Searched refs:rekeying (Results 1 - 4 of 4) sorted by relevance
/macosx-10.10/OpenSSH-189/openssh/ |
H A D | serverloop.c | 828 int rekeying = 0, max_fd, nalloc = 0; local 853 rekeying = (xxx_kex != NULL && !xxx_kex->done); 855 if (!rekeying && packet_not_very_much_data_to_write()) 867 if (!rekeying) { 870 debug("need rekeying"); 1232 /* rekeying */
|
H A D | clientloop.c | 165 static int need_rekeying; /* Set to non-zero if rekeying is requested. */ 659 int *maxfdp, u_int *nallocp, int rekeying) 668 &minwait_secs, rekeying); 1552 int max_fd = 0, max_fd2 = 0, len, rekeying = 0; local 1637 rekeying = (xxx_kex != NULL && !xxx_kex->done); 1639 if (rekeying) { 1640 debug("rekeying in progress"); 1671 &max_fd2, &nalloc, rekeying); 1676 /* Do channel operations unless rekeying in progress. */ 1677 if (!rekeying) { 658 client_wait_until_can_do_something(fd_set **readsetp, fd_set **writesetp, int *maxfdp, u_int *nallocp, int rekeying) argument [all...] |
H A D | packet.c | 186 int rekeying; member in struct:session_state 754 debug("set_newkeys: rekeying"); 821 * Remember that we are past the authentication step, so rekeying 986 /* during rekeying we can only send key exchange messages */ 987 if (active_state->rekeying) { 1003 /* rekeying starts with sending KEXINIT */ 1005 active_state->rekeying = 1; 1011 active_state->rekeying = 0;
|
H A D | channels.c | 2137 u_int *nallocp, time_t *minwait_secs, int rekeying) 2159 if (!rekeying) 2136 channel_prepare_select(fd_set **readsetp, fd_set **writesetp, int *maxfdp, u_int *nallocp, time_t *minwait_secs, int rekeying) argument
|
Completed in 224 milliseconds