Ronald Cron7062d3d2024-05-24 10:28:15 +02001268#endif /* defined(PSA_WANT_ALG_SOME_PAKE) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001269
1270/* Wrapper for psa_pake_setup */
Ronald Cron7062d3d2024-05-24 10:28:15 +02001271#if defined(PSA_WANT_ALG_SOME_PAKE)
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001272psa_status_t mbedtls_test_wrap_psa_pake_setup(
1273 psa_pake_operation_t *arg0_operation,
1274 const psa_pake_cipher_suite_t *arg1_cipher_suite)
1275{
1276 psa_status_t status = (psa_pake_setup)(arg0_operation, arg1_cipher_suite);
1277 return status;
1278}
Ronald Cron7062d3d2024-05-24 10:28:15 +02001279#endif /* defined(PSA_WANT_ALG_SOME_PAKE) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001280
1281/* Wrapper for psa_purge_key */
1282psa_status_t mbedtls_test_wrap_psa_purge_key(
1283 mbedtls_svc_key_id_t arg0_key)
1284{
1285 psa_status_t status = (psa_purge_key)(arg0_key);
1286 return status;
1287}
1288
1289/* Wrapper for psa_raw_key_agreement */
1290psa_status_t mbedtls_test_wrap_psa_raw_key_agreement(
1291 psa_algorithm_t arg0_alg,
1292 mbedtls_svc_key_id_t arg1_private_key,
1293 const uint8_t *arg2_peer_key,
1294 size_t arg3_peer_key_length,
1295 uint8_t *arg4_output,
1296 size_t arg5_output_size,
1297 size_t *arg6_output_length)
1298{
David Horstmann0a8abde2024-03-13 15:57:46 +00001299#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Thomas Daubneyfe2bda32024-02-15 13:35:06 +00001300 MBEDTLS_TEST_MEMORY_POISON(arg2_peer_key, arg3_peer_key_length);
1301 MBEDTLS_TEST_MEMORY_POISON(arg4_output, arg5_output_size);
David Horstmann0a8abde2024-03-13 15:57:46 +00001302#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001303 psa_status_t status = (psa_raw_key_agreement)(arg0_alg, arg1_private_key, arg2_peer_key, arg3_peer_key_length, arg4_output, arg5_output_size, arg6_output_length);
David Horstmann0a8abde2024-03-13 15:57:46 +00001304#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Thomas Daubneyfe2bda32024-02-15 13:35:06 +00001305 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_peer_key, arg3_peer_key_length);
1306 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_output, arg5_output_size);
David Horstmann0a8abde2024-03-13 15:57:46 +00001307#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001308 return status;
1309}
1310
1311/* Wrapper for psa_sign_hash */
1312psa_status_t mbedtls_test_wrap_psa_sign_hash(
1313 mbedtls_svc_key_id_t arg0_key,
1314 psa_algorithm_t arg1_alg,
1315 const uint8_t *arg2_hash,
1316 size_t arg3_hash_length,
1317 uint8_t *arg4_signature,
1318 size_t arg5_signature_size,
1319 size_t *arg6_signature_length)
1320{
David Horstmann0a8abde2024-03-13 15:57:46 +00001321#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Thomas Daubneyf430f472024-01-30 12:25:35 +00001322 MBEDTLS_TEST_MEMORY_POISON(arg2_hash, arg3_hash_length);
1323 MBEDTLS_TEST_MEMORY_POISON(arg4_signature, arg5_signature_size);
David Horstmann0a8abde2024-03-13 15:57:46 +00001324#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001325 psa_status_t status = (psa_sign_hash)(arg0_key, arg1_alg, arg2_hash, arg3_hash_length, arg4_signature, arg5_signature_size, arg6_signature_length);
David Horstmann0a8abde2024-03-13 15:57:46 +00001326#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Thomas Daubneyf430f472024-01-30 12:25:35 +00001327 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_hash, arg3_hash_length);
1328 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_signature, arg5_signature_size);
David Horstmann0a8abde2024-03-13 15:57:46 +00001329#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001330 return status;
1331}
1332
1333/* Wrapper for psa_sign_hash_abort */
1334psa_status_t mbedtls_test_wrap_psa_sign_hash_abort(
1335 psa_sign_hash_interruptible_operation_t *arg0_operation)
1336{
1337 psa_status_t status = (psa_sign_hash_abort)(arg0_operation);
1338 return status;
1339}
1340
1341/* Wrapper for psa_sign_hash_complete */
1342psa_status_t mbedtls_test_wrap_psa_sign_hash_complete(
1343 psa_sign_hash_interruptible_operation_t *arg0_operation,
1344 uint8_t *arg1_signature,
1345 size_t arg2_signature_size,
1346 size_t *arg3_signature_length)
1347{
David Horstmann0a8abde2024-03-13 15:57:46 +00001348#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
David Horstmann5d64c6a2024-03-11 13:58:07 +00001349 MBEDTLS_TEST_MEMORY_POISON(arg1_signature, arg2_signature_size);
David Horstmann0a8abde2024-03-13 15:57:46 +00001350#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001351 psa_status_t status = (psa_sign_hash_complete)(arg0_operation, arg1_signature, arg2_signature_size, arg3_signature_length);
David Horstmann0a8abde2024-03-13 15:57:46 +00001352#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
David Horstmann5d64c6a2024-03-11 13:58:07 +00001353 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_signature, arg2_signature_size);
David Horstmann0a8abde2024-03-13 15:57:46 +00001354#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001355 return status;
1356}
1357
1358/* Wrapper for psa_sign_hash_start */
1359psa_status_t mbedtls_test_wrap_psa_sign_hash_start(
1360 psa_sign_hash_interruptible_operation_t *arg0_operation,
1361 mbedtls_svc_key_id_t arg1_key,
1362 psa_algorithm_t arg2_alg,
1363 const uint8_t *arg3_hash,
1364 size_t arg4_hash_length)
1365{
David Horstmann0a8abde2024-03-13 15:57:46 +00001366#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
David Horstmann5d64c6a2024-03-11 13:58:07 +00001367 MBEDTLS_TEST_MEMORY_POISON(arg3_hash, arg4_hash_length);
David Horstmann0a8abde2024-03-13 15:57:46 +00001368#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001369 psa_status_t status = (psa_sign_hash_start)(arg0_operation, arg1_key, arg2_alg, arg3_hash, arg4_hash_length);
David Horstmann0a8abde2024-03-13 15:57:46 +00001370#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
David Horstmann5d64c6a2024-03-11 13:58:07 +00001371 MBEDTLS_TEST_MEMORY_UNPOISON(arg3_hash, arg4_hash_length);
David Horstmann0a8abde2024-03-13 15:57:46 +00001372#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001373 return status;
1374}
1375
1376/* Wrapper for psa_sign_message */
1377psa_status_t mbedtls_test_wrap_psa_sign_message(
1378 mbedtls_svc_key_id_t arg0_key,
1379 psa_algorithm_t arg1_alg,
1380 const uint8_t *arg2_input,
1381 size_t arg3_input_length,
1382 uint8_t *arg4_signature,
1383 size_t arg5_signature_size,
1384 size_t *arg6_signature_length)
1385{
David Horstmann0a8abde2024-03-13 15:57:46 +00001386#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Thomas Daubneyf430f472024-01-30 12:25:35 +00001387 MBEDTLS_TEST_MEMORY_POISON(arg2_input, arg3_input_length);
1388 MBEDTLS_TEST_MEMORY_POISON(arg4_signature, arg5_signature_size);
David Horstmann0a8abde2024-03-13 15:57:46 +00001389#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001390 psa_status_t status = (psa_sign_message)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_signature, arg5_signature_size, arg6_signature_length);
David Horstmann0a8abde2024-03-13 15:57:46 +00001391#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Thomas Daubneyf430f472024-01-30 12:25:35 +00001392 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_input, arg3_input_length);
1393 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_signature, arg5_signature_size);
David Horstmann0a8abde2024-03-13 15:57:46 +00001394#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001395 return status;
1396}
1397
1398/* Wrapper for psa_verify_hash */
1399psa_status_t mbedtls_test_wrap_psa_verify_hash(
1400 mbedtls_svc_key_id_t arg0_key,
1401 psa_algorithm_t arg1_alg,
1402 const uint8_t *arg2_hash,
1403 size_t arg3_hash_length,
1404 const uint8_t *arg4_signature,
1405 size_t arg5_signature_length)
1406{
David Horstmann0a8abde2024-03-13 15:57:46 +00001407#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Thomas Daubneyf430f472024-01-30 12:25:35 +00001408 MBEDTLS_TEST_MEMORY_POISON(arg2_hash, arg3_hash_length);
1409 MBEDTLS_TEST_MEMORY_POISON(arg4_signature, arg5_signature_length);
David Horstmann0a8abde2024-03-13 15:57:46 +00001410#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001411 psa_status_t status = (psa_verify_hash)(arg0_key, arg1_alg, arg2_hash, arg3_hash_length, arg4_signature, arg5_signature_length);
David Horstmann0a8abde2024-03-13 15:57:46 +00001412#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Thomas Daubneyf430f472024-01-30 12:25:35 +00001413 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_hash, arg3_hash_length);
1414 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_signature, arg5_signature_length);
David Horstmann0a8abde2024-03-13 15:57:46 +00001415#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001416 return status;
1417}
1418
1419/* Wrapper for psa_verify_hash_abort */
1420psa_status_t mbedtls_test_wrap_psa_verify_hash_abort(
1421 psa_verify_hash_interruptible_operation_t *arg0_operation)
1422{
1423 psa_status_t status = (psa_verify_hash_abort)(arg0_operation);
1424 return status;
1425}
1426
1427/* Wrapper for psa_verify_hash_complete */
1428psa_status_t mbedtls_test_wrap_psa_verify_hash_complete(
1429 psa_verify_hash_interruptible_operation_t *arg0_operation)
1430{
1431 psa_status_t status = (psa_verify_hash_complete)(arg0_operation);
1432 return status;
1433}
1434
1435/* Wrapper for psa_verify_hash_start */
1436psa_status_t mbedtls_test_wrap_psa_verify_hash_start(
1437 psa_verify_hash_interruptible_operation_t *arg0_operation,
1438 mbedtls_svc_key_id_t arg1_key,
1439 psa_algorithm_t arg2_alg,
1440 const uint8_t *arg3_hash,
1441 size_t arg4_hash_length,
1442 const uint8_t *arg5_signature,
1443 size_t arg6_signature_length)
1444{
David Horstmann0a8abde2024-03-13 15:57:46 +00001445#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
David Horstmann5d64c6a2024-03-11 13:58:07 +00001446 MBEDTLS_TEST_MEMORY_POISON(arg3_hash, arg4_hash_length);
1447 MBEDTLS_TEST_MEMORY_POISON(arg5_signature, arg6_signature_length);
David Horstmann0a8abde2024-03-13 15:57:46 +00001448#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001449 psa_status_t status = (psa_verify_hash_start)(arg0_operation, arg1_key, arg2_alg, arg3_hash, arg4_hash_length, arg5_signature, arg6_signature_length);
David Horstmann0a8abde2024-03-13 15:57:46 +00001450#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
David Horstmann5d64c6a2024-03-11 13:58:07 +00001451 MBEDTLS_TEST_MEMORY_UNPOISON(arg3_hash, arg4_hash_length);
1452 MBEDTLS_TEST_MEMORY_UNPOISON(arg5_signature, arg6_signature_length);
David Horstmann0a8abde2024-03-13 15:57:46 +00001453#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001454 return status;
1455}
1456
1457/* Wrapper for psa_verify_message */
1458psa_status_t mbedtls_test_wrap_psa_verify_message(
1459 mbedtls_svc_key_id_t arg0_key,
1460 psa_algorithm_t arg1_alg,
1461 const uint8_t *arg2_input,
1462 size_t arg3_input_length,
1463 const uint8_t *arg4_signature,
1464 size_t arg5_signature_length)
1465{
David Horstmann0a8abde2024-03-13 15:57:46 +00001466#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Thomas Daubneyf430f472024-01-30 12:25:35 +00001467 MBEDTLS_TEST_MEMORY_POISON(arg2_input, arg3_input_length);
1468 MBEDTLS_TEST_MEMORY_POISON(arg4_signature, arg5_signature_length);
David Horstmann0a8abde2024-03-13 15:57:46 +00001469#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001470 psa_status_t status = (psa_verify_message)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_signature, arg5_signature_length);
David Horstmann0a8abde2024-03-13 15:57:46 +00001471#if !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS)
Thomas Daubneyf430f472024-01-30 12:25:35 +00001472 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_input, arg3_input_length);
1473 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_signature, arg5_signature_length);
David Horstmann0a8abde2024-03-13 15:57:46 +00001474#endif /* !defined(MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001475 return status;
1476}
1477
Gilles Peskine4411c9c2024-01-04 20:51:38 +01001478#endif /* defined(MBEDTLS_PSA_CRYPTO_C) && defined(MBEDTLS_TEST_HOOKS) && \
1479 !defined(RECORD_PSA_STATUS_COVERAGE_LOG) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001480
1481/* End of automatically generated file. */