/external/wpa_supplicant_8/src/crypto/ |
milenage.c | 83 * @ik: Buffer for IK = 128-bit integrity key (f4), or %NULL 89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) 133 if (ik) { 138 if (aes_128_encrypt_block(k, tmp1, ik)) 141 ik[i] ^= opc[i]; 161 * milenage_generate - Generate AKA AUTN,IK,CK,RES 168 * @ik: Buffer for IK = 128-bit integrity key (f4), or %NULL 174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 237 u8 res[8], ck[16], ik[16]; local [all...] |
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/i686-linux/include/c++/4.4.3/parallel/ |
losertree.h | 71 unsigned int ik, k, offset; member in class:__gnu_parallel::LoserTreeBase 99 ik = _k; 102 _M_log_k = __log2(ik - 1) + 1; 110 for (unsigned int i = ik - 1; i < k; ++i) 354 unsigned int ik, k, offset; member in class:__gnu_parallel::LoserTreePointerBase 362 ik = _k; 365 k = 1 << (__log2(ik - 1) + 1); 368 for (unsigned int i = ik - 1; i < k; i++) 563 unsigned int ik, k, offset; member in class:__gnu_parallel::LoserTreeUnguardedBase 573 ik = _k 798 unsigned int ik, k, offset; member in class:__gnu_parallel::LoserTreePointerUnguardedBase [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/hlr_auc_gw/ |
milenage.c | 89 * @ik: Buffer for IK = 128-bit integrity key (f4), or %NULL 95 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) 139 if (ik) { 144 if (aes_128_encrypt_block(k, tmp1, ik)) 147 ik[i] ^= opc[i]; 167 * milenage_generate - Generate AKA AUTN,IK,CK,RES 174 * @ik: Buffer for IK = 128-bit integrity key (f4), or %NULL 180 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 243 u8 res[8], ck[16], ik[16]; local [all...] |
hlr_auc_gw.c | 30 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> 37 * Kc/SRES/RAND/AUTN/IK/CK/RES/AUTS as hex strings. 471 /* AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> */ 475 u8 ik[EAP_AKA_IK_LEN]; local 492 autn, ik, ck, res, &res_len); 499 memset(ik, '3', EAP_AKA_IK_LEN); 518 pos += wpa_snprintf_hex(pos, end - pos, ik, EAP_AKA_IK_LEN);
|
/external/libvorbis/lib/ |
smallft.c | 275 int idij,ipph,i,j,k,l,ic,ik,is; local 293 for(ik=0;ik<idl1;ik++)ch2[ik]=c2[ik]; 391 for(ik=0;ik<idl1;ik++)c2[ik]=ch2[ik] 843 int idij,ipph,i,j,k,l,ik,is,t0,t1,t2,t3,t4,t5,t6,t7,t8,t9,t10, local [all...] |
/external/speex/libspeex/ |
smallft.c | 277 int idij,ipph,i,j,k,l,ic,ik,is; local 295 for(ik=0;ik<idl1;ik++)ch2[ik]=c2[ik]; 393 for(ik=0;ik<idl1;ik++)c2[ik]=ch2[ik] 845 int idij,ipph,i,j,k,l,ik,is,t0,t1,t2,t3,t4,t5,t6,t7,t8,t9,t10, local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_aka.c | 31 u8 ik[EAP_AKA_IK_LEN], ck[EAP_AKA_CK_LEN], res[EAP_AKA_RES_MAX_LEN]; member in struct:eap_aka_data 155 data->ik, data->ck, data->auts); 188 data->ik, data->ck, 201 os_memset(data->ik, '3', EAP_AKA_IK_LEN); 845 * needed 6-octet SQN ^ AK for CK',IK' derivation */ 852 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik, 869 eap_aka_prime_derive_keys(identity, identity_len, data->ik, 873 eap_aka_derive_mk(identity, identity_len, data->ik, data->ck, [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_aka.c | 37 u8 ik[EAP_AKA_IK_LEN]; member in struct:eap_aka_data 695 data->ik, data->ck, data->res, 707 * needed 6-octet SQN ^AK for CK',IK' derivation */ 708 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik, 741 eap_aka_prime_derive_keys(identity, identity_len, data->ik, 745 eap_aka_derive_mk(sm->identity, identity_len, data->ik, [all...] |
eap_sim_db.c | 57 u8 ik[EAP_AKA_IK_LEN]; member in struct:eap_sim_db_pending::__anon16852::__anon16854 194 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> 196 * (IMSI = ASCII string, RAND/AUTN/IK/CK/RES = hex string) 236 if (hexstr2bin(start, entry->u.aka.ik, EAP_AKA_IK_LEN)) 1153 * @ik: Buffer for IK value 1175 size_t identity_len, u8 *_rand, u8 *autn, u8 *ik, [all...] |
/external/wpa_supplicant_8/hostapd/ |
hlr_auc_gw.c | 24 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> 31 * Kc/SRES/RAND/AUTN/IK/CK/RES/AUTS as hex strings. 717 /* AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> */ 721 u8 ik[EAP_AKA_IK_LEN]; local 743 autn, ik, ck, res, &res_len); 750 memset(ik, '3', EAP_AKA_IK_LEN); 776 pos += wpa_snprintf_hex(pos, end - pos, ik, EAP_AKA_IK_LEN);
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_aka.c | 31 u8 ik[EAP_AKA_IK_LEN]; member in struct:eap_aka_data 778 data->rand, data->autn, data->ik, 790 * needed 6-octet SQN ^AK for CK',IK' derivation */ 791 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik, 824 eap_aka_prime_derive_keys(sm->identity, identity_len, data->ik, 828 eap_aka_derive_mk(sm->identity, identity_len, data->ik, [all...] |
eap_sim_db.c | 53 u8 ik[EAP_AKA_IK_LEN]; member in struct:eap_sim_db_pending::__anon17074::__anon17076 487 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> 489 * (IMSI = ASCII string, RAND/AUTN/IK/CK/RES = hex string) 529 if (hexstr2bin(start, entry->u.aka.ik, EAP_AKA_IK_LEN)) [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_aka.c | 23 u8 ik[EAP_AKA_IK_LEN], ck[EAP_AKA_CK_LEN], res[EAP_AKA_RES_MAX_LEN]; member in struct:eap_aka_data 157 data->ik, data->ck, data->auts); 190 data->ik, data->ck, 203 os_memset(data->ik, '3', EAP_AKA_IK_LEN); 872 * needed 6-octet SQN ^ AK for CK',IK' derivation */ 879 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik, 896 eap_aka_prime_derive_keys(identity, identity_len, data->ik, 900 eap_aka_derive_mk(identity, identity_len, data->ik, data->ck, [all...] |
/frameworks/av/libvideoeditor/vss/src/ |
M4xVSS_internal.c | 4155 M4OSA_UInt32 ik; local [all...] |