/netgear-R7000-V1.0.7.12_1.2.5/src/router/iptables-1.x/include/libipq/ |
H A D | libipq.h | 57 struct sockaddr_nl peer; member in struct:ipq_handle
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/l2tpd-0.69/ |
H A D | network.c | 261 (struct sockaddr *) &buf->peer, sizeof (buf->peer)); 460 buf->peer = from; 491 recycle_payload (buf, sc->container->peer); 530 recycle_payload (buf, sc->container->peer);
|
H A D | control.c | 100 tmp->peer = t->peer; 108 inline void recycle_outgoing (struct buffer *buf, struct sockaddr_in peer) argument 114 buf->peer = peer; 181 recycle_outgoing (buf, t->peer); 267 challenge the peer, but we can't predict the response yet 381 "%s: Denied connection to unauthorized peer %s\n", 382 __FUNCTION__, IPADDY (t->peer.sin_addr)); 425 (y->peer [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/transmission/transmission-2.73/libtransmission/ |
H A D | tr-lpd.c | 52 #include "peer-mgr.h" /* tr_peerMgrAddPex() */ 432 * peer pool for torrent t. 479 * @brief Process incoming unsolicited messages and add the peer to the announced 482 * @param[in,out] peer Adress information of the peer to add 484 * @return Returns 0 if any input parameter or the announce was invalid, 1 if the peer 486 * the peer in/out parameter. 488 * @note The port information gets added to the peer structure if tr_lpdConsiderAnnounce 492 static int tr_lpdConsiderAnnounce( tr_pex* peer, const char* const msg ) argument 505 if( peer ! [all...] |
H A D | Makefile.in | 59 peer-msgs-test$(EXEEXT) rpc-test$(EXEEXT) \ 60 test-peer-id$(EXEEXT) utils-test$(EXEEXT) 96 peer-io.$(OBJEXT) peer-mgr.$(OBJEXT) peer-msgs.$(OBJEXT) \ 110 peer-msgs-test$(EXEEXT) rpc-test$(EXEEXT) \ 111 test-peer-id$(EXEEXT) utils-test$(EXEEXT) 160 am_peer_msgs_test_OBJECTS = peer-msgs-test.$(OBJEXT) 173 am_test_peer_id_OBJECTS = test-peer-id.$(OBJEXT) 461 peer [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/isdn/mISDN/ |
H A D | stack.c | 399 dev->teimgr->peer = &newst->own; 404 dev->D.peer = &newst->own; 446 ch->peer = &dev->D.st->own; 487 ch->peer = rq.ch; 489 rq.ch->peer = ch; 502 ch->peer = rq2.ch; 512 rq2.ch->peer = rq.ch; 514 rq.ch->peer = rq2.ch; 544 ch->peer = &dev->D.st->own; 561 rq.ch->peer [all...] |
H A D | hwchannel.c | 31 if (likely(dch->dev.D.peer)) { 32 err = dch->dev.D.recv(dch->dev.D.peer, skb); 55 if (likely(bch->ch.peer)) { 56 err = bch->ch.recv(bch->ch.peer, skb); 330 if (ch->peer) { 334 if (!ch->recv(ch->peer, skb))
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/ |
H A D | s_client.c | 191 BIO_printf(bio_err," -verify depth - turn on peer certificate verification\n"); 290 struct sockaddr peer; local 291 int peerlen = sizeof(peer); 663 if (getsockname(s, &peer, (void *)&peerlen) < 0) 671 BIO_ctrl_set_connected(sbio, 1, &peer); 1179 X509 *peer=NULL; local 1216 peer=SSL_get_peer_certificate(s); 1217 if (peer != NULL) 1221 PEM_write_bio_X509(bio,peer); 1222 X509_NAME_oneline(X509_get_subject_name(peer), [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/ipv4/ |
H A D | tcp_ipv4.c | 132 and use initial timestamp retrieved from peer table. 205 struct inet_peer *peer = rt_get_peer(rt); local 208 * the destination in peer table, when entering state 212 if (peer) { 213 inet_peer_refcheck(peer); 214 if ((u32)get_seconds() - peer->tcp_ts_stamp <= TCP_PAWS_MSL) { 215 tp->rx_opt.ts_recent_stamp = peer->tcp_ts_stamp; 216 tp->rx_opt.ts_recent = peer->tcp_ts; 1246 * limitations, they conserve resources and peer is 1339 struct inet_peer *peer local 1777 struct inet_peer *peer = NULL; local 1807 struct inet_peer *peer = inet_getpeer(tw->tw_daddr, 1); local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/transmission/transmission-2.73/gtk/ |
H A D | details.c | 416 torrent_set_int( di, "peer-limit", gtk_spin_button_get_value( s ) ); 1152 G_TYPE_INT, /* # blocks cancelled by peer int */ 1153 G_TYPE_STRING, /* # blocks cancelled by peer string */ 1164 const tr_peer_stat * peer ) 1168 const char * client = peer->client; 1173 if( sscanf( peer->addr, "%d.%d.%d.%d", q, q+1, q+2, q+3 ) != 4 ) 1174 g_strlcpy( collated_name, peer->addr, sizeof( collated_name ) ); 1180 PEER_COL_ADDRESS, peer->addr, 1183 PEER_COL_ENCRYPTION_STOCK_ID, peer->isEncrypted ? "transmission-lock" : NULL, 1192 const tr_peer_stat * peer ) [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | ssl_asn1.c | 289 if (in->peer != NULL) 290 M_ASN1_I2D_len_EXP_opt(in->peer, i2d_X509, 3, v3); 342 if (in->peer != NULL) 343 M_ASN1_I2D_put_EXP_opt(in->peer, i2d_X509, 3, v3); 516 if (ret->peer != NULL) { 517 X509_free(ret->peer); 518 ret->peer = NULL; 520 M_ASN1_D2I_get_EXP_opt(ret->peer, d2i_X509, 3);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/include/wx/mac/carbon/private/ |
H A D | mactext.h | 21 wxMacTextControl( wxTextCtrl *peer ) ; 102 virtual void CreateControl( wxTextCtrl* peer, const Rect* bounds, CFStringRef cfr );
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/ |
H A D | drbd.h | 202 D_FAILED, /* Becomes D_DISKLESS as soon as we told it the peer */ 204 D_NEGOTIATING, /* Late attaching state, we need to talk to the peer */ 207 D_UNKNOWN, /* Only used for the peer, never for myself */ 225 unsigned peer:2 ; /* 3/4 primary/secondary/unknown */ member in struct:drbd_state::__anon17328 243 unsigned peer:2 ; /* 3/4 primary/secondary/unknown */
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | ssl_asn1.c | 289 if (in->peer != NULL) 290 M_ASN1_I2D_len_EXP_opt(in->peer, i2d_X509, 3, v3); 342 if (in->peer != NULL) 343 M_ASN1_I2D_put_EXP_opt(in->peer, i2d_X509, 3, v3); 516 if (ret->peer != NULL) { 517 X509_free(ret->peer); 518 ret->peer = NULL; 520 M_ASN1_D2I_get_EXP_opt(ret->peer, d2i_X509, 3);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/zebra/bgpd/ |
H A D | bgp_debug.c | 160 bgp_dump_attr (struct peer *peer, struct attr *attr, char *buf, size_t size) argument 187 if (peer_sort (peer) == BGP_PEER_IBGP) 227 bgp_notify_print(struct peer *peer, struct bgp_notify *bgp_notify, char *direct) argument 258 plog_info (peer->log, "%s %s NOTIFICATION %d/%d (%s%s) %d bytes %s", 259 peer ? peer->host : "",
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/ide/ |
H A D | amd74xx.c | 85 ide_drive_t *peer = ide_get_pair_dev(drive); local 96 if (peer) { 97 ide_timing_compute(peer, peer->pio_mode, &p, T, UT);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/rxrpc/ |
H A D | ar-ack.c | 285 * - these indicate packets the peer has or has not received, but hasn't yet 556 struct rxrpc_peer *peer; local 571 peer = call->conn->trans->peer; 572 if (mtu < peer->maxdata) { 573 spin_lock_bh(&peer->lock); 574 peer->maxdata = mtu; 575 peer->mtu = mtu + peer->hdrsize; 576 spin_unlock_bh(&peer [all...] |
H A D | ar-accept.c | 70 * accept an incoming call that needs peer, transport and/or connection setting 81 struct rxrpc_peer *peer; local 100 peer = rxrpc_get_peer(srx, GFP_NOIO); 101 if (IS_ERR(peer)) { 102 _debug("no peer"); 107 trans = rxrpc_get_transport(local, peer, GFP_NOIO); 108 rxrpc_put_peer(peer); 204 * accept incoming calls that need peer, transport and/or connection setting up
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/src/mac/carbon/ |
H A D | checklst.cpp | 39 wxMacDataBrowserCheckListControl( wxListBox *peer, const wxPoint& pos, const wxSize& size, long style ); 137 wxMacDataBrowserCheckListControl::wxMacDataBrowserCheckListControl( wxListBox *peer, const wxPoint& pos, const wxSize& size, long style) argument 138 : wxMacDataBrowserListControl( peer, pos, size, style )
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/block/drbd/ |
H A D | drbd_receiver.c | 547 dev_info(DEV, "sock was reset by peer\n"); 552 dev_info(DEV, "sock was shut down by peer\n"); 555 /* signal came in, or peer/link went down, 635 /* connect may fail, peer not yet available. 653 /* peer not (yet) available, network problem */ 766 * -1 peer talks different language, 909 dev_err(DEV, "Authentication of peer failed\n"); 912 dev_err(DEV, "Authentication of peer failed, trying again.\n"); 1169 * side than those of the sending peer, we may need to submit the 1382 /* even though we trust out peer, 2169 int self, peer, rv = -100; local 2241 int self, peer, hg, rv = -100; local 2291 int self, peer, hg, rv = -100; local 2360 u64 self, peer; local 2676 cmp_after_sb(enum drbd_after_sb_p peer, enum drbd_after_sb_p self) argument 2924 drbd_setup_order_type(struct drbd_conf *mdev, int peer) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/ |
H A D | pkeyutl.c | 228 BIO_puts(bio_err, "Error setting up peer key\n"); 505 EVP_PKEY *peer = NULL; local 511 peer = load_pubkey(bio_err, file, peerform, 0, NULL, engine, "Peer Key"); 513 if (!peer) { 514 BIO_printf(bio_err, "Error reading peer key %s\n", file); 519 ret = EVP_PKEY_derive_set_peer(ctx, peer); 521 EVP_PKEY_free(peer);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/ |
H A D | pkeyutl.c | 228 BIO_puts(bio_err, "Error setting up peer key\n"); 505 EVP_PKEY *peer = NULL; local 511 peer = load_pubkey(bio_err, file, peerform, 0, NULL, engine, "Peer Key"); 513 if (!peer) { 514 BIO_printf(bio_err, "Error reading peer key %s\n", file); 519 ret = EVP_PKEY_derive_set_peer(ctx, peer); 521 EVP_PKEY_free(peer);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/ata/ |
H A D | pata_atp867x.c | 217 struct ata_device *peer = ata_dev_pair(adev); local 228 if (peer && peer->pio_mode) { 229 ata_timing_compute(peer, peer->pio_mode, &p, T, UT);
|
H A D | pata_amd.c | 50 struct ata_device *peer = ata_dev_pair(adev); local 67 if (peer) { 69 if (peer->dma_mode) { 70 ata_timing_compute(peer, peer->dma_mode, &apeer, T, UT); 73 ata_timing_compute(peer, peer->pio_mode, &apeer, T, UT);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/transmission/transmission-2.73/web/javascript/ |
H A D | inspector.js | 587 var i, k, tor, peers, peer, parity, 614 for (i=0; peer=peers[i]; ++i) { 617 '<td>', (peer.isEncrypted ? '<div class="encrypted-peer-cell" title="Encrypted Connection">' 618 : '<div class="unencrypted-peer-cell">'), '</div>', '</td>', 619 '<td>', (peer.rateToPeer ? fmt.speedBps(peer.rateToPeer) : ''), '</td>', 620 '<td>', (peer.rateToClient ? fmt.speedBps(peer.rateToClient) : ''), '</td>', 621 '<td class="percentCol">', Math.floor(peer [all...] |