Searched refs:rekeying (Results 1 - 4 of 4) sorted by relevance
/freebsd-10.0-release/crypto/openssh/ |
H A D | serverloop.c | 827 int rekeying = 0, max_fd; local 854 rekeying = (xxx_kex != NULL && !xxx_kex->done); 856 if (!rekeying && packet_not_very_much_data_to_write()) 858 if (options.rekey_interval > 0 && compat20 && !rekeying) 873 if (!rekeying) { 876 debug("need rekeying"); 1244 /* rekeying */
|
H A D | clientloop.c | 162 static int need_rekeying; /* Set to non-zero if rekeying is requested. */ 581 int *maxfdp, u_int *nallocp, int rekeying) 590 &minwait_secs, rekeying); 638 if (options.rekey_interval > 0 && compat20 && !rekeying) 677 * Timeout. Could have been either keepalive or rekeying. 678 * Keepalive we check here, rekeying is checked in clientloop. 1485 int max_fd = 0, max_fd2 = 0, len, rekeying = 0; local 1570 rekeying = (xxx_kex != NULL && !xxx_kex->done); 1572 if (rekeying) { 1573 debug("rekeying i 580 client_wait_until_can_do_something(fd_set **readsetp, fd_set **writesetp, int *maxfdp, u_int *nallocp, int rekeying) argument [all...] |
H A D | packet.c | 169 /* Volume-based rekeying */ 173 /* Time-based rekeying */ 175 time_t rekey_time; /* time of last rekeying */ 192 int rekeying; member in struct:session_state 763 debug("set_newkeys: rekeying"); 830 * Remember that we are past the authentication step, so rekeying 995 /* during rekeying we can only send key exchange messages */ 996 if (active_state->rekeying) { 1012 /* rekeying starts with sending KEXINIT */ 1014 active_state->rekeying [all...] |
H A D | channels.c | 2193 u_int *nallocp, time_t *minwait_secs, int rekeying) 2215 if (!rekeying) 2192 channel_prepare_select(fd_set **readsetp, fd_set **writesetp, int *maxfdp, u_int *nallocp, time_t *minwait_secs, int rekeying) argument
|
Completed in 262 milliseconds