Lines Matching defs:to

3  * Use is subject to license terms.
35 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
107 unsigned char *to, RSA *rsa, int padding);
109 unsigned char *to, RSA *rsa, int padding);
111 unsigned char *to, RSA *rsa, int padding);
113 unsigned char *to, RSA *rsa, int padding);
127 unsigned char *to, RSA *rsa);
129 unsigned char *to, RSA *rsa);
131 unsigned char *to, RSA *rsa);
133 unsigned char *to, RSA *rsa);
179 /* Read mode string to be used for fopen() */
189 * variable and jump to the specified label.
203 * Find active list entry according to object handle and return pointer to the
244 /* not found, create new entry and add it to the list */
255 /* connect the newly created entry to the list */
328 * decrement its refcnt and if it drops to 0, disconnect the entry and free it.
359 /* Our internal RSA_METHOD that we provide pointers to */
385 /* Our internal DSA_METHOD that we provide pointers to */
412 * rounding it up to multiple of X in the underlying bignum library. 8 should be
417 /* Our internal DH_METHOD that we provide pointers to */
450 * Similiar to OpenSSL to take advantage of the paddings. The goal is to
456 unsigned char *to, RSA *rsa, int padding)
491 r = pk11_RSA_public_encrypt_low(num, buf, to, rsa);
503 * Similar to Openssl to take advantage of the paddings. The input errors
507 unsigned char *to, RSA *rsa, int padding)
535 r = pk11_RSA_private_encrypt_low(num, buf, to, rsa);
545 /* Similar to OpenSSL code. Input errors are also checked here */
547 unsigned char *to, RSA *rsa, int padding)
591 * Needs to skip these 0's paddings here.
603 r = RSA_padding_check_PKCS1_type_2(to, num, p, j, num);
607 r = RSA_padding_check_PKCS1_OAEP(to, num, p, j, num, NULL, 0);
611 r = RSA_padding_check_SSLv23(to, num, p, j, num);
614 r = RSA_padding_check_none(to, num, p, j, num);
633 /* Similar to OpenSSL code. Input errors are also checked here */
635 unsigned char *to, RSA *rsa, int padding)
676 * Needs to skip these 0's here
688 r = RSA_padding_check_PKCS1_type_1(to, num, p, i, num);
691 r = RSA_padding_check_none(to, num, p, i, num);
713 * The calling function allocated sufficient memory in "to" to store results.
716 const unsigned char *from, unsigned char *to, RSA *rsa)
752 (unsigned char *)from, flen, to, &bytes_encrypted);
772 * The calling function allocated sufficient memory in "to" to store results.
775 const unsigned char *from, unsigned char *to, RSA *rsa)
810 (unsigned char *)from, flen, to, &ul_sig_len);
831 * The calling function allocated sufficient memory in "to" to store results.
834 const unsigned char *from, unsigned char *to, RSA *rsa)
869 (unsigned char *)from, flen, to, &bytes_decrypted);
889 * The calling function allocated sufficient memory in "to" to store results.
892 const unsigned char *from, unsigned char *to, RSA *rsa)
928 (unsigned char *)from, flen, to, &bytes_decrypted);
959 * to do the same as in the original function, i.e. to free bignum
1473 /* Both CKA_TOKEN and CKA_SENSITIVE have to be FALSE for session keys */
1588 * 6 to 13 entries in the key template are key components.
1589 * They need to be freed apon exit or error.
1614 * key matter here so it is sufficient to compare them with values
1625 * reports the failure to the OpenSSL error message buffer.
1652 * reports the failure to the OpenSSL error message buffer.
1853 * to act accordingly and shift if necessary.
2021 /* Both CKA_TOKEN and CKA_SENSITIVE have to be FALSE for session keys */
2123 * 5 to 8 entries in the key template are key components.
2124 * They need to be freed apon exit or error.
2149 * key matters here so it is sufficient to compare it with value
2159 * reports the failure to the OpenSSL error message buffer.
2176 * key matters here so it is sufficient to compare it with value
2186 * reports the failure to the OpenSSL error message buffer.
2567 * CKM_DH_PKCS_DERIVE mechanism is not supposed to strip
2757 * Note: we rely on pk11_destroy_dh_key_objects() to set sp->opdata_dh
2758 * to CK_INVALID_HANDLE even when it fails to destroy the object.
2765 * is unique so it is sufficient to compare it with value cached
2775 * reports the failure to the OpenSSL error message buffer.
2785 * Local function to simplify key template population