[Openswan dev] [PATCH 0/2] ESP_NULL support for openswan-2.4.6

Michael Richardson mcr at sandelman.ottawa.on.ca
Mon Oct 2 12:50:52 EDT 2006


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


>>>>> "JuanJo" == JuanJo Ciarlante <jjo-ipsec at mendoza.gov.ar> writes:
    >> I can understand this... I will accept your patches, if you'll
    >> write the test cases for them.

    JuanJo> ughh... I miss that good'ol'times of nonQA devel :-S

    JuanJo> I'll dig into testing/ and learn... the path starts there
    JuanJo> and under docs/HACKING, right?  (tips&tricks for the task
    JuanJo> pretty welcome ;)

  cp testing/utils/umlsetup-sample.sh umlsetup.sh
  vi umlsetup.sh		      <- get various pieces,
				      mostly a kernel tree, and a
				      basicroot, pick UMLPOOL location.
  make uml
  MYBOX=`pwd` export MYBOX
  . ./umlsetup.sh
  xterm -n EAST -e $UMLPOOL/east/start.sh single &
  xterm -n WEST -e $UMLPOOL/west/start.sh single &

  (or see http://www.sandelman.ca/tmp/startuml.sh )

  login as root/root on each.
  east# cd /testing/pluto/basic-pluto-01
  east# source eastinit.sh

  west# cd /testing/pluto/basic-pluto-01
  west# source westinit.sh
  west# source westrun.sh

  Once that works, then you can run the tests manually:
       cd testing/pluto/basic-pluto-01
       ../../utils/runme.sh

  You'll want to look at the KLIPS tests, which only use one UML.

  The patches to pluto to permit it to recognize "NULL" algorithm should
be okay.  The problem is that I don't think we want to ship a kernel or
a UML default config that has ESP-NULL present.
  So, I think that it has to be a modular load in the test case itself.
I know that we didn't really care if we got all of the modular module
loading working in 2.x, since we expected to use cryptoapi.

- -- 
]            Bear: "Me, I'm just the shape of a bear."          |  firewalls  [
]   Michael Richardson,    Xelerance Corporation, Ottawa, ON    |net architect[
] mcr at xelerance.com      http://www.sandelman.ottawa.on.ca/mcr/ |device driver[
] panic("Just another Debian GNU/Linux using, kernel hacking, security guy"); [
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
Comment: Finger me for keys

iQEVAwUBRSFDaYCLcPvd0N1lAQI/Egf/Y6TklYEJN63ZOpwlZx/d8EeQa01h8M9a
0122XT9ulKwCbh/3yWu6QxvEBWv2RxlSQ0pAm5S4GF95grwljUHPZiQrX9KPSGHE
45p7nSBwMX3l6Ht/4e7ob6479F0A70jIgkmBKy0m7U7GO1e0Uz/jJmYOslbjq6y/
aFIJ7Fe3SlZuvMUXU2UwyvKx5nxTIFJT8a1MYquvkzE3YHX65T+EfDMCssAtqb6x
LokN2aI6/MSCNEoPJvPfWHrK6l70rCfnU6R4rS5xxzlDdb0dzskdDwCr2qlO2iPe
x9YZ+5PI7wsSawKRr+GwaHCjFcJn9uXb52dkZSAF2Och/I/TSAVjbQ==
=CZNk
-----END PGP SIGNATURE-----


More information about the Dev mailing list