/macosx-10.10/OpenLDAP-499.27/OpenLDAP/servers/slapd/back-bdb/ |
H A D | compare.c | 25 bdb_compare( Operation *op, SlapReply *rs ) 35 rs->sr_err = bdb_reader_get(op, bdb->bi_dbenv, &rtxn); 36 switch(rs->sr_err) { 40 send_ldap_error( op, rs, LDAP_OTHER, "internal error" ); 41 return rs->sr_err; 46 rs->sr_err = bdb_dn2entry( op, rtxn, &op->o_req_ndn, &ei, 1, 49 switch( rs->sr_err ) { 54 rs->sr_text = "ldap server busy"; 60 rs->sr_err = LDAP_OTHER; 61 rs [all...] |
H A D | bind.c | 29 bdb_bind( Operation *op, SlapReply *rs ) 50 return rs->sr_err = LDAP_SUCCESS; 62 rs->sr_err = bdb_reader_get(op, bdb->bi_dbenv, &rtxn); 63 switch(rs->sr_err) { 67 rs->sr_text = "internal error"; 68 send_ldap_result( op, rs ); 69 return rs->sr_err; 74 rs->sr_err = bdb_dn2entry( op, rtxn, &op->o_req_ndn, &ei, 1, 77 switch(rs->sr_err) { 82 send_ldap_error( op, rs, LDAP_BUS [all...] |
H A D | delete.c | 26 bdb_delete( Operation *op, SlapReply *rs ) 66 rs->sr_text = "invalid transaction identifier"; 67 rs->sr_err = LDAP_X_TXN_ID_INVALID; 78 rs->sr_text = "transaction cannot span multiple database contexts"; 79 rs->sr_err = LDAP_AFFECTS_MULTIPLE_DSAS; 85 rs->sr_text = "transaction specified"; 86 rs->sr_err = LDAP_X_TXN_SPECIFY_OKAY; 93 send_ldap_result( op, rs ); 94 return rs->sr_err; 124 rs [all...] |
H A D | add.c | 25 bdb_add(Operation *op, SlapReply *rs ) 60 rs->sr_text = "invalid transaction identifier"; 61 rs->sr_err = LDAP_X_TXN_ID_INVALID; 72 rs->sr_text = "transaction cannot span multiple database contexts"; 73 rs->sr_err = LDAP_AFFECTS_MULTIPLE_DSAS; 79 rs->sr_text = "transaction specified"; 80 rs->sr_err = LDAP_X_TXN_SPECIFY_OKAY; 87 send_ldap_result( op, rs ); 88 return rs->sr_err; 96 rs [all...] |
H A D | referral.c | 24 bdb_referrals( Operation *op, SlapReply *rs ) 68 rs->sr_text = "ldap server busy"; 78 rs->sr_text = "internal error"; 84 rs->sr_matched = NULL; 94 rs->sr_ref = referral_rewrite( ref, &e->e_name, 97 if ( rs->sr_ref ) { 98 rs->sr_matched = ber_strdup_x( 107 if( rs->sr_ref != NULL ) { 109 rc = rs->sr_err = LDAP_REFERRAL; 110 send_ldap_result( op, rs ); [all...] |
/macosx-10.10/SmartCardServices-55111/src/PCSC/ |
H A D | readerstate.cpp | 34 DWORD SharedReaderState_State(READER_STATE *rs) argument 36 PCSCD::SharedReaderState *srs = PCSCD::SharedReaderState::overlay(rs); 40 DWORD SharedReaderState_Protocol(READER_STATE *rs) argument 42 PCSCD::SharedReaderState *srs = PCSCD::SharedReaderState::overlay(rs); 46 DWORD SharedReaderState_Sharing(READER_STATE *rs) argument 48 PCSCD::SharedReaderState *srs = PCSCD::SharedReaderState::overlay(rs); 52 size_t SharedReaderState_CardAtrLength(READER_STATE *rs) argument 54 PCSCD::SharedReaderState *srs = PCSCD::SharedReaderState::overlay(rs); 58 LONG SharedReaderState_ReaderID(READER_STATE *rs) argument 60 PCSCD::SharedReaderState *srs = PCSCD::SharedReaderState::overlay(rs); 64 SharedReaderState_CardAtr(READER_STATE *rs) argument 70 SharedReaderState_ReaderName(READER_STATE *rs) argument 76 SharedReaderState_ReaderNameIsEqual(READER_STATE *rs, const char *otherName) argument 87 SharedReaderState_SetState(READER_STATE *rs, DWORD state) argument 93 SharedReaderState_SetProtocol(READER_STATE *rs, DWORD newprotocol) argument 99 SharedReaderState_SetCardAtrLength(READER_STATE *rs, size_t len) argument [all...] |
H A D | eventhandler.cpp | 148 PCSCD::SharedReaderState *rs = PCSCD::SharedReaderState::overlay(rContext->readerState); local 149 if ((rContext->pthThread == 0) || !rs || (rs->readerNameLength() == 0)) 156 rContext->pthThread, rs->readerNameLength()); 163 rs->xreaderNameClear(); 164 rs->xcardAtrClear(); 165 rs->xreaderID(0); 166 rs->xreaderState(0); 167 rs->xlockState(0); 168 rs 268 PCSCD::SharedReaderState *rs = PCSCD::SharedReaderState::overlay(rContext->readerState); local 531 PCSCD::SharedReaderState *rs = PCSCD::SharedReaderState::overlay(rContext->readerState); local [all...] |
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/servers/slapd/back-monitor/ |
H A D | bind.c | 34 monitor_back_bind( Operation *op, SlapReply *rs ) 43 rs->sr_err = LDAP_INVALID_CREDENTIALS; 44 send_ldap_result( op, rs ); 46 return rs->sr_err;
|
H A D | compare.c | 30 monitor_back_compare( Operation *op, SlapReply *rs ) 37 monitor_cache_dn2entry( op, rs, &op->o_req_ndn, &e, &matched ); 39 rs->sr_err = LDAP_NO_SUCH_OBJECT; 47 rs->sr_matched = matched->e_dn; 50 send_ldap_result( op, rs ); 53 rs->sr_matched = NULL; 56 return rs->sr_err; 59 rs->sr_err = slap_compare_entry( op, e, op->orc_ava ); 60 rc = rs->sr_err; 68 send_ldap_result( op, rs ); [all...] |
H A D | modify.c | 34 monitor_back_modify( Operation *op, SlapReply *rs ) 44 monitor_cache_dn2entry( op, rs, &op->o_req_ndn, &e, &matched ); 46 rs->sr_err = LDAP_NO_SUCH_OBJECT; 54 rs->sr_matched = matched->e_dn; 57 send_ldap_result( op, rs ); 59 rs->sr_matched = NULL; 62 return rs->sr_err; 72 rc = monitor_entry_modify( op, rs, e ); 83 rs->sr_err = rc; 84 send_ldap_result( op, rs ); [all...] |
H A D | operational.c | 40 SlapReply *rs ) 44 assert( rs->sr_entry != NULL ); 46 for ( ap = &rs->sr_operational_attrs; *ap; ap = &(*ap)->a_next ) { 53 attr_find( rs->sr_entry->e_attrs, slap_schema.si_ad_hasSubordinates ) == NULL && 54 ( SLAP_OPATTRS( rs->sr_attr_flags ) || 55 ad_inlist( slap_schema.si_ad_hasSubordinates, rs->sr_attrs ) ) ) 60 mp = ( monitor_entry_t * )rs->sr_entry->e_private;
|
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/servers/slapd/back-sql/ |
H A D | modify.c | 33 backsql_modify( Operation *op, SlapReply *rs ) 51 rs->sr_err = backsql_get_db_conn( op, &dbh ); 52 if ( rs->sr_err != LDAP_SUCCESS ) { 60 rs->sr_text = ( rs->sr_err == LDAP_OTHER ) 66 rs->sr_err = backsql_init_search( &bsi, &op->o_req_ndn, 68 (time_t)(-1), NULL, dbh, op, rs, 71 switch ( rs->sr_err ) { 79 rs->sr_err = LDAP_SUCCESS; 80 rs [all...] |
H A D | bind.c | 32 backsql_bind( Operation *op, SlapReply *rs ) 43 switch ( be_rootdn_bind( op, rs ) ) { 51 rs->sr_err, 0, 0 ); 52 return rs->sr_err; 55 rs->sr_err = backsql_get_db_conn( op, &dbh ); 56 if ( rs->sr_err != LDAP_SUCCESS ) { 61 rs->sr_text = ( rs->sr_err == LDAP_OTHER ) 72 (time_t)(-1), NULL, dbh, op, rs, anlist, 78 rs [all...] |
H A D | compare.c | 32 backsql_compare( Operation *op, SlapReply *rs ) 44 rs->sr_err = backsql_get_db_conn( op, &dbh ); 45 if ( rs->sr_err != LDAP_SUCCESS ) { 50 rs->sr_text = ( rs->sr_err == LDAP_OTHER ) 64 (time_t)(-1), NULL, dbh, op, rs, anlist, 74 rs->sr_err = LDAP_SUCCESS; 75 rs->sr_text = NULL; 76 rs->sr_matched = NULL; 77 if ( rs [all...] |
H A D | modrdn.c | 33 backsql_modrdn( Operation *op, SlapReply *rs ) 59 rs->sr_err = backsql_get_db_conn( op, &dbh ); 60 if ( rs->sr_err != LDAP_SUCCESS ) { 64 rs->sr_text = ( rs->sr_err == LDAP_OTHER ) 71 rs->sr_err = backsql_init_search( &bsi, &op->o_req_ndn, 73 (time_t)(-1), NULL, dbh, op, rs, 76 switch ( rs->sr_err ) { 84 rs->sr_err = LDAP_SUCCESS; 85 rs [all...] |
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/servers/slapd/ |
H A D | compare.c | 37 SlapReply *rs ) 61 send_ldap_discon( op, rs, LDAP_PROTOCOL_ERROR, "decoding error" ); 68 send_ldap_discon( op, rs, LDAP_PROTOCOL_ERROR, "decoding error" ); 75 send_ldap_discon( op, rs, LDAP_PROTOCOL_ERROR, "decoding error" ); 79 if( get_ctrls( op, rs, 1 ) != LDAP_SUCCESS ) { 85 rs->sr_err = dnPrettyNormal( NULL, &dn, &op->o_req_dn, &op->o_req_ndn, 87 if( rs->sr_err != LDAP_SUCCESS ) { 90 send_ldap_error( op, rs, LDAP_INVALID_DN_SYNTAX, "invalid DN" ); 99 rs->sr_err = slap_bv2ad( &desc, &ava.aa_desc, &rs [all...] |
H A D | result.c | 42 int slap_null_cb( Operation *op, SlapReply *rs ) 47 int slap_freeself_cb( Operation *op, SlapReply *rs ) 170 (rs_assert_ok)( const SlapReply *rs ) 172 const slap_mask_t flags = rs->sr_flags; 177 RS_ASSERT( rs->sr_entry != NULL ); 178 RS_ASSERT( (1 << rs->sr_type) & 184 RS_ASSERT( !(flags & REP_MATCHED_MASK) || rs->sr_matched ); 185 RS_ASSERT( !(flags & REP_CTRLS_MASK ) || rs->sr_ctrls ); 189 if ( rs->sr_err == LDAP_SUCCESS ) { 190 RS_ASSERT( rs 232 rs_reinit( SlapReply *rs, slap_reply_t type ) argument 239 rs_flush_entry( Operation *op, SlapReply *rs, slap_overinst *on ) argument 259 rs_replace_entry( Operation *op, SlapReply *rs, slap_overinst *on, Entry *e ) argument 271 rs_entry2modifiable( Operation *op, SlapReply *rs, slap_overinst *on ) argument 1732 slap_read_controls( Operation *op, SlapReply *rs, Entry *e, const struct berval *oid, LDAPControl **ctrl ) argument [all...] |
H A D | txn.c | 35 Operation *op, SlapReply *rs ) 44 rs->sr_text = "no request data expected"; 49 if( backend_check_restrictions( op, rs, 52 return rs->sr_err; 59 rs->sr_text = "Too many transactions"; 71 rs->sr_rspdata = bv; 81 Operation *op, SlapReply *rs, LDAPControl *ctrl ) 84 rs->sr_text = "txnSpec control must be marked critical"; 88 rs->sr_text = "txnSpec control provided multiple times"; 93 rs 80 txn_spec_ctrl( Operation *op, SlapReply *rs, LDAPControl *ctrl ) argument [all...] |
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/servers/slapd/back-ldap/ |
H A D | extended.c | 31 typedef int (ldap_back_exop_f)( Operation *op, SlapReply *rs, ldapconn_t **lc ); 45 ldap_back_extended_one( Operation *op, SlapReply *rs, ldap_back_exop_f exop ) argument 57 if ( !ldap_back_dobind( &lc, op, rs, LDAP_BACK_SENDERR ) ) { 62 if ( ldap_back_controls_add( op, rs, lc, &ctrls ) ) 65 send_ldap_extended( op, rs ); 66 rs->sr_text = NULL; 68 rc = rs->sr_err = SLAPD_ABANDON; 73 rc = exop( op, rs, &lc ); 76 (void)ldap_back_controls_free( op, rs, &ctrls ); 89 SlapReply *rs ) 110 ldap_back_exop_passwd( Operation *op, SlapReply *rs, ldapconn_t **lcp ) argument 297 ldap_back_exop_generic( Operation *op, SlapReply *rs, ldapconn_t **lcp ) argument [all...] |
H A D | delete.c | 37 SlapReply *rs ) 47 if ( !ldap_back_dobind( &lc, op, rs, LDAP_BACK_SENDERR ) ) { 48 return rs->sr_err; 53 rc = ldap_back_controls_add( op, rs, lc, &ctrls ); 55 send_ldap_result( op, rs ); 56 rc = rs->sr_err; 60 rs->sr_err = ldap_delete_ext( lc->lc_ld, op->o_req_dn.bv_val, 62 rc = ldap_back_op_result( lc, op, rs, msgid, 65 if ( rs->sr_err == LDAP_UNAVAILABLE && retrying ) { 67 if ( ldap_back_retry( &lc, op, rs, LDAP_BACK_SENDER [all...] |
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/servers/slapd/back-meta/ |
H A D | delete.c | 35 meta_back_delete( Operation *op, SlapReply *rs ) 47 mc = meta_back_getconn( op, rs, &candidate, LDAP_BACK_SENDERR ); 48 if ( !mc || !meta_back_dobind( op, rs, mc, LDAP_BACK_SENDERR ) ) { 49 return rs->sr_err; 60 dc.rs = rs; 64 send_ldap_result( op, rs ); 70 if ( meta_back_controls_add( op, rs, mc, candidate, &ctrls ) != LDAP_SUCCESS ) 72 send_ldap_result( op, rs ); 76 rs [all...] |
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/servers/slapd/back-dnssrv/ |
H A D | compare.c | 35 SlapReply *rs 41 send_ldap_error( op, rs, LDAP_OTHER,
|
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/servers/slapd/back-perl/ |
H A D | bind.c | 29 SlapReply *rs ) 37 switch ( be_rootdn_bind( op, rs ) ) { 42 return rs->sr_err; 65 rs->sr_err = POPi; 73 Debug( LDAP_DEBUG_ANY, "Perl BIND returned 0x%04x\n", rs->sr_err, 0, 0 ); 76 if( rs->sr_err != LDAP_SUCCESS ) 77 send_ldap_result( op, rs ); 79 return ( rs->sr_err );
|
/macosx-10.10/Libc-1044.1.2/gen/FreeBSD/ |
H A D | arc4random.c | 73 static struct arc4_stream rs = { variable in typeref:struct:arc4_stream 114 rs.i--; 116 rs.i = (rs.i + 1); 117 si = rs.s[rs.i]; 118 rs.j = (rs.j + si + dat[n % datlen]); 119 rs.s[rs [all...] |
/macosx-10.10/ruby-106/ruby/test/rubygems/ |
H A D | test_gem_request_set.rb | 14 rs = Gem::RequestSet.new 15 rs.gem "a", "= 2" 17 assert_equal [Gem::Dependency.new("a", "=2")], rs.dependencies 24 rs = Gem::RequestSet.new 25 rs.gem "a" 27 res = rs.resolve StaticSet.new([a, b]) 40 rs = Gem::RequestSet.new 41 rs.gem "a" 43 rs.resolve StaticSet.new([a, b, c]) 45 names = rs [all...] |