OSDN Git Service

2013.10.24
[uclinux-h8/uClinux-dist.git] / openswan / testing / pluto / ikev2-algo-01-modp2048-initiator / description.txt
1 Basic pluto with IKEv2 using PSK on the initiator (west), and on the responder.
2
3 This is the reverse of ikev2-algo-02-modp2048-responder
4
5 This time, one end has an ike=aes128-sha1-modp2048 specified. This will
6 cause a negotiation failure in 2.6.06 and earlier, visible in the logs with:
7
8 |                   prf=  (policy:prf-hmac-md5 vs offered:prf-hmac-sha1)
9 |                   dh=   (policy:(null) vs offered:OAKLEY_GROUP_MODP2048)
10 | proposal 1       encr= (policy:3des vs offered:aes-cbc)
11 |             failed integ=(policy:auth-hmac-sha1-96 vs offered:auth-hmac-sha1-96)
12 |             failed prf=  (policy:prf-hmac-sha1 vs offered:prf-hmac-sha1)
13 |                   dh=   (policy:(null) vs offered:OAKLEY_GROUP_MODP2048)
14 | proposal 1       encr= (policy:3des vs offered:aes-cbc)
15 |             failed integ=(policy:auth-hmac-sha1-96 vs offered:auth-hmac-sha1-96)
16 |                   prf=  (policy:prf-hmac-md5 vs offered:prf-hmac-sha1)
17 |                   dh=   (policy:(null) vs offered:OAKLEY_GROUP_MODP2048)
18 | complete v2 state transition with (null)
19 | state transition function for STATE_PARENT_R1 failed: NO_PROPOSAL_CHOSEN
20
21
22
23