/external/wpa_supplicant_6/wpa_supplicant/src/common/ |
H A D | wpa_ctrl.c | 58 char *cookie; member in struct:wpa_ctrl 270 ctrl->cookie = os_strdup(buf); 280 os_free(ctrl->cookie); 300 if (ctrl->cookie) { 302 _cmd_len = os_strlen(ctrl->cookie) + 1 + cmd_len; 308 os_strlcpy(pos, ctrl->cookie, _cmd_len); 309 pos += os_strlen(ctrl->cookie);
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
H A D | wps_upnp_event.c | 214 static void event_got_response_handler(struct httpread *handle, void *cookie, argument 217 struct wps_event_ *e = cookie; 338 e /* cookie */,
|
H A D | httpread.c | 69 void (*cb)(struct httpread *handle, void *cookie, 71 void *cookie; /* pass to callback */ member in struct:httpread 186 (*h->cb)(h, h->cookie, HTTPREAD_EVENT_TIMEOUT); 693 (*h->cb)(h, h->cookie, HTTPREAD_EVENT_ERROR); 721 (*h->cb)(h, h->cookie, HTTPREAD_EVENT_FILE_READY); 740 void (*cb)(struct httpread *handle, void *cookie, 742 void *cookie, /* pass to callback */ 754 h->cookie = cookie; 738 httpread_create( int sd, void (*cb)(struct httpread *handle, void *cookie, enum httpread_event e), void *cookie, int max_bytes, int timeout_seconds ) argument
|
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | http_client.c | 44 static void http_client_got_response(struct httpread *handle, void *cookie, argument 47 struct http_client *c = cookie; 49 wpa_printf(MSG_DEBUG, "HTTP: httpread callback: handle=%p cookie=%p " 50 "e=%d", handle, cookie, e);
|
H A D | http_server.c | 41 static void http_request_cb(struct httpread *handle, void *cookie, argument 44 struct http_request *req = cookie;
|
H A D | httpread.c | 63 void (*cb)(struct httpread *handle, void *cookie, 65 void *cookie; /* pass to callback */ member in struct:httpread 180 (*h->cb)(h, h->cookie, HTTPREAD_EVENT_TIMEOUT); 687 (*h->cb)(h, h->cookie, HTTPREAD_EVENT_ERROR); 715 (*h->cb)(h, h->cookie, HTTPREAD_EVENT_FILE_READY); 734 void (*cb)(struct httpread *handle, void *cookie, 736 void *cookie, /* pass to callback */ 748 h->cookie = cookie; 732 httpread_create( int sd, void (*cb)(struct httpread *handle, void *cookie, enum httpread_event e), void *cookie, int max_bytes, int timeout_seconds ) argument
|
/external/wpa_supplicant_8/src/wps/ |
H A D | http_client.c | 44 static void http_client_got_response(struct httpread *handle, void *cookie, argument 47 struct http_client *c = cookie; 49 wpa_printf(MSG_DEBUG, "HTTP: httpread callback: handle=%p cookie=%p " 50 "e=%d", handle, cookie, e);
|
H A D | http_server.c | 41 static void http_request_cb(struct httpread *handle, void *cookie, argument 44 struct http_request *req = cookie;
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | ctrl_iface_udp.c | 44 u8 cookie[COOKIE_LEN]; member in struct:ctrl_iface_priv 139 priv->cookie, COOKIE_LEN); 158 u8 cookie[COOKIE_LEN]; local 189 * Require that the client includes a prefix with the 'cookie' value 196 wpa_printf(MSG_DEBUG, "CTLR: No cookie in the request - " 201 if (hexstr2bin(buf + 7, cookie, COOKIE_LEN) < 0) { 202 wpa_printf(MSG_DEBUG, "CTLR: Invalid cookie format in the " 207 if (os_memcmp(cookie, priv->cookie, COOKIE_LEN) != 0) { 208 wpa_printf(MSG_DEBUG, "CTLR: Invalid cookie i 419 u8 cookie[COOKIE_LEN]; member in struct:ctrl_iface_global_priv 454 u8 cookie[COOKIE_LEN]; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/wps/ |
H A D | http_client.c | 44 static void http_client_got_response(struct httpread *handle, void *cookie, argument 47 struct http_client *c = cookie; 49 wpa_printf(MSG_DEBUG, "HTTP: httpread callback: handle=%p cookie=%p " 50 "e=%d", handle, cookie, e);
|
H A D | http_server.c | 41 static void http_request_cb(struct httpread *handle, void *cookie, argument 44 struct http_request *req = cookie;
|
/external/chromium/base/win/ |
H A D | pe_image.cc | 24 PVOID cookie; member in struct:base::win::EnumAllImportsStorage 49 PIMAGE_THUNK_DATA iat, PVOID cookie) { 51 cookie); 54 storage.cookie); 62 PIMAGE_THUNK_DATA unload_iat, PVOID cookie) { 64 cookie); 68 unload_iat, storage.cookie); 239 bool PEImage::EnumSections(EnumSectionsFunction callback, PVOID cookie) const { 248 if (!callback(*this, section, section_start, size, cookie)) 255 bool PEImage::EnumExports(EnumExportsFunction callback, PVOID cookie) cons 47 ProcessImportChunk(const PEImage &image, LPCSTR module, PIMAGE_THUNK_DATA name_table, PIMAGE_THUNK_DATA iat, PVOID cookie) argument 58 ProcessDelayImportChunk(const PEImage &image, PImgDelayDescr delay_descriptor, LPCSTR module, PIMAGE_THUNK_DATA name_table, PIMAGE_THUNK_DATA iat, PIMAGE_THUNK_DATA bound_iat, PIMAGE_THUNK_DATA unload_iat, PVOID cookie) argument [all...] |
/external/chromium/chrome/browser/debugger/ |
H A D | devtools_manager.cc | 231 int cookie = DetachClientHost(rvh); local 232 if (cookie != -1) { 234 AttachClientHost(cookie, dest_rvh); 265 int cookie = DetachClientHost(old_rvh); local 266 if (cookie == -1) 270 AttachClientHost(cookie, new_tab->tab_contents()->render_view_host()); 278 int cookie = last_orphan_cookie_++; local 279 orphan_client_hosts_[cookie] = 284 return cookie; 449 // We've disconnected from the last renderer -> revoke cookie permission [all...] |
/external/chromium/chrome/browser/ui/gtk/ |
H A D | gtk_chrome_cookie_view.cc | 461 // Switches the display to showing the passed in cookie. 465 const net::CookieMonster::CanonicalCookie& cookie) { 469 cookie.Name().c_str()); 471 cookie.Value().c_str()); 475 cookie.Path().c_str()); 478 cookie.CreationDate())).c_str()); 480 std::string expire_text = cookie.DoesExpire() ? 481 UTF16ToUTF8(base::TimeFormatFriendlyDateAndTime(cookie.ExpiryDate())) : 492 if (cookie.DoesExpire()) { 509 l10n_util::GetStringUTF8(cookie 462 gtk_chrome_cookie_view_display_cookie( GtkChromeCookieView* self, const std::string& domain, const net::CookieMonster::CanonicalCookie& cookie) argument [all...] |
/external/chromium/chrome/common/ |
H A D | automation_messages.h | 153 AttachExternalTabParams(uint64 cookie, 161 uint64 cookie; member in struct:AttachExternalTabParams
|
/external/dnsmasq/contrib/wrt/ |
H A D | dhcp_release.c | 72 u32 cookie; member in struct:dhcp_packet 298 packet.cookie = htonl(DHCP_COOKIE);
|
/external/kernel-headers/original/linux/ |
H A D | dmaengine.h | 47 * typedef dma_cookie_t - an opaque DMA cookie 49 * if dma_cookie_t is >0 it's a DMA request cookie, <0 it's an error code 53 #define dma_submit_error(cookie) ((cookie) < 0 ? 1 : 0) 85 * @cookie: last cookie value returned to client 98 dma_cookie_t cookie; member in struct:dma_chan 199 dma_cookie_t cookie, dma_cookie_t *last, 301 * @cookie: transaction identifier to check status of 302 * @last: returns last completed cookie, ca 309 dma_async_memcpy_complete(struct dma_chan *chan, dma_cookie_t cookie, dma_cookie_t *last, dma_cookie_t *used) argument 324 dma_async_is_complete(dma_cookie_t cookie, dma_cookie_t last_complete, dma_cookie_t last_used) argument [all...] |
/external/mtpd/ |
H A D | pptp.c | 93 uint32_t cookie; member in struct:packet::__anon9534::__anon9535::__anon9536 141 outgoing.header.cookie = MAGIC_COOKIE; 187 /* If incoming.header is valid, check cookie and update incoming.expect. */ 189 if (incoming.header.cookie != MAGIC_COOKIE) {
|
/external/openssh/ |
H A D | kex.c | 101 * add a dummy cookie, the cookie will be overwritten by 124 /* skip cookie */ 195 u_char *cookie; local 208 /* generate a random cookie */ 211 cookie = buffer_ptr(&kex->my); 215 cookie[i] = rnd; 563 u_int8_t cookie[8], u_int8_t id[16]) 584 EVP_DigestUpdate(&md, cookie, 8); 562 derive_ssh1_session_id(BIGNUM *host_modulus, BIGNUM *server_modulus, u_int8_t cookie[8], u_int8_t id[16]) argument
|
/external/openssl/apps/ |
H A D | s_cb.c | 761 int MS_CALLBACK generate_cookie_callback(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len) argument 778 BIO_printf(bio_err,"error setting random cookie secret\n"); 843 memcpy(cookie, result, resultlength); 849 int MS_CALLBACK verify_cookie_callback(SSL *ssl, unsigned char *cookie, unsigned int cookie_len) argument 861 /* If secret isn't initialized yet, the cookie can't be valid */ 924 if (cookie_len == resultlength && memcmp(result, cookie, resultlength) == 0)
|
/external/oprofile/daemon/ |
H A D | opd_sfile.c | 57 /* cookie meaningless for kernel, shouldn't hash */ 64 if (trans->cookie != NO_COOKIE) { 65 val ^= trans->cookie >> DCOOKIE_SHIFT; 82 do_match(struct sfile const * sf, cookie_t cookie, cookie_t app_cookie, argument 108 /* ignore the cached trans->cookie for kernel images, 117 return sf->cookie == cookie; 125 return do_match(sfile, trans->cookie, trans->app_cookie, ki, 133 return do_match(sf, sf2->cookie, sf2->app_cookie, sf2->kernel, 154 if (sf->anon || is_cookie_ignored(sf->cookie)) [all...] |
/external/qemu/distrib/sdl-1.2.15/src/video/bwindow/ |
H A D | SDL_sysvideo.cc | 645 int32 cookie = 0; local 646 while (get_next_image_info(0,&cookie,&info) == B_OK) { 651 if (get_image_symbol((image_id)cookie,"glBegin",B_SYMBOL_TYPE_ANY,&location) == B_OK) { // I don't know if that *did* work in BeOS
|
/external/webkit/Source/WebCore/bindings/js/ |
H A D | ScriptController.cpp | 139 InspectorInstrumentationCookie cookie = InspectorInstrumentation::willEvaluateScript(m_frame, sourceURL, sourceCode.startLine()); local 145 InspectorInstrumentation::didEvaluateScript(cookie);
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | wpa_ctrl.c | 51 char *cookie; member in struct:wpa_ctrl 335 ctrl->cookie = os_strdup(buf); 360 os_free(ctrl->cookie); 383 if (ctrl->cookie) { 385 _cmd_len = os_strlen(ctrl->cookie) + 1 + cmd_len; 391 os_strlcpy(pos, ctrl->cookie, _cmd_len); 392 pos += os_strlen(ctrl->cookie);
|
/external/wpa_supplicant_8/src/common/ |
H A D | wpa_ctrl.c | 51 char *cookie; member in struct:wpa_ctrl 335 ctrl->cookie = os_strdup(buf); 360 os_free(ctrl->cookie); 383 if (ctrl->cookie) { 385 _cmd_len = os_strlen(ctrl->cookie) + 1 + cmd_len; 391 os_strlcpy(pos, ctrl->cookie, _cmd_len); 392 pos += os_strlen(ctrl->cookie);
|