blob: 304aad60d63b4de6944727ad8c4df7d6cd7c97b1 [file] [log] [blame]
Gilles Peskined5e5e6d2024-01-04 16:42:40 +01001/* Automatically generated by generate_psa_wrappers.py, do not edit! */
2
3/* Copyright The Mbed TLS Contributors
4 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
5 */
6
7#if !defined(MBEDTLS_CONFIG_FILE)
8#include "mbedtls/config.h"
9#else
10#include MBEDTLS_CONFIG_FILE
11#endif
12
13#if defined(MBEDTLS_PSA_CRYPTO_C) && defined(MBEDTLS_TEST_HOOKS)
14
15#include <psa/crypto.h>
16
Gilles Peskine42fa8ea2024-01-04 16:59:28 +010017#include <test/memory.h>
Gilles Peskined5e5e6d2024-01-04 16:42:40 +010018#include <test/psa_crypto_helpers.h>
19#include <test/psa_test_wrappers.h>
20
21/* Wrapper for mbedtls_psa_inject_entropy */
22#if defined(MBEDTLS_PSA_INJECT_ENTROPY)
23psa_status_t mbedtls_test_wrap_mbedtls_psa_inject_entropy(
24 const uint8_t *arg0_seed,
25 size_t arg1_seed_size)
26{
27 psa_status_t status = (mbedtls_psa_inject_entropy)(arg0_seed, arg1_seed_size);
28 return status;
29}
30#endif /* defined(MBEDTLS_PSA_INJECT_ENTROPY) */
31
32/* Wrapper for mbedtls_psa_platform_get_builtin_key */
33#if defined(MBEDTLS_PSA_CRYPTO_BUILTIN_KEYS)
34psa_status_t mbedtls_test_wrap_mbedtls_psa_platform_get_builtin_key(
35 mbedtls_svc_key_id_t arg0_key_id,
36 psa_key_lifetime_t *arg1_lifetime,
37 psa_drv_slot_number_t *arg2_slot_number)
38{
39 psa_status_t status = (mbedtls_psa_platform_get_builtin_key)(arg0_key_id, arg1_lifetime, arg2_slot_number);
40 return status;
41}
42#endif /* defined(MBEDTLS_PSA_CRYPTO_BUILTIN_KEYS) */
43
44/* Wrapper for mbedtls_psa_register_se_key */
45#if defined(MBEDTLS_PSA_CRYPTO_SE_C)
46psa_status_t mbedtls_test_wrap_mbedtls_psa_register_se_key(
47 const psa_key_attributes_t *arg0_attributes)
48{
49 psa_status_t status = (mbedtls_psa_register_se_key)(arg0_attributes);
50 return status;
51}
52#endif /* defined(MBEDTLS_PSA_CRYPTO_SE_C) */
53
54/* Wrapper for psa_aead_decrypt */
55psa_status_t mbedtls_test_wrap_psa_aead_decrypt(
56 mbedtls_svc_key_id_t arg0_key,
57 psa_algorithm_t arg1_alg,
58 const uint8_t *arg2_nonce,
59 size_t arg3_nonce_length,
60 const uint8_t *arg4_additional_data,
61 size_t arg5_additional_data_length,
62 const uint8_t *arg6_ciphertext,
63 size_t arg7_ciphertext_length,
64 uint8_t *arg8_plaintext,
65 size_t arg9_plaintext_size,
66 size_t *arg10_plaintext_length)
67{
68 psa_status_t status = (psa_aead_decrypt)(arg0_key, arg1_alg, arg2_nonce, arg3_nonce_length, arg4_additional_data, arg5_additional_data_length, arg6_ciphertext, arg7_ciphertext_length, arg8_plaintext, arg9_plaintext_size, arg10_plaintext_length);
69 return status;
70}
71
72/* Wrapper for psa_aead_encrypt */
73psa_status_t mbedtls_test_wrap_psa_aead_encrypt(
74 mbedtls_svc_key_id_t arg0_key,
75 psa_algorithm_t arg1_alg,
76 const uint8_t *arg2_nonce,
77 size_t arg3_nonce_length,
78 const uint8_t *arg4_additional_data,
79 size_t arg5_additional_data_length,
80 const uint8_t *arg6_plaintext,
81 size_t arg7_plaintext_length,
82 uint8_t *arg8_ciphertext,
83 size_t arg9_ciphertext_size,
84 size_t *arg10_ciphertext_length)
85{
86 psa_status_t status = (psa_aead_encrypt)(arg0_key, arg1_alg, arg2_nonce, arg3_nonce_length, arg4_additional_data, arg5_additional_data_length, arg6_plaintext, arg7_plaintext_length, arg8_ciphertext, arg9_ciphertext_size, arg10_ciphertext_length);
87 return status;
88}
89
90/* Wrapper for psa_asymmetric_decrypt */
91psa_status_t mbedtls_test_wrap_psa_asymmetric_decrypt(
92 mbedtls_svc_key_id_t arg0_key,
93 psa_algorithm_t arg1_alg,
94 const uint8_t *arg2_input,
95 size_t arg3_input_length,
96 const uint8_t *arg4_salt,
97 size_t arg5_salt_length,
98 uint8_t *arg6_output,
99 size_t arg7_output_size,
100 size_t *arg8_output_length)
101{
102 psa_status_t status = (psa_asymmetric_decrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_salt, arg5_salt_length, arg6_output, arg7_output_size, arg8_output_length);
103 return status;
104}
105
106/* Wrapper for psa_asymmetric_encrypt */
107psa_status_t mbedtls_test_wrap_psa_asymmetric_encrypt(
108 mbedtls_svc_key_id_t arg0_key,
109 psa_algorithm_t arg1_alg,
110 const uint8_t *arg2_input,
111 size_t arg3_input_length,
112 const uint8_t *arg4_salt,
113 size_t arg5_salt_length,
114 uint8_t *arg6_output,
115 size_t arg7_output_size,
116 size_t *arg8_output_length)
117{
118 psa_status_t status = (psa_asymmetric_encrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_salt, arg5_salt_length, arg6_output, arg7_output_size, arg8_output_length);
119 return status;
120}
121
122/* Wrapper for psa_cipher_abort */
123psa_status_t mbedtls_test_wrap_psa_cipher_abort(
124 psa_cipher_operation_t *arg0_operation)
125{
126 psa_status_t status = (psa_cipher_abort)(arg0_operation);
127 return status;
128}
129
130/* Wrapper for psa_cipher_decrypt */
131psa_status_t mbedtls_test_wrap_psa_cipher_decrypt(
132 mbedtls_svc_key_id_t arg0_key,
133 psa_algorithm_t arg1_alg,
134 const uint8_t *arg2_input,
135 size_t arg3_input_length,
136 uint8_t *arg4_output,
137 size_t arg5_output_size,
138 size_t *arg6_output_length)
139{
140 psa_status_t status = (psa_cipher_decrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_output, arg5_output_size, arg6_output_length);
141 return status;
142}
143
144/* Wrapper for psa_cipher_decrypt_setup */
145psa_status_t mbedtls_test_wrap_psa_cipher_decrypt_setup(
146 psa_cipher_operation_t *arg0_operation,
147 mbedtls_svc_key_id_t arg1_key,
148 psa_algorithm_t arg2_alg)
149{
150 psa_status_t status = (psa_cipher_decrypt_setup)(arg0_operation, arg1_key, arg2_alg);
151 return status;
152}
153
154/* Wrapper for psa_cipher_encrypt */
155psa_status_t mbedtls_test_wrap_psa_cipher_encrypt(
156 mbedtls_svc_key_id_t arg0_key,
157 psa_algorithm_t arg1_alg,
158 const uint8_t *arg2_input,
159 size_t arg3_input_length,
160 uint8_t *arg4_output,
161 size_t arg5_output_size,
162 size_t *arg6_output_length)
163{
Gilles Peskineb3d457c2024-01-04 20:33:29 +0100164#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
Gilles Peskine42fa8ea2024-01-04 16:59:28 +0100165 MBEDTLS_TEST_MEMORY_POISON(arg2_input, arg3_input_length);
166 MBEDTLS_TEST_MEMORY_POISON(arg4_output, arg5_output_size);
Gilles Peskineb3d457c2024-01-04 20:33:29 +0100167#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskined5e5e6d2024-01-04 16:42:40 +0100168 psa_status_t status = (psa_cipher_encrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_output, arg5_output_size, arg6_output_length);
Gilles Peskineb3d457c2024-01-04 20:33:29 +0100169#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
Gilles Peskine42fa8ea2024-01-04 16:59:28 +0100170 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_input, arg3_input_length);
171 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_output, arg5_output_size);
Gilles Peskineb3d457c2024-01-04 20:33:29 +0100172#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskined5e5e6d2024-01-04 16:42:40 +0100173 return status;
174}
175
176/* Wrapper for psa_cipher_encrypt_setup */
177psa_status_t mbedtls_test_wrap_psa_cipher_encrypt_setup(
178 psa_cipher_operation_t *arg0_operation,
179 mbedtls_svc_key_id_t arg1_key,
180 psa_algorithm_t arg2_alg)
181{
182 psa_status_t status = (psa_cipher_encrypt_setup)(arg0_operation, arg1_key, arg2_alg);
183 return status;
184}
185
186/* Wrapper for psa_cipher_finish */
187psa_status_t mbedtls_test_wrap_psa_cipher_finish(
188 psa_cipher_operation_t *arg0_operation,
189 uint8_t *arg1_output,
190 size_t arg2_output_size,
191 size_t *arg3_output_length)
192{
193 psa_status_t status = (psa_cipher_finish)(arg0_operation, arg1_output, arg2_output_size, arg3_output_length);
194 return status;
195}
196
197/* Wrapper for psa_cipher_generate_iv */
198psa_status_t mbedtls_test_wrap_psa_cipher_generate_iv(
199 psa_cipher_operation_t *arg0_operation,
200 uint8_t *arg1_iv,
201 size_t arg2_iv_size,
202 size_t *arg3_iv_length)
203{
204 psa_status_t status = (psa_cipher_generate_iv)(arg0_operation, arg1_iv, arg2_iv_size, arg3_iv_length);
205 return status;
206}
207
208/* Wrapper for psa_cipher_set_iv */
209psa_status_t mbedtls_test_wrap_psa_cipher_set_iv(
210 psa_cipher_operation_t *arg0_operation,
211 const uint8_t *arg1_iv,
212 size_t arg2_iv_length)
213{
214 psa_status_t status = (psa_cipher_set_iv)(arg0_operation, arg1_iv, arg2_iv_length);
215 return status;
216}
217
218/* Wrapper for psa_cipher_update */
219psa_status_t mbedtls_test_wrap_psa_cipher_update(
220 psa_cipher_operation_t *arg0_operation,
221 const uint8_t *arg1_input,
222 size_t arg2_input_length,
223 uint8_t *arg3_output,
224 size_t arg4_output_size,
225 size_t *arg5_output_length)
226{
227 psa_status_t status = (psa_cipher_update)(arg0_operation, arg1_input, arg2_input_length, arg3_output, arg4_output_size, arg5_output_length);
228 return status;
229}
230
231/* Wrapper for psa_copy_key */
232psa_status_t mbedtls_test_wrap_psa_copy_key(
233 mbedtls_svc_key_id_t arg0_source_key,
234 const psa_key_attributes_t *arg1_attributes,
235 mbedtls_svc_key_id_t *arg2_target_key)
236{
237 psa_status_t status = (psa_copy_key)(arg0_source_key, arg1_attributes, arg2_target_key);
238 return status;
239}
240
241/* Wrapper for psa_crypto_init */
242psa_status_t mbedtls_test_wrap_psa_crypto_init(void)
243{
244 psa_status_t status = (psa_crypto_init)();
245 return status;
246}
247
248/* Wrapper for psa_destroy_key */
249psa_status_t mbedtls_test_wrap_psa_destroy_key(
250 mbedtls_svc_key_id_t arg0_key)
251{
252 psa_status_t status = (psa_destroy_key)(arg0_key);
253 return status;
254}
255
256/* Wrapper for psa_export_key */
257psa_status_t mbedtls_test_wrap_psa_export_key(
258 mbedtls_svc_key_id_t arg0_key,
259 uint8_t *arg1_data,
260 size_t arg2_data_size,
261 size_t *arg3_data_length)
262{
263 psa_status_t status = (psa_export_key)(arg0_key, arg1_data, arg2_data_size, arg3_data_length);
264 return status;
265}
266
267/* Wrapper for psa_export_public_key */
268psa_status_t mbedtls_test_wrap_psa_export_public_key(
269 mbedtls_svc_key_id_t arg0_key,
270 uint8_t *arg1_data,
271 size_t arg2_data_size,
272 size_t *arg3_data_length)
273{
274 psa_status_t status = (psa_export_public_key)(arg0_key, arg1_data, arg2_data_size, arg3_data_length);
275 return status;
276}
277
278/* Wrapper for psa_generate_key */
279psa_status_t mbedtls_test_wrap_psa_generate_key(
280 const psa_key_attributes_t *arg0_attributes,
281 mbedtls_svc_key_id_t *arg1_key)
282{
283 psa_status_t status = (psa_generate_key)(arg0_attributes, arg1_key);
284 return status;
285}
286
287/* Wrapper for psa_generate_random */
288psa_status_t mbedtls_test_wrap_psa_generate_random(
289 uint8_t *arg0_output,
290 size_t arg1_output_size)
291{
292 psa_status_t status = (psa_generate_random)(arg0_output, arg1_output_size);
293 return status;
294}
295
296/* Wrapper for psa_get_key_attributes */
297psa_status_t mbedtls_test_wrap_psa_get_key_attributes(
298 mbedtls_svc_key_id_t arg0_key,
299 psa_key_attributes_t *arg1_attributes)
300{
301 psa_status_t status = (psa_get_key_attributes)(arg0_key, arg1_attributes);
302 return status;
303}
304
305/* Wrapper for psa_hash_abort */
306psa_status_t mbedtls_test_wrap_psa_hash_abort(
307 psa_hash_operation_t *arg0_operation)
308{
309 psa_status_t status = (psa_hash_abort)(arg0_operation);
310 return status;
311}
312
313/* Wrapper for psa_hash_clone */
314psa_status_t mbedtls_test_wrap_psa_hash_clone(
315 const psa_hash_operation_t *arg0_source_operation,
316 psa_hash_operation_t *arg1_target_operation)
317{
318 psa_status_t status = (psa_hash_clone)(arg0_source_operation, arg1_target_operation);
319 return status;
320}
321
322/* Wrapper for psa_hash_compare */
323psa_status_t mbedtls_test_wrap_psa_hash_compare(
324 psa_algorithm_t arg0_alg,
325 const uint8_t *arg1_input,
326 size_t arg2_input_length,
327 const uint8_t *arg3_hash,
328 size_t arg4_hash_length)
329{
330 psa_status_t status = (psa_hash_compare)(arg0_alg, arg1_input, arg2_input_length, arg3_hash, arg4_hash_length);
331 return status;
332}
333
334/* Wrapper for psa_hash_compute */
335psa_status_t mbedtls_test_wrap_psa_hash_compute(
336 psa_algorithm_t arg0_alg,
337 const uint8_t *arg1_input,
338 size_t arg2_input_length,
339 uint8_t *arg3_hash,
340 size_t arg4_hash_size,
341 size_t *arg5_hash_length)
342{
343 psa_status_t status = (psa_hash_compute)(arg0_alg, arg1_input, arg2_input_length, arg3_hash, arg4_hash_size, arg5_hash_length);
344 return status;
345}
346
347/* Wrapper for psa_hash_finish */
348psa_status_t mbedtls_test_wrap_psa_hash_finish(
349 psa_hash_operation_t *arg0_operation,
350 uint8_t *arg1_hash,
351 size_t arg2_hash_size,
352 size_t *arg3_hash_length)
353{
354 psa_status_t status = (psa_hash_finish)(arg0_operation, arg1_hash, arg2_hash_size, arg3_hash_length);
355 return status;
356}
357
358/* Wrapper for psa_hash_setup */
359psa_status_t mbedtls_test_wrap_psa_hash_setup(
360 psa_hash_operation_t *arg0_operation,
361 psa_algorithm_t arg1_alg)
362{
363 psa_status_t status = (psa_hash_setup)(arg0_operation, arg1_alg);
364 return status;
365}
366
367/* Wrapper for psa_hash_update */
368psa_status_t mbedtls_test_wrap_psa_hash_update(
369 psa_hash_operation_t *arg0_operation,
370 const uint8_t *arg1_input,
371 size_t arg2_input_length)
372{
373 psa_status_t status = (psa_hash_update)(arg0_operation, arg1_input, arg2_input_length);
374 return status;
375}
376
377/* Wrapper for psa_hash_verify */
378psa_status_t mbedtls_test_wrap_psa_hash_verify(
379 psa_hash_operation_t *arg0_operation,
380 const uint8_t *arg1_hash,
381 size_t arg2_hash_length)
382{
383 psa_status_t status = (psa_hash_verify)(arg0_operation, arg1_hash, arg2_hash_length);
384 return status;
385}
386
387/* Wrapper for psa_import_key */
388psa_status_t mbedtls_test_wrap_psa_import_key(
389 const psa_key_attributes_t *arg0_attributes,
390 const uint8_t *arg1_data,
391 size_t arg2_data_length,
392 mbedtls_svc_key_id_t *arg3_key)
393{
394 psa_status_t status = (psa_import_key)(arg0_attributes, arg1_data, arg2_data_length, arg3_key);
395 return status;
396}
397
398/* Wrapper for psa_key_derivation_abort */
399psa_status_t mbedtls_test_wrap_psa_key_derivation_abort(
400 psa_key_derivation_operation_t *arg0_operation)
401{
402 psa_status_t status = (psa_key_derivation_abort)(arg0_operation);
403 return status;
404}
405
406/* Wrapper for psa_key_derivation_get_capacity */
407psa_status_t mbedtls_test_wrap_psa_key_derivation_get_capacity(
408 const psa_key_derivation_operation_t *arg0_operation,
409 size_t *arg1_capacity)
410{
411 psa_status_t status = (psa_key_derivation_get_capacity)(arg0_operation, arg1_capacity);
412 return status;
413}
414
415/* Wrapper for psa_key_derivation_input_bytes */
416psa_status_t mbedtls_test_wrap_psa_key_derivation_input_bytes(
417 psa_key_derivation_operation_t *arg0_operation,
418 psa_key_derivation_step_t arg1_step,
419 const uint8_t *arg2_data,
420 size_t arg3_data_length)
421{
422 psa_status_t status = (psa_key_derivation_input_bytes)(arg0_operation, arg1_step, arg2_data, arg3_data_length);
423 return status;
424}
425
426/* Wrapper for psa_key_derivation_input_key */
427psa_status_t mbedtls_test_wrap_psa_key_derivation_input_key(
428 psa_key_derivation_operation_t *arg0_operation,
429 psa_key_derivation_step_t arg1_step,
430 mbedtls_svc_key_id_t arg2_key)
431{
432 psa_status_t status = (psa_key_derivation_input_key)(arg0_operation, arg1_step, arg2_key);
433 return status;
434}
435
436/* Wrapper for psa_key_derivation_key_agreement */
437psa_status_t mbedtls_test_wrap_psa_key_derivation_key_agreement(
438 psa_key_derivation_operation_t *arg0_operation,
439 psa_key_derivation_step_t arg1_step,
440 mbedtls_svc_key_id_t arg2_private_key,
441 const uint8_t *arg3_peer_key,
442 size_t arg4_peer_key_length)
443{
444 psa_status_t status = (psa_key_derivation_key_agreement)(arg0_operation, arg1_step, arg2_private_key, arg3_peer_key, arg4_peer_key_length);
445 return status;
446}
447
448/* Wrapper for psa_key_derivation_output_bytes */
449psa_status_t mbedtls_test_wrap_psa_key_derivation_output_bytes(
450 psa_key_derivation_operation_t *arg0_operation,
451 uint8_t *arg1_output,
452 size_t arg2_output_length)
453{
454 psa_status_t status = (psa_key_derivation_output_bytes)(arg0_operation, arg1_output, arg2_output_length);
455 return status;
456}
457
458/* Wrapper for psa_key_derivation_output_key */
459psa_status_t mbedtls_test_wrap_psa_key_derivation_output_key(
460 const psa_key_attributes_t *arg0_attributes,
461 psa_key_derivation_operation_t *arg1_operation,
462 mbedtls_svc_key_id_t *arg2_key)
463{
464 psa_status_t status = (psa_key_derivation_output_key)(arg0_attributes, arg1_operation, arg2_key);
465 return status;
466}
467
468/* Wrapper for psa_key_derivation_set_capacity */
469psa_status_t mbedtls_test_wrap_psa_key_derivation_set_capacity(
470 psa_key_derivation_operation_t *arg0_operation,
471 size_t arg1_capacity)
472{
473 psa_status_t status = (psa_key_derivation_set_capacity)(arg0_operation, arg1_capacity);
474 return status;
475}
476
477/* Wrapper for psa_key_derivation_setup */
478psa_status_t mbedtls_test_wrap_psa_key_derivation_setup(
479 psa_key_derivation_operation_t *arg0_operation,
480 psa_algorithm_t arg1_alg)
481{
482 psa_status_t status = (psa_key_derivation_setup)(arg0_operation, arg1_alg);
483 return status;
484}
485
486/* Wrapper for psa_mac_abort */
487psa_status_t mbedtls_test_wrap_psa_mac_abort(
488 psa_mac_operation_t *arg0_operation)
489{
490 psa_status_t status = (psa_mac_abort)(arg0_operation);
491 return status;
492}
493
494/* Wrapper for psa_mac_compute */
495psa_status_t mbedtls_test_wrap_psa_mac_compute(
496 mbedtls_svc_key_id_t arg0_key,
497 psa_algorithm_t arg1_alg,
498 const uint8_t *arg2_input,
499 size_t arg3_input_length,
500 uint8_t *arg4_mac,
501 size_t arg5_mac_size,
502 size_t *arg6_mac_length)
503{
504 psa_status_t status = (psa_mac_compute)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_mac, arg5_mac_size, arg6_mac_length);
505 return status;
506}
507
508/* Wrapper for psa_mac_sign_finish */
509psa_status_t mbedtls_test_wrap_psa_mac_sign_finish(
510 psa_mac_operation_t *arg0_operation,
511 uint8_t *arg1_mac,
512 size_t arg2_mac_size,
513 size_t *arg3_mac_length)
514{
515 psa_status_t status = (psa_mac_sign_finish)(arg0_operation, arg1_mac, arg2_mac_size, arg3_mac_length);
516 return status;
517}
518
519/* Wrapper for psa_mac_sign_setup */
520psa_status_t mbedtls_test_wrap_psa_mac_sign_setup(
521 psa_mac_operation_t *arg0_operation,
522 mbedtls_svc_key_id_t arg1_key,
523 psa_algorithm_t arg2_alg)
524{
525 psa_status_t status = (psa_mac_sign_setup)(arg0_operation, arg1_key, arg2_alg);
526 return status;
527}
528
529/* Wrapper for psa_mac_update */
530psa_status_t mbedtls_test_wrap_psa_mac_update(
531 psa_mac_operation_t *arg0_operation,
532 const uint8_t *arg1_input,
533 size_t arg2_input_length)
534{
535 psa_status_t status = (psa_mac_update)(arg0_operation, arg1_input, arg2_input_length);
536 return status;
537}
538
539/* Wrapper for psa_mac_verify */
540psa_status_t mbedtls_test_wrap_psa_mac_verify(
541 mbedtls_svc_key_id_t arg0_key,
542 psa_algorithm_t arg1_alg,
543 const uint8_t *arg2_input,
544 size_t arg3_input_length,
545 const uint8_t *arg4_mac,
546 size_t arg5_mac_length)
547{
548 psa_status_t status = (psa_mac_verify)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_mac, arg5_mac_length);
549 return status;
550}
551
552/* Wrapper for psa_mac_verify_finish */
553psa_status_t mbedtls_test_wrap_psa_mac_verify_finish(
554 psa_mac_operation_t *arg0_operation,
555 const uint8_t *arg1_mac,
556 size_t arg2_mac_length)
557{
558 psa_status_t status = (psa_mac_verify_finish)(arg0_operation, arg1_mac, arg2_mac_length);
559 return status;
560}
561
562/* Wrapper for psa_mac_verify_setup */
563psa_status_t mbedtls_test_wrap_psa_mac_verify_setup(
564 psa_mac_operation_t *arg0_operation,
565 mbedtls_svc_key_id_t arg1_key,
566 psa_algorithm_t arg2_alg)
567{
568 psa_status_t status = (psa_mac_verify_setup)(arg0_operation, arg1_key, arg2_alg);
569 return status;
570}
571
572/* Wrapper for psa_purge_key */
573psa_status_t mbedtls_test_wrap_psa_purge_key(
574 mbedtls_svc_key_id_t arg0_key)
575{
576 psa_status_t status = (psa_purge_key)(arg0_key);
577 return status;
578}
579
580/* Wrapper for psa_raw_key_agreement */
581psa_status_t mbedtls_test_wrap_psa_raw_key_agreement(
582 psa_algorithm_t arg0_alg,
583 mbedtls_svc_key_id_t arg1_private_key,
584 const uint8_t *arg2_peer_key,
585 size_t arg3_peer_key_length,
586 uint8_t *arg4_output,
587 size_t arg5_output_size,
588 size_t *arg6_output_length)
589{
590 psa_status_t status = (psa_raw_key_agreement)(arg0_alg, arg1_private_key, arg2_peer_key, arg3_peer_key_length, arg4_output, arg5_output_size, arg6_output_length);
591 return status;
592}
593
594/* Wrapper for psa_sign_hash */
595psa_status_t mbedtls_test_wrap_psa_sign_hash(
596 mbedtls_svc_key_id_t arg0_key,
597 psa_algorithm_t arg1_alg,
598 const uint8_t *arg2_hash,
599 size_t arg3_hash_length,
600 uint8_t *arg4_signature,
601 size_t arg5_signature_size,
602 size_t *arg6_signature_length)
603{
604 psa_status_t status = (psa_sign_hash)(arg0_key, arg1_alg, arg2_hash, arg3_hash_length, arg4_signature, arg5_signature_size, arg6_signature_length);
605 return status;
606}
607
608/* Wrapper for psa_sign_message */
609psa_status_t mbedtls_test_wrap_psa_sign_message(
610 mbedtls_svc_key_id_t arg0_key,
611 psa_algorithm_t arg1_alg,
612 const uint8_t *arg2_input,
613 size_t arg3_input_length,
614 uint8_t *arg4_signature,
615 size_t arg5_signature_size,
616 size_t *arg6_signature_length)
617{
618 psa_status_t status = (psa_sign_message)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_signature, arg5_signature_size, arg6_signature_length);
619 return status;
620}
621
622/* Wrapper for psa_verify_hash */
623psa_status_t mbedtls_test_wrap_psa_verify_hash(
624 mbedtls_svc_key_id_t arg0_key,
625 psa_algorithm_t arg1_alg,
626 const uint8_t *arg2_hash,
627 size_t arg3_hash_length,
628 const uint8_t *arg4_signature,
629 size_t arg5_signature_length)
630{
631 psa_status_t status = (psa_verify_hash)(arg0_key, arg1_alg, arg2_hash, arg3_hash_length, arg4_signature, arg5_signature_length);
632 return status;
633}
634
635/* Wrapper for psa_verify_message */
636psa_status_t mbedtls_test_wrap_psa_verify_message(
637 mbedtls_svc_key_id_t arg0_key,
638 psa_algorithm_t arg1_alg,
639 const uint8_t *arg2_input,
640 size_t arg3_input_length,
641 const uint8_t *arg4_signature,
642 size_t arg5_signature_length)
643{
644 psa_status_t status = (psa_verify_message)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_signature, arg5_signature_length);
645 return status;
646}
647
648#endif /* defined(MBEDTLS_PSA_CRYPTO_C) && defined(MBEDTLS_TEST_HOOKS) */
649
650/* End of automatically generated file. */