Searched defs:session_id (Results 1 - 25 of 48) sorted by relevance

12

/external/chromium/chrome/browser/metrics/
H A Dmetrics_log_unittest.cc95 NoTimeMetricsLog(std::string client_id, int session_id): argument
96 MetricsLog(client_id, session_id) {}
H A Dmetrics_log.cc37 MetricsLog::MetricsLog(const std::string& client_id, int session_id) argument
38 : MetricsLogBase(client_id, session_id, MetricsLog::GetVersionString()) {}
/external/chromium/chrome/browser/ui/cocoa/
H A Dhistory_menu_bridge.h16 #include "chrome/browser/sessions/session_id.h"
96 SessionID::id_type session_id; member in struct:HistoryMenuBridge::HistoryItem
/external/openssl/ssl/
H A Dssl_asn1.c99 ASN1_OCTET_STRING session_id; member in struct:ssl_session_asn1_st
190 a.session_id.length=in->session_id_length;
191 a.session_id.type=V_ASN1_OCTET_STRING;
192 a.session_id.data=in->session_id;
274 M_ASN1_I2D_len(&(a.session_id), i2d_ASN1_OCTET_STRING);
316 M_ASN1_I2D_put(&(a.session_id), i2d_ASN1_OCTET_STRING);
424 if (os.length > (int)sizeof(ret->session_id)) /* can't happen */
425 os.length = sizeof(ret->session_id);
428 OPENSSL_assert(os.length <= (int)sizeof(ret->session_id));
[all...]
/external/wpa_supplicant/
H A Deap_sake.c34 u8 session_id; member in struct:eap_sake_data
146 req->session_id = data->session_id;
387 u8 subtype, session_id; local
398 session_id = req->session_id;
403 "session_id %d", subtype, session_id);
407 if (data->session_id_set && data->session_id != session_id) {
[all...]
H A Deap_sake_common.h59 u8 session_id; member in struct:eap_sake_hdr
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
H A Deap_sake_common.h55 u8 session_id; member in struct:eap_sake_hdr
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
H A Deap_sake.c33 u8 session_id; member in struct:eap_sake_data
139 sake->session_id = data->session_id;
375 u8 subtype, session_id; local
386 session_id = req->session_id;
390 "session_id %d", subtype, session_id);
394 if (data->session_id_set && data->session_id != session_id) {
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
H A Deap_sake.c32 u8 session_id; member in struct:eap_sake_data
77 if (os_get_random(&data->session_id, 1)) {
83 data->session_id);
122 sake->session_id = data->session_id;
261 u8 version, session_id, subtype; local
272 session_id = resp->session_id;
280 if (session_id != data->session_id) {
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/tls/
H A Dtlsv1_client_i.h29 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_client
H A Dtlsv1_server_i.h30 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_server
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_pwd_common.c273 u8 session_id[SHA256_DIGEST_LENGTH + 1]; local
283 session_id[0] = EAP_TYPE_PWD;
290 H_Final(&ctx, &session_id[1]);
303 session_id, SHA256_DIGEST_LENGTH+1,
H A Deap_sake_common.h55 u8 session_id; member in struct:eap_sake_hdr
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_sake.c34 u8 session_id; member in struct:eap_sake_data
140 sake->session_id = data->session_id;
376 u8 subtype, session_id; local
387 session_id = req->session_id;
391 "session_id %d", subtype, session_id);
395 if (data->session_id_set && data->session_id != session_id) {
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_sake.c33 u8 session_id; member in struct:eap_sake_data
78 if (os_get_random(&data->session_id, 1)) {
84 data->session_id);
123 sake->session_id = data->session_id;
262 u8 version, session_id, subtype; local
273 session_id = resp->session_id;
281 if (session_id != data->session_id) {
[all...]
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_client_i.h29 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_client
H A Dtlsv1_server_i.h30 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_server
/external/wpa_supplicant_8/src/eap_common/
H A Deap_pwd_common.c273 u8 session_id[SHA256_DIGEST_LENGTH + 1]; local
283 session_id[0] = EAP_TYPE_PWD;
290 H_Final(&ctx, &session_id[1]);
303 session_id, SHA256_DIGEST_LENGTH+1,
H A Deap_sake_common.h55 u8 session_id; member in struct:eap_sake_hdr
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_sake.c34 u8 session_id; member in struct:eap_sake_data
140 sake->session_id = data->session_id;
376 u8 subtype, session_id; local
387 session_id = req->session_id;
391 "session_id %d", subtype, session_id);
395 if (data->session_id_set && data->session_id != session_id) {
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_sake.c33 u8 session_id; member in struct:eap_sake_data
78 if (os_get_random(&data->session_id, 1)) {
84 data->session_id);
123 sake->session_id = data->session_id;
262 u8 version, session_id, subtype; local
273 session_id = resp->session_id;
281 if (session_id != data->session_id) {
[all...]
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_client_i.h29 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_client
H A Dtlsv1_server_i.h30 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_server
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_pwd_common.c273 u8 session_id[SHA256_DIGEST_LENGTH + 1]; local
283 session_id[0] = EAP_TYPE_PWD;
290 H_Final(&ctx, &session_id[1]);
303 session_id, SHA256_DIGEST_LENGTH+1,
H A Deap_sake_common.h55 u8 session_id; member in struct:eap_sake_hdr

Completed in 302 milliseconds

12