KEYLEN
oct.length = KEYLEN(pkey);
return KEYLEN(pkey);
if (ASN1_buf_print(bp, ecxkey->privkey, KEYLEN(pkey),
if (ASN1_buf_print(bp, ecxkey->pubkey, KEYLEN(pkey),
*ppt = OPENSSL_memdup(pkey->pkey.ecx->pubkey, KEYLEN(pkey));
return KEYLEN(pkey);
penc = OPENSSL_memdup(ecxkey->pubkey, KEYLEN(pkey));
V_ASN1_UNDEF, NULL, penc, KEYLEN(pkey))) {
return CRYPTO_memcmp(akey->pubkey, bkey->pubkey, KEYLEN(a)) == 0;
unsigned char key[KEYLEN];
if (!tls13_derive_key(s, md, gensecret, key, KEYLEN)) {
if (!TEST_mem_eq(key, KEYLEN, ref_key, KEYLEN))
if (!TEST_size_t_eq(sizeof(client_hts_key), KEYLEN))
if (!TEST_size_t_eq(sizeof(server_hts_key), KEYLEN))
if (!TEST_size_t_eq(sizeof(client_ats_key), KEYLEN))
if (!TEST_size_t_eq(sizeof(server_ats_key), KEYLEN))
const int keylen = KEYLEN(cfg->bits);
rc4_init(&d->rc4, d->key, KEYLEN(d->cfg.bits));
rc4_init(&d->rc4, d->key, KEYLEN(d->cfg.bits));
rc4_init(&d->rc4, d->key, KEYLEN(d->cfg.bits));
const int keylen = KEYLEN(bits);