blob: f944a2d544811eec8d41335d7399c9d0afd05ddd [file] [log] [blame]
Gilles Peskined5e5e6d2024-01-04 16:42:40 +01001/* Automatically generated by generate_psa_wrappers.py, do not edit! */
2
3/* Copyright The Mbed TLS Contributors
4 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
5 */
6
7#if !defined(MBEDTLS_CONFIG_FILE)
8#include "mbedtls/config.h"
9#else
10#include MBEDTLS_CONFIG_FILE
11#endif
12
Gilles Peskinea980aa02024-01-04 20:51:38 +010013#if defined(MBEDTLS_PSA_CRYPTO_C) && defined(MBEDTLS_TEST_HOOKS) && \
14 !defined(RECORD_PSA_STATUS_COVERAGE_LOG)
Gilles Peskined5e5e6d2024-01-04 16:42:40 +010015
16#include <psa/crypto.h>
17
Gilles Peskine42fa8ea2024-01-04 16:59:28 +010018#include <test/memory.h>
Gilles Peskined5e5e6d2024-01-04 16:42:40 +010019#include <test/psa_crypto_helpers.h>
20#include <test/psa_test_wrappers.h>
21
22/* Wrapper for mbedtls_psa_inject_entropy */
23#if defined(MBEDTLS_PSA_INJECT_ENTROPY)
24psa_status_t mbedtls_test_wrap_mbedtls_psa_inject_entropy(
25 const uint8_t *arg0_seed,
26 size_t arg1_seed_size)
27{
28 psa_status_t status = (mbedtls_psa_inject_entropy)(arg0_seed, arg1_seed_size);
29 return status;
30}
31#endif /* defined(MBEDTLS_PSA_INJECT_ENTROPY) */
32
33/* Wrapper for mbedtls_psa_platform_get_builtin_key */
34#if defined(MBEDTLS_PSA_CRYPTO_BUILTIN_KEYS)
35psa_status_t mbedtls_test_wrap_mbedtls_psa_platform_get_builtin_key(
36 mbedtls_svc_key_id_t arg0_key_id,
37 psa_key_lifetime_t *arg1_lifetime,
38 psa_drv_slot_number_t *arg2_slot_number)
39{
40 psa_status_t status = (mbedtls_psa_platform_get_builtin_key)(arg0_key_id, arg1_lifetime, arg2_slot_number);
41 return status;
42}
43#endif /* defined(MBEDTLS_PSA_CRYPTO_BUILTIN_KEYS) */
44
45/* Wrapper for mbedtls_psa_register_se_key */
46#if defined(MBEDTLS_PSA_CRYPTO_SE_C)
47psa_status_t mbedtls_test_wrap_mbedtls_psa_register_se_key(
48 const psa_key_attributes_t *arg0_attributes)
49{
50 psa_status_t status = (mbedtls_psa_register_se_key)(arg0_attributes);
51 return status;
52}
53#endif /* defined(MBEDTLS_PSA_CRYPTO_SE_C) */
54
55/* Wrapper for psa_aead_decrypt */
56psa_status_t mbedtls_test_wrap_psa_aead_decrypt(
57 mbedtls_svc_key_id_t arg0_key,
58 psa_algorithm_t arg1_alg,
59 const uint8_t *arg2_nonce,
60 size_t arg3_nonce_length,
61 const uint8_t *arg4_additional_data,
62 size_t arg5_additional_data_length,
63 const uint8_t *arg6_ciphertext,
64 size_t arg7_ciphertext_length,
65 uint8_t *arg8_plaintext,
66 size_t arg9_plaintext_size,
67 size_t *arg10_plaintext_length)
68{
69 psa_status_t status = (psa_aead_decrypt)(arg0_key, arg1_alg, arg2_nonce, arg3_nonce_length, arg4_additional_data, arg5_additional_data_length, arg6_ciphertext, arg7_ciphertext_length, arg8_plaintext, arg9_plaintext_size, arg10_plaintext_length);
70 return status;
71}
72
73/* Wrapper for psa_aead_encrypt */
74psa_status_t mbedtls_test_wrap_psa_aead_encrypt(
75 mbedtls_svc_key_id_t arg0_key,
76 psa_algorithm_t arg1_alg,
77 const uint8_t *arg2_nonce,
78 size_t arg3_nonce_length,
79 const uint8_t *arg4_additional_data,
80 size_t arg5_additional_data_length,
81 const uint8_t *arg6_plaintext,
82 size_t arg7_plaintext_length,
83 uint8_t *arg8_ciphertext,
84 size_t arg9_ciphertext_size,
85 size_t *arg10_ciphertext_length)
86{
87 psa_status_t status = (psa_aead_encrypt)(arg0_key, arg1_alg, arg2_nonce, arg3_nonce_length, arg4_additional_data, arg5_additional_data_length, arg6_plaintext, arg7_plaintext_length, arg8_ciphertext, arg9_ciphertext_size, arg10_ciphertext_length);
88 return status;
89}
90
91/* Wrapper for psa_asymmetric_decrypt */
92psa_status_t mbedtls_test_wrap_psa_asymmetric_decrypt(
93 mbedtls_svc_key_id_t arg0_key,
94 psa_algorithm_t arg1_alg,
95 const uint8_t *arg2_input,
96 size_t arg3_input_length,
97 const uint8_t *arg4_salt,
98 size_t arg5_salt_length,
99 uint8_t *arg6_output,
100 size_t arg7_output_size,
101 size_t *arg8_output_length)
102{
Thomas Daubney2b614f92024-01-31 16:57:30 +0000103#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
104 MBEDTLS_TEST_MEMORY_POISON(arg2_input, arg3_input_length);
105 MBEDTLS_TEST_MEMORY_POISON(arg4_salt, arg5_salt_length);
106 MBEDTLS_TEST_MEMORY_POISON(arg6_output, arg7_output_size);
107#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskined5e5e6d2024-01-04 16:42:40 +0100108 psa_status_t status = (psa_asymmetric_decrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_salt, arg5_salt_length, arg6_output, arg7_output_size, arg8_output_length);
Thomas Daubney2b614f92024-01-31 16:57:30 +0000109#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
110 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_input, arg3_input_length);
111 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_salt, arg5_salt_length);
112 MBEDTLS_TEST_MEMORY_UNPOISON(arg6_output, arg7_output_size);
113#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskined5e5e6d2024-01-04 16:42:40 +0100114 return status;
115}
116
117/* Wrapper for psa_asymmetric_encrypt */
118psa_status_t mbedtls_test_wrap_psa_asymmetric_encrypt(
119 mbedtls_svc_key_id_t arg0_key,
120 psa_algorithm_t arg1_alg,
121 const uint8_t *arg2_input,
122 size_t arg3_input_length,
123 const uint8_t *arg4_salt,
124 size_t arg5_salt_length,
125 uint8_t *arg6_output,
126 size_t arg7_output_size,
127 size_t *arg8_output_length)
128{
Thomas Daubneyd8adccf2024-01-30 14:41:05 +0000129#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
130 MBEDTLS_TEST_MEMORY_POISON(arg2_input, arg3_input_length);
131 MBEDTLS_TEST_MEMORY_POISON(arg4_salt, arg5_salt_length);
132 MBEDTLS_TEST_MEMORY_POISON(arg6_output, arg7_output_size);
133#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskined5e5e6d2024-01-04 16:42:40 +0100134 psa_status_t status = (psa_asymmetric_encrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_salt, arg5_salt_length, arg6_output, arg7_output_size, arg8_output_length);
Thomas Daubneyd8adccf2024-01-30 14:41:05 +0000135#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
136 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_input, arg3_input_length);
137 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_salt, arg5_salt_length);
138 MBEDTLS_TEST_MEMORY_UNPOISON(arg6_output, arg7_output_size);
139#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskined5e5e6d2024-01-04 16:42:40 +0100140 return status;
141}
142
143/* Wrapper for psa_cipher_abort */
144psa_status_t mbedtls_test_wrap_psa_cipher_abort(
145 psa_cipher_operation_t *arg0_operation)
146{
147 psa_status_t status = (psa_cipher_abort)(arg0_operation);
148 return status;
149}
150
151/* Wrapper for psa_cipher_decrypt */
152psa_status_t mbedtls_test_wrap_psa_cipher_decrypt(
153 mbedtls_svc_key_id_t arg0_key,
154 psa_algorithm_t arg1_alg,
155 const uint8_t *arg2_input,
156 size_t arg3_input_length,
157 uint8_t *arg4_output,
158 size_t arg5_output_size,
159 size_t *arg6_output_length)
160{
161 psa_status_t status = (psa_cipher_decrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_output, arg5_output_size, arg6_output_length);
162 return status;
163}
164
165/* Wrapper for psa_cipher_decrypt_setup */
166psa_status_t mbedtls_test_wrap_psa_cipher_decrypt_setup(
167 psa_cipher_operation_t *arg0_operation,
168 mbedtls_svc_key_id_t arg1_key,
169 psa_algorithm_t arg2_alg)
170{
171 psa_status_t status = (psa_cipher_decrypt_setup)(arg0_operation, arg1_key, arg2_alg);
172 return status;
173}
174
175/* Wrapper for psa_cipher_encrypt */
176psa_status_t mbedtls_test_wrap_psa_cipher_encrypt(
177 mbedtls_svc_key_id_t arg0_key,
178 psa_algorithm_t arg1_alg,
179 const uint8_t *arg2_input,
180 size_t arg3_input_length,
181 uint8_t *arg4_output,
182 size_t arg5_output_size,
183 size_t *arg6_output_length)
184{
Ryan Everett810421c2024-01-25 12:09:09 +0000185#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
186 MBEDTLS_TEST_MEMORY_POISON(arg2_input, arg3_input_length);
187 MBEDTLS_TEST_MEMORY_POISON(arg4_output, arg5_output_size);
188#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskined5e5e6d2024-01-04 16:42:40 +0100189 psa_status_t status = (psa_cipher_encrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_output, arg5_output_size, arg6_output_length);
Ryan Everett810421c2024-01-25 12:09:09 +0000190#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
191 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_input, arg3_input_length);
192 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_output, arg5_output_size);
193#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskined5e5e6d2024-01-04 16:42:40 +0100194 return status;
195}
196
197/* Wrapper for psa_cipher_encrypt_setup */
198psa_status_t mbedtls_test_wrap_psa_cipher_encrypt_setup(
199 psa_cipher_operation_t *arg0_operation,
200 mbedtls_svc_key_id_t arg1_key,
201 psa_algorithm_t arg2_alg)
202{
203 psa_status_t status = (psa_cipher_encrypt_setup)(arg0_operation, arg1_key, arg2_alg);
204 return status;
205}
206
207/* Wrapper for psa_cipher_finish */
208psa_status_t mbedtls_test_wrap_psa_cipher_finish(
209 psa_cipher_operation_t *arg0_operation,
210 uint8_t *arg1_output,
211 size_t arg2_output_size,
212 size_t *arg3_output_length)
213{
214 psa_status_t status = (psa_cipher_finish)(arg0_operation, arg1_output, arg2_output_size, arg3_output_length);
215 return status;
216}
217
218/* Wrapper for psa_cipher_generate_iv */
219psa_status_t mbedtls_test_wrap_psa_cipher_generate_iv(
220 psa_cipher_operation_t *arg0_operation,
221 uint8_t *arg1_iv,
222 size_t arg2_iv_size,
223 size_t *arg3_iv_length)
224{
225 psa_status_t status = (psa_cipher_generate_iv)(arg0_operation, arg1_iv, arg2_iv_size, arg3_iv_length);
226 return status;
227}
228
229/* Wrapper for psa_cipher_set_iv */
230psa_status_t mbedtls_test_wrap_psa_cipher_set_iv(
231 psa_cipher_operation_t *arg0_operation,
232 const uint8_t *arg1_iv,
233 size_t arg2_iv_length)
234{
235 psa_status_t status = (psa_cipher_set_iv)(arg0_operation, arg1_iv, arg2_iv_length);
236 return status;
237}
238
239/* Wrapper for psa_cipher_update */
240psa_status_t mbedtls_test_wrap_psa_cipher_update(
241 psa_cipher_operation_t *arg0_operation,
242 const uint8_t *arg1_input,
243 size_t arg2_input_length,
244 uint8_t *arg3_output,
245 size_t arg4_output_size,
246 size_t *arg5_output_length)
247{
248 psa_status_t status = (psa_cipher_update)(arg0_operation, arg1_input, arg2_input_length, arg3_output, arg4_output_size, arg5_output_length);
249 return status;
250}
251
252/* Wrapper for psa_copy_key */
253psa_status_t mbedtls_test_wrap_psa_copy_key(
254 mbedtls_svc_key_id_t arg0_source_key,
255 const psa_key_attributes_t *arg1_attributes,
256 mbedtls_svc_key_id_t *arg2_target_key)
257{
258 psa_status_t status = (psa_copy_key)(arg0_source_key, arg1_attributes, arg2_target_key);
259 return status;
260}
261
262/* Wrapper for psa_crypto_init */
263psa_status_t mbedtls_test_wrap_psa_crypto_init(void)
264{
265 psa_status_t status = (psa_crypto_init)();
266 return status;
267}
268
269/* Wrapper for psa_destroy_key */
270psa_status_t mbedtls_test_wrap_psa_destroy_key(
271 mbedtls_svc_key_id_t arg0_key)
272{
273 psa_status_t status = (psa_destroy_key)(arg0_key);
274 return status;
275}
276
277/* Wrapper for psa_export_key */
278psa_status_t mbedtls_test_wrap_psa_export_key(
279 mbedtls_svc_key_id_t arg0_key,
280 uint8_t *arg1_data,
281 size_t arg2_data_size,
282 size_t *arg3_data_length)
283{
Ryan Everettdcbc1d32024-01-25 11:04:48 +0000284#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
285 MBEDTLS_TEST_MEMORY_POISON(arg1_data, arg2_data_size);
286#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskined5e5e6d2024-01-04 16:42:40 +0100287 psa_status_t status = (psa_export_key)(arg0_key, arg1_data, arg2_data_size, arg3_data_length);
Ryan Everettdcbc1d32024-01-25 11:04:48 +0000288#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
289 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_data, arg2_data_size);
290#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskined5e5e6d2024-01-04 16:42:40 +0100291 return status;
292}
293
294/* Wrapper for psa_export_public_key */
295psa_status_t mbedtls_test_wrap_psa_export_public_key(
296 mbedtls_svc_key_id_t arg0_key,
297 uint8_t *arg1_data,
298 size_t arg2_data_size,
299 size_t *arg3_data_length)
300{
Ryan Everettdcbc1d32024-01-25 11:04:48 +0000301#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
302 MBEDTLS_TEST_MEMORY_POISON(arg1_data, arg2_data_size);
303#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskined5e5e6d2024-01-04 16:42:40 +0100304 psa_status_t status = (psa_export_public_key)(arg0_key, arg1_data, arg2_data_size, arg3_data_length);
Ryan Everettdcbc1d32024-01-25 11:04:48 +0000305#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
306 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_data, arg2_data_size);
307#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskined5e5e6d2024-01-04 16:42:40 +0100308 return status;
309}
310
311/* Wrapper for psa_generate_key */
312psa_status_t mbedtls_test_wrap_psa_generate_key(
313 const psa_key_attributes_t *arg0_attributes,
314 mbedtls_svc_key_id_t *arg1_key)
315{
316 psa_status_t status = (psa_generate_key)(arg0_attributes, arg1_key);
317 return status;
318}
319
320/* Wrapper for psa_generate_random */
321psa_status_t mbedtls_test_wrap_psa_generate_random(
322 uint8_t *arg0_output,
323 size_t arg1_output_size)
324{
325 psa_status_t status = (psa_generate_random)(arg0_output, arg1_output_size);
326 return status;
327}
328
329/* Wrapper for psa_get_key_attributes */
330psa_status_t mbedtls_test_wrap_psa_get_key_attributes(
331 mbedtls_svc_key_id_t arg0_key,
332 psa_key_attributes_t *arg1_attributes)
333{
334 psa_status_t status = (psa_get_key_attributes)(arg0_key, arg1_attributes);
335 return status;
336}
337
338/* Wrapper for psa_hash_abort */
339psa_status_t mbedtls_test_wrap_psa_hash_abort(
340 psa_hash_operation_t *arg0_operation)
341{
342 psa_status_t status = (psa_hash_abort)(arg0_operation);
343 return status;
344}
345
346/* Wrapper for psa_hash_clone */
347psa_status_t mbedtls_test_wrap_psa_hash_clone(
348 const psa_hash_operation_t *arg0_source_operation,
349 psa_hash_operation_t *arg1_target_operation)
350{
351 psa_status_t status = (psa_hash_clone)(arg0_source_operation, arg1_target_operation);
352 return status;
353}
354
355/* Wrapper for psa_hash_compare */
356psa_status_t mbedtls_test_wrap_psa_hash_compare(
357 psa_algorithm_t arg0_alg,
358 const uint8_t *arg1_input,
359 size_t arg2_input_length,
360 const uint8_t *arg3_hash,
361 size_t arg4_hash_length)
362{
363 psa_status_t status = (psa_hash_compare)(arg0_alg, arg1_input, arg2_input_length, arg3_hash, arg4_hash_length);
364 return status;
365}
366
367/* Wrapper for psa_hash_compute */
368psa_status_t mbedtls_test_wrap_psa_hash_compute(
369 psa_algorithm_t arg0_alg,
370 const uint8_t *arg1_input,
371 size_t arg2_input_length,
372 uint8_t *arg3_hash,
373 size_t arg4_hash_size,
374 size_t *arg5_hash_length)
375{
376 psa_status_t status = (psa_hash_compute)(arg0_alg, arg1_input, arg2_input_length, arg3_hash, arg4_hash_size, arg5_hash_length);
377 return status;
378}
379
380/* Wrapper for psa_hash_finish */
381psa_status_t mbedtls_test_wrap_psa_hash_finish(
382 psa_hash_operation_t *arg0_operation,
383 uint8_t *arg1_hash,
384 size_t arg2_hash_size,
385 size_t *arg3_hash_length)
386{
387 psa_status_t status = (psa_hash_finish)(arg0_operation, arg1_hash, arg2_hash_size, arg3_hash_length);
388 return status;
389}
390
391/* Wrapper for psa_hash_setup */
392psa_status_t mbedtls_test_wrap_psa_hash_setup(
393 psa_hash_operation_t *arg0_operation,
394 psa_algorithm_t arg1_alg)
395{
396 psa_status_t status = (psa_hash_setup)(arg0_operation, arg1_alg);
397 return status;
398}
399
400/* Wrapper for psa_hash_update */
401psa_status_t mbedtls_test_wrap_psa_hash_update(
402 psa_hash_operation_t *arg0_operation,
403 const uint8_t *arg1_input,
404 size_t arg2_input_length)
405{
406 psa_status_t status = (psa_hash_update)(arg0_operation, arg1_input, arg2_input_length);
407 return status;
408}
409
410/* Wrapper for psa_hash_verify */
411psa_status_t mbedtls_test_wrap_psa_hash_verify(
412 psa_hash_operation_t *arg0_operation,
413 const uint8_t *arg1_hash,
414 size_t arg2_hash_length)
415{
416 psa_status_t status = (psa_hash_verify)(arg0_operation, arg1_hash, arg2_hash_length);
417 return status;
418}
419
420/* Wrapper for psa_import_key */
421psa_status_t mbedtls_test_wrap_psa_import_key(
422 const psa_key_attributes_t *arg0_attributes,
423 const uint8_t *arg1_data,
424 size_t arg2_data_length,
425 mbedtls_svc_key_id_t *arg3_key)
426{
Ryan Everettdcbc1d32024-01-25 11:04:48 +0000427#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
428 MBEDTLS_TEST_MEMORY_POISON(arg1_data, arg2_data_length);
429#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskined5e5e6d2024-01-04 16:42:40 +0100430 psa_status_t status = (psa_import_key)(arg0_attributes, arg1_data, arg2_data_length, arg3_key);
Ryan Everettdcbc1d32024-01-25 11:04:48 +0000431#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
432 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_data, arg2_data_length);
433#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskined5e5e6d2024-01-04 16:42:40 +0100434 return status;
435}
436
437/* Wrapper for psa_key_derivation_abort */
438psa_status_t mbedtls_test_wrap_psa_key_derivation_abort(
439 psa_key_derivation_operation_t *arg0_operation)
440{
441 psa_status_t status = (psa_key_derivation_abort)(arg0_operation);
442 return status;
443}
444
445/* Wrapper for psa_key_derivation_get_capacity */
446psa_status_t mbedtls_test_wrap_psa_key_derivation_get_capacity(
447 const psa_key_derivation_operation_t *arg0_operation,
448 size_t *arg1_capacity)
449{
450 psa_status_t status = (psa_key_derivation_get_capacity)(arg0_operation, arg1_capacity);
451 return status;
452}
453
454/* Wrapper for psa_key_derivation_input_bytes */
455psa_status_t mbedtls_test_wrap_psa_key_derivation_input_bytes(
456 psa_key_derivation_operation_t *arg0_operation,
457 psa_key_derivation_step_t arg1_step,
458 const uint8_t *arg2_data,
459 size_t arg3_data_length)
460{
461 psa_status_t status = (psa_key_derivation_input_bytes)(arg0_operation, arg1_step, arg2_data, arg3_data_length);
462 return status;
463}
464
465/* Wrapper for psa_key_derivation_input_key */
466psa_status_t mbedtls_test_wrap_psa_key_derivation_input_key(
467 psa_key_derivation_operation_t *arg0_operation,
468 psa_key_derivation_step_t arg1_step,
469 mbedtls_svc_key_id_t arg2_key)
470{
471 psa_status_t status = (psa_key_derivation_input_key)(arg0_operation, arg1_step, arg2_key);
472 return status;
473}
474
475/* Wrapper for psa_key_derivation_key_agreement */
476psa_status_t mbedtls_test_wrap_psa_key_derivation_key_agreement(
477 psa_key_derivation_operation_t *arg0_operation,
478 psa_key_derivation_step_t arg1_step,
479 mbedtls_svc_key_id_t arg2_private_key,
480 const uint8_t *arg3_peer_key,
481 size_t arg4_peer_key_length)
482{
483 psa_status_t status = (psa_key_derivation_key_agreement)(arg0_operation, arg1_step, arg2_private_key, arg3_peer_key, arg4_peer_key_length);
484 return status;
485}
486
487/* Wrapper for psa_key_derivation_output_bytes */
488psa_status_t mbedtls_test_wrap_psa_key_derivation_output_bytes(
489 psa_key_derivation_operation_t *arg0_operation,
490 uint8_t *arg1_output,
491 size_t arg2_output_length)
492{
493 psa_status_t status = (psa_key_derivation_output_bytes)(arg0_operation, arg1_output, arg2_output_length);
494 return status;
495}
496
497/* Wrapper for psa_key_derivation_output_key */
498psa_status_t mbedtls_test_wrap_psa_key_derivation_output_key(
499 const psa_key_attributes_t *arg0_attributes,
500 psa_key_derivation_operation_t *arg1_operation,
501 mbedtls_svc_key_id_t *arg2_key)
502{
503 psa_status_t status = (psa_key_derivation_output_key)(arg0_attributes, arg1_operation, arg2_key);
504 return status;
505}
506
507/* Wrapper for psa_key_derivation_set_capacity */
508psa_status_t mbedtls_test_wrap_psa_key_derivation_set_capacity(
509 psa_key_derivation_operation_t *arg0_operation,
510 size_t arg1_capacity)
511{
512 psa_status_t status = (psa_key_derivation_set_capacity)(arg0_operation, arg1_capacity);
513 return status;
514}
515
516/* Wrapper for psa_key_derivation_setup */
517psa_status_t mbedtls_test_wrap_psa_key_derivation_setup(
518 psa_key_derivation_operation_t *arg0_operation,
519 psa_algorithm_t arg1_alg)
520{
521 psa_status_t status = (psa_key_derivation_setup)(arg0_operation, arg1_alg);
522 return status;
523}
524
525/* Wrapper for psa_mac_abort */
526psa_status_t mbedtls_test_wrap_psa_mac_abort(
527 psa_mac_operation_t *arg0_operation)
528{
529 psa_status_t status = (psa_mac_abort)(arg0_operation);
530 return status;
531}
532
533/* Wrapper for psa_mac_compute */
534psa_status_t mbedtls_test_wrap_psa_mac_compute(
535 mbedtls_svc_key_id_t arg0_key,
536 psa_algorithm_t arg1_alg,
537 const uint8_t *arg2_input,
538 size_t arg3_input_length,
539 uint8_t *arg4_mac,
540 size_t arg5_mac_size,
541 size_t *arg6_mac_length)
542{
543 psa_status_t status = (psa_mac_compute)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_mac, arg5_mac_size, arg6_mac_length);
544 return status;
545}
546
547/* Wrapper for psa_mac_sign_finish */
548psa_status_t mbedtls_test_wrap_psa_mac_sign_finish(
549 psa_mac_operation_t *arg0_operation,
550 uint8_t *arg1_mac,
551 size_t arg2_mac_size,
552 size_t *arg3_mac_length)
553{
554 psa_status_t status = (psa_mac_sign_finish)(arg0_operation, arg1_mac, arg2_mac_size, arg3_mac_length);
555 return status;
556}
557
558/* Wrapper for psa_mac_sign_setup */
559psa_status_t mbedtls_test_wrap_psa_mac_sign_setup(
560 psa_mac_operation_t *arg0_operation,
561 mbedtls_svc_key_id_t arg1_key,
562 psa_algorithm_t arg2_alg)
563{
564 psa_status_t status = (psa_mac_sign_setup)(arg0_operation, arg1_key, arg2_alg);
565 return status;
566}
567
568/* Wrapper for psa_mac_update */
569psa_status_t mbedtls_test_wrap_psa_mac_update(
570 psa_mac_operation_t *arg0_operation,
571 const uint8_t *arg1_input,
572 size_t arg2_input_length)
573{
574 psa_status_t status = (psa_mac_update)(arg0_operation, arg1_input, arg2_input_length);
575 return status;
576}
577
578/* Wrapper for psa_mac_verify */
579psa_status_t mbedtls_test_wrap_psa_mac_verify(
580 mbedtls_svc_key_id_t arg0_key,
581 psa_algorithm_t arg1_alg,
582 const uint8_t *arg2_input,
583 size_t arg3_input_length,
584 const uint8_t *arg4_mac,
585 size_t arg5_mac_length)
586{
587 psa_status_t status = (psa_mac_verify)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_mac, arg5_mac_length);
588 return status;
589}
590
591/* Wrapper for psa_mac_verify_finish */
592psa_status_t mbedtls_test_wrap_psa_mac_verify_finish(
593 psa_mac_operation_t *arg0_operation,
594 const uint8_t *arg1_mac,
595 size_t arg2_mac_length)
596{
597 psa_status_t status = (psa_mac_verify_finish)(arg0_operation, arg1_mac, arg2_mac_length);
598 return status;
599}
600
601/* Wrapper for psa_mac_verify_setup */
602psa_status_t mbedtls_test_wrap_psa_mac_verify_setup(
603 psa_mac_operation_t *arg0_operation,
604 mbedtls_svc_key_id_t arg1_key,
605 psa_algorithm_t arg2_alg)
606{
607 psa_status_t status = (psa_mac_verify_setup)(arg0_operation, arg1_key, arg2_alg);
608 return status;
609}
610
611/* Wrapper for psa_purge_key */
612psa_status_t mbedtls_test_wrap_psa_purge_key(
613 mbedtls_svc_key_id_t arg0_key)
614{
615 psa_status_t status = (psa_purge_key)(arg0_key);
616 return status;
617}
618
619/* Wrapper for psa_raw_key_agreement */
620psa_status_t mbedtls_test_wrap_psa_raw_key_agreement(
621 psa_algorithm_t arg0_alg,
622 mbedtls_svc_key_id_t arg1_private_key,
623 const uint8_t *arg2_peer_key,
624 size_t arg3_peer_key_length,
625 uint8_t *arg4_output,
626 size_t arg5_output_size,
627 size_t *arg6_output_length)
628{
629 psa_status_t status = (psa_raw_key_agreement)(arg0_alg, arg1_private_key, arg2_peer_key, arg3_peer_key_length, arg4_output, arg5_output_size, arg6_output_length);
630 return status;
631}
632
633/* Wrapper for psa_sign_hash */
634psa_status_t mbedtls_test_wrap_psa_sign_hash(
635 mbedtls_svc_key_id_t arg0_key,
636 psa_algorithm_t arg1_alg,
637 const uint8_t *arg2_hash,
638 size_t arg3_hash_length,
639 uint8_t *arg4_signature,
640 size_t arg5_signature_size,
641 size_t *arg6_signature_length)
642{
Thomas Daubneyc63e31a2024-01-30 13:33:14 +0000643#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
644 MBEDTLS_TEST_MEMORY_POISON(arg2_hash, arg3_hash_length);
645 MBEDTLS_TEST_MEMORY_POISON(arg4_signature, arg5_signature_size);
646#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskined5e5e6d2024-01-04 16:42:40 +0100647 psa_status_t status = (psa_sign_hash)(arg0_key, arg1_alg, arg2_hash, arg3_hash_length, arg4_signature, arg5_signature_size, arg6_signature_length);
Thomas Daubneyc63e31a2024-01-30 13:33:14 +0000648#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
649 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_hash, arg3_hash_length);
650 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_signature, arg5_signature_size);
651#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskined5e5e6d2024-01-04 16:42:40 +0100652 return status;
653}
654
655/* Wrapper for psa_sign_message */
656psa_status_t mbedtls_test_wrap_psa_sign_message(
657 mbedtls_svc_key_id_t arg0_key,
658 psa_algorithm_t arg1_alg,
659 const uint8_t *arg2_input,
660 size_t arg3_input_length,
661 uint8_t *arg4_signature,
662 size_t arg5_signature_size,
663 size_t *arg6_signature_length)
664{
Thomas Daubneyc63e31a2024-01-30 13:33:14 +0000665#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
666 MBEDTLS_TEST_MEMORY_POISON(arg2_input, arg3_input_length);
667 MBEDTLS_TEST_MEMORY_POISON(arg4_signature, arg5_signature_size);
668#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskined5e5e6d2024-01-04 16:42:40 +0100669 psa_status_t status = (psa_sign_message)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_signature, arg5_signature_size, arg6_signature_length);
Thomas Daubneyc63e31a2024-01-30 13:33:14 +0000670#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
671 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_input, arg3_input_length);
672 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_signature, arg5_signature_size);
673#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskined5e5e6d2024-01-04 16:42:40 +0100674 return status;
675}
676
677/* Wrapper for psa_verify_hash */
678psa_status_t mbedtls_test_wrap_psa_verify_hash(
679 mbedtls_svc_key_id_t arg0_key,
680 psa_algorithm_t arg1_alg,
681 const uint8_t *arg2_hash,
682 size_t arg3_hash_length,
683 const uint8_t *arg4_signature,
684 size_t arg5_signature_length)
685{
Thomas Daubneyc63e31a2024-01-30 13:33:14 +0000686#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
687 MBEDTLS_TEST_MEMORY_POISON(arg2_hash, arg3_hash_length);
688 MBEDTLS_TEST_MEMORY_POISON(arg4_signature, arg5_signature_length);
689#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskined5e5e6d2024-01-04 16:42:40 +0100690 psa_status_t status = (psa_verify_hash)(arg0_key, arg1_alg, arg2_hash, arg3_hash_length, arg4_signature, arg5_signature_length);
Thomas Daubneyc63e31a2024-01-30 13:33:14 +0000691#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
692 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_hash, arg3_hash_length);
693 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_signature, arg5_signature_length);
694#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskined5e5e6d2024-01-04 16:42:40 +0100695 return status;
696}
697
698/* Wrapper for psa_verify_message */
699psa_status_t mbedtls_test_wrap_psa_verify_message(
700 mbedtls_svc_key_id_t arg0_key,
701 psa_algorithm_t arg1_alg,
702 const uint8_t *arg2_input,
703 size_t arg3_input_length,
704 const uint8_t *arg4_signature,
705 size_t arg5_signature_length)
706{
Thomas Daubneyc63e31a2024-01-30 13:33:14 +0000707#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
708 MBEDTLS_TEST_MEMORY_POISON(arg2_input, arg3_input_length);
709 MBEDTLS_TEST_MEMORY_POISON(arg4_signature, arg5_signature_length);
710#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskined5e5e6d2024-01-04 16:42:40 +0100711 psa_status_t status = (psa_verify_message)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_signature, arg5_signature_length);
Thomas Daubneyc63e31a2024-01-30 13:33:14 +0000712#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
713 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_input, arg3_input_length);
714 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_signature, arg5_signature_length);
715#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskined5e5e6d2024-01-04 16:42:40 +0100716 return status;
717}
718
Gilles Peskinea980aa02024-01-04 20:51:38 +0100719#endif /* defined(MBEDTLS_PSA_CRYPTO_C) && defined(MBEDTLS_TEST_HOOKS) && \
720 !defined(RECORD_PSA_STATUS_COVERAGE_LOG) */
Gilles Peskined5e5e6d2024-01-04 16:42:40 +0100721
722/* End of automatically generated file. */