HomeSort by relevance Sort by last modified time
    Searched refs:sak (Results 1 - 17 of 17) sorted by null

  /external/libnfc-nxp/src/
phFriNfc_SmtCrdFmt.c 202 uint8_t sak = 0; local
208 sak = NdefSmtCrdFmt->psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak;
213 if (0x00 == sak)
257 uint8_t sak = 0; local
265 /* SAK (Select response) */
266 sak = NdefSmtCrdFmt->psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak;
271 /* SAK (Select response) */
272 sak = NdefSmtCrdFmt->psRemoteDevInfo->RemoteDevInfo.CardInfo106
    [all...]
phHciNfc_CE_A.c 148 static uint8_t sak = HOST_CE_A_SAK_DEFAULT; local
189 /* HOST Card Emulation A SAK Configuration */
191 /* Configure the SAK of Host Card Emulation A */
192 sak = (uint8_t)HOST_CE_A_SAK_DEFAULT;
193 ps_pipe_info->param_info =(void*)&sak ;
194 ps_pipe_info->param_length = sizeof(sak) ;
phFriNfc_NdefMap.c 717 uint8_t sak; local
744 sak = NdefMap->psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak;
769 if(0x00 == sak)
771 /* The SAK/Sel_Res says the card is of the type
780 else if ((0x08 == (sak & 0x18)) ||
781 (0x18 == (sak & 0x18)) ||
782 (0x01 == sak))
784 /* The SAK/Sel_Res says the card is of the type
797 The SAK/Sel_Res is wrong *
    [all...]
phFriNfc_MifareStdMap.c 572 sak; local
590 sak = NdefMap->psRemoteDevInfo->RemoteDevInfo.CardInfo106.
595 sak = NdefMap->psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak;
600 if (0x08 == (sak & 0x18))
654 /* Mifare 1k, sak = 0x08 atq = 0x04
655 Mifare 4k, sak = 0x38 atq = 0x02 */
    [all...]
  /external/wpa_supplicant_8/src/pae/
ieee802_1x_key.h 24 size_t ctx_bytes, u8 *sak);
ieee802_1x_key.c 8 * SAK derivation specified in IEEE Std 802.1X-2010, Clause 6.2
183 * SAK = KDF(Key, Label, KS-nonce | MI-value list | KN, SAKLength)
186 size_t ctx_bytes, u8 *sak)
188 return aes_kdf_128(cak, "IEEE8021 SAK", ctx, ctx_bytes * 8, 128, sak);
ieee802_1x_kay.h 78 const u8 *sak);
87 Boolean confidentiality, const u8 *sak);
ieee802_1x_kay.c 186 wpa_printf(MSG_INFO, "*** Distributed SAK ***");
196 wpa_hexdump(MSG_INFO, "\tAES Key Wrap of SAK...:", body->sak, 24);
218 wpa_printf(MSG_DEBUG, "*** MACsec SAK Use ***");
1264 "KaY: MKA Use SAK Packet Body Length (%d bytes) should be 0, 40, or more octets",
1429 struct data_key *sak; local
3395 struct data_key *sak; local
    [all...]
ieee802_1x_kay_i.h 33 /* KN + Wrapper SAK */
392 /* for GCM-AES-128: octet 9-32: SAK
393 * for other cipher suite: octet 9-16: cipher suite id, octet 17-: SAK
395 u8 sak[0]; member in struct:ieee802_1x_mka_dist_sak_body
  /cts/apps/CtsVerifier/src/com/android/cts/verifier/nfc/hce/
ProtocolParamsReaderActivity.java 46 short sak, byte[] atqa, byte[] ats) {
51 sb.append("SAK: 0x" + Integer.toHexString(sak & 0xFF) + "\n");
53 if ((sak & 0x20) != 0) {
60 if ((sak & 0x40) != 0) {
  /external/wpa_supplicant_8/wpa_supplicant/
wpas_kay.c 124 u32 lowest_pn, const u8 *sak)
126 return wpa_drv_create_receive_sa(wpa_s, channel, an, lowest_pn, sak);
166 const u8 *sak)
169 confidentiality, sak);
driver_i.h 764 u32 lowest_pn, const u8 *sak)
769 lowest_pn, sak);
821 const u8 *sak)
826 next_pn, confidentiality, sak);
  /packages/apps/Nfc/nxp/jni/
com_android_nfc.h 244 int get_technology_type(phNfc_eRemDevType_t type, uint8_t sak);
com_android_nfc.cpp 465 int sak = devList[target].psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak; local
466 switch(sak)
  /external/wpa_supplicant_8/src/drivers/
driver_macsec_qca.c 666 u32 lowest_pn, const u8 *sak)
678 rx_sak.sak[i] = sak[15 - i];
794 const u8 *sak)
818 tx_sak.sak[i] = sak[15 - i];
driver.h     [all...]
  /external/libnfc-nci/src/hal/int/
nfc_brcm_defs.h 313 UINT8 sak; member in struct:__anon28546

Completed in 192 milliseconds