added nonce plugin to gcrypt scenarios
[strongswan.git] / testing / tests / gcrypt-ikev1 / alg-serpent / evaltest.dat
1 carol::ipsec status 2> /dev/null::home.*ESTABLISHED.*carol@strongswan.org.*moon.strongswan.org::YES
2 moon:: ipsec status 2> /dev/null::rw.*ESTABLISHED.*moon.strongswan.org.*carol@strongswan.org::YES
3 carol::ipsec status 2> /dev/null::home.*INSTALLED, TUNNEL::YES
4 moon:: ipsec status 2> /dev/null::rw.*INSTALLED, TUNNEL::YES
5 carol::ipsec statusall 2> /dev/null::IKE proposal: SERPENT_CBC_256/HMAC_SHA2_512_256::YES
6 moon:: ipsec statusall 2> /dev/null::IKE proposal: SERPENT_CBC_256/HMAC_SHA2_512_256::YES
7 carol::ping -c 1 -s 120 -p deadbeef PH_IP_ALICE::128 bytes from PH_IP_ALICE: icmp_seq=1::YES
8 carol::ipsec statusall 2> /dev/null::SERPENT_CBC_256/HMAC_SHA2_512_256,::YES
9 moon:: ipsec statusall 2> /dev/null::SERPENT_CBC_256/HMAC_SHA2_512_256,::YES
10 carol::ip xfrm state::enc cbc(serpent)::YES
11 moon:: ip xfrm state::enc cbc(serpent)::YES
12 moon::tcpdump::IP carol.strongswan.org > moon.strongswan.org: ESP.*length 216::YES
13 moon::tcpdump::IP moon.strongswan.org > carol.strongswan.org: ESP.*length 216::YES