version 1.3, 2000/02/24 12:33:48 |
version 1.7, 2000/12/06 00:29:52 |
|
|
/*$OpenXM: OpenXM/src/kan96xx/plugin/oxx.hh,v 1.2 1999/11/18 00:54:17 takayama Exp $*/ |
/*$OpenXM: OpenXM/src/kan96xx/plugin/oxx.hh,v 1.6 2000/12/05 12:03:44 takayama Exp $*/ |
else if (strcmp(key,"oxCreateClient") == 0) { |
else if (strcmp(key,"oxCreateClient") == 0) { |
if (size != 4) errorKan1("%s\n","[(oxCreateClient) ip dataport controlport] extension client."); |
if (size != 4) errorKan1("%s\n","[(oxCreateClient) ip dataport controlport] extension client."); |
if (SecureMode) errorKan1("%s\n","Security violation for oxCreateClient."); |
if (SecureMode) errorKan1("%s\n","Security violation for oxCreateClient."); |
Line 73 else if (strcmp(key,"oxGetPort") == 0) { |
|
Line 73 else if (strcmp(key,"oxGetPort") == 0) { |
|
if (SecureMode) errorKan1("%s\n","Security violation for oxGetPort."); |
if (SecureMode) errorKan1("%s\n","Security violation for oxGetPort."); |
rob = KoxGetPort(getoa(obj,1)); |
rob = KoxGetPort(getoa(obj,1)); |
} |
} |
|
else if (strcmp(key,"oxGetPort1") == 0) { |
|
if (size != 2) errorKan1("%s\n","[(oxGetPort1) host] extension obj"); |
|
if (SecureMode) errorKan1("%s\n","Security violation for oxGetPort."); |
|
rob = KoxGetPort1(getoa(obj,1)); |
|
} |
else if (strcmp(key,"oxCreateClient2") == 0) { |
else if (strcmp(key,"oxCreateClient2") == 0) { |
if (size != 4) errorKan1("%s\n","[(oxCreateClient2) peer ipmask pass] extension client."); |
if (size != 4) errorKan1("%s\n","[(oxCreateClient2) peer ipmask pass] extension client."); |
if (SecureMode) errorKan1("%s\n","Security violation for oxCreateClient2."); |
if (SecureMode) errorKan1("%s\n","Security violation for oxCreateClient2."); |
Line 101 else if (strcmp(key,"oxPrintMessage") == 0) { |
|
Line 106 else if (strcmp(key,"oxPrintMessage") == 0) { |
|
OXprintMessage = KopInteger(obj1); |
OXprintMessage = KopInteger(obj1); |
rob = KpoInteger(OXprintMessage); |
rob = KpoInteger(OXprintMessage); |
} |
} |
|
} |
|
else if (strcmp(key,"oxPushCMD") == 0) { |
|
if (size == 3) { |
|
lockCtrlCForOx(); |
|
rob = KoxPushCMD(getoa(obj,1),getoa(obj,2)); |
|
unlockCtrlCForOx(); |
|
}else { |
|
errorKan1("%s\n","[(oxPushCMD) client SM_id] extension result."); |
|
} |
|
} |
|
else if (strcmp(key,"oxPushCMO") == 0) { |
|
if (size == 3) { |
|
lockCtrlCForOx(); |
|
rob = KoxPushCMO(getoa(obj,1),getoa(obj,2)); |
|
unlockCtrlCForOx(); |
|
}else { |
|
errorKan1("%s\n","[(oxPushCMO) client obj] extension result."); |
|
} |
|
} |
|
else if (strcmp(key,"oxCreateControl_RFC_101") == 0) { |
|
if (size != 4) errorKan1("%s\n","[(oxCreateControl_RFC_101) peer ipmask pass] extension client."); |
|
if (SecureMode) errorKan1("%s\n","Security violation for oxCreateControl_RFC_101."); |
|
rob = KoxCreateControl_RFC_101(getoa(obj,1),getoa(obj,2),getoa(obj,3)); |
|
} |
|
else if (strcmp(key,"oxCreateEngine_RFC_101") == 0) { |
|
if (size != 5) errorKan1("%s\n","[(oxCreateEngine_RFC_101) peer ipmask pass engineID] extension client."); |
|
if (SecureMode) errorKan1("%s\n","Security violation for oxCreateEngine_RFC_101."); |
|
rob = KoxCreateEngine_RFC_101(getoa(obj,1),getoa(obj,2),getoa(obj,3),getoa(obj,4)); |
} |
} |
|
|
|
|