upgraded ikev1 scenarios to 5.0.0
authorAndreas Steffen <andreas.steffen@strongswan.org>
Wed, 23 May 2012 12:45:15 +0000 (14:45 +0200)
committerAndreas Steffen <andreas.steffen@strongswan.org>
Wed, 23 May 2012 12:45:15 +0000 (14:45 +0200)
1065 files changed:
testing/tests/ikev1/after-2038-certs/description.txt [deleted file]
testing/tests/ikev1/after-2038-certs/evaltest.dat [deleted file]
testing/tests/ikev1/after-2038-certs/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/after-2038-certs/hosts/carol/etc/ipsec.d/cacerts/strongswanCert.pem [deleted file]
testing/tests/ikev1/after-2038-certs/hosts/carol/etc/ipsec.d/certs/carolCert.pem [deleted file]
testing/tests/ikev1/after-2038-certs/hosts/carol/etc/ipsec.d/private/carolKey.pem [deleted file]
testing/tests/ikev1/after-2038-certs/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/after-2038-certs/hosts/moon/etc/ipsec.d/cacerts/strongswanCert.pem [deleted file]
testing/tests/ikev1/after-2038-certs/hosts/moon/etc/ipsec.d/certs/moonCert.pem [deleted file]
testing/tests/ikev1/after-2038-certs/hosts/moon/etc/ipsec.d/private/moonKey.pem [deleted file]
testing/tests/ikev1/after-2038-certs/posttest.dat [deleted file]
testing/tests/ikev1/after-2038-certs/pretest.dat [deleted file]
testing/tests/ikev1/after-2038-certs/test.conf [deleted file]
testing/tests/ikev1/alg-3des-md5/description.txt [new file with mode: 0644]
testing/tests/ikev1/alg-3des-md5/evaltest.dat [new file with mode: 0644]
testing/tests/ikev1/alg-3des-md5/hosts/carol/etc/ipsec.conf [new file with mode: 0755]
testing/tests/ikev1/alg-3des-md5/hosts/carol/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/alg-3des-md5/hosts/moon/etc/ipsec.conf [new file with mode: 0755]
testing/tests/ikev1/alg-3des-md5/hosts/moon/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/alg-3des-md5/posttest.dat [new file with mode: 0644]
testing/tests/ikev1/alg-3des-md5/pretest.dat [new file with mode: 0644]
testing/tests/ikev1/alg-3des-md5/test.conf [new file with mode: 0644]
testing/tests/ikev1/alg-blowfish/description.txt
testing/tests/ikev1/alg-blowfish/evaltest.dat
testing/tests/ikev1/alg-blowfish/hosts/carol/etc/ipsec.conf
testing/tests/ikev1/alg-blowfish/hosts/carol/etc/strongswan.conf
testing/tests/ikev1/alg-blowfish/hosts/dave/etc/ipsec.conf [new file with mode: 0755]
testing/tests/ikev1/alg-blowfish/hosts/dave/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/alg-blowfish/hosts/moon/etc/ipsec.conf
testing/tests/ikev1/alg-blowfish/hosts/moon/etc/strongswan.conf
testing/tests/ikev1/alg-blowfish/posttest.dat
testing/tests/ikev1/alg-blowfish/pretest.dat
testing/tests/ikev1/alg-blowfish/test.conf
testing/tests/ikev1/alg-modp-subgroup/evaltest.dat
testing/tests/ikev1/alg-modp-subgroup/hosts/carol/etc/ipsec.conf
testing/tests/ikev1/alg-modp-subgroup/hosts/carol/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/alg-modp-subgroup/hosts/dave/etc/ipsec.conf
testing/tests/ikev1/alg-modp-subgroup/hosts/dave/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/alg-modp-subgroup/hosts/moon/etc/ipsec.conf
testing/tests/ikev1/alg-modp-subgroup/hosts/moon/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/alg-sha256-96/description.txt [deleted file]
testing/tests/ikev1/alg-sha256-96/evaltest.dat [deleted file]
testing/tests/ikev1/alg-sha256-96/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/alg-sha256-96/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/alg-sha256-96/posttest.dat [deleted file]
testing/tests/ikev1/alg-sha256-96/pretest.dat [deleted file]
testing/tests/ikev1/alg-sha256-96/test.conf [deleted file]
testing/tests/ikev1/alg-sha256/description.txt
testing/tests/ikev1/alg-sha256/evaltest.dat
testing/tests/ikev1/alg-sha256/hosts/carol/etc/ipsec.conf
testing/tests/ikev1/alg-sha256/hosts/carol/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/alg-sha256/hosts/moon/etc/ipsec.conf
testing/tests/ikev1/alg-sha256/hosts/moon/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/alg-sha256/posttest.dat
testing/tests/ikev1/alg-sha256/pretest.dat
testing/tests/ikev1/alg-sha256/test.conf
testing/tests/ikev1/alg-sha384/description.txt
testing/tests/ikev1/alg-sha384/evaltest.dat
testing/tests/ikev1/alg-sha384/hosts/carol/etc/ipsec.conf
testing/tests/ikev1/alg-sha384/hosts/carol/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/alg-sha384/hosts/moon/etc/ipsec.conf
testing/tests/ikev1/alg-sha384/hosts/moon/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/alg-sha384/posttest.dat
testing/tests/ikev1/alg-sha384/pretest.dat
testing/tests/ikev1/alg-sha384/test.conf
testing/tests/ikev1/alg-sha512/description.txt
testing/tests/ikev1/alg-sha512/evaltest.dat
testing/tests/ikev1/alg-sha512/hosts/carol/etc/ipsec.conf
testing/tests/ikev1/alg-sha512/hosts/carol/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/alg-sha512/hosts/moon/etc/ipsec.conf
testing/tests/ikev1/alg-sha512/hosts/moon/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/alg-sha512/posttest.dat
testing/tests/ikev1/alg-sha512/pretest.dat
testing/tests/ikev1/alg-sha512/test.conf
testing/tests/ikev1/attr-cert/description.txt [deleted file]
testing/tests/ikev1/attr-cert/evaltest.dat [deleted file]
testing/tests/ikev1/attr-cert/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/attr-cert/hosts/dave/etc/ipsec.conf [deleted file]
testing/tests/ikev1/attr-cert/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/attr-cert/hosts/moon/etc/ipsec.d/aacerts/aaCert.pem [deleted file]
testing/tests/ikev1/attr-cert/hosts/moon/etc/openac/aaKey.pem [deleted file]
testing/tests/ikev1/attr-cert/hosts/moon/etc/openac/carolCert.pem [deleted file]
testing/tests/ikev1/attr-cert/hosts/moon/etc/openac/daveCert.pem [deleted file]
testing/tests/ikev1/attr-cert/hosts/moon/etc/openac/default.conf [deleted file]
testing/tests/ikev1/attr-cert/hosts/moon/etc/strongswan.conf [deleted file]
testing/tests/ikev1/attr-cert/posttest.dat [deleted file]
testing/tests/ikev1/attr-cert/pretest.dat [deleted file]
testing/tests/ikev1/attr-cert/test.conf [deleted file]
testing/tests/ikev1/compress/description.txt [deleted file]
testing/tests/ikev1/compress/evaltest.dat [deleted file]
testing/tests/ikev1/compress/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/compress/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/compress/posttest.dat [deleted file]
testing/tests/ikev1/compress/pretest.dat [deleted file]
testing/tests/ikev1/compress/test.conf [deleted file]
testing/tests/ikev1/config-payload/description.txt [new file with mode: 0644]
testing/tests/ikev1/config-payload/evaltest.dat [new file with mode: 0644]
testing/tests/ikev1/config-payload/hosts/carol/etc/ipsec.conf [new file with mode: 0755]
testing/tests/ikev1/config-payload/hosts/carol/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/config-payload/hosts/dave/etc/ipsec.conf [new file with mode: 0755]
testing/tests/ikev1/config-payload/hosts/dave/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/config-payload/hosts/moon/etc/ipsec.conf [new file with mode: 0755]
testing/tests/ikev1/config-payload/hosts/moon/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/config-payload/posttest.dat [new file with mode: 0644]
testing/tests/ikev1/config-payload/pretest.dat [new file with mode: 0644]
testing/tests/ikev1/config-payload/test.conf [new file with mode: 0644]
testing/tests/ikev1/crl-from-cache/description.txt [deleted file]
testing/tests/ikev1/crl-from-cache/evaltest.dat [deleted file]
testing/tests/ikev1/crl-from-cache/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/crl-from-cache/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/crl-from-cache/posttest.dat [deleted file]
testing/tests/ikev1/crl-from-cache/pretest.dat [deleted file]
testing/tests/ikev1/crl-from-cache/test.conf [deleted file]
testing/tests/ikev1/crl-ldap/description.txt [deleted file]
testing/tests/ikev1/crl-ldap/evaltest.dat [deleted file]
testing/tests/ikev1/crl-ldap/hosts/carol/etc/init.d/iptables [deleted file]
testing/tests/ikev1/crl-ldap/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/crl-ldap/hosts/carol/etc/ipsec.d/crls/5da7dd700651327ee7b66db3b5e5e060ea2e4def.crl [deleted file]
testing/tests/ikev1/crl-ldap/hosts/carol/etc/strongswan.conf [deleted file]
testing/tests/ikev1/crl-ldap/hosts/moon/etc/init.d/iptables [deleted file]
testing/tests/ikev1/crl-ldap/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/crl-ldap/hosts/moon/etc/ipsec.d/crls/5da7dd700651327ee7b66db3b5e5e060ea2e4def.crl [deleted file]
testing/tests/ikev1/crl-ldap/hosts/moon/etc/strongswan.conf [deleted file]
testing/tests/ikev1/crl-ldap/posttest.dat [deleted file]
testing/tests/ikev1/crl-ldap/pretest.dat [deleted file]
testing/tests/ikev1/crl-ldap/test.conf [deleted file]
testing/tests/ikev1/crl-revoked/description.txt [deleted file]
testing/tests/ikev1/crl-revoked/evaltest.dat [deleted file]
testing/tests/ikev1/crl-revoked/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/crl-revoked/hosts/carol/etc/ipsec.d/certs/carolRevokedCert.pem [deleted file]
testing/tests/ikev1/crl-revoked/hosts/carol/etc/ipsec.d/private/carolRevokedKey.pem [deleted file]
testing/tests/ikev1/crl-revoked/hosts/carol/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/crl-revoked/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/crl-revoked/posttest.dat [deleted file]
testing/tests/ikev1/crl-revoked/pretest.dat [deleted file]
testing/tests/ikev1/crl-revoked/test.conf [deleted file]
testing/tests/ikev1/crl-strict/description.txt [deleted file]
testing/tests/ikev1/crl-strict/evaltest.dat [deleted file]
testing/tests/ikev1/crl-strict/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/crl-strict/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/crl-strict/posttest.dat [deleted file]
testing/tests/ikev1/crl-strict/pretest.dat [deleted file]
testing/tests/ikev1/crl-strict/test.conf [deleted file]
testing/tests/ikev1/crl-to-cache/description.txt [deleted file]
testing/tests/ikev1/crl-to-cache/evaltest.dat [deleted file]
testing/tests/ikev1/crl-to-cache/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/crl-to-cache/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/crl-to-cache/posttest.dat [deleted file]
testing/tests/ikev1/crl-to-cache/pretest.dat [deleted file]
testing/tests/ikev1/crl-to-cache/test.conf [deleted file]
testing/tests/ikev1/default-keys/description.txt [deleted file]
testing/tests/ikev1/default-keys/evaltest.dat [deleted file]
testing/tests/ikev1/default-keys/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/default-keys/hosts/carol/etc/strongswan.conf [deleted file]
testing/tests/ikev1/default-keys/hosts/moon/etc/init.d/iptables [deleted file]
testing/tests/ikev1/default-keys/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/default-keys/hosts/moon/etc/strongswan.conf [deleted file]
testing/tests/ikev1/default-keys/posttest.dat [deleted file]
testing/tests/ikev1/default-keys/pretest.dat [deleted file]
testing/tests/ikev1/default-keys/test.conf [deleted file]
testing/tests/ikev1/double-nat-net/evaltest.dat
testing/tests/ikev1/double-nat-net/hosts/alice/etc/ipsec.conf
testing/tests/ikev1/double-nat-net/hosts/alice/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/double-nat-net/hosts/bob/etc/ipsec.conf
testing/tests/ikev1/double-nat-net/hosts/bob/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/double-nat-net/pretest.dat
testing/tests/ikev1/double-nat/evaltest.dat
testing/tests/ikev1/double-nat/hosts/alice/etc/ipsec.conf
testing/tests/ikev1/double-nat/hosts/alice/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/double-nat/hosts/bob/etc/ipsec.conf [new file with mode: 0755]
testing/tests/ikev1/double-nat/hosts/bob/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/double-nat/pretest.dat
testing/tests/ikev1/dpd-clear/description.txt
testing/tests/ikev1/dpd-clear/evaltest.dat
testing/tests/ikev1/dpd-clear/hosts/carol/etc/ipsec.conf [new file with mode: 0755]
testing/tests/ikev1/dpd-clear/hosts/carol/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/dpd-clear/hosts/moon/etc/ipsec.conf
testing/tests/ikev1/dpd-clear/hosts/moon/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/dpd-restart/description.txt
testing/tests/ikev1/dpd-restart/evaltest.dat
testing/tests/ikev1/dpd-restart/hosts/carol/etc/ipsec.conf
testing/tests/ikev1/dpd-restart/hosts/carol/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/dpd-restart/hosts/moon/etc/ipsec.conf
testing/tests/ikev1/dpd-restart/hosts/moon/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/dpd-restart/posttest.dat
testing/tests/ikev1/dpd-restart/pretest.dat
testing/tests/ikev1/dpd-restart/test.conf
testing/tests/ikev1/dynamic-initiator/description.txt [deleted file]
testing/tests/ikev1/dynamic-initiator/evaltest.dat [deleted file]
testing/tests/ikev1/dynamic-initiator/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/dynamic-initiator/hosts/dave/etc/ipsec.conf [deleted file]
testing/tests/ikev1/dynamic-initiator/hosts/dave/etc/ipsec.d/certs/carolCert.pem [deleted file]
testing/tests/ikev1/dynamic-initiator/hosts/dave/etc/ipsec.d/private/carolKey.pem [deleted file]
testing/tests/ikev1/dynamic-initiator/hosts/dave/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/dynamic-initiator/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/dynamic-initiator/posttest.dat [deleted file]
testing/tests/ikev1/dynamic-initiator/pretest.dat [deleted file]
testing/tests/ikev1/dynamic-initiator/test.conf [deleted file]
testing/tests/ikev1/dynamic-responder/description.txt [deleted file]
testing/tests/ikev1/dynamic-responder/evaltest.dat [deleted file]
testing/tests/ikev1/dynamic-responder/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/dynamic-responder/hosts/dave/etc/ipsec.conf [deleted file]
testing/tests/ikev1/dynamic-responder/hosts/dave/etc/ipsec.d/certs/carolCert.pem [deleted file]
testing/tests/ikev1/dynamic-responder/hosts/dave/etc/ipsec.d/private/carolKey.pem [deleted file]
testing/tests/ikev1/dynamic-responder/hosts/dave/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/dynamic-responder/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/dynamic-responder/posttest.dat [deleted file]
testing/tests/ikev1/dynamic-responder/pretest.dat [deleted file]
testing/tests/ikev1/dynamic-responder/test.conf [deleted file]
testing/tests/ikev1/dynamic-two-peers/description.txt [deleted file]
testing/tests/ikev1/dynamic-two-peers/evaltest.dat [deleted file]
testing/tests/ikev1/dynamic-two-peers/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/dynamic-two-peers/hosts/dave/etc/ipsec.conf [deleted file]
testing/tests/ikev1/dynamic-two-peers/hosts/moon/etc/hosts.stale [deleted file]
testing/tests/ikev1/dynamic-two-peers/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/dynamic-two-peers/posttest.dat [deleted file]
testing/tests/ikev1/dynamic-two-peers/pretest.dat [deleted file]
testing/tests/ikev1/dynamic-two-peers/test.conf [deleted file]
testing/tests/ikev1/esp-ah-transport/description.txt [deleted file]
testing/tests/ikev1/esp-ah-transport/evaltest.dat [deleted file]
testing/tests/ikev1/esp-ah-transport/hosts/carol/etc/init.d/iptables [deleted file]
testing/tests/ikev1/esp-ah-transport/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/esp-ah-transport/hosts/moon/etc/init.d/iptables [deleted file]
testing/tests/ikev1/esp-ah-transport/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/esp-ah-transport/posttest.dat [deleted file]
testing/tests/ikev1/esp-ah-transport/pretest.dat [deleted file]
testing/tests/ikev1/esp-ah-transport/test.conf [deleted file]
testing/tests/ikev1/esp-ah-tunnel/description.txt [deleted file]
testing/tests/ikev1/esp-ah-tunnel/evaltest.dat [deleted file]
testing/tests/ikev1/esp-ah-tunnel/hosts/carol/etc/init.d/iptables [deleted file]
testing/tests/ikev1/esp-ah-tunnel/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/esp-ah-tunnel/hosts/moon/etc/init.d/iptables [deleted file]
testing/tests/ikev1/esp-ah-tunnel/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/esp-ah-tunnel/posttest.dat [deleted file]
testing/tests/ikev1/esp-ah-tunnel/pretest.dat [deleted file]
testing/tests/ikev1/esp-ah-tunnel/test.conf [deleted file]
testing/tests/ikev1/esp-alg-aes-ccm/evaltest.dat
testing/tests/ikev1/esp-alg-aes-ccm/hosts/carol/etc/ipsec.conf
testing/tests/ikev1/esp-alg-aes-ccm/hosts/carol/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/esp-alg-aes-ccm/hosts/moon/etc/ipsec.conf
testing/tests/ikev1/esp-alg-aes-ccm/hosts/moon/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/esp-alg-aes-ctr/evaltest.dat
testing/tests/ikev1/esp-alg-aes-ctr/hosts/carol/etc/ipsec.conf
testing/tests/ikev1/esp-alg-aes-ctr/hosts/carol/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/esp-alg-aes-ctr/hosts/moon/etc/ipsec.conf
testing/tests/ikev1/esp-alg-aes-ctr/hosts/moon/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/esp-alg-aes-gcm/evaltest.dat
testing/tests/ikev1/esp-alg-aes-gcm/hosts/carol/etc/ipsec.conf
testing/tests/ikev1/esp-alg-aes-gcm/hosts/carol/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/esp-alg-aes-gcm/hosts/moon/etc/ipsec.conf
testing/tests/ikev1/esp-alg-aes-gcm/hosts/moon/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/esp-alg-aes-gmac/description.txt
testing/tests/ikev1/esp-alg-aes-gmac/evaltest.dat
testing/tests/ikev1/esp-alg-aes-gmac/hosts/carol/etc/ipsec.conf
testing/tests/ikev1/esp-alg-aes-gmac/hosts/carol/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/esp-alg-aes-gmac/hosts/moon/etc/ipsec.conf
testing/tests/ikev1/esp-alg-aes-gmac/hosts/moon/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/esp-alg-aes-xcbc/description.txt [new file with mode: 0644]
testing/tests/ikev1/esp-alg-aes-xcbc/evaltest.dat [new file with mode: 0644]
testing/tests/ikev1/esp-alg-aes-xcbc/hosts/carol/etc/ipsec.conf [new file with mode: 0755]
testing/tests/ikev1/esp-alg-aes-xcbc/hosts/carol/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/esp-alg-aes-xcbc/hosts/moon/etc/ipsec.conf [new file with mode: 0755]
testing/tests/ikev1/esp-alg-aes-xcbc/hosts/moon/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/esp-alg-aes-xcbc/posttest.dat [new file with mode: 0644]
testing/tests/ikev1/esp-alg-aes-xcbc/pretest.dat [new file with mode: 0644]
testing/tests/ikev1/esp-alg-aes-xcbc/test.conf [new file with mode: 0644]
testing/tests/ikev1/esp-alg-aesxcbc/description.txt [deleted file]
testing/tests/ikev1/esp-alg-aesxcbc/evaltest.dat [deleted file]
testing/tests/ikev1/esp-alg-aesxcbc/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/esp-alg-aesxcbc/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/esp-alg-aesxcbc/posttest.dat [deleted file]
testing/tests/ikev1/esp-alg-aesxcbc/pretest.dat [deleted file]
testing/tests/ikev1/esp-alg-aesxcbc/test.conf [deleted file]
testing/tests/ikev1/esp-alg-des/description.txt [deleted file]
testing/tests/ikev1/esp-alg-des/evaltest.dat [deleted file]
testing/tests/ikev1/esp-alg-des/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/esp-alg-des/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/esp-alg-des/posttest.dat [deleted file]
testing/tests/ikev1/esp-alg-des/pretest.dat [deleted file]
testing/tests/ikev1/esp-alg-des/test.conf [deleted file]
testing/tests/ikev1/esp-alg-null/description.txt
testing/tests/ikev1/esp-alg-null/evaltest.dat
testing/tests/ikev1/esp-alg-null/hosts/carol/etc/ipsec.conf
testing/tests/ikev1/esp-alg-null/hosts/carol/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/esp-alg-null/hosts/moon/etc/ipsec.conf
testing/tests/ikev1/esp-alg-null/hosts/moon/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/esp-alg-null/posttest.dat
testing/tests/ikev1/esp-alg-null/pretest.dat
testing/tests/ikev1/esp-alg-null/test.conf
testing/tests/ikev1/esp-alg-strict-fail/description.txt [deleted file]
testing/tests/ikev1/esp-alg-strict-fail/evaltest.dat [deleted file]
testing/tests/ikev1/esp-alg-strict-fail/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/esp-alg-strict-fail/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/esp-alg-strict-fail/posttest.dat [deleted file]
testing/tests/ikev1/esp-alg-strict-fail/pretest.dat [deleted file]
testing/tests/ikev1/esp-alg-strict-fail/test.conf [deleted file]
testing/tests/ikev1/esp-alg-strict/description.txt [deleted file]
testing/tests/ikev1/esp-alg-strict/evaltest.dat [deleted file]
testing/tests/ikev1/esp-alg-strict/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/esp-alg-strict/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/esp-alg-strict/posttest.dat [deleted file]
testing/tests/ikev1/esp-alg-strict/pretest.dat [deleted file]
testing/tests/ikev1/esp-alg-strict/test.conf [deleted file]
testing/tests/ikev1/esp-alg-weak/description.txt [deleted file]
testing/tests/ikev1/esp-alg-weak/evaltest.dat [deleted file]
testing/tests/ikev1/esp-alg-weak/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/esp-alg-weak/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/esp-alg-weak/posttest.dat [deleted file]
testing/tests/ikev1/esp-alg-weak/pretest.dat [deleted file]
testing/tests/ikev1/esp-alg-weak/test.conf [deleted file]
testing/tests/ikev1/host2host-cert/evaltest.dat
testing/tests/ikev1/host2host-cert/hosts/moon/etc/ipsec.conf [new file with mode: 0755]
testing/tests/ikev1/host2host-cert/hosts/moon/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/host2host-cert/hosts/sun/etc/ipsec.conf [new file with mode: 0755]
testing/tests/ikev1/host2host-cert/hosts/sun/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/host2host-cert/pretest.dat
testing/tests/ikev1/host2host-cert/test.conf
testing/tests/ikev1/host2host-swapped/description.txt [deleted file]
testing/tests/ikev1/host2host-swapped/evaltest.dat [deleted file]
testing/tests/ikev1/host2host-swapped/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/host2host-swapped/hosts/sun/etc/ipsec.conf [deleted file]
testing/tests/ikev1/host2host-swapped/posttest.dat [deleted file]
testing/tests/ikev1/host2host-swapped/pretest.dat [deleted file]
testing/tests/ikev1/host2host-swapped/test.conf [deleted file]
testing/tests/ikev1/host2host-transport/evaltest.dat
testing/tests/ikev1/host2host-transport/hosts/moon/etc/ipsec.conf
testing/tests/ikev1/host2host-transport/hosts/moon/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/host2host-transport/hosts/sun/etc/ipsec.conf
testing/tests/ikev1/host2host-transport/hosts/sun/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/ike-alg-strict-fail/description.txt [deleted file]
testing/tests/ikev1/ike-alg-strict-fail/evaltest.dat [deleted file]
testing/tests/ikev1/ike-alg-strict-fail/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/ike-alg-strict-fail/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/ike-alg-strict-fail/posttest.dat [deleted file]
testing/tests/ikev1/ike-alg-strict-fail/pretest.dat [deleted file]
testing/tests/ikev1/ike-alg-strict-fail/test.conf [deleted file]
testing/tests/ikev1/ike-alg-strict/description.txt [deleted file]
testing/tests/ikev1/ike-alg-strict/evaltest.dat [deleted file]
testing/tests/ikev1/ike-alg-strict/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/ike-alg-strict/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/ike-alg-strict/posttest.dat [deleted file]
testing/tests/ikev1/ike-alg-strict/pretest.dat [deleted file]
testing/tests/ikev1/ike-alg-strict/test.conf [deleted file]
testing/tests/ikev1/ip-pool-db-push/description.txt [deleted file]
testing/tests/ikev1/ip-pool-db-push/evaltest.dat [deleted file]
testing/tests/ikev1/ip-pool-db-push/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/ip-pool-db-push/hosts/carol/etc/strongswan.conf [deleted file]
testing/tests/ikev1/ip-pool-db-push/hosts/dave/etc/ipsec.conf [deleted file]
testing/tests/ikev1/ip-pool-db-push/hosts/dave/etc/strongswan.conf [deleted file]
testing/tests/ikev1/ip-pool-db-push/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/ip-pool-db-push/hosts/moon/etc/strongswan.conf [deleted file]
testing/tests/ikev1/ip-pool-db-push/posttest.dat [deleted file]
testing/tests/ikev1/ip-pool-db-push/pretest.dat [deleted file]
testing/tests/ikev1/ip-pool-db-push/test.conf [deleted file]
testing/tests/ikev1/ip-pool-db/description.txt
testing/tests/ikev1/ip-pool-db/evaltest.dat
testing/tests/ikev1/ip-pool-db/hosts/carol/etc/ipsec.conf
testing/tests/ikev1/ip-pool-db/hosts/carol/etc/strongswan.conf
testing/tests/ikev1/ip-pool-db/hosts/dave/etc/ipsec.conf
testing/tests/ikev1/ip-pool-db/hosts/dave/etc/strongswan.conf
testing/tests/ikev1/ip-pool-db/hosts/moon/etc/ipsec.conf
testing/tests/ikev1/ip-pool-db/hosts/moon/etc/strongswan.conf
testing/tests/ikev1/ip-pool-db/posttest.dat
testing/tests/ikev1/ip-pool-db/pretest.dat
testing/tests/ikev1/ip-pool/description.txt [deleted file]
testing/tests/ikev1/ip-pool/evaltest.dat [deleted file]
testing/tests/ikev1/ip-pool/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/ip-pool/hosts/carol/etc/strongswan.conf [deleted file]
testing/tests/ikev1/ip-pool/hosts/dave/etc/ipsec.conf [deleted file]
testing/tests/ikev1/ip-pool/hosts/dave/etc/strongswan.conf [deleted file]
testing/tests/ikev1/ip-pool/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/ip-pool/hosts/moon/etc/strongswan.conf [deleted file]
testing/tests/ikev1/ip-pool/posttest.dat [deleted file]
testing/tests/ikev1/ip-pool/pretest.dat [deleted file]
testing/tests/ikev1/ip-pool/test.conf [deleted file]
testing/tests/ikev1/ip-two-pools-mixed/description.txt [deleted file]
testing/tests/ikev1/ip-two-pools-mixed/evaltest.dat [deleted file]
testing/tests/ikev1/ip-two-pools-mixed/hosts/alice/etc/init.d/iptables [deleted file]
testing/tests/ikev1/ip-two-pools-mixed/hosts/alice/etc/ipsec.conf [deleted file]
testing/tests/ikev1/ip-two-pools-mixed/hosts/alice/etc/strongswan.conf [deleted file]
testing/tests/ikev1/ip-two-pools-mixed/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/ip-two-pools-mixed/hosts/carol/etc/strongswan.conf [deleted file]
testing/tests/ikev1/ip-two-pools-mixed/hosts/moon/etc/init.d/iptables [deleted file]
testing/tests/ikev1/ip-two-pools-mixed/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/ip-two-pools-mixed/hosts/moon/etc/strongswan.conf [deleted file]
testing/tests/ikev1/ip-two-pools-mixed/posttest.dat [deleted file]
testing/tests/ikev1/ip-two-pools-mixed/pretest.dat [deleted file]
testing/tests/ikev1/ip-two-pools-mixed/test.conf [deleted file]
testing/tests/ikev1/ip-two-pools/description.txt [deleted file]
testing/tests/ikev1/ip-two-pools/evaltest.dat [deleted file]
testing/tests/ikev1/ip-two-pools/hosts/alice/etc/init.d/iptables [deleted file]
testing/tests/ikev1/ip-two-pools/hosts/alice/etc/ipsec.conf [deleted file]
testing/tests/ikev1/ip-two-pools/hosts/alice/etc/strongswan.conf [deleted file]
testing/tests/ikev1/ip-two-pools/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/ip-two-pools/hosts/carol/etc/strongswan.conf [deleted file]
testing/tests/ikev1/ip-two-pools/hosts/moon/etc/init.d/iptables [deleted file]
testing/tests/ikev1/ip-two-pools/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/ip-two-pools/hosts/moon/etc/strongswan.conf [deleted file]
testing/tests/ikev1/ip-two-pools/posttest.dat [deleted file]
testing/tests/ikev1/ip-two-pools/pretest.dat [deleted file]
testing/tests/ikev1/ip-two-pools/test.conf [deleted file]
testing/tests/ikev1/mode-config-multiple/description.txt [deleted file]
testing/tests/ikev1/mode-config-multiple/evaltest.dat [deleted file]
testing/tests/ikev1/mode-config-multiple/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/mode-config-multiple/hosts/dave/etc/ipsec.conf [deleted file]
testing/tests/ikev1/mode-config-multiple/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/mode-config-multiple/hosts/moon/etc/strongswan.conf [deleted file]
testing/tests/ikev1/mode-config-multiple/posttest.dat [deleted file]
testing/tests/ikev1/mode-config-multiple/pretest.dat [deleted file]
testing/tests/ikev1/mode-config-multiple/test.conf [deleted file]
testing/tests/ikev1/mode-config-push/description.txt [deleted file]
testing/tests/ikev1/mode-config-push/evaltest.dat [deleted file]
testing/tests/ikev1/mode-config-push/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/mode-config-push/hosts/carol/etc/strongswan.conf [deleted file]
testing/tests/ikev1/mode-config-push/hosts/dave/etc/ipsec.conf [deleted file]
testing/tests/ikev1/mode-config-push/hosts/dave/etc/strongswan.conf [deleted file]
testing/tests/ikev1/mode-config-push/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/mode-config-push/hosts/moon/etc/strongswan.conf [deleted file]
testing/tests/ikev1/mode-config-push/posttest.dat [deleted file]
testing/tests/ikev1/mode-config-push/pretest.dat [deleted file]
testing/tests/ikev1/mode-config-push/test.conf [deleted file]
testing/tests/ikev1/mode-config-swapped/description.txt [deleted file]
testing/tests/ikev1/mode-config-swapped/evaltest.dat [deleted file]
testing/tests/ikev1/mode-config-swapped/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/mode-config-swapped/hosts/dave/etc/ipsec.conf [deleted file]
testing/tests/ikev1/mode-config-swapped/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/mode-config-swapped/posttest.dat [deleted file]
testing/tests/ikev1/mode-config-swapped/pretest.dat [deleted file]
testing/tests/ikev1/mode-config-swapped/test.conf [deleted file]
testing/tests/ikev1/mode-config/description.txt [deleted file]
testing/tests/ikev1/mode-config/evaltest.dat [deleted file]
testing/tests/ikev1/mode-config/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/mode-config/hosts/carol/etc/strongswan.conf [deleted file]
testing/tests/ikev1/mode-config/hosts/dave/etc/ipsec.conf [deleted file]
testing/tests/ikev1/mode-config/hosts/dave/etc/strongswan.conf [deleted file]
testing/tests/ikev1/mode-config/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/mode-config/hosts/moon/etc/strongswan.conf [deleted file]
testing/tests/ikev1/mode-config/posttest.dat [deleted file]
testing/tests/ikev1/mode-config/pretest.dat [deleted file]
testing/tests/ikev1/mode-config/test.conf [deleted file]
testing/tests/ikev1/multi-level-ca-cr-init/description.txt [new file with mode: 0644]
testing/tests/ikev1/multi-level-ca-cr-init/evaltest.dat [new file with mode: 0644]
testing/tests/ikev1/multi-level-ca-cr-init/hosts/carol/etc/ipsec.conf [new file with mode: 0755]
testing/tests/ikev1/multi-level-ca-cr-init/hosts/carol/etc/ipsec.d/cacerts/researchCert.pem [new file with mode: 0644]
testing/tests/ikev1/multi-level-ca-cr-init/hosts/carol/etc/ipsec.d/certs/carolCert.pem [new file with mode: 0644]
testing/tests/ikev1/multi-level-ca-cr-init/hosts/carol/etc/ipsec.d/private/carolKey.pem [new file with mode: 0644]
testing/tests/ikev1/multi-level-ca-cr-init/hosts/carol/etc/ipsec.secrets [new file with mode: 0644]
testing/tests/ikev1/multi-level-ca-cr-init/hosts/carol/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/multi-level-ca-cr-init/hosts/dave/etc/ipsec.conf [new file with mode: 0755]
testing/tests/ikev1/multi-level-ca-cr-init/hosts/dave/etc/ipsec.d/cacerts/salesCert.pem [new file with mode: 0644]
testing/tests/ikev1/multi-level-ca-cr-init/hosts/dave/etc/ipsec.d/certs/daveCert.pem [new file with mode: 0644]
testing/tests/ikev1/multi-level-ca-cr-init/hosts/dave/etc/ipsec.d/private/daveKey.pem [new file with mode: 0644]
testing/tests/ikev1/multi-level-ca-cr-init/hosts/dave/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/multi-level-ca-cr-init/hosts/moon/etc/ipsec.conf [new file with mode: 0755]
testing/tests/ikev1/multi-level-ca-cr-init/hosts/moon/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/multi-level-ca-cr-init/posttest.dat [new file with mode: 0644]
testing/tests/ikev1/multi-level-ca-cr-init/pretest.dat [new file with mode: 0644]
testing/tests/ikev1/multi-level-ca-cr-init/test.conf [new file with mode: 0644]
testing/tests/ikev1/multi-level-ca-cr-resp/description.txt [new file with mode: 0644]
testing/tests/ikev1/multi-level-ca-cr-resp/evaltest.dat [new file with mode: 0644]
testing/tests/ikev1/multi-level-ca-cr-resp/hosts/carol/etc/ipsec.conf [new file with mode: 0755]
testing/tests/ikev1/multi-level-ca-cr-resp/hosts/carol/etc/ipsec.d/cacerts/researchCert.pem [new file with mode: 0644]
testing/tests/ikev1/multi-level-ca-cr-resp/hosts/carol/etc/ipsec.d/certs/carolCert.pem [new file with mode: 0644]
testing/tests/ikev1/multi-level-ca-cr-resp/hosts/carol/etc/ipsec.d/private/carolKey.pem [new file with mode: 0644]
testing/tests/ikev1/multi-level-ca-cr-resp/hosts/carol/etc/ipsec.secrets [new file with mode: 0644]
testing/tests/ikev1/multi-level-ca-cr-resp/hosts/carol/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/multi-level-ca-cr-resp/hosts/dave/etc/ipsec.conf [new file with mode: 0755]
testing/tests/ikev1/multi-level-ca-cr-resp/hosts/dave/etc/ipsec.d/cacerts/salesCert.pem [new file with mode: 0644]
testing/tests/ikev1/multi-level-ca-cr-resp/hosts/dave/etc/ipsec.d/certs/daveCert.pem [new file with mode: 0644]
testing/tests/ikev1/multi-level-ca-cr-resp/hosts/dave/etc/ipsec.d/private/daveKey.pem [new file with mode: 0644]
testing/tests/ikev1/multi-level-ca-cr-resp/hosts/dave/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/multi-level-ca-cr-resp/hosts/moon/etc/ipsec.conf [new file with mode: 0755]
testing/tests/ikev1/multi-level-ca-cr-resp/hosts/moon/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/multi-level-ca-cr-resp/posttest.dat [new file with mode: 0644]
testing/tests/ikev1/multi-level-ca-cr-resp/pretest.dat [new file with mode: 0644]
testing/tests/ikev1/multi-level-ca-cr-resp/test.conf [new file with mode: 0644]
testing/tests/ikev1/multi-level-ca-ldap/description.txt [deleted file]
testing/tests/ikev1/multi-level-ca-ldap/evaltest.dat [deleted file]
testing/tests/ikev1/multi-level-ca-ldap/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/multi-level-ca-ldap/hosts/carol/etc/ipsec.d/certs/carolCert.pem [deleted file]
testing/tests/ikev1/multi-level-ca-ldap/hosts/carol/etc/ipsec.d/private/carolKey.pem [deleted file]
testing/tests/ikev1/multi-level-ca-ldap/hosts/carol/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/multi-level-ca-ldap/hosts/carol/etc/strongswan.conf [deleted file]
testing/tests/ikev1/multi-level-ca-ldap/hosts/dave/etc/ipsec.conf [deleted file]
testing/tests/ikev1/multi-level-ca-ldap/hosts/dave/etc/ipsec.d/certs/daveCert.pem [deleted file]
testing/tests/ikev1/multi-level-ca-ldap/hosts/dave/etc/ipsec.d/private/daveKey.pem [deleted file]
testing/tests/ikev1/multi-level-ca-ldap/hosts/dave/etc/strongswan.conf [deleted file]
testing/tests/ikev1/multi-level-ca-ldap/hosts/moon/etc/init.d/iptables [deleted file]
testing/tests/ikev1/multi-level-ca-ldap/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/multi-level-ca-ldap/hosts/moon/etc/ipsec.d/cacerts/researchCert.pem [deleted file]
testing/tests/ikev1/multi-level-ca-ldap/hosts/moon/etc/ipsec.d/cacerts/salesCert.pem [deleted file]
testing/tests/ikev1/multi-level-ca-ldap/hosts/moon/etc/strongswan.conf [deleted file]
testing/tests/ikev1/multi-level-ca-ldap/posttest.dat [deleted file]
testing/tests/ikev1/multi-level-ca-ldap/pretest.dat [deleted file]
testing/tests/ikev1/multi-level-ca-ldap/test.conf [deleted file]
testing/tests/ikev1/multi-level-ca-loop/description.txt [deleted file]
testing/tests/ikev1/multi-level-ca-loop/evaltest.dat [deleted file]
testing/tests/ikev1/multi-level-ca-loop/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/multi-level-ca-loop/hosts/carol/etc/ipsec.d/certs/carolCert.pem [deleted file]
testing/tests/ikev1/multi-level-ca-loop/hosts/carol/etc/ipsec.d/private/carolKey.pem [deleted file]
testing/tests/ikev1/multi-level-ca-loop/hosts/carol/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/multi-level-ca-loop/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/multi-level-ca-loop/hosts/moon/etc/ipsec.d/cacerts/research_by_salesCert.pem [deleted file]
testing/tests/ikev1/multi-level-ca-loop/hosts/moon/etc/ipsec.d/cacerts/sales_by_researchCert.pem [deleted file]
testing/tests/ikev1/multi-level-ca-loop/posttest.dat [deleted file]
testing/tests/ikev1/multi-level-ca-loop/pretest.dat [deleted file]
testing/tests/ikev1/multi-level-ca-loop/test.conf [deleted file]
testing/tests/ikev1/multi-level-ca-pathlen/description.txt [deleted file]
testing/tests/ikev1/multi-level-ca-pathlen/evaltest.dat [deleted file]
testing/tests/ikev1/multi-level-ca-pathlen/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/multi-level-ca-pathlen/hosts/carol/etc/ipsec.d/certs/carolCert.pem [deleted file]
testing/tests/ikev1/multi-level-ca-pathlen/hosts/carol/etc/ipsec.d/private/carolKey.pem [deleted file]
testing/tests/ikev1/multi-level-ca-pathlen/hosts/carol/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/multi-level-ca-pathlen/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/multi-level-ca-pathlen/hosts/moon/etc/ipsec.d/cacerts/duckCert.pem [deleted file]
testing/tests/ikev1/multi-level-ca-pathlen/hosts/moon/etc/ipsec.d/cacerts/researchCert.pem [deleted file]
testing/tests/ikev1/multi-level-ca-pathlen/posttest.dat [deleted file]
testing/tests/ikev1/multi-level-ca-pathlen/pretest.dat [deleted file]
testing/tests/ikev1/multi-level-ca-pathlen/test.conf [deleted file]
testing/tests/ikev1/multi-level-ca-revoked/description.txt [deleted file]
testing/tests/ikev1/multi-level-ca-revoked/evaltest.dat [deleted file]
testing/tests/ikev1/multi-level-ca-revoked/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/multi-level-ca-revoked/hosts/carol/etc/ipsec.d/certs/carolCert.pem [deleted file]
testing/tests/ikev1/multi-level-ca-revoked/hosts/carol/etc/ipsec.d/private/carolKey.pem [deleted file]
testing/tests/ikev1/multi-level-ca-revoked/hosts/carol/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/multi-level-ca-revoked/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/multi-level-ca-revoked/hosts/moon/etc/ipsec.d/cacerts/researchCert.pem [deleted file]
testing/tests/ikev1/multi-level-ca-revoked/posttest.dat [deleted file]
testing/tests/ikev1/multi-level-ca-revoked/pretest.dat [deleted file]
testing/tests/ikev1/multi-level-ca-revoked/test.conf [deleted file]
testing/tests/ikev1/multi-level-ca-strict/description.txt [deleted file]
testing/tests/ikev1/multi-level-ca-strict/evaltest.dat [deleted file]
testing/tests/ikev1/multi-level-ca-strict/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/multi-level-ca-strict/hosts/carol/etc/ipsec.d/certs/carolCert.pem [deleted file]
testing/tests/ikev1/multi-level-ca-strict/hosts/carol/etc/ipsec.d/private/carolKey.pem [deleted file]
testing/tests/ikev1/multi-level-ca-strict/hosts/carol/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/multi-level-ca-strict/hosts/dave/etc/ipsec.conf [deleted file]
testing/tests/ikev1/multi-level-ca-strict/hosts/dave/etc/ipsec.d/certs/daveCert.pem [deleted file]
testing/tests/ikev1/multi-level-ca-strict/hosts/dave/etc/ipsec.d/private/daveKey.pem [deleted file]
testing/tests/ikev1/multi-level-ca-strict/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/multi-level-ca-strict/hosts/moon/etc/ipsec.d/cacerts/researchCert.pem [deleted file]
testing/tests/ikev1/multi-level-ca-strict/hosts/moon/etc/ipsec.d/cacerts/salesCert.pem [deleted file]
testing/tests/ikev1/multi-level-ca-strict/posttest.dat [deleted file]
testing/tests/ikev1/multi-level-ca-strict/pretest.dat [deleted file]
testing/tests/ikev1/multi-level-ca-strict/test.conf [deleted file]
testing/tests/ikev1/multi-level-ca/evaltest.dat
testing/tests/ikev1/multi-level-ca/hosts/carol/etc/ipsec.conf
testing/tests/ikev1/multi-level-ca/hosts/carol/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/multi-level-ca/hosts/dave/etc/ipsec.conf
testing/tests/ikev1/multi-level-ca/hosts/dave/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/multi-level-ca/hosts/moon/etc/ipsec.conf
testing/tests/ikev1/multi-level-ca/hosts/moon/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/nat-before-esp/description.txt [deleted file]
testing/tests/ikev1/nat-before-esp/evaltest.dat [deleted file]
testing/tests/ikev1/nat-before-esp/hosts/moon/etc/init.d/iptables [deleted file]
testing/tests/ikev1/nat-before-esp/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/nat-before-esp/hosts/sun/etc/ipsec.conf [deleted file]
testing/tests/ikev1/nat-before-esp/posttest.dat [deleted file]
testing/tests/ikev1/nat-before-esp/pretest.dat [deleted file]
testing/tests/ikev1/nat-before-esp/test.conf [deleted file]
testing/tests/ikev1/nat-one-rw/description.txt [deleted file]
testing/tests/ikev1/nat-one-rw/evaltest.dat [deleted file]
testing/tests/ikev1/nat-one-rw/posttest.dat [deleted file]
testing/tests/ikev1/nat-one-rw/pretest.dat [deleted file]
testing/tests/ikev1/nat-one-rw/test.conf [deleted file]
testing/tests/ikev1/nat-rw/description.txt [new file with mode: 0644]
testing/tests/ikev1/nat-rw/evaltest.dat [new file with mode: 0644]
testing/tests/ikev1/nat-rw/hosts/alice/etc/ipsec.conf [new file with mode: 0755]
testing/tests/ikev1/nat-rw/hosts/alice/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/nat-rw/hosts/sun/etc/ipsec.conf [new file with mode: 0755]
testing/tests/ikev1/nat-rw/hosts/sun/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/nat-rw/hosts/venus/etc/ipsec.conf [new file with mode: 0755]
testing/tests/ikev1/nat-rw/hosts/venus/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/nat-rw/posttest.dat [new file with mode: 0644]
testing/tests/ikev1/nat-rw/pretest.dat [new file with mode: 0644]
testing/tests/ikev1/nat-rw/test.conf [new file with mode: 0644]
testing/tests/ikev1/nat-two-rw-mark/description.txt [deleted file]
testing/tests/ikev1/nat-two-rw-mark/evaltest.dat [deleted file]
testing/tests/ikev1/nat-two-rw-mark/hosts/alice/etc/ipsec.conf [deleted file]
testing/tests/ikev1/nat-two-rw-mark/hosts/sun/etc/ipsec.conf [deleted file]
testing/tests/ikev1/nat-two-rw-mark/hosts/sun/etc/mark_updown [deleted file]
testing/tests/ikev1/nat-two-rw-mark/hosts/venus/etc/ipsec.conf [deleted file]
testing/tests/ikev1/nat-two-rw-mark/posttest.dat [deleted file]
testing/tests/ikev1/nat-two-rw-mark/pretest.dat [deleted file]
testing/tests/ikev1/nat-two-rw-mark/test.conf [deleted file]
testing/tests/ikev1/nat-two-rw-psk/description.txt [deleted file]
testing/tests/ikev1/nat-two-rw-psk/evaltest.dat [deleted file]
testing/tests/ikev1/nat-two-rw-psk/hosts/alice/etc/ipsec.conf [deleted file]
testing/tests/ikev1/nat-two-rw-psk/hosts/alice/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/nat-two-rw-psk/hosts/alice/etc/strongswan.conf [deleted file]
testing/tests/ikev1/nat-two-rw-psk/hosts/sun/etc/ipsec.conf [deleted file]
testing/tests/ikev1/nat-two-rw-psk/hosts/sun/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/nat-two-rw-psk/hosts/sun/etc/strongswan.conf [deleted file]
testing/tests/ikev1/nat-two-rw-psk/hosts/venus/etc/ipsec.conf [deleted file]
testing/tests/ikev1/nat-two-rw-psk/hosts/venus/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/nat-two-rw-psk/hosts/venus/etc/strongswan.conf [deleted file]
testing/tests/ikev1/nat-two-rw-psk/posttest.dat [deleted file]
testing/tests/ikev1/nat-two-rw-psk/pretest.dat [deleted file]
testing/tests/ikev1/nat-two-rw-psk/test.conf [deleted file]
testing/tests/ikev1/nat-two-rw/description.txt [deleted file]
testing/tests/ikev1/nat-two-rw/evaltest.dat [deleted file]
testing/tests/ikev1/nat-two-rw/posttest.dat [deleted file]
testing/tests/ikev1/nat-two-rw/pretest.dat [deleted file]
testing/tests/ikev1/nat-two-rw/test.conf [deleted file]
testing/tests/ikev1/net2net-cert/evaltest.dat
testing/tests/ikev1/net2net-cert/hosts/moon/etc/ipsec.conf [new file with mode: 0755]
testing/tests/ikev1/net2net-cert/hosts/moon/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/net2net-cert/hosts/sun/etc/ipsec.conf [new file with mode: 0755]
testing/tests/ikev1/net2net-cert/hosts/sun/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/net2net-cert/posttest.dat
testing/tests/ikev1/net2net-cert/pretest.dat
testing/tests/ikev1/net2net-pgp-v3/description.txt [deleted file]
testing/tests/ikev1/net2net-pgp-v3/evaltest.dat [deleted file]
testing/tests/ikev1/net2net-pgp-v3/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/net2net-pgp-v3/hosts/moon/etc/ipsec.d/certs/moonCert.asc [deleted file]
testing/tests/ikev1/net2net-pgp-v3/hosts/moon/etc/ipsec.d/certs/sunCert.asc [deleted file]
testing/tests/ikev1/net2net-pgp-v3/hosts/moon/etc/ipsec.d/private/moonKey.asc [deleted file]
testing/tests/ikev1/net2net-pgp-v3/hosts/moon/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/net2net-pgp-v3/hosts/moon/etc/strongswan.conf [deleted file]
testing/tests/ikev1/net2net-pgp-v3/hosts/sun/etc/ipsec.conf [deleted file]
testing/tests/ikev1/net2net-pgp-v3/hosts/sun/etc/ipsec.d/certs/moonCert.asc [deleted file]
testing/tests/ikev1/net2net-pgp-v3/hosts/sun/etc/ipsec.d/certs/sunCert.asc [deleted file]
testing/tests/ikev1/net2net-pgp-v3/hosts/sun/etc/ipsec.d/private/sunKey.asc [deleted file]
testing/tests/ikev1/net2net-pgp-v3/hosts/sun/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/net2net-pgp-v3/hosts/sun/etc/strongswan.conf [deleted file]
testing/tests/ikev1/net2net-pgp-v3/posttest.dat [deleted file]
testing/tests/ikev1/net2net-pgp-v3/pretest.dat [deleted file]
testing/tests/ikev1/net2net-pgp-v3/test.conf [deleted file]
testing/tests/ikev1/net2net-pgp-v4/description.txt [deleted file]
testing/tests/ikev1/net2net-pgp-v4/evaltest.dat [deleted file]
testing/tests/ikev1/net2net-pgp-v4/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/net2net-pgp-v4/hosts/moon/etc/ipsec.d/certs/moonCert.asc [deleted file]
testing/tests/ikev1/net2net-pgp-v4/hosts/moon/etc/ipsec.d/certs/sunCert.asc [deleted file]
testing/tests/ikev1/net2net-pgp-v4/hosts/moon/etc/ipsec.d/private/moonKey.asc [deleted file]
testing/tests/ikev1/net2net-pgp-v4/hosts/moon/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/net2net-pgp-v4/hosts/moon/etc/strongswan.conf [deleted file]
testing/tests/ikev1/net2net-pgp-v4/hosts/sun/etc/ipsec.conf [deleted file]
testing/tests/ikev1/net2net-pgp-v4/hosts/sun/etc/ipsec.d/certs/moonCert.asc [deleted file]
testing/tests/ikev1/net2net-pgp-v4/hosts/sun/etc/ipsec.d/certs/sunCert.asc [deleted file]
testing/tests/ikev1/net2net-pgp-v4/hosts/sun/etc/ipsec.d/private/sunKey.asc [deleted file]
testing/tests/ikev1/net2net-pgp-v4/hosts/sun/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/net2net-pgp-v4/hosts/sun/etc/strongswan.conf [deleted file]
testing/tests/ikev1/net2net-pgp-v4/posttest.dat [deleted file]
testing/tests/ikev1/net2net-pgp-v4/pretest.dat [deleted file]
testing/tests/ikev1/net2net-pgp-v4/test.conf [deleted file]
testing/tests/ikev1/net2net-psk-fail/description.txt
testing/tests/ikev1/net2net-psk-fail/evaltest.dat
testing/tests/ikev1/net2net-psk-fail/hosts/moon/etc/ipsec.conf
testing/tests/ikev1/net2net-psk-fail/hosts/moon/etc/ipsec.secrets
testing/tests/ikev1/net2net-psk-fail/hosts/moon/etc/strongswan.conf
testing/tests/ikev1/net2net-psk-fail/hosts/sun/etc/ipsec.conf
testing/tests/ikev1/net2net-psk-fail/hosts/sun/etc/ipsec.secrets
testing/tests/ikev1/net2net-psk-fail/hosts/sun/etc/strongswan.conf
testing/tests/ikev1/net2net-psk-fail/posttest.dat
testing/tests/ikev1/net2net-psk-fail/pretest.dat
testing/tests/ikev1/net2net-psk/evaltest.dat
testing/tests/ikev1/net2net-psk/hosts/moon/etc/ipsec.conf
testing/tests/ikev1/net2net-psk/hosts/moon/etc/strongswan.conf
testing/tests/ikev1/net2net-psk/hosts/sun/etc/ipsec.conf
testing/tests/ikev1/net2net-psk/hosts/sun/etc/strongswan.conf
testing/tests/ikev1/net2net-route/description.txt [deleted file]
testing/tests/ikev1/net2net-route/evaltest.dat [deleted file]
testing/tests/ikev1/net2net-route/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/net2net-route/posttest.dat [deleted file]
testing/tests/ikev1/net2net-route/pretest.dat [deleted file]
testing/tests/ikev1/net2net-route/test.conf [deleted file]
testing/tests/ikev1/net2net-rsa/description.txt [deleted file]
testing/tests/ikev1/net2net-rsa/evaltest.dat [deleted file]
testing/tests/ikev1/net2net-rsa/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/net2net-rsa/hosts/moon/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/net2net-rsa/hosts/moon/etc/strongswan.conf [deleted file]
testing/tests/ikev1/net2net-rsa/hosts/sun/etc/ipsec.conf [deleted file]
testing/tests/ikev1/net2net-rsa/hosts/sun/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/net2net-rsa/hosts/sun/etc/strongswan.conf [deleted file]
testing/tests/ikev1/net2net-rsa/posttest.dat [deleted file]
testing/tests/ikev1/net2net-rsa/pretest.dat [deleted file]
testing/tests/ikev1/net2net-rsa/test.conf [deleted file]
testing/tests/ikev1/net2net-same-nets/description.txt [deleted file]
testing/tests/ikev1/net2net-same-nets/evaltest.dat [deleted file]
testing/tests/ikev1/net2net-same-nets/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/net2net-same-nets/hosts/sun/etc/ipsec.conf [deleted file]
testing/tests/ikev1/net2net-same-nets/hosts/sun/etc/mark_updown [deleted file]
testing/tests/ikev1/net2net-same-nets/posttest.dat [deleted file]
testing/tests/ikev1/net2net-same-nets/pretest.dat [deleted file]
testing/tests/ikev1/net2net-same-nets/test.conf [deleted file]
testing/tests/ikev1/net2net-start/description.txt [deleted file]
testing/tests/ikev1/net2net-start/evaltest.dat [deleted file]
testing/tests/ikev1/net2net-start/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/net2net-start/posttest.dat [deleted file]
testing/tests/ikev1/net2net-start/pretest.dat [deleted file]
testing/tests/ikev1/net2net-start/test.conf [deleted file]
testing/tests/ikev1/no-priv-key/description.txt [deleted file]
testing/tests/ikev1/no-priv-key/evaltest.dat [deleted file]
testing/tests/ikev1/no-priv-key/hosts/carol/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/no-priv-key/posttest.dat [deleted file]
testing/tests/ikev1/no-priv-key/pretest.dat [deleted file]
testing/tests/ikev1/no-priv-key/test.conf [deleted file]
testing/tests/ikev1/ocsp-revoked/description.txt [deleted file]
testing/tests/ikev1/ocsp-revoked/evaltest.dat [deleted file]
testing/tests/ikev1/ocsp-revoked/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/ocsp-revoked/hosts/carol/etc/ipsec.d/certs/carolRevokedCert.pem [deleted file]
testing/tests/ikev1/ocsp-revoked/hosts/carol/etc/ipsec.d/private/carolRevokedKey.pem [deleted file]
testing/tests/ikev1/ocsp-revoked/hosts/carol/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/ocsp-revoked/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/ocsp-revoked/posttest.dat [deleted file]
testing/tests/ikev1/ocsp-revoked/pretest.dat [deleted file]
testing/tests/ikev1/ocsp-revoked/test.conf [deleted file]
testing/tests/ikev1/ocsp-strict/description.txt [deleted file]
testing/tests/ikev1/ocsp-strict/evaltest.dat [deleted file]
testing/tests/ikev1/ocsp-strict/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/ocsp-strict/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/ocsp-strict/posttest.dat [deleted file]
testing/tests/ikev1/ocsp-strict/pretest.dat [deleted file]
testing/tests/ikev1/ocsp-strict/test.conf [deleted file]
testing/tests/ikev1/passthrough/description.txt [deleted file]
testing/tests/ikev1/passthrough/evaltest.dat [deleted file]
testing/tests/ikev1/passthrough/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/passthrough/hosts/sun/etc/ipsec.conf [deleted file]
testing/tests/ikev1/passthrough/posttest.dat [deleted file]
testing/tests/ikev1/passthrough/pretest.dat [deleted file]
testing/tests/ikev1/passthrough/test.conf [deleted file]
testing/tests/ikev1/protoport-dual/evaltest.dat
testing/tests/ikev1/protoport-dual/hosts/carol/etc/ipsec.conf
testing/tests/ikev1/protoport-dual/hosts/carol/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/protoport-dual/hosts/moon/etc/ipsec.conf
testing/tests/ikev1/protoport-dual/hosts/moon/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/protoport-pass/description.txt [deleted file]
testing/tests/ikev1/protoport-pass/evaltest.dat [deleted file]
testing/tests/ikev1/protoport-pass/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/protoport-pass/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/protoport-pass/posttest.dat [deleted file]
testing/tests/ikev1/protoport-pass/pretest.dat [deleted file]
testing/tests/ikev1/protoport-pass/test.conf [deleted file]
testing/tests/ikev1/protoport-route/description.txt [deleted file]
testing/tests/ikev1/protoport-route/evaltest.dat [deleted file]
testing/tests/ikev1/protoport-route/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/protoport-route/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/protoport-route/posttest.dat [deleted file]
testing/tests/ikev1/protoport-route/pretest.dat [deleted file]
testing/tests/ikev1/protoport-route/test.conf [deleted file]
testing/tests/ikev1/req-pkcs10/description.txt [deleted file]
testing/tests/ikev1/req-pkcs10/evaltest.dat [deleted file]
testing/tests/ikev1/req-pkcs10/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/req-pkcs10/hosts/carol/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/req-pkcs10/hosts/carol/etc/scepclient.conf [deleted file]
testing/tests/ikev1/req-pkcs10/hosts/carol/etc/strongswan.conf [deleted file]
testing/tests/ikev1/req-pkcs10/hosts/moon/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/req-pkcs10/hosts/moon/etc/scepclient.conf [deleted file]
testing/tests/ikev1/req-pkcs10/hosts/moon/etc/strongswan.conf [deleted file]
testing/tests/ikev1/req-pkcs10/hosts/winnetou/etc/openssl/yy.txt [deleted file]
testing/tests/ikev1/req-pkcs10/posttest.dat [deleted file]
testing/tests/ikev1/req-pkcs10/pretest.dat [deleted file]
testing/tests/ikev1/req-pkcs10/test.conf [deleted file]
testing/tests/ikev1/rw-cert-aggressive/description.txt [new file with mode: 0644]
testing/tests/ikev1/rw-cert-aggressive/evaltest.dat [new file with mode: 0644]
testing/tests/ikev1/rw-cert-aggressive/hosts/carol/etc/ipsec.conf [new file with mode: 0755]
testing/tests/ikev1/rw-cert-aggressive/hosts/carol/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/rw-cert-aggressive/hosts/dave/etc/ipsec.conf [new file with mode: 0755]
testing/tests/ikev1/rw-cert-aggressive/hosts/dave/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/rw-cert-aggressive/hosts/moon/etc/ipsec.conf [new file with mode: 0755]
testing/tests/ikev1/rw-cert-aggressive/hosts/moon/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/rw-cert-aggressive/posttest.dat [new file with mode: 0644]
testing/tests/ikev1/rw-cert-aggressive/pretest.dat [new file with mode: 0644]
testing/tests/ikev1/rw-cert-aggressive/test.conf [new file with mode: 0644]
testing/tests/ikev1/rw-cert/description.txt
testing/tests/ikev1/rw-cert/evaltest.dat
testing/tests/ikev1/rw-cert/hosts/carol/etc/ipsec.conf [new file with mode: 0755]
testing/tests/ikev1/rw-cert/hosts/carol/etc/strongswan.conf
testing/tests/ikev1/rw-cert/hosts/dave/etc/ipsec.conf [new file with mode: 0755]
testing/tests/ikev1/rw-cert/hosts/dave/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/rw-cert/hosts/moon/etc/ipsec.conf [new file with mode: 0755]
testing/tests/ikev1/rw-cert/hosts/moon/etc/strongswan.conf
testing/tests/ikev1/rw-cert/posttest.dat
testing/tests/ikev1/rw-cert/pretest.dat
testing/tests/ikev1/rw-cert/test.conf
testing/tests/ikev1/rw-mark-in-out/description.txt [deleted file]
testing/tests/ikev1/rw-mark-in-out/evaltest.dat [deleted file]
testing/tests/ikev1/rw-mark-in-out/hosts/alice/etc/init.d/iptables [deleted file]
testing/tests/ikev1/rw-mark-in-out/hosts/alice/etc/ipsec.conf [deleted file]
testing/tests/ikev1/rw-mark-in-out/hosts/sun/etc/ipsec.conf [deleted file]
testing/tests/ikev1/rw-mark-in-out/hosts/sun/etc/mark_updown [deleted file]
testing/tests/ikev1/rw-mark-in-out/hosts/venus/etc/init.d/iptables [deleted file]
testing/tests/ikev1/rw-mark-in-out/hosts/venus/etc/ipsec.conf [deleted file]
testing/tests/ikev1/rw-mark-in-out/posttest.dat [deleted file]
testing/tests/ikev1/rw-mark-in-out/pretest.dat [deleted file]
testing/tests/ikev1/rw-mark-in-out/test.conf [deleted file]
testing/tests/ikev1/rw-psk-aggressive/description.txt [new file with mode: 0644]
testing/tests/ikev1/rw-psk-aggressive/evaltest.dat [new file with mode: 0644]
testing/tests/ikev1/rw-psk-aggressive/hosts/carol/etc/ipsec.conf [new file with mode: 0755]
testing/tests/ikev1/rw-psk-aggressive/hosts/carol/etc/ipsec.secrets [new file with mode: 0644]
testing/tests/ikev1/rw-psk-aggressive/hosts/carol/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/rw-psk-aggressive/hosts/dave/etc/ipsec.conf [new file with mode: 0755]
testing/tests/ikev1/rw-psk-aggressive/hosts/dave/etc/ipsec.secrets [new file with mode: 0644]
testing/tests/ikev1/rw-psk-aggressive/hosts/dave/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/rw-psk-aggressive/hosts/moon/etc/ipsec.conf [new file with mode: 0755]
testing/tests/ikev1/rw-psk-aggressive/hosts/moon/etc/ipsec.secrets [new file with mode: 0644]
testing/tests/ikev1/rw-psk-aggressive/hosts/moon/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/rw-psk-aggressive/posttest.dat [new file with mode: 0644]
testing/tests/ikev1/rw-psk-aggressive/pretest.dat [new file with mode: 0644]
testing/tests/ikev1/rw-psk-aggressive/test.conf [new file with mode: 0644]
testing/tests/ikev1/rw-psk-fqdn-named/description.txt [deleted file]
testing/tests/ikev1/rw-psk-fqdn-named/evaltest.dat [deleted file]
testing/tests/ikev1/rw-psk-fqdn-named/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/rw-psk-fqdn-named/hosts/carol/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/rw-psk-fqdn-named/hosts/carol/etc/strongswan.conf [deleted file]
testing/tests/ikev1/rw-psk-fqdn-named/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/rw-psk-fqdn-named/hosts/moon/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/rw-psk-fqdn-named/hosts/moon/etc/strongswan.conf [deleted file]
testing/tests/ikev1/rw-psk-fqdn-named/posttest.dat [deleted file]
testing/tests/ikev1/rw-psk-fqdn-named/pretest.dat [deleted file]
testing/tests/ikev1/rw-psk-fqdn-named/test.conf [deleted file]
testing/tests/ikev1/rw-psk-fqdn/description.txt
testing/tests/ikev1/rw-psk-fqdn/evaltest.dat
testing/tests/ikev1/rw-psk-fqdn/hosts/carol/etc/ipsec.conf
testing/tests/ikev1/rw-psk-fqdn/hosts/carol/etc/ipsec.secrets
testing/tests/ikev1/rw-psk-fqdn/hosts/carol/etc/strongswan.conf
testing/tests/ikev1/rw-psk-fqdn/hosts/dave/etc/ipsec.conf [new file with mode: 0755]
testing/tests/ikev1/rw-psk-fqdn/hosts/dave/etc/ipsec.secrets [new file with mode: 0644]
testing/tests/ikev1/rw-psk-fqdn/hosts/dave/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/rw-psk-fqdn/hosts/moon/etc/ipsec.conf
testing/tests/ikev1/rw-psk-fqdn/hosts/moon/etc/ipsec.secrets
testing/tests/ikev1/rw-psk-fqdn/hosts/moon/etc/strongswan.conf
testing/tests/ikev1/rw-psk-fqdn/posttest.dat
testing/tests/ikev1/rw-psk-fqdn/pretest.dat
testing/tests/ikev1/rw-psk-fqdn/test.conf
testing/tests/ikev1/rw-psk-ipv4/description.txt
testing/tests/ikev1/rw-psk-ipv4/evaltest.dat
testing/tests/ikev1/rw-psk-ipv4/hosts/carol/etc/ipsec.conf
testing/tests/ikev1/rw-psk-ipv4/hosts/carol/etc/ipsec.secrets
testing/tests/ikev1/rw-psk-ipv4/hosts/carol/etc/strongswan.conf
testing/tests/ikev1/rw-psk-ipv4/hosts/dave/etc/ipsec.conf [new file with mode: 0755]
testing/tests/ikev1/rw-psk-ipv4/hosts/dave/etc/ipsec.secrets [new file with mode: 0644]
testing/tests/ikev1/rw-psk-ipv4/hosts/dave/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/rw-psk-ipv4/hosts/moon/etc/ipsec.conf
testing/tests/ikev1/rw-psk-ipv4/hosts/moon/etc/ipsec.secrets
testing/tests/ikev1/rw-psk-ipv4/hosts/moon/etc/strongswan.conf
testing/tests/ikev1/rw-psk-ipv4/posttest.dat
testing/tests/ikev1/rw-psk-ipv4/pretest.dat
testing/tests/ikev1/rw-psk-ipv4/test.conf
testing/tests/ikev1/rw-psk-no-policy/description.txt [deleted file]
testing/tests/ikev1/rw-psk-no-policy/evaltest.dat [deleted file]
testing/tests/ikev1/rw-psk-no-policy/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/rw-psk-no-policy/hosts/carol/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/rw-psk-no-policy/hosts/carol/etc/strongswan.conf [deleted file]
testing/tests/ikev1/rw-psk-no-policy/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/rw-psk-no-policy/hosts/moon/etc/strongswan.conf [deleted file]
testing/tests/ikev1/rw-psk-no-policy/posttest.dat [deleted file]
testing/tests/ikev1/rw-psk-no-policy/pretest.dat [deleted file]
testing/tests/ikev1/rw-psk-no-policy/test.conf [deleted file]
testing/tests/ikev1/rw-psk-rsa-mixed/description.txt [deleted file]
testing/tests/ikev1/rw-psk-rsa-mixed/evaltest.dat [deleted file]
testing/tests/ikev1/rw-psk-rsa-mixed/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/rw-psk-rsa-mixed/hosts/carol/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/rw-psk-rsa-mixed/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/rw-psk-rsa-mixed/hosts/moon/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/rw-psk-rsa-mixed/posttest.dat [deleted file]
testing/tests/ikev1/rw-psk-rsa-mixed/pretest.dat [deleted file]
testing/tests/ikev1/rw-psk-rsa-mixed/test.conf [deleted file]
testing/tests/ikev1/rw-rsa-no-policy/description.txt [deleted file]
testing/tests/ikev1/rw-rsa-no-policy/evaltest.dat [deleted file]
testing/tests/ikev1/rw-rsa-no-policy/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/rw-rsa-no-policy/hosts/moon/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/rw-rsa-no-policy/posttest.dat [deleted file]
testing/tests/ikev1/rw-rsa-no-policy/pretest.dat [deleted file]
testing/tests/ikev1/rw-rsa-no-policy/test.conf [deleted file]
testing/tests/ikev1/self-signed/description.txt [deleted file]
testing/tests/ikev1/self-signed/evaltest.dat [deleted file]
testing/tests/ikev1/self-signed/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/self-signed/hosts/carol/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/self-signed/hosts/carol/etc/strongswan.conf [deleted file]
testing/tests/ikev1/self-signed/hosts/moon/etc/init.d/iptables [deleted file]
testing/tests/ikev1/self-signed/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/self-signed/hosts/moon/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/self-signed/hosts/moon/etc/scepclient.conf [deleted file]
testing/tests/ikev1/self-signed/hosts/moon/etc/strongswan.conf [deleted file]
testing/tests/ikev1/self-signed/posttest.dat [deleted file]
testing/tests/ikev1/self-signed/pretest.dat [deleted file]
testing/tests/ikev1/self-signed/test.conf [deleted file]
testing/tests/ikev1/starter-also-loop/description.txt [deleted file]
testing/tests/ikev1/starter-also-loop/evaltest.dat [deleted file]
testing/tests/ikev1/starter-also-loop/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/starter-also-loop/posttest.dat [deleted file]
testing/tests/ikev1/starter-also-loop/pretest.dat [deleted file]
testing/tests/ikev1/starter-also-loop/test.conf [deleted file]
testing/tests/ikev1/starter-also/description.txt [deleted file]
testing/tests/ikev1/starter-also/evaltest.dat [deleted file]
testing/tests/ikev1/starter-also/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/starter-also/posttest.dat [deleted file]
testing/tests/ikev1/starter-also/pretest.dat [deleted file]
testing/tests/ikev1/starter-also/test.conf [deleted file]
testing/tests/ikev1/starter-includes/description.txt [deleted file]
testing/tests/ikev1/starter-includes/evaltest.dat [deleted file]
testing/tests/ikev1/starter-includes/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/starter-includes/hosts/dave/etc/ipsec.conf [deleted file]
testing/tests/ikev1/starter-includes/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/starter-includes/hosts/moon/etc/ipsec.connections [deleted file]
testing/tests/ikev1/starter-includes/hosts/moon/etc/ipsec.host [deleted file]
testing/tests/ikev1/starter-includes/hosts/moon/etc/ipsec.peers/ipsec.carol [deleted file]
testing/tests/ikev1/starter-includes/hosts/moon/etc/ipsec.peers/ipsec.dave [deleted file]
testing/tests/ikev1/starter-includes/posttest.dat [deleted file]
testing/tests/ikev1/starter-includes/pretest.dat [deleted file]
testing/tests/ikev1/starter-includes/test.conf [deleted file]
testing/tests/ikev1/strong-certs/description.txt [deleted file]
testing/tests/ikev1/strong-certs/evaltest.dat [deleted file]
testing/tests/ikev1/strong-certs/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/strong-certs/hosts/carol/etc/ipsec.d/certs/carolCert-sha384.pem [deleted file]
testing/tests/ikev1/strong-certs/hosts/carol/etc/ipsec.d/private/carolKey.pem [deleted file]
testing/tests/ikev1/strong-certs/hosts/carol/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/strong-certs/hosts/dave/etc/ipsec.conf [deleted file]
testing/tests/ikev1/strong-certs/hosts/dave/etc/ipsec.d/certs/daveCert-sha512.pem [deleted file]
testing/tests/ikev1/strong-certs/hosts/dave/etc/ipsec.d/private/daveKey.pem [deleted file]
testing/tests/ikev1/strong-certs/hosts/dave/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/strong-certs/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/strong-certs/hosts/moon/etc/ipsec.d/certs/moonCert-sha224.pem [deleted file]
testing/tests/ikev1/strong-certs/hosts/moon/etc/ipsec.d/private/moonKey.pem [deleted file]
testing/tests/ikev1/strong-certs/hosts/moon/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/strong-certs/posttest.dat [deleted file]
testing/tests/ikev1/strong-certs/pretest.dat [deleted file]
testing/tests/ikev1/strong-certs/test.conf [deleted file]
testing/tests/ikev1/virtual-ip-swapped/description.txt [deleted file]
testing/tests/ikev1/virtual-ip-swapped/evaltest.dat [deleted file]
testing/tests/ikev1/virtual-ip-swapped/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/virtual-ip-swapped/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/virtual-ip-swapped/posttest.dat [deleted file]
testing/tests/ikev1/virtual-ip-swapped/pretest.dat [deleted file]
testing/tests/ikev1/virtual-ip-swapped/test.conf [deleted file]
testing/tests/ikev1/virtual-ip/description.txt [deleted file]
testing/tests/ikev1/virtual-ip/evaltest.dat [deleted file]
testing/tests/ikev1/virtual-ip/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/virtual-ip/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/virtual-ip/posttest.dat [deleted file]
testing/tests/ikev1/virtual-ip/pretest.dat [deleted file]
testing/tests/ikev1/virtual-ip/test.conf [deleted file]
testing/tests/ikev1/wildcards/description.txt [deleted file]
testing/tests/ikev1/wildcards/evaltest.dat [deleted file]
testing/tests/ikev1/wildcards/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/wildcards/hosts/dave/etc/ipsec.conf [deleted file]
testing/tests/ikev1/wildcards/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/wildcards/posttest.dat [deleted file]
testing/tests/ikev1/wildcards/pretest.dat [deleted file]
testing/tests/ikev1/wildcards/test.conf [deleted file]
testing/tests/ikev1/wlan/description.txt [deleted file]
testing/tests/ikev1/wlan/evaltest.dat [deleted file]
testing/tests/ikev1/wlan/hosts/alice/etc/init.d/iptables [deleted file]
testing/tests/ikev1/wlan/hosts/alice/etc/ipsec.conf [deleted file]
testing/tests/ikev1/wlan/hosts/moon/etc/init.d/iptables [deleted file]
testing/tests/ikev1/wlan/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/wlan/hosts/venus/etc/init.d/iptables [deleted file]
testing/tests/ikev1/wlan/hosts/venus/etc/ipsec.conf [deleted file]
testing/tests/ikev1/wlan/posttest.dat [deleted file]
testing/tests/ikev1/wlan/pretest.dat [deleted file]
testing/tests/ikev1/wlan/test.conf [deleted file]
testing/tests/ikev1/xauth-id-psk-config/description.txt [new file with mode: 0644]
testing/tests/ikev1/xauth-id-psk-config/evaltest.dat [new file with mode: 0644]
testing/tests/ikev1/xauth-id-psk-config/hosts/carol/etc/ipsec.conf [new file with mode: 0644]
testing/tests/ikev1/xauth-id-psk-config/hosts/carol/etc/ipsec.secrets [new file with mode: 0644]
testing/tests/ikev1/xauth-id-psk-config/hosts/carol/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/xauth-id-psk-config/hosts/dave/etc/ipsec.conf [new file with mode: 0644]
testing/tests/ikev1/xauth-id-psk-config/hosts/dave/etc/ipsec.secrets [new file with mode: 0644]
testing/tests/ikev1/xauth-id-psk-config/hosts/dave/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/xauth-id-psk-config/hosts/moon/etc/ipsec.conf [new file with mode: 0644]
testing/tests/ikev1/xauth-id-psk-config/hosts/moon/etc/ipsec.secrets [new file with mode: 0644]
testing/tests/ikev1/xauth-id-psk-config/hosts/moon/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/xauth-id-psk-config/posttest.dat [new file with mode: 0644]
testing/tests/ikev1/xauth-id-psk-config/pretest.dat [new file with mode: 0644]
testing/tests/ikev1/xauth-id-psk-config/test.conf [new file with mode: 0644]
testing/tests/ikev1/xauth-id-psk-mode-config/description.txt [deleted file]
testing/tests/ikev1/xauth-id-psk-mode-config/evaltest.dat [deleted file]
testing/tests/ikev1/xauth-id-psk-mode-config/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/xauth-id-psk-mode-config/hosts/carol/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/xauth-id-psk-mode-config/hosts/carol/etc/strongswan.conf [deleted file]
testing/tests/ikev1/xauth-id-psk-mode-config/hosts/dave/etc/ipsec.conf [deleted file]
testing/tests/ikev1/xauth-id-psk-mode-config/hosts/dave/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/xauth-id-psk-mode-config/hosts/dave/etc/strongswan.conf [deleted file]
testing/tests/ikev1/xauth-id-psk-mode-config/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/xauth-id-psk-mode-config/hosts/moon/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/xauth-id-psk-mode-config/hosts/moon/etc/strongswan.conf [deleted file]
testing/tests/ikev1/xauth-id-psk-mode-config/posttest.dat [deleted file]
testing/tests/ikev1/xauth-id-psk-mode-config/pretest.dat [deleted file]
testing/tests/ikev1/xauth-id-psk-mode-config/test.conf [deleted file]
testing/tests/ikev1/xauth-id-psk/description.txt [deleted file]
testing/tests/ikev1/xauth-id-psk/evaltest.dat [deleted file]
testing/tests/ikev1/xauth-id-psk/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/xauth-id-psk/hosts/carol/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/xauth-id-psk/hosts/carol/etc/strongswan.conf [deleted file]
testing/tests/ikev1/xauth-id-psk/hosts/dave/etc/ipsec.conf [deleted file]
testing/tests/ikev1/xauth-id-psk/hosts/dave/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/xauth-id-psk/hosts/dave/etc/strongswan.conf [deleted file]
testing/tests/ikev1/xauth-id-psk/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/xauth-id-psk/hosts/moon/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/xauth-id-psk/hosts/moon/etc/strongswan.conf [deleted file]
testing/tests/ikev1/xauth-id-psk/posttest.dat [deleted file]
testing/tests/ikev1/xauth-id-psk/pretest.dat [deleted file]
testing/tests/ikev1/xauth-id-psk/test.conf [deleted file]
testing/tests/ikev1/xauth-id-rsa/evaltest.dat
testing/tests/ikev1/xauth-id-rsa/hosts/carol/etc/ipsec.conf
testing/tests/ikev1/xauth-id-rsa/hosts/carol/etc/strongswan.conf
testing/tests/ikev1/xauth-id-rsa/hosts/dave/etc/ipsec.conf
testing/tests/ikev1/xauth-id-rsa/hosts/dave/etc/strongswan.conf
testing/tests/ikev1/xauth-id-rsa/hosts/moon/etc/ipsec.conf
testing/tests/ikev1/xauth-id-rsa/hosts/moon/etc/strongswan.conf
testing/tests/ikev1/xauth-psk/evaltest.dat
testing/tests/ikev1/xauth-psk/hosts/carol/etc/ipsec.conf
testing/tests/ikev1/xauth-psk/hosts/carol/etc/strongswan.conf
testing/tests/ikev1/xauth-psk/hosts/dave/etc/ipsec.conf
testing/tests/ikev1/xauth-psk/hosts/dave/etc/strongswan.conf
testing/tests/ikev1/xauth-psk/hosts/moon/etc/ipsec.conf
testing/tests/ikev1/xauth-psk/hosts/moon/etc/strongswan.conf
testing/tests/ikev1/xauth-rsa-config/description.txt [new file with mode: 0644]
testing/tests/ikev1/xauth-rsa-config/evaltest.dat [new file with mode: 0644]
testing/tests/ikev1/xauth-rsa-config/hosts/carol/etc/ipsec.conf [new file with mode: 0644]
testing/tests/ikev1/xauth-rsa-config/hosts/carol/etc/ipsec.secrets [new file with mode: 0644]
testing/tests/ikev1/xauth-rsa-config/hosts/carol/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/xauth-rsa-config/hosts/dave/etc/ipsec.conf [new file with mode: 0644]
testing/tests/ikev1/xauth-rsa-config/hosts/dave/etc/ipsec.secrets [new file with mode: 0644]
testing/tests/ikev1/xauth-rsa-config/hosts/dave/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/xauth-rsa-config/hosts/moon/etc/ipsec.conf [new file with mode: 0644]
testing/tests/ikev1/xauth-rsa-config/hosts/moon/etc/ipsec.secrets [new file with mode: 0644]
testing/tests/ikev1/xauth-rsa-config/hosts/moon/etc/strongswan.conf [new file with mode: 0644]
testing/tests/ikev1/xauth-rsa-config/posttest.dat [new file with mode: 0644]
testing/tests/ikev1/xauth-rsa-config/pretest.dat [new file with mode: 0644]
testing/tests/ikev1/xauth-rsa-config/test.conf [new file with mode: 0644]
testing/tests/ikev1/xauth-rsa-fail/description.txt [deleted file]
testing/tests/ikev1/xauth-rsa-fail/evaltest.dat [deleted file]
testing/tests/ikev1/xauth-rsa-fail/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/xauth-rsa-fail/hosts/carol/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/xauth-rsa-fail/hosts/carol/etc/strongswan.conf [deleted file]
testing/tests/ikev1/xauth-rsa-fail/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/xauth-rsa-fail/hosts/moon/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/xauth-rsa-fail/hosts/moon/etc/strongswan.conf [deleted file]
testing/tests/ikev1/xauth-rsa-fail/posttest.dat [deleted file]
testing/tests/ikev1/xauth-rsa-fail/pretest.dat [deleted file]
testing/tests/ikev1/xauth-rsa-fail/test.conf [deleted file]
testing/tests/ikev1/xauth-rsa-mode-config/description.txt [deleted file]
testing/tests/ikev1/xauth-rsa-mode-config/evaltest.dat [deleted file]
testing/tests/ikev1/xauth-rsa-mode-config/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/xauth-rsa-mode-config/hosts/carol/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/xauth-rsa-mode-config/hosts/carol/etc/strongswan.conf [deleted file]
testing/tests/ikev1/xauth-rsa-mode-config/hosts/dave/etc/ipsec.conf [deleted file]
testing/tests/ikev1/xauth-rsa-mode-config/hosts/dave/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/xauth-rsa-mode-config/hosts/dave/etc/strongswan.conf [deleted file]
testing/tests/ikev1/xauth-rsa-mode-config/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/xauth-rsa-mode-config/hosts/moon/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/xauth-rsa-mode-config/hosts/moon/etc/strongswan.conf [deleted file]
testing/tests/ikev1/xauth-rsa-mode-config/posttest.dat [deleted file]
testing/tests/ikev1/xauth-rsa-mode-config/pretest.dat [deleted file]
testing/tests/ikev1/xauth-rsa-mode-config/test.conf [deleted file]
testing/tests/ikev1/xauth-rsa-nosecret/description.txt [deleted file]
testing/tests/ikev1/xauth-rsa-nosecret/evaltest.dat [deleted file]
testing/tests/ikev1/xauth-rsa-nosecret/hosts/carol/etc/ipsec.conf [deleted file]
testing/tests/ikev1/xauth-rsa-nosecret/hosts/carol/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/xauth-rsa-nosecret/hosts/carol/etc/strongswan.conf [deleted file]
testing/tests/ikev1/xauth-rsa-nosecret/hosts/moon/etc/ipsec.conf [deleted file]
testing/tests/ikev1/xauth-rsa-nosecret/hosts/moon/etc/ipsec.secrets [deleted file]
testing/tests/ikev1/xauth-rsa-nosecret/hosts/moon/etc/strongswan.conf [deleted file]
testing/tests/ikev1/xauth-rsa-nosecret/posttest.dat [deleted file]
testing/tests/ikev1/xauth-rsa-nosecret/pretest.dat [deleted file]
testing/tests/ikev1/xauth-rsa-nosecret/test.conf [deleted file]
testing/tests/ikev1/xauth-rsa/evaltest.dat
testing/tests/ikev1/xauth-rsa/hosts/carol/etc/ipsec.conf
testing/tests/ikev1/xauth-rsa/hosts/carol/etc/strongswan.conf
testing/tests/ikev1/xauth-rsa/hosts/dave/etc/ipsec.conf
testing/tests/ikev1/xauth-rsa/hosts/dave/etc/strongswan.conf
testing/tests/ikev1/xauth-rsa/hosts/moon/etc/ipsec.conf
testing/tests/ikev1/xauth-rsa/hosts/moon/etc/strongswan.conf

diff --git a/testing/tests/ikev1/after-2038-certs/description.txt b/testing/tests/ikev1/after-2038-certs/description.txt
deleted file mode 100644 (file)
index fb622dc..0000000
+++ /dev/null
@@ -1,13 +0,0 @@
-The roadwarrior <b>carol</b> sets up a connection to gateway <b>moon</b>.
-The authentication is based on <b>X.509 certificates</b> that are valid until
-the year 2039 and are issued by a certification authority with a root ca 
-certificate valid until the year 2059. On 32-bit platforms, dates after
-Jan 19 03:14:07 UTC 2038 cannot by represented by the time_t data type.
-Thus if a time wrap-around occurs during ASN.1 to time_t conversions,
-dates contained in the certificates are set to the maximum value,
-i.e. to Jan 19 03:14:07 UTC 2038.
-
-Upon the successful establishment of the IPsec tunnels, <b>leftfirewall=yes</b>
-automatically inserts iptables-based firewall rules that let pass the tunneled traffic.
-In order to test both tunnel and firewall, <b>carol</b> ping the client <b>alice</b>
-behind the gateway <b>moon</b>.
diff --git a/testing/tests/ikev1/after-2038-certs/evaltest.dat b/testing/tests/ikev1/after-2038-certs/evaltest.dat
deleted file mode 100644 (file)
index 790811a..0000000
+++ /dev/null
@@ -1,6 +0,0 @@
-moon::ipsec status::rw.*STATE_QUICK_R2.*IPsec SA established::YES
-carol::ipsec status::home.*STATE_QUICK_I2.*IPsec SA established::YES
-carol::ping -c 1 PH_IP_ALICE::64 bytes from PH_IP_ALICE: icmp_seq=1::YES
-moon::tcpdump::IP carol.strongswan.org > moon.strongswan.org: ESP::YES
-moon::tcpdump::IP moon.strongswan.org > carol.strongswan.org: ESP::YES
-
diff --git a/testing/tests/ikev1/after-2038-certs/hosts/carol/etc/ipsec.conf b/testing/tests/ikev1/after-2038-certs/hosts/carol/etc/ipsec.conf
deleted file mode 100755 (executable)
index 528e3f1..0000000
+++ /dev/null
@@ -1,24 +0,0 @@
-# /etc/ipsec.conf - strongSwan IPsec configuration file
-
-config setup
-       plutodebug=control
-       crlcheckinterval=180
-       strictcrlpolicy=no
-       charonstart=no
-
-conn %default
-       ikelifetime=60m
-       keylife=20m
-       rekeymargin=3m
-       keyingtries=1
-       keyexchange=ikev1
-
-conn home
-       left=PH_IP_CAROL
-       leftcert=carolCert.pem
-       leftid=carol@strongswan.org
-       leftfirewall=yes
-       right=PH_IP_MOON
-       rightid=@moon.strongswan.org
-       rightsubnet=10.1.0.0/16
-       auto=add
diff --git a/testing/tests/ikev1/after-2038-certs/hosts/carol/etc/ipsec.d/cacerts/strongswanCert.pem b/testing/tests/ikev1/after-2038-certs/hosts/carol/etc/ipsec.d/cacerts/strongswanCert.pem
deleted file mode 100644 (file)
index 03b5724..0000000
+++ /dev/null
@@ -1,55 +0,0 @@
------BEGIN CERTIFICATE-----
-MIIJ0DCCBbigAwIBAgIJAIORWNruS4GuMA0GCSqGSIb3DQEBDQUAMEgxCzAJBgNV
-BAYTAkNIMRkwFwYDVQQKExBMaW51eCBzdHJvbmdTd2FuMR4wHAYDVQQDExVzdHJv
-bmdTd2FuIE1vbnN0ZXIgQ0EwIBcNMDkwMzI4MDgwMDUzWhgPMjA1OTAzMTYwODAw
-NTNaMEgxCzAJBgNVBAYTAkNIMRkwFwYDVQQKExBMaW51eCBzdHJvbmdTd2FuMR4w
-HAYDVQQDExVzdHJvbmdTd2FuIE1vbnN0ZXIgQ0EwggQiMA0GCSqGSIb3DQEBAQUA
-A4IEDwAwggQKAoIEAQDL3Cy8fYlD/Lqc6vXnWakywyvB7rouV7CIdxZMGHz/6zO4
-4sZaeqWy4Fmp6zPuLI8RtxsIyrZAJzqnTDNRb6FhosdluTy/QL2N+M2U0fKeRjAd
-2IInFOabqSSheB8Np53xK28oZ3xe75vbpSRiqGItmqZHioFPpNV+gRv2NC2NSUqr
-ta9aRo35m2ZyQuav4+oOYalayApZWr44w8qQJRILvFo6jc7x5bE+LgFNRfe15/MY
-dyrabatILkOucP61VE7QqftLj465w1GG3kzyt4PsX5FKkSkhs3wMnQKLJyvxUIlk
-sC7m/NzABRAEAfLAODJJ9indUCVjcLDC81avQPoHOSD736hkYpWRnlrgvu14q+5d
-kBRvyCQu+SoBPj0oMtEEdaPk7aBGjXDvKkeJAZYEcOP8h9oKUQjwYUQhQ7Np0f33
-YBaQSCv/6kfl+260XXMWQrQd4iDY17x5H8wA6mncTQ01JHIJy5pixXt09dPmWaAh
-qZWaDbkSLslO05zai45QpTFQ2Qtw3d6w5BY3u2bREB7HnyFfZF8n43pvsInNv5pQ
-HLVHN5/TP/YVwbZj4UXXgAjkL/4t6DGELk62VkrxB1dQDopimFRmaGctAGWbo8ro
-UVpGDXnSHCn9SPmEqeetK1fJHcCeQskVFakIB3qdRJM+rsWcOFA4c40D6uKyvLHe
-xZbqaOjpL2r9vfuzMtbUMUinZNBqVf7dCkxY02gdi1HpTB5p1VBSRbXdaC1Zow4O
-Rn2Ekd6/lr5G45S8ljr7EeGnAUKFOoyU8F6dYmvgwBTgNwQsGa+MbWkuaaxuIq0f
-/e3J3PYkdQ+7tNXPsqoDXcOtc0ZPlBRwDx9Js+qh86e5HKh85DzBjjl97giv/3PC
-Ek6imgHhx0QsulWUfGzls+sd3SXf8azBFt6Jh7lUJQafNH++fLZvryGYa2gjEn4V
-Cwr8PTaWLm5TwgHlyJTH8Zkk7yEVZvzJfs6UC8tEaYitmAb8e9cYTztA0e4gPeY/
-9UTyb0XAnol368DGKi5T5L1x1NVHkPc5zVXcGUvUFpEd4q4aJWj9xUyskt13fl8V
-9BOKc1BJZUdCkxRSt1wF4tlcFs9EVbOoYOT2+KJiaWB59ke+O7HUxnjFzNfPFLO9
-ItgNHhahXrhX22e//B9QhzQ5O29UhXpX0y624DK/e/bj96c6ve5NqDIcZdOyVduT
-XiEyfUpP0ZjvwRbS42A1VYs34ELBt5ntUhRvgivXAbBnC19pv/WFurMzaxueQgjh
-e/TUX1FWXh8zq5qPvASxkupdo5GOrcjn6a8zTmRPS6V8jVLQmUHMsCsyFcVUECsL
-99wet1nlFAloL59Z6Cjj3LkyLpeIG/o4ItGEdw5bAgMBAAGjgbowgbcwDwYDVR0T
-AQH/BAUwAwEB/zALBgNVHQ8EBAMCAQYwHQYDVR0OBBYEFBlirZarxvvXjxDEVv9A
-YyJCcHYOMHgGA1UdIwRxMG+AFBlirZarxvvXjxDEVv9AYyJCcHYOoUykSjBIMQsw
-CQYDVQQGEwJDSDEZMBcGA1UEChMQTGludXggc3Ryb25nU3dhbjEeMBwGA1UEAxMV
-c3Ryb25nU3dhbiBNb25zdGVyIENBggkAg5FY2u5Lga4wDQYJKoZIhvcNAQENBQAD
-ggQBAHcfJo343EP+u0T1DTa3oJbYtqON1F7UdkJcOUxRhp4HFlPEOFxSnHU5Qi2f
-hzxWZTQEKI2q62AXdyHDygI44dCpSFZNPcZHdwBl26maMHubv7JXFl7TWupvki57
-71ttz+0wc5iU38g3ktVkrcjzUiqKU2BXnvIuLteOHfnSMGR+JG0v94nYl60EEtZr
-/Ru0Orcq93mrQyih4MZMrcssNBI+2HSFmjITBSGAz9G81d/kojtCEsmY37dqpkqO
-lOo57HLTUzuMHW1W+c7wCLAl2rhy0xIJ/t5XpNBvPzc7xKZex01A7kKIcUV5vlvj
-8+NTuMF4NAZjgtODj0Z3kKsxaIlq0O1+SfubdnHE9pNZPXWm4SSW8w1C+n1+MAA2
-RpK7T1T7BiOQD2fSKsCPvocefiWFOUuHkyRPG5vE0Ob5XH5qT5R3xTq1ta1cpxsA
-Rq0s4QHYePZ+gU/7edI7LvZtueOGL4BeR1TSIcbij5+LfFlIjz9ETp3cWc5rxjsm
-xBGeHyCslH2EKuufzg5czqmnTdwC4zGNVUyn8c5YUVpOxEZOpnrrGpR7xCHG6n0s
-PFpXRuSp6JHSDVCFkJLLrIH0MNmXirgsNLQEOX3WBPeK2hj9X3kzV+iRd5YXqBld
-6x1Jnx66iNhJyKHDXfZ84PIZzxaKrDrR35PK3DsZUATx0l56uBWAY3n1Zl5ZrWkd
-c66yvP8/WXqO1IctddURFn1ohkkbCVd8ke45ZQoyHIb+cC2gTU53aYNNAZDHh/C/
-MrU7+d5yH29dLjtv+J3JrDwdtBLMZa4RcIOZxhk7MhheNW3K+Q5xpKrdsqourQ2T
-vBwEmrfiLHRb+Hk8UbPpDW5m3yaXYmn8bQinkD1BP2ru/f6r4Rj+aAtNvz8ofgAg
-RcUcD+jeIDAEWnFCKtHxtp+fLYm5npnwfyCyOID2Lr3K1Z7SpqzoYYq9bfc3AdtL
-uHr9RSjdfsuG0l44xESwC2+Pp6rHwvAIPfPgcZiOX1GObytxXexWYCy9g/DKmUVv
-inTJNjHpH48ffPmCBE2LoylgBv/dSmf6hQSf5lqsKQ3tKApJv8t0oO6jqyvn+aqs
-CTi4WALKhZn9YRKRzcwzYVav1g0fHkrwRQxv8TRM0tYWZ5V01qgumxD3L/37vqDR
-8bx9KvgiF3DbP2q8IbVuVMLwjU6xPH+5sWJCS0Cx2haW1oVw7ppd9sgAkj/wxzt8
-9jl/bx3rD3YwoobFvqry0Rhe4J1LidAAKX+E69c4GwoTIe3eqL/TYkis7YIFLjea
-cm2lumjrrFcnbZLvDK5S/+kfZ2Flt2QoUznNeTTNY1nAnJSgqOgOocvyYDA9vx6H
-d/Fp6btmZH31IEyJrRNVOpCwZPI=
------END CERTIFICATE-----
diff --git a/testing/tests/ikev1/after-2038-certs/hosts/carol/etc/ipsec.d/certs/carolCert.pem b/testing/tests/ikev1/after-2038-certs/hosts/carol/etc/ipsec.d/certs/carolCert.pem
deleted file mode 100644 (file)
index 2ce2ce3..0000000
+++ /dev/null
@@ -1,46 +0,0 @@
------BEGIN CERTIFICATE-----
-MIIINzCCBB+gAwIBAgIBATANBgkqhkiG9w0BAQ0FADBIMQswCQYDVQQGEwJDSDEZ
-MBcGA1UEChMQTGludXggc3Ryb25nU3dhbjEeMBwGA1UEAxMVc3Ryb25nU3dhbiBN
-b25zdGVyIENBMB4XDTA5MDMyODE0MDYwOFoXDTM5MDMyMTE0MDYwOFowWTELMAkG
-A1UEBhMCQ0gxGTAXBgNVBAoTEExpbnV4IHN0cm9uZ1N3YW4xEDAOBgNVBAsTB01v
-bnN0ZXIxHTAbBgNVBAMUFGNhcm9sQHN0cm9uZ3N3YW4ub3JnMIICIjANBgkqhkiG
-9w0BAQEFAAOCAg8AMIICCgKCAgEAqYq89COSvnLQplrjtSrDyvqvJqXN7mfmgfgR
-yGVG6HVoA3DU/vJPo8xHT43eTIBkT9wxernYxGw7UZwG6iiY3Me7Q82f+2TmX8mp
-dYtP53SWASOHBiLk7d3yJJjCY2GGP8Vb0avJa8GEOy9ZHTOf5HWwMDt9EQKxOzkw
-BebpMLCf2Mi1robNUj/lEgE+3AGfikF39E3JaXhna3mm+7PwO5J5udpxC/rVa+bO
-FPoBoBOY7v4fuq0CV5x5q/bXn9oVWteF/U1fnnOf5Dhe3P057oj7kARsmGk8e0DW
-kk1vTt4jplSg6jhH7izy4OhiqWkR7QV/BMOQBqBd6bw9Ojk12LFZBQulM0Lmtou5
-mGabckTMvtI591UCGNqGMcVDsxFIX2ZMvfScMahS6pUq+hjiR95mwez2Z1Sg014l
-cFg11mzjXGGBFuTCl3smJqRT7UaI6JfjNz1f6p/7z8QhjKChVA/xnJ5yoJWNPest
-2X0psHe3AlocUFRxqnD2ZmNO6IuKN5bmN0O4Lfc50rl2hPATXdh0HC8HvcYbRK9C
-uezkuM1QEvkev5SFbzgivXb1A2hdRCc1/XRND7Pm9sCjjh3tn5otCMnalc1mk5v+
-t8GhCKV6B7RTzFqu+ry0pe6OlqqzU0yNdqYFK1hoCDXUQzEMJzmI9mIw+n6EE3Hh
-fTZstGECAwEAAaOCARkwggEVMAkGA1UdEwQCMAAwCwYDVR0PBAQDAgOoMB0GA1Ud
-DgQWBBTy8LU5yQdnV8pfwhCPY7q/CiNyzjB4BgNVHSMEcTBvgBQZYq2Wq8b7148Q
-xFb/QGMiQnB2DqFMpEowSDELMAkGA1UEBhMCQ0gxGTAXBgNVBAoTEExpbnV4IHN0
-cm9uZ1N3YW4xHjAcBgNVBAMTFXN0cm9uZ1N3YW4gTW9uc3RlciBDQYIJAIORWNru
-S4GuMB8GA1UdEQQYMBaBFGNhcm9sQHN0cm9uZ3N3YW4ub3JnMEEGA1UdHwQ6MDgw
-NqA0oDKGMGh0dHA6Ly9jcmwuc3Ryb25nc3dhbi5vcmcvc3Ryb25nc3dhbi1tb25z
-dGVyLmNybDANBgkqhkiG9w0BAQ0FAAOCBAEAi39l78OCI9S0I3X62HbkxiLguvnc
-CbXY6Tqmz0Ms8xqZgYzJOk7FLB/4v/zJohOH5nd7KxJ81KbcERyASpybaLM0/V+V
-oGT0rDGGH5cS4H2uYfs9HsKFKKPbZeCnExFyCamXjBZkl5IZNjdpS9TLyXRJSyFN
-OIRNhILPSriqdtzgRuGOeX798U8o0ObizGQRVlT0p0lI4t64dzZbIh3jSXjCf1Tz
-cmVOC8qhhGvxLlorSy5K98t2zNY7DvzwtvoQrNFGtso1kvfmaO4XRCvSZsmqPpC5
-mmWJjNEG2qcbmfpt8TotyUHgEJTZXwXlPVVb5OXHTW6jXk/MN0UiMTLJYcvJ1gji
-kSnGNHzRH2rKlYRED+jlzzHAWSv0mBGcOTdmfBV6+TJ7QhWhLZBzAUfwqXpAy9Vk
-idtyB0eSWBTIvhZY6SzB0Rvkdj0FtZ+tNURT4dPtiO0D+LXm/ojpdKKI2tFNOgwY
-n8df2u3xnCRvHqcF6lvu+ptnwUkUDDGDuiM20+sm0HHhLIj51v8tTm3Q/MzI0BAb
-G4HOSQNDzymWDgzIE67UTxBwXVDbSLkzH1vhFXtZQlD1UHqOUT/4FQm5ZlVMF8na
-FKxHakqoh1CdI8TAmM64h3hp1zp+G9Zn0lfcHRhvWBvpU8mgF1cbEvgbzjd9+xLe
-q45/8xuZPnU7XIBvDcZTUk8LRIThcTxQRlQdI1UJnvPOBYG3mUrLs2UdEZGwsooG
-zMOj3EQwqrR67rQiuGo65IMPDix4mwHjcZ8Gr4eqLDwSUS5yoPX1qI2qNLQbI1Ni
-8PEYMXQ0Xm+9Z86ZkI0dAIBWLkEGkz5Ngqk4O3JLzF1O/XPG4E9hGJ8WsHQW6pk9
-+quv5nVNCAO0z6FYfQoYprdbDBur+N/no+BYIcSFSpLcNgafLXgj3I65iJ2VmRi0
-V0xAfxcRiQN2+/7aao2zLrrSPHU8YsW48ISw9ibQ9EckZMVtnhuYpBJuX8+auZ8f
-OgBmgRi7fCtEcMlXsiisQehymMs470eDRfWFUMzgJC8tMOQIWNdYM0Bo29wYUJPN
-jD+NO0n+PisFMilBEyoT2pD1i94+5DWQau/7STb3GbpBsLb7JbIrQEp0oSdsvsNR
-SaJQEqMxepJM0OGp3FMr79s+/a13+TMm+jl65M6sV/YTDdYFlplkWyHDjbL+WjUu
-lvDEURfBJrtT7u673RakCEzl5e53fP01HXFhqgMSloR7j2XNiyCeEUBp+zetXxwb
-8e6IKtbXWU+WcXIdNOHAL+OtD1vUK3gxupJPrRNW6daZKWUDbjRixzXnjeyIw8It
-bRldc5VjyM0G4FMbmIROgRcvjJ74MUwnHpgPl9zQ28HmbxKbANiJJZHIDw==
------END CERTIFICATE-----
diff --git a/testing/tests/ikev1/after-2038-certs/hosts/carol/etc/ipsec.d/private/carolKey.pem b/testing/tests/ikev1/after-2038-certs/hosts/carol/etc/ipsec.d/private/carolKey.pem
deleted file mode 100644 (file)
index f0836ec..0000000
+++ /dev/null
@@ -1,51 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIIJKQIBAAKCAgEAqYq89COSvnLQplrjtSrDyvqvJqXN7mfmgfgRyGVG6HVoA3DU
-/vJPo8xHT43eTIBkT9wxernYxGw7UZwG6iiY3Me7Q82f+2TmX8mpdYtP53SWASOH
-BiLk7d3yJJjCY2GGP8Vb0avJa8GEOy9ZHTOf5HWwMDt9EQKxOzkwBebpMLCf2Mi1
-robNUj/lEgE+3AGfikF39E3JaXhna3mm+7PwO5J5udpxC/rVa+bOFPoBoBOY7v4f
-uq0CV5x5q/bXn9oVWteF/U1fnnOf5Dhe3P057oj7kARsmGk8e0DWkk1vTt4jplSg
-6jhH7izy4OhiqWkR7QV/BMOQBqBd6bw9Ojk12LFZBQulM0Lmtou5mGabckTMvtI5
-91UCGNqGMcVDsxFIX2ZMvfScMahS6pUq+hjiR95mwez2Z1Sg014lcFg11mzjXGGB
-FuTCl3smJqRT7UaI6JfjNz1f6p/7z8QhjKChVA/xnJ5yoJWNPest2X0psHe3Aloc
-UFRxqnD2ZmNO6IuKN5bmN0O4Lfc50rl2hPATXdh0HC8HvcYbRK9CuezkuM1QEvke
-v5SFbzgivXb1A2hdRCc1/XRND7Pm9sCjjh3tn5otCMnalc1mk5v+t8GhCKV6B7RT
-zFqu+ry0pe6OlqqzU0yNdqYFK1hoCDXUQzEMJzmI9mIw+n6EE3HhfTZstGECAwEA
-AQKCAgAmHcjpYm4FXy7Fl72F531pTv69w50OslFCexEUaqCMdojR7TYVs0hwXObT
-XePSczMaOTjujIXNcz/K0zdCwanMSSMy1THYhRC+DEqK4K0wLifjTad3m7S4PaPI
-0ocxbKWQBMDl3KdGEJW38KcqR4b1B/h6f4VYo7BQzkSbrxRSHANz63vdJvVWPoMz
-jxAgykSiAqIDTNGxYp5trUX7ZLLn0cCIJjIwLU56GcPPN33SDVXetUdQ4sCaDdXU
-8YP8rj0K1VWMYy7SItCZsIqzSEMT+7wC3tvDUDWGyEb1UW9q3cpKBNDAl7KkO3rH
-UbeMutCK5ydtXMIumzNB704cnuwZ08sdM7BTTMhmu0VK+zjVzhBK+MFcF7pickD3
-SdNzOiqfgiXLGjsiMFJvJ7OUJczEJl2xIoZ+Otb113ep0An0PEuF6aZMaKPNP7xf
-ljnengym1Rq+f1mHBRRfool9zmeisnQSSecKo0htm6oRkQTcTwLj0TjiCugbmISf
-D7sUXWp/QFVdYhHTay1gWUnP1quflKYvEynd0UF0JOnCbpWAczdXf27fm7DVjgLp
-yZ4QyrCtyvtIITgmZOvkAcaflxe2E+cBN2F+hWGzqMJfoMtw008hRW9DcRji35Kn
-lCOj/87n8lL3dicDI0caBZO9tQIakh05XYW8xN+sYF9K/xKauQKCAQEA2txDchqB
-7719R6hBqdNqig2+telNHlN0amPKjqIvP7Tr/JnJx8A7cSasao1Fw0cGPReBT7Tb
-Z5IW7xvWiZYFMDI8q8ZGEIb+MveYs1gHlEaimMtwoVCNeNe3cEPIL7ffNT8y+xFc
-o55AjzgKAOHqmf6OidKqRs/B1sSmOrgugsY8KvYtA/JrieVHKrjNX5XqZNqrfsns
-K4DMcJvIrfBu9iyWenNoBOdEJsP0h3F39Zh2hkEg29eH+/8x6FGlezvSU89Jjs9O
-/2BdlyS82RbhPu2VIrsmpfoSrsFHRe8t/9yrnpY3ud6w2LP9QIEMd8FpWKGnNxJp
-AIZJ6u+NoWVlLwKCAQEAxk/7RSSvf6VJvi1gmOxKd79LkYUEiyZryP/M8kQFMqs5
-pU6BgFLVLZsaXz+1oYS0bEjVGGo5ppCVVUMN6RuFX9zVz9uVZBeiiItqw64UDbt/
-0u78m9ngvSpWaMQU2nS/kHVhKOY+Gfs0v5fBvZE+wxTfMBR+nbx7uJivpXnq6xMP
-fhDz6juap/lEK6HuvQN5xXBNL4wpd099lvy3NUuG0Dohb/+gWf3YzQtjs281iMZB
-G3/gGLcBSdk6PBwXueJ3NPj9FAII73MQNBNYS3zi3IYuulA/rMcvbA+IGeKTzRX5
-E47B8ZAhJxZ3OePalvZyVEaRHDFT+Y2YCv/G9Bw7bwKCAQBs97oE97m2Gcxkfxui
-aIblEY7gl7Yz4S1XQzQ46/tGZtgQPqm+cLGn1q+Fpa0UWyp6BFf3zX5oBM6yYlPg
-0PboVjrq858y32N1EN3QfYXYh4qxNKlxR+AISK8mkDj9uTjDFCJX6v8K3+IY7Lfe
-VJ0v6xQg/uiUtSA3xFVXaxiNOBIA+ezTyEFOuP9EABsQ+l1ntZApYnPZ/RjNAGNc
-Zxd4Lh8F/KvPtS2zd2Eqho5Jk41/rrGjg55LE3ZPy0bvIovH+q8PEZytfddbR4lX
-NRMU98mHL1NA1E+0/rpz0XA/sikonnZEbuHyIzt2gEoq3fuLi4Dr5JivEC2BcaA8
-uXU1AoIBAQDDxUdfXbTmxQxEctVuga2OA0mdkXwHxlkXZvcyntWmzIOu3g5X2O3c
-BMcHCoTKu4/Faiz72jmpZggV0IlV+zYyiXaFqNcUpYRtWXx/SkU/vT6VxBmZ3X/Q
-HpCJAjE365MFD+tnjcv2qBfNoAnBkzYrLVqbQ1AvdVeJxyl2qSGxCPL9V80DCe5G
-LnwOuuBMtbaro45/BtYUk2N+/2H5eeLPguNphigNTtyMpta412s458Z0WEuo+liK
-R6kGmBEQDzHxGG/2JYAeqi9vyT0b4GCwpMJSaVBCx6vX+Ik6TIPuLOfjV8W8K7We
-ub3fZ0FuUEJTUgqEk2m77P0Qtqn4aDp/AoIBAQDXI66F4POHVOPI/j584sSLhW6X
-j5VzFlmOhpyoourPYXsKyIFrLa/gYAe/wNH/5jg3Ap5DbBVZB87gOkaMz2oV+ZQ/
-5IWiFmiUxGrCXmWyI6Eqr2DUtSKispLnQ043bFN+HlhfQYTwD9ijqpwpUt/sC+IJ
-mLIGJs5B3cdcRQuSxh1HpvSJOuItjp0wfcGj3+RPh5cPdjHZW30FHGFomOk//6BO
-nWdoYUGrN9wXylDOHvlkYaP2Uj5rCWm51ZGaxzJR9S+WkHdNBzyygpGtEXdSAIzU
-tHufKwQdDnj22w8KSCvQ+KvwUn9UrIR5LyGKiYGWved9X2EQzIFC4dJ8h30G
------END RSA PRIVATE KEY-----
diff --git a/testing/tests/ikev1/after-2038-certs/hosts/moon/etc/ipsec.conf b/testing/tests/ikev1/after-2038-certs/hosts/moon/etc/ipsec.conf
deleted file mode 100755 (executable)
index 991ae43..0000000
+++ /dev/null
@@ -1,23 +0,0 @@
-# /etc/ipsec.conf - strongSwan IPsec configuration file
-
-config setup
-       plutodebug=control
-       crlcheckinterval=180
-       strictcrlpolicy=no
-       charonstart=no
-
-conn %default
-       ikelifetime=60m
-       keylife=20m
-       rekeymargin=3m
-       keyingtries=1
-       keyexchange=ikev1
-
-conn rw
-       left=PH_IP_MOON
-       leftcert=moonCert.pem
-       leftid=@moon.strongswan.org
-       leftsubnet=10.1.0.0/16
-       leftfirewall=yes
-       right=%any
-       auto=add
diff --git a/testing/tests/ikev1/after-2038-certs/hosts/moon/etc/ipsec.d/cacerts/strongswanCert.pem b/testing/tests/ikev1/after-2038-certs/hosts/moon/etc/ipsec.d/cacerts/strongswanCert.pem
deleted file mode 100644 (file)
index 03b5724..0000000
+++ /dev/null
@@ -1,55 +0,0 @@
------BEGIN CERTIFICATE-----
-MIIJ0DCCBbigAwIBAgIJAIORWNruS4GuMA0GCSqGSIb3DQEBDQUAMEgxCzAJBgNV
-BAYTAkNIMRkwFwYDVQQKExBMaW51eCBzdHJvbmdTd2FuMR4wHAYDVQQDExVzdHJv
-bmdTd2FuIE1vbnN0ZXIgQ0EwIBcNMDkwMzI4MDgwMDUzWhgPMjA1OTAzMTYwODAw
-NTNaMEgxCzAJBgNVBAYTAkNIMRkwFwYDVQQKExBMaW51eCBzdHJvbmdTd2FuMR4w
-HAYDVQQDExVzdHJvbmdTd2FuIE1vbnN0ZXIgQ0EwggQiMA0GCSqGSIb3DQEBAQUA
-A4IEDwAwggQKAoIEAQDL3Cy8fYlD/Lqc6vXnWakywyvB7rouV7CIdxZMGHz/6zO4
-4sZaeqWy4Fmp6zPuLI8RtxsIyrZAJzqnTDNRb6FhosdluTy/QL2N+M2U0fKeRjAd
-2IInFOabqSSheB8Np53xK28oZ3xe75vbpSRiqGItmqZHioFPpNV+gRv2NC2NSUqr
-ta9aRo35m2ZyQuav4+oOYalayApZWr44w8qQJRILvFo6jc7x5bE+LgFNRfe15/MY
-dyrabatILkOucP61VE7QqftLj465w1GG3kzyt4PsX5FKkSkhs3wMnQKLJyvxUIlk
-sC7m/NzABRAEAfLAODJJ9indUCVjcLDC81avQPoHOSD736hkYpWRnlrgvu14q+5d
-kBRvyCQu+SoBPj0oMtEEdaPk7aBGjXDvKkeJAZYEcOP8h9oKUQjwYUQhQ7Np0f33
-YBaQSCv/6kfl+260XXMWQrQd4iDY17x5H8wA6mncTQ01JHIJy5pixXt09dPmWaAh
-qZWaDbkSLslO05zai45QpTFQ2Qtw3d6w5BY3u2bREB7HnyFfZF8n43pvsInNv5pQ
-HLVHN5/TP/YVwbZj4UXXgAjkL/4t6DGELk62VkrxB1dQDopimFRmaGctAGWbo8ro
-UVpGDXnSHCn9SPmEqeetK1fJHcCeQskVFakIB3qdRJM+rsWcOFA4c40D6uKyvLHe
-xZbqaOjpL2r9vfuzMtbUMUinZNBqVf7dCkxY02gdi1HpTB5p1VBSRbXdaC1Zow4O
-Rn2Ekd6/lr5G45S8ljr7EeGnAUKFOoyU8F6dYmvgwBTgNwQsGa+MbWkuaaxuIq0f
-/e3J3PYkdQ+7tNXPsqoDXcOtc0ZPlBRwDx9Js+qh86e5HKh85DzBjjl97giv/3PC
-Ek6imgHhx0QsulWUfGzls+sd3SXf8azBFt6Jh7lUJQafNH++fLZvryGYa2gjEn4V
-Cwr8PTaWLm5TwgHlyJTH8Zkk7yEVZvzJfs6UC8tEaYitmAb8e9cYTztA0e4gPeY/
-9UTyb0XAnol368DGKi5T5L1x1NVHkPc5zVXcGUvUFpEd4q4aJWj9xUyskt13fl8V
-9BOKc1BJZUdCkxRSt1wF4tlcFs9EVbOoYOT2+KJiaWB59ke+O7HUxnjFzNfPFLO9
-ItgNHhahXrhX22e//B9QhzQ5O29UhXpX0y624DK/e/bj96c6ve5NqDIcZdOyVduT
-XiEyfUpP0ZjvwRbS42A1VYs34ELBt5ntUhRvgivXAbBnC19pv/WFurMzaxueQgjh
-e/TUX1FWXh8zq5qPvASxkupdo5GOrcjn6a8zTmRPS6V8jVLQmUHMsCsyFcVUECsL
-99wet1nlFAloL59Z6Cjj3LkyLpeIG/o4ItGEdw5bAgMBAAGjgbowgbcwDwYDVR0T
-AQH/BAUwAwEB/zALBgNVHQ8EBAMCAQYwHQYDVR0OBBYEFBlirZarxvvXjxDEVv9A
-YyJCcHYOMHgGA1UdIwRxMG+AFBlirZarxvvXjxDEVv9AYyJCcHYOoUykSjBIMQsw
-CQYDVQQGEwJDSDEZMBcGA1UEChMQTGludXggc3Ryb25nU3dhbjEeMBwGA1UEAxMV
-c3Ryb25nU3dhbiBNb25zdGVyIENBggkAg5FY2u5Lga4wDQYJKoZIhvcNAQENBQAD
-ggQBAHcfJo343EP+u0T1DTa3oJbYtqON1F7UdkJcOUxRhp4HFlPEOFxSnHU5Qi2f
-hzxWZTQEKI2q62AXdyHDygI44dCpSFZNPcZHdwBl26maMHubv7JXFl7TWupvki57
-71ttz+0wc5iU38g3ktVkrcjzUiqKU2BXnvIuLteOHfnSMGR+JG0v94nYl60EEtZr
-/Ru0Orcq93mrQyih4MZMrcssNBI+2HSFmjITBSGAz9G81d/kojtCEsmY37dqpkqO
-lOo57HLTUzuMHW1W+c7wCLAl2rhy0xIJ/t5XpNBvPzc7xKZex01A7kKIcUV5vlvj
-8+NTuMF4NAZjgtODj0Z3kKsxaIlq0O1+SfubdnHE9pNZPXWm4SSW8w1C+n1+MAA2
-RpK7T1T7BiOQD2fSKsCPvocefiWFOUuHkyRPG5vE0Ob5XH5qT5R3xTq1ta1cpxsA
-Rq0s4QHYePZ+gU/7edI7LvZtueOGL4BeR1TSIcbij5+LfFlIjz9ETp3cWc5rxjsm
-xBGeHyCslH2EKuufzg5czqmnTdwC4zGNVUyn8c5YUVpOxEZOpnrrGpR7xCHG6n0s
-PFpXRuSp6JHSDVCFkJLLrIH0MNmXirgsNLQEOX3WBPeK2hj9X3kzV+iRd5YXqBld
-6x1Jnx66iNhJyKHDXfZ84PIZzxaKrDrR35PK3DsZUATx0l56uBWAY3n1Zl5ZrWkd
-c66yvP8/WXqO1IctddURFn1ohkkbCVd8ke45ZQoyHIb+cC2gTU53aYNNAZDHh/C/
-MrU7+d5yH29dLjtv+J3JrDwdtBLMZa4RcIOZxhk7MhheNW3K+Q5xpKrdsqourQ2T
-vBwEmrfiLHRb+Hk8UbPpDW5m3yaXYmn8bQinkD1BP2ru/f6r4Rj+aAtNvz8ofgAg
-RcUcD+jeIDAEWnFCKtHxtp+fLYm5npnwfyCyOID2Lr3K1Z7SpqzoYYq9bfc3AdtL
-uHr9RSjdfsuG0l44xESwC2+Pp6rHwvAIPfPgcZiOX1GObytxXexWYCy9g/DKmUVv
-inTJNjHpH48ffPmCBE2LoylgBv/dSmf6hQSf5lqsKQ3tKApJv8t0oO6jqyvn+aqs
-CTi4WALKhZn9YRKRzcwzYVav1g0fHkrwRQxv8TRM0tYWZ5V01qgumxD3L/37vqDR
-8bx9KvgiF3DbP2q8IbVuVMLwjU6xPH+5sWJCS0Cx2haW1oVw7ppd9sgAkj/wxzt8
-9jl/bx3rD3YwoobFvqry0Rhe4J1LidAAKX+E69c4GwoTIe3eqL/TYkis7YIFLjea
-cm2lumjrrFcnbZLvDK5S/+kfZ2Flt2QoUznNeTTNY1nAnJSgqOgOocvyYDA9vx6H
-d/Fp6btmZH31IEyJrRNVOpCwZPI=
------END CERTIFICATE-----
diff --git a/testing/tests/ikev1/after-2038-certs/hosts/moon/etc/ipsec.d/certs/moonCert.pem b/testing/tests/ikev1/after-2038-certs/hosts/moon/etc/ipsec.d/certs/moonCert.pem
deleted file mode 100644 (file)
index e83798c..0000000
+++ /dev/null
@@ -1,46 +0,0 @@
------BEGIN CERTIFICATE-----
-MIIINTCCBB2gAwIBAgIBAjANBgkqhkiG9w0BAQ0FADBIMQswCQYDVQQGEwJDSDEZ
-MBcGA1UEChMQTGludXggc3Ryb25nU3dhbjEeMBwGA1UEAxMVc3Ryb25nU3dhbiBN
-b25zdGVyIENBMB4XDTA5MDMyODE0MDcxNloXDTM5MDMyMTE0MDcxNlowWDELMAkG
-A1UEBhMCQ0gxGTAXBgNVBAoTEExpbnV4IHN0cm9uZ1N3YW4xEDAOBgNVBAsTB01v
-bnN0ZXIxHDAaBgNVBAMTE21vb24uc3Ryb25nc3dhbi5vcmcwggIiMA0GCSqGSIb3
-DQEBAQUAA4ICDwAwggIKAoICAQC/9647SgAcK/or/Qs/3cRc19po7oex5EBdPR7b
-vInAuzrVMK84+ifneBWscVhBnxcUI37D0SpKx0onrdskMOyv5nmkdcgQf8931eip
-scNsw8bC8MJsbc5Jfn3DKPurbKK2/uFFE8ot7S65HY9tVBsxKsrjS5YFPE+DKKP+
-BgVk/9hL0Kqq2iKuWTq8YTRMu5iskpLIxqvuz362G46BKoW52pFegeDzpz/Bs/7y
-0oWPRcNcuRQR5XFTpF2L3UosniMkr7aYU5Z8s7IqiEx7txGh5SxRB+TYIZwB1ODa
-L+bnclQeMsBiFqlO9UI38UaxEQgk/+UhgpaX/DPrZg8KJmjW3e+x8xcwL3ouRLy2
-2Z99WMnV6TlwpTKj24EQJALmLG+UJG+hbV9P9j6Mkql3FHb4aLZH71CvyCqeg2yh
-FGiuaGEe8vS9+Dj5LKv8hSbBe/MSQDiPhKT1gb84TiQMsWfxLN7oDXunohnhMZfu
-sydB/c/R/ooA5ri+lE5c65bP2Mk+ml61p6z7lJv+DXBDXW/o4v8Imjx2OMsL85LZ
-vYWJppdJrThd/m4OVnCXYfuHMZqedsIvNR5blnldATLBjWWbeoKhOyqZb8hZ6HFR
-dlJ11LhxnGg9itG385L3Espl+EVcakWBZWrOn5/LGNKZH3UedclEBNci6lSadZaP
-/UfRCwIDAQABo4IBGDCCARQwCQYDVR0TBAIwADALBgNVHQ8EBAMCA6gwHQYDVR0O
-BBYEFOQpYirU7vrMZUWDkqDijTPuhPQiMHgGA1UdIwRxMG+AFBlirZarxvvXjxDE
-Vv9AYyJCcHYOoUykSjBIMQswCQYDVQQGEwJDSDEZMBcGA1UEChMQTGludXggc3Ry
-b25nU3dhbjEeMBwGA1UEAxMVc3Ryb25nU3dhbiBNb25zdGVyIENBggkAg5FY2u5L
-ga4wHgYDVR0RBBcwFYITbW9vbi5zdHJvbmdzd2FuLm9yZzBBBgNVHR8EOjA4MDag
-NKAyhjBodHRwOi8vY3JsLnN0cm9uZ3N3YW4ub3JnL3N0cm9uZ3N3YW4tbW9uc3Rl
-ci5jcmwwDQYJKoZIhvcNAQENBQADggQBAAEsjsebEspAIANEBVWRjRpowIJlVSLf
-WKzblIPlhClXafHGJbhiamdtS2FmEh/rkzz3Ml+9cJy1KnB1Pn6+4JLSJe5xAywK
-lKTT2iY0KDdOsaK5j+CNJ2tW9NrJPxwtIz+nGGqqyyEUPJE1FYxphbLgmwFNBm2o
-HyeUVYI+gyfmhyHaXHKOmbsDG0o+pUX2tVOs0KdyU6deaAtEf1E6aA5TpCAi1OZs
-pdRDXFUfjdekRkfRr1PZ41Xwk3t6E32YhIE++r7QneQPhXymxVO9nepmpuSoHvlX
-Hb4JN2EQ0zCkkkOfqCuF46zVxsR46/3cfKbRsaVmdfGjvmDSCDI47AreluYiPTGA
-zN4XN91Y5rPZuT9OJYV4UrYv9N1jH5StVmSz19rbYOeozJXX0PBjdCKHEonD1FHY
-xWRpijVUG6NWVLKpvdg3RiFw78wIrNPAeVDvLL+112nbszNDNLSoOJjOUBySHJda
-WYFtg2IoAUis9r/o7uykNcC6KiU4Y1nC8PEIhMi4AMA9UgBCn4ixYtHI9jkfHcrD
-O1kvPRUo3hKzrhftLYtfiBfTEh+3Xab615lt5vNNhdI7d4knqUXvVdURtvlfJLZv
-W0YdvwjJtrVJAiCtX3wyxy72O1ZOG5kHCcK5oHUHg5W172rK9hK4LByk5ESqtc/t
-YDG7TmZLtUceV5yK4gz7pwIwXthA8yayRy+lbk8BFxRMfOEfb6rPdm0vvmPpHHDu
-yHR5SJTgpGo+/I8N1zS6PNeUBh0RAbSnxHJSMLn+GYTs8s6Atnq05SIuVYxvXyAQ
-ULf+ppNN5lngSZHPaOFJNpC1QL1+DdMNueDITVxYx5DV8SkWRPhzS77tsYeUxVGI
-IpUVEqSggGe6Q4YWv2smAjSeqaS5HNGxstE+Ybat/cp9QMbLc7gwKxwRQHhVRZ5O
-0rVq2bZUyly8y4wX8G8WFMNuCoAcHAdMvKh4JtmdDDZlbxdC2mSVbLSuTBfGvKc1
-ScwOBtSqQkm9PsTMitZM31s97WJLQIZbq82g2ns7hfEXMMIgzcFLYlM1SovbDZI5
-ZM63NBVTaKyj+Gxy8FcAPBPtPWwAQT+Gdi8gFwtcEilTOBECL5y0hzlL9aJpsJEq
-4KV5nnM5rutUufiYzQMZqME3g9VWk0kQteVpa4x+4zsKH9lJSSS/y0eCo/jArS8l
-HSmzUDkj2cWmf/azdrcig7g/mHeEbKu1JH1X5lRdZekqcRCW6v1OjP025B/5nSnL
-WYPUI9RLb01fmPjWdrc4+hPnHjePp8w6tuM6U6huMCwstnOel6d2FL5hOWvXNmIH
-I+8zv7SHhIWQmUbC0YQn8BFqvqDC08In5x42YiTe+42YEtafkTkbY8o=
------END CERTIFICATE-----
diff --git a/testing/tests/ikev1/after-2038-certs/hosts/moon/etc/ipsec.d/private/moonKey.pem b/testing/tests/ikev1/after-2038-certs/hosts/moon/etc/ipsec.d/private/moonKey.pem
deleted file mode 100644 (file)
index 6d39ac0..0000000
+++ /dev/null
@@ -1,51 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIIJKAIBAAKCAgEAv/euO0oAHCv6K/0LP93EXNfaaO6HseRAXT0e27yJwLs61TCv
-OPon53gVrHFYQZ8XFCN+w9EqSsdKJ63bJDDsr+Z5pHXIEH/Pd9XoqbHDbMPGwvDC
-bG3OSX59wyj7q2yitv7hRRPKLe0uuR2PbVQbMSrK40uWBTxPgyij/gYFZP/YS9Cq
-qtoirlk6vGE0TLuYrJKSyMar7s9+thuOgSqFudqRXoHg86c/wbP+8tKFj0XDXLkU
-EeVxU6Rdi91KLJ4jJK+2mFOWfLOyKohMe7cRoeUsUQfk2CGcAdTg2i/m53JUHjLA
-YhapTvVCN/FGsREIJP/lIYKWl/wz62YPCiZo1t3vsfMXMC96LkS8ttmffVjJ1ek5
-cKUyo9uBECQC5ixvlCRvoW1fT/Y+jJKpdxR2+Gi2R+9Qr8gqnoNsoRRormhhHvL0
-vfg4+Syr/IUmwXvzEkA4j4Sk9YG/OE4kDLFn8Sze6A17p6IZ4TGX7rMnQf3P0f6K
-AOa4vpROXOuWz9jJPppetaes+5Sb/g1wQ11v6OL/CJo8djjLC/OS2b2FiaaXSa04
-Xf5uDlZwl2H7hzGannbCLzUeW5Z5XQEywY1lm3qCoTsqmW/IWehxUXZSddS4cZxo
-PYrRt/OS9xLKZfhFXGpFgWVqzp+fyxjSmR91HnXJRATXIupUmnWWj/1H0QsCAwEA
-AQKCAgAn3928CQH+2A+uBXDJwlngYyHF/A4JoHzSITkAsaf3dayhzewHrMaPKP1v
-hVeswcv8becN66uaPs0jctR7LwJrAzevNpvo+XNx0+fxH7CVLhFiOrpX5XMdBv4+
-hIvKLtWZp1XJkHPFmGfFIePB9N91FgtwrSmrSrzFZLKzuDJ0qUQXc2+P76GWj4hI
-yvQfIDR1XDjLJaFfCJCsaQrvv5JpaYIanGXKlqoCpU3GyH3fpcEPyI3nrb4dfp3D
-yKJ4pBxuqWUHPQ2cN4NBnHAunnc2JrFO35HkZw7Nvpc6GwsedjwMzcPyW/ytHvqz
-PhXN/9iuPs0sacC4LzXlppxnIlVSOCoLUpyoe8zXxDJBLsU7d+zDnXZ/1guviHz+
-x4RsEKjlXcvsvnZGAy0pUzOEXIfmWOOSlA7iqkbPNud9nBS4YnOtiZIowLj6893k
-rN1GQ/jw7szBkNh5vjdZT7HAIhlBwyQI3hRJX/h0hdUPNiPW4/j9W94JWcRxk0tO
-vZq7mcTtJ8OFlsNyO12KgFIjT+Gwz7tmNrN+Of98pOt9jRN7hhxY8sQosmW1nePZ
-HuWR52CVShXX/N2d/09hwf48xjYBjF3Mjxc8ySIyERdcWqsWx3j5WaB8rEAAuMcF
-/gY5bb4Oc1MAUtX8aMidvKfVW0Owapj/ApgyOmGbO6YEQCKSIQKCAQEA6hbs2JoD
-8u9sCaabRKNxqnjzXzB7JrR1PKyOjp3Iiku29W1VQ/TMRUpO63LsE3lbv/3RIvi1
-wZN/dFhWC9wOY85iDUci5ZI0QcZA0OIQ/uetrE5/FBOmH9MVIQEXnGHSNPHUWMqk
-EBrykyt+7RMEb7Kldm0V57MesO1FA0y81+UCJP01KZM0D7Nq1Eb6GfNLENah3Fk2
-wHk6g36O1nMAEyjHvS+ht8C0rzNXIqCnkeAuxxAfJde9TYpuW7oCt1JEeh2VAmOO
-7QESq2x0OrPKLCUs00y5k0I9eqvAaQfCC6EcdiX7FyAfX5n5Vf5FbfbWhf9oheno
-CQ0uai4v1uqX2wKCAQEA0e91hlukBO2InB9j+54R3XA0buCr/eQFqJ4sAjgL9GCk
-n09tfytH/nLPw/g/l7snyVmGW3uZfmkOqnTP9Yfbx1dU0pPRN11qM9QG6YH+Odkv
-D+LpRnYRjj7QxQJQbGy+2IZN8cmtpJQziSmQMNZU/YoDpq7wYNVhwnP0Z3ZgUo3d
-GfRPbGw951dOAK0Z6S61+mXSQE9JhZBo49zOrmkgLa1fmLfJoukmz4MTZqoWFffq
-+1Q4vdYgRS8ToT2Rmba+7s4UAmVKyACEw8WEyjH3TXxd6tQy/smzcD0Vgg7Ghvg7
-Vs5ion9HcqDEcQ1YWvMDWPD/x4fyVgu4v2QW/k/KkQKCAQBPb04ZxlG2u1YfBEFG
-DmyA26BCWfJAVRY/a5LIhHRLsZu5NsurTsOOc8PKE+pWRWVEBj5Urq8GrCWg9mTk
-i1z6s0sElHIcEvvWog7WkxAPX9DIWq62wmAqBnfyBivb7jnlq3ZSVxlLOcm89RKS
-IlTsDmQlhqjbQiYVBb7Yes7OODD9GktS+1e8SDblJ9ywt6VuZlbwrfltYPXhLy4L
-SWTqG3mEEki/UQ4/MZ3M61VRpBBbjnXzYn0jdekzCTDowmroQWeSMvSKKkYKk7fx
-P5dIWakXXr7OYLj6CpQ1T+OiDJ7a3NKSq1zaFSbN7oXi5dMwD1aJsrEBeU6Zy2iC
-doLnAoIBAQCzC716J7JNmaCHNqZ5NKkb6NRvNCK72LuSwcPa6J4ZgEsmrAFBElLG
-inj0NEdYSwB102qpn1Kb41HkwteSGpqw+qSXLAalZ4BqT4zNnlaKU9a1f9tggtYa
-MSywuXaJ4n0qAfF8I3t7AAKsGsylOkcmLY1LnavZimNkCq0JiIZCIkfOGPWcDP0G
-zwjxvrB4laQSuMCGpJiZ1z3+CJYlXfdZvaHoh+bqkFrPZIUpbCqF9fls/Lmf/n1r
-Q+lD/VSuepOA7DVYjbcnuHmC1nSYVeELLuSSoQQVFUV6lj4/vAZJmnBRapfo6xCu
-jLq9iJowh031jyU2sZVXGYwpf12066xhAoIBADCtIvqwfy9pcqYs8PQMQTbDuz3G
-ZCe3E5SLJ00gk/PBVJihOYvdKgwoZAyWdWxOPDKzBJAaJBgpmpWKeX3k92HgLxyi
-50zKogbCc49mz2c6kRC13SviPAjO1XuM+FKo50AICenauu21/ZeMYuLt9gxnhEo5
-kkIYhD0irfTw5MMEKITAs71iB74Lxm9gv/+jOwsgoP23k562NHnIvPdbDzbR/ROD
-xb/3DsGbB4kmUXoLlWxradiZGczPddki+bMI4meMs8oH+XP14KyGqWC8LSuBDg8Y
-fADibXSIAHobiN+KhDtWz9Wnhtch9C8Q5+JDjixdspcn4lkMdMK532v/FBM=
------END RSA PRIVATE KEY-----
diff --git a/testing/tests/ikev1/after-2038-certs/posttest.dat b/testing/tests/ikev1/after-2038-certs/posttest.dat
deleted file mode 100644 (file)
index 94a4006..0000000
+++ /dev/null
@@ -1,4 +0,0 @@
-moon::ipsec stop
-carol::ipsec stop
-moon::/etc/init.d/iptables stop 2> /dev/null
-carol::/etc/init.d/iptables stop 2> /dev/null
diff --git a/testing/tests/ikev1/after-2038-certs/pretest.dat b/testing/tests/ikev1/after-2038-certs/pretest.dat
deleted file mode 100644 (file)
index 4921d50..0000000
+++ /dev/null
@@ -1,6 +0,0 @@
-moon::/etc/init.d/iptables start 2> /dev/null
-carol::/etc/init.d/iptables start 2> /dev/null
-moon::ipsec start
-carol::ipsec start
-carol::sleep 1
-carol::ipsec up home
diff --git a/testing/tests/ikev1/after-2038-certs/test.conf b/testing/tests/ikev1/after-2038-certs/test.conf
deleted file mode 100644 (file)
index 9cd583b..0000000
+++ /dev/null
@@ -1,21 +0,0 @@
-#!/bin/bash
-#
-# This configuration file provides information on the
-# UML instances used for this test
-
-# All UML instances that are required for this test
-#
-UMLHOSTS="alice moon carol winnetou"
-
-# Corresponding block diagram
-#
-DIAGRAM="a-m-c-w.png"
-
-# UML instances on which tcpdump is to be started
-#
-TCPDUMPHOSTS="moon"
-
-# UML instances on which IPsec is started
-# Used for IPsec logging purposes
-#
-IPSECHOSTS="moon carol"
diff --git a/testing/tests/ikev1/alg-3des-md5/description.txt b/testing/tests/ikev1/alg-3des-md5/description.txt
new file mode 100644 (file)
index 0000000..4c39d0b
--- /dev/null
@@ -0,0 +1,4 @@
+Roadwarrior <b>carol</b> proposes  to gateway <b>moon</b> the ESP cipher suite
+<b>3DES_CBC / HMAC_MD5_96</b> by defining <b>esp=3des-md5-modp1024!</b>
+in ipsec.conf. The same cipher suite is used for IKE.
+A ping from <b>carol</b> to <b>alice</b> successfully checks the established tunnel.
diff --git a/testing/tests/ikev1/alg-3des-md5/evaltest.dat b/testing/tests/ikev1/alg-3des-md5/evaltest.dat
new file mode 100644 (file)
index 0000000..a553ff1
--- /dev/null
@@ -0,0 +1,15 @@
+moon:: ipsec status 2> /dev/null::rw.*ESTABLISHED.*moon.strongswan.org.*carol@strongswan.org::YES
+carol::ipsec status 2> /dev/null::home.*ESTABLISHED.*carol@strongswan.org.*moon.strongswan.org::YES
+moon:: ipsec status 2> /dev/null::rw.*INSTALLED::YES
+carol::ipsec status 2> /dev/null::home.*INSTALLED::YES
+moon:: ipsec statusall 2> /dev/null::rw.*IKE proposal.*3DES_CBC/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024::YES
+carol::ipsec statusall 2> /dev/null::home.*IKE proposal.*3DES_CBC/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024::YES
+carol::ping -c 1 -s 120 -p deadbeef 10.1.0.10::128 bytes from 10.1.0.10: icmp_seq=1::YES
+moon:: ipsec statusall 2> /dev/null::rw.*3DES_CBC/HMAC_MD5_96,::YES
+carol::ipsec statusall 2> /dev/null::home.*3DES_CBC/HMAC_MD5_96,::YES
+moon:: ip xfrm state::enc cbc(des3_ede)::YES
+carol::ip xfrm state::enc cbc(des3_ede)::YES
+moon:: ip xfrm state::auth hmac(md5)::YES
+carol::ip xfrm state::auth hmac(md5)::YES
+moon::tcpdump::IP carol.strongswan.org > moon.strongswan.org: ESP.*length 180::YES
+moon::tcpdump::IP moon.strongswan.org > carol.strongswan.org: ESP.*length 180::YES
diff --git a/testing/tests/ikev1/alg-3des-md5/hosts/carol/etc/ipsec.conf b/testing/tests/ikev1/alg-3des-md5/hosts/carol/etc/ipsec.conf
new file mode 100755 (executable)
index 0000000..ed40729
--- /dev/null
@@ -0,0 +1,23 @@
+# /etc/ipsec.conf - strongSwan IPsec configuration file
+
+config setup
+       plutostart=no
+
+conn %default
+       ikelifetime=60m
+       keylife=20m
+       rekeymargin=3m
+       keyingtries=1
+       keyexchange=ikev1
+       ike=3des-md5-modp1024!
+       esp=3des-md5-modp1024!
+
+conn home
+       left=PH_IP_CAROL
+       leftfirewall=yes
+       leftcert=carolCert.pem
+       leftid=carol@strongswan.org
+       right=PH_IP_MOON
+       rightsubnet=10.1.0.0/16
+       rightid=@moon.strongswan.org
+       auto=add 
diff --git a/testing/tests/ikev1/alg-3des-md5/hosts/carol/etc/strongswan.conf b/testing/tests/ikev1/alg-3des-md5/hosts/carol/etc/strongswan.conf
new file mode 100644 (file)
index 0000000..dc93764
--- /dev/null
@@ -0,0 +1,5 @@
+# /etc/strongswan.conf - strongSwan configuration file
+
+charon {
+  load = curl aes des sha1 sha2 md5 pem pkcs1 gmp random nonce x509 revocation hmac xcbc stroke kernel-netlink socket-default updown
+}
diff --git a/testing/tests/ikev1/alg-3des-md5/hosts/moon/etc/ipsec.conf b/testing/tests/ikev1/alg-3des-md5/hosts/moon/etc/ipsec.conf
new file mode 100755 (executable)
index 0000000..db42621
--- /dev/null
@@ -0,0 +1,22 @@
+# /etc/ipsec.conf - strongSwan IPsec configuration file
+
+config setup
+       plutostart=no
+
+conn %default
+       ikelifetime=60m
+       keylife=20m
+       rekeymargin=3m
+       keyingtries=1
+       keyexchange=ikev1
+       ike=3des-md5-modp1024!
+       esp=3des-md5-modp1024!
+
+conn rw
+       left=PH_IP_MOON
+       leftfirewall=yes
+       leftcert=moonCert.pem
+       leftid=@moon.strongswan.org
+       leftsubnet=10.1.0.0/16
+       right=%any
+       auto=add
diff --git a/testing/tests/ikev1/alg-3des-md5/hosts/moon/etc/strongswan.conf b/testing/tests/ikev1/alg-3des-md5/hosts/moon/etc/strongswan.conf
new file mode 100644 (file)
index 0000000..dc93764
--- /dev/null
@@ -0,0 +1,5 @@
+# /etc/strongswan.conf - strongSwan configuration file
+
+charon {
+  load = curl aes des sha1 sha2 md5 pem pkcs1 gmp random nonce x509 revocation hmac xcbc stroke kernel-netlink socket-default updown
+}
diff --git a/testing/tests/ikev1/alg-3des-md5/posttest.dat b/testing/tests/ikev1/alg-3des-md5/posttest.dat
new file mode 100644 (file)
index 0000000..94a4006
--- /dev/null
@@ -0,0 +1,4 @@
+moon::ipsec stop
+carol::ipsec stop
+moon::/etc/init.d/iptables stop 2> /dev/null
+carol::/etc/init.d/iptables stop 2> /dev/null
diff --git a/testing/tests/ikev1/alg-3des-md5/pretest.dat b/testing/tests/ikev1/alg-3des-md5/pretest.dat
new file mode 100644 (file)
index 0000000..f360351
--- /dev/null
@@ -0,0 +1,6 @@
+moon::/etc/init.d/iptables start 2> /dev/null
+carol::/etc/init.d/iptables start 2> /dev/null
+moon::ipsec start
+carol::ipsec start
+carol::sleep 1 
+carol::ipsec up home
diff --git a/testing/tests/ikev1/alg-3des-md5/test.conf b/testing/tests/ikev1/alg-3des-md5/test.conf
new file mode 100644 (file)
index 0000000..9cd583b
--- /dev/null
@@ -0,0 +1,21 @@
+#!/bin/bash
+#
+# This configuration file provides information on the
+# UML instances used for this test
+
+# All UML instances that are required for this test
+#
+UMLHOSTS="alice moon carol winnetou"
+
+# Corresponding block diagram
+#
+DIAGRAM="a-m-c-w.png"
+
+# UML instances on which tcpdump is to be started
+#
+TCPDUMPHOSTS="moon"
+
+# UML instances on which IPsec is started
+# Used for IPsec logging purposes
+#
+IPSECHOSTS="moon carol"
index 7b14287..24b50b9 100644 (file)
@@ -1,4 +1,6 @@
-Roadwarrior <b>carol</b> proposes  to gateway <b>moon</b> the strong cipher suite
-<b>BLOWFISH_CBC_256 / HMAC_SHA2_512 / MODP_4096</b> for the IKE protocol and 
-<b>BLOWFISH_CBC_256 / HMAC_SHA2_512</b> for ESP packets. A ping from <b>carol</b> to
-<b>alice</b> successfully checks the established tunnel.
+The roadwarriors <b>carol</b> and <b>dave</b> set up a connection each 
+to gateway <b>moon</b> using <b>Blowfish</b> for both IKE and ESP
+encryption.  Upon the successful establishment of the IPsec tunnels, <b>leftfirewall=yes</b>
+automatically inserts iptables-based firewall rules that let pass the tunneled traffic.
+In order to test both tunnel and firewall, both <b>carol</b> and <b>dave</b> ping
+the client <b>alice</b> behind the gateway <b>moon</b>.
index 4ea613d..3787bdb 100644 (file)
@@ -1,11 +1,17 @@
-carol::ipsec status::home.*STATE_QUICK_I2.*IPsec SA established::YES
-moon::ipsec status::rw.*STATE_QUICK_R2.*IPsec SA established::YES
-carol::ipsec statusall::IKE proposal: BLOWFISH_CBC_256/HMAC_SHA2_512/MODP_4096::YES
-moon::ipsec statusall::IKE proposal: BLOWFISH_CBC_256/HMAC_SHA2_512/MODP_4096::YES
+carol::ipsec status 2> /dev/null::home.*ESTABLISHED.*carol@strongswan.org.*moon.strongswan.org::YES
+dave:: ipsec status 2> /dev/null::home.*ESTABLISHED.*dave@strongswan.org.*moon.strongswan.org::YES
+moon:: ipsec status 2> /dev/null::rw\[1]: ESTABLISHED.*moon.strongswan.org.*carol@strongswan.org::YES
+moon:: ipsec status 2> /dev/null::rw\[2]: ESTABLISHED.*moon.strongswan.org.*dave@strongswan.org::YES
+carol::ipsec statusall 2> /dev/null::IKE proposal: BLOWFISH_CBC_256/HMAC_SHA2_512_256::YES
+dave:: ipsec statusall 2> /dev/null::IKE proposal: BLOWFISH_CBC_128/HMAC_SHA2_256_128::YES
 carol::ping -c 1 -s 120 -p deadbeef PH_IP_ALICE::128 bytes from PH_IP_ALICE: icmp_seq=1::YES
-carol::ipsec statusall::ESP proposal: BLOWFISH_CBC_256/HMAC_SHA2_512::YES
-moon::ipsec statusall::ESP proposal: BLOWFISH_CBC_256/HMAC_SHA2_512::YES
-carol::ip xfrm state::enc cbc(blowfish)::YES
-moon::ip xfrm state::enc cbc(blowfish)::YES
-moon::tcpdump::IP carol.strongswan.org > moon.strongswan.org: ESP.*length 200::YES
-moon::tcpdump::IP moon.strongswan.org > carol.strongswan.org: ESP.*length 200::YES
+dave:: ping -c 1 -s 120 -p deadbeef PH_IP_ALICE::128 bytes from PH_IP_ALICE: icmp_seq=1::YES
+carol::ipsec statusall 2> /dev/null::BLOWFISH_CBC_192/HMAC_SHA2_384_192,::YES
+dave:: ipsec statusall 2> /dev/null::BLOWFISH_CBC_128/HMAC_SHA2_256_128,::YES
+carol::ip -s xfrm state::enc cbc(blowfish).*(192 bits)::YES
+dave:: ip -s xfrm state::enc cbc(blowfish).*(128 bits)::YES
+moon::tcpdump::IP carol.strongswan.org > moon.strongswan.org: ESP.*length 192::YES
+moon::tcpdump::IP moon.strongswan.org > carol.strongswan.org: ESP.*length 192::YES
+moon::tcpdump::IP dave.strongswan.org > moon.strongswan.org: ESP.*length 184::YES
+moon::tcpdump::IP moon.strongswan.org > dave.strongswan.org: ESP.*length 184::YES
+
index 57394c2..d277d79 100755 (executable)
@@ -1,10 +1,7 @@
 # /etc/ipsec.conf - strongSwan IPsec configuration file
 
 config setup
-       plutodebug="control crypt"
-       crlcheckinterval=180
-       strictcrlpolicy=no
-       charonstart=no
+       plutostart=no
 
 conn %default
        ikelifetime=60m
@@ -12,14 +9,15 @@ conn %default
        rekeymargin=3m
        keyingtries=1
        keyexchange=ikev1
-       ike=blowfish256-sha2_512-modp4096!
-       esp=blowfish256-sha2_512!
+       ike=blowfish256-sha512-modp2048!
+       esp=blowfish192-sha384!
 
 conn home
        left=PH_IP_CAROL
        leftcert=carolCert.pem
        leftid=carol@strongswan.org
+       leftfirewall=yes
        right=PH_IP_MOON
-       rightsubnet=10.1.0.0/16
        rightid=@moon.strongswan.org
+       rightsubnet=10.1.0.0/16
        auto=add
index 4dbdc67..1f0fd41 100644 (file)
@@ -1,11 +1,6 @@
 # /etc/strongswan.conf - strongSwan configuration file
 
-pluto {
-  load = sha1 sha2 md5 aes des blowfish hmac pem pkcs1 x509 gmp random curl kernel-netlink
-}
-
-# pluto uses optimized DH exponent sizes (RFC 3526)
-
-libstrongswan {
+charon {
   dh_exponent_ansi_x9_42 = no
+  load = aes des blowfish md5 sha1 sha2 pem pkcs1 gmp curl random nonce x509 revocation hmac stroke kernel-netlink socket-default updown
 }
diff --git a/testing/tests/ikev1/alg-blowfish/hosts/dave/etc/ipsec.conf b/testing/tests/ikev1/alg-blowfish/hosts/dave/etc/ipsec.conf
new file mode 100755 (executable)
index 0000000..36ff6a5
--- /dev/null
@@ -0,0 +1,23 @@
+# /etc/ipsec.conf - strongSwan IPsec configuration file
+
+config setup
+       plutostart=no
+
+conn %default
+       ikelifetime=60m
+       keylife=20m
+       rekeymargin=3m
+       keyingtries=1
+       keyexchange=ikev1
+       ike=blowfish128-sha256-modp1536!
+       esp=blowfish128-sha256!
+
+conn home
+       left=PH_IP_DAVE
+       leftcert=daveCert.pem
+       leftid=dave@strongswan.org
+       leftfirewall=yes
+       right=PH_IP_MOON
+       rightid=@moon.strongswan.org
+       rightsubnet=10.1.0.0/16
+       auto=add
diff --git a/testing/tests/ikev1/alg-blowfish/hosts/dave/etc/strongswan.conf b/testing/tests/ikev1/alg-blowfish/hosts/dave/etc/strongswan.conf
new file mode 100644 (file)
index 0000000..1f0fd41
--- /dev/null
@@ -0,0 +1,6 @@
+# /etc/strongswan.conf - strongSwan configuration file
+
+charon {
+  dh_exponent_ansi_x9_42 = no
+  load = aes des blowfish md5 sha1 sha2 pem pkcs1 gmp curl random nonce x509 revocation hmac stroke kernel-netlink socket-default updown
+}
index 427c5d1..ebac92b 100755 (executable)
@@ -1,10 +1,7 @@
 # /etc/ipsec.conf - strongSwan IPsec configuration file
 
 config setup
-       plutodebug="control crypt"
-       crlcheckinterval=180
-       strictcrlpolicy=no
-       charonstart=no
+       plutostart=no
 
 conn %default
        ikelifetime=60m
@@ -12,14 +9,14 @@ conn %default
        rekeymargin=3m
        keyingtries=1
        keyexchange=ikev1
-       ike=blowfish256-sha2_512-modp4096!
-       esp=blowfish256-sha2_512!
+       ike=blowfish256-sha512-modp2048,blowfish128-sha256-modp1536!
+       esp=blowfish192-sha384,blowfish128-sha256!
 
 conn rw
        left=PH_IP_MOON
        leftcert=moonCert.pem
        leftid=@moon.strongswan.org
        leftsubnet=10.1.0.0/16
+       leftfirewall=yes
        right=%any
-       rightid=carol@strongswan.org
        auto=add
index 4dbdc67..1f0fd41 100644 (file)
@@ -1,11 +1,6 @@
 # /etc/strongswan.conf - strongSwan configuration file
 
-pluto {
-  load = sha1 sha2 md5 aes des blowfish hmac pem pkcs1 x509 gmp random curl kernel-netlink
-}
-
-# pluto uses optimized DH exponent sizes (RFC 3526)
-
-libstrongswan {
+charon {
   dh_exponent_ansi_x9_42 = no
+  load = aes des blowfish md5 sha1 sha2 pem pkcs1 gmp curl random nonce x509 revocation hmac stroke kernel-netlink socket-default updown
 }
index c6d6235..7cebd7f 100644 (file)
@@ -1,2 +1,6 @@
 moon::ipsec stop
 carol::ipsec stop
+dave::ipsec stop
+moon::/etc/init.d/iptables stop 2> /dev/null
+carol::/etc/init.d/iptables stop 2> /dev/null
+dave::/etc/init.d/iptables stop 2> /dev/null
index 5e1e80e..42e9d7c 100644 (file)
@@ -1,6 +1,9 @@
-moon::echo 1 > /proc/sys/net/ipv4/ip_forward
-carol::ipsec start
+moon::/etc/init.d/iptables start 2> /dev/null
+carol::/etc/init.d/iptables start 2> /dev/null
+dave::/etc/init.d/iptables start 2> /dev/null
 moon::ipsec start
-carol::sleep 2 
-carol::ipsec up home
+carol::ipsec start
+dave::ipsec start
 carol::sleep 1
+carol::ipsec up home
+dave::ipsec up home
index 6abbb89..7041682 100644 (file)
@@ -5,11 +5,11 @@
 
 # All UML instances that are required for this test
 #
-UMLHOSTS="alice moon carol winnetou"
+UMLHOSTS="alice moon carol winnetou dave"
 
 # Corresponding block diagram
 #
-DIAGRAM="a-m-c-w.png"
+DIAGRAM="a-m-c-w-d.png"
 
 # UML instances on which tcpdump is to be started
 #
@@ -18,5 +18,4 @@ TCPDUMPHOSTS="moon"
 # UML instances on which IPsec is started
 # Used for IPsec logging purposes
 #
-IPSECHOSTS="moon carol"
-
+IPSECHOSTS="moon carol dave"
index 0f71ba5..c07c176 100644 (file)
@@ -1,11 +1,15 @@
-moon::cat /var/log/auth.log::MODP_2048_224.*refused due to strict flag::YES
-moon::ipsec statusall::IPsec SA established::YES
-carol::ipsec statusall::IPsec SA established::YES
-carol::ipsec statusall::IKE proposal: AES_CBC_128/HMAC_SHA1/MODP_1024_160::YES
-dave::ipsec statusall::IPsec SA established::YES
-dave::ipsec statusall::IKE proposal: AES_CBC_128/HMAC_SHA2_256/MODP_2048_256::YES
+carol::ipsec status 2> /dev/null::home.*ESTABLISHED.*carol@strongswan.org.*moon.strongswan.org::YES
+dave:: ipsec status 2> /dev/null::home.*ESTABLISHED.*dave@strongswan.org.*moon.strongswan.org::YES
+moon:: ipsec status 2> /dev/null::rw\[1]: ESTABLISHED.*moon.strongswan.org.*carol@strongswan.org::YES
+moon:: ipsec status 2> /dev/null::rw\[2]: ESTABLISHED.*moon.strongswan.org.*dave@strongswan.org::YES
+carol::ipsec status 2> /dev/null::home.*INSTALLED, TUNNEL::YES
+dave:: ipsec status 2> /dev/null::home.*INSTALLED, TUNNEL::YES
+moon:: ipsec status 2> /dev/null::rw[{]1}.*INSTALLED, TUNNEL::YES
+moon:: ipsec status 2> /dev/null::rw[{]2}.*INSTALLED, TUNNEL::YES
+carol::ipsec statusall 2> /dev/null::home.*AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024_160::YES
+dave:: ipsec statusall 2> /dev/null::home.*AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048_256::YES
 carol::ping -c 1 PH_IP_ALICE::64 bytes from PH_IP_ALICE: icmp_seq=1::YES
-dave::ping -c 1 PH_IP_ALICE::64 bytes from PH_IP_ALICE: icmp_seq=1::YES
+dave:: ping -c 1 PH_IP_ALICE::64 bytes from PH_IP_ALICE: icmp_seq=1::YES
 moon::tcpdump::IP carol.strongswan.org > moon.strongswan.org: ESP::YES
 moon::tcpdump::IP moon.strongswan.org > carol.strongswan.org: ESP::YES
 moon::tcpdump::IP dave.strongswan.org > moon.strongswan.org: ESP::YES
index 9445240..b83e94b 100755 (executable)
@@ -1,10 +1,7 @@
 # /etc/ipsec.conf - strongSwan IPsec configuration file
 
 config setup
-        crlcheckinterval=180
-       strictcrlpolicy=no
-       charonstart=no
-       plutodebug=control
+       plutostart=no
 
 conn %default
        ikelifetime=60m
diff --git a/testing/tests/ikev1/alg-modp-subgroup/hosts/carol/etc/strongswan.conf b/testing/tests/ikev1/alg-modp-subgroup/hosts/carol/etc/strongswan.conf
new file mode 100644 (file)
index 0000000..dc93764
--- /dev/null
@@ -0,0 +1,5 @@
+# /etc/strongswan.conf - strongSwan configuration file
+
+charon {
+  load = curl aes des sha1 sha2 md5 pem pkcs1 gmp random nonce x509 revocation hmac xcbc stroke kernel-netlink socket-default updown
+}
index a9de84e..1b6ecbc 100755 (executable)
@@ -1,10 +1,7 @@
 # /etc/ipsec.conf - strongSwan IPsec configuration file
 
 config setup
-        crlcheckinterval=180
-       strictcrlpolicy=no
-       charonstart=no
-       plutodebug=control
+       plutostart=no
 
 conn %default
        ikelifetime=60m
diff --git a/testing/tests/ikev1/alg-modp-subgroup/hosts/dave/etc/strongswan.conf b/testing/tests/ikev1/alg-modp-subgroup/hosts/dave/etc/strongswan.conf
new file mode 100644 (file)
index 0000000..dc93764
--- /dev/null
@@ -0,0 +1,5 @@
+# /etc/strongswan.conf - strongSwan configuration file
+
+charon {
+  load = curl aes des sha1 sha2 md5 pem pkcs1 gmp random nonce x509 revocation hmac xcbc stroke kernel-netlink socket-default updown
+}
index 424f78b..c3c7d18 100755 (executable)
@@ -1,10 +1,7 @@
 # /etc/ipsec.conf - strongSwan IPsec configuration file
 
 config setup
-        crlcheckinterval=180
-       strictcrlpolicy=no
-       charonstart=no
-       plutodebug=control
+       plutostart=no
 
 conn %default
        ikelifetime=60m
diff --git a/testing/tests/ikev1/alg-modp-subgroup/hosts/moon/etc/strongswan.conf b/testing/tests/ikev1/alg-modp-subgroup/hosts/moon/etc/strongswan.conf
new file mode 100644 (file)
index 0000000..dc93764
--- /dev/null
@@ -0,0 +1,5 @@
+# /etc/strongswan.conf - strongSwan configuration file
+
+charon {
+  load = curl aes des sha1 sha2 md5 pem pkcs1 gmp random nonce x509 revocation hmac xcbc stroke kernel-netlink socket-default updown
+}
diff --git a/testing/tests/ikev1/alg-sha256-96/description.txt b/testing/tests/ikev1/alg-sha256-96/description.txt
deleted file mode 100644 (file)
index c5ab23e..0000000
+++ /dev/null
@@ -1,5 +0,0 @@
-Roadwarrior <b>carol</b> proposes  to gateway <b>moon</b> the ESP cipher suite
-<b>AES_CBC_128 / HMAC_SHA2_256_96</b> with 96 bit instead of the standard 128 bit
-truncation, allowing compatibility with Linux kernels older than 2.6.33
-by defining <b>esp=aes128-sha256_96!</b> in ipsec.conf.
-A ping from <b>carol</b> to <b>alice</b> successfully checks the established tunnel.
diff --git a/testing/tests/ikev1/alg-sha256-96/evaltest.dat b/testing/tests/ikev1/alg-sha256-96/evaltest.dat
deleted file mode 100644 (file)
index 6e8715b..0000000
+++ /dev/null
@@ -1,12 +0,0 @@
-carol::ipsec status::home.*STATE_QUICK_I2.*IPsec SA established::YES
-moon::ipsec status::rw.*STATE_QUICK_R2.*IPsec SA established::YES
-carol::ipsec statusall::IKE proposal: AES_CBC_128/HMAC_SHA2_256/MODP_2048::YES
-moon::ipsec statusall::IKE proposal: AES_CBC_128/HMAC_SHA2_256/MODP_2048::YES
-carol::ping -c 1 -s 120 -p deadbeef PH_IP_ALICE::128 bytes from PH_IP_ALICE: icmp_seq=1::YES
-carol::ipsec statusall::ESP proposal: AES_CBC_128/HMAC_SHA2_256::YES
-moon::ipsec statusall::ESP proposal: AES_CBC_128/HMAC_SHA2_256::YES
-carol::ip xfrm state::auth hmac(sha256)::YES
-moon::ip xfrm state::auth hmac(sha256)::YES
-moon::tcpdump::IP carol.strongswan.org > moon.strongswan.org: ESP.*length 196::YES
-moon::tcpdump::IP moon.strongswan.org > carol.strongswan.org: ESP.*length 196::YES
-
diff --git a/testing/tests/ikev1/alg-sha256-96/hosts/carol/etc/ipsec.conf b/testing/tests/ikev1/alg-sha256-96/hosts/carol/etc/ipsec.conf
deleted file mode 100755 (executable)
index 2d6f87b..0000000
+++ /dev/null
@@ -1,25 +0,0 @@
-# /etc/ipsec.conf - strongSwan IPsec configuration file
-
-config setup
-       plutodebug="control crypt"
-       crlcheckinterval=180
-       strictcrlpolicy=no
-       charonstart=no
-
-conn %default
-       ikelifetime=60m
-       keylife=20m
-       rekeymargin=3m
-       keyingtries=1
-       keyexchange=ikev1
-       ike=aes128-sha256-modp2048!
-       esp=aes128-sha256_96!
-
-conn home
-       left=PH_IP_CAROL
-       leftcert=carolCert.pem
-       leftid=carol@strongswan.org
-       right=PH_IP_MOON
-       rightsubnet=10.1.0.0/16
-       rightid=@moon.strongswan.org
-       auto=add
diff --git a/testing/tests/ikev1/alg-sha256-96/hosts/moon/etc/ipsec.conf b/testing/tests/ikev1/alg-sha256-96/hosts/moon/etc/ipsec.conf
deleted file mode 100755 (executable)
index b2a686d..0000000
+++ /dev/null
@@ -1,25 +0,0 @@
-# /etc/ipsec.conf - strongSwan IPsec configuration file
-
-config setup
-       plutodebug="control crypt"
-       crlcheckinterval=180
-       strictcrlpolicy=no
-       charonstart=no
-
-conn %default
-       ikelifetime=60m
-       keylife=20m
-       rekeymargin=3m
-       keyingtries=1
-       keyexchange=ikev1
-       ike=aes128-sha256-modp2048!
-       esp=aes128-sha256_96!
-
-conn rw
-       left=PH_IP_MOON
-       leftcert=moonCert.pem
-       leftid=@moon.strongswan.org
-       leftsubnet=10.1.0.0/16
-       right=%any
-       rightid=carol@strongswan.org
-       auto=add
diff --git a/testing/tests/ikev1/alg-sha256-96/posttest.dat b/testing/tests/ikev1/alg-sha256-96/posttest.dat
deleted file mode 100644 (file)
index c6d6235..0000000
+++ /dev/null
@@ -1,2 +0,0 @@
-moon::ipsec stop
-carol::ipsec stop
diff --git a/testing/tests/ikev1/alg-sha256-96/pretest.dat b/testing/tests/ikev1/alg-sha256-96/pretest.dat
deleted file mode 100644 (file)
index 7d077c1..0000000
+++ /dev/null
@@ -1,5 +0,0 @@
-moon::echo 1 > /proc/sys/net/ipv4/ip_forward
-carol::ipsec start
-moon::ipsec start
-carol::sleep 2
-carol::ipsec up home
diff --git a/testing/tests/ikev1/alg-sha256-96/test.conf b/testing/tests/ikev1/alg-sha256-96/test.conf
deleted file mode 100644 (file)
index 6abbb89..0000000
+++ /dev/null
@@ -1,22 +0,0 @@
-#!/bin/bash
-#
-# This configuration file provides information on the
-# UML instances used for this test
-
-# All UML instances that are required for this test
-#
-UMLHOSTS="alice moon carol winnetou"
-
-# Corresponding block diagram
-#
-DIAGRAM="a-m-c-w.png"
-
-# UML instances on which tcpdump is to be started
-#
-TCPDUMPHOSTS="moon"
-
-# UML instances on which IPsec is started
-# Used for IPsec logging purposes
-#
-IPSECHOSTS="moon carol"
-
index 6281019..826a8f1 100644 (file)
@@ -1,4 +1,4 @@
-Roadwarrior <b>carol</b> proposes  to gateway <b>moon</b> the cipher suite
-<b>AES_CBC_128 / HMAC_SHA2_256 / MODP_2048</b> for the IKE protocol and 
-<b>AES_CBC_128 / HMAC_SHA2_256</b> for ESP packets. A ping from <b>carol</b> to
-<b>alice</b> successfully checks the established tunnel.
+Roadwarrior <b>carol</b> proposes to gateway <b>moon</b> the ESP cipher suite
+<b>AES_CBC_128 / HMAC_SHA2_256_128</b> by defining <b>esp=aes128-sha256-modp2048!</b>
+in ipsec.conf. The same cipher suite is used for IKE.
+A ping from <b>carol</b> to <b>alice</b> successfully checks the established tunnel.
index 00fcb88..7b5640a 100644 (file)
@@ -1,12 +1,13 @@
-carol::ipsec status::home.*STATE_QUICK_I2.*IPsec SA established::YES
-moon::ipsec status::rw.*STATE_QUICK_R2.*IPsec SA established::YES
-carol::ipsec statusall::IKE proposal: AES_CBC_128/HMAC_SHA2_256/MODP_2048::YES
-moon::ipsec statusall::IKE proposal: AES_CBC_128/HMAC_SHA2_256/MODP_2048::YES
-carol::ping -c 1 -s 120 -p deadbeef PH_IP_ALICE::128 bytes from PH_IP_ALICE: icmp_seq=1::YES
-carol::ipsec statusall::ESP proposal: AES_CBC_128/HMAC_SHA2_256::YES
-moon::ipsec statusall::ESP proposal: AES_CBC_128/HMAC_SHA2_256::YES
+moon:: ipsec status 2> /dev/null::rw.*ESTABLISHED.*moon.strongswan.org.*carol@strongswan.org::YES
+carol::ipsec status 2> /dev/null::home.*ESTABLISHED.*carol@strongswan.org.*moon.strongswan.org::YES
+moon:: ipsec status 2> /dev/null::rw.*INSTALLED, TUNNEL::YES
+carol::ipsec status 2> /dev/null::home.*INSTALLED, TUNNEL::YES
+moon:: ipsec statusall 2> /dev/null::rw.*IKE proposal.*AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048::YES
+carol::ipsec statusall 2> /dev/null::home.*IKE proposal.*AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048::YES
+carol::ping -c 1 -s 120 -p deadbeef 10.1.0.10::128 bytes from 10.1.0.10: icmp_seq=1::YES
+moon:: ipsec statusall 2> /dev/null::rw.*AES_CBC_128/HMAC_SHA2_256_128,::YES
+carol::ipsec statusall 2> /dev/null::home.*AES_CBC_128/HMAC_SHA2_256_128,::YES
+moon:: ip xfrm state::auth hmac(sha256)::YES
 carol::ip xfrm state::auth hmac(sha256)::YES
-moon::ip xfrm state::auth hmac(sha256)::YES
 moon::tcpdump::IP carol.strongswan.org > moon.strongswan.org: ESP.*length 200::YES
 moon::tcpdump::IP moon.strongswan.org > carol.strongswan.org: ESP.*length 200::YES
-
index 66476b8..11245e8 100755 (executable)
@@ -1,10 +1,7 @@
 # /etc/ipsec.conf - strongSwan IPsec configuration file
 
 config setup
-       plutodebug="control crypt"
-       crlcheckinterval=180
-       strictcrlpolicy=no
-       charonstart=no
+       plutostart=no
 
 conn %default
        ikelifetime=60m
@@ -13,13 +10,14 @@ conn %default
        keyingtries=1
        keyexchange=ikev1
        ike=aes128-sha256-modp2048!
-       esp=aes128-sha256!
+       esp=aes128-sha256-modp2048!
 
 conn home
        left=PH_IP_CAROL
+       leftfirewall=yes
        leftcert=carolCert.pem
        leftid=carol@strongswan.org
        right=PH_IP_MOON
        rightsubnet=10.1.0.0/16
        rightid=@moon.strongswan.org
-       auto=add
+       auto=add 
diff --git a/testing/tests/ikev1/alg-sha256/hosts/carol/etc/strongswan.conf b/testing/tests/ikev1/alg-sha256/hosts/carol/etc/strongswan.conf
new file mode 100644 (file)
index 0000000..dc93764
--- /dev/null
@@ -0,0 +1,5 @@
+# /etc/strongswan.conf - strongSwan configuration file
+
+charon {
+  load = curl aes des sha1 sha2 md5 pem pkcs1 gmp random nonce x509 revocation hmac xcbc stroke kernel-netlink socket-default updown
+}
index 2b97ff4..95a2178 100755 (executable)
@@ -1,10 +1,7 @@
 # /etc/ipsec.conf - strongSwan IPsec configuration file
 
 config setup
-       plutodebug="control crypt"
-       crlcheckinterval=180
-       strictcrlpolicy=no
-       charonstart=no
+       plutostart=no
 
 conn %default
        ikelifetime=60m
@@ -13,13 +10,13 @@ conn %default
        keyingtries=1
        keyexchange=ikev1
        ike=aes128-sha256-modp2048!
-       esp=aes128-sha256!
+       esp=aes128-sha256-modp2048!
 
 conn rw
        left=PH_IP_MOON
+       leftfirewall=yes
        leftcert=moonCert.pem
        leftid=@moon.strongswan.org
        leftsubnet=10.1.0.0/16
        right=%any
-       rightid=carol@strongswan.org
        auto=add
diff --git a/testing/tests/ikev1/alg-sha256/hosts/moon/etc/strongswan.conf b/testing/tests/ikev1/alg-sha256/hosts/moon/etc/strongswan.conf
new file mode 100644 (file)
index 0000000..dc93764
--- /dev/null
@@ -0,0 +1,5 @@
+# /etc/strongswan.conf - strongSwan configuration file
+
+charon {
+  load = curl aes des sha1 sha2 md5 pem pkcs1 gmp random nonce x509 revocation hmac xcbc stroke kernel-netlink socket-default updown
+}
index c6d6235..94a4006 100644 (file)
@@ -1,2 +1,4 @@
 moon::ipsec stop
 carol::ipsec stop
+moon::/etc/init.d/iptables stop 2> /dev/null
+carol::/etc/init.d/iptables stop 2> /dev/null
index 7d077c1..f360351 100644 (file)
@@ -1,5 +1,6 @@
-moon::echo 1 > /proc/sys/net/ipv4/ip_forward
-carol::ipsec start
+moon::/etc/init.d/iptables start 2> /dev/null
+carol::/etc/init.d/iptables start 2> /dev/null
 moon::ipsec start
-carol::sleep 2
+carol::ipsec start
+carol::sleep 1 
 carol::ipsec up home
index 6abbb89..9cd583b 100644 (file)
@@ -19,4 +19,3 @@ TCPDUMPHOSTS="moon"
 # Used for IPsec logging purposes
 #
 IPSECHOSTS="moon carol"
-
index 251e2e6..2255fe8 100644 (file)
@@ -1,4 +1,4 @@
-Roadwarrior <b>carol</b> proposes  to gateway <b>moon</b> the cipher suite
-<b>AES_CBC_192 / HMAC_SHA2_384 / MODP_3072</b> for the IKE protocol and 
-<b>AES_CBC_192 / HMAC_SHA2_384</b> for ESP packets. A ping from <b>carol</b> to
-<b>alice</b> successfully checks the established tunnel.
+Roadwarrior <b>carol</b> proposes to gateway <b>moon</b> the ESP cipher suite
+<b>AES_CBC_192 / HMAC_SHA2_384_192</b> by defining <b>esp=aes192-sha384-modp3072!</b>
+in ipsec.conf. The same cipher suite is used for IKE.
+A ping from <b>carol</b> to <b>alice</b> successfully checks the established tunnel.
index 4da5ec5..21b3d5a 100644 (file)
@@ -1,12 +1,13 @@
-carol::ipsec status::home.*STATE_QUICK_I2.*IPsec SA established::YES
-moon::ipsec status::rw.*STATE_QUICK_R2.*IPsec SA established::YES
-carol::ipsec statusall::IKE proposal: AES_CBC_192/HMAC_SHA2_384/MODP_3072::YES
-moon::ipsec statusall::IKE proposal: AES_CBC_192/HMAC_SHA2_384/MODP_3072::YES
-carol::ping -c 1 -s 120 -p deadbeef PH_IP_ALICE::128 bytes from PH_IP_ALICE: icmp_seq=1::YES
-carol::ipsec statusall::ESP proposal: AES_CBC_192/HMAC_SHA2_384::YES
-moon::ipsec statusall::ESP proposal: AES_CBC_192/HMAC_SHA2_384::YES
+moon:: ipsec status 2> /dev/null::rw.*ESTABLISHED.*moon.strongswan.org.*carol@strongswan.org::YES
+carol::ipsec status 2> /dev/null::home.*ESTABLISHED.*carol@strongswan.org.*moon.strongswan.org::YES
+moon:: ipsec status 2> /dev/null::rw.*INSTALLED, TUNNEL::YES
+carol::ipsec status 2> /dev/null::home.*INSTALLED, TUNNEL::YES
+moon:: ipsec statusall 2> /dev/null::rw.*IKE proposal.*AES_CBC_192/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_3072::YES
+carol::ipsec statusall 2> /dev/null::home.*IKE proposal.*AES_CBC_192/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_3072::YES
+carol::ping -c 1 -s 120 -p deadbeef 10.1.0.10::128 bytes from 10.1.0.10: icmp_seq=1::YES
+moon:: ipsec statusall 2> /dev/null::rw.*AES_CBC_192/HMAC_SHA2_384_192,::YES
+carol::ipsec statusall 2> /dev/null::home.*AES_CBC_192/HMAC_SHA2_384_192,::YES
+moon:: ip xfrm state::auth hmac(sha384)::YES
 carol::ip xfrm state::auth hmac(sha384)::YES
-moon::ip xfrm state::auth hmac(sha384)::YES
 moon::tcpdump::IP carol.strongswan.org > moon.strongswan.org: ESP.*length 208::YES
 moon::tcpdump::IP moon.strongswan.org > carol.strongswan.org: ESP.*length 208::YES
-
index 42df1dc..0de95a7 100755 (executable)
@@ -1,10 +1,7 @@
 # /etc/ipsec.conf - strongSwan IPsec configuration file
 
 config setup
-       plutodebug="control crypt"
-       crlcheckinterval=180
-       strictcrlpolicy=no
-       charonstart=no
+       plutostart=no
 
 conn %default
        ikelifetime=60m
@@ -13,13 +10,14 @@ conn %default
        keyingtries=1
        keyexchange=ikev1
        ike=aes192-sha384-modp3072!
-       esp=aes192-sha384!
+       esp=aes192-sha384-modp3072!
 
 conn home
        left=PH_IP_CAROL
+       leftfirewall=yes
        leftcert=carolCert.pem
        leftid=carol@strongswan.org
        right=PH_IP_MOON
        rightsubnet=10.1.0.0/16
        rightid=@moon.strongswan.org
-       auto=add
+       auto=add 
diff --git a/testing/tests/ikev1/alg-sha384/hosts/carol/etc/strongswan.conf b/testing/tests/ikev1/alg-sha384/hosts/carol/etc/strongswan.conf
new file mode 100644 (file)
index 0000000..dc93764
--- /dev/null
@@ -0,0 +1,5 @@
+# /etc/strongswan.conf - strongSwan configuration file
+
+charon {
+  load = curl aes des sha1 sha2 md5 pem pkcs1 gmp random nonce x509 revocation hmac xcbc stroke kernel-netlink socket-default updown
+}