Lines Matching refs:len

262 			     unsigned char *data, size_t len,
293 unsigned char type, len; in scard_parse_fsp_templ() local
296 len = pos[1]; in scard_parse_fsp_templ()
298 type, len); in scard_parse_fsp_templ()
301 if (len > (unsigned int) (end - pos)) in scard_parse_fsp_templ()
307 pos, len); in scard_parse_fsp_templ()
311 pos, len); in scard_parse_fsp_templ()
315 pos, len); in scard_parse_fsp_templ()
319 "information TLV", pos, len); in scard_parse_fsp_templ()
323 "Integer TLV", pos, len); in scard_parse_fsp_templ()
327 pos, len); in scard_parse_fsp_templ()
328 if ((len == 1 || len == 2) && file_len) { in scard_parse_fsp_templ()
329 if (len == 1) in scard_parse_fsp_templ()
339 pos, len); in scard_parse_fsp_templ()
343 "DO TLV", pos, len); in scard_parse_fsp_templ()
344 if (len >= 2 && pos[0] == USIM_PS_DO_TAG && in scard_parse_fsp_templ()
353 "Identifier (SFI) TLV", pos, len); in scard_parse_fsp_templ()
359 "TLV", pos, len); in scard_parse_fsp_templ()
363 pos, len); in scard_parse_fsp_templ()
367 pos += len; in scard_parse_fsp_templ()
516 uint32_t len; in scard_init() local
518 unsigned long len; in scard_init() local
547 ret = SCardListReaders(scard->ctx, NULL, NULL, &len); in scard_init()
555 len *= 2; in scard_init()
557 readers = os_malloc(len); in scard_init()
563 ret = SCardListReaders(scard->ctx, NULL, readers, &len); in scard_init()
569 if (len < 3) { in scard_init()
574 wpa_hexdump_ascii(MSG_DEBUG, "SCARD: Readers", (u8 *) readers, len); in scard_init()
583 while (pos < len) { in scard_init()
587 while (pos < len && readers[pos]) in scard_init()
590 if (pos < len && readers[pos] == '\0') in scard_init()
591 pos = len; /* double null terminates list */ in scard_init()
594 if (pos >= len) { in scard_init()
816 size_t len, rlen; in _scard_select_file() local
839 len = sizeof(resp); in _scard_select_file()
840 ret = scard_transmit(scard, cmd, cmdlen, resp, &len); in _scard_select_file()
847 if (len != 2) { in _scard_select_file()
849 "%d (expected 2)", (int) len); in _scard_select_file()
931 unsigned char *data, size_t len, in scard_read_record() argument
935 size_t blen = len + 3; in scard_read_record()
943 cmd[4] = len; in scard_read_record()
954 if (blen != len + 2) { in scard_read_record()
957 (long) blen, (long) len + 2); in scard_read_record()
962 if (buf[len] != 0x90 || buf[len + 1] != 0x00) { in scard_read_record()
965 buf[len], buf[len + 1]); in scard_read_record()
970 os_memcpy(data, buf, len); in scard_read_record()
978 unsigned char *data, size_t len) in scard_read_file() argument
981 size_t blen = len + 3; in scard_read_file()
985 cmd[4] = len; in scard_read_file()
998 if (blen != len + 2) { in scard_read_file()
1001 (long) blen, (long) len + 2); in scard_read_file()
1006 if (buf[len] != 0x90 || buf[len + 1] != 0x00) { in scard_read_file()
1009 buf[len], buf[len + 1]); in scard_read_file()
1014 os_memcpy(data, buf, len); in scard_read_file()
1026 size_t len; in scard_verify_pin() local
1038 len = sizeof(resp); in scard_verify_pin()
1039 ret = scard_transmit(scard, cmd, sizeof(cmd), resp, &len); in scard_verify_pin()
1043 if (len != 2 || resp[0] != 0x90 || resp[1] != 0x00) { in scard_verify_pin()
1058 size_t len; in scard_get_pin_retry_counter() local
1067 len = sizeof(resp); in scard_get_pin_retry_counter()
1068 ret = scard_transmit(scard, cmd, sizeof(cmd), resp, &len); in scard_get_pin_retry_counter()
1072 if (len != 2) { in scard_get_pin_retry_counter()
1107 int scard_get_imsi(struct scard_data *scard, char *imsi, size_t *len) in scard_get_imsi() argument
1140 if (blen < 2 || imsilen > *len) { in scard_get_imsi()
1141 *len = imsilen; in scard_get_imsi()
1165 *len = imsilen; in scard_get_imsi()
1248 size_t len; in scard_gsm_auth() local
1267 len = sizeof(resp); in scard_gsm_auth()
1268 ret = scard_transmit(scard, cmd, cmdlen, resp, &len); in scard_gsm_auth()
1273 (len != 2 || resp[0] != 0x9f || resp[1] != 0x0c)) || in scard_gsm_auth()
1275 (len != 2 || resp[0] != 0x61 || resp[1] != 0x0e))) { in scard_gsm_auth()
1278 (long) len, resp[0], resp[1]); in scard_gsm_auth()
1283 len = sizeof(buf); in scard_gsm_auth()
1284 ret = scard_transmit(scard, get_resp, sizeof(get_resp), buf, &len); in scard_gsm_auth()
1289 if (len != 4 + 8 + 2) { in scard_gsm_auth()
1292 (long) len); in scard_gsm_auth()
1298 if (len != 1 + 4 + 1 + 8 + 2) { in scard_gsm_auth()
1301 "expected 16)", (long) len); in scard_gsm_auth()
1349 size_t len; in scard_umts_auth() local
1368 len = sizeof(resp); in scard_umts_auth()
1369 ret = scard_transmit(scard, cmd, sizeof(cmd), resp, &len); in scard_umts_auth()
1373 if (len <= sizeof(resp)) in scard_umts_auth()
1374 wpa_hexdump(MSG_DEBUG, "SCARD: UMTS alg response", resp, len); in scard_umts_auth()
1376 if (len == 2 && resp[0] == 0x98 && resp[1] == 0x62) { in scard_umts_auth()
1380 } else if (len != 2 || resp[0] != 0x61) { in scard_umts_auth()
1383 (long) len, resp[0], resp[1]); in scard_umts_auth()
1388 len = sizeof(buf); in scard_umts_auth()
1389 ret = scard_transmit(scard, get_resp, sizeof(get_resp), buf, &len); in scard_umts_auth()
1390 if (ret != SCARD_S_SUCCESS || len > sizeof(buf)) in scard_umts_auth()
1393 wpa_hexdump(MSG_DEBUG, "SCARD: UMTS get response result", buf, len); in scard_umts_auth()
1394 if (len >= 2 + AKA_AUTS_LEN && buf[0] == 0xdc && in scard_umts_auth()
1400 } else if (len >= 6 + IK_LEN + CK_LEN && buf[0] == 0xdb) { in scard_umts_auth()
1402 end = buf + len; in scard_umts_auth()