Home
last modified time | relevance | path

Searched refs:rekeying (Results 1 – 14 of 14) sorted by relevance

/external/openssh/
Dserverloop.c827 int rekeying = 0, max_fd; in server_loop2() local
854 rekeying = (active_state->kex != NULL && !active_state->kex->done); in server_loop2()
856 if (!rekeying && packet_not_very_much_data_to_write()) in server_loop2()
858 if (options.rekey_interval > 0 && compat20 && !rekeying) in server_loop2()
873 if (!rekeying) { in server_loop2()
Dclientloop.c581 int *maxfdp, u_int *nallocp, int rekeying) in client_wait_until_can_do_something() argument
590 &minwait_secs, rekeying); in client_wait_until_can_do_something()
638 if (options.rekey_interval > 0 && compat20 && !rekeying) in client_wait_until_can_do_something()
1472 int r, max_fd = 0, max_fd2 = 0, len, rekeying = 0; in client_loop() local
1557 rekeying = (active_state->kex != NULL && !active_state->kex->done); in client_loop()
1559 if (rekeying) { in client_loop()
1591 &max_fd2, &nalloc, rekeying); in client_loop()
1597 if (!rekeying) { in client_loop()
Dpacket.c206 int rekeying; member
249 state->rekeying = 1; in ssh_alloc_session_state()
1211 if (state->rekeying) { in ssh_packet_send2()
1232 state->rekeying = 1; in ssh_packet_send2()
1239 state->rekeying = 0; in ssh_packet_send2()
2326 ssh->state->rekeying = 0; in ssh_packet_set_postauth()
DPROTOCOL.chacha20poly130588 rekeying every 1GB of data sent or received. If this recommendation
Dchannels.c2181 u_int *nallocp, time_t *minwait_secs, int rekeying) argument
2203 if (!rekeying)
DChangeLog3220 when rekeying, skip file/DNS lookup if it is the same as the key sent
6185 Test rekeying for every Cipher, MAC and KEX, plus test every KEX with
6194 Test rekeying with all KexAlgorithms.
6227 fix rekeying for AES-GCM modes; ok deraadt
6235 fix rekeying for KEX_C25519_SHA256; noted by dtucker@
7696 keepalives and rekeying will work properly over clock steps. Suggested by
7995 test rekeying when there's no data being transferred
8003 Add test for time-based rekeying
8150 rekeying based on traffic volume or time. ok djm@, help & ok jmc@ for the man
8161 rekeying based on elapsed time in addition to amount of traffic.
Dsshd_config.0715 RekeyLimit is M-bM-^@M-^\default noneM-bM-^@M-^], which means that rekeying is
717 or received and no time based rekeying is done. This option
Dssh_config.0714 rekeying is performed after the cipher's default amount of data
715 has been sent or received and no time based rekeying is done.
Dssh.0563 ~R Request rekeying of the connection (only useful for SSH protocol
/external/ipsec-tools/src/racoon/
DTODO115 see, draft-*-ipsec-rekeying*.txt
117 see, draft-*-ipsec-rekeying*.txt
/external/wpa_supplicant_8/hostapd/
DREADME219 WEP keys can be automatically updated by configuring rekeying. This
222 interval for rekeying in seconds.
346 # Time interval for rekeying GTK (broadcast/multicast encryption keys) in
350 # Time interval for rekeying GMK (master key used internally to generate GTKs
DChangeLog148 * fixed GTK rekeying when the station uses FT protocol
405 * fix IGTK PN in group rekeying (IEEE 802.11w)
503 enforce frequent PTK rekeying, e.g., to mitigate some attacks against
943 * added support for strict GTK rekeying (wpa_strict_rekey in
985 * fixed WPA/WPA2 group rekeying to use key index correctly (GN/GM)
986 * fixed group rekeying to send zero TSC in EAPOL-Key messages to fix
/external/wpa_supplicant_8/wpa_supplicant/
DChangeLog935 used to enforce frequent PTK rekeying, e.g., to mitigate some attacks
/external/srtp/doc/
Drfc3711.txt2488 rekeying in a way that the maximum packet limit is not reached on any