blob: c6b084fe4ffdf3a18468e76bc9491d9e619b97fb [file] [log] [blame]
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001/* Automatically generated by generate_psa_wrappers.py, do not edit! */
2
3/* Copyright The Mbed TLS Contributors
4 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
5 */
6
7#include <mbedtls/build_info.h>
8
Gilles Peskine4411c9c2024-01-04 20:51:38 +01009#if defined(MBEDTLS_PSA_CRYPTO_C) && defined(MBEDTLS_TEST_HOOKS) && \
10 !defined(RECORD_PSA_STATUS_COVERAGE_LOG)
Gilles Peskine6e4332c2024-01-04 16:42:40 +010011
12#include <psa/crypto.h>
13
Gilles Peskine90d14d72024-01-04 16:59:28 +010014#include <test/memory.h>
Gilles Peskine6e4332c2024-01-04 16:42:40 +010015#include <test/psa_crypto_helpers.h>
16#include <test/psa_test_wrappers.h>
17
18/* Wrapper for mbedtls_psa_inject_entropy */
19#if defined(MBEDTLS_PSA_INJECT_ENTROPY)
20psa_status_t mbedtls_test_wrap_mbedtls_psa_inject_entropy(
21 const uint8_t *arg0_seed,
22 size_t arg1_seed_size)
23{
24 psa_status_t status = (mbedtls_psa_inject_entropy)(arg0_seed, arg1_seed_size);
25 return status;
26}
27#endif /* defined(MBEDTLS_PSA_INJECT_ENTROPY) */
28
29/* Wrapper for mbedtls_psa_platform_get_builtin_key */
30#if defined(MBEDTLS_PSA_CRYPTO_BUILTIN_KEYS)
31psa_status_t mbedtls_test_wrap_mbedtls_psa_platform_get_builtin_key(
32 mbedtls_svc_key_id_t arg0_key_id,
33 psa_key_lifetime_t *arg1_lifetime,
34 psa_drv_slot_number_t *arg2_slot_number)
35{
36 psa_status_t status = (mbedtls_psa_platform_get_builtin_key)(arg0_key_id, arg1_lifetime, arg2_slot_number);
37 return status;
38}
39#endif /* defined(MBEDTLS_PSA_CRYPTO_BUILTIN_KEYS) */
40
41/* Wrapper for mbedtls_psa_register_se_key */
42#if defined(MBEDTLS_PSA_CRYPTO_SE_C)
43psa_status_t mbedtls_test_wrap_mbedtls_psa_register_se_key(
44 const psa_key_attributes_t *arg0_attributes)
45{
46 psa_status_t status = (mbedtls_psa_register_se_key)(arg0_attributes);
47 return status;
48}
49#endif /* defined(MBEDTLS_PSA_CRYPTO_SE_C) */
50
51/* Wrapper for psa_aead_abort */
52psa_status_t mbedtls_test_wrap_psa_aead_abort(
53 psa_aead_operation_t *arg0_operation)
54{
55 psa_status_t status = (psa_aead_abort)(arg0_operation);
56 return status;
57}
58
59/* Wrapper for psa_aead_decrypt */
60psa_status_t mbedtls_test_wrap_psa_aead_decrypt(
61 mbedtls_svc_key_id_t arg0_key,
62 psa_algorithm_t arg1_alg,
63 const uint8_t *arg2_nonce,
64 size_t arg3_nonce_length,
65 const uint8_t *arg4_additional_data,
66 size_t arg5_additional_data_length,
67 const uint8_t *arg6_ciphertext,
68 size_t arg7_ciphertext_length,
69 uint8_t *arg8_plaintext,
70 size_t arg9_plaintext_size,
71 size_t *arg10_plaintext_length)
72{
73 psa_status_t status = (psa_aead_decrypt)(arg0_key, arg1_alg, arg2_nonce, arg3_nonce_length, arg4_additional_data, arg5_additional_data_length, arg6_ciphertext, arg7_ciphertext_length, arg8_plaintext, arg9_plaintext_size, arg10_plaintext_length);
74 return status;
75}
76
77/* Wrapper for psa_aead_decrypt_setup */
78psa_status_t mbedtls_test_wrap_psa_aead_decrypt_setup(
79 psa_aead_operation_t *arg0_operation,
80 mbedtls_svc_key_id_t arg1_key,
81 psa_algorithm_t arg2_alg)
82{
83 psa_status_t status = (psa_aead_decrypt_setup)(arg0_operation, arg1_key, arg2_alg);
84 return status;
85}
86
87/* Wrapper for psa_aead_encrypt */
88psa_status_t mbedtls_test_wrap_psa_aead_encrypt(
89 mbedtls_svc_key_id_t arg0_key,
90 psa_algorithm_t arg1_alg,
91 const uint8_t *arg2_nonce,
92 size_t arg3_nonce_length,
93 const uint8_t *arg4_additional_data,
94 size_t arg5_additional_data_length,
95 const uint8_t *arg6_plaintext,
96 size_t arg7_plaintext_length,
97 uint8_t *arg8_ciphertext,
98 size_t arg9_ciphertext_size,
99 size_t *arg10_ciphertext_length)
100{
101 psa_status_t status = (psa_aead_encrypt)(arg0_key, arg1_alg, arg2_nonce, arg3_nonce_length, arg4_additional_data, arg5_additional_data_length, arg6_plaintext, arg7_plaintext_length, arg8_ciphertext, arg9_ciphertext_size, arg10_ciphertext_length);
102 return status;
103}
104
105/* Wrapper for psa_aead_encrypt_setup */
106psa_status_t mbedtls_test_wrap_psa_aead_encrypt_setup(
107 psa_aead_operation_t *arg0_operation,
108 mbedtls_svc_key_id_t arg1_key,
109 psa_algorithm_t arg2_alg)
110{
111 psa_status_t status = (psa_aead_encrypt_setup)(arg0_operation, arg1_key, arg2_alg);
112 return status;
113}
114
115/* Wrapper for psa_aead_finish */
116psa_status_t mbedtls_test_wrap_psa_aead_finish(
117 psa_aead_operation_t *arg0_operation,
118 uint8_t *arg1_ciphertext,
119 size_t arg2_ciphertext_size,
120 size_t *arg3_ciphertext_length,
121 uint8_t *arg4_tag,
122 size_t arg5_tag_size,
123 size_t *arg6_tag_length)
124{
125 psa_status_t status = (psa_aead_finish)(arg0_operation, arg1_ciphertext, arg2_ciphertext_size, arg3_ciphertext_length, arg4_tag, arg5_tag_size, arg6_tag_length);
126 return status;
127}
128
129/* Wrapper for psa_aead_generate_nonce */
130psa_status_t mbedtls_test_wrap_psa_aead_generate_nonce(
131 psa_aead_operation_t *arg0_operation,
132 uint8_t *arg1_nonce,
133 size_t arg2_nonce_size,
134 size_t *arg3_nonce_length)
135{
136 psa_status_t status = (psa_aead_generate_nonce)(arg0_operation, arg1_nonce, arg2_nonce_size, arg3_nonce_length);
137 return status;
138}
139
140/* Wrapper for psa_aead_set_lengths */
141psa_status_t mbedtls_test_wrap_psa_aead_set_lengths(
142 psa_aead_operation_t *arg0_operation,
143 size_t arg1_ad_length,
144 size_t arg2_plaintext_length)
145{
146 psa_status_t status = (psa_aead_set_lengths)(arg0_operation, arg1_ad_length, arg2_plaintext_length);
147 return status;
148}
149
150/* Wrapper for psa_aead_set_nonce */
151psa_status_t mbedtls_test_wrap_psa_aead_set_nonce(
152 psa_aead_operation_t *arg0_operation,
153 const uint8_t *arg1_nonce,
154 size_t arg2_nonce_length)
155{
156 psa_status_t status = (psa_aead_set_nonce)(arg0_operation, arg1_nonce, arg2_nonce_length);
157 return status;
158}
159
160/* Wrapper for psa_aead_update */
161psa_status_t mbedtls_test_wrap_psa_aead_update(
162 psa_aead_operation_t *arg0_operation,
163 const uint8_t *arg1_input,
164 size_t arg2_input_length,
165 uint8_t *arg3_output,
166 size_t arg4_output_size,
167 size_t *arg5_output_length)
168{
169 psa_status_t status = (psa_aead_update)(arg0_operation, arg1_input, arg2_input_length, arg3_output, arg4_output_size, arg5_output_length);
170 return status;
171}
172
173/* Wrapper for psa_aead_update_ad */
174psa_status_t mbedtls_test_wrap_psa_aead_update_ad(
175 psa_aead_operation_t *arg0_operation,
176 const uint8_t *arg1_input,
177 size_t arg2_input_length)
178{
179 psa_status_t status = (psa_aead_update_ad)(arg0_operation, arg1_input, arg2_input_length);
180 return status;
181}
182
183/* Wrapper for psa_aead_verify */
184psa_status_t mbedtls_test_wrap_psa_aead_verify(
185 psa_aead_operation_t *arg0_operation,
186 uint8_t *arg1_plaintext,
187 size_t arg2_plaintext_size,
188 size_t *arg3_plaintext_length,
189 const uint8_t *arg4_tag,
190 size_t arg5_tag_length)
191{
192 psa_status_t status = (psa_aead_verify)(arg0_operation, arg1_plaintext, arg2_plaintext_size, arg3_plaintext_length, arg4_tag, arg5_tag_length);
193 return status;
194}
195
196/* Wrapper for psa_asymmetric_decrypt */
197psa_status_t mbedtls_test_wrap_psa_asymmetric_decrypt(
198 mbedtls_svc_key_id_t arg0_key,
199 psa_algorithm_t arg1_alg,
200 const uint8_t *arg2_input,
201 size_t arg3_input_length,
202 const uint8_t *arg4_salt,
203 size_t arg5_salt_length,
204 uint8_t *arg6_output,
205 size_t arg7_output_size,
206 size_t *arg8_output_length)
207{
208 psa_status_t status = (psa_asymmetric_decrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_salt, arg5_salt_length, arg6_output, arg7_output_size, arg8_output_length);
209 return status;
210}
211
212/* Wrapper for psa_asymmetric_encrypt */
213psa_status_t mbedtls_test_wrap_psa_asymmetric_encrypt(
214 mbedtls_svc_key_id_t arg0_key,
215 psa_algorithm_t arg1_alg,
216 const uint8_t *arg2_input,
217 size_t arg3_input_length,
218 const uint8_t *arg4_salt,
219 size_t arg5_salt_length,
220 uint8_t *arg6_output,
221 size_t arg7_output_size,
222 size_t *arg8_output_length)
223{
Thomas Daubney27b48a32024-01-30 14:04:47 +0000224#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
225 MBEDTLS_TEST_MEMORY_POISON(arg2_input, arg3_input_length);
226 MBEDTLS_TEST_MEMORY_POISON(arg4_salt, arg5_salt_length);
227 MBEDTLS_TEST_MEMORY_POISON(arg6_output, arg7_output_size);
228#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100229 psa_status_t status = (psa_asymmetric_encrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_salt, arg5_salt_length, arg6_output, arg7_output_size, arg8_output_length);
Thomas Daubney27b48a32024-01-30 14:04:47 +0000230#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
231 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_input, arg3_input_length);
232 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_salt, arg5_salt_length);
233 MBEDTLS_TEST_MEMORY_UNPOISON(arg6_output, arg7_output_size);
234#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100235 return status;
236}
237
238/* Wrapper for psa_cipher_abort */
239psa_status_t mbedtls_test_wrap_psa_cipher_abort(
240 psa_cipher_operation_t *arg0_operation)
241{
242 psa_status_t status = (psa_cipher_abort)(arg0_operation);
243 return status;
244}
245
246/* Wrapper for psa_cipher_decrypt */
247psa_status_t mbedtls_test_wrap_psa_cipher_decrypt(
248 mbedtls_svc_key_id_t arg0_key,
249 psa_algorithm_t arg1_alg,
250 const uint8_t *arg2_input,
251 size_t arg3_input_length,
252 uint8_t *arg4_output,
253 size_t arg5_output_size,
254 size_t *arg6_output_length)
255{
256 psa_status_t status = (psa_cipher_decrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_output, arg5_output_size, arg6_output_length);
257 return status;
258}
259
260/* Wrapper for psa_cipher_decrypt_setup */
261psa_status_t mbedtls_test_wrap_psa_cipher_decrypt_setup(
262 psa_cipher_operation_t *arg0_operation,
263 mbedtls_svc_key_id_t arg1_key,
264 psa_algorithm_t arg2_alg)
265{
266 psa_status_t status = (psa_cipher_decrypt_setup)(arg0_operation, arg1_key, arg2_alg);
267 return status;
268}
269
270/* Wrapper for psa_cipher_encrypt */
271psa_status_t mbedtls_test_wrap_psa_cipher_encrypt(
272 mbedtls_svc_key_id_t arg0_key,
273 psa_algorithm_t arg1_alg,
274 const uint8_t *arg2_input,
275 size_t arg3_input_length,
276 uint8_t *arg4_output,
277 size_t arg5_output_size,
278 size_t *arg6_output_length)
279{
Ryan Everett84a666d2024-01-25 12:00:02 +0000280#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
281 MBEDTLS_TEST_MEMORY_POISON(arg2_input, arg3_input_length);
282 MBEDTLS_TEST_MEMORY_POISON(arg4_output, arg5_output_size);
283#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100284 psa_status_t status = (psa_cipher_encrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_output, arg5_output_size, arg6_output_length);
Ryan Everett84a666d2024-01-25 12:00:02 +0000285#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
286 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_input, arg3_input_length);
287 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_output, arg5_output_size);
288#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100289 return status;
290}
291
292/* Wrapper for psa_cipher_encrypt_setup */
293psa_status_t mbedtls_test_wrap_psa_cipher_encrypt_setup(
294 psa_cipher_operation_t *arg0_operation,
295 mbedtls_svc_key_id_t arg1_key,
296 psa_algorithm_t arg2_alg)
297{
298 psa_status_t status = (psa_cipher_encrypt_setup)(arg0_operation, arg1_key, arg2_alg);
299 return status;
300}
301
302/* Wrapper for psa_cipher_finish */
303psa_status_t mbedtls_test_wrap_psa_cipher_finish(
304 psa_cipher_operation_t *arg0_operation,
305 uint8_t *arg1_output,
306 size_t arg2_output_size,
307 size_t *arg3_output_length)
308{
309 psa_status_t status = (psa_cipher_finish)(arg0_operation, arg1_output, arg2_output_size, arg3_output_length);
310 return status;
311}
312
313/* Wrapper for psa_cipher_generate_iv */
314psa_status_t mbedtls_test_wrap_psa_cipher_generate_iv(
315 psa_cipher_operation_t *arg0_operation,
316 uint8_t *arg1_iv,
317 size_t arg2_iv_size,
318 size_t *arg3_iv_length)
319{
320 psa_status_t status = (psa_cipher_generate_iv)(arg0_operation, arg1_iv, arg2_iv_size, arg3_iv_length);
321 return status;
322}
323
324/* Wrapper for psa_cipher_set_iv */
325psa_status_t mbedtls_test_wrap_psa_cipher_set_iv(
326 psa_cipher_operation_t *arg0_operation,
327 const uint8_t *arg1_iv,
328 size_t arg2_iv_length)
329{
330 psa_status_t status = (psa_cipher_set_iv)(arg0_operation, arg1_iv, arg2_iv_length);
331 return status;
332}
333
334/* Wrapper for psa_cipher_update */
335psa_status_t mbedtls_test_wrap_psa_cipher_update(
336 psa_cipher_operation_t *arg0_operation,
337 const uint8_t *arg1_input,
338 size_t arg2_input_length,
339 uint8_t *arg3_output,
340 size_t arg4_output_size,
341 size_t *arg5_output_length)
342{
343 psa_status_t status = (psa_cipher_update)(arg0_operation, arg1_input, arg2_input_length, arg3_output, arg4_output_size, arg5_output_length);
344 return status;
345}
346
347/* Wrapper for psa_copy_key */
348psa_status_t mbedtls_test_wrap_psa_copy_key(
349 mbedtls_svc_key_id_t arg0_source_key,
350 const psa_key_attributes_t *arg1_attributes,
351 mbedtls_svc_key_id_t *arg2_target_key)
352{
353 psa_status_t status = (psa_copy_key)(arg0_source_key, arg1_attributes, arg2_target_key);
354 return status;
355}
356
357/* Wrapper for psa_crypto_driver_pake_get_cipher_suite */
358psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_cipher_suite(
359 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
360 psa_pake_cipher_suite_t *arg1_cipher_suite)
361{
362 psa_status_t status = (psa_crypto_driver_pake_get_cipher_suite)(arg0_inputs, arg1_cipher_suite);
363 return status;
364}
365
366/* Wrapper for psa_crypto_driver_pake_get_password */
367psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_password(
368 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
369 uint8_t *arg1_buffer,
370 size_t arg2_buffer_size,
371 size_t *arg3_buffer_length)
372{
373 psa_status_t status = (psa_crypto_driver_pake_get_password)(arg0_inputs, arg1_buffer, arg2_buffer_size, arg3_buffer_length);
374 return status;
375}
376
377/* Wrapper for psa_crypto_driver_pake_get_password_len */
378psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_password_len(
379 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
380 size_t *arg1_password_len)
381{
382 psa_status_t status = (psa_crypto_driver_pake_get_password_len)(arg0_inputs, arg1_password_len);
383 return status;
384}
385
386/* Wrapper for psa_crypto_driver_pake_get_peer */
387psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_peer(
388 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
389 uint8_t *arg1_peer_id,
390 size_t arg2_peer_id_size,
391 size_t *arg3_peer_id_length)
392{
393 psa_status_t status = (psa_crypto_driver_pake_get_peer)(arg0_inputs, arg1_peer_id, arg2_peer_id_size, arg3_peer_id_length);
394 return status;
395}
396
397/* Wrapper for psa_crypto_driver_pake_get_peer_len */
398psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_peer_len(
399 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
400 size_t *arg1_peer_len)
401{
402 psa_status_t status = (psa_crypto_driver_pake_get_peer_len)(arg0_inputs, arg1_peer_len);
403 return status;
404}
405
406/* Wrapper for psa_crypto_driver_pake_get_user */
407psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_user(
408 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
409 uint8_t *arg1_user_id,
410 size_t arg2_user_id_size,
411 size_t *arg3_user_id_len)
412{
413 psa_status_t status = (psa_crypto_driver_pake_get_user)(arg0_inputs, arg1_user_id, arg2_user_id_size, arg3_user_id_len);
414 return status;
415}
416
417/* Wrapper for psa_crypto_driver_pake_get_user_len */
418psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_user_len(
419 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
420 size_t *arg1_user_len)
421{
422 psa_status_t status = (psa_crypto_driver_pake_get_user_len)(arg0_inputs, arg1_user_len);
423 return status;
424}
425
426/* Wrapper for psa_crypto_init */
427psa_status_t mbedtls_test_wrap_psa_crypto_init(void)
428{
429 psa_status_t status = (psa_crypto_init)();
430 return status;
431}
432
433/* Wrapper for psa_destroy_key */
434psa_status_t mbedtls_test_wrap_psa_destroy_key(
435 mbedtls_svc_key_id_t arg0_key)
436{
437 psa_status_t status = (psa_destroy_key)(arg0_key);
438 return status;
439}
440
441/* Wrapper for psa_export_key */
442psa_status_t mbedtls_test_wrap_psa_export_key(
443 mbedtls_svc_key_id_t arg0_key,
444 uint8_t *arg1_data,
445 size_t arg2_data_size,
446 size_t *arg3_data_length)
447{
Ryan Everett77b91e32024-01-25 10:58:06 +0000448#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
449 MBEDTLS_TEST_MEMORY_POISON(arg1_data, arg2_data_size);
450#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100451 psa_status_t status = (psa_export_key)(arg0_key, arg1_data, arg2_data_size, arg3_data_length);
Ryan Everett77b91e32024-01-25 10:58:06 +0000452#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
453 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_data, arg2_data_size);
454#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100455 return status;
456}
457
458/* Wrapper for psa_export_public_key */
459psa_status_t mbedtls_test_wrap_psa_export_public_key(
460 mbedtls_svc_key_id_t arg0_key,
461 uint8_t *arg1_data,
462 size_t arg2_data_size,
463 size_t *arg3_data_length)
464{
Ryan Everett77b91e32024-01-25 10:58:06 +0000465#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
466 MBEDTLS_TEST_MEMORY_POISON(arg1_data, arg2_data_size);
467#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100468 psa_status_t status = (psa_export_public_key)(arg0_key, arg1_data, arg2_data_size, arg3_data_length);
Ryan Everett77b91e32024-01-25 10:58:06 +0000469#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
470 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_data, arg2_data_size);
471#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100472 return status;
473}
474
475/* Wrapper for psa_generate_key */
476psa_status_t mbedtls_test_wrap_psa_generate_key(
477 const psa_key_attributes_t *arg0_attributes,
478 mbedtls_svc_key_id_t *arg1_key)
479{
480 psa_status_t status = (psa_generate_key)(arg0_attributes, arg1_key);
481 return status;
482}
483
484/* Wrapper for psa_generate_random */
485psa_status_t mbedtls_test_wrap_psa_generate_random(
486 uint8_t *arg0_output,
487 size_t arg1_output_size)
488{
489 psa_status_t status = (psa_generate_random)(arg0_output, arg1_output_size);
490 return status;
491}
492
493/* Wrapper for psa_get_key_attributes */
494psa_status_t mbedtls_test_wrap_psa_get_key_attributes(
495 mbedtls_svc_key_id_t arg0_key,
496 psa_key_attributes_t *arg1_attributes)
497{
498 psa_status_t status = (psa_get_key_attributes)(arg0_key, arg1_attributes);
499 return status;
500}
501
502/* Wrapper for psa_hash_abort */
503psa_status_t mbedtls_test_wrap_psa_hash_abort(
504 psa_hash_operation_t *arg0_operation)
505{
506 psa_status_t status = (psa_hash_abort)(arg0_operation);
507 return status;
508}
509
510/* Wrapper for psa_hash_clone */
511psa_status_t mbedtls_test_wrap_psa_hash_clone(
512 const psa_hash_operation_t *arg0_source_operation,
513 psa_hash_operation_t *arg1_target_operation)
514{
515 psa_status_t status = (psa_hash_clone)(arg0_source_operation, arg1_target_operation);
516 return status;
517}
518
519/* Wrapper for psa_hash_compare */
520psa_status_t mbedtls_test_wrap_psa_hash_compare(
521 psa_algorithm_t arg0_alg,
522 const uint8_t *arg1_input,
523 size_t arg2_input_length,
524 const uint8_t *arg3_hash,
525 size_t arg4_hash_length)
526{
527 psa_status_t status = (psa_hash_compare)(arg0_alg, arg1_input, arg2_input_length, arg3_hash, arg4_hash_length);
528 return status;
529}
530
531/* Wrapper for psa_hash_compute */
532psa_status_t mbedtls_test_wrap_psa_hash_compute(
533 psa_algorithm_t arg0_alg,
534 const uint8_t *arg1_input,
535 size_t arg2_input_length,
536 uint8_t *arg3_hash,
537 size_t arg4_hash_size,
538 size_t *arg5_hash_length)
539{
540 psa_status_t status = (psa_hash_compute)(arg0_alg, arg1_input, arg2_input_length, arg3_hash, arg4_hash_size, arg5_hash_length);
541 return status;
542}
543
544/* Wrapper for psa_hash_finish */
545psa_status_t mbedtls_test_wrap_psa_hash_finish(
546 psa_hash_operation_t *arg0_operation,
547 uint8_t *arg1_hash,
548 size_t arg2_hash_size,
549 size_t *arg3_hash_length)
550{
551 psa_status_t status = (psa_hash_finish)(arg0_operation, arg1_hash, arg2_hash_size, arg3_hash_length);
552 return status;
553}
554
555/* Wrapper for psa_hash_setup */
556psa_status_t mbedtls_test_wrap_psa_hash_setup(
557 psa_hash_operation_t *arg0_operation,
558 psa_algorithm_t arg1_alg)
559{
560 psa_status_t status = (psa_hash_setup)(arg0_operation, arg1_alg);
561 return status;
562}
563
564/* Wrapper for psa_hash_update */
565psa_status_t mbedtls_test_wrap_psa_hash_update(
566 psa_hash_operation_t *arg0_operation,
567 const uint8_t *arg1_input,
568 size_t arg2_input_length)
569{
570 psa_status_t status = (psa_hash_update)(arg0_operation, arg1_input, arg2_input_length);
571 return status;
572}
573
574/* Wrapper for psa_hash_verify */
575psa_status_t mbedtls_test_wrap_psa_hash_verify(
576 psa_hash_operation_t *arg0_operation,
577 const uint8_t *arg1_hash,
578 size_t arg2_hash_length)
579{
580 psa_status_t status = (psa_hash_verify)(arg0_operation, arg1_hash, arg2_hash_length);
581 return status;
582}
583
584/* Wrapper for psa_import_key */
585psa_status_t mbedtls_test_wrap_psa_import_key(
586 const psa_key_attributes_t *arg0_attributes,
587 const uint8_t *arg1_data,
588 size_t arg2_data_length,
589 mbedtls_svc_key_id_t *arg3_key)
590{
Ryan Everett77b91e32024-01-25 10:58:06 +0000591#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
592 MBEDTLS_TEST_MEMORY_POISON(arg1_data, arg2_data_length);
593#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100594 psa_status_t status = (psa_import_key)(arg0_attributes, arg1_data, arg2_data_length, arg3_key);
Ryan Everett77b91e32024-01-25 10:58:06 +0000595#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
596 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_data, arg2_data_length);
597#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100598 return status;
599}
600
601/* Wrapper for psa_key_derivation_abort */
602psa_status_t mbedtls_test_wrap_psa_key_derivation_abort(
603 psa_key_derivation_operation_t *arg0_operation)
604{
605 psa_status_t status = (psa_key_derivation_abort)(arg0_operation);
606 return status;
607}
608
609/* Wrapper for psa_key_derivation_get_capacity */
610psa_status_t mbedtls_test_wrap_psa_key_derivation_get_capacity(
611 const psa_key_derivation_operation_t *arg0_operation,
612 size_t *arg1_capacity)
613{
614 psa_status_t status = (psa_key_derivation_get_capacity)(arg0_operation, arg1_capacity);
615 return status;
616}
617
618/* Wrapper for psa_key_derivation_input_bytes */
619psa_status_t mbedtls_test_wrap_psa_key_derivation_input_bytes(
620 psa_key_derivation_operation_t *arg0_operation,
621 psa_key_derivation_step_t arg1_step,
622 const uint8_t *arg2_data,
623 size_t arg3_data_length)
624{
625 psa_status_t status = (psa_key_derivation_input_bytes)(arg0_operation, arg1_step, arg2_data, arg3_data_length);
626 return status;
627}
628
629/* Wrapper for psa_key_derivation_input_integer */
630psa_status_t mbedtls_test_wrap_psa_key_derivation_input_integer(
631 psa_key_derivation_operation_t *arg0_operation,
632 psa_key_derivation_step_t arg1_step,
633 uint64_t arg2_value)
634{
635 psa_status_t status = (psa_key_derivation_input_integer)(arg0_operation, arg1_step, arg2_value);
636 return status;
637}
638
639/* Wrapper for psa_key_derivation_input_key */
640psa_status_t mbedtls_test_wrap_psa_key_derivation_input_key(
641 psa_key_derivation_operation_t *arg0_operation,
642 psa_key_derivation_step_t arg1_step,
643 mbedtls_svc_key_id_t arg2_key)
644{
645 psa_status_t status = (psa_key_derivation_input_key)(arg0_operation, arg1_step, arg2_key);
646 return status;
647}
648
649/* Wrapper for psa_key_derivation_key_agreement */
650psa_status_t mbedtls_test_wrap_psa_key_derivation_key_agreement(
651 psa_key_derivation_operation_t *arg0_operation,
652 psa_key_derivation_step_t arg1_step,
653 mbedtls_svc_key_id_t arg2_private_key,
654 const uint8_t *arg3_peer_key,
655 size_t arg4_peer_key_length)
656{
657 psa_status_t status = (psa_key_derivation_key_agreement)(arg0_operation, arg1_step, arg2_private_key, arg3_peer_key, arg4_peer_key_length);
658 return status;
659}
660
661/* Wrapper for psa_key_derivation_output_bytes */
662psa_status_t mbedtls_test_wrap_psa_key_derivation_output_bytes(
663 psa_key_derivation_operation_t *arg0_operation,
664 uint8_t *arg1_output,
665 size_t arg2_output_length)
666{
667 psa_status_t status = (psa_key_derivation_output_bytes)(arg0_operation, arg1_output, arg2_output_length);
668 return status;
669}
670
671/* Wrapper for psa_key_derivation_output_key */
672psa_status_t mbedtls_test_wrap_psa_key_derivation_output_key(
673 const psa_key_attributes_t *arg0_attributes,
674 psa_key_derivation_operation_t *arg1_operation,
675 mbedtls_svc_key_id_t *arg2_key)
676{
677 psa_status_t status = (psa_key_derivation_output_key)(arg0_attributes, arg1_operation, arg2_key);
678 return status;
679}
680
681/* Wrapper for psa_key_derivation_set_capacity */
682psa_status_t mbedtls_test_wrap_psa_key_derivation_set_capacity(
683 psa_key_derivation_operation_t *arg0_operation,
684 size_t arg1_capacity)
685{
686 psa_status_t status = (psa_key_derivation_set_capacity)(arg0_operation, arg1_capacity);
687 return status;
688}
689
690/* Wrapper for psa_key_derivation_setup */
691psa_status_t mbedtls_test_wrap_psa_key_derivation_setup(
692 psa_key_derivation_operation_t *arg0_operation,
693 psa_algorithm_t arg1_alg)
694{
695 psa_status_t status = (psa_key_derivation_setup)(arg0_operation, arg1_alg);
696 return status;
697}
698
699/* Wrapper for psa_mac_abort */
700psa_status_t mbedtls_test_wrap_psa_mac_abort(
701 psa_mac_operation_t *arg0_operation)
702{
703 psa_status_t status = (psa_mac_abort)(arg0_operation);
704 return status;
705}
706
707/* Wrapper for psa_mac_compute */
708psa_status_t mbedtls_test_wrap_psa_mac_compute(
709 mbedtls_svc_key_id_t arg0_key,
710 psa_algorithm_t arg1_alg,
711 const uint8_t *arg2_input,
712 size_t arg3_input_length,
713 uint8_t *arg4_mac,
714 size_t arg5_mac_size,
715 size_t *arg6_mac_length)
716{
717 psa_status_t status = (psa_mac_compute)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_mac, arg5_mac_size, arg6_mac_length);
718 return status;
719}
720
721/* Wrapper for psa_mac_sign_finish */
722psa_status_t mbedtls_test_wrap_psa_mac_sign_finish(
723 psa_mac_operation_t *arg0_operation,
724 uint8_t *arg1_mac,
725 size_t arg2_mac_size,
726 size_t *arg3_mac_length)
727{
728 psa_status_t status = (psa_mac_sign_finish)(arg0_operation, arg1_mac, arg2_mac_size, arg3_mac_length);
729 return status;
730}
731
732/* Wrapper for psa_mac_sign_setup */
733psa_status_t mbedtls_test_wrap_psa_mac_sign_setup(
734 psa_mac_operation_t *arg0_operation,
735 mbedtls_svc_key_id_t arg1_key,
736 psa_algorithm_t arg2_alg)
737{
738 psa_status_t status = (psa_mac_sign_setup)(arg0_operation, arg1_key, arg2_alg);
739 return status;
740}
741
742/* Wrapper for psa_mac_update */
743psa_status_t mbedtls_test_wrap_psa_mac_update(
744 psa_mac_operation_t *arg0_operation,
745 const uint8_t *arg1_input,
746 size_t arg2_input_length)
747{
748 psa_status_t status = (psa_mac_update)(arg0_operation, arg1_input, arg2_input_length);
749 return status;
750}
751
752/* Wrapper for psa_mac_verify */
753psa_status_t mbedtls_test_wrap_psa_mac_verify(
754 mbedtls_svc_key_id_t arg0_key,
755 psa_algorithm_t arg1_alg,
756 const uint8_t *arg2_input,
757 size_t arg3_input_length,
758 const uint8_t *arg4_mac,
759 size_t arg5_mac_length)
760{
761 psa_status_t status = (psa_mac_verify)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_mac, arg5_mac_length);
762 return status;
763}
764
765/* Wrapper for psa_mac_verify_finish */
766psa_status_t mbedtls_test_wrap_psa_mac_verify_finish(
767 psa_mac_operation_t *arg0_operation,
768 const uint8_t *arg1_mac,
769 size_t arg2_mac_length)
770{
771 psa_status_t status = (psa_mac_verify_finish)(arg0_operation, arg1_mac, arg2_mac_length);
772 return status;
773}
774
775/* Wrapper for psa_mac_verify_setup */
776psa_status_t mbedtls_test_wrap_psa_mac_verify_setup(
777 psa_mac_operation_t *arg0_operation,
778 mbedtls_svc_key_id_t arg1_key,
779 psa_algorithm_t arg2_alg)
780{
781 psa_status_t status = (psa_mac_verify_setup)(arg0_operation, arg1_key, arg2_alg);
782 return status;
783}
784
785/* Wrapper for psa_pake_abort */
786psa_status_t mbedtls_test_wrap_psa_pake_abort(
787 psa_pake_operation_t *arg0_operation)
788{
789 psa_status_t status = (psa_pake_abort)(arg0_operation);
790 return status;
791}
792
793/* Wrapper for psa_pake_get_implicit_key */
794psa_status_t mbedtls_test_wrap_psa_pake_get_implicit_key(
795 psa_pake_operation_t *arg0_operation,
796 psa_key_derivation_operation_t *arg1_output)
797{
798 psa_status_t status = (psa_pake_get_implicit_key)(arg0_operation, arg1_output);
799 return status;
800}
801
802/* Wrapper for psa_pake_input */
803psa_status_t mbedtls_test_wrap_psa_pake_input(
804 psa_pake_operation_t *arg0_operation,
805 psa_pake_step_t arg1_step,
806 const uint8_t *arg2_input,
807 size_t arg3_input_length)
808{
809 psa_status_t status = (psa_pake_input)(arg0_operation, arg1_step, arg2_input, arg3_input_length);
810 return status;
811}
812
813/* Wrapper for psa_pake_output */
814psa_status_t mbedtls_test_wrap_psa_pake_output(
815 psa_pake_operation_t *arg0_operation,
816 psa_pake_step_t arg1_step,
817 uint8_t *arg2_output,
818 size_t arg3_output_size,
819 size_t *arg4_output_length)
820{
821 psa_status_t status = (psa_pake_output)(arg0_operation, arg1_step, arg2_output, arg3_output_size, arg4_output_length);
822 return status;
823}
824
825/* Wrapper for psa_pake_set_password_key */
826psa_status_t mbedtls_test_wrap_psa_pake_set_password_key(
827 psa_pake_operation_t *arg0_operation,
828 mbedtls_svc_key_id_t arg1_password)
829{
830 psa_status_t status = (psa_pake_set_password_key)(arg0_operation, arg1_password);
831 return status;
832}
833
834/* Wrapper for psa_pake_set_peer */
835psa_status_t mbedtls_test_wrap_psa_pake_set_peer(
836 psa_pake_operation_t *arg0_operation,
837 const uint8_t *arg1_peer_id,
838 size_t arg2_peer_id_len)
839{
840 psa_status_t status = (psa_pake_set_peer)(arg0_operation, arg1_peer_id, arg2_peer_id_len);
841 return status;
842}
843
844/* Wrapper for psa_pake_set_role */
845psa_status_t mbedtls_test_wrap_psa_pake_set_role(
846 psa_pake_operation_t *arg0_operation,
847 psa_pake_role_t arg1_role)
848{
849 psa_status_t status = (psa_pake_set_role)(arg0_operation, arg1_role);
850 return status;
851}
852
853/* Wrapper for psa_pake_set_user */
854psa_status_t mbedtls_test_wrap_psa_pake_set_user(
855 psa_pake_operation_t *arg0_operation,
856 const uint8_t *arg1_user_id,
857 size_t arg2_user_id_len)
858{
859 psa_status_t status = (psa_pake_set_user)(arg0_operation, arg1_user_id, arg2_user_id_len);
860 return status;
861}
862
863/* Wrapper for psa_pake_setup */
864psa_status_t mbedtls_test_wrap_psa_pake_setup(
865 psa_pake_operation_t *arg0_operation,
866 const psa_pake_cipher_suite_t *arg1_cipher_suite)
867{
868 psa_status_t status = (psa_pake_setup)(arg0_operation, arg1_cipher_suite);
869 return status;
870}
871
872/* Wrapper for psa_purge_key */
873psa_status_t mbedtls_test_wrap_psa_purge_key(
874 mbedtls_svc_key_id_t arg0_key)
875{
876 psa_status_t status = (psa_purge_key)(arg0_key);
877 return status;
878}
879
880/* Wrapper for psa_raw_key_agreement */
881psa_status_t mbedtls_test_wrap_psa_raw_key_agreement(
882 psa_algorithm_t arg0_alg,
883 mbedtls_svc_key_id_t arg1_private_key,
884 const uint8_t *arg2_peer_key,
885 size_t arg3_peer_key_length,
886 uint8_t *arg4_output,
887 size_t arg5_output_size,
888 size_t *arg6_output_length)
889{
890 psa_status_t status = (psa_raw_key_agreement)(arg0_alg, arg1_private_key, arg2_peer_key, arg3_peer_key_length, arg4_output, arg5_output_size, arg6_output_length);
891 return status;
892}
893
894/* Wrapper for psa_sign_hash */
895psa_status_t mbedtls_test_wrap_psa_sign_hash(
896 mbedtls_svc_key_id_t arg0_key,
897 psa_algorithm_t arg1_alg,
898 const uint8_t *arg2_hash,
899 size_t arg3_hash_length,
900 uint8_t *arg4_signature,
901 size_t arg5_signature_size,
902 size_t *arg6_signature_length)
903{
Thomas Daubneyf430f472024-01-30 12:25:35 +0000904#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
905 MBEDTLS_TEST_MEMORY_POISON(arg2_hash, arg3_hash_length);
906 MBEDTLS_TEST_MEMORY_POISON(arg4_signature, arg5_signature_size);
907#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100908 psa_status_t status = (psa_sign_hash)(arg0_key, arg1_alg, arg2_hash, arg3_hash_length, arg4_signature, arg5_signature_size, arg6_signature_length);
Thomas Daubneyf430f472024-01-30 12:25:35 +0000909#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
910 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_hash, arg3_hash_length);
911 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_signature, arg5_signature_size);
912#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100913 return status;
914}
915
916/* Wrapper for psa_sign_hash_abort */
917psa_status_t mbedtls_test_wrap_psa_sign_hash_abort(
918 psa_sign_hash_interruptible_operation_t *arg0_operation)
919{
920 psa_status_t status = (psa_sign_hash_abort)(arg0_operation);
921 return status;
922}
923
924/* Wrapper for psa_sign_hash_complete */
925psa_status_t mbedtls_test_wrap_psa_sign_hash_complete(
926 psa_sign_hash_interruptible_operation_t *arg0_operation,
927 uint8_t *arg1_signature,
928 size_t arg2_signature_size,
929 size_t *arg3_signature_length)
930{
931 psa_status_t status = (psa_sign_hash_complete)(arg0_operation, arg1_signature, arg2_signature_size, arg3_signature_length);
932 return status;
933}
934
935/* Wrapper for psa_sign_hash_start */
936psa_status_t mbedtls_test_wrap_psa_sign_hash_start(
937 psa_sign_hash_interruptible_operation_t *arg0_operation,
938 mbedtls_svc_key_id_t arg1_key,
939 psa_algorithm_t arg2_alg,
940 const uint8_t *arg3_hash,
941 size_t arg4_hash_length)
942{
943 psa_status_t status = (psa_sign_hash_start)(arg0_operation, arg1_key, arg2_alg, arg3_hash, arg4_hash_length);
944 return status;
945}
946
947/* Wrapper for psa_sign_message */
948psa_status_t mbedtls_test_wrap_psa_sign_message(
949 mbedtls_svc_key_id_t arg0_key,
950 psa_algorithm_t arg1_alg,
951 const uint8_t *arg2_input,
952 size_t arg3_input_length,
953 uint8_t *arg4_signature,
954 size_t arg5_signature_size,
955 size_t *arg6_signature_length)
956{
Thomas Daubneyf430f472024-01-30 12:25:35 +0000957#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
958 MBEDTLS_TEST_MEMORY_POISON(arg2_input, arg3_input_length);
959 MBEDTLS_TEST_MEMORY_POISON(arg4_signature, arg5_signature_size);
960#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100961 psa_status_t status = (psa_sign_message)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_signature, arg5_signature_size, arg6_signature_length);
Thomas Daubneyf430f472024-01-30 12:25:35 +0000962#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
963 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_input, arg3_input_length);
964 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_signature, arg5_signature_size);
965#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100966 return status;
967}
968
969/* Wrapper for psa_verify_hash */
970psa_status_t mbedtls_test_wrap_psa_verify_hash(
971 mbedtls_svc_key_id_t arg0_key,
972 psa_algorithm_t arg1_alg,
973 const uint8_t *arg2_hash,
974 size_t arg3_hash_length,
975 const uint8_t *arg4_signature,
976 size_t arg5_signature_length)
977{
Thomas Daubneyf430f472024-01-30 12:25:35 +0000978#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
979 MBEDTLS_TEST_MEMORY_POISON(arg2_hash, arg3_hash_length);
980 MBEDTLS_TEST_MEMORY_POISON(arg4_signature, arg5_signature_length);
981#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100982 psa_status_t status = (psa_verify_hash)(arg0_key, arg1_alg, arg2_hash, arg3_hash_length, arg4_signature, arg5_signature_length);
Thomas Daubneyf430f472024-01-30 12:25:35 +0000983#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
984 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_hash, arg3_hash_length);
985 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_signature, arg5_signature_length);
986#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100987 return status;
988}
989
990/* Wrapper for psa_verify_hash_abort */
991psa_status_t mbedtls_test_wrap_psa_verify_hash_abort(
992 psa_verify_hash_interruptible_operation_t *arg0_operation)
993{
994 psa_status_t status = (psa_verify_hash_abort)(arg0_operation);
995 return status;
996}
997
998/* Wrapper for psa_verify_hash_complete */
999psa_status_t mbedtls_test_wrap_psa_verify_hash_complete(
1000 psa_verify_hash_interruptible_operation_t *arg0_operation)
1001{
1002 psa_status_t status = (psa_verify_hash_complete)(arg0_operation);
1003 return status;
1004}
1005
1006/* Wrapper for psa_verify_hash_start */
1007psa_status_t mbedtls_test_wrap_psa_verify_hash_start(
1008 psa_verify_hash_interruptible_operation_t *arg0_operation,
1009 mbedtls_svc_key_id_t arg1_key,
1010 psa_algorithm_t arg2_alg,
1011 const uint8_t *arg3_hash,
1012 size_t arg4_hash_length,
1013 const uint8_t *arg5_signature,
1014 size_t arg6_signature_length)
1015{
1016 psa_status_t status = (psa_verify_hash_start)(arg0_operation, arg1_key, arg2_alg, arg3_hash, arg4_hash_length, arg5_signature, arg6_signature_length);
1017 return status;
1018}
1019
1020/* Wrapper for psa_verify_message */
1021psa_status_t mbedtls_test_wrap_psa_verify_message(
1022 mbedtls_svc_key_id_t arg0_key,
1023 psa_algorithm_t arg1_alg,
1024 const uint8_t *arg2_input,
1025 size_t arg3_input_length,
1026 const uint8_t *arg4_signature,
1027 size_t arg5_signature_length)
1028{
Thomas Daubneyf430f472024-01-30 12:25:35 +00001029#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
1030 MBEDTLS_TEST_MEMORY_POISON(arg2_input, arg3_input_length);
1031 MBEDTLS_TEST_MEMORY_POISON(arg4_signature, arg5_signature_length);
1032#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001033 psa_status_t status = (psa_verify_message)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_signature, arg5_signature_length);
Thomas Daubneyf430f472024-01-30 12:25:35 +00001034#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
1035 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_input, arg3_input_length);
1036 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_signature, arg5_signature_length);
1037#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001038 return status;
1039}
1040
Gilles Peskine4411c9c2024-01-04 20:51:38 +01001041#endif /* defined(MBEDTLS_PSA_CRYPTO_C) && defined(MBEDTLS_TEST_HOOKS) && \
1042 !defined(RECORD_PSA_STATUS_COVERAGE_LOG) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001043
1044/* End of automatically generated file. */