/external/libnfc-nxp/src/ |
H A D | phFriNfc_SmtCrdFmt.c | 202 uint8_t sak = 0; local 208 sak = NdefSmtCrdFmt->psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak; 213 if (0x00 == sak) 257 uint8_t sak = 0; local 266 sak = NdefSmtCrdFmt->psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak; 272 sak = NdefSmtCrdFmt->psRemoteDevInfo->RemoteDevInfo.CardInfo106. 286 if(0x00 == sak) 308 else if((0x08 == (sak & 0x18)) || 309 (0x18 == (sak & 0x18)) || 310 (0x01 == sak)) [all...] |
H A D | phHciNfc_CE_A.c | 148 static uint8_t sak = HOST_CE_A_SAK_DEFAULT; local 192 sak = (uint8_t)HOST_CE_A_SAK_DEFAULT; 193 ps_pipe_info->param_info =(void*)&sak ; 194 ps_pipe_info->param_length = sizeof(sak) ;
|
H A D | phFriNfc_NdefMap.c | 717 uint8_t sak; local 744 sak = NdefMap->psRemoteDevInfo->RemoteDevInfo.Iso14443A_Info.Sak; 769 if(0x00 == sak) 780 else if ((0x08 == (sak & 0x18)) || 781 (0x18 == (sak & 0x18)) || 782 (0x01 == sak)) 810 if(0x20 == (sak & 0x20)) 894 if(0xC2 == sak)
|
/external/wpa_supplicant_8/hostapd/src/pae/ |
H A D | ieee802_1x_key.h | 24 size_t ctx_bytes, u8 *sak);
|
H A D | ieee802_1x_key.c | 186 size_t ctx_bytes, u8 *sak) 188 return aes_kdf_128(cak, "IEEE8021 SAK", ctx, ctx_bytes * 8, 128, sak); 185 ieee802_1x_sak_128bits_aes_cmac(const u8 *cak, const u8 *ctx, size_t ctx_bytes, u8 *sak) argument
|
H A D | ieee802_1x_kay.h | 78 const u8 *sak); 87 Boolean confidentiality, const u8 *sak);
|
H A D | ieee802_1x_kay.c | 196 wpa_hexdump(MSG_INFO, "\tAES Key Wrap of SAK...:", body->sak, 24); 1336 /* check all live peer have used the sak for receiving sa */ 1434 struct data_key *sak; local 1449 sak = participant->new_key; 1450 body->confid_offset = sak->confidentiality_offset; 1451 body->dan = sak->an; 1452 body->kn = host_to_be32(sak->key_identifier.kn); 1456 os_memcpy(body->sak, cipher_suite_tbl[cs_index].id, CS_ID_LEN); 1461 sak->key, body->sak 3409 struct data_key *sak; local [all...] |
H A D | ieee802_1x_kay_i.h | 395 u8 sak[0]; member in struct:ieee802_1x_mka_dist_sak_body
|
/external/wpa_supplicant_8/src/pae/ |
H A D | ieee802_1x_key.h | 24 size_t ctx_bytes, u8 *sak);
|
H A D | ieee802_1x_key.c | 186 size_t ctx_bytes, u8 *sak) 188 return aes_kdf_128(cak, "IEEE8021 SAK", ctx, ctx_bytes * 8, 128, sak); 185 ieee802_1x_sak_128bits_aes_cmac(const u8 *cak, const u8 *ctx, size_t ctx_bytes, u8 *sak) argument
|
H A D | ieee802_1x_kay.h | 78 const u8 *sak); 87 Boolean confidentiality, const u8 *sak);
|
H A D | ieee802_1x_kay.c | 196 wpa_hexdump(MSG_INFO, "\tAES Key Wrap of SAK...:", body->sak, 24); 1336 /* check all live peer have used the sak for receiving sa */ 1434 struct data_key *sak; local 1449 sak = participant->new_key; 1450 body->confid_offset = sak->confidentiality_offset; 1451 body->dan = sak->an; 1452 body->kn = host_to_be32(sak->key_identifier.kn); 1456 os_memcpy(body->sak, cipher_suite_tbl[cs_index].id, CS_ID_LEN); 1461 sak->key, body->sak 3409 struct data_key *sak; local [all...] |
H A D | ieee802_1x_kay_i.h | 395 u8 sak[0]; member in struct:ieee802_1x_mka_dist_sak_body
|
/external/wpa_supplicant_8/wpa_supplicant/src/pae/ |
H A D | ieee802_1x_key.h | 24 size_t ctx_bytes, u8 *sak);
|
H A D | ieee802_1x_key.c | 186 size_t ctx_bytes, u8 *sak) 188 return aes_kdf_128(cak, "IEEE8021 SAK", ctx, ctx_bytes * 8, 128, sak); 185 ieee802_1x_sak_128bits_aes_cmac(const u8 *cak, const u8 *ctx, size_t ctx_bytes, u8 *sak) argument
|
H A D | ieee802_1x_kay.h | 78 const u8 *sak); 87 Boolean confidentiality, const u8 *sak);
|
H A D | ieee802_1x_kay.c | 196 wpa_hexdump(MSG_INFO, "\tAES Key Wrap of SAK...:", body->sak, 24); 1336 /* check all live peer have used the sak for receiving sa */ 1434 struct data_key *sak; local 1449 sak = participant->new_key; 1450 body->confid_offset = sak->confidentiality_offset; 1451 body->dan = sak->an; 1452 body->kn = host_to_be32(sak->key_identifier.kn); 1456 os_memcpy(body->sak, cipher_suite_tbl[cs_index].id, CS_ID_LEN); 1461 sak->key, body->sak 3409 struct data_key *sak; local [all...] |
H A D | ieee802_1x_kay_i.h | 395 u8 sak[0]; member in struct:ieee802_1x_mka_dist_sak_body
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wpas_kay.c | 124 u32 lowest_pn, const u8 *sak) 126 return wpa_drv_create_receive_sa(wpa_s, channel, an, lowest_pn, sak); 166 const u8 *sak) 169 confidentiality, sak); 123 wpas_create_receive_sa(void *wpa_s, u32 channel, u8 an, u32 lowest_pn, const u8 *sak) argument 164 wpas_create_transmit_sa(void *wpa_s, u32 channel, u8 an, u32 next_pn, Boolean confidentiality, const u8 *sak) argument
|
H A D | driver_i.h | 804 u32 lowest_pn, const u8 *sak) 809 lowest_pn, sak); 861 const u8 *sak) 866 next_pn, confidentiality, sak); 802 wpa_drv_create_receive_sa(struct wpa_supplicant *wpa_s, u32 channel, u8 an, u32 lowest_pn, const u8 *sak) argument 857 wpa_drv_create_transmit_sa(struct wpa_supplicant *wpa_s, u32 channel, u8 an, u32 next_pn, Boolean confidentiality, const u8 *sak) argument
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_macsec_qca.c | 670 u32 lowest_pn, const u8 *sak) 682 rx_sak.sak[i] = sak[15 - i]; 798 const u8 *sak) 822 tx_sak.sak[i] = sak[15 - i]; 669 macsec_qca_create_receive_sa(void *priv, u32 channel, u8 an, u32 lowest_pn, const u8 *sak) argument 796 macsec_qca_create_transmit_sa(void *priv, u32 channel, u8 an, u32 next_pn, Boolean confidentiality, const u8 *sak) argument
|
H A D | driver.h | 3382 * @sak: the secure association key 3386 u32 lowest_pn, const u8 *sak); 3441 * @sak: the secure association key 3445 Boolean confidentiality, const u8 *sak);
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_macsec_qca.c | 670 u32 lowest_pn, const u8 *sak) 682 rx_sak.sak[i] = sak[15 - i]; 798 const u8 *sak) 822 tx_sak.sak[i] = sak[15 - i]; 669 macsec_qca_create_receive_sa(void *priv, u32 channel, u8 an, u32 lowest_pn, const u8 *sak) argument 796 macsec_qca_create_transmit_sa(void *priv, u32 channel, u8 an, u32 next_pn, Boolean confidentiality, const u8 *sak) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_macsec_qca.c | 670 u32 lowest_pn, const u8 *sak) 682 rx_sak.sak[i] = sak[15 - i]; 798 const u8 *sak) 822 tx_sak.sak[i] = sak[15 - i]; 669 macsec_qca_create_receive_sa(void *priv, u32 channel, u8 an, u32 lowest_pn, const u8 *sak) argument 796 macsec_qca_create_transmit_sa(void *priv, u32 channel, u8 an, u32 next_pn, Boolean confidentiality, const u8 *sak) argument
|
/external/libnfc-nci/src/hal/int/ |
H A D | nfc_brcm_defs.h | 315 UINT8 sak; member in struct:__anon10394
|