/external/eigen/bench/btl/data/ |
mean.cxx | 41 Lib_Mean(const string & name, const double & mic, const double & moc):_lib_name(name),_mean_in_cache(mic),_mean_out_of_cache(moc){ 68 INFOS("!!! Error ... usage : main what mic Mic moc Moc filename1 finename2..."); 87 double mic=0; local 97 mic=mean_calc(tab_sizes,tab_mflops,min_in_cache,max_in_cache); 100 Lib_Mean cur_lib_mean(filename,mic,moc);
|
/external/openssh/ |
auth2-gss.c | 161 userauth_finish(authctxt, 0, "gssapi-with-mic", NULL); 248 userauth_finish(authctxt, authenticated, "gssapi-with-mic", NULL); 259 gss_buffer_desc mic, gssbuf; local 267 mic.value = packet_get_string(&len); 268 mic.length = len; 271 "gssapi-with-mic"); 276 if (!GSS_ERROR(PRIVSEP(ssh_gssapi_checkmic(gssctxt, &gssbuf, &mic)))) 279 logit("GSSAPI MIC check failed"); 282 free(mic.value); 289 userauth_finish(authctxt, authenticated, "gssapi-with-mic", NULL) [all...] |
monitor.c | 1750 gss_buffer_desc gssbuf, mic; local [all...] |
sshconnect2.c | 330 {"gssapi-with-mic", 710 gss_buffer_desc mic = GSS_C_EMPTY_BUFFER; local 730 /* send either complete or MIC, depending on mechanism */ 736 authctxt->service, "gssapi-with-mic"); 741 status = ssh_gssapi_sign(gssctxt, &gssbuf, &mic); 745 packet_put_string(mic.value, mic.length); 751 gss_release_buffer(&ms, &mic); [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_ft.c | 131 * @kck: 128-bit KCK for MIC or %NULL if no MIC is used 285 * MIC shall be calculated over: 291 * FTIE (with MIC field set to 0) 301 ric_ies_len, ftie->mic) < 0) { 302 wpa_printf(MSG_INFO, "FT: Failed to calculate MIC"); 597 /* Swap Tx/Rx keys for Michael MIC */ 675 u8 mic[WPA_EAPOL_KEY_MIC_MAX_LEN]; local 767 wpa_printf(MSG_DEBUG, "FT: Unexpected IE count in MIC " 778 mic) < 0) [all...] |
peerkey.c | 69 u8 *rbuf, *pos, *mic; local 82 mic = (u8 *) (err + 1); 94 WPA_PUT_BE16(mic + mic_len, (u16) kde_len); 95 pos = mic + mic_len + 2; 117 mic); 130 u8 *rbuf, *pos, *mic; local 155 mic = (u8 *) (reply + 1); 156 WPA_PUT_BE16(mic + mic_len, (u16) kde_len); 157 pos = mic + mic_len + 2; 170 mic); 325 u8 *mbuf, *mic; local 383 u8 *mbuf, *pos, *mic; local 922 u8 mic[WPA_EAPOL_KEY_MIC_MAX_LEN], *mic_pos; local 992 u8 bssid[ETH_ALEN], *rbuf, *pos, *count_pos, *mic; local [all...] |
tdls.c | 55 u8 mic[TDLS_MIC_LEN]; member in struct:wpa_tdls_ftie 463 * wpa_tdls_ftie_mic - Calculate TDLS FTIE MIC 469 * @mic: Pointer for writing MIC 471 * Calculate MIC for TDLS frame. 475 const u8 *ftie, u8 *mic) 485 wpa_printf(MSG_WARNING, "TDLS: No memory for MIC calculation"); 508 /* 7) FTIE, with the MIC field of the FTIE set to 0 */ 511 os_memset(_ftie->mic, 0, TDLS_MIC_LEN); 514 wpa_hexdump(MSG_DEBUG, "TDLS: Data for FTIE MIC", buf, pos - buf) 587 u8 mic[16]; local 615 u8 mic[16]; local [all...] |
wpa.c | 43 * @key_mic: Pointer to the buffer to which the EAPOL-Key MIC is written 79 "WPA: Failed to generate EAPOL-Key version %d key_mgmt 0x%x MIC", 86 wpa_hexdump(MSG_DEBUG, "WPA: Derived Key MIC", 90 /* AEAD cipher - Key MIC field not used */ 165 * @error: Indicate whether this is an Michael MIC error report 169 * used to request rekeying and it is usually called when a local Michael MIC 177 u8 bssid[ETH_ALEN], *rbuf, *key_mic, *mic; local 221 mic = (u8 *) (reply + 1); 222 WPA_PUT_BE16(mic + mic_len, 0); 226 key_mic = mic; 1696 u8 mic[WPA_EAPOL_KEY_MIC_MAX_LEN]; local 1966 u8 *mic, *key_data; local [all...] |
/external/curl/lib/ |
security.c | 308 static const char *mic = "MIC "; local 312 socket_write(conn, fd, mic, 4); 316 infof(conn->data, "Send: %s%s\n", prot_level == PROT_PRIVATE?enc:mic,
|
/external/libvpx/libvpx/vp9/encoder/ |
vp9_context_tree.h | 27 MODE_INFO mic; member in struct:__anon24749
|
/external/syslinux/gpxe/src/net/80211/ |
wpa_tkip.c | 83 /** TKIP trailer overhead (MIC + ICV) [assumes unfragmented] */ 86 /** TKIP MIC length */ 313 * @v key MIC key to use (8 bytes) 318 * @ret mic Calculated Michael MIC (8 bytes) 321 const void *data, size_t len, void *mic ) 361 /* Output MIC */ 364 memcpy ( mic, V, sizeof ( V ) ); 383 u8 mic[8]; local 417 /* Add MIC */ 456 u8 mic[8]; local [all...] |
wpa_ccmp.c | 61 /** CCMP MIC trailer overhead */ 178 * @v msrcv MIC value to encrypt or decrypt (may be NULL) 180 * @ret mdestv Encrypted or decrypted MIC value 246 * Calculate MIC on plaintext data using CBC-MAC 250 * @v data Data to calculate MIC over 252 * @v aad Additional authentication data, for MIC but not encryption 253 * @ret mic MIC value (unencrypted), 8 bytes 261 const void *aad, void *mic ) 306 /* Get MIC from final value of X * 329 u8 mic[8], tx_pn[6]; local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_gpsk.c | 247 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local 439 wpa_printf(MSG_DEBUG, "EAP-GPSK: Message too short for MIC " 447 data->specifier, payload, pos - payload, mic) 449 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to compute MIC"); 453 if (os_memcmp_const(mic, pos, miclen) != 0) { 454 wpa_printf(MSG_INFO, "EAP-GPSK: Incorrect MIC in GPSK-2"); 455 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen); 456 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen); 479 u8 mic[EAP_GPSK_MAX_MIC_LEN] local [all...] |
eap_server_sake.c | 185 u8 *mic; local 199 mic = wpabuf_put(msg, EAP_SAKE_MIC_LEN); 203 wpabuf_head(msg), wpabuf_len(msg), mic, mic)) 205 wpa_printf(MSG_INFO, "EAP-SAKE: Failed to compute MIC");
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_gpsk.c | 552 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local 559 wpa_printf(MSG_DEBUG, "EAP-GPSK: Message too short for MIC " 566 data->specifier, payload, pos - payload, mic) 568 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to compute MIC"); 571 if (os_memcmp_const(mic, pos, miclen) != 0) { 572 wpa_printf(MSG_INFO, "EAP-GPSK: Incorrect MIC in GPSK-3"); 573 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen); 574 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen);
|
/external/syslinux/gpxe/src/include/gpxe/ |
wpa.h | 57 /** Key MIC bit; set when the MIC field is valid, on messages 3 and 4 */ 63 /** Error bit; set on a MIC failure for TKIP */ 159 u8 mic[16]; member in struct:eapol_key_pkt 208 /** Length of a TKIP MIC key */ 233 /** Michael MIC keys */ 235 /** MIC key for packets from the AP */ 238 /** MIC key for packets to the AP */ 240 } __attribute__ (( packed )) mic; member in struct:tkip_tk 377 /** Calculate MIC over messag 387 void ( * mic ) ( const void *kck, const void *msg, size_t len, member in struct:wpa_kie [all...] |
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/ |
eapol.h | 114 unsigned char mic[EAPOL_WPA_KEY_MIC_LEN]; /* Key MIC */ member in struct:__anon41881
|
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ft.c | 762 _ftie->mic) < 0) 763 wpa_printf(MSG_DEBUG, "FT: Failed to calculate MIC"); 1104 u8 mic[WPA_EAPOL_KEY_MIC_MAX_LEN]; local [all...] |
wpa_auth.c | 809 /* Supplicant reported a Michael MIC error */ 812 "(STA detected Michael MIC failure (group=%d))", 817 "ignore Michael MIC failure report since " 821 "ignore Michael MIC failure report since " 875 "WPA: Earlier SNonce did not result in matching MIC"); 880 "WPA: Earlier SNonce resulted in matching MIC"); 903 u8 *mic; local 919 mic = (u8 *) (key + 1); 921 key_data = mic + mic_len + 2; 922 key_data_length = WPA_GET_BE16(mic + mic_len) 1650 u8 mic[WPA_EAPOL_KEY_MIC_MAX_LEN], *mic_pos; local 2456 const u8 *eapol_key_ie, *key_data, *mic; local [all...] |
/external/wpa_supplicant_8/src/common/ |
ieee802_11_common.h | 63 const u8 *mic; member in struct:ieee802_11_elems
|
wpa_common.h | 192 /* variable length Key MIC field */ 322 u8 mic[16]; member in struct:rsn_ftie 346 const u8 *buf, size_t len, u8 *mic); 372 const u8 *ric, size_t ric_len, u8 *mic);
|
/external/wpa_supplicant_8/src/drivers/ |
driver_bsd.c | 779 struct ieee80211_michael_event *mic; local 826 mic = (struct ieee80211_michael_event *) &ifan[1]; 828 "Michael MIC failure wireless event: " 829 "keyix=%u src_addr=" MACSTR, mic->iev_keyix, 830 MAC2STR(mic->iev_src)); 833 data.michael_mic_failure.src = mic->iev_src; 1219 struct ieee80211_michael_event *mic; local [all...] |
driver_wext.c | 309 const struct iw_michaelmicfailure *mic; local 312 if (len < sizeof(*mic)) 315 mic = (const struct iw_michaelmicfailure *) ev; 317 wpa_printf(MSG_DEBUG, "Michael MIC failure wireless event: " 318 "flags=0x%x src_addr=" MACSTR, mic->flags, 319 MAC2STR(mic->src_addr.sa_data)); 322 data.michael_mic_failure.unicast = !(mic->flags & IW_MICFAILURE_GROUP); [all...] |
/external/libvpx/libvpx/vp8/encoder/ |
pickinter.c | 300 MODE_INFO *const mic = xd->mode_info_context; local 307 const B_PREDICTION_MODE A = above_block_mode(mic, i, mis); 308 const B_PREDICTION_MODE L = left_block_mode(mic, i); 318 mic->bmi[i].as_mode = best_mode; 585 MODE_INFO *mic = x->e_mbd.mode_info_context; local 591 mic -= 1; 592 mv_l = mic->mbmi.mv; 594 if (mic->mbmi.ref_frame != INTRA_FRAME) { 601 mic -= x->e_mbd.mode_info_stride; 602 mv_al = mic->mbmi.mv [all...] |
/sdk/apps/DeviceConfig/src/com/example/android/deviceconfig/ |
ConfigGenerator.java | 122 public static final String NODE_MIC = "mic"; 366 Element mic = doc.createElement(PREFIX + NODE_MIC); local 367 hardware.appendChild(mic); 374 mic.appendChild(micText);
|