/macosx-10.10.1/xnu-2782.1.97/bsd/vfs/ |
H A D | vfs_subr.c | 3888 uint32_t retries = 0, max_retries = 100; /* retry incase of tablefull */ local 4041 * after our target number of retries, than log a complaint 4043 if (++retries <= max_retries) { 4070 * (with fewer retries before trying another kill). 4073 retries = 0; 8958 * This is a best effort attempt and no retries are performed here.
|
H A D | vfs_xattr.c | 733 int retries = 0; local 831 if (retries == 0) { 832 retries++;
|
/macosx-10.10.1/IOFireWireFamily-456/IOFireWireFamily.kmodproj/ |
H A D | IOFireWireController.cpp | 2701 // This "if" should run after trying the command once, but before it retries. 2702 // Check if command timed out and we haven't increased the retries for this speed 2712 // increase retries and set RetriesBumped flag 2718 // re-submit command for increased number of retries 2725 // increase retries to normal-1 and set RetriesBumped flag 2731 // re-submit command for the rest of the retries 6262 UInt32 retries = 2; local 6291 while (retries > 0) 6331 retries -= 1; 6335 // out of retries 6363 UInt32 retries = 2; local 6468 UInt32 retries = 2; local 6582 UInt32 retries = 2; local [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/include/security_filedb/ |
H A D | AtomicFile.cpp | 985 for (int retries = 0; retries < 10; ++retries) 1117 int retries = 0; local 1164 retries = 0; 1176 if(++retries < (256 + 1)) /* nfsTRY number of times+1 to ignore spurious NFS errors */ 1190 retries = 0;
|
/macosx-10.10.1/Security-57031.1.35/Security/include/security_keychain/ |
H A D | SecKeychain.cpp | 1144 OSStatus SecKeychainVerifyKeyStorePassphrase(uint32_t retries) argument 1147 SecurityServer::ClientSession().verifyKeyStorePassphrase(retries);
|
H A D | SecKeychainPriv.h | 77 OSStatus SecKeychainVerifyKeyStorePassphrase(uint32_t retries)
|
/macosx-10.10.1/Security-57031.1.35/Security/include/securityd_client/ |
H A D | ssclient.h | 202 void verifyKeyStorePassphrase(uint32_t retries);
|
H A D | transition.cpp | 372 void ClientSession::verifyKeyStorePassphrase(uint32_t retries) argument 374 IPC(ucsp_client_verifyKeyStorePassphrase(UCSP_ARGS, retries));
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_filedb/lib/ |
H A D | AtomicFile.cpp | 985 for (int retries = 0; retries < 10; ++retries) 1117 int retries = 0; local 1164 retries = 0; 1176 if(++retries < (256 + 1)) /* nfsTRY number of times+1 to ignore spurious NFS errors */ 1190 retries = 0;
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/Security/ |
H A D | SecKeychain.cpp | 1144 OSStatus SecKeychainVerifyKeyStorePassphrase(uint32_t retries) argument 1147 SecurityServer::ClientSession().verifyKeyStorePassphrase(retries);
|
H A D | SecKeychainPriv.h | 77 OSStatus SecKeychainVerifyKeyStorePassphrase(uint32_t retries)
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/lib/ |
H A D | SecKeychain.cpp | 1144 OSStatus SecKeychainVerifyKeyStorePassphrase(uint32_t retries) argument 1147 SecurityServer::ClientSession().verifyKeyStorePassphrase(retries);
|
H A D | SecKeychainPriv.h | 77 OSStatus SecKeychainVerifyKeyStorePassphrase(uint32_t retries)
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurityd/lib/ |
H A D | ssclient.h | 202 void verifyKeyStorePassphrase(uint32_t retries);
|
H A D | transition.cpp | 372 void ClientSession::verifyKeyStorePassphrase(uint32_t retries) argument 374 IPC(ucsp_client_verifyKeyStorePassphrase(UCSP_ARGS, retries));
|
/macosx-10.10.1/Security-57031.1.35/Security/sec/Security/Tool/ |
H A D | scep.c | 129 int retries = 1; local 132 if (!response && retries) { 136 } while (!response && retries--);
|
/macosx-10.10.1/Security-57031.1.35/securityd/src/ |
H A D | agentquery.h | 224 QueryKeybagPassphrase(Session &session, int32_t retries = kMaximumAuthorizationTries);
|
H A D | session.cpp | 203 void Session::verifyKeyStorePassphrase(int32_t retries) argument 205 QueryKeybagPassphrase keybagQuery(*this, retries);
|
H A D | session.h | 165 void verifyKeyStorePassphrase(int32_t retries);
|
H A D | transition.cpp | 719 kern_return_t ucsp_server_verifyKeyStorePassphrase(UCSP_ARGS, uint32_t retries) argument 722 connection.process().session().verifyKeyStorePassphrase(retries);
|
/macosx-10.10.1/curl-83.1.2/curl/lib/ |
H A D | tftp.c | 131 int retries; member in struct:tftp_state_data 468 state->retries++; 469 if(state->retries>state->retry_max) { 592 state->retries = 0; 633 state->retries = 0; 652 state->retries++; 655 NEXT_BLOCKNUM(state->block), state->retries); 656 if(state->retries > state->retry_max) { 726 state->retries++; 728 if(state->retries>stat [all...] |
/macosx-10.10.1/xnu-2782.1.97/bsd/nfs/ |
H A D | nfs_gss.c | 1179 int retries = 0; local 1187 /* For an "intr" mount allow a signal to interrupt the retries */ 1202 retries++; 1204 if ((NMFLAG(nmp, SOFT) || (req->r_flags & R_SOFT)) && (retries > nmp->nm_retry)) {
|
H A D | nfs_lock.c | 361 int retries = 0; local 388 } while (kr == MIG_SERVER_DIED && retries++ < MACH_MAX_TRIES);
|
/macosx-10.10.1/IOPCIFamily-239.1.2/ |
H A D | IOPCIBridge.cpp | 1097 uint32_t retries; local 1134 retries = 0; 1139 if (retries) IOSleep(2); 1143 retries++; 1148 if (retries)
|
/macosx-10.10.1/CommonCrypto-60061/lib/ |
H A D | CommonRandom.c | 100 for (int retries = 5; retries && ccrng_generate(dev_rng_state, length, ptr); retries--) 101 if(retries == 0) return -1;
|