/external/libnfc-nxp/src/ |
phFriNfc_SmtCrdFmt.c | 202 uint8_t sak = 0; local 208 sak = NdefSmtCrdFmt->psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak; 213 if (0x00 == sak) 257 uint8_t sak = 0; local 265 /* SAK (Select response) */ 266 sak = NdefSmtCrdFmt->psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak; 271 /* SAK (Select response) */ 272 sak = NdefSmtCrdFmt->psRemoteDevInfo->RemoteDevInfo.CardInfo106 [all...] |
phHciNfc_CE_A.c | 148 static uint8_t sak = HOST_CE_A_SAK_DEFAULT; local 189 /* HOST Card Emulation A SAK Configuration */ 191 /* Configure the SAK of Host Card Emulation A */ 192 sak = (uint8_t)HOST_CE_A_SAK_DEFAULT; 193 ps_pipe_info->param_info =(void*)&sak ; 194 ps_pipe_info->param_length = sizeof(sak) ;
|
phFriNfc_NdefMap.c | 717 uint8_t sak; local 744 sak = NdefMap->psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak; 769 if(0x00 == sak) 771 /* The SAK/Sel_Res says the card is of the type 780 else if ((0x08 == (sak & 0x18)) || 781 (0x18 == (sak & 0x18)) || 782 (0x01 == sak)) 784 /* The SAK/Sel_Res says the card is of the type 797 The SAK/Sel_Res is wrong * [all...] |
phFriNfc_MifareStdMap.c | 572 sak; local 590 sak = NdefMap->psRemoteDevInfo->RemoteDevInfo.CardInfo106. 595 sak = NdefMap->psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak; 600 if (0x08 == (sak & 0x18)) 654 /* Mifare 1k, sak = 0x08 atq = 0x04 655 Mifare 4k, sak = 0x38 atq = 0x02 */ [all...] |
/external/wpa_supplicant_8/src/pae/ |
ieee802_1x_key.h | 24 size_t ctx_bytes, u8 *sak);
|
ieee802_1x_key.c | 8 * SAK derivation specified in IEEE Std 802.1X-2010, Clause 6.2 183 * SAK = KDF(Key, Label, KS-nonce | MI-value list | KN, SAKLength) 186 size_t ctx_bytes, u8 *sak) 188 return aes_kdf_128(cak, "IEEE8021 SAK", ctx, ctx_bytes * 8, 128, sak);
|
ieee802_1x_kay.h | 78 const u8 *sak); 87 Boolean confidentiality, const u8 *sak);
|
ieee802_1x_kay.c | 186 wpa_printf(MSG_INFO, "*** Distributed SAK ***"); 196 wpa_hexdump(MSG_INFO, "\tAES Key Wrap of SAK...:", body->sak, 24); 218 wpa_printf(MSG_DEBUG, "*** MACsec SAK Use ***"); 1264 "KaY: MKA Use SAK Packet Body Length (%d bytes) should be 0, 40, or more octets", 1429 struct data_key *sak; local 3395 struct data_key *sak; local [all...] |
ieee802_1x_kay_i.h | 33 /* KN + Wrapper SAK */ 392 /* for GCM-AES-128: octet 9-32: SAK 393 * for other cipher suite: octet 9-16: cipher suite id, octet 17-: SAK 395 u8 sak[0]; member in struct:ieee802_1x_mka_dist_sak_body
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/nfc/hce/ |
ProtocolParamsReaderActivity.java | 46 short sak, byte[] atqa, byte[] ats) { 51 sb.append("SAK: 0x" + Integer.toHexString(sak & 0xFF) + "\n"); 53 if ((sak & 0x20) != 0) { 60 if ((sak & 0x40) != 0) {
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpas_kay.c | 124 u32 lowest_pn, const u8 *sak) 126 return wpa_drv_create_receive_sa(wpa_s, channel, an, lowest_pn, sak); 166 const u8 *sak) 169 confidentiality, sak);
|
driver_i.h | 764 u32 lowest_pn, const u8 *sak) 769 lowest_pn, sak); 821 const u8 *sak) 826 next_pn, confidentiality, sak);
|
/packages/apps/Nfc/nxp/jni/ |
com_android_nfc.h | 244 int get_technology_type(phNfc_eRemDevType_t type, uint8_t sak);
|
com_android_nfc.cpp | 465 int sak = devList[target].psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak; local 466 switch(sak)
|
/external/wpa_supplicant_8/src/drivers/ |
driver_macsec_qca.c | 666 u32 lowest_pn, const u8 *sak) 678 rx_sak.sak[i] = sak[15 - i]; 794 const u8 *sak) 818 tx_sak.sak[i] = sak[15 - i];
|
driver.h | [all...] |
/external/libnfc-nci/src/hal/int/ |
nfc_brcm_defs.h | 313 UINT8 sak; member in struct:__anon28546
|