testing: Fix some IKEv1 scenarios after listing DH groups for CHILD_SAs
[strongswan.git] / testing / tests / ikev1 / alg-sha512 / evaltest.dat
1 moon:: ipsec status 2> /dev/null::rw.*ESTABLISHED.*moon.strongswan.org.*carol@strongswan.org::YES
2 carol::ipsec status 2> /dev/null::home.*ESTABLISHED.*carol@strongswan.org.*moon.strongswan.org::YES
3 moon:: ipsec status 2> /dev/null::rw.*INSTALLED, TUNNEL::YES
4 carol::ipsec status 2> /dev/null::home.*INSTALLED, TUNNEL::YES
5 moon:: ipsec statusall 2> /dev/null::rw.*IKE proposal.*AES_CBC_256/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/MODP_4096::YES
6 carol::ipsec statusall 2> /dev/null::home.*IKE proposal.*AES_CBC_256/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/MODP_4096::YES
7 carol::ping -c 1 -s 120 -p deadbeef PH_IP_ALICE::128 bytes from PH_IP_ALICE: icmp_req=1::YES
8 moon:: ipsec statusall 2> /dev/null::rw.*AES_CBC_256/HMAC_SHA2_512_256/MODP_4096,::YES
9 carol::ipsec statusall 2> /dev/null::home.*AES_CBC_256/HMAC_SHA2_512_256/MODP_4096,::YES
10 moon:: ip xfrm state::auth-trunc hmac(sha512)::YES
11 carol::ip xfrm state::auth-trunc hmac(sha512)::YES
12 moon::tcpdump::IP carol.strongswan.org > moon.strongswan.org: ESP.*length 216::YES
13 moon::tcpdump::IP moon.strongswan.org > carol.strongswan.org: ESP.*length 216::YES