Searched refs:session (Results 501 - 525 of 553) sorted by relevance

<<212223

/external/openssl/ssl/
H A Dssl_locl.h832 int ssl_get_new_session(SSL *s, int session);
833 int ssl_get_prev_session(SSL *s, unsigned char *session,int len, const unsigned char *limit);
/external/qemu/ui/
H A Dvnc-android.c172 if (client->tls.session &&
578 // XXX need one stream per session
984 if (vs->tls.session) {
985 ret = gnutls_write(vs->tls.session, data, datalen);
1088 if (vs->tls.session) {
1089 ret = gnutls_read(vs->tls.session, data, datalen);
H A Dvnc.c164 if (client->tls.session &&
570 // XXX need one stream per session
976 if (vs->tls.session) {
977 ret = gnutls_write(vs->tls.session, data, datalen);
1081 if (vs->tls.session) {
1082 ret = gnutls_read(vs->tls.session, data, datalen);
/external/chromium_org/net/spdy/
H A Dspdy_session.cc459 const base::WeakPtr<SpdySession>& session,
464 DCHECK(session);
470 session_ = session;
477 int rv = session->TryCreateStream(weak_ptr_factory_.GetWeakPtr(), &stream);
775 return true; // This is not a secure session, so all domains are okay.
816 "session.");
1151 // might end up being stalled by the session also.
1162 // Obey send window size of the session if session flow control is
1262 // Just report that we're idle since the session coul
457 StartRequest( SpdyStreamType type, const base::WeakPtr<SpdySession>& session, const GURL& url, RequestPriority priority, const BoundNetLog& net_log, const CompletionCallback& callback) argument
[all...]
H A Dspdy_session.h163 const base::WeakPtr<SpdySession>& session,
234 // |spdy_session_key| is the host/port that this session connects to, privacy
236 // |session| is the HttpNetworkSession. |net_log| is the NetLog that we log
277 // Initialize the session with the given connection. |is_secure|
288 // The session begins reading from |connection| on a subsequent event loop
296 // Returns the protocol used by this session. Always between
300 // Check to see if this SPDY session can support an additional domain.
301 // If the session is un-authenticated, then this call always returns true.
303 // this session provides authentication for the domain and no client
335 // session
[all...]
H A Dspdy_test_util_common.cc280 const base::WeakPtr<SpdySession>& session,
285 int rv = stream_request.StartRequest(type, session, url, priority, net_log,
278 CreateStreamSynchronously( SpdyStreamType type, const base::WeakPtr<SpdySession>& session, const GURL& url, RequestPriority priority, const BoundNetLog& net_log) argument
/external/chromium_org/net/test/android/javatests/src/org/chromium/net/test/util/
H A DTestWebServer.java370 public boolean verify(String hostname, SSLSession session) { argument
/external/chromium_org/third_party/libjingle/source/talk/session/media/
H A Dsrtpfilter.cc30 #include "talk/session/media/srtpfilter.h"
56 #include "talk/session/media/externalhmac.h"
322 // unencrypted session.
635 LOG(LS_ERROR) << "Failed to create SRTP session: "
636 << "SRTP session already created";
654 LOG(LS_WARNING) << "Failed to create SRTP session: unsupported"
660 LOG(LS_WARNING) << "Failed to create SRTP session: invalid key";
667 // TODO(astor) parse window size from WSH session-param
684 LOG(LS_ERROR) << "Failed to create SRTP session, err=" << err;
755 if ((*it)->session_ == ev->session) {
[all...]
H A Dchannel_unittest.cc35 #include "talk/session/media/channel.h"
36 #include "talk/session/media/mediamessages.h"
37 #include "talk/session/media/mediarecorder.h"
38 #include "talk/session/media/mediasessionclient.h"
39 #include "talk/session/media/typingmonitor.h"
92 // Controls how long we wait for a session to send messages that we
268 cricket::BaseSession* session,
271 thread, engine, ch, session, cricket::CN_AUDIO, rtcp);
730 // Use a partial updated session description.
798 // Use a partial updated session descriptio
265 CreateChannel(rtc::Thread* thread, cricket::MediaEngineInterface* engine, typename T::MediaChannel* ch, cricket::BaseSession* session, bool rtcp) argument
1916 CreateChannel( rtc::Thread* thread, cricket::MediaEngineInterface* engine, cricket::FakeVideoMediaChannel* ch, cricket::BaseSession* session, bool rtcp) argument
2711 CreateChannel( rtc::Thread* thread, cricket::MediaEngineInterface* engine, cricket::FakeDataMediaChannel* ch, cricket::BaseSession* session, bool rtcp) argument
[all...]
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/
H A Dorg.eclipse.text_3.5.0.v20100601-1300.jarMETA-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ...
H A Dorg.eclipse.equinox.p2.ui.sdk.scheduler_1.0.0.v20100507-1815.jar ... .eclipse.equinox.p2.operations.ProvisioningSession session public static final String PLUGIN_ID public static org.osgi ...
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/http/
H A DHttpOverSpdyTest.java74 public boolean verify(String hostname, SSLSession session) {
/external/openssl/crypto/des/
H A Dset_key.c355 schedule->session=NULL;
/external/chromium_org/chrome/browser/profiles/
H A Dprofile_io_data.cc970 // The SSL session cache is partitioned by setting a string. This returns a
971 // unique string to partition the SSL session cache. Each time we create a
972 // new profile, we'll get a fresh SSL session cache which is separate from
1270 net::HttpNetworkSession* session = new net::HttpNetworkSession(params); local
1272 new DevToolsNetworkTransactionFactory(network_controller_.get(), session),
/external/chromium_org/sync/tools/testserver/
H A Dchromiumsync.py135 SESSION: SYNC_TYPE_FIELDS['session'],
938 objects committed earlier this session. If the entry gets a new ID
1638 session = {} # Tracks ID renaming during the commit operation.
1647 server_entry = self.account.CommitEntry(entry, guid, session)
/external/chromium_org/third_party/libjingle/
H A Dlibjingle.target.darwin-arm.mk41 third_party/libjingle/source/talk/p2p/base/session.cc \
H A Dlibjingle.target.linux-arm.mk41 third_party/libjingle/source/talk/p2p/base/session.cc \
/external/chromium_org/third_party/libjingle/source/talk/app/webrtc/
H A Dstatscollector.cc33 #include "talk/session/media/channel.h"
553 StatsCollector::StatsCollector(WebRtcSession* session) argument
554 : session_(session), stats_gathering_started_(0) {
815 // Extract information from the base session.
/external/chromium_org/third_party/boringssl/src/include/openssl/
H A Dssl.h163 /* SSLeay version number for ASN.1 encoding of the session information */
378 * Ticket_lifetime_hint [9] EXPLICIT INTEGER, -- server's lifetime hint for session ticket
379 * Ticket [10] EXPLICIT OCTET STRING, -- session ticket (clients only)
392 int ssl_version; /* what ssl version session info is
403 /* this is used to determine whether the session is being reused in
411 /* Used to indicate that session resumption is not allowed.
412 * Applications can also set this bit for a new session via
413 * not_resumable_session_cb to disable session caching and tickets. */
424 /* when app_verify_callback accepts a session where the peer's certificate
425 * is not ok, we must remember the error for session reus
1331 SSL_SESSION *session; member in struct:ssl_st
[all...]
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dtls_openssl.c1823 * Set session id context in order to avoid fatal errors when client
1824 * tries to resume a session. However, set the context to a unique
1825 * value in order to effectively disable session resumption for now
2528 if (ssl == NULL || ssl->s3 == NULL || ssl->session == NULL)
2532 keys->master_key = ssl->session->master_key;
2533 keys->master_key_len = ssl->session->master_key_length;
/external/wpa_supplicant_8/src/crypto/
H A Dtls_openssl.c1823 * Set session id context in order to avoid fatal errors when client
1824 * tries to resume a session. However, set the context to a unique
1825 * value in order to effectively disable session resumption for now
2528 if (ssl == NULL || ssl->s3 == NULL || ssl->session == NULL)
2532 keys->master_key = ssl->session->master_key;
2533 keys->master_key_len = ssl->session->master_key_length;
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dtls_openssl.c1823 * Set session id context in order to avoid fatal errors when client
1824 * tries to resume a session. However, set the context to a unique
1825 * value in order to effectively disable session resumption for now
2528 if (ssl == NULL || ssl->s3 == NULL || ssl->session == NULL)
2532 keys->master_key = ssl->session->master_key;
2533 keys->master_key_len = ssl->session->master_key_length;
/external/linux-tools-perf/perf-3.12.0/tools/perf/
H A DMakefile259 LIB_H += util/session.h
339 LIB_OBJS += $(OUTPUT)util/session.o
/external/chromium_org/build/android/
H A Dadb_gdb308 --force Kill any previous debugging session, if any.
611 # A unique ID for this script's session. This needs to be the same in all
/external/chromium_org/content/common/
H A Dview_messages.h231 IPC_STRUCT_TRAITS_MEMBER(session)
266 // The session storage namespace ID this view should use.
445 // The session storage namespace ID this view should use.
1086 // Notifies the browser that we have session history information.
1231 // Used to go to the session history entry at the given offset (ie, -1 will

Completed in 895 milliseconds

<<212223