/external/libppp/src/ |
H A D | auth.h | 47 int retry; member in struct:authinfo
|
/external/grub/netboot/ |
H A D | fsys_tftp.c | 37 static int retry; variable 63 timeout = rfc2131_sleep_interval (block ? TFTP_REXMT : TIMEOUT, retry); 65 timeout = rfc2131_sleep_interval (TIMEOUT, retry); 73 if (! block && retry++ < MAX_TFTP_RETRIES) 87 if (block && ((retry += TFTP_REXMT) < TFTP_TIMEOUT)) 239 retry = 0; 262 retry = 0;
|
H A D | main.c | 205 int retry; local 272 for (retry = 1; retry <= MAX_ARP_RETRIES; retry++) 277 timeout = rfc2131_sleep_interval (TIMEOUT, retry); 302 int retry = 0; local 333 timeout = rfc2131_sleep_interval (block ? TFTP_REXMT : TIMEOUT, retry); 335 timeout = rfc2131_sleep_interval (TIMEOUT, retry); 340 if (! block && retry++ < MAX_TFTP_RETRIES) 351 if (block && ((retry 479 int retry; local 534 int retry; local [all...] |
/external/nist-sip/java/gov/nist/javax/sip/stack/ |
H A D | IOHandler.java | 155 * @param retry -- retry to connect if the other end closed connection 160 int contactPort, String transport, byte[] bytes, boolean retry, 163 int max_retry = retry ? 2 : 1; 159 sendBytes(InetAddress senderAddress, InetAddress receiverAddress, int contactPort, String transport, byte[] bytes, boolean retry, MessageChannel messageChannel) argument
|
H A D | TCPMessageChannel.java | 240 * @param retry 242 private void sendMessage(byte[] msg, boolean retry) throws IOException { argument 253 this.peerAddress, this.peerPort, this.peerProtocol, msg, retry, this); 290 // JvB: also retry for responses, if the connection is gone we should 307 boolean retry) throws IOException { 311 receiverAddress, receiverPort, "TCP", message, retry, this); 306 sendMessage(byte message[], InetAddress receiverAddress, int receiverPort, boolean retry) argument
|
H A D | TLSMessageChannel.java | 252 * @param retry 254 private void sendMessage(byte[] msg, boolean retry) throws IOException { argument 257 this.peerProtocol, msg, retry,this); 305 boolean retry) throws IOException { 309 receiverAddress, receiverPort, "TLS", message, retry, this); 304 sendMessage(byte message[], InetAddress receiverAddress, int receiverPort, boolean retry) argument
|
H A D | UDPMessageChannel.java | 749 int peerPort, String peerProtocol, boolean retry) 795 peerPort, "tcp", msg, retry,this); 748 sendMessage(byte[] msg, InetAddress peerAddress, int peerPort, String peerProtocol, boolean retry) argument
|
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | wps_upnp_event.c | 52 unsigned int retry; /* which retry */ member in struct:wps_event_ 60 * Leaves data, retry count etc. alone. 128 e->retry++; 129 wpa_printf(MSG_DEBUG, "WPS UPnP: Try address %d", e->retry); 131 if (e->retry >= dl_list_len(&s->addr_list)) { 291 if (itry++ == e->retry) 293 if (itry < e->retry)
|
/external/wpa_supplicant_8/src/wps/ |
H A D | wps_upnp_event.c | 52 unsigned int retry; /* which retry */ member in struct:wps_event_ 60 * Leaves data, retry count etc. alone. 128 e->retry++; 129 wpa_printf(MSG_DEBUG, "WPS UPnP: Try address %d", e->retry); 131 if (e->retry >= dl_list_len(&s->addr_list)) { 291 if (itry++ == e->retry) 293 if (itry < e->retry)
|
/external/wpa_supplicant_8/wpa_supplicant/src/wps/ |
H A D | wps_upnp_event.c | 52 unsigned int retry; /* which retry */ member in struct:wps_event_ 60 * Leaves data, retry count etc. alone. 128 e->retry++; 129 wpa_printf(MSG_DEBUG, "WPS UPnP: Try address %d", e->retry); 131 if (e->retry >= dl_list_len(&s->addr_list)) { 291 if (itry++ == e->retry) 293 if (itry < e->retry)
|
/external/chromium/android/autofill/ |
H A D | url_fetcher_proxy.h | 86 virtual void set_automatically_retry_on_5xx(bool retry) argument 88 retry_ = retry;
|
/external/chromium/chrome/browser/ui/gtk/ |
H A D | crypto_module_password_dialog.cc | 40 virtual std::string RequestPassword(const std::string& slot_name, bool retry, argument 50 retry))) { 58 void ShowDialog(const std::string& slot_name, bool retry) { argument 61 slot_name, retry, reason_, server_, 84 bool retry, 105 bool retry, 215 bool retry, 219 (new CryptoModulePasswordDialog(slot_name, retry, reason, server, 103 CryptoModulePasswordDialog( const std::string& slot_name, bool retry, browser::CryptoModulePasswordReason reason, const std::string& server, browser::CryptoModulePasswordCallback* callback) argument 214 ShowCryptoModulePasswordDialog(const std::string& slot_name, bool retry, CryptoModulePasswordReason reason, const std::string& server, CryptoModulePasswordCallback* callback) argument
|
/external/oprofile/module/ |
H A D | compat22.h | 89 int retry, int wait) 88 smp_call_function(void (*func) (void * info), void * info, int retry, int wait) argument
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
H A D | wps_upnp_event.c | 54 int retry; /* which retry */ member in struct:wps_event_ 67 * Leaves data, retry count etc. alone. 189 e->retry++; 190 if (e->retry >= s->n_addr) { 393 for (itry = 0; itry < e->retry; itry++)
|
/external/chromium/chrome/common/net/ |
H A D | url_fetcher.cc | 146 // retry. 151 // back-off release time of URL A won't increase. If we retry without 573 void URLFetcher::set_automatically_retry_on_5xx(bool retry) { argument 574 automatically_retry_on_5xx_ = retry;
|
/external/chromium/crypto/ |
H A D | nss_util.cc | 102 char* PKCS11PasswordFunc(PK11SlotInfo* slot, PRBool retry, void* arg) { argument 120 retry != PR_FALSE, 511 // login while the PINs are being initialized, and we want to retry
|
/external/icu4c/common/ |
H A D | locdispnames.cpp | 472 UBool retry = FALSE; /* set true if we need to retry, see below */ local 694 sub0Pos=0; /* stops initial padding (and a second retry, 696 retry=TRUE; 704 } while(retry);
|
/external/openssl/ssl/ |
H A D | ssl_sess.c | 252 unsigned int retry = 0; local 257 (++retry < MAX_SESS_ID_ATTEMPTS)); 258 if(retry < MAX_SESS_ID_ATTEMPTS)
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_mschapv2.c | 397 int retry = 1; local 418 retry = atoi(pos); 419 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: retry is %sallowed", 420 retry == 1 ? "" : "not "); 469 "EAP-MSCHAPV2: failure message: '%s' (retry %sallowed, error " 471 msg, retry == 1 ? "" : "not ", data->prev_error); 480 } else if (retry == 1 && config) { 492 return retry == 1; 635 int retry = 0; local 649 retry [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_nss.c | 217 static char * nss_password_cb(PK11SlotInfo *slot, PRBool retry, void *arg) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_mschapv2.c | 399 int retry = 1; local 420 retry = atoi(pos); 421 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: retry is %sallowed", 422 retry == 1 ? "" : "not "); 471 "EAP-MSCHAPV2: failure message: '%s' (retry %sallowed, error " 473 msg, retry == 1 ? "" : "not ", data->prev_error); 482 } else if (retry == 1 && config) { 494 return retry == 1; 637 int retry = 0; local 651 retry [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_nss.c | 217 static char * nss_password_cb(PK11SlotInfo *slot, PRBool retry, void *arg) argument
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_mschapv2.c | 399 int retry = 1; local 420 retry = atoi(pos); 421 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: retry is %sallowed", 422 retry == 1 ? "" : "not "); 471 "EAP-MSCHAPV2: failure message: '%s' (retry %sallowed, error " 473 msg, retry == 1 ? "" : "not ", data->prev_error); 482 } else if (retry == 1 && config) { 494 return retry == 1; 637 int retry = 0; local 651 retry [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_nss.c | 217 static char * nss_password_cb(PK11SlotInfo *slot, PRBool retry, void *arg) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_mschapv2.c | 399 int retry = 1; local 420 retry = atoi(pos); 421 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: retry is %sallowed", 422 retry == 1 ? "" : "not "); 471 "EAP-MSCHAPV2: failure message: '%s' (retry %sallowed, error " 473 msg, retry == 1 ? "" : "not ", data->prev_error); 482 } else if (retry == 1 && config) { 494 return retry == 1; 637 int retry = 0; local 651 retry [all...] |