Searched refs:ID (Results 1 – 9 of 9) sorted by relevance
15 int find_hash_id(unsigned char ID) in find_hash_id() argument20 if (hash_descriptor[x] && hash_descriptor[x]->ID == ID) { in find_hash_id()
15 int find_cipher_id(unsigned char ID) in find_cipher_id() argument20 if (cipher_descriptor[x]->ID == ID) { in find_cipher_id()
10 int find_hash_oid(const unsigned long *ID, unsigned long IDlen) in find_hash_oid() argument13 LTC_ARGCHK(ID != NULL); in find_hash_oid()16 …& hash_descriptor[x]->OIDlen == IDlen && !XMEMCMP(hash_descriptor[x]->OID, ID, sizeof(unsigned lon… in find_hash_oid()
24 if (cipher_descriptor[x] != NULL && cipher_descriptor[x]->ID == cipher->ID) { in register_cipher()
12 AIDR c0 1 c0 7 RO IMPLEMENTATION DEFINED Auxiliary ID Register13 CCSIDR c0 1 c0 0 RO Cache Size ID Registers14 CLIDR c0 1 c0 1 RO Cache Level ID Register31 MIDR c0 0 c0 0 RO Main ID Register33 REVIDR c0 0 c0 6 RO Revision ID Register40 CONTEXTIDR c13 0 c0 1 RW Context ID Register64 FCSEIDR c13 0 c0 0 RW FCSE Process ID Register106 TPIDRPRW c13 0 c0 4 RW PL1 only Thread ID Register107 TPIDRURO c13 0 c0 3 RW PL0 User Read-Only Thread ID Register108 TPIDRURW c13 0 c0 2 RW PL0 User Read/Write Thread ID Register
203 unsigned char ID; member489 int find_hash_id(unsigned char ID);490 int find_hash_oid(const unsigned long *ID, unsigned long IDlen);
382 unsigned char ID; member1013 int find_cipher_id(unsigned char ID);
236 .ID = 6,
1273 * Add support for DTLS Connection ID as defined by RFC 9146, controlled by1915 session-ID based session resumption) has changed to that of3047 feature can be used alongside Connection ID and SSL context serialisation.3170 * Add support for draft-05 of the Connection ID extension, as specified3172 The Connection ID extension allows to keep DTLS connections beyond the