Lines Matching refs:to
53 * on failure. This means we need to tell our scoped pointers when we've transferred ownership,
93 * Makes sure the ex_data for the keyhandle is initially set to NULL.
112 int keyhandle_dup(CRYPTO_EX_DATA* to, CRYPTO_EX_DATA*, void *ptrRef, int idx, long, void *) {
113 // This appears to be a bug in OpenSSL.
121 (void) CRYPTO_set_ex_data(to, idx, keyhandle_copy);
126 int keystore_rsa_priv_enc(int flen, const unsigned char* from, unsigned char* to, RSA* rsa,
128 ALOGV("keystore_rsa_priv_enc(%d, %p, %p, %p, %d)", flen, from, to, rsa, padding);
190 memcpy(to, reply, replyLen);
193 ALOGV("rsa=%p keystore_rsa_priv_enc => returning %p len %llu", rsa, to,
198 int keystore_rsa_priv_dec(int flen, const unsigned char* from, unsigned char* to, RSA* rsa,
200 ALOGV("keystore_rsa_priv_dec(%d, %p, %p, %p, %d)", flen, from, to, rsa, padding);
246 outSize = RSA_padding_check_PKCS1_type_2(to, num, alignedReply, replyLen, num);
249 outSize = RSA_padding_check_X931(to, num, alignedReply, replyLen, num);
252 outSize = RSA_padding_check_none(to, num, alignedReply, replyLen, num);
262 ALOGV("rsa=%p keystore_rsa_priv_dec => returning %p len %llu", rsa, to, outSize);
346 * ENGINE_finish(), so we need to call ENGINE_init() here.
367 * Called to initialize RSA's ex_data for the key_id handle. This should