HomeSort by relevance Sort by last modified time
    Searched refs:mic (Results 1 - 25 of 50) sorted by null

1 2

  /packages/apps/VoiceDialer/src/com/android/voicedialer/
RecognizerEngine.java 110 * @param sampleRate the same rate coming from the mic or micFile
114 InputStream mic = null; local
146 if (false) Log.d(TAG, "using mic file");
147 mic = new FileInputStream(micFile);
149 hdr.read(mic);
152 mic = new MicrophoneInputStream(sampleRate, sampleRate * 15);
156 recognizerClient.onMicrophoneStart(mic);
159 if (mLogger != null) mic = mLogger.logInputStream(mic, sampleRate);
176 " avail " + mic.available())
    [all...]
RecognizerClient.java 38 public void onMicrophoneStart(InputStream mic);
  /external/openssh/
auth2-gss.c 166 userauth_finish(authctxt, 0, "gssapi-with-mic");
254 userauth_finish(authctxt, authenticated, "gssapi-with-mic");
264 gss_buffer_desc mic, gssbuf; local
272 mic.value = packet_get_string(&len);
273 mic.length = len;
276 "gssapi-with-mic");
281 if (!GSS_ERROR(PRIVSEP(ssh_gssapi_checkmic(gssctxt, &gssbuf, &mic))))
284 logit("GSSAPI MIC check failed");
287 xfree(mic.value);
294 userauth_finish(authctxt, authenticated, "gssapi-with-mic");
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/common/
wpa_common.c 29 * wpa_eapol_key_mic - Calculate EAPOL-Key MIC
34 * @mic: Pointer to the buffer to which the EAPOL-Key MIC is written
37 * Calculate EAPOL-Key MIC for an EAPOL-Key packet. The EAPOL-Key MIC field has
41 * description of the Key MIC calculation. It includes packet data from the
47 u8 *mic)
53 hmac_md5(key, 16, buf, len, mic);
57 os_memcpy(mic, hash, MD5_MAC_LEN);
61 return omac1_aes_128(key, buf, len, mic);
    [all...]
wpa_common.h 274 u8 mic[16]; member in struct:rsn_ftie
293 u8 *mic);
304 const u8 *ric, size_t ric_len, u8 *mic);
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_gpsk_common.h 64 int specifier, const u8 *data, size_t len, u8 *mic);
eap_gpsk_common.c 353 * eap_gpsk_mic_len - Get the length of the MIC
356 * Returns: MIC length in bytes
377 const u8 *data, size_t len, u8 *mic)
381 "AES-CMAC MIC", (unsigned long) sk_len);
385 return omac1_aes_128(sk, data, len, mic);
390 * eap_gpsk_compute_mic - Compute EAP-GPSK MIC for an EAP packet
395 * @data: Input data to MIC
397 * @mic: Buffer for the computed MIC, eap_gpsk_mic_len(cipher) bytes
401 int specifier, const u8 *data, size_t len, u8 *mic)
    [all...]
eap_sake_common.h 98 const u8 *mic_pos, u8 *mic);
eap_sake_common.c 308 * eap_sake_compute_mic - Compute EAP-SAKE MIC for an EAP packet
316 * @peer: MIC calculation for 0 = Server, 1 = Peer message
319 * @mic_pos: MIC position in the EAP packet (must be [eap .. eap + eap_len])
320 * @mic: Buffer for the computed 16-byte MIC
327 const u8 *mic_pos, u8 *mic)
374 peer ? "Peer MIC" : "Server MIC",
376 mic, EAP_SAKE_MIC_LEN);
  /external/wpa_supplicant_8/src/eap_common/
eap_gpsk_common.h 58 int specifier, const u8 *data, size_t len, u8 *mic);
eap_gpsk_common.c 344 * eap_gpsk_mic_len - Get the length of the MIC
347 * Returns: MIC length in bytes
368 const u8 *data, size_t len, u8 *mic)
372 "AES-CMAC MIC", (unsigned long) sk_len);
376 return omac1_aes_128(sk, data, len, mic);
381 * eap_gpsk_compute_mic - Compute EAP-GPSK MIC for an EAP packet
386 * @data: Input data to MIC
388 * @mic: Buffer for the computed MIC, eap_gpsk_mic_len(cipher) bytes
392 int specifier, const u8 *data, size_t len, u8 *mic)
    [all...]
eap_sake_common.h 92 const u8 *mic_pos, u8 *mic);
eap_sake_common.c 302 * eap_sake_compute_mic - Compute EAP-SAKE MIC for an EAP packet
310 * @peer: MIC calculation for 0 = Server, 1 = Peer message
313 * @mic_pos: MIC position in the EAP packet (must be [eap .. eap + eap_len])
314 * @mic: Buffer for the computed 16-byte MIC
321 const u8 *mic_pos, u8 *mic)
368 peer ? "Peer MIC" : "Server MIC",
370 mic, EAP_SAKE_MIC_LEN);
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_gpsk.c 258 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local
435 wpa_printf(MSG_DEBUG, "EAP-GPSK: Message too short for MIC "
443 data->specifier, payload, pos - payload, mic)
445 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to compute MIC");
449 if (os_memcmp(mic, pos, miclen) != 0) {
450 wpa_printf(MSG_INFO, "EAP-GPSK: Incorrect MIC in GPSK-2");
451 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen);
452 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen);
475 u8 mic[EAP_GPSK_MAX_MIC_LEN] local
    [all...]
eap_sake.c 205 u8 *mic; local
219 mic = wpabuf_put(msg, EAP_SAKE_MIC_LEN);
223 wpabuf_head(msg), wpabuf_len(msg), mic, mic))
225 wpa_printf(MSG_INFO, "EAP-SAKE: Failed to compute MIC");
  /external/wpa_supplicant_8/src/eap_server/
eap_server_gpsk.c 253 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local
430 wpa_printf(MSG_DEBUG, "EAP-GPSK: Message too short for MIC "
438 data->specifier, payload, pos - payload, mic)
440 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to compute MIC");
444 if (os_memcmp(mic, pos, miclen) != 0) {
445 wpa_printf(MSG_INFO, "EAP-GPSK: Incorrect MIC in GPSK-2");
446 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen);
447 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen);
470 u8 mic[EAP_GPSK_MAX_MIC_LEN] local
    [all...]
eap_server_sake.c 200 u8 *mic; local
214 mic = wpabuf_put(msg, EAP_SAKE_MIC_LEN);
218 wpabuf_head(msg), wpabuf_len(msg), mic, mic))
220 wpa_printf(MSG_INFO, "EAP-SAKE: Failed to compute MIC");
  /external/wpa_supplicant_8/src/rsn_supp/
tdls.c 51 u8 mic[TDLS_MIC_LEN]; member in struct:wpa_tdls_ftie
408 * wpa_tdls_ftie_mic - Calculate TDLS FTIE MIC
414 * @mic: Pointer for writing MIC
416 * Calculate MIC for TDLS frame.
420 const u8 *ftie, u8 *mic)
430 wpa_printf(MSG_WARNING, "TDLS: No memory for MIC calculation");
453 /* 7) FTIE, with the MIC field of the FTIE set to 0 */
456 os_memset(_ftie->mic, 0, TDLS_MIC_LEN);
459 wpa_hexdump(MSG_DEBUG, "TDLS: Data for FTIE MIC", buf, pos - buf)
532 u8 mic[16]; local
560 u8 mic[16]; local
    [all...]
wpa_ft.c 136 * @kck: 128-bit KCK for MIC or %NULL if no MIC is used
287 * MIC shall be calculated over:
293 * FTIE (with MIC field set to 0)
303 ric_ies_len, ftie->mic) < 0) {
304 wpa_printf(MSG_INFO, "FT: Failed to calculate MIC");
663 u8 mic[16]; local
749 wpa_printf(MSG_DEBUG, "FT: Unexpected IE count in MIC "
760 mic) < 0) {
761 wpa_printf(MSG_DEBUG, "FT: Failed to calculate MIC");
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
wpa_ft.c 113 * @kck: 128-bit KCK for MIC or %NULL if no MIC is used
247 * MIC shall be calculated over:
253 * FTIE (with MIC field set to 0)
261 ftie->mic) < 0) {
262 wpa_printf(MSG_INFO, "FT: Failed to calculate MIC");
739 u8 mic[16]; local
817 mic) < 0) {
818 wpa_printf(MSG_DEBUG, "FT: Failed to calculate MIC");
822 if (os_memcmp(mic, ftie->mic, 16) != 0)
    [all...]
  /external/wpa_supplicant_8/src/common/
wpa_common.h 280 u8 mic[16]; member in struct:rsn_ftie
305 u8 *mic);
316 const u8 *ric, size_t ric_len, u8 *mic);
wpa_common.c 23 * wpa_eapol_key_mic - Calculate EAPOL-Key MIC
28 * @mic: Pointer to the buffer to which the EAPOL-Key MIC is written
31 * Calculate EAPOL-Key MIC for an EAPOL-Key packet. The EAPOL-Key MIC field has
35 * description of the Key MIC calculation. It includes packet data from the
41 u8 *mic)
48 return hmac_md5(key, 16, buf, len, mic);
53 os_memcpy(mic, hash, MD5_MAC_LEN);
57 return omac1_aes_128(key, buf, len, mic);
    [all...]
  /external/wpa_supplicant_8/src/drivers/
driver_bsd.c 728 struct ieee80211_michael_event *mic; local
782 mic = (struct ieee80211_michael_event *) &ifan[1];
784 "Michael MIC failure wireless event: "
785 "keyix=%u src_addr=" MACSTR, mic->iev_keyix,
786 MAC2STR(mic->iev_src));
789 data.michael_mic_failure.src = mic->iev_src;
1166 struct ieee80211_michael_event *mic; local
1252 mic = (struct ieee80211_michael_event *) &ifan[1];
1254 "Michael MIC failure wireless event: "
1255 "keyix=%u src_addr=" MACSTR, mic->iev_keyix
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_gpsk.c 518 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local
525 wpa_printf(MSG_DEBUG, "EAP-GPSK: Message too short for MIC "
532 data->specifier, payload, pos - payload, mic)
534 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to compute MIC");
537 if (os_memcmp(mic, pos, miclen) != 0) {
538 wpa_printf(MSG_INFO, "EAP-GPSK: Incorrect MIC in GPSK-3");
539 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen);
540 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen);
  /external/wpa_supplicant_8/src/eap_peer/
eap_gpsk.c 513 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local
520 wpa_printf(MSG_DEBUG, "EAP-GPSK: Message too short for MIC "
527 data->specifier, payload, pos - payload, mic)
529 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to compute MIC");
532 if (os_memcmp(mic, pos, miclen) != 0) {
533 wpa_printf(MSG_INFO, "EAP-GPSK: Incorrect MIC in GPSK-3");
534 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen);
535 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen);

Completed in 2335 milliseconds

1 2