Home
last modified time | relevance | path

Searched refs:sak (Results 1 – 8 of 8) sorted by relevance

/openbmc/linux/Documentation/security/
H A Dindex.rst13 sak
/openbmc/linux/drivers/nfc/st21nfca/
H A Dcore.c523 static int st21nfca_get_iso14443_3_sak(struct nfc_hci_dev *hdev, u8 *sak) in st21nfca_get_iso14443_3_sak() argument
538 *sak = sak_skb->data[0]; in st21nfca_get_iso14443_3_sak()
621 u8 sak; in st21nfca_hci_target_from_gate() local
637 r = st21nfca_get_iso14443_3_sak(hdev, &sak); in st21nfca_hci_target_from_gate()
646 nfc_hci_sak_to_protocol(sak); in st21nfca_hci_target_from_gate()
651 target->sel_res = sak; in st21nfca_hci_target_from_gate()
/openbmc/linux/drivers/net/ethernet/marvell/octeontx2/nic/
H A Dcn10k_macsec.c49 static int cn10k_ecb_aes_encrypt(struct otx2_nic *pfvf, u8 *sak, in cn10k_ecb_aes_encrypt() argument
72 err = crypto_skcipher_setkey(tfm, sak, sak_len); in cn10k_ecb_aes_encrypt()
387 u8 *sak, u8 *salt, ssci_t ssci) in cn10k_mcs_write_keys() argument
396 err = cn10k_ecb_aes_encrypt(pfvf, sak, secy->key_len, hash); in cn10k_mcs_write_keys()
403 sak_rev[i] = sak[secy->key_len - 1 - i]; in cn10k_mcs_write_keys()
427 u8 *sak = rxsc->sa_key[assoc_num]; in cn10k_mcs_write_rx_sa_plcy() local
448 ret = cn10k_mcs_write_keys(pfvf, secy, plcy_req, sak, in cn10k_mcs_write_rx_sa_plcy()
665 u8 *sak = txsc->sa_key[assoc_num]; in cn10k_mcs_write_tx_sa_plcy() local
678 ret = cn10k_mcs_write_keys(pfvf, secy, plcy_req, sak, in cn10k_mcs_write_tx_sa_plcy()
/openbmc/linux/Documentation/translations/zh_CN/admin-guide/
H A Dsysrq.rst166 sak(k)(安全访问秘钥)在你尝试登陆的同时,又想确保当前控制台没有可以获取你的
/openbmc/linux/include/net/nfc/
H A Dhci.h273 u32 nfc_hci_sak_to_protocol(u8 sak);
/openbmc/linux/net/nfc/hci/
H A Dcore.c267 u32 nfc_hci_sak_to_protocol(u8 sak) in nfc_hci_sak_to_protocol() argument
269 switch (NFC_HCI_TYPE_A_SEL_PROT(sak)) { in nfc_hci_sak_to_protocol()
/openbmc/linux/drivers/net/
H A Dmacsec.c1378 static int init_rx_sa(struct macsec_rx_sa *rx_sa, char *sak, int key_len, in init_rx_sa() argument
1385 rx_sa->key.tfm = macsec_alloc_tfm(sak, key_len, icv_len); in init_rx_sa()
1478 static int init_tx_sa(struct macsec_tx_sa *tx_sa, char *sak, int key_len, in init_tx_sa() argument
1485 tx_sa->key.tfm = macsec_alloc_tfm(sak, key_len, icv_len); in init_tx_sa()
/openbmc/linux/Documentation/admin-guide/
H A Dsysrq.rst162 sak(k) (Secure Access Key) is useful when you want to be sure there is no