/external/chromium/chrome/browser/ui/gtk/ |
D | crypto_module_password_dialog.cc | 40 virtual std::string RequestPassword(const std::string& slot_name, bool retry, in RequestPassword() argument 50 retry))) { in RequestPassword() 58 void ShowDialog(const std::string& slot_name, bool retry) { in ShowDialog() argument 61 slot_name, retry, reason_, server_, in ShowDialog() 84 bool retry, 105 bool retry, in CryptoModulePasswordDialog() argument 215 bool retry, in ShowCryptoModulePasswordDialog() argument 219 (new CryptoModulePasswordDialog(slot_name, retry, reason, server, in ShowCryptoModulePasswordDialog()
|
/external/kernel-headers/original/linux/ |
D | smp.h | 54 int smp_call_function(void(*func)(void *info), void *info, int retry, int wait); 59 int on_each_cpu(void (*func) (void *info), void *info, int retry, int wait); 88 #define smp_call_function(func,info,retry,wait) (up_smp_call_function()) argument 89 #define on_each_cpu(func,info,retry,wait) \ argument
|
/external/grub/netboot/ |
D | main.c | 205 int retry; in udp_transmit() local 272 for (retry = 1; retry <= MAX_ARP_RETRIES; retry++) in udp_transmit() 277 timeout = rfc2131_sleep_interval (TIMEOUT, retry); in udp_transmit() 302 int retry = 0; in tftp() local 333 timeout = rfc2131_sleep_interval (block ? TFTP_REXMT : TIMEOUT, retry); in tftp() 335 timeout = rfc2131_sleep_interval (TIMEOUT, retry); in tftp() 340 if (! block && retry++ < MAX_TFTP_RETRIES) in tftp() 351 if (block && ((retry += TFTP_REXMT) < TFTP_TIMEOUT)) in tftp() 459 retry = 0; in tftp() 479 int retry; in rarp() local [all …]
|
D | fsys_tftp.c | 37 static int retry; variable 63 timeout = rfc2131_sleep_interval (block ? TFTP_REXMT : TIMEOUT, retry); in buf_fill() 65 timeout = rfc2131_sleep_interval (TIMEOUT, retry); in buf_fill() 73 if (! block && retry++ < MAX_TFTP_RETRIES) in buf_fill() 87 if (block && ((retry += TFTP_REXMT) < TFTP_TIMEOUT)) in buf_fill() 239 retry = 0; in buf_fill() 262 retry = 0; in send_rrq()
|
/external/bluetooth/bluez/compat/ |
D | msdun.c | 48 static int retry; variable 110 retry = 4; in ms_dun() 114 timeout /= retry; in ms_dun() 121 if (r == MS_TIMEOUT && !server && --retry) in ms_dun()
|
/external/dropbear/libtomcrypt/src/pk/dsa/ |
D | dsa_sign_hash.c | 64 retry: in dsa_sign_hash_raw() 77 … if (mp_cmp_d(k, 1) != LTC_MP_GT) { goto retry; } in dsa_sign_hash_raw() 90 …if (mp_iszero(r) == LTC_MP_YES) { goto retry; } in dsa_sign_hash_raw() 98 …if (mp_iszero(s) == LTC_MP_YES) { goto retry; } in dsa_sign_hash_raw()
|
/external/wpa_supplicant_8/src/wps/ |
D | wps_upnp_event.c | 52 unsigned int retry; /* which retry */ member 128 e->retry++; in event_retry() 129 wpa_printf(MSG_DEBUG, "WPS UPnP: Try address %d", e->retry); in event_retry() 131 if (e->retry >= dl_list_len(&s->addr_list)) { in event_retry() 291 if (itry++ == e->retry) in event_send_start() 293 if (itry < e->retry) in event_send_start()
|
/external/apache-http/src/org/apache/http/impl/io/ |
D | AbstractSessionInputBuffer.java | 170 boolean retry = true; in readLine() 171 while (retry) { in readLine() 180 retry = false; in readLine() 193 retry = false; in readLine()
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
D | eap_mschapv2.c | 397 int retry = 1; in eap_mschapv2_failure_txt() local 418 retry = atoi(pos); in eap_mschapv2_failure_txt() 420 retry == 1 ? "" : "not "); in eap_mschapv2_failure_txt() 471 msg, retry == 1 ? "" : "not ", data->prev_error); in eap_mschapv2_failure_txt() 480 } else if (retry == 1 && config) { in eap_mschapv2_failure_txt() 492 return retry == 1; in eap_mschapv2_failure_txt() 635 int retry = 0; in eap_mschapv2_failure() local 649 retry = eap_mschapv2_failure_txt(sm, data, buf); in eap_mschapv2_failure() 666 } else if (retry && data->prev_error == ERROR_AUTHENTICATION_FAILURE) { in eap_mschapv2_failure()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_mschapv2.c | 397 int retry = 1; in eap_mschapv2_failure_txt() local 418 retry = atoi(pos); in eap_mschapv2_failure_txt() 420 retry == 1 ? "" : "not "); in eap_mschapv2_failure_txt() 471 msg, retry == 1 ? "" : "not ", data->prev_error); in eap_mschapv2_failure_txt() 480 } else if (retry == 1 && config) { in eap_mschapv2_failure_txt() 492 return retry == 1; in eap_mschapv2_failure_txt() 635 int retry = 0; in eap_mschapv2_failure() local 649 retry = eap_mschapv2_failure_txt(sm, data, buf); in eap_mschapv2_failure() 666 } else if (retry && data->prev_error == ERROR_AUTHENTICATION_FAILURE) { in eap_mschapv2_failure()
|
/external/chromium/android/autofill/ |
D | url_fetcher_proxy.h | 86 virtual void set_automatically_retry_on_5xx(bool retry) 88 retry_ = retry;
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
D | wps_upnp_event.c | 54 int retry; /* which retry */ member 189 e->retry++; in event_retry() 190 if (e->retry >= s->n_addr) { in event_retry() 393 for (itry = 0; itry < e->retry; itry++) in event_send_start()
|
/external/oprofile/daemon/liblegacy/ |
D | opd_sample_files.c | 126 retry: in opd_open_24_sample_file() 137 goto retry; in opd_open_24_sample_file()
|
/external/bluetooth/glib/glib/ |
D | giounix.c | 188 retry: in g_io_unix_read() 200 goto retry; in g_io_unix_read() 229 retry: in g_io_unix_write() 241 goto retry; in g_io_unix_write()
|
/external/chromium/crypto/ |
D | crypto_module_blocking_password_delegate.h | 28 virtual std::string RequestPassword(const std::string& slot_name, bool retry,
|
/external/linux-tools-perf/util/ |
D | strfilter.c | 47 retry: in get_token() 53 goto retry; in get_token()
|
/external/oprofile/module/ |
D | op_dname.c | 191 retry: in do_hash() 211 goto retry; in do_hash()
|
/external/oprofile/daemon/ |
D | init.c | 109 retry: in complete_dump() 118 goto retry; in complete_dump()
|
D | opd_mangling.c | 164 retry: in opd_open_sample_file() 174 goto retry; in opd_open_sample_file()
|
D | opd_anon.c | 189 retry: in find_anon_mapping() 200 goto retry; in find_anon_mapping()
|
/external/nist-sip/java/gov/nist/javax/sip/stack/ |
D | TCPMessageChannel.java | 242 private void sendMessage(byte[] msg, boolean retry) throws IOException { in sendMessage() argument 253 this.peerAddress, this.peerPort, this.peerProtocol, msg, retry, this); in sendMessage() 307 boolean retry) throws IOException { in sendMessage() argument 311 receiverAddress, receiverPort, "TCP", message, retry, this); in sendMessage()
|
D | TLSMessageChannel.java | 254 private void sendMessage(byte[] msg, boolean retry) throws IOException { in sendMessage() argument 257 this.peerProtocol, msg, retry,this); in sendMessage() 305 boolean retry) throws IOException { in sendMessage() argument 309 receiverAddress, receiverPort, "TLS", message, retry, this); in sendMessage()
|
/external/webkit/Tools/Scripts/webkitpy/layout_tests/layout_package/ |
D | printing_unittest.py | 509 retry = rs 511 paths, retry, exp = self.get_result_summary(tests, 513 retry.add(self.get_result('passes/text.html'), True) 514 retry.add(self.get_result('failures/expected/timeout.html'), True) 515 retry.add(self.get_result('failures/expected/crash.html'), True) 516 …unexpected_results = test_runner.summarize_results(self._port, exp, rs, retry, test_timings={}, on…
|
/external/e2fsprogs/lib/ext2fs/ |
D | bb_inode.c | 235 retry: in set_bad_block_proc() 239 goto retry; in set_bad_block_proc()
|
D | initialize.c | 221 retry: in ext2fs_initialize() 256 goto retry; in ext2fs_initialize() 349 goto retry; in ext2fs_initialize()
|