Searched refs:rekeying (Results 1 - 4 of 4) sorted by relevance

/freebsd-10.0-release/crypto/openssh/
H A Dserverloop.c827 int rekeying = 0, max_fd; local
854 rekeying = (xxx_kex != NULL && !xxx_kex->done);
856 if (!rekeying && packet_not_very_much_data_to_write())
858 if (options.rekey_interval > 0 && compat20 && !rekeying)
873 if (!rekeying) {
876 debug("need rekeying");
1244 /* rekeying */
H A Dclientloop.c162 static int need_rekeying; /* Set to non-zero if rekeying is requested. */
581 int *maxfdp, u_int *nallocp, int rekeying)
590 &minwait_secs, rekeying);
638 if (options.rekey_interval > 0 && compat20 && !rekeying)
677 * Timeout. Could have been either keepalive or rekeying.
678 * Keepalive we check here, rekeying is checked in clientloop.
1485 int max_fd = 0, max_fd2 = 0, len, rekeying = 0; local
1570 rekeying = (xxx_kex != NULL && !xxx_kex->done);
1572 if (rekeying) {
1573 debug("rekeying i
580 client_wait_until_can_do_something(fd_set **readsetp, fd_set **writesetp, int *maxfdp, u_int *nallocp, int rekeying) argument
[all...]
H A Dpacket.c169 /* Volume-based rekeying */
173 /* Time-based rekeying */
175 time_t rekey_time; /* time of last rekeying */
192 int rekeying; member in struct:session_state
763 debug("set_newkeys: rekeying");
830 * Remember that we are past the authentication step, so rekeying
995 /* during rekeying we can only send key exchange messages */
996 if (active_state->rekeying) {
1012 /* rekeying starts with sending KEXINIT */
1014 active_state->rekeying
[all...]
H A Dchannels.c2193 u_int *nallocp, time_t *minwait_secs, int rekeying)
2215 if (!rekeying)
2192 channel_prepare_select(fd_set **readsetp, fd_set **writesetp, int *maxfdp, u_int *nallocp, time_t *minwait_secs, int rekeying) argument

Completed in 262 milliseconds