Lines Matching refs:bytes

226  * bytes used out of the source data.
285 * number of bytes consumed. Assumes dest contains enough space.
303 * Identifier is multiple bytes: the first byte is 11111
304 * plus the flags, and subsequent bytes encode the value of
311 continue; /* count the bytes */
327 * Length is multiple bytes. The first is 0x80 plus the
328 * number of subsequent bytes, and the subsequent bytes
332 continue; /* count the bytes */
346 struct mpint_pos { void *start; int bytes; };
540 * - encryption key is the first N bytes of A || B
738 numbers[0].start = zero; numbers[0].bytes = 1; zero[0] = '\0';
749 numbers[2].bytes = buf_getint(keyblob);
750 numbers[2].start = buf_getptr(keyblob, numbers[2].bytes);
751 buf_incrpos(keyblob, numbers[2].bytes);
754 numbers[1].bytes = buf_getint(keyblob);
755 numbers[1].start = buf_getptr(keyblob, numbers[1].bytes);
756 buf_incrpos(keyblob, numbers[1].bytes);
759 numbers[3].bytes = buf_getint(keyblob);
760 numbers[3].start = buf_getptr(keyblob, numbers[3].bytes);
761 buf_incrpos(keyblob, numbers[3].bytes);
764 numbers[4].bytes = buf_getint(keyblob);
765 numbers[4].start = buf_getptr(keyblob, numbers[4].bytes);
766 buf_incrpos(keyblob, numbers[4].bytes);
769 numbers[5].bytes = buf_getint(keyblob);
770 numbers[5].start = buf_getptr(keyblob, numbers[5].bytes);
771 buf_incrpos(keyblob, numbers[5].bytes);
816 numbers[6].bytes = buf_getint(extrablob);
817 numbers[6].start = buf_getptr(extrablob, numbers[6].bytes);
818 buf_incrpos(extrablob, numbers[6].bytes);
821 numbers[7].bytes = buf_getint(extrablob);
822 numbers[7].start = buf_getptr(extrablob, numbers[7].bytes);
823 buf_incrpos(extrablob, numbers[7].bytes);
826 numbers[8].bytes = buf_getint(extrablob);
827 numbers[8].start = buf_getptr(extrablob, numbers[8].bytes);
828 buf_incrpos(extrablob, numbers[8].bytes);
840 numbers[1].bytes = buf_getint(keyblob);
841 numbers[1].start = buf_getptr(keyblob, numbers[1].bytes);
842 buf_incrpos(keyblob, numbers[1].bytes);
845 numbers[2].bytes = buf_getint(keyblob);
846 numbers[2].start = buf_getptr(keyblob, numbers[2].bytes);
847 buf_incrpos(keyblob, numbers[2].bytes);
850 numbers[3].bytes = buf_getint(keyblob);
851 numbers[3].start = buf_getptr(keyblob, numbers[3].bytes);
852 buf_incrpos(keyblob, numbers[3].bytes);
855 numbers[4].bytes = buf_getint(keyblob);
856 numbers[4].start = buf_getptr(keyblob, numbers[4].bytes);
857 buf_incrpos(keyblob, numbers[4].bytes);
860 numbers[5].bytes = buf_getint(keyblob);
861 numbers[5].start = buf_getptr(keyblob, numbers[5].bytes);
862 buf_incrpos(keyblob, numbers[5].bytes);
876 len += ber_write_id_len(NULL, 2, numbers[i].bytes, 0);
877 len += numbers[i].bytes;
899 pos += ber_write_id_len(outblob+pos, 2, numbers[i].bytes, 0);
900 memcpy(outblob+pos, numbers[i].start, numbers[i].bytes);
901 pos += numbers[i].bytes;
906 * padding bytes is always more than zero, and always at most
908 * equal to the number of padding bytes. So a plaintext that's
917 * then expects to find that many bytes at the end of the data
980 * (N+7)/8 bytes of data.
1040 * - first 16 bytes are MD5(passphrase)
1041 * - next 16 bytes are MD5(passphrase || first 16 bytes)
1216 int bytes;
1223 bytes = (bits + 7) / 8;
1224 if (len < 4+bytes)
1228 ret->bytes = bytes;
1229 return bytes+4;
1233 ret->bytes = -1;
1346 * - encryption key is the first N bytes of A || B
1422 pos += put_mp(blob+pos, e.start, e.bytes);
1423 pos += put_mp(blob+pos, n.start, n.bytes);
1425 pos += put_string(blob+pos, d.start, d.bytes);
1426 pos += put_mp(blob+pos, q.start, q.bytes);
1427 pos += put_mp(blob+pos, p.start, p.bytes);
1428 pos += put_mp(blob+pos, u.start, u.bytes);
1450 pos += put_mp(blob+pos, p.start, p.bytes);
1451 pos += put_mp(blob+pos, q.start, q.bytes);
1452 pos += put_mp(blob+pos, g.start, g.bytes);
1453 pos += put_mp(blob+pos, y.start, y.bytes);
1455 pos += put_mp(blob+pos, x.start, x.bytes);
1571 outlen += 4 + numbers[i].bytes;
1594 numbers[i].start, numbers[i].bytes);
1623 * - encryption key is the first N bytes of A || B