/external/bluetooth/bluedroid/stack/gap/ |
D | gap_api.c | 255 UINT8 GAP_Bond (BD_ADDR bd_addr, UINT8 pin_len, UINT8 *p_pin, UINT32 trusted_mask[]) in GAP_Bond() argument 257 return ((UINT8) BTM_SecBond (bd_addr, pin_len, p_pin, trusted_mask)); in GAP_Bond() 292 void GAP_PinRsp (BD_ADDR bd_addr, UINT8 res, UINT8 pin_len, UINT8 *p_pin, UINT32 trusted_mask[]) in GAP_PinRsp() argument 294 BTM_PINCodeReply (bd_addr, res, pin_len, p_pin, trusted_mask); in GAP_PinRsp()
|
/external/wpa_supplicant_8/src/wps/ |
D | wps.h | 128 size_t pin_len; member 753 const u8 *uuid, const u8 *pin, size_t pin_len, 799 const u8 *pin, size_t pin_len); 803 const u8 *pin, size_t pin_len,
|
D | wps_registrar.c | 81 size_t pin_len; member 730 const u8 *uuid, const u8 *pin, size_t pin_len, in wps_registrar_add_pin() argument 744 p->pin = os_malloc(pin_len); in wps_registrar_add_pin() 749 os_memcpy(p->pin, pin, pin_len); in wps_registrar_add_pin() 750 p->pin_len = pin_len; in wps_registrar_add_pin() 766 wpa_hexdump_ascii_key(MSG_DEBUG, "WPS: PIN", pin, pin_len); in wps_registrar_add_pin() 834 (dev_pw_len != pin->pin_len || in wps_registrar_invalidate_wildcard_pin() 874 const u8 *uuid, size_t *pin_len) in wps_registrar_get_pin() argument 916 *pin_len = found->pin_len; in wps_registrar_get_pin() 1347 size_t pin_len = 0; in wps_get_dev_password() local [all …]
|
D | wps.c | 49 data->dev_password = os_malloc(cfg->pin_len); in wps_init() 54 os_memcpy(data->dev_password, cfg->pin, cfg->pin_len); in wps_init() 55 data->dev_password_len = cfg->pin_len; in wps_init()
|
D | wps_er.c | 1900 const u8 *pin, size_t pin_len) in wps_er_learn() argument 1925 wps_registrar_add_pin(er->wps->registrar, NULL, uuid, pin, pin_len, 0); in wps_er_learn() 1985 const u8 *pin, size_t pin_len, in wps_er_config() argument 2018 wps_registrar_add_pin(er->wps->registrar, NULL, uuid, pin, pin_len, 0); in wps_er_config()
|
D | wps_upnp_web.c | 445 cfg.pin_len = os_strlen(iface->ctx->ap_pin); in web_process_get_device_info()
|
/external/bluetooth/bluedroid/btif/src/ |
D | bluetooth.c | 283 uint8_t pin_len, bt_pin_code_t *pin_code) in pin_reply() argument 289 return btif_dm_pin_reply(bd_addr, accept, pin_len, pin_code); in pin_reply()
|
D | btif_config_util.cpp | 653 int pin_len = atoi(value); in load_bluez_linkkeys() local 659 btif_config_set_int("Remote", addr, "PinLength", pin_len); in load_bluez_linkkeys()
|
D | btif_dm.c | 1889 uint8_t pin_len, bt_pin_code_t *pin_code) in btif_dm_pin_reply() argument 1911 BTA_DmPinReply( (UINT8 *)bd_addr->address, accept, pin_len, pin_code->pin); in btif_dm_pin_reply() 1913 pairing_cb.pin_code_len = pin_len; in btif_dm_pin_reply() 1916 BTA_DmPinReply( (UINT8 *)bd_addr->address, accept, pin_len, pin_code->pin); in btif_dm_pin_reply() 1919 pairing_cb.pin_code_len = pin_len; in btif_dm_pin_reply()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_wsc.c | 199 cfg.pin_len = pos - (const char *) cfg.pin; in eap_wsc_init() 200 if (cfg.pin_len == 6 && in eap_wsc_init() 203 cfg.pin_len = 0; in eap_wsc_init() 252 cfg.pin, cfg.pin_len, 0); in eap_wsc_init()
|
/external/bluetooth/bluedroid/btif/include/ |
D | btif_api.h | 243 uint8_t pin_len, bt_pin_code_t *pin_code);
|
/external/bluetooth/bluedroid/stack/include/ |
D | gap_api.h | 451 GAP_API extern UINT8 GAP_Bond (BD_ADDR bd_addr, UINT8 pin_len, UINT8 *p_pin, UINT32 trusted_mask[]); 463 GAP_API extern void GAP_PinRsp (BD_ADDR bd_addr, UINT8 res, UINT8 pin_len,
|
D | btm_api.h | 3910 BTM_API extern void BTM_PINCodeReply (BD_ADDR bd_addr, UINT8 res, UINT8 pin_len, 3940 …BTM_API extern tBTM_STATUS BTM_SecBond (BD_ADDR bd_addr, UINT8 pin_len, UINT8 *p_pin, UINT32 trust…
|
/external/bluetooth/bluedroid/bta/dm/ |
D | bta_dm_api.c | 576 void BTA_DmPinReply(BD_ADDR bd_addr, BOOLEAN accept, UINT8 pin_len, UINT8 *p_pin) in BTA_DmPinReply() argument 588 p_msg->pin_len = pin_len; in BTA_DmPinReply() 589 memcpy(p_msg->p_pin, p_pin, pin_len); in BTA_DmPinReply()
|
D | bta_dm_int.h | 245 UINT8 pin_len; member
|
D | bta_dm_act.c | 915 …BTM_PINCodeReply(p_data->pin_reply.bd_addr, BTM_SUCCESS, p_data->pin_reply.pin_len, p_data->pin_re… in bta_dm_pin_reply()
|
/external/bluetooth/bluedroid/stack/btm/ |
D | btm_sec.c | 862 void BTM_PINCodeReply (BD_ADDR bd_addr, UINT8 res, UINT8 pin_len, UINT8 *p_pin, UINT32 trusted_mask… in BTM_PINCodeReply() argument 867 btm_pair_state_descr(btm_cb.pairing_state), btm_cb.pairing_flags, pin_len, res); in BTM_PINCodeReply() 888 if ( (pin_len > PIN_CODE_LEN) || (pin_len == 0) || (p_pin == NULL) ) in BTM_PINCodeReply() 920 btm_cb.pin_code_len = pin_len; in BTM_PINCodeReply() 921 memcpy (btm_cb.pin_code, p_pin, pin_len); in BTM_PINCodeReply() 961 …BTM_TRACE_EVENT2("BTM_PINCodeReply(): Saving pin_len: %d btm_cb.pin_code_len: %d", pin_len, btm_cb… in BTM_PINCodeReply() 964 memcpy (btm_cb.pin_code, p_pin, pin_len); in BTM_PINCodeReply() 965 btm_cb.pin_code_len_saved = pin_len; in BTM_PINCodeReply() 967 btsnd_hcic_pin_code_req_reply (bd_addr, pin_len, p_pin); in BTM_PINCodeReply() 1048 tBTM_STATUS BTM_SecBond (BD_ADDR bd_addr, UINT8 pin_len, UINT8 *p_pin, UINT32 trusted_mask[]) in BTM_SecBond() argument [all …]
|
/external/openssh/ |
D | pkcs11.h | 750 unsigned long pin_len, unsigned char *label)); 753 unsigned long pin_len)); 780 unsigned char *pin, unsigned long pin_len));
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_wsc.c | 128 cfg.pin_len = sm->user->password_len; in eap_wsc_init()
|
/external/wpa_supplicant_8/src/ap/ |
D | wps_hostapd.c | 1192 size_t pin_len; member 1206 data->uuid, data->pin, data->pin_len, in wps_add_pin() 1223 data.pin_len = os_strlen(pin); in hostapd_wps_add_pin()
|
/external/bluetooth/bluedroid/bta/include/ |
D | bta_api.h | 1278 BTA_API extern void BTA_DmPinReply(BD_ADDR bd_addr, BOOLEAN accept, UINT8 pin_len,
|
/external/qemu/hw/ |
D | bt.h | 536 uint8_t pin_len; member
|