HomeSort by relevance Sort by last modified time
    Searched refs:pin (Results 176 - 200 of 233) sorted by null

1 2 3 4 5 6 78 910

  /external/qemu/telephony/
android_modem.c 1817 char pin[5]; local
    [all...]
  /external/chromium_org/remoting/webapp/
client_plugin_async.js 411 * @param {string} sharedSecret The access code for IT2Me or the PIN
563 * Called when a PIN is obtained from the user.
565 * @param {string} pin The PIN.
568 function(pin) {
573 { method: 'onPinFetched', data: { pin: pin }}));
577 * Tells the plugin to ask for the PIN asynchronously.
602 * Request pairing with the host for PIN-less authentication.
host_native_messaging.js 404 * Calculates PIN hash value to be stored in the config, passing the resulting
408 * @param {string} pin The PIN.
415 function(hostId, pin, onDone, onError) {
419 pin: pin
ui_mode.js 33 CLIENT_PIN_PROMPT: 'home.client.pin-prompt',
46 HOST_SETUP_ASK_PIN: 'home.host-setup.ask-pin',
  /external/clang/lib/StaticAnalyzer/Core/
RangeConstraintManager.cpp 149 bool pin(llvm::APSInt &Lower, llvm::APSInt &Upper) const { function in class:__anon16199::RangeSet
173 // The range starts below what's possible but ends within it. Pin.
178 // The range spans all possible values for the symbol. Pin.
197 // The range starts within what's possible but ends above it. Pin.
240 if (!pin(Lower, Upper))
  /external/openssh/
authfd.c 631 const char *reader_id, const char *pin, u_int life, u_int confirm)
646 buffer_put_cstring(&msg, pin);
sftp.c 2012 int pin[2], pout[2]; local
    [all...]
pkcs11.h 749 (ck_slot_id_t slot_id, unsigned char *pin,
752 (ck_session_handle_t session, unsigned char *pin,
780 unsigned char *pin, unsigned long pin_len));
    [all...]
  /frameworks/base/wifi/java/android/net/wifi/
WifiManager.java     [all...]
  /frameworks/opt/telephony/src/java/com/android/internal/telephony/
CommandsInterface.java 568 * Supply the ICC PIN to the ICC card
582 void supplyIccPin(String pin, Message result);
585 * Supply the PIN for the app with this AID on the ICC card
601 void supplyIccPinForApp(String pin, String aid, Message result);
621 * Supply the PUK, new pin for the app with this AID on the ICC card
    [all...]
RIL.java 661 supplyIccPin(String pin, Message result) {
662 supplyIccPinForApp(pin, null, result);
666 supplyIccPinForApp(String pin, String aid, Message result) {
674 rr.mParcel.writeString(pin);
702 supplyIccPin2(String pin, Message result) {
703 supplyIccPin2ForApp(pin, null, result);
707 supplyIccPin2ForApp(String pin, String aid, Message result) {
715 rr.mParcel.writeString(pin);
    [all...]
  /frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/gsm/
UsimDataDownloadCommands.java 165 public void supplyIccPin(String pin, Message result) {
169 public void supplyIccPinForApp(String pin, String aid, Message result) {
  /external/chromium_org/remoting/android/java/src/org/chromium/chromoting/jni/
JniInterface.java 195 /** Prompts the user to enter a PIN. Called on the UI thread. */
218 Log.i("jniiface", "User provided a PIN code");
228 Log.i("jniiface", "User canceled pin entry prompt");
261 /** Performs the native response to the user's PIN. */
262 private static native void nativeAuthenticationResponse(String pin, boolean createPair);
  /external/wpa_supplicant_8/wpa_supplicant/
p2p_supplicant.h 24 const char *pin, enum p2p_wps_method wps_method,
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/sound/
soc-dapm.h 208 char *pin, int status);
213 snd_soc_dapm_input = 0, /* input pin */
214 snd_soc_dapm_output, /* output pin */
266 unsigned char connected:1; /* connected codec pin */
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/sound/
soc-dapm.h 208 char *pin, int status);
213 snd_soc_dapm_input = 0, /* input pin */
214 snd_soc_dapm_output, /* output pin */
266 unsigned char connected:1; /* connected codec pin */
  /external/chromium_org/remoting/client/plugin/
chromoting_instance.cc 832 std::string pin; local
833 if (!data.GetString("pin", &pin)) {
838 secret_fetched_callback_.Run(pin);
    [all...]
  /external/qemu-pc-bios/bochs/bios/
rombios32.c 782 pin. We could also use the bus number to have a more precise
935 int i, pin, pic_irq, vendor_id, device_id; local
1013 pin = pci_config_readb(d, PCI_INTERRUPT_PIN);
1014 if (pin != 0) {
1015 pin = pci_slot_get_pirq(d, pin - 1);
1016 pic_irq = pci_irqs[pin];
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/dbus/
dbus_new_handlers_p2p.c 434 char *pin = NULL; local
478 else if (!os_strcmp(entry.str_value, "pin"))
486 } else if (!os_strcmp(entry.key, "pin") &&
488 pin = os_strdup(entry.str_value);
501 * Validate the wps_method specified and the pin value.
503 if ((!pin || !pin[0]) && (wps_method == WPS_PIN_KEYPAD))
506 new_pin = wpas_p2p_connect(wpa_s, addr, pin, wps_method,
548 os_free(pin);
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_wsc.c 123 wpa_printf(MSG_DEBUG, "EAP-WSC: No AP PIN (password) "
127 cfg.pin = sm->user->password;
  /external/wpa_supplicant_8/src/wps/
wps_er.c     [all...]
  /external/chromium/chrome/browser/chromeos/cros/
network_library.h 113 // requires user to enter PIN.
114 // SIM_PIN_NOT_REQUIRED - SIM card is unlocked all the time and requires PIN
122 // Any PIN operation result (EnterPin, UnblockPin etc.).
126 PIN_ERROR_INCORRECT_CODE = 2, // Either PIN/PUK specified is incorrect.
127 PIN_ERROR_BLOCKED = 3, // No more PIN retries left, SIM is blocked.
910 // Called when pin async operation has completed.
    [all...]
network_library.cc 80 // All *Pin(...) methods use internal callback that would update cellular
174 const char* kSIMLockPin = "sim-pin";
253 const char* kEapPinProperty = "EAP.PIN";
317 const char* kErrorPinMissing = "pin-missing";
2481 << " pin: " << pin; local
    [all...]
  /external/chromium_org/remoting/host/plugin/
host_script_object.cc 630 SetException("getPinHash: bad pin parameter");
633 std::string pin = StringFromNPVariant(args[1]); local
642 remoting::MakeHostPinHash(host_id, pin));
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap.c 321 * entering of PIN code or passphrase to retry the
324 wpa_printf(MSG_DEBUG, "EAP: Pending PIN/passphrase "
1067 if (scard_set_pin(sm->scard_ctx, conf->pin)) {
1069 * Make sure the same PIN is not tried again in order to avoid
1072 os_free(conf->pin);
1073 conf->pin = NULL;
1075 wpa_printf(MSG_WARNING, "PIN validation failed");
    [all...]

Completed in 922 milliseconds

1 2 3 4 5 6 78 910