/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/rxrpc/ |
H A D | ar-key.c | 86 plen = sizeof(*token) + sizeof(*token->kad) + tktlen; 96 token->kad = kmalloc(plen, GFP_KERNEL); 97 if (!token->kad) { 103 token->kad->ticket_len = tktlen; 104 token->kad->vice_id = ntohl(xdr[0]); 105 token->kad->kvno = ntohl(xdr[1]); 106 token->kad->start = ntohl(xdr[4]); 107 token->kad->expiry = ntohl(xdr[5]); 108 token->kad->primary_flag = ntohl(xdr[6]); 109 memcpy(&token->kad [all...] |
H A D | rxkad.c | 80 if (crypto_blkcipher_setkey(ci, token->kad->session_key, 81 sizeof(token->kad->session_key)) < 0) 129 memcpy(&iv, token->kad->session_key, sizeof(iv)); 225 memcpy(&iv, token->kad->session_key, sizeof(iv)); 437 memcpy(&iv, token->kad->session_key, sizeof(iv)); 802 resp.kvno = htonl(token->kad->kvno); 803 resp.ticket_len = htonl(token->kad->ticket_len); 807 rxkad_encrypt_response(conn, &resp, token->kad); 808 return rxkad_send_response(conn, &sp->hdr, &resp, token->kad);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/aMule-2.3.1/src/ |
H A D | EncryptedDatagramSocket.cpp | 160 // if kad never run, no point in checking anything except for ed2k encryption 166 bool kad = false; local 173 // kad packet with NodeID as key 174 kad = true; 183 kad = false; 191 // kad packet with ReceiverKey as key 192 kad = true; 208 } while (value != MAGICVALUE_UDP_SYNC_CLIENT && tries > 0); // try to decrypt as ed2k as well as kad packet if needed (max 3 rounds) 215 // DebugLog(_T("Received obfuscated UDP packet from clientIP: %s with wrong key marker bits (kad packet, ed2k bit)"), ipstr(dwIP)); 217 // DebugLog(_T("Received obfuscated UDP packet from clientIP: %s with wrong key marker bits (kad packe 264 EncryptSendClient(uint8_t **buf, int bufLen, const uint8_t *clientHashOrKadID, bool kad, uint32_t receiverVerifyKey, uint32_t senderVerifyKey) argument [all...] |
H A D | EncryptedDatagramSocket.h | 40 static int EncryptSendClient(uint8_t **buf, int bufLen, const uint8_t *clientHashOrKadID, bool kad, uint32_t receiverVerifyKey, uint32_t senderVerifyKey);
|
H A D | ClientList.cpp | 30 #include <protocol/kad/Client2Client/UDP.h> 31 #include <protocol/kad/Constants.h> 889 } else if (IsKadFirewallCheckIP(nContactIP)) { // doing a kad firewall check with this IP, abort 913 } else if (IsKadFirewallCheckIP(nContactIP)) { // doing a kad firewall check with this IP, abort 1025 CFormat(wxT("Debug: Not deleted client %x with kad state: %i ip: %s")) 1033 CFormat(wxT("Debug: Not deleted client %x with kad version: %i"))
|
H A D | SearchList.cpp | 29 #include <protocol/kad/Constants.h>
|
H A D | SharedFileList.cpp | 29 #include <protocol/kad/Constants.h> 528 /* This file keywords must not be published to kad anymore */
|
H A D | KnownFile.cpp | 31 #include <protocol/kad/Constants.h>
|
H A D | DownloadQueue.cpp | 29 #include <protocol/kad/Constants.h>
|
H A D | BaseClient.cpp | 36 #include <protocol/kad/Client2Client/UDP.h> 1047 tagcount ++; // eMule misc flags 2 (kad version) 1143 // direct callback is only possible if connected to kad, tcp firewalled and verified UDP open (for example on a full cone NAT)
|
H A D | PartFile.cpp | 34 #include <protocol/kad/Constants.h>
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/keys/ |
H A D | rxrpc-type.h | 93 struct rxkad_key *kad; member in union:rxrpc_key_token::__anon17196
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/aMule-2.3.1/src/webserver/default/ |
H A D | Makefile.am | 3 amuleweb-main-kad.php \
|
H A D | Makefile.in | 316 amuleweb-main-kad.php \
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/aMule-2.3.1/src/kademlia/kademlia/ |
H A D | Prefs.h | 44 #include <protocol/kad/Constants.h>
|
H A D | Kademlia.cpp | 41 #include <protocol/kad/Constants.h> 438 // Modify count by 40% for >= 0.49b if we are firewalled ourself (the actual Firewalled count at this date on kad is 35-55%)
|
H A D | Indexed.cpp | 44 #include <protocol/kad/Constants.h> 45 #include <protocol/kad/Client2Client/UDP.h>
|
H A D | Entry.cpp | 42 #include <protocol/kad/Constants.h> 575 // kad shutdown is speed up a bit
|
H A D | Search.cpp | 43 #include <protocol/kad/Client2Client/UDP.h> 44 #include <protocol/kad/Constants.h>
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/aMule-2.3.1/src/kademlia/net/ |
H A D | PacketTracking.cpp | 36 #include <protocol/kad/Client2Client/UDP.h>
|
H A D | KademliaUDPListener.cpp | 40 #include <protocol/kad/Constants.h> 41 #include <protocol/kad/Client2Client/UDP.h> 1486 // 0.49+ (kad version 7) sends additionally its connect options so we know whether to use an obfuscated connection
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/aMule-2.3.1/src/webserver/src/ |
H A D | php_amule_lib.cpp | 255 PHP_VAR_NODE *kad = array_get_by_str_key(result, "kad_connected"); local 256 value_value_free(&kad->value); 257 kad->value.type = PHP_VAL_BOOL; 259 kad->value.int_val = 1; 264 kad->value.int_val = 0;
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/easycap/ |
H A D | easycap_main.c | 1020 int kex, kad, mex, mad, rex, rad, rad2; local 1076 kad = peasycap->frame_fill; mad = 0; 1079 pad = peasycap->frame_buffer[kad][0].pgo; rad = PAGE_SIZE; 1179 pad = peasycap->frame_buffer[kad][mad].pgo; 1199 [kad][mad].pgo; 1289 pad = peasycap->frame_buffer[kad][mad].pgo; 1357 JOT(8, "+++++ field2frame(): frame buffer %i is full\n", kad);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/aMule-2.3.1/src/kademlia/routing/ |
H A D | RoutingZone.cpp | 51 #include <protocol/kad/Client2Client/UDP.h> 171 // Don't read version 0 nodes.dat files, because they can't tell the kad version of the contacts stored. 459 AddDebugLogLineN(logKadRouting, CFormat(wxT("Updated kad contact refreshtimer only for legacy kad2 contact (%s, %u)")) % KadIPToString(contactUpdate->GetIPAddress()) % contactUpdate->GetVersion()); 737 // Modify count by 40% for >= 0.49b if we are firewalled ourself (the actual Firewalled count at this date on kad is 35-55%)
|