mirror of
https://github.com/strongswan/strongswan.git
synced 2025-10-03 00:00:24 -04:00
testing: Migrated gcrypt-ikev2 scenarios
This commit is contained in:
parent
b9e5764b75
commit
dc69cf2f65
@ -1,7 +1,7 @@
|
||||
The roadwarrior <b>carol</b> and the gateway <b>moon</b> use the <b>gcrypt</b>
|
||||
plugin based on the <b>GNU Libgcrypt</b> library for all cryptographical functions
|
||||
whereas roadwarrior <b>dave</b> uses the default <b>strongSwan</b> cryptographical
|
||||
plugins <b>aes des sha1 sha2 md5 gmp</b>.
|
||||
whereas roadwarrior <b>dave</b> uses <b>openssl</b> as the default <b>strongSwan</b>
|
||||
cryptographical plugin.
|
||||
<p>
|
||||
The roadwarriors <b>carol</b> and <b>dave</b> set up a connection each
|
||||
to gateway <b>moon</b>. The authentication is based on <b>X.509 certificates</b>.
|
||||
@ -9,4 +9,3 @@ Upon the successful establishment of the IPsec tunnels, the <b>updown</b> direct
|
||||
in swanctl.conf automatically inserts iptables-based firewall rules that let pass the
|
||||
tunneled traffic. In order to test both tunnel and firewall, both <b>carol</b> and
|
||||
<b>dave</b> ping the client <b>alice</b> behind the gateway <b>moon</b>.
|
||||
|
||||
|
@ -5,7 +5,7 @@ swanctl {
|
||||
}
|
||||
|
||||
charon-systemd {
|
||||
load = test-vectors aes des sha1 sha2 md5 pem pkcs1 gmp random nonce x509 curl revocation hmac kdf xcbc ctr ccm vici stroke kernel-netlink socket-default updown
|
||||
load = test-vectors pem pkcs1 random nonce openssl curl revocation xcbc vici stroke kernel-netlink socket-default updown
|
||||
integrity_test = yes
|
||||
crypto_test {
|
||||
required = yes
|
||||
|
Loading…
x
Reference in New Issue
Block a user