/packages/apps/VoiceDialer/src/com/android/voicedialer/ |
RecognizerEngine.java | 110 * @param sampleRate the same rate coming from the mic or micFile 114 InputStream mic = null; local 146 if (false) Log.d(TAG, "using mic file"); 147 mic = new FileInputStream(micFile); 149 hdr.read(mic); 152 mic = new MicrophoneInputStream(sampleRate, sampleRate * 15); 156 recognizerClient.onMicrophoneStart(mic); 159 if (mLogger != null) mic = mLogger.logInputStream(mic, sampleRate); 176 " avail " + mic.available()) [all...] |
RecognizerClient.java | 38 public void onMicrophoneStart(InputStream mic);
|
/external/openssh/ |
auth2-gss.c | 166 userauth_finish(authctxt, 0, "gssapi-with-mic"); 254 userauth_finish(authctxt, authenticated, "gssapi-with-mic"); 264 gss_buffer_desc mic, gssbuf; local 272 mic.value = packet_get_string(&len); 273 mic.length = len; 276 "gssapi-with-mic"); 281 if (!GSS_ERROR(PRIVSEP(ssh_gssapi_checkmic(gssctxt, &gssbuf, &mic)))) 284 logit("GSSAPI MIC check failed"); 287 xfree(mic.value); 294 userauth_finish(authctxt, authenticated, "gssapi-with-mic"); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/common/ |
wpa_common.c | 29 * wpa_eapol_key_mic - Calculate EAPOL-Key MIC 34 * @mic: Pointer to the buffer to which the EAPOL-Key MIC is written 37 * Calculate EAPOL-Key MIC for an EAPOL-Key packet. The EAPOL-Key MIC field has 41 * description of the Key MIC calculation. It includes packet data from the 47 u8 *mic) 53 hmac_md5(key, 16, buf, len, mic); 57 os_memcpy(mic, hash, MD5_MAC_LEN); 61 return omac1_aes_128(key, buf, len, mic); [all...] |
wpa_common.h | 274 u8 mic[16]; member in struct:rsn_ftie 293 u8 *mic); 304 const u8 *ric, size_t ric_len, u8 *mic);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_gpsk_common.h | 64 int specifier, const u8 *data, size_t len, u8 *mic);
|
eap_gpsk_common.c | 353 * eap_gpsk_mic_len - Get the length of the MIC 356 * Returns: MIC length in bytes 377 const u8 *data, size_t len, u8 *mic) 381 "AES-CMAC MIC", (unsigned long) sk_len); 385 return omac1_aes_128(sk, data, len, mic); 390 * eap_gpsk_compute_mic - Compute EAP-GPSK MIC for an EAP packet 395 * @data: Input data to MIC 397 * @mic: Buffer for the computed MIC, eap_gpsk_mic_len(cipher) bytes 401 int specifier, const u8 *data, size_t len, u8 *mic) [all...] |
eap_sake_common.h | 98 const u8 *mic_pos, u8 *mic);
|
eap_sake_common.c | 308 * eap_sake_compute_mic - Compute EAP-SAKE MIC for an EAP packet 316 * @peer: MIC calculation for 0 = Server, 1 = Peer message 319 * @mic_pos: MIC position in the EAP packet (must be [eap .. eap + eap_len]) 320 * @mic: Buffer for the computed 16-byte MIC 327 const u8 *mic_pos, u8 *mic) 374 peer ? "Peer MIC" : "Server MIC", 376 mic, EAP_SAKE_MIC_LEN);
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_gpsk_common.h | 58 int specifier, const u8 *data, size_t len, u8 *mic);
|
eap_gpsk_common.c | 344 * eap_gpsk_mic_len - Get the length of the MIC 347 * Returns: MIC length in bytes 368 const u8 *data, size_t len, u8 *mic) 372 "AES-CMAC MIC", (unsigned long) sk_len); 376 return omac1_aes_128(sk, data, len, mic); 381 * eap_gpsk_compute_mic - Compute EAP-GPSK MIC for an EAP packet 386 * @data: Input data to MIC 388 * @mic: Buffer for the computed MIC, eap_gpsk_mic_len(cipher) bytes 392 int specifier, const u8 *data, size_t len, u8 *mic) [all...] |
eap_sake_common.h | 92 const u8 *mic_pos, u8 *mic);
|
eap_sake_common.c | 302 * eap_sake_compute_mic - Compute EAP-SAKE MIC for an EAP packet 310 * @peer: MIC calculation for 0 = Server, 1 = Peer message 313 * @mic_pos: MIC position in the EAP packet (must be [eap .. eap + eap_len]) 314 * @mic: Buffer for the computed 16-byte MIC 321 const u8 *mic_pos, u8 *mic) 368 peer ? "Peer MIC" : "Server MIC", 370 mic, EAP_SAKE_MIC_LEN);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_gpsk.c | 258 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local 435 wpa_printf(MSG_DEBUG, "EAP-GPSK: Message too short for MIC " 443 data->specifier, payload, pos - payload, mic) 445 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to compute MIC"); 449 if (os_memcmp(mic, pos, miclen) != 0) { 450 wpa_printf(MSG_INFO, "EAP-GPSK: Incorrect MIC in GPSK-2"); 451 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen); 452 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen); 475 u8 mic[EAP_GPSK_MAX_MIC_LEN] local [all...] |
eap_sake.c | 205 u8 *mic; local 219 mic = wpabuf_put(msg, EAP_SAKE_MIC_LEN); 223 wpabuf_head(msg), wpabuf_len(msg), mic, mic)) 225 wpa_printf(MSG_INFO, "EAP-SAKE: Failed to compute MIC");
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_gpsk.c | 253 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local 430 wpa_printf(MSG_DEBUG, "EAP-GPSK: Message too short for MIC " 438 data->specifier, payload, pos - payload, mic) 440 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to compute MIC"); 444 if (os_memcmp(mic, pos, miclen) != 0) { 445 wpa_printf(MSG_INFO, "EAP-GPSK: Incorrect MIC in GPSK-2"); 446 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen); 447 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen); 470 u8 mic[EAP_GPSK_MAX_MIC_LEN] local [all...] |
eap_server_sake.c | 200 u8 *mic; local 214 mic = wpabuf_put(msg, EAP_SAKE_MIC_LEN); 218 wpabuf_head(msg), wpabuf_len(msg), mic, mic)) 220 wpa_printf(MSG_INFO, "EAP-SAKE: Failed to compute MIC");
|
/external/wpa_supplicant_8/src/rsn_supp/ |
tdls.c | 51 u8 mic[TDLS_MIC_LEN]; member in struct:wpa_tdls_ftie 408 * wpa_tdls_ftie_mic - Calculate TDLS FTIE MIC 414 * @mic: Pointer for writing MIC 416 * Calculate MIC for TDLS frame. 420 const u8 *ftie, u8 *mic) 430 wpa_printf(MSG_WARNING, "TDLS: No memory for MIC calculation"); 453 /* 7) FTIE, with the MIC field of the FTIE set to 0 */ 456 os_memset(_ftie->mic, 0, TDLS_MIC_LEN); 459 wpa_hexdump(MSG_DEBUG, "TDLS: Data for FTIE MIC", buf, pos - buf) 532 u8 mic[16]; local 560 u8 mic[16]; local [all...] |
wpa_ft.c | 136 * @kck: 128-bit KCK for MIC or %NULL if no MIC is used 289 * MIC shall be calculated over: 295 * FTIE (with MIC field set to 0) 305 ric_ies_len, ftie->mic) < 0) { 306 wpa_printf(MSG_INFO, "FT: Failed to calculate MIC"); 689 u8 mic[16]; local 775 wpa_printf(MSG_DEBUG, "FT: Unexpected IE count in MIC " 786 mic) < 0) { 787 wpa_printf(MSG_DEBUG, "FT: Failed to calculate MIC"); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
wpa_ft.c | 113 * @kck: 128-bit KCK for MIC or %NULL if no MIC is used 247 * MIC shall be calculated over: 253 * FTIE (with MIC field set to 0) 261 ftie->mic) < 0) { 262 wpa_printf(MSG_INFO, "FT: Failed to calculate MIC"); 739 u8 mic[16]; local 817 mic) < 0) { 818 wpa_printf(MSG_DEBUG, "FT: Failed to calculate MIC"); 822 if (os_memcmp(mic, ftie->mic, 16) != 0) [all...] |
/external/wpa_supplicant_8/src/common/ |
wpa_common.h | 276 u8 mic[16]; member in struct:rsn_ftie 301 u8 *mic); 312 const u8 *ric, size_t ric_len, u8 *mic);
|
wpa_common.c | 23 * wpa_eapol_key_mic - Calculate EAPOL-Key MIC 28 * @mic: Pointer to the buffer to which the EAPOL-Key MIC is written 31 * Calculate EAPOL-Key MIC for an EAPOL-Key packet. The EAPOL-Key MIC field has 35 * description of the Key MIC calculation. It includes packet data from the 41 u8 *mic) 47 return hmac_md5(key, 16, buf, len, mic); 51 os_memcpy(mic, hash, MD5_MAC_LEN); 55 return omac1_aes_128(key, buf, len, mic); [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_bsd.c | 734 struct ieee80211_michael_event *mic; local 788 mic = (struct ieee80211_michael_event *) &ifan[1]; 790 "Michael MIC failure wireless event: " 791 "keyix=%u src_addr=" MACSTR, mic->iev_keyix, 792 MAC2STR(mic->iev_src)); 795 data.michael_mic_failure.src = mic->iev_src; 1172 struct ieee80211_michael_event *mic; local 1258 mic = (struct ieee80211_michael_event *) &ifan[1]; 1260 "Michael MIC failure wireless event: " 1261 "keyix=%u src_addr=" MACSTR, mic->iev_keyix [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_gpsk.c | 518 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local 525 wpa_printf(MSG_DEBUG, "EAP-GPSK: Message too short for MIC " 532 data->specifier, payload, pos - payload, mic) 534 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to compute MIC"); 537 if (os_memcmp(mic, pos, miclen) != 0) { 538 wpa_printf(MSG_INFO, "EAP-GPSK: Incorrect MIC in GPSK-3"); 539 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen); 540 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_gpsk.c | 513 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local 520 wpa_printf(MSG_DEBUG, "EAP-GPSK: Message too short for MIC " 527 data->specifier, payload, pos - payload, mic) 529 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to compute MIC"); 532 if (os_memcmp(mic, pos, miclen) != 0) { 533 wpa_printf(MSG_INFO, "EAP-GPSK: Incorrect MIC in GPSK-3"); 534 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen); 535 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen);
|