VPN fonctionnel
Gossage Zigbee
This commit is contained in:
parent
35ed010db8
commit
308bc6c263
BIN
Config Switch edgeos_ubnt_20230317.tar.gz
Normal file
BIN
Config Switch edgeos_ubnt_20230317.tar.gz
Normal file
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
BIN
OpenVPN/Doc/How to setup an Edgerouter as VPN Client.pdf
Normal file
BIN
OpenVPN/Doc/How to setup an Edgerouter as VPN Client.pdf
Normal file
Binary file not shown.
Binary file not shown.
268
OpenVPN/jf.ovpn
Normal file
268
OpenVPN/jf.ovpn
Normal file
@ -0,0 +1,268 @@
|
||||
##############################################
|
||||
# Sample client-side OpenVPN 2.0 config file #
|
||||
# for connecting to multi-client server. #
|
||||
# #
|
||||
# This configuration can be used by multiple #
|
||||
# clients, however each client should have #
|
||||
# its own cert and key files. #
|
||||
# #
|
||||
# On Windows, you might want to rename this #
|
||||
# file so it has a .ovpn extension #
|
||||
##############################################
|
||||
|
||||
# Specify that we are a client and that we
|
||||
# will be pulling certain config file directives
|
||||
# from the server.
|
||||
client
|
||||
|
||||
# Use the same setting as you are using on
|
||||
# the server.
|
||||
# On most systems, the VPN will not function
|
||||
# unless you partially or fully disable
|
||||
# the firewall for the TUN/TAP interface.
|
||||
;dev tap
|
||||
dev tun
|
||||
|
||||
# Windows needs the TAP-Win32 adapter name
|
||||
# from the Network Connections panel
|
||||
# if you have more than one. On XP SP2,
|
||||
# you may need to disable the firewall
|
||||
# for the TAP adapter.
|
||||
;dev-node MyTap
|
||||
|
||||
# Are we connecting to a TCP or
|
||||
# UDP server? Use the same setting as
|
||||
# on the server.
|
||||
;proto tcp
|
||||
proto udp
|
||||
|
||||
# The hostname/IP and port of the server.
|
||||
# You can have multiple remote entries
|
||||
# to load balance between the servers.
|
||||
remote 138.197.151.172 1194
|
||||
;remote my-server-2 1194
|
||||
|
||||
# Choose a random host from the remote
|
||||
# list for load-balancing. Otherwise
|
||||
# try hosts in the order specified.
|
||||
;remote-random
|
||||
|
||||
# Keep trying indefinitely to resolve the
|
||||
# host name of the OpenVPN server. Very useful
|
||||
# on machines which are not permanently connected
|
||||
# to the internet such as laptops.
|
||||
resolv-retry infinite
|
||||
|
||||
# Most clients don't need to bind to
|
||||
# a specific local port number.
|
||||
nobind
|
||||
|
||||
# Downgrade privileges after initialization (non-Windows only)
|
||||
;user nobody
|
||||
;group nobody
|
||||
|
||||
# Try to preserve some state across restarts.
|
||||
persist-key
|
||||
persist-tun
|
||||
|
||||
# If you are connecting through an
|
||||
# HTTP proxy to reach the actual OpenVPN
|
||||
# server, put the proxy server/IP and
|
||||
# port number here. See the man page
|
||||
# if your proxy server requires
|
||||
# authentication.
|
||||
;http-proxy-retry # retry on connection failures
|
||||
;http-proxy [proxy server] [proxy port #]
|
||||
|
||||
# Wireless networks often produce a lot
|
||||
# of duplicate packets. Set this flag
|
||||
# to silence duplicate packet warnings.
|
||||
;mute-replay-warnings
|
||||
|
||||
# SSL/TLS parms.
|
||||
# See the server config file for more
|
||||
# description. It's best to use
|
||||
# a separate .crt/.key file pair
|
||||
# for each client. A single ca
|
||||
# file can be used for all clients.
|
||||
;ca ca.crt
|
||||
;cert client.crt
|
||||
;key client.key
|
||||
|
||||
# Verify server certificate by checking that the
|
||||
# certificate has the correct key usage set.
|
||||
# This is an important precaution to protect against
|
||||
# a potential attack discussed here:
|
||||
# http://openvpn.net/howto.html#mitm
|
||||
#
|
||||
# To use this feature, you will need to generate
|
||||
# your server certificates with the keyUsage set to
|
||||
# digitalSignature, keyEncipherment
|
||||
# and the extendedKeyUsage to
|
||||
# serverAuth
|
||||
# EasyRSA can do this for you.
|
||||
remote-cert-tls server
|
||||
|
||||
# If a tls-auth key is used on the server
|
||||
# then every client must also have the key.
|
||||
;tls-auth ta.key 1
|
||||
|
||||
# Select a cryptographic cipher.
|
||||
# If the cipher option is used on the server
|
||||
# then you must also specify it here.
|
||||
# Note that v2.4 client/server will automatically
|
||||
# negotiate AES-256-GCM in TLS mode.
|
||||
# See also the data-ciphers option in the manpage
|
||||
cipher AES-256-GCM
|
||||
auth SHA256
|
||||
|
||||
# Enable compression on the VPN link.
|
||||
# Don't enable this unless it is also
|
||||
# enabled in the server config file.
|
||||
#comp-lzo
|
||||
|
||||
# Set log file verbosity.
|
||||
verb 3
|
||||
|
||||
# Silence repeating messages
|
||||
;mute 20
|
||||
|
||||
key-direction 1
|
||||
|
||||
|
||||
; script-security 2
|
||||
; up /etc/openvpn/update-resolv-conf
|
||||
; down /etc/openvpn/update-resolv-conf
|
||||
|
||||
|
||||
; script-security 2
|
||||
; up /etc/openvpn/update-systemd-resolved
|
||||
; down /etc/openvpn/update-systemd-resolved
|
||||
; down-pre
|
||||
; dhcp-option DOMAIN-ROUTE .
|
||||
<ca>
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDRTCCAi2gAwIBAgIUXe37kz2yqgyL2xXfvaGRzlz7ywYwDQYJKoZIhvcNAQEL
|
||||
BQAwFDESMBAGA1UEAwwJSkZfc2VydmVyMB4XDTIzMDIyMDIyMDkyMVoXDTMzMDIx
|
||||
NzIyMDkyMVowFDESMBAGA1UEAwwJSkZfc2VydmVyMIIBIjANBgkqhkiG9w0BAQEF
|
||||
AAOCAQ8AMIIBCgKCAQEAnLdVAj0W31TtWGxwdBeqsdIHyUdVAEG8bX+CcNZDP3M3
|
||||
R/gJOmenjqsqHYBe5gZcky1hkqWaD7l/LNmyzZDZ1lVEWpcAZqxbsUZKiHU30bxq
|
||||
84L5qtaAOpwTsumidq2hBqoDBMdBmh18e0QEW624mui7ckXTRRG3PA0ccXtXcTYU
|
||||
ntmhYtQ2oaPauSmfJZIUfZTfVZbB8FkCgu+zJtCx5hq46vIHm8KX0m1zLIeUtGsI
|
||||
hkly+5v52f3sEMlddyoZZkfjRddETk2co09q3oNaP1LYxN5G+TvZDhpdE+PrDsNT
|
||||
wO4uU2d9hVIP3T49heLieZ6KVxyp1FsDYzo0CNlIDwIDAQABo4GOMIGLMB0GA1Ud
|
||||
DgQWBBSKeJDl8FDnjHXkuMCh6OmbshqdMjBPBgNVHSMESDBGgBSKeJDl8FDnjHXk
|
||||
uMCh6OmbshqdMqEYpBYwFDESMBAGA1UEAwwJSkZfc2VydmVyghRd7fuTPbKqDIvb
|
||||
Fd+9oZHOXPvLBjAMBgNVHRMEBTADAQH/MAsGA1UdDwQEAwIBBjANBgkqhkiG9w0B
|
||||
AQsFAAOCAQEARIg2x4Tit/6ZydMlle6ku32t75OMCVQoe7fUkRjNe8pCkZjZXLy9
|
||||
QIRwoqW3FRT8+mQjctZk3NsyLStF8Rc/fFvpjGY/hiEQ/RV1K2/IZ9hcswp/LRzQ
|
||||
ElDwXhe4zlcDT10GjHYYx221SR+ijgicZcaXgb9f3uZKIrPgyb8qB4KCQS8gPtCV
|
||||
1VmPM5/svVCI93G+xT92XBHa47fgV5GEn7Snah2UgFol5h7/KX/Sa2q0pfBlzqmt
|
||||
CutfEbYcwSxkoLsEUIW8KMoEAIsO+KIsraS6EXlRdT82Ui+UZWVPZABlzifCl+AV
|
||||
LzBrLwt2OeoEI1h65EyzzE7gDsjrE3JR/Q==
|
||||
-----END CERTIFICATE-----
|
||||
</ca>
|
||||
<cert>
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
22:7a:b3:cb:88:05:00:8c:df:af:02:be:af:63:f9:59
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: CN=JF_server
|
||||
Validity
|
||||
Not Before: Feb 20 22:37:46 2023 GMT
|
||||
Not After : May 25 22:37:46 2025 GMT
|
||||
Subject: CN=jf
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: id-ecPublicKey
|
||||
Public-Key: (384 bit)
|
||||
pub:
|
||||
04:8d:38:ea:4f:29:bd:83:a9:33:a3:1c:33:8a:60:
|
||||
8f:fa:19:81:00:73:44:81:98:1e:76:05:ee:f6:46:
|
||||
d5:25:a8:c5:3b:bd:d6:fa:cf:c6:79:e0:b4:42:27:
|
||||
80:e2:96:2d:30:50:c2:f6:9c:2c:13:f8:b9:46:b3:
|
||||
0d:96:6c:9b:d2:45:15:a3:f0:4c:bc:6b:51:45:f8:
|
||||
cb:59:04:b1:d0:47:b9:90:06:71:c7:eb:34:32:e2:
|
||||
72:14:84:94:58:e3:34
|
||||
ASN1 OID: secp384r1
|
||||
NIST CURVE: P-384
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
X509v3 Subject Key Identifier:
|
||||
C5:CE:72:8F:A3:8E:13:57:DD:0E:02:A1:24:F1:56:C3:AE:2F:65:8F
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:8A:78:90:E5:F0:50:E7:8C:75:E4:B8:C0:A1:E8:E9:9B:B2:1A:9D:32
|
||||
DirName:/CN=JF_server
|
||||
serial:5D:ED:FB:93:3D:B2:AA:0C:8B:DB:15:DF:BD:A1:91:CE:5C:FB:CB:06
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Signature Value:
|
||||
3b:e8:1a:3e:ac:17:17:49:7c:4d:73:55:39:e9:1b:e4:d6:7f:
|
||||
6d:6d:43:6c:e2:79:41:f4:26:a4:2d:18:59:24:a0:b1:e0:db:
|
||||
03:07:f9:fb:24:f6:be:ed:8c:31:3e:c7:bb:74:b6:87:ba:43:
|
||||
fc:d6:fb:2f:9f:1c:eb:d1:27:ad:60:eb:ab:87:c7:46:fe:22:
|
||||
75:c1:bb:fb:23:ad:ba:1d:ab:41:45:29:d6:c4:89:99:94:40:
|
||||
06:c7:3a:08:fe:d3:b5:f4:e7:52:57:aa:d1:a8:ec:74:e6:c9:
|
||||
ec:9e:80:e0:ba:92:92:95:55:2e:d7:b2:d8:09:ee:72:fd:12:
|
||||
ac:0a:0d:dc:ba:ac:4e:34:8c:37:19:76:60:7c:bd:ba:99:b7:
|
||||
e5:47:c3:4b:67:2f:a9:5c:89:95:70:2d:2c:97:45:04:64:15:
|
||||
47:04:d1:48:7d:d8:40:63:6c:05:8b:dc:ed:0f:a3:ae:3a:e8:
|
||||
6f:49:34:54:de:99:4b:aa:28:6d:c9:3d:db:43:60:14:40:d5:
|
||||
09:87:a8:b2:88:11:4c:8c:00:71:b1:38:25:91:5f:2f:93:7b:
|
||||
42:64:38:db:d2:59:48:e8:ed:2e:92:69:4e:d4:2a:3b:e3:03:
|
||||
94:2c:fc:ac:bc:ff:a9:b4:1e:ca:d3:d2:b5:fd:bf:33:bd:55:
|
||||
12:75:db:f1
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIICnjCCAYagAwIBAgIQInqzy4gFAIzfrwK+r2P5WTANBgkqhkiG9w0BAQsFADAU
|
||||
MRIwEAYDVQQDDAlKRl9zZXJ2ZXIwHhcNMjMwMjIwMjIzNzQ2WhcNMjUwNTI1MjIz
|
||||
NzQ2WjANMQswCQYDVQQDDAJqZjB2MBAGByqGSM49AgEGBSuBBAAiA2IABI046k8p
|
||||
vYOpM6McM4pgj/oZgQBzRIGYHnYF7vZG1SWoxTu91vrPxnngtEIngOKWLTBQwvac
|
||||
LBP4uUazDZZsm9JFFaPwTLxrUUX4y1kEsdBHuZAGccfrNDLichSElFjjNKOBoDCB
|
||||
nTAJBgNVHRMEAjAAMB0GA1UdDgQWBBTFznKPo44TV90OAqEk8VbDri9ljzBPBgNV
|
||||
HSMESDBGgBSKeJDl8FDnjHXkuMCh6OmbshqdMqEYpBYwFDESMBAGA1UEAwwJSkZf
|
||||
c2VydmVyghRd7fuTPbKqDIvbFd+9oZHOXPvLBjATBgNVHSUEDDAKBggrBgEFBQcD
|
||||
AjALBgNVHQ8EBAMCB4AwDQYJKoZIhvcNAQELBQADggEBADvoGj6sFxdJfE1zVTnp
|
||||
G+TWf21tQ2zieUH0JqQtGFkkoLHg2wMH+fsk9r7tjDE+x7t0toe6Q/zW+y+fHOvR
|
||||
J61g66uHx0b+InXBu/sjrbodq0FFKdbEiZmUQAbHOgj+07X051JXqtGo7HTmyeye
|
||||
gOC6kpKVVS7XstgJ7nL9EqwKDdy6rE40jDcZdmB8vbqZt+VHw0tnL6lciZVwLSyX
|
||||
RQRkFUcE0Uh92EBjbAWL3O0Po6466G9JNFTemUuqKG3JPdtDYBRA1QmHqLKIEUyM
|
||||
AHGxOCWRXy+Te0JkONvSWUjo7S6SaU7UKjvjA5Qs/Ky8/6m0HsrT0rX9vzO9VRJ1
|
||||
2/E=
|
||||
-----END CERTIFICATE-----
|
||||
</cert>
|
||||
<key>
|
||||
-----BEGIN PRIVATE KEY-----
|
||||
MIG2AgEAMBAGByqGSM49AgEGBSuBBAAiBIGeMIGbAgEBBDBI4JXNyv7EeAsIFaPn
|
||||
JBe0cJDvuYM+AGWJYcMtfQj8Sg5z+K0+Ur1IjRxj6vkyXa2hZANiAASNOOpPKb2D
|
||||
qTOjHDOKYI/6GYEAc0SBmB52Be72RtUlqMU7vdb6z8Z54LRCJ4Dili0wUML2nCwT
|
||||
+LlGsw2WbJvSRRWj8Ey8a1FF+MtZBLHQR7mQBnHH6zQy4nIUhJRY4zQ=
|
||||
-----END PRIVATE KEY-----
|
||||
</key>
|
||||
<tls-crypt>
|
||||
#
|
||||
# 2048 bit OpenVPN static key
|
||||
#
|
||||
-----BEGIN OpenVPN Static key V1-----
|
||||
4c828cbf0e58f927758e9471c1b6f03b
|
||||
2e77b2c634bad76df0570dd8f47184d6
|
||||
3921e25c6e6cbe4af4b64aad89d12425
|
||||
a9fca69ae08802b5ed583632c26678b0
|
||||
cc28c481c3831d1b2204dc30cd466395
|
||||
ccb8cd82cd2259c956b510c9a56e842a
|
||||
8693c44dca462f0ab7be3856abe9bbe1
|
||||
95a6ffd3b0237225b9497c7a0df05ad8
|
||||
2f2e0a8bff97c927d2890906d0105947
|
||||
fa3430fc779583772382534fb880add6
|
||||
8d5592fa4ff384d3e96c560019b5835f
|
||||
095da9b2fb33dbfbc1ffce9560908271
|
||||
ee96e02ccecc9d51b9dda79a77704a1d
|
||||
4407d7c805e6950854fe232adee02a12
|
||||
b09af2d9bfe04868a9e2e942dc64eb81
|
||||
9e062ab9f781e52d263195a58db72ebe
|
||||
-----END OpenVPN Static key V1-----
|
||||
</tls-crypt>
|
||||
268
OpenVPN/pascal.ovpn
Normal file
268
OpenVPN/pascal.ovpn
Normal file
@ -0,0 +1,268 @@
|
||||
##############################################
|
||||
# Sample client-side OpenVPN 2.0 config file #
|
||||
# for connecting to multi-client server. #
|
||||
# #
|
||||
# This configuration can be used by multiple #
|
||||
# clients, however each client should have #
|
||||
# its own cert and key files. #
|
||||
# #
|
||||
# On Windows, you might want to rename this #
|
||||
# file so it has a .ovpn extension #
|
||||
##############################################
|
||||
|
||||
# Specify that we are a client and that we
|
||||
# will be pulling certain config file directives
|
||||
# from the server.
|
||||
client
|
||||
|
||||
# Use the same setting as you are using on
|
||||
# the server.
|
||||
# On most systems, the VPN will not function
|
||||
# unless you partially or fully disable
|
||||
# the firewall for the TUN/TAP interface.
|
||||
;dev tap
|
||||
dev tun
|
||||
|
||||
# Windows needs the TAP-Win32 adapter name
|
||||
# from the Network Connections panel
|
||||
# if you have more than one. On XP SP2,
|
||||
# you may need to disable the firewall
|
||||
# for the TAP adapter.
|
||||
;dev-node MyTap
|
||||
|
||||
# Are we connecting to a TCP or
|
||||
# UDP server? Use the same setting as
|
||||
# on the server.
|
||||
;proto tcp
|
||||
proto udp
|
||||
|
||||
# The hostname/IP and port of the server.
|
||||
# You can have multiple remote entries
|
||||
# to load balance between the servers.
|
||||
remote 138.197.151.172 1194
|
||||
;remote my-server-2 1194
|
||||
|
||||
# Choose a random host from the remote
|
||||
# list for load-balancing. Otherwise
|
||||
# try hosts in the order specified.
|
||||
;remote-random
|
||||
|
||||
# Keep trying indefinitely to resolve the
|
||||
# host name of the OpenVPN server. Very useful
|
||||
# on machines which are not permanently connected
|
||||
# to the internet such as laptops.
|
||||
resolv-retry infinite
|
||||
|
||||
# Most clients don't need to bind to
|
||||
# a specific local port number.
|
||||
nobind
|
||||
|
||||
# Downgrade privileges after initialization (non-Windows only)
|
||||
;user nobody
|
||||
;group nobody
|
||||
|
||||
# Try to preserve some state across restarts.
|
||||
persist-key
|
||||
persist-tun
|
||||
|
||||
# If you are connecting through an
|
||||
# HTTP proxy to reach the actual OpenVPN
|
||||
# server, put the proxy server/IP and
|
||||
# port number here. See the man page
|
||||
# if your proxy server requires
|
||||
# authentication.
|
||||
;http-proxy-retry # retry on connection failures
|
||||
;http-proxy [proxy server] [proxy port #]
|
||||
|
||||
# Wireless networks often produce a lot
|
||||
# of duplicate packets. Set this flag
|
||||
# to silence duplicate packet warnings.
|
||||
;mute-replay-warnings
|
||||
|
||||
# SSL/TLS parms.
|
||||
# See the server config file for more
|
||||
# description. It's best to use
|
||||
# a separate .crt/.key file pair
|
||||
# for each client. A single ca
|
||||
# file can be used for all clients.
|
||||
;ca ca.crt
|
||||
;cert client.crt
|
||||
;key client.key
|
||||
|
||||
# Verify server certificate by checking that the
|
||||
# certificate has the correct key usage set.
|
||||
# This is an important precaution to protect against
|
||||
# a potential attack discussed here:
|
||||
# http://openvpn.net/howto.html#mitm
|
||||
#
|
||||
# To use this feature, you will need to generate
|
||||
# your server certificates with the keyUsage set to
|
||||
# digitalSignature, keyEncipherment
|
||||
# and the extendedKeyUsage to
|
||||
# serverAuth
|
||||
# EasyRSA can do this for you.
|
||||
remote-cert-tls server
|
||||
|
||||
# If a tls-auth key is used on the server
|
||||
# then every client must also have the key.
|
||||
;tls-auth ta.key 1
|
||||
|
||||
# Select a cryptographic cipher.
|
||||
# If the cipher option is used on the server
|
||||
# then you must also specify it here.
|
||||
# Note that v2.4 client/server will automatically
|
||||
# negotiate AES-256-GCM in TLS mode.
|
||||
# See also the data-ciphers option in the manpage
|
||||
cipher AES-256-GCM
|
||||
auth SHA256
|
||||
|
||||
# Enable compression on the VPN link.
|
||||
# Don't enable this unless it is also
|
||||
# enabled in the server config file.
|
||||
#comp-lzo
|
||||
|
||||
# Set log file verbosity.
|
||||
verb 3
|
||||
|
||||
# Silence repeating messages
|
||||
;mute 20
|
||||
|
||||
key-direction 1
|
||||
|
||||
|
||||
; script-security 2
|
||||
; up /etc/openvpn/update-resolv-conf
|
||||
; down /etc/openvpn/update-resolv-conf
|
||||
|
||||
|
||||
; script-security 2
|
||||
; up /etc/openvpn/update-systemd-resolved
|
||||
; down /etc/openvpn/update-systemd-resolved
|
||||
; down-pre
|
||||
; dhcp-option DOMAIN-ROUTE .
|
||||
<ca>
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDRTCCAi2gAwIBAgIUXe37kz2yqgyL2xXfvaGRzlz7ywYwDQYJKoZIhvcNAQEL
|
||||
BQAwFDESMBAGA1UEAwwJSkZfc2VydmVyMB4XDTIzMDIyMDIyMDkyMVoXDTMzMDIx
|
||||
NzIyMDkyMVowFDESMBAGA1UEAwwJSkZfc2VydmVyMIIBIjANBgkqhkiG9w0BAQEF
|
||||
AAOCAQ8AMIIBCgKCAQEAnLdVAj0W31TtWGxwdBeqsdIHyUdVAEG8bX+CcNZDP3M3
|
||||
R/gJOmenjqsqHYBe5gZcky1hkqWaD7l/LNmyzZDZ1lVEWpcAZqxbsUZKiHU30bxq
|
||||
84L5qtaAOpwTsumidq2hBqoDBMdBmh18e0QEW624mui7ckXTRRG3PA0ccXtXcTYU
|
||||
ntmhYtQ2oaPauSmfJZIUfZTfVZbB8FkCgu+zJtCx5hq46vIHm8KX0m1zLIeUtGsI
|
||||
hkly+5v52f3sEMlddyoZZkfjRddETk2co09q3oNaP1LYxN5G+TvZDhpdE+PrDsNT
|
||||
wO4uU2d9hVIP3T49heLieZ6KVxyp1FsDYzo0CNlIDwIDAQABo4GOMIGLMB0GA1Ud
|
||||
DgQWBBSKeJDl8FDnjHXkuMCh6OmbshqdMjBPBgNVHSMESDBGgBSKeJDl8FDnjHXk
|
||||
uMCh6OmbshqdMqEYpBYwFDESMBAGA1UEAwwJSkZfc2VydmVyghRd7fuTPbKqDIvb
|
||||
Fd+9oZHOXPvLBjAMBgNVHRMEBTADAQH/MAsGA1UdDwQEAwIBBjANBgkqhkiG9w0B
|
||||
AQsFAAOCAQEARIg2x4Tit/6ZydMlle6ku32t75OMCVQoe7fUkRjNe8pCkZjZXLy9
|
||||
QIRwoqW3FRT8+mQjctZk3NsyLStF8Rc/fFvpjGY/hiEQ/RV1K2/IZ9hcswp/LRzQ
|
||||
ElDwXhe4zlcDT10GjHYYx221SR+ijgicZcaXgb9f3uZKIrPgyb8qB4KCQS8gPtCV
|
||||
1VmPM5/svVCI93G+xT92XBHa47fgV5GEn7Snah2UgFol5h7/KX/Sa2q0pfBlzqmt
|
||||
CutfEbYcwSxkoLsEUIW8KMoEAIsO+KIsraS6EXlRdT82Ui+UZWVPZABlzifCl+AV
|
||||
LzBrLwt2OeoEI1h65EyzzE7gDsjrE3JR/Q==
|
||||
-----END CERTIFICATE-----
|
||||
</ca>
|
||||
<cert>
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
a6:7f:64:22:94:22:4a:39:b9:48:25:9b:99:9d:ae:a7
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: CN=JF_server
|
||||
Validity
|
||||
Not Before: Mar 17 19:30:32 2023 GMT
|
||||
Not After : Jun 19 19:30:32 2025 GMT
|
||||
Subject: CN=pascal
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: id-ecPublicKey
|
||||
Public-Key: (384 bit)
|
||||
pub:
|
||||
04:6e:d7:fc:29:a8:23:70:28:49:70:82:f4:1a:4f:
|
||||
fc:e8:5a:d3:10:84:ef:0a:59:d9:3e:31:2e:5f:91:
|
||||
8b:97:7e:32:c5:e4:9a:b1:df:8b:66:82:f7:a5:5a:
|
||||
6d:90:ba:4d:4b:75:4e:1b:09:37:3b:23:5b:df:b8:
|
||||
08:89:c7:a0:d6:3b:fa:3e:f8:b1:08:18:a6:ee:25:
|
||||
02:25:b2:c5:43:ee:f5:03:82:9e:39:a0:82:d0:23:
|
||||
49:eb:fe:be:3e:8f:7a
|
||||
ASN1 OID: secp384r1
|
||||
NIST CURVE: P-384
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
X509v3 Subject Key Identifier:
|
||||
8E:E1:F2:13:12:D0:E0:C4:29:EA:29:E4:3D:94:2B:EC:0D:04:8F:BC
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:8A:78:90:E5:F0:50:E7:8C:75:E4:B8:C0:A1:E8:E9:9B:B2:1A:9D:32
|
||||
DirName:/CN=JF_server
|
||||
serial:5D:ED:FB:93:3D:B2:AA:0C:8B:DB:15:DF:BD:A1:91:CE:5C:FB:CB:06
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Signature Value:
|
||||
7d:0b:3f:f6:58:09:f2:8a:8d:0e:1e:50:c9:e8:31:f0:8f:0a:
|
||||
f5:65:66:55:d3:dd:2c:5d:42:d4:0f:a5:02:ed:6a:77:e1:1d:
|
||||
39:c5:46:1c:a5:38:17:89:13:f1:cd:eb:ff:b8:a5:3d:e9:85:
|
||||
6f:d2:96:9b:f4:a1:09:6c:1b:84:40:70:19:2b:e1:ac:91:c2:
|
||||
df:bf:09:a4:4f:c4:31:44:fe:2b:a5:60:38:97:a8:b3:01:aa:
|
||||
39:43:74:90:b5:c6:fc:85:63:26:9f:7f:54:ba:de:4a:b1:ae:
|
||||
6d:85:00:35:4d:15:9f:9d:10:f4:bf:bb:67:45:7e:c6:ab:ee:
|
||||
7e:ad:92:4a:b4:e8:76:65:be:94:40:5a:67:83:ab:6c:d9:f9:
|
||||
7d:40:bd:70:87:1f:14:4d:eb:56:50:a5:c3:7e:4a:b3:42:b5:
|
||||
95:fe:f8:7f:9b:c6:c0:81:04:62:fd:94:ef:da:dd:17:01:a0:
|
||||
93:14:80:31:5a:a2:fa:c7:8c:2d:7c:df:8b:40:d5:5c:ce:5f:
|
||||
a8:9f:9f:48:4f:49:49:dc:cc:37:7e:f7:55:84:74:8a:cd:68:
|
||||
15:60:8b:e8:4a:75:3e:83:cb:33:be:45:e1:a1:76:52:1a:b9:
|
||||
09:34:38:af:6e:af:98:e3:6d:ed:c2:24:97:de:08:83:6b:d5:
|
||||
45:9e:91:3a
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIICozCCAYugAwIBAgIRAKZ/ZCKUIko5uUglm5mdrqcwDQYJKoZIhvcNAQELBQAw
|
||||
FDESMBAGA1UEAwwJSkZfc2VydmVyMB4XDTIzMDMxNzE5MzAzMloXDTI1MDYxOTE5
|
||||
MzAzMlowETEPMA0GA1UEAwwGcGFzY2FsMHYwEAYHKoZIzj0CAQYFK4EEACIDYgAE
|
||||
btf8KagjcChJcIL0Gk/86FrTEITvClnZPjEuX5GLl34yxeSasd+LZoL3pVptkLpN
|
||||
S3VOGwk3OyNb37gIiceg1jv6PvixCBim7iUCJbLFQ+71A4KeOaCC0CNJ6/6+Po96
|
||||
o4GgMIGdMAkGA1UdEwQCMAAwHQYDVR0OBBYEFI7h8hMS0ODEKeop5D2UK+wNBI+8
|
||||
ME8GA1UdIwRIMEaAFIp4kOXwUOeMdeS4wKHo6ZuyGp0yoRikFjAUMRIwEAYDVQQD
|
||||
DAlKRl9zZXJ2ZXKCFF3t+5M9sqoMi9sV372hkc5c+8sGMBMGA1UdJQQMMAoGCCsG
|
||||
AQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAQEAfQs/9lgJ8oqN
|
||||
Dh5Qyegx8I8K9WVmVdPdLF1C1A+lAu1qd+EdOcVGHKU4F4kT8c3r/7ilPemFb9KW
|
||||
m/ShCWwbhEBwGSvhrJHC378JpE/EMUT+K6VgOJeoswGqOUN0kLXG/IVjJp9/VLre
|
||||
SrGubYUANU0Vn50Q9L+7Z0V+xqvufq2SSrTodmW+lEBaZ4OrbNn5fUC9cIcfFE3r
|
||||
VlClw35Ks0K1lf74f5vGwIEEYv2U79rdFwGgkxSAMVqi+seMLXzfi0DVXM5fqJ+f
|
||||
SE9JSdzMN373VYR0is1oFWCL6Ep1PoPLM75F4aF2Uhq5CTQ4r26vmONt7cIkl94I
|
||||
g2vVRZ6ROg==
|
||||
-----END CERTIFICATE-----
|
||||
</cert>
|
||||
<key>
|
||||
-----BEGIN PRIVATE KEY-----
|
||||
MIG2AgEAMBAGByqGSM49AgEGBSuBBAAiBIGeMIGbAgEBBDBaXJvFX1ve+n9RXR/s
|
||||
FyOJij1AEAhcbzj6Vg0PXekMwOSAkRsAltTXYM3nAaRK93OhZANiAARu1/wpqCNw
|
||||
KElwgvQaT/zoWtMQhO8KWdk+MS5fkYuXfjLF5Jqx34tmgvelWm2Quk1LdU4bCTc7
|
||||
I1vfuAiJx6DWO/o++LEIGKbuJQIlssVD7vUDgp45oILQI0nr/r4+j3o=
|
||||
-----END PRIVATE KEY-----
|
||||
</key>
|
||||
<tls-crypt>
|
||||
#
|
||||
# 2048 bit OpenVPN static key
|
||||
#
|
||||
-----BEGIN OpenVPN Static key V1-----
|
||||
4c828cbf0e58f927758e9471c1b6f03b
|
||||
2e77b2c634bad76df0570dd8f47184d6
|
||||
3921e25c6e6cbe4af4b64aad89d12425
|
||||
a9fca69ae08802b5ed583632c26678b0
|
||||
cc28c481c3831d1b2204dc30cd466395
|
||||
ccb8cd82cd2259c956b510c9a56e842a
|
||||
8693c44dca462f0ab7be3856abe9bbe1
|
||||
95a6ffd3b0237225b9497c7a0df05ad8
|
||||
2f2e0a8bff97c927d2890906d0105947
|
||||
fa3430fc779583772382534fb880add6
|
||||
8d5592fa4ff384d3e96c560019b5835f
|
||||
095da9b2fb33dbfbc1ffce9560908271
|
||||
ee96e02ccecc9d51b9dda79a77704a1d
|
||||
4407d7c805e6950854fe232adee02a12
|
||||
b09af2d9bfe04868a9e2e942dc64eb81
|
||||
9e062ab9f781e52d263195a58db72ebe
|
||||
-----END OpenVPN Static key V1-----
|
||||
</tls-crypt>
|
||||
268
OpenVPN/remoteclient.ovpn
Normal file
268
OpenVPN/remoteclient.ovpn
Normal file
@ -0,0 +1,268 @@
|
||||
##############################################
|
||||
# Sample client-side OpenVPN 2.0 config file #
|
||||
# for connecting to multi-client server. #
|
||||
# #
|
||||
# This configuration can be used by multiple #
|
||||
# clients, however each client should have #
|
||||
# its own cert and key files. #
|
||||
# #
|
||||
# On Windows, you might want to rename this #
|
||||
# file so it has a .ovpn extension #
|
||||
##############################################
|
||||
|
||||
# Specify that we are a client and that we
|
||||
# will be pulling certain config file directives
|
||||
# from the server.
|
||||
client
|
||||
|
||||
# Use the same setting as you are using on
|
||||
# the server.
|
||||
# On most systems, the VPN will not function
|
||||
# unless you partially or fully disable
|
||||
# the firewall for the TUN/TAP interface.
|
||||
;dev tap
|
||||
dev tun
|
||||
|
||||
# Windows needs the TAP-Win32 adapter name
|
||||
# from the Network Connections panel
|
||||
# if you have more than one. On XP SP2,
|
||||
# you may need to disable the firewall
|
||||
# for the TAP adapter.
|
||||
;dev-node MyTap
|
||||
|
||||
# Are we connecting to a TCP or
|
||||
# UDP server? Use the same setting as
|
||||
# on the server.
|
||||
;proto tcp
|
||||
proto udp
|
||||
|
||||
# The hostname/IP and port of the server.
|
||||
# You can have multiple remote entries
|
||||
# to load balance between the servers.
|
||||
remote 138.197.151.172 1194
|
||||
;remote my-server-2 1194
|
||||
|
||||
# Choose a random host from the remote
|
||||
# list for load-balancing. Otherwise
|
||||
# try hosts in the order specified.
|
||||
;remote-random
|
||||
|
||||
# Keep trying indefinitely to resolve the
|
||||
# host name of the OpenVPN server. Very useful
|
||||
# on machines which are not permanently connected
|
||||
# to the internet such as laptops.
|
||||
resolv-retry infinite
|
||||
|
||||
# Most clients don't need to bind to
|
||||
# a specific local port number.
|
||||
nobind
|
||||
|
||||
# Downgrade privileges after initialization (non-Windows only)
|
||||
;user nobody
|
||||
;group nobody
|
||||
|
||||
# Try to preserve some state across restarts.
|
||||
persist-key
|
||||
persist-tun
|
||||
|
||||
# If you are connecting through an
|
||||
# HTTP proxy to reach the actual OpenVPN
|
||||
# server, put the proxy server/IP and
|
||||
# port number here. See the man page
|
||||
# if your proxy server requires
|
||||
# authentication.
|
||||
;http-proxy-retry # retry on connection failures
|
||||
;http-proxy [proxy server] [proxy port #]
|
||||
|
||||
# Wireless networks often produce a lot
|
||||
# of duplicate packets. Set this flag
|
||||
# to silence duplicate packet warnings.
|
||||
;mute-replay-warnings
|
||||
|
||||
# SSL/TLS parms.
|
||||
# See the server config file for more
|
||||
# description. It's best to use
|
||||
# a separate .crt/.key file pair
|
||||
# for each client. A single ca
|
||||
# file can be used for all clients.
|
||||
;ca ca.crt
|
||||
;cert client.crt
|
||||
;key client.key
|
||||
|
||||
# Verify server certificate by checking that the
|
||||
# certificate has the correct key usage set.
|
||||
# This is an important precaution to protect against
|
||||
# a potential attack discussed here:
|
||||
# http://openvpn.net/howto.html#mitm
|
||||
#
|
||||
# To use this feature, you will need to generate
|
||||
# your server certificates with the keyUsage set to
|
||||
# digitalSignature, keyEncipherment
|
||||
# and the extendedKeyUsage to
|
||||
# serverAuth
|
||||
# EasyRSA can do this for you.
|
||||
remote-cert-tls server
|
||||
|
||||
# If a tls-auth key is used on the server
|
||||
# then every client must also have the key.
|
||||
;tls-auth ta.key 1
|
||||
|
||||
# Select a cryptographic cipher.
|
||||
# If the cipher option is used on the server
|
||||
# then you must also specify it here.
|
||||
# Note that v2.4 client/server will automatically
|
||||
# negotiate AES-256-GCM in TLS mode.
|
||||
# See also the data-ciphers option in the manpage
|
||||
cipher AES-256-GCM
|
||||
auth SHA256
|
||||
|
||||
# Enable compression on the VPN link.
|
||||
# Don't enable this unless it is also
|
||||
# enabled in the server config file.
|
||||
#comp-lzo
|
||||
|
||||
# Set log file verbosity.
|
||||
verb 3
|
||||
|
||||
# Silence repeating messages
|
||||
;mute 20
|
||||
|
||||
key-direction 1
|
||||
|
||||
|
||||
; script-security 2
|
||||
; up /etc/openvpn/update-resolv-conf
|
||||
; down /etc/openvpn/update-resolv-conf
|
||||
|
||||
|
||||
; script-security 2
|
||||
; up /etc/openvpn/update-systemd-resolved
|
||||
; down /etc/openvpn/update-systemd-resolved
|
||||
; down-pre
|
||||
; dhcp-option DOMAIN-ROUTE .
|
||||
<ca>
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDRTCCAi2gAwIBAgIUXe37kz2yqgyL2xXfvaGRzlz7ywYwDQYJKoZIhvcNAQEL
|
||||
BQAwFDESMBAGA1UEAwwJSkZfc2VydmVyMB4XDTIzMDIyMDIyMDkyMVoXDTMzMDIx
|
||||
NzIyMDkyMVowFDESMBAGA1UEAwwJSkZfc2VydmVyMIIBIjANBgkqhkiG9w0BAQEF
|
||||
AAOCAQ8AMIIBCgKCAQEAnLdVAj0W31TtWGxwdBeqsdIHyUdVAEG8bX+CcNZDP3M3
|
||||
R/gJOmenjqsqHYBe5gZcky1hkqWaD7l/LNmyzZDZ1lVEWpcAZqxbsUZKiHU30bxq
|
||||
84L5qtaAOpwTsumidq2hBqoDBMdBmh18e0QEW624mui7ckXTRRG3PA0ccXtXcTYU
|
||||
ntmhYtQ2oaPauSmfJZIUfZTfVZbB8FkCgu+zJtCx5hq46vIHm8KX0m1zLIeUtGsI
|
||||
hkly+5v52f3sEMlddyoZZkfjRddETk2co09q3oNaP1LYxN5G+TvZDhpdE+PrDsNT
|
||||
wO4uU2d9hVIP3T49heLieZ6KVxyp1FsDYzo0CNlIDwIDAQABo4GOMIGLMB0GA1Ud
|
||||
DgQWBBSKeJDl8FDnjHXkuMCh6OmbshqdMjBPBgNVHSMESDBGgBSKeJDl8FDnjHXk
|
||||
uMCh6OmbshqdMqEYpBYwFDESMBAGA1UEAwwJSkZfc2VydmVyghRd7fuTPbKqDIvb
|
||||
Fd+9oZHOXPvLBjAMBgNVHRMEBTADAQH/MAsGA1UdDwQEAwIBBjANBgkqhkiG9w0B
|
||||
AQsFAAOCAQEARIg2x4Tit/6ZydMlle6ku32t75OMCVQoe7fUkRjNe8pCkZjZXLy9
|
||||
QIRwoqW3FRT8+mQjctZk3NsyLStF8Rc/fFvpjGY/hiEQ/RV1K2/IZ9hcswp/LRzQ
|
||||
ElDwXhe4zlcDT10GjHYYx221SR+ijgicZcaXgb9f3uZKIrPgyb8qB4KCQS8gPtCV
|
||||
1VmPM5/svVCI93G+xT92XBHa47fgV5GEn7Snah2UgFol5h7/KX/Sa2q0pfBlzqmt
|
||||
CutfEbYcwSxkoLsEUIW8KMoEAIsO+KIsraS6EXlRdT82Ui+UZWVPZABlzifCl+AV
|
||||
LzBrLwt2OeoEI1h65EyzzE7gDsjrE3JR/Q==
|
||||
-----END CERTIFICATE-----
|
||||
</ca>
|
||||
<cert>
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
d1:ae:61:45:8e:84:e3:8e:5b:92:3f:aa:bb:81:9d:59
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: CN=JF_server
|
||||
Validity
|
||||
Not Before: Feb 23 20:30:31 2023 GMT
|
||||
Not After : May 28 20:30:31 2025 GMT
|
||||
Subject: CN=remoteclient
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: id-ecPublicKey
|
||||
Public-Key: (384 bit)
|
||||
pub:
|
||||
04:65:e9:86:35:01:c3:d7:0e:16:3d:89:90:3c:cb:
|
||||
a0:5f:d2:04:f7:b6:32:84:1e:a0:dc:6a:1d:16:a0:
|
||||
6f:47:a3:b5:7d:4c:39:bd:d0:70:18:34:e8:16:67:
|
||||
d4:5b:4c:ca:ce:ea:f0:75:5f:55:72:09:4b:f5:dd:
|
||||
80:f1:d5:db:e6:26:09:e4:34:3b:ca:89:f3:3a:40:
|
||||
91:31:14:c6:ff:06:8d:8e:f9:ba:8f:47:df:40:41:
|
||||
f4:6b:84:f8:e5:e8:70
|
||||
ASN1 OID: secp384r1
|
||||
NIST CURVE: P-384
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
X509v3 Subject Key Identifier:
|
||||
23:F8:BF:EB:8E:A3:77:B3:2B:6A:FA:16:7A:39:B2:C2:47:31:9F:76
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:8A:78:90:E5:F0:50:E7:8C:75:E4:B8:C0:A1:E8:E9:9B:B2:1A:9D:32
|
||||
DirName:/CN=JF_server
|
||||
serial:5D:ED:FB:93:3D:B2:AA:0C:8B:DB:15:DF:BD:A1:91:CE:5C:FB:CB:06
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication
|
||||
X509v3 Key Usage:
|
||||
Digital Signature
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Signature Value:
|
||||
27:af:ff:e0:98:8e:d1:6c:39:d7:40:97:df:ea:5a:fc:57:31:
|
||||
a2:92:0c:d3:4c:4b:74:22:9e:47:01:9b:0f:e0:a4:6c:dc:ef:
|
||||
14:b7:93:0f:99:93:ec:c9:96:dc:51:58:d3:ac:eb:f1:10:48:
|
||||
ba:96:54:25:32:2a:89:66:cb:ca:13:b4:75:cc:4e:2a:5d:7c:
|
||||
bb:b9:15:28:c0:32:59:f0:66:e5:fe:d8:14:14:2c:fb:df:6e:
|
||||
1e:b6:53:c9:f0:77:68:54:b9:21:4b:0c:a4:d6:bc:4d:c2:a3:
|
||||
de:d0:9f:ef:67:68:3e:c6:d4:da:d5:6c:92:80:cf:2e:8d:04:
|
||||
59:c8:39:9f:22:4a:04:28:3e:e8:cf:02:73:73:a6:59:d4:e5:
|
||||
9c:77:55:41:00:5c:c2:23:61:df:44:5c:ad:a8:bc:15:57:2d:
|
||||
ae:89:99:a7:33:8f:d3:75:02:21:91:f6:38:34:23:68:70:8f:
|
||||
99:0f:53:27:6d:52:9a:9b:f3:62:cf:20:bc:f5:91:41:78:fc:
|
||||
92:09:2f:3e:bb:2d:9b:69:39:7f:c4:b1:a8:62:64:27:3f:27:
|
||||
2d:16:c4:3e:0d:51:c9:f7:4f:40:f0:fd:55:a9:44:36:31:59:
|
||||
b7:08:6a:3c:28:31:8a:43:c0:b9:05:44:75:48:6d:94:24:c6:
|
||||
b2:fc:f7:33
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIICqTCCAZGgAwIBAgIRANGuYUWOhOOOW5I/qruBnVkwDQYJKoZIhvcNAQELBQAw
|
||||
FDESMBAGA1UEAwwJSkZfc2VydmVyMB4XDTIzMDIyMzIwMzAzMVoXDTI1MDUyODIw
|
||||
MzAzMVowFzEVMBMGA1UEAwwMcmVtb3RlY2xpZW50MHYwEAYHKoZIzj0CAQYFK4EE
|
||||
ACIDYgAEZemGNQHD1w4WPYmQPMugX9IE97YyhB6g3GodFqBvR6O1fUw5vdBwGDTo
|
||||
FmfUW0zKzurwdV9VcglL9d2A8dXb5iYJ5DQ7yonzOkCRMRTG/waNjvm6j0ffQEH0
|
||||
a4T45ehwo4GgMIGdMAkGA1UdEwQCMAAwHQYDVR0OBBYEFCP4v+uOo3ezK2r6Fno5
|
||||
ssJHMZ92ME8GA1UdIwRIMEaAFIp4kOXwUOeMdeS4wKHo6ZuyGp0yoRikFjAUMRIw
|
||||
EAYDVQQDDAlKRl9zZXJ2ZXKCFF3t+5M9sqoMi9sV372hkc5c+8sGMBMGA1UdJQQM
|
||||
MAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAQEAJ6//
|
||||
4JiO0Ww510CX3+pa/FcxopIM00xLdCKeRwGbD+CkbNzvFLeTD5mT7MmW3FFY06zr
|
||||
8RBIupZUJTIqiWbLyhO0dcxOKl18u7kVKMAyWfBm5f7YFBQs+99uHrZTyfB3aFS5
|
||||
IUsMpNa8TcKj3tCf72doPsbU2tVskoDPLo0EWcg5nyJKBCg+6M8Cc3OmWdTlnHdV
|
||||
QQBcwiNh30Rcrai8FVctromZpzOP03UCIZH2ODQjaHCPmQ9TJ21SmpvzYs8gvPWR
|
||||
QXj8kgkvPrstm2k5f8SxqGJkJz8nLRbEPg1RyfdPQPD9ValENjFZtwhqPCgxikPA
|
||||
uQVEdUhtlCTGsvz3Mw==
|
||||
-----END CERTIFICATE-----
|
||||
</cert>
|
||||
<key>
|
||||
-----BEGIN PRIVATE KEY-----
|
||||
MIG2AgEAMBAGByqGSM49AgEGBSuBBAAiBIGeMIGbAgEBBDBTe+pBwBZIEMj0jszW
|
||||
fZEx67ft6630EHlFhaCHTXW9Nw25eDC2kfm2xwbjb093E++hZANiAARl6YY1AcPX
|
||||
DhY9iZA8y6Bf0gT3tjKEHqDcah0WoG9Ho7V9TDm90HAYNOgWZ9RbTMrO6vB1X1Vy
|
||||
CUv13YDx1dvmJgnkNDvKifM6QJExFMb/Bo2O+bqPR99AQfRrhPjl6HA=
|
||||
-----END PRIVATE KEY-----
|
||||
</key>
|
||||
<tls-crypt>
|
||||
#
|
||||
# 2048 bit OpenVPN static key
|
||||
#
|
||||
-----BEGIN OpenVPN Static key V1-----
|
||||
4c828cbf0e58f927758e9471c1b6f03b
|
||||
2e77b2c634bad76df0570dd8f47184d6
|
||||
3921e25c6e6cbe4af4b64aad89d12425
|
||||
a9fca69ae08802b5ed583632c26678b0
|
||||
cc28c481c3831d1b2204dc30cd466395
|
||||
ccb8cd82cd2259c956b510c9a56e842a
|
||||
8693c44dca462f0ab7be3856abe9bbe1
|
||||
95a6ffd3b0237225b9497c7a0df05ad8
|
||||
2f2e0a8bff97c927d2890906d0105947
|
||||
fa3430fc779583772382534fb880add6
|
||||
8d5592fa4ff384d3e96c560019b5835f
|
||||
095da9b2fb33dbfbc1ffce9560908271
|
||||
ee96e02ccecc9d51b9dda79a77704a1d
|
||||
4407d7c805e6950854fe232adee02a12
|
||||
b09af2d9bfe04868a9e2e942dc64eb81
|
||||
9e062ab9f781e52d263195a58db72ebe
|
||||
-----END OpenVPN Static key V1-----
|
||||
</tls-crypt>
|
||||
321
OpenVPN/server.conf
Normal file
321
OpenVPN/server.conf
Normal file
@ -0,0 +1,321 @@
|
||||
#################################################
|
||||
# Sample OpenVPN 2.0 config file for #
|
||||
# multi-client server. #
|
||||
# #
|
||||
# This file is for the server side #
|
||||
# of a many-clients <-> one-server #
|
||||
# OpenVPN configuration. #
|
||||
# #
|
||||
# OpenVPN also supports #
|
||||
# single-machine <-> single-machine #
|
||||
# configurations (See the Examples page #
|
||||
# on the web site for more info). #
|
||||
# #
|
||||
# This config should work on Windows #
|
||||
# or Linux/BSD systems. Remember on #
|
||||
# Windows to quote pathnames and use #
|
||||
# double backslashes, e.g.: #
|
||||
# "C:\\Program Files\\OpenVPN\\config\\foo.key" #
|
||||
# #
|
||||
# Comments are preceded with '#' or ';' #
|
||||
#################################################
|
||||
|
||||
# Which local IP address should OpenVPN
|
||||
# listen on? (optional)
|
||||
;local a.b.c.d
|
||||
|
||||
# Which TCP/UDP port should OpenVPN listen on?
|
||||
# If you want to run multiple OpenVPN instances
|
||||
# on the same machine, use a different port
|
||||
# number for each one. You will need to
|
||||
# open up this port on your firewall.
|
||||
port 1194
|
||||
|
||||
# TCP or UDP server?
|
||||
;proto tcp
|
||||
proto udp
|
||||
|
||||
# "dev tun" will create a routed IP tunnel,
|
||||
# "dev tap" will create an ethernet tunnel.
|
||||
# Use "dev tap0" if you are ethernet bridging
|
||||
# and have precreated a tap0 virtual interface
|
||||
# and bridged it with your ethernet interface.
|
||||
# If you want to control access policies
|
||||
# over the VPN, you must create firewall
|
||||
# rules for the the TUN/TAP interface.
|
||||
# On non-Windows systems, you can give
|
||||
# an explicit unit number, such as tun0.
|
||||
# On Windows, use "dev-node" for this.
|
||||
# On most systems, the VPN will not function
|
||||
# unless you partially or fully disable
|
||||
# the firewall for the TUN/TAP interface.
|
||||
;dev tap
|
||||
dev tun
|
||||
|
||||
# Windows needs the TAP-Win32 adapter name
|
||||
# from the Network Connections panel if you
|
||||
# have more than one. On XP SP2 or higher,
|
||||
# you may need to selectively disable the
|
||||
# Windows firewall for the TAP adapter.
|
||||
# Non-Windows systems usually don't need this.
|
||||
;dev-node MyTap
|
||||
|
||||
# SSL/TLS root certificate (ca), certificate
|
||||
# (cert), and private key (key). Each client
|
||||
# and the server must have their own cert and
|
||||
# key file. The server and all clients will
|
||||
# use the same ca file.
|
||||
#
|
||||
# See the "easy-rsa" directory for a series
|
||||
# of scripts for generating RSA certificates
|
||||
# and private keys. Remember to use
|
||||
# a unique Common Name for the server
|
||||
# and each of the client certificates.
|
||||
#
|
||||
# Any X509 key management system can be used.
|
||||
# OpenVPN can also use a PKCS #12 formatted key file
|
||||
# (see "pkcs12" directive in man page).
|
||||
ca ca.crt
|
||||
cert DO_server.crt
|
||||
key DO_server.key # This file should be kept secret
|
||||
|
||||
# Diffie hellman parameters.
|
||||
# Generate your own with:
|
||||
# openssl dhparam -out dh2048.pem 2048
|
||||
;dh dh2048.pem
|
||||
dh none
|
||||
|
||||
# Network topology
|
||||
# Should be subnet (addressing via IP)
|
||||
# unless Windows clients v2.0.9 and lower have to
|
||||
# be supported (then net30, i.e. a /30 per client)
|
||||
# Defaults to net30 (not recommended)
|
||||
;topology subnet
|
||||
|
||||
# Configure server mode and supply a VPN subnet
|
||||
# for OpenVPN to draw client addresses from.
|
||||
# The server will take 10.8.0.1 for itself,
|
||||
# the rest will be made available to clients.
|
||||
# Each client will be able to reach the server
|
||||
# on 10.8.0.1. Comment this line out if you are
|
||||
# ethernet bridging. See the man page for more info.
|
||||
server 10.8.0.0 255.255.255.0
|
||||
|
||||
# Maintain a record of client <-> virtual IP address
|
||||
# associations in this file. If OpenVPN goes down or
|
||||
# is restarted, reconnecting clients can be assigned
|
||||
# the same virtual IP address from the pool that was
|
||||
# previously assigned.
|
||||
ifconfig-pool-persist /var/log/openvpn/ipp.txt
|
||||
|
||||
# Configure server mode for ethernet bridging.
|
||||
# You must first use your OS's bridging capability
|
||||
# to bridge the TAP interface with the ethernet
|
||||
# NIC interface. Then you must manually set the
|
||||
# IP/netmask on the bridge interface, here we
|
||||
# assume 10.8.0.4/255.255.255.0. Finally we
|
||||
# must set aside an IP range in this subnet
|
||||
# (start=10.8.0.50 end=10.8.0.100) to allocate
|
||||
# to connecting clients. Leave this line commented
|
||||
# out unless you are ethernet bridging.
|
||||
;server-bridge 10.8.0.4 255.255.255.0 10.8.0.50 10.8.0.100
|
||||
|
||||
# Configure server mode for ethernet bridging
|
||||
# using a DHCP-proxy, where clients talk
|
||||
# to the OpenVPN server-side DHCP server
|
||||
# to receive their IP address allocation
|
||||
# and DNS server addresses. You must first use
|
||||
# your OS's bridging capability to bridge the TAP
|
||||
# interface with the ethernet NIC interface.
|
||||
# Note: this mode only works on clients (such as
|
||||
# Windows), where the client-side TAP adapter is
|
||||
# bound to a DHCP client.
|
||||
;server-bridge
|
||||
|
||||
# Push routes to the client to allow it
|
||||
# to reach other private subnets behind
|
||||
# the server. Remember that these
|
||||
# private subnets will also need
|
||||
# to know to route the OpenVPN client
|
||||
# address pool (10.8.0.0/255.255.255.0)
|
||||
# back to the OpenVPN server.
|
||||
push "route 192.168.10.0 255.255.255.0"
|
||||
;push "route 192.168.30.0 255.255.255.0"
|
||||
|
||||
# To assign specific IP addresses to specific
|
||||
# clients or if a connecting client has a private
|
||||
# subnet behind it that should also have VPN access,
|
||||
# use the subdirectory "ccd" for client-specific
|
||||
# configuration files (see man page for more info).
|
||||
|
||||
# EXAMPLE: Suppose the client
|
||||
# having the certificate common name "Thelonious"
|
||||
# also has a small subnet behind his connecting
|
||||
# machine, such as 192.168.40.128/255.255.255.248.
|
||||
# First, uncomment out these lines:
|
||||
client-config-dir ccd
|
||||
;route 192.168.40.128 255.255.255.248
|
||||
route 192.168.10.0 255.255.255.0
|
||||
|
||||
# Then create a file ccd/Thelonious with this line:
|
||||
# iroute 192.168.40.128 255.255.255.248
|
||||
# This will allow Thelonious' private subnet to
|
||||
# access the VPN. This example will only work
|
||||
# if you are routing, not bridging, i.e. you are
|
||||
# using "dev tun" and "server" directives.
|
||||
|
||||
# EXAMPLE: Suppose you want to give
|
||||
# Thelonious a fixed VPN IP address of 10.9.0.1.
|
||||
# First uncomment out these lines:
|
||||
;client-config-dir ccd
|
||||
;route 10.9.0.0 255.255.255.252
|
||||
# Then add this line to ccd/Thelonious:
|
||||
# ifconfig-push 10.9.0.1 10.9.0.2
|
||||
|
||||
# Suppose that you want to enable different
|
||||
# firewall access policies for different groups
|
||||
# of clients. There are two methods:
|
||||
# (1) Run multiple OpenVPN daemons, one for each
|
||||
# group, and firewall the TUN/TAP interface
|
||||
# for each group/daemon appropriately.
|
||||
# (2) (Advanced) Create a script to dynamically
|
||||
# modify the firewall in response to access
|
||||
# from different clients. See man
|
||||
# page for more info on learn-address script.
|
||||
;learn-address ./script
|
||||
|
||||
# If enabled, this directive will configure
|
||||
# all clients to redirect their default
|
||||
# network gateway through the VPN, causing
|
||||
# all IP traffic such as web browsing and
|
||||
# and DNS lookups to go through the VPN
|
||||
# (The OpenVPN server machine may need to NAT
|
||||
# or bridge the TUN/TAP interface to the internet
|
||||
# in order for this to work properly).
|
||||
;push "redirect-gateway def1 bypass-dhcp"
|
||||
|
||||
# Certain Windows-specific network settings
|
||||
# can be pushed to clients, such as DNS
|
||||
# or WINS server addresses. CAVEAT:
|
||||
# http://openvpn.net/faq.html#dhcpcaveats
|
||||
# The addresses below refer to the public
|
||||
# DNS servers provided by opendns.com.
|
||||
;push "dhcp-option DNS 208.67.222.222"
|
||||
;push "dhcp-option DNS 208.67.220.220"
|
||||
|
||||
# Uncomment this directive to allow different
|
||||
# clients to be able to "see" each other.
|
||||
# By default, clients will only see the server.
|
||||
# To force clients to only see the server, you
|
||||
# will also need to appropriately firewall the
|
||||
# server's TUN/TAP interface.
|
||||
client-to-client
|
||||
|
||||
# Uncomment this directive if multiple clients
|
||||
# might connect with the same certificate/key
|
||||
# files or common names. This is recommended
|
||||
# only for testing purposes. For production use,
|
||||
# each client should have its own certificate/key
|
||||
# pair.
|
||||
#
|
||||
# IF YOU HAVE NOT GENERATED INDIVIDUAL
|
||||
# CERTIFICATE/KEY PAIRS FOR EACH CLIENT,
|
||||
# EACH HAVING ITS OWN UNIQUE "COMMON NAME",
|
||||
# UNCOMMENT THIS LINE OUT.
|
||||
;duplicate-cn
|
||||
|
||||
# The keepalive directive causes ping-like
|
||||
# messages to be sent back and forth over
|
||||
# the link so that each side knows when
|
||||
# the other side has gone down.
|
||||
# Ping every 10 seconds, assume that remote
|
||||
# peer is down if no ping received during
|
||||
# a 120 second time period.
|
||||
keepalive 10 120
|
||||
|
||||
# For extra security beyond that provided
|
||||
# by SSL/TLS, create an "HMAC firewall"
|
||||
# to help block DoS attacks and UDP port flooding.
|
||||
#
|
||||
# Generate with:
|
||||
# openvpn --genkey tls-auth ta.key
|
||||
#
|
||||
# The server and each client must have
|
||||
# a copy of this key.
|
||||
# The second parameter should be '0'
|
||||
# on the server and '1' on the clients.
|
||||
;tls-auth ta.key 0 # This file is secret
|
||||
tls-crypt ta.key
|
||||
|
||||
# Select a cryptographic cipher.
|
||||
# This config item must be copied to
|
||||
# the client config file as well.
|
||||
# Note that v2.4 client/server will automatically
|
||||
# negotiate AES-256-GCM in TLS mode.
|
||||
# See also the ncp-cipher option in the manpage
|
||||
;cipher AES-256-CBC
|
||||
cipher AES-256-GCM
|
||||
auth SHA256
|
||||
|
||||
# Enable compression on the VPN link and push the
|
||||
# option to the client (v2.4+ only, for earlier
|
||||
# versions see below)
|
||||
;compress lz4-v2
|
||||
;push "compress lz4-v2"
|
||||
|
||||
# For compression compatible with older clients use comp-lzo
|
||||
# If you enable it here, you must also
|
||||
# enable it in the client config file.
|
||||
;comp-lzo
|
||||
|
||||
# The maximum number of concurrently connected
|
||||
# clients we want to allow.
|
||||
;max-clients 100
|
||||
|
||||
# It's a good idea to reduce the OpenVPN
|
||||
# daemon's privileges after initialization.
|
||||
#
|
||||
# You can uncomment this out on
|
||||
# non-Windows systems.
|
||||
user nobody
|
||||
group nogroup
|
||||
|
||||
# The persist options will try to avoid
|
||||
# accessing certain resources on restart
|
||||
# that may no longer be accessible because
|
||||
# of the privilege downgrade.
|
||||
persist-key
|
||||
persist-tun
|
||||
|
||||
# Output a short status file showing
|
||||
# current connections, truncated
|
||||
# and rewritten every minute.
|
||||
status /var/log/openvpn/openvpn-status.log
|
||||
|
||||
# By default, log messages will go to the syslog (or
|
||||
# on Windows, if running as a service, they will go to
|
||||
# the "\Program Files\OpenVPN\log" directory).
|
||||
# Use log or log-append to override this default.
|
||||
# "log" will truncate the log file on OpenVPN startup,
|
||||
# while "log-append" will append to it. Use one
|
||||
# or the other (but not both).
|
||||
;log /var/log/openvpn/openvpn.log
|
||||
;log-append /var/log/openvpn/openvpn.log
|
||||
|
||||
# Set the appropriate level of log
|
||||
# file verbosity.
|
||||
#
|
||||
# 0 is silent, except for fatal errors
|
||||
# 4 is reasonable for general usage
|
||||
# 5 and 6 can help to debug connection problems
|
||||
# 9 is extremely verbose
|
||||
verb 3
|
||||
|
||||
# Silence repeating messages. At most 20
|
||||
# sequential messages of the same message
|
||||
# category will be output to the log.
|
||||
;mute 20
|
||||
|
||||
# Notify the client that when the server restarts so it
|
||||
# can automatically reconnect.
|
||||
explicit-exit-notify 1
|
||||
@ -7094,3 +7094,93 @@ Démarrage du logiciel Otarcik CAN le 2023-03-15 à 17:33:01
|
||||
2023-03-15 17:33:01 Dispositif [ParkerCAN] initialisé avec succès!
|
||||
2023-03-15 17:35:21 Déinitialisation du module PCAN USB ID 81
|
||||
2023-03-15 17:35:21 Module PCAN USB déinitialisé avec succès...
|
||||
|
||||
|
||||
********************************************************************
|
||||
Démarrage du logiciel Otarcik CAN le 2023-03-16 à 05:28:16
|
||||
********************************************************************
|
||||
2023-03-16 05:28:16 Démarrage du logiciel OtarcikCAN
|
||||
2023-03-16 05:28:16 Chargement de la configuration système...
|
||||
2023-03-16 05:28:16 Configuration système chargée avec succès!
|
||||
2023-03-16 05:28:16 Initialisation du dispositif [ParkerCAN]
|
||||
2023-03-16 05:28:16 Chargement de la base de données D:/Main/Dev/YULTek/Otarcik_CAN/IVT-S_all-variations_12082020.dbc
|
||||
2023-03-16 05:28:16 Base de données chargée avec succès. Flags: 0x0
|
||||
2023-03-16 05:28:16 Démarrage d'un module CAN...
|
||||
2023-03-16 05:28:16 Initialisation d'un module PCAN. Channel:81, Baudrate:28
|
||||
2023-03-16 05:28:16 Impossible d'initialiser un module USB PCAN. Erreur:The driver is not loaded
|
||||
2023-03-16 05:28:16 Impossible d'initialiser le matériel CAN
|
||||
2023-03-16 05:28:16 Le dispositif [ParkerCAN] n'a pas pu s'initialiser
|
||||
2023-03-16 05:28:20 Déinitialisation du module PCAN USB ID 81
|
||||
2023-03-16 05:28:20 Impossible de déinitialiser un module USB PCAN.. Error:The transmit buffer in CAN controller is full
|
||||
|
||||
|
||||
********************************************************************
|
||||
Démarrage du logiciel Otarcik CAN le 2023-03-16 à 05:28:50
|
||||
********************************************************************
|
||||
2023-03-16 05:28:50 Démarrage du logiciel OtarcikCAN
|
||||
2023-03-16 05:28:50 Chargement de la configuration système...
|
||||
2023-03-16 05:28:50 Configuration système chargée avec succès!
|
||||
2023-03-16 05:28:50 Initialisation du dispositif [ParkerCAN]
|
||||
2023-03-16 05:28:50 Chargement de la base de données D:/Main/Dev/YULTek/Otarcik_CAN/IVT-S_all-variations_12082020.dbc
|
||||
2023-03-16 05:28:50 Base de données chargée avec succès. Flags: 0x0
|
||||
2023-03-16 05:28:50 Démarrage d'un module CAN...
|
||||
2023-03-16 05:28:50 Initialisation d'un module PCAN. Channel:81, Baudrate:28
|
||||
2023-03-16 05:28:50 Impossible d'initialiser un module USB PCAN. Erreur:The driver is not loaded
|
||||
2023-03-16 05:28:50 Impossible d'initialiser le matériel CAN
|
||||
2023-03-16 05:28:50 Le dispositif [ParkerCAN] n'a pas pu s'initialiser
|
||||
2023-03-16 05:28:52 Déinitialisation du module PCAN USB ID 81
|
||||
2023-03-16 05:28:52 Impossible de déinitialiser un module USB PCAN.. Error:The transmit buffer in CAN controller is full
|
||||
|
||||
|
||||
********************************************************************
|
||||
Démarrage du logiciel Otarcik CAN le 2023-03-16 à 11:15:58
|
||||
********************************************************************
|
||||
2023-03-16 11:15:58 Démarrage du logiciel OtarcikCAN
|
||||
2023-03-16 11:15:58 Chargement de la configuration système...
|
||||
2023-03-16 11:15:58 Configuration système chargée avec succès!
|
||||
2023-03-16 11:15:58 Initialisation du dispositif [ParkerCAN]
|
||||
2023-03-16 11:15:58 Chargement de la base de données D:/Main/Dev/YULTek/Otarcik_CAN/IVT-S_all-variations_12082020.dbc
|
||||
2023-03-16 11:15:58 Base de données chargée avec succès. Flags: 0x0
|
||||
2023-03-16 11:15:58 Démarrage d'un module CAN...
|
||||
2023-03-16 11:15:58 Initialisation d'un module PCAN. Channel:81, Baudrate:28
|
||||
2023-03-16 11:15:58 Impossible d'initialiser un module USB PCAN. Erreur:The driver is not loaded
|
||||
2023-03-16 11:15:58 Impossible d'initialiser le matériel CAN
|
||||
2023-03-16 11:15:58 Le dispositif [ParkerCAN] n'a pas pu s'initialiser
|
||||
2023-03-16 11:16:33 Déinitialisation du module PCAN USB ID 81
|
||||
2023-03-16 11:16:33 Impossible de déinitialiser un module USB PCAN.. Error:The transmit buffer in CAN controller is full
|
||||
|
||||
|
||||
********************************************************************
|
||||
Démarrage du logiciel Otarcik CAN le 2023-03-17 à 09:52:31
|
||||
********************************************************************
|
||||
2023-03-17 09:52:31 Démarrage du logiciel OtarcikCAN
|
||||
2023-03-17 09:52:31 Chargement de la configuration système...
|
||||
2023-03-17 09:52:31 Configuration système chargée avec succès!
|
||||
2023-03-17 09:52:31 Initialisation du dispositif [ParkerCAN]
|
||||
2023-03-17 09:52:31 Chargement de la base de données D:/Main/Dev/YULTek/Otarcik_CAN/IVT-S_all-variations_12082020.dbc
|
||||
2023-03-17 09:52:31 Base de données chargée avec succès. Flags: 0x0
|
||||
2023-03-17 09:52:31 Démarrage d'un module CAN...
|
||||
2023-03-17 09:52:31 Initialisation d'un module PCAN. Channel:81, Baudrate:28
|
||||
2023-03-17 09:52:31 Impossible d'initialiser un module USB PCAN. Erreur:The driver is not loaded
|
||||
2023-03-17 09:52:31 Impossible d'initialiser le matériel CAN
|
||||
2023-03-17 09:52:31 Le dispositif [ParkerCAN] n'a pas pu s'initialiser
|
||||
2023-03-17 09:53:34 Déinitialisation du module PCAN USB ID 81
|
||||
2023-03-17 09:53:34 Impossible de déinitialiser un module USB PCAN.. Error:The transmit buffer in CAN controller is full
|
||||
|
||||
|
||||
********************************************************************
|
||||
Démarrage du logiciel Otarcik CAN le 2023-03-17 à 09:53:38
|
||||
********************************************************************
|
||||
2023-03-17 09:53:38 Démarrage du logiciel OtarcikCAN
|
||||
2023-03-17 09:53:38 Chargement de la configuration système...
|
||||
2023-03-17 09:53:38 Configuration système chargée avec succès!
|
||||
2023-03-17 09:53:38 Initialisation du dispositif [ParkerCAN]
|
||||
2023-03-17 09:53:38 Chargement de la base de données D:/Main/Dev/YULTek/Otarcik_CAN/IVT-S_all-variations_12082020.dbc
|
||||
2023-03-17 09:53:38 Base de données chargée avec succès. Flags: 0x0
|
||||
2023-03-17 09:53:38 Démarrage d'un module CAN...
|
||||
2023-03-17 09:53:38 Initialisation d'un module PCAN. Channel:81, Baudrate:28
|
||||
2023-03-17 09:53:38 Impossible d'initialiser un module USB PCAN. Erreur:The driver is not loaded
|
||||
2023-03-17 09:53:38 Impossible d'initialiser le matériel CAN
|
||||
2023-03-17 09:53:38 Le dispositif [ParkerCAN] n'a pas pu s'initialiser
|
||||
2023-03-17 09:53:47 Déinitialisation du module PCAN USB ID 81
|
||||
2023-03-17 09:53:47 Impossible de déinitialiser un module USB PCAN.. Error:The transmit buffer in CAN controller is full
|
||||
|
||||
@ -6,7 +6,7 @@
|
||||
<rect>
|
||||
<x>0</x>
|
||||
<y>0</y>
|
||||
<width>1456</width>
|
||||
<width>1725</width>
|
||||
<height>527</height>
|
||||
</rect>
|
||||
</property>
|
||||
|
||||
Binary file not shown.
@ -27,7 +27,7 @@ public:
|
||||
{
|
||||
if (CGeneralStatusPage->objectName().isEmpty())
|
||||
CGeneralStatusPage->setObjectName(QString::fromUtf8("CGeneralStatusPage"));
|
||||
CGeneralStatusPage->resize(1456, 527);
|
||||
CGeneralStatusPage->resize(1725, 527);
|
||||
mGenMsgTextEdit = new QTextEdit(CGeneralStatusPage);
|
||||
mGenMsgTextEdit->setObjectName(QString::fromUtf8("mGenMsgTextEdit"));
|
||||
mGenMsgTextEdit->setGeometry(QRect(30, 20, 1141, 451));
|
||||
|
||||
@ -0,0 +1,580 @@
|
||||
RELEASE NOTES
|
||||
=============
|
||||
Silicon Labs Virtual COM Port (VCP) Universal Driver for Windows 10 version 1803 and later, windows 11
|
||||
|
||||
Package version: 11.2.0
|
||||
Release date: 2022-10-21
|
||||
|
||||
This package contains a Virtual COM Port Universal driver for Microsoft
|
||||
Windows 10 version 1803 and later, windows 11 versions of Windows for use with Silicon Labs VCP USB Serial Bridges. These devices
|
||||
include the CP2102N, CP2102, CP2103, CP2104, CP2105, CP2108, CP2109.
|
||||
|
||||
OS VERSIONS
|
||||
-----------
|
||||
This package provides the CP210x VCP driver for the following versions
|
||||
of Windows:
|
||||
|
||||
- Windows 10 version 1803 and later (x64, x86)
|
||||
- Windows 11 (x64)
|
||||
|
||||
CHOOSING VCP DRIVER VERSION
|
||||
---------------------------
|
||||
VCP drivers of version 11.1.0 and later are released for Microsoft
|
||||
Windows 10 version 1803 and later, windows 11 versions of Windows as Universal Drivers.
|
||||
This means they do not work on older version of Windows
|
||||
such as Window 7 and 8.1. You should use this driver if you only need
|
||||
support for Windows 10 version 1803 and later, windows 11, or you need the Universal driver. If you require
|
||||
support on older versions of Windows, you should use the legacy VCP driver
|
||||
which can be found on the Silicon Labs web site. The legacy Windows VCP
|
||||
drivers have version numbers less than 10.0.0.
|
||||
|
||||
CONTENTS
|
||||
--------
|
||||
The VCP driver package contains the following files and directories:
|
||||
- silabser.inf -- Driver information file
|
||||
- SLAB_License_Agreement_VCP_Windows.txt -- Software License
|
||||
- CP210x_Universal_Windows_Driver_ReleaseNotes.txt -- this file
|
||||
|
||||
Additional files needed by installer
|
||||
- silabser.cat
|
||||
- x64/silabser.sys
|
||||
- x86/silabser.sys
|
||||
|
||||
INSTALLING
|
||||
----------
|
||||
The VCP driver is automatically installed by Windows Update for CP210x with
|
||||
alternate PID values of 0xEA63, 0xEA7A, and 0xEA7B. These are not default
|
||||
values.
|
||||
|
||||
Otherwise, unzip the .zip file and you will have a directory containing the
|
||||
driver installer files.
|
||||
|
||||
### Prompted install ###
|
||||
|
||||
If Windows prompts you to install a driver for a CP210x device
|
||||
(for example, if you plug a CP210x into your computer):
|
||||
|
||||
1. Use the dialog to browse for the driver location
|
||||
2. Locate the driver folder (that you previously unzipped)
|
||||
3. Follow the instructions
|
||||
|
||||
### Manual install ###
|
||||
|
||||
1. Using Windows File Explorer, locate the driver folder
|
||||
(that you previously unzipped)
|
||||
2. Right click on the silabser.inf file and select Install
|
||||
3. Follow the instructions
|
||||
|
||||
UNINSTALLING
|
||||
------------
|
||||
1. The device must be plugged in
|
||||
2. Run Device Manager
|
||||
3. Locate the device you want to uninstall
|
||||
4. Right click on the device and choose "uninstall"
|
||||
5. Follow the instructions
|
||||
|
||||
SETUP REGISTRY KEY
|
||||
------------------
|
||||
Registry keys are used for setting some parameters of the serial port
|
||||
For setting these parameters, we have 2 ways:
|
||||
- Modify registry value using registry editor of Windows
|
||||
- Modify registry value using INF file
|
||||
|
||||
### Modify the registry key's value in Registry Editor ###
|
||||
|
||||
1. Open Command Prompt on windows => type command: regedit
|
||||
2. Registry tree is displayed
|
||||
3. Registry key is allocated at 3 position:
|
||||
- Parameters keys: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\silabser
|
||||
- Software keys: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\<ClassID>\
|
||||
- Hardware keys: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\USB\deviceID\
|
||||
4. Right-click each key => select modify => edit value for key
|
||||
|
||||
### Enable the registry key in driver's INF file ###
|
||||
|
||||
1. To enable the registry key, Please remove character ';' to uncomment the statement
|
||||
2. Registry key is allocated at 3 position:
|
||||
- Parameters keys: [silabser.AddService.AddReg] directives
|
||||
- Software keys: [silabser.AddReg] directives
|
||||
- Hardware keys: [SiLabsDDInstallSection.HW.AddReg] directives
|
||||
|
||||
SUPPORT
|
||||
-------
|
||||
For technical support please visit the Silicon Labs support site:
|
||||
|
||||
https://www.silabs.com/support
|
||||
|
||||
******************************************************************************
|
||||
RELEASE NOTES FOR 11.2.0 (2022-10-21)
|
||||
|
||||
Changes for VCP Driver
|
||||
==============================================================================
|
||||
MCUSW-415 | Remove code paths for XP vs not XP which is used for
|
||||
| UsingWindows2000.
|
||||
MCUSW-416 | Improve debug statement readability by adding device specific
|
||||
| information.
|
||||
MCUSW-523 | add instruction how to setting up registry in .inf file.
|
||||
MCUSW-532 | Fix Automatic handshaking on RTS/CTS, and driver buffers
|
||||
| overran at high baud rate.
|
||||
MCUSW-1285 | add DisableIoctlIOCTL_SERIAL_PURGE in .inf file to prevent data
|
||||
| lost in close.
|
||||
|
||||
|
||||
|
||||
|
||||
******************************************************************************
|
||||
RELEASE NOTES FOR 11.1.0 (2022-03-21)
|
||||
|
||||
Changes for VCP Driver
|
||||
==============================================================================
|
||||
MCUSW-803 | CP210x device needs to send Xoff to the other side device
|
||||
| (FTDI for example) when Windows goes to sleep
|
||||
MCUSW-1038 | Fix DFx problem on Windows 11
|
||||
MCUSW-1039 | Do HLK DFx testing for Windows VCP driver version 11.1.0
|
||||
MCUSW-1045 | Update file version and driver version for Windows VCP
|
||||
| driver version 11.1.0
|
||||
MCUSW-1047 | Make the Windows VCP driver pass SDV
|
||||
MCUSW-1048 | Microsoft Windows Certified ("WHQL Certified") for Windows 11
|
||||
| version 21H2
|
||||
MCUSW-1049 | Using Dynamic api to make Windows VCP driver to be compatible
|
||||
| with different versions of Windows (Mininum required is Windows
|
||||
| 10 version 1803)
|
||||
******************************************************************************
|
||||
RELEASE NOTES FOR 11.0.0 (2021-11-05)
|
||||
|
||||
Changes for VCP Driver
|
||||
==============================================================================
|
||||
MCUSW-176 | Add report SERIAL_ERROR_QUEUEOVERRUN when driver-side receive
|
||||
| buffer is overrun
|
||||
MCUSW-889 | Fixed HLK Test error: Static Tools Logo Test
|
||||
MCUSW-749 | Fixed issue that RTS is not set to high when Windows goes to
|
||||
| sleep to make sure incoming data to CP210x won't be lost when
|
||||
| Windows is in sleeping state
|
||||
MCUSW-841 | Removed installer to make a standalone driver package. Users
|
||||
| need to use INF file to install the driver instead
|
||||
MCUSW-906 | Add Microsoft Windows Certified ("WHQL Certified") for Windows 11
|
||||
| version 21H2
|
||||
|
||||
******************************************************************************
|
||||
RELEASE NOTES FOR 10.1.10 (2021-01-13)
|
||||
|
||||
Changes for VCP Driver
|
||||
==============================================================================
|
||||
MCUSW-651 | Support baud rate up to 2187500 for CP2102, CP2104, CP2109
|
||||
MCUSW-685 | Fixed the Blue Screen issue when running Windows Hardware Lab
|
||||
| Kit for customized driver
|
||||
MCUSW-783 | Microsoft Windows Certified (aka "WHQL Certified") for Windows
|
||||
| 10 version 20H2 (2020-10-20)
|
||||
|
||||
|
||||
******************************************************************************
|
||||
RELEASE NOTES FOR 10.1.9 (2020-07-30)
|
||||
|
||||
Changes for VCP Driver
|
||||
==============================================================================
|
||||
MCUSW-566 | Remove sanity/error checking on IOCTL_SERIAL_SET_BAUD_RATE for
|
||||
| CP2103 devices.
|
||||
MCUSW-596 | Microsoft Windows Certified (aka "WHQL Certified") for Windows
|
||||
| 10 version 2004 (2020-05-27)
|
||||
MCUSW-619 | Support for Directed PoFx (DFx - Directed Power Management
|
||||
| Framework).
|
||||
|
||||
|
||||
******************************************************************************
|
||||
RELEASE NOTES FOR 10.1.8 (2019-06-24 (DriverVer = 06/20/2019,10.1.8.2466))
|
||||
|
||||
Changes for VCP Driver
|
||||
==============================================================================
|
||||
MCUSW-412 | Certified for Windows 10 RS6.
|
||||
MCUSW-484 | WDFVERIFY() added to the driver. Configurable via Registry.
|
||||
MCUSW-493 | Improved the tagging/tracking and parent-hierarchy of framework
|
||||
| objects and framework object reference counts.
|
||||
MCUSW-495 | Clear RTS on CloseHandle().
|
||||
MCUSW-508 | IOCTL_SERIAL_GET_COMMSTATUS refactored to reduce USB-bus
|
||||
| bandwidth, while still offering timely reporting.
|
||||
MCUSW-518 | WDFVerifier parameter ForceLogsInMiniDump Registry parameter
|
||||
| added for improved supportability.
|
||||
MCUSW-519 | Resolve an SDV-identified issue: do not double-complete a
|
||||
| Request on error paths.
|
||||
MCUSW-526 | Creates the framework USB device object with client contract
|
||||
| version USBD_CLIENT_CONTRACT_VERSION_602/0x602 (I.e. Register
|
||||
| with "new" (to Windows 8) Windows USB driver stack).
|
||||
|
||||
|
||||
******************************************************************************
|
||||
RELEASE NOTES FOR 10.1.7 (2019-03-26 (DriverVer = 03/26/2019,10.1.7.2399))
|
||||
|
||||
Changes for VCP Driver
|
||||
==============================================================================
|
||||
MCUSW-473 | Fix length of nul-terminated legacy Dos Name string written to
|
||||
| HARDWARE\DEVICEMAP\SERIALCOMM Registry key.
|
||||
MCUSW-483 | Fixed bug for Max Baud rate for CP2101, CP2104, CP2105 and
|
||||
| CP2108 devices.
|
||||
|
||||
|
||||
******************************************************************************
|
||||
RELEASE NOTES FOR 10.1.6 (2019-03-19 (DriverVer = 03/15/2019,10.1.6.2388))
|
||||
|
||||
Changes for VCP Driver
|
||||
==============================================================================
|
||||
MCUSW-445 | Fix a blue-screen system crash bug with handling of ioctl
|
||||
| IOCTL_SERIAL_WAIT_ON_MASK during power state changes.
|
||||
|
||||
|
||||
******************************************************************************
|
||||
RELEASE NOTES FOR 10.1.5 (2019-02-19 (DriverVer = 02/19/2019,10.1.5.2368))
|
||||
|
||||
Changes for VCP Driver
|
||||
==============================================================================
|
||||
MCUSW-414 | Implement an undocumented Registry-configured feature to ignore
|
||||
| IOCTL_SERIAL_PURGE.
|
||||
MCUSW-417 | Read many of the Registry "parameter"-type settings first from
|
||||
| the "parameters key" and then from the "hardware key", with the
|
||||
| "hardware key" taking precedence (allows "driver wide, all
|
||||
| devices" setting, but provides the capability to specify per-
|
||||
| device settings (before we only supported per-device
|
||||
| settings)).
|
||||
|
|
||||
MCUSW-439 | Fixed a bug whereby Close()-Open() on a CP2102N could get USB
|
||||
| data toggle confused (I.e. issue USB CLEAR_FEATURE(HALT) to
|
||||
| bulk endpoints to reset data toggle back to DATA0).
|
||||
MCUSW-449 | Fix a Max Baud Rate bug (use device-specific MaxBauds (from the
|
||||
| data-sheets): 3 Mbaud for CP2102N, 1 Mbaud for all other CP210x
|
||||
| devices.).
|
||||
MCUSW-450 | Fix Verification BSOD (race condition in the VCP device driver
|
||||
| that can cause double completions): Only call
|
||||
| DetachForCompletionUNcancelable on success of UNmark as
|
||||
| cancelable in handling of IOCTL_SERIAL_WAIT_ON_MASK-related
|
||||
| requests.
|
||||
|
||||
|
||||
******************************************************************************
|
||||
RELEASE NOTES FOR 10.1.4 (2018-12-07 (DriverVer = 11/26/2018,10.1.4.2290))
|
||||
|
||||
Changes for VCP Driver
|
||||
==============================================================================
|
||||
MCUSW-134 | Fixed an issue with handling of IOCTL_SERIAL_SET_WAIT_MASK,
|
||||
| IOCTL_SERIAL_WAIT_ON_MASK, with the SERIAL_EV_RXCHAR event and
|
||||
| data arriving from the device into the driver. Previously, an
|
||||
| indication of arriving data was made before making the data
|
||||
| available, causing, in some conditions, subsequent requests for
|
||||
| data after notification of data available to not deliver any
|
||||
| data.
|
||||
MCUSW-144 | Onecore-based editions of Windows 10 (I.e. Windows 10 IoT Core)
|
||||
| do not, by design, create PortName entries in the Registry to
|
||||
| specify the device's legacy DOS name (I.e. COM<n).
|
||||
| Consequently, VCP enhanced to not treat this as a failing
|
||||
| condition and to continue without creating legacy COM<n> DOS
|
||||
| devices.
|
||||
MCUSW-148 | Rearchitected into two VCP driver packages:
|
||||
| 1) Windows 7 and later Desktop Editions x86 and x64 driver
|
||||
| package, and
|
||||
| 2) Windows Universal (10 and later; Desktop, tablet, mobile,
|
||||
| embedded) x86, x64, ARM, ARM64 driver package.
|
||||
MCUSW-214 | Windows 10 Universal driver release (I.e. no Windows 7, 8 or
|
||||
| 8.1 support)
|
||||
MCUSW-352 | Workaround to issue where close during receipt of serial data
|
||||
| caused CP2102N to hang.
|
||||
MCUSW-369 | Certified for Windows 10 RS5.
|
||||
MCUSW-393 | Fix bug due to some BaudRate-related math causing a divide-by-
|
||||
| zero.
|
||||
MCUSW-396 | Be defensive against the impossible case of getting a NULL
|
||||
| object in the object completion routine.
|
||||
|
||||
|
||||
******************************************************************************
|
||||
RELEASE NOTES FOR 10.1.3 (2018-05-29)
|
||||
|
||||
Changes for VCP Driver
|
||||
==============================================================================
|
||||
MCUSW-326 | Clear DTR on CloseHandle().
|
||||
|
||||
|
||||
******************************************************************************
|
||||
RELEASE NOTES FOR 10.1.2 (2018-05-14)
|
||||
|
||||
Changes for VCP Driver
|
||||
==============================================================================
|
||||
MCUSW-134 | Fixed an issue with handling of IOCTL_SERIAL_SET_WAIT_MASK,
|
||||
| IOCTL_SERIAL_WAIT_ON_MASK, with the SERIAL_EV_RXCHAR event and
|
||||
| data arriving from the device into the driver. Previously, an
|
||||
| indication of arriving data was made before making the data
|
||||
| available, causing, in some conditions, subsequent requests for
|
||||
| data after notification of data available to not deliver any
|
||||
| data.
|
||||
MCUSW-211 | Windows 10 Universal driver release (I.e. no Windows 7, 8 or
|
||||
| 8.1 support)
|
||||
MCUSW-288 | Fix IOCTL_SERIAL_GET_PROPERTIES.
|
||||
MCUSW-291 | Fix IOCTL_SERIAL_GET_PROPERTIES/SERIAL_COMMPROP for CP210x-like
|
||||
| "Voice MB v2.0" device.
|
||||
MCUSW-315 | Certified for RS4/1803.
|
||||
|
||||
|
||||
******************************************************************************
|
||||
RELEASE NOTES FOR 10.1.1 (DriverVer=11/15/2017,10.1.1.1951)
|
||||
|
||||
Changes for VCP Driver
|
||||
==============================================================================
|
||||
MCUSW-134 | Fixed an issue with handling of IOCTL_SERIAL_SET_WAIT_MASK,
|
||||
| IOCTL_SERIAL_WAIT_ON_MASK, with the SERIAL_EV_RXCHAR event
|
||||
| and data arriving from the device into the driver. Previously,
|
||||
| an indication of arriving data was made before making the data
|
||||
| available, causing, in some conditions, subsequent requests
|
||||
| for data after notification of data available to not deliver
|
||||
| any data.
|
||||
|
||||
|
||||
******************************************************************************
|
||||
LEGACY HISTORY
|
||||
--------------
|
||||
Everything below is the shared development history before creation of the
|
||||
Windows 10 Universal driver. Everything above is development history of
|
||||
the Universal driver.
|
||||
|
||||
|
||||
******************************************************************************
|
||||
RELEASE NOTES FOR 6.7.5 (2017-10-13)
|
||||
|
||||
Changes for VCP Driver
|
||||
==============================================================================
|
||||
MCUSW-17 | IOCTL_SERIAL_GET_STATUS TransmittedCount fixed.
|
||||
MCUSW-19 | CP210x_GET_CONFIG_DESCRIPTOR_IOCTL returned byte count fixed.
|
||||
MCUSW-21 | Revert IOCTL_SERIAL_GET_COMMSTATUS behaviour to return cached
|
||||
| information (reverse slowdown reported with v6.7.4 in some
|
||||
| applications)
|
||||
|
|
||||
| Improve windbg logging, w.r.t. doing less when logging is not
|
||||
| enabled (say, Release builds), or when particular subsystem is
|
||||
| not enabled for logging.
|
||||
|
|
||||
MCUSW-110 | Windows 10 certified against RS2 (Creators Update).
|
||||
MCUSW-207 | In a failed initialization, discard a reference to dynamically
|
||||
| allocated memory once memory has been freed.
|
||||
MCUSW-234 | timestamp SHA2 Signatures with SHA2 timestamps
|
||||
|
||||
|
||||
|
||||
******************************************************************************
|
||||
RELEASE NOTES FOR 6.7.4.261 (2017/01/30)
|
||||
|
||||
- Device Guard compliant
|
||||
- CP210XFW-747: Add 3 new parallel PIDs one each for the single-, dual- &
|
||||
quad-port CP210x devices (to be distributed via Windows Update)
|
||||
- CP210XFW-741: Fix driver to use correct interface string index for the
|
||||
multi-interface CP210x devices (CP2105 & CP2108). Return iProduct string
|
||||
for other CP210x devices.
|
||||
- CP210XFW-713: Add protection against IRP_MJ_CLOSE coming before
|
||||
IRP_MJ_CLEANUP. In such case EvtFileCleanup callback was called with 0
|
||||
FileObject, causeing a crash. Serenum is suspected of causing this, even
|
||||
though there is no proof except that it's present, was introduced recently
|
||||
and this crash was never registered before.
|
||||
- CP210XFW-691: Fixed race between timer activation and request cancelation
|
||||
during processing of read rwquests.
|
||||
- Changed raw WDF read request timer to our wrapper.
|
||||
- CP210XFW-693: bugfix: WMI command "wmic path Win32_SerialPort get
|
||||
Availability^, DeviceID^, Name" is unable to enumerate the port.
|
||||
- CP210XFW-686: EvtRequestCancel for wait mask IRP crashed because the
|
||||
request was already completed. It didn't serialize well with other places
|
||||
that can complete it. It looked like XOff IRP may have the same proble. This
|
||||
patch is adding an extra check into *all* other EvtRequestCancel functions
|
||||
to make sure this doesn't happen again.
|
||||
- Changed IOCTLs returning polled-cached MDMSTS to explicitly read the
|
||||
status. Use reg value DisableHwAccessInModemStatusIoctls to revert this
|
||||
new functionality to old behavior.
|
||||
- Improved debug prints.
|
||||
- SerialDbgPrintEx used 1K of stack for the string, reduced to 256.
|
||||
- Resolved many static Code Analysis warnings
|
||||
- Added accounting for data in chip's TX queue. Added translation of
|
||||
COMM_STATUS::ulErrors into SERIAL_EV_BREAK and SERIAL_EV_ERR.
|
||||
- CP210XFW-549, CP210XFW-536, CP210XFW-546: Generate events for
|
||||
IOCTL_SERIAL_SET_WAIT_MASK from COMM_STATUS::ulErrors. Can be disabled by
|
||||
DisableCommStatusPolling reg value.
|
||||
- Added spinlock around ModemStatus change detection. Refactored modem
|
||||
status event signalling to use common function.
|
||||
- Move passive level functions into the paged section.
|
||||
- MCUFW-740: Made device close operation wait for chip's Tx queue to empty.
|
||||
Added registry settings DisableTxEmptyCheckInClose and
|
||||
TxEmptyTimeoutOnCloseInMs.
|
||||
- Improve control transfer debug prints and clean up code, otherwise no
|
||||
functional changes.
|
||||
- MCUFW-740: Fixed EV_TXEMPTY to account for bytes in chip's Tx queue.
|
||||
- MCUFW-740: New functions to sync access to comm error storage from
|
||||
multiple threads.
|
||||
- Added DisableTxEmptyCheckInGetCommStatusIoctl reg value.
|
||||
- Refactor control request I/O. MCUFW-740: Fixed
|
||||
IOCTL_SERIAL_GET_COMMSTATUS.
|
||||
- MCUFW-740: Made device close operation wait for chip's Tx queue to empty.
|
||||
Added registry settings DisableTxEmptyCheckInClose and
|
||||
TxEmptyTimeoutOnCloseInMs.
|
||||
- CP210XFW-648: Set a three second timeout on
|
||||
WdfUsbTargetDeviceSendControlTransferSynchronously().
|
||||
|
||||
******************************************************************************
|
||||
RELEASE NOTES FOR 6.7.3 (2016/03/03)
|
||||
|
||||
- Down-rev the verison of KMDF the driver uses (CP210XFW-591. Use version of
|
||||
KMDF natively included on Windows release)
|
||||
- Bug fix of blue-screen system crash (CP210XFW-575. driver tries to clear a
|
||||
Cancel Routine in a Request that doesn't have it.)
|
||||
|
||||
******************************************************************************
|
||||
RELEASE NOTES FOR 6.7.2 (2015/11/23)
|
||||
|
||||
- Unified Windows 7, 8, 8.1 & 10 support (XP, Vista and Server 2003
|
||||
available in version 6.7).
|
||||
- ARM support added for Windows 10 and Windows 10 IoT Core.
|
||||
- Silicon Labs-specific Serial Enumeration driver silabenm removed in favor
|
||||
of the Windows "in-box" serenm.
|
||||
- UpperFilter Serial Enumeration driver not enabled by default
|
||||
- Updated to latest Microsoft build tools
|
||||
- Resolved /W4 compilation warnings
|
||||
- Resolved code analysis warnings
|
||||
- Added a registry value ControlHandShakeForcedSetBits that can force
|
||||
certain bits in the ControlHandShake variable to always be set.
|
||||
- Add SAL-annotations to API header files.
|
||||
- Bugfix an invalid memory access on device stop.
|
||||
- Standardize branding Properties resources across all deliverables.
|
||||
- Digitally sign all signable deliverables.
|
||||
- Rewrote driver synchronization for data transmission paths.
|
||||
- Resolve bugs arising from extended stress test.
|
||||
- Added diagnostic variables to device extension.
|
||||
- Bugfix a Write IRP stuck forever cauding bugcheck 9f-4 if call to USB
|
||||
returns with error.
|
||||
- Bugfix "packetized write" timeout may fail to act. And improved debug
|
||||
prints.
|
||||
- New reg value DisableS0Idle (default: 0) to replace EnablePowerManagewment
|
||||
(default: 0 which actually ment "enable"). Also, DisableS0Idle=1 now
|
||||
forces AllowIdleWhileOpen to 0.
|
||||
- Driver ignores BreakOnEntry, DebugLevel and DebugFlag in registry.
|
||||
- New CP2108 bug workarounds - GET_LINE_CTL byte swap and tx_empty().
|
||||
- Fixed crash in read path.
|
||||
- Simplified, commented and synchronized with NEWSTUFF EvtIoStop and
|
||||
EvtIoResume.
|
||||
- Fixed memory leak on device removal when multiple devices are present.
|
||||
- Bugfix Read IRP may never complete if other read IRPs are already waiting
|
||||
when it arrives.
|
||||
- Add CP2102N part numbers. Hnadle new part numbers in
|
||||
WriteLatch()/ReadLatch().
|
||||
- Resolve HCK INF warnings that became errors on HLK.
|
||||
- Bugfix: Potential invalid memory access on device stop.
|
||||
- Fixed possible memory overrun when writing CP2108 latch.
|
||||
- Cumulative collection of improvements (due to code analysis, application
|
||||
of latest toolset, etc.) and bug fixes.
|
||||
|
||||
******************************************************************************
|
||||
RELEASE NOTES FOR 6.7.1 (2015/06/29)
|
||||
|
||||
- Added certification for Windows 10 Preview (Note: Windows 10 only;
|
||||
use v6.7 for Windows prior to Windows 10)
|
||||
|
||||
******************************************************************************
|
||||
RELEASE NOTES FOR 6.7 (2014/04/11)
|
||||
|
||||
- Added vendor-specific commands to the driver that do not affect normal
|
||||
operation with standard CP210x devices.
|
||||
- Modified write behavior to packetize data as a work around for a rare
|
||||
USB 2.0 hub behavior seen only in Windows XP (x86).
|
||||
|
||||
******************************************************************************
|
||||
RELEASE NOTES FOR 6.6.1 (2013/10/24)
|
||||
|
||||
- Added certification for Windows 8.1
|
||||
- Added support for CP2108 devices
|
||||
- Corrected bug where OS would hang on repetition of many rapid open/closes on
|
||||
certain systems.
|
||||
|
||||
******************************************************************************
|
||||
RELEASE NOTES FOR 6.6
|
||||
|
||||
- Moving installer format to DPInst
|
||||
- Supported under Windows 8
|
||||
- Corrected bug in total write timeout calculation
|
||||
- Corrected bug where EV_BREAK event could be misreported based on incoming
|
||||
data
|
||||
- Corrected another BSOD corner case regarding write cancellation
|
||||
|
||||
******************************************************************************
|
||||
RELEASE NOTES FOR 6.5.3
|
||||
|
||||
- Corrected BSOD corner case for a write cancellation
|
||||
- Corrected memory leak that occurs when a device is plugged/unplugged
|
||||
rapidly enough to allow driver startup function to fail
|
||||
|
||||
******************************************************************************
|
||||
RELEASE NOTES FOR 6.5
|
||||
|
||||
- Corrected BSOD corner case issue for handling control requests
|
||||
- Corrected issue where USB 3.0 hubs would deliver data to the driver out
|
||||
of order
|
||||
|
||||
******************************************************************************
|
||||
RELEASE NOTES FOR 6.4
|
||||
|
||||
- Corrected multiple BSOD issues by updating request handling for control
|
||||
requests to the USB device, and the write completion method
|
||||
- Corrected device removal routine to also undo the COM port naming in the
|
||||
registry at removal time instead of when the device is closed after the
|
||||
removal.
|
||||
|
||||
******************************************************************************
|
||||
RELEASE NOTES FOR 6.3a
|
||||
|
||||
- Updated to 3.2 DriverInstaller to correct a bug seen when updating from an
|
||||
old driver installer version
|
||||
|
||||
******************************************************************************
|
||||
RELEASE NOTES FOR 6.3
|
||||
|
||||
- Corrected a bug introduced in 6.2 which caused BSOD during surprise removal.
|
||||
- Corrected a bug found in I/O cancellation corner case
|
||||
|
||||
******************************************************************************
|
||||
RELEASE NOTES FOR 6.2
|
||||
|
||||
- Corrected return value for DeviceIoControl() and other COM API functions
|
||||
once the device is removed to properly show ERROR_ACCESS_DENIED (0x05)
|
||||
instead of ERROR_BAD_COMMAND in GetLastError()
|
||||
- Corrected bug in DTR/RTS reporting latency seen if you set DTR/RTS and ask
|
||||
for it before the device has reported it to the host - now when it is
|
||||
written it reads back immediately
|
||||
- Corrected several USB requests that were improperly defined as device
|
||||
requests when they are actually interface requests - this doesn't exhibit
|
||||
and bugs in current single interface devices but was changed to be complete
|
||||
and correct
|
||||
- Added support for CP2104 and CP2105 devices
|
||||
|
||||
******************************************************************************
|
||||
RELEASE NOTES FOR 6.1
|
||||
|
||||
- Corrected a memory leak which could bog the system down after extended use
|
||||
of a contiuously opened COM port, and conditionally yield bluescreens on
|
||||
certain systems
|
||||
- Corrected a problem where an IO reqest would sometimes return a busy
|
||||
status to user mode, instead the queue is restarted if necessary before
|
||||
adding an IO request to the queue
|
||||
- Corrected a condition which would blue screen on cancelling write request
|
||||
that hasn't been fully sent out USB
|
||||
- Corrected the Capabilites return value, which incorrectly reported that
|
||||
timeouts are not supported
|
||||
- Corrected several Queue size return values, which affected behavior in the
|
||||
MSCOMM control
|
||||
- Corrected DTR/RTS value on device insertion, visible when Serial
|
||||
Enumeration is disabled
|
||||
- Corrected the ability to override Baud Rate and Line Control from the INF
|
||||
file
|
||||
|
||||
******************************************************************************
|
||||
RELEASE NOTES FOR 6.0
|
||||
|
||||
- Corrected multiple blue screens and driver hangs related to race
|
||||
conditions in the driver
|
||||
- Corrected problem where driver hangs when 4 or more devices are connected
|
||||
to a single transaction translator hub
|
||||
- Corrected bugs that prohibited serial enumeration
|
||||
- Corrected problem where IO requests were not completed/cancelled on a
|
||||
close
|
||||
- Corrected problem with dialing out or PPP connections
|
||||
- Created IO queueing mechanism so that multiple reads, writes, etc. can be
|
||||
queued and waited on
|
||||
|
||||
|
||||
@ -0,0 +1,35 @@
|
||||
LICENSE AGREEMENT
|
||||
SILICON LABS VCP DRIVER
|
||||
IMPORTANT: READ CAREFULLY BEFORE AGREEING TO TERMS
|
||||
|
||||
THIS PRODUCT CONTAINS THE SILICON LABS VCP DRIVER AND INSTALLER PROGRAMS AND OTHER THIRD PARTY SOFTWARE.TOGETHER THESE PRODUCTS ARE REFERRED TO AS THE "LICENSED SOFTWARE". USE OF THE LICENSED SOFTWARE IS SUBJECT TO THE TERMS OF THIS LICENSE AGREEMENT. DOWNLOADING THE LICENSED SOFTWARE AND INDICATING YOUR CONSENT TO THE TERMS OF THIS LICENSE CONSTITUTES A BINDING AGREMENT BETWEEN SILICON LABORATORIES, INC. ("SILICON LABS") AND YOU OR YOUR EMPLOYER (IF APPLICABLE). IF YOU ARE ACCEPTING THE TERMS OF THIS AGREEMENT ON BEHALF YOUR EMPLOYER, THE TERMS "YOU" AND "YOUR" REFER TO YOUR EMPLOYER. WRITTEN APPROVAL IS NOT A PREREQUISITE TO THE VALIDITY OR ENFORCEABILITY OF THIS AGREEMENT. IF THESE TERMS ARE CONSIDERED AN OFFER BY SILICON LABS, ACCEPTANCE IS EXPRESSLY LIMITED TO THESE TERMS.
|
||||
IF YOU DO NOT AGREE WITH ALL OF THE TERMS OF THIS LICENSE AGREEMENT, YOU MUST NOT USE THE LICENSED SOFTWARE AND YOU MUST DELETE ALL OF COPIES OF THE LICENSED SOFTWARE FROM YOUR COMPUTER.
|
||||
1. LICENSE: The Licensed Software is and will remain the property of Silicon Labs or a third party from whom Silicon Labs has the authorization to distribute to you subject to the terms of this Agreement. This Licensed Software is protected by state, federal, and international copyright laws. Subject at all times to your compliance with the terms of this License Agreement, Silicon Labs grants to you a nonexclusive license to use the Licensed Software as described in this License Agreement. Silicon Labs may revoke this license at any time if you fail to comply with the terms of this License Agreement. Certain parts of the Licensed Software, including DPInst.exe, are licensed from Microsoft Corporation. For information concerning licensing DPInst.exe and the redistributable pieces of WDF used in the driver, refer to the license.rtf file in the 7600.16385.1 version of the Windows Driver Kit, available through Microsoft.
|
||||
2. CONTENTS OF THE LICENSED SOFTWARE: The Licensed Software consists of the following items:
|
||||
a. Driver binaries
|
||||
b. INF file that describes the driver installation
|
||||
c. DPInst.exe that provides the GUI interface to install the drivers
|
||||
d. XML file that describes the DPInst.exe and GUI items
|
||||
3. INSTALLATION AND USE RIGHTS:
|
||||
a. You may download and install the Licensed Software on one or more computers and make any number of copies.
|
||||
b. You may internally evaluate the Licensed Software. If you elect to use the Licensed Software for any other purpose, including modification and distribution, then the following additional terms apply to you.
|
||||
c. You may modify only the INF and XML files. You may modify these files with information concerning your company or your company's products.
|
||||
d. You may not modify the driver binary files or the DPInst.exe files.
|
||||
e. You may redistribute to your customers the Licensed Software only with the modified INF and XML files. Your redistribution may be in any form, including physical media and Internet downloads.
|
||||
4. RESTRICTIONS:
|
||||
a. You may not use the Licensed Software with any integrated circuit products other than those designed and manufactured by Silicon Labs.
|
||||
b. Except as provided above, you may not redistribute, sublicense, assign, rent or lease any portion of the Licensed Software to any third party.
|
||||
c. You may not reverse engineer, decompile, disassemble, modify, translate, or make any attempt to discover the source code of the Licensed Software. You may not work around any technical limitation in the Licensed Software.
|
||||
d. Except as provided above, you may not modify or create derivative works from the Licensed Software.
|
||||
e. You may not modify or distribute the Licensed Software so that any part of it becomes subject to an excluded license. An excluded license is one that requires, as a condition of use, modification or distribution, that the software be disclosed or distributed in source code form, or that others have the right to modify it.
|
||||
f. You may not obscure or remove any product identification, copyright or other notices that appear on the Licensed Software, including any notices from third parties.
|
||||
g. You may not redistribute any modified or unmodified version of the Licensed Software to any third party as a standalone product. You may not redistribute any modified or unmodified version of the Licensed Software to any third party who has not accepted the terms of an end-user license agreement that contains terms at least as protective of Silicon Labs' rights as those contained in this License Agreement.
|
||||
5. WARRANTY: Silicon Labs does not warrant that the Licensed Software will meet your requirements or that operation of the Licensed Software will be uninterrupted or error-free. You agree that the Licensed Software is provided "AS IS" and that Silicon Labs makes no other warranties regarding the Licensed Software. SILICON LABS DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT, RELATED TO THE LICENSED SOFTWARE, ITS USE OR ANY INABILITY TO USE IT, THE RESULTS OF ITS USE AND THIS AGREEMENT. YOU MAY HAVE OTHER RIGHTS, WHICH VARY FROM STATE TO STATE.
|
||||
6. DISCLAIMER OF DAMAGES: IN NO EVENT WILL SILICON LABS BE LIABLE TO YOU FOR ANY SPECIAL, CONSEQUENTIAL, INDIRECT, OR SIMILAR DAMAGES, INCLUDING ANY LOST PROFITS OR LOST DATA ARISING OUT OF THE USE OR INABILITY TO USE THE LICENSED SOFTWARE EVEN IF SILICON LABS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE ABOVE LIMITATION OR EXCLUSION MAY NOT APPLY TO YOU. IN NO CASE SHALL SILICON LABS' CUMULATIVE LIABILITY TO YOU FOR ALL PURPOSES EXCEED FIFTY UNITED STATES DOLLARS ($50). The disclaimers and limitations set forth above will apply regardless of whether you accept the Licensed Software.
|
||||
7. TERM AND TERMINATION: The term of this Agreement and the License granted herein shall begin upon use of the Licensed Software and continue in perpetuity unless you breach any of the obligations set out under this Agreement. Upon any breach of this Agreement by you, the license granted hereunder shall terminate immediately and you shall cease all use of the Licensed Software and return or destroy all copies of the Licensed Software to Silicon Labs immediately. Termination of this License upon your breach is only one remedy available to Silicon Labs. In addition to termination of this Agreement upon your breach, Silicon Labs shall be entitled to seek any and all other available remedies, at law or at equity, arising from your breach. Termination of this Agreement shall not affect your customers' ability to continue using copies of the modified or unmodified Licensed Software they obtained from you.
|
||||
8. EXPORT: You shall comply with all applicable federal, provincial, state and local laws, regulations and ordinances including but not limited to applicable U.S. Export Administration Laws and Regulations. You shall not export or re-export, or allow the export or re-export of the Licensed Software to any country specified in the then-current Supplement No. 1 to Part 740, or, in violation of the embargo provisions in Part 746, of the U.S. Export Administration Regulations (or any successor regulations or supplement), except in compliance with and with all licenses and approvals required under applicable export laws and regulations, including without limitation, those of the U.S. Department of Commerce.
|
||||
9. GENERAL: This Agreement will be governed by the laws of the State of Texas and any applicable federal laws or regulations. The waiver by either Party of any default or breach of this Agreement shall not constitute a waiver of any other or subsequent default or breach. This Agreement constitutes the complete and exclusive statement of the mutual understanding between you and Silicon Labs with respect to this subject matter herein. This Agreement may only be modified by a written addendum, which has been signed by both you and Silicon Labs.
|
||||
|
||||
BY CLICKING "I ACCEPT THE TERMS OF THIS AGREEMENT" YOU AGREE TO ACCEPT AND COMPLY WITH THE TERMS OF THIS LICENSE AGREEMENT WITH SILICON LABORATORIES INC.
|
||||
|
||||
|
||||
BIN
ZigBee/CP210x_Universal_Windows_Driver/arm/silabser.sys
Normal file
BIN
ZigBee/CP210x_Universal_Windows_Driver/arm/silabser.sys
Normal file
Binary file not shown.
BIN
ZigBee/CP210x_Universal_Windows_Driver/arm64/silabser.sys
Normal file
BIN
ZigBee/CP210x_Universal_Windows_Driver/arm64/silabser.sys
Normal file
Binary file not shown.
BIN
ZigBee/CP210x_Universal_Windows_Driver/silabser.cat
Normal file
BIN
ZigBee/CP210x_Universal_Windows_Driver/silabser.cat
Normal file
Binary file not shown.
247
ZigBee/CP210x_Universal_Windows_Driver/silabser.inf
Normal file
247
ZigBee/CP210x_Universal_Windows_Driver/silabser.inf
Normal file
@ -0,0 +1,247 @@
|
||||
;/*++
|
||||
;
|
||||
;Module Name:
|
||||
;
|
||||
; SILABSER.INF
|
||||
;
|
||||
; Copyright 2019, Silicon Laboratories Inc.
|
||||
;
|
||||
;Abstract:
|
||||
; Installation INF for Silicon Labs CP210x device
|
||||
;
|
||||
;--*/
|
||||
|
||||
[Version]
|
||||
Signature="$WINDOWS NT$"
|
||||
Class=Ports
|
||||
ClassGuid={4D36E978-E325-11CE-BFC1-08002BE10318}
|
||||
Provider=%Provider%
|
||||
DriverVer = 10/04/2022,11.2.0.167
|
||||
CatalogFile = silabser.cat
|
||||
PnpLockDown=1
|
||||
|
||||
; ================= Device section =====================
|
||||
|
||||
[Manufacturer]
|
||||
%ManufacturerName%=SiLabsModelsSection, NTamd64.10.0...17134, NTarm.10.0...17134, NTarm64.10.0...17134, NTx86.10.0...17134
|
||||
|
||||
; "Architecture must be specified in INF Models sections names" -- meaning lots of
|
||||
; cut'n'paste duplication in these next four per-Architecture ModelsSections
|
||||
;Models sections (one per CPU Architecture)
|
||||
;Models section for installation of x64 driver on Windows 10 and above
|
||||
[SiLabsModelsSection.NTamd64.10.0...17134]
|
||||
%USB\VID_10C4&PID_EA60.DeviceDesc% =SiLabsDDInstallSection, USB\VID_10C4&PID_EA60
|
||||
%USB\VID_10C4&PID_EA63.DeviceDesc% =SiLabsDDInstallSection, USB\VID_10C4&PID_EA63
|
||||
%USB\VID_10C4&PID_EA70&Mi_00.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA70&Mi_00
|
||||
%USB\VID_10C4&PID_EA70&Mi_01.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA70&Mi_01
|
||||
%USB\VID_10C4&PID_EA71&Mi_00.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA71&Mi_00
|
||||
%USB\VID_10C4&PID_EA71&Mi_01.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA71&Mi_01
|
||||
%USB\VID_10C4&PID_EA71&Mi_02.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA71&Mi_02
|
||||
%USB\VID_10C4&PID_EA71&Mi_03.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA71&Mi_03
|
||||
%USB\VID_10C4&PID_EA7A&Mi_00.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA7A&Mi_00
|
||||
%USB\VID_10C4&PID_EA7A&Mi_01.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA7A&Mi_01
|
||||
%USB\VID_10C4&PID_EA7B&Mi_00.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA7B&Mi_00
|
||||
%USB\VID_10C4&PID_EA7B&Mi_01.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA7B&Mi_01
|
||||
%USB\VID_10C4&PID_EA7B&Mi_02.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA7B&Mi_02
|
||||
%USB\VID_10C4&PID_EA7B&Mi_03.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA7B&Mi_03
|
||||
|
||||
;Models section for installation of ARM (32-bit) driver on Windows 10 and above
|
||||
[SiLabsModelsSection.NTarm.10.0...17134]
|
||||
%USB\VID_10C4&PID_EA60.DeviceDesc% =SiLabsDDInstallSection, USB\VID_10C4&PID_EA60
|
||||
%USB\VID_10C4&PID_EA63.DeviceDesc% =SiLabsDDInstallSection, USB\VID_10C4&PID_EA63
|
||||
%USB\VID_10C4&PID_EA70&Mi_00.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA70&Mi_00
|
||||
%USB\VID_10C4&PID_EA70&Mi_01.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA70&Mi_01
|
||||
%USB\VID_10C4&PID_EA71&Mi_00.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA71&Mi_00
|
||||
%USB\VID_10C4&PID_EA71&Mi_01.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA71&Mi_01
|
||||
%USB\VID_10C4&PID_EA71&Mi_02.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA71&Mi_02
|
||||
%USB\VID_10C4&PID_EA71&Mi_03.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA71&Mi_03
|
||||
%USB\VID_10C4&PID_EA7A&Mi_00.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA7A&Mi_00
|
||||
%USB\VID_10C4&PID_EA7A&Mi_01.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA7A&Mi_01
|
||||
%USB\VID_10C4&PID_EA7B&Mi_00.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA7B&Mi_00
|
||||
%USB\VID_10C4&PID_EA7B&Mi_01.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA7B&Mi_01
|
||||
%USB\VID_10C4&PID_EA7B&Mi_02.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA7B&Mi_02
|
||||
%USB\VID_10C4&PID_EA7B&Mi_03.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA7B&Mi_03
|
||||
|
||||
;Models section for installation of ARM (64-bit) driver on Windows 10 and above
|
||||
[SiLabsModelsSection.NTarm64.10.0...17134]
|
||||
%USB\VID_10C4&PID_EA60.DeviceDesc% =SiLabsDDInstallSection, USB\VID_10C4&PID_EA60
|
||||
%USB\VID_10C4&PID_EA63.DeviceDesc% =SiLabsDDInstallSection, USB\VID_10C4&PID_EA63
|
||||
%USB\VID_10C4&PID_EA70&Mi_00.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA70&Mi_00
|
||||
%USB\VID_10C4&PID_EA70&Mi_01.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA70&Mi_01
|
||||
%USB\VID_10C4&PID_EA71&Mi_00.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA71&Mi_00
|
||||
%USB\VID_10C4&PID_EA71&Mi_01.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA71&Mi_01
|
||||
%USB\VID_10C4&PID_EA71&Mi_02.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA71&Mi_02
|
||||
%USB\VID_10C4&PID_EA71&Mi_03.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA71&Mi_03
|
||||
%USB\VID_10C4&PID_EA7A&Mi_00.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA7A&Mi_00
|
||||
%USB\VID_10C4&PID_EA7A&Mi_01.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA7A&Mi_01
|
||||
%USB\VID_10C4&PID_EA7B&Mi_00.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA7B&Mi_00
|
||||
%USB\VID_10C4&PID_EA7B&Mi_01.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA7B&Mi_01
|
||||
%USB\VID_10C4&PID_EA7B&Mi_02.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA7B&Mi_02
|
||||
%USB\VID_10C4&PID_EA7B&Mi_03.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA7B&Mi_03
|
||||
|
||||
;Models section for installation of x86 driver on Windows 10 and above
|
||||
[SiLabsModelsSection.NTx86.10.0...17134]
|
||||
%USB\VID_10C4&PID_EA60.DeviceDesc% =SiLabsDDInstallSection, USB\VID_10C4&PID_EA60
|
||||
%USB\VID_10C4&PID_EA63.DeviceDesc% =SiLabsDDInstallSection, USB\VID_10C4&PID_EA63
|
||||
%USB\VID_10C4&PID_EA70&Mi_00.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA70&Mi_00
|
||||
%USB\VID_10C4&PID_EA70&Mi_01.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA70&Mi_01
|
||||
%USB\VID_10C4&PID_EA71&Mi_00.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA71&Mi_00
|
||||
%USB\VID_10C4&PID_EA71&Mi_01.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA71&Mi_01
|
||||
%USB\VID_10C4&PID_EA71&Mi_02.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA71&Mi_02
|
||||
%USB\VID_10C4&PID_EA71&Mi_03.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA71&Mi_03
|
||||
%USB\VID_10C4&PID_EA7A&Mi_00.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA7A&Mi_00
|
||||
%USB\VID_10C4&PID_EA7A&Mi_01.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA7A&Mi_01
|
||||
%USB\VID_10C4&PID_EA7B&Mi_00.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA7B&Mi_00
|
||||
%USB\VID_10C4&PID_EA7B&Mi_01.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA7B&Mi_01
|
||||
%USB\VID_10C4&PID_EA7B&Mi_02.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA7B&Mi_02
|
||||
%USB\VID_10C4&PID_EA7B&Mi_03.DeviceDesc%=SiLabsDDInstallSection, USB\VID_10C4&PID_EA7B&Mi_03
|
||||
|
||||
|
||||
;DDInstall section
|
||||
[SiLabsDDInstallSection]
|
||||
AddReg=silabser.AddReg
|
||||
CopyFiles=Silabser_CopyFiles_FileListSection
|
||||
FeatureScore=0x40
|
||||
|
||||
|
||||
;DDInstall.Services section
|
||||
[SiLabsDDInstallSection.Services]
|
||||
AddService = silabser,0x00000002,silabser.AddService
|
||||
|
||||
|
||||
[silabser.AddService]
|
||||
DisplayName = %silabser.SvcDesc%
|
||||
ServiceType = 1
|
||||
StartType = 3
|
||||
ErrorControl = 1
|
||||
ServiceBinary = %12%\silabser.sys
|
||||
AddReg = silabser.AddService.AddReg
|
||||
|
||||
; Per-Service-level registry entries (the "parameters key")
|
||||
[silabser.AddService.AddReg]
|
||||
HKR, Parameters\Wdf, ForceLogsInMiniDump, 0x00010001, 1
|
||||
HKR, Parameters, DebugLevel, 0x00010001, 0
|
||||
HKR, Parameters, DebugFlag, 0x00010001, 0x1c01817
|
||||
;To break on entry if requested in Parameters
|
||||
;HKR, Parameters, BreakOnEntry, 0x00010001,1
|
||||
|
||||
|
||||
; common registry entries
|
||||
; Per-Driver-level registry entries (the "software key")
|
||||
[silabser.AddReg]
|
||||
HKR,,NTMPDriver,,silabser.sys
|
||||
HKR,,RateLimitPurgeMS, 0x10001, 0x64, 0x00, 0x00, 0x00
|
||||
;To override the default value for BaudRate/LineControl
|
||||
HKR,,OverrideDefaultPortSettings, 0x10001, 01,00,00,00
|
||||
HKR,,InitialBaudRate, 0x10001, 00,C2,01,00 ;115200 initial baud rate
|
||||
HKR,,InitialLineControl,, "8N1" ;8-bits, No parity, 1 stop bit
|
||||
HKR,,PortSubClass,1,01
|
||||
HKR,,EnumPropPages32,,"MsPorts.dll,SerialPortPropPageProvider"
|
||||
;Prepare to hack ControlHandShake
|
||||
;HKR,,ControlHandShakeForcedSetBits,0x10001,01,00,00,00
|
||||
|
||||
|
||||
;DDInstall.HW section
|
||||
[SiLabsDDInstallSection.HW]
|
||||
AddReg=SiLabsDDInstallSection.HW.AddReg
|
||||
|
||||
|
||||
; Per-device-level registry entries (the "hardware key")
|
||||
[SiLabsDDInstallSection.HW.AddReg]
|
||||
;Amount of time the device must be idle before idling out
|
||||
HKR,,"SelectiveSuspendTimeout",0x00010001,10000
|
||||
HKR,,"DisableHwAccessInModemStatusIoctls",0x00010001,1
|
||||
HKR,,"DisableIoctlIOCTL_SERIAL_PURGE",0x00010001,1
|
||||
; Attention! The EnablePowerManagewment value is no longer supported.
|
||||
; To disable Selective Suspend, uncomment the following line:
|
||||
; HKR,,"DisableS0Idle",0x00010001,1
|
||||
; opt-in to DFx
|
||||
HKR,"WDF","WdfDirectedPowerTransitionEnable",0x00010001,1
|
||||
|
||||
;To disable the checking TxEmpty in Get Comm Status Ioctl, uncomment the following line:
|
||||
;HKR,,"DisableTxEmptyCheckInGetCommStatusIoctl",0x00010001,1
|
||||
|
||||
;To disable the checking TxEmpty in Ioctl Wait Mask, uncomment the following line:
|
||||
;HKR,,"DisableTxEmptyCheckInIoctlWaitMask",0x00010001,1
|
||||
|
||||
;To disable the checking remaining data in Tx queue, uncomment the following line:
|
||||
;HKR,,"DisableTxEmptyCheckInClose",0x00010001,1
|
||||
|
||||
;To disable purge In close, uncomment the following line:
|
||||
;HKR,,"DisablePurgeInClose",0x00010001,1
|
||||
|
||||
;Don't use polling to get Comm Status, uncomment the following line:
|
||||
;HKR,,"DisableCommStatusPolling",0x00010001,1
|
||||
|
||||
;To Skipping external naming, uncomment the following line:
|
||||
;HKR,,"SerialSkipExternalNaming",0x00010001,1
|
||||
|
||||
;To allow device to idle with an open handle, uncomment the following line:
|
||||
;HKR,,"AllowIdleWhileOpen",0x00010001,1
|
||||
|
||||
;To set the maximum time the close operation will wait for Tx queue to empty, uncomment the following line:
|
||||
;HKR,,"TxEmptyTimeoutOnCloseInMs",0x00010001,30000
|
||||
|
||||
;To disable the port, uncomment the following line:
|
||||
;HKR,,"DisablePort",0x00010001,1
|
||||
|
||||
;To obtain the polling interval to get information from the CP210x device, uncomment the following line:
|
||||
;HKR,,"EventMaskPollingInterval",0x00010001,80
|
||||
|
||||
; To obtain the number of read requests that the framework will queue to receive data from the CP210x device, uncomment the following line:
|
||||
;HKR,,"ContinuousReaderNumPendingReads",0x00010001,1
|
||||
|
||||
; To use of the custom 'dummy wait' code, uncomment the following line:
|
||||
;HKR,,"EnableCustomWait",0x00010001,1
|
||||
|
||||
; To set DTR for serial, uncomment the following line:
|
||||
;HKR,,"SetDTROnOpen",0x00010001,1
|
||||
|
||||
; To set RTS for serial, uncomment the following line:
|
||||
;HKR,,"SetRTSOnOpen",0x00010001,1
|
||||
|
||||
|
||||
[Silabser_CopyFiles_FileListSection]
|
||||
silabser.sys
|
||||
|
||||
[SourceDisksNames]
|
||||
1=%Disk_Description%,"silabser.cat"
|
||||
|
||||
[SourceDisksFiles.amd64]
|
||||
silabser.sys = 1,\x64
|
||||
[SourceDisksFiles.arm]
|
||||
silabser.sys = 1,\arm
|
||||
[SourceDisksFiles.arm64]
|
||||
silabser.sys = 1,\arm64
|
||||
[SourceDisksFiles.x86]
|
||||
silabser.sys = 1,\x86
|
||||
|
||||
|
||||
[DestinationDirs]
|
||||
Silabser_CopyFiles_FileListSection = 12 ; 13 = Driver package's Driver Store directory (%WINDIR%\System32\DriverStore\FileRepository); 12 = Drivers directory (%SystemRoot%\system32\drivers)) (make sure "ServiceBinary =" matches usage of 12 vs. 13)
|
||||
|
||||
|
||||
;---------------------------------------------------------------;
|
||||
|
||||
[Strings]
|
||||
; For provider, enter your Company Legal/Official/Long/Full Name
|
||||
Provider="Silicon Laboratories Inc."
|
||||
; For ManufacturerName, enter your Company "Colloquial" Name
|
||||
ManufacturerName="Silicon Labs"
|
||||
Disk_Description= "Silicon Labs CP210x USB to UART Bridge Installation Disk"
|
||||
USB\VID_10C4&PID_EA60.DeviceDesc= "Silicon Labs CP210x USB to UART Bridge"
|
||||
USB\VID_10C4&PID_EA63.DeviceDesc= "Silicon Labs CP210x USB to UART Bridge"
|
||||
USB\VID_10C4&PID_EA70&Mi_00.DeviceDesc="Silicon Labs Dual CP2105 USB to UART Bridge: Enhanced COM Port"
|
||||
USB\VID_10C4&PID_EA70&Mi_01.DeviceDesc="Silicon Labs Dual CP2105 USB to UART Bridge: Standard COM Port"
|
||||
USB\VID_10C4&PID_EA71&Mi_00.DeviceDesc="Silicon Labs Quad CP2108 USB to UART Bridge: Interface 0"
|
||||
USB\VID_10C4&PID_EA71&Mi_01.DeviceDesc="Silicon Labs Quad CP2108 USB to UART Bridge: Interface 1"
|
||||
USB\VID_10C4&PID_EA71&Mi_02.DeviceDesc="Silicon Labs Quad CP2108 USB to UART Bridge: Interface 2"
|
||||
USB\VID_10C4&PID_EA71&Mi_03.DeviceDesc="Silicon Labs Quad CP2108 USB to UART Bridge: Interface 3"
|
||||
USB\VID_10C4&PID_EA7A&Mi_00.DeviceDesc="Silicon Labs Dual CP2105 USB to UART Bridge: Enhanced COM Port"
|
||||
USB\VID_10C4&PID_EA7A&Mi_01.DeviceDesc="Silicon Labs Dual CP2105 USB to UART Bridge: Standard COM Port"
|
||||
USB\VID_10C4&PID_EA7B&Mi_00.DeviceDesc="Silicon Labs Quad CP2108 USB to UART Bridge: Interface 0"
|
||||
USB\VID_10C4&PID_EA7B&Mi_01.DeviceDesc="Silicon Labs Quad CP2108 USB to UART Bridge: Interface 1"
|
||||
USB\VID_10C4&PID_EA7B&Mi_02.DeviceDesc="Silicon Labs Quad CP2108 USB to UART Bridge: Interface 2"
|
||||
USB\VID_10C4&PID_EA7B&Mi_03.DeviceDesc="Silicon Labs Quad CP2108 USB to UART Bridge: Interface 3"
|
||||
|
||||
silabser.SvcDesc="Silicon Labs CP210x USB to UART Bridge Driver"
|
||||
BIN
ZigBee/CP210x_Universal_Windows_Driver/x64/silabser.sys
Normal file
BIN
ZigBee/CP210x_Universal_Windows_Driver/x64/silabser.sys
Normal file
Binary file not shown.
BIN
ZigBee/CP210x_Universal_Windows_Driver/x86/silabser.sys
Normal file
BIN
ZigBee/CP210x_Universal_Windows_Driver/x86/silabser.sys
Normal file
Binary file not shown.
Loading…
x
Reference in New Issue
Block a user