Return to evaltest.dat CVS log | Up to [ELWIX - Embedded LightWeight unIX -] / embedaddon / strongswan / testing / tests / pfkey / alg-sha384 |
1.1 misho 1: moon:: ipsec status 2> /dev/null::rw.*ESTABLISHED.*moon.strongswan.org.*carol@strongswan.org::YES 2: carol::ipsec status 2> /dev/null::home.*ESTABLISHED.*carol@strongswan.org.*moon.strongswan.org::YES 3: moon:: ipsec status 2> /dev/null::rw.*INSTALLED, TUNNEL::YES 4: carol::ipsec status 2> /dev/null::home.*INSTALLED, TUNNEL::YES 5: moon:: ipsec statusall 2> /dev/null::rw.*IKE proposal.*AES_CBC_192/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_3072::YES 6: carol::ipsec statusall 2> /dev/null::home.*IKE proposal.*AES_CBC_192/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_3072::YES 7: carol::ping -c 1 -s 120 -p deadbeef PH_IP_ALICE::128 bytes from PH_IP_ALICE: icmp_.eq=1::YES 8: moon:: ipsec statusall 2> /dev/null::rw.*AES_CBC_192/HMAC_SHA2_384_192,::YES 9: carol::ipsec statusall 2> /dev/null::home.*AES_CBC_192/HMAC_SHA2_384_192,::YES 10: moon:: ip xfrm state::auth-trunc hmac(sha384)::YES 11: carol::ip xfrm state::auth-trunc hmac(sha384)::YES 12: moon::tcpdump::IP carol.strongswan.org > moon.strongswan.org: ESP.*length 208::YES 13: moon::tcpdump::IP moon.strongswan.org > carol.strongswan.org: ESP.*length 208::YES