blob: c26835fbfa3b5f6c5e0fa590570e634134184f90 [file] [log] [blame]
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001/* Automatically generated by generate_psa_wrappers.py, do not edit! */
2
3/* Copyright The Mbed TLS Contributors
4 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
5 */
6
7#include <mbedtls/build_info.h>
8
9#if defined(MBEDTLS_PSA_CRYPTO_C) && defined(MBEDTLS_TEST_HOOKS)
10
11#include <psa/crypto.h>
12
Gilles Peskine90d14d72024-01-04 16:59:28 +010013#include <test/memory.h>
Gilles Peskine6e4332c2024-01-04 16:42:40 +010014#include <test/psa_crypto_helpers.h>
15#include <test/psa_test_wrappers.h>
16
17/* Wrapper for mbedtls_psa_inject_entropy */
18#if defined(MBEDTLS_PSA_INJECT_ENTROPY)
19psa_status_t mbedtls_test_wrap_mbedtls_psa_inject_entropy(
20 const uint8_t *arg0_seed,
21 size_t arg1_seed_size)
22{
23 psa_status_t status = (mbedtls_psa_inject_entropy)(arg0_seed, arg1_seed_size);
24 return status;
25}
26#endif /* defined(MBEDTLS_PSA_INJECT_ENTROPY) */
27
28/* Wrapper for mbedtls_psa_platform_get_builtin_key */
29#if defined(MBEDTLS_PSA_CRYPTO_BUILTIN_KEYS)
30psa_status_t mbedtls_test_wrap_mbedtls_psa_platform_get_builtin_key(
31 mbedtls_svc_key_id_t arg0_key_id,
32 psa_key_lifetime_t *arg1_lifetime,
33 psa_drv_slot_number_t *arg2_slot_number)
34{
35 psa_status_t status = (mbedtls_psa_platform_get_builtin_key)(arg0_key_id, arg1_lifetime, arg2_slot_number);
36 return status;
37}
38#endif /* defined(MBEDTLS_PSA_CRYPTO_BUILTIN_KEYS) */
39
40/* Wrapper for mbedtls_psa_register_se_key */
41#if defined(MBEDTLS_PSA_CRYPTO_SE_C)
42psa_status_t mbedtls_test_wrap_mbedtls_psa_register_se_key(
43 const psa_key_attributes_t *arg0_attributes)
44{
45 psa_status_t status = (mbedtls_psa_register_se_key)(arg0_attributes);
46 return status;
47}
48#endif /* defined(MBEDTLS_PSA_CRYPTO_SE_C) */
49
50/* Wrapper for psa_aead_abort */
51psa_status_t mbedtls_test_wrap_psa_aead_abort(
52 psa_aead_operation_t *arg0_operation)
53{
54 psa_status_t status = (psa_aead_abort)(arg0_operation);
55 return status;
56}
57
58/* Wrapper for psa_aead_decrypt */
59psa_status_t mbedtls_test_wrap_psa_aead_decrypt(
60 mbedtls_svc_key_id_t arg0_key,
61 psa_algorithm_t arg1_alg,
62 const uint8_t *arg2_nonce,
63 size_t arg3_nonce_length,
64 const uint8_t *arg4_additional_data,
65 size_t arg5_additional_data_length,
66 const uint8_t *arg6_ciphertext,
67 size_t arg7_ciphertext_length,
68 uint8_t *arg8_plaintext,
69 size_t arg9_plaintext_size,
70 size_t *arg10_plaintext_length)
71{
72 psa_status_t status = (psa_aead_decrypt)(arg0_key, arg1_alg, arg2_nonce, arg3_nonce_length, arg4_additional_data, arg5_additional_data_length, arg6_ciphertext, arg7_ciphertext_length, arg8_plaintext, arg9_plaintext_size, arg10_plaintext_length);
73 return status;
74}
75
76/* Wrapper for psa_aead_decrypt_setup */
77psa_status_t mbedtls_test_wrap_psa_aead_decrypt_setup(
78 psa_aead_operation_t *arg0_operation,
79 mbedtls_svc_key_id_t arg1_key,
80 psa_algorithm_t arg2_alg)
81{
82 psa_status_t status = (psa_aead_decrypt_setup)(arg0_operation, arg1_key, arg2_alg);
83 return status;
84}
85
86/* Wrapper for psa_aead_encrypt */
87psa_status_t mbedtls_test_wrap_psa_aead_encrypt(
88 mbedtls_svc_key_id_t arg0_key,
89 psa_algorithm_t arg1_alg,
90 const uint8_t *arg2_nonce,
91 size_t arg3_nonce_length,
92 const uint8_t *arg4_additional_data,
93 size_t arg5_additional_data_length,
94 const uint8_t *arg6_plaintext,
95 size_t arg7_plaintext_length,
96 uint8_t *arg8_ciphertext,
97 size_t arg9_ciphertext_size,
98 size_t *arg10_ciphertext_length)
99{
100 psa_status_t status = (psa_aead_encrypt)(arg0_key, arg1_alg, arg2_nonce, arg3_nonce_length, arg4_additional_data, arg5_additional_data_length, arg6_plaintext, arg7_plaintext_length, arg8_ciphertext, arg9_ciphertext_size, arg10_ciphertext_length);
101 return status;
102}
103
104/* Wrapper for psa_aead_encrypt_setup */
105psa_status_t mbedtls_test_wrap_psa_aead_encrypt_setup(
106 psa_aead_operation_t *arg0_operation,
107 mbedtls_svc_key_id_t arg1_key,
108 psa_algorithm_t arg2_alg)
109{
110 psa_status_t status = (psa_aead_encrypt_setup)(arg0_operation, arg1_key, arg2_alg);
111 return status;
112}
113
114/* Wrapper for psa_aead_finish */
115psa_status_t mbedtls_test_wrap_psa_aead_finish(
116 psa_aead_operation_t *arg0_operation,
117 uint8_t *arg1_ciphertext,
118 size_t arg2_ciphertext_size,
119 size_t *arg3_ciphertext_length,
120 uint8_t *arg4_tag,
121 size_t arg5_tag_size,
122 size_t *arg6_tag_length)
123{
124 psa_status_t status = (psa_aead_finish)(arg0_operation, arg1_ciphertext, arg2_ciphertext_size, arg3_ciphertext_length, arg4_tag, arg5_tag_size, arg6_tag_length);
125 return status;
126}
127
128/* Wrapper for psa_aead_generate_nonce */
129psa_status_t mbedtls_test_wrap_psa_aead_generate_nonce(
130 psa_aead_operation_t *arg0_operation,
131 uint8_t *arg1_nonce,
132 size_t arg2_nonce_size,
133 size_t *arg3_nonce_length)
134{
135 psa_status_t status = (psa_aead_generate_nonce)(arg0_operation, arg1_nonce, arg2_nonce_size, arg3_nonce_length);
136 return status;
137}
138
139/* Wrapper for psa_aead_set_lengths */
140psa_status_t mbedtls_test_wrap_psa_aead_set_lengths(
141 psa_aead_operation_t *arg0_operation,
142 size_t arg1_ad_length,
143 size_t arg2_plaintext_length)
144{
145 psa_status_t status = (psa_aead_set_lengths)(arg0_operation, arg1_ad_length, arg2_plaintext_length);
146 return status;
147}
148
149/* Wrapper for psa_aead_set_nonce */
150psa_status_t mbedtls_test_wrap_psa_aead_set_nonce(
151 psa_aead_operation_t *arg0_operation,
152 const uint8_t *arg1_nonce,
153 size_t arg2_nonce_length)
154{
155 psa_status_t status = (psa_aead_set_nonce)(arg0_operation, arg1_nonce, arg2_nonce_length);
156 return status;
157}
158
159/* Wrapper for psa_aead_update */
160psa_status_t mbedtls_test_wrap_psa_aead_update(
161 psa_aead_operation_t *arg0_operation,
162 const uint8_t *arg1_input,
163 size_t arg2_input_length,
164 uint8_t *arg3_output,
165 size_t arg4_output_size,
166 size_t *arg5_output_length)
167{
168 psa_status_t status = (psa_aead_update)(arg0_operation, arg1_input, arg2_input_length, arg3_output, arg4_output_size, arg5_output_length);
169 return status;
170}
171
172/* Wrapper for psa_aead_update_ad */
173psa_status_t mbedtls_test_wrap_psa_aead_update_ad(
174 psa_aead_operation_t *arg0_operation,
175 const uint8_t *arg1_input,
176 size_t arg2_input_length)
177{
178 psa_status_t status = (psa_aead_update_ad)(arg0_operation, arg1_input, arg2_input_length);
179 return status;
180}
181
182/* Wrapper for psa_aead_verify */
183psa_status_t mbedtls_test_wrap_psa_aead_verify(
184 psa_aead_operation_t *arg0_operation,
185 uint8_t *arg1_plaintext,
186 size_t arg2_plaintext_size,
187 size_t *arg3_plaintext_length,
188 const uint8_t *arg4_tag,
189 size_t arg5_tag_length)
190{
191 psa_status_t status = (psa_aead_verify)(arg0_operation, arg1_plaintext, arg2_plaintext_size, arg3_plaintext_length, arg4_tag, arg5_tag_length);
192 return status;
193}
194
195/* Wrapper for psa_asymmetric_decrypt */
196psa_status_t mbedtls_test_wrap_psa_asymmetric_decrypt(
197 mbedtls_svc_key_id_t arg0_key,
198 psa_algorithm_t arg1_alg,
199 const uint8_t *arg2_input,
200 size_t arg3_input_length,
201 const uint8_t *arg4_salt,
202 size_t arg5_salt_length,
203 uint8_t *arg6_output,
204 size_t arg7_output_size,
205 size_t *arg8_output_length)
206{
207 psa_status_t status = (psa_asymmetric_decrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_salt, arg5_salt_length, arg6_output, arg7_output_size, arg8_output_length);
208 return status;
209}
210
211/* Wrapper for psa_asymmetric_encrypt */
212psa_status_t mbedtls_test_wrap_psa_asymmetric_encrypt(
213 mbedtls_svc_key_id_t arg0_key,
214 psa_algorithm_t arg1_alg,
215 const uint8_t *arg2_input,
216 size_t arg3_input_length,
217 const uint8_t *arg4_salt,
218 size_t arg5_salt_length,
219 uint8_t *arg6_output,
220 size_t arg7_output_size,
221 size_t *arg8_output_length)
222{
223 psa_status_t status = (psa_asymmetric_encrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_salt, arg5_salt_length, arg6_output, arg7_output_size, arg8_output_length);
224 return status;
225}
226
227/* Wrapper for psa_cipher_abort */
228psa_status_t mbedtls_test_wrap_psa_cipher_abort(
229 psa_cipher_operation_t *arg0_operation)
230{
231 psa_status_t status = (psa_cipher_abort)(arg0_operation);
232 return status;
233}
234
235/* Wrapper for psa_cipher_decrypt */
236psa_status_t mbedtls_test_wrap_psa_cipher_decrypt(
237 mbedtls_svc_key_id_t arg0_key,
238 psa_algorithm_t arg1_alg,
239 const uint8_t *arg2_input,
240 size_t arg3_input_length,
241 uint8_t *arg4_output,
242 size_t arg5_output_size,
243 size_t *arg6_output_length)
244{
245 psa_status_t status = (psa_cipher_decrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_output, arg5_output_size, arg6_output_length);
246 return status;
247}
248
249/* Wrapper for psa_cipher_decrypt_setup */
250psa_status_t mbedtls_test_wrap_psa_cipher_decrypt_setup(
251 psa_cipher_operation_t *arg0_operation,
252 mbedtls_svc_key_id_t arg1_key,
253 psa_algorithm_t arg2_alg)
254{
255 psa_status_t status = (psa_cipher_decrypt_setup)(arg0_operation, arg1_key, arg2_alg);
256 return status;
257}
258
259/* Wrapper for psa_cipher_encrypt */
260psa_status_t mbedtls_test_wrap_psa_cipher_encrypt(
261 mbedtls_svc_key_id_t arg0_key,
262 psa_algorithm_t arg1_alg,
263 const uint8_t *arg2_input,
264 size_t arg3_input_length,
265 uint8_t *arg4_output,
266 size_t arg5_output_size,
267 size_t *arg6_output_length)
268{
Gilles Peskine90d14d72024-01-04 16:59:28 +0100269 MBEDTLS_TEST_MEMORY_POISON(arg2_input, arg3_input_length);
270 MBEDTLS_TEST_MEMORY_POISON(arg4_output, arg5_output_size);
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100271 psa_status_t status = (psa_cipher_encrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_output, arg5_output_size, arg6_output_length);
Gilles Peskine90d14d72024-01-04 16:59:28 +0100272 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_input, arg3_input_length);
273 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_output, arg5_output_size);
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100274 return status;
275}
276
277/* Wrapper for psa_cipher_encrypt_setup */
278psa_status_t mbedtls_test_wrap_psa_cipher_encrypt_setup(
279 psa_cipher_operation_t *arg0_operation,
280 mbedtls_svc_key_id_t arg1_key,
281 psa_algorithm_t arg2_alg)
282{
283 psa_status_t status = (psa_cipher_encrypt_setup)(arg0_operation, arg1_key, arg2_alg);
284 return status;
285}
286
287/* Wrapper for psa_cipher_finish */
288psa_status_t mbedtls_test_wrap_psa_cipher_finish(
289 psa_cipher_operation_t *arg0_operation,
290 uint8_t *arg1_output,
291 size_t arg2_output_size,
292 size_t *arg3_output_length)
293{
294 psa_status_t status = (psa_cipher_finish)(arg0_operation, arg1_output, arg2_output_size, arg3_output_length);
295 return status;
296}
297
298/* Wrapper for psa_cipher_generate_iv */
299psa_status_t mbedtls_test_wrap_psa_cipher_generate_iv(
300 psa_cipher_operation_t *arg0_operation,
301 uint8_t *arg1_iv,
302 size_t arg2_iv_size,
303 size_t *arg3_iv_length)
304{
305 psa_status_t status = (psa_cipher_generate_iv)(arg0_operation, arg1_iv, arg2_iv_size, arg3_iv_length);
306 return status;
307}
308
309/* Wrapper for psa_cipher_set_iv */
310psa_status_t mbedtls_test_wrap_psa_cipher_set_iv(
311 psa_cipher_operation_t *arg0_operation,
312 const uint8_t *arg1_iv,
313 size_t arg2_iv_length)
314{
315 psa_status_t status = (psa_cipher_set_iv)(arg0_operation, arg1_iv, arg2_iv_length);
316 return status;
317}
318
319/* Wrapper for psa_cipher_update */
320psa_status_t mbedtls_test_wrap_psa_cipher_update(
321 psa_cipher_operation_t *arg0_operation,
322 const uint8_t *arg1_input,
323 size_t arg2_input_length,
324 uint8_t *arg3_output,
325 size_t arg4_output_size,
326 size_t *arg5_output_length)
327{
328 psa_status_t status = (psa_cipher_update)(arg0_operation, arg1_input, arg2_input_length, arg3_output, arg4_output_size, arg5_output_length);
329 return status;
330}
331
332/* Wrapper for psa_copy_key */
333psa_status_t mbedtls_test_wrap_psa_copy_key(
334 mbedtls_svc_key_id_t arg0_source_key,
335 const psa_key_attributes_t *arg1_attributes,
336 mbedtls_svc_key_id_t *arg2_target_key)
337{
338 psa_status_t status = (psa_copy_key)(arg0_source_key, arg1_attributes, arg2_target_key);
339 return status;
340}
341
342/* Wrapper for psa_crypto_driver_pake_get_cipher_suite */
343psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_cipher_suite(
344 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
345 psa_pake_cipher_suite_t *arg1_cipher_suite)
346{
347 psa_status_t status = (psa_crypto_driver_pake_get_cipher_suite)(arg0_inputs, arg1_cipher_suite);
348 return status;
349}
350
351/* Wrapper for psa_crypto_driver_pake_get_password */
352psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_password(
353 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
354 uint8_t *arg1_buffer,
355 size_t arg2_buffer_size,
356 size_t *arg3_buffer_length)
357{
358 psa_status_t status = (psa_crypto_driver_pake_get_password)(arg0_inputs, arg1_buffer, arg2_buffer_size, arg3_buffer_length);
359 return status;
360}
361
362/* Wrapper for psa_crypto_driver_pake_get_password_len */
363psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_password_len(
364 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
365 size_t *arg1_password_len)
366{
367 psa_status_t status = (psa_crypto_driver_pake_get_password_len)(arg0_inputs, arg1_password_len);
368 return status;
369}
370
371/* Wrapper for psa_crypto_driver_pake_get_peer */
372psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_peer(
373 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
374 uint8_t *arg1_peer_id,
375 size_t arg2_peer_id_size,
376 size_t *arg3_peer_id_length)
377{
378 psa_status_t status = (psa_crypto_driver_pake_get_peer)(arg0_inputs, arg1_peer_id, arg2_peer_id_size, arg3_peer_id_length);
379 return status;
380}
381
382/* Wrapper for psa_crypto_driver_pake_get_peer_len */
383psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_peer_len(
384 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
385 size_t *arg1_peer_len)
386{
387 psa_status_t status = (psa_crypto_driver_pake_get_peer_len)(arg0_inputs, arg1_peer_len);
388 return status;
389}
390
391/* Wrapper for psa_crypto_driver_pake_get_user */
392psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_user(
393 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
394 uint8_t *arg1_user_id,
395 size_t arg2_user_id_size,
396 size_t *arg3_user_id_len)
397{
398 psa_status_t status = (psa_crypto_driver_pake_get_user)(arg0_inputs, arg1_user_id, arg2_user_id_size, arg3_user_id_len);
399 return status;
400}
401
402/* Wrapper for psa_crypto_driver_pake_get_user_len */
403psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_user_len(
404 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
405 size_t *arg1_user_len)
406{
407 psa_status_t status = (psa_crypto_driver_pake_get_user_len)(arg0_inputs, arg1_user_len);
408 return status;
409}
410
411/* Wrapper for psa_crypto_init */
412psa_status_t mbedtls_test_wrap_psa_crypto_init(void)
413{
414 psa_status_t status = (psa_crypto_init)();
415 return status;
416}
417
418/* Wrapper for psa_destroy_key */
419psa_status_t mbedtls_test_wrap_psa_destroy_key(
420 mbedtls_svc_key_id_t arg0_key)
421{
422 psa_status_t status = (psa_destroy_key)(arg0_key);
423 return status;
424}
425
426/* Wrapper for psa_export_key */
427psa_status_t mbedtls_test_wrap_psa_export_key(
428 mbedtls_svc_key_id_t arg0_key,
429 uint8_t *arg1_data,
430 size_t arg2_data_size,
431 size_t *arg3_data_length)
432{
433 psa_status_t status = (psa_export_key)(arg0_key, arg1_data, arg2_data_size, arg3_data_length);
434 return status;
435}
436
437/* Wrapper for psa_export_public_key */
438psa_status_t mbedtls_test_wrap_psa_export_public_key(
439 mbedtls_svc_key_id_t arg0_key,
440 uint8_t *arg1_data,
441 size_t arg2_data_size,
442 size_t *arg3_data_length)
443{
444 psa_status_t status = (psa_export_public_key)(arg0_key, arg1_data, arg2_data_size, arg3_data_length);
445 return status;
446}
447
448/* Wrapper for psa_generate_key */
449psa_status_t mbedtls_test_wrap_psa_generate_key(
450 const psa_key_attributes_t *arg0_attributes,
451 mbedtls_svc_key_id_t *arg1_key)
452{
453 psa_status_t status = (psa_generate_key)(arg0_attributes, arg1_key);
454 return status;
455}
456
457/* Wrapper for psa_generate_random */
458psa_status_t mbedtls_test_wrap_psa_generate_random(
459 uint8_t *arg0_output,
460 size_t arg1_output_size)
461{
462 psa_status_t status = (psa_generate_random)(arg0_output, arg1_output_size);
463 return status;
464}
465
466/* Wrapper for psa_get_key_attributes */
467psa_status_t mbedtls_test_wrap_psa_get_key_attributes(
468 mbedtls_svc_key_id_t arg0_key,
469 psa_key_attributes_t *arg1_attributes)
470{
471 psa_status_t status = (psa_get_key_attributes)(arg0_key, arg1_attributes);
472 return status;
473}
474
475/* Wrapper for psa_hash_abort */
476psa_status_t mbedtls_test_wrap_psa_hash_abort(
477 psa_hash_operation_t *arg0_operation)
478{
479 psa_status_t status = (psa_hash_abort)(arg0_operation);
480 return status;
481}
482
483/* Wrapper for psa_hash_clone */
484psa_status_t mbedtls_test_wrap_psa_hash_clone(
485 const psa_hash_operation_t *arg0_source_operation,
486 psa_hash_operation_t *arg1_target_operation)
487{
488 psa_status_t status = (psa_hash_clone)(arg0_source_operation, arg1_target_operation);
489 return status;
490}
491
492/* Wrapper for psa_hash_compare */
493psa_status_t mbedtls_test_wrap_psa_hash_compare(
494 psa_algorithm_t arg0_alg,
495 const uint8_t *arg1_input,
496 size_t arg2_input_length,
497 const uint8_t *arg3_hash,
498 size_t arg4_hash_length)
499{
500 psa_status_t status = (psa_hash_compare)(arg0_alg, arg1_input, arg2_input_length, arg3_hash, arg4_hash_length);
501 return status;
502}
503
504/* Wrapper for psa_hash_compute */
505psa_status_t mbedtls_test_wrap_psa_hash_compute(
506 psa_algorithm_t arg0_alg,
507 const uint8_t *arg1_input,
508 size_t arg2_input_length,
509 uint8_t *arg3_hash,
510 size_t arg4_hash_size,
511 size_t *arg5_hash_length)
512{
513 psa_status_t status = (psa_hash_compute)(arg0_alg, arg1_input, arg2_input_length, arg3_hash, arg4_hash_size, arg5_hash_length);
514 return status;
515}
516
517/* Wrapper for psa_hash_finish */
518psa_status_t mbedtls_test_wrap_psa_hash_finish(
519 psa_hash_operation_t *arg0_operation,
520 uint8_t *arg1_hash,
521 size_t arg2_hash_size,
522 size_t *arg3_hash_length)
523{
524 psa_status_t status = (psa_hash_finish)(arg0_operation, arg1_hash, arg2_hash_size, arg3_hash_length);
525 return status;
526}
527
528/* Wrapper for psa_hash_setup */
529psa_status_t mbedtls_test_wrap_psa_hash_setup(
530 psa_hash_operation_t *arg0_operation,
531 psa_algorithm_t arg1_alg)
532{
533 psa_status_t status = (psa_hash_setup)(arg0_operation, arg1_alg);
534 return status;
535}
536
537/* Wrapper for psa_hash_update */
538psa_status_t mbedtls_test_wrap_psa_hash_update(
539 psa_hash_operation_t *arg0_operation,
540 const uint8_t *arg1_input,
541 size_t arg2_input_length)
542{
543 psa_status_t status = (psa_hash_update)(arg0_operation, arg1_input, arg2_input_length);
544 return status;
545}
546
547/* Wrapper for psa_hash_verify */
548psa_status_t mbedtls_test_wrap_psa_hash_verify(
549 psa_hash_operation_t *arg0_operation,
550 const uint8_t *arg1_hash,
551 size_t arg2_hash_length)
552{
553 psa_status_t status = (psa_hash_verify)(arg0_operation, arg1_hash, arg2_hash_length);
554 return status;
555}
556
557/* Wrapper for psa_import_key */
558psa_status_t mbedtls_test_wrap_psa_import_key(
559 const psa_key_attributes_t *arg0_attributes,
560 const uint8_t *arg1_data,
561 size_t arg2_data_length,
562 mbedtls_svc_key_id_t *arg3_key)
563{
564 psa_status_t status = (psa_import_key)(arg0_attributes, arg1_data, arg2_data_length, arg3_key);
565 return status;
566}
567
568/* Wrapper for psa_key_derivation_abort */
569psa_status_t mbedtls_test_wrap_psa_key_derivation_abort(
570 psa_key_derivation_operation_t *arg0_operation)
571{
572 psa_status_t status = (psa_key_derivation_abort)(arg0_operation);
573 return status;
574}
575
576/* Wrapper for psa_key_derivation_get_capacity */
577psa_status_t mbedtls_test_wrap_psa_key_derivation_get_capacity(
578 const psa_key_derivation_operation_t *arg0_operation,
579 size_t *arg1_capacity)
580{
581 psa_status_t status = (psa_key_derivation_get_capacity)(arg0_operation, arg1_capacity);
582 return status;
583}
584
585/* Wrapper for psa_key_derivation_input_bytes */
586psa_status_t mbedtls_test_wrap_psa_key_derivation_input_bytes(
587 psa_key_derivation_operation_t *arg0_operation,
588 psa_key_derivation_step_t arg1_step,
589 const uint8_t *arg2_data,
590 size_t arg3_data_length)
591{
592 psa_status_t status = (psa_key_derivation_input_bytes)(arg0_operation, arg1_step, arg2_data, arg3_data_length);
593 return status;
594}
595
596/* Wrapper for psa_key_derivation_input_integer */
597psa_status_t mbedtls_test_wrap_psa_key_derivation_input_integer(
598 psa_key_derivation_operation_t *arg0_operation,
599 psa_key_derivation_step_t arg1_step,
600 uint64_t arg2_value)
601{
602 psa_status_t status = (psa_key_derivation_input_integer)(arg0_operation, arg1_step, arg2_value);
603 return status;
604}
605
606/* Wrapper for psa_key_derivation_input_key */
607psa_status_t mbedtls_test_wrap_psa_key_derivation_input_key(
608 psa_key_derivation_operation_t *arg0_operation,
609 psa_key_derivation_step_t arg1_step,
610 mbedtls_svc_key_id_t arg2_key)
611{
612 psa_status_t status = (psa_key_derivation_input_key)(arg0_operation, arg1_step, arg2_key);
613 return status;
614}
615
616/* Wrapper for psa_key_derivation_key_agreement */
617psa_status_t mbedtls_test_wrap_psa_key_derivation_key_agreement(
618 psa_key_derivation_operation_t *arg0_operation,
619 psa_key_derivation_step_t arg1_step,
620 mbedtls_svc_key_id_t arg2_private_key,
621 const uint8_t *arg3_peer_key,
622 size_t arg4_peer_key_length)
623{
624 psa_status_t status = (psa_key_derivation_key_agreement)(arg0_operation, arg1_step, arg2_private_key, arg3_peer_key, arg4_peer_key_length);
625 return status;
626}
627
628/* Wrapper for psa_key_derivation_output_bytes */
629psa_status_t mbedtls_test_wrap_psa_key_derivation_output_bytes(
630 psa_key_derivation_operation_t *arg0_operation,
631 uint8_t *arg1_output,
632 size_t arg2_output_length)
633{
634 psa_status_t status = (psa_key_derivation_output_bytes)(arg0_operation, arg1_output, arg2_output_length);
635 return status;
636}
637
638/* Wrapper for psa_key_derivation_output_key */
639psa_status_t mbedtls_test_wrap_psa_key_derivation_output_key(
640 const psa_key_attributes_t *arg0_attributes,
641 psa_key_derivation_operation_t *arg1_operation,
642 mbedtls_svc_key_id_t *arg2_key)
643{
644 psa_status_t status = (psa_key_derivation_output_key)(arg0_attributes, arg1_operation, arg2_key);
645 return status;
646}
647
648/* Wrapper for psa_key_derivation_set_capacity */
649psa_status_t mbedtls_test_wrap_psa_key_derivation_set_capacity(
650 psa_key_derivation_operation_t *arg0_operation,
651 size_t arg1_capacity)
652{
653 psa_status_t status = (psa_key_derivation_set_capacity)(arg0_operation, arg1_capacity);
654 return status;
655}
656
657/* Wrapper for psa_key_derivation_setup */
658psa_status_t mbedtls_test_wrap_psa_key_derivation_setup(
659 psa_key_derivation_operation_t *arg0_operation,
660 psa_algorithm_t arg1_alg)
661{
662 psa_status_t status = (psa_key_derivation_setup)(arg0_operation, arg1_alg);
663 return status;
664}
665
666/* Wrapper for psa_mac_abort */
667psa_status_t mbedtls_test_wrap_psa_mac_abort(
668 psa_mac_operation_t *arg0_operation)
669{
670 psa_status_t status = (psa_mac_abort)(arg0_operation);
671 return status;
672}
673
674/* Wrapper for psa_mac_compute */
675psa_status_t mbedtls_test_wrap_psa_mac_compute(
676 mbedtls_svc_key_id_t arg0_key,
677 psa_algorithm_t arg1_alg,
678 const uint8_t *arg2_input,
679 size_t arg3_input_length,
680 uint8_t *arg4_mac,
681 size_t arg5_mac_size,
682 size_t *arg6_mac_length)
683{
684 psa_status_t status = (psa_mac_compute)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_mac, arg5_mac_size, arg6_mac_length);
685 return status;
686}
687
688/* Wrapper for psa_mac_sign_finish */
689psa_status_t mbedtls_test_wrap_psa_mac_sign_finish(
690 psa_mac_operation_t *arg0_operation,
691 uint8_t *arg1_mac,
692 size_t arg2_mac_size,
693 size_t *arg3_mac_length)
694{
695 psa_status_t status = (psa_mac_sign_finish)(arg0_operation, arg1_mac, arg2_mac_size, arg3_mac_length);
696 return status;
697}
698
699/* Wrapper for psa_mac_sign_setup */
700psa_status_t mbedtls_test_wrap_psa_mac_sign_setup(
701 psa_mac_operation_t *arg0_operation,
702 mbedtls_svc_key_id_t arg1_key,
703 psa_algorithm_t arg2_alg)
704{
705 psa_status_t status = (psa_mac_sign_setup)(arg0_operation, arg1_key, arg2_alg);
706 return status;
707}
708
709/* Wrapper for psa_mac_update */
710psa_status_t mbedtls_test_wrap_psa_mac_update(
711 psa_mac_operation_t *arg0_operation,
712 const uint8_t *arg1_input,
713 size_t arg2_input_length)
714{
715 psa_status_t status = (psa_mac_update)(arg0_operation, arg1_input, arg2_input_length);
716 return status;
717}
718
719/* Wrapper for psa_mac_verify */
720psa_status_t mbedtls_test_wrap_psa_mac_verify(
721 mbedtls_svc_key_id_t arg0_key,
722 psa_algorithm_t arg1_alg,
723 const uint8_t *arg2_input,
724 size_t arg3_input_length,
725 const uint8_t *arg4_mac,
726 size_t arg5_mac_length)
727{
728 psa_status_t status = (psa_mac_verify)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_mac, arg5_mac_length);
729 return status;
730}
731
732/* Wrapper for psa_mac_verify_finish */
733psa_status_t mbedtls_test_wrap_psa_mac_verify_finish(
734 psa_mac_operation_t *arg0_operation,
735 const uint8_t *arg1_mac,
736 size_t arg2_mac_length)
737{
738 psa_status_t status = (psa_mac_verify_finish)(arg0_operation, arg1_mac, arg2_mac_length);
739 return status;
740}
741
742/* Wrapper for psa_mac_verify_setup */
743psa_status_t mbedtls_test_wrap_psa_mac_verify_setup(
744 psa_mac_operation_t *arg0_operation,
745 mbedtls_svc_key_id_t arg1_key,
746 psa_algorithm_t arg2_alg)
747{
748 psa_status_t status = (psa_mac_verify_setup)(arg0_operation, arg1_key, arg2_alg);
749 return status;
750}
751
752/* Wrapper for psa_pake_abort */
753psa_status_t mbedtls_test_wrap_psa_pake_abort(
754 psa_pake_operation_t *arg0_operation)
755{
756 psa_status_t status = (psa_pake_abort)(arg0_operation);
757 return status;
758}
759
760/* Wrapper for psa_pake_get_implicit_key */
761psa_status_t mbedtls_test_wrap_psa_pake_get_implicit_key(
762 psa_pake_operation_t *arg0_operation,
763 psa_key_derivation_operation_t *arg1_output)
764{
765 psa_status_t status = (psa_pake_get_implicit_key)(arg0_operation, arg1_output);
766 return status;
767}
768
769/* Wrapper for psa_pake_input */
770psa_status_t mbedtls_test_wrap_psa_pake_input(
771 psa_pake_operation_t *arg0_operation,
772 psa_pake_step_t arg1_step,
773 const uint8_t *arg2_input,
774 size_t arg3_input_length)
775{
776 psa_status_t status = (psa_pake_input)(arg0_operation, arg1_step, arg2_input, arg3_input_length);
777 return status;
778}
779
780/* Wrapper for psa_pake_output */
781psa_status_t mbedtls_test_wrap_psa_pake_output(
782 psa_pake_operation_t *arg0_operation,
783 psa_pake_step_t arg1_step,
784 uint8_t *arg2_output,
785 size_t arg3_output_size,
786 size_t *arg4_output_length)
787{
788 psa_status_t status = (psa_pake_output)(arg0_operation, arg1_step, arg2_output, arg3_output_size, arg4_output_length);
789 return status;
790}
791
792/* Wrapper for psa_pake_set_password_key */
793psa_status_t mbedtls_test_wrap_psa_pake_set_password_key(
794 psa_pake_operation_t *arg0_operation,
795 mbedtls_svc_key_id_t arg1_password)
796{
797 psa_status_t status = (psa_pake_set_password_key)(arg0_operation, arg1_password);
798 return status;
799}
800
801/* Wrapper for psa_pake_set_peer */
802psa_status_t mbedtls_test_wrap_psa_pake_set_peer(
803 psa_pake_operation_t *arg0_operation,
804 const uint8_t *arg1_peer_id,
805 size_t arg2_peer_id_len)
806{
807 psa_status_t status = (psa_pake_set_peer)(arg0_operation, arg1_peer_id, arg2_peer_id_len);
808 return status;
809}
810
811/* Wrapper for psa_pake_set_role */
812psa_status_t mbedtls_test_wrap_psa_pake_set_role(
813 psa_pake_operation_t *arg0_operation,
814 psa_pake_role_t arg1_role)
815{
816 psa_status_t status = (psa_pake_set_role)(arg0_operation, arg1_role);
817 return status;
818}
819
820/* Wrapper for psa_pake_set_user */
821psa_status_t mbedtls_test_wrap_psa_pake_set_user(
822 psa_pake_operation_t *arg0_operation,
823 const uint8_t *arg1_user_id,
824 size_t arg2_user_id_len)
825{
826 psa_status_t status = (psa_pake_set_user)(arg0_operation, arg1_user_id, arg2_user_id_len);
827 return status;
828}
829
830/* Wrapper for psa_pake_setup */
831psa_status_t mbedtls_test_wrap_psa_pake_setup(
832 psa_pake_operation_t *arg0_operation,
833 const psa_pake_cipher_suite_t *arg1_cipher_suite)
834{
835 psa_status_t status = (psa_pake_setup)(arg0_operation, arg1_cipher_suite);
836 return status;
837}
838
839/* Wrapper for psa_purge_key */
840psa_status_t mbedtls_test_wrap_psa_purge_key(
841 mbedtls_svc_key_id_t arg0_key)
842{
843 psa_status_t status = (psa_purge_key)(arg0_key);
844 return status;
845}
846
847/* Wrapper for psa_raw_key_agreement */
848psa_status_t mbedtls_test_wrap_psa_raw_key_agreement(
849 psa_algorithm_t arg0_alg,
850 mbedtls_svc_key_id_t arg1_private_key,
851 const uint8_t *arg2_peer_key,
852 size_t arg3_peer_key_length,
853 uint8_t *arg4_output,
854 size_t arg5_output_size,
855 size_t *arg6_output_length)
856{
857 psa_status_t status = (psa_raw_key_agreement)(arg0_alg, arg1_private_key, arg2_peer_key, arg3_peer_key_length, arg4_output, arg5_output_size, arg6_output_length);
858 return status;
859}
860
861/* Wrapper for psa_sign_hash */
862psa_status_t mbedtls_test_wrap_psa_sign_hash(
863 mbedtls_svc_key_id_t arg0_key,
864 psa_algorithm_t arg1_alg,
865 const uint8_t *arg2_hash,
866 size_t arg3_hash_length,
867 uint8_t *arg4_signature,
868 size_t arg5_signature_size,
869 size_t *arg6_signature_length)
870{
871 psa_status_t status = (psa_sign_hash)(arg0_key, arg1_alg, arg2_hash, arg3_hash_length, arg4_signature, arg5_signature_size, arg6_signature_length);
872 return status;
873}
874
875/* Wrapper for psa_sign_hash_abort */
876psa_status_t mbedtls_test_wrap_psa_sign_hash_abort(
877 psa_sign_hash_interruptible_operation_t *arg0_operation)
878{
879 psa_status_t status = (psa_sign_hash_abort)(arg0_operation);
880 return status;
881}
882
883/* Wrapper for psa_sign_hash_complete */
884psa_status_t mbedtls_test_wrap_psa_sign_hash_complete(
885 psa_sign_hash_interruptible_operation_t *arg0_operation,
886 uint8_t *arg1_signature,
887 size_t arg2_signature_size,
888 size_t *arg3_signature_length)
889{
890 psa_status_t status = (psa_sign_hash_complete)(arg0_operation, arg1_signature, arg2_signature_size, arg3_signature_length);
891 return status;
892}
893
894/* Wrapper for psa_sign_hash_start */
895psa_status_t mbedtls_test_wrap_psa_sign_hash_start(
896 psa_sign_hash_interruptible_operation_t *arg0_operation,
897 mbedtls_svc_key_id_t arg1_key,
898 psa_algorithm_t arg2_alg,
899 const uint8_t *arg3_hash,
900 size_t arg4_hash_length)
901{
902 psa_status_t status = (psa_sign_hash_start)(arg0_operation, arg1_key, arg2_alg, arg3_hash, arg4_hash_length);
903 return status;
904}
905
906/* Wrapper for psa_sign_message */
907psa_status_t mbedtls_test_wrap_psa_sign_message(
908 mbedtls_svc_key_id_t arg0_key,
909 psa_algorithm_t arg1_alg,
910 const uint8_t *arg2_input,
911 size_t arg3_input_length,
912 uint8_t *arg4_signature,
913 size_t arg5_signature_size,
914 size_t *arg6_signature_length)
915{
916 psa_status_t status = (psa_sign_message)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_signature, arg5_signature_size, arg6_signature_length);
917 return status;
918}
919
920/* Wrapper for psa_verify_hash */
921psa_status_t mbedtls_test_wrap_psa_verify_hash(
922 mbedtls_svc_key_id_t arg0_key,
923 psa_algorithm_t arg1_alg,
924 const uint8_t *arg2_hash,
925 size_t arg3_hash_length,
926 const uint8_t *arg4_signature,
927 size_t arg5_signature_length)
928{
929 psa_status_t status = (psa_verify_hash)(arg0_key, arg1_alg, arg2_hash, arg3_hash_length, arg4_signature, arg5_signature_length);
930 return status;
931}
932
933/* Wrapper for psa_verify_hash_abort */
934psa_status_t mbedtls_test_wrap_psa_verify_hash_abort(
935 psa_verify_hash_interruptible_operation_t *arg0_operation)
936{
937 psa_status_t status = (psa_verify_hash_abort)(arg0_operation);
938 return status;
939}
940
941/* Wrapper for psa_verify_hash_complete */
942psa_status_t mbedtls_test_wrap_psa_verify_hash_complete(
943 psa_verify_hash_interruptible_operation_t *arg0_operation)
944{
945 psa_status_t status = (psa_verify_hash_complete)(arg0_operation);
946 return status;
947}
948
949/* Wrapper for psa_verify_hash_start */
950psa_status_t mbedtls_test_wrap_psa_verify_hash_start(
951 psa_verify_hash_interruptible_operation_t *arg0_operation,
952 mbedtls_svc_key_id_t arg1_key,
953 psa_algorithm_t arg2_alg,
954 const uint8_t *arg3_hash,
955 size_t arg4_hash_length,
956 const uint8_t *arg5_signature,
957 size_t arg6_signature_length)
958{
959 psa_status_t status = (psa_verify_hash_start)(arg0_operation, arg1_key, arg2_alg, arg3_hash, arg4_hash_length, arg5_signature, arg6_signature_length);
960 return status;
961}
962
963/* Wrapper for psa_verify_message */
964psa_status_t mbedtls_test_wrap_psa_verify_message(
965 mbedtls_svc_key_id_t arg0_key,
966 psa_algorithm_t arg1_alg,
967 const uint8_t *arg2_input,
968 size_t arg3_input_length,
969 const uint8_t *arg4_signature,
970 size_t arg5_signature_length)
971{
972 psa_status_t status = (psa_verify_message)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_signature, arg5_signature_length);
973 return status;
974}
975
976#endif /* defined(MBEDTLS_PSA_CRYPTO_C) && defined(MBEDTLS_TEST_HOOKS) */
977
978/* End of automatically generated file. */