Searched defs:retry (Results 1 - 25 of 41) sorted by relevance

12

/external/libppp/src/
H A Dauth.h47 int retry; member in struct:authinfo
/external/grub/netboot/
H A Dfsys_tftp.c37 static int retry; variable
63 timeout = rfc2131_sleep_interval (block ? TFTP_REXMT : TIMEOUT, retry);
65 timeout = rfc2131_sleep_interval (TIMEOUT, retry);
73 if (! block && retry++ < MAX_TFTP_RETRIES)
87 if (block && ((retry += TFTP_REXMT) < TFTP_TIMEOUT))
239 retry = 0;
262 retry = 0;
H A Dmain.c205 int retry; local
272 for (retry = 1; retry <= MAX_ARP_RETRIES; retry++)
277 timeout = rfc2131_sleep_interval (TIMEOUT, retry);
302 int retry = 0; local
333 timeout = rfc2131_sleep_interval (block ? TFTP_REXMT : TIMEOUT, retry);
335 timeout = rfc2131_sleep_interval (TIMEOUT, retry);
340 if (! block && retry++ < MAX_TFTP_RETRIES)
351 if (block && ((retry
479 int retry; local
534 int retry; local
[all...]
/external/nist-sip/java/gov/nist/javax/sip/stack/
H A DIOHandler.java155 * @param retry -- retry to connect if the other end closed connection
160 int contactPort, String transport, byte[] bytes, boolean retry,
163 int max_retry = retry ? 2 : 1;
159 sendBytes(InetAddress senderAddress, InetAddress receiverAddress, int contactPort, String transport, byte[] bytes, boolean retry, MessageChannel messageChannel) argument
H A DTCPMessageChannel.java240 * @param retry
242 private void sendMessage(byte[] msg, boolean retry) throws IOException { argument
253 this.peerAddress, this.peerPort, this.peerProtocol, msg, retry, this);
290 // JvB: also retry for responses, if the connection is gone we should
307 boolean retry) throws IOException {
311 receiverAddress, receiverPort, "TCP", message, retry, this);
306 sendMessage(byte message[], InetAddress receiverAddress, int receiverPort, boolean retry) argument
H A DTLSMessageChannel.java252 * @param retry
254 private void sendMessage(byte[] msg, boolean retry) throws IOException { argument
257 this.peerProtocol, msg, retry,this);
305 boolean retry) throws IOException {
309 receiverAddress, receiverPort, "TLS", message, retry, this);
304 sendMessage(byte message[], InetAddress receiverAddress, int receiverPort, boolean retry) argument
H A DUDPMessageChannel.java749 int peerPort, String peerProtocol, boolean retry)
795 peerPort, "tcp", msg, retry,this);
748 sendMessage(byte[] msg, InetAddress peerAddress, int peerPort, String peerProtocol, boolean retry) argument
/external/wpa_supplicant_8/hostapd/src/wps/
H A Dwps_upnp_event.c52 unsigned int retry; /* which retry */ member in struct:wps_event_
60 * Leaves data, retry count etc. alone.
128 e->retry++;
129 wpa_printf(MSG_DEBUG, "WPS UPnP: Try address %d", e->retry);
131 if (e->retry >= dl_list_len(&s->addr_list)) {
291 if (itry++ == e->retry)
293 if (itry < e->retry)
/external/wpa_supplicant_8/src/wps/
H A Dwps_upnp_event.c52 unsigned int retry; /* which retry */ member in struct:wps_event_
60 * Leaves data, retry count etc. alone.
128 e->retry++;
129 wpa_printf(MSG_DEBUG, "WPS UPnP: Try address %d", e->retry);
131 if (e->retry >= dl_list_len(&s->addr_list)) {
291 if (itry++ == e->retry)
293 if (itry < e->retry)
/external/wpa_supplicant_8/wpa_supplicant/src/wps/
H A Dwps_upnp_event.c52 unsigned int retry; /* which retry */ member in struct:wps_event_
60 * Leaves data, retry count etc. alone.
128 e->retry++;
129 wpa_printf(MSG_DEBUG, "WPS UPnP: Try address %d", e->retry);
131 if (e->retry >= dl_list_len(&s->addr_list)) {
291 if (itry++ == e->retry)
293 if (itry < e->retry)
/external/chromium/android/autofill/
H A Durl_fetcher_proxy.h86 virtual void set_automatically_retry_on_5xx(bool retry) argument
88 retry_ = retry;
/external/chromium/chrome/browser/ui/gtk/
H A Dcrypto_module_password_dialog.cc40 virtual std::string RequestPassword(const std::string& slot_name, bool retry, argument
50 retry))) {
58 void ShowDialog(const std::string& slot_name, bool retry) { argument
61 slot_name, retry, reason_, server_,
84 bool retry,
105 bool retry,
215 bool retry,
219 (new CryptoModulePasswordDialog(slot_name, retry, reason, server,
103 CryptoModulePasswordDialog( const std::string& slot_name, bool retry, browser::CryptoModulePasswordReason reason, const std::string& server, browser::CryptoModulePasswordCallback* callback) argument
214 ShowCryptoModulePasswordDialog(const std::string& slot_name, bool retry, CryptoModulePasswordReason reason, const std::string& server, CryptoModulePasswordCallback* callback) argument
/external/oprofile/module/
H A Dcompat22.h89 int retry, int wait)
88 smp_call_function(void (*func) (void * info), void * info, int retry, int wait) argument
/external/wpa_supplicant_6/wpa_supplicant/src/wps/
H A Dwps_upnp_event.c54 int retry; /* which retry */ member in struct:wps_event_
67 * Leaves data, retry count etc. alone.
189 e->retry++;
190 if (e->retry >= s->n_addr) {
393 for (itry = 0; itry < e->retry; itry++)
/external/chromium/chrome/common/net/
H A Durl_fetcher.cc146 // retry.
151 // back-off release time of URL A won't increase. If we retry without
573 void URLFetcher::set_automatically_retry_on_5xx(bool retry) { argument
574 automatically_retry_on_5xx_ = retry;
/external/chromium/crypto/
H A Dnss_util.cc102 char* PKCS11PasswordFunc(PK11SlotInfo* slot, PRBool retry, void* arg) { argument
120 retry != PR_FALSE,
511 // login while the PINs are being initialized, and we want to retry
/external/icu4c/common/
H A Dlocdispnames.cpp472 UBool retry = FALSE; /* set true if we need to retry, see below */ local
694 sub0Pos=0; /* stops initial padding (and a second retry,
696 retry=TRUE;
704 } while(retry);
/external/openssl/ssl/
H A Dssl_sess.c252 unsigned int retry = 0; local
257 (++retry < MAX_SESS_ID_ATTEMPTS));
258 if(retry < MAX_SESS_ID_ATTEMPTS)
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
H A Deap_mschapv2.c397 int retry = 1; local
418 retry = atoi(pos);
419 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: retry is %sallowed",
420 retry == 1 ? "" : "not ");
469 "EAP-MSCHAPV2: failure message: '%s' (retry %sallowed, error "
471 msg, retry == 1 ? "" : "not ", data->prev_error);
480 } else if (retry == 1 && config) {
492 return retry == 1;
635 int retry = 0; local
649 retry
[all...]
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dtls_nss.c217 static char * nss_password_cb(PK11SlotInfo *slot, PRBool retry, void *arg) argument
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_mschapv2.c399 int retry = 1; local
420 retry = atoi(pos);
421 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: retry is %sallowed",
422 retry == 1 ? "" : "not ");
471 "EAP-MSCHAPV2: failure message: '%s' (retry %sallowed, error "
473 msg, retry == 1 ? "" : "not ", data->prev_error);
482 } else if (retry == 1 && config) {
494 return retry == 1;
637 int retry = 0; local
651 retry
[all...]
/external/wpa_supplicant_8/src/crypto/
H A Dtls_nss.c217 static char * nss_password_cb(PK11SlotInfo *slot, PRBool retry, void *arg) argument
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_mschapv2.c399 int retry = 1; local
420 retry = atoi(pos);
421 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: retry is %sallowed",
422 retry == 1 ? "" : "not ");
471 "EAP-MSCHAPV2: failure message: '%s' (retry %sallowed, error "
473 msg, retry == 1 ? "" : "not ", data->prev_error);
482 } else if (retry == 1 && config) {
494 return retry == 1;
637 int retry = 0; local
651 retry
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dtls_nss.c217 static char * nss_password_cb(PK11SlotInfo *slot, PRBool retry, void *arg) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_mschapv2.c399 int retry = 1; local
420 retry = atoi(pos);
421 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: retry is %sallowed",
422 retry == 1 ? "" : "not ");
471 "EAP-MSCHAPV2: failure message: '%s' (retry %sallowed, error "
473 msg, retry == 1 ? "" : "not ", data->prev_error);
482 } else if (retry == 1 && config) {
494 return retry == 1;
637 int retry = 0; local
651 retry
[all...]

Completed in 1605 milliseconds

12