/freebsd-11-stable/crypto/heimdal/lib/roken/ |
H A D | dumpdata.c | 63 ssize_t sret; local 81 sret = net_read(fd, *buf, *size); 82 if (sret < 0) 84 else if (sret != (ssize_t)*size) {
|
H A D | rkpty.c | 210 ssize_t sret; local 219 while((sret = read(master, &in, sizeof(in))) > 0) { 237 if (sret <= 0)
|
/freebsd-11-stable/lib/libc/tests/string/ |
H A D | strerror_test.c | 39 static char *sret; variable 47 sret = strerror(INT_MAX); 49 ATF_CHECK(strcmp(sret, buf) == 0); 58 sret = strerror(0); 59 ATF_CHECK(strcmp(sret, "No error: 0") == 0); 68 sret = strerror(EPERM); 69 ATF_CHECK(strcmp(sret, "Operation not permitted") == 0); 78 sret = strerror(EPFNOSUPPORT); 79 ATF_CHECK(strcmp(sret, "Protocol family not supported") == 0); 88 sret [all...] |
/freebsd-11-stable/lib/libc/stdio/ |
H A D | fgetws.c | 48 int sret; local 73 sret = 0; 101 (sret = __srefill(fp)) == 0)); 102 if (sret && !__sfeof(fp))
|
/freebsd-11-stable/crypto/heimdal/lib/krb5/ |
H A D | sendauth.c | 86 ssize_t sret; local 107 sret = krb5_net_read (context, p_fd, &repl, sizeof(repl)); 108 if (sret < 0) { 112 } else if (sret != sizeof(repl)) {
|
H A D | kcm.c | 563 ssize_t sret; local 567 sret = krb5_storage_read(response, &uuid, sizeof(uuid)); 568 if (sret == 0) { 571 } else if (sret != sizeof(uuid)) { 623 ssize_t sret; local 640 sret = krb5_storage_write(request, 644 if (sret != sizeof(c->uuids[c->offset])) { 807 ssize_t sret; local 811 sret = krb5_storage_read(response, &uuid, sizeof(uuid)); 812 if (sret 858 ssize_t sret; local [all...] |
H A D | pac.c | 902 ssize_t sret; local 909 sret = krb5_storage_write(sp, zeros, l); 910 if (sret <= 0) 913 len -= sret; 1039 size_t sret; local 1064 sret = krb5_storage_write(spdata, ptr, len); 1065 if (sret != len) {
|
H A D | fcache.c | 153 ssize_t sret; local 160 sret = write(fd, data.data, data.length); 161 ret = (sret != (ssize_t)data.length);
|
/freebsd-11-stable/contrib/llvm-project/compiler-rt/lib/hwasan/ |
H A D | hwasan_interceptors.cpp | 124 __sanitizer_struct_mallinfo sret; local 125 internal_memset(&sret, 0, sizeof(sret)); 126 return sret;
|
/freebsd-11-stable/crypto/heimdal/kadmin/ |
H A D | rpc.c | 725 ssize_t sret; local 732 sret = krb5_storage_read(sp, data->data, data->length); 733 INSIST(sret == off); 1058 ssize_t sret; local 1060 sret = krb5_storage_write(reply, data.data, data.length); 1061 INSIST((size_t)sret == data.length); 1085 ssize_t sret; local 1088 sret = krb5_storage_write(sp, data.data, data.length); 1089 INSIST((size_t)sret == data.length);
|
/freebsd-11-stable/crypto/heimdal/kcm/ |
H A D | protocol.c | 462 ssize_t sret; local 463 sret = krb5_storage_write(response, &creds->uuid, sizeof(creds->uuid)); 464 if (sret != sizeof(creds->uuid)) { 495 ssize_t sret; local 509 sret = krb5_storage_read(request, &uuid, sizeof(uuid)); 510 if (sret != sizeof(uuid)) { 1033 ssize_t sret; local 1038 sret = krb5_storage_read(request, &uuid, sizeof(uuid)); 1039 if (sret != sizeof(uuid)) {
|
/freebsd-11-stable/crypto/openssh/openbsd-compat/ |
H A D | bsd-cray.c | 214 ia_success_ret_t sret; /* ia_success return stuff */ local 480 sret.revision = 0; 481 sret.normal = 0; 483 ia_success(&ssent, &sret);
|
/freebsd-11-stable/crypto/heimdal/lib/kadm5/ |
H A D | ipropd_slave.c | 187 ssize_t sret; local 220 sret = write (server_context->log_context.log_fd, buf, right-left); 221 if (sret != right - left)
|
/freebsd-11-stable/contrib/llvm-project/compiler-rt/lib/msan/ |
H A D | msan_interceptors.cpp | 251 // aarch64 (which uses a different register for sret value). We have a test 253 INTERCEPTOR(void, mallinfo, __sanitizer_struct_mallinfo *sret) { argument 257 sret = reinterpret_cast<__sanitizer_struct_mallinfo*>(r8); 259 REAL(memset)(sret, 0, sizeof(*sret)); 260 __msan_unpoison(sret, sizeof(*sret));
|
/freebsd-11-stable/contrib/bsnmp/snmpd/ |
H A D | main.c | 487 int sret; local 498 switch (sret = snmp_pdu_snoop(&b)) { 507 b.asn_len = *pdulen = (size_t)sret;
|
/freebsd-11-stable/contrib/llvm-project/llvm/lib/AsmParser/ |
H A D | LLLexer.cpp | 676 KEYWORD(sret);
|