HomeSort by relevance Sort by last modified time
    Searched refs:INITIATOR (Results 1 - 18 of 18) sorted by null

  /external/chromium/third_party/libjingle/source/talk/session/tunnel/
tunnelsessionclient.h 49 enum TunnelSessionRole { INITIATOR, RESPONDER };
124 // Signal arguments are this, initiator, description, session
securetunnelsessionclient.cc 170 // containing the initiator's SecureTunnelContentDescription,
172 // <iq from="INITIATOR@gmail.com/pcpE101B7F4"
177 // initiator="INITIATOR@gmail.com/pcpE101B7F4">
182 // INITIATOR'S CERTIFICATE IN PERM FORMAT (ASCII GIBBERISH)
191 // echoing the initiator's certificate, looks something like this:
193 // to="INITIATOR@gmail.com/pcpE101B7F4"
197 // initiator="sdoyon911@gmail.com/pcpE101B7F4">
202 // INITIATOR'S CERTIFICATE IN PERM FORMAT (ASCII GIBBERISH)
277 // We are the initiator so we are the client. Put our cert into th
    [all...]
tunnelsessionclient.cc 187 INITIATOR);
  /external/tcpdump/
isakmp.h 46 #define INITIATOR 1
87 ! Initiator !
101 cookie_t i_ck; /* Initiator Cookie */
  /external/ipsec-tools/src/racoon/
proposal.c 188 * NOTE: In the case of initiator, must be ensured that there is no
392 case INITIATOR:
528 case INITIATOR:
1088 if (iph2->side == INITIATOR)
1118 if (iph2->side == INITIATOR)
1141 if (iph2->side == INITIATOR)
isakmp.h 42 #define INITIATOR 0 /* synonym sender */
51 ! Initiator !
65 cookie_t i_ck; /* Initiator Cookie */
420 cookie_t i_ck; /* Initiator Cookie */
strnames.c 94 case INITIATOR:
114 case INITIATOR:
136 case INITIATOR:
162 case INITIATOR:
oakley.c 564 bp = (side == INITIATOR ? iph2->nonce : iph2->nonce_p);
568 bp = (side == INITIATOR ? iph2->nonce_p : iph2->nonce);
943 if (iph1->side == INITIATOR)
953 if (iph1->side == INITIATOR)
994 iph1->side == INITIATOR ? "init" : "resp");
1340 if (iph1->side == INITIATOR)
    [all...]
isakmp_inf.c 269 if ((iph1->side == INITIATOR && iph1->status < PHASE1ST_MSG3SENT)
714 iph1->side = INITIATOR;
783 * Initiator/Responder cookie and SPI has no meaning, SPI size = 0.
905 iph2->side = INITIATOR;
    [all...]
admin.c 560 iph2->side = INITIATOR;
isakmp.c 407 /* the initiator's cookie must not be zero */
460 iph1->side == INITIATOR) {
463 "the initiator's cookies collide.\n");
551 * the packet must be the 1st message from a initiator
558 /*it must be the 1st message from a initiator.*/
578 if (iph1->side != INITIATOR) {
581 "it has to be as the initiator. %s\n",
627 * as the packet from responder againt initiator's 1st
1034 /* new negotiation of phase 1 for initiator */
1052 iph1->side = INITIATOR;
    [all...]
pfkey.c 904 if (iph2->side == INITIATOR)
1052 pp = iph2->side == INITIATOR ? iph2->proposal : iph2->approval;
    [all...]
racoonctl.c 1116 pd->side == INITIATOR ? 'I' : 'R',
isakmp_quick.c 121 /* If initiator side, send error to kernel by SADB_ACQUIRE. */
122 if (iph2->side == INITIATOR)
134 * begin Quick Mode as initiator. send pfkey getspi message to kernel.
873 if (oakley_compute_keymat(iph2, INITIATOR) < 0)
891 /* Do UPDATE for initiator */
1034 /* Do UPDATE for initiator */
1063 * receive from initiator
    [all...]
handler.c 244 /* INITIATOR is always expected to know the exact rmconf. */
245 if (iph1->side == INITIATOR)
1276 * We have to keep iph2->proposal valid at least for initiator,
isakmp_ident.c 98 * begin Identity Protection Mode as initiator.
844 * receive from initiator
947 * send to initiator
1101 * receive from initiator
1240 * send to initiator
1320 * receive from initiator
    [all...]
isakmp_cfg.c 1195 iph2->side = INITIATOR;
    [all...]
ipsec_doi.c 319 if (iph1->side == INITIATOR) {
776 * This function is called by initiator only.
883 * NOTE: this function is for initiator.
    [all...]

Completed in 437 milliseconds