Searched refs:rekeying (Results 1 – 14 of 14) sorted by relevance
/external/openssh/ |
D | serverloop.c | 827 int rekeying = 0, max_fd; in server_loop2() local 854 rekeying = (active_state->kex != NULL && !active_state->kex->done); in server_loop2() 856 if (!rekeying && packet_not_very_much_data_to_write()) in server_loop2() 858 if (options.rekey_interval > 0 && compat20 && !rekeying) in server_loop2() 873 if (!rekeying) { in server_loop2()
|
D | clientloop.c | 581 int *maxfdp, u_int *nallocp, int rekeying) in client_wait_until_can_do_something() argument 590 &minwait_secs, rekeying); in client_wait_until_can_do_something() 638 if (options.rekey_interval > 0 && compat20 && !rekeying) in client_wait_until_can_do_something() 1472 int r, max_fd = 0, max_fd2 = 0, len, rekeying = 0; in client_loop() local 1557 rekeying = (active_state->kex != NULL && !active_state->kex->done); in client_loop() 1559 if (rekeying) { in client_loop() 1591 &max_fd2, &nalloc, rekeying); in client_loop() 1597 if (!rekeying) { in client_loop()
|
D | packet.c | 206 int rekeying; member 249 state->rekeying = 1; in ssh_alloc_session_state() 1211 if (state->rekeying) { in ssh_packet_send2() 1232 state->rekeying = 1; in ssh_packet_send2() 1239 state->rekeying = 0; in ssh_packet_send2() 2326 ssh->state->rekeying = 0; in ssh_packet_set_postauth()
|
D | PROTOCOL.chacha20poly1305 | 88 rekeying every 1GB of data sent or received. If this recommendation
|
D | channels.c | 2181 u_int *nallocp, time_t *minwait_secs, int rekeying) argument 2203 if (!rekeying)
|
D | ChangeLog | 3220 when rekeying, skip file/DNS lookup if it is the same as the key sent 6185 Test rekeying for every Cipher, MAC and KEX, plus test every KEX with 6194 Test rekeying with all KexAlgorithms. 6227 fix rekeying for AES-GCM modes; ok deraadt 6235 fix rekeying for KEX_C25519_SHA256; noted by dtucker@ 7696 keepalives and rekeying will work properly over clock steps. Suggested by 7995 test rekeying when there's no data being transferred 8003 Add test for time-based rekeying 8150 rekeying based on traffic volume or time. ok djm@, help & ok jmc@ for the man 8161 rekeying based on elapsed time in addition to amount of traffic.
|
D | sshd_config.0 | 715 RekeyLimit is M-bM-^@M-^\default noneM-bM-^@M-^], which means that rekeying is 717 or received and no time based rekeying is done. This option
|
D | ssh_config.0 | 714 rekeying is performed after the cipher's default amount of data 715 has been sent or received and no time based rekeying is done.
|
D | ssh.0 | 563 ~R Request rekeying of the connection (only useful for SSH protocol
|
/external/ipsec-tools/src/racoon/ |
D | TODO | 115 see, draft-*-ipsec-rekeying*.txt 117 see, draft-*-ipsec-rekeying*.txt
|
/external/wpa_supplicant_8/hostapd/ |
D | README | 219 WEP keys can be automatically updated by configuring rekeying. This 222 interval for rekeying in seconds. 346 # Time interval for rekeying GTK (broadcast/multicast encryption keys) in 350 # Time interval for rekeying GMK (master key used internally to generate GTKs
|
D | ChangeLog | 148 * fixed GTK rekeying when the station uses FT protocol 405 * fix IGTK PN in group rekeying (IEEE 802.11w) 503 enforce frequent PTK rekeying, e.g., to mitigate some attacks against 943 * added support for strict GTK rekeying (wpa_strict_rekey in 985 * fixed WPA/WPA2 group rekeying to use key index correctly (GN/GM) 986 * fixed group rekeying to send zero TSC in EAPOL-Key messages to fix
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | ChangeLog | 935 used to enforce frequent PTK rekeying, e.g., to mitigate some attacks
|
/external/srtp/doc/ |
D | rfc3711.txt | 2488 rekeying in a way that the maximum packet limit is not reached on any
|