/packages/apps/Nfc/nci/jni/extns/pn54x/src/mifare/ |
phNxpExtns_MifareStd.cpp | 864 uint8_t sak = 0; local 890 sak = NdefSmtCrdFmt->psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak; 892 if ((0x08 == (sak & 0x18)) || (0x18 == (sak & 0x18)) || (0x01 == sak)) { 894 ((sak & 0x18) == 0x08) 896 : (((sak & 0x19) == 0x19) ? PH_FRINFC_SMTCRDFMT_MFSTD_2K_CRD [all...] |
phFriNfc_MifareStdMap.cpp | 323 uint8_t atq, sak; local 333 sak = NdefMap->psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak; 336 if (0x08 == (sak & 0x18)) { 346 } else if (0x19 == (sak & 0x19)) { 390 * Mifare 1k, sak = 0x08 atq = 0x04 391 * Mifare 2k, sak = 0x19 atq = 0x02 392 * Mifare 4k, sak = 0x18 atq = 0x02 [all...] |
/external/wpa_supplicant_8/src/pae/ |
ieee802_1x_kay_i.h | 33 /* KN + Wrapper SAK */ 246 * struct ieee802_1x_mka_sak_use_body - MACsec SAK Use parameter set (Figure 321 * struct ieee802_1x_mka_dist_sak_body - Distributed SAK parameter set 333 * @sak: AES Key Wrap of SAK (see 9.8) 361 /* for GCM-AES-128: octet 9-32: SAK 362 * for other cipher suite: octet 9-16: cipher suite id, octet 17-: SAK 364 u8 sak[0]; member in struct:ieee802_1x_mka_dist_sak_body
|
ieee802_1x_kay.c | 182 wpa_printf(MSG_INFO, "*** Distributed SAK ***"); 192 wpa_hexdump(MSG_INFO, "\tAES Key Wrap of SAK...:", body->sak, 24); 214 wpa_printf(MSG_DEBUG, "*** MACsec SAK Use ***"); 1286 "KaY: MKA Use SAK Packet Body Length (%zu bytes) should be 0, 40, or more octets", 1445 struct data_key *sak; local 3397 struct data_key *sak; local [all...] |