Home
last modified time | relevance | path

Searched refs:rekeying (Results 1 – 7 of 7) sorted by relevance

/freebsd/crypto/openssh/
H A Dpacket.c209 int rekeying; member
257 state->rekeying = 1; in ssh_alloc_session_state()
286 return ssh->state->rekeying || in ssh_packet_is_rekeying()
349 ssh->state->rekeying = 0; in ssh_packet_set_mux()
1270 if ((need_rekey || state->rekeying) && !ssh_packet_type_is_kex(type)) { in ssh_packet_send2()
1296 state->rekeying = 1; in ssh_packet_send2()
1303 state->rekeying = 0; in ssh_packet_send2()
2240 ssh->state->rekeying = 0; in ssh_packet_set_postauth()
H A DPROTOCOL.chacha20poly130590 rekeying every 1GB of data sent or received. If this recommendation
H A DPROTOCOL126 Replies are sent in order. They are sent immediately except when rekeying
127 is in progress, in which case they are queued until rekeying completes.
H A DChangeLog7885 OPEN during SSH transport rekeying. The most visible benefit is that it
7944 avoids plausible spin during rekeying if channel io_want flags are reused
/freebsd/contrib/wpa/hostapd/
H A DREADME208 WEP keys can be automatically updated by configuring rekeying. This
211 interval for rekeying in seconds.
334 # Time interval for rekeying GTK (broadcast/multicast encryption keys) in
338 # Time interval for rekeying GMK (master key used internally to generate GTKs
H A DChangeLog18 - use Secure=1 in message 3 during PTK rekeying
160 * fixed PTK rekeying with FILS and FT
270 - fix IEEE 802.1X/WEP EAP reauthentication and rekeying to use
471 * fixed GTK rekeying when the station uses FT protocol
728 * fix IGTK PN in group rekeying (IEEE 802.11w)
826 enforce frequent PTK rekeying, e.g., to mitigate some attacks against
1266 * added support for strict GTK rekeying (wpa_strict_rekey in
1308 * fixed WPA/WPA2 group rekeying to use key index correctly (GN/GM)
1309 * fixed group rekeying to send zero TSC in EAPOL-Key messages to fix
/freebsd/contrib/wpa/wpa_supplicant/
H A DChangeLog22 - use Secure=1 in message 2 during PTK rekeying
202 * fixed PTK rekeying with FILS and FT
398 - fix IEEE 802.1X/WEP EAP reauthentication and rekeying to use
1413 used to enforce frequent PTK rekeying, e.g., to mitigate some attacks