Searched refs:rekey (Results 1 – 7 of 7) sorted by relevance
| /src/crypto/krb5/src/lib/kdb/ |
| H A D | kdb_cpw.c | 341 rekey(krb5_context context, krb5_keyblock *mkey, krb5_key_salt_tuple *ks_tuple, in rekey() function 402 return rekey(context, mkey, ks_tuple, ks_tuple_count, NULL, 0, keepold, in krb5_dbe_crk() 417 return rekey(context, mkey, ks_tuple, ks_tuple_count, NULL, 0, 2, dbent); in krb5_dbe_ark() 432 return rekey(context, mkey, ks_tuple, ks_tuple_count, password, new_kvno, in krb5_dbe_def_cpw() 447 return rekey(context, mkey, ks_tuple, ks_tuple_count, password, 0, 2, in krb5_dbe_apw()
|
| /src/sys/netgraph/ |
| H A D | ng_mppc.c | 658 u_int rekey; in ng_mppc_decompress() local 661 rekey = ((d->cfg.bits & MPPE_STATELESS) != 0) ? in ng_mppc_decompress() 663 if (rekey > mppe_max_rekey) { in ng_mppc_decompress()
|
| /src/crypto/openssh/regress/ |
| H A D | README.regress | 77 rekey.sh: rekey
|
| H A D | Makefile | 37 rekey \
|
| /src/contrib/wpa/src/rsn_supp/ |
| H A D | wpa.c | 2997 int rekey; in wpa_supplicant_process_1_of_2_wpa() local 3011 rekey = wpa_sm_get_state(sm) == WPA_COMPLETED; in wpa_supplicant_process_1_of_2_wpa() 3104 if (rekey) { in wpa_supplicant_process_1_of_2_wpa()
|
| /src/crypto/openssh/ |
| H A D | ChangeLog | 2449 Move rekey test into valgrind-2. 2451 Now that the rekey test has been optimized it's fast enough to not be in 2550 All of the rekey tests use it (otherwise the encrypted byte counts would 2570 upstream: Unnest rekey param parsing test and use ssh not sshd.
|
| /src/contrib/wpa/wpa_supplicant/ |
| H A D | ChangeLog | 1104 - Support GTK rekey offload.
|