all x509 based pfkey scenarios require the revocation plugin
[strongswan.git] / testing / tests / pfkey / alg-sha512 / evaltest.dat
1 moon::ipsec statusall::rw.*INSTALLED::YES
2 carol::ipsec statusall::home.*INSTALLED::YES
3 moon::ipsec statusall::rw.*IKE proposal.*AES_CBC_256/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/MODP_4096::YES
4 carol::ipsec statusall::home.*IKE proposal.*AES_CBC_256/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/MODP_4096::YES
5 carol::ping -c 1 -s 120 -p deadbeef 10.1.0.10::128 bytes from 10.1.0.10: icmp_seq=1::YES
6 moon::ipsec statusall::rw.*AES_CBC_256/HMAC_SHA2_512_256,::YES
7 carol::ipsec statusall::home.*AES_CBC_256/HMAC_SHA2_512_256,::YES
8 moon::ip xfrm state::auth hmac(sha512)::YES
9 carol::ip xfrm state::auth hmac(sha512)::YES
10 moon::tcpdump::IP carol.strongswan.org > moon.strongswan.org: ESP.*length 216::YES
11 moon::tcpdump::IP moon.strongswan.org > carol.strongswan.org: ESP.*length 216::YES