/external/chromium_org/net/quic/ |
H A D | quic_reliable_client_stream.h | 51 QuicSession* session,
|
H A D | quic_session_test.cc | 52 explicit TestCryptoStream(QuicSession* session) argument 53 : QuicCryptoStream(session) { 62 session()->config()->SetInitialFlowControlWindowToSend( 64 session()->config()->SetInitialStreamFlowControlWindowToSend( 66 session()->config()->SetInitialSessionFlowControlWindowToSend( 68 session()->config()->ToHandshakeMessage(&msg); 69 const QuicErrorCode error = session()->config()->ProcessPeerHello( 72 session()->OnConfigNegotiated(); 73 session()->OnCryptoHandshakeEvent(QuicSession::HANDSHAKE_CONFIRMED); 81 explicit TestHeadersStream(QuicSession* session) argument 90 TestStream(QuicStreamId id, QuicSession* session) argument 110 StreamBlocker(QuicSession* session, QuicStreamId stream_id) argument [all...] |
H A D | quic_http_stream.h | 30 explicit QuicHttpStream(const base::WeakPtr<QuicClientSession>& session); 61 virtual void Drain(HttpNetworkSession* session) OVERRIDE;
|
/external/chromium_org/net/tools/quic/ |
H A D | quic_spdy_client_stream.h | 29 QuicSpdyClientStream(QuicStreamId id, QuicClientSession* session); 40 // ReliableQuicStream implementation called by the session when there's
|
/external/chromium_org/sync/engine/ |
H A D | commit.h | 58 sessions::SyncSession* session,
|
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
H A D | p2ptransportchannel.h | 198 void AddAllocatorSession(PortAllocatorSession* session); 201 void OnPortReady(PortAllocatorSession *session, PortInterface* port); 202 void OnCandidatesReady(PortAllocatorSession *session, 204 void OnCandidatesAllocationDone(PortAllocatorSession* session);
|
/external/chromium_org/chrome/browser/ui/webui/ntp/ |
H A D | foreign_session_handler.cc | 104 LOG(ERROR) << "ForeignSessionHandler failed to get session data from" 142 // confusion with the ID corresponding to a session. Investigate all the 251 const SyncedSession* session = sessions[i]; local 252 const std::string& session_tag = session->session_tag; 256 session_data->SetString("name", session->session_name); 257 session_data->SetString("deviceType", session->DeviceTypeAsString()); 259 FormatSessionTime(session->modified_time)); 268 session->windows.begin(); it != session->windows.end(); ++it) { 289 // Expect either 1 or 8 args. For restoring an entire session, onl [all...] |
/external/chromium_org/third_party/boringssl/src/ssl/test/ |
H A D | bssl_shim.cc | 288 SSL_SESSION *session) { 393 if (session != NULL) { 394 if (SSL_set_session(ssl, session) != 1) { 395 fprintf(stderr, "failed to set session\n"); 415 fprintf(stderr, "session was%s reused\n", 589 SSL_SESSION *session = NULL; local 590 int ret = do_exchange(&session, 593 3 /* fd */, NULL /* session */); 603 config.is_server ? NULL : session); 612 SSL_SESSION_free(session); 283 do_exchange(SSL_SESSION **out_session, SSL_CTX *ssl_ctx, const TestConfig *config, bool is_resume, int fd, SSL_SESSION *session) argument [all...] |
/external/chromium_org/extensions/browser/api/bluetooth/ |
H A D | bluetooth_apitest.cc | 173 // initialied a session object. 185 // Reset the adapter and initiate a discovery session. The ownership of the 186 // mock session will be passed to the event router. 190 // Create a mock session to be returned as a result. Get a handle to it as 193 MockBluetoothDiscoverySession* session = mock_session_.get(); local 201 // End the discovery session. The StopDiscovery function should succeed. 203 EXPECT_CALL(*session, IsActive()).WillOnce(testing::Return(true)); 204 EXPECT_CALL(*session, Stop(testing::_, testing::_)) 207 // StopDiscovery success will remove the session object, unreferencing the 215 // still owns the session 227 MockBluetoothDiscoverySession* session = mock_session_.get(); local 279 MockBluetoothDiscoverySession* session = mock_session_.get(); local [all...] |
H A D | bluetooth_event_router.cc | 89 DVLOG(1) << "An active discovery session exists for extension."; 113 DVLOG(1) << "No active discovery session exists for extension."; 117 device::BluetoothDiscoverySession* session = iter->second; local 118 session->Stop(callback, error_callback); 222 device::BluetoothDiscoverySession* session = iter->second; local 223 if (session->IsActive()) { 224 active_session_map[iter->first] = session; 227 delete session; 315 // Remove any discovery session initiated by the extension. 341 // Clean up any existing session instanc [all...] |
/external/chromium_org/third_party/webrtc/modules/audio_device/ios/ |
H A D | audio_device_ios.mm | 684 AVAudioSession* session = [AVAudioSession sharedInstance]; 685 NSString* category = session.category; 686 AVAudioSessionCategoryOptions options = session.categoryOptions; 701 [session setCategory:AVAudioSessionCategoryPlayAndRecord 717 AVAudioSession* session = [AVAudioSession sharedInstance]; 718 AVAudioSessionCategoryOptions options = session.categoryOptions; 1195 AVAudioSession* session = [AVAudioSession sharedInstance]; 1197 [session setPreferredSampleRate:preferredSampleRate 1205 [session setMode:AVAudioSessionModeVoiceChat 1213 [session setCategor [all...] |
/external/nanohttpd/webserver/src/main/java/fi/iki/elonen/ |
H A D | SimpleWebServer.java | 245 public Response serve(IHTTPSession session) { argument 246 Map<String, String> header = session.getHeaders(); 247 Map<String, String> parms = session.getParms(); 248 String uri = session.getUri(); 251 System.out.println(session.getMethod() + " '" + uri + "' "); 271 return respond(Collections.unmodifiableMap(header), session, uri); 274 private Response respond(Map<String, String> headers, IHTTPSession session, String uri) { argument 318 return respond(headers, session, uri + indexFile); 326 response = plugin.serveFile(uri, headers, session, f, mimeTypeForFile); 329 return respond(rewrite.getHeaders(), session, rewrit [all...] |
/external/chromium_org/chrome/test/chromedriver/ |
H A D | logging.cc | 20 #include "chrome/test/chromedriver/session.h" 81 Session* session = GetThreadLocalSession(); local 82 if (!session) 84 return session->driver_log.get(); 242 const Session* session, 262 new PerformanceLogger(log, session, 265 // Otherwise, |perf_log| would be owned by both session->chrome and 266 // |session|, which would lead to memory errors on destruction. 267 // session->chrome will own |perf_log|, and |session| wil 241 CreateLogs(const Capabilities& capabilities, const Session* session, ScopedVector<WebDriverLog>* out_logs, ScopedVector<DevToolsEventListener>* out_devtools_listeners, ScopedVector<CommandListener>* out_command_listeners) argument [all...] |
/external/chromium_org/third_party/libjingle/source/talk/session/media/ |
H A D | mediasessionclient.cc | 30 #include "talk/session/media/mediasessionclient.h" 37 #include "talk/session/media/mediamessages.h" 38 #include "talk/session/media/srtpfilter.h" 114 void MediaSessionClient::OnSessionCreate(Session *session, argument 117 session->SignalState.connect(this, &MediaSessionClient::OnSessionState); 125 Session* session = static_cast<Session*>(base_session); local 128 // The creation of the call must happen after the session has 134 const SessionDescription* offer = session->remote_description(); 143 // The matching of existing calls is used to support the multi-session mode 145 // session ma 186 OnSessionDestroy(Session *session) argument 230 Session *session = session_manager_->CreateSession(id, jid().Str(), type); local 239 std::vector<Session *>::const_iterator session; local [all...] |
/external/openssl/ssl/ |
H A D | t1_enc.c | 303 s->session->master_key,s->session->master_key_length, 307 s->session->master_key_length); 310 for (i=0; i < s->session->master_key_length; i++) 312 printf("%02X", s->session->master_key[i]); 539 s->session->key_arg_length=0; 600 if (!ssl_cipher_get_evp(s->session,&c,&hash,&mac_type,&mac_secret_size,&comp)) 636 { int z; for (z=0; z<s->session->master_key_length; z++) printf("%02X%c",s->session->master_key[z],((z+1)%16)?' ':'\n'); } 653 if (s->session [all...] |
H A D | ssl_lib.c | 196 SSL_SESSION_free(s->session); 197 s->session=NULL; 243 * so, revert back if we are not doing session-id reuse. */ 244 if (!s->in_handshake && (s->session == NULL) && (s->method != s->ctx->method)) 464 * we can "construct" a session to give us the desired check - ie. to 465 * find if there's a session in the hash table that would conflict with 466 * any new session built out of this id/id_len and the ssl_version in 476 /* NB: SSLv2 always uses a fixed 16-byte session ID, so even if a 571 if (s->session != NULL) 574 SSL_SESSION_free(s->session); [all...] |
H A D | s3_enc.c | 190 EVP_DigestUpdate(&s1,s->session->master_key, 191 s->session->master_key_length); 197 EVP_DigestUpdate(&m5,s->session->master_key, 198 s->session->master_key_length); 374 s->session->key_arg_length=0; 400 if (!ssl_cipher_get_evp(s->session,&c,&hash,NULL,NULL,&comp)) 437 if (s->session->cipher != NULL) 439 if (s->session->cipher->algorithm_enc == SSL_eNULL) 443 if (s->session->cipher->algorithm_enc == SSL_RC4) 504 if ((s->session [all...] |
/external/chromium_org/extensions/browser/api/bluetooth_low_energy/ |
H A D | bluetooth_low_energy_event_router.cc | 147 << "There is no Bluetooth low energy value update session manager." 646 BluetoothLowEnergyNotifySession* session = local 648 if (session) { 649 if (session->GetSession()->IsActive()) { 705 BluetoothLowEnergyNotifySession* session = local 707 if (!session || !session->GetSession()->IsActive()) { 714 session->GetSession()->Stop( 1295 scoped_ptr<device::BluetoothGattNotifySession> session) { 1296 VLOG(2) << "Value update session create 1290 OnStartNotifySession( bool persistent, const std::string& extension_id, const std::string& characteristic_id, const base::Closure& callback, scoped_ptr<device::BluetoothGattNotifySession> session) argument 1410 BluetoothLowEnergyNotifySession* session = local 1436 BluetoothLowEnergyNotifySession* session = local [all...] |
/external/linux-tools-perf/perf-3.12.0/tools/perf/ |
H A D | builtin-kvm.c | 11 #include "util/session.h" 91 struct perf_session *session; member in struct:perf_kvm_stat 844 cpuid = kvm->session->header.env.cpuid; 896 err = perf_session_queue_event(kvm->session, event, &sample, 0); 949 kvm->session->ordered_samples.next_flush = flush_time; 950 err = kvm->tool.finished_round(&kvm->tool, NULL, kvm->session); 1227 kvm->session = perf_session__new(kvm->file_name, O_RDONLY, 0, false, 1229 if (!kvm->session) { 1230 pr_err("Initializing perf session failed\n"); 1234 if (!perf_session__has_traces(kvm->session, "kv [all...] |
/external/chromium_org/net/http/ |
H A D | http_cache.cc | 308 // This call doesn't change the shared |session|'s QuicServerInfoFactory because 309 // |session| is shared. 310 HttpCache::HttpCache(HttpNetworkSession* session, argument 312 : net_log_(session->net_log()), 317 network_layer_(new HttpNetworkLayer(session)), 430 HttpNetworkSession* session = GetSession(); local 431 if (session) 432 session->CloseAllConnections(); 436 HttpNetworkSession* session = GetSession(); local 437 if (session) 1018 SetupQuicServerInfoFactory(HttpNetworkSession* session) argument [all...] |
H A D | failing_http_transaction_factory.cc | 173 HttpNetworkSession* session, 174 Error error) : session_(session), error_(error) { 172 FailingHttpTransactionFactory( HttpNetworkSession* session, Error error) argument
|
H A D | http_stream_factory_impl_job.h | 39 HttpNetworkSession* session, 147 // This callback function is called when a new SPDY session is created. 182 int SetSpdyHttpStream(base::WeakPtr<SpdySession> session, bool direct); 205 // Returns true if the current request can use an existing spdy session. 242 // to allow the connection to be aborted, if a matching SPDY session can 244 // session is found, and OK otherwise. 297 // True if this job used an existing QUIC session.
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | s3_enc.c | 190 EVP_DigestUpdate(&s1,s->session->master_key, 191 s->session->master_key_length); 197 EVP_DigestUpdate(&m5,s->session->master_key, 198 s->session->master_key_length); 295 s->session->key_arg_length=0; 340 if (!ssl_cipher_get_evp(s->session,&c,&hash,NULL,NULL)) 370 if (s->session->cipher != NULL) 372 if (s->session->cipher->algorithm_enc == SSL_RC4) 432 if ((s->session == NULL) || (ds == NULL) || 612 EVP_DigestUpdate(&ctx,s->session [all...] |
/external/chromium_org/net/quic/test_tools/ |
H A D | crypto_test_utils.cc | 419 client->session()->connection()->encrypter(ENCRYPTION_INITIAL)); 421 client->session()->connection()->decrypter()); 423 client->session()->connection()->encrypter(ENCRYPTION_FORWARD_SECURE)); 425 client->session()->connection()->alternative_decrypter()); 427 server->session()->connection()->encrypter(ENCRYPTION_INITIAL)); 429 server->session()->connection()->decrypter()); 431 server->session()->connection()->encrypter(ENCRYPTION_FORWARD_SECURE)); 433 server->session()->connection()->alternative_decrypter());
|
/external/chromium_org/net/spdy/ |
H A D | spdy_session_pool.h | 66 // In the functions below, a session is "available" if this pool has 68 // FindAvailableSession() will return it. A session is "unavailable" 71 // can happen when a session receives a GOAWAY frame and is still 74 // Create a new SPDY session from an existing socket. There must 75 // not already be a session for the given key. This pool must have 94 // Find an available session for the given key, or NULL if there isn't one. 98 // Remove all mappings and aliases for the given session, which must 100 // the given session itself. 104 // Removes an unavailable session from the pool. Except for in 105 // tests, this must be called by the given session itsel [all...] |