static int reply_ok_binary(descriptor_t *desc, char *ptr, int beg_offset, int length) { ErlDrvTermData msg[24]; int i = 0; int res; i = LOAD_PORT(msg, i, driver_mk_port(desc->port)); i = LOAD_ATOM(msg, i, am_ok); i = LOAD_BINARY(msg, i, edtk_alloced_ptr2ErlDrvBinary(ptr), beg_offset, length); i = LOAD_TUPLE(msg, i, 3); edtk_debug("%s: i = %d, ptr = 0x%lx, start = %d, end = %d", __FUNCTION__, i, ptr, beg_offset, length); res = driver_output_term(desc->port, msg, i); /* driver_output_term() incrs refc, and we're done, so decr refc */ /* ** We _know_ that "ptr" points to memory allocated by ** edtk_driver_alloc_wrapper(), so edtk_alloced_ptr2ErlDrvBinary() ** is safe in this case. If it weren't safe, then the binary ** must be returned by an xtra_return, which means we ** reply_ok_binary()) are never called! */ driver_free_binary(edtk_alloced_ptr2ErlDrvBinary(ptr)); edtk_debug("%s: res = %d", __FUNCTION__, res); return res; }
/* send {P, value, Bin} to caller */ static ErlDrvSSizeT driver_send_bin(t_iconvdrv *iv, ErlDrvBinary *bin, ErlDrvSizeT len) { int i = 0; ErlDrvTermData to, spec[10]; to = driver_caller(iv->port); i = LOAD_PORT(spec, i, iv->dport); i = LOAD_ATOM(spec, i, am_value); i = LOAD_BINARY(spec, i, bin, 0, len); i = LOAD_TUPLE(spec, i, 3); return erl_drv_send_term(driver_mk_port(iv->port), to, spec, i); }
/* send {P, value, Bin} to caller */ static int driver_send_bin(t_iconvdrv *iv, ErlDrvBinary *bin, int len) { int i = 0; ErlDrvTermData to, spec[10]; to = driver_caller(iv->port); i = LOAD_PORT(spec, i, iv->dport); i = LOAD_ATOM(spec, i, am_value); i = LOAD_BINARY(spec, i, bin, 0, len); i = LOAD_TUPLE(spec, i, 3); return driver_send_term(iv->port, to, spec, i); }