Searched refs:sak (Results 1 – 7 of 7) sorted by relevance
/linux-5.19.10/Documentation/security/ |
D | index.rst | 13 sak
|
/linux-5.19.10/drivers/nfc/st21nfca/ |
D | core.c | 523 static int st21nfca_get_iso14443_3_sak(struct nfc_hci_dev *hdev, u8 *sak) in st21nfca_get_iso14443_3_sak() argument 538 *sak = sak_skb->data[0]; in st21nfca_get_iso14443_3_sak() 621 u8 sak; in st21nfca_hci_target_from_gate() local 637 r = st21nfca_get_iso14443_3_sak(hdev, &sak); in st21nfca_hci_target_from_gate() 646 nfc_hci_sak_to_protocol(sak); in st21nfca_hci_target_from_gate() 651 target->sel_res = sak; in st21nfca_hci_target_from_gate()
|
/linux-5.19.10/Documentation/translations/zh_CN/admin-guide/ |
D | sysrq.rst | 166 sak(k)(安全访问秘钥)在你尝试登陆的同时,又想确保当前控制台没有可以获取你的
|
/linux-5.19.10/include/net/nfc/ |
D | hci.h | 273 u32 nfc_hci_sak_to_protocol(u8 sak);
|
/linux-5.19.10/net/nfc/hci/ |
D | core.c | 267 u32 nfc_hci_sak_to_protocol(u8 sak) in nfc_hci_sak_to_protocol() argument 269 switch (NFC_HCI_TYPE_A_SEL_PROT(sak)) { in nfc_hci_sak_to_protocol()
|
/linux-5.19.10/drivers/net/ |
D | macsec.c | 1329 static int init_rx_sa(struct macsec_rx_sa *rx_sa, char *sak, int key_len, in init_rx_sa() argument 1336 rx_sa->key.tfm = macsec_alloc_tfm(sak, key_len, icv_len); in init_rx_sa() 1428 static int init_tx_sa(struct macsec_tx_sa *tx_sa, char *sak, int key_len, in init_tx_sa() argument 1435 tx_sa->key.tfm = macsec_alloc_tfm(sak, key_len, icv_len); in init_tx_sa()
|
/linux-5.19.10/Documentation/admin-guide/ |
D | sysrq.rst | 162 sak(k) (Secure Access Key) is useful when you want to be sure there is no
|