Searched defs:ik (Results 1 - 25 of 32) sorted by relevance

12

/external/clang/test/CodeGen/
H A Dunsigned-overflow.c6 unsigned int ii, ij, ik; variable
73 // CHECK-NEXT: [[T2:%.*]] = load i32* @ik
78 ii = ij + ik;
85 // CHECK-NEXT: [[T2:%.*]] = load i32* @ik
90 ii = ij - ik;
97 // CHECK-NEXT: [[T2:%.*]] = load i32* @ik
102 ii = ij * ik;
/external/nist-sip/java/gov/nist/javax/sip/header/ims/
H A DWWWAuthenticateHeaderIms.java46 * integrity-key = "ik" EQUAL ik-value
48 * ik-value = LDQUOT *(HEXDIG) RDQUOT
63 public void setIK(String ik) throws ParseException; argument
/external/libcxx/test/algorithms/alg.nonmodifying/alg.search/
H A Dsearch.pass.cpp56 int ik[] = {0, 0, 0, 0, 1, 1, 1, 1, 0, 0}; local
57 const unsigned sk = sizeof(ik)/sizeof(ik[0]);
58 assert(std::search(Iter1(ij), Iter1(ij+sj), Iter2(ik), Iter2(ik+sk)) == Iter1(ij+6));
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dmilenage.c83 * @ik: Buffer for IK = 128-bit integrity key (f4), or %NULL
89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar)
133 if (ik) {
138 if (aes_128_encrypt_block(k, tmp1, ik))
141 ik[i] ^= opc[i];
168 * @ik: Buffer for IK = 128-bit integrity key (f4), or %NULL
174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik,
185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) {
237 u8 res[8], ck[16], ik[16]; local
240 if (milenage_f2345(opc, k, _rand, res, ck, ik, NUL
88 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) argument
173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument
270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument
[all...]
/external/wpa_supplicant_8/src/crypto/
H A Dmilenage.c83 * @ik: Buffer for IK = 128-bit integrity key (f4), or %NULL
89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar)
133 if (ik) {
138 if (aes_128_encrypt_block(k, tmp1, ik))
141 ik[i] ^= opc[i];
168 * @ik: Buffer for IK = 128-bit integrity key (f4), or %NULL
174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik,
185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) {
237 u8 res[8], ck[16], ik[16]; local
240 if (milenage_f2345(opc, k, _rand, res, ck, ik, NUL
88 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) argument
173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument
270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dmilenage.c83 * @ik: Buffer for IK = 128-bit integrity key (f4), or %NULL
89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar)
133 if (ik) {
138 if (aes_128_encrypt_block(k, tmp1, ik))
141 ik[i] ^= opc[i];
168 * @ik: Buffer for IK = 128-bit integrity key (f4), or %NULL
174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik,
185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) {
237 u8 res[8], ck[16], ik[16]; local
240 if (milenage_f2345(opc, k, _rand, res, ck, ik, NUL
88 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) argument
173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument
270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument
[all...]
/external/eigen/unsupported/Eigen/src/SparseExtra/
H A DRandomSetter.h198 KeyType ik = (1<<(OuterPacketBits+m_keyBitsOffset)); local
200 MapTraits<ScalarWrapper>::setInvalidKey(m_hashmaps[k],ik);
/external/nist-sip/java/gov/nist/javax/sip/header/
H A DAuthenticationHeader.java512 public void setIK(String ik) throws ParseException { argument
513 if (ik == null)
517 setParameter(IK, ik);
/external/libvorbis/lib/
H A Dsmallft.c275 int idij,ipph,i,j,k,l,ic,ik,is; local
293 for(ik=0;ik<idl1;ik++)ch2[ik]=c2[ik];
391 for(ik=0;ik<idl1;ik++)c2[ik]
843 int idij,ipph,i,j,k,l,ik,is,t0,t1,t2,t3,t4,t5,t6,t7,t8,t9,t10, local
[all...]
/external/speex/libspeex/
H A Dsmallft.c277 int idij,ipph,i,j,k,l,ic,ik,is; local
295 for(ik=0;ik<idl1;ik++)ch2[ik]=c2[ik];
393 for(ik=0;ik<idl1;ik++)c2[ik]
845 int idij,ipph,i,j,k,l,ik,is,t0,t1,t2,t3,t4,t5,t6,t7,t8,t9,t10, local
[all...]
/external/wpa_supplicant_8/hostapd/
H A Dhlr_auc_gw.c776 u8 ik[EAP_AKA_IK_LEN]; local
800 autn, ik, ck, res, &res_len);
807 memset(ik, '3', EAP_AKA_IK_LEN);
833 pos += wpa_snprintf_hex(pos, end - pos, ik, EAP_AKA_IK_LEN);
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_sim_common.c57 const u8 *ik, const u8 *ck, u8 *mk)
64 addr[1] = ik;
71 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN);
277 const u8 *ik, const u8 *ck, u8 *k_encr,
294 os_memcpy(key, ik, EAP_AKA_IK_LEN);
426 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, argument
461 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': IK", ik, EAP_AKA_IK_LEN);
468 os_memcpy(key + EAP_AKA_CK_LEN, ik, EAP_AKA_IK_LEN);
490 os_memcpy(ik, hash + EAP_AKA_CK_LEN, EAP_AKA_IK_LEN);
492 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': IK'", ik, EAP_AKA_IK_LE
56 eap_aka_derive_mk(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *mk) argument
276 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
[all...]
H A Deap_sim_common.h79 const u8 *ik, const u8 *ck, u8 *mk);
93 const u8 *ik, const u8 *ck, u8 *k_encr,
104 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak,
110 const u8 *ik, const u8 *ck,
108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_aka.c31 u8 ik[EAP_AKA_IK_LEN]; member in struct:eap_aka_data
790 data->rand, data->autn, data->ik,
803 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik,
836 eap_aka_prime_derive_keys(sm->identity, identity_len, data->ik,
840 eap_aka_derive_mk(sm->identity, identity_len, data->ik,
H A Deap_sim_db.c52 u8 ik[EAP_AKA_IK_LEN]; member in struct:eap_sim_db_pending::__anon33703::__anon33705
528 if (hexstr2bin(start, entry->u.aka.ik, EAP_AKA_IK_LEN))
1317 * @ik: Buffer for IK value
1336 u8 *_rand, u8 *autn, u8 *ik, u8 *ck,
1375 os_memcpy(ik, entry->u.aka.ik, EAP_AKA_IK_LEN);
1335 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument
/external/wpa_supplicant_8/src/eap_common/
H A Deap_sim_common.c57 const u8 *ik, const u8 *ck, u8 *mk)
64 addr[1] = ik;
71 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN);
277 const u8 *ik, const u8 *ck, u8 *k_encr,
294 os_memcpy(key, ik, EAP_AKA_IK_LEN);
426 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, argument
461 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': IK", ik, EAP_AKA_IK_LEN);
468 os_memcpy(key + EAP_AKA_CK_LEN, ik, EAP_AKA_IK_LEN);
490 os_memcpy(ik, hash + EAP_AKA_CK_LEN, EAP_AKA_IK_LEN);
492 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': IK'", ik, EAP_AKA_IK_LE
56 eap_aka_derive_mk(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *mk) argument
276 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
[all...]
H A Deap_sim_common.h79 const u8 *ik, const u8 *ck, u8 *mk);
93 const u8 *ik, const u8 *ck, u8 *k_encr,
104 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak,
110 const u8 *ik, const u8 *ck,
108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_aka.c31 u8 ik[EAP_AKA_IK_LEN]; member in struct:eap_aka_data
790 data->rand, data->autn, data->ik,
803 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik,
836 eap_aka_prime_derive_keys(sm->identity, identity_len, data->ik,
840 eap_aka_derive_mk(sm->identity, identity_len, data->ik,
H A Deap_sim_db.c52 u8 ik[EAP_AKA_IK_LEN]; member in struct:eap_sim_db_pending::__anon33956::__anon33958
528 if (hexstr2bin(start, entry->u.aka.ik, EAP_AKA_IK_LEN))
1317 * @ik: Buffer for IK value
1336 u8 *_rand, u8 *autn, u8 *ik, u8 *ck,
1375 os_memcpy(ik, entry->u.aka.ik, EAP_AKA_IK_LEN);
1335 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_sim_common.c57 const u8 *ik, const u8 *ck, u8 *mk)
64 addr[1] = ik;
71 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN);
277 const u8 *ik, const u8 *ck, u8 *k_encr,
294 os_memcpy(key, ik, EAP_AKA_IK_LEN);
426 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, argument
461 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': IK", ik, EAP_AKA_IK_LEN);
468 os_memcpy(key + EAP_AKA_CK_LEN, ik, EAP_AKA_IK_LEN);
490 os_memcpy(ik, hash + EAP_AKA_CK_LEN, EAP_AKA_IK_LEN);
492 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': IK'", ik, EAP_AKA_IK_LE
56 eap_aka_derive_mk(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *mk) argument
276 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_aka.c31 u8 ik[EAP_AKA_IK_LEN]; member in struct:eap_aka_data
790 data->rand, data->autn, data->ik,
803 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik,
836 eap_aka_prime_derive_keys(sm->identity, identity_len, data->ik,
840 eap_aka_derive_mk(sm->identity, identity_len, data->ik,
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_aka.c23 u8 ik[EAP_AKA_IK_LEN], ck[EAP_AKA_CK_LEN], res[EAP_AKA_RES_MAX_LEN]; member in struct:eap_aka_data
207 if (hexstr2bin(pos, data->ik, EAP_AKA_IK_LEN) < 0)
209 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", data->ik, EAP_AKA_IK_LEN);
262 data->ik, data->ck, data->auts);
295 data->ik, data->ck,
308 os_memset(data->ik, '3', EAP_AKA_IK_LEN);
988 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik,
1005 eap_aka_prime_derive_keys(identity, identity_len, data->ik,
1009 eap_aka_derive_mk(identity, identity_len, data->ik, data->ck,
/external/wpa_supplicant_8/hostapd/src/utils/
H A Dpcsc_funcs.c1302 * @ik: 16-byte buffer for IK
1318 unsigned char *ik, unsigned char *ck, unsigned char *auts)
1405 os_memcpy(ik, pos, IK_LEN);
1407 wpa_hexdump(MSG_DEBUG, "SCARD: IK", ik, IK_LEN);
1315 scard_umts_auth(struct scard_data *scard, const unsigned char *_rand, const unsigned char *autn, unsigned char *res, size_t *res_len, unsigned char *ik, unsigned char *ck, unsigned char *auts) argument
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_aka.c23 u8 ik[EAP_AKA_IK_LEN], ck[EAP_AKA_CK_LEN], res[EAP_AKA_RES_MAX_LEN]; member in struct:eap_aka_data
207 if (hexstr2bin(pos, data->ik, EAP_AKA_IK_LEN) < 0)
209 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", data->ik, EAP_AKA_IK_LEN);
262 data->ik, data->ck, data->auts);
295 data->ik, data->ck,
308 os_memset(data->ik, '3', EAP_AKA_IK_LEN);
988 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik,
1005 eap_aka_prime_derive_keys(identity, identity_len, data->ik,
1009 eap_aka_derive_mk(identity, identity_len, data->ik, data->ck,
/external/wpa_supplicant_8/src/utils/
H A Dpcsc_funcs.c1302 * @ik: 16-byte buffer for IK
1318 unsigned char *ik, unsigned char *ck, unsigned char *auts)
1405 os_memcpy(ik, pos, IK_LEN);
1407 wpa_hexdump(MSG_DEBUG, "SCARD: IK", ik, IK_LEN);
1315 scard_umts_auth(struct scard_data *scard, const unsigned char *_rand, const unsigned char *autn, unsigned char *res, size_t *res_len, unsigned char *ik, unsigned char *ck, unsigned char *auts) argument

Completed in 3491 milliseconds

12