HomeSort by relevance Sort by last modified time
    Searched defs:mic (Results 1 - 25 of 36) sorted by null

1 2

  /external/openssh/
auth2-gss.c 166 userauth_finish(authctxt, 0, "gssapi-with-mic");
254 userauth_finish(authctxt, authenticated, "gssapi-with-mic");
264 gss_buffer_desc mic, gssbuf; local
272 mic.value = packet_get_string(&len);
273 mic.length = len;
276 "gssapi-with-mic");
281 if (!GSS_ERROR(PRIVSEP(ssh_gssapi_checkmic(gssctxt, &gssbuf, &mic))))
284 logit("GSSAPI MIC check failed");
287 xfree(mic.value);
294 userauth_finish(authctxt, authenticated, "gssapi-with-mic");
    [all...]
  /packages/apps/VoiceDialer/src/com/android/voicedialer/
RecognizerEngine.java 110 * @param sampleRate the same rate coming from the mic or micFile
114 InputStream mic = null; local
146 if (false) Log.d(TAG, "using mic file");
147 mic = new FileInputStream(micFile);
149 hdr.read(mic);
152 mic = new MicrophoneInputStream(sampleRate, sampleRate * 15);
156 recognizerClient.onMicrophoneStart(mic);
159 if (mLogger != null) mic = mLogger.logInputStream(mic, sampleRate);
176 " avail " + mic.available())
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
wpa_ft.c 136 * @kck: 128-bit KCK for MIC or %NULL if no MIC is used
289 * MIC shall be calculated over:
295 * FTIE (with MIC field set to 0)
305 ric_ies_len, ftie->mic) < 0) {
306 wpa_printf(MSG_INFO, "FT: Failed to calculate MIC");
689 u8 mic[16]; local
775 wpa_printf(MSG_DEBUG, "FT: Unexpected IE count in MIC "
786 mic) < 0) {
787 wpa_printf(MSG_DEBUG, "FT: Failed to calculate MIC");
    [all...]
peerkey.c 711 /* Supplicant: swap tx/rx Mic keys */
880 /* Swap Tx/Rx keys for Michael MIC */
921 * peerkey_verify_eapol_key_mic - Verify PeerKey MIC
935 u8 mic[16]; local
947 os_memcpy(mic, key->key_mic, 16);
952 if (os_memcmp(mic, key->key_mic, 16) != 0) {
953 wpa_printf(MSG_WARNING, "RSN: Invalid EAPOL-Key MIC "
968 if (os_memcmp(mic, key->key_mic, 16) != 0) {
969 wpa_printf(MSG_WARNING, "RSN: Invalid EAPOL-Key MIC "
977 wpa_printf(MSG_WARNING, "RSN: Could not verify EAPOL-Key MIC "
    [all...]
tdls.c 51 u8 mic[TDLS_MIC_LEN]; member in struct:wpa_tdls_ftie
408 * wpa_tdls_ftie_mic - Calculate TDLS FTIE MIC
414 * @mic: Pointer for writing MIC
416 * Calculate MIC for TDLS frame.
420 const u8 *ftie, u8 *mic)
430 wpa_printf(MSG_WARNING, "TDLS: No memory for MIC calculation");
453 /* 7) FTIE, with the MIC field of the FTIE set to 0 */
456 os_memset(_ftie->mic, 0, TDLS_MIC_LEN);
459 wpa_hexdump(MSG_DEBUG, "TDLS: Data for FTIE MIC", buf, pos - buf)
532 u8 mic[16]; local
560 u8 mic[16]; local
    [all...]
wpa.c 35 * @key_mic: Pointer to the buffer to which the EAPOL-Key MIC is written
62 "version %d MIC", ver);
66 wpa_hexdump(MSG_DEBUG, "WPA: Derived Key MIC", key_mic, 16);
78 * @error: Indicate whether this is an Michael MIC error report
82 * used to request rekeying and it is usually called when a local Michael MIC
428 /* Supplicant: swap tx/rx Mic keys */
644 /* Swap Tx/Rx keys for Michael MIC */
1415 u8 mic[16]; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_gpsk.c 258 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local
435 wpa_printf(MSG_DEBUG, "EAP-GPSK: Message too short for MIC "
443 data->specifier, payload, pos - payload, mic)
445 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to compute MIC");
449 if (os_memcmp(mic, pos, miclen) != 0) {
450 wpa_printf(MSG_INFO, "EAP-GPSK: Incorrect MIC in GPSK-2");
451 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen);
452 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen);
475 u8 mic[EAP_GPSK_MAX_MIC_LEN] local
    [all...]
eap_sake.c 205 u8 *mic; local
219 mic = wpabuf_put(msg, EAP_SAKE_MIC_LEN);
223 wpabuf_head(msg), wpabuf_len(msg), mic, mic))
225 wpa_printf(MSG_INFO, "EAP-SAKE: Failed to compute MIC");
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
wpa_ft.c 113 * @kck: 128-bit KCK for MIC or %NULL if no MIC is used
247 * MIC shall be calculated over:
253 * FTIE (with MIC field set to 0)
261 ftie->mic) < 0) {
262 wpa_printf(MSG_INFO, "FT: Failed to calculate MIC");
739 u8 mic[16]; local
817 mic) < 0) {
818 wpa_printf(MSG_DEBUG, "FT: Failed to calculate MIC");
822 if (os_memcmp(mic, ftie->mic, 16) != 0)
    [all...]
peerkey.c 714 /* Supplicant: swap tx/rx Mic keys */
883 /* Swap Tx/Rx keys for Michael MIC */
924 * peerkey_verify_eapol_key_mic - Verify PeerKey MIC
938 u8 mic[16]; local
950 os_memcpy(mic, key->key_mic, 16);
955 if (os_memcmp(mic, key->key_mic, 16) != 0) {
956 wpa_printf(MSG_WARNING, "RSN: Invalid EAPOL-Key MIC "
971 if (os_memcmp(mic, key->key_mic, 16) != 0) {
972 wpa_printf(MSG_WARNING, "RSN: Invalid EAPOL-Key MIC "
980 wpa_printf(MSG_WARNING, "RSN: Could not verify EAPOL-Key MIC "
    [all...]
wpa.c 101 * @key_mic: Pointer to the buffer to which the EAPOL-Key MIC is written
134 * @error: Indicate whether this is an Michael MIC error report
138 * used to request rekeying and it is usually called when a local Michael MIC
436 /* Supplicant: swap tx/rx Mic keys */
644 /* Swap Tx/Rx keys for Michael MIC */
1266 u8 mic[16]; local
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_gpsk.c 253 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local
430 wpa_printf(MSG_DEBUG, "EAP-GPSK: Message too short for MIC "
438 data->specifier, payload, pos - payload, mic)
440 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to compute MIC");
444 if (os_memcmp(mic, pos, miclen) != 0) {
445 wpa_printf(MSG_INFO, "EAP-GPSK: Incorrect MIC in GPSK-2");
446 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen);
447 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen);
470 u8 mic[EAP_GPSK_MAX_MIC_LEN] local
    [all...]
eap_server_sake.c 200 u8 *mic; local
214 mic = wpabuf_put(msg, EAP_SAKE_MIC_LEN);
218 wpabuf_head(msg), wpabuf_len(msg), mic, mic))
220 wpa_printf(MSG_INFO, "EAP-SAKE: Failed to compute MIC");
  /external/wpa_supplicant_6/wpa_supplicant/src/drivers/
driver_bsd.c 468 struct ieee80211_michael_event *mic; local
523 mic = (struct ieee80211_michael_event *) &ifan[1];
525 "Michael MIC failure wireless event: "
526 "keyix=%u src_addr=" MACSTR, mic->iev_keyix,
527 MAC2STR(mic->iev_src));
531 !IEEE80211_IS_MULTICAST(mic->iev_dst);
driver_wext.c 376 const struct iw_michaelmicfailure *mic; local
379 if (len < sizeof(*mic))
382 mic = (const struct iw_michaelmicfailure *) ev;
384 wpa_printf(MSG_DEBUG, "Michael MIC failure wireless event: "
385 "flags=0x%x src_addr=" MACSTR, mic->flags,
386 MAC2STR(mic->src_addr.sa_data));
389 data.michael_mic_failure.unicast = !(mic->flags & IW_MICFAILURE_GROUP);
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_gpsk.c 518 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local
525 wpa_printf(MSG_DEBUG, "EAP-GPSK: Message too short for MIC "
532 data->specifier, payload, pos - payload, mic)
534 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to compute MIC");
537 if (os_memcmp(mic, pos, miclen) != 0) {
538 wpa_printf(MSG_INFO, "EAP-GPSK: Incorrect MIC in GPSK-3");
539 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen);
540 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen);
  /external/wpa_supplicant_8/src/eap_peer/
eap_gpsk.c 513 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local
520 wpa_printf(MSG_DEBUG, "EAP-GPSK: Message too short for MIC "
527 data->specifier, payload, pos - payload, mic)
529 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to compute MIC");
532 if (os_memcmp(mic, pos, miclen) != 0) {
533 wpa_printf(MSG_INFO, "EAP-GPSK: Incorrect MIC in GPSK-3");
534 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen);
535 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen);
  /external/libvpx/vp8/encoder/
pickinter.c 227 MODE_INFO *const mic = xd->mode_info_context; local
229 const B_PREDICTION_MODE A = vp8_above_bmi(mic, i, mis)->mode;
230 const B_PREDICTION_MODE L = vp8_left_bmi(mic, i)->mode;
240 mic->bmi[i].mode = xd->block[i].bmi.mode = best_mode;
  /device/moto/wingray/libaudio/
AudioHardware.cpp 512 int mic = getGain(AUDIO_HW_GAIN_MIC_GAIN, usecase); local
529 if (mMicVolume != mic) {
530 ALOGV("Set rx volume to %d", mic);
531 int ret = ::ioctl(mCpcapCtlFd, CPCAP_AUDIO_IN_SET_VOLUME, mic);
533 ALOGE("could not set mic volume: %s", strerror(errno));
536 mMicVolume = mic;
648 ALOGV("input device set %x not supported, defaulting to on-board mic",
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/common/
wpa_common.h 274 u8 mic[16]; member in struct:rsn_ftie
293 u8 *mic);
304 const u8 *ric, size_t ric_len, u8 *mic);
  /external/wpa_supplicant_8/src/ap/
wpa_auth.c 726 /* Supplicant reported a Michael MIC error */
729 "(STA detected Michael MIC failure (group=%d))",
734 "ignore Michael MIC failure report since "
738 "ignore Michael MIC failure report since "
1064 "received invalid EAPOL-Key: Key MIC not set");
1072 "received EAPOL-Key with invalid MIC");
1088 "invalid MIC");
1423 u8 mic[16]; local
    [all...]
wpa_auth_ft.c 695 _ftie->mic) < 0)
696 wpa_printf(MSG_DEBUG, "FT: Failed to calculate MIC");
939 u8 mic[16]; local
1046 wpa_printf(MSG_DEBUG, "FT: Unexpected IE count in MIC "
1057 mic) < 0) {
1058 wpa_printf(MSG_DEBUG, "FT: Failed to calculate MIC");
1062 if (os_memcmp(mic, ftie->mic, 16) != 0) {
1063 wpa_printf(MSG_DEBUG, "FT: Invalid MIC in FTIE");
1064 wpa_hexdump(MSG_MSGDUMP, "FT: Received MIC", ftie->mic, 16)
    [all...]
  /external/wpa_supplicant_8/src/drivers/
driver_bsd.c 734 struct ieee80211_michael_event *mic; local
788 mic = (struct ieee80211_michael_event *) &ifan[1];
790 "Michael MIC failure wireless event: "
791 "keyix=%u src_addr=" MACSTR, mic->iev_keyix,
792 MAC2STR(mic->iev_src));
795 data.michael_mic_failure.src = mic->iev_src;
1172 struct ieee80211_michael_event *mic; local
1258 mic = (struct ieee80211_michael_event *) &ifan[1];
1260 "Michael MIC failure wireless event: "
1261 "keyix=%u src_addr=" MACSTR, mic->iev_keyix
    [all...]
driver_wext.c 323 const struct iw_michaelmicfailure *mic; local
326 if (len < sizeof(*mic))
329 mic = (const struct iw_michaelmicfailure *) ev;
331 wpa_printf(MSG_DEBUG, "Michael MIC failure wireless event: "
332 "flags=0x%x src_addr=" MACSTR, mic->flags,
333 MAC2STR(mic->src_addr.sa_data));
336 data.michael_mic_failure.unicast = !(mic->flags & IW_MICFAILURE_GROUP);
    [all...]
  /hardware/ti/wlan/mac80211/wpa_supplicant_lib/
driver_mac80211.c 204 const struct iw_michaelmicfailure *mic; local
207 if (len < sizeof(*mic)) {
211 mic = (const struct iw_michaelmicfailure *) ev;
213 wpa_printf(MSG_DEBUG, "Michael MIC failure wireless event: "
214 "flags=0x%x src_addr=" MACSTR, mic->flags,
215 MAC2STR(mic->src_addr.sa_data));
218 data.michael_mic_failure.unicast = !(mic->flags & IW_MICFAILURE_GROUP);
    [all...]

Completed in 1270 milliseconds

1 2