Searched refs:cookie (Results 226 - 250 of 424) sorted by relevance

1234567891011>>

/external/wpa_supplicant_8/hostapd/src/common/
H A Dwpa_ctrl.c60 char *cookie; member in struct:wpa_ctrl
417 ctrl->cookie = os_strdup(buf);
442 os_free(ctrl->cookie);
465 if (ctrl->cookie) {
467 _cmd_len = os_strlen(ctrl->cookie) + 1 + cmd_len;
473 os_strlcpy(pos, ctrl->cookie, _cmd_len);
474 pos += os_strlen(ctrl->cookie);
/external/wpa_supplicant_8/src/common/
H A Dwpa_ctrl.c60 char *cookie; member in struct:wpa_ctrl
417 ctrl->cookie = os_strdup(buf);
442 os_free(ctrl->cookie);
465 if (ctrl->cookie) {
467 _cmd_len = os_strlen(ctrl->cookie) + 1 + cmd_len;
473 os_strlcpy(pos, ctrl->cookie, _cmd_len);
474 pos += os_strlen(ctrl->cookie);
/external/wpa_supplicant_8/wpa_supplicant/src/common/
H A Dwpa_ctrl.c60 char *cookie; member in struct:wpa_ctrl
417 ctrl->cookie = os_strdup(buf);
442 os_free(ctrl->cookie);
465 if (ctrl->cookie) {
467 _cmd_len = os_strlen(ctrl->cookie) + 1 + cmd_len;
473 os_strlcpy(pos, ctrl->cookie, _cmd_len);
474 pos += os_strlen(ctrl->cookie);
/external/chromium_org/third_party/usrsctp/usrsctplib/netinet/
H A Dsctp_input.c71 /* This now not only stops all cookie timers
526 /* extract the cookie and queue it to "echo" it back... */
539 * cookie. We always cancel at the primary to assue that we are
553 * No cookie, we probably should send a op error. But in any
554 * case if there is no cookie in the INIT-ACK, we can
563 * param cookie
761 /* treat like a case where the cookie expired i.e.:
762 * - dump current cookie.
1221 * We only act if we have echoed a cookie and are
1280 * new cookie anywa
1492 sctp_process_cookie_existing(struct mbuf *m, int iphlen, int offset, struct sockaddr *src, struct sockaddr *dst, struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, struct sctp_inpcb *inp, struct sctp_tcb *stcb, struct sctp_nets **netp, struct sockaddr *init_src, int *notification, int auth_skipped, uint32_t auth_offset, uint32_t auth_len, uint8_t use_mflowid, uint32_t mflowid, uint32_t vrf_id, uint16_t port) argument
2057 sctp_process_cookie_new(struct mbuf *m, int iphlen, int offset, struct sockaddr *src, struct sockaddr *dst, struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, struct sctp_inpcb *inp, struct sctp_nets **netp, struct sockaddr *init_src, int *notification, int auth_skipped, uint32_t auth_offset, uint32_t auth_len, uint8_t use_mflowid, uint32_t mflowid, uint32_t vrf_id, uint16_t port) argument
2461 struct sctp_state_cookie *cookie; local
3535 struct sctp_tmit_chunk *cookie; local
[all...]
H A Dsctp_timer.c956 * Special case for cookie-echo'ed case, we don't do output but must
1030 * For cookie and asconf we actually need to find and mark for resend, then
1040 struct sctp_tmit_chunk *cookie; local
1042 /* first before all else we must find the cookie */
1043 TAILQ_FOREACH(cookie, &stcb->asoc.control_send_queue, sctp_next) {
1044 if (cookie->rec.chunk_id.id == SCTP_COOKIE_ECHO) {
1048 if (cookie == NULL) {
1054 "Cookie timer expired, but no cookie");
1061 SCTP_PRINTF("Strange in state %d not cookie-echoed yet c-e timer expires?\n", SCTP_GET_STATE(&stcb->asoc));
1067 /* Ok we found the cookie, threshol
[all...]
/external/chromium_org/net/websockets/
H A Dwebsocket_job.cc32 "cookie", "cookie2"
35 "set-cookie", "set-cookie2"
382 void WebSocketJob::LoadCookieCallback(const std::string& cookie) { argument
383 if (!cookie.empty())
384 // TODO(tyoshino): Sending cookie means that connection doesn't need
387 // or refactor to determine cookie status prior to connecting.
388 handshake_request_->AppendHeaderIfMissing("Cookie", cookie);
474 // Remove cookie headers, with malformed headers preserved.
517 std::string cookie = response_cookies_[response_cookies_save_index_]; local
521 socket_.get(), url_for_cookies, cookie,
[all...]
/external/chromium_org/chrome/browser/printing/
H A Dprint_job.cc76 job->cookie(),
115 int PrintJob::cookie() const { function in class:printing::PrintJob
117 // Always use an invalid cookie in this case.
119 return document_->cookie();
H A Dprint_job.h61 virtual int cookie() const OVERRIDE;
H A Dprint_job_unittest.cc56 virtual int cookie() const OVERRIDE {
130 job->cookie();
H A Dprinter_query.cc62 int PrinterQuery::cookie() const { function in class:printing::PrinterQuery
/external/chromium_org/third_party/WebKit/Source/bindings/core/v8/
H A DPageScriptDebugServer.cpp195 InspectorInstrumentationCookie cookie; local
197 cookie = InspectorInstrumentation::willEvaluateScript(frame, sourceURL, TextPosition::minimumPosition().m_line.oneBasedInt());
203 InspectorInstrumentation::didEvaluateScript(cookie);
/external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/thirdparty/coverage/htmlfiles/
H A Dcoverage_html.js40 // Look for a cookie containing previous sort settings:
45 // This almost makes it worth installing the jQuery cookie plugin:
46 if (document.cookie.indexOf(cookie_name) > -1) {
47 var cookies = document.cookie.split(";");
101 document.cookie = cookie_name + "=" + sort_list.toString() + "; path=/";
/external/dhcpcd/
H A Darp.c82 /* If we failed without a magic cookie then we need to try
85 iface->state->offer->cookie != htonl(MAGIC_COOKIE)) ||
87 iface->state->new->cookie != htonl(MAGIC_COOKIE)))
229 if (state->new->cookie != htonl(MAGIC_COOKIE)) {
H A Ddhcpcd_test.cpp65 uint32_t cookie; member in struct:dhcp_message
66 uint8_t options[DHCP_OPTION_LEN]; /* message options - cookie */
/external/lldb/www/python_reference/
H A Depydoc.js49 // Set a cookie to remember the current option.
50 document.cookie = "EpydocPrivate="+cmd;
63 var dc = document.cookie;
71 var end = document.cookie.indexOf(";", begin);
/external/mtpd/
H A Dpptp.c93 uint32_t cookie; member in struct:packet::__anon28035::__anon28036::__anon28037
141 outgoing.header.cookie = MAGIC_COOKIE;
187 /* If incoming.header is valid, check cookie and update incoming.expect. */
189 if (incoming.header.cookie != MAGIC_COOKIE) {
/external/wpa_supplicant_8/hostapd/src/wps/
H A Dhttp_client.c44 static void http_client_got_response(struct httpread *handle, void *cookie, argument
47 struct http_client *c = cookie;
49 wpa_printf(MSG_DEBUG, "HTTP: httpread callback: handle=%p cookie=%p "
50 "e=%d", handle, cookie, e);
/external/wpa_supplicant_8/src/wps/
H A Dhttp_client.c44 static void http_client_got_response(struct httpread *handle, void *cookie, argument
47 struct http_client *c = cookie;
49 wpa_printf(MSG_DEBUG, "HTTP: httpread callback: handle=%p cookie=%p "
50 "e=%d", handle, cookie, e);
/external/wpa_supplicant_8/wpa_supplicant/src/wps/
H A Dhttp_client.c44 static void http_client_got_response(struct httpread *handle, void *cookie, argument
47 struct http_client *c = cookie;
49 wpa_printf(MSG_DEBUG, "HTTP: httpread callback: handle=%p cookie=%p "
50 "e=%d", handle, cookie, e);
/external/chromium_org/content/browser/android/
H A Ddownload_controller_android_impl.cc182 const std::string& cookie) {
183 download_info.cookie = cookie;
221 ConvertUTF8ToJavaString(env, info.cookie);
179 OnCookieResponse( DownloadInfoAndroid download_info, const GetDownloadInfoCB& callback, const std::string& cookie) argument
/external/chromium_org/mojo/apps/js/bindings/
H A Dconnection_unittests.js19 function cancelWait(cookie) {
20 waitingCallbacks[cookie.id] = null;
/external/chromium_org/net/cookies/
H A Dcookie_monster.cc6 // (netwerk/cookie/src/nsCookieService.cpp)
72 // In steady state, most cookie requests can be satisfied by the in memory
73 // cookie monster store. However, if a request comes in during the initial
74 // cookie load, it must be delayed until that load completes. That is done by
76 // of cookie load completion is received via CookieMonster::OnLoaded. This
81 // session restore) it may take too long to wait for the full load. If a cookie
126 // Default minimum delay after updating a cookie's LastAccessDate before we
170 // (2) For each list with more than 1 entry, keep the cookie having the
300 // In Mozilla if you set a cookie like AAAA, it will have an empty token
301 // and a value of AAAA. When it sends the cookie bac
706 DeleteCanonicalCookieTask(CookieMonster* cookie_monster, const CanonicalCookie& cookie, const DeleteCookieCallback& callback) argument
796 std::string cookie = this->cookie_monster()-> local
984 DeleteCanonicalCookieAsync( const CanonicalCookie& cookie, const DeleteCookieCallback& callback) argument
1252 DeleteCanonicalCookie(const CanonicalCookie& cookie) argument
1605 CanonicalCookie* cookie = it->second; local
[all...]
/external/chromium_org/sandbox/win/src/
H A Dcrosscall_server.h81 // Removes all the registrations done with the same cookie parameter.
83 virtual bool UnRegisterWaits(void* cookie) = 0;
/external/chromium_org/third_party/boringssl/src/ssl/test/
H A Dbssl_shim.cc165 static int cookie_generate_callback(SSL *ssl, uint8_t *cookie, size_t *cookie_len) { argument
167 memset(cookie, 42, *cookie_len);
171 static int cookie_verify_callback(SSL *ssl, const uint8_t *cookie, size_t cookie_len) { argument
177 if (cookie[i] != 42) {
/external/chromium_org/third_party/mesa/src/src/glx/tests/
H A Dcreate_context_unittest.cpp96 xcb_void_cookie_t cookie; local
97 cookie.sequence = 0xbadc0de;
99 return cookie;
103 xcb_request_check(xcb_connection_t *c, xcb_void_cookie_t cookie) argument

Completed in 581 milliseconds

1234567891011>>