/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.osgi_3.6.1.R36x_v20100806.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.eclipse.osgi_3.6.2.R36x_v20101103.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
/external/libvpx/vp8/encoder/ |
H A D | pickinter.c | 227 MODE_INFO *const mic = xd->mode_info_context; local 229 const B_PREDICTION_MODE A = vp8_above_bmi(mic, i, mis)->mode; 230 const B_PREDICTION_MODE L = vp8_left_bmi(mic, i)->mode; 240 mic->bmi[i].mode = xd->block[i].bmi.mode = best_mode;
|
H A D | rdopt.c | 694 MODE_INFO *const mic = xd->mode_info_context; local 701 const B_PREDICTION_MODE A = vp8_above_bmi(mic, i, mis)->mode; 702 const B_PREDICTION_MODE L = vp8_left_bmi(mic, i)->mode; 715 mic->bmi[i].mode = xd->block[i].bmi.mode = best_mode; 889 MODE_INFO *const mic = xd->mode_info_context; local 925 *this_mv = col ? d[-1].bmi.mv.as_mv : vp8_left_bmi(mic, i)->mv.as_mv; 928 *this_mv = row ? d[-4].bmi.mv.as_mv : vp8_above_bmi(mic, i, mis)->mv.as_mv; 939 const MV mv = col ? d[-1].bmi.mv.as_mv : vp8_left_bmi(mic, i)->mv.as_mv;
|
/external/openssh/ |
H A D | auth2-gss.c | 166 userauth_finish(authctxt, 0, "gssapi-with-mic"); 254 userauth_finish(authctxt, authenticated, "gssapi-with-mic"); 264 gss_buffer_desc mic, gssbuf; local 272 mic.value = packet_get_string(&len); 273 mic.length = len; 276 "gssapi-with-mic"); 281 if (!GSS_ERROR(PRIVSEP(ssh_gssapi_checkmic(gssctxt, &gssbuf, &mic)))) 287 xfree(mic.value); 294 userauth_finish(authctxt, authenticated, "gssapi-with-mic"); 298 "gssapi-with-mic", [all...] |
H A D | monitor.c | 2069 gss_buffer_desc gssbuf, mic; local 2075 mic.value = buffer_get_string(m, &len); 2076 mic.length = len; 2078 ret = ssh_gssapi_checkmic(gsscontext, &gssbuf, &mic); 2081 xfree(mic.value); 2107 auth_method = "gssapi-with-mic";
|
H A D | sshconnect2.c | 323 {"gssapi-with-mic", 684 gss_buffer_desc mic = GSS_C_EMPTY_BUFFER; local 710 authctxt->service, "gssapi-with-mic"); 715 status = ssh_gssapi_sign(gssctxt, &gssbuf, &mic); 719 packet_put_string(mic.value, mic.length); 725 gss_release_buffer(&ms, &mic);
|
/external/srec/srec/cfront/ |
H A D | nisthdr.h | 147 void setMicrophone(char *mic);
|
/external/wpa_supplicant_6/wpa_supplicant/src/common/ |
H A D | wpa_common.c | 34 * @mic: Pointer to the buffer to which the EAPOL-Key MIC is written 47 u8 *mic) 53 hmac_md5(key, 16, buf, len, mic); 57 os_memcpy(mic, hash, MD5_MAC_LEN); 61 return omac1_aes_128(key, buf, len, mic); 139 const u8 *ric, size_t ric_len, u8 *mic) 171 os_memset(_ftie->mic, 0, sizeof(_ftie->mic)); 180 if (omac1_aes_128(kck, buf, pos - buf, mic)) { 46 wpa_eapol_key_mic(const u8 *key, int ver, const u8 *buf, size_t len, u8 *mic) argument 135 wpa_ft_mic(const u8 *kck, const u8 *sta_addr, const u8 *ap_addr, u8 transaction_seqnum, const u8 *mdie, size_t mdie_len, const u8 *ftie, size_t ftie_len, const u8 *rsnie, size_t rsnie_len, const u8 *ric, size_t ric_len, u8 *mic) argument
|
H A D | wpa_common.h | 274 u8 mic[16]; member in struct:rsn_ftie 293 u8 *mic); 304 const u8 *ric, size_t ric_len, u8 *mic);
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
H A D | driver_bsd.c | 468 struct ieee80211_michael_event *mic; local 523 mic = (struct ieee80211_michael_event *) &ifan[1]; 526 "keyix=%u src_addr=" MACSTR, mic->iev_keyix, 527 MAC2STR(mic->iev_src)); 531 !IEEE80211_IS_MULTICAST(mic->iev_dst);
|
H A D | driver_nl80211.c | 510 const struct iw_michaelmicfailure *mic; local 513 if (len < sizeof(*mic)) 516 mic = (const struct iw_michaelmicfailure *) ev; 519 "flags=0x%x src_addr=" MACSTR, mic->flags, 520 MAC2STR(mic->src_addr.sa_data)); 523 data.michael_mic_failure.unicast = !(mic->flags & IW_MICFAILURE_GROUP);
|
H A D | driver_wext.c | 376 const struct iw_michaelmicfailure *mic; local 379 if (len < sizeof(*mic)) 382 mic = (const struct iw_michaelmicfailure *) ev; 385 "flags=0x%x src_addr=" MACSTR, mic->flags, 386 MAC2STR(mic->src_addr.sa_data)); 389 data.michael_mic_failure.unicast = !(mic->flags & IW_MICFAILURE_GROUP);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | eap_gpsk_common.c | 377 const u8 *data, size_t len, u8 *mic) 385 return omac1_aes_128(sk, data, len, mic); 397 * @mic: Buffer for the computed MIC, eap_gpsk_mic_len(cipher) bytes 401 int specifier, const u8 *data, size_t len, u8 *mic) 410 ret = eap_gpsk_compute_mic_aes(sk, sk_len, data, len, mic); 414 hmac_sha256(sk, sk_len, data, len, mic); 376 eap_gpsk_compute_mic_aes(const u8 *sk, size_t sk_len, const u8 *data, size_t len, u8 *mic) argument 400 eap_gpsk_compute_mic(const u8 *sk, size_t sk_len, int vendor, int specifier, const u8 *data, size_t len, u8 *mic) argument
|
H A D | eap_gpsk_common.h | 64 int specifier, const u8 *data, size_t len, u8 *mic);
|
H A D | eap_sake_common.c | 320 * @mic: Buffer for the computed 16-byte MIC 327 const u8 *mic_pos, u8 *mic) 376 mic, EAP_SAKE_MIC_LEN); 322 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
|
H A D | eap_sake_common.h | 98 const u8 *mic_pos, u8 *mic);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_gpsk.c | 518 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local 532 data->specifier, payload, pos - payload, mic) 537 if (os_memcmp(mic, pos, miclen) != 0) { 540 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_gpsk.c | 258 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local 443 data->specifier, payload, pos - payload, mic) 449 if (os_memcmp(mic, pos, miclen) != 0) { 452 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen); 475 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local 512 data->specifier, payload, pos - payload, mic) 518 if (os_memcmp(mic, pos, miclen) != 0) { 521 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen);
|
H A D | eap_sake.c | 205 u8 *mic; local 219 mic = wpabuf_put(msg, EAP_SAKE_MIC_LEN); 223 wpabuf_head(msg), wpabuf_len(msg), mic, mic))
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
H A D | peerkey.c | 938 u8 mic[16]; local 950 os_memcpy(mic, key->key_mic, 16); 955 if (os_memcmp(mic, key->key_mic, 16) != 0) { 971 if (os_memcmp(mic, key->key_mic, 16) != 0) {
|
H A D | wpa.c | 1266 u8 mic[16]; local 1269 os_memcpy(mic, key->key_mic, 16); 1274 if (os_memcmp(mic, key->key_mic, 16) != 0) { 1289 if (os_memcmp(mic, key->key_mic, 16) != 0) {
|
H A D | wpa_ft.c | 261 ftie->mic) < 0) { 739 u8 mic[16]; local 817 mic) < 0) { 822 if (os_memcmp(mic, ftie->mic, 16) != 0) { 824 wpa_hexdump(MSG_MSGDUMP, "FT: Received MIC", ftie->mic, 16); 825 wpa_hexdump(MSG_MSGDUMP, "FT: Calculated MIC", mic, 16);
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth.c | 1231 wpa_printf(MSG_DEBUG, "WPA: Send EAPOL(version=%d secure=%d mic=%d " 1391 u8 mic[16]; local 1399 os_memcpy(mic, key->key_mic, 16); 1403 os_memcmp(mic, key->key_mic, 16) != 0) 1405 os_memcpy(key->key_mic, mic, 16);
|
H A D | wpa_auth_ft.c | 732 _ftie->mic) < 0) 972 u8 mic[16]; local 1090 mic) < 0) { 1095 if (os_memcmp(mic, ftie->mic, 16) != 0) { 1099 wpa_hexdump(MSG_MSGDUMP, "FT: Received MIC", ftie->mic, 16); 1100 wpa_hexdump(MSG_MSGDUMP, "FT: Calculated MIC", mic, 16);
|