Searched defs:session (Results 251 - 275 of 289) sorted by relevance

<<1112

/external/wpa_supplicant_8/wpa_supplicant/src/radius/
H A Dradius_server.c67 * struct radius_session - Internal RADIUS server data for a session
131 * next_sess_id - Next session identifier
372 "(timestamp,session,nas_ip,username,note)"
468 struct radius_session *session, *prev; local
473 session = client->sessions;
474 while (session) {
475 if (session == sess) {
484 prev = session;
485 session = session
1483 struct radius_session *session, *prev; local
[all...]
/external/chromium_org/net/spdy/
H A Dspdy_network_transaction_unittest.cc177 // have a valid session left open, which leaks the entire session pool.
184 session()->spdy_session_pool()->CloseAllSessions();
253 // over a SSL session.
377 void SetSession(const scoped_refptr<HttpNetworkSession>& session) { argument
378 session_ = session;
384 const scoped_refptr<HttpNetworkSession>& session() const { function in class:net::SpdyNetworkTransactionTest::NormalSpdyTransactionHelper
601 // session. Once we have the session, we verify that the streams are
609 const scoped_refptr<HttpNetworkSession>& session local
676 StartTransactionCallback( const scoped_refptr<HttpNetworkSession>& session, int result) argument
[all...]
H A Dspdy_session.cc459 const base::WeakPtr<SpdySession>& session,
464 DCHECK(session);
470 session_ = session;
477 int rv = session->TryCreateStream(weak_ptr_factory_.GetWeakPtr(), &stream);
775 return true; // This is not a secure session, so all domains are okay.
816 "session.");
1151 // might end up being stalled by the session also.
1162 // Obey send window size of the session if session flow control is
1262 // Just report that we're idle since the session coul
457 StartRequest( SpdyStreamType type, const base::WeakPtr<SpdySession>& session, const GURL& url, RequestPriority priority, const BoundNetLog& net_log, const CompletionCallback& callback) argument
[all...]
/external/chromium_org/third_party/boringssl/src/ssl/
H A Dssl_lib.c193 SSL_SESSION_free(s->session);
194 s->session=NULL;
239 * so, revert back if we are not doing session-id reuse. */
240 if (!s->in_handshake && (s->session == NULL) && (s->method != s->ctx->method))
472 * we can "construct" a session to give us the desired check - ie. to
473 * find if there's a session in the hash table that would conflict with
474 * any new session built out of this id/id_len and the ssl_version in
484 /* NB: SSLv2 always uses a fixed 16-byte session ID, so even if a
659 if (s->session != NULL)
662 SSL_SESSION_free(s->session);
1695 SSL_SESSION *session = ssl->session; local
1709 SSL_SESSION *session = ssl->session; local
[all...]
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/
H A Dsession_unittest.cc41 #include "talk/p2p/base/session.h"
72 // Controls how long we wait for a session to send messages that we
142 return "<session"
143 " xmlns=\"http://www.google.com/session\""
149 "</session>";
198 " action=\"session-initiate\""
328 return JingleActionXml("session-accept", content_xml);
398 "session-terminate",
412 "<redirect xmlns=\"http://www.google.com/session\">"
767 void OnSessionCreate(cricket::Session* session, boo argument
770 OnSessionDestroy(cricket::Session* session) argument
1002 OnSessionDestroy(cricket::Session *session) argument
1006 OnSessionState(cricket::BaseSession* session, cricket::BaseSession::State state) argument
1014 OnSessionError(cricket::BaseSession* session, cricket::BaseSession::Error error) argument
1026 OnSessionRemoteDescriptionUpdate(cricket::BaseSession* session, const cricket::ContentInfos& contents) argument
1031 OnNewLocalDescription(cricket::BaseSession* session, cricket::ContentAction action) argument
1038 OnNewRemoteDescription(cricket::BaseSession* session, cricket::ContentAction action) argument
1114 cricket::Session* session; member in class:TestClient
[all...]
/external/chromium_org/third_party/libjingle/source/talk/session/media/
H A Dchannel.cc28 #include "talk/session/media/channel.h"
33 #include "talk/session/media/channelmanager.h"
34 #include "talk/session/media/mediamessages.h"
35 #include "talk/session/media/typingmonitor.h"
64 static void SetSessionError(BaseSession* session, BaseSession::Error error, argument
66 session->SetError(error, error_desc);
156 MediaChannel* media_channel, BaseSession* session,
160 session_(session),
599 // Our session description indicates that SRTP is required, but we got a
629 BaseSession* session, ContentActio
154 BaseChannel(rtc::Thread* thread, MediaEngineInterface* media_engine, MediaChannel* media_channel, BaseSession* session, const std::string& content_name, bool rtcp) argument
628 OnNewLocalDescription( BaseSession* session, ContentAction action) argument
642 OnNewRemoteDescription( BaseSession* session, ContentAction action) argument
1252 VoiceChannel(rtc::Thread* thread, MediaEngineInterface* media_engine, VoiceMediaChannel* media_channel, BaseSession* session, const std::string& content_name, bool rtcp) argument
1651 VideoChannel(rtc::Thread* thread, MediaEngineInterface* media_engine, VideoMediaChannel* media_channel, BaseSession* session, const std::string& content_name, bool rtcp, VoiceChannel* voice_channel) argument
2100 DataChannel(rtc::Thread* thread, DataMediaChannel* media_channel, BaseSession* session, const std::string& content_name, bool rtcp) argument
[all...]
/external/libmtp/src/
H A Dptp.c191 /* try to clean up potential left overs from previous session */
486 * session - session number
488 * Establishes a new session.
493 ptp_opensession (PTPParams* params, uint32_t session) argument
498 ptp_debug(params,"PTP: Opening session");
513 ptp.Param1=session;
516 /* now set the global session id to current session number */
517 params->session_id=session;
[all...]
/external/linux-tools-perf/perf-3.12.0/tools/perf/
H A Dbuiltin-sched.c11 #include "util/session.h"
1458 struct perf_session *session; local
1460 session = perf_session__new(input_name, O_RDONLY, 0, false, &sched->tool);
1461 if (session == NULL) {
1462 pr_debug("No Memory for session\n");
1466 if (perf_session__set_tracepoints_handlers(session, handlers))
1469 if (perf_session__has_traces(session, "record -R")) {
1470 int err = perf_session__process_events(session, &sched->tool);
1476 sched->nr_events = session->stats.nr_events[0];
1477 sched->nr_lost_events = session
1526 struct perf_session *session; local
[all...]
/external/linux-tools-perf/perf-3.12.0/tools/perf/util/
H A Dheader.c17 #include "session.h"
259 struct perf_session *session = container_of(header, local
262 int err = machine__write_buildid_table(&session->machines.host, fd);
267 for (nd = rb_first(&session->machines.guests); nd; nd = rb_next(nd)) {
422 static int perf_session__cache_build_ids(struct perf_session *session) argument
433 ret = machine__cache_build_ids(&session->machines.host, debugdir);
435 for (nd = rb_first(&session->machines.guests); nd; nd = rb_next(nd)) {
449 static bool perf_session__read_build_ids(struct perf_session *session, bool with_hits) argument
452 bool ret = machine__read_build_ids(&session->machines.host, with_hits);
454 for (nd = rb_first(&session
472 struct perf_session *session; local
1486 struct perf_session *session; local
1508 __event_process_build_id(struct build_id_event *bev, char *filename, struct perf_session *session) argument
1566 struct perf_session *session = container_of(header, struct perf_session, header); local
1612 struct perf_session *session = container_of(header, struct perf_session, header); local
1805 struct perf_session *session; local
2028 struct perf_session *session; local
2188 perf_header__fprintf_info(struct perf_session *session, FILE *fp, bool full) argument
2288 perf_session__write_header(struct perf_session *session, struct perf_evlist *evlist, int fd, bool at_exit) argument
2648 perf_header__read_pipe(struct perf_session *session) argument
2752 perf_session__read_header(struct perf_session *session) argument
2883 perf_event__synthesize_attrs(struct perf_tool *tool, struct perf_session *session, perf_event__handler_t process) argument
2988 perf_event__process_tracing_data(struct perf_tool *tool __maybe_unused, union perf_event *event, struct perf_session *session) argument
3055 perf_event__process_build_id(struct perf_tool *tool __maybe_unused, union perf_event *event, struct perf_session *session) argument
[all...]
/external/openssl/ssl/
H A Dkssl.c1136 kssl_ctx->enctype = krb5credsp->session.keytype;
1187 if (kssl_ctx_setkey(kssl_ctx, &krb5credsp->session))
1303 ** Return Kerberos session key and client principle
1516 !krb5ticket->enc_part2->session)
1529 else if (kssl_ctx_setkey(kssl_ctx, krb5ticket->enc_part2->session))
1684 /* Copy the Kerberos session key from a (krb5_keyblock *) to a kssl_ctx
1685 ** struct. Clear kssl_ctx->key if Kerberos session key is NULL.
1688 kssl_ctx_setkey(KSSL_CTX *kssl_ctx, krb5_keyblock *session) argument
1702 if (session)
1706 length = session
[all...]
H A Dssl.h173 /* SSLeay version number for ASN.1 encoding of the session information */
462 * Ticket_lifetime_hint [9] EXPLICIT INTEGER, -- server's lifetime hint for session ticket
463 * Ticket [10] EXPLICIT OCTET STRING, -- session ticket (clients only)
472 int ssl_version; /* what ssl version session info is
483 /* this is used to determine whether the session is being reused in
497 /* Used to indicate that session resumption is not allowed.
498 * Applications can also set this bit for a new session via
499 * not_resumable_session_cb to disable session caching and tickets. */
510 /* when app_verify_callback accepts a session where the peer's certificate
511 * is not ok, we must remember the error for session reus
1323 SSL_SESSION *session; member in struct:ssl_st
[all...]
/external/chromium_org/chrome/browser/resources/chromeos/chromevox/common/
H A Dchrome_extension_externs.js1096 Cookie.prototype.session;
/external/chromium_org/net/http/
H A Dhttp_network_transaction_unittest.cc93 int GetIdleSocketCountInTransportSocketPool(net::HttpNetworkSession* session) { argument
94 return session->GetTransportSocketPool(
98 int GetIdleSocketCountInSSLSocketPool(net::HttpNetworkSession* session) { argument
99 return session->GetSSLSocketPool(
103 bool IsTransportSocketPoolStalled(net::HttpNetworkSession* session) { argument
104 return session->GetTransportSocketPool(
304 scoped_refptr<HttpNetworkSession> session(CreateSession(&session_deps_));
306 new HttpNetworkTransaction(DEFAULT_PRIORITY, session.get()));
640 scoped_refptr<HttpNetworkSession> session(CreateSession(&session_deps_));
642 new HttpNetworkTransaction(DEFAULT_PRIORITY, session
7546 GroupNameTransactionHelper( const std::string& url, const scoped_refptr<HttpNetworkSession>& session) argument
[all...]
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/
H A Dorg.mortbay.jetty.server_6.1.23.v201004211559.jarMETA-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ...
H A Dorg.eclipse.equinox.p2.engine_2.0.0.v20100606.jarMETA-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ...
H A Djavax.servlet_2.5.0.v200910301333.jarMETA-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ...
H A Dorg.eclipse.text_3.5.0.v20100601-1300.jarMETA-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ...
H A Dorg.eclipse.equinox.p2.ui.sdk.scheduler_1.0.0.v20100507-1815.jar ... .eclipse.equinox.p2.operations.ProvisioningSession session public static final String PLUGIN_ID public static org.osgi ...
H A Dorg.eclipse.pde.api.tools_1.0.202.v20100820_r361.jarMETA-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ...
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.eclipse.build.tools/
H A DbuildTools.jar ... java.util.Properties props javax.mail.Session session javax.mail.internet.MimeMessage message javax ...
/external/robolectric/lib/main/
H A Dh2-1.2.147.jarMETA-INF/MANIFEST.MF META-INF/services/java.sql.Driver org/h2/api/AggregateFunction ...
/external/conscrypt/src/main/native/
H A Dorg_conscrypt_NativeCrypto.cpp6644 * Dark magic helper function that checks, for a given SSL session, whether it
7198 // We also disable session tickets for better compatibility b/2682876
7908 throwSSLExceptionWithSslErrors(env, ssl, sslErrorCode, "SSL session set");
8170 static void debug_print_session_key(SSL_SESSION* session) argument
8177 hex_string(&session_id_str, session->session_id, session->session_id_length);
8178 hex_string(&master_key_str, session->master_key, session->master_key_length);
8180 X509* peer = SSL_SESSION_get0_peer(session);
8199 JNI_TRACE("ssl_session=%p %s", session, keylin
[all...]
/external/chromium_org/third_party/boringssl/src/include/openssl/
H A Dssl.h163 /* SSLeay version number for ASN.1 encoding of the session information */
378 * Ticket_lifetime_hint [9] EXPLICIT INTEGER, -- server's lifetime hint for session ticket
379 * Ticket [10] EXPLICIT OCTET STRING, -- session ticket (clients only)
392 int ssl_version; /* what ssl version session info is
403 /* this is used to determine whether the session is being reused in
411 /* Used to indicate that session resumption is not allowed.
412 * Applications can also set this bit for a new session via
413 * not_resumable_session_cb to disable session caching and tickets. */
424 /* when app_verify_callback accepts a session where the peer's certificate
425 * is not ok, we must remember the error for session reus
1331 SSL_SESSION *session; member in struct:ssl_st
[all...]
/external/openssl/include/openssl/
H A Dssl.h173 /* SSLeay version number for ASN.1 encoding of the session information */
462 * Ticket_lifetime_hint [9] EXPLICIT INTEGER, -- server's lifetime hint for session ticket
463 * Ticket [10] EXPLICIT OCTET STRING, -- session ticket (clients only)
472 int ssl_version; /* what ssl version session info is
483 /* this is used to determine whether the session is being reused in
497 /* Used to indicate that session resumption is not allowed.
498 * Applications can also set this bit for a new session via
499 * not_resumable_session_cb to disable session caching and tickets. */
510 /* when app_verify_callback accepts a session where the peer's certificate
511 * is not ok, we must remember the error for session reus
1323 SSL_SESSION *session; member in struct:ssl_st
[all...]
/external/chromium_org/third_party/closure_compiler/externs/
H A Dchrome_extensions.js4882 Cookie.prototype.session;
6957 * Establish the session.
6961 * callback Called when the session is established or on error. 1st param,
6962 * |sessionId|, is the session ID (identifies the session for future calls).
6996 * Terminate the session with the device.

Completed in 602 milliseconds

<<1112