/freebsd-12-stable/contrib/wpa/src/crypto/ |
H A D | milenage.c | 83 * @ik: Buffer for IK = 128-bit integrity key (f4), or %NULL 89 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) 133 if (ik) { 138 if (aes_128_encrypt_block(k, tmp1, ik)) 141 ik[i] ^= opc[i]; 168 * @ik: Buffer for IK = 128-bit integrity key (f4), or %NULL 174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) { 237 u8 res[8], ck[16], ik[16]; local 240 if (milenage_f2345(opc, k, _rand, res, ck, ik, NUL 88 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) argument 173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument 270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument [all...] |
H A D | milenage.h | 13 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, 25 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar);
|
/freebsd-12-stable/contrib/wpa/src/utils/ |
H A D | pcsc_funcs.h | 24 unsigned char *ik, unsigned char *ck, unsigned char *auts);
|
H A D | pcsc_funcs.c | 1327 * @ik: 16-byte buffer for IK 1343 unsigned char *ik, unsigned char *ck, unsigned char *auts) 1430 os_memcpy(ik, pos, IK_LEN); 1432 wpa_hexdump(MSG_DEBUG, "SCARD: IK", ik, IK_LEN); 1340 scard_umts_auth(struct scard_data *scard, const unsigned char *_rand, const unsigned char *autn, unsigned char *res, size_t *res_len, unsigned char *ik, unsigned char *ck, unsigned char *auts) argument
|
/freebsd-12-stable/contrib/wpa/src/eap_common/ |
H A D | eap_sim_common.h | 79 const u8 *ik, const u8 *ck, u8 *mk); 93 const u8 *ik, const u8 *ck, u8 *k_encr, 104 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, 110 const u8 *ik, const u8 *ck, 108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
|
H A D | eap_sim_common.c | 57 const u8 *ik, const u8 *ck, u8 *mk) 64 addr[1] = ik; 71 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN); 276 const u8 *ik, const u8 *ck, u8 *k_encr, 293 os_memcpy(key, ik, EAP_AKA_IK_LEN); 424 void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak, argument 459 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': IK", ik, EAP_AKA_IK_LEN); 466 os_memcpy(key + EAP_AKA_CK_LEN, ik, EAP_AKA_IK_LEN); 488 os_memcpy(ik, hash + EAP_AKA_CK_LEN, EAP_AKA_IK_LEN); 490 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': IK'", ik, EAP_AKA_IK_LE 56 eap_aka_derive_mk(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *mk) argument 275 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument [all...] |
/freebsd-12-stable/contrib/wpa/src/eap_server/ |
H A D | eap_sim_db.h | 86 u8 *_rand, u8 *autn, u8 *ik, u8 *ck,
|
H A D | eap_server_aka.c | 31 u8 ik[EAP_AKA_IK_LEN]; member in struct:eap_aka_data 807 data->rand, data->autn, data->ik, 824 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik, 857 eap_aka_prime_derive_keys(sm->identity, identity_len, data->ik, 861 eap_aka_derive_mk(sm->identity, identity_len, data->ik,
|
H A D | eap_sim_db.c | 52 u8 ik[EAP_AKA_IK_LEN]; member in struct:eap_sim_db_pending::__anon7452::__anon7454 584 if (hexstr2bin(start, entry->u.aka.ik, EAP_AKA_IK_LEN)) 1375 * @ik: Buffer for IK value 1394 u8 *_rand, u8 *autn, u8 *ik, u8 *ck, 1433 os_memcpy(ik, entry->u.aka.ik, EAP_AKA_IK_LEN); 1393 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument
|
/freebsd-12-stable/sys/net80211/ |
H A D | ieee80211_ioctl.c | 79 struct ieee80211req_key ik; local 85 if (ireq->i_len != sizeof(ik)) 87 error = copyin(ireq->i_data, &ik, sizeof(ik)); 90 kid = ik.ik_keyix; 92 ni = ieee80211_find_vap_node(&ic->ic_sta, vap, ik.ik_macaddr); 100 IEEE80211_ADDR_COPY(&ik.ik_macaddr, vap->iv_bss->ni_macaddr); 104 ik.ik_type = cip->ic_cipher; 105 ik.ik_keylen = wk->wk_keylen; 106 ik 1172 struct ieee80211req_key ik; local [all...] |
/freebsd-12-stable/contrib/ntp/ntpdc/ |
H A D | ntpdc_ops.c | 2936 struct info_kernel *ik; local 2945 &items, &itemsize, (void *)&ik, 0, 2960 status = ntohs(ik->status) & 0xffff; 2969 (int32)ntohl(ik->offset) * tscale_unano); 2971 fptoa((s_fp)ntohl(ik->freq), 3)); 2973 (u_long)ntohl(ik->maxerror) * tscale_usec); 2975 (u_long)ntohl(ik->esterror) * tscale_usec); 3027 (u_long)ntohl(ik->constant)); 3029 (u_long)ntohl(ik->precision) * tscale_usec); 3031 fptoa((s_fp)ntohl(ik [all...] |
/freebsd-12-stable/contrib/ntp/ntpd/ |
H A D | ntp_request.c | 2438 register struct info_kernel *ik; local 2449 ik = (struct info_kernel *)prepare_pkt(srcadr, inter, inpkt, 2455 ik->offset = htonl((u_int32)ntx.offset); 2456 ik->freq = htonl((u_int32)ntx.freq); 2457 ik->maxerror = htonl((u_int32)ntx.maxerror); 2458 ik->esterror = htonl((u_int32)ntx.esterror); 2459 ik->status = htons(ntx.status); 2460 ik->constant = htonl((u_int32)ntx.constant); 2461 ik->precision = htonl((u_int32)ntx.precision); 2462 ik [all...] |
/freebsd-12-stable/contrib/telnet/libtelnet/ |
H A D | sra.c | 60 IdeaData ik; variable 182 common_key(ska,pkb,&ik,&ck); 267 common_key(ska,pkb,&ik,&ck);
|
/freebsd-12-stable/sbin/ifconfig/ |
H A D | ifieee80211.c | 4737 printkey(const struct ieee80211req_key *ik) argument 4740 u_int keylen = ik->ik_keylen; 4744 (memcmp(ik->ik_keydata, zerodata, keylen) != 0 || verbose); 4747 switch (ik->ik_type) { 4750 LINE_CHECK("wepkey %u:%s", ik->ik_keyix+1, 4757 LINE_CHECK("TKIP %u:%u-bit", ik->ik_keyix+1, 8*keylen); 4760 LINE_CHECK("AES-OCB %u:%u-bit", ik->ik_keyix+1, 8*keylen); 4763 LINE_CHECK("AES-CCM %u:%u-bit", ik->ik_keyix+1, 8*keylen); 4766 LINE_CHECK("CKIP %u:%u-bit", ik->ik_keyix+1, 8*keylen); 4769 LINE_CHECK("NULL %u:%u-bit", ik 5049 struct ieee80211req_key ik; local [all...] |
/freebsd-12-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_aka.c | 23 u8 ik[EAP_AKA_IK_LEN], ck[EAP_AKA_CK_LEN], res[EAP_AKA_RES_MAX_LEN]; member in struct:eap_aka_data 216 if (hexstr2bin(pos, data->ik, EAP_AKA_IK_LEN) < 0) 218 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", data->ik, EAP_AKA_IK_LEN); 271 data->ik, data->ck, data->auts); 304 data->ik, data->ck, 317 os_memset(data->ik, '3', EAP_AKA_IK_LEN); 1033 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik, 1061 eap_aka_prime_derive_keys(identity, identity_len, data->ik, 1065 eap_aka_derive_mk(identity, identity_len, data->ik, data->ck,
|
/freebsd-12-stable/contrib/wpa/hostapd/ |
H A D | hlr_auc_gw.c | 740 u8 ik[EAP_AKA_IK_LEN]; local 764 autn, ik, ck, res, &res_len); 775 memset(ik, '3', EAP_AKA_IK_LEN); 801 pos += wpa_snprintf_hex(pos, end - pos, ik, EAP_AKA_IK_LEN);
|
/freebsd-12-stable/tools/tools/build_option_survey/ |
H A D | option_survey.sh | 81 > ${FDIR}/_.ik 2>&1
|
/freebsd-12-stable/tools/tools/sysbuild/ |
H A D | sysbuild.sh | 557 > ${SBMNT}/_.ik 2>&1
|
/freebsd-12-stable/tools/tools/nanobsd/ |
H A D | defaults.sh | 413 pprint 3 "log: ${NANO_LOG}/_.ik" 429 ) > ${NANO_LOG}/_.ik 2>&1
|
/freebsd-12-stable/release/picobsd/build/ |
H A D | picobsd | 943 df -ik ${dst} | colrm 70 > .build.reply
|