0s autopkgtest [18:20:22]: starting date and time: 2024-04-19 18:20:22+0000 0s autopkgtest [18:20:22]: git checkout: 43bc6cdf gitlab-ci: do not include the salsa pipeline 0s autopkgtest [18:20:22]: host juju-7f2275-prod-proposed-migration-environment-2; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.9uwd2kvn/out --timeout-copy=6000 --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:systemd --apt-upgrade libreswan --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 --env=ADT_TEST_TRIGGERS=systemd/255.4-1ubuntu8 -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-2@bos02-ppc64el-8.secgroup --name adt-noble-ppc64el-libreswan-20240419-182021-juju-7f2275-prod-proposed-migration-environment-2-f1eb45b6-4fa5-4451-9f46-480e2a29293a --image adt/ubuntu-noble-ppc64el-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-2 --net-id=net_prod-proposed-migration -e TERM=linux -e ''"'"'http_proxy=http://squid.internal:3128'"'"'' -e ''"'"'https_proxy=http://squid.internal:3128'"'"'' -e ''"'"'no_proxy=127.0.0.1,127.0.1.1,login.ubuntu.com,localhost,localdomain,novalocal,internal,archive.ubuntu.com,ports.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,launchpadlibrarian.net,launchpadcontent.net,launchpad.net,10.24.0.0/24,keystone.ps5.canonical.com,objectstorage.prodstack5.canonical.com'"'"'' --mirror=http://ftpmaster.internal/ubuntu/ 250s autopkgtest [18:24:32]: testbed dpkg architecture: ppc64el 250s autopkgtest [18:24:32]: testbed apt version: 2.7.14build2 250s autopkgtest [18:24:32]: @@@@@@@@@@@@@@@@@@@@ test bed setup 251s Get:1 http://ftpmaster.internal/ubuntu noble-proposed InRelease [117 kB] 252s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/restricted Sources [12.3 kB] 252s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main Sources [48.6 kB] 252s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/multiverse Sources [2340 B] 252s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/universe Sources [264 kB] 252s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el Packages [81.4 kB] 252s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el c-n-f Metadata [3116 B] 252s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/restricted ppc64el Packages [976 B] 252s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/restricted ppc64el c-n-f Metadata [116 B] 252s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el Packages [236 kB] 252s Get:11 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el c-n-f Metadata [8652 B] 252s Get:12 http://ftpmaster.internal/ubuntu noble-proposed/multiverse ppc64el Packages [1376 B] 252s Get:13 http://ftpmaster.internal/ubuntu noble-proposed/multiverse ppc64el c-n-f Metadata [116 B] 254s Fetched 776 kB in 1s (882 kB/s) 254s Reading package lists... 255s sh: 4: dhclient: not found 256s Reading package lists... 256s Building dependency tree... 256s Reading state information... 257s Calculating upgrade... 257s The following packages will be upgraded: 257s libnss-systemd libpam-systemd libsystemd-shared libsystemd0 libudev1 systemd 257s systemd-dev systemd-resolved systemd-sysv systemd-timesyncd udev 257s 11 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 257s Need to get 9899 kB of archives. 257s After this operation, 6144 B of additional disk space will be used. 257s Get:1 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el systemd-dev all 255.4-1ubuntu8 [104 kB] 257s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el systemd-timesyncd ppc64el 255.4-1ubuntu8 [37.9 kB] 257s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el systemd-resolved ppc64el 255.4-1ubuntu8 [347 kB] 257s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libsystemd-shared ppc64el 255.4-1ubuntu8 [2351 kB] 258s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libsystemd0 ppc64el 255.4-1ubuntu8 [526 kB] 258s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el systemd-sysv ppc64el 255.4-1ubuntu8 [11.9 kB] 258s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libnss-systemd ppc64el 255.4-1ubuntu8 [208 kB] 258s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libpam-systemd ppc64el 255.4-1ubuntu8 [304 kB] 258s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el systemd ppc64el 255.4-1ubuntu8 [3771 kB] 258s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el udev ppc64el 255.4-1ubuntu8 [2038 kB] 258s Get:11 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libudev1 ppc64el 255.4-1ubuntu8 [201 kB] 258s Fetched 9899 kB in 1s (6851 kB/s) 259s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 72009 files and directories currently installed.) 259s Preparing to unpack .../systemd-dev_255.4-1ubuntu8_all.deb ... 259s Unpacking systemd-dev (255.4-1ubuntu8) over (255.4-1ubuntu7) ... 259s Preparing to unpack .../systemd-timesyncd_255.4-1ubuntu8_ppc64el.deb ... 259s Unpacking systemd-timesyncd (255.4-1ubuntu8) over (255.4-1ubuntu7) ... 259s Preparing to unpack .../systemd-resolved_255.4-1ubuntu8_ppc64el.deb ... 259s Unpacking systemd-resolved (255.4-1ubuntu8) over (255.4-1ubuntu7) ... 259s Preparing to unpack .../libsystemd-shared_255.4-1ubuntu8_ppc64el.deb ... 259s Unpacking libsystemd-shared:ppc64el (255.4-1ubuntu8) over (255.4-1ubuntu7) ... 259s Preparing to unpack .../libsystemd0_255.4-1ubuntu8_ppc64el.deb ... 259s Unpacking libsystemd0:ppc64el (255.4-1ubuntu8) over (255.4-1ubuntu7) ... 259s Setting up libsystemd0:ppc64el (255.4-1ubuntu8) ... 259s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 72009 files and directories currently installed.) 259s Preparing to unpack .../0-systemd-sysv_255.4-1ubuntu8_ppc64el.deb ... 259s Unpacking systemd-sysv (255.4-1ubuntu8) over (255.4-1ubuntu7) ... 259s Preparing to unpack .../1-libnss-systemd_255.4-1ubuntu8_ppc64el.deb ... 259s Unpacking libnss-systemd:ppc64el (255.4-1ubuntu8) over (255.4-1ubuntu7) ... 259s Preparing to unpack .../2-libpam-systemd_255.4-1ubuntu8_ppc64el.deb ... 259s Unpacking libpam-systemd:ppc64el (255.4-1ubuntu8) over (255.4-1ubuntu7) ... 259s Preparing to unpack .../3-systemd_255.4-1ubuntu8_ppc64el.deb ... 259s Unpacking systemd (255.4-1ubuntu8) over (255.4-1ubuntu7) ... 259s Preparing to unpack .../4-udev_255.4-1ubuntu8_ppc64el.deb ... 259s Unpacking udev (255.4-1ubuntu8) over (255.4-1ubuntu7) ... 259s Preparing to unpack .../5-libudev1_255.4-1ubuntu8_ppc64el.deb ... 259s Unpacking libudev1:ppc64el (255.4-1ubuntu8) over (255.4-1ubuntu7) ... 259s Setting up libudev1:ppc64el (255.4-1ubuntu8) ... 259s Setting up systemd-dev (255.4-1ubuntu8) ... 259s Setting up libsystemd-shared:ppc64el (255.4-1ubuntu8) ... 259s Setting up systemd (255.4-1ubuntu8) ... 260s Setting up systemd-timesyncd (255.4-1ubuntu8) ... 261s Setting up udev (255.4-1ubuntu8) ... 262s Setting up systemd-resolved (255.4-1ubuntu8) ... 263s Setting up systemd-sysv (255.4-1ubuntu8) ... 263s Setting up libnss-systemd:ppc64el (255.4-1ubuntu8) ... 263s Setting up libpam-systemd:ppc64el (255.4-1ubuntu8) ... 263s Processing triggers for libc-bin (2.39-0ubuntu8) ... 263s Processing triggers for man-db (2.12.0-4build2) ... 264s Processing triggers for dbus (1.14.10-4ubuntu4) ... 264s Processing triggers for initramfs-tools (0.142ubuntu25) ... 264s update-initramfs: Generating /boot/initrd.img-6.8.0-22-generic 264s W: No lz4 in /usr/bin:/sbin:/bin, using gzip 271s Reading package lists... 271s Building dependency tree... 271s Reading state information... 271s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 272s Hit:1 http://ftpmaster.internal/ubuntu noble-proposed InRelease 272s Hit:2 http://ftpmaster.internal/ubuntu noble InRelease 272s Hit:3 http://ftpmaster.internal/ubuntu noble-updates InRelease 272s Hit:4 http://ftpmaster.internal/ubuntu noble-security InRelease 273s Reading package lists... 273s Reading package lists... 273s Building dependency tree... 273s Reading state information... 274s Calculating upgrade... 274s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 274s Reading package lists... 274s Building dependency tree... 274s Reading state information... 274s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 274s autopkgtest [18:24:56]: rebooting testbed after setup commands that affected boot 318s autopkgtest-virt-ssh: WARNING: ssh connection failed. Retrying in 3 seconds... 326s autopkgtest [18:25:48]: testbed running kernel: Linux 6.8.0-22-generic #22-Ubuntu SMP Thu Apr 4 22:47:57 UTC 2024 329s autopkgtest [18:25:51]: @@@@@@@@@@@@@@@@@@@@ apt-source libreswan 332s Get:1 http://ftpmaster.internal/ubuntu noble/universe libreswan 4.14-1ubuntu2 (dsc) [2781 B] 332s Get:2 http://ftpmaster.internal/ubuntu noble/universe libreswan 4.14-1ubuntu2 (tar) [3721 kB] 332s Get:3 http://ftpmaster.internal/ubuntu noble/universe libreswan 4.14-1ubuntu2 (asc) [862 B] 332s Get:4 http://ftpmaster.internal/ubuntu noble/universe libreswan 4.14-1ubuntu2 (diff) [17.5 kB] 332s gpgv: Signature made Sun Mar 31 19:34:12 2024 UTC 332s gpgv: using RSA key AC483F68DE728F43F2202FCA568D30F321B2133D 332s gpgv: issuer "steve.langasek@ubuntu.com" 332s gpgv: Can't check signature: No public key 332s dpkg-source: warning: cannot verify inline signature for ./libreswan_4.14-1ubuntu2.dsc: no acceptable signature found 334s autopkgtest [18:25:56]: testing package libreswan version 4.14-1ubuntu2 334s autopkgtest [18:25:56]: build not needed 406s autopkgtest [18:27:08]: test opportunistic: preparing testbed 407s Reading package lists... 407s Building dependency tree... 407s Reading state information... 408s Starting pkgProblemResolver with broken count: 0 408s Starting 2 pkgProblemResolver with broken count: 0 408s Done 408s The following additional packages will be installed: 408s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 408s libnss3-tools libreswan libunbound8 408s The following NEW packages will be installed: 408s autopkgtest-satdep dns-root-data libevent-2.1-7t64 408s libevent-pthreads-2.1-7t64 libldns3t64 libnss3-tools libreswan libunbound8 408s 0 upgraded, 8 newly installed, 0 to remove and 0 not upgraded. 408s Need to get 3070 kB/3071 kB of archives. 408s After this operation, 14.8 MB of additional disk space will be used. 408s Get:1 /tmp/autopkgtest.LIokv7/1-autopkgtest-satdep.deb autopkgtest-satdep ppc64el 0 [740 B] 408s Get:2 http://ftpmaster.internal/ubuntu noble/main ppc64el dns-root-data all 2023112702~willsync1 [4450 B] 408s Get:3 http://ftpmaster.internal/ubuntu noble/main ppc64el libnss3-tools ppc64el 2:3.98-1build1 [718 kB] 409s Get:4 http://ftpmaster.internal/ubuntu noble/main ppc64el libevent-pthreads-2.1-7t64 ppc64el 2.1.12-stable-9ubuntu2 [8102 B] 409s Get:5 http://ftpmaster.internal/ubuntu noble/universe ppc64el libldns3t64 ppc64el 1.8.3-2build1 [203 kB] 409s Get:6 http://ftpmaster.internal/ubuntu noble/main ppc64el libevent-2.1-7t64 ppc64el 2.1.12-stable-9ubuntu2 [174 kB] 409s Get:7 http://ftpmaster.internal/ubuntu noble/main ppc64el libunbound8 ppc64el 1.19.2-1ubuntu3 [537 kB] 409s Get:8 http://ftpmaster.internal/ubuntu noble/universe ppc64el libreswan ppc64el 4.14-1ubuntu2 [1426 kB] 410s Fetched 3070 kB in 2s (1612 kB/s) 410s Selecting previously unselected package dns-root-data. 411s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 72009 files and directories currently installed.) 411s Preparing to unpack .../0-dns-root-data_2023112702~willsync1_all.deb ... 411s Unpacking dns-root-data (2023112702~willsync1) ... 411s Selecting previously unselected package libnss3-tools. 411s Preparing to unpack .../1-libnss3-tools_2%3a3.98-1build1_ppc64el.deb ... 411s Unpacking libnss3-tools (2:3.98-1build1) ... 411s Selecting previously unselected package libevent-pthreads-2.1-7t64:ppc64el. 411s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-9ubuntu2_ppc64el.deb ... 411s Unpacking libevent-pthreads-2.1-7t64:ppc64el (2.1.12-stable-9ubuntu2) ... 411s Selecting previously unselected package libldns3t64:ppc64el. 411s Preparing to unpack .../3-libldns3t64_1.8.3-2build1_ppc64el.deb ... 411s Unpacking libldns3t64:ppc64el (1.8.3-2build1) ... 411s Selecting previously unselected package libevent-2.1-7t64:ppc64el. 411s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-9ubuntu2_ppc64el.deb ... 411s Unpacking libevent-2.1-7t64:ppc64el (2.1.12-stable-9ubuntu2) ... 411s Selecting previously unselected package libunbound8:ppc64el. 411s Preparing to unpack .../5-libunbound8_1.19.2-1ubuntu3_ppc64el.deb ... 411s Unpacking libunbound8:ppc64el (1.19.2-1ubuntu3) ... 411s Selecting previously unselected package libreswan. 411s Preparing to unpack .../6-libreswan_4.14-1ubuntu2_ppc64el.deb ... 411s Unpacking libreswan (4.14-1ubuntu2) ... 411s Selecting previously unselected package autopkgtest-satdep. 411s Preparing to unpack .../7-1-autopkgtest-satdep.deb ... 411s Unpacking autopkgtest-satdep (0) ... 411s Setting up libldns3t64:ppc64el (1.8.3-2build1) ... 411s Setting up libevent-pthreads-2.1-7t64:ppc64el (2.1.12-stable-9ubuntu2) ... 411s Setting up libevent-2.1-7t64:ppc64el (2.1.12-stable-9ubuntu2) ... 411s Setting up dns-root-data (2023112702~willsync1) ... 411s Setting up libunbound8:ppc64el (1.19.2-1ubuntu3) ... 411s Setting up libnss3-tools (2:3.98-1build1) ... 411s Setting up libreswan (4.14-1ubuntu2) ... 411s ipsec.service is a disabled or a static unit, not starting it. 411s Setting up autopkgtest-satdep (0) ... 411s Processing triggers for man-db (2.12.0-4build2) ... 413s Processing triggers for libc-bin (2.39-0ubuntu8) ... 415s (Reading database ... 72207 files and directories currently installed.) 415s Removing autopkgtest-satdep (0) ... 416s autopkgtest [18:27:18]: test opportunistic: [----------------------- 430s PING oe.libreswan.org (193.110.157.124) 56(84) bytes of data. 430s 430s --- oe.libreswan.org ping statistics --- 430s 5 packets transmitted, 0 received, 100% packet loss, time 4079ms 430s 431s autopkgtest [18:27:33]: test opportunistic: -----------------------] 431s opportunistic SKIP exit status 77 and marked as skippable 431s autopkgtest [18:27:33]: test opportunistic: - - - - - - - - - - results - - - - - - - - - - 432s autopkgtest [18:27:34]: test cryptocheck: preparing testbed 600s autopkgtest [18:30:22]: testbed dpkg architecture: ppc64el 600s autopkgtest [18:30:22]: testbed apt version: 2.7.14build2 600s autopkgtest [18:30:22]: @@@@@@@@@@@@@@@@@@@@ test bed setup 601s Get:1 http://ftpmaster.internal/ubuntu noble-proposed InRelease [117 kB] 601s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/multiverse Sources [2340 B] 601s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/restricted Sources [12.3 kB] 601s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/main Sources [48.6 kB] 601s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/universe Sources [264 kB] 601s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el Packages [81.4 kB] 602s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el c-n-f Metadata [3116 B] 602s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/restricted ppc64el Packages [976 B] 602s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/restricted ppc64el c-n-f Metadata [116 B] 602s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el Packages [236 kB] 602s Get:11 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el c-n-f Metadata [8652 B] 602s Get:12 http://ftpmaster.internal/ubuntu noble-proposed/multiverse ppc64el Packages [1376 B] 602s Get:13 http://ftpmaster.internal/ubuntu noble-proposed/multiverse ppc64el c-n-f Metadata [116 B] 604s Fetched 776 kB in 1s (886 kB/s) 604s Reading package lists... 605s sh: 4: dhclient: not found 606s Reading package lists... 607s Building dependency tree... 607s Reading state information... 607s Calculating upgrade... 607s The following packages will be upgraded: 607s libnss-systemd libpam-systemd libsystemd-shared libsystemd0 libudev1 systemd 607s systemd-dev systemd-resolved systemd-sysv systemd-timesyncd udev 607s 11 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 607s Need to get 9899 kB of archives. 607s After this operation, 6144 B of additional disk space will be used. 607s Get:1 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el systemd-dev all 255.4-1ubuntu8 [104 kB] 608s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el systemd-timesyncd ppc64el 255.4-1ubuntu8 [37.9 kB] 608s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el systemd-resolved ppc64el 255.4-1ubuntu8 [347 kB] 608s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libsystemd-shared ppc64el 255.4-1ubuntu8 [2351 kB] 608s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libsystemd0 ppc64el 255.4-1ubuntu8 [526 kB] 608s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el systemd-sysv ppc64el 255.4-1ubuntu8 [11.9 kB] 608s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libnss-systemd ppc64el 255.4-1ubuntu8 [208 kB] 608s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libpam-systemd ppc64el 255.4-1ubuntu8 [304 kB] 608s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el systemd ppc64el 255.4-1ubuntu8 [3771 kB] 608s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el udev ppc64el 255.4-1ubuntu8 [2038 kB] 608s Get:11 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libudev1 ppc64el 255.4-1ubuntu8 [201 kB] 609s Fetched 9899 kB in 1s (8672 kB/s) 609s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 72009 files and directories currently installed.) 609s Preparing to unpack .../systemd-dev_255.4-1ubuntu8_all.deb ... 609s Unpacking systemd-dev (255.4-1ubuntu8) over (255.4-1ubuntu7) ... 609s Preparing to unpack .../systemd-timesyncd_255.4-1ubuntu8_ppc64el.deb ... 609s Unpacking systemd-timesyncd (255.4-1ubuntu8) over (255.4-1ubuntu7) ... 609s Preparing to unpack .../systemd-resolved_255.4-1ubuntu8_ppc64el.deb ... 609s Unpacking systemd-resolved (255.4-1ubuntu8) over (255.4-1ubuntu7) ... 609s Preparing to unpack .../libsystemd-shared_255.4-1ubuntu8_ppc64el.deb ... 609s Unpacking libsystemd-shared:ppc64el (255.4-1ubuntu8) over (255.4-1ubuntu7) ... 609s Preparing to unpack .../libsystemd0_255.4-1ubuntu8_ppc64el.deb ... 609s Unpacking libsystemd0:ppc64el (255.4-1ubuntu8) over (255.4-1ubuntu7) ... 609s Setting up libsystemd0:ppc64el (255.4-1ubuntu8) ... 609s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 72009 files and directories currently installed.) 609s Preparing to unpack .../0-systemd-sysv_255.4-1ubuntu8_ppc64el.deb ... 609s Unpacking systemd-sysv (255.4-1ubuntu8) over (255.4-1ubuntu7) ... 609s Preparing to unpack .../1-libnss-systemd_255.4-1ubuntu8_ppc64el.deb ... 609s Unpacking libnss-systemd:ppc64el (255.4-1ubuntu8) over (255.4-1ubuntu7) ... 609s Preparing to unpack .../2-libpam-systemd_255.4-1ubuntu8_ppc64el.deb ... 609s Unpacking libpam-systemd:ppc64el (255.4-1ubuntu8) over (255.4-1ubuntu7) ... 609s Preparing to unpack .../3-systemd_255.4-1ubuntu8_ppc64el.deb ... 609s Unpacking systemd (255.4-1ubuntu8) over (255.4-1ubuntu7) ... 610s Preparing to unpack .../4-udev_255.4-1ubuntu8_ppc64el.deb ... 610s Unpacking udev (255.4-1ubuntu8) over (255.4-1ubuntu7) ... 610s Preparing to unpack .../5-libudev1_255.4-1ubuntu8_ppc64el.deb ... 610s Unpacking libudev1:ppc64el (255.4-1ubuntu8) over (255.4-1ubuntu7) ... 610s Setting up libudev1:ppc64el (255.4-1ubuntu8) ... 610s Setting up systemd-dev (255.4-1ubuntu8) ... 610s Setting up libsystemd-shared:ppc64el (255.4-1ubuntu8) ... 610s Setting up systemd (255.4-1ubuntu8) ... 611s Setting up systemd-timesyncd (255.4-1ubuntu8) ... 611s Setting up udev (255.4-1ubuntu8) ... 613s Setting up systemd-resolved (255.4-1ubuntu8) ... 613s Setting up systemd-sysv (255.4-1ubuntu8) ... 613s Setting up libnss-systemd:ppc64el (255.4-1ubuntu8) ... 613s Setting up libpam-systemd:ppc64el (255.4-1ubuntu8) ... 613s Processing triggers for libc-bin (2.39-0ubuntu8) ... 614s Processing triggers for man-db (2.12.0-4build2) ... 615s Processing triggers for dbus (1.14.10-4ubuntu4) ... 615s Processing triggers for initramfs-tools (0.142ubuntu25) ... 615s update-initramfs: Generating /boot/initrd.img-6.8.0-22-generic 615s W: No lz4 in /usr/bin:/sbin:/bin, using gzip 623s Reading package lists... 624s Building dependency tree... 624s Reading state information... 624s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 625s Hit:1 http://ftpmaster.internal/ubuntu noble-proposed InRelease 625s Hit:2 http://ftpmaster.internal/ubuntu noble InRelease 625s Hit:3 http://ftpmaster.internal/ubuntu noble-updates InRelease 625s Hit:4 http://ftpmaster.internal/ubuntu noble-security InRelease 626s Reading package lists... 626s Reading package lists... 627s Building dependency tree... 627s Reading state information... 627s Calculating upgrade... 627s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 627s Reading package lists... 628s Building dependency tree... 628s Reading state information... 628s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 628s autopkgtest [18:30:50]: rebooting testbed after setup commands that affected boot 803s autopkgtest-virt-ssh: WARNING: ssh connection failed. Retrying in 3 seconds... 821s Reading package lists... 822s Building dependency tree... 822s Reading state information... 822s Starting pkgProblemResolver with broken count: 0 822s Starting 2 pkgProblemResolver with broken count: 0 822s Done 822s The following additional packages will be installed: 822s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 822s libnss3-tools libreswan libunbound8 822s The following NEW packages will be installed: 822s autopkgtest-satdep dns-root-data libevent-2.1-7t64 822s libevent-pthreads-2.1-7t64 libldns3t64 libnss3-tools libreswan libunbound8 822s 0 upgraded, 8 newly installed, 0 to remove and 0 not upgraded. 822s Need to get 3070 kB/3071 kB of archives. 822s After this operation, 14.8 MB of additional disk space will be used. 822s Get:1 /tmp/autopkgtest.LIokv7/2-autopkgtest-satdep.deb autopkgtest-satdep ppc64el 0 [716 B] 822s Get:2 http://ftpmaster.internal/ubuntu noble/main ppc64el dns-root-data all 2023112702~willsync1 [4450 B] 822s Get:3 http://ftpmaster.internal/ubuntu noble/main ppc64el libnss3-tools ppc64el 2:3.98-1build1 [718 kB] 823s Get:4 http://ftpmaster.internal/ubuntu noble/main ppc64el libevent-pthreads-2.1-7t64 ppc64el 2.1.12-stable-9ubuntu2 [8102 B] 823s Get:5 http://ftpmaster.internal/ubuntu noble/universe ppc64el libldns3t64 ppc64el 1.8.3-2build1 [203 kB] 824s Get:6 http://ftpmaster.internal/ubuntu noble/main ppc64el libevent-2.1-7t64 ppc64el 2.1.12-stable-9ubuntu2 [174 kB] 824s Get:7 http://ftpmaster.internal/ubuntu noble/main ppc64el libunbound8 ppc64el 1.19.2-1ubuntu3 [537 kB] 824s Get:8 http://ftpmaster.internal/ubuntu noble/universe ppc64el libreswan ppc64el 4.14-1ubuntu2 [1426 kB] 825s Fetched 3070 kB in 2s (1295 kB/s) 825s Selecting previously unselected package dns-root-data. 825s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 72009 files and directories currently installed.) 825s Preparing to unpack .../0-dns-root-data_2023112702~willsync1_all.deb ... 825s Unpacking dns-root-data (2023112702~willsync1) ... 825s Selecting previously unselected package libnss3-tools. 825s Preparing to unpack .../1-libnss3-tools_2%3a3.98-1build1_ppc64el.deb ... 825s Unpacking libnss3-tools (2:3.98-1build1) ... 825s Selecting previously unselected package libevent-pthreads-2.1-7t64:ppc64el. 825s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-9ubuntu2_ppc64el.deb ... 825s Unpacking libevent-pthreads-2.1-7t64:ppc64el (2.1.12-stable-9ubuntu2) ... 825s Selecting previously unselected package libldns3t64:ppc64el. 825s Preparing to unpack .../3-libldns3t64_1.8.3-2build1_ppc64el.deb ... 825s Unpacking libldns3t64:ppc64el (1.8.3-2build1) ... 825s Selecting previously unselected package libevent-2.1-7t64:ppc64el. 825s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-9ubuntu2_ppc64el.deb ... 825s Unpacking libevent-2.1-7t64:ppc64el (2.1.12-stable-9ubuntu2) ... 825s Selecting previously unselected package libunbound8:ppc64el. 825s Preparing to unpack .../5-libunbound8_1.19.2-1ubuntu3_ppc64el.deb ... 825s Unpacking libunbound8:ppc64el (1.19.2-1ubuntu3) ... 825s Selecting previously unselected package libreswan. 825s Preparing to unpack .../6-libreswan_4.14-1ubuntu2_ppc64el.deb ... 825s Unpacking libreswan (4.14-1ubuntu2) ... 825s Selecting previously unselected package autopkgtest-satdep. 825s Preparing to unpack .../7-2-autopkgtest-satdep.deb ... 825s Unpacking autopkgtest-satdep (0) ... 825s Setting up libldns3t64:ppc64el (1.8.3-2build1) ... 825s Setting up libevent-pthreads-2.1-7t64:ppc64el (2.1.12-stable-9ubuntu2) ... 825s Setting up libevent-2.1-7t64:ppc64el (2.1.12-stable-9ubuntu2) ... 825s Setting up dns-root-data (2023112702~willsync1) ... 825s Setting up libunbound8:ppc64el (1.19.2-1ubuntu3) ... 825s Setting up libnss3-tools (2:3.98-1build1) ... 825s Setting up libreswan (4.14-1ubuntu2) ... 826s ipsec.service is a disabled or a static unit, not starting it. 826s Setting up autopkgtest-satdep (0) ... 826s Processing triggers for man-db (2.12.0-4build2) ... 827s Processing triggers for libc-bin (2.39-0ubuntu8) ... 829s (Reading database ... 72207 files and directories currently installed.) 829s Removing autopkgtest-satdep (0) ... 855s autopkgtest [18:34:37]: test cryptocheck: [----------------------- 856s Testing installed binary: /usr/libexec/ipsec/algparse 856s Testing installed binary: /usr/libexec/ipsec/pluto 856s testing -tp 856s algparse: Encryption algorithms: 856s algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 856s algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 856s algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 856s algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 856s algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 856s algparse -v2 'esp' 856s AES_GCM_16_256-NONE 856s AES_GCM_16_128-NONE 856s AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 856s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 856s algparse -v2 'esp=' 856s ERROR: ESP proposal is empty 856s algparse -v2 'esp=aes' 856s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 856s algparse -v2 'esp=aes;modp2048' 856s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 856s algparse -v2 'esp=aes-sha1' 856s AES_CBC-HMAC_SHA1_96 856s algparse -v2 'esp=aes-sha1' 856s AES_CBC-HMAC_SHA1_96 856s algparse -v2 'esp=aes-sha1-modp2048' 856s AES_CBC-HMAC_SHA1_96 856s algparse -v2 'esp=aes-128-sha1' 856s AES_CBC_128-HMAC_SHA1_96 856s algparse -v2 'esp=aes-128-sha1' 856s AES_CBC_128-HMAC_SHA1_96 856s algparse -v2 'esp=aes-128-sha1-modp2048' 856s AES_CBC_128-HMAC_SHA1_96 856s algparse -v2 'esp=aes-128' 856s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 856s algparse -v2 'esp=aes_gcm_a-128-null' 856s AES_GCM_8_128-NONE 856s algparse -v2 'esp=3des-sha1;modp1024' 856s ERROR: ESP DH algorithm 'modp1024' is not supported 856s algparse -v2 'esp=3des-sha1;modp1536' 856s 3DES_CBC-HMAC_SHA1_96 856s algparse -v2 'esp=3des-sha1;modp2048' 856s 3DES_CBC-HMAC_SHA1_96 856s algparse -v2 'esp=3des-sha1;dh21' 856s 3DES_CBC-HMAC_SHA1_96 856s algparse -v2 'esp=3des-sha1;ecp_521' 856s 3DES_CBC-HMAC_SHA1_96 856s algparse -v2 'esp=3des-sha1;dh23' 856s ERROR: ESP DH algorithm 'dh23' is not supported 856s algparse -v2 'esp=3des-sha1;dh24' 856s ERROR: ESP DH algorithm 'dh24' is not supported 856s algparse -v2 'esp=3des-sha1' 856s 3DES_CBC-HMAC_SHA1_96 856s algparse -v2 'esp=null-sha1' 856s NULL-HMAC_SHA1_96 856s algparse -v2 'esp=aes_cbc' 856s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 856s algparse -v2 'esp=aes-sha' 856s AES_CBC-HMAC_SHA1_96 856s algparse -v2 'esp=aes-sha1' 856s AES_CBC-HMAC_SHA1_96 856s algparse -v2 'esp=aes128-sha1' 856s AES_CBC_128-HMAC_SHA1_96 856s algparse -v2 'esp=aes-sha2' 856s AES_CBC-HMAC_SHA2_256_128 856s algparse -v2 'esp=aes-sha256' 856s AES_CBC-HMAC_SHA2_256_128 856s algparse -v2 'esp=aes-sha384' 856s AES_CBC-HMAC_SHA2_384_192 856s algparse -v2 'esp=aes-sha512' 856s AES_CBC-HMAC_SHA2_512_256 856s algparse -v2 'esp=aes128-aes_xcbc' 856s AES_CBC_128-AES_XCBC_96 856s algparse -v2 'esp=aes192-sha1' 856s AES_CBC_192-HMAC_SHA1_96 856s algparse -v2 'esp=aes256-sha1' 856s AES_CBC_256-HMAC_SHA1_96 856s algparse -v2 'esp=aes256-sha' 856s AES_CBC_256-HMAC_SHA1_96 856s algparse -v2 'esp=aes256-sha2' 856s AES_CBC_256-HMAC_SHA2_256_128 856s algparse -v2 'esp=aes256-sha2_256' 856s AES_CBC_256-HMAC_SHA2_256_128 856s algparse -v2 'esp=aes256-sha2_384' 856s AES_CBC_256-HMAC_SHA2_384_192 856s algparse -v2 'esp=aes256-sha2_512' 856s AES_CBC_256-HMAC_SHA2_512_256 856s algparse -v2 'esp=camellia' 856s CAMELLIA_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 856s algparse -v2 'esp=camellia128' 856s CAMELLIA_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 856s algparse -v2 'esp=camellia192' 856s CAMELLIA_CBC_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 856s algparse -v2 'esp=camellia256' 856s CAMELLIA_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 856s algparse -v2 'esp=aes_ccm' 856s AES_CCM_16-NONE 856s algparse -v2 'esp=aes_ccm_a-128-null' 856s AES_CCM_8_128-NONE 856s algparse -v2 'esp=aes_ccm_a-192-null' 856s AES_CCM_8_192-NONE 856s algparse -v2 'esp=aes_ccm_a-256-null' 856s AES_CCM_8_256-NONE 856s algparse -v2 'esp=aes_ccm_b-128-null' 856s AES_CCM_12_128-NONE 856s algparse -v2 'esp=aes_ccm_b-192-null' 856s AES_CCM_12_192-NONE 856s algparse -v2 'esp=aes_ccm_b-256-null' 856s AES_CCM_12_256-NONE 856s algparse -v2 'esp=aes_ccm_c-128-null' 856s AES_CCM_16_128-NONE 856s algparse -v2 'esp=aes_ccm_c-192-null' 856s AES_CCM_16_192-NONE 856s algparse -v2 'esp=aes_ccm_c-256-null' 856s AES_CCM_16_256-NONE 856s algparse -v2 'esp=aes_gcm' 856s AES_GCM_16-NONE 856s algparse -v2 'esp=aes_gcm_a-128-null' 856s AES_GCM_8_128-NONE 856s algparse -v2 'esp=aes_gcm_a-192-null' 856s AES_GCM_8_192-NONE 856s algparse -v2 'esp=aes_gcm_a-256-null' 856s AES_GCM_8_256-NONE 856s algparse -v2 'esp=aes_gcm_b-128-null' 856s AES_GCM_12_128-NONE 856s algparse -v2 'esp=aes_gcm_b-192-null' 856s AES_GCM_12_192-NONE 856s algparse -v2 'esp=aes_gcm_b-256-null' 856s AES_GCM_12_256-NONE 856s algparse -v2 'esp=aes_gcm_c-128-null' 856s AES_GCM_16_128-NONE 856s algparse -v2 'esp=aes_gcm_c-192-null' 856s AES_GCM_16_192-NONE 856s algparse -v2 'esp=aes_gcm_c-256-null' 856s AES_GCM_16_256-NONE 856s algparse -v2 'esp=aes_ccm_a-null' 856s AES_CCM_8-NONE 856s algparse -v2 'esp=aes_ccm_b-null' 856s AES_CCM_12-NONE 856s algparse -v2 'esp=aes_ccm_c-null' 856s AES_CCM_16-NONE 856s algparse -v2 'esp=aes_gcm_a-null' 856s AES_GCM_8-NONE 856s algparse -v2 'esp=aes_gcm_b-null' 856s AES_GCM_12-NONE 856s algparse -v2 'esp=aes_gcm_c-null' 856s AES_GCM_16-NONE 856s algparse -v2 'esp=aes_ccm-null' 856s AES_CCM_16-NONE 856s algparse -v2 'esp=aes_gcm-null' 856s AES_GCM_16-NONE 856s algparse -v2 'esp=aes_ccm-256-null' 856s AES_CCM_16_256-NONE 856s algparse -v2 'esp=aes_gcm-192-null' 856s AES_GCM_16_192-NONE 856s algparse -v2 'esp=aes_ccm_256-null' 856s AES_CCM_16_256-NONE 856s algparse -v2 'esp=aes_gcm_192-null' 856s AES_GCM_16_192-NONE 856s algparse -v2 'esp=aes_ccm_8-null' 856s AES_CCM_8-NONE 856s algparse -v2 'esp=aes_ccm_12-null' 856s AES_CCM_12-NONE 856s algparse -v2 'esp=aes_ccm_16-null' 856s AES_CCM_16-NONE 856s algparse -v2 'esp=aes_gcm_8-null' 856s AES_GCM_8-NONE 856s algparse -v2 'esp=aes_gcm_12-null' 856s AES_GCM_12-NONE 856s algparse -v2 'esp=aes_gcm_16-null' 856s AES_GCM_16-NONE 856s algparse -v2 'esp=aes_ccm_8-128-null' 856s AES_CCM_8_128-NONE 856s algparse -v2 'esp=aes_ccm_12-192-null' 856s AES_CCM_12_192-NONE 856s algparse -v2 'esp=aes_ccm_16-256-null' 856s AES_CCM_16_256-NONE 856s algparse -v2 'esp=aes_gcm_8-128-null' 856s AES_GCM_8_128-NONE 856s algparse -v2 'esp=aes_gcm_12-192-null' 856s AES_GCM_12_192-NONE 856s algparse -v2 'esp=aes_gcm_16-256-null' 856s AES_GCM_16_256-NONE 856s algparse -v2 'esp=aes_ccm_8_128-null' 856s AES_CCM_8_128-NONE 856s algparse -v2 'esp=aes_ccm_12_192-null' 856s AES_CCM_12_192-NONE 856s algparse -v2 'esp=aes_ccm_16_256-null' 856s AES_CCM_16_256-NONE 856s algparse -v2 'esp=aes_gcm_8_128-null' 856s AES_GCM_8_128-NONE 856s algparse -v2 'esp=aes_gcm_12_192-null' 856s AES_GCM_12_192-NONE 856s algparse -v2 'esp=aes_gcm_16_256-null' 856s AES_GCM_16_256-NONE 856s algparse -v2 'esp=aes_ctr' 856s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 856s algparse -v2 'esp=aesctr' 856s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 856s algparse -v2 'esp=aes_ctr128' 856s AES_CTR_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 856s algparse -v2 'esp=aes_ctr192' 856s AES_CTR_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 856s algparse -v2 'esp=aes_ctr256' 856s AES_CTR_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 856s algparse -v2 'esp=camellia_cbc_256-hmac_sha2_512_256;modp8192' 856s CAMELLIA_CBC_256-HMAC_SHA2_512_256 856s algparse -v2 'esp=null_auth_aes_gmac_256-null;modp8192' 856s NULL_AUTH_AES_GMAC_256-NONE 856s algparse -v2 'esp=3des-sha1;modp8192' 856s 3DES_CBC-HMAC_SHA1_96 856s algparse -v2 'esp=3des-sha1-modp8192' 856s 3DES_CBC-HMAC_SHA1_96 856s algparse -v2 'esp=aes-sha1,3des-sha1;modp8192' 856s AES_CBC-HMAC_SHA1_96 856s 3DES_CBC-HMAC_SHA1_96 856s algparse -v2 'esp=aes-sha1-modp8192,3des-sha1-modp8192' 856s AES_CBC-HMAC_SHA1_96 856s 3DES_CBC-HMAC_SHA1_96 856s algparse -v2 'esp=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' 856s algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 856s algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm, aes_gcm_c 856s algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_b 856s algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_a 856s algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 856s algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 856s algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 856s algparse: NULL [] IKEv1: ESP IKEv2: ESP 856s algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 856s algparse: Hash algorithms: 856s algparse: MD5 IKEv1: IKE IKEv2: NSS 856s algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 856s algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 856s algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 856s algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 856s algparse: IDENTITY IKEv1: IKEv2: FIPS 856s algparse: PRF algorithms: 856s algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE native(HMAC) md5 856s algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 856s algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 856s algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 856s algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 856s algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 856s algparse: Integrity algorithms: 856s algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH native(HMAC) md5, hmac_md5 856s algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 856s algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 856s algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 856s algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 856s algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 856s algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 856s algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 856s algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 856s algparse: DH algorithms: 856s algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 856s algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 856s algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 856s algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 856s algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 856s algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 856s algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 856s algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 856s algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 856s algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 856s algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 856s algparse: IPCOMP algorithms: 856s algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 856s algparse: LZS IKEv1: IKEv2: ESP AH FIPS 856s algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 856s | parsing 'AES_GCM_16_256,AES_GCM_16_128,AES_CBC_256,AES_CBC_128' for ESP 856s | proposal: 'AES_GCM_16_256' 856s | token: '' '' "AES_GCM_16_256" '' 856s | token: '' "AES_GCM_16_256" '' '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_256' is not recognized 856s | token: '' '' '' 856s | appending ESP encryption algorithm AES_GCM_16[_256] 856s | appending ESP integrity algorithm NONE[_0] 856s | proposal: 'AES_GCM_16_128' 856s | token: '' '' "AES_GCM_16_128" '' 856s | token: '' "AES_GCM_16_128" '' '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_128' is not recognized 856s | token: '' '' '' 856s | appending ESP encryption algorithm AES_GCM_16[_128] 856s | appending ESP integrity algorithm NONE[_0] 856s | proposal: 'AES_CBC_256' 856s | token: '' '' "AES_CBC_256" '' 856s | token: '' "AES_CBC_256" '' '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_256' is not recognized 856s | token: '' '' '' 856s | appending ESP encryption algorithm AES_CBC[_256] 856s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 856s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 856s | proposal: 'AES_CBC_128' 856s | token: '' '' "AES_CBC_128" '' 856s | token: '' "AES_CBC_128" '' '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_128' is not recognized 856s | token: '' '' '' 856s | appending ESP encryption algorithm AES_CBC[_128] 856s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 856s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 856s | parsing '' for ESP 856s | parsing 'aes' for ESP 856s | proposal: 'aes' 856s | token: '' '' "aes" '' 856s | token: '' "aes" '' '' 856s | token: '' '' '' 856s | appending ESP encryption algorithm AES_CBC[_0] 856s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 856s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 856s | parsing 'aes;modp2048' for ESP 856s | proposal: 'aes;modp2048' 856s | token: '' '' "aes" ';' 856s | token: '' "aes" ';' "modp2048" '' 856s | token: ';' "modp2048" '' '' 856s | appending ESP encryption algorithm AES_CBC[_0] 856s | parsing dh: 856s | appending ESP DH algorithm MODP2048[_0] 856s | token: '' '' '' 856s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 856s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 856s algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 856s | parsing 'aes-sha1' for ESP 856s | proposal: 'aes-sha1' 856s | token: '' '' "aes" '-' 856s | token: '' "aes" '-' "sha1" '' 856s | token: '-' "sha1" '' '' 856s | appending ESP encryption algorithm AES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: '' '' '' 856s | parsing 'aes-sha1' for ESP 856s | proposal: 'aes-sha1' 856s | token: '' '' "aes" '-' 856s | token: '' "aes" '-' "sha1" '' 856s | token: '-' "sha1" '' '' 856s | appending ESP encryption algorithm AES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: '' '' '' 856s | parsing 'aes-sha1-modp2048' for ESP 856s | proposal: 'aes-sha1-modp2048' 856s | token: '' '' "aes" '-' 856s | token: '' "aes" '-' "sha1" '-' 856s | token: '-' "sha1" '-' "modp2048" '' 856s | appending ESP encryption algorithm AES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: '-' "modp2048" '' '' 856s | parsing dh: 856s | appending ESP DH algorithm MODP2048[_0] 856s | token: '' '' '' 856s algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 856s | parsing 'aes-128-sha1' for ESP 856s | proposal: 'aes-128-sha1' 856s | token: '' '' "aes" '-' 856s | token: '' "aes" '-' "128" '-' 856s | token: '-' "128" '-' "sha1" '' 856s | token: '-' "sha1" '' '' 856s | appending ESP encryption algorithm AES_CBC[_128] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: '' '' '' 856s | parsing 'aes-128-sha1' for ESP 856s | proposal: 'aes-128-sha1' 856s | token: '' '' "aes" '-' 856s | token: '' "aes" '-' "128" '-' 856s | token: '-' "128" '-' "sha1" '' 856s | token: '-' "sha1" '' '' 856s | appending ESP encryption algorithm AES_CBC[_128] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: '' '' '' 856s | parsing 'aes-128-sha1-modp2048' for ESP 856s | proposal: 'aes-128-sha1-modp2048' 856s | token: '' '' "aes" '-' 856s | token: '' "aes" '-' "128" '-' 856s | token: '-' "128" '-' "sha1" '-' 856s | token: '-' "sha1" '-' "modp2048" '' 856s | appending ESP encryption algorithm AES_CBC[_128] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: '-' "modp2048" '' '' 856s | parsing dh: 856s | appending ESP DH algorithm MODP2048[_0] 856s | token: '' '' '' 856s algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 856s | parsing 'aes-128' for ESP 856s | proposal: 'aes-128' 856s | token: '' '' "aes" '-' 856s | token: '' "aes" '-' "128" '' 856s | token: '-' "128" '' '' 856s | token: '' '' '' 856s | appending ESP encryption algorithm AES_CBC[_128] 856s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 856s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 856s | parsing 'aes_gcm_a-128-null' for ESP 856s | proposal: 'aes_gcm_a-128-null' 856s | token: '' '' "aes_gcm_a" '-' 856s | token: '' "aes_gcm_a" '-' "128" '-' 856s | token: '-' "128" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_GCM_8[_128] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing '3des-sha1;modp1024' for ESP 856s | proposal: '3des-sha1;modp1024' 856s | token: '' '' "3des" '-' 856s | token: '' "3des" '-' "sha1" ';' 856s | token: '-' "sha1" ';' "modp1024" '' 856s | appending ESP encryption algorithm 3DES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: ';' "modp1024" '' '' 856s | parsing dh: 856s | ike_alg_byname() failed: ESP DH algorithm 'modp1024' is not supported 856s | lookup for DH algorithm 'modp1024' failed 856s | ... failed 'ESP DH algorithm 'modp1024' is not supported' 856s | parsing '3des-sha1;modp1536' for ESP 856s | proposal: '3des-sha1;modp1536' 856s | token: '' '' "3des" '-' 856s | token: '' "3des" '-' "sha1" ';' 856s | token: '-' "sha1" ';' "modp1536" '' 856s | appending ESP encryption algorithm 3DES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: ';' "modp1536" '' '' 856s | parsing dh: 856s | appending ESP DH algorithm MODP1536[_0] 856s | token: '' '' '' 856s algparse: ignoring ESP DH algorithm MODP1536 as PFS policy is disabled 856s | parsing '3des-sha1;modp2048' for ESP 856s | proposal: '3des-sha1;modp2048' 856s | token: '' '' "3des" '-' 856s | token: '' "3des" '-' "sha1" ';' 856s | token: '-' "sha1" ';' "modp2048" '' 856s | appending ESP encryption algorithm 3DES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: ';' "modp2048" '' '' 856s | parsing dh: 856s | appending ESP DH algorithm MODP2048[_0] 856s | token: '' '' '' 856s algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 856s | parsing '3des-sha1;dh21' for ESP 856s | proposal: '3des-sha1;dh21' 856s | token: '' '' "3des" '-' 856s | token: '' "3des" '-' "sha1" ';' 856s | token: '-' "sha1" ';' "dh21" '' 856s | appending ESP encryption algorithm 3DES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: ';' "dh21" '' '' 856s | parsing dh: 856s | appending ESP DH algorithm DH21[_0] 856s | token: '' '' '' 856s algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 856s | parsing '3des-sha1;ecp_521' for ESP 856s | proposal: '3des-sha1;ecp_521' 856s | token: '' '' "3des" '-' 856s | token: '' "3des" '-' "sha1" ';' 856s | token: '-' "sha1" ';' "ecp_521" '' 856s | appending ESP encryption algorithm 3DES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: ';' "ecp_521" '' '' 856s | parsing dh: 856s | appending ESP DH algorithm DH21[_0] 856s | token: '' '' '' 856s algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 856s | parsing '3des-sha1;dh23' for ESP 856s | proposal: '3des-sha1;dh23' 856s | token: '' '' "3des" '-' 856s | token: '' "3des" '-' "sha1" ';' 856s | token: '-' "sha1" ';' "dh23" '' 856s | appending ESP encryption algorithm 3DES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: ';' "dh23" '' '' 856s | parsing dh: 856s | ike_alg_byname() failed: ESP DH algorithm 'dh23' is not supported 856s | lookup for DH algorithm 'dh23' failed 856s | ... failed 'ESP DH algorithm 'dh23' is not supported' 856s | parsing '3des-sha1;dh24' for ESP 856s | proposal: '3des-sha1;dh24' 856s | token: '' '' "3des" '-' 856s | token: '' "3des" '-' "sha1" ';' 856s | token: '-' "sha1" ';' "dh24" '' 856s | appending ESP encryption algorithm 3DES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: ';' "dh24" '' '' 856s | parsing dh: 856s | ike_alg_byname() failed: ESP DH algorithm 'dh24' is not supported 856s | lookup for DH algorithm 'dh24' failed 856s | ... failed 'ESP DH algorithm 'dh24' is not supported' 856s | parsing '3des-sha1' for ESP 856s | proposal: '3des-sha1' 856s | token: '' '' "3des" '-' 856s | token: '' "3des" '-' "sha1" '' 856s | token: '-' "sha1" '' '' 856s | appending ESP encryption algorithm 3DES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: '' '' '' 856s | parsing 'null-sha1' for ESP 856s | proposal: 'null-sha1' 856s | token: '' '' "null" '-' 856s | token: '' "null" '-' "sha1" '' 856s | token: '-' "sha1" '' '' 856s | appending ESP encryption algorithm NULL[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: '' '' '' 856s | parsing 'aes_cbc' for ESP 856s | proposal: 'aes_cbc' 856s | token: '' '' "aes_cbc" '' 856s | token: '' "aes_cbc" '' '' 856s | token: '' '' '' 856s | appending ESP encryption algorithm AES_CBC[_0] 856s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 856s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 856s | parsing 'aes-sha' for ESP 856s | proposal: 'aes-sha' 856s | token: '' '' "aes" '-' 856s | token: '' "aes" '-' "sha" '' 856s | token: '-' "sha" '' '' 856s | appending ESP encryption algorithm AES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: '' '' '' 856s | parsing 'aes-sha1' for ESP 856s | proposal: 'aes-sha1' 856s | token: '' '' "aes" '-' 856s | token: '' "aes" '-' "sha1" '' 856s | token: '-' "sha1" '' '' 856s | appending ESP encryption algorithm AES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: '' '' '' 856s | parsing 'aes128-sha1' for ESP 856s | proposal: 'aes128-sha1' 856s | token: '' '' "aes128" '-' 856s | token: '' "aes128" '-' "sha1" '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 856s | token: '-' "sha1" '' '' 856s | appending ESP encryption algorithm AES_CBC[_128] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: '' '' '' 856s | parsing 'aes-sha2' for ESP 856s | proposal: 'aes-sha2' 856s | token: '' '' "aes" '-' 856s | token: '' "aes" '-' "sha2" '' 856s | token: '-' "sha2" '' '' 856s | appending ESP encryption algorithm AES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 856s | token: '' '' '' 856s | parsing 'aes-sha256' for ESP 856s | proposal: 'aes-sha256' 856s | token: '' '' "aes" '-' 856s | token: '' "aes" '-' "sha256" '' 856s | token: '-' "sha256" '' '' 856s | appending ESP encryption algorithm AES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 856s | token: '' '' '' 856s | parsing 'aes-sha384' for ESP 856s | proposal: 'aes-sha384' 856s | token: '' '' "aes" '-' 856s | token: '' "aes" '-' "sha384" '' 856s | token: '-' "sha384" '' '' 856s | appending ESP encryption algorithm AES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 856s | token: '' '' '' 856s | parsing 'aes-sha512' for ESP 856s | proposal: 'aes-sha512' 856s | token: '' '' "aes" '-' 856s | token: '' "aes" '-' "sha512" '' 856s | token: '-' "sha512" '' '' 856s | appending ESP encryption algorithm AES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 856s | token: '' '' '' 856s | parsing 'aes128-aes_xcbc' for ESP 856s | proposal: 'aes128-aes_xcbc' 856s | token: '' '' "aes128" '-' 856s | token: '' "aes128" '-' "aes_xcbc" '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 856s | token: '-' "aes_xcbc" '' '' 856s | appending ESP encryption algorithm AES_CBC[_128] 856s | parsing integ: 856s | appending ESP integrity algorithm AES_XCBC_96[_0] 856s | token: '' '' '' 856s | parsing 'aes192-sha1' for ESP 856s | proposal: 'aes192-sha1' 856s | token: '' '' "aes192" '-' 856s | token: '' "aes192" '-' "sha1" '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'aes192' is not recognized 856s | token: '-' "sha1" '' '' 856s | appending ESP encryption algorithm AES_CBC[_192] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: '' '' '' 856s | parsing 'aes256-sha1' for ESP 856s | proposal: 'aes256-sha1' 856s | token: '' '' "aes256" '-' 856s | token: '' "aes256" '-' "sha1" '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 856s | token: '-' "sha1" '' '' 856s | appending ESP encryption algorithm AES_CBC[_256] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: '' '' '' 856s | parsing 'aes256-sha' for ESP 856s | proposal: 'aes256-sha' 856s | token: '' '' "aes256" '-' 856s | token: '' "aes256" '-' "sha" '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 856s | token: '-' "sha" '' '' 856s | appending ESP encryption algorithm AES_CBC[_256] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: '' '' '' 856s | parsing 'aes256-sha2' for ESP 856s | proposal: 'aes256-sha2' 856s | token: '' '' "aes256" '-' 856s | token: '' "aes256" '-' "sha2" '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 856s | token: '-' "sha2" '' '' 856s | appending ESP encryption algorithm AES_CBC[_256] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 856s | token: '' '' '' 856s | parsing 'aes256-sha2_256' for ESP 856s | proposal: 'aes256-sha2_256' 856s | token: '' '' "aes256" '-' 856s | token: '' "aes256" '-' "sha2_256" '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 856s | token: '-' "sha2_256" '' '' 856s | appending ESP encryption algorithm AES_CBC[_256] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 856s | token: '' '' '' 856s | parsing 'aes256-sha2_384' for ESP 856s | proposal: 'aes256-sha2_384' 856s | token: '' '' "aes256" '-' 856s | token: '' "aes256" '-' "sha2_384" '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 856s | token: '-' "sha2_384" '' '' 856s | appending ESP encryption algorithm AES_CBC[_256] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 856s | token: '' '' '' 856s | parsing 'aes256-sha2_512' for ESP 856s | proposal: 'aes256-sha2_512' 856s | token: '' '' "aes256" '-' 856s | token: '' "aes256" '-' "sha2_512" '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 856s | token: '-' "sha2_512" '' '' 856s | appending ESP encryption algorithm AES_CBC[_256] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 856s | token: '' '' '' 856s | parsing 'camellia' for ESP 856s | proposal: 'camellia' 856s | token: '' '' "camellia" '' 856s | token: '' "camellia" '' '' 856s | token: '' '' '' 856s | appending ESP encryption algorithm CAMELLIA_CBC[_0] 856s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 856s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 856s | parsing 'camellia128' for ESP 856s | proposal: 'camellia128' 856s | token: '' '' "camellia128" '' 856s | token: '' "camellia128" '' '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'camellia128' is not recognized 856s | token: '' '' '' 856s | appending ESP encryption algorithm CAMELLIA_CBC[_128] 856s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 856s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 856s | parsing 'camellia192' for ESP 856s | proposal: 'camellia192' 856s | token: '' '' "camellia192" '' 856s | token: '' "camellia192" '' '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'camellia192' is not recognized 856s | token: '' '' '' 856s | appending ESP encryption algorithm CAMELLIA_CBC[_192] 856s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 856s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 856s | parsing 'camellia256' for ESP 856s | proposal: 'camellia256' 856s | token: '' '' "camellia256" '' 856s | token: '' "camellia256" '' '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'camellia256' is not recognized 856s | token: '' '' '' 856s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 856s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 856s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 856s | parsing 'aes_ccm' for ESP 856s | proposal: 'aes_ccm' 856s | token: '' '' "aes_ccm" '' 856s | token: '' "aes_ccm" '' '' 856s | token: '' '' '' 856s | appending ESP encryption algorithm AES_CCM_16[_0] 856s | appending ESP integrity algorithm NONE[_0] 856s | parsing 'aes_ccm_a-128-null' for ESP 856s | proposal: 'aes_ccm_a-128-null' 856s | token: '' '' "aes_ccm_a" '-' 856s | token: '' "aes_ccm_a" '-' "128" '-' 856s | token: '-' "128" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_CCM_8[_128] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_ccm_a-192-null' for ESP 856s | proposal: 'aes_ccm_a-192-null' 856s | token: '' '' "aes_ccm_a" '-' 856s | token: '' "aes_ccm_a" '-' "192" '-' 856s | token: '-' "192" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_CCM_8[_192] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_ccm_a-256-null' for ESP 856s | proposal: 'aes_ccm_a-256-null' 856s | token: '' '' "aes_ccm_a" '-' 856s | token: '' "aes_ccm_a" '-' "256" '-' 856s | token: '-' "256" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_CCM_8[_256] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_ccm_b-128-null' for ESP 856s | proposal: 'aes_ccm_b-128-null' 856s | token: '' '' "aes_ccm_b" '-' 856s | token: '' "aes_ccm_b" '-' "128" '-' 856s | token: '-' "128" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_CCM_12[_128] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_ccm_b-192-null' for ESP 856s | proposal: 'aes_ccm_b-192-null' 856s | token: '' '' "aes_ccm_b" '-' 856s | token: '' "aes_ccm_b" '-' "192" '-' 856s | token: '-' "192" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_CCM_12[_192] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_ccm_b-256-null' for ESP 856s | proposal: 'aes_ccm_b-256-null' 856s | token: '' '' "aes_ccm_b" '-' 856s | token: '' "aes_ccm_b" '-' "256" '-' 856s | token: '-' "256" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_CCM_12[_256] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_ccm_c-128-null' for ESP 856s | proposal: 'aes_ccm_c-128-null' 856s | token: '' '' "aes_ccm_c" '-' 856s | token: '' "aes_ccm_c" '-' "128" '-' 856s | token: '-' "128" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_CCM_16[_128] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_ccm_c-192-null' for ESP 856s | proposal: 'aes_ccm_c-192-null' 856s | token: '' '' "aes_ccm_c" '-' 856s | token: '' "aes_ccm_c" '-' "192" '-' 856s | token: '-' "192" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_CCM_16[_192] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_ccm_c-256-null' for ESP 856s | proposal: 'aes_ccm_c-256-null' 856s | token: '' '' "aes_ccm_c" '-' 856s | token: '' "aes_ccm_c" '-' "256" '-' 856s | token: '-' "256" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_CCM_16[_256] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_gcm' for ESP 856s | proposal: 'aes_gcm' 856s | token: '' '' "aes_gcm" '' 856s | token: '' "aes_gcm" '' '' 856s | token: '' '' '' 856s | appending ESP encryption algorithm AES_GCM_16[_0] 856s | appending ESP integrity algorithm NONE[_0] 856s | parsing 'aes_gcm_a-128-null' for ESP 856s | proposal: 'aes_gcm_a-128-null' 856s | token: '' '' "aes_gcm_a" '-' 856s | token: '' "aes_gcm_a" '-' "128" '-' 856s | token: '-' "128" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_GCM_8[_128] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_gcm_a-192-null' for ESP 856s | proposal: 'aes_gcm_a-192-null' 856s | token: '' '' "aes_gcm_a" '-' 856s | token: '' "aes_gcm_a" '-' "192" '-' 856s | token: '-' "192" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_GCM_8[_192] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_gcm_a-256-null' for ESP 856s | proposal: 'aes_gcm_a-256-null' 856s | token: '' '' "aes_gcm_a" '-' 856s | token: '' "aes_gcm_a" '-' "256" '-' 856s | token: '-' "256" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_GCM_8[_256] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_gcm_b-128-null' for ESP 856s | proposal: 'aes_gcm_b-128-null' 856s | token: '' '' "aes_gcm_b" '-' 856s | token: '' "aes_gcm_b" '-' "128" '-' 856s | token: '-' "128" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_GCM_12[_128] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_gcm_b-192-null' for ESP 856s | proposal: 'aes_gcm_b-192-null' 856s | token: '' '' "aes_gcm_b" '-' 856s | token: '' "aes_gcm_b" '-' "192" '-' 856s | token: '-' "192" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_GCM_12[_192] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_gcm_b-256-null' for ESP 856s | proposal: 'aes_gcm_b-256-null' 856s | token: '' '' "aes_gcm_b" '-' 856s | token: '' "aes_gcm_b" '-' "256" '-' 856s | token: '-' "256" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_GCM_12[_256] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_gcm_c-128-null' for ESP 856s | proposal: 'aes_gcm_c-128-null' 856s | token: '' '' "aes_gcm_c" '-' 856s | token: '' "aes_gcm_c" '-' "128" '-' 856s | token: '-' "128" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_GCM_16[_128] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_gcm_c-192-null' for ESP 856s | proposal: 'aes_gcm_c-192-null' 856s | token: '' '' "aes_gcm_c" '-' 856s | token: '' "aes_gcm_c" '-' "192" '-' 856s | token: '-' "192" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_GCM_16[_192] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_gcm_c-256-null' for ESP 856s | proposal: 'aes_gcm_c-256-null' 856s | token: '' '' "aes_gcm_c" '-' 856s | token: '' "aes_gcm_c" '-' "256" '-' 856s | token: '-' "256" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_GCM_16[_256] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_ccm_a-null' for ESP 856s | proposal: 'aes_ccm_a-null' 856s | token: '' '' "aes_ccm_a" '-' 856s | token: '' "aes_ccm_a" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_CCM_8[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_ccm_b-null' for ESP 856s | proposal: 'aes_ccm_b-null' 856s | token: '' '' "aes_ccm_b" '-' 856s | token: '' "aes_ccm_b" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_CCM_12[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_ccm_c-null' for ESP 856s | proposal: 'aes_ccm_c-null' 856s | token: '' '' "aes_ccm_c" '-' 856s | token: '' "aes_ccm_c" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_CCM_16[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_gcm_a-null' for ESP 856s | proposal: 'aes_gcm_a-null' 856s | token: '' '' "aes_gcm_a" '-' 856s | token: '' "aes_gcm_a" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_GCM_8[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_gcm_b-null' for ESP 856s | proposal: 'aes_gcm_b-null' 856s | token: '' '' "aes_gcm_b" '-' 856s | token: '' "aes_gcm_b" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_GCM_12[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_gcm_c-null' for ESP 856s | proposal: 'aes_gcm_c-null' 856s | token: '' '' "aes_gcm_c" '-' 856s | token: '' "aes_gcm_c" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_GCM_16[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_ccm-null' for ESP 856s | proposal: 'aes_ccm-null' 856s | token: '' '' "aes_ccm" '-' 856s | token: '' "aes_ccm" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_CCM_16[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_gcm-null' for ESP 856s | proposal: 'aes_gcm-null' 856s | token: '' '' "aes_gcm" '-' 856s | token: '' "aes_gcm" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_GCM_16[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_ccm-256-null' for ESP 856s | proposal: 'aes_ccm-256-null' 856s | token: '' '' "aes_ccm" '-' 856s | token: '' "aes_ccm" '-' "256" '-' 856s | token: '-' "256" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_CCM_16[_256] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_gcm-192-null' for ESP 856s | proposal: 'aes_gcm-192-null' 856s | token: '' '' "aes_gcm" '-' 856s | token: '' "aes_gcm" '-' "192" '-' 856s | token: '-' "192" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_GCM_16[_192] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_ccm_256-null' for ESP 856s | proposal: 'aes_ccm_256-null' 856s | token: '' '' "aes_ccm_256" '-' 856s | token: '' "aes_ccm_256" '-' "null" '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_256' is not recognized 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_CCM_16[_256] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_gcm_192-null' for ESP 856s | proposal: 'aes_gcm_192-null' 856s | token: '' '' "aes_gcm_192" '-' 856s | token: '' "aes_gcm_192" '-' "null" '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_192' is not recognized 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_GCM_16[_192] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_ccm_8-null' for ESP 856s | proposal: 'aes_ccm_8-null' 856s | token: '' '' "aes_ccm_8" '-' 856s | token: '' "aes_ccm_8" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_CCM_8[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_ccm_12-null' for ESP 856s | proposal: 'aes_ccm_12-null' 856s | token: '' '' "aes_ccm_12" '-' 856s | token: '' "aes_ccm_12" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_CCM_12[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_ccm_16-null' for ESP 856s | proposal: 'aes_ccm_16-null' 856s | token: '' '' "aes_ccm_16" '-' 856s | token: '' "aes_ccm_16" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_CCM_16[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_gcm_8-null' for ESP 856s | proposal: 'aes_gcm_8-null' 856s | token: '' '' "aes_gcm_8" '-' 856s | token: '' "aes_gcm_8" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_GCM_8[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_gcm_12-null' for ESP 856s | proposal: 'aes_gcm_12-null' 856s | token: '' '' "aes_gcm_12" '-' 856s | token: '' "aes_gcm_12" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_GCM_12[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_gcm_16-null' for ESP 856s | proposal: 'aes_gcm_16-null' 856s | token: '' '' "aes_gcm_16" '-' 856s | token: '' "aes_gcm_16" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_GCM_16[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_ccm_8-128-null' for ESP 856s | proposal: 'aes_ccm_8-128-null' 856s | token: '' '' "aes_ccm_8" '-' 856s | token: '' "aes_ccm_8" '-' "128" '-' 856s | token: '-' "128" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_CCM_8[_128] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_ccm_12-192-null' for ESP 856s | proposal: 'aes_ccm_12-192-null' 856s | token: '' '' "aes_ccm_12" '-' 856s | token: '' "aes_ccm_12" '-' "192" '-' 856s | token: '-' "192" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_CCM_12[_192] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_ccm_16-256-null' for ESP 856s | proposal: 'aes_ccm_16-256-null' 856s | token: '' '' "aes_ccm_16" '-' 856s | token: '' "aes_ccm_16" '-' "256" '-' 856s | token: '-' "256" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_CCM_16[_256] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_gcm_8-128-null' for ESP 856s | proposal: 'aes_gcm_8-128-null' 856s | token: '' '' "aes_gcm_8" '-' 856s | token: '' "aes_gcm_8" '-' "128" '-' 856s | token: '-' "128" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_GCM_8[_128] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_gcm_12-192-null' for ESP 856s | proposal: 'aes_gcm_12-192-null' 856s | token: '' '' "aes_gcm_12" '-' 856s | token: '' "aes_gcm_12" '-' "192" '-' 856s | token: '-' "192" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_GCM_12[_192] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_gcm_16-256-null' for ESP 856s | proposal: 'aes_gcm_16-256-null' 856s | token: '' '' "aes_gcm AES_CBC-HMAC_SHA1_96 856s algparse -v2 'esp=aes;none' 856s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 856s algparse -v2 'esp=aes;none,aes' 856s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 856s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 856s algparse -v2 'esp=aes;none,aes;modp2048' 856s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 856s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 856s algparse -v2 'esp=aes-sha1-none' 856s AES_CBC-HMAC_SHA1_96 856s algparse -v2 'esp=aes-sha1;none' 856s AES_CBC-HMAC_SHA1_96 856s algparse -v2 'esp=3des168-sha1' 856s ERROR: ESP encryption algorithm 3DES_CBC does not allow a key lengths 856s algparse -v2 'esp=3des-null' 856s _16" '-' 856s | token: '' "aes_gcm_16" '-' "256" '-' 856s | token: '-' "256" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_GCM_16[_256] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_ccm_8_128-null' for ESP 856s | proposal: 'aes_ccm_8_128-null' 856s | token: '' '' "aes_ccm_8_128" '-' 856s | token: '' "aes_ccm_8_128" '-' "null" '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_8_128' is not recognized 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_CCM_8[_128] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_ccm_12_192-null' for ESP 856s | proposal: 'aes_ccm_12_192-null' 856s | token: '' '' "aes_ccm_12_192" '-' 856s | token: '' "aes_ccm_12_192" '-' "null" '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_12_192' is not recognized 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_CCM_12[_192] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_ccm_16_256-null' for ESP 856s | proposal: 'aes_ccm_16_256-null' 856s | token: '' '' "aes_ccm_16_256" '-' 856s | token: '' "aes_ccm_16_256" '-' "null" '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_16_256' is not recognized 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_CCM_16[_256] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_gcm_8_128-null' for ESP 856s | proposal: 'aes_gcm_8_128-null' 856s | token: '' '' "aes_gcm_8_128" '-' 856s | token: '' "aes_gcm_8_128" '-' "null" '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_8_128' is not recognized 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_GCM_8[_128] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_gcm_12_192-null' for ESP 856s | proposal: 'aes_gcm_12_192-null' 856s | token: '' '' "aes_gcm_12_192" '-' 856s | token: '' "aes_gcm_12_192" '-' "null" '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_12_192' is not recognized 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_GCM_12[_192] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_gcm_16_256-null' for ESP 856s | proposal: 'aes_gcm_16_256-null' 856s | token: '' '' "aes_gcm_16_256" '-' 856s | token: '' "aes_gcm_16_256" '-' "null" '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_16_256' is not recognized 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_GCM_16[_256] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_ctr' for ESP 856s | proposal: 'aes_ctr' 856s | token: '' '' "aes_ctr" '' 856s | token: '' "aes_ctr" '' '' 856s | token: '' '' '' 856s | appending ESP encryption algorithm AES_CTR[_0] 856s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 856s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 856s | parsing 'aesctr' for ESP 856s | proposal: 'aesctr' 856s | token: '' '' "aesctr" '' 856s | token: '' "aesctr" '' '' 856s | token: '' '' '' 856s | appending ESP encryption algorithm AES_CTR[_0] 856s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 856s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 856s | parsing 'aes_ctr128' for ESP 856s | proposal: 'aes_ctr128' 856s | token: '' '' "aes_ctr128" '' 856s | token: '' "aes_ctr128" '' '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr128' is not recognized 856s | token: '' '' '' 856s | appending ESP encryption algorithm AES_CTR[_128] 856s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 856s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 856s | parsing 'aes_ctr192' for ESP 856s | proposal: 'aes_ctr192' 856s | token: '' '' "aes_ctr192" '' 856s | token: '' "aes_ctr192" '' '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr192' is not recognized 856s | token: '' '' '' 856s | appending ESP encryption algorithm AES_CTR[_192] 856s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 856s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 856s | parsing 'aes_ctr256' for ESP 856s | proposal: 'aes_ctr256' 856s | token: '' '' "aes_ctr256" '' 856s | token: '' "aes_ctr256" '' '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr256' is not recognized 856s | token: '' '' '' 856s | appending ESP encryption algorithm AES_CTR[_256] 856s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 856s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 856s | parsing 'camellia_cbc_256-hmac_sha2_512_256;modp8192' for ESP 856s | proposal: 'camellia_cbc_256-hmac_sha2_512_256;modp8192' 856s | token: '' '' "camellia_cbc_256" '-' 856s | token: '' "camellia_cbc_256" '-' "hmac_sha2_512_256" ';' 856s | ike_alg_byname() failed: ESP encryption algorithm 'camellia_cbc_256' is not recognized 856s | token: '-' "hmac_sha2_512_256" ';' "modp8192" '' 856s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 856s | token: ';' "modp8192" '' '' 856s | parsing dh: 856s | appending ESP DH algorithm MODP8192[_0] 856s | token: '' '' '' 856s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 856s | parsing 'null_auth_aes_gmac_256-null;modp8192' for ESP 856s | proposal: 'null_auth_aes_gmac_256-null;modp8192' 856s | token: '' '' "null_auth_aes_gmac_256" '-' 856s | token: '' "null_auth_aes_gmac_256" '-' "null" ';' 856s | ike_alg_byname() failed: ESP encryption algorithm 'null_auth_aes_gmac_256' is not recognized 856s | token: '-' "null" ';' "modp8192" '' 856s | appending ESP encryption algorithm NULL_AUTH_AES_GMAC[_256] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: ';' "modp8192" '' '' 856s | parsing dh: 856s | appending ESP DH algorithm MODP8192[_0] 856s | token: '' '' '' 856s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 856s | parsing '3des-sha1;modp8192' for ESP 856s | proposal: '3des-sha1;modp8192' 856s | token: '' '' "3des" '-' 856s | token: '' "3des" '-' "sha1" ';' 856s | token: '-' "sha1" ';' "modp8192" '' 856s | appending ESP encryption algorithm 3DES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: ';' "modp8192" '' '' 856s | parsing dh: 856s | appending ESP DH algorithm MODP8192[_0] 856s | token: '' '' '' 856s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 856s | parsing '3des-sha1-modp8192' for ESP 856s | proposal: '3des-sha1-modp8192' 856s | token: '' '' "3des" '-' 856s | token: '' "3des" '-' "sha1" '-' 856s | token: '-' "sha1" '-' "modp8192" '' 856s | appending ESP encryption algorithm 3DES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: '-' "modp8192" '' '' 856s | parsing dh: 856s | appending ESP DH algorithm MODP8192[_0] 856s | token: '' '' '' 856s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 856s | parsing 'aes-sha1,3des-sha1;modp8192' for ESP 856s | proposal: 'aes-sha1' 856s | token: '' '' "aes" '-' 856s | token: '' "aes" '-' "sha1" '' 856s | token: '-' "sha1" '' '' 856s | appending ESP encryption algorithm AES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: '' '' '' 856s | proposal: '3des-sha1;modp8192' 856s | token: '' '' "3des" '-' 856s | token: '' "3des" '-' "sha1" ';' 856s | token: '-' "sha1" ';' "modp8192" '' 856s | appending ESP encryption algorithm 3DES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: ';' "modp8192" '' '' 856s | parsing dh: 856s | appending ESP DH algorithm MODP8192[_0] 856s | token: '' '' '' 856s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 856s | parsing 'aes-sha1-modp8192,3des-sha1-modp8192' for ESP 856s | proposal: 'aes-sha1-modp8192' 856s | token: '' '' "aes" '-' 856s | token: '' "aes" '-' "sha1" '-' 856s | token: '-' "sha1" '-' "modp8192" '' 856s | appending ESP encryption algorithm AES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: '-' "modp8192" '' '' 856s | parsing dh: 856s | appending ESP DH algorithm MODP8192[_0] 856s | token: '' '' '' 856s | proposal: '3des-sha1-modp8192' 856s | token: '' '' "3des" '-' 856s | token: '' "3des" '-' "sha1" '-' 856s | token: '-' "sha1" '-' "modp8192" '' 856s | appending ESP encryption algorithm 3DES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: '-' "modp8192" '' '' 856s | parsing dh: 856s | appending ESP DH algorithm MODP8192[_0] 856s | token: '' '' '' 856s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 856s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 856s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for ESP 856s | proposal: 'aes-sha1-modp8192' 856s | token: '' '' "aes" '-' 856s | token: '' "aes" '-' "sha1" '-' 856s | token: '-' "sha1" '-' "modp8192" '' 856s | appending ESP encryption algorithm AES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: '-' "modp8192" '' '' 856s | parsing dh: 856s | appending ESP DH algorithm MODP8192[_0] 856s | token: '' '' '' 856s | proposal: 'aes-sha1-modp8192' 856s | token: '' '' "aes" '-' 856s | token: '' "aes" '-' "sha1" '-' 856s | token: '-' "sha1" '-' "modp8192" '' 856s | appending ESP encryption algorithm AES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: '-' "modp8192" '' '' 856s | parsing dh: 856s | appending ESP DH algorithm MODP8192[_0] 856s | token: '' '' '' 856s | proposal: 'aes-sha1-modp8192' 856s | token: '' '' "aes" '-' 856s | token: '' "aes" '-' "sha1" '-' 856s | token: '-' "sha1" '-' "modp8192" '' 856s | appending ESP encryption algorithm AES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: '-' "modp8192" '' '' 856s | parsing dh: 856s | appending ESP DH algorithm MODP8192[_0] 856s | token: '' '' '' 856s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 856s | parsing 'aes;none' for ESP 856s | proposal: 'aes;none' 856s | token: '' '' "aes" ';' 856s | token: '' "aes" ';' "none" '' 856s | token: ';' "none" '' '' 856s | appending ESP encryption algorithm AES_CBC[_0] 856s | parsing dh: 856s | appending ESP DH algorithm NONE[_0] 856s | token: '' '' '' 856s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 856s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 856s algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 856s | parsing 'aes;none,aes' for ESP 856s | proposal: 'aes;none' 856s | token: '' '' "aes" ';' 856s | token: '' "aes" ';' "none" '' 856s | token: ';' "none" '' '' 856s | appending ESP encryption algorithm AES_CBC[_0] 856s | parsing dh: 856s | appending ESP DH algorithm NONE[_0] 856s | token: '' '' '' 856s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 856s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 856s | proposal: 'aes' 856s | token: '' '' "aes" '' 856s | token: '' "aes" '' '' 856s | token: '' '' '' 856s | appending ESP encryption algorithm AES_CBC[_0] 856s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 856s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 856s algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 856s | parsing 'aes;none,aes;modp2048' for ESP 856s | proposal: 'aes;none' 856s | token: '' '' "aes" ';' 856s | token: '' "aes" ';' "none" '' 856s | token: ';' "none" '' '' 856s | appending ESP encryption algorithm AES_CBC[_0] 856s | parsing dh: 856s | appending ESP DH algorithm NONE[_0] 856s | token: '' '' '' 856s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 856s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 856s | proposal: 'aes;modp2048' 856s | token: '' '' "aes" ';' 856s | token: '' "aes" ';' "modp2048" '' 856s | token: ';' "modp2048" '' '' 856s | appending ESP encryption algorithm AES_CBC[_0] 856s | parsing dh: 856s | appending ESP DH algorithm MODP2048[_0] 856s | token: '' '' '' 856s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 856s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 856s algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 856s algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 856s | parsing 'aes-sha1-none' for ESP 856s | proposal: 'aes-sha1-none' 856s | token: '' '' "aes" '-' 856s | token: '' "aes" '-' "sha1" '-' 856s | token: '-' "sha1" '-' "none" '' 856s | appending ESP encryption algorithm AES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: '-' "none" '' '' 856s | parsing dh: 856s | appending ESP DH algorithm NONE[_0] 856s | token: '' '' '' 856s algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 856s | parsing 'aes-sha1;none' for ESP 856s | proposal: 'aes-sha1;none' 856s | token: '' '' "aes" '-' 856s | token: '' "aes" '-' "sha1" ';' 856s | token: '-' "sha1" ';' "none" '' 856s | appending ESP encryption algorithm AES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: ';' "none" '' '' 856s | parsing dh: 856s | appending ESP DH algorithm NONE[_0] 856s | token: '' '' '' 856s algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 856s | parsing '3des168-sha1' for ESP 856s | proposal: '3des168-sha1' 856s | token: '' '' "3des168" '-' 856s | token: '' "3des168" '-' "sha1" '' 856s | ike_alg_byname() failed: ESP encryption algorithm '3des168' is not recognized 856s | parsing '3des-null' for ESP 856s | proposal: '3des-null' 856s | token: '' '' "3des" '-' 856s | token: '' "3des" '-' "null" '' 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm 3DES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes128-null' for ESP 856s | proposal: 'aes128-null' 856s | token: '' '' "aes128" '-' 856s | token: '' "aes128" '-' "null" '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 856s | token: '-' "null" '' '' 856s | appending ESP encryption algorithm AES_CBC[_128] 856s | parsing integ: 856s | appending ESP integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes224-sha1' for ESP 856s | proposal: 'aes224-sha1' 856s | token: '' '' "aes224" '-' 856s | token: '' "aes224" '-' "sha1" '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'aes224' is not recognized 856s | parsing 'aes-224-sha1' for ESP 856s | proposal: 'aes-224-sha1' 856s | token: '' '' "aes" '-' 856s | token: '' "aes" '-' "224" '-' 856s | byname('aes') with ='224' failed: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 856s | parsing 'aes0-sha1' for ESP 856s | proposal: 'aes0-sha1' 856s | token: '' '' "aes0" '-' 856s | token: '' "aes0" '-' "sha1" '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'aes0' is not recognized 856s | parsing 'aes-0-sha1' for ESP 856s | proposal: 'aes-0-sha1' 856s | token: '' '' "aes" '-' 856s | token: '' "aes" '-' "0" '-' 856s | parsing 'aes512-sha1' for ESP 856s | proposal: 'aes512-sha1' 856s | token: '' '' "aes512" '-' 856s | token: '' "aes512" '-' "sha1" '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'aes512' is not recognized 856s | parsing 'aes-sha1555' for ESP 856s | proposal: 'aes-sha1555' 856s | token: '' '' "aes" '-' 856s | token: '' "aes" '-' "sha1555" '' 856s | token: '-' "sha1555" '' '' 856s | appending ESP encryption algorithm AES_CBC[_0] 856s | parsing integ: 856s | ike_alg_byname() failed: ESP integrity algorithm 'sha1555' is not recognized 856s | lookup for integrity algorithm 'sha1555' failed 856s | or - failed 'ESP integrity algorithm 'sha1555' is not recognized') 856s | parsing 'camellia666-sha1' for ESP 856s | proposal: 'camellia666-sha1' 856s | token: '' '' "camellia666" '-' 856s | token: '' "camellia666" '-' "sha1" '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'camellia666' is not recognized 856s | parsing 'blowfish' for ESP 856s | proposal: 'blowfish' 856s | token: '' '' "blowfish" '' 856s | token: '' "blowfish" '' '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'blowfish' is not supported 856s | parsing 'des-sha1' for ESP 856s | proposal: 'des-sha1' 856s | token: '' '' "des" '-' 856s | token: '' "des" '-' "sha1" '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'des' is not supported 856s | parsing 'aes_ctr666' for ESP 856s | proposal: 'aes_ctr666' 856s | token: '' '' "aes_ctr666" '' 856s | token: '' "aes_ctr666" '' '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr666' is not recognized 856s | parsing 'aes128-sha2_128' for ESP 856s | proposal: 'aes128-sha2_128' 856s | token: '' '' "aes128" '-' 856s | token: '' "aes128" '-' "sha2_128" '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 856s | token: '-' "sha2_128" '' '' 856s | appending ESP encryption algorithm AES_CBC[_128] 856s | parsing integ: 856s | ike_alg_byname() failed: ESP integrity algorithm 'sha2_128' is not recognized 856s | lookup for integrity algorithm 'sha2_128' failed 856s | or - failed 'ESP integrity algorithm 'sha2_128' is not recognized') 856s | parsing 'aes256-sha2_256-4096' for ESP 856s | proposal: 'aes256-sha2_256-4096' 856s | token: '' '' "aes256" '-' 856s | token: '' "aes256" '-' "sha2_256" '-' 856s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 856s | token: '-' "sha2_256" '-' "4096" '' 856s | appending ESP encryption algorithm AES_CBC[_256] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 856s | token: '-' "4096" '' '' 856s | parsing dh: 856s | ike_alg_byname() failed: ESP DH algorithm '4096' is not recognized 856s | lookup for DH algorithm '4096' failed 856s | ... failed 'ESP DH algorithm '4096' is not recognized' 856s | parsing 'aes256-sha2_256-128' for ESP 856s | proposal: 'aes256-sha2_256-128' 856s | token: '' '' "aes256" '-' 856s | token: '' "aes256" '-' "sha2_256" '-' 856s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 856s | token: '-' "sha2_256" '-' "128" '' 856s | appending ESP encryption algorithm AES_CBC[_256] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 856s | token: '-' "128" '' '' 856s | parsing dh: 856s | ike_alg_byname() failed: ESP DH algorithm '128' is not recognized 856s | lookup for DH algorithm '128' failed 856s | ... failed 'ESP DH algorithm '128' is not recognized' 856s | parsing 'vanitycipher' for ESP 856s | proposal: 'vanitycipher' 856s | token: '' '' "vanitycipher" '' 856s | token: '' "vanitycipher" '' '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'vanitycipher' is not recognized 856s | parsing 'ase-sah' for ESP 856s | proposal: 'ase-sah' 856s | token: '' '' "ase" '-' 856s | token: '' "ase" '-' "sah" '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'ase' is not recognized 856s | parsing 'aes-sah1' for ESP 856s | proposal: 'aes-sah1' 856s | token: '' '' "aes" '-' 856s | token: '' "aes" '-' "sah1" '' 856s | token: '-' "sah1" '' '' 856s | appending ESP encryption algorithm AES_CBC[_0] 856s | parsing integ: 856s | ike_alg_byname() failed: ESP integrity algorithm 'sah1' is not recognized 856s | lookup for integrity algorithm 'sah1' failed 856s | or - failed 'ESP integrity algorithm 'sah1' is not recognized') 856s | parsing 'id3' for ESP 856s | proposal: 'id3' 856s | token: '' '' "id3" '' 856s | token: '' "id3" '' '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 856s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 856s | parsing 'aes-id3' for ESP 856s | proposal: 'aes-id3' 856s | token: '' '' "aes" '-' 856s | token: '' "aes" '-' "id3" '' 856s | token: '-' "id3" '' '' 856s | appending ESP encryption algorithm AES_CBC[_0] 856s | parsing integ: 856s | ike_alg_byname() failed: ESP integrity algorithm 'id3' is not recognized 856s | lookup for integrity algorithm 'id3' failed 856s | or - failed 'ESP integrity algorithm 'id3' is not recognized') 856s | parsing 'aes_gcm-md5' for ESP 856s | proposal: 'aes_gcm-md5' 856s | token: '' '' "aes_gcm" '-' 856s | token: '' "aes_gcm" '-' "md5" '' 856s | token: '-' "md5" '' '' 856s | appending ESP encryption algorithm AES_GCM_16[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_MD5_96[_0] 856s | token: '' '' '' 856s | parsing 'mars' for ESP 856s | proposal: 'mars' 856s | token: '' '' "mars" '' 856s | token: '' "mars" '' '' 856s | ike_alg_byname() failed: ESP encryption algorithm 'mars' is not supported 856s | parsing 'aes_gcm-16' for ESP 856s | proposal: 'aes_gcm-16' 856s | token: '' '' "aes_gcm" '-' 856s | token: '' "aes_gcm" '-' "16" '' 856s | byname('aes_gcm') with ='16' failed: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 856s | parsing 'aes_gcm-0' for ESP 856s | proposal: 'aes_gcm-0' 856s | token: '' '' "aes_gcm" '-' 856s | token: '' "aes_gcm" '-' "0" '' 856s | parsing 'aes_gcm-123456789012345' for ESP 856s | proposal: 'aes_gcm-123456789012345' 856s | token: '' '' "aes_gcm" '-' 856s | token: '' "aes_gcm" '-' "123456789012345" '' 856s | parsing '3des-sha1;dh22' for ESP 856s | proposal: '3des-sha1;dh22' 856s | token: '' '' "3des" '-' 856s | token: '' "3des" '-' "sha1" ';' 856s | token: '-' "sha1" ';' "dh22" '' 856s | appending ESP encryption algorithm 3DES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: ';' "dh22" '' '' 856s | parsing dh: 856s | ike_alg_byname() failed: ESP DH algorithm 'dh22' is not supported 856s | lookup for DH algorithm 'dh22' failed 856s | ... failed 'ESP DH algorithm 'dh22' is not supported' 856s | parsing '3des-sha1;modp8192,3des-sha2' for ESP 856s | proposal: '3des-sha1;modp8192' 856s | token: '' '' "3des" '-' 856s | token: '' "3des" '-' "sha1" ';' 856s | token: '-' "sha1" ';' "modp8192" '' 856s | appending ESP encryption algorithm 3DES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: ';' "modp8192" '' '' 856s | parsing dh: 856s | appending ESP DH algorithm MODP8192[_0] 856s | token: '' '' '' 856s | proposal: '3des-sha2' 856s | token: '' '' "3des" '-' 856s | token: '' "3des" '-' "sha2" '' 856s | token: '-' "sha2" '' '' 856s | appending ESP encryption algorithm 3DES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 856s | token: '' '' '' 856s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 856s | parsing '3des-sha1-modp8192,3des-sha2' for ESP 856s | proposal: '3des-sha1-modp8192' 856s | token: '' '' "3des" '-' 856s | token: '' "3des" '-' "sha1" '-' 856s | token: '-' "sha1" '-' "modp8192" '' 856s | appending ESP encryption algorithm 3DES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: '-' "modp8192" '' '' 856s | parsing dh: 856s | appending ESP DH algorithm MODP8192[_0] 856s | token: '' '' '' 856s | proposal: '3des-sha2' 856s | token: '' '' "3des" '-' 856s | token: '' "3des" '-' "sha2" '' 856s | token: '-' "sha2" '' '' 856s | appending ESP encryption algorithm 3DES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 856s | token: '' '' '' 856s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 856s | parsing '3des-sha1-modp8192,3des-sha2-modp8192' for ESP 856s | proposal: '3des-sha1-modp8192' 856s | token: '' '' "3des" '-' 856s | token: '' "3des" '-' "sha1" '-' 856s | token: '-' "sha1" '-' "modp8192" '' 856s | appending ESP encryption algorithm 3DES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: '-' "modp8192" '' '' 856s | parsing dh: 856s | appending ESP DH algorithm MODP8192[_0] 856s | token: '' '' '' 856s | proposal: '3des-sha2-modp8192' 856s | token: '' '' "3des" '-' 856s | token: '' "3des" '-' "sha2" '-' 856s | token: '-' "sha2" '-' "modp8192" '' 856s | appending ESP encryption algorithm 3DES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 856s | token: '-' "modp8192" '' '' 856s | parsing dh: 856s | appending ESP DH algorithm MODP8192[_0] 856s | token: '' '' '' 856s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 856s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 856s | parsing '3des-sha1-modp8192,3des-sha2;modp8192' for ESP 856s | proposal: '3des-sha1-modp8192' 856s | token: '' '' "3des" '-' 856s | token: '' "3des" '-' "sha1" '-' 856s | token: '-' "sha1" '-' "modp8192" '' 856s | appending ESP encryption algorithm 3DES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: '-' "modp8192" '' '' 856s | parsing dh: 856s | appending ESP DH algorithm MODP8192[_0] 856s | token: '' '' '' 856s | proposal: '3des-sha2;modp8192' 856s | token: '' '' "3des" '-' 856s | token: '' "3des" '-' "sha2" ';' 856s | token: '-' "sha2" ';' "modp8192" '' 856s | appending ESP encryption algorithm 3DES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 856s | token: ';' "modp8192" '' '' 856s | parsing dh: 856s | appending ESP DH algorithm MODP8192[_0] 856s | token: '' '' '' 856s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 856s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 856s | parsing '3des-sha1;modp8192,3des-sha2-modp8192' for ESP 856s | proposal: '3des-sha1;modp8192' 856s | token: '' '' "3des" '-' 856s | token: '' "3des" '-' "sha1" ';' 856s | token: '-' "sha1" ';' "modp8192" '' 856s | appending ESP encryption algorithm 3DES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: ';' "modp8192" '' '' 856s | parsing dh: 856s | appending ESP DH algorithm MODP8192[_0] 856s | token: '' '' '' 856s | proposal: '3des-sha2-modp8192' 856s | token: '' '' "3des" '-' 856s | token: '' "3des" '-' "sha2" '-' 856s | token: '-' "sha2" '-' "modp8192" '' 856s | appending ESP encryption algorithm 3DES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 856s | token: '-' "modp8192" '' '' 856s | parsing dh: 856s | appending ESP DH algorithm MODP8192[_0] 856s | token: '' '' '' 856s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 856s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 856s | parsing '3des-sha1;modp8192,3des-sha2;modp8192' for ESP 856s | proposal: '3des-sha1;modp8192' 856s | token: '' '' "3des" '-' 856s | token: '' "3des" '-' "sha1" ';' 856s | token: '-' "sha1" ';' "modp8192" '' 856s | appending ESP encryption algorithm 3DES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: ';' "modp8192" '' '' 856s | parsing dh: 856s | appending ESP DH algorithm MODP8192[_0] 856s | token: '' '' '' 856s | proposal: '3des-sha2;modp8192' 856s | token: '' '' "3des" '-' 856s | token: '' "3des" '-' "sha2" ';' 856s | token: '-' "sha2" ';' "modp8192" '' 856s | appending ESP encryption algorithm 3DES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 856s | token: ';' "modp8192" '' '' 856s | parsing dh: 856s | appending ESP DH algorithm MODP8192[_0] 856s | token: '' '' '' 856s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 856s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 856s | parsing '3des-sha1-modp8192,3des-sha2-modp2048' for ESP 856s | proposal: '3des-sha1-modp8192' 856s | token: '' '' "3des" '-' 856s | token: '' "3des" '-' "sha1" '-' 856s | token: '-' "sha1" '-' "modp8192" '' 856s | appending ESP encryption algorithm 3DES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 856s | token: '-' "modp8192" '' '' 856s | parsing dh: 856s | appending ESP DH algorithm MODP8192[_0] 856s | token: '' '' '' 856s | proposal: '3des-sha2-modp2048' 856s | token: '' '' "3des" '-' 856s | token: '' "3des" '-' "sha2" '-' 856s | token: '-' "sha2" '-' "modp2048" '' 856s | appending ESP encryption algorithm 3DES_CBC[_0] 856s | parsing integ: 856s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 856s | token: '-' "modp2048" '' '' 856s | parsing dh: 856s | appending ESP DH algorithm MODP2048[_0] 856s | token: '' '' '' 856s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 856s algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 856s | parsing 'SHA2_512_256,SHA2_256_128,SHA1_96' for AH 856s | proposal: 'SHA2_512_256' 856s | token: '' '' "SHA2_512_256" '' 856s | token: '' "SHA2_512_256" '' '' 856s | parsing integ: 856s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 856s | token: '' '' '' 856s | proposal: 'SHA2_256_128' 856s | token: '' '' "SHA2_256_128" '' 856s | token: '' "SHA2_256_128" '' '' 856s | parsing integ: 856s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 856s | token: '' '' '' 856s | proposal: 'SHA1_96' 856s | token: '' '' "SHA1_96" '' 856s | token: '' "SHA1_96" '' '' 856s | parsing integ: 856s | appending AH integrity algorithm HMAC_SHA1_96[_0] 856s | token: '' '' '' 856s | parsing '' for AH 856s | parsing 'md5' for AH 856s | proposal: 'md5' 856s | token: '' '' "md5" '' 856s | token: '' "md5" '' '' 856s | parsing integ: 856s | appending AH integrity algorithm HMAC_MD5_96[_0] 856s | token: '' '' '' 856s | parsing 'sha' for AH 856s | proposal: 'sha' 856s | token: '' '' "sha" '' 856s | token: '' "sha" '' '' 856s | parsing integ: 856s | appending AH integrity algorithm HMAC_SHA1_96[_0] 856s | token: '' '' '' 856s | parsing 'sha;modp2048' for AH 856s | proposal: 'sha;modp2048' 856s | token: '' '' "sha" ';' 856s | token: '' "sha" ';' "modp2048" '' 856s | parsing integ: 856s | appending AH integrity algorithm HMAC_SHA1_96[_0] 856s | token: ';' "modp2048" '' '' 856s | parsing dh: 856s | appending AH DH algorithm MODP2048[_0] 856s | token: '' '' '' 856s algparse: ignoring AH DH algorithm MODP2048 as PFS policy is disabled 856s | parsing 'sha1' for AH 856s | proposal: 'sha1' 856s | token: '' '' "sha1" '' 856s | token: '' "sha1" '' '' 856s | parsing integ: 856s | appending AH integrity algorithm HMAC_SHA1_96[_0] 856s | token: '' '' '' 856s | parsing 'sha2' for AH 856s | proposal: 'sha2' 856s | token: '' '' "sha2" '' 856s | token: '' "sha2" '' '' 856s | parsing integ: 856s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 856s | token: '' '' '' 856s | parsing 'sha256' for AH 856s | proposal: 'sha256' 856s | token: '' '' "sha256" '' 856s | token: '' "sha256" '' '' 856s | parsing integ: 856s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 856s | token: '' '' '' 856s | parsing 'sha384' for AH 856s | proposal: 'sha384' 856s | token: '' '' "sha384" '' 856s | token: '' "sha384" '' '' 856s | parsing integ: 856s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 856s | token: '' '' '' 856s | parsing 'sha512' for AH 856s | proposal: 'sha512' 856s | token: '' '' "sha512" '' 856s | token: '' "sha512" '' '' 856s | parsing integ: 856s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 856s | token: '' '' '' 856s | parsing 'sha2_256' for AH 856s | proposal: 'sha2_256' 856s | token: '' '' "sha2_256" '' 856s | token: '' "sha2_256" '' '' 856s | parsing integ: 856s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 856s | token: '' '' '' 856s | parsing 'sha2_384' for AH 856s | proposal: 'sha2_384' 856s | token: '' '' "sha2_384" '' 856s | token: '' "sha2_384" '' '' 856s | parsing integ: 856s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 856s | token: '' '' '' 856s | parsing 'sha2_512' for AH 856s | proposal: 'sha2_512' 856s | token: '' '' "sha2_512" '' 856s | token: '' "sha2_512" '' '' 856s | parsing integ: 856s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 856s | token: '' '' '' 856s | parsing 'aes_xcbc' for AH 856s | proposal: 'aes_xcbc' 856s | token: '' '' "aes_xcbc" '' 856s | token: '' "aes_xcbc" '' '' 856s | parsing integ: 856s | appending AH integrity algorithm AES_XCBC_96[_0] 856s | token: '' '' '' 856s | parsing 'sha2-none' for AH 856s | proposal: 'sha2-none' 856s | token: '' '' "sha2" '-' 856s | token: '' "sha2" '-' "none" '' 856s | parsing integ: 856s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 856s | token: '-' "none" '' '' 856s | parsing dh: 856s | appending AH DH algorithm NONE[_0] 856s | token: '' '' '' 856s algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 856s | parsing 'sha2;none' for AH 856s | proposal: 'sha2;none' 856s | token: '' '' "sha2" ';' 856s | token: '' "sha2" ';' "none" '' 856s | parsing integ: 856s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 856s | token: ';' "none" '' '' 856s | parsing dh: 856s | appending AH DH algorithm NONE[_0] 856s | token: '' '' '' 856s algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 856s | parsing 'sha1-modp8192,sha1-modp8192,sha1-modp8192' for AH 856s | proposal: 'sha1-modp8192' 856s | token: '' '' "sha1" '-' 856s | token: '' "sha1" '-' "modp8192" '' 856s | parsing integ: 856s | appending AH integrity algorithm HMAC_SHA1_96[_0] 856s | token: '-' "modp8192" '' '' 856s | parsing dh: 856s | appending AH DH algorithm MODP8192[_0] 856s | token: '' '' '' 856s | proposal: 'sha1-modp8192' 856s | token: '' '' "sha1" '-' 856s | token: '' "sha1" '-' "modp8192" '' 856s | parsing integ: 856s | appending AH integrity algorithm HMAC_SHA1_96[_0] 856s | token: '-' "modp8192" '' '' 856s | parsing dh: 856s | appending AH DH algorithm MODP8192[_0] 856s | token: '' '' '' 856s | proposal: 'sha1-modp8192' 856s | token: '' '' "sha1" '-' 856s | token: '' "sha1" '-' "modp8192" '' 856s | parsing integ: 856s | appending AH integrity algorithm HMAC_SHA1_96[_0] 856s | token: '-' "modp8192" '' '' 856s | parsing dh: 856s | appending AH DH algorithm MODP8192[_0] 856s | token: '' '' '' 856s algparse: ignoring AH DH algorithm MODP8192 as PFS policy is disabled 856s | parsing 'aes-sha1' for AH 856s | proposal: 'aes-sha1' 856s | token: '' '' "aes" '-' 856s | token: '' "aes" '-' "sha1" '' 856s | parsing integ: 856s | ike_alg_byname() failed: AH integrity algorithm 'aes' is not recognized 856s | lookup for integrity algorithm 'aes' failed 856s | or - failed 'AH integrity algorithm 'aes' is not recognized') 856s | parsing 'vanityhash1' for AH 856s | proposal: 'vanityhash1' 856s | token: '' '' "vanityhash1" '' 856s | token: '' "vanityhash1" '' '' 856s | parsing integ: 856s | ike_alg_byname() failed: AH integrity algorithm 'vanityhash1' is not recognized 856s | lookup for integrity algorithm 'vanityhash1' failed 856s | or - failed 'AH integrity algorithm 'vanityhash1' is not recognized') 856s | parsing 'aes_gcm_c-256' for AH 856s | proposal: 'aes_gcm_c-256' 856s | token: '' '' "aes_gcm_c" '-' 856s | token: '' "aes_gcm_c" '-' "256" '' 856s | parsing integ: 856s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm_c' is not recognized 856s | lookup for integrity algorithm 'aes_gcm_c' failed 856s | or - failed 'AH integrity algorithm 'aes_gcm_c' is not recognized') 856s | parsing 'id3' for AH 856s | proposal: 'id3' 856s | token: '' '' "id3" '' 856s | token: '' "id3" '' '' 856s | parsing integ: 856s | ike_alg_byname() failed: AH integrity algorithm 'id3' is not recognized 856s | lookup for integrity algorithm 'id3' failed 856s | or - failed 'AH integrity algorithm 'id3' is not recognized') 856s | parsing '3des' for AH 856s | proposal: '3des' 856s | token: '' '' "3des" '' 856s | token: '' "3des" '' '' 856s | parsing integ: 856s | ike_alg_byname() failed: AH integrity algorithm '3des' is not recognized 856s | lookup for integrity algorithm '3des' failed 856s | or - failed 'AH integrity algorithm '3des' is not recognized') 856s | parsing 'null' for AH 856s | proposal: 'null' 856s | token: '' '' "null" '' 856s | token: '' "null" '' '' 856s | parsing integ: 856s | appending AH integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | parsing 'aes_gcm' for AH 856s | proposal: 'aes_gcm' 856s | token: '' '' "aes_gcm" '' 856s | token: '' "aes_gcm" '' '' 856s | parsing integ: 856s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm' is not recognized 856s | lookup for integrity algorithm 'aes_gcm' failed 856s | or - failed 'AH integrity algorithm 'aes_gcm' is not recognized') 856s | parsing 'aes_ccm' for AH 856s | proposal: 'aes_ccm' 856s | token: '' '' "aes_ccm" '' 856s | token: '' "aes_ccm" '' '' 856s | parsing integ: 856s | ike_alg_byname() failed: AH integrity algorithm 'aes_ccm' is not recognized 856s | lookup for integrity algorithm 'aes_ccm' failed 856s | or - failed 'AH integrity algorithm 'aes_ccm' is not recognized') 856s | parsing 'ripemd' for AH 856s | proposal: 'ripemd' 856s | token: '' '' "ripemd" '' 856s | token: '' "ripemd" '' '' 856s | parsing integ: 856s | ike_alg_byname() failed: AH integrity algorithm 'ripemd' is not recognized 856s | lookup for integrity algorithm 'ripemd' failed 856s | or - failed 'AH integrity algorithm 'ripemd' is not recognized') 856s | parsing 'AES_GCM_16_256,AES_GCM_16_128,AES_CBC_256,AES_CBC_128' for IKE 856s | proposal: 'AES_GCM_16_256' 856s | token: '' '' "AES_GCM_16_256" '' 856s | token: '' "AES_GCM_16_256" '' '' 856s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_256' is not recognized 856s | token: '' '' '' 856s | appending IKE encryption algorithm AES_GCM_16[_256] 856s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 856s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 856s | appending IKE integrity algorithm NONE[_0] 856s | appending IKE DH algorithm MODP2048[_0] 856s | appending IKE DH algorithm MODP3072[_0] 856s | appending IKE DH algorithm MODP4096[_0] 856s | appending IKE DH algorithm MODP8192[_0] 856s | appending IKE DH algorithm DH19[_0] 856s | appending IKE DH algorithm DH20[_0] 856s | appending IKE DH algorithm DH21[_0] 856s | appending IKE DH algorithm DH31[_0] 856s | proposal: 'AES_GCM_16_128' 856s | token: '' '' "AES_GCM_16_128" '' 856s | token: '' "AES_GCM_16_128" '' '' 856s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_128' is not recognized 856s | token: '' '' '' 856s | appending IKE encryption algorithm AES_GCM_16[_128] 856s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 856s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 856s | appending IKE integrity algorithm NONE[_0] 856s | appending IKE DH algorithm MODP2048[_0] 856s | appending IKE DH algorithm MODP3072[_0] 856s | appending IKE DH algorithm MODP4096[_0] 856s | appending IKE DH algorithm MODP8192[_0] 856s | appending IKE DH algorithm DH19[_0] 856s | appending IKE DH algorithm DH20[_0] 856s | appending IKE DH algorithm DH21[_0] 856s | appending IKE DH algorithm DH31[_0] 856s | proposal: 'AES_CBC_256' 856s | token: '' '' "AES_CBC_256" '' 856s | token: '' "AES_CBC_256" '' '' 856s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_256' is not recognized 856s | token: '' '' '' 856s | appending IKE encryption algorithm AES_CBC[_256] 856s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 856s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 856s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 856s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 856s | appending IKE DH algorithm MODP2048[_0] 856s | appending IKE DH algorithm MODP3072[_0] 856s | appending IKE DH algorithm MODP4096[_0] 856s | appending IKE DH algorithm MODP8192[_0] 856s | appending IKE DH algorithm DH19[_0] 856s | appending IKE DH algorithm DH20[_0] 856s | appending IKE DH algorithm DH21[_0] 856s | appending IKE DH algorithm DH31[_0] 856s | proposal: 'AES_CBC_128' 856s | token: '' '' "AES_CBC_128" '' 856s | token: '' "AES_CBC_128" '' '' 856s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_128' is not recognized 856s | token: '' '' '' 856s | appending IKE encryption algorithm AES_CBC[_128] 856s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 856s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 856s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 856s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 856s | appending IKE DH algorithm MODP2048[_0] 856s | appending IKE DH algorithm MODP3072[_0] 856s | appending IKE DH algorithm MODP4096[_0] 856s | appending IKE DH algorithm MODP8192[_0] 856s | appending IKE DH algorithm DH19[_0] 856s | appending IKE DH algorithm DH20[_0] 856s | appending IKE DH algorithm DH21[_0] 856s | appending IKE DH algorithm DH31[_0] 856s | parsing '' for IKE 856s | parsing '3des-sha1' for IKE 856s | proposal: '3des-sha1' 856s | token: '' '' "3des" '-' 856s | token: '' "3des" '-' "sha1" '' 856s | token: '-' "sha1" '' '' 856s | appending IKE encryption algorithm 3DES_CBC[_0] 856s | parsing prf: 856s | appending IKE PRF algorithm HMAC_SHA1[_0] 856s | token: '' '' '' 856s | - succeeded, advancing tokens 856s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 856s | appending IKE DH algorithm MODP2048[_0] 856s | appending IKE DH algorithm MODP3072[_0] 856s | appending IKE DH algorithm MODP4096[_0] 856s | appending IKE DH algorithm MODP8192[_0] 856s | appending IKE DH algorithm DH19[_0] 856s | appending IKE DH algorithm DH20[_0] 856s | appending IKE DH algorithm DH21[_0] 856s | appending IKE DH algorithm DH31[_0] 856s | parsing '3des-sha1' for IKE 856s | proposal: '3des-sha1' 856s | token: '' '' "3des" '-' 856s | token: '' "3des" '-' "sha1" '' 856s | token: '-' "sha1" '' '' 856s | appending IKE encryption algorithm 3DES_CBC[_0] 856s | parsing prf: 856s | appending IKE PRF algorithm HMAC_SHA1[_0] 856s | token: '' '' '' 856s | - succeeded, advancing tokens 856s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 856s | appending IKE DH algorithm MODP2048[_0] 856s | appending IKE DH algorithm MODP3072[_0] 856s | appending IKE DH algorithm MODP4096[_0] 856s | appending IKE DH algorithm MODP8192[_0] 856s | appending IKE DH algorithm DH19[_0] 856s | appending IKE DH algorithm DH20[_0] 856s | appending IKE DH algorithm DH21[_0] 856s | appending IKE DH algorithm DH31[_0] 856s | parsing '3des-sha1;modp1536' for IKE 856s | proposal: '3des-sha1;modp1536' 856s | token: '' '' "3des" '-' 856s | token: '' "3des" '-' "sha1" ';' 856s | token: '-' "sha1" ';' "modp1536" '' 856s | appending IKE encryption algorithm 3DES_CBC[_0] 856s | parsing prf: 856s | appending IKE PRF algorithm HMAC_SHA1[_0] 856s | token: ';' "modp1536" '' '' 856s | - succeeded, advancing tokens 856s | parsing dh: 856s | appending IKE DH algorithm MODP1536[_0] 856s | token: '' '' '' 856s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 856s | parsing '3des;dh21' for IKE 856s | proposal: '3des;dh21' 856s | token: '' '' "3des" ';' 856s | token: '' "3des" ';' "dh21" '' 856s | token: ';' "dh21" '' '' 856s | appending IKE encryption algorithm 3DES_CBC[_0] 856s | parsing dh: 856s | appending IKE DH algorithm DH21[_0] 856s | token: '' '' '' 856s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 856s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 856s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 856s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 856s | parsing '3des-sha1;dh21' for IKE 856s | proposal: '3des-sha1;dh21' 856s | token: '' '' "3des" '-' 856s | token: '' "3des" '-' "sha1" ';' 856s | token: '-' "sha1" ';' "dh21" '' 856s | appending IKE encryption algorithm 3DES_CBC[_0] 856s | parsing prf: 856s | appending IKE PRF algorithm HMAC_SHA1[_0] 856s | token: ';' "dh21" '' '' 856s | - succeeded, advancing tokens 856s | parsing dh: 856s | appending IKE DH algorithm DH21[_0] 856s | token: '' '' '' 856s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 856s | parsing '3des-sha1-ecp_521' for IKE 856s | proposal: '3des-sha1-ecp_521' 856s | token: '' '' "3des" '-' 856s | token: '' "3des" '-' "sha1" '-' 856s | token: '-' "sha1" '-' "ecp_521" '' 856s | appending IKE encryption algorithm 3DES_CBC[_0] 856s | parsing prf: 856s | appending IKE PRF algorithm HMAC_SHA1[_0] 856s | token: '-' "ecp_521" '' '' 856s | - succeeded, advancing tokens 856s | parsing dh: 856s | appending IKE DH algorithm DH21[_0] 856s | token: '' '' '' 856s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 856s | parsing '3des+aes' for IKE 856s | proposal: '3des+aes' 856s | token: '' '' "3des" '+' 856s | token: '' "3des" '+' "aes" '' 856s | token: '+' "aes" '' '' 856s | appending IKE encryption algorithm 3DES_CBC[_0] 856s | token: '' '' '' 856s | appending IKE encryption algorithm AES_CBC[_0] 856s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 856s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 856s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 856s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 856s | appending IKE DH algorithm MODP2048[_0] 856s | appending IKE DH algorithm MODP3072[_0] 856s | appending IKE DH algorithm MODP4096[_0] 856s | appending IKE DH algorithm MODP8192[_0] 856s | appending IKE DH algorithm DH19[_0] 856s | appending IKE DH algorithm DH20[_0] 856s | appending IKE DH algorithm DH21[_0] 856s | appending IKE DH algorithm DH31[_0] 856s | parsing 'aes;none' for IKE 856s | proposal: 'aes;none' 856s | token: '' '' "aes" ';' 856s | token: '' "aes" ';' "none" '' 856s | token: ';' "none" '' '' 856s | appending IKE encryption algorithm AES_CBC[_0] 856s | parsing dh: 856s | appending IKE DH algorithm NONE[_0] 856s | token: '' '' '' 856s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 856s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 856s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 856s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 856s | parsing 'id2' for IKE 856s | proposal: 'id2' 856s | token: '' '' "id2" '' 856s | token: '' "id2" '' '' 856s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 856s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 856s | parsing '3des-id2' for IKE 856s | proposal: '3des-id2' 856s | token: '' '' "3des" '-' 856s | token: '' "3des" '-' "id2" '' 856s | token: '-' "id2" '' '' 856s | appending IKE encryption algorithm 3DES_CBC[_0] 856s | parsing prf: 856s | ike_alg_byname() failed: IKE PRF algorithm 'id2' is not recognized 856s | lookup for PRF algorithm 'id2' failed 856s | - failed, saving error 'IKE PRF algorithm 'id2' is not recognized' and tossing result 856s | parsing integ: 856s | ike_alg_byname() failed: IKE integrity algorithm 'id2' is not recognized 856s | lookup for integrity algorithm 'id2' failed 856s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'id2' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'id2' is not recognized') 856s | parsing 'aes_ccm' for IKE 856s | proposal: 'aes_ccm' 856s | token: '' '' "aes_ccm" '' 856s | token: '' "aes_ccm" '' '' 856s | alg_byname_ok() failed: IKE encryption algorithm 'aes_ccm' is not supported 856s | parsing 'aes-sha1-sha2-ecp_521' for IKE 856s | proposal: 'aes-sha1-sha2-ecp_521' 856s | token: '' '' "aes" '-' 856s | token: '' "aes" '-' "sha1" '-' 856s | token: '-' "sha1" '-' "sha2" '-' 856s | appending IKE encryption algorithm AES_CBC[_0] 856s | parsing prf: 856s | appending IKE PRF algorithm HMAC_SHA1[_0] 856s | token: '-' "sha2" '-' "ecp_521" '' 856s | - succeeded, advancing tokens 856s | parsing dh: 856s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 856s | lookup for DH algorithm 'sha2' failed 856s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 856s | parsing 'aes-sha2-sha2;ecp_521' for IKE 856s | proposal: 'aes-sha2-sha2;ecp_521' 856s | token: '' '' "aes" '-' 856s | token: '' "aes" '-' "sha2" '-' 856s | token: '-' "sha2" '-' "sha2" ';' 856s | appending IKE encryption algorithm AES_CBC[_0] 856s | parsing prf: 856s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 856s | token: '-' "sha2" ';' "ecp_521" '' 856s | - succeeded, advancing tokens 856s | parsing dh: 856s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 856s | lookup for DH algorithm 'sha2' failed 856s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 856s | parsing 'aes-sha1_96-sha2-ecp_521' for IKE 856s | proposal: 'aes-sha1_96-sha2-ecp_521' 856s | token: '' '' "aes" '-' 856s | token: '' "aes" '-' "sha1_96" '-' 856s | token: '-' "sha1_96" '-' "sha2" '-' 856s | appending IKE encryption algorithm AES_CBC[_0] 856s | parsing prf: 856s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 856s | lookup for PRF algorithm 'sha1_96' failed 856s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 856s | parsing integ: 856s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 856s | token: '-' "sha2" '-' "ecp_521" '' 856s | parsing prf: 856s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 856s | token: '-' "ecp_521" '' '' 856s | parsing dh: 856s | appending IKE DH algorithm DH21[_0] 856s | token: '' '' '' 856s | parsing 'aes-sha1_96-sha2;ecp_521' for IKE 856s | proposal: 'aes-sha1_96-sha2;ecp_521' 856s | token: '' '' "aes" '-' 856s | token: '' "aes" '-' "sha1_96" '-' 856s | token: '-' "sha1_96" '-' "sha2" ';' 856s | appending IKE encryption algorithm AES_CBC[_0] 856s | parsing prf: 856s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 856s | lookup for PRF algorithm 'sha1_96' failed 856s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 856s | parsing integ: 856s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 856s | token: '-' "sha2" ';' "ecp_521" '' 856s | parsing prf: 856s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 856s | token: ';' "ecp_521" '' '' 856s | parsing dh: 856s | appending IKE DH algorithm DH21[_0] 856s | token: '' '' '' 856s | parsing 'aes+aes-sha1+sha1-modp8192+modp8192' for IKE 856s | proposal: 'aes+aes-sha1+sha1-modp8192+modp8192' 856s | token: '' '' "aes" '+' 856s | token: '' "aes" '+' "aes" '-' 856s | token: '+' "aes" '-' "sha1" '+' 856s | appending IKE encryption algorithm AES_CBC[_0] 856s | token: '-' "sha1" '+' "sha1" '-' 856s | appending IKE encryption algorithm AES_CBC[_0] 856s algparse: discarding duplicate IKE encryption algorithm AES_CBC 856s | parsing prf: 856s | appending IKE PRF algorithm HMAC_SHA1[_0] 856s | token: '+' "sha1" '-' "modp8192" '+' 856s | appending IKE PRF algorithm HMAC_SHA1[_0] 856s | token: '-' "modp8192" '+' "modp8192" '' 856s algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 856s | - succeeded, advancing tokens 856s | parsing dh: 856s | appending IKE DH algorithm MODP8192[_0] 856s | token: '+' "modp8192" '' '' 856s | appending IKE DH algorithm MODP8192[_0] 856s | token: '' '' '' 856s algparse: discarding duplicate IKE DH algorithm MODP8192 856s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 856s | parsing '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' for IKE 856s | proposal: '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' 856s | token: '' '' "3des" '+' 856s | token: '' "3des" '+' "aes" '+' 856s | token: '+' "aes" '+' "aes" '-' 856s | appending IKE encryption algorithm 3DES_CBC[_0] 856s | token: '+' "aes" '-' "sha2" '+' 856s | appending IKE encryption algorithm AES_CBC[_0] 856s | token: '-' "sha2" '+' "sha1" '+' 856s | appending IKE encryption algorithm AES_CBC[_0] 856s algparse: discarding duplicate IKE encryption algorithm AES_CBC 856s | parsing prf: 856s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 856s | token: '+' "sha1" '+' "sha1" '-' 856s | appending IKE PRF algorithm HMAC_SHA1[_0] 856s | token: '+' "sha1" '-' "modp4096" '+' 856s | appending IKE PRF algorithm HMAC_SHA1[_0] 856s | token: '-' "modp4096" '+' "modp8192" '+' 856s algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 856s | - succeeded, advancing tokens 856s | parsing dh: 856s | appending IKE DH algorithm MODP4096[_0] 856s | token: '+' "modp8192" '+' "modp8192" '' 856s | appending IKE DH algorithm MODP8192[_0] 856s | token: '+' "modp8192" '' '' 856s | appending IKE DH algorithm MODP8192[_0] 856s | token: '' '' '' 856s algparse: discarding duplicate IKE DH algorithm MODP8192 856s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 856s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 856s | parsing 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' for IKE 856s | proposal: 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' 856s | token: '' '' "aes" '+' 856s | token: '' "aes" '+' "3des" '+' 856s | token: '+' "3des" '+' "aes" '-' 856s | appending IKE encryption algorithm AES_CBC[_0] 856s | token: '+' "aes" '-' "sha1" '+' 856s | appending IKE encryption algorithm 3DES_CBC[_0] 856s | token ERROR: non-AEAD ESP encryption algorithm 3DES_CBC cannot have 'NONE' as the integrity algorithm 856s algparse -v2 'esp=aes128-null' 856s ERROR: non-AEAD ESP encryption algorithm AES_CBC cannot have 'NONE' as the integrity algorithm 856s algparse -v2 'esp=aes224-sha1' 856s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 856s algparse -v2 'esp=aes-224-sha1' 856s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 856s algparse -v2 'esp=aes0-sha1' 856s ERROR: ESP encryption key length is zero 856s algparse -v2 'esp=aes-0-sha1' 856s ERROR: ESP encryption key length is zero 856s algparse -v2 'esp=aes512-sha1' 856s ERROR: ESP encryption algorithm AES_CBC with key length 512 invalid; valid key lengths: 128, 192, 256 856s algparse -v2 'esp=aes-sha1555' 856s ERROR: ESP integrity algorithm 'sha1555' is not recognized 856s algparse -v2 'esp=camellia666-sha1' 856s ERROR: ESP encryption algorithm CAMELLIA_CBC with key length 666 invalid; valid key lengths: 128, 192, 256 856s algparse -v2 'esp=blowfish' 856s ERROR: ESP encryption algorithm 'blowfish' is not supported 856s algparse -v2 'esp=des-sha1' 856s ERROR: ESP encryption algorithm 'des' is not supported 856s algparse -v2 'esp=aes_ctr666' 856s ERROR: ESP encryption algorithm AES_CTR with key length 666 invalid; valid key lengths: 128, 192, 256 856s algparse -v2 'esp=aes128-sha2_128' 856s ERROR: ESP integrity algorithm 'sha2_128' is not recognized 856s algparse -v2 'esp=aes256-sha2_256-4096' 856s ERROR: ESP DH algorithm '4096' is not recognized 856s algparse -v2 'esp=aes256-sha2_256-128' 856s ERROR: ESP DH algorithm '128' is not recognized 856s algparse -v2 'esp=vanitycipher' 856s ERROR: ESP encryption algorithm 'vanitycipher' is not recognized 856s algparse -v2 'esp=ase-sah' 856s ERROR: ESP encryption algorithm 'ase' is not recognized 856s algparse -v2 'esp=aes-sah1' 856s ERROR: ESP integrity algorithm 'sah1' is not recognized 856s algparse -v2 'esp=id3' 856s ERROR: ESP encryption algorithm 'id3' is not recognized 856s algparse -v2 'esp=aes-id3' 856s ERROR: ESP integrity algorithm 'id3' is not recognized 856s algparse -v2 'esp=aes_gcm-md5' 856s ERROR: AEAD ESP encryption algorithm AES_GCM_16 must have 'NONE' as the integrity algorithm 856s algparse -v2 'esp=mars' 856s ERROR: ESP encryption algorithm 'mars' is not supported 856s algparse -v2 'esp=aes_gcm-16' 856s ERROR: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 856s algparse -v2 'esp=aes_gcm-0' 856s ERROR: ESP encryption key length is zero 856s algparse -v2 'esp=aes_gcm-123456789012345' 856s ERROR: ESP encryption algorithm 'aes_gcm-123456789012345' key length WAY too big 856s algparse -v2 'esp=3des-sha1;dh22' 856s ERROR: ESP DH algorithm 'dh22' is not supported 856s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2' 856s 3DES_CBC-HMAC_SHA1_96 856s 3DES_CBC-HMAC_SHA2_256_128 856s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2' 856s 3DES_CBC-HMAC_SHA1_96 856s 3DES_CBC-HMAC_SHA2_256_128 856s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2-modp8192' 856s 3DES_CBC-HMAC_SHA1_96 856s 3DES_CBC-HMAC_SHA2_256_128 856s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2;modp8192' 856s 3DES_CBC-HMAC_SHA1_96 856s 3DES_CBC-HMAC_SHA2_256_128 856s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2-modp8192' 856s 3DES_CBC-HMAC_SHA1_96 856s 3DES_CBC-HMAC_SHA2_256_128 856s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2;modp8192' 856s 3DES_CBC-HMAC_SHA1_96 856s 3DES_CBC-HMAC_SHA2_256_128 856s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2-modp2048' 856s 3DES_CBC-HMAC_SHA1_96 856s 3DES_CBC-HMAC_SHA2_256_128 856s algparse -v2 'ah' 856s HMAC_SHA2_512_256 856s HMAC_SHA2_256_128 856s HMAC_SHA1_96 856s algparse -v2 'ah=' 856s ERROR: AH proposal is empty 856s algparse -v2 'ah=md5' 856s HMAC_MD5_96 856s algparse -v2 'ah=sha' 856s HMAC_SHA1_96 856s algparse -v2 'ah=sha;modp2048' 856s HMAC_SHA1_96 856s algparse -v2 'ah=sha1' 856s HMAC_SHA1_96 856s algparse -v2 'ah=sha2' 856s HMAC_SHA2_256_128 856s algparse -v2 'ah=sha256' 856s HMAC_SHA2_256_128 856s algparse -v2 'ah=sha384' 856s HMAC_SHA2_384_192 856s algparse -v2 'ah=sha512' 856s HMAC_SHA2_512_256 856s algparse -v2 'ah=sha2_256' 856s HMAC_SHA2_256_128 856s algparse -v2 'ah=sha2_384' 856s HMAC_SHA2_384_192 856s algparse -v2 'ah=sha2_512' 856s HMAC_SHA2_512_256 856s algparse -v2 'ah=aes_xcbc' 856s AES_XCBC_96 856s algparse -v2 'ah=sha2-none' 856s HMAC_SHA2_256_128 856s algparse -v2 'ah=sha2;none' 856s HMAC_SHA2_256_128 856s algparse -v2 'ah=sha1-modp8192,sha1-modp8192,sha1-modp8192' 856s HMAC_SHA1_96 856s algparse -v2 'ah=aes-sha1' 856s ERROR: AH integrity algorithm 'aes' is not recognized 856s algparse -v2 'ah=vanityhash1' 856s ERROR: AH integrity algorithm 'vanityhash1' is not recognized 856s algparse -v2 'ah=aes_gcm_c-256' 856s ERROR: AH integrity algorithm 'aes_gcm_c' is not recognized 856s algparse -v2 'ah=id3' 856s ERROR: AH integrity algorithm 'id3' is not recognized 856s algparse -v2 'ah=3des' 856s ERROR: AH integrity algorithm '3des' is not recognized 856s algparse -v2 'ah=null' 856s ERROR: AH cannot have 'none' as the integrity algorithm 856s algparse -v2 'ah=aes_gcm' 856s ERROR: AH integrity algorithm 'aes_gcm' is not recognized 856s algparse -v2 'ah=aes_ccm' 856s ERROR: AH integrity algorithm 'aes_ccm' is not recognized 856s algparse -v2 'ah=ripemd' 856s ERROR: AH integrity algorithm 'ripemd' is not recognized 856s algparse -v2 'ike' 856s AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 856s AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 856s AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 856s AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 856s algparse -v2 'ike=' 856s ERROR: IKE proposal is empty 856s algparse -v2 'ike=3des-sha1' 856s 3DES_CBC-HMAC_SHA1-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 856s algparse -v2 'ike=3des-sha1' 856s 3DES_CBC-HMAC_SHA1-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 856s algparse -v2 'ike=3des-sha1;modp1536' 856s 3DES_CBC-HMAC_SHA1-MODP1536 856s algparse -v2 'ike=3des;dh21' 856s 3DES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH21 856s algparse -v2 'ike=3des-sha1;dh21' 856s 3DES_CBC-HMAC_SHA1-DH21 856s algparse -v2 'ike=3des-sha1-ecp_521' 856s 3DES_CBC-HMAC_SHA1-DH21 856s algparse -v2 'ike=3des+aes' 856s 3DES_CBC+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 856s algparse -v2 'ike=aes;none' 856s ERROR: IKE DH algorithm 'none' not permitted 856s algparse -v2 'ike=id2' 856s ERROR: IKE encryption algorithm 'id2' is not recognized 856s algparse -v2 'ike=3des-id2' 856s ERROR: IKE PRF algorithm 'id2' is not recognized 856s algparse -v2 'ike=aes_ccm' 856s ERROR: IKE encryption algorithm 'aes_ccm' is not supported 856s algparse -v2 'ike=aes-sha1-sha2-ecp_521' 856s ERROR: IKE DH algorithm 'sha2' is not recognized 856s algparse -v2 'ike=aes-sha2-sha2;ecp_521' 856s ERROR: IKE DH algorithm 'sha2' is not recognized 856s algparse -v2 'ike=aes-sha1_96-sha2-ecp_521' 856s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 856s algparse -v2 'ike=aes-sha1_96-sha2;ecp_521' 856s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 856s algparse -v2 'ike=aes+aes-sha1+sha1-modp8192+modp8192' 856s AES_CBC-HMAC_SHA1-MODP8192 856s algparse -v2 'ike=3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' 856s 3DES_CBC+AES_CBC-HMAC_SHA2_256+HMAC_SHA1-MODP4096+MODP8192 856s algparse -v2 'ike=aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' 856s AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 856s algparse -v2 'ike=aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' 856s AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 856s algparse -v2 'ike=aes+aes128+aes256' 856s AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 856s algparse -v2 'ike=aes128+aes+aes256' 856s AES_CBC_128+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 856s algparse -v2 'ike=aes128+aes256+aes' 856s AES_CBC_128+AES_CBC_256+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 856s algparse -v2 'ike=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' 856s AES_CBC-HMAC_SHA1-MODP8192 856s algparse -v2 'ike=aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' 856s : '-' "sha1" '+' "sha2" '+' 856s | appending IKE encryption algorithm AES_CBC[_0] 856s algparse: discarding duplicate IKE encryption algorithm AES_CBC 856s | parsing prf: 856s | appending IKE PRF algorithm HMAC_SHA1[_0] 856s | token: '+' "sha2" '+' "sha1" '-' 856s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 856s | token: '+' "sha1" '-' "modp8192" '+' 856s | appending IKE PRF algorithm HMAC_SHA1[_0] 856s | token: '-' "modp8192" '+' "modp4096" '+' 856s algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 856s | - succeeded, advancing tokens 856s | parsing dh: 856s | appending IKE DH algorithm MODP8192[_0] 856s | token: '+' "modp4096" '+' "modp8192" '' 856s | appending IKE DH algorithm MODP4096[_0] 856s | token: '+' "modp8192" '' '' 856s | appending IKE DH algorithm MODP8192[_0] 856s | token: '' '' '' 856s algparse: discarding duplicate IKE DH algorithm MODP8192 856s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 856s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 856s | parsing 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' for IKE 856s | proposal: 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' 856s | token: '' '' "aes" '+' 856s | token: '' "aes" '+' "aes" '+' 856s | token: '+' "aes" '+' "3des" '-' 856s | appending IKE encryption algorithm AES_CBC[_0] 856s | token: '+' "3des" '-' "sha1" '+' 856s | appending IKE encryption algorithm AES_CBC[_0] 856s | token: '-' "sha1" '+' "sha1" '+' 856s | appending IKE encryption algorithm 3DES_CBC[_0] 856s algparse: discarding duplicate IKE encryption algorithm AES_CBC 856s | parsing prf: 856s | appending IKE PRF algorithm HMAC_SHA1[_0] 856s | token: '+' "sha1" '+' "sha2" '-' 856s | appending IKE PRF algorithm HMAC_SHA1[_0] 856s | token: '+' "sha2" '-' "modp8192" '+' 856s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 856s | token: '-' "modp8192" '+' "modp8192" '+' 856s algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 856s | - succeeded, advancing tokens 856s | parsing dh: 856s | appending IKE DH algorithm MODP8192[_0] 856s | token: '+' "modp8192" '+' "modp4096" '' 856s | appending IKE DH algorithm MODP8192[_0] 856s | token: '+' "modp4096" '' '' 856s | appending IKE DH algorithm MODP4096[_0] 856s | token: '' '' '' 856s algparse: discarding duplicate IKE DH algorithm MODP8192 856s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 856s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 856s | parsing 'aes+aes128+aes256' for IKE 856s | proposal: 'aes+aes128+aes256' 856s | token: '' '' "aes" '+' 856s | token: '' "aes" '+' "aes128" '+' 856s | token: '+' "aes128" '+' "aes256" '' 856s | appending IKE encryption algorithm AES_CBC[_0] 856s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 856s | token: '+' "aes256" '' '' 856s | appending IKE encryption algorithm AES_CBC[_128] 856s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 856s | token: '' '' '' 856s | appending IKE encryption algorithm AES_CBC[_256] 856s algparse: discarding duplicate IKE encryption algorithm AES_CBC_128 856s algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 856s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 856s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 856s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 856s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 856s | appending IKE DH algorithm MODP2048[_0] 856s | appending IKE DH algorithm MODP3072[_0] 856s | appending IKE DH algorithm MODP4096[_0] 856s | appending IKE DH algorithm MODP8192[_0] 856s | appending IKE DH algorithm DH19[_0] 856s | appending IKE DH algorithm DH20[_0] 856s | appending IKE DH algorithm DH21[_0] 856s | appending IKE DH algorithm DH31[_0] 856s AES_CBC-HMAC_SHA1-MODP8192 856s AES_CBC-HMAC_SHA2_256-MODP8192 856s algparse -v2 'ike=aes_gcm' 856s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 856s algparse -v2 'ike=aes_gcm-sha2' 856s AES_GCM_16-HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 856s algparse -v2 'ike=aes_gcm-sha2-modp2048' 856s AES_GCM_16-HMAC_SHA2_256-MODP2048 856s algparse -v2 'ike=aes_gcm-sha2;modp2048' 856s AES_GCM_16-HMAC_SHA2_256-MODP2048 856s algparse -v2 'ike=aes_gcm-modp2048' 856s ERROR: IKE PRF algorithm 'modp2048' is not recognized 856s algparse -v2 'ike=aes_gcm;modp2048' 856s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 856s algparse -v2 'ike=aes_gcm-none' 856s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 856s algparse -v2 'ike=aes_gcm-none-sha2' 856s AES_GCM_16-HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 856s algparse -v2 'ike=aes_gcm-none-sha2-modp2048' 856s AES_GCM_16-HMAC_SHA2_256-MODP2048 856s algparse -v2 'ike=aes_gcm-none-sha2;modp2048' 856s AES_GCM_16-HMAC_SHA2_256-MODP2048 856s algparse -v2 'ike=aes_gcm-none-modp2048' 856s ERROR: IKE PRF algorithm 'modp2048' is not recognized 856s algparse -v2 'ike=aes_gcm-none;modp2048' 856s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 856s algparse -v2 'ike=aes_gcm-sha1-none-modp2048' 856s ERROR: IKE proposal contains unexpected 'modp2048' 856s algparse -v2 'ike=aes_gcm-sha1-none;modp2048' 856s ERROR: IKE proposal contains unexpected 'modp2048' 856s algparse -v2 'ike=aes+aes_gcm' 856s ERROR: AEAD and non-AEAD IKE encryption algorithm cannot be combined 856s algparse -v2 'ike=,' 856s ERROR: IKE encryption algorithm is empty 856s algparse -v2 'ike=aes,' 856s ERROR: IKE encryption algorithm is empty 856s algparse -v2 'ike=aes,,aes' 856s ERROR: IKE encryption algorithm is empty 856s algparse -v2 'ike=,aes' 856s ERROR: IKE encryption algorithm is empty 856s algparse -v2 'ike=-' 856s ERROR: IKE encryption algorithm is empty 856s algparse -v2 'ike=+' 856s ERROR: IKE encryption algorithm is empty 856s algparse -v2 'ike=;' 856s ERROR: IKE encryption algorithm is empty 856s algparse -v2 'ike=aes-' 856s ERROR: IKE PRF algorithm is empty 856s algparse -v2 'ike=aes+' 856s ERROR: IKE encryption algorithm is empty 856s algparse -v2 'ike=aes;' 856s ERROR: IKE DH algorithm is empty 856s algparse -v2 'ike=-aes' 856s ERROR: IKE encryption algorithm is empty 856s algparse -v2 'ike=+aes' 856s ERROR: IKE encryption algorithm is empty 856s algparse -v2 'ike=;aes' 856s ERROR: IKE encryption algorithm is empty 856s algparse -v2 'ike=aes+-' 856s ERROR: IKE encryption algorithm is empty 856s algparse -v2 'ike=aes+;' 856s ERROR: IKE encryption algorithm is empty 856s algparse -v2 'ike=aes++' 856s ERROR: IKE encryption algorithm is empty 856s testing -ta 856s | parsing 'aes128+aes+aes256' for IKE 856s | proposal: 'aes128+aes+aes256' 856s | token: '' '' "aes128" '+' 856s | token: '' "aes128" '+' "aes" '+' 856s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 856s | token: '+' "aes" '+' "aes256" '' 856s | appending IKE encryption algorithm AES_CBC[_128] 856s | token: '+' "aes256" '' '' 856s | appending IKE encryption algorithm AES_CBC[_0] 856s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 856s | token: '' '' '' 856s | appending IKE encryption algorithm AES_CBC[_256] 856s algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 856s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 856s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 856s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 856s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 856s | appending IKE DH algorithm MODP2048[_0] 856s | appending IKE DH algorithm MODP3072[_0] 856s | appending IKE DH algorithm MODP4096[_0] 856s | appending IKE DH algorithm MODP8192[_0] 856s | appending IKE DH algorithm DH19[_0] 856s | appending IKE DH algorithm DH20[_0] 856s | appending IKE DH algorithm DH21[_0] 856s | appending IKE DH algorithm DH31[_0] 856s | parsing 'aes128+aes256+aes' for IKE 856s | proposal: 'aes128+aes256+aes' 856s | token: '' '' "aes128" '+' 856s | token: '' "aes128" '+' "aes256" '+' 856s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 856s | token: '+' "aes256" '+' "aes" '' 856s | appending IKE encryption algorithm AES_CBC[_128] 856s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 856s | token: '+' "aes" '' '' 856s | appending IKE encryption algorithm AES_CBC[_256] 856s | token: '' '' '' 856s | appending IKE encryption algorithm AES_CBC[_0] 856s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 856s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 856s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 856s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 856s | appending IKE DH algorithm MODP2048[_0] 856s | appending IKE DH algorithm MODP3072[_0] 856s | appending IKE DH algorithm MODP4096[_0] 856s | appending IKE DH algorithm MODP8192[_0] 856s | appending IKE DH algorithm DH19[_0] 856s | appending IKE DH algorithm DH20[_0] 856s | appending IKE DH algorithm DH21[_0] 856s | appending IKE DH algorithm DH31[_0] 856s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for IKE 856s | proposal: 'aes-sha1-modp8192' 856s | token: '' '' "aes" '-' 856s | token: '' "aes" '-' "sha1" '-' 856s | token: '-' "sha1" '-' "modp8192" '' 856s | appending IKE encryption algorithm AES_CBC[_0] 856s | parsing prf: 856s | appending IKE PRF algorithm HMAC_SHA1[_0] 856s | token: '-' "modp8192" '' '' 856s | - succeeded, advancing tokens 856s | parsing dh: 856s | appending IKE DH algorithm MODP8192[_0] 856s | token: '' '' '' 856s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 856s | proposal: 'aes-sha1-modp8192' 856s | token: '' '' "aes" '-' 856s | token: '' "aes" '-' "sha1" '-' 856s | token: '-' "sha1" '-' "modp8192" '' 856s | appending IKE encryption algorithm AES_CBC[_0] 856s | parsing prf: 856s | appending IKE PRF algorithm HMAC_SHA1[_0] 856s | token: '-' "modp8192" '' '' 856s | - succeeded, advancing tokens 856s | parsing dh: 856s | appending IKE DH algorithm MODP8192[_0] 856s | token: '' '' '' 856s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 856s | proposal: 'aes-sha1-modp8192' 856s | token: '' '' "aes" '-' 856s | token: '' "aes" '-' "sha1" '-' 856s | token: '-' "sha1" '-' "modp8192" '' 856s | appending IKE encryption algorithm AES_CBC[_0] 856s | parsing prf: 856s | appending IKE PRF algorithm HMAC_SHA1[_0] 856s | token: '-' "modp8192" '' '' 856s | - succeeded, advancing tokens 856s | parsing dh: 856s | appending IKE DH algorithm MODP8192[_0] 856s | token: '' '' '' 856s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 856s | parsing 'aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' for IKE 856s | proposal: 'aes-sha1-modp8192' 856s | token: '' '' "aes" '-' 856s | token: '' "aes" '-' "sha1" '-' 856s | token: '-' "sha1" '-' "modp8192" '' 856s | appending IKE encryption algorithm AES_CBC[_0] 856s | parsing prf: 856s | appending IKE PRF algorithm HMAC_SHA1[_0] 856s | token: '-' "modp8192" '' '' 856s | - succeeded, advancing tokens 856s | parsing dh: 856s | appending IKE DH algorithm MODP8192[_0] 856s | token: '' '' '' 856s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 856s | proposal: 'aes-sha2-modp8192' 856s | token: '' '' "aes" '-' 856s | token: '' "aes" '-' "sha2" '-' 856s | token: '-' "sha2" '-' "modp8192" '' 856s | appending IKE encryption algorithm AES_CBC[_0] 856s | parsing prf: 856s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 856s | token: '-' "modp8192" '' '' 856s | - succeeded, advancing tokens 856s | parsing dh: 856s | appending IKE DH algorithm MODP8192[_0] 856s | token: '' '' '' 856s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 856s | proposal: 'aes-sha1-modp8192' 856s | token: '' '' "aes" '-' 856s | token: '' "aes" '-' "sha1" '-' 856s | token: '-' "sha1" '-' "modp8192" '' 856s | appending IKE encryption algorithm AES_CBC[_0] 856s | parsing prf: 856s | appending IKE PRF algorithm HMAC_SHA1[_0] 856s | token: '-' "modp8192" '' '' 856s | - succeeded, advancing tokens 856s | parsing dh: 856s | appending IKE DH algorithm MODP8192[_0] 856s | token: '' '' '' 856s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 856s | parsing 'aes_gcm' for IKE 856s | proposal: 'aes_gcm' 856s | token: '' '' "aes_gcm" '' 856s | token: '' "aes_gcm" '' '' 856s | token: '' '' '' 856s | appending IKE encryption algorithm AES_GCM_16[_0] 856s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 856s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 856s | appending IKE integrity algorithm NONE[_0] 856s | appending IKE DH algorithm MODP2048[_0] 856s | appending IKE DH algorithm MODP3072[_0] 856s | appending IKE DH algorithm MODP4096[_0] 856s | appending IKE DH algorithm MODP8192[_0] 856s | appending IKE DH algorithm DH19[_0] 856s | appending IKE DH algorithm DH20[_0] 856s | appending IKE DH algorithm DH21[_0] 856s | appending IKE DH algorithm DH31[_0] 856s | parsing 'aes_gcm-sha2' for IKE 856s | proposal: 'aes_gcm-sha2' 856s | token: '' '' "aes_gcm" '-' 856s | token: '' "aes_gcm" '-' "sha2" '' 856s | token: '-' "sha2" '' '' 856s | appending IKE encryption algorithm AES_GCM_16[_0] 856s | parsing prf: 856s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 856s | token: '' '' '' 856s | - succeeded, advancing tokens 856s | appending IKE integrity algorithm NONE[_0] 856s | appending IKE DH algorithm MODP2048[_0] 856s | appending IKE DH algorithm MODP3072[_0] 856s | appending IKE DH algorithm MODP4096[_0] 856s | appending IKE DH algorithm MODP8192[_0] 856s | appending IKE DH algorithm DH19[_0] 856s | appending IKE DH algorithm DH20[_0] 856s | appending IKE DH algorithm DH21[_0] 856s | appending IKE DH algorithm DH31[_0] 856s | parsing 'aes_gcm-sha2-modp2048' for IKE 856s | proposal: 'aes_gcm-sha2-modp2048' 856s | token: '' '' "aes_gcm" '-' 856s | token: '' "aes_gcm" '-' "sha2" '-' 856s | token: '-' "sha2" '-' "modp2048" '' 856s | appending IKE encryption algorithm AES_GCM_16[_0] 856s | parsing prf: 856s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 856s | token: '-' "modp2048" '' '' 856s | - succeeded, advancing tokens 856s | parsing dh: 856s | appending IKE DH algorithm MODP2048[_0] 856s | token: '' '' '' 856s | appending IKE integrity algorithm NONE[_0] 856s | parsing 'aes_gcm-sha2;modp2048' for IKE 856s | proposal: 'aes_gcm-sha2;modp2048' 856s | token: '' '' "aes_gcm" '-' 856s | token: '' "aes_gcm" '-' "sha2" ';' 856s | token: '-' "sha2" ';' "modp2048" '' 856s | appending IKE encryption algorithm AES_GCM_16[_0] 856s | parsing prf: 856s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 856s | token: ';' "modp2048" '' '' 856s | - succeeded, advancing tokens 856s | parsing dh: 856s | appending IKE DH algorithm MODP2048[_0] 856s | token: '' '' '' 856s | appending IKE integrity algorithm NONE[_0] 856s | parsing 'aes_gcm-modp2048' for IKE 856s | proposal: 'aes_gcm-modp2048' 856s | token: '' '' "aes_gcm" '-' 856s | token: '' "aes_gcm" '-' "modp2048" '' 856s | token: '-' "modp2048" '' '' 856s | appending IKE encryption algorithm AES_GCM_16[_0] 856s | parsing prf: 856s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 856s | lookup for PRF algorithm 'modp2048' failed 856s | - failed, saving error 'IKE PRF algorithm 'modp2048' is not recognized' and tossing result 856s | parsing integ: 856s | ike_alg_byname() failed: IKE integrity algorithm 'modp2048' is not recognized 856s | lookup for integrity algorithm 'modp2048' failed 856s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'modp2048' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'modp2048' is not recognized') 856s | parsing 'aes_gcm;modp2048' for IKE 856s | proposal: 'aes_gcm;modp2048' 856s | token: '' '' "aes_gcm" ';' 856s | token: '' "aes_gcm" ';' "modp2048" '' 856s | token: ';' "modp2048" '' '' 856s | appending IKE encryption algorithm AES_GCM_16[_0] 856s | parsing dh: 856s | appending IKE DH algorithm MODP2048[_0] 856s | token: '' '' '' 856s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 856s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 856s | appending IKE integrity algorithm NONE[_0] 856s | parsing 'aes_gcm-none' for IKE 856s | proposal: 'aes_gcm-none' 856s | token: '' '' "aes_gcm" '-' 856s | token: '' "aes_gcm" '-' "none" '' 856s | token: '-' "none" '' '' 856s | appending IKE encryption algorithm AES_GCM_16[_0] 856s | parsing prf: 856s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 856s | lookup for PRF algorithm 'none' failed 856s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 856s | parsing integ: 856s | appending IKE integrity algorithm NONE[_0] 856s | token: '' '' '' 856s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 856s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 856s | appending IKE DH algorithm MODP2048[_0] 856s | appending IKE DH algorithm MODP3072[_0] 856s | appending IKE DH algorithm MODP4096[_0] 856s | appending IKE DH algorithm MODP8192[_0] 856s | appending IKE DH algorithm DH19[_0] 856s | appending IKE DH algorithm DH20[_0] 856s | appending IKE DH algorithm DH21[_0] 856s | appending IKE DH algorithm DH31[_0] 856s | parsing 'aes_gcm-none-sha2' for IKE 856s | proposal: 'aes_gcm-none-sha2' 856s | token: '' '' "aes_gcm" '-' 856s | token: '' "aes_gcm" '-' "none" '-' 856s | token: '-' "none" '-' "sha2" '' 856s | appending IKE encryption algorithm AES_GCM_16[_0] 856s | parsing prf: 856s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 856s | lookup for PRF algorithm 'none' failed 856s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 856s | parsing integ: 856s | appending IKE integrity algorithm NONE[_0] 856s | token: '-' "sha2" '' '' 856s | parsing prf: 856s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 856s | token: '' '' '' 856s | appending IKE DH algorithm MODP2048[_0] 856s | appending IKE DH algorithm MODP3072[_0] 856s | appending IKE DH algorithm MODP4096[_0] 856s | appending IKE DH algorithm MODP8192[_0] 856s | appending IKE DH algorithm DH19[_0] 856s | appending IKE DH algorithm DH20[_0] 856s | appending IKE DH algorithm DH21[_0] 856s | appending IKE DH algorithm DH31[_0] 856s | parsing 'aes_gcm-none-sha2-modp2048' for IKE 856s | proposal: 'aes_gcm-none-sha2-modp2048' 856s | token: '' '' "aes_gcm" '-' 856s | token: '' "aes_gcm" '-' "none" '-' 856s | token: '-' "none" '-' "sha2" '-' 856s | appending IKE encryption algorithm AES_GCM_16[_0] 856s | parsing prf: 856s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 856s | lookup for PRF algorithm 'none' failed 856s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 856s | parsing integ: 856s | appending IKE integrity algorithm NONE[_0] 856s | token: '-' "sha2" '-' "modp2048" '' 856s | parsing prf: 856s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 856s | token: '-' "modp2048" '' '' 856s | parsing dh: 856s | appending IKE DH algorithm MODP2048[_0] 856s | token: '' '' '' 856s | parsing 'aes_gcm-none-sha2;modp2048' for IKE 856s | proposal: 'aes_gcm-none-sha2;modp2048' 856s | token: '' '' "aes_gcm" '-' 856s | token: '' "aes_gcm" '-' "none" '-' 856s | token: '-' "none" '-' "sha2" ';' 856s | appending IKE encryption algorithm AES_GCM_16[_0] 856s | parsing prf: 856s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 856s | lookup for PRF algorithm 'none' failed 856s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 856s | parsing integ: 856s | appending IKE integrity algorithm NONE[_0] 856s | token: '-' "sha2" ';' "modp2048" '' 856s | parsing prf: 856s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 856s | token: ';' "modp2048" '' '' 856s | parsing dh: 856s | appending IKE DH algorithm MODP2048[_0] 856s | token: '' '' '' 856s | parsing 'aes_gcm-none-modp2048' for IKE 856s | proposal: 'aes_gcm-none-modp2048' 856s | token: '' '' "aes_gcm" '-' 856s | token: '' "aes_gcm" '-' "none" '-' 856s | token: '-' "none" '-' "modp2048" '' 856s | appending IKE encryption algorithm AES_GCM_16[_0] 856s | parsing prf: 856s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 856s | lookup for PRF algorithm 'none' failed 856s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 856s | parsing integ: 856s | appending IKE integrity algorithm NONE[_0] 856s | token: '-' "modp2048" '' '' 856s | parsing prf: 856s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 856s | lookup for PRF algorithm 'modp2048' failed 856s | -- failed 'IKE PRF algorithm 'modp2048' is not recognized' 856s | parsing 'aes_gcm-none;modp2048' for IKE 856s | proposal: 'aes_gcm-none;modp2048' 856s | token: '' '' "aes_gcm" '-' 856s | token: '' "aes_gcm" '-' "none" ';' 856s | token: '-' "none" ';' "modp2048" '' 856s | appending IKE encryption algorithm AES_GCM_16[_0] 856s | parsing prf: 856s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 856s | lookup for PRF algorithm 'none' failed 856s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 856s | parsing integ: 856s | appending IKE integrity algorithm NONE[_0] 856s | token: ';' "modp2048" '' '' 856s | parsing dh: 856s | appending IKE DH algorithm MODP2048[_0] 856s | token: '' '' '' 856s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 856s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 856s | parsing 'aes_gcm-sha1-none-modp2048' for IKE 856s | proposal: 'aes_gcm-sha1-none-modp2048' 856s | token: '' '' "aes_gcm" '-' 856s | token: '' "aes_gcm" '-' "sha1" '-' 856s | token: '-' "sha1" '-' "none" '-' 856s | appending IKE encryption algorithm AES_GCM_16[_0] 856s | parsing prf: 856s | appending IKE PRF algorithm HMAC_SHA1[_0] 856s | token: '-' "none" '-' "modp2048" '' 856s | - succeeded, advancing tokens 856s | parsing dh: 856s | appending IKE DH algorithm NONE[_0] 856s | token: '-' "modp2048" '' '' 856s | parsing 'aes_gcm-sha1-none;modp2048' for IKE 856s | proposal: 'aes_gcm-sha1-none;modp2048' 856s | token: '' '' "aes_gcm" '-' 856s | token: '' "aes_gcm" '-' "sha1" '-' 856s | token: '-' "sha1" '-' "none" ';' 856s | appending IKE encryption algorithm AES_GCM_16[_0] 856s | parsing prf: 856s | appending IKE PRF algorithm HMAC_SHA1[_0] 856s | token: '-' "none" ';' "modp2048" '' 856s | - succeeded, advancing tokens 856s | parsing dh: 856s | appending IKE DH algorithm NONE[_0] 856s | token: ';' "modp2048" '' '' 856s | parsing 'aes+aes_gcm' for IKE 856s | proposal: 'aes+aes_gcm' 856s | token: '' '' "aes" '+' 856s | token: '' "aes" '+' "aes_gcm" '' 856s | token: '+' "aes_gcm" '' '' 856s | appending IKE encryption algorithm AES_CBC[_0] 856s | token: '' '' '' 856s | appending IKE encryption algorithm AES_GCM_16[_0] 856s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 856s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 856s | appending IKE DH algorithm MODP2048[_0] 856s | appending IKE DH algorithm MODP3072[_0] 856s | appending IKE DH algorithm MODP4096[_0] 856s | appending IKE DH algorithm MODP8192[_0] 856s | appending IKE DH algorithm DH19[_0] 856s | appending IKE DH algorithm DH20[_0] 856s | appending IKE DH algorithm DH21[_0] 856s | appending IKE DH algorithm DH31[_0] 856s | parsing ',' for IKE 856s | proposal: '' 856s | token: '' '' "" '' 856s | token: '' "" '' '' 856s | parsing 'aes,' for IKE 856s | proposal: 'aes' 856s | token: '' '' "aes" '' 856s | token: '' "aes" '' '' 856s | token: '' '' '' 856s | appending IKE encryption algorithm AES_CBC[_0] 856s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 856s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 856s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 856s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 856s | appending IKE DH algorithm MODP2048[_0] 856s | appending IKE DH algorithm MODP3072[_0] 856s | appending IKE DH algorithm MODP4096[_0] 856s | appending IKE DH algorithm MODP8192[_0] 856s | appending IKE DH algorithm DH19[_0] 856s | appending IKE DH algorithm DH20[_0] 856s | appending IKE DH algorithm DH21[_0] 856s | appending IKE DH algorithm DH31[_0] 856s | proposal: '' 856s | token: '' '' "" '' 856s | token: '' "" '' '' 856s | parsing 'aes,,aes' for IKE 856s | proposal: 'aes' 856s | token: '' '' "aes" '' 856s | token: '' "aes" '' '' 856s | token: '' '' '' 856s | appending IKE encryption algorithm AES_CBC[_0] 856s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 856s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 856s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 856s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 856s | appending IKE DH algorithm MODP2048[_0] 856s | appending IKE DH algorithm MODP3072[_0] 856s | appending IKE DH algorithm MODP4096[_0] 856s | appending IKE DH algorithm MODP8192[_0] 856s | appending IKE DH algorithm DH19[_0] 856s | appending IKE DH algorithm DH20[_0] 856s | appending IKE DH algorithm DH21[_0] 856s | appending IKE DH algorithm DH31[_0] 856s | proposal: '' 856s | token: '' '' "" '' 856s | token: '' "" '' '' 856s | parsing ',aes' for IKE 856s | proposal: '' 856s | token: '' '' "" '' 856s | token: '' "" '' '' 856s | parsing '-' for IKE 856s | proposal: '-' 856s | token: '' '' "" '-' 856s | token: '' "" '-' "" '' 856s | parsing '+' for IKE 856s | proposal: '+' 856s | token: '' '' "" '+' 856s | token: '' "" '+' "" '' 856s | parsing ';' for IKE 856s | proposal: ';' 856s | token: '' '' "" ';' 856s | token: '' "" ';' "" '' 856s | parsing 'aes-' for IKE 856s | proposal: 'aes-' 856s | token: '' '' "aes" '-' 856s | token: '' "aes" '-' "" '' 856s | token: '-' "" '' '' 856s | appending IKE encryption algorithm AES_CBC[_0] 856s | parsing prf: 856s | - failed, saving error 'IKE PRF algorithm is empty' and tossing result 856s | parsing integ: 856s | - and - failed, returning earlier PRF error 'IKE PRF algorithm is empty' and discarding INTEG error 'IKE integrity algorithm is empty') 856s | parsing 'aes+' for IKE 856s | proposal: 'aes+' 856s | token: '' '' "aes" '+' 856s | token: '' "aes" '+' "" '' 856s | token: '+' "" '' '' 856s | appending IKE encryption algorithm AES_CBC[_0] 856s | parsing 'aes;' for IKE 856s | proposal: 'aes;' 856s | token: '' '' "aes" ';' 856s | token: '' "aes" ';' "" '' 856s | token: ';' "" '' '' 856s | appending IKE encryption algorithm AES_CBC[_0] 856s | parsing dh: 856s | ... failed 'IKE DH algorithm is empty' 856s | parsing '-aes' for IKE 856s | proposal: '-aes' 856s | token: '' '' "" '-' 856s | token: '' "" '-' "aes" '' 856s | parsing '+aes' for IKE 856s | proposal: '+aes' 856s | token: '' '' "" '+' 856s | token: '' "" '+' "aes" '' 856s | parsing ';aes' for IKE 856s | proposal: ';aes' 856s | token: '' '' "" ';' 856s | token: '' "" ';' "aes" '' 856s | parsing 'aes+-' for IKE 856s | proposal: 'aes+-' 856s | token: '' '' "aes" '+' 856s | token: '' "aes" '+' "" '-' 856s | token: '+' "" '-' "" '' 856s | appending IKE encryption algorithm AES_CBC[_0] 856s | parsing 'aes+;' for IKE 856s | proposal: 'aes+;' 856s | token: '' '' "aes" '+' 856s | token: '' "aes" '+' "" ';' 856s | token: '+' "" ';' "" '' 856s | appending IKE encryption algorithm AES_CBC[_0] 856s | parsing 'aes++' for IKE 856s | proposal: 'aes++' 856s | token: '' '' "aes" '+' 856s | token: '' "aes" '+' "" '+' 856s | token: '+' "" '+' "" '' 856s | appending IKE encryption algorithm AES_CBC[_0] 856s algparse: leak detective found no leaks 856s algparse: Encryption algorithms: 856s algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 856s algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 856s algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 856s algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 856s algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 856s algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 856s algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm, aes_gcm_c 856s algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_b 856s algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_a 856s algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 856s algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 856s algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 856s algparse: NULL [] IKEv1: ESP IKEv2: ESP 856s algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 856s algparse: Hash algorithms: 856s algparse: MD5 IKEv1: IKE IKEv2: NSS 856s algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 856s algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 856s algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 856s algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 856s algparse: IDENTITY IKEv1: IKEv2: FIPS 856s algparse: PRF algorithms: 856s algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE native(HMAC) md5 856s algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 856s algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 856s algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 856s algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 856s algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 856s algparse: Integrity algorithms: 856s algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH native(HMAC) md5, hmac_md5 856s algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 856s algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 856s algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 856s algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 856s algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 856s algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 856s algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 856s algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 856s algparse: DH algorithms: 856s algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 856s algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 856s algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 856s algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 856s algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 856s algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 856s algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 856s algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 856s algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 856s algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 856s algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 856s algparse: IPCOMP algorithms: 856s algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 856s algparse: LZS IKEv1: IKEv2: ESP AH FIPS 856s algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 856s algparse: testing CAMELLIA_CBC: 856s algparse: Camellia: 16 bytes with 128-bit key 856s | decode_to_chunk: raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 856s | decode_to_chunk: output: 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cf00 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: CAMELLIA_CBC 856s | flags: ENCRYPT+DECRYPT 856s | key_size: 16-bytes 856s | base: base-key@0x18647deccce0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cf00 856s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 856s | decode_to_chunk: output: 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | decode_to_chunk: new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 856s | decode_to_chunk: output: 856s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 856s | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 856s | decode_to_chunk: output: 856s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | decode_to_chunk: ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 856s | decode_to_chunk: output: 856s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 856s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 856s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 856s | verify_chunk_data: encrypt: ok 856s | verify_chunk_data: updated CBC IV: ok 856s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 856s | decode_to_chunk: output: 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | decode_to_chunk: new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 856s | decode_to_chunk: output: 856s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 856s | decode_to_chunk: ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 856s | decode_to_chunk: output: 856s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 856s | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 856s | decode_to_chunk: output: 856s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 856s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 856s | verify_chunk_data: decrypt: ok 856s | verify_chunk_data: updated CBC IV: ok 856s | test_ctr_vector: Camellia: 16 bytes with 128-bit key passed 856s algparse: Camellia: 16 bytes with 128-bit key 856s | decode_to_chunk: raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF" 856s | decode_to_chunk: output: 856s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cf00 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: CAMELLIA_CBC 856s | flags: ENCRYPT+DECRYPT 856s | key_size: 16-bytes 856s | base: base-key@0x18647deccce0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cf00 856s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 856s | decode_to_chunk: output: 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | decode_to_chunk: new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 856s | decode_to_chunk: output: 856s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 856s | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 856s | decode_to_chunk: output: 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 856s | decode_to_chunk: ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 856s | decode_to_chunk: output: 856s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 856s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 856s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 856s | verify_chunk_data: encrypt: ok 856s | verify_chunk_data: updated CBC IV: ok 856s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 856s | decode_to_chunk: output: 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | decode_to_chunk: new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 856s | decode_to_chunk: output: 856s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 856s | decode_to_chunk: ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 856s | decode_to_chunk: output: 856s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 856s | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 856s | decode_to_chunk: output: 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 856s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 856s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 856s | verify_chunk_data: decrypt: ok 856s | verify_chunk_data: updated CBC IV: ok 856s | test_ctr_vector: Camellia: 16 bytes with 128-bit key passed 856s algparse: Camellia: 16 bytes with 256-bit key 856s | decode_to_chunk: raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 856s | decode_to_chunk: output: 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cf00 856s | key-offset: 0, key-size: 32 856s | EXTRACT_KEY_FROM_KEY: 856s | target: CAMELLIA_CBC 856s | flags: ENCRYPT+DECRYPT 856s | key_size: 32-bytes 856s | base: base-key@0x18647deccce0 (48-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cf00 856s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 856s | decode_to_chunk: output: 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | decode_to_chunk: new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 856s | decode_to_chunk: output: 856s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 856s | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 856s | decode_to_chunk: output: 856s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | decode_to_chunk: ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 856s | decode_to_chunk: output: 856s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 856s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 856s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 856s | verify_chunk_data: encrypt: ok 856s | verify_chunk_data: updated CBC IV: ok 856s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 856s | decode_to_chunk: output: 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | decode_to_chunk: new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 856s | decode_to_chunk: output: 856s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 856s | decode_to_chunk: ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 856s | decode_to_chunk: output: 856s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 856s | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 856s | decode_to_chunk: output: 856s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 856s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 856s | verify_chunk_data: decrypt: ok 856s | verify_chunk_data: updated CBC IV: ok 856s | test_ctr_vector: Camellia: 16 bytes with 256-bit key passed 856s algparse: Camellia: 16 bytes with 256-bit key 856s | decode_to_chunk: raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF FF EE DD CC BB AA 99 88 77 66 55 44 33 22 11 00" 856s | decode_to_chunk: output: 856s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 856s | ff ee dd cc bb aa 99 88 77 66 55 44 33 22 11 00 ........wfUD3".. 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cf00 856s | key-offset: 0, key-size: 32 856s | EXTRACT_KEY_FROM_KEY: 856s | target: CAMELLIA_CBC 856s | flags: ENCRYPT+DECRYPT 856s | key_size: 32-bytes 856s | base: base-key@0x18647deccce0 (48-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cf00 856s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 856s | decode_to_chunk: output: 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | decode_to_chunk: new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 856s | decode_to_chunk: output: 856s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 856s | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 856s | decode_to_chunk: output: 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 856s | decode_to_chunk: ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 856s | decode_to_chunk: output: 856s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 856s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 856s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 856s | verify_chunk_data: encrypt: ok 856s | verify_chunk_data: updated CBC IV: ok 856s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 856s | decode_to_chunk: output: 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | decode_to_chunk: new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 856s | decode_to_chunk: output: 856s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 856s | decode_to_chunk: ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 856s | decode_to_chunk: output: 856s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 856s | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 856s | decode_to_chunk: output: 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 856s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 856s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 856s | verify_chunk_data: decrypt: ok 856s | verify_chunk_data: updated CBC IV: ok 856s | test_ctr_vector: Camellia: 16 bytes with 256-bit key passed 856s algparse: testing AES_GCM_16: 856s algparse: empty string 856s | decode_to_chunk: raw_key: input "0xcf063a34d4a9a76c2c86787d3f96db71" 856s | decode_to_chunk: output: 856s | cf 06 3a 34 d4 a9 a7 6c 2c 86 78 7d 3f 96 db 71 ..:4...l,.x}?..q 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0ce60 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_GCM 856s | flags: ENCRYPT+DECRYPT 856s | key_size: 16-bytes 856s | base: base-key@0x18647deccce0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0ce60 856s | decode_to_chunk: salted IV: input "0x113b9785971864c83b01c787" 856s | decode_to_chunk: output: 856s | 11 3b 97 85 97 18 64 c8 3b 01 c7 87 .;....d.;... 856s | decode_to_chunk: AAD: input "" 856s | decode_to_chunk: output: 856s | 856s | decode_to_chunk: plaintext: input "" 856s | decode_to_chunk: output: 856s | 856s | decode_to_chunk: ciphertext: input "" 856s | decode_to_chunk: output: 856s | 856s | decode_to_chunk: tag: input "0x72ac8493e3a5228b5d130a69d2510e42" 856s | decode_to_chunk: output: 856s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 856s | test_gcm_vector: decrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 856s | test_gcm_vector: text+tag on call 856s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 856s | verify_chunk_data: output ciphertext: ok 856s | verify_chunk_data: TAG: ok 856s | test_gcm_vector: text+tag on return 856s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 856s | test_gcm_vector: encrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 856s | test_gcm_vector: text+tag on call 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | verify_chunk_data: output ciphertext: ok 856s | verify_chunk_data: TAG: ok 856s | test_gcm_vector: text+tag on return 856s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 856s | test_gcm_vector: passed 856s algparse: one block 856s | decode_to_chunk: raw_key: input "0xe98b72a9881a84ca6b76e0f43e68647a" 856s | decode_to_chunk: output: 856s | e9 8b 72 a9 88 1a 84 ca 6b 76 e0 f4 3e 68 64 7a ..r.....kv..>hdz 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0ce60 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_GCM 856s | flags: ENCRYPT+DECRYPT 856s | key_size: 16-bytes 856s | base: base-key@0x18647deccce0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0ce60 856s | decode_to_chunk: salted IV: input "0x8b23299fde174053f3d652ba" 856s | decode_to_chunk: output: 856s | 8b 23 29 9f de 17 40 53 f3 d6 52 ba .#)...@S..R. 856s | decode_to_chunk: AAD: input "" 856s | decode_to_chunk: output: 856s | 856s | decode_to_chunk: plaintext: input "0x28286a321293253c3e0aa2704a278032" 856s | decode_to_chunk: output: 856s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 856s | decode_to_chunk: ciphertext: input "0x5a3c1cf1985dbb8bed818036fdd5ab42" 856s | decode_to_chunk: output: 856s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 856s | decode_to_chunk: tag: input "0x23c7ab0f952b7091cd324835043b5eb5" 856s | decode_to_chunk: output: 856s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 856s | test_gcm_vector: decrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 856s | test_gcm_vector: text+tag on call 856s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 856s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 856s | verify_chunk_data: output ciphertext: ok 856s | verify_chunk_data: TAG: ok 856s | test_gcm_vector: text+tag on return 856s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 856s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 856s | test_gcm_vector: encrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 856s | test_gcm_vector: text+tag on call 856s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | verify_chunk_data: output ciphertext: ok 856s | verify_chunk_data: TAG: ok 856s | test_gcm_vector: text+tag on return 856s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 856s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 856s | test_gcm_vector: passed 856s algparse: two blocks 856s | decode_to_chunk: raw_key: input "0xbfd414a6212958a607a0f5d3ab48471d" 856s | decode_to_chunk: output: 856s | bf d4 14 a6 21 29 58 a6 07 a0 f5 d3 ab 48 47 1d ....!)X......HG. 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0ce60 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_GCM 856s | flags: ENCRYPT+DECRYPT 856s | key_size: 16-bytes 856s | base: base-key@0x18647deccce0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0ce60 856s | decode_to_chunk: salted IV: input "0x86d8ea0ab8e40dcc481cd0e2" 856s | decode_to_chunk: output: 856s | 86 d8 ea 0a b8 e4 0d cc 48 1c d0 e2 ........H... 856s | decode_to_chunk: AAD: input "" 856s | decode_to_chunk: output: 856s | 856s | decode_to_chunk: plaintext: input "0xa6b76a066e63392c9443e60272ceaeb9d25c991b0f2e55e2804e168c05ea591a" 856s | decode_to_chunk: output: 856s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 856s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 856s | decode_to_chunk: ciphertext: input "0x62171db33193292d930bf6647347652c1ef33316d7feca99d54f1db4fcf513f8" 856s | decode_to_chunk: output: 856s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 856s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 856s | decode_to_chunk: tag: input "0xc28280aa5c6c7a8bd366f28c1cfd1f6e" 856s | decode_to_chunk: output: 856s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 856s | test_gcm_vector: decrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 856s | test_gcm_vector: text+tag on call 856s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 856s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 856s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 856s | verify_chunk_data: output ciphertext: ok 856s | verify_chunk_data: TAG: ok 856s | test_gcm_vector: text+tag on return 856s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 856s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 856s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 856s | test_gcm_vector: encrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 856s | test_gcm_vector: text+tag on call 856s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 856s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | verify_chunk_data: output ciphertext: ok 856s | verify_chunk_data: TAG: ok 856s | test_gcm_vector: text+tag on return 856s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 856s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 856s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 856s | test_gcm_vector: passed 856s algparse: two blocks with associated data 856s | decode_to_chunk: raw_key: input "0x006c458100fc5f4d62949d2c833b82d1" 856s | decode_to_chunk: output: 856s | 00 6c 45 81 00 fc 5f 4d 62 94 9d 2c 83 3b 82 d1 .lE..._Mb..,.;.. 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0ce60 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_GCM 856s | flags: ENCRYPT+DECRYPT 856s | key_size: 16-bytes 856s | base: base-key@0x18647deccce0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0ce60 856s | decode_to_chunk: salted IV: input "0xa4e9c4bc5725a21ff42c82b2" 856s | decode_to_chunk: output: 856s | a4 e9 c4 bc 57 25 a2 1f f4 2c 82 b2 ....W%...,.. 856s | decode_to_chunk: AAD: input "0x2efb14fb3657cdd6b9a8ff1a5f5a39b9" 856s | decode_to_chunk: output: 856s | 2e fb 14 fb 36 57 cd d6 b9 a8 ff 1a 5f 5a 39 b9 ....6W......_Z9. 856s | decode_to_chunk: plaintext: input "0xf381d3bfbee0a879f7a4e17b623278cedd6978053dd313530a18f1a836100950" 856s | decode_to_chunk: output: 856s | f3 81 d3 bf be e0 a8 79 f7 a4 e1 7b 62 32 78 ce .......y...{b2x. 856s | dd 69 78 05 3d d3 13 53 0a 18 f1 a8 36 10 09 50 .ix.=..S....6..P 856s | decode_to_chunk: ciphertext: input "0xf39b4db3542d8542fb73fd2d66be568f26d7f814b3f87d1eceac3dd09a8d697e" 856s | decode_to_chunk: output: 856s | f3 9b 4d b3 54 2d 85 42 fb 73 fd 2d 66 be 56 8f ..M.T-.B.s.-f.V. 856s | 26 d7 f8 14 b3 f8 7d 1e ce ac 3d d0 9a 8d 69 7e &.....}...=...i~ 856s | decode_to_chunk: tag: input "0x39f045cb23b698c925db134d56c5" 856s | decode_to_chunk: output: 856s | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 9.E.#...%..MV. 856s | test_gcm_vector: decrypt: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=14 856s | test_gcm_vector: text+tag on call 856s | f3 9b 4d b3 54 2d 85 42 fb 73 fd 2d 66 be 56 8f ..M.T-.B.s.-f.V. 856s | 26 d7 f8 14 b3 f8 7d 1e ce ac 3d d0 9a 8d 69 7e &.....}...=...i~ 856s | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 9.E.#...%..MV. 856s | verify_chunk_data: output ciphertext: ok 856s | verify_chunk_data: TAG: ok 856s | test_gcm_vector: text+tag on return 856s | f3 81 d3 bf be e0 a8 79 f7 a4 e1 7b 62 32 78 ce .......y...{b2x. 856s | dd 69 78 05 3d d3 13 53 0a 18 f1 a8 36 10 09 50 .ix.=..S....6..P 856s | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 9.E.#...%..MV. 856s | test_gcm_vector: encrypt: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=14 856s | test_gcm_vector: text+tag on call 856s | f3 81 d3 bf be e0 a8 79 f7 a4 e1 7b 62 32 78 ce .......y...{b2x. 856s | dd 69 78 05 3d d3 13 53 0a 18 f1 a8 36 10 09 50 .ix.=..S....6..P 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .............. 856s | verify_chunk_data: output ciphertext: ok 856s | verify_chunk_data: TAG: ok 856s | test_gcm_vector: text+tag on return 856s | f3 9b 4d b3 54 2d 85 42 fb 73 fd 2d 66 be 56 8f ..M.T-.B.s.-f.V. 856s | 26 d7 f8 14 b3 f8 7d 1e ce ac 3d d0 9a 8d 69 7e &.....}...=...i~ 856s | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 9.E.#...%..MV. 856s | test_gcm_vector: passed 856s algparse: testing AES_CTR: 856s algparse: Encrypting 16 octets using AES-CTR with 128-bit key 856s | decode_to_chunk: raw_key: input "0x AE 68 52 F8 12 10 67 CC 4B F7 A5 76 55 77 F3 9E" 856s | decode_to_chunk: output: 856s | ae 68 52 f8 12 10 67 cc 4b f7 a5 76 55 77 f3 9e .hR...g.K..vUw.. 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cef0 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_CTR 856s | flags: ENCRYPT+DECRYPT 856s | key_size: 16-bytes 856s | base: base-key@0x18647deccce0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cef0 856s | decode_to_chunk: input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 856s | decode_to_chunk: output: 856s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 856s | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 856s | decode_to_chunk: output: 856s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 856s | decode_to_chunk: Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 856s | decode_to_chunk: output: 856s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 856s | decode_to_chunk: expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 856s | decode_to_chunk: output: 856s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 856s | do_aes_ctr: enter 856s | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes 856s | do_aes_ctr: exit 856s | verify_chunk_data: encrypt: ok 856s | verify_chunk_data: counter-block: ok 856s | decode_to_chunk: input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 856s | decode_to_chunk: output: 856s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 856s | decode_to_chunk: Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 856s | decode_to_chunk: output: 856s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 856s | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 856s | decode_to_chunk: output: 856s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 856s | decode_to_chunk: expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 856s | decode_to_chunk: output: 856s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 856s | do_aes_ctr: enter 856s | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes 856s | do_aes_ctr: exit 856s | verify_chunk_data: decrypt: ok 856s | verify_chunk_data: counter-block: ok 856s | test_ctr_vector: Encrypting 16 octets using AES-CTR with 128-bit key passed 856s algparse: Encrypting 32 octets using AES-CTR with 128-bit key 856s | decode_to_chunk: raw_key: input "0x 7E 24 06 78 17 FA E0 D7 43 D6 CE 1F 32 53 91 63" 856s | decode_to_chunk: output: 856s | 7e 24 06 78 17 fa e0 d7 43 d6 ce 1f 32 53 91 63 ~$.x....C...2S.c 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cef0 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_CTR 856s | flags: ENCRYPT+DECRYPT 856s | key_size: 16-bytes 856s | base: base-key@0x18647deccce0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cef0 856s | decode_to_chunk: input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 856s | decode_to_chunk: output: 856s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 856s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 856s | decode_to_chunk: output: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 856s | decode_to_chunk: Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 856s | decode_to_chunk: output: 856s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 856s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 856s | decode_to_chunk: expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 856s | decode_to_chunk: output: 856s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 .l...T;Y.H...... 856s | do_aes_ctr: enter 856s | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes 856s | do_aes_ctr: exit 856s | verify_chunk_data: encrypt: ok 856s | verify_chunk_data: counter-block: ok 856s | decode_to_chunk: input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 856s | decode_to_chunk: output: 856s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 856s | decode_to_chunk: Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 856s | decode_to_chunk: output: 856s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 856s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 856s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 856s | decode_to_chunk: output: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 856s | decode_to_chunk: expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 856s | decode_to_chunk: output: 856s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 .l...T;Y.H...... 856s | do_aes_ctr: enter 856s | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes 856s | do_aes_ctr: exit 856s | verify_chunk_data: decrypt: ok 856s | verify_chunk_data: counter-block: ok 856s | test_ctr_vector: Encrypting 32 octets using AES-CTR with 128-bit key passed 856s algparse: Encrypting 36 octets using AES-CTR with 128-bit key 856s | decode_to_chunk: raw_key: input "0x 76 91 BE 03 5E 50 20 A8 AC 6E 61 85 29 F9 A0 DC" 856s | decode_to_chunk: output: 856s | 76 91 be 03 5e 50 20 a8 ac 6e 61 85 29 f9 a0 dc v...^P ..na.)... 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cef0 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_CTR 856s | flags: ENCRYPT+DECRYPT 856s | key_size: 16-bytes 856s | base: base-key@0x18647deccce0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cef0 856s | decode_to_chunk: input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 856s | decode_to_chunk: output: 856s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 856s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 856s | decode_to_chunk: output: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 856s | 20 21 22 23 !"# 856s | decode_to_chunk: Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 856s | decode_to_chunk: output: 856s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 856s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 856s | 25 b2 07 2f %../ 856s | decode_to_chunk: expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 856s | decode_to_chunk: output: 856s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 856s | do_aes_ctr: enter 856s | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes 856s | do_aes_ctr: exit 856s | verify_chunk_data: encrypt: ok 856s | verify_chunk_data: counter-block: ok 856s | decode_to_chunk: input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 856s | decode_to_chunk: output: 856s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 856s | decode_to_chunk: Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 856s | decode_to_chunk: output: 856s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 856s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 856s | 25 b2 07 2f %../ 856s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 856s | decode_to_chunk: output: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 856s | 20 21 22 23 !"# 856s | decode_to_chunk: expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 856s | decode_to_chunk: output: 856s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 856s | do_aes_ctr: enter 856s | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes 856s | do_aes_ctr: exit 856s | verify_chunk_data: decrypt: ok 856s | verify_chunk_data: counter-block: ok 856s | test_ctr_vector: Encrypting 36 octets using AES-CTR with 128-bit key passed 856s algparse: Encrypting 16 octets using AES-CTR with 192-bit key 856s | decode_to_chunk: raw_key: input "0x16 AF 5B 14 5F C9 F5 79 C1 75 F9 3E 3B FB 0E ED86 3D 06 CC FD B7 85 15" 856s | decode_to_chunk: output: 856s | 16 af 5b 14 5f c9 f5 79 c1 75 f9 3e 3b fb 0e ed ..[._..y.u.>;... 856s | 86 3d 06 cc fd b7 85 15 .=...... 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cef0 856s | key-offset: 0, key-size: 24 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_CTR 856s | flags: ENCRYPT+DECRYPT 856s | key_size: 24-bytes 856s | base: base-key@0x18647deccce0 (40-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cef0 856s | decode_to_chunk: input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 856s | decode_to_chunk: output: 856s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 856s | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 856s | decode_to_chunk: output: 856s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 856s | decode_to_chunk: Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 856s | decode_to_chunk: output: 856s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 856s | decode_to_chunk: expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 856s | decode_to_chunk: output: 856s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 856s | do_aes_ctr: enter 856s | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes 856s | do_aes_ctr: exit 856s | verify_chunk_data: encrypt: ok 856s | verify_chunk_data: counter-block: ok 856s | decode_to_chunk: input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 856s | decode_to_chunk: output: 856s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 856s | decode_to_chunk: Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 856s | decode_to_chunk: output: 856s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 856s | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 856s | decode_to_chunk: output: 856s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 856s | decode_to_chunk: expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 856s | decode_to_chunk: output: 856s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 856s | do_aes_ctr: enter 856s | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes 856s | do_aes_ctr: exit 856s | verify_chunk_data: decrypt: ok 856s | verify_chunk_data: counter-block: ok 856s | test_ctr_vector: Encrypting 16 octets using AES-CTR with 192-bit key passed 856s algparse: Encrypting 32 octets using AES-CTR with 192-bit key 856s | decode_to_chunk: raw_key: input "0x7C 5C B2 40 1B 3D C3 3C 19 E7 34 08 19 E0 F6 9C67 8C 3D B8 E6 F6 A9 1A" 856s | decode_to_chunk: output: 856s | 7c 5c b2 40 1b 3d c3 3c 19 e7 34 08 19 e0 f6 9c |\.@.=.<..4..... 856s | 67 8c 3d b8 e6 f6 a9 1a g.=..... 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cef0 856s | key-offset: 0, key-size: 24 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_CTR 856s | flags: ENCRYPT+DECRYPT 856s | key_size: 24-bytes 856s | base: base-key@0x18647deccce0 (40-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cef0 856s | decode_to_chunk: input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 856s | decode_to_chunk: output: 856s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 856s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 856s | decode_to_chunk: output: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 856s | decode_to_chunk: Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 856s | decode_to_chunk: output: 856s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 856s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 856s | decode_to_chunk: expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 856s | decode_to_chunk: output: 856s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 856s | do_aes_ctr: enter 856s | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes 856s | do_aes_ctr: exit 856s | verify_chunk_data: encrypt: ok 856s | verify_chunk_data: counter-block: ok 856s | decode_to_chunk: input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 856s | decode_to_chunk: output: 856s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 856s | decode_to_chunk: Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 856s | decode_to_chunk: output: 856s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 856s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 856s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 856s | decode_to_chunk: output: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 856s | decode_to_chunk: expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 856s | decode_to_chunk: output: 856s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 856s | do_aes_ctr: enter 856s | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes 856s | do_aes_ctr: exit 856s | verify_chunk_data: decrypt: ok 856s | verify_chunk_data: counter-block: ok 856s | test_ctr_vector: Encrypting 32 octets using AES-CTR with 192-bit key passed 856s algparse: Encrypting 36 octets using AES-CTR with 192-bit key 856s | decode_to_chunk: raw_key: input "0x02 BF 39 1E E8 EC B1 59 B9 59 61 7B 09 65 27 9BF5 9B 60 A7 86 D3 E0 FE" 856s | decode_to_chunk: output: 856s | 02 bf 39 1e e8 ec b1 59 b9 59 61 7b 09 65 27 9b ..9....Y.Ya{.e'. 856s | f5 9b 60 a7 86 d3 e0 fe ..`..... 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cef0 856s | key-offset: 0, key-size: 24 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_CTR 856s | flags: ENCRYPT+DECRYPT 856s | key_size: 24-bytes 856s | base: base-key@0x18647deccce0 (40-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cef0 856s | decode_to_chunk: input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 856s | decode_to_chunk: output: 856s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 856s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 856s | decode_to_chunk: output: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 856s | 20 21 22 23 !"# 856s | decode_to_chunk: Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 856s | decode_to_chunk: output: 856s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 856s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 856s | ab ee 09 35 ...5 856s | decode_to_chunk: expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 856s | decode_to_chunk: output: 856s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 856s | do_aes_ctr: enter 856s | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes 856s | do_aes_ctr: exit 856s | verify_chunk_data: encrypt: ok 856s | verify_chunk_data: counter-block: ok 856s | decode_to_chunk: input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 856s | decode_to_chunk: output: 856s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 856s | decode_to_chunk: Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 856s | decode_to_chunk: output: 856s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 856s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 856s | ab ee 09 35 ...5 856s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 856s | decode_to_chunk: output: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 856s | 20 21 22 23 !"# 856s | decode_to_chunk: expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 856s | decode_to_chunk: output: 856s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 856s | do_aes_ctr: enter 856s | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes 856s | do_aes_ctr: exit 856s | verify_chunk_data: decrypt: ok 856s | verify_chunk_data: counter-block: ok 856s | test_ctr_vector: Encrypting 36 octets using AES-CTR with 192-bit key passed 856s algparse: Encrypting 16 octets using AES-CTR with 256-bit key 856s | decode_to_chunk: raw_key: input "0x77 6B EF F2 85 1D B0 6F 4C 8A 05 42 C8 69 6F 6C6A 81 AF 1E EC 96 B4 D3 7F C1 D6 89 E6 C1 C1 04" 856s | decode_to_chunk: output: 856s | 77 6b ef f2 85 1d b0 6f 4c 8a 05 42 c8 69 6f 6c wk.....oL..B.iol 856s | 6a 81 af 1e ec 96 b4 d3 7f c1 d6 89 e6 c1 c1 04 j............... 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cef0 856s | key-offset: 0, key-size: 32 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_CTR 856s | flags: ENCRYPT+DECRYPT 856s | key_size: 32-bytes 856s | base: base-key@0x18647deccce0 (48-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cef0 856s | decode_to_chunk: input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 856s | decode_to_chunk: output: 856s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 856s | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 856s | decode_to_chunk: output: 856s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 856s | decode_to_chunk: Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 856s | decode_to_chunk: output: 856s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 856s | decode_to_chunk: expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 856s | decode_to_chunk: output: 856s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 856s | do_aes_ctr: enter 856s | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes 856s | do_aes_ctr: exit 856s | verify_chunk_data: encrypt: ok 856s | verify_chunk_data: counter-block: ok 856s | decode_to_chunk: input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 856s | decode_to_chunk: output: 856s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 856s | decode_to_chunk: Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 856s | decode_to_chunk: output: 856s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 856s | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 856s | decode_to_chunk: output: 856s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 856s | decode_to_chunk: expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 856s | decode_to_chunk: output: 856s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 856s | do_aes_ctr: enter 856s | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes 856s | do_aes_ctr: exit 856s | verify_chunk_data: decrypt: ok 856s | verify_chunk_data: counter-block: ok 856s | test_ctr_vector: Encrypting 16 octets using AES-CTR with 256-bit key passed 856s algparse: Encrypting 32 octets using AES-CTR with 256-bit key 856s | decode_to_chunk: raw_key: input "0xF6 D6 6D 6B D5 2D 59 BB 07 96 36 58 79 EF F8 86C6 6D D5 1A 5B 6A 99 74 4B 50 59 0C 87 A2 38 84" 856s | decode_to_chunk: output: 856s | f6 d6 6d 6b d5 2d 59 bb 07 96 36 58 79 ef f8 86 ..mk.-Y...6Xy... 856s | c6 6d d5 1a 5b 6a 99 74 4b 50 59 0c 87 a2 38 84 .m..[j.tKPY...8. 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cef0 856s | key-offset: 0, key-size: 32 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_CTR 856s | flags: ENCRYPT+DECRYPT 856s | key_size: 32-bytes 856s | base: base-key@0x18647deccce0 (48-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cef0 856s | decode_to_chunk: input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 856s | decode_to_chunk: output: 856s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 856s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 856s | decode_to_chunk: output: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 856s | decode_to_chunk: Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 856s | decode_to_chunk: output: 856s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 856s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 856s | decode_to_chunk: expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 856s | decode_to_chunk: output: 856s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 856s | do_aes_ctr: enter 856s | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes 856s | do_aes_ctr: exit 856s | verify_chunk_data: encrypt: ok 856s | verify_chunk_data: counter-block: ok 856s | decode_to_chunk: input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 856s | decode_to_chunk: output: 856s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 856s | decode_to_chunk: Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 856s | decode_to_chunk: output: 856s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 856s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 856s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 856s | decode_to_chunk: output: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 856s | decode_to_chunk: expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 856s | decode_to_chunk: output: 856s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 856s | do_aes_ctr: enter 856s | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes 856s | do_aes_ctr: exit 856s | verify_chunk_data: decrypt: ok 856s | verify_chunk_data: counter-block: ok 856s | test_ctr_vector: Encrypting 32 octets using AES-CTR with 256-bit key passed 856s algparse: Encrypting 36 octets using AES-CTR with 256-bit key 856s | decode_to_chunk: raw_key: input "0xFF 7A 61 7C E6 91 48 E4 F1 72 6E 2F 43 58 1D E2AA 62 D9 F8 05 53 2E DF F1 EE D6 87 FB 54 15 3D" 856s | decode_to_chunk: output: 856s | ff 7a 61 7c e6 91 48 e4 f1 72 6e 2f 43 58 1d e2 .za|..H..rn/CX.. 856s | aa 62 d9 f8 05 53 2e df f1 ee d6 87 fb 54 15 3d .b...S.......T.= 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cef0 856s | key-offset: 0, key-size: 32 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_CTR 856s | flags: ENCRYPT+DECRYPT 856s | key_size: 32-bytes 856s | base: base-key@0x18647deccce0 (48-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cef0 856s | decode_to_chunk: input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 856s | decode_to_chunk: output: 856s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 856s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 856s | decode_to_chunk: output: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 856s | 20 21 22 23 !"# 856s | decode_to_chunk: Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 856s | decode_to_chunk: output: 856s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 856s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 856s | 1e c0 e6 b8 .... 856s | decode_to_chunk: expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 856s | decode_to_chunk: output: 856s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 856s | do_aes_ctr: enter 856s | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes 856s | do_aes_ctr: exit 856s | verify_chunk_data: encrypt: ok 856s | verify_chunk_data: counter-block: ok 856s | decode_to_chunk: input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 856s | decode_to_chunk: output: 856s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 856s | decode_to_chunk: Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 856s | decode_to_chunk: output: 856s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 856s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 856s | 1e c0 e6 b8 .... 856s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 856s | decode_to_chunk: output: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 856s | 20 21 22 23 !"# 856s | decode_to_chunk: expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 856s | decode_to_chunk: output: 856s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 856s | do_aes_ctr: enter 856s | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes 856s | do_aes_ctr: exit 856s | verify_chunk_data: decrypt: ok 856s | verify_chunk_data: counter-block: ok 856s | test_ctr_vector: Encrypting 36 octets using AES-CTR with 256-bit key passed 856s algparse: testing AES_CBC: 856s algparse: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 856s | decode_to_chunk: raw_key: input "0x06a9214036b8a15b512e03d534120006" 856s | decode_to_chunk: output: 856s | 06 a9 21 40 36 b8 a1 5b 51 2e 03 d5 34 12 00 06 ..!@6..[Q...4... 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cf00 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_CBC 856s | flags: ENCRYPT+DECRYPT 856s | key_size: 16-bytes 856s | base: base-key@0x18647deccce0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cf00 856s | decode_to_chunk: IV: : input "0x3dafba429d9eb430b422da802c9fac41" 856s | decode_to_chunk: output: 856s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 856s | decode_to_chunk: new IV: : input "0xe353779c1079aeb82708942dbe77181a" 856s | decode_to_chunk: output: 856s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 856s | decode_to_chunk: plaintext: : input "Single block msg" 856s | decode_to_chunk: output: 856s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 856s | decode_to_chunk: ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 856s | decode_to_chunk: output: 856s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 856s | NSS ike_alg_nss_cbc: AES_CBC - enter 856s | NSS ike_alg_nss_cbc: AES_CBC - exit 856s | verify_chunk_data: encrypt: ok 856s | verify_chunk_data: updated CBC IV: ok 856s | decode_to_chunk: IV: : input "0x3dafba429d9eb430b422da802c9fac41" 856s | decode_to_chunk: output: 856s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 856s | decode_to_chunk: new IV: : input "0xe353779c1079aeb82708942dbe77181a" 856s | decode_to_chunk: output: 856s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 856s | decode_to_chunk: ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 856s | decode_to_chunk: output: 856s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 856s | decode_to_chunk: plaintext: : input "Single block msg" 856s | decode_to_chunk: output: 856s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 856s | NSS ike_alg_nss_cbc: AES_CBC - enter 856s | NSS ike_alg_nss_cbc: AES_CBC - exit 856s | verify_chunk_data: decrypt: ok 856s | verify_chunk_data: updated CBC IV: ok 856s | test_ctr_vector: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key passed 856s algparse: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 856s | decode_to_chunk: raw_key: input "0xc286696d887c9aa0611bbb3e2025a45a" 856s | decode_to_chunk: output: 856s | c2 86 69 6d 88 7c 9a a0 61 1b bb 3e 20 25 a4 5a ..im.|..a..> %.Z 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cf00 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_CBC 856s | flags: ENCRYPT+DECRYPT 856s | key_size: 16-bytes 856s | base: base-key@0x18647deccce0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cf00 856s | decode_to_chunk: IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 856s | decode_to_chunk: output: 856s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 856s | decode_to_chunk: new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 856s | decode_to_chunk: output: 856s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 856s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 856s | decode_to_chunk: plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 856s | decode_to_chunk: output: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 856s | decode_to_chunk: ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 856s | decode_to_chunk: output: 856s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 856s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 856s | NSS ike_alg_nss_cbc: AES_CBC - enter 856s | NSS ike_alg_nss_cbc: AES_CBC - exit 856s | verify_chunk_data: encrypt: ok 856s | verify_chunk_data: updated CBC IV: ok 856s | decode_to_chunk: IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 856s | decode_to_chunk: output: 856s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 856s | decode_to_chunk: new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 856s | decode_to_chunk: output: 856s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 856s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 856s | decode_to_chunk: ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 856s | decode_to_chunk: output: 856s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 856s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 856s | decode_to_chunk: plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 856s | decode_to_chunk: output: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 856s | NSS ike_alg_nss_cbc: AES_CBC - enter 856s | NSS ike_alg_nss_cbc: AES_CBC - exit 856s | verify_chunk_data: decrypt: ok 856s | verify_chunk_data: updated CBC IV: ok 856s | test_ctr_vector: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key passed 856s algparse: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 856s | decode_to_chunk: raw_key: input "0x6c3ea0477630ce21a2ce334aa746c2cd" 856s | decode_to_chunk: output: 856s | 6c 3e a0 47 76 30 ce 21 a2 ce 33 4a a7 46 c2 cd l>.Gv0.!..3J.F.. 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cf00 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_CBC 856s | flags: ENCRYPT+DECRYPT 856s | key_size: 16-bytes 856s | base: base-key@0x18647deccce0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cf00 856s | decode_to_chunk: IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 856s | decode_to_chunk: output: 856s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 856s | decode_to_chunk: new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 856s | decode_to_chunk: output: 856s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 856s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 856s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 856s | decode_to_chunk: plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 856s | decode_to_chunk: output: 856s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 856s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 856s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 856s | decode_to_chunk: ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 856s | decode_to_chunk: output: 856s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 856s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 856s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 856s | NSS ike_alg_nss_cbc: AES_CBC - enter 856s | NSS ike_alg_nss_cbc: AES_CBC - exit 856s | verify_chunk_data: encrypt: ok 856s | verify_chunk_data: updated CBC IV: ok 856s | decode_to_chunk: IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 856s | decode_to_chunk: output: 856s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 856s | decode_to_chunk: new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 856s | decode_to_chunk: output: 856s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 856s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 856s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 856s | decode_to_chunk: ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 856s | decode_to_chunk: output: 856s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 856s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 856s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 856s | decode_to_chunk: plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 856s | decode_to_chunk: output: 856s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 856s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 856s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 856s | NSS ike_alg_nss_cbc: AES_CBC - enter 856s | NSS ike_alg_nss_cbc: AES_CBC - exit 856s | verify_chunk_data: decrypt: ok 856s | verify_chunk_data: updated CBC IV: ok 856s | test_ctr_vector: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key passed 856s algparse: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 856s | decode_to_chunk: raw_key: input "0x56e47a38c5598974bc46903dba290349" 856s | decode_to_chunk: output: 856s | 56 e4 7a 38 c5 59 89 74 bc 46 90 3d ba 29 03 49 V.z8.Y.t.F.=.).I 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cf00 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_CBC 856s | flags: ENCRYPT+DECRYPT 856s | key_size: 16-bytes 856s | base: base-key@0x18647deccce0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cf00 856s | decode_to_chunk: IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 856s | decode_to_chunk: output: 856s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 856s | decode_to_chunk: plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 856s | decode_to_chunk: output: 856s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 856s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 856s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 856s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 856s | decode_to_chunk: ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 856s | decode_to_chunk: output: 856s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 856s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 856s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 856s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 856s | NSS ike_alg_nss_cbc: AES_CBC - enter 856s | NSS ike_alg_nss_cbc: AES_CBC - exit 856s | verify_chunk_data: encrypt: ok 856s | verify_chunk_data: updated CBC IV: ok 856s | decode_to_chunk: IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 856s | decode_to_chunk: output: 856s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 856s | decode_to_chunk: ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 856s | decode_to_chunk: output: 856s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 856s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 856s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 856s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 856s | decode_to_chunk: plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 856s | decode_to_chunk: output: 856s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 856s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 856s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 856s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 856s | NSS ike_alg_nss_cbc: AES_CBC - enter 856s | NSS ike_alg_nss_cbc: AES_CBC - exit 856s | verify_chunk_data: decrypt: ok 856s | verify_chunk_data: updated CBC IV: ok 856s | test_ctr_vector: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key passed 856s algparse: testing AES_XCBC: 856s algparse: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 856s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 856s | decode_to_chunk: output: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | decode_to_chunk: test_prf_vector: input "" 856s | decode_to_chunk: output: 856s | 856s | decode_to_chunk: test_prf_vector: input "0x75f0251d528ac01c4573dfd584d79f29" 856s | decode_to_chunk: output: 856s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 856s | PRF chunk interface PRF AES_XCBC init key-chunk@0x18647deccfc0 (length 16) 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cd60 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 16-bytes 856s | base: base-key@0x18647deccce0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cd60 856s | XCBC: Key 16=16 just right 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647decb2d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cc88 856s | PRF chunk interface PRF AES_XCBC 0x18647decee60 856s | PRF chunk interface PRF AES_XCBC update message (0x18647decd410 length 0) 856s | 856s | XCBC: data 856s | 856s | K extracting all 16 bytes of key@0x18647deccce0 856s | K: symkey-key@0x18647deccce0 (16-bytes, AES_ECB) 856s | sizeof bytes 16 856s | wrapper: (SECItemType)55: 0e fb 4a 3e 5b 56 a0 d8 b9 e0 73 5a c1 61 c0 74 856s | K extracted len 16 bytes at 0x18647decefb0 856s | unwrapped: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | XCBC: K: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | XCBC: K1 856s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cc00 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded0bd0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cc00 856s | Computing E[0] using K3 856s | XCBC: K3 856s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 856s | XCBC: E[n-1] 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | XCBC: M[n] 856s | 856s | XCBC: M[n] 856s | 856s | XCBC: M[n]:80...^E[n-1]^K3 856s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 856s | XCBC: MAC 856s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 856s | PRF chunk interface PRF AES_XCBC final length 16 856s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 856s | chunk output 856s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 856s | verify_chunk_data: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: ok 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0ce60 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 16-bytes 856s | base: base-key@0x18647decb2d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0ce60 856s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x18647deccce0 (size 16) 856s | PRF symkey interface: key symkey-key@0x18647deccce0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | XCBC: Key 16=16 just right 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647deccce0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cce8 856s | PRF symkey interface PRF AES_XCBC 0x18647decee60 856s | PRF symkey interface PRF AES_XCBC update symkey message-key@(nil) (size 0) 856s | PRF symkey interface: symkey message-key@NULL 856s | symkey message NULL key has no bytes 856s | XCBC: data 856s | 856s | K extracting all 16 bytes of key@0x18647decb2d0 856s | K: symkey-key@0x18647decb2d0 (16-bytes, AES_ECB) 856s | sizeof bytes 16 856s | wrapper: (SECItemType)-339142896: 0e fb 4a 3e 5b 56 a0 d8 b9 e0 73 5a c1 61 c0 74 856s | K extracted len 16 bytes at 0x18647decdc20 856s | unwrapped: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | XCBC: K: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | XCBC: K1 856s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cc40 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded2460 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cc40 856s | Computing E[0] using K3 856s | XCBC: K3 856s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 856s | XCBC: E[n-1] 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | XCBC: M[n] 856s | 856s | XCBC: M[n] 856s | 856s | XCBC: M[n]:80...^E[n-1]^K3 856s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 856s | XCBC: MAC 856s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cd70 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded2460 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cd70 856s | PRF symkey interface PRF AES_XCBC final-key@0x18647ded0bd0 (size 16) 856s | PRF symkey interface: key-key@0x18647ded0bd0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | output: symkey-key@0x18647ded0bd0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracting all 16 bytes of key@0x18647ded0bd0 856s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: symkey-key@0x18647ded0bd0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | sizeof bytes 16 856s | wrapper: (SECItemType)-340237944: ba c1 c4 06 e1 fc 3c 86 12 c6 f8 8f 34 f9 50 36 856s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracted len 16 bytes at 0x18647decee60 856s | unwrapped: 856s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 856s | verify_chunk_data: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: ok 856s | test_prf_vector: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input passed 856s algparse: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 856s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 856s | decode_to_chunk: output: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | decode_to_chunk: test_prf_vector: input "0x000102" 856s | decode_to_chunk: output: 856s | 00 01 02 ... 856s | decode_to_chunk: test_prf_vector: input "0x5b376580ae2f19afe7219ceef172756f" 856s | decode_to_chunk: output: 856s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 856s | PRF chunk interface PRF AES_XCBC init key-chunk@0x18647decd3b0 (length 16) 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cd60 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 16-bytes 856s | base: base-key@0x18647deccce0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cd60 856s | XCBC: Key 16=16 just right 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded0bd0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cc88 856s | PRF chunk interface PRF AES_XCBC 0x18647decee60 856s | PRF chunk interface PRF AES_XCBC update message (0x18647decb360 length 3) 856s | 00 01 02 ... 856s | XCBC: data 856s | 00 01 02 ... 856s | K extracting all 16 bytes of key@0x18647deccce0 856s | K: symkey-key@0x18647deccce0 (16-bytes, AES_ECB) 856s | sizeof bytes 16 856s | wrapper: (SECItemType)58: 0e fb 4a 3e 5b 56 a0 d8 b9 e0 73 5a c1 61 c0 74 856s | K extracted len 16 bytes at 0x18647decdc20 856s | unwrapped: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | XCBC: K: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | XCBC: K1 856s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cc00 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647decb2d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cc00 856s | Computing E[1] using K3 856s | XCBC: K3 856s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 856s | XCBC: E[n-1] 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | XCBC: M[n] 856s | 00 01 02 ... 856s | XCBC: M[n] 856s | 00 01 02 ... 856s | XCBC: M[n]:80...^E[n-1]^K3 856s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 856s | XCBC: MAC 856s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 856s | PRF chunk interface PRF AES_XCBC final length 16 856s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 856s | chunk output 856s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 856s | verify_chunk_data: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: ok 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0ce60 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded0bd0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0ce60 856s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x18647deccce0 (size 16) 856s | PRF symkey interface: key symkey-key@0x18647deccce0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | XCBC: Key 16=16 just right 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647deccce0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cce8 856s | PRF symkey interface PRF AES_XCBC 0x18647decf480 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0ce60 856s | key-offset: 0, key-size: 3 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 3-bytes 856s | base: base-key@0x18647ded2460 (19-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0ce60 856s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x18647decb2d0 (size 3) 856s | PRF symkey interface: symkey message-key@0x18647decb2d0 (3-bytes, EXTRACT_KEY_FROM_KEY) 856s | symkey message extracting all 3 bytes of key@0x18647decb2d0 856s | symkey message: symkey-key@0x18647decb2d0 (3-bytes, EXTRACT_KEY_FROM_KEY) 856s | sizeof bytes 16 856s | wrapper: siBuffer: 30 3a 1b 67 22 19 48 7b 24 61 6b eb 95 cf 00 67 856s | symkey message extracted len 16 bytes at 0x18647decee80 856s | unwrapped: 856s | 00 01 02 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | XCBC: data 856s | 00 01 02 ... 856s | K extracting all 16 bytes of key@0x18647ded0bd0 856s | K: symkey-key@0x18647ded0bd0 (16-bytes, AES_ECB) 856s | sizeof bytes 16 856s | wrapper: siDERCertBuffer: 0e fb 4a 3e 5b 56 a0 d8 b9 e0 73 5a c1 61 c0 74 856s | K extracted len 16 bytes at 0x18647decefb0 856s | unwrapped: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | XCBC: K: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | XCBC: K1 856s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cc40 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded3da0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cc40 856s | Computing E[1] using K3 856s | XCBC: K3 856s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 856s | XCBC: E[n-1] 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | XCBC: M[n] 856s | 00 01 02 ... 856s | XCBC: M[n] 856s | 00 01 02 ... 856s | XCBC: M[n]:80...^E[n-1]^K3 856s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 856s | XCBC: MAC 856s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cd70 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded3da0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cd70 856s | PRF symkey interface PRF AES_XCBC final-key@0x18647ded2460 (size 16) 856s | PRF symkey interface: key-key@0x18647ded2460 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | output: symkey-key@0x18647ded2460 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracting all 16 bytes of key@0x18647ded2460 856s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: symkey-key@0x18647ded2460 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | sizeof bytes 16 856s | wrapper: (SECItemType)-340237944: f0 c1 e0 68 38 ae e7 d3 90 07 df 75 e6 3d 1a b1 856s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracted len 16 bytes at 0x18647decf480 856s | unwrapped: 856s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 856s | verify_chunk_data: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: ok 856s | test_prf_vector: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input passed 856s algparse: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 856s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 856s | decode_to_chunk: output: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 856s | decode_to_chunk: output: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | decode_to_chunk: test_prf_vector: input "0xd2a246fa349b68a79998a4394ff7a263" 856s | decode_to_chunk: output: 856s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 856s | PRF chunk interface PRF AES_XCBC init key-chunk@0x18647deccfc0 (length 16) 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cd60 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 16-bytes 856s | base: base-key@0x18647deccce0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cd60 856s | XCBC: Key 16=16 just right 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded2460 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cc88 856s | PRF chunk interface PRF AES_XCBC 0x18647decee60 856s | PRF chunk interface PRF AES_XCBC update message (0x18647decd410 length 16) 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | XCBC: data 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | K extracting all 16 bytes of key@0x18647deccce0 856s | K: symkey-key@0x18647deccce0 (16-bytes, AES_ECB) 856s | sizeof bytes 16 856s | wrapper: (SECItemType)71: 0e fb 4a 3e 5b 56 a0 d8 b9 e0 73 5a c1 61 c0 74 856s | K extracted len 16 bytes at 0x18647decefb0 856s | unwrapped: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | XCBC: K: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | XCBC: K1 856s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cc00 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647decb2d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cc00 856s | XCBC: Computing E[1] using K2 856s | XCBC: K2 856s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 856s | XCBC: E[n-1] 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | XCBC: M[n] 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | XCBC: M[n]^E[n-1]^K2 856s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 856s | XCBC: MAC 856s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 856s | PRF chunk interface PRF AES_XCBC final length 16 856s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 856s | chunk output 856s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 856s | verify_chunk_data: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: ok 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0ce60 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded2460 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0ce60 856s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x18647deccce0 (size 16) 856s | PRF symkey interface: key symkey-key@0x18647deccce0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | XCBC: Key 16=16 just right 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647deccce0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cce8 856s | PRF symkey interface PRF AES_XCBC 0x18647decf480 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0ce60 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded0bd0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0ce60 856s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x18647decb2d0 (size 16) 856s | PRF symkey interface: symkey message-key@0x18647decb2d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | symkey message extracting all 16 bytes of key@0x18647decb2d0 856s | symkey message: symkey-key@0x18647decb2d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | sizeof bytes 16 856s | wrapper: siBuffer: 0e fb 4a 3e 5b 56 a0 d8 b9 e0 73 5a c1 61 c0 74 856s | symkey message extracted len 16 bytes at 0x18647decee60 856s | unwrapped: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | XCBC: data 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | K extracting all 16 bytes of key@0x18647ded2460 856s | K: symkey-key@0x18647ded2460 (16-bytes, AES_ECB) 856s | sizeof bytes 16 856s | wrapper: (SECItemType)16: 0e fb 4a 3e 5b 56 a0 d8 b9 e0 73 5a c1 61 c0 74 856s | K extracted len 16 bytes at 0x18647decdc20 856s | unwrapped: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | XCBC: K: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | XCBC: K1 856s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cc40 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded3da0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7finitializing NSS db 856s running pluto selftest 856s fff0c0cc40 856s | XCBC: Computing E[1] using K2 856s | XCBC: K2 856s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 856s | XCBC: E[n-1] 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | XCBC: M[n] 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | XCBC: M[n]^E[n-1]^K2 856s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 856s | XCBC: MAC 856s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cd70 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded3da0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cd70 856s | PRF symkey interface PRF AES_XCBC final-key@0x18647ded0bd0 (size 16) 856s | PRF symkey interface: key-key@0x18647ded0bd0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | output: symkey-key@0x18647ded0bd0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracting all 16 bytes of key@0x18647ded0bd0 856s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: symkey-key@0x18647ded0bd0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | sizeof bytes 16 856s | wrapper: (SECItemType)-340237944: c5 58 0b dc b1 ea 53 87 ad 9e 51 30 9d 37 c4 e6 856s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracted len 16 bytes at 0x18647decf480 856s | unwrapped: 856s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 856s | verify_chunk_data: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: ok 856s | test_prf_vector: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input passed 856s algparse: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 856s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 856s | decode_to_chunk: output: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 856s | decode_to_chunk: output: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 .... 856s | decode_to_chunk: test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 856s | decode_to_chunk: output: 856s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 856s | PRF chunk interface PRF AES_XCBC init key-chunk@0x18647decd740 (length 16) 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cd60 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 16-bytes 856s | base: base-key@0x18647deccce0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cd60 856s | XCBC: Key 16=16 just right 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded0bd0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cc88 856s | PRF chunk interface PRF AES_XCBC 0x18647decdc20 856s | PRF chunk interface PRF AES_XCBC update message (0x18647decee80 length 20) 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 .... 856s | XCBC: data 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 .... 856s | K extracting all 16 bytes of key@0x18647deccce0 856s | K: symkey-key@0x18647deccce0 (16-bytes, AES_ECB) 856s | sizeof bytes 16 856s | wrapper: (SECItemType)59: 0e fb 4a 3e 5b 56 a0 d8 b9 e0 73 5a c1 61 c0 74 856s | K extracted len 16 bytes at 0x18647decdc50 856s | unwrapped: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | XCBC: K: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | XCBC: K1 856s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cc00 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647decb2d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cc00 856s | Computing E[2] using K3 856s | XCBC: K3 856s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 856s | XCBC: E[n-1] 856s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 856s | XCBC: M[n] 856s | 10 11 12 13 .... 856s | XCBC: M[n] 856s | 10 11 12 13 .... 856s | XCBC: M[n]:80...^E[n-1]^K3 856s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 856s | XCBC: MAC 856s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 856s | PRF chunk interface PRF AES_XCBC final length 16 856s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 856s | chunk output 856s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 856s | verify_chunk_data: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: ok 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0ce60 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded0bd0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0ce60 856s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x18647deccce0 (size 16) 856s | PRF symkey interface: key symkey-key@0x18647deccce0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | XCBC: Key 16=16 just right 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647deccce0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cce8 856s | PRF symkey interface PRF AES_XCBC 0x18647decf480 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0ce60 856s | key-offset: 0, key-size: 20 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 20-bytes 856s | base: base-key@0x18647ded2460 (36-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0ce60 856s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x18647decb2d0 (size 20) 856s | PRF symkey interface: symkey message-key@0x18647decb2d0 (20-bytes, EXTRACT_KEY_FROM_KEY) 856s | symkey message extracting all 20 bytes of key@0x18647decb2d0 856s | symkey message: symkey-key@0x18647decb2d0 (20-bytes, EXTRACT_KEY_FROM_KEY) 856s | sizeof bytes 32 856s | wrapper: siBuffer: 0e fb 4a 3e 5b 56 a0 d8 b9 e0 73 5a c1 61 c0 74 26 3f df 7e ca bf b7 61 27 9b 0f 28 bf 84 92 b5 856s | symkey message extracted len 32 bytes at 0x18647decefe0 856s | unwrapped: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | XCBC: data 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 .... 856s | K extracting all 16 bytes of key@0x18647ded0bd0 856s | K: symkey-key@0x18647ded0bd0 (16-bytes, AES_ECB) 856s | sizeof bytes 16 856s | wrapper: (SECItemType)20: 0e fb 4a 3e 5b 56 a0 d8 b9 e0 73 5a c1 61 c0 74 856s | K extracted len 16 bytes at 0x18647decdc20 856s | unwrapped: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | XCBC: K: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | XCBC: K1 856s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cc40 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded3da0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cc40 856s | Computing E[2] using K3 856s | XCBC: K3 856s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 856s | XCBC: E[n-1] 856s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 856s | XCBC: M[n] 856s | 10 11 12 13 .... 856s | XCBC: M[n] 856s | 10 11 12 13 .... 856s | XCBC: M[n]:80...^E[n-1]^K3 856s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 856s | XCBC: MAC 856s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cd70 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded3da0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cd70 856s | PRF symkey interface PRF AES_XCBC final-key@0x18647ded2460 (size 16) 856s | PRF symkey interface: key-key@0x18647ded2460 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | output: symkey-key@0x18647ded2460 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracting all 16 bytes of key@0x18647ded2460 856s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: symkey-key@0x18647ded2460 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | sizeof bytes 16 856s | wrapper: (SECItemType)-340237944: 99 36 8e 45 3a af fb 7e 3a e9 72 ce 37 bb 92 bf 856s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracted len 16 bytes at 0x18647decf480 856s | unwrapped: 856s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 856s | verify_chunk_data: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: ok 856s | test_prf_vector: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input passed 856s algparse: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 856s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 856s | decode_to_chunk: output: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 856s | decode_to_chunk: output: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 856s | decode_to_chunk: test_prf_vector: input "0xf54f0ec8d2b9f3d36807734bd5283fd4" 856s | decode_to_chunk: output: 856s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 856s | PRF chunk interface PRF AES_XCBC init key-chunk@0x18647deccec0 (length 16) 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cd60 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 16-bytes 856s | base: base-key@0x18647deccce0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cd60 856s | XCBC: Key 16=16 just right 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded2460 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cc88 856s | PRF chunk interface PRF AES_XCBC 0x18647decee60 856s | PRF chunk interface PRF AES_XCBC update message (0x18647decf480 length 32) 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 856s | XCBC: data 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 856s | K extracting all 16 bytes of key@0x18647deccce0 856s | K: symkey-key@0x18647deccce0 (16-bytes, AES_ECB) 856s | sizeof bytes 16 856s | wrapper: (SECItemType)71: 0e fb 4a 3e 5b 56 a0 d8 b9 e0 73 5a c1 61 c0 74 856s | K extracted len 16 bytes at 0x18647decdc20 856s | unwrapped: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | XCBC: K: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | XCBC: K1 856s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cc00 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647decb2d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cc00 856s | XCBC: Computing E[2] using K2 856s | XCBC: K2 856s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 856s | XCBC: E[n-1] 856s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 856s | XCBC: M[n] 856s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 856s | XCBC: M[n]^E[n-1]^K2 856s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 856s | XCBC: MAC 856s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 856s | PRF chunk interface PRF AES_XCBC final length 16 856s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 856s | chunk output 856s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 856s | verify_chunk_data: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: ok 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0ce60 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded2460 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0ce60 856s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x18647deccce0 (size 16) 856s | PRF symkey interface: key symkey-key@0x18647deccce0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | XCBC: Key 16=16 just right 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647deccce0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cce8 856s | PRF symkey interface PRF AES_XCBC 0x18647ded0e60 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0ce60 856s | key-offset: 0, key-size: 32 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 32-bytes 856s | base: base-key@0x18647ded0bd0 (48-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0ce60 856s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x18647decb2d0 (size 32) 856s | PRF symkey interface: symkey message-key@0x18647decb2d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | symkey message extracting all 32 bytes of key@0x18647decb2d0 856s | symkey message: symkey-key@0x18647decb2d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | sizeof bytes 32 856s | wrapper: siBuffer: 0e fb 4a 3e 5b 56 a0 d8 b9 e0 73 5a c1 61 c0 74 6d 3d b2 72 2f eb 08 94 04 28 97 ef 52 14 d8 fe 856s | symkey message extracted len 32 bytes at 0x18647decdc20 856s | unwrapped: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 856s | XCBC: data 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 856s | K extracting all 16 bytes of key@0x18647ded2460 856s | K: symkey-key@0x18647ded2460 (16-bytes, AES_ECB) 856s | sizeof bytes 16 856s | wrapper: (SECItemType)32: 0e fb 4a 3e 5b 56 a0 d8 b9 e0 73 5a c1 61 c0 74 856s | K extracted len 16 bytes at 0x18647decdc50 856s | unwrapped: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | XCBC: K: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | XCBC: K1 856s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cc40 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded3da0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cc40 856s | XCBC: Computing E[2] using K2 856s | XCBC: K2 856s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 856s | XCBC: E[n-1] 856s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 856s | XCBC: M[n] 856s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 856s | XCBC: M[n]^E[n-1]^K2 856s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 856s | XCBC: MAC 856s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cd70 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded3da0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cd70 856s | PRF symkey interface PRF AES_XCBC final-key@0x18647ded0bd0 (size 16) 856s | PRF symkey interface: key-key@0x18647ded0bd0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | output: symkey-key@0x18647ded0bd0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracting all 16 bytes of key@0x18647ded0bd0 856s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: symkey-key@0x18647ded0bd0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | sizeof bytes 16 856s | wrapper: (SECItemType)-340237944: 2d 2c ad bf 65 6c af c9 76 90 a1 bf 09 e5 19 fa 856s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracted len 16 bytes at 0x18647decd380 856s | unwrapped: 856s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 856s | verify_chunk_data: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: ok 856s | test_prf_vector: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input passed 856s algparse: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 856s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 856s | decode_to_chunk: output: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f2021" 856s | decode_to_chunk: output: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 856s | 20 21 ! 856s | decode_to_chunk: test_prf_vector: input "0xbecbb3bccdb518a30677d5481fb6b4d8" 856s | decode_to_chunk: output: 856s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 856s | PRF chunk interface PRF AES_XCBC init key-chunk@0x18647decb2b0 (length 16) 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cd60 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 16-bytes 856s | base: base-key@0x18647deccce0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cd60 856s | XCBC: Key 16=16 just right 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded0bd0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cc88 856s | PRF chunk interface PRF AES_XCBC 0x18647decefb0 856s | PRF chunk interface PRF AES_XCBC update message (0x18647deccb80 length 34) 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 856s | 20 21 ! 856s | XCBC: data 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 856s | 20 21 ! 856s | K extracting all 16 bytes of key@0x18647deccce0 856s | K: symkey-key@0x18647deccce0 (16-bytes, AES_ECB) 856s | sizeof bytes 16 856s | wrapper: (SECItemType)57: 0e fb 4a 3e 5b 56 a0 d8 b9 e0 73 5a c1 61 c0 74 856s | K extracted len 16 bytes at 0x18647decefe0 856s | unwrapped: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | XCBC: K: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | XCBC: K1 856s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cc00 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647decb2d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cc00 856s | Computing E[3] using K3 856s | XCBC: K3 856s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 856s | XCBC: E[n-1] 856s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 856s | XCBC: M[n] 856s | 20 21 ! 856s | XCBC: M[n] 856s | 20 21 ! 856s | XCBC: M[n]:80...^E[n-1]^K3 856s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 856s | XCBC: MAC 856s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 856s | PRF chunk interface PRF AES_XCBC final length 16 856s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 856s | chunk output 856s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 856s | verify_chunk_data: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: ok 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0ce60 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded0bd0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0ce60 856s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x18647deccce0 (size 16) 856s | PRF symkey interface: key symkey-key@0x18647deccce0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | XCBC: Key 16=16 just right 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647deccce0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cce8 856s | PRF symkey interface PRF AES_XCBC 0x18647decefb0 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0ce60 856s | key-offset: 0, key-size: 34 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 34-bytes 856s | base: base-key@0x18647ded2460 (50-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0ce60 856s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x18647decb2d0 (size 34) 856s | PRF symkey interface: symkey message-key@0x18647decb2d0 (34-bytes, EXTRACT_KEY_FROM_KEY) 856s | symkey message extracting all 34 bytes of key@0x18647decb2d0 856s | symkey message: symkey-key@0x18647decb2d0 (34-bytes, EXTRACT_KEY_FROM_KEY) 856s | sizeof bytes 48 856s | wrapper: siBuffer: 0e fb 4a 3e 5b 56 a0 d8 b9 e0 73 5a c1 61 c0 74 6d 3d b2 72 2f eb 08 94 04 28 97 ef 52 14 d8 fe f7 68 78 1b b4 67 16 34 9e d6 44 bb 1d 40 e6 32 856s | symkey message extracted len 48 bytes at 0x18647ded0a10 856s | unwrapped: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 856s | 20 21 00 00 00 00 00 00 00 00 00 00 00 00 00 00 !.............. 856s | XCBC: data 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 856s | 20 21 ! 856s | K extracting all 16 bytes of key@0x18647ded0bd0 856s | K: symkey-key@0x18647ded0bd0 (16-bytes, AES_ECB) 856s | sizeof bytes 16 856s | wrapper: (SECItemType)34: 0e fb 4a 3e 5b 56 a0 d8 b9 e0 73 5a c1 61 c0 74 856s | K extracted len 16 bytes at 0x18647decdc50 856s | unwrapped: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | XCBC: K: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | XCBC: K1 856s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cc40 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded3da0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cc40 856s | Computing E[3] using K3 856s | XCBC: K3 856s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 856s | XCBC: E[n-1] 856s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 856s | XCBC: M[n] 856s | 20 21 ! 856s | XCBC: M[n] 856s | 20 21 ! 856s | XCBC: M[n]:80...^E[n-1]^K3 856s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 856s | XCBC: MAC 856s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cd70 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded3da0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cd70 856s | PRF symkey interface PRF AES_XCBC final-key@0x18647ded2460 (size 16) 856s | PRF symkey interface: key-key@0x18647ded2460 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | output: symkey-key@0x18647ded2460 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracting all 16 bytes of key@0x18647ded2460 856s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: symkey-key@0x18647ded2460 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | sizeof bytes 16 856s | wrapper: (SECItemType)-340237944: aa ce 29 be 3a ac 4d b0 ca d8 51 c0 d9 85 69 d1 856s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracted len 16 bytes at 0x18647ded23b0 856s | unwrapped: 856s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 856s | verify_chunk_data: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: ok 856s | test_prf_vector: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input passed 856s algparse: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 856s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 856s | decode_to_chunk: output: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | decode_to_chunk: test_prf_vector: input "0xf0dafee895db30253761103b5d84528f" 856s | decode_to_chunk: output: 856s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 856s | PRF chunk interface PRF AES_XCBC init key-chunk@0x18647decd740 (length 16) 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cd60 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 16-bytes 856s | base: base-key@0x18647deccce0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cd60 856s | XCBC: Key 16=16 just right 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded2460 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cc88 856s | PRF chunk interface PRF AES_XCBC 0x18647decdc20 856s | PRF chunk interface PRF AES_XCBC update message (0x18647decb630 length 1000) 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 ........ 856s | XCBC: data 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 ........ 856s | K extracting all 16 bytes of key@0x18647deccce0 856s | K: symkey-key@0x18647deccce0 (16-bytes, AES_ECB) 856s | sizeof bytes 16 856s | wrapper: (SECItemType)63: 0e fb 4a 3e 5b 56 a0 d8 b9 e0 73 5a c1 61 c0 74 856s | K extracted len 16 bytes at 0x18647decee60 856s | unwrapped: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | XCBC: K: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | XCBC: K1 856s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cc00 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647decb2d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cc00 856s | Computing E[63] using K3 856s | XCBC: K3 856s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 856s | XCBC: E[n-1] 856s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 856s | XCBC: M[n] 856s | 00 00 00 00 00 00 00 00 ........ 856s | XCBC: M[n] 856s | 00 00 00 00 00 00 00 00 ........ 856s | XCBC: M[n]:80...^E[n-1]^K3 856s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 856s | XCBC: MAC 856s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 856s | PRF chunk interface PRF AES_XCBC final length 16 856s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 856s | chunk output 856s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 856s | verify_chunk_data: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: ok 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0ce60 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded2460 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0ce60 856s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x18647deccce0 (size 16) 856s | PRF symkey interface: key symkey-key@0x18647deccce0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | XCBC: Key 16=16 just right 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647deccce0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cce8 856s | PRF symkey interface PRF AES_XCBC 0x18647decdc20 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0ce60 856s | key-offset: 0, key-size: 1000 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 1000-bytes 856s | base: base-key@0x18647ded0bd0 (1016-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0ce60 856s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x18647decb2d0 (size 1000) 856s | PRF symkey interface: symkey message-key@0x18647decb2d0 (1000-bytes, EXTRACT_KEY_FROM_KEY) 856s | symkey message extracting all 1000 bytes of key@0x18647decb2d0 856s | symkey message: symkey-key@0x18647decb2d0 (1000-bytes, EXTRACT_KEY_FROM_KEY) 856s | sizeof bytes 1008 856s | wrapper: siBuffer: 40 21 48 66 5b 6f b5 c2 68 8d bc 6b 9e 4a 1d f5 40 21 48 66 5b 6f b5 c2 68 8d bc 6b 9e 4a 1d f5 40 21 48 66 5b 6f b5 c2 68 8d bc 6b 9e 4a 1d f5 40 21 48 66 5b 6f b5 c2 68 8d bc 6b 9e 4a 1d f5 40 21 48 66 5b 6f b5 c2 68 8d bc 6b 9e 4a 1d f5 40 21 48 66 5b 6f b5 c2 68 8d bc 6b 9e 4a 1d f5 40 21 48 66 5b 6f b5 c2 68 8d bc 6b 9e 4a 1d f5 40 21 48 66 5b 6f b5 c2 68 8d bc 6b 9e 4a 1d f5 40 21 48 66 5b 6f b5 c2 68 8d bc 6b 9e 4a 1d f5 40 21 48 66 5b 6f b5 c2 68 8d bc 6b 9e 4a 1d f5 40 21 48 66 5b 6f b5 c2 68 8d bc 6b 9e 4a 1d f5 40 21 48 66 5b 6f b5 c2 68 8d bc 6b 9e 4a 1d f5 40 21 48 66 5b 6f b5 c2 68 8d bc 6b 9e 4a 1d f5 40 21 48 66 5b 6f b5 c2 68 8d bc 6b 9e 4a 1d f5 40 21 48 66 5b 6f b5 c2 68 8d bc 6b 9e 4a 1d f5 40 21 48 66 5b 6f b5 c2 68 8d bc 6b 9e 4a 1d f5 40 21 48 66 5b 6f b5 c2 68 8d bc 6b 9e 4a 1d f5 40 21 48 66 5b 6f b5 c2 68 8d bc 6b 9e 4a 1d f5 40 21 48 66 5b 6f b5 c2 68 8d bc 6b 9e 4a 1d f5 40 21 48 66 ... 856s | symkey message extracted len 1008 bytes at 0x18647ded6600 856s | unwrapped: 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | XCBC: data 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | 00 00 00 00 00 00 00 00 ........ 856s | K extracting all 16 bytes of key@0x18647ded2460 856s | K: symkey-key@0x18647ded2460 (16-bytes, AES_ECB) 856s | sizeof bytes 16 856s | wrapper: (SECItemType)1000: 0e fb 4a 3e 5b 56 a0 d8 b9 e0 73 5a c1 61 c0 74 856s | K extracted len 16 bytes at 0x18647decee60 856s | unwrapped: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | XCBC: K: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | XCBC: K1 856s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cc40 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded3da0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cc40 856s | Computing E[63] using K3 856s | XCBC: K3 856s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 856s | XCBC: E[n-1] 856s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 856s | XCBC: M[n] 856s | 00 00 00 00 00 00 00 00 ........ 856s | XCBC: M[n] 856s | 00 00 00 00 00 00 00 00 ........ 856s | XCBC: M[n]:80...^E[n-1]^K3 856s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 856s | XCBC: MAC 856s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cd70 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded3da0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cd70 856s | PRF symkey interface PRF AES_XCBC final-key@0x18647ded0bd0 (size 16) 856s | PRF symkey interface: key-key@0x18647ded0bd0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | output: symkey-key@0x18647ded0bd0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracting all 16 bytes of key@0x18647ded0bd0 856s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: symkey-key@0x18647ded0bd0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | sizeof bytes 16 856s | wrapper: (SECItemType)-340237944: 6e 94 ce e3 35 e4 75 a6 81 a2 ba f4 ae ed d8 2d 856s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracted len 16 bytes at 0x18647decdc20 856s | unwrapped: 856s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 856s | verify_chunk_data: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: ok 856s | test_prf_vector: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input passed 856s algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 856s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 856s | decode_to_chunk: output: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 856s | decode_to_chunk: output: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 .... 856s | decode_to_chunk: test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 856s | decode_to_chunk: output: 856s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 856s | PRF chunk interface PRF AES_XCBC init key-chunk@0x18647deccec0 (length 16) 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cd60 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 16-bytes 856s | base: base-key@0x18647deccce0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cd60 856s | XCBC: Key 16=16 just right 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded0bd0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cc88 856s | PRF chunk interface PRF AES_XCBC 0x18647decdc20 856s | PRF chunk interface PRF AES_XCBC update message (0x18647decb360 length 20) 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 .... 856s | XCBC: data 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 .... 856s | K extracting all 16 bytes of key@0x18647deccce0 856s | K: symkey-key@0x18647deccce0 (16-bytes, AES_ECB) 856s | sizeof bytes 16 856s | wrapper: (SECItemType)59: 0e fb 4a 3e 5b 56 a0 d8 b9 e0 73 5a c1 61 c0 74 856s | K extracted len 16 bytes at 0x18647decee80 856s | unwrapped: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | XCBC: K: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | XCBC: K1 856s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cc00 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647decb2d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cc00 856s | Computing E[2] using K3 856s | XCBC: K3 856s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 856s | XCBC: E[n-1] 856s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 856s | XCBC: M[n] 856s | 10 11 12 13 .... 856s | XCBC: M[n] 856s | 10 11 12 13 .... 856s | XCBC: M[n]:80...^E[n-1]^K3 856s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 856s | XCBC: MAC 856s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 856s | PRF chunk interface PRF AES_XCBC final length 16 856s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 856s | chunk output 856s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 856s | verify_chunk_data: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): ok 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0ce60 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded0bd0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0ce60 856s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x18647deccce0 (size 16) 856s | PRF symkey interface: key symkey-key@0x18647deccce0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | XCBC: Key 16=16 just right 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647deccce0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cce8 856s | PRF symkey interface PRF AES_XCBC 0x18647decdc20 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0ce60 856s | key-offset: 0, key-size: 20 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 20-bytes 856s | base: base-key@0x18647ded2460 (36-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0ce60 856s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x18647decb2d0 (size 20) 856s | PRF symkey interface: symkey message-key@0x18647decb2d0 (20-bytes, EXTRACT_KEY_FROM_KEY) 856s | symkey message extracting all 20 bytes of key@0x18647decb2d0 856s | symkey message: symkey-key@0x18647decb2d0 (20-bytes, EXTRACT_KEY_FROM_KEY) 856s | sizeof bytes 32 856s | wrapper: siBuffer: 0e fb 4a 3e 5b 56 a0 d8 b9 e0 73 5a c1 61 c0 74 26 3f df 7e ca bf b7 61 27 9b 0f 28 bf 84 92 b5 856s | symkey message extracted len 32 bytes at 0x18647deccb60 856s | unwrapped: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | XCBC: data 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 .... 856s | K extracting all 16 bytes of key@0x18647ded0bd0 856s | K: symkey-key@0x18647ded0bd0 (16-bytes, AES_ECB) 856s | sizeof bytes 16 856s | wrapper: (SECItemType)20: 0e fb 4a 3e 5b 56 a0 d8 b9 e0 73 5a c1 61 c0 74 856s | K extracted len 16 bytes at 0x18647deccb60 856s | unwrapped: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | XCBC: K: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | XCBC: K1 856s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cc40 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded3da0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cc40 856s | Computing E[2] using K3 856s | XCBC: K3 856s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 856s | XCBC: E[n-1] 856s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 856s | XCBC: M[n] 856s | 10 11 12 13 .... 856s | XCBC: M[n] 856s | 10 11 12 13 .... 856s | XCBC: M[n]:80...^E[n-1]^K3 856s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 856s | XCBC: MAC 856s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cd70 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded3da0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cd70 856s | PRF symkey interface PRF AES_XCBC final-key@0x18647ded2460 (size 16) 856s | PRF symkey interface: key-key@0x18647ded2460 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | output: symkey-key@0x18647ded2460 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracting all 16 bytes of key@0x18647ded2460 856s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): symkey-key@0x18647ded2460 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | sizeof bytes 16 856s | wrapper: (SECItemType)-340237944: 99 36 8e 45 3a af fb 7e 3a e9 72 ce 37 bb 92 bf 856s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracted len 16 bytes at 0x18647deccb80 856s | unwrapped: 856s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 856s | verify_chunk_data: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): ok 856s | test_prf_vector: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) passed 856s algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 856s | decode_to_chunk: test_prf_vector: input "0x00010203040506070809" 856s | decode_to_chunk: output: 856s | 00 01 02 03 04 05 06 07 08 09 .......... 856s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 856s | decode_to_chunk: output: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 .... 856s | decode_to_chunk: test_prf_vector: input "0x0fa087af7d866e7653434e602fdde835" 856s | decode_to_chunk: output: 856s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 856s | PRF chunk interface PRF AES_XCBC init key-chunk@0x18647decd740 (length 10) 856s | 00 01 02 03 04 05 06 07 08 09 .......... 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cd60 856s | key-offset: 0, key-size: 10 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 10-bytes 856s | base: base-key@0x18647deccce0 (26-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cd60 856s | XCBC: Key 10<16 too small, padding with zeros 856s | CONCATENATE_BASE_AND_DATA: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647ded2460 (10-bytes, EXTRACT_KEY_FROM_KEY) 856s | params: 16-bytes@0x7ffff0c0cc70 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647deccce0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cc88 856s | PRF chunk interface PRF AES_XCBC 0x18647decdc20 856s | PRF chunk interface PRF AES_XCBC update message (0x18647deccb60 length 20) 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 .... 856s | XCBC: data 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 .... 856s | K extracting all 16 bytes of key@0x18647decb2d0 856s | K: symkey-key@0x18647decb2d0 (16-bytes, AES_ECB) 856s | sizeof bytes 16 856s | wrapper: (SECItemType)59: 2c 36 28 78 6c 7d 01 ed 9f 87 3d 2f 6f f0 fb b1 856s | K extracted len 16 bytes at 0x18647deccec0 856s | unwrapped: 856s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 856s | XCBC: K: 856s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 856s | XCBC: K1 856s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cc00 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647deccce0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cc00 856s | Computing E[2] using K3 856s | XCBC: K3 856s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 856s | XCBC: E[n-1] 856s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 856s | XCBC: M[n] 856s | 10 11 12 13 .... 856s | XCBC: M[n] 856s | 10 11 12 13 .... 856s | XCBC: M[n]:80...^E[n-1]^K3 856s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 856s | XCBC: MAC 856s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 856s | PRF chunk interface PRF AES_XCBC final length 16 856s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 856s | chunk output 856s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 856s | verify_chunk_data: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): ok 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0ce60 856s | key-offset: 0, key-size: 10 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 10-bytes 856s | base: base-key@0x18647ded2460 (26-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0ce60 856s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x18647decb2d0 (size 10) 856s | PRF symkey interface: key symkey-key@0x18647decb2d0 (10-bytes, EXTRACT_KEY_FROM_KEY) 856s | XCBC: Key 10<16 too small, padding with zeros 856s | CONCATENATE_BASE_AND_DATA: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647decb2d0 (10-bytes, EXTRACT_KEY_FROM_KEY) 856s | params: 16-bytes@0x7ffff0c0ccd0 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded2460 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cce8 856s | PRF symkey interface PRF AES_XCBC 0x18647decdc20 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0ce60 856s | key-offset: 0, key-size: 20 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 20-bytes 856s | base: base-key@0x18647ded0bd0 (36-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0ce60 856s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x18647ded2460 (size 20) 856s | PRF symkey interface: symkey message-key@0x18647ded2460 (20-bytes, EXTRACT_KEY_FROM_KEY) 856s | symkey message extracting all 20 bytes of key@0x18647ded2460 856s | symkey message: symkey-key@0x18647ded2460 (20-bytes, EXTRACT_KEY_FROM_KEY) 856s | sizeof bytes 32 856s | wrapper: siBuffer: 0e fb 4a 3e 5b 56 a0 d8 b9 e0 73 5a c1 61 c0 74 26 3f df 7e ca bf b7 61 27 9b 0f 28 bf 84 92 b5 856s | symkey message extracted len 32 bytes at 0x18647decefb0 856s | unwrapped: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | XCBC: data 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 .... 856s | K extracting all 16 bytes of key@0x18647deccce0 856s | K: symkey-key@0x18647deccce0 (16-bytes, AES_ECB) 856s | sizeof bytes 16 856s | wrapper: (SECItemType)20: 2c 36 28 78 6c 7d 01 ed 9f 87 3d 2f 6f f0 fb b1 856s | K extracted len 16 bytes at 0x18647deccb80 856s | unwrapped: 856s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 856s | XCBC: K: 856s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 856s | XCBC: K1 856s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cc40 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded3da0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cc40 856s | Computing E[2] using K3 856s | XCBC: K3 856s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 856s | XCBC: E[n-1] 856s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 856s | XCBC: M[n] 856s | 10 11 12 13 .... 856s | XCBC: M[n] 856s | 10 11 12 13 .... 856s | XCBC: M[n]:80...^E[n-1]^K3 856s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 856s | XCBC: MAC 856s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cd70 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded3da0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cd70 856s | PRF symkey interface PRF AES_XCBC final-key@0x18647ded0bd0 (size 16) 856s | PRF symkey interface: key-key@0x18647ded0bd0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | output: symkey-key@0x18647ded0bd0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracting all 16 bytes of key@0x18647ded0bd0 856s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): symkey-key@0x18647ded0bd0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | sizeof bytes 16 856s | wrapper: (SECItemType)-340237944: 70 6e 95 95 65 56 34 c2 80 11 5d 02 ac 09 28 2e 856s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracted len 16 bytes at 0x18647deccb80 856s | unwrapped: 856s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 856s | verify_chunk_data: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): ok 856s | test_prf_vector: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) passed 856s algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 856s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0fedcb" 856s | decode_to_chunk: output: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | ed cb .. 856s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 856s | decode_to_chunk: output: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | 10 11 12 13 .... 856s | decode_to_chunk: test_prf_vector: input "0x8cd3c93ae598a9803006ffb67c40e9e4" 856s | decode_to_chunk: output: 856s | 8c d3 c9 3a e5 98 a9 80 30 06 ff b6 7c 40 e9 e4 ...:....0...|@.. 856s | PRF chunk interface PRF AES_XCBC init key-chunk@0x18647decee80 (length 18) 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | ed cb .. 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cd60 856s | key-offset: 0, key-size: 18 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 18-bytes 856s | base: base-key@0x18647decb2d0 (34-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cd60 856s | XCBC: Key 18>16 too big, rehashing to size 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cc60 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded2460 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cc60 856s | draft_chunk extracting all 18 bytes of key@0x18647ded0bd0 856s | draft_chunk: symkey-key@0x18647ded0bd0 (18-bytes, EXTRACT_KEY_FROM_KEY) 856s | sizeof bytes 32 856s | wrapper: (SECItemType)-339142448: 0e fb 4a 3e 5b 56 a0 d8 b9 e0 73 5a c1 61 c0 74 6f 49 2b 52 d7 99 8b fc 6e 29 0c 94 52 22 76 1e 856s | draft_chunk extracted len 32 bytes at 0x18647ded2790 856s | unwrapped: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | XCBC: data 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | ed cb .. 856s | K extracting all 16 bytes of key@0x18647decb2d0 856s | K: symkey-key@0x18647decb2d0 (16-bytes, AES_ECB) 856s | sizeof bytes 16 856s | wrapper: (SECItemType)18: 40 21 48 66 5b 6f b5 c2 68 8d bc 6b 9e 4a 1d f5 856s | K extracted len 16 bytes at 0x18647decdc20 856s | unwrapped: 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | XCBC: K: 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | XCBC: K1 856s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cb20 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647deccce0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cb20 856s | Computing E[2] using K3 856s | XCBC: K3 856s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 856s | XCBC: E[n-1] 856s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 856s | XCBC: M[n] 856s | ed cb .. 856s | XCBC: M[n] 856s | ed cb .. 856s | XCBC: M[n]:80...^E[n-1]^K3 856s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.16 too big, rehashing to size 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0ccc0 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647decb2d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0ccc0 856s | draft_chunk extracting all 18 bytes of key@0x18647ded2460 856s | draft_chunk: symkey-key@0x18647ded2460 (18-bytes, EXTRACT_KEY_FROM_KEY) 856s | sizeof bytes 32 856s | wrapper: (SECItemType)-339142448: 0e fb 4a 3e 5b 56 a0 d8 b9 e0 73 5a c1 61 c0 74 6f 49 2b 52 d7 99 8b fc 6e 29 0c 94 52 22 76 1e 856s | draft_chunk extracted len 32 bytes at 0x18647ded2790 856s | unwrapped: 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | XCBC: data 856s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 856s | ed cb .. 856s | K extracting all 16 bytes of key@0x18647ded0bd0 856s | K: symkey-key@0x18647ded0bd0 (16-bytes, AES_ECB) 856s | sizeof bytes 16 856s | wrapper: (SECItemType)18: 40 21 48 66 5b 6f b5 c2 68 8d bc 6b 9e 4a 1d f5 856s | K extracted len 16 bytes at 0x18647decdc20 856s | unwrapped: 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | XCBC: K: 856s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 856s | XCBC: K1 856s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cb80 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: AES_ECB 856s | flags: SIGN 856s | key_size: 16-bytes 856s | base: base-key@0x18647deccce0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cb80 856s | Computing E[2] using K3 856s | XCBC: K3 856s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 856s | XCBC: E[n-1] 856s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 856s | XCBC: M[n] 856s | ed cb .. 856s | XCBC: M[n] 856s | ed cb .. 856s | XCBC: M[n]:80...^E[n-1]^K3 856s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.j.....n1.].8 856s | PRF chunk interface PRF HMAC_MD5 init key-chunk@0x18647decb360 (length 4) 856s | 4a 65 66 65 Jefe 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cd40 856s | key-offset: 0, key-size: 4 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 4-bytes 856s | base: base-key@0x18647decb2d0 (20-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cd40 856s | CONCATENATE_BASE_AND_DATA: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647ded2460 (4-bytes, EXTRACT_KEY_FROM_KEY) 856s | params: 16-bytes@0x7ffff0c0cc50 856s | XOR_BASE_AND_DATA: 856s | target: CONCATENATE_BASE_AND_DATA 856s | base: base-key@0x18647decb2d0 (64-bytes, EXTRACT_KEY_FROM_KEY) 856s | params: 16-bytes@0x7ffff0c0cc70 856s | PRF chunk interface PRF HMAC_MD5 0x18647decee60 856s | PRF chunk interface PRF HMAC_MD5 update message (0x18647decdc20 length 28) 856s | 77 68 61 74 20 64 6f 20 79 61 20 77 61 6e 74 20 what do ya want 856s | 66 6f 72 20 6e 6f 74 68 69 6e 67 3f for nothing? 856s | CONCATENATE_BASE_AND_DATA: 856s | target: CONCATENATE_BASE_AND_DATA 856s | base: base-key@0x18647ded2460 (64-bytes, CONCATENATE_BASE_AND_DATA) 856s | params: 16-bytes@0x7ffff0c0cd80 856s | PRF HMAC inner hash hash MD5 inner-key@0x18647ded0bd0 (size 92) 856s | PRF HMAC inner hash hash MD5 init 856s | PRF HMAC inner hash hash MD5 digest inner-key@0x18647ded0bd0 (size 92) 856s | PRF HMAC inner hash: inner-key@0x18647ded0bd0 (92-bytes, CONCATENATE_BASE_AND_DATA) 856s | PRF HMAC inner hash hash MD5 final length 16 856s | c3 db 14 c0 65 f5 52 03 b0 33 c8 1a 69 7b 97 c5 ....e.R..3..i{.. 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0caa0 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded6160 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0caa0 856s | XOR_BASE_AND_DATA: 856s | target: CONCATENATE_BASE_AND_DATA 856s | base: base-key@0x18647decb2d0 (64-bytes, EXTRACT_KEY_FROM_KEY) 856s | params: 16-bytes@0x7ffff0c0cc00 856s | CONCATENATE_BASE_AND_KEY: 856s | target: CONCATENATE_BASE_AND_DATA 856s | base: base-key@0x18647ded0bd0 (64-bytes, CONCATENATE_BASE_AND_DATA) 856s | params: 8-bytes@0x7ffff0c0cbf8 856s | PRF HMAC outer hash hash MD5 init 856s | PRF HMAC outer hash hash MD5 digest outer-key@0x18647ded6160 (size 80) 856s | PRF HMAC outer hash: outer-key@0x18647ded6160 (80-bytes, CONCATENATE_BASE_AND_DATA) 856s | PRF HMAC outer hash hash MD5 final bytes@0x7ffff0c0ce88 (length 16) 856s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 856s | PRF chunk interface PRF HMAC_MD5 final length 16 856s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 856s | chunk output 856s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 856s | verify_chunk_data: RFC 2104: MD5_HMAC test 2: ok 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0ce60 856s | key-offset: 0, key-size: 4 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 4-bytes 856s | base: base-key@0x18647decb2d0 (20-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0ce60 856s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0x18647ded6160 (size 4) 856s | PRF symkey interface: key symkey-key@0x18647ded6160 (4-bytes, EXTRACT_KEY_FROM_KEY) 856s | CONCATENATE_BASE_AND_DATA: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647ded6160 (4-bytes, EXTRACT_KEY_FROM_KEY) 856s | params: 16-bytes@0x7ffff0c0cc60 856s | XOR_BASE_AND_DATA: 856s | target: CONCATENATE_BASE_AND_DATA 856s | base: base-key@0x18647decb2d0 (64-bytes, EXTRACT_KEY_FROM_KEY) 856s | params: 16-bytes@0x7ffff0c0cc80 856s | PRF symkey interface PRF HMAC_MD5 0x18647decee60 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0ce60 856s | key-offset: 0, key-size: 28 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 28-bytes 856s | base: base-key@0x18647deccce0 (44-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0ce60 856s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0x18647ded0bd0 (size 28) 856s | PRF symkey interface: symkey message-key@0x18647ded0bd0 (28-bytes, EXTRACT_KEY_FROM_KEY) 856s | CONCATENATE_BASE_AND_KEY: 856s | target: CONCATENATE_BASE_AND_DATA 856s | base: base-key@0x18647ded2460 (64-bytes, CONCATENATE_BASE_AND_DATA) 856s | params: 8-bytes@0x7ffff0c0cd98 856s | PRF HMAC inner hash hash MD5 inner-key@0x18647deccce0 (size 92) 856s | PRF HMAC inner hash hash MD5 init 856s | PRF HMAC inner hash hash MD5 digest inner-key@0x18647deccce0 (size 92) 856s | PRF HMAC inner hash: inner-key@0x18647deccce0 (92-bytes, CONCATENATE_BASE_AND_DATA) 856s | PRF HMAC inner hash hash MD5 final length 16 856s | c3 db 14 c0 65 f5 52 03 b0 33 c8 1a 69 7b 97 c5 ....e.R..3..i{.. 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cb00 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded3da0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cb00 856s | XOR_BASE_AND_DATA: 856s | target: CONCATENATE_BASE_AND_DATA 856s | base: base-key@0x18647decb2d0 (64-bytes, EXTRACT_KEY_FROM_KEY) 856s | params: 16-bytes@0x7ffff0c0cc60 856s | CONCATENATE_BASE_AND_KEY: 856s | target: CONCATENATE_BASE_AND_DATA 856s | base: base-key@0x18647deccce0 (64-bytes, CONCATENATE_BASE_AND_DATA) 856s | params: 8-bytes@0x7ffff0c0cc58 856s | PRF HMAC outer hash hash MD5 outer-key@0x18647ded3da0 (size 80) 856s | PRF HMAC outer hash hash MD5 init 856s | PRF HMAC outer hash hash MD5 digest outer-key@0x18647ded3da0 (size 80) 856s | PRF HMAC outer hash: outer-key@0x18647ded3da0 (80-bytes, CONCATENATE_BASE_AND_DATA) 856s | PRF HMAC outer hash hash MD5 final length 16 856s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cc20 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded2460 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cc20 856s | : hashed-outer-key@0x18647decb2d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | PRF symkey interface PRF HMAC_MD5 final-key@0x18647decb2d0 (size 16) 856s | PRF symkey interface: key-key@0x18647decb2d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | output: symkey-key@0x18647decb2d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | RFC 2104: MD5_HMAC test 2 extracting all 16 bytes of key@0x18647decb2d0 856s | RFC 2104: MD5_HMAC test 2: symkey-key@0x18647decb2d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | sizeof bytes 16 856s | wrapper: (SECItemType)-340237944: b5 b1 c2 d1 3d a4 01 97 ec 96 61 cb da ea 11 9e 856s | RFC 2104: MD5_HMAC test 2 extracted len 16 bytes at 0x18647decee60 856s | unwrapped: 856s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 856s | verify_chunk_data: RFC 2104: MD5_HMAC test 2: ok 856s | test_prf_vector: RFC 2104: MD5_HMAC test 2 passed 856s algparse: RFC 2104: MD5_HMAC test 3 856s | decode_to_chunk: test_prf_vector: input "0xAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" 856s | decode_to_chunk: output: 856s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 856s | decode_to_chunk: test_prf_vector: input "0xDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD" 856s | decode_to_chunk: output: 856s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 856s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 856s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 856s | dd dd .. 856s | decode_to_chunk: test_prf_vector: input "0x56be34521d144c88dbb8c733f0e8b3f6" 856s | decode_to_chunk: output: 856s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 856s | PRF chunk interface PRF HMAC_MD5 init key-chunk@0x18647deccfc0 (length 16) 856s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cd40 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded6160 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cd40 856s | CONCATENATE_BASE_AND_DATA: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647decb2d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | params: 16-bytes@0x7ffff0c0cc50 856s | XOR_BASE_AND_DATA: 856s | target: CONCATENATE_BASE_AND_DATA 856s | base: base-key@0x18647ded6160 (64-bytes, EXTRACT_KEY_FROM_KEY) 856s | params: 16-bytes@0x7ffff0c0cc70 856s | PRF chunk interface PRF HMAC_MD5 0x18647decdc20 856s | PRF chunk interface PRF HMAC_MD5 update message (0x18647decefb0 length 50) 856s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 856s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 856s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 856s | dd dd .. 856s | CONCATENATE_BASE_AND_DATA: 856s | target: CONCATENATE_BASE_AND_DATA 856s | base: base-key@0x18647decb2d0 (64-bytes, CONCATENATE_BASE_AND_DATA) 856s | params: 16-bytes@0x7ffff0c0cd80 856s | PRF HMAC inner hash hash MD5 inner-key@0x18647ded0bd0 (size 114) 856s | PRF HMAC inner hash hash MD5 init 856s | PRF HMAC inner hash hash MD5 digest inner-key@0x18647ded0bd0 (size 114) 856s | PRF HMAC inner hash: inner-key@0x18647ded0bd0 (114-bytes, CONCATENATE_BASE_AND_DATA) 856s | PRF HMAC inner hash hash MD5 final length 16 856s | 82 0a 6b 33 5d 18 7b 90 dc ba b1 7e f5 b4 26 ff ..k3].{....~..&. 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0caa0 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded3da0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0caa0 856s | XOR_BASE_AND_DATA: 856s | target: CONCATENATE_BASE_AND_DATA 856s | base: base-key@0x18647ded6160 (64-bytes, EXTRACT_KEY_FROM_KEY) 856s | params: 16-bytes@0x7ffff0c0cc00 856s | CONCATENATE_BASE_AND_KEY: 856s | target: CONCATENATE_BASE_AND_DATA 856s | base: base-key@0x18647ded0bd0 (64-bytes, CONCATENATE_BASE_AND_DATA) 856s | params: 8-bytes@0x7ffff0c0cbf8 856s | PRF HMAC outer hash hash MD5 init 856s | PRF HMAC outer hash hash MD5 digest outer-key@0x18647ded3da0 (size 80) 856s | PRF HMAC outer hash: outer-key@0x18647ded3da0 (80-bytes, CONCATENATE_BASE_AND_DATA) 856s | PRF HMAC outer hash hash MD5 final bytes@0x7ffff0c0ce88 (length 16) 856s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 856s | PRF chunk interface PRF HMAC_MD5 final length 16 856s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 856s | chunk output 856s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 856s | verify_chunk_data: RFC 2104: MD5_HMAC test 3: ok 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0ce60 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 16-bytes 856s | base: base-key@0x18647ded6160 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0ce60 856s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0x18647ded3da0 (size 16) 856s | PRF symkey interface: key symkey-key@0x18647ded3da0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | CONCATENATE_BASE_AND_DATA: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647ded3da0 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | params: 16-bytes@0x7ffff0c0cc60 856s | XOR_BASE_AND_DATA: 856s | target: CONCATENATE_BASE_AND_DATA 856s | base: base-key@0x18647ded6160 (64-bytes, EXTRACT_KEY_FROM_KEY) 856s | params: 16-bytes@0x7ffff0c0cc80 856s | PRF symkey interface PRF HMAC_MD5 0x18647ded2810 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0ce60 856s | key-offset: 0, key-size: 50 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 50-bytes 856s | base: base-key@0x18647ded2460 (66-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0ce60 856s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0x18647ded0bd0 (size 50) 856s | PRF symkey interface: symkey message-key@0x18647ded0bd0 (50-bytes, EXTRACT_KEY_FROM_KEY) 856s | CONCATENATE_BASE_AND_KEY: 856s | target: CONCATENATE_BASE_AND_DATA 856s | base: base-key@0x18647decb2d0 (64-bytes, CONCATENATE_BASE_AND_DATA) 856s | params: 8-bytes@0x7ffff0c0cd98 856s | PRF HMAC inner hash hash MD5 inner-key@0x18647ded2460 (size 114) 856s | PRF HMAC inner hash hash MD5 init 856s | PRF HMAC inner hash hash MD5 digest inner-key@0x18647ded2460 (size 114) 856s | PRF HMAC inner hash: inner-key@0x18647ded2460 (114-bytes, CONCATENATE_BASE_AND_DATA) 856s | PRF HMAC inner hash hash MD5 final length 16 856s | 82 0a 6b 33 5d 18 7b 90 dc ba b1 7e f5 b4 26 ff ..k3].{....~..&. 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cb00 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 16-bytes 856s | base: base-key@0x18647deccce0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cb00 856s | XOR_BASE_AND_DATA: 856s | target: CONCATENATE_BASE_AND_DATA 856s | base: base-key@0x18647ded6160 (64-bytes, EXTRACT_KEY_FROM_KEY) 856s | params: 16-bytes@0x7ffff0c0cc60 856s | CONCATENATE_BASE_AND_KEY: 856s | target: CONCATENATE_BASE_AND_DATA 856s | base: base-key@0x18647ded2460 (64-bytes, CONCATENATE_BASE_AND_DATA) 856s | params: 8-bytes@0x7ffff0c0cc58 856s | PRF HMAC outer hash hash MD5 outer-key@0x18647deccce0 (size 80) 856s | PRF HMAC outer hash hash MD5 init 856s | PRF HMAC outer hash hash MD5 digest outer-key@0x18647deccce0 (size 80) 856s | PRF HMAC outer hash: outer-key@0x18647deccce0 (80-bytes, CONCATENATE_BASE_AND_DATA) 856s | PRF HMAC outer hash hash MD5 final length 16 856s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0cc20 856s | key-offset: 0, key-size: 16 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 16-bytes 856s | base: base-key@0x18647decb2d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cc20 856s | : hashed-outer-key@0x18647ded6160 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | PRF symkey interface PRF HMAC_MD5 final-key@0x18647ded6160 (size 16) 856s | PRF symkey interface: key-key@0x18647ded6160 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | output: symkey-key@0x18647ded6160 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | RFC 2104: MD5_HMAC test 3 extracting all 16 bytes of key@0x18647ded6160 856s | RFC 2104: MD5_HMAC test 3: symkey-key@0x18647ded6160 (16-bytes, EXTRACT_KEY_FROM_KEY) 856s | sizeof bytes 16 856s | wrapper: (SECItemType)-340237944: 4b 5e 45 08 ea c2 1b d9 71 17 33 a6 f2 b8 8e 04 856s | RFC 2104: MD5_HMAC test 3 extracted len 16 bytes at 0x18647deb2860 856s | unwrapped: 856s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 856s | verify_chunk_data: RFC 2104: MD5_HMAC test 3: ok 856s | test_prf_vector: RFC 2104: MD5_HMAC test 3 passed 856s algparse: testing HMAC_SHA1: 856s algparse: CAVP: IKEv2 key derivation with HMAC-SHA1 856s | decode_to_chunk: test_kdf_vector: input "0x32b50d5f4a3763f3" 856s | decode_to_chunk: output: 856s | 32 b5 0d 5f 4a 37 63 f3 2.._J7c. 856s | decode_to_chunk: test_kdf_vector: input "0x9206a04b26564cb1" 856s | decode_to_chunk: output: 856s | 92 06 a0 4b 26 56 4c b1 ...K&VL. 856s | decode_to_chunk: test_kdf_vector: input "0x34c9e7c188868785" 856s | decode_to_chunk: output: 856s | 34 c9 e7 c1 88 86 87 85 4....... 856s | decode_to_chunk: test_kdf_vector: input "0x3ff77d760d2b2199" 856s | decode_to_chunk: output: 856s | 3f f7 7d 76 0d 2b 21 99 ?.}v.+!. 856s | decode_to_chunk: test_kdf_vector: input "0x4b2c1f971981a8ad8d0abeafabf38cf75fc8349c148142465ed9c8b516b8be52" 856s | decode_to_chunk: output: 856s | 4b 2c 1f 97 19 81 a8 ad 8d 0a be af ab f3 8c f7 K,.............. 856s | 5f c8 34 9c 14 81 42 46 5e d9 c8 b5 16 b8 be 52 _.4...BF^......R 856s | decode_to_chunk: test_kdf_vector: input "0x863f3c9d06efd39d2b907b97f8699e5dd5251ef64a2a176f36ee40c87d4f9330" 856s | decode_to_chunk: output: 856s | 86 3f 3c 9d 06 ef d3 9d 2b 90 7b 97 f8 69 9e 5d .?<.....+.{..i.] 856s | d5 25 1e f6 4a 2a 17 6f 36 ee 40 c8 7d 4f 93 30 .%..J*.o6.@.}O.0 856s | decode_to_chunk: test_kdf_vector: input "0xa9a7b222b59f8f48645f28a1db5b5f5d7479cba7" 856s | decode_to_chunk: output: 856s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 856s | 74 79 cb a7 ty.. 856s | decode_to_chunk: test_kdf_vector: input "0x63e81194946ebd05df7df5ebf5d8750056bf1f1d" 856s | decode_to_chunk: output: 856s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 856s | 56 bf 1f 1d V... 856s | decode_to_chunk: test_kdf_vector: input "0xa14293677cc80ff8f9cc0eee30d895da9d8f405666e30ef0dfcb63c634a46002a2a63080e514a062768b76606f9fa5e992204fc5a670bde3f10d6b027113936a5c55b648a194ae587b0088d52204b702c979fa280870d2ed41efa9c549fd11198af1670b143d384bd275c5f594cf266b05ebadca855e4249520a441a81157435a7a56cc4" 856s | decode_to_chunk: output: 856s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 856s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 856s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 856s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 856s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 856s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 856s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 856s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 856s | a7 a5 6c c4 ..l. 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0ce60 856s | key-offset: 0, key-size: 32 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 32-bytes 856s | base: base-key@0x18647ded3da0 (48-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0ce60 856s | NSS_IKE_PRF_DERIVE: 856s | target: NSS_IKE_PRF_PLUS_DERIVE 856s | base: base-key@0x18647ded6160 (32-bytes, EXTRACT_KEY_FROM_KEY) 856s | params: 56-bytes@0x7ffff0c0ce60 856s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0x18647ded3da0 856s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x18647ded3da0 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 856s | sizeof bytes 32 856s | wrapper: (SECItemType)745760116: a5 ee c5 5a 90 66 0a 8d 91 3f 10 02 d9 74 81 fa 92 b0 f4 0a 8b 10 ed 33 0e ad 44 70 f7 d4 d7 0b 856s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0x18647ded2c90 856s | unwrapped: 856s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 856s | 74 79 cb a7 00 00 00 00 00 00 00 00 00 00 00 00 ty.............. 856s | verify_chunk_data: CAVP: IKEv2 key derivation with HMAC-SHA1: ok 856s | NSS_IKE_PRF_PLUS_DERIVE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 132-bytes 856s | base: base-key@0x18647ded3da0 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 856s | params: 40-bytes@0x7ffff0c0cd90 856s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 132 bytes of key@0x18647ded0bd0 856s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x18647ded0bd0 (132-bytes, EXTRACT_KEY_FROM_KEY) 856s | sizeof bytes 144 856s | wrapper: (SECItemType)1802401128: e4 4c a0 77 3f 91 73 15 df bc f4 47 64 15 21 fb 2e 3c 34 2b 70 09 d5 1a ec 46 b3 be 74 c4 bf 8a 99 2f 3d 65 47 e9 fa 70 d3 fe 0e ed 3f 86 e1 be eb a1 7c 85 58 d5 6e 0a 6a 90 fa a3 89 4b 87 35 09 0f 7d ae 9e e9 56 d9 6e a9 90 a1 99 0e 21 f6 71 c1 1a e7 95 23 84 b8 13 05 0b 96 09 ca dc ac 51 f7 aa 84 c7 86 f1 02 fc 60 3e 69 0a 8b 28 5b 3f fb fb 05 4d be 62 83 14 b4 a2 10 81 bd a7 8e f6 a3 6a 75 c7 2b 80 21 2b c4 12 93 7f 62 51 a5 856s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 144 bytes at 0x18647ded2ce0 856s | unwrapped: 856s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 856s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 856s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 856s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 856s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 856s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 856s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 856s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 856s | a7 a5 6c c4 00 00 00 00 00 00 00 00 00 00 00 00 ..l............. 856s | verify_chunk_data: CAVP: IKEv2 key derivation with HMAC-SHA1: ok 856s | key-offset: 0, key-size: 20 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 20-bytes 856s | base: base-key@0x18647ded0bd0 (132-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0cea8 856s | CONCATENATE_DATA_AND_BASE: 856s | target: EXTRACT_KEY_FROM_KEY 856s | base: base-key@0x18647dec9ac0 (16-bytes, AES_KEY_GEN) 856s | params: 16-bytes@0x7ffff0c0ce60 856s | key-offset: 0, key-size: 32 856s | EXTRACT_KEY_FROM_KEY: 856s | target: EXTRACT_KEY_FROM_KEY 856s | key_size: 32-bytes 856s | base: base-key@0x18647ded2460 (48-bytes, EXTRACT_KEY_FROM_KEY) 856s | operation: FLAGS_ONLY 856s | params: 8-bytes@0x7ffff0c0ce60 856s | NSS_IKE_PRF_DERIVE: 856s | target: NSS_IKE_PRF_PLUS_DERIVE 856s | base: base-key@0x18647deccce0 (20-bytes, EXTRACT_KEY_FROM_KEY) 856s | params: 56-bytes@0x7ffff0c0ce60 856s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0x18647ded2460 856s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x18647ded2460 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 856s | sizeof bytes 32 856s | wrapper: (SECItemType)745760116: 0d 25 31 2a df 4e ad e2 8a 24 29 a4 1c fc fb e4 86 07 52 76 9e 60 7f a1 20 06 c7 27 c9 91 dc 79 856s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0x18647ded3470 856s | unwrapped: 856s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 856s | 56 bf 1f 1d 00 00 00 00 00 00 00 00 00 00 00 00 V............... 856s | verify_chunk_data: CAVP: IKEv2 key derivation with HMAC-SHA1: ok 856s | test_kdf_vector: CAVP: IKEv2 key derivation with HMAC-SHA1 passed 856s algparse: leak detective found no leaks 856s /usr/libexec/ipsec/pluto: adjusting nssdir to /tmp/tmp.fiV8mNlPMG 856s /usr/libexec/ipsec/pluto: selftest: skipping lock 856s /usr/libexec/ipsec/pluto: selftest: skipping control socket 856s /usr/libexec/ipsec/pluto: selftest: skipping fork 856s Initializing NSS using read-write database "sql:/tmp/tmp.fiV8mNlPMG" 856s FIPS Mode: NO 856s NSS crypto library initialized 856s FIPS mode disabled for pluto daemon 856s FIPS HMAC integrity support [disabled] 856s libcap-ng capng_apply failed to apply changes, err=-5. see: man capng_apply 856s libcap-ng support [enabled] 856s Linux audit support [enabled] 856s Starting Pluto (Libreswan Version 4.14 IKEv2 IKEv1 XFRM XFRMI esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) (NSS-KDF) DNSSEC SYSTEMD_WATCHDOG LABELED_IPSEC (SELINUX) LIBCAP_NG LINUX_AUDIT AUTH_PAM NETWORKMANAGER CURL(non-NSS) LDAP(non-NSS)) pid:1430 856s core dump dir: /run/pluto 856s secrets file: /etc/ipsec.secrets 856s leak-detective disabled 856s NSS crypto [enabled] 856s XAUTH PAM support [enabled] 856s initializing libevent in pthreads mode: headers: 2.1.12-stable (2010c00); library: 2.1.12-stable (2010c00) 856s NAT-Traversal support [enabled] 856s Encryption algorithms: 856s AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 856s AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 856s AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 856s 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 856s CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 856s CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 856s AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm, aes_gcm_c 856s AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_b 856s AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_a 856s AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 856s AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 856s NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 856s NULL [] IKEv1: ESP IKEv2: ESP 856s CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 856s Hash algorithms: 856s MD5 IKEv1: IKE IKEv2: NSS 856s SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 856s SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 856s SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 856s SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 856s IDENTITY IKEv1: IKEv2: FIPS 856s PRF algorithms: 856s HMAC_MD5 IKEv1: IKE IKEv2: IKE native(HMAC) md5 856s HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 856s HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 856s HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 856s HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 856s AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 856s Integrity algorithms: 856s HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH native(HMAC) md5, hmac_md5 856s HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 856s HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 856s HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 856s HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 856s HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 856s AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 856s AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 856s NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 856s DH algorithms: 856s NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 856s MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 856s MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 856s MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 856s MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 856s MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 856s MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 856s DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 856s DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 856s DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 856s DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 856s IPCOMP algorithms: 856s DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 856s LZS IKEv1: IKEv2: ESP AH FIPS 856s LZJH IKEv1: IKEv2: ESP AH FIPS 856s testing CAMELLIA_CBC: 856s Camellia: 16 bytes with 128-bit key 856s Camellia: 16 bytes with 128-bit key 856s Camellia: 16 bytes with 256-bit key 856s Camellia: 16 bytes with 256-bit key 856s testing AES_GCM_16: 856s empty string 856s one block 856s two blocks 856s two blocks with associated data 856s testing AES_CTR: 856s Encrypting 16 octets using AES-CTR with 128-bit key 856s Encrypting 32 octets using AES-CTR with 128-bit key 856s Encrypting 36 octets using AES-CTR with 128-bit key 856s Encrypting 16 octets using AES-CTR with 192-bit key 856s Encrypting 32 octets using AES-CTR with 192-bit key 856s Encrypting 36 octets using AES-CTR with 192-bit key 856s Encrypting 16 octets using AES-CTR with 256-bit key 856s Encrypting 32 octets using AES-CTR with 256-bit key 856s Encrypting 36 octets using AES-CTR with 256-bit key 856s testing AES_CBC: 856s Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 856s Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 856s Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 856s Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 856s testing AES_XCBC: 856s RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 856s RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 856s RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 856s RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 856s RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 856s RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 856s RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 856s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 856s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 856s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 856s testing HMAC_MD5: 856s RFC 2104: MD5_HMAC test 1 856s RFC 2104: MD5_HMAC test 2 856s RFC 2104: MD5_HMAC test 3 856s testing HMAC_SHA1: 856s CAVP: IKEv2 key derivation with HMAC-SHA1 856s selftest: exiting pluto 856s autopkgtest [18:34:38]: test cryptocheck: -----------------------] 857s autopkgtest [18:34:39]: test cryptocheck: - - - - - - - - - - results - - - - - - - - - - 857s cryptocheck PASS 858s autopkgtest [18:34:40]: test cavp: preparing testbed 976s autopkgtest [18:36:38]: testbed dpkg architecture: ppc64el 976s autopkgtest [18:36:38]: testbed apt version: 2.7.14build2 976s autopkgtest [18:36:38]: @@@@@@@@@@@@@@@@@@@@ test bed setup 977s Get:1 http://ftpmaster.internal/ubuntu noble-proposed InRelease [117 kB] 977s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/multiverse Sources [2340 B] 977s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/restricted Sources [12.3 kB] 977s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/main Sources [48.6 kB] 977s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/universe Sources [264 kB] 978s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el Packages [81.4 kB] 978s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el c-n-f Metadata [3116 B] 978s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/restricted ppc64el Packages [976 B] 978s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/restricted ppc64el c-n-f Metadata [116 B] 978s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el Packages [236 kB] 978s Get:11 http://ftpmaster.internal/ubuntu noble-proposed/universe ppc64el c-n-f Metadata [8652 B] 978s Get:12 http://ftpmaster.internal/ubuntu noble-proposed/multiverse ppc64el Packages [1376 B] 978s Get:13 http://ftpmaster.internal/ubuntu noble-proposed/multiverse ppc64el c-n-f Metadata [116 B] 979s Fetched 776 kB in 1s (895 kB/s) 979s Reading package lists... 981s sh: 4: dhclient: not found 982s Reading package lists... 982s Building dependency tree... 982s Reading state information... 982s Calculating upgrade... 982s The following packages will be upgraded: 982s libnss-systemd libpam-systemd libsystemd-shared libsystemd0 libudev1 systemd 982s systemd-dev systemd-resolved systemd-sysv systemd-timesyncd udev 982s 11 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 982s Need to get 9899 kB of archives. 982s After this operation, 6144 B of additional disk space will be used. 982s Get:1 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el systemd-dev all 255.4-1ubuntu8 [104 kB] 982s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el systemd-timesyncd ppc64el 255.4-1ubuntu8 [37.9 kB] 982s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el systemd-resolved ppc64el 255.4-1ubuntu8 [347 kB] 983s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libsystemd-shared ppc64el 255.4-1ubuntu8 [2351 kB] 983s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libsystemd0 ppc64el 255.4-1ubuntu8 [526 kB] 983s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el systemd-sysv ppc64el 255.4-1ubuntu8 [11.9 kB] 983s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libnss-systemd ppc64el 255.4-1ubuntu8 [208 kB] 983s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libpam-systemd ppc64el 255.4-1ubuntu8 [304 kB] 983s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el systemd ppc64el 255.4-1ubuntu8 [3771 kB] 983s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el udev ppc64el 255.4-1ubuntu8 [2038 kB] 983s Get:11 http://ftpmaster.internal/ubuntu noble-proposed/main ppc64el libudev1 ppc64el 255.4-1ubuntu8 [201 kB] 983s Fetched 9899 kB in 1s (8934 kB/s) 984s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 72009 files and directories currently installed.) 984s Preparing to unpack .../systemd-dev_255.4-1ubuntu8_all.deb ... 984s Unpacking systemd-dev (255.4-1ubuntu8) over (255.4-1ubuntu7) ... 984s Preparing to unpack .../systemd-timesyncd_255.4-1ubuntu8_ppc64el.deb ... 984s Unpacking systemd-timesyncd (255.4-1ubuntu8) over (255.4-1ubuntu7) ... 984s Preparing to unpack .../systemd-resolved_255.4-1ubuntu8_ppc64el.deb ... 984s Unpacking systemd-resolved (255.4-1ubuntu8) over (255.4-1ubuntu7) ... 984s Preparing to unpack .../libsystemd-shared_255.4-1ubuntu8_ppc64el.deb ... 984s Unpacking libsystemd-shared:ppc64el (255.4-1ubuntu8) over (255.4-1ubuntu7) ... 984s Preparing to unpack .../libsystemd0_255.4-1ubuntu8_ppc64el.deb ... 984s Unpacking libsystemd0:ppc64el (255.4-1ubuntu8) over (255.4-1ubuntu7) ... 984s Setting up libsystemd0:ppc64el (255.4-1ubuntu8) ... 984s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 72009 files and directories currently installed.) 984s Preparing to unpack .../0-systemd-sysv_255.4-1ubuntu8_ppc64el.deb ... 984s Unpacking systemd-sysv (255.4-1ubuntu8) over (255.4-1ubuntu7) ... 984s Preparing to unpack .../1-libnss-systemd_255.4-1ubuntu8_ppc64el.deb ... 984s Unpacking libnss-systemd:ppc64el (255.4-1ubuntu8) over (255.4-1ubuntu7) ... 984s Preparing to unpack .../2-libpam-systemd_255.4-1ubuntu8_ppc64el.deb ... 984s Unpacking libpam-systemd:ppc64el (255.4-1ubuntu8) over (255.4-1ubuntu7) ... 984s Preparing to unpack .../3-systemd_255.4-1ubuntu8_ppc64el.deb ... 984s Unpacking systemd (255.4-1ubuntu8) over (255.4-1ubuntu7) ... 984s Preparing to unpack .../4-udev_255.4-1ubuntu8_ppc64el.deb ... 984s Unpacking udev (255.4-1ubuntu8) over (255.4-1ubuntu7) ... 984s Preparing to unpack .../5-libudev1_255.4-1ubuntu8_ppc64el.deb ... 984s Unpacking libudev1:ppc64el (255.4-1ubuntu8) over (255.4-1ubuntu7) ... 984s Setting up libudev1:ppc64el (255.4-1ubuntu8) ... 984s Setting up systemd-dev (255.4-1ubuntu8) ... 984s Setting up libsystemd-shared:ppc64el (255.4-1ubuntu8) ... 984s Setting up systemd (255.4-1ubuntu8) ... 985s Setting up systemd-timesyncd (255.4-1ubuntu8) ... 986s Setting up udev (255.4-1ubuntu8) ... 986s Setting up systemd-resolved (255.4-1ubuntu8) ... 987s Setting up systemd-sysv (255.4-1ubuntu8) ... 987s Setting up libnss-systemd:ppc64el (255.4-1ubuntu8) ... 987s Setting up libpam-systemd:ppc64el (255.4-1ubuntu8) ... 987s Processing triggers for libc-bin (2.39-0ubuntu8) ... 987s Processing triggers for man-db (2.12.0-4build2) ... 988s Processing triggers for dbus (1.14.10-4ubuntu4) ... 988s Processing triggers for initramfs-tools (0.142ubuntu25) ... 989s update-initramfs: Generating /boot/initrd.img-6.8.0-22-generic 989s W: No lz4 in /usr/bin:/sbin:/bin, using gzip 995s Reading package lists... 995s Building dependency tree... 995s Reading state information... 995s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 996s Hit:1 http://ftpmaster.internal/ubuntu noble-proposed InRelease 996s Hit:2 http://ftpmaster.internal/ubuntu noble InRelease 996s Hit:3 http://ftpmaster.internal/ubuntu noble-updates InRelease 996s Hit:4 http://ftpmaster.internal/ubuntu noble-security InRelease 997s Reading package lists... 997s Reading package lists... 997s Building dependency tree... 997s Reading state information... 997s Calculating upgrade... 997s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 997s Reading package lists... 998s Building dependency tree... 998s Reading state information... 998s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 998s autopkgtest [18:37:00]: rebooting testbed after setup commands that affected boot 1041s autopkgtest-virt-ssh: WARNING: ssh connection failed. Retrying in 3 seconds... 1053s Reading package lists... 1053s Building dependency tree... 1053s Reading state information... 1053s Starting pkgProblemResolver with broken count: 0 1053s Starting 2 pkgProblemResolver with broken count: 0 1053s Done 1053s The following additional packages will be installed: 1053s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 1053s libnss3-tools libreswan libunbound8 1053s The following NEW packages will be installed: 1053s autopkgtest-satdep dns-root-data libevent-2.1-7t64 1053s libevent-pthreads-2.1-7t64 libldns3t64 libnss3-tools libreswan libunbound8 1053s 0 upgraded, 8 newly installed, 0 to remove and 0 not upgraded. 1053s Need to get 3070 kB/3071 kB of archives. 1053s After this operation, 14.8 MB of additional disk space will be used. 1053s Get:1 /tmp/autopkgtest.LIokv7/3-autopkgtest-satdep.deb autopkgtest-satdep ppc64el 0 [740 B] 1054s Get:2 http://ftpmaster.internal/ubuntu noble/main ppc64el dns-root-data all 2023112702~willsync1 [4450 B] 1054s Get:3 http://ftpmaster.internal/ubuntu noble/main ppc64el libnss3-tools ppc64el 2:3.98-1build1 [718 kB] 1054s Get:4 http://ftpmaster.internal/ubuntu noble/main ppc64el libevent-pthreads-2.1-7t64 ppc64el 2.1.12-stable-9ubuntu2 [8102 B] 1054s Get:5 http://ftpmaster.internal/ubuntu noble/universe ppc64el libldns3t64 ppc64el 1.8.3-2build1 [203 kB] 1054s Get:6 http://ftpmaster.internal/ubuntu noble/main ppc64el libevent-2.1-7t64 ppc64el 2.1.12-stable-9ubuntu2 [174 kB] 1054s Get:7 http://ftpmaster.internal/ubuntu noble/main ppc64el libunbound8 ppc64el 1.19.2-1ubuntu3 [537 kB] 1054s Get:8 http://ftpmaster.internal/ubuntu noble/universe ppc64el libreswan ppc64el 4.14-1ubuntu2 [1426 kB] 1055s Fetched 3070 kB in 2s (2025 kB/s) 1055s Selecting previously unselected package dns-root-data. 1055s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 72009 files and directories currently installed.) 1055s Preparing to unpack .../0-dns-root-data_2023112702~willsync1_all.deb ... 1055s Unpacking dns-root-data (2023112702~willsync1) ... 1055s Selecting previously unselected package libnss3-tools. 1055s Preparing to unpack .../1-libnss3-tools_2%3a3.98-1build1_ppc64el.deb ... 1055s Unpacking libnss3-tools (2:3.98-1build1) ... 1055s Selecting previously unselected package libevent-pthreads-2.1-7t64:ppc64el. 1055s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-9ubuntu2_ppc64el.deb ... 1055s Unpacking libevent-pthreads-2.1-7t64:ppc64el (2.1.12-stable-9ubuntu2) ... 1055s Selecting previously unselected package libldns3t64:ppc64el. 1055s Preparing to unpack .../3-libldns3t64_1.8.3-2build1_ppc64el.deb ... 1055s Unpacking libldns3t64:ppc64el (1.8.3-2build1) ... 1055s Selecting previously unselected package libevent-2.1-7t64:ppc64el. 1055s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-9ubuntu2_ppc64el.deb ... 1055s Unpacking libevent-2.1-7t64:ppc64el (2.1.12-stable-9ubuntu2) ... 1055s Selecting previously unselected package libunbound8:ppc64el. 1055s Preparing to unpack .../5-libunbound8_1.19.2-1ubuntu3_ppc64el.deb ... 1055s Unpacking libunbound8:ppc64el (1.19.2-1ubuntu3) ... 1055s Selecting previously unselected package libreswan. 1055s Preparing to unpack .../6-libreswan_4.14-1ubuntu2_ppc64el.deb ... 1055s Unpacking libreswan (4.14-1ubuntu2) ... 1055s Selecting previously unselected package autopkgtest-satdep. 1055s Preparing to unpack .../7-3-autopkgtest-satdep.deb ... 1055s Unpacking autopkgtest-satdep (0) ... 1055s Setting up libldns3t64:ppc64el (1.8.3-2build1) ... 1055s Setting up libevent-pthreads-2.1-7t64:ppc64el (2.1.12-stable-9ubuntu2) ... 1055s Setting up libevent-2.1-7t64:ppc64el (2.1.12-stable-9ubuntu2) ... 1055s Setting up dns-root-data (2023112702~willsync1) ... 1055s Setting up libunbound8:ppc64el (1.19.2-1ubuntu3) ... 1055s Setting up libnss3-tools (2:3.98-1build1) ... 1055s Setting up libreswan (4.14-1ubuntu2) ... 1056s ipsec.service is a disabled or a static unit, not starting it. 1056s Setting up autopkgtest-satdep (0) ... 1056s Processing triggers for man-db (2.12.0-4build2) ... 1057s Processing triggers for libc-bin (2.39-0ubuntu8) ... 1059s (Reading database ... 72207 files and directories currently installed.) 1059s Removing autopkgtest-satdep (0) ... 1087s autopkgtest [18:38:29]: test cavp: [----------------------- 1087s Testing installed CAVP binary: /usr/libexec/ipsec/cavp 1090s test: IKE v2 1090s Reading from ikev2.fax 1098s test: IKE v1 Digital Signature Authentication 1098s Reading from ikev1_dsa.fax 1103s test: IKE v1 Pre-shared Key Authentication 1103s Reading from ikev1_psk.fax 1107s /tmp/autopkgtest.LIokv7/build.q4t/src 1108s autopkgtest [18:38:50]: test cavp: -----------------------] 1108s cavp PASS 1108s autopkgtest [18:38:50]: test cavp: - - - - - - - - - - results - - - - - - - - - - 1109s autopkgtest [18:38:51]: @@@@@@@@@@@@@@@@@@@@ summary 1109s opportunistic SKIP exit status 77 and marked as skippable 1109s cryptocheck PASS 1109s cavp PASS 1121s Creating nova instance adt-noble-ppc64el-libreswan-20240419-182021-juju-7f2275-prod-proposed-migration-environment-2-f1eb45b6-4fa5-4451-9f46-480e2a29293a from image adt/ubuntu-noble-ppc64el-server-20240419.img (UUID b7a0af62-4a88-423a-a98e-eb9a30e958ea)... 1121s Creating nova instance adt-noble-ppc64el-libreswan-20240419-182021-juju-7f2275-prod-proposed-migration-environment-2-f1eb45b6-4fa5-4451-9f46-480e2a29293a from image adt/ubuntu-noble-ppc64el-server-20240419.img (UUID b7a0af62-4a88-423a-a98e-eb9a30e958ea)... 1121s Creating nova instance adt-noble-ppc64el-libreswan-20240419-182021-juju-7f2275-prod-proposed-migration-environment-2-f1eb45b6-4fa5-4451-9f46-480e2a29293a from image adt/ubuntu-noble-ppc64el-server-20240419.img (UUID b7a0af62-4a88-423a-a98e-eb9a30e958ea)...