Lines Matching defs:length

122     if (data->length % PAC_ALIGNMENT)
123 pad = PAC_ALIGNMENT - (data->length % PAC_ALIGNMENT);
126 pac->data.length + PAC_INFO_BUFFER_LENGTH + data->length + pad);
139 pac->data.length - header_len);
144 pac->pac->Buffers[i].cbBufferSize = data->length;
145 pac->pac->Buffers[i].Offset = pac->data.length + PAC_INFO_BUFFER_LENGTH;
150 memset(pac->data.data + pac->pac->Buffers[i].Offset, 0, data->length);
152 memcpy(pac->data.data + pac->pac->Buffers[i].Offset, data->data, data->length);
154 memset(pac->data.data + pac->pac->Buffers[i].Offset + data->length, 0, pad);
157 pac->data.length += PAC_INFO_BUFFER_LENGTH + data->length + pad;
161 out_data->length = data->length;
187 memset(pac->data.data, 0, pac->data.length);
236 assert(buffer->Offset + buffer->cbBufferSize <= pac->data.length);
239 data->length = buffer->cbBufferSize;
262 data->data = malloc(d.length);
266 data->length = d.length;
267 memcpy(data->data, d.data, d.length);
317 pac->data.length = PACTYPE_LENGTH;
318 pac->data.data = calloc(1, pac->data.length);
393 "PAC type length is out of range (len=%zd)",
468 pac->data.length = len;
526 if (client_info.length < PAC_CLIENT_INFO_LENGTH) {
529 "PAC client info length out of range "
530 "(info len=%d)", client_info.length);
544 if (client_info.length < PAC_CLIENT_INFO_LENGTH + pac_princname_length ||
548 "PAC client info length is out of range");
619 assert(data->length >= pac->data.length);
636 if (buffer->Offset + buffer->cbBufferSize > pac->data.length)
667 if (checksum_data.length < PAC_SIGNATURE_DATA_LENGTH)
672 checksum.length = checksum_data.length - PAC_SIGNATURE_DATA_LENGTH;
677 pac_data.length = pac->data.length;
678 pac_data.data = malloc(pac->data.length);
682 memcpy(pac_data.data, pac->data.data, pac->data.length);
735 if (privsvr_checksum.length < PAC_SIGNATURE_DATA_LENGTH)
743 if (server_checksum.length < PAC_SIGNATURE_DATA_LENGTH)
748 checksum.length = privsvr_checksum.length - PAC_SIGNATURE_DATA_LENGTH;
752 server_checksum.length -= PAC_SIGNATURE_DATA_LENGTH;
835 client_info.length = PAC_CLIENT_INFO_LENGTH + princ_name_ucs2_len;
890 if (cksumdata.length != PAC_SIGNATURE_DATA_LENGTH + len)
893 memset(cksumdata.data, 0, cksumdata.length);
896 cksumdata.length = PAC_SIGNATURE_DATA_LENGTH + len;
922 assert(pac->data.length >= header_len);
942 assert(buffer->Offset + buffer->cbBufferSize <= pac->data.length);
946 buffer->Offset + buffer->cbBufferSize > pac->data.length ||
974 data->length = 0;
1005 assert(server_cksum.length > PAC_SIGNATURE_DATA_LENGTH);
1012 iov[1].data.length = server_cksum.length - PAC_SIGNATURE_DATA_LENGTH;
1026 assert(privsvr_cksum.length > PAC_SIGNATURE_DATA_LENGTH);
1030 iov[0].data.length = server_cksum.length - PAC_SIGNATURE_DATA_LENGTH;
1034 iov[1].data.length = privsvr_cksum.length - PAC_SIGNATURE_DATA_LENGTH;
1042 data->data = malloc(pac->data.length);
1046 data->length = pac->data.length;
1048 memcpy(data->data, pac->data.data, pac->data.length);
1129 authdata[0]->length, &pacctx->pac);
1169 authdata[0]->length = data.length;
1270 if (attr->length == mspac_attribute_types[i].attribute.length &&
1271 strncasecmp(attr->data, mspac_attribute_types[i].attribute.data, attr->length) == 0) {
1277 if (attr->length > STRLENOF("urn:mspac:") &&
1333 int length;
1335 length = asprintf(&attrs[j].data, "urn:mspac:%d",
1337 if (length < 0) {
1341 attrs[j++].length = length;
1345 attrs[j].length = 0;
1370 display_value->length = 0;
1428 code = krb5_pac_parse(kcontext, value->data, value->length, &newpac);
1462 pacctx->pac->data.length, &pac);
1496 *sizep += pacctx->pac->data.length;
1525 krb5_ser_pack_int32((krb5_int32)pacctx->pac->data.length,
1528 (size_t)pacctx->pac->data.length,
1536 krb5_ser_pack_int32(0, &bp, &remain); /* length */
1564 /* length */