/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/transmission/transmission-2.73/libtransmission/ |
H A D | webseed.c | 23 #include "peer-mgr.h" 555 tr_peer * peer = &w->parent; local 559 tr_peerConstruct( peer ); 560 peer->peerIsChoked = true; 561 peer->clientIsInterested = !tr_torrentIsSeed( tor ); 562 peer->client = tr_strdup( "webseed" ); 563 tr_bitfieldSetHasAll( &peer->have ); 564 tr_peerUpdateProgress( tor, peer );
|
H A D | announcer-http.c | 26 #include "peer-mgr.h" /* pex */ 135 tr_benc * peer = tr_bencListChild( peerList, i ); local 137 if( peer == NULL ) 139 if( !tr_bencDictFindStr( peer, "ip", &ip ) ) 143 if( !tr_bencDictFindInt( peer, "port", &port ) )
|
H A D | bandwidth.h | 69 * Bandwidth objects can be "stacked" so that a peer can be made to obey 78 * Underneath those are per-peer bandwidth objects owned by tr_peer. 89 * tr_torrent's bandwidth, and per-peer speeds by asking tr_peer's bandwidth. 96 * If appropriate, it notifies its peer-ios that new bandwidth is available. 101 * The peer-ios all have a pointer to their associated tr_bandwidth object, 117 struct tr_peerIo * peer; member in struct:tr_bandwidth 168 * @brief Set whether or not this bandwidth should throttle its peer-io's speeds 181 * @return nonzero if this bandwidth throttles its peer-ios speeds 190 * @brief allocate the next period_msec's worth of bandwidth for the peer-ios to consume 219 * This is is usually invoked by the peer [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/rxrpc/ |
H A D | ar-output.c | 102 * abort a call, sending an ABORT packet to the peer 345 msg.msg_name = &trans->peer->srx.transport.sin; 346 msg.msg_namelen = sizeof(trans->peer->srx.transport.sin); 353 if (skb->len - sizeof(struct rxrpc_header) < trans->peer->maxdata) { 359 * message and update the peer record 368 _leave(" = %d [%u]", ret, trans->peer->maxdata); 390 _leave(" = %d [frag %u]", ret, trans->peer->maxdata); 581 max = call->conn->trans->peer->maxdata; 724 ret = call->conn->trans->peer->net_error;
|
H A D | ar-call.c | 131 spin_lock(&call->conn->trans->peer->lock); 132 list_add(&call->error_link, &call->conn->trans->peer->error_targets); 133 spin_unlock(&call->conn->trans->peer->lock); 342 spin_lock(&conn->trans->peer->lock); 343 list_add(&call->error_link, &conn->trans->peer->error_targets); 344 spin_unlock(&conn->trans->peer->lock); 658 spin_lock(&call->conn->trans->peer->lock); 660 spin_unlock(&call->conn->trans->peer->lock);
|
H A D | ar-input.c | 666 struct rxrpc_peer *peer; local 741 peer = rxrpc_find_peer(local, ip_hdr(skb)->saddr, udp_hdr(skb)->source); 742 if (IS_ERR(peer)) 745 trans = rxrpc_find_transport(local, peer); 746 rxrpc_put_peer(peer);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/sctp/ |
H A D | auth.c | 241 /* Make a key vector based on peer's parameters */ 246 return sctp_auth_make_key_vector(asoc->peer.peer_random, 247 asoc->peer.peer_chunks, 248 asoc->peer.peer_hmacs, 398 /* If we don't support AUTH, or peer is not capable 401 if (!sctp_auth_enable || !asoc->peer.auth_capable) 537 hmacs = asoc->peer.peer_hmacs; 674 /* Check if peer requested that this chunk is authenticated */ 677 if (!sctp_auth_enable || !asoc || !asoc->peer.auth_capable) 680 return __sctp_auth_cid(chunk, asoc->peer [all...] |
H A D | output.c | 215 /* if the peer did not request this chunk to be authenticated, 253 asoc->peer.sack_needed = 0; 528 * any problems protocol-wise even if our peer ignores it. 541 if (asoc && asoc->peer.last_sent_to != tp) { 545 asoc->peer.last_sent_to = tp; 609 * any destination transport address if its peer's rwnd indicates 610 * that the peer has no buffer space (i.e. rwnd is 0, see Section 619 rwnd = asoc->peer.rwnd; 686 u32 rwnd = asoc->peer.rwnd; 695 * while updating peer [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/ |
H A D | s_server.c | 312 BIO_printf(bio_err," -verify arg - turn on peer certificate verification\n"); 313 BIO_printf(bio_err," -Verify arg - turn on peer certificate verification, must have a cert.\n"); 1484 X509 *peer; local 1510 peer=SSL_get_peer_certificate(con); 1511 if (peer != NULL) 1514 PEM_write_bio_X509(bio_s_out,peer); 1515 X509_NAME_oneline(X509_get_subject_name(peer),buf,sizeof buf); 1517 X509_NAME_oneline(X509_get_issuer_name(peer),buf,sizeof buf); 1519 X509_free(peer); 1533 BIO_printf(bio_s_out,"Kerberos peer principa 1707 X509 *peer; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/net/sctp/ |
H A D | sm.h | 69 SCTP_DISPOSITION_VIOLATION, /* The peer is misbehaving. */ 280 void sctp_generate_t3_rtx_event(unsigned long peer); 281 void sctp_generate_heartbeat_event(unsigned long peer); 282 void sctp_generate_proto_unreach_event(unsigned long peer); 412 * not set, OR its peer's tag and the T bit is set in the Chunk Flags. 424 * it is set to its peer's tag and the T bit is set in the Chunk 433 * it is set to its peer's tag and the T bit is set in the Chunk
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/busybox-1.x/networking/libiproute/ |
H A D | libnetlink.c | 197 int rtnl_talk(struct rtnl_handle *rtnl, struct nlmsghdr *n, pid_t peer, argument 217 nladdr.nl_pid = peer; 264 if (nladdr.nl_pid != peer ||
|
H A D | ipaddress.c | 166 fprintf(fp, " peer "); 283 fprintf(fp, " peer %s/%d ", 592 "peer\0""remote\0""broadcast\0""brd\0" 603 inet_prefix peer; local 620 case 0: /* peer */ 625 duparg("peer", *argv); 627 get_prefix(&peer, *argv, req.ifa.ifa_family); 628 peer_len = peer.bytelen; 630 req.ifa.ifa_family = peer.family; 632 addattr_l(&req.n, sizeof(req), IFA_ADDRESS, &peer [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/aMule-2.3.1/ |
H A D | aMule.spec | 14 aMule is a peer to peer file sharing client, based on the well known eMule.
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/ide/ |
H A D | via82cxxx.c | 181 ide_drive_t *peer = ide_get_pair_dev(drive); local 201 if (peer) { 202 ide_timing_compute(peer, peer->pio_mode, &p, T, UT);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/net/ |
H A D | dn_dev.h | 95 struct neighbour *peer; /* Peer on pointopoint links */ member in struct:dn_dev
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iproute2/ip/ |
H A D | ipaddress.c | 66 fprintf(stderr, "IFADDR := PREFIX | ADDR peer PREFIX\n"); 208 fprintf(fp, " peer "); 380 fprintf(fp, " peer %s/%d ", 745 inet_prefix peer; local 760 if (strcmp(*argv, "peer") == 0 || 765 duparg("peer", *argv); 766 get_prefix(&peer, *argv, req.ifa.ifa_family); 767 peer_len = peer.bytelen; 769 req.ifa.ifa_family = peer.family; 770 addattr_l(&req.n, sizeof(req), IFA_ADDRESS, &peer [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/ipv4/ |
H A D | ip_fragment.c | 55 struct inet_peer *peer; member in struct:ipq 123 qp->peer = sysctl_ipfrag_max_dist ? 132 if (qp->peer) 133 inet_putpeer(qp->peer); 252 struct inet_peer *peer = qp->peer; local 258 if (!peer || !max) 262 end = atomic_inc_return(&peer->rid);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/bio/ |
H A D | bio.h | 618 # define BIO_ctrl_dgram_connect(b,peer) \ 619 (int)BIO_ctrl(b,BIO_CTRL_DGRAM_CONNECT,0, (char *)peer) 620 # define BIO_ctrl_set_connected(b, state, peer) \ 621 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_CONNECTED, state, (char *)peer) 626 # define BIO_dgram_get_peer(b,peer) \ 627 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_GET_PEER, 0, (char *)peer) 628 # define BIO_dgram_set_peer(b,peer) \ 629 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, (char *)peer)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/bio/ |
H A D | bio.h | 618 # define BIO_ctrl_dgram_connect(b,peer) \ 619 (int)BIO_ctrl(b,BIO_CTRL_DGRAM_CONNECT,0, (char *)peer) 620 # define BIO_ctrl_set_connected(b, state, peer) \ 621 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_CONNECTED, state, (char *)peer) 626 # define BIO_dgram_get_peer(b,peer) \ 627 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_GET_PEER, 0, (char *)peer) 628 # define BIO_dgram_set_peer(b,peer) \ 629 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, (char *)peer)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/ |
H A D | s_client.c | 311 " -verify_hostname host - check peer certificate matches \"host\"\n"); 313 " -verify_email email - check peer certificate matches \"email\"\n"); 315 " -verify_ip ipaddr - check peer certificate matches \"ipaddr\"\n"); 318 " -verify arg - turn on peer certificate verification\n"); 725 struct sockaddr peer; local 726 int peerlen = sizeof(peer); 1453 if (getsockname(s, &peer, (void *)&peerlen) < 0) { 1460 (void)BIO_ctrl_set_connected(sbio, 1, &peer); 2114 X509 *peer = NULL; local 2149 peer [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | s3_srvr.c | 373 ((s->session->peer != NULL) && 2105 if (((clnt_pub_pkey=X509_get_pubkey(s->session->peer)) 2224 X509 *peer; local 2235 if (s->session->peer != NULL) 2237 peer=s->session->peer; 2238 pkey=X509_get_pubkey(peer); 2239 type=X509_certificate_type(peer,pkey); 2243 peer=NULL; 2250 if ((peer ! [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/ |
H A D | s_client.c | 311 " -verify_hostname host - check peer certificate matches \"host\"\n"); 313 " -verify_email email - check peer certificate matches \"email\"\n"); 315 " -verify_ip ipaddr - check peer certificate matches \"ipaddr\"\n"); 318 " -verify arg - turn on peer certificate verification\n"); 725 struct sockaddr peer; local 726 int peerlen = sizeof(peer); 1453 if (getsockname(s, &peer, (void *)&peerlen) < 0) { 1460 (void)BIO_ctrl_set_connected(sbio, 1, &peer); 2114 X509 *peer = NULL; local 2149 peer [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/ata/ |
H A D | pata_via.c | 224 struct ata_device *peer = ata_dev_pair(adev); local 245 if (peer) { 246 if (peer->pio_mode) { 247 ata_timing_compute(peer, peer->pio_mode, &p, T, UT);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/decnet/ |
H A D | dn_nsp_out.c | 97 fl.fld_dst = dn_saddr2dn(&scp->peer); 677 if (scp->peer.sdn_objnum) 680 skb_put(skb, dn_sockaddr2username(&scp->peer, 686 if (scp->peer.sdn_flags & SDF_PROXY) 688 if (scp->peer.sdn_flags & SDF_UICPROXY)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/l2tpd-0.69/ |
H A D | l2tpd.c | 123 t->ourtid, t->tid, IPADDY (t->peer.sin_addr), 124 ntohs (t->peer.sin_port), t->control_seq_num, 972 __FUNCTION__, IPADDY (t->peer.sin_addr), t->ourtid, t->tid); 1022 tmp->peer.sin_family = AF_INET; 1023 tmp->peer.sin_port = 0; 1024 bzero (&(tmp->peer.sin_addr), sizeof (tmp->peer.sin_addr)); 1030 tmp->fc = -1; /* These really need to be specified by the peer */
|