Displaying 6 results from an estimated 6 matches for "client_node".
2004 Aug 06
0
[PATCH] Add per-listener and per-mount connection time limits.
...global_listener_time_limit = config->client_time_limit;
+ mount_listener_time_limit = source->max_listener_time;
timeout = config->source_timeout;
hostname = config->hostname;
port = config->port;
***************
*** 428,435 ****
avl_node_wlock(client_node);
client = (client_t *)client_node->key;
!
data_done = 0;
/* do we have any old buffers? */
abuf = refbuf_queue_remove(&client->queue);
--- 437,468 ----
avl_node_wlock(client_node);
c...
2004 Aug 06
4
No Duplicate Users - Patch
...=================================================================
--- src/auth.c (revision 6619)
+++ src/auth.c (working copy)
@@ -34,6 +34,30 @@
#define CATMODULE "auth"
<p>+int auth_is_listener_connected(source_t *source, char *username)
+{
+ client_t *client;
+ avl_node *client_node;
+
+ avl_tree_rlock(source->client_tree);
+
+ client_node = avl_get_first(source->client_tree);
+ while(client_node) {
+ client = (client_t *)client_node->key;
+ if (client->username) {
+ if (!strcmp(client->username, username)) {
+ av...
2004 Aug 06
2
ICECAST enseirb group
...; thread_sleep(1000000 * (max_interval - interval));
> > }
> > else
> > ...
> >
> > ----------------------------------------
> >
> > In fserv_thread_function() function in fserve.c file, can
> > avl_tree_unlock(client_tree); be made just after client_node =
> > avl_get_first(client_tree); instead of being done at the end or in the
> > if(!client_node) { .... } block ? Are we wrong ? If yes, why ?
> >
> > ----------------------------------------
> >
> > In fserv_thread_function() function in fserve.c file, can some...
2015 Nov 22
0
Authenticating VPN addresses: a proposal
...se is some kind of Balkanization, by selectively blocking
Subnets from other nodes. Although it is not my preferred direction for
tinc, I do think it might actually be a workable method of limiting
trust in a network where you might not trust all nodes equally. But:
> /etc/tinc/my_network/hosts/client_node:
> ConnectionSubnetACL = +10.42.42.42 # this client's assigned subnet
> ConnectionSubnetACL = -ALL # deny everything else
>
> /etc/tinc/my_network/hosts/other_central_node:
> ConnectionSubnetACL = +ALL # trust everything from that node (could be
> the default)
>
> /etc...
2015 Nov 22
5
Authenticating VPN addresses: a proposal
...se it will not allow a central node from the "other side" from
impersonating my side's subnets.
In practice, one would want to introduce some kind of subnet ACL
system for full flexibility. Here's how it could look like in practice
on my central nodes:
/etc/tinc/my_network/hosts/client_node:
ConnectionSubnetACL = +10.42.42.42 # this client's assigned subnet
ConnectionSubnetACL = -ALL # deny everything else
/etc/tinc/my_network/hosts/other_central_node:
ConnectionSubnetACL = +ALL # trust everything from that node (could be
the default)
/etc/tinc/my_network/hosts/central_node_from...
2004 Aug 06
2
improved error.log output --diff
...on->error = 1;
}
/*
else
- DEBUG0("Fileserving client had recoverable error");
+ DEBUG0("Fileserving client had recoverable error, %s", client->con->ip);
*/
avl_node_unlock(client_node);
diff -u --recursive icecast/src/geturl.c icecast-new/src/geturl.c
--- icecast/src/geturl.c 2003-03-27 12:09:45.000000000 -0500
+++ icecast-new/src/geturl.c 2003-08-06 19:18:56.000000000 -0400
@@ -155,10 +155,10 @@
return 1;
}
void curl_print_header_result(struct curl_memory_struct2 *mem) {...