Lines Matching defs:inputs
6751 * two inputs: SECRET (this case) and INFO which does not modify
7246 * Secret inputs must have the type #PSA_KEY_TYPE_DERIVE.
7247 * Non-secret inputs must have the type #PSA_KEY_TYPE_RAW_DATA.
7248 * Both secret and non-secret inputs can alternatively have the type
8289 const psa_crypto_driver_pake_inputs_t *inputs,
8292 if (inputs->password_len == 0) {
8296 *password_len = inputs->password_len;
8302 const psa_crypto_driver_pake_inputs_t *inputs,
8305 if (inputs->password_len == 0) {
8309 if (buffer_size < inputs->password_len) {
8313 memcpy(buffer, inputs->password, inputs->password_len);
8314 *buffer_length = inputs->password_len;
8320 const psa_crypto_driver_pake_inputs_t *inputs,
8323 if (inputs->user_len == 0) {
8327 *user_len = inputs->user_len;
8333 const psa_crypto_driver_pake_inputs_t *inputs,
8336 if (inputs->user_len == 0) {
8340 if (user_id_size < inputs->user_len) {
8344 memcpy(user_id, inputs->user, inputs->user_len);
8345 *user_id_len = inputs->user_len;
8351 const psa_crypto_driver_pake_inputs_t *inputs,
8354 if (inputs->peer_len == 0) {
8358 *peer_len = inputs->peer_len;
8364 const psa_crypto_driver_pake_inputs_t *inputs,
8367 if (inputs->peer_len == 0) {
8371 if (peer_id_size < inputs->peer_len) {
8375 memcpy(peer_id, inputs->peer, inputs->peer_len);
8376 *peer_id_length = inputs->peer_len;
8382 const psa_crypto_driver_pake_inputs_t *inputs,
8385 if (inputs->cipher_suite.algorithm == PSA_ALG_NONE) {
8389 *cipher_suite = inputs->cipher_suite;
8411 memset(&operation->data.inputs, 0, sizeof(operation->data.inputs));
8416 operation->data.inputs.cipher_suite = *cipher_suite;
8469 operation->data.inputs.password = mbedtls_calloc(1, slot->key.bytes);
8470 if (operation->data.inputs.password == NULL) {
8475 memcpy(operation->data.inputs.password, slot->key.data, slot->key.bytes);
8476 operation->data.inputs.password_len = slot->key.bytes;
8477 operation->data.inputs.attributes = slot->attr;
8505 if (operation->data.inputs.user_len != 0) {
8510 operation->data.inputs.user = mbedtls_calloc(1, user_id_len);
8511 if (operation->data.inputs.user == NULL) {
8518 memcpy(operation->data.inputs.user, user_id, user_id_len);
8519 operation->data.inputs.user_len = user_id_len;
8549 if (operation->data.inputs.peer_len != 0) {
8554 operation->data.inputs.peer = mbedtls_calloc(1, peer_id_len);
8555 if (operation->data.inputs.peer == NULL) {
8562 memcpy(operation->data.inputs.peer, peer_id, peer_id_len);
8563 operation->data.inputs.peer_len = peer_id_len;
8617 is_x1 = (stage->inputs < 1);
8638 /* Create copy of the inputs on stack as inputs share memory
8640 psa_crypto_driver_pake_inputs_t inputs = operation->data.inputs;
8642 if (inputs.password_len == 0) {
8647 if (inputs.user_len == 0 || inputs.peer_len == 0) {
8655 status = psa_driver_wrapper_pake_setup(operation, &inputs);
8658 mbedtls_zeroize_and_free(inputs.password, inputs.password_len);
8661 mbedtls_free(inputs.user);
8662 mbedtls_free(inputs.peer);
8703 computation_stage->inputs == 0 &&
8727 stage->inputs++;
8728 if (stage->inputs == PSA_JPAKE_EXPECTED_INPUTS(stage->round)) {
8738 if (stage->inputs == PSA_JPAKE_EXPECTED_INPUTS(stage->round) &&
8741 stage->inputs = 0;
8967 if (operation->data.inputs.password != NULL) {
8968 mbedtls_zeroize_and_free(operation->data.inputs.password,
8969 operation->data.inputs.password_len);
8971 if (operation->data.inputs.user != NULL) {
8972 mbedtls_free(operation->data.inputs.user);
8974 if (operation->data.inputs.peer != NULL) {
8975 mbedtls_free(operation->data.inputs.peer);