Lines Matching refs:buffer

174 /* Declare a local copy of an input buffer and a variable that will be used
175 * to store a pointer to the start of the buffer.
181 * - input is the name of a pointer to the buffer to be copied
189 /* Allocate a copy of the buffer input and set the pointer input_copy to
195 * - input is the name of a pointer to the buffer to be copied
204 input_copy = LOCAL_INPUT_COPY_OF_##input.buffer;
210 * - input is the name of the original buffer that was copied
216 /* Declare a local copy of an output buffer and a variable that will be used
217 * to store a pointer to the start of the buffer.
223 * - output is the name of a pointer to the buffer to be copied
231 /* Allocate a copy of the buffer output and set the pointer output_copy to
237 * - output is the name of a pointer to the buffer to be copied
246 output_copy = LOCAL_OUTPUT_COPY_OF_##output.buffer;
249 * after first copying back its contents to the original buffer.
254 * - output is the name of the original buffer that was copied
574 * part of the output buffer (the whole buffer on
581 * \param output_buffer Pointer to buffer to wipe. May not be NULL
585 * \param output_buffer_size Size of output buffer. If zero, \p output_buffer
1485 /* Reject a zero-length output buffer now, since this can never be a
1601 /* Reject a zero-length output buffer now, since this can never be a
1913 * just pass the slot buffer for storage. */
2076 * buffer to hold the imported key material. */
2728 /* In case of success, set the potential excess room in the output buffer
2825 /* In case of success, set the potential excess room in the output buffer
2957 /* Immediately reject a zero-length signature buffer. This guarantees
2959 * buffer can in principle be empty since it doesn't actually have
3560 /* Immediately reject a zero-length signature buffer. This guarantees that
5098 /* Exit label is only needed for buffer copying, prevent unused warnings. */
5348 * buffer to prevent potential leakage of anything previously placed in
5349 * the same buffer.*/
6136 * Note: Function allocates memory for *data buffer, so given *data should be
6184 * allocates memory for the data buffer. */
6245 * Note: Function allocates memory for *data buffer, so given *data should be
7250 * that the input was passed as a buffer rather than via a key object.
7663 * verification errors. This is better than filling the buffer with
7958 * buffer to hold the generated key material. */
8303 uint8_t *buffer, size_t buffer_size, size_t *buffer_length)
8313 memcpy(buffer, inputs->password, inputs->password_len);
8995 /** Copy from an input buffer to a local copy.
8997 * \param[in] input Pointer to input buffer.
8998 * \param[in] input_len Length of the input buffer.
9000 * \param[out] input_copy_len Length of the local copy buffer.
9001 * \return #PSA_SUCCESS, if the buffer was successfully
9005 * input buffer.
9034 /** Copy from a local output buffer into a user-supplied one.
9036 * \param[in] output_copy Pointer to a local buffer containing the output.
9037 * \param[in] output_copy_len Length of the local buffer.
9038 * \param[out] output Pointer to user-supplied output buffer.
9039 * \param[out] output_len Length of the user-supplied output buffer.
9040 * \return #PSA_SUCCESS, if the buffer was successfully
9043 * user-supplied output buffer is too small to
9044 * hold the contents of the local buffer.
9084 local_input->buffer = mbedtls_calloc(input_len, 1);
9085 if (local_input->buffer == NULL) {
9090 /* From now on, we must free local_input->buffer on error. */
9095 local_input->buffer, local_input->length);
9103 mbedtls_free(local_input->buffer);
9104 local_input->buffer = NULL;
9111 mbedtls_free(local_input->buffer);
9112 local_input->buffer = NULL;
9124 local_output->buffer = mbedtls_calloc(output_len, 1);
9125 if (local_output->buffer == NULL) {
9140 if (local_output->buffer == NULL) {
9149 status = psa_crypto_copy_output(local_output->buffer, local_output->length,
9155 mbedtls_free(local_output->buffer);
9156 local_output->buffer = NULL;