setkey.8 (af5b6f81dbafff32ac0641a2397eea24d6dfb66f) | setkey.8 (00a4311adc197c3518f5d60c69e00c4e80d065fd) |
---|---|
1.\" $KAME: setkey.8,v 1.89 2003/09/07 22:17:41 itojun Exp $ 2.\" 3.\" Copyright (C) 1995, 1996, 1997, 1998, and 1999 WIDE Project. 4.\" All rights reserved. 5.\" 6.\" Redistribution and use in source and binary forms, with or without 7.\" modification, are permitted provided that the following conditions 8.\" are met: --- 15 unchanged lines hidden (view full) --- 24.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 25.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 26.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 27.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 28.\" SUCH DAMAGE. 29.\" 30.\" $FreeBSD$ 31.\" | 1.\" $KAME: setkey.8,v 1.89 2003/09/07 22:17:41 itojun Exp $ 2.\" 3.\" Copyright (C) 1995, 1996, 1997, 1998, and 1999 WIDE Project. 4.\" All rights reserved. 5.\" 6.\" Redistribution and use in source and binary forms, with or without 7.\" modification, are permitted provided that the following conditions 8.\" are met: --- 15 unchanged lines hidden (view full) --- 24.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 25.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 26.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 27.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 28.\" SUCH DAMAGE. 29.\" 30.\" $FreeBSD$ 31.\" |
32.Dd May 04, 2020 | 32.Dd June 4, 2020 |
33.Dt SETKEY 8 34.Os 35.\" 36.Sh NAME 37.Nm setkey 38.Nd "manually manipulate the IPsec SA/SP database" 39.\" 40.Sh SYNOPSIS --- 566 unchanged lines hidden (view full) --- 607in the 608.Fl E Ar ealgo 609of the 610.Ar protocol 611parameter: 612.Bd -literal -offset indent 613algorithm keylen (bits) comment 614null 0 to 2048 rfc2410 | 33.Dt SETKEY 8 34.Os 35.\" 36.Sh NAME 37.Nm setkey 38.Nd "manually manipulate the IPsec SA/SP database" 39.\" 40.Sh SYNOPSIS --- 566 unchanged lines hidden (view full) --- 607in the 608.Fl E Ar ealgo 609of the 610.Ar protocol 611parameter: 612.Bd -literal -offset indent 613algorithm keylen (bits) comment 614null 0 to 2048 rfc2410 |
615rijndael-cbc 128/192/256 rfc3602 | 615aes-cbc 128/192/256 rfc3602 |
616aes-ctr 160/224/288 rfc3686 617aes-gcm-16 160/224/288 rfc4106 618.Ed 619.Pp 620Note that the first 128/192/256 bits of a key for 621.Li aes-ctr or aes-gcm-16 622will be used as AES key, and remaining 32 bits will be used as nonce. 623.Pp --- 90 unchanged lines hidden --- | 616aes-ctr 160/224/288 rfc3686 617aes-gcm-16 160/224/288 rfc4106 618.Ed 619.Pp 620Note that the first 128/192/256 bits of a key for 621.Li aes-ctr or aes-gcm-16 622will be used as AES key, and remaining 32 bits will be used as nonce. 623.Pp --- 90 unchanged lines hidden --- |