HomeSort by relevance Sort by last modified time
    Searched defs:sak (Results 1 - 5 of 5) sorted by null

  /packages/apps/Nfc/nci/jni/extns/pn54x/src/mifare/
phNxpExtns_MifareStd.c 940 uint8_t sak = 0; local
    [all...]
phFriNfc_MifareStdMap.c 321 uint8_t atq, sak; local
334 sak = NdefMap->psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak;
337 if (0x08 == (sak & 0x18))
349 else if (0x19 == (sak & 0x19))
403 * Mifare 1k, sak = 0x08 atq = 0x04
404 * Mifare 2k, sak = 0x19 atq = 0x02
405 * Mifare 4k, sak = 0x18 atq = 0x02
    [all...]
  /external/wpa_supplicant_8/src/pae/
ieee802_1x_kay_i.h 33 /* KN + Wrapper SAK */
246 * struct ieee802_1x_mka_sak_use_body - MACsec SAK Use parameter set (Figure
321 * struct ieee802_1x_mka_dist_sak_body - Distributed SAK parameter set
333 * @sak: AES Key Wrap of SAK (see 9.8)
361 /* for GCM-AES-128: octet 9-32: SAK
362 * for other cipher suite: octet 9-16: cipher suite id, octet 17-: SAK
364 u8 sak[0]; member in struct:ieee802_1x_mka_dist_sak_body
ieee802_1x_kay.c 182 wpa_printf(MSG_INFO, "*** Distributed SAK ***");
192 wpa_hexdump(MSG_INFO, "\tAES Key Wrap of SAK...:", body->sak, 24);
214 wpa_printf(MSG_DEBUG, "*** MACsec SAK Use ***");
1282 "KaY: MKA Use SAK Packet Body Length (%zu bytes) should be 0, 40, or more octets",
1441 struct data_key *sak; local
3390 struct data_key *sak; local
    [all...]
  /system/nfc/src/hal/int/
nfc_brcm_defs.h 315 uint8_t sak; member in struct:__anon107216

Completed in 615 milliseconds