Lines Matching full:must
261 * successfully, the following conditions must be satisfied:
263 * - The encryption key id must be known.
264 * - The nonce used by the encryption device must be known or synchronized
266 * - The expected output length must be identical to the original length of
268 * - The MAC Count of the encryption device must be known.
269 * - The MAC Mode must be identical between encrypt and decrypt calls.
273 * must be known.
281 * items (data generated by the ATAES132A chip) must be
283 * must be identical to the ones used during encryption. If the
285 * device then this value must be null.
289 must be included during MAC authentication. The
290 * values must be identical to those used during encryption.
292 * ATAES132A device then this value must be null.
295 * buffer that requires to be decrypted (it must be 16 or 32
300 * length (it must be identical to the length of the original
305 * nonce, this value must be null and a previous nonce
328 * nonce_buf will be ignored. It preferably must be null.
336 * items must be included during MAC generation. The values
337 * must be known by the decrypt operation. If the reference is
343 * MAC (it must have space reserved to hold 16 bytes) and the
344 * buffer to receive the encrypted message (it must have space
370 * The encryption key must be enabled to perform legacy ECM operation.
381 * be above 16 bytes) and the buffer to receive the result (it must