/external/chromium/third_party/libjingle/source/talk/session/tunnel/ |
tunnelsessionclient.h | 49 enum TunnelSessionRole { INITIATOR, RESPONDER }; 124 // Signal arguments are this, initiator, description, session
|
securetunnelsessionclient.cc | 170 // containing the initiator's SecureTunnelContentDescription, 172 // <iq from="INITIATOR@gmail.com/pcpE101B7F4" 177 // initiator="INITIATOR@gmail.com/pcpE101B7F4"> 182 // INITIATOR'S CERTIFICATE IN PERM FORMAT (ASCII GIBBERISH) 191 // echoing the initiator's certificate, looks something like this: 193 // to="INITIATOR@gmail.com/pcpE101B7F4" 197 // initiator="sdoyon911@gmail.com/pcpE101B7F4"> 202 // INITIATOR'S CERTIFICATE IN PERM FORMAT (ASCII GIBBERISH) 277 // We are the initiator so we are the client. Put our cert into th [all...] |
tunnelsessionclient.cc | 187 INITIATOR);
|
/external/tcpdump/ |
isakmp.h | 46 #define INITIATOR 1 87 ! Initiator ! 101 cookie_t i_ck; /* Initiator Cookie */
|
/external/ipsec-tools/src/racoon/ |
proposal.c | 188 * NOTE: In the case of initiator, must be ensured that there is no 392 case INITIATOR: 528 case INITIATOR: 1088 if (iph2->side == INITIATOR) 1118 if (iph2->side == INITIATOR) 1141 if (iph2->side == INITIATOR)
|
isakmp.h | 42 #define INITIATOR 0 /* synonym sender */ 51 ! Initiator ! 65 cookie_t i_ck; /* Initiator Cookie */ 420 cookie_t i_ck; /* Initiator Cookie */
|
strnames.c | 94 case INITIATOR: 114 case INITIATOR: 136 case INITIATOR: 162 case INITIATOR:
|
oakley.c | 564 bp = (side == INITIATOR ? iph2->nonce : iph2->nonce_p); 568 bp = (side == INITIATOR ? iph2->nonce_p : iph2->nonce); 943 if (iph1->side == INITIATOR) 953 if (iph1->side == INITIATOR) 994 iph1->side == INITIATOR ? "init" : "resp"); 1340 if (iph1->side == INITIATOR) [all...] |
isakmp_inf.c | 269 if ((iph1->side == INITIATOR && iph1->status < PHASE1ST_MSG3SENT) 714 iph1->side = INITIATOR; 783 * Initiator/Responder cookie and SPI has no meaning, SPI size = 0. 905 iph2->side = INITIATOR; [all...] |
admin.c | 560 iph2->side = INITIATOR;
|
isakmp.c | 407 /* the initiator's cookie must not be zero */ 460 iph1->side == INITIATOR) { 463 "the initiator's cookies collide.\n"); 551 * the packet must be the 1st message from a initiator 558 /*it must be the 1st message from a initiator.*/ 578 if (iph1->side != INITIATOR) { 581 "it has to be as the initiator. %s\n", 627 * as the packet from responder againt initiator's 1st 1034 /* new negotiation of phase 1 for initiator */ 1052 iph1->side = INITIATOR; [all...] |
pfkey.c | 904 if (iph2->side == INITIATOR) 1052 pp = iph2->side == INITIATOR ? iph2->proposal : iph2->approval; [all...] |
racoonctl.c | 1116 pd->side == INITIATOR ? 'I' : 'R',
|
isakmp_quick.c | 121 /* If initiator side, send error to kernel by SADB_ACQUIRE. */ 122 if (iph2->side == INITIATOR) 134 * begin Quick Mode as initiator. send pfkey getspi message to kernel. 873 if (oakley_compute_keymat(iph2, INITIATOR) < 0) 891 /* Do UPDATE for initiator */ 1034 /* Do UPDATE for initiator */ 1063 * receive from initiator [all...] |
handler.c | 244 /* INITIATOR is always expected to know the exact rmconf. */ 245 if (iph1->side == INITIATOR) 1276 * We have to keep iph2->proposal valid at least for initiator,
|
isakmp_ident.c | 98 * begin Identity Protection Mode as initiator. 844 * receive from initiator 947 * send to initiator 1101 * receive from initiator 1240 * send to initiator 1320 * receive from initiator [all...] |
isakmp_cfg.c | 1195 iph2->side = INITIATOR; [all...] |
ipsec_doi.c | 319 if (iph1->side == INITIATOR) { 776 * This function is called by initiator only. 883 * NOTE: this function is for initiator. [all...] |