Searched refs:peer (Results 51 - 75 of 323) sorted by relevance

1234567891011>>

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/bio/
H A Dbss_bio.c57 * of this kind, handled by the same thread (i.e. the "peer" is actually
127 BIO *peer; /* NULL if buf == NULL. member in struct:bio_bio_st
128 * If peer != NULL, then peer->ptr is also a bio_bio_st,
129 * and its "peer" member points back to us.
130 * peer != NULL iff init != 0 in the BIO. */
132 /* This is for what we write (i.e. reading uses peer's struct): */
133 int closed; /* valid iff peer != NULL */
134 size_t len; /* valid iff buf != NULL; 0 if peer == NULL */
139 size_t request; /* valid iff peer !
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/bio/
H A Dbss_bio.c58 * kind, handled by the same thread (i.e. the "peer" is actually ourselves,
126 BIO *peer; /* NULL if buf == NULL. If peer != NULL, then member in struct:bio_bio_st
127 * peer->ptr is also a bio_bio_st, and its
128 * "peer" member points back to us. peer !=
130 /* This is for what we write (i.e. reading uses peer's struct): */
131 int closed; /* valid iff peer != NULL */
132 size_t len; /* valid iff buf != NULL; 0 if peer == NULL */
136 size_t request; /* valid iff peer !
[all...]
H A Dbss_dgram.c163 } peer; member in struct:bio_dgram_data_st
185 } peer; member in struct:bio_dgram_sctp_data_st
389 } peer; member in struct:__anon4345
393 sa.len.i = sizeof(sa.peer);
397 memset(&sa.peer, 0x00, sizeof(sa.peer));
399 ret = recvfrom(b->num, out, outl, 0, &sa.peer.sa, (void *)&sa.len);
401 OPENSSL_assert(sa.len.s <= sizeof(sa.peer));
406 BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, &sa.peer);
430 int peerlen = sizeof(data->peer);
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/bio/
H A Dbss_bio.c58 * kind, handled by the same thread (i.e. the "peer" is actually ourselves,
126 BIO *peer; /* NULL if buf == NULL. If peer != NULL, then member in struct:bio_bio_st
127 * peer->ptr is also a bio_bio_st, and its
128 * "peer" member points back to us. peer !=
130 /* This is for what we write (i.e. reading uses peer's struct): */
131 int closed; /* valid iff peer != NULL */
132 size_t len; /* valid iff buf != NULL; 0 if peer == NULL */
136 size_t request; /* valid iff peer !
[all...]
H A Dbss_dgram.c163 } peer; member in struct:bio_dgram_data_st
185 } peer; member in struct:bio_dgram_sctp_data_st
389 } peer; member in struct:__anon4694
393 sa.len.i = sizeof(sa.peer);
397 memset(&sa.peer, 0x00, sizeof(sa.peer));
399 ret = recvfrom(b->num, out, outl, 0, &sa.peer.sa, (void *)&sa.len);
401 OPENSSL_assert(sa.len.s <= sizeof(sa.peer));
406 BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, &sa.peer);
430 int peerlen = sizeof(data->peer);
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/
H A Ds_cb.c1017 } peer; local
1028 /* Read peer information */
1029 (void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer); local
1031 /* Create buffer with peer's address and port */
1033 switch (peer.sa.sa_family) {
1036 length += sizeof(peer.s4.sin_port);
1041 length += sizeof(peer.s6.sin6_port);
1055 switch (peer.sa.sa_family) {
1057 memcpy(buffer, &peer.s4.sin_port, sizeof(peer
1095 } peer; local
1102 (void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer); local
1475 X509 *peer; local
[all...]
H A Dsess_id.c93 X509 *peer = NULL; local
161 peer = SSL_SESSION_get0_peer(x);
219 if (peer == NULL)
222 X509_print(out, peer);
239 } else if (!noout && (peer != NULL)) { /* just print the certificate */
241 i = (int)i2d_X509_bio(out, peer);
243 i = PEM_write_bio_X509(out, peer);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/
H A Ds_cb.c1017 } peer; local
1028 /* Read peer information */
1029 (void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer); local
1031 /* Create buffer with peer's address and port */
1033 switch (peer.sa.sa_family) {
1036 length += sizeof(peer.s4.sin_port);
1041 length += sizeof(peer.s6.sin6_port);
1055 switch (peer.sa.sa_family) {
1057 memcpy(buffer, &peer.s4.sin_port, sizeof(peer
1095 } peer; local
1102 (void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer); local
1475 X509 *peer; local
[all...]
H A Dsess_id.c93 X509 *peer = NULL; local
161 peer = SSL_SESSION_get0_peer(x);
219 if (peer == NULL)
222 X509_print(out, peer);
239 } else if (!noout && (peer != NULL)) { /* just print the certificate */
241 i = (int)i2d_X509_bio(out, peer);
243 i = PEM_write_bio_X509(out, peer);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/sctp/
H A Dsm_make_chunk.c389 /* Tell peer that we'll do ECN only if peer advertised such cap. */
390 if (asoc->peer.ecn_capable)
393 if (asoc->peer.prsctp_capable)
396 if (asoc->peer.asconf_capable) {
405 if (asoc->peer.auth_capable) {
449 if (asoc->peer.ecn_capable)
459 if (asoc->peer.prsctp_capable)
469 if (asoc->peer.auth_capable) {
493 * It is sent by the initiator of an association to its peer t
2883 struct sctp_transport *peer; local
[all...]
H A Dsm_sideeffect.c96 * its peer that it has reduced its congestion window. This
111 * and then ACK our peer that we we've done so by
161 struct sctp_transport *trans = asoc->peer.last_data_from;
167 asoc->peer.sack_needed = 1;
169 ctsn = sctp_tsnmap_get_ctsn(&asoc->peer.tsn_map);
170 max_tsn_seen = sctp_tsnmap_get_max_tsn_seen(&asoc->peer.tsn_map);
183 asoc->peer.sack_needed = 1;
193 if (!asoc->peer.sack_needed) {
194 asoc->peer.sack_cnt++;
203 if (asoc->peer
245 sctp_generate_t3_rtx_event(unsigned long peer) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source/gsoap/
H A DLeafNets.h59 ns5 = "urn:com.leafnets.ds.peer"
67 //gsoap ns5 schema namespace: urn:com.leafnets.ds.peer
221 /// "urn:com.leafnets.ds.peer":PeerAccess is a complexType.
232 /// "urn:com.leafnets.ds.peer":PeerAssist is a complexType.
247 /// "urn:com.leafnets.ds.peer":PeerAssistAttr is a complexType.
258 /// "urn:com.leafnets.ds.peer":PeerEvent is an abstract complexType.
271 /// "urn:com.leafnets.ds.peer":PeerConnection is a complexType.
296 /// "urn:com.leafnets.ds.peer":PeerConnectionConnectStatus is a complexType.
301 /// "urn:com.leafnets.ds.peer":PeerConnectionConnectedStatus is a complexType.
306 /// "urn:com.leafnets.ds.peer"
526 char* peer ; ///< Nullable pointer. member in struct:ns5__PeerConnectBusyEvent
553 char* peer ; ///< Nullable pointer. member in struct:ns5__PeerConnectErrorEvent
580 char* peer ; ///< Nullable pointer. member in struct:ns5__PeerConnectEvent
609 char* peer ; ///< Nullable pointer. member in struct:ns5__PeerConnectRejectEvent
640 char* peer ; ///< Nullable pointer. member in struct:ns5__PeerConnectRequestEvent
665 char* peer ; ///< Nullable pointer. member in struct:ns5__PeerConnectedEvent
690 char* peer ; ///< Nullable pointer. member in struct:ns5__PeerDisconnectedEvent
717 char* peer ; ///< Nullable pointer. member in struct:ns5__PeerSynPktEvent
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/examples_java/src/db/repquote/
H A DRepConfig.java74 public void addOtherHost(String host, int port, boolean peer) argument
78 RepRemoteHost newHost = new RepRemoteHost(newInfo, peer);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/evp/
H A Dpmeth_fn.c269 int EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer) argument
287 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 0, peer);
300 if (ctx->pkey->type != peer->type) {
306 * ran@cryptocom.ru: For clarity. The error is if parameters in peer are
312 if (!EVP_PKEY_missing_parameters(peer) &&
313 !EVP_PKEY_cmp_parameters(ctx->pkey, peer)) {
320 ctx->peerkey = peer;
322 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 1, peer);
329 CRYPTO_add(&peer->references, 1, CRYPTO_LOCK_EVP_PKEY);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/evp/
H A Dpmeth_fn.c269 int EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer) argument
287 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 0, peer);
300 if (ctx->pkey->type != peer->type) {
306 * ran@cryptocom.ru: For clarity. The error is if parameters in peer are
312 if (!EVP_PKEY_missing_parameters(peer) &&
313 !EVP_PKEY_cmp_parameters(ctx->pkey, peer)) {
320 ctx->peerkey = peer;
322 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 1, peer);
329 CRYPTO_add(&peer->references, 1, CRYPTO_LOCK_EVP_PKEY);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/gsoap/
H A DLeafNets.h59 ns5 = "urn:com.leafnets.ds.peer"
67 //gsoap ns5 schema namespace: urn:com.leafnets.ds.peer
221 /// "urn:com.leafnets.ds.peer":PeerAccess is a complexType.
232 /// "urn:com.leafnets.ds.peer":PeerAssist is a complexType.
247 /// "urn:com.leafnets.ds.peer":PeerAssistAttr is a complexType.
258 /// "urn:com.leafnets.ds.peer":PeerEvent is an abstract complexType.
271 /// "urn:com.leafnets.ds.peer":PeerConnection is a complexType.
296 /// "urn:com.leafnets.ds.peer":PeerConnectionConnectStatus is a complexType.
301 /// "urn:com.leafnets.ds.peer":PeerConnectionConnectedStatus is a complexType.
306 /// "urn:com.leafnets.ds.peer"
526 char* peer ; ///< Nullable pointer. member in struct:ns5__PeerConnectBusyEvent
553 char* peer ; ///< Nullable pointer. member in struct:ns5__PeerConnectErrorEvent
580 char* peer ; ///< Nullable pointer. member in struct:ns5__PeerConnectEvent
609 char* peer ; ///< Nullable pointer. member in struct:ns5__PeerConnectRejectEvent
640 char* peer ; ///< Nullable pointer. member in struct:ns5__PeerConnectRequestEvent
665 char* peer ; ///< Nullable pointer. member in struct:ns5__PeerConnectedEvent
690 char* peer ; ///< Nullable pointer. member in struct:ns5__PeerDisconnectedEvent
717 char* peer ; ///< Nullable pointer. member in struct:ns5__PeerSynPktEvent
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/src/router/busybox-1.x/networking/libiproute/
H A Dlibnetlink.h15 struct sockaddr_nl peer; member in struct:rtnl_handle
27 extern int rtnl_talk(struct rtnl_handle *rtnl, struct nlmsghdr *n, pid_t peer,
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iputils/
H A Dtftpd.c80 int peer; variable
189 peer = socket(from.sa.sa_family, SOCK_DGRAM, 0);
190 if (peer < 0) {
194 if (connect(peer, (struct sockaddr *)&from, sizeof(from)) < 0) {
372 if (send(peer, dp, size + 4, confirmed) != size + 4) {
380 n = recv(peer, ackbuf, sizeof (ackbuf), 0);
398 synchnet(peer);
437 if (send(peer, ackbuf, 4, confirmed) != 4) {
445 n = recv(peer, dp, PKTSIZE, 0);
461 (void) synchnet(peer);
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/transmission/transmission-2.73/libtransmission/
H A Dpeer-mgr.h10 * $Id: peer-mgr.h 13361 2012-07-01 02:17:35Z jordan $
29 #include "peer-common.h" /* struct peer_request */
44 /* true if the peer supports encryption */
47 /* true if the peer is a seed or partial seed */
50 /* true if the peer supports uTP */
53 /* true if the peer has holepunch support */
56 /* true if the peer telling us about this peer
84 * State information about a connected peer.
103 /* how many requests the peer ha
[all...]
H A Dpeer-common.h10 * $Id: peer-common.h 12204 2011-03-22 15:19:54Z jordan $
35 /** when we're making requests from another peer,
86 typedef void tr_peer_callback( struct tr_peer * peer,
H A Dpeer-msgs.h10 * $Id: peer-msgs.h 12411 2011-05-01 19:10:34Z jordan $
21 #include "peer-common.h"
36 struct tr_peer * peer,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/l2tpd-0.69/
H A Dcall.c32 struct buffer *new_payload (struct sockaddr_in peer) argument
37 tmp->peer = peer;
43 inline void recycle_payload (struct buffer *buf, struct sockaddr_in peer) argument
47 buf->peer = peer;
323 IPADDY (c->container->peer.sin_addr),
324 ntohs (c->container->peer.sin_port), c->errormsg);
385 c->ourcid, IPADDY (c->container->peer.sin_addr));
659 st->peer
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/zebra/bgpd/
H A Dbgp_nexthop.c233 bgp_nexthop_lookup_ipv6 (struct peer *peer, struct bgp_info *ri, int *changed,
321 bgp_nexthop_lookup (afi_t afi, struct peer *peer, struct bgp_info *ri,
338 return bgp_nexthop_lookup_ipv6 (peer, ri, changed, metricchanged);
429 struct peer *peer;
448 LIST_LOOP (bgp->peer, peer, nn)
450 if (peer
230 bgp_nexthop_lookup_ipv6(struct peer *peer, struct bgp_info *ri, int *changed, int *metricchanged) argument
318 bgp_nexthop_lookup(afi_t afi, struct peer *peer, struct bgp_info *ri, int *changed, int *metricchanged) argument
426 struct peer *peer; local
525 struct peer *peer; local
1209 bgp_multiaccess_check_v4(struct in_addr nexthop, char *peer) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/tests/server/
H A Dtftpd.c200 static curl_socket_t peer = CURL_SOCKET_BAD; variable
851 peer = socket(AF_INET, SOCK_DGRAM, 0);
852 if(CURL_SOCKET_BAD == peer) {
857 if(connect(peer, &from.sa, sizeof(from.sa4)) < 0) {
866 peer = socket(AF_INET6, SOCK_DGRAM, 0);
867 if(CURL_SOCKET_BAD == peer) {
872 if(connect(peer, &from.sa, sizeof(from.sa6)) < 0) {
891 sclose(peer);
892 peer = CURL_SOCKET_BAD;
916 if((peer !
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/rxrpc/
H A DMakefile17 ar-peer.o \

Completed in 180 milliseconds

1234567891011>>