HomeSort by relevance Sort by last modified time
    Searched refs:pin (Results 151 - 175 of 244) sorted by null

1 2 3 4 5 67 8 910

  /external/wpa_supplicant_8/wpa_supplicant/
wps_supplicant.c 64 wpa_printf(MSG_DEBUG, "WPS: PIN registration with " MACSTR
1090 const char *pin, int p2p_group, u16 dev_pw_id)
1114 if (pin)
1115 os_snprintf(val, sizeof(val), "\"pin=%s dev_pw_id=%u\"",
1116 pin, dev_pw_id);
1119 os_snprintf(val, sizeof(val), "\"pin=%08d dev_pw_id=%u\"",
1134 /* Cancel the wps pbc/pin requests */
1639 unsigned int pbc = 0, auth = 0, pin = 0, wps = 0; local
    [all...]
  /external/dropbear/
scp.c 171 int pin[2], pout[2], reserved[2]; local
186 if (pipe(pin) < 0)
214 close(pin[1]);
216 dup2(pin[0], 0);
218 close(pin[0]);
256 close(pin[0]);
257 *fdout = pin[1];
  /external/openssh/
scp.c 231 int pin[2], pout[2], reserved[2]; local
247 if (pipe(pin) < 0)
264 close(pin[1]);
266 dup2(pin[0], 0);
268 close(pin[0]);
287 close(pin[0]);
288 *fdout = pin[1];
ssh-agent.c 703 char *provider = NULL, *pin; local
710 pin = buffer_get_string(&e->request, NULL);
729 count = pkcs11_add_provider(provider, pin, &keys);
750 if (pin)
751 xfree(pin);
764 char *provider = NULL, *pin = NULL; local
770 pin = buffer_get_string(&e->request, NULL);
771 xfree(pin);
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_tls_common.c 83 params->pin = config->pin;
104 params->pin = config->pin2;
181 * At this point with the pkcs11 engine the PIN might be wrong.
182 * We reset the PIN in the configuration to be sure to not use
185 os_free(config->pin);
186 config->pin = NULL;
190 * We do not know exactly but maybe the PIN was wrong,
193 os_free(config->pin);
194 config->pin = NULL
    [all...]
eap_tls.c 55 "PIN");
128 * PIN. It may be wrong, we cannot be sure but trying
132 os_free(config->pin);
133 config->pin = NULL;
  /external/chromium_org/remoting/host/setup/
native_messaging_host.cc 217 std::string pin; local
218 if (!message.GetString("pin", &pin)) {
219 LOG(ERROR) << "'pin' not found: " << message;
222 response->SetString("hash", remoting::MakeHostPinHash(host_id, pin));
  /frameworks/opt/telephony/src/java/com/android/internal/telephony/sip/
SipCommandInterface.java 47 public void supplyIccPin(String pin, Message result) {
55 public void supplyIccPin2(String pin, Message result) {
515 public void supplyIccPinForApp(String pin, String aid, Message response) {
  /external/chromium_org/remoting/client/plugin/
chromoting_instance.h 199 void OnPinFetched(const std::string& pin);
226 // Uses the PIN request dialog in the webapp to obtain the shared secret.
257 // PIN Fetcher.
  /external/chromium_org/remoting/webapp/
event_handlers.js 76 { event: 'click', id: 'change-daemon-pin',
84 { event: 'click', id: 'daemon-pin-cancel', fn: goHome },
host_plugin_proto.js 34 * @param {string} pin The PIN.
38 remoting.HostPlugin.prototype.getPinHash = function(hostId, pin, callback) {};
host_dispatcher.js 130 * @param {string} pin
136 function(hostId, pin, onDone, onError) {
140 this.getPinHash.bind(this, hostId, pin, onDone, onError));
143 this.nativeMessagingHost_.getPinHash(hostId, pin, onDone, onError);
147 this.npapiHost_.getPinHash(hostId, pin, onDone);
  /external/wpa_supplicant_8/src/crypto/
tls.h 115 * @ppin: pointer to the pin variable in the configuration
154 const char *pin; member in struct:tls_connection_params
247 * TLS_SET_PARAMS_ENGINE_PRV_INIT_FAILED (-2) on possible PIN error causing
261 * TLS_SET_PARAMS_ENGINE_PRV_INIT_FAILED (-2) on possible PIN error causing
  /frameworks/opt/telephony/src/java/com/android/internal/telephony/uicc/
IccCardProxy.java 427 * Locked state have a reason (PIN, PUK, NETWORK, PERM_DISABLED)
535 public void supplyPin(String pin, Message onComplete) {
538 mUiccApplication.supplyPin(pin, onComplete);
591 public void supplyNetworkDepersonalization(String pin, Message onComplete) {
594 mUiccApplication.supplyNetworkDepersonalization(pin, onComplete);
UiccCardApplication.java 517 * Supply the ICC PIN to the ICC
527 * If the supplied PIN is incorrect:
536 public void supplyPin (String pin, Message onComplete) {
538 mCi.supplyIccPin(pin, onComplete);
560 public void supplyNetworkDepersonalization (String pin, Message onComplete) {
563 mCi.supplyNetworkDepersonalization(pin, onComplete);
568 * Check whether ICC pin lock is enabled
569 * This is a sync call which returns the cached pin enabled state
588 * This is a sync call which returns the cached pin enabled state
600 * Set the ICC pin lock enabled or disable
    [all...]
  /frameworks/rs/driver/runtime/
rs_allocation.c 274 const uchar *pin = (const uchar *)alloc->mHal.drvState.lod[1].mallocPtr; local
276 return pin[((x >> shift) * cstep) + ((y >> shift) * stride)];
288 const uchar *pin = (const uchar *)alloc->mHal.drvState.lod[2].mallocPtr; local
290 return pin[((x >> shift) * cstep) + ((y >> shift) * stride)];
  /hardware/libhardware/include/hardware/
bluetooth.h 92 uint8_t pin[16]; member in struct:__anon32819
  /packages/services/Telephony/src/com/android/phone/
EnableFdnScreen.java 84 mPin2Field = (EditText) findViewById(R.id.pin);
EnableIccPinScreen.java 36 * UI to enable/disable the ICC PIN.
78 mPinField = (EditText) findViewById(R.id.pin);
  /external/wpa_supplicant_8/src/ap/
wps_hostapd.c 179 wpa_printf(MSG_DEBUG, "WPS: PIN needed for E-UUID %s", uuid);
663 wpa_printf(MSG_DEBUG, "WPS: Re-enable AP PIN");
678 * Registrar failed to prove its knowledge of the AP PIN. Lock AP setup
684 wpa_printf(MSG_DEBUG, "WPS: AP PIN authentication failure number %u "
698 * In indefinite lockdown - disable automatic AP PIN
702 wpa_printf(MSG_DEBUG, "WPS: AP PIN disabled indefinitely");
710 wpa_printf(MSG_DEBUG, "WPS: Disable AP PIN for %u seconds",
743 wpa_printf(MSG_DEBUG, "WPS: Clear consecutive AP PIN failure counter "
1272 const u8 *pin; member in struct:wps_add_pin_data
1584 unsigned int pin; local
    [all...]
  /external/chromium_org/chrome/browser/resources/options/chromeos/
bluetooth.css 160 .bluetooth-keyboard-button.key-pin {
  /frameworks/base/core/java/android/os/
UserManager.java 643 * Sets a new challenge PIN for restrictions. This is only for use by pre-installed
645 * @param newPin the PIN to use for challenge dialogs.
646 * @return Returns true if the challenge PIN was set successfully.
652 Log.w(TAG, "Could not change restrictions pin");
659 * @param pin The PIN to verify, or null to get the number of milliseconds to wait for before
660 * allowing the user to enter the PIN.
662 * you can accept another PIN, when the input is null or the input doesn't match the saved PIN.
663 * Returns {@link #PIN_VERIFICATION_SUCCESS} if the input matches the saved PIN. Return
    [all...]
  /external/chromium/chrome/browser/tabs/
tab_strip_model.cc 121 bool pin = local
123 index = ConstrainInsertionIndex(index, pin);
136 data->pinned = pin;
882 bool pin = WillContextMenuPin(context_index); local
883 if (pin) {
    [all...]
  /external/chromium_org/chrome/browser/chromeos/cros/
network_library.cc 85 // All *Pin(...) methods use internal callback that would update cellular
744 const std::string& slot, const std::string& pin) {
748 SetOrClearStringProperty(flimflam::kOpenVPNPinProperty, pin, NULL);
752 SetOrClearStringProperty(flimflam::kL2tpIpsecPinProperty, pin, NULL);
    [all...]
  /external/chromium_org/chrome/browser/ui/tabs/
tab_strip_model.cc 159 bool pin = extensions_tab_helper->is_app() || add_types & ADD_PINNED; local
160 index = ConstrainInsertionIndex(index, pin);
173 data->pinned = pin;
883 bool pin = WillContextMenuPin(context_index); local
884 if (pin) {
    [all...]

Completed in 1796 milliseconds

1 2 3 4 5 67 8 910