Searched refs:Nonce (Results 1 – 9 of 9) sorted by relevance
25 Nonce.0 = 5BF245B95F8E1377D5A17EB331AABCD942 Nonce.0 = aad471ef3ef1d20345 Nonce.1 = f2a23e636aee75c648 Nonce.2 = 79a674c5b2c51aa951 Nonce.3 = ecac63e1217ee33554 Nonce.4 = 39acba03c5f10af457 Nonce.5 = 1eac1c22036e2b2260 Nonce.6 = 37f4d1748714345b63 Nonce.7 = 0cbd1372beb6273666 Nonce.8 = a39e98db6c10787f[all …]
14615 Title = NIST CCM 128 Variable Nonce Tests15170 Title = NIST CCM 192 Variable Nonce Tests15725 Title = NIST CCM 256 Variable Nonce Tests
158 template <typename T> struct Nonce { using Type = EnabledType; }; struct160 static typename Nonce<decltype(std::declval<T>().invalidate(
5428 comment: Nonce is too long5439 comment: Nonce is too long5450 comment: Nonce is too long5571 comment: Nonce is too long5582 comment: Nonce is too long5593 comment: Nonce is too long5714 comment: Nonce is too long5725 comment: Nonce is too long5736 comment: Nonce is too long
198 OCSP Nonce NID_id_pkix_OCSP_Nonce
1582 To specify any additional authenticated data (AAD) and/or a Nonce, a call to1586 RFC5297 states that the Nonce is the last piece of AAD before the actual1587 encrypt/decrypt takes place. The API does not differentiate the Nonce from
2545 MPI3_SECURITY_NONCE Nonce; /* 0x68 */ member2613 MPI3_SECURITY_NONCE Nonce; /* 0x50 */ member2664 MPI3_SECURITY_NONCE Nonce; /* 0x50 */ member
718 id-pkix-OCSP 2 : Nonce : OCSP Nonce
2024 krb5_int32 nonce; /**< Nonce to match request and response */2044 krb5_int32 nonce; /**< Nonce from request */2130 krb5_int32 nonce; /**< Nonce (optional) */