/external/openssl/ssl/ |
H A D | ssl_locl.h | 832 int ssl_get_new_session(SSL *s, int session); 833 int ssl_get_prev_session(SSL *s, unsigned char *session,int len, const unsigned char *limit);
|
/external/qemu/ui/ |
H A D | vnc-android.c | 172 if (client->tls.session && 578 // XXX need one stream per session 984 if (vs->tls.session) { 985 ret = gnutls_write(vs->tls.session, data, datalen); 1088 if (vs->tls.session) { 1089 ret = gnutls_read(vs->tls.session, data, datalen);
|
H A D | vnc.c | 164 if (client->tls.session && 570 // XXX need one stream per session 976 if (vs->tls.session) { 977 ret = gnutls_write(vs->tls.session, data, datalen); 1081 if (vs->tls.session) { 1082 ret = gnutls_read(vs->tls.session, data, datalen);
|
/external/chromium_org/net/spdy/ |
H A D | spdy_session.cc | 459 const base::WeakPtr<SpdySession>& session, 464 DCHECK(session); 470 session_ = session; 477 int rv = session->TryCreateStream(weak_ptr_factory_.GetWeakPtr(), &stream); 775 return true; // This is not a secure session, so all domains are okay. 816 "session."); 1151 // might end up being stalled by the session also. 1162 // Obey send window size of the session if session flow control is 1262 // Just report that we're idle since the session coul 457 StartRequest( SpdyStreamType type, const base::WeakPtr<SpdySession>& session, const GURL& url, RequestPriority priority, const BoundNetLog& net_log, const CompletionCallback& callback) argument [all...] |
H A D | spdy_session.h | 163 const base::WeakPtr<SpdySession>& session, 234 // |spdy_session_key| is the host/port that this session connects to, privacy 236 // |session| is the HttpNetworkSession. |net_log| is the NetLog that we log 277 // Initialize the session with the given connection. |is_secure| 288 // The session begins reading from |connection| on a subsequent event loop 296 // Returns the protocol used by this session. Always between 300 // Check to see if this SPDY session can support an additional domain. 301 // If the session is un-authenticated, then this call always returns true. 303 // this session provides authentication for the domain and no client 335 // session [all...] |
H A D | spdy_test_util_common.cc | 280 const base::WeakPtr<SpdySession>& session, 285 int rv = stream_request.StartRequest(type, session, url, priority, net_log, 278 CreateStreamSynchronously( SpdyStreamType type, const base::WeakPtr<SpdySession>& session, const GURL& url, RequestPriority priority, const BoundNetLog& net_log) argument
|
/external/chromium_org/net/test/android/javatests/src/org/chromium/net/test/util/ |
H A D | TestWebServer.java | 370 public boolean verify(String hostname, SSLSession session) { argument
|
/external/chromium_org/third_party/libjingle/source/talk/session/media/ |
H A D | srtpfilter.cc | 30 #include "talk/session/media/srtpfilter.h" 56 #include "talk/session/media/externalhmac.h" 322 // unencrypted session. 635 LOG(LS_ERROR) << "Failed to create SRTP session: " 636 << "SRTP session already created"; 654 LOG(LS_WARNING) << "Failed to create SRTP session: unsupported" 660 LOG(LS_WARNING) << "Failed to create SRTP session: invalid key"; 667 // TODO(astor) parse window size from WSH session-param 684 LOG(LS_ERROR) << "Failed to create SRTP session, err=" << err; 755 if ((*it)->session_ == ev->session) { [all...] |
H A D | channel_unittest.cc | 35 #include "talk/session/media/channel.h" 36 #include "talk/session/media/mediamessages.h" 37 #include "talk/session/media/mediarecorder.h" 38 #include "talk/session/media/mediasessionclient.h" 39 #include "talk/session/media/typingmonitor.h" 92 // Controls how long we wait for a session to send messages that we 268 cricket::BaseSession* session, 271 thread, engine, ch, session, cricket::CN_AUDIO, rtcp); 730 // Use a partial updated session description. 798 // Use a partial updated session descriptio 265 CreateChannel(rtc::Thread* thread, cricket::MediaEngineInterface* engine, typename T::MediaChannel* ch, cricket::BaseSession* session, bool rtcp) argument 1916 CreateChannel( rtc::Thread* thread, cricket::MediaEngineInterface* engine, cricket::FakeVideoMediaChannel* ch, cricket::BaseSession* session, bool rtcp) argument 2711 CreateChannel( rtc::Thread* thread, cricket::MediaEngineInterface* engine, cricket::FakeDataMediaChannel* ch, cricket::BaseSession* session, bool rtcp) argument [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.text_3.5.0.v20100601-1300.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.eclipse.equinox.p2.ui.sdk.scheduler_1.0.0.v20100507-1815.jar | ... .eclipse.equinox.p2.operations.ProvisioningSession session public static final String PLUGIN_ID public static org.osgi ... |
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/http/ |
H A D | HttpOverSpdyTest.java | 74 public boolean verify(String hostname, SSLSession session) {
|
/external/openssl/crypto/des/ |
H A D | set_key.c | 355 schedule->session=NULL;
|
/external/chromium_org/chrome/browser/profiles/ |
H A D | profile_io_data.cc | 970 // The SSL session cache is partitioned by setting a string. This returns a 971 // unique string to partition the SSL session cache. Each time we create a 972 // new profile, we'll get a fresh SSL session cache which is separate from 1270 net::HttpNetworkSession* session = new net::HttpNetworkSession(params); local 1272 new DevToolsNetworkTransactionFactory(network_controller_.get(), session),
|
/external/chromium_org/sync/tools/testserver/ |
H A D | chromiumsync.py | 135 SESSION: SYNC_TYPE_FIELDS['session'], 938 objects committed earlier this session. If the entry gets a new ID 1638 session = {} # Tracks ID renaming during the commit operation. 1647 server_entry = self.account.CommitEntry(entry, guid, session)
|
/external/chromium_org/third_party/libjingle/ |
H A D | libjingle.target.darwin-arm.mk | 41 third_party/libjingle/source/talk/p2p/base/session.cc \
|
H A D | libjingle.target.linux-arm.mk | 41 third_party/libjingle/source/talk/p2p/base/session.cc \
|
/external/chromium_org/third_party/libjingle/source/talk/app/webrtc/ |
H A D | statscollector.cc | 33 #include "talk/session/media/channel.h" 553 StatsCollector::StatsCollector(WebRtcSession* session) argument 554 : session_(session), stats_gathering_started_(0) { 815 // Extract information from the base session.
|
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
H A D | ssl.h | 163 /* SSLeay version number for ASN.1 encoding of the session information */ 378 * Ticket_lifetime_hint [9] EXPLICIT INTEGER, -- server's lifetime hint for session ticket 379 * Ticket [10] EXPLICIT OCTET STRING, -- session ticket (clients only) 392 int ssl_version; /* what ssl version session info is 403 /* this is used to determine whether the session is being reused in 411 /* Used to indicate that session resumption is not allowed. 412 * Applications can also set this bit for a new session via 413 * not_resumable_session_cb to disable session caching and tickets. */ 424 /* when app_verify_callback accepts a session where the peer's certificate 425 * is not ok, we must remember the error for session reus 1331 SSL_SESSION *session; member in struct:ssl_st [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_openssl.c | 1823 * Set session id context in order to avoid fatal errors when client 1824 * tries to resume a session. However, set the context to a unique 1825 * value in order to effectively disable session resumption for now 2528 if (ssl == NULL || ssl->s3 == NULL || ssl->session == NULL) 2532 keys->master_key = ssl->session->master_key; 2533 keys->master_key_len = ssl->session->master_key_length;
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_openssl.c | 1823 * Set session id context in order to avoid fatal errors when client 1824 * tries to resume a session. However, set the context to a unique 1825 * value in order to effectively disable session resumption for now 2528 if (ssl == NULL || ssl->s3 == NULL || ssl->session == NULL) 2532 keys->master_key = ssl->session->master_key; 2533 keys->master_key_len = ssl->session->master_key_length;
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_openssl.c | 1823 * Set session id context in order to avoid fatal errors when client 1824 * tries to resume a session. However, set the context to a unique 1825 * value in order to effectively disable session resumption for now 2528 if (ssl == NULL || ssl->s3 == NULL || ssl->session == NULL) 2532 keys->master_key = ssl->session->master_key; 2533 keys->master_key_len = ssl->session->master_key_length;
|
/external/linux-tools-perf/perf-3.12.0/tools/perf/ |
H A D | Makefile | 259 LIB_H += util/session.h 339 LIB_OBJS += $(OUTPUT)util/session.o
|
/external/chromium_org/build/android/ |
H A D | adb_gdb | 308 --force Kill any previous debugging session, if any. 611 # A unique ID for this script's session. This needs to be the same in all
|
/external/chromium_org/content/common/ |
H A D | view_messages.h | 231 IPC_STRUCT_TRAITS_MEMBER(session) 266 // The session storage namespace ID this view should use. 445 // The session storage namespace ID this view should use. 1086 // Notifies the browser that we have session history information. 1231 // Used to go to the session history entry at the given offset (ie, -1 will
|