Lines Matching +full:power +full:- +full:friendly

65 by attaching a cryptographic checksum computed using one-way hash functions.
70 This will help nodes on slow links but with enough computing power.
73 Transport mode is used to protect peer-to-peer communication between end nodes.
90 .Bl -column net.inet6.ipsec6.filtertunnel default enable
124 which are similar to the per-packet filters.
127 interface is used to define per-socket behavior, and
129 interface is used to define host-wide default behavior.
140 configuring per-socket policies using the
142 system calls, or by configuring kernel level packet filter-based
155 may be used to configure per-socket security policies.
156 A properly-formed IPsec policy specification structure can be
186 .Bl -column net.inet6.ipsec6.esp_trans_deflev integerxxx
211 .Bl -column net.inet6.ipsec6.def_policy integerxxx
223 .Bl -column net.inet.ipcomp.ipcomp_enable
233 .Bl -column net.inet6.ipsec6.inbonud_call_ike integerxxx
248 .Bl -tag -width 6n
250 If set to non-zero, the kernel clears the type-of-service field in the IPv4 header
252 This variable is used to get current systems to inter-operate with devices that
254 It should be set to non-zero
255 (clear the type-of-service field)
262 The variable is used for inter-operating with devices that
275 If set to non-zero, IPv4 IPsec tunnel encapsulation/decapsulation behavior will
276 be friendly to ECN
279 .Li draft-ietf-ipsec-ecn-02.txt .
283 If set to non-zero, debug messages will be generated via
288 If set to a non-zero value, the kernel fully recomputes checksums for
299 If this variable is set to a non-zero value, each packet handled by IPsec
314 protocol acts as a plug-in to the
319 those IP-layer protocols.
373 .%N "draft-mcdonald-simple-ipsec-api-03.txt"
419 .Dq Li esp/tunnel/A-B/use ah/transport/A-B/require ) ,