HomeSort by relevance Sort by last modified time
    Searched defs:mic (Results 1 - 25 of 26) sorted by null

1 2

  /external/eigen/bench/btl/data/
mean.cxx 41 Lib_Mean(const string & name, const double & mic, const double & moc):_lib_name(name),_mean_in_cache(mic),_mean_out_of_cache(moc){
68 INFOS("!!! Error ... usage : main what mic Mic moc Moc filename1 finename2...");
87 double mic=0; local
97 mic=mean_calc(tab_sizes,tab_mflops,min_in_cache,max_in_cache);
100 Lib_Mean cur_lib_mean(filename,mic,moc);
  /external/openssh/
auth2-gss.c 166 userauth_finish(authctxt, 0, "gssapi-with-mic");
254 userauth_finish(authctxt, authenticated, "gssapi-with-mic");
264 gss_buffer_desc mic, gssbuf; local
272 mic.value = packet_get_string(&len);
273 mic.length = len;
276 "gssapi-with-mic");
281 if (!GSS_ERROR(PRIVSEP(ssh_gssapi_checkmic(gssctxt, &gssbuf, &mic))))
284 logit("GSSAPI MIC check failed");
287 xfree(mic.value);
294 userauth_finish(authctxt, authenticated, "gssapi-with-mic");
    [all...]
monitor.c 2069 gss_buffer_desc gssbuf, mic; local
    [all...]
sshconnect2.c 323 {"gssapi-with-mic",
684 gss_buffer_desc mic = GSS_C_EMPTY_BUFFER; local
704 /* send either complete or MIC, depending on mechanism */
710 authctxt->service, "gssapi-with-mic");
715 status = ssh_gssapi_sign(gssctxt, &gssbuf, &mic);
719 packet_put_string(mic.value, mic.length);
725 gss_release_buffer(&ms, &mic);
    [all...]
  /packages/apps/VoiceDialer/src/com/android/voicedialer/
RecognizerEngine.java 110 * @param sampleRate the same rate coming from the mic or micFile
114 InputStream mic = null; local
146 if (false) Log.d(TAG, "using mic file");
147 mic = new FileInputStream(micFile);
149 hdr.read(mic);
152 mic = new MicrophoneInputStream(sampleRate, sampleRate * 15);
156 recognizerClient.onMicrophoneStart(mic);
159 if (mLogger != null) mic = mLogger.logInputStream(mic, sampleRate);
176 " avail " + mic.available())
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
wpa_ft.c 136 * @kck: 128-bit KCK for MIC or %NULL if no MIC is used
287 * MIC shall be calculated over:
293 * FTIE (with MIC field set to 0)
303 ric_ies_len, ftie->mic) < 0) {
304 wpa_printf(MSG_INFO, "FT: Failed to calculate MIC");
663 u8 mic[16]; local
749 wpa_printf(MSG_DEBUG, "FT: Unexpected IE count in MIC "
760 mic) < 0) {
761 wpa_printf(MSG_DEBUG, "FT: Failed to calculate MIC");
    [all...]
peerkey.c 703 /* Supplicant: swap tx/rx Mic keys */
872 /* Swap Tx/Rx keys for Michael MIC */
913 * peerkey_verify_eapol_key_mic - Verify PeerKey MIC
927 u8 mic[16]; local
939 os_memcpy(mic, key->key_mic, 16);
944 if (os_memcmp(mic, key->key_mic, 16) != 0) {
945 wpa_printf(MSG_WARNING, "RSN: Invalid EAPOL-Key MIC "
960 if (os_memcmp(mic, key->key_mic, 16) != 0) {
961 wpa_printf(MSG_WARNING, "RSN: Invalid EAPOL-Key MIC "
969 wpa_printf(MSG_WARNING, "RSN: Could not verify EAPOL-Key MIC "
    [all...]
tdls.c 51 u8 mic[TDLS_MIC_LEN]; member in struct:wpa_tdls_ftie
416 * wpa_tdls_ftie_mic - Calculate TDLS FTIE MIC
422 * @mic: Pointer for writing MIC
424 * Calculate MIC for TDLS frame.
428 const u8 *ftie, u8 *mic)
438 wpa_printf(MSG_WARNING, "TDLS: No memory for MIC calculation");
461 /* 7) FTIE, with the MIC field of the FTIE set to 0 */
464 os_memset(_ftie->mic, 0, TDLS_MIC_LEN);
467 wpa_hexdump(MSG_DEBUG, "TDLS: Data for FTIE MIC", buf, pos - buf)
540 u8 mic[16]; local
568 u8 mic[16]; local
    [all...]
wpa.c 35 * @key_mic: Pointer to the buffer to which the EAPOL-Key MIC is written
62 "version %d MIC", ver);
66 wpa_hexdump(MSG_DEBUG, "WPA: Derived Key MIC", key_mic, 16);
78 * @error: Indicate whether this is an Michael MIC error report
82 * used to request rekeying and it is usually called when a local Michael MIC
434 /* Supplicant: swap tx/rx Mic keys */
615 /* Swap Tx/Rx keys for Michael MIC */
1375 u8 mic[16]; local
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_gpsk.c 253 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local
430 wpa_printf(MSG_DEBUG, "EAP-GPSK: Message too short for MIC "
438 data->specifier, payload, pos - payload, mic)
440 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to compute MIC");
444 if (os_memcmp(mic, pos, miclen) != 0) {
445 wpa_printf(MSG_INFO, "EAP-GPSK: Incorrect MIC in GPSK-2");
446 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen);
447 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen);
470 u8 mic[EAP_GPSK_MAX_MIC_LEN] local
    [all...]
eap_server_sake.c 200 u8 *mic; local
214 mic = wpabuf_put(msg, EAP_SAKE_MIC_LEN);
218 wpabuf_head(msg), wpabuf_len(msg), mic, mic))
220 wpa_printf(MSG_INFO, "EAP-SAKE: Failed to compute MIC");
  /external/wpa_supplicant_8/src/eap_peer/
eap_gpsk.c 528 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local
535 wpa_printf(MSG_DEBUG, "EAP-GPSK: Message too short for MIC "
542 data->specifier, payload, pos - payload, mic)
544 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to compute MIC");
547 if (os_memcmp(mic, pos, miclen) != 0) {
548 wpa_printf(MSG_INFO, "EAP-GPSK: Incorrect MIC in GPSK-3");
549 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen);
550 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen);
  /hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/
eapol.h 114 unsigned char mic[EAPOL_WPA_KEY_MIC_LEN]; /* Key MIC */ member in struct:__anon20447
802.11.h 57 /* Includes MIC */
3315 uint8 mic[16]; member in struct:dot11_ft_ie
3350 uint8 mic[BIP_MIC_SIZE]; \/* mic *\/ member in struct:mmic_ie
    [all...]
  /external/libvpx/libvpx/vp8/encoder/
pickinter.c 200 MODE_INFO *const mic = xd->mode_info_context; local
208 const B_PREDICTION_MODE A = above_block_mode(mic, i, mis);
209 const B_PREDICTION_MODE L = left_block_mode(mic, i);
219 mic->bmi[i].as_mode = best_mode;
528 MODE_INFO *mic = x->e_mbd.mode_info_context; local
535 mic -= 1;
536 mv_l = mic->mbmi.mv;
538 if (mic->mbmi.ref_frame != INTRA_FRAME)
543 mic -= x->e_mbd.mode_info_stride;
544 mv_al = mic->mbmi.mv
    [all...]
rdopt.c 729 MODE_INFO *const mic = xd->mode_info_context; local
736 const B_PREDICTION_MODE A = above_block_mode(mic, i, mis);
737 const B_PREDICTION_MODE L = left_block_mode(mic, i);
751 mic->bmi[i].as_mode = best_mode;
951 MODE_INFO *const mic = xd->mode_info_context; local
988 this_mv->as_int = col ? d[-1].bmi.mv.as_int : left_block_mv(mic, i);
991 this_mv->as_int = row ? d[-4].bmi.mv.as_int : above_block_mv(mic, i, mis);
1005 left_block_mv(mic, i);
    [all...]
  /external/wpa_supplicant_8/src/ap/
wpa_auth_ft.c 732 _ftie->mic) < 0)
733 wpa_printf(MSG_DEBUG, "FT: Failed to calculate MIC");
972 u8 mic[16]; local
1079 wpa_printf(MSG_DEBUG, "FT: Unexpected IE count in MIC "
1090 mic) < 0) {
1091 wpa_printf(MSG_DEBUG, "FT: Failed to calculate MIC");
1095 if (os_memcmp(mic, ftie->mic, 16) != 0) {
1096 wpa_printf(MSG_DEBUG, "FT: Invalid MIC in FTIE");
1099 wpa_hexdump(MSG_MSGDUMP, "FT: Received MIC", ftie->mic, 16)
    [all...]
wpa_auth.c 709 /* Supplicant reported a Michael MIC error */
712 "(STA detected Michael MIC failure (group=%d))",
717 "ignore Michael MIC failure report since "
721 "ignore Michael MIC failure report since "
1050 "received invalid EAPOL-Key: Key MIC not set");
1058 "received EAPOL-Key with invalid MIC");
1074 "invalid MIC");
1397 u8 mic[16]; local
    [all...]
  /external/wpa_supplicant_8/src/drivers/
driver_bsd.c 728 struct ieee80211_michael_event *mic; local
782 mic = (struct ieee80211_michael_event *) &ifan[1];
784 "Michael MIC failure wireless event: "
785 "keyix=%u src_addr=" MACSTR, mic->iev_keyix,
786 MAC2STR(mic->iev_src));
789 data.michael_mic_failure.src = mic->iev_src;
1159 struct ieee80211_michael_event *mic; local
1245 mic = (struct ieee80211_michael_event *) &ifan[1];
1247 "Michael MIC failure wireless event: "
1248 "keyix=%u src_addr=" MACSTR, mic->iev_keyix
    [all...]
driver_wext.c 317 const struct iw_michaelmicfailure *mic; local
320 if (len < sizeof(*mic))
323 mic = (const struct iw_michaelmicfailure *) ev;
325 wpa_printf(MSG_DEBUG, "Michael MIC failure wireless event: "
326 "flags=0x%x src_addr=" MACSTR, mic->flags,
327 MAC2STR(mic->src_addr.sa_data));
330 data.michael_mic_failure.unicast = !(mic->flags & IW_MICFAILURE_GROUP);
    [all...]
  /hardware/ti/wlan/mac80211/wpa_supplicant_lib/
driver_mac80211.c 204 const struct iw_michaelmicfailure *mic; local
207 if (len < sizeof(*mic)) {
211 mic = (const struct iw_michaelmicfailure *) ev;
213 wpa_printf(MSG_DEBUG, "Michael MIC failure wireless event: "
214 "flags=0x%x src_addr=" MACSTR, mic->flags,
215 MAC2STR(mic->src_addr.sa_data));
218 data.michael_mic_failure.unicast = !(mic->flags & IW_MICFAILURE_GROUP);
    [all...]
  /external/wpa_supplicant_8/src/common/
wpa_common.h 290 u8 mic[16]; member in struct:rsn_ftie
315 u8 *mic);
326 const u8 *ric, size_t ric_len, u8 *mic);
  /sdk/apps/DeviceConfig/src/com/example/android/deviceconfig/
ConfigGenerator.java 122 public static final String NODE_MIC = "mic";
366 Element mic = doc.createElement(PREFIX + NODE_MIC); local
367 hardware.appendChild(mic);
374 mic.appendChild(micText);
  /external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/
org.eclipse.osgi_3.6.1.R36x_v20100806.jar 
org.eclipse.osgi_3.6.2.R36x_v20101103.jar 

Completed in 2038 milliseconds

1 2