Lines Matching refs:len

278 	int len;
290 len = hdr->length - sizeof(struct radius_attr_hdr);
295 printf_encode(buf, sizeof(buf), pos, len);
300 if (len == 4) {
307 len);
313 if (len == 16) {
321 len);
328 wpa_snprintf_hex(buf, sizeof(buf), pos, len);
333 if (len == 4)
338 len);
399 size_t len[4];
416 len[0] = 1 + 1 + 2;
418 len[1] = MD5_MAC_LEN;
420 len[2] = wpabuf_len(msg->buf) - sizeof(struct radius_hdr);
422 len[3] = secret_len;
423 md5_vector(4, addr, len, msg->hdr->authenticator);
439 size_t len[2];
458 len[0] = wpabuf_len(msg->buf);
460 len[1] = secret_len;
461 if (md5_vector(2, addr, len, msg->hdr->authenticator) < 0)
477 size_t len[2];
482 len[0] = wpabuf_len(msg->buf);
484 len[1] = secret_len;
485 md5_vector(2, addr, len, msg->hdr->authenticator);
498 size_t len[2];
503 len[0] = wpabuf_len(msg->buf);
505 len[1] = secret_len;
506 md5_vector(2, addr, len, msg->hdr->authenticator);
519 size_t len[4];
525 len[0] = sizeof(struct radius_hdr) - MD5_MAC_LEN;
527 len[1] = MD5_MAC_LEN;
529 len[2] = wpabuf_len(msg->buf) - sizeof(struct radius_hdr);
531 len[3] = secret_len;
532 md5_vector(4, addr, len, hash);
541 size_t len[4];
552 len[0] = sizeof(struct radius_hdr) - MD5_MAC_LEN;
554 len[1] = MD5_MAC_LEN;
556 len[2] = wpabuf_len(msg->buf) - sizeof(struct radius_hdr);
558 len[3] = secret_len;
559 md5_vector(4, addr, len, hash);
656 * @len: Length of data buffer in octets
662 struct radius_msg * radius_msg_parse(const u8 *data, size_t len)
670 if (data == NULL || len < sizeof(*hdr))
676 if (msg_len < sizeof(*hdr) || msg_len > len) {
681 if (msg_len < len) {
683 "RADIUS message", (unsigned long) len - msg_len);
731 int len;
733 len = RADIUS_MAX_ATTR_LEN;
735 len = left;
738 pos, len))
741 pos += len;
742 left -= len;
752 size_t len, i;
758 len = 0;
763 len += attr->length - sizeof(struct radius_attr_hdr);
766 if (len == 0)
769 eap = wpabuf_alloc(len);
839 size_t len[4];
855 len[0] = 1 + 1 + 2;
857 len[1] = MD5_MAC_LEN;
859 len[2] = wpabuf_len(msg->buf) - sizeof(struct radius_hdr);
861 len[3] = secret_len;
862 md5_vector(4, addr, len, hash);
898 const u8 *data, size_t len)
910 elen[1] = len;
927 size_t i, len;
967 len = vhdr->vendor_length - sizeof(*vhdr);
968 data = os_malloc(len);
971 os_memcpy(data, pos + sizeof(*vhdr), len);
973 *alen = len;
982 static u8 * decrypt_ms_key(const u8 *key, size_t len,
996 if (len < 2 + 16) {
998 __func__, (int) len);
1003 left = len - 2;
1005 wpa_printf(MSG_INFO, "RADIUS: Invalid ms key len %lu",
1063 int i, len, first = 1;
1070 len = 1 + key_len;
1071 if (len & 0x0f) {
1072 len = (len & 0xf0) + 16;
1074 os_memset(ebuf, 0, len);
1078 *elen = len;
1081 while (len > 0) {
1101 len -= MD5_MAC_LEN;
1257 size_t len)
1263 alen = 4 + 2 + len;
1271 *pos++ = 2 + len;
1272 os_memcpy(pos, data, len);
1290 size_t len[2];
1308 len[0] = secret_len;
1310 len[1] = 16;
1311 md5_vector(2, addr, len, hash);
1319 len[0] = secret_len;
1321 len[1] = 16;
1322 md5_vector(2, addr, len, hash);
1354 int radius_msg_get_attr(struct radius_msg *msg, u8 type, u8 *buf, size_t len)
1372 os_memcpy(buf, (attr + 1), dlen > len ? len : dlen);
1378 size_t *len, const u8 *start)
1396 *len = attr->length - sizeof(*attr);
1514 size_t len[3];
1564 len[0] = secret_len;
1566 len[1] = 16;
1567 md5_vector(2, addr, len, hash);
1579 len[0] = secret_len;
1581 len[1] = 16;
1583 len[2] = 2;
1584 md5_vector(3, addr, len, hash);
1640 dst->attr[i].data = os_malloc(src->attr[i].len);
1645 src->attr[i].len);
1646 dst->attr[i].len = src->attr[i].len;