/freebsd-10.1-release/contrib/wpa/src/crypto/ |
H A D | milenage.c | 83 * @ik: Buffer for IK = 128-bit integrity key (f4), or %NULL 89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) 133 if (ik) { 138 if (aes_128_encrypt_block(k, tmp1, ik)) 141 ik[i] ^= opc[i]; 168 * @ik: Buffer for IK = 128-bit integrity key (f4), or %NULL 174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) { 237 u8 res[8], ck[16], ik[16]; local 240 if (milenage_f2345(opc, k, _rand, res, ck, ik, NUL 88 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) argument 173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument 270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument [all...] |
H A D | milenage.h | 13 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, 25 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar);
|
/freebsd-10.1-release/contrib/wpa/src/eap_common/ |
H A D | eap_sim_common.h | 79 const u8 *ik, const u8 *ck, u8 *mk); 93 const u8 *ik, const u8 *ck, u8 *k_encr, 104 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, 110 const u8 *ik, const u8 *ck, 108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
|
H A D | eap_sim_common.c | 57 const u8 *ik, const u8 *ck, u8 *mk) 64 addr[1] = ik; 71 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN); 277 const u8 *ik, const u8 *ck, u8 *k_encr, 294 os_memcpy(key, ik, EAP_AKA_IK_LEN); 426 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, argument 461 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': IK", ik, EAP_AKA_IK_LEN); 468 os_memcpy(key + EAP_AKA_CK_LEN, ik, EAP_AKA_IK_LEN); 490 os_memcpy(ik, hash + EAP_AKA_CK_LEN, EAP_AKA_IK_LEN); 492 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': IK'", ik, EAP_AKA_IK_LE 56 eap_aka_derive_mk(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *mk) argument 276 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument [all...] |
/freebsd-10.1-release/contrib/wpa/src/utils/ |
H A D | pcsc_funcs.h | 31 unsigned char *ik, unsigned char *ck, unsigned char *auts);
|
H A D | pcsc_funcs.c | 1309 * @ik: 16-byte buffer for IK 1325 unsigned char *ik, unsigned char *ck, unsigned char *auts) 1412 os_memcpy(ik, pos, IK_LEN); 1414 wpa_hexdump(MSG_DEBUG, "SCARD: IK", ik, IK_LEN); 1322 scard_umts_auth(struct scard_data *scard, const unsigned char *_rand, const unsigned char *autn, unsigned char *res, size_t *res_len, unsigned char *ik, unsigned char *ck, unsigned char *auts) argument
|
/freebsd-10.1-release/contrib/wpa/src/eap_server/ |
H A D | eap_sim_db.h | 86 u8 *_rand, u8 *autn, u8 *ik, u8 *ck,
|
H A D | eap_server_aka.c | 31 u8 ik[EAP_AKA_IK_LEN]; member in struct:eap_aka_data 790 data->rand, data->autn, data->ik, 803 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik, 836 eap_aka_prime_derive_keys(sm->identity, identity_len, data->ik, 840 eap_aka_derive_mk(sm->identity, identity_len, data->ik,
|
H A D | eap_sim_db.c | 53 u8 ik[EAP_AKA_IK_LEN]; member in struct:eap_sim_db_pending::__anon4780::__anon4782 529 if (hexstr2bin(start, entry->u.aka.ik, EAP_AKA_IK_LEN)) 1308 * @ik: Buffer for IK value 1327 u8 *_rand, u8 *autn, u8 *ik, u8 *ck, 1366 os_memcpy(ik, entry->u.aka.ik, EAP_AKA_IK_LEN); 1326 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument
|
/freebsd-10.1-release/sys/net80211/ |
H A D | ieee80211_ioctl.c | 81 struct ieee80211req_key ik; local 87 if (ireq->i_len != sizeof(ik)) 89 error = copyin(ireq->i_data, &ik, sizeof(ik)); 92 kid = ik.ik_keyix; 94 ni = ieee80211_find_vap_node(&ic->ic_sta, vap, ik.ik_macaddr); 102 IEEE80211_ADDR_COPY(&ik.ik_macaddr, vap->iv_bss->ni_macaddr); 106 ik.ik_type = cip->ic_cipher; 107 ik.ik_keylen = wk->wk_keylen; 108 ik 1146 struct ieee80211req_key ik; local [all...] |
/freebsd-10.1-release/contrib/texinfo/makeinfo/ |
H A D | lang.h | 39 ia, id, ie, ik, is, it, iu, enumerator in enum:__anon4602
|
H A D | lang.c | 461 { ik, "ik", "Inupiak" },
|
/freebsd-10.1-release/contrib/ntp/ntpdc/ |
H A D | ntpdc_ops.c | 2918 struct info_kernel *ik; local 2927 &items, &itemsize, (void *)&ik, 0, 2942 status = ntohs(ik->status) & 0xffff; 2951 (int32)ntohl(ik->offset) * tscale); 2953 fptoa((s_fp)ntohl(ik->freq), 3)); 2955 (u_long)ntohl(ik->maxerror) * tscale); 2957 (u_long)ntohl(ik->esterror) * tscale); 3009 (u_long)ntohl(ik->constant)); 3011 (u_long)ntohl(ik->precision) * tscale); 3013 fptoa((s_fp)ntohl(ik [all...] |
/freebsd-10.1-release/contrib/ntp/ntpd/ |
H A D | ntp_request.c | 2418 register struct info_kernel *ik; local 2429 ik = (struct info_kernel *)prepare_pkt(srcadr, inter, inpkt, 2435 ik->offset = htonl((u_int32)ntx.offset); 2436 ik->freq = htonl((u_int32)ntx.freq); 2437 ik->maxerror = htonl((u_int32)ntx.maxerror); 2438 ik->esterror = htonl((u_int32)ntx.esterror); 2439 ik->status = htons(ntx.status); 2440 ik->constant = htonl((u_int32)ntx.constant); 2441 ik->precision = htonl((u_int32)ntx.precision); 2442 ik [all...] |
/freebsd-10.1-release/contrib/telnet/libtelnet/ |
H A D | sra.c | 60 IdeaData ik; variable 182 common_key(ska,pkb,&ik,&ck); 267 common_key(ska,pkb,&ik,&ck);
|
/freebsd-10.1-release/sbin/ifconfig/ |
H A D | ifieee80211.c | 4137 printkey(const struct ieee80211req_key *ik) argument 4140 int keylen = ik->ik_keylen; 4144 (memcmp(ik->ik_keydata, zerodata, keylen) != 0 || verbose); 4147 switch (ik->ik_type) { 4150 LINE_CHECK("wepkey %u:%s", ik->ik_keyix+1, 4157 LINE_CHECK("TKIP %u:%u-bit", ik->ik_keyix+1, 8*keylen); 4160 LINE_CHECK("AES-OCB %u:%u-bit", ik->ik_keyix+1, 8*keylen); 4163 LINE_CHECK("AES-CCM %u:%u-bit", ik->ik_keyix+1, 8*keylen); 4166 LINE_CHECK("CKIP %u:%u-bit", ik->ik_keyix+1, 8*keylen); 4169 LINE_CHECK("NULL %u:%u-bit", ik 4432 struct ieee80211req_key ik; local [all...] |
/freebsd-10.1-release/contrib/wpa/src/eap_peer/ |
H A D | eap_aka.c | 23 u8 ik[EAP_AKA_IK_LEN], ck[EAP_AKA_CK_LEN], res[EAP_AKA_RES_MAX_LEN]; member in struct:eap_aka_data 157 data->ik, data->ck, data->auts); 190 data->ik, data->ck, 203 os_memset(data->ik, '3', EAP_AKA_IK_LEN); 879 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik, 896 eap_aka_prime_derive_keys(identity, identity_len, data->ik, 900 eap_aka_derive_mk(identity, identity_len, data->ik, data->ck,
|
/freebsd-10.1-release/contrib/wpa/hostapd/ |
H A D | hlr_auc_gw.c | 721 u8 ik[EAP_AKA_IK_LEN]; local 743 autn, ik, ck, res, &res_len); 750 memset(ik, '3', EAP_AKA_IK_LEN); 776 pos += wpa_snprintf_hex(pos, end - pos, ik, EAP_AKA_IK_LEN);
|
/freebsd-10.1-release/tools/tools/build_option_survey/ |
H A D | option_survey.sh | 80 > ${FDIR}/_.ik 2>&1
|
/freebsd-10.1-release/tools/tools/nanobsd/ |
H A D | nanobsd.sh | 315 pprint 3 "log: ${NANO_OBJ}/_.ik" 338 ) > ${NANO_OBJ}/_.ik 2>&1
|
/freebsd-10.1-release/tools/tools/sysbuild/ |
H A D | sysbuild.sh | 530 > ${SBMNT}/_.ik 2>&1
|