/netbsd/external/gpl3/gdb/dist/gdb/ |
H A D | record-btrace.c | 893 replay = btinfo->replay; in insn_history() 1247 replay = btinfo->replay; in call_history() 1548 replay = tp->btrace.replay; in fetch_registers() 1794 replay = tp->btrace.replay; in record_btrace_frame_sniffer() 1796 bfun = &replay->btinfo->functions[replay->call_index]; in record_btrace_frame_sniffer() 2030 replay = NULL; in record_btrace_start_replaying() 2072 btinfo->replay = replay; in record_btrace_start_replaying() 2124 replay = btinfo->replay; in record_btrace_stop_replaying_at_end() 2336 replay = btinfo->replay; in record_btrace_replay_at_breakpoint() 2358 replay = btinfo->replay; in record_btrace_single_step_forward() [all …]
|
/netbsd/external/gpl3/gdb.old/dist/gdb/ |
H A D | record-btrace.c | 893 replay = btinfo->replay; in insn_history() 1247 replay = btinfo->replay; in call_history() 1548 replay = tp->btrace.replay; in fetch_registers() 1794 replay = tp->btrace.replay; in record_btrace_frame_sniffer() 1796 bfun = &replay->btinfo->functions[replay->call_index]; in record_btrace_frame_sniffer() 2030 replay = NULL; in record_btrace_start_replaying() 2072 btinfo->replay = replay; in record_btrace_start_replaying() 2124 replay = btinfo->replay; in record_btrace_stop_replaying_at_end() 2336 replay = btinfo->replay; in record_btrace_replay_at_breakpoint() 2358 replay = btinfo->replay; in record_btrace_single_step_forward() [all …]
|
/netbsd/sys/netipsec/ |
H A D | ipsec.c | 1593 replay = sav->replay; in ipsec_chkreplay() 1595 if (replay->wsize == 0) in ipsec_chkreplay() 1607 if (replay->count == 0) in ipsec_chkreplay() 1649 replay = sav->replay; in ipsec_updatereplay() 1651 if (replay->wsize == 0) in ipsec_updatereplay() 1664 replay->lastseq = seq; in ipsec_updatereplay() 1665 memset(replay->bitmap, 0, replay->wsize); in ipsec_updatereplay() 1678 vshiftl(replay->bitmap, diff, replay->wsize); in ipsec_updatereplay() 1682 memset(replay->bitmap, 0, replay->wsize); in ipsec_updatereplay() 1713 replay->overflow++; in ipsec_updatereplay() [all …]
|
H A D | xform_esp.c | 160 if (sav->tdb_authalgxform != NULL && sav->replay) in esp_hdrsiz() 363 if (esph && sav->replay && !ipsec_chkreplay(ntohl(esp->esp_seq), sav)) { in esp_input() 595 if (sav->replay) { in esp_input_cb() 785 if (sav->replay) { in esp_output() 786 uint32_t replay; in esp_output() local 791 replay = htonl(sav->replay->count); in esp_output() 794 replay = htonl(atomic_inc_32_nv(&sav->replay->count)); in esp_output() 796 memcpy(mtod(mo,char *) + roff + sizeof(uint32_t), &replay, in esp_output()
|
H A D | xform_ah.c | 214 if (((sav->flags&SADB_X_EXT_OLD) == 0) ^ (sav->replay != NULL)) { in ah_init0() 218 sav->replay == NULL ? "without" : "with"); in ah_init0() 553 if (sav->replay && !ipsec_chkreplay(ntohl(ah->ah_seq), sav)) { in ah_input() 833 if (sav->replay) { in ah_input_cb() 990 if (sav->replay) { in ah_output() 991 if (sav->replay->count == ~0 && in ah_output() 1004 sav->replay->count++; in ah_output() 1005 ah->ah_seq = htonl(sav->replay->count); in ah_output()
|
H A D | keydb.h | 116 struct secreplay *replay; /* replay prevention */ member
|
/netbsd/external/bsd/dhcpcd/dist/src/ |
H A D | auth.c | 82 state->replay = 0; in dhcp_auth_reset() 110 uint64_t replay; in dhcp_auth_validate() local 118 if (dlen < 3 + sizeof(replay)) { in dhcp_auth_validate() 161 memcpy(&replay, d, sizeof(replay)); in dhcp_auth_validate() 162 replay = ntohll(replay); in dhcp_auth_validate() 180 if (state->token && state->replay != 0) { in dhcp_auth_validate() 181 if (state->replay == (replay ^ 0x8000000000000000ULL)) { in dhcp_auth_validate() 187 if ((uint64_t)(replay - state->replay) <= 0) { in dhcp_auth_validate() 193 d+= sizeof(replay); in dhcp_auth_validate() 194 dlen -= sizeof(replay); in dhcp_auth_validate() [all …]
|
H A D | auth.h | 81 uint64_t replay; member
|
/netbsd/crypto/external/bsd/heimdal/dist/lib/krb5/ |
H A D | krb5_err.et | 47 error_code ERR_REPEAT, "Request is a replay" 170 error_code KRB5_RC_MALLOC, "No more memory to allocate (in replay cache code)" 173 error_code KRB5_RC_REPLAY, "Message is a replay" 178 error_code KRB5_RC_IO_EOF, "End-of-file on replay cache I/O" 179 error_code KRB5_RC_IO_MALLOC, "No more memory to allocate (in replay cache I/O code)" 180 error_code KRB5_RC_IO_PERM, "Permission denied in replay cache code" 181 error_code KRB5_RC_IO_IO, "I/O error in replay cache i/o code" 183 error_code KRB5_RC_IO_SPACE, "Insufficient system space to store replay information" 242 error_code KRB5_RCACHE_BADVNO, "Unsupported replay cache format version number" 250 error_code KRB5_RC_REQUIRED, "Message replay detection requires rcache parameter"
|
/netbsd/crypto/external/bsd/heimdal/dist/tests/can/ |
H A D | test_can.in | 54 replay="${TESTS_ENVIRONMENT} ../../kdc/kdc-replay" 77 ${replay} ${srcdir}/${tst}.req || { cat messages.log ; exit 1; }
|
/netbsd/crypto/external/bsd/openssl.old/dist/doc/man3/ |
H A D | SSL_read_early_data.pod | 69 additional considerations around replay attacks (see L<REPLAY PROTECTION> 206 early data setting for a server is nonzero then replay protection is 239 in which case this callback will not get called. Notably, the built-in replay 289 server is configured with a nonzero max early data value. With replay 296 The replay protection mechanism relies on the internal OpenSSL server session 297 cache (see L<SSL_CTX_set_session_cache_mode(3)>). When replay protection is 311 result in an application becoming vulnerable to replay attacks. Note that 317 the possibility of replay attacks. 319 The OpenSSL replay protection does not apply to external Pre Shared Keys (PSKs) 323 Some applications may mitigate the replay risks in other ways. For those [all …]
|
H A D | SSL_CTX_set_options.pod | 232 OpenSSL will switch on replay protection. See L<SSL_read_early_data(3)> for a 233 description of the replay protection feature. Anti-replay measures are required 235 mitigate the replay risks in other ways and in such cases the built in OpenSSL
|
/netbsd/crypto/external/bsd/openssl/dist/doc/man3/ |
H A D | SSL_read_early_data.pod | 69 additional considerations around replay attacks (see L</REPLAY PROTECTION> 206 early data setting for a server is nonzero then replay protection is 239 in which case this callback will not get called. Notably, the built-in replay 289 server is configured with a nonzero max early data value. With replay 296 The replay protection mechanism relies on the internal OpenSSL server session 297 cache (see L<SSL_CTX_set_session_cache_mode(3)>). When replay protection is 311 result in an application becoming vulnerable to replay attacks. Note that 317 the possibility of replay attacks. 319 The OpenSSL replay protection does not apply to external Pre Shared Keys (PSKs) 323 Some applications may mitigate the replay risks in other ways. For those [all …]
|
/netbsd/sys/external/bsd/drm2/dist/drm/nouveau/nvkm/subdev/mmu/ |
H A D | nouveau_nvkm_subdev_mmu_vmmgp100.c | 499 if (vmm->replay) { in gp100_vmm_join() 537 bool replay; in gp100_vmm_new_() local 540 replay = args->v0.fault_replay != 0; in gp100_vmm_new_() 543 replay = false; in gp100_vmm_new_() 551 (*pvmm)->replay = replay; in gp100_vmm_new_()
|
/netbsd/crypto/external/cpl/trousers/dist/src/tspi/ |
H A D | tspi_transport.c | 61 memcpy(signInfo.replay.nonce, pValidationData->rgbExternalData, sizeof(TPM_NONCE)); in Tspi_Context_CloseSignTransport() 64 (BYTE **)&signInfo.replay.nonce))) in Tspi_Context_CloseSignTransport()
|
/netbsd/crypto/external/bsd/heimdal/dist/po/heim_com_err-1765328384/ |
H A D | sv_SE.po | 187 msgid "Request is a replay" 589 msgid "No more memory to allocate (in replay cache code)" 604 msgid "Message is a replay" 624 msgid "End-of-file on replay cache I/O" 629 msgid "No more memory to allocate (in replay cache I/O code)" 634 msgid "Permission denied in replay cache code" 639 msgid "I/O error in replay cache i/o code" 649 msgid "Insufficient system space to store replay information" 844 msgid "Unsupported replay cache format version number" 864 msgid "Message replay detection requires rcache parameter"
|
H A D | heim_com_err-1765328384.pot | 186 msgid "Request is a replay" 588 msgid "No more memory to allocate (in replay cache code)" 603 msgid "Message is a replay" 623 msgid "End-of-file on replay cache I/O" 628 msgid "No more memory to allocate (in replay cache I/O code)" 633 msgid "Permission denied in replay cache code" 638 msgid "I/O error in replay cache i/o code" 648 msgid "Insufficient system space to store replay information" 843 msgid "Unsupported replay cache format version number" 863 msgid "Message replay detection requires rcache parameter"
|
/netbsd/crypto/external/bsd/heimdal/dist/lib/kadm5/ |
H A D | iprop-commands.in | 107 name = "replay" 111 help = "start replay with this version" 118 help = "end replay with this version"
|
/netbsd/external/bsd/unbound/dist/testdata/03-testbound.tdir/ |
H A D | 03-testbound.dsc | 3 Description: Run testbound event replay scenarios.
|
/netbsd/sbin/route/ |
H A D | route.c | 1350 struct ieee80211_replay_event replay; in print_rtmsg() member 1431 evlen = sizeof(ev.replay); in print_rtmsg() 1454 PRIETHER_ARGS(ev.replay.iev_src), in print_rtmsg() 1455 PRIETHER_ARGS(ev.replay.iev_dst), in print_rtmsg() 1456 ev.replay.iev_cipher, in print_rtmsg() 1457 ev.replay.iev_keyix); in print_rtmsg() 1461 ev.replay.iev_keyrsc, ev.replay.iev_rsc); in print_rtmsg()
|
/netbsd/external/mpl/bind/dist/bin/dnssec/ |
H A D | dnssec-cds.rst | 48 For protection against replay attacks, the signatures on the child 98 To protect against replay attacks, child records are rejected if they 118 To protect against replay attacks, the modification time of the 190 validate the parent DS records, and it maintains the replay attack
|
/netbsd/crypto/external/bsd/heimdal/dist/kdc/ |
H A D | Makefile.in | 103 noinst_PROGRAMS = kdc-replay$(EXEEXT) kdc-tester$(EXEEXT) 247 kdc_replay_SOURCES = kdc-replay.c 248 kdc_replay_OBJECTS = kdc-replay.$(OBJEXT) 291 ./$(DEPDIR)/kdc-replay.Po ./$(DEPDIR)/kdc-tester.Po \ 319 $(hprop_SOURCES) $(hpropd_SOURCES) $(kdc_SOURCES) kdc-replay.c \ 322 $(hprop_SOURCES) $(hpropd_SOURCES) $(kdc_SOURCES) kdc-replay.c \ 971 kdc-replay$(EXEEXT): $(kdc_replay_OBJECTS) $(kdc_replay_DEPENDENCIES) $(EXTRA_kdc_replay_DEPENDENCI… 972 @rm -f kdc-replay$(EXEEXT) 1004 @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/kdc-replay.Po@am__quote@ # am--include-marker 1344 -rm -f ./$(DEPDIR)/kdc-replay.Po [all …]
|
/netbsd/external/bsd/wpa/dist/wpa_supplicant/doc/docbook/ |
H A D | wpa_background.sgml | 40 makes attacks easier, there is no replay protection, and non-keyed 48 per-packet RC4 keys. In addition, it implements replay protection,
|
/netbsd/crypto/external/bsd/heimdal/dist/tests/db/ |
H A D | add-modify-delete.in | 130 ${iproplog} replay > /dev/null || exit 1
|
/netbsd/sys/external/bsd/drm2/dist/drm/nouveau/include/nvkm/subdev/ |
H A D | mmu.h | 60 bool replay; member
|