]> git.ipfire.org Git - thirdparty/strongswan.git/commitdiff
upgraded gcrypt-ikev2 scenarios to 5.0.0
authorAndreas Steffen <andreas.steffen@strongswan.org>
Sun, 6 May 2012 07:23:09 +0000 (09:23 +0200)
committerAndreas Steffen <andreas.steffen@strongswan.org>
Sun, 6 May 2012 07:23:09 +0000 (09:23 +0200)
testing/tests/gcrypt-ikev2/alg-camellia/evaltest.dat
testing/tests/gcrypt-ikev2/alg-camellia/hosts/carol/etc/ipsec.conf
testing/tests/gcrypt-ikev2/alg-camellia/hosts/moon/etc/ipsec.conf
testing/tests/gcrypt-ikev2/rw-cert/evaltest.dat
testing/tests/gcrypt-ikev2/rw-cert/hosts/carol/etc/ipsec.conf
testing/tests/gcrypt-ikev2/rw-cert/hosts/dave/etc/ipsec.conf
testing/tests/gcrypt-ikev2/rw-cert/hosts/moon/etc/ipsec.conf

index d77c4806edaf54d9c96b6e37d0e4fa1611e0c1bb..d82b68dcbedcf95d1bc0166b2da76f2440959623 100644 (file)
@@ -1,11 +1,13 @@
-moon::ipsec statusall::rw.*INSTALLED::YES
-carol::ipsec statusall::home.*INSTALLED::YES
-moon::ipsec statusall::IKE proposal: CAMELLIA_CBC_256/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/MODP_2048::YES
-carol::ipsec statusall::IKE proposal: CAMELLIA_CBC_256/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/MODP_2048::YES
+moon:: ipsec status 2> /dev/null::rw.*ESTABLISHED.*moon.strongswan.org.*carol@strongswan.org::YES
+carol::ipsec status 2> /dev/null::home.*ESTABLISHED.*carol@strongswan.org.*moon.strongswan.org::YES
+moon:: ipsec status 2> /dev/null::rw.*INSTALLED, TUNNEL::YES
+carol::ipsec status 2> /dev/null::home.*INSTALLED, TUNNEL::YES
+moon:: ipsec statusall 2> /dev/null::IKE proposal: CAMELLIA_CBC_256/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/MODP_2048::YES
+carol::ipsec statusall 2> /dev/null::IKE proposal: CAMELLIA_CBC_256/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/MODP_2048::YES
 carol::ping -c 1 -s 120 -p deadbeef PH_IP_ALICE::128 bytes from PH_IP_ALICE: icmp_seq=1::YES
-moon::ipsec statusall::CAMELLIA_CBC_192/HMAC_SHA1_96::YES
-carol::ipsec statusall::CAMELLIA_CBC_192/HMAC_SHA1_96::YES
-moon::ip xfrm state::enc cbc(camellia)::YES
+moon:: ipsec statusall 2> /dev/null::CAMELLIA_CBC_192/HMAC_SHA2_384_192::YES
+carol::ipsec statusall 2> /dev/null::CAMELLIA_CBC_192/HMAC_SHA2_384_192::YES
+moon:: ip xfrm state::enc cbc(camellia)::YES
 carol::ip xfrm state::enc cbc(camellia)::YES
-moon::tcpdump::IP carol.strongswan.org > moon.strongswan.org: ESP.*length 196::YES
-moon::tcpdump::IP moon.strongswan.org > carol.strongswan.org: ESP.*length 196::YES
+moon::tcpdump::IP carol.strongswan.org > moon.strongswan.org: ESP.*length 208::YES
+moon::tcpdump::IP moon.strongswan.org > carol.strongswan.org: ESP.*length 208::YES
index 37f8a7ecf88924e0868edc5b76234c82b0217cda..edc1285761b71a75af86515e5646f08e4d95a85d 100755 (executable)
@@ -1,8 +1,6 @@
 # /etc/ipsec.conf - strongSwan IPsec configuration file
 
 config setup
-        crlcheckinterval=180
-       strictcrlpolicy=yes
        plutostart=no
 
 conn %default
@@ -12,7 +10,7 @@ conn %default
        keyingtries=1
        keyexchange=ikev2
        ike=camellia256-sha512-modp2048!
-       esp=camellia192-sha1!
+       esp=camellia192-sha384!
 
 conn home
        left=PH_IP_CAROL
index f8d7e3fe992f7009604fca00339c4871b34515f3..e539c350a9fc216cf98c6ebf884a19879d9a0f0b 100755 (executable)
@@ -1,8 +1,6 @@
 # /etc/ipsec.conf - strongSwan IPsec configuration file
 
 config setup
-        crlcheckinterval=180
-       strictcrlpolicy=yes
        plutostart=no
 
 conn %default
@@ -12,7 +10,7 @@ conn %default
        keyingtries=1
        keyexchange=ikev2
        ike=camellia256-sha512-modp2048!
-       esp=camellia192-sha1!
+       esp=camellia192-sha384!
 
 conn rw
        left=PH_IP_MOON
index 06a0f8cdad5b456f9d49d5757c0749375f393309..b545c2289b40e1530767e30512ae4b78508bafa0 100644 (file)
@@ -1,10 +1,14 @@
-moon::ipsec statusall::rw.*ESTABLISHED::YES
-carol::ipsec statusall::home.*ESTABLISHED::YES
-dave::ipsec statusall::home.*ESTABLISHED::YES
+carol::ipsec status 2> /dev/null::home.*ESTABLISHED.*carol@strongswan.org.*moon.strongswan.org::YES
+dave:: ipsec status 2> /dev/null::home.*ESTABLISHED.*dave@strongswan.org.*moon.strongswan.org::YES
+moon:: ipsec status 2> /dev/null::rw\[1]: ESTABLISHED.*moon.strongswan.org.*carol@strongswan.org::YES
+moon:: ipsec status 2> /dev/null::rw\[2]: ESTABLISHED.*moon.strongswan.org.*dave@strongswan.org::YES
+carol::ipsec status 2> /dev/null::home.*INSTALLED, TUNNEL::YES
+dave:: ipsec status 2> /dev/null::home.*INSTALLED, TUNNEL::YES
+moon:: ipsec status 2> /dev/null::rw[{]1}.*INSTALLED, TUNNEL::YES
+moon:: ipsec status 2> /dev/null::rw[{]2}.*INSTALLED, TUNNEL::YES
 carol::ping -c 1 PH_IP_ALICE::64 bytes from PH_IP_ALICE: icmp_seq=1::YES
-dave::ping -c 1 PH_IP_ALICE::64 bytes from PH_IP_ALICE: icmp_seq=1::YES
+dave:: ping -c 1 PH_IP_ALICE::64 bytes from PH_IP_ALICE: icmp_seq=1::YES
 moon::tcpdump::IP carol.strongswan.org > moon.strongswan.org: ESP::YES
 moon::tcpdump::IP moon.strongswan.org > carol.strongswan.org: ESP::YES
 moon::tcpdump::IP dave.strongswan.org > moon.strongswan.org: ESP::YES
 moon::tcpdump::IP moon.strongswan.org > dave.strongswan.org: ESP::YES
-
index 4a8baa3ae045e735b136123fd5452fa3ae2fb663..6a61b7380cbb9ac2389f4224892e223c4342bf04 100755 (executable)
@@ -1,8 +1,6 @@
 # /etc/ipsec.conf - strongSwan IPsec configuration file
 
 config setup
-        crlcheckinterval=180
-       strictcrlpolicy=no
        plutostart=no
 
 conn %default
@@ -12,6 +10,7 @@ conn %default
        keyingtries=1
        keyexchange=ikev2
        ike=3des-sha1-modp1536!
+       esp=3des-sha1!
 
 conn home
        left=PH_IP_CAROL
index 42f03aab3469b2f039b11e91618dd34917174689..20f1341e145c1da9c2fb528ba4f40c2b11ee9081 100755 (executable)
@@ -1,8 +1,6 @@
 # /etc/ipsec.conf - strongSwan IPsec configuration file
 
 config setup
-        crlcheckinterval=180
-       strictcrlpolicy=no
        plutostart=no
 
 conn %default
@@ -11,7 +9,8 @@ conn %default
        rekeymargin=3m
        keyingtries=1
        keyexchange=ikev2
-       ike=aes256-sha256-modp2048!
+       ike=aes256-sha512-modp2048!
+       esp=aes256-sha512!
 
 conn home
        left=PH_IP_DAVE
index 2e84f2e6a99c4ebf1489ecfc36ba2c410db17369..d7ab149014f3f564ec451846fd067eebd5d05b74 100755 (executable)
@@ -1,8 +1,6 @@
 # /etc/ipsec.conf - strongSwan IPsec configuration file
 
 config setup
-        crlcheckinterval=180
-       strictcrlpolicy=no
        plutostart=no
 
 conn %default
@@ -11,7 +9,8 @@ conn %default
        rekeymargin=3m
        keyingtries=1
        keyexchange=ikev2
-       ike=aes256-sha256-modp2048,3des-sha1-modp1536!
+       ike=aes256-sha512-modp2048,3des-sha1-modp1536!
+       esp=aes256-sha512,3des-sha1!
 
 conn rw
        left=PH_IP_MOON