HomeSort by relevance Sort by last modified time
    Searched defs:mic (Results 1 - 25 of 65) sorted by null

1 2 3

  /external/eigen/bench/btl/data/
mean.cxx 41 Lib_Mean(const string & name, const double & mic, const double & moc):_lib_name(name),_mean_in_cache(mic),_mean_out_of_cache(moc){
68 INFOS("!!! Error ... usage : main what mic Mic moc Moc filename1 finename2...");
87 double mic=0; local
97 mic=mean_calc(tab_sizes,tab_mflops,min_in_cache,max_in_cache);
100 Lib_Mean cur_lib_mean(filename,mic,moc);
  /external/openssh/
auth2-gss.c 161 userauth_finish(authctxt, 0, "gssapi-with-mic", NULL);
248 userauth_finish(authctxt, authenticated, "gssapi-with-mic", NULL);
259 gss_buffer_desc mic, gssbuf; local
267 mic.value = packet_get_string(&len);
268 mic.length = len;
271 "gssapi-with-mic");
276 if (!GSS_ERROR(PRIVSEP(ssh_gssapi_checkmic(gssctxt, &gssbuf, &mic))))
279 logit("GSSAPI MIC check failed");
282 free(mic.value);
289 userauth_finish(authctxt, authenticated, "gssapi-with-mic", NULL)
    [all...]
monitor.c 1750 gss_buffer_desc gssbuf, mic; local
    [all...]
sshconnect2.c 330 {"gssapi-with-mic",
710 gss_buffer_desc mic = GSS_C_EMPTY_BUFFER; local
730 /* send either complete or MIC, depending on mechanism */
736 authctxt->service, "gssapi-with-mic");
741 status = ssh_gssapi_sign(gssctxt, &gssbuf, &mic);
745 packet_put_string(mic.value, mic.length);
751 gss_release_buffer(&ms, &mic);
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
wpa_ft.c 131 * @kck: 128-bit KCK for MIC or %NULL if no MIC is used
285 * MIC shall be calculated over:
291 * FTIE (with MIC field set to 0)
301 ric_ies_len, ftie->mic) < 0) {
302 wpa_printf(MSG_INFO, "FT: Failed to calculate MIC");
597 /* Swap Tx/Rx keys for Michael MIC */
675 u8 mic[WPA_EAPOL_KEY_MIC_MAX_LEN]; local
767 wpa_printf(MSG_DEBUG, "FT: Unexpected IE count in MIC "
778 mic) < 0)
    [all...]
peerkey.c 69 u8 *rbuf, *pos, *mic; local
82 mic = (u8 *) (err + 1);
94 WPA_PUT_BE16(mic + mic_len, (u16) kde_len);
95 pos = mic + mic_len + 2;
117 mic);
130 u8 *rbuf, *pos, *mic; local
155 mic = (u8 *) (reply + 1);
156 WPA_PUT_BE16(mic + mic_len, (u16) kde_len);
157 pos = mic + mic_len + 2;
170 mic);
325 u8 *mbuf, *mic; local
383 u8 *mbuf, *pos, *mic; local
922 u8 mic[WPA_EAPOL_KEY_MIC_MAX_LEN], *mic_pos; local
992 u8 bssid[ETH_ALEN], *rbuf, *pos, *count_pos, *mic; local
    [all...]
tdls.c 55 u8 mic[TDLS_MIC_LEN]; member in struct:wpa_tdls_ftie
463 * wpa_tdls_ftie_mic - Calculate TDLS FTIE MIC
469 * @mic: Pointer for writing MIC
471 * Calculate MIC for TDLS frame.
475 const u8 *ftie, u8 *mic)
485 wpa_printf(MSG_WARNING, "TDLS: No memory for MIC calculation");
508 /* 7) FTIE, with the MIC field of the FTIE set to 0 */
511 os_memset(_ftie->mic, 0, TDLS_MIC_LEN);
514 wpa_hexdump(MSG_DEBUG, "TDLS: Data for FTIE MIC", buf, pos - buf)
587 u8 mic[16]; local
615 u8 mic[16]; local
    [all...]
wpa.c 43 * @key_mic: Pointer to the buffer to which the EAPOL-Key MIC is written
79 "WPA: Failed to generate EAPOL-Key version %d key_mgmt 0x%x MIC",
86 wpa_hexdump(MSG_DEBUG, "WPA: Derived Key MIC",
90 /* AEAD cipher - Key MIC field not used */
165 * @error: Indicate whether this is an Michael MIC error report
169 * used to request rekeying and it is usually called when a local Michael MIC
177 u8 bssid[ETH_ALEN], *rbuf, *key_mic, *mic; local
221 mic = (u8 *) (reply + 1);
222 WPA_PUT_BE16(mic + mic_len, 0);
226 key_mic = mic;
1696 u8 mic[WPA_EAPOL_KEY_MIC_MAX_LEN]; local
1966 u8 *mic, *key_data; local
    [all...]
  /external/curl/lib/
security.c 308 static const char *mic = "MIC "; local
312 socket_write(conn, fd, mic, 4);
316 infof(conn->data, "Send: %s%s\n", prot_level == PROT_PRIVATE?enc:mic,
  /external/libvpx/libvpx/vp9/encoder/
vp9_context_tree.h 27 MODE_INFO mic; member in struct:__anon24749
  /external/syslinux/gpxe/src/net/80211/
wpa_tkip.c 83 /** TKIP trailer overhead (MIC + ICV) [assumes unfragmented] */
86 /** TKIP MIC length */
313 * @v key MIC key to use (8 bytes)
318 * @ret mic Calculated Michael MIC (8 bytes)
321 const void *data, size_t len, void *mic )
361 /* Output MIC */
364 memcpy ( mic, V, sizeof ( V ) );
383 u8 mic[8]; local
417 /* Add MIC */
456 u8 mic[8]; local
    [all...]
wpa_ccmp.c 61 /** CCMP MIC trailer overhead */
178 * @v msrcv MIC value to encrypt or decrypt (may be NULL)
180 * @ret mdestv Encrypted or decrypted MIC value
246 * Calculate MIC on plaintext data using CBC-MAC
250 * @v data Data to calculate MIC over
252 * @v aad Additional authentication data, for MIC but not encryption
253 * @ret mic MIC value (unencrypted), 8 bytes
261 const void *aad, void *mic )
306 /* Get MIC from final value of X *
329 u8 mic[8], tx_pn[6]; local
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_gpsk.c 247 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local
439 wpa_printf(MSG_DEBUG, "EAP-GPSK: Message too short for MIC "
447 data->specifier, payload, pos - payload, mic)
449 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to compute MIC");
453 if (os_memcmp_const(mic, pos, miclen) != 0) {
454 wpa_printf(MSG_INFO, "EAP-GPSK: Incorrect MIC in GPSK-2");
455 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen);
456 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen);
479 u8 mic[EAP_GPSK_MAX_MIC_LEN] local
    [all...]
eap_server_sake.c 185 u8 *mic; local
199 mic = wpabuf_put(msg, EAP_SAKE_MIC_LEN);
203 wpabuf_head(msg), wpabuf_len(msg), mic, mic))
205 wpa_printf(MSG_INFO, "EAP-SAKE: Failed to compute MIC");
  /external/wpa_supplicant_8/src/eap_peer/
eap_gpsk.c 552 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local
559 wpa_printf(MSG_DEBUG, "EAP-GPSK: Message too short for MIC "
566 data->specifier, payload, pos - payload, mic)
568 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to compute MIC");
571 if (os_memcmp_const(mic, pos, miclen) != 0) {
572 wpa_printf(MSG_INFO, "EAP-GPSK: Incorrect MIC in GPSK-3");
573 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen);
574 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen);
  /external/syslinux/gpxe/src/include/gpxe/
wpa.h 57 /** Key MIC bit; set when the MIC field is valid, on messages 3 and 4 */
63 /** Error bit; set on a MIC failure for TKIP */
159 u8 mic[16]; member in struct:eapol_key_pkt
208 /** Length of a TKIP MIC key */
233 /** Michael MIC keys */
235 /** MIC key for packets from the AP */
238 /** MIC key for packets to the AP */
240 } __attribute__ (( packed )) mic; member in struct:tkip_tk
377 /** Calculate MIC over messag
387 void ( * mic ) ( const void *kck, const void *msg, size_t len, member in struct:wpa_kie
    [all...]
  /hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/
eapol.h 114 unsigned char mic[EAPOL_WPA_KEY_MIC_LEN]; /* Key MIC */ member in struct:__anon41881
  /external/wpa_supplicant_8/src/ap/
wpa_auth_ft.c 762 _ftie->mic) < 0)
763 wpa_printf(MSG_DEBUG, "FT: Failed to calculate MIC");
1104 u8 mic[WPA_EAPOL_KEY_MIC_MAX_LEN]; local
    [all...]
wpa_auth.c 809 /* Supplicant reported a Michael MIC error */
812 "(STA detected Michael MIC failure (group=%d))",
817 "ignore Michael MIC failure report since "
821 "ignore Michael MIC failure report since "
875 "WPA: Earlier SNonce did not result in matching MIC");
880 "WPA: Earlier SNonce resulted in matching MIC");
903 u8 *mic; local
919 mic = (u8 *) (key + 1);
921 key_data = mic + mic_len + 2;
922 key_data_length = WPA_GET_BE16(mic + mic_len)
1650 u8 mic[WPA_EAPOL_KEY_MIC_MAX_LEN], *mic_pos; local
2456 const u8 *eapol_key_ie, *key_data, *mic; local
    [all...]
  /external/wpa_supplicant_8/src/common/
ieee802_11_common.h 63 const u8 *mic; member in struct:ieee802_11_elems
wpa_common.h 192 /* variable length Key MIC field */
322 u8 mic[16]; member in struct:rsn_ftie
346 const u8 *buf, size_t len, u8 *mic);
372 const u8 *ric, size_t ric_len, u8 *mic);
  /external/wpa_supplicant_8/src/drivers/
driver_bsd.c 779 struct ieee80211_michael_event *mic; local
826 mic = (struct ieee80211_michael_event *) &ifan[1];
828 "Michael MIC failure wireless event: "
829 "keyix=%u src_addr=" MACSTR, mic->iev_keyix,
830 MAC2STR(mic->iev_src));
833 data.michael_mic_failure.src = mic->iev_src;
1219 struct ieee80211_michael_event *mic; local
    [all...]
driver_wext.c 309 const struct iw_michaelmicfailure *mic; local
312 if (len < sizeof(*mic))
315 mic = (const struct iw_michaelmicfailure *) ev;
317 wpa_printf(MSG_DEBUG, "Michael MIC failure wireless event: "
318 "flags=0x%x src_addr=" MACSTR, mic->flags,
319 MAC2STR(mic->src_addr.sa_data));
322 data.michael_mic_failure.unicast = !(mic->flags & IW_MICFAILURE_GROUP);
    [all...]
  /external/libvpx/libvpx/vp8/encoder/
pickinter.c 300 MODE_INFO *const mic = xd->mode_info_context; local
307 const B_PREDICTION_MODE A = above_block_mode(mic, i, mis);
308 const B_PREDICTION_MODE L = left_block_mode(mic, i);
318 mic->bmi[i].as_mode = best_mode;
585 MODE_INFO *mic = x->e_mbd.mode_info_context; local
591 mic -= 1;
592 mv_l = mic->mbmi.mv;
594 if (mic->mbmi.ref_frame != INTRA_FRAME) {
601 mic -= x->e_mbd.mode_info_stride;
602 mv_al = mic->mbmi.mv
    [all...]
  /sdk/apps/DeviceConfig/src/com/example/android/deviceconfig/
ConfigGenerator.java 122 public static final String NODE_MIC = "mic";
366 Element mic = doc.createElement(PREFIX + NODE_MIC); local
367 hardware.appendChild(mic);
374 mic.appendChild(micText);

Completed in 2410 milliseconds

1 2 3