HomeSort by relevance Sort by last modified time
    Searched refs:INITIATOR (Results 1 - 16 of 16) sorted by null

  /external/chromium_org/third_party/libjingle/source/talk/session/tunnel/
tunnelsessionclient.h 49 enum TunnelSessionRole { INITIATOR, RESPONDER };
124 // Signal arguments are this, initiator, description, session
securetunnelsessionclient.cc 174 // containing the initiator's SecureTunnelContentDescription,
176 // <iq from="INITIATOR@gmail.com/pcpE101B7F4"
181 // initiator="INITIATOR@gmail.com/pcpE101B7F4">
186 // INITIATOR'S CERTIFICATE IN PERM FORMAT (ASCII GIBBERISH)
195 // echoing the initiator's certificate, looks something like this:
197 // to="INITIATOR@gmail.com/pcpE101B7F4"
201 // initiator="sdoyon911@gmail.com/pcpE101B7F4">
206 // INITIATOR'S CERTIFICATE IN PERM FORMAT (ASCII GIBBERISH)
281 // We are the initiator so we are the client. Put our cert into th
    [all...]
tunnelsessionclient.cc 196 INITIATOR);
  /external/ipsec-tools/src/racoon/
proposal.c 188 * NOTE: In the case of initiator, must be ensured that there is no
392 case INITIATOR:
528 case INITIATOR:
1088 if (iph2->side == INITIATOR)
1118 if (iph2->side == INITIATOR)
1141 if (iph2->side == INITIATOR)
isakmp.h 42 #define INITIATOR 0 /* synonym sender */
51 ! Initiator !
65 cookie_t i_ck; /* Initiator Cookie */
424 cookie_t i_ck; /* Initiator Cookie */
strnames.c 94 case INITIATOR:
114 case INITIATOR:
136 case INITIATOR:
162 case INITIATOR:
oakley.c 517 bp = (side == INITIATOR ? iph2->nonce : iph2->nonce_p);
521 bp = (side == INITIATOR ? iph2->nonce_p : iph2->nonce);
896 if (iph1->side == INITIATOR)
906 if (iph1->side == INITIATOR)
947 iph1->side == INITIATOR ? "init" : "resp");
1293 if (iph1->side == INITIATOR)
    [all...]
pfkey.c 819 /* If initiator side, send error to kernel by SADB_ACQUIRE. */
820 if (iph2->side == INITIATOR)
848 if (iph2->side == INITIATOR) {
981 pp = iph2->side == INITIATOR ? iph2->proposal : iph2->approval;
1039 if (iph2->side == INITIATOR)
1326 if (iph2->side == INITIATOR)
    [all...]
isakmp_inf.c 267 if ((iph1->side == INITIATOR && iph1->status < PHASE1ST_MSG3SENT)
724 iph1->side = INITIATOR;
793 * Initiator/Responder cookie and SPI has no meaning, SPI size = 0.
925 iph2->side = INITIATOR;
    [all...]
isakmp_ident.c 97 * begin Identity Protection Mode as initiator.
850 * receive from initiator
953 * send to initiator
1110 * receive from initiator
1249 * send to initiator
1330 * receive from initiator
    [all...]
racoonctl.c 1186 pd->side == INITIATOR ? 'I' : 'R',
    [all...]
isakmp.c 410 /* the initiator's cookie must not be zero */
463 iph1->side == INITIATOR) {
466 "the initiator's cookies collide.\n");
554 * the packet must be the 1st message from a initiator
561 /*it must be the 1st message from a initiator.*/
581 if (iph1->side != INITIATOR) {
584 "it has to be as the initiator. %s\n",
630 * as the packet from responder againt initiator's 1st
1020 /* new negotiation of phase 1 for initiator */
1038 iph1->side = INITIATOR;
    [all...]
isakmp_cfg.c 1166 iph2->side = INITIATOR;
    [all...]
isakmp_quick.c 100 * begin Quick Mode as initiator. send pfkey getspi message to kernel.
641 if (oakley_compute_keymat(iph2, INITIATOR) < 0)
659 /* Do UPDATE for initiator */
802 /* Do UPDATE for initiator */
831 * receive from initiator
1115 * save the packet from the initiator in order to resend the
1179 * send to initiator
1380 * receive from initiator
    [all...]
ipsec_doi.c 289 if (iph1-> side == INITIATOR) {
918 * This function is called by initiator only.
1023 * NOTE: this function is for initiator.
    [all...]
  /external/tcpdump/
isakmp.h 46 #define INITIATOR 1
87 ! Initiator !
101 cookie_t i_ck; /* Initiator Cookie */

Completed in 268 milliseconds