/macosx-10.10/OpenLDAP-499.27/OpenLDAP/servers/slapd/back-sock/ |
H A D | modify.c | 35 SlapReply *rs ) 57 send_ldap_error( op, rs, LDAP_INSUFFICIENT_ACCESS, NULL ); 62 send_ldap_error( op, rs, LDAP_OTHER, 110 sock_read_and_send_results( op, rs, fp );
|
/macosx-10.10/Security-57031.1.35/Security/include/security_filedb/ |
H A D | DbValue.h | 81 size_t size(const ReadSection &rs, uint32 offset) const { return size(); } argument 96 UInt32Value(const ReadSection &rs, uint32 &offset); 105 SInt32Value(const ReadSection &rs, uint32 &offset); 114 DoubleValue(const ReadSection &rs, uint32 &offset); 126 BlobValue(const ReadSection &rs, uint32 &offset); 151 TimeDateValue(const ReadSection &rs, uint32 &offset); 165 StringValue(const ReadSection &rs, uint32 &offset); 183 BigNumValue(const ReadSection &rs, uint32 &offset); 195 MultiUInt32Value(const ReadSection &rs, uint32 &offset);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_filedb/lib/ |
H A D | DbValue.h | 81 size_t size(const ReadSection &rs, uint32 offset) const { return size(); } argument 96 UInt32Value(const ReadSection &rs, uint32 &offset); 105 SInt32Value(const ReadSection &rs, uint32 &offset); 114 DoubleValue(const ReadSection &rs, uint32 &offset); 126 BlobValue(const ReadSection &rs, uint32 &offset); 151 TimeDateValue(const ReadSection &rs, uint32 &offset); 165 StringValue(const ReadSection &rs, uint32 &offset); 183 BigNumValue(const ReadSection &rs, uint32 &offset); 195 MultiUInt32Value(const ReadSection &rs, uint32 &offset);
|
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/servers/slapd/overlays/ |
H A D | ppolicy.c | 423 add_passcontrol( Operation *op, SlapReply *rs, LDAPControl *ctrl ) argument 425 LDAPControl **ctrls, **oldctrls = rs->sr_ctrls; 446 rs->sr_ctrls = ctrls; 866 ctrls_cleanup( Operation *op, SlapReply *rs, LDAPControl **oldctrls ) argument 870 assert( rs->sr_ctrls != NULL ); 871 assert( rs->sr_ctrls[0] != NULL ); 873 for ( n = 0; rs->sr_ctrls[n]; n++ ) { 874 if ( rs->sr_ctrls[n]->ldctl_oid == ppolicy_ctrl_oid ) { 875 op->o_tmpfree( rs->sr_ctrls[n], op->o_tmpmemctx ); 876 rs 2179 ppolicy_parseCtrl( Operation *op, SlapReply *rs, LDAPControl *ctrl ) argument [all...] |
H A D | valsort.c | 269 valsort_response( Operation *op, SlapReply *rs ) 278 if ( rs->sr_type != REP_SEARCH || 293 if ( !dnIsSuffix( &rs->sr_entry->e_nname, &vi->vi_dn )) 297 a = attr_find( rs->sr_entry->e_attrs, vi->vi_ad ); 300 if ( rs_entry2modifiable( op, rs, on )) { 301 a = attr_find( rs->sr_entry->e_attrs, vi->vi_ad ); 317 rs->sr_entry->e_name.bv_val, 0 ); 324 rs->sr_entry->e_name.bv_val, 0, 0 ); 388 valsort_add( Operation *op, SlapReply *rs ) 411 send_ldap_error( op, rs, LDAP_CONSTRAINT_VIOLATIO 507 valsort_parseCtrl( Operation *op, SlapReply *rs, LDAPControl *ctrl ) argument [all...] |
H A D | dynlist.c | 63 dynlist_is_dynlist_next( Operation *op, SlapReply *rs, dynlist_info_t *old_dli ) argument 77 a = attrs_find( rs->sr_entry->e_attrs, slap_schema.si_ad_objectClass ); 89 && !dnIsSuffixScope( &rs->sr_entry->e_nname, 97 if ( dli->dli_uri_filter && test_filter( op, rs->sr_entry, dli->dli_uri_filter ) != LDAP_COMPARE_TRUE ) { 160 dynlist_sc_update( Operation *op, SlapReply *rs ) 171 if ( rs->sr_type != REP_SEARCH ) { 179 assert( rs->sr_entry != NULL ); 182 if ( !access_allowed( op, rs->sr_entry, slap_schema.si_ad_entry, 194 if ( access_allowed( op, rs->sr_entry, slap_schema.si_ad_entry, 202 vals[ 0 ] = rs 346 dynlist_prepare_entry( Operation *op, SlapReply *rs, dynlist_info_t *dli ) argument [all...] |
H A D | pcache.c | 1762 SlapReply *rs 1769 if ( rs->sr_type != REP_SEARCH ) return 0; 1771 attr = attr_find( rs->sr_entry->e_attrs, ad_queryId ); 1779 ber_dupbv_x( &qi->xdn, &rs->sr_entry->e_nname, op->o_tmpmemctx ); 2044 fetch_queryId_cb( Operation *op, SlapReply *rs ) 2049 if ( rs->sr_type != REP_SEARCH ) { 2061 a = attr_find( rs->sr_entry->e_attrs, ad_queryId ); 2071 rs_flush_entry( op, rs, (slap_overinst *) op->o_bd->bd_info ); 2136 SlapReply rs = { REP_RESULT }; local 2143 rc = op->o_bd->be_search( op, &rs ); 2205 SlapReply rs = { REP_RESULT }; local 3392 SlapReply rs = {REP_RESULT}; local 3775 pc_cfadd( Operation *op, SlapReply *rs, Entry *p, ConfigArgs *ca ) argument 4611 SlapReply rs = { REP_RESULT }; local 4798 SlapReply rs = { REP_RESULT }; local 4945 parse_privdb_ctrl( Operation *op, SlapReply *rs, LDAPControl *ctrl ) argument 5360 pcache_monitor_update( Operation *op, SlapReply *rs, Entry *e, void *priv ) argument [all...] |
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/servers/slapd/back-monitor/ |
H A D | entry.c | 30 SlapReply *rs, 50 rc = mc->mc_update( op, rs, e, mc->mc_private ); 59 rc = mp->mp_info->mss_update( op, rs, e ); 72 SlapReply *rs, 90 rc = mp->mp_info->mss_create( op, rs, ndn, e_parent, ep ); 103 SlapReply *rs, 123 rc = mc->mc_modify( op, rs, e, mc->mc_private ); 132 rc = mp->mp_info->mss_modify( op, rs, e ); 28 monitor_entry_update( Operation *op, SlapReply *rs, Entry *e ) argument 70 monitor_entry_create( Operation *op, SlapReply *rs, struct berval *ndn, Entry *e_parent, Entry **ep ) argument 101 monitor_entry_modify( Operation *op, SlapReply *rs, Entry *e ) argument
|
/macosx-10.10/curl-83.1.2/curl/lib/ |
H A D | makefile.dj | 22 ar rs $@ $?
|
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/contrib/slapd-modules/samba4/ |
H A D | vernum.c | 52 vernum_op_add( Operation *op, SlapReply *rs ) 92 vernum_op_modify( Operation *op, SlapReply *rs ) 198 vernum_repair_cb( Operation *op, SlapReply *rs ) 206 switch ( rs->sr_type ) { 212 return rs->sr_err; 218 assert( rs->sr_entry != NULL ); 220 len = sizeof( vernum_mod_t ) + rs->sr_entry->e_nname.bv_len + 1; 222 mod->ndn.bv_len = rs->sr_entry->e_nname.bv_len; 224 lutil_strncopy( mod->ndn.bv_val, rs->sr_entry->e_nname.bv_val, rs 247 SlapReply rs = { REP_RESULT }; local [all...] |
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/contrib/slapd-modules/nops/ |
H A D | nops.c | 63 nops_modify( Operation *op, SlapReply *rs ) 73 send_ldap_error(op, rs, LDAP_INVALID_SYNTAX, 75 return(rs->sr_err); 149 send_ldap_error(op, rs, LDAP_SUCCESS, ""); 152 return (rs->sr_err);
|
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/contrib/slapd-modules/addpartial/ |
H A D | addpartial-overlay.c | 35 static int collect_error_msg_cb( Operation *op, SlapReply *rs); 43 static int addpartial_add( Operation *op, SlapReply *rs) argument 291 rs->sr_err = rc; 294 rs->sr_text = nullcb.sc_private; 320 send_ldap_result( op, rs ); 321 ch_free((void *)rs->sr_text); 322 rs->sr_text = NULL; 328 static int collect_error_msg_cb( Operation *op, SlapReply *rs) argument 330 if(rs->sr_text) 332 op->o_callback->sc_private = (void *) ch_strdup(rs [all...] |
/macosx-10.10/tcl-105/tcl_ext/tdom/tdom/generic/ |
H A D | domxpath.c | 148 #define checkRsAddNode(rs,node) if (useFastAdd) rsAddNodeFast( rs,node); \ 149 else rsAddNode (rs,node); 237 char *xpathFuncString (xpathResultSet *rs ); 253 void xpathRSFree ( xpathResultSet *rs ) { 255 if (rs->type == xNodeSetResult) { 256 if (!rs->intvalue) { 257 if (rs->nodes) FREE((char*)rs->nodes); 259 rs 344 rsSetReal( xpathResultSet *rs, double d) argument 358 rsSetInt( xpathResultSet *rs, int i) argument 363 rsSetBool( xpathResultSet *rs, int i) argument 368 rsSetString( xpathResultSet *rs, const char *s) argument 381 rsAddNode( xpathResultSet *rs, domNode *node) argument 433 rsAddNodeFast( xpathResultSet *rs, domNode *node) argument 2462 xpathFuncNumber( xpathResultSet *rs, int *NaN ) argument [all...] |
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/servers/slapd/ |
H A D | sasl.c | 199 sasl_ap_lookup( Operation *op, SlapReply *rs ) 208 if (rs->sr_type != REP_SEARCH) return 0; 242 a = attr_find( rs->sr_entry->e_attrs, ad ); 244 if ( ! access_allowed( op, rs->sr_entry, ad, NULL, ACL_AUTH, NULL ) ) { 416 SlapReply rs = {REP_RESULT}; local 437 rc = op->o_bd->be_search( op, &rs ); 457 SlapReply rs = {REP_RESULT}; local 547 rc = op.o_bd->be_modify( &op, &rs ); 590 sasl_authdata_lookup( Operation *op, SlapReply *rs ) 600 if (rs 707 SlapReply rs = {REP_RESULT}; local 828 SlapReply rs = {REP_RESULT}; local 1349 SlapReply rs = {REP_RESULT}; local [all...] |
H A D | backover.c | 225 over_back_response ( Operation *op, SlapReply *rs ) 237 rc = on->on_response( op, rs ); 648 SlapReply *rs, 661 rc = func[which]( op, rs ); 671 rc = func[which]( op, rs ); 687 op->o_callback->sc_cleanup( op, rs ); 697 SlapReply *rs, 723 rc = overlay_op_walk( op, rs, which, oi, on ); 736 over_op_bind( Operation *op, SlapReply *rs ) 738 return over_op_func( op, rs, op_bin 646 overlay_op_walk( Operation *op, SlapReply *rs, slap_operation_t which, slap_overinfo *oi, slap_overinst *on ) argument 695 over_op_func( Operation *op, SlapReply *rs, slap_operation_t which ) argument [all...] |
H A D | bconfig.c | 113 SlapReply *rs, int *renumber, Operation *op ); 4022 config_ldif_resp( Operation *op, SlapReply *rs ) 4024 if ( rs->sr_type == REP_SEARCH ) { 4031 if ( !strncmp( rs->sr_entry->e_nname.bv_val, 4034 if ( strncmp( rs->sr_entry->e_nname.bv_val + 4049 sc->frontend = config_build_entry( op, rs, 4061 dnParent( &rs->sr_entry->e_nname, &pdn ); 4065 !strncmp( rs->sr_entry->e_nname.bv_val, 4069 if ( strncmp( rs->sr_entry->e_nname.bv_val + 4083 sc->config = config_build_entry( op, rs, s 4113 SlapReply rs = {REP_RESULT}; local 4365 config_send( Operation *op, SlapReply *rs, CfEntryInfo *ce, int depth ) argument 4511 config_rename_attr( SlapReply *rs, Entry *e, struct berval *rdn, Attribute **at ) argument 4554 config_rename_one( Operation *op, SlapReply *rs, Entry *e, CfEntryInfo *parent, Attribute *a, struct berval *newrdn, struct berval *nnewrdn, int use_ldif ) argument 4627 config_renumber_one( Operation *op, SlapReply *rs, CfEntryInfo *parent, Entry *e, int idx, int tailindex, int use_ldif ) argument 4680 check_name_index( CfEntryInfo *parent, ConfigType ce_type, Entry *e, SlapReply *rs, int *renum, int *ibase ) argument 5008 config_add_internal( CfBackInfo *cfb, Entry *e, ConfigArgs *ca, SlapReply *rs, int *renum, Operation *op ) argument 5353 config_rename_add( Operation *op, SlapReply *rs, CfEntryInfo *ce, int base, int rebase, int max, int use_ldif ) argument 5400 config_rename_del( Operation *op, SlapReply *rs, CfEntryInfo *ce, CfEntryInfo *ce2, int old, int use_ldif ) argument 5577 config_modify_internal( CfEntryInfo *ce, Operation *op, SlapReply *rs, ConfigArgs *ca ) argument 6529 config_build_entry( Operation *op, SlapReply *rs, CfEntryInfo *parent, ConfigArgs *c, struct berval *rdn, ConfigOCs *main, ConfigOCs *extra ) argument 6804 SlapReply rs = {REP_RESULT}; local 6839 SlapReply rs = {REP_RESULT}; local [all...] |
H A D | limits.c | 1060 limits_check( Operation *op, SlapReply *rs ) 1063 assert( rs != NULL ); 1129 rs->sr_err = LDAP_ADMINLIMIT_EXCEEDED; 1130 send_ldap_result( op, rs ); 1131 rs->sr_err = LDAP_SUCCESS; 1146 rs->sr_err = LDAP_ADMINLIMIT_EXCEEDED; 1147 send_ldap_result( op, rs ); 1148 rs->sr_err = LDAP_SUCCESS; 1160 rs->sr_err = LDAP_ADMINLIMIT_EXCEEDED; 1161 rs [all...] |
H A D | proto-slap.h | 370 LDAP_SLAPD_F (int) be_rootdn_bind LDAP_P(( Operation *op, SlapReply *rs )); 384 LDAP_SLAPD_F (int) backend_unbind LDAP_P((Operation *op, SlapReply *rs)); 390 SlapReply *rs )); 393 SlapReply *rs, 398 SlapReply *rs )); 429 SlapReply *rs 463 SlapReply *rs, 643 SlapReply *rs, 647 SlapReply *rs, 652 SlapReply *rs, [all...] |
/macosx-10.10/OpenSSH-189/openssh/ |
H A D | krl.c | 145 struct revoked_serial *rs, *trs; local 148 RB_FOREACH_SAFE(rs, revoked_serial_tree, &rc->revoked_serials, trs) { 149 RB_REMOVE(revoked_serial_tree, &rc->revoked_serials, rs); 150 free(rs); 238 struct revoked_serial rs, *ers, *crs, *irs; local 241 bzero(&rs, sizeof(rs)); 242 rs.lo = lo; 243 rs.hi = hi; 244 ers = RB_NFIND(revoked_serial_tree, rt, &rs); 517 struct revoked_serial *rs, *nrs; local 1105 struct revoked_serial rs, *ers; local [all...] |
/macosx-10.10/libpcap-48/libpcap/ |
H A D | pcap-snoop.c | 168 register struct rawstats *rs; local 171 rs = &rawstats; 172 memset(rs, 0, sizeof(*rs)); 173 if (ioctl(p->fd, SIOCRAWSTATS, (char *)rs) < 0) { 193 rs->rs_snoop.ss_ifdrops + rs->rs_snoop.ss_sbdrops + 194 rs->rs_drain.ds_ifdrops + rs->rs_drain.ds_sbdrops;
|
/macosx-10.10/ICU-531.30/icuSources/i18n/ |
H A D | brktrans.cpp | 177 UnicodeString *rs = dynamic_cast<UnicodeString *>(&r); local 178 if (rs != NULL) { 179 s = *rs;
|
/macosx-10.10/ncurses-44/ncurses/ncurses/widechar/ |
H A D | lib_box_set.c | 46 const ARG_CH_T ls, const ARG_CH_T rs, 58 _tracech_t2(2, rs), 72 RENDER_WITH_DEFAULT(rs, WACS_VLINE); 45 wborder_set(WINDOW *win, const ARG_CH_T ls, const ARG_CH_T rs, const ARG_CH_T ts, const ARG_CH_T bs, const ARG_CH_T tl, const ARG_CH_T tr, const ARG_CH_T bl, const ARG_CH_T br) argument
|
/macosx-10.10/ruby-106/ruby/lib/shell/ |
H A D | system-command.rb | 85 rs = @shell.record_separator unless rs 136 def each(rs = nil)
|
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/servers/slapd/back-ldap/ |
H A D | monitor.c | 114 SlapReply *rs, 147 SlapReply *rs, 162 rs->sr_err = LDAP_CONSTRAINT_VIOLATION; 163 rs->sr_text = "conflicting modifications"; 168 rs->sr_err = LDAP_CONSTRAINT_VIOLATION; 169 rs->sr_text = "modification not allowed"; 194 rs->sr_err = LDAP_CONSTRAINT_VIOLATION; 195 rs->sr_text = "no value provided"; 200 rs->sr_err = LDAP_CONSTRAINT_VIOLATION; 201 rs 112 ldap_back_monitor_update( Operation *op, SlapReply *rs, Entry *e, void *priv ) argument 145 ldap_back_monitor_modify( Operation *op, SlapReply *rs, Entry *e, void *priv ) argument 282 ldap_back_monitor_conn_create( Operation *op, SlapReply *rs, struct berval *ndn, Entry *e_parent, Entry **ep ) argument [all...] |
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/servers/slapd/back-sql/ |
H A D | api.c | 120 backsql_api_dn2odbc( Operation *op, SlapReply *rs, struct berval *dn ) argument 148 rc = ( *ba->ba_dn2odbc )( op, rs, &bv ); 167 backsql_api_odbc2dn( Operation *op, SlapReply *rs, struct berval *dn ) argument 184 rc = ( *ba->ba_odbc2dn )( op, rs, &bv );
|