/external/openssh/ |
auth2-gss.c | 166 userauth_finish(authctxt, 0, "gssapi-with-mic"); 254 userauth_finish(authctxt, authenticated, "gssapi-with-mic"); 264 gss_buffer_desc mic, gssbuf; local 272 mic.value = packet_get_string(&len); 273 mic.length = len; 276 "gssapi-with-mic"); 281 if (!GSS_ERROR(PRIVSEP(ssh_gssapi_checkmic(gssctxt, &gssbuf, &mic)))) 284 logit("GSSAPI MIC check failed"); 287 xfree(mic.value); 294 userauth_finish(authctxt, authenticated, "gssapi-with-mic"); [all...] |
/packages/apps/VoiceDialer/src/com/android/voicedialer/ |
RecognizerEngine.java | 110 * @param sampleRate the same rate coming from the mic or micFile 114 InputStream mic = null; local 146 if (false) Log.d(TAG, "using mic file"); 147 mic = new FileInputStream(micFile); 149 hdr.read(mic); 152 mic = new MicrophoneInputStream(sampleRate, sampleRate * 15); 156 recognizerClient.onMicrophoneStart(mic); 159 if (mLogger != null) mic = mLogger.logInputStream(mic, sampleRate); 176 " avail " + mic.available()) [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_ft.c | 136 * @kck: 128-bit KCK for MIC or %NULL if no MIC is used 289 * MIC shall be calculated over: 295 * FTIE (with MIC field set to 0) 305 ric_ies_len, ftie->mic) < 0) { 306 wpa_printf(MSG_INFO, "FT: Failed to calculate MIC"); 689 u8 mic[16]; local 775 wpa_printf(MSG_DEBUG, "FT: Unexpected IE count in MIC " 786 mic) < 0) { 787 wpa_printf(MSG_DEBUG, "FT: Failed to calculate MIC"); [all...] |
peerkey.c | 711 /* Supplicant: swap tx/rx Mic keys */ 880 /* Swap Tx/Rx keys for Michael MIC */ 921 * peerkey_verify_eapol_key_mic - Verify PeerKey MIC 935 u8 mic[16]; local 947 os_memcpy(mic, key->key_mic, 16); 952 if (os_memcmp(mic, key->key_mic, 16) != 0) { 953 wpa_printf(MSG_WARNING, "RSN: Invalid EAPOL-Key MIC " 968 if (os_memcmp(mic, key->key_mic, 16) != 0) { 969 wpa_printf(MSG_WARNING, "RSN: Invalid EAPOL-Key MIC " 977 wpa_printf(MSG_WARNING, "RSN: Could not verify EAPOL-Key MIC " [all...] |
tdls.c | 51 u8 mic[TDLS_MIC_LEN]; member in struct:wpa_tdls_ftie 408 * wpa_tdls_ftie_mic - Calculate TDLS FTIE MIC 414 * @mic: Pointer for writing MIC 416 * Calculate MIC for TDLS frame. 420 const u8 *ftie, u8 *mic) 430 wpa_printf(MSG_WARNING, "TDLS: No memory for MIC calculation"); 453 /* 7) FTIE, with the MIC field of the FTIE set to 0 */ 456 os_memset(_ftie->mic, 0, TDLS_MIC_LEN); 459 wpa_hexdump(MSG_DEBUG, "TDLS: Data for FTIE MIC", buf, pos - buf) 532 u8 mic[16]; local 560 u8 mic[16]; local [all...] |
wpa.c | 35 * @key_mic: Pointer to the buffer to which the EAPOL-Key MIC is written 62 "version %d MIC", ver); 66 wpa_hexdump(MSG_DEBUG, "WPA: Derived Key MIC", key_mic, 16); 78 * @error: Indicate whether this is an Michael MIC error report 82 * used to request rekeying and it is usually called when a local Michael MIC 428 /* Supplicant: swap tx/rx Mic keys */ 644 /* Swap Tx/Rx keys for Michael MIC */ 1415 u8 mic[16]; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_gpsk.c | 258 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local 435 wpa_printf(MSG_DEBUG, "EAP-GPSK: Message too short for MIC " 443 data->specifier, payload, pos - payload, mic) 445 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to compute MIC"); 449 if (os_memcmp(mic, pos, miclen) != 0) { 450 wpa_printf(MSG_INFO, "EAP-GPSK: Incorrect MIC in GPSK-2"); 451 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen); 452 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen); 475 u8 mic[EAP_GPSK_MAX_MIC_LEN] local [all...] |
eap_sake.c | 205 u8 *mic; local 219 mic = wpabuf_put(msg, EAP_SAKE_MIC_LEN); 223 wpabuf_head(msg), wpabuf_len(msg), mic, mic)) 225 wpa_printf(MSG_INFO, "EAP-SAKE: Failed to compute MIC");
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
wpa_ft.c | 113 * @kck: 128-bit KCK for MIC or %NULL if no MIC is used 247 * MIC shall be calculated over: 253 * FTIE (with MIC field set to 0) 261 ftie->mic) < 0) { 262 wpa_printf(MSG_INFO, "FT: Failed to calculate MIC"); 739 u8 mic[16]; local 817 mic) < 0) { 818 wpa_printf(MSG_DEBUG, "FT: Failed to calculate MIC"); 822 if (os_memcmp(mic, ftie->mic, 16) != 0) [all...] |
peerkey.c | 714 /* Supplicant: swap tx/rx Mic keys */ 883 /* Swap Tx/Rx keys for Michael MIC */ 924 * peerkey_verify_eapol_key_mic - Verify PeerKey MIC 938 u8 mic[16]; local 950 os_memcpy(mic, key->key_mic, 16); 955 if (os_memcmp(mic, key->key_mic, 16) != 0) { 956 wpa_printf(MSG_WARNING, "RSN: Invalid EAPOL-Key MIC " 971 if (os_memcmp(mic, key->key_mic, 16) != 0) { 972 wpa_printf(MSG_WARNING, "RSN: Invalid EAPOL-Key MIC " 980 wpa_printf(MSG_WARNING, "RSN: Could not verify EAPOL-Key MIC " [all...] |
wpa.c | 101 * @key_mic: Pointer to the buffer to which the EAPOL-Key MIC is written 134 * @error: Indicate whether this is an Michael MIC error report 138 * used to request rekeying and it is usually called when a local Michael MIC 436 /* Supplicant: swap tx/rx Mic keys */ 644 /* Swap Tx/Rx keys for Michael MIC */ 1266 u8 mic[16]; local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_gpsk.c | 253 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local 430 wpa_printf(MSG_DEBUG, "EAP-GPSK: Message too short for MIC " 438 data->specifier, payload, pos - payload, mic) 440 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to compute MIC"); 444 if (os_memcmp(mic, pos, miclen) != 0) { 445 wpa_printf(MSG_INFO, "EAP-GPSK: Incorrect MIC in GPSK-2"); 446 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen); 447 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen); 470 u8 mic[EAP_GPSK_MAX_MIC_LEN] local [all...] |
eap_server_sake.c | 200 u8 *mic; local 214 mic = wpabuf_put(msg, EAP_SAKE_MIC_LEN); 218 wpabuf_head(msg), wpabuf_len(msg), mic, mic)) 220 wpa_printf(MSG_INFO, "EAP-SAKE: Failed to compute MIC");
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver_bsd.c | 468 struct ieee80211_michael_event *mic; local 523 mic = (struct ieee80211_michael_event *) &ifan[1]; 525 "Michael MIC failure wireless event: " 526 "keyix=%u src_addr=" MACSTR, mic->iev_keyix, 527 MAC2STR(mic->iev_src)); 531 !IEEE80211_IS_MULTICAST(mic->iev_dst);
|
driver_wext.c | 376 const struct iw_michaelmicfailure *mic; local 379 if (len < sizeof(*mic)) 382 mic = (const struct iw_michaelmicfailure *) ev; 384 wpa_printf(MSG_DEBUG, "Michael MIC failure wireless event: " 385 "flags=0x%x src_addr=" MACSTR, mic->flags, 386 MAC2STR(mic->src_addr.sa_data)); 389 data.michael_mic_failure.unicast = !(mic->flags & IW_MICFAILURE_GROUP); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_gpsk.c | 518 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local 525 wpa_printf(MSG_DEBUG, "EAP-GPSK: Message too short for MIC " 532 data->specifier, payload, pos - payload, mic) 534 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to compute MIC"); 537 if (os_memcmp(mic, pos, miclen) != 0) { 538 wpa_printf(MSG_INFO, "EAP-GPSK: Incorrect MIC in GPSK-3"); 539 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen); 540 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_gpsk.c | 513 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local 520 wpa_printf(MSG_DEBUG, "EAP-GPSK: Message too short for MIC " 527 data->specifier, payload, pos - payload, mic) 529 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to compute MIC"); 532 if (os_memcmp(mic, pos, miclen) != 0) { 533 wpa_printf(MSG_INFO, "EAP-GPSK: Incorrect MIC in GPSK-3"); 534 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen); 535 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen);
|
/external/libvpx/vp8/encoder/ |
pickinter.c | 227 MODE_INFO *const mic = xd->mode_info_context; local 229 const B_PREDICTION_MODE A = vp8_above_bmi(mic, i, mis)->mode; 230 const B_PREDICTION_MODE L = vp8_left_bmi(mic, i)->mode; 240 mic->bmi[i].mode = xd->block[i].bmi.mode = best_mode;
|
/device/moto/wingray/libaudio/ |
AudioHardware.cpp | 512 int mic = getGain(AUDIO_HW_GAIN_MIC_GAIN, usecase); local 529 if (mMicVolume != mic) { 530 ALOGV("Set rx volume to %d", mic); 531 int ret = ::ioctl(mCpcapCtlFd, CPCAP_AUDIO_IN_SET_VOLUME, mic); 533 ALOGE("could not set mic volume: %s", strerror(errno)); 536 mMicVolume = mic; 648 ALOGV("input device set %x not supported, defaulting to on-board mic", [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/common/ |
wpa_common.h | 274 u8 mic[16]; member in struct:rsn_ftie 293 u8 *mic); 304 const u8 *ric, size_t ric_len, u8 *mic);
|
/external/wpa_supplicant_8/src/ap/ |
wpa_auth.c | 726 /* Supplicant reported a Michael MIC error */ 729 "(STA detected Michael MIC failure (group=%d))", 734 "ignore Michael MIC failure report since " 738 "ignore Michael MIC failure report since " 1064 "received invalid EAPOL-Key: Key MIC not set"); 1072 "received EAPOL-Key with invalid MIC"); 1088 "invalid MIC"); 1423 u8 mic[16]; local [all...] |
wpa_auth_ft.c | 695 _ftie->mic) < 0) 696 wpa_printf(MSG_DEBUG, "FT: Failed to calculate MIC"); 939 u8 mic[16]; local 1046 wpa_printf(MSG_DEBUG, "FT: Unexpected IE count in MIC " 1057 mic) < 0) { 1058 wpa_printf(MSG_DEBUG, "FT: Failed to calculate MIC"); 1062 if (os_memcmp(mic, ftie->mic, 16) != 0) { 1063 wpa_printf(MSG_DEBUG, "FT: Invalid MIC in FTIE"); 1064 wpa_hexdump(MSG_MSGDUMP, "FT: Received MIC", ftie->mic, 16) [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_bsd.c | 734 struct ieee80211_michael_event *mic; local 788 mic = (struct ieee80211_michael_event *) &ifan[1]; 790 "Michael MIC failure wireless event: " 791 "keyix=%u src_addr=" MACSTR, mic->iev_keyix, 792 MAC2STR(mic->iev_src)); 795 data.michael_mic_failure.src = mic->iev_src; 1172 struct ieee80211_michael_event *mic; local 1258 mic = (struct ieee80211_michael_event *) &ifan[1]; 1260 "Michael MIC failure wireless event: " 1261 "keyix=%u src_addr=" MACSTR, mic->iev_keyix [all...] |
driver_wext.c | 323 const struct iw_michaelmicfailure *mic; local 326 if (len < sizeof(*mic)) 329 mic = (const struct iw_michaelmicfailure *) ev; 331 wpa_printf(MSG_DEBUG, "Michael MIC failure wireless event: " 332 "flags=0x%x src_addr=" MACSTR, mic->flags, 333 MAC2STR(mic->src_addr.sa_data)); 336 data.michael_mic_failure.unicast = !(mic->flags & IW_MICFAILURE_GROUP); [all...] |
/hardware/ti/wlan/mac80211/wpa_supplicant_lib/ |
driver_mac80211.c | 204 const struct iw_michaelmicfailure *mic; local 207 if (len < sizeof(*mic)) { 211 mic = (const struct iw_michaelmicfailure *) ev; 213 wpa_printf(MSG_DEBUG, "Michael MIC failure wireless event: " 214 "flags=0x%x src_addr=" MACSTR, mic->flags, 215 MAC2STR(mic->src_addr.sa_data)); 218 data.michael_mic_failure.unicast = !(mic->flags & IW_MICFAILURE_GROUP); [all...] |