0s autopkgtest [10:39:02]: starting date and time: 2025-01-17 10:39:02+0000 0s autopkgtest [10:39:02]: git checkout: 325255d2 Merge branch 'pin-any-arch' into 'ubuntu/production' 0s autopkgtest [10:39:02]: host juju-7f2275-prod-proposed-migration-environment-2; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.nz3j1dnq/out --timeout-copy=6000 --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:libxcrypt --apt-upgrade libreswan --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 --env=ADT_TEST_TRIGGERS=libxcrypt/1:4.4.38-1 -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-2@bos03-arm64-29.secgroup --name adt-plucky-arm64-libreswan-20250117-103901-juju-7f2275-prod-proposed-migration-environment-2-5aeb1be9-6f02-46e7-9877-a698b170275f --image adt/ubuntu-plucky-arm64-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-2 --net-id=net_prod-proposed-migration -e TERM=linux -e ''"'"'http_proxy=http://squid.internal:3128'"'"'' -e ''"'"'https_proxy=http://squid.internal:3128'"'"'' -e ''"'"'no_proxy=127.0.0.1,127.0.1.1,login.ubuntu.com,localhost,localdomain,novalocal,internal,archive.ubuntu.com,ports.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,keyserver.ubuntu.com,launchpadlibrarian.net,launchpadcontent.net,launchpad.net,10.24.0.0/24,keystone.ps5.canonical.com,objectstorage.prodstack5.canonical.com,radosgw.ps5.canonical.com'"'"'' --mirror=http://ftpmaster.internal/ubuntu/ 191s autopkgtest [10:42:13]: testbed dpkg architecture: arm64 191s autopkgtest [10:42:13]: testbed apt version: 2.9.18 192s autopkgtest [10:42:14]: @@@@@@@@@@@@@@@@@@@@ test bed setup 192s autopkgtest [10:42:14]: testbed release detected to be: None 193s autopkgtest [10:42:15]: updating testbed package index (apt update) 194s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease [73.9 kB] 194s Hit:2 http://ftpmaster.internal/ubuntu plucky InRelease 194s Hit:3 http://ftpmaster.internal/ubuntu plucky-updates InRelease 194s Hit:4 http://ftpmaster.internal/ubuntu plucky-security InRelease 194s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse Sources [16.4 kB] 194s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/universe Sources [887 kB] 195s Get:7 http://ftpmaster.internal/ubuntu plucky-proposed/restricted Sources [9708 B] 195s Get:8 http://ftpmaster.internal/ubuntu plucky-proposed/main Sources [172 kB] 195s Get:9 http://ftpmaster.internal/ubuntu plucky-proposed/main arm64 Packages [313 kB] 195s Get:10 http://ftpmaster.internal/ubuntu plucky-proposed/restricted arm64 Packages [57.8 kB] 195s Get:11 http://ftpmaster.internal/ubuntu plucky-proposed/universe arm64 Packages [1086 kB] 195s Get:12 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse arm64 Packages [13.1 kB] 196s Fetched 2630 kB in 2s (1398 kB/s) 196s Reading package lists... 197s + lsb_release --codename --short 197s + RELEASE=plucky 197s + cat 197s + [ plucky != trusty ] 197s + DEBIAN_FRONTEND=noninteractive eatmydata apt-get -y --allow-downgrades -o Dpkg::Options::=--force-confnew dist-upgrade 197s Reading package lists... 197s Building dependency tree... 197s Reading state information... 198s Calculating upgrade... 198s The following packages will be upgraded: 198s libgudev-1.0-0 usb.ids 199s 2 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 199s Need to get 238 kB of archives. 199s After this operation, 1024 B of additional disk space will be used. 199s Get:1 http://ftpmaster.internal/ubuntu plucky/main arm64 usb.ids all 2025.01.14-1 [223 kB] 199s Get:2 http://ftpmaster.internal/ubuntu plucky/main arm64 libgudev-1.0-0 arm64 1:238-6 [14.9 kB] 199s Fetched 238 kB in 0s (497 kB/s) 200s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 80204 files and directories currently installed.) 200s Preparing to unpack .../usb.ids_2025.01.14-1_all.deb ... 200s Unpacking usb.ids (2025.01.14-1) over (2024.12.04-1) ... 200s Preparing to unpack .../libgudev-1.0-0_1%3a238-6_arm64.deb ... 200s Unpacking libgudev-1.0-0:arm64 (1:238-6) over (1:238-5ubuntu1) ... 200s Setting up usb.ids (2025.01.14-1) ... 200s Setting up libgudev-1.0-0:arm64 (1:238-6) ... 200s Processing triggers for libc-bin (2.40-4ubuntu1) ... 200s + rm /etc/apt/preferences.d/force-downgrade-to-release.pref 200s + /usr/lib/apt/apt-helper analyze-pattern ?true 200s + DEBIAN_FRONTEND=noninteractive eatmydata apt-get -y purge --autoremove ?obsolete 200s Reading package lists... 200s Building dependency tree... 200s Reading state information... 201s 0 upgraded, 0 newly installed, 0 to remove and 2 not upgraded. 201s + grep -q trusty /etc/lsb-release 201s + [ ! -d /usr/share/doc/unattended-upgrades ] 201s + [ ! -d /usr/share/doc/lxd ] 201s + [ ! -d /usr/share/doc/lxd-client ] 201s + [ ! -d /usr/share/doc/snapd ] 201s + type iptables 201s + cat 201s + chmod 755 /etc/rc.local 201s + . /etc/rc.local 201s + iptables -w -t mangle -A FORWARD -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu 201s + iptables -A OUTPUT -d 10.255.255.1/32 -p tcp -j DROP 201s + iptables -A OUTPUT -d 10.255.255.2/32 -p tcp -j DROP 201s + uname -m 201s + [ aarch64 = ppc64le ] 201s + [ -d /run/systemd/system ] 201s + systemd-detect-virt --quiet --vm 201s + mkdir -p /etc/systemd/system/systemd-random-seed.service.d/ 201s + cat 201s + grep -q lz4 /etc/initramfs-tools/initramfs.conf 201s + echo COMPRESS=lz4 201s + sync 201s autopkgtest [10:42:23]: upgrading testbed (apt dist-upgrade and autopurge) 202s Reading package lists... 202s Building dependency tree... 202s Reading state information... 202s Calculating upgrade...Starting pkgProblemResolver with broken count: 0 202s Starting 2 pkgProblemResolver with broken count: 0 202s Done 203s Entering ResolveByKeep 203s 204s The following packages will be upgraded: 204s libcrypt-dev libcrypt1 204s 2 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 204s Need to get 207 kB of archives. 204s After this operation, 3072 B of additional disk space will be used. 204s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed/main arm64 libcrypt-dev arm64 1:4.4.38-1 [119 kB] 204s Get:2 http://ftpmaster.internal/ubuntu plucky-proposed/main arm64 libcrypt1 arm64 1:4.4.38-1 [87.0 kB] 205s Fetched 207 kB in 0s (480 kB/s) 205s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 80204 files and directories currently installed.) 205s Preparing to unpack .../libcrypt-dev_1%3a4.4.38-1_arm64.deb ... 205s Unpacking libcrypt-dev:arm64 (1:4.4.38-1) over (1:4.4.36-5) ... 205s Preparing to unpack .../libcrypt1_1%3a4.4.38-1_arm64.deb ... 205s Unpacking libcrypt1:arm64 (1:4.4.38-1) over (1:4.4.36-5) ... 205s Setting up libcrypt1:arm64 (1:4.4.38-1) ... 205s Setting up libcrypt-dev:arm64 (1:4.4.38-1) ... 205s Processing triggers for man-db (2.13.0-1) ... 205s Processing triggers for libc-bin (2.40-4ubuntu1) ... 206s Reading package lists... 206s Building dependency tree... 206s Reading state information... 206s Starting pkgProblemResolver with broken count: 0 207s Starting 2 pkgProblemResolver with broken count: 0 207s Done 207s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 210s autopkgtest [10:42:32]: testbed running kernel: Linux 6.11.0-8-generic #8-Ubuntu SMP PREEMPT_DYNAMIC Mon Sep 16 14:19:41 UTC 2024 210s autopkgtest [10:42:32]: @@@@@@@@@@@@@@@@@@@@ apt-source libreswan 213s Get:1 http://ftpmaster.internal/ubuntu plucky/universe libreswan 4.14-1ubuntu2 (dsc) [2781 B] 213s Get:2 http://ftpmaster.internal/ubuntu plucky/universe libreswan 4.14-1ubuntu2 (tar) [3721 kB] 213s Get:3 http://ftpmaster.internal/ubuntu plucky/universe libreswan 4.14-1ubuntu2 (asc) [862 B] 213s Get:4 http://ftpmaster.internal/ubuntu plucky/universe libreswan 4.14-1ubuntu2 (diff) [17.5 kB] 214s gpgv: Signature made Sun Mar 31 19:34:12 2024 UTC 214s gpgv: using RSA key AC483F68DE728F43F2202FCA568D30F321B2133D 214s gpgv: issuer "steve.langasek@ubuntu.com" 214s gpgv: Can't check signature: No public key 214s dpkg-source: warning: cannot verify inline signature for ./libreswan_4.14-1ubuntu2.dsc: no acceptable signature found 214s autopkgtest [10:42:36]: testing package libreswan version 4.14-1ubuntu2 215s autopkgtest [10:42:37]: build not needed 218s autopkgtest [10:42:40]: test opportunistic: preparing testbed 218s Reading package lists... 218s Building dependency tree... 218s Reading state information... 218s Starting pkgProblemResolver with broken count: 0 219s Starting 2 pkgProblemResolver with broken count: 0 219s Done 219s The following NEW packages will be installed: 219s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 219s libnss3-tools libreswan libunbound8 219s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 219s Need to get 2657 kB of archives. 219s After this operation, 12.5 MB of additional disk space will be used. 219s Get:1 http://ftpmaster.internal/ubuntu plucky/main arm64 dns-root-data all 2024071801 [5802 B] 220s Get:2 http://ftpmaster.internal/ubuntu plucky/main arm64 libnss3-tools arm64 2:3.106-1ubuntu1 [607 kB] 220s Get:3 http://ftpmaster.internal/ubuntu plucky/main arm64 libevent-pthreads-2.1-7t64 arm64 2.1.12-stable-10 [7922 B] 220s Get:4 http://ftpmaster.internal/ubuntu plucky/universe arm64 libldns3t64 arm64 1.8.4-2 [164 kB] 220s Get:5 http://ftpmaster.internal/ubuntu plucky/main arm64 libevent-2.1-7t64 arm64 2.1.12-stable-10 [140 kB] 220s Get:6 http://ftpmaster.internal/ubuntu plucky/main arm64 libunbound8 arm64 1.20.0-1ubuntu2.1 [431 kB] 220s Get:7 http://ftpmaster.internal/ubuntu plucky/universe arm64 libreswan arm64 4.14-1ubuntu2 [1301 kB] 221s Fetched 2657 kB in 1s (2027 kB/s) 221s Selecting previously unselected package dns-root-data. 221s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 80204 files and directories currently installed.) 221s Preparing to unpack .../0-dns-root-data_2024071801_all.deb ... 221s Unpacking dns-root-data (2024071801) ... 221s Selecting previously unselected package libnss3-tools. 221s Preparing to unpack .../1-libnss3-tools_2%3a3.106-1ubuntu1_arm64.deb ... 221s Unpacking libnss3-tools (2:3.106-1ubuntu1) ... 221s Selecting previously unselected package libevent-pthreads-2.1-7t64:arm64. 221s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10_arm64.deb ... 221s Unpacking libevent-pthreads-2.1-7t64:arm64 (2.1.12-stable-10) ... 221s Selecting previously unselected package libldns3t64:arm64. 221s Preparing to unpack .../3-libldns3t64_1.8.4-2_arm64.deb ... 221s Unpacking libldns3t64:arm64 (1.8.4-2) ... 221s Selecting previously unselected package libevent-2.1-7t64:arm64. 221s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10_arm64.deb ... 221s Unpacking libevent-2.1-7t64:arm64 (2.1.12-stable-10) ... 221s Selecting previously unselected package libunbound8:arm64. 221s Preparing to unpack .../5-libunbound8_1.20.0-1ubuntu2.1_arm64.deb ... 221s Unpacking libunbound8:arm64 (1.20.0-1ubuntu2.1) ... 221s Selecting previously unselected package libreswan. 221s Preparing to unpack .../6-libreswan_4.14-1ubuntu2_arm64.deb ... 221s Unpacking libreswan (4.14-1ubuntu2) ... 222s Setting up libldns3t64:arm64 (1.8.4-2) ... 222s Setting up libevent-pthreads-2.1-7t64:arm64 (2.1.12-stable-10) ... 222s Setting up libevent-2.1-7t64:arm64 (2.1.12-stable-10) ... 222s Setting up dns-root-data (2024071801) ... 222s Setting up libunbound8:arm64 (1.20.0-1ubuntu2.1) ... 222s Setting up libnss3-tools (2:3.106-1ubuntu1) ... 222s Setting up libreswan (4.14-1ubuntu2) ... 222s ipsec.service is a disabled or a static unit, not starting it. 222s Processing triggers for man-db (2.13.0-1) ... 223s Processing triggers for libc-bin (2.40-4ubuntu1) ... 224s autopkgtest [10:42:46]: test opportunistic: [----------------------- 225s PING oe.libreswan.org (193.110.157.124) 56(84) bytes of data. 225s From 10.145.255.2 icmp_seq=1 Destination Port Unreachable 226s From 10.145.255.2 icmp_seq=2 Destination Port Unreachable 227s From 10.145.255.2 icmp_seq=3 Destination Port Unreachable 228s From 10.145.255.2 icmp_seq=4 Destination Port Unreachable 229s From 10.145.255.2 icmp_seq=5 Destination Port Unreachable 229s 229s --- oe.libreswan.org ping statistics --- 229s 5 packets transmitted, 0 received, +5 errors, 100% packet loss, time 4004ms 229s 229s autopkgtest [10:42:51]: test opportunistic: -----------------------] 229s autopkgtest [10:42:51]: test opportunistic: - - - - - - - - - - results - - - - - - - - - - 229s opportunistic SKIP exit status 77 and marked as skippable 230s autopkgtest [10:42:52]: test cryptocheck: preparing testbed 417s autopkgtest [10:45:59]: testbed dpkg architecture: arm64 417s autopkgtest [10:45:59]: testbed apt version: 2.9.18 418s autopkgtest [10:46:00]: @@@@@@@@@@@@@@@@@@@@ test bed setup 418s autopkgtest [10:46:00]: testbed release detected to be: plucky 419s autopkgtest [10:46:01]: updating testbed package index (apt update) 419s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease [73.9 kB] 420s Hit:2 http://ftpmaster.internal/ubuntu plucky InRelease 420s Hit:3 http://ftpmaster.internal/ubuntu plucky-updates InRelease 420s Hit:4 http://ftpmaster.internal/ubuntu plucky-security InRelease 420s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/restricted Sources [9708 B] 420s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/universe Sources [887 kB] 420s Get:7 http://ftpmaster.internal/ubuntu plucky-proposed/main Sources [172 kB] 420s Get:8 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse Sources [16.4 kB] 420s Get:9 http://ftpmaster.internal/ubuntu plucky-proposed/main arm64 Packages [313 kB] 420s Get:10 http://ftpmaster.internal/ubuntu plucky-proposed/restricted arm64 Packages [57.8 kB] 420s Get:11 http://ftpmaster.internal/ubuntu plucky-proposed/universe arm64 Packages [1086 kB] 420s Get:12 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse arm64 Packages [13.1 kB] 420s Fetched 2630 kB in 1s (2446 kB/s) 421s Reading package lists... 422s + lsb_release --codename --short 422s + RELEASE=plucky 422s + cat 422s + [ plucky != trusty ] 422s + DEBIAN_FRONTEND=noninteractive eatmydata apt-get -y --allow-downgrades -o Dpkg::Options::=--force-confnew dist-upgrade 422s Reading package lists... 422s Building dependency tree... 422s Reading state information... 423s Calculating upgrade... 423s The following packages will be upgraded: 423s libgudev-1.0-0 usb.ids 424s 2 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 424s Need to get 238 kB of archives. 424s After this operation, 1024 B of additional disk space will be used. 424s Get:1 http://ftpmaster.internal/ubuntu plucky/main arm64 usb.ids all 2025.01.14-1 [223 kB] 424s Get:2 http://ftpmaster.internal/ubuntu plucky/main arm64 libgudev-1.0-0 arm64 1:238-6 [14.9 kB] 425s Fetched 238 kB in 0s (489 kB/s) 425s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 80204 files and directories currently installed.) 425s Preparing to unpack .../usb.ids_2025.01.14-1_all.deb ... 425s Unpacking usb.ids (2025.01.14-1) over (2024.12.04-1) ... 425s Preparing to unpack .../libgudev-1.0-0_1%3a238-6_arm64.deb ... 425s Unpacking libgudev-1.0-0:arm64 (1:238-6) over (1:238-5ubuntu1) ... 425s Setting up usb.ids (2025.01.14-1) ... 425s Setting up libgudev-1.0-0:arm64 (1:238-6) ... 425s Processing triggers for libc-bin (2.40-4ubuntu1) ... 425s + rm /etc/apt/preferences.d/force-downgrade-to-release.pref 425s + /usr/lib/apt/apt-helper analyze-pattern ?true 425s + DEBIAN_FRONTEND=noninteractive eatmydata apt-get -y purge --autoremove ?obsolete 425s Reading package lists... 426s Building dependency tree... 426s Reading state information... 428s 0 upgraded, 0 newly installed, 0 to remove and 2 not upgraded. 428s + grep -q trusty /etc/lsb-release 428s + [ ! -d /usr/share/doc/unattended-upgrades ] 428s + [ ! -d /usr/share/doc/lxd ] 428s + [ ! -d /usr/share/doc/lxd-client ] 428s + [ ! -d /usr/share/doc/snapd ] 428s + type iptables 428s + cat 428s + chmod 755 /etc/rc.local 428s + . /etc/rc.local 428s + iptables -w -t mangle -A FORWARD -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu 428s + iptables -A OUTPUT -d 10.255.255.1/32 -p tcp -j DROP 428s + iptables -A OUTPUT -d 10.255.255.2/32 -p tcp -j DROP 428s + uname -m 428s + [ aarch64 = ppc64le ] 428s + [ -d /run/systemd/system ] 428s + systemd-detect-virt --quiet --vm 428s + mkdir -p /etc/systemd/system/systemd-random-seed.service.d/ 428s + cat 428s + grep -q lz4 /etc/initramfs-tools/initramfs.conf 428s + echo COMPRESS=lz4 428s + sync 428s autopkgtest [10:46:10]: upgrading testbed (apt dist-upgrade and autopurge) 428s Reading package lists... 429s Building dependency tree... 429s Reading state information... 430s Calculating upgrade...Starting pkgProblemResolver with broken count: 0 430s Starting 2 pkgProblemResolver with broken count: 0 430s Done 430s Entering ResolveByKeep 431s 431s The following packages will be upgraded: 431s libcrypt-dev libcrypt1 431s 2 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 431s Need to get 207 kB of archives. 431s After this operation, 3072 B of additional disk space will be used. 431s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed/main arm64 libcrypt-dev arm64 1:4.4.38-1 [119 kB] 432s Get:2 http://ftpmaster.internal/ubuntu plucky-proposed/main arm64 libcrypt1 arm64 1:4.4.38-1 [87.0 kB] 432s Fetched 207 kB in 0s (487 kB/s) 432s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 80204 files and directories currently installed.) 432s Preparing to unpack .../libcrypt-dev_1%3a4.4.38-1_arm64.deb ... 432s Unpacking libcrypt-dev:arm64 (1:4.4.38-1) over (1:4.4.36-5) ... 432s Preparing to unpack .../libcrypt1_1%3a4.4.38-1_arm64.deb ... 432s Unpacking libcrypt1:arm64 (1:4.4.38-1) over (1:4.4.36-5) ... 432s Setting up libcrypt1:arm64 (1:4.4.38-1) ... 432s Setting up libcrypt-dev:arm64 (1:4.4.38-1) ... 432s Processing triggers for man-db (2.13.0-1) ... 433s Processing triggers for libc-bin (2.40-4ubuntu1) ... 433s Reading package lists... 433s Building dependency tree... 433s Reading state information... 434s Starting pkgProblemResolver with broken count: 0 434s Starting 2 pkgProblemResolver with broken count: 0 434s Done 435s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 438s Reading package lists... 438s Building dependency tree... 438s Reading state information... 439s Starting pkgProblemResolver with broken count: 0 439s Starting 2 pkgProblemResolver with broken count: 0 439s Done 440s The following NEW packages will be installed: 440s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 440s libnss3-tools libreswan libunbound8 440s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 440s Need to get 2657 kB of archives. 440s After this operation, 12.5 MB of additional disk space will be used. 440s Get:1 http://ftpmaster.internal/ubuntu plucky/main arm64 dns-root-data all 2024071801 [5802 B] 440s Get:2 http://ftpmaster.internal/ubuntu plucky/main arm64 libnss3-tools arm64 2:3.106-1ubuntu1 [607 kB] 441s Get:3 http://ftpmaster.internal/ubuntu plucky/main arm64 libevent-pthreads-2.1-7t64 arm64 2.1.12-stable-10 [7922 B] 441s Get:4 http://ftpmaster.internal/ubuntu plucky/universe arm64 libldns3t64 arm64 1.8.4-2 [164 kB] 441s Get:5 http://ftpmaster.internal/ubuntu plucky/main arm64 libevent-2.1-7t64 arm64 2.1.12-stable-10 [140 kB] 441s Get:6 http://ftpmaster.internal/ubuntu plucky/main arm64 libunbound8 arm64 1.20.0-1ubuntu2.1 [431 kB] 441s Get:7 http://ftpmaster.internal/ubuntu plucky/universe arm64 libreswan arm64 4.14-1ubuntu2 [1301 kB] 441s Fetched 2657 kB in 1s (3311 kB/s) 441s Selecting previously unselected package dns-root-data. 441s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 80204 files and directories currently installed.) 441s Preparing to unpack .../0-dns-root-data_2024071801_all.deb ... 441s Unpacking dns-root-data (2024071801) ... 441s Selecting previously unselected package libnss3-tools. 441s Preparing to unpack .../1-libnss3-tools_2%3a3.106-1ubuntu1_arm64.deb ... 441s Unpacking libnss3-tools (2:3.106-1ubuntu1) ... 441s Selecting previously unselected package libevent-pthreads-2.1-7t64:arm64. 441s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10_arm64.deb ... 441s Unpacking libevent-pthreads-2.1-7t64:arm64 (2.1.12-stable-10) ... 441s Selecting previously unselected package libldns3t64:arm64. 441s Preparing to unpack .../3-libldns3t64_1.8.4-2_arm64.deb ... 441s Unpacking libldns3t64:arm64 (1.8.4-2) ... 441s Selecting previously unselected package libevent-2.1-7t64:arm64. 441s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10_arm64.deb ... 441s Unpacking libevent-2.1-7t64:arm64 (2.1.12-stable-10) ... 441s Selecting previously unselected package libunbound8:arm64. 442s Preparing to unpack .../5-libunbound8_1.20.0-1ubuntu2.1_arm64.deb ... 442s Unpacking libunbound8:arm64 (1.20.0-1ubuntu2.1) ... 442s Selecting previously unselected package libreswan. 442s Preparing to unpack .../6-libreswan_4.14-1ubuntu2_arm64.deb ... 442s Unpacking libreswan (4.14-1ubuntu2) ... 442s Setting up libldns3t64:arm64 (1.8.4-2) ... 442s Setting up libevent-pthreads-2.1-7t64:arm64 (2.1.12-stable-10) ... 442s Setting up libevent-2.1-7t64:arm64 (2.1.12-stable-10) ... 442s Setting up dns-root-data (2024071801) ... 442s Setting up libunbound8:arm64 (1.20.0-1ubuntu2.1) ... 442s Setting up libnss3-tools (2:3.106-1ubuntu1) ... 442s Setting up libreswan (4.14-1ubuntu2) ... 442s ipsec.service is a disabled or a static unit, not starting it. 442s Processing triggers for man-db (2.13.0-1) ... 443s Processing triggers for libc-bin (2.40-4ubuntu1) ... 484s autopkgtest [10:47:06]: test cryptocheck: [----------------------- 485s Testing installed binary: /usr/libexec/ipsec/algparse 485s Testing installed binary: /usr/libexec/ipsec/pluto 485s testing -tp 485s algparse: Encryption algorithms: 485s algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 485s algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 485s algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 485s algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 485s algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 485s algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 485s algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm, aes_gcm_c 485s algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_b 485s algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_a 485s algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 485s algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 485s algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 485s algparse: NULL [] IKEv1: ESP IKEv2: ESP 485s algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 485s algparse: Hash algorithms: 485s algparse: MD5 IKEv1: IKE IKEv2: NSS 485s algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 485s algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 485s algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 485s algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 485s algparse: IDENTITY IKEv1: IKEv2: FIPS 485s algparse: PRF algorithms: 485s algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE native(HMAC) md5 485s algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 485s algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 485s algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 485s algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 485s algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 485s algparse: Integrity algorithms: 485s algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH native(HMAC) md5, hmac_md5 485s algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 485s algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 485s algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 485s algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 485s algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 485s algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 485s algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 485s algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 485s algparse: DH algorithms: 485s algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 485s algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 485s algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 485s algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 485s algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 485s algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 485s algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 485s algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 485s algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 485s algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 485s algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 485s algparse: IPCOMP algorithms: 485s algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 485s algparse: LZS IKEv1: IKEv2: ESP AH FIPS 485s algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 485s | parsing 'AES_GCM_16_256,AES_GCM_16_128,AES_CBC_256,AES_CBC_128' for ESP 485s | proposal: 'AES_GCM_16_256' 485s | token: '' '' "AES_GCM_16_256" '' 485s | token: '' "AES_GCM_16_256" '' '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_256' is not recognized 485s | token: '' '' '' 485s | appending ESP encryption algorithm AES_GCM_16[_256] 485s | appending ESP integrity algorithm NONE[_0] 485s | proposal: 'AES_GCM_16_128' 485s | token: '' '' "AES_GCM_16_128" '' 485s | token: '' "AES_GCM_16_128" '' '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_128' is not recognized 485s | token: '' '' '' 485s | appending ESP encryption algorithm AES_GCM_16[_128] 485s | appending ESP integrity algorithm NONE[_0] 485s | proposal: 'AES_CBC_256' 485s | token: '' '' "AES_CBC_256" '' 485s | token: '' "AES_CBC_256" '' '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_256' is not recognized 485s | token: '' '' '' 485s | appending ESP encryption algorithm AES_CBC[_256] 485s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 485s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 485s | proposal: 'AES_CBC_128' 485s | token: '' '' "AES_CBC_128" '' 485s | token: '' "AES_CBC_128" '' '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_128' is not recognized 485s | token: '' '' '' 485s | appending ESP encryption algorithm AES_CBC[_128] 485s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 485s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 485s | parsing '' for ESP 485s | parsing 'aes' for ESP 485s | proposal: 'aes' 485s | token: '' '' "aes" '' 485s | token: '' "aes" '' '' 485s | token: '' '' '' 485s | appending ESP encryption algorithm AES_CBC[_0] 485s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 485s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 485s | parsing 'aes;modp2048' for ESP 485s | proposal: 'aes;modp2048' 485s | token: '' '' "aes" ';' 485s | token: '' "aes" ';' "modp2048" '' 485s | token: ';' "modp2048" '' '' 485s | appending ESP encryption algorithm AES_CBC[_0] 485s | parsing dh: 485s | appending ESP DH algorithm MODP2048[_0] 485s | token: '' '' '' 485s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 485s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 485s algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 485s | parsing 'aes-sha1' for ESP 485s | proposal: 'aes-sha1' 485s | token: '' '' "aes" '-' 485s | token: '' "aes" '-' "sha1" '' 485s | token: '-' "sha1" '' '' 485s | appending ESP encryption algorithm AES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: '' '' '' 485s | parsing 'aes-sha1' for ESP 485s | proposal: 'aes-sha1' 485s | token: '' '' "aes" '-' 485s | token: '' "aes" '-' "sha1" '' 485s | token: '-' "sha1" '' '' 485s | appending ESP encryption algorithm AES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: '' '' '' 485s | parsing 'aes-sha1-modp2048' for ESP 485s | proposal: 'aes-sha1-modp2048' 485s | token: '' '' "aes" '-' 485s | token: '' "aes" '-' "sha1" '-' 485s | token: '-' "sha1" '-' "modp2048" '' 485s | appending ESP encryption algorithm AES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: '-' "modp2048" '' '' 485s | parsing dh: 485s | appending ESP DH algorithm MODP2048[_0] 485s | token: '' '' '' 485s algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 485s | parsing 'aes-128-sha1' for ESP 485s | proposal: 'aes-128-sha1' 485s | token: '' '' "aes" '-' 485s | token: '' "aes" '-' "128" '-' 485s | token: '-' "128" '-' "sha1" '' 485s | token: '-' "sha1" '' '' 485s | appending ESP encryption algorithm AES_CBC[_128] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: '' '' '' 485s | parsing 'aes-128-sha1' for ESP 485s | proposal: 'aes-128-sha1' 485s | token: '' '' "aes" '-' 485s | token: '' "aes" '-' "128" '-' 485s | token: '-' "128" '-' "sha1" '' 485s | token: '-' "sha1" '' '' 485s | appending ESP encryption algorithm AES_CBC[_128] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: '' '' '' 485s | parsing 'aes-128-sha1-modp2048' for ESP 485s | proposal: 'aes-128-sha1-modp2048' 485s | token: '' '' "aes" '-' 485s | token: '' "aes" '-' "128" '-' 485s | token: '-' "128" '-' "sha1" '-' 485s | token: '-' "sha1" '-' "modp2048" '' 485s | appending ESP encryption algorithm AES_CBC[_128] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: '-' "modp2048" '' '' 485s | parsing dh: 485s | appending ESP DH algorithm MODP2048[_0] 485s | token: '' '' '' 485s algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 485s | parsing 'aes-128' for ESP 485s | proposal: 'aes-128' 485s | token: '' '' "aes" '-' 485s | token: '' "aes" '-' "128" '' 485s | token: '-' "128" '' '' 485s | token: '' '' '' 485s | appending ESP encryption algorithm AES_CBC[_128] 485s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 485s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 485s | parsing 'aes_gcm_a-128-null' for ESP 485s | proposal: 'aes_gcm_a-128-null' 485s | token: '' '' "aes_gcm_a" '-' 485s | token: '' "aes_gcm_a" '-' "128" '-' 485s | token: '-' "128" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_GCM_8[_128] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing '3des-sha1;modp1024' for ESP 485s | proposal: '3des-sha1;modp1024' 485s | token: '' '' "3des" '-' 485s | token: '' "3des" '-' "sha1" ';' 485s | token: '-' "sha1" ';' "modp1024" '' 485s | appending ESP encryption algorithm 3DES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: ';' "modp1024" '' '' 485s | parsing dh: 485s | ike_alg_byname() failed: ESP DH algorithm 'modp1024' is not supported 485s | lookup for DH algorithm 'modp1024' failed 485s | ... failed 'ESP DH algorithm 'modp1024' is not supported' 485s | parsing '3des-sha1;modp1536' for ESP 485s | proposal: '3des-sha1;modp1536' 485s | token: '' '' "3des" '-' 485s | token: '' "3des" '-' "sha1" ';' 485s | token: '-' "sha1" ';' "modp1536" '' 485s | appending ESP encryption algorithm 3DES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: ';' "modp1536" '' '' 485s | parsing dh: 485s | appending ESP DH algorithm MODP1536[_0] 485s | token: '' '' '' 485s algparse: ignoring ESP DH algorithm MODP1536 as PFS policy is disabled 485s | parsing '3des-sha1;modp2048' for ESP 485s | proposal: '3des-sha1;modp2048' 485s | token: '' '' "3des" '-' 485s | token: '' "3des" '-' "sha1" ';' 485s | token: '-' "sha1" ';' "modp2048" '' 485s | appending ESP encryption algorithm 3DES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: ';' "modp2048" '' '' 485s | parsing dh: 485s | appending ESP DH algorithm MODP2048[_0] 485s | token: '' '' '' 485s algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 485s | parsing '3des-sha1;dh21' for ESP 485s | proposal: '3des-sha1;dh21' 485s | token: '' '' "3des" '-' 485s | token: '' "3des" '-' "sha1" ';' 485s | token: '-' "sha1" ';' "dh21" '' 485s | appending ESP encryption algorithm 3DES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: ';' "dh21" '' '' 485s | parsing dh: 485s | appending ESP DH algorithm DH21[_0] 485s | token: '' '' '' 485s algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 485s | parsing '3des-sha1;ecp_521' for ESP 485s | proposal: '3des-sha1;ecp_521' 485s | token: '' '' "3des" '-' 485s | token: '' "3des" '-' "sha1" ';' 485s | token: '-' "sha1" ';' "ecp_521" '' 485s | appending ESP encryption algorithm 3DES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: ';' "ecp_521" '' '' 485s | parsing dh: 485s | appending ESP DH algorithm DH21[_0] 485s | token: '' '' '' 485s algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 485s | parsing '3des-sha1;dh23' for ESP 485s | proposal: '3des-sha1;dh23' 485s | token: '' '' "3des" '-' 485s | token: '' "3des" '-' "sha1" ';' 485s | token: '-' "sha1" ';' "dh23" '' 485s | appending ESP encryption algorithm 3DES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: ';' "dh23" '' '' 485s | parsing dh: 485s | ike_alg_byname() failed: ESP DH algorithm 'dh23' is not supported 485s | lookup for DH algorithm 'dh23' failed 485s | ... failed 'ESP DH algorithm 'dh23' is not supported' 485s | parsing '3des-sha1;dh24' for ESP 485s | proposal: '3des-sha1;dh24' 485s | token: '' '' "3des" '-' 485s | token: '' "3des" '-' "sha1" ';' 485s | token: '-' "sha1" ';' "dh24" '' 485s | appending ESP encryption algorithm 3DES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: ';' "dh24" '' '' 485s | parsing dh: 485s | ike_alg_byname() failed: ESP DH algorithm 'dh24' is not supported 485s | lookup for DH algorithm 'dh24' failed 485s | ... failed 'ESP DH algorithm 'dh24' is not supported' 485s | parsing '3des-sha1' for ESP 485s | proposal: '3des-sha1' 485s | token: '' '' "3des" '-' 485s | token: '' "3des" '-' "sha1" '' 485s | token: '-' "sha1" '' '' 485s | appending ESP encryption algorithm 3DES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: '' '' '' 485s | parsing 'null-sha1' for ESP 485s | proposal: 'null-sha1' 485s | token: '' '' "null" '-' 485s | token: '' "null" '-' "sha1" '' 485s | token: '-' "sha1" '' '' 485s | appending ESP encryption algorithm NULL[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: '' '' '' 485s | parsing 'aes_cbc' for ESP 485s | proposal: 'aes_cbc' 485s | token: '' '' "aes_cbc" '' 485s | token: '' "aes_cbc" '' '' 485s | token: '' '' '' 485s | appending ESP encryption algorithm AES_CBC[_0] 485s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 485s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 485s | parsing 'aes-sha' for ESP 485s | proposal: 'aes-sha' 485s | token: '' '' "aes" '-' 485s | token: '' "aes" '-' "sha" '' 485s | token: '-' "sha" '' '' 485s | appending ESP encryption algorithm AES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: '' '' '' 485s | parsing 'aes-sha1' for ESP 485s | proposal: 'aes-sha1' 485s | token: '' '' "aes" '-' 485s | token: '' "aes" '-' "sha1" '' 485s | token: '-' "sha1" '' '' 485s | appending ESP encryption algorithm AES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: '' '' '' 485s | parsing 'aes128-sha1' for ESP 485s | proposal: 'aes128-sha1' 485s | token: '' '' "aes128" '-' 485s | token: '' "aes128" '-' "sha1" '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 485s | token: '-' "sha1" '' '' 485s | appending ESP encryption algorithm AES_CBC[_128] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: '' '' '' 485s | parsing 'aes-sha2' for ESP 485s | proposal: 'aes-sha2' 485s | token: '' '' "aes" '-' 485s | token: '' "aes" '-' "sha2" '' 485s | token: '-' "sha2" '' '' 485s | appending ESP encryption algorithm AES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 485s | token: '' '' '' 485s | parsing 'aes-sha256' for ESP 485s | proposal: 'aes-sha256' 485s | token: '' '' "aes" '-' 485s | token: '' "aes" '-' "sha256" '' 485s | token: '-' "sha256" '' '' 485s | appending ESP encryption algorithm AES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 485s | token: '' '' '' 485s | parsing 'aes-sha384' for ESP 485s | proposal: 'aes-sha384' 485s | token: '' '' "aes" '-' 485s | token: '' "aes" '-' "sha384" '' 485s | token: '-' "sha384" '' '' 485s | appending ESP encryption algorithm AES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 485s | token: '' '' '' 485s | parsing 'aes-sha512' for ESP 485s | proposal: 'aes-sha512' 485s | token: '' '' "aes" '-' 485s | token: '' "aes" '-' "sha512" '' 485s | token: '-' "sha512" '' '' 485s | appending ESP encryption algorithm AES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 485s | token: '' '' '' 485s | parsing 'aes128-aes_xcbc' for ESP 485s | proposal: 'aes128-aes_xcbc' 485s | token: '' '' "aes128" '-' 485s | token: '' "aes128" '-' "aes_xcbc" '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 485s | token: '-' "aes_xcbc" '' '' 485s | appending ESP encryption algorithm AES_CBC[_128] 485s | parsing integ: 485s | appending ESP integrity algorithm AES_XCBC_96[_0] 485s | token: '' '' '' 485s | parsing 'aes192-sha1' for ESP 485s | proposal: 'aes192-sha1' 485s | token: '' '' "aes192" '-' 485s | token: '' "aes192" '-' "sha1" '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'aes192' is not recognized 485s | token: '-' "sha1" '' '' 485s | appending ESP encryption algorithm AES_CBC[_192] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: '' '' '' 485s | parsing 'aes256-sha1' for ESP 485s | proposal: 'aes256-sha1' 485s | token: '' '' "aes256" '-' 485s | token: '' "aes256" '-' "sha1" '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 485s | token: '-' "sha1" '' '' 485s | appending ESP encryption algorithm AES_CBC[_256] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: '' '' '' 485s | parsing 'aes256-sha' for ESP 485s | proposal: 'aes256-sha' 485s | token: '' '' "aes256" '-' 485s | token: '' "aes256" '-' "sha" '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 485s | token: '-' "sha" '' '' 485s | appending ESP encryption algorithm AES_CBC[_256] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: '' '' '' 485s | parsing 'aes256-sha2' for ESP 485s | proposal: 'aes256-sha2' 485s | token: '' '' "aes256" '-' 485s | token: '' "aes256" '-' "sha2" '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 485s | token: '-' "sha2" '' '' 485s | appending ESP encryption algorithm AES_CBC[_256] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 485s | token: '' '' '' 485s | parsing 'aes256-sha2_256' for ESP 485s | proposal: 'aes256-sha2_256' 485s | token: '' '' "aes256" '-' 485s | token: '' "aes256" '-' "sha2_256" '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 485s | token: '-' "sha2_256" '' '' 485s | appending ESP encryption algorithm AES_CBC[_256] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 485s | token: '' '' '' 485s | parsing 'aes256-sha2_384' for ESP 485s | proposal: 'aes256-sha2_384' 485s | token: '' '' "aes256" '-' 485s | token: '' "aes256" '-' "sha2_384" '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 485s | token: '-' "sha2_384" '' '' 485s | appending ESP encryption algorithm AES_CBC[_256] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 485s | token: '' '' '' 485s | parsing 'aes256-sha2_512' for ESP 485s | proposal: 'aes256-sha2_512' 485s | token: '' '' "aes256" '-' 485s | token: '' "aes256" '-' "sha2_512" '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 485s | token: '-' "sha2_512" '' '' 485s | appending ESP encryption algorithm AES_CBC[_256] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 485s | token: '' '' '' 485s | parsing 'camellia' for ESP 485s | proposal: 'camellia' 485s | token: '' '' "camellia" '' 485s | token: '' "camellia" '' '' 485s | token: '' '' '' 485s | appending ESP encryption algorithm CAMELLIA_CBC[_0] 485s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 485s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 485s | parsing 'camellia128' for ESP 485s | proposal: 'camellia128' 485s | token: '' '' "camellia128" '' 485s | token: '' "camellia128" '' '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'camellia128' is not recognized 485s | token: '' '' '' 485s | appending ESP encryption algorithm CAMELLIA_CBC[_128] 485s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 485s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 485s | parsing 'camellia192' for ESP 485s | proposal: 'camellia192' 485s | token: '' '' "camellia192" '' 485s | token: '' "camellia192" '' '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'camellia192' is not recognized 485s | token: '' '' '' 485s | appending ESP encryption algorithm CAMELLIA_CBC[_192] 485s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 485s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 485s | parsing 'camellia256' for ESP 485s | proposal: 'camellia256' 485s | token: '' '' "camellia256" '' 485s | token: '' "camellia256" '' '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'camellia256' is not recognized 485s | token: '' '' '' 485s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 485s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 485s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 485s | parsing 'aes_ccm' for ESP 485s | proposal: 'aes_ccm' 485s | token: '' '' "aes_ccm" '' 485s | token: '' "aes_ccm" '' '' 485s | token: '' '' '' 485s | appending ESP encryption algorithm AES_CCM_16[_0] 485s | appending ESP integrity algorithm NONE[_0] 485s | parsing 'aes_ccm_a-128-null' for ESP 485s | proposal: 'aes_ccm_a-128-null' 485s | token: '' '' "aes_ccm_a" '-' 485s | token: '' "aes_ccm_a" '-' "128" '-' 485s | token: '-' "128" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_CCM_8[_128] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_ccm_a-192-null' for ESP 485s | proposal: 'aes_ccm_a-192-null' 485s | token: '' '' "aes_ccm_a" '-' 485s | token: '' "aes_ccm_a" '-' "192" '-' 485s | token: '-' "192" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_CCM_8[_192] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_ccm_a-256-null' for ESP 485s | proposal: 'aes_ccm_a-256-null' 485s | token: '' '' "aes_ccm_a" '-' 485s | token: '' "aes_ccm_a" '-' "256" '-' 485s | token: '-' "256" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_CCM_8[_256] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_ccm_b-128-null' for ESP 485s | proposal: 'aes_ccm_b-128-null' 485s | token: '' '' "aes_ccm_b" '-' 485s | token: '' "aes_ccm_b" '-' "128" '-' 485s | token: '-' "128" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_CCM_12[_128] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_ccm_b-192-null' for ESP 485s | proposal: 'aes_ccm_b-192-null' 485s | token: '' '' "aes_ccm_b" '-' 485s | token: '' "aes_ccm_b" '-' "192" '-' 485s | token: '-' "192" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_CCM_12[_192] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_ccm_b-256-null' for ESP 485s | proposal: 'aes_ccm_b-256-null' 485s | token: '' '' "aes_ccm_b" '-' 485s | token: '' "aes_ccm_b" '-' "256" '-' 485s | token: '-' "256" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_CCM_12[_256] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_ccm_c-128-null' for ESP 485s | proposal: 'aes_ccm_c-128-null' 485s | token: '' '' "aes_ccm_c" '-' 485s | token: '' "aes_ccm_c" '-' "128" '-' 485s | token: '-' "128" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_CCM_16[_128] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_ccm_c-192-null' for ESP 485s | proposal: 'aes_ccm_c-192-null' 485s | token: '' '' "aes_ccm_c" '-' 485s | token: '' "aes_ccm_c" '-' "192" '-' 485s | token: '-' "192" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_CCM_16[_192] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_ccm_c-256-null' for ESP 485s | proposal: 'aes_ccm_c-256-null' 485s | token: '' '' "aes_ccm_c" '-' 485s | token: '' "aes_ccm_c" '-' "256" '-' 485s | token: '-' "256" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_CCM_16[_256] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_gcm' for ESP 485s | proposal: 'aes_gcm' 485s | token: '' '' "aes_gcm" '' 485s | token: '' "aes_gcm" '' '' 485s | token: '' '' '' 485s | appending ESP encryption algorithm AES_GCM_16[_0] 485s | appending ESP integrity algorithm NONE[_0] 485s | parsing 'aes_gcm_a-128-null' for ESP 485s | proposal: 'aes_gcm_a-128-null' 485s | token: '' '' "aes_gcm_a" '-' 485s | token: '' "aes_gcm_a" '-' "128" '-' 485s | token: '-' "128" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_GCM_8[_128] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_gcm_a-192-null' for ESP 485s | proposal: 'aes_gcm_a-192-null' 485s | token: '' '' "aes_gcm_a" '-' 485s | token: '' "aes_gcm_a" '-' "192" '-' 485s | token: '-' "192" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_GCM_8[_192] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_gcm_a-256-null' for ESP 485s | proposal: 'aes_gcm_a-256-null' 485s | token: '' '' "aes_gcm_a" '-' 485s | token: '' "aes_gcm_a" '-' "256" '-' 485s | token: '-' "256" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_GCM_8[_256] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_gcm_b-128-null' for ESP 485s | proposal: 'aes_gcm_b-128-null' 485s | token: '' '' "aes_gcm_b" '-' 485s | token: '' "aes_gcm_b" '-' "128" '-' 485s | token: '-' "128" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_GCM_12[_128] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_gcm_b-192-null' for ESP 485s | proposal: 'aes_gcm_b-192-null' 485s | token: '' '' "aes_gcm_b" '-' 485s | token: '' "aes_gcm_b" '-' "192" '-' 485s | token: '-' "192" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_GCM_12[_192] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_gcm_b-256-null' for ESP 485s | proposal: 'aes_gcm_b-256-null' 485s | token: '' '' "aes_gcm_b" '-' 485s | token: '' "aes_gcm_b" '-' "256" '-' 485s | token: '-' "256" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_GCM_12[_256] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_gcm_c-128-null' for ESP 485s | proposal: 'aes_gcm_c-128-null' 485s | token: '' '' "aes_gcm_c" '-' 485s | token: '' "aes_gcm_c" '-' "128" '-' 485s | token: '-' "128" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_GCM_16[_128] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_gcm_c-192-null' for ESP 485s | proposal: 'aes_gcm_c-192-null' 485s | token: '' '' "aes_gcm_c" '-' 485s | token: '' "aes_gcm_c" '-' "192" '-' 485s | token: '-' "192" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_GCM_16[_192] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_gcm_c-256-null' for ESP 485s | proposal: 'aes_gcm_c-256-null' 485s | token: '' '' "aes_gcm_c" '-' 485s | token: '' "aes_gcm_c" '-' "256" '-' 485s | token: '-' "256" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_GCM_16[_256] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_ccm_a-null' for ESP 485s | proposal: 'aes_ccm_a-null' 485s | token: '' '' "aes_ccm_a" '-' 485s | token: '' "aes_ccm_a" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_CCM_8[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_ccm_b-null' for ESP 485s | proposal: 'aes_ccm_b-null' 485s | token: '' '' "aes_ccm_b" '-' 485s | token: '' "aes_ccm_b" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_CCM_12[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_ccm_c-null' for ESP 485s | proposal: 'aes_ccm_c-null' 485s | token: '' '' "aes_ccm_c" '-' 485s | token: '' "aes_ccm_c" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_CCM_16[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_gcm_a-null' for ESP 485s | proposal: 'aes_gcm_a-null' 485s | token: '' '' "aes_gcm_a" '-' 485s | token: '' "aes_gcm_a" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_GCM_8[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_gcm_b-null' for ESP 485s | proposal: 'aes_gcm_b-null' 485s | token: '' '' "aes_gcm_b" '-' 485s | token: '' "aes_gcm_b" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_GCM_12[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_gcm_c-null' for ESP 485s | proposal: 'aes_gcm_c-null' 485s | token: '' '' "aes_gcm_c" '-' 485s | token: '' "aes_gcm_c" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_GCM_16[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_ccm-null' for ESP 485s | proposal: 'aes_ccm-null' 485s | token: '' '' "aes_ccm" '-' 485s | token: '' "aes_ccm" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_CCM_16[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_gcm-null' for ESP 485s | proposal: 'aes_gcm-null' 485s | token: '' '' "aes_gcm" '-' 485s | token: '' "aes_gcm" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_GCM_16[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_ccm-256-null' for ESP 485s | proposal: 'aes_ccm-256-null' 485s | token: '' '' "aes_ccm" '-' 485s | token: '' "aes_ccm" '-' "256" '-' 485s | token: '-' "256" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_CCM_16[_256] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_gcm-192-null' for ESP 485s | proposal: 'aes_gcm-192-null' 485s | token: '' '' "aes_gcm" '-' 485s | token: '' "aes_gcm" '-' "192" '-' 485s | token: '-' "192" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_GCM_16[_192] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_ccm_256-null' for ESP 485s | proposal: 'aes_ccm_256-null' 485s | token: '' '' "aes_ccm_256" '-' 485s | token: '' "aes_ccm_256" '-' "null" '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_256' is not recognized 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_CCM_16[_256] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_gcm_192-null' for ESP 485s | proposal: 'aes_gcm_192-null' 485s | token: '' '' "aes_gcm_192" '-' 485s | token: '' "aes_gcm_192" '-' "null" '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_192' is not recognized 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_GCM_16[_192] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_ccm_8-null' for ESP 485s | proposal: 'aes_ccm_8-null' 485s | token: '' '' "aes_ccm_8" '-' 485s | token: '' "aes_ccm_8" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_CCM_8[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_ccm_12-null' for ESP 485s | proposal: 'aes_ccm_12-null' 485s | token: '' '' "aes_ccm_12" '-' 485s | token: '' "aes_ccm_12" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_CCM_12[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_ccm_16-null' for ESP 485s | proposal: 'aes_ccm_16-null' 485s | token: '' '' "aes_ccm_16" '-' 485s | token: '' "aes_ccm_16" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_CCM_16[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_gcm_8-null' for ESP 485s | proposal: 'aes_gcm_8-null' 485s | token: '' '' "aes_gcm_8" '-' 485s | token: '' "aes_gcm_8" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_GCM_8[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_gcm_12-null' for ESP 485s | proposal: 'aes_gcm_12-null' 485s | token: '' '' "aes_gcm_12" '-' 485s | token: '' "aes_gcm_12" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_GCM_12[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_gcm_16-null' for ESP 485s | proposal: 'aes_gcm_16-null' 485s | token: '' '' "aes_gcm_16" '-' 485s | token: '' "aes_gcm_16" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_GCM_16[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_ccm_8-128-null' for ESP 485s | proposal: 'aes_ccm_8-128-null' 485s | token: '' '' "aes_ccm_8" '-' 485s | token: '' "aes_ccm_8" '-' "128" '-' 485s | token: '-' "128" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_CCM_8[_128] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_ccm_12-192-null' for ESP 485s | proposal: 'aes_ccm_12-192-null' 485s | token: '' '' "aes_ccm_12" '-' 485s | token: '' "aes_ccm_12" '-' "192" '-' 485s | token: '-' "192" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_CCM_12[_192] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_ccm_16-256-null' for ESP 485s | proposal: 'aes_ccm_16-256-null' 485s | token: '' '' "aes_ccm_16" '-' 485s | token: '' "aes_ccm_16" '-' "256" '-' 485s | token: '-' "256" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_CCM_16[_256] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_gcm_8-128-null' for ESP 485s | proposal: 'aes_gcm_8-128-null' 485s | token: '' '' "aes_gcm_8" '-' 485s | token: '' "aes_gcm_8" '-' "128" '-' 485s | token: '-' "128" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_GCM_8[_128] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_gcm_12-192-null' for ESP 485s | proposal: 'aes_gcm_12-192-null' 485s | token: '' '' "aes_gcm_12" '-' 485s | token: '' "aes_gcm_12" '-' "192" '-' 485s | token: '-' "192" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_GCM_12[_192] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_gcm_16-256-null' for ESP 485s | proposal: 'aes_gcm_16-256-null' 485s | token: '' '' "aes_gcm_16" '-' 485s | token: '' "aes_gcm_16" '-' "256" '-' 485s | token: '-' "256" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_GCM_16[_256] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_ccm_8_128-null' for ESP 485s | proposal: 'aes_ccm_8_128-null' 485s | token: '' '' "aes_ccm_8_128" '-' 485s | token: '' "aes_ccm_8_128" '-' "null" '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_8_128' is not recognized 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_CCM_8[_128] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_ccm_12_192-null' for ESP 485s | proposal: 'aes_ccm_12_192-null' 485s | token: '' '' "aes_ccm_12_192" '-' 485s | token: '' "aes_ccm_12_192" '-' "null" '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_12_192' is not recognized 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_CCM_12[_192] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_ccm_16_256-null' for ESP 485s | proposal: 'aes_ccm_16_256-null' 485s | token: '' '' "aes_ccm_16_256" '-' 485s | token: '' "aes_ccm_16_256" '-' "null" '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_16_256' is not recognized 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_CCM_16[_256] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_gcm_8_128-null' for ESP 485s | proposal: 'aes_gcm_8_128-null' 485s | token: '' '' "aes_gcm_8_128" '-' 485s | token: '' "aes_gcm_8_128" '-' "null" '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_8_128' is not recognized 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_GCM_8[_128] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_gcm_12_192-null' for ESP 485s | proposal: 'aes_gcm_12_192-null' 485s | token: '' '' "aes_gcm_12_192" '-' 485s | token: '' "aes_gcm_12_192" '-' "null" '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_12_192' is not recognized 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_GCM_12[_192] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_gcm_16_256-null' for ESP 485s | proposal: 'aes_gcm_16_256-null' 485s | token: '' '' "aes_gcm_16_256" '-' 485s | token: '' "aes_gcm_16_256" '-' "null" '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_16_256' is not recognized 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_GCM_16[_256] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_ctr' for ESP 485s | proposal: 'aes_ctr' 485s | token: '' '' "aes_ctr" '' 485s | token: '' "aes_ctr" '' '' 485s | token: '' '' '' 485s | appending ESP encryption algorithm AES_CTR[_0] 485s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 485s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 485s | parsing 'aesctr' for ESP 485s | proposal: 'aesctr' 485s | token: '' '' "aesctr" '' 485s | token: '' "aesctr" '' '' 485s | token: '' '' '' 485s | appending ESP encryption algorithm AES_CTR[_0] 485s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 485s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 485s | parsing 'aes_ctr128' for ESP 485s | proposal: 'aes_ctr128' 485s | token: '' '' "aes_ctr128" '' 485s | token: '' "aes_ctr128" '' '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr128' is not recognized 485s | token: '' '' '' 485s | appending ESP encryption algorithm AES_CTR[_128] 485s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 485s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 485s | parsing 'aes_ctr192' for ESP 485s | proposal: 'aes_ctr192' 485s | token: '' '' "aes_ctr192" '' 485s | token: '' "aes_ctr192" '' '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr192' is not recognized 485s | token: '' '' '' 485s | appending ESP encryption algorithm AES_CTR[_192] 485s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 485s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 485s | parsing 'aes_ctr256' for ESP 485s | proposal: 'aes_ctr256' 485s | token: '' '' "aes_ctr256" '' 485s | token: '' "aes_ctr256" '' '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr256' is not recognized 485s | token: '' '' '' 485s | appending ESP encryption algorithm AES_CTR[_256] 485s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 485s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 485s | parsing 'camellia_cbc_256-hmac_sha2_512_256;modp8192' for ESP 485s | proposal: 'camellia_cbc_256-hmac_sha2_512_256;modp8192' 485s | token: '' '' "camellia_cbc_256" '-' 485s | token: '' "camellia_cbc_256" '-' "hmac_sha2_512_256" ';' 485s | ike_alg_byname() failed: ESP encryption algorithm 'camellia_cbc_256' is not recognized 485s | token: '-' "hmac_sha2_512_256" ';' "modp8192" '' 485s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 485s | token: ';' "modp8192" '' '' 485s | parsing dh: 485s | appending ESP DH algorithm MODP8192[_0] 485s | token: '' '' '' 485s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 485s | parsing 'null_auth_aes_gmac_256-null;modp8192' for ESP 485s | proposal: 'null_auth_aes_gmac_256-null;modp8192' 485s | token: '' '' "null_auth_aes_gmac_256" '-' 485s | token: '' "null_auth_aes_gmac_256" '-' "null" ';' 485s | ike_alg_byname() failed: ESP encryption algorithm 'null_auth_aes_gmac_256' is not recognized 485s | token: '-' "null" ';' "modp8192" '' 485s | appending ESP encryption algorithm NULL_AUTH_AES_GMAC[_256] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: ';' "modp8192" '' '' 485s | parsing dh: 485s | appending ESP DH algorithm MODP8192[_0] 485s | token: '' '' '' 485s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 485s | parsing '3des-sha1;modp8192' for ESP 485s | proposal: '3des-sha1;modp8192' 485s | token: '' '' "3des" '-' 485s | token: '' "3des" '-' "sha1" ';' 485s | token: '-' "sha1" ';' "modp8192" '' 485s | appending ESP encryption algorithm 3DES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: ';' "modp8192" '' '' 485s | parsing dh: 485s | appending ESP DH algorithm MODP8192[_0] 485s | token: '' '' '' 485s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 485s algparse -v2 'esp' 485s AES_GCM_16_256-NONE 485s AES_GCM_16_128-NONE 485s AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 485s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 485s algparse -v2 'esp=' 485s ERROR: ESP proposal is empty 485s algparse -v2 'esp=aes' 485s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 485s algparse -v2 'esp=aes;modp2048' 485s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 485s algparse -v2 'esp=aes-sha1' 485s AES_CBC-HMAC_SHA1_96 485s algparse -v2 'esp=aes-sha1' 485s AES_CBC-HMAC_SHA1_96 485s algparse -v2 'esp=aes-sha1-modp2048' 485s AES_CBC-HMAC_SHA1_96 485s algparse -v2 'esp=aes-128-sha1' 485s AES_CBC_128-HMAC_SHA1_96 485s algparse -v2 'esp=aes-128-sha1' 485s AES_CBC_128-HMAC_SHA1_96 485s algparse -v2 'esp=aes-128-sha1-modp2048' 485s AES_CBC_128-HMAC_SHA1_96 485s algparse -v2 'esp=aes-128' 485s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 485s algparse -v2 'esp=aes_gcm_a-128-null' 485s AES_GCM_8_128-NONE 485s algparse -v2 'esp=3des-sha1;modp1024' 485s ERROR: ESP DH algorithm 'modp1024' is not supported 485s algparse -v2 'esp=3des-sha1;modp1536' 485s 3DES_CBC-HMAC_SHA1_96 485s algparse -v2 'esp=3des-sha1;modp2048' 485s 3DES_CBC-HMAC_SHA1_96 485s algparse -v2 'esp=3des-sha1;dh21' 485s 3DES_CBC-HMAC_SHA1_96 485s algparse -v2 'esp=3des-sha1;ecp_521' 485s 3DES_CBC-HMAC_SHA1_96 485s algparse -v2 'esp=3des-sha1;dh23' 485s ERROR: ESP DH algorithm 'dh23' is not supported 485s algparse -v2 'esp=3des-sha1;dh24' 485s ERROR: ESP DH algorithm 'dh24' is not supported 485s algparse -v2 'esp=3des-sha1' 485s 3DES_CBC-HMAC_SHA1_96 485s algparse -v2 'esp=null-sha1' 485s NULL-HMAC_SHA1_96 485s algparse -v2 'esp=aes_cbc' 485s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 485s algparse -v2 'esp=aes-sha' 485s AES_CBC-HMAC_SHA1_96 485s algparse -v2 'esp=aes-sha1' 485s AES_CBC-HMAC_SHA1_96 485s algparse -v2 'esp=aes128-sha1' 485s AES_CBC_128-HMAC_SHA1_96 485s algparse -v2 'esp=aes-sha2' 485s AES_CBC-HMAC_SHA2_256_128 485s algparse -v2 'esp=aes-sha256' 485s AES_CBC-HMAC_SHA2_256_128 485s algparse -v2 'esp=aes-sha384' 485s AES_CBC-HMAC_SHA2_384_192 485s algparse -v2 'esp=aes-sha512' 485s AES_CBC-HMAC_SHA2_512_256 485s algparse -v2 'esp=aes128-aes_xcbc' 485s AES_CBC_128-AES_XCBC_96 485s algparse -v2 'esp=aes192-sha1' 485s AES_CBC_192-HMAC_SHA1_96 485s algparse -v2 'esp=aes256-sha1' 485s AES_CBC_256-HMAC_SHA1_96 485s algparse -v2 'esp=aes256-sha' 485s AES_CBC_256-HMAC_SHA1_96 485s algparse -v2 'esp=aes256-sha2' 485s AES_CBC_256-HMAC_SHA2_256_128 485s algparse -v2 'esp=aes256-sha2_256' 485s AES_CBC_256-HMAC_SHA2_256_128 485s algparse -v2 'esp=aes256-sha2_384' 485s AES_CBC_256-HMAC_SHA2_384_192 485s algparse -v2 'esp=aes256-sha2_512' 485s AES_CBC_256-HMAC_SHA2_512_256 485s algparse -v2 'esp=camellia' 485s CAMELLIA_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 485s algparse -v2 'esp=camellia128' 485s CAMELLIA_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 485s algparse -v2 'esp=camellia192' 485s CAMELLIA_CBC_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 485s algparse -v2 'esp=camellia256' 485s CAMELLIA_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 485s algparse -v2 'esp=aes_ccm' 485s AES_CCM_16-NONE 485s algparse -v2 'esp=aes_ccm_a-128-null' 485s AES_CCM_8_128-NONE 485s algparse -v2 'esp=aes_ccm_a-192-null' 485s AES_CCM_8_192-NONE 485s algparse -v2 'esp=aes_ccm_a-256-null' 485s AES_CCM_8_256-NONE 485s algparse -v2 'esp=aes_ccm_b-128-null' 485s AES_CCM_12_128-NONE 485s algparse -v2 'esp=aes_ccm_b-192-null' 485s AES_CCM_12_192-NONE 485s algparse -v2 'esp=aes_ccm_b-256-null' 485s AES_CCM_12_256-NONE 485s algparse -v2 'esp=aes_ccm_c-128-null' 485s AES_CCM_16_128-NONE 485s algparse -v2 'esp=aes_ccm_c-192-null' 485s AES_CCM_16_192-NONE 485s algparse -v2 'esp=aes_ccm_c-256-null' 485s AES_CCM_16_256-NONE 485s algparse -v2 'esp=aes_gcm' 485s AES_GCM_16-NONE 485s algparse -v2 'esp=aes_gcm_a-128-null' 485s AES_GCM_8_128-NONE 485s algparse -v2 'esp=aes_gcm_a-192-null' 485s AES_GCM_8_192-NONE 485s algparse -v2 'esp=aes_gcm_a-256-null' 485s AES_GCM_8_256-NONE 485s algparse -v2 'esp=aes_gcm_b-128-null' 485s AES_GCM_12_128-NONE 485s algparse -v2 'esp=aes_gcm_b-192-null' 485s AES_GCM_12_192-NONE 485s algparse -v2 'esp=aes_gcm_b-256-null' 485s AES_GCM_12_256-NONE 485s algparse -v2 'esp=aes_gcm_c-128-null' 485s AES_GCM_16_128-NONE 485s algparse -v2 'esp=aes_gcm_c-192-null' 485s AES_GCM_16_192-NONE 485s algparse -v2 'esp=aes_gcm_c-256-null' 485s AES_GCM_16_256-NONE 485s algparse -v2 'esp=aes_ccm_a-null' 485s AES_CCM_8-NONE 485s algparse -v2 'esp=aes_ccm_b-null' 485s AES_CCM_12-NONE 485s algparse -v2 'esp=aes_ccm_c-null' 485s AES_CCM_16-NONE 485s algparse -v2 'esp=aes_gcm_a-null' 485s AES_GCM_8-NONE 485s algparse -v2 'esp=aes_gcm_b-null' 485s AES_GCM_12-NONE 485s algparse -v2 'esp=aes_gcm_c-null' 485s AES_GCM_16-NONE 485s algparse -v2 'esp=aes_ccm-null' 485s AES_CCM_16-NONE 485s algparse -v2 'esp=aes_gcm-null' 485s AES_GCM_16-NONE 485s algparse -v2 'esp=aes_ccm-256-null' 485s AES_CCM_16_256-NONE 485s algparse -v2 'esp=aes_gcm-192-null' 485s AES_GCM_16_192-NONE 485s algparse -v2 'esp=aes_ccm_256-null' 485s AES_CCM_16_256-NONE 485s algparse -v2 'esp=aes_gcm_192-null' 485s AES_GCM_16_192-NONE 485s algparse -v2 'esp=aes_ccm_8-null' 485s AES_CCM_8-NONE 485s algparse -v2 'esp=aes_ccm_12-null' 485s AES_CCM_12-NONE 485s algparse -v2 'esp=aes_ccm_16-null' 485s AES_CCM_16-NONE 485s algparse -v2 'esp=aes_gcm_8-null' 485s AES_GCM_8-NONE 485s algparse -v2 'esp=aes_gcm_12-null' 485s AES_GCM_12-NONE 485s algparse -v2 'esp=aes_gcm_16-null' 485s AES_GCM_16-NONE 485s algparse -v2 'esp=aes_ccm_8-128-null' 485s AES_CCM_8_128-NONE 485s algparse -v2 'esp=aes_ccm_12-192-null' 485s AES_CCM_12_192-NONE 485s algparse -v2 'esp=aes_ccm_16-256-null' 485s AES_CCM_16_256-NONE 485s algparse -v2 'esp=aes_gcm_8-128-null' 485s AES_GCM_8_128-NONE 485s algparse -v2 'esp=aes_gcm_12-192-null' 485s AES_GCM_12_192-NONE 485s algparse -v2 'esp=aes_gcm_16-256-null' 485s AES_GCM_16_256-NONE 485s algparse -v2 'esp=aes_ccm_8_128-null' 485s AES_CCM_8_128-NONE 485s algparse -v2 'esp=aes_ccm_12_192-null' 485s AES_CCM_12_192-NONE 485s algparse -v2 'esp=aes_ccm_16_256-null' 485s AES_CCM_16_256-NONE 485s algparse -v2 'esp=aes_gcm_8_128-null' 485s AES_GCM_8_128-NONE 485s algparse -v2 'esp=aes_gcm_12_192-null' 485s AES_GCM_12_192-NONE 485s algparse -v2 'esp=aes_gcm_16_256-null' 485s AES_GCM_16_256-NONE 485s algparse -v2 'esp=aes_ctr' 485s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 485s algparse -v2 'esp=aesctr' 485s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 485s algparse -v2 'esp=aes_ctr128' 485s AES_CTR_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 485s algparse -v2 'esp=aes_ctr192' 485s AES_CTR_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 485s algparse -v2 'esp=aes_ctr256' 485s AES_CTR_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 485s algparse -v2 'esp=camellia_cbc_256-hmac_sha2_512_256;modp8192' 485s CAMELLIA_CBC_256-HMAC_SHA2_512_256 485s algparse -v2 'esp=null_auth_aes_gmac_256-null;modp8192' 485s NULL_AUTH_AES_GMAC_256-NONE 485s algparse -v2 'esp=3des-sha1;modp8192' 485s 3DES_CBC-HMAC_SHA1_96 485s algparse -v2 'esp=3des-sha1-modp8192' 485s 3DES_CBC-HMAC_SHA1_96 485s algparse -v2 'esp=aes-sha1,3des-sha1;modp8192' 485s AES_CBC-HMAC_SHA1_96 485s 3DES_CBC-HMAC_SHA1_96 485s algparse -v2 'esp=aes-sha1-modp8192,3des-sha1-modp8192' 485s AES_CBC-HMAC_SHA1_96 485s 3DES_CBC-HMAC_SHA1_96 485s | parsing '3des-sha1-modp8192' for ESP 485s | proposal: '3des-sha1-modp8192' 485s | token: '' '' "3des" '-' 485s | token: '' "3des" '-' "sha1" '-' 485s | token: '-' "sha1" '-' "modp8192" '' 485s | appending ESP encryption algorithm 3DES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: '-' "modp8192" '' '' 485s | parsing dh: 485s | appending ESP DH algorithm MODP8192[_0] 485s | token: '' '' '' 485s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 485s | parsing 'aes-sha1,3des-sha1;modp8192' for ESP 485s | proposal: 'aes-sha1' 485s | token: '' '' "aes" '-' 485s | token: '' "aes" '-' "sha1" '' 485s | token: '-' "sha1" '' '' 485s | appending ESP encryption algorithm AES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: '' '' '' 485s | proposal: '3des-sha1;modp8192' 485s | token: '' '' "3des" '-' 485s | token: '' "3des" '-' "sha1" ';' 485s | token: '-' "sha1" ';' "modp8192" '' 485s | appending ESP encryption algorithm 3DES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: ';' "modp8192" '' '' 485s | parsing dh: 485s | appending ESP DH algorithm MODP8192[_0] 485s | token: '' '' '' 485s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 485s | parsing 'aes-sha1-modp8192,3des-sha1-modp8192' for ESP 485s | proposal: 'aes-sha1-modp8192' 485s | token: '' '' "aes" '-' 485s | token: '' "aes" '-' "sha1" '-' 485s | token: '-' "sha1" '-' "modp8192" '' 485s | appending ESP encryption algorithm AES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: '-' "modp8192" '' '' 485s | parsing dh: 485s | appending ESP DH algorithm MODP8192[_0] 485s | token: '' '' '' 485s | proposal: '3des-sha1-modp8192' 485s | token: '' '' "3des" '-' 485s | token: '' "3des" '-' "sha1" '-' 485s | token: '-' "sha1" '-' "modp8192" '' 485s | appending ESP encryption algorithm 3DES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: '-' "modp8192" '' '' 485s | parsing dh: 485s | appending ESP DH algorithm MODP8192[_0] 485s | token: '' '' '' 485s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 485s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 485s algparse -v2 'esp=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' 485s AES_CBC-HMAC_SHA1_96 485s algparse -v2 'esp=aes;none' 485s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 485s algparse -v2 'esp=aes;none,aes' 485s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 485s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 485s algparse -v2 'esp=aes;none,aes;modp2048' 485s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 485s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 485s algparse -v2 'esp=aes-sha1-none' 485s AES_CBC-HMAC_SHA1_96 485s algparse -v2 'esp=aes-sha1;none' 485s AES_CBC-HMAC_SHA1_96 485s algparse -v2 'esp=3des168-sha1' 485s ERROR: ESP encryption algorithm 3DES_CBC does not allow a key lengths 485s algparse -v2 'esp=3des-null' 485s ERROR: non-AEAD ESP encryption algorithm 3DES_CBC cannot have 'NONE' as the integrity algorithm 485s algparse -v2 'esp=aes128-null' 485s ERROR: non-AEAD ESP encryption algorithm AES_CBC cannot have 'NONE' as the integrity algorithm 485s algparse -v2 'esp=aes224-sha1' 485s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 485s algparse -v2 'esp=aes-224-sha1' 485s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 485s algparse -v2 'esp=aes0-sha1' 485s ERROR: ESP encryption key length is zero 485s algparse -v2 'esp=aes-0-sha1' 485s ERROR: ESP encryption key length is zero 485s algparse -v2 'esp=aes512-sha1' 485s ERROR: ESP encryption algorithm AES_CBC with key length 512 invalid; valid key lengths: 128, 192, 256 485s algparse -v2 'esp=aes-sha1555' 485s ERROR: ESP integrity algorithm 'sha1555' is not recognized 485s algparse -v2 'esp=camellia666-sha1' 485s ERROR: ESP encryption algorithm CAMELLIA_CBC with key length 666 invalid; valid key lengths: 128, 192, 256 485s algparse -v2 'esp=blowfish' 485s ERROR: ESP encryption algorithm 'blowfish' is not supported 485s algparse -v2 'esp=des-sha1' 485s ERROR: ESP encryption algorithm 'des' is not supported 485s algparse -v2 'esp=aes_ctr666' 485s ERROR: ESP encryption algorithm AES_CTR with key length 666 invalid; valid key lengths: 128, 192, 256 485s algparse -v2 'esp=aes128-sha2_128' 485s ERROR: ESP integrity algorithm 'sha2_128' is not recognized 485s algparse -v2 'esp=aes256-sha2_256-4096' 485s ERROR: ESP DH algorithm '4096' is not recognized 485s algparse -v2 'esp=aes256-sha2_256-128' 485s ERROR: ESP DH algorithm '128' is not recognized 485s algparse -v2 'esp=vanitycipher' 485s ERROR: ESP encryption algorithm 'vanitycipher' is not recognized 485s algparse -v2 'esp=ase-sah' 485s ERROR: ESP encryption algorithm 'ase' is not recognized 485s algparse -v2 'esp=aes-sah1' 485s ERROR: ESP integrity algorithm 'sah1' is not recognized 485s algparse -v2 'esp=id3' 485s ERROR: ESP encryption algorithm 'id3' is not recognized 485s algparse -v2 'esp=aes-id3' 485s ERROR: ESP integrity algorithm 'id3' is not recognized 485s algparse -v2 'esp=aes_gcm-md5' 485s ERROR: AEAD ESP encryption algorithm AES_GCM_16 must have 'NONE' as the integrity algorithm 485s algparse -v2 'esp=mars' 485s ERROR: ESP encryption algorithm 'mars' is not supported 485s algparse -v2 'esp=aes_gcm-16' 485s ERROR: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 485s algparse -v2 'esp=aes_gcm-0' 485s ERROR: ESP encryption key length is zero 485s algparse -v2 'esp=aes_gcm-123456789012345' 485s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for ESP 485s | proposal: 'aes-sha1-modp8192' 485s | token: '' '' "aes" '-' 485s | token: '' "aes" '-' "sha1" '-' 485s | token: '-' "sha1" '-' "modp8192" '' 485s | appending ESP encryption algorithm AES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: '-' "modp8192" '' '' 485s | parsing dh: 485s | appending ESP DH algorithm MODP8192[_0] 485s | token: '' '' '' 485s | proposal: 'aes-sha1-modp8192' 485s | token: '' '' "aes" '-' 485s | token: '' "aes" '-' "sha1" '-' 485s | token: '-' "sha1" '-' "modp8192" '' 485s | appending ESP encryption algorithm AES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: '-' "modp8192" '' '' 485s | parsing dh: 485s | appending ESP DH algorithm MODP8192[_0] 485s | token: '' '' '' 485s | proposal: 'aes-sha1-modp8192' 485s | token: '' '' "aes" '-' 485s | token: '' "aes" '-' "sha1" '-' 485s | token: '-' "sha1" '-' "modp8192" '' 485s | appending ESP encryption algorithm AES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: '-' "modp8192" '' '' 485s | parsing dh: 485s | appending ESP DH algorithm MODP8192[_0] 485s | token: '' '' '' 485s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 485s | parsing 'aes;none' for ESP 485s | proposal: 'aes;none' 485s | token: '' '' "aes" ';' 485s | token: '' "aes" ';' "none" '' 485s | token: ';' "none" '' '' 485s | appending ESP encryption algorithm AES_CBC[_0] 485s | parsing dh: 485s | appending ESP DH algorithm NONE[_0] 485s | token: '' '' '' 485s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 485s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 485s algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 485s | parsing 'aes;none,aes' for ESP 485s | proposal: 'aes;none' 485s | token: '' '' "aes" ';' 485s | token: '' "aes" ';' "none" '' 485s | token: ';' "none" '' '' 485s | appending ESP encryption algorithm AES_CBC[_0] 485s | parsing dh: 485s | appending ESP DH algorithm NONE[_0] 485s | token: '' '' '' 485s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 485s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 485s | proposal: 'aes' 485s | token: '' '' "aes" '' 485s | token: '' "aes" '' '' 485s | token: '' '' '' 485s | appending ESP encryption algorithm AES_CBC[_0] 485s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 485s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 485s algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 485s | parsing 'aes;none,aes;modp2048' for ESP 485s | proposal: 'aes;none' 485s | token: '' '' "aes" ';' 485s | token: '' "aes" ';' "none" '' 485s | token: ';' "none" '' '' 485s | appending ESP encryption algorithm AES_CBC[_0] 485s | parsing dh: 485s | appending ESP DH algorithm NONE[_0] 485s | token: '' '' '' 485s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 485s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 485s | proposal: 'aes;modp2048' 485s | token: '' '' "aes" ';' 485s | token: '' "aes" ';' "modp2048" '' 485s | token: ';' "modp2048" '' '' 485s | appending ESP encryption algorithm AES_CBC[_0] 485s | parsing dh: 485s | appending ESP DH algorithm MODP2048[_0] 485s | token: '' '' '' 485s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 485s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 485s algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 485s algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 485s | parsing 'aes-sha1-none' for ESP 485s | proposal: 'aes-sha1-none' 485s | token: '' '' "aes" '-' 485s | token: '' "aes" '-' "sha1" '-' 485s | token: '-' "sha1" '-' "none" '' 485s | appending ESP encryption algorithm AES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: '-' "none" '' '' 485s | parsing dh: 485s | appending ESP DH algorithm NONE[_0] 485s | token: '' '' '' 485s algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 485s | parsing 'aes-sha1;none' for ESP 485s | proposal: 'aes-sha1;none' 485s | token: '' '' "aes" '-' 485s | token: '' "aes" '-' "sha1" ';' 485s | token: '-' "sha1" ';' "none" '' 485s | appending ESP encryption algorithm AES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: ';' "none" '' '' 485s | parsing dh: 485s | appending ESP DH algorithm NONE[_0] 485s | token: '' '' '' 485s algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 485s | parsing '3des168-sha1' for ESP 485s | proposal: '3des168-sha1' 485s | token: '' '' "3des168" '-' 485s | token: '' "3des168" '-' "sha1" '' 485s | ike_alg_byname() failed: ESP encryption algorithm '3des168' is not recognized 485s | parsing '3des-null' for ESP 485s | proposal: '3des-null' 485s | token: '' '' "3des" '-' 485s | token: '' "3des" '-' "null" '' 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm 3DES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes128-null' for ESP 485s | proposal: 'aes128-null' 485s | token: '' '' "aes128" '-' 485s | token: '' "aes128" '-' "null" '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 485s | token: '-' "null" '' '' 485s | appending ESP encryption algorithm AES_CBC[_128] 485s | parsing integ: 485s | appending ESP integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes224-sha1' for ESP 485s | proposal: 'aes224-sha1' 485s | token: '' '' "aes224" '-' 485s | token: '' "aes224" '-' "sha1" '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'aes224' is not recognized 485s | parsing 'aes-224-sha1' for ESP 485s | proposal: 'aes-224-sha1' 485s | token: '' '' "aes" '-' 485s | token: '' "aes" '-' "224" '-' 485s | byname('aes') with ='224' failed: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 485s | parsing 'aes0-sha1' for ESP 485s | proposal: 'aes0-sha1' 485s | token: '' '' "aes0" '-' 485s | token: '' "aes0" '-' "sha1" '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'aes0' is not recognized 485s | parsing 'aes-0-sha1' for ESP 485s | proposal: 'aes-0-sha1' 485s | token: '' '' "aes" '-' 485s | token: '' "aes" '-' "0" '-' 485s | parsing 'aes512-sha1' for ESP 485s | proposal: 'aes512-sha1' 485s | token: '' '' "aes512" '-' 485s | token: '' "aes512" '-' "sha1" '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'aes512' is not recognized 485s | parsing 'aes-sha1555' for ESP 485s | proposal: 'aes-sha1555' 485s | token: '' '' "aes" '-' 485s | token: '' "aes" '-' "sha1555" '' 485s | token: '-' "sha1555" '' '' 485s | appending ESP encryption algorithm AES_CBC[_0] 485s | parsing integ: 485s | ike_alg_byname() failed: ESP integrity algorithm 'sha1555' is not recognized 485s | lookup for integrity algorithm 'sha1555' failed 485s | or - failed 'ESP integrity algorithm 'sha1555' is not recognized') 485s | parsing 'camellia666-sha1' for ESP 485s | proposal: 'camellia666-sha1' 485s | token: '' '' "camellia666" '-' 485s | token: '' "camellia666" '-' "sha1" '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'camellia666' is not recognized 485s | parsing 'blowfish' for ESP 485s | proposal: 'blowfish' 485s | token: '' '' "blowfish" '' 485s | token: '' "blowfish" '' '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'blowfish' is not supported 485s | parsing 'des-sha1' for ESP 485s | proposal: 'des-sha1' 485s | token: '' '' "des" '-' 485s | token: '' "des" '-' "sha1" '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'des' is not supported 485s | parsing 'aes_ctr666' for ESP 485s | proposal: 'aes_ctr666' 485s | token: '' '' "aes_ctr666" '' 485s | token: '' "aes_ctr666" '' '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr666' is not recognized 485s | parsing 'aes128-sha2_128' for ESP 485s | proposal: 'aes128-sha2_128' 485s | token: '' '' "aes128" '-' 485s | token: '' "aes128" '-' "sha2_128" '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 485s | token: '-' "sha2_128" '' '' 485s | appending ESP encryption algorithm AES_CBC[_128] 485s | parsing integ: 485s | ike_alg_byname() failed: ESP integrity algorithm 'sha2_128' is not recognized 485s | lookup for integrity algorithm 'sha2_128' failed 485s | or - failed 'ESP integrity algorithm 'sha2_128' is not recognized') 485s | parsing 'aes256-sha2_256-4096' for ESP 485s | proposal: 'aes256-sha2_256-4096' 485s | token: '' '' "aes256" '-' 485s | token: '' "aes256" '-' "sha2_256" '-' 485s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 485s | token: '-' "sha2_256" '-' "4096" '' 485s | appending ESP encryption algorithm AES_CBC[_256] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 485s | token: '-' "4096" '' '' 485s | parsing dh: 485s | ike_alg_byname() failed: ESP DH algorithm '4096' is not recognized 485s | lookup for DH algorithm '4096' failed 485s | ... failed 'ESP DH algorithm '4096' is not recognized' 485s | parsing 'aes256-sha2_256-128' for ESP 485s | proposal: 'aes256-sha2_256-128' 485s | token: '' '' "aes256" '-' 485s | token: '' "aes256" '-' "sha2_256" '-' 485s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 485s | token: '-' "sha2_256" '-' "128" '' 485s | appending ESP encryption algorithm AES_CBC[_256] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 485s | token: '-' "128" '' '' 485s | parsing dh: 485s | ike_alg_byname() failed: ESP DH algorithm '128' is not recognized 485s | lookup for DH algorithm '128' failed 485s | ... failed 'ESP DH algorithm '128' is not recognized' 485s | parsing 'vanitycipher' for ESP 485s | proposal: 'vanitycipher' 485s | token: '' '' "vanitycipher" '' 485s | token: '' "vanitycipher" '' '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'vanitycipher' is not recognized 485s | parsing 'ase-sah' for ESP 485s | proposal: 'ase-sah' 485s | token: '' '' "ase" '-' 485s | token: '' "ase" '-' "sah" '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'ase' is not recognized 485s | parsing 'aes-sah1' for ESP 485s | proposal: 'aes-sah1' 485s | token: '' '' "aes" '-' 485s | token: '' "aes" '-' "sah1" '' 485s | token: '-' "sah1" '' '' 485s | appending ESP encryption algorithm AES_CBC[_0] 485s | parsing integ: 485s | ike_alg_byname() failed: ESP integrity algorithm 'sah1' is not recognized 485s | lookup for integrity algorithm 'sah1' failed 485s | or - failed 'ESP integrity algorithm 'sah1' is not recognized') 485s | parsing 'id3' for ESP 485s | proposal: 'id3' 485s | token: '' '' "id3" '' 485s | token: '' "id3" '' '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 485s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 485s | parsing 'aes-id3' for ESP 485s | proposal: 'aes-id3' 485s | token: '' '' "aes" '-' 485s | token: '' "aes" '-' "id3" '' 485s | token: '-' "id3" '' '' 485s | appending ESP encryption algorithm AES_CBC[_0] 485s | parsing integ: 485s | ike_alg_byname() failed: ESP integrity algorithm 'id3' is not recognized 485s | lookup for integrity algorithm 'id3' failed 485s | or - failed 'ESP integrity algorithm 'id3' is not recognized') 485s | parsing 'aes_gcm-md5' for ESP 485s | proposal: 'aes_gcm-md5' 485s | token: '' '' "aes_gcm" '-' 485s | token: '' "aes_gcm" '-' "md5" '' 485s | token: '-' "md5" '' '' 485s | appending ESP encryption algorithm AES_GCM_16[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_MD5_96[_0] 485s | token: '' '' '' 485s | parsing 'mars' for ESP 485s | proposal: 'mars' 485s | token: '' '' "mars" '' 485s | token: '' "mars" '' '' 485s | ike_alg_byname() failed: ESP encryption algorithm 'mars' is not supported 485s | parsing 'aes_gcm-16' for ESP 485s | proposal: 'aes_gcm-16' 485s | token: '' '' "aes_gcm" '-' 485s | token: '' "aes_gcm" '-' "16" '' 485s | byname('aes_gcm') with ='16' failed: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 485s | parsing 'aes_gcm-0' for ESP 485s | proposal: 'aes_gcm-0' 485s | token: '' '' "aes_gcm" '-' 485s | token: '' "aes_gcm" '-' "0" '' 485s | parsing 'aes_gcm-123456789012345' for ESP 485s | proposal: 'aes_gcm-123456789012345' 485s | token: '' '' "aes_gcm" '-' 485s | token: '' "aes_gcm" '-' "123456789012345" '' 485s | parsing '3des-sha1;dh22' for ESP 485s | proposal: '3des-sha1;dh22' 485s | token: '' '' "3des" '-' 485s | token: '' "3des" '-' "sha1" ';' 485s | token: '-' "sha1" ';' "dh22" '' 485s | appending ESP encryption algorithm 3DES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: ';' "dh22" '' '' 485s | parsing dh: 485s | ike_alg_byname() failed: ESP DH algorithm 'dh22' is not supported 485s | lookup for DH algorithm 'dh22' failed 485s | ... failed 'ESP DH algorithm 'dh22' is not supported' 485s | parsing '3des-sha1;modp8192,3des-sha2' for ESP 485s | proposal: '3des-sha1;modp8192' 485s | token: '' '' "3des" '-' 485s | token: '' "3des" '-' "sha1" ';' 485s | token: '-' "sha1" ';' "modp8192" '' 485s | appending ESP encryption algorithm 3DES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: ';' "modp8192" '' '' 485s | parsing dh: 485s | appending ESP DH algorithm MODP8192[_0] 485s | token: '' '' '' 485s | proposal: '3des-sha2' 485s | token: '' '' "3des" '-' 485s | token: '' "3des" '-' "sha2" '' 485s | token: '-' "sha2" '' '' 485s | appending ESP encryption algorithm 3DES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 485s | token: '' '' '' 485s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 485s | parsing '3des-sha1-modp8192,3des-sha2' for ESP 485s | proposal: '3des-sha1-modp8192' 485s | token: '' '' "3des" '-' 485s | token: '' "3des" '-' "sha1" '-' 485s | token: '-' "sha1" '-' "modp8192" '' 485s | appending ESP encryption algorithm 3DES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: '-' "modp8192" '' '' 485s | parsing dh: 485s | appending ESP DH algorithm MODP8192[_0] 485s | token: '' '' '' 485s | proposal: '3des-sha2' 485s | token: '' '' "3des" '-' 485s | token: '' "3des" '-' "sha2" '' 485s | token: '-' "sha2" '' '' 485s | appending ESP encryption algorithm 3DES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 485s | token: '' '' '' 485s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 485s | parsing '3des-sha1-modp8192,3des-sha2-modp8192' for ESP 485s | proposal: '3des-sha1-modp8192' 485s | token: '' '' "3des" '-' 485s | token: '' "3des" '-' "sha1" '-' 485s | token: '-' "sha1" '-' "modp8192" '' 485s | appending ESP encryption algorithm 3DES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: '-' "modp8192" '' '' 485s | parsing dh: 485s | appending ESP DH algorithm MODP8192[_0] 485s | token: '' '' '' 485s | proposal: '3des-sha2-modp8192' 485s | token: '' '' "3des" '-' 485s | token: '' "3des" '-' "sha2" '-' 485s | token: '-' "sha2" '-' "modp8192" '' 485s | appending ESP encryption algorithm 3DES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 485s | token: '-' "modp8192" '' '' 485s | parsing dh: 485s | appending ESP DH algorithm MODP8192[_0] 485s | token: '' '' '' 485s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 485s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 485s | parsing '3des-sha1-modp8192,3des-sha2;modp8192' for ESP 485s | proposal: '3des-sha1-modp8192' 485s | token: '' '' "3des" '-' 485s | token: '' "3des" '-' "sha1" '-' 485s | token: '-' "sha1" '-' "modp8192" '' 485s | appending ESP encryption algorithm 3DES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: '-' "modp8192" '' '' 485s | parsing dh: 485s | appending ESP DH algorithm MODP8192[_0] 485s | token: '' '' '' 485s | proposal: '3des-sha2;modp8192' 485s | token: '' '' "3des" '-' 485s | token: '' "3des" '-' "sha2" ';' 485s | token: '-' "sha2" ';' "modp8192" '' 485s | appending ESP encryption algorithm 3DES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 485s | token: ';' "modp8192" '' '' 485s | parsing dh: 485s | appending ESP DH algorithm MODP8192[_0] 485s | token: '' '' '' 485s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 485s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 485s | parsing '3des-sha1;modp8192,3des-sha2-modp8192' for ESP 485s | proposal: '3des-sha1;modp8192' 485s | token: '' '' "3des" '-' 485s | token: '' "3des" '-' "sha1" ';' 485s | token: '-' "sha1" ';' "modp8192" '' 485s | appending ESP encryption algorithm 3DES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: ';' "modp8192" '' '' 485s | parsing dh: 485s | appending ESP DH algorithm MODP8192[_0] 485s | token: '' '' '' 485s | proposal: '3des-sha2-modp8192' 485s | token: '' '' "3des" '-' 485s | token: '' "3des" '-' "sha2" '-' 485s | token: '-' "sha2" '-' "modp8192" '' 485s | appending ESP encryption algorithm 3DES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 485s | token: '-' "modp8192" '' '' 485s | parsing dh: 485s | appending ESP DH algorithm MODP8192[_0] 485s | token: '' '' '' 485s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 485s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 485s | parsing '3des-sha1;modp8192,3des-sha2;modp8192' for ESP 485s | proposal: '3des-sha1;modp8192' 485s | token: '' '' "3des" '-' 485s | token: '' "3des" '-' "sha1" ';' 485s | token: '-' "sha1" ';' "modp8192" '' 485s | appending ESP encryption algorithm 3DES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: ';' "modp8192" '' '' 485s | parsing dh: 485s | appending ESP DH algorithm MODP8192[_0] 485s | token: '' '' '' 485s | proposal: '3des-sha2;modp8192' 485s | token: '' '' "3des" '-' 485s | token: '' "3des" '-' "sha2" ';' 485s | token: '-' "sha2" ';' "modp8192" '' 485s | appending ESP encryption algorithm 3DES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 485s | token: ';' "modp8192" '' '' 485s | parsing dh: 485s | appending ESP DH algorithm MODP8192[_0] 485s | token: '' '' '' 485s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 485s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 485s | parsing '3des-sha1-modp8192,3des-sha2-modp2048' for ESP 485s | proposal: '3des-sha1-modp8192' 485s | token: '' '' "3des" '-' 485s | token: '' "3des" '-' "sha1" '-' 485s | token: '-' "sha1" '-' "modp8192" '' 485s | appending ESP encryption algorithm 3DES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 485s | token: '-' "modp8192" '' '' 485s | parsing dh: 485s | appending ESP DH algorithm MODP8192[_0] 485s | token: '' '' '' 485s | proposal: '3des-sha2-modp2048' 485s | token: '' '' "3des" '-' 485s | token: '' "3des" '-' "sha2" '-' 485s | token: '-' "sha2" '-' "modp2048" '' 485s | appending ESP encryption algorithm 3DES_CBC[_0] 485s | parsing integ: 485s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 485s | token: '-' "modp2048" '' '' 485s | parsing dh: 485s | appending ESP DH algorithm MODP2048[_0] 485s | token: '' '' '' 485s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 485s algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 485s | parsing 'SHA2_512_256,SHA2_256_128,SHA1_96' for AH 485s | proposal: 'SHA2_512_256' 485s | token: '' '' "SHA2_512_256" '' 485s | token: '' "SHA2_512_256" '' '' 485s | parsing integ: 485s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 485s | token: '' '' '' 485s | proposal: 'SHA2_256_128' 485s | token: '' '' "SHA2_256_128" '' 485s | token: '' "SHA2_256_128" '' '' 485s | parsing integ: 485s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 485s | token: '' '' '' 485s | proposal: 'SHA1_96' 485s | token: '' '' "SHA1_96" '' 485s | token: '' "SHA1_96" '' '' 485s | parsing integ: 485s | appending AH integrity algorithm HMAC_SHA1_96[_0] 485s | token: '' '' '' 485s | parsing '' for AH 485s | parsing 'md5' for AH 485s | proposal: 'md5' 485s | token: '' '' "md5" '' 485s | token: '' "md5" '' '' 485s | parsing integ: 485s | appending AH integrity algorithm HMAC_MD5_96[_0] 485s | token: '' '' '' 485s | parsing 'sha' for AH 485s | proposal: 'sha' 485s | token: '' '' "sha" '' 485s | token: '' "sha" '' '' 485s | parsing integ: 485s | appending AH integrity algorithm HMAC_SHA1_96[_0] 485s | token: '' '' '' 485s | parsing 'sha;modp2048' for AH 485s | proposal: 'sha;modp2048' 485s | token: '' '' "sha" ';' 485s | token: '' "sha" ';' "modp2048" '' 485s | parsing integ: 485s | appending AH integrity algorithm HMAC_SHA1_96[_0] 485s | token: ';' "modp2048" '' '' 485s | parsing dh: 485s | appending AH DH algorithm MODP2048[_0] 485s | token: '' '' '' 485s algparse: ignoring AH DH algorithm MODP2048 as PFS policy is disabled 485s | parsing 'sha1' for AH 485s | proposal: 'sha1' 485s | token: '' '' "sha1" '' 485s | token: '' "sha1" '' '' 485s | parsing integ: 485s | appending AH integrity algorithm HMAC_SHA1_96[_0] 485s | token: '' '' '' 485s | parsing 'sha2' for AH 485s | proposal: 'sha2' 485s | token: '' '' "sha2" '' 485s | token: '' "sha2" '' '' 485s | parsing integ: 485s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 485s | token: '' '' '' 485s | parsing 'sha256' for AH 485s | proposal: 'sha256' 485s | token: '' '' "sha256" '' 485s | token: '' "sha256" '' '' 485s | parsing integ: 485s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 485s | token: '' '' '' 485s | parsing 'sha384' for AH 485s | proposal: 'sha384' 485s | token: '' '' "sha384" '' 485s | token: '' "sha384" '' '' 485s | parsing integ: 485s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 485s | token: '' '' '' 485s | parsing 'sha512' for AH 485s | proposal: 'sha512' 485s | token: '' '' "sha512" '' 485s | token: '' "sha512" '' '' 485s | parsing integ: 485s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 485s | token: '' '' '' 485s | parsing 'sha2_256' for AH 485s | proposal: 'sha2_256' 485s | token: '' '' "sha2_256" '' 485s | token: '' "sha2_256" '' '' 485s | parsing integ: 485s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 485s | token: '' '' '' 485s | parsing 'sha2_384' for AH 485s | proposal: 'sha2_384' 485s | token: '' '' "sha2_384" '' 485s | token: '' "sha2_384" '' '' 485s | parsing integ: 485s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 485s | token: '' '' '' 485s | parsing 'sha2_512' for AH 485s | proposal: 'sha2_512' 485s | token: '' '' "sha2_512" '' 485s | token: '' "sha2_512" '' '' 485s | parsing integ: 485s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 485s | token: '' '' '' 485s | parsing 'aes_xcbc' for AH 485s | proposal: 'aes_xcbc' 485s | token: '' '' "aes_xcbc" '' 485s | token: '' "aes_xcbc" '' '' 485s | parsing integ: 485s | appending AH integrity algorithm AES_XCBC_96[_0] 485s | token: '' '' '' 485s | parsing 'sha2-none' for AH 485s | proposal: 'sha2-none' 485s | token: '' '' "sha2" '-' 485s | token: '' "sha2" '-' "none" '' 485s | parsing integ: 485s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 485s | token: '-' "none" '' '' 485s | parsing dh: 485s | appending AH DH algorithm NONE[_0] 485s | token: '' '' '' 485s algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 485s | parsing 'sha2;none' for AH 485s | proposal: 'sha2;none' 485s | token: '' '' "sha2" ';' 485s | token: '' "sha2" ';' "none" '' 485s | parsing integ: 485s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 485s | token: ';' "none" '' '' 485s | parsing dh: 485s | appending AH DH algorithm NONE[_0] 485s | token: '' '' '' 485s algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 485s | parsing 'sha1-modp8192,sha1-modp8192,sha1-modp8192' for AH 485s | proposal: 'sha1-modp8192' 485s | token: '' '' "sha1" '-' 485s | token: '' "sha1" '-' "modp8192" '' 485s | parsing integ: 485s | appending AH integrity algorithm HMAC_SHA1_96[_0] 485s | token: '-' "modp8192" '' '' 485s | parsing dh: 485s | appending AH DH algorithm MODP8192[_0] 485s | token: '' '' '' 485s | proposal: 'sha1-modp8192' 485s | token: '' '' "sha1" '-' 485s | token: '' "sha1" '-' "modp8192" '' 485s | parsing integ: 485s | appending AH integrity algorithm HMAC_SHA1_96[_0] 485s | token: '-' "modp8192" '' '' 485s | parsing dh: 485s | appending AH DH algorithm MODP8192[_0] 485s | token: '' '' '' 485s | proposal: 'sha1-modp8192' 485s | token: '' '' "sha1" '-' 485s | token: '' "sha1" '-' "modp8192" '' 485s | parsing integ: 485s | appending AH integrity algorithm HMAC_SHA1_96[_0] 485s | token: '-' "modp8192" '' '' 485s | parsing dh: 485s | appending AH DH algorithm MODP8192[_0] 485s | token: '' '' '' 485s algparse: ignoring AH DH algorithm MODP8192 as PFS policy is disabled 485s | parsing 'aes-sha1' for AH 485s | proposal: 'aes-sha1' 485s | token: '' '' "aes" '-' 485s | token: '' "aes" '-' "sha1" '' 485s | parsing integ: 485s | ike_alg_byname() failed: AH integrity algorithm 'aes' is not recognized 485s | lookup for integrity algorithm 'aes' failed 485s | or - failed 'AH integrity algorithm 'aes' is not recognized') 485s | parsing 'vanityhash1' for AH 485s | proposal: 'vanityhash1' 485s | token: '' '' "vanityhash1" '' 485s | token: '' "vanityhash1" '' '' 485s | parsing integ: 485s | ike_alg_byname() failed: AH integrity algorithm 'vanityhash1' is not recognized 485s | lookup for integrity algorithm 'vanityhash1' failed 485s | or - failed 'AH integrity algorithm 'vanityhash1' is not recognized') 485s | parsing 'aes_gcm_c-256' for AH 485s | proposal: 'aes_gcm_c-256' 485s | token: '' '' "aes_gcm_c" '-' 485s | token: '' "aes_gcm_c" '-' "256" '' 485s | parsing integ: 485s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm_c' is not recognized 485s | lookup for integrity algorithm 'aes_gcm_c' failed 485s | or - failed 'AH integrity algorithm 'aes_gcm_c' is not recognized') 485s | parsing 'id3' for AH 485s | proposal: 'id3' 485s | token: '' '' "id3" '' 485s | token: '' "id3" '' '' 485s | parsing integ: 485s | ike_alg_byname() failed: AH integrity algorithm 'id3' is not recognized 485s | lookup for integrity algorithm 'id3' failed 485s | or - failed 'AH integrity algorithm 'id3' is not recognized') 485s | parsing '3des' for AH 485s | proposal: '3des' 485s | token: '' '' "3des" '' 485s | token: '' "3des" '' '' 485s | parsing integ: 485s | ike_alg_byname() failed: AH integrity algorithm '3des' is not recognized 485s | lookup for integrity algorithm '3des' failed 485s | or - failed 'AH integrity algorithm '3des' is not recognized') 485s | parsing 'null' for AH 485s | proposal: 'null' 485s | token: '' '' "null" '' 485s | token: '' "null" '' '' 485s | parsing integ: 485s | appending AH integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | parsing 'aes_gcm' for AH 485s | proposal: 'aes_gcm' 485s | token: '' '' "aes_gcm" '' 485s | token: '' "aes_gcm" '' '' 485s | parsing integ: 485s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm' is not recognized 485s | lookup for integrity algorithm 'aes_gcm' failed 485s | or - failed 'AH integrity algorithm 'aes_gcm' is not recognized') 485s | parsing 'aes_ccm' for AH 485s | proposal: 'aes_ccm' 485s | token: '' '' "aes_ccm" '' 485s | token: '' "aes_ccm" '' '' 485s | parsing integ: 485s | ike_alg_byname() failed: AH integrity algorithm 'aes_ccm' is not recognized 485s | lookup for integrity algorithm 'aes_ccm' failed 485s | or - failed 'AH integrity algorithm 'aes_ccm' is not recognized') 485s | parsing 'ripemd' for AH 485s | proposal: 'ripemd' 485s | token: '' '' "ripemd" '' 485s | token: '' "ripemd" '' '' 485s | parsing integ: 485s | ike_alg_byname() failed: AH integrity algorithm 'ripemd' is not recognized 485s | lookup for integrity algorithm 'ripemd' failed 485s | or - failed 'AH integrity algorithm 'ripemd' is not recognized') 485s | parsing 'AES_GCM_16_256,AES_GCM_16_128,AES_CBC_256,AES_CBC_128' for IKE 485s | proposal: 'AES_GCM_16_256' 485s | token: '' '' "AES_GCM_16_256" '' 485s | token: '' "AES_GCM_16_256" '' '' 485s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_256' is not recognized 485s | token: '' '' '' 485s | appending IKE encryption algorithm AES_GCM_16[_256] 485s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 485s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 485s | appending IKE integrity algorithm NONE[_0] 485s | appending IKE DH algorithm MODP2048[_0] 485s | appending IKE DH algorithm MODP3072[_0] 485s | appending IKE DH algorithm MODP4096[_0] 485s | appending IKE DH algorithm MODP8192[_0] 485s | appending IKE DH algorithm DH19[_0] 485s | appending IKE DH algorithm DH20[_0] 485s | appending IKE DH algorithm DH21[_0] 485s | appending IKE DH algorithm DH31[_0] 485s | proposal: 'AES_GCM_16_128' 485s | token: '' '' "AES_GCM_16_128" '' 485s | token: '' "AES_GCM_16_128" '' '' 485s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_128' is not recognized 485s | token: '' '' '' 485s | appending IKE encryption algorithm AES_GCM_16[_128] 485s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 485s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 485s | appending IKE integrity algorithm NONE[_0] 485s | appending IKE DH algorithm MODP2048[_0] 485s | appending IKE DH algorithm MODP3072[_0] 485s | appending IKE DH algorithm MODP4096[_0] 485s | appending IKE DH algorithm MODP8192[_0] 485s | appending IKE DH algorithm DH19[_0] 485s | appending IKE DH algorithm DH20[_0] 485s | appending IKE DH algorithm DH21[_0] 485s | appending IKE DH algorithm DH31[_0] 485s | proposal: 'AES_CBC_256' 485s | token: '' '' "AES_CBC_256" '' 485s | token: '' "AES_CBC_256" '' '' 485s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_256' is not recognized 485s | token: '' '' '' 485s | appending IKE encryption algorithm AES_CBC[_256] 485s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 485s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 485s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 485s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 485s | appending IKE DH algorithm MODP2048[_0] 485s | appending IKE DH algorithm MODP3072[_0] 485s | appending IKE DH algorithm MODP4096[_0] 485s | appending IKE DH algorithm MODP8192[_0] 485s | appending IKE DH algorithm DH19[_0] 485s | appending IKE DH algorithm DH20[_0] 485s | appending IKE DH algorithm DH21[_0] 485s | appending IKE DH algorithm DH31[_0] 485s | proposal: 'AES_CBC_128' 485s | token: '' '' "AES_CBC_128" '' 485s | token: '' "AES_CBC_128" '' '' 485s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_128' is not recognized 485s | token: '' '' '' 485s | appending IKE encryption algorithm AES_CBC[_128] 485s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 485s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 485s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 485s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 485s | appending IKE DH algorithm MODP2048[_0] 485s | appending IKE DH algorithm MODP3072[_0] 485s | appending IKE DH algorithm MODP4096[_0] 485s | appending IKE DH algorithm MODP8192[_0] 485s | appending IKE DH algorithm DH19[_0] 485s | appending IKE DH algorithm DH20[_0] 485s | appending IKE DH algorithm DH21[_0] 485s | appending IKE DH algorithm DH31[_0] 485s | parsing '' for IKE 485s | parsing '3des-sha1' for IKE 485s | proposal: '3des-sha1' 485s | token: '' '' "3des" '-' 485s | token: '' "3des" '-' "sha1" '' 485s | token: '-' "sha1" '' '' 485s | appending IKE encryption algorithm 3DES_CBC[_0] 485s | parsing prf: 485s | appending IKE PRF algorithm HMAC_SHA1[_0] 485s | token: '' '' '' 485s | - succeeded, advancing tokens 485s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 485s | appending IKE DH algorithm MODP2048[_0] 485s | appending IKE DH algorithm MODP3072[_0] 485s | appending IKE DH algorithm MODP4096[_0] 485s | appending IKE DH algorithm MODP8192[_0] 485s | appending IKE DH algorithm DH19[_0] 485s | appending IKE DH algorithm DH20[_0] 485s | appending IKE DH algorithm DH21[_0] 485s | appending IKE DH algorithm DH31[_0] 485s | parsing '3des-sha1' for IKE 485s | proposal: '3des-sha1' 485s | token: '' '' "3des" '-' 485s | token: '' "3des" '-' "sha1" '' 485s | token: '-' "sha1" '' '' 485s | appending IKE encryption algorithm 3DES_CBC[_0] 485s | parsing prf: 485s | appending IKE PRF algorithm HMAC_SHA1[_0] 485s | token: '' '' '' 485s | - succeeded, advancing tokens 485s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 485s | appending IKE DH algorithm MODP2048[_0] 485s | appending IKE DH algorithm MODP3072[_0] 485s | appending IKE DH algorithm MODP4096[_0] 485s | appending IKE DH algorithm MODP8192[_0] 485s | appending IKE DH algorithm DH19[_0] 485s | appending IKE DH algorithm DH20[_0] 485s | appending IKE DH algorithm DH21[_0] 485s | appending IKE DH algorithm DH31[_0] 485s | parsing '3des-sha1;modp1536' for IKE 485s | proposal: '3des-sha1;modp1536' 485s | token: '' '' "3des" '-' 485s | token: '' "3des" '-' "sha1" ';' 485s | token: '-' "sha1" ';' "modp1536" '' 485s | appending IKE encryption algorithm 3DES_CBC[_0] 485s | parsing prf: 485s | appending IKE PRF algorithm HMAC_SHA1[_0] 485s | token: ';' "modp1536" '' '' 485s | - succeeded, advancing tokens 485s | parsing dh: 485s | appending IKE DH algorithm MODP1536[_0] 485s | token: '' '' '' 485s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 485s | parsing '3des;dh21' for IKE 485s | proposal: '3des;dh21' 485s | token: '' '' "3des" ';' 485s | token: '' "3des" ';' "dh21" '' 485s | token: ';' "dh21" '' '' 485s | appending IKE encryption algorithm 3DES_CBC[_0] 485s | parsing dh: 485s | appending IKE DH algorithm DH21[_0] 485s | token: '' '' '' 485s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 485s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 485s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 485s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 485s | parsing '3des-sha1;dh21' for IKE 485s | proposal: '3des-sha1;dh21' 485s | token: '' '' "3des" '-' 485s | token: '' "3des" '-' "sha1" ';' 485s | token: '-' "sha1" ';' "dh21" '' 485s | appending IKE encryption algorithm 3DES_CBC[_0] 485s | parsing prf: 485s | appending IKE PRF algorithm HMAC_SHA1[_0] 485s | token: ';' "dh21" '' '' 485s | - succeeded, advancing tokens 485s | parsing dh: 485s | appending IKE DH algorithm DH21[_0] 485s | token: '' '' '' 485s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 485s | parsing '3des-sha1-ecp_521' for IKE 485s | proposal: '3des-sha1-ecp_521' 485s | token: '' '' "3des" '-' 485s | token: '' "3des" '-' "sha1" '-' 485s | token: '-' "sha1" '-' "ecp_521" '' 485s | appending IKE encryption algorithm 3DES_CBC[_0] 485s | parsing prf: 485s | appending IKE PRF algorithm HMAC_SHA1[_0] 485s | token: '-' "ecp_521" '' '' 485s | - succeeded, advancing tokens 485s | parsing dh: 485s | appending IKE DH algorithm DH21[_0] 485s | token: '' '' '' 485s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 485s | parsing '3des+aes' for IKE 485s | proposal: '3des+aes' 485s | token: '' '' "3des" '+' 485s | token: '' "3des" '+' "aes" '' 485s | token: '+' "aes" '' '' 485s | appending IKE encryption algorithm 3DES_CBC[_0] 485s | token: '' '' '' 485s | appending IKE encryption algorithm AES_CBC[_0] 485s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 485s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 485s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 485s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 485s | appending IKE DH algorithm MODP2048[_0] 485s | appending IKE DH algorithm MODP3072[_0] 485s | appending IKE DH algorithm MODP4096[_0] 485s | appending IKE DH algorithm MODP8192[_0] 485s | appending IKE DH algorithm DH19[_0] 485s | appending IKE DH algorithm DH20[_0] 485s | appending IKE DH algorithm DH21[_0] 485s | appending IKE DH algorithm DH31[_0] 485s | parsing 'aes;none' for IKE 485s | proposal: 'aes;none' 485s | token: '' '' "aes" ';' 485s | token: '' "aes" ';' "none" '' 485s | token: ';' "none" '' '' 485s | appending IKE encryption algorithm AES_CBC[_0] 485s | parsing dh: 485s | appending IKE DH algorithm NONE[_0] 485s | token: '' '' '' 485s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 485s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 485s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 485s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 485s | parsing 'id2' for IKE 485s | proposal: 'id2' 485s | token: '' '' "id2" '' 485s | token: '' "id2" '' '' 485s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 485s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 485s | parsing '3des-id2' for IKE 485s | proposal: '3des-id2' 485s | token: '' '' "3des" '-' 485s | token: '' "3des" '-' "id2" '' 485s | token: '-' "id2" '' '' 485s | appending IKE encryption algorithm 3DES_CBC[_0] 485s | parsing prf: 485s | ike_alg_byname() failed: IKE PRF algorithm 'id2' is not recognized 485s | lookup for PRF algorithm 'id2' failed 485s | - failed, saving error 'IKE PRF algorithm 'id2' is not recognized' and tossing result 485s | parsing integ: 485s | ike_alg_byname() failed: IKE integrity algorithm 'id2' is not recognized 485s | lookup for integrity algorithm 'id2' failed 485s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'id2' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'id2' is not recognized') 485s | parsing 'aes_ccm' for IKE 485s | proposal: 'aes_ccm' 485s | token: '' '' "aes_ccm" '' 485s | token: '' "aes_ccm" '' '' 485s | alg_byname_ok() failed: IKE encryption algorithm 'aes_ccm' is not supported 485s | parsing 'aes-sha1-sha2-ecp_521' for IKE 485s | proposal: 'aes-sha1-sha2-ecp_521' 485s | token: '' '' "aes" '-' 485s | token: '' "aes" '-' "sha1" '-' 485s | token: '-' "sha1" '-' "sha2" '-' 485s | appending IKE encryption algorithm AES_CBC[_0] 485s | parsing prf: 485s | appending IKE PRF algorithm HMAC_SHA1[_0] 485s | token: '-' "sha2" '-' "ecp_521" '' 485s | - succeeded, advancing tokens 485s | parsing dh: 485s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 485s | lookup for DH algorithm 'sha2' failed 485s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 485s | parsing 'aes-sha2-sha2;ecp_521' for IKE 485s | proposal: 'aes-sha2-sha2;ecp_521' 485s | token: '' '' "aes" '-' 485s | token: '' "aes" '-' "sha2" '-' 485s | token: '-' "sha2" '-' "sha2" ';' 485s | appending IKE encryption algorithm AES_CBC[_0] 485s | parsing prf: 485s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 485s | token: '-' "sha2" ';' "ecp_521" '' 485s | - succeeded, advancing tokens 485s | parsing dh: 485s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 485s | lookup for DH algorithm 'sha2' failed 485s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 485s | parsing 'aes-sha1_96-sha2-ecp_521' for IKE 485s | proposal: 'aes-sha1_96-sha2-ecp_521' 485s | token: '' '' "aes" '-' 485s | token: '' "aes" '-' "sha1_96" '-' 485s | token: '-' "sha1_96" '-' "sha2" '-' 485s | appending IKE encryption algorithm AES_CBC[_0] 485s | parsing prf: 485s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 485s | lookup for PRF algorithm 'sha1_96' failed 485s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 485s | parsing integ: 485s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 485s | token: '-' "sha2" '-' "ecp_521" '' 485s | parsing prf: 485s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 485s | token: '-' "ecp_521" '' '' 485s | parsing dh: 485s | appending IKE DH algorithm DH21[_0] 485s | token: '' '' '' 485s | parsing 'aes-sha1_96-sha2;ecp_521' for IKE 485s | proposal: 'aes-sha1_96-sha2;ecp_521' 485s | token: '' '' "aes" '-' 485s | token: '' "aes" '-' "sha1_96" '-' 485s | token: '-' "sha1_96" '-' "sha2" ';' 485s | appending IKE encryption algorithm AES_CBC[_0] 485s | parsing prf: 485s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 485s | lookup for PRF algorithm 'sha1_96' failed 485s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 485s | parsing integ: 485s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 485s | token: '-' "sha2" ';' "ecp_521" '' 485s | parsing prf: 485s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 485s | token: ';' "ecp_521" '' '' 485s | parsing dh: 485s | appending IKE DH algorithm DH21[_0] 485s | token: '' '' '' 485s | parsing 'aes+aes-sha1+sha1-modp8192+modp8192' for IKE 485s | proposal: 'aes+aes-sha1+sha1-modp8192+modp8192' 485s | token: '' '' "aes" '+' 485s | token: '' "aes" '+' "aes" '-' 485s | token: '+' "aes" '-' "sha1" '+' 485s | appending IKE encryption algorithm AES_CBC[_0] 485s | token: '-' "sha1" '+' "sha1" '-' 485s | appending IKE encryption algorithm AES_CBC[_0] 485s algparse: discarding duplicate IKE encryption algorithm AES_CBC 485s | parsing prf: 485s | appending IKE PRF algorithm HMAC_SHA1[_0] 485s | token: '+' "sha1" '-' "modp8192" '+' 485s | appending IKE PRF algorithm HMAC_SHA1[_0] 485s | token: '-' "modp8192" '+' "modp8192" '' 485s algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 485s | - succeeded, advancing tokens 485s | parsing dh: 485s | appending IKE DH algorithm MODP8192[_0] 485s | token: '+' "modp8192" '' '' 485s | appending IKE DH algorithm MODP8192[_0] 485s | token: '' '' '' 485s algparse: discarding duplicate IKE DH algorithm MODP8192 485s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 485s | parsing '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' for IKE 485s | proposal: '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' 485s | token: '' '' "3des" '+' 485s | token: '' "3des" '+' "aes" '+' 485s | token: '+' "aes" '+' "aes" '-' 485s | appending IKE encryption algorithm 3DES_CBC[_0] 485s | token: '+' "aes" '-' "sha2" '+' 485s | appending IKE encryption algorithm AES_CBC[_0] 485s | token: '-' "sha2" '+' "sha1" '+' 485s | appending IKE encryption algorithm AES_CBC[_0] 485s algparse: discarding duplicate IKE encryption algorithm AES_CBC 485s | parsing prf: 485s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 485s | token: '+' "sha1" '+' "sha1" '-' 485s | appending IKE PRF algorithm HMAC_SHA1[_0] 485s | token: '+' "sha1" '-' "modp4096" '+' 485s | appending IKE PRF algorithm HMAC_SHA1[_0] 485s | token: '-' "modp4096" '+' "modp8192" '+' 485s algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 485s | - succeeded, advancing tokens 485s | parsing dh: 485s | appending IKE DH algorithm MODP4096[_0] 485s | token: '+' "modp8192" '+' "modp8192" '' 485s | appending IKE DH algorithm MODP8192[_0] 485s | token: '+' "modp8192" '' '' 485s | appending IKE DH algorithm MODP8192[_0] 485s | token: '' '' '' 485s algparse: discarding duplicate IKE DH algorithm MODP8192 485s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 485s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 485s | parsing 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' for IKE 485s | proposal: 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' 485s | token: '' '' "aes" '+' 485s | token: '' "aes" '+' "3des" '+' 485s | token: '+' "3des" '+' "aes" '-' 485s | appending IKE encryption algorithm AES_CBC[_0] 485s | token: '+' "aes" '-' "sha1" '+' 485s | appending IKE encryption algorithm 3DES_CBC[_0] 485s | token: '-' "sha1" '+' "sha2" '+' 485s | appending IKE encryption algorithm AES_CBC[_0] 485s algparse: discarding duplicate IKE encryption algorithm AES_CBC 485s | parsing prf: 485s | appending IKE PRF algorithm HMAC_SHA1[_0] 485s | token: '+' "sha2" '+' "sha1" '-' 485s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 485s | token: '+' "sha1" '-' "modp8192" '+' 485s | appending IKE PRF algorithm HMAC_SHA1[_0] 485s | token: '-' "modp8192" '+' "modp4096" '+' 485s algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 485s | - succeeded, advancing tokens 485s | parsing dh: 485s | appending IKE DH algorithm MODP8192[_0] 485s | token: '+' "modp4096" '+' "modp8192" '' 485s | appending IKE DH algorithm MODP4096[_0] 485s | token: '+' "modp8192" '' '' 485s | appending IKE DH algorithm MODP8192[_0] 485s | token: '' '' '' 485s algparse: discarding duplicate IKE DH algorithm MODP8192 485s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 485s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 485s | parsing 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' for IKE 485s | proposal: 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' 485s | token: '' '' "aes" '+' 485s | token: '' "aes" '+' "aes" '+' 485s | token: '+' "aes" '+' "3des" '-' 485s | appending IKE encryption algorithm AES_CBC[_0] 485s | token: '+' "3des" '-' "sha1" '+' 485s | appending IKE encryption algorithm AES_CBC[_0] 485s | token: '-' "sha1" '+' "sha1" '+' 485s | appending IKE encryption algorithm 3DES_CBC[_0] 485s algparse: discarding duplicate IKE encryption algorithm AES_CBC 485s | parsing prf: 485s | appending IKE PRF algorithm HMAC_SHA1[_0] 485s | token: '+' "sha1" '+' "sha2" '-' 485s | appending IKE PRF algorithm HMAC_SHA1[_0] 485s | token: '+' "sha2" '-' "modp8192" '+' 485s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 485s | token: '-' "modp8192" '+' "modp8192" '+' 485s algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 485s | - succeeded, advancing tokens 485s | parsing dh: 485s | appending IKE DH algorithm MODP8192[_0] 485s | token: '+' "modp8192" '+' "modp4096" '' 485s | appending IKE DH algorithm MODP8192[_0] 485s | token: '+' "modp4096" '' '' 485s | appending IKE DH algorithm MODP4096[_0] 485s | token: '' '' '' 485s algparse: discarding duplicate IKE DH algorithm MODP8192 485s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 485s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 485s | parsing 'aes+aes128+aes256' for IKE 485s | proposal: 'aes+aes128+aes256' 485s | token: '' '' "aes" '+' 485s | token: '' "aes" '+' "aes128" '+' 485s | token: '+' "aes128" '+' "aes256" '' 485s | appending IKE encryption algorithm AES_CBC[_0] 485s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 485s | token: '+' "aes256" '' '' 485s | appending IKE encryption algorithm AES_CBC[_128] 485s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 485s | token: '' '' '' 485s | appending IKE encryption algorithm AES_CBC[_256] 485s algparse: discarding duplicate IKE encryption algorithm AES_CBC_128 485s algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 485s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 485s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 485s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 485s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 485s | appending IKE DH algorithm MODP2048[_0] 485s | appending IKE DH algorithm MODP3072[_0] 485s | appending IKE DH algorithm MODP4096[_0] 485s | appending IKE DH algorithm MODP8192[_0] 485s | appending IKE DH algorithm DH19[_0] 485s | appending IKE DH algorithm DH20[_0] 485s | appending IKE DH algorithm DH21[_0] 485s | appending IKE DH algorithm DH31[_0] 485s | parsing 'aes128+aes+aes256' for IKE 485s | proposal: 'aes128+aes+aes256' 485s | token: '' '' "aes128" '+' 485s | token: '' "aes128" '+' "aes" '+' 485s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 485s | token: '+' "aes" '+' "aes256" '' 485s | appending IKE encryption algorithm AES_CBC[_128] 485s | token: '+' "aes256" '' '' 485s | appending IKE encryption algorithm AES_CBC[_0] 485s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 485s | token: '' '' '' 485s | appending IKE encryption algorithm AES_CBC[_256] 485s algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 485s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 485s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 485s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 485s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 485s | appending IKE DH algorithm MODP2048[_0] 485s | appending IKE DH algorithm MODP3072[_0] 485s | appending IKE DH algorithm MODP4096[_0] 485s | appending IKE DH algorithm MODP8192[_0] 485s | appending IKE DH algorithm DH19[_0] 485s | appending IKE DH algorithm DH20[_0] 485s | appending IKE DH algorithm DH21[_0] 485s | appending IKE DH algorithm DH31[_0] 485s | parsing 'aes128+aes256+aes' for IKE 485s | proposal: 'aes128+aes256+aes' 485s | token: '' '' "aes128" '+' 485s | token: '' "aes128" '+' "aes256" '+' 485s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 485s | token: '+' "aes256" '+' "aes" '' 485s | appending IKE encryption algorithm AES_CBC[_128] 485s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 485s | token: '+' "aes" '' '' 485s | appending IKE encryption algorithm AES_CBC[_256] 485s | token: '' '' '' 485s | appending IKE encryption algorithm AES_CBC[_0] 485s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 485s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 485s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 485s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 485s | appending IKE DH algorithm MODP2048[_0] 485s | appending IKE DH algorithm MODP3072[_0] 485s | appending IKE DH algorithm MODP4096[_0] 485s | appending IKE DH algorithm MODP8192[_0] 485s | appending IKE DH algorithm DH19[_0] 485s | appending IKE DH algorithm DH20[_0] 485s | appending IKE DH algorithm DH21[_0] 485s | appending IKE DH algorithm DH31[_0] 485s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for IKE 485s | proposal: 'aes-sha1-modp8192' 485s | token: '' '' "aes" '-' 485s | token: '' "aes" '-' "sha1" '-' 485s | token: '-' "sha1" '-' "modp8192" '' 485s | appending IKE encryption algorithm AES_CBC[_0] 485s | parsing prf: 485s | appending IKE PRF algorithm HMAC_SHA1[_0] 485s | token: '-' "modp8192" '' '' 485s | - succeeded, advancing tokens 485s | parsing dh: 485s | appending IKE DH algorithm MODP8192[_0] 485s | token: '' '' '' 485s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 485s | proposal: 'aes-sha1-modp8192' 485s | token: '' '' "aes" '-' 485s | token: '' "aes" '-' "sha1" '-' 485s | token: '-' "sha1" '-' "modp8192" '' 485s | appending IKE encryption algorithm AES_CBC[_0] 485s | parsing prf: 485s | appending IKE PRF algorithm HMAC_SHA1[_0] 485s | token: '-' "modp8192" '' '' 485s | - succeeded, advancing tokens 485s | parsing dh: 485s | appending IKE DH algorithm MODP8192[_0] 485s | token: '' '' '' 485s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 485s | proposal: 'aes-sha1-modp8192' 485s | token: '' '' "aes" '-' 485s | token: '' "aes" '-' "sha1" '-' 485s | token: '-' "sha1" '-' "modp8192" '' 485s | appending IKE encryption algorithm AES_CBC[_0] 485s | parsing prf: 485s | appending IKE PRF algorithm HMAC_SHA1[_0] 485s | token: '-' "modp8192" '' '' 485s | - succeeded, advancing tokens 485s | parsing dh: 485s | appending IKE DH algorithm MODP8192[_0] 485s | token: '' '' '' 485s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 485s | parsing 'aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' for IKE 485s | proposal: 'aes-sha1-modp8192' 485s | token: '' '' "aes" '-' 485s | token: '' "aes" '-' "sha1" '-' 485s | token: '-' "sha1" '-' "modp8192" '' 485s | appending IKE encryption algorithm AES_CBC[_0] 485s | parsing prf: 485s | appending IKE PRF algorithm HMAC_SHA1[_0] 485s | token: '-' "modp8192" '' '' 485s | - succeeded, advancing tokens 485s | parsing dh: 485s | appending IKE DH algorithm MODP8192[_0] 485s | token: '' '' '' 485s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 485s | proposal: 'aes-sha2-modp8192' 485s | token: '' '' "aes" '-' 485s | token: '' "aes" '-' "sha2" '-' 485s | token: '-' "sha2" '-' "modp8192" '' 485s | appending IKE encryption algorithm AES_CBC[_0] 485s | parsing prf: 485s | appending IKE PRF algorithm HMAC_SHA2_256[_ ERROR: ESP encryption algorithm 'aes_gcm-123456789012345' key length WAY too big 485s algparse -v2 'esp=3des-sha1;dh22' 485s ERROR: ESP DH algorithm 'dh22' is not supported 485s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2' 485s 3DES_CBC-HMAC_SHA1_96 485s 3DES_CBC-HMAC_SHA2_256_128 485s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2' 485s 3DES_CBC-HMAC_SHA1_96 485s 3DES_CBC-HMAC_SHA2_256_128 485s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2-modp8192' 485s 3DES_CBC-HMAC_SHA1_96 485s 3DES_CBC-HMAC_SHA2_256_128 485s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2;modp8192' 485s 3DES_CBC-HMAC_SHA1_96 485s 3DES_CBC-HMAC_SHA2_256_128 485s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2-modp8192' 485s 3DES_CBC-HMAC_SHA1_96 485s 3DES_CBC-HMAC_SHA2_256_128 485s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2;modp8192' 485s 3DES_CBC-HMAC_SHA1_96 485s 3DES_CBC-HMAC_SHA2_256_128 485s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2-modp2048' 485s 3DES_CBC-HMAC_SHA1_96 485s 3DES_CBC-HMAC_SHA2_256_128 485s algparse -v2 'ah' 485s HMAC_SHA2_512_256 485s HMAC_SHA2_256_128 485s HMAC_SHA1_96 485s algparse -v2 'ah=' 485s ERROR: AH proposal is empty 485s algparse -v2 'ah=md5' 485s HMAC_MD5_96 485s algparse -v2 'ah=sha' 485s HMAC_SHA1_96 485s algparse -v2 'ah=sha;modp2048' 485s HMAC_SHA1_96 485s algparse -v2 'ah=sha1' 485s HMAC_SHA1_96 485s algparse -v2 'ah=sha2' 485s HMAC_SHA2_256_128 485s algparse -v2 'ah=sha256' 485s HMAC_SHA2_256_128 485s algparse -v2 'ah=sha384' 485s HMAC_SHA2_384_192 485s algparse -v2 'ah=sha512' 485s HMAC_SHA2_512_256 485s algparse -v2 'ah=sha2_256' 485s HMAC_SHA2_256_128 485s algparse -v2 'ah=sha2_384' 485s HMAC_SHA2_384_192 485s algparse -v2 'ah=sha2_512' 485s HMAC_SHA2_512_256 485s algparse -v2 'ah=aes_xcbc' 485s AES_XCBC_96 485s algparse -v2 'ah=sha2-none' 485s HMAC_SHA2_256_128 485s algparse -v2 'ah=sha2;none' 485s HMAC_SHA2_256_128 485s algparse -v2 'ah=sha1-modp8192,sha1-modp8192,sha1-modp8192' 485s HMAC_SHA1_96 485s algparse -v2 'ah=aes-sha1' 485s ERROR: AH integrity algorithm 'aes' is not recognized 485s algparse -v2 'ah=vanityhash1' 485s ERROR: AH integrity algorithm 'vanityhash1' is not recognized 485s algparse -v2 'ah=aes_gcm_c-256' 485s ERROR: AH integrity algorithm 'aes_gcm_c' is not recognized 485s algparse -v2 'ah=id3' 485s ERROR: AH integrity algorithm 'id3' is not recognized 485s algparse -v2 'ah=3des' 485s ERROR: AH integrity algorithm '3des' is not recognized 485s algparse -v2 'ah=null' 485s ERROR: AH cannot have 'none' as the integrity algorithm 485s algparse -v2 'ah=aes_gcm' 485s ERROR: AH integrity algorithm 'aes_gcm' is not recognized 485s algparse -v2 'ah=aes_ccm' 485s ERROR: AH integrity algorithm 'aes_ccm' is not recognized 485s algparse -v2 'ah=ripemd' 485s ERROR: AH integrity algorithm 'ripemd' is not recognized 485s algparse -v2 'ike' 485s AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 485s AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 485s AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 485s AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 485s algparse -v2 'ike=' 485s ERROR: IKE proposal is empty 485s algparse -v2 'ike=3des-sha1' 485s 3DES_CBC-HMAC_SHA1-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 485s algparse -v2 'ike=3des-sha1' 485s 3DES_CBC-HMAC_SHA1-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 485s algparse -v2 'ike=3des-sha1;modp1536' 485s 3DES_CBC-HMAC_SHA1-MODP1536 485s algparse -v2 'ike=3des;dh21' 485s 3DES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH21 485s algparse -v2 'ike=3des-sha1;dh21' 485s 3DES_CBC-HMAC_SHA1-DH21 485s algparse -v2 'ike=3des-sha1-ecp_521' 485s 3DES_CBC-HMAC_SHA1-DH21 485s algparse -v2 'ike=3des+aes' 485s 3DES_CBC+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 485s algparse -v2 'ike=aes;none' 485s ERROR: IKE DH algorithm 'none' not permitted 485s algparse -v2 'ike=id2' 485s ERROR: IKE encryption algorithm 'id2' is not recognized 485s algparse -v2 'ike=3des-id2' 485s ERROR: IKE PRF algorithm 'id2' is not recognized 485s algparse -v2 'ike=aes_ccm' 485s ERROR: IKE encryption algorithm 'aes_ccm' is not supported 485s algparse -v2 'ike=aes-sha1-sha2-ecp_521' 485s ERROR: IKE DH algorithm 'sha2' is not recognized 485s algparse -v2 'ike=aes-sha2-sha2;ecp_521' 485s ERROR: IKE DH algorithm 'sha2' is not recognized 485s algparse -v2 'ike=aes-sha1_96-sha2-ecp_521' 485s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 485s algparse -v2 'ike=aes-sha1_96-sha2;ecp_521' 485s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 485s algparse -v2 'ike=aes+aes-sha1+sha1-modp8192+modp8192' 485s AES_CBC-HMAC_SHA1-MODP8192 485s algparse -v2 'ike=3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' 485s 3DES_CBC+AES_CBC-HMAC_SHA2_256+HMAC_SHA1-MODP4096+MODP8192 485s algparse -v2 'ike=aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' 485s AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 485s algparse -v2 'ike=aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' 485s AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 485s algparse -v2 'ike=aes+aes128+aes256' 485s AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 485s algparse -v2 'ike=aes128+aes+aes256' 485s AES_CBC_128+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 485s algparse -v2 'ike=aes128+aes256+aes' 485s AES_CBC_128+AES_CBC_256+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 485s algparse -v2 'ike=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' 485s AES_CBC-HMAC_SHA1-MODP8192 485s algparse -v2 'ike=aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' 485s AES_CBC-HMAC_SHA1-MODP8192 485s AES_CBC-HMAC_SHA2_256-MODP8192 485s algparse -v2 'ike=aes_gcm' 485s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 485s algparse -v2 'ike=aes_gcm-sha2' 485s AES_GCM_16-HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 485s algparse -v2 'ike=aes_gcm-sha2-modp2048' 485s AES_GCM_16-HMAC_SHA2_256-MODP2048 485s algparse -v2 'ike=aes_gcm-sha2;modp2048' 485s AES_GCM_16-HMAC_SHA2_256-MODP2048 485s algparse -v2 'ike=aes_gcm-modp2048' 485s ERROR: IKE PRF algorithm 'modp2048' is not recognized 485s algparse -v2 'ike=aes_gcm;modp2048' 485s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 485s algparse -v2 'ike=aes_gcm-none' 485s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 485s algparse -v2 'ike=aes_gcm-none-sha2' 485s AES_GCM_16-HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 485s algparse -v2 'ike=aes_gcm-none-sha2-modp2048' 485s AES_GCM_16-HMAC_SHA2_256-MODP2048 485s algparse -v2 'ike=aes_gcm-none-sha2;modp2048' 485s AES_GCM_16-HMAC_SHA2_256-MODP2048 485s algparse -v2 'ike=aes_gcm-none-modp2048' 485s ERROR: IKE PRF algorithm 'modp2048' is not recognized 485s algparse -v2 'ike=aes_gcm-none;modp2048' 485s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 485s algparse -v2 'ike=aes_gcm-sha1-none-modp2048' 485s ERROR: IKE proposal contains unexpected 'modp2048' 485s algparse -v2 'ike=aes_gcm-sha1-none;modp2048' 485s ERROR: IKE proposal contains unexpected 'modp2048' 485s algparse -v2 'ike=aes+aes_gcm' 485s ERROR: AEAD and non-AEAD IKE encryption algorithm cannot be combined 485s algparse -v2 'ike=,' 485s ERROR: IKE encryption algorithm is empty 485s algparse -v2 'ike=aes,' 485s ERROR: IKE encryption algorithm is empty 485s algparse -v2 'ike=aes,,aes' 485s ERROR: IKE encryption algorithm is empty 485s algparse -v2 'ike=,aes' 485s ERROR: IKE encryption algorithm is empty 485s algparse -v2 'ike=-' 485s ERROR: IKE encryption algorithm is empty 485s algparse -v2 'ike=+' 485s ERROR: IKE encryption algorithm is empty 485s algparse -v2 'ike=;' 485s ERROR: IKE encryption algorithm is empty 485s algparse -v2 'ike=aes-' 485s 0] 485s | token: '-' "modp8192" '' '' 485s | - succeeded, advancing tokens 485s | parsing dh: 485s | appending IKE DH algorithm MODP8192[_0] 485s | token: '' '' '' 485s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 485s | proposal: 'aes-sha1-modp8192' 485s | token: '' '' "aes" '-' 485s | token: '' "aes" '-' "sha1" '-' 485s | token: '-' "sha1" '-' "modp8192" '' 485s | appending IKE encryption algorithm AES_CBC[_0] 485s | parsing prf: 485s | appending IKE PRF algorithm HMAC_SHA1[_0] 485s | token: '-' "modp8192" '' '' 485s | - succeeded, advancing tokens 485s | parsing dh: 485s | appending IKE DH algorithm MODP8192[_0] 485s | token: '' '' '' 485s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 485s ERROR: IKE PRF algorithm is empty 485s algparse -v2 'ike=aes+' 485s ERROR: IKE encryption algorithm is empty 485s algparse -v2 'ike=aes;' 485s ERROR: IKE DH algorithm is empty 485s algparse -v2 'ike=-aes' 485s ERROR: IKE encryption algorithm is empty 485s algparse -v2 'ike=+aes' 485s ERROR: IKE encryption algorithm is empty 485s algparse -v2 'ike=;aes' 485s ERROR: IKE encryption algorithm is empty 485s algparse -v2 'ike=aes+-' 485s ERROR: IKE encryption algorithm is empty 485s | parsing 'aes_gcm' for IKE 485s | proposal: 'aes_gcm' 485s | token: '' '' "aes_gcm" '' 485s | token: '' "aes_gcm" '' '' 485s | token: '' '' '' 485s | appending IKE encryption algorithm AES_GCM_16[_0] 485s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 485s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 485s | appending IKE integrity algorithm NONE[_0] 485s | appending IKE DH algorithm MODP2048[_0] 485s | appending IKE DH algorithm MODP3072[_0] 485s | appending IKE DH algorithm MODP4096[_0] 485s | appending IKE DH algorithm MODP8192[_0] 485s | appending IKE DH algorithm DH19[_0] 485s | appending IKE DH algorithm DH20[_0] 485s | appending IKE DH algorithm DH21[_0] 485s | appending IKE DH algorithm DH31[_0] 485s | parsing 'aes_gcm-sha2' for IKE 485s | proposal: 'aes_gcm-sha2' 485s | token: '' '' "aes_gcm" '-' 485s | token: '' "aes_gcm" '-' "sha2" '' 485s | token: '-' "sha2" '' '' 485s | appending IKE encryption algorithm AES_GCM_16[_0] 485s | parsing prf: 485s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 485s | token: '' '' '' 485s | - succeeded, advancing tokens 485s | appending IKE integrity algorithm NONE[_0] 485s | appending IKE DH algorithm MODP2048[_0] 485s | appending IKE DH algorithm MODP3072[_0] 485s | appending IKE DH algorithm MODP4096[_0] 485s | appending IKE DH algorithm MODP8192[_0] 485s | appending IKE DH algorithm DH19[_0] 485s | appending IKE DH algorithm DH20[_0] 485s | appending IKE DH algorithm DH21[_0] 485s | appending IKE DH algorithm DH31[_0] 485s | parsing 'aes_gcm-sha2-modp2048' for IKE 485s | proposal: 'aes_gcm-sha2-modp2048' 485s | token: '' '' "aes_gcm" '-' 485s | token: '' "aes_gcm" '-' "sha2" '-' 485s | token: '-' "sha2" '-' "modp2048" '' 485s | appending IKE encryption algorithm AES_GCM_16[_0] 485s | parsing prf: 485s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 485s | token: '-' "modp2048" '' '' 485s | - succeeded, advancing tokens 485s | parsing dh: 485s | appending IKE DH algorithm MODP2048[_0] 485s | token: '' '' '' 485s | appending IKE integrity algorithm NONE[_0] 485s | parsing 'aes_gcm-sha2;modp2048' for IKE 485s | proposal: 'aes_gcm-sha2;modp2048' 485s | token: '' '' "aes_gcm" '-' 485s | token: '' "aes_gcm" '-' "sha2" ';' 485s | token: '-' "sha2" ';' "modp2048" '' 485s | appending IKE encryption algorithm AES_GCM_16[_0] 485s | parsing prf: 485s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 485s | token: ';' "modp2048" '' '' 485s | - succeeded, advancing tokens 485s | parsing dh: 485s | appending IKE DH algorithm MODP2048[_0] 485s | token: '' '' '' 485s | appending IKE integrity algorithm NONE[_0] 485s | parsing 'aes_gcm-modp2048' for IKE 485s | proposal: 'aes_gcm-modp2048' 485s | token: '' '' "aes_gcm" '-' 485s | token: '' "aes_gcm" '-' "modp2048" '' 485s | token: '-' "modp2048" '' '' 485s | appending IKE encryption algorithm AES_GCM_16[_0] 485s | parsing prf: 485s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 485s | lookup for PRF algorithm 'modp2048' failed 485s | - failed, saving error 'IKE PRF algorithm 'modp2048' is not recognized' and tossing result 485s | parsing integ: 485s | ike_alg_byname() failed: IKE integrity algorithm 'modp2048' is not recognized 485s | lookup for integrity algorithm 'modp2048' failed 485s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'modp2048' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'modp2048' is not recognized') 485s | parsing 'aes_gcm;modp2048' for IKE 485s | proposal: 'aes_gcm;modp2048' 485s | token: '' '' "aes_gcm" ';' 485s | token: '' "aes_gcm" ';' "modp2048" '' 485s | token: ';' "modp2048" '' '' 485s | appending IKE encryption algorithm AES_GCM_16[_0] 485s | parsing dh: 485s | appending IKE DH algorithm MODP2048[_0] 485s | token: '' '' '' 485s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 485s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 485s | appending IKE integrity algorithm NONE[_0] 485s | parsing 'aes_gcm-none' for IKE 485s | proposal: 'aes_gcm-none' 485s | token: '' '' "aes_gcm" '-' 485s | token: '' "aes_gcm" '-' "none" '' 485s | token: '-' "none" '' '' 485s | appending IKE encryption algorithm AES_GCM_16[_0] 485s | parsing prf: 485s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 485s | lookup for PRF algorithm 'none' failed 485s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 485s | parsing integ: 485s | appending IKE integrity algorithm NONE[_0] 485s | token: '' '' '' 485s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 485s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 485s | appending IKE DH algorithm MODP2048[_0] 485s | appending IKE DH algorithm MODP3072[_0] 485s | appending IKE DH algorithm MODP4096[_0] 485s | appending IKE DH algorithm MODP8192[_0] 485s | appending IKE DH algorithm DH19[_0] 485s | appending IKE DH algorithm DH20[_0] 485s | appending IKE DH algorithm DH21[_0] 485s | appending IKE DH algorithm DH31[_0] 485s | parsing 'aes_gcm-none-sha2' for IKE 485s | proposal: 'aes_gcm-none-sha2' 485s | token: '' '' "aes_gcm" '-' 485s | token: '' "aes_gcm" '-' "none" '-' 485s | token: '-' "none" '-' "sha2" '' 485s | appending IKE encryption algorithm AES_GCM_16[_0] 485s | parsing prf: 485s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 485s | lookup for PRF algorithm 'none' failed 485s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 485s | parsing integ: 485s | appending IKE integrity algorithm NONE[_0] 485s | token: '-' "sha2" '' '' 485s | parsing prf: 485s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 485s | token: '' '' '' 485s | appending IKE DH algorithm MODP2048[_0] 485s | appending IKE DH algorithm MODP3072[_0] 485s | appending IKE DH algorithm MODP4096[_0] 485s | appending IKE DH algorithm MODP8192[_0] 485s | appending IKE DH algorithm DH19[_0] 485s | appending IKE DH algorithm DH20[_0] 485s | appending IKE DH algorithm DH21[_0] 485s | appending IKE DH algorithm DH31[_0] 485s | parsing 'aes_gcm-none-sha2-modp2048' for IKE 485s | proposal: 'aes_gcm-none-sha2-modp2048' 485s | token: '' '' "aes_gcm" '-' 485s | token: '' "aes_gcm" '-' "none" '-' 485s | token: '-' "none" '-' "sha2" '-' 485s | appending IKE encryption algorithm AES_GCM_16[_0] 485s | parsing prf: 485s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 485s | lookup for PRF algorithm 'none' failed 485s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 485s | parsing integ: 485s | appending IKE integrity algorithm NONE[_0] 485s | token: '-' "sha2" '-' "modp2048" '' 485s | parsing prf: 485s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 485s | token: '-' "modp2048" '' '' 485s | parsing dh: 485s | appending IKE DH algorithm MODP2048[_0] 485s | token: '' '' '' 485s | parsing 'aes_gcm-none-sha2;modp2048' for IKE 485s | proposal: 'aes_gcm-none-sha2;modp2048' 485s | token: '' '' "aes_gcm" '-' 485s | token: '' "aes_gcm" '-' "none" '-' 485s | token: '-' "none" '-' "sha2" ';' 485s | appending IKE encryption algorithm AES_GCM_16[_0] 485s | parsing prf: 485s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 485s | lookup for PRF algorithm 'none' failed 485s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 485s | parsing integ: 485s | appending IKE integrity algorithm NONE[_0] 485s | token: '-' "sha2" ';' "modp2048" '' 485s | parsing prf: 485s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 485s | token: ';' "modp2048" '' '' 485s | parsing dh: 485s | appending IKE DH algorithm MODP2048[_0] 485s | token: '' '' '' 485s | parsing 'aes_gcm-none-modp2048' for IKE 485s | proposal: 'aes_gcm-none-modp2048' 485s | token: '' '' "aes_gcm" '-' 485s | token: '' "aes_gcm" '-' "none" '-' 485s | token: '-' "none" '-' "modp2048" '' 485s | appending IKE encryption algorithm AES_GCM_16[_0] 485s | parsing prf: 485s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 485s | lookup for PRF algorithm 'none' failed 485s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 485s | parsing integ: 485s | appending IKE integrity algorithm NONE[_0] 485s | token: '-' "modp2048" '' '' 485s | parsing prf: 485s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 485s | lookup for PRF algorithm 'modp2048' failed 485s | -- failed 'IKE PRF algorithm 'modp2048' is not recognized' 485s | parsing 'aes_gcm-none;modp2048' for IKE 485s | proposal: 'aes_gcm-none;modp2048' 485s | token: '' '' "aes_gcm" '-' 485s | token: '' "aes_gcm" '-' "none" ';' 485s | token: '-' "none" ';' "modp2048" '' 485s | appending IKE encryption algorithm AES_GCM_16[_0] 485s | parsing prf: 485s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 485s | lookup for PRF algorithm 'none' failed 485s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 485s | parsing integ: 485s | appending IKE integrity algorithm NONE[_0] 485s | token: ';' "modp2048" '' '' 485s | parsing dh: 485s | appending IKE DH algorithm MODP2048[_0] 485s | token: '' '' '' 485s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 485s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 485s | parsing 'aes_gcm-sha1-none-modp2048' for IKE 485s | proposal: 'aes_gcm-sha1-none-modp2048' 485s | token: '' '' "aes_gcm" '-' 485s | token: '' "aes_gcm" '-' "sha1" '-' 485s | token: '-' "sha1" '-' "none" '-' 485s | appending IKE encryption algorithm AES_GCM_16[_0] 485s | parsing prf: 485s | appending IKE PRF algorithm HMAC_SHA1[_0] 485s | token: '-' "none" '-' "modp2048" '' 485s | - succeeded, advancing tokens 485s | parsing dh: 485s | appending IKE DH algorithm NONE[_0] 485s | token: '-' "modp2048" '' '' 485s | parsing 'aes_gcm-sha1-none;modp2048' for IKE 485s | proposal: 'aes_gcm-sha1-none;modp2048' 485s | token: '' '' "aes_gcm" '-' 485s | token: '' "aes_gcm" '-' "sha1" '-' 485s | token: '-' "sha1" '-' "none" ';' 485s | appending IKE encryption algorithm AES_GCM_16[_0] 485s | parsing prf: 485s | appending IKE PRF algorithm HMAC_SHA1[_0] 485s | token: '-' "none" ';' "modp2048" '' 485s | - succeeded, advancing tokens 485s | parsing dh: 485s | appending IKE DH algorithm NONE[_0] 485s | token: ';' "modp2048" '' '' 485s | parsing 'aes+aes_gcm' for IKE 485s | proposal: 'aes+aes_gcm' 485s | token: '' '' "aes" '+' 485s | token: '' "aes" '+' "aes_gcm" '' 485s | token: '+' "aes_gcm" '' '' 485s | appending IKE encryption algorithm AES_CBC[_0] 485s | token: '' '' '' 485s | appending IKE encryption algorithm AES_GCM_16[_0] 485s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 485s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 485s | appending IKE DH algorithm MODP2048[_0] 485s | appending IKE DH algorithm MODP3072[_0] 485s | appending IKE DH algorithm MODP4096[_0] 485s | appending IKE DH algorithm MODP8192[_0] 485s | appending IKE DH algorithm DH19[_0] 485s | appending IKE DH algorithm DH20[_0] 485s | appending IKE DH algorithm DH21[_0] 485s | appending IKE DH algorithm DH31[_0] 485s | parsing ',' for IKE 485s | proposal: '' 485s | token: '' '' "" '' 485s | token: '' "" '' '' 485s | parsing 'aes,' for IKE 485s | proposal: 'aes' 485s | token: '' '' "aes" '' 485s | token: '' "aes" '' '' 485s | token: '' '' '' 485s | appending IKE encryption algorithm AES_CBC[_0] 485s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 485s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 485s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 485s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 485s | appending IKE DH algorithm MODP2048[_0] 485s | appending IKE DH algorithm MODP3072[_0] 485s | appending IKE DH algorithm MODP4096[_0] 485s | appending IKE DH algorithm MODP8192[_0] 485s | appending IKE DH algorithm DH19[_0] 485s | appending IKE DH algorithm DH20[_0] 485s | appending IKE DH algorithm DH21[_0] 485s | appending IKE DH algorithm DH31[_0] 485s | proposal: '' 485s | token: '' '' "" '' 485s | token: '' "" '' '' 485s | parsing 'aes,,aes' for IKE 485s | proposal: 'aes' 485s | token: '' '' "aes" '' 485s | token: '' "aes" '' '' 485s | token: '' '' '' 485s | appending IKE encryption algorithm AES_CBC[_0] 485s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 485s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 485s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 485s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 485s | appending IKE DH algorithm MODP2048[_0] 485s | appending IKE DH algorithm MODP3072[_0] 485s | appending IKE DH algorithm MODP4096[_0] 485s | appending IKE DH algorithm MODP8192[_0] 485s | appending IKE DH algorithm DH19[_0] 485s | appending IKE DH algorithm DH20[_0] 485s | appending IKE DH algorithm DH21[_0] 485s | appending IKE DH algorithm DH31[_0] 485s | proposal: '' 485s | token: '' '' "" '' 485s | token: '' "" '' '' 485s | parsing ',aes' for IKE 485s | proposal: '' 485s | token: '' '' "" '' 485s | token: '' "" '' '' 485s | parsing '-' for IKE 485s | proposal: '-' 485s | token: '' '' "" '-' 485s | token: '' "" '-' "" '' 485s | parsing '+' for IKE 485s | proposal: '+' 485s | token: '' '' "" '+' 485s | token: '' "" '+' "" '' 485s | parsing ';' for IKE 485s | proposal: ';' 485s | token: '' '' "" ';' 485s | token: '' "" ';' "" '' 485s | parsing 'aes-' for IKE 485s | proposal: 'aes-' 485s | token: '' '' "aes" '-' 485s | token: '' "aes" '-' "" '' 485s | token: '-' "" '' '' 485s | appending IKE encryption algorithm AES_CBC[_0] 485s | parsing prf: 485s | - failed, saving error 'IKE PRF algorithm is empty' and tossing result 485s | parsing integ: 485s | - and - failed, returning earlier PRF error 'IKE PRF algorithm is empty' and discarding INTEG error 'IKE integrity algorithm is empty') 485s | parsing 'aes+' for IKE 485s | proposal: 'aes+' 485s | token: '' '' "aes" '+' 485s | token: '' "aes" '+' "" '' 485s | token: '+' "" '' '' 485s | appending IKE encryption algorithm AES_CBC[_0] 485s | parsing 'aes;' for IKE 485s | proposal: 'aes;' 485s | token: '' '' "aes" ';' 485s | token: '' "aes" ';' "" '' 485s | token: ';' "" '' '' 485s | appending IKE encryption algorithm AES_CBC[_0] 485s | parsing dh: 485s | ... failed 'IKE DH algorithm is empty' 485s | parsing '-aes' for IKE 485s | proposal: '-aes' 485s | token: '' '' "" '-' 485s | token: '' "" '-' "aes" '' 485s | parsing '+aes' for IKE 485s | proposal: '+aes' 485s | token: '' '' "" '+' 485s | token: '' "" '+' "aes" '' 485s | parsing ';aes' for IKE 485s | proposal: ';aes' 485s | token: '' '' "" ';' 485s | token: '' "" ';' "aes" '' 485s | parsing 'aes+-' for IKE 485s | proposal: 'aes+-' 485s | token: '' '' "aes" '+' 485s | token: '' "aes" '+' "" '-' 485s | token: '+' "" '-' "" '' 485s | appending IKE encryption algorithm AES_CBC[_0] 485s | parsing 'aes+;' for IKE 485s | proposal: 'aes+;' 485s | token: '' '' "aes" '+' 485s | token: '' "aes" '+' "" ';' 485s | token: '+' "" ';' "" '' 485s | appending IKE encryption algorithm AES_CBC[_0] 485s | parsing 'aes++' for IKE 485s | proposal: 'aes++' 485s | token: '' '' "aes" '+' 485s | token: '' "aes" '+' "" '+' 485s | token: '+' "" '+' "" '' 485s | appending IKE encryption algorithm AES_CBC[_0] 485s algparse: leak detective found no leaks 485s algparse: Encryption algorithms: 485s algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 485s algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 485s algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 485s algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 485s algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 485s algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 485s algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm, aes_gcm_c 485s algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_b 485s algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_a 485s algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 485s algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 485s algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 485s algparse: NULL [] IKEv1: ESP IKEv2: ESP 485s algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 485s algparse: Hash algorithms: 485s algparse: MD5 IKEv1: IKE IKEv2: NSS 485s algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 485s algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 485s algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 485s algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 485s algparse: IDENTITY IKEv1: IKEv2: FIPS 485s algparse: PRF algorithms: 485s algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE native(HMAC) md5 485s algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 485s algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 485s algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 485s algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 485s algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 485s algparse: Integrity algorithms: 485s algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH native(HMAC) md5, hmac_md5 485s algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 485s algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 485s algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 485s algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 485s algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 485s algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 485s algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 485s algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 485s algparse: DH algorithms: 485s algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 485s algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 485s algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 485s algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 485s algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 485s algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 485s algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 485s algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 485s algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 485s algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 485s algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 485s algparse: IPCOMP algorithms: 485s algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 485s algparse: LZS IKEv1: IKEv2: ESP AH FIPS 485s algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 485s algparse: testing CAMELLIA_CBC: 485s algparse: Camellia: 16 bytes with 128-bit key 485s | decode_to_chunk: raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 485s | decode_to_chunk: output: 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5410 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: CAMELLIA_CBC 485s | flags: ENCRYPT+DECRYPT 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f53d8 485s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 485s | decode_to_chunk: output: 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | decode_to_chunk: new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 485s | decode_to_chunk: output: 485s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 485s | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 485s | decode_to_chunk: output: 485s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | decode_to_chunk: ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 485s | decode_to_chunk: output: 485s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 485s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 485s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 485s | verify_chunk_data: encrypt: ok 485s | verify_chunk_data: updated CBC IV: ok 485s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 485s | decode_to_chunk: output: 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | decode_to_chunk: new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 485s | decode_to_chunk: output: 485s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 485s | decode_to_chunk: ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 485s | decode_to_chunk: output: 485s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 485s | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 485s | decode_to_chunk: output: 485s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 485s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 485s | verify_chunk_data: decrypt: ok 485s | verify_chunk_data: updated CBC IV: ok 485s | test_ctr_vector: Camellia: 16 bytes with 128-bit key passed 485s algparse: Camellia: 16 bytes with 128-bit key 485s | decode_to_chunk: raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF" 485s | decode_to_chunk: output: 485s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5410 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: CAMELLIA_CBC 485s | flags: ENCRYPT+DECRYPT 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f53d8 485s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 485s | decode_to_chunk: output: 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | decode_to_chunk: new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 485s | decode_to_chunk: output: 485s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 485s | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 485s | decode_to_chunk: output: 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 485s | decode_to_chunk: ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 485s | decode_to_chunk: output: 485s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 485s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 485s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 485s | verify_chunk_data: encrypt: ok 485s | verify_chunk_data: updated CBC IV: ok 485s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 485s | decode_to_chunk: output: 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | decode_to_chunk: new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 485s | decode_to_chunk: output: 485s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 485s | decode_to_chunk: ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 485s | decode_to_chunk: output: 485s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 485s | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 485s | decode_to_chunk: output: 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 485s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 485s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 485s | verify_chunk_data: decrypt: ok 485s | verify_chunk_data: updated CBC IV: ok 485s | test_ctr_vector: Camellia: 16 bytes with 128-bit key passed 485s algparse: Camellia: 16 bytes with 256-bit key 485s | decode_to_chunk: raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 485s | decode_to_chunk: output: 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5410 485s | key-offset: 0, key-size: 32 485s | EXTRACT_KEY_FROM_KEY: 485s | target: CAMELLIA_CBC 485s | flags: ENCRYPT+DECRYPT 485s | key_size: 32-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (48-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f53d8 485s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 485s | decode_to_chunk: output: 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | decode_to_chunk: new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 485s | decode_to_chunk: output: 485s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 485s | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 485s | decode_to_chunk: output: 485s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | decode_to_chunk: ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 485s | decode_to_chunk: output: 485s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 485s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 485s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 485s | verify_chunk_data: encrypt: ok 485s | verify_chunk_data: updated CBC IV: ok 485s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 485s | decode_to_chunk: output: 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | decode_to_chunk: new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 485s | decode_to_chunk: output: 485s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 485s | decode_to_chunk: ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 485s | decode_to_chunk: output: 485s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 485s | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 485s | decode_to_chunk: output: 485s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 485s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 485s | verify_chunk_data: decrypt: ok 485s | verify_chunk_data: updated CBC IV: ok 485s | test_ctr_vector: Camellia: 16 bytes with 256-bit key passed 485s algparse: Camellia: 16 bytes with 256-bit key 485s | decode_to_chunk: raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF FF EE DD CC BB AA 99 88 77 66 55 44 33 22 11 00" 485s | decode_to_chunk: output: 485s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 485s | ff ee dd cc bb aa 99 88 77 66 55 44 33 22 11 00 ........wfUD3".. 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5410 485s | key-offset: 0, key-size: 32 485s | EXTRACT_KEY_FROM_KEY: 485s | target: CAMELLIA_CBC 485s | flags: ENCRYPT+DECRYPT 485s | key_size: 32-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (48-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f53d8 485s | decode_to_chunk:algparse -v2 'ike=aes+;' 485s ERROR: IKE encryption algorithm is empty 485s algparse -v2 'ike=aes++' 485s ERROR: IKE encryption algorithm is empty 485s testing -ta 485s initializing NSS db 485s IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 485s | decode_to_chunk: output: 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | decode_to_chunk: new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 485s | decode_to_chunk: output: 485s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 485s | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 485s | decode_to_chunk: output: 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 485s | decode_to_chunk: ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 485s | decode_to_chunk: output: 485s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 485s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 485s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 485s | verify_chunk_data: encrypt: ok 485s | verify_chunk_data: updated CBC IV: ok 485s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 485s | decode_to_chunk: output: 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | decode_to_chunk: new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 485s | decode_to_chunk: output: 485s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 485s | decode_to_chunk: ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 485s | decode_to_chunk: output: 485s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 485s | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 485s | decode_to_chunk: output: 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 485s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 485s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 485s | verify_chunk_data: decrypt: ok 485s | verify_chunk_data: updated CBC IV: ok 485s | test_ctr_vector: Camellia: 16 bytes with 256-bit key passed 485s algparse: testing AES_GCM_16: 485s algparse: empty string 485s | decode_to_chunk: raw_key: input "0xcf063a34d4a9a76c2c86787d3f96db71" 485s | decode_to_chunk: output: 485s | cf 06 3a 34 d4 a9 a7 6c 2c 86 78 7d 3f 96 db 71 ..:4...l,.x}?..q 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f53a0 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_GCM 485s | flags: ENCRYPT+DECRYPT 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5368 485s | decode_to_chunk: salted IV: input "0x113b9785971864c83b01c787" 485s | decode_to_chunk: output: 485s | 11 3b 97 85 97 18 64 c8 3b 01 c7 87 .;....d.;... 485s | decode_to_chunk: AAD: input "" 485s | decode_to_chunk: output: 485s | 485s | decode_to_chunk: plaintext: input "" 485s | decode_to_chunk: output: 485s | 485s | decode_to_chunk: ciphertext: input "" 485s | decode_to_chunk: output: 485s | 485s | decode_to_chunk: tag: input "0x72ac8493e3a5228b5d130a69d2510e42" 485s | decode_to_chunk: output: 485s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 485s | test_gcm_vector: decrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 485s | test_gcm_vector: text+tag on call 485s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 485s | verify_chunk_data: output ciphertext: ok 485s | verify_chunk_data: TAG: ok 485s | test_gcm_vector: text+tag on return 485s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 485s | test_gcm_vector: encrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 485s | test_gcm_vector: text+tag on call 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | verify_chunk_data: output ciphertext: ok 485s | verify_chunk_data: TAG: ok 485s | test_gcm_vector: text+tag on return 485s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 485s | test_gcm_vector: passed 485s algparse: one block 485s | decode_to_chunk: raw_key: input "0xe98b72a9881a84ca6b76e0f43e68647a" 485s | decode_to_chunk: output: 485s | e9 8b 72 a9 88 1a 84 ca 6b 76 e0 f4 3e 68 64 7a ..r.....kv..>hdz 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f53a0 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_GCM 485s | flags: ENCRYPT+DECRYPT 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5368 485s | decode_to_chunk: salted IV: input "0x8b23299fde174053f3d652ba" 485s | decode_to_chunk: output: 485s | 8b 23 29 9f de 17 40 53 f3 d6 52 ba .#)...@S..R. 485s | decode_to_chunk: AAD: input "" 485s | decode_to_chunk: output: 485s | 485s | decode_to_chunk: plaintext: input "0x28286a321293253c3e0aa2704a278032" 485s | decode_to_chunk: output: 485s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 485s | decode_to_chunk: ciphertext: input "0x5a3c1cf1985dbb8bed818036fdd5ab42" 485s | decode_to_chunk: output: 485s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 485s | decode_to_chunk: tag: input "0x23c7ab0f952b7091cd324835043b5eb5" 485s | decode_to_chunk: output: 485s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 485s | test_gcm_vector: decrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 485s | test_gcm_vector: text+tag on call 485s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 485s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 485s | verify_chunk_data: output ciphertext: ok 485s | verify_chunk_data: TAG: ok 485s | test_gcm_vector: text+tag on return 485s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 485s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 485s | test_gcm_vector: encrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 485s | test_gcm_vector: text+tag on call 485s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | verify_chunk_data: output ciphertext: ok 485s | verify_chunk_data: TAG: ok 485s | test_gcm_vector: text+tag on return 485s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 485s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 485s | test_gcm_vector: passed 485s algparse: two blocks 485s | decode_to_chunk: raw_key: input "0xbfd414a6212958a607a0f5d3ab48471d" 485s | decode_to_chunk: output: 485s | bf d4 14 a6 21 29 58 a6 07 a0 f5 d3 ab 48 47 1d ....!)X......HG. 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f53a0 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_GCM 485s | flags: ENCRYPT+DECRYPT 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5368 485s | decode_to_chunk: salted IV: input "0x86d8ea0ab8e40dcc481cd0e2" 485s | decode_to_chunk: output: 485s | 86 d8 ea 0a b8 e4 0d cc 48 1c d0 e2 ........H... 485s | decode_to_chunk: AAD: input "" 485s | decode_to_chunk: output: 485s | 485s | decode_to_chunk: plaintext: input "0xa6b76a066e63392c9443e60272ceaeb9d25c991b0f2e55e2804e168c05ea591a" 485s | decode_to_chunk: output: 485s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 485s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 485s | decode_to_chunk: ciphertext: input "0x62171db33193292d930bf6647347652c1ef33316d7feca99d54f1db4fcf513f8" 485s | decode_to_chunk: output: 485s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 485s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 485s | decode_to_chunk: tag: input "0xc28280aa5c6c7a8bd366f28c1cfd1f6e" 485s | decode_to_chunk: output: 485s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 485s | test_gcm_vector: decrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 485s | test_gcm_vector: text+tag on call 485s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 485s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 485s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 485s | verify_chunk_data: output ciphertext: ok 485s | verify_chunk_data: TAG: ok 485s | test_gcm_vector: text+tag on return 485s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 485s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 485s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 485s | test_gcm_vector: encrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 485s | test_gcm_vector: text+tag on call 485s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 485s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | verify_chunk_data: output ciphertext: ok 485s | verify_chunk_data: TAG: ok 485s | test_gcm_vector: text+tag on return 485s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 485s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 485s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 485s | test_gcm_vector: passed 485s algparse: two blocks with associated data 485s | decode_to_chunk: raw_key: input "0x006c458100fc5f4d62949d2c833b82d1" 485s | decode_to_chunk: output: 485s | 00 6c 45 81 00 fc 5f 4d 62 94 9d 2c 83 3b 82 d1 .lE..._Mb..,.;.. 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f53a0 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_GCM 485s | flags: ENCRYPT+DECRYPT 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5368 485s | decode_to_chunk: salted IV: input "0xa4e9c4bc5725a21ff42c82b2" 485s | decode_to_chunk: output: 485s | a4 e9 c4 bc 57 25 a2 1f f4 2c 82 b2 ....W%...,.. 485s | decode_to_chunk: AAD: input "0x2efb14fb3657cdd6b9a8ff1a5f5a39b9" 485s | decode_to_chunk: output: 485s | 2e fb 14 fb 36 57 cd d6 b9 a8 ff 1a 5f 5a 39 b9 ....6W......_Z9. 485s | decode_to_chunk: plaintext: input "0xf381d3bfbee0a879f7a4e17b623278cedd6978053dd313530a18f1a836100950" 485s | decode_to_chunk: output: 485s | f3 81 d3 bf be e0 a8 79 f7 a4 e1 7b 62 32 78 ce .......y...{b2x. 485s | dd 69 78 05 3d d3 13 53 0a 18 f1 a8 36 10 09 50 .ix.=..S....6..P 485s | decode_to_chunk: ciphertext: input "0xf39b4db3542d8542fb73fd2d66be568f26d7f814b3f87d1eceac3dd09a8d697e" 485s | decode_to_chunk: output: 485s | f3 9b 4d b3 54 2d 85 42 fb 73 fd 2d 66 be 56 8f ..M.T-.B.s.-f.V. 485s | 26 d7 f8 14 b3 f8 7d 1e ce ac 3d d0 9a 8d 69 7e &.....}...=...i~ 485s | decode_to_chunk: tag: input "0x39f045cb23b698c925db134d56c5" 485s | decode_to_chunk: output: 485s | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 9.E.#...%..MV. 485s | test_gcm_vector: decrypt: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=14 485s | test_gcm_vector: text+tag on call 485s | f3 9b 4d b3 54 2d 85 42 fb 73 fd 2d 66 be 56 8f ..M.T-.B.s.-f.V. 485s | 26 d7 f8 14 b3 f8 7d 1e ce ac 3d d0 9a 8d 69 7e &.....}...=...i~ 485s | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 9.E.#...%..MV. 485s | verify_chunk_data: output ciphertext: ok 485s | verify_chunk_data: TAG: ok 485s | test_gcm_vector: text+tag on return 485s | f3 81 d3 bf be e0 a8 79 f7 a4 e1 7b 62 32 78 ce .......y...{b2x. 485s | dd 69 78 05 3d d3 13 53 0a 18 f1 a8 36 10 09 50 .ix.=..S....6..P 485s | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 9.E.#...%..MV. 485s | test_gcm_vector: encrypt: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=14 485s | test_gcm_vector: text+tag on call 485s | f3 81 d3 bf be e0 a8 79 f7 a4 e1 7b 62 32 78 ce .......y...{b2x. 485s | dd 69 78 05 3d d3 13 53 0a 18 f1 a8 36 10 09 50 .ix.=..S....6..P 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .............. 485s | verify_chunk_data: output ciphertext: ok 485s | verify_chunk_data: TAG: ok 485s | test_gcm_vector: text+tag on return 485s | f3 9b 4d b3 54 2d 85 42 fb 73 fd 2d 66 be 56 8f ..M.T-.B.s.-f.V. 485s | 26 d7 f8 14 b3 f8 7d 1e ce ac 3d d0 9a 8d 69 7e &.....}...=...i~ 485s | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 9.E.#...%..MV. 485s | test_gcm_vector: passed 485s algparse: testing AES_CTR: 485s algparse: Encrypting 16 octets using AES-CTR with 128-bit key 485s | decode_to_chunk: raw_key: input "0x AE 68 52 F8 12 10 67 CC 4B F7 A5 76 55 77 F3 9E" 485s | decode_to_chunk: output: 485s | ae 68 52 f8 12 10 67 cc 4b f7 a5 76 55 77 f3 9e .hR...g.K..vUw.. 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5400 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_CTR 485s | flags: ENCRYPT+DECRYPT 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f53c8 485s | decode_to_chunk: input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 485s | decode_to_chunk: output: 485s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 485s | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 485s | decode_to_chunk: output: 485s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 485s | decode_to_chunk: Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 485s | decode_to_chunk: output: 485s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 485s | decode_to_chunk: expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 485s | decode_to_chunk: output: 485s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 485s | do_aes_ctr: enter 485s | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes 485s | do_aes_ctr: exit 485s | verify_chunk_data: encrypt: ok 485s | verify_chunk_data: counter-block: ok 485s | decode_to_chunk: input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 485s | decode_to_chunk: output: 485s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 485s | decode_to_chunk: Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 485s | decode_to_chunk: output: 485s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 485s | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 485s | decode_to_chunk: output: 485s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 485s | decode_to_chunk: expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 485s | decode_to_chunk: output: 485s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 485s | do_aes_ctr: enter 485s | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes 485s | do_aes_ctr: exit 485s | verify_chunk_data: decrypt: ok 485s | verify_chunk_data: counter-block: ok 485s | test_ctr_vector: Encrypting 16 octets using AES-CTR with 128-bit key passed 485s algparse: Encrypting 32 octets using AES-CTR with 128-bit key 485s | decode_to_chunk: raw_key: input "0x 7E 24 06 78 17 FA E0 D7 43 D6 CE 1F 32 53 91 63" 485s | decode_to_chunk: output: 485s | 7e 24 06 78 17 fa e0 d7 43 d6 ce 1f 32 53 91 63 ~$.x....C...2S.c 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5400 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_CTR 485s | flags: ENCRYPT+DECRYPT 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f53c8 485s | decode_to_chunk: input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 485s | decode_to_chunk: output: 485s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 485s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 1running pluto selftest 485s 3 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 485s | decode_to_chunk: output: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 485s | decode_to_chunk: Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 485s | decode_to_chunk: output: 485s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 485s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 485s | decode_to_chunk: expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 485s | decode_to_chunk: output: 485s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 .l...T;Y.H...... 485s | do_aes_ctr: enter 485s | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes 485s | do_aes_ctr: exit 485s | verify_chunk_data: encrypt: ok 485s | verify_chunk_data: counter-block: ok 485s | decode_to_chunk: input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 485s | decode_to_chunk: output: 485s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 485s | decode_to_chunk: Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 485s | decode_to_chunk: output: 485s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 485s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 485s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 485s | decode_to_chunk: output: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 485s | decode_to_chunk: expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 485s | decode_to_chunk: output: 485s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 .l...T;Y.H...... 485s | do_aes_ctr: enter 485s | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes 485s | do_aes_ctr: exit 485s | verify_chunk_data: decrypt: ok 485s | verify_chunk_data: counter-block: ok 485s | test_ctr_vector: Encrypting 32 octets using AES-CTR with 128-bit key passed 485s algparse: Encrypting 36 octets using AES-CTR with 128-bit key 485s | decode_to_chunk: raw_key: input "0x 76 91 BE 03 5E 50 20 A8 AC 6E 61 85 29 F9 A0 DC" 485s | decode_to_chunk: output: 485s | 76 91 be 03 5e 50 20 a8 ac 6e 61 85 29 f9 a0 dc v...^P ..na.)... 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5400 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_CTR 485s | flags: ENCRYPT+DECRYPT 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f53c8 485s | decode_to_chunk: input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 485s | decode_to_chunk: output: 485s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 485s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 485s | decode_to_chunk: output: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 485s | 20 21 22 23 !"# 485s | decode_to_chunk: Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 485s | decode_to_chunk: output: 485s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 485s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 485s | 25 b2 07 2f %../ 485s | decode_to_chunk: expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 485s | decode_to_chunk: output: 485s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 485s | do_aes_ctr: enter 485s | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes 485s | do_aes_ctr: exit 485s | verify_chunk_data: encrypt: ok 485s | verify_chunk_data: counter-block: ok 485s | decode_to_chunk: input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 485s | decode_to_chunk: output: 485s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 485s | decode_to_chunk: Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 485s | decode_to_chunk: output: 485s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 485s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 485s | 25 b2 07 2f %../ 485s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 485s | decode_to_chunk: output: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 485s | 20 21 22 23 !"# 485s | decode_to_chunk: expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 485s | decode_to_chunk: output: 485s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 485s | do_aes_ctr: enter 485s | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes 485s | do_aes_ctr: exit 485s | verify_chunk_data: decrypt: ok 485s | verify_chunk_data: counter-block: ok 485s | test_ctr_vector: Encrypting 36 octets using AES-CTR with 128-bit key passed 485s algparse: Encrypting 16 octets using AES-CTR with 192-bit key 485s | decode_to_chunk: raw_key: input "0x16 AF 5B 14 5F C9 F5 79 C1 75 F9 3E 3B FB 0E ED86 3D 06 CC FD B7 85 15" 485s | decode_to_chunk: output: 485s | 16 af 5b 14 5f c9 f5 79 c1 75 f9 3e 3b fb 0e ed ..[._..y.u.>;... 485s | 86 3d 06 cc fd b7 85 15 .=...... 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5400 485s | key-offset: 0, key-size: 24 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_CTR 485s | flags: ENCRYPT+DECRYPT 485s | key_size: 24-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (40-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f53c8 485s | decode_to_chunk: input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 485s | decode_to_chunk: output: 485s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 485s | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 485s | decode_to_chunk: output: 485s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 485s | decode_to_chunk: Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 485s | decode_to_chunk: output: 485s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 485s | decode_to_chunk: expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 485s | decode_to_chunk: output: 485s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 485s | do_aes_ctr: enter 485s | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes 485s | do_aes_ctr: exit 485s | verify_chunk_data: encrypt: ok 485s | verify_chunk_data: counter-block: ok 485s | decode_to_chunk: input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 485s | decode_to_chunk: output: 485s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 485s | decode_to_chunk: Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 485s | decode_to_chunk: output: 485s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 485s | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 485s | decode_to_chunk: output: 485s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 485s | decode_to_chunk: expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 485s | decode_to_chunk: output: 485s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 485s | do_aes_ctr: enter 485s | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes 485s | do_aes_ctr: exit 485s | verify_chunk_data: decrypt: ok 485s | verify_chunk_data: counter-block: ok 485s | test_ctr_vector: Encrypting 16 octets using AES-CTR with 192-bit key passed 485s algparse: Encrypting 32 octets using AES-CTR with 192-bit key 485s | decode_to_chunk: raw_key: input "0x7C 5C B2 40 1B 3D C3 3C 19 E7 34 08 19 E0 F6 9C67 8C 3D B8 E6 F6 A9 1A" 485s | decode_to_chunk: output: 485s | 7c 5c b2 40 1b 3d c3 3c 19 e7 34 08 19 e0 f6 9c |\.@.=.<..4..... 485s | 67 8c 3d b8 e6 f6 a9 1a g.=..... 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5400 485s | key-offset: 0, key-size: 24 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_CTR 485s | flags: ENCRYPT+DECRYPT 485s | key_size: 24-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (40-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f53c8 485s | decode_to_chunk: input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 485s | decode_to_chunk: output: 485s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 485s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 485s | decode_to_chunk: output: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 485s | decode_to_chunk: Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 485s | decode_to_chunk: output: 485s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 485s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 485s | decode_to_chunk: expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 485s | decode_to_chunk: output: 485s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 485s | do_aes_ctr: enter 485s | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes 485s | do_aes_ctr: exit 485s | verify_chunk_data: encrypt: ok 485s | verify_chunk_data: counter-block: ok 485s | decode_to_chunk: input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 485s | decode_to_chunk: output: 485s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 485s | decode_to_chunk: Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 485s | decode_to_chunk: output: 485s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 485s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 485s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 485s | decode_to_chunk: output: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 485s | decode_to_chunk: expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 485s | decode_to_chunk: output: 485s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 485s | do_aes_ctr: enter 485s | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes 485s | do_aes_ctr: exit 485s | verify_chunk_data: decrypt: ok 485s | verify_chunk_data: counter-block: ok 485s | test_ctr_vector: Encrypting 32 octets using AES-CTR with 192-bit key passed 485s algparse: Encrypting 36 octets using AES-CTR with 192-bit key 485s | decode_to_chunk: raw_key: input "0x02 BF 39 1E E8 EC B1 59 B9 59 61 7B 09 65 27 9BF5 9B 60 A7 86 D3 E0 FE" 485s | decode_to_chunk: output: 485s | 02 bf 39 1e e8 ec b1 59 b9 59 61 7b 09 65 27 9b ..9....Y.Ya{.e'. 485s | f5 9b 60 a7 86 d3 e0 fe ..`..... 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5400 485s | key-offset: 0, key-size: 24 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_CTR 485s | flags: ENCRYPT+DECRYPT 485s | key_size: 24-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (40-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f53c8 485s | decode_to_chunk: input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 485s | decode_to_chunk: output: 485s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 485s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 485s | decode_to_chunk: output: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 485s | 20 21 22 23 !"# 485s | decode_to_chunk: Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 485s | decode_to_chunk: output: 485s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 485s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 485s | ab ee 09 35 ...5 485s | decode_to_chunk: expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 485s | decode_to_chunk: output: 485s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 485s | do_aes_ctr: enter 485s | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes 485s | do_aes_ctr: exit 485s | verify_chunk_data: encrypt: ok 485s | verify_chunk_data: counter-block: ok 485s | decode_to_chunk: input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 485s | decode_to_chunk: output: 485s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 485s | decode_to_chunk: Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 485s | decode_to_chunk: output: 485s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 485s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 485s | ab ee 09 35 ...5 485s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 485s | decode_to_chunk: output: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 485s | 20 21 22 23 !"# 485s | decode_to_chunk: expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 485s | decode_to_chunk: output: 485s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 485s | do_aes_ctr: enter 485s | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes 485s | do_aes_ctr: exit 485s | verify_chunk_data: decrypt: ok 485s | verify_chunk_data: counter-block: ok 485s | test_ctr_vector: Encrypting 36 octets using AES-CTR with 192-bit key passed 485s algparse: Encrypting 16 octets using AES-CTR with 256-bit key 485s | decode_to_chunk: raw_key: input "0x77 6B EF F2 85 1D B0 6F 4C 8A 05 42 C8 69 6F 6C6A 81 AF 1E EC 96 B4 D3 7F C1 D6 89 E6 C1 C1 04" 485s | decode_to_chunk: output: 485s | 77 6b ef f2 85 1d b0 6f 4c 8a 05 42 c8 69 6f 6c wk.....oL..B.iol 485s | 6a 81 af 1e ec 96 b4 d3 7f c1 d6 89 e6 c1 c1 04 j............... 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5400 485s | key-offset: 0, key-size: 32 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_CTR 485s | flags: ENCRYPT+DECRYPT 485s | key_size: 32-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (48-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f53c8 485s | decode_to_chunk: input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 485s | decode_to_chunk: output: 485s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 485s | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 485s | decode_to_chunk: output: 485s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 485s | decode_to_chunk: Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 485s | decode_to_chunk: output: 485s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 485s | decode_to_chunk: expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 485s | decode_to_chunk: output: 485s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 485s | do_aes_ctr: enter 485s | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes 485s | do_aes_ctr: exit 485s | verify_chunk_data: encrypt: ok 485s | verify_chunk_data: counter-block: ok 485s | decode_to_chunk: input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 485s | decode_to_chunk: output: 485s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 485s | decode_to_chunk: Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 485s | decode_to_chunk: output: 485s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 485s | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 485s | decode_to_chunk: output: 485s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 485s | decode_to_chunk: expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 485s | decode_to_chunk: output: 485s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 485s | do_aes_ctr: enter 485s | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes 485s | do_aes_ctr: exit 485s | verify_chunk_data: decrypt: ok 485s | verify_chunk_data: counter-block: ok 485s | test_ctr_vector: Encrypting 16 octets using AES-CTR with 256-bit key passed 485s algparse: Encrypting 32 octets using AES-CTR with 256-bit key 485s | decode_to_chunk: raw_key: input "0xF6 D6 6D 6B D5 2D 59 BB 07 96 36 58 79 EF F8 86C6 6D D5 1A 5B 6A 99 74 4B 50 59 0C 87 A2 38 84" 485s | decode_to_chunk: output: 485s | f6 d6 6d 6b d5 2d 59 bb 07 96 36 58 79 ef f8 86 ..mk.-Y...6Xy... 485s | c6 6d d5 1a 5b 6a 99 74 4b 50 59 0c 87 a2 38 84 .m..[j.tKPY...8. 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5400 485s | key-offset: 0, key-size: 32 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_CTR 485s | flags: ENCRYPT+DECRYPT 485s | key_size: 32-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (48-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f53c8 485s | decode_to_chunk: input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 485s | decode_to_chunk: output: 485s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 485s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 485s | decode_to_chunk: output: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 485s | decode_to_chunk: Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 485s | decode_to_chunk: output: 485s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 485s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 485s | decode_to_chunk: expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 485s | decode_to_chunk: output: 485s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 485s | do_aes_ctr: enter 485s | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes 485s | do_aes_ctr: exit 485s | verify_chunk_data: encrypt: ok 485s | verify_chunk_data: counter-block: ok 485s | decode_to_chunk: input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 485s | decode_to_chunk: output: 485s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 485s | decode_to_chunk: Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 485s | decode_to_chunk: output: 485s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 485s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 485s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 485s | decode_to_chunk: output: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 485s | decode_to_chunk: expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 485s | decode_to_chunk: output: 485s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 485s | do_aes_ctr: enter 485s | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes 485s | do_aes_ctr: exit 485s | verify_chunk_data: decrypt: ok 485s | verify_chunk_data: counter-block: ok 485s | test_ctr_vector: Encrypting 32 octets using AES-CTR with 256-bit key passed 485s algparse: Encrypting 36 octets using AES-CTR with 256-bit key 485s | decode_to_chunk: raw_key: input "0xFF 7A 61 7C E6 91 48 E4 F1 72 6E 2F 43 58 1D E2AA 62 D9 F8 05 53 2E DF F1 EE D6 87 FB 54 15 3D" 485s | decode_to_chunk: output: 485s | ff 7a 61 7c e6 91 48 e4 f1 72 6e 2f 43 58 1d e2 .za|..H..rn/CX.. 485s | aa 62 d9 f8 05 53 2e df f1 ee d6 87 fb 54 15 3d .b...S.......T.= 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5400 485s | key-offset: 0, key-size: 32 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_CTR 485s | flags: ENCRYPT+DECRYPT 485s | key_size: 32-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (48-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f53c8 485s | decode_to_chunk: input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 485s | decode_to_chunk: output: 485s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 485s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 485s | decode_to_chunk: output: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 485s | 20 21 22 23 !"# 485s | decode_to_chunk: Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 485s | decode_to_chunk: output: 485s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 485s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 485s | 1e c0 e6 b8 .... 485s | decode_to_chunk: expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 485s | decode_to_chunk: output: 485s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 485s | do_aes_ctr: enter 485s | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes 485s | do_aes_ctr: exit 485s | verify_chunk_data: encrypt: ok 485s | verify_chunk_data: counter-block: ok 485s | decode_to_chunk: input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 485s | decode_to_chunk: output: 485s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 485s | decode_to_chunk: Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 485s | decode_to_chunk: output: 485s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 485s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 485s | 1e c0 e6 b8 .... 485s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 485s | decode_to_chunk: output: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 485s | 20 21 22 23 !"# 485s | decode_to_chunk: expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 485s | decode_to_chunk: output: 485s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 485s | do_aes_ctr: enter 485s | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes 485s | do_aes_ctr: exit 485s | verify_chunk_data: decrypt: ok 485s | verify_chunk_data: counter-block: ok 485s | test_ctr_vector: Encrypting 36 octets using AES-CTR with 256-bit key passed 485s algparse: testing AES_CBC: 485s algparse: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 485s | decode_to_chunk: raw_key: input "0x06a9214036b8a15b512e03d534120006" 485s | decode_to_chunk: output: 485s | 06 a9 21 40 36 b8 a1 5b 51 2e 03 d5 34 12 00 06 ..!@6..[Q...4... 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5410 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_CBC 485s | flags: ENCRYPT+DECRYPT 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f53d8 485s | decode_to_chunk: IV: : input "0x3dafba429d9eb430b422da802c9fac41" 485s | decode_to_chunk: output: 485s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 485s | decode_to_chunk: new IV: : input "0xe353779c1079aeb82708942dbe77181a" 485s | decode_to_chunk: output: 485s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 485s | decode_to_chunk: plaintext: : input "Single block msg" 485s | decode_to_chunk: output: 485s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 485s | decode_to_chunk: ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 485s | decode_to_chunk: output: 485s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 485s | NSS ike_alg_nss_cbc: AES_CBC - enter 485s | NSS ike_alg_nss_cbc: AES_CBC - exit 485s | verify_chunk_data: encrypt: ok 485s | verify_chunk_data: updated CBC IV: ok 485s | decode_to_chunk: IV: : input "0x3dafba429d9eb430b422da802c9fac41" 485s | decode_to_chunk: output: 485s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 485s | decode_to_chunk: new IV: : input "0xe353779c1079aeb82708942dbe77181a" 485s | decode_to_chunk: output: 485s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 485s | decode_to_chunk: ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 485s | decode_to_chunk: output: 485s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 485s | decode_to_chunk: plaintext: : input "Single block msg" 485s | decode_to_chunk: output: 485s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 485s | NSS ike_alg_nss_cbc: AES_CBC - enter 485s | NSS ike_alg_nss_cbc: AES_CBC - exit 485s | verify_chunk_data: decrypt: ok 485s | verify_chunk_data: updated CBC IV: ok 485s | test_ctr_vector: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key passed 485s algparse: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 485s | decode_to_chunk: raw_key: input "0xc286696d887c9aa0611bbb3e2025a45a" 485s | decode_to_chunk: output: 485s | c2 86 69 6d 88 7c 9a a0 61 1b bb 3e 20 25 a4 5a ..im.|..a..> %.Z 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5410 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_CBC 485s | flags: ENCRYPT+DECRYPT 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f53d8 485s | decode_to_chunk: IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 485s | decode_to_chunk: output: 485s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 485s | decode_to_chunk: new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 485s | decode_to_chunk: output: 485s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 485s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 485s | decode_to_chunk: plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 485s | decode_to_chunk: output: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 485s | decode_to_chunk: ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 485s | decode_to_chunk: output: 485s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 485s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 485s | NSS ike_alg_nss_cbc: AES_CBC - enter 485s | NSS ike_alg_nss_cbc: AES_CBC - exit 485s | verify_chunk_data: encrypt: ok 485s | verify_chunk_data: updated CBC IV: ok 485s | decode_to_chunk: IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 485s | decode_to_chunk: output: 485s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 485s | decode_to_chunk: new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 485s | decode_to_chunk: output: 485s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 485s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 485s | decode_to_chunk: ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 485s | decode_to_chunk: output: 485s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 485s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 485s | decode_to_chunk: plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 485s | decode_to_chunk: output: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 485s | NSS ike_alg_nss_cbc: AES_CBC - enter 485s | NSS ike_alg_nss_cbc: AES_CBC - exit 485s | verify_chunk_data: decrypt: ok 485s | verify_chunk_data: updated CBC IV: ok 485s | test_ctr_vector: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key passed 485s algparse: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 485s | decode_to_chunk: raw_key: input "0x6c3ea0477630ce21a2ce334aa746c2cd" 485s | decode_to_chunk: output: 485s | 6c 3e a0 47 76 30 ce 21 a2 ce 33 4a a7 46 c2 cd l>.Gv0.!..3J.F.. 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5410 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_CBC 485s | flags: ENCRYPT+DECRYPT 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f53d8 485s | decode_to_chunk: IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 485s | decode_to_chunk: output: 485s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 485s | decode_to_chunk: new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 485s | decode_to_chunk: output: 485s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 485s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 485s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 485s | decode_to_chunk: plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 485s | decode_to_chunk: output: 485s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 485s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 485s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 485s | decode_to_chunk: ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 485s | decode_to_chunk: output: 485s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 485s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 485s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 485s | NSS ike_alg_nss_cbc: AES_CBC - enter 485s | NSS ike_alg_nss_cbc: AES_CBC - exit 485s | verify_chunk_data: encrypt: ok 485s | verify_chunk_data: updated CBC IV: ok 485s | decode_to_chunk: IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 485s | decode_to_chunk: output: 485s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 485s | decode_to_chunk: new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 485s | decode_to_chunk: output: 485s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 485s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 485s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 485s | decode_to_chunk: ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 485s | decode_to_chunk: output: 485s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 485s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 485s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 485s | decode_to_chunk: plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 485s | decode_to_chunk: output: 485s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 485s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 485s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 485s | NSS ike_alg_nss_cbc: AES_CBC - enter 485s | NSS ike_alg_nss_cbc: AES_CBC - exit 485s | verify_chunk_data: decrypt: ok 485s | verify_chunk_data: updated CBC IV: ok 485s | test_ctr_vector: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key passed 485s algparse: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 485s | decode_to_chunk: raw_key: input "0x56e47a38c5598974bc46903dba290349" 485s | decode_to_chunk: output: 485s | 56 e4 7a 38 c5 59 89 74 bc 46 90 3d ba 29 03 49 V.z8.Y.t.F.=.).I 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5410 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_CBC 485s | flags: ENCRYPT+DECRYPT 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f53d8 485s | decode_to_chunk: IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 485s | decode_to_chunk: output: 485s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 485s | decode_to_chunk: plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 485s | decode_to_chunk: output: 485s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 485s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 485s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 485s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 485s | decode_to_chunk: ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 485s | decode_to_chunk: output: 485s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 485s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 485s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 485s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 485s | NSS ike_alg_nss_cbc: AES_CBC - enter 485s | NSS ike_alg_nss_cbc: AES_CBC - exit 485s | verify_chunk_data: encrypt: ok 485s | verify_chunk_data: updated CBC IV: ok 485s | decode_to_chunk: IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 485s | decode_to_chunk: output: 485s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 485s | decode_to_chunk: ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 485s | decode_to_chunk: output: 485s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 485s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 485s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 485s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 485s | decode_to_chunk: plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 485s | decode_to_chunk: output: 485s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 485s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 485s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 485s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 485s | NSS ike_alg_nss_cbc: AES_CBC - enter 485s | NSS ike_alg_nss_cbc: AES_CBC - exit 485s | verify_chunk_data: decrypt: ok 485s | verify_chunk_data: updated CBC IV: ok 485s | test_ctr_vector: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key passed 485s algparse: testing AES_XCBC: 485s algparse: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 485s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 485s | decode_to_chunk: output: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | decode_to_chunk: test_prf_vector: input "" 485s | decode_to_chunk: output: 485s | 485s | decode_to_chunk: test_prf_vector: input "0x75f0251d528ac01c4573dfd584d79f29" 485s | decode_to_chunk: output: 485s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 485s | PRF chunk interface PRF AES_XCBC init key-chunk@0xbe5a4ecc2780 (length 16) 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5320 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f52e8 485s | XCBC: Key 16=16 just right 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc0070 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5278 485s | PRF chunk interface PRF AES_XCBC 0xbe5a4ecc2d40 485s | PRF chunk interface PRF AES_XCBC update message (0xbe5a4ecc0050 length 0) 485s | 485s | XCBC: data 485s | 485s | K extracting all 16 bytes of key@0xbe5a4ecc1ae0 485s | K: symkey-key@0xbe5a4ecc1ae0 (16-bytes, AES_ECB) 485s | sizeof bytes 16 485s | wrapper: (SECItemType)623191333: ee 3c e6 16 c3 cd 09 f2 7c 29 d9 00 b3 3d b8 ae 485s | K extracted len 16 bytes at 0xbe5a4ecc22f0 485s | unwrapped: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | XCBC: K: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | XCBC: K1 485s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5210 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc4a10 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f51d8 485s | Computing E[0] using K3 485s | XCBC: K3 485s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 485s | XCBC: E[n-1] 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | XCBC: M[n] 485s | 485s | XCBC: M[n] 485s | 485s | XCBC: M[n]:80...^E[n-1]^K3 485s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 485s | XCBC: MAC 485s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 485s | PRF chunk interface PRF AES_XCBC final length 16 485s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 485s | chunk output 485s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 485s | verify_chunk_data: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: ok 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f53b0 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc0070 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5378 485s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xbe5a4ecc1ae0 (size 16) 485s | PRF symkey interface: key symkey-key@0xbe5a4ecc1ae0 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | XCBC: Key 16=16 just right 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f52b8 485s | PRF symkey interface PRF AES_XCBC 0xbe5a4ecc2d40 485s | PRF symkey interface PRF AES_XCBC update symkey message-key@(nil) (size 0) 485s | PRF symkey interface: symkey message-key@NULL 485s | symkey message NULL key has no bytes 485s | XCBC: data 485s | 485s | K extracting all 16 bytes of key@0xbe5a4ecc0070 485s | K: symkey-key@0xbe5a4ecc0070 (16-bytes, AES_ECB) 485s | sizeof bytes 16 485s | wrapper: (SECItemType)-744533104: ee 3c e6 16 c3 cd 09 f2 7c 29 d9 00 b3 3d b8 ae 485s | K extracted len 16 bytes at 0xbe5a4ecc22f0 485s | unwrapped: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | XCBC: K: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | XCBC: K1 485s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5270 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc6310 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5238 485s | Computing E[0] using K3 485s | XCBC: K3 485s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 485s | XCBC: E[n-1] 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | XCBC: M[n] 485s | 485s | XCBC: M[n] 485s | 485s | XCBC: M[n]:80...^E[n-1]^K3 485s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 485s | XCBC: MAC 485s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5340 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc6310 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5308 485s | PRF symkey interface PRF AES_XCBC final-key@0xbe5a4ecc4a10 (size 16) 485s | PRF symkey interface: key-key@0xbe5a4ecc4a10 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | output: symkey-key@0xbe5a4ecc4a10 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracting all 16 bytes of key@0xbe5a4ecc4a10 485s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: symkey-key@0xbe5a4ecc4a10 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | sizeof bytes 16 485s | wrapper: siBuffer: 16 27 d6 a0 ab 37 28 72 a0 43 c0 cc 76 f9 a5 e0 485s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracted len 16 bytes at 0xbe5a4ecc22f0 485s | unwrapped: 485s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 485s | verify_chunk_data: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: ok 485s | test_prf_vector: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input passed 485s algparse: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 485s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 485s | decode_to_chunk: output: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | decode_to_chunk: test_prf_vector: input "0x000102" 485s | decode_to_chunk: output: 485s | 00 01 02 ... 485s | decode_to_chunk: test_prf_vector: input "0x5b376580ae2f19afe7219ceef172756f" 485s | decode_to_chunk: output: 485s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 485s | PRF chunk interface PRF AES_XCBC init key-chunk@0xbe5a4ecc1e80 (length 16) 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5320 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f52e8 485s | XCBC: Key 16=16 just right 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc4a10 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5278 485s | PRF chunk interface PRF AES_XCBC 0xbe5a4ecc2d40 485s | PRF chunk interface PRF AES_XCBC update message (0xbe5a4ecc1ea0 length 3) 485s | 00 01 02 ... 485s | XCBC: data 485s | 00 01 02 ... 485s | K extracting all 16 bytes of key@0xbe5a4ecc1ae0 485s | K: symkey-key@0xbe5a4ecc1ae0 (16-bytes, AES_ECB) 485s | sizeof bytes 16 485s | wrapper: (SECItemType)623191333: ee 3c e6 16 c3 cd 09 f2 7c 29 d9 00 b3 3d b8 ae 485s | K extracted len 16 bytes at 0xbe5a4ecc2cb0 485s | unwrapped: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | XCBC: K: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | XCBC: K1 485s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5210 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc0070 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f51d8 485s | Computing E[1] using K3 485s | XCBC: K3 485s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 485s | XCBC: E[n-1] 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | XCBC: M[n] 485s | 00 01 02 ... 485s | XCBC: M[n] 485s | 00 01 02 ... 485s | XCBC: M[n]:80...^E[n-1]^K3 485s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 485s | XCBC: MAC 485s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 485s | PRF chunk interface PRF AES_XCBC final length 16 485s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 485s | chunk output 485s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 485s | verify_chunk_data: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: ok 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f53b0 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc4a10 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5378 485s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xbe5a4ecc1ae0 (size 16) 485s | PRF symkey interface: key symkey-key@0xbe5a4ecc1ae0 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | XCBC: Key 16=16 just right 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f52b8 485s | PRF symkey interface PRF AES_XCBC 0xbe5a4ecc2d40 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f53b0 485s | key-offset: 0, key-size: 3 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 3-bytes 485s | base: base-key@0xbe5a4ecc6310 (19-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5378 485s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xbe5a4ecc0070 (size 3) 485s | PRF symkey interface: symkey message-key@0xbe5a4ecc0070 (3-bytes, EXTRACT_KEY_FROM_KEY) 485s | symkey message extracting all 3 bytes of key@0xbe5a4ecc0070 485s | symkey message: symkey-key@0xbe5a4ecc0070 (3-bytes, EXTRACT_KEY_FROM_KEY) 485s | sizeof bytes 16 485s | wrapper: siBuffer: ba 30 94 80 5c ae 3e de e3 04 7e 97 a3 23 46 3e 485s | symkey message extracted len 16 bytes at 0xbe5a4ecc22f0 485s | unwrapped: 485s | 00 01 02 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | XCBC: data 485s | 00 01 02 ... 485s | K extracting all 16 bytes of key@0xbe5a4ecc4a10 485s | K: symkey-key@0xbe5a4ecc4a10 (16-bytes, AES_ECB) 485s | sizeof bytes 16 485s | wrapper: (SECItemType)2097152: ee 3c e6 16 c3 cd 09 f2 7c 29 d9 00 b3 3d b8 ae 485s | K extracted len 16 bytes at 0xbe5a4ecc2cb0 485s | unwrapped: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | XCBC: K: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | XCBC: K1 485s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5270 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc7bd0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5238 485s | Computing E[1] using K3 485s | XCBC: K3 485s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 485s | XCBC: E[n-1] 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | XCBC: M[n] 485s | 00 01 02 ... 485s | XCBC: M[n] 485s | 00 01 02 ... 485s | XCBC: M[n]:80...^E[n-1]^K3 485s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 485s | XCBC: MAC 485s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5340 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc7bd0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5308 485s | PRF symkey interface PRF AES_XCBC final-key@0xbe5a4ecc6310 (size 16) 485s | PRF symkey interface: key-key@0xbe5a4ecc6310 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | output: symkey-key@0xbe5a4ecc6310 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracting all 16 bytes of key@0xbe5a4ecc6310 485s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: symkey-key@0xbe5a4ecc6310 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | sizeof bytes 16 485s | wrapper: siBuffer: 26 98 c2 97 e0 37 65 a6 4a 73 9d 29 fb f9 07 93 485s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracted len 16 bytes at 0xbe5a4ecc1ee0 485s | unwrapped: 485s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 485s | verify_chunk_data: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: ok 485s | test_prf_vector: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input passed 485s algparse: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 485s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 485s | decode_to_chunk: output: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 485s | decode_to_chunk: output: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | decode_to_chunk: test_prf_vector: input "0xd2a246fa349b68a79998a4394ff7a263" 485s | decode_to_chunk: output: 485s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 485s | PRF chunk interface PRF AES_XCBC init key-chunk@0xbe5a4ecc2780 (length 16) 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5320 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f52e8 485s | XCBC: Key 16=16 just right 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc6310 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5278 485s | PRF chunk interface PRF AES_XCBC 0xbe5a4ecc22f0 485s | PRF chunk interface PRF AES_XCBC update message (0xbe5a4ecc1ec0 length 16) 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | XCBC: data 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | K extracting all 16 bytes of key@0xbe5a4ecc1ae0 485s | K: symkey-key@0xbe5a4ecc1ae0 (16-bytes, AES_ECB) 485s | sizeof bytes 16 485s | wrapper: (SECItemType)623191333: ee 3c e6 16 c3 cd 09 f2 7c 29 d9 00 b3 3d b8 ae 485s | K extracted len 16 bytes at 0xbe5a4ecc2cb0 485s | unwrapped: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | XCBC: K: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | XCBC: K1 485s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5210 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc0070 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f51d8 485s | XCBC: Computing E[1] using K2 485s | XCBC: K2 485s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 485s | XCBC: E[n-1] 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | XCBC: M[n] 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | XCBC: M[n]^E[n-1]^K2 485s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 485s | XCBC: MAC 485s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 485s | PRF chunk interface PRF AES_XCBC final length 16 485s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 485s | chunk output 485s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 485s | verify_chunk_data: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: ok 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f53b0 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc6310 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5378 485s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xbe5a4ecc1ae0 (size 16) 485s | PRF symkey interface: key symkey-key@0xbe5a4ecc1ae0 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | XCBC: Key 16=16 just right 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f52b8 485s | PRF symkey interface PRF AES_XCBC 0xbe5a4ecc22f0 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f53b0 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc4a10 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5378 485s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xbe5a4ecc0070 (size 16) 485s | PRF symkey interface: symkey message-key@0xbe5a4ecc0070 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | symkey message extracting all 16 bytes of key@0xbe5a4ecc0070 485s | symkey message: symkey-key@0xbe5a4ecc0070 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | sizeof bytes 16 485s | wrapper: siBuffer: ee 3c e6 16 c3 cd 09 f2 7c 29 d9 00 b3 3d b8 ae 485s | symkey message extracted len 16 bytes at 0xbe5a4ecc2cb0 485s | unwrapped: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | XCBC: data 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | K extracting all 16 bytes of key@0xbe5a4ecc6310 485s | K: symkey-key@0xbe5a4ecc6310 (16-bytes, AES_ECB) 485s | sizeof bytes 16 485s | wrapper: (SECItemType)2097152: ee 3c e6 16 c3 cd 09 f2 7c 29 d9 00 b3 3d b8 ae 485s | K extracted len 16 bytes at 0xbe5a4ecc2d40 485s | unwrapped: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | XCBC: K: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | XCBC: K1 485s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5270 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc7bd0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5238 485s | XCBC: Computing E[1] using K2 485s | XCBC: K2 485s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 485s | XCBC: E[n-1] 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | XCBC: M[n] 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | XCBC: M[n]^E[n-1]^K2 485s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 485s | XCBC: MAC 485s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5340 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc7bd0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5308 485s | PRF symkey interface PRF AES_XCBC final-key@0xbe5a4ecc4a10 (size 16) 485s | PRF symkey interface: key-key@0xbe5a4ecc4a10 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | output: symkey-key@0xbe5a4ecc4a10 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracting all 16 bytes of key@0xbe5a4ecc4a10 485s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: symkey-key@0xbe5a4ecc4a10 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | sizeof bytes 16 485s | wrapper: siBuffer: cd d4 d6 0e 93 45 6b 51 40 0f 85 ec c2 23 9e 55 485s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracted len 16 bytes at 0xbe5a4ecc2d40 485s | unwrapped: 485s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 485s | verify_chunk_data: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: ok 485s | test_prf_vector: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input passed 485s algparse: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 485s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 485s | decode_to_chunk: output: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 485s | decode_to_chunk: output: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 .... 485s | decode_to_chunk: test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 485s | decode_to_chunk: output: 485s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 485s | PRF chunk interface PRF AES_XCBC init key-chunk@0xbe5a4ecc4b80 (length 16) 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5320 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f52e8 485s | XCBC: Key 16=16 just right 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc4a10 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5278 485s | PRF chunk interface PRF AES_XCBC 0xbe5a4ecc2cb0 485s | PRF chunk interface PRF AES_XCBC update message (0xbe5a4ecc1a40 length 20) 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 .... 485s | XCBC: data 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 .... 485s | K extracting all 16 bytes of key@0xbe5a4ecc1ae0 485s | K: symkey-key@0xbe5a4ecc1ae0 (16-bytes, AES_ECB) 485s | sizeof bytes 16 485s | wrapper: (SECItemType)623191333: ee 3c e6 16 c3 cd 09 f2 7c 29 d9 00 b3 3d b8 ae 485s | K extracted len 16 bytes at 0xbe5a4ecc22f0 485s | unwrapped: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | XCBC: K: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | XCBC: K1 485s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5210 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc0070 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f51d8 485s | Computing E[2] using K3 485s | XCBC: K3 485s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 485s | XCBC: E[n-1] 485s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 485s | XCBC: M[n] 485s | 10 11 12 13 .... 485s | XCBC: M[n] 485s | 10 11 12 13 .... 485s | XCBC: M[n]:80...^E[n-1]^K3 485s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 485s | XCBC: MAC 485s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 485s | PRF chunk interface PRF AES_XCBC final length 16 485s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 485s | chunk output 485s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 485s | verify_chunk_data: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: ok 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f53b0 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc4a10 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5378 485s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xbe5a4ecc1ae0 (size 16) 485s | PRF symkey interface: key symkey-key@0xbe5a4ecc1ae0 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | XCBC: Key 16=16 just right 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f52b8 485s | PRF symkey interface PRF AES_XCBC 0xbe5a4ecc2cb0 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f53b0 485s | key-offset: 0, key-size: 20 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 20-bytes 485s | base: base-key@0xbe5a4ecc6310 (36-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5378 485s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xbe5a4ecc0070 (size 20) 485s | PRF symkey interface: symkey message-key@0xbe5a4ecc0070 (20-bytes, EXTRACT_KEY_FROM_KEY) 485s | symkey message extracting all 20 bytes of key@0xbe5a4ecc0070 485s | symkey message: symkey-key@0xbe5a4ecc0070 (20-bytes, EXTRACT_KEY_FROM_KEY) 485s | sizeof bytes 32 485s | wrapper: siBuffer: ee 3c e6 16 c3 cd 09 f2 7c 29 d9 00 b3 3d b8 ae 77 db 44 6d d1 f7 5d 26 06 2f 51 61 74 dd e3 5f 485s | symkey message extracted len 32 bytes at 0xbe5a4ecc22f0 485s | unwrapped: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | XCBC: data 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 .... 485s | K extracting all 16 bytes of key@0xbe5a4ecc4a10 485s | K: symkey-key@0xbe5a4ecc4a10 (16-bytes, AES_ECB) 485s | sizeof bytes 16 485s | wrapper: (SECItemType)2097152: ee 3c e6 16 c3 cd 09 f2 7c 29 d9 00 b3 3d b8 ae 485s | K extracted len 16 bytes at 0xbe5a4ecc22f0 485s | unwrapped: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | XCBC: K: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | XCBC: K1 485s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5270 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc7bd0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5238 485s | Computing E[2] using K3 485s | XCBC: K3 485s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 485s | XCBC: E[n-1] 485s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 485s | XCBC: M[n] 485s | 10 11 12 13 .... 485s | XCBC: M[n] 485s | 10 11 12 13 .... 485s | XCBC: M[n]:80...^E[n-1]^K3 485s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 485s | XCBC: MAC 485s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5340 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc7bd0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5308 485s | PRF symkey interface PRF AES_XCBC final-key@0xbe5a4ecc6310 (size 16) 485s | PRF symkey interface: key-key@0xbe5a4ecc6310 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | output: symkey-key@0xbe5a4ecc6310 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracting all 16 bytes of key@0xbe5a4ecc6310 485s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: symkey-key@0xbe5a4ecc6310 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | sizeof bytes 16 485s | wrapper: siBuffer: cc 26 78 9b c0 c3 f3 d4 c2 3c 92 4e e1 55 46 d3 485s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracted len 16 bytes at 0xbe5a4ecc22f0 485s | unwrapped: 485s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 485s | verify_chunk_data: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: ok 485s | test_prf_vector: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input passed 485s algparse: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 485s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 485s | decode_to_chunk: output: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 485s | decode_to_chunk: output: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 485s | decode_to_chunk: test_prf_vector: input "0xf54f0ec8d2b9f3d36807734bd5283fd4" 485s | decode_to_chunk: output: 485s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 485s | PRF chunk interface PRF AES_XCBC init key-chunk@0xbe5a4ecc1ee0 (length 16) 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5320 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f52e8 485s | XCBC: Key 16=16 just right 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc6310 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5278 485s | PRF chunk interface PRF AES_XCBC 0xbe5a4ecc2cb0 485s | PRF chunk interface PRF AES_XCBC update message (0xbe5a4ecc22f0 length 32) 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 485s | XCBC: data 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 485s | K extracting all 16 bytes of key@0xbe5a4ecc1ae0 485s | K: symkey-key@0xbe5a4ecc1ae0 (16-bytes, AES_ECB) 485s | sizeof bytes 16 485s | wrapper: (SECItemType)623191333: ee 3c e6 16 c3 cd 09 f2 7c 29 d9 00 b3 3d b8 ae 485s | K extracted len 16 bytes at 0xbe5a4ecc1cd0 485s | unwrapped: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | XCBC: K: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | XCBC: K1 485s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5210 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc0070 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f51d8 485s | XCBC: Computing E[2] using K2 485s | XCBC: K2 485s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 485s | XCBC: E[n-1] 485s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 485s | XCBC: M[n] 485s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 485s | XCBC: M[n]^E[n-1]^K2 485s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 485s | XCBC: MAC 485s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 485s | PRF chunk interface PRF AES_XCBC final length 16 485s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 485s | chunk output 485s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 485s | verify_chunk_data: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: ok 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f53b0 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc6310 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5378 485s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xbe5a4ecc1ae0 (size 16) 485s | PRF symkey interface: key symkey-key@0xbe5a4ecc1ae0 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | XCBC: Key 16=16 just right 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f52b8 485s | PRF symkey interface PRF AES_XCBC 0xbe5a4ecc2cb0 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f53b0 485s | key-offset: 0, key-size: 32 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 32-bytes 485s | base: base-key@0xbe5a4ecc4a10 (48-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5378 485s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xbe5a4ecc0070 (size 32) 485s | PRF symkey interface: symkey message-key@0xbe5a4ecc0070 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | symkey message extracting all 32 bytes of key@0xbe5a4ecc0070 485s | symkey message: symkey-key@0xbe5a4ecc0070 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | sizeof bytes 32 485s | wrapper: siBuffer: ee 3c e6 16 c3 cd 09 f2 7c 29 d9 00 b3 3d b8 ae e7 7e 87 e9 9d 77 3b 44 ff 74 b6 90 ca 8a b0 92 485s | symkey message extracted len 32 bytes at 0xbe5a4ecc1ea0 485s | unwrapped: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 485s | XCBC: data 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 485s | K extracting all 16 bytes of key@0xbe5a4ecc6310 485s | K: symkey-key@0xbe5a4ecc6310 (16-bytes, AES_ECB) 485s | sizeof bytes 16 485s | wrapper: (SECItemType)2097152: ee 3c e6 16 c3 cd 09 f2 7c 29 d9 00 b3 3d b8 ae 485s | K extracted len 16 bytes at 0xbe5a4ecc0050 485s | unwrapped: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | XCBC: K: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | XCBC: K1 485s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5270 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc7bd0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5238 485s | XCBC: Computing E[2] using K2 485s | XCBC: K2 485s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 485s | XCBC: E[n-1] 485s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 485s | XCBC: M[n] 485s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 485s | XCBC: M[n]^E[n-1]^K2 485s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 485s | XCBC: MAC 485s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5340 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc7bd0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5308 485s | PRF symkey interface PRF AES_XCBC final-key@0xbe5a4ecc4a10 (size 16) 485s | PRF symkey interface: key-key@0xbe5a4ecc4a10 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | output: symkey-key@0xbe5a4ecc4a10 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracting all 16 bytes of key@0xbe5a4ecc4a10 485s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: symkey-key@0xbe5a4ecc4a10 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | sizeof bytes 16 485s | wrapper: siBuffer: 6a 6c 94 87 67 31 28 69 27 43 cf b9 b1 76 83 b0 485s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracted len 16 bytes at 0xbe5a4ecc2cb0 485s | unwrapped: 485s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 485s | verify_chunk_data: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: ok 485s | test_prf_vector: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input passed 485s algparse: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 485s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 485s | decode_to_chunk: output: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f2021" 485s | decode_to_chunk: output: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 485s | 20 21 ! 485s | decode_to_chunk: test_prf_vector: input "0xbecbb3bccdb518a30677d5481fb6b4d8" 485s | decode_to_chunk: output: 485s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 485s | PRF chunk interface PRF AES_XCBC init key-chunk@0xbe5a4ecc1e80 (length 16) 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5320 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f52e8 485s | XCBC: Key 16=16 just right 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc4a10 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5278 485s | PRF chunk interface PRF AES_XCBC 0xbe5a4ecc22f0 485s | PRF chunk interface PRF AES_XCBC update message (0xbe5a4ecc2d40 length 34) 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 485s | 20 21 ! 485s | XCBC: data 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 485s | 20 21 ! 485s | K extracting all 16 bytes of key@0xbe5a4ecc1ae0 485s | K: symkey-key@0xbe5a4ecc1ae0 (16-bytes, AES_ECB) 485s | sizeof bytes 16 485s | wrapper: (SECItemType)623191333: ee 3c e6 16 c3 cd 09 f2 7c 29 d9 00 b3 3d b8 ae 485s | K extracted len 16 bytes at 0xbe5a4ecc2cb0 485s | unwrapped: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | XCBC: K: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | XCBC: K1 485s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5210 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc0070 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f51d8 485s | Computing E[3] using K3 485s | XCBC: K3 485s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 485s | XCBC: E[n-1] 485s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 485s | XCBC: M[n] 485s | 20 21 ! 485s | XCBC: M[n] 485s | 20 21 ! 485s | XCBC: M[n]:80...^E[n-1]^K3 485s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 485s | XCBC: MAC 485s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 485s | PRF chunk interface PRF AES_XCBC final length 16 485s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 485s | chunk output 485s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 485s | verify_chunk_data: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: ok 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f53b0 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc4a10 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5378 485s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xbe5a4ecc1ae0 (size 16) 485s | PRF symkey interface: key symkey-key@0xbe5a4ecc1ae0 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | XCBC: Key 16=16 just right 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f52b8 485s | PRF symkey interface PRF AES_XCBC 0xbe5a4ecc22f0 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f53b0 485s | key-offset: 0, key-size: 34 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 34-bytes 485s | base: base-key@0xbe5a4ecc6310 (50-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5378 485s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xbe5a4ecc0070 (size 34) 485s | PRF symkey interface: symkey message-key@0xbe5a4ecc0070 (34-bytes, EXTRACT_KEY_FROM_KEY) 485s | symkey message extracting all 34 bytes of key@0xbe5a4ecc0070 485s | symkey message: symkey-key@0xbe5a4ecc0070 (34-bytes, EXTRACT_KEY_FROM_KEY) 485s | sizeof bytes 48 485s | wrapper: siBuffer: ee 3c e6 16 c3 cd 09 f2 7c 29 d9 00 b3 3d b8 ae e7 7e 87 e9 9d 77 3b 44 ff 74 b6 90 ca 8a b0 92 d8 0c 3a 6d 0a ae f0 cd ac b2 ef 3d c7 38 28 59 485s | symkey message extracted len 48 bytes at 0xbe5a4ecc7de0 485s | unwrapped: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 485s | 20 21 00 00 00 00 00 00 00 00 00 00 00 00 00 00 !.............. 485s | XCBC: data 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 485s | 20 21 ! 485s | K extracting all 16 bytes of key@0xbe5a4ecc4a10 485s | K: symkey-key@0xbe5a4ecc4a10 (16-bytes, AES_ECB) 485s | sizeof bytes 16 485s | wrapper: (SECItemType)2097152: ee 3c e6 16 c3 cd 09 f2 7c 29 d9 00 b3 3d b8 ae 485s | K extracted len 16 bytes at 0xbe5a4ecc48b0 485s | unwrapped: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | XCBC: K: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | XCBC: K1 485s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5270 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc7bd0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5238 485s | Computing E[3] using K3 485s | XCBC: K3 485s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 485s | XCBC: E[n-1] 485s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 485s | XCBC: M[n] 485s | 20 21 ! 485s | XCBC: M[n] 485s | 20 21 ! 485s | XCBC: M[n]:80...^E[n-1]^K3 485s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 485s | XCBC: MAC 485s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5340 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc7bd0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5308 485s | PRF symkey interface PRF AES_XCBC final-key@0xbe5a4ecc6310 (size 16) 485s | PRF symkey interface: key-key@0xbe5a4ecc6310 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | output: symkey-key@0xbe5a4ecc6310 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracting all 16 bytes of key@0xbe5a4ecc6310 485s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: symkey-key@0xbe5a4ecc6310 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | sizeof bytes 16 485s | wrapper: siBuffer: 7a e1 6d c4 92 a4 bf 79 92 32 18 d3 2a 3d 34 2e 485s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracted len 16 bytes at 0xbe5a4ecc65c0 485s | unwrapped: 485s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 485s | verify_chunk_data: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: ok 485s | test_prf_vector: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input passed 485s algparse: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 485s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 485s | decode_to_chunk: output: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | decode_to_chunk: test_prf_vector: input "0xf0dafee895db30253761103b5d84528f" 485s | decode_to_chunk: output: 485s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 485s | PRF chunk interface PRF AES_XCBC init key-chunk@0xbe5a4ecc1cd0 (length 16) 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5320 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f52e8 485s | XCBC: Key 16=16 just right 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc6310 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5278 485s | PRF chunk interface PRF AES_XCBC 0xbe5a4ecc2cb0 485s | PRF chunk interface PRF AES_XCBC update message (0xbe5a4ecc0410 length 1000) 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 ........ 485s | XCBC: data 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 ........ 485s | K extracting all 16 bytes of key@0xbe5a4ecc1ae0 485s | K: symkey-key@0xbe5a4ecc1ae0 (16-bytes, AES_ECB) 485s | sizeof bytes 16 485s | wrapper: (SECItemType)623191333: ee 3c e6 16 c3 cd 09 f2 7c 29 d9 00 b3 3d b8 ae 485s | K extracted len 16 bytes at 0xbe5a4ecc2d40 485s | unwrapped: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | XCBC: K: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | XCBC: K1 485s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5210 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc0070 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f51d8 485s | Computing E[63] using K3 485s | XCBC: K3 485s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 485s | XCBC: E[n-1] 485s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 485s | XCBC: M[n] 485s | 00 00 00 00 00 00 00 00 ........ 485s | XCBC: M[n] 485s | 00 00 00 00 00 00 00 00 ........ 485s | XCBC: M[n]:80...^E[n-1]^K3 485s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 485s | XCBC: MAC 485s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 485s | PRF chunk interface PRF AES_XCBC final length 16 485s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 485s | chunk output 485s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 485s | verify_chunk_data: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: ok 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f53b0 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc6310 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5378 485s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xbe5a4ecc1ae0 (size 16) 485s | PRF symkey interface: key symkey-key@0xbe5a4ecc1ae0 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | XCBC: Key 16=16 just right 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f52b8 485s | PRF symkey interface PRF AES_XCBC 0xbe5a4ecc2cb0 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f53b0 485s | key-offset: 0, key-size: 1000 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 1000-bytes 485s | base: base-key@0xbe5a4ecc4a10 (1016-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5378 485s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xbe5a4ecc0070 (size 1000) 485s | PRF symkey interface: symkey message-key@0xbe5a4ecc0070 (1000-bytes, EXTRACT_KEY_FROM_KEY) 485s | symkey message extracting all 1000 bytes of key@0xbe5a4ecc0070 485s | symkey message: symkey-key@0xbe5a4ecc0070 (1000-bytes, EXTRACT_KEY_FROM_KEY) 485s | sizeof bytes 1008 485s | wrapper: siBuffer: e7 93 55 8a e9 4d 30 46 8d 26 d5 75 29 f8 54 ed e7 93 55 8a e9 4d 30 46 8d 26 d5 75 29 f8 54 ed e7 93 55 8a e9 4d 30 46 8d 26 d5 75 29 f8 54 ed e7 93 55 8a e9 4d 30 46 8d 26 d5 75 29 f8 54 ed e7 93 55 8a e9 4d 30 46 8d 26 d5 75 29 f8 54 ed e7 93 55 8a e9 4d 30 46 8d 26 d5 75 29 f8 54 ed e7 93 55 8a e9 4d 30 46 8d 26 d5 75 29 f8 54 ed e7 93 55 8a e9 4d 30 46 8d 26 d5 75 29 f8 54 ed e7 93 55 8a e9 4d 30 46 8d 26 d5 75 29 f8 54 ed e7 93 55 8a e9 4d 30 46 8d 26 d5 75 29 f8 54 ed e7 93 55 8a e9 4d 30 46 8d 26 d5 75 29 f8 54 ed e7 93 55 8a e9 4d 30 46 8d 26 d5 75 29 f8 54 ed e7 93 55 8a e9 4d 30 46 8d 26 d5 75 29 f8 54 ed e7 93 55 8a e9 4d 30 46 8d 26 d5 75 29 f8 54 ed e7 93 55 8a e9 4d 30 46 8d 26 d5 75 29 f8 54 ed e7 93 55 8a e9 4d 30 46 8d 26 d5 75 29 f8 54 ed e7 93 55 8a e9 4d 30 46 8d 26 d5 75 29 f8 54 ed e7 93 55 8a e9 4d 30 46 8d 26 d5 75 29 f8 54 ed e7 93 55 8a e9 4d 30 46 8d 26 d5 75 29 f8 54 ed e7 93 55 8a ... 485s | symkey message extracted len 1008 bytes at 0xbe5a4ecca410 485s | unwrapped: 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | XCBC: data 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | 00 00 00 00 00 00 00 00 ........ 485s | K extracting all 16 bytes of key@0xbe5a4ecc6310 485s | K: symkey-key@0xbe5a4ecc6310 (16-bytes, AES_ECB) 485s | sizeof bytes 16 485s | wrapper: (SECItemType)2097152: ee 3c e6 16 c3 cd 09 f2 7c 29 d9 00 b3 3d b8 ae 485s | K extracted len 16 bytes at 0xbe5a4ecc2d40 485s | unwrapped: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | XCBC: K: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | XCBC: K1 485s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5270 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc7bd0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5238 485s | Computing E[63] using K3 485s | XCBC: K3 485s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 485s | XCBC: E[n-1] 485s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 485s | XCBC: M[n] 485s | 00 00 00 00 00 00 00 00 ........ 485s | XCBC: M[n] 485s | 00 00 00 00 00 00 00 00 ........ 485s | XCBC: M[n]:80...^E[n-1]^K3 485s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 485s | XCBC: MAC 485s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5340 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc7bd0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5308 485s | PRF symkey interface PRF AES_XCBC final-key@0xbe5a4ecc4a10 (size 16) 485s | PRF symkey interface: key-key@0xbe5a4ecc4a10 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | output: symkey-key@0xbe5a4ecc4a10 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracting all 16 bytes of key@0xbe5a4ecc4a10 485s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: symkey-key@0xbe5a4ecc4a10 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | sizeof bytes 16 485s | wrapper: siBuffer: 28 02 84 c0 fb 99 9c 02 21 58 91 35 0f c6 0d 75 485s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracted len 16 bytes at 0xbe5a4ecc2d40 485s | unwrapped: 485s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 485s | verify_chunk_data: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: ok 485s | test_prf_vector: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input passed 485s algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 485s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 485s | decode_to_chunk: output: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 485s | decode_to_chunk: output: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 .... 485s | decode_to_chunk: test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 485s | decode_to_chunk: output: 485s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 485s | PRF chunk interface PRF AES_XCBC init key-chunk@0xbe5a4ecc0050 (length 16) 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5320 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f52e8 485s | XCBC: Key 16=16 just right 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc4a10 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5278 485s | PRF chunk interface PRF AES_XCBC 0xbe5a4ecc2cb0 485s | PRF chunk interface PRF AES_XCBC update message (0xbe5a4ecc4b80 length 20) 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 .... 485s | XCBC: data 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 .... 485s | K extracting all 16 bytes of key@0xbe5a4ecc1ae0 485s | K: symkey-key@0xbe5a4ecc1ae0 (16-bytes, AES_ECB) 485s | sizeof bytes 16 485s | wrapper: (SECItemType)623191333: ee 3c e6 16 c3 cd 09 f2 7c 29 d9 00 b3 3d b8 ae 485s | K extracted len 16 bytes at 0xbe5a4ecc2d40 485s | unwrapped: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | XCBC: K: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | XCBC: K1 485s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5210 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc0070 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f51d8 485s | Computing E[2] using K3 485s | XCBC: K3 485s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 485s | XCBC: E[n-1] 485s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 485s | XCBC: M[n] 485s | 10 11 12 13 .... 485s | XCBC: M[n] 485s | 10 11 12 13 .... 485s | XCBC: M[n]:80...^E[n-1]^K3 485s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 485s | XCBC: MAC 485s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 485s | PRF chunk interface PRF AES_XCBC final length 16 485s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 485s | chunk output 485s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 485s | verify_chunk_data: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): ok 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f53b0 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc4a10 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5378 485s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xbe5a4ecc1ae0 (size 16) 485s | PRF symkey interface: key symkey-key@0xbe5a4ecc1ae0 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | XCBC: Key 16=16 just right 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f52b8 485s | PRF symkey interface PRF AES_XCBC 0xbe5a4ecc2cb0 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f53b0 485s | key-offset: 0, key-size: 20 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 20-bytes 485s | base: base-key@0xbe5a4ecc6310 (36-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5378 485s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xbe5a4ecc0070 (size 20) 485s | PRF symkey interface: symkey message-key@0xbe5a4ecc0070 (20-bytes, EXTRACT_KEY_FROM_KEY) 485s | symkey message extracting all 20 bytes of key@0xbe5a4ecc0070 485s | symkey message: symkey-key@0xbe5a4ecc0070 (20-bytes, EXTRACT_KEY_FROM_KEY) 485s | sizeof bytes 32 485s | wrapper: siBuffer: ee 3c e6 16 c3 cd 09 f2 7c 29 d9 00 b3 3d b8 ae 77 db 44 6d d1 f7 5d 26 06 2f 51 61 74 dd e3 5f 485s | symkey message extracted len 32 bytes at 0xbe5a4ecc4730 485s | unwrapped: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | XCBC: data 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 .... 485s | K extracting all 16 bytes of key@0xbe5a4ecc4a10 485s | K: symkey-key@0xbe5a4ecc4a10 (16-bytes, AES_ECB) 485s | sizeof bytes 16 485s | wrapper: (SECItemType)2097152: ee 3c e6 16 c3 cd 09 f2 7c 29 d9 00 b3 3d b8 ae 485s | K extracted len 16 bytes at 0xbe5a4ecc2d40 485s | unwrapped: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | XCBC: K: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | XCBC: K1 485s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5270 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc7bd0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5238 485s | Computing E[2] using K3 485s | XCBC: K3 485s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 485s | XCBC: E[n-1] 485s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 485s | XCBC: M[n] 485s | 10 11 12 13 .... 485s | XCBC: M[n] 485s | 10 11 12 13 .... 485s | XCBC: M[n]:80...^E[n-1]^K3 485s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 485s | XCBC: MAC 485s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5340 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc7bd0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5308 485s | PRF symkey interface PRF AES_XCBC final-key@0xbe5a4ecc6310 (size 16) 485s | PRF symkey interface: key-key@0xbe5a4ecc6310 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | output: symkey-key@0xbe5a4ecc6310 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracting all 16 bytes of key@0xbe5a4ecc6310 485s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): symkey-key@0xbe5a4ecc6310 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | sizeof bytes 16 485s | wrapper: siBuffer: cc 26 78 9b c0 c3 f3 d4 c2 3c 92 4e e1 55 46 d3 485s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracted len 16 bytes at 0xbe5a4ecc2d40 485s | unwrapped: 485s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 485s | verify_chunk_data: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): ok 485s | test_prf_vector: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) passed 485s algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 485s | decode_to_chunk: test_prf_vector: input "0x00010203040506070809" 485s | decode_to_chunk: output: 485s | 00 01 02 03 04 05 06 07 08 09 .......... 485s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 485s | decode_to_chunk: output: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 .... 485s | decode_to_chunk: test_prf_vector: input "0x0fa087af7d866e7653434e602fdde835" 485s | decode_to_chunk: output: 485s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 485s | PRF chunk interface PRF AES_XCBC init key-chunk@0xbe5a4ecc1cd0 (length 10) 485s | 00 01 02 03 04 05 06 07 08 09 .......... 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5320 485s | key-offset: 0, key-size: 10 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 10-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (26-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f52e8 485s | XCBC: Key 10<16 too small, padding with zeros 485s | CONCATENATE_BASE_AND_DATA: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecc6310 (10-bytes, EXTRACT_KEY_FROM_KEY) 485s | params: 16-bytes@0xffffd39f5270 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5278 485s | PRF chunk interface PRF AES_XCBC 0xbe5a4ecc2cb0 485s | PRF chunk interface PRF AES_XCBC update message (0xbe5a4ecc1a20 length 20) 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 .... 485s | XCBC: data 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 .... 485s | K extracting all 16 bytes of key@0xbe5a4ecc0070 485s | K: symkey-key@0xbe5a4ecc0070 (16-bytes, AES_ECB) 485s | sizeof bytes 16 485s | wrapper: (SECItemType)623191333: 29 48 30 67 2c 9a 7b d1 8c 3f de b6 1b 04 bf 44 485s | K extracted len 16 bytes at 0xbe5a4ecc18a0 485s | unwrapped: 485s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 485s | XCBC: K: 485s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 485s | XCBC: K1 485s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5210 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f51d8 485s | Computing E[2] using K3 485s | XCBC: K3 485s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 485s | XCBC: E[n-1] 485s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 485s | XCBC: M[n] 485s | 10 11 12 13 .... 485s | XCBC: M[n] 485s | 10 11 12 13 .... 485s | XCBC: M[n]:80...^E[n-1]^K3 485s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 485s | XCBC: MAC 485s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 485s | PRF chunk interface PRF AES_XCBC final length 16 485s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 485s | chunk output 485s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 485s | verify_chunk_data: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): ok 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f53b0 485s | key-offset: 0, key-size: 10 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 10-bytes 485s | base: base-key@0xbe5a4ecc6310 (26-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5378 485s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xbe5a4ecc0070 (size 10) 485s | PRF symkey interface: key symkey-key@0xbe5a4ecc0070 (10-bytes, EXTRACT_KEY_FROM_KEY) 485s | XCBC: Key 10<16 too small, padding with zeros 485s | CONCATENATE_BASE_AND_DATA: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecc0070 (10-bytes, EXTRACT_KEY_FROM_KEY) 485s | params: 16-bytes@0xffffd39f52b0 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc6310 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f52b8 485s | PRF symkey interface PRF AES_XCBC 0xbe5a4ecc2cb0 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f53b0 485s | key-offset: 0, key-size: 20 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 20-bytes 485s | base: base-key@0xbe5a4ecc4a10 (36-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5378 485s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xbe5a4ecc6310 (size 20) 485s | PRF symkey interface: symkey message-key@0xbe5a4ecc6310 (20-bytes, EXTRACT_KEY_FROM_KEY) 485s | symkey message extracting all 20 bytes of key@0xbe5a4ecc6310 485s | symkey message: symkey-key@0xbe5a4ecc6310 (20-bytes, EXTRACT_KEY_FROM_KEY) 485s | sizeof bytes 32 485s | wrapper: siBuffer: ee 3c e6 16 c3 cd 09 f2 7c 29 d9 00 b3 3d b8 ae 77 db 44 6d d1 f7 5d 26 06 2f 51 61 74 dd e3 5f 485s | symkey message extracted len 32 bytes at 0xbe5a4ecc4730 485s | unwrapped: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | XCBC: data 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 .... 485s | K extracting all 16 bytes of key@0xbe5a4ecc1ae0 485s | K: symkey-key@0xbe5a4ecc1ae0 (16-bytes, AES_ECB) 485s | sizeof bytes 16 485s | wrapper: (SECItemType)2097152: 29 48 30 67 2c 9a 7b d1 8c 3f de b6 1b 04 bf 44 485s | K extracted len 16 bytes at 0xbe5a4ecc2d40 485s | unwrapped: 485s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 485s | XCBC: K: 485s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 485s | XCBC: K1 485s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5270 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc7bd0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5238 485s | Computing E[2] using K3 485s | XCBC: K3 485s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 485s | XCBC: E[n-1] 485s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 485s | XCBC: M[n] 485s | 10 11 12 13 .... 485s | XCBC: M[n] 485s | 10 11 12 13 .... 485s | XCBC: M[n]:80...^E[n-1]^K3 485s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 485s | XCBC: MAC 485s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5340 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc7bd0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5308 485s | PRF symkey interface PRF AES_XCBC final-key@0xbe5a4ecc4a10 (size 16) 485s | PRF symkey interface: key-key@0xbe5a4ecc4a10 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | output: symkey-key@0xbe5a4ecc4a10 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracting all 16 bytes of key@0xbe5a4ecc4a10 485s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): symkey-key@0xbe5a4ecc4a10 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | sizeof bytes 16 485s | wrapper: siBuffer: 2e f8 18 6c db 8f 54 51 9f 41 46 f3 e5 a7 b5 01 485s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracted len 16 bytes at 0xbe5a4ecc2d40 485s | unwrapped: 485s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 485s | verify_chunk_data: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): ok 485s | test_prf_vector: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) passed 485s algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 485s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0fedcb" 485s | decode_to_chunk: output: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | ed cb .. 485s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 485s | decode_to_chunk: output: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | 10 11 12 13 .... 485s | decode_to_chunk: test_prf_vector: input "0x8cd3c93ae598a9803006ffb67c40e9e4" 485s | decode_to_chunk: output: 485s | 8c d3 c9 3a e5 98 a9 80 30 06 ff b6 7c 40 e9 e4 ...:....0...|@.. 485s | PRF chunk interface PRF AES_XCBC init key-chunk@0xbe5a4ecc1a00 (length 18) 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | ed cb .. 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5320 485s | key-offset: 0, key-size: 18 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 18-bytes 485s | base: base-key@0xbe5a4ecc0070 (34-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f52e8 485s | XCBC: Key 18>16 too big, rehashing to size 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5260 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc6310 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5228 485s | draft_chunk extracting all 18 bytes of key@0xbe5a4ecc4a10 485s | draft_chunk: symkey-key@0xbe5a4ecc4a10 (18-bytes, EXTRACT_KEY_FROM_KEY) 485s | sizeof bytes 32 485s | wrapper: (SECItemType)34: ee 3c e6 16 c3 cd 09 f2 7c 29 d9 00 b3 3d b8 ae 04 f1 98 6a 14 f6 f4 88 ce 93 84 82 07 86 30 11 485s | draft_chunk extracted len 32 bytes at 0xbe5a4ecc2d40 485s | unwrapped: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | XCBC: data 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | ed cb .. 485s | K extracting all 16 bytes of key@0xbe5a4ecc0070 485s | K: symkey-key@0xbe5a4ecc0070 (16-bytes, AES_ECB) 485s | sizeof bytes 16 485s | wrapper: (SECItemType)774778414: e7 93 55 8a e9 4d 30 46 8d 26 d5 75 29 f8 54 ed 485s | K extracted len 16 bytes at 0xbe5a4ecc2cb0 485s | unwrapped: 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | XCBC: K: 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | XCBC: K1 485s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f51a0 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5168 485s | Computing E[2] using K3 485s | XCBC: K3 485s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 485s | XCBC: E[n-1] 485s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 485s | XCBC: M[n] 485s | ed cb .. 485s | XCBC: M[n] 485s | ed cb .. 485s | XCBC: M[n]:80...^E[n-1]^K3 485s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.16 too big, rehashing to size 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f52a0 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc0070 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5268 485s | draft_chunk extracting all 18 bytes of key@0xbe5a4ecc6310 485s | draft_chunk: symkey-key@0xbe5a4ecc6310 (18-bytes, EXTRACT_KEY_FROM_KEY) 485s | sizeof bytes 32 485s | wrapper: (SECItemType)-744534160: ee 3c e6 16 c3 cd 09 f2 7c 29 d9 00 b3 3d b8 ae 04 f1 98 6a 14 f6 f4 88 ce 93 84 82 07 86 30 11 485s | draft_chunk extracted len 32 bytes at 0xbe5a4ecc2cb0 485s | unwrapped: 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | XCBC: data 485s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 485s | ed cb .. 485s | K extracting all 16 bytes of key@0xbe5a4ecc4a10 485s | K: symkey-key@0xbe5a4ecc4a10 (16-bytes, AES_ECB) 485s | sizeof bytes 16 485s | wrapper: (SECItemType)774778414: e7 93 55 8a e9 4d 30 46 8d 26 d5 75 29 f8 54 ed 485s | K extracted len 16 bytes at 0xbe5a4ecc2d40 485s | unwrapped: 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | XCBC: K: 485s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 485s | XCBC: K1 485s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f51e0 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: AES_ECB 485s | flags: SIGN 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f51a8 485s | Computing E[2] using K3 485s | XCBC: K3 485s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 485s | XCBC: E[n-1] 485s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 485s | XCBC: M[n] 485s | ed cb .. 485s | XCBC: M[n] 485s | ed cb .. 485s | XCBC: M[n]:80...^E[n-1]^K3 485s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.j.....n1.].8 485s | PRF chunk interface PRF HMAC_MD5 init key-chunk@0xbe5a4ecc0050 (length 4) 485s | 4a 65 66 65 Jefe 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5300 485s | key-offset: 0, key-size: 4 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 4-bytes 485s | base: base-key@0xbe5a4ecc0070 (20-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f52c8 485s | CONCATENATE_BASE_AND_DATA: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecc6310 (4-bytes, EXTRACT_KEY_FROM_KEY) 485s | params: 16-bytes@0xffffd39f5240 485s | XOR_BASE_AND_DATA: 485s | target: CONCATENATE_BASE_AND_DATA 485s | base: base-key@0xbe5a4ecc0070 (64-bytes, EXTRACT_KEY_FROM_KEY) 485s | params: 16-bytes@0xffffd39f5280 485s | PRF chunk interface PRF HMAC_MD5 0xbe5a4ecc2d40 485s | PRF chunk interface PRF HMAC_MD5 update message (0xbe5a4ecc2cb0 length 28) 485s | 77 68 61 74 20 64 6f 20 79 61 20 77 61 6e 74 20 what do ya want 485s | 66 6f 72 20 6e 6f 74 68 69 6e 67 3f for nothing? 485s | CONCATENATE_BASE_AND_DATA: 485s | target: CONCATENATE_BASE_AND_DATA 485s | base: base-key@0xbe5a4ecc6310 (64-bytes, CONCATENATE_BASE_AND_DATA) 485s | params: 16-bytes@0xffffd39f53b0 485s | PRF HMAC inner hash hash MD5 inner-key@0xbe5a4ecc4a10 (size 92) 485s | PRF HMAC inner hash hash MD5 init 485s | PRF HMAC inner hash hash MD5 digest inner-key@0xbe5a4ecc4a10 (size 92) 485s | PRF HMAC inner hash: inner-key@0xbe5a4ecc4a10 (92-bytes, CONCATENATE_BASE_AND_DATA) 485s | PRF HMAC inner hash hash MD5 final length 16 485s | c3 db 14 c0 65 f5 52 03 b0 33 c8 1a 69 7b 97 c5 ....e.R..3..i{.. 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5180 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4eccbd60 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5148 485s | XOR_BASE_AND_DATA: 485s | target: CONCATENATE_BASE_AND_DATA 485s | base: base-key@0xbe5a4ecc0070 (64-bytes, EXTRACT_KEY_FROM_KEY) 485s | params: 16-bytes@0xffffd39f5260 485s | CONCATENATE_BASE_AND_KEY: 485s | target: CONCATENATE_BASE_AND_DATA 485s | base: base-key@0xbe5a4ecc4a10 (64-bytes, CONCATENATE_BASE_AND_DATA) 485s | params: 8-bytes@0xffffd39f5238 485s | PRF HMAC outer hash hash MD5 init 485s | PRF HMAC outer hash hash MD5 digest outer-key@0xbe5a4eccbd60 (size 80) 485s | PRF HMAC outer hash: outer-key@0xbe5a4eccbd60 (80-bytes, CONCATENATE_BASE_AND_DATA) 485s | PRF HMAC outer hash hash MD5 final bytes@0xffffd39f53b8 (length 16) 485s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 485s | PRF chunk interface PRF HMAC_MD5 final length 16 485s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 485s | chunk output 485s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 485s | verify_chunk_data: RFC 2104: MD5_HMAC test 2: ok 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f53b0 485s | key-offset: 0, key-size: 4 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 4-bytes 485s | base: base-key@0xbe5a4ecc0070 (20-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5378 485s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0xbe5a4eccbd60 (size 4) 485s | PRF symkey interface: key symkey-key@0xbe5a4eccbd60 (4-bytes, EXTRACT_KEY_FROM_KEY) 485s | CONCATENATE_BASE_AND_DATA: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4eccbd60 (4-bytes, EXTRACT_KEY_FROM_KEY) 485s | params: 16-bytes@0xffffd39f5250 485s | XOR_BASE_AND_DATA: 485s | target: CONCATENATE_BASE_AND_DATA 485s | base: base-key@0xbe5a4ecc0070 (64-bytes, EXTRACT_KEY_FROM_KEY) 485s | params: 16-bytes@0xffffd39f5290 485s | PRF symkey interface PRF HMAC_MD5 0xbe5a4ecc2d40 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f53b0 485s | key-offset: 0, key-size: 28 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 28-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (44-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5378 485s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0xbe5a4ecc4a10 (size 28) 485s | PRF symkey interface: symkey message-key@0xbe5a4ecc4a10 (28-bytes, EXTRACT_KEY_FROM_KEY) 485s | CONCATENATE_BASE_AND_KEY: 485s | target: CONCATENATE_BASE_AND_DATA 485s | base: base-key@0xbe5a4ecc6310 (64-bytes, CONCATENATE_BASE_AND_DATA) 485s | params: 8-bytes@0xffffd39f53c8 485s | PRF HMAC inner hash hash MD5 inner-key@0xbe5a4ecc1ae0 (size 92) 485s | PRF HMAC inner hash hash MD5 init 485s | PRF HMAC inner hash hash MD5 digest inner-key@0xbe5a4ecc1ae0 (size 92) 485s | PRF HMAC inner hash: inner-key@0xbe5a4ecc1ae0 (92-bytes, CONCATENATE_BASE_AND_DATA) 485s | PRF HMAC inner hash hash MD5 final length 16 485s | c3 db 14 c0 65 f5 52 03 b0 33 c8 1a 69 7b 97 c5 ....e.R..3..i{.. 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f51f0 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc7bd0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f51b8 485s | XOR_BASE_AND_DATA: 485s | target: CONCATENATE_BASE_AND_DATA 485s | base: base-key@0xbe5a4ecc0070 (64-bytes, EXTRACT_KEY_FROM_KEY) 485s | params: 16-bytes@0xffffd39f52d0 485s | CONCATENATE_BASE_AND_KEY: 485s | target: CONCATENATE_BASE_AND_DATA 485s | base: base-key@0xbe5a4ecc1ae0 (64-bytes, CONCATENATE_BASE_AND_DATA) 485s | params: 8-bytes@0xffffd39f52a8 485s | PRF HMAC outer hash hash MD5 outer-key@0xbe5a4ecc7bd0 (size 80) 485s | PRF HMAC outer hash hash MD5 init 485s | PRF HMAC outer hash hash MD5 digest outer-key@0xbe5a4ecc7bd0 (size 80) 485s | PRF HMAC outer hash: outer-key@0xbe5a4ecc7bd0 (80-bytes, CONCATENATE_BASE_AND_DATA) 485s | PRF HMAC outer hash hash MD5 final length 16 485s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f52b0 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc6310 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5278 485s | : hashed-outer-key@0xbe5a4ecc0070 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | PRF symkey interface PRF HMAC_MD5 final-key@0xbe5a4ecc0070 (size 16) 485s | PRF symkey interface: key-key@0xbe5a4ecc0070 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | output: symkey-key@0xbe5a4ecc0070 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | RFC 2104: MD5_HMAC test 2 extracting all 16 bytes of key@0xbe5a4ecc0070 485s | RFC 2104: MD5_HMAC test 2: symkey-key@0xbe5a4ecc0070 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | sizeof bytes 16 485s | wrapper: siBuffer: 8a cb 3e 33 7b bf 5a 44 74 49 89 ff c1 4d 69 37 485s | RFC 2104: MD5_HMAC test 2 extracted len 16 bytes at 0xbe5a4ecc2d40 485s | unwrapped: 485s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 485s | verify_chunk_data: RFC 2104: MD5_HMAC test 2: ok 485s | test_prf_vector: RFC 2104: MD5_HMAC test 2 passed 485s algparse: RFC 2104: MD5_HMAC test 3 485s | decode_to_chunk: test_prf_vector: input "0xAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" 485s | decode_to_chunk: output: 485s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 485s | decode_to_chunk: test_prf_vector: input "0xDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD" 485s | decode_to_chunk: output: 485s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 485s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 485s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 485s | dd dd .. 485s | decode_to_chunk: test_prf_vector: input "0x56be34521d144c88dbb8c733f0e8b3f6" 485s | decode_to_chunk: output: 485s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 485s | PRF chunk interface PRF HMAC_MD5 init key-chunk@0xbe5a4ecc4b60 (length 16) 485s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5300 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4eccbd60 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f52c8 485s | CONCATENATE_BASE_AND_DATA: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecc0070 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | params: 16-bytes@0xffffd39f5240 485s | XOR_BASE_AND_DATA: 485s | target: CONCATENATE_BASE_AND_DATA 485s | base: base-key@0xbe5a4eccbd60 (64-bytes, EXTRACT_KEY_FROM_KEY) 485s | params: 16-bytes@0xffffd39f5280 485s | PRF chunk interface PRF HMAC_MD5 0xbe5a4ecc2cb0 485s | PRF chunk interface PRF HMAC_MD5 update message (0xbe5a4ecc1a00 length 50) 485s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 485s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 485s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 485s | dd dd .. 485s | CONCATENATE_BASE_AND_DATA: 485s | target: CONCATENATE_BASE_AND_DATA 485s | base: base-key@0xbe5a4ecc0070 (64-bytes, CONCATENATE_BASE_AND_DATA) 485s | params: 16-bytes@0xffffd39f53b0 485s | PRF HMAC inner hash hash MD5 inner-key@0xbe5a4ecc4a10 (size 114) 485s | PRF HMAC inner hash hash MD5 init 485s | PRF HMAC inner hash hash MD5 digest inner-key@0xbe5a4ecc4a10 (size 114) 485s | PRF HMAC inner hash: inner-key@0xbe5a4ecc4a10 (114-bytes, CONCATENATE_BASE_AND_DATA) 485s | PRF HMAC inner hash hash MD5 final length 16 485s | 82 0a 6b 33 5d 18 7b 90 dc ba b1 7e f5 b4 26 ff ..k3].{....~..&. 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f5180 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc7bd0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5148 485s | XOR_BASE_AND_DATA: 485s | target: CONCATENATE_BASE_AND_DATA 485s | base: base-key@0xbe5a4eccbd60 (64-bytes, EXTRACT_KEY_FROM_KEY) 485s | params: 16-bytes@0xffffd39f5260 485s | CONCATENATE_BASE_AND_KEY: 485s | target: CONCATENATE_BASE_AND_DATA 485s | base: base-key@0xbe5a4ecc4a10 (64-bytes, CONCATENATE_BASE_AND_DATA) 485s | params: 8-bytes@0xffffd39f5238 485s | PRF HMAC outer hash hash MD5 init 485s | PRF HMAC outer hash hash MD5 digest outer-key@0xbe5a4ecc7bd0 (size 80) 485s | PRF HMAC outer hash: outer-key@0xbe5a4ecc7bd0 (80-bytes, CONCATENATE_BASE_AND_DATA) 485s | PRF HMAC outer hash hash MD5 final bytes@0xffffd39f53b8 (length 16) 485s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 485s | PRF chunk interface PRF HMAC_MD5 final length 16 485s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 485s | chunk output 485s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 485s | verify_chunk_data: RFC 2104: MD5_HMAC test 3: ok 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f53b0 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4eccbd60 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5378 485s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0xbe5a4ecc7bd0 (size 16) 485s | PRF symkey interface: key symkey-key@0xbe5a4ecc7bd0 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | CONCATENATE_BASE_AND_DATA: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecc7bd0 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | params: 16-bytes@0xffffd39f5250 485s | XOR_BASE_AND_DATA: 485s | target: CONCATENATE_BASE_AND_DATA 485s | base: base-key@0xbe5a4eccbd60 (64-bytes, EXTRACT_KEY_FROM_KEY) 485s | params: 16-bytes@0xffffd39f5290 485s | PRF symkey interface PRF HMAC_MD5 0xbe5a4ecc2cb0 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f53b0 485s | key-offset: 0, key-size: 50 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 50-bytes 485s | base: base-key@0xbe5a4ecc6310 (66-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5378 485s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0xbe5a4ecc4a10 (size 50) 485s | PRF symkey interface: symkey message-key@0xbe5a4ecc4a10 (50-bytes, EXTRACT_KEY_FROM_KEY) 485s | CONCATENATE_BASE_AND_KEY: 485s | target: CONCATENATE_BASE_AND_DATA 485s | base: base-key@0xbe5a4ecc0070 (64-bytes, CONCATENATE_BASE_AND_DATA) 485s | params: 8-bytes@0xffffd39f53c8 485s | PRF HMAC inner hash hash MD5 inner-key@0xbe5a4ecc6310 (size 114) 485s | PRF HMAC inner hash hash MD5 init 485s | PRF HMAC inner hash hash MD5 digest inner-key@0xbe5a4ecc6310 (size 114) 485s | PRF HMAC inner hash: inner-key@0xbe5a4ecc6310 (114-bytes, CONCATENATE_BASE_AND_DATA) 485s | PRF HMAC inner hash hash MD5 final length 16 485s | 82 0a 6b 33 5d 18 7b 90 dc ba b1 7e f5 b4 26 ff ..k3].{....~..&. 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f51f0 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc1ae0 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f51b8 485s | XOR_BASE_AND_DATA: 485s | target: CONCATENATE_BASE_AND_DATA 485s | base: base-key@0xbe5a4eccbd60 (64-bytes, EXTRACT_KEY_FROM_KEY) 485s | params: 16-bytes@0xffffd39f52d0 485s | CONCATENATE_BASE_AND_KEY: 485s | target: CONCATENATE_BASE_AND_DATA 485s | base: base-key@0xbe5a4ecc6310 (64-bytes, CONCATENATE_BASE_AND_DATA) 485s | params: 8-bytes@0xffffd39f52a8 485s | PRF HMAC outer hash hash MD5 outer-key@0xbe5a4ecc1ae0 (size 80) 485s | PRF HMAC outer hash hash MD5 init 485s | PRF HMAC outer hash hash MD5 digest outer-key@0xbe5a4ecc1ae0 (size 80) 485s | PRF HMAC outer hash: outer-key@0xbe5a4ecc1ae0 (80-bytes, CONCATENATE_BASE_AND_DATA) 485s | PRF HMAC outer hash hash MD5 final length 16 485s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f52b0 485s | key-offset: 0, key-size: 16 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 16-bytes 485s | base: base-key@0xbe5a4ecc0070 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5278 485s | : hashed-outer-key@0xbe5a4eccbd60 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | PRF symkey interface PRF HMAC_MD5 final-key@0xbe5a4eccbd60 (size 16) 485s | PRF symkey interface: key-key@0xbe5a4eccbd60 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | output: symkey-key@0xbe5a4eccbd60 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | RFC 2104: MD5_HMAC test 3 extracting all 16 bytes of key@0xbe5a4eccbd60 485s | RFC 2104: MD5_HMAC test 3: symkey-key@0xbe5a4eccbd60 (16-bytes, EXTRACT_KEY_FROM_KEY) 485s | sizeof bytes 16 485s | wrapper: siBuffer: 8b e6 22 5d 2e e7 de 18 94 1c 8c 2e 17 a1 1c ad 485s | RFC 2104: MD5_HMAC test 3 extracted len 16 bytes at 0xbe5a4ecc4950 485s | unwrapped: 485s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 485s | verify_chunk_data: RFC 2104: MD5_HMAC test 3: ok 485s | test_prf_vector: RFC 2104: MD5_HMAC test 3 passed 485s algparse: testing HMAC_SHA1: 485s algparse: CAVP: IKEv2 key derivation with HMAC-SHA1 485s | decode_to_chunk: test_kdf_vector: input "0x32b50d5f4a3763f3" 485s | decode_to_chunk: output: 485s | 32 b5 0d 5f 4a 37 63 f3 2.._J7c. 485s | decode_to_chunk: test_kdf_vector: input "0x9206a04b26564cb1" 485s | decode_to_chunk: output: 485s | 92 06 a0 4b 26 56 4c b1 ...K&VL. 485s | decode_to_chunk: test_kdf_vector: input "0x34c9e7c188868785" 485s | decode_to_chunk: output: 485s | 34 c9 e7 c1 88 86 87 85 4....... 485s | decode_to_chunk: test_kdf_vector: input "0x3ff77d760d2b2199" 485s | decode_to_chunk: output: 485s | 3f f7 7d 76 0d 2b 21 99 ?.}v.+!. 485s | decode_to_chunk: test_kdf_vector: input "0x4b2c1f971981a8ad8d0abeafabf38cf75fc8349c148142465ed9c8b516b8be52" 485s | decode_to_chunk: output: 485s | 4b 2c 1f 97 19 81 a8 ad 8d 0a be af ab f3 8c f7 K,.............. 485s | 5f c8 34 9c 14 81 42 46 5e d9 c8 b5 16 b8 be 52 _.4...BF^......R 485s | decode_to_chunk: test_kdf_vector: input "0x863f3c9d06efd39d2b907b97f8699e5dd5251ef64a2a176f36ee40c87d4f9330" 485s | decode_to_chunk: output: 485s | 86 3f 3c 9d 06 ef d3 9d 2b 90 7b 97 f8 69 9e 5d .?<.....+.{..i.] 485s | d5 25 1e f6 4a 2a 17 6f 36 ee 40 c8 7d 4f 93 30 .%..J*.o6.@.}O.0 485s | decode_to_chunk: test_kdf_vector: input "0xa9a7b222b59f8f48645f28a1db5b5f5d7479cba7" 485s | decode_to_chunk: output: 485s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 485s | 74 79 cb a7 ty.. 485s | decode_to_chunk: test_kdf_vector: input "0x63e81194946ebd05df7df5ebf5d8750056bf1f1d" 485s | decode_to_chunk: output: 485s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 485s | 56 bf 1f 1d V... 485s | decode_to_chunk: test_kdf_vector: input "0xa14293677cc80ff8f9cc0eee30d895da9d8f405666e30ef0dfcb63c634a46002a2a63080e514a062768b76606f9fa5e992204fc5a670bde3f10d6b027113936a5c55b648a194ae587b0088d52204b702c979fa280870d2ed41efa9c549fd11198af1670b143d384bd275c5f594cf266b05ebadca855e4249520a441a81157435a7a56cc4" 485s | decode_to_chunk: output: 485s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 485s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 485s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 485s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 485s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 485s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 485s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 485s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 485s | a7 a5 6c c4 ..l. 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f53b0 485s | key-offset: 0, key-size: 32 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 32-bytes 485s | base: base-key@0xbe5a4ecc7bd0 (48-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5378 485s | NSS_IKE_PRF_DERIVE: 485s | target: NSS_IKE_PRF_PLUS_DERIVE 485s | base: base-key@0xbe5a4eccbd60 (32-bytes, EXTRACT_KEY_FROM_KEY) 485s | params: 56-bytes@0xffffd39f53e0 485s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0xbe5a4ecc7bd0 485s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0xbe5a4ecc7bd0 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 485s | sizeof bytes 32 485s | wrapper: (SECItemType)35: ce a0 6a 65 07 d6 89 09 6a 80 ff 37 5c 27 d0 a0 d7 a9 23 c6 92 14 69 7e 20 d5 81 d2 72 86 3a e6 485s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0xbe5a4ecc34c0 485s | unwrapped: 485s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 485s | 74 79 cb a7 00 00 00 00 00 00 00 00 00 00 00 00 ty.............. 485s | verify_chunk_data: CAVP: IKEv2 key derivation with HMAC-SHA1: ok 485s | NSS_IKE_PRF_PLUS_DERIVE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 132-bytes 485s | base: base-key@0xbe5a4ecc7bd0 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 485s | params: 40-bytes@0xffffd39f5330 485s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 132 bytes of key@0xbe5a4ecc4a10 485s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0xbe5a4ecc4a10 (132-bytes, EXTRACT_KEY_FROM_KEY) 485s | sizeof bytes 144 485s | wrapper: (SECItemType)35: fb 77 0b 8b af 0a 16 05 21 91 16 55 27 dc 6f aa 84 cd e6 c5 be e0 63 6b d7 f3 af 49 33 24 68 dc d3 8b 2f 2a 6b 1d de 35 9d af e2 3f b9 e3 de f9 c3 81 a0 49 bb a9 45 bb 1a cd 10 41 57 f3 d2 35 cb a0 51 47 b5 5f 41 e5 50 e4 69 a8 9c 1b fd ac a1 21 19 2f c9 cc 06 f4 93 ab 96 c7 36 8c 3d 8c d4 78 40 99 77 ad ca d6 35 c2 f2 9b a8 58 1f ab f0 59 b8 36 fa 2d 21 6c 94 7e 2c 69 3a f2 c9 c3 84 62 c0 ff 4b 6e 57 62 3d 0b 6c 6d 81 48 cc b5 485s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 144 bytes at 0xbe5a4ecc36e0 485s | unwrapped: 485s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 485s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 485s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 485s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 485s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 485s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 485s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 485s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 485s | a7 a5 6c c4 00 00 00 00 00 00 00 00 00 00 00 00 ..l............. 485s | verify_chunk_data: CAVP: IKEv2 key derivation with HMAC-SHA1: ok 485s | key-offset: 0, key-size: 20 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 20-bytes 485s | base: base-key@0xbe5a4ecc4a10 (132-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f53c8 485s | CONCATENATE_DATA_AND_BASE: 485s | target: EXTRACT_KEY_FROM_KEY 485s | base: base-key@0xbe5a4ecbe830 (16-bytes, AES_KEY_GEN) 485s | params: 16-bytes@0xffffd39f53b0 485s | key-offset: 0, key-size: 32 485s | EXTRACT_KEY_FROM_KEY: 485s | target: EXTRACT_KEY_FROM_KEY 485s | key_size: 32-bytes 485s | base: base-key@0xbe5a4ecc6310 (48-bytes, EXTRACT_KEY_FROM_KEY) 485s | operation: FLAGS_ONLY 485s | params: 8-bytes@0xffffd39f5378 485s | NSS_IKE_PRF_DERIVE: 485s | target: NSS_IKE_PRF_PLUS_DERIVE 485s | base: base-key@0xbe5a4ecc1ae0 (20-bytes, EXTRACT_KEY_FROM_KEY) 485s | params: 56-bytes@0xffffd39f53d0 485s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0xbe5a4ecc6310 485s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0xbe5a4ecc6310 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 485s | sizeof bytes 32 485s | wrapper: (SECItemType)482133904: 0f ae 4e 49 fe bd 20 7a 2d e0 18 4e 81 e0 ed 69 8d c3 98 26 90 f6 92 1e 44 21 75 45 3e e3 68 5d 485s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0xbe5a4ecc3d80 485s | unwrapped: 485s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 485s | 56 bf 1f 1d 00 00 00 00 00 00 00 00 00 00 00 00 V............... 485s | verify_chunk_data: CAVP: IKEv2 key derivation with HMAC-SHA1: ok 485s | test_kdf_vector: CAVP: IKEv2 key derivation with HMAC-SHA1 passed 485s algparse: leak detective found no leaks 485s /usr/libexec/ipsec/pluto: adjusting nssdir to /tmp/tmp.Lmmt1Ifgjk 485s /usr/libexec/ipsec/pluto: selftest: skipping lock 485s /usr/libexec/ipsec/pluto: selftest: skipping control socket 485s /usr/libexec/ipsec/pluto: selftest: skipping fork 485s Initializing NSS using read-write database "sql:/tmp/tmp.Lmmt1Ifgjk" 485s FIPS Mode: NO 485s NSS crypto library initialized 485s FIPS mode disabled for pluto daemon 485s FIPS HMAC integrity support [disabled] 485s libcap-ng capng_apply failed to apply changes, err=-5. see: man capng_apply 485s libcap-ng support [enabled] 485s Linux audit support [enabled] 485s Starting Pluto (Libreswan Version 4.14 IKEv2 IKEv1 XFRM XFRMI esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) (NSS-KDF) DNSSEC SYSTEMD_WATCHDOG LABELED_IPSEC (SELINUX) LIBCAP_NG LINUX_AUDIT AUTH_PAM NETWORKMANAGER CURL(non-NSS) LDAP(non-NSS)) pid:1830 485s core dump dir: /run/pluto 485s secrets file: /etc/ipsec.secrets 485s leak-detective disabled 485s NSS crypto [enabled] 485s XAUTH PAM support [enabled] 485s initializing libevent in pthreads mode: headers: 2.1.12-stable (2010c00); library: 2.1.12-stable (2010c00) 485s NAT-Traversal support [enabled] 485s Encryption algorithms: 485s AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 485s AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 485s AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 485s 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 485s CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 485s CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 485s AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm, aes_gcm_c 485s AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_b 485s AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_a 485s AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 485s AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 485s NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 485s NULL [] IKEv1: ESP IKEv2: ESP 485s CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 485s Hash algorithms: 485s MD5 IKEv1: IKE IKEv2: NSS 485s SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 485s SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 485s SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 485s SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 485s IDENTITY IKEv1: IKEv2: FIPS 485s PRF algorithms: 485s HMAC_MD5 IKEv1: IKE IKEv2: IKE native(HMAC) md5 485s HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 485s HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 485s HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 485s HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 485s AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 485s Integrity algorithms: 485s HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH native(HMAC) md5, hmac_md5 485s HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 485s HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 485s HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 485s HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 485s HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 485s AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 485s AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 485s NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 485s DH algorithms: 485s NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 485s MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 485s MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 485s MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 485s MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 485s MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 485s MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 485s DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 485s DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 485s DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 485s DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 485s IPCOMP algorithms: 485s DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 485s LZS IKEv1: IKEv2: ESP AH FIPS 485s LZJH IKEv1: IKEv2: ESP AH FIPS 485s testing CAMELLIA_CBC: 485s Camellia: 16 bytes with 128-bit key 485s Camellia: 16 bytes with 128-bit key 485s Camellia: 16 bytes with 256-bit key 485s Camellia: 16 bytes with 256-bit key 485s testing AES_GCM_16: 485s empty string 485s one block 485s two blocks 485s two blocks with associated data 485s testing AES_CTR: 485s Encrypting 16 octets using AES-CTR with 128-bit key 485s Encrypting 32 octets using AES-CTR with 128-bit key 485s Encrypting 36 octets using AES-CTR with 128-bit key 485s Encrypting 16 octets using AES-CTR with 192-bit key 485s Encrypting 32 octets using AES-CTR with 192-bit key 485s Encrypting 36 octets using AES-CTR with 192-bit key 485s Encrypting 16 octets using AES-CTR with 256-bit key 485s Encrypting 32 octets using AES-CTR with 256-bit key 485s Encrypting 36 octets using AES-CTR with 256-bit key 485s testing AES_CBC: 485s Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 485s Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 485s Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 485s Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 485s testing AES_XCBC: 485s RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 485s RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 485s RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 485s RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 485s RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 485s RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 485s RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 485s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 485s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 485s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 485s testing HMAC_MD5: 485s RFC 2104: MD5_HMAC test 1 485s RFC 2104: MD5_HMAC test 2 485s RFC 2104: MD5_HMAC test 3 485s testing HMAC_SHA1: 485s CAVP: IKEv2 key derivation with HMAC-SHA1 485s selftest: exiting pluto 485s autopkgtest [10:47:07]: test cryptocheck: -----------------------] 486s cryptocheck PASS 486s autopkgtest [10:47:08]: test cryptocheck: - - - - - - - - - - results - - - - - - - - - - 486s autopkgtest [10:47:08]: test cavp: preparing testbed 598s autopkgtest [10:49:00]: testbed dpkg architecture: arm64 599s autopkgtest [10:49:01]: testbed apt version: 2.9.18 599s autopkgtest [10:49:01]: @@@@@@@@@@@@@@@@@@@@ test bed setup 599s autopkgtest [10:49:01]: testbed release detected to be: plucky 600s autopkgtest [10:49:02]: updating testbed package index (apt update) 600s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease [73.9 kB] 601s Hit:2 http://ftpmaster.internal/ubuntu plucky InRelease 601s Hit:3 http://ftpmaster.internal/ubuntu plucky-updates InRelease 601s Hit:4 http://ftpmaster.internal/ubuntu plucky-security InRelease 601s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse Sources [16.4 kB] 601s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/main Sources [172 kB] 601s Get:7 http://ftpmaster.internal/ubuntu plucky-proposed/restricted Sources [9708 B] 601s Get:8 http://ftpmaster.internal/ubuntu plucky-proposed/universe Sources [887 kB] 601s Get:9 http://ftpmaster.internal/ubuntu plucky-proposed/main arm64 Packages [313 kB] 601s Get:10 http://ftpmaster.internal/ubuntu plucky-proposed/restricted arm64 Packages [57.8 kB] 601s Get:11 http://ftpmaster.internal/ubuntu plucky-proposed/universe arm64 Packages [1086 kB] 601s Get:12 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse arm64 Packages [13.1 kB] 601s Fetched 2630 kB in 1s (2667 kB/s) 602s Reading package lists... 603s + lsb_release --codename --short 603s + RELEASE=plucky 603s + cat 603s + [ plucky != trusty ] 603s + DEBIAN_FRONTEND=noninteractive eatmydata apt-get -y --allow-downgrades -o Dpkg::Options::=--force-confnew dist-upgrade 603s Reading package lists... 603s Building dependency tree... 603s Reading state information... 604s Calculating upgrade... 604s The following packages will be upgraded: 604s libgudev-1.0-0 usb.ids 604s 2 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 604s Need to get 238 kB of archives. 604s After this operation, 1024 B of additional disk space will be used. 604s Get:1 http://ftpmaster.internal/ubuntu plucky/main arm64 usb.ids all 2025.01.14-1 [223 kB] 605s Get:2 http://ftpmaster.internal/ubuntu plucky/main arm64 libgudev-1.0-0 arm64 1:238-6 [14.9 kB] 605s Fetched 238 kB in 0s (492 kB/s) 605s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 80204 files and directories currently installed.) 605s Preparing to unpack .../usb.ids_2025.01.14-1_all.deb ... 605s Unpacking usb.ids (2025.01.14-1) over (2024.12.04-1) ... 605s Preparing to unpack .../libgudev-1.0-0_1%3a238-6_arm64.deb ... 605s Unpacking libgudev-1.0-0:arm64 (1:238-6) over (1:238-5ubuntu1) ... 605s Setting up usb.ids (2025.01.14-1) ... 605s Setting up libgudev-1.0-0:arm64 (1:238-6) ... 605s Processing triggers for libc-bin (2.40-4ubuntu1) ... 606s + rm /etc/apt/preferences.d/force-downgrade-to-release.pref 606s + /usr/lib/apt/apt-helper analyze-pattern ?true 606s + DEBIAN_FRONTEND=noninteractive eatmydata apt-get -y purge --autoremove ?obsolete 606s Reading package lists... 606s Building dependency tree... 606s Reading state information... 606s 0 upgraded, 0 newly installed, 0 to remove and 2 not upgraded. 606s + grep -q trusty /etc/lsb-release 606s + [ ! -d /usr/share/doc/unattended-upgrades ] 606s + [ ! -d /usr/share/doc/lxd ] 606s + [ ! -d /usr/share/doc/lxd-client ] 606s + [ ! -d /usr/share/doc/snapd ] 606s + type iptables 606s + cat 606s + chmod 755 /etc/rc.local 606s + . /etc/rc.local 606s + iptables -w -t mangle -A FORWARD -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu 606s + iptables -A OUTPUT -d 10.255.255.1/32 -p tcp -j DROP 606s + iptables -A OUTPUT -d 10.255.255.2/32 -p tcp -j DROP 607s + uname -m 607s + [ aarch64 = ppc64le ] 607s + [ -d /run/systemd/system ] 607s + systemd-detect-virt --quiet --vm 607s + mkdir -p /etc/systemd/system/systemd-random-seed.service.d/ 607s + cat 607s + grep -q lz4 /etc/initramfs-tools/initramfs.conf 607s + echo COMPRESS=lz4 607s + sync 607s autopkgtest [10:49:09]: upgrading testbed (apt dist-upgrade and autopurge) 607s Reading package lists... 607s Building dependency tree... 607s Reading state information... 608s Calculating upgrade...Starting pkgProblemResolver with broken count: 0 608s Starting 2 pkgProblemResolver with broken count: 0 608s Done 608s Entering ResolveByKeep 609s 609s The following packages will be upgraded: 609s libcrypt-dev libcrypt1 609s 2 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 609s Need to get 207 kB of archives. 609s After this operation, 3072 B of additional disk space will be used. 609s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed/main arm64 libcrypt-dev arm64 1:4.4.38-1 [119 kB] 610s Get:2 http://ftpmaster.internal/ubuntu plucky-proposed/main arm64 libcrypt1 arm64 1:4.4.38-1 [87.0 kB] 610s Fetched 207 kB in 0s (493 kB/s) 610s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 80204 files and directories currently installed.) 610s Preparing to unpack .../libcrypt-dev_1%3a4.4.38-1_arm64.deb ... 610s Unpacking libcrypt-dev:arm64 (1:4.4.38-1) over (1:4.4.36-5) ... 610s Preparing to unpack .../libcrypt1_1%3a4.4.38-1_arm64.deb ... 610s Unpacking libcrypt1:arm64 (1:4.4.38-1) over (1:4.4.36-5) ... 610s Setting up libcrypt1:arm64 (1:4.4.38-1) ... 610s Setting up libcrypt-dev:arm64 (1:4.4.38-1) ... 610s Processing triggers for man-db (2.13.0-1) ... 610s Processing triggers for libc-bin (2.40-4ubuntu1) ... 611s Reading package lists... 611s Building dependency tree... 611s Reading state information... 612s Starting pkgProblemResolver with broken count: 0 612s Starting 2 pkgProblemResolver with broken count: 0 612s Done 612s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 615s Reading package lists... 616s Building dependency tree... 616s Reading state information... 616s Starting pkgProblemResolver with broken count: 0 616s Starting 2 pkgProblemResolver with broken count: 0 616s Done 617s The following NEW packages will be installed: 617s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 617s libnss3-tools libreswan libunbound8 617s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 617s Need to get 2657 kB of archives. 617s After this operation, 12.5 MB of additional disk space will be used. 617s Get:1 http://ftpmaster.internal/ubuntu plucky/main arm64 dns-root-data all 2024071801 [5802 B] 617s Get:2 http://ftpmaster.internal/ubuntu plucky/main arm64 libnss3-tools arm64 2:3.106-1ubuntu1 [607 kB] 617s Get:3 http://ftpmaster.internal/ubuntu plucky/main arm64 libevent-pthreads-2.1-7t64 arm64 2.1.12-stable-10 [7922 B] 617s Get:4 http://ftpmaster.internal/ubuntu plucky/universe arm64 libldns3t64 arm64 1.8.4-2 [164 kB] 617s Get:5 http://ftpmaster.internal/ubuntu plucky/main arm64 libevent-2.1-7t64 arm64 2.1.12-stable-10 [140 kB] 617s Get:6 http://ftpmaster.internal/ubuntu plucky/main arm64 libunbound8 arm64 1.20.0-1ubuntu2.1 [431 kB] 617s Get:7 http://ftpmaster.internal/ubuntu plucky/universe arm64 libreswan arm64 4.14-1ubuntu2 [1301 kB] 618s Fetched 2657 kB in 1s (3698 kB/s) 618s Selecting previously unselected package dns-root-data. 618s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 80204 files and directories currently installed.) 618s Preparing to unpack .../0-dns-root-data_2024071801_all.deb ... 618s Unpacking dns-root-data (2024071801) ... 618s Selecting previously unselected package libnss3-tools. 618s Preparing to unpack .../1-libnss3-tools_2%3a3.106-1ubuntu1_arm64.deb ... 618s Unpacking libnss3-tools (2:3.106-1ubuntu1) ... 618s Selecting previously unselected package libevent-pthreads-2.1-7t64:arm64. 618s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10_arm64.deb ... 618s Unpacking libevent-pthreads-2.1-7t64:arm64 (2.1.12-stable-10) ... 618s Selecting previously unselected package libldns3t64:arm64. 618s Preparing to unpack .../3-libldns3t64_1.8.4-2_arm64.deb ... 618s Unpacking libldns3t64:arm64 (1.8.4-2) ... 618s Selecting previously unselected package libevent-2.1-7t64:arm64. 618s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10_arm64.deb ... 618s Unpacking libevent-2.1-7t64:arm64 (2.1.12-stable-10) ... 618s Selecting previously unselected package libunbound8:arm64. 618s Preparing to unpack .../5-libunbound8_1.20.0-1ubuntu2.1_arm64.deb ... 618s Unpacking libunbound8:arm64 (1.20.0-1ubuntu2.1) ... 618s Selecting previously unselected package libreswan. 618s Preparing to unpack .../6-libreswan_4.14-1ubuntu2_arm64.deb ... 618s Unpacking libreswan (4.14-1ubuntu2) ... 618s Setting up libldns3t64:arm64 (1.8.4-2) ... 618s Setting up libevent-pthreads-2.1-7t64:arm64 (2.1.12-stable-10) ... 618s Setting up libevent-2.1-7t64:arm64 (2.1.12-stable-10) ... 618s Setting up dns-root-data (2024071801) ... 618s Setting up libunbound8:arm64 (1.20.0-1ubuntu2.1) ... 618s Setting up libnss3-tools (2:3.106-1ubuntu1) ... 618s Setting up libreswan (4.14-1ubuntu2) ... 619s ipsec.service is a disabled or a static unit, not starting it. 619s Processing triggers for man-db (2.13.0-1) ... 620s Processing triggers for libc-bin (2.40-4ubuntu1) ... 647s autopkgtest [10:49:49]: test cavp: [----------------------- 647s Testing installed CAVP binary: /usr/libexec/ipsec/cavp 652s test: IKE v2 652s Reading from ikev2.fax 655s test: IKE v1 Digital Signature Authentication 655s Reading from ikev1_dsa.fax 657s test: IKE v1 Pre-shared Key Authentication 657s Reading from ikev1_psk.fax 659s /tmp/autopkgtest.0Fj0sd/build.bAt/src 659s autopkgtest [10:50:01]: test cavp: -----------------------] 660s autopkgtest [10:50:02]: test cavp: - - - - - - - - - - results - - - - - - - - - - 660s cavp PASS 660s autopkgtest [10:50:02]: @@@@@@@@@@@@@@@@@@@@ summary 660s opportunistic SKIP exit status 77 and marked as skippable 660s cryptocheck PASS 660s cavp PASS 679s nova [W] Using flock in prodstack6-arm64 679s flock: timeout while waiting to get lock 679s Creating nova instance adt-plucky-arm64-libreswan-20250117-103901-juju-7f2275-prod-proposed-migration-environment-2-5aeb1be9-6f02-46e7-9877-a698b170275f from image adt/ubuntu-plucky-arm64-server-20250117.img (UUID 16a981e8-12f4-4912-806e-ebb4c2361146)... 679s nova [W] Timed out waiting for 43f593c2-e444-44bd-9d34-f54a92cb73a4 to get deleted. 679s nova [W] Using flock in prodstack6-arm64 679s flock: timeout while waiting to get lock 679s Creating nova instance adt-plucky-arm64-libreswan-20250117-103901-juju-7f2275-prod-proposed-migration-environment-2-5aeb1be9-6f02-46e7-9877-a698b170275f from image adt/ubuntu-plucky-arm64-server-20250117.img (UUID 16a981e8-12f4-4912-806e-ebb4c2361146)... 679s nova [W] Timed out waiting for 0c7ac985-484d-4e16-96d4-0b6308ca2e24 to get deleted. 679s nova [W] Using flock in prodstack6-arm64 679s Creating nova instance adt-plucky-arm64-libreswan-20250117-103901-juju-7f2275-prod-proposed-migration-environment-2-5aeb1be9-6f02-46e7-9877-a698b170275f from image adt/ubuntu-plucky-arm64-server-20250117.img (UUID 16a981e8-12f4-4912-806e-ebb4c2361146)... 679s nova [W] Timed out waiting for e7e9abf8-57a3-433c-8bd1-630df64e7ab5 to get deleted.