34 Commits

Author SHA1 Message Date
Andreas Steffen
2099a52618 testing: Migrated ikev2 scenarios to new default plugins 2024-11-22 14:14:52 +01:00
Tobias Brunner
3a52fc83f8 testing: Load kdf plugin in all scenarios that require it
Once we use plugin-provided prf+() these won't work otherwise.
2022-04-14 19:02:48 +02:00
Andreas Steffen
eba2622587 testing: Migrate ikev2-stroke-bye scenarios to vici 2021-06-22 10:23:06 +02:00
Andreas Steffen
7c5a2974b9 testing: Reorganizing IKEv1 and IKEv2 examples
For documentation purposes the new folders ikev1-algs, ikev2-algs,
ikev1-multi-ca and ikev2-multi-ca have been created. Most of the
test cases have now been converted to the vici interface. The
remaining legacy stroke scenarios yet to be converted have been put
into the ikev2-stroke-bye folder.

For documentation purposes some legacy stroke scenarios will be kept
in the ikev1-stroke, ikev2-stroke and ipv6-stroke folders.
2021-05-21 09:42:50 +02:00
Andreas Steffen
99c03e9a11 testing: make curve25519 the default DH group 2016-11-14 16:20:51 +01:00
Tobias Brunner
aacf84d837 testing: Add expect-connection calls for all tests and hosts
There are some exceptions (e.g. those that use auto=start or p2pnat).
2016-06-16 14:35:18 +02:00
Tobias Brunner
8f56bbc82b testing: Update test scenarios for Debian jessie
The main difference is that ping now reports icmp_seq instead of
icmp_req, so we match for icmp_.eq, which works with both releases.

tcpdump now also reports port 4500 as ipsec-nat-t.
2016-06-16 14:04:11 +02:00
Tobias Brunner
f519acd42f testing: Remove nearly all sleep calls from pretest and posttest scripts
By consistently using the `expect-connection` helper we can avoid pretty
much all previously needed calls to sleep.
2015-11-09 15:18:35 +01:00
Tobias Brunner
4aa24d4c13 testing: Update test conditions because signature schemes are now logged
RFC 7427 signature authentication is now used between strongSwan hosts
by default, which causes the actual signature schemes to get logged.
2015-03-04 13:54:10 +01:00
Martin Willi
44b6a34d43 configure: Load fetcher plugins after crypto base plugins
Some fetcher plugins (such as curl) might build upon OpenSSL to implement
HTTPS fetching. As we set (and can't unset) threading callbacks in our
openssl plugin, we must ensure that OpenSSL functions don't get called after
openssl plugin unloading.

We achieve that by loading curl and all other fetcher plugins after the base
crypto plugins, including openssl.
2014-09-24 17:34:54 +02:00
Tobias Brunner
b1169a880a Updated comments in test.conf of all tests 2013-01-17 16:56:02 +01:00
Tobias Brunner
7699a928f7 Renamed $UMLHOSTS to $VIRTHOSTS 2013-01-17 16:56:02 +01:00
Andreas Steffen
d815235d17 use iptables-restore in all ikev2 firewall scenarios 2013-01-17 16:55:00 +01:00
Reto Buerki
533177003c Adapt test configurations
Adapt test configurations to the new Debian-based system.
2013-01-17 15:22:07 +01:00
Andreas Steffen
daa857029f removed plutostart parameter 2012-06-13 21:19:05 +02:00
Andreas Steffen
31c83b973e load nonce plugin 2012-05-23 15:05:57 +02:00
Andreas Steffen
a56fdff194 upgraded ikev2 scenarios to 5.0.0 2012-05-11 11:00:32 +02:00
Andreas Steffen
2cf4d34f2f all x509 based ikev2 scenarios require the revocation plugin 2010-07-15 21:39:01 +02:00
Tobias Brunner
a5166b16a1 Adding socket-default to the plugin list in all test cases. 2010-03-09 17:43:21 +01:00
Martin Willi
41f57038e4 tests load pem/pkcs1 plugins, pubkey plugin not needed anymore 2009-08-26 11:23:55 +02:00
Martin Willi
6f3ea4a516 loading updown plugin if required 2008-10-16 12:48:27 +00:00
Andreas Steffen
e8c58d8e64 explicitly load kernel-netlink plugin in UML scenarios 2008-10-07 04:51:20 +00:00
Andreas Steffen
949b9664a5 adapted evaltest.dat to modified RSA signature debug output 2008-06-21 13:19:13 +00:00
Andreas Steffen
c9be754a45 define plugins to be loaded in strongswan.conf 2008-05-28 08:29:51 +00:00
Andreas Steffen
6898ca1397 added ikev2/esp-alg-aes-ccm and ikev2/esp-alg-aes-gcm scenarios 2008-05-17 21:57:08 +00:00
Andreas Steffen
f7b49faa51 ID_FQDN lost its @ prefix 2007-08-03 13:36:28 +00:00
Andreas Steffen
aca0317d92 removed all nexthop statements 2007-06-10 18:52:14 +00:00
Andreas Steffen
915c7add1f enabled crl fetching using crlcheckinterval != 0 2007-04-05 17:51:12 +00:00
Andreas Steffen
389623374f enabled crl fetching using crlcheckinterval != 0 2007-04-05 17:40:33 +00:00
Andreas Steffen
ace5de18b2 iptables -L has now a link of its own 2007-04-03 22:03:25 +00:00
Andreas Steffen
d2bb572f79 do not sent certreq payloads when the peer is known to use PSK 2006-10-31 06:54:28 +00:00
Andreas Steffen
5435111a34 position of (myself) moved in log output 2006-10-31 06:51:04 +00:00
Andreas Steffen
ade9743ec4 fixed due to new logging concept 2006-10-27 17:54:06 +00:00
Andreas Steffen
b3fcb01fd2 added new test scenarios 2006-09-25 05:42:13 +00:00