/external/libppp/src/ |
lcp.c | 623 struct fsm_opt nak; local 625 nak.hdr.id = TY_AUTHPROTO; 628 nak.hdr.len = 4; 629 nak.data[0] = (unsigned char)(PROTO_PAP >> 8); 630 nak.data[1] = (unsigned char)PROTO_PAP; 631 fsm_nak(dec, &nak); 635 nak.hdr.len = 5; 636 nak.data[0] = (unsigned char)(PROTO_CHAP >> 8); 637 nak.data[1] = (unsigned char)PROTO_CHAP; 640 nak.data[2] = 0x05 672 struct fsm_opt *opt, nak; local [all...] |
ipcp.c | 1022 * If the destination address is not acceptable, NAK with what we 1060 struct fsm_opt *opt, nak; local [all...] |
fsm.c | 491 dec.nakend = dec.nak; 498 if (dec.nakend == dec.nak && dec.rejend == dec.rej) 543 if (dec.nakend != dec.nak) 544 fsm_Output(fp, CODE_CONFIGNAK, lhp->id, dec.nak, dec.nakend - dec.nak, 600 if (dec.nakend != dec.nak && --fp->more.naks <= 0) { 625 dec.nakend = dec.nak; 709 dec.nakend = dec.nak; 842 dec.nakend = dec.nak; 1200 dec->nakend += fsm_opt(dec->nakend, FSM_OPTLEN - (dec->nakend - dec->nak), o) [all...] |
fsm.h | 71 u_char nak[FSM_OPTLEN], *nakend; member in struct:fsm_decode
|
ccp.c | 630 log_Printf(LogCCP, "%s: Warning: Ignoring peer NAK of unsent" 664 if (dec->rejend != dec->rej || dec->nakend != dec->nak) {
|
ipv6cp.c | 770 if (dec->rejend == dec->rej && dec->nakend == dec->nak) { 773 * We do this to ensure that we only send one NAK if the only 774 * reason for the NAK is because the peer isn't sending a
|
/external/tcpdump/ |
print-pgm.c | 104 PGM_NAK = 8, /* NAK */ 105 PGM_NULLNAK = 9, /* Null NAK */ 106 PGM_NCF = 10, /* NAK Confirmation */ 366 struct pgm_nak *nak; local 375 nak = (struct pgm_nak *)(pgm + 1); 376 TCHECK(*nak); 382 switch (EXTRACT_16BITS(&nak->pgmn_source_afi)) { 397 bp = (u_char *) (nak + 1); 433 (void)printf("NAK "); 445 source_buf, group_buf, EXTRACT_32BITS(&nak->pgmn_seq)) [all...] |
/frameworks/base/services/common_time/ |
common_time_server_packets.cpp | 253 SERIALIZE_INT32(nak); 265 DESERIALIZE_INT32(nak);
|
common_time_server_packets.h | 142 uint32_t nak; member in class:android::SyncResponsePacket
|
common_time_server.cpp | [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server.c | 376 SM_STATE(EAP, NAK) 378 const struct eap_hdr *nak; local 383 SM_ENTRY(EAP, NAK); 394 nak = wpabuf_head(sm->eap_if.eapRespData); 395 if (nak && wpabuf_len(sm->eap_if.eapRespData) > sizeof(*nak)) { 396 len = be_to_host16(nak->length); 399 pos = (const u8 *) (nak + 1); 400 len -= sizeof(*nak); 639 SM_ENTER(EAP, NAK); [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_fast.c | 485 struct eap_tlv_nak_tlv *nak; local 486 buf = wpabuf_alloc(sizeof(*nak)); 489 nak = wpabuf_put(buf, sizeof(*nak)); 490 nak->tlv_type = host_to_be16(EAP_TLV_TYPE_MANDATORY | EAP_TLV_NAK_TLV); 491 nak->length = host_to_be16(6); 492 nak->vendor_id = host_to_be32(vendor_id); 493 nak->nak_type = host_to_be16(tlv_type); 1099 wpa_printf(MSG_DEBUG, "EAP-FAST: Nak unknown " [all...] |
eap.c | 232 * correct method is started, or a Nak response is built. 253 "vendor=%u method=%u -> NAK", 257 goto nak; 293 goto nak; 320 * Return without generating Nak in order to allow 325 "request - skip Nak"); 329 goto nak; 338 nak: 808 wpa_printf(MSG_DEBUG, "EAP: Building expanded EAP-Nak"); 810 /* RFC 3748 - 5.3.2: Expanded Nak */ [all...] |
/external/v8/benchmarks/ |
earley-boyer.js | 1109 "\025": "#\\nak", 1153 "nak": "\025", [all...] |
/external/webkit/PerformanceTests/SunSpider/tests/v8-v4/ |
v8-earley-boyer.js | 1103 "\025": "#\\nak", 1147 "nak": "\025", [all...] |
/external/webkit/PerformanceTests/SunSpider/tests/v8-v5/ |
v8-earley-boyer.js | 1103 "\025": "#\\nak", 1147 "nak": "\025", [all...] |
/external/webkit/PerformanceTests/SunSpider/tests/v8-v6/ |
v8-earley-boyer.js | 1103 "\025": "#\\nak", 1147 "nak": "\025", [all...] |