HomeSort by: relevance | last modified time | path
    Searched refs:replay (Results 1 - 16 of 16) sorted by relevancy

  /src/sys/netipsec/
ipsec.c 115 * This allows to verify if the other side has proper replay attacks detection.
1572 * Check the variable replay window.
1573 * ipsec_chkreplay() performs replay check before ICV verification.
1574 * ipsec_updatereplay() updates replay bitmap. This must be called after
1575 * ICV verification (it also performs replay check, which is usually done
1584 const struct secreplay *replay; local in function:ipsec_chkreplay
1591 KASSERT(sav->replay != NULL);
1593 replay = sav->replay;
1595 if (replay->wsize == 0
1640 struct secreplay *replay; local in function:ipsec_updatereplay
    [all...]
xform_esp.c 160 if (sav->tdb_authalgxform != NULL && sav->replay)
363 if (esph && sav->replay && !ipsec_chkreplay(ntohl(esp->esp_seq), sav)) {
365 DPRINTF("packet replay check for %s\n",
593 * Update replay sequence number, if appropriate.
595 if (sav->replay) {
602 DPRINTF("packet replay check for %s\n",
784 if (sav->replay) {
785 uint32_t replay; local in function:esp_output
788 /* Emulate replay attack when ipsec_replay is TRUE. */
790 replay = htonl(sav->replay->count)
    [all...]
keydb.h 116 struct secreplay *replay; /* replay prevention */ member in struct:secasvar
117 size_t replay_len; /* length of replay */
147 /* replay prevention */
xform_ah.c 89 * the replay counter; the new protocol always includes the counter.
209 * Verify the replay state block allocation is consistent with
213 /* NB: replay state is setup elsewhere (sigh) */
214 if (((sav->flags&SADB_X_EXT_OLD) == 0) ^ (sav->replay != NULL)) {
215 DPRINTF("replay state block inconsistency, "
216 "%s algorithm %s replay state\n",
218 sav->replay == NULL ? "without" : "with");
552 /* Check replay window, if applicable. */
553 if (sav->replay && !ipsec_chkreplay(ntohl(ah->ah_seq), sav)) {
555 DPRINTF("packet replay failure: %s\n"
    [all...]
key_debug.c 194 printf(" sadb_prop { replay=%u", prop->sadb_prop_replay);
305 printf(" sadb_sa { spi=%u replay=%u state=%u",
544 if (sav->replay != NULL)
545 kdebug_secreplay(sav->replay);
key.c 3578 * sav->replay, sav->key_* and sav->lft_*.
3587 if (sav->replay != NULL)
3588 kmem_free(sav->replay, sav->replay_len);
3642 /* replay window */
3646 sav->replay = kmem_zalloc(len, KM_SLEEP);
3649 sav->replay->bitmap = (char*)(sav->replay+1);
3650 sav->replay->wsize = sa0->sadb_sa_replay;
3935 sav->replay ? sav->replay->count : 0
    [all...]
  /src/sys/external/bsd/drm2/dist/drm/nouveau/nvkm/subdev/mmu/
nouveau_nvkm_subdev_mmu_vmmgp100.c 499 if (vmm->replay) {
537 bool replay; local in function:gp100_vmm_new_
540 replay = args->v0.fault_replay != 0;
543 replay = false;
551 (*pvmm)->replay = replay;
  /src/sys/external/bsd/drm2/dist/drm/nouveau/include/nvkm/subdev/
mmu.h 60 bool replay; member in struct:nvkm_vmm
  /src/sys/fs/nfs/client/
nfs_clkrpc.c 47 #include <rpc/replay.h>
  /src/sbin/route/
route.c 1350 struct ieee80211_replay_event replay; member in union:print_rtmsg::__anon3c351366030a
1431 evlen = sizeof(ev.replay);
1432 printf("replay");
1454 PRIETHER_ARGS(ev.replay.iev_src),
1455 PRIETHER_ARGS(ev.replay.iev_dst),
1456 ev.replay.iev_cipher,
1457 ev.replay.iev_keyix);
1461 ev.replay.iev_keyrsc, ev.replay.iev_rsc);
  /src/usr.sbin/sysinst/
msg.entropy.en 107 operations are suspect to replay attacks.
msg.entropy.es 107 operations are suspect to replay attacks.
msg.entropy.fr 107 operations are suspect to replay attacks.
msg.entropy.pl 107 operations are suspect to replay attacks.
  /src/games/gomoku/
main.c 386 replay:
393 goto replay;
  /src/sys/external/bsd/drm2/dist/drm/nouveau/
nouveau_svm.c 387 /* Issue fault replay for GPU to retry accesses that faulted previously. */
391 SVM_DBG(svm, "replay");
598 int replay = 0, ret; local in function:nouveau_svm_fault
782 replay++;
786 /* Issue fault replay to the GPU. */
787 if (replay)

Completed in 23 milliseconds