/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | wpa_ctrl.c | 60 char *cookie; member in struct:wpa_ctrl 417 ctrl->cookie = os_strdup(buf); 442 os_free(ctrl->cookie); 465 if (ctrl->cookie) { 467 _cmd_len = os_strlen(ctrl->cookie) + 1 + cmd_len; 473 os_strlcpy(pos, ctrl->cookie, _cmd_len); 474 pos += os_strlen(ctrl->cookie);
|
/external/wpa_supplicant_8/src/common/ |
H A D | wpa_ctrl.c | 60 char *cookie; member in struct:wpa_ctrl 417 ctrl->cookie = os_strdup(buf); 442 os_free(ctrl->cookie); 465 if (ctrl->cookie) { 467 _cmd_len = os_strlen(ctrl->cookie) + 1 + cmd_len; 473 os_strlcpy(pos, ctrl->cookie, _cmd_len); 474 pos += os_strlen(ctrl->cookie);
|
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | wpa_ctrl.c | 60 char *cookie; member in struct:wpa_ctrl 417 ctrl->cookie = os_strdup(buf); 442 os_free(ctrl->cookie); 465 if (ctrl->cookie) { 467 _cmd_len = os_strlen(ctrl->cookie) + 1 + cmd_len; 473 os_strlcpy(pos, ctrl->cookie, _cmd_len); 474 pos += os_strlen(ctrl->cookie);
|
/external/chromium_org/third_party/usrsctp/usrsctplib/netinet/ |
H A D | sctp_input.c | 71 /* This now not only stops all cookie timers 526 /* extract the cookie and queue it to "echo" it back... */ 539 * cookie. We always cancel at the primary to assue that we are 553 * No cookie, we probably should send a op error. But in any 554 * case if there is no cookie in the INIT-ACK, we can 563 * param cookie 761 /* treat like a case where the cookie expired i.e.: 762 * - dump current cookie. 1221 * We only act if we have echoed a cookie and are 1280 * new cookie anywa 1492 sctp_process_cookie_existing(struct mbuf *m, int iphlen, int offset, struct sockaddr *src, struct sockaddr *dst, struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, struct sctp_inpcb *inp, struct sctp_tcb *stcb, struct sctp_nets **netp, struct sockaddr *init_src, int *notification, int auth_skipped, uint32_t auth_offset, uint32_t auth_len, uint8_t use_mflowid, uint32_t mflowid, uint32_t vrf_id, uint16_t port) argument 2057 sctp_process_cookie_new(struct mbuf *m, int iphlen, int offset, struct sockaddr *src, struct sockaddr *dst, struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, struct sctp_inpcb *inp, struct sctp_nets **netp, struct sockaddr *init_src, int *notification, int auth_skipped, uint32_t auth_offset, uint32_t auth_len, uint8_t use_mflowid, uint32_t mflowid, uint32_t vrf_id, uint16_t port) argument 2461 struct sctp_state_cookie *cookie; local 3535 struct sctp_tmit_chunk *cookie; local [all...] |
H A D | sctp_timer.c | 956 * Special case for cookie-echo'ed case, we don't do output but must 1030 * For cookie and asconf we actually need to find and mark for resend, then 1040 struct sctp_tmit_chunk *cookie; local 1042 /* first before all else we must find the cookie */ 1043 TAILQ_FOREACH(cookie, &stcb->asoc.control_send_queue, sctp_next) { 1044 if (cookie->rec.chunk_id.id == SCTP_COOKIE_ECHO) { 1048 if (cookie == NULL) { 1054 "Cookie timer expired, but no cookie"); 1061 SCTP_PRINTF("Strange in state %d not cookie-echoed yet c-e timer expires?\n", SCTP_GET_STATE(&stcb->asoc)); 1067 /* Ok we found the cookie, threshol [all...] |
/external/chromium_org/net/websockets/ |
H A D | websocket_job.cc | 32 "cookie", "cookie2" 35 "set-cookie", "set-cookie2" 382 void WebSocketJob::LoadCookieCallback(const std::string& cookie) { argument 383 if (!cookie.empty()) 384 // TODO(tyoshino): Sending cookie means that connection doesn't need 387 // or refactor to determine cookie status prior to connecting. 388 handshake_request_->AppendHeaderIfMissing("Cookie", cookie); 474 // Remove cookie headers, with malformed headers preserved. 517 std::string cookie = response_cookies_[response_cookies_save_index_]; local 521 socket_.get(), url_for_cookies, cookie, [all...] |
/external/chromium_org/chrome/browser/printing/ |
H A D | print_job.cc | 76 job->cookie(), 115 int PrintJob::cookie() const { function in class:printing::PrintJob 117 // Always use an invalid cookie in this case. 119 return document_->cookie();
|
H A D | print_job.h | 61 virtual int cookie() const OVERRIDE;
|
H A D | print_job_unittest.cc | 56 virtual int cookie() const OVERRIDE { 130 job->cookie();
|
H A D | printer_query.cc | 62 int PrinterQuery::cookie() const { function in class:printing::PrinterQuery
|
/external/chromium_org/third_party/WebKit/Source/bindings/core/v8/ |
H A D | PageScriptDebugServer.cpp | 195 InspectorInstrumentationCookie cookie; local 197 cookie = InspectorInstrumentation::willEvaluateScript(frame, sourceURL, TextPosition::minimumPosition().m_line.oneBasedInt()); 203 InspectorInstrumentation::didEvaluateScript(cookie);
|
/external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/thirdparty/coverage/htmlfiles/ |
H A D | coverage_html.js | 40 // Look for a cookie containing previous sort settings: 45 // This almost makes it worth installing the jQuery cookie plugin: 46 if (document.cookie.indexOf(cookie_name) > -1) { 47 var cookies = document.cookie.split(";"); 101 document.cookie = cookie_name + "=" + sort_list.toString() + "; path=/";
|
/external/dhcpcd/ |
H A D | arp.c | 82 /* If we failed without a magic cookie then we need to try 85 iface->state->offer->cookie != htonl(MAGIC_COOKIE)) || 87 iface->state->new->cookie != htonl(MAGIC_COOKIE))) 229 if (state->new->cookie != htonl(MAGIC_COOKIE)) {
|
H A D | dhcpcd_test.cpp | 65 uint32_t cookie; member in struct:dhcp_message 66 uint8_t options[DHCP_OPTION_LEN]; /* message options - cookie */
|
/external/lldb/www/python_reference/ |
H A D | epydoc.js | 49 // Set a cookie to remember the current option. 50 document.cookie = "EpydocPrivate="+cmd; 63 var dc = document.cookie; 71 var end = document.cookie.indexOf(";", begin);
|
/external/mtpd/ |
H A D | pptp.c | 93 uint32_t cookie; member in struct:packet::__anon28035::__anon28036::__anon28037 141 outgoing.header.cookie = MAGIC_COOKIE; 187 /* If incoming.header is valid, check cookie and update incoming.expect. */ 189 if (incoming.header.cookie != MAGIC_COOKIE) {
|
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | http_client.c | 44 static void http_client_got_response(struct httpread *handle, void *cookie, argument 47 struct http_client *c = cookie; 49 wpa_printf(MSG_DEBUG, "HTTP: httpread callback: handle=%p cookie=%p " 50 "e=%d", handle, cookie, e);
|
/external/wpa_supplicant_8/src/wps/ |
H A D | http_client.c | 44 static void http_client_got_response(struct httpread *handle, void *cookie, argument 47 struct http_client *c = cookie; 49 wpa_printf(MSG_DEBUG, "HTTP: httpread callback: handle=%p cookie=%p " 50 "e=%d", handle, cookie, e);
|
/external/wpa_supplicant_8/wpa_supplicant/src/wps/ |
H A D | http_client.c | 44 static void http_client_got_response(struct httpread *handle, void *cookie, argument 47 struct http_client *c = cookie; 49 wpa_printf(MSG_DEBUG, "HTTP: httpread callback: handle=%p cookie=%p " 50 "e=%d", handle, cookie, e);
|
/external/chromium_org/content/browser/android/ |
H A D | download_controller_android_impl.cc | 182 const std::string& cookie) { 183 download_info.cookie = cookie; 221 ConvertUTF8ToJavaString(env, info.cookie); 179 OnCookieResponse( DownloadInfoAndroid download_info, const GetDownloadInfoCB& callback, const std::string& cookie) argument
|
/external/chromium_org/mojo/apps/js/bindings/ |
H A D | connection_unittests.js | 19 function cancelWait(cookie) { 20 waitingCallbacks[cookie.id] = null;
|
/external/chromium_org/net/cookies/ |
H A D | cookie_monster.cc | 6 // (netwerk/cookie/src/nsCookieService.cpp) 72 // In steady state, most cookie requests can be satisfied by the in memory 73 // cookie monster store. However, if a request comes in during the initial 74 // cookie load, it must be delayed until that load completes. That is done by 76 // of cookie load completion is received via CookieMonster::OnLoaded. This 81 // session restore) it may take too long to wait for the full load. If a cookie 126 // Default minimum delay after updating a cookie's LastAccessDate before we 170 // (2) For each list with more than 1 entry, keep the cookie having the 300 // In Mozilla if you set a cookie like AAAA, it will have an empty token 301 // and a value of AAAA. When it sends the cookie bac 706 DeleteCanonicalCookieTask(CookieMonster* cookie_monster, const CanonicalCookie& cookie, const DeleteCookieCallback& callback) argument 796 std::string cookie = this->cookie_monster()-> local 984 DeleteCanonicalCookieAsync( const CanonicalCookie& cookie, const DeleteCookieCallback& callback) argument 1252 DeleteCanonicalCookie(const CanonicalCookie& cookie) argument 1605 CanonicalCookie* cookie = it->second; local [all...] |
/external/chromium_org/sandbox/win/src/ |
H A D | crosscall_server.h | 81 // Removes all the registrations done with the same cookie parameter. 83 virtual bool UnRegisterWaits(void* cookie) = 0;
|
/external/chromium_org/third_party/boringssl/src/ssl/test/ |
H A D | bssl_shim.cc | 165 static int cookie_generate_callback(SSL *ssl, uint8_t *cookie, size_t *cookie_len) { argument 167 memset(cookie, 42, *cookie_len); 171 static int cookie_verify_callback(SSL *ssl, const uint8_t *cookie, size_t cookie_len) { argument 177 if (cookie[i] != 42) {
|
/external/chromium_org/third_party/mesa/src/src/glx/tests/ |
H A D | create_context_unittest.cpp | 96 xcb_void_cookie_t cookie; local 97 cookie.sequence = 0xbadc0de; 99 return cookie; 103 xcb_request_check(xcb_connection_t *c, xcb_void_cookie_t cookie) argument
|