Lines Matching full:len
527 mytce.modulus.len = sizeof (wkmodulus);
529 mytce.generator.len = 1;
547 tpw.pebuf.password.len = t_fromb64((char *)tpw.pwbuf,
550 tpw.pebuf.salt.len = t_fromb64((char *)tpw.saltbuf,
732 PUTCHAR(ts->s.len, outp);
733 BCOPY(ts->s.data, outp, ts->s.len);
734 INCPTR(ts->s.len, outp);
736 if (ts->g.len == 1 && ts->g.data[0] == 2) {
739 PUTCHAR(ts->g.len, outp);
740 BCOPY(ts->g.data, outp, ts->g.len);
741 INCPTR(ts->g.len, outp);
744 if (ts->n.len != sizeof (wkmodulus) ||
746 BCOPY(ts->n.data, outp, ts->n.len);
747 INCPTR(ts->n.len, outp);
757 BCOPY(ts->B.data, outp, ts->B.len);
758 INCPTR(ts->B.len, outp);
1248 write_pseudonym(esp, inp, len, id)
1251 int len, id;
1257 int dsize, fd, olen = len;
1264 while (len > 0) {
1265 if ((dsize = len % SHA_DIGESTSIZE) == 0)
1267 len -= dsize;
1268 datp = inp + len;
1272 if (len > 0) {
1295 len = write(fd, inp + 1, *inp);
1296 if (close(fd) != -1 && len == *inp) {
1310 eap_request(esp, inp, id, len)
1314 int len;
1349 if (len <= 0) {
1355 len--;
1359 if (len > 0)
1360 info("EAP: Identity prompt \"%.*q\"", len, inp);
1370 len = read(fd, rhostname + SRP_PSEUDO_LEN,
1373 if (len > 0) {
1375 rhostname, len + SRP_PSEUDO_LEN);
1378 if (len > 0)
1393 if (len > 0)
1394 info("EAP: Notification \"%.*q\"", len, inp);
1408 if (len < 1) {
1414 len--;
1415 if (vallen < 8 || vallen > len) {
1417 vallen, len);
1424 if (vallen >= len + sizeof (rhostname)) {
1429 BCOPY(inp + vallen, rhostname, len - vallen);
1430 rhostname[len - vallen] = '\0';
1435 (remote_name[0] != '\0' && vallen == len))
1461 if (len < 1) {
1469 len--;
1491 len--;
1492 if (vallen >= len) {
1501 len -= vallen;
1519 len--;
1520 if (vallen >= len) {
1527 sval.len = vallen;
1529 len -= vallen;
1532 len--;
1533 if (vallen > len) {
1542 gval.len = 1;
1545 gval.len = vallen;
1548 len -= vallen;
1554 if (len == 0) {
1556 Nval.len = sizeof (wkmodulus);
1559 Nval.len = len;
1576 Ap->len);
1609 Bval.len = len;
1643 len -= sizeof (u_int32_t) + SHA_DIGESTSIZE;
1644 if (len < 0 || t_clientverify(tc, inp +
1652 if (len > 0 && esp->es_usepseudo) {
1654 write_pseudonym(esp, inp, len, id);
1666 if (len < 4) {
1675 SHA1Update(&ctxt, inp, len);
1720 eap_response(esp, inp, id, len)
1724 int len;
1748 if (len <= 0) {
1754 len--;
1759 dbglog("EAP discarding unwanted Identify \"%.q\"", len,
1763 info("EAP: unauthenticated peer name \"%.*q\"", len, inp);
1767 esp->es_server.ea_peer = malloc(len + 1);
1773 BCOPY(inp, esp->es_server.ea_peer, len);
1774 esp->es_server.ea_peer[len] = '\0';
1775 esp->es_server.ea_peerlen = len;
1784 if (len < 1) {
1791 len--;
1836 if (len < 1) {
1842 len--;
1843 if (vallen != 16 || vallen > len) {
1850 if (vallen >= len + sizeof (rhostname)) {
1855 BCOPY(inp + vallen, rhostname, len - vallen);
1856 rhostname[len - vallen] = '\0';
1861 (remote_name[0] != '\0' && vallen == len))
1893 if (len < 1) {
1899 len--;
1908 A.len = len;
1927 if (len < sizeof (u_int32_t) + SHA_DIGESTSIZE) {
1928 error("EAP: M1 length %d < %d", len,
1966 len != SHA_DIGESTSIZE) {
2015 eap_success(esp, inp, id, len)
2019 int len;
2032 if (len > 0) {
2034 PRINTMSG(inp, len);
2045 eap_failure(esp, inp, id, len)
2049 int len;
2061 if (len > 0) {
2063 PRINTMSG(inp, len);
2083 int len;
2095 GETSHORT(len, inp);
2096 if (len < EAP_HEADERLEN || len > inlen) {
2097 error("EAP: packet has illegal length field %d (%d..%d)", len,
2101 len -= EAP_HEADERLEN;
2106 eap_request(esp, inp, id, len);
2110 eap_response(esp, inp, id, len);
2114 eap_success(esp, inp, id, len);
2118 eap_failure(esp, inp, id, len);
2150 int code, id, len, rtype, vallen;
2159 GETSHORT(len, inp);
2160 if (len < EAP_HEADERLEN || len > inlen)
2168 len -= EAP_HEADERLEN;
2171 if (len < 1) {
2176 len--;
2185 if (len > 0) {
2187 print_string((char *)inp, len, printer, arg);
2189 INCPTR(len, inp);
2190 len = 0;
2197 if (len <= 0)
2200 len--;
2201 if (vallen > len)
2205 len -= vallen;
2206 if (len > 0) {
2208 print_string((char *)inp, len, printer, arg);
2210 INCPTR(len, inp);
2211 len = 0;
2218 if (len < 3)
2221 len--;
2226 len--;
2227 if (vallen >= len)
2238 len -= vallen;
2240 len--;
2241 if (vallen >= len)
2245 len -= vallen;
2247 len--;
2248 if (vallen > len)
2256 len -= vallen;
2257 if (len == 0) {
2260 printer(arg, " <N%.*B>", len, inp);
2261 INCPTR(len, inp);
2262 len = 0;
2267 printer(arg, " <B%.*B>", len, inp);
2268 INCPTR(len, inp);
2269 len = 0;
2273 if (len < sizeof (u_int32_t))
2276 len -= sizeof (u_int32_t);
2284 if ((vallen = len) > SHA_DIGESTSIZE)
2286 printer(arg, " <M2%.*B%s>", len, inp,
2287 len < SHA_DIGESTSIZE ? "?" : "");
2289 len -= vallen;
2290 if (len > 0) {
2291 printer(arg, " <PN%.*B>", len, inp);
2292 INCPTR(len, inp);
2293 len = 0;
2298 printer(arg, " <Challenge%.*B>", len, inp);
2299 INCPTR(len, inp);
2300 len = 0;
2308 if (len < 1)
2311 len--;
2319 if (len > 0) {
2321 print_string((char *)inp, len, printer, arg);
2323 INCPTR(len, inp);
2324 len = 0;
2329 if (len <= 0) {
2334 len--;
2343 if (len <= 0) {
2348 len--;
2349 if (vallen > len)
2353 len -= vallen;
2354 if (len > 0) {
2356 print_string((char *)inp, len, printer, arg);
2358 INCPTR(len, inp);
2359 len = 0;
2366 if (len < 1)
2369 len--;
2373 printer(arg, " <A%.*B>", len, inp);
2374 INCPTR(len, inp);
2375 len = 0;
2379 if (len < sizeof (u_int32_t))
2382 len -= sizeof (u_int32_t);
2390 printer(arg, " <M1%.*B%s>", len, inp,
2391 len == SHA_DIGESTSIZE ? "" : "?");
2392 INCPTR(len, inp);
2393 len = 0;
2400 printer(arg, " <Response%.*B%s>", len, inp,
2401 len == SHA_DIGESTSIZE ? "" : "?");
2402 if ((vallen = len) > SHA_DIGESTSIZE)
2405 len -= vallen;
2421 if (len > 8)
2423 else if (len > 0)
2424 printer(arg, "%.*B", len, inp);
2425 INCPTR(len, inp);