设计并实现了PF_KEY第二版协议,该协议主要负责提供IKE与内核安全数据库进行通信的接口。
The author designs and realizes the second edition of PFKEY protocol, which is mainly responsible for providing the interface for communication between IKE and Kernal secure database.
最后在此基础上完成了一个基于内核入侵的木马设计与实现。
Based on that, has completed the design and the realization of a kind of kernel hacking Trojan Horse Finally.
重点设计并实现了PF_KEY V2协议,该协议主要负责提供IKE与内核安全数据库进行通信的接口。
The paper prominently designed and implemented the PF_KEY V2 protocol, which mainly provides the communication interface between IKE and SADB.
应用推荐