/external/chromium/net/spdy/ |
H A D | spdy_session_unittest.cc | 134 scoped_refptr<SpdySession> session = local 150 EXPECT_EQ(OK, session->InitializeWithSocket(connection.release(), false, OK)); 160 // Delete the first session. 161 session = NULL; 163 // Delete the second session. 205 scoped_refptr<SpdySession> session = local 224 EXPECT_EQ(OK, session->InitializeWithSocket(connection.release(), false, OK)); 228 EXPECT_EQ(OK, session->CreateStream(url, 245 session->SendPrefacePingIfNoneInFlight(); 249 EXPECT_EQ(0, session 265 StreamReleaserCallback(SpdySession* session, SpdyStream* first_stream) argument 341 scoped_refptr<SpdySession> session = local 427 scoped_refptr<SpdySession> session = local 527 scoped_refptr<SpdySession> session = local 600 scoped_refptr<SpdySession> session = local [all...] |
/external/chromium/third_party/libjingle/source/talk/session/tunnel/ |
H A D | securetunnelsessionclient.h | 30 // certificates as part of the session description. 41 #include "talk/session/tunnel/tunnelsessionclient.h" 54 // server certificates. The initiator acts as the client. The session 56 // certificate, and the session accept response's description has the 83 virtual void OnIncomingTunnel(const buzz::Jid& jid, Session *session); 99 Session* session, talk_base::Thread* stream_thread, 104 // certificate part will be communicated within the session 113 // A TunnelSession represents one session for one client. It 120 // This TunnelSession will tie together the given client and session. 124 // initiating the session [all...] |
/external/linux-tools-perf/ |
H A D | builtin-report.c | 35 #include "util/session.h" 59 static int perf_session__add_hist_entry(struct perf_session *session, argument 69 err = perf_session__resolve_callchain(session, al->thread, 80 err = callchain_append(he->callchain, &session->callchain_cursor, 97 symbol__alloc_hist(he->ms.sym, session->evlist->nr_entries) < 0) 113 struct perf_session *session) 117 if (perf_event__preprocess_sample(event, session, &al, sample, 130 if (perf_session__add_hist_entry(session, &al, sample, evsel)) { 140 struct perf_session *session) 142 struct perf_evsel *evsel = perf_evlist__id2evsel(session 110 process_sample_event(union perf_event *event, struct perf_sample *sample, struct perf_evsel *evsel, struct perf_session *session) argument 138 process_read_event(union perf_event *event, struct perf_sample *sample __used, struct perf_session *session) argument 261 struct perf_session *session; local [all...] |
H A D | builtin-annotate.c | 37 #include "util/session.h" 90 struct perf_session *session) 94 if (perf_event__preprocess_sample(event, session, &al, sample, 102 perf_evlist__add_sample(session->evlist, sample, evsel, &al)) { 180 struct perf_session *session; local 184 session = perf_session__new(input_name, O_RDONLY, force, false, &event_ops); 185 if (session == NULL) 188 ret = perf_session__process_events(session, &event_ops); 193 perf_session__fprintf_nr_events(session, stdout); 198 perf_session__fprintf(session, stdou 87 process_sample_event(union perf_event *event, struct perf_sample *sample, struct perf_evsel *evsel, struct perf_session *session) argument [all...] |
H A D | builtin-record.c | 24 #include "util/session.h" 76 static struct perf_session *session; variable in typeref:struct:perf_session 346 session->evlist = evlist; 348 if (!perf_evlist__equal(session->evlist, evlist)) { 354 perf_session__update_sample_type(session); 364 session->fd = output; 365 return __perf_session__process_events(session, post_processing_offset, 373 session->header.data_size += bytes_written; 377 perf_session__write_header(session, evsel_list, output, true); 378 perf_session__delete(session); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | tls_gnutls.c | 29 int gnutls_ia_verify_endphase(gnutls_session_t session, char *checksum); 95 /* Data for session resumption */ 106 gnutls_session session; member in struct:tls_connection 173 * that is expected to have same structure definition for the session 295 ret = gnutls_init(&conn->session, 303 ret = gnutls_set_default_priority(conn->session); 307 ret = gnutls_certificate_type_set_priority(conn->session, cert_types); 311 ret = gnutls_protocol_set_priority(conn->session, protos); 315 gnutls_transport_set_pull_function(conn->session, tls_pull_func); 316 gnutls_transport_set_push_function(conn->session, tls_push_fun [all...] |
/external/webkit/Source/WebKit/gtk/webkit/ |
H A D | webkitsoupauthdialog.c | 44 static void attach(SoupSessionFeature* manager, SoupSession* session); 45 static void detach(SoupSessionFeature* manager, SoupSession* session); 100 SoupSession* session; member in struct:_WebKitAuthData 152 soup_session_unpause_message(authData->session, authData->msg); 186 static gboolean session_can_save_passwords(SoupSession* session) argument 189 return soup_session_get_feature(session, SOUP_TYPE_PASSWORD_MANAGER) != NULL; 311 if (session_can_save_passwords(authData->session)) { 327 static void session_authenticate(SoupSession* session, SoupMessage* msg, SoupAuth* auth, gboolean retrying, gpointer user_data) argument 337 soup_session_pause_message(session, msg); 345 authData->session 362 attach(SoupSessionFeature* manager, SoupSession* session) argument 367 detach(SoupSessionFeature* manager, SoupSession* session) argument [all...] |
/external/chromium/net/http/ |
H A D | http_network_layer.cc | 20 HttpNetworkLayer::HttpNetworkLayer(HttpNetworkSession* session) argument 21 : session_(session), 33 HttpNetworkSession* session) { 34 DCHECK(session); 36 return new HttpNetworkLayer(session); 32 CreateFactory( HttpNetworkSession* session) argument
|
H A D | http_response_body_drainer.cc | 27 void HttpResponseBodyDrainer::Start(HttpNetworkSession* session) { argument 36 session_ = session; 37 session->AddResponseDrainer(this);
|
/external/replicaisland/src/com/replica/replicaisland/ |
H A D | EventReporter.java | 22 public long session; field in class:EventReporter.Event 55 public void addEvent(int eventType, float x, float y, float time, String level, int version, long session) { argument 62 event.session = session; 93 + "&session=" + event.session);
|
/external/openssl/ssl/ |
H A D | s3_clnt.c | 315 /* receive renewed session ticket */ 485 s->session->cipher=s->s3->tmp.new_cipher; 487 s->session->compress_meth=0; 490 s->session->compress_meth=0; 492 s->session->compress_meth= 715 SSL_SESSION *sess = s->session; 734 /* else use the pre-loaded session */ 791 i=s->session->session_id_length; 795 if (i > (int)sizeof(s->session->session_id)) 800 memcpy(p,s->session [all...] |
/external/chromium/third_party/libjingle/source/talk/ |
H A D | libjingle.scons | 61 "session/phone/libudevsymboltable.cc", 62 "session/phone/v4llookup.cc", 67 "session/phone/devicemanager_mac.mm", 145 "p2p/base/session.cc", 161 "session/tunnel/pseudotcpchannel.cc", 162 "session/tunnel/tunnelsessionclient.cc", 163 "session/tunnel/securetunnelsessionclient.cc", 164 "session/phone/audiomonitor.cc", 165 "session/phone/call.cc", 166 "session/phon [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/lib/ |
H A D | ant-jsch.jar | ... s?defs= " (com.jcraft.jsch.Session) com.jcraft.jsch.Session session
public void ... |
/external/openssh/ |
H A D | ssh-pkcs11.c | 45 CK_SESSION_HANDLE session; member in struct:pkcs11_slotinfo 100 if (p->slotinfo[i].session && 102 p->slotinfo[i].session)) != CKR_OK) 196 CK_SESSION_HANDLE session; local 202 session = p->slotinfo[slotidx].session; 203 if ((rv = f->C_FindObjectsInit(session, attr, nattr)) != CKR_OK) { 207 if ((rv = f->C_FindObjects(session, obj, 1, &nfound)) != CKR_OK || 213 if ((rv = f->C_FindObjectsFinal(session)) != CKR_OK) 267 if ((rv = f->C_Login(si->session, CKU_USE 354 CK_SESSION_HANDLE session; local 398 CK_SESSION_HANDLE session; local [all...] |
/external/mtpd/ |
H A D | l2tp.c | 18 * creates a single session. The following code only handles control packets. 128 static void set_message(uint16_t session, uint16_t message) argument 134 p[3] = session; 183 static int recv_packet(uint16_t *session) argument 228 *session = p[3]; 362 .local = {.tunnel = local_tunnel, .session = local_session}, 363 .remote = {.tunnel = remote_tunnel, .session = remote_session}, 415 uint16_t session = 0; local 417 if (!recv_packet(&session)) { 421 /* Here is the fun part. We always try to protect our tunnel and session [all...] |
/external/chromium/chrome/browser/sync/engine/ |
H A D | syncer_proto_util.cc | 85 sessions::SyncSession* session) { 93 session->status_controller()->set_types_needing_local_migration(to_migrate); 142 sessions::SyncSession* session, 164 session->context()->NotifyListeners(event); 204 SyncSession* session) { 212 ScopedDirLookup dir(session->context()->directory_manager(), 213 session->context()->account_name()); 217 if (!PostAndProcessHeaders(session->context()->connection_manager(), session, 222 session 83 HandleMigrationDoneResponse( const sync_pb::ClientToServerResponse* response, sessions::SyncSession* session) argument 141 PostAndProcessHeaders(ServerConnectionManager* scm, sessions::SyncSession* session, const ClientToServerMessage& msg, ClientToServerResponse* response) argument 201 PostClientToServerMessage( const ClientToServerMessage& msg, ClientToServerResponse* response, SyncSession* session) argument [all...] |
H A D | apply_updates_command_unittest.cc | 142 apply_updates_command_.ExecuteImpl(session()); 144 sessions::StatusController* status = session()->status_controller(); 165 apply_updates_command_.ExecuteImpl(session()); 167 sessions::StatusController* status = session()->status_controller(); 182 apply_updates_command_.ExecuteImpl(session()); 184 sessions::StatusController* status = session()->status_controller(); 204 apply_updates_command_.ExecuteImpl(session()); 206 sessions::StatusController* status = session()->status_controller(); 226 session()->context()->directory_manager()->GetCryptographer(&trans); 240 apply_updates_command_.ExecuteImpl(session()); [all...] |
H A D | process_commit_response_command.h | 31 virtual bool ModelNeutralExecuteImpl(sessions::SyncSession* session); 32 virtual void ModelChangingExecuteImpl(sessions::SyncSession* session); 44 void ProcessCommitResponse(sessions::SyncSession* session);
|
H A D | syncer_proto_util.h | 43 // session->status()->syncer_stuck_ is set true if the birthday is 48 sessions::SyncSession* session); 109 sessions::SyncSession* session); 114 sessions::SyncSession* session,
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_gnutls.c | 73 /* Data for session resumption */ 84 gnutls_session session; member in struct:tls_connection 137 * that is expected to have same structure definition for the session 259 ret = gnutls_init(&conn->session, 267 ret = gnutls_set_default_priority(conn->session); 272 ret = gnutls_priority_set_direct(conn->session, "NORMAL:-VERS-SSL3.0", 280 ret = gnutls_certificate_type_set_priority(conn->session, cert_types); 284 ret = gnutls_protocol_set_priority(conn->session, protos); 289 gnutls_transport_set_pull_function(conn->session, tls_pull_func); 290 gnutls_transport_set_push_function(conn->session, tls_push_fun [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_gnutls.c | 73 /* Data for session resumption */ 84 gnutls_session session; member in struct:tls_connection 137 * that is expected to have same structure definition for the session 259 ret = gnutls_init(&conn->session, 267 ret = gnutls_set_default_priority(conn->session); 272 ret = gnutls_priority_set_direct(conn->session, "NORMAL:-VERS-SSL3.0", 280 ret = gnutls_certificate_type_set_priority(conn->session, cert_types); 284 ret = gnutls_protocol_set_priority(conn->session, protos); 289 gnutls_transport_set_pull_function(conn->session, tls_pull_func); 290 gnutls_transport_set_push_function(conn->session, tls_push_fun [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_gnutls.c | 73 /* Data for session resumption */ 84 gnutls_session session; member in struct:tls_connection 137 * that is expected to have same structure definition for the session 259 ret = gnutls_init(&conn->session, 267 ret = gnutls_set_default_priority(conn->session); 272 ret = gnutls_priority_set_direct(conn->session, "NORMAL:-VERS-SSL3.0", 280 ret = gnutls_certificate_type_set_priority(conn->session, cert_types); 284 ret = gnutls_protocol_set_priority(conn->session, protos); 289 gnutls_transport_set_pull_function(conn->session, tls_pull_func); 290 gnutls_transport_set_push_function(conn->session, tls_push_fun [all...] |
/external/chromium/chrome/browser/sync/sessions/ |
H A D | sync_session.h | 9 // session status in response to events and hiccups along the way, set and 10 // query session progress with regards to conflict resolution and applying 11 // server updates, and access the SyncSessionContext for the current session 45 // The Delegate services events that occur during the session requiring an 46 // explicit (and session-global) action, as opposed to events that are simply 47 // recorded in per-session state. 57 // as the delegate ensures no session is started if syncing is silenced. 59 // session and the interval has not yet elapsed, but the contract here is 61 // that any given session _instance_ is silenced. An example of reasonable 90 // Builds a thread-safe and read-only copy of the current session stat 170 ScopedSetSessionWriteTransaction(SyncSession* session, syncable::WriteTransaction* trans) argument [all...] |
/external/webkit/Source/WebKit/efl/ewk/ |
H A D | ewk_main.cpp | 207 SoupSession* session = WebCore::ResourceHandle::defaultSession(); local 208 soup_session_add_feature_by_type(session, SOUP_TYPE_CONTENT_SNIFFER); 209 soup_session_add_feature_by_type(session, SOUP_TYPE_CONTENT_DECODER);
|
/external/apache-http/src/org/apache/http/conn/ssl/ |
H A D | X509HostnameVerifier.java | 62 boolean verify(String host, SSLSession session); argument
|