/external/qemu-pc-bios/bochs/bios/ |
H A D | rombios32.c | 782 pin. We could also use the bus number to have a more precise 935 int i, pin, pic_irq, vendor_id, device_id; local 1013 pin = pci_config_readb(d, PCI_INTERRUPT_PIN); 1014 if (pin != 0) { 1015 pin = pci_slot_get_pirq(d, pin - 1); 1016 pic_irq = pci_irqs[pin];
|
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
H A D | dbus_new_handlers_p2p.c | 434 char *pin = NULL; local 478 else if (!os_strcmp(entry.str_value, "pin")) 486 } else if (!os_strcmp(entry.key, "pin") && 488 pin = os_strdup(entry.str_value); 501 * Validate the wps_method specified and the pin value. 503 if ((!pin || !pin[0]) && (wps_method == WPS_PIN_KEYPAD)) 506 new_pin = wpas_p2p_connect(wpa_s, addr, pin, wps_method, 548 os_free(pin);
|
H A D | dbus_new.c | 995 * @generated_pin - pin to be displayed in case of WPS_CONFIG_DISPLAY method 1021 char pin[9], *p_pin = NULL; local 1052 os_snprintf(pin, sizeof(pin), "%08d", generated_pin); 1053 p_pin = pin; 2957 { "pin", "s", ARG_OUT }, 2964 { "pin", "s", ARG_OUT },
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_wsc.c | 127 cfg.pin = sm->user->password;
|
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | wps_er.c | 1895 const u8 *pin, size_t pin_len) 1920 wps_registrar_add_pin(er->wps->registrar, NULL, uuid, pin, pin_len, 0); 1980 const u8 *pin, size_t pin_len, 2013 wps_registrar_add_pin(er->wps->registrar, NULL, uuid, pin, pin_len, 0); 1894 wps_er_learn(struct wps_er *er, const u8 *uuid, const u8 *addr, const u8 *pin, size_t pin_len) argument 1979 wps_er_config(struct wps_er *er, const u8 *uuid, const u8 *addr, const u8 *pin, size_t pin_len, const struct wps_credential *cred) argument
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_wsc.c | 127 cfg.pin = sm->user->password;
|
/external/wpa_supplicant_8/src/wps/ |
H A D | wps_er.c | 1895 const u8 *pin, size_t pin_len) 1920 wps_registrar_add_pin(er->wps->registrar, NULL, uuid, pin, pin_len, 0); 1980 const u8 *pin, size_t pin_len, 2013 wps_registrar_add_pin(er->wps->registrar, NULL, uuid, pin, pin_len, 0); 1894 wps_er_learn(struct wps_er *er, const u8 *uuid, const u8 *addr, const u8 *pin, size_t pin_len) argument 1979 wps_er_config(struct wps_er *er, const u8 *uuid, const u8 *addr, const u8 *pin, size_t pin_len, const struct wps_credential *cred) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_wsc.c | 127 cfg.pin = sm->user->password;
|
/external/wpa_supplicant_8/wpa_supplicant/src/wps/ |
H A D | wps_er.c | 1895 const u8 *pin, size_t pin_len) 1920 wps_registrar_add_pin(er->wps->registrar, NULL, uuid, pin, pin_len, 0); 1980 const u8 *pin, size_t pin_len, 2013 wps_registrar_add_pin(er->wps->registrar, NULL, uuid, pin, pin_len, 0); 1894 wps_er_learn(struct wps_er *er, const u8 *uuid, const u8 *addr, const u8 *pin, size_t pin_len) argument 1979 wps_er_config(struct wps_er *er, const u8 *uuid, const u8 *addr, const u8 *pin, size_t pin_len, const struct wps_credential *cred) argument
|
/external/chromium/chrome/browser/chromeos/cros/ |
H A D | network_library.h | 910 // Called when pin async operation has completed. 1059 // Passes |pin|, |require_pin| value to change SIM card RequirePin setting. 1061 const std::string& pin) = 0; 1063 // Passes |pin| to unlock SIM card. 1064 virtual void EnterPin(const std::string& pin) = 0;
|
H A D | network_library.cc | 174 const char* kSIMLockPin = "sim-pin"; 317 const char* kErrorPinMissing = "pin-missing"; 2479 const std::string& pin) { 2481 << " pin: " << pin; local 2489 pin.c_str(), require_pin, 2493 virtual void EnterPin(const std::string& pin) { argument 2501 pin.c_str(), 4125 wifi4->set_cert_path("SETTINGS:key_id=3,cert_id=3,pin=111111"); 4438 virtual void ChangeRequirePin(bool require_pin, const std::string& pin) {} argument 2478 ChangeRequirePin(bool require_pin, const std::string& pin) argument 4439 EnterPin(const std::string& pin) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap.c | 1067 if (scard_set_pin(sm->scard_ctx, conf->pin)) { 1072 os_free(conf->pin); 1073 conf->pin = NULL; 2352 if (conf->phase1 == NULL || os_strstr(conf->phase1, "pin=") == NULL)
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap.c | 1067 if (scard_set_pin(sm->scard_ctx, conf->pin)) { 1072 os_free(conf->pin); 1073 conf->pin = NULL; 2352 if (conf->phase1 == NULL || os_strstr(conf->phase1, "pin=") == NULL)
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap.c | 1067 if (scard_set_pin(sm->scard_ctx, conf->pin)) { 1072 os_free(conf->pin); 1073 conf->pin = NULL; 2352 if (conf->phase1 == NULL || os_strstr(conf->phase1, "pin=") == NULL)
|
/external/chromium/chrome/browser/ui/ |
H A D | browser.h | 387 // extension. If |pin| is true and |tab_index|/ is the last pinned tab, then 395 bool pin,
|
/external/chromium_org/chrome/browser/ui/panels/ |
H A D | docked_panel_collection.cc | 369 base::AutoReset<bool> pin(&minimizing_all_, true);
|
H A D | stacked_panel_collection.cc | 414 base::AutoReset<bool> pin(&minimizing_all_, true);
|
/external/qemu/android/config/linux-x86/linux/ |
H A D | kvm.h | 448 __u32 pin; member in struct:kvm_irq_routing_irqchip
|
/external/qemu/android/config/linux-x86_64/linux/ |
H A D | kvm.h | 448 __u32 pin; member in struct:kvm_irq_routing_irqchip
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_openssl.c | 864 const char *pin, const char *key_id, 874 if (pin == NULL) { 903 if (ENGINE_ctrl_cmd_string(conn->engine, "PIN", pin, 0) == 0) { 904 wpa_printf(MSG_ERROR, "ENGINE: cannot set pin [%s]", 2962 ret = tls_engine_init(conn, params->engine_id, params->pin, 863 tls_engine_init(struct tls_connection *conn, const char *engine_id, const char *pin, const char *key_id, const char *cert_id, const char *ca_cert_id) argument
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_openssl.c | 864 const char *pin, const char *key_id, 874 if (pin == NULL) { 903 if (ENGINE_ctrl_cmd_string(conn->engine, "PIN", pin, 0) == 0) { 904 wpa_printf(MSG_ERROR, "ENGINE: cannot set pin [%s]", 2962 ret = tls_engine_init(conn, params->engine_id, params->pin, 863 tls_engine_init(struct tls_connection *conn, const char *engine_id, const char *pin, const char *key_id, const char *cert_id, const char *ca_cert_id) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_openssl.c | 864 const char *pin, const char *key_id, 874 if (pin == NULL) { 903 if (ENGINE_ctrl_cmd_string(conn->engine, "PIN", pin, 0) == 0) { 904 wpa_printf(MSG_ERROR, "ENGINE: cannot set pin [%s]", 2962 ret = tls_engine_init(conn, params->engine_id, params->pin, 863 tls_engine_init(struct tls_connection *conn, const char *engine_id, const char *pin, const char *key_id, const char *cert_id, const char *ca_cert_id) argument
|
/external/chromium_org/remoting/host/plugin/ |
H A D | host_script_object.cc | 367 // If NAT traversal is off then limit port range to allow firewall pin-holing. 1198 SetException("getPinHash: bad pin parameter"); 1201 std::string pin = StringFromNPVariant(args[1]); local 1210 remoting::MakeHostPinHash(host_id, pin));
|
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
H A D | peers.cpp | 1011 QString pin = items[2]; local 1018 item->setData(pin, peer_role_selected_pin); 1454 snprintf(cmd, sizeof(cmd), "P2P_CONNECT %s pin",
|
/external/kernel-headers/original/linux/ |
H A D | pci.h | 128 u8 pin; /* which interrupt pin this device uses */ member in struct:pci_dev
|