aboutsummaryrefslogtreecommitdiffstats
path: root/testing/tests/gcrypt-ikev1-p-c/alg-serpent
diff options
context:
space:
mode:
Diffstat (limited to 'testing/tests/gcrypt-ikev1-p-c/alg-serpent')
-rw-r--r--testing/tests/gcrypt-ikev1-p-c/alg-serpent/description.txt4
-rw-r--r--testing/tests/gcrypt-ikev1-p-c/alg-serpent/evaltest.dat13
-rwxr-xr-xtesting/tests/gcrypt-ikev1-p-c/alg-serpent/hosts/carol/etc/ipsec.conf26
-rw-r--r--testing/tests/gcrypt-ikev1-p-c/alg-serpent/hosts/carol/etc/strongswan.conf11
-rwxr-xr-xtesting/tests/gcrypt-ikev1-p-c/alg-serpent/hosts/moon/etc/ipsec.conf22
-rw-r--r--testing/tests/gcrypt-ikev1-p-c/alg-serpent/hosts/moon/etc/strongswan.conf10
-rw-r--r--testing/tests/gcrypt-ikev1-p-c/alg-serpent/posttest.dat2
-rw-r--r--testing/tests/gcrypt-ikev1-p-c/alg-serpent/pretest.dat5
-rw-r--r--testing/tests/gcrypt-ikev1-p-c/alg-serpent/test.conf22
9 files changed, 0 insertions, 115 deletions
diff --git a/testing/tests/gcrypt-ikev1-p-c/alg-serpent/description.txt b/testing/tests/gcrypt-ikev1-p-c/alg-serpent/description.txt
deleted file mode 100644
index 982efa5ea..000000000
--- a/testing/tests/gcrypt-ikev1-p-c/alg-serpent/description.txt
+++ /dev/null
@@ -1,4 +0,0 @@
-Roadwarrior <b>carol</b> proposes to gateway <b>moon</b> the strong cipher suite
-<b>SERPENT_CBC_256 / HMAC_SHA2_512 / MODP_4096</b> for the IKE protocol and
-<b>SERPENT_CBC_256 / HMAC_SHA2_512_256 </b> for ESP packets. A ping from <b>carol</b> to
-<b>alice</b> successfully checks the established tunnel.
diff --git a/testing/tests/gcrypt-ikev1-p-c/alg-serpent/evaltest.dat b/testing/tests/gcrypt-ikev1-p-c/alg-serpent/evaltest.dat
deleted file mode 100644
index d5e00e285..000000000
--- a/testing/tests/gcrypt-ikev1-p-c/alg-serpent/evaltest.dat
+++ /dev/null
@@ -1,13 +0,0 @@
-carol::ipsec status 2> /dev/null::home.*STATE_MAIN_I4.*ISAKMP SA established::YES
-moon:: ipsec status 2> /dev/null::rw.*ESTABLISHED.*moon.strongswan.org.*carol@strongswan.org::YES
-carol::ipsec status 2> /dev/null::home.*STATE_QUICK_I2.*IPsec SA established::YES
-moon:: ipsec status 2> /dev/null::rw.*INSTALLED, TUNNEL::YES
-carol::ipsec statusall 2> /dev/null::IKE proposal: SERPENT_CBC_256/HMAC_SHA2_512/MODP_4096::YES
-moon:: ipsec statusall 2> /dev/null::IKE proposal: SERPENT_CBC_256/HMAC_SHA2_512_256::YES
-carol::ping -c 1 -s 120 -p deadbeef PH_IP_ALICE::128 bytes from PH_IP_ALICE: icmp_seq=1::YES
-carol::ipsec statusall 2> /dev/null::ESP proposal: SERPENT_CBC_256/HMAC_SHA2_512::YES
-moon:: ipsec statusall 2> /dev/null::SERPENT_CBC_256/HMAC_SHA2_512_256,::YES
-carol::ip xfrm state::enc cbc(serpent)::YES
-moon:: ip xfrm state::enc cbc(serpent)::YES
-moon::tcpdump::IP carol.strongswan.org > moon.strongswan.org: ESP.*length 216::YES
-moon::tcpdump::IP moon.strongswan.org > carol.strongswan.org: ESP.*length 216::YES
diff --git a/testing/tests/gcrypt-ikev1-p-c/alg-serpent/hosts/carol/etc/ipsec.conf b/testing/tests/gcrypt-ikev1-p-c/alg-serpent/hosts/carol/etc/ipsec.conf
deleted file mode 100755
index 3e9c89c49..000000000
--- a/testing/tests/gcrypt-ikev1-p-c/alg-serpent/hosts/carol/etc/ipsec.conf
+++ /dev/null
@@ -1,26 +0,0 @@
-# /etc/ipsec.conf - strongSwan IPsec configuration file
-
-config setup
- plutodebug="control"
- crlcheckinterval=180
- strictcrlpolicy=no
- charonstart=no
-
-conn %default
- ikelifetime=60m
- keylife=20m
- rekeymargin=3m
- keyingtries=1
- keyexchange=ikev1
- ike=serpent256-sha2_512-modp4096!
- esp=serpent256-sha2_512!
- pfs=no
-
-conn home
- left=PH_IP_CAROL
- leftcert=carolCert.pem
- leftid=carol@strongswan.org
- right=PH_IP_MOON
- rightsubnet=10.1.0.0/16
- rightid=@moon.strongswan.org
- auto=add
diff --git a/testing/tests/gcrypt-ikev1-p-c/alg-serpent/hosts/carol/etc/strongswan.conf b/testing/tests/gcrypt-ikev1-p-c/alg-serpent/hosts/carol/etc/strongswan.conf
deleted file mode 100644
index 4b3de4d9c..000000000
--- a/testing/tests/gcrypt-ikev1-p-c/alg-serpent/hosts/carol/etc/strongswan.conf
+++ /dev/null
@@ -1,11 +0,0 @@
-# /etc/strongswan.conf - strongSwan configuration file
-
-pluto {
- load = pem pkcs1 x509 gcrypt nonce hmac curl kernel-netlink
-}
-
-# pluto uses optimized DH exponent sizes (RFC 3526)
-
-libstrongswan {
- dh_exponent_ansi_x9_42 = no
-}
diff --git a/testing/tests/gcrypt-ikev1-p-c/alg-serpent/hosts/moon/etc/ipsec.conf b/testing/tests/gcrypt-ikev1-p-c/alg-serpent/hosts/moon/etc/ipsec.conf
deleted file mode 100755
index fa6c0360d..000000000
--- a/testing/tests/gcrypt-ikev1-p-c/alg-serpent/hosts/moon/etc/ipsec.conf
+++ /dev/null
@@ -1,22 +0,0 @@
-# /etc/ipsec.conf - strongSwan IPsec configuration file
-
-config setup
- plutostart=no
-
-conn %default
- ikelifetime=60m
- keylife=20m
- rekeymargin=3m
- keyingtries=1
- keyexchange=ikev1
- ike=serpent256-sha512-modp4096!
- esp=serpent256-sha512!
-
-conn rw
- left=PH_IP_MOON
- leftcert=moonCert.pem
- leftid=@moon.strongswan.org
- leftsubnet=10.1.0.0/16
- right=%any
- rightid=carol@strongswan.org
- auto=add
diff --git a/testing/tests/gcrypt-ikev1-p-c/alg-serpent/hosts/moon/etc/strongswan.conf b/testing/tests/gcrypt-ikev1-p-c/alg-serpent/hosts/moon/etc/strongswan.conf
deleted file mode 100644
index 969a5f5aa..000000000
--- a/testing/tests/gcrypt-ikev1-p-c/alg-serpent/hosts/moon/etc/strongswan.conf
+++ /dev/null
@@ -1,10 +0,0 @@
-# /etc/strongswan.conf - strongSwan configuration file
-
-charon {
- load = curl pem pkcs1 gcrypt nonce x509 revocation hmac xcbc stroke kernel-netlink socket-default updown
- send_vendor_id = yes
-}
-
-libstrongswan {
- dh_exponent_ansi_x9_42 = no
-}
diff --git a/testing/tests/gcrypt-ikev1-p-c/alg-serpent/posttest.dat b/testing/tests/gcrypt-ikev1-p-c/alg-serpent/posttest.dat
deleted file mode 100644
index c6d6235f9..000000000
--- a/testing/tests/gcrypt-ikev1-p-c/alg-serpent/posttest.dat
+++ /dev/null
@@ -1,2 +0,0 @@
-moon::ipsec stop
-carol::ipsec stop
diff --git a/testing/tests/gcrypt-ikev1-p-c/alg-serpent/pretest.dat b/testing/tests/gcrypt-ikev1-p-c/alg-serpent/pretest.dat
deleted file mode 100644
index 6d2eeb5f9..000000000
--- a/testing/tests/gcrypt-ikev1-p-c/alg-serpent/pretest.dat
+++ /dev/null
@@ -1,5 +0,0 @@
-moon::echo 1 > /proc/sys/net/ipv4/ip_forward
-carol::ipsec start
-moon::ipsec start
-carol::sleep 2
-carol::ipsec up home
diff --git a/testing/tests/gcrypt-ikev1-p-c/alg-serpent/test.conf b/testing/tests/gcrypt-ikev1-p-c/alg-serpent/test.conf
deleted file mode 100644
index 6abbb89a9..000000000
--- a/testing/tests/gcrypt-ikev1-p-c/alg-serpent/test.conf
+++ /dev/null
@@ -1,22 +0,0 @@
-#!/bin/bash
-#
-# This configuration file provides information on the
-# UML instances used for this test
-
-# All UML instances that are required for this test
-#
-UMLHOSTS="alice moon carol winnetou"
-
-# Corresponding block diagram
-#
-DIAGRAM="a-m-c-w.png"
-
-# UML instances on which tcpdump is to be started
-#
-TCPDUMPHOSTS="moon"
-
-# UML instances on which IPsec is started
-# Used for IPsec logging purposes
-#
-IPSECHOSTS="moon carol"
-