From b5549aeb1db8c4298526c1cbc08e8aa76d18b3ad Mon Sep 17 00:00:00 2001 From: Andreas Steffen Date: Thu, 20 Oct 2022 04:54:56 +0200 Subject: [PATCH] testing: Migrated gcrypt-ikev2 scenarios --- testing/tests/gcrypt-ikev2/rw-cert/description.txt | 5 ++--- .../gcrypt-ikev2/rw-cert/hosts/dave/etc/strongswan.conf | 2 +- 2 files changed, 3 insertions(+), 4 deletions(-) diff --git a/testing/tests/gcrypt-ikev2/rw-cert/description.txt b/testing/tests/gcrypt-ikev2/rw-cert/description.txt index 0502a6be25..c445473ab9 100644 --- a/testing/tests/gcrypt-ikev2/rw-cert/description.txt +++ b/testing/tests/gcrypt-ikev2/rw-cert/description.txt @@ -1,7 +1,7 @@ The roadwarrior carol and the gateway moon use the gcrypt plugin based on the GNU Libgcrypt library for all cryptographical functions -whereas roadwarrior dave uses the default strongSwan cryptographical -plugins aes des sha1 sha2 md5 gmp. +whereas roadwarrior dave uses openssl as the default strongSwan +cryptographical plugin.

The roadwarriors carol and dave set up a connection each to gateway moon. The authentication is based on X.509 certificates. @@ -9,4 +9,3 @@ Upon the successful establishment of the IPsec tunnels, the updown direct in swanctl.conf automatically inserts iptables-based firewall rules that let pass the tunneled traffic. In order to test both tunnel and firewall, both carol and dave ping the client alice behind the gateway moon. - diff --git a/testing/tests/gcrypt-ikev2/rw-cert/hosts/dave/etc/strongswan.conf b/testing/tests/gcrypt-ikev2/rw-cert/hosts/dave/etc/strongswan.conf index 22cc4d8a5a..472001fb98 100644 --- a/testing/tests/gcrypt-ikev2/rw-cert/hosts/dave/etc/strongswan.conf +++ b/testing/tests/gcrypt-ikev2/rw-cert/hosts/dave/etc/strongswan.conf @@ -5,7 +5,7 @@ swanctl { } charon-systemd { - load = test-vectors aes des sha1 sha2 md5 pem pkcs1 gmp random nonce x509 curl revocation hmac kdf xcbc ctr ccm vici stroke kernel-netlink socket-default updown + load = test-vectors pem pkcs1 random nonce openssl curl revocation xcbc vici stroke kernel-netlink socket-default updown integrity_test = yes crypto_test { required = yes -- 2.47.2