Home | History | Annotate | Download | only in inetd

Lines Matching refs:values

52 /* Values parsing state */
55 /* Used so we can null-terminate values by overwriting ',' and ';' */
65 /* The result of a parse of key handler values */
106 /* v2 syntax Handler function, which must parse all values for its key */
137 /* Too Few Arguments (values) */
140 /* Too Many Arguments (values) */
196 * Fill in any remaining values that should be inferred
277 /* Check values of se_proto udp, udp6, tcp, tcp6 to set dgram/stream */
475 * value. Return NULL if there are no more values or there was an error
484 /* Already at the end of a values list, or there was an error.*/
525 /* Handle comments next to unquoted values */
577 /* Get key handler and move to start of values */
608 /* Skip whitespace to start of values */
616 * Read values for key and write into sep.
617 * If parsing is successful, all values for key must be read.
621 * Eat remaining values if an error happened
655 * Key-values handlers
660 unknown_handler(struct servtab *sep, vlist values)
668 bind_handler(struct servtab *sep, vlist values)
675 char *val = next_value(values);
677 if (next_value(values) != NULL) {
685 socket_type_handler(struct servtab *sep, vlist values)
687 char *type = next_value(values);
701 if (next_value(values) != NULL) {
711 filter_handler(struct servtab *sep, vlist values)
722 af_name = next_value(values);
732 af_arg = next_value(values);
737 if (next_value(values) != NULL) {
751 protocol_handler(struct servtab *sep, vlist values)
755 if ((val = next_value(values)) == NULL) {
770 if ((val = next_value(values)) != NULL) {
817 send_buf_handler(struct servtab *sep, vlist values)
829 if ((arg = next_value(values)) == NULL) {
840 if ((arg = next_value(values)) != NULL) {
852 recv_buf_handler(struct servtab *sep, vlist values)
863 if ((arg = next_value(values)) == NULL){
874 if ((arg = next_value(values)) != NULL) {
887 wait_handler(struct servtab *sep, vlist values)
900 val = next_value(values);
923 if ((val = next_value(values)) != NULL) {
933 service_max_handler(struct servtab *sep, vlist values)
943 count_str = next_value(values);
959 if (next_value(values) != NULL) {
970 ip_max_handler(struct servtab *sep, vlist values)
980 count_str = next_value(values);
995 if (next_value(values) != NULL) {
1007 user_handler(struct servtab *sep, vlist values)
1014 char *name = next_value(values);
1023 if (next_value(values) != NULL) {
1033 group_handler(struct servtab *sep, vlist values)
1035 char *name = next_value(values);
1044 if (next_value(values) != NULL) {
1054 exec_handler(struct servtab *sep, vlist values)
1058 if ((val = next_value(values)) == NULL) {
1076 if ((val = next_value(values)) != NULL) {
1086 args_handler(struct servtab *sep, vlist values)
1097 for (val = next_value(values); val != NULL; val = next_value(values)) {
1116 * policies as separate values in the future, but strings would need to be
1121 ipsec_handler(struct servtab *sep, vlist values)
1128 char *ipsecstr = next_value(values);
1142 if (next_value(values) != NULL) {