Lines Matching refs:len

30  *   GET RESPONSE: C0 00 00 <len>
31 * RUN GSM ALG: 88 00 00 00 <RAND len = 10>
32 * RUN UMTS ALG: 88 00 81 <len=0x22> data: 0x10 | RAND | 0x10 | AUTN
35 * READ BINARY: B0 <offset high> <offset low> <len>
36 * READ RECORD: B2 <record number> <mode> <len>
254 unsigned char *data, size_t len,
285 unsigned char type, len;
288 len = pos[1];
289 wpa_printf(MSG_MSGDUMP, "SCARD: file header TLV 0x%02x len=%d",
290 type, len);
293 if (len > (unsigned int) (end - pos))
299 pos, len);
303 pos, len);
307 pos, len);
311 "information TLV", pos, len);
315 "Integer TLV", pos, len);
319 pos, len);
320 if ((len == 1 || len == 2) && file_len) {
321 if (len == 1)
331 pos, len);
335 "DO TLV", pos, len);
336 if (len >= 2 && pos[0] == USIM_PS_DO_TAG &&
345 "Identifier (SFI) TLV", pos, len);
351 "TLV", pos, len);
355 pos, len);
359 pos += len;
448 "template (len=%d rlen=%d)",
507 unsigned long len, pos;
534 ret = SCardListReaders(scard->ctx, NULL, NULL, &len);
542 len *= 2;
544 readers = os_malloc(len);
550 ret = SCardListReaders(scard->ctx, NULL, readers, &len);
556 if (len < 3) {
561 wpa_hexdump_ascii(MSG_DEBUG, "SCARD: Readers", (u8 *) readers, len);
570 while (pos < len) {
574 while (pos < len && readers[pos])
577 if (pos < len && readers[pos] == '\0')
578 pos = len; /* double null terminates list */
581 if (pos >= len) {
799 size_t len, rlen;
814 cmd[4] = aidlen; /* len */
822 len = sizeof(resp);
823 ret = scard_transmit(scard, cmd, cmdlen, resp, &len);
830 if (len != 2) {
831 wpa_printf(MSG_WARNING, "SCARD: unexpected resp len "
832 "%d (expected 2)", (int) len);
882 unsigned char cmd[5] = { SIM_CMD_READ_RECORD /* , len */ };
914 unsigned char *data, size_t len,
917 unsigned char cmd[5] = { SIM_CMD_READ_RECORD /* , len */ };
918 size_t blen = len + 3;
926 cmd[4] = len;
937 if (blen != len + 2) {
940 (long) blen, (long) len + 2);
945 if (buf[len] != 0x90 || buf[len + 1] != 0x00) {
948 buf[len], buf[len + 1]);
953 os_memcpy(data, buf, len);
961 unsigned char *data, size_t len)
963 unsigned char cmd[5] = { SIM_CMD_READ_BIN /* , len */ };
964 size_t blen = len + 3;
968 cmd[4] = len;
981 if (blen != len + 2) {
984 (long) blen, (long) len + 2);
989 if (buf[len] != 0x90 || buf[len + 1] != 0x00) {
992 buf[len], buf[len + 1]);
997 os_memcpy(data, buf, len);
1009 size_t len;
1021 len = sizeof(resp);
1022 ret = scard_transmit(scard, cmd, sizeof(cmd), resp, &len);
1026 if (len != 2 || resp[0] != 0x90 || resp[1] != 0x00) {
1041 size_t len;
1050 len = sizeof(resp);
1051 ret = scard_transmit(scard, cmd, sizeof(cmd), resp, &len);
1055 if (len != 2) {
1080 * @len: Length of imsi buffer; set to IMSI length on success
1083 * (USIM only), -4 if IMSI does not fit in the provided imsi buffer (len is set
1090 int scard_get_imsi(struct scard_data *scard, char *imsi, size_t *len)
1102 "header (len=%ld)", (long) blen);
1123 if (blen < 2 || imsilen > *len) {
1124 *len = imsilen;
1148 *len = imsilen;
1170 wpa_printf(MSG_DEBUG, "SCARD: reading MNC len from (GSM) EF-AD");
1176 "header (len=%ld)", (long) blen);
1231 size_t len;
1250 len = sizeof(resp);
1251 ret = scard_transmit(scard, cmd, cmdlen, resp, &len);
1256 (len != 2 || resp[0] != 0x9f || resp[1] != 0x0c)) ||
1258 (len != 2 || resp[0] != 0x61 || resp[1] != 0x0e))) {
1260 "auth request (len=%ld resp=%02x %02x)",
1261 (long) len, resp[0], resp[1]);
1266 len = sizeof(buf);
1267 ret = scard_transmit(scard, get_resp, sizeof(get_resp), buf, &len);
1272 if (len != 4 + 8 + 2) {
1274 "length for GSM auth (len=%ld, expected 14)",
1275 (long) len);
1281 if (len != 1 + 4 + 1 + 8 + 2) {
1283 "length for USIM auth (len=%ld, "
1284 "expected 16)", (long) len);
1332 size_t len;
1351 len = sizeof(resp);
1352 ret = scard_transmit(scard, cmd, sizeof(cmd), resp, &len);
1356 if (len <= sizeof(resp))
1357 wpa_hexdump(MSG_DEBUG, "SCARD: UMTS alg response", resp, len);
1359 if (len == 2 && resp[0] == 0x98 && resp[1] == 0x62) {
1363 } else if (len != 2 || resp[0] != 0x61) {
1365 "auth request (len=%ld resp=%02x %02x)",
1366 (long) len, resp[0], resp[1]);
1371 len = sizeof(buf);
1372 ret = scard_transmit(scard, get_resp, sizeof(get_resp), buf, &len);
1373 if (ret != SCARD_S_SUCCESS || len > sizeof(buf))
1376 wpa_hexdump(MSG_DEBUG, "SCARD: UMTS get response result", buf, len);
1377 if (len >= 2 + AKA_AUTS_LEN && buf[0] == 0xdc &&
1383 } else if (len >= 6 + IK_LEN + CK_LEN && buf[0] == 0xdb) {
1385 end = buf + len;