/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/bio/ |
H A D | bss_bio.c | 57 * of this kind, handled by the same thread (i.e. the "peer" is actually 127 BIO *peer; /* NULL if buf == NULL. member in struct:bio_bio_st 128 * If peer != NULL, then peer->ptr is also a bio_bio_st, 129 * and its "peer" member points back to us. 130 * peer != NULL iff init != 0 in the BIO. */ 132 /* This is for what we write (i.e. reading uses peer's struct): */ 133 int closed; /* valid iff peer != NULL */ 134 size_t len; /* valid iff buf != NULL; 0 if peer == NULL */ 139 size_t request; /* valid iff peer ! [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/bio/ |
H A D | bss_bio.c | 58 * kind, handled by the same thread (i.e. the "peer" is actually ourselves, 126 BIO *peer; /* NULL if buf == NULL. If peer != NULL, then member in struct:bio_bio_st 127 * peer->ptr is also a bio_bio_st, and its 128 * "peer" member points back to us. peer != 130 /* This is for what we write (i.e. reading uses peer's struct): */ 131 int closed; /* valid iff peer != NULL */ 132 size_t len; /* valid iff buf != NULL; 0 if peer == NULL */ 136 size_t request; /* valid iff peer ! [all...] |
H A D | bss_dgram.c | 163 } peer; member in struct:bio_dgram_data_st 185 } peer; member in struct:bio_dgram_sctp_data_st 389 } peer; member in struct:__anon4345 393 sa.len.i = sizeof(sa.peer); 397 memset(&sa.peer, 0x00, sizeof(sa.peer)); 399 ret = recvfrom(b->num, out, outl, 0, &sa.peer.sa, (void *)&sa.len); 401 OPENSSL_assert(sa.len.s <= sizeof(sa.peer)); 406 BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, &sa.peer); 430 int peerlen = sizeof(data->peer); [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/bio/ |
H A D | bss_bio.c | 58 * kind, handled by the same thread (i.e. the "peer" is actually ourselves, 126 BIO *peer; /* NULL if buf == NULL. If peer != NULL, then member in struct:bio_bio_st 127 * peer->ptr is also a bio_bio_st, and its 128 * "peer" member points back to us. peer != 130 /* This is for what we write (i.e. reading uses peer's struct): */ 131 int closed; /* valid iff peer != NULL */ 132 size_t len; /* valid iff buf != NULL; 0 if peer == NULL */ 136 size_t request; /* valid iff peer ! [all...] |
H A D | bss_dgram.c | 163 } peer; member in struct:bio_dgram_data_st 185 } peer; member in struct:bio_dgram_sctp_data_st 389 } peer; member in struct:__anon4694 393 sa.len.i = sizeof(sa.peer); 397 memset(&sa.peer, 0x00, sizeof(sa.peer)); 399 ret = recvfrom(b->num, out, outl, 0, &sa.peer.sa, (void *)&sa.len); 401 OPENSSL_assert(sa.len.s <= sizeof(sa.peer)); 406 BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, &sa.peer); 430 int peerlen = sizeof(data->peer); [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/ |
H A D | s_cb.c | 1017 } peer; local 1028 /* Read peer information */ 1029 (void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer); local 1031 /* Create buffer with peer's address and port */ 1033 switch (peer.sa.sa_family) { 1036 length += sizeof(peer.s4.sin_port); 1041 length += sizeof(peer.s6.sin6_port); 1055 switch (peer.sa.sa_family) { 1057 memcpy(buffer, &peer.s4.sin_port, sizeof(peer 1095 } peer; local 1102 (void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer); local 1475 X509 *peer; local [all...] |
H A D | sess_id.c | 93 X509 *peer = NULL; local 161 peer = SSL_SESSION_get0_peer(x); 219 if (peer == NULL) 222 X509_print(out, peer); 239 } else if (!noout && (peer != NULL)) { /* just print the certificate */ 241 i = (int)i2d_X509_bio(out, peer); 243 i = PEM_write_bio_X509(out, peer);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/ |
H A D | s_cb.c | 1017 } peer; local 1028 /* Read peer information */ 1029 (void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer); local 1031 /* Create buffer with peer's address and port */ 1033 switch (peer.sa.sa_family) { 1036 length += sizeof(peer.s4.sin_port); 1041 length += sizeof(peer.s6.sin6_port); 1055 switch (peer.sa.sa_family) { 1057 memcpy(buffer, &peer.s4.sin_port, sizeof(peer 1095 } peer; local 1102 (void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer); local 1475 X509 *peer; local [all...] |
H A D | sess_id.c | 93 X509 *peer = NULL; local 161 peer = SSL_SESSION_get0_peer(x); 219 if (peer == NULL) 222 X509_print(out, peer); 239 } else if (!noout && (peer != NULL)) { /* just print the certificate */ 241 i = (int)i2d_X509_bio(out, peer); 243 i = PEM_write_bio_X509(out, peer);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/sctp/ |
H A D | sm_make_chunk.c | 389 /* Tell peer that we'll do ECN only if peer advertised such cap. */ 390 if (asoc->peer.ecn_capable) 393 if (asoc->peer.prsctp_capable) 396 if (asoc->peer.asconf_capable) { 405 if (asoc->peer.auth_capable) { 449 if (asoc->peer.ecn_capable) 459 if (asoc->peer.prsctp_capable) 469 if (asoc->peer.auth_capable) { 493 * It is sent by the initiator of an association to its peer t 2883 struct sctp_transport *peer; local [all...] |
H A D | sm_sideeffect.c | 96 * its peer that it has reduced its congestion window. This 111 * and then ACK our peer that we we've done so by 161 struct sctp_transport *trans = asoc->peer.last_data_from; 167 asoc->peer.sack_needed = 1; 169 ctsn = sctp_tsnmap_get_ctsn(&asoc->peer.tsn_map); 170 max_tsn_seen = sctp_tsnmap_get_max_tsn_seen(&asoc->peer.tsn_map); 183 asoc->peer.sack_needed = 1; 193 if (!asoc->peer.sack_needed) { 194 asoc->peer.sack_cnt++; 203 if (asoc->peer 245 sctp_generate_t3_rtx_event(unsigned long peer) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source/gsoap/ |
H A D | LeafNets.h | 59 ns5 = "urn:com.leafnets.ds.peer" 67 //gsoap ns5 schema namespace: urn:com.leafnets.ds.peer 221 /// "urn:com.leafnets.ds.peer":PeerAccess is a complexType. 232 /// "urn:com.leafnets.ds.peer":PeerAssist is a complexType. 247 /// "urn:com.leafnets.ds.peer":PeerAssistAttr is a complexType. 258 /// "urn:com.leafnets.ds.peer":PeerEvent is an abstract complexType. 271 /// "urn:com.leafnets.ds.peer":PeerConnection is a complexType. 296 /// "urn:com.leafnets.ds.peer":PeerConnectionConnectStatus is a complexType. 301 /// "urn:com.leafnets.ds.peer":PeerConnectionConnectedStatus is a complexType. 306 /// "urn:com.leafnets.ds.peer" 526 char* peer ; ///< Nullable pointer. member in struct:ns5__PeerConnectBusyEvent 553 char* peer ; ///< Nullable pointer. member in struct:ns5__PeerConnectErrorEvent 580 char* peer ; ///< Nullable pointer. member in struct:ns5__PeerConnectEvent 609 char* peer ; ///< Nullable pointer. member in struct:ns5__PeerConnectRejectEvent 640 char* peer ; ///< Nullable pointer. member in struct:ns5__PeerConnectRequestEvent 665 char* peer ; ///< Nullable pointer. member in struct:ns5__PeerConnectedEvent 690 char* peer ; ///< Nullable pointer. member in struct:ns5__PeerDisconnectedEvent 717 char* peer ; ///< Nullable pointer. member in struct:ns5__PeerSynPktEvent [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/examples_java/src/db/repquote/ |
H A D | RepConfig.java | 74 public void addOtherHost(String host, int port, boolean peer) argument 78 RepRemoteHost newHost = new RepRemoteHost(newInfo, peer);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/evp/ |
H A D | pmeth_fn.c | 269 int EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer) argument 287 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 0, peer); 300 if (ctx->pkey->type != peer->type) { 306 * ran@cryptocom.ru: For clarity. The error is if parameters in peer are 312 if (!EVP_PKEY_missing_parameters(peer) && 313 !EVP_PKEY_cmp_parameters(ctx->pkey, peer)) { 320 ctx->peerkey = peer; 322 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 1, peer); 329 CRYPTO_add(&peer->references, 1, CRYPTO_LOCK_EVP_PKEY);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/evp/ |
H A D | pmeth_fn.c | 269 int EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer) argument 287 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 0, peer); 300 if (ctx->pkey->type != peer->type) { 306 * ran@cryptocom.ru: For clarity. The error is if parameters in peer are 312 if (!EVP_PKEY_missing_parameters(peer) && 313 !EVP_PKEY_cmp_parameters(ctx->pkey, peer)) { 320 ctx->peerkey = peer; 322 ret = ctx->pmeth->ctrl(ctx, EVP_PKEY_CTRL_PEER_KEY, 1, peer); 329 CRYPTO_add(&peer->references, 1, CRYPTO_LOCK_EVP_PKEY);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/gsoap/ |
H A D | LeafNets.h | 59 ns5 = "urn:com.leafnets.ds.peer" 67 //gsoap ns5 schema namespace: urn:com.leafnets.ds.peer 221 /// "urn:com.leafnets.ds.peer":PeerAccess is a complexType. 232 /// "urn:com.leafnets.ds.peer":PeerAssist is a complexType. 247 /// "urn:com.leafnets.ds.peer":PeerAssistAttr is a complexType. 258 /// "urn:com.leafnets.ds.peer":PeerEvent is an abstract complexType. 271 /// "urn:com.leafnets.ds.peer":PeerConnection is a complexType. 296 /// "urn:com.leafnets.ds.peer":PeerConnectionConnectStatus is a complexType. 301 /// "urn:com.leafnets.ds.peer":PeerConnectionConnectedStatus is a complexType. 306 /// "urn:com.leafnets.ds.peer" 526 char* peer ; ///< Nullable pointer. member in struct:ns5__PeerConnectBusyEvent 553 char* peer ; ///< Nullable pointer. member in struct:ns5__PeerConnectErrorEvent 580 char* peer ; ///< Nullable pointer. member in struct:ns5__PeerConnectEvent 609 char* peer ; ///< Nullable pointer. member in struct:ns5__PeerConnectRejectEvent 640 char* peer ; ///< Nullable pointer. member in struct:ns5__PeerConnectRequestEvent 665 char* peer ; ///< Nullable pointer. member in struct:ns5__PeerConnectedEvent 690 char* peer ; ///< Nullable pointer. member in struct:ns5__PeerDisconnectedEvent 717 char* peer ; ///< Nullable pointer. member in struct:ns5__PeerSynPktEvent [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/src/router/busybox-1.x/networking/libiproute/ |
H A D | libnetlink.h | 15 struct sockaddr_nl peer; member in struct:rtnl_handle 27 extern int rtnl_talk(struct rtnl_handle *rtnl, struct nlmsghdr *n, pid_t peer,
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iputils/ |
H A D | tftpd.c | 80 int peer; variable 189 peer = socket(from.sa.sa_family, SOCK_DGRAM, 0); 190 if (peer < 0) { 194 if (connect(peer, (struct sockaddr *)&from, sizeof(from)) < 0) { 372 if (send(peer, dp, size + 4, confirmed) != size + 4) { 380 n = recv(peer, ackbuf, sizeof (ackbuf), 0); 398 synchnet(peer); 437 if (send(peer, ackbuf, 4, confirmed) != 4) { 445 n = recv(peer, dp, PKTSIZE, 0); 461 (void) synchnet(peer); [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/transmission/transmission-2.73/libtransmission/ |
H A D | peer-mgr.h | 10 * $Id: peer-mgr.h 13361 2012-07-01 02:17:35Z jordan $ 29 #include "peer-common.h" /* struct peer_request */ 44 /* true if the peer supports encryption */ 47 /* true if the peer is a seed or partial seed */ 50 /* true if the peer supports uTP */ 53 /* true if the peer has holepunch support */ 56 /* true if the peer telling us about this peer 84 * State information about a connected peer. 103 /* how many requests the peer ha [all...] |
H A D | peer-common.h | 10 * $Id: peer-common.h 12204 2011-03-22 15:19:54Z jordan $ 35 /** when we're making requests from another peer, 86 typedef void tr_peer_callback( struct tr_peer * peer,
|
H A D | peer-msgs.h | 10 * $Id: peer-msgs.h 12411 2011-05-01 19:10:34Z jordan $ 21 #include "peer-common.h" 36 struct tr_peer * peer,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/l2tpd-0.69/ |
H A D | call.c | 32 struct buffer *new_payload (struct sockaddr_in peer) argument 37 tmp->peer = peer; 43 inline void recycle_payload (struct buffer *buf, struct sockaddr_in peer) argument 47 buf->peer = peer; 323 IPADDY (c->container->peer.sin_addr), 324 ntohs (c->container->peer.sin_port), c->errormsg); 385 c->ourcid, IPADDY (c->container->peer.sin_addr)); 659 st->peer [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/zebra/bgpd/ |
H A D | bgp_nexthop.c | 233 bgp_nexthop_lookup_ipv6 (struct peer *peer, struct bgp_info *ri, int *changed, 321 bgp_nexthop_lookup (afi_t afi, struct peer *peer, struct bgp_info *ri, 338 return bgp_nexthop_lookup_ipv6 (peer, ri, changed, metricchanged); 429 struct peer *peer; 448 LIST_LOOP (bgp->peer, peer, nn) 450 if (peer 230 bgp_nexthop_lookup_ipv6(struct peer *peer, struct bgp_info *ri, int *changed, int *metricchanged) argument 318 bgp_nexthop_lookup(afi_t afi, struct peer *peer, struct bgp_info *ri, int *changed, int *metricchanged) argument 426 struct peer *peer; local 525 struct peer *peer; local 1209 bgp_multiaccess_check_v4(struct in_addr nexthop, char *peer) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/tests/server/ |
H A D | tftpd.c | 200 static curl_socket_t peer = CURL_SOCKET_BAD; variable 851 peer = socket(AF_INET, SOCK_DGRAM, 0); 852 if(CURL_SOCKET_BAD == peer) { 857 if(connect(peer, &from.sa, sizeof(from.sa4)) < 0) { 866 peer = socket(AF_INET6, SOCK_DGRAM, 0); 867 if(CURL_SOCKET_BAD == peer) { 872 if(connect(peer, &from.sa, sizeof(from.sa6)) < 0) { 891 sclose(peer); 892 peer = CURL_SOCKET_BAD; 916 if((peer ! [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/rxrpc/ |
H A D | Makefile | 17 ar-peer.o \
|