HomeSort by relevance Sort by last modified time
    Searched defs:sak (Results 1 - 10 of 10) sorted by null

  /external/libnfc-nxp/src/
phFriNfc_SmtCrdFmt.c 202 uint8_t sak = 0; local
208 sak = NdefSmtCrdFmt->psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak;
213 if (0x00 == sak)
257 uint8_t sak = 0; local
265 /* SAK (Select response) */
266 sak = NdefSmtCrdFmt->psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak;
271 /* SAK (Select response) */
272 sak = NdefSmtCrdFmt->psRemoteDevInfo->RemoteDevInfo.CardInfo106
    [all...]
phFriNfc_NdefMap.c 717 uint8_t sak; local
744 sak = NdefMap->psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak;
769 if(0x00 == sak)
771 /* The SAK/Sel_Res says the card is of the type
780 else if ((0x08 == (sak & 0x18)) ||
781 (0x18 == (sak & 0x18)) ||
782 (0x01 == sak))
784 /* The SAK/Sel_Res says the card is of the type
797 The SAK/Sel_Res is wrong *
    [all...]
phHciNfc_CE_A.c 148 static uint8_t sak = HOST_CE_A_SAK_DEFAULT; local
189 /* HOST Card Emulation A SAK Configuration */
191 /* Configure the SAK of Host Card Emulation A */
192 sak = (uint8_t)HOST_CE_A_SAK_DEFAULT;
193 ps_pipe_info->param_info =(void*)&sak ;
194 ps_pipe_info->param_length = sizeof(sak) ;
phFriNfc_MifareStdMap.c 572 sak; local
590 sak = NdefMap->psRemoteDevInfo->RemoteDevInfo.CardInfo106.
595 sak = NdefMap->psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak;
600 if (0x08 == (sak & 0x18))
654 /* Mifare 1k, sak = 0x08 atq = 0x04
655 Mifare 4k, sak = 0x38 atq = 0x02 */
    [all...]
  /packages/apps/Nfc/nxp/jni/
com_android_nfc.cpp 465 int sak = devList[target].psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak; local
466 switch(sak)
  /packages/apps/Nfc/nci/jni/extns/pn54x/src/mifare/
phNxpExtns_MifareStd.c 937 uint8_t sak = 0; local
    [all...]
phFriNfc_MifareStdMap.c 321 uint8_t atq, sak; local
334 sak = NdefMap->psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak;
337 if (0x08 == (sak & 0x18))
349 else if (0x19 == (sak & 0x19))
403 * Mifare 1k, sak = 0x08 atq = 0x04
404 * Mifare 2k, sak = 0x19 atq = 0x02
405 * Mifare 4k, sak = 0x18 atq = 0x02
    [all...]
  /external/wpa_supplicant_8/src/pae/
ieee802_1x_kay_i.h 33 /* KN + Wrapper SAK */
392 /* for GCM-AES-128: octet 9-32: SAK
393 * for other cipher suite: octet 9-16: cipher suite id, octet 17-: SAK
395 u8 sak[0]; member in struct:ieee802_1x_mka_dist_sak_body
ieee802_1x_kay.c 186 wpa_printf(MSG_INFO, "*** Distributed SAK ***");
196 wpa_hexdump(MSG_INFO, "\tAES Key Wrap of SAK...:", body->sak, 24);
218 wpa_printf(MSG_DEBUG, "*** MACsec SAK Use ***");
1269 "KaY: MKA Use SAK Packet Body Length (%d bytes) should be 0, 40, or more octets",
1434 struct data_key *sak; local
3409 struct data_key *sak; local
    [all...]
  /external/libnfc-nci/src/hal/int/
nfc_brcm_defs.h 315 UINT8 sak; member in struct:__anon16933

Completed in 312 milliseconds