included bad case in ikev2/rw-eap-ttls-radius scenario
[strongswan.git] / testing / tests / ikev2 / rw-eap-ttls-radius / evaltest.dat
1 carol::cat /var/log/daemon.log::authentication of 'moon.strongswan.org' with RSA signature successful::YES
2 carol::cat /var/log/daemon.log::server requested EAP_TTLS authentication::YES
3 carol::cat /var/log/daemon.log::server requested EAP_MD5 authentication::YES
4 carol::cat /var/log/daemon.log::EAP method EAP_TTLS succeeded, MSK established::YES
5 carol::cat /var/log/daemon.log::authentication of 'moon.strongswan.org' with EAP successful::YES
6 dave::cat /var/log/daemon.log::authentication of 'moon.strongswan.org' with RSA signature successful::YES
7 dave::cat /var/log/daemon.log::server requested EAP_TTLS authentication::YES
8 dave::cat /var/log/daemon.log::server requested EAP_MD5 authentication::YES
9 dave::cat /var/log/daemon.log::received EAP_FAILURE, EAP authentication failed::YES
10 moon::cat /var/log/daemon.log::authentication of 'carol@strongswan.org' with EAP successful::YES
11 moon::cat /var/log/daemon.log::EAP method EAP_TTLS failed for peer dave@strongswan.org::YES
12 moon::ipsec statusall::rw-eap.*ESTABLISHED.*carol@strongswan.org::YES
13 moon::ipsec statusall::rw-eap.*ESTABLISHED.*dave@strongswan.org::NO
14 carol::ipsec statusall::home.*ESTABLISHED::YES
15 dave::ipsec statusall::home.*ESTABLISHED::NO
16 carol::ping -c 1 PH_IP_ALICE::64 bytes from PH_IP_ALICE: icmp_seq=1::YES
17 moon::tcpdump::IP carol.strongswan.org > moon.strongswan.org: ESP::YES
18 moon::tcpdump::IP moon.strongswan.org > carol.strongswan.org: ESP::YES
19
20