/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/include/llvm/IR/ |
H A D | ProfileSummary.h | 48 const Kind PSK; member in llvm::ProfileSummary 62 : PSK(K), DetailedSummary(std::move(DetailedSummary)), in ProfileSummary() 67 Kind getKind() const { return PSK; } in getKind()
|
/third_party/rust/crates/rust-openssl/openssl/src/ssl/test/ |
H A D | mod.rs | 1388 const CIPHER: &str = "PSK-AES256-CBC-SHA"; in psk_ciphers() 1389 const PSK: &[u8] = b"thisisaverysecurekey"; in psk_ciphers() consts 1398 psk[..PSK.len()].copy_from_slice(PSK); in psk_ciphers() 1400 Ok(PSK.len()) in psk_ciphers() 1415 psk[..PSK.len()].copy_from_slice(PSK); in psk_ciphers() 1417 Ok(PSK.len()) in psk_ciphers()
|
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/lib/IR/ |
H A D | ProfileSummary.cpp | 71 getKeyValMD(Context, "ProfileFormat", KindStr[PSK]), in getMD()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/pae/ |
H A D | ieee802_1x_kay.h | 55 PSK, enumerator
|
H A D | ieee802_1x_kay.c | 2610 participant->mode == PSK) { in ieee802_1x_participant_timer() 3013 if (principal->retry_count < MAX_RETRY_CNT || principal->mode == PSK) { in ieee802_1x_kay_enable_new_info() 3572 case PSK: in mode_txt() 3573 return "PSK"; in mode_txt() 3734 /* Disable MKA lifetime for PSK mode. in ieee802_1x_kay_create_mka() 3739 if (mode != PSK) { in ieee802_1x_kay_create_mka()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/pae/ |
H A D | ieee802_1x_kay.h | 55 PSK, enumerator
|
H A D | ieee802_1x_kay.c | 2647 participant->mode == PSK) { in ieee802_1x_participant_timer() 3050 if (principal->retry_count < MAX_RETRY_CNT || principal->mode == PSK) { in ieee802_1x_kay_enable_new_info() 3609 case PSK: in mode_txt() 3610 return "PSK"; in mode_txt() 3771 /* Disable MKA lifetime for PSK mode. in ieee802_1x_kay_create_mka() 3776 if (mode != PSK) { in ieee802_1x_kay_create_mka()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | wpas_kay.c | 427 res = ieee802_1x_kay_create_mka(wpa_s->kay, ckn, cak, 0, PSK, FALSE); in ieee802_1x_create_preshared_mka()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | wpas_kay.c | 427 res = ieee802_1x_kay_create_mka(wpa_s->kay, ckn, cak, 0, PSK, false); in ieee802_1x_create_preshared_mka()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | wpa_auth_kay.c | 510 res = ieee802_1x_kay_create_mka(hapd->kay, ckn, cak, 0, PSK, true); in ieee802_1x_create_preshared_mka_hapd()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | wpa_auth_kay.c | 510 res = ieee802_1x_kay_create_mka(hapd->kay, ckn, cak, 0, PSK, TRUE); in ieee802_1x_create_preshared_mka_hapd()
|
/third_party/node/lib/ |
H A D | _tls_wrap.js | 435 `PSK identity exceeds ${maxIdentityLen} bytes`,
|
/third_party/mbedtls/tests/ |
H A D | ssl-opt.sh | 506 # If running in a PSK-only build, maybe adapt the test to use a pre-shared key. 508 # If not running in a PSK-only build, do nothing. 514 # This code does not consider builds with ECDHE-PSK or RSA-PSK. 518 # * $PSK_ONLY: YES if running in a PSK-only build (no asymmetric key exchanges). 522 # * $CLI_CMD, $SRV_CMD: may be modified to add PSK-relevant arguments. 523 # * $SKIP_NEXT: set to YES if the test can't run with PSK. 532 *[-_\ =]psk*|*[-_\ =]PSK*) 535 # The test case forces a non-PSK cipher suite. In some cases, a 536 # PSK ciphe [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/drivers/ |
H A D | driver_nl80211.c | 3369 __AKM(PSK, PSK_OVER_802_1X); in wpa_key_mgmt_to_suites() 6631 /* Add PSK in case of 4-way handshake offload */ 6634 wpa_hexdump_key(MSG_DEBUG, " * PSK", params->psk, 32); 6718 wpa_printf(MSG_DEBUG, "nl80211: Key management set PSK");
|