/external/clang/test/CodeGen/ |
H A D | unsigned-overflow.c | 6 unsigned int ii, ij, ik; variable 73 // CHECK-NEXT: [[T2:%.*]] = load i32* @ik 78 ii = ij + ik; 85 // CHECK-NEXT: [[T2:%.*]] = load i32* @ik 90 ii = ij - ik; 97 // CHECK-NEXT: [[T2:%.*]] = load i32* @ik 102 ii = ij * ik;
|
/external/nist-sip/java/gov/nist/javax/sip/header/ims/ |
H A D | WWWAuthenticateHeaderIms.java | 46 * integrity-key = "ik" EQUAL ik-value 48 * ik-value = LDQUOT *(HEXDIG) RDQUOT 63 public void setIK(String ik) throws ParseException; argument
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | milenage.c | 83 * @ik: Buffer for IK = 128-bit integrity key (f4), or %NULL 89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) 133 if (ik) { 138 if (aes_128_encrypt_block(k, tmp1, ik)) 141 ik[i] ^= opc[i]; 168 * @ik: Buffer for IK = 128-bit integrity key (f4), or %NULL 174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) { 237 u8 res[8], ck[16], ik[16]; local 240 if (milenage_f2345(opc, k, _rand, res, ck, ik, NUL 88 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) argument 173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument 270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | milenage.c | 83 * @ik: Buffer for IK = 128-bit integrity key (f4), or %NULL 89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) 133 if (ik) { 138 if (aes_128_encrypt_block(k, tmp1, ik)) 141 ik[i] ^= opc[i]; 168 * @ik: Buffer for IK = 128-bit integrity key (f4), or %NULL 174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) { 237 u8 res[8], ck[16], ik[16]; local 240 if (milenage_f2345(opc, k, _rand, res, ck, ik, NUL 88 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) argument 173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument 270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | milenage.c | 83 * @ik: Buffer for IK = 128-bit integrity key (f4), or %NULL 89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) 133 if (ik) { 138 if (aes_128_encrypt_block(k, tmp1, ik)) 141 ik[i] ^= opc[i]; 168 * @ik: Buffer for IK = 128-bit integrity key (f4), or %NULL 174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) { 237 u8 res[8], ck[16], ik[16]; local 240 if (milenage_f2345(opc, k, _rand, res, ck, ik, NUL 88 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) argument 173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument 270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument [all...] |
/external/eigen/unsupported/Eigen/src/SparseExtra/ |
H A D | RandomSetter.h | 198 KeyType ik = (1<<(OuterPacketBits+m_keyBitsOffset)); local 200 MapTraits<ScalarWrapper>::setInvalidKey(m_hashmaps[k],ik);
|
/external/nist-sip/java/gov/nist/javax/sip/header/ |
H A D | AuthenticationHeader.java | 512 public void setIK(String ik) throws ParseException { argument 513 if (ik == null) 517 setParameter(IK, ik);
|
/external/libvorbis/lib/ |
H A D | smallft.c | 275 int idij,ipph,i,j,k,l,ic,ik,is; local 293 for(ik=0;ik<idl1;ik++)ch2[ik]=c2[ik]; 391 for(ik=0;ik<idl1;ik++)c2[ik] 843 int idij,ipph,i,j,k,l,ik,is,t0,t1,t2,t3,t4,t5,t6,t7,t8,t9,t10, local [all...] |
/external/speex/libspeex/ |
H A D | smallft.c | 277 int idij,ipph,i,j,k,l,ic,ik,is; local 295 for(ik=0;ik<idl1;ik++)ch2[ik]=c2[ik]; 393 for(ik=0;ik<idl1;ik++)c2[ik] 845 int idij,ipph,i,j,k,l,ik,is,t0,t1,t2,t3,t4,t5,t6,t7,t8,t9,t10, local [all...] |
/external/wpa_supplicant_8/hostapd/ |
H A D | hlr_auc_gw.c | 721 u8 ik[EAP_AKA_IK_LEN]; local 743 autn, ik, ck, res, &res_len); 750 memset(ik, '3', EAP_AKA_IK_LEN); 776 pos += wpa_snprintf_hex(pos, end - pos, ik, EAP_AKA_IK_LEN);
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_sim_common.c | 57 const u8 *ik, const u8 *ck, u8 *mk) 64 addr[1] = ik; 71 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN); 277 const u8 *ik, const u8 *ck, u8 *k_encr, 294 os_memcpy(key, ik, EAP_AKA_IK_LEN); 426 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, argument 461 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': IK", ik, EAP_AKA_IK_LEN); 468 os_memcpy(key + EAP_AKA_CK_LEN, ik, EAP_AKA_IK_LEN); 490 os_memcpy(ik, hash + EAP_AKA_CK_LEN, EAP_AKA_IK_LEN); 492 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': IK'", ik, EAP_AKA_IK_LE 56 eap_aka_derive_mk(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *mk) argument 276 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument [all...] |
H A D | eap_sim_common.h | 79 const u8 *ik, const u8 *ck, u8 *mk); 93 const u8 *ik, const u8 *ck, u8 *k_encr, 104 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, 110 const u8 *ik, const u8 *ck, 108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_aka.c | 31 u8 ik[EAP_AKA_IK_LEN]; member in struct:eap_aka_data 790 data->rand, data->autn, data->ik, 803 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik, 836 eap_aka_prime_derive_keys(sm->identity, identity_len, data->ik, 840 eap_aka_derive_mk(sm->identity, identity_len, data->ik,
|
H A D | eap_sim_db.c | 53 u8 ik[EAP_AKA_IK_LEN]; member in struct:eap_sim_db_pending::__anon28347::__anon28349 529 if (hexstr2bin(start, entry->u.aka.ik, EAP_AKA_IK_LEN)) 1308 * @ik: Buffer for IK value 1327 u8 *_rand, u8 *autn, u8 *ik, u8 *ck, 1366 os_memcpy(ik, entry->u.aka.ik, EAP_AKA_IK_LEN); 1326 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_sim_common.c | 57 const u8 *ik, const u8 *ck, u8 *mk) 64 addr[1] = ik; 71 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN); 277 const u8 *ik, const u8 *ck, u8 *k_encr, 294 os_memcpy(key, ik, EAP_AKA_IK_LEN); 426 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, argument 461 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': IK", ik, EAP_AKA_IK_LEN); 468 os_memcpy(key + EAP_AKA_CK_LEN, ik, EAP_AKA_IK_LEN); 490 os_memcpy(ik, hash + EAP_AKA_CK_LEN, EAP_AKA_IK_LEN); 492 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': IK'", ik, EAP_AKA_IK_LE 56 eap_aka_derive_mk(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *mk) argument 276 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument [all...] |
H A D | eap_sim_common.h | 79 const u8 *ik, const u8 *ck, u8 *mk); 93 const u8 *ik, const u8 *ck, u8 *k_encr, 104 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, 110 const u8 *ik, const u8 *ck, 108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_aka.c | 31 u8 ik[EAP_AKA_IK_LEN]; member in struct:eap_aka_data 790 data->rand, data->autn, data->ik, 803 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik, 836 eap_aka_prime_derive_keys(sm->identity, identity_len, data->ik, 840 eap_aka_derive_mk(sm->identity, identity_len, data->ik,
|
H A D | eap_sim_db.c | 53 u8 ik[EAP_AKA_IK_LEN]; member in struct:eap_sim_db_pending::__anon28577::__anon28579 529 if (hexstr2bin(start, entry->u.aka.ik, EAP_AKA_IK_LEN)) 1308 * @ik: Buffer for IK value 1327 u8 *_rand, u8 *autn, u8 *ik, u8 *ck, 1366 os_memcpy(ik, entry->u.aka.ik, EAP_AKA_IK_LEN); 1326 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_sim_common.c | 57 const u8 *ik, const u8 *ck, u8 *mk) 64 addr[1] = ik; 71 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN); 277 const u8 *ik, const u8 *ck, u8 *k_encr, 294 os_memcpy(key, ik, EAP_AKA_IK_LEN); 426 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, argument 461 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': IK", ik, EAP_AKA_IK_LEN); 468 os_memcpy(key + EAP_AKA_CK_LEN, ik, EAP_AKA_IK_LEN); 490 os_memcpy(ik, hash + EAP_AKA_CK_LEN, EAP_AKA_IK_LEN); 492 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': IK'", ik, EAP_AKA_IK_LE 56 eap_aka_derive_mk(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *mk) argument 276 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument [all...] |
H A D | eap_sim_common.h | 79 const u8 *ik, const u8 *ck, u8 *mk); 93 const u8 *ik, const u8 *ck, u8 *k_encr, 104 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, 110 const u8 *ik, const u8 *ck, 108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_aka.c | 31 u8 ik[EAP_AKA_IK_LEN]; member in struct:eap_aka_data 790 data->rand, data->autn, data->ik, 803 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik, 836 eap_aka_prime_derive_keys(sm->identity, identity_len, data->ik, 840 eap_aka_derive_mk(sm->identity, identity_len, data->ik,
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_aka.c | 23 u8 ik[EAP_AKA_IK_LEN], ck[EAP_AKA_CK_LEN], res[EAP_AKA_RES_MAX_LEN]; member in struct:eap_aka_data 157 data->ik, data->ck, data->auts); 190 data->ik, data->ck, 203 os_memset(data->ik, '3', EAP_AKA_IK_LEN); 879 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik, 896 eap_aka_prime_derive_keys(identity, identity_len, data->ik, 900 eap_aka_derive_mk(identity, identity_len, data->ik, data->ck,
|
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | pcsc_funcs.c | 1309 * @ik: 16-byte buffer for IK 1325 unsigned char *ik, unsigned char *ck, unsigned char *auts) 1412 os_memcpy(ik, pos, IK_LEN); 1414 wpa_hexdump(MSG_DEBUG, "SCARD: IK", ik, IK_LEN); 1322 scard_umts_auth(struct scard_data *scard, const unsigned char *_rand, const unsigned char *autn, unsigned char *res, size_t *res_len, unsigned char *ik, unsigned char *ck, unsigned char *auts) argument
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_aka.c | 23 u8 ik[EAP_AKA_IK_LEN], ck[EAP_AKA_CK_LEN], res[EAP_AKA_RES_MAX_LEN]; member in struct:eap_aka_data 157 data->ik, data->ck, data->auts); 190 data->ik, data->ck, 203 os_memset(data->ik, '3', EAP_AKA_IK_LEN); 879 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik, 896 eap_aka_prime_derive_keys(identity, identity_len, data->ik, 900 eap_aka_derive_mk(identity, identity_len, data->ik, data->ck,
|
/external/wpa_supplicant_8/src/utils/ |
H A D | pcsc_funcs.c | 1309 * @ik: 16-byte buffer for IK 1325 unsigned char *ik, unsigned char *ck, unsigned char *auts) 1412 os_memcpy(ik, pos, IK_LEN); 1414 wpa_hexdump(MSG_DEBUG, "SCARD: IK", ik, IK_LEN); 1322 scard_umts_auth(struct scard_data *scard, const unsigned char *_rand, const unsigned char *autn, unsigned char *res, size_t *res_len, unsigned char *ik, unsigned char *ck, unsigned char *auts) argument
|