/external/qemu/telephony/ |
android_modem.c | 1817 char pin[5]; local [all...] |
/external/chromium_org/remoting/webapp/ |
client_plugin_async.js | 411 * @param {string} sharedSecret The access code for IT2Me or the PIN 563 * Called when a PIN is obtained from the user. 565 * @param {string} pin The PIN. 568 function(pin) { 573 { method: 'onPinFetched', data: { pin: pin }})); 577 * Tells the plugin to ask for the PIN asynchronously. 602 * Request pairing with the host for PIN-less authentication.
|
host_native_messaging.js | 404 * Calculates PIN hash value to be stored in the config, passing the resulting 408 * @param {string} pin The PIN. 415 function(hostId, pin, onDone, onError) { 419 pin: pin
|
ui_mode.js | 33 CLIENT_PIN_PROMPT: 'home.client.pin-prompt', 46 HOST_SETUP_ASK_PIN: 'home.host-setup.ask-pin',
|
/external/clang/lib/StaticAnalyzer/Core/ |
RangeConstraintManager.cpp | 149 bool pin(llvm::APSInt &Lower, llvm::APSInt &Upper) const { function in class:__anon16199::RangeSet 173 // The range starts below what's possible but ends within it. Pin. 178 // The range spans all possible values for the symbol. Pin. 197 // The range starts within what's possible but ends above it. Pin. 240 if (!pin(Lower, Upper))
|
/external/openssh/ |
authfd.c | 631 const char *reader_id, const char *pin, u_int life, u_int confirm) 646 buffer_put_cstring(&msg, pin);
|
sftp.c | 2012 int pin[2], pout[2]; local [all...] |
pkcs11.h | 749 (ck_slot_id_t slot_id, unsigned char *pin, 752 (ck_session_handle_t session, unsigned char *pin, 780 unsigned char *pin, unsigned long pin_len)); [all...] |
/frameworks/base/wifi/java/android/net/wifi/ |
WifiManager.java | [all...] |
/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
CommandsInterface.java | 568 * Supply the ICC PIN to the ICC card 582 void supplyIccPin(String pin, Message result); 585 * Supply the PIN for the app with this AID on the ICC card 601 void supplyIccPinForApp(String pin, String aid, Message result); 621 * Supply the PUK, new pin for the app with this AID on the ICC card [all...] |
RIL.java | 661 supplyIccPin(String pin, Message result) { 662 supplyIccPinForApp(pin, null, result); 666 supplyIccPinForApp(String pin, String aid, Message result) { 674 rr.mParcel.writeString(pin); 702 supplyIccPin2(String pin, Message result) { 703 supplyIccPin2ForApp(pin, null, result); 707 supplyIccPin2ForApp(String pin, String aid, Message result) { 715 rr.mParcel.writeString(pin); [all...] |
/frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/gsm/ |
UsimDataDownloadCommands.java | 165 public void supplyIccPin(String pin, Message result) { 169 public void supplyIccPinForApp(String pin, String aid, Message result) {
|
/external/chromium_org/remoting/android/java/src/org/chromium/chromoting/jni/ |
JniInterface.java | 195 /** Prompts the user to enter a PIN. Called on the UI thread. */ 218 Log.i("jniiface", "User provided a PIN code"); 228 Log.i("jniiface", "User canceled pin entry prompt"); 261 /** Performs the native response to the user's PIN. */ 262 private static native void nativeAuthenticationResponse(String pin, boolean createPair);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
p2p_supplicant.h | 24 const char *pin, enum p2p_wps_method wps_method,
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/sound/ |
soc-dapm.h | 208 char *pin, int status); 213 snd_soc_dapm_input = 0, /* input pin */ 214 snd_soc_dapm_output, /* output pin */ 266 unsigned char connected:1; /* connected codec pin */
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/sound/ |
soc-dapm.h | 208 char *pin, int status); 213 snd_soc_dapm_input = 0, /* input pin */ 214 snd_soc_dapm_output, /* output pin */ 266 unsigned char connected:1; /* connected codec pin */
|
/external/chromium_org/remoting/client/plugin/ |
chromoting_instance.cc | 832 std::string pin; local 833 if (!data.GetString("pin", &pin)) { 838 secret_fetched_callback_.Run(pin); [all...] |
/external/qemu-pc-bios/bochs/bios/ |
rombios32.c | 782 pin. We could also use the bus number to have a more precise 935 int i, pin, pic_irq, vendor_id, device_id; local 1013 pin = pci_config_readb(d, PCI_INTERRUPT_PIN); 1014 if (pin != 0) { 1015 pin = pci_slot_get_pirq(d, pin - 1); 1016 pic_irq = pci_irqs[pin]; [all...] |
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_new_handlers_p2p.c | 434 char *pin = NULL; local 478 else if (!os_strcmp(entry.str_value, "pin")) 486 } else if (!os_strcmp(entry.key, "pin") && 488 pin = os_strdup(entry.str_value); 501 * Validate the wps_method specified and the pin value. 503 if ((!pin || !pin[0]) && (wps_method == WPS_PIN_KEYPAD)) 506 new_pin = wpas_p2p_connect(wpa_s, addr, pin, wps_method, 548 os_free(pin); [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_wsc.c | 123 wpa_printf(MSG_DEBUG, "EAP-WSC: No AP PIN (password) " 127 cfg.pin = sm->user->password;
|
/external/wpa_supplicant_8/src/wps/ |
wps_er.c | [all...] |
/external/chromium/chrome/browser/chromeos/cros/ |
network_library.h | 113 // requires user to enter PIN. 114 // SIM_PIN_NOT_REQUIRED - SIM card is unlocked all the time and requires PIN 122 // Any PIN operation result (EnterPin, UnblockPin etc.). 126 PIN_ERROR_INCORRECT_CODE = 2, // Either PIN/PUK specified is incorrect. 127 PIN_ERROR_BLOCKED = 3, // No more PIN retries left, SIM is blocked. 910 // Called when pin async operation has completed. [all...] |
network_library.cc | 80 // All *Pin(...) methods use internal callback that would update cellular 174 const char* kSIMLockPin = "sim-pin"; 253 const char* kEapPinProperty = "EAP.PIN"; 317 const char* kErrorPinMissing = "pin-missing"; 2481 << " pin: " << pin; local [all...] |
/external/chromium_org/remoting/host/plugin/ |
host_script_object.cc | 630 SetException("getPinHash: bad pin parameter"); 633 std::string pin = StringFromNPVariant(args[1]); local 642 remoting::MakeHostPinHash(host_id, pin)); [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap.c | 321 * entering of PIN code or passphrase to retry the 324 wpa_printf(MSG_DEBUG, "EAP: Pending PIN/passphrase " 1067 if (scard_set_pin(sm->scard_ctx, conf->pin)) { 1069 * Make sure the same PIN is not tried again in order to avoid 1072 os_free(conf->pin); 1073 conf->pin = NULL; 1075 wpa_printf(MSG_WARNING, "PIN validation failed"); [all...] |