Home
last modified time | relevance | path

Searched refs:rekeying (Results 1 – 18 of 18) sorted by relevance

/netbsd/crypto/dist/ipsec-tools/src/racoon/
H A DTODO115 see, draft-*-ipsec-rekeying*.txt
117 see, draft-*-ipsec-rekeying*.txt
/netbsd/crypto/external/bsd/openssh/dist/
H A Dpacket.c193 int rekeying; member
241 state->rekeying = 1; in ssh_alloc_session_state()
270 return ssh->state->rekeying || in ssh_packet_is_rekeying()
333 ssh->state->rekeying = 0; in ssh_packet_set_mux()
1246 if ((need_rekey || state->rekeying) && !ssh_packet_type_is_kex(type)) { in ssh_packet_send2()
1272 state->rekeying = 1; in ssh_packet_send2()
1281 state->rekeying = 0; in ssh_packet_send2()
2190 ssh->state->rekeying = 0; in ssh_packet_set_postauth()
H A DPROTOCOL.chacha20poly130590 rekeying every 1GB of data sent or received. If this recommendation
H A Dclientloop.c511 u_int *npfd_allocp, u_int *npfd_activep, int rekeying, in client_wait_until_can_do_something() argument
551 if (options.rekey_interval > 0 && !rekeying) { in client_wait_until_can_do_something()
/netbsd/external/bsd/wpa/dist/hostapd/
H A DREADME208 WEP keys can be automatically updated by configuring rekeying. This
211 interval for rekeying in seconds.
334 # Time interval for rekeying GTK (broadcast/multicast encryption keys) in
338 # Time interval for rekeying GMK (master key used internally to generate GTKs
H A DChangeLog80 * fixed PTK rekeying with FILS and FT
190 - fix IEEE 802.1X/WEP EAP reauthentication and rekeying to use
391 * fixed GTK rekeying when the station uses FT protocol
648 * fix IGTK PN in group rekeying (IEEE 802.11w)
746 enforce frequent PTK rekeying, e.g., to mitigate some attacks against
1186 * added support for strict GTK rekeying (wpa_strict_rekey in
1228 * fixed WPA/WPA2 group rekeying to use key index correctly (GN/GM)
1229 * fixed group rekeying to send zero TSC in EAPOL-Key messages to fix
/netbsd/crypto/dist/ipsec-tools/
H A DNEWS26 o ISAKMP SA (phase1) rekeying
/netbsd/crypto/dist/ipsec-tools/src/racoon/rfc/
H A Ddraft-ietf-ipsec-nat-t-ike-01.txt124 also means that when the original responder is doing rekeying, or
H A Ddraft-ietf-ipsec-nat-t-ike-03.txt127 also means that when the original responder is doing rekeying, or
H A Ddraft-ietf-ipsec-nat-t-ike-05.txt133 also means that when the original responder is doing rekeying, or
H A Ddraft-ietf-ipsec-nat-t-ike-07.txt132 also means that when the original responder is doing rekeying, or
H A Ddraft-ietf-ipsec-nat-t-ike-02.txt127 also means that when the original responder is doing rekeying, or
H A Ddraft-ietf-ipsec-nat-t-ike-06.txt133 also means that when the original responder is doing rekeying, or
H A Ddraft-ietf-ipsec-nat-t-ike-04.txt134 also means that when the original responder is doing rekeying, or
H A Drfc3947.txt149 responder is doing rekeying or sending notifications to the original
H A Ddraft-ietf-ipsec-nat-t-ike-08.txt147 responder is doing rekeying, or sending notifications etc. to the
/netbsd/external/bsd/wpa/dist/wpa_supplicant/
H A DChangeLog99 * fixed PTK rekeying with FILS and FT
295 - fix IEEE 802.1X/WEP EAP reauthentication and rekeying to use
1310 used to enforce frequent PTK rekeying, e.g., to mitigate some attacks
/netbsd/crypto/external/bsd/libsaslc/dist/ref/
H A Drfc2831.txt755 rekeying.