/third_party/alsa-utils/nhlt/ |
H A D | nhlt-dmic-info.c | 98 static int nhlt_dmic_config(FILE *out, uint8_t *dmic, uint8_t mic) in nhlt_dmic_config() argument 102 if (mic > 0) in nhlt_dmic_config() 105 fprintf(out, "\t\t\t\"channel\":%i,\n", mic); in nhlt_dmic_config() 143 uint8_t config_type, array_type, mic, num_mics; in nhlt_dmic_ep_to_json() local 152 if (config_type != 1) /* mic array */ in nhlt_dmic_ep_to_json() 163 for (mic = 0; mic < num_mics; mic++) { in nhlt_dmic_ep_to_json() 168 if (mic == 0) in nhlt_dmic_ep_to_json() 170 res = nhlt_dmic_config(out, ep + off + 4, mic); in nhlt_dmic_ep_to_json() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_gpsk.c | 247 u8 mic[EAP_GPSK_MAX_MIC_LEN]; in eap_gpsk_process_gpsk_2() local 446 data->specifier, payload, pos - payload, mic) in eap_gpsk_process_gpsk_2() 452 if (os_memcmp_const(mic, pos, miclen) != 0) { in eap_gpsk_process_gpsk_2() 455 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen); in eap_gpsk_process_gpsk_2() 478 u8 mic[EAP_GPSK_MAX_MIC_LEN]; in eap_gpsk_process_gpsk_4() local 515 data->specifier, payload, pos - payload, mic) in eap_gpsk_process_gpsk_4() 521 if (os_memcmp_const(mic, pos, miclen) != 0) { in eap_gpsk_process_gpsk_4() 524 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen); in eap_gpsk_process_gpsk_4()
|
H A D | eap_server_sake.c | 185 u8 *mic; in eap_sake_build_confirm() local 199 mic = wpabuf_put(msg, EAP_SAKE_MIC_LEN); in eap_sake_build_confirm() 203 wpabuf_head(msg), wpabuf_len(msg), mic, mic)) in eap_sake_build_confirm()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_server_gpsk.c | 247 u8 mic[EAP_GPSK_MAX_MIC_LEN]; in eap_gpsk_process_gpsk_2() local 447 data->specifier, payload, pos - payload, mic) in eap_gpsk_process_gpsk_2() 453 if (os_memcmp_const(mic, pos, miclen) != 0) { in eap_gpsk_process_gpsk_2() 456 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen); in eap_gpsk_process_gpsk_2() 479 u8 mic[EAP_GPSK_MAX_MIC_LEN]; in eap_gpsk_process_gpsk_4() local 516 data->specifier, payload, pos - payload, mic) in eap_gpsk_process_gpsk_4() 522 if (os_memcmp_const(mic, pos, miclen) != 0) { in eap_gpsk_process_gpsk_4() 525 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen); in eap_gpsk_process_gpsk_4()
|
H A D | eap_server_sake.c | 185 u8 *mic; in eap_sake_build_confirm() local 199 mic = wpabuf_put(msg, EAP_SAKE_MIC_LEN); in eap_sake_build_confirm() 203 wpabuf_head(msg), wpabuf_len(msg), mic, mic)) in eap_sake_build_confirm()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/ |
H A D | tdls.c | 56 u8 mic[TDLS_MIC_LEN]; member 467 * @mic: Pointer for writing MIC 473 const u8 *ftie, u8 *mic) in wpa_tdls_ftie_mic() 509 os_memset(_ftie->mic, 0, TDLS_MIC_LEN); in wpa_tdls_ftie_mic() 514 ret = omac1_aes_128(kck, buf, pos - buf, mic); in wpa_tdls_ftie_mic() 516 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE MIC", mic, 16); in wpa_tdls_ftie_mic() 529 * @mic: Pointer for writing MIC 535 const u8 *ftie, u8 *mic) in wpa_tdls_key_mic_teardown() 568 os_memset(_ftie->mic, 0, TDLS_MIC_LEN); in wpa_tdls_key_mic_teardown() 573 ret = omac1_aes_128(kck, buf, pos - buf, mic); in wpa_tdls_key_mic_teardown() 471 wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid, const u8 *rsnie, const u8 *timeoutie, const u8 *ftie, u8 *mic) wpa_tdls_ftie_mic() argument 533 wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, u8 dtoken, const u8 *lnkid, const u8 *ftie, u8 *mic) wpa_tdls_key_mic_teardown() argument 585 u8 mic[16]; wpa_supplicant_verify_tdls_mic() local 613 u8 mic[16]; wpa_supplicant_verify_tdls_mic_teardown() local [all...] |
H A D | wpa_ft.c | 310 fte_mic = ftie->mic; in wpa_ft_gen_req_ies() 320 fte_mic = ftie->mic; in wpa_ft_gen_req_ies() 847 u8 mic[WPA_EAPOL_KEY_MIC_MAX_LEN]; in wpa_ft_validate_reassoc_resp() local 892 fte_mic = ftie->mic; in wpa_ft_validate_reassoc_resp() 905 fte_mic = ftie->mic; in wpa_ft_validate_reassoc_resp() 985 mic) < 0) { in wpa_ft_validate_reassoc_resp() 990 if (os_memcmp_const(mic, fte_mic, 16) != 0) { in wpa_ft_validate_reassoc_resp() 993 wpa_hexdump(MSG_MSGDUMP, "FT: Calculated MIC", mic, 16); in wpa_ft_validate_reassoc_resp()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/ |
H A D | tdls.c | 56 u8 mic[TDLS_MIC_LEN]; member 479 * @mic: Pointer for writing MIC 485 const u8 *ftie, u8 *mic) 521 os_memset(_ftie->mic, 0, TDLS_MIC_LEN); 526 ret = omac1_aes_128(kck, buf, pos - buf, mic); 528 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE MIC", mic, 16); 541 * @mic: Pointer for writing MIC 547 const u8 *ftie, u8 *mic) 580 os_memset(_ftie->mic, 0, TDLS_MIC_LEN); 585 ret = omac1_aes_128(kck, buf, pos - buf, mic); [all...] |
H A D | wpa_ft.c | 339 fte_mic = ftie->mic; in wpa_ft_gen_req_ies() 350 fte_mic = ftie->mic; in wpa_ft_gen_req_ies() 1002 u8 mic[WPA_EAPOL_KEY_MIC_MAX_LEN]; 1049 fte_mic = ftie->mic; 1063 fte_mic = ftie->mic; 1147 mic) < 0) { 1152 if (os_memcmp_const(mic, fte_mic, 16) != 0) { 1155 wpa_hexdump(MSG_MSGDUMP, "FT: Calculated MIC", mic, 16);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/ |
H A D | wpa_common.c | 180 * @mic: Pointer to the buffer to which the EAPOL-Key MIC is written 193 const u8 *buf, size_t len, u8 *mic) in wpa_eapol_key_mic() 207 return hmac_md5(key, key_len, buf, len, mic); in wpa_eapol_key_mic() 213 os_memcpy(mic, hash, MD5_MAC_LEN); in wpa_eapol_key_mic() 218 return omac1_aes_128(key, buf, len, mic); in wpa_eapol_key_mic() 227 return omac1_aes_128(key, buf, len, mic); in wpa_eapol_key_mic() 233 return omac1_aes_128(key, buf, len, mic); in wpa_eapol_key_mic() 241 os_memcpy(mic, hash, MD5_MAC_LEN); in wpa_eapol_key_mic() 250 os_memcpy(mic, hash, 24); in wpa_eapol_key_mic() 273 os_memcpy(mic, has in wpa_eapol_key_mic() 192 wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver, const u8 *buf, size_t len, u8 *mic) wpa_eapol_key_mic() argument 754 wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, const u8 *ap_addr, u8 transaction_seqnum, const u8 *mdie, size_t mdie_len, const u8 *ftie, size_t ftie_len, const u8 *rsnie, size_t rsnie_len, const u8 *ric, size_t ric_len, u8 *mic) wpa_ft_mic() argument [all...] |
H A D | wpa_common.h | 313 u8 mic[16]; member 321 u8 mic[24]; member 346 const u8 *buf, size_t len, u8 *mic); 375 const u8 *ric, size_t ric_len, u8 *mic);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_gpsk_common.c | 501 const u8 *data, size_t len, u8 *mic) in eap_gpsk_compute_mic_aes() 509 return omac1_aes_128(sk, data, len, mic); in eap_gpsk_compute_mic_aes() 521 * @mic: Buffer for the computed MIC, eap_gpsk_mic_len(cipher) bytes 525 int specifier, const u8 *data, size_t len, u8 *mic) in eap_gpsk_compute_mic() 534 ret = eap_gpsk_compute_mic_aes(sk, sk_len, data, len, mic); in eap_gpsk_compute_mic() 538 ret = hmac_sha256(sk, sk_len, data, len, mic); in eap_gpsk_compute_mic() 500 eap_gpsk_compute_mic_aes(const u8 *sk, size_t sk_len, const u8 *data, size_t len, u8 *mic) eap_gpsk_compute_mic_aes() argument 524 eap_gpsk_compute_mic(const u8 *sk, size_t sk_len, int vendor, int specifier, const u8 *data, size_t len, u8 *mic) eap_gpsk_compute_mic() argument
|
H A D | eap_gpsk_common.h | 64 int specifier, const u8 *data, size_t len, u8 *mic);
|
H A D | eap_sake_common.h | 92 const u8 *mic_pos, u8 *mic);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_gpsk_common.c | 501 const u8 *data, size_t len, u8 *mic) in eap_gpsk_compute_mic_aes() 509 return omac1_aes_128(sk, data, len, mic); in eap_gpsk_compute_mic_aes() 521 * @mic: Buffer for the computed MIC, eap_gpsk_mic_len(cipher) bytes 525 int specifier, const u8 *data, size_t len, u8 *mic) in eap_gpsk_compute_mic() 534 ret = eap_gpsk_compute_mic_aes(sk, sk_len, data, len, mic); in eap_gpsk_compute_mic() 538 ret = hmac_sha256(sk, sk_len, data, len, mic); in eap_gpsk_compute_mic() 500 eap_gpsk_compute_mic_aes(const u8 *sk, size_t sk_len, const u8 *data, size_t len, u8 *mic) eap_gpsk_compute_mic_aes() argument 524 eap_gpsk_compute_mic(const u8 *sk, size_t sk_len, int vendor, int specifier, const u8 *data, size_t len, u8 *mic) eap_gpsk_compute_mic() argument
|
H A D | eap_gpsk_common.h | 64 int specifier, const u8 *data, size_t len, u8 *mic);
|
H A D | eap_sake_common.h | 92 const u8 *mic_pos, u8 *mic);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | wpa_common.c | 191 * @mic: Pointer to the buffer to which the EAPOL-Key MIC is written 204 const u8 *buf, size_t len, u8 *mic) in wpa_eapol_key_mic() 218 return hmac_md5(key, key_len, buf, len, mic); in wpa_eapol_key_mic() 224 os_memcpy(mic, hash, MD5_MAC_LEN); in wpa_eapol_key_mic() 228 return omac1_aes_128(key, buf, len, mic); in wpa_eapol_key_mic() 236 return omac1_aes_128(key, buf, len, mic); in wpa_eapol_key_mic() 260 os_memcpy(mic, hash, key_len); in wpa_eapol_key_mic() 267 return omac1_aes_128(key, buf, len, mic); in wpa_eapol_key_mic() 275 os_memcpy(mic, hash, MD5_MAC_LEN); in wpa_eapol_key_mic() 284 os_memcpy(mic, has in wpa_eapol_key_mic() 203 wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver, const u8 *buf, size_t len, u8 *mic) wpa_eapol_key_mic() argument 885 wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, const u8 *ap_addr, u8 transaction_seqnum, const u8 *mdie, size_t mdie_len, const u8 *ftie, size_t ftie_len, const u8 *rsnie, size_t rsnie_len, const u8 *ric, size_t ric_len, const u8 *rsnxe, size_t rsnxe_len, u8 *mic) wpa_ft_mic() argument 1406 pasn_mic(const u8 *kck, int akmp, int cipher, const u8 *addr1, const u8 *addr2, const u8 *data, size_t data_len, const u8 *frame, size_t frame_len, u8 *mic) pasn_mic() argument [all...] |
H A D | wpa_common.h | 396 u8 mic[16]; member 404 u8 mic[24]; member 440 const u8 *buf, size_t len, u8 *mic); 471 u8 *mic); 720 const u8 *frame, size_t frame_len, u8 *mic);
|
/third_party/python/Lib/test/ |
H A D | test__locale.py | 15 maj, min, mic = [int(part) for part in uname().release.split(".")] 16 if (maj, min, mic) < (8, 0, 0):
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | mesh_rsn.c | 646 elems->mic ? (elems->mic - 2) - cat : 0 }; in mesh_rsn_process_ampe() 668 if (!elems->mic || elems->mic_len < AES_BLOCK_SIZE) { in mesh_rsn_process_ampe() 669 wpa_msg(wpa_s, MSG_DEBUG, "Mesh RSN: missing mic ie"); in mesh_rsn_process_ampe() 673 ampe_buf = (u8 *) elems->mic + elems->mic_len; in mesh_rsn_process_ampe() 677 crypt_len = elems_len - (elems->mic - start); in mesh_rsn_process_ampe() 691 os_memcpy(crypt, elems->mic, crypt_len); in mesh_rsn_process_ampe()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | mesh_rsn.c | 654 elems->mic ? (elems->mic - 2) - cat : 0 }; in mesh_rsn_process_ampe() 676 if (!elems->mic || elems->mic_len < AES_BLOCK_SIZE) { in mesh_rsn_process_ampe() 677 wpa_msg(wpa_s, MSG_DEBUG, "Mesh RSN: missing mic ie"); in mesh_rsn_process_ampe() 681 ampe_buf = (u8 *) elems->mic + elems->mic_len; in mesh_rsn_process_ampe() 685 crypt_len = elems_len - (elems->mic - start); in mesh_rsn_process_ampe() 699 os_memcpy(crypt, elems->mic, crypt_len); in mesh_rsn_process_ampe()
|
H A D | pasn_supplicant.c | 784 u8 mic[WPA_PASN_MAX_MIC_LEN]; in wpas_pasn_build_auth_3() local 832 pasn->hash, mic_len * 2, data, data_len, mic); in wpas_pasn_build_auth_3() 841 mic[0] = ~mic[0]; in wpas_pasn_build_auth_3() 845 os_memcpy(ptr, mic, mic_len); in wpas_pasn_build_auth_3() 1351 u8 mic[WPA_PASN_MAX_MIC_LEN], out_mic[WPA_PASN_MAX_MIC_LEN]; in wpas_pasn_auth_rx() local 1408 if (!elems.mic || elems.mic_len != mic_len) { in wpas_pasn_auth_rx() 1414 os_memcpy(mic, elems.mic, mic_len); in wpas_pasn_auth_rx() 1417 os_memset((u8 *) elems.mic, in wpas_pasn_auth_rx() [all...] |
/third_party/alsa-utils/topology/nhlt/intel/dmic/ |
H A D | dmic-process.c | 193 * FIR decimation ratios are feasible. The ratios need to be integers. Also the mic clock in find_modes() 457 n = idx[found - 1]; /* Option with highest clock divisor and lowest mic clock rate */ in select_mode() 555 /* Loop number of PDM controllers in the configuration. If mic A or B is enabled then a pdm in ipm_helper1() 586 /* Loop number of PDM controllers in the configuration. If mic A or B is enabled then a pdm in ipm_helper2() 628 /* Set stereo mode if both mic A anc B are enabled. */ in stereo_helper() 632 /* Swap channels if only mic B is used for mono processing. */ in stereo_helper() 668 int mic; in configure_registers() local 722 * either of mic a or b is enabled -> that particular pdm controller is in use. For example in configure_registers() 725 * channel_ctrl_mask defines what mic channels are available in hw for a pdm controller. in in configure_registers() 730 for (i = 0, mic in configure_registers() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/drivers/ |
H A D | driver_bsd.c | 779 struct ieee80211_michael_event *mic; in bsd_wireless_event_receive() local 826 mic = (struct ieee80211_michael_event *) &ifan[1]; in bsd_wireless_event_receive() 829 "keyix=%u src_addr=" MACSTR, mic->iev_keyix, in bsd_wireless_event_receive() 830 MAC2STR(mic->iev_src)); in bsd_wireless_event_receive() 833 data.michael_mic_failure.src = mic->iev_src; in bsd_wireless_event_receive() 1219 struct ieee80211_michael_event *mic; in wpa_driver_bsd_event_receive() local 1320 mic = (struct ieee80211_michael_event *) &ifan[1]; in wpa_driver_bsd_event_receive() 1323 "keyix=%u src_addr=" MACSTR, mic->iev_keyix, in wpa_driver_bsd_event_receive() 1324 MAC2STR(mic->iev_src)); in wpa_driver_bsd_event_receive() 1328 !IEEE80211_IS_MULTICAST(mic in wpa_driver_bsd_event_receive() [all...] |