Lines Matching defs:from

35  *    endorse or promote products derived from this software without
39 * 5. Products derived from this software may not be called "OpenSSL"
110 * token using the passphrasedialog keyword that we inherit from the parent.
116 static int pk11_RSA_public_encrypt(int flen, const unsigned char *from,
118 static int pk11_RSA_private_encrypt(int flen, const unsigned char *from,
120 static int pk11_RSA_public_decrypt(int flen, const unsigned char *from,
122 static int pk11_RSA_private_decrypt(int flen, const unsigned char *from,
136 static int pk11_RSA_public_encrypt_low(int flen, const unsigned char *from,
138 static int pk11_RSA_private_encrypt_low(int flen, const unsigned char *from,
140 static int pk11_RSA_public_decrypt_low(int flen, const unsigned char *from,
142 static int pk11_RSA_private_decrypt_low(int flen, const unsigned char *from,
203 * so that we can track how many references to the PKCS#11 objects are used from
285 * Remove active list entry from the list and free it.
295 /* remove the entry from the list and free it */
316 /* Free all entries from the active list. */
464 pk11_RSA_public_encrypt(int flen, const unsigned char *from,
478 i = RSA_padding_add_PKCS1_type_2(buf, num, from, flen);
482 i = RSA_padding_add_PKCS1_OAEP(buf, num, from, flen, NULL, 0);
486 i = RSA_padding_add_SSLv23(buf, num, from, flen);
489 i = RSA_padding_add_none(buf, num, from, flen);
515 pk11_RSA_private_encrypt(int flen, const unsigned char *from,
529 i = RSA_padding_add_PKCS1_type_1(buf, num, from, flen);
532 i = RSA_padding_add_none(buf, num, from, flen);
555 pk11_RSA_private_decrypt(int flen, const unsigned char *from,
583 if (BN_bin2bn(from, (int)flen, &f) == NULL) {
594 r = pk11_RSA_private_decrypt_low(flen, from, buf, rsa);
643 pk11_RSA_public_decrypt(int flen, const unsigned char *from,
668 if (BN_bin2bn(from, flen, &f) == NULL) {
678 r = pk11_RSA_public_decrypt_low(flen, from, buf, rsa);
724 const unsigned char *from, unsigned char *to, RSA *rsa)
757 (unsigned char *)from, flen, to, &bytes_encrypted);
779 const unsigned char *from, unsigned char *to, RSA *rsa)
813 (unsigned char *)from, flen, to, &ul_sig_len);
836 const unsigned char *from, unsigned char *to, RSA *rsa)
870 (unsigned char *)from, flen, to, &bytes_decrypted);
893 const unsigned char *from, unsigned char *to, RSA *rsa)
927 (unsigned char *)from, flen, to, &bytes_decrypted);
975 * Standard engine interface function. Majority codes here are from
1195 * Get a key from a file whose name is 'keyid'.
1267 * Get a key from a token.
1398 * Create a session object from it so that when calling
1400 * reason why we do that is that we cannot tell from the RSA
1405 * from what we do for the private keystore objects but in that
1406 * case, we can tell from the RSA structure that the keystore
1433 * Load an RSA key from a file or get its PKCS#11 handle if stored in the
1456 /* PKCS#11 URI: try to find a key from a PKCS#11 token */
1473 * Load RSA private key from a file or get its PKCS#11 handle if stored in the
1484 /* Load RSA public key from a file or load it from the PKCS#11 token. */
1494 * Get a public key object in a session from a given rsa structure. If the
1499 * We use the session field from sp, and we cache rsa->(n|e) in
1604 * We do not care about the return value from C_DestroyObject()
1629 * are used, 'd' is never extracted from the token in which case it would be
1733 * components from the RSA structure.
1752 * components from the keystore. In that case 'd' was set to NULL and we
1757 * from the keystore then that is not a supported way of usage.
1795 * We do not care about the return value from C_DestroyObject()
2114 * Create a public key object in a session from a given dsa structure.
2207 * We do not care about the return value from C_DestroyObject()
2230 * Create a private key object in the session from a given dsa structure
2327 * We do not care about the return value from C_DestroyObject()
2749 * leading zeros from a computed shared secret. However,
2897 * We do not care about the return value from C_DestroyObject()
3040 * a regression when moving from 0.9.8 to 1.0.0, we use an internal OpenSSL