/external/openssh/regress/ |
rekey.sh | 1 # $OpenBSD: rekey.sh,v 1.1 2003/03/28 13:58:28 markus Exp $ 4 tid="rekey during transfer data"
|
Makefile | 24 rekey \
|
/external/ipsec-tools/src/racoon/ |
TODO | 15 o better rekey 120 (over night, data transfer >1Gb) with frequent dynamic rekey 122 (over night, data transfer >1Gb) with frequent dynamic rekey
|
/frameworks/ml/bordeaux/service/src/android/bordeaux/services/ |
BordeauxSessionStorage.java | 146 int removeSessions(String reKey) { 148 new String[]{COLUMN_KEY, reKey});
|
/external/chromium_org/third_party/sqlite/src/src/ |
test_pcache.c | 324 ** Rekey a single page. 352 /* Find the page to be rekeyed and rekey it. 365 /* Rekey is always given a valid page to work with */
|
pragma.c | [all...] |
tclsqlite.c | [all...] |
/external/chromium_org/third_party/sqlite/src/test/ |
tclsqlite.test | 38 } {1 {bad option "bogus": must be authorizer, backup, busy, cache, changes, close, collate, collation_needed, commit_hook, complete, copy, enable_load_extension, errorcode, eval, exists, function, incrblob, interrupt, last_insert_rowid, nullvalue, onecolumn, profile, progress, rekey, restore, rollback_hook, status, timeout, total_changes, trace, transaction, unlock_notify, update_hook, version, or wal_hook}} 127 set v [catch {db rekey} msg] 129 } {1 {wrong # args: should be "db rekey KEY"}}
|
/external/openssh/ |
kex.c | 199 error("kex_send_kexinit: no kex, cannot rekey"); 235 fatal("kex_input_kexinit: no kex, cannot rekey");
|
clientloop.c | 1123 %cR - Request rekey (SSH protocol 2 only)\r\n\ 1139 %cR - Request rekey (SSH protocol 2 only)\r\n\ [all...] |
/external/dropbear/ |
common-session.c | 372 /* we can't rekey if we haven't done remote ident exchange yet */
|
/external/javasqlite/src/main/java/SQLite/ |
Database.java | 851 public void rekey(byte[] ekey) throws SQLite.Exception { method in class:Database 865 public void rekey(String skey) throws SQLite.Exception { method in class:Database
|
Shell.java | 448 if (cmd.compareTo(".rekey") == 0) { 450 db.rekey(args.length > 0 ? args[0] : null);
|
/external/wpa_supplicant_8/src/drivers/ |
nl80211_copy.h | 542 * the necessary information for supporting GTK rekey offload. This [all...] |
driver.h | [all...] |
driver_nl80211.c | [all...] |
/external/wpa_supplicant_8/hostapd/ |
hostapd.conf | 642 # Rekeying period in seconds. 0 = do not rekey (i.e., set keys only once) [all...] |
/external/wpa_supplicant_8/src/ap/ |
wpa_auth.c | 601 "strict rekeying - force GTK rekey since STA " [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa.c | 1312 int rekey, ret; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/lang/ |
wpa_gui_de.ts | 541 <source> (Rekey)</source> [all...] |
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
peers.cpp | [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
ChangeLog | 258 - Support GTK rekey offload. [all...] |
/external/srtp/doc/ |
rfc3711.txt | [all...] |