Home
last modified time | relevance | path

Searched refs:err_ret (Results 1 – 4 of 4) sorted by relevance

/external/python/cpython2/Parser/
Dparsetok.c18 static void initerr(perrdetail *err_ret, const char* filename);
22 PyParser_ParseString(const char *s, grammar *g, int start, perrdetail *err_ret) in PyParser_ParseString() argument
24 return PyParser_ParseStringFlagsFilename(s, NULL, g, start, err_ret, 0); in PyParser_ParseString()
29 perrdetail *err_ret, int flags) in PyParser_ParseStringFlags() argument
32 g, start, err_ret, flags); in PyParser_ParseStringFlags()
38 perrdetail *err_ret, int flags) in PyParser_ParseStringFlagsFilename() argument
42 err_ret, &iflags); in PyParser_ParseStringFlagsFilename()
48 perrdetail *err_ret, int *flags) in PyParser_ParseStringFlagsFilenameEx() argument
52 initerr(err_ret, filename); in PyParser_ParseStringFlagsFilenameEx()
55 err_ret->error = PyErr_Occurred() ? E_DECODE : E_NOMEM; in PyParser_ParseStringFlagsFilenameEx()
[all …]
/external/ltp/testcases/kernel/ipc/semaphore/
Dsem02.c72 int err_ret; /* This is used to determine PASS/FAIL status */ variable
98 err_ret = 1; /* Set initial error value to 1 */ in main()
111 if (err_ret == 1) in main()
135 err_ret = 0; /* If the message above is displayed, the test is a PASS */ in waiter()
/external/libchrome/sandbox/linux/seccomp-bpf/
Dsyscall.cc407 intptr_t* err_ret) { in SandboxSyscallRaw() argument
427 *err_ret = err_stat; in SandboxSyscallRaw()
/external/syslinux/core/lwip/src/core/snmp/
Dmsg_in.c123 err_t err_ret; in snmp_ok_response() local
125 err_ret = snmp_send_response(msg_ps); in snmp_ok_response()
126 if (err_ret == ERR_MEM) in snmp_ok_response()
813 err_t err_ret; in snmp_recv() local
846 err_ret = snmp_pdu_header_check(p, payload_ofs, payload_len, &varbind_ofs, msg_ps); in snmp_recv()
849 if ((err_ret != ERR_OK) || in snmp_recv()
865 err_ret = snmp_pdu_dec_varbindlist(p, varbind_ofs, &varbind_ofs, msg_ps); in snmp_recv()
868 if ((err_ret != ERR_OK) || (msg_ps->invb.count == 0)) in snmp_recv()