Lines Matching full:for
4 * \brief This file provides an API for key wrapping (KW) and key wrapping with
9 * of operation, according to <em>NIST SP 800-38F: Recommendation for
10 * Block Cipher Modes of Operation: Methods for Key Wrapping</em>. Its
13 * Its equivalent is RFC 3394 for KW, and RFC 5649 for KWP.
62 * for mbedtls_nist_kw_setkey() or mbedtls_nist_kw_free().
80 * \return \c MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA for any invalid input.
81 * \return \c MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE for 128-bit block ciphers
102 * \param ctx The key wrapping context to use for encryption.
107 …* <ul><li>For KW mode: a multiple of 8 bytes between 16 and 2^57-8 inclusive. </l…
108 * <li>For KWP mode: any length between 1 and 2^32-1 inclusive.</li></ul>
110 * <ul><li>For KW mode: Must be at least 8 bytes larger than \p in_len.</li>
111 * <li>For KWP mode: Must be at least 8 bytes larger rounded up to a multiple of
112 * 8 bytes for KWP (15 bytes at most).</li></ul>
117 * \return \c MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA for invalid input length.
127 * \param ctx The key wrapping context to use for decryption.
133 * <ul><li>For KW mode: a multiple of 8 bytes between 24 and 2^57 inclusive. </li>
134 * <li>For KWP mode: a multiple of 8 bytes between 16 and 2^32 inclusive.</li></ul>
138 * For KWP mode, the length could be up to 15 bytes shorter than \p in_len,
143 * \return \c MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA for invalid input length.
144 * \return \c MBEDTLS_ERR_CIPHER_AUTH_FAILED for verification failure of the ciphertext.