/netbsd-6-1-5-RELEASE/crypto/dist/ipsec-tools/src/setkey/ |
H A D | scriptdump.pl | 34 } elsif (/^\tseq=(0x\d+) replay=(\d+) flags=(0x\d+) state=/) { 36 $replay = $2; 39 print " -m $ipsecmode -r $replay" if $replay;
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/tests/can/ |
H A D | test_can.in | 54 replay="${TESTS_ENVIRONMENT} ../../kdc/kdc-replay" 77 ${replay} ${srcdir}/${tst}.req || { cat messages.log ; exit 1; }
|
/netbsd-6-1-5-RELEASE/sys/netipsec/ |
H A D | ipsec.c | 113 * This allows to verify if the other side has proper replay attacks detection. 190 "Emulate replay attack"); 1926 * Check the variable replay window. 1927 * ipsec_chkreplay() performs replay check before ICV verification. 1928 * ipsec_updatereplay() updates replay bitmap. This must be called after 1929 * ICV verification (it also performs replay check, which is usually done 1938 const struct secreplay *replay; local 1947 IPSEC_ASSERT(sav->replay != NULL, ("ipsec_chkreplay: Null replay state")); 1949 replay 1996 struct secreplay *replay; local [all...] |
H A D | keydb.h | 110 struct secreplay *replay; /* replay prevention */ member in struct:secasvar 139 /* replay prevention */
|
H A D | xform_esp.c | 160 if (sav->tdb_authalgxform != NULL && sav->replay) 354 if (esph && sav->replay && !ipsec_chkreplay(ntohl(esp->esp_seq), sav)) { 355 DPRINTF(("esp_input: packet replay check for %s\n", 629 * Update replay sequence number, if appropriate. 631 if (sav->replay) { 637 DPRINTF(("%s: packet replay check for %s\n", __func__, 831 if (sav->replay) { 832 u_int32_t replay; local 835 /* Emulate replay attack when ipsec_replay is TRUE. */ 838 sav->replay [all...] |
H A D | xform_ah.c | 90 * the replay counter; the new protocol always includes the counter. 193 * Verify the replay state block allocation is consistent with 197 /* NB: replay state is setup elsewhere (sigh) */ 198 if (((sav->flags&SADB_X_EXT_OLD) == 0) ^ (sav->replay != NULL)) { 199 DPRINTF(("ah_init: replay state block inconsistency, " 200 "%s algorithm %s replay state\n", 202 sav->replay == NULL ? "without" : "with")); 663 /* Check replay window, if applicable. */ 664 if (sav->replay && !ipsec_chkreplay(ntohl(ah->ah_seq), sav)) { 666 DPRINTF(("ah_input: packet replay failur [all...] |
H A D | key_debug.c | 189 printf("sadb_prop{ replay=%u\n", prop->sadb_prop_replay); 320 printf("sadb_sa{ spi=%u replay=%u state=%u\n", 566 if (sav->replay != NULL) 567 kdebug_secreplay(sav->replay);
|
H A D | key.c | 3064 if (sav->replay != NULL) { 3065 KFREE(sav->replay); 3066 sav->replay = NULL; 3193 sav->replay = NULL; 3224 /* replay window */ 3226 sav->replay = (struct secreplay *) 3228 if (sav->replay == NULL) { 3234 sav->replay->bitmap = (char*)(sav->replay+1); 3235 sav->replay [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/cpl/trousers/dist/src/tspi/ |
H A D | tspi_transport.c | 61 memcpy(signInfo.replay.nonce, pValidationData->rgbExternalData, sizeof(TPM_NONCE)); 64 (BYTE **)&signInfo.replay.nonce)))
|
H A D | tspi_audit.c | 204 signInfo.replay = antiReplay;
|
H A D | obj_context.c | 1345 result |= Trspi_Hash_NONCE(&hashCtx, signInfo->replay.nonce); 1361 if ((result = RPC_ReleaseTransportSigned(tspContext, tcsKey, &signInfo->replay, pAuth, 1396 result |= Trspi_Hash_NONCE(&hashCtx, signInfo->replay.nonce);
|
/netbsd-6-1-5-RELEASE/sys/netinet6/ |
H A D | ah_output.c | 160 if ((sav->flags & SADB_X_EXT_OLD) == 0 && !sav->replay) { 163 "sav->replay is null: %x->%x, SPI=%u\n", 248 if (sav->replay->count == ~0) { 252 "replay counter overflowed. %s\n", 259 sav->replay->count++; 264 ahdr->ah_seq = htonl(sav->replay->count & 0xffffffff); 414 if ((sav->flags & SADB_X_EXT_OLD) == 0 && !sav->replay) { 416 "sav->replay is null: SPI=%u\n", 457 if (sav->replay->count == ~0) { 461 "replay counte [all...] |
H A D | esp_output.c | 137 if (aalgo && sav->replay && sav->key_auth) 240 if ((sav->flags & SADB_X_EXT_OLD) == 0 && !sav->replay) { 249 "sav->replay is null: %x->%x, SPI=%u\n", 260 "sav->replay is null: SPI=%u\n", 435 if (sav->replay->count == ~0) { 439 "replay counter overflowed. %s\n", 446 sav->replay->count++; 451 nesp->esp_seq = htonl(sav->replay->count & 0xffffffff); 598 if (!sav->replay)
|
H A D | ipsec.c | 2247 * Check the variable replay window. 2248 * ipsec_chkreplay() performs replay check before ICV verification. 2249 * ipsec_updatereplay() updates replay bitmap. This must be called after 2250 * ICV verification (it also performs replay check, which is usually done 2261 const struct secreplay *replay; local 2271 replay = sav->replay; 2273 if (replay->wsize == 0) 2274 return 1; /* no need to check replay. */ 2277 frlast = replay 2319 struct secreplay *replay; local [all...] |
H A D | ah_input.c | 249 if ((sav->flags & SADB_X_EXT_OLD) == 0 && sav->replay) { 255 "replay packet in IPv4 AH input: %s %s\n", 366 if ((sav->flags & SADB_X_EXT_OLD) == 0 && sav->replay) { 692 if ((sav->flags & SADB_X_EXT_OLD) == 0 && sav->replay) { 698 "replay packet in IPv6 AH input: %s %s\n", 785 if ((sav->flags & SADB_X_EXT_OLD) == 0 && sav->replay) {
|
H A D | esp_input.c | 204 if (!((sav->flags & SADB_X_EXT_OLD) == 0 && sav->replay && 220 "replay packet in IPv4 ESP input: %s %s\n", 279 if ((sav->flags & SADB_X_EXT_OLD) == 0 && sav->replay) { 620 if (!((sav->flags & SADB_X_EXT_OLD) == 0 && sav->replay && 636 "replay packet in IPv6 ESP input: %s %s\n", 692 if ((sav->flags & SADB_X_EXT_OLD) == 0 && sav->replay) {
|
/netbsd-6-1-5-RELEASE/sys/netkey/ |
H A D | keydb.h | 97 struct secreplay *replay; /* replay prevention */ member in struct:secasvar 117 /* replay prevention */
|
H A D | key_debug.c | 282 printf("sadb_prop{ replay=%u\n", prop->sadb_prop_replay); 413 printf("sadb_sa{ spi=%u replay=%u state=%u\n", 681 if (sav->replay != NULL) 682 kdebug_secreplay(sav->replay);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/tests/db/ |
H A D | add-modify-delete.in | 119 echo "check iprop replay" 127 ${iproplog} replay > /dev/null || exit 1
|
/netbsd-6-1-5-RELEASE/games/gomoku/ |
H A D | main.c | 323 replay: 335 goto replay; 341 goto replay;
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kdc/ |
H A D | NTMakefile | 46 NOINST_PROGRAMS=$(OBJ)\kdc-replay.exe
|
/netbsd-6-1-5-RELEASE/sbin/route/ |
H A D | route.c | 1755 struct ieee80211_replay_event replay; member in union:__anon5496 1822 evlen = sizeof(ev.replay); 1823 printf("replay"); 1845 PRIETHER_ARGS(ev.replay.iev_src), 1846 PRIETHER_ARGS(ev.replay.iev_dst), 1847 ev.replay.iev_cipher, 1848 ev.replay.iev_keyix); 1852 ev.replay.iev_keyrsc, ev.replay.iev_rsc);
|
/netbsd-6-1-5-RELEASE/crypto/dist/ipsec-tools/src/libipsec/ |
H A D | key_debug.c | 243 printf("sadb_prop{ replay=%u\n", prop->sadb_prop_replay); 378 printf("sadb_sa{ spi=%u replay=%u state=%u\n", 752 if (sav->replay != NULL) 753 kdebug_secreplay(sav->replay);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/krb5/ |
H A D | NTMakefile | 127 $(OBJ)\replay.obj \ 272 replay.c \
|
/netbsd-6-1-5-RELEASE/dist/nvi/vi/ |
H A D | v_txt.c | 268 size_t rcol; /* 0-N: insert offset in the replay buffer. */ 439 * can change between the insert and the replay. 451 * error messages during the replay. Otherwise, when the user enters 479 goto replay; 536 * If the first character of the input is a nul, replay the previous 537 * input. (Historically, it's okay to replay non-existent input.) 548 goto replay; 594 /* Check to see if the character fits into the replay buffers. */ 601 replay: if (LF_ISSET(TXT_REPLAY)) { 699 * replay character [all...] |