| /src/tests/rump/rumpkern/ |
| t_sp.sh | 66 # test_case reconnect reconnect 67 test_case_skip reconnect kern/55304 "leftover rump_server" 148 reconnect() function 169 atf_add_test_case reconnect
|
| /src/usr.sbin/syslogd/ |
| tls.h | 62 /* reconnect to lost server after n sec (initial value) */ 139 unsigned reconnect; /* seconds between reconnects */ member in struct:tls_conn_settings
|
| /src/sys/dev/usb/ |
| uhub.c | 539 int change, status, reconnect, rescan; local 602 reconnect = up->up_reattach; 608 if (PORTSTAT_ISSET(sc, port) || reconnect) { 622 dev, port, status, change, reconnect); 623 if (!change && !reconnect) { 687 if (!reconnect && !(change & UPS_C_CONNECT_STATUS)) {
|
| /src/sbin/fsck_msdos/ |
| dir.c | 922 * Try to reconnect a FAT chain into dir 929 reconnect(int dosfs, struct bootblock *boot, struct fatEntry *fat, cl_t head) function 935 if (!ask(1, "Reconnect"))
|
| /src/crypto/external/bsd/heimdal/dist/lib/kadm5/ |
| ipropd_slave.c | 715 time_t reconnect; local 819 krb5_appdefault_time(context, config_name, NULL, "reconnect-min", 821 krb5_appdefault_time(context, config_name, NULL, "reconnect-max", 823 krb5_appdefault_time(context, config_name, NULL, "reconnect-backoff", 825 reconnect = reconnect_min; 850 if (elapsed < reconnect) { 851 time_t left = reconnect - elapsed; 869 reconnect = reconnect_min; 1056 reconnect += backoff; 1057 if (reconnect > reconnect_max) [all...] |
| /src/external/bsd/wpa/dist/src/rsn_supp/ |
| wpa.h | 32 void (*reconnect)(void *ctx); member in struct:wpa_sm_ctx
|
| /src/external/bsd/wpa/dist/hostapd/ |
| hostapd_cli.c | 71 " -r try to reconnect when client socket is " 2026 printf("Connection to hostapd lost - trying to reconnect\n"); 2214 int reconnect = 0; local 2250 reconnect = 1; 2294 if (!interactive && !reconnect) { 2314 if (reconnect && action_file && ctrl_ifname) {
|
| /src/external/ibm-public/postfix/dist/src/posttls-finger/ |
| posttls-finger.c | 61 /* for the new server, and the reconnect is repeated up to a maximum 208 /* The default is \fBroutine,certmatch\fR. After a reconnect, 213 /* determines the maximum number of reconnect attempts to use with 237 /* With a cacheable TLS session, disconnect and reconnect after \fIdelay\fR 474 int reconnect; /* -r option */ member in struct:STATE 486 int pass; /* Pass number, 2 for reconnect */ 1732 /* Reused on reconnect */ 1733 if (state->reconnect <= 0) { 1775 if (state->tlsproxy_mode == 0 && state->reconnect > 0) { 1783 state->reconnect = 0 [all...] |
| /src/crypto/external/bsd/openssl/dist/apps/ |
| s_client.c | 553 {"reconnect", OPT_RECONNECT, '-', 821 int reconnect = 0, verify = SSL_VERIFY_NONE, vpmtouched = 0; local 1307 reconnect = 5; 2751 if (!reconnect) 2755 if (reconnect) { 2756 reconnect--; 2758 "drop connection and then reconnect\n");
|
| /src/crypto/external/bsd/openssl.old/dist/apps/ |
| s_client.c | 641 {"reconnect", OPT_RECONNECT, '-', 917 int reconnect = 0, verify = SSL_VERIFY_NONE, vpmtouched = 0; local 1386 reconnect = 5; 2800 if (!reconnect) 2804 if (reconnect) { 2805 reconnect--; 2807 "drop connection and then reconnect\n");
|
| /src/external/bsd/wpa/dist/wpa_supplicant/ |
| wpa_cli.c | 55 static int reconnect = 0; variable 95 " -r = try to reconnect when client socket is disconnected.\n" 1712 return wpa_ctrl_command(ctrl, "RECONNECT"); 3564 "= disconnect and wait for reassociate/reconnect command before\n" 3566 { "reconnect", wpa_cli_cmd_reconnect, NULL, 4474 if (!reconnect) 4623 "reconnect\n"); 4666 "reconnect\n"); 4667 if (reconnect) { 4687 "reconnect\n") [all...] |
| /src/crypto/external/apache2/openssl/dist/apps/ |
| s_client.c | 690 { "reconnect", OPT_RECONNECT, '-', 970 int reconnect = 0, verify = SSL_VERIFY_NONE, vpmtouched = 0; local 1492 reconnect = 5; 2998 if (!reconnect) 3002 if (reconnect) { 3003 reconnect--; 3005 "drop connection and then reconnect\n"); 3922 BIO_printf(bio_err, " {reconnect}: Reconnect to the peer\n"); 4069 } else if (OPENSSL_strcasecmp(cmd_start, "reconnect") == 0) [all...] |