Restructure pbkdf2_set_salt function
Signed-off-by: Kusumit Ghoderao <Kusumit.Ghoderao@silabs.com>
diff --git a/library/psa_crypto.c b/library/psa_crypto.c
index a8ccde5..77c5184 100644
--- a/library/psa_crypto.c
+++ b/library/psa_crypto.c
@@ -6437,9 +6437,6 @@
const uint8_t *data,
size_t data_length)
{
- uint8_t *prev_salt;
- size_t prev_salt_length;
-
if (pbkdf2->state != PSA_PBKDF2_STATE_INPUT_COST_SET &&
pbkdf2->state != PSA_PBKDF2_STATE_SALT_SET) {
return PSA_ERROR_BAD_STATE;
@@ -6454,16 +6451,16 @@
memcpy(pbkdf2->salt, data, data_length);
pbkdf2->salt_length = data_length;
} else if (pbkdf2->state == PSA_PBKDF2_STATE_SALT_SET) {
- prev_salt = pbkdf2->salt;
- prev_salt_length = pbkdf2->salt_length;
+ uint8_t *prev_salt = pbkdf2->salt;
+ size_t prev_salt_length = pbkdf2->salt_length;
+
pbkdf2->salt = mbedtls_calloc(1, data_length + prev_salt_length);
if (pbkdf2->salt == NULL) {
return PSA_ERROR_INSUFFICIENT_MEMORY;
}
memcpy(pbkdf2->salt, prev_salt, prev_salt_length);
- memcpy(pbkdf2->salt + prev_salt_length, data,
- data_length);
+ memcpy(pbkdf2->salt + prev_salt_length, data, data_length);
pbkdf2->salt_length += data_length;
mbedtls_free(prev_salt);
}