Searched refs:replay (Results 1 - 25 of 32) sorted by relevance

12

/netbsd-6-1-5-RELEASE/crypto/dist/ipsec-tools/src/setkey/
H A Dscriptdump.pl34 } elsif (/^\tseq=(0x\d+) replay=(\d+) flags=(0x\d+) state=/) {
36 $replay = $2;
39 print " -m $ipsecmode -r $replay" if $replay;
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/tests/can/
H A Dtest_can.in54 replay="${TESTS_ENVIRONMENT} ../../kdc/kdc-replay"
77 ${replay} ${srcdir}/${tst}.req || { cat messages.log ; exit 1; }
/netbsd-6-1-5-RELEASE/sys/netipsec/
H A Dipsec.c113 * This allows to verify if the other side has proper replay attacks detection.
190 "Emulate replay attack");
1926 * Check the variable replay window.
1927 * ipsec_chkreplay() performs replay check before ICV verification.
1928 * ipsec_updatereplay() updates replay bitmap. This must be called after
1929 * ICV verification (it also performs replay check, which is usually done
1938 const struct secreplay *replay; local
1947 IPSEC_ASSERT(sav->replay != NULL, ("ipsec_chkreplay: Null replay state"));
1949 replay
1996 struct secreplay *replay; local
[all...]
H A Dkeydb.h110 struct secreplay *replay; /* replay prevention */ member in struct:secasvar
139 /* replay prevention */
H A Dxform_esp.c160 if (sav->tdb_authalgxform != NULL && sav->replay)
354 if (esph && sav->replay && !ipsec_chkreplay(ntohl(esp->esp_seq), sav)) {
355 DPRINTF(("esp_input: packet replay check for %s\n",
629 * Update replay sequence number, if appropriate.
631 if (sav->replay) {
637 DPRINTF(("%s: packet replay check for %s\n", __func__,
831 if (sav->replay) {
832 u_int32_t replay; local
835 /* Emulate replay attack when ipsec_replay is TRUE. */
838 sav->replay
[all...]
H A Dxform_ah.c90 * the replay counter; the new protocol always includes the counter.
193 * Verify the replay state block allocation is consistent with
197 /* NB: replay state is setup elsewhere (sigh) */
198 if (((sav->flags&SADB_X_EXT_OLD) == 0) ^ (sav->replay != NULL)) {
199 DPRINTF(("ah_init: replay state block inconsistency, "
200 "%s algorithm %s replay state\n",
202 sav->replay == NULL ? "without" : "with"));
663 /* Check replay window, if applicable. */
664 if (sav->replay && !ipsec_chkreplay(ntohl(ah->ah_seq), sav)) {
666 DPRINTF(("ah_input: packet replay failur
[all...]
H A Dkey_debug.c189 printf("sadb_prop{ replay=%u\n", prop->sadb_prop_replay);
320 printf("sadb_sa{ spi=%u replay=%u state=%u\n",
566 if (sav->replay != NULL)
567 kdebug_secreplay(sav->replay);
H A Dkey.c3064 if (sav->replay != NULL) {
3065 KFREE(sav->replay);
3066 sav->replay = NULL;
3193 sav->replay = NULL;
3224 /* replay window */
3226 sav->replay = (struct secreplay *)
3228 if (sav->replay == NULL) {
3234 sav->replay->bitmap = (char*)(sav->replay+1);
3235 sav->replay
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/cpl/trousers/dist/src/tspi/
H A Dtspi_transport.c61 memcpy(signInfo.replay.nonce, pValidationData->rgbExternalData, sizeof(TPM_NONCE));
64 (BYTE **)&signInfo.replay.nonce)))
H A Dtspi_audit.c204 signInfo.replay = antiReplay;
H A Dobj_context.c1345 result |= Trspi_Hash_NONCE(&hashCtx, signInfo->replay.nonce);
1361 if ((result = RPC_ReleaseTransportSigned(tspContext, tcsKey, &signInfo->replay, pAuth,
1396 result |= Trspi_Hash_NONCE(&hashCtx, signInfo->replay.nonce);
/netbsd-6-1-5-RELEASE/sys/netinet6/
H A Dah_output.c160 if ((sav->flags & SADB_X_EXT_OLD) == 0 && !sav->replay) {
163 "sav->replay is null: %x->%x, SPI=%u\n",
248 if (sav->replay->count == ~0) {
252 "replay counter overflowed. %s\n",
259 sav->replay->count++;
264 ahdr->ah_seq = htonl(sav->replay->count & 0xffffffff);
414 if ((sav->flags & SADB_X_EXT_OLD) == 0 && !sav->replay) {
416 "sav->replay is null: SPI=%u\n",
457 if (sav->replay->count == ~0) {
461 "replay counte
[all...]
H A Desp_output.c137 if (aalgo && sav->replay && sav->key_auth)
240 if ((sav->flags & SADB_X_EXT_OLD) == 0 && !sav->replay) {
249 "sav->replay is null: %x->%x, SPI=%u\n",
260 "sav->replay is null: SPI=%u\n",
435 if (sav->replay->count == ~0) {
439 "replay counter overflowed. %s\n",
446 sav->replay->count++;
451 nesp->esp_seq = htonl(sav->replay->count & 0xffffffff);
598 if (!sav->replay)
H A Dipsec.c2247 * Check the variable replay window.
2248 * ipsec_chkreplay() performs replay check before ICV verification.
2249 * ipsec_updatereplay() updates replay bitmap. This must be called after
2250 * ICV verification (it also performs replay check, which is usually done
2261 const struct secreplay *replay; local
2271 replay = sav->replay;
2273 if (replay->wsize == 0)
2274 return 1; /* no need to check replay. */
2277 frlast = replay
2319 struct secreplay *replay; local
[all...]
H A Dah_input.c249 if ((sav->flags & SADB_X_EXT_OLD) == 0 && sav->replay) {
255 "replay packet in IPv4 AH input: %s %s\n",
366 if ((sav->flags & SADB_X_EXT_OLD) == 0 && sav->replay) {
692 if ((sav->flags & SADB_X_EXT_OLD) == 0 && sav->replay) {
698 "replay packet in IPv6 AH input: %s %s\n",
785 if ((sav->flags & SADB_X_EXT_OLD) == 0 && sav->replay) {
H A Desp_input.c204 if (!((sav->flags & SADB_X_EXT_OLD) == 0 && sav->replay &&
220 "replay packet in IPv4 ESP input: %s %s\n",
279 if ((sav->flags & SADB_X_EXT_OLD) == 0 && sav->replay) {
620 if (!((sav->flags & SADB_X_EXT_OLD) == 0 && sav->replay &&
636 "replay packet in IPv6 ESP input: %s %s\n",
692 if ((sav->flags & SADB_X_EXT_OLD) == 0 && sav->replay) {
/netbsd-6-1-5-RELEASE/sys/netkey/
H A Dkeydb.h97 struct secreplay *replay; /* replay prevention */ member in struct:secasvar
117 /* replay prevention */
H A Dkey_debug.c282 printf("sadb_prop{ replay=%u\n", prop->sadb_prop_replay);
413 printf("sadb_sa{ spi=%u replay=%u state=%u\n",
681 if (sav->replay != NULL)
682 kdebug_secreplay(sav->replay);
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/tests/db/
H A Dadd-modify-delete.in119 echo "check iprop replay"
127 ${iproplog} replay > /dev/null || exit 1
/netbsd-6-1-5-RELEASE/games/gomoku/
H A Dmain.c323 replay:
335 goto replay;
341 goto replay;
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kdc/
H A DNTMakefile46 NOINST_PROGRAMS=$(OBJ)\kdc-replay.exe
/netbsd-6-1-5-RELEASE/sbin/route/
H A Droute.c1755 struct ieee80211_replay_event replay; member in union:__anon5496
1822 evlen = sizeof(ev.replay);
1823 printf("replay");
1845 PRIETHER_ARGS(ev.replay.iev_src),
1846 PRIETHER_ARGS(ev.replay.iev_dst),
1847 ev.replay.iev_cipher,
1848 ev.replay.iev_keyix);
1852 ev.replay.iev_keyrsc, ev.replay.iev_rsc);
/netbsd-6-1-5-RELEASE/crypto/dist/ipsec-tools/src/libipsec/
H A Dkey_debug.c243 printf("sadb_prop{ replay=%u\n", prop->sadb_prop_replay);
378 printf("sadb_sa{ spi=%u replay=%u state=%u\n",
752 if (sav->replay != NULL)
753 kdebug_secreplay(sav->replay);
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/krb5/
H A DNTMakefile127 $(OBJ)\replay.obj \
272 replay.c \
/netbsd-6-1-5-RELEASE/dist/nvi/vi/
H A Dv_txt.c268 size_t rcol; /* 0-N: insert offset in the replay buffer. */
439 * can change between the insert and the replay.
451 * error messages during the replay. Otherwise, when the user enters
479 goto replay;
536 * If the first character of the input is a nul, replay the previous
537 * input. (Historically, it's okay to replay non-existent input.)
548 goto replay;
594 /* Check to see if the character fits into the replay buffers. */
601 replay: if (LF_ISSET(TXT_REPLAY)) {
699 * replay character
[all...]

Completed in 260 milliseconds

12