Home
last modified time | relevance | path

Searched refs:mic (Results 1 - 25 of 44) sorted by relevance

12

/third_party/alsa-utils/nhlt/
H A Dnhlt-dmic-info.c98 static int nhlt_dmic_config(FILE *out, uint8_t *dmic, uint8_t mic) in nhlt_dmic_config() argument
102 if (mic > 0) in nhlt_dmic_config()
105 fprintf(out, "\t\t\t\"channel\":%i,\n", mic); in nhlt_dmic_config()
143 uint8_t config_type, array_type, mic, num_mics; in nhlt_dmic_ep_to_json() local
152 if (config_type != 1) /* mic array */ in nhlt_dmic_ep_to_json()
163 for (mic = 0; mic < num_mics; mic++) { in nhlt_dmic_ep_to_json()
168 if (mic == 0) in nhlt_dmic_ep_to_json()
170 res = nhlt_dmic_config(out, ep + off + 4, mic); in nhlt_dmic_ep_to_json()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
H A Deap_server_gpsk.c247 u8 mic[EAP_GPSK_MAX_MIC_LEN]; in eap_gpsk_process_gpsk_2() local
446 data->specifier, payload, pos - payload, mic) in eap_gpsk_process_gpsk_2()
452 if (os_memcmp_const(mic, pos, miclen) != 0) { in eap_gpsk_process_gpsk_2()
455 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen); in eap_gpsk_process_gpsk_2()
478 u8 mic[EAP_GPSK_MAX_MIC_LEN]; in eap_gpsk_process_gpsk_4() local
515 data->specifier, payload, pos - payload, mic) in eap_gpsk_process_gpsk_4()
521 if (os_memcmp_const(mic, pos, miclen) != 0) { in eap_gpsk_process_gpsk_4()
524 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen); in eap_gpsk_process_gpsk_4()
H A Deap_server_sake.c185 u8 *mic; in eap_sake_build_confirm() local
199 mic = wpabuf_put(msg, EAP_SAKE_MIC_LEN); in eap_sake_build_confirm()
203 wpabuf_head(msg), wpabuf_len(msg), mic, mic)) in eap_sake_build_confirm()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
H A Deap_server_gpsk.c247 u8 mic[EAP_GPSK_MAX_MIC_LEN]; in eap_gpsk_process_gpsk_2() local
447 data->specifier, payload, pos - payload, mic) in eap_gpsk_process_gpsk_2()
453 if (os_memcmp_const(mic, pos, miclen) != 0) { in eap_gpsk_process_gpsk_2()
456 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen); in eap_gpsk_process_gpsk_2()
479 u8 mic[EAP_GPSK_MAX_MIC_LEN]; in eap_gpsk_process_gpsk_4() local
516 data->specifier, payload, pos - payload, mic) in eap_gpsk_process_gpsk_4()
522 if (os_memcmp_const(mic, pos, miclen) != 0) { in eap_gpsk_process_gpsk_4()
525 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen); in eap_gpsk_process_gpsk_4()
H A Deap_server_sake.c185 u8 *mic; in eap_sake_build_confirm() local
199 mic = wpabuf_put(msg, EAP_SAKE_MIC_LEN); in eap_sake_build_confirm()
203 wpabuf_head(msg), wpabuf_len(msg), mic, mic)) in eap_sake_build_confirm()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/
H A Dtdls.c56 u8 mic[TDLS_MIC_LEN]; member
467 * @mic: Pointer for writing MIC
473 const u8 *ftie, u8 *mic) in wpa_tdls_ftie_mic()
509 os_memset(_ftie->mic, 0, TDLS_MIC_LEN); in wpa_tdls_ftie_mic()
514 ret = omac1_aes_128(kck, buf, pos - buf, mic); in wpa_tdls_ftie_mic()
516 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE MIC", mic, 16); in wpa_tdls_ftie_mic()
529 * @mic: Pointer for writing MIC
535 const u8 *ftie, u8 *mic) in wpa_tdls_key_mic_teardown()
568 os_memset(_ftie->mic, 0, TDLS_MIC_LEN); in wpa_tdls_key_mic_teardown()
573 ret = omac1_aes_128(kck, buf, pos - buf, mic); in wpa_tdls_key_mic_teardown()
471 wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid, const u8 *rsnie, const u8 *timeoutie, const u8 *ftie, u8 *mic) wpa_tdls_ftie_mic() argument
533 wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, u8 dtoken, const u8 *lnkid, const u8 *ftie, u8 *mic) wpa_tdls_key_mic_teardown() argument
585 u8 mic[16]; wpa_supplicant_verify_tdls_mic() local
613 u8 mic[16]; wpa_supplicant_verify_tdls_mic_teardown() local
[all...]
H A Dwpa_ft.c310 fte_mic = ftie->mic; in wpa_ft_gen_req_ies()
320 fte_mic = ftie->mic; in wpa_ft_gen_req_ies()
847 u8 mic[WPA_EAPOL_KEY_MIC_MAX_LEN]; in wpa_ft_validate_reassoc_resp() local
892 fte_mic = ftie->mic; in wpa_ft_validate_reassoc_resp()
905 fte_mic = ftie->mic; in wpa_ft_validate_reassoc_resp()
985 mic) < 0) { in wpa_ft_validate_reassoc_resp()
990 if (os_memcmp_const(mic, fte_mic, 16) != 0) { in wpa_ft_validate_reassoc_resp()
993 wpa_hexdump(MSG_MSGDUMP, "FT: Calculated MIC", mic, 16); in wpa_ft_validate_reassoc_resp()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/
H A Dtdls.c56 u8 mic[TDLS_MIC_LEN]; member
479 * @mic: Pointer for writing MIC
485 const u8 *ftie, u8 *mic)
521 os_memset(_ftie->mic, 0, TDLS_MIC_LEN);
526 ret = omac1_aes_128(kck, buf, pos - buf, mic);
528 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE MIC", mic, 16);
541 * @mic: Pointer for writing MIC
547 const u8 *ftie, u8 *mic)
580 os_memset(_ftie->mic, 0, TDLS_MIC_LEN);
585 ret = omac1_aes_128(kck, buf, pos - buf, mic);
[all...]
H A Dwpa_ft.c339 fte_mic = ftie->mic; in wpa_ft_gen_req_ies()
350 fte_mic = ftie->mic; in wpa_ft_gen_req_ies()
1002 u8 mic[WPA_EAPOL_KEY_MIC_MAX_LEN];
1049 fte_mic = ftie->mic;
1063 fte_mic = ftie->mic;
1147 mic) < 0) {
1152 if (os_memcmp_const(mic, fte_mic, 16) != 0) {
1155 wpa_hexdump(MSG_MSGDUMP, "FT: Calculated MIC", mic, 16);
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/
H A Dwpa_common.c180 * @mic: Pointer to the buffer to which the EAPOL-Key MIC is written
193 const u8 *buf, size_t len, u8 *mic) in wpa_eapol_key_mic()
207 return hmac_md5(key, key_len, buf, len, mic); in wpa_eapol_key_mic()
213 os_memcpy(mic, hash, MD5_MAC_LEN); in wpa_eapol_key_mic()
218 return omac1_aes_128(key, buf, len, mic); in wpa_eapol_key_mic()
227 return omac1_aes_128(key, buf, len, mic); in wpa_eapol_key_mic()
233 return omac1_aes_128(key, buf, len, mic); in wpa_eapol_key_mic()
241 os_memcpy(mic, hash, MD5_MAC_LEN); in wpa_eapol_key_mic()
250 os_memcpy(mic, hash, 24); in wpa_eapol_key_mic()
273 os_memcpy(mic, has in wpa_eapol_key_mic()
192 wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver, const u8 *buf, size_t len, u8 *mic) wpa_eapol_key_mic() argument
754 wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, const u8 *ap_addr, u8 transaction_seqnum, const u8 *mdie, size_t mdie_len, const u8 *ftie, size_t ftie_len, const u8 *rsnie, size_t rsnie_len, const u8 *ric, size_t ric_len, u8 *mic) wpa_ft_mic() argument
[all...]
H A Dwpa_common.h313 u8 mic[16]; member
321 u8 mic[24]; member
346 const u8 *buf, size_t len, u8 *mic);
375 const u8 *ric, size_t ric_len, u8 *mic);
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
H A Deap_gpsk_common.c501 const u8 *data, size_t len, u8 *mic) in eap_gpsk_compute_mic_aes()
509 return omac1_aes_128(sk, data, len, mic); in eap_gpsk_compute_mic_aes()
521 * @mic: Buffer for the computed MIC, eap_gpsk_mic_len(cipher) bytes
525 int specifier, const u8 *data, size_t len, u8 *mic) in eap_gpsk_compute_mic()
534 ret = eap_gpsk_compute_mic_aes(sk, sk_len, data, len, mic); in eap_gpsk_compute_mic()
538 ret = hmac_sha256(sk, sk_len, data, len, mic); in eap_gpsk_compute_mic()
500 eap_gpsk_compute_mic_aes(const u8 *sk, size_t sk_len, const u8 *data, size_t len, u8 *mic) eap_gpsk_compute_mic_aes() argument
524 eap_gpsk_compute_mic(const u8 *sk, size_t sk_len, int vendor, int specifier, const u8 *data, size_t len, u8 *mic) eap_gpsk_compute_mic() argument
H A Deap_gpsk_common.h64 int specifier, const u8 *data, size_t len, u8 *mic);
H A Deap_sake_common.h92 const u8 *mic_pos, u8 *mic);
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
H A Deap_gpsk_common.c501 const u8 *data, size_t len, u8 *mic) in eap_gpsk_compute_mic_aes()
509 return omac1_aes_128(sk, data, len, mic); in eap_gpsk_compute_mic_aes()
521 * @mic: Buffer for the computed MIC, eap_gpsk_mic_len(cipher) bytes
525 int specifier, const u8 *data, size_t len, u8 *mic) in eap_gpsk_compute_mic()
534 ret = eap_gpsk_compute_mic_aes(sk, sk_len, data, len, mic); in eap_gpsk_compute_mic()
538 ret = hmac_sha256(sk, sk_len, data, len, mic); in eap_gpsk_compute_mic()
500 eap_gpsk_compute_mic_aes(const u8 *sk, size_t sk_len, const u8 *data, size_t len, u8 *mic) eap_gpsk_compute_mic_aes() argument
524 eap_gpsk_compute_mic(const u8 *sk, size_t sk_len, int vendor, int specifier, const u8 *data, size_t len, u8 *mic) eap_gpsk_compute_mic() argument
H A Deap_gpsk_common.h64 int specifier, const u8 *data, size_t len, u8 *mic);
H A Deap_sake_common.h92 const u8 *mic_pos, u8 *mic);
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/
H A Dwpa_common.c191 * @mic: Pointer to the buffer to which the EAPOL-Key MIC is written
204 const u8 *buf, size_t len, u8 *mic) in wpa_eapol_key_mic()
218 return hmac_md5(key, key_len, buf, len, mic); in wpa_eapol_key_mic()
224 os_memcpy(mic, hash, MD5_MAC_LEN); in wpa_eapol_key_mic()
228 return omac1_aes_128(key, buf, len, mic); in wpa_eapol_key_mic()
236 return omac1_aes_128(key, buf, len, mic); in wpa_eapol_key_mic()
260 os_memcpy(mic, hash, key_len); in wpa_eapol_key_mic()
267 return omac1_aes_128(key, buf, len, mic); in wpa_eapol_key_mic()
275 os_memcpy(mic, hash, MD5_MAC_LEN); in wpa_eapol_key_mic()
284 os_memcpy(mic, has in wpa_eapol_key_mic()
203 wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver, const u8 *buf, size_t len, u8 *mic) wpa_eapol_key_mic() argument
885 wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, const u8 *ap_addr, u8 transaction_seqnum, const u8 *mdie, size_t mdie_len, const u8 *ftie, size_t ftie_len, const u8 *rsnie, size_t rsnie_len, const u8 *ric, size_t ric_len, const u8 *rsnxe, size_t rsnxe_len, u8 *mic) wpa_ft_mic() argument
1406 pasn_mic(const u8 *kck, int akmp, int cipher, const u8 *addr1, const u8 *addr2, const u8 *data, size_t data_len, const u8 *frame, size_t frame_len, u8 *mic) pasn_mic() argument
[all...]
H A Dwpa_common.h396 u8 mic[16]; member
404 u8 mic[24]; member
440 const u8 *buf, size_t len, u8 *mic);
471 u8 *mic);
720 const u8 *frame, size_t frame_len, u8 *mic);
/third_party/python/Lib/test/
H A Dtest__locale.py15 maj, min, mic = [int(part) for part in uname().release.split(".")]
16 if (maj, min, mic) < (8, 0, 0):
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
H A Dmesh_rsn.c646 elems->mic ? (elems->mic - 2) - cat : 0 }; in mesh_rsn_process_ampe()
668 if (!elems->mic || elems->mic_len < AES_BLOCK_SIZE) { in mesh_rsn_process_ampe()
669 wpa_msg(wpa_s, MSG_DEBUG, "Mesh RSN: missing mic ie"); in mesh_rsn_process_ampe()
673 ampe_buf = (u8 *) elems->mic + elems->mic_len; in mesh_rsn_process_ampe()
677 crypt_len = elems_len - (elems->mic - start); in mesh_rsn_process_ampe()
691 os_memcpy(crypt, elems->mic, crypt_len); in mesh_rsn_process_ampe()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
H A Dmesh_rsn.c654 elems->mic ? (elems->mic - 2) - cat : 0 }; in mesh_rsn_process_ampe()
676 if (!elems->mic || elems->mic_len < AES_BLOCK_SIZE) { in mesh_rsn_process_ampe()
677 wpa_msg(wpa_s, MSG_DEBUG, "Mesh RSN: missing mic ie"); in mesh_rsn_process_ampe()
681 ampe_buf = (u8 *) elems->mic + elems->mic_len; in mesh_rsn_process_ampe()
685 crypt_len = elems_len - (elems->mic - start); in mesh_rsn_process_ampe()
699 os_memcpy(crypt, elems->mic, crypt_len); in mesh_rsn_process_ampe()
H A Dpasn_supplicant.c784 u8 mic[WPA_PASN_MAX_MIC_LEN]; in wpas_pasn_build_auth_3() local
832 pasn->hash, mic_len * 2, data, data_len, mic); in wpas_pasn_build_auth_3()
841 mic[0] = ~mic[0]; in wpas_pasn_build_auth_3()
845 os_memcpy(ptr, mic, mic_len); in wpas_pasn_build_auth_3()
1351 u8 mic[WPA_PASN_MAX_MIC_LEN], out_mic[WPA_PASN_MAX_MIC_LEN]; in wpas_pasn_auth_rx() local
1408 if (!elems.mic || elems.mic_len != mic_len) { in wpas_pasn_auth_rx()
1414 os_memcpy(mic, elems.mic, mic_len); in wpas_pasn_auth_rx()
1417 os_memset((u8 *) elems.mic, in wpas_pasn_auth_rx()
[all...]
/third_party/alsa-utils/topology/nhlt/intel/dmic/
H A Ddmic-process.c193 * FIR decimation ratios are feasible. The ratios need to be integers. Also the mic clock in find_modes()
457 n = idx[found - 1]; /* Option with highest clock divisor and lowest mic clock rate */ in select_mode()
555 /* Loop number of PDM controllers in the configuration. If mic A or B is enabled then a pdm in ipm_helper1()
586 /* Loop number of PDM controllers in the configuration. If mic A or B is enabled then a pdm in ipm_helper2()
628 /* Set stereo mode if both mic A anc B are enabled. */ in stereo_helper()
632 /* Swap channels if only mic B is used for mono processing. */ in stereo_helper()
668 int mic; in configure_registers() local
722 * either of mic a or b is enabled -> that particular pdm controller is in use. For example in configure_registers()
725 * channel_ctrl_mask defines what mic channels are available in hw for a pdm controller. in in configure_registers()
730 for (i = 0, mic in configure_registers()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/drivers/
H A Ddriver_bsd.c779 struct ieee80211_michael_event *mic; in bsd_wireless_event_receive() local
826 mic = (struct ieee80211_michael_event *) &ifan[1]; in bsd_wireless_event_receive()
829 "keyix=%u src_addr=" MACSTR, mic->iev_keyix, in bsd_wireless_event_receive()
830 MAC2STR(mic->iev_src)); in bsd_wireless_event_receive()
833 data.michael_mic_failure.src = mic->iev_src; in bsd_wireless_event_receive()
1219 struct ieee80211_michael_event *mic; in wpa_driver_bsd_event_receive() local
1320 mic = (struct ieee80211_michael_event *) &ifan[1]; in wpa_driver_bsd_event_receive()
1323 "keyix=%u src_addr=" MACSTR, mic->iev_keyix, in wpa_driver_bsd_event_receive()
1324 MAC2STR(mic->iev_src)); in wpa_driver_bsd_event_receive()
1328 !IEEE80211_IS_MULTICAST(mic in wpa_driver_bsd_event_receive()
[all...]

Completed in 25 milliseconds

12