blob: f41bcc079c7cf44ef8c7338ee70829db99a3b022 [file] [log] [blame]
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001/* Automatically generated by generate_psa_wrappers.py, do not edit! */
2
3/* Copyright The Mbed TLS Contributors
4 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
5 */
6
7#include <mbedtls/build_info.h>
8
Gilles Peskine4411c9c2024-01-04 20:51:38 +01009#if defined(MBEDTLS_PSA_CRYPTO_C) && defined(MBEDTLS_TEST_HOOKS) && \
10 !defined(RECORD_PSA_STATUS_COVERAGE_LOG)
Gilles Peskine6e4332c2024-01-04 16:42:40 +010011
12#include <psa/crypto.h>
13
Gilles Peskine90d14d72024-01-04 16:59:28 +010014#include <test/memory.h>
Gilles Peskine6e4332c2024-01-04 16:42:40 +010015#include <test/psa_crypto_helpers.h>
16#include <test/psa_test_wrappers.h>
17
18/* Wrapper for mbedtls_psa_inject_entropy */
19#if defined(MBEDTLS_PSA_INJECT_ENTROPY)
20psa_status_t mbedtls_test_wrap_mbedtls_psa_inject_entropy(
21 const uint8_t *arg0_seed,
22 size_t arg1_seed_size)
23{
24 psa_status_t status = (mbedtls_psa_inject_entropy)(arg0_seed, arg1_seed_size);
25 return status;
26}
27#endif /* defined(MBEDTLS_PSA_INJECT_ENTROPY) */
28
29/* Wrapper for mbedtls_psa_platform_get_builtin_key */
30#if defined(MBEDTLS_PSA_CRYPTO_BUILTIN_KEYS)
31psa_status_t mbedtls_test_wrap_mbedtls_psa_platform_get_builtin_key(
32 mbedtls_svc_key_id_t arg0_key_id,
33 psa_key_lifetime_t *arg1_lifetime,
34 psa_drv_slot_number_t *arg2_slot_number)
35{
36 psa_status_t status = (mbedtls_psa_platform_get_builtin_key)(arg0_key_id, arg1_lifetime, arg2_slot_number);
37 return status;
38}
39#endif /* defined(MBEDTLS_PSA_CRYPTO_BUILTIN_KEYS) */
40
41/* Wrapper for mbedtls_psa_register_se_key */
42#if defined(MBEDTLS_PSA_CRYPTO_SE_C)
43psa_status_t mbedtls_test_wrap_mbedtls_psa_register_se_key(
44 const psa_key_attributes_t *arg0_attributes)
45{
46 psa_status_t status = (mbedtls_psa_register_se_key)(arg0_attributes);
47 return status;
48}
49#endif /* defined(MBEDTLS_PSA_CRYPTO_SE_C) */
50
51/* Wrapper for psa_aead_abort */
52psa_status_t mbedtls_test_wrap_psa_aead_abort(
53 psa_aead_operation_t *arg0_operation)
54{
55 psa_status_t status = (psa_aead_abort)(arg0_operation);
56 return status;
57}
58
59/* Wrapper for psa_aead_decrypt */
60psa_status_t mbedtls_test_wrap_psa_aead_decrypt(
61 mbedtls_svc_key_id_t arg0_key,
62 psa_algorithm_t arg1_alg,
63 const uint8_t *arg2_nonce,
64 size_t arg3_nonce_length,
65 const uint8_t *arg4_additional_data,
66 size_t arg5_additional_data_length,
67 const uint8_t *arg6_ciphertext,
68 size_t arg7_ciphertext_length,
69 uint8_t *arg8_plaintext,
70 size_t arg9_plaintext_size,
71 size_t *arg10_plaintext_length)
72{
David Horstmann86e6fe02024-01-22 14:36:01 +000073#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
74 MBEDTLS_TEST_MEMORY_POISON(arg2_nonce, arg3_nonce_length);
75 MBEDTLS_TEST_MEMORY_POISON(arg4_additional_data, arg5_additional_data_length);
76 MBEDTLS_TEST_MEMORY_POISON(arg6_ciphertext, arg7_ciphertext_length);
77 MBEDTLS_TEST_MEMORY_POISON(arg8_plaintext, arg9_plaintext_size);
78#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +010079 psa_status_t status = (psa_aead_decrypt)(arg0_key, arg1_alg, arg2_nonce, arg3_nonce_length, arg4_additional_data, arg5_additional_data_length, arg6_ciphertext, arg7_ciphertext_length, arg8_plaintext, arg9_plaintext_size, arg10_plaintext_length);
David Horstmann86e6fe02024-01-22 14:36:01 +000080#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
81 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_nonce, arg3_nonce_length);
82 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_additional_data, arg5_additional_data_length);
83 MBEDTLS_TEST_MEMORY_UNPOISON(arg6_ciphertext, arg7_ciphertext_length);
84 MBEDTLS_TEST_MEMORY_UNPOISON(arg8_plaintext, arg9_plaintext_size);
85#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +010086 return status;
87}
88
89/* Wrapper for psa_aead_decrypt_setup */
90psa_status_t mbedtls_test_wrap_psa_aead_decrypt_setup(
91 psa_aead_operation_t *arg0_operation,
92 mbedtls_svc_key_id_t arg1_key,
93 psa_algorithm_t arg2_alg)
94{
95 psa_status_t status = (psa_aead_decrypt_setup)(arg0_operation, arg1_key, arg2_alg);
96 return status;
97}
98
99/* Wrapper for psa_aead_encrypt */
100psa_status_t mbedtls_test_wrap_psa_aead_encrypt(
101 mbedtls_svc_key_id_t arg0_key,
102 psa_algorithm_t arg1_alg,
103 const uint8_t *arg2_nonce,
104 size_t arg3_nonce_length,
105 const uint8_t *arg4_additional_data,
106 size_t arg5_additional_data_length,
107 const uint8_t *arg6_plaintext,
108 size_t arg7_plaintext_length,
109 uint8_t *arg8_ciphertext,
110 size_t arg9_ciphertext_size,
111 size_t *arg10_ciphertext_length)
112{
David Horstmann86e6fe02024-01-22 14:36:01 +0000113#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
114 MBEDTLS_TEST_MEMORY_POISON(arg2_nonce, arg3_nonce_length);
115 MBEDTLS_TEST_MEMORY_POISON(arg4_additional_data, arg5_additional_data_length);
116 MBEDTLS_TEST_MEMORY_POISON(arg6_plaintext, arg7_plaintext_length);
117 MBEDTLS_TEST_MEMORY_POISON(arg8_ciphertext, arg9_ciphertext_size);
118#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100119 psa_status_t status = (psa_aead_encrypt)(arg0_key, arg1_alg, arg2_nonce, arg3_nonce_length, arg4_additional_data, arg5_additional_data_length, arg6_plaintext, arg7_plaintext_length, arg8_ciphertext, arg9_ciphertext_size, arg10_ciphertext_length);
David Horstmann86e6fe02024-01-22 14:36:01 +0000120#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
121 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_nonce, arg3_nonce_length);
122 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_additional_data, arg5_additional_data_length);
123 MBEDTLS_TEST_MEMORY_UNPOISON(arg6_plaintext, arg7_plaintext_length);
124 MBEDTLS_TEST_MEMORY_UNPOISON(arg8_ciphertext, arg9_ciphertext_size);
125#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100126 return status;
127}
128
129/* Wrapper for psa_aead_encrypt_setup */
130psa_status_t mbedtls_test_wrap_psa_aead_encrypt_setup(
131 psa_aead_operation_t *arg0_operation,
132 mbedtls_svc_key_id_t arg1_key,
133 psa_algorithm_t arg2_alg)
134{
135 psa_status_t status = (psa_aead_encrypt_setup)(arg0_operation, arg1_key, arg2_alg);
136 return status;
137}
138
139/* Wrapper for psa_aead_finish */
140psa_status_t mbedtls_test_wrap_psa_aead_finish(
141 psa_aead_operation_t *arg0_operation,
142 uint8_t *arg1_ciphertext,
143 size_t arg2_ciphertext_size,
144 size_t *arg3_ciphertext_length,
145 uint8_t *arg4_tag,
146 size_t arg5_tag_size,
147 size_t *arg6_tag_length)
148{
David Horstmann86e6fe02024-01-22 14:36:01 +0000149#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
150 MBEDTLS_TEST_MEMORY_POISON(arg1_ciphertext, arg2_ciphertext_size);
151 MBEDTLS_TEST_MEMORY_POISON(arg4_tag, arg5_tag_size);
152#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100153 psa_status_t status = (psa_aead_finish)(arg0_operation, arg1_ciphertext, arg2_ciphertext_size, arg3_ciphertext_length, arg4_tag, arg5_tag_size, arg6_tag_length);
David Horstmann86e6fe02024-01-22 14:36:01 +0000154#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
155 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_ciphertext, arg2_ciphertext_size);
156 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_tag, arg5_tag_size);
157#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100158 return status;
159}
160
161/* Wrapper for psa_aead_generate_nonce */
162psa_status_t mbedtls_test_wrap_psa_aead_generate_nonce(
163 psa_aead_operation_t *arg0_operation,
164 uint8_t *arg1_nonce,
165 size_t arg2_nonce_size,
166 size_t *arg3_nonce_length)
167{
David Horstmann86e6fe02024-01-22 14:36:01 +0000168#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
169 MBEDTLS_TEST_MEMORY_POISON(arg1_nonce, arg2_nonce_size);
170#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100171 psa_status_t status = (psa_aead_generate_nonce)(arg0_operation, arg1_nonce, arg2_nonce_size, arg3_nonce_length);
David Horstmann86e6fe02024-01-22 14:36:01 +0000172#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
173 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_nonce, arg2_nonce_size);
174#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100175 return status;
176}
177
178/* Wrapper for psa_aead_set_lengths */
179psa_status_t mbedtls_test_wrap_psa_aead_set_lengths(
180 psa_aead_operation_t *arg0_operation,
181 size_t arg1_ad_length,
182 size_t arg2_plaintext_length)
183{
184 psa_status_t status = (psa_aead_set_lengths)(arg0_operation, arg1_ad_length, arg2_plaintext_length);
185 return status;
186}
187
188/* Wrapper for psa_aead_set_nonce */
189psa_status_t mbedtls_test_wrap_psa_aead_set_nonce(
190 psa_aead_operation_t *arg0_operation,
191 const uint8_t *arg1_nonce,
192 size_t arg2_nonce_length)
193{
David Horstmann86e6fe02024-01-22 14:36:01 +0000194#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
195 MBEDTLS_TEST_MEMORY_POISON(arg1_nonce, arg2_nonce_length);
196#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100197 psa_status_t status = (psa_aead_set_nonce)(arg0_operation, arg1_nonce, arg2_nonce_length);
David Horstmann86e6fe02024-01-22 14:36:01 +0000198#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
199 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_nonce, arg2_nonce_length);
200#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100201 return status;
202}
203
204/* Wrapper for psa_aead_update */
205psa_status_t mbedtls_test_wrap_psa_aead_update(
206 psa_aead_operation_t *arg0_operation,
207 const uint8_t *arg1_input,
208 size_t arg2_input_length,
209 uint8_t *arg3_output,
210 size_t arg4_output_size,
211 size_t *arg5_output_length)
212{
David Horstmann86e6fe02024-01-22 14:36:01 +0000213#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
214 MBEDTLS_TEST_MEMORY_POISON(arg1_input, arg2_input_length);
215 MBEDTLS_TEST_MEMORY_POISON(arg3_output, arg4_output_size);
216#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100217 psa_status_t status = (psa_aead_update)(arg0_operation, arg1_input, arg2_input_length, arg3_output, arg4_output_size, arg5_output_length);
David Horstmann86e6fe02024-01-22 14:36:01 +0000218#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
219 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_input, arg2_input_length);
220 MBEDTLS_TEST_MEMORY_UNPOISON(arg3_output, arg4_output_size);
221#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100222 return status;
223}
224
225/* Wrapper for psa_aead_update_ad */
226psa_status_t mbedtls_test_wrap_psa_aead_update_ad(
227 psa_aead_operation_t *arg0_operation,
228 const uint8_t *arg1_input,
229 size_t arg2_input_length)
230{
David Horstmann86e6fe02024-01-22 14:36:01 +0000231#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
232 MBEDTLS_TEST_MEMORY_POISON(arg1_input, arg2_input_length);
233#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100234 psa_status_t status = (psa_aead_update_ad)(arg0_operation, arg1_input, arg2_input_length);
David Horstmann86e6fe02024-01-22 14:36:01 +0000235#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
236 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_input, arg2_input_length);
237#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100238 return status;
239}
240
241/* Wrapper for psa_aead_verify */
242psa_status_t mbedtls_test_wrap_psa_aead_verify(
243 psa_aead_operation_t *arg0_operation,
244 uint8_t *arg1_plaintext,
245 size_t arg2_plaintext_size,
246 size_t *arg3_plaintext_length,
247 const uint8_t *arg4_tag,
248 size_t arg5_tag_length)
249{
David Horstmann86e6fe02024-01-22 14:36:01 +0000250#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
251 MBEDTLS_TEST_MEMORY_POISON(arg1_plaintext, arg2_plaintext_size);
252 MBEDTLS_TEST_MEMORY_POISON(arg4_tag, arg5_tag_length);
253#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100254 psa_status_t status = (psa_aead_verify)(arg0_operation, arg1_plaintext, arg2_plaintext_size, arg3_plaintext_length, arg4_tag, arg5_tag_length);
David Horstmann86e6fe02024-01-22 14:36:01 +0000255#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
256 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_plaintext, arg2_plaintext_size);
257 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_tag, arg5_tag_length);
258#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100259 return status;
260}
261
262/* Wrapper for psa_asymmetric_decrypt */
263psa_status_t mbedtls_test_wrap_psa_asymmetric_decrypt(
264 mbedtls_svc_key_id_t arg0_key,
265 psa_algorithm_t arg1_alg,
266 const uint8_t *arg2_input,
267 size_t arg3_input_length,
268 const uint8_t *arg4_salt,
269 size_t arg5_salt_length,
270 uint8_t *arg6_output,
271 size_t arg7_output_size,
272 size_t *arg8_output_length)
273{
274 psa_status_t status = (psa_asymmetric_decrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_salt, arg5_salt_length, arg6_output, arg7_output_size, arg8_output_length);
275 return status;
276}
277
278/* Wrapper for psa_asymmetric_encrypt */
279psa_status_t mbedtls_test_wrap_psa_asymmetric_encrypt(
280 mbedtls_svc_key_id_t arg0_key,
281 psa_algorithm_t arg1_alg,
282 const uint8_t *arg2_input,
283 size_t arg3_input_length,
284 const uint8_t *arg4_salt,
285 size_t arg5_salt_length,
286 uint8_t *arg6_output,
287 size_t arg7_output_size,
288 size_t *arg8_output_length)
289{
290 psa_status_t status = (psa_asymmetric_encrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_salt, arg5_salt_length, arg6_output, arg7_output_size, arg8_output_length);
291 return status;
292}
293
294/* Wrapper for psa_cipher_abort */
295psa_status_t mbedtls_test_wrap_psa_cipher_abort(
296 psa_cipher_operation_t *arg0_operation)
297{
298 psa_status_t status = (psa_cipher_abort)(arg0_operation);
299 return status;
300}
301
302/* Wrapper for psa_cipher_decrypt */
303psa_status_t mbedtls_test_wrap_psa_cipher_decrypt(
304 mbedtls_svc_key_id_t arg0_key,
305 psa_algorithm_t arg1_alg,
306 const uint8_t *arg2_input,
307 size_t arg3_input_length,
308 uint8_t *arg4_output,
309 size_t arg5_output_size,
310 size_t *arg6_output_length)
311{
Gabor Mezeib8f97a12024-01-24 16:58:40 +0100312#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
313 MBEDTLS_TEST_MEMORY_POISON(arg2_input, arg3_input_length);
314 MBEDTLS_TEST_MEMORY_POISON(arg4_output, arg5_output_size);
315#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100316 psa_status_t status = (psa_cipher_decrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_output, arg5_output_size, arg6_output_length);
Gabor Mezeib8f97a12024-01-24 16:58:40 +0100317#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
318 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_input, arg3_input_length);
319 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_output, arg5_output_size);
320#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100321 return status;
322}
323
324/* Wrapper for psa_cipher_decrypt_setup */
325psa_status_t mbedtls_test_wrap_psa_cipher_decrypt_setup(
326 psa_cipher_operation_t *arg0_operation,
327 mbedtls_svc_key_id_t arg1_key,
328 psa_algorithm_t arg2_alg)
329{
330 psa_status_t status = (psa_cipher_decrypt_setup)(arg0_operation, arg1_key, arg2_alg);
331 return status;
332}
333
334/* Wrapper for psa_cipher_encrypt */
335psa_status_t mbedtls_test_wrap_psa_cipher_encrypt(
336 mbedtls_svc_key_id_t arg0_key,
337 psa_algorithm_t arg1_alg,
338 const uint8_t *arg2_input,
339 size_t arg3_input_length,
340 uint8_t *arg4_output,
341 size_t arg5_output_size,
342 size_t *arg6_output_length)
343{
Ryan Everett84a666d2024-01-25 12:00:02 +0000344#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
345 MBEDTLS_TEST_MEMORY_POISON(arg2_input, arg3_input_length);
346 MBEDTLS_TEST_MEMORY_POISON(arg4_output, arg5_output_size);
347#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100348 psa_status_t status = (psa_cipher_encrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_output, arg5_output_size, arg6_output_length);
Ryan Everett84a666d2024-01-25 12:00:02 +0000349#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
350 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_input, arg3_input_length);
351 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_output, arg5_output_size);
352#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100353 return status;
354}
355
356/* Wrapper for psa_cipher_encrypt_setup */
357psa_status_t mbedtls_test_wrap_psa_cipher_encrypt_setup(
358 psa_cipher_operation_t *arg0_operation,
359 mbedtls_svc_key_id_t arg1_key,
360 psa_algorithm_t arg2_alg)
361{
362 psa_status_t status = (psa_cipher_encrypt_setup)(arg0_operation, arg1_key, arg2_alg);
363 return status;
364}
365
366/* Wrapper for psa_cipher_finish */
367psa_status_t mbedtls_test_wrap_psa_cipher_finish(
368 psa_cipher_operation_t *arg0_operation,
369 uint8_t *arg1_output,
370 size_t arg2_output_size,
371 size_t *arg3_output_length)
372{
Gabor Mezeib8f97a12024-01-24 16:58:40 +0100373#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
374 MBEDTLS_TEST_MEMORY_POISON(arg1_output, arg2_output_size);
375#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100376 psa_status_t status = (psa_cipher_finish)(arg0_operation, arg1_output, arg2_output_size, arg3_output_length);
Gabor Mezeib8f97a12024-01-24 16:58:40 +0100377#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
378 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_output, arg2_output_size);
379#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100380 return status;
381}
382
383/* Wrapper for psa_cipher_generate_iv */
384psa_status_t mbedtls_test_wrap_psa_cipher_generate_iv(
385 psa_cipher_operation_t *arg0_operation,
386 uint8_t *arg1_iv,
387 size_t arg2_iv_size,
388 size_t *arg3_iv_length)
389{
Gabor Mezeib74ac662024-02-01 10:39:56 +0100390#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
391 MBEDTLS_TEST_MEMORY_POISON(arg1_iv, arg2_iv_size);
392#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100393 psa_status_t status = (psa_cipher_generate_iv)(arg0_operation, arg1_iv, arg2_iv_size, arg3_iv_length);
Gabor Mezeib74ac662024-02-01 10:39:56 +0100394#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
395 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_iv, arg2_iv_size);
396#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100397 return status;
398}
399
400/* Wrapper for psa_cipher_set_iv */
401psa_status_t mbedtls_test_wrap_psa_cipher_set_iv(
402 psa_cipher_operation_t *arg0_operation,
403 const uint8_t *arg1_iv,
404 size_t arg2_iv_length)
405{
Gabor Mezeib74ac662024-02-01 10:39:56 +0100406#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
407 MBEDTLS_TEST_MEMORY_POISON(arg1_iv, arg2_iv_length);
408#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100409 psa_status_t status = (psa_cipher_set_iv)(arg0_operation, arg1_iv, arg2_iv_length);
Gabor Mezeib74ac662024-02-01 10:39:56 +0100410#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
411 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_iv, arg2_iv_length);
412#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100413 return status;
414}
415
416/* Wrapper for psa_cipher_update */
417psa_status_t mbedtls_test_wrap_psa_cipher_update(
418 psa_cipher_operation_t *arg0_operation,
419 const uint8_t *arg1_input,
420 size_t arg2_input_length,
421 uint8_t *arg3_output,
422 size_t arg4_output_size,
423 size_t *arg5_output_length)
424{
Gabor Mezeib8f97a12024-01-24 16:58:40 +0100425#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
426 MBEDTLS_TEST_MEMORY_POISON(arg1_input, arg2_input_length);
427 MBEDTLS_TEST_MEMORY_POISON(arg3_output, arg4_output_size);
428#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100429 psa_status_t status = (psa_cipher_update)(arg0_operation, arg1_input, arg2_input_length, arg3_output, arg4_output_size, arg5_output_length);
Gabor Mezeib8f97a12024-01-24 16:58:40 +0100430#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
431 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_input, arg2_input_length);
432 MBEDTLS_TEST_MEMORY_UNPOISON(arg3_output, arg4_output_size);
433#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100434 return status;
435}
436
437/* Wrapper for psa_copy_key */
438psa_status_t mbedtls_test_wrap_psa_copy_key(
439 mbedtls_svc_key_id_t arg0_source_key,
440 const psa_key_attributes_t *arg1_attributes,
441 mbedtls_svc_key_id_t *arg2_target_key)
442{
443 psa_status_t status = (psa_copy_key)(arg0_source_key, arg1_attributes, arg2_target_key);
444 return status;
445}
446
447/* Wrapper for psa_crypto_driver_pake_get_cipher_suite */
448psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_cipher_suite(
449 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
450 psa_pake_cipher_suite_t *arg1_cipher_suite)
451{
452 psa_status_t status = (psa_crypto_driver_pake_get_cipher_suite)(arg0_inputs, arg1_cipher_suite);
453 return status;
454}
455
456/* Wrapper for psa_crypto_driver_pake_get_password */
457psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_password(
458 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
459 uint8_t *arg1_buffer,
460 size_t arg2_buffer_size,
461 size_t *arg3_buffer_length)
462{
463 psa_status_t status = (psa_crypto_driver_pake_get_password)(arg0_inputs, arg1_buffer, arg2_buffer_size, arg3_buffer_length);
464 return status;
465}
466
467/* Wrapper for psa_crypto_driver_pake_get_password_len */
468psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_password_len(
469 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
470 size_t *arg1_password_len)
471{
472 psa_status_t status = (psa_crypto_driver_pake_get_password_len)(arg0_inputs, arg1_password_len);
473 return status;
474}
475
476/* Wrapper for psa_crypto_driver_pake_get_peer */
477psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_peer(
478 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
479 uint8_t *arg1_peer_id,
480 size_t arg2_peer_id_size,
481 size_t *arg3_peer_id_length)
482{
483 psa_status_t status = (psa_crypto_driver_pake_get_peer)(arg0_inputs, arg1_peer_id, arg2_peer_id_size, arg3_peer_id_length);
484 return status;
485}
486
487/* Wrapper for psa_crypto_driver_pake_get_peer_len */
488psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_peer_len(
489 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
490 size_t *arg1_peer_len)
491{
492 psa_status_t status = (psa_crypto_driver_pake_get_peer_len)(arg0_inputs, arg1_peer_len);
493 return status;
494}
495
496/* Wrapper for psa_crypto_driver_pake_get_user */
497psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_user(
498 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
499 uint8_t *arg1_user_id,
500 size_t arg2_user_id_size,
501 size_t *arg3_user_id_len)
502{
503 psa_status_t status = (psa_crypto_driver_pake_get_user)(arg0_inputs, arg1_user_id, arg2_user_id_size, arg3_user_id_len);
504 return status;
505}
506
507/* Wrapper for psa_crypto_driver_pake_get_user_len */
508psa_status_t mbedtls_test_wrap_psa_crypto_driver_pake_get_user_len(
509 const psa_crypto_driver_pake_inputs_t *arg0_inputs,
510 size_t *arg1_user_len)
511{
512 psa_status_t status = (psa_crypto_driver_pake_get_user_len)(arg0_inputs, arg1_user_len);
513 return status;
514}
515
516/* Wrapper for psa_crypto_init */
517psa_status_t mbedtls_test_wrap_psa_crypto_init(void)
518{
519 psa_status_t status = (psa_crypto_init)();
520 return status;
521}
522
523/* Wrapper for psa_destroy_key */
524psa_status_t mbedtls_test_wrap_psa_destroy_key(
525 mbedtls_svc_key_id_t arg0_key)
526{
527 psa_status_t status = (psa_destroy_key)(arg0_key);
528 return status;
529}
530
531/* Wrapper for psa_export_key */
532psa_status_t mbedtls_test_wrap_psa_export_key(
533 mbedtls_svc_key_id_t arg0_key,
534 uint8_t *arg1_data,
535 size_t arg2_data_size,
536 size_t *arg3_data_length)
537{
Ryan Everett77b91e32024-01-25 10:58:06 +0000538#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
539 MBEDTLS_TEST_MEMORY_POISON(arg1_data, arg2_data_size);
540#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100541 psa_status_t status = (psa_export_key)(arg0_key, arg1_data, arg2_data_size, arg3_data_length);
Ryan Everett77b91e32024-01-25 10:58:06 +0000542#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
543 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_data, arg2_data_size);
544#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100545 return status;
546}
547
548/* Wrapper for psa_export_public_key */
549psa_status_t mbedtls_test_wrap_psa_export_public_key(
550 mbedtls_svc_key_id_t arg0_key,
551 uint8_t *arg1_data,
552 size_t arg2_data_size,
553 size_t *arg3_data_length)
554{
Ryan Everett77b91e32024-01-25 10:58:06 +0000555#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
556 MBEDTLS_TEST_MEMORY_POISON(arg1_data, arg2_data_size);
557#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100558 psa_status_t status = (psa_export_public_key)(arg0_key, arg1_data, arg2_data_size, arg3_data_length);
Ryan Everett77b91e32024-01-25 10:58:06 +0000559#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
560 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_data, arg2_data_size);
561#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100562 return status;
563}
564
565/* Wrapper for psa_generate_key */
566psa_status_t mbedtls_test_wrap_psa_generate_key(
567 const psa_key_attributes_t *arg0_attributes,
568 mbedtls_svc_key_id_t *arg1_key)
569{
570 psa_status_t status = (psa_generate_key)(arg0_attributes, arg1_key);
571 return status;
572}
573
574/* Wrapper for psa_generate_random */
575psa_status_t mbedtls_test_wrap_psa_generate_random(
576 uint8_t *arg0_output,
577 size_t arg1_output_size)
578{
579 psa_status_t status = (psa_generate_random)(arg0_output, arg1_output_size);
580 return status;
581}
582
583/* Wrapper for psa_get_key_attributes */
584psa_status_t mbedtls_test_wrap_psa_get_key_attributes(
585 mbedtls_svc_key_id_t arg0_key,
586 psa_key_attributes_t *arg1_attributes)
587{
588 psa_status_t status = (psa_get_key_attributes)(arg0_key, arg1_attributes);
589 return status;
590}
591
592/* Wrapper for psa_hash_abort */
593psa_status_t mbedtls_test_wrap_psa_hash_abort(
594 psa_hash_operation_t *arg0_operation)
595{
596 psa_status_t status = (psa_hash_abort)(arg0_operation);
597 return status;
598}
599
600/* Wrapper for psa_hash_clone */
601psa_status_t mbedtls_test_wrap_psa_hash_clone(
602 const psa_hash_operation_t *arg0_source_operation,
603 psa_hash_operation_t *arg1_target_operation)
604{
605 psa_status_t status = (psa_hash_clone)(arg0_source_operation, arg1_target_operation);
606 return status;
607}
608
609/* Wrapper for psa_hash_compare */
610psa_status_t mbedtls_test_wrap_psa_hash_compare(
611 psa_algorithm_t arg0_alg,
612 const uint8_t *arg1_input,
613 size_t arg2_input_length,
614 const uint8_t *arg3_hash,
615 size_t arg4_hash_length)
616{
Thomas Daubney45c85862024-01-25 16:48:09 +0000617#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
618 MBEDTLS_TEST_MEMORY_POISON(arg1_input, arg2_input_length);
619 MBEDTLS_TEST_MEMORY_POISON(arg3_hash, arg4_hash_length);
620#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100621 psa_status_t status = (psa_hash_compare)(arg0_alg, arg1_input, arg2_input_length, arg3_hash, arg4_hash_length);
Thomas Daubney45c85862024-01-25 16:48:09 +0000622#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
623 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_input, arg2_input_length);
624 MBEDTLS_TEST_MEMORY_UNPOISON(arg3_hash, arg4_hash_length);
625#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100626 return status;
627}
628
629/* Wrapper for psa_hash_compute */
630psa_status_t mbedtls_test_wrap_psa_hash_compute(
631 psa_algorithm_t arg0_alg,
632 const uint8_t *arg1_input,
633 size_t arg2_input_length,
634 uint8_t *arg3_hash,
635 size_t arg4_hash_size,
636 size_t *arg5_hash_length)
637{
Thomas Daubney45c85862024-01-25 16:48:09 +0000638#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
639 MBEDTLS_TEST_MEMORY_POISON(arg1_input, arg2_input_length);
640 MBEDTLS_TEST_MEMORY_POISON(arg3_hash, arg4_hash_size);
641#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100642 psa_status_t status = (psa_hash_compute)(arg0_alg, arg1_input, arg2_input_length, arg3_hash, arg4_hash_size, arg5_hash_length);
Thomas Daubney45c85862024-01-25 16:48:09 +0000643#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
644 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_input, arg2_input_length);
645 MBEDTLS_TEST_MEMORY_UNPOISON(arg3_hash, arg4_hash_size);
646#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100647 return status;
648}
649
650/* Wrapper for psa_hash_finish */
651psa_status_t mbedtls_test_wrap_psa_hash_finish(
652 psa_hash_operation_t *arg0_operation,
653 uint8_t *arg1_hash,
654 size_t arg2_hash_size,
655 size_t *arg3_hash_length)
656{
Thomas Daubney45c85862024-01-25 16:48:09 +0000657#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
658 MBEDTLS_TEST_MEMORY_POISON(arg1_hash, arg2_hash_size);
659#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100660 psa_status_t status = (psa_hash_finish)(arg0_operation, arg1_hash, arg2_hash_size, arg3_hash_length);
Thomas Daubney45c85862024-01-25 16:48:09 +0000661#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
662 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_hash, arg2_hash_size);
663#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100664 return status;
665}
666
667/* Wrapper for psa_hash_setup */
668psa_status_t mbedtls_test_wrap_psa_hash_setup(
669 psa_hash_operation_t *arg0_operation,
670 psa_algorithm_t arg1_alg)
671{
672 psa_status_t status = (psa_hash_setup)(arg0_operation, arg1_alg);
673 return status;
674}
675
676/* Wrapper for psa_hash_update */
677psa_status_t mbedtls_test_wrap_psa_hash_update(
678 psa_hash_operation_t *arg0_operation,
679 const uint8_t *arg1_input,
680 size_t arg2_input_length)
681{
Thomas Daubney45c85862024-01-25 16:48:09 +0000682#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
683 MBEDTLS_TEST_MEMORY_POISON(arg1_input, arg2_input_length);
684#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100685 psa_status_t status = (psa_hash_update)(arg0_operation, arg1_input, arg2_input_length);
Thomas Daubney45c85862024-01-25 16:48:09 +0000686#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
687 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_input, arg2_input_length);
688#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100689 return status;
690}
691
692/* Wrapper for psa_hash_verify */
693psa_status_t mbedtls_test_wrap_psa_hash_verify(
694 psa_hash_operation_t *arg0_operation,
695 const uint8_t *arg1_hash,
696 size_t arg2_hash_length)
697{
Thomas Daubney45c85862024-01-25 16:48:09 +0000698#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
699 MBEDTLS_TEST_MEMORY_POISON(arg1_hash, arg2_hash_length);
700#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100701 psa_status_t status = (psa_hash_verify)(arg0_operation, arg1_hash, arg2_hash_length);
Thomas Daubney45c85862024-01-25 16:48:09 +0000702#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
703 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_hash, arg2_hash_length);
704#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100705 return status;
706}
707
708/* Wrapper for psa_import_key */
709psa_status_t mbedtls_test_wrap_psa_import_key(
710 const psa_key_attributes_t *arg0_attributes,
711 const uint8_t *arg1_data,
712 size_t arg2_data_length,
713 mbedtls_svc_key_id_t *arg3_key)
714{
Ryan Everett77b91e32024-01-25 10:58:06 +0000715#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
716 MBEDTLS_TEST_MEMORY_POISON(arg1_data, arg2_data_length);
717#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100718 psa_status_t status = (psa_import_key)(arg0_attributes, arg1_data, arg2_data_length, arg3_key);
Ryan Everett77b91e32024-01-25 10:58:06 +0000719#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
720 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_data, arg2_data_length);
721#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100722 return status;
723}
724
725/* Wrapper for psa_key_derivation_abort */
726psa_status_t mbedtls_test_wrap_psa_key_derivation_abort(
727 psa_key_derivation_operation_t *arg0_operation)
728{
729 psa_status_t status = (psa_key_derivation_abort)(arg0_operation);
730 return status;
731}
732
733/* Wrapper for psa_key_derivation_get_capacity */
734psa_status_t mbedtls_test_wrap_psa_key_derivation_get_capacity(
735 const psa_key_derivation_operation_t *arg0_operation,
736 size_t *arg1_capacity)
737{
738 psa_status_t status = (psa_key_derivation_get_capacity)(arg0_operation, arg1_capacity);
739 return status;
740}
741
742/* Wrapper for psa_key_derivation_input_bytes */
743psa_status_t mbedtls_test_wrap_psa_key_derivation_input_bytes(
744 psa_key_derivation_operation_t *arg0_operation,
745 psa_key_derivation_step_t arg1_step,
746 const uint8_t *arg2_data,
747 size_t arg3_data_length)
748{
Ryan Everett198a4d92024-01-25 11:44:56 +0000749#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
750 MBEDTLS_TEST_MEMORY_POISON(arg2_data, arg3_data_length);
751#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100752 psa_status_t status = (psa_key_derivation_input_bytes)(arg0_operation, arg1_step, arg2_data, arg3_data_length);
Ryan Everett198a4d92024-01-25 11:44:56 +0000753#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
754 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_data, arg3_data_length);
755#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100756 return status;
757}
758
759/* Wrapper for psa_key_derivation_input_integer */
760psa_status_t mbedtls_test_wrap_psa_key_derivation_input_integer(
761 psa_key_derivation_operation_t *arg0_operation,
762 psa_key_derivation_step_t arg1_step,
763 uint64_t arg2_value)
764{
765 psa_status_t status = (psa_key_derivation_input_integer)(arg0_operation, arg1_step, arg2_value);
766 return status;
767}
768
769/* Wrapper for psa_key_derivation_input_key */
770psa_status_t mbedtls_test_wrap_psa_key_derivation_input_key(
771 psa_key_derivation_operation_t *arg0_operation,
772 psa_key_derivation_step_t arg1_step,
773 mbedtls_svc_key_id_t arg2_key)
774{
775 psa_status_t status = (psa_key_derivation_input_key)(arg0_operation, arg1_step, arg2_key);
776 return status;
777}
778
779/* Wrapper for psa_key_derivation_key_agreement */
780psa_status_t mbedtls_test_wrap_psa_key_derivation_key_agreement(
781 psa_key_derivation_operation_t *arg0_operation,
782 psa_key_derivation_step_t arg1_step,
783 mbedtls_svc_key_id_t arg2_private_key,
784 const uint8_t *arg3_peer_key,
785 size_t arg4_peer_key_length)
786{
787 psa_status_t status = (psa_key_derivation_key_agreement)(arg0_operation, arg1_step, arg2_private_key, arg3_peer_key, arg4_peer_key_length);
788 return status;
789}
790
791/* Wrapper for psa_key_derivation_output_bytes */
792psa_status_t mbedtls_test_wrap_psa_key_derivation_output_bytes(
793 psa_key_derivation_operation_t *arg0_operation,
794 uint8_t *arg1_output,
795 size_t arg2_output_length)
796{
Ryan Everett198a4d92024-01-25 11:44:56 +0000797#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
798 MBEDTLS_TEST_MEMORY_POISON(arg1_output, arg2_output_length);
799#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100800 psa_status_t status = (psa_key_derivation_output_bytes)(arg0_operation, arg1_output, arg2_output_length);
Ryan Everett198a4d92024-01-25 11:44:56 +0000801#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
802 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_output, arg2_output_length);
803#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100804 return status;
805}
806
807/* Wrapper for psa_key_derivation_output_key */
808psa_status_t mbedtls_test_wrap_psa_key_derivation_output_key(
809 const psa_key_attributes_t *arg0_attributes,
810 psa_key_derivation_operation_t *arg1_operation,
811 mbedtls_svc_key_id_t *arg2_key)
812{
813 psa_status_t status = (psa_key_derivation_output_key)(arg0_attributes, arg1_operation, arg2_key);
814 return status;
815}
816
817/* Wrapper for psa_key_derivation_set_capacity */
818psa_status_t mbedtls_test_wrap_psa_key_derivation_set_capacity(
819 psa_key_derivation_operation_t *arg0_operation,
820 size_t arg1_capacity)
821{
822 psa_status_t status = (psa_key_derivation_set_capacity)(arg0_operation, arg1_capacity);
823 return status;
824}
825
826/* Wrapper for psa_key_derivation_setup */
827psa_status_t mbedtls_test_wrap_psa_key_derivation_setup(
828 psa_key_derivation_operation_t *arg0_operation,
829 psa_algorithm_t arg1_alg)
830{
831 psa_status_t status = (psa_key_derivation_setup)(arg0_operation, arg1_alg);
832 return status;
833}
834
835/* Wrapper for psa_mac_abort */
836psa_status_t mbedtls_test_wrap_psa_mac_abort(
837 psa_mac_operation_t *arg0_operation)
838{
839 psa_status_t status = (psa_mac_abort)(arg0_operation);
840 return status;
841}
842
843/* Wrapper for psa_mac_compute */
844psa_status_t mbedtls_test_wrap_psa_mac_compute(
845 mbedtls_svc_key_id_t arg0_key,
846 psa_algorithm_t arg1_alg,
847 const uint8_t *arg2_input,
848 size_t arg3_input_length,
849 uint8_t *arg4_mac,
850 size_t arg5_mac_size,
851 size_t *arg6_mac_length)
852{
Thomas Daubneya1cf1012024-01-30 11:18:54 +0000853#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
854 MBEDTLS_TEST_MEMORY_POISON(arg2_input, arg3_input_length);
855 MBEDTLS_TEST_MEMORY_POISON(arg4_mac, arg5_mac_size);
856#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100857 psa_status_t status = (psa_mac_compute)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_mac, arg5_mac_size, arg6_mac_length);
Thomas Daubneya1cf1012024-01-30 11:18:54 +0000858#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
859 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_input, arg3_input_length);
860 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_mac, arg5_mac_size);
861#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100862 return status;
863}
864
865/* Wrapper for psa_mac_sign_finish */
866psa_status_t mbedtls_test_wrap_psa_mac_sign_finish(
867 psa_mac_operation_t *arg0_operation,
868 uint8_t *arg1_mac,
869 size_t arg2_mac_size,
870 size_t *arg3_mac_length)
871{
Thomas Daubneya1cf1012024-01-30 11:18:54 +0000872#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
873 MBEDTLS_TEST_MEMORY_POISON(arg1_mac, arg2_mac_size);
874#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100875 psa_status_t status = (psa_mac_sign_finish)(arg0_operation, arg1_mac, arg2_mac_size, arg3_mac_length);
Thomas Daubneya1cf1012024-01-30 11:18:54 +0000876#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
877 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_mac, arg2_mac_size);
878#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100879 return status;
880}
881
882/* Wrapper for psa_mac_sign_setup */
883psa_status_t mbedtls_test_wrap_psa_mac_sign_setup(
884 psa_mac_operation_t *arg0_operation,
885 mbedtls_svc_key_id_t arg1_key,
886 psa_algorithm_t arg2_alg)
887{
888 psa_status_t status = (psa_mac_sign_setup)(arg0_operation, arg1_key, arg2_alg);
889 return status;
890}
891
892/* Wrapper for psa_mac_update */
893psa_status_t mbedtls_test_wrap_psa_mac_update(
894 psa_mac_operation_t *arg0_operation,
895 const uint8_t *arg1_input,
896 size_t arg2_input_length)
897{
Thomas Daubneya1cf1012024-01-30 11:18:54 +0000898#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
899 MBEDTLS_TEST_MEMORY_POISON(arg1_input, arg2_input_length);
900#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100901 psa_status_t status = (psa_mac_update)(arg0_operation, arg1_input, arg2_input_length);
Thomas Daubneya1cf1012024-01-30 11:18:54 +0000902#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
903 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_input, arg2_input_length);
904#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100905 return status;
906}
907
908/* Wrapper for psa_mac_verify */
909psa_status_t mbedtls_test_wrap_psa_mac_verify(
910 mbedtls_svc_key_id_t arg0_key,
911 psa_algorithm_t arg1_alg,
912 const uint8_t *arg2_input,
913 size_t arg3_input_length,
914 const uint8_t *arg4_mac,
915 size_t arg5_mac_length)
916{
Thomas Daubneya1cf1012024-01-30 11:18:54 +0000917#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
918 MBEDTLS_TEST_MEMORY_POISON(arg2_input, arg3_input_length);
919 MBEDTLS_TEST_MEMORY_POISON(arg4_mac, arg5_mac_length);
920#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100921 psa_status_t status = (psa_mac_verify)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_mac, arg5_mac_length);
Thomas Daubneya1cf1012024-01-30 11:18:54 +0000922#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
923 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_input, arg3_input_length);
924 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_mac, arg5_mac_length);
925#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100926 return status;
927}
928
929/* Wrapper for psa_mac_verify_finish */
930psa_status_t mbedtls_test_wrap_psa_mac_verify_finish(
931 psa_mac_operation_t *arg0_operation,
932 const uint8_t *arg1_mac,
933 size_t arg2_mac_length)
934{
Thomas Daubneya1cf1012024-01-30 11:18:54 +0000935#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
936 MBEDTLS_TEST_MEMORY_POISON(arg1_mac, arg2_mac_length);
937#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100938 psa_status_t status = (psa_mac_verify_finish)(arg0_operation, arg1_mac, arg2_mac_length);
Thomas Daubneya1cf1012024-01-30 11:18:54 +0000939#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
940 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_mac, arg2_mac_length);
941#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +0100942 return status;
943}
944
945/* Wrapper for psa_mac_verify_setup */
946psa_status_t mbedtls_test_wrap_psa_mac_verify_setup(
947 psa_mac_operation_t *arg0_operation,
948 mbedtls_svc_key_id_t arg1_key,
949 psa_algorithm_t arg2_alg)
950{
951 psa_status_t status = (psa_mac_verify_setup)(arg0_operation, arg1_key, arg2_alg);
952 return status;
953}
954
955/* Wrapper for psa_pake_abort */
956psa_status_t mbedtls_test_wrap_psa_pake_abort(
957 psa_pake_operation_t *arg0_operation)
958{
959 psa_status_t status = (psa_pake_abort)(arg0_operation);
960 return status;
961}
962
963/* Wrapper for psa_pake_get_implicit_key */
964psa_status_t mbedtls_test_wrap_psa_pake_get_implicit_key(
965 psa_pake_operation_t *arg0_operation,
966 psa_key_derivation_operation_t *arg1_output)
967{
968 psa_status_t status = (psa_pake_get_implicit_key)(arg0_operation, arg1_output);
969 return status;
970}
971
972/* Wrapper for psa_pake_input */
973psa_status_t mbedtls_test_wrap_psa_pake_input(
974 psa_pake_operation_t *arg0_operation,
975 psa_pake_step_t arg1_step,
976 const uint8_t *arg2_input,
977 size_t arg3_input_length)
978{
979 psa_status_t status = (psa_pake_input)(arg0_operation, arg1_step, arg2_input, arg3_input_length);
980 return status;
981}
982
983/* Wrapper for psa_pake_output */
984psa_status_t mbedtls_test_wrap_psa_pake_output(
985 psa_pake_operation_t *arg0_operation,
986 psa_pake_step_t arg1_step,
987 uint8_t *arg2_output,
988 size_t arg3_output_size,
989 size_t *arg4_output_length)
990{
991 psa_status_t status = (psa_pake_output)(arg0_operation, arg1_step, arg2_output, arg3_output_size, arg4_output_length);
992 return status;
993}
994
995/* Wrapper for psa_pake_set_password_key */
996psa_status_t mbedtls_test_wrap_psa_pake_set_password_key(
997 psa_pake_operation_t *arg0_operation,
998 mbedtls_svc_key_id_t arg1_password)
999{
1000 psa_status_t status = (psa_pake_set_password_key)(arg0_operation, arg1_password);
1001 return status;
1002}
1003
1004/* Wrapper for psa_pake_set_peer */
1005psa_status_t mbedtls_test_wrap_psa_pake_set_peer(
1006 psa_pake_operation_t *arg0_operation,
1007 const uint8_t *arg1_peer_id,
1008 size_t arg2_peer_id_len)
1009{
1010 psa_status_t status = (psa_pake_set_peer)(arg0_operation, arg1_peer_id, arg2_peer_id_len);
1011 return status;
1012}
1013
1014/* Wrapper for psa_pake_set_role */
1015psa_status_t mbedtls_test_wrap_psa_pake_set_role(
1016 psa_pake_operation_t *arg0_operation,
1017 psa_pake_role_t arg1_role)
1018{
1019 psa_status_t status = (psa_pake_set_role)(arg0_operation, arg1_role);
1020 return status;
1021}
1022
1023/* Wrapper for psa_pake_set_user */
1024psa_status_t mbedtls_test_wrap_psa_pake_set_user(
1025 psa_pake_operation_t *arg0_operation,
1026 const uint8_t *arg1_user_id,
1027 size_t arg2_user_id_len)
1028{
1029 psa_status_t status = (psa_pake_set_user)(arg0_operation, arg1_user_id, arg2_user_id_len);
1030 return status;
1031}
1032
1033/* Wrapper for psa_pake_setup */
1034psa_status_t mbedtls_test_wrap_psa_pake_setup(
1035 psa_pake_operation_t *arg0_operation,
1036 const psa_pake_cipher_suite_t *arg1_cipher_suite)
1037{
1038 psa_status_t status = (psa_pake_setup)(arg0_operation, arg1_cipher_suite);
1039 return status;
1040}
1041
1042/* Wrapper for psa_purge_key */
1043psa_status_t mbedtls_test_wrap_psa_purge_key(
1044 mbedtls_svc_key_id_t arg0_key)
1045{
1046 psa_status_t status = (psa_purge_key)(arg0_key);
1047 return status;
1048}
1049
1050/* Wrapper for psa_raw_key_agreement */
1051psa_status_t mbedtls_test_wrap_psa_raw_key_agreement(
1052 psa_algorithm_t arg0_alg,
1053 mbedtls_svc_key_id_t arg1_private_key,
1054 const uint8_t *arg2_peer_key,
1055 size_t arg3_peer_key_length,
1056 uint8_t *arg4_output,
1057 size_t arg5_output_size,
1058 size_t *arg6_output_length)
1059{
1060 psa_status_t status = (psa_raw_key_agreement)(arg0_alg, arg1_private_key, arg2_peer_key, arg3_peer_key_length, arg4_output, arg5_output_size, arg6_output_length);
1061 return status;
1062}
1063
1064/* Wrapper for psa_sign_hash */
1065psa_status_t mbedtls_test_wrap_psa_sign_hash(
1066 mbedtls_svc_key_id_t arg0_key,
1067 psa_algorithm_t arg1_alg,
1068 const uint8_t *arg2_hash,
1069 size_t arg3_hash_length,
1070 uint8_t *arg4_signature,
1071 size_t arg5_signature_size,
1072 size_t *arg6_signature_length)
1073{
Thomas Daubneyf430f472024-01-30 12:25:35 +00001074#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
1075 MBEDTLS_TEST_MEMORY_POISON(arg2_hash, arg3_hash_length);
1076 MBEDTLS_TEST_MEMORY_POISON(arg4_signature, arg5_signature_size);
1077#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001078 psa_status_t status = (psa_sign_hash)(arg0_key, arg1_alg, arg2_hash, arg3_hash_length, arg4_signature, arg5_signature_size, arg6_signature_length);
Thomas Daubneyf430f472024-01-30 12:25:35 +00001079#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
1080 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_hash, arg3_hash_length);
1081 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_signature, arg5_signature_size);
1082#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001083 return status;
1084}
1085
1086/* Wrapper for psa_sign_hash_abort */
1087psa_status_t mbedtls_test_wrap_psa_sign_hash_abort(
1088 psa_sign_hash_interruptible_operation_t *arg0_operation)
1089{
1090 psa_status_t status = (psa_sign_hash_abort)(arg0_operation);
1091 return status;
1092}
1093
1094/* Wrapper for psa_sign_hash_complete */
1095psa_status_t mbedtls_test_wrap_psa_sign_hash_complete(
1096 psa_sign_hash_interruptible_operation_t *arg0_operation,
1097 uint8_t *arg1_signature,
1098 size_t arg2_signature_size,
1099 size_t *arg3_signature_length)
1100{
1101 psa_status_t status = (psa_sign_hash_complete)(arg0_operation, arg1_signature, arg2_signature_size, arg3_signature_length);
1102 return status;
1103}
1104
1105/* Wrapper for psa_sign_hash_start */
1106psa_status_t mbedtls_test_wrap_psa_sign_hash_start(
1107 psa_sign_hash_interruptible_operation_t *arg0_operation,
1108 mbedtls_svc_key_id_t arg1_key,
1109 psa_algorithm_t arg2_alg,
1110 const uint8_t *arg3_hash,
1111 size_t arg4_hash_length)
1112{
1113 psa_status_t status = (psa_sign_hash_start)(arg0_operation, arg1_key, arg2_alg, arg3_hash, arg4_hash_length);
1114 return status;
1115}
1116
1117/* Wrapper for psa_sign_message */
1118psa_status_t mbedtls_test_wrap_psa_sign_message(
1119 mbedtls_svc_key_id_t arg0_key,
1120 psa_algorithm_t arg1_alg,
1121 const uint8_t *arg2_input,
1122 size_t arg3_input_length,
1123 uint8_t *arg4_signature,
1124 size_t arg5_signature_size,
1125 size_t *arg6_signature_length)
1126{
Thomas Daubneyf430f472024-01-30 12:25:35 +00001127#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
1128 MBEDTLS_TEST_MEMORY_POISON(arg2_input, arg3_input_length);
1129 MBEDTLS_TEST_MEMORY_POISON(arg4_signature, arg5_signature_size);
1130#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001131 psa_status_t status = (psa_sign_message)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_signature, arg5_signature_size, arg6_signature_length);
Thomas Daubneyf430f472024-01-30 12:25:35 +00001132#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
1133 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_input, arg3_input_length);
1134 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_signature, arg5_signature_size);
1135#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001136 return status;
1137}
1138
1139/* Wrapper for psa_verify_hash */
1140psa_status_t mbedtls_test_wrap_psa_verify_hash(
1141 mbedtls_svc_key_id_t arg0_key,
1142 psa_algorithm_t arg1_alg,
1143 const uint8_t *arg2_hash,
1144 size_t arg3_hash_length,
1145 const uint8_t *arg4_signature,
1146 size_t arg5_signature_length)
1147{
Thomas Daubneyf430f472024-01-30 12:25:35 +00001148#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
1149 MBEDTLS_TEST_MEMORY_POISON(arg2_hash, arg3_hash_length);
1150 MBEDTLS_TEST_MEMORY_POISON(arg4_signature, arg5_signature_length);
1151#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001152 psa_status_t status = (psa_verify_hash)(arg0_key, arg1_alg, arg2_hash, arg3_hash_length, arg4_signature, arg5_signature_length);
Thomas Daubneyf430f472024-01-30 12:25:35 +00001153#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
1154 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_hash, arg3_hash_length);
1155 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_signature, arg5_signature_length);
1156#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001157 return status;
1158}
1159
1160/* Wrapper for psa_verify_hash_abort */
1161psa_status_t mbedtls_test_wrap_psa_verify_hash_abort(
1162 psa_verify_hash_interruptible_operation_t *arg0_operation)
1163{
1164 psa_status_t status = (psa_verify_hash_abort)(arg0_operation);
1165 return status;
1166}
1167
1168/* Wrapper for psa_verify_hash_complete */
1169psa_status_t mbedtls_test_wrap_psa_verify_hash_complete(
1170 psa_verify_hash_interruptible_operation_t *arg0_operation)
1171{
1172 psa_status_t status = (psa_verify_hash_complete)(arg0_operation);
1173 return status;
1174}
1175
1176/* Wrapper for psa_verify_hash_start */
1177psa_status_t mbedtls_test_wrap_psa_verify_hash_start(
1178 psa_verify_hash_interruptible_operation_t *arg0_operation,
1179 mbedtls_svc_key_id_t arg1_key,
1180 psa_algorithm_t arg2_alg,
1181 const uint8_t *arg3_hash,
1182 size_t arg4_hash_length,
1183 const uint8_t *arg5_signature,
1184 size_t arg6_signature_length)
1185{
1186 psa_status_t status = (psa_verify_hash_start)(arg0_operation, arg1_key, arg2_alg, arg3_hash, arg4_hash_length, arg5_signature, arg6_signature_length);
1187 return status;
1188}
1189
1190/* Wrapper for psa_verify_message */
1191psa_status_t mbedtls_test_wrap_psa_verify_message(
1192 mbedtls_svc_key_id_t arg0_key,
1193 psa_algorithm_t arg1_alg,
1194 const uint8_t *arg2_input,
1195 size_t arg3_input_length,
1196 const uint8_t *arg4_signature,
1197 size_t arg5_signature_length)
1198{
Thomas Daubneyf430f472024-01-30 12:25:35 +00001199#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
1200 MBEDTLS_TEST_MEMORY_POISON(arg2_input, arg3_input_length);
1201 MBEDTLS_TEST_MEMORY_POISON(arg4_signature, arg5_signature_length);
1202#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001203 psa_status_t status = (psa_verify_message)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_signature, arg5_signature_length);
Thomas Daubneyf430f472024-01-30 12:25:35 +00001204#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
1205 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_input, arg3_input_length);
1206 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_signature, arg5_signature_length);
1207#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001208 return status;
1209}
1210
Gilles Peskine4411c9c2024-01-04 20:51:38 +01001211#endif /* defined(MBEDTLS_PSA_CRYPTO_C) && defined(MBEDTLS_TEST_HOOKS) && \
1212 !defined(RECORD_PSA_STATUS_COVERAGE_LOG) */
Gilles Peskine6e4332c2024-01-04 16:42:40 +01001213
1214/* End of automatically generated file. */