/external/chromium_org/chrome/test/chromedriver/ |
H A D | util.cc | 26 #include "chrome/test/chromedriver/session.h" 410 Status NotifyCommandListenersBeforeCommand(Session* session, argument 413 session->command_listeners.begin(); 414 it != session->command_listeners.end(); 418 // Do not continue if an error is encountered. Mark session for deletion, 420 if (!session->quit) { 421 session->quit = true; 422 std::string message = base::StringPrintf("session deleted because " 425 if (session->chrome && !session [all...] |
/external/chromium_org/net/spdy/ |
H A D | spdy_stream_unittest.cc | 149 base::WeakPtr<SpdySession> session(CreateDefaultSpdySession()); 153 SPDY_BIDIRECTIONAL_STREAM, session, url, LOWEST, BoundNetLog()); 267 base::WeakPtr<SpdySession> session(CreateDefaultSpdySession()); 271 SPDY_BIDIRECTIONAL_STREAM, session, url, LOWEST, log.bound()); 349 base::WeakPtr<SpdySession> session(CreateDefaultSpdySession()); 353 SPDY_REQUEST_RESPONSE_STREAM, session, url, LOWEST, BoundNetLog()); 410 base::WeakPtr<SpdySession> session(CreateDefaultSpdySession()); 414 SPDY_BIDIRECTIONAL_STREAM, session, url, LOWEST, BoundNetLog()); 468 base::WeakPtr<SpdySession> session(CreateDefaultSpdySession()); 472 SPDY_REQUEST_RESPONSE_STREAM, session, ur [all...] |
H A D | spdy_session_pool_unittest.cc | 57 // A delegate that opens a new session when it is closed. 87 // Set up a SpdyStream to create a new session when it is closed. 88 // CloseCurrentSessions should not close the newly-created session. 115 // Setup the first session to the first host. 116 base::WeakPtr<SpdySession> session = local 125 // Set the stream to create a new session when it is closed. 128 session, GURL("http://www.foo.com"), 133 // Close the current session. 156 // Set up session 1 169 // Set up session 287 base::WeakPtr<SpdySession> session = local 377 base::WeakPtr<SpdySession> session = local [all...] |
/external/linux-tools-perf/perf-3.12.0/tools/perf/ |
H A D | builtin-kmem.c | 11 #include "util/session.h" 341 static void __print_result(struct rb_root *root, struct perf_session *session, argument 345 struct machine *machine = &session->machines.host; 406 static void print_result(struct perf_session *session) argument 409 __print_result(&root_caller_sorted, session, caller_lines, 1); 411 __print_result(&root_alloc_sorted, session, alloc_lines, 0); 480 struct perf_session *session; local 490 session = perf_session__new(input_name, O_RDONLY, 0, false, &perf_kmem); 491 if (session == NULL) 494 if (perf_session__create_kernel_maps(session) < [all...] |
H A D | builtin-mem.c | 7 #include "util/session.h" 124 struct perf_session *session = perf_session__new(input_name, O_RDONLY, local 127 if (session == NULL) 131 ret = perf_session__cpu_bitmap(session, mem->cpu_list, 142 err = perf_session__process_events(session, &mem->tool); 149 perf_session__delete(session);
|
H A D | builtin-top.c | 30 #include "util/session.h" 519 perf_session__fprintf_dsos(top->session, stderr); 585 &top->session->header.env); 712 top->session->stats.nr_unprocessable_samples++); 803 struct perf_session *session = top->session; local 816 evsel = perf_evlist__id2evsel(session->evlist, sample.id); 829 machine = &session->machines.host; 835 machine = &session->machines.host; 839 machine = perf_session__find_machine(session, [all...] |
H A D | builtin-script.c | 9 #include "util/session.h" 172 struct perf_session *session) 177 !perf_session__has_traces(session, "record -R")) 235 static int perf_session__check_output_opt(struct perf_session *session) argument 242 evsel = perf_session__find_first_evtype(session, j); 256 perf_evsel__check_attr(evsel, session)) 561 static int __cmd_script(struct perf_session *session) argument 567 ret = perf_session__process_events(session, &perf_script); 1051 struct perf_session *session) 1085 &session 171 perf_evsel__check_attr(struct perf_evsel *evsel, struct perf_session *session) argument 1050 check_ev_match(char *dir_name, char *scriptname, struct perf_session *session) argument 1115 struct perf_session *session; local 1265 struct perf_session *session; local [all...] |
/external/chromium_org/third_party/tlslite/tests/ |
H A D | tlstest.py | 109 assert(isinstance(connection.session.serverCertChain, X509CertChain)) 110 assert(connection.session.serverName == address[0]) 120 assert(isinstance(connection.session.serverCertChain, X509CertChain)) 129 assert(isinstance(connection.session.serverCertChain, X509CertChain)) 130 assert(connection.session.cipherSuite == constants.CipherSuite.TLS_RSA_WITH_RC4_128_MD5) 141 assert(connection.session.tackExt.tacks[0].getTackId() == "rrted.ptvtl.d2uiq.ox2xe.w4ss3") 142 assert(connection.session.tackExt.activation_flags == 1) 179 assert(isinstance(connection.session.serverCertChain, X509CertChain)) 214 assert(isinstance(connection.session.serverCertChain, X509CertChain)) 224 assert(isinstance(connection.session [all...] |
/external/chromium_org/chrome/browser/sync/glue/ |
H A D | synced_session_tracker_unittest.cc | 40 SyncedSession* session = tracker.GetSession("tag"); local 41 ASSERT_EQ(1U, session->windows.size()); 49 SyncedSession* session = tracker.GetSession("tag"); local 50 ASSERT_EQ(1U, session->windows.size()); 51 ASSERT_EQ(1U, session->windows[10]->tabs.size()); 52 ASSERT_EQ(tracker.GetTab("tag", 15, 1), session->windows[10]->tabs[0]); 70 // Only the session with a valid window and tab gets returned. 86 ASSERT_EQ(2U, windows.size()); // Only windows from tag1 session. 127 SyncedSession* session = tracker.GetSession(tag1); local 132 ASSERT_TRUE(session); [all...] |
/external/chromium_org/base/win/ |
H A D | event_trace_controller_unittest.cc | 140 EXPECT_EQ(NULL, controller.session()); 155 EXPECT_TRUE(NULL != controller.session()); 159 EXPECT_EQ(NULL, controller.session()); 178 EXPECT_TRUE(NULL != controller.session()); 182 EXPECT_EQ(NULL, controller.session());
|
/external/chromium_org/remoting/webapp/ |
H A D | cast_extension_handler.js | 7 * Class handling interaction with the cast extension session of the Chromoting 9 * the client session. It uses the Google Cast Chrome Sender API library to 13 * creates a session, loads our registered receiver application and then becomes 25 * @param {!remoting.ClientSession} clientSession The client session to send 94 // Save messages to send after a session is established. 104 * Send cast-extension messages through the client session. 178 * Listener invoked when a session is created or connected by the SDK. 181 * @param {chrome.cast.Session} session The resulting session. 183 remoting.CastExtensionHandler.prototype.sessionListener = function(session) { [all...] |
/external/lldb/test/python_api/frame/ |
H A D | TestFrames.py | 70 session = StringIO.StringIO() 96 print >> session, "%s(%s)" % (name, ", ".join(argList)) 108 print >> session, "---" 122 print session.getvalue() 123 self.expect(session.getvalue(), "Argugment values displayed correctly",
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | s3_srvr.c | 382 ((alg_a & SSL_aPSK) && s->session->psk_identity_hint)) 403 ((s->session->peer != NULL) && 553 * record the hashshake hashes in |s->session| in case 555 * resumption of this session in the future. */ 586 s->session->cipher=s->s3->tmp.new_cipher; 635 if (s->session->peer && s->ctx->retain_only_sha256_of_client_certs) 637 X509_free(s->session->peer); 638 s->session->peer = NULL; 846 * renegotiation but not a new session (s->new_session remains unset): for servers, 859 { /* previous session */ [all...] |
H A D | t1_enc.c | 302 s->session->master_key,s->session->master_key_length, 306 s->session->master_key_length); 309 for (i=0; i < s->session->master_key_length; i++) 311 printf("%02X", s->session->master_key[i]); 503 s->session->key_arg_length = 0; 591 if (s->session->cipher && 592 ((s->session->cipher->algorithm2 & SSL_CIPHER_ALGORITHM2_AEAD) || 593 (s->session->cipher->algorithm2 & SSL_CIPHER_ALGORITHM2_STATEFUL_AEAD))) 595 if (!ssl_cipher_get_evp_aead(s->session, [all...] |
H A D | ssl_lib.c | 193 SSL_SESSION_free(s->session); 194 s->session=NULL; 239 * so, revert back if we are not doing session-id reuse. */ 240 if (!s->in_handshake && (s->session == NULL) && (s->method != s->ctx->method)) 472 * we can "construct" a session to give us the desired check - ie. to 473 * find if there's a session in the hash table that would conflict with 474 * any new session built out of this id/id_len and the ssl_version in 484 /* NB: SSLv2 always uses a fixed 16-byte session ID, so even if a 659 if (s->session != NULL) 662 SSL_SESSION_free(s->session); 1695 SSL_SESSION *session = ssl->session; local 1709 SSL_SESSION *session = ssl->session; local [all...] |
H A D | t1_lib.c | 443 *out_curve_ids = s->session->tlsext_ellipticcurvelist; 444 *out_curve_ids_len = s->session->tlsext_ellipticcurvelist_length; 598 if (comp_id && s->session->tlsext_ecpointformatlist) 600 uint8_t *p = s->session->tlsext_ecpointformatlist; 601 size_t plen = s->session->tlsext_ecpointformatlist_length; 823 if (s->session && s->session->sess_cert) 824 s->session->sess_cert->peer_key->digest = *out_md; 830 * session and not global settings. 982 if (!s->new_session && s->session [all...] |
/external/openssl/ssl/ |
H A D | s3_srvr.c | 484 || ((alg_a & SSL_aPSK) && ((alg_k & SSL_kEECDH) || s->session->psk_identity_hint)) 517 ((s->session->peer != NULL) && 630 if (!s->session->peer) 746 * record the hashshake hashes in |s->session| in case 748 * resumption of this session in the future. */ 779 s->session->cipher=s->s3->tmp.new_cipher; 1021 /* get the session-id */ 1032 * renegotiation but not a new session (s->new_session remains unset): for servers, 1051 { /* previous session */ 1125 /* we need a cipher if we are not resuming a session */ [all...] |
/external/chromium_org/chrome/browser/local_discovery/ |
H A D | privetv3_session.cc | 32 FetcherDelegate(const base::WeakPtr<PrivetV3Session>& session, 54 const base::WeakPtr<PrivetV3Session>& session, 56 : session_(session), request_(request) { 53 FetcherDelegate( const base::WeakPtr<PrivetV3Session>& session, Request* request) argument
|
/external/chromium_org/net/quic/ |
H A D | reliable_quic_stream.h | 36 QuicSession* session); 48 // Called by the session just before the stream is deleted. 124 // true on stream termination the session must keep track of the stream's byte 152 // Helper method that returns FecProtection to use for writes to the session. 163 const QuicSession* session() const { return session_; } function in class:net::ReliableQuicStream 164 QuicSession* session() { return session_; } function in class:net::ReliableQuicStream 239 // True if the session this stream is running under is a server session.
|
/external/chromium_org/remoting/host/ |
H A D | chromoting_host.h | 117 // Sets the maximum duration of any session. By default, a session has no 127 virtual void OnSessionClosed(ClientSession* session) OVERRIDE; 129 ClientSession* session, 136 protocol::Session* session, 210 // The maximum duration of any session.
|
/external/chromium_org/remoting/protocol/ |
H A D | connection_to_client.cc | 21 ConnectionToClient::ConnectionToClient(protocol::Session* session) argument 26 session_(session) { 38 protocol::Session* ConnectionToClient::session() { function in class:remoting::protocol::ConnectionToClient
|
/external/chromium_org/third_party/libjingle/source/talk/session/media/ |
H A D | mediasessionclient.h | 36 #include "talk/p2p/base/session.h" 40 #include "talk/session/media/call.h" 41 #include "talk/session/media/channelmanager.h" 42 #include "talk/session/media/mediasession.h" 151 void OnSessionCreate(Session *session, bool received_initiate); 152 void OnSessionState(BaseSession *session, BaseSession::State state); 153 void OnSessionDestroy(Session *session); 166 // Maintain a mapping of session id to call.
|
/external/chromium_org/tools/win/static_initializers/ |
H A D | static_initializers.cc | 13 IDiaSession** session, 43 // Open a session for querying symbols. 44 hr = (*source)->openSession(session); 52 hr = (*session)->get_globalScope(global); 11 LoadDataFromPdb(const wchar_t* filename, IDiaDataSource** source, IDiaSession** session, IDiaSymbol** global, DWORD* machine_type) argument
|
/external/chromium_org/chrome/browser/resources/history/ |
H A D | other_devices.js | 79 * Set the session data for the session the context menu was invoked on. 81 * @param {Object} session The model object for the session. 83 DeviceContextMenuController.prototype.setSession = function(session) { 84 this.session_ = session; 134 * of the session that this menu is currently associated with. 149 * @param {Object} session An object containing the device's session data. 153 function Device(session, vie [all...] |
/external/srtp/srtp/ |
H A D | srtp.c | 1176 srtp_dealloc(srtp_t session) { argument 1187 stream = session->stream_list; 1190 status = srtp_stream_uninit_and_dealloc(stream, session->stream_template); 1198 if (session->stream_template != NULL) { 1199 status = srtp_stream_uninit_and_dealloc(session->stream_template, NULL); 1202 /* deallocate session context */ 1203 crypto_free(session); 1210 srtp_add_stream(srtp_t session, argument 1216 if ((session == NULL) || (policy == NULL) || (policy->key == NULL)) 1242 if (session 1269 srtp_create(srtp_t *session, const srtp_policy_t *policy) argument 1308 srtp_remove_stream(srtp_t session, uint32_t ssrc) argument [all...] |