HomeSort by relevance Sort by last modified time
    Searched refs:pin (Results 126 - 150 of 233) sorted by null

1 2 3 4 56 7 8 910

  /packages/apps/Bluetooth/src/com/android/bluetooth/btservice/
RemoteDevices.java 225 private void sendDisplayPinIntent(byte[] address, int pin) {
228 intent.putExtra(BluetoothDevice.EXTRA_PAIRING_KEY, pin);
339 // the spec recommendation, check if the keyboard has a fixed PIN zero
341 //TODO: Add sFixedPinZerosAutoPairKeyboard() and maintain list of devices that have fixed pin
346 // Generate a variable PIN. This is not truly random but good enough.
347 int pin = (int) Math.floor(Math.random() * 1000000); local
348 sendDisplayPinIntent(address, pin);
  /packages/services/Telephony/src/com/android/phone/
FdnSetting.java 50 * The first is used for toggling FDN enable, the second for the PIN change.
56 // We only care about the pin preferences here, the manage FDN contacts
84 // size limits for the pin.
108 // validate the pin first, before submitting it to the RIL for FDN enable.
118 // throw up error if the pin is invalid.
126 * Attempt to change the pin.
144 // 1. Enter old pin
145 // 2. Enter new pin
146 // 3. Re-Enter new pin
156 // if the pin is not valid, display a message and reset the state
    [all...]
  /frameworks/base/wifi/java/android/net/wifi/p2p/
WifiP2pService.java 1832 String pin = mWifiNative.startWpsPinDisplay(mGroup.getInterface()); local
2139 final EditText pin = (EditText) textEntryView.findViewById(R.id.wifi_p2p_wps_pin); local
2311 String pin = mWifiNative.p2pConnect(config, dev.isGroupOwner()); local
    [all...]
  /cts/tests/tests/opengl/src/android/opengl/cts/
RendererOneColorBufferTest.java 213 int [] pin = pinbuffer.array(); local
214 int pixel = pin[0];
  /external/openssh/
ssh-pkcs11-client.c 183 pkcs11_add_provider(char *name, char *pin, Key ***keysp)
197 buffer_put_cstring(&msg, pin);
sshconnect.c 88 int pin[2], pout[2]; local
111 if (pipe(pin) < 0 || pipe(pout) < 0)
125 close(pin[1]);
126 if (pin[0] != 0) {
127 if (dup2(pin[0], 0) < 0)
129 close(pin[0]);
134 /* Cannot be 1 because pin allocated two descriptors. */
158 close(pin[0]);
165 packet_set_connection(pout[0], pin[1]);
    [all...]
session.c 453 int pin[2], pout[2], perr[2]; local
459 if (pipe(pin) < 0) {
465 close(pin[0]);
466 close(pin[1]);
472 close(pin[0]);
473 close(pin[1]);
505 close(pin[0]);
506 close(pin[1]);
537 close(pin[1]);
538 if (dup2(pin[0], 0) < 0
    [all...]
scp.c 231 int pin[2], pout[2], reserved[2]; local
247 if (pipe(pin) < 0)
264 close(pin[1]);
266 dup2(pin[0], 0);
268 close(pin[0]);
287 close(pin[0]);
288 *fdout = pin[1];
  /frameworks/base/packages/Keyguard/src/com/android/keyguard/
KeyguardSimPinView.java 43 * Displays a PIN pad for unlocking.
88 // SIM PIN doesn't have a timed lockout
112 // The delete button is of the PIN keyboard itself in some (e.g. tablet) layouts,
164 protected CheckSimPin(String pin) {
165 mPin = pin;
258 // "PIN operation failed!" - no idea what this was and no way to
  /frameworks/base/telephony/java/android/telephony/
TelephonyManager.java 822 * between states. For example, when the user inputs the SIM pin
828 /** SIM card state: Locked: requires the user's SIM PIN to unlock */
832 /** SIM card state: Locked: requries a network PIN to unlock */
    [all...]
  /frameworks/base/core/tests/bluetoothtests/src/android/bluetooth/
BluetoothTestUtils.java 153 public PairReceiver(BluetoothDevice device, int passkey, byte[] pin, int expectedFlags) {
158 mPin = pin;
742 * @param pin The pairing pin if pairing requires a pin. Any value if not.
744 public void pair(BluetoothAdapter adapter, BluetoothDevice device, int passkey, byte[] pin) {
745 pairOrAcceptPair(adapter, device, passkey, pin, true);
755 * @param pin The pairing pin if pairing requires a pin. Any value if not
    [all...]
  /external/bluetooth/bluedroid/btif/src/
btif_dm.c 639 ** Description Executes pin request event in btif context
683 pin_code.pin[0] = 0x30;
684 pin_code.pin[1] = 0x30;
685 pin_code.pin[2] = 0x30;
686 pin_code.pin[3] = 0x30;
689 BTA_DmPinReply( (UINT8*)bd_addr.address, TRUE, 4, pin_code.pin);
700 pin_code.pin[0] = 0x30;
701 pin_code.pin[1] = 0x30;
702 pin_code.pin[2] = 0x30;
703 pin_code.pin[3] = 0x30
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
wps_supplicant.c 64 wpa_printf(MSG_DEBUG, "WPS: PIN registration with " MACSTR
1090 const char *pin, int p2p_group, u16 dev_pw_id)
1114 if (pin)
1115 os_snprintf(val, sizeof(val), "\"pin=%s dev_pw_id=%u\"",
1116 pin, dev_pw_id);
1119 os_snprintf(val, sizeof(val), "\"pin=%08d dev_pw_id=%u\"",
1134 /* Cancel the wps pbc/pin requests */
1639 unsigned int pbc = 0, auth = 0, pin = 0, wps = 0; local
    [all...]
  /external/chromium_org/third_party/skia/src/effects/
SkColorFilters.cpp 541 static inline unsigned pin(unsigned value, unsigned max) { function
567 unsigned r = pin(SkAlphaMul(SkGetPackedR32(c), scaleR) + SkAlphaMul(addR, scaleA), a);
568 unsigned g = pin(SkAlphaMul(SkGetPackedG32(c), scaleG) + SkAlphaMul(addG, scaleA), a);
569 unsigned b = pin(SkAlphaMul(SkGetPackedB32(c), scaleB) + SkAlphaMul(addB, scaleA), a);
621 unsigned r = pin(SkGetPackedR32(c) + SkAlphaMul(addR, scaleA), a);
622 unsigned g = pin(SkGetPackedG32(c) + SkAlphaMul(addG, scaleA), a);
623 unsigned b = pin(SkGetPackedB32(c) + SkAlphaMul(addB, scaleA), a);
  /external/dropbear/
scp.c 171 int pin[2], pout[2], reserved[2]; local
186 if (pipe(pin) < 0)
214 close(pin[1]);
216 dup2(pin[0], 0);
218 close(pin[0]);
256 close(pin[0]);
257 *fdout = pin[1];
  /external/skia/src/effects/
SkColorFilters.cpp 541 static inline unsigned pin(unsigned value, unsigned max) { function
567 unsigned r = pin(SkAlphaMul(SkGetPackedR32(c), scaleR) + SkAlphaMul(addR, scaleA), a);
568 unsigned g = pin(SkAlphaMul(SkGetPackedG32(c), scaleG) + SkAlphaMul(addG, scaleA), a);
569 unsigned b = pin(SkAlphaMul(SkGetPackedB32(c), scaleB) + SkAlphaMul(addB, scaleA), a);
621 unsigned r = pin(SkGetPackedR32(c) + SkAlphaMul(addR, scaleA), a);
622 unsigned g = pin(SkGetPackedG32(c) + SkAlphaMul(addG, scaleA), a);
623 unsigned b = pin(SkGetPackedB32(c) + SkAlphaMul(addB, scaleA), a);
  /external/wpa_supplicant_8/src/eap_peer/
eap_tls_common.c 83 params->pin = config->pin;
104 params->pin = config->pin2;
181 * At this point with the pkcs11 engine the PIN might be wrong.
182 * We reset the PIN in the configuration to be sure to not use
185 os_free(config->pin);
186 config->pin = NULL;
190 * We do not know exactly but maybe the PIN was wrong,
193 os_free(config->pin);
194 config->pin = NULL
    [all...]
  /external/chromium_org/remoting/host/setup/
me2me_native_messaging_host.cc 212 std::string pin; local
213 if (!message.GetString("pin", &pin)) {
214 LOG(ERROR) << "'pin' not found: " << message;
217 response->SetString("hash", MakeHostPinHash(host_id, pin));
  /frameworks/opt/telephony/src/java/com/android/internal/telephony/sip/
SipCommandInterface.java 46 public void supplyIccPin(String pin, Message result) {
54 public void supplyIccPin2(String pin, Message result) {
514 public void supplyIccPinForApp(String pin, String aid, Message response) {
  /external/chromium_org/chrome/common/extensions/docs/server2/
host_file_system_provider.py 53 |revision| if non-None determines a specific revision to pin the host file
  /external/chromium_org/remoting/webapp/
event_handlers.js 81 { event: 'click', id: 'change-daemon-pin',
89 { event: 'click', id: 'daemon-pin-cancel', fn: goHome },
host_plugin_proto.js 34 * @param {string} pin The PIN.
38 remoting.HostPlugin.prototype.getPinHash = function(hostId, pin, callback) {};
  /external/wpa_supplicant_8/src/crypto/
tls.h 115 * @ppin: pointer to the pin variable in the configuration
154 const char *pin; member in struct:tls_connection_params
247 * TLS_SET_PARAMS_ENGINE_PRV_INIT_FAILED (-2) on possible PIN error causing
261 * TLS_SET_PARAMS_ENGINE_PRV_INIT_FAILED (-2) on possible PIN error causing
  /frameworks/opt/telephony/src/java/com/android/internal/telephony/uicc/
IccCardProxy.java 427 * Locked state have a reason (PIN, PUK, NETWORK, PERM_DISABLED)
535 public void supplyPin(String pin, Message onComplete) {
538 mUiccApplication.supplyPin(pin, onComplete);
591 public void supplyNetworkDepersonalization(String pin, Message onComplete) {
594 mUiccApplication.supplyNetworkDepersonalization(pin, onComplete);
UiccCardApplication.java 368 // a PIN/PUK/PIN2/PUK2 complete
573 * Supply the ICC PIN to the ICC
584 * If the supplied PIN is incorrect:
591 public void supplyPin (String pin, Message onComplete) {
593 mCi.supplyIccPinForApp(pin, mAid, mHandler.obtainMessage(EVENT_PIN1_PUK1_DONE,
611 * If the supplied PIN is incorrect:
641 public void supplyNetworkDepersonalization (String pin, Message onComplete) {
644 mCi.supplyNetworkDepersonalization(pin, onComplete);
649 * Check whether ICC pin lock is enabled
650 * This is a sync call which returns the cached pin enabled stat
    [all...]

Completed in 862 milliseconds

1 2 3 4 56 7 8 910