/external/wpa_supplicant_8/wpa_supplicant/ |
wps_supplicant.c | 64 wpa_printf(MSG_DEBUG, "WPS: PIN registration with " MACSTR 1090 const char *pin, int p2p_group, u16 dev_pw_id) 1114 if (pin) 1115 os_snprintf(val, sizeof(val), "\"pin=%s dev_pw_id=%u\"", 1116 pin, dev_pw_id); 1119 os_snprintf(val, sizeof(val), "\"pin=%08d dev_pw_id=%u\"", 1134 /* Cancel the wps pbc/pin requests */ 1639 unsigned int pbc = 0, auth = 0, pin = 0, wps = 0; local [all...] |
/external/dropbear/ |
scp.c | 171 int pin[2], pout[2], reserved[2]; local 186 if (pipe(pin) < 0) 214 close(pin[1]); 216 dup2(pin[0], 0); 218 close(pin[0]); 256 close(pin[0]); 257 *fdout = pin[1];
|
/external/openssh/ |
scp.c | 231 int pin[2], pout[2], reserved[2]; local 247 if (pipe(pin) < 0) 264 close(pin[1]); 266 dup2(pin[0], 0); 268 close(pin[0]); 287 close(pin[0]); 288 *fdout = pin[1];
|
ssh-agent.c | 703 char *provider = NULL, *pin; local 710 pin = buffer_get_string(&e->request, NULL); 729 count = pkcs11_add_provider(provider, pin, &keys); 750 if (pin) 751 xfree(pin); 764 char *provider = NULL, *pin = NULL; local 770 pin = buffer_get_string(&e->request, NULL); 771 xfree(pin); [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_tls_common.c | 83 params->pin = config->pin; 104 params->pin = config->pin2; 181 * At this point with the pkcs11 engine the PIN might be wrong. 182 * We reset the PIN in the configuration to be sure to not use 185 os_free(config->pin); 186 config->pin = NULL; 190 * We do not know exactly but maybe the PIN was wrong, 193 os_free(config->pin); 194 config->pin = NULL [all...] |
eap_tls.c | 55 "PIN"); 128 * PIN. It may be wrong, we cannot be sure but trying 132 os_free(config->pin); 133 config->pin = NULL;
|
/external/chromium_org/remoting/host/setup/ |
native_messaging_host.cc | 217 std::string pin; local 218 if (!message.GetString("pin", &pin)) { 219 LOG(ERROR) << "'pin' not found: " << message; 222 response->SetString("hash", remoting::MakeHostPinHash(host_id, pin));
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/sip/ |
SipCommandInterface.java | 47 public void supplyIccPin(String pin, Message result) { 55 public void supplyIccPin2(String pin, Message result) { 515 public void supplyIccPinForApp(String pin, String aid, Message response) {
|
/external/chromium_org/remoting/client/plugin/ |
chromoting_instance.h | 199 void OnPinFetched(const std::string& pin); 226 // Uses the PIN request dialog in the webapp to obtain the shared secret. 257 // PIN Fetcher.
|
/external/chromium_org/remoting/webapp/ |
event_handlers.js | 76 { event: 'click', id: 'change-daemon-pin', 84 { event: 'click', id: 'daemon-pin-cancel', fn: goHome },
|
host_plugin_proto.js | 34 * @param {string} pin The PIN. 38 remoting.HostPlugin.prototype.getPinHash = function(hostId, pin, callback) {};
|
host_dispatcher.js | 130 * @param {string} pin 136 function(hostId, pin, onDone, onError) { 140 this.getPinHash.bind(this, hostId, pin, onDone, onError)); 143 this.nativeMessagingHost_.getPinHash(hostId, pin, onDone, onError); 147 this.npapiHost_.getPinHash(hostId, pin, onDone);
|
/external/wpa_supplicant_8/src/crypto/ |
tls.h | 115 * @ppin: pointer to the pin variable in the configuration 154 const char *pin; member in struct:tls_connection_params 247 * TLS_SET_PARAMS_ENGINE_PRV_INIT_FAILED (-2) on possible PIN error causing 261 * TLS_SET_PARAMS_ENGINE_PRV_INIT_FAILED (-2) on possible PIN error causing
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/uicc/ |
IccCardProxy.java | 427 * Locked state have a reason (PIN, PUK, NETWORK, PERM_DISABLED) 535 public void supplyPin(String pin, Message onComplete) { 538 mUiccApplication.supplyPin(pin, onComplete); 591 public void supplyNetworkDepersonalization(String pin, Message onComplete) { 594 mUiccApplication.supplyNetworkDepersonalization(pin, onComplete);
|
UiccCardApplication.java | 517 * Supply the ICC PIN to the ICC 527 * If the supplied PIN is incorrect: 536 public void supplyPin (String pin, Message onComplete) { 538 mCi.supplyIccPin(pin, onComplete); 560 public void supplyNetworkDepersonalization (String pin, Message onComplete) { 563 mCi.supplyNetworkDepersonalization(pin, onComplete); 568 * Check whether ICC pin lock is enabled 569 * This is a sync call which returns the cached pin enabled state 588 * This is a sync call which returns the cached pin enabled state 600 * Set the ICC pin lock enabled or disable [all...] |
/frameworks/rs/driver/runtime/ |
rs_allocation.c | 274 const uchar *pin = (const uchar *)alloc->mHal.drvState.lod[1].mallocPtr; local 276 return pin[((x >> shift) * cstep) + ((y >> shift) * stride)]; 288 const uchar *pin = (const uchar *)alloc->mHal.drvState.lod[2].mallocPtr; local 290 return pin[((x >> shift) * cstep) + ((y >> shift) * stride)];
|
/hardware/libhardware/include/hardware/ |
bluetooth.h | 92 uint8_t pin[16]; member in struct:__anon32819
|
/packages/services/Telephony/src/com/android/phone/ |
EnableFdnScreen.java | 84 mPin2Field = (EditText) findViewById(R.id.pin);
|
EnableIccPinScreen.java | 36 * UI to enable/disable the ICC PIN. 78 mPinField = (EditText) findViewById(R.id.pin);
|
/external/wpa_supplicant_8/src/ap/ |
wps_hostapd.c | 179 wpa_printf(MSG_DEBUG, "WPS: PIN needed for E-UUID %s", uuid); 663 wpa_printf(MSG_DEBUG, "WPS: Re-enable AP PIN"); 678 * Registrar failed to prove its knowledge of the AP PIN. Lock AP setup 684 wpa_printf(MSG_DEBUG, "WPS: AP PIN authentication failure number %u " 698 * In indefinite lockdown - disable automatic AP PIN 702 wpa_printf(MSG_DEBUG, "WPS: AP PIN disabled indefinitely"); 710 wpa_printf(MSG_DEBUG, "WPS: Disable AP PIN for %u seconds", 743 wpa_printf(MSG_DEBUG, "WPS: Clear consecutive AP PIN failure counter " 1272 const u8 *pin; member in struct:wps_add_pin_data 1584 unsigned int pin; local [all...] |
/external/chromium_org/chrome/browser/resources/options/chromeos/ |
bluetooth.css | 160 .bluetooth-keyboard-button.key-pin {
|
/frameworks/base/core/java/android/os/ |
UserManager.java | 643 * Sets a new challenge PIN for restrictions. This is only for use by pre-installed 645 * @param newPin the PIN to use for challenge dialogs. 646 * @return Returns true if the challenge PIN was set successfully. 652 Log.w(TAG, "Could not change restrictions pin"); 659 * @param pin The PIN to verify, or null to get the number of milliseconds to wait for before 660 * allowing the user to enter the PIN. 662 * you can accept another PIN, when the input is null or the input doesn't match the saved PIN. 663 * Returns {@link #PIN_VERIFICATION_SUCCESS} if the input matches the saved PIN. Return [all...] |
/external/chromium/chrome/browser/tabs/ |
tab_strip_model.cc | 121 bool pin = local 123 index = ConstrainInsertionIndex(index, pin); 136 data->pinned = pin; 882 bool pin = WillContextMenuPin(context_index); local 883 if (pin) { [all...] |
/external/chromium_org/chrome/browser/chromeos/cros/ |
network_library.cc | 85 // All *Pin(...) methods use internal callback that would update cellular 744 const std::string& slot, const std::string& pin) { 748 SetOrClearStringProperty(flimflam::kOpenVPNPinProperty, pin, NULL); 752 SetOrClearStringProperty(flimflam::kL2tpIpsecPinProperty, pin, NULL); [all...] |
/external/chromium_org/chrome/browser/ui/tabs/ |
tab_strip_model.cc | 159 bool pin = extensions_tab_helper->is_app() || add_types & ADD_PINNED; local 160 index = ConstrainInsertionIndex(index, pin); 173 data->pinned = pin; 883 bool pin = WillContextMenuPin(context_index); local 884 if (pin) { [all...] |