/external/libnfc-nxp/src/ |
H A D | phFriNfc_SmtCrdFmt.c | 202 uint8_t sak = 0; local 208 sak = NdefSmtCrdFmt->psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak; 213 if (0x00 == sak) 257 uint8_t sak = 0; local 266 sak = NdefSmtCrdFmt->psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak; 272 sak = NdefSmtCrdFmt->psRemoteDevInfo->RemoteDevInfo.CardInfo106. 286 if(0x00 == sak) 308 else if((0x08 == (sak & 0x18)) || 309 (0x18 == (sak & 0x18)) || 310 (0x01 == sak)) [all...] |
H A D | phHciNfc_CE_A.c | 148 static uint8_t sak = HOST_CE_A_SAK_DEFAULT; local 192 sak = (uint8_t)HOST_CE_A_SAK_DEFAULT; 193 ps_pipe_info->param_info =(void*)&sak ; 194 ps_pipe_info->param_length = sizeof(sak) ;
|
H A D | phFriNfc_NdefMap.c | 717 uint8_t sak; local 744 sak = NdefMap->psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak; 769 if(0x00 == sak) 780 else if ((0x08 == (sak & 0x18)) || 781 (0x18 == (sak & 0x18)) || 782 (0x01 == sak)) 810 if(0x20 == (sak & 0x20)) 894 if(0xC2 == sak)
|
H A D | phFriNfc_MifareStdMap.c | 572 sak; local 590 sak = NdefMap->psRemoteDevInfo->RemoteDevInfo.CardInfo106. 595 sak = NdefMap->psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak; 600 if (0x08 == (sak & 0x18)) 654 /* Mifare 1k, sak = 0x08 atq = 0x04 655 Mifare 4k, sak = 0x38 atq = 0x02 */
|
/external/wpa_supplicant_8/hostapd/src/pae/ |
H A D | ieee802_1x_key.c | 186 size_t ctx_bytes, u8 *sak) 188 return aes_kdf_128(cak, "IEEE8021 SAK", ctx, ctx_bytes * 8, 128, sak); 185 ieee802_1x_sak_128bits_aes_cmac(const u8 *cak, const u8 *ctx, size_t ctx_bytes, u8 *sak) argument
|
H A D | ieee802_1x_kay_i.h | 395 u8 sak[0]; member in struct:ieee802_1x_mka_dist_sak_body
|
H A D | ieee802_1x_kay.c | 196 wpa_hexdump(MSG_INFO, "\tAES Key Wrap of SAK...:", body->sak, 24); 1331 /* check all live peer have used the sak for receiving sa */ 1429 struct data_key *sak; local 1444 sak = participant->new_key; 1445 body->confid_offset = sak->confidentiality_offset; 1446 body->dan = sak->an; 1447 body->kn = host_to_be32(sak->key_identifier.kn); 1451 os_memcpy(body->sak, cipher_suite_tbl[cs_index].id, CS_ID_LEN); 1456 sak->key, body->sak 3395 struct data_key *sak; local [all...] |
/external/wpa_supplicant_8/src/pae/ |
H A D | ieee802_1x_key.c | 186 size_t ctx_bytes, u8 *sak) 188 return aes_kdf_128(cak, "IEEE8021 SAK", ctx, ctx_bytes * 8, 128, sak); 185 ieee802_1x_sak_128bits_aes_cmac(const u8 *cak, const u8 *ctx, size_t ctx_bytes, u8 *sak) argument
|
H A D | ieee802_1x_kay_i.h | 395 u8 sak[0]; member in struct:ieee802_1x_mka_dist_sak_body
|
H A D | ieee802_1x_kay.c | 196 wpa_hexdump(MSG_INFO, "\tAES Key Wrap of SAK...:", body->sak, 24); 1331 /* check all live peer have used the sak for receiving sa */ 1429 struct data_key *sak; local 1444 sak = participant->new_key; 1445 body->confid_offset = sak->confidentiality_offset; 1446 body->dan = sak->an; 1447 body->kn = host_to_be32(sak->key_identifier.kn); 1451 os_memcpy(body->sak, cipher_suite_tbl[cs_index].id, CS_ID_LEN); 1456 sak->key, body->sak 3395 struct data_key *sak; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/pae/ |
H A D | ieee802_1x_key.c | 186 size_t ctx_bytes, u8 *sak) 188 return aes_kdf_128(cak, "IEEE8021 SAK", ctx, ctx_bytes * 8, 128, sak); 185 ieee802_1x_sak_128bits_aes_cmac(const u8 *cak, const u8 *ctx, size_t ctx_bytes, u8 *sak) argument
|
H A D | ieee802_1x_kay_i.h | 395 u8 sak[0]; member in struct:ieee802_1x_mka_dist_sak_body
|
H A D | ieee802_1x_kay.c | 196 wpa_hexdump(MSG_INFO, "\tAES Key Wrap of SAK...:", body->sak, 24); 1331 /* check all live peer have used the sak for receiving sa */ 1429 struct data_key *sak; local 1444 sak = participant->new_key; 1445 body->confid_offset = sak->confidentiality_offset; 1446 body->dan = sak->an; 1447 body->kn = host_to_be32(sak->key_identifier.kn); 1451 os_memcpy(body->sak, cipher_suite_tbl[cs_index].id, CS_ID_LEN); 1456 sak->key, body->sak 3395 struct data_key *sak; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wpas_kay.c | 124 u32 lowest_pn, const u8 *sak) 126 return wpa_drv_create_receive_sa(wpa_s, channel, an, lowest_pn, sak); 166 const u8 *sak) 169 confidentiality, sak); 123 wpas_create_receive_sa(void *wpa_s, u32 channel, u8 an, u32 lowest_pn, const u8 *sak) argument 164 wpas_create_transmit_sa(void *wpa_s, u32 channel, u8 an, u32 next_pn, Boolean confidentiality, const u8 *sak) argument
|
H A D | driver_i.h | 764 u32 lowest_pn, const u8 *sak) 769 lowest_pn, sak); 821 const u8 *sak) 826 next_pn, confidentiality, sak); 762 wpa_drv_create_receive_sa(struct wpa_supplicant *wpa_s, u32 channel, u8 an, u32 lowest_pn, const u8 *sak) argument 817 wpa_drv_create_transmit_sa(struct wpa_supplicant *wpa_s, u32 channel, u8 an, u32 next_pn, Boolean confidentiality, const u8 *sak) argument
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_macsec_qca.c | 666 u32 lowest_pn, const u8 *sak) 678 rx_sak.sak[i] = sak[15 - i]; 794 const u8 *sak) 818 tx_sak.sak[i] = sak[15 - i]; 665 macsec_qca_create_receive_sa(void *priv, u32 channel, u8 an, u32 lowest_pn, const u8 *sak) argument 792 macsec_qca_create_transmit_sa(void *priv, u32 channel, u8 an, u32 next_pn, Boolean confidentiality, const u8 *sak) argument
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_macsec_qca.c | 666 u32 lowest_pn, const u8 *sak) 678 rx_sak.sak[i] = sak[15 - i]; 794 const u8 *sak) 818 tx_sak.sak[i] = sak[15 - i]; 665 macsec_qca_create_receive_sa(void *priv, u32 channel, u8 an, u32 lowest_pn, const u8 *sak) argument 792 macsec_qca_create_transmit_sa(void *priv, u32 channel, u8 an, u32 next_pn, Boolean confidentiality, const u8 *sak) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_macsec_qca.c | 666 u32 lowest_pn, const u8 *sak) 678 rx_sak.sak[i] = sak[15 - i]; 794 const u8 *sak) 818 tx_sak.sak[i] = sak[15 - i]; 665 macsec_qca_create_receive_sa(void *priv, u32 channel, u8 an, u32 lowest_pn, const u8 *sak) argument 792 macsec_qca_create_transmit_sa(void *priv, u32 channel, u8 an, u32 next_pn, Boolean confidentiality, const u8 *sak) argument
|
/external/libnfc-nci/src/hal/int/ |
H A D | nfc_brcm_defs.h | 313 UINT8 sak; member in struct:__anon23928
|