Searched refs:err_ret (Results 1 – 4 of 4) sorted by relevance
/external/python/cpython2/Parser/ |
D | parsetok.c | 18 static void initerr(perrdetail *err_ret, const char* filename); 22 PyParser_ParseString(const char *s, grammar *g, int start, perrdetail *err_ret) in PyParser_ParseString() argument 24 return PyParser_ParseStringFlagsFilename(s, NULL, g, start, err_ret, 0); in PyParser_ParseString() 29 perrdetail *err_ret, int flags) in PyParser_ParseStringFlags() argument 32 g, start, err_ret, flags); in PyParser_ParseStringFlags() 38 perrdetail *err_ret, int flags) in PyParser_ParseStringFlagsFilename() argument 42 err_ret, &iflags); in PyParser_ParseStringFlagsFilename() 48 perrdetail *err_ret, int *flags) in PyParser_ParseStringFlagsFilenameEx() argument 52 initerr(err_ret, filename); in PyParser_ParseStringFlagsFilenameEx() 55 err_ret->error = PyErr_Occurred() ? E_DECODE : E_NOMEM; in PyParser_ParseStringFlagsFilenameEx() [all …]
|
/external/ltp/testcases/kernel/ipc/semaphore/ |
D | sem02.c | 72 int err_ret; /* This is used to determine PASS/FAIL status */ variable 98 err_ret = 1; /* Set initial error value to 1 */ in main() 111 if (err_ret == 1) in main() 135 err_ret = 0; /* If the message above is displayed, the test is a PASS */ in waiter()
|
/external/libchrome/sandbox/linux/seccomp-bpf/ |
D | syscall.cc | 407 intptr_t* err_ret) { in SandboxSyscallRaw() argument 427 *err_ret = err_stat; in SandboxSyscallRaw()
|
/external/syslinux/core/lwip/src/core/snmp/ |
D | msg_in.c | 123 err_t err_ret; in snmp_ok_response() local 125 err_ret = snmp_send_response(msg_ps); in snmp_ok_response() 126 if (err_ret == ERR_MEM) in snmp_ok_response() 813 err_t err_ret; in snmp_recv() local 846 err_ret = snmp_pdu_header_check(p, payload_ofs, payload_len, &varbind_ofs, msg_ps); in snmp_recv() 849 if ((err_ret != ERR_OK) || in snmp_recv() 865 err_ret = snmp_pdu_dec_varbindlist(p, varbind_ofs, &varbind_ofs, msg_ps); in snmp_recv() 868 if ((err_ret != ERR_OK) || (msg_ps->invb.count == 0)) in snmp_recv()
|