Searched refs:peer (Results 151 - 175 of 323) sorted by relevance

1234567891011>>

/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/ipv4/
H A Droute.c1272 struct inet_peer *peer; local
1274 peer = inet_getpeer(rt->rt_dst, create);
1277 if (rt->peer == NULL) {
1278 rt->peer = peer;
1279 peer = NULL;
1282 if (peer)
1283 inet_putpeer(peer);
1311 if (rt->peer == NULL)
1314 /* If peer i
1717 struct inet_peer *peer = rt->peer; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/infiniband/hw/amso1100/
H A Dc2_cq.c230 shared = cq->mq.peer;
278 NULL, /* peer (currently unknown) */
352 cq->mq.peer = ioremap_nocache(peer_pa, PAGE_SIZE);
353 if (!cq->mq.peer) {
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/
H A DmISDNif.h461 struct mISDNchannel *peer; member in struct:mISDNchannel
557 if (!ch->peer)
562 if (ch->recv(ch->peer, skb))
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/transmission/transmission-2.73/libtransmission/
H A Drpcimpl.c527 const tr_peer_stat * peer = peers + i; local
528 tr_bencDictAddStr ( d, "address", peer->addr );
529 tr_bencDictAddStr ( d, "clientName", peer->client );
530 tr_bencDictAddBool( d, "clientIsChoked", peer->clientIsChoked );
531 tr_bencDictAddBool( d, "clientIsInterested", peer->clientIsInterested );
532 tr_bencDictAddStr ( d, "flagStr", peer->flagStr );
533 tr_bencDictAddBool( d, "isDownloadingFrom", peer->isDownloadingFrom );
534 tr_bencDictAddBool( d, "isEncrypted", peer->isEncrypted );
535 tr_bencDictAddBool( d, "isIncoming", peer->isIncoming );
536 tr_bencDictAddBool( d, "isUploadingTo", peer
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/sctp/
H A Dsocket.c540 if (!asoc->peer.asconf_capable)
543 if (asoc->peer.addip_disabled_mask & SCTP_PARAM_ADD_IP)
551 * do not send the asconf chunk to its peer, but continue with
717 if (!asoc->peer.asconf_capable)
720 if (asoc->peer.addip_disabled_mask & SCTP_PARAM_DEL_IP)
728 * If so, do not send the asconf chunk to its peer, but
788 list_for_each_entry(transport, &asoc->peer.transport_addr_list,
847 * endpoint to send the appropriate message to the peer to change the
1031 if (asoc && asoc->peer.port && asoc->peer
[all...]
H A Dendpointola.c343 if (asoc->ep != ep || rport != asoc->peer.port)
358 /* Lookup association on an endpoint based on a peer address. BH-safe. */
374 * given peer address.
467 asoc->peer.last_data_from = chunk->transport;
H A Dinput.c76 const union sctp_addr *peer,
504 * the peer. If the Verification Tag is not 0 and does NOT
508 * peer, continue with ICMP7. If the ICMP message is too short
810 epb->hashent = sctp_assoc_hashfn(epb->bind_addr.port, asoc->peer.port);
839 asoc->peer.port);
862 const union sctp_addr *peer,
875 hash = sctp_assoc_hashfn(ntohs(local->v4.sin_port), ntohs(peer->v4.sin_port));
880 transport = sctp_assoc_is_match(asoc, local, peer);
911 /* Is there an association matching the given local and peer addresses? */
996 * When an endpoint receives an ASCONF Chunk from the remote peer
860 __sctp_lookup_association( const union sctp_addr *local, const union sctp_addr *peer, struct sctp_transport **pt) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iproute2/misc/
H A Dss.c1879 int peer; member in struct:unixstat
1909 char *peer; local
1919 peer = "*";
1920 if (s->peer) {
1923 if (s->peer == p->ino)
1927 peer = "?";
1929 peer = p->name ? : "*";
1938 if (strcmp(peer, "*") == 0)
1939 memset(tst.remote.data, 0, sizeof(peer));
1941 memcpy(tst.remote.data, &peer, sizeo
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/l2tpd-0.69/
H A Dl2tp.h121 int fc; /* Framing capabilities of peer */
137 struct sockaddr_in peer; /* Peer's Address */ member in struct:tunnel
145 int cLr; /* Last packet received by peer */
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/acpi/acpica/
H A Dnssearch.c155 /* Didn't match name, move on to the next peer object */
157 node = node->peer;
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/atm/
H A Dpvc.c88 int *sockaddr_len, int peer)
87 pvc_getname(struct socket *sock, struct sockaddr *sockaddr, int *sockaddr_len, int peer) argument
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/net/
H A Ddn.h68 struct sockaddr_dn peer; /* Remote address */ member in struct:dn_scp
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/net/tipc/
H A Dtipc.h158 int tipc_peer(u32 portref, struct tipc_portid *peer);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/zebra/bgpd/
H A Dbgp_routemap.c1897 struct peer *peer;
1906 LIST_LOOP (bgp->peer, peer, nm)
1911 filter = &peer->filter[afi][safi];
1955 LIST_LOOP (bgp->peer, peer, nm)
1960 if (peer->default_rmap[afi][safi].name)
1961 peer->default_rmap[afi][safi].map =
1962 route_map_lookup_by_name (peer
1870 struct peer *peer; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/repmgr/
H A Drepmgr_method.c219 db_rep->peer = DB_EID_INVALID;
436 db_rep->peer = eid;
/netgear-R7000-V1.0.7.12_1.2.5/src/router/busybox-1.x/libbb/
H A Dxconnect.c278 int create_and_connect_stream_or_die(const char *peer, int port) argument
283 lsa = xhost2sockaddr(peer, port);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/demos/easy_tls/
H A Deasy-tls.c936 struct tls_x509_name_string peer; local
947 tls_get_x509_subject_name_oneline(peercert, &peer);
951 if (peer.str[0] == '\0')
953 else if (strchr(peer.str, '\n')) {
955 *strchr(peer.str, '\n') = '\0';
958 X509_verify_cert_error_string(v), peer.str);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/demos/easy_tls/
H A Deasy-tls.c890 struct tls_x509_name_string peer; local
901 tls_get_x509_subject_name_oneline(peercert, &peer);
905 if (peer.str[0] == '\0')
908 if (strchr(peer.str, '\n')) {
910 *strchr(peer.str, '\n') = '\0';
912 r = snprintf(infobuf, sizeof infobuf, "%c:%s\n%s\n", v_ok, X509_verify_cert_error_string(v), peer.str);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/
H A Dbio.h535 #define BIO_ctrl_dgram_connect(b,peer) \
536 (int)BIO_ctrl(b,BIO_CTRL_DGRAM_CONNECT,0, (char *)peer)
537 #define BIO_ctrl_set_connected(b, state, peer) \
538 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_CONNECTED, state, (char *)peer)
543 #define BIO_dgram_set_peer(b,peer) \
544 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, (char *)peer)
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/demos/easy_tls/
H A Deasy-tls.c936 struct tls_x509_name_string peer; local
947 tls_get_x509_subject_name_oneline(peercert, &peer);
951 if (peer.str[0] == '\0')
953 else if (strchr(peer.str, '\n')) {
955 *strchr(peer.str, '\n') = '\0';
958 X509_verify_cert_error_string(v), peer.str);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/bio/
H A Dbio.h535 #define BIO_ctrl_dgram_connect(b,peer) \
536 (int)BIO_ctrl(b,BIO_CTRL_DGRAM_CONNECT,0, (char *)peer)
537 #define BIO_ctrl_set_connected(b, state, peer) \
538 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_CONNECTED, state, (char *)peer)
543 #define BIO_dgram_set_peer(b,peer) \
544 (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, (char *)peer)
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/rxrpc/
H A Daf_rxrpc.c230 struct rxrpc_peer *peer; local
243 peer = rxrpc_get_peer(srx, gfp);
244 if (IS_ERR(peer))
245 return ERR_CAST(peer);
248 trans = rxrpc_get_transport(rx->local, peer, gfp);
249 rxrpc_put_peer(peer);
257 * @srx: The address of the peer to contact (defaults to socket setting)
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/tipc/
H A Dport.c1143 int tipc_connect2port(u32 ref, struct tipc_portid const *peer) argument
1154 if (!peer->ref)
1158 msg_set_destnode(msg, peer->node);
1159 msg_set_destport(msg, peer->ref);
1164 if (!may_route(peer->node))
1174 tipc_nodesub_subscribe(&p_ptr->subscription,peer->node,
1180 p_ptr->publ.max_pkt = tipc_link_get_max_pkt(peer->node, ref);
1185 * tipc_disconnect_port - disconnect port from peer
1207 * tipc_disconnect(): Disconnect port form peer.
1225 * tipc_shutdown(): Send a SHUTDOWN msg to peer an
1267 tipc_peer(u32 ref, struct tipc_portid *peer) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/
H A Ds3_srvr.c509 ((s->session->peer != NULL) &&
625 if (!s->session->peer)
2356 EVP_PKEY *clkey = X509_get_pubkey(s->session->peer);
2641 if (((clnt_pub_pkey = X509_get_pubkey(s->session->peer))
2886 client_pub_pkey = X509_get_pubkey(s->session->peer);
2958 X509 *peer; local
2965 * a Certificate from the client. If so then |s->session->peer| will be non
2967 * if the peer has sent a Certificate (e.g. such as in the case of static
2971 if (s->session->peer == NULL) {
2985 peer
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/
H A Ds3_srvr.c509 ((s->session->peer != NULL) &&
625 if (!s->session->peer)
2356 EVP_PKEY *clkey = X509_get_pubkey(s->session->peer);
2641 if (((clnt_pub_pkey = X509_get_pubkey(s->session->peer))
2886 client_pub_pkey = X509_get_pubkey(s->session->peer);
2958 X509 *peer; local
2965 * a Certificate from the client. If so then |s->session->peer| will be non
2967 * if the peer has sent a Certificate (e.g. such as in the case of static
2971 if (s->session->peer == NULL) {
2985 peer
[all...]

Completed in 293 milliseconds

1234567891011>>