#
# Copyright (C) 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009
# Yokogawa Electric Corporation.
# All rights reserved.
#
# Redistribution and use of this software in source and binary
# forms, with or without modification, are permitted provided that
# the following conditions and disclaimer are agreed and accepted
# by the user:
#
# 1. Redistributions of source code must retain the above copyright
# notice, this list of conditions and the following disclaimer.
#
# 2. Redistributions in binary form must reproduce the above copyright
# notice, this list of conditions and the following disclaimer in
# the documentation and/or other materials provided with
# the distribution.
#
# 3. Neither the names of the copyrighters, the name of the project
# which is related to this software (hereinafter referred to as
# "project") nor the names of the contributors may be used to
# endorse or promote products derived from this software without
# specific prior written permission.
#
# 4. No merchantable use may be permitted without prior written
# notification to the copyrighters.
#
# 5. The copyrighters, the project and the contributors may prohibit
# the use of this software at any time.
#
# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHTERS, THE PROJECT AND
# CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING
# BUT NOT LIMITED THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
# FOR A PARTICULAR PURPOSE, ARE DISCLAIMED. IN NO EVENT SHALL THE
# COPYRIGHTERS, THE PROJECT OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
# INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
# (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
# SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
# STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
# IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
# POSSIBILITY OF SUCH DAMAGE.
#
# $Name: REL_1_0_3 $
#
# $Id: INDEX_SGW_R,v 1.37 2009/06/16 05:41:49 doo Exp $
#
########################################################################
&print:Section SGW-R. Security Gateway - Responder
&print:Sub-Section 1. Security Gateway to Security Gateway Tunnel
./4-SGW-R/IKEv2-SGW-R-1-A-A-A.seq::::Global Setup:1
&print:Group 1. The Initial Exchanges
&print:Sub-Group 1. Header and Payload Formats
./4-SGW-R/IKEv2-SGW-R-1-1-1-1.seq::::Test IKEv2.SGW.R.1.1.1.1: Sending IKE_SA_INIT response:2
./4-SGW-R/IKEv2-SGW-R-1-1-1-2.seq::::Test IKEv2.SGW.R.1.1.1.2: Sending IKE_AUTH response:2
./4-SGW-R/IKEv2-SGW-R-1-1-1-3-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.1.1.3: Use of CHILD_SA:2
&print:Sub-Group 2. Use of Retransmission Timers
./4-SGW-R/IKEv2-SGW-R-1-1-2-1-A.seq::::Test IKEv2.SGW.R.1.1.2.1: Receipt of retransmitted IKE_SA_INIT request:2
./4-SGW-R/IKEv2-SGW-R-1-1-2-2-A.seq::::Test IKEv2.SGW.R.1.1.2.2: Receipt of retransmitted of IKE_AUTH request:2
&print:Sub-Group 3. State Synchronization and Connection Timeouts
./4-SGW-R/IKEv2-SGW-R-1-1-3-1-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.1.3.1: State Synchronization with ICMP Message:2
./4-SGW-R/IKEv2-SGW-R-1-1-3-2-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.1.3.2: State Synchronization with IKE Message:2
./4-SGW-R/IKEv2-SGW-R-1-1-3-3-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.1.3.3: Close Connections when receiving INITIAL_CONTACT:2
./4-SGW-R/IKEv2-SGW-R-1-1-3-4-A.seq::::Test IKEv2.SGW.R.1.1.3.4: Receiving Liveness check:2
./4-SGW-R/IKEv2-SGW-R-1-1-3-5-A.seq::::Test IKEv2.SGW.R.1.1.3.5: Receiving Delete Payload for IKE_SA:2
./4-SGW-R/IKEv2-SGW-R-1-1-3-6-A.seq::::Test IKEv2.SGW.R.1.1.3.6: Receiving Delete Payload for CHILD_SA:2
&print:Sub-Group 4. Version Numbers and Forward Compatibility
./4-SGW-R/IKEv2-SGW-R-1-1-4-1-A.seq::::Test IKEv2.SGW.R.1.1.4.1: Receipt of a larger minor version number:2
./4-SGW-R/IKEv2-SGW-R-1-1-4-2-A.seq::::Test IKEv2.SGW.R.1.1.4.2: Receipt of a higher major version number:2
&print:Test IKEv2.SGW.R.1.1.4.3: Unrecognized payload types and critical bit is not set
./4-SGW-R/IKEv2-SGW-R-1-1-4-3-A.seq::::Test IKEv2.SGW.R.1.1.4.3 Part A: Invalid payload type 1:2
./4-SGW-R/IKEv2-SGW-R-1-1-4-3-B.seq::::Test IKEv2.SGW.R.1.1.4.3 Part B: Invalid payload type 32:2
./4-SGW-R/IKEv2-SGW-R-1-1-4-3-C.seq::::Test IKEv2.SGW.R.1.1.4.3 Part C: Invalid payload type 49:2
./4-SGW-R/IKEv2-SGW-R-1-1-4-3-D.seq::::Test IKEv2.SGW.R.1.1.4.3 Part D: Invalid payload type 255:2
&print:Test IKEv2.SGW.R.1.1.4.4: Unrecognized payload types and critical bit is set
./4-SGW-R/IKEv2-SGW-R-1-1-4-4-A.seq::::Test IKEv2.SGW.R.1.1.4.4 Part A: Invalid paylaod type 1:2
./4-SGW-R/IKEv2-SGW-R-1-1-4-4-B.seq::::Test IKEv2.SGW.R.1.1.4.4 Part B: Invalid paylaod type 32:2
./4-SGW-R/IKEv2-SGW-R-1-1-4-4-C.seq::::Test IKEv2.SGW.R.1.1.4.4 Part C: Invalid paylaod type 49:2
./4-SGW-R/IKEv2-SGW-R-1-1-4-4-D.seq::::Test IKEv2.SGW.R.1.1.4.4 Part D: Invalid paylaod type 255:2
./4-SGW-R/IKEv2-SGW-R-1-1-4-5-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.1.4.5: Invalid Payload Order:2
&print:Sub-Group 5. Cookies
./4-SGW-R/IKEv2-SGW-R-1-1-5-1-A.seq::::Test IKEv2.SGW.R.1.1.5.1: Cookies:2
./4-SGW-R/IKEv2-SGW-R-1-1-5-2-A.seq::::Test IKEv2.SGW.R.1.1.5.2: Invalid Cookies:2
./4-SGW-R/IKEv2-SGW-R-1-1-5-3-A.seq::::Test IKEv2.SGW.R.1.1.5.3: Interaction of COOKIE and INVALID_KE_PAYLOAD:2
./4-SGW-R/IKEv2-SGW-R-1-1-5-4-A.seq::::Test IKEv2.SGW.R.1.1.5.4: Interaction of COOKIE and INVALID_KE_PAYLOAD with unoptimized Initiator:2
&print:Sub-Group 6. Cryptographic Algorithm Negotiation
&print:Test IKEv2.SGW.R.1.1.6.1: Cryptographic Algorithm Negotiation for IKE_SA
./4-SGW-R/IKEv2-SGW-R-1-1-6-1-A.seq::::Test IKEv2.SGW.R.1.1.6.1 Part A: Encryption Algorithm ENCR_AES_CBC:2
./4-SGW-R/IKEv2-SGW-R-1-1-6-1-B.seq::::Test IKEv2.SGW.R.1.1.6.1 Part B: Encryption Algorithm ENCR_AES_CTR:2
./4-SGW-R/IKEv2-SGW-R-1-1-6-1-C.seq::::Test IKEv2.SGW.R.1.1.6.1 Part C: Pseudo-random Function PRF_AES128_XCBC:2
./4-SGW-R/IKEv2-SGW-R-1-1-6-1-D.seq::::Test IKEv2.SGW.R.1.1.6.1 Part D: Integrity Algorithm AUTH_AES_XCBC_96:2
./4-SGW-R/IKEv2-SGW-R-1-1-6-1-E.seq::::Test IKEv2.SGW.R.1.1.6.1 Part E: D-H Group Group 14:2
&print:Test IKEv2.SGW.R.1.1.6.2: Cryptographic Algorithm Negotiation for CHILD_SA
./4-SGW-R/IKEv2-SGW-R-1-1-6-2-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.1.6.2 Part A: Encryption Algorithm ENCR_AES_CBC:2
./4-SGW-R/IKEv2-SGW-R-1-1-6-2-B.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.1.6.2 Part B: Encryption Algorithm ENCR_AES_CTR:2
./4-SGW-R/IKEv2-SGW-R-1-1-6-2-C.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.1.6.2 Part C: Encryption Algorithm ENCR_NULL:2
./4-SGW-R/IKEv2-SGW-R-1-1-6-2-D.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.1.6.2 Part D: Integrity Algorithm AUTH_AES_XCBC_96:2
./4-SGW-R/IKEv2-SGW-R-1-1-6-2-E.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.1.6.2 Part E: Integrity Algorithm NONE:2
./4-SGW-R/IKEv2-SGW-R-1-1-6-2-F.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.1.6.2 Part F: Extended Sequence Number:2
&print:Test IKEv2.EN.R.1.1.6.3: Receiving Multiple Transforms for IKE_SA
./4-SGW-R/IKEv2-SGW-R-1-1-6-3-A.seq::::Test IKEv2.SGW.R.1.1.6.3 Part A: Multiple Encryption Algorithms:2
./4-SGW-R/IKEv2-SGW-R-1-1-6-3-B.seq::::Test IKEv2.SGW.R.1.1.6.3 Part B: Multiple Pseudo-Random Functions:2
./4-SGW-R/IKEv2-SGW-R-1-1-6-3-C.seq::::Test IKEv2.SGW.R.1.1.6.3 Part C: Multiple Integrity Algorithms:2
./4-SGW-R/IKEv2-SGW-R-1-1-6-3-D.seq::::Test IKEv2.SGW.R.1.1.6.3 Part D: Multiple D-H Groups:2
&print:Test IKEv2.EN.R.1.1.6.4: Receiving Multiple Proposals for IKE_SA
./4-SGW-R/IKEv2-SGW-R-1-1-6-4-A.seq::::Test IKEv2.SGW.R.1.1.6.4 Part A: Multiple Proposals for IKE_SA:2
./4-SGW-R/IKEv2-SGW-R-1-1-6-4-B.seq::::Test IKEv2.SGW.R.1.1.6.4 Part B: Multiple Proposals for IKE_SA:2
./4-SGW-R/IKEv2-SGW-R-1-1-6-4-C.seq::::Test IKEv2.SGW.R.1.1.6.4 Part C: Multiple Proposals for IKE_SA:2
./4-SGW-R/IKEv2-SGW-R-1-1-6-4-D.seq::::Test IKEv2.SGW.R.1.1.6.4 Part D: Multiple Proposals for IKE_SA:2
&print:Test IKEv2.EN.R.1.1.6.5: Receiving Multiple Transforms for CHILD_SA
./4-SGW-R/IKEv2-SGW-R-1-1-6-5-A.seq::::Test IKEv2.SGW.R.1.1.6.5 Part A: Multiple Encryption Algorithms:2
./4-SGW-R/IKEv2-SGW-R-1-1-6-5-B.seq::::Test IKEv2.SGW.R.1.1.6.5 Part B: Multiple Integrity Algorithms:2
./4-SGW-R/IKEv2-SGW-R-1-1-6-5-C.seq::::Test IKEv2.SGW.R.1.1.6.5 Part C: Multiple Extended Sequence Numbers:2
&print:Test IKEv2.EN.R.1.1.6.6: Receiving Multiple Proposals for CHILD_SA
./4-SGW-R/IKEv2-SGW-R-1-1-6-6-A.seq::::Test IKEv2.SGW.R.1.1.6.6 Part A: Receiving Multiple Proposals:2
./4-SGW-R/IKEv2-SGW-R-1-1-6-6-B.seq::::Test IKEv2.SGW.R.1.1.6.6 Part B: Receiving Multiple Proposals:2
./4-SGW-R/IKEv2-SGW-R-1-1-6-6-C.seq::::Test IKEv2.SGW.R.1.1.6.6 Part C: Receiving Multiple Proposals:2
./4-SGW-R/IKEv2-SGW-R-1-1-6-7-A.seq::::Test IKEv2.SGW.R.1.1.6.7: Sending of INVALID_KE_PAYLOAD:2
./4-SGW-R/IKEv2-SGW-R-1-1-6-8-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.1.6.8: INVALID_KE_PAYLOAD in the Initial Exchange :2
./4-SGW-R/IKEv2-SGW-R-1-1-6-9-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.1.6.9: Creating an IKE_SA without a CHILD_SA:2
&print:Sub-Group 7. Traffic Selector Negotiation
./4-SGW-R/IKEv2-SGW-R-1-1-7-1-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.1.7.1: Narrowing the range of members of the set of traffic selectors:2
./4-SGW-R/IKEv2-SGW-R-1-1-7-2-A.seq::::Test IKEv2.SGW.R.1.1.7.2: TS_UNACCEPTABLE:2
./4-SGW-R/IKEv2-SGW-R-1-1-7-3-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.1.7.3: Narrowing multiple traffic selector:2
&print:Sub-Group 8. Error Handling
&print:Test IKEv2.SGW.R.1.1.8.1: INVALID_IKE_SPI
./4-SGW-R/IKEv2-SGW-R-1-1-8-1-A.seq::::Test IKEv2.SGW.R.1.1.8.1 Part A: Different IKE_SA Initiator's SPI:2
./4-SGW-R/IKEv2-SGW-R-1-1-8-1-B.seq::::Test IKEv2.SGW.R.1.1.8.1 Part B: Different IKE_SA Responder's SPI:2
./4-SGW-R/IKEv2-SGW-R-1-1-8-2-A.seq::::Test IKEv2.SGW.R.1.1.8.2: INVALID_SYNTAX:2
./4-SGW-R/IKEv2-SGW-R-1-1-8-3-A.seq::::Test IKEv2.SGW.R.1.1.8.3: INVALID_SELECTORS:2
&print:Sub-Group 10. Authentication of the IKE_SA
./4-SGW-R/IKEv2-SGW-R-1-1-10-1-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.1.10.1: Sending Certificate Payload:2
./4-SGW-R/IKEv2-SGW-R-1-1-10-2-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.1.10.2: Sending Certificate Request Payload:2
./4-SGW-R/IKEv2-SGW-R-1-1-10-3-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.1.10.3: RSA Digital Signature:2
./4-SGW-R/IKEv2-SGW-R-1-1-10-4-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.1.10.4: HEX string PSK:2
&print:Sub-Group 11. Invalid Values
./4-SGW-R/IKEv2-SGW-R-1-1-11-1-A.seq::::Test IKEv2.SGW.R.1.1.11.1: Non zero RESERVED fields in IKE_SA_INIT response:2
./4-SGW-R/IKEv2-SGW-R-1-1-11-2-A.seq::::Test IKEv2.SGW.R.1.1.11.2: Non zero RESERVED fields in IKE_AUTH response:2
./4-SGW-R/IKEv2-SGW-R-1-1-11-3-A.seq::::Test IKEv2.SGW.R.1.1.11.3: Version bit is set:2
./4-SGW-R/IKEv2-SGW-R-1-1-11-4-A.seq::::Test IKEv2.SGW.R.1.1.11.4: Response bit is set:2
./4-SGW-R/IKEv2-SGW-R-1-1-11-5-A.seq::::Test IKEv2.SGW.R.1.1.11.5 Part A: Unrecognized Notify Message Type:2
./4-SGW-R/IKEv2-SGW-R-1-1-11-5-B.seq::::Test IKEv2.SGW.R.1.1.11.5 Part B: Unrecognized Notify Message Type:2
&print:Group 2. The CREATE_CHILD_SA Exchange
&print:Sub-Group 1. Header and Payload Formats
./4-SGW-R/IKEv2-SGW-R-1-2-1-1-A.seq::::Test IKEv2.SGW.R.1.2.1.1: Receipt of CREATE_CHILD_SA request:2
&print:Sub-Group 2. Use of Retransmission Timers
./4-SGW-R/IKEv2-SGW-R-1-2-2-1-A.seq::::Test IKEv2.SGW.R.1.2.2.1: Receipt of retransmitted CREATE_CHILD_SA request:2
&print:Sub-Group 3. State Synchronization and Connection Timeouts
./4-SGW-R/IKEv2-SGW-R-1-2-3-1-A.seq::::Test IKEv2.SGW.R.1.2.3.1: Receiving Delete Payload for Multiple CHILD_SA:2
&print:Sub-Group 4. Cryptographic Algorithm Negotiation
./4-SGW-R/IKEv2-SGW-R-1-2-4-1-A.seq::::Test IKEv2.SGW.R.1.2.4.1: Sending NO_PROPOSAL_CHOSEN for CREATE_CHILD_SA:2
&print:Sub-Group 5. Rekeying
./4-SGW-R/IKEv2-SGW-R-1-2-5-1-A.seq::::Test IKEv2.SGW.R.1.2.5.1: Close the replaced CHILD_SA:2
./4-SGW-R/IKEv2-SGW-R-1-2-5-2-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.5.2: Receipt of cryptographically valid message on the old SA and the new SA:2
./4-SGW-R/IKEv2-SGW-R-1-2-5-3-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.5.3 Part A: Receiving Multiple Transform for Rekeying CHILD_SA:2
./4-SGW-R/IKEv2-SGW-R-1-2-5-3-B.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.5.3 Part B: Receiving Multiple Transform for Rekeying CHILD_SA:2
./4-SGW-R/IKEv2-SGW-R-1-2-5-3-C.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.5.3 Part C: Receiving Multiple Transform for Rekeying CHILD_SA:2
./4-SGW-R/IKEv2-SGW-R-1-2-5-4-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.5.4 Part A: Receiving Multiple Proposal for Rekeying CHILD_SA:2
./4-SGW-R/IKEv2-SGW-R-1-2-5-4-B.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.5.4 Part B: Receiving Multiple Proposal for Rekeying CHILD_SA:2
./4-SGW-R/IKEv2-SGW-R-1-2-5-4-C.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.5.4 Part C: Receiving Multiple Proposal for Rekeying CHILD_SA:2
./4-SGW-R/IKEv2-SGW-R-1-2-5-5-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.5.5: Perfect Forward Secrecy:2
./4-SGW-R/IKEv2-SGW-R-1-2-5-6-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.5.6: Use of the old CHILD_SA:2
&print:Sub-Group 6. Rekeying IKE_SAs Using a CREATE_CHILD_SA exchange
./4-SGW-R/IKEv2-SGW-R-1-2-6-1-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.6.1: Sending CREATE_CHILD_SA response:2
./4-SGW-R/IKEv2-SGW-R-1-2-6-2-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.6.2: Receipt of cryptographically valid message on the old IKE_SA:2
./4-SGW-R/IKEv2-SGW-R-1-2-6-3-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.6.3: Use of the old IKE_SA:2
./4-SGW-R/IKEv2-SGW-R-1-2-6-4-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.6.4: Close the replaced IKE_SA:2
./4-SGW-R/IKEv2-SGW-R-1-2-6-5-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.6.5 Part A: Receiving Multiple Transform for Rekeying IKE_SA:2
./4-SGW-R/IKEv2-SGW-R-1-2-6-5-B.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.6.5 Part B: Receiving Multiple Transform for Rekeying IKE_SA:2
./4-SGW-R/IKEv2-SGW-R-1-2-6-5-C.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.6.5 Part C: Receiving Multiple Transform for Rekeying IKE_SA:2
./4-SGW-R/IKEv2-SGW-R-1-2-6-5-D.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.6.5 Part D: Receiving Multiple Transform for Rekeying IKE_SA:2
./4-SGW-R/IKEv2-SGW-R-1-2-6-6-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.6.6 Part A: Receiving Multiple Proposal for Rekeying IKE_SA:2
./4-SGW-R/IKEv2-SGW-R-1-2-6-6-B.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.6.6 Part B: Receiving Multiple Proposal for Rekeying IKE_SA:2
./4-SGW-R/IKEv2-SGW-R-1-2-6-6-C.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.6.6 Part C: Receiving Multiple Proposal for Rekeying IKE_SA:2
./4-SGW-R/IKEv2-SGW-R-1-2-6-6-D.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.6.6 Part D: Receiving Multiple Proposal for Rekeying IKE_SA:2
./4-SGW-R/IKEv2-SGW-R-1-2-6-7-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.6.7: Changing PRFs when rekeying the IKE_SA:2
./4-SGW-R/IKEv2-SGW-R-1-2-6-8-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.6.8: D-H Transform NONE when rekeying the IKE_SA:2
&print:Sub-Group 7. Creating New CHILD_SA with the CREATE_CHILD_SA Exchange
./4-SGW-R/IKEv2-SGW-R-1-2-7-1-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.7.1: Receipt of cryptographically protected message on the new SA:2
&print:Sub-Group 8. Error Handling
&print:Test IKEv2.SGW.R.1.2.8.1: AUTHENTICATION_FAILED
./4-SGW-R/IKEv2-SGW-R-1-2-8-1-A.seq::::Test IKEv2.SGW.R.1.2.8.1 Part A: Authentication Data:2
./4-SGW-R/IKEv2-SGW-R-1-2-8-1-B.seq::::Test IKEv2.SGW.R.1.2.8.1 Part B: Authentication Method:2
&print:Sub-Group 9. Non zero RESERVED fields
./4-SGW-R/IKEv2-SGW-R-1-2-9-1-A.seq::::Test IKEv2.SGW.R.1.2.9.1: Non zero RESERVED fields in CREATE_CHILD_SA response:2
&print:Group 3. The INFORMATIONAL Exchange
&print:Sub-Group 1. Header and Payload Formats
./4-SGW-R/IKEv2-SGW-R-1-3-1-1-A.seq::::Test IKEv2.SGW.R.1.3.1.1: Sending INFORMATIONAL response:2
&print:Sub-Group 2. Use of Retransmission Timers
./4-SGW-R/IKEv2-SGW-R-1-3-2-1-A.seq::::Test IKEv2.SGW.R.1.3.2.1: Retransmission of INFORMATIONAL response:2
&print:Sub-Group 3. Non zero RESERVED fields
./4-SGW-R/IKEv2-SGW-R-1-3-3-1-A.seq::::Test IKEv2.SGW.R.1.3.3.1: Non zero RESERVED fields in INFORMATIONAL response:2
./4-SGW-R/IKEv2-SGW-R-1-Z-Z-Z.seq::::Global Cleanup:1
&print:Sub-Section 2. Endpoint to Security Gateway Tunnel
./4-SGW-R/IKEv2-SGW-R-2-A-A-A.seq::::Global Setup:1
&print:Group 1. The Initial Exchanges
&print:Sub-Group 1. Header and Payload Formats
./4-SGW-R/IKEv2-SGW-R-2-1-1-1-A.seq::::Test IKEv2.SGW.R.2.1.1.1: Receipt of IKE_AUTH request:2
./4-SGW-R/IKEv2-SGW-R-2-1-1-2-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.2.1.1.2: Use of CHILD_SA:2
&print:Sub-Group 2. Requesting an Internal Address on a Remote Network
./4-SGW-R/IKEv2-SGW-R-2-1-2-1-A.seq::::Test IKEv2.SGW.R.2.1.2.1: Receipt of CFG_REQUEST:2
./4-SGW-R/IKEv2-SGW-R-2-1-2-2-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.2.1.2.2: Use of CHILD_SA:2
./4-SGW-R/IKEv2-SGW-R-2-1-2-3-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.2.1.2.3: Non zero RESERVED fields in Configuration Payload:2
./4-SGW-R/IKEv2-SGW-R-2-1-2-4-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.2.1.2.4: No Configuration Payload:2
./4-SGW-R/IKEv2-SGW-R-2-1-2-5-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.2.1.2.5: Multiple CFG_REQUEST:2
./4-SGW-R/IKEv2-SGW-R-2-Z-Z-Z.seq::::Global Cleanup:1