blob: de3714d2ca15e682df7cf2a044be3a97f31e6ce9 [file] [log] [blame]
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001/* Automatically generated by generate_psa_wrappers.py, do not edit! */
2
3/* Copyright The Mbed TLS Contributors
4 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
5 */
6
7#include <mbedtls/build_info.h>
8
Gilles Peskine4411c9c2024-01-04 20:51:38 +01009#if defined(MBEDTLS_PSA_CRYPTO_C) && defined(MBEDTLS_TEST_HOOKS) && \
10 !defined(RECORD_PSA_STATUS_COVERAGE_LOG)
Gilles Peskine6e4332c2024-01-04 16:42:40 +010011
12#include <psa/crypto.h>
13
Gilles Peskine90d14d72024-01-04 16:59:28 +010014#include <test/memory.h>
Gilles Peskine6e4332c2024-01-04 16:42:40 +010015#include <test/psa_crypto_helpers.h>
16#include <test/psa_test_wrappers.h>
17
18/* Wrapper for mbedtls_psa_inject_entropy */
19#if defined(MBEDTLS_PSA_INJECT_ENTROPY)
20psa_status_t mbedtls_test_wrap_mbedtls_psa_inject_entropy(
21 const uint8_t *arg0_seed,
22 size_t arg1_seed_size)
23{
24 psa_status_t status = (mbedtls_psa_inject_entropy)(arg0_seed, arg1_seed_size);
25 return status;
26}
27#endif /* defined(MBEDTLS_PSA_INJECT_ENTROPY) */
28
29/* Wrapper for mbedtls_psa_platform_get_builtin_key */
30#if defined(MBEDTLS_PSA_CRYPTO_BUILTIN_KEYS)
31psa_status_t mbedtls_test_wrap_mbedtls_psa_platform_get_builtin_key(
32 mbedtls_svc_key_id_t arg0_key_id,
33 psa_key_lifetime_t *arg1_lifetime,
34 psa_drv_slot_number_t *arg2_slot_number)
35{
36 psa_status_t status = (mbedtls_psa_platform_get_builtin_key)(arg0_key_id, arg1_lifetime, arg2_slot_number);
37 return status;
38}
39#endif /* defined(MBEDTLS_PSA_CRYPTO_BUILTIN_KEYS) */
40
41/* Wrapper for mbedtls_psa_register_se_key */
42#if defined(MBEDTLS_PSA_CRYPTO_SE_C)
43psa_status_t mbedtls_test_wrap_mbedtls_psa_register_se_key(
44 const psa_key_attributes_t *arg0_attributes)
45{
46 psa_status_t status = (mbedtls_psa_register_se_key)(arg0_attributes);
47 return status;
48}
49#endif /* defined(MBEDTLS_PSA_CRYPTO_SE_C) */
50
51/* Wrapper for psa_aead_abort */
52psa_status_t mbedtls_test_wrap_psa_aead_abort(
53 psa_aead_operation_t *arg0_operation)
54{
55 psa_status_t status = (psa_aead_abort)(arg0_operation);
56 return status;
57}
58
59/* Wrapper for psa_aead_decrypt */
60psa_status_t mbedtls_test_wrap_psa_aead_decrypt(
61 mbedtls_svc_key_id_t arg0_key,
62 psa_algorithm_t arg1_alg,
63 const uint8_t *arg2_nonce,
64 size_t arg3_nonce_length,
65 const uint8_t *arg4_additional_data,
66 size_t arg5_additional_data_length,
67 const uint8_t *arg6_ciphertext,
68 size_t arg7_ciphertext_length,
69 uint8_t *arg8_plaintext,
70 size_t arg9_plaintext_size,
71 size_t *arg10_plaintext_length)
72{
73 psa_status_t status = (psa_aead_decrypt)(arg0_key, arg1_alg, arg2_nonce, arg3_nonce_length, arg4_additional_data, arg5_additional_data_length, arg6_ciphertext, arg7_ciphertext_length, arg8_plaintext, arg9_plaintext_size, arg10_plaintext_length);
74 return status;
75}
76
77/* Wrapper for psa_aead_decrypt_setup */
78psa_status_t mbedtls_test_wrap_psa_aead_decrypt_setup(
79 psa_aead_operation_t *arg0_operation,
80 mbedtls_svc_key_id_t arg1_key,
81 psa_algorithm_t arg2_alg)
82{
83 psa_status_t status = (psa_aead_decrypt_setup)(arg0_operation, arg1_key, arg2_alg);
84 return status;
85}
86
87/* Wrapper for psa_aead_encrypt */
88psa_status_t mbedtls_test_wrap_psa_aead_encrypt(
89 mbedtls_svc_key_id_t arg0_key,
90 psa_algorithm_t arg1_alg,
91 const uint8_t *arg2_nonce,
92 size_t arg3_nonce_length,
93 const uint8_t *arg4_additional_data,
94 size_t arg5_additional_data_length,
95 const uint8_t *arg6_plaintext,
96 size_t arg7_plaintext_length,
97 uint8_t *arg8_ciphertext,
98 size_t arg9_ciphertext_size,
99 size_t *arg10_ciphertext_length)
100{
101 psa_status_t status = (psa_aead_encrypt)(arg0_key, arg1_alg, arg2_nonce, arg3_nonce_length, arg4_additional_data, arg5_additional_data_length, arg6_plaintext, arg7_plaintext_length, arg8_ciphertext, arg9_ciphertext_size, arg10_ciphertext_length);
102 return status;
103}
104
105/* Wrapper for psa_aead_encrypt_setup */
106psa_status_t mbedtls_test_wrap_psa_aead_encrypt_setup(
107 psa_aead_operation_t *arg0_operation,
108 mbedtls_svc_key_id_t arg1_key,
109 psa_algorithm_t arg2_alg)
110{
111 psa_status_t status = (psa_aead_encrypt_setup)(arg0_operation, arg1_key, arg2_alg);
112 return status;
113}
114
115/* Wrapper for psa_aead_finish */
116psa_status_t mbedtls_test_wrap_psa_aead_finish(
117 psa_aead_operation_t *arg0_operation,
118 uint8_t *arg1_ciphertext,
119 size_t arg2_ciphertext_size,
120 size_t *arg3_ciphertext_length,
121 uint8_t *arg4_tag,
122 size_t arg5_tag_size,
123 size_t *arg6_tag_length)
124{
125 psa_status_t status = (psa_aead_finish)(arg0_operation, arg1_ciphertext, arg2_ciphertext_size, arg3_ciphertext_length, arg4_tag, arg5_tag_size, arg6_tag_length);
126 return status;
127}
128
129/* Wrapper for psa_aead_generate_nonce */
130psa_status_t mbedtls_test_wrap_psa_aead_generate_nonce(
131 psa_aead_operation_t *arg0_operation,
132 uint8_t *arg1_nonce,
133 size_t arg2_nonce_size,
134 size_t *arg3_nonce_length)
135{
136 psa_status_t status = (psa_aead_generate_nonce)(arg0_operation, arg1_nonce, arg2_nonce_size, arg3_nonce_length);
137 return status;
138}
139
140/* Wrapper for psa_aead_set_lengths */
141psa_status_t mbedtls_test_wrap_psa_aead_set_lengths(
142 psa_aead_operation_t *arg0_operation,
143 size_t arg1_ad_length,
144 size_t arg2_plaintext_length)
145{
146 psa_status_t status = (psa_aead_set_lengths)(arg0_operation, arg1_ad_length, arg2_plaintext_length);
147 return status;
148}
149
150/* Wrapper for psa_aead_set_nonce */
151psa_status_t mbedtls_test_wrap_psa_aead_set_nonce(
152 psa_aead_operation_t *arg0_operation,
153 const uint8_t *arg1_nonce,
154 size_t arg2_nonce_length)
155{
156 psa_status_t status = (psa_aead_set_nonce)(arg0_operation, arg1_nonce, arg2_nonce_length);
157 return status;
158}
159
160/* Wrapper for psa_aead_update */
161psa_status_t mbedtls_test_wrap_psa_aead_update(
162 psa_aead_operation_t *arg0_operation,
163 const uint8_t *arg1_input,
164 size_t arg2_input_length,
165 uint8_t *arg3_output,
166 size_t arg4_output_size,
167 size_t *arg5_output_length)
168{
169 psa_status_t status = (psa_aead_update)(arg0_operation, arg1_input, arg2_input_length, arg3_output, arg4_output_size, arg5_output_length);
170 return status;
171}
172
173/* Wrapper for psa_aead_update_ad */
174psa_status_t mbedtls_test_wrap_psa_aead_update_ad(
175 psa_aead_operation_t *arg0_operation,
176 const uint8_t *arg1_input,
177 size_t arg2_input_length)
178{
179 psa_status_t status = (psa_aead_update_ad)(arg0_operation, arg1_input, arg2_input_length);
180 return status;
181}
182
183/* Wrapper for psa_aead_verify */
184psa_status_t mbedtls_test_wrap_psa_aead_verify(
185 psa_aead_operation_t *arg0_operation,
186 uint8_t *arg1_plaintext,
187 size_t arg2_plaintext_size,
188 size_t *arg3_plaintext_length,
189 const uint8_t *arg4_tag,
190 size_t arg5_tag_length)
191{
192 psa_status_t status = (psa_aead_verify)(arg0_operation, arg1_plaintext, arg2_plaintext_size, arg3_plaintext_length, arg4_tag, arg5_tag_length);
193 return status;
194}
195
196/* Wrapper for psa_asymmetric_decrypt */
197psa_status_t mbedtls_test_wrap_psa_asymmetric_decrypt(
198 mbedtls_svc_key_id_t arg0_key,
199 psa_algorithm_t arg1_alg,
200 const uint8_t *arg2_input,
201 size_t arg3_input_length,
202 const uint8_t *arg4_salt,
203 size_t arg5_salt_length,
204 uint8_t *arg6_output,
205 size_t arg7_output_size,
206 size_t *arg8_output_length)
207{
208 psa_status_t status = (psa_asymmetric_decrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_salt, arg5_salt_length, arg6_output, arg7_output_size, arg8_output_length);
209 return status;
210}
211
212/* Wrapper for psa_asymmetric_encrypt */
213psa_status_t mbedtls_test_wrap_psa_asymmetric_encrypt(
214 mbedtls_svc_key_id_t arg0_key,
215 psa_algorithm_t arg1_alg,
216 const uint8_t *arg2_input,
217 size_t arg3_input_length,
218 const uint8_t *arg4_salt,
219 size_t arg5_salt_length,
220 uint8_t *arg6_output,
221 size_t arg7_output_size,
222 size_t *arg8_output_length)
223{
224 psa_status_t status = (psa_asymmetric_encrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_salt, arg5_salt_length, arg6_output, arg7_output_size, arg8_output_length);
225 return status;
226}
227
228/* Wrapper for psa_cipher_abort */
229psa_status_t mbedtls_test_wrap_psa_cipher_abort(
230 psa_cipher_operation_t *arg0_operation)
231{
232 psa_status_t status = (psa_cipher_abort)(arg0_operation);
233 return status;
234}
235
236/* Wrapper for psa_cipher_decrypt */
237psa_status_t mbedtls_test_wrap_psa_cipher_decrypt(
238 mbedtls_svc_key_id_t arg0_key,
239 psa_algorithm_t arg1_alg,
240 const uint8_t *arg2_input,
241 size_t arg3_input_length,
242 uint8_t *arg4_output,
243 size_t arg5_output_size,
244 size_t *arg6_output_length)
245{
246 psa_status_t status = (psa_cipher_decrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_output, arg5_output_size, arg6_output_length);
247 return status;
248}
249
250/* Wrapper for psa_cipher_decrypt_setup */
251psa_status_t mbedtls_test_wrap_psa_cipher_decrypt_setup(
252 psa_cipher_operation_t *arg0_operation,
253 mbedtls_svc_key_id_t arg1_key,
254 psa_algorithm_t arg2_alg)
255{
256 psa_status_t status = (psa_cipher_decrypt_setup)(arg0_operation, arg1_key, arg2_alg);
257 return status;
258}
259
260/* Wrapper for psa_cipher_encrypt */
261psa_status_t mbedtls_test_wrap_psa_cipher_encrypt(
262 mbedtls_svc_key_id_t arg0_key,
263 psa_algorithm_t arg1_alg,
264 const uint8_t *arg2_input,
265 size_t arg3_input_length,
266 uint8_t *arg4_output,
267 size_t arg5_output_size,
268 size_t *arg6_output_length)
269{
270 psa_status_t status = (psa_cipher_encrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_output, arg5_output_size, arg6_output_length);
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100271 return status;
272}
273
274/* Wrapper for psa_cipher_encrypt_setup */
275psa_status_t mbedtls_test_wrap_psa_cipher_encrypt_setup(
276 psa_cipher_operation_t *arg0_operation,
277 mbedtls_svc_key_id_t arg1_key,
278 psa_algorithm_t arg2_alg)
279{
280 psa_status_t status = (psa_cipher_encrypt_setup)(arg0_operation, arg1_key, arg2_alg);
281 return status;
282}
283
284/* Wrapper for psa_cipher_finish */
285psa_status_t mbedtls_test_wrap_psa_cipher_finish(
286 psa_cipher_operation_t *arg0_operation,
287 uint8_t *arg1_output,
288 size_t arg2_output_size,
289 size_t *arg3_output_length)
290{
291 psa_status_t status = (psa_cipher_finish)(arg0_operation, arg1_output, arg2_output_size, arg3_output_length);
292 return status;
293}
294
295/* Wrapper for psa_cipher_generate_iv */
296psa_status_t mbedtls_test_wrap_psa_cipher_generate_iv(
297 psa_cipher_operation_t *arg0_operation,
298 uint8_t *arg1_iv,
299 size_t arg2_iv_size,
300 size_t *arg3_iv_length)
301{
302 psa_status_t status = (psa_cipher_generate_iv)(arg0_operation, arg1_iv, arg2_iv_size, arg3_iv_length);
303 return status;
304}
305
306/* Wrapper for psa_cipher_set_iv */
307psa_status_t mbedtls_test_wrap_psa_cipher_set_iv(
308 psa_cipher_operation_t *arg0_operation,
309 const uint8_t *arg1_iv,
310 size_t arg2_iv_length)
311{
312 psa_status_t status = (psa_cipher_set_iv)(arg0_operation, arg1_iv, arg2_iv_length);
313 return status;
314}
315
316/* Wrapper for psa_cipher_update */
317psa_status_t mbedtls_test_wrap_psa_cipher_update(
318 psa_cipher_operation_t *arg0_operation,
319 const uint8_t *arg1_input,
320 size_t arg2_input_length,
321 uint8_t *arg3_output,
322 size_t arg4_output_size,
323 size_t *arg5_output_length)
324{
325 psa_status_t status = (psa_cipher_update)(arg0_operation, arg1_input, arg2_input_length, arg3_output, arg4_output_size, arg5_output_length);
326 return status;
327}
328
329/* Wrapper for psa_copy_key */
330psa_status_t mbedtls_test_wrap_psa_copy_key(
331 mbedtls_svc_key_id_t arg0_source_key,
332 const psa_key_attributes_t *arg1_attributes,
333 mbedtls_svc_key_id_t *arg2_target_key)
334{
335 psa_status_t status = (psa_copy_key)(arg0_source_key, arg1_attributes, arg2_target_key);
336 return status;
337}
338
339/* Wrapper for psa_crypto_driver_pake_get_cipher_suite */
340psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_cipher_suite(
341 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
342 psa_pake_cipher_suite_t *arg1_cipher_suite)
343{
344 psa_status_t status = (psa_crypto_driver_pake_get_cipher_suite)(arg0_inputs, arg1_cipher_suite);
345 return status;
346}
347
348/* Wrapper for psa_crypto_driver_pake_get_password */
349psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_password(
350 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
351 uint8_t *arg1_buffer,
352 size_t arg2_buffer_size,
353 size_t *arg3_buffer_length)
354{
355 psa_status_t status = (psa_crypto_driver_pake_get_password)(arg0_inputs, arg1_buffer, arg2_buffer_size, arg3_buffer_length);
356 return status;
357}
358
359/* Wrapper for psa_crypto_driver_pake_get_password_len */
360psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_password_len(
361 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
362 size_t *arg1_password_len)
363{
364 psa_status_t status = (psa_crypto_driver_pake_get_password_len)(arg0_inputs, arg1_password_len);
365 return status;
366}
367
368/* Wrapper for psa_crypto_driver_pake_get_peer */
369psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_peer(
370 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
371 uint8_t *arg1_peer_id,
372 size_t arg2_peer_id_size,
373 size_t *arg3_peer_id_length)
374{
375 psa_status_t status = (psa_crypto_driver_pake_get_peer)(arg0_inputs, arg1_peer_id, arg2_peer_id_size, arg3_peer_id_length);
376 return status;
377}
378
379/* Wrapper for psa_crypto_driver_pake_get_peer_len */
380psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_peer_len(
381 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
382 size_t *arg1_peer_len)
383{
384 psa_status_t status = (psa_crypto_driver_pake_get_peer_len)(arg0_inputs, arg1_peer_len);
385 return status;
386}
387
388/* Wrapper for psa_crypto_driver_pake_get_user */
389psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_user(
390 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
391 uint8_t *arg1_user_id,
392 size_t arg2_user_id_size,
393 size_t *arg3_user_id_len)
394{
395 psa_status_t status = (psa_crypto_driver_pake_get_user)(arg0_inputs, arg1_user_id, arg2_user_id_size, arg3_user_id_len);
396 return status;
397}
398
399/* Wrapper for psa_crypto_driver_pake_get_user_len */
400psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_user_len(
401 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
402 size_t *arg1_user_len)
403{
404 psa_status_t status = (psa_crypto_driver_pake_get_user_len)(arg0_inputs, arg1_user_len);
405 return status;
406}
407
408/* Wrapper for psa_crypto_init */
409psa_status_t mbedtls_test_wrap_psa_crypto_init(void)
410{
411 psa_status_t status = (psa_crypto_init)();
412 return status;
413}
414
415/* Wrapper for psa_destroy_key */
416psa_status_t mbedtls_test_wrap_psa_destroy_key(
417 mbedtls_svc_key_id_t arg0_key)
418{
419 psa_status_t status = (psa_destroy_key)(arg0_key);
420 return status;
421}
422
423/* Wrapper for psa_export_key */
424psa_status_t mbedtls_test_wrap_psa_export_key(
425 mbedtls_svc_key_id_t arg0_key,
426 uint8_t *arg1_data,
427 size_t arg2_data_size,
428 size_t *arg3_data_length)
429{
Ryan Everett77b91e32024-01-25 10:58:06 +0000430#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
431 MBEDTLS_TEST_MEMORY_POISON(arg1_data, arg2_data_size);
432#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100433 psa_status_t status = (psa_export_key)(arg0_key, arg1_data, arg2_data_size, arg3_data_length);
Ryan Everett77b91e32024-01-25 10:58:06 +0000434#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
435 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_data, arg2_data_size);
436#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100437 return status;
438}
439
440/* Wrapper for psa_export_public_key */
441psa_status_t mbedtls_test_wrap_psa_export_public_key(
442 mbedtls_svc_key_id_t arg0_key,
443 uint8_t *arg1_data,
444 size_t arg2_data_size,
445 size_t *arg3_data_length)
446{
Ryan Everett77b91e32024-01-25 10:58:06 +0000447#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
448 MBEDTLS_TEST_MEMORY_POISON(arg1_data, arg2_data_size);
449#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100450 psa_status_t status = (psa_export_public_key)(arg0_key, arg1_data, arg2_data_size, arg3_data_length);
Ryan Everett77b91e32024-01-25 10:58:06 +0000451#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
452 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_data, arg2_data_size);
453#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100454 return status;
455}
456
457/* Wrapper for psa_generate_key */
458psa_status_t mbedtls_test_wrap_psa_generate_key(
459 const psa_key_attributes_t *arg0_attributes,
460 mbedtls_svc_key_id_t *arg1_key)
461{
462 psa_status_t status = (psa_generate_key)(arg0_attributes, arg1_key);
463 return status;
464}
465
466/* Wrapper for psa_generate_random */
467psa_status_t mbedtls_test_wrap_psa_generate_random(
468 uint8_t *arg0_output,
469 size_t arg1_output_size)
470{
471 psa_status_t status = (psa_generate_random)(arg0_output, arg1_output_size);
472 return status;
473}
474
475/* Wrapper for psa_get_key_attributes */
476psa_status_t mbedtls_test_wrap_psa_get_key_attributes(
477 mbedtls_svc_key_id_t arg0_key,
478 psa_key_attributes_t *arg1_attributes)
479{
480 psa_status_t status = (psa_get_key_attributes)(arg0_key, arg1_attributes);
481 return status;
482}
483
484/* Wrapper for psa_hash_abort */
485psa_status_t mbedtls_test_wrap_psa_hash_abort(
486 psa_hash_operation_t *arg0_operation)
487{
488 psa_status_t status = (psa_hash_abort)(arg0_operation);
489 return status;
490}
491
492/* Wrapper for psa_hash_clone */
493psa_status_t mbedtls_test_wrap_psa_hash_clone(
494 const psa_hash_operation_t *arg0_source_operation,
495 psa_hash_operation_t *arg1_target_operation)
496{
497 psa_status_t status = (psa_hash_clone)(arg0_source_operation, arg1_target_operation);
498 return status;
499}
500
501/* Wrapper for psa_hash_compare */
502psa_status_t mbedtls_test_wrap_psa_hash_compare(
503 psa_algorithm_t arg0_alg,
504 const uint8_t *arg1_input,
505 size_t arg2_input_length,
506 const uint8_t *arg3_hash,
507 size_t arg4_hash_length)
508{
509 psa_status_t status = (psa_hash_compare)(arg0_alg, arg1_input, arg2_input_length, arg3_hash, arg4_hash_length);
510 return status;
511}
512
513/* Wrapper for psa_hash_compute */
514psa_status_t mbedtls_test_wrap_psa_hash_compute(
515 psa_algorithm_t arg0_alg,
516 const uint8_t *arg1_input,
517 size_t arg2_input_length,
518 uint8_t *arg3_hash,
519 size_t arg4_hash_size,
520 size_t *arg5_hash_length)
521{
522 psa_status_t status = (psa_hash_compute)(arg0_alg, arg1_input, arg2_input_length, arg3_hash, arg4_hash_size, arg5_hash_length);
523 return status;
524}
525
526/* Wrapper for psa_hash_finish */
527psa_status_t mbedtls_test_wrap_psa_hash_finish(
528 psa_hash_operation_t *arg0_operation,
529 uint8_t *arg1_hash,
530 size_t arg2_hash_size,
531 size_t *arg3_hash_length)
532{
533 psa_status_t status = (psa_hash_finish)(arg0_operation, arg1_hash, arg2_hash_size, arg3_hash_length);
534 return status;
535}
536
537/* Wrapper for psa_hash_setup */
538psa_status_t mbedtls_test_wrap_psa_hash_setup(
539 psa_hash_operation_t *arg0_operation,
540 psa_algorithm_t arg1_alg)
541{
542 psa_status_t status = (psa_hash_setup)(arg0_operation, arg1_alg);
543 return status;
544}
545
546/* Wrapper for psa_hash_update */
547psa_status_t mbedtls_test_wrap_psa_hash_update(
548 psa_hash_operation_t *arg0_operation,
549 const uint8_t *arg1_input,
550 size_t arg2_input_length)
551{
552 psa_status_t status = (psa_hash_update)(arg0_operation, arg1_input, arg2_input_length);
553 return status;
554}
555
556/* Wrapper for psa_hash_verify */
557psa_status_t mbedtls_test_wrap_psa_hash_verify(
558 psa_hash_operation_t *arg0_operation,
559 const uint8_t *arg1_hash,
560 size_t arg2_hash_length)
561{
562 psa_status_t status = (psa_hash_verify)(arg0_operation, arg1_hash, arg2_hash_length);
563 return status;
564}
565
566/* Wrapper for psa_import_key */
567psa_status_t mbedtls_test_wrap_psa_import_key(
568 const psa_key_attributes_t *arg0_attributes,
569 const uint8_t *arg1_data,
570 size_t arg2_data_length,
571 mbedtls_svc_key_id_t *arg3_key)
572{
Ryan Everett77b91e32024-01-25 10:58:06 +0000573#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
574 MBEDTLS_TEST_MEMORY_POISON(arg1_data, arg2_data_length);
575#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100576 psa_status_t status = (psa_import_key)(arg0_attributes, arg1_data, arg2_data_length, arg3_key);
Ryan Everett77b91e32024-01-25 10:58:06 +0000577#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
578 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_data, arg2_data_length);
579#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100580 return status;
581}
582
583/* Wrapper for psa_key_derivation_abort */
584psa_status_t mbedtls_test_wrap_psa_key_derivation_abort(
585 psa_key_derivation_operation_t *arg0_operation)
586{
587 psa_status_t status = (psa_key_derivation_abort)(arg0_operation);
588 return status;
589}
590
591/* Wrapper for psa_key_derivation_get_capacity */
592psa_status_t mbedtls_test_wrap_psa_key_derivation_get_capacity(
593 const psa_key_derivation_operation_t *arg0_operation,
594 size_t *arg1_capacity)
595{
596 psa_status_t status = (psa_key_derivation_get_capacity)(arg0_operation, arg1_capacity);
597 return status;
598}
599
600/* Wrapper for psa_key_derivation_input_bytes */
601psa_status_t mbedtls_test_wrap_psa_key_derivation_input_bytes(
602 psa_key_derivation_operation_t *arg0_operation,
603 psa_key_derivation_step_t arg1_step,
604 const uint8_t *arg2_data,
605 size_t arg3_data_length)
606{
607 psa_status_t status = (psa_key_derivation_input_bytes)(arg0_operation, arg1_step, arg2_data, arg3_data_length);
608 return status;
609}
610
611/* Wrapper for psa_key_derivation_input_integer */
612psa_status_t mbedtls_test_wrap_psa_key_derivation_input_integer(
613 psa_key_derivation_operation_t *arg0_operation,
614 psa_key_derivation_step_t arg1_step,
615 uint64_t arg2_value)
616{
617 psa_status_t status = (psa_key_derivation_input_integer)(arg0_operation, arg1_step, arg2_value);
618 return status;
619}
620
621/* Wrapper for psa_key_derivation_input_key */
622psa_status_t mbedtls_test_wrap_psa_key_derivation_input_key(
623 psa_key_derivation_operation_t *arg0_operation,
624 psa_key_derivation_step_t arg1_step,
625 mbedtls_svc_key_id_t arg2_key)
626{
627 psa_status_t status = (psa_key_derivation_input_key)(arg0_operation, arg1_step, arg2_key);
628 return status;
629}
630
631/* Wrapper for psa_key_derivation_key_agreement */
632psa_status_t mbedtls_test_wrap_psa_key_derivation_key_agreement(
633 psa_key_derivation_operation_t *arg0_operation,
634 psa_key_derivation_step_t arg1_step,
635 mbedtls_svc_key_id_t arg2_private_key,
636 const uint8_t *arg3_peer_key,
637 size_t arg4_peer_key_length)
638{
639 psa_status_t status = (psa_key_derivation_key_agreement)(arg0_operation, arg1_step, arg2_private_key, arg3_peer_key, arg4_peer_key_length);
640 return status;
641}
642
643/* Wrapper for psa_key_derivation_output_bytes */
644psa_status_t mbedtls_test_wrap_psa_key_derivation_output_bytes(
645 psa_key_derivation_operation_t *arg0_operation,
646 uint8_t *arg1_output,
647 size_t arg2_output_length)
648{
649 psa_status_t status = (psa_key_derivation_output_bytes)(arg0_operation, arg1_output, arg2_output_length);
650 return status;
651}
652
653/* Wrapper for psa_key_derivation_output_key */
654psa_status_t mbedtls_test_wrap_psa_key_derivation_output_key(
655 const psa_key_attributes_t *arg0_attributes,
656 psa_key_derivation_operation_t *arg1_operation,
657 mbedtls_svc_key_id_t *arg2_key)
658{
659 psa_status_t status = (psa_key_derivation_output_key)(arg0_attributes, arg1_operation, arg2_key);
660 return status;
661}
662
663/* Wrapper for psa_key_derivation_set_capacity */
664psa_status_t mbedtls_test_wrap_psa_key_derivation_set_capacity(
665 psa_key_derivation_operation_t *arg0_operation,
666 size_t arg1_capacity)
667{
668 psa_status_t status = (psa_key_derivation_set_capacity)(arg0_operation, arg1_capacity);
669 return status;
670}
671
672/* Wrapper for psa_key_derivation_setup */
673psa_status_t mbedtls_test_wrap_psa_key_derivation_setup(
674 psa_key_derivation_operation_t *arg0_operation,
675 psa_algorithm_t arg1_alg)
676{
677 psa_status_t status = (psa_key_derivation_setup)(arg0_operation, arg1_alg);
678 return status;
679}
680
681/* Wrapper for psa_mac_abort */
682psa_status_t mbedtls_test_wrap_psa_mac_abort(
683 psa_mac_operation_t *arg0_operation)
684{
685 psa_status_t status = (psa_mac_abort)(arg0_operation);
686 return status;
687}
688
689/* Wrapper for psa_mac_compute */
690psa_status_t mbedtls_test_wrap_psa_mac_compute(
691 mbedtls_svc_key_id_t arg0_key,
692 psa_algorithm_t arg1_alg,
693 const uint8_t *arg2_input,
694 size_t arg3_input_length,
695 uint8_t *arg4_mac,
696 size_t arg5_mac_size,
697 size_t *arg6_mac_length)
698{
699 psa_status_t status = (psa_mac_compute)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_mac, arg5_mac_size, arg6_mac_length);
700 return status;
701}
702
703/* Wrapper for psa_mac_sign_finish */
704psa_status_t mbedtls_test_wrap_psa_mac_sign_finish(
705 psa_mac_operation_t *arg0_operation,
706 uint8_t *arg1_mac,
707 size_t arg2_mac_size,
708 size_t *arg3_mac_length)
709{
710 psa_status_t status = (psa_mac_sign_finish)(arg0_operation, arg1_mac, arg2_mac_size, arg3_mac_length);
711 return status;
712}
713
714/* Wrapper for psa_mac_sign_setup */
715psa_status_t mbedtls_test_wrap_psa_mac_sign_setup(
716 psa_mac_operation_t *arg0_operation,
717 mbedtls_svc_key_id_t arg1_key,
718 psa_algorithm_t arg2_alg)
719{
720 psa_status_t status = (psa_mac_sign_setup)(arg0_operation, arg1_key, arg2_alg);
721 return status;
722}
723
724/* Wrapper for psa_mac_update */
725psa_status_t mbedtls_test_wrap_psa_mac_update(
726 psa_mac_operation_t *arg0_operation,
727 const uint8_t *arg1_input,
728 size_t arg2_input_length)
729{
730 psa_status_t status = (psa_mac_update)(arg0_operation, arg1_input, arg2_input_length);
731 return status;
732}
733
734/* Wrapper for psa_mac_verify */
735psa_status_t mbedtls_test_wrap_psa_mac_verify(
736 mbedtls_svc_key_id_t arg0_key,
737 psa_algorithm_t arg1_alg,
738 const uint8_t *arg2_input,
739 size_t arg3_input_length,
740 const uint8_t *arg4_mac,
741 size_t arg5_mac_length)
742{
743 psa_status_t status = (psa_mac_verify)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_mac, arg5_mac_length);
744 return status;
745}
746
747/* Wrapper for psa_mac_verify_finish */
748psa_status_t mbedtls_test_wrap_psa_mac_verify_finish(
749 psa_mac_operation_t *arg0_operation,
750 const uint8_t *arg1_mac,
751 size_t arg2_mac_length)
752{
753 psa_status_t status = (psa_mac_verify_finish)(arg0_operation, arg1_mac, arg2_mac_length);
754 return status;
755}
756
757/* Wrapper for psa_mac_verify_setup */
758psa_status_t mbedtls_test_wrap_psa_mac_verify_setup(
759 psa_mac_operation_t *arg0_operation,
760 mbedtls_svc_key_id_t arg1_key,
761 psa_algorithm_t arg2_alg)
762{
763 psa_status_t status = (psa_mac_verify_setup)(arg0_operation, arg1_key, arg2_alg);
764 return status;
765}
766
767/* Wrapper for psa_pake_abort */
768psa_status_t mbedtls_test_wrap_psa_pake_abort(
769 psa_pake_operation_t *arg0_operation)
770{
771 psa_status_t status = (psa_pake_abort)(arg0_operation);
772 return status;
773}
774
775/* Wrapper for psa_pake_get_implicit_key */
776psa_status_t mbedtls_test_wrap_psa_pake_get_implicit_key(
777 psa_pake_operation_t *arg0_operation,
778 psa_key_derivation_operation_t *arg1_output)
779{
780 psa_status_t status = (psa_pake_get_implicit_key)(arg0_operation, arg1_output);
781 return status;
782}
783
784/* Wrapper for psa_pake_input */
785psa_status_t mbedtls_test_wrap_psa_pake_input(
786 psa_pake_operation_t *arg0_operation,
787 psa_pake_step_t arg1_step,
788 const uint8_t *arg2_input,
789 size_t arg3_input_length)
790{
791 psa_status_t status = (psa_pake_input)(arg0_operation, arg1_step, arg2_input, arg3_input_length);
792 return status;
793}
794
795/* Wrapper for psa_pake_output */
796psa_status_t mbedtls_test_wrap_psa_pake_output(
797 psa_pake_operation_t *arg0_operation,
798 psa_pake_step_t arg1_step,
799 uint8_t *arg2_output,
800 size_t arg3_output_size,
801 size_t *arg4_output_length)
802{
803 psa_status_t status = (psa_pake_output)(arg0_operation, arg1_step, arg2_output, arg3_output_size, arg4_output_length);
804 return status;
805}
806
807/* Wrapper for psa_pake_set_password_key */
808psa_status_t mbedtls_test_wrap_psa_pake_set_password_key(
809 psa_pake_operation_t *arg0_operation,
810 mbedtls_svc_key_id_t arg1_password)
811{
812 psa_status_t status = (psa_pake_set_password_key)(arg0_operation, arg1_password);
813 return status;
814}
815
816/* Wrapper for psa_pake_set_peer */
817psa_status_t mbedtls_test_wrap_psa_pake_set_peer(
818 psa_pake_operation_t *arg0_operation,
819 const uint8_t *arg1_peer_id,
820 size_t arg2_peer_id_len)
821{
822 psa_status_t status = (psa_pake_set_peer)(arg0_operation, arg1_peer_id, arg2_peer_id_len);
823 return status;
824}
825
826/* Wrapper for psa_pake_set_role */
827psa_status_t mbedtls_test_wrap_psa_pake_set_role(
828 psa_pake_operation_t *arg0_operation,
829 psa_pake_role_t arg1_role)
830{
831 psa_status_t status = (psa_pake_set_role)(arg0_operation, arg1_role);
832 return status;
833}
834
835/* Wrapper for psa_pake_set_user */
836psa_status_t mbedtls_test_wrap_psa_pake_set_user(
837 psa_pake_operation_t *arg0_operation,
838 const uint8_t *arg1_user_id,
839 size_t arg2_user_id_len)
840{
841 psa_status_t status = (psa_pake_set_user)(arg0_operation, arg1_user_id, arg2_user_id_len);
842 return status;
843}
844
845/* Wrapper for psa_pake_setup */
846psa_status_t mbedtls_test_wrap_psa_pake_setup(
847 psa_pake_operation_t *arg0_operation,
848 const psa_pake_cipher_suite_t *arg1_cipher_suite)
849{
850 psa_status_t status = (psa_pake_setup)(arg0_operation, arg1_cipher_suite);
851 return status;
852}
853
854/* Wrapper for psa_purge_key */
855psa_status_t mbedtls_test_wrap_psa_purge_key(
856 mbedtls_svc_key_id_t arg0_key)
857{
858 psa_status_t status = (psa_purge_key)(arg0_key);
859 return status;
860}
861
862/* Wrapper for psa_raw_key_agreement */
863psa_status_t mbedtls_test_wrap_psa_raw_key_agreement(
864 psa_algorithm_t arg0_alg,
865 mbedtls_svc_key_id_t arg1_private_key,
866 const uint8_t *arg2_peer_key,
867 size_t arg3_peer_key_length,
868 uint8_t *arg4_output,
869 size_t arg5_output_size,
870 size_t *arg6_output_length)
871{
872 psa_status_t status = (psa_raw_key_agreement)(arg0_alg, arg1_private_key, arg2_peer_key, arg3_peer_key_length, arg4_output, arg5_output_size, arg6_output_length);
873 return status;
874}
875
876/* Wrapper for psa_sign_hash */
877psa_status_t mbedtls_test_wrap_psa_sign_hash(
878 mbedtls_svc_key_id_t arg0_key,
879 psa_algorithm_t arg1_alg,
880 const uint8_t *arg2_hash,
881 size_t arg3_hash_length,
882 uint8_t *arg4_signature,
883 size_t arg5_signature_size,
884 size_t *arg6_signature_length)
885{
Thomas Daubneyf430f472024-01-30 12:25:35 +0000886#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
887 MBEDTLS_TEST_MEMORY_POISON(arg2_hash, arg3_hash_length);
888 MBEDTLS_TEST_MEMORY_POISON(arg4_signature, arg5_signature_size);
889#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100890 psa_status_t status = (psa_sign_hash)(arg0_key, arg1_alg, arg2_hash, arg3_hash_length, arg4_signature, arg5_signature_size, arg6_signature_length);
Thomas Daubneyf430f472024-01-30 12:25:35 +0000891#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
892 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_hash, arg3_hash_length);
893 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_signature, arg5_signature_size);
894#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100895 return status;
896}
897
898/* Wrapper for psa_sign_hash_abort */
899psa_status_t mbedtls_test_wrap_psa_sign_hash_abort(
900 psa_sign_hash_interruptible_operation_t *arg0_operation)
901{
902 psa_status_t status = (psa_sign_hash_abort)(arg0_operation);
903 return status;
904}
905
906/* Wrapper for psa_sign_hash_complete */
907psa_status_t mbedtls_test_wrap_psa_sign_hash_complete(
908 psa_sign_hash_interruptible_operation_t *arg0_operation,
909 uint8_t *arg1_signature,
910 size_t arg2_signature_size,
911 size_t *arg3_signature_length)
912{
913 psa_status_t status = (psa_sign_hash_complete)(arg0_operation, arg1_signature, arg2_signature_size, arg3_signature_length);
914 return status;
915}
916
917/* Wrapper for psa_sign_hash_start */
918psa_status_t mbedtls_test_wrap_psa_sign_hash_start(
919 psa_sign_hash_interruptible_operation_t *arg0_operation,
920 mbedtls_svc_key_id_t arg1_key,
921 psa_algorithm_t arg2_alg,
922 const uint8_t *arg3_hash,
923 size_t arg4_hash_length)
924{
925 psa_status_t status = (psa_sign_hash_start)(arg0_operation, arg1_key, arg2_alg, arg3_hash, arg4_hash_length);
926 return status;
927}
928
929/* Wrapper for psa_sign_message */
930psa_status_t mbedtls_test_wrap_psa_sign_message(
931 mbedtls_svc_key_id_t arg0_key,
932 psa_algorithm_t arg1_alg,
933 const uint8_t *arg2_input,
934 size_t arg3_input_length,
935 uint8_t *arg4_signature,
936 size_t arg5_signature_size,
937 size_t *arg6_signature_length)
938{
Thomas Daubneyf430f472024-01-30 12:25:35 +0000939#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
940 MBEDTLS_TEST_MEMORY_POISON(arg2_input, arg3_input_length);
941 MBEDTLS_TEST_MEMORY_POISON(arg4_signature, arg5_signature_size);
942#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100943 psa_status_t status = (psa_sign_message)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_signature, arg5_signature_size, arg6_signature_length);
Thomas Daubneyf430f472024-01-30 12:25:35 +0000944#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
945 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_input, arg3_input_length);
946 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_signature, arg5_signature_size);
947#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100948 return status;
949}
950
951/* Wrapper for psa_verify_hash */
952psa_status_t mbedtls_test_wrap_psa_verify_hash(
953 mbedtls_svc_key_id_t arg0_key,
954 psa_algorithm_t arg1_alg,
955 const uint8_t *arg2_hash,
956 size_t arg3_hash_length,
957 const uint8_t *arg4_signature,
958 size_t arg5_signature_length)
959{
Thomas Daubneyf430f472024-01-30 12:25:35 +0000960#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
961 MBEDTLS_TEST_MEMORY_POISON(arg2_hash, arg3_hash_length);
962 MBEDTLS_TEST_MEMORY_POISON(arg4_signature, arg5_signature_length);
963#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100964 psa_status_t status = (psa_verify_hash)(arg0_key, arg1_alg, arg2_hash, arg3_hash_length, arg4_signature, arg5_signature_length);
Thomas Daubneyf430f472024-01-30 12:25:35 +0000965#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
966 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_hash, arg3_hash_length);
967 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_signature, arg5_signature_length);
968#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100969 return status;
970}
971
972/* Wrapper for psa_verify_hash_abort */
973psa_status_t mbedtls_test_wrap_psa_verify_hash_abort(
974 psa_verify_hash_interruptible_operation_t *arg0_operation)
975{
976 psa_status_t status = (psa_verify_hash_abort)(arg0_operation);
977 return status;
978}
979
980/* Wrapper for psa_verify_hash_complete */
981psa_status_t mbedtls_test_wrap_psa_verify_hash_complete(
982 psa_verify_hash_interruptible_operation_t *arg0_operation)
983{
984 psa_status_t status = (psa_verify_hash_complete)(arg0_operation);
985 return status;
986}
987
988/* Wrapper for psa_verify_hash_start */
989psa_status_t mbedtls_test_wrap_psa_verify_hash_start(
990 psa_verify_hash_interruptible_operation_t *arg0_operation,
991 mbedtls_svc_key_id_t arg1_key,
992 psa_algorithm_t arg2_alg,
993 const uint8_t *arg3_hash,
994 size_t arg4_hash_length,
995 const uint8_t *arg5_signature,
996 size_t arg6_signature_length)
997{
998 psa_status_t status = (psa_verify_hash_start)(arg0_operation, arg1_key, arg2_alg, arg3_hash, arg4_hash_length, arg5_signature, arg6_signature_length);
999 return status;
1000}
1001
1002/* Wrapper for psa_verify_message */
1003psa_status_t mbedtls_test_wrap_psa_verify_message(
1004 mbedtls_svc_key_id_t arg0_key,
1005 psa_algorithm_t arg1_alg,
1006 const uint8_t *arg2_input,
1007 size_t arg3_input_length,
1008 const uint8_t *arg4_signature,
1009 size_t arg5_signature_length)
1010{
Thomas Daubneyf430f472024-01-30 12:25:35 +00001011#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
1012 MBEDTLS_TEST_MEMORY_POISON(arg2_input, arg3_input_length);
1013 MBEDTLS_TEST_MEMORY_POISON(arg4_signature, arg5_signature_length);
1014#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001015 psa_status_t status = (psa_verify_message)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_signature, arg5_signature_length);
Thomas Daubneyf430f472024-01-30 12:25:35 +00001016#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
1017 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_input, arg3_input_length);
1018 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_signature, arg5_signature_length);
1019#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001020 return status;
1021}
1022
Gilles Peskine4411c9c2024-01-04 20:51:38 +01001023#endif /* defined(MBEDTLS_PSA_CRYPTO_C) && defined(MBEDTLS_TEST_HOOKS) && \
1024 !defined(RECORD_PSA_STATUS_COVERAGE_LOG) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001025
1026/* End of automatically generated file. */