Home
last modified time | relevance | path

Searched refs:rekeying (Results 1 – 14 of 14) sorted by relevance

/external/ipsec-tools/src/racoon/
DTODO115 see, draft-*-ipsec-rekeying*.txt
117 see, draft-*-ipsec-rekeying*.txt
/external/openssh/
Dpacket.c205 int rekeying; member
255 state->rekeying = 1; in ssh_alloc_session_state()
282 (ssh->state->rekeying || (ssh->kex != NULL && ssh->kex->done == 0)); in ssh_packet_is_rekeying()
346 ssh->state->rekeying = 0; in ssh_packet_set_mux()
1331 if ((need_rekey || state->rekeying) && !ssh_packet_type_is_kex(type)) { in ssh_packet_send2()
1357 state->rekeying = 1; in ssh_packet_send2()
1364 state->rekeying = 0; in ssh_packet_send2()
2480 ssh->state->rekeying = 0; in ssh_packet_set_postauth()
DPROTOCOL.chacha20poly130590 rekeying every 1GB of data sent or received. If this recommendation
Dclientloop.c615 int *maxfdp, u_int *nallocp, int rekeying) in client_wait_until_can_do_something() argument
624 &minwait_secs, rekeying); in client_wait_until_can_do_something()
672 if (options.rekey_interval > 0 && compat20 && !rekeying) in client_wait_until_can_do_something()
Dsshd_config.0794 RekeyLimit is default none, which means that rekeying is
796 or received and no time based rekeying is done.
Dchannels.c2261 u_int *nallocp, time_t *minwait_secs, int rekeying) argument
2283 if (!rekeying)
Dssh_config.0799 rekeying is performed after the cipher's default amount of data
800 has been sent or received and no time based rekeying is done.
DChangeLog829 seconds until rekeying (negative values are rejected at config parse time).
2518 rekeying; ok djm@
5217 refactor activation of rekeying
5219 This makes automatic rekeying internal to the packet code (previously
5222 about to be sent as well as packets queued during rekeying events
5345 continuous rekeying. ok djm@
5367 computing whether or not it is time to perform rekeying. bz#2521, based
Dssh.0584 ~R Request rekeying of the connection (only useful if the peer
/external/wpa_supplicant_8/hostapd/
DREADME208 WEP keys can be automatically updated by configuring rekeying. This
211 interval for rekeying in seconds.
334 # Time interval for rekeying GTK (broadcast/multicast encryption keys) in
338 # Time interval for rekeying GMK (master key used internally to generate GTKs
DChangeLog111 - fix IEEE 802.1X/WEP EAP reauthentication and rekeying to use
312 * fixed GTK rekeying when the station uses FT protocol
569 * fix IGTK PN in group rekeying (IEEE 802.11w)
667 enforce frequent PTK rekeying, e.g., to mitigate some attacks against
1107 * added support for strict GTK rekeying (wpa_strict_rekey in
1149 * fixed WPA/WPA2 group rekeying to use key index correctly (GN/GM)
1150 * fixed group rekeying to send zero TSC in EAPOL-Key messages to fix
/external/brotli/tests/testdata/
Dlcet10.txt98 D) Text Conversion: OCR vs. rekeying, standards of accuracy
317 staff found themselves considering alternatives, including rekeying
1786 FLEISCHHAUER cited the example of the standard of the rekeying industry,
4128 OCR versus rekeying, HOOTON posed several questions: How does one get
4277 experience with rekeying * Other problems in dealing with service bureaus
4301 collections. Hence, whether text was converted using OCR or rekeying
4345 ERWAY next reviewed the results of AM's experience with rekeying, noting
4392 encountered during editing * Editing poor copy OCR vs. rekeying *
4438 concluded that rekeying of text may be the best route to take, in spite
4488 prisoners performed AM's rekeying just as well as other service bureaus
[all …]
/external/wpa_supplicant_8/wpa_supplicant/
DChangeLog197 - fix IEEE 802.1X/WEP EAP reauthentication and rekeying to use
1212 used to enforce frequent PTK rekeying, e.g., to mitigate some attacks
/external/python/cpython3/Doc/library/
Dssl.rst2674 signature algorithm configuration, and rekeying are not supported yet.