/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | milenage.c | 83 * @ik: Buffer for IK = 128-bit integrity key (f4), or %NULL 89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) in milenage_f2345() 133 if (ik) { in milenage_f2345() 138 if (aes_128_encrypt_block(k, tmp1, ik)) in milenage_f2345() 141 ik[i] ^= opc[i]; in milenage_f2345() 168 * @ik: Buffer for IK = 128-bit integrity key (f4), or %NULL 174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, in milenage_generate() 185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) { in milenage_generate() 237 u8 res[8], ck[16], ik[16]; in gsm_milenage() local 240 if (milenage_f2345(opc, k, _rand, res, ck, ik, NUL in gsm_milenage() 88 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) milenage_f2345() argument 173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) milenage_generate() argument 270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) milenage_check() argument [all...] |
H A D | milenage.h | 13 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, 25 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | milenage.c | 83 * @ik: Buffer for IK = 128-bit integrity key (f4), or %NULL 89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) in milenage_f2345() 133 if (ik) { in milenage_f2345() 138 if (aes_128_encrypt_block(k, tmp1, ik)) in milenage_f2345() 141 ik[i] ^= opc[i]; in milenage_f2345() 168 * @ik: Buffer for IK = 128-bit integrity key (f4), or %NULL 174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, in milenage_generate() 185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) { in milenage_generate() 237 u8 res[8], ck[16], ik[16]; in gsm_milenage() local 240 if (milenage_f2345(opc, k, _rand, res, ck, ik, NUL in gsm_milenage() 88 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) milenage_f2345() argument 173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) milenage_generate() argument 270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) milenage_check() argument [all...] |
H A D | milenage.h | 13 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, 25 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar);
|
/third_party/mbedtls/library/ |
H A D | aesni.c | 230 __m128i *ik = (__m128i *) invkey; in mbedtls_aesni_inverse_key() local 233 *ik = *fk; in mbedtls_aesni_inverse_key() 234 for (--fk, ++ik; fk > (const __m128i *) fwdkey; --fk, ++ik) { in mbedtls_aesni_inverse_key() 235 *ik = _mm_aesimc_si128(*fk); in mbedtls_aesni_inverse_key() 237 *ik = *fk; in mbedtls_aesni_inverse_key() 617 unsigned char *ik = invkey; in mbedtls_aesni_inverse_key() local 620 memcpy(ik, fk, 16); in mbedtls_aesni_inverse_key() 622 for (fk -= 16, ik += 16; fk > fwdkey; fk -= 16, ik in mbedtls_aesni_inverse_key() [all...] |
/third_party/pulseaudio/speex/libspeexdsp/ |
H A D | smallft.c | 277 int idij,ipph,i,j,k,l,ic,ik,is; in dradfg() local 295 for(ik=0;ik<idl1;ik++)ch2[ik]=c2[ik]; in dradfg() 393 for(ik=0;ik<idl1;ik++)c2[ik] in dradfg() 845 int idij,ipph,i,j,k,l,ik,is,t0,t1,t2,t3,t4,t5,t6,t7,t8,t9,t10, dradbg() local [all...] |
/third_party/mesa3d/src/gallium/frontends/clover/llvm/ |
H A D | compat.hpp | 102 clang::InputKind ik, const ::llvm::Triple& triple, in compiler_set_lang_defaults() 106 c->getLangOpts().setLangDefaults(c->getLangOpts(), ik.getLanguage(), triple, in compiler_set_lang_defaults() 108 c->getInvocation().setLangDefaults(c->getLangOpts(), ik, triple, in compiler_set_lang_defaults() 101 compiler_set_lang_defaults(std::unique_ptr<clang::CompilerInstance> &c, clang::InputKind ik, const ::llvm::Triple& triple, clang::LangStandard::Kind d) compiler_set_lang_defaults() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_sim_common.h | 79 const u8 *ik, const u8 *ck, u8 *mk); 93 const u8 *ik, const u8 *ck, u8 *k_encr, 104 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, 110 const u8 *ik, const u8 *ck, in eap_aka_prime_derive_keys() 108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) eap_aka_prime_derive_keys() argument
|
H A D | eap_sim_common.c | 57 const u8 *ik, const u8 *ck, u8 *mk) in eap_aka_derive_mk() 64 addr[1] = ik; in eap_aka_derive_mk() 71 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN); in eap_aka_derive_mk() 276 const u8 *ik, const u8 *ck, u8 *k_encr, in eap_aka_prime_derive_keys() 293 os_memcpy(key, ik, EAP_AKA_IK_LEN); in eap_aka_prime_derive_keys() 424 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, in eap_aka_prime_derive_ck_ik_prime() argument 459 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': IK", ik, EAP_AKA_IK_LEN); in eap_aka_prime_derive_ck_ik_prime() 466 os_memcpy(key + EAP_AKA_CK_LEN, ik, EAP_AKA_IK_LEN); in eap_aka_prime_derive_ck_ik_prime() 488 os_memcpy(ik, hash + EAP_AKA_CK_LEN, EAP_AKA_IK_LEN); in eap_aka_prime_derive_ck_ik_prime() 490 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': IK'", ik, EAP_AKA_IK_LE in eap_aka_prime_derive_ck_ik_prime() 56 eap_aka_derive_mk(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *mk) eap_aka_derive_mk() argument 275 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) eap_aka_prime_derive_keys() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_sim_common.h | 83 const u8 *ik, const u8 *ck, u8 *mk); 97 const u8 *ik, const u8 *ck, u8 *k_encr, 108 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, 114 const u8 *ik, const u8 *ck, in eap_aka_prime_derive_keys() 112 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) eap_aka_prime_derive_keys() argument
|
H A D | eap_sim_common.c | 61 const u8 *ik, const u8 *ck, u8 *mk) in eap_aka_derive_mk() 68 addr[1] = ik; in eap_aka_derive_mk() 75 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN); in eap_aka_derive_mk() 280 const u8 *ik, const u8 *ck, u8 *k_encr, in eap_aka_prime_derive_keys() 297 os_memcpy(key, ik, EAP_AKA_IK_LEN); in eap_aka_prime_derive_keys() 428 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, in eap_aka_prime_derive_ck_ik_prime() argument 463 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': IK", ik, EAP_AKA_IK_LEN); in eap_aka_prime_derive_ck_ik_prime() 470 os_memcpy(key + EAP_AKA_CK_LEN, ik, EAP_AKA_IK_LEN); in eap_aka_prime_derive_ck_ik_prime() 492 os_memcpy(ik, hash + EAP_AKA_CK_LEN, EAP_AKA_IK_LEN); in eap_aka_prime_derive_ck_ik_prime() 494 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': IK'", ik, EAP_AKA_IK_LE in eap_aka_prime_derive_ck_ik_prime() 60 eap_aka_derive_mk(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *mk) eap_aka_derive_mk() argument 279 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) eap_aka_prime_derive_keys() argument [all...] |
/third_party/vk-gl-cts/external/vulkancts/modules_no_buildgn/vulkan/compute/ |
H A D | vktComputeCooperativeMatrixTests.cpp | 1059 deUint32 ik, kj, ij; in iterate() local 1072 ik = mX * M + i + strides[0] * (mY * K + k); in iterate() 1074 ik = mX * K + k + strides[0] * (mY * M + i); in iterate() 1076 float Aik = getDataFloat(ptrs[0], dataTypes[0], ik); in iterate() 1180 deUint32 ik, kj, ij; in iterate() local 1193 ik = mX * M + i + strides[0] * (mY * K + k); in iterate() 1195 ik = mX * K + k + strides[0] * (mY * M + i); in iterate() 1197 deUint32 Aik = getDataInt(ptrs[0], dataTypes[0], ik); in iterate()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/ |
H A D | pcsc_funcs.h | 24 unsigned char *ik, unsigned char *ck, unsigned char *auts);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/utils/ |
H A D | pcsc_funcs.h | 24 unsigned char *ik, unsigned char *ck, unsigned char *auts);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_sim_db.h | 86 u8 *_rand, u8 *autn, u8 *ik, u8 *ck,
|
H A D | eap_server_aka.c | 31 u8 ik[EAP_AKA_IK_LEN]; member 807 data->rand, data->autn, data->ik, in eap_aka_fullauth() 824 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik, in eap_aka_fullauth() 857 eap_aka_prime_derive_keys(sm->identity, identity_len, data->ik, in eap_aka_fullauth() 861 eap_aka_derive_mk(sm->identity, identity_len, data->ik, in eap_aka_fullauth()
|
H A D | eap_sim_db.c | 52 u8 ik[EAP_AKA_IK_LEN]; member 584 if (hexstr2bin(start, entry->u.aka.ik, EAP_AKA_IK_LEN)) in eap_sim_db_aka_resp_auth() 1375 * @ik: Buffer for IK value 1394 u8 *_rand, u8 *autn, u8 *ik, u8 *ck, in eap_sim_db_get_aka_auth() 1433 os_memcpy(ik, entry->u.aka.ik, EAP_AKA_IK_LEN); in eap_sim_db_get_aka_auth() 1393 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) eap_sim_db_get_aka_auth() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_sim_db.h | 86 u8 *_rand, u8 *autn, u8 *ik, u8 *ck,
|
H A D | eap_server_aka.c | 31 u8 ik[EAP_AKA_IK_LEN]; member 807 data->rand, data->autn, data->ik, in eap_aka_fullauth() 824 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik, in eap_aka_fullauth() 857 eap_aka_prime_derive_keys(sm->identity, identity_len, data->ik, in eap_aka_fullauth() 861 eap_aka_derive_mk(sm->identity, identity_len, data->ik, in eap_aka_fullauth()
|
H A D | eap_sim_db.c | 52 u8 ik[EAP_AKA_IK_LEN]; member 584 if (hexstr2bin(start, entry->u.aka.ik, EAP_AKA_IK_LEN)) in eap_sim_db_aka_resp_auth() 1375 * @ik: Buffer for IK value 1394 u8 *_rand, u8 *autn, u8 *ik, u8 *ck, in eap_sim_db_get_aka_auth() 1433 os_memcpy(ik, entry->u.aka.ik, EAP_AKA_IK_LEN); in eap_sim_db_get_aka_auth() 1393 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) eap_sim_db_get_aka_auth() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap_aka.c | 23 u8 ik[EAP_AKA_IK_LEN], ck[EAP_AKA_CK_LEN], res[EAP_AKA_RES_MAX_LEN]; member 216 if (hexstr2bin(pos, data->ik, EAP_AKA_IK_LEN) < 0) in eap_aka_ext_sim_result() 218 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", data->ik, EAP_AKA_IK_LEN); in eap_aka_ext_sim_result() 271 data->ik, data->ck, data->auts); in eap_aka_umts_auth() 304 data->ik, data->ck, in eap_aka_umts_auth() 317 os_memset(data->ik, '3', EAP_AKA_IK_LEN); in eap_aka_umts_auth() 1033 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik, in eap_aka_process_challenge() 1061 eap_aka_prime_derive_keys(identity, identity_len, data->ik, in eap_aka_process_challenge() 1065 eap_aka_derive_mk(identity, identity_len, data->ik, data->ck, in eap_aka_process_challenge()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | eap_aka.c | 23 u8 ik[EAP_AKA_IK_LEN], ck[EAP_AKA_CK_LEN], res[EAP_AKA_RES_MAX_LEN]; member 216 if (hexstr2bin(pos, data->ik, EAP_AKA_IK_LEN) < 0) in eap_aka_ext_sim_result() 218 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", data->ik, EAP_AKA_IK_LEN); in eap_aka_ext_sim_result() 271 data->ik, data->ck, data->auts); in eap_aka_umts_auth() 304 data->ik, data->ck, in eap_aka_umts_auth() 317 os_memset(data->ik, '3', EAP_AKA_IK_LEN); in eap_aka_umts_auth() 1047 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik, in eap_aka_process_challenge() 1075 eap_aka_prime_derive_keys(identity, identity_len, data->ik, in eap_aka_process_challenge() 1079 eap_aka_derive_mk(identity, identity_len, data->ik, data->ck, in eap_aka_process_challenge()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hostapd/ |
H A D | hlr_auc_gw.c | 740 u8 ik[EAP_AKA_IK_LEN]; in aka_req_auth() local 764 autn, ik, ck, res, &res_len); in aka_req_auth() 775 memset(ik, '3', EAP_AKA_IK_LEN); in aka_req_auth() 801 pos += wpa_snprintf_hex(pos, end - pos, ik, EAP_AKA_IK_LEN); in aka_req_auth()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/hostapd/ |
H A D | hlr_auc_gw.c | 740 u8 ik[EAP_AKA_IK_LEN]; in aka_req_auth() local 764 autn, ik, ck, res, &res_len); in aka_req_auth() 775 memset(ik, '3', EAP_AKA_IK_LEN); in aka_req_auth() 801 pos += wpa_snprintf_hex(pos, end - pos, ik, EAP_AKA_IK_LEN); in aka_req_auth()
|
/third_party/vk-gl-cts/external/vulkancts/modules/vulkan/compute/ |
H A D | vktComputeCooperativeMatrixTests.cpp | 1466 deUint32 ik, kj, ij; in iterate() local 1479 ik = mX * M + i + strides[0] * mY * K + loadStrides[0] * k; in iterate() 1481 ik = mX * K + k + strides[0] * mY * M + loadStrides[0] * i; in iterate() 1483 float Aik = getDataFloat(ptrs[0], dataTypes[0], ik); in iterate() 1597 deUint32 ik, kj, ij; in iterate() local 1611 ik = mX * M + i + strides[0] * mY * K + loadStrides[0] * k; in iterate() 1613 ik = mX * K + k + strides[0] * mY * M + loadStrides[0] * i; in iterate() 1615 deUint32 Aik = getDataInt(ptrs[0], dataTypes[0], ik); in iterate()
|