/packages/apps/Bluetooth/src/com/android/bluetooth/btservice/ |
RemoteDevices.java | 225 private void sendDisplayPinIntent(byte[] address, int pin) { 228 intent.putExtra(BluetoothDevice.EXTRA_PAIRING_KEY, pin); 339 // the spec recommendation, check if the keyboard has a fixed PIN zero 341 //TODO: Add sFixedPinZerosAutoPairKeyboard() and maintain list of devices that have fixed pin 346 // Generate a variable PIN. This is not truly random but good enough. 347 int pin = (int) Math.floor(Math.random() * 1000000); local 348 sendDisplayPinIntent(address, pin);
|
/packages/services/Telephony/src/com/android/phone/ |
FdnSetting.java | 50 * The first is used for toggling FDN enable, the second for the PIN change. 56 // We only care about the pin preferences here, the manage FDN contacts 84 // size limits for the pin. 108 // validate the pin first, before submitting it to the RIL for FDN enable. 118 // throw up error if the pin is invalid. 126 * Attempt to change the pin. 144 // 1. Enter old pin 145 // 2. Enter new pin 146 // 3. Re-Enter new pin 156 // if the pin is not valid, display a message and reset the state [all...] |
/frameworks/base/wifi/java/android/net/wifi/p2p/ |
WifiP2pService.java | 1832 String pin = mWifiNative.startWpsPinDisplay(mGroup.getInterface()); local 2139 final EditText pin = (EditText) textEntryView.findViewById(R.id.wifi_p2p_wps_pin); local 2311 String pin = mWifiNative.p2pConnect(config, dev.isGroupOwner()); local [all...] |
/cts/tests/tests/opengl/src/android/opengl/cts/ |
RendererOneColorBufferTest.java | 213 int [] pin = pinbuffer.array(); local 214 int pixel = pin[0];
|
/external/openssh/ |
ssh-pkcs11-client.c | 183 pkcs11_add_provider(char *name, char *pin, Key ***keysp) 197 buffer_put_cstring(&msg, pin);
|
sshconnect.c | 88 int pin[2], pout[2]; local 111 if (pipe(pin) < 0 || pipe(pout) < 0) 125 close(pin[1]); 126 if (pin[0] != 0) { 127 if (dup2(pin[0], 0) < 0) 129 close(pin[0]); 134 /* Cannot be 1 because pin allocated two descriptors. */ 158 close(pin[0]); 165 packet_set_connection(pout[0], pin[1]); [all...] |
session.c | 453 int pin[2], pout[2], perr[2]; local 459 if (pipe(pin) < 0) { 465 close(pin[0]); 466 close(pin[1]); 472 close(pin[0]); 473 close(pin[1]); 505 close(pin[0]); 506 close(pin[1]); 537 close(pin[1]); 538 if (dup2(pin[0], 0) < 0 [all...] |
scp.c | 231 int pin[2], pout[2], reserved[2]; local 247 if (pipe(pin) < 0) 264 close(pin[1]); 266 dup2(pin[0], 0); 268 close(pin[0]); 287 close(pin[0]); 288 *fdout = pin[1];
|
/frameworks/base/packages/Keyguard/src/com/android/keyguard/ |
KeyguardSimPinView.java | 43 * Displays a PIN pad for unlocking. 88 // SIM PIN doesn't have a timed lockout 112 // The delete button is of the PIN keyboard itself in some (e.g. tablet) layouts, 164 protected CheckSimPin(String pin) { 165 mPin = pin; 258 // "PIN operation failed!" - no idea what this was and no way to
|
/frameworks/base/telephony/java/android/telephony/ |
TelephonyManager.java | 822 * between states. For example, when the user inputs the SIM pin 828 /** SIM card state: Locked: requires the user's SIM PIN to unlock */ 832 /** SIM card state: Locked: requries a network PIN to unlock */ [all...] |
/frameworks/base/core/tests/bluetoothtests/src/android/bluetooth/ |
BluetoothTestUtils.java | 153 public PairReceiver(BluetoothDevice device, int passkey, byte[] pin, int expectedFlags) { 158 mPin = pin; 742 * @param pin The pairing pin if pairing requires a pin. Any value if not. 744 public void pair(BluetoothAdapter adapter, BluetoothDevice device, int passkey, byte[] pin) { 745 pairOrAcceptPair(adapter, device, passkey, pin, true); 755 * @param pin The pairing pin if pairing requires a pin. Any value if not [all...] |
/external/bluetooth/bluedroid/btif/src/ |
btif_dm.c | 639 ** Description Executes pin request event in btif context 683 pin_code.pin[0] = 0x30; 684 pin_code.pin[1] = 0x30; 685 pin_code.pin[2] = 0x30; 686 pin_code.pin[3] = 0x30; 689 BTA_DmPinReply( (UINT8*)bd_addr.address, TRUE, 4, pin_code.pin); 700 pin_code.pin[0] = 0x30; 701 pin_code.pin[1] = 0x30; 702 pin_code.pin[2] = 0x30; 703 pin_code.pin[3] = 0x30 [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
wps_supplicant.c | 64 wpa_printf(MSG_DEBUG, "WPS: PIN registration with " MACSTR 1090 const char *pin, int p2p_group, u16 dev_pw_id) 1114 if (pin) 1115 os_snprintf(val, sizeof(val), "\"pin=%s dev_pw_id=%u\"", 1116 pin, dev_pw_id); 1119 os_snprintf(val, sizeof(val), "\"pin=%08d dev_pw_id=%u\"", 1134 /* Cancel the wps pbc/pin requests */ 1639 unsigned int pbc = 0, auth = 0, pin = 0, wps = 0; local [all...] |
/external/chromium_org/third_party/skia/src/effects/ |
SkColorFilters.cpp | 541 static inline unsigned pin(unsigned value, unsigned max) { function 567 unsigned r = pin(SkAlphaMul(SkGetPackedR32(c), scaleR) + SkAlphaMul(addR, scaleA), a); 568 unsigned g = pin(SkAlphaMul(SkGetPackedG32(c), scaleG) + SkAlphaMul(addG, scaleA), a); 569 unsigned b = pin(SkAlphaMul(SkGetPackedB32(c), scaleB) + SkAlphaMul(addB, scaleA), a); 621 unsigned r = pin(SkGetPackedR32(c) + SkAlphaMul(addR, scaleA), a); 622 unsigned g = pin(SkGetPackedG32(c) + SkAlphaMul(addG, scaleA), a); 623 unsigned b = pin(SkGetPackedB32(c) + SkAlphaMul(addB, scaleA), a);
|
/external/dropbear/ |
scp.c | 171 int pin[2], pout[2], reserved[2]; local 186 if (pipe(pin) < 0) 214 close(pin[1]); 216 dup2(pin[0], 0); 218 close(pin[0]); 256 close(pin[0]); 257 *fdout = pin[1];
|
/external/skia/src/effects/ |
SkColorFilters.cpp | 541 static inline unsigned pin(unsigned value, unsigned max) { function 567 unsigned r = pin(SkAlphaMul(SkGetPackedR32(c), scaleR) + SkAlphaMul(addR, scaleA), a); 568 unsigned g = pin(SkAlphaMul(SkGetPackedG32(c), scaleG) + SkAlphaMul(addG, scaleA), a); 569 unsigned b = pin(SkAlphaMul(SkGetPackedB32(c), scaleB) + SkAlphaMul(addB, scaleA), a); 621 unsigned r = pin(SkGetPackedR32(c) + SkAlphaMul(addR, scaleA), a); 622 unsigned g = pin(SkGetPackedG32(c) + SkAlphaMul(addG, scaleA), a); 623 unsigned b = pin(SkGetPackedB32(c) + SkAlphaMul(addB, scaleA), a);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_tls_common.c | 83 params->pin = config->pin; 104 params->pin = config->pin2; 181 * At this point with the pkcs11 engine the PIN might be wrong. 182 * We reset the PIN in the configuration to be sure to not use 185 os_free(config->pin); 186 config->pin = NULL; 190 * We do not know exactly but maybe the PIN was wrong, 193 os_free(config->pin); 194 config->pin = NULL [all...] |
/external/chromium_org/remoting/host/setup/ |
me2me_native_messaging_host.cc | 212 std::string pin; local 213 if (!message.GetString("pin", &pin)) { 214 LOG(ERROR) << "'pin' not found: " << message; 217 response->SetString("hash", MakeHostPinHash(host_id, pin));
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/sip/ |
SipCommandInterface.java | 46 public void supplyIccPin(String pin, Message result) { 54 public void supplyIccPin2(String pin, Message result) { 514 public void supplyIccPinForApp(String pin, String aid, Message response) {
|
/external/chromium_org/chrome/common/extensions/docs/server2/ |
host_file_system_provider.py | 53 |revision| if non-None determines a specific revision to pin the host file
|
/external/chromium_org/remoting/webapp/ |
event_handlers.js | 81 { event: 'click', id: 'change-daemon-pin', 89 { event: 'click', id: 'daemon-pin-cancel', fn: goHome },
|
host_plugin_proto.js | 34 * @param {string} pin The PIN. 38 remoting.HostPlugin.prototype.getPinHash = function(hostId, pin, callback) {};
|
/external/wpa_supplicant_8/src/crypto/ |
tls.h | 115 * @ppin: pointer to the pin variable in the configuration 154 const char *pin; member in struct:tls_connection_params 247 * TLS_SET_PARAMS_ENGINE_PRV_INIT_FAILED (-2) on possible PIN error causing 261 * TLS_SET_PARAMS_ENGINE_PRV_INIT_FAILED (-2) on possible PIN error causing
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/uicc/ |
IccCardProxy.java | 427 * Locked state have a reason (PIN, PUK, NETWORK, PERM_DISABLED) 535 public void supplyPin(String pin, Message onComplete) { 538 mUiccApplication.supplyPin(pin, onComplete); 591 public void supplyNetworkDepersonalization(String pin, Message onComplete) { 594 mUiccApplication.supplyNetworkDepersonalization(pin, onComplete);
|
UiccCardApplication.java | 368 // a PIN/PUK/PIN2/PUK2 complete 573 * Supply the ICC PIN to the ICC 584 * If the supplied PIN is incorrect: 591 public void supplyPin (String pin, Message onComplete) { 593 mCi.supplyIccPinForApp(pin, mAid, mHandler.obtainMessage(EVENT_PIN1_PUK1_DONE, 611 * If the supplied PIN is incorrect: 641 public void supplyNetworkDepersonalization (String pin, Message onComplete) { 644 mCi.supplyNetworkDepersonalization(pin, onComplete); 649 * Check whether ICC pin lock is enabled 650 * This is a sync call which returns the cached pin enabled stat [all...] |