Searched refs:rekeying (Results 1 – 14 of 14) sorted by relevance
/external/ipsec-tools/src/racoon/ |
D | TODO | 115 see, draft-*-ipsec-rekeying*.txt 117 see, draft-*-ipsec-rekeying*.txt
|
/external/openssh/ |
D | packet.c | 205 int rekeying; member 255 state->rekeying = 1; in ssh_alloc_session_state() 282 (ssh->state->rekeying || (ssh->kex != NULL && ssh->kex->done == 0)); in ssh_packet_is_rekeying() 346 ssh->state->rekeying = 0; in ssh_packet_set_mux() 1331 if ((need_rekey || state->rekeying) && !ssh_packet_type_is_kex(type)) { in ssh_packet_send2() 1357 state->rekeying = 1; in ssh_packet_send2() 1364 state->rekeying = 0; in ssh_packet_send2() 2480 ssh->state->rekeying = 0; in ssh_packet_set_postauth()
|
D | PROTOCOL.chacha20poly1305 | 90 rekeying every 1GB of data sent or received. If this recommendation
|
D | clientloop.c | 615 int *maxfdp, u_int *nallocp, int rekeying) in client_wait_until_can_do_something() argument 624 &minwait_secs, rekeying); in client_wait_until_can_do_something() 672 if (options.rekey_interval > 0 && compat20 && !rekeying) in client_wait_until_can_do_something()
|
D | sshd_config.0 | 794 RekeyLimit is default none, which means that rekeying is 796 or received and no time based rekeying is done.
|
D | channels.c | 2261 u_int *nallocp, time_t *minwait_secs, int rekeying) argument 2283 if (!rekeying)
|
D | ssh_config.0 | 799 rekeying is performed after the cipher's default amount of data 800 has been sent or received and no time based rekeying is done.
|
D | ChangeLog | 829 seconds until rekeying (negative values are rejected at config parse time). 2518 rekeying; ok djm@ 5217 refactor activation of rekeying 5219 This makes automatic rekeying internal to the packet code (previously 5222 about to be sent as well as packets queued during rekeying events 5345 continuous rekeying. ok djm@ 5367 computing whether or not it is time to perform rekeying. bz#2521, based
|
D | ssh.0 | 584 ~R Request rekeying of the connection (only useful if the peer
|
/external/wpa_supplicant_8/hostapd/ |
D | README | 208 WEP keys can be automatically updated by configuring rekeying. This 211 interval for rekeying in seconds. 334 # Time interval for rekeying GTK (broadcast/multicast encryption keys) in 338 # Time interval for rekeying GMK (master key used internally to generate GTKs
|
D | ChangeLog | 111 - fix IEEE 802.1X/WEP EAP reauthentication and rekeying to use 312 * fixed GTK rekeying when the station uses FT protocol 569 * fix IGTK PN in group rekeying (IEEE 802.11w) 667 enforce frequent PTK rekeying, e.g., to mitigate some attacks against 1107 * added support for strict GTK rekeying (wpa_strict_rekey in 1149 * fixed WPA/WPA2 group rekeying to use key index correctly (GN/GM) 1150 * fixed group rekeying to send zero TSC in EAPOL-Key messages to fix
|
/external/brotli/tests/testdata/ |
D | lcet10.txt | 98 D) Text Conversion: OCR vs. rekeying, standards of accuracy 317 staff found themselves considering alternatives, including rekeying 1786 FLEISCHHAUER cited the example of the standard of the rekeying industry, 4128 OCR versus rekeying, HOOTON posed several questions: How does one get 4277 experience with rekeying * Other problems in dealing with service bureaus 4301 collections. Hence, whether text was converted using OCR or rekeying 4345 ERWAY next reviewed the results of AM's experience with rekeying, noting 4392 encountered during editing * Editing poor copy OCR vs. rekeying * 4438 concluded that rekeying of text may be the best route to take, in spite 4488 prisoners performed AM's rekeying just as well as other service bureaus [all …]
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | ChangeLog | 197 - fix IEEE 802.1X/WEP EAP reauthentication and rekeying to use 1212 used to enforce frequent PTK rekeying, e.g., to mitigate some attacks
|
/external/python/cpython3/Doc/library/ |
D | ssl.rst | 2674 signature algorithm configuration, and rekeying are not supported yet.
|