xref: /openbsd/regress/sbin/ipsecctl/ikefail6.ok (revision fe0dc84e)
111a1b5c9Snaddyipsecctl: illegal transform aes
211a1b5c9SnaddyC set [Phase 1]:2.2.2.2=peer-2.2.2.2 force
311a1b5c9SnaddyC set [peer-2.2.2.2]:Phase=1 force
411a1b5c9SnaddyC set [peer-2.2.2.2]:Address=2.2.2.2 force
5befd40c8SbluhmC set [peer-2.2.2.2]:Configuration=phase1-peer-2.2.2.2 force
6befd40c8SbluhmC set [phase1-peer-2.2.2.2]:EXCHANGE_TYPE=ID_PROT force
7*fe0dc84eSmikebC add [phase1-peer-2.2.2.2]:Transforms=phase1-transform-peer-2.2.2.2-RSA_SIG-SHA-AES128-MODP_3072 force
8*fe0dc84eSmikebC set [phase1-transform-peer-2.2.2.2-RSA_SIG-SHA-AES128-MODP_3072]:AUTHENTICATION_METHOD=RSA_SIG force
9*fe0dc84eSmikebC set [phase1-transform-peer-2.2.2.2-RSA_SIG-SHA-AES128-MODP_3072]:HASH_ALGORITHM=SHA force
10*fe0dc84eSmikebC set [phase1-transform-peer-2.2.2.2-RSA_SIG-SHA-AES128-MODP_3072]:ENCRYPTION_ALGORITHM=AES_CBC force
11*fe0dc84eSmikebC set [phase1-transform-peer-2.2.2.2-RSA_SIG-SHA-AES128-MODP_3072]:KEY_LENGTH=128,128:256 force
12*fe0dc84eSmikebC set [phase1-transform-peer-2.2.2.2-RSA_SIG-SHA-AES128-MODP_3072]:GROUP_DESCRIPTION=MODP_3072 force
13*fe0dc84eSmikebC set [phase1-transform-peer-2.2.2.2-RSA_SIG-SHA-AES128-MODP_3072]:Life=LIFE_MAIN_MODE force
14befd40c8SbluhmC set [from-1.1.1.1-to-2.2.2.2]:Phase=2 force
15befd40c8SbluhmC set [from-1.1.1.1-to-2.2.2.2]:ISAKMP-peer=peer-2.2.2.2 force
16befd40c8SbluhmC set [from-1.1.1.1-to-2.2.2.2]:Configuration=phase2-from-1.1.1.1-to-2.2.2.2 force
17befd40c8SbluhmC set [from-1.1.1.1-to-2.2.2.2]:Local-ID=from-1.1.1.1 force
18befd40c8SbluhmC set [from-1.1.1.1-to-2.2.2.2]:Remote-ID=to-2.2.2.2 force
19befd40c8SbluhmC set [phase2-from-1.1.1.1-to-2.2.2.2]:EXCHANGE_TYPE=QUICK_MODE force
2002cf1b84SmarkusC set [phase2-from-1.1.1.1-to-2.2.2.2]:Suites=phase2-suite-from-1.1.1.1-to-2.2.2.2 force
2102cf1b84SmarkusC set [phase2-suite-from-1.1.1.1-to-2.2.2.2]:Protocols=phase2-protocol-from-1.1.1.1-to-2.2.2.2 force
2202cf1b84SmarkusC set [phase2-protocol-from-1.1.1.1-to-2.2.2.2]:PROTOCOL_ID=IPSEC_AH force
23