/frameworks/base/telephony/java/com/android/internal/telephony/ |
CommandsInterface.java | 556 * Supply the ICC PIN to the ICC card 567 void supplyIccPin(String pin, Message result); 570 * Supply the PIN for the app with this AID on the ICC card 583 void supplyIccPinForApp(String pin, String aid, Message result); 600 * Supply the PUK, new pin for the app with this AID on the ICC card [all...] |
RIL.java | 688 supplyIccPin(String pin, Message result) { 689 supplyIccPinForApp(pin, null, result); 693 supplyIccPinForApp(String pin, String aid, Message result) { 701 rr.mp.writeString(pin); 729 supplyIccPin2(String pin, Message result) { 730 supplyIccPin2ForApp(pin, null, result); 734 supplyIccPin2ForApp(String pin, String aid, Message result) { 742 rr.mp.writeString(pin); [all...] |
/frameworks/base/wifi/java/android/net/wifi/ |
WifiManager.java | [all...] |
WifiConfigStore.java | 438 * Start WPS pin method configuration with pin obtained 441 * @return Wps result containing status and pin 445 if (mWifiNative.startWpsRegistrar(config.BSSID, config.pin)) { 450 loge("Failed to start WPS pin method configuration"); 457 * Start WPS pin method configuration with pin obtained 459 * @return WpsResult indicating status and pin 463 result.pin = mWifiNative.startWpsPinDisplay(config.BSSID); 465 if (!TextUtils.isEmpty(result.pin)) { [all...] |
/external/openssh/ |
sftp.c | 2012 int pin[2], pout[2]; local [all...] |
pkcs11.h | 749 (ck_slot_id_t slot_id, unsigned char *pin, 752 (ck_session_handle_t session, unsigned char *pin, 780 unsigned char *pin, unsigned long pin_len)); [all...] |
/packages/apps/Phone/src/com/android/phone/ |
PhoneApp.java | 317 + "not showing 'SIM network unlock' PIN entry screen"); 319 // Normal case: show the "SIM network unlock" PIN entry screen. 321 // they enter a valid SIM network PIN. [all...] |
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/sound/ |
soc-dapm.h | 208 char *pin, int status); 213 snd_soc_dapm_input = 0, /* input pin */ 214 snd_soc_dapm_output, /* output pin */ 266 unsigned char connected:1; /* connected codec pin */
|
/external/qemu-pc-bios/bochs/bios/ |
rombios32.c | 782 pin. We could also use the bus number to have a more precise 935 int i, pin, pic_irq, vendor_id, device_id; local 1013 pin = pci_config_readb(d, PCI_INTERRUPT_PIN); 1014 if (pin != 0) { 1015 pin = pci_slot_get_pirq(d, pin - 1); 1016 pic_irq = pci_irqs[pin]; [all...] |
/external/bluetooth/bluez/src/ |
storage.c | 597 int read_pin_code(bdaddr_t *local, bdaddr_t *peer, char *pin) 609 strncpy(pin, str, 16); 610 len = strlen(pin);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap.c | 288 * entering of PIN code or passphrase to retry the 291 wpa_printf(MSG_DEBUG, "EAP: Pending PIN/passphrase " 918 if (scard_set_pin(sm->scard_ctx, conf->pin)) { 920 * Make sure the same PIN is not tried again in order to avoid 923 os_free(conf->pin); 924 conf->pin = NULL; 926 wpa_printf(MSG_WARNING, "PIN validation failed"); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
tls_openssl.c | 754 const char *pin, const char *key_id, 763 if (pin == NULL) { 764 wpa_printf(MSG_ERROR, "ENGINE: Smartcard PIN not set"); 787 if (ENGINE_ctrl_cmd_string(conn->engine, "PIN", pin, 0) == 0) { 788 wpa_printf(MSG_ERROR, "ENGINE: cannot set pin [%s]", 792 /* load private key first in-case PIN is required for cert */ [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_wsc.c | 120 wpa_printf(MSG_INFO, "EAP-WSC: No AP PIN (password) " 125 cfg.pin = sm->user->password;
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_wsc.c | 123 wpa_printf(MSG_DEBUG, "EAP-WSC: No AP PIN (password) " 127 cfg.pin = sm->user->password;
|
/external/wpa_supplicant_8/src/wps/ |
wps_er.c | [all...] |
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_new.c | 803 * @generated_pin - pin to be displayed in case of WPS_CONFIG_DISPLAY method 829 char pin[9], *p_pin = NULL; local 860 os_snprintf(pin, sizeof(pin), "%08d", generated_pin); 861 p_pin = pin; [all...] |
/external/chromium/chrome/browser/chromeos/cros/ |
network_library.h | 113 // requires user to enter PIN. 114 // SIM_PIN_NOT_REQUIRED - SIM card is unlocked all the time and requires PIN 122 // Any PIN operation result (EnterPin, UnblockPin etc.). 126 PIN_ERROR_INCORRECT_CODE = 2, // Either PIN/PUK specified is incorrect. 127 PIN_ERROR_BLOCKED = 3, // No more PIN retries left, SIM is blocked. 910 // Called when pin async operation has completed. [all...] |
network_library.cc | 80 // All *Pin(...) methods use internal callback that would update cellular 174 const char* kSIMLockPin = "sim-pin"; 253 const char* kEapPinProperty = "EAP.PIN"; 317 const char* kErrorPinMissing = "pin-missing"; 2481 << " pin: " << pin; local [all...] |
/external/bluetooth/bluez/plugins/ |
mgmtops.c | 401 error("Invalid PIN length (%u) in new_key event", 495 static int mgmt_pincode_reply(int index, bdaddr_t *bdaddr, const char *pin, 508 if (pin == NULL) { 532 memcpy(cp->pin_code, pin, pin_len); [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap.c | 292 * entering of PIN code or passphrase to retry the 295 wpa_printf(MSG_DEBUG, "EAP: Pending PIN/passphrase " 997 if (scard_set_pin(sm->scard_ctx, conf->pin)) { 999 * Make sure the same PIN is not tried again in order to avoid 1002 os_free(conf->pin); 1003 conf->pin = NULL; 1005 wpa_printf(MSG_WARNING, "PIN validation failed"); [all...] |
/frameworks/base/core/jni/ |
android_server_BluetoothService.cpp | 649 jstring pin, int nativeData) { 657 ALOGE("%s: Cannot create message reply to return PIN code to " 663 const char *c_pin = env->GetStringUTFChars(pin, NULL); 671 env->ReleaseStringUTFChars(pin, c_pin); [all...] |
/external/chromium/chrome/browser/ui/ |
browser.h | 387 // extension. If |pin| is true and |tab_index|/ is the last pinned tab, then 395 bool pin, [all...] |
/external/qemu/android/config/linux-x86/linux/ |
kvm.h | 448 __u32 pin; member in struct:kvm_irq_routing_irqchip
|
/external/qemu/android/config/linux-x86_64/linux/ |
kvm.h | 448 __u32 pin; member in struct:kvm_irq_routing_irqchip
|
/external/wpa_supplicant_8/src/crypto/ |
tls_openssl.c | 789 const char *pin, const char *key_id, 799 if (pin == NULL) { 800 wpa_printf(MSG_ERROR, "ENGINE: Smartcard PIN not set"); 828 if (ENGINE_ctrl_cmd_string(conn->engine, "PIN", pin, 0) == 0) { 829 wpa_printf(MSG_ERROR, "ENGINE: cannot set pin [%s]", 834 /* load private key first in-case PIN is required for cert */ [all...] |