testing: Migrated af-alg scenarios

This commit is contained in:
Andreas Steffen 2022-10-19 10:57:22 +02:00 committed by Tobias Brunner
parent fdc9e69523
commit 17e0f20f57
6 changed files with 13 additions and 20 deletions

View File

@ -1,9 +1,9 @@
# /etc/strongswan.conf - strongSwan configuration file
swanctl {
load = pem pkcs1 x509 revocation constraints pubkey openssl random
load = pem pkcs1 revocation constraints pubkey openssl random
}
charon-systemd {
load = random nonce kdf pem pkcs1 af-alg gmp x509 revocation kernel-netlink curl socket-default updown vici
load = random nonce pem pkcs1 af-alg openssl revocation kernel-netlink curl socket-default updown vici
}

View File

@ -1,9 +1,9 @@
# /etc/strongswan.conf - strongSwan configuration file
swanctl {
load = pem pkcs1 x509 revocation constraints pubkey openssl random
load = pem pkcs1 revocation constraints pubkey openssl random
}
charon-systemd {
load = random nonce kdf pem pkcs1 af-alg gmp x509 revocation kernel-netlink curl socket-default updown vici
load = random nonce pem pkcs1 af-alg openssl revocation kernel-netlink curl socket-default updown vici
}

View File

@ -1,7 +1,7 @@
The roadwarrior <b>carol</b> and the gateway <b>moon</b> use the <b>Crypto API</b>
of the Linux kernel via the <b>af_alg</b> userland interface for all symmetric
encryption and hash functions whereas roadwarrior <b>dave</b> uses the default
<b>strongSwan</b> cryptographical plugins <b>aes des sha1 sha2 md5 gmp</b>.
encryption and hash functions whereas roadwarrior <b>dave</b> uses <b>openssl</b>
as the default <b>strongSwan</b> cryptographical plugin.
<p>
The roadwarriors <b>carol</b> and <b>dave</b> set up a connection each
to gateway <b>moon</b>. The authentication is based on <b>X.509 certificates</b>.

View File

@ -1,13 +1,9 @@
# /etc/strongswan.conf - strongSwan configuration file
swanctl {
load = pem pkcs1 x509 revocation constraints pubkey openssl random
load = pem pkcs1 revocation constraints pubkey openssl random
}
charon-systemd {
load = random nonce kdf test-vectors pem pkcs1 af-alg gmp x509 revocation curl ctr ccm gcm kernel-netlink socket-default updown vici
integrity_test = yes
crypto_test {
on_add = yes
}
load = random nonce test-vectors pem pkcs1 af-alg ccn gcm openssl revocation curl kernel-netlink socket-default updown vici
}

View File

@ -1,13 +1,9 @@
# /etc/strongswan.conf - strongSwan configuration file
swanctl {
load = pem pkcs1 x509 revocation constraints pubkey openssl random
load = pem pkcs1 revocation constraints pubkey openssl random
}
charon-systemd {
load = random nonce kdf test-vectors aes des sha1 sha2 md5 pem pkcs1 gmp x509 revocation curl hmac kdf xcbc ctr ccm gcm kernel-netlink socket-default updown vici
integrity_test = yes
crypto_test {
on_add = yes
}
load = random nonce openssl test-vectors pem pkcs1 revocation curl kernel-netlink socket-default updown vici
}

View File

@ -1,11 +1,12 @@
# /etc/strongswan.conf - strongSwan configuration file
swanctl {
load = pem pkcs1 x509 revocation constraints pubkey openssl random
load = pem pkcs1 revocation constraints pubkey openssl random
}
charon-systemd {
load = random nonce kdf test-vectors pem pkcs1 af-alg gmp x509 revocation curl ctr ccm gcm kernel-netlink socket-default updown vici
load = random nonce test-vectors pem pkcs1 af-alg ccm gcm openssl revocation curl kernel-netlink socket-default updown vici
integrity_test = yes
crypto_test {
on_add = yes