search for: client_node

Displaying 6 results from an estimated 6 matches for "client_node".

2004 Aug 06
0
[PATCH] Add per-listener and per-mount connection time limits.
...global_listener_time_limit = config->client_time_limit; + mount_listener_time_limit = source->max_listener_time; timeout = config->source_timeout; hostname = config->hostname; port = config->port; *************** *** 428,435 **** avl_node_wlock(client_node); client = (client_t *)client_node->key; ! data_done = 0; /* do we have any old buffers? */ abuf = refbuf_queue_remove(&client->queue); --- 437,468 ---- avl_node_wlock(client_node); c...
2004 Aug 06
4
No Duplicate Users - Patch
...================================================================= --- src/auth.c (revision 6619) +++ src/auth.c (working copy) @@ -34,6 +34,30 @@ #define CATMODULE "auth" <p>+int auth_is_listener_connected(source_t *source, char *username) +{ + client_t *client; + avl_node *client_node; + + avl_tree_rlock(source->client_tree); + + client_node = avl_get_first(source->client_tree); + while(client_node) { + client = (client_t *)client_node->key; + if (client->username) { + if (!strcmp(client->username, username)) { + av...
2004 Aug 06
2
ICECAST enseirb group
...; thread_sleep(1000000 * (max_interval - interval)); > > } > > else > > ... > > > > ---------------------------------------- > > > > In fserv_thread_function() function in fserve.c file, can > > avl_tree_unlock(client_tree); be made just after client_node = > > avl_get_first(client_tree); instead of being done at the end or in the > > if(!client_node) { .... } block ? Are we wrong ? If yes, why ? > > > > ---------------------------------------- > > > > In fserv_thread_function() function in fserve.c file, can some...
2015 Nov 22
0
Authenticating VPN addresses: a proposal
...se is some kind of Balkanization, by selectively blocking Subnets from other nodes. Although it is not my preferred direction for tinc, I do think it might actually be a workable method of limiting trust in a network where you might not trust all nodes equally. But: > /etc/tinc/my_network/hosts/client_node: > ConnectionSubnetACL = +10.42.42.42 # this client's assigned subnet > ConnectionSubnetACL = -ALL # deny everything else > > /etc/tinc/my_network/hosts/other_central_node: > ConnectionSubnetACL = +ALL # trust everything from that node (could be > the default) > > /etc...
2015 Nov 22
5
Authenticating VPN addresses: a proposal
...se it will not allow a central node from the "other side" from impersonating my side's subnets. In practice, one would want to introduce some kind of subnet ACL system for full flexibility. Here's how it could look like in practice on my central nodes: /etc/tinc/my_network/hosts/client_node: ConnectionSubnetACL = +10.42.42.42 # this client's assigned subnet ConnectionSubnetACL = -ALL # deny everything else /etc/tinc/my_network/hosts/other_central_node: ConnectionSubnetACL = +ALL # trust everything from that node (could be the default) /etc/tinc/my_network/hosts/central_node_from...
2004 Aug 06
2
improved error.log output --diff
...on->error = 1; } /* else - DEBUG0("Fileserving client had recoverable error"); + DEBUG0("Fileserving client had recoverable error, %s", client->con->ip); */ avl_node_unlock(client_node); diff -u --recursive icecast/src/geturl.c icecast-new/src/geturl.c --- icecast/src/geturl.c 2003-03-27 12:09:45.000000000 -0500 +++ icecast-new/src/geturl.c 2003-08-06 19:18:56.000000000 -0400 @@ -155,10 +155,10 @@ return 1; } void curl_print_header_result(struct curl_memory_struct2 *mem) {...