Searched refs:rekeying (Results 1 - 4 of 4) sorted by relevance
/freebsd-10.1-release/crypto/openssh/ |
H A D | serverloop.c | 828 int rekeying = 0, max_fd; local 855 rekeying = (xxx_kex != NULL && !xxx_kex->done); 857 if (!rekeying && packet_not_very_much_data_to_write()) 859 if (options.rekey_interval > 0 && compat20 && !rekeying) 874 if (!rekeying) { 877 debug("need rekeying"); 1245 /* rekeying */
|
H A D | clientloop.c | 162 static int need_rekeying; /* Set to non-zero if rekeying is requested. */ 581 int *maxfdp, u_int *nallocp, int rekeying) 590 &minwait_secs, rekeying); 638 if (options.rekey_interval > 0 && compat20 && !rekeying) 677 * Timeout. Could have been either keepalive or rekeying. 678 * Keepalive we check here, rekeying is checked in clientloop. 1485 int max_fd = 0, max_fd2 = 0, len, rekeying = 0; local 1570 rekeying = (xxx_kex != NULL && !xxx_kex->done); 1572 if (rekeying) { 1573 debug("rekeying i 580 client_wait_until_can_do_something(fd_set **readsetp, fd_set **writesetp, int *maxfdp, u_int *nallocp, int rekeying) argument [all...] |
H A D | packet.c | 169 /* Volume-based rekeying */ 173 /* Time-based rekeying */ 175 time_t rekey_time; /* time of last rekeying */ 192 int rekeying; member in struct:session_state 764 debug("set_newkeys: rekeying"); 831 * Remember that we are past the authentication step, so rekeying 997 /* during rekeying we can only send key exchange messages */ 998 if (active_state->rekeying) { 1014 /* rekeying starts with sending KEXINIT */ 1016 active_state->rekeying [all...] |
H A D | channels.c | 2199 u_int *nallocp, time_t *minwait_secs, int rekeying) 2221 if (!rekeying) 2198 channel_prepare_select(fd_set **readsetp, fd_set **writesetp, int *maxfdp, u_int *nallocp, time_t *minwait_secs, int rekeying) argument
|
Completed in 132 milliseconds