Searched refs:rekeying (Results 1 – 18 of 18) sorted by relevance
/netbsd/crypto/dist/ipsec-tools/src/racoon/ |
H A D | TODO | 115 see, draft-*-ipsec-rekeying*.txt 117 see, draft-*-ipsec-rekeying*.txt
|
/netbsd/crypto/external/bsd/openssh/dist/ |
H A D | packet.c | 193 int rekeying; member 241 state->rekeying = 1; in ssh_alloc_session_state() 270 return ssh->state->rekeying || in ssh_packet_is_rekeying() 333 ssh->state->rekeying = 0; in ssh_packet_set_mux() 1246 if ((need_rekey || state->rekeying) && !ssh_packet_type_is_kex(type)) { in ssh_packet_send2() 1272 state->rekeying = 1; in ssh_packet_send2() 1281 state->rekeying = 0; in ssh_packet_send2() 2190 ssh->state->rekeying = 0; in ssh_packet_set_postauth()
|
H A D | PROTOCOL.chacha20poly1305 | 90 rekeying every 1GB of data sent or received. If this recommendation
|
H A D | clientloop.c | 511 u_int *npfd_allocp, u_int *npfd_activep, int rekeying, in client_wait_until_can_do_something() argument 551 if (options.rekey_interval > 0 && !rekeying) { in client_wait_until_can_do_something()
|
/netbsd/external/bsd/wpa/dist/hostapd/ |
H A D | README | 208 WEP keys can be automatically updated by configuring rekeying. This 211 interval for rekeying in seconds. 334 # Time interval for rekeying GTK (broadcast/multicast encryption keys) in 338 # Time interval for rekeying GMK (master key used internally to generate GTKs
|
H A D | ChangeLog | 80 * fixed PTK rekeying with FILS and FT 190 - fix IEEE 802.1X/WEP EAP reauthentication and rekeying to use 391 * fixed GTK rekeying when the station uses FT protocol 648 * fix IGTK PN in group rekeying (IEEE 802.11w) 746 enforce frequent PTK rekeying, e.g., to mitigate some attacks against 1186 * added support for strict GTK rekeying (wpa_strict_rekey in 1228 * fixed WPA/WPA2 group rekeying to use key index correctly (GN/GM) 1229 * fixed group rekeying to send zero TSC in EAPOL-Key messages to fix
|
/netbsd/crypto/dist/ipsec-tools/ |
H A D | NEWS | 26 o ISAKMP SA (phase1) rekeying
|
/netbsd/crypto/dist/ipsec-tools/src/racoon/rfc/ |
H A D | draft-ietf-ipsec-nat-t-ike-01.txt | 124 also means that when the original responder is doing rekeying, or
|
H A D | draft-ietf-ipsec-nat-t-ike-03.txt | 127 also means that when the original responder is doing rekeying, or
|
H A D | draft-ietf-ipsec-nat-t-ike-05.txt | 133 also means that when the original responder is doing rekeying, or
|
H A D | draft-ietf-ipsec-nat-t-ike-07.txt | 132 also means that when the original responder is doing rekeying, or
|
H A D | draft-ietf-ipsec-nat-t-ike-02.txt | 127 also means that when the original responder is doing rekeying, or
|
H A D | draft-ietf-ipsec-nat-t-ike-06.txt | 133 also means that when the original responder is doing rekeying, or
|
H A D | draft-ietf-ipsec-nat-t-ike-04.txt | 134 also means that when the original responder is doing rekeying, or
|
H A D | rfc3947.txt | 149 responder is doing rekeying or sending notifications to the original
|
H A D | draft-ietf-ipsec-nat-t-ike-08.txt | 147 responder is doing rekeying, or sending notifications etc. to the
|
/netbsd/external/bsd/wpa/dist/wpa_supplicant/ |
H A D | ChangeLog | 99 * fixed PTK rekeying with FILS and FT 295 - fix IEEE 802.1X/WEP EAP reauthentication and rekeying to use 1310 used to enforce frequent PTK rekeying, e.g., to mitigate some attacks
|
/netbsd/crypto/external/bsd/libsaslc/dist/ref/ |
H A D | rfc2831.txt | 755 rekeying.
|