Lines Matching refs:sz
1261 static TEEC_Result add_attr(uint32_t id, const void *v, uint32_t sz, in add_attr() argument
1274 vsz = sz; in add_attr()
1276 if (*offs_2 + sz > shm2->size) in add_attr()
1278 memcpy((uint8_t *)shm2->buffer + *offs_2, v, sz); in add_attr()
1279 (*offs_2) += sz; in add_attr()
1994 size_t sz; in Invoke_Crypto_AsymmetricSignDigest() local
2007 sz = SHARE_MEM01->size; in Invoke_Crypto_AsymmetricSignDigest()
2009 sz--; in Invoke_Crypto_AsymmetricSignDigest()
2010 SET_SHARED_MEMORY_OPERATION_PARAMETER(1, 0, SHARE_MEM01, sz) in Invoke_Crypto_AsymmetricSignDigest()
2013 sz = 1; in Invoke_Crypto_AsymmetricSignDigest()
2015 sz = SHARE_MEM02->size; in Invoke_Crypto_AsymmetricSignDigest()
2016 SET_SHARED_MEMORY_OPERATION_PARAMETER(3, 0, SHARE_MEM02, sz) in Invoke_Crypto_AsymmetricSignDigest()
2188 size_t sz; in Invoke_Crypto_AsymmetricDecrypt() local
2201 sz = buffer_asym_encrypted.size; in Invoke_Crypto_AsymmetricDecrypt()
2203 sz--; in Invoke_Crypto_AsymmetricDecrypt()
2204 SET_SHARED_MEMORY_OPERATION_PARAMETER(1, 0, SHARE_MEM01, sz); in Invoke_Crypto_AsymmetricDecrypt()
2207 sz = 1; in Invoke_Crypto_AsymmetricDecrypt()
2209 sz = SHARE_MEM02->size; in Invoke_Crypto_AsymmetricDecrypt()
2210 SET_SHARED_MEMORY_OPERATION_PARAMETER(3, 0, SHARE_MEM02, sz); in Invoke_Crypto_AsymmetricDecrypt()
2683 unsigned int sz = 0; in calculate_digest() local
2687 sz = EVP_MD_size(md); in calculate_digest()
2688 buf = calloc(1, sz); in calculate_digest()
2692 if (EVP_Digest(data, data_length, buf, &sz, md, NULL)) { in calculate_digest()
2693 digest->size = sz; in calculate_digest()
3161 unsigned int sz = 0; in rsa_sign_digest() local
3171 sz = RSA_size(key); in rsa_sign_digest()
3172 buf = calloc(1, sz); in rsa_sign_digest()
3180 buf, &sz, key)) { in rsa_sign_digest()
3196 } else if (!RSA_private_encrypt(sz, buf, buf, key, in rsa_sign_digest()
3205 out_dgst->size = sz; in rsa_sign_digest()