Searched refs:rekeying (Results 1 - 4 of 4) sorted by relevance

/freebsd-10.1-release/crypto/openssh/
H A Dserverloop.c828 int rekeying = 0, max_fd; local
855 rekeying = (xxx_kex != NULL && !xxx_kex->done);
857 if (!rekeying && packet_not_very_much_data_to_write())
859 if (options.rekey_interval > 0 && compat20 && !rekeying)
874 if (!rekeying) {
877 debug("need rekeying");
1245 /* rekeying */
H A Dclientloop.c162 static int need_rekeying; /* Set to non-zero if rekeying is requested. */
581 int *maxfdp, u_int *nallocp, int rekeying)
590 &minwait_secs, rekeying);
638 if (options.rekey_interval > 0 && compat20 && !rekeying)
677 * Timeout. Could have been either keepalive or rekeying.
678 * Keepalive we check here, rekeying is checked in clientloop.
1485 int max_fd = 0, max_fd2 = 0, len, rekeying = 0; local
1570 rekeying = (xxx_kex != NULL && !xxx_kex->done);
1572 if (rekeying) {
1573 debug("rekeying i
580 client_wait_until_can_do_something(fd_set **readsetp, fd_set **writesetp, int *maxfdp, u_int *nallocp, int rekeying) argument
[all...]
H A Dpacket.c169 /* Volume-based rekeying */
173 /* Time-based rekeying */
175 time_t rekey_time; /* time of last rekeying */
192 int rekeying; member in struct:session_state
764 debug("set_newkeys: rekeying");
831 * Remember that we are past the authentication step, so rekeying
997 /* during rekeying we can only send key exchange messages */
998 if (active_state->rekeying) {
1014 /* rekeying starts with sending KEXINIT */
1016 active_state->rekeying
[all...]
H A Dchannels.c2199 u_int *nallocp, time_t *minwait_secs, int rekeying)
2221 if (!rekeying)
2198 channel_prepare_select(fd_set **readsetp, fd_set **writesetp, int *maxfdp, u_int *nallocp, time_t *minwait_secs, int rekeying) argument

Completed in 132 milliseconds