Lines Matching refs:peer
422 /* Tell peer that we'll do ECN only if peer advertised such cap. */
423 if (asoc->peer.ecn_capable)
426 if (asoc->peer.prsctp_capable)
429 if (asoc->peer.asconf_capable) {
435 if (asoc->peer.reconf_capable) {
443 if (asoc->peer.intl_capable) {
448 if (asoc->peer.auth_capable) {
494 if (asoc->peer.ecn_capable)
502 if (asoc->peer.prsctp_capable)
512 if (asoc->peer.auth_capable) {
536 * It is sent by the initiator of an association to its peer to complete
574 cookie = asoc->peer.cookie;
575 cookie_len = asoc->peer.cookie_len;
648 * its next outbound TCP segment to indicate to its peer that it has
756 struct sctp_tsnmap *map = (struct sctp_tsnmap *)&asoc->peer.tsn_map;
819 retval->transport = asoc->peer.last_data_from;
843 if (++asoc->peer.sack_generation == 0) {
844 list_for_each_entry(trans, &asoc->peer.transport_addr_list,
847 asoc->peer.sack_generation = 1;
862 ctsn = sctp_tsnmap_get_ctsn(&chunk->asoc->peer.tsn_map);
864 ctsn = sctp_tsnmap_get_ctsn(&asoc->peer.tsn_map);
1288 /* Get the first hmac that the peer told us to use */
1655 cookie->c.prsctp_capable = asoc->peer.prsctp_capable;
1658 cookie->c.adaptation_ind = asoc->peer.adaptation_ind;
1664 /* Copy the peer's init packet. */
1721 * There must be enough room for our cookie and our peer's
1822 /* Set up our peer's port number. */
1823 retval->peer.port = ntohs(chunk->sctp_hdr->source);
1846 retval->peer.prsctp_capable = retval->c.prsctp_capable;
1847 retval->peer.adaptation_ind = retval->c.adaptation_ind;
1942 * send back an indicator to the peer.
2011 asoc->peer.reconf_capable = 1;
2015 asoc->peer.prsctp_capable = 1;
2018 /* if the peer reports AUTH, assume that he
2022 asoc->peer.auth_capable = 1;
2027 asoc->peer.asconf_capable = 1;
2031 asoc->peer.intl_capable = 1;
2090 * triggered to the peer and the association
2165 /* Tell the peer, we won't support this param. */
2361 if (asoc->peer.auth_capable && (!asoc->peer.peer_random ||
2362 !asoc->peer.peer_hmacs))
2363 asoc->peer.auth_capable = 0;
2365 /* In a non-backward compatible mode, if the peer claims
2372 (asoc->peer.asconf_capable && !asoc->peer.auth_capable)) {
2373 asoc->peer.addip_disabled_mask |= (SCTP_PARAM_ADD_IP |
2376 asoc->peer.asconf_capable = 0;
2381 list_for_each_safe(pos, temp, &asoc->peer.transport_addr_list) {
2391 asoc->peer.i.init_tag =
2393 asoc->peer.i.a_rwnd =
2395 asoc->peer.i.num_outbound_streams =
2397 asoc->peer.i.num_inbound_streams =
2399 asoc->peer.i.initial_tsn =
2402 asoc->strreset_inseq = asoc->peer.i.initial_tsn;
2404 /* Apply the upper bounds for output streams based on peer's
2420 asoc->c.peer_vtag = asoc->peer.i.init_tag;
2422 /* Peer Rwnd : Current calculated value of the peer's rwnd. */
2423 asoc->peer.rwnd = asoc->peer.i.a_rwnd;
2429 list_for_each_entry(transport, &asoc->peer.transport_addr_list,
2431 transport->ssthresh = asoc->peer.i.a_rwnd;
2435 if (!sctp_tsnmap_init(&asoc->peer.tsn_map, SCTP_TSN_MAP_INITIAL,
2436 asoc->peer.i.initial_tsn, gfp))
2467 asoc->peer.addip_serial = asoc->peer.i.initial_tsn - 1;
2472 list_for_each_safe(pos, temp, &asoc->peer.transport_addr_list) {
2526 if (!af->from_addr_param(&addr, param.addr, htons(asoc->peer.port), 0))
2552 * ones are really set by the peer.
2554 asoc->peer.ipv4_address = 0;
2555 asoc->peer.ipv6_address = 0;
2557 /* Assume that peer supports the address family
2561 asoc->peer.ipv6_address = 1;
2563 asoc->peer.ipv4_address = 1;
2573 asoc->peer.ipv4_address = 1;
2578 asoc->peer.ipv6_address = 1;
2582 asoc->peer.hostname_address = 1;
2592 asoc->peer.cookie_len =
2594 kfree(asoc->peer.cookie);
2595 asoc->peer.cookie = kmemdup(param.cookie->body, asoc->peer.cookie_len, gfp);
2596 if (!asoc->peer.cookie)
2610 asoc->peer.ecn_capable = 1;
2618 asoc->peer.adaptation_ind = ntohl(param.aind->adaptation_ind);
2632 htons(asoc->peer.port), 0))
2651 asoc->peer.prsctp_capable = 1;
2661 /* Save peer's random parameter */
2662 kfree(asoc->peer.peer_random);
2663 asoc->peer.peer_random = kmemdup(param.p,
2665 if (!asoc->peer.peer_random) {
2675 /* Save peer's HMAC list */
2676 kfree(asoc->peer.peer_hmacs);
2677 asoc->peer.peer_hmacs = kmemdup(param.p,
2679 if (!asoc->peer.peer_hmacs) {
2684 /* Set the default HMAC the peer requested*/
2692 kfree(asoc->peer.peer_chunks);
2693 asoc->peer.peer_chunks = kmemdup(param.p,
2695 if (!asoc->peer.peer_chunks)
3020 struct sctp_transport *peer;
3033 if (!asoc->peer.ipv6_address)
3037 if (!asoc->peer.ipv4_address)
3048 if (!af->from_addr_param(&addr, addr_param, htons(asoc->peer.port), 0))
3081 peer = sctp_assoc_add_peer(asoc, &addr, GFP_ATOMIC, SCTP_UNCONFIRMED);
3082 if (!peer)
3086 sctp_transport_reset_hb_timer(peer);
3087 asoc->new_transport = peer;
3091 * last remaining IP address of a peer endpoint, the receiver
3095 if (asoc->peer.transport_count == 1)
3110 * addresses of the peer except the source address of the
3125 peer = sctp_assoc_lookup_paddr(asoc, &addr);
3126 if (!peer)
3129 sctp_assoc_rm_peer(asoc, peer);
3146 peer = sctp_assoc_lookup_paddr(asoc, &addr);
3147 if (!peer)
3150 sctp_assoc_set_primary(asoc, peer);
3297 asoc->peer.addip_serial++;
3340 list_for_each_entry(transport, &asoc->peer.transport_addr_list,
3354 list_for_each_entry(transport, &asoc->peer.transport_addr_list,
3487 asoc->peer.addip_disabled_mask |=
3508 sctp_transport_immediate_rtx(asoc->peer.primary_path);