Searched refs:rekeying (Results 1 – 7 of 7) sorted by relevance
209 int rekeying; member257 state->rekeying = 1; in ssh_alloc_session_state()286 return ssh->state->rekeying || in ssh_packet_is_rekeying()349 ssh->state->rekeying = 0; in ssh_packet_set_mux()1270 if ((need_rekey || state->rekeying) && !ssh_packet_type_is_kex(type)) { in ssh_packet_send2()1296 state->rekeying = 1; in ssh_packet_send2()1303 state->rekeying = 0; in ssh_packet_send2()2240 ssh->state->rekeying = 0; in ssh_packet_set_postauth()
90 rekeying every 1GB of data sent or received. If this recommendation
126 Replies are sent in order. They are sent immediately except when rekeying127 is in progress, in which case they are queued until rekeying completes.
7885 OPEN during SSH transport rekeying. The most visible benefit is that it7944 avoids plausible spin during rekeying if channel io_want flags are reused
208 WEP keys can be automatically updated by configuring rekeying. This211 interval for rekeying in seconds.334 # Time interval for rekeying GTK (broadcast/multicast encryption keys) in338 # Time interval for rekeying GMK (master key used internally to generate GTKs
18 - use Secure=1 in message 3 during PTK rekeying160 * fixed PTK rekeying with FILS and FT270 - fix IEEE 802.1X/WEP EAP reauthentication and rekeying to use471 * fixed GTK rekeying when the station uses FT protocol728 * fix IGTK PN in group rekeying (IEEE 802.11w)826 enforce frequent PTK rekeying, e.g., to mitigate some attacks against1266 * added support for strict GTK rekeying (wpa_strict_rekey in1308 * fixed WPA/WPA2 group rekeying to use key index correctly (GN/GM)1309 * fixed group rekeying to send zero TSC in EAPOL-Key messages to fix
22 - use Secure=1 in message 2 during PTK rekeying202 * fixed PTK rekeying with FILS and FT398 - fix IEEE 802.1X/WEP EAP reauthentication and rekeying to use1413 used to enforce frequent PTK rekeying, e.g., to mitigate some attacks