0s autopkgtest [19:35:50]: starting date and time: 2024-11-15 19:35:50+0000 0s autopkgtest [19:35:50]: git checkout: 0acbae0a WIP show VirtSubproc stderr in real-time 0s autopkgtest [19:35:50]: host juju-7f2275-prod-proposed-migration-environment-2; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.d3mghsx9/out --timeout-copy=6000 --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:audit --apt-upgrade libreswan --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 --env=ADT_TEST_TRIGGERS=audit/1:4.0.2-2ubuntu1 -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-2@bos03-arm64-15.secgroup --name adt-plucky-arm64-libreswan-20241115-193550-juju-7f2275-prod-proposed-migration-environment-2-572ecff5-f3e1-412f-b7fb-1a854f806178 --image adt/ubuntu-plucky-arm64-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-2 --net-id=net_prod-proposed-migration -e TERM=linux -e ''"'"'http_proxy=http://squid.internal:3128'"'"'' -e ''"'"'https_proxy=http://squid.internal:3128'"'"'' -e ''"'"'no_proxy=127.0.0.1,127.0.1.1,login.ubuntu.com,localhost,localdomain,novalocal,internal,archive.ubuntu.com,ports.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,keyserver.ubuntu.com,launchpadlibrarian.net,launchpadcontent.net,launchpad.net,10.24.0.0/24,keystone.ps5.canonical.com,objectstorage.prodstack5.canonical.com'"'"'' --mirror=http://ftpmaster.internal/ubuntu/ 66s autopkgtest [19:36:56]: testbed dpkg architecture: arm64 66s autopkgtest [19:36:56]: testbed apt version: 2.9.8 66s autopkgtest [19:36:56]: @@@@@@@@@@@@@@@@@@@@ test bed setup 67s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease [73.9 kB] 67s Get:2 http://ftpmaster.internal/ubuntu plucky-proposed/restricted Sources [7016 B] 67s Get:3 http://ftpmaster.internal/ubuntu plucky-proposed/universe Sources [1054 kB] 67s Get:4 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse Sources [15.5 kB] 67s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/main Sources [91.9 kB] 67s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/main arm64 Packages [169 kB] 67s Get:7 http://ftpmaster.internal/ubuntu plucky-proposed/restricted arm64 Packages [50.3 kB] 67s Get:8 http://ftpmaster.internal/ubuntu plucky-proposed/universe arm64 Packages [797 kB] 67s Get:9 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse arm64 Packages [6404 B] 67s Fetched 2265 kB in 1s (2583 kB/s) 67s Reading package lists... 70s Reading package lists... 70s Building dependency tree... 70s Reading state information... 71s Calculating upgrade... 71s The following NEW packages will be installed: 71s libassuan9 71s The following packages will be upgraded: 71s libaudit-common libaudit1 libgpgme11t64 libseccomp2 python3-cffi-backend 71s python3-markupsafe 71s 6 upgraded, 1 newly installed, 0 to remove and 0 not upgraded. 71s Need to get 397 kB of archives. 71s After this operation, 447 kB of additional disk space will be used. 71s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed/main arm64 libaudit-common all 1:4.0.2-2ubuntu1 [6578 B] 71s Get:2 http://ftpmaster.internal/ubuntu plucky-proposed/main arm64 libaudit1 arm64 1:4.0.2-2ubuntu1 [54.2 kB] 72s Get:3 http://ftpmaster.internal/ubuntu plucky/main arm64 libseccomp2 arm64 2.5.5-1ubuntu5 [51.4 kB] 72s Get:4 http://ftpmaster.internal/ubuntu plucky/main arm64 python3-cffi-backend arm64 1.17.1-2build1 [89.9 kB] 72s Get:5 http://ftpmaster.internal/ubuntu plucky/main arm64 libassuan9 arm64 3.0.1-2 [40.6 kB] 72s Get:6 http://ftpmaster.internal/ubuntu plucky/main arm64 libgpgme11t64 arm64 1.24.0-2ubuntu1 [142 kB] 72s Get:7 http://ftpmaster.internal/ubuntu plucky/main arm64 python3-markupsafe arm64 2.1.5-1build3 [13.0 kB] 72s Fetched 397 kB in 0s (808 kB/s) 72s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 79957 files and directories currently installed.) 72s Preparing to unpack .../libaudit-common_1%3a4.0.2-2ubuntu1_all.deb ... 72s Unpacking libaudit-common (1:4.0.2-2ubuntu1) over (1:4.0.1-1ubuntu2) ... 72s Setting up libaudit-common (1:4.0.2-2ubuntu1) ... 72s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 79957 files and directories currently installed.) 72s Preparing to unpack .../libaudit1_1%3a4.0.2-2ubuntu1_arm64.deb ... 72s Unpacking libaudit1:arm64 (1:4.0.2-2ubuntu1) over (1:4.0.1-1ubuntu2) ... 72s Setting up libaudit1:arm64 (1:4.0.2-2ubuntu1) ... 73s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 79957 files and directories currently installed.) 73s Preparing to unpack .../libseccomp2_2.5.5-1ubuntu5_arm64.deb ... 73s Unpacking libseccomp2:arm64 (2.5.5-1ubuntu5) over (2.5.5-1ubuntu4) ... 73s Setting up libseccomp2:arm64 (2.5.5-1ubuntu5) ... 73s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 79957 files and directories currently installed.) 73s Preparing to unpack .../python3-cffi-backend_1.17.1-2build1_arm64.deb ... 73s Unpacking python3-cffi-backend:arm64 (1.17.1-2build1) over (1.17.1-2) ... 73s Selecting previously unselected package libassuan9:arm64. 73s Preparing to unpack .../libassuan9_3.0.1-2_arm64.deb ... 73s Unpacking libassuan9:arm64 (3.0.1-2) ... 73s Preparing to unpack .../libgpgme11t64_1.24.0-2ubuntu1_arm64.deb ... 73s Unpacking libgpgme11t64:arm64 (1.24.0-2ubuntu1) over (1.23.2-5ubuntu4) ... 73s Preparing to unpack .../python3-markupsafe_2.1.5-1build3_arm64.deb ... 73s Unpacking python3-markupsafe (2.1.5-1build3) over (2.1.5-1build2) ... 73s Setting up python3-markupsafe (2.1.5-1build3) ... 73s Setting up libassuan9:arm64 (3.0.1-2) ... 73s Setting up libgpgme11t64:arm64 (1.24.0-2ubuntu1) ... 73s Setting up python3-cffi-backend:arm64 (1.17.1-2build1) ... 73s Processing triggers for man-db (2.13.0-1) ... 73s Processing triggers for libc-bin (2.40-1ubuntu3) ... 74s Reading package lists... 74s Building dependency tree... 74s Reading state information... 74s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 75s Hit:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease 75s Hit:2 http://ftpmaster.internal/ubuntu plucky InRelease 75s Hit:3 http://ftpmaster.internal/ubuntu plucky-updates InRelease 75s Hit:4 http://ftpmaster.internal/ubuntu plucky-security InRelease 76s Reading package lists... 76s Reading package lists... 76s Building dependency tree... 76s Reading state information... 77s Calculating upgrade... 77s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 77s Reading package lists... 78s Building dependency tree... 78s Reading state information... 79s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 82s autopkgtest [19:37:12]: testbed running kernel: Linux 6.11.0-8-generic #8-Ubuntu SMP PREEMPT_DYNAMIC Mon Sep 16 14:19:41 UTC 2024 82s autopkgtest [19:37:12]: @@@@@@@@@@@@@@@@@@@@ apt-source libreswan 84s Get:1 http://ftpmaster.internal/ubuntu plucky/universe libreswan 4.14-1ubuntu2 (dsc) [2781 B] 84s Get:2 http://ftpmaster.internal/ubuntu plucky/universe libreswan 4.14-1ubuntu2 (tar) [3721 kB] 84s Get:3 http://ftpmaster.internal/ubuntu plucky/universe libreswan 4.14-1ubuntu2 (asc) [862 B] 84s Get:4 http://ftpmaster.internal/ubuntu plucky/universe libreswan 4.14-1ubuntu2 (diff) [17.5 kB] 84s gpgv: Signature made Sun Mar 31 19:34:12 2024 UTC 84s gpgv: using RSA key AC483F68DE728F43F2202FCA568D30F321B2133D 84s gpgv: issuer "steve.langasek@ubuntu.com" 84s gpgv: Can't check signature: No public key 84s dpkg-source: warning: cannot verify inline signature for ./libreswan_4.14-1ubuntu2.dsc: no acceptable signature found 85s autopkgtest [19:37:15]: testing package libreswan version 4.14-1ubuntu2 85s autopkgtest [19:37:15]: build not needed 87s autopkgtest [19:37:17]: test opportunistic: preparing testbed 88s Reading package lists... 89s Building dependency tree... 89s Reading state information... 89s Starting pkgProblemResolver with broken count: 0 90s Starting 2 pkgProblemResolver with broken count: 0 90s Done 90s The following additional packages will be installed: 90s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 90s libnss3-tools libreswan libunbound8 90s The following NEW packages will be installed: 91s autopkgtest-satdep dns-root-data libevent-2.1-7t64 91s libevent-pthreads-2.1-7t64 libldns3t64 libnss3-tools libreswan libunbound8 91s 0 upgraded, 8 newly installed, 0 to remove and 0 not upgraded. 91s Need to get 2651 kB/2651 kB of archives. 91s After this operation, 12.4 MB of additional disk space will be used. 91s Get:1 /tmp/autopkgtest.3IRVVO/1-autopkgtest-satdep.deb autopkgtest-satdep arm64 0 [732 B] 91s Get:2 http://ftpmaster.internal/ubuntu plucky/main arm64 dns-root-data all 2024071800 [4380 B] 91s Get:3 http://ftpmaster.internal/ubuntu plucky/main arm64 libnss3-tools arm64 2:3.103-1 [603 kB] 91s Get:4 http://ftpmaster.internal/ubuntu plucky/main arm64 libevent-pthreads-2.1-7t64 arm64 2.1.12-stable-10 [7922 B] 91s Get:5 http://ftpmaster.internal/ubuntu plucky/universe arm64 libldns3t64 arm64 1.8.4-1 [164 kB] 91s Get:6 http://ftpmaster.internal/ubuntu plucky/main arm64 libevent-2.1-7t64 arm64 2.1.12-stable-10 [140 kB] 91s Get:7 http://ftpmaster.internal/ubuntu plucky/main arm64 libunbound8 arm64 1.20.0-1ubuntu2.1 [431 kB] 91s Get:8 http://ftpmaster.internal/ubuntu plucky/universe arm64 libreswan arm64 4.14-1ubuntu2 [1301 kB] 92s Fetched 2651 kB in 1s (3593 kB/s) 92s Selecting previously unselected package dns-root-data. 92s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 79964 files and directories currently installed.) 92s Preparing to unpack .../0-dns-root-data_2024071800_all.deb ... 92s Unpacking dns-root-data (2024071800) ... 92s Selecting previously unselected package libnss3-tools. 92s Preparing to unpack .../1-libnss3-tools_2%3a3.103-1_arm64.deb ... 92s Unpacking libnss3-tools (2:3.103-1) ... 92s Selecting previously unselected package libevent-pthreads-2.1-7t64:arm64. 92s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10_arm64.deb ... 92s Unpacking libevent-pthreads-2.1-7t64:arm64 (2.1.12-stable-10) ... 92s Selecting previously unselected package libldns3t64:arm64. 92s Preparing to unpack .../3-libldns3t64_1.8.4-1_arm64.deb ... 92s Unpacking libldns3t64:arm64 (1.8.4-1) ... 92s Selecting previously unselected package libevent-2.1-7t64:arm64. 92s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10_arm64.deb ... 92s Unpacking libevent-2.1-7t64:arm64 (2.1.12-stable-10) ... 92s Selecting previously unselected package libunbound8:arm64. 92s Preparing to unpack .../5-libunbound8_1.20.0-1ubuntu2.1_arm64.deb ... 92s Unpacking libunbound8:arm64 (1.20.0-1ubuntu2.1) ... 92s Selecting previously unselected package libreswan. 92s Preparing to unpack .../6-libreswan_4.14-1ubuntu2_arm64.deb ... 92s Unpacking libreswan (4.14-1ubuntu2) ... 92s Selecting previously unselected package autopkgtest-satdep. 92s Preparing to unpack .../7-1-autopkgtest-satdep.deb ... 92s Unpacking autopkgtest-satdep (0) ... 92s Setting up libldns3t64:arm64 (1.8.4-1) ... 92s Setting up libevent-pthreads-2.1-7t64:arm64 (2.1.12-stable-10) ... 92s Setting up libevent-2.1-7t64:arm64 (2.1.12-stable-10) ... 92s Setting up dns-root-data (2024071800) ... 92s Setting up libunbound8:arm64 (1.20.0-1ubuntu2.1) ... 92s Setting up libnss3-tools (2:3.103-1) ... 92s Setting up libreswan (4.14-1ubuntu2) ... 93s ipsec.service is a disabled or a static unit, not starting it. 93s Setting up autopkgtest-satdep (0) ... 93s Processing triggers for man-db (2.13.0-1) ... 94s Processing triggers for libc-bin (2.40-1ubuntu3) ... 97s (Reading database ... 80161 files and directories currently installed.) 97s Removing autopkgtest-satdep (0) ... 98s autopkgtest [19:37:28]: test opportunistic: [----------------------- 98s PING oe.libreswan.org (193.110.157.124) 56(84) bytes of data. 98s From 10.145.255.2 icmp_seq=1 Destination Port Unreachable 99s From 10.145.255.2 icmp_seq=2 Destination Port Unreachable 100s From 10.145.255.2 icmp_seq=3 Destination Port Unreachable 101s From 10.145.255.2 icmp_seq=4 Destination Port Unreachable 102s From 10.145.255.2 icmp_seq=5 Destination Port Unreachable 102s 102s --- oe.libreswan.org ping statistics --- 102s 5 packets transmitted, 0 received, +5 errors, 100% packet loss, time 4002ms 102s 102s autopkgtest [19:37:32]: test opportunistic: -----------------------] 103s opportunistic SKIP exit status 77 and marked as skippable 103s autopkgtest [19:37:33]: test opportunistic: - - - - - - - - - - results - - - - - - - - - - 103s autopkgtest [19:37:33]: test cryptocheck: preparing testbed 183s autopkgtest [19:38:53]: testbed dpkg architecture: arm64 183s autopkgtest [19:38:53]: testbed apt version: 2.9.8 183s autopkgtest [19:38:53]: @@@@@@@@@@@@@@@@@@@@ test bed setup 184s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease [73.9 kB] 185s Get:2 http://ftpmaster.internal/ubuntu plucky-proposed/main Sources [91.9 kB] 185s Get:3 http://ftpmaster.internal/ubuntu plucky-proposed/restricted Sources [7016 B] 185s Get:4 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse Sources [15.5 kB] 185s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/universe Sources [1054 kB] 185s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/main arm64 Packages [169 kB] 185s Get:7 http://ftpmaster.internal/ubuntu plucky-proposed/restricted arm64 Packages [50.3 kB] 185s Get:8 http://ftpmaster.internal/ubuntu plucky-proposed/universe arm64 Packages [797 kB] 185s Get:9 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse arm64 Packages [6404 B] 185s Fetched 2265 kB in 1s (2286 kB/s) 185s Reading package lists... 188s Reading package lists... 188s Building dependency tree... 188s Reading state information... 189s Calculating upgrade... 190s The following NEW packages will be installed: 190s libassuan9 190s The following packages will be upgraded: 190s libaudit-common libaudit1 libgpgme11t64 libseccomp2 python3-cffi-backend 190s python3-markupsafe 191s 6 upgraded, 1 newly installed, 0 to remove and 0 not upgraded. 191s Need to get 397 kB of archives. 191s After this operation, 447 kB of additional disk space will be used. 191s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed/main arm64 libaudit-common all 1:4.0.2-2ubuntu1 [6578 B] 191s Get:2 http://ftpmaster.internal/ubuntu plucky-proposed/main arm64 libaudit1 arm64 1:4.0.2-2ubuntu1 [54.2 kB] 191s Get:3 http://ftpmaster.internal/ubuntu plucky/main arm64 libseccomp2 arm64 2.5.5-1ubuntu5 [51.4 kB] 191s Get:4 http://ftpmaster.internal/ubuntu plucky/main arm64 python3-cffi-backend arm64 1.17.1-2build1 [89.9 kB] 191s Get:5 http://ftpmaster.internal/ubuntu plucky/main arm64 libassuan9 arm64 3.0.1-2 [40.6 kB] 191s Get:6 http://ftpmaster.internal/ubuntu plucky/main arm64 libgpgme11t64 arm64 1.24.0-2ubuntu1 [142 kB] 191s Get:7 http://ftpmaster.internal/ubuntu plucky/main arm64 python3-markupsafe arm64 2.1.5-1build3 [13.0 kB] 192s Fetched 397 kB in 0s (830 kB/s) 192s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 79957 files and directories currently installed.) 192s Preparing to unpack .../libaudit-common_1%3a4.0.2-2ubuntu1_all.deb ... 192s Unpacking libaudit-common (1:4.0.2-2ubuntu1) over (1:4.0.1-1ubuntu2) ... 192s Setting up libaudit-common (1:4.0.2-2ubuntu1) ... 192s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 79957 files and directories currently installed.) 192s Preparing to unpack .../libaudit1_1%3a4.0.2-2ubuntu1_arm64.deb ... 192s Unpacking libaudit1:arm64 (1:4.0.2-2ubuntu1) over (1:4.0.1-1ubuntu2) ... 192s Setting up libaudit1:arm64 (1:4.0.2-2ubuntu1) ... 192s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 79957 files and directories currently installed.) 192s Preparing to unpack .../libseccomp2_2.5.5-1ubuntu5_arm64.deb ... 192s Unpacking libseccomp2:arm64 (2.5.5-1ubuntu5) over (2.5.5-1ubuntu4) ... 192s Setting up libseccomp2:arm64 (2.5.5-1ubuntu5) ... 192s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 79957 files and directories currently installed.) 192s Preparing to unpack .../python3-cffi-backend_1.17.1-2build1_arm64.deb ... 192s Unpacking python3-cffi-backend:arm64 (1.17.1-2build1) over (1.17.1-2) ... 192s Selecting previously unselected package libassuan9:arm64. 192s Preparing to unpack .../libassuan9_3.0.1-2_arm64.deb ... 192s Unpacking libassuan9:arm64 (3.0.1-2) ... 192s Preparing to unpack .../libgpgme11t64_1.24.0-2ubuntu1_arm64.deb ... 192s Unpacking libgpgme11t64:arm64 (1.24.0-2ubuntu1) over (1.23.2-5ubuntu4) ... 193s Preparing to unpack .../python3-markupsafe_2.1.5-1build3_arm64.deb ... 193s Unpacking python3-markupsafe (2.1.5-1build3) over (2.1.5-1build2) ... 193s Setting up python3-markupsafe (2.1.5-1build3) ... 193s Setting up libassuan9:arm64 (3.0.1-2) ... 193s Setting up libgpgme11t64:arm64 (1.24.0-2ubuntu1) ... 193s Setting up python3-cffi-backend:arm64 (1.17.1-2build1) ... 193s Processing triggers for man-db (2.13.0-1) ... 193s Processing triggers for libc-bin (2.40-1ubuntu3) ... 193s Reading package lists... 194s Building dependency tree... 194s Reading state information... 195s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 196s Hit:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease 196s Hit:2 http://ftpmaster.internal/ubuntu plucky InRelease 196s Hit:3 http://ftpmaster.internal/ubuntu plucky-updates InRelease 196s Hit:4 http://ftpmaster.internal/ubuntu plucky-security InRelease 197s Reading package lists... 197s Reading package lists... 198s Building dependency tree... 198s Reading state information... 198s Calculating upgrade... 199s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 199s Reading package lists... 200s Building dependency tree... 200s Reading state information... 201s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 205s Reading package lists... 206s Building dependency tree... 206s Reading state information... 206s Starting pkgProblemResolver with broken count: 0 206s Starting 2 pkgProblemResolver with broken count: 0 206s Done 207s The following additional packages will be installed: 207s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 207s libnss3-tools libreswan libunbound8 208s The following NEW packages will be installed: 208s autopkgtest-satdep dns-root-data libevent-2.1-7t64 208s libevent-pthreads-2.1-7t64 libldns3t64 libnss3-tools libreswan libunbound8 208s 0 upgraded, 8 newly installed, 0 to remove and 0 not upgraded. 208s Need to get 2651 kB/2651 kB of archives. 208s After this operation, 12.4 MB of additional disk space will be used. 208s Get:1 /tmp/autopkgtest.3IRVVO/2-autopkgtest-satdep.deb autopkgtest-satdep arm64 0 [712 B] 208s Get:2 http://ftpmaster.internal/ubuntu plucky/main arm64 dns-root-data all 2024071800 [4380 B] 208s Get:3 http://ftpmaster.internal/ubuntu plucky/main arm64 libnss3-tools arm64 2:3.103-1 [603 kB] 208s Get:4 http://ftpmaster.internal/ubuntu plucky/main arm64 libevent-pthreads-2.1-7t64 arm64 2.1.12-stable-10 [7922 B] 208s Get:5 http://ftpmaster.internal/ubuntu plucky/universe arm64 libldns3t64 arm64 1.8.4-1 [164 kB] 208s Get:6 http://ftpmaster.internal/ubuntu plucky/main arm64 libevent-2.1-7t64 arm64 2.1.12-stable-10 [140 kB] 208s Get:7 http://ftpmaster.internal/ubuntu plucky/main arm64 libunbound8 arm64 1.20.0-1ubuntu2.1 [431 kB] 208s Get:8 http://ftpmaster.internal/ubuntu plucky/universe arm64 libreswan arm64 4.14-1ubuntu2 [1301 kB] 209s Fetched 2651 kB in 1s (3744 kB/s) 209s Selecting previously unselected package dns-root-data. 209s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 79964 files and directories currently installed.) 209s Preparing to unpack .../0-dns-root-data_2024071800_all.deb ... 209s Unpacking dns-root-data (2024071800) ... 209s Selecting previously unselected package libnss3-tools. 209s Preparing to unpack .../1-libnss3-tools_2%3a3.103-1_arm64.deb ... 209s Unpacking libnss3-tools (2:3.103-1) ... 209s Selecting previously unselected package libevent-pthreads-2.1-7t64:arm64. 209s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10_arm64.deb ... 209s Unpacking libevent-pthreads-2.1-7t64:arm64 (2.1.12-stable-10) ... 209s Selecting previously unselected package libldns3t64:arm64. 209s Preparing to unpack .../3-libldns3t64_1.8.4-1_arm64.deb ... 209s Unpacking libldns3t64:arm64 (1.8.4-1) ... 209s Selecting previously unselected package libevent-2.1-7t64:arm64. 209s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10_arm64.deb ... 209s Unpacking libevent-2.1-7t64:arm64 (2.1.12-stable-10) ... 209s Selecting previously unselected package libunbound8:arm64. 209s Preparing to unpack .../5-libunbound8_1.20.0-1ubuntu2.1_arm64.deb ... 209s Unpacking libunbound8:arm64 (1.20.0-1ubuntu2.1) ... 209s Selecting previously unselected package libreswan. 209s Preparing to unpack .../6-libreswan_4.14-1ubuntu2_arm64.deb ... 209s Unpacking libreswan (4.14-1ubuntu2) ... 209s Selecting previously unselected package autopkgtest-satdep. 209s Preparing to unpack .../7-2-autopkgtest-satdep.deb ... 209s Unpacking autopkgtest-satdep (0) ... 209s Setting up libldns3t64:arm64 (1.8.4-1) ... 209s Setting up libevent-pthreads-2.1-7t64:arm64 (2.1.12-stable-10) ... 209s Setting up libevent-2.1-7t64:arm64 (2.1.12-stable-10) ... 209s Setting up dns-root-data (2024071800) ... 209s Setting up libunbound8:arm64 (1.20.0-1ubuntu2.1) ... 209s Setting up libnss3-tools (2:3.103-1) ... 209s Setting up libreswan (4.14-1ubuntu2) ... 210s ipsec.service is a disabled or a static unit, not starting it. 210s Setting up autopkgtest-satdep (0) ... 210s Processing triggers for man-db (2.13.0-1) ... 211s Processing triggers for libc-bin (2.40-1ubuntu3) ... 215s (Reading database ... 80161 files and directories currently installed.) 215s Removing autopkgtest-satdep (0) ... 229s autopkgtest [19:39:39]: test cryptocheck: [----------------------- 230s Testing installed binary: /usr/libexec/ipsec/algparse 230s Testing installed binary: /usr/libexec/ipsec/pluto 230s testing -tp 230s algparse -v2 'esp' 230s AES_GCM_16_256-NONE 230s AES_GCM_16_128-NONE 230s AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 230s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 230s algparse -v2 'esp=' 230s ERROR: ESP proposal is empty 230s algparse -v2 'esp=aes' 230s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 230s algparse -v2 'esp=aes;modp2048' 230s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 230s algparse -v2 'esp=aes-sha1' 230s AES_CBC-HMAC_SHA1_96 230s algparse -v2 'esp=aes-sha1' 230s AES_CBC-HMAC_SHA1_96 230s algparse -v2 'esp=aes-sha1-modp2048' 230s AES_CBC-HMAC_SHA1_96 230s algparse -v2 'esp=aes-128-sha1' 230s AES_CBC_128-HMAC_SHA1_96 230s algparse -v2 'esp=aes-128-sha1' 230s AES_CBC_128-HMAC_SHA1_96 230s algparse -v2 'esp=aes-128-sha1-modp2048' 230s AES_CBC_128-HMAC_SHA1_96 230s algparse -v2 'esp=aes-128' 230s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 230s algparse -v2 'esp=aes_gcm_a-128-null' 230s AES_GCM_8_128-NONE 230s algparse -v2 'esp=3des-sha1;modp1024' 230s ERROR: ESP DH algorithm 'modp1024' is not supported 230s algparse -v2 'esp=3des-sha1;modp1536' 230s 3DES_CBC-HMAC_SHA1_96 230s algparse -v2 'esp=3des-sha1;modp2048' 230s 3DES_CBC-HMAC_SHA1_96 230s algparse -v2 'esp=3des-sha1;dh21' 230s 3DES_CBC-HMAC_SHA1_96 230s algparse -v2 'esp=3des-sha1;ecp_521' 230s 3DES_CBC-HMAC_SHA1_96 230s algparse -v2 'esp=3des-sha1;dh23' 230s ERROR: ESP DH algorithm 'dh23' is not supported 230s algparse -v2 'esp=3des-sha1;dh24' 230s ERROR: ESP DH algorithm 'dh24' is not supported 230s algparse -v2 'esp=3des-sha1' 230s 3DES_CBC-HMAC_SHA1_96 230s algparse -v2 'esp=null-sha1' 230s NULL-HMAC_SHA1_96 230s algparse -v2 'esp=aes_cbc' 230s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 230s algparse -v2 'esp=aes-sha' 230s AES_CBC-HMAC_SHA1_96 230s algparse -v2 'esp=aes-sha1' 230s AES_CBC-HMAC_SHA1_96 230s algparse -v2 'esp=aes128-sha1' 230s AES_CBC_128-HMAC_SHA1_96 230s algparse -v2 'esp=aes-sha2' 230s AES_CBC-HMAC_SHA2_256_128 230s algparse -v2 'esp=aes-sha256' 230s AES_CBC-HMAC_SHA2_256_128 230s algparse -v2 'esp=aes-sha384' 230s AES_CBC-HMAC_SHA2_384_192 230s algparse -v2 'esp=aes-sha512' 230s AES_CBC-HMAC_SHA2_512_256 230s algparse -v2 'esp=aes128-aes_xcbc' 230s AES_CBC_128-AES_XCBC_96 230s algparse -v2 'esp=aes192-sha1' 230s AES_CBC_192-HMAC_SHA1_96 230s algparse -v2 'esp=aes256-sha1' 230s AES_CBC_256-HMAC_SHA1_96 230s algparse -v2 'esp=aes256-sha' 230s AES_CBC_256-HMAC_SHA1_96 230s algparse -v2 'esp=aes256-sha2' 230s AES_CBC_256-HMAC_SHA2_256_128 230s algparse -v2 'esp=aes256-sha2_256' 230s AES_CBC_256-HMAC_SHA2_256_128 230s algparse -v2 'esp=aes256-sha2_384' 230s AES_CBC_256-HMAC_SHA2_384_192 230s algparse -v2 'esp=aes256-sha2_512' 230s AES_CBC_256-HMAC_SHA2_512_256 230s algparse -v2 'esp=camellia' 230s CAMELLIA_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 230s algparse -v2 'esp=camellia128' 230s CAMELLIA_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 230s algparse -v2 'esp=camellia192' 230s CAMELLIA_CBC_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 230s algparse -v2 'esp=camellia256' 230s CAMELLIA_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 230s algparse -v2 'esp=aes_ccm' 230s AES_CCM_16-NONE 230s algparse -v2 'esp=aes_ccm_a-128-null' 230s AES_CCM_8_128-NONE 230s algparse -v2 'esp=aes_ccm_a-192-null' 230s AES_CCM_8_192-NONE 230s algparse -v2 'esp=aes_ccm_a-256-null' 230s AES_CCM_8_256-NONE 230s algparse -v2 'esp=aes_ccm_b-128-null' 230s AES_CCM_12_128-NONE 230s algparse -v2 'esp=aes_ccm_b-192-null' 230s AES_CCM_12_192-NONE 230s algparse -v2 'esp=aes_ccm_b-256-null' 230s AES_CCM_12_256-NONE 230s algparse -v2 'esp=aes_ccm_c-128-null' 230s AES_CCM_16_128-NONE 230s algparse -v2 'esp=aes_ccm_c-192-null' 230s AES_CCM_16_192-NONE 230s algparse -v2 'esp=aes_ccm_c-256-null' 230s algparse: Encryption algorithms: 230s algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 230s algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 230s algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 230s algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 230s algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 230s algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 230s algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm, aes_gcm_c 230s algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_b 230s algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_a 230s algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 230s algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 230s algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 230s algparse: NULL [] IKEv1: ESP IKEv2: ESP 230s algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 230s algparse: Hash algorithms: 230s algparse: MD5 IKEv1: IKE IKEv2: NSS 230s algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 230s algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 230s algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 230s algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 230s algparse: IDENTITY IKEv1: IKEv2: FIPS 230s algparse: PRF algorithms: 230s algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE native(HMAC) md5 230s algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 230s algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 230s algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 230s algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 230s algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 230s algparse: Integrity algorithms: 230s algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH native(HMAC) md5, hmac_md5 230s algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 230s algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 230s algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 230s algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 230s algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 230s algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 230s algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 230s algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 230s algparse: DH algorithms: 230s algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 230s algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 230s algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 230s algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 230s algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 230s algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 230s algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 230s algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 230s algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 230s algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 230s algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 230s algparse: IPCOMP algorithms: 230s algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 230s algparse: LZS IKEv1: IKEv2: ESP AH FIPS 230s algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 230s | parsing 'AES_GCM_16_256,AES_GCM_16_128,AES_CBC_256,AES_CBC_128' for ESP 230s | proposal: 'AES_GCM_16_256' 230s | token: '' '' "AES_GCM_16_256" '' 230s | token: '' "AES_GCM_16_256" '' '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_256' is not recognized 230s | token: '' '' '' 230s | appending ESP encryption algorithm AES_GCM_16[_256] 230s | appending ESP integrity algorithm NONE[_0] 230s | proposal: 'AES_GCM_16_128' 230s | token: '' '' "AES_GCM_16_128" '' 230s | token: '' "AES_GCM_16_128" '' '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_128' is not recognized 230s | token: '' '' '' 230s | appending ESP encryption algorithm AES_GCM_16[_128] 230s | appending ESP integrity algorithm NONE[_0] 230s | proposal: 'AES_CBC_256' 230s | token: '' '' "AES_CBC_256" '' 230s | token: '' "AES_CBC_256" '' '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_256' is not recognized 230s | token: '' '' '' 230s | appending ESP encryption algorithm AES_CBC[_256] 230s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 230s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 230s | proposal: 'AES_CBC_128' 230s | token: '' '' "AES_CBC_128" '' 230s | token: '' "AES_CBC_128" '' '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_128' is not recognized 230s | token: '' '' '' 230s | appending ESP encryption algorithm AES_CBC[_128] 230s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 230s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 230s | parsing '' for ESP 230s | parsing 'aes' for ESP 230s | proposal: 'aes' 230s | token: '' '' "aes" '' 230s | token: '' "aes" '' '' 230s | token: '' '' '' 230s | appending ESP encryption algorithm AES_CBC[_0] 230s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 230s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 230s | parsing 'aes;modp2048' for ESP 230s | proposal: 'aes;modp2048' 230s | token: '' '' "aes" ';' 230s | token: '' "aes" ';' "modp2048" '' 230s | token: ';' "modp2048" '' '' 230s | appending ESP encryption algorithm AES_CBC[_0] 230s | parsing dh: 230s | appending ESP DH algorithm MODP2048[_0] 230s | token: '' '' '' 230s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 230s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 230s algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 230s | parsing 'aes-sha1' for ESP 230s | proposal: 'aes-sha1' 230s | token: '' '' "aes" '-' 230s | token: '' "aes" '-' "sha1" '' 230s | token: '-' "sha1" '' '' 230s | appending ESP encryption algorithm AES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: '' '' '' 230s | parsing 'aes-sha1' for ESP 230s | proposal: 'aes-sha1' 230s | token: '' '' "aes" '-' 230s | token: '' "aes" '-' "sha1" '' 230s | token: '-' "sha1" '' '' 230s | appending ESP encryption algorithm AES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: '' '' '' 230s | parsing 'aes-sha1-modp2048' for ESP 230s | proposal: 'aes-sha1-modp2048' 230s | token: '' '' "aes" '-' 230s | token: '' "aes" '-' "sha1" '-' 230s | token: '-' "sha1" '-' "modp2048" '' 230s | appending ESP encryption algorithm AES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: '-' "modp2048" '' '' 230s | parsing dh: 230s | appending ESP DH algorithm MODP2048[_0] 230s | token: '' '' '' 230s algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 230s | parsing 'aes-128-sha1' for ESP 230s | proposal: 'aes-128-sha1' 230s | token: '' '' "aes" '-' 230s | token: '' "aes" '-' "128" '-' 230s | token: '-' "128" '-' "sha1" '' 230s | token: '-' "sha1" '' '' 230s | appending ESP encryption algorithm AES_CBC[_128] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: '' '' '' 230s | parsing 'aes-128-sha1' for ESP 230s | proposal: 'aes-128-sha1' 230s | token: '' '' "aes" '-' 230s | token: '' "aes" '-' "128" '-' 230s | token: '-' "128" '-' "sha1" '' 230s | token: '-' "sha1" '' '' 230s | appending ESP encryption algorithm AES_CBC[_128] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: '' '' '' 230s | parsing 'aes-128-sha1-modp2048' for ESP 230s | proposal: 'aes-128-sha1-modp2048' 230s | token: '' '' "aes" '-' 230s | token: '' "aes" '-' "128" '-' 230s | token: '-' "128" '-' "sha1" '-' 230s | token: '-' "sha1" '-' "modp2048" '' 230s | appending ESP encryption algorithm AES_CBC[_128] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: '-' "modp2048" '' '' 230s | parsing dh: 230s | appending ESP DH algorithm MODP2048[_0] 230s | token: '' '' '' 230s algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 230s | parsing 'aes-128' for ESP 230s | proposal: 'aes-128' 230s | token: '' '' "aes" '-' 230s | token: '' "aes" '-' "128" '' 230s | token: '-' "128" '' '' 230s | token: '' '' '' 230s | appending ESP encryption algorithm AES_CBC[_128] 230s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 230s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 230s | parsing 'aes_gcm_a-128-null' for ESP 230s | proposal: 'aes_gcm_a-128-null' 230s | token: '' '' "aes_gcm_a" '-' 230s | token: '' "aes_gcm_a" '-' "128" '-' 230s | token: '-' "128" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_GCM_8[_128] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing '3des-sha1;modp1024' for ESP 230s | proposal: '3des-sha1;modp1024' 230s | token: '' '' "3des" '-' 230s | token: '' "3des" '-' "sha1" ';' 230s | token: '-' "sha1" ';' "modp1024" '' 230s | appending ESP encryption algorithm 3DES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: ';' "modp1024" '' '' 230s | parsing dh: 230s | ike_alg_byname() failed: ESP DH algorithm 'modp1024' is not supported 230s | lookup for DH algorithm 'modp1024' failed 230s | ... failed 'ESP DH algorithm 'modp1024' is not supported' 230s | parsing '3des-sha1;modp1536' for ESP 230s | proposal: '3des-sha1;modp1536' 230s | token: '' '' "3des" '-' 230s | token: '' "3des" '-' "sha1" ';' 230s | token: '-' "sha1" ';' "modp1536" '' 230s | appending ESP encryption algorithm 3DES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: ';' "modp1536" '' '' 230s | parsing dh: 230s | appending ESP DH algorithm MODP1536[_0] 230s | token: '' '' '' 230s algparse: ignoring ESP DH algorithm MODP1536 as PFS policy is disabled 230s | parsing '3des-sha1;modp2048' for ESP 230s | proposal: '3des-sha1;modp2048' 230s | token: '' '' "3des" '-' 230s | token: '' "3des" '-' "sha1" ';' 230s | token: '-' "sha1" ';' "modp2048" '' 230s | appending ESP encryption algorithm 3DES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: ';' "modp2048" '' '' 230s | parsing dh: 230s | appending ESP DH algorithm MODP2048[_0] 230s | token: '' '' '' 230s algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 230s | parsing '3des-sha1;dh21' for ESP 230s | proposal: '3des-sha1;dh21' 230s | token: '' '' "3des" '-' 230s | token: '' "3des" '-' "sha1" ';' 230s | token: '-' "sha1" ';' "dh21" '' 230s | appending ESP encryption algorithm 3DES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: ';' "dh21" '' '' 230s | parsing dh: 230s | appending ESP DH algorithm DH21[_0] 230s | token: '' '' '' 230s algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 230s | parsing '3des-sha1;ecp_521' for ESP 230s | proposal: '3des-sha1;ecp_521' 230s | token: '' '' "3des" '-' 230s | token: '' "3des" '-' "sha1" ';' 230s | token: '-' "sha1" ';' "ecp_521" '' 230s | appending ESP encryption algorithm 3DES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: ';' "ecp_521" '' '' 230s | parsing dh: 230s | appending ESP DH algorithm DH21[_0] 230s | token: '' '' '' 230s algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 230s | parsing '3des-sha1;dh23' for ESP 230s | proposal: '3des-sha1;dh23' 230s | token: '' '' "3des" '-' 230s | token: '' "3des" '-' "sha1" ';' 230s | token: '-' "sha1" ';' "dh23" '' 230s | appending ESP encryption algorithm 3DES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: ';' "dh23" '' '' 230s | parsing dh: 230s | ike_alg_byname() failed: ESP DH algorithm 'dh23' is not supported 230s | lookup for DH algorithm 'dh23' failed 230s | ... failed 'ESP DH algorithm 'dh23' is not supported' 230s | parsing '3des-sha1;dh24' for ESP 230s | proposal: '3des-sha1;dh24' 230s | token: '' '' "3des" '-' 230s | token: '' "3des" '-' "sha1" ';' 230s | token: '-' "sha1" ';' "dh24" '' 230s | appending ESP encryption algorithm 3DES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: ';' "dh24" '' '' 230s | parsing dh: 230s | ike_alg_byname() failed: ESP DH algorithm 'dh24' is not supported 230s | lookup for DH algorithm 'dh24' failed 230s | ... failed 'ESP DH algorithm 'dh24' is not supported' 230s | parsing '3des-sha1' for ESP 230s | proposal: '3des-sha1' 230s | token: '' '' "3des" '-' 230s | token: '' "3des" '-' "sha1" '' 230s | token: '-' "sha1" '' '' 230s | appending ESP encryption algorithm 3DES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: '' '' '' 230s | parsing 'null-sha1' for ESP 230s | proposal: 'null-sha1' 230s | token: '' '' "null" '-' 230s | token: '' "null" '-' "sha1" '' 230s | token: '-' "sha1" '' '' 230s | appending ESP encryption algorithm NULL[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: '' '' '' 230s | parsing 'aes_cbc' for ESP 230s | proposal: 'aes_cbc' 230s | token: '' '' "aes_cbc" '' 230s | token: '' "aes_cbc" '' '' 230s | token: '' '' '' 230s | appending ESP encryption algorithm AES_CBC[_0] 230s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 230s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 230s | parsing 'aes-sha' for ESP 230s | proposal: 'aes-sha' 230s | token: '' '' "aes" '-' 230s | token: '' "aes" '-' "sha" '' 230s | token: '-' "sha" '' '' 230s | appending ESP encryption algorithm AES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: '' '' '' 230s | parsing 'aes-sha1' for ESP 230s | proposal: 'aes-sha1' 230s | token: '' '' "aes" '-' 230s | token: '' "aes" '-' "sha1" '' 230s | token: '-' "sha1" '' '' 230s | appending ESP encryption algorithm AES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: '' '' '' 230s | parsing 'aes128-sha1' for ESP 230s | proposal: 'aes128-sha1' 230s | token: '' '' "aes128" '-' 230s | token: '' "aes128" '-' "sha1" '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 230s | token: '-' "sha1" '' '' 230s | appending ESP encryption algorithm AES_CBC[_128] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: '' '' '' 230s | parsing 'aes-sha2' for ESP 230s | proposal: 'aes-sha2' 230s | token: '' '' "aes" '-' 230s | token: '' "aes" '-' "sha2" '' 230s | token: '-' "sha2" '' '' 230s | appending ESP encryption algorithm AES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 230s | token: '' '' '' 230s | parsing 'aes-sha256' for ESP 230s | proposal: 'aes-sha256' 230s | token: '' '' "aes" '-' 230s | token: '' "aes" '-' "sha256" '' 230s | token: '-' "sha256" '' '' 230s | appending ESP encryption algorithm AES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 230s | token: '' '' '' 230s | parsing 'aes-sha384' for ESP 230s | proposal: 'aes-sha384' 230s | token: '' '' "aes" '-' 230s | token: '' "aes" '-' "sha384" '' 230s | token: '-' "sha384" '' '' 230s | appending ESP encryption algorithm AES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 230s | token: '' '' '' 230s | parsing 'aes-sha512' for ESP 230s | proposal: 'aes-sha512' 230s | token: '' '' "aes" '-' 230s | token: '' "aes" '-' "sha512" '' 230s | token: '-' "sha512" '' '' 230s | appending ESP encryption algorithm AES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 230s | token: '' '' '' 230s | parsing 'aes128-aes_xcbc' for ESP 230s | proposal: 'aes128-aes_xcbc' 230s | token: '' '' "aes128" '-' 230s | token: '' "aes128" '-' "aes_xcbc" '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 230s | token: '-' "aes_xcbc" '' '' 230s | appending ESP encryption algorithm AES_CBC[_128] 230s | parsing integ: 230s | appending ESP integrity algorithm AES_XCBC_96[_0] 230s | token: '' '' '' 230s | parsing 'aes192-sha1' for ESP 230s | proposal: 'aes192-sha1' 230s | token: '' '' "aes192" '-' 230s | token: '' "aes192" '-' "sha1" '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'aes192' is not recognized 230s | token: '-' "sha1" '' '' 230s | appending ESP encryption algorithm AES_CBC[_192] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: '' '' '' 230s | parsing 'aes256-sha1' for ESP 230s | proposal: 'aes256-sha1' 230s | token: '' '' "aes256" '-' 230s | token: '' "aes256" '-' "sha1" '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 230s | token: '-' "sha1" '' '' 230s | appending ESP encryption algorithm AES_CBC[_256] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: '' '' '' 230s | parsing 'aes256-sha' for ESP 230s | proposal: 'aes256-sha' 230s | token: '' '' "aes256" '-' 230s | token: '' "aes256" '-' "sha" '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 230s | token: '-' "sha" '' '' 230s | appending ESP encryption algorithm AES_CBC[_256] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: '' '' '' 230s | parsing 'aes256-sha2' for ESP 230s | proposal: 'aes256-sha2' 230s | token: '' '' "aes256" '-' 230s | token: '' "aes256" '-' "sha2" '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 230s | token: '-' "sha2" '' '' 230s | appending ESP encryption algorithm AES_CBC[_256] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 230s | token: '' '' '' 230s | parsing 'aes256-sha2_256' for ESP 230s | proposal: 'aes256-sha2_256' 230s | token: '' '' "aes256" '-' 230s | token: '' "aes256" '-' "sha2_256" '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 230s | token: '-' "sha2_256" '' '' 230s | appending ESP encryption algorithm AES_CBC[_256] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 230s | token: '' '' '' 230s | parsing 'aes256-sha2_384' for ESP 230s | proposal: 'aes256-sha2_384' 230s | token: '' '' "aes256" '-' 230s | token: '' "aes256" '-' "sha2_384" '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 230s | token: '-' "sha2_384" '' '' 230s | appending ESP encryption algorithm AES_CBC[_256] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 230s | token: '' '' '' 230s | parsing 'aes256-sha2_512' for ESP 230s | proposal: 'aes256-sha2_512' 230s | token: '' '' "aes256" '-' 230s | token: '' "aes256" '-' "sha2_512" '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 230s | token: '-' "sha2_512" '' '' 230s | appending ESP encryption algorithm AES_CBC[_256] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 230s | token: '' '' '' 230s | parsing 'camellia' for ESP 230s | proposal: 'camellia' 230s | token: '' '' "camellia" '' 230s | token: '' "camellia" '' '' 230s | token: '' '' '' 230s | appending ESP encryption algorithm CAMELLIA_CBC[_0] 230s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 230s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 230s | parsing 'camellia128' for ESP 230s | proposal: 'camellia128' 230s | token: '' '' "camellia128" '' 230s | token: '' "camellia128" '' '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'camellia128' is not recognized 230s | token: '' '' '' 230s | appending ESP encryption algorithm CAMELLIA_CBC[_128] 230s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 230s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 230s | parsing 'camellia192' for ESP 230s | proposal: 'camellia192' 230s | token: '' '' "camellia192" '' 230s | token: '' "camellia192" '' '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'camellia192' is not recognized 230s | token: '' '' '' 230s | appending ESP encryption algorithm CAMELLIA_CBC[_192] 230s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 230s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 230s | parsing 'camellia256' for ESP 230s | proposal: 'camellia256' 230s | token: '' '' "camellia256" '' 230s | token: '' "camellia256" '' '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'camellia256' is not recognized 230s | token: '' '' '' 230s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 230s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 230s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 230s | parsing 'aes_ccm' for ESP 230s | proposal: 'aes_ccm' 230s | token: '' '' "aes_ccm" '' 230s | token: '' "aes_ccm" '' '' 230s | token: '' '' '' 230s | appending ESP encryption algorithm AES_CCM_16[_0] 230s | appending ESP integrity algorithm NONE[_0] 230s | parsing 'aes_ccm_a-128-null' for ESP 230s | proposal: 'aes_ccm_a-128-null' 230s | token: '' '' "aes_ccm_a" '-' 230s | token: '' "aes_ccm_a" '-' "128" '-' 230s | token: '-' "128" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_CCM_8[_128] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_ccm_a-192-null' for ESP 230s | proposal: 'aes_ccm_a-192-null' 230s | token: '' '' "aes_ccm_a" '-' 230s | token: '' "aes_ccm_a" '-' "192" '-' 230s | token: '-' "192" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_CCM_8[_192] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_ccm_a-256-null' for ESP 230s | proposal: 'aes_ccm_a-256-null' 230s | token: '' '' "aes_ccm_a" '-' 230s | token: '' "aes_ccm_a" '-' "256" '-' 230s | token: '-' "256" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_CCM_8[_256] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_ccm_b-128-null' for ESP 230s | proposal: 'aes_ccm_b-128-null' 230s | token: '' '' "aes_ccm_b" '-' 230s | token: '' "aes_ccm_b" '-' "128" '-' 230s | token: '-' "128" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_CCM_12[_128] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_ccm_b-192-null' for ESP 230s | proposal: 'aes_ccm_b-192-null' 230s | token: '' '' "aes_ccm_b" '-' 230s | token: '' "aes_ccm_b" '-' "192" '-' 230s | token: '-' "192" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_CCM_12[_192] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_ccm_b-256-null' for ESP 230s | proposal: 'aes_ccm_b-256-null' 230s | token: '' '' "aes_ccm_b" '-' 230s | token: '' "aes_ccm_b" '-' "256" '-' 230s | token: '-' "256" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_CCM_12[_256] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_ccm_c-128-null' for ESP 230s | proposal: 'aes_ccm_c-128-null' 230s | token: '' '' "aes_ccm_c" '-' 230s | token: '' "aes_ccm_c" '-' "128" '-' 230s | token: '-' "128" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_CCM_16[_128] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_ccm_c-192-null' for ESP 230s | proposal: 'aes_ccm_c-192-null' 230s | token: '' '' "aes_ccm_c" '-' 230s | token: '' "aes_ccm_c" '-' "192" '-' 230s | token: '-' "192" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_CCM_16[_192] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_ccm_c-256-null' for ESP 230s | proposal: 'aes_ccm_c-256-null' 230s | token: '' '' "aes_ccm_c" '-' 230s | token: '' "aes_ccm_c" '-' "256" '-' 230s | token: '-' "256" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_CCM_16[_256] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_gcm' for ESP 230s | proposal: 'aes_gcm' 230s | token: '' '' "aes_gcm" '' 230s | token: '' "aes_gcm" '' '' 230s | token: '' '' '' 230s | appending ESP encryption algorithm AES_GCM_16[_0] 230s | appending ESP integrity algorithm NONE[_0] 230s | parsing 'aes_gcm_a-128-null' for ESP 230s | proposal: 'aes_gcm_a-128-null' 230s | token: '' '' "aes_gcm_a" '-' 230s | token: '' "aes_gcm_a" '-' "128" '-' 230s | token: '-' "128" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_GCM_8[_128] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_gcm_a-192-null' for ESP 230s | proposal: 'aes_gcm_a-192-null' 230s | token: '' '' "aes_gcm_a" '-' 230s | token: '' "aes_gcm_a" '-' "192" '-' 230s | token: '-' "192" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_GCM_8[_192] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_gcm_a-256-null' for ESP 230s | proposal: 'aes_gcm_a-256-null' 230s | token: '' '' "aes_gcm_a" '-' 230s | token: '' "aes_gcm_a" '-' "256" '-' 230s | token: '-' "256" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_GCM_8[_256] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_gcm_b-128-null' for ESP 230s | proposal: 'aes_gcm_b-128-null' 230s | token: '' '' "aes_gcm_b" '-' 230s | token: '' "aes_gcm_b" '-' "128" '-' 230s | token: '-' "128" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_GCM_12[_128] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_gcm_b-192-null' for ESP 230s | proposal: 'aes_gcm_b-192-null' 230s | token: '' '' "aes_gcm_b" '-' 230s | token: '' "aes_gcm_b" '-' "192" '-' 230s | token: '-' "192" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_GCM_12[_192] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_gcm_b-256-null' for ESP 230s | proposal: 'aes_gcm_b-256-null' 230s | token: '' '' "aes_gcm_b" '-' 230s | token: '' "aes_gcm_b" '-' "256" '-' 230s | token: '-' "256" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_GCM_12[_256] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_gcm_c-128-null' for ESP 230s | proposal: 'aes_gcm_c-128-null' 230s | token: '' '' "aes_gcm_c" '-' 230s | token: '' "aes_gcm_c" '-' "128" '-' 230s | token: '-' "128" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_GCM_16[_128] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_gcm_c-192-null' for ESP 230s | proposal: 'aes_gcm_c-192-null' 230s | token: '' '' "aes_gcm_c" '-' 230s | token: '' "aes_gcm_c" '-' "192" '-' 230s | token: '-' "192" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_GCM_16[_192] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_gcm_c-256-null' for ESP 230s | proposal: 'aes_gcm_c-256-null' 230s | token: '' '' "aes_gcm_c" '-' 230s | token: '' "aes_gcm_c" '-' "256" '-' 230s | token: '-' "256" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_GCM_16[_256] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_ccm_a-null' for ESP 230s | proposal: 'aes_ccm_a-null' 230s | token: '' '' "aes_ccm_a" '-' 230s | token: '' "aes_ccm_a" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_CCM_8[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_ccm_b-null' for ESP 230s | proposal: 'aes_ccm_b-null' 230s | token: '' '' "aes_ccm_b" '-' 230s | token: '' "aes_ccm_b" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_CCM_12[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_ccm_c-null' for ESP 230s | proposal: 'aes_ccm_c-null' 230s | token: '' '' "aes_ccm_c" '-' 230s | token: '' "aes_ccm_c" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_CCM_16[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_gcm_a-null' for ESP 230s | proposal: 'aes_gcm_a-null' 230s | token: '' '' "aes_gcm_a" '-' 230s | token: '' "aes_gcm_a" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_GCM_8[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_gcm_b-null' for ESP 230s | proposal: 'aes_gcm_b-null' 230s | token: '' '' "aes_gcm_b" '-' 230s | token: '' "aes_gcm_b" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_GCM_12[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_gcm_c-null' for ESP 230s | proposal: 'aes_gcm_c-null' 230s | token: '' '' "aes_gcm_c" '-' 230s | token: '' "aes_gcm_c" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_GCM_16[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_ccm-null' for ESP 230s | proposal: 'aes_ccm-null' 230s | token: '' '' "aes_ccm" '-' 230s | token: '' "aes_ccm" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_CCM_16[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_gcm-null' for ESP 230s | proposal: 'aes_gcm-null' 230s | token: '' '' "aes_gcm" '-' 230s | token: '' "aes_gcm" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_GCM_16[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_ccm-256-null' for ESP 230s | proposal: 'aes_ccm-256-null' 230s | token: '' '' "aes_ccm" '-' 230s | token: '' "aes_ccm" '-' "256" '-' 230s | token: '-' "256" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_CCM_16[_256] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_gcm-192-null' for ESP 230s | proposal: 'aes_gcm-192-null' 230s | token: '' '' "aes_gcm" '-' 230s | token: '' "aes_gcm" '-' "192" '-' 230s | token: '-' "192" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_GCM_16[_192] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_ccm_256-null' for ESP 230s | proposal: 'aes_ccm_256-null' 230s | token: '' '' "aes_ccm_256" '-' 230s | token: '' "aes_ccm_256" '-' "null" '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_256' is not recognized 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_CCM_16[_256] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_gcm_192-null' for ESP 230s | proposal: 'aes_gcm_192-null' 230s | token: '' '' "aes_gcm_192" '-' 230s | token: '' "aes_gcm_192" '-' "null" '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_192' is not recognized 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_GCM_16[_192] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_ccm_8-null' for ESP 230s | proposal: 'aes_ccm_8-null' 230s | token: '' '' "aes_ccm_8" '-' 230s | token: '' "aes_ccm_8" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_CCM_8[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_ccm_12-null' for ESP 230s | proposal: 'aes_ccm_12-null' 230s | token: '' '' "aes_ccm_12" '-' 230s | token: '' "aes_ccm_12" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_CCM_12[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_ccm_16-null' for ESP 230s | proposal: 'aes_ccm_16-null' 230s | token: '' '' "aes_ccm_16" '-' 230s | token: '' "aes_ccm_16" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_CCM_16[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_gcm_8-null' for ESP 230s | proposal: 'aes_gcm_8-null' 230s | token: '' '' "aes_gcm_8" '-' 230s | token: '' "aes_gcm_8" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_GCM_8[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_gcm_12-null' for ESP 230s | proposal: 'aes_gcm_12-null' 230s | token: '' '' "aes_gcm_12" '-' 230s | token: '' "aes_gcm_12" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_GCM_12[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_gcm_16-null' for ESP 230s | proposal: 'aes_gcm_16-null' 230s | token: '' '' "aes_gcm_16" '-' 230s | token: '' "aes_gcm_16" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_GCM_16[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_ccm_8-128-null' for ESP 230s | proposal: 'aes_ccm_8-128-null' 230s | token: '' '' "aes_ccm_8" '-' 230s | token: '' "aes_ccm_8" '-' "128" '-' 230s | token: '-' "128" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_CCM_8[_128] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_ccm_12-192-null' for ESP 230s | proposal: 'aes_ccm_12-192-null' 230s | token: '' '' "aes_ccm_12" '-' 230s | token: '' "aes_ccm_12" '-' "192" '-' 230s | token: '-' "192" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_CCM_12[_192] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_ccm_16-256-null' for ESP 230s | proposal: 'aes_ccm_16-256-null' 230s | token: '' '' "aes_ccm_16" '-' 230s | token: '' "aes_ccm_16" '-' "256" '-' 230s | token: '-' "256" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_CCM_16[_256] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_gcm_8-128-null' for ESP 230s | proposal: 'aes_gcm_8-128-null' 230s | token: '' '' "aes_gcm_8" '-' 230s | token: '' "aes_gcm_8" '-' "128" '-' 230s | token: '-' "128" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_GCM_8[_128] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_gcm_12-192-null' for ESP 230s | proposal: 'aes_gcm_12-192-null' 230s | token: '' '' "aes_gcm_12" '-' 230s | token: '' "aes_gcm_12" '-' "192" '-' 230s | token: '-' "192" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_GCM_12[_192] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_gcm_16-256-null' for ESP 230s | proposal: 'aes_gcm_16-256-null' 230s | token: '' '' "aes_gcm_16" '-' 230s | token: '' "aes_gcm_16" '-' "256" '-' 230s | token: '-' "256" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_GCM_16[_256] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_ccm_8_128-null' for ESP 230s | proposal: 'aes_ccm_8_128-null' 230s | token: '' '' "aes_ccm_8_128" '-' 230s | token: '' "aes_ccm_8_128" '-' "null" '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_8_128' is not recognized 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_CCM_8[_128] 230s | parsing integ: 230s AES_CCM_16_256-NONE 230s algparse -v2 'esp=aes_gcm' 230s AES_GCM_16-NONE 230s algparse -v2 'esp=aes_gcm_a-128-null' 230s AES_GCM_8_128-NONE 230s algparse -v2 'esp=aes_gcm_a-192-null' 230s AES_GCM_8_192-NONE 230s algparse -v2 'esp=aes_gcm_a-256-null' 230s AES_GCM_8_256-NONE 230s algparse -v2 'esp=aes_gcm_b-128-null' 230s AES_GCM_12_128-NONE 230s algparse -v2 'esp=aes_gcm_b-192-null' 230s AES_GCM_12_192-NONE 230s algparse -v2 'esp=aes_gcm_b-256-null' 230s AES_GCM_12_256-NONE 230s algparse -v2 'esp=aes_gcm_c-128-null' 230s AES_GCM_16_128-NONE 230s algparse -v2 'esp=aes_gcm_c-192-null' 230s AES_GCM_16_192-NONE 230s algparse -v2 'esp=aes_gcm_c-256-null' 230s AES_GCM_16_256-NONE 230s algparse -v2 'esp=aes_ccm_a-null' 230s AES_CCM_8-NONE 230s algparse -v2 'esp=aes_ccm_b-null' 230s AES_CCM_12-NONE 230s algparse -v2 'esp=aes_ccm_c-null' 230s AES_CCM_16-NONE 230s algparse -v2 'esp=aes_gcm_a-null' 230s AES_GCM_8-NONE 230s algparse -v2 'esp=aes_gcm_b-null' 230s AES_GCM_12-NONE 230s algparse -v2 'esp=aes_gcm_c-null' 230s AES_GCM_16-NONE 230s algparse -v2 'esp=aes_ccm-null' 230s AES_CCM_16-NONE 230s algparse -v2 'esp=aes_gcm-null' 230s AES_GCM_16-NONE 230s algparse -v2 'esp=aes_ccm-256-null' 230s AES_CCM_16_256-NONE 230s algparse -v2 'esp=aes_gcm-192-null' 230s AES_GCM_16_192-NONE 230s algparse -v2 'esp=aes_ccm_256-null' 230s AES_CCM_16_256-NONE 230s algparse -v2 'esp=aes_gcm_192-null' 230s AES_GCM_16_192-NONE 230s algparse -v2 'esp=aes_ccm_8-null' 230s AES_CCM_8-NONE 230s algparse -v2 'esp=aes_ccm_12-null' 230s AES_CCM_12-NONE 230s algparse -v2 'esp=aes_ccm_16-null' 230s AES_CCM_16-NONE 230s algparse -v2 'esp=aes_gcm_8-null' 230s AES_GCM_8-NONE 230s algparse -v2 'esp=aes_gcm_12-null' 230s AES_GCM_12-NONE 230s algparse -v2 'esp=aes_gcm_16-null' 230s AES_GCM_16-NONE 230s algparse -v2 'esp=aes_ccm_8-128-null' 230s AES_CCM_8_128-NONE 230s algparse -v2 'esp=aes_ccm_12-192-null' 230s AES_CCM_12_192-NONE 230s algparse -v2 'esp=aes_ccm_16-256-null' 230s AES_CCM_16_256-NONE 230s algparse -v2 'esp=aes_gcm_8-128-null' 230s AES_GCM_8_128-NONE 230s algparse -v2 'esp=aes_gcm_12-192-null' 230s AES_GCM_12_192-NONE 230s algparse -v2 'esp=aes_gcm_16-256-null' 230s AES_GCM_16_256-NONE 230s algparse -v2 'esp=aes_ccm_8_128-null' 230s AES_CCM_8_128-NONE 230s algparse -v2 'esp=aes_ccm_12_192-null' 230s AES_CCM_12_192-NONE 230s algparse -v2 'esp=aes_ccm_16_256-null' 230s AES_CCM_16_256-NONE 230s algparse -v2 'esp=aes_gcm_8_128-null' 230s AES_GCM_8_128-NONE 230s algparse -v2 'esp=aes_gcm_12_192-null' 230s AES_GCM_12_192-NONE 230s algparse -v2 'esp=aes_gcm_16_256-null' 230s AES_GCM_16_256-NONE 230s algparse -v2 'esp=aes_ctr' 230s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 230s algparse -v2 'esp=aesctr' 230s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 230s algparse -v2 'esp=aes_ctr128' 230s AES_CTR_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 230s algparse -v2 'esp=aes_ctr192' 230s AES_CTR_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 230s algparse -v2 'esp=aes_ctr256' 230s AES_CTR_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 230s algparse -v2 'esp=camellia_cbc_256-hmac_sha2_512_256;modp8192' 230s CAMELLIA_CBC_256-HMAC_SHA2_512_256 230s algparse -v2 'esp=null_auth_aes_gmac_256-null;modp8192' 230s NULL_AUTH_AES_GMAC_256-NONE 230s algparse -v2 'esp=3des-sha1;modp8192' 230s 3DES_CBC-HMAC_SHA1_96 230s algparse -v2 'esp=3des-sha1-modp8192' 230s 3DES_CBC-HMAC_SHA1_96 230s algparse -v2 'esp=aes-sha1,3des-sha1;modp8192' 230s AES_CBC-HMAC_SHA1_96 230s 3DES_CBC-HMAC_SHA1_96 230s algparse -v2 'esp=aes-sha1-modp8192,3des-sha1-modp8192' 230s AES_CBC-HMAC_SHA1_96 230s 3DES_CBC-HMAC_SHA1_96 230s algparse -v2 'esp=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' 230s AES_CBC-HMAC_SHA1_96 230s algparse -v2 'esp=aes;none' 230s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 230s algparse -v2 'esp=aes;none,aes' 230s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 230s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 230s algparse -v2 'esp=aes;none,aes;modp2048' 230s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 230s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 230s algparse -v2 'esp=aes-sha1-none' 230s AES_CBC-HMAC_SHA1_96 230s algparse -v2 'esp=aes-sha1;none' 230s AES_CBC-HMAC_SHA1_96 230s algparse -v2 'esp=3des168-sha1' 230s ERROR: ESP encryption algorithm 3DES_CBC does not allow a key lengths 230s algparse -v2 'esp=3des-null' 230s ERROR: non-AEAD ESP encryption algorithm 3DES_CBC cannot have 'NONE' as the integrity algorithm 230s algparse -v2 'esp=aes128-null' 230s ERROR: non-AEAD ESP encryption algorithm AES_CBC cannot have 'NONE' as the integrity algorithm 230s algparse -v2 'esp=aes224-sha1' 230s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 230s algparse -v2 'esp=aes-224-sha1' 230s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 230s algparse -v2 'esp=aes0-sha1' 230s ERROR: ESP encryption key length is zero 230s algparse -v2 'esp=aes-0-sha1' 230s ERROR: ESP encryption key length is zero 230s algparse -v2 'esp=aes512-sha1' 230s ERROR: ESP encryption algorithm AES_CBC with key length 512 invalid; valid key lengths: 128, 192, 256 230s algparse -v2 'esp=aes-sha1555' 230s ERROR: ESP integrity algorithm 'sha1555' is not recognized 230s algparse -v2 'esp=camellia666-sha1' 230s ERROR: ESP encryption algorithm CAMELLIA_CBC with key length 666 invalid; valid key lengths: 128, 192, 256 230s algparse -v2 'esp=blowfish' 230s ERROR: ESP encryption algorithm 'blowfish' is not supported 230s algparse -v2 'esp=des-sha1' 230s ERROR: ESP encryption algorithm 'des' is not supported 230s algparse -v2 'esp=aes_ctr666' 230s ERROR: ESP encryption algorithm AES_CTR with key length 666 invalid; valid key lengths: 128, 192, 256 230s algparse -v2 'esp=aes128-sha2_128' 230s ERROR: ESP integrity algorithm 'sha2_128' is not recognized 230s algparse -v2 'esp=aes256-sha2_256-4096' 230s ERROR: ESP DH algorithm '4096' is not recognized 230s algparse -v2 'esp=aes256-sha2_256-128' 230s ERROR: ESP DH algorithm '128' is not recognized 230s algparse -v2 'esp=vanitycipher' 230s ERROR: ESP encryption algorithm 'vanitycipher' is not recognized 230s algparse -v2 'esp=ase-sah' 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_ccm_12_192-null' for ESP 230s | proposal: 'aes_ccm_12_192-null' 230s | token: '' '' "aes_ccm_12_192" '-' 230s | token: '' "aes_ccm_12_192" '-' "null" '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_12_192' is not recognized 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_CCM_12[_192] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_ccm_16_256-null' for ESP 230s | proposal: 'aes_ccm_16_256-null' 230s | token: '' '' "aes_ccm_16_256" '-' 230s | token: '' "aes_ccm_16_256" '-' "null" '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_16_256' is not recognized 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_CCM_16[_256] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_gcm_8_128-null' for ESP 230s | proposal: 'aes_gcm_8_128-null' 230s | token: '' '' "aes_gcm_8_128" '-' 230s | token: '' "aes_gcm_8_128" '-' "null" '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_8_128' is not recognized 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_GCM_8[_128] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_gcm_12_192-null' for ESP 230s | proposal: 'aes_gcm_12_192-null' 230s | token: '' '' "aes_gcm_12_192" '-' 230s | token: '' "aes_gcm_12_192" '-' "null" '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_12_192' is not recognized 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_GCM_12[_192] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_gcm_16_256-null' for ESP 230s | proposal: 'aes_gcm_16_256-null' 230s | token: '' '' "aes_gcm_16_256" '-' 230s | token: '' "aes_gcm_16_256" '-' "null" '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_16_256' is not recognized 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_GCM_16[_256] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_ctr' for ESP 230s | proposal: 'aes_ctr' 230s | token: '' '' "aes_ctr" '' 230s | token: '' "aes_ctr" '' '' 230s | token: '' '' '' 230s | appending ESP encryption algorithm AES_CTR[_0] 230s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 230s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 230s | parsing 'aesctr' for ESP 230s | proposal: 'aesctr' 230s | token: '' '' "aesctr" '' 230s | token: '' "aesctr" '' '' 230s | token: '' '' '' 230s | appending ESP encryption algorithm AES_CTR[_0] 230s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 230s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 230s | parsing 'aes_ctr128' for ESP 230s | proposal: 'aes_ctr128' 230s | token: '' '' "aes_ctr128" '' 230s | token: '' "aes_ctr128" '' '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr128' is not recognized 230s | token: '' '' '' 230s | appending ESP encryption algorithm AES_CTR[_128] 230s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 230s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 230s | parsing 'aes_ctr192' for ESP 230s | proposal: 'aes_ctr192' 230s | token: '' '' "aes_ctr192" '' 230s | token: '' "aes_ctr192" '' '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr192' is not recognized 230s | token: '' '' '' 230s | appending ESP encryption algorithm AES_CTR[_192] 230s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 230s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 230s | parsing 'aes_ctr256' for ESP 230s | proposal: 'aes_ctr256' 230s | token: '' '' "aes_ctr256" '' 230s | token: '' "aes_ctr256" '' '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr256' is not recognized 230s | token: '' '' '' 230s | appending ESP encryption algorithm AES_CTR[_256] 230s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 230s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 230s | parsing 'camellia_cbc_256-hmac_sha2_512_256;modp8192' for ESP 230s | proposal: 'camellia_cbc_256-hmac_sha2_512_256;modp8192' 230s | token: '' '' "camellia_cbc_256" '-' 230s | token: '' "camellia_cbc_256" '-' "hmac_sha2_512_256" ';' 230s | ike_alg_byname() failed: ESP encryption algorithm 'camellia_cbc_256' is not recognized 230s | token: '-' "hmac_sha2_512_256" ';' "modp8192" '' 230s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 230s | token: ';' "modp8192" '' '' 230s | parsing dh: 230s | appending ESP DH algorithm MODP8192[_0] 230s | token: '' '' '' 230s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 230s | parsing 'null_auth_aes_gmac_256-null;modp8192' for ESP 230s | proposal: 'null_auth_aes_gmac_256-null;modp8192' 230s | token: '' '' "null_auth_aes_gmac_256" '-' 230s | token: '' "null_auth_aes_gmac_256" '-' "null" ';' 230s | ike_alg_byname() failed: ESP encryption algorithm 'null_auth_aes_gmac_256' is not recognized 230s | token: '-' "null" ';' "modp8192" '' 230s | appending ESP encryption algorithm NULL_AUTH_AES_GMAC[_256] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: ';' "modp8192" '' '' 230s | parsing dh: 230s | appending ESP DH algorithm MODP8192[_0] 230s | token: '' '' '' 230s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 230s | parsing '3des-sha1;modp8192' for ESP 230s | proposal: '3des-sha1;modp8192' 230s | token: '' '' "3des" '-' 230s | token: '' "3des" '-' "sha1" ';' 230s | token: '-' "sha1" ';' "modp8192" '' 230s | appending ESP encryption algorithm 3DES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: ';' "modp8192" '' '' 230s | parsing dh: 230s | appending ESP DH algorithm MODP8192[_0] 230s | token: '' '' '' 230s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 230s | parsing '3des-sha1-modp8192' for ESP 230s | proposal: '3des-sha1-modp8192' 230s | token: '' '' "3des" '-' 230s | token: '' "3des" '-' "sha1" '-' 230s | token: '-' "sha1" '-' "modp8192" '' 230s | appending ESP encryption algorithm 3DES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: '-' "modp8192" '' '' 230s | parsing dh: 230s | appending ESP DH algorithm MODP8192[_0] 230s | token: '' '' '' 230s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 230s | parsing 'aes-sha1,3des-sha1;modp8192' for ESP 230s | proposal: 'aes-sha1' 230s | token: '' '' "aes" '-' 230s | token: '' "aes" '-' "sha1" '' 230s | token: '-' "sha1" '' '' 230s | appending ESP encryption algorithm AES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: '' '' '' 230s | proposal: '3des-sha1;modp8192' 230s | token: '' '' "3des" '-' 230s | token: '' "3des" '-' "sha1" ';' 230s | token: '-' "sha1" ';' "modp8192" '' 230s | appending ESP encryption algorithm 3DES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: ';' "modp8192" '' '' 230s | parsing dh: 230s | appending ESP DH algorithm MODP8192[_0] 230s | token: '' '' '' 230s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 230s | parsing 'aes-sha1-modp8192,3des-sha1-modp8192' for ESP 230s | proposal: 'aes-sha1-modp8192' 230s | token: '' '' "aes" '-' 230s | token: '' "aes" '-' "sha1" '-' 230s | token: '-' "sha1" '-' "modp8192" '' 230s | appending ESP encryption algorithm AES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: '-' "modp8192" '' '' 230s | parsing dh: 230s | appending ESP DH algorithm MODP8192[_0] 230s | token: '' '' '' 230s | proposal: '3des-sha1-modp8192' 230s | token: '' '' "3des" '-' 230s | token: '' "3des" '-' "sha1" '-' 230s | token: '-' "sha1" '-' "modp8192" '' 230s | appending ESP encryption algorithm 3DES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: '-' "modp8192" '' '' 230s | parsing dh: 230s | appending ESP DH algorithm MODP8192[_0] 230s | token: '' '' '' 230s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 230s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 230s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for ESP 230s | proposal: 'aes-sha1-modp8192' 230s | token: '' '' "aes" '-' 230s | token: '' "aes" '-' "sha1" '-' 230s | token: '-' "sha1" '-' "modp8192" '' 230s | appending ESP encryption algorithm AES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: '-' "modp8192" '' '' 230s | parsing dh: 230s | appending ESP DH algorithm MODP8192[_0] 230s | token: '' '' '' 230s | proposal: 'aes-sha1-modp8192' 230s | token: '' '' "aes" '-' 230s | token: '' "aes" '-' "sha1" '-' 230s | token: '-' "sha1" '-' "modp8192" '' 230s | appending ESP encryption algorithm AES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: '-' "modp8192" '' '' 230s | parsing dh: 230s | appending ESP DH algorithm MODP8192[_0] 230s | token: '' '' '' 230s | proposal: 'aes-sha1-modp8192' 230s | token: '' '' "aes" '-' 230s | token: '' "aes" '-' "sha1" '-' 230s | token: '-' "sha1" '-' "modp8192" '' 230s | appending ESP encryption algorithm AES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: '-' "modp8192" '' '' 230s | parsing dh: 230s | appending ESP DH algorithm MODP8192[_0] 230s | token: '' '' '' 230s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 230s | parsing 'aes;none' for ESP 230s | proposal: 'aes;none' 230s | token: '' '' "aes" ';' 230s | token: '' "aes" ';' "none" '' 230s | token: ';' "none" '' '' 230s | appending ESP encryption algorithm AES_CBC[_0] 230s | parsing dh: 230s | appending ESP DH algorithm NONE[_0] 230s | token: '' '' '' 230s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 230s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 230s algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 230s | parsing 'aes;none,aes' for ESP 230s | proposal: 'aes;none' 230s | token: '' '' "aes" ';' 230s | token: '' "aes" ';' "none" '' 230s | token: ';' "none" '' '' 230s | appending ESP encryption algorithm AES_CBC[_0] 230s | parsing dh: 230s | appending ESP DH algorithm NONE[_0] 230s | token: '' '' '' 230s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 230s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 230s | proposal: 'aes' 230s | token: '' '' "aes" '' 230s | token: '' "aes" '' '' 230s | token: '' '' '' 230s | appending ESP encryption algorithm AES_CBC[_0] 230s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 230s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 230s algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 230s | parsing 'aes;none,aes;modp2048' for ESP 230s | proposal: 'aes;none' 230s | token: '' '' "aes" ';' 230s | token: '' "aes" ';' "none" '' 230s | token: ';' "none" '' '' 230s | appending ESP encryption algorithm AES_CBC[_0] 230s | parsing dh: 230s | appending ESP DH algorithm NONE[_0] 230s | token: '' '' '' 230s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 230s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 230s | proposal: 'aes;modp2048' 230s | token: '' '' "aes" ';' 230s | token: '' "aes" ';' "modp2048" '' 230s | token: ';' "modp2048" '' '' 230s | appending ESP encryption algorithm AES_CBC[_0] 230s | parsing dh: 230s | appending ESP DH algorithm MODP2048[_0] 230s | token: '' '' '' 230s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 230s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 230s algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 230s algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 230s | parsing 'aes-sha1-none' for ESP 230s | proposal: 'aes-sha1-none' 230s | token: '' '' "aes" '-' 230s | token: '' "aes" '-' "sha1" '-' 230s | token: '-' "sha1" '-' "none" '' 230s | appending ESP encryption algorithm AES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: '-' "none" '' '' 230s | parsing dh: 230s | appending ESP DH algorithm NONE[_0] 230s | token: '' '' '' 230s algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 230s | parsing 'aes-sha1;none' for ESP 230s | proposal: 'aes-sha1;none' 230s | token: '' '' "aes" '-' 230s | token: '' "aes" '-' "sha1" ';' 230s | token: '-' "sha1" ';' "none" '' 230s | appending ESP encryption algorithm AES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: ';' "none" '' '' 230s | parsing dh: 230s | appending ESP DH algorithm NONE[_0] 230s | token: '' '' '' 230s algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 230s | parsing '3des168-sha1' for ESP 230s | proposal: '3des168-sha1' 230s | token: '' '' "3des168" '-' 230s | token: '' "3des168" '-' "sha1" '' 230s | ike_alg_byname() failed: ESP encryption algorithm '3des168' is not recognized 230s | parsing '3des-null' for ESP 230s | proposal: '3des-null' 230s | token: '' '' "3des" '-' 230s | token: '' "3des" '-' "null" '' 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm 3DES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes128-null' for ESP 230s | proposal: 'aes128-null' 230s | token: '' '' "aes128" '-' 230s | token: '' "aes128" '-' "null" '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 230s | token: '-' "null" '' '' 230s | appending ESP encryption algorithm AES_CBC[_128] 230s | parsing integ: 230s | appending ESP integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes224-sha1' for ESP 230s | proposal: 'aes224-sha1' 230s | token: '' '' "aes224" '-' 230s | token: '' "aes224" '-' "sha1" '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'aes224' is not recognized 230s | parsing 'aes-224-sha1' for ESP 230s | proposal: 'aes-224-sha1' 230s | token: '' '' "aes" '-' 230s | token: '' "aes" '-' "224" '-' 230s | byname('aes') with ='224' failed: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 230s ERROR: ESP encryption algorithm 'ase' is not recognized 230s algparse -v2 'esp=aes-sah1' 230s ERROR: ESP integrity algorithm 'sah1' is not recognized 230s algparse -v2 'esp=id3' 230s ERROR: ESP encryption algorithm 'id3' is not recognized 230s algparse -v2 'esp=aes-id3' 230s ERROR: ESP integrity algorithm 'id3' is not recognized 230s algparse -v2 'esp=aes_gcm-md5' 230s ERROR: AEAD ESP encryption algorithm AES_GCM_16 must have 'NONE' as the integrity algorithm 230s algparse -v2 'esp=mars' 230s ERROR: ESP encryption algorithm 'mars' is not supported 230s algparse -v2 'esp=aes_gcm-16' 230s ERROR: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 230s algparse -v2 'esp=aes_gcm-0' 230s ERROR: ESP encryption key length is zero 230s algparse -v2 'esp=aes_gcm-123456789012345' 230s ERROR: ESP encryption algorithm 'aes_gcm-123456789012345' key length WAY too big 230s algparse -v2 'esp=3des-sha1;dh22' 230s ERROR: ESP DH algorithm 'dh22' is not supported 230s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2' 230s 3DES_CBC-HMAC_SHA1_96 230s 3DES_CBC-HMAC_SHA2_256_128 230s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2' 230s 3DES_CBC-HMAC_SHA1_96 230s 3DES_CBC-HMAC_SHA2_256_128 230s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2-modp8192' 230s | parsing 'aes0-sha1' for ESP 230s | proposal: 'aes0-sha1' 230s | token: '' '' "aes0" '-' 230s | token: '' "aes0" '-' "sha1" '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'aes0' is not recognized 230s | parsing 'aes-0-sha1' for ESP 230s | proposal: 'aes-0-sha1' 230s | token: '' '' "aes" '-' 230s | token: '' "aes" '-' "0" '-' 230s | parsing 'aes512-sha1' for ESP 230s | proposal: 'aes512-sha1' 230s | token: '' '' "aes512" '-' 230s | token: '' "aes512" '-' "sha1" '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'aes512' is not recognized 230s | parsing 'aes-sha1555' for ESP 230s | proposal: 'aes-sha1555' 230s | token: '' '' "aes" '-' 230s | token: '' "aes" '-' "sha1555" '' 230s | token: '-' "sha1555" '' '' 230s | appending ESP encryption algorithm AES_CBC[_0] 230s | parsing integ: 230s | ike_alg_byname() failed: ESP integrity algorithm 'sha1555' is not recognized 230s | lookup for integrity algorithm 'sha1555' failed 230s | or - failed 'ESP integrity algorithm 'sha1555' is not recognized') 230s | parsing 'camellia666-sha1' for ESP 230s | proposal: 'camellia666-sha1' 230s | token: '' '' "camellia666" '-' 230s | token: '' "camellia666" '-' "sha1" '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'camellia666' is not recognized 230s | parsing 'blowfish' for ESP 230s | proposal: 'blowfish' 230s | token: '' '' "blowfish" '' 230s | token: '' "blowfish" '' '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'blowfish' is not supported 230s | parsing 'des-sha1' for ESP 230s | proposal: 'des-sha1' 230s | token: '' '' "des" '-' 230s | token: '' "des" '-' "sha1" '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'des' is not supported 230s | parsing 'aes_ctr666' for ESP 230s | proposal: 'aes_ctr666' 230s | token: '' '' "aes_ctr666" '' 230s | token: '' "aes_ctr666" '' '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr666' is not recognized 230s | parsing 'aes128-sha2_128' for ESP 230s | proposal: 'aes128-sha2_128' 230s | token: '' '' "aes128" '-' 230s | token: '' "aes128" '-' "sha2_128" '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 230s | token: '-' "sha2_128" '' '' 230s | appending ESP encryption algorithm AES_CBC[_128] 230s | parsing integ: 230s | ike_alg_byname() failed: ESP integrity algorithm 'sha2_128' is not recognized 230s | lookup for integrity algorithm 'sha2_128' failed 230s | or - failed 'ESP integrity algorithm 'sha2_128' is not recognized') 230s | parsing 'aes256-sha2_256-4096' for ESP 230s | proposal: 'aes256-sha2_256-4096' 230s | token: '' '' "aes256" '-' 230s | token: '' "aes256" '-' "sha2_256" '-' 230s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 230s | token: '-' "sha2_256" '-' "4096" '' 230s | appending ESP encryption algorithm AES_CBC[_256] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 230s | token: '-' "4096" '' '' 230s | parsing dh: 230s | ike_alg_byname() failed: ESP DH algorithm '4096' is not recognized 230s | lookup for DH algorithm '4096' failed 230s | ... failed 'ESP DH algorithm '4096' is not recognized' 230s | parsing 'aes256-sha2_256-128' for ESP 230s | proposal: 'aes256-sha2_256-128' 230s | token: '' '' "aes256" '-' 230s | token: '' "aes256" '-' "sha2_256" '-' 230s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 230s | token: '-' "sha2_256" '-' "128" '' 230s | appending ESP encryption algorithm AES_CBC[_256] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 230s | token: '-' "128" '' '' 230s | parsing dh: 230s | ike_alg_byname() failed: ESP DH algorithm '128' is not recognized 230s | lookup for DH algorithm '128' failed 230s | ... failed 'ESP DH algorithm '128' is not recognized' 230s | parsing 'vanitycipher' for ESP 230s | proposal: 'vanitycipher' 230s | token: '' '' "vanitycipher" '' 230s | token: '' "vanitycipher" '' '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'vanitycipher' is not recognized 230s | parsing 'ase-sah' for ESP 230s | proposal: 'ase-sah' 230s | token: '' '' "ase" '-' 230s | token: '' "ase" '-' "sah" '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'ase' is not recognized 230s | parsing 'aes-sah1' for ESP 230s | proposal: 'aes-sah1' 230s | token: '' '' "aes" '-' 230s | token: '' "aes" '-' "sah1" '' 230s | token: '-' "sah1" '' '' 230s | appending ESP encryption algorithm AES_CBC[_0] 230s | parsing integ: 230s | ike_alg_byname() failed: ESP integrity algorithm 'sah1' is not recognized 230s | lookup for integrity algorithm 'sah1' failed 230s | or - failed 'ESP integrity algorithm 'sah1' is not recognized') 230s | parsing 'id3' for ESP 230s | proposal: 'id3' 230s | token: '' '' "id3" '' 230s | token: '' "id3" '' '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 230s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 230s | parsing 'aes-id3' for ESP 230s | proposal: 'aes-id3' 230s | token: '' '' "aes" '-' 230s | token: '' "aes" '-' "id3" '' 230s | token: '-' "id3" '' '' 230s | appending ESP encryption algorithm AES_CBC[_0] 230s | parsing integ: 230s | ike_alg_byname() failed: ESP integrity algorithm 'id3' is not recognized 230s | lookup for integrity algorithm 'id3' failed 230s | or - failed 'ESP integrity algorithm 'id3' is not recognized') 230s | parsing 'aes_gcm-md5' for ESP 230s | proposal: 'aes_gcm-md5' 230s | token: '' '' "aes_gcm" '-' 230s | token: '' "aes_gcm" '-' "md5" '' 230s | token: '-' "md5" '' '' 230s | appending ESP encryption algorithm AES_GCM_16[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_MD5_96[_0] 230s | token: '' '' '' 230s | parsing 'mars' for ESP 230s | proposal: 'mars' 230s | token: '' '' "mars" '' 230s | token: '' "mars" '' '' 230s | ike_alg_byname() failed: ESP encryption algorithm 'mars' is not supported 230s | parsing 'aes_gcm-16' for ESP 230s | proposal: 'aes_gcm-16' 230s | token: '' '' "aes_gcm" '-' 230s | token: '' "aes_gcm" '-' "16" '' 230s | byname('aes_gcm') with ='16' failed: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 230s | parsing 'aes_gcm-0' for ESP 230s | proposal: 'aes_gcm-0' 230s | token: '' '' "aes_gcm" '-' 230s | token: '' "aes_gcm" '-' "0" '' 230s | parsing 'aes_gcm-123456789012345' for ESP 230s | proposal: 'aes_gcm-123456789012345' 230s | token: '' '' "aes_gcm" '-' 230s | token: '' "aes_gcm" '-' "123456789012345" '' 230s | parsing '3des-sha1;dh22' for ESP 230s | proposal: '3des-sha1;dh22' 230s | token: '' '' "3des" '-' 230s | token: '' "3des" '-' "sha1" ';' 230s | token: '-' "sha1" ';' "dh22" '' 230s | appending ESP encryption algorithm 3DES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: ';' "dh22" '' '' 230s | parsing dh: 230s | ike_alg_byname() failed: ESP DH algorithm 'dh22' is not supported 230s | lookup for DH algorithm 'dh22' failed 230s | ... failed 'ESP DH algorithm 'dh22' is not supported' 230s | parsing '3des-sha1;modp8192,3des-sha2' for ESP 230s | proposal: '3des-sha1;modp8192' 230s | token: '' '' "3des" '-' 230s | token: '' "3des" '-' "sha1" ';' 230s | token: '-' "sha1" ';' "modp8192" '' 230s | appending ESP encryption algorithm 3DES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: ';' "modp8192" '' '' 230s | parsing dh: 230s | appending ESP DH algorithm MODP8192[_0] 230s | token: '' '' '' 230s | proposal: '3des-sha2' 230s | token: '' '' "3des" '-' 230s | token: '' "3des" '-' "sha2" '' 230s | token: '-' "sha2" '' '' 230s | appending ESP encryption algorithm 3DES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 230s | token: '' '' '' 230s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 230s | parsing '3des-sha1-modp8192,3des-sha2' for ESP 230s | proposal: '3des-sha1-modp8192' 230s | token: '' '' "3des" '-' 230s | token: '' "3des" '-' "sha1" '-' 230s | token: '-' "sha1" '-' "modp8192" '' 230s | appending ESP encryption algorithm 3DES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: '-' "modp8192" '' '' 230s | parsing dh: 230s | appending ESP DH algorithm MODP8192[_0] 230s | token: '' '' '' 230s | proposal: '3des-sha2' 230s | token: '' '' "3des" '-' 230s | token: '' "3des" '-' "sha2" '' 230s | token: '-' "sha2" '' '' 230s | appending ESP encryption algorithm 3DES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 230s | token: '' '' '' 230s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 230s | parsing '3des-sha1-modp8192,3des-sha2-modp8192' for ESP 230s | proposal: '3des-sha1-modp8192' 230s | token: '' '' "3des" '-' 230s | token: '' "3des" '-' "sha1" '-' 230s | token: '-' "sha1" '-' "modp8192" '' 230s | appending ESP encryption algorithm 3DES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: '-' "modp8192" '' '' 230s | parsing dh: 230s | appending ESP DH algorithm MODP8192[_0] 230s | token: '' '' '' 230s | proposal: '3des-sha2-modp8192' 230s | token: '' '' "3des" '-' 230s | token: '' "3des" '-' "sha2" '-' 230s | token: '-' "sha2" '-' "modp8192" '' 230s | appending ESP encryption algorithm 3DES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 230s | token: '-' "modp8192" '' '' 230s | parsing dh: 230s | appending ESP DH algorithm MODP8192[_0] 230s | token: '' '' '' 230s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 230s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 230s | parsing '3des-sha1-modp8192,3des-sha2;modp8192' for ESP 230s | proposal: '3des-sha1-modp8192' 230s | token: '' '' "3des" '-' 230s | token: '' "3des" '-' "sha1" '-' 230s | token: '-' "sha1" '-' "modp8192" '' 230s | appending ESP encryption algorithm 3DES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: '-' "modp8192" '' '' 230s | parsing dh: 230s | appending ESP DH algorithm MODP8192[_0] 230s | token: '' '' '' 230s | proposal: '3des-sha2;modp8192' 230s | token: '' '' "3des" '-' 230s | token: '' "3des" '-' "sha2" ';' 230s | token: '-' "sha2" ';' "modp8192" '' 230s | appending ESP encryption algorithm 3DES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 230s | token: ';' "modp8192" '' '' 230s | parsing dh: 230s | appending ESP DH algorithm MODP8192[_0] 230s | token: '' '' '' 230s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 230s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 230s | parsing '3des-sha1;modp8192,3des-sha2-modp8192' for ESP 230s | proposal: '3des-sha1;modp8192' 230s | token: '' '' "3des" '-' 230s | token: '' "3des" '-' "sha1" ';' 230s | token: '-' "sha1" ';' "modp8192" '' 230s | appending ESP encryption algorithm 3DES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: ';' "modp8192" '' '' 230s | parsing dh: 230s | appending ESP DH algorithm MODP8192[_0] 230s | token: '' '' '' 230s | proposal: '3des-sha2-modp8192' 230s | token: '' '' "3des" '-' 230s | token: '' "3des" '-' "sha2" '-' 230s | token: '-' "sha2" '-' "modp8192" '' 230s | appending ESP encryption algorithm 3DES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 230s | token: '-' "modp8192" '' '' 230s | parsing dh: 230s | appending ESP DH algorithm MODP8192[_0] 230s | token: '' '' '' 230s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 230s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 230s | parsing '3des-sha1;modp8192,3des-sha2;modp8192' for ESP 230s | proposal: '3des-sha1;modp8192' 230s | token: '' '' "3des" '-' 230s | token: '' "3des" '-' "sha1" ';' 230s | token: '-' "sha1" ';' "modp8192" '' 230s | appending ESP encryption algorithm 3DES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: ';' "modp8192" '' '' 230s | parsing dh: 230s | appending ESP DH algorithm MODP8192[_0] 230s | token: '' '' '' 230s | proposal: '3des-sha2;modp8192' 230s | token: '' '' "3des" '-' 230s | token: '' "3des" '-' "sha2" ';' 230s | token: '-' "sha2" ';' "modp8192" '' 230s | appending ESP encryption algorithm 3DES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 230s | token: ';' "modp8192" '' '' 230s | parsing dh: 230s | appending ESP DH algorithm MODP8192[_0] 230s | token: '' '' '' 230s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 230s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 230s | parsing '3des-sha1-modp8192,3des-sha2-modp2048' for ESP 230s | proposal: '3des-sha1-modp8192' 230s | token: '' '' "3des" '-' 230s | token: '' "3des" '-' "sha1" '-' 230s | token: '-' "sha1" '-' "modp8192" '' 230s | appending ESP encryption algorithm 3DES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 230s | token: '-' "modp8192" '' '' 230s | parsing dh: 230s | appending ESP DH algorithm MODP8192[_0] 230s | token: '' '' '' 230s | proposal: '3des-sha2-modp2048' 230s | token: '' '' "3des" '-' 230s | token: '' "3des" '-' "sha2" '-' 230s | token: '-' "sha2" '-' "modp2048" '' 230s | appending ESP encryption algorithm 3DES_CBC[_0] 230s | parsing integ: 230s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 230s | token: '-' "modp2048" '' '' 230s | parsing dh: 230s | appending ESP DH algorithm MODP2048[_0] 230s | token: '' '' '' 230s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 230s algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 230s | parsing 'SHA2_512_256,SHA2_256_128,SHA1_96' for AH 230s | proposal: 'SHA2_512_256' 230s | token: '' '' "SHA2_512_256" '' 230s | token: '' "SHA2_512_256" '' '' 230s | parsing integ: 230s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 230s | token: '' '' '' 230s | proposal: 'SHA2_256_128' 230s | token: '' '' "SHA2_256_128" '' 230s | token: '' "SHA2_256_128" '' '' 230s | parsing integ: 230s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 230s | token: '' '' '' 230s | proposal: 'SHA1_96' 230s | token: '' '' "SHA1_96" '' 230s | token: '' "SHA1_96" '' '' 230s | parsing integ: 230s | appending AH integrity algorithm HMAC_SHA1_96[_0] 230s | token: '' '' '' 230s | parsing '' for AH 230s | parsing 'md5' for AH 230s | proposal: 'md5' 230s | token: '' '' "md5" '' 230s | token: '' "md5" '' '' 230s | parsing integ: 230s | appending AH integrity algorithm HMAC_MD5_96[_0] 230s | token: '' '' '' 230s | parsing 'sha' for AH 230s | proposal: 'sha' 230s | token: '' '' "sha" '' 230s | token: '' "sha" '' '' 230s | parsing integ: 230s | appending AH integrity algorithm HMAC_SHA1_96[_0] 230s | token: '' '' '' 230s | parsing 'sha;modp2048' for AH 230s | proposal: 'sha;modp2048' 230s | token: '' '' "sha" ';' 230s | token: '' "sha" ';' "modp2048" '' 230s | parsing integ: 230s | appending AH integrity algorithm HMAC_SHA1_96[_0] 230s | token: ';' "modp2048" '' '' 230s | parsing dh: 230s | appending AH DH algorithm MODP2048[_0] 230s | token: '' '' '' 230s algparse: ignoring AH DH algorithm MODP2048 as PFS policy is disabled 230s | parsing 'sha1' for AH 230s | proposal: 'sha1' 230s | token: '' '' "sha1" '' 230s | token: '' "sha1" '' '' 230s | parsing integ: 230s | appending AH integrity algorithm HMAC_SHA1_96[_0] 230s | token: '' '' '' 230s | parsing 'sha2' for AH 230s | proposal: 'sha2' 230s | token: '' '' "sha2" '' 230s | token: '' "sha2" '' '' 230s | parsing integ: 230s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 230s | token: '' '' '' 230s | parsing 'sha256' for AH 230s | proposal: 'sha256' 230s | token: '' '' "sha256" '' 230s | token: '' "sha256" '' '' 230s | parsing integ: 230s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 230s | token: '' '' '' 230s | parsing 'sha384' for AH 230s | proposal: 'sha384' 230s | token: '' '' "sha384" '' 230s | token: '' "sha384" '' '' 230s | parsing integ: 230s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 230s | token: '' '' '' 230s | parsing 'sha512' for AH 230s | proposal: 'sha512' 230s | token: '' '' "sha512" '' 230s | token: '' "sha512" '' '' 230s | parsing integ: 230s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 230s | token: '' '' '' 230s | parsing 'sha2_256' for AH 230s | proposal: 'sha2_256' 230s | token: '' '' "sha2_256" '' 230s | token: '' "sha2_256" '' '' 230s | parsing integ: 230s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 230s | token: '' '' '' 230s | parsing 'sha2_384' for AH 230s | proposal: 'sha2_384' 230s | token: '' '' "sha2_384" '' 230s | token: '' "sha2_384" '' '' 230s | parsing integ: 230s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 230s | token: '' '' '' 230s | parsing 'sha2_512' for AH 230s | proposal: 'sha2_512' 230s | token: '' '' "sha2_512" '' 230s | token: '' "sha2_512" '' '' 230s | parsing integ: 230s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 230s | token: '' '' '' 230s | parsing 'aes_xcbc' for AH 230s | proposal: 'aes_xcbc' 230s | token: '' '' "aes_xcbc" '' 230s | token: '' "aes_xcbc" '' '' 230s | parsing integ: 230s 3DES_CBC-HMAC_SHA1_96 230s 3DES_CBC-HMAC_SHA2_256_128 230s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2;modp8192' 230s 3DES_CBC-HMAC_SHA1_96 230s 3DES_CBC-HMAC_SHA2_256_128 230s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2-modp8192' 230s 3DES_CBC-HMAC_SHA1_96 230s 3DES_CBC-HMAC_SHA2_256_128 230s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2;modp8192' 230s 3DES_CBC-HMAC_SHA1_96 230s 3DES_CBC-HMAC_SHA2_256_128 230s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2-modp2048' 230s 3DES_CBC-HMAC_SHA1_96 230s 3DES_CBC-HMAC_SHA2_256_128 230s algparse -v2 'ah' 230s HMAC_SHA2_512_256 230s HMAC_SHA2_256_128 230s HMAC_SHA1_96 230s algparse -v2 'ah=' 230s ERROR: AH proposal is empty 230s algparse -v2 'ah=md5' 230s HMAC_MD5_96 230s algparse -v2 'ah=sha' 230s HMAC_SHA1_96 230s algparse -v2 'ah=sha;modp2048' 230s HMAC_SHA1_96 230s algparse -v2 'ah=sha1' 230s HMAC_SHA1_96 230s algparse -v2 'ah=sha2' 230s HMAC_SHA2_256_128 230s algparse -v2 'ah=sha256' 230s HMAC_SHA2_256_128 230s algparse -v2 'ah=sha384' 230s HMAC_SHA2_384_192 230s algparse -v2 'ah=sha512' 230s HMAC_SHA2_512_256 230s algparse -v2 'ah=sha2_256' 230s HMAC_SHA2_256_128 230s algparse -v2 'ah=sha2_384' 230s HMAC_SHA2_384_192 230s algparse -v2 'ah=sha2_512' 230s HMAC_SHA2_512_256 230s algparse -v2 'ah=aes_xcbc' 230s AES_XCBC_96 230s algparse -v2 'ah=sha2-none' 230s HMAC_SHA2_256_128 230s algparse -v2 'ah=sha2;none' 230s HMAC_SHA2_256_128 230s algparse -v2 'ah=sha1-modp8192,sha1-modp8192,sha1-modp8192' 230s HMAC_SHA1_96 230s algparse -v2 'ah=aes-sha1' 230s ERROR: AH integrity algorithm 'aes' is not recognized 230s algparse -v2 'ah=vanityhash1' 230s ERROR: AH integrity algorithm 'vanityhash1' is not recognized 230s algparse -v2 'ah=aes_gcm_c-256' 230s ERROR: AH integrity algorithm 'aes_gcm_c' is not recognized 230s algparse -v2 'ah=id3' 230s ERROR: AH integrity algorithm 'id3' is not recognized 230s algparse -v2 'ah=3des' 230s ERROR: AH integrity algorithm '3des' is not recognized 230s algparse -v2 'ah=null' 230s ERROR: AH cannot have 'none' as the integrity algorithm 230s algparse -v2 'ah=aes_gcm' 230s ERROR: AH integrity algorithm 'aes_gcm' is not recognized 230s algparse -v2 'ah=aes_ccm' 230s ERROR: AH integrity algorithm 'aes_ccm' is not recognized 230s algparse -v2 'ah=ripemd' 230s ERROR: AH integrity algorithm 'ripemd' is not recognized 230s algparse -v2 'ike' 230s | appending AH integrity algorithm AES_XCBC_96[_0] 230s | token: '' '' '' 230s | parsing 'sha2-none' for AH 230s | proposal: 'sha2-none' 230s | token: '' '' "sha2" '-' 230s | token: '' "sha2" '-' "none" '' 230s | parsing integ: 230s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 230s | token: '-' "none" '' '' 230s | parsing dh: 230s | appending AH DH algorithm NONE[_0] 230s | token: '' '' '' 230s algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 230s | parsing 'sha2;none' for AH 230s | proposal: 'sha2;none' 230s | token: '' '' "sha2" ';' 230s | token: '' "sha2" ';' "none" '' 230s | parsing integ: 230s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 230s | token: ';' "none" '' '' 230s | parsing dh: 230s | appending AH DH algorithm NONE[_0] 230s | token: '' '' '' 230s algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 230s | parsing 'sha1-modp8192,sha1-modp8192,sha1-modp8192' for AH 230s | proposal: 'sha1-modp8192' 230s | token: '' '' "sha1" '-' 230s | token: '' "sha1" '-' "modp8192" '' 230s | parsing integ: 230s | appending AH integrity algorithm HMAC_SHA1_96[_0] 230s | token: '-' "modp8192" '' '' 230s | parsing dh: 230s | appending AH DH algorithm MODP8192[_0] 230s | token: '' '' '' 230s | proposal: 'sha1-modp8192' 230s | token: '' '' "sha1" '-' 230s | token: '' "sha1" '-' "modp8192" '' 230s | parsing integ: 230s | appending AH integrity algorithm HMAC_SHA1_96[_0] 230s | token: '-' "modp8192" '' '' 230s | parsing dh: 230s | appending AH DH algorithm MODP8192[_0] 230s | token: '' '' '' 230s | proposal: 'sha1-modp8192' 230s | token: '' '' "sha1" '-' 230s | token: '' "sha1" '-' "modp8192" '' 230s | parsing integ: 230s | appending AH integrity algorithm HMAC_SHA1_96[_0] 230s | token: '-' "modp8192" '' '' 230s | parsing dh: 230s | appending AH DH algorithm MODP8192[_0] 230s | token: '' '' '' 230s algparse: ignoring AH DH algorithm MODP8192 as PFS policy is disabled 230s | parsing 'aes-sha1' for AH 230s | proposal: 'aes-sha1' 230s | token: '' '' "aes" '-' 230s | token: '' "aes" '-' "sha1" '' 230s | parsing integ: 230s | ike_alg_byname() failed: AH integrity algorithm 'aes' is not recognized 230s | lookup for integrity algorithm 'aes' failed 230s | or - failed 'AH integrity algorithm 'aes' is not recognized') 230s | parsing 'vanityhash1' for AH 230s | proposal: 'vanityhash1' 230s | token: '' '' "vanityhash1" '' 230s | token: '' "vanityhash1" '' '' 230s | parsing integ: 230s | ike_alg_byname() failed: AH integrity algorithm 'vanityhash1' is not recognized 230s | lookup for integrity algorithm 'vanityhash1' failed 230s | or - failed 'AH integrity algorithm 'vanityhash1' is not recognized') 230s | parsing 'aes_gcm_c-256' for AH 230s | proposal: 'aes_gcm_c-256' 230s | token: '' '' "aes_gcm_c" '-' 230s | token: '' "aes_gcm_c" '-' "256" '' 230s | parsing integ: 230s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm_c' is not recognized 230s | lookup for integrity algorithm 'aes_gcm_c' failed 230s | or - failed 'AH integrity algorithm 'aes_gcm_c' is not recognized') 230s | parsing 'id3' for AH 230s | proposal: 'id3' 230s | token: '' '' "id3" '' 230s | token: '' "id3" '' '' 230s | parsing integ: 230s | ike_alg_byname() failed: AH integrity algorithm 'id3' is not recognized 230s | lookup for integrity algorithm 'id3' failed 230s | or - failed 'AH integrity algorithm 'id3' is not recognized') 230s | parsing '3des' for AH 230s | proposal: '3des' 230s | token: '' '' "3des" '' 230s | token: '' "3des" '' '' 230s | parsing integ: 230s | ike_alg_byname() failed: AH integrity algorithm '3des' is not recognized 230s | lookup for integrity algorithm '3des' failed 230s | or - failed 'AH integrity algorithm '3des' is not recognized') 230s | parsing 'null' for AH 230s | proposal: 'null' 230s | token: '' '' "null" '' 230s | token: '' "null" '' '' 230s | parsing integ: 230s | appending AH integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | parsing 'aes_gcm' for AH 230s | proposal: 'aes_gcm' 230s | token: '' '' "aes_gcm" '' 230s | token: '' "aes_gcm" '' '' 230s | parsing integ: 230s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm' is not recognized 230s | lookup for integrity algorithm 'aes_gcm' failed 230s | or - failed 'AH integrity algorithm 'aes_gcm' is not recognized') 230s | parsing 'aes_ccm' for AH 230s | proposal: 'aes_ccm' 230s | token: '' '' "aes_ccm" '' 230s | token: '' "aes_ccm" '' '' 230s | parsing integ: 230s | ike_alg_byname() failed: AH integrity algorithm 'aes_ccm' is not recognized 230s | lookup for integrity algorithm 'aes_ccm' failed 230s | or - failed 'AH integrity algorithm 'aes_ccm' is not recognized') 230s AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 230s AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 230s AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 230s AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 230s algparse -v2 'ike=' 230s ERROR: IKE proposal is empty 230s algparse -v2 'ike=3des-sha1' 230s 3DES_CBC-HMAC_SHA1-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 230s algparse -v2 'ike=3des-sha1' 230s 3DES_CBC-HMAC_SHA1-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 230s algparse -v2 'ike=3des-sha1;modp1536' 230s 3DES_CBC-HMAC_SHA1-MODP1536 230s algparse -v2 'ike=3des;dh21' 230s 3DES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH21 230s algparse -v2 'ike=3des-sha1;dh21' 230s 3DES_CBC-HMAC_SHA1-DH21 230s algparse -v2 'ike=3des-sha1-ecp_521' 230s 3DES_CBC-HMAC_SHA1-DH21 230s algparse -v2 'ike=3des+aes' 230s 3DES_CBC+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 230s algparse -v2 'ike=aes;none' 230s ERROR: IKE DH algorithm 'none' not permitted 230s algparse -v2 'ike=id2' 230s ERROR: IKE encryption algorithm 'id2' is not recognized 230s algparse -v2 'ike=3des-id2' 230s ERROR: IKE PRF algorithm 'id2' is not recognized 230s algparse -v2 'ike=aes_ccm' 230s ERROR: IKE encryption algorithm 'aes_ccm' is not supported 230s algparse -v2 'ike=aes-sha1-sha2-ecp_521' 230s ERROR: IKE DH algorithm 'sha2' is not recognized 230s algparse -v2 'ike=aes-sha2-sha2;ecp_521' 230s ERROR: IKE DH algorithm 'sha2' is not recognized 230s algparse -v2 'ike=aes-sha1_96-sha2-ecp_521' 230s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 230s algparse -v2 'ike=aes-sha1_96-sha2;ecp_521' 230s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 230s algparse -v2 'ike=aes+aes-sha1+sha1-modp8192+modp8192' 230s AES_CBC-HMAC_SHA1-MODP8192 230s algparse -v2 'ike=3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' 230s 3DES_CBC+AES_CBC-HMAC_SHA2_256+HMAC_SHA1-MODP4096+MODP8192 230s algparse -v2 'ike=aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' 230s AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 230s algparse -v2 'ike=aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' 230s AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 230s algparse -v2 'ike=aes+aes128+aes256' 230s AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 230s algparse -v2 'ike=aes128+aes+aes256' 230s AES_CBC_128+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 230s algparse -v2 'ike=aes128+aes256+aes' 230s AES_CBC_128+AES_CBC_256+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 230s algparse -v2 'ike=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' 230s AES_CBC-HMAC_SHA1-MODP8192 230s algparse -v2 'ike=aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' 230s | parsing 'ripemd' for AH 230s | proposal: 'ripemd' 230s | token: '' '' "ripemd" '' 230s | token: '' "ripemd" '' '' 230s | parsing integ: 230s | ike_alg_byname() failed: AH integrity algorithm 'ripemd' is not recognized 230s | lookup for integrity algorithm 'ripemd' failed 230s | or - failed 'AH integrity algorithm 'ripemd' is not recognized') 230s | parsing 'AES_GCM_16_256,AES_GCM_16_128,AES_CBC_256,AES_CBC_128' for IKE 230s | proposal: 'AES_GCM_16_256' 230s | token: '' '' "AES_GCM_16_256" '' 230s | token: '' "AES_GCM_16_256" '' '' 230s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_256' is not recognized 230s | token: '' '' '' 230s | appending IKE encryption algorithm AES_GCM_16[_256] 230s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 230s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 230s | appending IKE integrity algorithm NONE[_0] 230s | appending IKE DH algorithm MODP2048[_0] 230s | appending IKE DH algorithm MODP3072[_0] 230s | appending IKE DH algorithm MODP4096[_0] 230s | appending IKE DH algorithm MODP8192[_0] 230s | appending IKE DH algorithm DH19[_0] 230s | appending IKE DH algorithm DH20[_0] 230s | appending IKE DH algorithm DH21[_0] 230s | appending IKE DH algorithm DH31[_0] 230s | proposal: 'AES_GCM_16_128' 230s | token: '' '' "AES_GCM_16_128" '' 230s | token: '' "AES_GCM_16_128" '' '' 230s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_128' is not recognized 230s | token: '' '' '' 230s | appending IKE encryption algorithm AES_GCM_16[_128] 230s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 230s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 230s | appending IKE integrity algorithm NONE[_0] 230s | appending IKE DH algorithm MODP2048[_0] 230s | appending IKE DH algorithm MODP3072[_0] 230s | appending IKE DH algorithm MODP4096[_0] 230s | appending IKE DH algorithm MODP8192[_0] 230s | appending IKE DH algorithm DH19[_0] 230s | appending IKE DH algorithm DH20[_0] 230s | appending IKE DH algorithm DH21[_0] 230s | appending IKE DH algorithm DH31[_0] 230s | proposal: 'AES_CBC_256' 230s | token: '' '' "AES_CBC_256" '' 230s | token: '' "AES_CBC_256" '' '' 230s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_256' is not recognized 230s | token: '' '' '' 230s | appending IKE encryption algorithm AES_CBC[_256] 230s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 230s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 230s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 230s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 230s | appending IKE DH algorithm MODP2048[_0] 230s | appending IKE DH algorithm MODP3072[_0] 230s | appending IKE DH algorithm MODP4096[_0] 230s | appending IKE DH algorithm MODP8192[_0] 230s | appending IKE DH algorithm DH19[_0] 230s | appending IKE DH algorithm DH20[_0] 230s | appending IKE DH algorithm DH21[_0] 230s | appending IKE DH algorithm DH31[_0] 230s | proposal: 'AES_CBC_128' 230s | token: '' '' "AES_CBC_128" '' 230s | token: '' "AES_CBC_128" '' '' 230s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_128' is not recognized 230s | token: '' '' '' 230s | appending IKE encryption algorithm AES_CBC[_128] 230s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 230s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 230s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 230s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 230s | appending IKE DH algorithm MODP2048[_0] 230s | appending IKE DH algorithm MODP3072[_0] 230s | appending IKE DH algorithm MODP4096[_0] 230s | appending IKE DH algorithm MODP8192[_0] 230s | appending IKE DH algorithm DH19[_0] 230s | appending IKE DH algorithm DH20[_0] 230s | appending IKE DH algorithm DH21[_0] 230s | appending IKE DH algorithm DH31[_0] 230s | parsing '' for IKE 230s | parsing '3des-sha1' for IKE 230s | proposal: '3des-sha1' 230s | token: '' '' "3des" '-' 230s | token: '' "3des" '-' "sha1" '' 230s | token: '-' "sha1" '' '' 230s | appending IKE encryption algorithm 3DES_CBC[_0] 230s | parsing prf: 230s | appending IKE PRF algorithm HMAC_SHA1[_0] 230s | token: '' '' '' 230s | - succeeded, advancing tokens 230s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 230s | appending IKE DH algorithm MODP2048[_0] 230s | appending IKE DH algorithm MODP3072[_0] 230s | appending IKE DH algorithm MODP4096[_0] 230s | appending IKE DH algorithm MODP8192[_0] 230s | appending IKE DH algorithm DH19[_0] 230s | appending IKE DH algorithm DH20[_0] 230s | appending IKE DH algorithm DH21[_0] 230s | appending IKE DH algorithm DH31[_0] 230s | parsing '3des-sha1' for IKE 230s | proposal: '3des-sha1' 230s | token: '' '' "3des" '-' 230s | token: '' "3des" '-' "sha1" '' 230s | token: '-' "sha1" '' '' 230s | appending IKE encryption algorithm 3DES_CBC[_0] 230s | parsing prf: 230s | appending IKE PRF algorithm HMAC_SHA1[_0] 230s | token: '' '' '' 230s | - succeeded, advancing tokens 230s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 230s | appending IKE DH algorithm MODP2048[_0] 230s | appending IKE DH algorithm MODP3072[_0] 230s | appending IKE DH algorithm MODP4096[_0] 230s | appending IKE DH algorithm MODP8192[_0] 230s | appending IKE DH algorithm DH19[_0] 230s | appending IKE DH algorithm DH20[_0] 230s | appending IKE DH algorithm DH21[_0] 230s | appending IKE DH algorithm DH31[_0] 230s | parsing '3des-sha1;modp1536' for IKE 230s | proposal: '3des-sha1;modp1536' 230s | token: '' '' "3des" '-' 230s | token: '' "3des" '-' "sha1" ';' 230s | token: '-' "sha1" ';' "modp1536" '' 230s | appending IKE encryption algorithm 3DES_CBC[_0] 230s | parsing prf: 230s | appending IKE PRF algorithm HMAC_SHA1[_0] 230s | token: ';' "modp1536" '' '' 230s | - succeeded, advancing tokens 230s | parsing dh: 230s | appending IKE DH algorithm MODP1536[_0] 230s | token: '' '' '' 230s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 230s | parsing '3des;dh21' for IKE 230s | proposal: '3des;dh21' 230s | token: '' '' "3des" ';' 230s | token: '' "3des" ';' "dh21" '' 230s | token: ';' "dh21" '' '' 230s | appending IKE encryption algorithm 3DES_CBC[_0] 230s | parsing dh: 230s | appending IKE DH algorithm DH21[_0] 230s | token: '' '' '' 230s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 230s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 230s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 230s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 230s | parsing '3des-sha1;dh21' for IKE 230s | proposal: '3des-sha1;dh21' 230s | token: '' '' "3des" '-' 230s | token: '' "3des" '-' "sha1" ';' 230s | token: '-' "sha1" ';' "dh21" '' 230s | appending IKE encryption algorithm 3DES_CBC[_0] 230s | parsing prf: 230s | appending IKE PRF algorithm HMAC_SHA1[_0] 230s | token: ';' "dh21" '' '' 230s | - succeeded, advancing tokens 230s | parsing dh: 230s | appending IKE DH algorithm DH21[_0] 230s | token: '' '' '' 230s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 230s | parsing '3des-sha1-ecp_521' for IKE 230s | proposal: '3des-sha1-ecp_521' 230s | token: '' '' "3des" '-' 230s | token: '' "3des" '-' "sha1" '-' 230s | token: '-' "sha1" '-' "ecp_521" '' 230s | appending IKE encryption algorithm 3DES_CBC[_0] 230s | parsing prf: 230s | appending IKE PRF algorithm HMAC_SHA1[_0] 230s | token: '-' "ecp_521" '' '' 230s | - succeeded, advancing tokens 230s | parsing dh: 230s | appending IKE DH algorithm DH21[_0] 230s | token: '' '' '' 230s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 230s | parsing '3des+aes' for IKE 230s | proposal: '3des+aes' 230s | token: '' '' "3des" '+' 230s | token: '' "3des" '+' "aes" '' 230s | token: '+' "aes" '' '' 230s | appending IKE encryption algorithm 3DES_CBC[_0] 230s | token: '' '' '' 230s | appending IKE encryption algorithm AES_CBC[_0] 230s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 230s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 230s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 230s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 230s | appending IKE DH algorithm MODP2048[_0] 230s | appending IKE DH algorithm MODP3072[_0] 230s | appending IKE DH algorithm MODP4096[_0] 230s | appending IKE DH algorithm MODP8192[_0] 230s | appending IKE DH algorithm DH19[_0] 230s | appending IKE DH algorithm DH20[_0] 230s | appending IKE DH algorithm DH21[_0] 230s | appending IKE DH algorithm DH31[_0] 230s | parsing 'aes;none' for IKE 230s | proposal: 'aes;none' 230s | token: '' '' "aes" ';' 230s | token: '' "aes" ';' "none" '' 230s | token: ';' "none" '' '' 230s | appending IKE encryption algorithm AES_CBC[_0] 230s | parsing dh: 230s | appending IKE DH algorithm NONE[_0] 230s | token: '' '' '' 230s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 230s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 230s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 230s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 230s | parsing 'id2' for IKE 230s | proposal: 'id2' 230s | token: '' '' "id2" '' 230s | token: '' "id2" '' '' 230s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 230s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 230s | parsing '3des-id2' for IKE 230s | proposal: '3des-id2' 230s | token: '' '' "3des" '-' 230s | token: '' "3des" '-' "id2" '' 230s | token: '-' "id2" '' '' 230s | appending IKE encryption algorithm 3DES_CBC[_0] 230s | parsing prf: 230s | ike_alg_byname() failed: IKE PRF algorithm 'id2' is not recognized 230s | lookup for PRF algorithm 'id2' failed 230s | - failed, saving error 'IKE PRF algorithm 'id2' is not recognized' and tossing result 230s | parsing integ: 230s | ike_alg_byname() failed: IKE integrity algorithm 'id2' is not recognized 230s | lookup for integrity algorithm 'id2' failed 230s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'id2' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'id2' is not recognized') 230s | parsing 'aes_ccm' for IKE 230s | proposal: 'aes_ccm' 230s | token: '' '' "aes_ccm" '' 230s | token: '' "aes_ccm" '' '' 230s | alg_byname_ok() failed: IKE encryption algorithm 'aes_ccm' is not supported 230s | parsing 'aes-sha1-sha2-ecp_521' for IKE 230s | proposal: 'aes-sha1-sha2-ecp_521' 230s | token: '' '' "aes" '-' 230s | token: '' "aes" '-' "sha1" '-' 230s | token: '-' "sha1" '-' "sha2" '-' 230s | appending IKE encryption algorithm AES_CBC[_0] 230s | parsing prf: 230s | appending IKE PRF algorithm HMAC_SHA1[_0] 230s | token: '-' "sha2" '-' "ecp_521" '' 230s | - succeeded, advancing tokens 230s | parsing dh: 230s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 230s | lookup for DH algorithm 'sha2' failed 230s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 230s | parsing 'aes-sha2-sha2;ecp_521' for IKE 230s | proposal: 'aes-sha2-sha2;ecp_521' 230s | token: '' '' "aes" '-' 230s | token: '' "aes" '-' "sha2" '-' 230s | token: '-' "sha2" '-' "sha2" ';' 230s | appending IKE encryption algorithm AES_CBC[_0] 230s | parsing prf: 230s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 230s | token: '-' "sha2" ';' "ecp_521" '' 230s | - succeeded, advancing tokens 230s | parsing dh: 230s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 230s | lookup for DH algorithm 'sha2' failed 230s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 230s | parsing 'aes-sha1_96-sha2-ecp_521' for IKE 230s | proposal: 'aes-sha1_96-sha2-ecp_521' 230s | token: '' '' "aes" '-' 230s | token: '' "aes" '-' "sha1_96" '-' 230s | token: '-' "sha1_96" '-' "sha2" '-' 230s | appending IKE encryption algorithm AES_CBC[_0] 230s | parsing prf: 230s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 230s | lookup for PRF algorithm 'sha1_96' failed 230s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 230s | parsing integ: 230s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 230s | token: '-' "sha2" '-' "ecp_521" '' 230s | parsing prf: 230s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 230s | token: '-' "ecp_521" '' '' 230s | parsing dh: 230s | appending IKE DH algorithm DH21[_0] 230s | token: '' '' '' 230s | parsing 'aes-sha1_96-sha2;ecp_521' for IKE 230s | proposal: 'aes-sha1_96-sha2;ecp_521' 230s | token: '' '' "aes" '-' 230s | token: '' "aes" '-' "sha1_96" '-' 230s | token: '-' "sha1_96" '-' "sha2" ';' 230s | appending IKE encryption algorithm AES_CBC[_0] 230s | parsing prf: 230s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 230s | lookup for PRF algorithm 'sha1_96' failed 230s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 230s | parsing integ: 230s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 230s | token: '-' "sha2" ';' "ecp_521" '' 230s | parsing prf: 230s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 230s | token: ';' "ecp_521" '' '' 230s | parsing dh: 230s | appending IKE DH algorithm DH21[_0] 230s | token: '' '' '' 230s | parsing 'aes+aes-sha1+sha1-modp8192+modp8192' for IKE 230s | proposal: 'aes+aes-sha1+sha1-modp8192+modp8192' 230s | token: '' '' "aes" '+' 230s | token: '' "aes" '+' "aes" '-' 230s | token: '+' "aes" '-' "sha1" '+' 230s | appending IKE encryption algorithm AES_CBC[_0] 230s | token: '-' "sha1" '+' "sha1" '-' 230s | appending IKE encryption algorithm AES_CBC[_0] 230s algparse: discarding duplicate IKE encryption algorithm AES_CBC 230s | parsing prf: 230s | appending IKE PRF algorithm HMAC_SHA1[_0] 230s | token: '+' "sha1" '-' "modp8192" '+' 230s | appending IKE PRF algorithm HMAC_SHA1[_0] 230s | token: '-' "modp8192" '+' "modp8192" '' 230s algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 230s | - succeeded, advancing tokens 230s | parsing dh: 230s | appending IKE DH algorithm MODP8192[_0] 230s | token: '+' "modp8192" '' '' 230s | appending IKE DH algorithm MODP8192[_0] 230s | token: '' '' '' 230s algparse: discarding duplicate IKE DH algorithm MODP8192 230s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 230s | parsing '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' for IKE 230s | proposal: '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' 230s | token: '' '' "3des" '+' 230s | token: '' "3des" '+' "aes" '+' 230s | token: '+' "aes" '+' "aes" '-' 230s | appending IKE encryption algorithm 3DES_CBC[_0] 230s | token: '+' "aes" '-' "sha2" '+' 230s | appending IKE encryption algorithm AES_CBC[_0] 230s | token: '-' "sha2" '+' "sha1" '+' 230s | appending IKE encryption algorithm AES_CBC[_0] 230s algparse: discarding duplicate IKE encryption algorithm AES_CBC 230s | parsing prf: 230s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 230s | token: '+' "sha1" '+' "sha1" '-' 230s | appending IKE PRF algorithm HMAC_SHA1[_0] 230s | token: '+' "sha1" '-' "modp4096" '+' 230s | appending IKE PRF algorithm HMAC_SHA1[_0] 230s | token: '-' "modp4096" '+' "modp8192" '+' 230s algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 230s | - succeeded, advancing tokens 230s | parsing dh: 230s | appending IKE DH algorithm MODP4096[_0] 230s | token: '+' "modp8192" '+' "modp8192" '' 230s | appending IKE DH algorithm MODP8192[_0] 230s | token: '+' "modp8192" '' '' 230s | appending IKE DH algorithm MODP8192[_0] 230s | token: '' '' '' 230s algparse: discarding duplicate IKE DH algorithm MODP8192 230s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 230s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 230s | parsing 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' for IKE 230s | proposal: 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' 230s | token: '' '' "aes" '+' 230s | token: '' "aes" '+' "3des" '+' 230s | token: '+' "3des" '+' "aes" '-' 230s | appending IKE encryption algorithm AES_CBC[_0] 230s | token: '+' "aes" '-' "sha1" '+' 230s | appending IKE encryption algorithm 3DES_CBC[_0] 230s | token: '-' "sha1" '+' "sha2" '+' 230s | appending IKE encryption algorithm AES_CBC[_0] 230s algparse: discarding duplicate IKE encryption algorithm AES_CBC 230s | parsing prf: 230s | appending IKE PRF algorithm HMAC_SHA1[_0] 230s | token: '+' "sha2" '+' "sha1" '-' 230s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 230s | token: '+' "sha1" '-' "modp8192" '+' 230s | appending IKE PRF algorithm HMAC_SHA1[_0] 230s | token: '-' "modp8192" '+' "modp4096" '+' 230s algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 230s | - succeeded, advancing tokens 230s | parsing dh: 230s | appending IKE DH algorithm MODP8192[_0] 230s | token: '+' "modp4096" '+' "modp8192" '' 230s | appending IKE DH algorithm MODP4096[_0] 230s | token: '+' "modp8192" '' '' 230s | appending IKE DH algorithm MODP8192[_0] 230s | token: '' '' '' 230s algparse: discarding duplicate IKE DH algorithm MODP8192 230s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 230s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 230s | parsing 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' for IKE 230s | proposal: 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' 230s | token: '' '' "aes" '+' 230s | token: '' "aes" '+' "aes" '+' 230s | token: '+' "aes" '+' "3des" '-' 230s | appending IKE encryption algorithm AES_CBC[_0] 230s | token: '+' "3des" '-' "sha1" '+' 230s | appending IKE encryption algorithm AES_CBC[_0] 230s | token: '-' "sha1" '+' "sha1" '+' 230s | appending IKE encryption algorithm 3DES_CBC[_0] 230s algparse: discarding duplicate IKE encryption algorithm AES_CBC 230s | parsing prf: 230s | appending IKE PRF algorithm HMAC_SHA1[_0] 230s | token: '+' "sha1" '+' "sha2" '-' 230s | appending IKE PRF algorithm HMAC_SHA1[_0] 230s | token: '+' "sha2" '-' "modp8192" '+' 230s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 230s | token: '-' "modp8192" '+' "modp8192" '+' 230s algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 230s | - succeeded, advancing tokens 230s | parsing dh: 230s | appending IKE DH algorithm MODP8192[_0] 230s | token: '+' "modp8192" '+' "modp4096" '' 230s | appending IKE DH algorithm MODP8192[_0] 230s | token: '+' "modp4096" '' '' 230s | appending IKE DH algorithm MODP4096[_0] 230s | token: '' '' '' 230s algparse: discarding duplicate IKE DH algorithm MODP8192 230s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 230s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 230s | parsing 'aes+aes128+aes256' for IKE 230s | proposal: 'aes+aes128+aes256' 230s | token: '' '' "aes" '+' 230s | token: '' "aes" '+' "aes128" '+' 230s | token: '+' "aes128" '+' "aes256" '' 230s | appending IKE encryption algorithm AES_CBC[_0] 230s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 230s | token: '+' "aes256" '' '' 230s | appending IKE encryption algorithm AES_CBC[_128] 230s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 230s | token: '' '' '' 230s | appending IKE encryption algorithm AES_CBC[_256] 230s algparse: discarding duplicate IKE encryption algorithm AES_CBC_128 230s algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 230s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 230s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 230s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 230s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 230s | appending IKE DH algorithm MODP2048[_0] 230s | appending IKE DH algorithm MODP3072[_0] 230s | appending IKE DH algorithm MODP4096[_0] 230s | appending IKE DH algorithm MODP8192[_0] 230s | appending IKE DH algorithm DH19[_0] 230s | appending IKE DH algorithm DH20[_0] 230s | appending IKE DH algorithm DH21[_0] 230s | appending IKE DH algorithm DH31[_0] 230s | parsing 'aes128+aes+aes256' for IKE 230s | proposal: 'aes128+aes+aes256' 230s | token: '' '' "aes128" '+' 230s | token: '' "aes128" '+' "aes" '+' 230s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 230s | token: '+' "aes" '+' "aes256" '' 230s | appending IKE encryption algorithm AES_CBC[_128] 230s | token: '+' "aes256" '' '' 230s | appending IKE encryption algorithm AES_CBC[_0] 230s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 230s | token: '' '' '' 230s | appending IKE encryption algorithm AES_CBC[_256] 230s algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 230s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 230s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 230s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 230s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 230s | appending IKE DH algorithm MODP2048[_0] 230s | appending IKE DH algorithm MODP3072[_0] 230s | appending IKE DH algorithm MODP4096[_0] 230s | appending IKE DH algorithm MODP8192[_0] 230s | appending IKE DH algorithm DH19[_0] 230s | appending IKE DH algorithm DH20[_0] 230s | appending IKE DH algorithm DH21[_0] 230s | appending IKE DH algorithm DH31[_0] 230s AES_CBC-HMAC_SHA1-MODP8192 230s AES_CBC-HMAC_SHA2_256-MODP8192 230s algparse -v2 'ike=aes_gcm' 230s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 230s algparse -v2 'ike=aes_gcm-sha2' 230s AES_GCM_16-HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 230s algparse -v2 'ike=aes_gcm-sha2-modp2048' 230s AES_GCM_16-HMAC_SHA2_256-MODP2048 230s algparse -v2 'ike=aes_gcm-sha2;modp2048' 230s | parsing 'aes128+aes256+aes' for IKE 230s | proposal: 'aes128+aes256+aes' 230s | token: '' '' "aes128" '+' 230s | token: '' "aes128" '+' "aes256" '+' 230s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 230s | token: '+' "aes256" '+' "aes" '' 230s | appending IKE encryption algorithm AES_CBC[_128] 230s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 230s | token: '+' "aes" '' '' 230s | appending IKE encryption algorithm AES_CBC[_256] 230s | token: '' '' '' 230s | appending IKE encryption algorithm AES_CBC[_0] 230s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 230s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 230s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 230s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 230s | appending IKE DH algorithm MODP2048[_0] 230s | appending IKE DH algorithm MODP3072[_0] 230s | appending IKE DH algorithm MODP4096[_0] 230s | appending IKE DH algorithm MODP8192[_0] 230s | appending IKE DH algorithm DH19[_0] 230s | appending IKE DH algorithm DH20[_0] 230s | appending IKE DH algorithm DH21[_0] 230s | appending IKE DH algorithm DH31[_0] 230s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for IKE 230s | proposal: 'aes-sha1-modp8192' 230s | token: '' '' "aes" '-' 230s | token: '' "aes" '-' "sha1" '-' 230s | token: '-' "sha1" '-' "modp8192" '' 230s | appending IKE encryption algorithm AES_CBC[_0] 230s | parsing prf: 230s | appending IKE PRF algorithm HMAC_SHA1[_0] 230s | token: '-' "modp8192" '' '' 230s | - succeeded, advancing tokens 230s | parsing dh: 230s | appending IKE DH algorithm MODP8192[_0] 230s | token: '' '' '' 230s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 230s | proposal: 'aes-sha1-modp8192' 230s | token: '' '' "aes" '-' 230s | token: '' "aes" '-' "sha1" '-' 230s | token: '-' "sha1" '-' "modp8192" '' 230s | appending IKE encryption algorithm AES_CBC[_0] 230s | parsing prf: 230s | appending IKE PRF algorithm HMAC_SHA1[_0] 230s | token: '-' "modp8192" '' '' 230s | - succeeded, advancing tokens 230s | parsing dh: 230s | appending IKE DH algorithm MODP8192[_0] 230s | token: '' '' '' 230s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 230s | proposal: 'aes-sha1-modp8192' 230s | token: '' '' "aes" '-' 230s | token: '' "aes" '-' "sha1" '-' 230s | token: '-' "sha1" '-' "modp8192" '' 230s | appending IKE encryption algorithm AES_CBC[_0] 230s | parsing prf: 230s | appending IKE PRF algorithm HMAC_SHA1[_0] 230s | token: '-' "modp8192" '' '' 230s | - succeeded, advancing tokens 230s | parsing dh: 230s | appending IKE DH algorithm MODP8192[_0] 230s | token: '' '' '' 230s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 230s | parsing 'aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' for IKE 230s | proposal: 'aes-sha1-modp8192' 230s | token: '' '' "aes" '-' 230s | token: '' "aes" '-' "sha1" '-' 230s | token: '-' "sha1" '-' "modp8192" '' 230s | appending IKE encryption algorithm AES_CBC[_0] 230s | parsing prf: 230s | appending IKE PRF algorithm HMAC_SHA1[_0] 230s | token: '-' "modp8192" '' '' 230s | - succeeded, advancing tokens 230s | parsing dh: 230s | appending IKE DH algorithm MODP8192[_0] 230s | token: '' '' '' 230s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 230s | proposal: 'aes-sha2-modp8192' 230s | token: '' '' "aes" '-' 230s | token: '' "aes" '-' "sha2" '-' 230s | token: '-' "sha2" '-' "modp8192" '' 230s | appending IKE encryption algorithm AES_CBC[_0] 230s | parsing prf: 230s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 230s | token: '-' "modp8192" '' '' 230s | - succeeded, advancing tokens 230s | parsing dh: 230s | appending IKE DH algorithm MODP8192[_0] 230s | token: '' '' '' 230s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 230s | proposal: 'aes-sha1-modp8192' 230s | token: '' '' "aes" '-' 230s | token: '' "aes" '-' "sha1" '-' 230s | token: '-' "sha1" '-' "modp8192" '' 230s | appending IKE encryption algorithm AES_CBC[_0] 230s | parsing prf: 230s | appending IKE PRF algorithm HMAC_SHA1[_0] 230s | token: '-' "modp8192" '' '' 230s | - succeeded, advancing tokens 230s | parsing dh: 230s | appending IKE DH algorithm MODP8192[_0] 230s | token: '' '' '' 230s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 230s | parsing 'aes_gcm' for IKE 230s | proposal: 'aes_gcm' 230s | token: '' '' "aes_gcm" '' 230s | token: '' "aes_gcm" '' '' 230s | token: '' '' '' 230s | appending IKE encryption algorithm AES_GCM_16[_0] 230s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 230s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 230s | appending IKE integrity algorithm NONE[_0] 230s | appending IKE DH algorithm MODP2048[_0] 230s | appending IKE DH algorithm MODP3072[_0] 230s | appending IKE DH algorithm MODP4096[_0] 230s | appending IKE DH algorithm MODP8192[_0] 230s | appending IKE DH algorithm DH19[_0] 230s | appending IKE DH algorithm DH20[_0] 230s | appending IKE DH algorithm DH21[_0] 230s | appending IKE DH algorithm DH31[_0] 230s | parsing 'aes_gcm-sha2' for IKE 230s | proposal: 'aes_gcm-sha2' 230s | token: '' '' "aes_gcm" '-' 230s | token: '' "aes_gcm" '-' "sha2" '' 230s | token: '-' "sha2" '' '' 230s | appending IKE encryption algorithm AES_GCM_16[_0] 230s | parsing prf: 230s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 230s | token: '' '' '' 230s | - succeeded, advancing tokens 230s | appending IKE integrity algorithm NONE[_0] 230s | appending IKE DH algorithm MODP2048[_0] 230s | appending IKE DH algorithm MODP3072[_0] 230s | appending IKE DH algorithm MODP4096[_0] 230s | appending IKE DH algorithm MODP8192[_0] 230s | appending IKE DH algorithm DH19[_0] 230s | appending IKE DH algorithm DH20[_0] 230s | appending IKE DH algorithm DH21[_0] 230s | appending IKE DH algorithm DH31[_0] 230s | parsing 'aes_gcm-sha2-modp2048' for IKE 230s | proposal: 'aes_gcm-sha2-modp2048' 230s | token: '' '' "aes_gcm" '-' 230s | token: '' "aes_gcm" '-' "sha2" '-' 230s | token: '-' "sha2" '-' "modp2048" '' 230s | appending IKE encryption algorithm AES_GCM_16[_0] 230s | parsing prf: 230s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 230s | token: '-' "modp2048" '' '' 230s | - succeeded, advancing tokens 230s | parsing dh: 230s | appending IKE DH algorithm MODP2048[_0] 230s | token: '' '' '' 230s | appending IKE integrity algorithm NONE[_0] 230s | parsing 'aes_gcm-sha2;modp2048' for IKE 230s | proposal: 'aes_gcm-sha2;modp2048' 230s | token: '' '' "aes_gcm" '-' 230s | token: '' "aes_gcm" '-' "sha2" ';' 230s | token: '-' "sha2" ';' "modp2048" '' 230s | appending IKE encryption algorithm AES_GCM_16[_0] 230s | parsing prf: 230s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 230s | token: ';' "modp2048" '' '' 230s | - succeeded, advancing tokens 230s | parsing dh: 230s | appending IKE DH algorithm MODP2048[_0] 230s | token: '' '' '' 230s | appending IKE integrity algorithm NONE[_0] 230s AES_GCM_16-HMAC_SHA2_256-MODP2048 230s algparse -v2 'ike=aes_gcm-modp2048' 230s ERROR: IKE PRF algorithm 'modp2048' is not recognized 230s algparse -v2 'ike=aes_gcm;modp2048' 230s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 230s algparse -v2 'ike=aes_gcm-none' 230s | parsing 'aes_gcm-modp2048' for IKE 230s | proposal: 'aes_gcm-modp2048' 230s | token: '' '' "aes_gcm" '-' 230s | token: '' "aes_gcm" '-' "modp2048" '' 230s | token: '-' "modp2048" '' '' 230s | appending IKE encryption algorithm AES_GCM_16[_0] 230s | parsing prf: 230s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 230s | lookup for PRF algorithm 'modp2048' failed 230s | - failed, saving error 'IKE PRF algorithm 'modp2048' is not recognized' and tossing result 230s | parsing integ: 230s | ike_alg_byname() failed: IKE integrity algorithm 'modp2048' is not recognized 230s | lookup for integrity algorithm 'modp2048' failed 230s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'modp2048' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'modp2048' is not recognized') 230s | parsing 'aes_gcm;modp2048' for IKE 230s | proposal: 'aes_gcm;modp2048' 230s | token: '' '' "aes_gcm" ';' 230s | token: '' "aes_gcm" ';' "modp2048" '' 230s | token: ';' "modp2048" '' '' 230s | appending IKE encryption algorithm AES_GCM_16[_0] 230s | parsing dh: 230s | appending IKE DH algorithm MODP2048[_0] 230s | token: '' '' '' 230s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 230s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 230s | appending IKE integrity algorithm NONE[_0] 230s | parsing 'aes_gcm-none' for IKE 230s | proposal: 'aes_gcm-none' 230s | token: '' '' "aes_gcm" '-' 230s | token: '' "aes_gcm" '-' "none" '' 230s | token: '-' "none" '' '' 230s | appending IKE encryption algorithm AES_GCM_16[_0] 230s | parsing prf: 230s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 230s | lookup for PRF algorithm 'none' failed 230s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 230s | parsing integ: 230s | appending IKE integrity algorithm NONE[_0] 230s | token: '' '' '' 230s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 230s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 230s | appending IKE DH algorithm MODP2048[_0] 230s | appending IKE DH algorithm MODP3072[_0] 230s | appending IKE DH algorithm MODP4096[_0] 230s | appending IKE DH algorithm MODP8192[_0] 230s | appending IKE DH algorithm DH19[_0] 230s | appending IKE DH algorithm DH20[_0] 230s | appending IKE DH algorithm DH21[_0] 230s | appending IKE DH algorithm DH31[_0] 230s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 230s algparse -v2 'ike=aes_gcm-none-sha2' 230s AES_GCM_16-HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 230s algparse -v2 'ike=aes_gcm-none-sha2-modp2048' 230s AES_GCM_16-HMAC_SHA2_256-MODP2048 230s algparse -v2 'ike=aes_gcm-none-sha2;modp2048' 230s | parsing 'aes_gcm-none-sha2' for IKE 230s | proposal: 'aes_gcm-none-sha2' 230s | token: '' '' "aes_gcm" '-' 230s | token: '' "aes_gcm" '-' "none" '-' 230s | token: '-' "none" '-' "sha2" '' 230s | appending IKE encryption algorithm AES_GCM_16[_0] 230s | parsing prf: 230s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 230s | lookup for PRF algorithm 'none' failed 230s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 230s | parsing integ: 230s | appending IKE integrity algorithm NONE[_0] 230s | token: '-' "sha2" '' '' 230s | parsing prf: 230s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 230s | token: '' '' '' 230s | appending IKE DH algorithm MODP2048[_0] 230s | appending IKE DH algorithm MODP3072[_0] 230s | appending IKE DH algorithm MODP4096[_0] 230s | appending IKE DH algorithm MODP8192[_0] 230s | appending IKE DH algorithm DH19[_0] 230s | appending IKE DH algorithm DH20[_0] 230s | appending IKE DH algorithm DH21[_0] 230s | appending IKE DH algorithm DH31[_0] 230s | parsing 'aes_gcm-none-sha2-modp2048' for IKE 230s | proposal: 'aes_gcm-none-sha2-modp2048' 230s | token: '' '' "aes_gcm" '-' 230s | token: '' "aes_gcm" '-' "none" '-' 230s | token: '-' "none" '-' "sha2" '-' 230s | appending IKE encryption algorithm AES_GCM_16[_0] 230s | parsing prf: 230s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 230s | lookup for PRF algorithm 'none' failed 230s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 230s | parsing integ: 230s | appending IKE integrity algorithm NONE[_0] 230s | token: '-' "sha2" '-' "modp2048" '' 230s | parsing prf: 230s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 230s | token: '-' "modp2048" '' '' 230s | parsing dh: 230s | appending IKE DH algorithm MODP2048[_0] 230s | token: '' '' '' 230s | parsing 'aes_gcm-none-sha2;modp2048' for IKE 230s | proposal: 'aes_gcm-none-sha2;modp2048' 230s | token: '' '' "aes_gcm" '-' 230s | token: '' "aes_gcm" '-' "none" '-' 230s | token: '-' "none" '-' "sha2" ';' 230s | appending IKE encryption algorithm AES_GCM_16[_0] 230s | parsing prf: 230s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 230s | lookup for PRF algorithm 'none' failed 230s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 230s | parsing integ: 230s | appending IKE integrity algorithm NONE[_0] 230s | token: '-' "sha2" ';' "modp2048" '' 230s | parsing prf: 230s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 230s | token: ';' "modp2048" '' '' 230s | parsing dh: 230s | appending IKE DH algorithm MODP2048[_0] 230s | token: '' '' '' 230s | parsing 'aes_gcm-none-modp2048' for IKE 230s | proposal: 'aes_gcm-none-modp2048' 230s | token: '' '' "aes_gcm" '-' 230s | token: '' "aes_gcm" '-' "none" '-' 230s | token: '-' "none" '-' "modp2048" '' 230s | appending IKE encryption algorithm AES_GCM_16[_0] 230s | parsing prf: 230s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 230s | lookup for PRF algorithm 'none' failed 230s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 230s | parsing integ: 230s | appending IKE integrity algorithm NONE[_0] 230s | token: '-' "modp2048" '' '' 230s | parsing prf: 230s AES_GCM_16-HMAC_SHA2_256-MODP2048 230s algparse -v2 'ike=aes_gcm-none-modp2048' 230s ERROR: IKE PRF algorithm 'modp2048' is not recognized 230s algparse -v2 'ike=aes_gcm-none;modp2048' 230s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 230s algparse -v2 'ike=aes_gcm-sha1-none-modp2048' 230s ERROR: IKE proposal contains unexpected 'modp2048' 230s algparse -v2 'ike=aes_gcm-sha1-none;modp2048' 230s ERROR: IKE proposal contains unexpected 'modp2048' 230s algparse -v2 'ike=aes+aes_gcm' 230s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 230s | lookup for PRF algorithm 'modp2048' failed 230s | -- failed 'IKE PRF algorithm 'modp2048' is not recognized' 230s | parsing 'aes_gcm-none;modp2048' for IKE 230s | proposal: 'aes_gcm-none;modp2048' 230s | token: '' '' "aes_gcm" '-' 230s | token: '' "aes_gcm" '-' "none" ';' 230s | token: '-' "none" ';' "modp2048" '' 230s | appending IKE encryption algorithm AES_GCM_16[_0] 230s | parsing prf: 230s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 230s | lookup for PRF algorithm 'none' failed 230s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 230s | parsing integ: 230s | appending IKE integrity algorithm NONE[_0] 230s | token: ';' "modp2048" '' '' 230s | parsing dh: 230s | appending IKE DH algorithm MODP2048[_0] 230s | token: '' '' '' 230s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 230s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 230s | parsing 'aes_gcm-sha1-none-modp2048' for IKE 230s | proposal: 'aes_gcm-sha1-none-modp2048' 230s | token: '' '' "aes_gcm" '-' 230s | token: '' "aes_gcm" '-' "sha1" '-' 230s | token: '-' "sha1" '-' "none" '-' 230s | appending IKE encryption algorithm AES_GCM_16[_0] 230s | parsing prf: 230s | appending IKE PRF algorithm HMAC_SHA1[_0] 230s | token: '-' "none" '-' "modp2048" '' 230s | - succeeded, advancing tokens 230s | parsing dh: 230s | appending IKE DH algorithm NONE[_0] 230s | token: '-' "modp2048" '' '' 230s | parsing 'aes_gcm-sha1-none;modp2048' for IKE 230s | proposal: 'aes_gcm-sha1-none;modp2048' 230s | token: '' '' "aes_gcm" '-' 230s | token: '' "aes_gcm" '-' "sha1" '-' 230s | token: '-' "sha1" '-' "none" ';' 230s | appending IKE encryption algorithm AES_GCM_16[_0] 230s | parsing prf: 230s | appending IKE PRF algorithm HMAC_SHA1[_0] 230s | token: '-' "none" ';' "modp2048" '' 230s | - succeeded, advancing tokens 230s | parsing dh: 230s | appending IKE DH algorithm NONE[_0] 230s | token: ';' "modp2048" '' '' 230s | parsing 'aes+aes_gcm' for IKE 230s | proposal: 'aes+aes_gcm' 230s | token: '' '' "aes" '+' 230s | token: '' "aes" '+' "aes_gcm" '' 230s | token: '+' "aes_gcm" '' '' 230s | appending IKE encryption algorithm AES_CBC[_0] 230s | token: '' '' '' 230s | appending IKE encryption algorithm AES_GCM_16[_0] 230s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 230s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 230s | appending IKE DH algorithm MODP2048[_0] 230s | appending IKE DH algorithm MODP3072[_0] 230s | appending IKE DH algorithm MODP4096[_0] 230s | appending IKE DH algorithm MODP8192[_0] 230s | appending IKE DH algorithm DH19[_0] 230s | appending IKE DH algorithm DH20[_0] 230s | appending IKE DH algorithm DH21[_0] 230s | appending IKE DH algorithm DH31[_0] 230s | parsing ',' for IKE 230s | proposal: '' 230s | token: '' '' "" '' 230s | token: '' "" '' '' 230s | parsing 'aes,' for IKE 230s | proposal: 'aes' 230s | token: '' '' "aes" '' 230s | token: '' "aes" '' '' 230s | token: '' '' '' 230s | appending IKE encryption algorithm AES_CBC[_0] 230s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 230s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 230s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 230s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 230s | appending IKE DH algorithm MODP2048[_0] 230s | appending IKE DH algorithm MODP3072[_0] 230s | appending IKE DH algorithm MODP4096[_0] 230s | appending IKE DH algorithm MODP8192[_0] 230s | appending IKE DH algorithm DH19[_0] 230s | appending IKE DH algorithm DH20[_0] 230s | appending IKE DH algorithm DH21[_0] 230s | appending IKE DH algorithm DH31[_0] 230s | proposal: '' 230s | token: '' '' "" '' 230s | token: '' "" '' '' 230s | parsing 'aes,,aes' for IKE 230s | proposal: 'aes' 230s | token: '' '' "aes" '' 230s | token: '' "aes" '' '' 230s | token: '' '' '' 230s | appending IKE encryption algorithm AES_CBC[_0] 230s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 230s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 230s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 230s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 230s | appending IKE DH algorithm MODP2048[_0] 230s | appending IKE DH algorithm MODP3072[_0] 230s | appending IKE DH algorithm MODP4096[_0] 230s | appending IKE DH algorithm MODP8192[_0] 230s | appending IKE DH algorithm DH19[_0] 230s | appending IKE DH algorithm DH20[_0] 230s | appending IKE DH algorithm DH21[_0] 230s | appending IKE DH algorithm DH31[_0] 230s | proposal: '' 230s | token: '' '' "" '' 230s | token: '' "" '' '' 230s ERROR: AEAD and non-AEAD IKE encryption algorithm cannot be combined 230s algparse -v2 'ike=,' 230s ERROR: IKE encryption algorithm is empty 230s algparse -v2 'ike=aes,' 230s | parsing ',aes' for IKE 230s | proposal: '' 230s | token: '' '' "" '' 230s | token: '' "" '' '' 230s | parsing '-' for IKE 230s | proposal: '-' 230s | token: '' '' "" '-' 230s | token: '' "" '-' "" '' 230s | parsing '+' for IKE 230s | proposal: '+' 230s | token: '' '' "" '+' 230s | token: '' "" '+' "" '' 230s | parsing ';' for IKE 230s | proposal: ';' 230s | token: '' '' "" ';' 230s | token: '' "" ';' "" '' 230s | parsing 'aes-' for IKE 230s | proposal: 'aes-' 230s | token: '' '' "aes" '-' 230s | token: '' "aes" '-' "" '' 230s | token: '-' "" '' '' 230s | appending IKE encryption algorithm AES_CBC[_0] 230s | parsing prf: 230s | - failed, saving error 'IKE PRF algorithm is empty' and tossing result 230s | parsing integ: 230s | - and - failed, returning earlier PRF error 'IKE PRF algorithm is empty' and discarding INTEG error 'IKE integrity algorithm is empty') 230s | parsing 'aes+' for IKE 230s | proposal: 'aes+' 230s | token: '' '' "aes" '+' 230s | token: '' "aes" '+' "" '' 230s | token: '+' "" '' '' 230s | appending IKE encryption algorithm AES_CBC[_0] 230s | parsing 'aes;' for IKE 230s | proposal: 'aes;' 230s | token: '' '' "aes" ';' 230s | token: '' "aes" ';' "" '' 230s | token: ';' "" '' '' 230s | appending IKE encryption algorithm AES_CBC[_0] 230s | parsing dh: 230s | ... failed 'IKE DH algorithm is empty' 230s | parsing '-aes' for IKE 230s | proposal: '-aes' 230s | token: '' '' "" '-' 230s | token: '' "" '-' "aes" '' 230s | parsing '+aes' for IKE 230s | proposal: '+aes' 230s | token: '' '' "" '+' 230s | token: '' "" '+' "aes" '' 230s | parsing ';aes' for IKE 230s | proposal: ';aes' 230s | token: '' '' "" ';' 230s | token: '' "" ';' "aes" '' 230s | parsing 'aes+-' for IKE 230s | proposal: 'aes+-' 230s | token: '' '' "aes" '+' 230s | token: '' "aes" '+' "" '-' 230s | token: '+' "" '-' "" '' 230s | appending IKE encryption algorithm AES_CBC[_0] 230s | parsing 'aes+;' for IKE 230s | proposal: 'aes+;' 230s | token: '' '' "aes" '+' 230s | token: '' "aes" '+' "" ';' 230s | token: '+' "" ';' "" '' 230s | appending IKE encryption algorithm AES_CBC[_0] 230s | parsing 'aes++' for IKE 230s | proposal: 'aes++' 230s | token: '' '' "aes" '+' 230s | token: '' "aes" '+' "" '+' 230s | token: '+' "" '+' "" '' 230s | appending IKE encryption algorithm AES_CBC[_0] 230s algparse: leak detective found no leaks 230s algparse: Encryption algorithms: 230s ERROR: IKE encryption algorithm is empty 230s algparse -v2 'ike=aes,,aes' 230s ERROR: IKE encryption algorithm is empty 230s algparse -v2 'ike=,aes' 230s ERROR: IKE encryption algorithm is empty 230s algparse -v2 'ike=-' 230s ERROR: IKE encryption algorithm is empty 230s algparse -v2 'ike=+' 230s ERROR: IKE encryption algorithm is empty 230s algparse -v2 'ike=;' 230s ERROR: IKE encryption algorithm is empty 230s algparse -v2 'ike=aes-' 230s ERROR: IKE PRF algorithm is empty 230s algparse -v2 'ike=aes+' 230s ERROR: IKE encryption algorithm is empty 230s algparse -v2 'ike=aes;' 230s ERROR: IKE DH algorithm is empty 230s algparse -v2 'ike=-aes' 230s ERROR: IKE encryption algorithm is empty 230s algparse -v2 'ike=+aes' 230s ERROR: IKE encryption algorithm is empty 230s algparse -v2 'ike=;aes' 230s ERROR: IKE encryption algorithm is empty 230s algparse -v2 'ike=aes+-' 230s ERROR: IKE encryption algorithm is empty 230s algparse -v2 'ike=aes+;' 230s ERROR: IKE encryption algorithm is empty 230s algparse -v2 'ike=aes++' 230s ERROR: IKE encryption algorithm is empty 230s testing -ta 230s algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 230s algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 230s algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 230s algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 230s algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 230s algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 230s algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm, aes_gcm_c 230s algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_b 230s algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_a 230s algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 230s algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 230s algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 230s algparse: NULL [] IKEv1: ESP IKEv2: ESP 230s algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 230s algparse: Hash algorithms: 230s algparse: MD5 IKEv1: IKE IKEv2: NSS 230s algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 230s algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 230s algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 230s algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 230s algparse: IDENTITY IKEv1: IKEv2: FIPS 230s algparse: PRF algorithms: 230s algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE native(HMAC) md5 230s algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 230s algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 230s algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 230s algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 230s algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 230s algparse: Integrity algorithms: 230s algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH native(HMAC) md5, hmac_md5 230s algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 230s algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 230s algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 230s algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 230s algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 230s algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 230s algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 230s algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 230s algparse: DH algorithms: 230s algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 230s algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 230s algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 230s algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 230s algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 230s algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 230s algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 230s algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 230s algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 230s algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 230s algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 230s algparse: IPCOMP algorithms: 230s algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 230s algparse: LZS IKEv1: IKEv2: ESP AH FIPS 230s algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 230s algparse: testing CAMELLIA_CBC: 230s algparse: Camellia: 16 bytes with 128-bit key 230s | decode_to_chunk: raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 230s | decode_to_chunk: output: 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2fa0 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: CAMELLIA_CBC 230s | flags: ENCRYPT+DECRYPT 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48adab0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f68 230s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 230s | decode_to_chunk: output: 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | decode_to_chunk: new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 230s | decode_to_chunk: output: 230s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 230s | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 230s | decode_to_chunk: output: 230s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | decode_to_chunk: ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 230s | decode_to_chunk: output: 230s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 230s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 230s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 230s | verify_chunk_data: encrypt: ok 230s | verify_chunk_data: updated CBC IV: ok 230s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 230s | decode_to_chunk: output: 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | decode_to_chunk: new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 230s | decode_to_chunk: output: 230s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 230s | decode_to_chunk: ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 230s | decode_to_chunk: output: 230s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 230s | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 230s | decode_to_chunk: output: 230s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 230s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 230s | verify_chunk_data: decrypt: ok 230s | verify_chunk_data: updated CBC IV: ok 230s | test_ctr_vector: Camellia: 16 bytes with 128-bit key passed 230s algparse: Camellia: 16 bytes with 128-bit key 230s | decode_to_chunk: raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF" 230s | decode_to_chunk: output: 230s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2fa0 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: CAMELLIA_CBC 230s | flags: ENCRYPT+DECRYPT 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48adab0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f68 230s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 230s | decode_to_chunk: output: 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | decode_to_chunk: new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 230s | decode_to_chunk: output: 230s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 230s | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 230s | decode_to_chunk: output: 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 230s | decode_to_chunk: ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 230s | decode_to_chunk: output: 230s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 230s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 230s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 230s | verify_chunk_data: encrypt: ok 230s | verify_chunk_data: updated CBC IV: ok 230s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 230s | decode_to_chunk: output: 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | decode_to_chunk: new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 230s | decode_to_chunk: output: 230s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 230s | decode_to_chunk: ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 230s | decode_to_chunk: output: 230s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 230s | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 230s | decode_to_chunk: output: 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 230s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 230s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 230s | verify_chunk_data: decrypt: ok 230s | verify_chunk_data: updated CBC IV: ok 230s | test_ctr_vector: Camellia: 16 bytes with 128-bit key passed 230s algparse: Camellia: 16 bytes with 256-bit key 230s | decode_to_chunk: raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 230s | decode_to_chunk: output: 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2fa0 230s | key-offset: 0, key-size: 32 230s | EXTRACT_KEY_FROM_KEY: 230s | target: CAMELLIA_CBC 230s | flags: ENCRYPT+DECRYPT 230s | key_size: 32-bytes 230s | base: base-key@0xae2ce48adab0 (48-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f68 230s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 230s | decode_to_chunk: output: 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | decode_to_chunk: new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 230s | decode_to_chunk: output: 230s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 230s | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 230s | decode_to_chunk: output: 230s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | decode_to_chunk: ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 230s | decode_to_chunk: output: 230s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 230s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 230s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 230s | verify_chunk_data: encrypt: ok 230s | verify_chunk_data: updated CBC IV: ok 230s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 230s | decode_to_chunk: output: 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | decode_to_chunk: new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 230s | decode_to_chunk: output: 230s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 230s | decode_to_chunk: ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 230s | decode_to_chunk: output: 230s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 230s | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 230s | decode_to_chunk: output: 230s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 230s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 230s | verify_chunk_data: decrypt: ok 230s | verify_chunk_data: updated CBC IV: ok 230s | test_ctr_vector: Camellia: 16 bytes with 256-bit key passed 230s algparse: Camellia: 16 bytes with 256-bit key 230s | decode_to_chunk: raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF FF EE DD CC BB AA 99 88 77 66 55 44 33 22 11 00" 230s | decode_to_chunk: output: 230s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 230s | ff ee dd cc bb aa 99 88 77 66 55 44 33 22 11 00 ........wfUD3".. 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2fa0 230s | key-offset: 0, key-size: 32 230s | EXTRACT_KEY_FROM_KEY: 230s | target: CAMELLIA_CBC 230s | flags: ENCRYPT+DECRYPT 230s | key_size: 32-bytes 230s | base: base-key@0xae2ce48adab0 (48-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f68 230s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 230s | decode_to_chunk: output: 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | decode_to_chunk: new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 230s | decode_to_chunk: output: 230s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 230s | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 230s | decode_to_chunk: output: 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 230s | decode_to_chunk: ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 230s | decode_to_chunk: output: 230s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 230s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 230s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 230s | verify_chunk_data: encrypt: ok 230s | verify_chunk_data: updated CBC IV: ok 230s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 230s | decode_to_chunk: output: 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | decode_to_chunk: new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 230s | decode_to_chunk: output: 230s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 230s | decode_to_chunk: ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 230s | decode_to_chunk: output: 230s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 230s | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 230s | decode_to_chunk: output: 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 230s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 230s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 230s | verify_chunk_data: decrypt: ok 230s | verify_chunk_data: updated CBC IV: ok 230s | test_ctr_vector: Camellia: 16 bytes with 256-bit key passed 230s algparse: testing AES_GCM_16: 230s algparse: empty string 230s | decode_to_chunk: raw_key: input "0xcf063a34d4a9a76c2c86787d3f96db71" 230s | decode_to_chunk: output: 230s | cf 06 3a 34 d4 a9 a7 6c 2c 86 78 7d 3f 96 db 71 ..:4...l,.x}?..q 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2f30 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_GCM 230s | flags: ENCRYPT+DECRYPT 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48adab0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2ef8 230s | decode_to_chunk: salted IV: input "0x113b9785971864c83b01c787" 230s | decode_to_chunk: output: 230s | 11 3b 97 85 97 18 64 c8 3b 01 c7 87 .;....d.;... 230s | decode_to_chunk: AAD: input "" 230s | decode_to_chunk: output: 230s | 230s | decode_to_chunk: plaintext: input "" 230s | decode_to_chunk: output: 230s | 230s | decode_to_chunk: ciphertext: input "" 230s | decode_to_chunk: output: 230s | 230s | decode_to_chunk: tag: input "0x72ac8493e3a5228b5d130a69d2510e42" 230s | decode_to_chunk: output: 230s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 230s | test_gcm_vector: decrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 230s | test_gcm_vector: text+tag on call 230s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 230s | verify_chunk_data: output ciphertext: ok 230s | verify_chunk_data: TAG: ok 230s | test_gcm_vector: text+tag on return 230s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 230s | test_gcm_vector: encrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 230s | test_gcm_vector: text+tag on call 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | verify_chunk_data: output ciphertext: ok 230s | verify_chunk_data: TAG: ok 230s | test_gcm_vector: text+tag on return 230s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 230s | test_gcm_vector: passed 230s algparse: one block 230s | decode_to_chunk: raw_key: input "0xe98b72a9881a84ca6b76e0f43e68647a" 230s | decode_to_chunk: output: 230s | e9 8b 72 a9 88 1a 84 ca 6b 76 e0 f4 3e 68 64 7a ..r.....kv..>hdz 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2f30 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_GCM 230s | flags: ENCRYPT+DECRYPT 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48adab0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2ef8 230s | decode_to_chunk: salted IV: input "0x8b23299fde174053f3d652ba" 230s | decode_to_chunk: output: 230s | 8b 23 29 9f de 17 40 53 f3 d6 52 ba .#)...@S..R. 230s | decode_to_chunk: AAD: input "" 230s | decode_to_chunk: output: 230s | 230s | decode_to_chunk: plaintext: input "0x28286a321293253c3e0aa2704a278032" 230s | decode_to_chunk: output: 230s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 230s | decode_to_chunk: ciphertext: input "0x5a3c1cf1985dbb8bed818036fdd5ab42" 230s | decode_to_chunk: output: 230s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 230s | decode_to_chunk: tag: input "0x23c7ab0f952b7091cd324835043b5eb5" 230s | decode_to_chunk: output: 230s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 230s | test_gcm_vector: decrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 230s | test_gcm_vector: text+tag on call 230s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 230s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 230s | verify_chunk_data: output ciphertext: ok 230s | verify_chunk_data: TAG: ok 230s | test_gcm_vector: text+tag on return 230s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 230s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 230s | test_gcm_vector: encrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 230s | test_gcm_vector: text+tag on call 230s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | verify_chunk_data: output ciphertext: ok 230s | verify_chunk_data: TAG: ok 230s | test_gcm_vector: text+tag on return 230s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 230s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 230s | test_gcm_vector: passed 230s algparse: two blocks 230s | decode_to_chunk: raw_key: input "0xbfd414a6212958a607a0f5d3ab48471d" 230s | decode_to_chunk: output: 230s | bf d4 14 a6 21 29 58 a6 07 a0 f5 d3 ab 48 47 1d ....!)X......HG. 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2f30 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_GCM 230s | flags: ENCRYPT+DECRYPT 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48adab0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2ef8 230s | decode_to_chunk: salted IV: input "0x86d8ea0ab8e40dcc481cd0e2" 230s | decode_to_chunk: output: 230s | 86 d8 ea 0a b8 e4 0d cc 48 1c d0 e2 ........H... 230s | decode_to_chunk: AAD: input "" 230s | decode_to_chunk: output: 230s | 230s | decode_to_chunk: plaintext: input "0xa6b76a066e63392c9443e60272ceaeb9d25c991b0f2e55e2804e168c05ea591a" 230s | decode_to_chunk: output: 230s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 230s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 230s | decode_to_chunk: ciphertext: input "0x62171db33193292d930bf6647347652c1ef33316d7feca99d54f1db4fcf513f8" 230s | decode_to_chunk: output: 230s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 230s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 230s | decode_to_chunk: tag: input "0xc28280aa5c6c7a8bd366f28c1cfd1f6e" 230s | decode_to_chunk: output: 230s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 230s | test_gcm_vector: decrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 230s | test_gcm_vector: text+tag on call 230s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 230s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 230s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 230s | verify_chunk_data: output ciphertext: ok 230s | verify_chunk_data: TAG: ok 230s | test_gcm_vector: text+tag on return 230s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 230s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 230s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 230s | test_gcm_vector: encrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 230s | test_gcm_vector: text+tag on call 230s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 230s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | verify_chunk_data: output ciphertext: ok 230s | verify_chunk_data: TAG: ok 230s | test_gcm_vector: text+tag on return 230s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 230s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 230s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 230s | test_gcm_vector: passed 230s algparse: two blocks with associated data 230s | decode_to_chunk: raw_key: input "0x006c458100fc5f4d62949d2c833b82d1" 230s | decode_to_chunk: output: 230s | 00 6c 45 81 00 fc 5f 4d 62 94 9d 2c 83 3b 82 d1 .lE..._Mb..,.;.. 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2f30 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_GCM 230s | flags: ENCRYPT+DECRYPT 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48adab0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2ef8 230s | decode_to_chunk: salted IV: input "0xa4e9c4bc5725a21ff42c82b2" 230s | decode_to_chunk: output: 230s | a4 e9 c4 bc 57 25 a2 1f f4 2c 82 b2 ....W%...,.. 230s | decode_to_chunk: AAD: input "0x2efb14fb3657cdd6b9a8ff1a5f5a39b9" 230s | decode_to_chunk: output: 230s | 2e fb 14 fb 36 57 cd d6 b9 a8 ff 1a 5f 5a 39 b9 ....6W......_Z9. 230s | decode_to_chunk: plaintext: input "0xf381d3bfbee0a879f7a4e17b623278cedd6978053dd313530a18f1a836100950" 230s | decode_to_chunk: output: 230s | f3 81 d3 bf be e0 a8 79 f7 a4 e1 7b 62 32 78 ce .......y...{b2x. 230s | dd 69 78 05 3d d3 13 53 0a 18 f1 a8 36 10 09 50 .ix.=..S....6..P 230s | decode_to_chunk: ciphertext: input "0xf39b4db3542d8542fb73fd2d66be568f26d7f814b3f87d1eceac3dd09a8d697e" 230s | decode_to_chunk: output: 230s | f3 9b 4d b3 54 2d 85 42 fb 73 fd 2d 66 be 56 8f ..M.T-.B.s.-f.V. 230s | 26 d7 f8 14 b3 f8 7d 1e ce ac 3d d0 9a 8d 69 7e &.....}...=...i~ 230s | decode_to_chunk: tag: input "0x39f045cb23b698c925db134d56c5" 230s | decode_to_chunk: output: 230s | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 9.E.#...%..MV. 230s | test_gcm_vector: decrypt: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=14 230s | test_gcm_vector: text+tag on call 230s | f3 9b 4d b3 54 2d 85 42 fb 73 fd 2d 66 be 56 8f ..M.T-.B.s.-f.V. 230s | 26 d7 f8 14 b3 f8 7d 1e ce ac 3d d0 9a 8d 69 7e &.....}...=...i~ 230s | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 9.E.#...%..MV. 230s | verify_chunk_data: output ciphertext: ok 230s | verify_chunk_data: TAG: ok 230s | test_gcm_vector: text+tag on return 230s | f3 81 d3 bf be e0 a8 79 f7 a4 e1 7b 62 32 78 ce .......y...{b2x. 230s | dd 69 78 05 3d d3 13 53 0a 18 f1 a8 36 10 09 50 .ix.=..S....6..P 230s | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 9.E.#...%..MV. 230s | test_gcm_vector: encrypt: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=14 230s | test_gcm_vector: text+tag on call 230s | f3 81 d3 bf be e0 a8 79 f7 a4 e1 7b 62 32 78 ce .......y...{b2x. 230s | dd 69 78 05 3d d3 13 53 0a 18 f1 a8 36 10 09 50 .ix.=..S....6..P 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .............. 230s | verify_chunk_data: output ciphertext: ok 230s | verify_chunk_data: TAG: ok 230s | test_gcm_vector: text+tag on return 230s | f3 9b 4d b3 54 2d 85 42 fb 73 fd 2d 66 be 56 8f ..M.T-.B.s.-f.V. 230s | 26 d7 f8 14 b3 f8 7d 1e ce ac 3d d0 9a 8d 69 7e &.....}...=...i~ 230s | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 9.E.#...%..MV. 230s | test_gcm_vector: passed 230s algparse: testing AES_CTR: 230s algparse: Encrypting 16 octets using AES-CTR with 128-bit key 230s | decode_to_chunk: raw_key: input "0x AE 68 52 F8 12 10 67 CC 4B F7 A5 76 55 77 F3 9E" 230s | decode_to_chunk: output: 230s | ae 68 52 f8 12 10 67 cc 4b f7 a5 76 55 77 f3 9e .hR...g.K..vUw.. 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2f90 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_CTR 230s | flags: ENCRYPT+DECRYPT 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48adab0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f58 230s | decode_to_chunk: input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 230s | decode_to_chunk: output: 230s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 230s | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 230s | decode_to_chunk: output: 230s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 230s | decode_to_chunk: Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 230s | decode_to_chunk: output: 230s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 230s | decode_to_chunk: expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 230s | decode_to_chunk: output: 230s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 230s | do_aes_ctr: enter 230s | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes 230s | do_aes_ctr: exit 230s | verify_chunk_data: encrypt: ok 230s | verify_chunk_data: counter-block: ok 230s | decode_to_chunk: input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 230s | decode_to_chunk: output: 230s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 230s | decode_to_chunk: Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 230s | decode_to_chunk: output: 230s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 230s | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 230s | decode_to_chunk: output: 230s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 230s | decode_to_chunk: expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 230s | decode_to_chunk: output: 230s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 230s | do_aes_ctr: enter 230s | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes 230s | do_aes_ctr: exit 230s | verify_chunk_data: decrypt: ok 230s | verify_chunk_data: counter-block: ok 230s | test_ctr_vector: Encrypting 16 octets using AES-CTR with 128-bit key passed 230s algparse: Encrypting 32 octets using AES-CTR with 128-bit key 230s | decode_to_chunk: raw_key: input "0x 7E 24 06 78 17 FA E0 D7 43 D6 CE 1F 32 53 91 63" 230s | decode_to_chunk: output: 230s | 7e 24 06 78 17 fa e0 d7 43 d6 ce 1f 32 53 91 63 ~$.x....C...2S.c 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2f90 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_CTR 230s | flags: ENCRYPT+DECRYPT 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48adab0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f58 230s | decode_to_chunk: input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 230s | decode_to_chunk: output: 230s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 230s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 230s | decode_to_chunk: output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 230s | decode_to_chunk: Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 230s | decode_to_chunk: output: 230s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 230s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 230s | decode_to_chunk: expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 230s | decode_to_chunk: output: 230s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 .l...T;Y.H...... 230s | do_aes_ctr: enter 230s | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes 230s | do_aes_ctr: exit 230s | verify_chunk_data: encrypt: ok 230s | verify_chunk_data: counter-block: ok 230s | decode_to_chunk: input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 230s | decode_to_chunk: output: 230s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 230s | decode_to_chunk: Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 230s | decode_to_chunk: output: 230s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 230s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 230s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 230s | decode_to_chunk: output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 230s | decode_to_chunk: expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 230s | decode_to_chunk: output: 230s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 .l...T;Y.H...... 230s | do_aes_ctr: enter 230s | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes 230s | do_aes_ctr: exit 230s | verify_chunk_data: decrypt: ok 230s | verify_chunk_data: counter-block: ok 230s | test_ctr_vector: Encrypting 32 octets using AES-CTR with 128-bit key passed 230s algparse: Encrypting 36 octets using AES-CTR with 128-bit key 230s | decode_to_chunk: raw_key: input "0x 76 91 BE 03 5E 50 20 A8 AC 6E 61 85 29 F9 A0 DC" 230s | decode_to_chunk: output: 230s | 76 91 be 03 5e 50 20 a8 ac 6e 61 85 29 f9 a0 dc v...^P ..na.)... 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2f90 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_CTR 230s | flags: ENCRYPT+DECRYPT 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48adab0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f58 230s | decode_to_chunk: input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 230s | decode_to_chunk: output: 230s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 230s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 230s | decode_to_chunk: output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 230s | 20 21 22 23 !"# 230s | decode_to_chunk: Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 230s | decode_to_chunk: output: 230s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 230s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 230s | 25 b2 07 2f %../ 230s | decode_to_chunk: expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 230s | decode_to_chunk: output: 230s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 230s | do_aes_ctr: enter 230s | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes 230s | do_aes_ctr: exit 230s | verify_chunk_data: encrypt: ok 230s | verify_chunk_data: counter-block: ok 230s | decode_to_chunk: input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 230s | decode_to_chunk: output: 230s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 230s | decode_to_chunk: Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 230s | decode_to_chunk: output: 230s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 230s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 230s | 25 b2 07 2f %../ 230s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 230s | decode_to_chunk: output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 230s | 20 21 22 23 !"# 230s | decode_to_chunk: expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 230s | decode_to_chunk: output: 230s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 230s | do_aes_ctr: enter 230s | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes 230s | do_aes_ctr: exit 230s | verify_chunk_data: decrypt: ok 230s | verify_chunk_data: counter-block: ok 230s | test_ctr_vector: Encrypting 36 octets using AES-CTR with 128-bit key passed 230s algparse: Encrypting 16 octets using AES-CTR with 192-bit key 230s | decode_to_chunk: raw_key: input "0x16 AF 5B 14 5F C9 F5 79 C1 75 F9 3E 3B FB 0E ED86 3D 06 CC FD B7 85 15" 230s | decode_to_chunk: output: 230s | 16 af 5b 14 5f c9 f5 79 c1 75 f9 3e 3b fb 0e ed ..[._..y.u.>;... 230s | 86 3d 06 cc fd b7 85 15 .=...... 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2f90 230s | key-offset: 0, key-size: 24 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_CTR 230s | flags: ENCRYPT+DECRYPT 230s | key_size: 24-bytes 230s | base: base-key@0xae2ce48adab0 (40-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f58 230s | decode_to_chunk: input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 230s | decode_to_chunk: output: 230s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 230s | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 230s | decode_to_chunk: output: 230s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 230s | decode_to_chunk: Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 230s | decode_to_chunk: output: 230s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 230s | decode_to_chunk: expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 230s | decode_to_chunk: output: 230s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 230s | do_aes_ctr: enter 230s | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes 230s | do_aes_ctr: exit 230s | verify_chunk_data: encrypt: ok 230s | verify_chunk_data: counter-block: ok 230s | decode_to_chunk: input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 230s | decode_to_chunk: output: 230s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 230s | decode_to_chunk: Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 230s | decode_to_chunk: output: 230s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 230s | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 230s | decode_to_chunk: output: 230s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 230s | decode_to_chunk: expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 230s | decode_to_chunk: output: 230s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 230s | do_aes_ctr: enter 230s | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes 230s | do_aes_ctr: exit 230s | verify_chunk_data: decrypt: ok 230s | verify_chunk_data: counter-block: ok 230s | test_ctr_vector: Encrypting 16 octets using AES-CTR with 192-bit key passed 230s algparse: Encrypting 32 octets using AES-CTR with 192-bit key 230s | decode_to_chunk: raw_key: input "0x7C 5C B2 40 1B 3D C3 3C 19 E7 34 08 19 E0 F6 9C67 8C 3D B8 E6 F6 A9 1A" 230s | decode_to_chunk: output: 230s | 7c 5c b2 40 1b 3d c3 3c 19 e7 34 08 19 e0 f6 9c |\.@.=.<..4..... 230s | 67 8c 3d b8 e6 f6 a9 1a g.=..... 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2f90 230s | key-offset: 0, key-size: 24 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_CTR 230s | flags: ENCRYPT+DECRYPT 230s | key_size: 24-bytes 230s | base: base-key@0xae2ce48adab0 (40-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f58 230s | decode_to_chunk: input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 230s | decode_to_chunk: output: 230s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 230s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 230s | decode_to_chunk: output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 230s | decode_to_chunk: Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 230s | decode_to_chunk: output: 230s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 230s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 230s | decode_to_chunk: expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 230s | decode_to_chunk: output: 230s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 230s | do_aes_ctr: enter 230s | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes 230s | do_aes_ctr: exit 230s | verify_chunk_data: encrypt: ok 230s | verify_chunk_data: counter-block: ok 230s | decode_to_chunk: input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 230s | decode_to_chunk: output: 230s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 230s | decode_to_chunk: Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 230s | decode_to_chunk: output: 230s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 230s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 230s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 230s | decode_to_chunk: output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 230s | decode_to_chunk: expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 230s | decode_to_chunk: output: 230s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 230s | do_aes_ctr: enter 230s | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes 230s | do_aes_ctr: exit 230s | verify_chunk_data: decrypt: ok 230s | verify_chunk_data: counter-block: ok 230s | test_ctr_vector: Encrypting 32 octets using AES-CTR with 192-bit key passed 230s algparse: Encrypting 36 octets using AES-CTR with 192-bit key 230s | decode_to_chunk: raw_key: input "0x02 BF 39 1E E8 EC B1 59 B9 59 61 7B 09 65 27 9BF5 9B 60 A7 86 D3 E0 FE" 230s | decode_to_chunk: output: 230s | 02 bf 39 1e e8 ec b1 59 b9 59 61 7b 09 65 27 9b ..9....Y.Ya{.e'. 230s | f5 9b 60 a7 86 d3 e0 fe ..`..... 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2f90 230s | key-offset: 0, key-size: 24 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_CTR 230s | flags: ENCRYPT+DECRYPT 230s | key_size: 24-bytes 230s | base: base-key@0xae2ce48adab0 (40-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f58 230s | decode_to_chunk: input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 230s | decode_to_chunk: output: 230s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 230s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 230s | decode_to_chunk: output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 230s | 20 21 22 23 !"# 230s | decode_to_chunk: Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 230s | decode_to_chunk: output: 230s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 230s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 230s | ab ee 09 35 ...5 230s | decode_to_chunk: expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 230s | decode_to_chunk: output: 230s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 230s | do_aes_ctr: enter 230s | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes 230s | do_aes_ctr: exit 230s | verify_chunk_data: encrypt: ok 230s | verify_chunk_data: counter-block: ok 230s | decode_to_chunk: input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 230s | decode_to_chunk: output: 230s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 230s | decode_to_chunk: Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 230s | decode_to_chunk: output: 230s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 230s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 230s | ab ee 09 35 ...5 230s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 230s | decode_to_chunk: output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 230s | 20 21 22 23 !"# 230s | decode_to_chunk: expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 230s | decode_to_chunk: output: 230s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 230s | do_aes_ctr: enter 230s | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes 230s | do_aes_ctr: exit 230s | verify_chunk_data: decrypt: ok 230s | verify_chunk_data: counter-block: ok 230s | test_ctr_vector: Encrypting 36 octets using AES-CTR with 192-bit key passed 230s algparse: Encrypting 16 octets using AES-CTR with 256-bit key 230s | decode_to_chunk: raw_key: input "0x77 6B EF F2 85 1D B0 6F 4C 8A 05 42 C8 69 6F 6C6A 81 AF 1E EC 96 B4 D3 7F C1 D6 89 E6 C1 C1 04" 230s | decode_to_chunk: output: 230s | 77 6b ef f2 85 1d b0 6f 4c 8a 05 42 c8 69 6f 6c wk.....oL..B.iol 230s | 6a 81 af 1e ec 96 b4 d3 7f c1 d6 89 e6 c1 c1 04 j............... 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2f90 230s | key-offset: 0, key-size: 32 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_CTR 230s | flags: ENCRYPT+DECRYPT 230s | key_size: 32-bytes 230s | base: base-key@0xae2ce48adab0 (48-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f58 230s | decode_to_chunk: input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 230s | decode_to_chunk: output: 230s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 230s | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 230s | decode_to_chunk: output: 230s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 230s | decode_to_chunk: Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 230s | decode_to_chunk: output: 230s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 230s | decode_to_chunk: expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 230s | decode_to_chunk: output: 230s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 230s | do_aes_ctr: enter 230s | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes 230s | do_aes_ctr: exit 230s | verify_chunk_data: encrypt: ok 230s | verify_chunk_data: counter-block: ok 230s | decode_to_chunk: input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 230s | decode_to_chunk: output: 230s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 230s | decode_to_chunk: Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 230s | decode_to_chunk: output: 230s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 230s | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 230s | decode_to_chunk: output: 230s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 230s | decode_to_chunk: expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 230s | decode_to_chunk: output: 230s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 230s | do_aes_ctr: enter 230s | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes 230s | do_aes_ctr: exit 230s | verify_chunk_data: decrypt: ok 230s | verify_chunk_data: counter-block: ok 230s | test_ctr_vector: Encrypting 16 octets using AES-CTR with 256-bit key passed 230s algparse: Encrypting 32 octets using AES-CTR with 256-bit key 230s | decode_to_chunk: raw_key: input "0xF6 D6 6D 6B D5 2D 59 BB 07 96 36 58 79 EF F8 86C6 6D D5 1A 5B 6A 99 74 4B 50 59 0C 87 A2 38 84" 230s | decode_to_chunk: output: 230s | f6 d6 6d 6b d5 2d 59 bb 07 96 36 58 79 ef f8 86 ..mk.-Y...6Xy... 230s | c6 6d d5 1a 5b 6a 99 74 4b 50 59 0c 87 a2 38 84 .m..[j.tKPY...8. 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2f90 230s | key-offset: 0, key-size: 32 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_CTR 230s | flags: ENCRYPT+DECRYPT 230s | key_size: 32-bytes 230s | base: base-key@0xae2ce48adab0 (48-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f58 230s | decode_to_chunk: input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 230s | decode_to_chunk: output: 230s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 230s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 230s | decode_to_chunk: output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 230s | decode_to_chunk: Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 230s | decode_to_chunk: output: 230s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 230s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 230s | decode_to_chunk: expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 230s | decode_to_chunk: output: 230s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 230s | do_aes_ctr: enter 230s | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes 230s | do_aes_ctr: exit 230s | verify_chunk_data: encrypt: ok 230s | verify_chunk_data: counter-block: ok 230s | decode_to_chunk: input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 230s | decode_to_chunk: output: 230s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 230s | decode_to_chunk: Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 230s | decode_to_chunk: output: 230s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 230s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 230s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 230s | decode_to_chunk: output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 230s | decode_to_chunk: expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 230s | decode_to_chunk: output: 230s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 230s | do_aes_ctr: enter 230s | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes 230s | do_aes_ctr: exit 230s | verify_chunk_data: decrypt: ok 230s | verify_chunk_data: counter-block: ok 230s | test_ctr_vector: Encrypting 32 octets using AES-CTR with 256-bit key passed 230s algparse: Encrypting 36 octets using AES-CTR with 256-bit key 230s | decode_to_chunk: raw_key: input "0xFF 7A 61 7C E6 91 48 E4 F1 72 6E 2F 43 58 1D E2AA 62 D9 F8 05 53 2E DF F1 EE D6 87 FB 54 15 3D" 230s | decode_to_chunk: output: 230s | ff 7a 61 7c e6 91 48 e4 f1 72 6e 2f 43 58 1d e2 .za|..H..rn/CX.. 230s | aa 62 d9 f8 05 53 2e df f1 ee d6 87 fb 54 15 3d .b...S.......T.= 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2f90 230s | key-offset: 0, key-size: 32 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_CTR 230s | flags: ENCRYPT+DECRYPT 230s | key_size: 32-bytes 230s | base: base-key@0xae2ce48adab0 (48-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f58 230s | decode_to_chunk: input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 230s | decode_to_chunk: output: 230s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 230s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 230s | decode_to_chunk: output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 230s | 20 21 22 23 !"# 230s | decode_to_chunk: Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 230s | decode_to_chunk: output: 230s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 230s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 230s | 1e c0 e6 b8 .... 230s | decode_to_chunk: expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 230s | decode_to_chunk: output: 230s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 230s | do_aes_ctr: enter 230s | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes 230s | do_aes_ctr: exit 230s | verify_chunk_data: encrypt: ok 230s | verify_chunk_data: counter-block: ok 230s | decode_to_chunk: input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 230s | decode_to_chunk: output: 230s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 230s | decode_to_chunk: Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 230s | decode_to_chunk: output: 230s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 230s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 230s | 1e c0 e6 b8 .... 230s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 230s | decode_to_chunk: output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 230s | 20 21 22 23 !"# 230s | decode_to_chunk: expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 230s | decode_to_chunk: output: 230s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 230s | do_aes_ctr: enter 230s | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes 230s | do_aes_ctr: exit 230s | verify_chunk_data: decrypt: ok 230s | verify_chunk_data: counter-block: ok 230s | test_ctr_vector: Encrypting 36 octets using AES-CTR with 256-bit key passed 230s algparse: testing AES_CBC: 230s algparse: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 230s | decode_to_chunk: raw_key: input "0x06a9214036b8a15b512e03d534120006" 230s | decode_to_chunk: output: 230s | 06 a9 21 40 36 b8 a1 5b 51 2e 03 d5 34 12 00 06 ..!@6..[Q...4... 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2fa0 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_CBC 230s | flags: ENCRYPT+DECRYPT 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48adab0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f68 230s | decode_to_chunk: IV: : input "0x3dafba429d9eb430b422da802c9fac41" 230s | decode_to_chunk: output: 230s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 230s | decode_to_chunk: new IV: : input "0xe353779c1079aeb82708942dbe77181a" 230s | decode_to_chunk: output: 230s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 230s | decode_to_chunk: plaintext: : input "Single block msg" 230s | decode_to_chunk: output: 230s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 230s | decode_to_chunk: ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 230s | decode_to_chunk: output: 230s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 230s | NSS ike_alg_nss_cbc: AES_CBC - enter 230s | NSS ike_alg_nss_cbc: AES_CBC - exit 230s | verify_chunk_data: encrypt: ok 230s | verify_chunk_data: updated CBC IV: ok 230s | decode_to_chunk: IV: : input "0x3dafba429d9eb430b422da802c9fac41" 230s | decode_to_chunk: output: 230s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 230s | decode_to_chunk: new IV: : input "0xe353779c1079aeb82708942dbe77181a" 230s | decode_to_chunk: output: 230s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 230s | decode_to_chunk: ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 230s | decode_to_chunk: output: 230s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 230s | decode_to_chunk: plaintext: : input "Single block msg" 230s | decode_to_chunk: output: 230s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 230s | NSS ike_alg_nss_cbc: AES_CBC - enter 230s | NSS ike_alg_nss_cbc: AES_CBC - exit 230s | verify_chunk_data: decrypt: ok 230s | verify_chunk_data: updated CBC IV: ok 230s | test_ctr_vector: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key passed 230s algparse: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 230s | decode_to_chunk: raw_key: input "0xc286696d887c9aa0611bbb3e2025a45a" 230s | decode_to_chunk: output: 230s | c2 86 69 6d 88 7c 9a a0 61 1b bb 3e 20 25 a4 5a ..im.|..a..> %.Z 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2fa0 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_CBC 230s | flags: ENCRYPT+DECRYPT 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48adab0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f68 230s | decode_to_chunk: IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 230s | decode_to_chunk: output: 230s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 230s | decode_to_chunk: new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 230s | decode_to_chunk: output: 230s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 230s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 230s | decode_to_chunk: plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 230s | decode_to_chunk: output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 230s | decode_to_chunk: ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 230s | decode_to_chunk: output: 230s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 230s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 230s | NSS ike_alg_nss_cbc: AES_CBC - enter 230s | NSS ike_alg_nss_cbc: AES_CBC - exit 230s | verify_chunk_data: encrypt: ok 230s | verify_chunk_data: updated CBC IV: ok 230s | decode_to_chunk: IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 230s | decode_to_chunk: output: 230s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 230s | decode_to_chunk: new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 230s | decode_to_chunk: output: 230s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 230s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 230s | decode_to_chunk: ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 230s | decode_to_chunk: output: 230s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 230s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 230s | decode_to_chunk: plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 230s | decode_to_chunk: output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 230s | NSS ike_alg_nss_cbc: AES_CBC - enter 230s | NSS ike_alg_nss_cbc: AES_CBC - exit 230s | verify_chunk_data: decrypt: ok 230s | verify_chunk_data: updated CBC IV: ok 230s | test_ctr_vector: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key passed 230s algparse: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 230s | decode_to_chunk: raw_key: input "0x6c3ea0477630ce21a2ce334aa746c2cd" 230s | decode_to_chunk: output: 230s | 6c 3e a0 47 76 30 ce 21 a2 ce 33 4a a7 46 c2 cd l>.Gv0.!..3J.F.. 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2fa0 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_CBC 230s | flags: ENCRYPT+DECRYPT 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48adab0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f68 230s | decode_to_chunk: IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 230s | decode_to_chunk: output: 230s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 230s | decode_to_chunk: new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 230s | decode_to_chunk: output: 230s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 230s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 230s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 230s | decode_to_chunk: plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 230s | decode_to_chunk: output: 230s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 230s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 230s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 230s | decode_to_chunk: ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 230s | decode_to_chunk: output: 230s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 230s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 230s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 230s | NSS ike_alg_nss_cbc: AES_CBC - enter 230s | NSS ike_alg_nss_cbc: AES_CBC - exit 230s | verify_chunk_data: encrypt: ok 230s | verify_chunk_data: updated CBC IV: ok 230s | decode_to_chunk: IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 230s | decode_to_chunk: output: 230s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 230s | decode_to_chunk: new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 230s | decode_to_chunk: output: 230s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 230s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 230s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 230s | decode_to_chunk: ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 230s | decode_to_chunk: output: 230s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 230s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 230s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 230s | decode_to_chunk: plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 230s | decode_to_chunk: output: 230s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 230s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 230s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 230s | NSS ike_alg_nss_cbc: AES_CBC - enter 230s | NSS ike_alg_nss_cbc: AES_CBC - exit 230s | verify_chunk_data: decrypt: ok 230s | verify_chunk_data: updated CBC IV: ok 230s | test_ctr_vector: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key passed 230s algparse: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 230s | decode_to_chunk: raw_key: input "0x56e47a38c5598974bc46903dba290349" 230s | decode_to_chunk: output: 230s | 56 e4 7a 38 c5 59 89 74 bc 46 90 3d ba 29 03 49 V.z8.Y.t.F.=.).I 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2fa0 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_CBC 230s | flags: ENCRYPT+DECRYPT 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48adab0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f68 230s | decode_to_chunk: IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 230s | decode_to_chunk: output: 230s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 230s | decode_to_chunk: plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 230s | decode_to_chunk: output: 230s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 230s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 230s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 230s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 230s | decode_to_chunk: ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 230s | decode_to_chunk: output: 230s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 230s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 230s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 230s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 230s | NSS ike_alg_nss_cbc: AES_CBC - enter 230s | NSS ike_alg_nss_cbc: AES_CBC - exit 230s | verify_chunk_data: encrypt: ok 230s | verify_chunk_data: updated CBC IV: ok 230s | decode_to_chunk: IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 230s | decode_to_chunk: output: 230s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 230s | decode_to_chunk: ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 230s | decode_to_chunk: output: 230s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 230s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 230s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 230s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 230s | decode_to_chunk: plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 230s | decode_to_chunk: output: 230s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 230s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 230s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 230s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 230s | NSS ike_alg_nss_cbc: AES_CBC - enter 230s | NSS ike_alg_nss_cbc: AES_CBC - exit 230s | verify_chunk_data: decrypt: ok 230s | verify_chunk_data: updated CBC IV: ok 230s | test_ctr_vector: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key passed 230s algparse: testing AES_XCBC: 230s algparse: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 230s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 230s | decode_to_chunk: output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | decode_to_chunk: test_prf_vector: input "" 230s | decode_to_chunk: output: 230s | 230s | decode_to_chunk: test_prf_vector: input "0x75f0251d528ac01c4573dfd584d79f29" 230s | decode_to_chunk: output: 230s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 230s | PRF chunk interface PRF AES_XCBC init key-chunk@0xae2ce48ae750 (length 16) 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2eb0 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48adab0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e78 230s | XCBC: Key 16=16 just right 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48ac040 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e08 230s | PRF chunk interface PRF AES_XCBC 0xae2ce48aed10 230s | PRF chunk interface PRF AES_XCBC update message (0xae2ce48ac020 length 0) 230s | 230s | XCBC: data 230s | 230s | K extracting all 16 bytes of key@0xae2ce48adab0 230s | K: symkey-key@0xae2ce48adab0 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)623191333: f1 61 9f e6 98 4e c1 fb 39 fb bc cc 1c b7 3f d3 230s | K extracted len 16 bytes at 0xae2ce48ae2c0 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K1 230s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2da0 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b09e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2d68 230s | Computing E[0] using K3 230s | XCBC: K3 230s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 230s | XCBC: E[n-1] 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | XCBC: M[n] 230s | 230s | XCBC: M[n] 230s | 230s | XCBC: M[n]:80...^E[n-1]^K3 230s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 230s | XCBC: MAC 230s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 230s | PRF chunk interface PRF AES_XCBC final length 16 230s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 230s | chunk output 230s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 230s | verify_chunk_data: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: ok 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2f40 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48ac040 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f08 230s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xae2ce48adab0 (size 16) 230s | PRF symkey interface: key symkey-key@0xae2ce48adab0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | XCBC: Key 16=16 just right 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48adab0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e48 230s | PRF symkey interface PRF AES_XCBC 0xae2ce48aed10 230s | PRF symkey interface PRF AES_XCBC update symkey message-key@(nil) (size 0) 230s | PRF symkey interface: symkey message-key@NULL 230s | symkey message NULL key has no bytes 230s | XCBC: data 230s | 230s | K extracting all 16 bytes of key@0xae2ce48ac040 230s | K: symkey-key@0xae2ce48ac040 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)-744542432: f1 61 9f e6 98 4e c1 fb 39 fb bc cc 1c b7 3f d3 230s | K extracted len 16 bytes at 0xae2ce48ae2c0 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K1 230s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2e00 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b22e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2dc8 230s | Computing E[0] using K3 230s | XCBC: K3 230s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 230s | XCBC: E[n-1] 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | XCBC: M[n] 230s | 230s | XCBC: M[n] 230s | 230s | XCBC: M[n]:80...^E[n-1]^K3 230s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 230s | XCBC: MAC 230s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2ed0 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b22e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e98 230s | PRF symkey interface PRF AES_XCBC final-key@0xae2ce48b09e0 (size 16) 230s | PRF symkey interface: key-key@0xae2ce48b09e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | output: symkey-key@0xae2ce48b09e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracting all 16 bytes of key@0xae2ce48b09e0 230s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: symkey-key@0xae2ce48b09e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 16 230s | wrapper: siBuffer: 31 c1 b1 75 0e 73 ad 21 59 8d ca 1e 35 87 7b f8 230s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracted len 16 bytes at 0xae2ce48ae2c0 230s | unwrapped: 230s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 230s | verify_chunk_data: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: ok 230s | test_prf_vector: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input passed 230s algparse: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 230s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 230s | decode_to_chunk: output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | decode_to_chunk: test_prf_vector: input "0x000102" 230s | decode_to_chunk: output: 230s | 00 01 02 ... 230s | decode_to_chunk: test_prf_vector: input "0x5b376580ae2f19afe7219ceef172756f" 230s | decode_to_chunk: output: 230s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 230s | PRF chunk interface PRF AES_XCBC init key-chunk@0xae2ce48ade50 (length 16) 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2eb0 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48adab0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e78 230s | XCBC: Key 16=16 just right 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b09e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e08 230s | PRF chunk interface PRF AES_XCBC 0xae2ce48aed10 230s | PRF chunk interface PRF AES_XCBC update message (0xae2ce48ade70 length 3) 230s | 00 01 02 ... 230s | XCBC: data 230s | 00 01 02 ... 230s | K extracting all 16 bytes of key@0xae2ce48adab0 230s | K: symkey-key@0xae2ce48adab0 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)623191333: f1 61 9f e6 98 4e c1 fb 39 fb bc cc 1c b7 3f d3 230s | K extracted len 16 bytes at 0xae2ce48aec80 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K1 230s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2da0 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48ac040 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2d68 230s | Computing E[1] using K3 230s | XCBC: K3 230s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 230s | XCBC: E[n-1] 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | XCBC: M[n] 230s | 00 01 02 ... 230s | XCBC: M[n] 230s | 00 01 02 ... 230s | XCBC: M[n]:80...^E[n-1]^K3 230s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 230s | XCBC: MAC 230s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 230s | PRF chunk interface PRF AES_XCBC final length 16 230s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 230s | chunk output 230s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 230s | verify_chunk_data: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: ok 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2f40 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b09e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f08 230s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xae2ce48adab0 (size 16) 230s | PRF symkey interface: key symkey-key@0xae2ce48adab0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | XCBC: Key 16=16 just right 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48adab0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e48 230s | PRF symkey interface PRF AES_XCBC 0xae2ce48aed10 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2f40 230s | key-offset: 0, key-size: 3 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 3-bytes 230s | base: base-key@0xae2ce48b22e0 (19-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f08 230s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xae2ce48ac040 (size 3) 230s | PRF symkey interface: symkey message-key@0xae2ce48ac040 (3-bytes, EXTRACT_KEY_FROM_KEY) 230s | symkey message extracting all 3 bytes of key@0xae2ce48ac040 230s | symkey message: symkey-key@0xae2ce48ac040 (3-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 16 230s | wrapper: siBuffer: 81 75 44 18 d3 0a bb b1 2e 3b b6 87 25 fe dd 6e 230s | symkey message extracted len 16 bytes at 0xae2ce48ae2c0 230s | unwrapped: 230s | 00 01 02 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | XCBC: data 230s | 00 01 02 ... 230s | K extracting all 16 bytes of key@0xae2ce48b09e0 230s | K: symkey-key@0xae2ce48b09e0 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)2097152: f1 61 9f e6 98 4e c1 fb 39 fb bc cc 1c b7 3f d3 230s | K extracted len 16 bytes at 0xae2ce48aec80 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K1 230s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2e00 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b3ba0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2dc8 230s | Computing E[1] using K3 230s | XCBC: K3 230s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 230s | XCBC: E[n-1] 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | XCBC: M[n] 230s | 00 01 02 ... 230s | XCBC: M[n] 230s | 00 01 02 ... 230s | XCBC: M[n]:80...^E[n-1]^K3 230s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 230s | XCBC: MAC 230s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2ed0 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b3ba0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e98 230s | PRF symkey interface PRF AES_XCBC final-key@0xae2ce48b22e0 (size 16) 230s | PRF symkey interface: key-key@0xae2ce48b22e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | output: symkey-key@0xae2ce48b22e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracting all 16 bytes of key@0xae2ce48b22e0 230s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: symkey-key@0xae2ce48b22e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 16 230s | wrapper: siBuffer: ed 64 ec c7 74 b1 ec d4 ac cc 20 5b ec 0a 3e 1a 230s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracted len 16 bytes at 0xae2ce48adeb0 230s | unwrapped: 230s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 230s | verify_chunk_data: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: ok 230s | test_prf_vector: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input passed 230s algparse: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 230s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 230s | decode_to_chunk: output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 230s | decode_to_chunk: output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | decode_to_chunk: test_prf_vector: input "0xd2a246fa349b68a79998a4394ff7a263" 230s | decode_to_chunk: output: 230s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 230s | PRF chunk interface PRF AES_XCBC init key-chunk@0xae2ce48ae750 (length 16) 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2eb0 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48adab0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e78 230s | XCBC: Key 16=16 just right 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b22e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e08 230s | PRF chunk interface PRF AES_XCBC 0xae2ce48ae2c0 230s | PRF chunk interface PRF AES_XCBC update message (0xae2ce48ade90 length 16) 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: data 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | K extracting all 16 bytes of key@0xae2ce48adab0 230s | K: symkey-key@0xae2ce48adab0 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)623191333: f1 61 9f e6 98 4e c1 fb 39 fb bc cc 1c b7 3f d3 230s | K extracted len 16 bytes at 0xae2ce48aec80 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K1 230s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2da0 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48ac040 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2d68 230s | XCBC: Computing E[1] using K2 230s | XCBC: K2 230s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 230s | XCBC: E[n-1] 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | XCBC: M[n] 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: M[n]^E[n-1]^K2 230s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 230s | XCBC: MAC 230s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 230s | PRF chunk interface PRF AES_XCBC final length 16 230s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 230s | chunk output 230s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 230s | verify_chunk_data: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: ok 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2f40 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b22e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f08 230s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xae2ce48adab0 (size 16) 230s | PRF symkey interface: key symkey-key@0xae2ce48adab0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | XCBC: Key 16=16 just right 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48adab0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e48 230s | PRF symkey interface PRF AES_XCBC 0xae2ce48ae2c0 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2f40 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b09e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f08 230s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xae2ce48ac040 (size 16) 230s | PRF symkey interface: symkey message-key@0xae2ce48ac040 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | symkey message extracting all 16 bytes of key@0xae2ce48ac040 230s | symkey message: symkey-key@0xae2ce48ac040 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 16 230s | wrapper: siBuffer: f1 61 9f e6 98 4e c1 fb 39 fb bc cc 1c b7 3f d3 230s | symkey message extracted len 16 bytes at 0xae2ce48aec80 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: data 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | K extracting all 16 bytes of key@0xae2ce48b22e0 230s | K: symkey-key@0xae2ce48b22e0 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)2097152: f1 61 9f e6 98 4e c1 fb 39 fb bc cc 1c b7 3f d3 230s | K extracted len 16 bytes at 0xae2ce48aed10 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K1 230s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2e00 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b3ba0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2dc8 230s | XCBC: Computing E[1] using K2 230s | XCBC: K2 230s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 230s | XCBC: E[n-1] 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | XCBC: M[n] 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: M[n]^E[n-1]^K2 230s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 230s | XCBC: MAC 230s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2ed0 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b3ba0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e98 230s | PRF symkey interface PRF AES_XCBC final-key@0xae2ce48b09e0 (size 16) 230s | PRF symkey interface: key-key@0xae2ce48b09e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | output: symkey-key@0xae2ce48b09e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracting all 16 bytes of key@0xae2ce48b09e0 230s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: symkey-key@0xae2ce48b09e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 16 230s | wrapper: siBuffer: d2 c9 68 32 91 c7 fb ac af 9a a2 7e da 04 c3 89 230s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracted len 16 bytes at 0xae2ce48aed10 230s | unwrapped: 230s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 230s | verify_chunk_data: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: ok 230s | test_prf_vector: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input passed 230s algparse: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 230s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 230s | decode_to_chunk: output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 230s | decode_to_chunk: output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 .... 230s | decode_to_chunk: test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 230s | decode_to_chunk: output: 230s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 230s | PRF chunk interface PRF AES_XCBC init key-chunk@0xae2ce48b0b50 (length 16) 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2eb0 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48adab0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e78 230s | XCBC: Key 16=16 just right 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b09e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e08 230s | PRF chunk interface PRF AES_XCBC 0xae2ce48aec80 230s | PRF chunk interface PRF AES_XCBC update message (0xae2ce48ada10 length 20) 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 .... 230s | XCBC: data 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 .... 230s | K extracting all 16 bytes of key@0xae2ce48adab0 230s | K: symkey-key@0xae2ce48adab0 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)623191333: f1 61 9f e6 98 4e c1 fb 39 fb bc cc 1c b7 3f d3 230s | K extracted len 16 bytes at 0xae2ce48ae2c0 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K1 230s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2da0 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48ac040 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2d68 230s | Computing E[2] using K3 230s | XCBC: K3 230s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 230s | XCBC: E[n-1] 230s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 230s | XCBC: M[n] 230s | 10 11 12 13 .... 230s | XCBC: M[n] 230s | 10 11 12 13 .... 230s | XCBC: M[n]:80...^E[n-1]^K3 230s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 230s | XCBC: MAC 230s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 230s | PRF chunk interface PRF AES_XCBC final length 16 230s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 230s | chunk output 230s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 230s | verify_chunk_data: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: ok 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2f40 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b09e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f08 230s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xae2ce48adab0 (size 16) 230s | PRF symkey interface: key symkey-key@0xae2ce48adab0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | XCBC: Key 16=16 just right 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48adab0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e48 230s | PRF symkey interface PRF AES_XCBC 0xae2ce48aec80 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2f40 230s | key-offset: 0, key-size: 20 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 20-bytes 230s | base: base-key@0xae2ce48b22e0 (36-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f08 230s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xae2ce48ac040 (size 20) 230s | PRF symkey interface: symkey message-key@0xae2ce48ac040 (20-bytes, EXTRACT_KEY_FROM_KEY) 230s | symkey message extracting all 20 bytes of key@0xae2ce48ac040 230s | symkey message: symkey-key@0xae2ce48ac040 (20-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 32 230s | wrapper: siBuffer: f1 61 9f e6 98 4e c1 fb 39 fb bc cc 1c b7 3f d3 d4 b4 bf c6 63 0f 3f 41 88 3f 6e 79 ee fa 7e 6d 230s | symkey message extracted len 32 bytes at 0xae2ce48ae2c0 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | XCBC: data 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 .... 230s | K extracting all 16 bytes of key@0xae2ce48b09e0 230s | K: symkey-key@0xae2ce48b09e0 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)2097152: f1 61 9f e6 98 4e c1 fb 39 fb bc cc 1c b7 3f d3 230s | K extracted len 16 bytes at 0xae2ce48ae2c0 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K1 230s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2e00 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b3ba0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2dc8 230s | Computing E[2] using K3 230s | XCBC: K3 230s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 230s | XCBC: E[n-1] 230s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 230s | XCBC: M[n] 230s | 10 11 12 13 .... 230s | XCBC: M[n] 230s | 10 11 12 13 .... 230s | XCBC: M[n]:80...^E[n-1]^K3 230s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 230s | XCBC: MAC 230s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2ed0 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b3ba0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e98 230s | PRF symkey interface PRF AES_XCBC final-key@0xae2ce48b22e0 (size 16) 230s | PRF symkey interface: key-key@0xae2ce48b22e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | output: symkey-key@0xae2ce48b22e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracting all 16 bytes of key@0xae2ce48b22e0 230s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: symkey-key@0xae2ce48b22e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 16 230s | wrapper: siBuffer: c1 36 b9 5c 21 e3 b0 0d 23 49 ca 36 c6 0c f1 52 230s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracted len 16 bytes at 0xae2ce48ae2c0 230s | unwrapped: 230s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 230s | verify_chunk_data: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: ok 230s | test_prf_vector: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input passed 230s algparse: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 230s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 230s | decode_to_chunk: output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 230s | decode_to_chunk: output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 230s | decode_to_chunk: test_prf_vector: input "0xf54f0ec8d2b9f3d36807734bd5283fd4" 230s | decode_to_chunk: output: 230s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 230s | PRF chunk interface PRF AES_XCBC init key-chunk@0xae2ce48adeb0 (length 16) 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2eb0 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48adab0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e78 230s | XCBC: Key 16=16 just right 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b22e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e08 230s | PRF chunk interface PRF AES_XCBC 0xae2ce48aec80 230s | PRF chunk interface PRF AES_XCBC update message (0xae2ce48ae2c0 length 32) 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 230s | XCBC: data 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 230s | K extracting all 16 bytes of key@0xae2ce48adab0 230s | K: symkey-key@0xae2ce48adab0 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)623191333: f1 61 9f e6 98 4e c1 fb 39 fb bc cc 1c b7 3f d3 230s | K extracted len 16 bytes at 0xae2ce48adca0 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K1 230s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2da0 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48ac040 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2d68 230s | XCBC: Computing E[2] using K2 230s | XCBC: K2 230s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 230s | XCBC: E[n-1] 230s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 230s | XCBC: M[n] 230s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 230s | XCBC: M[n]^E[n-1]^K2 230s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 230s | XCBC: MAC 230s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 230s | PRF chunk interface PRF AES_XCBC final length 16 230s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 230s | chunk output 230s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 230s | verify_chunk_data: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: ok 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2f40 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b22e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f08 230s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xae2ce48adab0 (size 16) 230s | PRF symkey interface: key symkey-key@0xae2ce48adab0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | XCBC: Key 16=16 just right 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48adab0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e48 230s | PRF symkey interface PRF AES_XCBC 0xae2ce48aec80 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2f40 230s | key-offset: 0, key-size: 32 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 32-bytes 230s | base: base-key@0xae2ce48b09e0 (48-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f08 230s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xae2ce48ac040 (size 32) 230s | PRF symkey interface: symkey message-key@0xae2ce48ac040 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | symkey message extracting all 32 bytes of key@0xae2ce48ac040 230s | symkey message: symkey-key@0xae2ce48ac040 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 32 230s | wrapper: siBuffer: f1 61 9f e6 98 4e c1 fb 39 fb bc cc 1c b7 3f d3 8a c0 ac 51 c7 bb 48 7c d1 8d 70 4e 0a 3d 4c 72 230s | symkey message extracted len 32 bytes at 0xae2ce48ade70 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 230s | XCBC: data 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 230s | K extracting all 16 bytes of key@0xae2ce48b22e0 230s | K: symkey-key@0xae2ce48b22e0 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)2097152: f1 61 9f e6 98 4e c1 fb 39 fb bc cc 1c b7 3f d3 230s | K extracted len 16 bytes at 0xae2ce48ac020 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K1 230s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2e00 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b3ba0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2dc8 230s | XCBC: Computing E[2] using K2 230s | XCBC: K2 230s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 230s | XCBC: E[n-1] 230s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 230s | XCBC: M[n] 230s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 230s | XCBC: M[n]^E[n-1]^K2 230s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 230s | XCBC: MAC 230s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2ed0 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b3ba0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e98 230s | PRF symkey interface PRF AES_XCBC final-key@0xae2ce48b09e0 (size 16) 230s | PRF symkey interface: key-key@0xae2ce48b09e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | output: symkey-key@0xae2ce48b09e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracting all 16 bytes of key@0xae2ce48b09e0 230s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: symkey-key@0xae2ce48b09e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 16 230s | wrapper: siBuffer: 47 f1 cd d8 c4 aa 6d 3f 69 27 21 d5 12 8e de 68 230s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracted len 16 bytes at 0xae2ce48aec80 230s | unwrapped: 230s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 230s | verify_chunk_data: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: ok 230s | test_prf_vector: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input passed 230s algparse: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 230s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 230s | decode_to_chunk: output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f2021" 230s | decode_to_chunk: output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 230s | 20 21 ! 230s | decode_to_chunk: test_prf_vector: input "0xbecbb3bccdb518a30677d5481fb6b4d8" 230s | decode_to_chunk: output: 230s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 230s | PRF chunk interface PRF AES_XCBC init key-chunk@0xae2ce48ade50 (length 16) 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2eb0 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48adab0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e78 230s | XCBC: Key 16=16 just right 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b09e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e08 230s | PRF chunk interface PRF AES_XCBC 0xae2ce48ae2c0 230s | PRF chunk interface PRF AES_XCBC update message (0xae2ce48aed10 length 34) 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 230s | 20 21 ! 230s | XCBC: data 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 230s | 20 21 ! 230s | K extracting all 16 bytes of key@0xae2ce48adab0 230s | K: symkey-key@0xae2ce48adab0 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)623191333: f1 61 9f e6 98 4e c1 fb 39 fb bc cc 1c b7 3f d3 230s | K extracted len 16 bytes at 0xae2ce48aec80 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K1 230s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2da0 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48ac040 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2d68 230s | Computing E[3] using K3 230s | XCBC: K3 230s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 230s | XCBC: E[n-1] 230s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 230s | XCBC: M[n] 230s | 20 21 ! 230s | XCBC: M[n] 230s | 20 21 ! 230s | XCBC: M[n]:80...^E[n-1]^K3 230s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 230s | XCBC: MAC 230s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 230s | PRF chunk interface PRF AES_XCBC final length 16 230s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 230s | chunk output 230s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 230s | verify_chunk_data: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: ok 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2f40 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b09e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f08 230s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xae2ce48adab0 (size 16) 230s | PRF symkey interface: key symkey-key@0xae2ce48adab0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | XCBC: Key 16=16 just right 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48adab0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e48 230s | PRF symkey interface PRF AES_XCBC 0xae2ce48ae2c0 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2f40 230s | key-offset: 0, key-size: 34 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 34-bytes 230s | base: base-key@0xae2ce48b22e0 (50-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f08 230s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xae2ce48ac040 (size 34) 230s | PRF symkey interface: symkey message-key@0xae2ce48ac040 (34-bytes, EXTRACT_KEY_FROM_KEY) 230s | symkey message extracting all 34 bytes of key@0xae2ce48ac040 230s | symkey message: symkey-key@0xae2ce48ac040 (34-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 48 230s | wrapper: siBuffer: f1 61 9f e6 98 4e c1 fb 39 fb bc cc 1c b7 3f d3 8a c0 ac 51 c7 bb 48 7c d1 8d 70 4e 0a 3d 4c 72 54 61 65 c4 14 d7 f8 a5 4c 60 da 4c 77 a0 6c 9d 230s | symkey message extracted len 48 bytes at 0xae2ce48b3db0 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 230s | 20 21 00 00 00 00 00 00 00 00 00 00 00 00 00 00 !.............. 230s | XCBC: data 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 230s | 20 21 ! 230s | K extracting all 16 bytes of key@0xae2ce48b09e0 230s | K: symkey-key@0xae2ce48b09e0 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)2097152: f1 61 9f e6 98 4e c1 fb 39 fb bc cc 1c b7 3f d3 230s | K extracted len 16 bytes at 0xae2ce48b0880 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K1 230s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2e00 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b3ba0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2dc8 230s | Computing E[3] using K3 230s | XCBC: K3 230s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 230s | XCBC: E[n-1] 230s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 230s | XCBC: M[n] 230s | 20 21 ! 230s | XCBC: M[n] 230s | 20 21 ! 230s | XCBC: M[n]:80...^E[n-1]^K3 230s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 230s | XCBC: MAC 230s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2ed0 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b3ba0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e98 230s | PRF symkey interface PRF AES_XCBC final-key@0xae2ce48b22e0 (size 16) 230s | PRF symkey interface: key-key@0xae2ce48b22e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | output: symkey-key@0xae2ce48b22e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracting all 16 bytes of key@0xae2ce48b22e0 230s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: symkey-key@0xae2ce48b22e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 16 230s | wrapper: siBuffer: b9 2b 7e 1f 1a ea 53 5f 41 a4 1b 88 84 ac 04 a1 230s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracted len 16 bytes at 0xae2ce48b2590 230s | unwrapped: 230s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 230s | verify_chunk_data: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: ok 230s | test_prf_vector: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input passed 230s algparse: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 230s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 230s | decode_to_chunk: output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | decode_to_chunk: test_prf_vector: input "0xf0dafee895db30253761103b5d84528f" 230s | decode_to_chunk: output: 230s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 230s | PRF chunk interface PRF AES_XCBC init key-chunk@0xae2ce48adca0 (length 16) 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2eb0 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48adab0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e78 230s | XCBC: Key 16=16 just right 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b22e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e08 230s | PRF chunk interface PRF AES_XCBC 0xae2ce48aec80 230s | PRF chunk interface PRF AES_XCBC update message (0xae2ce48ac3e0 length 1000) 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 ........ 230s | XCBC: data 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 ........ 230s | K extracting all 16 bytes of key@0xae2ce48adab0 230s | K: symkey-key@0xae2ce48adab0 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)623191333: f1 61 9f e6 98 4e c1 fb 39 fb bc cc 1c b7 3f d3 230s | K extracted len 16 bytes at 0xae2ce48aed10 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K1 230s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2da0 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48ac040 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2d68 230s | Computing E[63] using K3 230s | XCBC: K3 230s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 230s | XCBC: E[n-1] 230s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 230s | XCBC: M[n] 230s | 00 00 00 00 00 00 00 00 ........ 230s | XCBC: M[n] 230s | 00 00 00 00 00 00 00 00 ........ 230s | XCBC: M[n]:80...^E[n-1]^K3 230s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 230s | XCBC: MAC 230s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 230s | PRF chunk interface PRF AES_XCBC final length 16 230s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 230s | chunk output 230s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 230s | verify_chunk_data: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: ok 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2f40 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b22e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f08 230s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xae2ce48adab0 (size 16) 230s | PRF symkey interface: key symkey-key@0xae2ce48adab0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | XCBC: Key 16=16 just right 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48adab0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e48 230s | PRF symkey interface PRF AES_XCBC 0xae2ce48aec80 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2f40 230s | key-offset: 0, key-size: 1000 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 1000-bytes 230s | base: base-key@0xae2ce48b09e0 (1016-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f08 230s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xae2ce48ac040 (size 1000) 230s | PRF symkey interface: symkey message-key@0xae2ce48ac040 (1000-bytes, EXTRACT_KEY_FROM_KEY) 230s | symkey message extracting all 1000 bytes of key@0xae2ce48ac040 230s | symkey message: symkey-key@0xae2ce48ac040 (1000-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 1008 230s | wrapper: siBuffer: 7f 39 50 9b 43 1d aa a9 44 3f 4c 81 dd da e7 60 7f 39 50 9b 43 1d aa a9 44 3f 4c 81 dd da e7 60 7f 39 50 9b 43 1d aa a9 44 3f 4c 81 dd da e7 60 7f 39 50 9b 43 1d aa a9 44 3f 4c 81 dd da e7 60 7f 39 50 9b 43 1d aa a9 44 3f 4c 81 dd da e7 60 7f 39 50 9b 43 1d aa a9 44 3f 4c 81 dd da e7 60 7f 39 50 9b 43 1d aa a9 44 3f 4c 81 dd da e7 60 7f 39 50 9b 43 1d aa a9 44 3f 4c 81 dd da e7 60 7f 39 50 9b 43 1d aa a9 44 3f 4c 81 dd da e7 60 7f 39 50 9b 43 1d aa a9 44 3f 4c 81 dd da e7 60 7f 39 50 9b 43 1d aa a9 44 3f 4c 81 dd da e7 60 7f 39 50 9b 43 1d aa a9 44 3f 4c 81 dd da e7 60 7f 39 50 9b 43 1d aa a9 44 3f 4c 81 dd da e7 60 7f 39 50 9b 43 1d aa a9 44 3f 4c 81 dd da e7 60 7f 39 50 9b 43 1d aa a9 44 3f 4c 81 dd da e7 60 7f 39 50 9b 43 1d aa a9 44 3f 4c 81 dd da e7 60 7f 39 50 9b 43 1d aa a9 44 3f 4c 81 dd da e7 60 7f 39 50 9b 43 1d aa a9 44 3f 4c 81 dd da e7 60 7f 39 50 9b 43 1d aa a9 44 3f 4c 81 dd da e7 60 7f 39 50 9b ... 230s | symkey message extracted len 1008 bytes at 0xae2ce48b63e0 230s | unwrapped: 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | XCBC: data 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 ........ 230s | K extracting all 16 bytes of key@0xae2ce48b22e0 230s | K: symkey-key@0xae2ce48b22e0 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)2097152: f1 61 9f e6 98 4e c1 fb 39 fb bc cc 1c b7 3f d3 230s | K extracted len 16 bytes at 0xae2ce48aed10 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K1 230s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2e00 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b3ba0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2dc8 230s | Computing E[63] using K3 230s | XCBC: K3 230s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 230s | XCBC: E[n-1] 230s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 230s | XCBC: M[n] 230s | 00 00 00 00 00 00 00 00 ........ 230s | XCBC: M[n] 230s | 00 00 00 00 00 00 00 00 ........ 230s | XCBC: M[n]:80...^E[n-1]^K3 230s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 230s | XCBC: MAC 230s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2ed0 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b3ba0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e98 230s | PRF symkey interface PRF AES_XCBC final-key@0xae2ce48b09e0 (size 16) 230s | PRF symkey interface: key-key@0xae2ce48b09e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | output: symkey-key@0xae2ce48b09e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracting all 16 bytes of key@0xae2ce48b09e0 230s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: symkey-key@0xae2ce48b09e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 16 230s | wrapper: siBuffer: e0 47 c2 67 fe 91 93 80 d8 c0 f7 e8 93 a2 56 f9 230s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracted len 16 bytes at 0xae2ce48aed10 230s | unwrapped: 230s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 230s | verify_chunk_data: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: ok 230s | test_prf_vector: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input passed 230s algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 230s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 230s | decode_to_chunk: output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 230s | decode_to_chunk: output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 .... 230s | decode_to_chunk: test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 230s | decode_to_chunk: output: 230s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 230s | PRF chunk interface PRF AES_XCBC init key-chunk@0xae2ce48ac020 (length 16) 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2eb0 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48adab0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e78 230s | XCBC: Key 16=16 just right 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b09e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e08 230s | PRF chunk interface PRF AES_XCBC 0xae2ce48aec80 230s | PRF chunk interface PRF AES_XCBC update message (0xae2ce48b0b50 length 20) 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 .... 230s | XCBC: data 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 .... 230s | K extracting all 16 bytes of key@0xae2ce48adab0 230s | K: symkey-key@0xae2ce48adab0 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)623191333: f1 61 9f e6 98 4e c1 fb 39 fb bc cc 1c b7 3f d3 230s | K extracted len 16 bytes at 0xae2ce48aed10 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K1 230s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2da0 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48ac040 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2d68 230s | Computing E[2] using K3 230s | XCBC: K3 230s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 230s | XCBC: E[n-1] 230s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 230s | XCBC: M[n] 230s | 10 11 12 13 .... 230s | XCBC: M[n] 230s | 10 11 12 13 .... 230s | XCBC: M[n]:80...^E[n-1]^K3 230s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 230s | XCBC: MAC 230s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 230s | PRF chunk interface PRF AES_XCBC final length 16 230s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 230s | chunk output 230s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 230s | verify_chunk_data: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): ok 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2f40 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b09e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f08 230s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xae2ce48adab0 (size 16) 230s | PRF symkey interface: key symkey-key@0xae2ce48adab0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | XCBC: Key 16=16 just right 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48adab0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e48 230s | PRF symkey interface PRF AES_XCBC 0xae2ce48aec80 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2f40 230s | key-offset: 0, key-size: 20 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 20-bytes 230s | base: base-key@0xae2ce48b22e0 (36-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f08 230s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xae2ce48ac040 (size 20) 230s | PRF symkey interface: symkey message-key@0xae2ce48ac040 (20-bytes, EXTRACT_KEY_FROM_KEY) 230s | symkey message extracting all 20 bytes of key@0xae2ce48ac040 230s | symkey message: symkey-key@0xae2ce48ac040 (20-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 32 230s | wrapper: siBuffer: f1 61 9f e6 98 4e c1 fb 39 fb bc cc 1c b7 3f d3 d4 b4 bf c6 63 0f 3f 41 88 3f 6e 79 ee fa 7e 6d 230s | symkey message extracted len 32 bytes at 0xae2ce48b0700 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | XCBC: data 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 .... 230s | K extracting all 16 bytes of key@0xae2ce48b09e0 230s | K: symkey-key@0xae2ce48b09e0 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)2097152: f1 61 9f e6 98 4e c1 fb 39 fb bc cc 1c b7 3f d3 230s | K extracted len 16 bytes at 0xae2ce48aed10 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K1 230s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2e00 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b3ba0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2dc8 230s | Computing E[2] using K3 230s | XCBC: K3 230s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 230s | XCBC: E[n-1] 230s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 230s | XCBC: M[n] 230s | 10 11 12 13 .... 230s | XCBC: M[n] 230s | 10 11 12 13 .... 230s | XCBC: M[n]:80...^E[n-1]^K3 230s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 230s | XCBC: MAC 230s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2ed0 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b3ba0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e98 230s | PRF symkey interface PRF AES_XCBC final-key@0xae2ce48b22e0 (size 16) 230s | PRF symkey interface: key-key@0xae2ce48b22e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | output: symkey-key@0xae2ce48b22e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracting all 16 bytes of key@0xae2ce48b22e0 230s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): symkey-key@0xae2ce48b22e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 16 230s | wrapper: siBuffer: c1 36 b9 5c 21 e3 b0 0d 23 49 ca 36 c6 0c f1 52 230s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracted len 16 bytes at 0xae2ce48aed10 230s | unwrapped: 230s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 230s | verify_chunk_data: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): ok 230s | test_prf_vector: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) passed 230s algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 230s | decode_to_chunk: test_prf_vector: input "0x00010203040506070809" 230s | decode_to_chunk: output: 230s | 00 01 02 03 04 05 06 07 08 09 .......... 230s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 230s | decode_to_chunk: output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 .... 230s | decode_to_chunk: test_prf_vector: input "0x0fa087af7d866e7653434e602fdde835" 230s | decode_to_chunk: output: 230s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 230s | PRF chunk interface PRF AES_XCBC init key-chunk@0xae2ce48adca0 (length 10) 230s | 00 01 02 03 04 05 06 07 08 09 .......... 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2eb0 230s | key-offset: 0, key-size: 10 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 10-bytes 230s | base: base-key@0xae2ce48adab0 (26-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e78 230s | XCBC: Key 10<16 too small, padding with zeros 230s | CONCATENATE_BASE_AND_DATA: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48b22e0 (10-bytes, EXTRACT_KEY_FROM_KEY) 230s | params: 16-bytes@0xffffd39f2e00 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48adab0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e08 230s | PRF chunk interface PRF AES_XCBC 0xae2ce48aec80 230s | PRF chunk interface PRF AES_XCBC update message (0xae2ce48ad9f0 length 20) 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 .... 230s | XCBC: data 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 .... 230s | K extracting all 16 bytes of key@0xae2ce48ac040 230s | K: symkey-key@0xae2ce48ac040 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)623191333: 14 90 2e 4c b9 c7 05 fe 55 18 db 8d 83 fe 70 b2 230s | K extracted len 16 bytes at 0xae2ce48ad870 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 230s | XCBC: K: 230s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 230s | XCBC: K1 230s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2da0 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48adab0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2d68 230s | Computing E[2] using K3 230s | XCBC: K3 230s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 230s | XCBC: E[n-1] 230s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 230s | XCBC: M[n] 230s | 10 11 12 13 .... 230s | XCBC: M[n] 230s | 10 11 12 13 .... 230s | XCBC: M[n]:80...^E[n-1]^K3 230s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 230s | XCBC: MAC 230s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 230s | PRF chunk interface PRF AES_XCBC final length 16 230s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 230s | chunk output 230s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 230s | verify_chunk_data: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): ok 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2f40 230s | key-offset: 0, key-size: 10 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 10-bytes 230s | base: base-key@0xae2ce48b22e0 (26-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f08 230s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xae2ce48ac040 (size 10) 230s | PRF symkey interface: key symkey-key@0xae2ce48ac040 (10-bytes, EXTRACT_KEY_FROM_KEY) 230s | XCBC: Key 10<16 too small, padding with zeros 230s | CONCATENATE_BASE_AND_DATA: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48ac040 (10-bytes, EXTRACT_KEY_FROM_KEY) 230s | params: 16-bytes@0xffffd39f2e40 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b22e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e48 230s | PRF symkey interface PRF AES_XCBC 0xae2ce48aec80 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2f40 230s | key-offset: 0, key-size: 20 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 20-bytes 230s | base: base-key@0xae2ce48b09e0 (36-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f08 230s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xae2ce48b22e0 (size 20) 230s | PRF symkey interface: symkey message-key@0xae2ce48b22e0 (20-bytes, EXTRACT_KEY_FROM_KEY) 230s | symkey message extracting all 20 bytes of key@0xae2ce48b22e0 230s | symkey message: symkey-key@0xae2ce48b22e0 (20-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 32 230s | wrapper: siBuffer: f1 61 9f e6 98 4e c1 fb 39 fb bc cc 1c b7 3f d3 d4 b4 bf c6 63 0f 3f 41 88 3f 6e 79 ee fa 7e 6d 230s | symkey message extracted len 32 bytes at 0xae2ce48b0700 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | XCBC: data 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 .... 230s | K extracting all 16 bytes of key@0xae2ce48adab0 230s | K: symkey-key@0xae2ce48adab0 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)2097152: 14 90 2e 4c b9 c7 05 fe 55 18 db 8d 83 fe 70 b2 230s | K extracted len 16 bytes at 0xae2ce48aed10 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 230s | XCBC: K: 230s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 230s | XCBC: K1 230s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2e00 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b3ba0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2dc8 230s | Computing E[2] using K3 230s | XCBC: K3 230s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 230s | XCBC: E[n-1] 230s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 230s | XCBC: M[n] 230s | 10 11 12 13 .... 230s | XCBC: M[n] 230s | 10 11 12 13 .... 230s | XCBC: M[n]:80...^E[n-1]^K3 230s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 230s | XCBC: MAC 230s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2ed0 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b3ba0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e98 230s | PRF symkey interface PRF AES_XCBC final-key@0xae2ce48b09e0 (size 16) 230s | PRF symkey interface: key-key@0xae2ce48b09e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | output: symkey-key@0xae2ce48b09e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracting all 16 bytes of key@0xae2ce48b09e0 230s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): symkey-key@0xae2ce48b09e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 16 230s | wrapper: siBuffer: 5c 4a a9 3f 41 d1 76 d4 98 89 6d 1a b6 78 d4 94 230s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracted len 16 bytes at 0xae2ce48aed10 230s | unwrapped: 230s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 230s | verify_chunk_data: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): ok 230s | test_prf_vector: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) passed 230s algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 230s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0fedcb" 230s | decode_to_chunk: output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | ed cb .. 230s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 230s | decode_to_chunk: output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 .... 230s | decode_to_chunk: test_prf_vector: input "0x8cd3c93ae598a9803006ffb67c40e9e4" 230s | decode_to_chunk: output: 230s | 8c d3 c9 3a e5 98 a9 80 30 06 ff b6 7c 40 e9 e4 ...:....0...|@.. 230s | PRF chunk interface PRF AES_XCBC init key-chunk@0xae2ce48ad9d0 (length 18) 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | ed cb .. 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2eb0 230s | key-offset: 0, key-size: 18 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 18-bytes 230s | base: base-key@0xae2ce48ac040 (34-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e78 230s | XCBC: Key 18>16 too big, rehashing to size 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2df0 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b22e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2db8 230s | draft_chunk extracting all 18 bytes of key@0xae2ce48b09e0 230s | draft_chunk: symkey-key@0xae2ce48b09e0 (18-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 32 230s | wrapper: (SECItemType)34: f1 61 9f e6 98 4e c1 fb 39 fb bc cc 1c b7 3f d3 4b 5b cc 5f ce 5f 86 fd 16 42 2e 31 7e 6d 9a 7c 230s | draft_chunk extracted len 32 bytes at 0xae2ce48aed10 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | XCBC: data 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | ed cb .. 230s | K extracting all 16 bytes of key@0xae2ce48ac040 230s | K: symkey-key@0xae2ce48ac040 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)774778414: 7f 39 50 9b 43 1d aa a9 44 3f 4c 81 dd da e7 60 230s | K extracted len 16 bytes at 0xae2ce48aec80 230s | unwrapped: 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | XCBC: K: 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | XCBC: K1 230s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2d30 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48adab0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2cf8 230s | Computing E[2] using K3 230s | XCBC: K3 230s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 230s | XCBC: E[n-1] 230s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 230s | XCBC: M[n] 230s | ed cb .. 230s | XCBC: M[n] 230s | ed cb .. 230s | XCBC: M[n]:80...^E[n-1]^K3 230s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.16 too big, rehashing to size 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2e30 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48ac040 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2df8 230s | draft_chunk extracting all 18 bytes of key@0xae2ce48b22e0 230s | draft_chunk: symkey-key@0xae2ce48b22e0 (18-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 32 230s | wrapper: (SECItemType)-744543488: f1 61 9f e6 98 4e c1 fb 39 fb bc cc 1c b7 3f d3 4b 5b cc 5f ce 5f 86 fd 16 42 2e 31 7e 6d 9a 7c 230s | draft_chunk extracted len 32 bytes at 0xae2ce48aec80 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | XCBC: data 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | ed cb .. 230s | K extracting all 16 bytes of key@0xae2ce48b09e0 230s | K: symkey-key@0xae2ce48b09e0 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)774778414: 7f 39 50 9b 43 1d aa a9 44 3f 4c 81 dd da e7 60 230s | K extracted len 16 bytes at 0xae2ce48aed10 230s | unwrapped: 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | XCBC: K: 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | XCBC: K1 230s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2d70 230s initializing NSS db 230s running pluto selftest 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48adab0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2d38 230s | Computing E[2] using K3 230s | XCBC: K3 230s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 230s | XCBC: E[n-1] 230s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 230s | XCBC: M[n] 230s | ed cb .. 230s | XCBC: M[n] 230s | ed cb .. 230s | XCBC: M[n]:80...^E[n-1]^K3 230s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.j.....n1.].8 230s | PRF chunk interface PRF HMAC_MD5 init key-chunk@0xae2ce48ac020 (length 4) 230s | 4a 65 66 65 Jefe 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2e90 230s | key-offset: 0, key-size: 4 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 4-bytes 230s | base: base-key@0xae2ce48ac040 (20-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e58 230s | CONCATENATE_BASE_AND_DATA: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48b22e0 (4-bytes, EXTRACT_KEY_FROM_KEY) 230s | params: 16-bytes@0xffffd39f2dd0 230s | XOR_BASE_AND_DATA: 230s | target: CONCATENATE_BASE_AND_DATA 230s | base: base-key@0xae2ce48ac040 (64-bytes, EXTRACT_KEY_FROM_KEY) 230s | params: 16-bytes@0xffffd39f2e10 230s | PRF chunk interface PRF HMAC_MD5 0xae2ce48aed10 230s | PRF chunk interface PRF HMAC_MD5 update message (0xae2ce48aec80 length 28) 230s | 77 68 61 74 20 64 6f 20 79 61 20 77 61 6e 74 20 what do ya want 230s | 66 6f 72 20 6e 6f 74 68 69 6e 67 3f for nothing? 230s | CONCATENATE_BASE_AND_DATA: 230s | target: CONCATENATE_BASE_AND_DATA 230s | base: base-key@0xae2ce48b22e0 (64-bytes, CONCATENATE_BASE_AND_DATA) 230s | params: 16-bytes@0xffffd39f2f40 230s | PRF HMAC inner hash hash MD5 inner-key@0xae2ce48b09e0 (size 92) 230s | PRF HMAC inner hash hash MD5 init 230s | PRF HMAC inner hash hash MD5 digest inner-key@0xae2ce48b09e0 (size 92) 230s | PRF HMAC inner hash: inner-key@0xae2ce48b09e0 (92-bytes, CONCATENATE_BASE_AND_DATA) 230s | PRF HMAC inner hash hash MD5 final length 16 230s | c3 db 14 c0 65 f5 52 03 b0 33 c8 1a 69 7b 97 c5 ....e.R..3..i{.. 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2d10 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b7d30 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2cd8 230s | XOR_BASE_AND_DATA: 230s | target: CONCATENATE_BASE_AND_DATA 230s | base: base-key@0xae2ce48ac040 (64-bytes, EXTRACT_KEY_FROM_KEY) 230s | params: 16-bytes@0xffffd39f2df0 230s | CONCATENATE_BASE_AND_KEY: 230s | target: CONCATENATE_BASE_AND_DATA 230s | base: base-key@0xae2ce48b09e0 (64-bytes, CONCATENATE_BASE_AND_DATA) 230s | params: 8-bytes@0xffffd39f2dc8 230s | PRF HMAC outer hash hash MD5 init 230s | PRF HMAC outer hash hash MD5 digest outer-key@0xae2ce48b7d30 (size 80) 230s | PRF HMAC outer hash: outer-key@0xae2ce48b7d30 (80-bytes, CONCATENATE_BASE_AND_DATA) 230s | PRF HMAC outer hash hash MD5 final bytes@0xffffd39f2f48 (length 16) 230s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 230s | PRF chunk interface PRF HMAC_MD5 final length 16 230s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 230s | chunk output 230s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 230s | verify_chunk_data: RFC 2104: MD5_HMAC test 2: ok 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2f40 230s | key-offset: 0, key-size: 4 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 4-bytes 230s | base: base-key@0xae2ce48ac040 (20-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f08 230s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0xae2ce48b7d30 (size 4) 230s | PRF symkey interface: key symkey-key@0xae2ce48b7d30 (4-bytes, EXTRACT_KEY_FROM_KEY) 230s | CONCATENATE_BASE_AND_DATA: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48b7d30 (4-bytes, EXTRACT_KEY_FROM_KEY) 230s | params: 16-bytes@0xffffd39f2de0 230s | XOR_BASE_AND_DATA: 230s | target: CONCATENATE_BASE_AND_DATA 230s | base: base-key@0xae2ce48ac040 (64-bytes, EXTRACT_KEY_FROM_KEY) 230s | params: 16-bytes@0xffffd39f2e20 230s | PRF symkey interface PRF HMAC_MD5 0xae2ce48aed10 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2f40 230s | key-offset: 0, key-size: 28 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 28-bytes 230s | base: base-key@0xae2ce48adab0 (44-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f08 230s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0xae2ce48b09e0 (size 28) 230s | PRF symkey interface: symkey message-key@0xae2ce48b09e0 (28-bytes, EXTRACT_KEY_FROM_KEY) 230s | CONCATENATE_BASE_AND_KEY: 230s | target: CONCATENATE_BASE_AND_DATA 230s | base: base-key@0xae2ce48b22e0 (64-bytes, CONCATENATE_BASE_AND_DATA) 230s | params: 8-bytes@0xffffd39f2f58 230s | PRF HMAC inner hash hash MD5 inner-key@0xae2ce48adab0 (size 92) 230s | PRF HMAC inner hash hash MD5 init 230s | PRF HMAC inner hash hash MD5 digest inner-key@0xae2ce48adab0 (size 92) 230s | PRF HMAC inner hash: inner-key@0xae2ce48adab0 (92-bytes, CONCATENATE_BASE_AND_DATA) 230s | PRF HMAC inner hash hash MD5 final length 16 230s | c3 db 14 c0 65 f5 52 03 b0 33 c8 1a 69 7b 97 c5 ....e.R..3..i{.. 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2d80 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b3ba0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2d48 230s | XOR_BASE_AND_DATA: 230s | target: CONCATENATE_BASE_AND_DATA 230s | base: base-key@0xae2ce48ac040 (64-bytes, EXTRACT_KEY_FROM_KEY) 230s | params: 16-bytes@0xffffd39f2e60 230s | CONCATENATE_BASE_AND_KEY: 230s | target: CONCATENATE_BASE_AND_DATA 230s | base: base-key@0xae2ce48adab0 (64-bytes, CONCATENATE_BASE_AND_DATA) 230s | params: 8-bytes@0xffffd39f2e38 230s | PRF HMAC outer hash hash MD5 outer-key@0xae2ce48b3ba0 (size 80) 230s | PRF HMAC outer hash hash MD5 init 230s | PRF HMAC outer hash hash MD5 digest outer-key@0xae2ce48b3ba0 (size 80) 230s | PRF HMAC outer hash: outer-key@0xae2ce48b3ba0 (80-bytes, CONCATENATE_BASE_AND_DATA) 230s | PRF HMAC outer hash hash MD5 final length 16 230s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2e40 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b22e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e08 230s | : hashed-outer-key@0xae2ce48ac040 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | PRF symkey interface PRF HMAC_MD5 final-key@0xae2ce48ac040 (size 16) 230s | PRF symkey interface: key-key@0xae2ce48ac040 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | output: symkey-key@0xae2ce48ac040 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | RFC 2104: MD5_HMAC test 2 extracting all 16 bytes of key@0xae2ce48ac040 230s | RFC 2104: MD5_HMAC test 2: symkey-key@0xae2ce48ac040 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 16 230s | wrapper: siBuffer: 65 a9 47 93 55 2d d5 bc 82 01 23 e3 63 65 93 ac 230s | RFC 2104: MD5_HMAC test 2 extracted len 16 bytes at 0xae2ce48aed10 230s | unwrapped: 230s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 230s | verify_chunk_data: RFC 2104: MD5_HMAC test 2: ok 230s | test_prf_vector: RFC 2104: MD5_HMAC test 2 passed 230s algparse: RFC 2104: MD5_HMAC test 3 230s | decode_to_chunk: test_prf_vector: input "0xAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" 230s | decode_to_chunk: output: 230s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 230s | decode_to_chunk: test_prf_vector: input "0xDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD" 230s | decode_to_chunk: output: 230s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 230s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 230s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 230s | dd dd .. 230s | decode_to_chunk: test_prf_vector: input "0x56be34521d144c88dbb8c733f0e8b3f6" 230s | decode_to_chunk: output: 230s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 230s | PRF chunk interface PRF HMAC_MD5 init key-chunk@0xae2ce48b0b30 (length 16) 230s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2e90 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b7d30 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e58 230s | CONCATENATE_BASE_AND_DATA: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48ac040 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | params: 16-bytes@0xffffd39f2dd0 230s | XOR_BASE_AND_DATA: 230s | target: CONCATENATE_BASE_AND_DATA 230s | base: base-key@0xae2ce48b7d30 (64-bytes, EXTRACT_KEY_FROM_KEY) 230s | params: 16-bytes@0xffffd39f2e10 230s | PRF chunk interface PRF HMAC_MD5 0xae2ce48aec80 230s | PRF chunk interface PRF HMAC_MD5 update message (0xae2ce48ad9d0 length 50) 230s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 230s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 230s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 230s | dd dd .. 230s | CONCATENATE_BASE_AND_DATA: 230s | target: CONCATENATE_BASE_AND_DATA 230s | base: base-key@0xae2ce48ac040 (64-bytes, CONCATENATE_BASE_AND_DATA) 230s | params: 16-bytes@0xffffd39f2f40 230s | PRF HMAC inner hash hash MD5 inner-key@0xae2ce48b09e0 (size 114) 230s | PRF HMAC inner hash hash MD5 init 230s | PRF HMAC inner hash hash MD5 digest inner-key@0xae2ce48b09e0 (size 114) 230s | PRF HMAC inner hash: inner-key@0xae2ce48b09e0 (114-bytes, CONCATENATE_BASE_AND_DATA) 230s | PRF HMAC inner hash hash MD5 final length 16 230s | 82 0a 6b 33 5d 18 7b 90 dc ba b1 7e f5 b4 26 ff ..k3].{....~..&. 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2d10 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b3ba0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2cd8 230s | XOR_BASE_AND_DATA: 230s | target: CONCATENATE_BASE_AND_DATA 230s | base: base-key@0xae2ce48b7d30 (64-bytes, EXTRACT_KEY_FROM_KEY) 230s | params: 16-bytes@0xffffd39f2df0 230s | CONCATENATE_BASE_AND_KEY: 230s | target: CONCATENATE_BASE_AND_DATA 230s | base: base-key@0xae2ce48b09e0 (64-bytes, CONCATENATE_BASE_AND_DATA) 230s | params: 8-bytes@0xffffd39f2dc8 230s | PRF HMAC outer hash hash MD5 init 230s | PRF HMAC outer hash hash MD5 digest outer-key@0xae2ce48b3ba0 (size 80) 230s | PRF HMAC outer hash: outer-key@0xae2ce48b3ba0 (80-bytes, CONCATENATE_BASE_AND_DATA) 230s | PRF HMAC outer hash hash MD5 final bytes@0xffffd39f2f48 (length 16) 230s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 230s | PRF chunk interface PRF HMAC_MD5 final length 16 230s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 230s | chunk output 230s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 230s | verify_chunk_data: RFC 2104: MD5_HMAC test 3: ok 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2f40 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48b7d30 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f08 230s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0xae2ce48b3ba0 (size 16) 230s | PRF symkey interface: key symkey-key@0xae2ce48b3ba0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | CONCATENATE_BASE_AND_DATA: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48b3ba0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | params: 16-bytes@0xffffd39f2de0 230s | XOR_BASE_AND_DATA: 230s | target: CONCATENATE_BASE_AND_DATA 230s | base: base-key@0xae2ce48b7d30 (64-bytes, EXTRACT_KEY_FROM_KEY) 230s | params: 16-bytes@0xffffd39f2e20 230s | PRF symkey interface PRF HMAC_MD5 0xae2ce48aec80 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2f40 230s | key-offset: 0, key-size: 50 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 50-bytes 230s | base: base-key@0xae2ce48b22e0 (66-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f08 230s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0xae2ce48b09e0 (size 50) 230s | PRF symkey interface: symkey message-key@0xae2ce48b09e0 (50-bytes, EXTRACT_KEY_FROM_KEY) 230s | CONCATENATE_BASE_AND_KEY: 230s | target: CONCATENATE_BASE_AND_DATA 230s | base: base-key@0xae2ce48ac040 (64-bytes, CONCATENATE_BASE_AND_DATA) 230s | params: 8-bytes@0xffffd39f2f58 230s | PRF HMAC inner hash hash MD5 inner-key@0xae2ce48b22e0 (size 114) 230s | PRF HMAC inner hash hash MD5 init 230s | PRF HMAC inner hash hash MD5 digest inner-key@0xae2ce48b22e0 (size 114) 230s | PRF HMAC inner hash: inner-key@0xae2ce48b22e0 (114-bytes, CONCATENATE_BASE_AND_DATA) 230s | PRF HMAC inner hash hash MD5 final length 16 230s | 82 0a 6b 33 5d 18 7b 90 dc ba b1 7e f5 b4 26 ff ..k3].{....~..&. 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2d80 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48adab0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2d48 230s | XOR_BASE_AND_DATA: 230s | target: CONCATENATE_BASE_AND_DATA 230s | base: base-key@0xae2ce48b7d30 (64-bytes, EXTRACT_KEY_FROM_KEY) 230s | params: 16-bytes@0xffffd39f2e60 230s | CONCATENATE_BASE_AND_KEY: 230s | target: CONCATENATE_BASE_AND_DATA 230s | base: base-key@0xae2ce48b22e0 (64-bytes, CONCATENATE_BASE_AND_DATA) 230s | params: 8-bytes@0xffffd39f2e38 230s | PRF HMAC outer hash hash MD5 outer-key@0xae2ce48adab0 (size 80) 230s | PRF HMAC outer hash hash MD5 init 230s | PRF HMAC outer hash hash MD5 digest outer-key@0xae2ce48adab0 (size 80) 230s | PRF HMAC outer hash: outer-key@0xae2ce48adab0 (80-bytes, CONCATENATE_BASE_AND_DATA) 230s | PRF HMAC outer hash hash MD5 final length 16 230s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2e40 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0xae2ce48ac040 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2e08 230s | : hashed-outer-key@0xae2ce48b7d30 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | PRF symkey interface PRF HMAC_MD5 final-key@0xae2ce48b7d30 (size 16) 230s | PRF symkey interface: key-key@0xae2ce48b7d30 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | output: symkey-key@0xae2ce48b7d30 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | RFC 2104: MD5_HMAC test 3 extracting all 16 bytes of key@0xae2ce48b7d30 230s | RFC 2104: MD5_HMAC test 3: symkey-key@0xae2ce48b7d30 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 16 230s | wrapper: siBuffer: d2 2f 0c 14 b2 d3 a7 3b 35 0c b1 b2 15 c3 ca 63 230s | RFC 2104: MD5_HMAC test 3 extracted len 16 bytes at 0xae2ce48b0920 230s | unwrapped: 230s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 230s | verify_chunk_data: RFC 2104: MD5_HMAC test 3: ok 230s | test_prf_vector: RFC 2104: MD5_HMAC test 3 passed 230s algparse: testing HMAC_SHA1: 230s algparse: CAVP: IKEv2 key derivation with HMAC-SHA1 230s | decode_to_chunk: test_kdf_vector: input "0x32b50d5f4a3763f3" 230s | decode_to_chunk: output: 230s | 32 b5 0d 5f 4a 37 63 f3 2.._J7c. 230s | decode_to_chunk: test_kdf_vector: input "0x9206a04b26564cb1" 230s | decode_to_chunk: output: 230s | 92 06 a0 4b 26 56 4c b1 ...K&VL. 230s | decode_to_chunk: test_kdf_vector: input "0x34c9e7c188868785" 230s | decode_to_chunk: output: 230s | 34 c9 e7 c1 88 86 87 85 4....... 230s | decode_to_chunk: test_kdf_vector: input "0x3ff77d760d2b2199" 230s | decode_to_chunk: output: 230s | 3f f7 7d 76 0d 2b 21 99 ?.}v.+!. 230s | decode_to_chunk: test_kdf_vector: input "0x4b2c1f971981a8ad8d0abeafabf38cf75fc8349c148142465ed9c8b516b8be52" 230s | decode_to_chunk: output: 230s | 4b 2c 1f 97 19 81 a8 ad 8d 0a be af ab f3 8c f7 K,.............. 230s | 5f c8 34 9c 14 81 42 46 5e d9 c8 b5 16 b8 be 52 _.4...BF^......R 230s | decode_to_chunk: test_kdf_vector: input "0x863f3c9d06efd39d2b907b97f8699e5dd5251ef64a2a176f36ee40c87d4f9330" 230s | decode_to_chunk: output: 230s | 86 3f 3c 9d 06 ef d3 9d 2b 90 7b 97 f8 69 9e 5d .?<.....+.{..i.] 230s | d5 25 1e f6 4a 2a 17 6f 36 ee 40 c8 7d 4f 93 30 .%..J*.o6.@.}O.0 230s | decode_to_chunk: test_kdf_vector: input "0xa9a7b222b59f8f48645f28a1db5b5f5d7479cba7" 230s | decode_to_chunk: output: 230s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 230s | 74 79 cb a7 ty.. 230s | decode_to_chunk: test_kdf_vector: input "0x63e81194946ebd05df7df5ebf5d8750056bf1f1d" 230s | decode_to_chunk: output: 230s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 230s | 56 bf 1f 1d V... 230s | decode_to_chunk: test_kdf_vector: input "0xa14293677cc80ff8f9cc0eee30d895da9d8f405666e30ef0dfcb63c634a46002a2a63080e514a062768b76606f9fa5e992204fc5a670bde3f10d6b027113936a5c55b648a194ae587b0088d52204b702c979fa280870d2ed41efa9c549fd11198af1670b143d384bd275c5f594cf266b05ebadca855e4249520a441a81157435a7a56cc4" 230s | decode_to_chunk: output: 230s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 230s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 230s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 230s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 230s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 230s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 230s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 230s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 230s | a7 a5 6c c4 ..l. 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2f40 230s | key-offset: 0, key-size: 32 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 32-bytes 230s | base: base-key@0xae2ce48b3ba0 (48-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f08 230s | NSS_IKE_PRF_DERIVE: 230s | target: NSS_IKE_PRF_PLUS_DERIVE 230s | base: base-key@0xae2ce48b7d30 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | params: 56-bytes@0xffffd39f2f70 230s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0xae2ce48b3ba0 230s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0xae2ce48b3ba0 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 230s | sizeof bytes 32 230s | wrapper: (SECItemType)35: 3a 5f 44 99 7b f0 92 4c 70 3e e8 3e dc e2 fa 79 19 f6 1f c1 cb 42 61 50 49 f4 f8 17 7e 91 68 c1 230s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0xae2ce48af490 230s | unwrapped: 230s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 230s | 74 79 cb a7 00 00 00 00 00 00 00 00 00 00 00 00 ty.............. 230s | verify_chunk_data: CAVP: IKEv2 key derivation with HMAC-SHA1: ok 230s | NSS_IKE_PRF_PLUS_DERIVE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 132-bytes 230s | base: base-key@0xae2ce48b3ba0 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 230s | params: 40-bytes@0xffffd39f2ec0 230s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 132 bytes of key@0xae2ce48b09e0 230s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0xae2ce48b09e0 (132-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 144 230s | wrapper: (SECItemType)35: 4e dc 27 43 c0 9d fe 00 03 ab bf ad f8 02 cc 1b df 7e 6c 90 f5 6e d1 70 75 e2 a0 0e 3b ba 19 ec db 62 42 cb ef 54 7f 85 41 0b 14 2c 86 6d cb 23 51 8d 07 24 ec 6f bc 0f df 93 18 1b 68 95 c7 3f ff 17 b4 31 66 37 d6 59 95 d3 68 f7 a0 2b a1 a4 02 4d 98 09 bb ba 40 11 d4 b9 29 9f 38 ae 00 3c e9 58 54 0d c1 3d 07 f9 df 9d 2b b6 94 5a 78 0e 09 d8 94 d7 3d 4f ca ee b6 64 1f 8c 52 fc 41 19 ca 26 d4 d0 2b d0 65 48 8c 5f 3f 74 cf e5 69 63 230s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 144 bytes at 0xae2ce48af6b0 230s | unwrapped: 230s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 230s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 230s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 230s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 230s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 230s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 230s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 230s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 230s | a7 a5 6c c4 00 00 00 00 00 00 00 00 00 00 00 00 ..l............. 230s | verify_chunk_data: CAVP: IKEv2 key derivation with HMAC-SHA1: ok 230s | key-offset: 0, key-size: 20 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 20-bytes 230s | base: base-key@0xae2ce48b09e0 (132-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f58 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0xae2ce48aa800 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0xffffd39f2f40 230s | key-offset: 0, key-size: 32 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 32-bytes 230s | base: base-key@0xae2ce48b22e0 (48-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0xffffd39f2f08 230s | NSS_IKE_PRF_DERIVE: 230s | target: NSS_IKE_PRF_PLUS_DERIVE 230s | base: base-key@0xae2ce48adab0 (20-bytes, EXTRACT_KEY_FROM_KEY) 230s | params: 56-bytes@0xffffd39f2f60 230s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0xae2ce48b22e0 230s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0xae2ce48b22e0 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 230s | sizeof bytes 32 230s | wrapper: (SECItemType)-785201264: 3a c5 40 d1 8e 44 5f 48 e6 2c 31 05 5a 74 d5 67 32 a7 0c 94 68 79 ed 5c f1 69 54 f4 51 16 b2 54 230s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0xae2ce48afd50 230s | unwrapped: 230s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 230s | 56 bf 1f 1d 00 00 00 00 00 00 00 00 00 00 00 00 V............... 230s | verify_chunk_data: CAVP: IKEv2 key derivation with HMAC-SHA1: ok 230s | test_kdf_vector: CAVP: IKEv2 key derivation with HMAC-SHA1 passed 230s algparse: leak detective found no leaks 230s /usr/libexec/ipsec/pluto: adjusting nssdir to /tmp/tmp.hWVcT0Kmi2 230s /usr/libexec/ipsec/pluto: selftest: skipping lock 230s /usr/libexec/ipsec/pluto: selftest: skipping control socket 230s /usr/libexec/ipsec/pluto: selftest: skipping fork 230s Initializing NSS using read-write database "sql:/tmp/tmp.hWVcT0Kmi2" 230s FIPS Mode: NO 230s NSS crypto library initialized 230s FIPS mode disabled for pluto daemon 230s FIPS HMAC integrity support [disabled] 230s libcap-ng capng_apply failed to apply changes, err=-5. see: man capng_apply 230s libcap-ng support [enabled] 230s Linux audit support [enabled] 230s Starting Pluto (Libreswan Version 4.14 IKEv2 IKEv1 XFRM XFRMI esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) (NSS-KDF) DNSSEC SYSTEMD_WATCHDOG LABELED_IPSEC (SELINUX) LIBCAP_NG LINUX_AUDIT AUTH_PAM NETWORKMANAGER CURL(non-NSS) LDAP(non-NSS)) pid:2143 230s core dump dir: /run/pluto 230s secrets file: /etc/ipsec.secrets 230s leak-detective disabled 230s NSS crypto [enabled] 230s XAUTH PAM support [enabled] 230s initializing libevent in pthreads mode: headers: 2.1.12-stable (2010c00); library: 2.1.12-stable (2010c00) 230s NAT-Traversal support [enabled] 230s Encryption algorithms: 230s AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 230s AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 230s AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 230s 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 230s CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 230s CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 230s AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm, aes_gcm_c 230s AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_b 230s AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_a 230s AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 230s AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 230s NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 230s NULL [] IKEv1: ESP IKEv2: ESP 230s CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 230s Hash algorithms: 230s MD5 IKEv1: IKE IKEv2: NSS 230s SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 230s SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 230s SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 230s SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 230s IDENTITY IKEv1: IKEv2: FIPS 230s PRF algorithms: 230s HMAC_MD5 IKEv1: IKE IKEv2: IKE native(HMAC) md5 230s HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 230s HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 230s HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 230s HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 230s AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 230s Integrity algorithms: 230s HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH native(HMAC) md5, hmac_md5 230s HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 230s HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 230s HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 230s HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 230s HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 230s AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 230s AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 230s NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 230s DH algorithms: 230s NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 230s MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 230s MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 230s MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 230s MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 230s MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 230s MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 230s DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 230s DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 230s DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 230s DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 230s IPCOMP algorithms: 230s DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 230s LZS IKEv1: IKEv2: ESP AH FIPS 230s LZJH IKEv1: IKEv2: ESP AH FIPS 230s testing CAMELLIA_CBC: 230s Camellia: 16 bytes with 128-bit key 230s Camellia: 16 bytes with 128-bit key 230s Camellia: 16 bytes with 256-bit key 230s Camellia: 16 bytes with 256-bit key 230s testing AES_GCM_16: 230s empty string 230s one block 230s two blocks 230s two blocks with associated data 230s testing AES_CTR: 230s Encrypting 16 octets using AES-CTR with 128-bit key 230s Encrypting 32 octets using AES-CTR with 128-bit key 230s Encrypting 36 octets using AES-CTR with 128-bit key 230s Encrypting 16 octets using AES-CTR with 192-bit key 230s Encrypting 32 octets using AES-CTR with 192-bit key 230s Encrypting 36 octets using AES-CTR with 192-bit key 230s Encrypting 16 octets using AES-CTR with 256-bit key 230s Encrypting 32 octets using AES-CTR with 256-bit key 230s Encrypting 36 octets using AES-CTR with 256-bit key 230s testing AES_CBC: 230s Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 230s Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 230s Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 230s Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 230s testing AES_XCBC: 230s RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 230s RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 230s RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 230s RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 230s RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 230s RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 230s RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 230s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 230s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 230s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 230s testing HMAC_MD5: 230s RFC 2104: MD5_HMAC test 1 230s RFC 2104: MD5_HMAC test 2 230s RFC 2104: MD5_HMAC test 3 230s testing HMAC_SHA1: 230s CAVP: IKEv2 key derivation with HMAC-SHA1 230s selftest: exiting pluto 230s autopkgtest [19:39:40]: test cryptocheck: -----------------------] 231s autopkgtest [19:39:41]: test cryptocheck: - - - - - - - - - - results - - - - - - - - - - 231s cryptocheck PASS 231s autopkgtest [19:39:41]: test cavp: preparing testbed 308s autopkgtest [19:40:58]: testbed dpkg architecture: arm64 308s autopkgtest [19:40:58]: testbed apt version: 2.9.8 308s autopkgtest [19:40:58]: @@@@@@@@@@@@@@@@@@@@ test bed setup 309s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease [73.9 kB] 309s Get:2 http://ftpmaster.internal/ubuntu plucky-proposed/main Sources [91.9 kB] 310s Get:3 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse Sources [15.5 kB] 310s Get:4 http://ftpmaster.internal/ubuntu plucky-proposed/universe Sources [1054 kB] 310s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/restricted Sources [7016 B] 310s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/main arm64 Packages [169 kB] 310s Get:7 http://ftpmaster.internal/ubuntu plucky-proposed/restricted arm64 Packages [50.3 kB] 310s Get:8 http://ftpmaster.internal/ubuntu plucky-proposed/universe arm64 Packages [797 kB] 310s Get:9 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse arm64 Packages [6404 B] 310s Fetched 2265 kB in 1s (2470 kB/s) 310s Reading package lists... 313s Reading package lists... 313s Building dependency tree... 313s Reading state information... 314s Calculating upgrade... 314s The following NEW packages will be installed: 314s libassuan9 314s The following packages will be upgraded: 314s libaudit-common libaudit1 libgpgme11t64 libseccomp2 python3-cffi-backend 314s python3-markupsafe 315s 6 upgraded, 1 newly installed, 0 to remove and 0 not upgraded. 315s Need to get 397 kB of archives. 315s After this operation, 447 kB of additional disk space will be used. 315s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed/main arm64 libaudit-common all 1:4.0.2-2ubuntu1 [6578 B] 315s Get:2 http://ftpmaster.internal/ubuntu plucky-proposed/main arm64 libaudit1 arm64 1:4.0.2-2ubuntu1 [54.2 kB] 315s Get:3 http://ftpmaster.internal/ubuntu plucky/main arm64 libseccomp2 arm64 2.5.5-1ubuntu5 [51.4 kB] 315s Get:4 http://ftpmaster.internal/ubuntu plucky/main arm64 python3-cffi-backend arm64 1.17.1-2build1 [89.9 kB] 315s Get:5 http://ftpmaster.internal/ubuntu plucky/main arm64 libassuan9 arm64 3.0.1-2 [40.6 kB] 315s Get:6 http://ftpmaster.internal/ubuntu plucky/main arm64 libgpgme11t64 arm64 1.24.0-2ubuntu1 [142 kB] 315s Get:7 http://ftpmaster.internal/ubuntu plucky/main arm64 python3-markupsafe arm64 2.1.5-1build3 [13.0 kB] 315s Fetched 397 kB in 0s (819 kB/s) 316s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 79957 files and directories currently installed.) 316s Preparing to unpack .../libaudit-common_1%3a4.0.2-2ubuntu1_all.deb ... 316s Unpacking libaudit-common (1:4.0.2-2ubuntu1) over (1:4.0.1-1ubuntu2) ... 316s Setting up libaudit-common (1:4.0.2-2ubuntu1) ... 316s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 79957 files and directories currently installed.) 316s Preparing to unpack .../libaudit1_1%3a4.0.2-2ubuntu1_arm64.deb ... 316s Unpacking libaudit1:arm64 (1:4.0.2-2ubuntu1) over (1:4.0.1-1ubuntu2) ... 316s Setting up libaudit1:arm64 (1:4.0.2-2ubuntu1) ... 316s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 79957 files and directories currently installed.) 316s Preparing to unpack .../libseccomp2_2.5.5-1ubuntu5_arm64.deb ... 316s Unpacking libseccomp2:arm64 (2.5.5-1ubuntu5) over (2.5.5-1ubuntu4) ... 316s Setting up libseccomp2:arm64 (2.5.5-1ubuntu5) ... 316s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 79957 files and directories currently installed.) 316s Preparing to unpack .../python3-cffi-backend_1.17.1-2build1_arm64.deb ... 316s Unpacking python3-cffi-backend:arm64 (1.17.1-2build1) over (1.17.1-2) ... 316s Selecting previously unselected package libassuan9:arm64. 316s Preparing to unpack .../libassuan9_3.0.1-2_arm64.deb ... 316s Unpacking libassuan9:arm64 (3.0.1-2) ... 316s Preparing to unpack .../libgpgme11t64_1.24.0-2ubuntu1_arm64.deb ... 316s Unpacking libgpgme11t64:arm64 (1.24.0-2ubuntu1) over (1.23.2-5ubuntu4) ... 316s Preparing to unpack .../python3-markupsafe_2.1.5-1build3_arm64.deb ... 316s Unpacking python3-markupsafe (2.1.5-1build3) over (2.1.5-1build2) ... 316s Setting up python3-markupsafe (2.1.5-1build3) ... 316s Setting up libassuan9:arm64 (3.0.1-2) ... 316s Setting up libgpgme11t64:arm64 (1.24.0-2ubuntu1) ... 316s Setting up python3-cffi-backend:arm64 (1.17.1-2build1) ... 316s Processing triggers for man-db (2.13.0-1) ... 317s Processing triggers for libc-bin (2.40-1ubuntu3) ... 317s Reading package lists... 317s Building dependency tree... 317s Reading state information... 318s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 318s Hit:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease 318s Hit:2 http://ftpmaster.internal/ubuntu plucky InRelease 318s Hit:3 http://ftpmaster.internal/ubuntu plucky-updates InRelease 318s Hit:4 http://ftpmaster.internal/ubuntu plucky-security InRelease 319s Reading package lists... 319s Reading package lists... 320s Building dependency tree... 320s Reading state information... 320s Calculating upgrade... 321s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 321s Reading package lists... 321s Building dependency tree... 321s Reading state information... 322s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 326s Reading package lists... 326s Building dependency tree... 326s Reading state information... 327s Starting pkgProblemResolver with broken count: 0 327s Starting 2 pkgProblemResolver with broken count: 0 327s Done 327s The following additional packages will be installed: 327s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 327s libnss3-tools libreswan libunbound8 328s The following NEW packages will be installed: 328s autopkgtest-satdep dns-root-data libevent-2.1-7t64 328s libevent-pthreads-2.1-7t64 libldns3t64 libnss3-tools libreswan libunbound8 328s 0 upgraded, 8 newly installed, 0 to remove and 0 not upgraded. 328s Need to get 2651 kB/2651 kB of archives. 328s After this operation, 12.4 MB of additional disk space will be used. 328s Get:1 /tmp/autopkgtest.3IRVVO/3-autopkgtest-satdep.deb autopkgtest-satdep arm64 0 [736 B] 328s Get:2 http://ftpmaster.internal/ubuntu plucky/main arm64 dns-root-data all 2024071800 [4380 B] 328s Get:3 http://ftpmaster.internal/ubuntu plucky/main arm64 libnss3-tools arm64 2:3.103-1 [603 kB] 328s Get:4 http://ftpmaster.internal/ubuntu plucky/main arm64 libevent-pthreads-2.1-7t64 arm64 2.1.12-stable-10 [7922 B] 329s Get:5 http://ftpmaster.internal/ubuntu plucky/universe arm64 libldns3t64 arm64 1.8.4-1 [164 kB] 329s Get:6 http://ftpmaster.internal/ubuntu plucky/main arm64 libevent-2.1-7t64 arm64 2.1.12-stable-10 [140 kB] 329s Get:7 http://ftpmaster.internal/ubuntu plucky/main arm64 libunbound8 arm64 1.20.0-1ubuntu2.1 [431 kB] 329s Get:8 http://ftpmaster.internal/ubuntu plucky/universe arm64 libreswan arm64 4.14-1ubuntu2 [1301 kB] 330s Fetched 2651 kB in 2s (1268 kB/s) 330s Selecting previously unselected package dns-root-data. 330s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 79964 files and directories currently installed.) 330s Preparing to unpack .../0-dns-root-data_2024071800_all.deb ... 330s Unpacking dns-root-data (2024071800) ... 330s Selecting previously unselected package libnss3-tools. 330s Preparing to unpack .../1-libnss3-tools_2%3a3.103-1_arm64.deb ... 330s Unpacking libnss3-tools (2:3.103-1) ... 330s Selecting previously unselected package libevent-pthreads-2.1-7t64:arm64. 330s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10_arm64.deb ... 330s Unpacking libevent-pthreads-2.1-7t64:arm64 (2.1.12-stable-10) ... 330s Selecting previously unselected package libldns3t64:arm64. 330s Preparing to unpack .../3-libldns3t64_1.8.4-1_arm64.deb ... 330s Unpacking libldns3t64:arm64 (1.8.4-1) ... 330s Selecting previously unselected package libevent-2.1-7t64:arm64. 330s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10_arm64.deb ... 330s Unpacking libevent-2.1-7t64:arm64 (2.1.12-stable-10) ... 330s Selecting previously unselected package libunbound8:arm64. 330s Preparing to unpack .../5-libunbound8_1.20.0-1ubuntu2.1_arm64.deb ... 330s Unpacking libunbound8:arm64 (1.20.0-1ubuntu2.1) ... 330s Selecting previously unselected package libreswan. 330s Preparing to unpack .../6-libreswan_4.14-1ubuntu2_arm64.deb ... 330s Unpacking libreswan (4.14-1ubuntu2) ... 330s Selecting previously unselected package autopkgtest-satdep. 330s Preparing to unpack .../7-3-autopkgtest-satdep.deb ... 330s Unpacking autopkgtest-satdep (0) ... 331s Setting up libldns3t64:arm64 (1.8.4-1) ... 331s Setting up libevent-pthreads-2.1-7t64:arm64 (2.1.12-stable-10) ... 331s Setting up libevent-2.1-7t64:arm64 (2.1.12-stable-10) ... 331s Setting up dns-root-data (2024071800) ... 331s Setting up libunbound8:arm64 (1.20.0-1ubuntu2.1) ... 331s Setting up libnss3-tools (2:3.103-1) ... 331s Setting up libreswan (4.14-1ubuntu2) ... 331s ipsec.service is a disabled or a static unit, not starting it. 331s Setting up autopkgtest-satdep (0) ... 331s Processing triggers for man-db (2.13.0-1) ... 332s Processing triggers for libc-bin (2.40-1ubuntu3) ... 336s (Reading database ... 80161 files and directories currently installed.) 336s Removing autopkgtest-satdep (0) ... 352s autopkgtest [19:41:42]: test cavp: [----------------------- 353s Testing installed CAVP binary: /usr/libexec/ipsec/cavp 356s test: IKE v2 356s Reading from ikev2.fax 359s test: IKE v1 Digital Signature Authentication 359s Reading from ikev1_dsa.fax 361s test: IKE v1 Pre-shared Key Authentication 361s Reading from ikev1_psk.fax 363s /tmp/autopkgtest.3IRVVO/build.kyb/src 364s autopkgtest [19:41:54]: test cavp: -----------------------] 364s autopkgtest [19:41:54]: test cavp: - - - - - - - - - - results - - - - - - - - - - 364s cavp PASS 365s autopkgtest [19:41:54]: @@@@@@@@@@@@@@@@@@@@ summary 365s opportunistic SKIP exit status 77 and marked as skippable 365s cryptocheck PASS 365s cavp PASS 376s virt: nova [W] Skipping flock in bos03-arm64 376s virt: Creating nova instance adt-plucky-arm64-libreswan-20241115-193550-juju-7f2275-prod-proposed-migration-environment-2-572ecff5-f3e1-412f-b7fb-1a854f806178 from image adt/ubuntu-plucky-arm64-server-20241115.img (UUID bf337bb2-b8c9-4fc7-87ba-f6e99408dba6)... 376s virt: nova [W] Skipping flock in bos03-arm64 376s virt: Creating nova instance adt-plucky-arm64-libreswan-20241115-193550-juju-7f2275-prod-proposed-migration-environment-2-572ecff5-f3e1-412f-b7fb-1a854f806178 from image adt/ubuntu-plucky-arm64-server-20241115.img (UUID bf337bb2-b8c9-4fc7-87ba-f6e99408dba6)... 376s virt: nova [W] Skipping flock in bos03-arm64 376s virt: Creating nova instance adt-plucky-arm64-libreswan-20241115-193550-juju-7f2275-prod-proposed-migration-environment-2-572ecff5-f3e1-412f-b7fb-1a854f806178 from image adt/ubuntu-plucky-arm64-server-20241115.img (UUID bf337bb2-b8c9-4fc7-87ba-f6e99408dba6)...