Lines Matching defs:from
29 const unsigned char *from, int flen)
49 memcpy(p, from, (unsigned int)flen);
54 const unsigned char *from, int flen,
60 p = from;
122 int tlen, const unsigned char *from,
157 memcpy(p, from, (unsigned int)flen);
162 const unsigned char *from, int flen)
164 return ossl_rsa_padding_add_PKCS1_type_2_ex(NULL, to, tlen, from, flen);
168 const unsigned char *from, int flen,
197 * BN_bn2binpad. Trouble is that since we can't read out of |from|'s
199 * in case |from| was not zero-padded in advance.
201 for (from += flen, em += num, i = 0; i < num; i++) {
204 from -= 1 & mask;
205 *--em = *from & mask;
242 * Then if |good| move |mlen| bytes from |em|+RSA_PKCS1_PADDING_SIZE to |to|.
278 * padding from a decrypted RSA message in a TLS signature. The result is stored
281 * should be stored in |from| which must be |flen| bytes in length and padded
299 const unsigned char *from,
326 good = constant_time_is_zero(from[0]);
327 good &= constant_time_eq(from[1], 2);
331 good &= ~constant_time_is_zero_8(from[i]);
332 good &= constant_time_is_zero_8(from[flen - SSL_MAX_MASTER_KEY_LENGTH - 1]);
344 constant_time_eq(from[flen - SSL_MAX_MASTER_KEY_LENGTH],
347 constant_time_eq(from[flen - SSL_MAX_MASTER_KEY_LENGTH + 1],
364 constant_time_eq(from[flen - SSL_MAX_MASTER_KEY_LENGTH],
367 constant_time_eq(from[flen - SSL_MAX_MASTER_KEY_LENGTH + 1],
382 from[flen - SSL_MAX_MASTER_KEY_LENGTH + i],