/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius_server.c | 67 * struct radius_session - Internal RADIUS server data for a session 131 * next_sess_id - Next session identifier 372 "(timestamp,session,nas_ip,username,note)" 468 struct radius_session *session, *prev; local 473 session = client->sessions; 474 while (session) { 475 if (session == sess) { 484 prev = session; 485 session = session 1483 struct radius_session *session, *prev; local [all...] |
/external/chromium_org/net/spdy/ |
H A D | spdy_network_transaction_unittest.cc | 177 // have a valid session left open, which leaks the entire session pool. 184 session()->spdy_session_pool()->CloseAllSessions(); 253 // over a SSL session. 377 void SetSession(const scoped_refptr<HttpNetworkSession>& session) { argument 378 session_ = session; 384 const scoped_refptr<HttpNetworkSession>& session() const { function in class:net::SpdyNetworkTransactionTest::NormalSpdyTransactionHelper 601 // session. Once we have the session, we verify that the streams are 609 const scoped_refptr<HttpNetworkSession>& session local 676 StartTransactionCallback( const scoped_refptr<HttpNetworkSession>& session, int result) argument [all...] |
H A D | spdy_session.cc | 459 const base::WeakPtr<SpdySession>& session, 464 DCHECK(session); 470 session_ = session; 477 int rv = session->TryCreateStream(weak_ptr_factory_.GetWeakPtr(), &stream); 775 return true; // This is not a secure session, so all domains are okay. 816 "session."); 1151 // might end up being stalled by the session also. 1162 // Obey send window size of the session if session flow control is 1262 // Just report that we're idle since the session coul 457 StartRequest( SpdyStreamType type, const base::WeakPtr<SpdySession>& session, const GURL& url, RequestPriority priority, const BoundNetLog& net_log, const CompletionCallback& callback) argument [all...] |
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | ssl_lib.c | 193 SSL_SESSION_free(s->session); 194 s->session=NULL; 239 * so, revert back if we are not doing session-id reuse. */ 240 if (!s->in_handshake && (s->session == NULL) && (s->method != s->ctx->method)) 472 * we can "construct" a session to give us the desired check - ie. to 473 * find if there's a session in the hash table that would conflict with 474 * any new session built out of this id/id_len and the ssl_version in 484 /* NB: SSLv2 always uses a fixed 16-byte session ID, so even if a 659 if (s->session != NULL) 662 SSL_SESSION_free(s->session); 1695 SSL_SESSION *session = ssl->session; local 1709 SSL_SESSION *session = ssl->session; local [all...] |
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
H A D | session_unittest.cc | 41 #include "talk/p2p/base/session.h" 72 // Controls how long we wait for a session to send messages that we 142 return "<session" 143 " xmlns=\"http://www.google.com/session\"" 149 "</session>"; 198 " action=\"session-initiate\"" 328 return JingleActionXml("session-accept", content_xml); 398 "session-terminate", 412 "<redirect xmlns=\"http://www.google.com/session\">" 767 void OnSessionCreate(cricket::Session* session, boo argument 770 OnSessionDestroy(cricket::Session* session) argument 1002 OnSessionDestroy(cricket::Session *session) argument 1006 OnSessionState(cricket::BaseSession* session, cricket::BaseSession::State state) argument 1014 OnSessionError(cricket::BaseSession* session, cricket::BaseSession::Error error) argument 1026 OnSessionRemoteDescriptionUpdate(cricket::BaseSession* session, const cricket::ContentInfos& contents) argument 1031 OnNewLocalDescription(cricket::BaseSession* session, cricket::ContentAction action) argument 1038 OnNewRemoteDescription(cricket::BaseSession* session, cricket::ContentAction action) argument 1114 cricket::Session* session; member in class:TestClient [all...] |
/external/chromium_org/third_party/libjingle/source/talk/session/media/ |
H A D | channel.cc | 28 #include "talk/session/media/channel.h" 33 #include "talk/session/media/channelmanager.h" 34 #include "talk/session/media/mediamessages.h" 35 #include "talk/session/media/typingmonitor.h" 64 static void SetSessionError(BaseSession* session, BaseSession::Error error, argument 66 session->SetError(error, error_desc); 156 MediaChannel* media_channel, BaseSession* session, 160 session_(session), 599 // Our session description indicates that SRTP is required, but we got a 629 BaseSession* session, ContentActio 154 BaseChannel(rtc::Thread* thread, MediaEngineInterface* media_engine, MediaChannel* media_channel, BaseSession* session, const std::string& content_name, bool rtcp) argument 628 OnNewLocalDescription( BaseSession* session, ContentAction action) argument 642 OnNewRemoteDescription( BaseSession* session, ContentAction action) argument 1252 VoiceChannel(rtc::Thread* thread, MediaEngineInterface* media_engine, VoiceMediaChannel* media_channel, BaseSession* session, const std::string& content_name, bool rtcp) argument 1651 VideoChannel(rtc::Thread* thread, MediaEngineInterface* media_engine, VideoMediaChannel* media_channel, BaseSession* session, const std::string& content_name, bool rtcp, VoiceChannel* voice_channel) argument 2100 DataChannel(rtc::Thread* thread, DataMediaChannel* media_channel, BaseSession* session, const std::string& content_name, bool rtcp) argument [all...] |
/external/libmtp/src/ |
H A D | ptp.c | 191 /* try to clean up potential left overs from previous session */ 486 * session - session number 488 * Establishes a new session. 493 ptp_opensession (PTPParams* params, uint32_t session) argument 498 ptp_debug(params,"PTP: Opening session"); 513 ptp.Param1=session; 516 /* now set the global session id to current session number */ 517 params->session_id=session; [all...] |
/external/linux-tools-perf/perf-3.12.0/tools/perf/ |
H A D | builtin-sched.c | 11 #include "util/session.h" 1458 struct perf_session *session; local 1460 session = perf_session__new(input_name, O_RDONLY, 0, false, &sched->tool); 1461 if (session == NULL) { 1462 pr_debug("No Memory for session\n"); 1466 if (perf_session__set_tracepoints_handlers(session, handlers)) 1469 if (perf_session__has_traces(session, "record -R")) { 1470 int err = perf_session__process_events(session, &sched->tool); 1476 sched->nr_events = session->stats.nr_events[0]; 1477 sched->nr_lost_events = session 1526 struct perf_session *session; local [all...] |
/external/linux-tools-perf/perf-3.12.0/tools/perf/util/ |
H A D | header.c | 17 #include "session.h" 259 struct perf_session *session = container_of(header, local 262 int err = machine__write_buildid_table(&session->machines.host, fd); 267 for (nd = rb_first(&session->machines.guests); nd; nd = rb_next(nd)) { 422 static int perf_session__cache_build_ids(struct perf_session *session) argument 433 ret = machine__cache_build_ids(&session->machines.host, debugdir); 435 for (nd = rb_first(&session->machines.guests); nd; nd = rb_next(nd)) { 449 static bool perf_session__read_build_ids(struct perf_session *session, bool with_hits) argument 452 bool ret = machine__read_build_ids(&session->machines.host, with_hits); 454 for (nd = rb_first(&session 472 struct perf_session *session; local 1486 struct perf_session *session; local 1508 __event_process_build_id(struct build_id_event *bev, char *filename, struct perf_session *session) argument 1566 struct perf_session *session = container_of(header, struct perf_session, header); local 1612 struct perf_session *session = container_of(header, struct perf_session, header); local 1805 struct perf_session *session; local 2028 struct perf_session *session; local 2188 perf_header__fprintf_info(struct perf_session *session, FILE *fp, bool full) argument 2288 perf_session__write_header(struct perf_session *session, struct perf_evlist *evlist, int fd, bool at_exit) argument 2648 perf_header__read_pipe(struct perf_session *session) argument 2752 perf_session__read_header(struct perf_session *session) argument 2883 perf_event__synthesize_attrs(struct perf_tool *tool, struct perf_session *session, perf_event__handler_t process) argument 2988 perf_event__process_tracing_data(struct perf_tool *tool __maybe_unused, union perf_event *event, struct perf_session *session) argument 3055 perf_event__process_build_id(struct perf_tool *tool __maybe_unused, union perf_event *event, struct perf_session *session) argument [all...] |
/external/openssl/ssl/ |
H A D | kssl.c | 1136 kssl_ctx->enctype = krb5credsp->session.keytype; 1187 if (kssl_ctx_setkey(kssl_ctx, &krb5credsp->session)) 1303 ** Return Kerberos session key and client principle 1516 !krb5ticket->enc_part2->session) 1529 else if (kssl_ctx_setkey(kssl_ctx, krb5ticket->enc_part2->session)) 1684 /* Copy the Kerberos session key from a (krb5_keyblock *) to a kssl_ctx 1685 ** struct. Clear kssl_ctx->key if Kerberos session key is NULL. 1688 kssl_ctx_setkey(KSSL_CTX *kssl_ctx, krb5_keyblock *session) argument 1702 if (session) 1706 length = session [all...] |
H A D | ssl.h | 173 /* SSLeay version number for ASN.1 encoding of the session information */ 462 * Ticket_lifetime_hint [9] EXPLICIT INTEGER, -- server's lifetime hint for session ticket 463 * Ticket [10] EXPLICIT OCTET STRING, -- session ticket (clients only) 472 int ssl_version; /* what ssl version session info is 483 /* this is used to determine whether the session is being reused in 497 /* Used to indicate that session resumption is not allowed. 498 * Applications can also set this bit for a new session via 499 * not_resumable_session_cb to disable session caching and tickets. */ 510 /* when app_verify_callback accepts a session where the peer's certificate 511 * is not ok, we must remember the error for session reus 1323 SSL_SESSION *session; member in struct:ssl_st [all...] |
/external/chromium_org/chrome/browser/resources/chromeos/chromevox/common/ |
H A D | chrome_extension_externs.js | 1096 Cookie.prototype.session;
|
/external/chromium_org/net/http/ |
H A D | http_network_transaction_unittest.cc | 93 int GetIdleSocketCountInTransportSocketPool(net::HttpNetworkSession* session) { argument 94 return session->GetTransportSocketPool( 98 int GetIdleSocketCountInSSLSocketPool(net::HttpNetworkSession* session) { argument 99 return session->GetSSLSocketPool( 103 bool IsTransportSocketPoolStalled(net::HttpNetworkSession* session) { argument 104 return session->GetTransportSocketPool( 304 scoped_refptr<HttpNetworkSession> session(CreateSession(&session_deps_)); 306 new HttpNetworkTransaction(DEFAULT_PRIORITY, session.get())); 640 scoped_refptr<HttpNetworkSession> session(CreateSession(&session_deps_)); 642 new HttpNetworkTransaction(DEFAULT_PRIORITY, session 7546 GroupNameTransactionHelper( const std::string& url, const scoped_refptr<HttpNetworkSession>& session) argument [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.mortbay.jetty.server_6.1.23.v201004211559.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.eclipse.equinox.p2.engine_2.0.0.v20100606.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | javax.servlet_2.5.0.v200910301333.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.eclipse.text_3.5.0.v20100601-1300.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.eclipse.equinox.p2.ui.sdk.scheduler_1.0.0.v20100507-1815.jar | ... .eclipse.equinox.p2.operations.ProvisioningSession session public static final String PLUGIN_ID public static org.osgi ... |
H A D | org.eclipse.pde.api.tools_1.0.202.v20100820_r361.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.eclipse.build.tools/ |
H A D | buildTools.jar | ... java.util.Properties props
javax.mail.Session session
javax.mail.internet.MimeMessage message
javax ... |
/external/robolectric/lib/main/ |
H A D | h2-1.2.147.jar | META-INF/MANIFEST.MF META-INF/services/java.sql.Driver org/h2/api/AggregateFunction ... |
/external/conscrypt/src/main/native/ |
H A D | org_conscrypt_NativeCrypto.cpp | 6644 * Dark magic helper function that checks, for a given SSL session, whether it 7198 // We also disable session tickets for better compatibility b/2682876 7908 throwSSLExceptionWithSslErrors(env, ssl, sslErrorCode, "SSL session set"); 8170 static void debug_print_session_key(SSL_SESSION* session) argument 8177 hex_string(&session_id_str, session->session_id, session->session_id_length); 8178 hex_string(&master_key_str, session->master_key, session->master_key_length); 8180 X509* peer = SSL_SESSION_get0_peer(session); 8199 JNI_TRACE("ssl_session=%p %s", session, keylin [all...] |
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
H A D | ssl.h | 163 /* SSLeay version number for ASN.1 encoding of the session information */ 378 * Ticket_lifetime_hint [9] EXPLICIT INTEGER, -- server's lifetime hint for session ticket 379 * Ticket [10] EXPLICIT OCTET STRING, -- session ticket (clients only) 392 int ssl_version; /* what ssl version session info is 403 /* this is used to determine whether the session is being reused in 411 /* Used to indicate that session resumption is not allowed. 412 * Applications can also set this bit for a new session via 413 * not_resumable_session_cb to disable session caching and tickets. */ 424 /* when app_verify_callback accepts a session where the peer's certificate 425 * is not ok, we must remember the error for session reus 1331 SSL_SESSION *session; member in struct:ssl_st [all...] |
/external/openssl/include/openssl/ |
H A D | ssl.h | 173 /* SSLeay version number for ASN.1 encoding of the session information */ 462 * Ticket_lifetime_hint [9] EXPLICIT INTEGER, -- server's lifetime hint for session ticket 463 * Ticket [10] EXPLICIT OCTET STRING, -- session ticket (clients only) 472 int ssl_version; /* what ssl version session info is 483 /* this is used to determine whether the session is being reused in 497 /* Used to indicate that session resumption is not allowed. 498 * Applications can also set this bit for a new session via 499 * not_resumable_session_cb to disable session caching and tickets. */ 510 /* when app_verify_callback accepts a session where the peer's certificate 511 * is not ok, we must remember the error for session reus 1323 SSL_SESSION *session; member in struct:ssl_st [all...] |
/external/chromium_org/third_party/closure_compiler/externs/ |
H A D | chrome_extensions.js | 4882 Cookie.prototype.session; 6957 * Establish the session. 6961 * callback Called when the session is established or on error. 1st param, 6962 * |sessionId|, is the session ID (identifies the session for future calls). 6996 * Terminate the session with the device.
|