Searched refs:reconnect (Results 1 - 11 of 11) sorted by relevance
/netbsd-6-1-5-RELEASE/external/gpl3/gdb/dist/gdb/testsuite/gdb.base/ |
H A D | solib-disc.exp | 77 pass "reconnect after load" 79 fail "reconnect after load" 99 pass "reconnect after unload" 101 fail "reconnect after unload"
|
/netbsd-6-1-5-RELEASE/tests/rump/rumpkern/ |
H A D | t_sp.sh | 52 test_case reconnect reconnect 96 reconnect() function 117 atf_add_test_case reconnect
|
/netbsd-6-1-5-RELEASE/sbin/fsck_msdos/ |
H A D | ext.h | 119 * Try to reconnect a lost cluster chain 121 int reconnect(int, struct bootblock *, struct fatEntry *, cl_t);
|
H A D | fat.c | 587 mod |= ret = reconnect(dosfs, boot, fat, head);
|
H A D | dir.c | 920 * Try to reconnect a FAT chain into dir 927 reconnect(int dosfs, struct bootblock *boot, struct fatEntry *fat, cl_t head) function
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/kadm5/ |
H A D | ipropd_slave.c | 509 time_t reconnect; local 601 krb5_appdefault_time(context, config_name, NULL, "reconnect-min", 603 krb5_appdefault_time(context, config_name, NULL, "reconnect-max", 605 krb5_appdefault_time(context, config_name, NULL, "reconnect-backoff", 607 reconnect = reconnect_min; 616 if (elapsed < reconnect) { 617 time_t left = reconnect - elapsed; 628 reconnect = reconnect_min; 732 reconnect += backoff; 733 if (reconnect > reconnect_ma [all...] |
/netbsd-6-1-5-RELEASE/usr.sbin/syslogd/ |
H A D | tls.h | 61 /* reconnect to lost server after n sec (initial value) */ 138 unsigned reconnect; /* seconds between reconnects */ member in struct:tls_conn_settings
|
H A D | tls.c | 944 conn_info->reconnect = 5 * TLS_RECONNECT_SEC; 945 tv.tv_sec = conn_info->reconnect; 955 conn_info->reconnect = TLS_RECONNECT_SEC; 1150 f->f_un.f_tls.tls_conn->reconnect = TLS_RECONNECT_SEC; 1219 * Dispatch routine (triggered by timer) to reconnect to a lost TLS server 1236 if (conn_info->reconnect > TLS_RECONNECT_GIVEUP) { 1242 * that way one can still trigger a reconnect 1249 conn_info->reconnect); 1250 tv.tv_sec = conn_info->reconnect; 1254 TLS_RECONNECT_BACKOFF(conn_info->reconnect); [all...] |
/netbsd-6-1-5-RELEASE/sys/dev/usb/ |
H A D | uhub.c | 378 int change, status, reconnect; local 413 reconnect = up->reattach; 419 if (PORTSTAT_ISSET(sc, port) || reconnect) { 433 if (!change && !reconnect) {
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/threads/ |
H A D | mttest.c | 145 int reconnect=0; variable 179 fprintf(stderr," -reconnect - reuse session-id's\n"); 214 else if (strcmp(*argv,"-reconnect") == 0) 215 reconnect=1; 379 if (reconnect) 408 if (reconnect)
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/apps/ |
H A D | s_client.c | 302 BIO_printf(bio_err," -reconnect - Drop and re-make the connection with the same Session-ID\n"); 582 int reconnect=0,badop=0,verify=SSL_VERIFY_NONE,bugs=0; local 852 else if (strcmp(*argv,"-reconnect") == 0) 854 reconnect=5; 1564 if (reconnect) 1566 reconnect--; 1567 BIO_printf(bio_c_out,"drop connection and then reconnect\n");
|
Completed in 106 milliseconds