@@ -1163,16 +1163,16 @@ class Spake2p
11631163 * @param my_identity_len The prover identity length.
11641164 * @param peer_identity The peer identity. May be NULL if identities are not established.
11651165 * @param peer_identity_len The peer identity length.
1166- * @param w0in The input w0 (an output from the PBKDF).
1167- * @param w0in_len The input w0 length.
1168- * @param w1in The input w1 (an output from the PBKDF).
1169- * @param w1in_len The input w1 length.
1166+ * @param w0sin The input w0s (an output from the PBKDF).
1167+ * @param w0sin_len The input w0s length.
1168+ * @param w1sin The input w1s (an output from the PBKDF).
1169+ * @param w1sin_len The input w1s length.
11701170 *
11711171 * @return Returns a CHIP_ERROR on error, CHIP_NO_ERROR otherwise
11721172 **/
11731173 virtual CHIP_ERROR BeginProver (const uint8_t * my_identity, size_t my_identity_len, const uint8_t * peer_identity,
1174- size_t peer_identity_len, const uint8_t * w0in , size_t w0in_len , const uint8_t * w1in ,
1175- size_t w1in_len );
1174+ size_t peer_identity_len, const uint8_t * w0sin , size_t w0sin_len , const uint8_t * w1sin ,
1175+ size_t w1sin_len );
11761176
11771177 /* *
11781178 * @brief Compute the first round of the protocol.
@@ -1347,26 +1347,26 @@ class Spake2p
13471347 /*
13481348 * @synopsis Compute w0sin mod p
13491349 *
1350- * @param w0out Output field element (modulo p)
1350+ * @param w0out Output field element w0
13511351 * @param w0_len Output field element length
1352- * @param w1sin Input field element
1353- * @param w1sin_len Input field element length
1352+ * @param w0sin Input field element
1353+ * @param w0sin_len Input field element length
13541354 *
13551355 * @return Returns a CHIP_ERROR on error, CHIP_NO_ERROR otherwise
13561356 **/
13571357 virtual CHIP_ERROR ComputeW0 (uint8_t * w0out, size_t * w0_len, const uint8_t * w0sin, size_t w0sin_len) = 0;
13581358
13591359 /*
1360- * @synopsis Compute w1in*G
1360+ * @synopsis Compute w1in*G where w1in is w1sin mod p
13611361 *
13621362 * @param Lout Output point in 0x04 || X || Y format.
13631363 * @param L_len Output point length
1364- * @param w1in Input field element
1365- * @param w1in_len Input field element size
1364+ * @param w1sin Input field element
1365+ * @param w1sin_len Input field element size
13661366 *
13671367 * @return Returns a CHIP_ERROR on error, CHIP_NO_ERROR otherwise
13681368 **/
1369- virtual CHIP_ERROR ComputeL (uint8_t * Lout, size_t * L_len, const uint8_t * w1in , size_t w1in_len ) = 0;
1369+ virtual CHIP_ERROR ComputeL (uint8_t * Lout, size_t * L_len, const uint8_t * w1sin , size_t w1sin_len ) = 0;
13701370
13711371 void * M;
13721372 void * N;
@@ -1521,7 +1521,7 @@ class Spake2p_P256_SHA256_HKDF_HMAC : public Spake2p
15211521 CHIP_ERROR PointIsValid (void * R) override ;
15221522
15231523 CHIP_ERROR ComputeW0 (uint8_t * w0out, size_t * w0_len, const uint8_t * w0sin, size_t w0sin_len) override ;
1524- CHIP_ERROR ComputeL (uint8_t * Lout, size_t * L_len, const uint8_t * w1in , size_t w1in_len ) override ;
1524+ CHIP_ERROR ComputeL (uint8_t * Lout, size_t * L_len, const uint8_t * w1sin , size_t w1sin_len ) override ;
15251525
15261526protected:
15271527 CHIP_ERROR InitImpl () override ;
@@ -1561,12 +1561,12 @@ class Spake2pVerifier
15611561 CHIP_ERROR Generate (uint32_t pbkdf2IterCount, const ByteSpan & salt, uint32_t setupPin);
15621562
15631563 /* *
1564- * @brief Compute the initiator values (w0, w1 ) used for PAKE input.
1564+ * @brief Compute the initiator values (w0s, w1s ) used for PAKE input.
15651565 *
15661566 * @param pbkdf2IterCount Iteration count for PBKDF2 function
15671567 * @param salt Salt to be used for Spake2+ operation
15681568 * @param setupPin Provided setup PIN (passcode)
1569- * @param ws The output pair (w0, w1 ) stored sequentially
1569+ * @param ws The output pair (w0s, w1s ) stored sequentially
15701570 * @param ws_len The output length
15711571 *
15721572 * @return CHIP_ERROR The result from running PBKDF2
0 commit comments