blob: f3fb852e16395b36e77eeab75140d40ff359df9b [file] [log] [blame]
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001/* Automatically generated by generate_psa_wrappers.py, do not edit! */
2
3/* Copyright The Mbed TLS Contributors
4 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
5 */
6
7#include <mbedtls/build_info.h>
8
9#if defined(MBEDTLS_PSA_CRYPTO_C) && defined(MBEDTLS_TEST_HOOKS)
10
11#include <psa/crypto.h>
12
Gilles Peskine90d14d72024-01-04 16:59:28 +010013#include <test/memory.h>
Gilles Peskine6e4332c2024-01-04 16:42:40 +010014#include <test/psa_crypto_helpers.h>
15#include <test/psa_test_wrappers.h>
16
17/* Wrapper for mbedtls_psa_inject_entropy */
18#if defined(MBEDTLS_PSA_INJECT_ENTROPY)
19psa_status_t mbedtls_test_wrap_mbedtls_psa_inject_entropy(
20 const uint8_t *arg0_seed,
21 size_t arg1_seed_size)
22{
23 psa_status_t status = (mbedtls_psa_inject_entropy)(arg0_seed, arg1_seed_size);
24 return status;
25}
26#endif /* defined(MBEDTLS_PSA_INJECT_ENTROPY) */
27
28/* Wrapper for mbedtls_psa_platform_get_builtin_key */
29#if defined(MBEDTLS_PSA_CRYPTO_BUILTIN_KEYS)
30psa_status_t mbedtls_test_wrap_mbedtls_psa_platform_get_builtin_key(
31 mbedtls_svc_key_id_t arg0_key_id,
32 psa_key_lifetime_t *arg1_lifetime,
33 psa_drv_slot_number_t *arg2_slot_number)
34{
35 psa_status_t status = (mbedtls_psa_platform_get_builtin_key)(arg0_key_id, arg1_lifetime, arg2_slot_number);
36 return status;
37}
38#endif /* defined(MBEDTLS_PSA_CRYPTO_BUILTIN_KEYS) */
39
40/* Wrapper for mbedtls_psa_register_se_key */
41#if defined(MBEDTLS_PSA_CRYPTO_SE_C)
42psa_status_t mbedtls_test_wrap_mbedtls_psa_register_se_key(
43 const psa_key_attributes_t *arg0_attributes)
44{
45 psa_status_t status = (mbedtls_psa_register_se_key)(arg0_attributes);
46 return status;
47}
48#endif /* defined(MBEDTLS_PSA_CRYPTO_SE_C) */
49
50/* Wrapper for psa_aead_abort */
51psa_status_t mbedtls_test_wrap_psa_aead_abort(
52 psa_aead_operation_t *arg0_operation)
53{
54 psa_status_t status = (psa_aead_abort)(arg0_operation);
55 return status;
56}
57
58/* Wrapper for psa_aead_decrypt */
59psa_status_t mbedtls_test_wrap_psa_aead_decrypt(
60 mbedtls_svc_key_id_t arg0_key,
61 psa_algorithm_t arg1_alg,
62 const uint8_t *arg2_nonce,
63 size_t arg3_nonce_length,
64 const uint8_t *arg4_additional_data,
65 size_t arg5_additional_data_length,
66 const uint8_t *arg6_ciphertext,
67 size_t arg7_ciphertext_length,
68 uint8_t *arg8_plaintext,
69 size_t arg9_plaintext_size,
70 size_t *arg10_plaintext_length)
71{
72 psa_status_t status = (psa_aead_decrypt)(arg0_key, arg1_alg, arg2_nonce, arg3_nonce_length, arg4_additional_data, arg5_additional_data_length, arg6_ciphertext, arg7_ciphertext_length, arg8_plaintext, arg9_plaintext_size, arg10_plaintext_length);
73 return status;
74}
75
76/* Wrapper for psa_aead_decrypt_setup */
77psa_status_t mbedtls_test_wrap_psa_aead_decrypt_setup(
78 psa_aead_operation_t *arg0_operation,
79 mbedtls_svc_key_id_t arg1_key,
80 psa_algorithm_t arg2_alg)
81{
82 psa_status_t status = (psa_aead_decrypt_setup)(arg0_operation, arg1_key, arg2_alg);
83 return status;
84}
85
86/* Wrapper for psa_aead_encrypt */
87psa_status_t mbedtls_test_wrap_psa_aead_encrypt(
88 mbedtls_svc_key_id_t arg0_key,
89 psa_algorithm_t arg1_alg,
90 const uint8_t *arg2_nonce,
91 size_t arg3_nonce_length,
92 const uint8_t *arg4_additional_data,
93 size_t arg5_additional_data_length,
94 const uint8_t *arg6_plaintext,
95 size_t arg7_plaintext_length,
96 uint8_t *arg8_ciphertext,
97 size_t arg9_ciphertext_size,
98 size_t *arg10_ciphertext_length)
99{
100 psa_status_t status = (psa_aead_encrypt)(arg0_key, arg1_alg, arg2_nonce, arg3_nonce_length, arg4_additional_data, arg5_additional_data_length, arg6_plaintext, arg7_plaintext_length, arg8_ciphertext, arg9_ciphertext_size, arg10_ciphertext_length);
101 return status;
102}
103
104/* Wrapper for psa_aead_encrypt_setup */
105psa_status_t mbedtls_test_wrap_psa_aead_encrypt_setup(
106 psa_aead_operation_t *arg0_operation,
107 mbedtls_svc_key_id_t arg1_key,
108 psa_algorithm_t arg2_alg)
109{
110 psa_status_t status = (psa_aead_encrypt_setup)(arg0_operation, arg1_key, arg2_alg);
111 return status;
112}
113
114/* Wrapper for psa_aead_finish */
115psa_status_t mbedtls_test_wrap_psa_aead_finish(
116 psa_aead_operation_t *arg0_operation,
117 uint8_t *arg1_ciphertext,
118 size_t arg2_ciphertext_size,
119 size_t *arg3_ciphertext_length,
120 uint8_t *arg4_tag,
121 size_t arg5_tag_size,
122 size_t *arg6_tag_length)
123{
124 psa_status_t status = (psa_aead_finish)(arg0_operation, arg1_ciphertext, arg2_ciphertext_size, arg3_ciphertext_length, arg4_tag, arg5_tag_size, arg6_tag_length);
125 return status;
126}
127
128/* Wrapper for psa_aead_generate_nonce */
129psa_status_t mbedtls_test_wrap_psa_aead_generate_nonce(
130 psa_aead_operation_t *arg0_operation,
131 uint8_t *arg1_nonce,
132 size_t arg2_nonce_size,
133 size_t *arg3_nonce_length)
134{
135 psa_status_t status = (psa_aead_generate_nonce)(arg0_operation, arg1_nonce, arg2_nonce_size, arg3_nonce_length);
136 return status;
137}
138
139/* Wrapper for psa_aead_set_lengths */
140psa_status_t mbedtls_test_wrap_psa_aead_set_lengths(
141 psa_aead_operation_t *arg0_operation,
142 size_t arg1_ad_length,
143 size_t arg2_plaintext_length)
144{
145 psa_status_t status = (psa_aead_set_lengths)(arg0_operation, arg1_ad_length, arg2_plaintext_length);
146 return status;
147}
148
149/* Wrapper for psa_aead_set_nonce */
150psa_status_t mbedtls_test_wrap_psa_aead_set_nonce(
151 psa_aead_operation_t *arg0_operation,
152 const uint8_t *arg1_nonce,
153 size_t arg2_nonce_length)
154{
155 psa_status_t status = (psa_aead_set_nonce)(arg0_operation, arg1_nonce, arg2_nonce_length);
156 return status;
157}
158
159/* Wrapper for psa_aead_update */
160psa_status_t mbedtls_test_wrap_psa_aead_update(
161 psa_aead_operation_t *arg0_operation,
162 const uint8_t *arg1_input,
163 size_t arg2_input_length,
164 uint8_t *arg3_output,
165 size_t arg4_output_size,
166 size_t *arg5_output_length)
167{
168 psa_status_t status = (psa_aead_update)(arg0_operation, arg1_input, arg2_input_length, arg3_output, arg4_output_size, arg5_output_length);
169 return status;
170}
171
172/* Wrapper for psa_aead_update_ad */
173psa_status_t mbedtls_test_wrap_psa_aead_update_ad(
174 psa_aead_operation_t *arg0_operation,
175 const uint8_t *arg1_input,
176 size_t arg2_input_length)
177{
178 psa_status_t status = (psa_aead_update_ad)(arg0_operation, arg1_input, arg2_input_length);
179 return status;
180}
181
182/* Wrapper for psa_aead_verify */
183psa_status_t mbedtls_test_wrap_psa_aead_verify(
184 psa_aead_operation_t *arg0_operation,
185 uint8_t *arg1_plaintext,
186 size_t arg2_plaintext_size,
187 size_t *arg3_plaintext_length,
188 const uint8_t *arg4_tag,
189 size_t arg5_tag_length)
190{
191 psa_status_t status = (psa_aead_verify)(arg0_operation, arg1_plaintext, arg2_plaintext_size, arg3_plaintext_length, arg4_tag, arg5_tag_length);
192 return status;
193}
194
195/* Wrapper for psa_asymmetric_decrypt */
196psa_status_t mbedtls_test_wrap_psa_asymmetric_decrypt(
197 mbedtls_svc_key_id_t arg0_key,
198 psa_algorithm_t arg1_alg,
199 const uint8_t *arg2_input,
200 size_t arg3_input_length,
201 const uint8_t *arg4_salt,
202 size_t arg5_salt_length,
203 uint8_t *arg6_output,
204 size_t arg7_output_size,
205 size_t *arg8_output_length)
206{
207 psa_status_t status = (psa_asymmetric_decrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_salt, arg5_salt_length, arg6_output, arg7_output_size, arg8_output_length);
208 return status;
209}
210
211/* Wrapper for psa_asymmetric_encrypt */
212psa_status_t mbedtls_test_wrap_psa_asymmetric_encrypt(
213 mbedtls_svc_key_id_t arg0_key,
214 psa_algorithm_t arg1_alg,
215 const uint8_t *arg2_input,
216 size_t arg3_input_length,
217 const uint8_t *arg4_salt,
218 size_t arg5_salt_length,
219 uint8_t *arg6_output,
220 size_t arg7_output_size,
221 size_t *arg8_output_length)
222{
223 psa_status_t status = (psa_asymmetric_encrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_salt, arg5_salt_length, arg6_output, arg7_output_size, arg8_output_length);
224 return status;
225}
226
227/* Wrapper for psa_cipher_abort */
228psa_status_t mbedtls_test_wrap_psa_cipher_abort(
229 psa_cipher_operation_t *arg0_operation)
230{
231 psa_status_t status = (psa_cipher_abort)(arg0_operation);
232 return status;
233}
234
235/* Wrapper for psa_cipher_decrypt */
236psa_status_t mbedtls_test_wrap_psa_cipher_decrypt(
237 mbedtls_svc_key_id_t arg0_key,
238 psa_algorithm_t arg1_alg,
239 const uint8_t *arg2_input,
240 size_t arg3_input_length,
241 uint8_t *arg4_output,
242 size_t arg5_output_size,
243 size_t *arg6_output_length)
244{
245 psa_status_t status = (psa_cipher_decrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_output, arg5_output_size, arg6_output_length);
246 return status;
247}
248
249/* Wrapper for psa_cipher_decrypt_setup */
250psa_status_t mbedtls_test_wrap_psa_cipher_decrypt_setup(
251 psa_cipher_operation_t *arg0_operation,
252 mbedtls_svc_key_id_t arg1_key,
253 psa_algorithm_t arg2_alg)
254{
255 psa_status_t status = (psa_cipher_decrypt_setup)(arg0_operation, arg1_key, arg2_alg);
256 return status;
257}
258
259/* Wrapper for psa_cipher_encrypt */
260psa_status_t mbedtls_test_wrap_psa_cipher_encrypt(
261 mbedtls_svc_key_id_t arg0_key,
262 psa_algorithm_t arg1_alg,
263 const uint8_t *arg2_input,
264 size_t arg3_input_length,
265 uint8_t *arg4_output,
266 size_t arg5_output_size,
267 size_t *arg6_output_length)
268{
Gilles Peskine88385c22024-01-04 20:33:29 +0100269#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
Gilles Peskine90d14d72024-01-04 16:59:28 +0100270 MBEDTLS_TEST_MEMORY_POISON(arg2_input, arg3_input_length);
271 MBEDTLS_TEST_MEMORY_POISON(arg4_output, arg5_output_size);
Gilles Peskine88385c22024-01-04 20:33:29 +0100272#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100273 psa_status_t status = (psa_cipher_encrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_output, arg5_output_size, arg6_output_length);
Gilles Peskine88385c22024-01-04 20:33:29 +0100274#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
Gilles Peskine90d14d72024-01-04 16:59:28 +0100275 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_input, arg3_input_length);
276 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_output, arg5_output_size);
Gilles Peskine88385c22024-01-04 20:33:29 +0100277#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100278 return status;
279}
280
281/* Wrapper for psa_cipher_encrypt_setup */
282psa_status_t mbedtls_test_wrap_psa_cipher_encrypt_setup(
283 psa_cipher_operation_t *arg0_operation,
284 mbedtls_svc_key_id_t arg1_key,
285 psa_algorithm_t arg2_alg)
286{
287 psa_status_t status = (psa_cipher_encrypt_setup)(arg0_operation, arg1_key, arg2_alg);
288 return status;
289}
290
291/* Wrapper for psa_cipher_finish */
292psa_status_t mbedtls_test_wrap_psa_cipher_finish(
293 psa_cipher_operation_t *arg0_operation,
294 uint8_t *arg1_output,
295 size_t arg2_output_size,
296 size_t *arg3_output_length)
297{
298 psa_status_t status = (psa_cipher_finish)(arg0_operation, arg1_output, arg2_output_size, arg3_output_length);
299 return status;
300}
301
302/* Wrapper for psa_cipher_generate_iv */
303psa_status_t mbedtls_test_wrap_psa_cipher_generate_iv(
304 psa_cipher_operation_t *arg0_operation,
305 uint8_t *arg1_iv,
306 size_t arg2_iv_size,
307 size_t *arg3_iv_length)
308{
309 psa_status_t status = (psa_cipher_generate_iv)(arg0_operation, arg1_iv, arg2_iv_size, arg3_iv_length);
310 return status;
311}
312
313/* Wrapper for psa_cipher_set_iv */
314psa_status_t mbedtls_test_wrap_psa_cipher_set_iv(
315 psa_cipher_operation_t *arg0_operation,
316 const uint8_t *arg1_iv,
317 size_t arg2_iv_length)
318{
319 psa_status_t status = (psa_cipher_set_iv)(arg0_operation, arg1_iv, arg2_iv_length);
320 return status;
321}
322
323/* Wrapper for psa_cipher_update */
324psa_status_t mbedtls_test_wrap_psa_cipher_update(
325 psa_cipher_operation_t *arg0_operation,
326 const uint8_t *arg1_input,
327 size_t arg2_input_length,
328 uint8_t *arg3_output,
329 size_t arg4_output_size,
330 size_t *arg5_output_length)
331{
332 psa_status_t status = (psa_cipher_update)(arg0_operation, arg1_input, arg2_input_length, arg3_output, arg4_output_size, arg5_output_length);
333 return status;
334}
335
336/* Wrapper for psa_copy_key */
337psa_status_t mbedtls_test_wrap_psa_copy_key(
338 mbedtls_svc_key_id_t arg0_source_key,
339 const psa_key_attributes_t *arg1_attributes,
340 mbedtls_svc_key_id_t *arg2_target_key)
341{
342 psa_status_t status = (psa_copy_key)(arg0_source_key, arg1_attributes, arg2_target_key);
343 return status;
344}
345
346/* Wrapper for psa_crypto_driver_pake_get_cipher_suite */
347psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_cipher_suite(
348 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
349 psa_pake_cipher_suite_t *arg1_cipher_suite)
350{
351 psa_status_t status = (psa_crypto_driver_pake_get_cipher_suite)(arg0_inputs, arg1_cipher_suite);
352 return status;
353}
354
355/* Wrapper for psa_crypto_driver_pake_get_password */
356psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_password(
357 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
358 uint8_t *arg1_buffer,
359 size_t arg2_buffer_size,
360 size_t *arg3_buffer_length)
361{
362 psa_status_t status = (psa_crypto_driver_pake_get_password)(arg0_inputs, arg1_buffer, arg2_buffer_size, arg3_buffer_length);
363 return status;
364}
365
366/* Wrapper for psa_crypto_driver_pake_get_password_len */
367psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_password_len(
368 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
369 size_t *arg1_password_len)
370{
371 psa_status_t status = (psa_crypto_driver_pake_get_password_len)(arg0_inputs, arg1_password_len);
372 return status;
373}
374
375/* Wrapper for psa_crypto_driver_pake_get_peer */
376psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_peer(
377 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
378 uint8_t *arg1_peer_id,
379 size_t arg2_peer_id_size,
380 size_t *arg3_peer_id_length)
381{
382 psa_status_t status = (psa_crypto_driver_pake_get_peer)(arg0_inputs, arg1_peer_id, arg2_peer_id_size, arg3_peer_id_length);
383 return status;
384}
385
386/* Wrapper for psa_crypto_driver_pake_get_peer_len */
387psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_peer_len(
388 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
389 size_t *arg1_peer_len)
390{
391 psa_status_t status = (psa_crypto_driver_pake_get_peer_len)(arg0_inputs, arg1_peer_len);
392 return status;
393}
394
395/* Wrapper for psa_crypto_driver_pake_get_user */
396psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_user(
397 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
398 uint8_t *arg1_user_id,
399 size_t arg2_user_id_size,
400 size_t *arg3_user_id_len)
401{
402 psa_status_t status = (psa_crypto_driver_pake_get_user)(arg0_inputs, arg1_user_id, arg2_user_id_size, arg3_user_id_len);
403 return status;
404}
405
406/* Wrapper for psa_crypto_driver_pake_get_user_len */
407psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_user_len(
408 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
409 size_t *arg1_user_len)
410{
411 psa_status_t status = (psa_crypto_driver_pake_get_user_len)(arg0_inputs, arg1_user_len);
412 return status;
413}
414
415/* Wrapper for psa_crypto_init */
416psa_status_t mbedtls_test_wrap_psa_crypto_init(void)
417{
418 psa_status_t status = (psa_crypto_init)();
419 return status;
420}
421
422/* Wrapper for psa_destroy_key */
423psa_status_t mbedtls_test_wrap_psa_destroy_key(
424 mbedtls_svc_key_id_t arg0_key)
425{
426 psa_status_t status = (psa_destroy_key)(arg0_key);
427 return status;
428}
429
430/* Wrapper for psa_export_key */
431psa_status_t mbedtls_test_wrap_psa_export_key(
432 mbedtls_svc_key_id_t arg0_key,
433 uint8_t *arg1_data,
434 size_t arg2_data_size,
435 size_t *arg3_data_length)
436{
437 psa_status_t status = (psa_export_key)(arg0_key, arg1_data, arg2_data_size, arg3_data_length);
438 return status;
439}
440
441/* Wrapper for psa_export_public_key */
442psa_status_t mbedtls_test_wrap_psa_export_public_key(
443 mbedtls_svc_key_id_t arg0_key,
444 uint8_t *arg1_data,
445 size_t arg2_data_size,
446 size_t *arg3_data_length)
447{
448 psa_status_t status = (psa_export_public_key)(arg0_key, arg1_data, arg2_data_size, arg3_data_length);
449 return status;
450}
451
452/* Wrapper for psa_generate_key */
453psa_status_t mbedtls_test_wrap_psa_generate_key(
454 const psa_key_attributes_t *arg0_attributes,
455 mbedtls_svc_key_id_t *arg1_key)
456{
457 psa_status_t status = (psa_generate_key)(arg0_attributes, arg1_key);
458 return status;
459}
460
461/* Wrapper for psa_generate_random */
462psa_status_t mbedtls_test_wrap_psa_generate_random(
463 uint8_t *arg0_output,
464 size_t arg1_output_size)
465{
466 psa_status_t status = (psa_generate_random)(arg0_output, arg1_output_size);
467 return status;
468}
469
470/* Wrapper for psa_get_key_attributes */
471psa_status_t mbedtls_test_wrap_psa_get_key_attributes(
472 mbedtls_svc_key_id_t arg0_key,
473 psa_key_attributes_t *arg1_attributes)
474{
475 psa_status_t status = (psa_get_key_attributes)(arg0_key, arg1_attributes);
476 return status;
477}
478
479/* Wrapper for psa_hash_abort */
480psa_status_t mbedtls_test_wrap_psa_hash_abort(
481 psa_hash_operation_t *arg0_operation)
482{
483 psa_status_t status = (psa_hash_abort)(arg0_operation);
484 return status;
485}
486
487/* Wrapper for psa_hash_clone */
488psa_status_t mbedtls_test_wrap_psa_hash_clone(
489 const psa_hash_operation_t *arg0_source_operation,
490 psa_hash_operation_t *arg1_target_operation)
491{
492 psa_status_t status = (psa_hash_clone)(arg0_source_operation, arg1_target_operation);
493 return status;
494}
495
496/* Wrapper for psa_hash_compare */
497psa_status_t mbedtls_test_wrap_psa_hash_compare(
498 psa_algorithm_t arg0_alg,
499 const uint8_t *arg1_input,
500 size_t arg2_input_length,
501 const uint8_t *arg3_hash,
502 size_t arg4_hash_length)
503{
504 psa_status_t status = (psa_hash_compare)(arg0_alg, arg1_input, arg2_input_length, arg3_hash, arg4_hash_length);
505 return status;
506}
507
508/* Wrapper for psa_hash_compute */
509psa_status_t mbedtls_test_wrap_psa_hash_compute(
510 psa_algorithm_t arg0_alg,
511 const uint8_t *arg1_input,
512 size_t arg2_input_length,
513 uint8_t *arg3_hash,
514 size_t arg4_hash_size,
515 size_t *arg5_hash_length)
516{
517 psa_status_t status = (psa_hash_compute)(arg0_alg, arg1_input, arg2_input_length, arg3_hash, arg4_hash_size, arg5_hash_length);
518 return status;
519}
520
521/* Wrapper for psa_hash_finish */
522psa_status_t mbedtls_test_wrap_psa_hash_finish(
523 psa_hash_operation_t *arg0_operation,
524 uint8_t *arg1_hash,
525 size_t arg2_hash_size,
526 size_t *arg3_hash_length)
527{
528 psa_status_t status = (psa_hash_finish)(arg0_operation, arg1_hash, arg2_hash_size, arg3_hash_length);
529 return status;
530}
531
532/* Wrapper for psa_hash_setup */
533psa_status_t mbedtls_test_wrap_psa_hash_setup(
534 psa_hash_operation_t *arg0_operation,
535 psa_algorithm_t arg1_alg)
536{
537 psa_status_t status = (psa_hash_setup)(arg0_operation, arg1_alg);
538 return status;
539}
540
541/* Wrapper for psa_hash_update */
542psa_status_t mbedtls_test_wrap_psa_hash_update(
543 psa_hash_operation_t *arg0_operation,
544 const uint8_t *arg1_input,
545 size_t arg2_input_length)
546{
547 psa_status_t status = (psa_hash_update)(arg0_operation, arg1_input, arg2_input_length);
548 return status;
549}
550
551/* Wrapper for psa_hash_verify */
552psa_status_t mbedtls_test_wrap_psa_hash_verify(
553 psa_hash_operation_t *arg0_operation,
554 const uint8_t *arg1_hash,
555 size_t arg2_hash_length)
556{
557 psa_status_t status = (psa_hash_verify)(arg0_operation, arg1_hash, arg2_hash_length);
558 return status;
559}
560
561/* Wrapper for psa_import_key */
562psa_status_t mbedtls_test_wrap_psa_import_key(
563 const psa_key_attributes_t *arg0_attributes,
564 const uint8_t *arg1_data,
565 size_t arg2_data_length,
566 mbedtls_svc_key_id_t *arg3_key)
567{
568 psa_status_t status = (psa_import_key)(arg0_attributes, arg1_data, arg2_data_length, arg3_key);
569 return status;
570}
571
572/* Wrapper for psa_key_derivation_abort */
573psa_status_t mbedtls_test_wrap_psa_key_derivation_abort(
574 psa_key_derivation_operation_t *arg0_operation)
575{
576 psa_status_t status = (psa_key_derivation_abort)(arg0_operation);
577 return status;
578}
579
580/* Wrapper for psa_key_derivation_get_capacity */
581psa_status_t mbedtls_test_wrap_psa_key_derivation_get_capacity(
582 const psa_key_derivation_operation_t *arg0_operation,
583 size_t *arg1_capacity)
584{
585 psa_status_t status = (psa_key_derivation_get_capacity)(arg0_operation, arg1_capacity);
586 return status;
587}
588
589/* Wrapper for psa_key_derivation_input_bytes */
590psa_status_t mbedtls_test_wrap_psa_key_derivation_input_bytes(
591 psa_key_derivation_operation_t *arg0_operation,
592 psa_key_derivation_step_t arg1_step,
593 const uint8_t *arg2_data,
594 size_t arg3_data_length)
595{
596 psa_status_t status = (psa_key_derivation_input_bytes)(arg0_operation, arg1_step, arg2_data, arg3_data_length);
597 return status;
598}
599
600/* Wrapper for psa_key_derivation_input_integer */
601psa_status_t mbedtls_test_wrap_psa_key_derivation_input_integer(
602 psa_key_derivation_operation_t *arg0_operation,
603 psa_key_derivation_step_t arg1_step,
604 uint64_t arg2_value)
605{
606 psa_status_t status = (psa_key_derivation_input_integer)(arg0_operation, arg1_step, arg2_value);
607 return status;
608}
609
610/* Wrapper for psa_key_derivation_input_key */
611psa_status_t mbedtls_test_wrap_psa_key_derivation_input_key(
612 psa_key_derivation_operation_t *arg0_operation,
613 psa_key_derivation_step_t arg1_step,
614 mbedtls_svc_key_id_t arg2_key)
615{
616 psa_status_t status = (psa_key_derivation_input_key)(arg0_operation, arg1_step, arg2_key);
617 return status;
618}
619
620/* Wrapper for psa_key_derivation_key_agreement */
621psa_status_t mbedtls_test_wrap_psa_key_derivation_key_agreement(
622 psa_key_derivation_operation_t *arg0_operation,
623 psa_key_derivation_step_t arg1_step,
624 mbedtls_svc_key_id_t arg2_private_key,
625 const uint8_t *arg3_peer_key,
626 size_t arg4_peer_key_length)
627{
628 psa_status_t status = (psa_key_derivation_key_agreement)(arg0_operation, arg1_step, arg2_private_key, arg3_peer_key, arg4_peer_key_length);
629 return status;
630}
631
632/* Wrapper for psa_key_derivation_output_bytes */
633psa_status_t mbedtls_test_wrap_psa_key_derivation_output_bytes(
634 psa_key_derivation_operation_t *arg0_operation,
635 uint8_t *arg1_output,
636 size_t arg2_output_length)
637{
638 psa_status_t status = (psa_key_derivation_output_bytes)(arg0_operation, arg1_output, arg2_output_length);
639 return status;
640}
641
642/* Wrapper for psa_key_derivation_output_key */
643psa_status_t mbedtls_test_wrap_psa_key_derivation_output_key(
644 const psa_key_attributes_t *arg0_attributes,
645 psa_key_derivation_operation_t *arg1_operation,
646 mbedtls_svc_key_id_t *arg2_key)
647{
648 psa_status_t status = (psa_key_derivation_output_key)(arg0_attributes, arg1_operation, arg2_key);
649 return status;
650}
651
652/* Wrapper for psa_key_derivation_set_capacity */
653psa_status_t mbedtls_test_wrap_psa_key_derivation_set_capacity(
654 psa_key_derivation_operation_t *arg0_operation,
655 size_t arg1_capacity)
656{
657 psa_status_t status = (psa_key_derivation_set_capacity)(arg0_operation, arg1_capacity);
658 return status;
659}
660
661/* Wrapper for psa_key_derivation_setup */
662psa_status_t mbedtls_test_wrap_psa_key_derivation_setup(
663 psa_key_derivation_operation_t *arg0_operation,
664 psa_algorithm_t arg1_alg)
665{
666 psa_status_t status = (psa_key_derivation_setup)(arg0_operation, arg1_alg);
667 return status;
668}
669
670/* Wrapper for psa_mac_abort */
671psa_status_t mbedtls_test_wrap_psa_mac_abort(
672 psa_mac_operation_t *arg0_operation)
673{
674 psa_status_t status = (psa_mac_abort)(arg0_operation);
675 return status;
676}
677
678/* Wrapper for psa_mac_compute */
679psa_status_t mbedtls_test_wrap_psa_mac_compute(
680 mbedtls_svc_key_id_t arg0_key,
681 psa_algorithm_t arg1_alg,
682 const uint8_t *arg2_input,
683 size_t arg3_input_length,
684 uint8_t *arg4_mac,
685 size_t arg5_mac_size,
686 size_t *arg6_mac_length)
687{
688 psa_status_t status = (psa_mac_compute)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_mac, arg5_mac_size, arg6_mac_length);
689 return status;
690}
691
692/* Wrapper for psa_mac_sign_finish */
693psa_status_t mbedtls_test_wrap_psa_mac_sign_finish(
694 psa_mac_operation_t *arg0_operation,
695 uint8_t *arg1_mac,
696 size_t arg2_mac_size,
697 size_t *arg3_mac_length)
698{
699 psa_status_t status = (psa_mac_sign_finish)(arg0_operation, arg1_mac, arg2_mac_size, arg3_mac_length);
700 return status;
701}
702
703/* Wrapper for psa_mac_sign_setup */
704psa_status_t mbedtls_test_wrap_psa_mac_sign_setup(
705 psa_mac_operation_t *arg0_operation,
706 mbedtls_svc_key_id_t arg1_key,
707 psa_algorithm_t arg2_alg)
708{
709 psa_status_t status = (psa_mac_sign_setup)(arg0_operation, arg1_key, arg2_alg);
710 return status;
711}
712
713/* Wrapper for psa_mac_update */
714psa_status_t mbedtls_test_wrap_psa_mac_update(
715 psa_mac_operation_t *arg0_operation,
716 const uint8_t *arg1_input,
717 size_t arg2_input_length)
718{
719 psa_status_t status = (psa_mac_update)(arg0_operation, arg1_input, arg2_input_length);
720 return status;
721}
722
723/* Wrapper for psa_mac_verify */
724psa_status_t mbedtls_test_wrap_psa_mac_verify(
725 mbedtls_svc_key_id_t arg0_key,
726 psa_algorithm_t arg1_alg,
727 const uint8_t *arg2_input,
728 size_t arg3_input_length,
729 const uint8_t *arg4_mac,
730 size_t arg5_mac_length)
731{
732 psa_status_t status = (psa_mac_verify)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_mac, arg5_mac_length);
733 return status;
734}
735
736/* Wrapper for psa_mac_verify_finish */
737psa_status_t mbedtls_test_wrap_psa_mac_verify_finish(
738 psa_mac_operation_t *arg0_operation,
739 const uint8_t *arg1_mac,
740 size_t arg2_mac_length)
741{
742 psa_status_t status = (psa_mac_verify_finish)(arg0_operation, arg1_mac, arg2_mac_length);
743 return status;
744}
745
746/* Wrapper for psa_mac_verify_setup */
747psa_status_t mbedtls_test_wrap_psa_mac_verify_setup(
748 psa_mac_operation_t *arg0_operation,
749 mbedtls_svc_key_id_t arg1_key,
750 psa_algorithm_t arg2_alg)
751{
752 psa_status_t status = (psa_mac_verify_setup)(arg0_operation, arg1_key, arg2_alg);
753 return status;
754}
755
756/* Wrapper for psa_pake_abort */
757psa_status_t mbedtls_test_wrap_psa_pake_abort(
758 psa_pake_operation_t *arg0_operation)
759{
760 psa_status_t status = (psa_pake_abort)(arg0_operation);
761 return status;
762}
763
764/* Wrapper for psa_pake_get_implicit_key */
765psa_status_t mbedtls_test_wrap_psa_pake_get_implicit_key(
766 psa_pake_operation_t *arg0_operation,
767 psa_key_derivation_operation_t *arg1_output)
768{
769 psa_status_t status = (psa_pake_get_implicit_key)(arg0_operation, arg1_output);
770 return status;
771}
772
773/* Wrapper for psa_pake_input */
774psa_status_t mbedtls_test_wrap_psa_pake_input(
775 psa_pake_operation_t *arg0_operation,
776 psa_pake_step_t arg1_step,
777 const uint8_t *arg2_input,
778 size_t arg3_input_length)
779{
780 psa_status_t status = (psa_pake_input)(arg0_operation, arg1_step, arg2_input, arg3_input_length);
781 return status;
782}
783
784/* Wrapper for psa_pake_output */
785psa_status_t mbedtls_test_wrap_psa_pake_output(
786 psa_pake_operation_t *arg0_operation,
787 psa_pake_step_t arg1_step,
788 uint8_t *arg2_output,
789 size_t arg3_output_size,
790 size_t *arg4_output_length)
791{
792 psa_status_t status = (psa_pake_output)(arg0_operation, arg1_step, arg2_output, arg3_output_size, arg4_output_length);
793 return status;
794}
795
796/* Wrapper for psa_pake_set_password_key */
797psa_status_t mbedtls_test_wrap_psa_pake_set_password_key(
798 psa_pake_operation_t *arg0_operation,
799 mbedtls_svc_key_id_t arg1_password)
800{
801 psa_status_t status = (psa_pake_set_password_key)(arg0_operation, arg1_password);
802 return status;
803}
804
805/* Wrapper for psa_pake_set_peer */
806psa_status_t mbedtls_test_wrap_psa_pake_set_peer(
807 psa_pake_operation_t *arg0_operation,
808 const uint8_t *arg1_peer_id,
809 size_t arg2_peer_id_len)
810{
811 psa_status_t status = (psa_pake_set_peer)(arg0_operation, arg1_peer_id, arg2_peer_id_len);
812 return status;
813}
814
815/* Wrapper for psa_pake_set_role */
816psa_status_t mbedtls_test_wrap_psa_pake_set_role(
817 psa_pake_operation_t *arg0_operation,
818 psa_pake_role_t arg1_role)
819{
820 psa_status_t status = (psa_pake_set_role)(arg0_operation, arg1_role);
821 return status;
822}
823
824/* Wrapper for psa_pake_set_user */
825psa_status_t mbedtls_test_wrap_psa_pake_set_user(
826 psa_pake_operation_t *arg0_operation,
827 const uint8_t *arg1_user_id,
828 size_t arg2_user_id_len)
829{
830 psa_status_t status = (psa_pake_set_user)(arg0_operation, arg1_user_id, arg2_user_id_len);
831 return status;
832}
833
834/* Wrapper for psa_pake_setup */
835psa_status_t mbedtls_test_wrap_psa_pake_setup(
836 psa_pake_operation_t *arg0_operation,
837 const psa_pake_cipher_suite_t *arg1_cipher_suite)
838{
839 psa_status_t status = (psa_pake_setup)(arg0_operation, arg1_cipher_suite);
840 return status;
841}
842
843/* Wrapper for psa_purge_key */
844psa_status_t mbedtls_test_wrap_psa_purge_key(
845 mbedtls_svc_key_id_t arg0_key)
846{
847 psa_status_t status = (psa_purge_key)(arg0_key);
848 return status;
849}
850
851/* Wrapper for psa_raw_key_agreement */
852psa_status_t mbedtls_test_wrap_psa_raw_key_agreement(
853 psa_algorithm_t arg0_alg,
854 mbedtls_svc_key_id_t arg1_private_key,
855 const uint8_t *arg2_peer_key,
856 size_t arg3_peer_key_length,
857 uint8_t *arg4_output,
858 size_t arg5_output_size,
859 size_t *arg6_output_length)
860{
861 psa_status_t status = (psa_raw_key_agreement)(arg0_alg, arg1_private_key, arg2_peer_key, arg3_peer_key_length, arg4_output, arg5_output_size, arg6_output_length);
862 return status;
863}
864
865/* Wrapper for psa_sign_hash */
866psa_status_t mbedtls_test_wrap_psa_sign_hash(
867 mbedtls_svc_key_id_t arg0_key,
868 psa_algorithm_t arg1_alg,
869 const uint8_t *arg2_hash,
870 size_t arg3_hash_length,
871 uint8_t *arg4_signature,
872 size_t arg5_signature_size,
873 size_t *arg6_signature_length)
874{
875 psa_status_t status = (psa_sign_hash)(arg0_key, arg1_alg, arg2_hash, arg3_hash_length, arg4_signature, arg5_signature_size, arg6_signature_length);
876 return status;
877}
878
879/* Wrapper for psa_sign_hash_abort */
880psa_status_t mbedtls_test_wrap_psa_sign_hash_abort(
881 psa_sign_hash_interruptible_operation_t *arg0_operation)
882{
883 psa_status_t status = (psa_sign_hash_abort)(arg0_operation);
884 return status;
885}
886
887/* Wrapper for psa_sign_hash_complete */
888psa_status_t mbedtls_test_wrap_psa_sign_hash_complete(
889 psa_sign_hash_interruptible_operation_t *arg0_operation,
890 uint8_t *arg1_signature,
891 size_t arg2_signature_size,
892 size_t *arg3_signature_length)
893{
894 psa_status_t status = (psa_sign_hash_complete)(arg0_operation, arg1_signature, arg2_signature_size, arg3_signature_length);
895 return status;
896}
897
898/* Wrapper for psa_sign_hash_start */
899psa_status_t mbedtls_test_wrap_psa_sign_hash_start(
900 psa_sign_hash_interruptible_operation_t *arg0_operation,
901 mbedtls_svc_key_id_t arg1_key,
902 psa_algorithm_t arg2_alg,
903 const uint8_t *arg3_hash,
904 size_t arg4_hash_length)
905{
906 psa_status_t status = (psa_sign_hash_start)(arg0_operation, arg1_key, arg2_alg, arg3_hash, arg4_hash_length);
907 return status;
908}
909
910/* Wrapper for psa_sign_message */
911psa_status_t mbedtls_test_wrap_psa_sign_message(
912 mbedtls_svc_key_id_t arg0_key,
913 psa_algorithm_t arg1_alg,
914 const uint8_t *arg2_input,
915 size_t arg3_input_length,
916 uint8_t *arg4_signature,
917 size_t arg5_signature_size,
918 size_t *arg6_signature_length)
919{
920 psa_status_t status = (psa_sign_message)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_signature, arg5_signature_size, arg6_signature_length);
921 return status;
922}
923
924/* Wrapper for psa_verify_hash */
925psa_status_t mbedtls_test_wrap_psa_verify_hash(
926 mbedtls_svc_key_id_t arg0_key,
927 psa_algorithm_t arg1_alg,
928 const uint8_t *arg2_hash,
929 size_t arg3_hash_length,
930 const uint8_t *arg4_signature,
931 size_t arg5_signature_length)
932{
933 psa_status_t status = (psa_verify_hash)(arg0_key, arg1_alg, arg2_hash, arg3_hash_length, arg4_signature, arg5_signature_length);
934 return status;
935}
936
937/* Wrapper for psa_verify_hash_abort */
938psa_status_t mbedtls_test_wrap_psa_verify_hash_abort(
939 psa_verify_hash_interruptible_operation_t *arg0_operation)
940{
941 psa_status_t status = (psa_verify_hash_abort)(arg0_operation);
942 return status;
943}
944
945/* Wrapper for psa_verify_hash_complete */
946psa_status_t mbedtls_test_wrap_psa_verify_hash_complete(
947 psa_verify_hash_interruptible_operation_t *arg0_operation)
948{
949 psa_status_t status = (psa_verify_hash_complete)(arg0_operation);
950 return status;
951}
952
953/* Wrapper for psa_verify_hash_start */
954psa_status_t mbedtls_test_wrap_psa_verify_hash_start(
955 psa_verify_hash_interruptible_operation_t *arg0_operation,
956 mbedtls_svc_key_id_t arg1_key,
957 psa_algorithm_t arg2_alg,
958 const uint8_t *arg3_hash,
959 size_t arg4_hash_length,
960 const uint8_t *arg5_signature,
961 size_t arg6_signature_length)
962{
963 psa_status_t status = (psa_verify_hash_start)(arg0_operation, arg1_key, arg2_alg, arg3_hash, arg4_hash_length, arg5_signature, arg6_signature_length);
964 return status;
965}
966
967/* Wrapper for psa_verify_message */
968psa_status_t mbedtls_test_wrap_psa_verify_message(
969 mbedtls_svc_key_id_t arg0_key,
970 psa_algorithm_t arg1_alg,
971 const uint8_t *arg2_input,
972 size_t arg3_input_length,
973 const uint8_t *arg4_signature,
974 size_t arg5_signature_length)
975{
976 psa_status_t status = (psa_verify_message)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_signature, arg5_signature_length);
977 return status;
978}
979
980#endif /* defined(MBEDTLS_PSA_CRYPTO_C) && defined(MBEDTLS_TEST_HOOKS) */
981
982/* End of automatically generated file. */