Searched refs:peer (Results 126 - 150 of 323) sorted by relevance

1234567891011>>

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/transmission/transmission-2.73/libtransmission/
H A Dwebseed.c23 #include "peer-mgr.h"
555 tr_peer * peer = &w->parent; local
559 tr_peerConstruct( peer );
560 peer->peerIsChoked = true;
561 peer->clientIsInterested = !tr_torrentIsSeed( tor );
562 peer->client = tr_strdup( "webseed" );
563 tr_bitfieldSetHasAll( &peer->have );
564 tr_peerUpdateProgress( tor, peer );
H A Dannouncer-http.c26 #include "peer-mgr.h" /* pex */
135 tr_benc * peer = tr_bencListChild( peerList, i ); local
137 if( peer == NULL )
139 if( !tr_bencDictFindStr( peer, "ip", &ip ) )
143 if( !tr_bencDictFindInt( peer, "port", &port ) )
H A Dbandwidth.h69 * Bandwidth objects can be "stacked" so that a peer can be made to obey
78 * Underneath those are per-peer bandwidth objects owned by tr_peer.
89 * tr_torrent's bandwidth, and per-peer speeds by asking tr_peer's bandwidth.
96 * If appropriate, it notifies its peer-ios that new bandwidth is available.
101 * The peer-ios all have a pointer to their associated tr_bandwidth object,
117 struct tr_peerIo * peer; member in struct:tr_bandwidth
168 * @brief Set whether or not this bandwidth should throttle its peer-io's speeds
181 * @return nonzero if this bandwidth throttles its peer-ios speeds
190 * @brief allocate the next period_msec's worth of bandwidth for the peer-ios to consume
219 * This is is usually invoked by the peer
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/rxrpc/
H A Dar-output.c102 * abort a call, sending an ABORT packet to the peer
345 msg.msg_name = &trans->peer->srx.transport.sin;
346 msg.msg_namelen = sizeof(trans->peer->srx.transport.sin);
353 if (skb->len - sizeof(struct rxrpc_header) < trans->peer->maxdata) {
359 * message and update the peer record
368 _leave(" = %d [%u]", ret, trans->peer->maxdata);
390 _leave(" = %d [frag %u]", ret, trans->peer->maxdata);
581 max = call->conn->trans->peer->maxdata;
724 ret = call->conn->trans->peer->net_error;
H A Dar-call.c131 spin_lock(&call->conn->trans->peer->lock);
132 list_add(&call->error_link, &call->conn->trans->peer->error_targets);
133 spin_unlock(&call->conn->trans->peer->lock);
342 spin_lock(&conn->trans->peer->lock);
343 list_add(&call->error_link, &conn->trans->peer->error_targets);
344 spin_unlock(&conn->trans->peer->lock);
658 spin_lock(&call->conn->trans->peer->lock);
660 spin_unlock(&call->conn->trans->peer->lock);
H A Dar-input.c666 struct rxrpc_peer *peer; local
741 peer = rxrpc_find_peer(local, ip_hdr(skb)->saddr, udp_hdr(skb)->source);
742 if (IS_ERR(peer))
745 trans = rxrpc_find_transport(local, peer);
746 rxrpc_put_peer(peer);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/sctp/
H A Dauth.c241 /* Make a key vector based on peer's parameters */
246 return sctp_auth_make_key_vector(asoc->peer.peer_random,
247 asoc->peer.peer_chunks,
248 asoc->peer.peer_hmacs,
398 /* If we don't support AUTH, or peer is not capable
401 if (!sctp_auth_enable || !asoc->peer.auth_capable)
537 hmacs = asoc->peer.peer_hmacs;
674 /* Check if peer requested that this chunk is authenticated */
677 if (!sctp_auth_enable || !asoc || !asoc->peer.auth_capable)
680 return __sctp_auth_cid(chunk, asoc->peer
[all...]
H A Doutput.c215 /* if the peer did not request this chunk to be authenticated,
253 asoc->peer.sack_needed = 0;
528 * any problems protocol-wise even if our peer ignores it.
541 if (asoc && asoc->peer.last_sent_to != tp) {
545 asoc->peer.last_sent_to = tp;
609 * any destination transport address if its peer's rwnd indicates
610 * that the peer has no buffer space (i.e. rwnd is 0, see Section
619 rwnd = asoc->peer.rwnd;
686 u32 rwnd = asoc->peer.rwnd;
695 * while updating peer
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/
H A Ds_server.c312 BIO_printf(bio_err," -verify arg - turn on peer certificate verification\n");
313 BIO_printf(bio_err," -Verify arg - turn on peer certificate verification, must have a cert.\n");
1484 X509 *peer; local
1510 peer=SSL_get_peer_certificate(con);
1511 if (peer != NULL)
1514 PEM_write_bio_X509(bio_s_out,peer);
1515 X509_NAME_oneline(X509_get_subject_name(peer),buf,sizeof buf);
1517 X509_NAME_oneline(X509_get_issuer_name(peer),buf,sizeof buf);
1519 X509_free(peer);
1533 BIO_printf(bio_s_out,"Kerberos peer principa
1707 X509 *peer; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/net/sctp/
H A Dsm.h69 SCTP_DISPOSITION_VIOLATION, /* The peer is misbehaving. */
280 void sctp_generate_t3_rtx_event(unsigned long peer);
281 void sctp_generate_heartbeat_event(unsigned long peer);
282 void sctp_generate_proto_unreach_event(unsigned long peer);
412 * not set, OR its peer's tag and the T bit is set in the Chunk Flags.
424 * it is set to its peer's tag and the T bit is set in the Chunk
433 * it is set to its peer's tag and the T bit is set in the Chunk
/netgear-R7000-V1.0.7.12_1.2.5/src/router/busybox-1.x/networking/libiproute/
H A Dlibnetlink.c197 int rtnl_talk(struct rtnl_handle *rtnl, struct nlmsghdr *n, pid_t peer, argument
217 nladdr.nl_pid = peer;
264 if (nladdr.nl_pid != peer ||
H A Dipaddress.c166 fprintf(fp, " peer ");
283 fprintf(fp, " peer %s/%d ",
592 "peer\0""remote\0""broadcast\0""brd\0"
603 inet_prefix peer; local
620 case 0: /* peer */
625 duparg("peer", *argv);
627 get_prefix(&peer, *argv, req.ifa.ifa_family);
628 peer_len = peer.bytelen;
630 req.ifa.ifa_family = peer.family;
632 addattr_l(&req.n, sizeof(req), IFA_ADDRESS, &peer
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/aMule-2.3.1/
H A DaMule.spec14 aMule is a peer to peer file sharing client, based on the well known eMule.
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/ide/
H A Dvia82cxxx.c181 ide_drive_t *peer = ide_get_pair_dev(drive); local
201 if (peer) {
202 ide_timing_compute(peer, peer->pio_mode, &p, T, UT);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/net/
H A Ddn_dev.h95 struct neighbour *peer; /* Peer on pointopoint links */ member in struct:dn_dev
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iproute2/ip/
H A Dipaddress.c66 fprintf(stderr, "IFADDR := PREFIX | ADDR peer PREFIX\n");
208 fprintf(fp, " peer ");
380 fprintf(fp, " peer %s/%d ",
745 inet_prefix peer; local
760 if (strcmp(*argv, "peer") == 0 ||
765 duparg("peer", *argv);
766 get_prefix(&peer, *argv, req.ifa.ifa_family);
767 peer_len = peer.bytelen;
769 req.ifa.ifa_family = peer.family;
770 addattr_l(&req.n, sizeof(req), IFA_ADDRESS, &peer
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/ipv4/
H A Dip_fragment.c55 struct inet_peer *peer; member in struct:ipq
123 qp->peer = sysctl_ipfrag_max_dist ?
132 if (qp->peer)
133 inet_putpeer(qp->peer);
252 struct inet_peer *peer = qp->peer; local
258 if (!peer || !max)
262 end = atomic_inc_return(&peer->rid);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/bio/
H A Dbio.h618 # define BIO_ctrl_dgram_connect(b,peer) \
619 (int)BIO_ctrl(b,BIO_CTRL_DGRAM_CONNECT,0, (char *)peer)
620 # define BIO_ctrl_set_connected(b, state, peer) \
621 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_CONNECTED, state, (char *)peer)
626 # define BIO_dgram_get_peer(b,peer) \
627 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_GET_PEER, 0, (char *)peer)
628 # define BIO_dgram_set_peer(b,peer) \
629 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, (char *)peer)
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/bio/
H A Dbio.h618 # define BIO_ctrl_dgram_connect(b,peer) \
619 (int)BIO_ctrl(b,BIO_CTRL_DGRAM_CONNECT,0, (char *)peer)
620 # define BIO_ctrl_set_connected(b, state, peer) \
621 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_CONNECTED, state, (char *)peer)
626 # define BIO_dgram_get_peer(b,peer) \
627 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_GET_PEER, 0, (char *)peer)
628 # define BIO_dgram_set_peer(b,peer) \
629 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, (char *)peer)
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/
H A Ds_client.c311 " -verify_hostname host - check peer certificate matches \"host\"\n");
313 " -verify_email email - check peer certificate matches \"email\"\n");
315 " -verify_ip ipaddr - check peer certificate matches \"ipaddr\"\n");
318 " -verify arg - turn on peer certificate verification\n");
725 struct sockaddr peer; local
726 int peerlen = sizeof(peer);
1453 if (getsockname(s, &peer, (void *)&peerlen) < 0) {
1460 (void)BIO_ctrl_set_connected(sbio, 1, &peer);
2114 X509 *peer = NULL; local
2149 peer
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/
H A Ds3_srvr.c373 ((s->session->peer != NULL) &&
2105 if (((clnt_pub_pkey=X509_get_pubkey(s->session->peer))
2224 X509 *peer; local
2235 if (s->session->peer != NULL)
2237 peer=s->session->peer;
2238 pkey=X509_get_pubkey(peer);
2239 type=X509_certificate_type(peer,pkey);
2243 peer=NULL;
2250 if ((peer !
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/
H A Ds_client.c311 " -verify_hostname host - check peer certificate matches \"host\"\n");
313 " -verify_email email - check peer certificate matches \"email\"\n");
315 " -verify_ip ipaddr - check peer certificate matches \"ipaddr\"\n");
318 " -verify arg - turn on peer certificate verification\n");
725 struct sockaddr peer; local
726 int peerlen = sizeof(peer);
1453 if (getsockname(s, &peer, (void *)&peerlen) < 0) {
1460 (void)BIO_ctrl_set_connected(sbio, 1, &peer);
2114 X509 *peer = NULL; local
2149 peer
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/ata/
H A Dpata_via.c224 struct ata_device *peer = ata_dev_pair(adev); local
245 if (peer) {
246 if (peer->pio_mode) {
247 ata_timing_compute(peer, peer->pio_mode, &p, T, UT);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/decnet/
H A Ddn_nsp_out.c97 fl.fld_dst = dn_saddr2dn(&scp->peer);
677 if (scp->peer.sdn_objnum)
680 skb_put(skb, dn_sockaddr2username(&scp->peer,
686 if (scp->peer.sdn_flags & SDF_PROXY)
688 if (scp->peer.sdn_flags & SDF_UICPROXY)
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/l2tpd-0.69/
H A Dl2tpd.c123 t->ourtid, t->tid, IPADDY (t->peer.sin_addr),
124 ntohs (t->peer.sin_port), t->control_seq_num,
972 __FUNCTION__, IPADDY (t->peer.sin_addr), t->ourtid, t->tid);
1022 tmp->peer.sin_family = AF_INET;
1023 tmp->peer.sin_port = 0;
1024 bzero (&(tmp->peer.sin_addr), sizeof (tmp->peer.sin_addr));
1030 tmp->fc = -1; /* These really need to be specified by the peer */

Completed in 204 milliseconds

1234567891011>>