| Commit message (Collapse) | Author | Age |
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
that performance can be matched
|
|
|
|
| |
can track connection performance by observing ACKs on the channel-level
|
| |
|
| |
|
|
|
|
| |
destruction of bad connections, eventual selection of new ones
|
|
|
|
| |
connections, and count them separately; make iterator tolerate modifications to current element of DLL during iteration
|
| |
|
|
|
|
| |
KX-injection based reset attacks
|
|
|
|
| |
in preparation for KX_AUTH
|
| |
|
|
|
|
| |
implemented properly
|
|
|
|
| |
ambiguous KX context
|
| |
|
|
|
|
| |
other via the same path at the same time, so that only one connection survives
|
|
|
|
| |
transmission
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
ack, and detect duplicate open
|
| |
|
| |
|
| |
|
| |
|
| |
|