Lines Matching refs:inputs

8386     const psa_crypto_driver_pake_inputs_t *inputs,  argument
8389 if (inputs->password_len == 0) {
8393 *password_len = inputs->password_len;
8399 const psa_crypto_driver_pake_inputs_t *inputs, argument
8402 if (inputs->password_len == 0) {
8406 if (buffer_size < inputs->password_len) {
8410 memcpy(buffer, inputs->password, inputs->password_len);
8411 *buffer_length = inputs->password_len;
8417 const psa_crypto_driver_pake_inputs_t *inputs, argument
8420 if (inputs->user_len == 0) {
8424 *user_len = inputs->user_len;
8430 const psa_crypto_driver_pake_inputs_t *inputs, argument
8433 if (inputs->user_len == 0) {
8437 if (user_id_size < inputs->user_len) {
8441 memcpy(user_id, inputs->user, inputs->user_len);
8442 *user_id_len = inputs->user_len;
8448 const psa_crypto_driver_pake_inputs_t *inputs, argument
8451 if (inputs->peer_len == 0) {
8455 *peer_len = inputs->peer_len;
8461 const psa_crypto_driver_pake_inputs_t *inputs, argument
8464 if (inputs->peer_len == 0) {
8468 if (peer_id_size < inputs->peer_len) {
8472 memcpy(peer_id, inputs->peer, inputs->peer_len);
8473 *peer_id_length = inputs->peer_len;
8479 const psa_crypto_driver_pake_inputs_t *inputs, argument
8482 if (inputs->cipher_suite.algorithm == PSA_ALG_NONE) {
8486 *cipher_suite = inputs->cipher_suite;
8508 memset(&operation->data.inputs, 0, sizeof(operation->data.inputs));
8513 operation->data.inputs.cipher_suite = *cipher_suite;
8566 operation->data.inputs.password = mbedtls_calloc(1, slot->key.bytes);
8567 if (operation->data.inputs.password == NULL) {
8572 memcpy(operation->data.inputs.password, slot->key.data, slot->key.bytes);
8573 operation->data.inputs.password_len = slot->key.bytes;
8574 operation->data.inputs.attributes = slot->attr;
8602 if (operation->data.inputs.user_len != 0) {
8607 operation->data.inputs.user = mbedtls_calloc(1, user_id_len);
8608 if (operation->data.inputs.user == NULL) {
8615 memcpy(operation->data.inputs.user, user_id, user_id_len);
8616 operation->data.inputs.user_len = user_id_len;
8646 if (operation->data.inputs.peer_len != 0) {
8651 operation->data.inputs.peer = mbedtls_calloc(1, peer_id_len);
8652 if (operation->data.inputs.peer == NULL) {
8659 memcpy(operation->data.inputs.peer, peer_id, peer_id_len);
8660 operation->data.inputs.peer_len = peer_id_len;
8714 is_x1 = (stage->inputs < 1);
8737 psa_crypto_driver_pake_inputs_t inputs = operation->data.inputs; local
8739 if (inputs.password_len == 0) {
8744 if (inputs.user_len == 0 || inputs.peer_len == 0) {
8752 status = psa_driver_wrapper_pake_setup(operation, &inputs);
8755 mbedtls_zeroize_and_free(inputs.password, inputs.password_len);
8758 mbedtls_free(inputs.user);
8759 mbedtls_free(inputs.peer);
8800 computation_stage->inputs == 0 &&
8824 stage->inputs++;
8825 if (stage->inputs == PSA_JPAKE_EXPECTED_INPUTS(stage->round)) {
8835 if (stage->inputs == PSA_JPAKE_EXPECTED_INPUTS(stage->round) &&
8838 stage->inputs = 0;
9064 if (operation->data.inputs.password != NULL) {
9065 mbedtls_zeroize_and_free(operation->data.inputs.password,
9066 operation->data.inputs.password_len);
9068 if (operation->data.inputs.user != NULL) {
9069 mbedtls_free(operation->data.inputs.user);
9071 if (operation->data.inputs.peer != NULL) {
9072 mbedtls_free(operation->data.inputs.peer);