/external/skia/legacy/src/effects/ |
SkColorFilters.cpp | 280 static inline unsigned pin(unsigned value, unsigned max) { function 317 unsigned r = pin(SkAlphaMul(SkGetPackedR32(c), scaleR) + SkAlphaMul(addR, scaleA), a); 318 unsigned g = pin(SkAlphaMul(SkGetPackedG32(c), scaleG) + SkAlphaMul(addG, scaleA), a); 319 unsigned b = pin(SkAlphaMul(SkGetPackedB32(c), scaleB) + SkAlphaMul(addB, scaleA), a); 368 unsigned r = pin(SkGetPackedR32(c) + SkAlphaMul(addR, scaleA), a); 369 unsigned g = pin(SkGetPackedG32(c) + SkAlphaMul(addG, scaleA), a); 370 unsigned b = pin(SkGetPackedB32(c) + SkAlphaMul(addB, scaleA), a);
|
/packages/apps/Phone/src/com/android/phone/ |
PhoneInterfaceManager.java | 437 public boolean supplyPin(String pin) { 441 return checkSimPin.unlockSim(null, pin); 444 public boolean supplyPuk(String puk, String pin) { 448 return checkSimPuk.unlockSim(puk, pin); 498 * Use PIN or PUK to unlock SIM card 500 * If PUK is null, unlock SIM card with PIN 502 * If PUK is not null, unlock SIM card with PUK and set PIN code 504 synchronized boolean unlockSim(String puk, String pin) { 516 mSimCard.supplyPin(pin, callback); 518 mSimCard.supplyPuk(puk, pin, callback) [all...] |
/frameworks/opt/telephony/src/java/com/android/internal/telephony/test/ |
SimulatedCommands.java | 113 public void supplyIccPin(String pin, Message result) { 124 if (pin != null && pin.equals(mPinCode)) { 295 Rlog.i(LOG_TAG, "[SimCmd] changeIccPin: pin failed!"); 345 public void queryFacilityLock(String facility, String pin, 347 queryFacilityLockForApp(facility, pin, serviceClass, null, result); 351 public void queryFacilityLockForApp(String facility, String pin, int serviceClass, 379 public void setFacilityLock(String facility, boolean lockEnabled, String pin, int serviceClass, 381 setFacilityLockForApp(facility, lockEnabled, pin, serviceClass, null, result); 386 String pin, int serviceClass, String appId [all...] |
/external/quake/quake/src/QW/client/ |
gl_model.c | 1277 void * Mod_LoadAliasFrame (void * pin, maliasframedesc_t *frame) 1283 pdaliasframe = (daliasframe_t *)pin; 1313 void *Mod_LoadAliasGroup (void * pin, maliasframedesc_t *frame) 1320 pingroup = (daliasgroup_t *)pin; 1798 dsprite_t *pin; local [all...] |
/external/quake/quake/src/WinQuake/ |
gl_model.cpp | 1252 void * Mod_LoadAliasFrame (void * pin, maliasframedesc_t *frame) 1258 pdaliasframe = (daliasframe_t *)pin; 1288 void *Mod_LoadAliasGroup (void * pin, maliasframedesc_t *frame) 1295 pingroup = (daliasgroup_t *)pin; 1754 dsprite_t *pin; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
ap.c | 727 const char *pin, char *buf, size_t buflen, 735 if (pin == NULL) { 738 pin = buf; 740 ret_len = os_snprintf(buf, buflen, "%s", pin); 742 ret = hostapd_wps_add_pin(wpa_s->ap_iface->bss[0], bssid, "any", pin, 753 wpa_printf(MSG_DEBUG, "WPS: AP PIN timed out"); 765 wpa_printf(MSG_DEBUG, "WPS: Enabling AP PIN (timeout=%d)", timeout); 780 wpa_printf(MSG_DEBUG, "WPS: Disabling AP PIN"); 791 unsigned int pin; local 797 pin = wps_generate_pin() [all...] |
ctrl_iface.c | 660 char *pin; local 663 pin = os_strchr(cmd, ' '); 664 if (pin) 665 *pin++ = '\0'; 683 if (pin) { 684 pos = os_strchr(pin, ' '); 691 return wpa_supplicant_ap_wps_pin(wpa_s, _bssid, pin, 696 if (pin) { 697 ret = wpas_wps_start_pin(wpa_s, _bssid, pin, 0, 701 ret = os_snprintf(buf, buflen, "%s", pin); 723 char pin[9]; local 1100 char *pin; local 1185 char *pin; local 1210 char *uuid = cmd, *pin, *pos; local 1229 char *uuid = cmd, *pin; local 1253 char *pin; local 3604 char *pin = NULL; local [all...] |
wps_supplicant.c | 64 wpa_printf(MSG_DEBUG, "WPS: PIN registration with " MACSTR 977 const char *pin, int p2p_group, u16 dev_pw_id) 1001 if (pin) 1002 os_snprintf(val, sizeof(val), "\"pin=%s dev_pw_id=%u\"", 1003 pin, dev_pw_id); 1006 os_snprintf(val, sizeof(val), "\"pin=%08d dev_pw_id=%u\"", 1021 /* Cancel the wps pbc/pin requests */ 1052 const char *pin, struct wps_new_ap_settings *settings) 1059 if (!pin) 1068 res = os_snprintf(pos, end - pos, "\"pin=%s", pin) 1515 unsigned int pbc = 0, auth = 0, pin = 0, wps = 0; local [all...] |
/external/chromium/chrome/browser/ui/webui/chromeos/ |
sim_unlock_ui.cc | 110 // for PIN input because PinRequired preference change was requested. 111 // SIM_NOT_LOCKED_CHANGE_PIN - SIM card is not locked, ask user for old PIN 112 // and new PIN to change it. 168 // Pending code input (PIN/PUK). 180 // Pass PIN/PUK code to flimflam and check status. 183 // Single handler for PIN/PUK code operations. 202 // completed (either cancelled or with entry of PIN/PUK). 221 // Type of the dialog: generic unlock/change pin/change PinRequire. 224 // New PIN value for the case when we unblock SIM card or change PIN 472 std::string pin; local 493 std::string pin; local [all...] |
/packages/apps/Settings/src/com/android/settings/ |
ChooseLockPassword.java | 288 * Validates PIN and returns a message to display if PIN fails test. 380 final String pin = mPasswordEntry.getText().toString(); local 381 if (TextUtils.isEmpty(pin)) { 386 errorMsg = validatePassword(pin); 388 mFirstPin = pin; 393 if (mFirstPin.equals(pin)) { 397 mLockPatternUtils.saveLockPassword(pin, mRequestedQuality, isFallback);
|
/external/arduino/hardware/arduino/cores/arduino/ |
wiring.h | 122 unsigned long pulseIn(uint8_t pin, uint8_t state, unsigned long timeout);
|
/external/qemu/hw/ |
qdev.h | 57 void qdev_connect_gpio_out(DeviceState *dev, int n, qemu_irq pin);
|
/packages/apps/Bluetooth/src/com/android/bluetooth/btservice/ |
RemoteDevices.java | 225 private void sendDisplayPinIntent(byte[] address, int pin) { 228 intent.putExtra(BluetoothDevice.EXTRA_PAIRING_KEY, pin); 339 // the spec recommendation, check if the keyboard has a fixed PIN zero 341 //TODO: Add sFixedPinZerosAutoPairKeyboard() and maintain list of devices that have fixed pin 346 // Generate a variable PIN. This is not truly random but good enough. 347 int pin = (int) Math.floor(Math.random() * 1000000); local 348 sendDisplayPinIntent(address, pin);
|
/frameworks/base/wifi/java/android/net/wifi/p2p/ |
WifiP2pService.java | 1739 String pin = mWifiNative.startWpsPinDisplay(mGroup.getInterface()); local 2046 final EditText pin = (EditText) textEntryView.findViewById(R.id.wifi_p2p_wps_pin); local 2218 String pin = mWifiNative.p2pConnect(config, dev.isGroupOwner()); local [all...] |
/cts/tests/tests/opengl/src/android/opengl/cts/ |
RendererOneColorBufferTest.java | 213 int [] pin = pinbuffer.array(); local 214 int pixel = pin[0];
|
/external/openssh/ |
ssh-pkcs11-client.c | 183 pkcs11_add_provider(char *name, char *pin, Key ***keysp) 197 buffer_put_cstring(&msg, pin);
|
sshconnect.c | 88 int pin[2], pout[2]; local 111 if (pipe(pin) < 0 || pipe(pout) < 0) 125 close(pin[1]); 126 if (pin[0] != 0) { 127 if (dup2(pin[0], 0) < 0) 129 close(pin[0]); 134 /* Cannot be 1 because pin allocated two descriptors. */ 158 close(pin[0]); 165 packet_set_connection(pout[0], pin[1]); [all...] |
session.c | 453 int pin[2], pout[2], perr[2]; local 459 if (pipe(pin) < 0) { 465 close(pin[0]); 466 close(pin[1]); 472 close(pin[0]); 473 close(pin[1]); 505 close(pin[0]); 506 close(pin[1]); 537 close(pin[1]); 538 if (dup2(pin[0], 0) < 0 [all...] |
scp.c | 231 int pin[2], pout[2], reserved[2]; local 247 if (pipe(pin) < 0) 264 close(pin[1]); 266 dup2(pin[0], 0); 268 close(pin[0]); 287 close(pin[0]); 288 *fdout = pin[1];
|
/frameworks/base/policy/src/com/android/internal/policy/impl/keyguard/ |
KeyguardSimPukView.java | 38 * Displays a PIN pad for entering a PUK (Pin Unlock Kode) provided by a carrier. 131 // The delete button is of the PIN keyboard itself in some (e.g. tablet) layouts, 184 protected CheckSimPuk(String puk, String pin) { 186 mPin = pin; 237 // make sure the PIN is between 4 and 8 digits
|
/frameworks/base/core/tests/bluetoothtests/src/android/bluetooth/ |
BluetoothTestUtils.java | 153 public PairReceiver(BluetoothDevice device, int passkey, byte[] pin, int expectedFlags) { 158 mPin = pin; 742 * @param pin The pairing pin if pairing requires a pin. Any value if not. 744 public void pair(BluetoothAdapter adapter, BluetoothDevice device, int passkey, byte[] pin) { 745 pairOrAcceptPair(adapter, device, passkey, pin, true); 755 * @param pin The pairing pin if pairing requires a pin. Any value if not [all...] |
/external/bluetooth/bluedroid/btif/src/ |
btif_dm.c | 619 ** Description Executes pin request event in btif context 663 pin_code.pin[0] = 0x30; 664 pin_code.pin[1] = 0x30; 665 pin_code.pin[2] = 0x30; 666 pin_code.pin[3] = 0x30; 669 BTA_DmPinReply( (UINT8*)bd_addr.address, TRUE, 4, pin_code.pin); 680 pin_code.pin[0] = 0x30; 681 pin_code.pin[1] = 0x30; 682 pin_code.pin[2] = 0x30; 683 pin_code.pin[3] = 0x30 [all...] |
/external/dropbear/ |
scp.c | 171 int pin[2], pout[2], reserved[2]; local 186 if (pipe(pin) < 0) 214 close(pin[1]); 216 dup2(pin[0], 0); 218 close(pin[0]); 256 close(pin[0]); 257 *fdout = pin[1];
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_tls_common.c | 83 params->pin = config->pin; 104 params->pin = config->pin2; 177 * At this point with the pkcs11 engine the PIN might be wrong. 178 * We reset the PIN in the configuration to be sure to not use 181 os_free(config->pin); 182 config->pin = NULL; 186 * We do not know exactly but maybe the PIN was wrong, 189 os_free(config->pin); 190 config->pin = NULL [all...] |
/frameworks/opt/telephony/src/java/com/android/internal/telephony/sip/ |
SipCommandInterface.java | 46 public void supplyIccPin(String pin, Message result) { 54 public void supplyIccPin2(String pin, Message result) { 500 public void supplyIccPinForApp(String pin, String aid, Message response) {
|