Lines Matching defs:to

34  * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
109 * During the reinitialization after a detected fork we will try to login to the
117 unsigned char *to, RSA *rsa, int padding);
119 unsigned char *to, RSA *rsa, int padding);
121 unsigned char *to, RSA *rsa, int padding);
123 unsigned char *to, RSA *rsa, int padding);
137 unsigned char *to, RSA *rsa);
139 unsigned char *to, RSA *rsa);
141 unsigned char *to, RSA *rsa);
143 unsigned char *to, RSA *rsa);
192 /* Read mode string to be used for fopen() */
202 * locked), set error variable and jump to the specified label. We use this list
203 * so that we can track how many references to the PKCS#11 objects are used from
205 * session structure and the ref count for the reference being replaced gets to
219 * Find active list entry according to object handle and return pointer to the
261 /* not found, create new entry and add it to the list */
271 /* connect the newly created entry to the list */
342 * decrement its refcnt and if it drops to 0, disconnect the entry and free it.
371 /* Our internal RSA_METHOD that we provide pointers to */
398 /* Our internal DSA_METHOD that we provide pointers to */
424 * rounding it up to multiple of X in the underlying bignum library. 8 should be
429 /* Our internal DH_METHOD that we provide pointers to */
458 * Similar to OpenSSL to take advantage of the paddings. The goal is to
465 unsigned char *to, RSA *rsa, int padding)
500 r = pk11_RSA_public_encrypt_low(num, buf, to, rsa);
511 * Similar to Openssl to take advantage of the paddings. The input errors
516 unsigned char *to, RSA *rsa, int padding)
544 r = pk11_RSA_private_encrypt_low(num, buf, to, rsa);
553 /* Similar to OpenSSL code. Input errors are also checked here */
556 unsigned char *to, RSA *rsa, int padding)
598 * Needs to skip these 0's paddings here.
611 r = RSA_padding_check_PKCS1_type_2(to, num, p, j, num);
615 r = RSA_padding_check_PKCS1_OAEP(to, num, p, j, num, NULL, 0);
619 r = RSA_padding_check_SSLv23(to, num, p, j, num);
622 r = RSA_padding_check_none(to, num, p, j, num);
641 /* Similar to OpenSSL code. Input errors are also checked here */
644 unsigned char *to, RSA *rsa, int padding)
682 * Needs to skip these 0's here
695 r = RSA_padding_check_PKCS1_type_1(to, num, p, i, num);
698 r = RSA_padding_check_none(to, num, p, i, num);
720 * The calling function allocated sufficient memory in "to" to store results.
724 const unsigned char *from, unsigned char *to, RSA *rsa)
757 (unsigned char *)from, flen, to, &bytes_encrypted);
775 * The calling function allocated sufficient memory in "to" to store results.
779 const unsigned char *from, unsigned char *to, RSA *rsa)
813 (unsigned char *)from, flen, to, &ul_sig_len);
832 * The calling function allocated sufficient memory in "to" to store results.
836 const unsigned char *from, unsigned char *to, RSA *rsa)
870 (unsigned char *)from, flen, to, &bytes_decrypted);
889 * The calling function allocated sufficient memory in "to" to store results.
893 const unsigned char *from, unsigned char *to, RSA *rsa)
927 (unsigned char *)from, flen, to, &bytes_decrypted);
958 * to do the same as in the original function, i.e. to free bignum
1288 * These public attributes are needed to initialize the OpenSSL RSA
1289 * structure with something we can use to look up the key. Note that we
1307 /* login to the session */
1329 * We might have a cache hit which we could confirm according to
1330 * the 'n'/'e' params. However, it is easier just to recreate
1331 * everything. We expect the keys to be loaded once and used
1335 * the failure to the OpenSSL error message buffer.
1456 /* PKCS#11 URI: try to find a key from a PKCS#11 token */
1627 * Function similar to pk11_get_public_rsa_key(). In addition to 'n' and 'e'
1645 * Both CKA_TOKEN and CKA_SENSITIVE have to be CK_FALSE for session keys
1730 * tried to find the private key in the keystore. If it was
1752 * components from the keystore. In that case 'd' was set to NULL and we
1753 * expect the application to properly cope with that. It is documented
1755 * to be used exclusively using the high level API and then there is no
1756 * problem. If the application expects the private components to be read
1808 * 6 to 13 entries in the key template are key components.
1809 * They need to be freed upon exit or error.
1834 * key matter here so it is sufficient to compare them with values
1880 * be sufficient. Note that we want to compare the public component
2090 * to act accordingly and shift if necessary.
2246 * Both CKA_TOKEN and CKA_SENSITIVE have to be CK_FALSE for session keys
2340 * 5 to 8 entries in the key template are key components.
2341 * They need to be freed apon exit or error.
2365 * key matters here so it is sufficient to compare it with value
2374 * reports the failure to the OpenSSL error message buffer.
2392 * key matters here so it is sufficient to compare it with value
2401 * reports the failure to the OpenSSL error message buffer.
2748 * CKM_DH_PKCS_DERIVE mechanism is not supposed to strip
2923 * Note: we rely on pk11_destroy_dh_key_objects() to set sp->opdata_dh
2924 * to CK_INVALID_HANDLE even when it fails to destroy the object.
2932 * is unique so it is sufficient to compare it with value cached
2941 * reports the failure to the OpenSSL error message buffer.
2951 * Local function to simplify key template population
2960 * This function can be used on non-initialized BIGNUMs. It is easier to
3039 * internally needs a PKEY method for DSA even when in the engine. So, to avoid
3040 * a regression when moving from 0.9.8 to 1.0.0, we use an internal OpenSSL
3041 * structure for the DSA PKEY methods to make it work. It is a future project to
3044 * Note that at the time of 1.0.0d release there is no documentation as to how
3045 * the PKEY EVP functions are to be implemented in an engine. There is only one