Searched refs:session_id (Results 251 - 275 of 300) sorted by relevance

<<1112

/external/chromium_org/chrome/browser/extensions/
H A Dextension_tab_util.cc63 app_window->session_id().id());
301 return browser->session_id().id();
H A Dextension_keybinding_apitest.cc169 browser()->tab_strip_model()->GetActiveWebContents())->session_id().id();
/external/chromium_org/chrome/browser/ui/toolbar/
H A Drecent_tabs_sub_menu_model.cc505 void RecentTabsSubMenuModel::BuildLocalTabItem(int session_id, argument
509 TabNavigationItem item(std::string(), session_id, title, url); local
/external/chromium_org/third_party/boringssl/src/ssl/
H A Ds3_srvr.c716 CBS client_random, session_id, cipher_suites, compression_methods; local
745 CBS session_id; local
750 !CBS_get_u8_length_prefixed(&client_hello, &session_id) ||
808 !CBS_get_u8_length_prefixed(&client_hello, &session_id) ||
809 CBS_len(&session_id) > SSL_MAX_SSL_SESSION_ID_LENGTH)
962 if (CBS_len(&cipher_suites) == 0 && CBS_len(&session_id) != 0)
1219 if (sl > (int)sizeof(s->session->session_id))
1225 memcpy(p,s->session->session_id,sl);
H A Dt1_lib.c275 CBS client_hello, session_id, cipher_suites, compression_methods, extensions; local
287 /* Extract session_id. */
288 if (!CBS_get_u8_length_prefixed(&client_hello, &session_id))
290 ctx->session_id = CBS_data(&session_id);
291 ctx->session_id_len = CBS_len(&session_id);
2310 r = tls_decrypt_ticket(s, data, len, ctx->session_id,
2429 memcpy(sess->session_id, sess_id, sesslen);
/external/chromium_org/third_party/libjingle/source/talk/p2p/client/
H A Dconnectivitychecker.cc102 const std::string& session_id,
108 session_id_(session_id),
99 ConnectivityChecker( rtc::Thread* worker, const std::string& jid, const std::string& session_id, const std::string& user_agent, const std::string& relay_token, const std::string& connection) argument
/external/chromium_org/extensions/browser/app_window/
H A Dapp_window.h13 #include "components/sessions/session_id.h"
219 const SessionID& session_id() const { return session_id_; } function in class:extensions::AppWindow
/external/chromium_org/content/renderer/
H A Drenderer_webkitplatformsupport_impl.cc731 int session_id = 0; local
733 !base::StringToInt(base::UTF16ToUTF8(input_device_id), &session_id)) {
745 return new RendererWebAudioDeviceImpl(params, callback, session_id);
/external/chromium_org/third_party/libusb/src/libusb/os/
H A Dwindows_usb.c624 unsigned long session_id = 0; local
644 session_id = htab_hash(sanitized_path);
646 return session_id;
1353 unsigned long session_id; local
1527 session_id = get_ancestor_session_id(dev_info_data.DevInst, ancestor);
1528 if (session_id == 0) {
1531 parent_dev = usbi_get_device_by_session_id(ctx, session_id);
1548 session_id = htab_hash(dev_id_path);
1549 dev = usbi_get_device_by_session_id(ctx, session_id);
1557 usbi_dbg("allocating new device for session [%X]", session_id);
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_pwd.c46 u8 session_id[1 + SHA256_MAC_LEN]; member in struct:eap_pwd_data
205 os_memcpy(id, data->session_id, 1 + SHA256_MAC_LEN);
674 &cs, data->msk, data->emsk, data->session_id) < 0) {
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_client_read.c101 /* SessionID session_id */
107 os_memcmp(conn->session_id, pos + 1, conn->session_id_len) == 0) {
114 os_memcpy(conn->session_id, pos, conn->session_id_len);
117 wpa_hexdump(MSG_MSGDUMP, "TLSv1: session_id",
118 conn->session_id, conn->session_id_len);
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_pwd.c46 u8 session_id[1 + SHA256_MAC_LEN]; member in struct:eap_pwd_data
205 os_memcpy(id, data->session_id, 1 + SHA256_MAC_LEN);
674 &cs, data->msk, data->emsk, data->session_id) < 0) {
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_client_read.c101 /* SessionID session_id */
107 os_memcmp(conn->session_id, pos + 1, conn->session_id_len) == 0) {
114 os_memcpy(conn->session_id, pos, conn->session_id_len);
117 wpa_hexdump(MSG_MSGDUMP, "TLSv1: session_id",
118 conn->session_id, conn->session_id_len);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_pwd.c46 u8 session_id[1 + SHA256_MAC_LEN]; member in struct:eap_pwd_data
205 os_memcpy(id, data->session_id, 1 + SHA256_MAC_LEN);
674 &cs, data->msk, data->emsk, data->session_id) < 0) {
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_client_read.c101 /* SessionID session_id */
107 os_memcmp(conn->session_id, pos + 1, conn->session_id_len) == 0) {
114 os_memcpy(conn->session_id, pos, conn->session_id_len);
117 wpa_hexdump(MSG_MSGDUMP, "TLSv1: session_id",
118 conn->session_id, conn->session_id_len);
/external/chromium_org/third_party/tlslite/tlslite/
H A Dtlsconnection.py585 self.session.create(masterSecret, serverHello.session_id, cipherSuite,
721 serverHello.session_id == session.sessionID:
1363 self.session.create(masterSecret, serverHello.session_id, cipherSuite,
1445 if clientHello.session_id and sessionCache:
1451 session = sessionCache[clientHello.session_id]
1541 # the client's session_id was not found in cache:
/external/chromium_org/third_party/libjingle/source/talk/app/webrtc/
H A Dwebrtcsdp.cc260 std::string* session_id,
790 const std::string session_id = jdesc.session_id().empty() ? local
791 kSessionOriginSessionId : jdesc.session_id();
794 os << " " << session_id << " " << session_version << " "
874 std::string session_id; local
885 if (!ParseSessionDescription(message, &current_pos, &session_id,
904 jdesc->Initialize(desc, session_id, session_version);
1790 std::string* session_id,
1819 *session_id
1789 ParseSessionDescription(const std::string& message, size_t* pos, std::string* session_id, std::string* session_version, bool* supports_msid, TransportDescription* session_td, RtpHeaderExtensions* session_extmaps, cricket::SessionDescription* desc, SdpParseError* error) argument
[all...]
/external/chromium_org/content/renderer/media/webrtc/
H A Dmock_peer_connection_dependency_factory.cc364 virtual std::string session_id() const OVERRIDE {
/external/chromium_org/ui/views/win/
H A Dhwnd_message_handler.h450 void OnSessionChange(WPARAM status_code, PWTSSESSION_NOTIFICATION session_id);
/external/libnfc-nci/src/nfa/int/
H A Dnfa_hci_int.h340 UINT8 session_id[NFA_HCI_SESSION_ID_LEN]; /* Session ID of the host network */ member in struct:__anon24193
/external/chromium_org/content/renderer/media/
H A Duser_media_client_impl.cc802 active_device.session_id == device.session_id) {
/external/libnfc-nxp/src/
H A DphHciNfc.c132 /*(void)memcpy(((phHal_sHwReference_t *)pHwRef)->session_id,
135 sizeof(((phHal_sHwReference_t *)pHwRef)->session_id));*/
136 (void)memcpy(pHwConfig->session_id,
140 sizeof(pHwConfig->session_id));
/external/openssl/ssl/
H A Ds2_srvr.c902 if (s->session->session_id_length > sizeof s->session->session_id)
907 memcpy(p,s->session->session_id, (unsigned int)s->session->session_id_length);
H A Dt1_lib.c2378 * session_id: points at the session ID in the ClientHello. This code will
2407 int tls1_process_ticket(SSL *s, unsigned char *session_id, int len, argument
2411 const unsigned char *p = session_id + len;
2474 r = tls_decrypt_ticket(s, p, size, session_id, len, ret);
2599 memcpy(sess->session_id, sess_id, sesslen);
/external/chromium_org/chrome/browser/android/
H A Dtab_android.cc410 SessionTabHelper::FromWebContents(web_contents())->session_id().id());

Completed in 707 milliseconds

<<1112