ASN1_STRING_length
*data_len = ASN1_STRING_length(*octets);
const int snl = ASN1_STRING_length(serialNumber);
idlen = ASN1_STRING_length(scid);
int disabled = ASN1_STRING_length(encoded) <= 2; /* indicating "none" */
if (gtype == GEN_URI && ASN1_STRING_length(uri) > 6) {
ASN1_STRING_length(kdf->salt),
ASN1_STRING_length(pbkdf2_param->salt->value.octet_string));
tmac != NULL ? ASN1_STRING_length(tmac) : 0L,
tsalt != NULL ? ASN1_STRING_length(tsalt) : 0L);
length += ASN1_STRING_length(current);
length = ASN1_STRING_length(current);
ret = ASN1_STRING_length(a->value.octet_string);
int ret = ASN1_STRING_length(oct), n;
*ppklen = ASN1_STRING_length(p8->pkey);
ASN1_STRING_length(text),
plen = ASN1_STRING_length(parameter);
dukmlen = ASN1_STRING_length(ukm);
dukmlen = ASN1_STRING_length(ukm);
plen = ASN1_STRING_length(pubkey);
plen = ASN1_STRING_length(pubkey);
plen = ASN1_STRING_length(parameter);
ASN1_STRING_length(secret))
labellen = ASN1_STRING_length(parameter);
ASN1_STRING_length(pkey))
pub_oct_len = ASN1_STRING_length(priv_key->publicKey);
plen = ASN1_STRING_length(oct);
ret = (ASN1_STRING_length(respid->value.byKey) == SHA_DIGEST_LENGTH)
if ((maclen != (unsigned int)ASN1_STRING_length(macoct))
ASN1_STRING_length(msg), 4);
ret = len_a == (unsigned)ASN1_STRING_length(b->hashed_msg) && memcmp(imprint_a, ASN1_STRING_get0_data(b->hashed_msg), len_a) == 0;
ret->imprint_len = ASN1_STRING_length(msg);
ASN1_STRING_length(keybstr), SHA1md, NULL, md, NULL))
if (ASN1_STRING_length(ikeyid) == 0) /* indicating "none" */ {
extlen = ASN1_STRING_length(extvalue);
extlen = ASN1_STRING_length(extoct);
int ASN1_STRING_length(const ASN1_STRING *x);
plen = ASN1_STRING_length(oct);
|| !TEST_int_eq(ASN1_STRING_length(ip), len)
nslen = (size_t)ASN1_STRING_length(name->d.ia5);