Lines Matching defs:from

35  *    endorse or promote products derived from this software without
39 * 5. Products derived from this software may not be called "OpenSSL"
173 * invalid handle returned from the search operation.
314 static int pk11_digest_copy(EVP_MD_CTX *to, const EVP_MD_CTX *from);
1130 * from ENGINE_finish(). However, if there is still at least one
1188 /* get the C_GetFunctionList function from the loaded library */
1197 /* get the full function list from the loaded library */
1449 /* Free all BIGNUM structures from PK11_SESSION. */
1505 * The returned PK11_SESSION structure is disconnected from the freelist.
1547 * structure from the freelist.
1580 * PK11_SESSION objects aside from the first session (sp) which
1637 * It is an inherited session from our parent so it needs
1688 * If this is a session from the parent it will be taken care of and
1750 * Destroy session structures from the linked list specified. Free as many
1924 /* Destroy RSA public key from single session. */
1942 /* Destroy RSA private key from single session. */
2012 /* Destroy DSA public key from single session. */
2034 /* Destroy DSA private key from single session. */
2108 /* Destroy DH key from single session. */
2828 pk11_digest_copy(EVP_MD_CTX *to, const EVP_MD_CTX *from)
2836 if (from->md_data == NULL || to->digest->ctx_size == 0)
2839 /* The copy-from state */
2840 state = (PK11_CIPHER_STATE *) from->md_data;
2849 /* Get the size of the operation state of the copy-from session */
2871 /* Get the operation state of the copy-from session */
3017 * mechanisms from RSA, DSA, DH and RAND are present, and also two arrays of
3430 * compiler. That means that if we switched to pkcs11_kernel from the libpkcs11
3487 * symbols, which prevents it from mistakenly accessing C_* functions
3488 * from the top-level PKCS#11 library.
3503 /* get the full function list from the loaded library */