HomeSort by relevance Sort by last modified time
    Searched refs:sak (Results 1 - 9 of 9) sorted by null

  /external/wpa_supplicant_8/src/pae/
ieee802_1x_key.h 24 size_t ctx_bytes, u8 *sak);
ieee802_1x_key.c 8 * SAK derivation specified in IEEE Std 802.1X-2010, Clause 6.2
183 * SAK = KDF(Key, Label, KS-nonce | MI-value list | KN, SAKLength)
186 size_t ctx_bytes, u8 *sak)
188 return aes_kdf_128(cak, "IEEE8021 SAK", ctx, ctx_bytes * 8, 128, sak);
ieee802_1x_kay.c 182 wpa_printf(MSG_INFO, "*** Distributed SAK ***");
192 wpa_hexdump(MSG_INFO, "\tAES Key Wrap of SAK...:", body->sak, 24);
214 wpa_printf(MSG_DEBUG, "*** MACsec SAK Use ***");
1282 "KaY: MKA Use SAK Packet Body Length (%zu bytes) should be 0, 40, or more octets",
1441 struct data_key *sak; local
3390 struct data_key *sak; local
    [all...]
ieee802_1x_kay_i.h 33 /* KN + Wrapper SAK */
246 * struct ieee802_1x_mka_sak_use_body - MACsec SAK Use parameter set (Figure
321 * struct ieee802_1x_mka_dist_sak_body - Distributed SAK parameter set
333 * @sak: AES Key Wrap of SAK (see 9.8)
361 /* for GCM-AES-128: octet 9-32: SAK
362 * for other cipher suite: octet 9-16: cipher suite id, octet 17-: SAK
364 u8 sak[0]; member in struct:ieee802_1x_mka_dist_sak_body
  /cts/apps/CtsVerifier/src/com/android/cts/verifier/nfc/hce/
ProtocolParamsReaderActivity.java 46 short sak, byte[] atqa, byte[] ats) {
51 sb.append("SAK: 0x" + Integer.toHexString(sak & 0xFF) + "\n");
53 if ((sak & 0x20) != 0) {
60 if ((sak & 0x40) != 0) {
  /packages/apps/Nfc/nci/jni/extns/pn54x/src/mifare/
phNxpExtns_MifareStd.c 940 uint8_t sak = 0; local
    [all...]
phFriNfc_MifareStdMap.c 321 uint8_t atq, sak; local
334 sak = NdefMap->psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak;
337 if (0x08 == (sak & 0x18))
349 else if (0x19 == (sak & 0x19))
403 * Mifare 1k, sak = 0x08 atq = 0x04
404 * Mifare 2k, sak = 0x19 atq = 0x02
405 * Mifare 4k, sak = 0x18 atq = 0x02
    [all...]
  /external/wpa_supplicant_8/src/drivers/
driver_macsec_qca.c 512 rx_sak.sak[i] = sa->pkey->key[15 - i];
679 tx_sak.sak[i] = sa->pkey->key[15 - i];
  /system/nfc/src/hal/int/
nfc_brcm_defs.h 315 uint8_t sak; member in struct:__anon107216

Completed in 259 milliseconds