/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | wpa_ctrl.c | 60 char *cookie; member in struct:wpa_ctrl 417 ctrl->cookie = os_strdup(buf); 442 os_free(ctrl->cookie); 465 if (ctrl->cookie) { 467 _cmd_len = os_strlen(ctrl->cookie) + 1 + cmd_len; 473 os_strlcpy(pos, ctrl->cookie, _cmd_len); 474 pos += os_strlen(ctrl->cookie);
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_nl80211.c | 374 const u8 *buf, size_t buf_len, u64 *cookie, 1865 struct nlattr *cookie, const u8 *frame, 1876 if (!cookie) 1879 cookie_val = nla_get_u64(cookie); 1881 " cookie=0%llx%s (ack=%d)", 2039 struct nlattr *cookie, struct nlattr *sig) 2101 mlme_event_mgmt_tx_status(drv, cookie, nla_data(frame), 2186 u64 cookie; local 2204 cookie = nla_get_u64(tb[NL80211_ATTR_COOKIE]); 2206 cookie 1864 mlme_event_mgmt_tx_status(struct wpa_driver_nl80211_data *drv, struct nlattr *cookie, const u8 *frame, size_t len, struct nlattr *ack) argument 2035 mlme_event(struct i802_bss *bss, enum nl80211_commands cmd, struct nlattr *frame, struct nlattr *addr, struct nlattr *timed_out, struct nlattr *freq, struct nlattr *ack, struct nlattr *cookie, struct nlattr *sig) argument 7165 u64 cookie; local 10543 u64 *cookie = arg; local 10560 u64 cookie; local 10694 u64 cookie; local [all...] |
H A D | driver_wired.c | 80 u_int32_t cookie; member in struct:dhcp_message 81 u_int8_t options[308]; /* 312 - cookie */
|
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | http_client.c | 44 static void http_client_got_response(struct httpread *handle, void *cookie, argument 47 struct http_client *c = cookie; 49 wpa_printf(MSG_DEBUG, "HTTP: httpread callback: handle=%p cookie=%p " 50 "e=%d", handle, cookie, e);
|
H A D | http_server.c | 41 static void http_request_cb(struct httpread *handle, void *cookie, argument 44 struct http_request *req = cookie;
|
H A D | httpread.c | 63 void (*cb)(struct httpread *handle, void *cookie, 65 void *cookie; /* pass to callback */ member in struct:httpread 160 (*h->cb)(h, h->cookie, HTTPREAD_EVENT_TIMEOUT); 665 (*h->cb)(h, h->cookie, HTTPREAD_EVENT_ERROR); 689 (*h->cb)(h, h->cookie, HTTPREAD_EVENT_FILE_READY); 708 void (*cb)(struct httpread *handle, void *cookie, 710 void *cookie, /* pass to callback */ 722 h->cookie = cookie; 706 httpread_create( int sd, void (*cb)(struct httpread *handle, void *cookie, enum httpread_event e), void *cookie, int max_bytes, int timeout_seconds ) argument
|
/external/wpa_supplicant_8/src/common/ |
H A D | wpa_ctrl.c | 60 char *cookie; member in struct:wpa_ctrl 417 ctrl->cookie = os_strdup(buf); 442 os_free(ctrl->cookie); 465 if (ctrl->cookie) { 467 _cmd_len = os_strlen(ctrl->cookie) + 1 + cmd_len; 473 os_strlcpy(pos, ctrl->cookie, _cmd_len); 474 pos += os_strlen(ctrl->cookie);
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_nl80211.c | 374 const u8 *buf, size_t buf_len, u64 *cookie, 1865 struct nlattr *cookie, const u8 *frame, 1876 if (!cookie) 1879 cookie_val = nla_get_u64(cookie); 1881 " cookie=0%llx%s (ack=%d)", 2039 struct nlattr *cookie, struct nlattr *sig) 2101 mlme_event_mgmt_tx_status(drv, cookie, nla_data(frame), 2186 u64 cookie; local 2204 cookie = nla_get_u64(tb[NL80211_ATTR_COOKIE]); 2206 cookie 1864 mlme_event_mgmt_tx_status(struct wpa_driver_nl80211_data *drv, struct nlattr *cookie, const u8 *frame, size_t len, struct nlattr *ack) argument 2035 mlme_event(struct i802_bss *bss, enum nl80211_commands cmd, struct nlattr *frame, struct nlattr *addr, struct nlattr *timed_out, struct nlattr *freq, struct nlattr *ack, struct nlattr *cookie, struct nlattr *sig) argument 7165 u64 cookie; local 10543 u64 *cookie = arg; local 10560 u64 cookie; local 10694 u64 cookie; local [all...] |
H A D | driver_wired.c | 80 u_int32_t cookie; member in struct:dhcp_message 81 u_int8_t options[308]; /* 312 - cookie */
|
/external/wpa_supplicant_8/src/wps/ |
H A D | http_client.c | 44 static void http_client_got_response(struct httpread *handle, void *cookie, argument 47 struct http_client *c = cookie; 49 wpa_printf(MSG_DEBUG, "HTTP: httpread callback: handle=%p cookie=%p " 50 "e=%d", handle, cookie, e);
|
H A D | http_server.c | 41 static void http_request_cb(struct httpread *handle, void *cookie, argument 44 struct http_request *req = cookie;
|
H A D | httpread.c | 63 void (*cb)(struct httpread *handle, void *cookie, 65 void *cookie; /* pass to callback */ member in struct:httpread 160 (*h->cb)(h, h->cookie, HTTPREAD_EVENT_TIMEOUT); 665 (*h->cb)(h, h->cookie, HTTPREAD_EVENT_ERROR); 689 (*h->cb)(h, h->cookie, HTTPREAD_EVENT_FILE_READY); 708 void (*cb)(struct httpread *handle, void *cookie, 710 void *cookie, /* pass to callback */ 722 h->cookie = cookie; 706 httpread_create( int sd, void (*cb)(struct httpread *handle, void *cookie, enum httpread_event e), void *cookie, int max_bytes, int timeout_seconds ) argument
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | ctrl_iface_udp.c | 48 u8 cookie[COOKIE_LEN]; member in struct:ctrl_iface_priv 190 priv->cookie, COOKIE_LEN); 216 u8 cookie[COOKIE_LEN]; local 255 * Require that the client includes a prefix with the 'cookie' value 262 wpa_printf(MSG_DEBUG, "CTLR: No cookie in the request - " 267 if (hexstr2bin(buf + 7, cookie, COOKIE_LEN) < 0) { 268 wpa_printf(MSG_DEBUG, "CTLR: Invalid cookie format in the " 273 if (os_memcmp(cookie, priv->cookie, COOKIE_LEN) != 0) { 274 wpa_printf(MSG_DEBUG, "CTLR: Invalid cookie i 514 u8 cookie[COOKIE_LEN]; member in struct:ctrl_iface_global_priv 549 u8 cookie[COOKIE_LEN]; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | wpa_ctrl.c | 60 char *cookie; member in struct:wpa_ctrl 417 ctrl->cookie = os_strdup(buf); 442 os_free(ctrl->cookie); 465 if (ctrl->cookie) { 467 _cmd_len = os_strlen(ctrl->cookie) + 1 + cmd_len; 473 os_strlcpy(pos, ctrl->cookie, _cmd_len); 474 pos += os_strlen(ctrl->cookie);
|
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_nl80211.c | 374 const u8 *buf, size_t buf_len, u64 *cookie, 1865 struct nlattr *cookie, const u8 *frame, 1876 if (!cookie) 1879 cookie_val = nla_get_u64(cookie); 1881 " cookie=0%llx%s (ack=%d)", 2039 struct nlattr *cookie, struct nlattr *sig) 2101 mlme_event_mgmt_tx_status(drv, cookie, nla_data(frame), 2186 u64 cookie; local 2204 cookie = nla_get_u64(tb[NL80211_ATTR_COOKIE]); 2206 cookie 1864 mlme_event_mgmt_tx_status(struct wpa_driver_nl80211_data *drv, struct nlattr *cookie, const u8 *frame, size_t len, struct nlattr *ack) argument 2035 mlme_event(struct i802_bss *bss, enum nl80211_commands cmd, struct nlattr *frame, struct nlattr *addr, struct nlattr *timed_out, struct nlattr *freq, struct nlattr *ack, struct nlattr *cookie, struct nlattr *sig) argument 7165 u64 cookie; local 10543 u64 *cookie = arg; local 10560 u64 cookie; local 10694 u64 cookie; local [all...] |
H A D | driver_wired.c | 80 u_int32_t cookie; member in struct:dhcp_message 81 u_int8_t options[308]; /* 312 - cookie */
|
/external/wpa_supplicant_8/wpa_supplicant/src/wps/ |
H A D | http_client.c | 44 static void http_client_got_response(struct httpread *handle, void *cookie, argument 47 struct http_client *c = cookie; 49 wpa_printf(MSG_DEBUG, "HTTP: httpread callback: handle=%p cookie=%p " 50 "e=%d", handle, cookie, e);
|
H A D | http_server.c | 41 static void http_request_cb(struct httpread *handle, void *cookie, argument 44 struct http_request *req = cookie;
|
H A D | httpread.c | 63 void (*cb)(struct httpread *handle, void *cookie, 65 void *cookie; /* pass to callback */ member in struct:httpread 160 (*h->cb)(h, h->cookie, HTTPREAD_EVENT_TIMEOUT); 665 (*h->cb)(h, h->cookie, HTTPREAD_EVENT_ERROR); 689 (*h->cb)(h, h->cookie, HTTPREAD_EVENT_FILE_READY); 708 void (*cb)(struct httpread *handle, void *cookie, 710 void *cookie, /* pass to callback */ 722 h->cookie = cookie; 706 httpread_create( int sd, void (*cb)(struct httpread *handle, void *cookie, enum httpread_event e), void *cookie, int max_bytes, int timeout_seconds ) argument
|
/external/tcpdump/ |
H A D | print-juniper.c | 370 u_int8_t cookie_len; /* cookie len */ 419 u_int8_t cookie[8]; member in struct:juniper_l2info_t 474 gh = (struct juniper_ggsn_header *)&l2info.cookie; 761 * best indicator if the cookie looks like a proto */ 763 EXTRACT_16BITS(&l2info.cookie) != PPP_OSI && 764 EXTRACT_16BITS(&l2info.cookie) != (PPP_ADDRESS << 8 | PPP_CONTROL)) 772 /* IP traffic going to the RE would not have a cookie 775 if (l2info.cookie[4] == (JUNIPER_LSQ_COOKIE_RE|JUNIPER_LSQ_COOKIE_DIR)) 795 /* zero length cookie ? */ 796 switch (EXTRACT_16BITS(&l2info.cookie)) { [all...] |
/external/strace/ |
H A D | util.c | 1325 # define get_arg0(tcp, cookie, valp) (upeek((tcp)->pid, arg0_offset, (valp))) 1326 # define get_arg1(tcp, cookie, valp) (upeek((tcp)->pid, arg1_offset, (valp))) 1329 set_arg0(struct tcb *tcp, void *cookie, long val) argument 1335 set_arg1(struct tcb *tcp, void *cookie, long val) argument
|
/external/sqlite/dist/orig/ |
H A D | sqlite3.c | 11913 u8 checkSchema; /* Causes schema cookie check after an error */ 101019 int cookie; local [all...] |
/external/sqlite/dist/ |
H A D | sqlite3.c | 11913 u8 checkSchema; /* Causes schema cookie check after an error */ 101039 int cookie; local [all...] |
/external/smack/asmack-master/lib/ |
H A D | httpclient-4.1.3.jar | ... cookie.Cookie c1
org.apache.http.cookie.Cookie c2
String path1
String path2
public volatile synthetic |
/external/robolectric/lib/main/ |
H A D | android.jar | META-INF/ META-INF/MANIFEST.MF com/ com/android/ com/android/internal/ com/android/internal/util/ ... |