diff --git a/testing/tests/ikev2/alg-chacha20poly1305/description.txt b/testing/tests/ikev2/alg-chacha20poly1305/description.txt
index dd8918b68..a808c4b67 100644
--- a/testing/tests/ikev2/alg-chacha20poly1305/description.txt
+++ b/testing/tests/ikev2/alg-chacha20poly1305/description.txt
@@ -1,5 +1,5 @@
Roadwarrior carol proposes to gateway moon the cipher suite
-CHACHA20_POLY1305_256 both for IKE and ESP by defining
+CHACHA20_POLY1305 both for IKE and ESP by defining
ike=chacha20poly1305-prfsha256-ntru256 and
esp=chacha20poly1305-ntru256 in ipsec.conf, respectively.
A ping from carol to alice successfully checks the established tunnel.
diff --git a/testing/tests/ikev2/alg-chacha20poly1305/evaltest.dat b/testing/tests/ikev2/alg-chacha20poly1305/evaltest.dat
index ab54ce153..ac29c66ff 100644
--- a/testing/tests/ikev2/alg-chacha20poly1305/evaltest.dat
+++ b/testing/tests/ikev2/alg-chacha20poly1305/evaltest.dat
@@ -3,10 +3,10 @@ carol::ipsec status 2> /dev/null::home.*ESTABLISHED.*carol@strongswan.org.*moon.
moon:: ipsec status 2> /dev/null::rw.*INSTALLED, TUNNEL::YES
carol::ipsec status 2> /dev/null::home.*INSTALLED, TUNNEL::YES
carol::ping -c 1 -s 120 -p deadbeef PH_IP_ALICE::128 bytes from PH_IP_ALICE: icmp_.eq=1::YES
-moon:: ipsec statusall 2> /dev/null::IKE proposal: CHACHA20_POLY1305_256::YES
-carol::ipsec statusall 2> /dev/null::IKE proposal: CHACHA20_POLY1305_256::YES
-moon:: ipsec statusall 2> /dev/null::CHACHA20_POLY1305_256,::YES
-carol::ipsec statusall 2> /dev/null::CHACHA20_POLY1305_256,::YES
+moon:: ipsec statusall 2> /dev/null::IKE proposal: CHACHA20_POLY1305::YES
+carol::ipsec statusall 2> /dev/null::IKE proposal: CHACHA20_POLY1305::YES
+moon:: ipsec statusall 2> /dev/null::CHACHA20_POLY1305,::YES
+carol::ipsec statusall 2> /dev/null::CHACHA20_POLY1305,::YES
moon:: ip xfrm state::aead rfc7539esp(chacha20,poly1305)::YES
carol::ip xfrm state::aead rfc7539esp(chacha20,poly1305)::YES
moon::tcpdump::IP carol.strongswan.org > moon.strongswan.org: ESP.*length 184::YES