Lines Matching refs:bytes

167  * is 128 bytes or greater, then it uses two bytes, three bytes
169 * separate from the data, the size is always the same: 35 bytes (0x23).
172 * field may be two, three or four bytes.
605 nfsm_chain_add_32(error, &nmc_tmp, random()); // confounder bytes 1-4
606 nfsm_chain_add_32(error, &nmc_tmp, random()); // confounder bytes 4-8
620 * needs to be padded either by 4 bytes or 8 bytes.
776 * - length of seq num + results (4 bytes)
777 * - sequence number (4 bytes)
778 * - results (variable bytes)
780 * - checksum of seqnum + results (37 bytes)
836 * - wrap token (37-40 bytes)
837 * - confounder (8 bytes)
838 * - sequence number (4 bytes)
945 * The arglen includes 8 bytes of confounder and 4 bytes of seqnum.
946 * Finally, we remove between 4 and 8 bytes of encryption padding
1481 printf("nfs_gss_clnt_gssd_upcall: could not allocate %d bytes\n", otokenlen);
2110 * - length of seq num + call args (4 bytes)
2111 * - sequence number (4 bytes)
2112 * - call args (variable bytes)
2114 * - checksum of seqnum + call args (37 bytes)
2166 * - wrap token (37-40 bytes)
2167 * - confounder (8 bytes)
2168 * - sequence number (4 bytes)
2323 nfsm_chain_add_32(error, nmc, random()); // confounder bytes 1-4
2324 nfsm_chain_add_32(error, nmc, random()); // confounder bytes 5-8
2386 * needs to be padded either by 4 bytes or 8 bytes.
2664 printf("nfs_gss_svc_gssd_upcall: could not allocate %d bytes\n", otokenlen);
2943 * The alg string encodes the bytes to represent either
2952 * of sequence number followed by 4 bytes of direction
3118 * Return the number of bytes in an mbuf chain.
3197 int left, bytes;
3203 * Logically prepend the first 8 bytes of the algorithm
3211 * we've done len bytes.
3227 bytes = left < len ? left : len;
3228 if (bytes > 0)
3229 gss_digest_Update(&context, ptr, bytes);
3230 len -= bytes;
3276 * Logically prepend the first 8 bytes of the MIC
3310 * we've done len bytes.
3328 * DES or DES3 CBC has to encrypt 8 bytes at a time.
3329 * If the number of bytes to be encrypted in this
3330 * mbuf isn't some multiple of 8 bytes, encrypt all
3332 * bytes with enough from the next mbuf to make up