/src/sys/netipsec/ |
ipsec.c | 115 * This allows to verify if the other side has proper replay attacks detection. 1572 * Check the variable replay window. 1573 * ipsec_chkreplay() performs replay check before ICV verification. 1574 * ipsec_updatereplay() updates replay bitmap. This must be called after 1575 * ICV verification (it also performs replay check, which is usually done 1584 const struct secreplay *replay; local in function:ipsec_chkreplay 1591 KASSERT(sav->replay != NULL); 1593 replay = sav->replay; 1595 if (replay->wsize == 0 1640 struct secreplay *replay; local in function:ipsec_updatereplay [all...] |
xform_esp.c | 160 if (sav->tdb_authalgxform != NULL && sav->replay) 363 if (esph && sav->replay && !ipsec_chkreplay(ntohl(esp->esp_seq), sav)) { 365 DPRINTF("packet replay check for %s\n", 593 * Update replay sequence number, if appropriate. 595 if (sav->replay) { 602 DPRINTF("packet replay check for %s\n", 784 if (sav->replay) { 785 uint32_t replay; local in function:esp_output 788 /* Emulate replay attack when ipsec_replay is TRUE. */ 790 replay = htonl(sav->replay->count) [all...] |
keydb.h | 116 struct secreplay *replay; /* replay prevention */ member in struct:secasvar 117 size_t replay_len; /* length of replay */ 147 /* replay prevention */
|
xform_ah.c | 89 * the replay counter; the new protocol always includes the counter. 209 * Verify the replay state block allocation is consistent with 213 /* NB: replay state is setup elsewhere (sigh) */ 214 if (((sav->flags&SADB_X_EXT_OLD) == 0) ^ (sav->replay != NULL)) { 215 DPRINTF("replay state block inconsistency, " 216 "%s algorithm %s replay state\n", 218 sav->replay == NULL ? "without" : "with"); 552 /* Check replay window, if applicable. */ 553 if (sav->replay && !ipsec_chkreplay(ntohl(ah->ah_seq), sav)) { 555 DPRINTF("packet replay failure: %s\n" [all...] |
key_debug.c | 194 printf(" sadb_prop { replay=%u", prop->sadb_prop_replay); 305 printf(" sadb_sa { spi=%u replay=%u state=%u", 544 if (sav->replay != NULL) 545 kdebug_secreplay(sav->replay);
|
key.c | 3578 * sav->replay, sav->key_* and sav->lft_*. 3587 if (sav->replay != NULL) 3588 kmem_free(sav->replay, sav->replay_len); 3642 /* replay window */ 3646 sav->replay = kmem_zalloc(len, KM_SLEEP); 3649 sav->replay->bitmap = (char*)(sav->replay+1); 3650 sav->replay->wsize = sa0->sadb_sa_replay; 3935 sav->replay ? sav->replay->count : 0 [all...] |
/src/sys/external/bsd/drm2/dist/drm/nouveau/nvkm/subdev/mmu/ |
nouveau_nvkm_subdev_mmu_vmmgp100.c | 499 if (vmm->replay) { 537 bool replay; local in function:gp100_vmm_new_ 540 replay = args->v0.fault_replay != 0; 543 replay = false; 551 (*pvmm)->replay = replay;
|
/src/sys/external/bsd/drm2/dist/drm/nouveau/include/nvkm/subdev/ |
mmu.h | 60 bool replay; member in struct:nvkm_vmm
|
/src/sys/fs/nfs/client/ |
nfs_clkrpc.c | 47 #include <rpc/replay.h>
|
/src/sbin/route/ |
route.c | 1350 struct ieee80211_replay_event replay; member in union:print_rtmsg::__anon3c351366030a 1431 evlen = sizeof(ev.replay); 1432 printf("replay"); 1454 PRIETHER_ARGS(ev.replay.iev_src), 1455 PRIETHER_ARGS(ev.replay.iev_dst), 1456 ev.replay.iev_cipher, 1457 ev.replay.iev_keyix); 1461 ev.replay.iev_keyrsc, ev.replay.iev_rsc);
|
/src/usr.sbin/sysinst/ |
msg.entropy.en | 107 operations are suspect to replay attacks.
|
msg.entropy.es | 107 operations are suspect to replay attacks.
|
msg.entropy.fr | 107 operations are suspect to replay attacks.
|
msg.entropy.pl | 107 operations are suspect to replay attacks.
|
/src/games/gomoku/ |
main.c | 386 replay: 393 goto replay;
|
/src/sys/external/bsd/drm2/dist/drm/nouveau/ |
nouveau_svm.c | 387 /* Issue fault replay for GPU to retry accesses that faulted previously. */ 391 SVM_DBG(svm, "replay"); 598 int replay = 0, ret; local in function:nouveau_svm_fault 782 replay++; 786 /* Issue fault replay to the GPU. */ 787 if (replay)
|