Lines Matching refs:cookie
6 // (netwerk/cookie/src/nsCookieService.cpp)
81 // Default minimum delay after updating a cookie's LastAccessDate before we
126 // (2) For each list with more than 1 entry, keep the cookie having the
174 // Determine the actual cookie domain based on the domain string passed
175 // (if any) and the URL from which the cookie came.
177 // -host cookie domain (ex: "google.com")
178 // -domain cookie domain (ex: ".google.com")
184 // If no domain was specified in the domain string, default to a host cookie.
186 // ip address hostname exactly. It should be treated as a host cookie.
194 // Get the normalized domain specified in cookie line.
195 // Note: The RFC says we can reject a cookie if the domain
196 // attribute does not start with a dot. IE/FF/Safari however, allow a cookie
217 return false; // Can't set a cookie on a different domain + registry.
232 // Determine the cookie domain to use for setting the specified cookie.
250 // The path was supplied in the cookie, we'll take it.
254 // The path was not supplied in the cookie or invalid, we will default
257 // Set-Cookie response, up to, but not including, the
259 // How would this work for a cookie on /? We will include it then.
264 // The cookie path was invalid or a single '/'.
298 // Invalid or no expiration, persistent cookie.
309 // is before the creation date, the cookie is supposed to be deleted.
416 // Parse a cookie expiration time. We try to be lenient, but we need to
422 // An average cookie expiration will look something like this:
432 // If the cookie attribute came in in quotes (ex expires="XXX"), the quotes
509 // NOTREACHED() << "Cookie parse expiration failed: " << time_string;
529 // NOTREACHED() << "Cookie exploded expiration failed: " << time_string;
571 // This function is being called to scrape the cookie list for management UI
682 // simple lookup and per-cookie delete.
691 // Delete only on a match as a host cookie.
701 bool CookieMonster::DeleteCanonicalCookie(const CanonicalCookie& cookie) {
705 for (CookieMapItPair its = cookies_.equal_range(GetKey(cookie.Domain()));
708 if (its.first->second->CreationDate() == cookie.CreationDate()) {
790 // In Mozilla if you set a cookie like AAAA, it will have an empty token
791 // and a value of AAAA. When it sends the cookie back, it will send AAAA,
899 // We've been given ownership of the cookie and are throwing it
958 CanonicalCookie* cookie = it->second;
960 CookieSignature signature(cookie->Name(), cookie->Domain(),
961 cookie->Path());
968 // We save the iterator into |cookies_| rather than the actual cookie
972 "Duplicate creation times found in duplicate cookie name scan.";
994 // Since |dups| is sorted by creation time (descending), the first cookie
1104 // If the cookie is expired, delete it.
1126 // Add this cookie to the set of matching cookies. Update the access
1150 // We should never have more than one equivalent cookie, since they should
1153 "Duplicate equivalent cookies found, cookie store is corrupted.";
1195 // Parse the cookie.
1199 VLOG(kVlogSetCookies) << "WARNING: Couldn't parse cookie";
1204 VLOG(kVlogSetCookies) << "SetCookie() not setting httponly cookie";
1237 VLOG(kVlogSetCookies) << "SetCookie() not clobbering httponly cookie";
1244 // Realize that we might be setting an expired cookie, and the only point
1245 // was to delete the cookie which we've already done.
1256 // We assume that hopefully setting a cookie will be less common than
1257 // querying a cookie. Since setting a cookie can put us over our limits,
1259 // if a cookie was set, in the common case it will be used soon after,
1270 // Based off the Mozilla code. When a cookie has been accessed recently,
1386 // the oldest preserved cookie.
1464 // thus restricting each scheme to a single cookie monster (which might
1484 // Make sure the request is on a cookie-able url scheme.
1494 VLOG(kVlogPerCookieMonster) << "WARNING: Unsupported cookie scheme: "
1520 // More detailed statistics on cookie counts at different granularities.
1548 << "Time for recording cookie stats (us): "
1580 "Cookie.ExpirationDurationMinutes",
1584 "Cookie.BetweenAccessIntervalMinutes",
1588 "Cookie.EvictedLastAccessMinutes",
1592 "Cookie.Count", 1, 4000, 50,
1595 "Cookie.DomainCount", 1, 4000, 50,
1598 "Cookie.Etldp1Count", 1, 4000, 50,
1601 "Cookie.DomainPerEtldp1Count", 1, 4000, 50,
1611 "Cookie.DeletionCause", 1,
1616 histogram_time_get_ = base::Histogram::FactoryTimeGet("Cookie.TimeGet",
1619 histogram_time_load_ = base::Histogram::FactoryTimeGet("Cookie.TimeLoad",
1643 VLOG(1) << "Not parsing cookie, too large: " << cookie_line.size();
1692 // Create a cookie-line for the cookie. For debugging only!
1850 // before the cookie line, not including any header name...
2019 // logic, otherwise don't create the cookie.
2069 // Make sure the cookie path is a prefix of the url path. If the
2070 // url path is shorter than the cookie path, then the cookie path
2079 // In order to avoid in correctly matching a cookie path of /blah
2081 // the cookie path ends in a trailing '/', or that we prefix up to a '/'
2083 // than the cookie path length, it's safe to index one byte past.
2095 // Can domain match in two ways; as a domain cookie (where the cookie
2096 // domain begins with ".") or as a host cookie (where it doesn't).
2100 // we allow matching as a host cookie even when the domain_ starts with
2105 // Domain cookie must have an initial ".". To match, it must be
2110 // extension cookie tests currently use the funtionality, and if we