Add seed input for psa_tls12_prf_input
diff --git a/library/psa_crypto.c b/library/psa_crypto.c
index ebd98a8..a2bf203 100644
--- a/library/psa_crypto.c
+++ b/library/psa_crypto.c
@@ -4771,19 +4771,37 @@
     return( PSA_ERROR_INVALID_ARGUMENT );
 }
 #else
+static psa_status_t psa_tls12_prf_set_seed( psa_tls12_prf_key_derivation_t *prf,
+                                            const uint8_t *data,
+                                            size_t data_length )
+{
+    if( prf->state != TLS12_PRF_STATE_INIT )
+        return( PSA_ERROR_BAD_STATE );
+
+    prf->seed = mbedtls_calloc( 1, data_length );
+    if( prf->seed == NULL )
+        return( PSA_ERROR_INSUFFICIENT_MEMORY );
+
+    memcpy( prf->seed, data, data_length );
+    prf->seed_length = data_length;
+
+    prf->state = TLS12_PRF_STATE_SEED_SET;
+
+    return( PSA_SUCCESS );
+}
+
 static psa_status_t psa_tls12_prf_input( psa_tls12_prf_key_derivation_t *prf,
                                          psa_algorithm_t hash_alg,
                                          psa_key_derivation_step_t step,
                                          const uint8_t *data,
                                          size_t data_length )
 {
-    (void) prf;
     (void) hash_alg;
-    (void) data;
-    (void) data_length;
 
     switch( step )
     {
+        case PSA_KEY_DERIVATION_INPUT_SEED:
+            return( psa_tls12_prf_set_seed( prf, data, data_length ) );
         default:
             return( PSA_ERROR_INVALID_ARGUMENT );
     }