Lines Matching refs:length
36 clearpw.length = strlen(passwd);
43 packet->length = 6 + ap_req->length + cipherpw.length;
44 packet->data = (char *) malloc(packet->length);
52 /* length */
54 *ptr++ = (packet->length>> 8) & 0xff;
55 *ptr++ = packet->length & 0xff;
65 /* ap_req length, big-endian */
67 *ptr++ = (ap_req->length>>8) & 0xff;
68 *ptr++ = ap_req->length & 0xff;
72 memcpy(ptr, ap_req->data, ap_req->length);
73 ptr += ap_req->length;
77 memcpy(ptr, cipherpw.data, cipherpw.length);
101 if (packet->length < 4)
108 /* verify length */
113 if (plen != packet->length)
150 /* read, check ap-rep length */
152 ap_rep.length = (*ptr++ & 0xff);
153 ap_rep.length = (ap_rep.length<<8) | (*ptr++ & 0xff);
155 if (ptr + ap_rep.length >= packet->data + packet->length)
158 if (ap_rep.length) {
161 ptr += ap_rep.length;
181 cipherresult.length = (packet->data + packet->length) - ptr;
198 cipherresult.length = (packet->data + packet->length) - ptr;
206 if (clearresult.length < 2) {
231 if ((ap_rep.length == 0) && (local_result_code == KRB5_KPASSWD_SUCCESS)) {
236 result_data->length = (clearresult.data + clearresult.length) - ptr;
238 if (result_data->length) {
239 result_data->data = (char *) malloc(result_data->length);
244 memcpy(result_data->data, ptr, result_data->length);
252 if (ap_rep.length) {