/packages/apps/Nfc/nci/jni/extns/pn54x/src/mifare/ |
phNxpExtns_MifareStd.c | 940 uint8_t sak = 0; local [all...] |
phFriNfc_MifareStdMap.c | 321 uint8_t atq, sak; local 334 sak = NdefMap->psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak; 337 if (0x08 == (sak & 0x18)) 349 else if (0x19 == (sak & 0x19)) 403 * Mifare 1k, sak = 0x08 atq = 0x04 404 * Mifare 2k, sak = 0x19 atq = 0x02 405 * Mifare 4k, sak = 0x18 atq = 0x02 [all...] |
/external/wpa_supplicant_8/src/pae/ |
ieee802_1x_kay_i.h | 33 /* KN + Wrapper SAK */ 246 * struct ieee802_1x_mka_sak_use_body - MACsec SAK Use parameter set (Figure 321 * struct ieee802_1x_mka_dist_sak_body - Distributed SAK parameter set 333 * @sak: AES Key Wrap of SAK (see 9.8) 361 /* for GCM-AES-128: octet 9-32: SAK 362 * for other cipher suite: octet 9-16: cipher suite id, octet 17-: SAK 364 u8 sak[0]; member in struct:ieee802_1x_mka_dist_sak_body
|
ieee802_1x_kay.c | 182 wpa_printf(MSG_INFO, "*** Distributed SAK ***"); 192 wpa_hexdump(MSG_INFO, "\tAES Key Wrap of SAK...:", body->sak, 24); 214 wpa_printf(MSG_DEBUG, "*** MACsec SAK Use ***"); 1282 "KaY: MKA Use SAK Packet Body Length (%zu bytes) should be 0, 40, or more octets", 1441 struct data_key *sak; local 3390 struct data_key *sak; local [all...] |
/system/nfc/src/hal/int/ |
nfc_brcm_defs.h | 315 uint8_t sak; member in struct:__anon107216
|