Electric Fence 2.2.2 Copyright (C) 1987-1999 Bruce Perens <bruce@perens.com>

---- ESP tests that should succeed ----
[  3des-sha1;modp1024]    OK: alg=3DES(3)_000-SHA1(2)_000; pfsgroup=MODP1024(2)
[  3des-sha1;modp1536]    OK: alg=3DES(3)_000-SHA1(2)_000; pfsgroup=MODP1536(5)
[  3des-sha1;modp2048]    OK: alg=3DES(3)_000-SHA1(2)_000; pfsgroup=MODP2048(14)
[      3des-sha1;dh22]    OK: alg=3DES(3)_000-SHA1(2)_000; pfsgroup=DH22(22)
[      3des-sha1;dh23]    OK: alg=3DES(3)_000-SHA1(2)_000; pfsgroup=DH23(23)
[      3des-sha1;dh24]    OK: alg=3DES(3)_000-SHA1(2)_000; pfsgroup=DH24(24)
[           3des-sha1]    OK: alg=3DES(3)_000-SHA1(2)_000
[           null-sha1]    OK: alg=NULL(11)_000-SHA1(2)_000
[                 aes]    OK: alg=AES(12)_000-MD5(1)_000, AES(12)_000-SHA1(2)_000
[             aes_cbc]    OK: alg=AES(12)_000-MD5(1)_000, AES(12)_000-SHA1(2)_000
[             aes-sha]    OK: alg=AES(12)_000-SHA1(2)_000
[            aes-sha1]    OK: alg=AES(12)_000-SHA1(2)_000
[            aes-sha2]    OK: alg=AES(12)_000-SHA2_256(5)_000
[         aes128-sha1]    OK: alg=AES(12)_128-SHA1(2)_000
[         aes192-sha1]    OK: alg=AES(12)_192-SHA1(2)_000
[         aes256-sha1]    OK: alg=AES(12)_256-SHA1(2)_000
[          aes256-sha]    OK: alg=AES(12)_256-SHA1(2)_000
[         aes256-sha2]    OK: alg=AES(12)_256-SHA2_256(5)_000
[     aes256-sha2_256]    OK: alg=AES(12)_256-SHA2_256(5)_000
[     aes256-sha2_384]    OK: alg=AES(12)_256-SHA2_384(6)_000
[     aes256-sha2_512]    OK: alg=AES(12)_256-SHA2_512(7)_000
[            camellia]    OK: alg=CAMELLIA(22)_000-MD5(1)_000, CAMELLIA(22)_000-SHA1(2)_000
[         camellia128]    OK: alg=CAMELLIA(22)_128-MD5(1)_000, CAMELLIA(22)_128-SHA1(2)_000
[         camellia192]    OK: alg=CAMELLIA(22)_192-MD5(1)_000, CAMELLIA(22)_192-SHA1(2)_000
[         camellia256]    OK: alg=CAMELLIA(22)_256-MD5(1)_000, CAMELLIA(22)_256-SHA1(2)_000
[  aes_ccm_a-128-null]    OK: alg=AES_CCM_A(14)_128-NONE(0)_000
[  aes_ccm_a-192-null]    OK: alg=AES_CCM_A(14)_192-NONE(0)_000
[  aes_ccm_a-256-null]    OK: alg=AES_CCM_A(14)_256-NONE(0)_000
[  aes_ccm_b-128-null]    OK: alg=AES_CCM_B(15)_128-NONE(0)_000
[  aes_ccm_b-192-null]    OK: alg=AES_CCM_B(15)_192-NONE(0)_000
[  aes_ccm_b-256-null]    OK: alg=AES_CCM_B(15)_256-NONE(0)_000
[  aes_ccm_c-128-null]    OK: alg=AES_CCM_C(16)_128-NONE(0)_000
[  aes_ccm_c-192-null]    OK: alg=AES_CCM_C(16)_192-NONE(0)_000
[  aes_ccm_c-256-null]    OK: alg=AES_CCM_C(16)_256-NONE(0)_000
[  aes_gcm_a-128-null]    OK: alg=AES_GCM_A(18)_128-NONE(0)_000
[  aes_gcm_a-192-null]    OK: alg=AES_GCM_A(18)_192-NONE(0)_000
[  aes_gcm_a-256-null]    OK: alg=AES_GCM_A(18)_256-NONE(0)_000
[  aes_gcm_b-128-null]    OK: alg=AES_GCM_B(19)_128-NONE(0)_000
[  aes_gcm_b-192-null]    OK: alg=AES_GCM_B(19)_192-NONE(0)_000
[  aes_gcm_b-256-null]    OK: alg=AES_GCM_B(19)_256-NONE(0)_000
[  aes_gcm_c-128-null]    OK: alg=AES_GCM_C(20)_128-NONE(0)_000
[  aes_gcm_c-192-null]    OK: alg=AES_GCM_C(20)_192-NONE(0)_000
[  aes_gcm_c-256-null]    OK: alg=AES_GCM_C(20)_256-NONE(0)_000
[        aes_ccm-null]    OK: alg=AES_CCM_C(16)_000-NONE(0)_000
[        aes_gcm-null]    OK: alg=AES_GCM_C(20)_000-NONE(0)_000
[    aes_ccm-256-null]    OK: alg=AES_CCM_C(16)_256-NONE(0)_000
[    aes_gcm-192-null]    OK: alg=AES_GCM_C(20)_192-NONE(0)_000
[  aes_ccm_8-128-null]    OK
[  aes_ccm_8-192-null]    OK
[  aes_ccm_8-256-null]    OK
[ aes_ccm_12-128-null]    OK
[ aes_ccm_12-192-null]    OK
[ aes_ccm_12-256-null]    OK
[ aes_ccm_16-128-null]    OK
[ aes_ccm_16-192-null]    OK
[ aes_ccm_16-256-null]    OK
[  aes_gcm_8-128-null]    OK
[  aes_gcm_8-192-null]    OK
[  aes_gcm_8-256-null]    OK
[ aes_gcm_12-128-null]    OK
[ aes_gcm_12-192-null]    OK
[ aes_gcm_12-256-null]    OK
[ aes_gcm_16-128-null]    OK
[ aes_gcm_16-192-null]    OK
[ aes_gcm_16-256-null]    OK
[             aes_ctr]    OK: alg=AES_CTR(13)_000-MD5(1)_000, AES_CTR(13)_000-SHA1(2)_000
[              aesctr]    OK: alg=AES_CTR(13)_000-MD5(1)_000, AES_CTR(13)_000-SHA1(2)_000
[          aes128_ctr]    OK:
[             serpent]    OK: alg=SERPENT(252)_000-MD5(1)_000, SERPENT(252)_000-SHA1(2)_000
[             twofish]    OK: alg=TWOFISH(253)_000-MD5(1)_000, TWOFISH(253)_000-SHA1(2)_000
[                mars]    OK: alg=MARS(249)_000-MD5(1)_000, MARS(249)_000-SHA1(2)_000
[            modp1536]    OK:

---- ESP tests that should fail----
[        3des168-sha1] ERROR: alg=  error=3DES does not take variable key lengths, enc_alg="3des"(168), auth_alg="sha1", modp=""
[         aes224-sha1] ERROR: alg=  error=wrong encryption key length - key size must be 128 (default), 192 or 256, enc_alg="aes"(224), auth_alg="sha1", modp=""
[         aes512-sha1] ERROR: alg=  error=wrong encryption key length - key size must be 128 (default), 192 or 256, enc_alg="aes"(512), auth_alg="sha1", modp=""
[         aes-sha1555] ERROR: alg=  error=hash_alg not found, enc_alg="aes"(0), auth_alg="sha1555", modp=""
[            blowfish] ERROR:
[            des-sha1] ERROR:
[        vanitycipher] ERROR: alg=  error=enc_alg not found, enc_alg="vanitycipher"(0), auth_alg="", modp=""
[             ase-sah] ERROR: alg=  error=enc_alg not found, enc_alg="ase"(0), auth_alg="sah", modp=""
[            aes-sah1] ERROR: alg=  error=hash_alg not found, enc_alg="aes"(0), auth_alg="sah1", modp=""
[                 id3] ERROR: alg=  error=enc_alg not found, enc_alg="id"(3), auth_alg="", modp=""
[                id12] ERROR: alg=  error=enc_alg not found, enc_alg="id"(12), auth_alg="", modp=""

---- AH tests that should succeed ----
[                 md5]    OK: alg=MD5(1)_000
[                 sha]    OK: alg=SHA1(2)_000
[                sha1]    OK: alg=SHA1(2)_000
[                sha2]    OK: alg=SHA2_256(5)_000

---- AH tests that should fail ----
[                null] ERROR:
[         vanityhash1] ERROR:
[       aes_gcm_c-256] ERROR:
[                 id3] ERROR: