blob: 728afed3de4f11a6425eb13b4ec9508da35dbd1b [file] [log] [blame]
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001/* Automatically generated by generate_psa_wrappers.py, do not edit! */
2
3/* Copyright The Mbed TLS Contributors
4 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
5 */
6
7#include <mbedtls/build_info.h>
8
Gilles Peskine4411c9c2024-01-04 20:51:38 +01009#if defined(MBEDTLS_PSA_CRYPTO_C) && defined(MBEDTLS_TEST_HOOKS) && \
10 !defined(RECORD_PSA_STATUS_COVERAGE_LOG)
Gilles Peskine6e4332c2024-01-04 16:42:40 +010011
12#include <psa/crypto.h>
13
Gilles Peskine90d14d72024-01-04 16:59:28 +010014#include <test/memory.h>
Gilles Peskine6e4332c2024-01-04 16:42:40 +010015#include <test/psa_crypto_helpers.h>
16#include <test/psa_test_wrappers.h>
17
18/* Wrapper for mbedtls_psa_inject_entropy */
19#if defined(MBEDTLS_PSA_INJECT_ENTROPY)
20psa_status_t mbedtls_test_wrap_mbedtls_psa_inject_entropy(
21 const uint8_t *arg0_seed,
22 size_t arg1_seed_size)
23{
24 psa_status_t status = (mbedtls_psa_inject_entropy)(arg0_seed, arg1_seed_size);
25 return status;
26}
27#endif /* defined(MBEDTLS_PSA_INJECT_ENTROPY) */
28
29/* Wrapper for mbedtls_psa_platform_get_builtin_key */
30#if defined(MBEDTLS_PSA_CRYPTO_BUILTIN_KEYS)
31psa_status_t mbedtls_test_wrap_mbedtls_psa_platform_get_builtin_key(
32 mbedtls_svc_key_id_t arg0_key_id,
33 psa_key_lifetime_t *arg1_lifetime,
34 psa_drv_slot_number_t *arg2_slot_number)
35{
36 psa_status_t status = (mbedtls_psa_platform_get_builtin_key)(arg0_key_id, arg1_lifetime, arg2_slot_number);
37 return status;
38}
39#endif /* defined(MBEDTLS_PSA_CRYPTO_BUILTIN_KEYS) */
40
41/* Wrapper for mbedtls_psa_register_se_key */
42#if defined(MBEDTLS_PSA_CRYPTO_SE_C)
43psa_status_t mbedtls_test_wrap_mbedtls_psa_register_se_key(
44 const psa_key_attributes_t *arg0_attributes)
45{
46 psa_status_t status = (mbedtls_psa_register_se_key)(arg0_attributes);
47 return status;
48}
49#endif /* defined(MBEDTLS_PSA_CRYPTO_SE_C) */
50
51/* Wrapper for psa_aead_abort */
52psa_status_t mbedtls_test_wrap_psa_aead_abort(
53 psa_aead_operation_t *arg0_operation)
54{
55 psa_status_t status = (psa_aead_abort)(arg0_operation);
56 return status;
57}
58
59/* Wrapper for psa_aead_decrypt */
60psa_status_t mbedtls_test_wrap_psa_aead_decrypt(
61 mbedtls_svc_key_id_t arg0_key,
62 psa_algorithm_t arg1_alg,
63 const uint8_t *arg2_nonce,
64 size_t arg3_nonce_length,
65 const uint8_t *arg4_additional_data,
66 size_t arg5_additional_data_length,
67 const uint8_t *arg6_ciphertext,
68 size_t arg7_ciphertext_length,
69 uint8_t *arg8_plaintext,
70 size_t arg9_plaintext_size,
71 size_t *arg10_plaintext_length)
72{
73 psa_status_t status = (psa_aead_decrypt)(arg0_key, arg1_alg, arg2_nonce, arg3_nonce_length, arg4_additional_data, arg5_additional_data_length, arg6_ciphertext, arg7_ciphertext_length, arg8_plaintext, arg9_plaintext_size, arg10_plaintext_length);
74 return status;
75}
76
77/* Wrapper for psa_aead_decrypt_setup */
78psa_status_t mbedtls_test_wrap_psa_aead_decrypt_setup(
79 psa_aead_operation_t *arg0_operation,
80 mbedtls_svc_key_id_t arg1_key,
81 psa_algorithm_t arg2_alg)
82{
83 psa_status_t status = (psa_aead_decrypt_setup)(arg0_operation, arg1_key, arg2_alg);
84 return status;
85}
86
87/* Wrapper for psa_aead_encrypt */
88psa_status_t mbedtls_test_wrap_psa_aead_encrypt(
89 mbedtls_svc_key_id_t arg0_key,
90 psa_algorithm_t arg1_alg,
91 const uint8_t *arg2_nonce,
92 size_t arg3_nonce_length,
93 const uint8_t *arg4_additional_data,
94 size_t arg5_additional_data_length,
95 const uint8_t *arg6_plaintext,
96 size_t arg7_plaintext_length,
97 uint8_t *arg8_ciphertext,
98 size_t arg9_ciphertext_size,
99 size_t *arg10_ciphertext_length)
100{
101 psa_status_t status = (psa_aead_encrypt)(arg0_key, arg1_alg, arg2_nonce, arg3_nonce_length, arg4_additional_data, arg5_additional_data_length, arg6_plaintext, arg7_plaintext_length, arg8_ciphertext, arg9_ciphertext_size, arg10_ciphertext_length);
102 return status;
103}
104
105/* Wrapper for psa_aead_encrypt_setup */
106psa_status_t mbedtls_test_wrap_psa_aead_encrypt_setup(
107 psa_aead_operation_t *arg0_operation,
108 mbedtls_svc_key_id_t arg1_key,
109 psa_algorithm_t arg2_alg)
110{
111 psa_status_t status = (psa_aead_encrypt_setup)(arg0_operation, arg1_key, arg2_alg);
112 return status;
113}
114
115/* Wrapper for psa_aead_finish */
116psa_status_t mbedtls_test_wrap_psa_aead_finish(
117 psa_aead_operation_t *arg0_operation,
118 uint8_t *arg1_ciphertext,
119 size_t arg2_ciphertext_size,
120 size_t *arg3_ciphertext_length,
121 uint8_t *arg4_tag,
122 size_t arg5_tag_size,
123 size_t *arg6_tag_length)
124{
125 psa_status_t status = (psa_aead_finish)(arg0_operation, arg1_ciphertext, arg2_ciphertext_size, arg3_ciphertext_length, arg4_tag, arg5_tag_size, arg6_tag_length);
126 return status;
127}
128
129/* Wrapper for psa_aead_generate_nonce */
130psa_status_t mbedtls_test_wrap_psa_aead_generate_nonce(
131 psa_aead_operation_t *arg0_operation,
132 uint8_t *arg1_nonce,
133 size_t arg2_nonce_size,
134 size_t *arg3_nonce_length)
135{
136 psa_status_t status = (psa_aead_generate_nonce)(arg0_operation, arg1_nonce, arg2_nonce_size, arg3_nonce_length);
137 return status;
138}
139
140/* Wrapper for psa_aead_set_lengths */
141psa_status_t mbedtls_test_wrap_psa_aead_set_lengths(
142 psa_aead_operation_t *arg0_operation,
143 size_t arg1_ad_length,
144 size_t arg2_plaintext_length)
145{
146 psa_status_t status = (psa_aead_set_lengths)(arg0_operation, arg1_ad_length, arg2_plaintext_length);
147 return status;
148}
149
150/* Wrapper for psa_aead_set_nonce */
151psa_status_t mbedtls_test_wrap_psa_aead_set_nonce(
152 psa_aead_operation_t *arg0_operation,
153 const uint8_t *arg1_nonce,
154 size_t arg2_nonce_length)
155{
156 psa_status_t status = (psa_aead_set_nonce)(arg0_operation, arg1_nonce, arg2_nonce_length);
157 return status;
158}
159
160/* Wrapper for psa_aead_update */
161psa_status_t mbedtls_test_wrap_psa_aead_update(
162 psa_aead_operation_t *arg0_operation,
163 const uint8_t *arg1_input,
164 size_t arg2_input_length,
165 uint8_t *arg3_output,
166 size_t arg4_output_size,
167 size_t *arg5_output_length)
168{
169 psa_status_t status = (psa_aead_update)(arg0_operation, arg1_input, arg2_input_length, arg3_output, arg4_output_size, arg5_output_length);
170 return status;
171}
172
173/* Wrapper for psa_aead_update_ad */
174psa_status_t mbedtls_test_wrap_psa_aead_update_ad(
175 psa_aead_operation_t *arg0_operation,
176 const uint8_t *arg1_input,
177 size_t arg2_input_length)
178{
179 psa_status_t status = (psa_aead_update_ad)(arg0_operation, arg1_input, arg2_input_length);
180 return status;
181}
182
183/* Wrapper for psa_aead_verify */
184psa_status_t mbedtls_test_wrap_psa_aead_verify(
185 psa_aead_operation_t *arg0_operation,
186 uint8_t *arg1_plaintext,
187 size_t arg2_plaintext_size,
188 size_t *arg3_plaintext_length,
189 const uint8_t *arg4_tag,
190 size_t arg5_tag_length)
191{
192 psa_status_t status = (psa_aead_verify)(arg0_operation, arg1_plaintext, arg2_plaintext_size, arg3_plaintext_length, arg4_tag, arg5_tag_length);
193 return status;
194}
195
196/* Wrapper for psa_asymmetric_decrypt */
197psa_status_t mbedtls_test_wrap_psa_asymmetric_decrypt(
198 mbedtls_svc_key_id_t arg0_key,
199 psa_algorithm_t arg1_alg,
200 const uint8_t *arg2_input,
201 size_t arg3_input_length,
202 const uint8_t *arg4_salt,
203 size_t arg5_salt_length,
204 uint8_t *arg6_output,
205 size_t arg7_output_size,
206 size_t *arg8_output_length)
207{
208 psa_status_t status = (psa_asymmetric_decrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_salt, arg5_salt_length, arg6_output, arg7_output_size, arg8_output_length);
209 return status;
210}
211
212/* Wrapper for psa_asymmetric_encrypt */
213psa_status_t mbedtls_test_wrap_psa_asymmetric_encrypt(
214 mbedtls_svc_key_id_t arg0_key,
215 psa_algorithm_t arg1_alg,
216 const uint8_t *arg2_input,
217 size_t arg3_input_length,
218 const uint8_t *arg4_salt,
219 size_t arg5_salt_length,
220 uint8_t *arg6_output,
221 size_t arg7_output_size,
222 size_t *arg8_output_length)
223{
224 psa_status_t status = (psa_asymmetric_encrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_salt, arg5_salt_length, arg6_output, arg7_output_size, arg8_output_length);
225 return status;
226}
227
228/* Wrapper for psa_cipher_abort */
229psa_status_t mbedtls_test_wrap_psa_cipher_abort(
230 psa_cipher_operation_t *arg0_operation)
231{
232 psa_status_t status = (psa_cipher_abort)(arg0_operation);
233 return status;
234}
235
236/* Wrapper for psa_cipher_decrypt */
237psa_status_t mbedtls_test_wrap_psa_cipher_decrypt(
238 mbedtls_svc_key_id_t arg0_key,
239 psa_algorithm_t arg1_alg,
240 const uint8_t *arg2_input,
241 size_t arg3_input_length,
242 uint8_t *arg4_output,
243 size_t arg5_output_size,
244 size_t *arg6_output_length)
245{
246 psa_status_t status = (psa_cipher_decrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_output, arg5_output_size, arg6_output_length);
247 return status;
248}
249
250/* Wrapper for psa_cipher_decrypt_setup */
251psa_status_t mbedtls_test_wrap_psa_cipher_decrypt_setup(
252 psa_cipher_operation_t *arg0_operation,
253 mbedtls_svc_key_id_t arg1_key,
254 psa_algorithm_t arg2_alg)
255{
256 psa_status_t status = (psa_cipher_decrypt_setup)(arg0_operation, arg1_key, arg2_alg);
257 return status;
258}
259
260/* Wrapper for psa_cipher_encrypt */
261psa_status_t mbedtls_test_wrap_psa_cipher_encrypt(
262 mbedtls_svc_key_id_t arg0_key,
263 psa_algorithm_t arg1_alg,
264 const uint8_t *arg2_input,
265 size_t arg3_input_length,
266 uint8_t *arg4_output,
267 size_t arg5_output_size,
268 size_t *arg6_output_length)
269{
Ryan Everett84a666d2024-01-25 12:00:02 +0000270#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
271 MBEDTLS_TEST_MEMORY_POISON(arg2_input, arg3_input_length);
272 MBEDTLS_TEST_MEMORY_POISON(arg4_output, arg5_output_size);
273#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100274 psa_status_t status = (psa_cipher_encrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_output, arg5_output_size, arg6_output_length);
Ryan Everett84a666d2024-01-25 12:00:02 +0000275#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
276 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_input, arg3_input_length);
277 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_output, arg5_output_size);
278#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100279 return status;
280}
281
282/* Wrapper for psa_cipher_encrypt_setup */
283psa_status_t mbedtls_test_wrap_psa_cipher_encrypt_setup(
284 psa_cipher_operation_t *arg0_operation,
285 mbedtls_svc_key_id_t arg1_key,
286 psa_algorithm_t arg2_alg)
287{
288 psa_status_t status = (psa_cipher_encrypt_setup)(arg0_operation, arg1_key, arg2_alg);
289 return status;
290}
291
292/* Wrapper for psa_cipher_finish */
293psa_status_t mbedtls_test_wrap_psa_cipher_finish(
294 psa_cipher_operation_t *arg0_operation,
295 uint8_t *arg1_output,
296 size_t arg2_output_size,
297 size_t *arg3_output_length)
298{
299 psa_status_t status = (psa_cipher_finish)(arg0_operation, arg1_output, arg2_output_size, arg3_output_length);
300 return status;
301}
302
303/* Wrapper for psa_cipher_generate_iv */
304psa_status_t mbedtls_test_wrap_psa_cipher_generate_iv(
305 psa_cipher_operation_t *arg0_operation,
306 uint8_t *arg1_iv,
307 size_t arg2_iv_size,
308 size_t *arg3_iv_length)
309{
310 psa_status_t status = (psa_cipher_generate_iv)(arg0_operation, arg1_iv, arg2_iv_size, arg3_iv_length);
311 return status;
312}
313
314/* Wrapper for psa_cipher_set_iv */
315psa_status_t mbedtls_test_wrap_psa_cipher_set_iv(
316 psa_cipher_operation_t *arg0_operation,
317 const uint8_t *arg1_iv,
318 size_t arg2_iv_length)
319{
320 psa_status_t status = (psa_cipher_set_iv)(arg0_operation, arg1_iv, arg2_iv_length);
321 return status;
322}
323
324/* Wrapper for psa_cipher_update */
325psa_status_t mbedtls_test_wrap_psa_cipher_update(
326 psa_cipher_operation_t *arg0_operation,
327 const uint8_t *arg1_input,
328 size_t arg2_input_length,
329 uint8_t *arg3_output,
330 size_t arg4_output_size,
331 size_t *arg5_output_length)
332{
333 psa_status_t status = (psa_cipher_update)(arg0_operation, arg1_input, arg2_input_length, arg3_output, arg4_output_size, arg5_output_length);
334 return status;
335}
336
337/* Wrapper for psa_copy_key */
338psa_status_t mbedtls_test_wrap_psa_copy_key(
339 mbedtls_svc_key_id_t arg0_source_key,
340 const psa_key_attributes_t *arg1_attributes,
341 mbedtls_svc_key_id_t *arg2_target_key)
342{
343 psa_status_t status = (psa_copy_key)(arg0_source_key, arg1_attributes, arg2_target_key);
344 return status;
345}
346
347/* Wrapper for psa_crypto_driver_pake_get_cipher_suite */
348psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_cipher_suite(
349 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
350 psa_pake_cipher_suite_t *arg1_cipher_suite)
351{
352 psa_status_t status = (psa_crypto_driver_pake_get_cipher_suite)(arg0_inputs, arg1_cipher_suite);
353 return status;
354}
355
356/* Wrapper for psa_crypto_driver_pake_get_password */
357psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_password(
358 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
359 uint8_t *arg1_buffer,
360 size_t arg2_buffer_size,
361 size_t *arg3_buffer_length)
362{
363 psa_status_t status = (psa_crypto_driver_pake_get_password)(arg0_inputs, arg1_buffer, arg2_buffer_size, arg3_buffer_length);
364 return status;
365}
366
367/* Wrapper for psa_crypto_driver_pake_get_password_len */
368psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_password_len(
369 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
370 size_t *arg1_password_len)
371{
372 psa_status_t status = (psa_crypto_driver_pake_get_password_len)(arg0_inputs, arg1_password_len);
373 return status;
374}
375
376/* Wrapper for psa_crypto_driver_pake_get_peer */
377psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_peer(
378 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
379 uint8_t *arg1_peer_id,
380 size_t arg2_peer_id_size,
381 size_t *arg3_peer_id_length)
382{
383 psa_status_t status = (psa_crypto_driver_pake_get_peer)(arg0_inputs, arg1_peer_id, arg2_peer_id_size, arg3_peer_id_length);
384 return status;
385}
386
387/* Wrapper for psa_crypto_driver_pake_get_peer_len */
388psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_peer_len(
389 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
390 size_t *arg1_peer_len)
391{
392 psa_status_t status = (psa_crypto_driver_pake_get_peer_len)(arg0_inputs, arg1_peer_len);
393 return status;
394}
395
396/* Wrapper for psa_crypto_driver_pake_get_user */
397psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_user(
398 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
399 uint8_t *arg1_user_id,
400 size_t arg2_user_id_size,
401 size_t *arg3_user_id_len)
402{
403 psa_status_t status = (psa_crypto_driver_pake_get_user)(arg0_inputs, arg1_user_id, arg2_user_id_size, arg3_user_id_len);
404 return status;
405}
406
407/* Wrapper for psa_crypto_driver_pake_get_user_len */
408psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_user_len(
409 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
410 size_t *arg1_user_len)
411{
412 psa_status_t status = (psa_crypto_driver_pake_get_user_len)(arg0_inputs, arg1_user_len);
413 return status;
414}
415
416/* Wrapper for psa_crypto_init */
417psa_status_t mbedtls_test_wrap_psa_crypto_init(void)
418{
419 psa_status_t status = (psa_crypto_init)();
420 return status;
421}
422
423/* Wrapper for psa_destroy_key */
424psa_status_t mbedtls_test_wrap_psa_destroy_key(
425 mbedtls_svc_key_id_t arg0_key)
426{
427 psa_status_t status = (psa_destroy_key)(arg0_key);
428 return status;
429}
430
431/* Wrapper for psa_export_key */
432psa_status_t mbedtls_test_wrap_psa_export_key(
433 mbedtls_svc_key_id_t arg0_key,
434 uint8_t *arg1_data,
435 size_t arg2_data_size,
436 size_t *arg3_data_length)
437{
Ryan Everett77b91e32024-01-25 10:58:06 +0000438#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
439 MBEDTLS_TEST_MEMORY_POISON(arg1_data, arg2_data_size);
440#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100441 psa_status_t status = (psa_export_key)(arg0_key, arg1_data, arg2_data_size, arg3_data_length);
Ryan Everett77b91e32024-01-25 10:58:06 +0000442#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
443 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_data, arg2_data_size);
444#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100445 return status;
446}
447
448/* Wrapper for psa_export_public_key */
449psa_status_t mbedtls_test_wrap_psa_export_public_key(
450 mbedtls_svc_key_id_t arg0_key,
451 uint8_t *arg1_data,
452 size_t arg2_data_size,
453 size_t *arg3_data_length)
454{
Ryan Everett77b91e32024-01-25 10:58:06 +0000455#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
456 MBEDTLS_TEST_MEMORY_POISON(arg1_data, arg2_data_size);
457#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100458 psa_status_t status = (psa_export_public_key)(arg0_key, arg1_data, arg2_data_size, arg3_data_length);
Ryan Everett77b91e32024-01-25 10:58:06 +0000459#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
460 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_data, arg2_data_size);
461#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100462 return status;
463}
464
465/* Wrapper for psa_generate_key */
466psa_status_t mbedtls_test_wrap_psa_generate_key(
467 const psa_key_attributes_t *arg0_attributes,
468 mbedtls_svc_key_id_t *arg1_key)
469{
470 psa_status_t status = (psa_generate_key)(arg0_attributes, arg1_key);
471 return status;
472}
473
474/* Wrapper for psa_generate_random */
475psa_status_t mbedtls_test_wrap_psa_generate_random(
476 uint8_t *arg0_output,
477 size_t arg1_output_size)
478{
479 psa_status_t status = (psa_generate_random)(arg0_output, arg1_output_size);
480 return status;
481}
482
483/* Wrapper for psa_get_key_attributes */
484psa_status_t mbedtls_test_wrap_psa_get_key_attributes(
485 mbedtls_svc_key_id_t arg0_key,
486 psa_key_attributes_t *arg1_attributes)
487{
488 psa_status_t status = (psa_get_key_attributes)(arg0_key, arg1_attributes);
489 return status;
490}
491
492/* Wrapper for psa_hash_abort */
493psa_status_t mbedtls_test_wrap_psa_hash_abort(
494 psa_hash_operation_t *arg0_operation)
495{
496 psa_status_t status = (psa_hash_abort)(arg0_operation);
497 return status;
498}
499
500/* Wrapper for psa_hash_clone */
501psa_status_t mbedtls_test_wrap_psa_hash_clone(
502 const psa_hash_operation_t *arg0_source_operation,
503 psa_hash_operation_t *arg1_target_operation)
504{
505 psa_status_t status = (psa_hash_clone)(arg0_source_operation, arg1_target_operation);
506 return status;
507}
508
509/* Wrapper for psa_hash_compare */
510psa_status_t mbedtls_test_wrap_psa_hash_compare(
511 psa_algorithm_t arg0_alg,
512 const uint8_t *arg1_input,
513 size_t arg2_input_length,
514 const uint8_t *arg3_hash,
515 size_t arg4_hash_length)
516{
Thomas Daubney45c85862024-01-25 16:48:09 +0000517#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
518 MBEDTLS_TEST_MEMORY_POISON(arg1_input, arg2_input_length);
519 MBEDTLS_TEST_MEMORY_POISON(arg3_hash, arg4_hash_length);
520#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100521 psa_status_t status = (psa_hash_compare)(arg0_alg, arg1_input, arg2_input_length, arg3_hash, arg4_hash_length);
Thomas Daubney45c85862024-01-25 16:48:09 +0000522#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
523 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_input, arg2_input_length);
524 MBEDTLS_TEST_MEMORY_UNPOISON(arg3_hash, arg4_hash_length);
525#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100526 return status;
527}
528
529/* Wrapper for psa_hash_compute */
530psa_status_t mbedtls_test_wrap_psa_hash_compute(
531 psa_algorithm_t arg0_alg,
532 const uint8_t *arg1_input,
533 size_t arg2_input_length,
534 uint8_t *arg3_hash,
535 size_t arg4_hash_size,
536 size_t *arg5_hash_length)
537{
Thomas Daubney45c85862024-01-25 16:48:09 +0000538#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
539 MBEDTLS_TEST_MEMORY_POISON(arg1_input, arg2_input_length);
540 MBEDTLS_TEST_MEMORY_POISON(arg3_hash, arg4_hash_size);
541#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100542 psa_status_t status = (psa_hash_compute)(arg0_alg, arg1_input, arg2_input_length, arg3_hash, arg4_hash_size, arg5_hash_length);
Thomas Daubney45c85862024-01-25 16:48:09 +0000543#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
544 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_input, arg2_input_length);
545 MBEDTLS_TEST_MEMORY_UNPOISON(arg3_hash, arg4_hash_size);
546#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100547 return status;
548}
549
550/* Wrapper for psa_hash_finish */
551psa_status_t mbedtls_test_wrap_psa_hash_finish(
552 psa_hash_operation_t *arg0_operation,
553 uint8_t *arg1_hash,
554 size_t arg2_hash_size,
555 size_t *arg3_hash_length)
556{
Thomas Daubney45c85862024-01-25 16:48:09 +0000557#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
558 MBEDTLS_TEST_MEMORY_POISON(arg1_hash, arg2_hash_size);
559#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100560 psa_status_t status = (psa_hash_finish)(arg0_operation, arg1_hash, arg2_hash_size, arg3_hash_length);
Thomas Daubney45c85862024-01-25 16:48:09 +0000561#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
562 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_hash, arg2_hash_size);
563#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100564 return status;
565}
566
567/* Wrapper for psa_hash_setup */
568psa_status_t mbedtls_test_wrap_psa_hash_setup(
569 psa_hash_operation_t *arg0_operation,
570 psa_algorithm_t arg1_alg)
571{
572 psa_status_t status = (psa_hash_setup)(arg0_operation, arg1_alg);
573 return status;
574}
575
576/* Wrapper for psa_hash_update */
577psa_status_t mbedtls_test_wrap_psa_hash_update(
578 psa_hash_operation_t *arg0_operation,
579 const uint8_t *arg1_input,
580 size_t arg2_input_length)
581{
Thomas Daubney45c85862024-01-25 16:48:09 +0000582#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
583 MBEDTLS_TEST_MEMORY_POISON(arg1_input, arg2_input_length);
584#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100585 psa_status_t status = (psa_hash_update)(arg0_operation, arg1_input, arg2_input_length);
Thomas Daubney45c85862024-01-25 16:48:09 +0000586#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
587 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_input, arg2_input_length);
588#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100589 return status;
590}
591
592/* Wrapper for psa_hash_verify */
593psa_status_t mbedtls_test_wrap_psa_hash_verify(
594 psa_hash_operation_t *arg0_operation,
595 const uint8_t *arg1_hash,
596 size_t arg2_hash_length)
597{
Thomas Daubney45c85862024-01-25 16:48:09 +0000598#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
599 MBEDTLS_TEST_MEMORY_POISON(arg1_hash, arg2_hash_length);
600#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100601 psa_status_t status = (psa_hash_verify)(arg0_operation, arg1_hash, arg2_hash_length);
Thomas Daubney45c85862024-01-25 16:48:09 +0000602#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
603 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_hash, arg2_hash_length);
604#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100605 return status;
606}
607
608/* Wrapper for psa_import_key */
609psa_status_t mbedtls_test_wrap_psa_import_key(
610 const psa_key_attributes_t *arg0_attributes,
611 const uint8_t *arg1_data,
612 size_t arg2_data_length,
613 mbedtls_svc_key_id_t *arg3_key)
614{
Ryan Everett77b91e32024-01-25 10:58:06 +0000615#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
616 MBEDTLS_TEST_MEMORY_POISON(arg1_data, arg2_data_length);
617#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100618 psa_status_t status = (psa_import_key)(arg0_attributes, arg1_data, arg2_data_length, arg3_key);
Ryan Everett77b91e32024-01-25 10:58:06 +0000619#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
620 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_data, arg2_data_length);
621#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100622 return status;
623}
624
625/* Wrapper for psa_key_derivation_abort */
626psa_status_t mbedtls_test_wrap_psa_key_derivation_abort(
627 psa_key_derivation_operation_t *arg0_operation)
628{
629 psa_status_t status = (psa_key_derivation_abort)(arg0_operation);
630 return status;
631}
632
633/* Wrapper for psa_key_derivation_get_capacity */
634psa_status_t mbedtls_test_wrap_psa_key_derivation_get_capacity(
635 const psa_key_derivation_operation_t *arg0_operation,
636 size_t *arg1_capacity)
637{
638 psa_status_t status = (psa_key_derivation_get_capacity)(arg0_operation, arg1_capacity);
639 return status;
640}
641
642/* Wrapper for psa_key_derivation_input_bytes */
643psa_status_t mbedtls_test_wrap_psa_key_derivation_input_bytes(
644 psa_key_derivation_operation_t *arg0_operation,
645 psa_key_derivation_step_t arg1_step,
646 const uint8_t *arg2_data,
647 size_t arg3_data_length)
648{
Ryan Everett198a4d92024-01-25 11:44:56 +0000649#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
650 MBEDTLS_TEST_MEMORY_POISON(arg2_data, arg3_data_length);
651#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100652 psa_status_t status = (psa_key_derivation_input_bytes)(arg0_operation, arg1_step, arg2_data, arg3_data_length);
Ryan Everett198a4d92024-01-25 11:44:56 +0000653#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
654 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_data, arg3_data_length);
655#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100656 return status;
657}
658
659/* Wrapper for psa_key_derivation_input_integer */
660psa_status_t mbedtls_test_wrap_psa_key_derivation_input_integer(
661 psa_key_derivation_operation_t *arg0_operation,
662 psa_key_derivation_step_t arg1_step,
663 uint64_t arg2_value)
664{
665 psa_status_t status = (psa_key_derivation_input_integer)(arg0_operation, arg1_step, arg2_value);
666 return status;
667}
668
669/* Wrapper for psa_key_derivation_input_key */
670psa_status_t mbedtls_test_wrap_psa_key_derivation_input_key(
671 psa_key_derivation_operation_t *arg0_operation,
672 psa_key_derivation_step_t arg1_step,
673 mbedtls_svc_key_id_t arg2_key)
674{
675 psa_status_t status = (psa_key_derivation_input_key)(arg0_operation, arg1_step, arg2_key);
676 return status;
677}
678
679/* Wrapper for psa_key_derivation_key_agreement */
680psa_status_t mbedtls_test_wrap_psa_key_derivation_key_agreement(
681 psa_key_derivation_operation_t *arg0_operation,
682 psa_key_derivation_step_t arg1_step,
683 mbedtls_svc_key_id_t arg2_private_key,
684 const uint8_t *arg3_peer_key,
685 size_t arg4_peer_key_length)
686{
687 psa_status_t status = (psa_key_derivation_key_agreement)(arg0_operation, arg1_step, arg2_private_key, arg3_peer_key, arg4_peer_key_length);
688 return status;
689}
690
691/* Wrapper for psa_key_derivation_output_bytes */
692psa_status_t mbedtls_test_wrap_psa_key_derivation_output_bytes(
693 psa_key_derivation_operation_t *arg0_operation,
694 uint8_t *arg1_output,
695 size_t arg2_output_length)
696{
Ryan Everett198a4d92024-01-25 11:44:56 +0000697#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
698 MBEDTLS_TEST_MEMORY_POISON(arg1_output, arg2_output_length);
699#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100700 psa_status_t status = (psa_key_derivation_output_bytes)(arg0_operation, arg1_output, arg2_output_length);
Ryan Everett198a4d92024-01-25 11:44:56 +0000701#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
702 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_output, arg2_output_length);
703#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100704 return status;
705}
706
707/* Wrapper for psa_key_derivation_output_key */
708psa_status_t mbedtls_test_wrap_psa_key_derivation_output_key(
709 const psa_key_attributes_t *arg0_attributes,
710 psa_key_derivation_operation_t *arg1_operation,
711 mbedtls_svc_key_id_t *arg2_key)
712{
713 psa_status_t status = (psa_key_derivation_output_key)(arg0_attributes, arg1_operation, arg2_key);
714 return status;
715}
716
717/* Wrapper for psa_key_derivation_set_capacity */
718psa_status_t mbedtls_test_wrap_psa_key_derivation_set_capacity(
719 psa_key_derivation_operation_t *arg0_operation,
720 size_t arg1_capacity)
721{
722 psa_status_t status = (psa_key_derivation_set_capacity)(arg0_operation, arg1_capacity);
723 return status;
724}
725
726/* Wrapper for psa_key_derivation_setup */
727psa_status_t mbedtls_test_wrap_psa_key_derivation_setup(
728 psa_key_derivation_operation_t *arg0_operation,
729 psa_algorithm_t arg1_alg)
730{
731 psa_status_t status = (psa_key_derivation_setup)(arg0_operation, arg1_alg);
732 return status;
733}
734
735/* Wrapper for psa_mac_abort */
736psa_status_t mbedtls_test_wrap_psa_mac_abort(
737 psa_mac_operation_t *arg0_operation)
738{
739 psa_status_t status = (psa_mac_abort)(arg0_operation);
740 return status;
741}
742
743/* Wrapper for psa_mac_compute */
744psa_status_t mbedtls_test_wrap_psa_mac_compute(
745 mbedtls_svc_key_id_t arg0_key,
746 psa_algorithm_t arg1_alg,
747 const uint8_t *arg2_input,
748 size_t arg3_input_length,
749 uint8_t *arg4_mac,
750 size_t arg5_mac_size,
751 size_t *arg6_mac_length)
752{
753 psa_status_t status = (psa_mac_compute)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_mac, arg5_mac_size, arg6_mac_length);
754 return status;
755}
756
757/* Wrapper for psa_mac_sign_finish */
758psa_status_t mbedtls_test_wrap_psa_mac_sign_finish(
759 psa_mac_operation_t *arg0_operation,
760 uint8_t *arg1_mac,
761 size_t arg2_mac_size,
762 size_t *arg3_mac_length)
763{
764 psa_status_t status = (psa_mac_sign_finish)(arg0_operation, arg1_mac, arg2_mac_size, arg3_mac_length);
765 return status;
766}
767
768/* Wrapper for psa_mac_sign_setup */
769psa_status_t mbedtls_test_wrap_psa_mac_sign_setup(
770 psa_mac_operation_t *arg0_operation,
771 mbedtls_svc_key_id_t arg1_key,
772 psa_algorithm_t arg2_alg)
773{
774 psa_status_t status = (psa_mac_sign_setup)(arg0_operation, arg1_key, arg2_alg);
775 return status;
776}
777
778/* Wrapper for psa_mac_update */
779psa_status_t mbedtls_test_wrap_psa_mac_update(
780 psa_mac_operation_t *arg0_operation,
781 const uint8_t *arg1_input,
782 size_t arg2_input_length)
783{
784 psa_status_t status = (psa_mac_update)(arg0_operation, arg1_input, arg2_input_length);
785 return status;
786}
787
788/* Wrapper for psa_mac_verify */
789psa_status_t mbedtls_test_wrap_psa_mac_verify(
790 mbedtls_svc_key_id_t arg0_key,
791 psa_algorithm_t arg1_alg,
792 const uint8_t *arg2_input,
793 size_t arg3_input_length,
794 const uint8_t *arg4_mac,
795 size_t arg5_mac_length)
796{
797 psa_status_t status = (psa_mac_verify)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_mac, arg5_mac_length);
798 return status;
799}
800
801/* Wrapper for psa_mac_verify_finish */
802psa_status_t mbedtls_test_wrap_psa_mac_verify_finish(
803 psa_mac_operation_t *arg0_operation,
804 const uint8_t *arg1_mac,
805 size_t arg2_mac_length)
806{
807 psa_status_t status = (psa_mac_verify_finish)(arg0_operation, arg1_mac, arg2_mac_length);
808 return status;
809}
810
811/* Wrapper for psa_mac_verify_setup */
812psa_status_t mbedtls_test_wrap_psa_mac_verify_setup(
813 psa_mac_operation_t *arg0_operation,
814 mbedtls_svc_key_id_t arg1_key,
815 psa_algorithm_t arg2_alg)
816{
817 psa_status_t status = (psa_mac_verify_setup)(arg0_operation, arg1_key, arg2_alg);
818 return status;
819}
820
821/* Wrapper for psa_pake_abort */
822psa_status_t mbedtls_test_wrap_psa_pake_abort(
823 psa_pake_operation_t *arg0_operation)
824{
825 psa_status_t status = (psa_pake_abort)(arg0_operation);
826 return status;
827}
828
829/* Wrapper for psa_pake_get_implicit_key */
830psa_status_t mbedtls_test_wrap_psa_pake_get_implicit_key(
831 psa_pake_operation_t *arg0_operation,
832 psa_key_derivation_operation_t *arg1_output)
833{
834 psa_status_t status = (psa_pake_get_implicit_key)(arg0_operation, arg1_output);
835 return status;
836}
837
838/* Wrapper for psa_pake_input */
839psa_status_t mbedtls_test_wrap_psa_pake_input(
840 psa_pake_operation_t *arg0_operation,
841 psa_pake_step_t arg1_step,
842 const uint8_t *arg2_input,
843 size_t arg3_input_length)
844{
845 psa_status_t status = (psa_pake_input)(arg0_operation, arg1_step, arg2_input, arg3_input_length);
846 return status;
847}
848
849/* Wrapper for psa_pake_output */
850psa_status_t mbedtls_test_wrap_psa_pake_output(
851 psa_pake_operation_t *arg0_operation,
852 psa_pake_step_t arg1_step,
853 uint8_t *arg2_output,
854 size_t arg3_output_size,
855 size_t *arg4_output_length)
856{
857 psa_status_t status = (psa_pake_output)(arg0_operation, arg1_step, arg2_output, arg3_output_size, arg4_output_length);
858 return status;
859}
860
861/* Wrapper for psa_pake_set_password_key */
862psa_status_t mbedtls_test_wrap_psa_pake_set_password_key(
863 psa_pake_operation_t *arg0_operation,
864 mbedtls_svc_key_id_t arg1_password)
865{
866 psa_status_t status = (psa_pake_set_password_key)(arg0_operation, arg1_password);
867 return status;
868}
869
870/* Wrapper for psa_pake_set_peer */
871psa_status_t mbedtls_test_wrap_psa_pake_set_peer(
872 psa_pake_operation_t *arg0_operation,
873 const uint8_t *arg1_peer_id,
874 size_t arg2_peer_id_len)
875{
876 psa_status_t status = (psa_pake_set_peer)(arg0_operation, arg1_peer_id, arg2_peer_id_len);
877 return status;
878}
879
880/* Wrapper for psa_pake_set_role */
881psa_status_t mbedtls_test_wrap_psa_pake_set_role(
882 psa_pake_operation_t *arg0_operation,
883 psa_pake_role_t arg1_role)
884{
885 psa_status_t status = (psa_pake_set_role)(arg0_operation, arg1_role);
886 return status;
887}
888
889/* Wrapper for psa_pake_set_user */
890psa_status_t mbedtls_test_wrap_psa_pake_set_user(
891 psa_pake_operation_t *arg0_operation,
892 const uint8_t *arg1_user_id,
893 size_t arg2_user_id_len)
894{
895 psa_status_t status = (psa_pake_set_user)(arg0_operation, arg1_user_id, arg2_user_id_len);
896 return status;
897}
898
899/* Wrapper for psa_pake_setup */
900psa_status_t mbedtls_test_wrap_psa_pake_setup(
901 psa_pake_operation_t *arg0_operation,
902 const psa_pake_cipher_suite_t *arg1_cipher_suite)
903{
904 psa_status_t status = (psa_pake_setup)(arg0_operation, arg1_cipher_suite);
905 return status;
906}
907
908/* Wrapper for psa_purge_key */
909psa_status_t mbedtls_test_wrap_psa_purge_key(
910 mbedtls_svc_key_id_t arg0_key)
911{
912 psa_status_t status = (psa_purge_key)(arg0_key);
913 return status;
914}
915
916/* Wrapper for psa_raw_key_agreement */
917psa_status_t mbedtls_test_wrap_psa_raw_key_agreement(
918 psa_algorithm_t arg0_alg,
919 mbedtls_svc_key_id_t arg1_private_key,
920 const uint8_t *arg2_peer_key,
921 size_t arg3_peer_key_length,
922 uint8_t *arg4_output,
923 size_t arg5_output_size,
924 size_t *arg6_output_length)
925{
926 psa_status_t status = (psa_raw_key_agreement)(arg0_alg, arg1_private_key, arg2_peer_key, arg3_peer_key_length, arg4_output, arg5_output_size, arg6_output_length);
927 return status;
928}
929
930/* Wrapper for psa_sign_hash */
931psa_status_t mbedtls_test_wrap_psa_sign_hash(
932 mbedtls_svc_key_id_t arg0_key,
933 psa_algorithm_t arg1_alg,
934 const uint8_t *arg2_hash,
935 size_t arg3_hash_length,
936 uint8_t *arg4_signature,
937 size_t arg5_signature_size,
938 size_t *arg6_signature_length)
939{
Thomas Daubneyf430f472024-01-30 12:25:35 +0000940#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
941 MBEDTLS_TEST_MEMORY_POISON(arg2_hash, arg3_hash_length);
942 MBEDTLS_TEST_MEMORY_POISON(arg4_signature, arg5_signature_size);
943#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100944 psa_status_t status = (psa_sign_hash)(arg0_key, arg1_alg, arg2_hash, arg3_hash_length, arg4_signature, arg5_signature_size, arg6_signature_length);
Thomas Daubneyf430f472024-01-30 12:25:35 +0000945#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
946 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_hash, arg3_hash_length);
947 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_signature, arg5_signature_size);
948#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100949 return status;
950}
951
952/* Wrapper for psa_sign_hash_abort */
953psa_status_t mbedtls_test_wrap_psa_sign_hash_abort(
954 psa_sign_hash_interruptible_operation_t *arg0_operation)
955{
956 psa_status_t status = (psa_sign_hash_abort)(arg0_operation);
957 return status;
958}
959
960/* Wrapper for psa_sign_hash_complete */
961psa_status_t mbedtls_test_wrap_psa_sign_hash_complete(
962 psa_sign_hash_interruptible_operation_t *arg0_operation,
963 uint8_t *arg1_signature,
964 size_t arg2_signature_size,
965 size_t *arg3_signature_length)
966{
967 psa_status_t status = (psa_sign_hash_complete)(arg0_operation, arg1_signature, arg2_signature_size, arg3_signature_length);
968 return status;
969}
970
971/* Wrapper for psa_sign_hash_start */
972psa_status_t mbedtls_test_wrap_psa_sign_hash_start(
973 psa_sign_hash_interruptible_operation_t *arg0_operation,
974 mbedtls_svc_key_id_t arg1_key,
975 psa_algorithm_t arg2_alg,
976 const uint8_t *arg3_hash,
977 size_t arg4_hash_length)
978{
979 psa_status_t status = (psa_sign_hash_start)(arg0_operation, arg1_key, arg2_alg, arg3_hash, arg4_hash_length);
980 return status;
981}
982
983/* Wrapper for psa_sign_message */
984psa_status_t mbedtls_test_wrap_psa_sign_message(
985 mbedtls_svc_key_id_t arg0_key,
986 psa_algorithm_t arg1_alg,
987 const uint8_t *arg2_input,
988 size_t arg3_input_length,
989 uint8_t *arg4_signature,
990 size_t arg5_signature_size,
991 size_t *arg6_signature_length)
992{
Thomas Daubneyf430f472024-01-30 12:25:35 +0000993#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
994 MBEDTLS_TEST_MEMORY_POISON(arg2_input, arg3_input_length);
995 MBEDTLS_TEST_MEMORY_POISON(arg4_signature, arg5_signature_size);
996#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100997 psa_status_t status = (psa_sign_message)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_signature, arg5_signature_size, arg6_signature_length);
Thomas Daubneyf430f472024-01-30 12:25:35 +0000998#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
999 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_input, arg3_input_length);
1000 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_signature, arg5_signature_size);
1001#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001002 return status;
1003}
1004
1005/* Wrapper for psa_verify_hash */
1006psa_status_t mbedtls_test_wrap_psa_verify_hash(
1007 mbedtls_svc_key_id_t arg0_key,
1008 psa_algorithm_t arg1_alg,
1009 const uint8_t *arg2_hash,
1010 size_t arg3_hash_length,
1011 const uint8_t *arg4_signature,
1012 size_t arg5_signature_length)
1013{
Thomas Daubneyf430f472024-01-30 12:25:35 +00001014#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
1015 MBEDTLS_TEST_MEMORY_POISON(arg2_hash, arg3_hash_length);
1016 MBEDTLS_TEST_MEMORY_POISON(arg4_signature, arg5_signature_length);
1017#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001018 psa_status_t status = (psa_verify_hash)(arg0_key, arg1_alg, arg2_hash, arg3_hash_length, arg4_signature, arg5_signature_length);
Thomas Daubneyf430f472024-01-30 12:25:35 +00001019#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
1020 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_hash, arg3_hash_length);
1021 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_signature, arg5_signature_length);
1022#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001023 return status;
1024}
1025
1026/* Wrapper for psa_verify_hash_abort */
1027psa_status_t mbedtls_test_wrap_psa_verify_hash_abort(
1028 psa_verify_hash_interruptible_operation_t *arg0_operation)
1029{
1030 psa_status_t status = (psa_verify_hash_abort)(arg0_operation);
1031 return status;
1032}
1033
1034/* Wrapper for psa_verify_hash_complete */
1035psa_status_t mbedtls_test_wrap_psa_verify_hash_complete(
1036 psa_verify_hash_interruptible_operation_t *arg0_operation)
1037{
1038 psa_status_t status = (psa_verify_hash_complete)(arg0_operation);
1039 return status;
1040}
1041
1042/* Wrapper for psa_verify_hash_start */
1043psa_status_t mbedtls_test_wrap_psa_verify_hash_start(
1044 psa_verify_hash_interruptible_operation_t *arg0_operation,
1045 mbedtls_svc_key_id_t arg1_key,
1046 psa_algorithm_t arg2_alg,
1047 const uint8_t *arg3_hash,
1048 size_t arg4_hash_length,
1049 const uint8_t *arg5_signature,
1050 size_t arg6_signature_length)
1051{
1052 psa_status_t status = (psa_verify_hash_start)(arg0_operation, arg1_key, arg2_alg, arg3_hash, arg4_hash_length, arg5_signature, arg6_signature_length);
1053 return status;
1054}
1055
1056/* Wrapper for psa_verify_message */
1057psa_status_t mbedtls_test_wrap_psa_verify_message(
1058 mbedtls_svc_key_id_t arg0_key,
1059 psa_algorithm_t arg1_alg,
1060 const uint8_t *arg2_input,
1061 size_t arg3_input_length,
1062 const uint8_t *arg4_signature,
1063 size_t arg5_signature_length)
1064{
Thomas Daubneyf430f472024-01-30 12:25:35 +00001065#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
1066 MBEDTLS_TEST_MEMORY_POISON(arg2_input, arg3_input_length);
1067 MBEDTLS_TEST_MEMORY_POISON(arg4_signature, arg5_signature_length);
1068#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001069 psa_status_t status = (psa_verify_message)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_signature, arg5_signature_length);
Thomas Daubneyf430f472024-01-30 12:25:35 +00001070#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
1071 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_input, arg3_input_length);
1072 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_signature, arg5_signature_length);
1073#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001074 return status;
1075}
1076
Gilles Peskine4411c9c2024-01-04 20:51:38 +01001077#endif /* defined(MBEDTLS_PSA_CRYPTO_C) && defined(MBEDTLS_TEST_HOOKS) && \
1078 !defined(RECORD_PSA_STATUS_COVERAGE_LOG) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001079
1080/* End of automatically generated file. */