]> git.ipfire.org Git - thirdparty/strongswan.git/blob - testing/tests/openssl-ikev2/rw-eap-tls-only/evaltest.dat
5b525ef0632073ad86c0d086c28300041f967e6b
[thirdparty/strongswan.git] / testing / tests / openssl-ikev2 / rw-eap-tls-only / evaltest.dat
1 carol::ipsec status 2> /dev/null::home.*ESTABLISHED::YES
2 moon:: ipsec status 2> /dev/null::rw-eap.*ESTABLISHED::YES
3 carol::cat /var/log/daemon.log::server requested EAP_TLS authentication::YES
4 carol::cat /var/log/daemon.log::negotiated TLS 1.2 using suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256::YES
5 carol::cat /var/log/daemon.log::allow mutual EAP-only authentication::YES
6 carol::cat /var/log/daemon.log::authentication of 'C=CH, O=Linux strongSwan, OU=ECDSA 521 bit, CN=moon.strongswan.org' with EAP successful::YES
7 moon:: cat /var/log/daemon.log::authentication of 'C=CH, O=Linux strongSwan, OU=ECDSA 256 bit, CN=carol@strongswan.org' with EAP successful::YES
8 carol::ping -c 1 PH_IP_ALICE::64 bytes from PH_IP_ALICE: icmp_.eq=1::YES
9 moon::tcpdump::IP carol.strongswan.org > moon.strongswan.org: ESP::YES
10 moon::tcpdump::IP moon.strongswan.org > carol.strongswan.org: ESP::YES