/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/ipv4/ |
H A D | route.c | 1272 struct inet_peer *peer; local 1274 peer = inet_getpeer(rt->rt_dst, create); 1277 if (rt->peer == NULL) { 1278 rt->peer = peer; 1279 peer = NULL; 1282 if (peer) 1283 inet_putpeer(peer); 1311 if (rt->peer == NULL) 1314 /* If peer i 1717 struct inet_peer *peer = rt->peer; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/infiniband/hw/amso1100/ |
H A D | c2_cq.c | 230 shared = cq->mq.peer; 278 NULL, /* peer (currently unknown) */ 352 cq->mq.peer = ioremap_nocache(peer_pa, PAGE_SIZE); 353 if (!cq->mq.peer) {
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/ |
H A D | mISDNif.h | 461 struct mISDNchannel *peer; member in struct:mISDNchannel 557 if (!ch->peer) 562 if (ch->recv(ch->peer, skb))
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/transmission/transmission-2.73/libtransmission/ |
H A D | rpcimpl.c | 527 const tr_peer_stat * peer = peers + i; local 528 tr_bencDictAddStr ( d, "address", peer->addr ); 529 tr_bencDictAddStr ( d, "clientName", peer->client ); 530 tr_bencDictAddBool( d, "clientIsChoked", peer->clientIsChoked ); 531 tr_bencDictAddBool( d, "clientIsInterested", peer->clientIsInterested ); 532 tr_bencDictAddStr ( d, "flagStr", peer->flagStr ); 533 tr_bencDictAddBool( d, "isDownloadingFrom", peer->isDownloadingFrom ); 534 tr_bencDictAddBool( d, "isEncrypted", peer->isEncrypted ); 535 tr_bencDictAddBool( d, "isIncoming", peer->isIncoming ); 536 tr_bencDictAddBool( d, "isUploadingTo", peer [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/sctp/ |
H A D | socket.c | 540 if (!asoc->peer.asconf_capable) 543 if (asoc->peer.addip_disabled_mask & SCTP_PARAM_ADD_IP) 551 * do not send the asconf chunk to its peer, but continue with 717 if (!asoc->peer.asconf_capable) 720 if (asoc->peer.addip_disabled_mask & SCTP_PARAM_DEL_IP) 728 * If so, do not send the asconf chunk to its peer, but 788 list_for_each_entry(transport, &asoc->peer.transport_addr_list, 847 * endpoint to send the appropriate message to the peer to change the 1031 if (asoc && asoc->peer.port && asoc->peer [all...] |
H A D | endpointola.c | 343 if (asoc->ep != ep || rport != asoc->peer.port) 358 /* Lookup association on an endpoint based on a peer address. BH-safe. */ 374 * given peer address. 467 asoc->peer.last_data_from = chunk->transport;
|
H A D | input.c | 76 const union sctp_addr *peer, 504 * the peer. If the Verification Tag is not 0 and does NOT 508 * peer, continue with ICMP7. If the ICMP message is too short 810 epb->hashent = sctp_assoc_hashfn(epb->bind_addr.port, asoc->peer.port); 839 asoc->peer.port); 862 const union sctp_addr *peer, 875 hash = sctp_assoc_hashfn(ntohs(local->v4.sin_port), ntohs(peer->v4.sin_port)); 880 transport = sctp_assoc_is_match(asoc, local, peer); 911 /* Is there an association matching the given local and peer addresses? */ 996 * When an endpoint receives an ASCONF Chunk from the remote peer 860 __sctp_lookup_association( const union sctp_addr *local, const union sctp_addr *peer, struct sctp_transport **pt) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iproute2/misc/ |
H A D | ss.c | 1879 int peer; member in struct:unixstat 1909 char *peer; local 1919 peer = "*"; 1920 if (s->peer) { 1923 if (s->peer == p->ino) 1927 peer = "?"; 1929 peer = p->name ? : "*"; 1938 if (strcmp(peer, "*") == 0) 1939 memset(tst.remote.data, 0, sizeof(peer)); 1941 memcpy(tst.remote.data, &peer, sizeo [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/l2tpd-0.69/ |
H A D | l2tp.h | 121 int fc; /* Framing capabilities of peer */ 137 struct sockaddr_in peer; /* Peer's Address */ member in struct:tunnel 145 int cLr; /* Last packet received by peer */
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/acpi/acpica/ |
H A D | nssearch.c | 155 /* Didn't match name, move on to the next peer object */ 157 node = node->peer;
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/atm/ |
H A D | pvc.c | 88 int *sockaddr_len, int peer) 87 pvc_getname(struct socket *sock, struct sockaddr *sockaddr, int *sockaddr_len, int peer) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/net/ |
H A D | dn.h | 68 struct sockaddr_dn peer; /* Remote address */ member in struct:dn_scp
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/net/tipc/ |
H A D | tipc.h | 158 int tipc_peer(u32 portref, struct tipc_portid *peer);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/zebra/bgpd/ |
H A D | bgp_routemap.c | 1897 struct peer *peer; 1906 LIST_LOOP (bgp->peer, peer, nm) 1911 filter = &peer->filter[afi][safi]; 1955 LIST_LOOP (bgp->peer, peer, nm) 1960 if (peer->default_rmap[afi][safi].name) 1961 peer->default_rmap[afi][safi].map = 1962 route_map_lookup_by_name (peer 1870 struct peer *peer; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/repmgr/ |
H A D | repmgr_method.c | 219 db_rep->peer = DB_EID_INVALID; 436 db_rep->peer = eid;
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/busybox-1.x/libbb/ |
H A D | xconnect.c | 278 int create_and_connect_stream_or_die(const char *peer, int port) argument 283 lsa = xhost2sockaddr(peer, port);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/demos/easy_tls/ |
H A D | easy-tls.c | 936 struct tls_x509_name_string peer; local 947 tls_get_x509_subject_name_oneline(peercert, &peer); 951 if (peer.str[0] == '\0') 953 else if (strchr(peer.str, '\n')) { 955 *strchr(peer.str, '\n') = '\0'; 958 X509_verify_cert_error_string(v), peer.str);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/demos/easy_tls/ |
H A D | easy-tls.c | 890 struct tls_x509_name_string peer; local 901 tls_get_x509_subject_name_oneline(peercert, &peer); 905 if (peer.str[0] == '\0') 908 if (strchr(peer.str, '\n')) { 910 *strchr(peer.str, '\n') = '\0'; 912 r = snprintf(infobuf, sizeof infobuf, "%c:%s\n%s\n", v_ok, X509_verify_cert_error_string(v), peer.str);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | bio.h | 535 #define BIO_ctrl_dgram_connect(b,peer) \ 536 (int)BIO_ctrl(b,BIO_CTRL_DGRAM_CONNECT,0, (char *)peer) 537 #define BIO_ctrl_set_connected(b, state, peer) \ 538 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_CONNECTED, state, (char *)peer) 543 #define BIO_dgram_set_peer(b,peer) \ 544 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, (char *)peer)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/demos/easy_tls/ |
H A D | easy-tls.c | 936 struct tls_x509_name_string peer; local 947 tls_get_x509_subject_name_oneline(peercert, &peer); 951 if (peer.str[0] == '\0') 953 else if (strchr(peer.str, '\n')) { 955 *strchr(peer.str, '\n') = '\0'; 958 X509_verify_cert_error_string(v), peer.str);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/bio/ |
H A D | bio.h | 535 #define BIO_ctrl_dgram_connect(b,peer) \ 536 (int)BIO_ctrl(b,BIO_CTRL_DGRAM_CONNECT,0, (char *)peer) 537 #define BIO_ctrl_set_connected(b, state, peer) \ 538 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_CONNECTED, state, (char *)peer) 543 #define BIO_dgram_set_peer(b,peer) \ 544 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, (char *)peer)
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/rxrpc/ |
H A D | af_rxrpc.c | 230 struct rxrpc_peer *peer; local 243 peer = rxrpc_get_peer(srx, gfp); 244 if (IS_ERR(peer)) 245 return ERR_CAST(peer); 248 trans = rxrpc_get_transport(rx->local, peer, gfp); 249 rxrpc_put_peer(peer); 257 * @srx: The address of the peer to contact (defaults to socket setting)
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/tipc/ |
H A D | port.c | 1143 int tipc_connect2port(u32 ref, struct tipc_portid const *peer) argument 1154 if (!peer->ref) 1158 msg_set_destnode(msg, peer->node); 1159 msg_set_destport(msg, peer->ref); 1164 if (!may_route(peer->node)) 1174 tipc_nodesub_subscribe(&p_ptr->subscription,peer->node, 1180 p_ptr->publ.max_pkt = tipc_link_get_max_pkt(peer->node, ref); 1185 * tipc_disconnect_port - disconnect port from peer 1207 * tipc_disconnect(): Disconnect port form peer. 1225 * tipc_shutdown(): Send a SHUTDOWN msg to peer an 1267 tipc_peer(u32 ref, struct tipc_portid *peer) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | s3_srvr.c | 509 ((s->session->peer != NULL) && 625 if (!s->session->peer) 2356 EVP_PKEY *clkey = X509_get_pubkey(s->session->peer); 2641 if (((clnt_pub_pkey = X509_get_pubkey(s->session->peer)) 2886 client_pub_pkey = X509_get_pubkey(s->session->peer); 2958 X509 *peer; local 2965 * a Certificate from the client. If so then |s->session->peer| will be non 2967 * if the peer has sent a Certificate (e.g. such as in the case of static 2971 if (s->session->peer == NULL) { 2985 peer [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | s3_srvr.c | 509 ((s->session->peer != NULL) && 625 if (!s->session->peer) 2356 EVP_PKEY *clkey = X509_get_pubkey(s->session->peer); 2641 if (((clnt_pub_pkey = X509_get_pubkey(s->session->peer)) 2886 client_pub_pkey = X509_get_pubkey(s->session->peer); 2958 X509 *peer; local 2965 * a Certificate from the client. If so then |s->session->peer| will be non 2967 * if the peer has sent a Certificate (e.g. such as in the case of static 2971 if (s->session->peer == NULL) { 2985 peer [all...] |