/external/chromium/third_party/libjingle/source/talk/session/tunnel/ |
tunnelsessionclient.h | 49 enum TunnelSessionRole { INITIATOR, RESPONDER }; 124 // Signal arguments are this, initiator, description, session
|
securetunnelsessionclient.cc | 170 // containing the initiator's SecureTunnelContentDescription, 172 // <iq from="INITIATOR@gmail.com/pcpE101B7F4" 177 // initiator="INITIATOR@gmail.com/pcpE101B7F4"> 182 // INITIATOR'S CERTIFICATE IN PERM FORMAT (ASCII GIBBERISH) 191 // echoing the initiator's certificate, looks something like this: 193 // to="INITIATOR@gmail.com/pcpE101B7F4" 197 // initiator="sdoyon911@gmail.com/pcpE101B7F4"> 202 // INITIATOR'S CERTIFICATE IN PERM FORMAT (ASCII GIBBERISH) 277 // We are the initiator so we are the client. Put our cert into th [all...] |
tunnelsessionclient.cc | 187 INITIATOR);
|
/external/chromium_org/third_party/libjingle/source/talk/session/tunnel/ |
tunnelsessionclient.h | 49 enum TunnelSessionRole { INITIATOR, RESPONDER }; 124 // Signal arguments are this, initiator, description, session
|
securetunnelsessionclient.cc | 174 // containing the initiator's SecureTunnelContentDescription, 176 // <iq from="INITIATOR@gmail.com/pcpE101B7F4" 181 // initiator="INITIATOR@gmail.com/pcpE101B7F4"> 186 // INITIATOR'S CERTIFICATE IN PERM FORMAT (ASCII GIBBERISH) 195 // echoing the initiator's certificate, looks something like this: 197 // to="INITIATOR@gmail.com/pcpE101B7F4" 201 // initiator="sdoyon911@gmail.com/pcpE101B7F4"> 206 // INITIATOR'S CERTIFICATE IN PERM FORMAT (ASCII GIBBERISH) 281 // We are the initiator so we are the client. Put our cert into th [all...] |
tunnelsessionclient.cc | 196 INITIATOR);
|
/external/tcpdump/ |
isakmp.h | 46 #define INITIATOR 1 87 ! Initiator ! 101 cookie_t i_ck; /* Initiator Cookie */
|
/external/ipsec-tools/src/racoon/ |
proposal.c | 188 * NOTE: In the case of initiator, must be ensured that there is no 392 case INITIATOR: 528 case INITIATOR: 1088 if (iph2->side == INITIATOR) 1118 if (iph2->side == INITIATOR) 1141 if (iph2->side == INITIATOR)
|
isakmp.h | 42 #define INITIATOR 0 /* synonym sender */ 51 ! Initiator ! 65 cookie_t i_ck; /* Initiator Cookie */ 424 cookie_t i_ck; /* Initiator Cookie */
|
strnames.c | 94 case INITIATOR: 114 case INITIATOR: 136 case INITIATOR: 162 case INITIATOR:
|
oakley.c | 517 bp = (side == INITIATOR ? iph2->nonce : iph2->nonce_p); 521 bp = (side == INITIATOR ? iph2->nonce_p : iph2->nonce); 896 if (iph1->side == INITIATOR) 906 if (iph1->side == INITIATOR) 947 iph1->side == INITIATOR ? "init" : "resp"); 1293 if (iph1->side == INITIATOR) [all...] |
pfkey.c | 819 /* If initiator side, send error to kernel by SADB_ACQUIRE. */ 820 if (iph2->side == INITIATOR) 848 if (iph2->side == INITIATOR) { 981 pp = iph2->side == INITIATOR ? iph2->proposal : iph2->approval; 1039 if (iph2->side == INITIATOR) 1326 if (iph2->side == INITIATOR) [all...] |
isakmp_inf.c | 267 if ((iph1->side == INITIATOR && iph1->status < PHASE1ST_MSG3SENT) 724 iph1->side = INITIATOR; 793 * Initiator/Responder cookie and SPI has no meaning, SPI size = 0. 925 iph2->side = INITIATOR; [all...] |
isakmp_ident.c | 97 * begin Identity Protection Mode as initiator. 850 * receive from initiator 953 * send to initiator 1110 * receive from initiator 1249 * send to initiator 1330 * receive from initiator [all...] |
racoonctl.c | 1186 pd->side == INITIATOR ? 'I' : 'R', [all...] |
isakmp.c | 410 /* the initiator's cookie must not be zero */ 463 iph1->side == INITIATOR) { 466 "the initiator's cookies collide.\n"); 554 * the packet must be the 1st message from a initiator 561 /*it must be the 1st message from a initiator.*/ 581 if (iph1->side != INITIATOR) { 584 "it has to be as the initiator. %s\n", 630 * as the packet from responder againt initiator's 1st 1020 /* new negotiation of phase 1 for initiator */ 1038 iph1->side = INITIATOR; [all...] |
isakmp_cfg.c | 1166 iph2->side = INITIATOR; [all...] |
isakmp_quick.c | 100 * begin Quick Mode as initiator. send pfkey getspi message to kernel. 641 if (oakley_compute_keymat(iph2, INITIATOR) < 0) 659 /* Do UPDATE for initiator */ 802 /* Do UPDATE for initiator */ 831 * receive from initiator 1115 * save the packet from the initiator in order to resend the 1179 * send to initiator 1380 * receive from initiator [all...] |
ipsec_doi.c | 289 if (iph1-> side == INITIATOR) { 918 * This function is called by initiator only. 1023 * NOTE: this function is for initiator. [all...] |