blob: dbe8b25050df7882d58a3807507b71d23e796bb4 [file] [log] [blame]
Gilles Peskined5e5e6d2024-01-04 16:42:40 +01001/* Automatically generated by generate_psa_wrappers.py, do not edit! */
2
3/* Copyright The Mbed TLS Contributors
4 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
5 */
6
7#if !defined(MBEDTLS_CONFIG_FILE)
8#include "mbedtls/config.h"
9#else
10#include MBEDTLS_CONFIG_FILE
11#endif
12
Gilles Peskinea980aa02024-01-04 20:51:38 +010013#if defined(MBEDTLS_PSA_CRYPTO_C) && defined(MBEDTLS_TEST_HOOKS) && \
14 !defined(RECORD_PSA_STATUS_COVERAGE_LOG)
Gilles Peskined5e5e6d2024-01-04 16:42:40 +010015
16#include <psa/crypto.h>
17
Gilles Peskine42fa8ea2024-01-04 16:59:28 +010018#include <test/memory.h>
Gilles Peskined5e5e6d2024-01-04 16:42:40 +010019#include <test/psa_crypto_helpers.h>
20#include <test/psa_test_wrappers.h>
21
22/* Wrapper for mbedtls_psa_inject_entropy */
23#if defined(MBEDTLS_PSA_INJECT_ENTROPY)
24psa_status_t mbedtls_test_wrap_mbedtls_psa_inject_entropy(
25 const uint8_t *arg0_seed,
26 size_t arg1_seed_size)
27{
28 psa_status_t status = (mbedtls_psa_inject_entropy)(arg0_seed, arg1_seed_size);
29 return status;
30}
31#endif /* defined(MBEDTLS_PSA_INJECT_ENTROPY) */
32
33/* Wrapper for mbedtls_psa_platform_get_builtin_key */
34#if defined(MBEDTLS_PSA_CRYPTO_BUILTIN_KEYS)
35psa_status_t mbedtls_test_wrap_mbedtls_psa_platform_get_builtin_key(
36 mbedtls_svc_key_id_t arg0_key_id,
37 psa_key_lifetime_t *arg1_lifetime,
38 psa_drv_slot_number_t *arg2_slot_number)
39{
40 psa_status_t status = (mbedtls_psa_platform_get_builtin_key)(arg0_key_id, arg1_lifetime, arg2_slot_number);
41 return status;
42}
43#endif /* defined(MBEDTLS_PSA_CRYPTO_BUILTIN_KEYS) */
44
45/* Wrapper for mbedtls_psa_register_se_key */
46#if defined(MBEDTLS_PSA_CRYPTO_SE_C)
47psa_status_t mbedtls_test_wrap_mbedtls_psa_register_se_key(
48 const psa_key_attributes_t *arg0_attributes)
49{
50 psa_status_t status = (mbedtls_psa_register_se_key)(arg0_attributes);
51 return status;
52}
53#endif /* defined(MBEDTLS_PSA_CRYPTO_SE_C) */
54
55/* Wrapper for psa_aead_decrypt */
56psa_status_t mbedtls_test_wrap_psa_aead_decrypt(
57 mbedtls_svc_key_id_t arg0_key,
58 psa_algorithm_t arg1_alg,
59 const uint8_t *arg2_nonce,
60 size_t arg3_nonce_length,
61 const uint8_t *arg4_additional_data,
62 size_t arg5_additional_data_length,
63 const uint8_t *arg6_ciphertext,
64 size_t arg7_ciphertext_length,
65 uint8_t *arg8_plaintext,
66 size_t arg9_plaintext_size,
67 size_t *arg10_plaintext_length)
68{
69 psa_status_t status = (psa_aead_decrypt)(arg0_key, arg1_alg, arg2_nonce, arg3_nonce_length, arg4_additional_data, arg5_additional_data_length, arg6_ciphertext, arg7_ciphertext_length, arg8_plaintext, arg9_plaintext_size, arg10_plaintext_length);
70 return status;
71}
72
73/* Wrapper for psa_aead_encrypt */
74psa_status_t mbedtls_test_wrap_psa_aead_encrypt(
75 mbedtls_svc_key_id_t arg0_key,
76 psa_algorithm_t arg1_alg,
77 const uint8_t *arg2_nonce,
78 size_t arg3_nonce_length,
79 const uint8_t *arg4_additional_data,
80 size_t arg5_additional_data_length,
81 const uint8_t *arg6_plaintext,
82 size_t arg7_plaintext_length,
83 uint8_t *arg8_ciphertext,
84 size_t arg9_ciphertext_size,
85 size_t *arg10_ciphertext_length)
86{
87 psa_status_t status = (psa_aead_encrypt)(arg0_key, arg1_alg, arg2_nonce, arg3_nonce_length, arg4_additional_data, arg5_additional_data_length, arg6_plaintext, arg7_plaintext_length, arg8_ciphertext, arg9_ciphertext_size, arg10_ciphertext_length);
88 return status;
89}
90
91/* Wrapper for psa_asymmetric_decrypt */
92psa_status_t mbedtls_test_wrap_psa_asymmetric_decrypt(
93 mbedtls_svc_key_id_t arg0_key,
94 psa_algorithm_t arg1_alg,
95 const uint8_t *arg2_input,
96 size_t arg3_input_length,
97 const uint8_t *arg4_salt,
98 size_t arg5_salt_length,
99 uint8_t *arg6_output,
100 size_t arg7_output_size,
101 size_t *arg8_output_length)
102{
103 psa_status_t status = (psa_asymmetric_decrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_salt, arg5_salt_length, arg6_output, arg7_output_size, arg8_output_length);
104 return status;
105}
106
107/* Wrapper for psa_asymmetric_encrypt */
108psa_status_t mbedtls_test_wrap_psa_asymmetric_encrypt(
109 mbedtls_svc_key_id_t arg0_key,
110 psa_algorithm_t arg1_alg,
111 const uint8_t *arg2_input,
112 size_t arg3_input_length,
113 const uint8_t *arg4_salt,
114 size_t arg5_salt_length,
115 uint8_t *arg6_output,
116 size_t arg7_output_size,
117 size_t *arg8_output_length)
118{
119 psa_status_t status = (psa_asymmetric_encrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_salt, arg5_salt_length, arg6_output, arg7_output_size, arg8_output_length);
120 return status;
121}
122
123/* Wrapper for psa_cipher_abort */
124psa_status_t mbedtls_test_wrap_psa_cipher_abort(
125 psa_cipher_operation_t *arg0_operation)
126{
127 psa_status_t status = (psa_cipher_abort)(arg0_operation);
128 return status;
129}
130
131/* Wrapper for psa_cipher_decrypt */
132psa_status_t mbedtls_test_wrap_psa_cipher_decrypt(
133 mbedtls_svc_key_id_t arg0_key,
134 psa_algorithm_t arg1_alg,
135 const uint8_t *arg2_input,
136 size_t arg3_input_length,
137 uint8_t *arg4_output,
138 size_t arg5_output_size,
139 size_t *arg6_output_length)
140{
141 psa_status_t status = (psa_cipher_decrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_output, arg5_output_size, arg6_output_length);
142 return status;
143}
144
145/* Wrapper for psa_cipher_decrypt_setup */
146psa_status_t mbedtls_test_wrap_psa_cipher_decrypt_setup(
147 psa_cipher_operation_t *arg0_operation,
148 mbedtls_svc_key_id_t arg1_key,
149 psa_algorithm_t arg2_alg)
150{
151 psa_status_t status = (psa_cipher_decrypt_setup)(arg0_operation, arg1_key, arg2_alg);
152 return status;
153}
154
155/* Wrapper for psa_cipher_encrypt */
156psa_status_t mbedtls_test_wrap_psa_cipher_encrypt(
157 mbedtls_svc_key_id_t arg0_key,
158 psa_algorithm_t arg1_alg,
159 const uint8_t *arg2_input,
160 size_t arg3_input_length,
161 uint8_t *arg4_output,
162 size_t arg5_output_size,
163 size_t *arg6_output_length)
164{
165 psa_status_t status = (psa_cipher_encrypt)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_output, arg5_output_size, arg6_output_length);
Gilles Peskined5e5e6d2024-01-04 16:42:40 +0100166 return status;
167}
168
169/* Wrapper for psa_cipher_encrypt_setup */
170psa_status_t mbedtls_test_wrap_psa_cipher_encrypt_setup(
171 psa_cipher_operation_t *arg0_operation,
172 mbedtls_svc_key_id_t arg1_key,
173 psa_algorithm_t arg2_alg)
174{
175 psa_status_t status = (psa_cipher_encrypt_setup)(arg0_operation, arg1_key, arg2_alg);
176 return status;
177}
178
179/* Wrapper for psa_cipher_finish */
180psa_status_t mbedtls_test_wrap_psa_cipher_finish(
181 psa_cipher_operation_t *arg0_operation,
182 uint8_t *arg1_output,
183 size_t arg2_output_size,
184 size_t *arg3_output_length)
185{
186 psa_status_t status = (psa_cipher_finish)(arg0_operation, arg1_output, arg2_output_size, arg3_output_length);
187 return status;
188}
189
190/* Wrapper for psa_cipher_generate_iv */
191psa_status_t mbedtls_test_wrap_psa_cipher_generate_iv(
192 psa_cipher_operation_t *arg0_operation,
193 uint8_t *arg1_iv,
194 size_t arg2_iv_size,
195 size_t *arg3_iv_length)
196{
197 psa_status_t status = (psa_cipher_generate_iv)(arg0_operation, arg1_iv, arg2_iv_size, arg3_iv_length);
198 return status;
199}
200
201/* Wrapper for psa_cipher_set_iv */
202psa_status_t mbedtls_test_wrap_psa_cipher_set_iv(
203 psa_cipher_operation_t *arg0_operation,
204 const uint8_t *arg1_iv,
205 size_t arg2_iv_length)
206{
207 psa_status_t status = (psa_cipher_set_iv)(arg0_operation, arg1_iv, arg2_iv_length);
208 return status;
209}
210
211/* Wrapper for psa_cipher_update */
212psa_status_t mbedtls_test_wrap_psa_cipher_update(
213 psa_cipher_operation_t *arg0_operation,
214 const uint8_t *arg1_input,
215 size_t arg2_input_length,
216 uint8_t *arg3_output,
217 size_t arg4_output_size,
218 size_t *arg5_output_length)
219{
220 psa_status_t status = (psa_cipher_update)(arg0_operation, arg1_input, arg2_input_length, arg3_output, arg4_output_size, arg5_output_length);
221 return status;
222}
223
224/* Wrapper for psa_copy_key */
225psa_status_t mbedtls_test_wrap_psa_copy_key(
226 mbedtls_svc_key_id_t arg0_source_key,
227 const psa_key_attributes_t *arg1_attributes,
228 mbedtls_svc_key_id_t *arg2_target_key)
229{
230 psa_status_t status = (psa_copy_key)(arg0_source_key, arg1_attributes, arg2_target_key);
231 return status;
232}
233
234/* Wrapper for psa_crypto_init */
235psa_status_t mbedtls_test_wrap_psa_crypto_init(void)
236{
237 psa_status_t status = (psa_crypto_init)();
238 return status;
239}
240
241/* Wrapper for psa_destroy_key */
242psa_status_t mbedtls_test_wrap_psa_destroy_key(
243 mbedtls_svc_key_id_t arg0_key)
244{
245 psa_status_t status = (psa_destroy_key)(arg0_key);
246 return status;
247}
248
249/* Wrapper for psa_export_key */
250psa_status_t mbedtls_test_wrap_psa_export_key(
251 mbedtls_svc_key_id_t arg0_key,
252 uint8_t *arg1_data,
253 size_t arg2_data_size,
254 size_t *arg3_data_length)
255{
Ryan Everettdcbc1d32024-01-25 11:04:48 +0000256#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
257 MBEDTLS_TEST_MEMORY_POISON(arg1_data, arg2_data_size);
258#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskined5e5e6d2024-01-04 16:42:40 +0100259 psa_status_t status = (psa_export_key)(arg0_key, arg1_data, arg2_data_size, arg3_data_length);
Ryan Everettdcbc1d32024-01-25 11:04:48 +0000260#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
261 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_data, arg2_data_size);
262#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskined5e5e6d2024-01-04 16:42:40 +0100263 return status;
264}
265
266/* Wrapper for psa_export_public_key */
267psa_status_t mbedtls_test_wrap_psa_export_public_key(
268 mbedtls_svc_key_id_t arg0_key,
269 uint8_t *arg1_data,
270 size_t arg2_data_size,
271 size_t *arg3_data_length)
272{
Ryan Everettdcbc1d32024-01-25 11:04:48 +0000273#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
274 MBEDTLS_TEST_MEMORY_POISON(arg1_data, arg2_data_size);
275#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskined5e5e6d2024-01-04 16:42:40 +0100276 psa_status_t status = (psa_export_public_key)(arg0_key, arg1_data, arg2_data_size, arg3_data_length);
Ryan Everettdcbc1d32024-01-25 11:04:48 +0000277#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
278 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_data, arg2_data_size);
279#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskined5e5e6d2024-01-04 16:42:40 +0100280 return status;
281}
282
283/* Wrapper for psa_generate_key */
284psa_status_t mbedtls_test_wrap_psa_generate_key(
285 const psa_key_attributes_t *arg0_attributes,
286 mbedtls_svc_key_id_t *arg1_key)
287{
288 psa_status_t status = (psa_generate_key)(arg0_attributes, arg1_key);
289 return status;
290}
291
292/* Wrapper for psa_generate_random */
293psa_status_t mbedtls_test_wrap_psa_generate_random(
294 uint8_t *arg0_output,
295 size_t arg1_output_size)
296{
297 psa_status_t status = (psa_generate_random)(arg0_output, arg1_output_size);
298 return status;
299}
300
301/* Wrapper for psa_get_key_attributes */
302psa_status_t mbedtls_test_wrap_psa_get_key_attributes(
303 mbedtls_svc_key_id_t arg0_key,
304 psa_key_attributes_t *arg1_attributes)
305{
306 psa_status_t status = (psa_get_key_attributes)(arg0_key, arg1_attributes);
307 return status;
308}
309
310/* Wrapper for psa_hash_abort */
311psa_status_t mbedtls_test_wrap_psa_hash_abort(
312 psa_hash_operation_t *arg0_operation)
313{
314 psa_status_t status = (psa_hash_abort)(arg0_operation);
315 return status;
316}
317
318/* Wrapper for psa_hash_clone */
319psa_status_t mbedtls_test_wrap_psa_hash_clone(
320 const psa_hash_operation_t *arg0_source_operation,
321 psa_hash_operation_t *arg1_target_operation)
322{
323 psa_status_t status = (psa_hash_clone)(arg0_source_operation, arg1_target_operation);
324 return status;
325}
326
327/* Wrapper for psa_hash_compare */
328psa_status_t mbedtls_test_wrap_psa_hash_compare(
329 psa_algorithm_t arg0_alg,
330 const uint8_t *arg1_input,
331 size_t arg2_input_length,
332 const uint8_t *arg3_hash,
333 size_t arg4_hash_length)
334{
335 psa_status_t status = (psa_hash_compare)(arg0_alg, arg1_input, arg2_input_length, arg3_hash, arg4_hash_length);
336 return status;
337}
338
339/* Wrapper for psa_hash_compute */
340psa_status_t mbedtls_test_wrap_psa_hash_compute(
341 psa_algorithm_t arg0_alg,
342 const uint8_t *arg1_input,
343 size_t arg2_input_length,
344 uint8_t *arg3_hash,
345 size_t arg4_hash_size,
346 size_t *arg5_hash_length)
347{
348 psa_status_t status = (psa_hash_compute)(arg0_alg, arg1_input, arg2_input_length, arg3_hash, arg4_hash_size, arg5_hash_length);
349 return status;
350}
351
352/* Wrapper for psa_hash_finish */
353psa_status_t mbedtls_test_wrap_psa_hash_finish(
354 psa_hash_operation_t *arg0_operation,
355 uint8_t *arg1_hash,
356 size_t arg2_hash_size,
357 size_t *arg3_hash_length)
358{
359 psa_status_t status = (psa_hash_finish)(arg0_operation, arg1_hash, arg2_hash_size, arg3_hash_length);
360 return status;
361}
362
363/* Wrapper for psa_hash_setup */
364psa_status_t mbedtls_test_wrap_psa_hash_setup(
365 psa_hash_operation_t *arg0_operation,
366 psa_algorithm_t arg1_alg)
367{
368 psa_status_t status = (psa_hash_setup)(arg0_operation, arg1_alg);
369 return status;
370}
371
372/* Wrapper for psa_hash_update */
373psa_status_t mbedtls_test_wrap_psa_hash_update(
374 psa_hash_operation_t *arg0_operation,
375 const uint8_t *arg1_input,
376 size_t arg2_input_length)
377{
378 psa_status_t status = (psa_hash_update)(arg0_operation, arg1_input, arg2_input_length);
379 return status;
380}
381
382/* Wrapper for psa_hash_verify */
383psa_status_t mbedtls_test_wrap_psa_hash_verify(
384 psa_hash_operation_t *arg0_operation,
385 const uint8_t *arg1_hash,
386 size_t arg2_hash_length)
387{
388 psa_status_t status = (psa_hash_verify)(arg0_operation, arg1_hash, arg2_hash_length);
389 return status;
390}
391
392/* Wrapper for psa_import_key */
393psa_status_t mbedtls_test_wrap_psa_import_key(
394 const psa_key_attributes_t *arg0_attributes,
395 const uint8_t *arg1_data,
396 size_t arg2_data_length,
397 mbedtls_svc_key_id_t *arg3_key)
398{
Ryan Everettdcbc1d32024-01-25 11:04:48 +0000399#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
400 MBEDTLS_TEST_MEMORY_POISON(arg1_data, arg2_data_length);
401#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskined5e5e6d2024-01-04 16:42:40 +0100402 psa_status_t status = (psa_import_key)(arg0_attributes, arg1_data, arg2_data_length, arg3_key);
Ryan Everettdcbc1d32024-01-25 11:04:48 +0000403#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
404 MBEDTLS_TEST_MEMORY_UNPOISON(arg1_data, arg2_data_length);
405#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskined5e5e6d2024-01-04 16:42:40 +0100406 return status;
407}
408
409/* Wrapper for psa_key_derivation_abort */
410psa_status_t mbedtls_test_wrap_psa_key_derivation_abort(
411 psa_key_derivation_operation_t *arg0_operation)
412{
413 psa_status_t status = (psa_key_derivation_abort)(arg0_operation);
414 return status;
415}
416
417/* Wrapper for psa_key_derivation_get_capacity */
418psa_status_t mbedtls_test_wrap_psa_key_derivation_get_capacity(
419 const psa_key_derivation_operation_t *arg0_operation,
420 size_t *arg1_capacity)
421{
422 psa_status_t status = (psa_key_derivation_get_capacity)(arg0_operation, arg1_capacity);
423 return status;
424}
425
426/* Wrapper for psa_key_derivation_input_bytes */
427psa_status_t mbedtls_test_wrap_psa_key_derivation_input_bytes(
428 psa_key_derivation_operation_t *arg0_operation,
429 psa_key_derivation_step_t arg1_step,
430 const uint8_t *arg2_data,
431 size_t arg3_data_length)
432{
433 psa_status_t status = (psa_key_derivation_input_bytes)(arg0_operation, arg1_step, arg2_data, arg3_data_length);
434 return status;
435}
436
437/* Wrapper for psa_key_derivation_input_key */
438psa_status_t mbedtls_test_wrap_psa_key_derivation_input_key(
439 psa_key_derivation_operation_t *arg0_operation,
440 psa_key_derivation_step_t arg1_step,
441 mbedtls_svc_key_id_t arg2_key)
442{
443 psa_status_t status = (psa_key_derivation_input_key)(arg0_operation, arg1_step, arg2_key);
444 return status;
445}
446
447/* Wrapper for psa_key_derivation_key_agreement */
448psa_status_t mbedtls_test_wrap_psa_key_derivation_key_agreement(
449 psa_key_derivation_operation_t *arg0_operation,
450 psa_key_derivation_step_t arg1_step,
451 mbedtls_svc_key_id_t arg2_private_key,
452 const uint8_t *arg3_peer_key,
453 size_t arg4_peer_key_length)
454{
455 psa_status_t status = (psa_key_derivation_key_agreement)(arg0_operation, arg1_step, arg2_private_key, arg3_peer_key, arg4_peer_key_length);
456 return status;
457}
458
459/* Wrapper for psa_key_derivation_output_bytes */
460psa_status_t mbedtls_test_wrap_psa_key_derivation_output_bytes(
461 psa_key_derivation_operation_t *arg0_operation,
462 uint8_t *arg1_output,
463 size_t arg2_output_length)
464{
465 psa_status_t status = (psa_key_derivation_output_bytes)(arg0_operation, arg1_output, arg2_output_length);
466 return status;
467}
468
469/* Wrapper for psa_key_derivation_output_key */
470psa_status_t mbedtls_test_wrap_psa_key_derivation_output_key(
471 const psa_key_attributes_t *arg0_attributes,
472 psa_key_derivation_operation_t *arg1_operation,
473 mbedtls_svc_key_id_t *arg2_key)
474{
475 psa_status_t status = (psa_key_derivation_output_key)(arg0_attributes, arg1_operation, arg2_key);
476 return status;
477}
478
479/* Wrapper for psa_key_derivation_set_capacity */
480psa_status_t mbedtls_test_wrap_psa_key_derivation_set_capacity(
481 psa_key_derivation_operation_t *arg0_operation,
482 size_t arg1_capacity)
483{
484 psa_status_t status = (psa_key_derivation_set_capacity)(arg0_operation, arg1_capacity);
485 return status;
486}
487
488/* Wrapper for psa_key_derivation_setup */
489psa_status_t mbedtls_test_wrap_psa_key_derivation_setup(
490 psa_key_derivation_operation_t *arg0_operation,
491 psa_algorithm_t arg1_alg)
492{
493 psa_status_t status = (psa_key_derivation_setup)(arg0_operation, arg1_alg);
494 return status;
495}
496
497/* Wrapper for psa_mac_abort */
498psa_status_t mbedtls_test_wrap_psa_mac_abort(
499 psa_mac_operation_t *arg0_operation)
500{
501 psa_status_t status = (psa_mac_abort)(arg0_operation);
502 return status;
503}
504
505/* Wrapper for psa_mac_compute */
506psa_status_t mbedtls_test_wrap_psa_mac_compute(
507 mbedtls_svc_key_id_t arg0_key,
508 psa_algorithm_t arg1_alg,
509 const uint8_t *arg2_input,
510 size_t arg3_input_length,
511 uint8_t *arg4_mac,
512 size_t arg5_mac_size,
513 size_t *arg6_mac_length)
514{
515 psa_status_t status = (psa_mac_compute)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_mac, arg5_mac_size, arg6_mac_length);
516 return status;
517}
518
519/* Wrapper for psa_mac_sign_finish */
520psa_status_t mbedtls_test_wrap_psa_mac_sign_finish(
521 psa_mac_operation_t *arg0_operation,
522 uint8_t *arg1_mac,
523 size_t arg2_mac_size,
524 size_t *arg3_mac_length)
525{
526 psa_status_t status = (psa_mac_sign_finish)(arg0_operation, arg1_mac, arg2_mac_size, arg3_mac_length);
527 return status;
528}
529
530/* Wrapper for psa_mac_sign_setup */
531psa_status_t mbedtls_test_wrap_psa_mac_sign_setup(
532 psa_mac_operation_t *arg0_operation,
533 mbedtls_svc_key_id_t arg1_key,
534 psa_algorithm_t arg2_alg)
535{
536 psa_status_t status = (psa_mac_sign_setup)(arg0_operation, arg1_key, arg2_alg);
537 return status;
538}
539
540/* Wrapper for psa_mac_update */
541psa_status_t mbedtls_test_wrap_psa_mac_update(
542 psa_mac_operation_t *arg0_operation,
543 const uint8_t *arg1_input,
544 size_t arg2_input_length)
545{
546 psa_status_t status = (psa_mac_update)(arg0_operation, arg1_input, arg2_input_length);
547 return status;
548}
549
550/* Wrapper for psa_mac_verify */
551psa_status_t mbedtls_test_wrap_psa_mac_verify(
552 mbedtls_svc_key_id_t arg0_key,
553 psa_algorithm_t arg1_alg,
554 const uint8_t *arg2_input,
555 size_t arg3_input_length,
556 const uint8_t *arg4_mac,
557 size_t arg5_mac_length)
558{
559 psa_status_t status = (psa_mac_verify)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_mac, arg5_mac_length);
560 return status;
561}
562
563/* Wrapper for psa_mac_verify_finish */
564psa_status_t mbedtls_test_wrap_psa_mac_verify_finish(
565 psa_mac_operation_t *arg0_operation,
566 const uint8_t *arg1_mac,
567 size_t arg2_mac_length)
568{
569 psa_status_t status = (psa_mac_verify_finish)(arg0_operation, arg1_mac, arg2_mac_length);
570 return status;
571}
572
573/* Wrapper for psa_mac_verify_setup */
574psa_status_t mbedtls_test_wrap_psa_mac_verify_setup(
575 psa_mac_operation_t *arg0_operation,
576 mbedtls_svc_key_id_t arg1_key,
577 psa_algorithm_t arg2_alg)
578{
579 psa_status_t status = (psa_mac_verify_setup)(arg0_operation, arg1_key, arg2_alg);
580 return status;
581}
582
583/* Wrapper for psa_purge_key */
584psa_status_t mbedtls_test_wrap_psa_purge_key(
585 mbedtls_svc_key_id_t arg0_key)
586{
587 psa_status_t status = (psa_purge_key)(arg0_key);
588 return status;
589}
590
591/* Wrapper for psa_raw_key_agreement */
592psa_status_t mbedtls_test_wrap_psa_raw_key_agreement(
593 psa_algorithm_t arg0_alg,
594 mbedtls_svc_key_id_t arg1_private_key,
595 const uint8_t *arg2_peer_key,
596 size_t arg3_peer_key_length,
597 uint8_t *arg4_output,
598 size_t arg5_output_size,
599 size_t *arg6_output_length)
600{
601 psa_status_t status = (psa_raw_key_agreement)(arg0_alg, arg1_private_key, arg2_peer_key, arg3_peer_key_length, arg4_output, arg5_output_size, arg6_output_length);
602 return status;
603}
604
605/* Wrapper for psa_sign_hash */
606psa_status_t mbedtls_test_wrap_psa_sign_hash(
607 mbedtls_svc_key_id_t arg0_key,
608 psa_algorithm_t arg1_alg,
609 const uint8_t *arg2_hash,
610 size_t arg3_hash_length,
611 uint8_t *arg4_signature,
612 size_t arg5_signature_size,
613 size_t *arg6_signature_length)
614{
Thomas Daubneyc63e31a2024-01-30 13:33:14 +0000615#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
616 MBEDTLS_TEST_MEMORY_POISON(arg2_hash, arg3_hash_length);
617 MBEDTLS_TEST_MEMORY_POISON(arg4_signature, arg5_signature_size);
618#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskined5e5e6d2024-01-04 16:42:40 +0100619 psa_status_t status = (psa_sign_hash)(arg0_key, arg1_alg, arg2_hash, arg3_hash_length, arg4_signature, arg5_signature_size, arg6_signature_length);
Thomas Daubneyc63e31a2024-01-30 13:33:14 +0000620#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
621 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_hash, arg3_hash_length);
622 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_signature, arg5_signature_size);
623#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskined5e5e6d2024-01-04 16:42:40 +0100624 return status;
625}
626
627/* Wrapper for psa_sign_message */
628psa_status_t mbedtls_test_wrap_psa_sign_message(
629 mbedtls_svc_key_id_t arg0_key,
630 psa_algorithm_t arg1_alg,
631 const uint8_t *arg2_input,
632 size_t arg3_input_length,
633 uint8_t *arg4_signature,
634 size_t arg5_signature_size,
635 size_t *arg6_signature_length)
636{
Thomas Daubneyc63e31a2024-01-30 13:33:14 +0000637#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
638 MBEDTLS_TEST_MEMORY_POISON(arg2_input, arg3_input_length);
639 MBEDTLS_TEST_MEMORY_POISON(arg4_signature, arg5_signature_size);
640#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskined5e5e6d2024-01-04 16:42:40 +0100641 psa_status_t status = (psa_sign_message)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_signature, arg5_signature_size, arg6_signature_length);
Thomas Daubneyc63e31a2024-01-30 13:33:14 +0000642#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
643 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_input, arg3_input_length);
644 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_signature, arg5_signature_size);
645#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskined5e5e6d2024-01-04 16:42:40 +0100646 return status;
647}
648
649/* Wrapper for psa_verify_hash */
650psa_status_t mbedtls_test_wrap_psa_verify_hash(
651 mbedtls_svc_key_id_t arg0_key,
652 psa_algorithm_t arg1_alg,
653 const uint8_t *arg2_hash,
654 size_t arg3_hash_length,
655 const uint8_t *arg4_signature,
656 size_t arg5_signature_length)
657{
Thomas Daubneyc63e31a2024-01-30 13:33:14 +0000658#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
659 MBEDTLS_TEST_MEMORY_POISON(arg2_hash, arg3_hash_length);
660 MBEDTLS_TEST_MEMORY_POISON(arg4_signature, arg5_signature_length);
661#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskined5e5e6d2024-01-04 16:42:40 +0100662 psa_status_t status = (psa_verify_hash)(arg0_key, arg1_alg, arg2_hash, arg3_hash_length, arg4_signature, arg5_signature_length);
Thomas Daubneyc63e31a2024-01-30 13:33:14 +0000663#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
664 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_hash, arg3_hash_length);
665 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_signature, arg5_signature_length);
666#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskined5e5e6d2024-01-04 16:42:40 +0100667 return status;
668}
669
670/* Wrapper for psa_verify_message */
671psa_status_t mbedtls_test_wrap_psa_verify_message(
672 mbedtls_svc_key_id_t arg0_key,
673 psa_algorithm_t arg1_alg,
674 const uint8_t *arg2_input,
675 size_t arg3_input_length,
676 const uint8_t *arg4_signature,
677 size_t arg5_signature_length)
678{
Thomas Daubneyc63e31a2024-01-30 13:33:14 +0000679#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
680 MBEDTLS_TEST_MEMORY_POISON(arg2_input, arg3_input_length);
681 MBEDTLS_TEST_MEMORY_POISON(arg4_signature, arg5_signature_length);
682#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskined5e5e6d2024-01-04 16:42:40 +0100683 psa_status_t status = (psa_verify_message)(arg0_key, arg1_alg, arg2_input, arg3_input_length, arg4_signature, arg5_signature_length);
Thomas Daubneyc63e31a2024-01-30 13:33:14 +0000684#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
685 MBEDTLS_TEST_MEMORY_UNPOISON(arg2_input, arg3_input_length);
686 MBEDTLS_TEST_MEMORY_UNPOISON(arg4_signature, arg5_signature_length);
687#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
Gilles Peskined5e5e6d2024-01-04 16:42:40 +0100688 return status;
689}
690
Gilles Peskinea980aa02024-01-04 20:51:38 +0100691#endif /* defined(MBEDTLS_PSA_CRYPTO_C) && defined(MBEDTLS_TEST_HOOKS) && \
692 !defined(RECORD_PSA_STATUS_COVERAGE_LOG) */
Gilles Peskined5e5e6d2024-01-04 16:42:40 +0100693
694/* End of automatically generated file. */