/external/wpa_supplicant_8/src/crypto/ |
D | milenage.c | 89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) in milenage_f2345() argument 133 if (ik) { in milenage_f2345() 138 if (aes_128_encrypt_block(k, tmp1, ik)) in milenage_f2345() 141 ik[i] ^= opc[i]; in milenage_f2345() 174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, in milenage_generate() argument 185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) { in milenage_generate() 237 u8 res[8], ck[16], ik[16]; in gsm_milenage() local 240 if (milenage_f2345(opc, k, _rand, res, ck, ik, NULL, NULL)) in gsm_milenage() 244 kc[i] = ck[i] ^ ck[i + 8] ^ ik[i] ^ ik[i + 8]; in gsm_milenage() 271 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, in milenage_check() argument [all …]
|
D | milenage.h | 13 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, 25 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar);
|
/external/wpa_supplicant_6/wpa_supplicant/src/hlr_auc_gw/ |
D | milenage.c | 95 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) in milenage_f2345() argument 139 if (ik) { in milenage_f2345() 144 if (aes_128_encrypt_block(k, tmp1, ik)) in milenage_f2345() 147 ik[i] ^= opc[i]; in milenage_f2345() 180 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, in milenage_generate() argument 191 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) { in milenage_generate() 243 u8 res[8], ck[16], ik[16]; in gsm_milenage() local 246 if (milenage_f2345(opc, k, _rand, res, ck, ik, NULL, NULL)) in gsm_milenage() 250 kc[i] = ck[i] ^ ck[i + 8] ^ ik[i] ^ ik[i + 8]; in gsm_milenage() 277 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, in milenage_check() argument [all …]
|
D | milenage.h | 19 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 26 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
|
D | hlr_auc_gw.c | 475 u8 ik[EAP_AKA_IK_LEN]; in aka_req_auth() local 492 autn, ik, ck, res, &res_len); in aka_req_auth() 499 memset(ik, '3', EAP_AKA_IK_LEN); in aka_req_auth() 518 pos += wpa_snprintf_hex(pos, end - pos, ik, EAP_AKA_IK_LEN); in aka_req_auth()
|
/external/speex/libspeex/ |
D | smallft.c | 277 int idij,ipph,i,j,k,l,ic,ik,is; in dradfg() local 295 for(ik=0;ik<idl1;ik++)ch2[ik]=c2[ik]; in dradfg() 393 for(ik=0;ik<idl1;ik++)c2[ik]=ch2[ik]; in dradfg() 426 for(ik=0;ik<idl1;ik++){ in dradfg() 427 ch2[t4++]=c2[ik]+ar1*c2[t7++]; in dradfg() 450 for(ik=0;ik<idl1;ik++){ in dradfg() 461 for(ik=0;ik<idl1;ik++)ch2[ik]+=c2[t2++]; in dradfg() 845 int idij,ipph,i,j,k,l,ik,is,t0,t1,t2,t3,t4,t5,t6,t7,t8,t9,t10, in dradbg() local 998 for(ik=0;ik<idl1;ik++){ in dradbg() 1019 for(ik=0;ik<idl1;ik++){ in dradbg() [all …]
|
/external/libvorbis/lib/ |
D | smallft.c | 275 int idij,ipph,i,j,k,l,ic,ik,is; in dradfg() local 293 for(ik=0;ik<idl1;ik++)ch2[ik]=c2[ik]; in dradfg() 391 for(ik=0;ik<idl1;ik++)c2[ik]=ch2[ik]; in dradfg() 424 for(ik=0;ik<idl1;ik++){ in dradfg() 425 ch2[t4++]=c2[ik]+ar1*c2[t7++]; in dradfg() 448 for(ik=0;ik<idl1;ik++){ in dradfg() 459 for(ik=0;ik<idl1;ik++)ch2[ik]+=c2[t2++]; in dradfg() 843 int idij,ipph,i,j,k,l,ik,is,t0,t1,t2,t3,t4,t5,t6,t7,t8,t9,t10, in dradbg() local 996 for(ik=0;ik<idl1;ik++){ in dradbg() 1017 for(ik=0;ik<idl1;ik++){ in dradbg() [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
D | eap_sim_common.h | 85 const u8 *ik, const u8 *ck, u8 *mk); 99 const u8 *ik, const u8 *ck, u8 *k_encr, 110 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, 116 const u8 *ik, const u8 *ck, in eap_aka_prime_derive_keys() argument
|
D | eap_sim_common.c | 62 const u8 *ik, const u8 *ck, u8 *mk) in eap_aka_derive_mk() argument 69 addr[1] = ik; in eap_aka_derive_mk() 76 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN); in eap_aka_derive_mk() 282 const u8 *ik, const u8 *ck, u8 *k_encr, in eap_aka_prime_derive_keys() argument 299 os_memcpy(key, ik, EAP_AKA_IK_LEN); in eap_aka_prime_derive_keys() 431 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, in eap_aka_prime_derive_ck_ik_prime() argument 466 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': IK", ik, EAP_AKA_IK_LEN); in eap_aka_prime_derive_ck_ik_prime() 473 os_memcpy(key + EAP_AKA_CK_LEN, ik, EAP_AKA_IK_LEN); in eap_aka_prime_derive_ck_ik_prime() 495 os_memcpy(ik, hash + EAP_AKA_CK_LEN, EAP_AKA_IK_LEN); in eap_aka_prime_derive_ck_ik_prime() 497 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': IK'", ik, EAP_AKA_IK_LEN); in eap_aka_prime_derive_ck_ik_prime()
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_sim_common.h | 79 const u8 *ik, const u8 *ck, u8 *mk); 93 const u8 *ik, const u8 *ck, u8 *k_encr, 104 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, 110 const u8 *ik, const u8 *ck, in eap_aka_prime_derive_keys() argument
|
D | eap_sim_common.c | 57 const u8 *ik, const u8 *ck, u8 *mk) in eap_aka_derive_mk() argument 64 addr[1] = ik; in eap_aka_derive_mk() 71 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN); in eap_aka_derive_mk() 277 const u8 *ik, const u8 *ck, u8 *k_encr, in eap_aka_prime_derive_keys() argument 294 os_memcpy(key, ik, EAP_AKA_IK_LEN); in eap_aka_prime_derive_keys() 426 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, in eap_aka_prime_derive_ck_ik_prime() argument 461 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': IK", ik, EAP_AKA_IK_LEN); in eap_aka_prime_derive_ck_ik_prime() 468 os_memcpy(key + EAP_AKA_CK_LEN, ik, EAP_AKA_IK_LEN); in eap_aka_prime_derive_ck_ik_prime() 490 os_memcpy(ik, hash + EAP_AKA_CK_LEN, EAP_AKA_IK_LEN); in eap_aka_prime_derive_ck_ik_prime() 492 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': IK'", ik, EAP_AKA_IK_LEN); in eap_aka_prime_derive_ck_ik_prime()
|
/external/icu4c/data/region/ |
D | yav.txt | 32 BE{"Pɛlsíik"} 49 CF{"Santalafilíik"} 111 JM{"samayíik"} 146 MQ{"maltiníik"} 153 MX{"mɛksíik"}
|
D | tr.txt | 49 AE{"Birleşik Arap Emirlikleri"} 128 GB{"Birleşik Krallık"} 284 UM{"Amerika Birleşik Devletleri Küçük Dış Adaları"} 285 US{"Amerika Birleşik Devletleri"}
|
/external/icu4c/data/locales/ |
D | ebu.txt | 181 "Mweri wa ikũmi", 182 "Mweri wa ikũmi na ũmwe", 183 "Mweri wa ikũmi na Kaĩrĩ",
|
D | ki.txt | 180 "Mwere wa ikũmi", 181 "Mwere wa ikũmi na ũmwe",
|
/external/nist-sip/java/gov/nist/javax/sip/header/ |
D | AuthenticationHeader.java | 512 public void setIK(String ik) throws ParseException { in setIK() argument 513 if (ik == null) in setIK() 517 setParameter(IK, ik); in setIK()
|
/external/nist-sip/java/gov/nist/javax/sip/header/ims/ |
D | WWWAuthenticateHeaderIms.java | 63 public void setIK(String ik) throws ParseException; in setIK() argument
|
/external/wpa_supplicant_6/wpa_supplicant/src/utils/ |
D | pcsc_funcs.h | 55 unsigned char *ik, unsigned char *ck, unsigned char *auts);
|
/external/wpa_supplicant_8/src/utils/ |
D | pcsc_funcs.h | 31 unsigned char *ik, unsigned char *ck, unsigned char *auts);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
D | eap_aka.c | 31 u8 ik[EAP_AKA_IK_LEN], ck[EAP_AKA_CK_LEN], res[EAP_AKA_RES_MAX_LEN]; member 155 data->ik, data->ck, data->auts); in eap_aka_umts_auth() 188 data->ik, data->ck, in eap_aka_umts_auth() 201 os_memset(data->ik, '3', EAP_AKA_IK_LEN); in eap_aka_umts_auth() 852 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik, in eap_aka_process_challenge() 869 eap_aka_prime_derive_keys(identity, identity_len, data->ik, in eap_aka_process_challenge() 873 eap_aka_derive_mk(identity, identity_len, data->ik, data->ck, in eap_aka_process_challenge()
|
/external/eigen/unsupported/Eigen/src/SparseExtra/ |
D | RandomSetter.h | 198 KeyType ik = (1<<(OuterPacketBits+m_keyBitsOffset)); in RandomSetter() local 200 MapTraits<ScalarWrapper>::setInvalidKey(m_hashmaps[k],ik); in RandomSetter()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_sim_db.h | 86 u8 *_rand, u8 *autn, u8 *ik, u8 *ck,
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_aka.c | 23 u8 ik[EAP_AKA_IK_LEN], ck[EAP_AKA_CK_LEN], res[EAP_AKA_RES_MAX_LEN]; member 157 data->ik, data->ck, data->auts); in eap_aka_umts_auth() 190 data->ik, data->ck, in eap_aka_umts_auth() 203 os_memset(data->ik, '3', EAP_AKA_IK_LEN); in eap_aka_umts_auth() 879 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik, in eap_aka_process_challenge() 896 eap_aka_prime_derive_keys(identity, identity_len, data->ik, in eap_aka_process_challenge() 900 eap_aka_derive_mk(identity, identity_len, data->ik, data->ck, in eap_aka_process_challenge()
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
D | eap_sim_db.h | 85 size_t identity_len, u8 *_rand, u8 *autn, u8 *ik,
|
/external/wpa_supplicant_8/hostapd/ |
D | hlr_auc_gw.c | 721 u8 ik[EAP_AKA_IK_LEN]; in aka_req_auth() local 743 autn, ik, ck, res, &res_len); in aka_req_auth() 750 memset(ik, '3', EAP_AKA_IK_LEN); in aka_req_auth() 776 pos += wpa_snprintf_hex(pos, end - pos, ik, EAP_AKA_IK_LEN); in aka_req_auth()
|