Lines Matching refs:Length

117 	} else if (response_size != (response_header.Length + sizeof(PTHI_MESSAGE_HEADER))) {  in _verifyResponseHeader()
149 codeVerLen = response.Header.Header.Length - sizeof(AMT_STATUS); in _verifyCodeVersions()
159 len = response.CodeVersions.Versions[i].Description.Length; in _verifyCodeVersions()
167 len = response.CodeVersions.Versions[i].Version.Length; in _verifyCodeVersions()
437 policyName.Length = tmp_response->PolicyName.Length; in GetCurrentPowerPolicy()
438 policyName.Buffer = (CHAR *)malloc(policyName.Length * sizeof(CHAR)); in GetCurrentPowerPolicy()
443 policyName.Length * sizeof(CHAR)); in GetCurrentPowerPolicy()
463 ULONG ByteCount = response.Header.Header.Length; in _verifyCurrentPowerPolicy()
466 + response.PolicyName.Length)) in _verifyCurrentPowerPolicy()
626 ULONG ByteCount = response.Header.Header.Length; in _verifyGetDNSSuffixList()
771 remoteAccessStatus.MpsHostname.Length = tmp_response->MpsHostname.Length; in GetRemoteAccessConnectionStatus()
772 …remoteAccessStatus.MpsHostname.Buffer = (CHAR *)malloc(remoteAccessStatus.MpsHostname.Length * siz… in GetRemoteAccessConnectionStatus()
778 tmp_response->MpsHostname.Length * sizeof(CHAR)); in GetRemoteAccessConnectionStatus()
798 ULONG ByteCount = response.Header.Header.Length; in _verifyRemoteAccessConnectionStatus()
801 + response.MpsHostname.Length)) in _verifyRemoteAccessConnectionStatus()
959 UINT32 msgLength = sizeof(passwordOTP.Length) + (passwordOTP.Length * sizeof(CHAR)); in SetProvisioningServerOTP()
972 …d + sizeof(SET_PROVISIONING_SERVER_OTP_HEADER), &(passwordOTP.Length), sizeof(passwordOTP.Length)); in SetProvisioningServerOTP()
973 memcpy(command + sizeof(SET_PROVISIONING_SERVER_OTP_HEADER) + sizeof(passwordOTP.Length), in SetProvisioningServerOTP()
974 passwordOTP.Buffer, passwordOTP.Length); in SetProvisioningServerOTP()
1005 UINT32 msgLength = sizeof(dnsSuffix.Length) + (dnsSuffix.Length * sizeof(CHAR)); in SetDnsSuffix()
1018 memcpy(command + sizeof(SET_DNS_SUFFIX_HEADER), &(dnsSuffix.Length), sizeof(dnsSuffix.Length)); in SetDnsSuffix()
1019 …and + sizeof(SET_DNS_SUFFIX_HEADER) + sizeof(dnsSuffix.Length), dnsSuffix.Buffer, dnsSuffix.Length in SetDnsSuffix()
1064 hashHandles.Length = tmp_response->HashHandles.Length; in EnumerateHashHandles()
1065 if (CERT_HASH_MAX_NUMBER < hashHandles.Length) in EnumerateHashHandles()
1071 …emcpy(hashHandles.Handles, tmp_response->HashHandles.Handles, sizeof(UINT32) * hashHandles.Length); in EnumerateHashHandles()
1091 ULONG ByteCount = response.Header.Header.Length; in _verifyHashHandles()
1094 …sizeof(AMT_STATUS) + sizeof(response.HashHandles.Length) + (sizeof(UINT32) * response.HashHandles. in _verifyHashHandles()
1133 hashEntry.Name.Length = tmp_response->Hash.Name.Length; in GetCertificateHashEntry()
1136 hashEntry.Name.Buffer = (CHAR *)malloc(hashEntry.Name.Length * sizeof(CHAR)); in GetCertificateHashEntry()
1142 …memcpy(hashEntry.Name.Buffer, &(tmp_response->Hash.Name.Buffer), hashEntry.Name.Length * sizeof(CH… in GetCertificateHashEntry()
1161 ULONG ByteCount = response.Header.Header.Length; in _verifyGetCertificateHashEntry()
1165 - sizeof(CHAR *) + response.Hash.Name.Length)) in _verifyGetCertificateHashEntry()
1201 dnsSuffix.Length = tmp_response->Suffix.Length; in GetDnsSuffix()
1202 dnsSuffix.Buffer = (CHAR *)malloc(dnsSuffix.Length * sizeof(CHAR)); in GetDnsSuffix()
1208 memcpy(dnsSuffix.Buffer, &(tmp_response->Suffix.Buffer), dnsSuffix.Length * sizeof(CHAR)); in GetDnsSuffix()
1227 ULONG ByteCount = response.Header.Header.Length; in _verifyGetDnsSuffix()
1230 sizeof(AMT_STATUS) + sizeof(response.Suffix.Length) + response.Suffix.Length * sizeof(CHAR)) in _verifyGetDnsSuffix()