blob: 86900bcfbb434187b006d9c3ed6f75b08dbfff30 [file] [log] [blame]
Gilles Peskined5e5e6d2024-01-04 16:42:40 +01001/* Automatically generated by generate_psa_wrappers.py, do not edit! */
2
3/* Copyright The Mbed TLS Contributors
4 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
5 */
6
7#if !defined(MBEDTLS_CONFIG_FILE)
8#include "mbedtls/config.h"
9#else
10#include MBEDTLS_CONFIG_FILE
11#endif
12
13#if defined(MBEDTLS_PSA_CRYPTO_C) && defined(MBEDTLS_TEST_HOOKS)
14
15#include <psa/crypto.h>
16
17#include <test/psa_crypto_helpers.h>
18#include <test/psa_test_wrappers.h>
19
20/* Wrapper for mbedtls_psa_inject_entropy */
21#if defined(MBEDTLS_PSA_INJECT_ENTROPY)
22psa_status_t mbedtls_test_wrap_mbedtls_psa_inject_entropy(
23 const uint8_t *arg0_seed,
24 size_t arg1_seed_size)
25{
26 psa_status_t status = (mbedtls_psa_inject_entropy)(arg0_seed, arg1_seed_size);
27 return status;
28}
29#endif /* defined(MBEDTLS_PSA_INJECT_ENTROPY) */
30
31/* Wrapper for mbedtls_psa_platform_get_builtin_key */
32#if defined(MBEDTLS_PSA_CRYPTO_BUILTIN_KEYS)
33psa_status_t mbedtls_test_wrap_mbedtls_psa_platform_get_builtin_key(
34 mbedtls_svc_key_id_t arg0_key_id,
35 psa_key_lifetime_t *arg1_lifetime,
36 psa_drv_slot_number_t *arg2_slot_number)
37{
38 psa_status_t status = (mbedtls_psa_platform_get_builtin_key)(arg0_key_id, arg1_lifetime, arg2_slot_number);
39 return status;
40}
41#endif /* defined(MBEDTLS_PSA_CRYPTO_BUILTIN_KEYS) */
42
43/* Wrapper for mbedtls_psa_register_se_key */
44#if defined(MBEDTLS_PSA_CRYPTO_SE_C)
45psa_status_t mbedtls_test_wrap_mbedtls_psa_register_se_key(
46 const psa_key_attributes_t *arg0_attributes)
47{
48 psa_status_t status = (mbedtls_psa_register_se_key)(arg0_attributes);
49 return status;
50}
51#endif /* defined(MBEDTLS_PSA_CRYPTO_SE_C) */
52
53/* Wrapper for psa_aead_decrypt */
54psa_status_t mbedtls_test_wrap_psa_aead_decrypt(
55 mbedtls_svc_key_id_t arg0_key,
56 psa_algorithm_t arg1_alg,
57 const uint8_t *arg2_nonce,
58 size_t arg3_nonce_length,
59 const uint8_t *arg4_additional_data,
60 size_t arg5_additional_data_length,
61 const uint8_t *arg6_ciphertext,
62 size_t arg7_ciphertext_length,
63 uint8_t *arg8_plaintext,
64 size_t arg9_plaintext_size,
65 size_t *arg10_plaintext_length)
66{
67 psa_status_t status = (psa_aead_decrypt)(arg0_key, arg1_alg, arg2_nonce, arg3_nonce_length, arg4_additional_data, arg5_additional_data_length, arg6_ciphertext, arg7_ciphertext_length, arg8_plaintext, arg9_plaintext_size, arg10_plaintext_length);
68 return status;
69}
70
71/* Wrapper for psa_aead_encrypt */
72psa_status_t mbedtls_test_wrap_psa_aead_encrypt(
73 mbedtls_svc_key_id_t arg0_key,
74 psa_algorithm_t arg1_alg,
75 const uint8_t *arg2_nonce,
76 size_t arg3_nonce_length,
77 const uint8_t *arg4_additional_data,
78 size_t arg5_additional_data_length,
79 const uint8_t *arg6_plaintext,
80 size_t arg7_plaintext_length,
81 uint8_t *arg8_ciphertext,
82 size_t arg9_ciphertext_size,
83 size_t *arg10_ciphertext_length)
84{
85 psa_status_t status = (psa_aead_encrypt)(arg0_key, arg1_alg, arg2_nonce, arg3_nonce_length, arg4_additional_data, arg5_additional_data_length, arg6_plaintext, arg7_plaintext_length, arg8_ciphertext, arg9_ciphertext_size, arg10_ciphertext_length);
86 return status;
87}
88
89/* Wrapper for psa_asymmetric_decrypt */
90psa_status_t mbedtls_test_wrap_psa_asymmetric_decrypt(
91 mbedtls_svc_key_id_t arg0_key,
92 psa_algorithm_t arg1_alg,
93 const uint8_t *arg2_input,
94 size_t arg3_input_length,
95 const uint8_t *arg4_salt,
96 size_t arg5_salt_length,
97 uint8_t *arg6_output,
98 size_t arg7_output_size,
99 size_t *arg8_output_length)
100{
101 psa_status_t status = (psa_asymmetric_decrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_salt, arg5_salt_length, arg6_output, arg7_output_size, arg8_output_length);
102 return status;
103}
104
105/* Wrapper for psa_asymmetric_encrypt */
106psa_status_t mbedtls_test_wrap_psa_asymmetric_encrypt(
107 mbedtls_svc_key_id_t arg0_key,
108 psa_algorithm_t arg1_alg,
109 const uint8_t *arg2_input,
110 size_t arg3_input_length,
111 const uint8_t *arg4_salt,
112 size_t arg5_salt_length,
113 uint8_t *arg6_output,
114 size_t arg7_output_size,
115 size_t *arg8_output_length)
116{
117 psa_status_t status = (psa_asymmetric_encrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_salt, arg5_salt_length, arg6_output, arg7_output_size, arg8_output_length);
118 return status;
119}
120
121/* Wrapper for psa_cipher_abort */
122psa_status_t mbedtls_test_wrap_psa_cipher_abort(
123 psa_cipher_operation_t *arg0_operation)
124{
125 psa_status_t status = (psa_cipher_abort)(arg0_operation);
126 return status;
127}
128
129/* Wrapper for psa_cipher_decrypt */
130psa_status_t mbedtls_test_wrap_psa_cipher_decrypt(
131 mbedtls_svc_key_id_t arg0_key,
132 psa_algorithm_t arg1_alg,
133 const uint8_t *arg2_input,
134 size_t arg3_input_length,
135 uint8_t *arg4_output,
136 size_t arg5_output_size,
137 size_t *arg6_output_length)
138{
139 psa_status_t status = (psa_cipher_decrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_output, arg5_output_size, arg6_output_length);
140 return status;
141}
142
143/* Wrapper for psa_cipher_decrypt_setup */
144psa_status_t mbedtls_test_wrap_psa_cipher_decrypt_setup(
145 psa_cipher_operation_t *arg0_operation,
146 mbedtls_svc_key_id_t arg1_key,
147 psa_algorithm_t arg2_alg)
148{
149 psa_status_t status = (psa_cipher_decrypt_setup)(arg0_operation, arg1_key, arg2_alg);
150 return status;
151}
152
153/* Wrapper for psa_cipher_encrypt */
154psa_status_t mbedtls_test_wrap_psa_cipher_encrypt(
155 mbedtls_svc_key_id_t arg0_key,
156 psa_algorithm_t arg1_alg,
157 const uint8_t *arg2_input,
158 size_t arg3_input_length,
159 uint8_t *arg4_output,
160 size_t arg5_output_size,
161 size_t *arg6_output_length)
162{
163 psa_status_t status = (psa_cipher_encrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_output, arg5_output_size, arg6_output_length);
164 return status;
165}
166
167/* Wrapper for psa_cipher_encrypt_setup */
168psa_status_t mbedtls_test_wrap_psa_cipher_encrypt_setup(
169 psa_cipher_operation_t *arg0_operation,
170 mbedtls_svc_key_id_t arg1_key,
171 psa_algorithm_t arg2_alg)
172{
173 psa_status_t status = (psa_cipher_encrypt_setup)(arg0_operation, arg1_key, arg2_alg);
174 return status;
175}
176
177/* Wrapper for psa_cipher_finish */
178psa_status_t mbedtls_test_wrap_psa_cipher_finish(
179 psa_cipher_operation_t *arg0_operation,
180 uint8_t *arg1_output,
181 size_t arg2_output_size,
182 size_t *arg3_output_length)
183{
184 psa_status_t status = (psa_cipher_finish)(arg0_operation, arg1_output, arg2_output_size, arg3_output_length);
185 return status;
186}
187
188/* Wrapper for psa_cipher_generate_iv */
189psa_status_t mbedtls_test_wrap_psa_cipher_generate_iv(
190 psa_cipher_operation_t *arg0_operation,
191 uint8_t *arg1_iv,
192 size_t arg2_iv_size,
193 size_t *arg3_iv_length)
194{
195 psa_status_t status = (psa_cipher_generate_iv)(arg0_operation, arg1_iv, arg2_iv_size, arg3_iv_length);
196 return status;
197}
198
199/* Wrapper for psa_cipher_set_iv */
200psa_status_t mbedtls_test_wrap_psa_cipher_set_iv(
201 psa_cipher_operation_t *arg0_operation,
202 const uint8_t *arg1_iv,
203 size_t arg2_iv_length)
204{
205 psa_status_t status = (psa_cipher_set_iv)(arg0_operation, arg1_iv, arg2_iv_length);
206 return status;
207}
208
209/* Wrapper for psa_cipher_update */
210psa_status_t mbedtls_test_wrap_psa_cipher_update(
211 psa_cipher_operation_t *arg0_operation,
212 const uint8_t *arg1_input,
213 size_t arg2_input_length,
214 uint8_t *arg3_output,
215 size_t arg4_output_size,
216 size_t *arg5_output_length)
217{
218 psa_status_t status = (psa_cipher_update)(arg0_operation, arg1_input, arg2_input_length, arg3_output, arg4_output_size, arg5_output_length);
219 return status;
220}
221
222/* Wrapper for psa_copy_key */
223psa_status_t mbedtls_test_wrap_psa_copy_key(
224 mbedtls_svc_key_id_t arg0_source_key,
225 const psa_key_attributes_t *arg1_attributes,
226 mbedtls_svc_key_id_t *arg2_target_key)
227{
228 psa_status_t status = (psa_copy_key)(arg0_source_key, arg1_attributes, arg2_target_key);
229 return status;
230}
231
232/* Wrapper for psa_crypto_init */
233psa_status_t mbedtls_test_wrap_psa_crypto_init(void)
234{
235 psa_status_t status = (psa_crypto_init)();
236 return status;
237}
238
239/* Wrapper for psa_destroy_key */
240psa_status_t mbedtls_test_wrap_psa_destroy_key(
241 mbedtls_svc_key_id_t arg0_key)
242{
243 psa_status_t status = (psa_destroy_key)(arg0_key);
244 return status;
245}
246
247/* Wrapper for psa_export_key */
248psa_status_t mbedtls_test_wrap_psa_export_key(
249 mbedtls_svc_key_id_t arg0_key,
250 uint8_t *arg1_data,
251 size_t arg2_data_size,
252 size_t *arg3_data_length)
253{
254 psa_status_t status = (psa_export_key)(arg0_key, arg1_data, arg2_data_size, arg3_data_length);
255 return status;
256}
257
258/* Wrapper for psa_export_public_key */
259psa_status_t mbedtls_test_wrap_psa_export_public_key(
260 mbedtls_svc_key_id_t arg0_key,
261 uint8_t *arg1_data,
262 size_t arg2_data_size,
263 size_t *arg3_data_length)
264{
265 psa_status_t status = (psa_export_public_key)(arg0_key, arg1_data, arg2_data_size, arg3_data_length);
266 return status;
267}
268
269/* Wrapper for psa_generate_key */
270psa_status_t mbedtls_test_wrap_psa_generate_key(
271 const psa_key_attributes_t *arg0_attributes,
272 mbedtls_svc_key_id_t *arg1_key)
273{
274 psa_status_t status = (psa_generate_key)(arg0_attributes, arg1_key);
275 return status;
276}
277
278/* Wrapper for psa_generate_random */
279psa_status_t mbedtls_test_wrap_psa_generate_random(
280 uint8_t *arg0_output,
281 size_t arg1_output_size)
282{
283 psa_status_t status = (psa_generate_random)(arg0_output, arg1_output_size);
284 return status;
285}
286
287/* Wrapper for psa_get_key_attributes */
288psa_status_t mbedtls_test_wrap_psa_get_key_attributes(
289 mbedtls_svc_key_id_t arg0_key,
290 psa_key_attributes_t *arg1_attributes)
291{
292 psa_status_t status = (psa_get_key_attributes)(arg0_key, arg1_attributes);
293 return status;
294}
295
296/* Wrapper for psa_hash_abort */
297psa_status_t mbedtls_test_wrap_psa_hash_abort(
298 psa_hash_operation_t *arg0_operation)
299{
300 psa_status_t status = (psa_hash_abort)(arg0_operation);
301 return status;
302}
303
304/* Wrapper for psa_hash_clone */
305psa_status_t mbedtls_test_wrap_psa_hash_clone(
306 const psa_hash_operation_t *arg0_source_operation,
307 psa_hash_operation_t *arg1_target_operation)
308{
309 psa_status_t status = (psa_hash_clone)(arg0_source_operation, arg1_target_operation);
310 return status;
311}
312
313/* Wrapper for psa_hash_compare */
314psa_status_t mbedtls_test_wrap_psa_hash_compare(
315 psa_algorithm_t arg0_alg,
316 const uint8_t *arg1_input,
317 size_t arg2_input_length,
318 const uint8_t *arg3_hash,
319 size_t arg4_hash_length)
320{
321 psa_status_t status = (psa_hash_compare)(arg0_alg, arg1_input, arg2_input_length, arg3_hash, arg4_hash_length);
322 return status;
323}
324
325/* Wrapper for psa_hash_compute */
326psa_status_t mbedtls_test_wrap_psa_hash_compute(
327 psa_algorithm_t arg0_alg,
328 const uint8_t *arg1_input,
329 size_t arg2_input_length,
330 uint8_t *arg3_hash,
331 size_t arg4_hash_size,
332 size_t *arg5_hash_length)
333{
334 psa_status_t status = (psa_hash_compute)(arg0_alg, arg1_input, arg2_input_length, arg3_hash, arg4_hash_size, arg5_hash_length);
335 return status;
336}
337
338/* Wrapper for psa_hash_finish */
339psa_status_t mbedtls_test_wrap_psa_hash_finish(
340 psa_hash_operation_t *arg0_operation,
341 uint8_t *arg1_hash,
342 size_t arg2_hash_size,
343 size_t *arg3_hash_length)
344{
345 psa_status_t status = (psa_hash_finish)(arg0_operation, arg1_hash, arg2_hash_size, arg3_hash_length);
346 return status;
347}
348
349/* Wrapper for psa_hash_setup */
350psa_status_t mbedtls_test_wrap_psa_hash_setup(
351 psa_hash_operation_t *arg0_operation,
352 psa_algorithm_t arg1_alg)
353{
354 psa_status_t status = (psa_hash_setup)(arg0_operation, arg1_alg);
355 return status;
356}
357
358/* Wrapper for psa_hash_update */
359psa_status_t mbedtls_test_wrap_psa_hash_update(
360 psa_hash_operation_t *arg0_operation,
361 const uint8_t *arg1_input,
362 size_t arg2_input_length)
363{
364 psa_status_t status = (psa_hash_update)(arg0_operation, arg1_input, arg2_input_length);
365 return status;
366}
367
368/* Wrapper for psa_hash_verify */
369psa_status_t mbedtls_test_wrap_psa_hash_verify(
370 psa_hash_operation_t *arg0_operation,
371 const uint8_t *arg1_hash,
372 size_t arg2_hash_length)
373{
374 psa_status_t status = (psa_hash_verify)(arg0_operation, arg1_hash, arg2_hash_length);
375 return status;
376}
377
378/* Wrapper for psa_import_key */
379psa_status_t mbedtls_test_wrap_psa_import_key(
380 const psa_key_attributes_t *arg0_attributes,
381 const uint8_t *arg1_data,
382 size_t arg2_data_length,
383 mbedtls_svc_key_id_t *arg3_key)
384{
385 psa_status_t status = (psa_import_key)(arg0_attributes, arg1_data, arg2_data_length, arg3_key);
386 return status;
387}
388
389/* Wrapper for psa_key_derivation_abort */
390psa_status_t mbedtls_test_wrap_psa_key_derivation_abort(
391 psa_key_derivation_operation_t *arg0_operation)
392{
393 psa_status_t status = (psa_key_derivation_abort)(arg0_operation);
394 return status;
395}
396
397/* Wrapper for psa_key_derivation_get_capacity */
398psa_status_t mbedtls_test_wrap_psa_key_derivation_get_capacity(
399 const psa_key_derivation_operation_t *arg0_operation,
400 size_t *arg1_capacity)
401{
402 psa_status_t status = (psa_key_derivation_get_capacity)(arg0_operation, arg1_capacity);
403 return status;
404}
405
406/* Wrapper for psa_key_derivation_input_bytes */
407psa_status_t mbedtls_test_wrap_psa_key_derivation_input_bytes(
408 psa_key_derivation_operation_t *arg0_operation,
409 psa_key_derivation_step_t arg1_step,
410 const uint8_t *arg2_data,
411 size_t arg3_data_length)
412{
413 psa_status_t status = (psa_key_derivation_input_bytes)(arg0_operation, arg1_step, arg2_data, arg3_data_length);
414 return status;
415}
416
417/* Wrapper for psa_key_derivation_input_key */
418psa_status_t mbedtls_test_wrap_psa_key_derivation_input_key(
419 psa_key_derivation_operation_t *arg0_operation,
420 psa_key_derivation_step_t arg1_step,
421 mbedtls_svc_key_id_t arg2_key)
422{
423 psa_status_t status = (psa_key_derivation_input_key)(arg0_operation, arg1_step, arg2_key);
424 return status;
425}
426
427/* Wrapper for psa_key_derivation_key_agreement */
428psa_status_t mbedtls_test_wrap_psa_key_derivation_key_agreement(
429 psa_key_derivation_operation_t *arg0_operation,
430 psa_key_derivation_step_t arg1_step,
431 mbedtls_svc_key_id_t arg2_private_key,
432 const uint8_t *arg3_peer_key,
433 size_t arg4_peer_key_length)
434{
435 psa_status_t status = (psa_key_derivation_key_agreement)(arg0_operation, arg1_step, arg2_private_key, arg3_peer_key, arg4_peer_key_length);
436 return status;
437}
438
439/* Wrapper for psa_key_derivation_output_bytes */
440psa_status_t mbedtls_test_wrap_psa_key_derivation_output_bytes(
441 psa_key_derivation_operation_t *arg0_operation,
442 uint8_t *arg1_output,
443 size_t arg2_output_length)
444{
445 psa_status_t status = (psa_key_derivation_output_bytes)(arg0_operation, arg1_output, arg2_output_length);
446 return status;
447}
448
449/* Wrapper for psa_key_derivation_output_key */
450psa_status_t mbedtls_test_wrap_psa_key_derivation_output_key(
451 const psa_key_attributes_t *arg0_attributes,
452 psa_key_derivation_operation_t *arg1_operation,
453 mbedtls_svc_key_id_t *arg2_key)
454{
455 psa_status_t status = (psa_key_derivation_output_key)(arg0_attributes, arg1_operation, arg2_key);
456 return status;
457}
458
459/* Wrapper for psa_key_derivation_set_capacity */
460psa_status_t mbedtls_test_wrap_psa_key_derivation_set_capacity(
461 psa_key_derivation_operation_t *arg0_operation,
462 size_t arg1_capacity)
463{
464 psa_status_t status = (psa_key_derivation_set_capacity)(arg0_operation, arg1_capacity);
465 return status;
466}
467
468/* Wrapper for psa_key_derivation_setup */
469psa_status_t mbedtls_test_wrap_psa_key_derivation_setup(
470 psa_key_derivation_operation_t *arg0_operation,
471 psa_algorithm_t arg1_alg)
472{
473 psa_status_t status = (psa_key_derivation_setup)(arg0_operation, arg1_alg);
474 return status;
475}
476
477/* Wrapper for psa_mac_abort */
478psa_status_t mbedtls_test_wrap_psa_mac_abort(
479 psa_mac_operation_t *arg0_operation)
480{
481 psa_status_t status = (psa_mac_abort)(arg0_operation);
482 return status;
483}
484
485/* Wrapper for psa_mac_compute */
486psa_status_t mbedtls_test_wrap_psa_mac_compute(
487 mbedtls_svc_key_id_t arg0_key,
488 psa_algorithm_t arg1_alg,
489 const uint8_t *arg2_input,
490 size_t arg3_input_length,
491 uint8_t *arg4_mac,
492 size_t arg5_mac_size,
493 size_t *arg6_mac_length)
494{
495 psa_status_t status = (psa_mac_compute)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_mac, arg5_mac_size, arg6_mac_length);
496 return status;
497}
498
499/* Wrapper for psa_mac_sign_finish */
500psa_status_t mbedtls_test_wrap_psa_mac_sign_finish(
501 psa_mac_operation_t *arg0_operation,
502 uint8_t *arg1_mac,
503 size_t arg2_mac_size,
504 size_t *arg3_mac_length)
505{
506 psa_status_t status = (psa_mac_sign_finish)(arg0_operation, arg1_mac, arg2_mac_size, arg3_mac_length);
507 return status;
508}
509
510/* Wrapper for psa_mac_sign_setup */
511psa_status_t mbedtls_test_wrap_psa_mac_sign_setup(
512 psa_mac_operation_t *arg0_operation,
513 mbedtls_svc_key_id_t arg1_key,
514 psa_algorithm_t arg2_alg)
515{
516 psa_status_t status = (psa_mac_sign_setup)(arg0_operation, arg1_key, arg2_alg);
517 return status;
518}
519
520/* Wrapper for psa_mac_update */
521psa_status_t mbedtls_test_wrap_psa_mac_update(
522 psa_mac_operation_t *arg0_operation,
523 const uint8_t *arg1_input,
524 size_t arg2_input_length)
525{
526 psa_status_t status = (psa_mac_update)(arg0_operation, arg1_input, arg2_input_length);
527 return status;
528}
529
530/* Wrapper for psa_mac_verify */
531psa_status_t mbedtls_test_wrap_psa_mac_verify(
532 mbedtls_svc_key_id_t arg0_key,
533 psa_algorithm_t arg1_alg,
534 const uint8_t *arg2_input,
535 size_t arg3_input_length,
536 const uint8_t *arg4_mac,
537 size_t arg5_mac_length)
538{
539 psa_status_t status = (psa_mac_verify)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_mac, arg5_mac_length);
540 return status;
541}
542
543/* Wrapper for psa_mac_verify_finish */
544psa_status_t mbedtls_test_wrap_psa_mac_verify_finish(
545 psa_mac_operation_t *arg0_operation,
546 const uint8_t *arg1_mac,
547 size_t arg2_mac_length)
548{
549 psa_status_t status = (psa_mac_verify_finish)(arg0_operation, arg1_mac, arg2_mac_length);
550 return status;
551}
552
553/* Wrapper for psa_mac_verify_setup */
554psa_status_t mbedtls_test_wrap_psa_mac_verify_setup(
555 psa_mac_operation_t *arg0_operation,
556 mbedtls_svc_key_id_t arg1_key,
557 psa_algorithm_t arg2_alg)
558{
559 psa_status_t status = (psa_mac_verify_setup)(arg0_operation, arg1_key, arg2_alg);
560 return status;
561}
562
563/* Wrapper for psa_purge_key */
564psa_status_t mbedtls_test_wrap_psa_purge_key(
565 mbedtls_svc_key_id_t arg0_key)
566{
567 psa_status_t status = (psa_purge_key)(arg0_key);
568 return status;
569}
570
571/* Wrapper for psa_raw_key_agreement */
572psa_status_t mbedtls_test_wrap_psa_raw_key_agreement(
573 psa_algorithm_t arg0_alg,
574 mbedtls_svc_key_id_t arg1_private_key,
575 const uint8_t *arg2_peer_key,
576 size_t arg3_peer_key_length,
577 uint8_t *arg4_output,
578 size_t arg5_output_size,
579 size_t *arg6_output_length)
580{
581 psa_status_t status = (psa_raw_key_agreement)(arg0_alg, arg1_private_key, arg2_peer_key, arg3_peer_key_length, arg4_output, arg5_output_size, arg6_output_length);
582 return status;
583}
584
585/* Wrapper for psa_sign_hash */
586psa_status_t mbedtls_test_wrap_psa_sign_hash(
587 mbedtls_svc_key_id_t arg0_key,
588 psa_algorithm_t arg1_alg,
589 const uint8_t *arg2_hash,
590 size_t arg3_hash_length,
591 uint8_t *arg4_signature,
592 size_t arg5_signature_size,
593 size_t *arg6_signature_length)
594{
595 psa_status_t status = (psa_sign_hash)(arg0_key, arg1_alg, arg2_hash, arg3_hash_length, arg4_signature, arg5_signature_size, arg6_signature_length);
596 return status;
597}
598
599/* Wrapper for psa_sign_message */
600psa_status_t mbedtls_test_wrap_psa_sign_message(
601 mbedtls_svc_key_id_t arg0_key,
602 psa_algorithm_t arg1_alg,
603 const uint8_t *arg2_input,
604 size_t arg3_input_length,
605 uint8_t *arg4_signature,
606 size_t arg5_signature_size,
607 size_t *arg6_signature_length)
608{
609 psa_status_t status = (psa_sign_message)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_signature, arg5_signature_size, arg6_signature_length);
610 return status;
611}
612
613/* Wrapper for psa_verify_hash */
614psa_status_t mbedtls_test_wrap_psa_verify_hash(
615 mbedtls_svc_key_id_t arg0_key,
616 psa_algorithm_t arg1_alg,
617 const uint8_t *arg2_hash,
618 size_t arg3_hash_length,
619 const uint8_t *arg4_signature,
620 size_t arg5_signature_length)
621{
622 psa_status_t status = (psa_verify_hash)(arg0_key, arg1_alg, arg2_hash, arg3_hash_length, arg4_signature, arg5_signature_length);
623 return status;
624}
625
626/* Wrapper for psa_verify_message */
627psa_status_t mbedtls_test_wrap_psa_verify_message(
628 mbedtls_svc_key_id_t arg0_key,
629 psa_algorithm_t arg1_alg,
630 const uint8_t *arg2_input,
631 size_t arg3_input_length,
632 const uint8_t *arg4_signature,
633 size_t arg5_signature_length)
634{
635 psa_status_t status = (psa_verify_message)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_signature, arg5_signature_length);
636 return status;
637}
638
639#endif /* defined(MBEDTLS_PSA_CRYPTO_C) && defined(MBEDTLS_TEST_HOOKS) */
640
641/* End of automatically generated file. */