HomeSort by relevance Sort by last modified time
    Searched refs:nak (Results 1 - 17 of 17) sorted by null

  /external/libppp/src/
lcp.c 623 struct fsm_opt nak; local
625 nak.hdr.id = TY_AUTHPROTO;
628 nak.hdr.len = 4;
629 nak.data[0] = (unsigned char)(PROTO_PAP >> 8);
630 nak.data[1] = (unsigned char)PROTO_PAP;
631 fsm_nak(dec, &nak);
635 nak.hdr.len = 5;
636 nak.data[0] = (unsigned char)(PROTO_CHAP >> 8);
637 nak.data[1] = (unsigned char)PROTO_CHAP;
640 nak.data[2] = 0x05
672 struct fsm_opt *opt, nak; local
    [all...]
ipcp.c 1022 * If the destination address is not acceptable, NAK with what we
1060 struct fsm_opt *opt, nak; local
    [all...]
fsm.c 491 dec.nakend = dec.nak;
498 if (dec.nakend == dec.nak && dec.rejend == dec.rej)
543 if (dec.nakend != dec.nak)
544 fsm_Output(fp, CODE_CONFIGNAK, lhp->id, dec.nak, dec.nakend - dec.nak,
600 if (dec.nakend != dec.nak && --fp->more.naks <= 0) {
625 dec.nakend = dec.nak;
709 dec.nakend = dec.nak;
842 dec.nakend = dec.nak;
1200 dec->nakend += fsm_opt(dec->nakend, FSM_OPTLEN - (dec->nakend - dec->nak), o)
    [all...]
fsm.h 71 u_char nak[FSM_OPTLEN], *nakend; member in struct:fsm_decode
ccp.c 630 log_Printf(LogCCP, "%s: Warning: Ignoring peer NAK of unsent"
664 if (dec->rejend != dec->rej || dec->nakend != dec->nak) {
ipv6cp.c 770 if (dec->rejend == dec->rej && dec->nakend == dec->nak) {
773 * We do this to ensure that we only send one NAK if the only
774 * reason for the NAK is because the peer isn't sending a
  /external/tcpdump/
print-pgm.c 104 PGM_NAK = 8, /* NAK */
105 PGM_NULLNAK = 9, /* Null NAK */
106 PGM_NCF = 10, /* NAK Confirmation */
366 struct pgm_nak *nak; local
375 nak = (struct pgm_nak *)(pgm + 1);
376 TCHECK(*nak);
382 switch (EXTRACT_16BITS(&nak->pgmn_source_afi)) {
397 bp = (u_char *) (nak + 1);
433 (void)printf("NAK ");
445 source_buf, group_buf, EXTRACT_32BITS(&nak->pgmn_seq))
    [all...]
  /frameworks/base/services/common_time/
common_time_server_packets.cpp 253 SERIALIZE_INT32(nak);
265 DESERIALIZE_INT32(nak);
common_time_server_packets.h 142 uint32_t nak; member in class:android::SyncResponsePacket
common_time_server.cpp     [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server.c 376 SM_STATE(EAP, NAK)
378 const struct eap_hdr *nak; local
383 SM_ENTRY(EAP, NAK);
394 nak = wpabuf_head(sm->eap_if.eapRespData);
395 if (nak && wpabuf_len(sm->eap_if.eapRespData) > sizeof(*nak)) {
396 len = be_to_host16(nak->length);
399 pos = (const u8 *) (nak + 1);
400 len -= sizeof(*nak);
639 SM_ENTER(EAP, NAK);
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_fast.c 485 struct eap_tlv_nak_tlv *nak; local
486 buf = wpabuf_alloc(sizeof(*nak));
489 nak = wpabuf_put(buf, sizeof(*nak));
490 nak->tlv_type = host_to_be16(EAP_TLV_TYPE_MANDATORY | EAP_TLV_NAK_TLV);
491 nak->length = host_to_be16(6);
492 nak->vendor_id = host_to_be32(vendor_id);
493 nak->nak_type = host_to_be16(tlv_type);
1099 wpa_printf(MSG_DEBUG, "EAP-FAST: Nak unknown "
    [all...]
eap.c 232 * correct method is started, or a Nak response is built.
253 "vendor=%u method=%u -> NAK",
257 goto nak;
293 goto nak;
320 * Return without generating Nak in order to allow
325 "request - skip Nak");
329 goto nak;
338 nak:
808 wpa_printf(MSG_DEBUG, "EAP: Building expanded EAP-Nak");
810 /* RFC 3748 - 5.3.2: Expanded Nak */
    [all...]
  /external/v8/benchmarks/
earley-boyer.js 1109 "\025": "#\\nak",
1153 "nak": "\025",
    [all...]
  /external/webkit/PerformanceTests/SunSpider/tests/v8-v4/
v8-earley-boyer.js 1103 "\025": "#\\nak",
1147 "nak": "\025",
    [all...]
  /external/webkit/PerformanceTests/SunSpider/tests/v8-v5/
v8-earley-boyer.js 1103 "\025": "#\\nak",
1147 "nak": "\025",
    [all...]
  /external/webkit/PerformanceTests/SunSpider/tests/v8-v6/
v8-earley-boyer.js 1103 "\025": "#\\nak",
1147 "nak": "\025",
    [all...]

Completed in 895 milliseconds