version 1.18, 2013/08/22 15:31:09
|
version 1.19.2.1, 2013/09/05 00:27:09
|
Line 144 struct tagRPCCall {
|
Line 144 struct tagRPCCall {
|
uint16_t call_argc; |
uint16_t call_argc; |
ait_val_t call_argv[0]; |
ait_val_t call_argv[0]; |
} __packed; /* size == 20 bytes */ |
} __packed; /* size == 20 bytes */ |
#define RPC_CHK_NOREPLY(x) ((x)->call_req.flags & RPC_NOREPLY) | #define RPC_CHK_NOREPLY(x) (ntohl((u_long) (x)->call_req.flags) & RPC_NOREPLY) |
| #define RPC_SET_ERRNO(x, _v) ((x)->call_rep.eno = htonl((_v))) |
|
|
/* Network BLOB packet - Header */ |
/* Network BLOB packet - Header */ |
|
|
Line 259 const char *rpc_GetError();
|
Line 260 const char *rpc_GetError();
|
void rpc_SetErr(int eno, char *estr, ...); |
void rpc_SetErr(int eno, char *estr, ...); |
|
|
|
|
|
|
|
/* |
|
* rpc_Read() - RPC read operation |
|
* |
|
* @sock = socket |
|
* @type = type of socket |
|
* @flags = receive flags |
|
* @sa = check client address, if you use udp protocol |
|
* @buf = buffer |
|
* @blen = buffer length |
|
* return: -1 error or >-1 readed bytes into buffer |
|
*/ |
|
ssize_t rpc_Read(int sock, int type, int flags, sockaddr_t * __restrict sa, |
|
unsigned char * __restrict buf, size_t blen); |
|
/* |
|
* rpc_Write() - RPC write operation |
|
* |
|
* @sock = socket |
|
* @type = type of socket |
|
* @flags = send flags |
|
* @sa = send to client address, if you use udp protocol |
|
* @buf = buffer |
|
* @blen = buffer length |
|
* return: -1 error or >-1 written bytes into buffer |
|
*/ |
|
ssize_t rpc_Write(int sock, int type, int flags, sockaddr_t * __restrict sa, |
|
unsigned char * __restrict buf, size_t blen); |
|
|
/* |
/* |
* rpc_chkPktSession() - Check RPC session |
* rpc_chkPktSession() - Check RPC session |