# /etc/strongswan.conf - strongSwan configuration file
swanctl {
- load = pem pkcs1 x509 revocation constraints pubkey openssl random
+ load = pem pkcs1 revocation constraints pubkey openssl random
}
charon-systemd {
- load = random nonce kdf pem pkcs1 af-alg gmp x509 revocation kernel-netlink curl socket-default updown vici
+ load = random nonce pem pkcs1 af-alg openssl revocation kernel-netlink curl socket-default updown vici
}
# /etc/strongswan.conf - strongSwan configuration file
swanctl {
- load = pem pkcs1 x509 revocation constraints pubkey openssl random
+ load = pem pkcs1 revocation constraints pubkey openssl random
}
charon-systemd {
- load = random nonce kdf pem pkcs1 af-alg gmp x509 revocation kernel-netlink curl socket-default updown vici
+ load = random nonce pem pkcs1 af-alg openssl revocation kernel-netlink curl socket-default updown vici
}
The roadwarrior <b>carol</b> and the gateway <b>moon</b> use the <b>Crypto API</b>
of the Linux kernel via the <b>af_alg</b> userland interface for all symmetric
-encryption and hash functions whereas roadwarrior <b>dave</b> uses the default
-<b>strongSwan</b> cryptographical plugins <b>aes des sha1 sha2 md5 gmp</b>.
+encryption and hash functions whereas roadwarrior <b>dave</b> uses <b>openssl</b>
+as the default <b>strongSwan</b> cryptographical plugin.
<p>
The roadwarriors <b>carol</b> and <b>dave</b> set up a connection each
to gateway <b>moon</b>. The authentication is based on <b>X.509 certificates</b>.
# /etc/strongswan.conf - strongSwan configuration file
swanctl {
- load = pem pkcs1 x509 revocation constraints pubkey openssl random
+ load = pem pkcs1 revocation constraints pubkey openssl random
}
charon-systemd {
- load = random nonce kdf test-vectors pem pkcs1 af-alg gmp x509 revocation curl ctr ccm gcm kernel-netlink socket-default updown vici
- integrity_test = yes
- crypto_test {
- on_add = yes
- }
+ load = random nonce test-vectors pem pkcs1 af-alg ccn gcm openssl revocation curl kernel-netlink socket-default updown vici
}
# /etc/strongswan.conf - strongSwan configuration file
swanctl {
- load = pem pkcs1 x509 revocation constraints pubkey openssl random
+ load = pem pkcs1 revocation constraints pubkey openssl random
}
charon-systemd {
- load = random nonce kdf test-vectors aes des sha1 sha2 md5 pem pkcs1 gmp x509 revocation curl hmac kdf xcbc ctr ccm gcm kernel-netlink socket-default updown vici
- integrity_test = yes
- crypto_test {
- on_add = yes
- }
+ load = random nonce openssl test-vectors pem pkcs1 revocation curl kernel-netlink socket-default updown vici
}
# /etc/strongswan.conf - strongSwan configuration file
swanctl {
- load = pem pkcs1 x509 revocation constraints pubkey openssl random
+ load = pem pkcs1 revocation constraints pubkey openssl random
}
charon-systemd {
- load = random nonce kdf test-vectors pem pkcs1 af-alg gmp x509 revocation curl ctr ccm gcm kernel-netlink socket-default updown vici
+ load = random nonce test-vectors pem pkcs1 af-alg ccm gcm openssl revocation curl kernel-netlink socket-default updown vici
+
integrity_test = yes
crypto_test {
on_add = yes