/external/chromium_org/chrome/browser/extensions/ |
H A D | extension_tab_util.cc | 63 app_window->session_id().id()); 301 return browser->session_id().id();
|
H A D | extension_keybinding_apitest.cc | 169 browser()->tab_strip_model()->GetActiveWebContents())->session_id().id();
|
/external/chromium_org/chrome/browser/ui/toolbar/ |
H A D | recent_tabs_sub_menu_model.cc | 505 void RecentTabsSubMenuModel::BuildLocalTabItem(int session_id, argument 509 TabNavigationItem item(std::string(), session_id, title, url); local
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | s3_srvr.c | 716 CBS client_random, session_id, cipher_suites, compression_methods; local 745 CBS session_id; local 750 !CBS_get_u8_length_prefixed(&client_hello, &session_id) || 808 !CBS_get_u8_length_prefixed(&client_hello, &session_id) || 809 CBS_len(&session_id) > SSL_MAX_SSL_SESSION_ID_LENGTH) 962 if (CBS_len(&cipher_suites) == 0 && CBS_len(&session_id) != 0) 1219 if (sl > (int)sizeof(s->session->session_id)) 1225 memcpy(p,s->session->session_id,sl);
|
H A D | t1_lib.c | 275 CBS client_hello, session_id, cipher_suites, compression_methods, extensions; local 287 /* Extract session_id. */ 288 if (!CBS_get_u8_length_prefixed(&client_hello, &session_id)) 290 ctx->session_id = CBS_data(&session_id); 291 ctx->session_id_len = CBS_len(&session_id); 2310 r = tls_decrypt_ticket(s, data, len, ctx->session_id, 2429 memcpy(sess->session_id, sess_id, sesslen);
|
/external/chromium_org/third_party/libjingle/source/talk/p2p/client/ |
H A D | connectivitychecker.cc | 102 const std::string& session_id, 108 session_id_(session_id), 99 ConnectivityChecker( rtc::Thread* worker, const std::string& jid, const std::string& session_id, const std::string& user_agent, const std::string& relay_token, const std::string& connection) argument
|
/external/chromium_org/extensions/browser/app_window/ |
H A D | app_window.h | 13 #include "components/sessions/session_id.h" 219 const SessionID& session_id() const { return session_id_; } function in class:extensions::AppWindow
|
/external/chromium_org/content/renderer/ |
H A D | renderer_webkitplatformsupport_impl.cc | 731 int session_id = 0; local 733 !base::StringToInt(base::UTF16ToUTF8(input_device_id), &session_id)) { 745 return new RendererWebAudioDeviceImpl(params, callback, session_id);
|
/external/chromium_org/third_party/libusb/src/libusb/os/ |
H A D | windows_usb.c | 624 unsigned long session_id = 0; local 644 session_id = htab_hash(sanitized_path); 646 return session_id; 1353 unsigned long session_id; local 1527 session_id = get_ancestor_session_id(dev_info_data.DevInst, ancestor); 1528 if (session_id == 0) { 1531 parent_dev = usbi_get_device_by_session_id(ctx, session_id); 1548 session_id = htab_hash(dev_id_path); 1549 dev = usbi_get_device_by_session_id(ctx, session_id); 1557 usbi_dbg("allocating new device for session [%X]", session_id); [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_pwd.c | 46 u8 session_id[1 + SHA256_MAC_LEN]; member in struct:eap_pwd_data 205 os_memcpy(id, data->session_id, 1 + SHA256_MAC_LEN); 674 &cs, data->msk, data->emsk, data->session_id) < 0) {
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client_read.c | 101 /* SessionID session_id */ 107 os_memcmp(conn->session_id, pos + 1, conn->session_id_len) == 0) { 114 os_memcpy(conn->session_id, pos, conn->session_id_len); 117 wpa_hexdump(MSG_MSGDUMP, "TLSv1: session_id", 118 conn->session_id, conn->session_id_len);
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_pwd.c | 46 u8 session_id[1 + SHA256_MAC_LEN]; member in struct:eap_pwd_data 205 os_memcpy(id, data->session_id, 1 + SHA256_MAC_LEN); 674 &cs, data->msk, data->emsk, data->session_id) < 0) {
|
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_client_read.c | 101 /* SessionID session_id */ 107 os_memcmp(conn->session_id, pos + 1, conn->session_id_len) == 0) { 114 os_memcpy(conn->session_id, pos, conn->session_id_len); 117 wpa_hexdump(MSG_MSGDUMP, "TLSv1: session_id", 118 conn->session_id, conn->session_id_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_pwd.c | 46 u8 session_id[1 + SHA256_MAC_LEN]; member in struct:eap_pwd_data 205 os_memcpy(id, data->session_id, 1 + SHA256_MAC_LEN); 674 &cs, data->msk, data->emsk, data->session_id) < 0) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_client_read.c | 101 /* SessionID session_id */ 107 os_memcmp(conn->session_id, pos + 1, conn->session_id_len) == 0) { 114 os_memcpy(conn->session_id, pos, conn->session_id_len); 117 wpa_hexdump(MSG_MSGDUMP, "TLSv1: session_id", 118 conn->session_id, conn->session_id_len);
|
/external/chromium_org/third_party/tlslite/tlslite/ |
H A D | tlsconnection.py | 585 self.session.create(masterSecret, serverHello.session_id, cipherSuite, 721 serverHello.session_id == session.sessionID: 1363 self.session.create(masterSecret, serverHello.session_id, cipherSuite, 1445 if clientHello.session_id and sessionCache: 1451 session = sessionCache[clientHello.session_id] 1541 # the client's session_id was not found in cache:
|
/external/chromium_org/third_party/libjingle/source/talk/app/webrtc/ |
H A D | webrtcsdp.cc | 260 std::string* session_id, 790 const std::string session_id = jdesc.session_id().empty() ? local 791 kSessionOriginSessionId : jdesc.session_id(); 794 os << " " << session_id << " " << session_version << " " 874 std::string session_id; local 885 if (!ParseSessionDescription(message, ¤t_pos, &session_id, 904 jdesc->Initialize(desc, session_id, session_version); 1790 std::string* session_id, 1819 *session_id 1789 ParseSessionDescription(const std::string& message, size_t* pos, std::string* session_id, std::string* session_version, bool* supports_msid, TransportDescription* session_td, RtpHeaderExtensions* session_extmaps, cricket::SessionDescription* desc, SdpParseError* error) argument [all...] |
/external/chromium_org/content/renderer/media/webrtc/ |
H A D | mock_peer_connection_dependency_factory.cc | 364 virtual std::string session_id() const OVERRIDE {
|
/external/chromium_org/ui/views/win/ |
H A D | hwnd_message_handler.h | 450 void OnSessionChange(WPARAM status_code, PWTSSESSION_NOTIFICATION session_id);
|
/external/libnfc-nci/src/nfa/int/ |
H A D | nfa_hci_int.h | 340 UINT8 session_id[NFA_HCI_SESSION_ID_LEN]; /* Session ID of the host network */ member in struct:__anon24193
|
/external/chromium_org/content/renderer/media/ |
H A D | user_media_client_impl.cc | 802 active_device.session_id == device.session_id) {
|
/external/libnfc-nxp/src/ |
H A D | phHciNfc.c | 132 /*(void)memcpy(((phHal_sHwReference_t *)pHwRef)->session_id, 135 sizeof(((phHal_sHwReference_t *)pHwRef)->session_id));*/ 136 (void)memcpy(pHwConfig->session_id, 140 sizeof(pHwConfig->session_id));
|
/external/openssl/ssl/ |
H A D | s2_srvr.c | 902 if (s->session->session_id_length > sizeof s->session->session_id) 907 memcpy(p,s->session->session_id, (unsigned int)s->session->session_id_length);
|
H A D | t1_lib.c | 2378 * session_id: points at the session ID in the ClientHello. This code will 2407 int tls1_process_ticket(SSL *s, unsigned char *session_id, int len, argument 2411 const unsigned char *p = session_id + len; 2474 r = tls_decrypt_ticket(s, p, size, session_id, len, ret); 2599 memcpy(sess->session_id, sess_id, sesslen);
|
/external/chromium_org/chrome/browser/android/ |
H A D | tab_android.cc | 410 SessionTabHelper::FromWebContents(web_contents())->session_id().id());
|