Lines Matching refs:peer

422 	/* Tell peer that we'll do ECN only if peer advertised such cap.  */
423 if (asoc->peer.ecn_capable)
426 if (asoc->peer.prsctp_capable)
429 if (asoc->peer.asconf_capable) {
435 if (asoc->peer.reconf_capable) {
443 if (asoc->peer.intl_capable) {
448 if (asoc->peer.auth_capable) {
494 if (asoc->peer.ecn_capable)
502 if (asoc->peer.prsctp_capable)
512 if (asoc->peer.auth_capable) {
536 * It is sent by the initiator of an association to its peer to complete
574 cookie = asoc->peer.cookie;
575 cookie_len = asoc->peer.cookie_len;
648 * its next outbound TCP segment to indicate to its peer that it has
756 struct sctp_tsnmap *map = (struct sctp_tsnmap *)&asoc->peer.tsn_map;
819 retval->transport = asoc->peer.last_data_from;
843 if (++asoc->peer.sack_generation == 0) {
844 list_for_each_entry(trans, &asoc->peer.transport_addr_list,
847 asoc->peer.sack_generation = 1;
861 ctsn = sctp_tsnmap_get_ctsn(&asoc->peer.tsn_map);
1333 /* Get the first hmac that the peer told us to use */
1700 cookie->c.prsctp_capable = asoc->peer.prsctp_capable;
1703 cookie->c.adaptation_ind = asoc->peer.adaptation_ind;
1709 /* Copy the peer's init packet. */
1766 * There must be enough room for our cookie and our peer's
1867 /* Set up our peer's port number. */
1868 retval->peer.port = ntohs(chunk->sctp_hdr->source);
1891 retval->peer.prsctp_capable = retval->c.prsctp_capable;
1892 retval->peer.adaptation_ind = retval->c.adaptation_ind;
1987 * send back an indicator to the peer.
2056 asoc->peer.reconf_capable = 1;
2060 asoc->peer.prsctp_capable = 1;
2063 /* if the peer reports AUTH, assume that he
2067 asoc->peer.auth_capable = 1;
2072 asoc->peer.asconf_capable = 1;
2076 asoc->peer.intl_capable = 1;
2135 * triggered to the peer and the association
2407 if (asoc->peer.auth_capable && (!asoc->peer.peer_random ||
2408 !asoc->peer.peer_hmacs))
2409 asoc->peer.auth_capable = 0;
2411 /* In a non-backward compatible mode, if the peer claims
2418 (asoc->peer.asconf_capable && !asoc->peer.auth_capable)) {
2419 asoc->peer.addip_disabled_mask |= (SCTP_PARAM_ADD_IP |
2422 asoc->peer.asconf_capable = 0;
2427 list_for_each_safe(pos, temp, &asoc->peer.transport_addr_list) {
2437 asoc->peer.i.init_tag =
2439 asoc->peer.i.a_rwnd =
2441 asoc->peer.i.num_outbound_streams =
2443 asoc->peer.i.num_inbound_streams =
2445 asoc->peer.i.initial_tsn =
2448 asoc->strreset_inseq = asoc->peer.i.initial_tsn;
2450 /* Apply the upper bounds for output streams based on peer's
2466 asoc->c.peer_vtag = asoc->peer.i.init_tag;
2468 /* Peer Rwnd : Current calculated value of the peer's rwnd. */
2469 asoc->peer.rwnd = asoc->peer.i.a_rwnd;
2475 list_for_each_entry(transport, &asoc->peer.transport_addr_list,
2477 transport->ssthresh = asoc->peer.i.a_rwnd;
2481 if (!sctp_tsnmap_init(&asoc->peer.tsn_map, SCTP_TSN_MAP_INITIAL,
2482 asoc->peer.i.initial_tsn, gfp))
2513 asoc->peer.addip_serial = asoc->peer.i.initial_tsn - 1;
2518 list_for_each_safe(pos, temp, &asoc->peer.transport_addr_list) {
2572 if (!af->from_addr_param(&addr, param.addr, htons(asoc->peer.port), 0))
2594 * ones are really set by the peer.
2596 asoc->peer.ipv4_address = 0;
2597 asoc->peer.ipv6_address = 0;
2599 /* Assume that peer supports the address family
2603 asoc->peer.ipv6_address = 1;
2605 asoc->peer.ipv4_address = 1;
2615 asoc->peer.ipv4_address = 1;
2620 asoc->peer.ipv6_address = 1;
2630 asoc->peer.cookie_len =
2632 kfree(asoc->peer.cookie);
2633 asoc->peer.cookie = kmemdup(param.cookie->body, asoc->peer.cookie_len, gfp);
2634 if (!asoc->peer.cookie)
2648 asoc->peer.ecn_capable = 1;
2656 asoc->peer.adaptation_ind = ntohl(param.aind->adaptation_ind);
2670 htons(asoc->peer.port), 0))
2689 asoc->peer.prsctp_capable = 1;
2699 /* Save peer's random parameter */
2700 kfree(asoc->peer.peer_random);
2701 asoc->peer.peer_random = kmemdup(param.p,
2703 if (!asoc->peer.peer_random) {
2713 /* Save peer's HMAC list */
2714 kfree(asoc->peer.peer_hmacs);
2715 asoc->peer.peer_hmacs = kmemdup(param.p,
2717 if (!asoc->peer.peer_hmacs) {
2722 /* Set the default HMAC the peer requested*/
2730 kfree(asoc->peer.peer_chunks);
2731 asoc->peer.peer_chunks = kmemdup(param.p,
2733 if (!asoc->peer.peer_chunks)
3058 struct sctp_transport *peer;
3071 if (!asoc->peer.ipv6_address)
3075 if (!asoc->peer.ipv4_address)
3086 if (!af->from_addr_param(&addr, addr_param, htons(asoc->peer.port), 0))
3119 peer = sctp_assoc_add_peer(asoc, &addr, GFP_ATOMIC, SCTP_UNCONFIRMED);
3120 if (!peer)
3124 sctp_transport_reset_hb_timer(peer);
3125 asoc->new_transport = peer;
3129 * last remaining IP address of a peer endpoint, the receiver
3133 if (asoc->peer.transport_count == 1)
3148 * addresses of the peer except the source address of the
3163 peer = sctp_assoc_lookup_paddr(asoc, &addr);
3164 if (!peer)
3167 sctp_assoc_rm_peer(asoc, peer);
3184 peer = sctp_assoc_lookup_paddr(asoc, &addr);
3185 if (!peer)
3188 sctp_assoc_set_primary(asoc, peer);
3335 asoc->peer.addip_serial++;
3378 list_for_each_entry(transport, &asoc->peer.transport_addr_list,
3392 list_for_each_entry(transport, &asoc->peer.transport_addr_list,
3525 asoc->peer.addip_disabled_mask |=
3546 sctp_transport_immediate_rtx(asoc->peer.primary_path);