Home | History | Annotate | Download | only in openssh

Lines Matching defs:bytes

102 	u_int64_t bytes;
195 /* roundup current message to extra_pad bytes */
399 *ibytes = ssh->state->p_read.bytes;
401 *obytes = ssh->state->p_send.bytes;
875 /* Add check bytes. */
904 state->p_send.bytes += len +
1111 * minimum padding is 4 bytes
1190 state->p_send.bytes += len;
1494 /* Test check bytes. */
1507 error("Corrupted check bytes on input");
1527 state->p_read.bytes += padded_len + 4;
1626 * have a partial packet of block_size bytes
1641 * 'aadlen' bytes are unencrypted, but authenticated.
1642 * 'need' bytes are encrypted, followed by either
1643 * 'authlen' bytes of authentication tag or
1644 * 'maclen' bytes of message authentication code.
1699 state->p_read.bytes += state->packlen + 4;
1880 * exceed 1024 bytes. This will automatically call ssh_packet_write_wait.
1959 * not exceed 1024 bytes.
2252 ssh_packet_set_rekey_limits(struct ssh *ssh, u_int32_t bytes, time_t seconds)
2254 debug3("rekey after %lld bytes, %d seconds", (long long)bytes,
2256 ssh->state->rekey_limit = bytes;
2470 (r = sshbuf_put_u64(m, state->p_send.bytes)) != 0 ||
2474 (r = sshbuf_put_u64(m, state->p_read.bytes)) != 0)
2659 (r = sshbuf_get_u64(m, &state->p_send.bytes)) != 0 ||
2663 (r = sshbuf_get_u64(m, &state->p_read.bytes)) != 0)
2922 /* roundup current message to pad bytes */