/external/chromium_org/content/plugin/ |
H A D | webplugin_proxy.cc | 230 const std::string& cookie) { 232 first_party_for_cookies, cookie)); 228 SetCookie(const GURL& url, const GURL& first_party_for_cookies, const std::string& cookie) argument
|
/external/chromium_org/net/third_party/nss/ssl/ |
H A D | dtlscon.c | 959 SECItem cookie = {siBuffer, NULL, 0}; local 984 /* The cookie */ 985 rv = ssl3_ConsumeHandshakeVariable(ss, &cookie, 1, &b, &length); 989 if (cookie.len > DTLS_COOKIE_BYTES) { 994 PORT_Memcpy(ss->ssl3.hs.cookie, cookie.data, cookie.len); 995 ss->ssl3.hs.cookieLen = cookie.len;
|
/external/chromium_org/net/websockets/ |
H A D | websocket_job.cc | 32 "cookie", "cookie2" 35 "set-cookie", "set-cookie2" 382 void WebSocketJob::LoadCookieCallback(const std::string& cookie) { argument 383 if (!cookie.empty()) 384 // TODO(tyoshino): Sending cookie means that connection doesn't need 387 // or refactor to determine cookie status prior to connecting. 388 handshake_request_->AppendHeaderIfMissing("Cookie", cookie); 474 // Remove cookie headers, with malformed headers preserved. 517 std::string cookie = response_cookies_[response_cookies_save_index_]; local 521 socket_.get(), url_for_cookies, cookie, [all...] |
/external/chromium_org/sandbox/win/src/ |
H A D | sandbox_policy_base.cc | 606 // IPC subsystem. We receive a integer cookie and we are expected to return the 607 // cookie times two (or three) and the current tick count. 612 uint32 cookie = ipc_int.As32Bit(); local 615 ipc->return_info.extended[1].unsigned_int = 2 * cookie; 623 uint32* cookie = reinterpret_cast<uint32*>(io_buffer->Buffer()); 624 *cookie = (*cookie) * 3;
|
/external/chromium_org/third_party/WebKit/Source/bindings/core/v8/ |
H A D | ScriptController.cpp | 154 InspectorInstrumentationCookie cookie; local 160 cookie = InspectorInstrumentation::willCallFunction(context, scriptId, resourceName, lineNumber); 165 InspectorInstrumentation::didCallFunction(cookie); 174 InspectorInstrumentationCookie cookie = InspectorInstrumentation::willEvaluateScript(m_frame, source.url().string(), source.startLine()); local 200 InspectorInstrumentation::didEvaluateScript(cookie);
|
/external/chromium_org/third_party/WebKit/Source/core/html/parser/ |
H A D | HTMLDocumentParser.cpp | 528 InspectorInstrumentationCookie cookie = InspectorInstrumentation::willWriteHTML(document(), lineNumber().zeroBasedInt()); local 547 InspectorInstrumentation::didWriteHTML(cookie, lineNumber().zeroBasedInt()); 603 InspectorInstrumentationCookie cookie = InspectorInstrumentation::willWriteHTML(document(), m_input.current().currentLine().zeroBasedInt()); local 656 InspectorInstrumentation::didWriteHTML(cookie, m_input.current().currentLine().zeroBasedInt());
|
/external/chromium_org/third_party/WebKit/Source/web/ |
H A D | WebSharedWorkerImpl.cpp | 270 void WebSharedWorkerImpl::updateInspectorStateCookie(const String& cookie) argument 275 const Closure& boundFunction = bind(&WebSharedWorkerClient::saveDevToolsAgentState, m_clientWeakPtr, cookie.isolatedCopy());
|
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
H A D | dtls1.h | 175 * with a cookie from a HelloVerifyRequest. */ 178 uint8_t cookie[DTLS1_COOKIE_LENGTH]; member in struct:dtls1_state_st
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | ssl_sess.c | 1055 int (*cb)(SSL *ssl, uint8_t *cookie, size_t *cookie_len)) 1061 int (*cb)(SSL *ssl, const uint8_t *cookie, size_t cookie_len)) 1054 SSL_CTX_set_cookie_generate_cb(SSL_CTX *ctx, int (*cb)(SSL *ssl, uint8_t *cookie, size_t *cookie_len)) argument 1060 SSL_CTX_set_cookie_verify_cb(SSL_CTX *ctx, int (*cb)(SSL *ssl, const uint8_t *cookie, size_t cookie_len)) argument
|
/external/chromium_org/third_party/libjingle/source/talk/xmpp/ |
H A D | chatroommoduleimpl.cc | 77 virtual void IqResponse(XmppIqCookie cookie, const XmlElement * pelStanza) {RTC_UNUSED2(cookie, pelStanza);} argument
|
/external/chromium_org/third_party/usrsctp/usrsctplib/ |
H A D | user_mbuf.c | 316 m_tag_setup(struct m_tag *t, u_int32_t cookie, int type, int len) argument 321 t->m_tag_cookie = cookie; 1107 m_tag_alloc(u_int32_t cookie, int type, int len, int wait) argument 1116 m_tag_setup(t, cookie, type, len);
|
/external/dhcpcd/ |
H A D | dhcp.h | 154 uint32_t cookie; member in struct:dhcp_message 155 uint8_t options[DHCP_OPTION_LEN]; /* message options - cookie */ 169 uint32_t cookie; member in struct:dhcp_lease
|
/external/iproute2/ip/ |
H A D | ipl2tp.c | 50 uint8_t cookie[8]; member in struct:l2tp_parm 179 p->cookie, p->cookie_len); 214 static void print_cookie(char *name, const uint8_t *cookie, int len) argument 217 cookie[0], cookie[1], 218 cookie[2], cookie[3]); 221 cookie[4], cookie[5], 222 cookie[ [all...] |
/external/kernel-headers/original/uapi/linux/ |
H A D | binder.h | 69 binder_uintptr_t cookie; member in struct:flat_binder_object 137 binder_uintptr_t cookie; /* target object cookie */ member in struct:binder_transaction_data 164 binder_uintptr_t cookie; member in struct:binder_ptr_cookie 169 binder_uintptr_t cookie; member in struct:binder_handle_cookie 180 binder_uintptr_t cookie; member in struct:binder_pri_ptr_cookie 224 * void *: cookie for binder 232 * void *: cookie for binder 257 * void *: cookie 261 * void *: cookie [all...] |
/external/openssl/include/openssl/ |
H A D | dtls1.h | 187 unsigned char cookie[DTLS1_COOKIE_LENGTH]; member in struct:dtls1_state_st
|
/external/openssl/ssl/ |
H A D | dtls1.h | 187 unsigned char cookie[DTLS1_COOKIE_LENGTH]; member in struct:dtls1_state_st
|
H A D | ssl_sess.c | 1178 int (*cb)(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len)) 1184 int (*cb)(SSL *ssl, unsigned char *cookie, unsigned int cookie_len)) 1177 SSL_CTX_set_cookie_generate_cb(SSL_CTX *ctx, int (*cb)(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len)) argument 1183 SSL_CTX_set_cookie_verify_cb(SSL_CTX *ctx, int (*cb)(SSL *ssl, unsigned char *cookie, unsigned int cookie_len)) argument
|
/external/ppp/pppd/plugins/rp-pppoe/ |
H A D | pppoe.h | 268 PPPoETag cookie; /* We have to send this if we get it */ member in struct:PPPoEConnectionStruct
|
/external/qemu/distrib/sdl-1.2.15/src/joystick/darwin/ |
H A D | SDL_sysjoystick.c | 53 IOHIDElementCookie cookie; /* unique value which identifies element, will NOT change */ member in struct:recElement 125 result = (*(pDevice->interface))->getElementValue(pDevice->interface, pElement->cookie, &hidEvent); 241 pElement->cookie = (IOHIDElementCookie) number;
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_wired.c | 80 u_int32_t cookie; member in struct:dhcp_message 81 u_int8_t options[308]; /* 312 - cookie */
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_wired.c | 80 u_int32_t cookie; member in struct:dhcp_message 81 u_int8_t options[308]; /* 312 - cookie */
|
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_wired.c | 80 u_int32_t cookie; member in struct:dhcp_message 81 u_int8_t options[308]; /* 312 - cookie */
|
/external/chromium_org/base/message_loop/ |
H A D | message_loop_unittest.cc | 164 cookie(c), 169 int cookie; member in struct:base::__anon2367::TaskItem 173 return type == other.type && cookie == other.cookie && start == other.start; 197 return os << item.type << " " << item.cookie << " starts"; 199 return os << item.type << " " << item.cookie << " ends"; 204 void RecordStart(TaskType type, int cookie) { argument 205 TaskItem item(type, cookie, true); 210 void RecordEnd(TaskType type, int cookie) { argument 211 TaskItem item(type, cookie, fals 231 MessageBoxFunc(TaskList* order, int cookie, bool is_reentrant) argument 240 EndDialogFunc(TaskList* order, int cookie) argument 251 RecursiveFunc(TaskList* order, int cookie, int depth, bool is_reentrant) argument 264 QuitFunc(TaskList* order, int cookie) argument [all...] |
/external/chromium_org/chrome/browser/browsing_data/ |
H A D | cookies_tree_model.h | 109 DetailedInfo& InitCookie(const net::CanonicalCookie* cookie); 134 const net::CanonicalCookie* cookie; member in struct:CookieTreeNode::DetailedInfo 154 // the cookie from CookieMonster, clear the database, and so forth.) 259 // The cookie should remain valid at least as long as the 262 std::list<net::CanonicalCookie>::iterator cookie); 639 // Because non-cookie nodes are fetched in a background thread, they are not
|
/external/chromium_org/chrome/browser/ |
H A D | process_singleton_posix.cc | 15 // them, we store a unique cookie in the profile directory, which must also be 16 // present in the remote directory to connect. The cookie is checked both before 18 // different cookies. Thus, a matching cookie before and after means the 19 // connection was to a directory with a valid cookie. 369 bool CheckCookie(const base::FilePath& path, const base::FilePath& cookie) { argument 370 return (cookie == ReadLink(path)); 378 // It's a symlink. Read the cookie. 379 base::FilePath cookie = ReadLink(cookie_path); local 380 if (cookie.empty()) 384 // Verify the cookie befor [all...] |