/external/libnfc-nxp/src/ |
phFriNfc_SmtCrdFmt.c | 202 uint8_t sak = 0; local 208 sak = NdefSmtCrdFmt->psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak; 213 if (0x00 == sak) 257 uint8_t sak = 0; local 265 /* SAK (Select response) */ 266 sak = NdefSmtCrdFmt->psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak; 271 /* SAK (Select response) */ 272 sak = NdefSmtCrdFmt->psRemoteDevInfo->RemoteDevInfo.CardInfo106 [all...] |
phFriNfc_NdefMap.c | 717 uint8_t sak; local 744 sak = NdefMap->psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak; 769 if(0x00 == sak) 771 /* The SAK/Sel_Res says the card is of the type 780 else if ((0x08 == (sak & 0x18)) || 781 (0x18 == (sak & 0x18)) || 782 (0x01 == sak)) 784 /* The SAK/Sel_Res says the card is of the type 797 The SAK/Sel_Res is wrong * [all...] |
phHciNfc_CE_A.c | 148 static uint8_t sak = HOST_CE_A_SAK_DEFAULT; local 189 /* HOST Card Emulation A SAK Configuration */ 191 /* Configure the SAK of Host Card Emulation A */ 192 sak = (uint8_t)HOST_CE_A_SAK_DEFAULT; 193 ps_pipe_info->param_info =(void*)&sak ; 194 ps_pipe_info->param_length = sizeof(sak) ;
|
phFriNfc_MifareStdMap.c | 572 sak; local 590 sak = NdefMap->psRemoteDevInfo->RemoteDevInfo.CardInfo106. 595 sak = NdefMap->psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak; 600 if (0x08 == (sak & 0x18)) 654 /* Mifare 1k, sak = 0x08 atq = 0x04 655 Mifare 4k, sak = 0x38 atq = 0x02 */ [all...] |
/packages/apps/Nfc/nxp/jni/ |
com_android_nfc.cpp | 465 int sak = devList[target].psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak; local 466 switch(sak)
|
/packages/apps/Nfc/nci/jni/extns/pn54x/src/mifare/ |
phNxpExtns_MifareStd.c | 937 uint8_t sak = 0; local [all...] |
phFriNfc_MifareStdMap.c | 321 uint8_t atq, sak; local 334 sak = NdefMap->psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak; 337 if (0x08 == (sak & 0x18)) 349 else if (0x19 == (sak & 0x19)) 403 * Mifare 1k, sak = 0x08 atq = 0x04 404 * Mifare 2k, sak = 0x19 atq = 0x02 405 * Mifare 4k, sak = 0x18 atq = 0x02 [all...] |
/external/wpa_supplicant_8/src/pae/ |
ieee802_1x_kay_i.h | 33 /* KN + Wrapper SAK */ 392 /* for GCM-AES-128: octet 9-32: SAK 393 * for other cipher suite: octet 9-16: cipher suite id, octet 17-: SAK 395 u8 sak[0]; member in struct:ieee802_1x_mka_dist_sak_body
|
ieee802_1x_kay.c | 186 wpa_printf(MSG_INFO, "*** Distributed SAK ***"); 196 wpa_hexdump(MSG_INFO, "\tAES Key Wrap of SAK...:", body->sak, 24); 218 wpa_printf(MSG_DEBUG, "*** MACsec SAK Use ***"); 1269 "KaY: MKA Use SAK Packet Body Length (%d bytes) should be 0, 40, or more octets", 1434 struct data_key *sak; local 3409 struct data_key *sak; local [all...] |
/external/libnfc-nci/src/hal/int/ |
nfc_brcm_defs.h | 315 UINT8 sak; member in struct:__anon16933
|