Lines Matching refs:len

204 #define	STR_DATA_LEN(len)	((len) * 2 + PREAMBLE_SIZE + POSTAMBLE_SIZE)
408 reply_to_client(AuthInfo *ap, int type, void *data, int len)
414 if (len == -1 && data != NULL)
415 len = strlen((char *)data);
416 else if (len > (sizeof (reply) - 9)) {
418 "krb5 auth reply length too large (%d)", len);
422 len);
425 len = 0;
434 while (len-- > 0) {
1837 encrypt_reply(char *data, int len)
1846 "\t(encrypt_reply) ENCRYPT REPLY %s %s [len=%d]\n",
1849 "CFB64_IV_BAD"), len);
1926 * so it should be an error if the len > 1 or the keyid != 0.
1932 "len=%d value=%d\n", *keyidlen, *keyid);
1968 int len, int dir)
1970 if (len > TELNET_MAXNUMKEYS) {
1973 "\t(keyid) keylen too big (%d)\n", len);
1978 (void) fprintf(stderr, "\t(keyid) set KEYID for %s len = %d\n",
1980 "DECRYPT"), len);
1983 if (len == 0) {
1994 } else if (len != *keyidlen || memcmp(keyid, newkeyid, len)) {
1998 len);
2000 *keyidlen = len;
2001 (void) memcpy(newkeyid, keyid, len);
2466 getauthtype(char *username, int *len)
2529 /* status = auth_wait(username, len); */
2548 username, *len, auth_status);
2755 int len;
2942 len = sizeof (username);
2949 auth_status = getauthtype(username, &len);
4577 if (ctlbuf.len <= 0) {
4578 return (datbuf.len);
4627 hdr.len = sizeof (exd_req);
4630 dat.len = count;
4743 int len;
4751 len = np - name;
4753 if (strncmp(c, name, len) == 0 && c[len] == '=') {
4755 return (c + len + 1);
4893 int len;
4898 if ((len = vsnprintf(argp, sizeof (argp), format, args)) == -1)
4901 write_data_len(argp, len);
4906 write_data_len(const char *buf, int len)
4911 while (len > 0) {
4916 if ((len > BUFSIZ ? BUFSIZ : len) > remaining) {
4921 copied = remaining > len ? len : remaining;
4924 len -= copied;