Lines Matching refs:vallen
380 vp->vallen = htonl(sizeof(struct autokey));
435 u_int vallen = 0; /* value length */
495 vallen = ntohl(ep->vallen);
499 if ( vallen == 0
500 || len - VALUE_LEN < vallen)
554 if (vallen == 0 || vallen > MAXHOSTNAME ||
555 len - VALUE_LEN < vallen) {
623 peer->subject = emalloc(vallen + 1);
624 memcpy(peer->subject, ep->pkt, vallen);
625 peer->subject[vallen] = '\0';
680 ntohl(xinfo->cert.vallen));
828 if (vallen == (u_int)EVP_PKEY_size(host_pkey)) {
836 if (RSA_private_decrypt(vallen,
984 (vallen != 3*sizeof(uint32_t)) )
1101 u_int vallen;
1150 vtemp.vallen = ep->vallen;
1181 vallen = exten_payload_size(ep); /* Must be <64k */
1182 if (vallen == 0 || vallen >= sizeof(certname) ) {
1193 memcpy(certname, ep->pkt, vallen);
1194 certname[vallen] = '\0';
1332 vallen = ntohl(ep->vallen); /* Must be <64k */
1333 if ( vallen == 0
1334 || (vallen >= MAX_VALLEN)
1335 || (opcode & 0x0000ffff) < VALUE_LEN + vallen) {
1343 if ((rval = crypto_encrypt((const u_char *)ep->pkt, vallen, &tcookie, &vtemp))
1434 u_int vallen; /* value length */
1476 vallen = ntohl(ep->vallen);
1477 if ( vallen == 0
1478 || vallen > MAX_VALLEN)
1481 i = (vallen + 3) / 4;
1485 || len - VALUE_LEN < ((vallen + 3) / 4) * 4
1486 || len - VALUE_LEN - ((vallen + 3) / 4) * 4
1546 EVP_VerifyUpdate(ctx, (u_char *)&ep->tstamp, vallen +
1548 sizeof(ep->vallen));
1572 u_int vallen, /* Length of Public Key */
1587 pkey = d2i_PublicKey(EVP_PKEY_RSA, NULL, &ptr, vallen);
1601 vallen = EVP_PKEY_size(pkey);
1602 vp->vallen = htonl(vallen);
1603 vp->ptr = emalloc(vallen);
1626 EVP_SignUpdate(ctx, vp->ptr, vallen);
1627 if (EVP_SignFinal(ctx, vp->sig, &vallen, sign_pkey)) {
1628 INSIST(vallen <= sign_siglen);
1629 vp->siglen = htonl(vallen);
1735 ep->vallen = 0;
1737 ep->vallen = htonl(slen);
1761 u_int len, vallen, siglen, opcode;
1769 vallen = ntohl(vp->vallen);
1770 INSIST(vallen <= MAX_VALLEN);
1771 len += ((vallen + 3) / 4 + 1) * 4;
1782 ep->vallen = vp->vallen;
1789 if (vallen > 0 && vp->ptr != NULL) {
1790 j = vallen / 4;
1791 if (j * 4 < vallen)
1793 memcpy(&ep->pkt[i], vp->ptr, vallen);
1855 if (pubkey.vallen != 0) {
1862 EVP_SignUpdate(ctx, pubkey.ptr, ntohl(pubkey.vallen));
1883 ntohl(cp->cert.vallen));
1909 if (tai_leap.ptr == NULL || ntohl(tai_leap.vallen) != len) {
1912 tai_leap.vallen = htonl(len);
1970 if (tai_leap.ptr == NULL || ntohl(tai_leap.vallen) != len)
2200 vp->vallen = htonl(len);
2314 vp->vallen = htonl(len);
2393 len = ntohl(ep->vallen);
2538 vp->vallen = htonl(len);
2640 vp->vallen = htonl(len);
2717 len = ntohl(ep->vallen);
2880 vp->vallen = htonl(len);
2990 vp->vallen = htonl(len);
3066 len = ntohl(ep->vallen);
3241 vp->vallen = htonl(len);
3289 if ((cp = cert_parse((u_char *)ep->pkt, (long)ntohl(ep->vallen),
3394 cert = d2i_X509(NULL, &ptr, ntohl(xp->cert.vallen));
3616 ret->cert.vallen = htonl(len);
3979 pubkey.vallen = htonl(len);
4017 hostval.vallen = htonl(strlen(cinfo->subject));
4150 head_size = (BPTR)(&ep->vallen + 1) - (BPTR)ep;
4153 data_size = (uint32_t)ntohl(ep->vallen);