Home
last modified time | relevance | path

Searched refs:keylen (Results 1 – 25 of 120) sorted by relevance

12345

/openbsd-src/gnu/usr.bin/perl/
H A Dfeature.h279 #define magic_sethint_feature(keysv, keypv, keylen, valsv, valbool) \
280 S_magic_sethint_feature(aTHX_ (keysv), (keypv), (keylen), (valsv), (valbool)) argument
282 S_magic_sethint_feature(pTHX_ SV *keysv, const char *keypv, STRLEN keylen,
285 keypv = SvPV_const(keysv, keylen); in S_magic_sethint_feature()
287 if (memBEGINs(keypv, keylen, "feature_")) { in S_magic_sethint_feature()
292 if (keylen == sizeof("feature___SUB__")-1 in S_magic_sethint_feature()
293 && memcmp(subf+1, "_SUB__", keylen - sizeof("feature_")) == 0) { in S_magic_sethint_feature()
300 if (keylen == sizeof("feature_bareword_filehandles")-1 in S_magic_sethint_feature()
301 && memcmp(subf+1, "areword_filehandles", keylen - sizeof("feature_")) == 0) { in S_magic_sethint_feature()
305 else if (keylen in S_magic_sethint_feature()
283 S_magic_sethint_feature(pTHX_ SV * keysv,const char * keypv,STRLEN keylen,SV * valsv,bool valbool) S_magic_sethint_feature() argument
[all...]
/openbsd-src/usr.bin/ssh/
H A Dxmss_hash.c34 …ar *out, const unsigned int type, const unsigned char *key, unsigned int keylen, const unsigned ch… in core_hash_SHA2() argument
36 unsigned char buf[inlen + n + keylen]; in core_hash_SHA2()
43 for (i=0; i < keylen; i++) { in core_hash_SHA2()
48 buf[keylen + n + i] = in[i]; in core_hash_SHA2()
52 SHA256(buf, inlen + keylen + n, out); in core_hash_SHA2()
57 SHA512(buf, inlen + keylen + n, out); in core_hash_SHA2()
67 int prf(unsigned char *out, const unsigned char *in, const unsigned char *key, unsigned int keylen) in prf() argument
69 return core_hash_SHA2(out, 3, key, keylen, in, 32, keylen); in prf()
75 …, unsigned long long inlen, const unsigned char *key, const unsigned int keylen, const unsigned in… in h_msg() argument
77 if (keylen != 3*n){ in h_msg()
[all …]
/openbsd-src/regress/lib/libcrypto/pbkdf2/
H A Dpbkdf2.c138 size_t keylen; in test_p5_pbkdf2() local
147 keylen = strlen(hex); in test_p5_pbkdf2()
148 if ((keylen % 2) != 0) { in test_p5_pbkdf2()
152 keylen /= 2; in test_p5_pbkdf2()
153 expected = malloc(keylen); in test_p5_pbkdf2()
154 out = malloc(keylen); in test_p5_pbkdf2()
159 if (convert(expected, (const unsigned char *)hex, keylen) != 0) { in test_p5_pbkdf2()
166 test->iter, digest, keylen, out); in test_p5_pbkdf2()
173 if (memcmp(expected, out, keylen) != 0) { in test_p5_pbkdf2()
177 hexdump(stderr, "expected: ", expected, keylen); in test_p5_pbkdf2()
[all …]
/openbsd-src/lib/libcrypto/cms/
H A Dcms_enc.c146 ec->keylen = tkeylen; in cms_EncryptedContent_init_bio()
155 if (ec->keylen != tkeylen) { in cms_EncryptedContent_init_bio()
157 if (!EVP_CIPHER_CTX_set_key_length(ctx, ec->keylen)) { in cms_EncryptedContent_init_bio()
167 freezero(ec->key, ec->keylen); in cms_EncryptedContent_init_bio()
169 ec->keylen = tkeylen; in cms_EncryptedContent_init_bio()
200 freezero(ec->key, ec->keylen); in cms_EncryptedContent_init_bio()
212 const EVP_CIPHER *cipher, const unsigned char *key, size_t keylen) in cms_EncryptedContent_init() argument
216 if ((ec->key = malloc(keylen)) == NULL) { in cms_EncryptedContent_init()
220 memcpy(ec->key, key, keylen); in cms_EncryptedContent_init()
222 ec->keylen in cms_EncryptedContent_init()
231 CMS_EncryptedData_set1_key(CMS_ContentInfo * cms,const EVP_CIPHER * ciph,const unsigned char * key,size_t keylen) CMS_EncryptedData_set1_key() argument
[all...]
H A Dcms_pwri.c340 size_t keylen; in cms_RecipientInfo_pwri_crypt() local
401 if (!kek_wrap_key(NULL, &keylen, ec->key, ec->keylen, kekctx)) in cms_RecipientInfo_pwri_crypt()
404 key = malloc(keylen); in cms_RecipientInfo_pwri_crypt()
408 if (!kek_wrap_key(key, &keylen, ec->key, ec->keylen, kekctx)) in cms_RecipientInfo_pwri_crypt()
411 pwri->encryptedKey->length = keylen; in cms_RecipientInfo_pwri_crypt()
418 if (!kek_unwrap_key(key, &keylen, pwri->encryptedKey->data, in cms_RecipientInfo_pwri_crypt()
424 freezero(ec->key, ec->keylen); in cms_RecipientInfo_pwri_crypt()
426 ec->keylen = keylen; in cms_RecipientInfo_pwri_crypt()
H A Dcms_env.c405 if (EVP_PKEY_encrypt(pctx, NULL, &eklen, ec->key, ec->keylen) <= 0) in cms_RecipientInfo_ktri_encrypt()
415 if (EVP_PKEY_encrypt(pctx, ek, &eklen, ec->key, ec->keylen) <= 0) in cms_RecipientInfo_ktri_encrypt()
502 freezero(ec->key, ec->keylen); in cms_RecipientInfo_ktri_decrypt()
504 ec->keylen = eklen; in cms_RecipientInfo_ktri_decrypt()
560 size_t keylen, unsigned char *id, size_t idlen, ASN1_GENERALIZEDTIME *date, in CMS_add0_recipient_key()
572 switch (keylen) { in CMS_add0_recipient_key()
599 if (keylen != exp_keylen) { in CMS_add0_recipient_key()
632 kekri->keylen = keylen; in CMS_add0_recipient_key()
693 size_t keylen) in CMS_RecipientInfo_set0_key()
559 CMS_add0_recipient_key(CMS_ContentInfo * cms,int nid,unsigned char * key,size_t keylen,unsigned char * id,size_t idlen,ASN1_GENERALIZEDTIME * date,ASN1_OBJECT * otherTypeId,ASN1_TYPE * otherType) CMS_add0_recipient_key() argument
692 CMS_RecipientInfo_set0_key(CMS_RecipientInfo * ri,unsigned char * key,size_t keylen) CMS_RecipientInfo_set0_key() argument
[all...]
/openbsd-src/regress/lib/libutil/bcrypt_pbkdf/
H A Dbcrypt_pbkdf_test.c30 size_t keylen; member
111 printkey(const uint8_t *key, size_t keylen) in printkey() argument
115 for (k = 0; k < keylen; k++) { in printkey()
144 key, t->keylen, t->rounds); in main()
145 if (memcmp(key, t->key, t->keylen) != 0) { in main()
148 printkey(t->key, t->keylen); in main()
150 printkey(key, t->keylen); in main()
/openbsd-src/sys/crypto/
H A Dblake2s.h41 const void *key, const size_t keylen);
47 const size_t outlen, const size_t inlen, const size_t keylen) in blake2s() argument
53 (key != NULL || keylen == 0) && keylen <= BLAKE2S_KEY_SIZE); in blake2s()
55 if (keylen) in blake2s()
56 blake2s_init_key(&state, outlen, key, keylen); in blake2s()
65 const size_t outlen, const size_t inlen, const size_t keylen);
H A Dblake2s.c82 const void *key, const size_t keylen) in blake2s_init_key() argument
87 !key || !keylen || keylen > BLAKE2S_KEY_SIZE)); in blake2s_init_key()
89 blake2s_init_param(state, 0x01010000 | keylen << 8 | outlen); in blake2s_init_key()
91 memcpy(block, key, keylen); in blake2s_init_key()
203 const size_t inlen, const size_t keylen) in blake2s_hmac() argument
210 if (keylen > BLAKE2S_BLOCK_SIZE) { in blake2s_hmac()
212 blake2s_update(&state, key, keylen); in blake2s_hmac()
215 memcpy(x_key, key, keylen); in blake2s_hmac()
/openbsd-src/lib/libutil/
H A Dbcrypt_pbkdf.c99 uint8_t *key, size_t keylen, unsigned int rounds) in bcrypt_pbkdf() argument
109 size_t origkeylen = keylen; in bcrypt_pbkdf()
114 if (passlen == 0 || saltlen == 0 || keylen == 0 || in bcrypt_pbkdf()
115 keylen > sizeof(out) * sizeof(out)) in bcrypt_pbkdf()
117 stride = (keylen + sizeof(out) - 1) / sizeof(out); in bcrypt_pbkdf()
118 amt = (keylen + stride - 1) / stride; in bcrypt_pbkdf()
127 for (count = 1; keylen > 0; count++) { in bcrypt_pbkdf()
154 amt = MINIMUM(amt, keylen); in bcrypt_pbkdf()
161 keylen -= i; in bcrypt_pbkdf()
173 arc4random_buf(key, keylen); in bcrypt_pbkdf()
/openbsd-src/usr.sbin/unbound/sldns/
H A Dkeyraw.c535 sldns_gost2pkey_raw(unsigned char* key, size_t keylen) in sldns_gost2pkey_raw() argument
544 if(keylen != 64) { in sldns_gost2pkey_raw()
560 sldns_ecdsa2pkey_raw(unsigned char* key, size_t keylen, uint8_t algo) in sldns_ecdsa2pkey_raw() argument
572 if(keylen != 2*256/8) return NULL; in sldns_ecdsa2pkey_raw()
575 if(keylen != 2*384/8) return NULL; in sldns_ecdsa2pkey_raw()
580 if(keylen+1 > sizeof(buf)) { /* sanity check */ in sldns_ecdsa2pkey_raw()
585 memmove(buf+1, key, keylen); in sldns_ecdsa2pkey_raw()
592 !OSSL_PARAM_BLD_push_octet_string(param_bld, "pub", buf, keylen+1)) { in sldns_ecdsa2pkey_raw()
624 if(keylen != 2*256/8) return NULL; in sldns_ecdsa2pkey_raw()
627 if(keylen != 2*384/8) return NULL; in sldns_ecdsa2pkey_raw()
[all …]
/openbsd-src/sbin/unwind/libunbound/sldns/
H A Dkeyraw.c535 sldns_gost2pkey_raw(unsigned char* key, size_t keylen) in sldns_gost2pkey_raw() argument
544 if(keylen != 64) { in sldns_gost2pkey_raw()
560 sldns_ecdsa2pkey_raw(unsigned char* key, size_t keylen, uint8_t algo) in sldns_ecdsa2pkey_raw() argument
572 if(keylen != 2*256/8) return NULL; in sldns_ecdsa2pkey_raw()
575 if(keylen != 2*384/8) return NULL; in sldns_ecdsa2pkey_raw()
580 if(keylen+1 > sizeof(buf)) { /* sanity check */ in sldns_ecdsa2pkey_raw()
585 memmove(buf+1, key, keylen); in sldns_ecdsa2pkey_raw()
592 !OSSL_PARAM_BLD_push_octet_string(param_bld, "pub", buf, keylen+1)) { in sldns_ecdsa2pkey_raw()
624 if(keylen != 2*256/8) return NULL; in sldns_ecdsa2pkey_raw()
627 if(keylen != 2*384/8) return NULL; in sldns_ecdsa2pkey_raw()
[all …]
/openbsd-src/sys/lib/libsa/
H A Dbcrypt_pbkdf.c97 uint8_t *key, size_t keylen, unsigned int rounds) in bcrypt_pbkdf() argument
107 size_t origkeylen = keylen; in bcrypt_pbkdf()
112 if (passlen == 0 || saltlen == 0 || keylen == 0 || in bcrypt_pbkdf()
113 keylen > sizeof(out) * sizeof(out)) in bcrypt_pbkdf()
115 stride = (keylen + sizeof(out) - 1) / sizeof(out); in bcrypt_pbkdf()
116 amt = (keylen + stride - 1) / stride; in bcrypt_pbkdf()
125 for (count = 1; keylen > 0; count++) { in bcrypt_pbkdf()
152 amt = MINIMUM(amt, keylen); in bcrypt_pbkdf()
159 keylen -= i; in bcrypt_pbkdf()
/openbsd-src/gnu/gcc/gcc/
H A Dprefix.c191 int keylen; in translate_name() local
199 for (keylen = 0; in translate_name()
200 (name[keylen + 1] != 0 && !IS_DIR_SEPARATOR (name[keylen + 1])); in translate_name()
201 keylen++) in translate_name()
204 key = (char *) alloca (keylen + 1); in translate_name()
205 strncpy (key, &name[1], keylen); in translate_name()
206 key[keylen] = 0; in translate_name()
226 name = concat (prefix, &name[keylen + 1], NULL); in translate_name()
/openbsd-src/gnu/usr.bin/gcc/gcc/
H A Dprefix.c190 int keylen; local
198 for (keylen = 0;
199 (name[keylen + 1] != 0 && !IS_DIR_SEPARATOR (name[keylen + 1]));
200 keylen++)
203 key = (char *) alloca (keylen + 1);
204 strncpy (key, &name[1], keylen);
205 key[keylen] = 0;
225 name = concat (prefix, &name[keylen + 1], NULL);
/openbsd-src/lib/libc/yp/
H A Dypmatch_cache.c46 int keylen, vallen; member
53 ypmatch_add(const char *map, const char *key, u_int keylen, char *val, in ypmatch_add() argument
60 if (keylen == 0 || vallen == 0) in ypmatch_add()
67 (newkey = malloc(keylen)) == NULL || in ypmatch_add()
96 (void)memcpy(newkey, key, keylen); in ypmatch_add()
101 ep->keylen = keylen; in ypmatch_add()
108 ypmatch_find(const char *map, const char *key, u_int keylen, char **val, in ypmatch_find() argument
120 if (ep->keylen != keylen) in ypmatch_find()
124 if (memcmp(ep->key, key, keylen)) in ypmatch_find()
/openbsd-src/regress/lib/libcrypto/aeswrap/
H A Daes_wrap.c66 const unsigned char *key, int keylen) in AES_wrap_unwrap_test() argument
72 otmp = malloc(keylen + 8); in AES_wrap_unwrap_test()
73 ptmp = malloc(keylen); in AES_wrap_unwrap_test()
78 r = AES_wrap_key(&wctx, iv, otmp, key, keylen); in AES_wrap_unwrap_test()
82 if (eout && memcmp(eout, otmp, keylen)) in AES_wrap_unwrap_test()
91 if (memcmp(key, ptmp, keylen)) in AES_wrap_unwrap_test()
/openbsd-src/sbin/isakmpd/
H A Ddnssec.c64 dns_get_key(int type, struct message *msg, int *keylen) in dns_get_key() argument
226 *keylen = key_rr.datalen; in dns_get_key()
237 dns_RSA_dns_to_x509(u_int8_t *key, int keylen, RSA **rsa_key) in dns_RSA_dns_to_x509() argument
243 if (!key || keylen <= 0) { in dns_RSA_dns_to_x509()
257 if (keylen < 3) { in dns_RSA_dns_to_x509()
265 if (e_len > (keylen - key_offset)) { in dns_RSA_dns_to_x509()
275 rsa->n = BN_bin2bn(key + key_offset, keylen - key_offset, NULL); in dns_RSA_dns_to_x509()
286 dns_RSA_x509_to_dns(RSA *rsa_key, u_int8_t *key, int *keylen) in dns_RSA_x509_to_dns() argument
/openbsd-src/usr.sbin/unbound/validator/
H A Dval_secalgo.c544 * @param keylen: length of key.
549 unsigned char* key, size_t keylen) in setup_key_digest()
555 *evp_key = sldns_key_dsa2pkey_raw(key, keylen); in setup_key_digest()
580 *evp_key = sldns_key_rsa2pkey_raw(key, keylen); in setup_key_digest()
606 *evp_key = sldns_key_rsa2pkey_raw(key, keylen); in setup_key_digest()
616 *evp_key = sldns_gost2pkey_raw(key, keylen); in setup_key_digest()
632 *evp_key = sldns_ecdsa2pkey_raw(key, keylen, in setup_key_digest()
646 *evp_key = sldns_ecdsa2pkey_raw(key, keylen, in setup_key_digest()
662 *evp_key = sldns_ed255192pkey_raw(key, keylen); in setup_key_digest()
673 *evp_key = sldns_ed4482pkey_raw(key, keylen); in setup_key_digest()
546 setup_key_digest(int algo,EVP_PKEY ** evp_key,const EVP_MD ** digest_type,unsigned char * key,size_t keylen) setup_key_digest() argument
733 verify_canonrrset(sldns_buffer * buf,int algo,unsigned char * sigblock,unsigned int sigblock_len,unsigned char * key,unsigned int keylen,char ** reason) verify_canonrrset() argument
1236 nss_setup_key_digest(int algo,SECKEYPublicKey ** pubkey,HASH_HashType * htype,unsigned char * key,size_t keylen,unsigned char ** prefix,size_t * prefixlen) nss_setup_key_digest() argument
1376 verify_canonrrset(sldns_buffer * buf,int algo,unsigned char * sigblock,unsigned int sigblock_len,unsigned char * key,unsigned int keylen,char ** reason) verify_canonrrset() argument
1753 _verify_nettle_dsa(sldns_buffer * buf,unsigned char * sigblock,unsigned int sigblock_len,unsigned char * key,unsigned int keylen) _verify_nettle_dsa() argument
1842 _verify_nettle_rsa(sldns_buffer * buf,unsigned int digest_size,char * sigblock,unsigned int sigblock_len,uint8_t * key,unsigned int keylen) _verify_nettle_rsa() argument
1922 _verify_nettle_ecdsa(sldns_buffer * buf,unsigned int digest_size,unsigned char * sigblock,unsigned int sigblock_len,unsigned char * key,unsigned int keylen) _verify_nettle_ecdsa() argument
1988 _verify_nettle_ed25519(sldns_buffer * buf,unsigned char * sigblock,unsigned int sigblock_len,unsigned char * key,unsigned int keylen) _verify_nettle_ed25519() argument
2024 verify_canonrrset(sldns_buffer * buf,int algo,unsigned char * sigblock,unsigned int sigblock_len,unsigned char * key,unsigned int keylen,char ** reason) verify_canonrrset() argument
[all...]
/openbsd-src/sbin/unwind/libunbound/validator/
H A Dval_secalgo.c544 * @param keylen: length of key.
549 unsigned char* key, size_t keylen) in setup_key_digest()
555 *evp_key = sldns_key_dsa2pkey_raw(key, keylen); in setup_key_digest()
580 *evp_key = sldns_key_rsa2pkey_raw(key, keylen); in setup_key_digest()
606 *evp_key = sldns_key_rsa2pkey_raw(key, keylen); in setup_key_digest()
616 *evp_key = sldns_gost2pkey_raw(key, keylen); in setup_key_digest()
632 *evp_key = sldns_ecdsa2pkey_raw(key, keylen, in setup_key_digest()
646 *evp_key = sldns_ecdsa2pkey_raw(key, keylen, in setup_key_digest()
662 *evp_key = sldns_ed255192pkey_raw(key, keylen); in setup_key_digest()
673 *evp_key = sldns_ed4482pkey_raw(key, keylen); in setup_key_digest()
546 setup_key_digest(int algo,EVP_PKEY ** evp_key,const EVP_MD ** digest_type,unsigned char * key,size_t keylen) setup_key_digest() argument
733 verify_canonrrset(sldns_buffer * buf,int algo,unsigned char * sigblock,unsigned int sigblock_len,unsigned char * key,unsigned int keylen,char ** reason) verify_canonrrset() argument
1236 nss_setup_key_digest(int algo,SECKEYPublicKey ** pubkey,HASH_HashType * htype,unsigned char * key,size_t keylen,unsigned char ** prefix,size_t * prefixlen) nss_setup_key_digest() argument
1376 verify_canonrrset(sldns_buffer * buf,int algo,unsigned char * sigblock,unsigned int sigblock_len,unsigned char * key,unsigned int keylen,char ** reason) verify_canonrrset() argument
1753 _verify_nettle_dsa(sldns_buffer * buf,unsigned char * sigblock,unsigned int sigblock_len,unsigned char * key,unsigned int keylen) _verify_nettle_dsa() argument
1842 _verify_nettle_rsa(sldns_buffer * buf,unsigned int digest_size,char * sigblock,unsigned int sigblock_len,uint8_t * key,unsigned int keylen) _verify_nettle_rsa() argument
1922 _verify_nettle_ecdsa(sldns_buffer * buf,unsigned int digest_size,unsigned char * sigblock,unsigned int sigblock_len,unsigned char * key,unsigned int keylen) _verify_nettle_ecdsa() argument
1988 _verify_nettle_ed25519(sldns_buffer * buf,unsigned char * sigblock,unsigned int sigblock_len,unsigned char * key,unsigned int keylen) _verify_nettle_ed25519() argument
2024 verify_canonrrset(sldns_buffer * buf,int algo,unsigned char * sigblock,unsigned int sigblock_len,unsigned char * key,unsigned int keylen,char ** reason) verify_canonrrset() argument
[all...]
/openbsd-src/sys/net80211/
H A Dieee80211_pae_output.c260 u_int16_t info, keylen; in ieee80211_send_4way_msg1() local
283 keylen = ieee80211_cipher_keylen(ni->ni_rsncipher); in ieee80211_send_4way_msg1()
284 BE_WRITE_2(key->keylen, keylen); in ieee80211_send_4way_msg1()
340 int keylen; in ieee80211_send_4way_msg2() local
343 keylen = ieee80211_cipher_keylen(ni->ni_rsncipher); in ieee80211_send_4way_msg2()
344 BE_WRITE_2(key->keylen, keylen); in ieee80211_send_4way_msg2()
368 u_int16_t info, keylen; in ieee80211_send_4way_msg3() local
403 keylen = ieee80211_cipher_keylen(ni->ni_rsncipher); in ieee80211_send_4way_msg3()
404 BE_WRITE_2(key->keylen, keylen); in ieee80211_send_4way_msg3()
460 int keylen; in ieee80211_send_4way_msg4() local
[all …]
/openbsd-src/sbin/mount_vnd/
H A Dmount_vnd.c65 size_t keylen = 0; in main() local
108 if (key == NULL || (keylen = strlen(key)) == 0) in main()
112 keylen = BLF_MAXUTILIZED; in main()
114 rv = config(argv[1], argv[0], dp, key, keylen); in main()
187 config(char *dev, char *file, struct disklabel *dp, char *key, size_t keylen) in config() argument
203 vndio.vnd_keylen = keylen; in config()
216 explicit_bzero(key, keylen); in config()
/openbsd-src/regress/sys/crypto/aes/
H A Daestest.c141 do_tests(const char *filename, int test_num, u_char *key, u_int keylen, in do_tests() argument
148 if (docrypt(key, keylen, plaintext, result, textlen, 1) < 0) { in do_tests()
157 if (docrypt(key, keylen, ciphertext, result, textlen, 0) < 0) { in do_tests()
176 u_int keylen, textlen, tmp; in run_file() local
182 keylen = textlen = tmp = 0; in run_file()
242 parsehex(cp, &key, &keylen); in run_file()
243 if (keylen * 8 != (u_int)keysize) in run_file()
255 fail += do_tests(filename, test, key, keylen, in run_file()
/openbsd-src/usr.bin/dig/lib/dns/
H A Dhmac_link.c143 int keylen; in hmacsha1_fromdns() local
161 keylen = ISC_SHA1_DIGESTLENGTH; in hmacsha1_fromdns()
164 keylen = r.length; in hmacsha1_fromdns()
167 key->key_size = keylen * 8; in hmacsha1_fromdns()
287 int keylen; in hmacsha224_fromdns() local
305 keylen = ISC_SHA224_DIGESTLENGTH; in hmacsha224_fromdns()
308 keylen = r.length; in hmacsha224_fromdns()
311 key->key_size = keylen * 8; in hmacsha224_fromdns()
431 int keylen; in hmacsha256_fromdns() local
449 keylen = ISC_SHA256_DIGESTLENGTH; in hmacsha256_fromdns()
[all …]
/openbsd-src/lib/libcrypto/asn1/
H A Dp5_pbev2.c191 int alg_nid, keylen; in PKCS5_pbe2_set() local
233 keylen = EVP_CIPHER_key_length(cipher); in PKCS5_pbe2_set()
235 keylen = -1; in PKCS5_pbe2_set()
241 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen); in PKCS5_pbe2_set()
280 int keylen) in PKCS5_pbkdf2_set() argument
314 if (keylen > 0) { in PKCS5_pbkdf2_set()
317 if (!ASN1_INTEGER_set(kdf->keylength, keylen)) in PKCS5_pbkdf2_set()

12345