HomeSort by relevance Sort by last modified time
    Searched refs:mic (Results 1 - 25 of 34) sorted by null

1 2

  /packages/apps/VoiceDialer/src/com/android/voicedialer/
RecognizerClient.java 38 public void onMicrophoneStart(InputStream mic);
RecognizerEngine.java 111 * @param sampleRate the same rate coming from the mic or micFile
115 InputStream mic = null; local
147 if (Config.LOGD) Log.d(TAG, "using mic file");
148 mic = new FileInputStream(micFile);
150 hdr.read(mic);
153 mic = new MicrophoneInputStream(sampleRate, sampleRate * 15);
157 recognizerClient.onMicrophoneStart(mic);
160 if (mLogger != null) mic = mLogger.logInputStream(mic, sampleRate);
177 " avail " + mic.available())
    [all...]
VoiceDialerActivity.java 345 public void onMicrophoneStart(InputStream mic) {
358 skipBeep(mic);
  /external/wpa_supplicant_6/wpa_supplicant/src/common/
wpa_common.c 29 * wpa_eapol_key_mic - Calculate EAPOL-Key MIC
34 * @mic: Pointer to the buffer to which the EAPOL-Key MIC is written
37 * Calculate EAPOL-Key MIC for an EAPOL-Key packet. The EAPOL-Key MIC field has
41 * description of the Key MIC calculation. It includes packet data from the
47 u8 *mic)
53 hmac_md5(key, 16, buf, len, mic);
57 os_memcpy(mic, hash, MD5_MAC_LEN);
61 return omac1_aes_128(key, buf, len, mic);
    [all...]
wpa_common.h 274 u8 mic[16]; member in struct:rsn_ftie
293 u8 *mic);
304 const u8 *ric, size_t ric_len, u8 *mic);
  /external/wpa_supplicant/
eap_gpsk_common.h 64 int specifier, const u8 *data, size_t len, u8 *mic);
eap_gpsk_common.c 352 * eap_gpsk_mic_len - Get the length of the MIC
355 * Returns: MIC length in bytes
376 const u8 *data, size_t len, u8 *mic)
380 "AES-CMAC MIC", (unsigned long) sk_len);
384 return omac1_aes_128(sk, data, len, mic);
389 * eap_gpsk_compute_mic - Compute EAP-GPSK MIC for an EAP packet
394 * @data: Input data to MIC
396 * @mic: Buffer for the computed MIC, eap_gpsk_mic_len(cipher) bytes
400 int specifier, const u8 *data, size_t len, u8 *mic)
    [all...]
eap_sake_common.h 102 const u8 *mic_pos, u8 *mic);
eap_sake_common.c 307 * eap_sake_compute_mic - Compute EAP-SAKE MIC for an EAP packet
315 * @peer: MIC calculation for 0 = Server, 1 = Peer message
318 * @mic_pos: MIC position in the EAP packet (must be [eap .. eap + eap_len])
319 * @mic: Buffer for the computed 16-byte MIC
326 const u8 *mic_pos, u8 *mic)
373 peer ? "Peer MIC" : "Server MIC",
375 mic, EAP_SAKE_MIC_LEN);
eap_gpsk.c 533 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local
540 wpa_printf(MSG_DEBUG, "EAP-GPSK: Message too short for MIC "
547 data->specifier, payload, pos - payload, mic)
549 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to compute MIC");
552 if (os_memcmp(mic, pos, miclen) != 0) {
553 wpa_printf(MSG_INFO, "EAP-GPSK: Incorrect MIC in GPSK-3");
554 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen);
555 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen);
driver_bsd.c 465 struct ieee80211_michael_event *mic; local
520 mic = (struct ieee80211_michael_event *) &ifan[1];
522 "Michael MIC failure wireless event: "
523 "keyix=%u src_addr=" MACSTR, mic->iev_keyix,
524 MAC2STR(mic->iev_src));
528 !IEEE80211_IS_MULTICAST(mic->iev_dst);
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_gpsk_common.h 64 int specifier, const u8 *data, size_t len, u8 *mic);
eap_gpsk_common.c 353 * eap_gpsk_mic_len - Get the length of the MIC
356 * Returns: MIC length in bytes
377 const u8 *data, size_t len, u8 *mic)
381 "AES-CMAC MIC", (unsigned long) sk_len);
385 return omac1_aes_128(sk, data, len, mic);
390 * eap_gpsk_compute_mic - Compute EAP-GPSK MIC for an EAP packet
395 * @data: Input data to MIC
397 * @mic: Buffer for the computed MIC, eap_gpsk_mic_len(cipher) bytes
401 int specifier, const u8 *data, size_t len, u8 *mic)
    [all...]
eap_sake_common.h 98 const u8 *mic_pos, u8 *mic);
eap_sake_common.c 308 * eap_sake_compute_mic - Compute EAP-SAKE MIC for an EAP packet
316 * @peer: MIC calculation for 0 = Server, 1 = Peer message
319 * @mic_pos: MIC position in the EAP packet (must be [eap .. eap + eap_len])
320 * @mic: Buffer for the computed 16-byte MIC
327 const u8 *mic_pos, u8 *mic)
374 peer ? "Peer MIC" : "Server MIC",
376 mic, EAP_SAKE_MIC_LEN);
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_gpsk.c 258 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local
435 wpa_printf(MSG_DEBUG, "EAP-GPSK: Message too short for MIC "
443 data->specifier, payload, pos - payload, mic)
445 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to compute MIC");
449 if (os_memcmp(mic, pos, miclen) != 0) {
450 wpa_printf(MSG_INFO, "EAP-GPSK: Incorrect MIC in GPSK-2");
451 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen);
452 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen);
475 u8 mic[EAP_GPSK_MAX_MIC_LEN] local
    [all...]
eap_sake.c 205 u8 *mic; local
219 mic = wpabuf_put(msg, EAP_SAKE_MIC_LEN);
223 wpabuf_head(msg), wpabuf_len(msg), mic, mic))
225 wpa_printf(MSG_INFO, "EAP-SAKE: Failed to compute MIC");
  /hardware/broadcom/wlan/bcm4329/src/include/proto/
eapol.h 100 unsigned char mic[EAPOL_WPA_KEY_MIC_LEN]; /* Key MIC */ member in struct:__anon9577
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
wpa_ft.c 113 * @kck: 128-bit KCK for MIC or %NULL if no MIC is used
247 * MIC shall be calculated over:
253 * FTIE (with MIC field set to 0)
261 ftie->mic) < 0) {
262 wpa_printf(MSG_INFO, "FT: Failed to calculate MIC");
739 u8 mic[16]; local
817 mic) < 0) {
818 wpa_printf(MSG_DEBUG, "FT: Failed to calculate MIC");
822 if (os_memcmp(mic, ftie->mic, 16) != 0)
    [all...]
peerkey.c 714 /* Supplicant: swap tx/rx Mic keys */
883 /* Swap Tx/Rx keys for Michael MIC */
924 * peerkey_verify_eapol_key_mic - Verify PeerKey MIC
938 u8 mic[16]; local
950 os_memcpy(mic, key->key_mic, 16);
955 if (os_memcmp(mic, key->key_mic, 16) != 0) {
956 wpa_printf(MSG_WARNING, "RSN: Invalid EAPOL-Key MIC "
971 if (os_memcmp(mic, key->key_mic, 16) != 0) {
972 wpa_printf(MSG_WARNING, "RSN: Invalid EAPOL-Key MIC "
980 wpa_printf(MSG_WARNING, "RSN: Could not verify EAPOL-Key MIC "
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_gpsk.c 518 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local
525 wpa_printf(MSG_DEBUG, "EAP-GPSK: Message too short for MIC "
532 data->specifier, payload, pos - payload, mic)
534 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to compute MIC");
537 if (os_memcmp(mic, pos, miclen) != 0) {
538 wpa_printf(MSG_INFO, "EAP-GPSK: Incorrect MIC in GPSK-3");
539 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen);
540 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen);
  /external/wpa_supplicant_6/wpa_supplicant/src/drivers/
driver_bsd.c 468 struct ieee80211_michael_event *mic; local
523 mic = (struct ieee80211_michael_event *) &ifan[1];
525 "Michael MIC failure wireless event: "
526 "keyix=%u src_addr=" MACSTR, mic->iev_keyix,
527 MAC2STR(mic->iev_src));
531 !IEEE80211_IS_MULTICAST(mic->iev_dst);
  /external/libvpx/vp8/encoder/
pickinter.c 240 MODE_INFO *const mic = xd->mode_info_context; local
242 const B_PREDICTION_MODE A = vp8_above_bmi(mic, i, mis)->mode;
243 const B_PREDICTION_MODE L = vp8_left_bmi(mic, i)->mode;
255 mic->bmi[i].mode = xd->block[i].bmi.mode = best_mode;
rdopt.c 734 MODE_INFO *const mic = xd->mode_info_context; local
736 const B_PREDICTION_MODE A = vp8_above_bmi(mic, i, mis)->mode;
737 const B_PREDICTION_MODE L = vp8_left_bmi(mic, i)->mode;
749 mic->bmi[i].mode = xd->block[i].bmi.mode = best_mode;
945 MODE_INFO *const mic = xd->mode_info_context; local
981 *this_mv = col ? d[-1].bmi.mv.as_mv : vp8_left_bmi(mic, i)->mv.as_mv;
984 *this_mv = row ? d[-4].bmi.mv.as_mv : vp8_above_bmi(mic, i, mis)->mv.as_mv;
995 const MV mv = col ? d[-1].bmi.mv.as_mv : vp8_left_bmi(mic, i)->mv.as_mv;
    [all...]
  /external/srec/srec/cfront/
nisthdr.h 147 void setMicrophone(char *mic);

Completed in 230 milliseconds

1 2