/external/quake/quake/src/QW/client/ |
gl_model.c | 1277 void * Mod_LoadAliasFrame (void * pin, maliasframedesc_t *frame) 1283 pdaliasframe = (daliasframe_t *)pin; 1313 void *Mod_LoadAliasGroup (void * pin, maliasframedesc_t *frame) 1320 pingroup = (daliasgroup_t *)pin; 1798 dsprite_t *pin; local [all...] |
/external/quake/quake/src/WinQuake/ |
gl_model.cpp | 1252 void * Mod_LoadAliasFrame (void * pin, maliasframedesc_t *frame) 1258 pdaliasframe = (daliasframe_t *)pin; 1288 void *Mod_LoadAliasGroup (void * pin, maliasframedesc_t *frame) 1295 pingroup = (daliasgroup_t *)pin; 1754 dsprite_t *pin; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
wps_supplicant.c | 53 wpa_printf(MSG_DEBUG, "WPS: PIN registration with " MACSTR 870 const char *pin, int p2p_group, u16 dev_pw_id) 894 if (pin) 895 os_snprintf(val, sizeof(val), "\"pin=%s dev_pw_id=%u\"", 896 pin, dev_pw_id); 899 os_snprintf(val, sizeof(val), "\"pin=%08d dev_pw_id=%u\"", 912 /* Cancel the wps pbc/pin requests */ 990 const char *pin, struct wps_new_ap_settings *settings) 997 if (!pin) 1006 res = os_snprintf(pos, end - pos, "\"pin=%s", pin) 1430 unsigned int pbc = 0, auth = 0, pin = 0, wps = 0; local [all...] |
ap.c | 700 const char *pin, char *buf, size_t buflen) 707 if (pin == NULL) { 710 pin = buf; 712 ret_len = os_snprintf(buf, buflen, "%s", pin); 714 ret = hostapd_wps_add_pin(wpa_s->ap_iface->bss[0], bssid, "any", pin, 725 wpa_printf(MSG_DEBUG, "WPS: AP PIN timed out"); 737 wpa_printf(MSG_DEBUG, "WPS: Enabling AP PIN (timeout=%d)", timeout); 752 wpa_printf(MSG_DEBUG, "WPS: Disabling AP PIN"); 763 unsigned int pin; local 769 pin = wps_generate_pin() [all...] |
/gdk/samples/quake/jni/ |
gl_model.cpp | 1252 void * Mod_LoadAliasFrame (void * pin, maliasframedesc_t *frame) 1258 pdaliasframe = (daliasframe_t *)pin; 1288 void *Mod_LoadAliasGroup (void * pin, maliasframedesc_t *frame) 1295 pingroup = (daliasgroup_t *)pin; 1754 dsprite_t *pin; local [all...] |
/external/chromium/chrome/browser/ui/webui/chromeos/ |
sim_unlock_ui.cc | 110 // for PIN input because PinRequired preference change was requested. 111 // SIM_NOT_LOCKED_CHANGE_PIN - SIM card is not locked, ask user for old PIN 112 // and new PIN to change it. 168 // Pending code input (PIN/PUK). 180 // Pass PIN/PUK code to flimflam and check status. 183 // Single handler for PIN/PUK code operations. 202 // completed (either cancelled or with entry of PIN/PUK). 221 // Type of the dialog: generic unlock/change pin/change PinRequire. 224 // New PIN value for the case when we unblock SIM card or change PIN 472 std::string pin; local 493 std::string pin; local [all...] |
/packages/apps/Settings/src/com/android/settings/ |
ChooseLockPassword.java | 280 * Validates PIN and returns a message to display if PIN fails test. 372 final String pin = mPasswordEntry.getText().toString(); local 373 if (TextUtils.isEmpty(pin)) { 378 errorMsg = validatePassword(pin); 380 mFirstPin = pin; 385 if (mFirstPin.equals(pin)) { 389 mLockPatternUtils.saveLockPassword(pin, mRequestedQuality, isFallback);
|
/frameworks/base/telephony/java/com/android/internal/telephony/sip/ |
SipCommandInterface.java | 43 public void supplyIccPin(String pin, Message result) { 49 public void supplyIccPin2(String pin, Message result) { 395 public void supplyIccPinForApp(String pin, String aid, Message response) {
|
/external/qemu/hw/ |
qdev.h | 57 void qdev_connect_gpio_out(DeviceState *dev, int n, qemu_irq pin);
|
/external/openssh/ |
ssh-pkcs11-client.c | 183 pkcs11_add_provider(char *name, char *pin, Key ***keysp) 197 buffer_put_cstring(&msg, pin);
|
sshconnect.c | 88 int pin[2], pout[2]; local 111 if (pipe(pin) < 0 || pipe(pout) < 0) 125 close(pin[1]); 126 if (pin[0] != 0) { 127 if (dup2(pin[0], 0) < 0) 129 close(pin[0]); 134 /* Cannot be 1 because pin allocated two descriptors. */ 158 close(pin[0]); 165 packet_set_connection(pout[0], pin[1]); [all...] |
session.c | 453 int pin[2], pout[2], perr[2]; local 459 if (pipe(pin) < 0) { 465 close(pin[0]); 466 close(pin[1]); 472 close(pin[0]); 473 close(pin[1]); 505 close(pin[0]); 506 close(pin[1]); 537 close(pin[1]); 538 if (dup2(pin[0], 0) < 0 [all...] |
scp.c | 231 int pin[2], pout[2], reserved[2]; local 247 if (pipe(pin) < 0) 264 close(pin[1]); 266 dup2(pin[0], 0); 268 close(pin[0]); 287 close(pin[0]); 288 *fdout = pin[1];
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_tls.c | 54 "PIN"); 97 * PIN. It may be wrong, we cannot be sure but trying 101 os_free(config->pin); 102 config->pin = NULL;
|
eap_tls_common.c | 73 params->pin = config->pin; 94 params->pin = config->pin2; 156 * At this point with the pkcs11 engine the PIN might be wrong. 157 * We reset the PIN in the configuration to be sure to not use 160 os_free(config->pin); 161 config->pin = NULL; 165 * We do not know exactly but maybe the PIN was wrong, 168 os_free(config->pin); 169 config->pin = NULL [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps.c | 46 if (cfg->pin) { 53 os_memcpy(data->dev_password, cfg->pin, cfg->pin_len); 59 /* Use special PIN '00000000' for PBC */ 102 wpa_printf(MSG_DEBUG, "WPS: Full PIN information revealed and " 189 * wps_is_selected_pin_registrar - Check whether WPS IE indicates active PIN 191 * Returns: 1 if PIN Registrar is active, 0 if not
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_tls.c | 48 "PIN"); 91 * PIN. It may be wrong, we cannot be sure but trying 95 os_free(config->pin); 96 config->pin = NULL;
|
/external/wpa_supplicant_6/wpa_supplicant/ |
ctrl_iface.c | 170 char *pin; local 173 pin = os_strchr(cmd, ' '); 174 if (pin) 175 *pin++ = '\0'; 185 if (pin) { 186 ret = wpas_wps_start_pin(wpa_s, _bssid, pin); 189 ret = os_snprintf(buf, buflen, "%s", pin); 199 /* Return the generated PIN */ 211 char *pin; local 213 pin = os_strchr(cmd, ' ') [all...] |
/frameworks/base/core/tests/bluetoothtests/src/android/bluetooth/ |
BluetoothTestUtils.java | 153 public PairReceiver(BluetoothDevice device, int passkey, byte[] pin, int expectedFlags) { 158 mPin = pin; 742 * @param pin The pairing pin if pairing requires a pin. Any value if not. 744 public void pair(BluetoothAdapter adapter, BluetoothDevice device, int passkey, byte[] pin) { 745 pairOrAcceptPair(adapter, device, passkey, pin, true); 755 * @param pin The pairing pin if pairing requires a pin. Any value if not [all...] |
/external/dropbear/ |
scp.c | 171 int pin[2], pout[2], reserved[2]; local 186 if (pipe(pin) < 0) 214 close(pin[1]); 216 dup2(pin[0], 0); 218 close(pin[0]); 256 close(pin[0]); 257 *fdout = pin[1];
|
/external/valgrind/tsan/ |
Makefile | 55 PINP=$(P)pin- 110 PIN_LIBS=pin.lib libxed.lib libcpmt.lib libcmt.lib pinvm.lib kernel32.lib ntdll-32.lib winmm.lib 196 @echo PIN_ROOT is not set. Not building the PIN-based variant. 297 rm -rfv $(OUTDIR) ts_event_names.h core* pintool.log* pin.log $(VALGRIND_INST_ROOT)/lib/valgrind/*tsan*
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
tls.h | 67 * @ppin: pointer to the pin variable in the configuration 106 const char *pin; member in struct:tls_connection_params 198 * TLS_SET_PARAMS_ENGINE_PRV_INIT_FAILED (-2) on possible PIN error causing 212 * TLS_SET_PARAMS_ENGINE_PRV_INIT_FAILED (-2) on possible PIN error causing
|
/external/wpa_supplicant_8/src/crypto/ |
tls.h | 104 * @ppin: pointer to the pin variable in the configuration 141 const char *pin; member in struct:tls_connection_params 233 * TLS_SET_PARAMS_ENGINE_PRV_INIT_FAILED (-2) on possible PIN error causing 247 * TLS_SET_PARAMS_ENGINE_PRV_INIT_FAILED (-2) on possible PIN error causing
|
/hardware/ril/mock-ril/src/js/ |
simulated_icc.js | 78 print('Icc: rilRequestEnterSimPin req.data.pin=' + req.data.pin);
|
/packages/apps/Phone/src/com/android/phone/ |
EnableFdnScreen.java | 84 mPin2Field = (EditText) findViewById(R.id.pin);
|