Searched refs:sak (Results 1 - 25 of 28) sorted by relevance

12

/external/libnfc-nxp/src/
H A DphFriNfc_SmtCrdFmt.c202 uint8_t sak = 0; local
208 sak = NdefSmtCrdFmt->psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak;
213 if (0x00 == sak)
257 uint8_t sak = 0; local
266 sak = NdefSmtCrdFmt->psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak;
272 sak = NdefSmtCrdFmt->psRemoteDevInfo->RemoteDevInfo.CardInfo106.
286 if(0x00 == sak)
308 else if((0x08 == (sak & 0x18)) ||
309 (0x18 == (sak & 0x18)) ||
310 (0x01 == sak))
[all...]
H A DphHciNfc_CE_A.c148 static uint8_t sak = HOST_CE_A_SAK_DEFAULT; local
192 sak = (uint8_t)HOST_CE_A_SAK_DEFAULT;
193 ps_pipe_info->param_info =(void*)&sak ;
194 ps_pipe_info->param_length = sizeof(sak) ;
H A DphFriNfc_NdefMap.c717 uint8_t sak; local
744 sak = NdefMap->psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak;
769 if(0x00 == sak)
780 else if ((0x08 == (sak & 0x18)) ||
781 (0x18 == (sak & 0x18)) ||
782 (0x01 == sak))
810 if(0x20 == (sak & 0x20))
894 if(0xC2 == sak)
/external/wpa_supplicant_8/hostapd/src/pae/
H A Dieee802_1x_key.h24 size_t ctx_bytes, u8 *sak);
H A Dieee802_1x_key.c186 size_t ctx_bytes, u8 *sak)
188 return aes_kdf_128(cak, "IEEE8021 SAK", ctx, ctx_bytes * 8, 128, sak);
185 ieee802_1x_sak_128bits_aes_cmac(const u8 *cak, const u8 *ctx, size_t ctx_bytes, u8 *sak) argument
H A Dieee802_1x_kay.h78 const u8 *sak);
87 Boolean confidentiality, const u8 *sak);
H A Dieee802_1x_kay.c196 wpa_hexdump(MSG_INFO, "\tAES Key Wrap of SAK...:", body->sak, 24);
1336 /* check all live peer have used the sak for receiving sa */
1434 struct data_key *sak; local
1449 sak = participant->new_key;
1450 body->confid_offset = sak->confidentiality_offset;
1451 body->dan = sak->an;
1452 body->kn = host_to_be32(sak->key_identifier.kn);
1456 os_memcpy(body->sak, cipher_suite_tbl[cs_index].id, CS_ID_LEN);
1461 sak->key, body->sak
3409 struct data_key *sak; local
[all...]
H A Dieee802_1x_kay_i.h395 u8 sak[0]; member in struct:ieee802_1x_mka_dist_sak_body
/external/wpa_supplicant_8/src/pae/
H A Dieee802_1x_key.h24 size_t ctx_bytes, u8 *sak);
H A Dieee802_1x_key.c186 size_t ctx_bytes, u8 *sak)
188 return aes_kdf_128(cak, "IEEE8021 SAK", ctx, ctx_bytes * 8, 128, sak);
185 ieee802_1x_sak_128bits_aes_cmac(const u8 *cak, const u8 *ctx, size_t ctx_bytes, u8 *sak) argument
H A Dieee802_1x_kay.h78 const u8 *sak);
87 Boolean confidentiality, const u8 *sak);
H A Dieee802_1x_kay.c196 wpa_hexdump(MSG_INFO, "\tAES Key Wrap of SAK...:", body->sak, 24);
1336 /* check all live peer have used the sak for receiving sa */
1434 struct data_key *sak; local
1449 sak = participant->new_key;
1450 body->confid_offset = sak->confidentiality_offset;
1451 body->dan = sak->an;
1452 body->kn = host_to_be32(sak->key_identifier.kn);
1456 os_memcpy(body->sak, cipher_suite_tbl[cs_index].id, CS_ID_LEN);
1461 sak->key, body->sak
3409 struct data_key *sak; local
[all...]
H A Dieee802_1x_kay_i.h395 u8 sak[0]; member in struct:ieee802_1x_mka_dist_sak_body
/external/wpa_supplicant_8/wpa_supplicant/src/pae/
H A Dieee802_1x_key.h24 size_t ctx_bytes, u8 *sak);
H A Dieee802_1x_key.c186 size_t ctx_bytes, u8 *sak)
188 return aes_kdf_128(cak, "IEEE8021 SAK", ctx, ctx_bytes * 8, 128, sak);
185 ieee802_1x_sak_128bits_aes_cmac(const u8 *cak, const u8 *ctx, size_t ctx_bytes, u8 *sak) argument
H A Dieee802_1x_kay.h78 const u8 *sak);
87 Boolean confidentiality, const u8 *sak);
H A Dieee802_1x_kay.c196 wpa_hexdump(MSG_INFO, "\tAES Key Wrap of SAK...:", body->sak, 24);
1336 /* check all live peer have used the sak for receiving sa */
1434 struct data_key *sak; local
1449 sak = participant->new_key;
1450 body->confid_offset = sak->confidentiality_offset;
1451 body->dan = sak->an;
1452 body->kn = host_to_be32(sak->key_identifier.kn);
1456 os_memcpy(body->sak, cipher_suite_tbl[cs_index].id, CS_ID_LEN);
1461 sak->key, body->sak
3409 struct data_key *sak; local
[all...]
H A Dieee802_1x_kay_i.h395 u8 sak[0]; member in struct:ieee802_1x_mka_dist_sak_body
/external/wpa_supplicant_8/wpa_supplicant/
H A Dwpas_kay.c124 u32 lowest_pn, const u8 *sak)
126 return wpa_drv_create_receive_sa(wpa_s, channel, an, lowest_pn, sak);
166 const u8 *sak)
169 confidentiality, sak);
123 wpas_create_receive_sa(void *wpa_s, u32 channel, u8 an, u32 lowest_pn, const u8 *sak) argument
164 wpas_create_transmit_sa(void *wpa_s, u32 channel, u8 an, u32 next_pn, Boolean confidentiality, const u8 *sak) argument
H A Ddriver_i.h804 u32 lowest_pn, const u8 *sak)
809 lowest_pn, sak);
861 const u8 *sak)
866 next_pn, confidentiality, sak);
802 wpa_drv_create_receive_sa(struct wpa_supplicant *wpa_s, u32 channel, u8 an, u32 lowest_pn, const u8 *sak) argument
857 wpa_drv_create_transmit_sa(struct wpa_supplicant *wpa_s, u32 channel, u8 an, u32 next_pn, Boolean confidentiality, const u8 *sak) argument
/external/wpa_supplicant_8/hostapd/src/drivers/
H A Ddriver_macsec_qca.c670 u32 lowest_pn, const u8 *sak)
682 rx_sak.sak[i] = sak[15 - i];
798 const u8 *sak)
822 tx_sak.sak[i] = sak[15 - i];
669 macsec_qca_create_receive_sa(void *priv, u32 channel, u8 an, u32 lowest_pn, const u8 *sak) argument
796 macsec_qca_create_transmit_sa(void *priv, u32 channel, u8 an, u32 next_pn, Boolean confidentiality, const u8 *sak) argument
H A Ddriver.h3382 * @sak: the secure association key
3386 u32 lowest_pn, const u8 *sak);
3441 * @sak: the secure association key
3445 Boolean confidentiality, const u8 *sak);
/external/wpa_supplicant_8/src/drivers/
H A Ddriver_macsec_qca.c670 u32 lowest_pn, const u8 *sak)
682 rx_sak.sak[i] = sak[15 - i];
798 const u8 *sak)
822 tx_sak.sak[i] = sak[15 - i];
669 macsec_qca_create_receive_sa(void *priv, u32 channel, u8 an, u32 lowest_pn, const u8 *sak) argument
796 macsec_qca_create_transmit_sa(void *priv, u32 channel, u8 an, u32 next_pn, Boolean confidentiality, const u8 *sak) argument
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/
H A Ddriver_macsec_qca.c670 u32 lowest_pn, const u8 *sak)
682 rx_sak.sak[i] = sak[15 - i];
798 const u8 *sak)
822 tx_sak.sak[i] = sak[15 - i];
669 macsec_qca_create_receive_sa(void *priv, u32 channel, u8 an, u32 lowest_pn, const u8 *sak) argument
796 macsec_qca_create_transmit_sa(void *priv, u32 channel, u8 an, u32 next_pn, Boolean confidentiality, const u8 *sak) argument
/external/libnfc-nci/src/hal/int/
H A Dnfc_brcm_defs.h315 UINT8 sak; member in struct:__anon10394

Completed in 1462 milliseconds

12