/osnet-11/usr/src/lib/libfru/libfru/ |
H A D | PayloadReader.cc | 341 uint8_t *payload, size_t payloadLen, 345 return (readRecurse(path, &(payload[offset]), payloadLen-offset, 353 uint8_t *payload, size_t payloadLen, 358 fru_errno_t err = readRecurse(path, &(payload[offset]), 515 // will update the data in payload which can then be written back. 519 uint8_t *payload, size_t payloadLen, 554 return (updateRecurse(path, &(payload[offset]), payloadLen-offset, 339 readData(PathDef *path, Ancestor *curDef, int instWICur, uint8_t *payload, size_t payloadLen, void **data, size_t *dataLen) argument 351 findIterThere(PathDef *path, Ancestor *curDef, int instWICur, uint8_t *payload, size_t payloadLen, int *numThere) argument 517 updateData(PathDef *path, Ancestor *ancestorDef, int instWICur, uint8_t *payload, size_t payloadLen, void *data, size_t dataLen) argument
|
H A D | libfru.cc | 34 * 4) The PayloadReader which given a payload and a path definition can extract 1125 int (*function)(fru_tag_t *tag, uint8_t *payload, 1196 // and an instance of the unknown payload you are looking for. 1266 // instance == the instance of the field within the payload to read. 1404 // payload: The payload data 1406 // For an "UNKNOWN" payload this will return NULL for the pathDef, ancestors, 1407 // cur pointers. This will indicate to read that this payload should be 1421 int *instLeft, // within this payload 1422 uint8_t **payload, 1124 fru_for_each_packet(fru_seghdl_t segment, int (*function)(fru_tag_t *tag, uint8_t *payload, size_t length, void *args), void *args) argument 1412 get_payload(fru_nodehdl_t container, const char *seg_name, int instance, const char *field_path, PathDef **pathDef, Ancestor **ancestors, Ancestor **correct, int *tagInstance, int *instLeft, uint8_t **payload, size_t *payloadLen, int mode) argument 1531 do_decryption(fru_nodehdl_t container, const char *seg_name, uint8_t *payload, size_t payloadLen) argument 1553 get_seg_and_payload(fru_nodehdl_t container, char **seg_name, int instance, const char *field_path, PathDef **pathDef, Ancestor **ancestors, Ancestor **correct, int *tagInstance, int *instLeft, uint8_t **payload, size_t *payloadLen) argument 1648 uint8_t *payload; local 1731 uint8_t *payload; local 1803 uint8_t *payload; local [all...] |
/osnet-11/usr/src/lib/libfru/libnvfru/ |
H A D | nvfru.c | 255 convert_packet(fru_tag_t *tag, uint8_t *payload, size_t length, void *args) argument 283 convert_element(payload, unknown, "", nv, B_FALSE); 298 convert_element(payload, unknown, "", nv, B_FALSE); 303 convert_element(payload, def, "", nv, B_FALSE);
|
/osnet-11/usr/src/lib/libslp/javalib/com/sun/slp/ |
H A D | SrvLocHeader.java | 123 byte[] payload = new byte[0]; // bytes of outgoing payload, field in class:SrvLocHeader 659 hdr.payload = new byte[0];
|
/osnet-11/usr/src/lib/libfru/libfruraw/ |
H A D | fru_access_impl.h | 150 uint8_t *payload; member in struct:__anon1684
|
H A D | fruraw.c | 620 int (*function)(fru_tag_t *tag, uint8_t *payload, size_t length, 684 /* get the payload data */ 619 frt_for_each_packet(fru_seghdl_t node, int (*function)(fru_tag_t *tag, uint8_t *payload, size_t length, void *args), void *args) argument
|
/osnet-11/usr/src/lib/fm/libasr/common/ |
H A D | asr_audit.c | 857 asr_buf_append(out, "<payload name='%s'><![CDATA[\n", name) != 0) { 869 err |= asr_buf_append_str(out, "</payload>\n"); 875 add_payload_cmd(asr_handle_t *ah, asr_buf_t *out, char *name, char *payload) argument 889 if (asr_buf_append(cmd, "%s > %s", payload, outfile) != 0) { 897 "Error (%d) calling audit payload command (%s)", 976 asr_log_warn(ah, "Unable to add audit payload.");
|
/osnet-11/usr/src/lib/libdhcputil/common/ |
H A D | dhcp_inittab.c | 1047 * input: dhcp_symbol_t *: the entry describing the payload option 1048 * uchar_t *: the payload to convert 1049 * uint16_t: the payload length (only used if just_payload is true) 1050 * boolean_t: if false, payload is assumed to be a DHCP option 1056 inittab_decode_e(const dhcp_symbol_t *ie, const uchar_t *payload, argument 1077 (void) memcpy(&d6o, payload, sizeof (d6o)); 1079 payload += sizeof (d6o); 1081 length = payload[1]; 1082 payload += 2; 1116 (void) memcpy(result, payload, n_entrie 1414 inittab_decode(const dhcp_symbol_t *ie, const uchar_t *payload, uint16_t length, boolean_t just_payload) argument [all...] |
/osnet-11/usr/src/lib/libfru/libfrupicl/ |
H A D | frupicl.c | 1055 int (*function)(fru_tag_t *tag, uint8_t *payload, 1062 uint8_t *payload; local 1104 payload = alloca(propinfo.size); 1105 if ((status = picl_get_propval(payloadh, payload, 1109 payload = NULL; 1113 ((status = encrypt_func(FRU_DECRYPT, payload, 1117 if ((status = function(&tag, payload, propinfo.size, args)) 1054 fpt_for_each_packet(fru_treeseghdl_t treesegment, int (*function)(fru_tag_t *tag, uint8_t *payload, size_t length, void *args), void *args) argument
|
/osnet-11/usr/src/lib/libfru/libfrupicltree/ |
H A D | frupicltree.c | 1070 int (*function)(fru_tag_t *tag, uint8_t *payload, 1077 uint8_t *payload; local 1119 payload = alloca(propinfo.piclinfo.size); 1120 if ((status = ptree_get_propval(payloadh, payload, 1124 payload = NULL; 1128 ((status = encrypt_func(FRU_DECRYPT, payload, 1132 if ((status = function(&tag, payload, propinfo.piclinfo.size, 1069 fpt_for_each_packet(fru_treeseghdl_t treesegment, int (*function)(fru_tag_t *tag, uint8_t *payload, size_t length, void *args), void *args) argument
|
/osnet-11/usr/src/grub/grub2/grub-core/loader/ia64/efi/ |
H A D | linux.c | 209 struct ia64_boot_payload *payload; local 213 payload = (struct ia64_boot_payload *)boot_param->payloads_chain; 214 while (payload != 0) 216 next_payload = (struct ia64_boot_payload *)payload->next; 219 (payload->start, page_align (payload->length) >> 12); 220 grub_efi_free_pages ((grub_efi_physical_address_t)payload, 1); 222 payload = next_payload; 656 struct ia64_boot_payload *payload = NULL; local 698 grub_error (GRUB_ERR_OUT_OF_RANGE, "payload comman [all...] |
/osnet-11/usr/src/lib/rad/pyrad/common/ |
H A D | client.py | 93 def __init__(self, error, payload): 96 self._payload = payload 709 """ Read and return the payload of the event on the supplied 711 up = xdrlib.Unpacker(instance.payload) 1183 payload = up.unpack_opaque() variable in class:RadConnection 1185 up.reset(payload) 1188 raise _RequestError(error, payload) 1406 payload _Type.OPAQUE event payload 1423 self.payload [all...] |
/osnet-11/usr/src/lib/storage/libg_fc/common/hdrs/ |
H A D | gfc.h | 152 struct rls_payload payload; member in struct:al_rls
|
/osnet-11/usr/src/lib/libsqlite/src/ |
H A D | btree.c | 46 ** key and data for any entry are combined to form the "payload". Up to 47 ** MX_LOCAL_PAYLOAD bytes of payload can be carried directly on the 48 ** database page. If the payload is larger than MX_LOCAL_PAYLOAD bytes 49 ** then surplus bytes are stored on overflow pages. The payload for an 185 ** key and data (collectively the "payload") follow this header on 212 ** and at least 4 bytes of payload. 229 ** The maximum amount of payload (in bytes) that can be stored locally for 247 ** of payload space. Additional payload bytes (up to the maximum of 269 ** The number of bytes of payload tha 3050 unsigned char payload[20]; local [all...] |