Cryptographic API ---> Hardware crypto devices ---> Support for Atmel IPSEC/SSL hw acceleratorPlease note it selects the dependencies to the AES and SHA hardware accelerators:
Networking support ---> Networking options ----> Transformation user configuration interface [CONFIG_XFRM_USER] PK_KEY sockets [CONFIG_NET_KEY] TCP/IP networking [CONFIG_INET] IP: advanced router [CONFIG_IP_ADVANCED_ROUTER] IP: policy routing [CONFIG_IP_MULTIPLE_TABLES] IP: AH transformation [CONFIG_INET_AH] IP: ESP transformation [CONFIG_INET_ESP] IP: IPComp transformation [CONFIG_INET_IPCOMP] IP: IPSec transport mode [CONFIG_INET_XFRM_MODE_TRANSPORT] IP: IPSec tunnel mode [CONFIG_INET_XFRM_MODE_TUNNEL] IP: IPsec BEET mode [CONFIG_INET_XFRM_MODE_BEET] The IPv6 protocol ---> [CONFIG_IPV6] IPv6: AH transformation [CONFIG_INET6_AH] IPv6: ESP transformation [CONFIG_INET6_ESP] IPv6: IPComp transformation [CONFIG_INET6_IPCOMP] IPv6: IPsec transport mode [CONFIG_INET6_XFRM_MODE_TRANSPORT] IPv6: IPsec tunnel mode [CONFIG_INET6_XFRM_MODE_TUNNEL] IPv6: IPsec BEET mode [CONFIG_INET6_XFRM_MODE_BEET] IPv6: Multiple Routing Tables [CONFIG_IPV6_MULTIPLE_TABLES] Network packet filtering framework (Netfilter) ---> [CONFIG_NETFILTER] Advanced netfilter configuration [CONFIG_NETFILTER_ADVANCED] Core Netfilter Configuration ---> Netfilter Xtables support (required for ip_tables) [CONFIG_NETFILTER_XTABLES] IPSec "policy" match support [CONFIG_NETFILTER_XT_MATCH_POLICY] Cryptographic API ---> Select algorithms you want to use... Encrypted Chain IV Generator [CONFIG_CRYPTO_ECHAINIV]
~$ sudo apt-get install strongswanCheck/edit the IPSec configuration file (/etc/ipsec.conf):
~$ sudo cat /etc/ipsec.conf config setup conn %default ikelifetime=30m keylife=15m rekeymargin=3m keyingtries=3 mobike=no dpdaction=clear dpddelay=30 dpdtimeout=120 conn PSK authby=secret auto=start keyexchange=ikev2 ike=aes128-sha1;modp2048 esp=aes128-sha1;modp2048 type=tunnel left=192.168.2.254 right=192.168.2.1Restart the ipsec service:
~$ sudo ipsec restart
~/buildroot$ make menuconfig
Target packages ---> Networking applications ---> strongswan ---> Enable AF_ALG crypto interface to Linux Crypto API Enable the IKEv1/IKEv2 keying daemon charonThen run a simple "make" command to generate your target buildroot rootfs/image.
~/buildroot$ makeNow on the target, check/edit the IPSec configuration file (/etc/ipsec.conf):
# cat /etc/ipsec.conf config setup conn %default ikelifetime=30m keylife=15m rekeymargin=3m keyingtries=3 mobike=no dpdaction=restart dpddelay=30 dpdtimeout=120 conn PSK authby=secret auto=start keyexchange=ikev2 ike=aes128-sha1;modp2048 esp=aes128-sha1;modp2048 type=tunnel left=192.168.2.1 right=192.168.2.254Still on the target, start the ipsec daemon:
# ipsec startLater, you can check the status of the IPSec connection:
# ipsec status Security Associations (1 up, 0 connecting): PSK[1]: ESTABLISHED 9 seconds ago, 192.168.2.1[192.168.2.1]...192.168.2.254[192.168.2.254] PSK{1}: INSTALLED, TUNNEL, reqid 1, ESP SPIs: ce744834_i c1bb2cd7_o PSK{1}: 192.168.2.1/32 === 192.168.2.254/32
|
|||||||||||||||||||||||||||||
Copyright © by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries.
Microchip and others, are registered trademarks or trademarks of Microchip Technology Inc. and its subsidiaries.
Arm® and others are registered trademarks or trademarks of Arm Limited (or its affiliates). Other terms and product names may be trademarks of others.
Ideas, requests, contributions ? Connect to LinksToCommunities page.