/packages/apps/Settings/src/com/android/settings/wifi/ |
WpsDialog.java | 86 public void onStarted(String pin) { 87 if (pin != null) { 89 mContext.getString(R.string.wifi_wps_onstart_pin), pin));
|
/packages/apps/Bluetooth/src/com/android/bluetooth/btservice/ |
BondStateMachine.java | 226 // the spec recommendation, check if the keyboard has a fixed PIN zero 228 //TODO: Maintain list of devices that have fixed pin 229 // Generate a variable 6-digit PIN in range of 100000-999999 231 int pin = 100000 + (int)Math.floor((Math.random() * (999999 - 100000))); local 232 sendDisplayPinIntent(devProp.getAddress(), pin, local 294 private void sendDisplayPinIntent(byte[] address, int pin, int variant) { 297 if (pin != 0) { 298 intent.putExtra(BluetoothDevice.EXTRA_PAIRING_KEY, pin);
|
/external/wpa_supplicant_8/src/utils/ |
pcsc_funcs.c | 250 static int scard_verify_pin(struct scard_data *scard, const char *pin); 329 wpa_hexdump(MSG_MSGDUMP, "SCARD: PIN Status Template " 493 * PIN is needed to access some of the card functions. Once the connection is 664 wpa_printf(MSG_DEBUG, "SCARD: Failed to determine whether PIN " 692 * scard_set_pin - Set PIN (CHV1/PIN1) code for accessing SIM/USIM commands 694 * @pin: PIN code as an ASCII string (e.g., "1234") 697 int scard_set_pin(struct scard_data *scard, const char *pin) 704 if (pin == NULL) { 705 wpa_printf(MSG_DEBUG, "No PIN configured for SIM [all...] |
/external/wpa_supplicant_8/src/wps/ |
wps.h | 119 * pin - Enrollee Device Password (%NULL for Registrar or PBC) 121 const u8 *pin; member in struct:wps_config 124 * pin_len - Length on pin in octets 144 * current AP settings by using AP PIN. 163 * dev_pw_id - Device Password ID for Enrollee when PIN is used 277 * pin_needed_cb - Callback for requesting a PIN 283 * PIN method and a matching PIN (Device Password) is not found in 294 * @dev_pw: Device Password (PIN) used during registration 313 * changes (e.g., a new PIN becomes available or PBC is invoked). Thi [all...] |
/frameworks/opt/telephony/src/java/com/android/internal/telephony/test/ |
SimulatedCommands.java | 114 public void supplyIccPin(String pin, Message result) { 125 if (pin != null && pin.equals(mPinCode)) { 296 Rlog.i(LOG_TAG, "[SimCmd] changeIccPin: pin failed!"); 346 public void queryFacilityLock(String facility, String pin, 348 queryFacilityLockForApp(facility, pin, serviceClass, null, result); 352 public void queryFacilityLockForApp(String facility, String pin, int serviceClass, 380 public void setFacilityLock(String facility, boolean lockEnabled, String pin, int serviceClass, 382 setFacilityLockForApp(facility, lockEnabled, pin, serviceClass, null, result); 387 String pin, int serviceClass, String appId [all...] |
/packages/services/Telephony/src/com/android/phone/ |
PhoneInterfaceManager.java | [all...] |
FdnSetting.java | 50 * The first is used for toggling FDN enable, the second for the PIN change. 56 // We only care about the pin preferences here, the manage FDN contacts 84 // size limits for the pin. 108 // validate the pin first, before submitting it to the RIL for FDN enable. 118 // throw up error if the pin is invalid. 126 * Attempt to change the pin. 144 // 1. Enter old pin 145 // 2. Enter new pin 146 // 3. Re-Enter new pin 156 // if the pin is not valid, display a message and reset the state [all...] |
/packages/apps/Settings/src/com/android/settings/ |
ChooseLockPassword.java | 309 * Validates PIN and returns a message to display if PIN fails test. 412 final String pin = mPasswordEntry.getText().toString(); 413 if (TextUtils.isEmpty(pin)) { 418 errorMsg = validatePassword(pin); 420 mFirstPin = pin; 425 if (mFirstPin.equals(pin)) { 432 mLockPatternUtils.saveLockPassword(pin, mRequestedQuality, isFallback);
|
ConfirmLockPassword.java | 194 final String pin = mPasswordEntry.getText().toString(); local 195 if (mLockPatternUtils.checkPassword(pin)) { 202 intent.putExtra(ChooseLockSettingsHelper.EXTRA_KEY_PASSWORD, pin);
|
/external/arduino/hardware/arduino/cores/arduino/ |
wiring.h | 122 unsigned long pulseIn(uint8_t pin, uint8_t state, unsigned long timeout);
|
/external/chromium_org/remoting/client/jni/ |
chromoting_jni_instance.h | 73 // Provides the user's PIN and resumes the host authentication attempt. Call 74 // on the UI thread once the user has finished entering this PIN into the UI, 75 // but only after the UI has been asked to provide a PIN (via FetchSecret()). 76 void ProvideSecret(const std::string& pin, bool create_pair, 130 // Notifies the user interface that the user needs to enter a PIN. The 172 // Pass this the user's PIN once we have it. To be assigned and accessed on
|
/external/chromium_org/remoting/ios/bridge/ |
client_instance.h | 62 // Notifies the user interface that the user needs to enter a PIN. The 68 // Provides the user's PIN and resumes the host authentication attempt. Call 69 // on the UI thread once the user has finished entering this PIN into the UI, 70 // but only after the UI has been asked to provide a PIN (via FetchSecret()). 71 void ProvideSecret(const std::string& pin, bool create_pair); 135 // Pass this the user's PIN once we have it. To be assigned and accessed on
|
/external/qemu/include/hw/ |
qdev-core.h | 55 void qdev_connect_gpio_out(DeviceState *dev, int n, qemu_irq pin);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_supplicant.conf | [all...] |
wps_supplicant.c | 86 wpa_printf(MSG_DEBUG, "WPS: PIN registration with " MACSTR 1069 const char *pin, int p2p_group, u16 dev_pw_id, 1115 if (pin) 1116 os_snprintf(val, sizeof(val), "\"pin=%s dev_pw_id=%u%s\"", 1117 pin, dev_pw_id, hash); 1118 else if (pin == NULL && dev_pw_id == DEV_PW_NFC_CONNECTION_HANDOVER) { 1123 os_snprintf(val, sizeof(val), "\"pin=%08d dev_pw_id=%u%s\"", 1678 unsigned int pbc = 0, auth = 0, pin = 0, wps = 0; local [all...] |
ap.c | 790 const char *pin, char *buf, size_t buflen, 798 if (pin == NULL) { 801 pin = buf; 803 ret_len = os_snprintf(buf, buflen, "%s", pin); 805 ret = hostapd_wps_add_pin(wpa_s->ap_iface->bss[0], bssid, "any", pin, 816 wpa_printf(MSG_DEBUG, "WPS: AP PIN timed out"); 828 wpa_printf(MSG_DEBUG, "WPS: Enabling AP PIN (timeout=%d)", timeout); 843 wpa_printf(MSG_DEBUG, "WPS: Disabling AP PIN"); 854 unsigned int pin; local 860 pin = wps_generate_pin() [all...] |
ctrl_iface.c | 707 char *pin; local 710 pin = os_strchr(cmd, ' '); 711 if (pin) 712 *pin++ = '\0'; 730 if (pin) { 731 pos = os_strchr(pin, ' '); 738 return wpa_supplicant_ap_wps_pin(wpa_s, _bssid, pin, 743 if (pin) { 744 ret = wpas_wps_start_pin(wpa_s, _bssid, pin, 0, 748 ret = os_snprintf(buf, buflen, "%s", pin); 770 char pin[9]; local 1227 char *pin; local 1312 char *pin; local 1337 char *uuid = cmd, *pin, *pos; local 1356 char *uuid = cmd, *pin; local 1380 char *pin; local 4045 char *pin = NULL; local [all...] |
/external/wpa_supplicant_8/hostapd/ |
ctrl_iface.c | 185 char *pin = os_strchr(txt, ' '); local 191 if (pin == NULL) 193 *pin++ = '\0'; 195 timeout_txt = os_strchr(pin, ' '); 208 return hostapd_wps_add_pin(hapd, addr, txt, pin, timeout); 215 char pin[9]; local 225 pin[len++] = *pos; 227 wpa_printf(MSG_DEBUG, "WPS: Too long PIN"); 232 wpa_printf(MSG_DEBUG, "WPS: Invalid PIN length %d", (int) len); 235 pin[len] = '\0' 505 char *pin; local [all...] |
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/p2p/ |
WifiP2pServiceImpl.java | 1980 String pin = mWifiNative.startWpsPinDisplay(mGroup.getInterface()); local 2303 final EditText pin = (EditText) textEntryView.findViewById(R.id.wifi_p2p_wps_pin); local 2475 String pin = mWifiNative.p2pConnect(config, dev.isGroupOwner()); local [all...] |
/cts/tests/tests/opengl/src/android/opengl/cts/ |
RendererOneColorBufferTest.java | 213 int [] pin = pinbuffer.array(); local 214 int pixel = pin[0];
|
/external/fio/os/ |
os-android.h | 72 struct ashmem_pin pin = {0 , length}; local 73 ret = ioctl(__shmid, ASHMEM_UNPIN, &pin);
|
/frameworks/base/packages/Keyguard/src/com/android/keyguard/ |
KeyguardSimPinView.java | 34 * Displays a PIN pad for unlocking. 78 // SIM PIN doesn't have a timed lockout 117 protected CheckSimPin(String pin) { 118 mPin = pin; 211 // "PIN operation failed!" - no idea what this was and no way to
|
KeyguardSimPukView.java | 35 * Displays a PIN pad for entering a PUK (Pin Unlock Kode) provided by a carrier. 169 protected CheckSimPuk(String puk, String pin) { 171 mPin = pin; 240 // make sure the PIN is between 4 and 8 digits
|
/frameworks/base/core/tests/bluetoothtests/src/android/bluetooth/ |
BluetoothTestUtils.java | 154 public PairReceiver(BluetoothDevice device, int passkey, byte[] pin, int expectedFlags) { 159 mPin = pin; 743 * @param pin The pairing pin if pairing requires a pin. Any value if not. 745 public void pair(BluetoothAdapter adapter, BluetoothDevice device, int passkey, byte[] pin) { 746 pairOrAcceptPair(adapter, device, passkey, pin, true); 756 * @param pin The pairing pin if pairing requires a pin. Any value if not [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_tls_common.c | 96 params->pin = config->pin; 118 params->pin = config->pin2; 195 * At this point with the pkcs11 engine the PIN might be wrong. 196 * We reset the PIN in the configuration to be sure to not use 199 os_free(config->pin); 200 config->pin = NULL; 204 * We do not know exactly but maybe the PIN was wrong, 207 os_free(config->pin); 208 config->pin = NULL [all...] |