Lines Matching defs:length

39 	/** length of the data buffer */
41 /** total buffer length */
58 * data buffer without the length information. The length information is
214 uint16_t length; /**< key length in bytes */
220 * algorithm such as AES key wrap (rfc3394) and hence length of the key
222 * PMD shall validate the key length and report EMSGSIZE error while
224 * capability key length in such cases.
229 * bytes to match the length of the encryption key used.
231 * Cipher key length is in bytes. For AES it can be 128 bits (16 bytes),
234 * For the RTE_CRYPTO_CIPHER_AES_F8 mode of operation, key.length
235 * should be set to the combined length of the encryption key and the
237 * key.length should be set to 2 x the AES encryption key length.
240 * - Two keys must be provided and key.length refers to total length of
263 * be allocated, even though the length field will
274 uint16_t length;
279 * length of the IV (which must be the same as the
280 * block length of the cipher).
282 * - For block ciphers in CTR mode, this is the length
284 * length of the cipher) or a 12-byte nonce (AES only)
286 * - For CCM mode, this is the length of the nonce,
293 * this is the data-unit length of the algorithm,
294 * otherwise or when the value is 0, use the operation length.
414 uint16_t length; /**< key length in bytes */
417 * The authentication key length MUST be less than or equal to the
419 * ensure that the key length is compliant with the standard being used
432 * to the field `length` in iv struct.
440 uint16_t length;
444 * for AES-GMAC, this is the length of the IV.
462 * this specifies the length of the digest to be compared for the
466 * digest length is compliant with the hash algorithm being used.
467 * If the value is less than the maximum length allowed by the hash,
509 uint16_t length; /**< key length in bytes */
522 * be allocated, even though the length field will
533 uint16_t length;
544 * - For CCM mode, this is the length of the nonce,
554 /**< The length of the additional authenticated data (AAD) in bytes.
555 * For CCM mode, this is the length of the actual AAD, even though
614 * operated on, based on the cipher.data.offset+cipher.data.length and
615 * auth.data.offset+auth.data.length values in the rte_crypto_sym_op. The part
645 uint32_t length;
646 /**< The message length, in bytes, of the source buffer
650 } data; /**< Data offsets and length for AEAD */
659 * digest result length with the digest_length member
687 * and the length encoding in the first two bytes of the
721 uint32_t length;
722 /**< The message length, in bytes, of the
725 * This is also the same as the result length.
728 * or for the AES-XTS a multiple of the data-unit length
739 } data; /**< Data offsets and length for ciphering */
764 * offset is the DOCSIS header length
770 uint32_t length;
771 /**< The message length, in bytes, of the source
784 * the length should include the COUNT,
790 * is the CRC length i.e. the number of
795 /**< Data offsets and length for authentication */
806 * specified the digest result length with
847 * auth.data.length,
849 * cipher.data.length must be greater
851 * auth.data.length and is typically
853 * auth.data.length + digest_length.
856 * cipher.data.length,
858 * auth.data.length and