Lines Matching refs:data

718     if (slot->key.data != NULL) {  in psa_allocate_buffer_to_slot()
722 slot->key.data = mbedtls_calloc(1, buffer_length); in psa_allocate_buffer_to_slot()
723 if (slot->key.data == NULL) { in psa_allocate_buffer_to_slot()
733 const uint8_t *data, in psa_copy_key_material_into_slot() argument
742 memcpy(slot->key.data, data, data_length); in psa_copy_key_material_into_slot()
748 const uint8_t *data, size_t data_length, in psa_import_key_into_slot() argument
770 memcpy(key_buffer, data, data_length); in psa_import_key_into_slot()
783 data, data_length, in psa_import_key_into_slot()
794 data, data_length, in psa_import_key_into_slot()
806 data, data_length, in psa_import_key_into_slot()
1197 mbedtls_platform_zeroize(slot->key.data, MBEDTLS_PSA_STATIC_KEY_SLOT_BUFFER_SIZE); in psa_remove_key_data_from_memory()
1200 if (slot->key.data != NULL) { in psa_remove_key_data_from_memory()
1201 mbedtls_zeroize_and_free(slot->key.data, slot->key.bytes); in psa_remove_key_data_from_memory()
1204 slot->key.data = NULL; in psa_remove_key_data_from_memory()
1477 uint8_t *data, in psa_export_key_buffer_internal() argument
1484 memcpy(data, key_buffer, key_buffer_size); in psa_export_key_buffer_internal()
1485 memset(data + key_buffer_size, 0, in psa_export_key_buffer_internal()
1494 uint8_t *data, size_t data_size, size_t *data_length) in psa_export_key_internal() argument
1504 data, data_size, data_length); in psa_export_key_internal()
1521 LOCAL_OUTPUT_DECLARE(data_external, data); in psa_export_key()
1546 LOCAL_OUTPUT_ALLOC(data_external, data_size, data); in psa_export_key()
1549 slot->key.data, slot->key.bytes, in psa_export_key()
1550 data, data_size, data_length); in psa_export_key()
1557 LOCAL_OUTPUT_FREE(data_external, data); in psa_export_key()
1565 uint8_t *data, in psa_export_public_key_internal() argument
1577 data, data_size, data_length); in psa_export_public_key_internal()
1584 data, in psa_export_public_key_internal()
1598 data, in psa_export_public_key_internal()
1612 data, data_size, in psa_export_public_key_internal()
1621 (void) data; in psa_export_public_key_internal()
1637 LOCAL_OUTPUT_DECLARE(data_external, data); in psa_export_public_key()
1658 LOCAL_OUTPUT_ALLOC(data_external, data_size, data); in psa_export_public_key()
1666 &slot->attr, slot->key.data, slot->key.bytes, in psa_export_public_key()
1667 data, data_size, data_length); in psa_export_public_key()
1672 LOCAL_OUTPUT_FREE(data_external, data); in psa_export_public_key()
1945 psa_se_key_data_storage_t data; local
1950 sizeof(data.slot_number),
1953 memcpy(&data.slot_number, &slot_number, sizeof(slot_number));
1955 (uint8_t *) &data,
1956 sizeof(data));
1963 slot->key.data,
2093 LOCAL_INPUT_DECLARE(data_external, data);
2113 LOCAL_INPUT_ALLOC(data_external, data_length, data);
2128 attributes, data, data_length, &storage_size);
2141 data, data_length,
2142 slot->key.data,
2169 LOCAL_INPUT_FREE(data_external, data);
2302 source_slot->key.data,
2304 target_slot->key.data,
2312 source_slot->key.data,
2677 slot->key.data,
2683 slot->key.data,
2875 slot->key.data, slot->key.bytes,
3038 &slot->attr, slot->key.data, slot->key.bytes,
3044 &slot->attr, slot->key.data, slot->key.bytes,
3088 &slot->attr, slot->key.data, slot->key.bytes,
3093 &slot->attr, slot->key.data, slot->key.bytes,
3415 &slot->attr, slot->key.data, slot->key.bytes,
3473 &slot->attr, slot->key.data, slot->key.bytes,
3580 slot->key.data,
3737 slot->key.data,
4350 slot->key.data,
4356 slot->key.data,
4634 &slot->attr, slot->key.data, slot->key.bytes,
4696 &slot->attr, slot->key.data, slot->key.bytes,
4824 &slot->attr, slot->key.data, slot->key.bytes,
4891 &slot->attr, slot->key.data, slot->key.bytes,
4998 slot->key.data,
5004 slot->key.data,
5588 mbedtls_platform_zeroize(operation->ctx.tls12_ecjpake_to_pms.data,
5589 sizeof(operation->ctx.tls12_ecjpake_to_pms.data));
5913 status = psa_hash_compute(PSA_ALG_SHA_256, ecjpake->data,
6158 static void psa_des_set_key_parity(uint8_t *data, size_t data_size) argument
6161 mbedtls_des_key_set_parity(data);
6164 mbedtls_des_key_set_parity(data + 8);
6167 mbedtls_des_key_set_parity(data + 16);
6207 uint8_t **data argument
6247 *data = mbedtls_calloc(1, m_bytes);
6248 if (*data == NULL) {
6255 if ((status = psa_key_derivation_output_bytes(operation, *data, m_bytes)) != 0) {
6266 (*data)[0] &= clear_bit_mask;
6272 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&k, *data, m_bytes));
6283 MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&k, *data, m_bytes));
6289 mbedtls_free(*data);
6290 *data = NULL;
6314 uint8_t **data argument
6332 *data = mbedtls_calloc(1, output_length);
6334 if (*data == NULL) {
6338 status = psa_key_derivation_output_bytes(operation, *data, output_length);
6346 (*data)[0] &= 248;
6347 (*data)[31] &= 127;
6348 (*data)[31] |= 64;
6351 (*data)[0] &= 252;
6352 (*data)[55] |= 128;
6364 psa_key_derivation_operation_t *operation, uint8_t **data) argument
6369 (void) data;
6374 size_t bits, psa_key_derivation_operation_t *operation, uint8_t **data) argument
6378 (void) data;
6389 uint8_t *data = NULL; local
6404 status = psa_generate_derived_ecc_key_weierstrass_helper(slot, bits, operation, &data);
6410 status = psa_generate_derived_ecc_key_montgomery_helper(bits, operation, &data);
6422 data = mbedtls_calloc(1, bytes);
6423 if (data == NULL) {
6427 status = psa_key_derivation_output_bytes(operation, data, bytes);
6433 psa_des_set_key_parity(data, bytes);
6455 data, bytes,
6456 slot->key.data,
6464 mbedtls_free(data);
6550 params->data, params_data_length,
6802 const uint8_t *data, argument
6819 data, data_length);
6842 memcpy(hkdf->prk, data, data_length);
6866 data, data_length);
6919 memcpy(hkdf->info, data, data_length);
6932 const uint8_t *data, argument
6945 memcpy(prf->seed, data, data_length);
6955 const uint8_t *data, argument
6969 memcpy(prf->secret, data, data_length);
6979 const uint8_t *data, argument
6992 memcpy(prf->label, data, data_length);
7003 const uint8_t *data, argument
7008 return psa_tls12_prf_set_seed(prf, data, data_length);
7010 return psa_tls12_prf_set_key(prf, data, data_length);
7012 return psa_tls12_prf_set_label(prf, data, data_length);
7023 const uint8_t *data, argument
7076 memcpy(cur, data, data_length);
7087 const uint8_t *data, argument
7100 memcpy(prf->other_secret, data, data_length);
7114 const uint8_t *data, argument
7120 data, data_length);
7124 data,
7128 return psa_tls12_prf_input(prf, step, data, data_length);
7139 const uint8_t *data, argument
7148 if (data[0] != 0x04) {
7153 memcpy(ecjpake->data, data + 1, PSA_TLS12_ECJPAKE_TO_PMS_DATA_SIZE);
7163 uint64_t data) argument
7173 if (data > PSA_VENDOR_PBKDF2_MAX_ITERATIONS) {
7177 if (data == 0) {
7181 pbkdf2->input_cost = data;
7188 const uint8_t *data, argument
7212 memcpy(next_salt + pbkdf2->salt_length, data, data_length);
7273 const uint8_t *data, argument
7284 status = psa_pbkdf2_hmac_set_password(hash_alg, data, data_length,
7291 status = psa_pbkdf2_cmac_set_password(data, data_length,
7308 const uint8_t *data, argument
7313 return psa_pbkdf2_set_salt(pbkdf2, data, data_length);
7315 return psa_pbkdf2_set_password(pbkdf2, kdf_alg, data, data_length);
7382 const uint8_t *data, argument
7396 step, data, data_length);
7402 step, data, data_length);
7408 step, data, data_length);
7414 &operation->ctx.tls12_ecjpake_to_pms, step, data, data_length);
7420 step, data, data_length);
7425 (void) data;
7472 LOCAL_INPUT_DECLARE(data_external, data);
7474 LOCAL_INPUT_ALLOC(data_external, data_length, data);
7478 data, data_length);
7482 LOCAL_INPUT_FREE(data_external, data);
7519 slot->key.data,
7598 private_key->key.data,
8071 slot->key.data, slot->key.bytes,
8096 params->data, params_data_length,
8508 memset(&operation->data.inputs, 0, sizeof(operation->data.inputs));
8513 operation->data.inputs.cipher_suite = *cipher_suite;
8566 operation->data.inputs.password = mbedtls_calloc(1, slot->key.bytes);
8567 if (operation->data.inputs.password == NULL) {
8572 memcpy(operation->data.inputs.password, slot->key.data, slot->key.bytes);
8573 operation->data.inputs.password_len = slot->key.bytes;
8574 operation->data.inputs.attributes = slot->attr;
8602 if (operation->data.inputs.user_len != 0) {
8607 operation->data.inputs.user = mbedtls_calloc(1, user_id_len);
8608 if (operation->data.inputs.user == NULL) {
8615 memcpy(operation->data.inputs.user, user_id, user_id_len);
8616 operation->data.inputs.user_len = user_id_len;
8646 if (operation->data.inputs.peer_len != 0) {
8651 operation->data.inputs.peer = mbedtls_calloc(1, peer_id_len);
8652 if (operation->data.inputs.peer == NULL) {
8659 memcpy(operation->data.inputs.peer, peer_id, peer_id_len);
8660 operation->data.inputs.peer_len = peer_id_len;
8737 psa_crypto_driver_pake_inputs_t inputs = operation->data.inputs;
8750 mbedtls_platform_zeroize(&operation->data, sizeof(operation->data));
9064 if (operation->data.inputs.password != NULL) {
9065 mbedtls_zeroize_and_free(operation->data.inputs.password,
9066 operation->data.inputs.password_len);
9068 if (operation->data.inputs.user != NULL) {
9069 mbedtls_free(operation->data.inputs.user);
9071 if (operation->data.inputs.peer != NULL) {
9072 mbedtls_free(operation->data.inputs.peer);