version 1.2.2.1, 2011/07/14 02:13:24
|
version 1.2.2.2, 2011/07/14 02:36:57
|
Line 251 rpc_cli_execCall(rpc_cli_t *cli, const char *csModule,
|
Line 251 rpc_cli_execCall(rpc_cli_t *cli, const char *csModule,
|
fd_set fds; |
fd_set fds; |
u_char buf[BUFSIZ], str[MAXPATHLEN + UCHAR_MAX + 1], *data; |
u_char buf[BUFSIZ], str[MAXPATHLEN + UCHAR_MAX + 1], *data; |
struct tagRPCCall *rpc = (struct tagRPCCall*) buf; |
struct tagRPCCall *rpc = (struct tagRPCCall*) buf; |
struct tagRPCRet *rrpc; | struct tagRPCRet *rrpc = NULL; |
int ret = 0, Limit = 0; |
int ret = 0, Limit = 0; |
register int i; |
register int i; |
rpc_val_t *v; |
rpc_val_t *v; |
Line 344 rpc_cli_execCall(rpc_cli_t *cli, const char *csModule,
|
Line 344 rpc_cli_execCall(rpc_cli_t *cli, const char *csModule,
|
if (ret < sizeof(struct tagRPCRet)) { |
if (ret < sizeof(struct tagRPCRet)) { |
rpc_SetErr(EMSGSIZE, "Error:: too short RPC packet ...\n"); |
rpc_SetErr(EMSGSIZE, "Error:: too short RPC packet ...\n"); |
return -4; |
return -4; |
} else | } |
rrpc = (struct tagRPCRet*) buf; | rrpc = (struct tagRPCRet*) buf; |
/* check RPC packet session info */ |
/* check RPC packet session info */ |
if (memcmp(&rrpc->ret_session, cli->cli_parent, sizeof rrpc->ret_session)) { |
if (memcmp(&rrpc->ret_session, cli->cli_parent, sizeof rrpc->ret_session)) { |
rpc_SetErr(EINVAL, "Error:: get invalid RPC session ...\n"); |
rpc_SetErr(EINVAL, "Error:: get invalid RPC session ...\n"); |