Searched refs:sak (Results 1 – 9 of 9) sorted by relevance
/openbmc/linux/drivers/nfc/st21nfca/ |
H A D | core.c | 523 static int st21nfca_get_iso14443_3_sak(struct nfc_hci_dev *hdev, u8 *sak) in st21nfca_get_iso14443_3_sak() argument 538 *sak = sak_skb->data[0]; in st21nfca_get_iso14443_3_sak() 621 u8 sak; in st21nfca_hci_target_from_gate() local 637 r = st21nfca_get_iso14443_3_sak(hdev, &sak); in st21nfca_hci_target_from_gate() 646 nfc_hci_sak_to_protocol(sak); in st21nfca_hci_target_from_gate() 651 target->sel_res = sak; in st21nfca_hci_target_from_gate()
|
/openbmc/linux/Documentation/security/ |
H A D | index.rst | 13 sak
|
/openbmc/linux/drivers/net/ethernet/marvell/octeontx2/nic/ |
H A D | cn10k_macsec.c | 49 static int cn10k_ecb_aes_encrypt(struct otx2_nic *pfvf, u8 *sak, in cn10k_ecb_aes_encrypt() argument 72 err = crypto_skcipher_setkey(tfm, sak, sak_len); in cn10k_ecb_aes_encrypt() 387 u8 *sak, u8 *salt, ssci_t ssci) in cn10k_mcs_write_keys() argument 396 err = cn10k_ecb_aes_encrypt(pfvf, sak, secy->key_len, hash); in cn10k_mcs_write_keys() 403 sak_rev[i] = sak[secy->key_len - 1 - i]; in cn10k_mcs_write_keys() 427 u8 *sak = rxsc->sa_key[assoc_num]; in cn10k_mcs_write_rx_sa_plcy() local 448 ret = cn10k_mcs_write_keys(pfvf, secy, plcy_req, sak, in cn10k_mcs_write_rx_sa_plcy() 665 u8 *sak = txsc->sa_key[assoc_num]; in cn10k_mcs_write_tx_sa_plcy() local 678 ret = cn10k_mcs_write_keys(pfvf, secy, plcy_req, sak, in cn10k_mcs_write_tx_sa_plcy()
|
/openbmc/linux/Documentation/translations/zh_CN/admin-guide/ |
H A D | sysrq.rst | 166 sak(k)(安全访问秘钥)在你尝试登陆的同时,又想确保当前控制台没有可以获取你的
|
/openbmc/linux/include/net/nfc/ |
H A D | hci.h | 273 u32 nfc_hci_sak_to_protocol(u8 sak);
|
/openbmc/linux/net/nfc/hci/ |
H A D | core.c | 267 u32 nfc_hci_sak_to_protocol(u8 sak) in nfc_hci_sak_to_protocol() argument 269 switch (NFC_HCI_TYPE_A_SEL_PROT(sak)) { in nfc_hci_sak_to_protocol()
|
/openbmc/linux/drivers/net/ |
H A D | macsec.c | 1360 static int init_rx_sa(struct macsec_rx_sa *rx_sa, char *sak, int key_len, in init_rx_sa() argument 1367 rx_sa->key.tfm = macsec_alloc_tfm(sak, key_len, icv_len); in init_rx_sa() 1460 static int init_tx_sa(struct macsec_tx_sa *tx_sa, char *sak, int key_len, in init_tx_sa() argument 1467 tx_sa->key.tfm = macsec_alloc_tfm(sak, key_len, icv_len); in init_tx_sa()
|
/openbmc/linux/Documentation/admin-guide/ |
H A D | sysrq.rst | 162 sak(k) (Secure Access Key) is useful when you want to be sure there is no
|
/openbmc/linux/ |
H A D | opengrok0.0.log | [all...] |