*
* DAPL Requirements Version 2.0, 6.6.x
*
- * Requests that a connection be established\r
- * between the local Endpoint and a remote Endpoint specified by the\r
- * remote_ia_address. This operation is used by the active/client side\r
- * Consumer of the Connection establishment model.\r
- *\r
- * EP must be properly configured for this operation. The EP Communicator\r
- * must be specified. As part of the successful completion of this operation,\r
- * the local Endpoint is bound to a local IA Address if it had these assigned\r
- * before.\r
- * \r
- * The local IP Address, port and protocol are passed to the remote side of\r
- * the requested connection and is available to the remote Consumer in the\r
- * Connection Request of the DAT_CONNECTION_REQUEST_EVENT.\r
- * \r
- * The Consumer-provided private_data is passed to the remote side and is\r
- * provided to the remote Consumer in the Connection Request. Consumers\r
- * can encapsulate any local Endpoint attributes that remote Consumers\r
+ * Requests that a connection be established
+ * between the local Endpoint and a remote Endpoint specified by the
+ * remote_ia_address. This operation is used by the active/client side
+ * Consumer of the Connection establishment model.
+ *
+ * EP must be properly configured for this operation. The EP Communicator
+ * must be specified. As part of the successful completion of this operation,
+ * the local Endpoint is bound to a local IA Address if it had these assigned
+ * before.
+ *
+ * The local IP Address, port and protocol are passed to the remote side of
+ * the requested connection and is available to the remote Consumer in the
+ * Connection Request of the DAT_CONNECTION_REQUEST_EVENT.
+ *
+ * The Consumer-provided private_data is passed to the remote side and is
+ * provided to the remote Consumer in the Connection Request. Consumers
+ * can encapsulate any local Endpoint attributes that remote Consumers
* need to know as part of an upper-level protocol.
*
* Input:
*
* DAPL Requirements Version 2.0, 6.7.3.x
*
- * Creates an RMR that is specific to a single connection at a time.\r
- * \r
- * This operation is relatively heavy. The created RMR can be bound to a\r
- * memory region within the LMR through a lightweight dat_rmr_bind\r
- * operation for EPs that use the pz_handle that generates rmr_context.\r
- * \r
- * If the operation fails (does not return DAT_SUCCESS), the return values\r
- * of rmr_handle are undefined and Consumers should not use it.\r
- * pz_handle provide Consumers a way to restrict access to an RMR by\r
+ * Creates an RMR that is specific to a single connection at a time.
+ *
+ * This operation is relatively heavy. The created RMR can be bound to a
+ * memory region within the LMR through a lightweight dat_rmr_bind
+ * operation for EPs that use the pz_handle that generates rmr_context.
+ *
+ * If the operation fails (does not return DAT_SUCCESS), the return values
+ * of rmr_handle are undefined and Consumers should not use it.
+ * pz_handle provide Consumers a way to restrict access to an RMR by
* authorized connections only.
*
*
DAPL_DTO_TYPE_RDMA_WRITE,
DAPL_DTO_TYPE_RDMA_READ,
#ifdef DAT_EXTENSIONS
- DAPL_DTO_TYPE_EXTENSION,\r
+ DAPL_DTO_TYPE_EXTENSION,
#endif
} DAPL_DTO_TYPE;
#ifdef DAT_EXTENSIONS
#include <stdarg.h>
-extern DAT_RETURN dapl_extensions(\r
- IN DAT_HANDLE, /* handle */\r
- IN DAT_EXTENDED_OP, /* extended op */\r
+extern DAT_RETURN dapl_extensions(
+ IN DAT_HANDLE, /* handle */
+ IN DAT_EXTENDED_OP, /* extended op */
IN va_list); /* argument list */
#endif
low_watermark);
}
-#ifdef DAT_EXTENSIONS\r
-extern int g_dat_extensions;\r
-DAT_RETURN dat_extension_op(\r
- IN DAT_HANDLE handle,\r
- IN DAT_EXTENDED_OP ext_op,\r
- IN ... )\r
-\r
-{\r
- DAT_RETURN status;\r
- DAT_IA_HANDLE dapl_handle;\r
- va_list args;\r
-\r
- /* If not IA handle then just passthrough */\r
- if (dats_get_ia_handle((unsigned long)handle,\r
- &dapl_handle) != DAT_SUCCESS)\r
- {\r
- dapl_handle = handle;\r
- }\r
-\r
- /* verify provider extension support */\r
- if (!g_dat_extensions)\r
- {\r
- return DAT_ERROR(DAT_NOT_IMPLEMENTED, 0);\r
- }\r
- \r
- /* extension will validate the handle based on op */\r
- va_start(args, ext_op);\r
- status = DAT_HANDLE_EXTENDEDOP(dapl_handle, ext_op, args);\r
- va_end(args);\r
-\r
- return status;\r
-}\r
-#endif\r
+#ifdef DAT_EXTENSIONS
+extern int g_dat_extensions;
+DAT_RETURN dat_extension_op(
+ IN DAT_HANDLE handle,
+ IN DAT_EXTENDED_OP ext_op,
+ IN ... )
+
+{
+ DAT_RETURN status;
+ DAT_IA_HANDLE dapl_handle;
+ va_list args;
+
+ /* If not IA handle then just passthrough */
+ if (dats_get_ia_handle((unsigned long)handle,
+ &dapl_handle) != DAT_SUCCESS)
+ {
+ dapl_handle = handle;
+ }
+
+ /* verify provider extension support */
+ if (!g_dat_extensions)
+ {
+ return DAT_ERROR(DAT_NOT_IMPLEMENTED, 0);
+ }
+
+ /* extension will validate the handle based on op */
+ va_start(args, ext_op);
+ status = DAT_HANDLE_EXTENDEDOP(dapl_handle, ext_op, args);
+ va_end(args);
+
+ return status;
+}
+#endif
/*
data->fini_func = dat_os_library_sym (data->lib_handle,
DAT_PROVIDER_FINI_FUNC_STR);
- /* Warning: DAT and DAPL libraries not ext compatible */\r
-#ifdef DAT_EXTENSIONS\r
-{\r
+ /* Warning: DAT and DAPL libraries not ext compatible */
+#ifdef DAT_EXTENSIONS
+{
void *fncptr;
-\r
- fncptr = dat_os_library_sym(data->lib_handle,\r
- "dapl_extensions");\r
-\r
- if ((dlerror() != NULL) || (fncptr == NULL)) \r
- {\r
- dat_os_dbg_print(DAT_OS_DBG_TYPE_SR,\r
- "DAT Registry: WARNING: library %s, "\r
- "extended DAT expected extended uDAPL: %s\n",\r
- data->lib_path, strerror(errno));\r
- }\r
-}\r
-#endif\r
+
+ fncptr = dat_os_library_sym(data->lib_handle,
+ "dapl_extensions");
+
+ if ((dlerror() != NULL) || (fncptr == NULL))
+ {
+ dat_os_dbg_print(DAT_OS_DBG_TYPE_SR,
+ "DAT Registry: WARNING: library %s, "
+ "extended DAT expected extended uDAPL: %s\n",
+ data->lib_path, strerror(errno));
+ }
+}
+#endif
if ( NULL != data->init_func )
{