strmCfg.datRegion = datRegId;
- RETVALUE(ROK);
+ return ROK;
}
\f
if (mp == NULLP)
{
SSLOGERROR(ERRCLS_INT_PAR, ESS325, ERRZERO, "Null pointer");
- RETVALUE(0);
+ return (0);
}
#endif
if (len == 0) /* nothing to do */
{
- RETVALUE(1);
+ return (1);
}
/* if we can't trim len bytes, fail */
if (len > size)
{
- RETVALUE(0);
+ return (0);
}
size += len;
if (size < 0)
{
- RETVALUE(0);
+ return (0);
}
}
- RETVALUE(1);
+ return (1);
} /* ssAdjMsg */
\f
SSLOGERROR(ERRCLS_ADD_RES, ESS326, (ErrVal) r, "SAlloc() failed");
#endif
- RETVALUE(NULLP);
+ return (NULLP);
}
#else
SFree(strmCfg.mdRegion, (Data *)bp, m);
#endif /* SS_HISTOGRAM_SUPPORT */
- RETVALUE(NULLP);
+ return (NULLP);
}
}
/* we _can_ allocate a message with an empty data block */
SS_STRM_INITB(bp, (SsDblk *)(((U8 *)bp) + sizeof(SsMblk)), dat, size, NULLP);
- RETVALUE(bp);
+ return (bp);
} /* ssAllocB */
\f
if (mp == NULLP)
{
SSLOGERROR(ERRCLS_INT_PAR, ESS328, ERRZERO, "Null pointer");
- RETVALUE(NULLP);
+ return (NULLP);
}
#endif
SSLOGERROR(ERRCLS_ADD_RES, ESS329, ERRZERO, "ssAllocB() failed");
#endif
- RETVALUE(NULLP);
+ return (NULLP);
}
}
- RETVALUE(bp);
+ return (bp);
} /* ssCopyB */
\f
if (mp == NULLP)
{
SSLOGERROR(ERRCLS_INT_PAR, ESS330, ERRZERO, "Null pointer");
- RETVALUE(NULLP);
+ return (NULLP);
}
#endif
SSLOGERROR(ERRCLS_ADD_RES, ESS331, ERRZERO, "ssCopyB() failed");
#endif
- RETVALUE(NULLP);
+ return (NULLP);
}
#endif
ssFreeMsg(first);
- RETVALUE(NULLP);
+ return (NULLP);
}
bp = bp->b_cont;
}
- RETVALUE(first);
+ return (first);
} /* ssCopyMsg */
\f
if (mp == NULLP)
{
SSLOGERROR(ERRCLS_INT_PAR, ESS333, ERRZERO, "Null pointer");
- RETVALUE(NULLP);
+ return (NULLP);
}
#endif
SSLOGERROR(ERRCLS_ADD_RES, ESS334, ERRZERO, "ssAllocB() failed");
#endif
- RETVALUE(NULLP);
+ return (NULLP);
}
{
SSLOGERROR(ERRCLS_DEBUG, ESS335, ERRZERO,
"Could not lock the mBuf Ref Lock");
- RETVALUE(NULLP);
+ return (NULLP);
}
#endif
#if (ERRCLASS & ERRCLS_DEBUG)
SSLOGERROR(ERRCLS_DEBUG, ESS336, ERRZERO,
"Could not give the Semaphore");
- RETVALUE(NULLP);
+ return (NULLP);
#endif
}
#endif
- RETVALUE(bp);
+ return (bp);
} /* ssDupB */
\f
SSLOGERROR(ERRCLS_ADD_RES, ESS337, ERRZERO, "ssDupB() failed");
#endif
- RETVALUE(NULLP);
+ return (NULLP);
}
#endif
ssFreeMsg(first);
- RETVALUE(NULLP);
+ return (NULLP);
}
bp = bp->b_cont;
}
- RETVALUE(first);
+ return (first);
} /* ssDupMsg */
\f
if (base == NULLP || fr_rtn == NULLP)
{
SSLOGERROR(ERRCLS_INT_PAR, ESS339, ERRZERO, "Null pointer");
- RETVALUE(NULLP);
+ return (NULLP);
}
#endif
SSLOGERROR(ERRCLS_ADD_RES, ESS340, (ErrVal) r, "SAlloc() failed");
#endif
- RETVALUE(NULLP);
+ return (NULLP);
}
base, size, fr_rtn);
- RETVALUE(bp);
+ return (bp);
} /* ssESBAlloc */
\f
}
- RETVALUE(size);
+ return (size);
} /* ssMsgDSize */
\f
if (mp == NULLP)
{
SSLOGERROR(ERRCLS_INT_PAR, ESS346, ERRZERO, "Null pointer");
- RETVALUE(0);
+ return (0);
}
if (len < -1)
{
SSLOGERROR(ERRCLS_INT_PAR, ESS347, len, "Invalid length");
- RETVALUE(0);
+ return (0);
}
#endif
if (len == 0)
{
- RETVALUE(1);
+ return (1);
}
/* do we have enough bytes to pull up? */
if (len < 0 || len > mLen)
{
- RETVALUE(0);
+ return (0);
}
newbp = ssAllocB(len, 0);
if (newbp == NULLP)
{
- RETVALUE(0);
+ return (0);
}
newbp->b_datap->db_type = mp->b_datap->db_type;
ssFreeB(newbp);
- RETVALUE(1);
+ return (1);
} /* ssPullupMsg */
\f
if (mp == NULLP || bp == NULLP)
{
SSLOGERROR(ERRCLS_INT_PAR, ESS348, ERRZERO, "Null pointer");
- RETVALUE(NULLP);
+ return (NULLP);
}
#endif
{
if (mp == NULLP)
{
- RETVALUE((SsMblk *)-1);
+ return ((SsMblk *)-1);
}
else if (mp->b_cont == bp)
{
bp->b_cont = NULLP;
- RETVALUE(rp);
+ return (rp);
} /* ssRmvB */
\f
if (bp)
{
ssFreeB(bp);
- RETVALUE(1);
+ return (1);
}
- RETVALUE(0);
+ return (0);
} /* ssTestB */
\f
if (mp == NULLP)
{
SSLOGERROR(ERRCLS_INT_PAR, ESS349, ERRZERO, "Null pointer");
- RETVALUE(NULLP);
+ return (NULLP);
}
#endif
mp->b_cont = NULLP;
- RETVALUE(bp);
+ return (bp);
} /* ssUnlinkB */
/**********************************************************************