Return to evaltest.dat CVS log | Up to [ELWIX - Embedded LightWeight unIX -] / embedaddon / strongswan / testing / tests / tkm / xfrmproxy-expire |
1.1.1.2 ! misho 1: moon::swanctl --list-sas --raw 2> /dev/null::conn1.*version=2 state=ESTABLISHED local-host=192.168.0.1 local-port=4500 local-id=moon.strongswan.org remote-host=192.168.0.2 remote-port=4500 remote-id=sun.strongswan.org initiator=yes.*encr-alg=AES_CBC encr-keysize=256 integ-alg=HMAC_SHA2_512_256 prf-alg=PRF_HMAC_SHA2_512 dh-group=MODP_4096.*child-sas.*conn1.*state=INSTALLED mode=TRANSPORT.*ESP.*encr-alg=AES_CBC encr-keysize=256 integ-alg=HMAC_SHA2_512_256.*local-ts=\[192.168.0.1/32] remote-ts=\[192.168.0.2/32]::YES ! 2: sun:: swanctl --list-sas --raw 2> /dev/null::host-host.*version=2 state=ESTABLISHED local-host=192.168.0.2 local-port=4500 local-id=sun.strongswan.org remote-host=192.168.0.1 remote-port=4500 remote-id=moon.strongswan.org.*encr-alg=AES_CBC encr-keysize=256 integ-alg=HMAC_SHA2_512_256 prf-alg=PRF_HMAC_SHA2_512 dh-group=MODP_4096.*child-sas.*host-host.*state=INSTALLED mode=TRANSPORT.*ESP.*encr-alg=AES_CBC encr-keysize=256 integ-alg=HMAC_SHA2_512_256.*local-ts=\[192.168.0.2/32] remote-ts=\[192.168.0.1/32]::YES ! 3: moon::sleep 4::wait for rekeying::NO 1.1 misho 4: moon::cat /var/log/daemon.log::ees: acquire received for reqid 1::YES 5: moon::cat /var/log/daemon.log::ees: expire received for reqid 1, spi.*, dst 192.168.0.2::YES 6: moon::cat /var/log/daemon.log::creating rekey job for CHILD_SA ESP/0x.*/192.168.0.2::YES 7: moon::cat /var/log/daemon.log::deleting child SA (esa: 1, spi:.*)::NO 8: moon::ping -c 1 PH_IP_SUN::64 bytes from PH_IP_SUN: icmp_.eq=1::YES 9: sun::tcpdump::IP moon.strongswan.org > sun.strongswan.org: ESP::YES 10: sun::tcpdump::IP sun.strongswan.org > moon.strongswan.org: ESP::YES 11: moon::sleep 2::wait until inbound SA is deleted::NO 12: moon::cat /var/log/daemon.log::deleting child SA (esa: 1, spi:.*)::YES 13: moon::ping -c 1 PH_IP_SUN::64 bytes from PH_IP_SUN: icmp_.eq=1::YES 14: moon::cat /tmp/tkm.log::RSA private key '/etc/tkm/moonKey.der' loaded::YES 15: moon::cat /tmp/tkm.log::Adding policy \[ 1, 192.168.0.1 <-> 192.168.0.2 \]::YES 1.1.1.2 ! misho 16: moon::cat /tmp/tkm.log::Linked CC context 1 with CA certificate 1::YES ! 17: moon::cat /tmp/tkm.log::Certificate chain of CC context 1 is valid::YES 1.1 misho 18: moon::cat /tmp/tkm.log::Authentication of ISA context 1 successful::YES 19: moon::cat /tmp/tkm.log::Creating first new ESA context with ID 1 (Isa 1, Sp 1, Ea 1, Initiator TRUE, spi_loc.*, spi_rem.*)::YES 20: moon::cat /tmp/tkm.log::Creating ESA context with ID 2 (Isa 1, Sp 1, Ea 1, Dh_Id 1, Nc_Loc_Id 1, Initiator TRUE, spi_loc.*, spi_rem.*)::YES 1.1.1.2 ! misho 21: moon::cat /tmp/tkm.log::Adding ESA \[ 1, 192.168.0.1 <-> 192.168.0.2, SPI_in.*, SPI_out.*, soft 4, hard 60 \]::2 1.1 misho 22: moon::cat /tmp/tkm.log::Resetting ESA context 1::YES 23: moon::cat /tmp/tkm.log::Deleting ESA \[ 1, 192.168.0.1 <=> 192.168.0.2, SPI_in.*, SPI_out.* \]::YES 24: moon::cat /tmp/xfrm_proxy.log::Initiating ESA acquire for reqid 1::YES 25: moon::cat /tmp/xfrm_proxy.log::Initiating ESA expire (reqid 1, proto 50, SPI.*, hard FALSE)::YES