23
edits
Line 27: | Line 27: | ||
In other words the party which sent proxy eventually activates it, not obligtory the Jingle's initiator. Section "'''2.4 Completing the Negotiation'''" is more clear about in terms about activation, so probably one has to read it first. | In other words the party which sent proxy eventually activates it, not obligtory the Jingle's initiator. Section "'''2.4 Completing the Negotiation'''" is more clear about in terms about activation, so probably one has to read it first. | ||
Follow next rules | Follow next rules regarding dstaddr computation: | ||
# dstaddr for a local proxy candidate is computed like sha1(SID + Local JID + Remote JID) | # dstaddr for a local proxy candidate is computed like sha1(SID + Local JID + Remote JID) |
edits