/system/core/libcutils/ |
ashmem-dev.c | 77 struct ashmem_pin pin = { offset, len }; local 78 return ioctl(fd, ASHMEM_PIN, &pin); 83 struct ashmem_pin pin = { offset, len }; local 84 return ioctl(fd, ASHMEM_UNPIN, &pin);
|
/external/wpa_supplicant_8/wpa_supplicant/examples/p2p/ |
p2p_connect.py | 19 print " -a <addr> [-p <pin>] [-g <go_intent>] \ " 25 print " -p = pin number (8 digits)" 66 global pin 79 pin,wps_method,go_intent): 86 self.pin = pin 155 # Display requires a pin, and a go intent of 15 157 if (self.pin != None): 158 self.p2p_connect_arguements.update({'pin':self.pin}) 228 pin = None variable in class:P2P_Connect [all...] |
/external/qemu/telephony/ |
sim_card.c | 27 char pin[ A_SIM_PIN_SIZE+1 ]; member in struct:ASimCardRec_ 45 strncpy( card->pin, "0000", sizeof(card->pin) ); 79 return sim->pin; 89 asimcard_set_pin( ASimCard sim, const char* pin ) 91 strncpy( sim->pin, pin, A_SIM_PIN_SIZE ); 104 asimcard_check_pin( ASimCard sim, const char* pin ) 110 if ( !strcmp( sim->pin, pin ) ) { [all...] |
/frameworks/base/telephony/java/com/android/internal/telephony/ |
ITelephony.aidl | 134 * Check if the SIM pin lock is enabled. 135 * @return true if the SIM pin lock is enabled. 145 * Supply a pin to unlock the SIM. Blocks until a result is determined. 146 * @param pin The pin to check. 149 boolean supplyPin(String pin); 152 * Supply puk to unlock the SIM and set SIM pin to new pin. 155 * pin The new pin to be set in SI [all...] |
/external/chromium_org/third_party/skia/src/core/ |
SkDeviceProfile.cpp | 17 static float pin(float value, float min, float max) { function 28 fGammaExponent = pin(gammaExp, 0, 10); 29 fContrastScale = pin(contrast, 0, 1);
|
/external/skia/src/core/ |
SkDeviceProfile.cpp | 17 static float pin(float value, float min, float max) { function 28 fGammaExponent = pin(gammaExp, 0, 10); 29 fContrastScale = pin(contrast, 0, 1);
|
/frameworks/base/wifi/java/android/net/wifi/p2p/ |
WifiP2pProvDiscEvent.java | 44 public String pin; field in class:WifiP2pProvDiscEvent 55 * P2P-PROV-DISC-ENTER-PIN 42:fc:89:e1:e2:27 56 * P2P-PROV-DISC-SHOW-PIN 42:fc:89:e1:e2:27 44490607 70 else if (tokens[0].endsWith("ENTER-PIN")) event = ENTER_PIN; 71 else if (tokens[0].endsWith("SHOW-PIN")) event = SHOW_PIN; 79 pin = tokens[2]; 87 sbuf.append("\n pin: ").append(pin);
|
/libcore/crypto/src/main/java/org/conscrypt/ |
PinListEntry.java | 31 * This class represents a single entry in the pin file. 69 // entry must have a CN, an enforcement value, and at least one pin 71 throw new PinEntryException("Received malformed pin entry"); 91 * Checks the given chain against the pin list corresponding to this entry. 93 * If the pin list does not contain the required certs and the enforcing field is true then 120 for (String pin : pins) { 121 validatePin(pin); 126 private static void validatePin(String pin) { 128 if (pin.length() != 128) { 129 throw new IllegalArgumentException("Pin is not a valid length") [all...] |
/external/chromium_org/chrome/browser/ui/ |
browser_tabrestore.h | 30 // extension. If |pin| is true and |tab_index|/ is the last pinned tab, then 43 bool pin,
|
/external/chromium_org/remoting/host/ |
verify_config_window_win.cc | 109 // Get the PIN length. 111 scoped_ptr<char16[]> pin(new char16[pin_length + 1]); 113 // Get the PIN making sure it is NULL terminated even if an error occurs. 114 int result = pin_edit.GetWindowText(pin.get(), pin_length + 1); 115 pin[std::min(result, pin_length)] = 0; 117 return VerifyHostPinHash(host_secret_hash_, host_id_, UTF16ToUTF8(pin.get()));
|
/external/chromium_org/remoting/protocol/ |
pairing_client_authenticator.h | 32 const std::string& pin);
|
pairing_client_authenticator.cc | 51 // the host will accept the client id or request that we fall back to the PIN. 63 const std::string& pin) { 67 authentication_tag_, pin),
|
pairing_host_authenticator.h | 26 const std::string& pin);
|
/frameworks/rs/cpu_ref/ |
rsCpuIntrinsicConvolve5x5.cpp | 357 const uchar *pin = (const uchar *)cp->alloc->mHal.drvState.lod[0].mallocPtr; local 366 const uchar4 *py0 = (const uchar4 *)(pin + stride * y0); 367 const uchar4 *py1 = (const uchar4 *)(pin + stride * y1); 368 const uchar4 *py2 = (const uchar4 *)(pin + stride * y2); 369 const uchar4 *py3 = (const uchar4 *)(pin + stride * y3); 370 const uchar4 *py4 = (const uchar4 *)(pin + stride * y4); 406 const uchar *pin = (const uchar *)cp->alloc->mHal.drvState.lod[0].mallocPtr; local 415 const uchar2 *py0 = (const uchar2 *)(pin + stride * y0); 416 const uchar2 *py1 = (const uchar2 *)(pin + stride * y1); 417 const uchar2 *py2 = (const uchar2 *)(pin + stride * y2) 455 const uchar *pin = (const uchar *)cp->alloc->mHal.drvState.lod[0].mallocPtr; local 504 const uchar *pin = (const uchar *)cp->alloc->mHal.drvState.lod[0].mallocPtr; local 553 const uchar *pin = (const uchar *)cp->alloc->mHal.drvState.lod[0].mallocPtr; local 602 const uchar *pin = (const uchar *)cp->alloc->mHal.drvState.lod[0].mallocPtr; local [all...] |
/external/chromium_org/remoting/host/mac/ |
me2me_preference_pane.h | 81 pin:(NSString*)pin; 112 // Alert the user that the typed PIN is incorrect.
|
/external/wpa_supplicant_8/src/ap/ |
wps_hostapd.h | 20 const char *uuid, const char *pin, int timeout); 29 int hostapd_wps_ap_pin_set(struct hostapd_data *hapd, const char *pin,
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wps_supplicant.h | 35 const char *pin, int p2p_group, u16 dev_pw_id); 38 const char *pin, struct wps_new_ap_settings *settings); 52 const char *uuid, const char *pin); 55 const char *pin); 59 const char *pin, struct wps_new_ap_settings *settings);
|
/external/webrtc/src/modules/audio_coding/codecs/isac/fix/source/ |
filterbanks.c | 115 void WebRtcIsacfix_SplitAndFilter1(WebRtc_Word16 *pin, 132 WebRtcIsacfix_HighpassFilterFixDec32(pin, FRAMESAMPLES, WebRtcIsacfix_kHpStCoeffInQ30, prefiltdata->HPstates_fix); 137 tempin_ch1[QLOOKAHEAD + k] = pin[1+WEBRTC_SPL_MUL_16_16(2, k)]; 141 prefiltdata->INLABUF1_fix[k]=pin[FRAMESAMPLES+1-WEBRTC_SPL_MUL_16_16(2, QLOOKAHEAD)+WEBRTC_SPL_MUL_16_16(2, k)]; 147 tempin_ch2[QLOOKAHEAD+k] = pin[WEBRTC_SPL_MUL_16_16(2, k)]; 151 prefiltdata->INLABUF2_fix[k]=pin[FRAMESAMPLES-WEBRTC_SPL_MUL_16_16(2, QLOOKAHEAD)+WEBRTC_SPL_MUL_16_16(2, k)]; 186 void WebRtcIsacfix_SplitAndFilter2(WebRtc_Word16 *pin, 202 WebRtcIsacfix_HighpassFilterFixDec32(pin, FRAMESAMPLES, WebRtcIsacfix_kHpStCoeffInQ30, prefiltdata->HPstates_fix); 207 tempin_ch1[k] = pin[1+WEBRTC_SPL_MUL_16_16(2, k)]; 213 tempin_ch2[k] = pin[WEBRTC_SPL_MUL_16_16(2, k)] [all...] |
/external/chromium/chrome/browser/resources/ntp4/ |
most_visited_page.css | 93 .edit-bar > .pin, 101 .edit-bar > .pin { 105 .edit-bar > .pin:hover { 109 .edit-bar > .pin:active { 113 .pinned .edit-bar > .pin { 117 .pinned .edit-bar > .pin:hover { 121 .pinned .edit-bar > .pin:active {
|
/external/chromium_org/chromeos/dbus/ |
shill_device_client.h | 109 const std::string& pin, 117 const std::string& pin, 125 const std::string& pin,
|
/external/chromium/chrome/browser/sessions/ |
tab_restore_service_delegate.h | 45 bool pin,
|
/external/chromium/chrome/browser/ui/ |
browser_tab_restore_service_delegate.h | 42 bool pin,
|
browser_tab_restore_service_delegate.cc | 46 bool pin, 50 extension_app_id, select, pin,
|
/external/chromium_org/media/video/capture/win/ |
filter_base_win.cc | 48 IPin* pin = filter_->GetPin(index_++); local 49 pin->AddRef(); 50 pins[pins_fetched++] = pin; 98 STDMETHODIMP FilterBase::FindPin(LPCWSTR id, IPin** pin) {
|
/external/chromium_org/chromeos/network/ |
network_device_handler.h | 119 // SIM PIN/PUK methods 121 // Tells the device whether or not a SIM PIN lock should be enforced by 122 // the device referenced by |device_path|. If |require_pin| is true, a PIN 123 // code (specified in |pin|) will be required before the next time the device 130 // - The PIN requirement status already matches |require_pin|. 131 // - |pin| doesn't match the PIN code currently stored by the SIM. 139 const std::string& pin, 143 // Sends the PIN code |pin| to the device |device_path| [all...] |