/external/chromium/chrome/browser/metrics/ |
H A D | metrics_log_unittest.cc | 95 NoTimeMetricsLog(std::string client_id, int session_id): argument 96 MetricsLog(client_id, session_id) {}
|
H A D | metrics_log.cc | 37 MetricsLog::MetricsLog(const std::string& client_id, int session_id) argument 38 : MetricsLogBase(client_id, session_id, MetricsLog::GetVersionString()) {}
|
/external/chromium/chrome/browser/ui/cocoa/ |
H A D | history_menu_bridge.h | 16 #include "chrome/browser/sessions/session_id.h" 96 SessionID::id_type session_id; member in struct:HistoryMenuBridge::HistoryItem
|
/external/openssh/ |
H A D | sshconnect1.c | 52 u_char session_id[16]; variable 116 if (!ssh_decrypt_challenge(auth, key, challenge, session_id, 1, response)) { 184 MD5_Update(&md, session_id, 16); 543 derive_ssh1_session_id(host_key->rsa->n, server_key->rsa->n, cookie, session_id); 573 if (BN_add_word(key, session_key[i] ^ session_id[i])
|
/external/openssl/ssl/ |
H A D | ssl_asn1.c | 99 ASN1_OCTET_STRING session_id; member in struct:ssl_session_asn1_st 196 a.session_id.length=in->session_id_length; 197 a.session_id.type=V_ASN1_OCTET_STRING; 198 a.session_id.data=in->session_id; 288 M_ASN1_I2D_len(&(a.session_id), i2d_ASN1_OCTET_STRING); 334 M_ASN1_I2D_put(&(a.session_id), i2d_ASN1_OCTET_STRING); 446 if (os.length > (int)sizeof(ret->session_id)) /* can't happen */ 447 os.length = sizeof(ret->session_id); 450 OPENSSL_assert(os.length <= (int)sizeof(ret->session_id)); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | eap_sake_common.h | 55 u8 session_id; member in struct:eap_sake_hdr
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_sake.c | 33 u8 session_id; member in struct:eap_sake_data 139 sake->session_id = data->session_id; 375 u8 subtype, session_id; local 386 session_id = req->session_id; 390 "session_id %d", subtype, session_id); 394 if (data->session_id_set && data->session_id != session_id) { [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_sake.c | 32 u8 session_id; member in struct:eap_sake_data 77 if (os_get_random(&data->session_id, 1)) { 83 data->session_id); 122 sake->session_id = data->session_id; 261 u8 version, session_id, subtype; local 272 session_id = resp->session_id; 280 if (session_id != data->session_id) { [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
H A D | tlsv1_client_i.h | 29 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_client
|
H A D | tlsv1_server_i.h | 30 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_server
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_pwd_common.c | 279 u8 session_id[SHA256_DIGEST_LENGTH + 1]; local 290 session_id[0] = EAP_TYPE_PWD; 301 H_Final(&ctx, &session_id[1]); 315 session_id, SHA256_DIGEST_LENGTH+1,
|
H A D | eap_sake_common.h | 49 u8 session_id; member in struct:eap_sake_hdr
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_sake.c | 28 u8 session_id; member in struct:eap_sake_data 134 sake->session_id = data->session_id; 370 u8 subtype, session_id; local 381 session_id = req->session_id; 385 "session_id %d", subtype, session_id); 389 if (data->session_id_set && data->session_id != session_id) { [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_sake.c | 27 u8 session_id; member in struct:eap_sake_data 72 if (os_get_random(&data->session_id, 1)) { 78 data->session_id); 117 sake->session_id = data->session_id; 256 u8 version, session_id, subtype; local 267 session_id = resp->session_id; 275 if (session_id != data->session_id) { [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client_i.h | 23 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_client
|
H A D | tlsv1_server_i.h | 24 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_server
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_pwd_common.c | 279 u8 session_id[SHA256_DIGEST_LENGTH + 1]; local 290 session_id[0] = EAP_TYPE_PWD; 301 H_Final(&ctx, &session_id[1]); 315 session_id, SHA256_DIGEST_LENGTH+1,
|
H A D | eap_sake_common.h | 49 u8 session_id; member in struct:eap_sake_hdr
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_sake.c | 28 u8 session_id; member in struct:eap_sake_data 134 sake->session_id = data->session_id; 370 u8 subtype, session_id; local 381 session_id = req->session_id; 385 "session_id %d", subtype, session_id); 389 if (data->session_id_set && data->session_id != session_id) { [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_sake.c | 27 u8 session_id; member in struct:eap_sake_data 72 if (os_get_random(&data->session_id, 1)) { 78 data->session_id); 117 sake->session_id = data->session_id; 256 u8 version, session_id, subtype; local 267 session_id = resp->session_id; 275 if (session_id != data->session_id) { [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_client_i.h | 23 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_client
|
H A D | tlsv1_server_i.h | 24 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_server
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_pwd_common.c | 279 u8 session_id[SHA256_DIGEST_LENGTH + 1]; local 290 session_id[0] = EAP_TYPE_PWD; 301 H_Final(&ctx, &session_id[1]); 315 session_id, SHA256_DIGEST_LENGTH+1,
|
H A D | eap_sake_common.h | 49 u8 session_id; member in struct:eap_sake_hdr
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_sake.c | 28 u8 session_id; member in struct:eap_sake_data 134 sake->session_id = data->session_id; 370 u8 subtype, session_id; local 381 session_id = req->session_id; 385 "session_id %d", subtype, session_id); 389 if (data->session_id_set && data->session_id != session_id) { [all...] |