/external/chromium/chrome/browser/sync/engine/ |
H A D | model_changing_syncer_command.cc | 14 void ModelChangingSyncerCommand::ExecuteImpl(sessions::SyncSession* session) { argument 15 work_session_ = session; 20 for (size_t i = 0; i < session->workers().size(); ++i) { 21 ModelSafeWorker* worker = session->workers()[i]; 33 sessions::SyncSession* session) { 32 ModelNeutralExecuteImpl( sessions::SyncSession* session) argument
|
H A D | post_commit_message_command.cc | 21 void PostCommitMessageCommand::ExecuteImpl(sessions::SyncSession* session) { argument 22 if (session->status_controller()->commit_ids().empty()) 25 syncable::ScopedDirLookup dir(session->context()->directory_manager(), 26 session->context()->account_name()); 29 sessions::StatusController* status = session->status_controller(); 31 &response, session)) {
|
H A D | resolve_conflicts_command.cc | 17 sessions::SyncSession* session) { 18 ConflictResolver* resolver = session->context()->resolver(); 23 syncable::ScopedDirLookup dir(session->context()->directory_manager(), 24 session->context()->account_name()); 27 sessions::StatusController* status = session->status_controller(); 16 ModelChangingExecuteImpl( sessions::SyncSession* session) argument
|
H A D | syncer_command.cc | 18 void SyncerCommand::Execute(SyncSession* session) { argument 19 ExecuteImpl(session); 20 SendNotifications(session); 23 void SyncerCommand::SendNotifications(SyncSession* session) { argument 24 syncable::ScopedDirLookup dir(session->context()->directory_manager(), 25 session->context()->account_name()); 31 if (session->status_controller()->TestAndClearIsDirty()) { 33 const sessions::SyncSessionSnapshot& snapshot(session->TakeSnapshot()); 35 session->context()->NotifyListeners(event);
|
H A D | syncer_end_command.cc | 17 void SyncerEndCommand::ExecuteImpl(sessions::SyncSession* session) { argument 19 session->status_controller()->set_syncing(false); 21 sessions::SyncSessionSnapshot snapshot(session->TakeSnapshot()); 23 session->context()->NotifyListeners(event);
|
H A D | apply_updates_command.cc | 19 void ApplyUpdatesCommand::ModelChangingExecuteImpl(SyncSession* session) { argument 20 syncable::ScopedDirLookup dir(session->context()->directory_manager(), 21 session->context()->account_name()); 31 session->context()->resolver(), 32 session->context()->directory_manager()->GetCryptographer(&trans), 33 handles.begin(), handles.end(), session->routing_info(), 34 session->status_controller()->group_restriction()); 37 session->status_controller()->mutable_conflict_progress(), 38 session->status_controller()->mutable_update_progress()); 42 sessions::StatusController* status(session [all...] |
H A D | cleanup_disabled_types_command.cc | 18 void CleanupDisabledTypesCommand::ExecuteImpl(sessions::SyncSession* session) { argument 24 if (session->routing_info().count(model_type)) 30 // on the first sync session (when there's no previous routing info) we pay 42 // | before another sync session,..) 44 session->context()->previous_session_routing_info(); 52 syncable::ScopedDirLookup dir(session->context()->directory_manager(), 53 session->context()->account_name());
|
H A D | clear_data_command.cc | 29 void ClearDataCommand::ExecuteImpl(SyncSession* session) { argument 33 client_to_server_message.set_share(session->context()->account_name()); 39 ScopedDirLookup dir(session->context()->directory_manager(), 40 session->context()->account_name()); 53 session); 66 session->context()->NotifyListeners(event); 74 session->context()->NotifyListeners(event); 76 session->delegate()->OnShouldStopSyncingPermanently();
|
H A D | store_timestamps_command.cc | 18 void StoreTimestampsCommand::ExecuteImpl(sessions::SyncSession* session) { argument 19 syncable::ScopedDirLookup dir(session->context()->directory_manager(), 20 session->context()->account_name()); 28 session->status_controller()->updates_response().get_updates(); 30 sessions::StatusController* status = session->status_controller();
|
H A D | download_updates_command.cc | 27 void DownloadUpdatesCommand::ExecuteImpl(SyncSession* session) { argument 31 client_to_server_message.set_share(session->context()->account_name()); 37 ScopedDirLookup dir(session->context()->directory_manager(), 38 session->context()->account_name()); 47 session->source().types; 48 for (ModelSafeRoutingInfo::const_iterator i = session->routing_info().begin(); 49 i != session->routing_info().end(); ++i) { 74 session->TestAndSetSource().updates_source); 76 session->context()->notifications_enabled()); 83 session); [all...] |
/external/webkit/Source/WebKit/gtk/tests/ |
H A D | testglobals.c | 26 // Make sure the session is initialized properly when webkit_get_default_session() is called. 31 SoupSession* session = webkit_get_default_session(); local 32 soup_session_remove_feature_by_type(session, WEBKIT_TYPE_SOUP_AUTH_DIALOG); 35 g_assert(soup_session_get_feature(session, SOUP_TYPE_CONTENT_DECODER) != NULL); 37 // Creating a WebView should make sure the session is 44 g_assert(soup_session_get_feature(session, SOUP_TYPE_CONTENT_DECODER) != NULL); 45 g_assert(soup_session_get_feature(session, WEBKIT_TYPE_SOUP_AUTH_DIALOG) == NULL);
|
/external/webkit/Source/WebKit2/WebProcess/gtk/ |
H A D | WebProcessMainGtk.cpp | 57 SoupSession* session = WebCore::ResourceHandle::defaultSession(); local 60 soup_session_add_feature(session, sniffer); 63 soup_session_add_feature_by_type(session, SOUP_TYPE_CONTENT_DECODER);
|
/external/kernel-headers/original/linux/ |
H A D | if_pppolac.h | 29 __u16 tunnel, session; member in struct:sockaddr_pppolac::__anon5754
|
/external/webkit/Source/WebKit/efl/ewk/ |
H A D | ewk_main.cpp | 207 SoupSession* session = WebCore::ResourceHandle::defaultSession(); local 208 soup_session_add_feature_by_type(session, SOUP_TYPE_CONTENT_SNIFFER); 209 soup_session_add_feature_by_type(session, SOUP_TYPE_CONTENT_DECODER);
|
/external/apache-http/src/org/apache/http/conn/ssl/ |
H A D | X509HostnameVerifier.java | 62 boolean verify(String host, SSLSession session); argument
|
/external/chromium/chrome/browser/net/ |
H A D | preconnect.cc | 54 net::HttpNetworkSession* session = factory->GetSession(); local 95 session->ssl_config_service()->GetSSLConfig(&ssl_config); 96 if (session->http_stream_factory()->next_protos()) 97 ssl_config.next_protos = *session->http_stream_factory()->next_protos(); 102 net::HttpStreamFactory* http_stream_factory = session->http_stream_factory();
|
/external/chromium/chrome/browser/sync/sessions/ |
H A D | test_util.cc | 11 void SimulateHasMoreToSync(sessions::SyncSession* session, argument 13 session->status_controller()->update_conflicts_resolved(true); 14 ASSERT_TRUE(session->HasMoreToSync()); 17 void SimulateDownloadUpdatesFailed(sessions::SyncSession* session, argument 19 // Note that a non-zero value of changes_remaining once a session has 22 session->status_controller()->set_num_server_changes_remaining(1); 25 void SimulateCommitFailed(sessions::SyncSession* session, argument 27 // Note that a non-zero number of unsynced handles once a session has 33 session->status_controller()->set_unsynced_handles(handles); 36 void SimulateSuccess(sessions::SyncSession* session, argument 45 SimulateThrottledImpl(sessions::SyncSession* session, const base::TimeDelta& delta) argument 50 SimulatePollIntervalUpdateImpl(sessions::SyncSession* session, const base::TimeDelta& new_poll) argument [all...] |
/external/chromium/net/http/ |
H A D | http_response_body_drainer.cc | 27 void HttpResponseBodyDrainer::Start(HttpNetworkSession* session) { argument 36 session_ = session; 37 session->AddResponseDrainer(this);
|
H A D | http_network_session_peer.cc | 17 const scoped_refptr<HttpNetworkSession>& session) 18 : session_(session) {} 16 HttpNetworkSessionPeer( const scoped_refptr<HttpNetworkSession>& session) argument
|
/external/chromium/webkit/glue/ |
H A D | webcookie.cc | 13 session(false) { 24 session(!c.IsPersistent()) { 29 double expires, bool http_only, bool secure, bool session) 37 session(session) { 27 WebCookie(const std::string& name, const std::string& value, const std::string& domain, const std::string& path, double expires, bool http_only, bool secure, bool session) argument
|
H A D | webcookie.h | 21 bool http_only, bool secure, bool session); 46 bool session; member in struct:webkit_glue::WebCookie
|
/external/qemu/ |
H A D | vnc-tls.h | 60 gnutls_session_t session; member in struct:VncStateTLS
|
/external/webkit/Source/WebKit/chromium/public/ |
H A D | WebCookie.h | 48 , session(false) 53 const WebString& path, double expires, bool httpOnly, bool secure, bool session) 61 , session(session) 72 bool session; member in struct:WebKit::WebCookie 52 WebCookie(const WebString& name, const WebString& value, const WebString& domain, const WebString& path, double expires, bool httpOnly, bool secure, bool session) argument
|
/external/chromium/base/win/ |
H A D | event_trace_controller.h | 15 // A trace controller can create an event tracing session, which either 18 // A trace consumer consumes events from zero or one realtime session, 37 // event tracing session. 63 // Max string len for name and session name is 1024 per documentation. 66 // max length for name and session name. 87 // log levels and enable bit masks under the session. 93 // Start a session with given name and properties. 96 // Starts a session tracing to a file with some default properties. 101 // Starts a realtime session with some default properties. 105 // Enables "provider" at "level" for this session 139 TRACEHANDLE session() const { return session_; } function in class:base::win::EtwTraceController [all...] |
/external/chromium/chrome/browser/sync/glue/ |
H A D | session_model_associator_unittest.cc | 62 ForeignSession* session = tracker.GetForeignSession(tag); local 64 session->windows.push_back(win); 74 // be able to delete the session, window, and tab. We can't delete these 130 ForeignSession* session = tracker.GetForeignSession(tag1); local 135 ASSERT_TRUE(session); 138 ASSERT_NE(session, session2);
|