/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
D | milenage.c | 89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) in milenage_f2345() argument 133 if (ik) { in milenage_f2345() 138 if (aes_128_encrypt_block(k, tmp1, ik)) in milenage_f2345() 141 ik[i] ^= opc[i]; in milenage_f2345() 174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, in milenage_generate() argument 185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) { in milenage_generate() 237 u8 res[8], ck[16], ik[16]; in gsm_milenage() local 240 if (milenage_f2345(opc, k, _rand, res, ck, ik, NULL, NULL)) in gsm_milenage() 244 kc[i] = ck[i] ^ ck[i + 8] ^ ik[i] ^ ik[i + 8]; in gsm_milenage() 271 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, in milenage_check() argument [all …]
|
D | milenage.h | 13 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, 25 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
D | milenage.c | 89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) in milenage_f2345() argument 133 if (ik) { in milenage_f2345() 138 if (aes_128_encrypt_block(k, tmp1, ik)) in milenage_f2345() 141 ik[i] ^= opc[i]; in milenage_f2345() 174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, in milenage_generate() argument 185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) { in milenage_generate() 237 u8 res[8], ck[16], ik[16]; in gsm_milenage() local 240 if (milenage_f2345(opc, k, _rand, res, ck, ik, NULL, NULL)) in gsm_milenage() 244 kc[i] = ck[i] ^ ck[i + 8] ^ ik[i] ^ ik[i + 8]; in gsm_milenage() 271 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, in milenage_check() argument [all …]
|
D | milenage.h | 13 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, 25 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar);
|
/third_party/mbedtls/library/ |
D | aesni.c | 221 __m128i *ik = (__m128i *) invkey; in mbedtls_aesni_inverse_key() local 224 *ik = *fk; in mbedtls_aesni_inverse_key() 225 for (--fk, ++ik; fk > (const __m128i *) fwdkey; --fk, ++ik) { in mbedtls_aesni_inverse_key() 226 *ik = _mm_aesimc_si128(*fk); in mbedtls_aesni_inverse_key() 228 *ik = *fk; in mbedtls_aesni_inverse_key() 591 unsigned char *ik = invkey; in mbedtls_aesni_inverse_key() local 594 memcpy(ik, fk, 16); in mbedtls_aesni_inverse_key() 596 for (fk -= 16, ik += 16; fk > fwdkey; fk -= 16, ik += 16) { in mbedtls_aesni_inverse_key() 601 : "r" (fk), "r" (ik) in mbedtls_aesni_inverse_key() 605 memcpy(ik, fk, 16); in mbedtls_aesni_inverse_key()
|
/third_party/typescript/tests/baselines/reference/ |
D | propertiesOfGenericConstructorFunctions.types | 5 * @param {string} ik 8 function Multimap(ik, iv) { 10 >ik : string 22 this._map2 = { [ik]: iv }; 23 >this._map2 = { [ik]: iv } : { [x: string]: V; } 27 >{ [ik]: iv } : { [x: string]: V; } 28 >[ik] : V 29 >ik : string
|
D | propertiesOfGenericConstructorFunctions.symbols | 5 * @param {string} ik 8 function Multimap(ik, iv) { 10 >ik : Symbol(ik, Decl(propertiesOfGenericConstructorFunctions.js, 6, 18)) 20 this._map2 = { [ik]: iv }; 24 >[ik] : Symbol([ik], Decl(propertiesOfGenericConstructorFunctions.js, 10, 18)) 25 >ik : Symbol(ik, Decl(propertiesOfGenericConstructorFunctions.js, 6, 18))
|
/third_party/mesa3d/src/gallium/frontends/clover/llvm/ |
D | compat.hpp | 102 clang::InputKind ik, const ::llvm::Triple& triple, in compiler_set_lang_defaults() argument 106 c->getLangOpts().setLangDefaults(c->getLangOpts(), ik.getLanguage(), triple, in compiler_set_lang_defaults() 108 c->getInvocation().setLangDefaults(c->getLangOpts(), ik, triple, in compiler_set_lang_defaults()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
D | eap_sim_common.h | 83 const u8 *ik, const u8 *ck, u8 *mk); 97 const u8 *ik, const u8 *ck, u8 *k_encr, 108 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, 114 const u8 *ik, const u8 *ck, in eap_aka_prime_derive_keys() argument
|
D | eap_sim_common.c | 61 const u8 *ik, const u8 *ck, u8 *mk) in eap_aka_derive_mk() argument 68 addr[1] = ik; in eap_aka_derive_mk() 75 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN); in eap_aka_derive_mk() 280 const u8 *ik, const u8 *ck, u8 *k_encr, in eap_aka_prime_derive_keys() argument 297 os_memcpy(key, ik, EAP_AKA_IK_LEN); in eap_aka_prime_derive_keys() 428 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, in eap_aka_prime_derive_ck_ik_prime() argument 463 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': IK", ik, EAP_AKA_IK_LEN); in eap_aka_prime_derive_ck_ik_prime() 470 os_memcpy(key + EAP_AKA_CK_LEN, ik, EAP_AKA_IK_LEN); in eap_aka_prime_derive_ck_ik_prime() 492 os_memcpy(ik, hash + EAP_AKA_CK_LEN, EAP_AKA_IK_LEN); in eap_aka_prime_derive_ck_ik_prime() 494 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': IK'", ik, EAP_AKA_IK_LEN); in eap_aka_prime_derive_ck_ik_prime()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
D | eap_sim_common.h | 79 const u8 *ik, const u8 *ck, u8 *mk); 93 const u8 *ik, const u8 *ck, u8 *k_encr, 104 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, 110 const u8 *ik, const u8 *ck, in eap_aka_prime_derive_keys() argument
|
D | eap_sim_common.c | 57 const u8 *ik, const u8 *ck, u8 *mk) in eap_aka_derive_mk() argument 64 addr[1] = ik; in eap_aka_derive_mk() 71 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN); in eap_aka_derive_mk() 276 const u8 *ik, const u8 *ck, u8 *k_encr, in eap_aka_prime_derive_keys() argument 293 os_memcpy(key, ik, EAP_AKA_IK_LEN); in eap_aka_prime_derive_keys() 424 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, in eap_aka_prime_derive_ck_ik_prime() argument 459 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': IK", ik, EAP_AKA_IK_LEN); in eap_aka_prime_derive_ck_ik_prime() 466 os_memcpy(key + EAP_AKA_CK_LEN, ik, EAP_AKA_IK_LEN); in eap_aka_prime_derive_ck_ik_prime() 488 os_memcpy(ik, hash + EAP_AKA_CK_LEN, EAP_AKA_IK_LEN); in eap_aka_prime_derive_ck_ik_prime() 490 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': IK'", ik, EAP_AKA_IK_LEN); in eap_aka_prime_derive_ck_ik_prime()
|
/third_party/typescript/tests/cases/conformance/salsa/ |
D | propertiesOfGenericConstructorFunctions.ts | 12 function Multimap(ik, iv) { 16 this._map2 = { [ik]: iv };
|
/third_party/skia/third_party/externals/icu/source/data/region/ |
D | yav.txt | 23 BE{"Pɛlsíik"} 40 CF{"Santalafilíik"} 101 JM{"samayíik"} 135 MQ{"maltiníik"} 142 MX{"mɛksíik"}
|
D | tr.txt | 39 AE{"Birleşik Arap Emirlikleri"} 119 GB{"Birleşik Krallık"} 279 US{"Amerika Birleşik Devletleri"}
|
/third_party/icu/icu4c/source/data/region/ |
D | yav.txt | 23 BE{"Pɛlsíik"} 40 CF{"Santalafilíik"} 101 JM{"samayíik"} 135 MQ{"maltiníik"} 142 MX{"mɛksíik"}
|
D | tr.txt | 39 AE{"Birleşik Arap Emirlikleri"} 119 GB{"Birleşik Krallık"} 279 US{"Amerika Birleşik Devletleri"}
|
/third_party/skia/third_party/externals/icu/source/data/locales/ |
D | ebu.txt | 176 "Mweri wa ikũmi", 177 "Mweri wa ikũmi na ũmwe", 178 "Mweri wa ikũmi na Kaĩrĩ",
|
D | ki.txt | 173 "Mwere wa ikũmi", 174 "Mwere wa ikũmi na ũmwe",
|
/third_party/icu/icu4c/source/data/locales/ |
D | ebu.txt | 196 "Mweri wa ikũmi", 197 "Mweri wa ikũmi na ũmwe", 198 "Mweri wa ikũmi na Kaĩrĩ",
|
D | ki.txt | 193 "Mwere wa ikũmi", 194 "Mwere wa ikũmi na ũmwe",
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
D | eap_aka.c | 23 u8 ik[EAP_AKA_IK_LEN], ck[EAP_AKA_CK_LEN], res[EAP_AKA_RES_MAX_LEN]; member 216 if (hexstr2bin(pos, data->ik, EAP_AKA_IK_LEN) < 0) in eap_aka_ext_sim_result() 218 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", data->ik, EAP_AKA_IK_LEN); in eap_aka_ext_sim_result() 271 data->ik, data->ck, data->auts); in eap_aka_umts_auth() 304 data->ik, data->ck, in eap_aka_umts_auth() 317 os_memset(data->ik, '3', EAP_AKA_IK_LEN); in eap_aka_umts_auth() 1033 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik, in eap_aka_process_challenge() 1061 eap_aka_prime_derive_keys(identity, identity_len, data->ik, in eap_aka_process_challenge() 1065 eap_aka_derive_mk(identity, identity_len, data->ik, data->ck, in eap_aka_process_challenge()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
D | eap_aka.c | 23 u8 ik[EAP_AKA_IK_LEN], ck[EAP_AKA_CK_LEN], res[EAP_AKA_RES_MAX_LEN]; member 216 if (hexstr2bin(pos, data->ik, EAP_AKA_IK_LEN) < 0) in eap_aka_ext_sim_result() 218 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", data->ik, EAP_AKA_IK_LEN); in eap_aka_ext_sim_result() 271 data->ik, data->ck, data->auts); in eap_aka_umts_auth() 304 data->ik, data->ck, in eap_aka_umts_auth() 317 os_memset(data->ik, '3', EAP_AKA_IK_LEN); in eap_aka_umts_auth() 1047 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik, in eap_aka_process_challenge() 1075 eap_aka_prime_derive_keys(identity, identity_len, data->ik, in eap_aka_process_challenge() 1079 eap_aka_derive_mk(identity, identity_len, data->ik, data->ck, in eap_aka_process_challenge()
|
/third_party/vk-gl-cts/external/vulkancts/modules_no_buildgn/vulkan/compute/ |
D | vktComputeCooperativeMatrixTests.cpp | 1059 deUint32 ik, kj, ij; in iterate() local 1072 ik = mX * M + i + strides[0] * (mY * K + k); in iterate() 1074 ik = mX * K + k + strides[0] * (mY * M + i); in iterate() 1076 float Aik = getDataFloat(ptrs[0], dataTypes[0], ik); in iterate() 1180 deUint32 ik, kj, ij; in iterate() local 1193 ik = mX * M + i + strides[0] * (mY * K + k); in iterate() 1195 ik = mX * K + k + strides[0] * (mY * M + i); in iterate() 1197 deUint32 Aik = getDataInt(ptrs[0], dataTypes[0], ik); in iterate()
|
/third_party/vk-gl-cts/external/vulkancts/modules/vulkan/compute/ |
D | vktComputeCooperativeMatrixTests.cpp | 1059 deUint32 ik, kj, ij; in iterate() local 1072 ik = mX * M + i + strides[0] * (mY * K + k); in iterate() 1074 ik = mX * K + k + strides[0] * (mY * M + i); in iterate() 1076 float Aik = getDataFloat(ptrs[0], dataTypes[0], ik); in iterate() 1180 deUint32 ik, kj, ij; in iterate() local 1193 ik = mX * M + i + strides[0] * (mY * K + k); in iterate() 1195 ik = mX * K + k + strides[0] * (mY * M + i); in iterate() 1197 deUint32 Aik = getDataInt(ptrs[0], dataTypes[0], ik); in iterate()
|