multi-level-ca scenarios use unencrypted private key
authorAndreas Steffen <andreas.steffen@strongswan.org>
Mon, 9 Oct 2006 08:23:11 +0000 (08:23 -0000)
committerAndreas Steffen <andreas.steffen@strongswan.org>
Mon, 9 Oct 2006 08:23:11 +0000 (08:23 -0000)
testing/tests/ikev1/multi-level-ca-ldap/hosts/carol/etc/ipsec.secrets [new file with mode: 0644]
testing/tests/ikev1/multi-level-ca-loop/hosts/carol/etc/ipsec.secrets [new file with mode: 0644]
testing/tests/ikev1/multi-level-ca-strict/hosts/carol/etc/ipsec.secrets [new file with mode: 0644]
testing/tests/ikev1/multi-level-ca/hosts/carol/etc/ipsec.secrets [new file with mode: 0644]

diff --git a/testing/tests/ikev1/multi-level-ca-ldap/hosts/carol/etc/ipsec.secrets b/testing/tests/ikev1/multi-level-ca-ldap/hosts/carol/etc/ipsec.secrets
new file mode 100644 (file)
index 0000000..fac55d6
--- /dev/null
@@ -0,0 +1,3 @@
+# /etc/ipsec.secrets - strongSwan IPsec secrets file
+
+: RSA carolKey.pem
diff --git a/testing/tests/ikev1/multi-level-ca-loop/hosts/carol/etc/ipsec.secrets b/testing/tests/ikev1/multi-level-ca-loop/hosts/carol/etc/ipsec.secrets
new file mode 100644 (file)
index 0000000..fac55d6
--- /dev/null
@@ -0,0 +1,3 @@
+# /etc/ipsec.secrets - strongSwan IPsec secrets file
+
+: RSA carolKey.pem
diff --git a/testing/tests/ikev1/multi-level-ca-strict/hosts/carol/etc/ipsec.secrets b/testing/tests/ikev1/multi-level-ca-strict/hosts/carol/etc/ipsec.secrets
new file mode 100644 (file)
index 0000000..fac55d6
--- /dev/null
@@ -0,0 +1,3 @@
+# /etc/ipsec.secrets - strongSwan IPsec secrets file
+
+: RSA carolKey.pem
diff --git a/testing/tests/ikev1/multi-level-ca/hosts/carol/etc/ipsec.secrets b/testing/tests/ikev1/multi-level-ca/hosts/carol/etc/ipsec.secrets
new file mode 100644 (file)
index 0000000..fac55d6
--- /dev/null
@@ -0,0 +1,3 @@
+# /etc/ipsec.secrets - strongSwan IPsec secrets file
+
+: RSA carolKey.pem