NetBSD/sys/netipsec
rpaulo 68699904bd Add two new sysctls protected under IPSEC_DEBUG:
net.inet.ipsec.test_replay - When set to 1, IPsec will send packets with
          the same sequence number. This allows to verify if the other side
          has proper replay attacks detection.

  net.inet.ipsec.test_integrity - When set 1, IPsec will send packets with
          corrupted HMAC. This allows to verify if the other side properly
          detects modified packets.

(a message will be printed indicating when these sysctls changed)

By Pawel Jakub Dawidek <pjd@FreeBSD.org>.
Discussed with Christos Zoulas and Jonathan Stone.
2006-04-11 20:21:28 +00:00
..
Makefile
ah.h
ah_var.h
esp.h
esp_var.h
files.netipsec
ipcomp.h
ipcomp_var.h
ipip_var.h
ipsec.c Add two new sysctls protected under IPSEC_DEBUG: 2006-04-11 20:21:28 +00:00
ipsec.h Add two new sysctls protected under IPSEC_DEBUG: 2006-04-11 20:21:28 +00:00
ipsec6.h
ipsec_input.c
ipsec_mbuf.c
ipsec_netbsd.c Add two new sysctls protected under IPSEC_DEBUG: 2006-04-11 20:21:28 +00:00
ipsec_osdep.h
ipsec_output.c
ipsec_var.h
key.c
key.h
key_debug.c
key_debug.h
key_var.h
keydb.h
keysock.c
keysock.h
xform.h
xform_ah.c Add two new sysctls protected under IPSEC_DEBUG: 2006-04-11 20:21:28 +00:00
xform_esp.c Add two new sysctls protected under IPSEC_DEBUG: 2006-04-11 20:21:28 +00:00
xform_ipcomp.c
xform_ipip.c
xform_tcp.c