Lines Matching refs:try
706 /* Find the next address to try... */
755 /* check each active socket and try to push it along */
901 * sockets to (continue to) try.
1092 /* try to use nss_sock */
1112 /* If NFS version not set, try NFSv3 then NFSv2. */
1471 /* first, try to renew our current state */
1959 sin.sin_port = htons(nfs_callback_port); /* try to use specified port */
2002 /* try to use specified port or same port as IPv4 */
2012 /* if we simply tried to match the IPv4 port, then try any port */
3192 * "poke" a socket to try to provoke any pending errors
3893 * It's a JUKEBOX error - delay and try again
3958 * Hmmm... we need to try a different security flavor.
3960 * to track flavors to try. We fill the array with the mount's
3967 /* Call SECINFO to try to get list of flavors from server. */
3985 } else { /* otherwise, just try the flavors we support. */
4001 /* find the next flavor to try */
4012 if (!srvcount) /* no server list, just try it */
4024 /* nothing left to try! */
4614 /* if it's been a few seconds, try poking the socket */
4862 int error = 0, on = 1, try, sendat = 2, soproto, recv, optlen, restoreto = 0;
4932 for (try=0; try < timeo; try++) {
4933 if ((error = nfs_sigintr(nmp, NULL, !try ? NULL : thd, 0)))
4935 if (!try || (try == sendat)) {
4952 /* try to read (more of) record */
5424 * try and leave leading space for the lower level headers.
5630 * Now try and parse record(s) out of the raw stream data.
5683 * Now try and process the request records, non-blocking.