• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/aMule-2.3.1/src/kademlia/net/

Lines Matching refs:opcode

48 void CPacketTracking::AddTrackedOutPacket(uint32_t ip, uint8_t opcode)
52 if (!IsTrackedOutListRequestPacket(opcode)) {
56 TrackPackets_Struct track = { ip, now, opcode };
67 bool CPacketTracking::IsTrackedOutListRequestPacket(uint8_t opcode) throw()
69 switch (opcode) {
89 bool CPacketTracking::IsOnOutTrackList(uint32_t ip, uint8_t opcode, bool dontRemove)
92 if (!IsTrackedOutListRequestPacket(opcode)) {
98 if (it->ip == ip && it->opcode == opcode && now - it->inserted < SEC2MS(180)) {
108 bool CPacketTracking::InTrackListIsAllowedPacket(uint32_t ip, uint8_t opcode, bool /*bValidSenderkey*/)
119 DEBUG_ONLY( const uint8_t dbgOrgOpcode = opcode; )
121 switch (opcode) {
150 opcode = KADEMLIA_FIREWALLED_REQ;
189 if (it->m_opcode == opcode) {
190 // already tracked requests with this opcode, remove already expired request counts
214 AddDebugLogLineN(logKadPacketTracking, CFormat(wxT("Massive request flood detected for opcode 0x%X (0x%X) from IP %s - Banning IP")) % opcode % dbgOrgOpcode % KadIPToString(ip));
221 AddDebugLogLineN(logKadPacketTracking, CFormat(wxT("Request flood detected for opcode 0x%X (0x%X) from IP %s - Dropping packets with this opcode")) % opcode % dbgOrgOpcode % KadIPToString(ip));
233 curTrackedRequest.m_opcode = opcode;
258 void CPacketTracking::AddLegacyChallenge(const CUInt128& contactID, const CUInt128& challengeID, uint32_t ip, uint8_t opcode)
261 TrackChallenge_Struct sTrack = { ip, now, opcode, contactID, challengeID };
273 bool CPacketTracking::IsLegacyChallenge(const CUInt128& challengeID, uint32_t ip, uint8_t opcode, CUInt128& contactID)
279 if (it2->ip == ip && it2->opcode == opcode && now - it2->inserted < SEC2MS(180)) {
280 wxASSERT(it2->challenge != 0 || opcode == KADEMLIA2_PING);