Searched refs:peer (Results 101 - 125 of 323) sorted by relevance

1234567891011>>

/netgear-R7000-V1.0.7.12_1.2.5/src/router/iptables-1.x/include/libipq/
H A Dlibipq.h57 struct sockaddr_nl peer; member in struct:ipq_handle
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/l2tpd-0.69/
H A Dnetwork.c261 (struct sockaddr *) &buf->peer, sizeof (buf->peer));
460 buf->peer = from;
491 recycle_payload (buf, sc->container->peer);
530 recycle_payload (buf, sc->container->peer);
H A Dcontrol.c100 tmp->peer = t->peer;
108 inline void recycle_outgoing (struct buffer *buf, struct sockaddr_in peer) argument
114 buf->peer = peer;
181 recycle_outgoing (buf, t->peer);
267 challenge the peer, but we can't predict the response yet
381 "%s: Denied connection to unauthorized peer %s\n",
382 __FUNCTION__, IPADDY (t->peer.sin_addr));
425 (y->peer
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/transmission/transmission-2.73/libtransmission/
H A Dtr-lpd.c52 #include "peer-mgr.h" /* tr_peerMgrAddPex() */
432 * peer pool for torrent t.
479 * @brief Process incoming unsolicited messages and add the peer to the announced
482 * @param[in,out] peer Adress information of the peer to add
484 * @return Returns 0 if any input parameter or the announce was invalid, 1 if the peer
486 * the peer in/out parameter.
488 * @note The port information gets added to the peer structure if tr_lpdConsiderAnnounce
492 static int tr_lpdConsiderAnnounce( tr_pex* peer, const char* const msg ) argument
505 if( peer !
[all...]
H A DMakefile.in59 peer-msgs-test$(EXEEXT) rpc-test$(EXEEXT) \
60 test-peer-id$(EXEEXT) utils-test$(EXEEXT)
96 peer-io.$(OBJEXT) peer-mgr.$(OBJEXT) peer-msgs.$(OBJEXT) \
110 peer-msgs-test$(EXEEXT) rpc-test$(EXEEXT) \
111 test-peer-id$(EXEEXT) utils-test$(EXEEXT)
160 am_peer_msgs_test_OBJECTS = peer-msgs-test.$(OBJEXT)
173 am_test_peer_id_OBJECTS = test-peer-id.$(OBJEXT)
461 peer
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/isdn/mISDN/
H A Dstack.c399 dev->teimgr->peer = &newst->own;
404 dev->D.peer = &newst->own;
446 ch->peer = &dev->D.st->own;
487 ch->peer = rq.ch;
489 rq.ch->peer = ch;
502 ch->peer = rq2.ch;
512 rq2.ch->peer = rq.ch;
514 rq.ch->peer = rq2.ch;
544 ch->peer = &dev->D.st->own;
561 rq.ch->peer
[all...]
H A Dhwchannel.c31 if (likely(dch->dev.D.peer)) {
32 err = dch->dev.D.recv(dch->dev.D.peer, skb);
55 if (likely(bch->ch.peer)) {
56 err = bch->ch.recv(bch->ch.peer, skb);
330 if (ch->peer) {
334 if (!ch->recv(ch->peer, skb))
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/
H A Ds_client.c191 BIO_printf(bio_err," -verify depth - turn on peer certificate verification\n");
290 struct sockaddr peer; local
291 int peerlen = sizeof(peer);
663 if (getsockname(s, &peer, (void *)&peerlen) < 0)
671 BIO_ctrl_set_connected(sbio, 1, &peer);
1179 X509 *peer=NULL; local
1216 peer=SSL_get_peer_certificate(s);
1217 if (peer != NULL)
1221 PEM_write_bio_X509(bio,peer);
1222 X509_NAME_oneline(X509_get_subject_name(peer),
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/ipv4/
H A Dtcp_ipv4.c132 and use initial timestamp retrieved from peer table.
205 struct inet_peer *peer = rt_get_peer(rt); local
208 * the destination in peer table, when entering state
212 if (peer) {
213 inet_peer_refcheck(peer);
214 if ((u32)get_seconds() - peer->tcp_ts_stamp <= TCP_PAWS_MSL) {
215 tp->rx_opt.ts_recent_stamp = peer->tcp_ts_stamp;
216 tp->rx_opt.ts_recent = peer->tcp_ts;
1246 * limitations, they conserve resources and peer is
1339 struct inet_peer *peer local
1777 struct inet_peer *peer = NULL; local
1807 struct inet_peer *peer = inet_getpeer(tw->tw_daddr, 1); local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/transmission/transmission-2.73/gtk/
H A Ddetails.c416 torrent_set_int( di, "peer-limit", gtk_spin_button_get_value( s ) );
1152 G_TYPE_INT, /* # blocks cancelled by peer int */
1153 G_TYPE_STRING, /* # blocks cancelled by peer string */
1164 const tr_peer_stat * peer )
1168 const char * client = peer->client;
1173 if( sscanf( peer->addr, "%d.%d.%d.%d", q, q+1, q+2, q+3 ) != 4 )
1174 g_strlcpy( collated_name, peer->addr, sizeof( collated_name ) );
1180 PEER_COL_ADDRESS, peer->addr,
1183 PEER_COL_ENCRYPTION_STOCK_ID, peer->isEncrypted ? "transmission-lock" : NULL,
1192 const tr_peer_stat * peer )
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/
H A Dssl_asn1.c289 if (in->peer != NULL)
290 M_ASN1_I2D_len_EXP_opt(in->peer, i2d_X509, 3, v3);
342 if (in->peer != NULL)
343 M_ASN1_I2D_put_EXP_opt(in->peer, i2d_X509, 3, v3);
516 if (ret->peer != NULL) {
517 X509_free(ret->peer);
518 ret->peer = NULL;
520 M_ASN1_D2I_get_EXP_opt(ret->peer, d2i_X509, 3);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/include/wx/mac/carbon/private/
H A Dmactext.h21 wxMacTextControl( wxTextCtrl *peer ) ;
102 virtual void CreateControl( wxTextCtrl* peer, const Rect* bounds, CFStringRef cfr );
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/
H A Ddrbd.h202 D_FAILED, /* Becomes D_DISKLESS as soon as we told it the peer */
204 D_NEGOTIATING, /* Late attaching state, we need to talk to the peer */
207 D_UNKNOWN, /* Only used for the peer, never for myself */
225 unsigned peer:2 ; /* 3/4 primary/secondary/unknown */ member in struct:drbd_state::__anon17328
243 unsigned peer:2 ; /* 3/4 primary/secondary/unknown */
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/
H A Dssl_asn1.c289 if (in->peer != NULL)
290 M_ASN1_I2D_len_EXP_opt(in->peer, i2d_X509, 3, v3);
342 if (in->peer != NULL)
343 M_ASN1_I2D_put_EXP_opt(in->peer, i2d_X509, 3, v3);
516 if (ret->peer != NULL) {
517 X509_free(ret->peer);
518 ret->peer = NULL;
520 M_ASN1_D2I_get_EXP_opt(ret->peer, d2i_X509, 3);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/zebra/bgpd/
H A Dbgp_debug.c160 bgp_dump_attr (struct peer *peer, struct attr *attr, char *buf, size_t size) argument
187 if (peer_sort (peer) == BGP_PEER_IBGP)
227 bgp_notify_print(struct peer *peer, struct bgp_notify *bgp_notify, char *direct) argument
258 plog_info (peer->log, "%s %s NOTIFICATION %d/%d (%s%s) %d bytes %s",
259 peer ? peer->host : "",
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/ide/
H A Damd74xx.c85 ide_drive_t *peer = ide_get_pair_dev(drive); local
96 if (peer) {
97 ide_timing_compute(peer, peer->pio_mode, &p, T, UT);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/rxrpc/
H A Dar-ack.c285 * - these indicate packets the peer has or has not received, but hasn't yet
556 struct rxrpc_peer *peer; local
571 peer = call->conn->trans->peer;
572 if (mtu < peer->maxdata) {
573 spin_lock_bh(&peer->lock);
574 peer->maxdata = mtu;
575 peer->mtu = mtu + peer->hdrsize;
576 spin_unlock_bh(&peer
[all...]
H A Dar-accept.c70 * accept an incoming call that needs peer, transport and/or connection setting
81 struct rxrpc_peer *peer; local
100 peer = rxrpc_get_peer(srx, GFP_NOIO);
101 if (IS_ERR(peer)) {
102 _debug("no peer");
107 trans = rxrpc_get_transport(local, peer, GFP_NOIO);
108 rxrpc_put_peer(peer);
204 * accept incoming calls that need peer, transport and/or connection setting up
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/src/mac/carbon/
H A Dchecklst.cpp39 wxMacDataBrowserCheckListControl( wxListBox *peer, const wxPoint& pos, const wxSize& size, long style );
137 wxMacDataBrowserCheckListControl::wxMacDataBrowserCheckListControl( wxListBox *peer, const wxPoint& pos, const wxSize& size, long style) argument
138 : wxMacDataBrowserListControl( peer, pos, size, style )
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/block/drbd/
H A Ddrbd_receiver.c547 dev_info(DEV, "sock was reset by peer\n");
552 dev_info(DEV, "sock was shut down by peer\n");
555 /* signal came in, or peer/link went down,
635 /* connect may fail, peer not yet available.
653 /* peer not (yet) available, network problem */
766 * -1 peer talks different language,
909 dev_err(DEV, "Authentication of peer failed\n");
912 dev_err(DEV, "Authentication of peer failed, trying again.\n");
1169 * side than those of the sending peer, we may need to submit the
1382 /* even though we trust out peer,
2169 int self, peer, rv = -100; local
2241 int self, peer, hg, rv = -100; local
2291 int self, peer, hg, rv = -100; local
2360 u64 self, peer; local
2676 cmp_after_sb(enum drbd_after_sb_p peer, enum drbd_after_sb_p self) argument
2924 drbd_setup_order_type(struct drbd_conf *mdev, int peer) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/
H A Dpkeyutl.c228 BIO_puts(bio_err, "Error setting up peer key\n");
505 EVP_PKEY *peer = NULL; local
511 peer = load_pubkey(bio_err, file, peerform, 0, NULL, engine, "Peer Key");
513 if (!peer) {
514 BIO_printf(bio_err, "Error reading peer key %s\n", file);
519 ret = EVP_PKEY_derive_set_peer(ctx, peer);
521 EVP_PKEY_free(peer);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/
H A Dpkeyutl.c228 BIO_puts(bio_err, "Error setting up peer key\n");
505 EVP_PKEY *peer = NULL; local
511 peer = load_pubkey(bio_err, file, peerform, 0, NULL, engine, "Peer Key");
513 if (!peer) {
514 BIO_printf(bio_err, "Error reading peer key %s\n", file);
519 ret = EVP_PKEY_derive_set_peer(ctx, peer);
521 EVP_PKEY_free(peer);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/ata/
H A Dpata_atp867x.c217 struct ata_device *peer = ata_dev_pair(adev); local
228 if (peer && peer->pio_mode) {
229 ata_timing_compute(peer, peer->pio_mode, &p, T, UT);
H A Dpata_amd.c50 struct ata_device *peer = ata_dev_pair(adev); local
67 if (peer) {
69 if (peer->dma_mode) {
70 ata_timing_compute(peer, peer->dma_mode, &apeer, T, UT);
73 ata_timing_compute(peer, peer->pio_mode, &apeer, T, UT);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/transmission/transmission-2.73/web/javascript/
H A Dinspector.js587 var i, k, tor, peers, peer, parity,
614 for (i=0; peer=peers[i]; ++i) {
617 '<td>', (peer.isEncrypted ? '<div class="encrypted-peer-cell" title="Encrypted Connection">'
618 : '<div class="unencrypted-peer-cell">'), '</div>', '</td>',
619 '<td>', (peer.rateToPeer ? fmt.speedBps(peer.rateToPeer) : ''), '</td>',
620 '<td>', (peer.rateToClient ? fmt.speedBps(peer.rateToClient) : ''), '</td>',
621 '<td class="percentCol">', Math.floor(peer
[all...]

Completed in 310 milliseconds

1234567891011>>