Home
last modified time | relevance | path

Searched refs:PSK (Results 1 - 14 of 14) sorted by relevance

/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/include/llvm/IR/
H A DProfileSummary.h48 const Kind PSK; member in llvm::ProfileSummary
62 : PSK(K), DetailedSummary(std::move(DetailedSummary)), in ProfileSummary()
67 Kind getKind() const { return PSK; } in getKind()
/third_party/rust/crates/rust-openssl/openssl/src/ssl/test/
H A Dmod.rs1388 const CIPHER: &str = "PSK-AES256-CBC-SHA"; in psk_ciphers()
1389 const PSK: &[u8] = b"thisisaverysecurekey"; in psk_ciphers() consts
1398 psk[..PSK.len()].copy_from_slice(PSK); in psk_ciphers()
1400 Ok(PSK.len()) in psk_ciphers()
1415 psk[..PSK.len()].copy_from_slice(PSK); in psk_ciphers()
1417 Ok(PSK.len()) in psk_ciphers()
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/lib/IR/
H A DProfileSummary.cpp71 getKeyValMD(Context, "ProfileFormat", KindStr[PSK]), in getMD()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/pae/
H A Dieee802_1x_kay.h55 PSK, enumerator
H A Dieee802_1x_kay.c2610 participant->mode == PSK) { in ieee802_1x_participant_timer()
3013 if (principal->retry_count < MAX_RETRY_CNT || principal->mode == PSK) { in ieee802_1x_kay_enable_new_info()
3572 case PSK: in mode_txt()
3573 return "PSK"; in mode_txt()
3734 /* Disable MKA lifetime for PSK mode. in ieee802_1x_kay_create_mka()
3739 if (mode != PSK) { in ieee802_1x_kay_create_mka()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/pae/
H A Dieee802_1x_kay.h55 PSK, enumerator
H A Dieee802_1x_kay.c2647 participant->mode == PSK) { in ieee802_1x_participant_timer()
3050 if (principal->retry_count < MAX_RETRY_CNT || principal->mode == PSK) { in ieee802_1x_kay_enable_new_info()
3609 case PSK: in mode_txt()
3610 return "PSK"; in mode_txt()
3771 /* Disable MKA lifetime for PSK mode. in ieee802_1x_kay_create_mka()
3776 if (mode != PSK) { in ieee802_1x_kay_create_mka()
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
H A Dwpas_kay.c427 res = ieee802_1x_kay_create_mka(wpa_s->kay, ckn, cak, 0, PSK, FALSE); in ieee802_1x_create_preshared_mka()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
H A Dwpas_kay.c427 res = ieee802_1x_kay_create_mka(wpa_s->kay, ckn, cak, 0, PSK, false); in ieee802_1x_create_preshared_mka()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
H A Dwpa_auth_kay.c510 res = ieee802_1x_kay_create_mka(hapd->kay, ckn, cak, 0, PSK, true); in ieee802_1x_create_preshared_mka_hapd()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
H A Dwpa_auth_kay.c510 res = ieee802_1x_kay_create_mka(hapd->kay, ckn, cak, 0, PSK, TRUE); in ieee802_1x_create_preshared_mka_hapd()
/third_party/node/lib/
H A D_tls_wrap.js435 `PSK identity exceeds ${maxIdentityLen} bytes`,
/third_party/mbedtls/tests/
H A Dssl-opt.sh506 # If running in a PSK-only build, maybe adapt the test to use a pre-shared key.
508 # If not running in a PSK-only build, do nothing.
514 # This code does not consider builds with ECDHE-PSK or RSA-PSK.
518 # * $PSK_ONLY: YES if running in a PSK-only build (no asymmetric key exchanges).
522 # * $CLI_CMD, $SRV_CMD: may be modified to add PSK-relevant arguments.
523 # * $SKIP_NEXT: set to YES if the test can't run with PSK.
532 *[-_\ =]psk*|*[-_\ =]PSK*)
535 # The test case forces a non-PSK cipher suite. In some cases, a
536 # PSK ciphe
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/drivers/
H A Ddriver_nl80211.c3369 __AKM(PSK, PSK_OVER_802_1X); in wpa_key_mgmt_to_suites()
6631 /* Add PSK in case of 4-way handshake offload */
6634 wpa_hexdump_key(MSG_DEBUG, " * PSK", params->psk, 32);
6718 wpa_printf(MSG_DEBUG, "nl80211: Key management set PSK");

Completed in 32 milliseconds