Searched defs:sak (Results 1 - 19 of 19) sorted by relevance

/external/libnfc-nxp/src/
H A DphFriNfc_SmtCrdFmt.c202 uint8_t sak = 0; local
208 sak = NdefSmtCrdFmt->psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak;
213 if (0x00 == sak)
257 uint8_t sak = 0; local
266 sak = NdefSmtCrdFmt->psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak;
272 sak = NdefSmtCrdFmt->psRemoteDevInfo->RemoteDevInfo.CardInfo106.
286 if(0x00 == sak)
308 else if((0x08 == (sak & 0x18)) ||
309 (0x18 == (sak & 0x18)) ||
310 (0x01 == sak))
[all...]
H A DphHciNfc_CE_A.c148 static uint8_t sak = HOST_CE_A_SAK_DEFAULT; local
192 sak = (uint8_t)HOST_CE_A_SAK_DEFAULT;
193 ps_pipe_info->param_info =(void*)&sak ;
194 ps_pipe_info->param_length = sizeof(sak) ;
H A DphFriNfc_NdefMap.c717 uint8_t sak; local
744 sak = NdefMap->psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak;
769 if(0x00 == sak)
780 else if ((0x08 == (sak & 0x18)) ||
781 (0x18 == (sak & 0x18)) ||
782 (0x01 == sak))
810 if(0x20 == (sak & 0x20))
894 if(0xC2 == sak)
H A DphFriNfc_MifareStdMap.c572 sak; local
590 sak = NdefMap->psRemoteDevInfo->RemoteDevInfo.CardInfo106.
595 sak = NdefMap->psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak;
600 if (0x08 == (sak & 0x18))
654 /* Mifare 1k, sak = 0x08 atq = 0x04
655 Mifare 4k, sak = 0x38 atq = 0x02 */
/external/wpa_supplicant_8/hostapd/src/pae/
H A Dieee802_1x_key.c186 size_t ctx_bytes, u8 *sak)
188 return aes_kdf_128(cak, "IEEE8021 SAK", ctx, ctx_bytes * 8, 128, sak);
185 ieee802_1x_sak_128bits_aes_cmac(const u8 *cak, const u8 *ctx, size_t ctx_bytes, u8 *sak) argument
H A Dieee802_1x_kay_i.h395 u8 sak[0]; member in struct:ieee802_1x_mka_dist_sak_body
H A Dieee802_1x_kay.c196 wpa_hexdump(MSG_INFO, "\tAES Key Wrap of SAK...:", body->sak, 24);
1331 /* check all live peer have used the sak for receiving sa */
1429 struct data_key *sak; local
1444 sak = participant->new_key;
1445 body->confid_offset = sak->confidentiality_offset;
1446 body->dan = sak->an;
1447 body->kn = host_to_be32(sak->key_identifier.kn);
1451 os_memcpy(body->sak, cipher_suite_tbl[cs_index].id, CS_ID_LEN);
1456 sak->key, body->sak
3395 struct data_key *sak; local
[all...]
/external/wpa_supplicant_8/src/pae/
H A Dieee802_1x_key.c186 size_t ctx_bytes, u8 *sak)
188 return aes_kdf_128(cak, "IEEE8021 SAK", ctx, ctx_bytes * 8, 128, sak);
185 ieee802_1x_sak_128bits_aes_cmac(const u8 *cak, const u8 *ctx, size_t ctx_bytes, u8 *sak) argument
H A Dieee802_1x_kay_i.h395 u8 sak[0]; member in struct:ieee802_1x_mka_dist_sak_body
H A Dieee802_1x_kay.c196 wpa_hexdump(MSG_INFO, "\tAES Key Wrap of SAK...:", body->sak, 24);
1331 /* check all live peer have used the sak for receiving sa */
1429 struct data_key *sak; local
1444 sak = participant->new_key;
1445 body->confid_offset = sak->confidentiality_offset;
1446 body->dan = sak->an;
1447 body->kn = host_to_be32(sak->key_identifier.kn);
1451 os_memcpy(body->sak, cipher_suite_tbl[cs_index].id, CS_ID_LEN);
1456 sak->key, body->sak
3395 struct data_key *sak; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/pae/
H A Dieee802_1x_key.c186 size_t ctx_bytes, u8 *sak)
188 return aes_kdf_128(cak, "IEEE8021 SAK", ctx, ctx_bytes * 8, 128, sak);
185 ieee802_1x_sak_128bits_aes_cmac(const u8 *cak, const u8 *ctx, size_t ctx_bytes, u8 *sak) argument
H A Dieee802_1x_kay_i.h395 u8 sak[0]; member in struct:ieee802_1x_mka_dist_sak_body
H A Dieee802_1x_kay.c196 wpa_hexdump(MSG_INFO, "\tAES Key Wrap of SAK...:", body->sak, 24);
1331 /* check all live peer have used the sak for receiving sa */
1429 struct data_key *sak; local
1444 sak = participant->new_key;
1445 body->confid_offset = sak->confidentiality_offset;
1446 body->dan = sak->an;
1447 body->kn = host_to_be32(sak->key_identifier.kn);
1451 os_memcpy(body->sak, cipher_suite_tbl[cs_index].id, CS_ID_LEN);
1456 sak->key, body->sak
3395 struct data_key *sak; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/
H A Dwpas_kay.c124 u32 lowest_pn, const u8 *sak)
126 return wpa_drv_create_receive_sa(wpa_s, channel, an, lowest_pn, sak);
166 const u8 *sak)
169 confidentiality, sak);
123 wpas_create_receive_sa(void *wpa_s, u32 channel, u8 an, u32 lowest_pn, const u8 *sak) argument
164 wpas_create_transmit_sa(void *wpa_s, u32 channel, u8 an, u32 next_pn, Boolean confidentiality, const u8 *sak) argument
H A Ddriver_i.h764 u32 lowest_pn, const u8 *sak)
769 lowest_pn, sak);
821 const u8 *sak)
826 next_pn, confidentiality, sak);
762 wpa_drv_create_receive_sa(struct wpa_supplicant *wpa_s, u32 channel, u8 an, u32 lowest_pn, const u8 *sak) argument
817 wpa_drv_create_transmit_sa(struct wpa_supplicant *wpa_s, u32 channel, u8 an, u32 next_pn, Boolean confidentiality, const u8 *sak) argument
/external/wpa_supplicant_8/hostapd/src/drivers/
H A Ddriver_macsec_qca.c666 u32 lowest_pn, const u8 *sak)
678 rx_sak.sak[i] = sak[15 - i];
794 const u8 *sak)
818 tx_sak.sak[i] = sak[15 - i];
665 macsec_qca_create_receive_sa(void *priv, u32 channel, u8 an, u32 lowest_pn, const u8 *sak) argument
792 macsec_qca_create_transmit_sa(void *priv, u32 channel, u8 an, u32 next_pn, Boolean confidentiality, const u8 *sak) argument
/external/wpa_supplicant_8/src/drivers/
H A Ddriver_macsec_qca.c666 u32 lowest_pn, const u8 *sak)
678 rx_sak.sak[i] = sak[15 - i];
794 const u8 *sak)
818 tx_sak.sak[i] = sak[15 - i];
665 macsec_qca_create_receive_sa(void *priv, u32 channel, u8 an, u32 lowest_pn, const u8 *sak) argument
792 macsec_qca_create_transmit_sa(void *priv, u32 channel, u8 an, u32 next_pn, Boolean confidentiality, const u8 *sak) argument
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/
H A Ddriver_macsec_qca.c666 u32 lowest_pn, const u8 *sak)
678 rx_sak.sak[i] = sak[15 - i];
794 const u8 *sak)
818 tx_sak.sak[i] = sak[15 - i];
665 macsec_qca_create_receive_sa(void *priv, u32 channel, u8 an, u32 lowest_pn, const u8 *sak) argument
792 macsec_qca_create_transmit_sa(void *priv, u32 channel, u8 an, u32 next_pn, Boolean confidentiality, const u8 *sak) argument
/external/libnfc-nci/src/hal/int/
H A Dnfc_brcm_defs.h313 UINT8 sak; member in struct:__anon23928

Completed in 736 milliseconds