aboutsummaryrefslogtreecommitdiffstats
path: root/testing/tests/ikev2/alg-aes-xcbc/hosts/carol
Commit message (Expand)AuthorAgeFilesLines
* Allow x25519 as an alias of the curve25519 KE algorithmAndreas Steffen2017-03-201-2/+2
* testing: make curve25519 the default DH groupAndreas Steffen2016-11-142-3/+3
* 128 bit default security strength requires 3072 bit prime DH groupAndreas Steffen2015-12-141-2/+2
* configure: Load fetcher plugins after crypto base pluginsMartin Willi2014-09-241-1/+1
* removed plutostart parameterAndreas Steffen2012-06-131-1/+0
* load nonce pluginAndreas Steffen2012-05-231-1/+1
* upgraded ikev2 scenarios to 5.0.0Andreas Steffen2012-05-111-2/+0
* all x509 based ikev2 scenarios require the revocation pluginAndreas Steffen2010-07-151-1/+1
* Adding socket-default to the plugin list in all test cases.Tobias Brunner2010-03-091-1/+1
* adapted ikev2/alg-aes-xcbc scenarioAndreas Steffen2009-11-261-2/+2
* tests load pem/pkcs1 plugins, pubkey plugin not needed anymoreMartin Willi2009-08-261-1/+1
* loading updown plugin if requiredMartin Willi2008-10-161-1/+1
* explicitly load kernel-netlink plugin in UML scenariosAndreas Steffen2008-10-071-1/+1
* define plugins to be loaded in strongswan.confAndreas Steffen2008-05-281-0/+5
* applied aes-xcbc-96 to ike as wellAndreas Steffen2008-05-131-0/+25