diff options
Diffstat (limited to 'dynamic-layers')
62 files changed, 1837 insertions, 0 deletions
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/README b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/README new file mode 100644 index 000000000..9578982d0 --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/README | |||
| @@ -0,0 +1,77 @@ | |||
| 1 | test_setkey script usage | ||
| 2 | |||
| 3 | The scripts in this directory may be used for testing | ||
| 4 | native Linux IPsec with the talitos driver as a loadable module. | ||
| 5 | |||
| 6 | It's assumed that these scripts have been placed in the directory | ||
| 7 | named /test_setkey. | ||
| 8 | |||
| 9 | The scripts setup_left and setup_right configure the ip addresses | ||
| 10 | for two boards named 'left' and 'right', which are two gateways for | ||
| 11 | an IPsec tunnel. Connect the eth1 interfaces of left and right boards together. | ||
| 12 | For smartbits testing, connect eth0 on each board to a smartbits port. | ||
| 13 | For other testing (ping, netperf, iperf), connect eth0 on each board to another system. | ||
| 14 | |||
| 15 | The scripts named left.conf-* and right.conf-* are setkey scripts | ||
| 16 | which configure the IPsec SA and SPD entries. | ||
| 17 | The scripts ending in -tunnel use tunnel mode IPsec, and the scripts | ||
| 18 | ending in -transport used transport mode IPsec. | ||
| 19 | Transport mode is useful for quickly testing security functionality | ||
| 20 | using ping or netperf between two boards. | ||
| 21 | Tunnel mode can be used for testing throughput using smartbits or other | ||
| 22 | performance test equipment. | ||
| 23 | |||
| 24 | There is a top level script called 'setup' which | ||
| 25 | is used for a one-step setup on the left and right boards. | ||
| 26 | 'setup' uses two or three parameters. The first parameter is the side, left or right. | ||
| 27 | The second parameter is the setkey suffix for the left.conf- and right.conf- files. | ||
| 28 | If the third parameter is supplied, the setup will modprobe that name, so | ||
| 29 | typically you should provide talitos as the third parameter if you want to load the driver. | ||
| 30 | If you have built the talitos driver into the kernel, omit the third parameter to setup. | ||
| 31 | You may test software encryption if talitos is built as a module and you omit the third parameter. | ||
| 32 | |||
| 33 | Below are example uses of the 'setup' script. | ||
| 34 | |||
| 35 | 1) One-step setup for smartbits | ||
| 36 | Use a tunnel mode setup on each side. | ||
| 37 | AES-HMAC-SHA1: | ||
| 38 | Left side: | ||
| 39 | /test_setkey/setup left aes-sha1-tunnel talitos | ||
| 40 | Right side: | ||
| 41 | /test_setkey/setup right aes-sha1-tunnel talitos | ||
| 42 | |||
| 43 | 3DES-HMAC-SHA1: | ||
| 44 | Left side: | ||
| 45 | /test_setkey/setup left 3des-sha1-tunnel talitos | ||
| 46 | Right side: | ||
| 47 | /test_setkey/setup right 3des-sha1-tunnel talitos | ||
| 48 | |||
| 49 | 2) One-step setup for testing ping, netperf, or iperf between two boards. | ||
| 50 | Use a transport mode setup on each side. | ||
| 51 | AES-HMAC-SHA1: | ||
| 52 | Left side: | ||
| 53 | /test_setkey/setup left aes-sha1-transport talitos | ||
| 54 | Right side: | ||
| 55 | /test_setkey/setup right aes-sha1-transport talitos | ||
| 56 | |||
| 57 | 3DES-HMAC-SHA1: | ||
| 58 | Left side: | ||
| 59 | /test_setkey/setup left 3des-sha1-transport talitos | ||
| 60 | Right side: | ||
| 61 | /test_setkey/setup right 3des-sha1-transport talitos | ||
| 62 | |||
| 63 | 3) Testing ipv4 | ||
| 64 | To test ipv4 (with no security) over the two gateways, use steps below. | ||
| 65 | Testing ipv4 is helpful to get your smartbits configuration verified | ||
| 66 | and also establish a baseline performance for throughput. | ||
| 67 | |||
| 68 | On the left board: | ||
| 69 | cd /test_setkey | ||
| 70 | ./setup_left | ||
| 71 | ./left.ipv4 | ||
| 72 | |||
| 73 | On the right board: | ||
| 74 | cd /test_setkey | ||
| 75 | ./setup_right | ||
| 76 | ./right.ipv4 | ||
| 77 | |||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/auto_left.conf-3des-sha1-tunnel b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/auto_left.conf-3des-sha1-tunnel new file mode 100755 index 000000000..6bd6c5d83 --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/auto_left.conf-3des-sha1-tunnel | |||
| @@ -0,0 +1,32 @@ | |||
| 1 | #!/usr/sbin/setkey -f | ||
| 2 | # | ||
| 3 | # | ||
| 4 | # Example ESP Tunnel for VPN. | ||
| 5 | # | ||
| 6 | # ========= ESP ========= | ||
| 7 | # | | | ||
| 8 | # Network-A Gateway-A Gateway-B Network-B | ||
| 9 | # 192.168.1.0/24 ---- 200.200.200.10 ------ 200.200.200.20 ---- 192.168.2.0/24 | ||
| 10 | # | ||
| 11 | # ====== 83xx board A ====== ===== 83xx board B ===== | ||
| 12 | # | | | | | ||
| 13 | # eth0 eth1 eth1 eth0 | ||
| 14 | # 192.168.1.130 200.200.200.10 200.200.200.20 192.168.2.130 | ||
| 15 | # | ||
| 16 | # | ||
| 17 | # Board A setup | ||
| 18 | # | ||
| 19 | # Flush the SAD and SPD | ||
| 20 | flush; | ||
| 21 | spdflush; | ||
| 22 | |||
| 23 | # I am gateway A (eth0:192.168.1.130, eth1:200.200.200.10) | ||
| 24 | # | ||
| 25 | # Security policies | ||
| 26 | spdadd 192.168.1.0/24 192.168.2.0/24 any -P out ipsec | ||
| 27 | esp/tunnel/200.200.200.10-200.200.200.20/require; | ||
| 28 | |||
| 29 | spdadd 192.168.2.0/24 192.168.1.0/24 any -P in ipsec | ||
| 30 | esp/tunnel/200.200.200.20-200.200.200.10/require; | ||
| 31 | |||
| 32 | |||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/auto_right.conf-3des-sha1-tunnel b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/auto_right.conf-3des-sha1-tunnel new file mode 100755 index 000000000..eebf307ae --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/auto_right.conf-3des-sha1-tunnel | |||
| @@ -0,0 +1,31 @@ | |||
| 1 | #!/usr/sbin/setkey -f | ||
| 2 | # | ||
| 3 | # | ||
| 4 | # Example ESP Tunnel for VPN. | ||
| 5 | # | ||
| 6 | # ========= ESP ========= | ||
| 7 | # | | | ||
| 8 | # Network-A Gateway-A Gateway-B Network-B | ||
| 9 | # 192.168.1.0/24 ---- 200.200.200.10 ------ 200.200.200.20 ---- 192.168.2.0/24 | ||
| 10 | # | ||
| 11 | # ====== 83xx board A ====== ===== 83xx board B ===== | ||
| 12 | # | | | | | ||
| 13 | # eth0 eth1 eth1 eth0 | ||
| 14 | # 192.168.1.130 200.200.200.10 200.200.200.20 192.168.2.130 | ||
| 15 | # | ||
| 16 | # | ||
| 17 | # Board B setup | ||
| 18 | # Flush the SAD and SPD | ||
| 19 | flush; | ||
| 20 | spdflush; | ||
| 21 | |||
| 22 | # I am gateway B (eth0:192.168.2.130, eth1:200.200.200.20) | ||
| 23 | # | ||
| 24 | # Security policies | ||
| 25 | |||
| 26 | spdadd 192.168.2.0/24 192.168.1.0/24 any -P out ipsec | ||
| 27 | esp/tunnel/200.200.200.20-200.200.200.10/require; | ||
| 28 | |||
| 29 | spdadd 192.168.1.0/24 192.168.2.0/24 any -P in ipsec | ||
| 30 | esp/tunnel/200.200.200.10-200.200.200.20/require; | ||
| 31 | |||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/flush-setkey b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/flush-setkey new file mode 100755 index 000000000..0be30562c --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/flush-setkey | |||
| @@ -0,0 +1,4 @@ | |||
| 1 | #!/usr/sbin/setkey -f | ||
| 2 | |||
| 3 | flush; | ||
| 4 | spdflush; | ||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/ipsec.conf.left b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/ipsec.conf.left new file mode 100644 index 000000000..d9d6c0c61 --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/ipsec.conf.left | |||
| @@ -0,0 +1,29 @@ | |||
| 1 | # /etc/ipsec.conf - strongSwan IPsec configuration file | ||
| 2 | |||
| 3 | config setup | ||
| 4 | charondebug="chd 2, knl 2" | ||
| 5 | crlcheckinterval=180 | ||
| 6 | strictcrlpolicy=no | ||
| 7 | plutostart=no | ||
| 8 | |||
| 9 | conn %default | ||
| 10 | ikelifetime=60m | ||
| 11 | keylife=20m | ||
| 12 | rekeymargin=3m | ||
| 13 | keyingtries=1 | ||
| 14 | keyexchange=ikev2 | ||
| 15 | type=tunnel | ||
| 16 | auth=esp | ||
| 17 | compress=no | ||
| 18 | mobike=no | ||
| 19 | |||
| 20 | conn net-net | ||
| 21 | left=200.200.200.10 | ||
| 22 | leftsubnet=192.168.1.0/24 | ||
| 23 | leftcert=moonCert.pem | ||
| 24 | leftid="C=CH, O=Linux strongSwan, CN=moon.strongswan.org" | ||
| 25 | leftfirewall=yes | ||
| 26 | right=200.200.200.20 | ||
| 27 | rightsubnet=192.168.2.0/24 | ||
| 28 | rightid="C=CH, O=Linux strongSwan, CN=sun.strongswan.org" | ||
| 29 | auto=add | ||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/ipsec.conf.right b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/ipsec.conf.right new file mode 100644 index 000000000..c14dee2b4 --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/ipsec.conf.right | |||
| @@ -0,0 +1,28 @@ | |||
| 1 | # /etc/ipsec.conf - strongSwan IPsec configuration file | ||
| 2 | |||
| 3 | config setup | ||
| 4 | charondebug="chd 2, knl 2" | ||
| 5 | crlcheckinterval=180 | ||
| 6 | strictcrlpolicy=no | ||
| 7 | plutostart=no | ||
| 8 | |||
| 9 | conn %default | ||
| 10 | ikelifetime=60m | ||
| 11 | keylife=20m | ||
| 12 | rekeymargin=3m | ||
| 13 | keyingtries=1 | ||
| 14 | keyexchange=ikev2 | ||
| 15 | auth=esp | ||
| 16 | compress=no | ||
| 17 | mobike=no | ||
| 18 | |||
| 19 | conn net-net | ||
| 20 | left=200.200.200.20 | ||
| 21 | leftcert=sunCert.pem | ||
| 22 | leftid="C=CH, O=Linux strongSwan, CN=sun.strongswan.org" | ||
| 23 | leftsubnet=192.168.2.0/24 | ||
| 24 | leftfirewall=yes | ||
| 25 | right=200.200.200.10 | ||
| 26 | rightid="C=CH, O=Linux strongSwan, CN=moon.strongswan.org" | ||
| 27 | rightsubnet=192.168.1.0/24 | ||
| 28 | auto=add | ||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/ipsec.secrets.left b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/ipsec.secrets.left new file mode 100644 index 000000000..e86d6aa5c --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/ipsec.secrets.left | |||
| @@ -0,0 +1,3 @@ | |||
| 1 | # /etc/ipsec.secrets - strongSwan IPsec secrets file | ||
| 2 | |||
| 3 | : RSA moonKey.pem | ||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/ipsec.secrets.right b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/ipsec.secrets.right new file mode 100644 index 000000000..1095b74cc --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/ipsec.secrets.right | |||
| @@ -0,0 +1,8 @@ | |||
| 1 | # /etc/ipsec.secrets - strongSwan IPsec secrets file | ||
| 2 | |||
| 3 | : RSA sunKey.pem | ||
| 4 | |||
| 5 | |||
| 6 | |||
| 7 | |||
| 8 | |||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/ipsec_ikev1.conf.left b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/ipsec_ikev1.conf.left new file mode 100644 index 000000000..55025dbc8 --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/ipsec_ikev1.conf.left | |||
| @@ -0,0 +1,39 @@ | |||
| 1 | # /etc/ipsec.conf - strongSwan IPsec configuration file | ||
| 2 | |||
| 3 | config setup | ||
| 4 | plutodebug=control | ||
| 5 | crlcheckinterval=180 | ||
| 6 | strictcrlpolicy=no | ||
| 7 | charonstart=no | ||
| 8 | |||
| 9 | conn %default | ||
| 10 | ikelifetime=60m | ||
| 11 | keylife=20m | ||
| 12 | rekeymargin=3m | ||
| 13 | keyingtries=1 | ||
| 14 | keyexchange=ikev1 | ||
| 15 | left=200.200.200.10 | ||
| 16 | leftcert=moonCert.pem | ||
| 17 | leftid="C=CH, O=Linux strongSwan, CN=moon.strongswan.org" | ||
| 18 | leftfirewall=yes | ||
| 19 | |||
| 20 | conn net-net | ||
| 21 | left=%defaultroute | ||
| 22 | leftsubnet=192.168.1.0/24 | ||
| 23 | leftcert=moonCert.pem | ||
| 24 | right=200.200.200.20 | ||
| 25 | rightsubnet=192.168.2.0/24 | ||
| 26 | rightid="C=CH, O=Linux strongSwan, CN=sun.strongswan.org" | ||
| 27 | auto=add | ||
| 28 | |||
| 29 | conn host-host | ||
| 30 | left=%defaultroute | ||
| 31 | leftcert=moonCert.pem | ||
| 32 | right=200.200.200.20 | ||
| 33 | rightid="C=CH, O=Linux strongSwan, CN=sun.strongswan.org" | ||
| 34 | auto=add | ||
| 35 | |||
| 36 | conn rw | ||
| 37 | leftsubnet=192.168.1.0/24 | ||
| 38 | right=%any | ||
| 39 | auto=add | ||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/ipsec_ikev1.conf.right b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/ipsec_ikev1.conf.right new file mode 100644 index 000000000..479791ea2 --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/ipsec_ikev1.conf.right | |||
| @@ -0,0 +1,34 @@ | |||
| 1 | # /etc/ipsec.conf - strongSwan IPsec configuration file | ||
| 2 | |||
| 3 | config setup | ||
| 4 | plutodebug=control | ||
| 5 | crlcheckinterval=180 | ||
| 6 | strictcrlpolicy=no | ||
| 7 | charonstart=no | ||
| 8 | |||
| 9 | conn %default | ||
| 10 | ikelifetime=60m | ||
| 11 | keylife=20m | ||
| 12 | rekeymargin=3m | ||
| 13 | keyingtries=1 | ||
| 14 | keyexchange=ikev1 | ||
| 15 | left=200.200.200.20 | ||
| 16 | leftcert=sunCert.pem | ||
| 17 | leftid="C=CH, O=Linux strongSwan, CN=sun.strongswan.org" | ||
| 18 | leftfirewall=yes | ||
| 19 | |||
| 20 | conn net-net | ||
| 21 | left=%defaultroute | ||
| 22 | leftsubnet=192.168.2.0/24 | ||
| 23 | leftcert=sunCert.pem | ||
| 24 | right=200.200.200.10 | ||
| 25 | rightsubnet=192.168.1.0/24 | ||
| 26 | rightid="C=CH, O=Linux strongSwan, CN=moon.strongswan.org" | ||
| 27 | auto=add | ||
| 28 | |||
| 29 | conn host-host | ||
| 30 | left=%defaultroute | ||
| 31 | leftcert=sunCert.pem | ||
| 32 | right=200.200.200.10 | ||
| 33 | rightid="C=CH, O=Linux strongSwan, CN=moon.strongswan.org" | ||
| 34 | auto=add | ||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-3des-md5-transport b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-3des-md5-transport new file mode 100755 index 000000000..5422771bb --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-3des-md5-transport | |||
| @@ -0,0 +1,23 @@ | |||
| 1 | #!/usr/sbin/setkey -f | ||
| 2 | #I am 200.200.200.10 | ||
| 3 | |||
| 4 | flush; | ||
| 5 | spdflush; | ||
| 6 | |||
| 7 | # ESP SAs doing encryption using 192 bit long keys (168 + 24 parity) | ||
| 8 | # and hmac-md5 authentication using 128 bit long keys | ||
| 9 | add 200.200.200.10 200.200.200.20 esp 0x10513 | ||
| 10 | -E 3des-cbc 0x7aeaca3f87d060a12f4a4487d5a5c3355920fae69a96c831 | ||
| 11 | -A hmac-md5 0xd5f603abc8cd9d19319ca32fb955b10f; | ||
| 12 | |||
| 13 | add 200.200.200.20 200.200.200.10 esp 0x10514 | ||
| 14 | -E 3des-cbc 0xf6ddb555acfd9d77b03ea3843f2653255afe8eb5573965df | ||
| 15 | -A hmac-md5 0x1dd90b4c32dcbe9d37b555a23df5170e; | ||
| 16 | |||
| 17 | |||
| 18 | spdadd 200.200.200.20 200.200.200.10 any -P in ipsec | ||
| 19 | esp/transport//require; | ||
| 20 | |||
| 21 | spdadd 200.200.200.10 200.200.200.20 any -P out ipsec | ||
| 22 | esp/transport//require; | ||
| 23 | |||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-3des-md5-tunnel b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-3des-md5-tunnel new file mode 100755 index 000000000..52bf9c3fb --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-3des-md5-tunnel | |||
| @@ -0,0 +1,42 @@ | |||
| 1 | #!/usr/sbin/setkey -f | ||
| 2 | # | ||
| 3 | # | ||
| 4 | # Example ESP Tunnel for VPN. | ||
| 5 | # | ||
| 6 | # ========= ESP ========= | ||
| 7 | # | | | ||
| 8 | # Network-A Gateway-A Gateway-B Network-B | ||
| 9 | # 192.168.1.0/24 ---- 200.200.200.10 ------ 200.200.200.20 ---- 192.168.2.0/24 | ||
| 10 | # | ||
| 11 | # ====== 83xx board A ====== ===== 83xx board B ===== | ||
| 12 | # | | | | | ||
| 13 | # eth0 eth1 eth1 eth0 | ||
| 14 | # 192.168.1.130 200.200.200.10 200.200.200.20 192.168.2.130 | ||
| 15 | # | ||
| 16 | # | ||
| 17 | # Board A setup | ||
| 18 | # | ||
| 19 | # Flush the SAD and SPD | ||
| 20 | flush; | ||
| 21 | spdflush; | ||
| 22 | |||
| 23 | # I am gateway A (eth0:192.168.1.130, eth1:200.200.200.10) | ||
| 24 | # | ||
| 25 | # Security policies | ||
| 26 | spdadd 192.168.1.0/24 192.168.2.0/24 any -P out ipsec | ||
| 27 | esp/tunnel/200.200.200.10-200.200.200.20/require; | ||
| 28 | |||
| 29 | spdadd 192.168.2.0/24 192.168.1.0/24 any -P in ipsec | ||
| 30 | esp/tunnel/200.200.200.20-200.200.200.10/require; | ||
| 31 | |||
| 32 | |||
| 33 | # ESP SAs doing encryption using 192 bit long keys (168 + 24 parity) | ||
| 34 | # and hmac-md5 authentication using 128 bit long keys | ||
| 35 | add 200.200.200.10 200.200.200.20 esp 0x201 -m tunnel | ||
| 36 | -E 3des-cbc 0x7aeaca3f87d060a12f4a4487d5a5c3355920fae69a96c831 | ||
| 37 | -A hmac-md5 0xd5f603abc8cd9d19319ca32fb955b10f; | ||
| 38 | |||
| 39 | add 200.200.200.20 200.200.200.10 esp 0x301 -m tunnel | ||
| 40 | -E 3des-cbc 0xf6ddb555acfd9d77b03ea3843f2653255afe8eb5573965df | ||
| 41 | -A hmac-md5 0x1dd90b4c32dcbe9d37b555a23df5170e; | ||
| 42 | |||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-3des-sha1-transport b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-3des-sha1-transport new file mode 100755 index 000000000..e5ee00541 --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-3des-sha1-transport | |||
| @@ -0,0 +1,22 @@ | |||
| 1 | #!/usr/sbin/setkey -f | ||
| 2 | #I am 200.200.200.10 | ||
| 3 | |||
| 4 | flush; | ||
| 5 | spdflush; | ||
| 6 | |||
| 7 | # ESP SAs doing encryption using 192 bit long keys (168 + 24 parity) | ||
| 8 | # and hmac-sha1 authentication using 160 bit long keys | ||
| 9 | add 200.200.200.10 200.200.200.20 esp 0x10513 | ||
| 10 | -E 3des-cbc 0x7aeaca3f87d060a12f4a4487d5a5c3355920fae69a96c831 | ||
| 11 | -A hmac-sha1 0xe9c43acd5e8d779b6e09c87347852708ab49bdd3; | ||
| 12 | |||
| 13 | add 200.200.200.20 200.200.200.10 esp 0x10514 | ||
| 14 | -E 3des-cbc 0xf6ddb555acfd9d77b03ea3843f2653255afe8eb5573965df | ||
| 15 | -A hmac-sha1 0xea6856479330dc9c17b8f6c37e2a895363d83f21; | ||
| 16 | |||
| 17 | spdadd 200.200.200.20 200.200.200.10 any -P in ipsec | ||
| 18 | esp/transport//require; | ||
| 19 | |||
| 20 | spdadd 200.200.200.10 200.200.200.20 any -P out ipsec | ||
| 21 | esp/transport//require; | ||
| 22 | |||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-3des-sha1-tunnel b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-3des-sha1-tunnel new file mode 100755 index 000000000..eb2881dbd --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-3des-sha1-tunnel | |||
| @@ -0,0 +1,42 @@ | |||
| 1 | #!/usr/sbin/setkey -f | ||
| 2 | # | ||
| 3 | # | ||
| 4 | # Example ESP Tunnel for VPN. | ||
| 5 | # | ||
| 6 | # ========= ESP ========= | ||
| 7 | # | | | ||
| 8 | # Network-A Gateway-A Gateway-B Network-B | ||
| 9 | # 192.168.1.0/24 ---- 200.200.200.10 ------ 200.200.200.20 ---- 192.168.2.0/24 | ||
| 10 | # | ||
| 11 | # ====== 83xx board A ====== ===== 83xx board B ===== | ||
| 12 | # | | | | | ||
| 13 | # eth0 eth1 eth1 eth0 | ||
| 14 | # 192.168.1.130 200.200.200.10 200.200.200.20 192.168.2.130 | ||
| 15 | # | ||
| 16 | # | ||
| 17 | # Board A setup | ||
| 18 | # | ||
| 19 | # Flush the SAD and SPD | ||
| 20 | flush; | ||
| 21 | spdflush; | ||
| 22 | |||
| 23 | # I am gateway A (eth0:192.168.1.130, eth1:200.200.200.10) | ||
| 24 | # | ||
| 25 | # Security policies | ||
| 26 | spdadd 192.168.1.0/24 192.168.2.0/24 any -P out ipsec | ||
| 27 | esp/tunnel/200.200.200.10-200.200.200.20/require; | ||
| 28 | |||
| 29 | spdadd 192.168.2.0/24 192.168.1.0/24 any -P in ipsec | ||
| 30 | esp/tunnel/200.200.200.20-200.200.200.10/require; | ||
| 31 | |||
| 32 | |||
| 33 | # ESP SAs doing encryption using 192 bit long keys (168 + 24 parity) | ||
| 34 | # and hmac-sha1 authentication using 160 bit long keys | ||
| 35 | add 200.200.200.10 200.200.200.20 esp 0x201 -m tunnel | ||
| 36 | -E 3des-cbc 0x7aeaca3f87d060a12f4a4487d5a5c3355920fae69a96c831 | ||
| 37 | -A hmac-sha1 0xe9c43acd5e8d779b6e09c87347852708ab49bdd3; | ||
| 38 | |||
| 39 | add 200.200.200.20 200.200.200.10 esp 0x301 -m tunnel | ||
| 40 | -E 3des-cbc 0xf6ddb555acfd9d77b03ea3843f2653255afe8eb5573965df | ||
| 41 | -A hmac-sha1 0xea6856479330dc9c17b8f6c37e2a895363d83f21; | ||
| 42 | |||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-3des-sha256-transport b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-3des-sha256-transport new file mode 100755 index 000000000..b5286320a --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-3des-sha256-transport | |||
| @@ -0,0 +1,23 @@ | |||
| 1 | #!/usr/sbin/setkey -f | ||
| 2 | #I am 200.200.200.10 | ||
| 3 | |||
| 4 | flush; | ||
| 5 | spdflush; | ||
| 6 | |||
| 7 | # ESP SAs doing encryption using 192 bit long keys (168 + 24 parity) | ||
| 8 | # and hmac-sha2-256 authentication using 256 bit long keys | ||
| 9 | add 200.200.200.10 200.200.200.20 esp 0x10513 | ||
| 10 | -E 3des-cbc 0x7aeaca3f87d060a12f4a4487d5a5c3355920fae69a96c831 | ||
| 11 | -A hmac-sha2-256 0x4de03bebf6beb4fdef5a67d349a09580466cc4e54503333b2a5fd34538c91198; | ||
| 12 | |||
| 13 | add 200.200.200.20 200.200.200.10 esp 0x10514 | ||
| 14 | -E 3des-cbc 0xf6ddb555acfd9d77b03ea3843f2653255afe8eb5573965df | ||
| 15 | -A hmac-sha2-256 0x5e01eb780b7ecc074ca2ca4fa4a5ea2ff841c977da0ce61c49d1fe767ea5452c; | ||
| 16 | |||
| 17 | |||
| 18 | spdadd 200.200.200.20 200.200.200.10 any -P in ipsec | ||
| 19 | esp/transport//require; | ||
| 20 | |||
| 21 | spdadd 200.200.200.10 200.200.200.20 any -P out ipsec | ||
| 22 | esp/transport//require; | ||
| 23 | |||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-3des-sha256-tunnel b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-3des-sha256-tunnel new file mode 100755 index 000000000..e7726f088 --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-3des-sha256-tunnel | |||
| @@ -0,0 +1,42 @@ | |||
| 1 | #!/usr/sbin/setkey -f | ||
| 2 | # | ||
| 3 | # | ||
| 4 | # Example ESP Tunnel for VPN. | ||
| 5 | # | ||
| 6 | # ========= ESP ========= | ||
| 7 | # | | | ||
| 8 | # Network-A Gateway-A Gateway-B Network-B | ||
| 9 | # 192.168.1.0/24 ---- 200.200.200.10 ------ 200.200.200.20 ---- 192.168.2.0/24 | ||
| 10 | # | ||
| 11 | # ====== 83xx board A ====== ===== 83xx board B ===== | ||
| 12 | # | | | | | ||
| 13 | # eth0 eth1 eth1 eth0 | ||
| 14 | # 192.168.1.130 200.200.200.10 200.200.200.20 192.168.2.130 | ||
| 15 | # | ||
| 16 | # | ||
| 17 | # Board A setup | ||
| 18 | # | ||
| 19 | # Flush the SAD and SPD | ||
| 20 | flush; | ||
| 21 | spdflush; | ||
| 22 | |||
| 23 | # I am gateway A (eth0:192.168.1.130, eth1:200.200.200.10) | ||
| 24 | # | ||
| 25 | # Security policies | ||
| 26 | spdadd 192.168.1.0/24 192.168.2.0/24 any -P out ipsec | ||
| 27 | esp/tunnel/200.200.200.10-200.200.200.20/require; | ||
| 28 | |||
| 29 | spdadd 192.168.2.0/24 192.168.1.0/24 any -P in ipsec | ||
| 30 | esp/tunnel/200.200.200.20-200.200.200.10/require; | ||
| 31 | |||
| 32 | |||
| 33 | # ESP SAs doing encryption using 192 bit long keys (168 + 24 parity) | ||
| 34 | # and hmac-sha2-256 authentication using 256 bit long keys | ||
| 35 | add 200.200.200.10 200.200.200.20 esp 0x10513 -m tunnel | ||
| 36 | -E 3des-cbc 0x7aeaca3f87d060a12f4a4487d5a5c3355920fae69a96c831 | ||
| 37 | -A hmac-sha2-256 0x4de03bebf6beb4fdef5a67d349a09580466cc4e54503333b2a5fd34538c91198; | ||
| 38 | |||
| 39 | add 200.200.200.20 200.200.200.10 esp 0x10514 -m tunnel | ||
| 40 | -E 3des-cbc 0xf6ddb555acfd9d77b03ea3843f2653255afe8eb5573965df | ||
| 41 | -A hmac-sha2-256 0x5e01eb780b7ecc074ca2ca4fa4a5ea2ff841c977da0ce61c49d1fe767ea5452c; | ||
| 42 | |||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-aes-md5-transport b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-aes-md5-transport new file mode 100755 index 000000000..96f578370 --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-aes-md5-transport | |||
| @@ -0,0 +1,23 @@ | |||
| 1 | #!/usr/sbin/setkey -f | ||
| 2 | #I am 200.200.200.10 | ||
| 3 | |||
| 4 | flush; | ||
| 5 | spdflush; | ||
| 6 | |||
| 7 | # ESP SAs doing encryption using 192 bit long keys (168 + 24 parity) | ||
| 8 | # and hmac-md5 authentication using 128 bit long keys | ||
| 9 | add 200.200.200.10 200.200.200.20 esp 0x10513 | ||
| 10 | -E aes-cbc 0x7aeaca3f87d060a12f4a4487d5a5c3355920fae69a96c831 | ||
| 11 | -A hmac-md5 0xd5f603abc8cd9d19319ca32fb955b10f; | ||
| 12 | |||
| 13 | add 200.200.200.20 200.200.200.10 esp 0x10514 | ||
| 14 | -E aes-cbc 0xf6ddb555acfd9d77b03ea3843f2653255afe8eb5573965df | ||
| 15 | -A hmac-md5 0x1dd90b4c32dcbe9d37b555a23df5170e; | ||
| 16 | |||
| 17 | |||
| 18 | spdadd 200.200.200.20 200.200.200.10 any -P in ipsec | ||
| 19 | esp/transport//require; | ||
| 20 | |||
| 21 | spdadd 200.200.200.10 200.200.200.20 any -P out ipsec | ||
| 22 | esp/transport//require; | ||
| 23 | |||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-aes-md5-tunnel b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-aes-md5-tunnel new file mode 100755 index 000000000..b2cf84bf5 --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-aes-md5-tunnel | |||
| @@ -0,0 +1,42 @@ | |||
| 1 | #!/usr/sbin/setkey -f | ||
| 2 | # | ||
| 3 | # | ||
| 4 | # Example ESP Tunnel for VPN. | ||
| 5 | # | ||
| 6 | # ========= ESP ========= | ||
| 7 | # | | | ||
| 8 | # Network-A Gateway-A Gateway-B Network-B | ||
| 9 | # 192.168.1.0/24 ---- 200.200.200.10 ------ 200.200.200.20 ---- 192.168.2.0/24 | ||
| 10 | # | ||
| 11 | # ====== 83xx board A ====== ===== 83xx board B ===== | ||
| 12 | # | | | | | ||
| 13 | # eth0 eth1 eth1 eth0 | ||
| 14 | # 192.168.1.130 200.200.200.10 200.200.200.20 192.168.2.130 | ||
| 15 | # | ||
| 16 | # | ||
| 17 | # Board A setup | ||
| 18 | # | ||
| 19 | # Flush the SAD and SPD | ||
| 20 | flush; | ||
| 21 | spdflush; | ||
| 22 | |||
| 23 | # I am gateway A (eth0:192.168.1.130, eth1:200.200.200.10) | ||
| 24 | # | ||
| 25 | # Security policies | ||
| 26 | spdadd 192.168.1.0/24 192.168.2.0/24 any -P out ipsec | ||
| 27 | esp/tunnel/200.200.200.10-200.200.200.20/require; | ||
| 28 | |||
| 29 | spdadd 192.168.2.0/24 192.168.1.0/24 any -P in ipsec | ||
| 30 | esp/tunnel/200.200.200.20-200.200.200.10/require; | ||
| 31 | |||
| 32 | |||
| 33 | # ESP SAs doing encryption using 192 bit long keys (168 + 24 parity) | ||
| 34 | # and hmac-md5 authentication using 128 bit long keys | ||
| 35 | add 200.200.200.10 200.200.200.20 esp 0x201 -m tunnel | ||
| 36 | -E aes-cbc 0x7aeaca3f87d060a12f4a4487d5a5c3355920fae69a96c831 | ||
| 37 | -A hmac-md5 0xd5f603abc8cd9d19319ca32fb955b10f; | ||
| 38 | |||
| 39 | add 200.200.200.20 200.200.200.10 esp 0x301 -m tunnel | ||
| 40 | -E aes-cbc 0xf6ddb555acfd9d77b03ea3843f2653255afe8eb5573965df | ||
| 41 | -A hmac-md5 0x1dd90b4c32dcbe9d37b555a23df5170e; | ||
| 42 | |||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-aes-sha1-transport b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-aes-sha1-transport new file mode 100755 index 000000000..f3ffaf5cf --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-aes-sha1-transport | |||
| @@ -0,0 +1,22 @@ | |||
| 1 | #!/usr/sbin/setkey -f | ||
| 2 | #I am 200.200.200.10 | ||
| 3 | |||
| 4 | flush; | ||
| 5 | spdflush; | ||
| 6 | |||
| 7 | # ESP SAs doing encryption using 192 bit long keys (168 + 24 parity) | ||
| 8 | # and hmac-sha1 authentication using 160 bit long keys | ||
| 9 | add 200.200.200.10 200.200.200.20 esp 0x10513 | ||
| 10 | -E aes-cbc 0x7aeaca3f87d060a12f4a4487d5a5c3355920fae69a96c831 | ||
| 11 | -A hmac-sha1 0xe9c43acd5e8d779b6e09c87347852708ab49bdd3; | ||
| 12 | |||
| 13 | add 200.200.200.20 200.200.200.10 esp 0x10514 | ||
| 14 | -E aes-cbc 0xf6ddb555acfd9d77b03ea3843f2653255afe8eb5573965df | ||
| 15 | -A hmac-sha1 0xea6856479330dc9c17b8f6c37e2a895363d83f21; | ||
| 16 | |||
| 17 | spdadd 200.200.200.20 200.200.200.10 any -P in ipsec | ||
| 18 | esp/transport//require; | ||
| 19 | |||
| 20 | spdadd 200.200.200.10 200.200.200.20 any -P out ipsec | ||
| 21 | esp/transport//require; | ||
| 22 | |||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-aes-sha1-tunnel b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-aes-sha1-tunnel new file mode 100755 index 000000000..1ab7874f8 --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-aes-sha1-tunnel | |||
| @@ -0,0 +1,42 @@ | |||
| 1 | #!/usr/sbin/setkey -f | ||
| 2 | # | ||
| 3 | # | ||
| 4 | # Example ESP Tunnel for VPN. | ||
| 5 | # | ||
| 6 | # ========= ESP ========= | ||
| 7 | # | | | ||
| 8 | # Network-A Gateway-A Gateway-B Network-B | ||
| 9 | # 192.168.1.0/24 ---- 200.200.200.10 ------ 200.200.200.20 ---- 192.168.2.0/24 | ||
| 10 | # | ||
| 11 | # ====== 83xx board A ====== ===== 83xx board B ===== | ||
| 12 | # | | | | | ||
| 13 | # eth0 eth1 eth1 eth0 | ||
| 14 | # 192.168.1.130 200.200.200.10 200.200.200.20 192.168.2.130 | ||
| 15 | # | ||
| 16 | # | ||
| 17 | # Board A setup | ||
| 18 | # | ||
| 19 | # Flush the SAD and SPD | ||
| 20 | flush; | ||
| 21 | spdflush; | ||
| 22 | |||
| 23 | # I am gateway A (eth0:192.168.1.130, eth1:200.200.200.10) | ||
| 24 | # | ||
| 25 | # Security policies | ||
| 26 | spdadd 192.168.1.0/24 192.168.2.0/24 any -P out ipsec | ||
| 27 | esp/tunnel/200.200.200.10-200.200.200.20/require; | ||
| 28 | |||
| 29 | spdadd 192.168.2.0/24 192.168.1.0/24 any -P in ipsec | ||
| 30 | esp/tunnel/200.200.200.20-200.200.200.10/require; | ||
| 31 | |||
| 32 | |||
| 33 | # ESP SAs doing encryption using 192 bit long keys (168 + 24 parity) | ||
| 34 | # and hmac-sha1 authentication using 160 bit long keys | ||
| 35 | add 200.200.200.10 200.200.200.20 esp 0x201 -m tunnel | ||
| 36 | -E aes-cbc 0x7aeaca3f87d060a12f4a4487d5a5c3355920fae69a96c831 | ||
| 37 | -A hmac-sha1 0xe9c43acd5e8d779b6e09c87347852708ab49bdd3; | ||
| 38 | |||
| 39 | add 200.200.200.20 200.200.200.10 esp 0x301 -m tunnel | ||
| 40 | -E aes-cbc 0xf6ddb555acfd9d77b03ea3843f2653255afe8eb5573965df | ||
| 41 | -A hmac-sha1 0xea6856479330dc9c17b8f6c37e2a895363d83f21; | ||
| 42 | |||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-aes-sha256-transport b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-aes-sha256-transport new file mode 100755 index 000000000..d2645d6f2 --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-aes-sha256-transport | |||
| @@ -0,0 +1,23 @@ | |||
| 1 | #!/usr/sbin/setkey -f | ||
| 2 | #I am 200.200.200.10 | ||
| 3 | |||
| 4 | flush; | ||
| 5 | spdflush; | ||
| 6 | |||
| 7 | # ESP SAs doing encryption using 192 bit long keys (168 + 24 parity) | ||
| 8 | # and hmac-sha2-256 authentication using 256 bit long keys | ||
| 9 | add 200.200.200.10 200.200.200.20 esp 0x10513 | ||
| 10 | -E aes-cbc 0x7aeaca3f87d060a12f4a4487d5a5c3355920fae69a96c831 | ||
| 11 | -A hmac-sha2-256 0x4de03bebf6beb4fdef5a67d349a09580466cc4e54503333b2a5fd34538c91198; | ||
| 12 | |||
| 13 | add 200.200.200.20 200.200.200.10 esp 0x10514 | ||
| 14 | -E aes-cbc 0xf6ddb555acfd9d77b03ea3843f2653255afe8eb5573965df | ||
| 15 | -A hmac-sha2-256 0x5e01eb780b7ecc074ca2ca4fa4a5ea2ff841c977da0ce61c49d1fe767ea5452c; | ||
| 16 | |||
| 17 | |||
| 18 | spdadd 200.200.200.20 200.200.200.10 any -P in ipsec | ||
| 19 | esp/transport//require; | ||
| 20 | |||
| 21 | spdadd 200.200.200.10 200.200.200.20 any -P out ipsec | ||
| 22 | esp/transport//require; | ||
| 23 | |||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-aes-sha256-tunnel b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-aes-sha256-tunnel new file mode 100755 index 000000000..8ed697d1d --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-aes-sha256-tunnel | |||
| @@ -0,0 +1,42 @@ | |||
| 1 | #!/usr/sbin/setkey -f | ||
| 2 | # | ||
| 3 | # | ||
| 4 | # Example ESP Tunnel for VPN. | ||
| 5 | # | ||
| 6 | # ========= ESP ========= | ||
| 7 | # | | | ||
| 8 | # Network-A Gateway-A Gateway-B Network-B | ||
| 9 | # 192.168.1.0/24 ---- 200.200.200.10 ------ 200.200.200.20 ---- 192.168.2.0/24 | ||
| 10 | # | ||
| 11 | # ====== 83xx board A ====== ===== 83xx board B ===== | ||
| 12 | # | | | | | ||
| 13 | # eth0 eth1 eth1 eth0 | ||
| 14 | # 192.168.1.130 200.200.200.10 200.200.200.20 192.168.2.130 | ||
| 15 | # | ||
| 16 | # | ||
| 17 | # Board A setup | ||
| 18 | # | ||
| 19 | # Flush the SAD and SPD | ||
| 20 | flush; | ||
| 21 | spdflush; | ||
| 22 | |||
| 23 | # I am gateway A (eth0:192.168.1.130, eth1:200.200.200.10) | ||
| 24 | # | ||
| 25 | # Security policies | ||
| 26 | spdadd 192.168.1.0/24 192.168.2.0/24 any -P out ipsec | ||
| 27 | esp/tunnel/200.200.200.10-200.200.200.20/require; | ||
| 28 | |||
| 29 | spdadd 192.168.2.0/24 192.168.1.0/24 any -P in ipsec | ||
| 30 | esp/tunnel/200.200.200.20-200.200.200.10/require; | ||
| 31 | |||
| 32 | |||
| 33 | # ESP SAs doing encryption using 192 bit long keys (168 + 24 parity) | ||
| 34 | # and hmac-sha2-256 authentication using 256 bit long keys | ||
| 35 | add 200.200.200.10 200.200.200.20 esp 0x10513 -m tunnel | ||
| 36 | -E aes-cbc 0x7aeaca3f87d060a12f4a4487d5a5c3355920fae69a96c831 | ||
| 37 | -A hmac-sha2-256 0x4de03bebf6beb4fdef5a67d349a09580466cc4e54503333b2a5fd34538c91198; | ||
| 38 | |||
| 39 | add 200.200.200.20 200.200.200.10 esp 0x10514 -m tunnel | ||
| 40 | -E aes-cbc 0xf6ddb555acfd9d77b03ea3843f2653255afe8eb5573965df | ||
| 41 | -A hmac-sha2-256 0x5e01eb780b7ecc074ca2ca4fa4a5ea2ff841c977da0ce61c49d1fe767ea5452c; | ||
| 42 | |||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-null-null-transport b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-null-null-transport new file mode 100755 index 000000000..84275d07a --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-null-null-transport | |||
| @@ -0,0 +1,23 @@ | |||
| 1 | #!/usr/sbin/setkey -f | ||
| 2 | #I am 200.200.200.10 | ||
| 3 | |||
| 4 | flush; | ||
| 5 | spdflush; | ||
| 6 | |||
| 7 | # ESP SAs doing null encryption | ||
| 8 | # and null authentication | ||
| 9 | add 200.200.200.10 200.200.200.20 esp 0x10513 | ||
| 10 | -E null | ||
| 11 | -A null; | ||
| 12 | |||
| 13 | add 200.200.200.20 200.200.200.10 esp 0x10514 | ||
| 14 | -E null | ||
| 15 | -A null; | ||
| 16 | |||
| 17 | |||
| 18 | spdadd 200.200.200.20 200.200.200.10 any -P in ipsec | ||
| 19 | esp/transport//require; | ||
| 20 | |||
| 21 | spdadd 200.200.200.10 200.200.200.20 any -P out ipsec | ||
| 22 | esp/transport//require; | ||
| 23 | |||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-null-null-tunnel b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-null-null-tunnel new file mode 100755 index 000000000..478d14a84 --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.conf-null-null-tunnel | |||
| @@ -0,0 +1,42 @@ | |||
| 1 | #!/usr/sbin/setkey -f | ||
| 2 | # | ||
| 3 | # | ||
| 4 | # Example ESP Tunnel for VPN. | ||
| 5 | # | ||
| 6 | # ========= ESP ========= | ||
| 7 | # | | | ||
| 8 | # Network-A Gateway-A Gateway-B Network-B | ||
| 9 | # 192.168.1.0/24 ---- 200.200.200.10 ------ 200.200.200.20 ---- 192.168.2.0/24 | ||
| 10 | # | ||
| 11 | # ====== 83xx board A ====== ===== 83xx board B ===== | ||
| 12 | # | | | | | ||
| 13 | # eth0 eth1 eth1 eth0 | ||
| 14 | # 192.168.1.130 200.200.200.10 200.200.200.20 192.168.2.130 | ||
| 15 | # | ||
| 16 | # | ||
| 17 | # Board A setup | ||
| 18 | # | ||
| 19 | # Flush the SAD and SPD | ||
| 20 | flush; | ||
| 21 | spdflush; | ||
| 22 | |||
| 23 | # I am gateway A (eth0:192.168.1.130, eth1:200.200.200.10) | ||
| 24 | # | ||
| 25 | # Security policies | ||
| 26 | spdadd 192.168.1.0/24 192.168.2.0/24 any -P out ipsec | ||
| 27 | esp/tunnel/200.200.200.10-200.200.200.20/require; | ||
| 28 | |||
| 29 | spdadd 192.168.2.0/24 192.168.1.0/24 any -P in ipsec | ||
| 30 | esp/tunnel/200.200.200.20-200.200.200.10/require; | ||
| 31 | |||
| 32 | |||
| 33 | # ESP SAs doing null encryption | ||
| 34 | # and null authentication | ||
| 35 | add 200.200.200.10 200.200.200.20 esp 0x201 -m tunnel | ||
| 36 | -E null | ||
| 37 | -A null; | ||
| 38 | |||
| 39 | add 200.200.200.20 200.200.200.10 esp 0x301 -m tunnel | ||
| 40 | -E null | ||
| 41 | -A null; | ||
| 42 | |||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.ipv4 b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.ipv4 new file mode 100755 index 000000000..e219f2adc --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/left.ipv4 | |||
| @@ -0,0 +1,2 @@ | |||
| 1 | set -v | ||
| 2 | route add -net 192.168.2.0 netmask 255.255.255.0 gw 200.200.200.20 | ||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/moonCert.pem b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/moonCert.pem new file mode 100644 index 000000000..d5c970f41 --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/moonCert.pem | |||
| @@ -0,0 +1,25 @@ | |||
| 1 | -----BEGIN CERTIFICATE----- | ||
| 2 | MIIEIjCCAwqgAwIBAgIBFzANBgkqhkiG9w0BAQsFADBFMQswCQYDVQQGEwJDSDEZ | ||
| 3 | MBcGA1UEChMQTGludXggc3Ryb25nU3dhbjEbMBkGA1UEAxMSc3Ryb25nU3dhbiBS | ||
| 4 | b290IENBMB4XDTA5MDgyNzEwMDMzMloXDTE0MDgyNjEwMDMzMlowRjELMAkGA1UE | ||
| 5 | BhMCQ0gxGTAXBgNVBAoTEExpbnV4IHN0cm9uZ1N3YW4xHDAaBgNVBAMTE21vb24u | ||
| 6 | c3Ryb25nc3dhbi5vcmcwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDK | ||
| 7 | L2M91Lu6BYYhWxWgMS9z9TMSTwszm5rhO7ZIsCtMRo4PAeYw+++SGXt3CPXb/+p+ | ||
| 8 | SWKGlm11rPE71eQ3ehgh2C3hAurfmWO0iQQaCw+fdreeIVCqOQIOP6UqZ327h5yY | ||
| 9 | YpHk8VQv4vBJTpxclU1PqnWheqe1ZlLxsW773LRml/fQt/UgvJkCBTZZONLNMfK+ | ||
| 10 | 7TDnYaVsAtncgvDN78nUNEe2qY92KK7SrBJ6SpUEg49m51F+XgsGcsgWVHS85on3 | ||
| 11 | Om/G48crLEVJjdu8CxewSRVgb+lPJWzHd8QsU0Vg/7vlqs3ZRMyNtNKrr4opSvVb | ||
| 12 | A6agGlTXhDCreDiXU8KHAgMBAAGjggEaMIIBFjAJBgNVHRMEAjAAMAsGA1UdDwQE | ||
| 13 | AwIDqDAdBgNVHQ4EFgQUapx00fiJeYn2WpTpifH6w2SdKS4wbQYDVR0jBGYwZIAU | ||
| 14 | XafdcAZRMn7ntm2zteXgYOouTe+hSaRHMEUxCzAJBgNVBAYTAkNIMRkwFwYDVQQK | ||
| 15 | ExBMaW51eCBzdHJvbmdTd2FuMRswGQYDVQQDExJzdHJvbmdTd2FuIFJvb3QgQ0GC | ||
| 16 | AQAwHgYDVR0RBBcwFYITbW9vbi5zdHJvbmdzd2FuLm9yZzATBgNVHSUEDDAKBggr | ||
| 17 | BgEFBQcDATA5BgNVHR8EMjAwMC6gLKAqhihodHRwOi8vY3JsLnN0cm9uZ3N3YW4u | ||
| 18 | b3JnL3N0cm9uZ3N3YW4uY3JsMA0GCSqGSIb3DQEBCwUAA4IBAQCctXg2xeMozaTV | ||
| 19 | jiBL1P8MY9uEH5JtU0EceQ1RbI5/2vGRdnECND9oADY5vamaaE2Mdq2Qh/vlXnML | ||
| 20 | o3ii5ELjsQlYdTYZOcMOdcUUXYvbbFX1cwpkBhyBl1H25KptHcgQ/HnceKp3kOuq | ||
| 21 | wYOYjgwePXulcpWXx0E2QtQCFQQZFPyEWeNJxH0oglg53QPXfHY9I2/Gukj5V0bz | ||
| 22 | p7ME0Gs8KdnYdmbbDqzQgPsta96/m+HoJlsrVF+4Gqihj6BWMBQ2ybjPWZdG3oH9 | ||
| 23 | 25cE8v60Ry98D0Z/tygbAUFnh5oOvaf642paVgc3aoA77I8U+UZjECxISoiHultY | ||
| 24 | 7QTufOwP | ||
| 25 | -----END CERTIFICATE----- | ||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/moonKey.pem b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/moonKey.pem new file mode 100644 index 000000000..4d99866f7 --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/moonKey.pem | |||
| @@ -0,0 +1,27 @@ | |||
| 1 | -----BEGIN RSA PRIVATE KEY----- | ||
| 2 | MIIEowIBAAKCAQEAyi9jPdS7ugWGIVsVoDEvc/UzEk8LM5ua4Tu2SLArTEaODwHm | ||
| 3 | MPvvkhl7dwj12//qfklihpZtdazxO9XkN3oYIdgt4QLq35ljtIkEGgsPn3a3niFQ | ||
| 4 | qjkCDj+lKmd9u4ecmGKR5PFUL+LwSU6cXJVNT6p1oXqntWZS8bFu+9y0Zpf30Lf1 | ||
| 5 | ILyZAgU2WTjSzTHyvu0w52GlbALZ3ILwze/J1DRHtqmPdiiu0qwSekqVBIOPZudR | ||
| 6 | fl4LBnLIFlR0vOaJ9zpvxuPHKyxFSY3bvAsXsEkVYG/pTyVsx3fELFNFYP+75arN | ||
| 7 | 2UTMjbTSq6+KKUr1WwOmoBpU14Qwq3g4l1PChwIDAQABAoIBACBFB/Xqajv6fbn9 | ||
| 8 | K6pxrz02uXwGmacXAtVIDoPzejWmXS4QA4l17HrJDmelSnhelDKry8nnYHkTrTz7 | ||
| 9 | mn0wQ4HDWy86o/okJUG/TKRLd6bf79aRQqqohqd3iQkHk43GyzuXH+oGioVKF0fc | ||
| 10 | ACDWw4wfjL7FMNdHCZ4Bz9DrHO/ysHe9B6rvSYm3VZRhSxaneIkaLkkDadKpVx3f | ||
| 11 | XNFlMxY4qKPJYYSoJZ61iMqrO7+rnA93tmyDDs8PKU3BtnpfNrdePgleJHhk8Zqy | ||
| 12 | Ev2/NOCSUxbKE8NCtLpGTs+T0qjjnu4k3WPd3ZOBAan0uPDekHZeHB/aXGLhYcxx | ||
| 13 | J5SurqECgYEA+F1gppkER5Jtoaudt/CUpdQ1sR9wxf75VBqJ4FiYABGQz9xlG4oj | ||
| 14 | zL/o572s0iV3bwFpnQa+WuWrxGkP6ZuB/Z82npc0N/vLou/b4dxvg4n7K+eOOEf0 | ||
| 15 | 8FMjsse2tqTIXKCqcmQnR0NPQ1jwuvEKsXP5w/JOlnRXAXnd4jxsJI0CgYEA0GaT | ||
| 16 | 61ySttUW9jC3mxuY6jkQy8TEQqR3nOFvWwmCXIWOpN/MTTPus+Telxp/pdKhU+mo | ||
| 17 | PmX3Unyne5PvwleWDq3YzltX5ZDZGJ5UJlKuNnfGIzQ6OcHRbb7zBpQG6qSRPuug | ||
| 18 | bgo688hTnb1L59nK88zWVK45euf6pyuoI+SwIGMCgYEA7yvE8knyhBXvezuv0z1b | ||
| 19 | eGHmHp5/VDwY0DQKSEAoiBBiWrkLqLybgwXf/KJ8dZZc8En08aFX2GLJyYe/KiB1 | ||
| 20 | ys3ypEBJqgvRayP+o/9KZ+qNNRd0rqAksPXvL7ABNNt0kzapTSVDae3Yu6s/j1am | ||
| 21 | DIL5qAeERIDedG5uDPpQzdUCgYB7MtjpP63ABhLv8XbpbBQnCxtByw3W89F+Xcrt | ||
| 22 | v55gQdhE4cSuMzA/CuMH4vNpPS6AI9aBJNhj3CtKo/cOJachAGb1/wvkO5ALvLW0 | ||
| 23 | fhZdPstUTnDJain7vfF/hwzbs/PlhXgu9T9KlLfRvXFdG+Sd4g8mumRiozcLkoRw | ||
| 24 | y6XPTwKBgDJP+s9wXmdG90HST/aqC7FKrVXLpB63dY5swNUfQP6sa0pFnON0r0JC | ||
| 25 | h/YCsGFFIAebQ2uOkM3g3f9nkwTp7910ov+/5uThvRI2w2BBPy0mVuALPjyyF1Z2 | ||
| 26 | cb9zpyKiIuXoXRCf4sd8r1lR9bn0Fxx0Svpxf+fpMGSI5quHNBKY | ||
| 27 | -----END RSA PRIVATE KEY----- | ||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/pingsizes.sh b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/pingsizes.sh new file mode 100755 index 000000000..faefb2459 --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/pingsizes.sh | |||
| @@ -0,0 +1,19 @@ | |||
| 1 | #!/bin/bash | ||
| 2 | # | ||
| 3 | # Usage: ./pingsizes.sh 1440 20 (or greater) | ||
| 4 | # | ||
| 5 | |||
| 6 | PINGDEST=${PINGDEST:-200.200.200.10} | ||
| 7 | k=$1 | ||
| 8 | lim="$((k+$2))" | ||
| 9 | ((k-=1)) | ||
| 10 | while [ "$k" != "$lim" ] ; do | ||
| 11 | echo -n "ping -s $((k+=1)) : " | ||
| 12 | ping -i 1000 -c 1 -s $k $PINGDEST | grep packets & | ||
| 13 | sleep 1 | ||
| 14 | PID=`ps -eaf | grep 'ping -i' | grep -v grep | sed 's/[ ][ ]*/ /g' | cut -d " " -f 2` | ||
| 15 | if [ -n "$PID" ] ; then | ||
| 16 | echo "****************** killing $PID" | ||
| 17 | kill $PID > /dev/null | ||
| 18 | fi | ||
| 19 | done | ||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/pingsizest.sh b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/pingsizest.sh new file mode 100755 index 000000000..d5ff0f7db --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/pingsizest.sh | |||
| @@ -0,0 +1,19 @@ | |||
| 1 | #!/bin/bash | ||
| 2 | # | ||
| 3 | # Usage: ./pingsizes.sh 1440 20 (or greater) | ||
| 4 | # | ||
| 5 | |||
| 6 | PINGDEST=${PINGDEST:-200.200.200.10} | ||
| 7 | k=$1 | ||
| 8 | lim="$((k+$2))" | ||
| 9 | ((k-=1)) | ||
| 10 | while [ "$k" != "$lim" ] ; do | ||
| 11 | echo ping -s $((k+=1)) | ||
| 12 | ping -i 1000 -c 1 -s $k $PINGDEST & | ||
| 13 | sleep 1 | ||
| 14 | PID=`ps -eaf | grep 'ping -i' | sed 's/[ ][ ]*/ /g' | cut -d " " -f 2` | ||
| 15 | if [ -n "$PID" ] ; then | ||
| 16 | echo "****************** killing $PID" | ||
| 17 | kill $PID | ||
| 18 | fi | ||
| 19 | done | ||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/psk.txt b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/psk.txt new file mode 100644 index 000000000..46c1ff41f --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/psk.txt | |||
| @@ -0,0 +1,2 @@ | |||
| 1 | 200.200.200.20 secretkeyracoon | ||
| 2 | 200.200.200.10 secretkeyracoon | ||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/racoon.conf b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/racoon.conf new file mode 100644 index 000000000..cf561f51e --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/racoon.conf | |||
| @@ -0,0 +1,22 @@ | |||
| 1 | path pre_shared_key "/test_setkey/psk.txt" ; | ||
| 2 | |||
| 3 | remote anonymous | ||
| 4 | { | ||
| 5 | exchange_mode main ; | ||
| 6 | lifetime time 1 hour ; | ||
| 7 | proposal { | ||
| 8 | encryption_algorithm 3des; | ||
| 9 | hash_algorithm sha1; | ||
| 10 | authentication_method pre_shared_key ; | ||
| 11 | dh_group 2 ; | ||
| 12 | } | ||
| 13 | } | ||
| 14 | |||
| 15 | sainfo anonymous | ||
| 16 | { | ||
| 17 | pfs_group 2; | ||
| 18 | lifetime time 1 hour ; | ||
| 19 | encryption_algorithm 3des ; | ||
| 20 | authentication_algorithm hmac_sha1 ; | ||
| 21 | compression_algorithm deflate ; | ||
| 22 | } | ||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-3des-md5-transport b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-3des-md5-transport new file mode 100755 index 000000000..7f82fb466 --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-3des-md5-transport | |||
| @@ -0,0 +1,23 @@ | |||
| 1 | #!/usr/sbin/setkey -f | ||
| 2 | #I am 200.200.200.20 | ||
| 3 | |||
| 4 | flush; | ||
| 5 | spdflush; | ||
| 6 | |||
| 7 | # ESP SAs doing encryption using 192 bit long keys (168 + 24 parity) | ||
| 8 | # and hmac-md5 authentication using 128 bit long keys | ||
| 9 | add 200.200.200.10 200.200.200.20 esp 0x10513 | ||
| 10 | -E 3des-cbc 0x7aeaca3f87d060a12f4a4487d5a5c3355920fae69a96c831 | ||
| 11 | -A hmac-md5 0xd5f603abc8cd9d19319ca32fb955b10f; | ||
| 12 | |||
| 13 | add 200.200.200.20 200.200.200.10 esp 0x10514 | ||
| 14 | -E 3des-cbc 0xf6ddb555acfd9d77b03ea3843f2653255afe8eb5573965df | ||
| 15 | -A hmac-md5 0x1dd90b4c32dcbe9d37b555a23df5170e; | ||
| 16 | |||
| 17 | |||
| 18 | spdadd 200.200.200.20 200.200.200.10 any -P out ipsec | ||
| 19 | esp/transport//require; | ||
| 20 | |||
| 21 | spdadd 200.200.200.10 200.200.200.20 any -P in ipsec | ||
| 22 | esp/transport//require; | ||
| 23 | |||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-3des-md5-tunnel b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-3des-md5-tunnel new file mode 100755 index 000000000..5a7525797 --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-3des-md5-tunnel | |||
| @@ -0,0 +1,42 @@ | |||
| 1 | #!/usr/sbin/setkey -f | ||
| 2 | # | ||
| 3 | # | ||
| 4 | # Example ESP Tunnel for VPN. | ||
| 5 | # | ||
| 6 | # ========= ESP ========= | ||
| 7 | # | | | ||
| 8 | # Network-A Gateway-A Gateway-B Network-B | ||
| 9 | # 192.168.1.0/24 ---- 200.200.200.10 ------ 200.200.200.20 ---- 192.168.2.0/24 | ||
| 10 | # | ||
| 11 | # ====== 83xx board A ====== ===== 83xx board B ===== | ||
| 12 | # | | | | | ||
| 13 | # eth0 eth1 eth1 eth0 | ||
| 14 | # 192.168.1.130 200.200.200.10 200.200.200.20 192.168.2.130 | ||
| 15 | # | ||
| 16 | # | ||
| 17 | # Board B setup | ||
| 18 | # | ||
| 19 | # Flush the SAD and SPD | ||
| 20 | flush; | ||
| 21 | spdflush; | ||
| 22 | |||
| 23 | # I am gateway B (eth0:192.168.2.130, eth1:200.200.200.20) | ||
| 24 | # | ||
| 25 | # Security policies | ||
| 26 | spdadd 192.168.2.0/24 192.168.1.0/24 any -P out ipsec | ||
| 27 | esp/tunnel/200.200.200.20-200.200.200.10/require; | ||
| 28 | |||
| 29 | spdadd 192.168.1.0/24 192.168.2.0/24 any -P in ipsec | ||
| 30 | esp/tunnel/200.200.200.10-200.200.200.20/require; | ||
| 31 | |||
| 32 | |||
| 33 | # ESP SAs doing encryption using 192 bit long keys (168 + 24 parity) | ||
| 34 | # and hmac-md5 authentication using 128 bit long keys | ||
| 35 | add 200.200.200.10 200.200.200.20 esp 0x201 -m tunnel | ||
| 36 | -E 3des-cbc 0x7aeaca3f87d060a12f4a4487d5a5c3355920fae69a96c831 | ||
| 37 | -A hmac-md5 0xd5f603abc8cd9d19319ca32fb955b10f; | ||
| 38 | |||
| 39 | add 200.200.200.20 200.200.200.10 esp 0x301 -m tunnel | ||
| 40 | -E 3des-cbc 0xf6ddb555acfd9d77b03ea3843f2653255afe8eb5573965df | ||
| 41 | -A hmac-md5 0x1dd90b4c32dcbe9d37b555a23df5170e; | ||
| 42 | |||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-3des-sha1-transport b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-3des-sha1-transport new file mode 100755 index 000000000..6ef885d44 --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-3des-sha1-transport | |||
| @@ -0,0 +1,22 @@ | |||
| 1 | #!/usr/sbin/setkey -f | ||
| 2 | #I am 200.200.200.20 | ||
| 3 | |||
| 4 | flush; | ||
| 5 | spdflush; | ||
| 6 | |||
| 7 | # ESP SAs doing encryption using 192 bit long keys (168 + 24 parity) | ||
| 8 | # and hmac-sha1 authentication using 160 bit long keys | ||
| 9 | add 200.200.200.10 200.200.200.20 esp 0x10513 | ||
| 10 | -E 3des-cbc 0x7aeaca3f87d060a12f4a4487d5a5c3355920fae69a96c831 | ||
| 11 | -A hmac-sha1 0xe9c43acd5e8d779b6e09c87347852708ab49bdd3; | ||
| 12 | |||
| 13 | add 200.200.200.20 200.200.200.10 esp 0x10514 | ||
| 14 | -E 3des-cbc 0xf6ddb555acfd9d77b03ea3843f2653255afe8eb5573965df | ||
| 15 | -A hmac-sha1 0xea6856479330dc9c17b8f6c37e2a895363d83f21; | ||
| 16 | |||
| 17 | # Security policies | ||
| 18 | spdadd 200.200.200.20 200.200.200.10 any -P out ipsec | ||
| 19 | esp/transport//require; | ||
| 20 | |||
| 21 | spdadd 200.200.200.10 200.200.200.20 any -P in ipsec | ||
| 22 | esp/transport//require; | ||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-3des-sha1-tunnel b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-3des-sha1-tunnel new file mode 100755 index 000000000..16c31578e --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-3des-sha1-tunnel | |||
| @@ -0,0 +1,41 @@ | |||
| 1 | #!/usr/sbin/setkey -f | ||
| 2 | # | ||
| 3 | # | ||
| 4 | # Example ESP Tunnel for VPN. | ||
| 5 | # | ||
| 6 | # ========= ESP ========= | ||
| 7 | # | | | ||
| 8 | # Network-A Gateway-A Gateway-B Network-B | ||
| 9 | # 192.168.1.0/24 ---- 200.200.200.10 ------ 200.200.200.20 ---- 192.168.2.0/24 | ||
| 10 | # | ||
| 11 | # ====== 83xx board A ====== ===== 83xx board B ===== | ||
| 12 | # | | | | | ||
| 13 | # eth0 eth1 eth1 eth0 | ||
| 14 | # 192.168.1.130 200.200.200.10 200.200.200.20 192.168.2.130 | ||
| 15 | # | ||
| 16 | # | ||
| 17 | # Board B setup | ||
| 18 | # Flush the SAD and SPD | ||
| 19 | flush; | ||
| 20 | spdflush; | ||
| 21 | |||
| 22 | # I am gateway B (eth0:192.168.2.130, eth1:200.200.200.20) | ||
| 23 | # | ||
| 24 | # Security policies | ||
| 25 | |||
| 26 | spdadd 192.168.2.0/24 192.168.1.0/24 any -P out ipsec | ||
| 27 | esp/tunnel/200.200.200.20-200.200.200.10/require; | ||
| 28 | |||
| 29 | spdadd 192.168.1.0/24 192.168.2.0/24 any -P in ipsec | ||
| 30 | esp/tunnel/200.200.200.10-200.200.200.20/require; | ||
| 31 | |||
| 32 | # ESP SAs doing encryption using 192 bit long keys (168 + 24 parity) | ||
| 33 | # and hmac-sha1 authentication using 160 bit long keys | ||
| 34 | add 200.200.200.10 200.200.200.20 esp 0x201 -m tunnel | ||
| 35 | -E 3des-cbc 0x7aeaca3f87d060a12f4a4487d5a5c3355920fae69a96c831 | ||
| 36 | -A hmac-sha1 0xe9c43acd5e8d779b6e09c87347852708ab49bdd3; | ||
| 37 | |||
| 38 | add 200.200.200.20 200.200.200.10 esp 0x301 -m tunnel | ||
| 39 | -E 3des-cbc 0xf6ddb555acfd9d77b03ea3843f2653255afe8eb5573965df | ||
| 40 | -A hmac-sha1 0xea6856479330dc9c17b8f6c37e2a895363d83f21; | ||
| 41 | |||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-3des-sha256-transport b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-3des-sha256-transport new file mode 100755 index 000000000..b97720923 --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-3des-sha256-transport | |||
| @@ -0,0 +1,23 @@ | |||
| 1 | #!/usr/sbin/setkey -f | ||
| 2 | #I am 200.200.200.20 | ||
| 3 | |||
| 4 | flush; | ||
| 5 | spdflush; | ||
| 6 | |||
| 7 | # ESP SAs doing encryption using 192 bit long keys (168 + 24 parity) | ||
| 8 | # and hmac-sha2-256 authentication using 256 bit long keys | ||
| 9 | add 200.200.200.10 200.200.200.20 esp 0x10513 | ||
| 10 | -E 3des-cbc 0x7aeaca3f87d060a12f4a4487d5a5c3355920fae69a96c831 | ||
| 11 | -A hmac-sha2-256 0x4de03bebf6beb4fdef5a67d349a09580466cc4e54503333b2a5fd34538c91198; | ||
| 12 | |||
| 13 | add 200.200.200.20 200.200.200.10 esp 0x10514 | ||
| 14 | -E 3des-cbc 0xf6ddb555acfd9d77b03ea3843f2653255afe8eb5573965df | ||
| 15 | -A hmac-sha2-256 0x5e01eb780b7ecc074ca2ca4fa4a5ea2ff841c977da0ce61c49d1fe767ea5452c; | ||
| 16 | |||
| 17 | |||
| 18 | spdadd 200.200.200.20 200.200.200.10 any -P out ipsec | ||
| 19 | esp/transport//require; | ||
| 20 | |||
| 21 | spdadd 200.200.200.10 200.200.200.20 any -P in ipsec | ||
| 22 | esp/transport//require; | ||
| 23 | |||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-3des-sha256-tunnel b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-3des-sha256-tunnel new file mode 100755 index 000000000..e7c5b4e64 --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-3des-sha256-tunnel | |||
| @@ -0,0 +1,42 @@ | |||
| 1 | #!/usr/sbin/setkey -f | ||
| 2 | # | ||
| 3 | # | ||
| 4 | # Example ESP Tunnel for VPN. | ||
| 5 | # | ||
| 6 | # ========= ESP ========= | ||
| 7 | # | | | ||
| 8 | # Network-A Gateway-A Gateway-B Network-B | ||
| 9 | # 192.168.1.0/24 ---- 200.200.200.10 ------ 200.200.200.20 ---- 192.168.2.0/24 | ||
| 10 | # | ||
| 11 | # ====== 83xx board A ====== ===== 83xx board B ===== | ||
| 12 | # | | | | | ||
| 13 | # eth0 eth1 eth1 eth0 | ||
| 14 | # 192.168.1.130 200.200.200.10 200.200.200.20 192.168.2.130 | ||
| 15 | # | ||
| 16 | # | ||
| 17 | # Board A setup | ||
| 18 | # | ||
| 19 | # Flush the SAD and SPD | ||
| 20 | flush; | ||
| 21 | spdflush; | ||
| 22 | |||
| 23 | # I am gateway B (eth0:192.168.2.130, eth1:200.200.200.20) | ||
| 24 | # | ||
| 25 | # Security policies | ||
| 26 | spdadd 192.168.2.0/24 192.168.1.0/24 any -P out ipsec | ||
| 27 | esp/tunnel/200.200.200.20-200.200.200.10/require; | ||
| 28 | |||
| 29 | spdadd 192.168.1.0/24 192.168.2.0/24 any -P in ipsec | ||
| 30 | esp/tunnel/200.200.200.10-200.200.200.20/require; | ||
| 31 | |||
| 32 | |||
| 33 | # ESP SAs doing encryption using 192 bit long keys (168 + 24 parity) | ||
| 34 | # and hmac-sha2-256 authentication using 256 bit long keys | ||
| 35 | add 200.200.200.10 200.200.200.20 esp 0x10513 -m tunnel | ||
| 36 | -E 3des-cbc 0x7aeaca3f87d060a12f4a4487d5a5c3355920fae69a96c831 | ||
| 37 | -A hmac-sha2-256 0x4de03bebf6beb4fdef5a67d349a09580466cc4e54503333b2a5fd34538c91198; | ||
| 38 | |||
| 39 | add 200.200.200.20 200.200.200.10 esp 0x10514 -m tunnel | ||
| 40 | -E 3des-cbc 0xf6ddb555acfd9d77b03ea3843f2653255afe8eb5573965df | ||
| 41 | -A hmac-sha2-256 0x5e01eb780b7ecc074ca2ca4fa4a5ea2ff841c977da0ce61c49d1fe767ea5452c; | ||
| 42 | |||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-aes-md5-transport b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-aes-md5-transport new file mode 100755 index 000000000..5d55d0014 --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-aes-md5-transport | |||
| @@ -0,0 +1,23 @@ | |||
| 1 | #!/usr/sbin/setkey -f | ||
| 2 | #I am 200.200.200.20 | ||
| 3 | |||
| 4 | flush; | ||
| 5 | spdflush; | ||
| 6 | |||
| 7 | # ESP SAs doing encryption using 192 bit long keys (168 + 24 parity) | ||
| 8 | # and hmac-md5 authentication using 128 bit long keys | ||
| 9 | add 200.200.200.10 200.200.200.20 esp 0x10513 | ||
| 10 | -E aes-cbc 0x7aeaca3f87d060a12f4a4487d5a5c3355920fae69a96c831 | ||
| 11 | -A hmac-md5 0xd5f603abc8cd9d19319ca32fb955b10f; | ||
| 12 | |||
| 13 | add 200.200.200.20 200.200.200.10 esp 0x10514 | ||
| 14 | -E aes-cbc 0xf6ddb555acfd9d77b03ea3843f2653255afe8eb5573965df | ||
| 15 | -A hmac-md5 0x1dd90b4c32dcbe9d37b555a23df5170e; | ||
| 16 | |||
| 17 | |||
| 18 | spdadd 200.200.200.20 200.200.200.10 any -P out ipsec | ||
| 19 | esp/transport//require; | ||
| 20 | |||
| 21 | spdadd 200.200.200.10 200.200.200.20 any -P in ipsec | ||
| 22 | esp/transport//require; | ||
| 23 | |||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-aes-md5-tunnel b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-aes-md5-tunnel new file mode 100755 index 000000000..f49bd54a0 --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-aes-md5-tunnel | |||
| @@ -0,0 +1,42 @@ | |||
| 1 | #!/usr/sbin/setkey -f | ||
| 2 | # | ||
| 3 | # | ||
| 4 | # Example ESP Tunnel for VPN. | ||
| 5 | # | ||
| 6 | # ========= ESP ========= | ||
| 7 | # | | | ||
| 8 | # Network-A Gateway-A Gateway-B Network-B | ||
| 9 | # 192.168.1.0/24 ---- 200.200.200.10 ------ 200.200.200.20 ---- 192.168.2.0/24 | ||
| 10 | # | ||
| 11 | # ====== 83xx board A ====== ===== 83xx board B ===== | ||
| 12 | # | | | | | ||
| 13 | # eth0 eth1 eth1 eth0 | ||
| 14 | # 192.168.1.130 200.200.200.10 200.200.200.20 192.168.2.130 | ||
| 15 | # | ||
| 16 | # | ||
| 17 | # Board B setup | ||
| 18 | # | ||
| 19 | # Flush the SAD and SPD | ||
| 20 | flush; | ||
| 21 | spdflush; | ||
| 22 | |||
| 23 | # I am gateway B (eth0:192.168.2.130, eth1:200.200.200.20) | ||
| 24 | # | ||
| 25 | # Security policies | ||
| 26 | spdadd 192.168.2.0/24 192.168.1.0/24 any -P out ipsec | ||
| 27 | esp/tunnel/200.200.200.20-200.200.200.10/require; | ||
| 28 | |||
| 29 | spdadd 192.168.1.0/24 192.168.2.0/24 any -P in ipsec | ||
| 30 | esp/tunnel/200.200.200.10-200.200.200.20/require; | ||
| 31 | |||
| 32 | |||
| 33 | # ESP SAs doing encryption using 192 bit long keys (168 + 24 parity) | ||
| 34 | # and hmac-md5 authentication using 128 bit long keys | ||
| 35 | add 200.200.200.10 200.200.200.20 esp 0x201 -m tunnel | ||
| 36 | -E aes-cbc 0x7aeaca3f87d060a12f4a4487d5a5c3355920fae69a96c831 | ||
| 37 | -A hmac-md5 0xd5f603abc8cd9d19319ca32fb955b10f; | ||
| 38 | |||
| 39 | add 200.200.200.20 200.200.200.10 esp 0x301 -m tunnel | ||
| 40 | -E aes-cbc 0xf6ddb555acfd9d77b03ea3843f2653255afe8eb5573965df | ||
| 41 | -A hmac-md5 0x1dd90b4c32dcbe9d37b555a23df5170e; | ||
| 42 | |||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-aes-sha1-transport b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-aes-sha1-transport new file mode 100755 index 000000000..d9c65a45c --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-aes-sha1-transport | |||
| @@ -0,0 +1,22 @@ | |||
| 1 | #!/usr/sbin/setkey -f | ||
| 2 | #I am 200.200.200.20 | ||
| 3 | |||
| 4 | flush; | ||
| 5 | spdflush; | ||
| 6 | |||
| 7 | # ESP SAs doing encryption using 192 bit long keys (168 + 24 parity) | ||
| 8 | # and hmac-sha1 authentication using 160 bit long keys | ||
| 9 | add 200.200.200.10 200.200.200.20 esp 0x10513 | ||
| 10 | -E aes-cbc 0x7aeaca3f87d060a12f4a4487d5a5c3355920fae69a96c831 | ||
| 11 | -A hmac-sha1 0xe9c43acd5e8d779b6e09c87347852708ab49bdd3; | ||
| 12 | |||
| 13 | add 200.200.200.20 200.200.200.10 esp 0x10514 | ||
| 14 | -E aes-cbc 0xf6ddb555acfd9d77b03ea3843f2653255afe8eb5573965df | ||
| 15 | -A hmac-sha1 0xea6856479330dc9c17b8f6c37e2a895363d83f21; | ||
| 16 | |||
| 17 | # Security policies | ||
| 18 | spdadd 200.200.200.20 200.200.200.10 any -P out ipsec | ||
| 19 | esp/transport//require; | ||
| 20 | |||
| 21 | spdadd 200.200.200.10 200.200.200.20 any -P in ipsec | ||
| 22 | esp/transport//require; | ||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-aes-sha1-tunnel b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-aes-sha1-tunnel new file mode 100755 index 000000000..1f10136a7 --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-aes-sha1-tunnel | |||
| @@ -0,0 +1,41 @@ | |||
| 1 | #!/usr/sbin/setkey -f | ||
| 2 | # | ||
| 3 | # | ||
| 4 | # Example ESP Tunnel for VPN. | ||
| 5 | # | ||
| 6 | # ========= ESP ========= | ||
| 7 | # | | | ||
| 8 | # Network-A Gateway-A Gateway-B Network-B | ||
| 9 | # 192.168.1.0/24 ---- 200.200.200.10 ------ 200.200.200.20 ---- 192.168.2.0/24 | ||
| 10 | # | ||
| 11 | # ====== 83xx board A ====== ===== 83xx board B ===== | ||
| 12 | # | | | | | ||
| 13 | # eth0 eth1 eth1 eth0 | ||
| 14 | # 192.168.1.130 200.200.200.10 200.200.200.20 192.168.2.130 | ||
| 15 | # | ||
| 16 | # | ||
| 17 | # Board B setup | ||
| 18 | # Flush the SAD and SPD | ||
| 19 | flush; | ||
| 20 | spdflush; | ||
| 21 | |||
| 22 | # I am gateway B (eth0:192.168.2.130, eth1:200.200.200.20) | ||
| 23 | # | ||
| 24 | # Security policies | ||
| 25 | |||
| 26 | spdadd 192.168.2.0/24 192.168.1.0/24 any -P out ipsec | ||
| 27 | esp/tunnel/200.200.200.20-200.200.200.10/require; | ||
| 28 | |||
| 29 | spdadd 192.168.1.0/24 192.168.2.0/24 any -P in ipsec | ||
| 30 | esp/tunnel/200.200.200.10-200.200.200.20/require; | ||
| 31 | |||
| 32 | # ESP SAs doing encryption using 192 bit long keys (168 + 24 parity) | ||
| 33 | # and hmac-sha1 authentication using 160 bit long keys | ||
| 34 | add 200.200.200.10 200.200.200.20 esp 0x201 -m tunnel | ||
| 35 | -E aes-cbc 0x7aeaca3f87d060a12f4a4487d5a5c3355920fae69a96c831 | ||
| 36 | -A hmac-sha1 0xe9c43acd5e8d779b6e09c87347852708ab49bdd3; | ||
| 37 | |||
| 38 | add 200.200.200.20 200.200.200.10 esp 0x301 -m tunnel | ||
| 39 | -E aes-cbc 0xf6ddb555acfd9d77b03ea3843f2653255afe8eb5573965df | ||
| 40 | -A hmac-sha1 0xea6856479330dc9c17b8f6c37e2a895363d83f21; | ||
| 41 | |||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-aes-sha256-transport b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-aes-sha256-transport new file mode 100755 index 000000000..817a8bd4e --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-aes-sha256-transport | |||
| @@ -0,0 +1,23 @@ | |||
| 1 | #!/usr/sbin/setkey -f | ||
| 2 | #I am 200.200.200.20 | ||
| 3 | |||
| 4 | flush; | ||
| 5 | spdflush; | ||
| 6 | |||
| 7 | # ESP SAs doing encryption using 192 bit long keys (168 + 24 parity) | ||
| 8 | # and hmac-sha2-256 authentication using 256 bit long keys | ||
| 9 | add 200.200.200.10 200.200.200.20 esp 0x10513 | ||
| 10 | -E aes-cbc 0x7aeaca3f87d060a12f4a4487d5a5c3355920fae69a96c831 | ||
| 11 | -A hmac-sha2-256 0x4de03bebf6beb4fdef5a67d349a09580466cc4e54503333b2a5fd34538c91198; | ||
| 12 | |||
| 13 | add 200.200.200.20 200.200.200.10 esp 0x10514 | ||
| 14 | -E aes-cbc 0xf6ddb555acfd9d77b03ea3843f2653255afe8eb5573965df | ||
| 15 | -A hmac-sha2-256 0x5e01eb780b7ecc074ca2ca4fa4a5ea2ff841c977da0ce61c49d1fe767ea5452c; | ||
| 16 | |||
| 17 | |||
| 18 | spdadd 200.200.200.20 200.200.200.10 any -P out ipsec | ||
| 19 | esp/transport//require; | ||
| 20 | |||
| 21 | spdadd 200.200.200.10 200.200.200.20 any -P in ipsec | ||
| 22 | esp/transport//require; | ||
| 23 | |||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-aes-sha256-tunnel b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-aes-sha256-tunnel new file mode 100755 index 000000000..9bca18fb6 --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-aes-sha256-tunnel | |||
| @@ -0,0 +1,42 @@ | |||
| 1 | #!/usr/sbin/setkey -f | ||
| 2 | # | ||
| 3 | # | ||
| 4 | # Example ESP Tunnel for VPN. | ||
| 5 | # | ||
| 6 | # ========= ESP ========= | ||
| 7 | # | | | ||
| 8 | # Network-A Gateway-A Gateway-B Network-B | ||
| 9 | # 192.168.1.0/24 ---- 200.200.200.10 ------ 200.200.200.20 ---- 192.168.2.0/24 | ||
| 10 | # | ||
| 11 | # ====== 83xx board A ====== ===== 83xx board B ===== | ||
| 12 | # | | | | | ||
| 13 | # eth0 eth1 eth1 eth0 | ||
| 14 | # 192.168.1.130 200.200.200.10 200.200.200.20 192.168.2.130 | ||
| 15 | # | ||
| 16 | # | ||
| 17 | # Board A setup | ||
| 18 | # | ||
| 19 | # Flush the SAD and SPD | ||
| 20 | flush; | ||
| 21 | spdflush; | ||
| 22 | |||
| 23 | # I am gateway B (eth0:192.168.2.130, eth1:200.200.200.20) | ||
| 24 | # | ||
| 25 | # Security policies | ||
| 26 | spdadd 192.168.2.0/24 192.168.1.0/24 any -P out ipsec | ||
| 27 | esp/tunnel/200.200.200.20-200.200.200.10/require; | ||
| 28 | |||
| 29 | spdadd 192.168.1.0/24 192.168.2.0/24 any -P in ipsec | ||
| 30 | esp/tunnel/200.200.200.10-200.200.200.20/require; | ||
| 31 | |||
| 32 | |||
| 33 | # ESP SAs doing encryption using 192 bit long keys (168 + 24 parity) | ||
| 34 | # and hmac-sha2-256 authentication using 256 bit long keys | ||
| 35 | add 200.200.200.10 200.200.200.20 esp 0x10513 -m tunnel | ||
| 36 | -E aes-cbc 0x7aeaca3f87d060a12f4a4487d5a5c3355920fae69a96c831 | ||
| 37 | -A hmac-sha2-256 0x4de03bebf6beb4fdef5a67d349a09580466cc4e54503333b2a5fd34538c91198; | ||
| 38 | |||
| 39 | add 200.200.200.20 200.200.200.10 esp 0x10514 -m tunnel | ||
| 40 | -E aes-cbc 0xf6ddb555acfd9d77b03ea3843f2653255afe8eb5573965df | ||
| 41 | -A hmac-sha2-256 0x5e01eb780b7ecc074ca2ca4fa4a5ea2ff841c977da0ce61c49d1fe767ea5452c; | ||
| 42 | |||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-null-null-transport b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-null-null-transport new file mode 100755 index 000000000..26dfe2e17 --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-null-null-transport | |||
| @@ -0,0 +1,23 @@ | |||
| 1 | #!/usr/sbin/setkey -f | ||
| 2 | #I am 200.200.200.20 | ||
| 3 | |||
| 4 | flush; | ||
| 5 | spdflush; | ||
| 6 | |||
| 7 | # ESP SAs doing null encryption | ||
| 8 | # and null authentication | ||
| 9 | add 200.200.200.10 200.200.200.20 esp 0x10513 | ||
| 10 | -E null | ||
| 11 | -A null; | ||
| 12 | |||
| 13 | add 200.200.200.20 200.200.200.10 esp 0x10514 | ||
| 14 | -E null | ||
| 15 | -A null; | ||
| 16 | |||
| 17 | |||
| 18 | spdadd 200.200.200.20 200.200.200.10 any -P out ipsec | ||
| 19 | esp/transport//require; | ||
| 20 | |||
| 21 | spdadd 200.200.200.10 200.200.200.20 any -P in ipsec | ||
| 22 | esp/transport//require; | ||
| 23 | |||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-null-null-tunnel b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-null-null-tunnel new file mode 100755 index 000000000..bc4f38ebd --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.conf-null-null-tunnel | |||
| @@ -0,0 +1,42 @@ | |||
| 1 | #!/usr/sbin/setkey -f | ||
| 2 | # | ||
| 3 | # | ||
| 4 | # Example ESP Tunnel for VPN. | ||
| 5 | # | ||
| 6 | # ========= ESP ========= | ||
| 7 | # | | | ||
| 8 | # Network-A Gateway-A Gateway-B Network-B | ||
| 9 | # 192.168.1.0/24 ---- 200.200.200.10 ------ 200.200.200.20 ---- 192.168.2.0/24 | ||
| 10 | # | ||
| 11 | # ====== 83xx board A ====== ===== 83xx board B ===== | ||
| 12 | # | | | | | ||
| 13 | # eth0 eth1 eth1 eth0 | ||
| 14 | # 192.168.1.130 200.200.200.10 200.200.200.20 192.168.2.130 | ||
| 15 | # | ||
| 16 | # | ||
| 17 | # Board B setup | ||
| 18 | # | ||
| 19 | # Flush the SAD and SPD | ||
| 20 | flush; | ||
| 21 | spdflush; | ||
| 22 | |||
| 23 | # I am gateway B (eth0:192.168.2.130, eth1:200.200.200.20) | ||
| 24 | # | ||
| 25 | # Security policies | ||
| 26 | spdadd 192.168.2.0/24 192.168.1.0/24 any -P out ipsec | ||
| 27 | esp/tunnel/200.200.200.20-200.200.200.10/require; | ||
| 28 | |||
| 29 | spdadd 192.168.1.0/24 192.168.2.0/24 any -P in ipsec | ||
| 30 | esp/tunnel/200.200.200.10-200.200.200.20/require; | ||
| 31 | |||
| 32 | |||
| 33 | # ESP SAs doing null encryption | ||
| 34 | # and null authentication | ||
| 35 | add 200.200.200.10 200.200.200.20 esp 0x201 -m tunnel | ||
| 36 | -E null | ||
| 37 | -A null; | ||
| 38 | |||
| 39 | add 200.200.200.20 200.200.200.10 esp 0x301 -m tunnel | ||
| 40 | -E null | ||
| 41 | -A null; | ||
| 42 | |||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.ipv4 b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.ipv4 new file mode 100755 index 000000000..67cd1b2cf --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/right.ipv4 | |||
| @@ -0,0 +1,2 @@ | |||
| 1 | set -v | ||
| 2 | route add -net 192.168.1.0 netmask 255.255.255.0 gw 200.200.200.10 | ||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/setup b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/setup new file mode 100755 index 000000000..9e6fa7fa9 --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/setup | |||
| @@ -0,0 +1,47 @@ | |||
| 1 | # setup - quick setup for left or right side of ipsec test | ||
| 2 | # see README for example use. | ||
| 3 | |||
| 4 | SCRIPT_HOME=/test_setkey/ | ||
| 5 | cd $SCRIPT_HOME | ||
| 6 | |||
| 7 | export PATH=$SCRIPT_HOME:$PATH | ||
| 8 | |||
| 9 | if [ "$1" != "left" -a "$1" != "right" ] ; then | ||
| 10 | echo "Usage: $0 side [config] [driver]" | ||
| 11 | echo " where side is either left or right." | ||
| 12 | echo " where config is either" | ||
| 13 | echo " aes-sha1-tunnel (default)" | ||
| 14 | echo " or 3des-sha1-tunnel" | ||
| 15 | echo " if driver is supplied, script does 'modprobe driver'" | ||
| 16 | exit 1 | ||
| 17 | fi | ||
| 18 | |||
| 19 | SIDE=$1 | ||
| 20 | POLICY_CFG=$SIDE.conf | ||
| 21 | DEFAULT_POLICY=aes-sha1-tunnel | ||
| 22 | |||
| 23 | if [ -n "$2" ] ; then | ||
| 24 | POLICY=$2 | ||
| 25 | else | ||
| 26 | POLICY=$DEFAULT_POLICY | ||
| 27 | fi | ||
| 28 | |||
| 29 | SETKEY_FILE=$POLICY_CFG-$POLICY | ||
| 30 | |||
| 31 | if [ ! -f $SETKEY_FILE ] ; then | ||
| 32 | echo "Missing setkey command file: $SETKEY_FILE" | ||
| 33 | exit 1 | ||
| 34 | fi | ||
| 35 | |||
| 36 | # modprobe any driver name given as last parameter | ||
| 37 | if [ -n "$3" ] ; then | ||
| 38 | modprobe $3 | ||
| 39 | fi | ||
| 40 | |||
| 41 | SETUP_CMD_FILE=./setup_$SIDE | ||
| 42 | . $SETUP_CMD_FILE | ||
| 43 | |||
| 44 | $SETKEY_FILE | ||
| 45 | |||
| 46 | setkey -D | ||
| 47 | setkey -D -P | ||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/setup_left b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/setup_left new file mode 100755 index 000000000..da7690996 --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/setup_left | |||
| @@ -0,0 +1,13 @@ | |||
| 1 | # board on left setup | ||
| 2 | set -v | ||
| 3 | ifconfig eth0 down | ||
| 4 | ifconfig eth0 hw ether 00:04:9F:11:22:33 | ||
| 5 | ifconfig eth0 192.168.1.130 netmask 255.255.255.0 | ||
| 6 | ifconfig eth0 up | ||
| 7 | ifconfig eth1 down | ||
| 8 | ifconfig eth1 hw ether 00:E0:0C:00:7D:FD | ||
| 9 | ifconfig eth1 200.200.200.10 netmask 255.255.255.0 | ||
| 10 | ifconfig eth1 up | ||
| 11 | arp -s 192.168.1.21 00:00:00:00:00:01 | ||
| 12 | route add default dev eth1 | ||
| 13 | echo 1 > /proc/sys/net/ipv4/ip_forward | ||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/setup_right b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/setup_right new file mode 100755 index 000000000..f0e333ee3 --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/setup_right | |||
| @@ -0,0 +1,13 @@ | |||
| 1 | # board on right setup | ||
| 2 | set -v | ||
| 3 | ifconfig eth0 down | ||
| 4 | ifconfig eth0 hw ether 00:E0:0C:00:01:FD | ||
| 5 | ifconfig eth0 192.168.2.130 netmask 255.255.255.0 | ||
| 6 | ifconfig eth0 up | ||
| 7 | ifconfig eth1 down | ||
| 8 | ifconfig eth1 hw ether 00:E0:0C:00:00:FD | ||
| 9 | ifconfig eth1 200.200.200.20 netmask 255.255.255.0 | ||
| 10 | ifconfig eth1 up | ||
| 11 | arp -s 192.168.2.21 00:00:00:00:00:02 | ||
| 12 | route add default dev eth1 | ||
| 13 | echo 1 > /proc/sys/net/ipv4/ip_forward | ||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/strongswan.conf b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/strongswan.conf new file mode 100644 index 000000000..1701f4abc --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/strongswan.conf | |||
| @@ -0,0 +1,19 @@ | |||
| 1 | # strongswan.conf - strongSwan configuration file | ||
| 2 | |||
| 3 | charon { | ||
| 4 | load = curl aes des sha1 sha2 md5 pem pkcs1 gmp random x509 revocation hmac xcbc stroke kernel-netlink socket-raw updown | ||
| 5 | multiple_authentication = no | ||
| 6 | } | ||
| 7 | |||
| 8 | pluto { | ||
| 9 | |||
| 10 | # plugins to load in pluto | ||
| 11 | #load = aes des sha1 md5 sha2 hmac gmp random pubkey | ||
| 12 | |||
| 13 | } | ||
| 14 | |||
| 15 | libstrongswan { | ||
| 16 | |||
| 17 | # set to no, the DH exponent size is optimized | ||
| 18 | # dh_exponent_ansi_x9_42 = no | ||
| 19 | } | ||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/strongswanCert.pem b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/strongswanCert.pem new file mode 100644 index 000000000..0865ad22e --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/strongswanCert.pem | |||
| @@ -0,0 +1,22 @@ | |||
| 1 | -----BEGIN CERTIFICATE----- | ||
| 2 | MIIDuDCCAqCgAwIBAgIBADANBgkqhkiG9w0BAQsFADBFMQswCQYDVQQGEwJDSDEZ | ||
| 3 | MBcGA1UEChMQTGludXggc3Ryb25nU3dhbjEbMBkGA1UEAxMSc3Ryb25nU3dhbiBS | ||
| 4 | b290IENBMB4XDTA0MDkxMDEwMDExOFoXDTE5MDkwNzEwMDExOFowRTELMAkGA1UE | ||
| 5 | BhMCQ0gxGTAXBgNVBAoTEExpbnV4IHN0cm9uZ1N3YW4xGzAZBgNVBAMTEnN0cm9u | ||
| 6 | Z1N3YW4gUm9vdCBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL/y | ||
| 7 | X2LqPVZuWLPIeknK86xhz6ljd3NNhC2z+P1uoCP3sBMuZiZQEjFzhnKcbXxCeo2f | ||
| 8 | FnvhOOjrrisSuVkzuu82oxXD3fIkzuS7m9V4E10EZzgmKWIf+WuNRfbgAuUINmLc | ||
| 9 | 4YGAXBQLPyzpP4Ou48hhz/YQo58Bics6PHy5v34qCVROIXDvqhj91P8g+pS+F21/ | ||
| 10 | 7P+CH2jRcVIEHZtG8M/PweTPQ95dPzpYd2Ov6SZ/U7EWmbMmT8VcUYn1aChxFmy5 | ||
| 11 | gweVBWlkH6MP+1DeE0/tL5c87xo5KCeGK8Tdqpe7sBRC4pPEEHDQciTUvkeuJ1Pr | ||
| 12 | K+1LwdqRxo7HgMRiDw8CAwEAAaOBsjCBrzASBgNVHRMBAf8ECDAGAQH/AgEBMAsG | ||
| 13 | A1UdDwQEAwIBBjAdBgNVHQ4EFgQUXafdcAZRMn7ntm2zteXgYOouTe8wbQYDVR0j | ||
| 14 | BGYwZIAUXafdcAZRMn7ntm2zteXgYOouTe+hSaRHMEUxCzAJBgNVBAYTAkNIMRkw | ||
| 15 | FwYDVQQKExBMaW51eCBzdHJvbmdTd2FuMRswGQYDVQQDExJzdHJvbmdTd2FuIFJv | ||
| 16 | b3QgQ0GCAQAwDQYJKoZIhvcNAQELBQADggEBACOSmqEBtBLR9aV3UyCI8gmzR5in | ||
| 17 | Lte9aUXXS+qis6F2h2Stf4sN+Nl6Gj7REC6SpfEH4wWdwiUL5J0CJhyoOjQuDl3n | ||
| 18 | 1Dw3dE4/zqMZdyDKEYTU75TmvusNJBdGsLkrf7EATAjoi/nrTOYPPhSUZvPp/D+Y | ||
| 19 | vORJ9Ej51GXlK1nwEB5iA8+tDYniNQn6BD1MEgIejzK+fbiy7braZB1kqhoEr2Si | ||
| 20 | 7luBSnU912sw494E88a2EWbmMvg2TVHPNzCpVkpNk7kifCiwmw9VldkqYy9y/lCa | ||
| 21 | Epyp7lTfKw7cbD04Vk8QJW782L6Csuxkl346b17wmOqn8AZips3tFsuAY3w= | ||
| 22 | -----END CERTIFICATE----- | ||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/strongswan_left b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/strongswan_left new file mode 100755 index 000000000..e55c3e427 --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/strongswan_left | |||
| @@ -0,0 +1,10 @@ | |||
| 1 | #strongswan on left board | ||
| 2 | set -v | ||
| 3 | cp -rf ipsec.conf.left /etc/ipsec.conf | ||
| 4 | cp -rf ipsec.secrets.left /etc/ipsec.secrets | ||
| 5 | cp -rf strongswan.conf /etc/ | ||
| 6 | cp -rf strongswanCert.pem /etc/ipsec.d/cacerts/ | ||
| 7 | cp -rf moonCert.pem /etc/ipsec.d/certs/ | ||
| 8 | mkdir /etc/ipsec.d/private | ||
| 9 | cp -rf sunKey.pem /etc/ipsec.d/private/ | ||
| 10 | cp -rf moonKey.pem /etc/ipsec.d/private/ | ||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/strongswan_right b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/strongswan_right new file mode 100755 index 000000000..bcdbb7311 --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/strongswan_right | |||
| @@ -0,0 +1,10 @@ | |||
| 1 | #strongswan on left board | ||
| 2 | set -v | ||
| 3 | cp -rf ipsec.conf.right /etc/ipsec.conf | ||
| 4 | cp -rf ipsec.secrets.right /etc/ipsec.secrets | ||
| 5 | cp -rf strongswan.conf /etc/ | ||
| 6 | cp -rf strongswanCert.pem /etc/ipsec.d/cacerts/ | ||
| 7 | cp -rf sunCert.pem /etc/ipsec.d/certs/ | ||
| 8 | mkdir /etc/ipsec.d/private | ||
| 9 | cp -rf sunKey.pem /etc/ipsec.d/private/ | ||
| 10 | cp -rf moonKey.pem /etc/ipsec.d/private/ | ||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/sunCert.pem b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/sunCert.pem new file mode 100644 index 000000000..d0937bab8 --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/sunCert.pem | |||
| @@ -0,0 +1,25 @@ | |||
| 1 | -----BEGIN CERTIFICATE----- | ||
| 2 | MIIEIDCCAwigAwIBAgIBFjANBgkqhkiG9w0BAQsFADBFMQswCQYDVQQGEwJDSDEZ | ||
| 3 | MBcGA1UEChMQTGludXggc3Ryb25nU3dhbjEbMBkGA1UEAxMSc3Ryb25nU3dhbiBS | ||
| 4 | b290IENBMB4XDTA5MDgyNzA5NTkwNFoXDTE0MDgyNjA5NTkwNFowRTELMAkGA1UE | ||
| 5 | BhMCQ0gxGTAXBgNVBAoTEExpbnV4IHN0cm9uZ1N3YW4xGzAZBgNVBAMTEnN1bi5z | ||
| 6 | dHJvbmdzd2FuLm9yZzCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAN+V | ||
| 7 | VIpn6Q5jaU//EN6p6A5cSfUfhBK0mFa2laFFZh/Y0h66AXqqrQ3X917h7YNsSk68 | ||
| 8 | oowY9h9I3gOx7hNVBsJr2VjdYC+b0q5NTha09/A5mimv/prYj6o0yawxoPjoDs9Y | ||
| 9 | h7D7Kf+F8fkgk0stlHJZX66J7dNrFXbg1xBld+Ep5Or2FbEZ9QWUpRQTuhdpNt/4 | ||
| 10 | 9YuxQ59DemY9IRbwsrKCHH0mGrJsDdqeb0ap+8QvSXHjCt1fr9MNKWaAFAQLKQI4 | ||
| 11 | e0da1ntPCEQLeE833+NNRBgGufk0KqGT3eAXqrxa9AEIUJnVcPexQdqUMjcUpXFb | ||
| 12 | 8WNzRWB8Egh3BDK6FsECAwEAAaOCARkwggEVMAkGA1UdEwQCMAAwCwYDVR0PBAQD | ||
| 13 | AgOoMB0GA1UdDgQWBBRW1p4v2qihzRlcI1PnxbZwluML+zBtBgNVHSMEZjBkgBRd | ||
| 14 | p91wBlEyfue2bbO15eBg6i5N76FJpEcwRTELMAkGA1UEBhMCQ0gxGTAXBgNVBAoT | ||
| 15 | EExpbnV4IHN0cm9uZ1N3YW4xGzAZBgNVBAMTEnN0cm9uZ1N3YW4gUm9vdCBDQYIB | ||
| 16 | ADAdBgNVHREEFjAUghJzdW4uc3Ryb25nc3dhbi5vcmcwEwYDVR0lBAwwCgYIKwYB | ||
| 17 | BQUHAwEwOQYDVR0fBDIwMDAuoCygKoYoaHR0cDovL2NybC5zdHJvbmdzd2FuLm9y | ||
| 18 | Zy9zdHJvbmdzd2FuLmNybDANBgkqhkiG9w0BAQsFAAOCAQEAo37LYT9Awx0MK/nA | ||
| 19 | FZpPJqUr0Ey+O5Ukcsdx7nd00SlmpiQRY8KmuRXCBQnDEgdLstd3slQjT0pJEgWF | ||
| 20 | 0pzxybnI6eOzYAhLfhart+X1hURiNGbXjggm2s4I5+K32bVIkNEqlsYnd/6F9oo5 | ||
| 21 | ZNO0/eTTruLZfkNe/zchBGKe/Z7MacVwlYWWCbMtBV4K1d5dGcRRgpQ9WivDlmat | ||
| 22 | Nh9wlscDSgSGk3HJkbxnq695VN7zUbDWAUvWWhV5bIDjlAR/xyT9ApqIxiyVVRul | ||
| 23 | fYrE7U05Hbt6GgAroAKLp6qJup9+TxQAKSjKIwJ0hf7OuYyQ8TZtVHS7AOhm+T/5 | ||
| 24 | G/jGGA== | ||
| 25 | -----END CERTIFICATE----- | ||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/sunKey.pem b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/sunKey.pem new file mode 100644 index 000000000..d8fad9aad --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo/test_setkey/sunKey.pem | |||
| @@ -0,0 +1,27 @@ | |||
| 1 | -----BEGIN RSA PRIVATE KEY----- | ||
| 2 | MIIEpAIBAAKCAQEA35VUimfpDmNpT/8Q3qnoDlxJ9R+EErSYVraVoUVmH9jSHroB | ||
| 3 | eqqtDdf3XuHtg2xKTryijBj2H0jeA7HuE1UGwmvZWN1gL5vSrk1OFrT38DmaKa/+ | ||
| 4 | mtiPqjTJrDGg+OgOz1iHsPsp/4Xx+SCTSy2Ucllfront02sVduDXEGV34Snk6vYV | ||
| 5 | sRn1BZSlFBO6F2k23/j1i7FDn0N6Zj0hFvCysoIcfSYasmwN2p5vRqn7xC9JceMK | ||
| 6 | 3V+v0w0pZoAUBAspAjh7R1rWe08IRAt4Tzff401EGAa5+TQqoZPd4BeqvFr0AQhQ | ||
| 7 | mdVw97FB2pQyNxSlcVvxY3NFYHwSCHcEMroWwQIDAQABAoIBADH51hjN2zk9HVgl | ||
| 8 | QmcTAWzcUie5cLMhrP+M9mtC8O3jcCwwFY6OwfnbMU8DHy0GMqHg5lB8b99UUVPw | ||
| 9 | HLAzjDw/ESkc6pgZs4EEhJTsxJLsvTnePgHssEgyXnXf7gRVEqJkPohfy+Zy0UCH | ||
| 10 | eIUQXiMlOQ7xg7iDMhwNa+UdWSt539DztSKilQn2xdPZjFnMT0/prvl4NA/8Zn54 | ||
| 11 | /SdWDq5yRdLWb6EK1V7yJ3687GXR1jzGtgy7TXuncUJVTYgX7RdP1Tn6gWD8YAQ/ | ||
| 12 | RfT0DdWYm4WHSgSb9/NW8lBZH2yy3hg+lNgofXEvTfBkO5QyW31LIr0tCV6zhJIc | ||
| 13 | Y9MxaKUCgYEA9sktaXfhPLe0ECjdeQEOq5EKuDrCviSKCOuAV4BDSOsdw6+5LWfY | ||
| 14 | Vb/oke8N70lL3RCblcj1pOKWUi2O/SpEJdDRduiw2gM9cXt3/bChSTHC4TsIxxN/ | ||
| 15 | Db9OGg72kZ4sRY5Au+zyAAQYBwXhFWux194Jk5qK0JblNG9J5QMqZDcCgYEA5+5h | ||
| 16 | BgHUMEO+pdME5lAiSc5PcNTejpA6j+OikCh4/HFXy3C/dLx+Cs1+egw64c8iVaIv | ||
| 17 | NEo7n7E9I0e3XqanPRXhMnBRrP+39OVsWPmZ18Li2Hi84KwJyi8Y11l3XJOqaYpF | ||
| 18 | wMVUuZpxR0dfG5k/5GwT/tEkmQBglOgG3m2zUMcCgYEA4m3Vd9ahV5dp5AXKpzKc | ||
| 19 | JjiPMFfhxJo7+FEz0ZUCp03qYljBu/Jy4MKS/grrqyiCLdQGHNlk4SNxLvdUId78 | ||
| 20 | 5gGBnuuDEJU2dAAIKUE9yq2YlBUZSacOxStI2snt28/X6P3LUWHm7LLU5OS1D3Vf | ||
| 21 | mKPF/6MlSJuas5CEqVZNN+MCgYBH9Qh7IaQgmVQUBKVXg3Mv7OduvUyTdKIGtHxi | ||
| 22 | N3xZ7hxsDP4JjNWaKmlcGmFGX8pqQRheI83d3NJ4GK8GmbP3Wst0p65fezMqsudr | ||
| 23 | r30QmPFicgs/tYCQDw6o+aPzwAi2F+VOSqrfrtAIaldSq7hL+VA21dKB+cD9UgOX | ||
| 24 | jPd+TwKBgQCbKeg2QNS2qhPIG9eaqJDROuxmxb/07d7OBctgMgxVvKhqW9hW42Sy | ||
| 25 | gJ59fyz5QjFBaSfcOdf4gkKyEawVo45/q6ymIQU37R4vF4CW9Z3CfaIbwJp7LcHV | ||
| 26 | zH07so/HNsZua6GWCSCLJU5MeCRiZzk2RFiS9KIaLP4gZndv4lXOiQ== | ||
| 27 | -----END RSA PRIVATE KEY----- | ||
diff --git a/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo_0.1.bb b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo_0.1.bb new file mode 100644 index 000000000..f29c375a3 --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-connectivity/ipsec-demo/ipsec-demo_0.1.bb | |||
| @@ -0,0 +1,23 @@ | |||
| 1 | SUMMARY = "Scripts and configuration files for ipsec demo" | ||
| 2 | LICENSE = "MIT" | ||
| 3 | LIC_FILES_CHKSUM = "file://${COREBASE}/meta/COPYING.MIT;md5=3da9cfbcb788c80a0384361b4de20420" | ||
| 4 | |||
| 5 | RDEPENDS_${PN} = "ipsec-tools bash" | ||
| 6 | |||
| 7 | inherit allarch | ||
| 8 | |||
| 9 | SRC_URI = "file://test_setkey" | ||
| 10 | |||
| 11 | S = "${WORKDIR}" | ||
| 12 | |||
| 13 | do_configure[noexec] = "1" | ||
| 14 | do_compile[noexec] = "1" | ||
| 15 | |||
| 16 | do_install(){ | ||
| 17 | install -d ${D}${datadir} | ||
| 18 | cp -a ${WORKDIR}/test_setkey ${D}${datadir}/ | ||
| 19 | chown -R root:root ${D}${datadir}/test_setkey | ||
| 20 | } | ||
| 21 | |||
| 22 | FILES_${PN} = "${datadir}/*" | ||
| 23 | COMPATIBLE_MACHINE = "(qoriq)" | ||
diff --git a/dynamic-layers/networking-layer/recipes-kernel/asf/asf_git.bb b/dynamic-layers/networking-layer/recipes-kernel/asf/asf_git.bb new file mode 100644 index 000000000..34308e2dc --- /dev/null +++ b/dynamic-layers/networking-layer/recipes-kernel/asf/asf_git.bb | |||
| @@ -0,0 +1,37 @@ | |||
| 1 | DESCRIPTION = "Non-DPAA software Application Specific Fast-path" | ||
| 2 | SECTION = "asf" | ||
| 3 | LICENSE = "GPLv2 & GPLv2+ & BSD" | ||
| 4 | LIC_FILES_CHKSUM = "file://COPYING;md5=b5881ecf398da8a03a3f4c501e29d287" | ||
| 5 | |||
| 6 | SRC_URI = "git://git.freescale.com/ppc/sdk/asf.git;branch=sdk-v1.9.x" | ||
| 7 | SRCREV = "9580a629d3aec3ab3c5e152c6693846b96787906" | ||
| 8 | |||
| 9 | RDEPENDS_${PN} += "ipsec-tools" | ||
| 10 | |||
| 11 | inherit module qoriq_build_64bit_kernel | ||
| 12 | |||
| 13 | S = "${WORKDIR}/git/asfmodule" | ||
| 14 | |||
| 15 | EXTRA_OEMAKE = "CROSS_COMPILE=${TARGET_PREFIX}" | ||
| 16 | export KERNEL_PATH = "${STAGING_KERNEL_DIR}" | ||
| 17 | |||
| 18 | INHIBIT_PACKAGE_STRIP = "1" | ||
| 19 | |||
| 20 | do_configure[depends] += "virtual/kernel:do_shared_workdir" | ||
| 21 | do_configure_prepend () { | ||
| 22 | find ${S} -name Makefile -exec \ | ||
| 23 | sed -i 's,$(KERNEL_PATH)/.config,$(KBUILD_OUTPUT)/.config,' {} \; | ||
| 24 | } | ||
| 25 | |||
| 26 | do_install(){ | ||
| 27 | install -d ${D}/${libexecdir} | ||
| 28 | install -d ${D}/lib/modules/${KERNEL_VERSION}/asf | ||
| 29 | cp -rf ${S}/bin/full ${D}/lib/modules/${KERNEL_VERSION}/asf | ||
| 30 | cp -rf ${S}/bin/min ${D}/lib/modules/${KERNEL_VERSION}/asf | ||
| 31 | cp -rf ${S}/../scripts ${D}/${libexecdir}/ | ||
| 32 | find ${D}/lib -depth -type d -exec rmdir --ignore-fail-on-non-empty {} \; | ||
| 33 | } | ||
| 34 | |||
| 35 | FILES_${PN} += "${libexecdir}" | ||
| 36 | |||
| 37 | COMPATIBLE_MACHINE = "(qoriq)" | ||
diff --git a/dynamic-layers/openembedded-layer/recipes-dpaa/fmc/fmc_git.bb b/dynamic-layers/openembedded-layer/recipes-dpaa/fmc/fmc_git.bb new file mode 100644 index 000000000..d54b84543 --- /dev/null +++ b/dynamic-layers/openembedded-layer/recipes-dpaa/fmc/fmc_git.bb | |||
| @@ -0,0 +1,52 @@ | |||
| 1 | DESCRIPTION = "Frame Manager Configuration tool" | ||
| 2 | SECTION = "fmc" | ||
| 3 | LICENSE = "MIT" | ||
| 4 | LIC_FILES_CHKSUM = "file://COPYING;md5=a504ab5a8ff235e67c7301214749346c" | ||
| 5 | |||
| 6 | PR = "r2" | ||
| 7 | |||
| 8 | SRC_URI = "git://git.freescale.com/ppc/sdk/fmc.git;branch=sdk-v1.9.x" | ||
| 9 | SRCREV = "a079d2c844edd85dff85a317a63198e7988bcd09" | ||
| 10 | |||
| 11 | DEPENDS = "libxml2 fmlib tclap" | ||
| 12 | |||
| 13 | PACKAGE_ARCH = "${MACHINE_ARCH}" | ||
| 14 | COMPATIBLE_HOST_qoriq-ppc = ".*" | ||
| 15 | COMPATIBLE_HOST ?= "(none)" | ||
| 16 | |||
| 17 | S = "${WORKDIR}/git" | ||
| 18 | |||
| 19 | EXTRA_OEMAKE = 'FMD_USPACE_HEADER_PATH="${STAGING_INCDIR}/fmd" \ | ||
| 20 | FMD_USPACE_LIB_PATH="${STAGING_LIBDIR}" LIBXML2_HEADER_PATH="${STAGING_INCDIR}/libxml2" \ | ||
| 21 | TCLAP_HEADER_PATH="${STAGING_INCDIR}" ' | ||
| 22 | EXTRA_OEMAKE_virtclass-native = 'FMCHOSTMODE=1 FMD_USPACE_HEADER_PATH="${STAGING_INCDIR}/fmd" \ | ||
| 23 | FMD_USPACE_LIB_PATH="${STAGING_LIBDIR}" LIBXML2_HEADER_PATH="${STAGING_INCDIR}/libxml2" \ | ||
| 24 | TCLAP_HEADER_PATH="${STAGING_INCDIR}" ' | ||
| 25 | |||
| 26 | PARALLEL_MAKE = "" | ||
| 27 | |||
| 28 | EXTRA_OEMAKE_PLATFORM ?= "" | ||
| 29 | EXTRA_OEMAKE_PLATFORM_b4 = "b4860qds" | ||
| 30 | EXTRA_OEMAKE_PLATFORM_t2 = "b4860qds" | ||
| 31 | EXTRA_OEMAKE_PLATFORM_t4 = "b4860qds" | ||
| 32 | EXTRA_OEMAKE_PLATFORM_t1 = "t1040qds" | ||
| 33 | |||
| 34 | do_compile () { | ||
| 35 | oe_runmake MACHINE=${EXTRA_OEMAKE_PLATFORM} -C source | ||
| 36 | } | ||
| 37 | |||
| 38 | do_install () { | ||
| 39 | install -d ${D}/${bindir} | ||
| 40 | install -m 755 ${S}/source/fmc ${D}/${bindir}/fmc | ||
| 41 | |||
| 42 | install -d ${D}/etc/fmc/config | ||
| 43 | install -m 644 ${S}/etc/fmc/config/hxs_pdl_v3.xml ${D}/etc/fmc/config | ||
| 44 | |||
| 45 | install -d ${D}/${includedir}/fmc | ||
| 46 | install ${S}/source/fmc.h ${D}/${includedir}/fmc | ||
| 47 | |||
| 48 | install -d ${D}/${libdir} | ||
| 49 | install ${S}/source/libfmc.a ${D}/${libdir} | ||
| 50 | } | ||
| 51 | |||
| 52 | BBCLASSEXTEND = "native" | ||
diff --git a/dynamic-layers/openembedded-layer/recipes-dpaa/usdpaa-apps/usdpaa-apps/fix-the-inline-function-definition-with-gcc-5.x.patch b/dynamic-layers/openembedded-layer/recipes-dpaa/usdpaa-apps/usdpaa-apps/fix-the-inline-function-definition-with-gcc-5.x.patch new file mode 100644 index 000000000..9f3d22cc5 --- /dev/null +++ b/dynamic-layers/openembedded-layer/recipes-dpaa/usdpaa-apps/usdpaa-apps/fix-the-inline-function-definition-with-gcc-5.x.patch | |||
| @@ -0,0 +1,80 @@ | |||
| 1 | From 2b308217d2811e5d1420d7ce6e18f77a992f52e9 Mon Sep 17 00:00:00 2001 | ||
| 2 | From: Ting Liu <ting.liu@freescale.com> | ||
| 3 | Date: Tue, 22 Dec 2015 13:16:33 +0800 | ||
| 4 | Subject: [PATCH] fix the inline function definition with gcc 5.x | ||
| 5 | |||
| 6 | There are different semantics for inline functions for gcc-5.x compared to | ||
| 7 | previous gcc. Fix the following build error: | ||
| 8 | | dpa_classif_demo.c:(.text+0xeae): undefined reference to `crc64_hash_function' | ||
| 9 | | simple_crypto.c:(.text+0x5b8e): undefined reference to `get_num_of_buffers' | ||
| 10 | | simple_crypto.c:(.text+0x5b9a): undefined reference to `get_test_mode' | ||
| 11 | | simple_crypto.c:(.text+0x5baa): undefined reference to `get_num_of_cpus' | ||
| 12 | | simple_crypto.c:(.text+0x5bb2): undefined reference to `requires_authentication' | ||
| 13 | | simple_crypto.c:(.text+0x5bbe): undefined reference to `get_thread_barrier' | ||
| 14 | |||
| 15 | Upstream-Status: Pending | ||
| 16 | |||
| 17 | Signed-off-by: Ting Liu <ting.liu@freescale.com> | ||
| 18 | --- | ||
| 19 | lib/hash_table/fman_crc64_hash_func.h | 2 +- | ||
| 20 | src/simple_crypto/include/simple_crypto.h | 10 +++++----- | ||
| 21 | src/simple_proto/include/simple_proto.h | 10 +++++----- | ||
| 22 | 3 files changed, 11 insertions(+), 11 deletions(-) | ||
| 23 | |||
| 24 | diff --git a/lib/hash_table/fman_crc64_hash_func.h b/lib/hash_table/fman_crc64_hash_func.h | ||
| 25 | index 5095203..bdcf12b 100644 | ||
| 26 | --- a/lib/hash_table/fman_crc64_hash_func.h | ||
| 27 | +++ b/lib/hash_table/fman_crc64_hash_func.h | ||
| 28 | @@ -36,7 +36,7 @@ | ||
| 29 | #include <fsl_fman.h> | ||
| 30 | |||
| 31 | /* Hash function used by the hash table based on FMan CRC64 */ | ||
| 32 | -inline uint32_t crc64_hash_function(uint8_t *key, uint32_t size) | ||
| 33 | +static inline uint32_t crc64_hash_function(uint8_t *key, uint32_t size) | ||
| 34 | { | ||
| 35 | uint64_t hashval = 0; | ||
| 36 | hashval = fman_crc64_init(); | ||
| 37 | diff --git a/src/simple_crypto/include/simple_crypto.h b/src/simple_crypto/include/simple_crypto.h | ||
| 38 | index bae3460..46ea176 100644 | ||
| 39 | --- a/src/simple_crypto/include/simple_crypto.h | ||
| 40 | +++ b/src/simple_crypto/include/simple_crypto.h | ||
| 41 | @@ -123,10 +123,10 @@ static int validate_test_set(struct test_param crypto_info); | ||
| 42 | void set_crypto_cbs(struct test_cb *crypto_cb, struct test_param crypto_info); | ||
| 43 | inline int get_num_of_iterations(void *stuff); | ||
| 44 | void set_num_of_iterations(void *stuff, unsigned int itr_num); | ||
| 45 | -inline int get_num_of_buffers(void *stuff); | ||
| 46 | -inline enum test_mode get_test_mode(void *stuff); | ||
| 47 | -inline uint8_t requires_authentication(void *); | ||
| 48 | -inline long get_num_of_cpus(void); | ||
| 49 | -inline pthread_barrier_t *get_thread_barrier(void); | ||
| 50 | +static inline int get_num_of_buffers(void *stuff); | ||
| 51 | +static inline enum test_mode get_test_mode(void *stuff); | ||
| 52 | +static inline uint8_t requires_authentication(void *); | ||
| 53 | +static inline long get_num_of_cpus(void); | ||
| 54 | +static inline pthread_barrier_t *get_thread_barrier(void); | ||
| 55 | |||
| 56 | #endif /* __SIMPLE_CRYPTO_H */ | ||
| 57 | diff --git a/src/simple_proto/include/simple_proto.h b/src/simple_proto/include/simple_proto.h | ||
| 58 | index d413e70..ce0e842 100644 | ||
| 59 | --- a/src/simple_proto/include/simple_proto.h | ||
| 60 | +++ b/src/simple_proto/include/simple_proto.h | ||
| 61 | @@ -83,11 +83,11 @@ struct protocol_info *(*register_protocol[])(void) = { | ||
| 62 | static void set_crypto_cbs(struct test_cb *crypto_cb); | ||
| 63 | int get_num_of_iterations(void *params); | ||
| 64 | void set_num_of_iterations(void *params, unsigned int itr_num); | ||
| 65 | -inline int get_num_of_buffers(void *params); | ||
| 66 | -inline enum test_mode get_test_mode(void *params); | ||
| 67 | -inline uint8_t requires_authentication(void *); | ||
| 68 | -inline long get_num_of_cpus(void); | ||
| 69 | -inline pthread_barrier_t *get_thread_barrier(void); | ||
| 70 | +static inline int get_num_of_buffers(void *params); | ||
| 71 | +static inline enum test_mode get_test_mode(void *params); | ||
| 72 | +static inline uint8_t requires_authentication(void *); | ||
| 73 | +static inline long get_num_of_cpus(void); | ||
| 74 | +static inline pthread_barrier_t *get_thread_barrier(void); | ||
| 75 | int register_modules(void); | ||
| 76 | void unregister_modules(void); | ||
| 77 | |||
| 78 | -- | ||
| 79 | 1.9.2 | ||
| 80 | |||
diff --git a/dynamic-layers/openembedded-layer/recipes-dpaa/usdpaa-apps/usdpaa-apps/xfrm_km.c-use-in6_-macros-from-glibc-instead-of-kern.patch b/dynamic-layers/openembedded-layer/recipes-dpaa/usdpaa-apps/usdpaa-apps/xfrm_km.c-use-in6_-macros-from-glibc-instead-of-kern.patch new file mode 100644 index 000000000..c6d35f008 --- /dev/null +++ b/dynamic-layers/openembedded-layer/recipes-dpaa/usdpaa-apps/usdpaa-apps/xfrm_km.c-use-in6_-macros-from-glibc-instead-of-kern.patch | |||
| @@ -0,0 +1,49 @@ | |||
| 1 | From 1e1e8d74db98faed57a5a62788e1226801661e0e Mon Sep 17 00:00:00 2001 | ||
| 2 | From: Ting Liu <ting.liu@freescale.com> | ||
| 3 | Date: Tue, 22 Dec 2015 23:37:49 +0800 | ||
| 4 | Subject: [PATCH] xfrm_km.c: use in6_* macros from glibc instead of kernel | ||
| 5 | |||
| 6 | Both glibc and the kernel have in6_* macros definition. Use the one from glibc. | ||
| 7 | Kernel headers will check for previous libc definitions by including | ||
| 8 | include/linux/libc-compat.h. | ||
| 9 | |||
| 10 | Fix the below build error: | ||
| 11 | | [CC] xfrm_km.c (bin:srio_ipsec_offload) | ||
| 12 | | In file included from .../tmp/sysroots/b4860qds-64b/usr/include/linux/xfrm.h:4:0, | ||
| 13 | | from src/srio_ipsec_offload/xfrm_km.c:46: | ||
| 14 | | .../usr/include/netinet/in.h:99:5: error: expected identifier before numeric constant | ||
| 15 | | IPPROTO_HOPOPTS = 0, /* IPv6 Hop-by-Hop options. */ | ||
| 16 | | ^ | ||
| 17 | | In file included from .../tmp/sysroots/b4860qds-64b/usr/include/netinet/ip.h:24:0, | ||
| 18 | | from src/srio_ipsec_offload/xfrm_km.c:52: | ||
| 19 | | .../tmp/sysroots/b4860qds-64b/usr/include/netinet/in.h:209:8: error: redefinition of 'struct in6_addr' | ||
| 20 | | struct in6_addr | ||
| 21 | | ^ | ||
| 22 | | In file included from .../tmp/sysroots/b4860qds-64b/usr/include/linux/xfrm.h:4:0, | ||
| 23 | | from src/srio_ipsec_offload/xfrm_km.c:46: | ||
| 24 | | .../tmp/sysroots/b4860qds-64b/usr/include/linux/in6.h:32:8: note: originally defined here | ||
| 25 | | struct in6_addr { | ||
| 26 | | ^ | ||
| 27 | |||
| 28 | Upstream-Status: Pending | ||
| 29 | |||
| 30 | Signed-off-by: Ting Liu <ting.liu@freescale.com> | ||
| 31 | --- | ||
| 32 | src/srio_ipsec_offload/xfrm_km.c | 1 + | ||
| 33 | 1 file changed, 1 insertion(+) | ||
| 34 | |||
| 35 | diff --git a/src/srio_ipsec_offload/xfrm_km.c b/src/srio_ipsec_offload/xfrm_km.c | ||
| 36 | index df23fd1..d69aafa 100644 | ||
| 37 | --- a/src/srio_ipsec_offload/xfrm_km.c | ||
| 38 | +++ b/src/srio_ipsec_offload/xfrm_km.c | ||
| 39 | @@ -42,6 +42,7 @@ | ||
| 40 | #include <linux/types.h> | ||
| 41 | #include <sys/socket.h> | ||
| 42 | #include <sys/ioctl.h> | ||
| 43 | +#include <netinet/in.h> | ||
| 44 | #include <linux/netlink.h> | ||
| 45 | #include <linux/xfrm.h> | ||
| 46 | #include <sched.h> | ||
| 47 | -- | ||
| 48 | 1.9.2 | ||
| 49 | |||
diff --git a/dynamic-layers/openembedded-layer/recipes-dpaa/usdpaa-apps/usdpaa-apps_git.bb b/dynamic-layers/openembedded-layer/recipes-dpaa/usdpaa-apps/usdpaa-apps_git.bb new file mode 100644 index 000000000..1a19d1e84 --- /dev/null +++ b/dynamic-layers/openembedded-layer/recipes-dpaa/usdpaa-apps/usdpaa-apps_git.bb | |||
| @@ -0,0 +1,68 @@ | |||
| 1 | DESCRIPTION = "User-Space Data-Path Acceleration Architecture Demo Applications" | ||
| 2 | LICENSE = "BSD & GPLv2" | ||
| 3 | LIC_FILES_CHKSUM = "file://Makefile;endline=30;md5=d2a5d894118910d49993347f3f6e0f1e" | ||
| 4 | |||
| 5 | inherit pkgconfig | ||
| 6 | |||
| 7 | PACKAGE_ARCH = "${MACHINE_ARCH}" | ||
| 8 | |||
| 9 | DEPENDS = "libxml2 libedit ncurses readline fmc usdpaa dpa-offload libnl" | ||
| 10 | DEPENDS_append_b4860qds = " ipc-ust" | ||
| 11 | DEPENDS_append_b4420qds = " ipc-ust" | ||
| 12 | |||
| 13 | RDEPENDS_${PN} = "libgcc bash" | ||
| 14 | RDEPENDS_${PN}_append_b4860qds = " ipc-ust" | ||
| 15 | RDEPENDS_${PN}_append_b4420qds = " ipc-ust" | ||
| 16 | |||
| 17 | SRC_URI = "git://git.freescale.com/ppc/sdk/usdpaa/usdpaa-apps.git;branch=sdk-v1.9.x \ | ||
| 18 | file://fix-the-inline-function-definition-with-gcc-5.x.patch \ | ||
| 19 | file://xfrm_km.c-use-in6_-macros-from-glibc-instead-of-kern.patch \ | ||
| 20 | " | ||
| 21 | SRCREV = "1d9418af04990289bec72cd43a9385690523fcdb" | ||
| 22 | |||
| 23 | S = "${WORKDIR}/git" | ||
| 24 | |||
| 25 | EXTRA_OEMAKE = 'CC="${CC}" LD="${LD}" AR="${AR}"' | ||
| 26 | export ARCH="${TARGET_ARCH}" | ||
| 27 | |||
| 28 | SOC ?= "P4080" | ||
| 29 | SOC_b4 = "B4860" | ||
| 30 | SOC_t1 = "T1040" | ||
| 31 | SOC_t2 = "T2080" | ||
| 32 | SOC_t4 = "T4240" | ||
| 33 | SOC_p1023rdb = "P1023" | ||
| 34 | |||
| 35 | FMAN_VARIANT ?= "P4080" | ||
| 36 | FMAN_VARIANT_b4 = "FMAN_V3H" | ||
| 37 | FMAN_VARIANT_t1 = "FMAN_V3L" | ||
| 38 | FMAN_VARIANT_t2 = "FMAN_V3H" | ||
| 39 | FMAN_VARIANT_t4 = "FMAN_V3H" | ||
| 40 | FMAN_VARIANT_p1023rdb = "P1023" | ||
| 41 | |||
| 42 | do_compile_prepend () { | ||
| 43 | export SOC=${SOC} | ||
| 44 | export FMC_EXTRA_CFLAGS="-I ${STAGING_INCDIR}/fmc" | ||
| 45 | export FMLIB_EXTRA_CFLAGS="-I ${STAGING_INCDIR}/fmd \ | ||
| 46 | -I ${STAGING_INCDIR}/fmd/Peripherals \ | ||
| 47 | -I ${STAGING_INCDIR}/fmd/integrations \ | ||
| 48 | -D${FMAN_VARIANT}" | ||
| 49 | export USDPAA_EXTRA_CFLAGS="-I ${STAGING_INCDIR}/usdpaa" | ||
| 50 | export DPAOFFLOAD_EXTRA_CFLAGS="-I ${STAGING_INCDIR}/dpa-offload" | ||
| 51 | export LIBNL_EXTRA_CFLAGS="-I ${STAGING_INCDIR}/libnl3" | ||
| 52 | export LIBNL_EXTRA_LDFLAGS="-lnl-3 -lnl-route-3" | ||
| 53 | export LIBXML2_CFLAGS="`pkg-config --cflags libxml-2.0`" | ||
| 54 | export LIBXML2_LDFLAGS="`pkg-config --libs --static libxml-2.0`" | ||
| 55 | export LIBEDIT_CFLAGS="`pkg-config --cflags libedit`" | ||
| 56 | export LIBEDIT_LDFLAGS="`pkg-config --libs --static libedit`" | ||
| 57 | } | ||
| 58 | |||
| 59 | do_install () { | ||
| 60 | export SOC=${SOC} | ||
| 61 | oe_runmake install DESTDIR=${D} | ||
| 62 | } | ||
| 63 | |||
| 64 | PARALLEL_MAKE_pn-${PN} = "" | ||
| 65 | FILES_${PN} += "/root/SOURCE_THIS /usr/etc/" | ||
| 66 | |||
| 67 | COMPATIBLE_HOST_qoriq-ppc = ".*" | ||
| 68 | COMPATIBLE_HOST ?= "(none)" | ||
diff --git a/dynamic-layers/openembedded-layer/recipes-support/web-sysmon/web-sysmon_git.bb b/dynamic-layers/openembedded-layer/recipes-support/web-sysmon/web-sysmon_git.bb new file mode 100644 index 000000000..36a0c209f --- /dev/null +++ b/dynamic-layers/openembedded-layer/recipes-support/web-sysmon/web-sysmon_git.bb | |||
| @@ -0,0 +1,35 @@ | |||
| 1 | DESCRIPTION = "Web System Monitor Files" | ||
| 2 | SECTION = "web-sysmon" | ||
| 3 | LICENSE = "GPLv2" | ||
| 4 | LIC_FILES_CHKSUM = "file://COPYING;md5=12f884d2ae1ff87c09e5b7ccc2c4ca7e" | ||
| 5 | |||
| 6 | RDEPENDS_${PN} = "\ | ||
| 7 | bc \ | ||
| 8 | cairo \ | ||
| 9 | coreutils \ | ||
| 10 | cronie \ | ||
| 11 | liberation-fonts \ | ||
| 12 | lighttpd \ | ||
| 13 | lighttpd-module-cgi \ | ||
| 14 | lmsensors-sensors \ | ||
| 15 | make \ | ||
| 16 | rrdtool \ | ||
| 17 | " | ||
| 18 | |||
| 19 | SRC_URI = "git://git.freescale.com/ppc/sdk/web-sysmon-dev.git;nobranch=1" | ||
| 20 | SRCREV = "8d0c6eca1113832fabe917fd0cb25abe2d4d7157" | ||
| 21 | |||
| 22 | inherit update-rc.d | ||
| 23 | |||
| 24 | S = "${WORKDIR}/git" | ||
| 25 | |||
| 26 | EXTRA_OEMAKE += "D=${D}" | ||
| 27 | do_install () { | ||
| 28 | oe_runmake install | ||
| 29 | } | ||
| 30 | |||
| 31 | FILES_${PN} += "/" | ||
| 32 | |||
| 33 | INITSCRIPT_NAME = "web-sysmon.sh" | ||
| 34 | INITSCRIPT_PARAMS = "defaults 99 20" | ||
| 35 | COMPATIBLE_MACHINE = "(qoriq-ppc)" | ||
