/packages/apps/VoiceDialer/src/com/android/voicedialer/ |
RecognizerClient.java | 38 public void onMicrophoneStart(InputStream mic);
|
RecognizerEngine.java | 111 * @param sampleRate the same rate coming from the mic or micFile 115 InputStream mic = null; local 147 if (Config.LOGD) Log.d(TAG, "using mic file"); 148 mic = new FileInputStream(micFile); 150 hdr.read(mic); 153 mic = new MicrophoneInputStream(sampleRate, sampleRate * 15); 157 recognizerClient.onMicrophoneStart(mic); 160 if (mLogger != null) mic = mLogger.logInputStream(mic, sampleRate); 177 " avail " + mic.available()) [all...] |
VoiceDialerActivity.java | 345 public void onMicrophoneStart(InputStream mic) { 358 skipBeep(mic);
|
/external/wpa_supplicant_6/wpa_supplicant/src/common/ |
wpa_common.c | 29 * wpa_eapol_key_mic - Calculate EAPOL-Key MIC 34 * @mic: Pointer to the buffer to which the EAPOL-Key MIC is written 37 * Calculate EAPOL-Key MIC for an EAPOL-Key packet. The EAPOL-Key MIC field has 41 * description of the Key MIC calculation. It includes packet data from the 47 u8 *mic) 53 hmac_md5(key, 16, buf, len, mic); 57 os_memcpy(mic, hash, MD5_MAC_LEN); 61 return omac1_aes_128(key, buf, len, mic); [all...] |
wpa_common.h | 274 u8 mic[16]; member in struct:rsn_ftie 293 u8 *mic); 304 const u8 *ric, size_t ric_len, u8 *mic);
|
/external/wpa_supplicant/ |
eap_gpsk_common.h | 64 int specifier, const u8 *data, size_t len, u8 *mic);
|
eap_gpsk_common.c | 352 * eap_gpsk_mic_len - Get the length of the MIC 355 * Returns: MIC length in bytes 376 const u8 *data, size_t len, u8 *mic) 380 "AES-CMAC MIC", (unsigned long) sk_len); 384 return omac1_aes_128(sk, data, len, mic); 389 * eap_gpsk_compute_mic - Compute EAP-GPSK MIC for an EAP packet 394 * @data: Input data to MIC 396 * @mic: Buffer for the computed MIC, eap_gpsk_mic_len(cipher) bytes 400 int specifier, const u8 *data, size_t len, u8 *mic) [all...] |
eap_sake_common.h | 102 const u8 *mic_pos, u8 *mic);
|
eap_sake_common.c | 307 * eap_sake_compute_mic - Compute EAP-SAKE MIC for an EAP packet 315 * @peer: MIC calculation for 0 = Server, 1 = Peer message 318 * @mic_pos: MIC position in the EAP packet (must be [eap .. eap + eap_len]) 319 * @mic: Buffer for the computed 16-byte MIC 326 const u8 *mic_pos, u8 *mic) 373 peer ? "Peer MIC" : "Server MIC", 375 mic, EAP_SAKE_MIC_LEN);
|
eap_gpsk.c | 533 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local 540 wpa_printf(MSG_DEBUG, "EAP-GPSK: Message too short for MIC " 547 data->specifier, payload, pos - payload, mic) 549 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to compute MIC"); 552 if (os_memcmp(mic, pos, miclen) != 0) { 553 wpa_printf(MSG_INFO, "EAP-GPSK: Incorrect MIC in GPSK-3"); 554 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen); 555 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen);
|
driver_bsd.c | 465 struct ieee80211_michael_event *mic; local 520 mic = (struct ieee80211_michael_event *) &ifan[1]; 522 "Michael MIC failure wireless event: " 523 "keyix=%u src_addr=" MACSTR, mic->iev_keyix, 524 MAC2STR(mic->iev_src)); 528 !IEEE80211_IS_MULTICAST(mic->iev_dst);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_gpsk_common.h | 64 int specifier, const u8 *data, size_t len, u8 *mic);
|
eap_gpsk_common.c | 353 * eap_gpsk_mic_len - Get the length of the MIC 356 * Returns: MIC length in bytes 377 const u8 *data, size_t len, u8 *mic) 381 "AES-CMAC MIC", (unsigned long) sk_len); 385 return omac1_aes_128(sk, data, len, mic); 390 * eap_gpsk_compute_mic - Compute EAP-GPSK MIC for an EAP packet 395 * @data: Input data to MIC 397 * @mic: Buffer for the computed MIC, eap_gpsk_mic_len(cipher) bytes 401 int specifier, const u8 *data, size_t len, u8 *mic) [all...] |
eap_sake_common.h | 98 const u8 *mic_pos, u8 *mic);
|
eap_sake_common.c | 308 * eap_sake_compute_mic - Compute EAP-SAKE MIC for an EAP packet 316 * @peer: MIC calculation for 0 = Server, 1 = Peer message 319 * @mic_pos: MIC position in the EAP packet (must be [eap .. eap + eap_len]) 320 * @mic: Buffer for the computed 16-byte MIC 327 const u8 *mic_pos, u8 *mic) 374 peer ? "Peer MIC" : "Server MIC", 376 mic, EAP_SAKE_MIC_LEN);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_gpsk.c | 258 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local 435 wpa_printf(MSG_DEBUG, "EAP-GPSK: Message too short for MIC " 443 data->specifier, payload, pos - payload, mic) 445 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to compute MIC"); 449 if (os_memcmp(mic, pos, miclen) != 0) { 450 wpa_printf(MSG_INFO, "EAP-GPSK: Incorrect MIC in GPSK-2"); 451 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen); 452 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen); 475 u8 mic[EAP_GPSK_MAX_MIC_LEN] local [all...] |
eap_sake.c | 205 u8 *mic; local 219 mic = wpabuf_put(msg, EAP_SAKE_MIC_LEN); 223 wpabuf_head(msg), wpabuf_len(msg), mic, mic)) 225 wpa_printf(MSG_INFO, "EAP-SAKE: Failed to compute MIC");
|
/hardware/broadcom/wlan/bcm4329/src/include/proto/ |
eapol.h | 100 unsigned char mic[EAPOL_WPA_KEY_MIC_LEN]; /* Key MIC */ member in struct:__anon9422
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
wpa_ft.c | 113 * @kck: 128-bit KCK for MIC or %NULL if no MIC is used 247 * MIC shall be calculated over: 253 * FTIE (with MIC field set to 0) 261 ftie->mic) < 0) { 262 wpa_printf(MSG_INFO, "FT: Failed to calculate MIC"); 739 u8 mic[16]; local 817 mic) < 0) { 818 wpa_printf(MSG_DEBUG, "FT: Failed to calculate MIC"); 822 if (os_memcmp(mic, ftie->mic, 16) != 0) [all...] |
peerkey.c | 714 /* Supplicant: swap tx/rx Mic keys */ 883 /* Swap Tx/Rx keys for Michael MIC */ 924 * peerkey_verify_eapol_key_mic - Verify PeerKey MIC 938 u8 mic[16]; local 950 os_memcpy(mic, key->key_mic, 16); 955 if (os_memcmp(mic, key->key_mic, 16) != 0) { 956 wpa_printf(MSG_WARNING, "RSN: Invalid EAPOL-Key MIC " 971 if (os_memcmp(mic, key->key_mic, 16) != 0) { 972 wpa_printf(MSG_WARNING, "RSN: Invalid EAPOL-Key MIC " 980 wpa_printf(MSG_WARNING, "RSN: Could not verify EAPOL-Key MIC " [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_gpsk.c | 518 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local 525 wpa_printf(MSG_DEBUG, "EAP-GPSK: Message too short for MIC " 532 data->specifier, payload, pos - payload, mic) 534 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to compute MIC"); 537 if (os_memcmp(mic, pos, miclen) != 0) { 538 wpa_printf(MSG_INFO, "EAP-GPSK: Incorrect MIC in GPSK-3"); 539 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen); 540 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen);
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver_bsd.c | 468 struct ieee80211_michael_event *mic; local 523 mic = (struct ieee80211_michael_event *) &ifan[1]; 525 "Michael MIC failure wireless event: " 526 "keyix=%u src_addr=" MACSTR, mic->iev_keyix, 527 MAC2STR(mic->iev_src)); 531 !IEEE80211_IS_MULTICAST(mic->iev_dst);
|
/external/libvpx/vp8/encoder/ |
pickinter.c | 239 MODE_INFO *const mic = xd->mode_info_context; local 241 const B_PREDICTION_MODE A = vp8_above_bmi(mic, i, mis)->mode; 242 const B_PREDICTION_MODE L = vp8_left_bmi(mic, i)->mode; 254 mic->bmi[i].mode = xd->block[i].bmi.mode = best_mode;
|
rdopt.c | 734 MODE_INFO *const mic = xd->mode_info_context; local 736 const B_PREDICTION_MODE A = vp8_above_bmi(mic, i, mis)->mode; 737 const B_PREDICTION_MODE L = vp8_left_bmi(mic, i)->mode; 749 mic->bmi[i].mode = xd->block[i].bmi.mode = best_mode; 930 MODE_INFO *const mic = xd->mode_info_context; local 966 *this_mv = col ? d[-1].bmi.mv.as_mv : vp8_left_bmi(mic, i)->mv.as_mv; 969 *this_mv = row ? d[-4].bmi.mv.as_mv : vp8_above_bmi(mic, i, mis)->mv.as_mv; 980 const MV mv = col ? d[-1].bmi.mv.as_mv : vp8_left_bmi(mic, i)->mv.as_mv; [all...] |
/external/srec/srec/cfront/ |
nisthdr.h | 147 void setMicrophone(char *mic);
|