aboutsummaryrefslogtreecommitdiffstats
path: root/testing/tests/tnc
diff options
context:
space:
mode:
authorTobias Brunner <tobias@strongswan.org>2015-11-26 19:06:41 +0100
committerTobias Brunner <tobias@strongswan.org>2016-06-17 15:53:12 +0200
commit44e83f76f3de50947a90cc37b2628646a5125353 (patch)
tree5a07a8366a9da0ed5eb53ecfaf4f4e38cdbc4224 /testing/tests/tnc
parent545e5291906fdf428622fefe498f2dad6a1c51c3 (diff)
downloadstrongswan-44e83f76f3de50947a90cc37b2628646a5125353.tar.bz2
strongswan-44e83f76f3de50947a90cc37b2628646a5125353.tar.xz
testing: Use TLS 1.2 in RADIUS test cases
This took a while as in the OpenSSL package shipped with Debian and on which our FIPS-enabled package is based, the function SSL_export_keying_material(), which is used by FreeRADIUS to derive the MSK, did not use the correct digest to calculate the result when TLS 1.2 was used. This caused IKE to fail with "verification of AUTH payload with EAP MSK failed". The fix was only backported to jessie recently.
Diffstat (limited to 'testing/tests/tnc')
-rw-r--r--testing/tests/tnc/tnccs-11-radius/hosts/carol/etc/strongswan.conf3
1 files changed, 3 insertions, 0 deletions
diff --git a/testing/tests/tnc/tnccs-11-radius/hosts/carol/etc/strongswan.conf b/testing/tests/tnc/tnccs-11-radius/hosts/carol/etc/strongswan.conf
index 80c96b677..09ca9d0e4 100644
--- a/testing/tests/tnc/tnccs-11-radius/hosts/carol/etc/strongswan.conf
+++ b/testing/tests/tnc/tnccs-11-radius/hosts/carol/etc/strongswan.conf
@@ -32,3 +32,6 @@ libimcv {
}
}
}
+libtls {
+ suites = TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
+}