| /openbsd-src/gnu/usr.bin/perl/ |
| H A D | feature.h | 279 #define magic_sethint_feature(keysv, keypv, keylen, valsv, valbool) \ 280 S_magic_sethint_feature(aTHX_ (keysv), (keypv), (keylen), (valsv), (valbool)) argument 282 S_magic_sethint_feature(pTHX_ SV *keysv, const char *keypv, STRLEN keylen, 285 keypv = SvPV_const(keysv, keylen); in S_magic_sethint_feature() 287 if (memBEGINs(keypv, keylen, "feature_")) { in S_magic_sethint_feature() 292 if (keylen == sizeof("feature___SUB__")-1 in S_magic_sethint_feature() 293 && memcmp(subf+1, "_SUB__", keylen - sizeof("feature_")) == 0) { in S_magic_sethint_feature() 300 if (keylen == sizeof("feature_bareword_filehandles")-1 in S_magic_sethint_feature() 301 && memcmp(subf+1, "areword_filehandles", keylen - sizeof("feature_")) == 0) { in S_magic_sethint_feature() 305 else if (keylen in S_magic_sethint_feature() 283 S_magic_sethint_feature(pTHX_ SV * keysv,const char * keypv,STRLEN keylen,SV * valsv,bool valbool) S_magic_sethint_feature() argument [all...] |
| /openbsd-src/usr.bin/ssh/ |
| H A D | xmss_hash.c | 34 …ar *out, const unsigned int type, const unsigned char *key, unsigned int keylen, const unsigned ch… in core_hash_SHA2() argument 36 unsigned char buf[inlen + n + keylen]; in core_hash_SHA2() 43 for (i=0; i < keylen; i++) { in core_hash_SHA2() 48 buf[keylen + n + i] = in[i]; in core_hash_SHA2() 52 SHA256(buf, inlen + keylen + n, out); in core_hash_SHA2() 57 SHA512(buf, inlen + keylen + n, out); in core_hash_SHA2() 67 int prf(unsigned char *out, const unsigned char *in, const unsigned char *key, unsigned int keylen) in prf() argument 69 return core_hash_SHA2(out, 3, key, keylen, in, 32, keylen); in prf() 75 …, unsigned long long inlen, const unsigned char *key, const unsigned int keylen, const unsigned in… in h_msg() argument 77 if (keylen != 3*n){ in h_msg() [all …]
|
| /openbsd-src/regress/lib/libcrypto/pbkdf2/ |
| H A D | pbkdf2.c | 138 size_t keylen; in test_p5_pbkdf2() local 147 keylen = strlen(hex); in test_p5_pbkdf2() 148 if ((keylen % 2) != 0) { in test_p5_pbkdf2() 152 keylen /= 2; in test_p5_pbkdf2() 153 expected = malloc(keylen); in test_p5_pbkdf2() 154 out = malloc(keylen); in test_p5_pbkdf2() 159 if (convert(expected, (const unsigned char *)hex, keylen) != 0) { in test_p5_pbkdf2() 166 test->iter, digest, keylen, out); in test_p5_pbkdf2() 173 if (memcmp(expected, out, keylen) != 0) { in test_p5_pbkdf2() 177 hexdump(stderr, "expected: ", expected, keylen); in test_p5_pbkdf2() [all …]
|
| /openbsd-src/lib/libcrypto/cms/ |
| H A D | cms_enc.c | 146 ec->keylen = tkeylen; in cms_EncryptedContent_init_bio() 155 if (ec->keylen != tkeylen) { in cms_EncryptedContent_init_bio() 157 if (!EVP_CIPHER_CTX_set_key_length(ctx, ec->keylen)) { in cms_EncryptedContent_init_bio() 167 freezero(ec->key, ec->keylen); in cms_EncryptedContent_init_bio() 169 ec->keylen = tkeylen; in cms_EncryptedContent_init_bio() 200 freezero(ec->key, ec->keylen); in cms_EncryptedContent_init_bio() 212 const EVP_CIPHER *cipher, const unsigned char *key, size_t keylen) in cms_EncryptedContent_init() argument 216 if ((ec->key = malloc(keylen)) == NULL) { in cms_EncryptedContent_init() 220 memcpy(ec->key, key, keylen); in cms_EncryptedContent_init() 222 ec->keylen in cms_EncryptedContent_init() 231 CMS_EncryptedData_set1_key(CMS_ContentInfo * cms,const EVP_CIPHER * ciph,const unsigned char * key,size_t keylen) CMS_EncryptedData_set1_key() argument [all...] |
| H A D | cms_pwri.c | 340 size_t keylen; in cms_RecipientInfo_pwri_crypt() local 401 if (!kek_wrap_key(NULL, &keylen, ec->key, ec->keylen, kekctx)) in cms_RecipientInfo_pwri_crypt() 404 key = malloc(keylen); in cms_RecipientInfo_pwri_crypt() 408 if (!kek_wrap_key(key, &keylen, ec->key, ec->keylen, kekctx)) in cms_RecipientInfo_pwri_crypt() 411 pwri->encryptedKey->length = keylen; in cms_RecipientInfo_pwri_crypt() 418 if (!kek_unwrap_key(key, &keylen, pwri->encryptedKey->data, in cms_RecipientInfo_pwri_crypt() 424 freezero(ec->key, ec->keylen); in cms_RecipientInfo_pwri_crypt() 426 ec->keylen = keylen; in cms_RecipientInfo_pwri_crypt()
|
| H A D | cms_env.c | 405 if (EVP_PKEY_encrypt(pctx, NULL, &eklen, ec->key, ec->keylen) <= 0) in cms_RecipientInfo_ktri_encrypt() 415 if (EVP_PKEY_encrypt(pctx, ek, &eklen, ec->key, ec->keylen) <= 0) in cms_RecipientInfo_ktri_encrypt() 502 freezero(ec->key, ec->keylen); in cms_RecipientInfo_ktri_decrypt() 504 ec->keylen = eklen; in cms_RecipientInfo_ktri_decrypt() 560 size_t keylen, unsigned char *id, size_t idlen, ASN1_GENERALIZEDTIME *date, in CMS_add0_recipient_key() 572 switch (keylen) { in CMS_add0_recipient_key() 599 if (keylen != exp_keylen) { in CMS_add0_recipient_key() 632 kekri->keylen = keylen; in CMS_add0_recipient_key() 693 size_t keylen) in CMS_RecipientInfo_set0_key() 559 CMS_add0_recipient_key(CMS_ContentInfo * cms,int nid,unsigned char * key,size_t keylen,unsigned char * id,size_t idlen,ASN1_GENERALIZEDTIME * date,ASN1_OBJECT * otherTypeId,ASN1_TYPE * otherType) CMS_add0_recipient_key() argument 692 CMS_RecipientInfo_set0_key(CMS_RecipientInfo * ri,unsigned char * key,size_t keylen) CMS_RecipientInfo_set0_key() argument [all...] |
| /openbsd-src/regress/lib/libutil/bcrypt_pbkdf/ |
| H A D | bcrypt_pbkdf_test.c | 30 size_t keylen; member 111 printkey(const uint8_t *key, size_t keylen) in printkey() argument 115 for (k = 0; k < keylen; k++) { in printkey() 144 key, t->keylen, t->rounds); in main() 145 if (memcmp(key, t->key, t->keylen) != 0) { in main() 148 printkey(t->key, t->keylen); in main() 150 printkey(key, t->keylen); in main()
|
| /openbsd-src/sys/crypto/ |
| H A D | blake2s.h | 41 const void *key, const size_t keylen); 47 const size_t outlen, const size_t inlen, const size_t keylen) in blake2s() argument 53 (key != NULL || keylen == 0) && keylen <= BLAKE2S_KEY_SIZE); in blake2s() 55 if (keylen) in blake2s() 56 blake2s_init_key(&state, outlen, key, keylen); in blake2s() 65 const size_t outlen, const size_t inlen, const size_t keylen);
|
| H A D | blake2s.c | 82 const void *key, const size_t keylen) in blake2s_init_key() argument 87 !key || !keylen || keylen > BLAKE2S_KEY_SIZE)); in blake2s_init_key() 89 blake2s_init_param(state, 0x01010000 | keylen << 8 | outlen); in blake2s_init_key() 91 memcpy(block, key, keylen); in blake2s_init_key() 203 const size_t inlen, const size_t keylen) in blake2s_hmac() argument 210 if (keylen > BLAKE2S_BLOCK_SIZE) { in blake2s_hmac() 212 blake2s_update(&state, key, keylen); in blake2s_hmac() 215 memcpy(x_key, key, keylen); in blake2s_hmac()
|
| /openbsd-src/lib/libutil/ |
| H A D | bcrypt_pbkdf.c | 99 uint8_t *key, size_t keylen, unsigned int rounds) in bcrypt_pbkdf() argument 109 size_t origkeylen = keylen; in bcrypt_pbkdf() 114 if (passlen == 0 || saltlen == 0 || keylen == 0 || in bcrypt_pbkdf() 115 keylen > sizeof(out) * sizeof(out)) in bcrypt_pbkdf() 117 stride = (keylen + sizeof(out) - 1) / sizeof(out); in bcrypt_pbkdf() 118 amt = (keylen + stride - 1) / stride; in bcrypt_pbkdf() 127 for (count = 1; keylen > 0; count++) { in bcrypt_pbkdf() 154 amt = MINIMUM(amt, keylen); in bcrypt_pbkdf() 161 keylen -= i; in bcrypt_pbkdf() 173 arc4random_buf(key, keylen); in bcrypt_pbkdf()
|
| /openbsd-src/usr.sbin/unbound/sldns/ |
| H A D | keyraw.c | 535 sldns_gost2pkey_raw(unsigned char* key, size_t keylen) in sldns_gost2pkey_raw() argument 544 if(keylen != 64) { in sldns_gost2pkey_raw() 560 sldns_ecdsa2pkey_raw(unsigned char* key, size_t keylen, uint8_t algo) in sldns_ecdsa2pkey_raw() argument 572 if(keylen != 2*256/8) return NULL; in sldns_ecdsa2pkey_raw() 575 if(keylen != 2*384/8) return NULL; in sldns_ecdsa2pkey_raw() 580 if(keylen+1 > sizeof(buf)) { /* sanity check */ in sldns_ecdsa2pkey_raw() 585 memmove(buf+1, key, keylen); in sldns_ecdsa2pkey_raw() 592 !OSSL_PARAM_BLD_push_octet_string(param_bld, "pub", buf, keylen+1)) { in sldns_ecdsa2pkey_raw() 624 if(keylen != 2*256/8) return NULL; in sldns_ecdsa2pkey_raw() 627 if(keylen != 2*384/8) return NULL; in sldns_ecdsa2pkey_raw() [all …]
|
| /openbsd-src/sbin/unwind/libunbound/sldns/ |
| H A D | keyraw.c | 535 sldns_gost2pkey_raw(unsigned char* key, size_t keylen) in sldns_gost2pkey_raw() argument 544 if(keylen != 64) { in sldns_gost2pkey_raw() 560 sldns_ecdsa2pkey_raw(unsigned char* key, size_t keylen, uint8_t algo) in sldns_ecdsa2pkey_raw() argument 572 if(keylen != 2*256/8) return NULL; in sldns_ecdsa2pkey_raw() 575 if(keylen != 2*384/8) return NULL; in sldns_ecdsa2pkey_raw() 580 if(keylen+1 > sizeof(buf)) { /* sanity check */ in sldns_ecdsa2pkey_raw() 585 memmove(buf+1, key, keylen); in sldns_ecdsa2pkey_raw() 592 !OSSL_PARAM_BLD_push_octet_string(param_bld, "pub", buf, keylen+1)) { in sldns_ecdsa2pkey_raw() 624 if(keylen != 2*256/8) return NULL; in sldns_ecdsa2pkey_raw() 627 if(keylen != 2*384/8) return NULL; in sldns_ecdsa2pkey_raw() [all …]
|
| /openbsd-src/sys/lib/libsa/ |
| H A D | bcrypt_pbkdf.c | 97 uint8_t *key, size_t keylen, unsigned int rounds) in bcrypt_pbkdf() argument 107 size_t origkeylen = keylen; in bcrypt_pbkdf() 112 if (passlen == 0 || saltlen == 0 || keylen == 0 || in bcrypt_pbkdf() 113 keylen > sizeof(out) * sizeof(out)) in bcrypt_pbkdf() 115 stride = (keylen + sizeof(out) - 1) / sizeof(out); in bcrypt_pbkdf() 116 amt = (keylen + stride - 1) / stride; in bcrypt_pbkdf() 125 for (count = 1; keylen > 0; count++) { in bcrypt_pbkdf() 152 amt = MINIMUM(amt, keylen); in bcrypt_pbkdf() 159 keylen -= i; in bcrypt_pbkdf()
|
| /openbsd-src/gnu/gcc/gcc/ |
| H A D | prefix.c | 191 int keylen; in translate_name() local 199 for (keylen = 0; in translate_name() 200 (name[keylen + 1] != 0 && !IS_DIR_SEPARATOR (name[keylen + 1])); in translate_name() 201 keylen++) in translate_name() 204 key = (char *) alloca (keylen + 1); in translate_name() 205 strncpy (key, &name[1], keylen); in translate_name() 206 key[keylen] = 0; in translate_name() 226 name = concat (prefix, &name[keylen + 1], NULL); in translate_name()
|
| /openbsd-src/gnu/usr.bin/gcc/gcc/ |
| H A D | prefix.c | 190 int keylen; local 198 for (keylen = 0; 199 (name[keylen + 1] != 0 && !IS_DIR_SEPARATOR (name[keylen + 1])); 200 keylen++) 203 key = (char *) alloca (keylen + 1); 204 strncpy (key, &name[1], keylen); 205 key[keylen] = 0; 225 name = concat (prefix, &name[keylen + 1], NULL);
|
| /openbsd-src/lib/libc/yp/ |
| H A D | ypmatch_cache.c | 46 int keylen, vallen; member 53 ypmatch_add(const char *map, const char *key, u_int keylen, char *val, in ypmatch_add() argument 60 if (keylen == 0 || vallen == 0) in ypmatch_add() 67 (newkey = malloc(keylen)) == NULL || in ypmatch_add() 96 (void)memcpy(newkey, key, keylen); in ypmatch_add() 101 ep->keylen = keylen; in ypmatch_add() 108 ypmatch_find(const char *map, const char *key, u_int keylen, char **val, in ypmatch_find() argument 120 if (ep->keylen != keylen) in ypmatch_find() 124 if (memcmp(ep->key, key, keylen)) in ypmatch_find()
|
| /openbsd-src/regress/lib/libcrypto/aeswrap/ |
| H A D | aes_wrap.c | 66 const unsigned char *key, int keylen) in AES_wrap_unwrap_test() argument 72 otmp = malloc(keylen + 8); in AES_wrap_unwrap_test() 73 ptmp = malloc(keylen); in AES_wrap_unwrap_test() 78 r = AES_wrap_key(&wctx, iv, otmp, key, keylen); in AES_wrap_unwrap_test() 82 if (eout && memcmp(eout, otmp, keylen)) in AES_wrap_unwrap_test() 91 if (memcmp(key, ptmp, keylen)) in AES_wrap_unwrap_test()
|
| /openbsd-src/sbin/isakmpd/ |
| H A D | dnssec.c | 64 dns_get_key(int type, struct message *msg, int *keylen) in dns_get_key() argument 226 *keylen = key_rr.datalen; in dns_get_key() 237 dns_RSA_dns_to_x509(u_int8_t *key, int keylen, RSA **rsa_key) in dns_RSA_dns_to_x509() argument 243 if (!key || keylen <= 0) { in dns_RSA_dns_to_x509() 257 if (keylen < 3) { in dns_RSA_dns_to_x509() 265 if (e_len > (keylen - key_offset)) { in dns_RSA_dns_to_x509() 275 rsa->n = BN_bin2bn(key + key_offset, keylen - key_offset, NULL); in dns_RSA_dns_to_x509() 286 dns_RSA_x509_to_dns(RSA *rsa_key, u_int8_t *key, int *keylen) in dns_RSA_x509_to_dns() argument
|
| /openbsd-src/usr.sbin/unbound/validator/ |
| H A D | val_secalgo.c | 544 * @param keylen: length of key. 549 unsigned char* key, size_t keylen) in setup_key_digest() 555 *evp_key = sldns_key_dsa2pkey_raw(key, keylen); in setup_key_digest() 580 *evp_key = sldns_key_rsa2pkey_raw(key, keylen); in setup_key_digest() 606 *evp_key = sldns_key_rsa2pkey_raw(key, keylen); in setup_key_digest() 616 *evp_key = sldns_gost2pkey_raw(key, keylen); in setup_key_digest() 632 *evp_key = sldns_ecdsa2pkey_raw(key, keylen, in setup_key_digest() 646 *evp_key = sldns_ecdsa2pkey_raw(key, keylen, in setup_key_digest() 662 *evp_key = sldns_ed255192pkey_raw(key, keylen); in setup_key_digest() 673 *evp_key = sldns_ed4482pkey_raw(key, keylen); in setup_key_digest() 546 setup_key_digest(int algo,EVP_PKEY ** evp_key,const EVP_MD ** digest_type,unsigned char * key,size_t keylen) setup_key_digest() argument 733 verify_canonrrset(sldns_buffer * buf,int algo,unsigned char * sigblock,unsigned int sigblock_len,unsigned char * key,unsigned int keylen,char ** reason) verify_canonrrset() argument 1236 nss_setup_key_digest(int algo,SECKEYPublicKey ** pubkey,HASH_HashType * htype,unsigned char * key,size_t keylen,unsigned char ** prefix,size_t * prefixlen) nss_setup_key_digest() argument 1376 verify_canonrrset(sldns_buffer * buf,int algo,unsigned char * sigblock,unsigned int sigblock_len,unsigned char * key,unsigned int keylen,char ** reason) verify_canonrrset() argument 1753 _verify_nettle_dsa(sldns_buffer * buf,unsigned char * sigblock,unsigned int sigblock_len,unsigned char * key,unsigned int keylen) _verify_nettle_dsa() argument 1842 _verify_nettle_rsa(sldns_buffer * buf,unsigned int digest_size,char * sigblock,unsigned int sigblock_len,uint8_t * key,unsigned int keylen) _verify_nettle_rsa() argument 1922 _verify_nettle_ecdsa(sldns_buffer * buf,unsigned int digest_size,unsigned char * sigblock,unsigned int sigblock_len,unsigned char * key,unsigned int keylen) _verify_nettle_ecdsa() argument 1988 _verify_nettle_ed25519(sldns_buffer * buf,unsigned char * sigblock,unsigned int sigblock_len,unsigned char * key,unsigned int keylen) _verify_nettle_ed25519() argument 2024 verify_canonrrset(sldns_buffer * buf,int algo,unsigned char * sigblock,unsigned int sigblock_len,unsigned char * key,unsigned int keylen,char ** reason) verify_canonrrset() argument [all...] |
| /openbsd-src/sbin/unwind/libunbound/validator/ |
| H A D | val_secalgo.c | 544 * @param keylen: length of key. 549 unsigned char* key, size_t keylen) in setup_key_digest() 555 *evp_key = sldns_key_dsa2pkey_raw(key, keylen); in setup_key_digest() 580 *evp_key = sldns_key_rsa2pkey_raw(key, keylen); in setup_key_digest() 606 *evp_key = sldns_key_rsa2pkey_raw(key, keylen); in setup_key_digest() 616 *evp_key = sldns_gost2pkey_raw(key, keylen); in setup_key_digest() 632 *evp_key = sldns_ecdsa2pkey_raw(key, keylen, in setup_key_digest() 646 *evp_key = sldns_ecdsa2pkey_raw(key, keylen, in setup_key_digest() 662 *evp_key = sldns_ed255192pkey_raw(key, keylen); in setup_key_digest() 673 *evp_key = sldns_ed4482pkey_raw(key, keylen); in setup_key_digest() 546 setup_key_digest(int algo,EVP_PKEY ** evp_key,const EVP_MD ** digest_type,unsigned char * key,size_t keylen) setup_key_digest() argument 733 verify_canonrrset(sldns_buffer * buf,int algo,unsigned char * sigblock,unsigned int sigblock_len,unsigned char * key,unsigned int keylen,char ** reason) verify_canonrrset() argument 1236 nss_setup_key_digest(int algo,SECKEYPublicKey ** pubkey,HASH_HashType * htype,unsigned char * key,size_t keylen,unsigned char ** prefix,size_t * prefixlen) nss_setup_key_digest() argument 1376 verify_canonrrset(sldns_buffer * buf,int algo,unsigned char * sigblock,unsigned int sigblock_len,unsigned char * key,unsigned int keylen,char ** reason) verify_canonrrset() argument 1753 _verify_nettle_dsa(sldns_buffer * buf,unsigned char * sigblock,unsigned int sigblock_len,unsigned char * key,unsigned int keylen) _verify_nettle_dsa() argument 1842 _verify_nettle_rsa(sldns_buffer * buf,unsigned int digest_size,char * sigblock,unsigned int sigblock_len,uint8_t * key,unsigned int keylen) _verify_nettle_rsa() argument 1922 _verify_nettle_ecdsa(sldns_buffer * buf,unsigned int digest_size,unsigned char * sigblock,unsigned int sigblock_len,unsigned char * key,unsigned int keylen) _verify_nettle_ecdsa() argument 1988 _verify_nettle_ed25519(sldns_buffer * buf,unsigned char * sigblock,unsigned int sigblock_len,unsigned char * key,unsigned int keylen) _verify_nettle_ed25519() argument 2024 verify_canonrrset(sldns_buffer * buf,int algo,unsigned char * sigblock,unsigned int sigblock_len,unsigned char * key,unsigned int keylen,char ** reason) verify_canonrrset() argument [all...] |
| /openbsd-src/sys/net80211/ |
| H A D | ieee80211_pae_output.c | 260 u_int16_t info, keylen; in ieee80211_send_4way_msg1() local 283 keylen = ieee80211_cipher_keylen(ni->ni_rsncipher); in ieee80211_send_4way_msg1() 284 BE_WRITE_2(key->keylen, keylen); in ieee80211_send_4way_msg1() 340 int keylen; in ieee80211_send_4way_msg2() local 343 keylen = ieee80211_cipher_keylen(ni->ni_rsncipher); in ieee80211_send_4way_msg2() 344 BE_WRITE_2(key->keylen, keylen); in ieee80211_send_4way_msg2() 368 u_int16_t info, keylen; in ieee80211_send_4way_msg3() local 403 keylen = ieee80211_cipher_keylen(ni->ni_rsncipher); in ieee80211_send_4way_msg3() 404 BE_WRITE_2(key->keylen, keylen); in ieee80211_send_4way_msg3() 460 int keylen; in ieee80211_send_4way_msg4() local [all …]
|
| /openbsd-src/sbin/mount_vnd/ |
| H A D | mount_vnd.c | 65 size_t keylen = 0; in main() local 108 if (key == NULL || (keylen = strlen(key)) == 0) in main() 112 keylen = BLF_MAXUTILIZED; in main() 114 rv = config(argv[1], argv[0], dp, key, keylen); in main() 187 config(char *dev, char *file, struct disklabel *dp, char *key, size_t keylen) in config() argument 203 vndio.vnd_keylen = keylen; in config() 216 explicit_bzero(key, keylen); in config()
|
| /openbsd-src/regress/sys/crypto/aes/ |
| H A D | aestest.c | 141 do_tests(const char *filename, int test_num, u_char *key, u_int keylen, in do_tests() argument 148 if (docrypt(key, keylen, plaintext, result, textlen, 1) < 0) { in do_tests() 157 if (docrypt(key, keylen, ciphertext, result, textlen, 0) < 0) { in do_tests() 176 u_int keylen, textlen, tmp; in run_file() local 182 keylen = textlen = tmp = 0; in run_file() 242 parsehex(cp, &key, &keylen); in run_file() 243 if (keylen * 8 != (u_int)keysize) in run_file() 255 fail += do_tests(filename, test, key, keylen, in run_file()
|
| /openbsd-src/usr.bin/dig/lib/dns/ |
| H A D | hmac_link.c | 143 int keylen; in hmacsha1_fromdns() local 161 keylen = ISC_SHA1_DIGESTLENGTH; in hmacsha1_fromdns() 164 keylen = r.length; in hmacsha1_fromdns() 167 key->key_size = keylen * 8; in hmacsha1_fromdns() 287 int keylen; in hmacsha224_fromdns() local 305 keylen = ISC_SHA224_DIGESTLENGTH; in hmacsha224_fromdns() 308 keylen = r.length; in hmacsha224_fromdns() 311 key->key_size = keylen * 8; in hmacsha224_fromdns() 431 int keylen; in hmacsha256_fromdns() local 449 keylen = ISC_SHA256_DIGESTLENGTH; in hmacsha256_fromdns() [all …]
|
| /openbsd-src/lib/libcrypto/asn1/ |
| H A D | p5_pbev2.c | 191 int alg_nid, keylen; in PKCS5_pbe2_set() local 233 keylen = EVP_CIPHER_key_length(cipher); in PKCS5_pbe2_set() 235 keylen = -1; in PKCS5_pbe2_set() 241 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen); in PKCS5_pbe2_set() 280 int keylen) in PKCS5_pbkdf2_set() argument 314 if (keylen > 0) { in PKCS5_pbkdf2_set() 317 if (!ASN1_INTEGER_set(kdf->keylength, keylen)) in PKCS5_pbkdf2_set()
|