]> git.ipfire.org Git - thirdparty/strongswan.git/commitdiff
test-vector support in rw-cert scenarios
authorAndreas Steffen <andreas.steffen@strongswan.org>
Tue, 16 Jun 2009 18:53:41 +0000 (20:53 +0200)
committerAndreas Steffen <andreas.steffen@strongswan.org>
Tue, 16 Jun 2009 18:53:41 +0000 (20:53 +0200)
44 files changed:
testing/tests/ike/rw-cert/hosts/carol/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ike/rw-cert/hosts/dave/etc/strongswan.conf
testing/tests/ike/rw-cert/hosts/moon/etc/strongswan.conf
testing/tests/ikev1/rw-cert/hosts/carol/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/rw-cert/hosts/moon/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev2/rw-cert/hosts/carol/etc/strongswan.conf
testing/tests/ikev2/rw-cert/hosts/dave/etc/strongswan.conf
testing/tests/ikev2/rw-cert/hosts/moon/etc/strongswan.conf
testing/tests/ikev2/rw-eap-aka-id-rsa/hosts/moon/etc/ipsec.conf
testing/tests/ikev2/rw-eap-md5-id-radius/hosts/carol/etc/ipsec.conf
testing/tests/ikev2/rw-eap-md5-id-radius/hosts/moon/etc/ipsec.conf
testing/tests/ikev2/rw-eap-md5-radius/hosts/carol/etc/ipsec.conf
testing/tests/ikev2/rw-eap-md5-radius/hosts/moon/etc/ipsec.conf
testing/tests/ikev2/rw-eap-md5-rsa/hosts/carol/etc/ipsec.conf
testing/tests/ikev2/rw-eap-md5-rsa/hosts/moon/etc/ipsec.conf
testing/tests/ikev2/rw-eap-sim-id-radius/hosts/carol/etc/ipsec.conf
testing/tests/ikev2/rw-eap-sim-id-radius/hosts/moon/etc/ipsec.conf
testing/tests/ikev2/rw-eap-sim-rsa/hosts/carol/etc/ipsec.conf
testing/tests/ikev2/rw-eap-sim-rsa/hosts/moon/etc/ipsec.conf
testing/tests/openssl-ikev1/alg-ecp-high/hosts/carol/etc/strongswan.conf
testing/tests/openssl-ikev1/alg-ecp-high/hosts/dave/etc/strongswan.conf
testing/tests/openssl-ikev1/alg-ecp-high/hosts/moon/etc/strongswan.conf
testing/tests/openssl-ikev1/alg-ecp-low/hosts/carol/etc/strongswan.conf
testing/tests/openssl-ikev1/alg-ecp-low/hosts/dave/etc/strongswan.conf
testing/tests/openssl-ikev1/alg-ecp-low/hosts/moon/etc/strongswan.conf
testing/tests/openssl-ikev1/ecdsa-certs/hosts/carol/etc/ipsec.conf
testing/tests/openssl-ikev1/ecdsa-certs/hosts/carol/etc/strongswan.conf
testing/tests/openssl-ikev1/ecdsa-certs/hosts/dave/etc/ipsec.conf
testing/tests/openssl-ikev1/ecdsa-certs/hosts/dave/etc/strongswan.conf
testing/tests/openssl-ikev1/ecdsa-certs/hosts/moon/etc/ipsec.conf
testing/tests/openssl-ikev1/ecdsa-certs/hosts/moon/etc/strongswan.conf
testing/tests/openssl-ikev2/alg-blowfish/hosts/moon/etc/strongswan.conf
testing/tests/openssl-ikev2/ecdsa-certs/hosts/carol/etc/ipsec.conf
testing/tests/openssl-ikev2/ecdsa-certs/hosts/dave/etc/ipsec.conf
testing/tests/openssl-ikev2/ecdsa-certs/hosts/moon/etc/ipsec.conf
testing/tests/openssl-ikev2/rw-cert/hosts/carol/etc/strongswan.conf
testing/tests/openssl-ikev2/rw-cert/hosts/dave/etc/strongswan.conf
testing/tests/openssl-ikev2/rw-cert/hosts/moon/etc/strongswan.conf
testing/tests/pfkey/rw-cert/hosts/carol/etc/strongswan.conf
testing/tests/pfkey/rw-cert/hosts/dave/etc/strongswan.conf
testing/tests/pfkey/rw-cert/hosts/moon/etc/strongswan.conf
testing/tests/sql/rw-cert/hosts/carol/etc/strongswan.conf
testing/tests/sql/rw-cert/hosts/dave/etc/strongswan.conf
testing/tests/sql/rw-cert/hosts/moon/etc/strongswan.conf

diff --git a/testing/tests/ike/rw-cert/hosts/carol/etc/strongswan.conf b/testing/tests/ike/rw-cert/hosts/carol/etc/strongswan.conf
new file mode 100644 (file)
index 0000000..304ef99
--- /dev/null
@@ -0,0 +1,14 @@
+# /etc/strongswan.conf - strongSwan configuration file
+
+pluto {
+  load = test-vectors sha1 sha2 md5 aes des hmac gmp pubkey random curl
+}
+
+# pluto uses optimized DH exponent sizes (RFC 3526)
+
+libstrongswan {
+  dh_exponent_ansi_x9_42 = no
+  crypto_test {
+    on_add = yes
+  }
+}
index ef63f7262208e36da70b71c5b815595434f3e46c..f1dcd52e9731582b31693d441841ed9168c027d7 100644 (file)
@@ -1,5 +1,11 @@
 # /etc/strongswan.conf - strongSwan configuration file
 
 charon {
-  load = curl aes des sha1 sha2 md5 gmp random x509 pubkey hmac xcbc stroke kernel-netlink
+  load = curl test-vectors aes des sha1 sha2 md5 gmp random x509 pubkey hmac xcbc stroke kernel-netlink
+}
+
+libstrongswan {
+  crypto_test {
+    on_add = yes
+  }
 }
index 8dcb265b75ab518fd2cf9b26db6eb13e135cc220..7133aef00bc71f71d9554f822e3a66770dac9936 100644 (file)
@@ -1,9 +1,15 @@
 # /etc/strongswan.conf - strongSwan configuration file
 
 charon {
-  load = curl aes des sha1 sha2 md5 gmp random pubkey hmac x509 xcbc stroke kernel-netlink
+  load = curl test-vectors aes des sha1 sha2 md5 gmp random pubkey hmac x509 xcbc stroke kernel-netlink
 }
 
 pluto {
-  load = curl aes des sha1 sha2 md5 gmp random pubkey hmac
+  load = curl test-vectors aes des sha1 sha2 md5 gmp random pubkey hmac
+}
+
+libstrongswan {
+  crypto_test {
+    on_add = yes
+  }
 }
diff --git a/testing/tests/ikev1/rw-cert/hosts/carol/etc/strongswan.conf b/testing/tests/ikev1/rw-cert/hosts/carol/etc/strongswan.conf
new file mode 100644 (file)
index 0000000..304ef99
--- /dev/null
@@ -0,0 +1,14 @@
+# /etc/strongswan.conf - strongSwan configuration file
+
+pluto {
+  load = test-vectors sha1 sha2 md5 aes des hmac gmp pubkey random curl
+}
+
+# pluto uses optimized DH exponent sizes (RFC 3526)
+
+libstrongswan {
+  dh_exponent_ansi_x9_42 = no
+  crypto_test {
+    on_add = yes
+  }
+}
diff --git a/testing/tests/ikev1/rw-cert/hosts/moon/etc/strongswan.conf b/testing/tests/ikev1/rw-cert/hosts/moon/etc/strongswan.conf
new file mode 100644 (file)
index 0000000..304ef99
--- /dev/null
@@ -0,0 +1,14 @@
+# /etc/strongswan.conf - strongSwan configuration file
+
+pluto {
+  load = test-vectors sha1 sha2 md5 aes des hmac gmp pubkey random curl
+}
+
+# pluto uses optimized DH exponent sizes (RFC 3526)
+
+libstrongswan {
+  dh_exponent_ansi_x9_42 = no
+  crypto_test {
+    on_add = yes
+  }
+}
index 40eb84b8a4b0955a4216536da5f36e00f3df5dfb..de122acff2d89a3c00726777e9a9dbfd2976d299 100644 (file)
@@ -1,5 +1,11 @@
 # /etc/strongswan.conf - strongSwan configuration file
 
 charon {
-  load = curl aes des sha1 sha2 md5 gmp random x509 pubkey hmac xcbc stroke kernel-netlink updown
+  load = curl test-vectors aes des sha1 sha2 md5 gmp random x509 pubkey hmac xcbc stroke kernel-netlink updown
+}
+
+libstrongswan {
+  crypto_test {
+    on_add = yes
+  }
 }
index 40eb84b8a4b0955a4216536da5f36e00f3df5dfb..de122acff2d89a3c00726777e9a9dbfd2976d299 100644 (file)
@@ -1,5 +1,11 @@
 # /etc/strongswan.conf - strongSwan configuration file
 
 charon {
-  load = curl aes des sha1 sha2 md5 gmp random x509 pubkey hmac xcbc stroke kernel-netlink updown
+  load = curl test-vectors aes des sha1 sha2 md5 gmp random x509 pubkey hmac xcbc stroke kernel-netlink updown
+}
+
+libstrongswan {
+  crypto_test {
+    on_add = yes
+  }
 }
index 40eb84b8a4b0955a4216536da5f36e00f3df5dfb..de122acff2d89a3c00726777e9a9dbfd2976d299 100644 (file)
@@ -1,5 +1,11 @@
 # /etc/strongswan.conf - strongSwan configuration file
 
 charon {
-  load = curl aes des sha1 sha2 md5 gmp random x509 pubkey hmac xcbc stroke kernel-netlink updown
+  load = curl test-vectors aes des sha1 sha2 md5 gmp random x509 pubkey hmac xcbc stroke kernel-netlink updown
+}
+
+libstrongswan {
+  crypto_test {
+    on_add = yes
+  }
 }
index ce047eba1b975b86890e1ce3db3c41169f843f95..16171feb30e360830ea4613525fe9e6685e53146 100755 (executable)
@@ -23,5 +23,4 @@ conn rw-eap
        rightsendcert=never
        rightauth=eap-aka
        eap_identity=%any       
-       right=%any
        auto=add
index 8cffbe3b3310a7f46bfcb438dd6fbb3d29adf915..5f779d1afb3209529838e3d03242a611717422b8 100755 (executable)
@@ -9,15 +9,16 @@ conn %default
        rekeymargin=3m
        keyingtries=1
        keyexchange=ikev2
-       authby=eap
 
 conn home
        left=PH_IP_CAROL
        leftnexthop=%direct
        leftid=carol@strongswan.org
+       leftauth=eap
        leftfirewall=yes
        eap_identity=carol
        right=PH_IP_MOON
        rightid=@moon.strongswan.org
        rightsubnet=10.1.0.0/16
+       rightauth=pubkey
        auto=add
index 08b920afd0844f7b98ce04362f98a07252b372b7..11ff844003926c82dc2f841a40a4ed6500f474b1 100755 (executable)
@@ -12,15 +12,15 @@ conn %default
        keyexchange=ikev2
 
 conn rw-eap
-       authby=rsasig
-       eap=radius
-       eap_identity=%identity
        left=PH_IP_MOON
        leftsubnet=10.1.0.0/16
        leftid=@moon.strongswan.org
        leftcert=moonCert.pem
+       leftauth=pubkey
        leftfirewall=yes
        rightid=*@strongswan.org
        rightsendcert=never
+       rightauth=eap-radius
+       eap_identity=%any
        right=%any
        auto=add
index 2af93a31327f6863766241727208615bffb342c1..ba9294f6aa2a689cb265130e755f0b4ab29d953c 100755 (executable)
@@ -9,14 +9,15 @@ conn %default
        rekeymargin=3m
        keyingtries=1
        keyexchange=ikev2
-       authby=eap
 
 conn home
        left=PH_IP_CAROL
        leftnexthop=%direct
        leftid=carol@strongswan.org
+       leftauth=eap
        leftfirewall=yes
        right=PH_IP_MOON
        rightid=@moon.strongswan.org
        rightsubnet=10.1.0.0/16
+       rightauth=pubkey
        auto=add
index 825994278fb13ac8858d5a61e694698ecf9d23a3..4a885babc9c2dc579e5df6de5ecad63ed1e7f8b1 100755 (executable)
@@ -12,14 +12,14 @@ conn %default
        keyexchange=ikev2
 
 conn rw-eap
-       authby=rsasig
-       eap=radius
        left=PH_IP_MOON
        leftsubnet=10.1.0.0/16
        leftid=@moon.strongswan.org
        leftcert=moonCert.pem
+       leftauth=pubkey
        leftfirewall=yes
        rightid=*@strongswan.org
+       rightauth=eap-radius
        rightsendcert=never
        right=%any
        auto=add
index 2af93a31327f6863766241727208615bffb342c1..ba9294f6aa2a689cb265130e755f0b4ab29d953c 100755 (executable)
@@ -9,14 +9,15 @@ conn %default
        rekeymargin=3m
        keyingtries=1
        keyexchange=ikev2
-       authby=eap
 
 conn home
        left=PH_IP_CAROL
        leftnexthop=%direct
        leftid=carol@strongswan.org
+       leftauth=eap
        leftfirewall=yes
        right=PH_IP_MOON
        rightid=@moon.strongswan.org
        rightsubnet=10.1.0.0/16
+       rightauth=pubkey
        auto=add
index 7777e914b0fd03b8fdc206a82c678278365dd65c..28d52b9eb83ea9d0fee2da22ef421be987aeb83d 100755 (executable)
@@ -12,14 +12,14 @@ conn %default
        keyexchange=ikev2
 
 conn rw-eap
-       authby=rsasig
-       eap=md5
        left=PH_IP_MOON
        leftsubnet=10.1.0.0/16
        leftid=@moon.strongswan.org
        leftcert=moonCert.pem
+       leftauth=pubkey
        leftfirewall=yes
        rightid=*@strongswan.org
+       rightauth=eap-md5
        rightsendcert=never
        right=%any
        auto=add
index 94186cfa9ade59146de33fd31ceb47e8200ab54c..d3a99fe417bc486c3fbaccdc89c55b52565fe03b 100755 (executable)
@@ -9,15 +9,16 @@ conn %default
        rekeymargin=3m
        keyingtries=1
        keyexchange=ikev2
-       authby=eap
 
 conn home
        left=PH_IP_CAROL
        leftnexthop=%direct
        leftid=carol@strongswan.org
        leftfirewall=yes
+       leftauth=eap
        eap_identity=228060123456001
        right=PH_IP_MOON
        rightid=@moon.strongswan.org
        rightsubnet=10.1.0.0/16
+       rightauth=pubkey
        auto=add
index 08b920afd0844f7b98ce04362f98a07252b372b7..a86bb3d73d48286ef90fdabbb8def1c2aed9ba46 100755 (executable)
@@ -12,15 +12,15 @@ conn %default
        keyexchange=ikev2
 
 conn rw-eap
-       authby=rsasig
-       eap=radius
-       eap_identity=%identity
        left=PH_IP_MOON
        leftsubnet=10.1.0.0/16
        leftid=@moon.strongswan.org
        leftcert=moonCert.pem
+       leftauth=pubkey
        leftfirewall=yes
        rightid=*@strongswan.org
+       rightauth=eap-radius
+        eap_identity=%any
        rightsendcert=never
        right=%any
        auto=add
index 2af93a31327f6863766241727208615bffb342c1..ba9294f6aa2a689cb265130e755f0b4ab29d953c 100755 (executable)
@@ -9,14 +9,15 @@ conn %default
        rekeymargin=3m
        keyingtries=1
        keyexchange=ikev2
-       authby=eap
 
 conn home
        left=PH_IP_CAROL
        leftnexthop=%direct
        leftid=carol@strongswan.org
+       leftauth=eap
        leftfirewall=yes
        right=PH_IP_MOON
        rightid=@moon.strongswan.org
        rightsubnet=10.1.0.0/16
+       rightauth=pubkey
        auto=add
index 509deb945763ba738cc79ec8bf91d0d8cc5b86b9..53ecb4d7008195087e636bf9c5a3f541c6f26949 100755 (executable)
@@ -12,14 +12,14 @@ conn %default
        keyexchange=ikev2
 
 conn rw-eapsim
-       authby=rsasig
-       eap=sim
        left=PH_IP_MOON
        leftsubnet=10.1.0.0/16
        leftid=@moon.strongswan.org
        leftcert=moonCert.pem
+       leftauth=pubkey
        leftfirewall=yes
        rightid=*@strongswan.org
+       rightauth=eap-sim
        right=%any
        rightsendcert=never
        auto=add
index ce37764d461c83075ec5785f80c5d4ac61b8125d..9836736c30834b07b2af44d29f2c444f6ec74a67 100644 (file)
@@ -3,3 +3,9 @@
 pluto {
   load = openssl pubkey random hmac curl
 }
+
+# pluto uses optimized DH exponent sizes (RFC 3526)
+
+libstrongswan {
+  dh_exponent_ansi_x9_42 = no
+}
index ffe0cc1c2a126a5c483753128b86e9960038dd4c..c4211619b65283c6bf5bbcf03342919bd61095d0 100644 (file)
@@ -3,3 +3,9 @@
 pluto {
   load = aes des sha1 sha2 md5 gmp openssl pubkey random hmac curl
 }
+
+# pluto uses optimized DH exponent sizes (RFC 3526)
+
+libstrongswan {
+  dh_exponent_ansi_x9_42 = no
+}
index ce37764d461c83075ec5785f80c5d4ac61b8125d..9836736c30834b07b2af44d29f2c444f6ec74a67 100644 (file)
@@ -3,3 +3,9 @@
 pluto {
   load = openssl pubkey random hmac curl
 }
+
+# pluto uses optimized DH exponent sizes (RFC 3526)
+
+libstrongswan {
+  dh_exponent_ansi_x9_42 = no
+}
index 19d63693baf6e6a7a666351d04e8f57969b334aa..6689986532dc374aeff016fad183d758e805ee9e 100644 (file)
@@ -3,3 +3,9 @@
 pluto {
   load = openssl pubkey random hmac curl 
 }
+
+# pluto uses optimized DH exponent sizes (RFC 3526)
+
+libstrongswan {
+  dh_exponent_ansi_x9_42 = no
+}
index ffe0cc1c2a126a5c483753128b86e9960038dd4c..c4211619b65283c6bf5bbcf03342919bd61095d0 100644 (file)
@@ -3,3 +3,9 @@
 pluto {
   load = aes des sha1 sha2 md5 gmp openssl pubkey random hmac curl
 }
+
+# pluto uses optimized DH exponent sizes (RFC 3526)
+
+libstrongswan {
+  dh_exponent_ansi_x9_42 = no
+}
index 19d63693baf6e6a7a666351d04e8f57969b334aa..6689986532dc374aeff016fad183d758e805ee9e 100644 (file)
@@ -3,3 +3,9 @@
 pluto {
   load = openssl pubkey random hmac curl 
 }
+
+# pluto uses optimized DH exponent sizes (RFC 3526)
+
+libstrongswan {
+  dh_exponent_ansi_x9_42 = no
+}
index 0736ee6df0dd0db3932051209738221007a560fe..b0b6ff738fd5f2f243629578e92a2a9c399c2267 100755 (executable)
@@ -11,7 +11,6 @@ conn %default
        rekeymargin=3m
        keyingtries=1
        keyexchange=ikev1
-       authby=ecdsasig
 
 conn home
        left=PH_IP_CAROL
index ce37764d461c83075ec5785f80c5d4ac61b8125d..9836736c30834b07b2af44d29f2c444f6ec74a67 100644 (file)
@@ -3,3 +3,9 @@
 pluto {
   load = openssl pubkey random hmac curl
 }
+
+# pluto uses optimized DH exponent sizes (RFC 3526)
+
+libstrongswan {
+  dh_exponent_ansi_x9_42 = no
+}
index adf26f085a496d13dea3a1559135d8ad920f989e..23813b20b53686cd6c36c1249d67e7cff7e7c5b3 100755 (executable)
@@ -11,7 +11,6 @@ conn %default
        rekeymargin=3m
        keyingtries=1
        keyexchange=ikev1
-       authby=ecdsasig
 
 conn home
        left=PH_IP_DAVE
index ffe0cc1c2a126a5c483753128b86e9960038dd4c..c4211619b65283c6bf5bbcf03342919bd61095d0 100644 (file)
@@ -3,3 +3,9 @@
 pluto {
   load = aes des sha1 sha2 md5 gmp openssl pubkey random hmac curl
 }
+
+# pluto uses optimized DH exponent sizes (RFC 3526)
+
+libstrongswan {
+  dh_exponent_ansi_x9_42 = no
+}
index f85d2635ea76279d91cafc5af412980925de695b..f22a4ac4c8e62cd9cd7f953faae909a9776353e9 100755 (executable)
@@ -11,7 +11,6 @@ conn %default
        rekeymargin=3m
        keyingtries=1
        keyexchange=ikev1
-       authby=ecdsasig
 
 conn carol
        also=moon
index ce37764d461c83075ec5785f80c5d4ac61b8125d..9836736c30834b07b2af44d29f2c444f6ec74a67 100644 (file)
@@ -3,3 +3,9 @@
 pluto {
   load = openssl pubkey random hmac curl
 }
+
+# pluto uses optimized DH exponent sizes (RFC 3526)
+
+libstrongswan {
+  dh_exponent_ansi_x9_42 = no
+}
index 1887f76070c33d708494f2ab049c4f60eb1e4e46..e10230384b4226e185b0113f309bfd7d101f7b22 100644 (file)
@@ -1,6 +1,5 @@
 # /etc/strongswan.conf - strongSwan configuration file
 
 charon {
-  dh_exponent_ansi_x9_42 = no
   load = curl openssl random x509 pubkey hmac stroke kernel-netlink updown
 }
index 4f6fdc5674e032d87e2197c770f44147169737a8..c75d6b2a183d322a44ced56d513f3fe74548378e 100755 (executable)
@@ -11,7 +11,6 @@ conn %default
        rekeymargin=3m
        keyingtries=1
        keyexchange=ikev2
-       authby=ecdsasig
 
 conn home
        left=PH_IP_CAROL
index 3138458ed1c3397e8cc247a19748fea3741af50e..080ce9bce4d76f60100417e1b604d3776c8e762c 100755 (executable)
@@ -11,7 +11,6 @@ conn %default
        rekeymargin=3m
        keyingtries=1
        keyexchange=ikev2
-       authby=ecdsasig
 
 conn home
        left=PH_IP_DAVE
index 892e0c39b022d4637601ba671274d1708255b01a..c932101d260e78e09ca1dd807d3ccd2907ba1da8 100755 (executable)
@@ -11,7 +11,6 @@ conn %default
        rekeymargin=3m
        keyingtries=1
        keyexchange=ikev2
-       authby=ecdsasig
 
 conn rw
        left=PH_IP_MOON
index e10230384b4226e185b0113f309bfd7d101f7b22..195bcf046533328b360b15cf1116b34df608c44f 100644 (file)
@@ -1,5 +1,12 @@
 # /etc/strongswan.conf - strongSwan configuration file
 
 charon {
-  load = curl openssl random x509 pubkey hmac stroke kernel-netlink updown
+  load = curl test-vectors openssl random x509 pubkey hmac stroke kernel-netlink updown
 }
+
+libstrongswan {
+  crypto_test {
+    on_add = yes
+  }
+}
+
index d46082bdd42eebf1733a11a320103bfd3f31a651..f4b6dfdb9b1cb14397ffaab888bdb6885cd49bc9 100644 (file)
@@ -1,5 +1,12 @@
 # /etc/strongswan.conf - strongSwan configuration file
 
 charon {
-  load = curl aes des sha1 sha2 md5 gmp random x509 pubkey hmac stroke kernel-netlink updown
+  load = curl test-vectors aes des sha1 sha2 md5 gmp random x509 pubkey hmac stroke kernel-netlink updown
+}
+
+libstrongswan {
+  crypto_test {
+    required = yes
+    on_add = yes
+  }
 }
index 1887f76070c33d708494f2ab049c4f60eb1e4e46..166e24e7c618cb2d3b089501ba5144f07aa4985f 100644 (file)
@@ -1,6 +1,11 @@
 # /etc/strongswan.conf - strongSwan configuration file
 
 charon {
-  dh_exponent_ansi_x9_42 = no
-  load = curl openssl random x509 pubkey hmac stroke kernel-netlink updown
+  load = curl test-vectors openssl random x509 pubkey hmac stroke kernel-netlink updown
+}
+
+libstrongswan {
+  crypto_test {
+    on_add = yes
+  }
 }
index db6fa7486ea85311f0aa6dd8f91bc2b7c846813d..2f3bc449af9cebb5f6ef38511c4b8b3f83a098e2 100644 (file)
@@ -1,5 +1,11 @@
 # /etc/strongswan.conf - strongSwan configuration file
 
 charon {
-  load = curl aes des sha1 sha2 md5 gmp random x509 pubkey hmac xcbc stroke kernel-pfkey kernel-netlink updown
+  load = curl test-vectors aes des sha1 sha2 md5 gmp random x509 pubkey hmac xcbc stroke kernel-pfkey kernel-netlink updown
+}
+
+libstrongswan {
+  crypto_test {
+    on_add = yes
+  }
 }
index db6fa7486ea85311f0aa6dd8f91bc2b7c846813d..2f3bc449af9cebb5f6ef38511c4b8b3f83a098e2 100644 (file)
@@ -1,5 +1,11 @@
 # /etc/strongswan.conf - strongSwan configuration file
 
 charon {
-  load = curl aes des sha1 sha2 md5 gmp random x509 pubkey hmac xcbc stroke kernel-pfkey kernel-netlink updown
+  load = curl test-vectors aes des sha1 sha2 md5 gmp random x509 pubkey hmac xcbc stroke kernel-pfkey kernel-netlink updown
+}
+
+libstrongswan {
+  crypto_test {
+    on_add = yes
+  }
 }
index db6fa7486ea85311f0aa6dd8f91bc2b7c846813d..2f3bc449af9cebb5f6ef38511c4b8b3f83a098e2 100644 (file)
@@ -1,5 +1,11 @@
 # /etc/strongswan.conf - strongSwan configuration file
 
 charon {
-  load = curl aes des sha1 sha2 md5 gmp random x509 pubkey hmac xcbc stroke kernel-pfkey kernel-netlink updown
+  load = curl test-vectors aes des sha1 sha2 md5 gmp random x509 pubkey hmac xcbc stroke kernel-pfkey kernel-netlink updown
+}
+
+libstrongswan {
+  crypto_test {
+    on_add = yes
+  }
 }
index 29e2395e8bf673c909abebbdec14bae621da3913..329498d282a3fe9621be9b492353b5643609da2f 100644 (file)
@@ -6,5 +6,11 @@ charon {
       database = sqlite:///etc/ipsec.d/ipsec.db 
     }
   }
-  load = curl aes des sha1 sha2 md5 gmp random x509 pubkey hmac xcbc stroke kernel-netlink updown sqlite sql
+  load = curl test-vectors aes des sha1 sha2 md5 gmp random x509 pubkey hmac xcbc stroke kernel-netlink updown sqlite sql
+}
+
+libstrongswan {
+  crypto_test {
+    on_add = yes
+  }
 }
index 29e2395e8bf673c909abebbdec14bae621da3913..329498d282a3fe9621be9b492353b5643609da2f 100644 (file)
@@ -6,5 +6,11 @@ charon {
       database = sqlite:///etc/ipsec.d/ipsec.db 
     }
   }
-  load = curl aes des sha1 sha2 md5 gmp random x509 pubkey hmac xcbc stroke kernel-netlink updown sqlite sql
+  load = curl test-vectors aes des sha1 sha2 md5 gmp random x509 pubkey hmac xcbc stroke kernel-netlink updown sqlite sql
+}
+
+libstrongswan {
+  crypto_test {
+    on_add = yes
+  }
 }
index 29e2395e8bf673c909abebbdec14bae621da3913..329498d282a3fe9621be9b492353b5643609da2f 100644 (file)
@@ -6,5 +6,11 @@ charon {
       database = sqlite:///etc/ipsec.d/ipsec.db 
     }
   }
-  load = curl aes des sha1 sha2 md5 gmp random x509 pubkey hmac xcbc stroke kernel-netlink updown sqlite sql
+  load = curl test-vectors aes des sha1 sha2 md5 gmp random x509 pubkey hmac xcbc stroke kernel-netlink updown sqlite sql
+}
+
+libstrongswan {
+  crypto_test {
+    on_add = yes
+  }
 }