0s autopkgtest [10:42:16]: starting date and time: 2025-01-17 10:42:16+0000 0s autopkgtest [10:42:16]: git checkout: 325255d2 Merge branch 'pin-any-arch' into 'ubuntu/production' 0s autopkgtest [10:42:16]: host juju-7f2275-prod-proposed-migration-environment-2; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.3_s5phgk/out --timeout-copy=6000 --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:libxcrypt --apt-upgrade libreswan --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 --env=ADT_TEST_TRIGGERS=libxcrypt/1:4.4.38-1 -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest-ppc64el --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-2@bos03-ppc64el-18.secgroup --name adt-plucky-ppc64el-libreswan-20250117-104216-juju-7f2275-prod-proposed-migration-environment-2-3bc96660-dab7-45d6-9a36-e6b4caf80535 --image adt/ubuntu-plucky-ppc64el-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-2 --net-id=net_prod-proposed-migration-ppc64el -e TERM=linux -e ''"'"'http_proxy=http://squid.internal:3128'"'"'' -e ''"'"'https_proxy=http://squid.internal:3128'"'"'' -e ''"'"'no_proxy=127.0.0.1,127.0.1.1,login.ubuntu.com,localhost,localdomain,novalocal,internal,archive.ubuntu.com,ports.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,keyserver.ubuntu.com,launchpadlibrarian.net,launchpadcontent.net,launchpad.net,10.24.0.0/24,keystone.ps5.canonical.com,objectstorage.prodstack5.canonical.com,radosgw.ps5.canonical.com'"'"'' --mirror=http://ftpmaster.internal/ubuntu/ 97s autopkgtest [10:43:53]: testbed dpkg architecture: ppc64el 97s autopkgtest [10:43:53]: testbed apt version: 2.9.18 98s autopkgtest [10:43:54]: @@@@@@@@@@@@@@@@@@@@ test bed setup 98s autopkgtest [10:43:54]: testbed release detected to be: None 99s autopkgtest [10:43:55]: updating testbed package index (apt update) 100s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease [73.9 kB] 100s Hit:2 http://ftpmaster.internal/ubuntu plucky InRelease 100s Hit:3 http://ftpmaster.internal/ubuntu plucky-updates InRelease 100s Hit:4 http://ftpmaster.internal/ubuntu plucky-security InRelease 100s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/universe Sources [887 kB] 100s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/main Sources [172 kB] 100s Get:7 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse Sources [16.4 kB] 100s Get:8 http://ftpmaster.internal/ubuntu plucky-proposed/restricted Sources [9708 B] 100s Get:9 http://ftpmaster.internal/ubuntu plucky-proposed/main ppc64el Packages [295 kB] 100s Get:10 http://ftpmaster.internal/ubuntu plucky-proposed/restricted ppc64el Packages [756 B] 100s Get:11 http://ftpmaster.internal/ubuntu plucky-proposed/universe ppc64el Packages [1059 kB] 100s Get:12 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse ppc64el Packages [17.1 kB] 101s Fetched 2531 kB in 1s (2029 kB/s) 102s Reading package lists... 102s + lsb_release --codename --short 102s + RELEASE=plucky 102s + cat 102s + [ plucky != trusty ] 102s + DEBIAN_FRONTEND=noninteractive eatmydata apt-get -y --allow-downgrades -o Dpkg::Options::=--force-confnew dist-upgrade 102s Reading package lists... 103s Building dependency tree... 103s Reading state information... 103s Calculating upgrade... 103s The following packages will be upgraded: 103s libgudev-1.0-0 usb.ids 104s 2 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 104s Need to get 239 kB of archives. 104s After this operation, 1024 B of additional disk space will be used. 104s Get:1 http://ftpmaster.internal/ubuntu plucky/main ppc64el usb.ids all 2025.01.14-1 [223 kB] 104s Get:2 http://ftpmaster.internal/ubuntu plucky/main ppc64el libgudev-1.0-0 ppc64el 1:238-6 [15.7 kB] 104s Fetched 239 kB in 0s (490 kB/s) 105s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74045 files and directories currently installed.) 105s Preparing to unpack .../usb.ids_2025.01.14-1_all.deb ... 105s Unpacking usb.ids (2025.01.14-1) over (2024.12.04-1) ... 105s Preparing to unpack .../libgudev-1.0-0_1%3a238-6_ppc64el.deb ... 105s Unpacking libgudev-1.0-0:ppc64el (1:238-6) over (1:238-5ubuntu1) ... 105s Setting up usb.ids (2025.01.14-1) ... 105s Setting up libgudev-1.0-0:ppc64el (1:238-6) ... 105s Processing triggers for libc-bin (2.40-4ubuntu1) ... 105s + rm /etc/apt/preferences.d/force-downgrade-to-release.pref 105s + /usr/lib/apt/apt-helper analyze-pattern ?true 105s + DEBIAN_FRONTEND=noninteractive eatmydata apt-get -y purge --autoremove ?obsolete 105s Reading package lists... 105s Building dependency tree... 105s Reading state information... 105s 0 upgraded, 0 newly installed, 0 to remove and 2 not upgraded. 105s + grep -q trusty /etc/lsb-release 105s + [ ! -d /usr/share/doc/unattended-upgrades ] 105s + [ ! -d /usr/share/doc/lxd ] 105s + [ ! -d /usr/share/doc/lxd-client ] 105s + [ ! -d /usr/share/doc/snapd ] 105s + type iptables 105s + cat 105s + chmod 755 /etc/rc.local 105s + . /etc/rc.local 105s + iptables -w -t mangle -A FORWARD -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu 105s + iptables -A OUTPUT -d 10.255.255.1/32 -p tcp -j DROP 105s + iptables -A OUTPUT -d 10.255.255.2/32 -p tcp -j DROP 105s + uname -m 105s + [ ppc64le = ppc64le ] 105s + systemctl is-active keyboard-setup.service 105s + [ active = failed ] 105s + [ -d /run/systemd/system ] 105s + systemd-detect-virt --quiet --vm 105s + mkdir -p /etc/systemd/system/systemd-random-seed.service.d/ 105s + cat 105s + grep -q lz4 /etc/initramfs-tools/initramfs.conf 105s + echo COMPRESS=lz4 105s + sync 106s autopkgtest [10:44:02]: upgrading testbed (apt dist-upgrade and autopurge) 106s Reading package lists... 106s Building dependency tree... 106s Reading state information... 106s Calculating upgrade...Starting pkgProblemResolver with broken count: 0 106s Starting 2 pkgProblemResolver with broken count: 0 107s Done 107s Entering ResolveByKeep 107s 107s The following packages will be upgraded: 107s libcrypt-dev libcrypt1 107s 2 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 107s Need to get 265 kB of archives. 107s After this operation, 1024 B of additional disk space will be used. 107s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed/main ppc64el libcrypt-dev ppc64el 1:4.4.38-1 [150 kB] 108s Get:2 http://ftpmaster.internal/ubuntu plucky-proposed/main ppc64el libcrypt1 ppc64el 1:4.4.38-1 [115 kB] 108s Fetched 265 kB in 0s (586 kB/s) 108s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74045 files and directories currently installed.) 108s Preparing to unpack .../libcrypt-dev_1%3a4.4.38-1_ppc64el.deb ... 108s Unpacking libcrypt-dev:ppc64el (1:4.4.38-1) over (1:4.4.36-5) ... 108s Preparing to unpack .../libcrypt1_1%3a4.4.38-1_ppc64el.deb ... 108s Unpacking libcrypt1:ppc64el (1:4.4.38-1) over (1:4.4.36-5) ... 108s Setting up libcrypt1:ppc64el (1:4.4.38-1) ... 108s Setting up libcrypt-dev:ppc64el (1:4.4.38-1) ... 108s Processing triggers for man-db (2.13.0-1) ... 108s Processing triggers for libc-bin (2.40-4ubuntu1) ... 109s Reading package lists... 109s Building dependency tree... 109s Reading state information... 109s Starting pkgProblemResolver with broken count: 0 109s Starting 2 pkgProblemResolver with broken count: 0 109s Done 110s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 112s autopkgtest [10:44:08]: testbed running kernel: Linux 6.11.0-8-generic #8-Ubuntu SMP Mon Sep 16 13:49:23 UTC 2024 112s autopkgtest [10:44:08]: @@@@@@@@@@@@@@@@@@@@ apt-source libreswan 114s Get:1 http://ftpmaster.internal/ubuntu plucky/universe libreswan 4.14-1ubuntu2 (dsc) [2781 B] 114s Get:2 http://ftpmaster.internal/ubuntu plucky/universe libreswan 4.14-1ubuntu2 (tar) [3721 kB] 114s Get:3 http://ftpmaster.internal/ubuntu plucky/universe libreswan 4.14-1ubuntu2 (asc) [862 B] 114s Get:4 http://ftpmaster.internal/ubuntu plucky/universe libreswan 4.14-1ubuntu2 (diff) [17.5 kB] 115s gpgv: Signature made Sun Mar 31 19:34:12 2024 UTC 115s gpgv: using RSA key AC483F68DE728F43F2202FCA568D30F321B2133D 115s gpgv: issuer "steve.langasek@ubuntu.com" 115s gpgv: Can't check signature: No public key 115s dpkg-source: warning: cannot verify inline signature for ./libreswan_4.14-1ubuntu2.dsc: no acceptable signature found 115s autopkgtest [10:44:11]: testing package libreswan version 4.14-1ubuntu2 116s autopkgtest [10:44:12]: build not needed 119s autopkgtest [10:44:15]: test opportunistic: preparing testbed 119s Reading package lists... 119s Building dependency tree... 119s Reading state information... 119s Starting pkgProblemResolver with broken count: 0 119s Starting 2 pkgProblemResolver with broken count: 0 119s Done 120s The following NEW packages will be installed: 120s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 120s libnss3-tools libreswan libunbound8 120s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 120s Need to get 3084 kB of archives. 120s After this operation, 14.9 MB of additional disk space will be used. 120s Get:1 http://ftpmaster.internal/ubuntu plucky/main ppc64el dns-root-data all 2024071801 [5802 B] 120s Get:2 http://ftpmaster.internal/ubuntu plucky/main ppc64el libnss3-tools ppc64el 2:3.106-1ubuntu1 [727 kB] 120s Get:3 http://ftpmaster.internal/ubuntu plucky/main ppc64el libevent-pthreads-2.1-7t64 ppc64el 2.1.12-stable-10 [8026 B] 120s Get:4 http://ftpmaster.internal/ubuntu plucky/universe ppc64el libldns3t64 ppc64el 1.8.4-2 [200 kB] 120s Get:5 http://ftpmaster.internal/ubuntu plucky/main ppc64el libevent-2.1-7t64 ppc64el 2.1.12-stable-10 [172 kB] 120s Get:6 http://ftpmaster.internal/ubuntu plucky/main ppc64el libunbound8 ppc64el 1.20.0-1ubuntu2.1 [546 kB] 120s Get:7 http://ftpmaster.internal/ubuntu plucky/universe ppc64el libreswan ppc64el 4.14-1ubuntu2 [1426 kB] 121s Fetched 3084 kB in 1s (4362 kB/s) 121s Selecting previously unselected package dns-root-data. 121s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74045 files and directories currently installed.) 121s Preparing to unpack .../0-dns-root-data_2024071801_all.deb ... 121s Unpacking dns-root-data (2024071801) ... 121s Selecting previously unselected package libnss3-tools. 121s Preparing to unpack .../1-libnss3-tools_2%3a3.106-1ubuntu1_ppc64el.deb ... 121s Unpacking libnss3-tools (2:3.106-1ubuntu1) ... 121s Selecting previously unselected package libevent-pthreads-2.1-7t64:ppc64el. 121s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10_ppc64el.deb ... 121s Unpacking libevent-pthreads-2.1-7t64:ppc64el (2.1.12-stable-10) ... 121s Selecting previously unselected package libldns3t64:ppc64el. 121s Preparing to unpack .../3-libldns3t64_1.8.4-2_ppc64el.deb ... 121s Unpacking libldns3t64:ppc64el (1.8.4-2) ... 121s Selecting previously unselected package libevent-2.1-7t64:ppc64el. 121s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10_ppc64el.deb ... 121s Unpacking libevent-2.1-7t64:ppc64el (2.1.12-stable-10) ... 121s Selecting previously unselected package libunbound8:ppc64el. 121s Preparing to unpack .../5-libunbound8_1.20.0-1ubuntu2.1_ppc64el.deb ... 121s Unpacking libunbound8:ppc64el (1.20.0-1ubuntu2.1) ... 121s Selecting previously unselected package libreswan. 121s Preparing to unpack .../6-libreswan_4.14-1ubuntu2_ppc64el.deb ... 121s Unpacking libreswan (4.14-1ubuntu2) ... 121s Setting up libldns3t64:ppc64el (1.8.4-2) ... 121s Setting up libevent-pthreads-2.1-7t64:ppc64el (2.1.12-stable-10) ... 121s Setting up libevent-2.1-7t64:ppc64el (2.1.12-stable-10) ... 121s Setting up dns-root-data (2024071801) ... 121s Setting up libunbound8:ppc64el (1.20.0-1ubuntu2.1) ... 121s Setting up libnss3-tools (2:3.106-1ubuntu1) ... 121s Setting up libreswan (4.14-1ubuntu2) ... 121s ipsec.service is a disabled or a static unit, not starting it. 121s Processing triggers for man-db (2.13.0-1) ... 123s Processing triggers for libc-bin (2.40-4ubuntu1) ... 124s autopkgtest [10:44:20]: test opportunistic: [----------------------- 124s PING oe.libreswan.org (193.110.157.124) 56(84) bytes of data. 124s From 10.145.255.2 icmp_seq=1 Destination Port Unreachable 125s From 10.145.255.2 icmp_seq=2 Destination Port Unreachable 126s From 10.145.255.2 icmp_seq=3 Destination Port Unreachable 127s From 10.145.255.2 icmp_seq=4 Destination Port Unreachable 128s From 10.145.255.2 icmp_seq=5 Destination Port Unreachable 128s 128s --- oe.libreswan.org ping statistics --- 128s 5 packets transmitted, 0 received, +5 errors, 100% packet loss, time 4007ms 128s 128s autopkgtest [10:44:24]: test opportunistic: -----------------------] 129s autopkgtest [10:44:25]: test opportunistic: - - - - - - - - - - results - - - - - - - - - - 129s opportunistic SKIP exit status 77 and marked as skippable 129s autopkgtest [10:44:25]: test cryptocheck: preparing testbed 220s autopkgtest [10:45:56]: testbed dpkg architecture: ppc64el 220s autopkgtest [10:45:56]: testbed apt version: 2.9.18 220s autopkgtest [10:45:56]: @@@@@@@@@@@@@@@@@@@@ test bed setup 220s autopkgtest [10:45:56]: testbed release detected to be: plucky 221s autopkgtest [10:45:57]: updating testbed package index (apt update) 221s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease [73.9 kB] 222s Hit:2 http://ftpmaster.internal/ubuntu plucky InRelease 222s Hit:3 http://ftpmaster.internal/ubuntu plucky-updates InRelease 222s Hit:4 http://ftpmaster.internal/ubuntu plucky-security InRelease 222s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/main Sources [172 kB] 222s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/universe Sources [887 kB] 222s Get:7 http://ftpmaster.internal/ubuntu plucky-proposed/restricted Sources [9708 B] 222s Get:8 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse Sources [16.4 kB] 222s Get:9 http://ftpmaster.internal/ubuntu plucky-proposed/main ppc64el Packages [295 kB] 222s Get:10 http://ftpmaster.internal/ubuntu plucky-proposed/restricted ppc64el Packages [756 B] 222s Get:11 http://ftpmaster.internal/ubuntu plucky-proposed/universe ppc64el Packages [1059 kB] 222s Get:12 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse ppc64el Packages [17.1 kB] 222s Fetched 2531 kB in 1s (2297 kB/s) 223s Reading package lists... 224s + lsb_release --codename --short 224s + RELEASE=plucky 224s + cat 224s + [ plucky != trusty ] 224s + DEBIAN_FRONTEND=noninteractive eatmydata apt-get -y --allow-downgrades -o Dpkg::Options::=--force-confnew dist-upgrade 224s Reading package lists... 224s Building dependency tree... 224s Reading state information... 224s Calculating upgrade... 224s The following packages will be upgraded: 224s libgudev-1.0-0 usb.ids 224s 2 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 224s Need to get 239 kB of archives. 224s After this operation, 1024 B of additional disk space will be used. 224s Get:1 http://ftpmaster.internal/ubuntu plucky/main ppc64el usb.ids all 2025.01.14-1 [223 kB] 225s Get:2 http://ftpmaster.internal/ubuntu plucky/main ppc64el libgudev-1.0-0 ppc64el 1:238-6 [15.7 kB] 225s Fetched 239 kB in 1s (471 kB/s) 225s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74045 files and directories currently installed.) 225s Preparing to unpack .../usb.ids_2025.01.14-1_all.deb ... 225s Unpacking usb.ids (2025.01.14-1) over (2024.12.04-1) ... 225s Preparing to unpack .../libgudev-1.0-0_1%3a238-6_ppc64el.deb ... 225s Unpacking libgudev-1.0-0:ppc64el (1:238-6) over (1:238-5ubuntu1) ... 225s Setting up usb.ids (2025.01.14-1) ... 225s Setting up libgudev-1.0-0:ppc64el (1:238-6) ... 225s Processing triggers for libc-bin (2.40-4ubuntu1) ... 225s + rm /etc/apt/preferences.d/force-downgrade-to-release.pref 225s + /usr/lib/apt/apt-helper analyze-pattern ?true 225s + DEBIAN_FRONTEND=noninteractive eatmydata apt-get -y purge --autoremove ?obsolete 226s Reading package lists... 226s Building dependency tree... 226s Reading state information... 226s + grep -q trusty /etc/lsb-release 226s 0 upgraded, 0 newly installed, 0 to remove and 2 not upgraded. 226s + [ ! -d /usr/share/doc/unattended-upgrades ] 226s + [ ! -d /usr/share/doc/lxd ] 226s + [ ! -d /usr/share/doc/lxd-client ] 226s + [ ! -d /usr/share/doc/snapd ] 226s + type iptables 226s + cat 226s + chmod 755 /etc/rc.local 226s + . /etc/rc.local 226s + iptables -w -t mangle -A FORWARD -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu 226s + iptables -A OUTPUT -d 10.255.255.1/32 -p tcp -j DROP 226s + iptables -A OUTPUT -d 10.255.255.2/32 -p tcp -j DROP 226s + uname -m 226s + [ ppc64le = ppc64le ] 226s + systemctl is-active keyboard-setup.service 226s + [ active = failed ] 226s + [ -d /run/systemd/system ] 226s + systemd-detect-virt --quiet --vm 226s + mkdir -p /etc/systemd/system/systemd-random-seed.service.d/ 226s + cat 226s + grep -q lz4 /etc/initramfs-tools/initramfs.conf 226s + echo COMPRESS=lz4 226s + sync 226s autopkgtest [10:46:02]: upgrading testbed (apt dist-upgrade and autopurge) 226s Reading package lists... 226s Building dependency tree... 226s Reading state information... 227s Calculating upgrade...Starting pkgProblemResolver with broken count: 0 227s Starting 2 pkgProblemResolver with broken count: 0 227s Done 227s Entering ResolveByKeep 227s 227s The following packages will be upgraded: 227s libcrypt-dev libcrypt1 228s 2 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 228s Need to get 265 kB of archives. 228s After this operation, 1024 B of additional disk space will be used. 228s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed/main ppc64el libcrypt-dev ppc64el 1:4.4.38-1 [150 kB] 228s Get:2 http://ftpmaster.internal/ubuntu plucky-proposed/main ppc64el libcrypt1 ppc64el 1:4.4.38-1 [115 kB] 228s Fetched 265 kB in 0s (540 kB/s) 228s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74045 files and directories currently installed.) 228s Preparing to unpack .../libcrypt-dev_1%3a4.4.38-1_ppc64el.deb ... 228s Unpacking libcrypt-dev:ppc64el (1:4.4.38-1) over (1:4.4.36-5) ... 228s Preparing to unpack .../libcrypt1_1%3a4.4.38-1_ppc64el.deb ... 228s Unpacking libcrypt1:ppc64el (1:4.4.38-1) over (1:4.4.36-5) ... 228s Setting up libcrypt1:ppc64el (1:4.4.38-1) ... 228s Setting up libcrypt-dev:ppc64el (1:4.4.38-1) ... 228s Processing triggers for man-db (2.13.0-1) ... 229s Processing triggers for libc-bin (2.40-4ubuntu1) ... 229s Reading package lists... 229s Building dependency tree... 229s Reading state information... 229s Starting pkgProblemResolver with broken count: 0 229s Starting 2 pkgProblemResolver with broken count: 0 229s Done 230s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 233s Reading package lists... 233s Building dependency tree... 233s Reading state information... 233s Starting pkgProblemResolver with broken count: 0 233s Starting 2 pkgProblemResolver with broken count: 0 233s Done 234s The following NEW packages will be installed: 234s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 234s libnss3-tools libreswan libunbound8 234s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 234s Need to get 3084 kB of archives. 234s After this operation, 14.9 MB of additional disk space will be used. 234s Get:1 http://ftpmaster.internal/ubuntu plucky/main ppc64el dns-root-data all 2024071801 [5802 B] 234s Get:2 http://ftpmaster.internal/ubuntu plucky/main ppc64el libnss3-tools ppc64el 2:3.106-1ubuntu1 [727 kB] 235s Get:3 http://ftpmaster.internal/ubuntu plucky/main ppc64el libevent-pthreads-2.1-7t64 ppc64el 2.1.12-stable-10 [8026 B] 235s Get:4 http://ftpmaster.internal/ubuntu plucky/universe ppc64el libldns3t64 ppc64el 1.8.4-2 [200 kB] 235s Get:5 http://ftpmaster.internal/ubuntu plucky/main ppc64el libevent-2.1-7t64 ppc64el 2.1.12-stable-10 [172 kB] 235s Get:6 http://ftpmaster.internal/ubuntu plucky/main ppc64el libunbound8 ppc64el 1.20.0-1ubuntu2.1 [546 kB] 235s Get:7 http://ftpmaster.internal/ubuntu plucky/universe ppc64el libreswan ppc64el 4.14-1ubuntu2 [1426 kB] 236s Fetched 3084 kB in 2s (1605 kB/s) 236s Selecting previously unselected package dns-root-data. 236s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74045 files and directories currently installed.) 236s Preparing to unpack .../0-dns-root-data_2024071801_all.deb ... 236s Unpacking dns-root-data (2024071801) ... 236s Selecting previously unselected package libnss3-tools. 236s Preparing to unpack .../1-libnss3-tools_2%3a3.106-1ubuntu1_ppc64el.deb ... 236s Unpacking libnss3-tools (2:3.106-1ubuntu1) ... 236s Selecting previously unselected package libevent-pthreads-2.1-7t64:ppc64el. 236s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10_ppc64el.deb ... 236s Unpacking libevent-pthreads-2.1-7t64:ppc64el (2.1.12-stable-10) ... 236s Selecting previously unselected package libldns3t64:ppc64el. 236s Preparing to unpack .../3-libldns3t64_1.8.4-2_ppc64el.deb ... 236s Unpacking libldns3t64:ppc64el (1.8.4-2) ... 236s Selecting previously unselected package libevent-2.1-7t64:ppc64el. 236s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10_ppc64el.deb ... 236s Unpacking libevent-2.1-7t64:ppc64el (2.1.12-stable-10) ... 236s Selecting previously unselected package libunbound8:ppc64el. 236s Preparing to unpack .../5-libunbound8_1.20.0-1ubuntu2.1_ppc64el.deb ... 236s Unpacking libunbound8:ppc64el (1.20.0-1ubuntu2.1) ... 236s Selecting previously unselected package libreswan. 236s Preparing to unpack .../6-libreswan_4.14-1ubuntu2_ppc64el.deb ... 236s Unpacking libreswan (4.14-1ubuntu2) ... 236s Setting up libldns3t64:ppc64el (1.8.4-2) ... 236s Setting up libevent-pthreads-2.1-7t64:ppc64el (2.1.12-stable-10) ... 236s Setting up libevent-2.1-7t64:ppc64el (2.1.12-stable-10) ... 236s Setting up dns-root-data (2024071801) ... 236s Setting up libunbound8:ppc64el (1.20.0-1ubuntu2.1) ... 236s Setting up libnss3-tools (2:3.106-1ubuntu1) ... 236s Setting up libreswan (4.14-1ubuntu2) ... 236s ipsec.service is a disabled or a static unit, not starting it. 236s Processing triggers for man-db (2.13.0-1) ... 238s Processing triggers for libc-bin (2.40-4ubuntu1) ... 270s autopkgtest [10:46:46]: test cryptocheck: [----------------------- 271s Testing installed binary: /usr/libexec/ipsec/algparse 271s Testing installed binary: /usr/libexec/ipsec/pluto 271s testing -tp 271s algparse: Encryption algorithms: 271s algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 271s algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 271s algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 271s algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 271s algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 271s algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 271s algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm, aes_gcm_c 271s algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_b 271s algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_a 271s algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 271s algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 271s algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 271s algparse: NULL [] IKEv1: ESP IKEv2: ESP 271s algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 271s algparse: Hash algorithms: 271s algparse: MD5 IKEv1: IKE IKEv2: NSS 271s algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 271s algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 271s algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 271s algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 271s algparse: IDENTITY IKEv1: IKEv2: FIPS 271s algparse: PRF algorithms: 271s algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE native(HMAC) md5 271s algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 271s algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 271s algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 271s algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 271s algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 271s algparse: Integrity algorithms: 271s algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH native(HMAC) md5, hmac_md5 271s algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 271s algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 271s algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 271s algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 271s algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 271s algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 271s algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 271s algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 271s algparse: DH algorithms: 271s algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 271s algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 271s algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 271s algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 271s algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 271s algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 271s algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 271s algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 271s algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 271s algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 271s algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 271s algparse: IPCOMP algorithms: 271s algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 271s algparse: LZS IKEv1: IKEv2: ESP AH FIPS 271s algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 271s | parsing 'AES_GCM_16_256,AES_GCM_16_128,AES_CBC_256,AES_CBC_128' for ESP 271s | proposal: 'AES_GCM_16_256' 271s | token: '' '' "AES_GCM_16_256" '' 271s | token: '' "AES_GCM_16_256" '' '' 271s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_256' is not recognized 271s | token: '' '' '' 271s | appending ESP encryption algorithm AES_GCM_16[_256] 271s | appending ESP integrity algorithm NONE[_0] 271s | proposal: 'AES_GCM_16_128' 271s | token: '' '' "AES_GCM_16_128" '' 271s | token: '' "AES_GCM_16_128" '' '' 271s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_128' is not recognized 271s | token: '' '' '' 271s | appending ESP encryption algorithm AES_GCM_16[_128] 271s | appending ESP integrity algorithm NONE[_0] 271s | proposal: 'AES_CBC_256' 271s | token: '' '' "AES_CBC_256" '' 271s | token: '' "AES_CBC_256" '' '' 271s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_256' is not recognized 271s | token: '' '' '' 271s | appending ESP encryption algorithm AES_CBC[_256] 271s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 271s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 271s | proposal: 'AES_CBC_128' 271s | token: '' '' "AES_CBC_128" '' 271s | token: '' "AES_CBC_128" '' '' 271s algparse -v2 'esp' 271s AES_GCM_16_256-NONE 271s AES_GCM_16_128-NONE 271s AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 271s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 271s algparse -v2 'esp=' 271s ERROR: ESP proposal is empty 271s algparse -v2 'esp=aes' 271s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 271s algparse -v2 'esp=aes;modp2048' 271s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 271s algparse -v2 'esp=aes-sha1' 271s AES_CBC-HMAC_SHA1_96 271s algparse -v2 'esp=aes-sha1' 271s AES_CBC-HMAC_SHA1_96 271s algparse -v2 'esp=aes-sha1-modp2048' 271s AES_CBC-HMAC_SHA1_96 271s algparse -v2 'esp=aes-128-sha1' 271s AES_CBC_128-HMAC_SHA1_96 271s algparse -v2 'esp=aes-128-sha1' 271s AES_CBC_128-HMAC_SHA1_96 271s algparse -v2 'esp=aes-128-sha1-modp2048' 271s AES_CBC_128-HMAC_SHA1_96 271s algparse -v2 'esp=aes-128' 271s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 271s algparse -v2 'esp=aes_gcm_a-128-null' 271s AES_GCM_8_128-NONE 271s algparse -v2 'esp=3des-sha1;modp1024' 271s ERROR: ESP DH algorithm 'modp1024' is not supported 271s algparse -v2 'esp=3des-sha1;modp1536' 271s 3DES_CBC-HMAC_SHA1_96 271s algparse -v2 'esp=3des-sha1;modp2048' 271s 3DES_CBC-HMAC_SHA1_96 271s algparse -v2 'esp=3des-sha1;dh21' 271s 3DES_CBC-HMAC_SHA1_96 271s algparse -v2 'esp=3des-sha1;ecp_521' 271s 3DES_CBC-HMAC_SHA1_96 271s algparse -v2 'esp=3des-sha1;dh23' 271s ERROR: ESP DH algorithm 'dh23' is not supported 271s algparse -v2 'esp=3des-sha1;dh24' 271s ERROR: ESP DH algorithm 'dh24' is not supported 271s algparse -v2 'esp=3des-sha1' 271s 3DES_CBC-HMAC_SHA1_96 271s algparse -v2 'esp=null-sha1' 271s NULL-HMAC_SHA1_96 271s algparse -v2 'esp=aes_cbc' 271s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 271s algparse -v2 'esp=aes-sha' 271s AES_CBC-HMAC_SHA1_96 271s algparse -v2 'esp=aes-sha1' 271s AES_CBC-HMAC_SHA1_96 271s algparse -v2 'esp=aes128-sha1' 271s AES_CBC_128-HMAC_SHA1_96 271s algparse -v2 'esp=aes-sha2' 271s AES_CBC-HMAC_SHA2_256_128 271s algparse -v2 'esp=aes-sha256' 271s AES_CBC-HMAC_SHA2_256_128 271s algparse -v2 'esp=aes-sha384' 271s AES_CBC-HMAC_SHA2_384_192 271s algparse -v2 'esp=aes-sha512' 271s AES_CBC-HMAC_SHA2_512_256 271s algparse -v2 'esp=aes128-aes_xcbc' 271s AES_CBC_128-AES_XCBC_96 271s algparse -v2 'esp=aes192-sha1' 271s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_128' is not recognized 271s | token: '' '' '' 271s | appending ESP encryption algorithm AES_CBC[_128] 271s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 271s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 271s | parsing '' for ESP 271s | parsing 'aes' for ESP 271s | proposal: 'aes' 271s | token: '' '' "aes" '' 271s | token: '' "aes" '' '' 271s | token: '' '' '' 271s | appending ESP encryption algorithm AES_CBC[_0] 271s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 271s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 271s | parsing 'aes;modp2048' for ESP 271s | proposal: 'aes;modp2048' 271s | token: '' '' "aes" ';' 271s | token: '' "aes" ';' "modp2048" '' 271s | token: ';' "modp2048" '' '' 271s | appending ESP encryption algorithm AES_CBC[_0] 271s | parsing dh: 271s | appending ESP DH algorithm MODP2048[_0] 271s | token: '' '' '' 271s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 271s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 271s algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 271s | parsing 'aes-sha1' for ESP 271s | proposal: 'aes-sha1' 271s | token: '' '' "aes" '-' 271s | token: '' "aes" '-' "sha1" '' 271s | token: '-' "sha1" '' '' 271s | appending ESP encryption algorithm AES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: '' '' '' 271s | parsing 'aes-sha1' for ESP 271s | proposal: 'aes-sha1' 271s | token: '' '' "aes" '-' 271s | token: '' "aes" '-' "sha1" '' 271s | token: '-' "sha1" '' '' 271s | appending ESP encryption algorithm AES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: '' '' '' 271s | parsing 'aes-sha1-modp2048' for ESP 271s | proposal: 'aes-sha1-modp2048' 271s | token: '' '' "aes" '-' 271s | token: '' "aes" '-' "sha1" '-' 271s | token: '-' "sha1" '-' "modp2048" '' 271s | appending ESP encryption algorithm AES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: '-' "modp2048" '' '' 271s | parsing dh: 271s | appending ESP DH algorithm MODP2048[_0] 271s | token: '' '' '' 271s algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 271s | parsing 'aes-128-sha1' for ESP 271s | proposal: 'aes-128-sha1' 271s | token: '' '' "aes" '-' 271s | token: '' "aes" '-' "128" '-' 271s | token: '-' "128" '-' "sha1" '' 271s | token: '-' "sha1" '' '' 271s | appending ESP encryption algorithm AES_CBC[_128] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: '' '' '' 271s | parsing 'aes-128-sha1' for ESP 271s | proposal: 'aes-128-sha1' 271s | token: '' '' "aes" '-' 271s | token: '' "aes" '-' "128" '-' 271s | token: '-' "128" '-' "sha1" '' 271s | token: '-' "sha1" '' '' 271s | appending ESP encryption algorithm AES_CBC[_128] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: '' '' '' 271s | parsing 'aes-128-sha1-modp2048' for ESP 271s | proposal: 'aes-128-sha1-modp2048' 271s | token: '' '' "aes" '-' 271s | token: '' "aes" '-' "128" '-' 271s | token: '-' "128" '-' "sha1" '-' 271s | token: '-' "sha1" '-' "modp2048" '' 271s | appending ESP encryption algorithm AES_CBC[_128] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: '-' "modp2048" '' '' 271s | parsing dh: 271s | appending ESP DH algorithm MODP2048[_0] 271s | token: '' '' '' 271s algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 271s | parsing 'aes-128' for ESP 271s | proposal: 'aes-128' 271s | token: '' '' "aes" '-' 271s | token: '' "aes" '-' "128" '' 271s | token: '-' "128" '' '' 271s | token: '' '' '' 271s | appending ESP encryption algorithm AES_CBC[_128] 271s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 271s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 271s | parsing 'aes_gcm_a-128-null' for ESP 271s | proposal: 'aes_gcm_a-128-null' 271s | token: '' '' "aes_gcm_a" '-' 271s | token: '' "aes_gcm_a" '-' "128" '-' 271s | token: '-' "128" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_GCM_8[_128] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing '3des-sha1;modp1024' for ESP 271s | proposal: '3des-sha1;modp1024' 271s | token: '' '' "3des" '-' 271s | token: '' "3des" '-' "sha1" ';' 271s | token: '-' "sha1" ';' "modp1024" '' 271s | appending ESP encryption algorithm 3DES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: ';' "modp1024" '' '' 271s | parsing dh: 271s | ike_alg_byname() failed: ESP DH algorithm 'modp1024' is not supported 271s | lookup for DH algorithm 'modp1024' failed 271s | ... failed 'ESP DH algorithm 'modp1024' is not supported' 271s | parsing '3des-sha1;modp1536' for ESP 271s | proposal: '3des-sha1;modp1536' 271s | token: '' '' "3des" '-' 271s | token: '' "3des" '-' "sha1" ';' 271s | token: '-' "sha1" ';' "modp1536" '' 271s | appending ESP encryption algorithm 3DES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: ';' "modp1536" '' '' 271s | parsing dh: 271s | appending ESP DH algorithm MODP1536[_0] 271s | token: '' '' '' 271s algparse: ignoring ESP DH algorithm MODP1536 as PFS policy is disabled 271s | parsing '3des-sha1;modp2048' for ESP 271s | proposal: '3des-sha1;modp2048' 271s | token: '' '' "3des" '-' 271s | token: '' "3des" '-' "sha1" ';' 271s | token: '-' "sha1" ';' "modp2048" '' 271s | appending ESP encryption algorithm 3DES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: ';' "modp2048" '' '' 271s | parsing dh: 271s | appending ESP DH algorithm MODP2048[_0] 271s | token: '' '' '' 271s algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 271s | parsing '3des-sha1;dh21' for ESP 271s | proposal: '3des-sha1;dh21' 271s | token: '' '' "3des" '-' 271s | token: '' "3des" '-' "sha1" ';' 271s | token: '-' "sha1" ';' "dh21" '' 271s | appending ESP encryption algorithm 3DES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: ';' "dh21" '' '' 271s | parsing dh: 271s | appending ESP DH algorithm DH21[_0] 271s | token: '' '' '' 271s algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 271s | parsing '3des-sha1;ecp_521' for ESP 271s | proposal: '3des-sha1;ecp_521' 271s | token: '' '' "3des" '-' 271s | token: '' "3des" '-' "sha1" ';' 271s | token: '-' "sha1" ';' "ecp_521" '' 271s | appending ESP encryption algorithm 3DES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: ';' "ecp_521" '' '' 271s | parsing dh: 271s | appending ESP DH algorithm DH21[_0] 271s | token: '' '' '' 271s algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 271s | parsing '3des-sha1;dh23' for ESP 271s | proposal: '3des-sha1;dh23' 271s | token: '' '' "3des" '-' 271s | token: '' "3des" '-' "sha1" ';' 271s | token: '-' "sha1" ';' "dh23" '' 271s | appending ESP encryption algorithm 3DES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: ';' "dh23" '' '' 271s | parsing dh: 271s | ike_alg_byname() failed: ESP DH algorithm 'dh23' is not supported 271s | lookup for DH algorithm 'dh23' failed 271s | ... failed 'ESP DH algorithm 'dh23' is not supported' 271s | parsing '3des-sha1;dh24' for ESP 271s | proposal: '3des-sha1;dh24' 271s | token: '' '' "3des" '-' 271s | token: '' "3des" '-' "sha1" ';' 271s | token: '-' "sha1" ';' "dh24" '' 271s | appending ESP encryption algorithm 3DES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: ';' "dh24" '' '' 271s | parsing dh: 271s | ike_alg_byname() failed: ESP DH algorithm 'dh24' is not supported 271s | lookup for DH algorithm 'dh24' failed 271s | ... failed 'ESP DH algorithm 'dh24' is not supported' 271s | parsing '3des-sha1' for ESP 271s | proposal: '3des-sha1' 271s | token: '' '' "3des" '-' 271s | token: '' "3des" '-' "sha1" '' 271s | token: '-' "sha1" '' '' 271s | appending ESP encryption algorithm 3DES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: '' '' '' 271s | parsing 'null-sha1' for ESP 271s | proposal: 'null-sha1' 271s | token: '' '' "null" '-' 271s | token: '' "null" '-' "sha1" '' 271s | token: '-' "sha1" '' '' 271s | appending ESP encryption algorithm NULL[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: '' '' '' 271s | parsing 'aes_cbc' for ESP 271s | proposal: 'aes_cbc' 271s | token: '' '' "aes_cbc" '' 271s | token: '' "aes_cbc" '' '' 271s | token: '' '' '' 271s | appending ESP encryption algorithm AES_CBC[_0] 271s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 271s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 271s | parsing 'aes-sha' for ESP 271s | proposal: 'aes-sha' 271s | token: '' '' "aes" '-' 271s | token: '' "aes" '-' "sha" '' 271s | token: '-' "sha" '' '' 271s | appending ESP encryption algorithm AES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: '' '' '' 271s | parsing 'aes-sha1' for ESP 271s | proposal: 'aes-sha1' 271s | token: '' '' "aes" '-' 271s | token: '' "aes" '-' "sha1" '' 271s | token: '-' "sha1" '' '' 271s | appending ESP encryption algorithm AES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: '' '' '' 271s | parsing 'aes128-sha1' for ESP 271s | proposal: 'aes128-sha1' 271s | token: '' '' "aes128" '-' 271s | token: '' "aes128" '-' "sha1" '' 271s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 271s | token: '-' "sha1" '' '' 271s | appending ESP encryption algorithm AES_CBC[_128] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: '' '' '' 271s | parsing 'aes-sha2' for ESP 271s | proposal: 'aes-sha2' 271s | token: '' '' "aes" '-' 271s | token: '' "aes" '-' "sha2" '' 271s | token: '-' "sha2" '' '' 271s | appending ESP encryption algorithm AES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 271s | token: '' '' '' 271s | parsing 'aes-sha256' for ESP 271s | proposal: 'aes-sha256' 271s | token: '' '' "aes" '-' 271s | token: '' "aes" '-' "sha256" '' 271s | token: '-' "sha256" '' '' 271s | appending ESP encryption algorithm AES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 271s | token: '' '' '' 271s | parsing 'aes-sha384' for ESP 271s | proposal: 'aes-sha384' 271s | token: '' '' "aes" '-' 271s | token: '' "aes" '-' "sha384" '' 271s | token: '-' "sha384" '' '' 271s | appending ESP encryption algorithm AES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 271s | token: '' '' '' 271s | parsing 'aes-sha512' for ESP 271s | proposal: 'aes-sha512' 271s | token: '' '' "aes" '-' 271s | token: '' "aes" '-' "sha512" '' 271s | token: '-' "sha512" '' '' 271s | appending ESP encryption algorithm AES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 271s | token: '' '' '' 271s | parsing 'aes128-aes_xcbc' for ESP 271s | proposal: 'aes128-aes_xcbc' 271s | token: '' '' "aes128" '-' 271s | token: '' "aes128" '-' "aes_xcbc" '' 271s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 271s | token: '-' "aes_xcbc" '' '' 271s | appending ESP encryption algorithm AES_CBC[_128] 271s | parsing integ: 271s | appending ESP integrity algorithm AES_XCBC_96[_0] 271s | token: '' '' '' 271s | parsing 'aes192-sha1' for ESP 271s | proposal: 'aes192-sha1' 271s | token: '' '' "aes192" '-' 271s | token: '' "aes192" '-' "sha1" '' 271s | ike_alg_byname() failed: ESP encryption algorithm 'aes192' is not recognized 271s | token: '-' "sha1" '' '' 271s | appending ESP encryption algorithm AES_CBC[_192] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: '' '' '' 271s | parsing 'aes256-sha1' for ESP 271s | proposal: 'aes256-sha1' 271s | token: '' '' "aes256" '-' 271s | token: '' "aes256" '-' "sha1" '' 271s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 271s | token: '-' "sha1" '' '' 271s | appending ESP encryption algorithm AES_CBC[_256] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: '' '' '' 271s | parsing 'aes256-sha' for ESP 271s | proposal: 'aes256-sha' 271s | token: '' '' "aes256" '-' 271s | token: '' "aes256" '-' "sha" '' 271s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 271s | token: '-' "sha" '' '' 271s | appending ESP encryption algorithm AES_CBC[_256] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: '' '' '' 271s | parsing 'aes256-sha2' for ESP 271s | proposal: 'aes256-sha2' 271s | token: '' '' "aes256" '-' 271s | token: '' "aes256" '-' "sha2" '' 271s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 271s | token: '-' "sha2" '' '' 271s | appending ESP encryption algorithm AES_CBC[_256] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 271s | token: '' '' '' 271s | parsing 'aes256-sha2_256' for ESP 271s | proposal: 'aes256-sha2_256' 271s | token: '' '' "aes256" '-' 271s | token: '' "aes256" '-' "sha2_256" '' 271s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 271s | token: '-' "sha2_256" '' '' 271s | appending ESP encryption algorithm AES_CBC[_256] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 271s | token: '' '' '' 271s | parsing 'aes256-sha2_384' for ESP 271s | proposal: 'aes256-sha2_384' 271s | token: '' '' "aes256" '-' 271s | token: '' "aes256" '-' "sha2_384" '' 271s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 271s | token: '-' "sha2_384" '' '' 271s | appending ESP encryption algorithm AES_CBC[_256] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 271s | token: '' '' '' 271s | parsing 'aes256-sha2_512' for ESP 271s | proposal: 'aes256-sha2_512' 271s | token: '' '' "aes256" '-' 271s | token: '' "aes256" '-' "sha2_512" '' 271s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 271s | token: '-' "sha2_512" '' '' 271s | appending ESP encryption algorithm AES_CBC[_256] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 271s | token: '' '' '' 271s | parsing 'camellia' for ESP 271s | proposal: 'camellia' 271s | token: '' '' "camellia" '' 271s | token: '' "camellia" '' '' 271s | token: '' '' '' 271s | appending ESP encryption algorithm CAMELLIA_CBC[_0] 271s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 271s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 271s | parsing 'camellia128' for ESP 271s | proposal: 'camellia128' 271s | token: '' '' "camellia128" '' 271s | token: '' "camellia128" '' '' 271s | ike_alg_byname() failed: ESP encryption algorithm 'camellia128' is not recognized 271s | token: '' '' '' 271s | appending ESP encryption algorithm CAMELLIA_CBC[_128] 271s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 271s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 271s | parsing 'camellia192' for ESP 271s | proposal: 'camellia192' 271s | token: '' '' "camellia192" '' 271s | token: '' "camellia192" '' '' 271s | ike_alg_byname() failed: ESP encryption algorithm 'camellia192' is not recognized 271s | token: '' '' '' 271s | appending ESP encryption algorithm CAMELLIA_CBC[_192] 271s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 271s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 271s | parsing 'camellia256' for ESP 271s | proposal: 'camellia256' 271s | token: '' '' "camellia256" '' 271s | token: '' "camellia256" '' '' 271s | ike_alg_byname() failed: ESP encryption algorithm 'camellia256' is not recognized 271s | token: '' '' '' 271s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 271s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 271s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 271s | parsing 'aes_ccm' for ESP 271s | proposal: 'aes_ccm' 271s | token: '' '' "aes_ccm" '' 271s | token: '' "aes_ccm" '' '' 271s | token: '' '' '' 271s | appending ESP encryption algorithm AES_CCM_16[_0] 271s | appending ESP integrity algorithm NONE[_0] 271s | parsing 'aes_ccm_a-128-null' for ESP 271s | proposal: 'aes_ccm_a-128-null' 271s | token: '' '' "aes_ccm_a" '-' 271s | token: '' "aes_ccm_a" '-' "128" '-' 271s | token: '-' "128" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_CCM_8[_128] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_ccm_a-192-null' for ESP 271s | proposal: 'aes_ccm_a-192-null' 271s | token: '' '' "aes_ccm_a" '-' 271s | token: '' "aes_ccm_a" '-' "192" '-' 271s | token: '-' "192" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_CCM_8[_192] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_ccm_a-256-null' for ESP 271s | proposal: 'aes_ccm_a-256-null' 271s | token: '' '' "aes_ccm_a" '-' 271s | token: '' "aes_ccm_a" '-' "256" '-' 271s | token: '-' "256" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_CCM_8[_256] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_ccm_b-128-null' for ESP 271s | proposal: 'aes_ccm_b-128-null' 271s | token: '' '' "aes_ccm_b" '-' 271s | token: '' "aes_ccm_b" '-' "128" '-' 271s | token: '-' "128" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_CCM_12[_128] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_ccm_b-192-null' for ESP 271s | proposal: 'aes_ccm_b-192-null' 271s | token: '' '' "aes_ccm_b" '-' 271s | token: '' "aes_ccm_b" '-' "192" '-' 271s | token: '-' "192" ' AES_CBC_192-HMAC_SHA1_96 271s algparse -v2 'esp=aes256-sha1' 271s AES_CBC_256-HMAC_SHA1_96 271s algparse -v2 'esp=aes256-sha' 271s AES_CBC_256-HMAC_SHA1_96 271s algparse -v2 'esp=aes256-sha2' 271s AES_CBC_256-HMAC_SHA2_256_128 271s algparse -v2 'esp=aes256-sha2_256' 271s AES_CBC_256-HMAC_SHA2_256_128 271s algparse -v2 'esp=aes256-sha2_384' 271s AES_CBC_256-HMAC_SHA2_384_192 271s algparse -v2 'esp=aes256-sha2_512' 271s AES_CBC_256-HMAC_SHA2_512_256 271s algparse -v2 'esp=camellia' 271s CAMELLIA_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 271s algparse -v2 'esp=camellia128' 271s CAMELLIA_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 271s algparse -v2 'esp=camellia192' 271s CAMELLIA_CBC_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 271s algparse -v2 'esp=camellia256' 271s CAMELLIA_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 271s algparse -v2 'esp=aes_ccm' 271s AES_CCM_16-NONE 271s algparse -v2 'esp=aes_ccm_a-128-null' 271s AES_CCM_8_128-NONE 271s algparse -v2 'esp=aes_ccm_a-192-null' 271s AES_CCM_8_192-NONE 271s algparse -v2 'esp=aes_ccm_a-256-null' 271s AES_CCM_8_256-NONE 271s algparse -v2 'esp=aes_ccm_b-128-null' 271s AES_CCM_12_128-NONE 271s algparse -v2 'esp=aes_ccm_b-192-null' 271s AES_CCM_12_192-NONE 271s algparse -v2 'esp=aes_ccm_b-256-null' 271s AES_CCM_12_256-NONE 271s algparse -v2 'esp=aes_ccm_c-128-null' 271s AES_CCM_16_128-NONE 271s algparse -v2 'esp=aes_ccm_c-192-null' 271s AES_CCM_16_192-NONE 271s algparse -v2 'esp=aes_ccm_c-256-null' 271s AES_CCM_16_256-NONE 271s algparse -v2 'esp=aes_gcm' 271s AES_GCM_16-NONE 271s algparse -v2 'esp=aes_gcm_a-128-null' 271s AES_GCM_8_128-NONE 271s algparse -v2 'esp=aes_gcm_a-192-null' 271s AES_GCM_8_192-NONE 271s algparse -v2 'esp=aes_gcm_a-256-null' 271s AES_GCM_8_256-NONE 271s algparse -v2 'esp=aes_gcm_b-128-null' 271s AES_GCM_12_128-NONE 271s algparse -v2 'esp=aes_gcm_b-192-null' 271s AES_GCM_12_192-NONE 271s algparse -v2 'esp=aes_gcm_b-256-null' 271s AES_GCM_12_256-NONE 271s algparse -v2 'esp=aes_gcm_c-128-null' 271s AES_GCM_16_128-NONE 271s algparse -v2 'esp=aes_gcm_c-192-null' 271s AES_GCM_16_192-NONE 271s algparse -v2 'esp=aes_gcm_c-256-null' 271s AES_GCM_16_256-NONE 271s algparse -v2 'esp=aes_ccm_a-null' 271s AES_CCM_8-NONE 271s algparse -v2 'esp=aes_ccm_b-null' 271s AES_CCM_12-NONE 271s algparse -v2 'esp=aes_ccm_c-null' 271s AES_CCM_16-NONE 271s algparse -v2 'esp=aes_gcm_a-null' 271s AES_GCM_8-NONE 271s algparse -v2 'esp=aes_gcm_b-null' 271s AES_GCM_12-NONE 271s algparse -v2 'esp=aes_gcm_c-null' 271s AES_GCM_16-NONE 271s algparse -v2 'esp=aes_ccm-null' 271s AES_CCM_16-NONE 271s algparse -v2 'esp=aes_gcm-null' 271s AES_GCM_16-NONE 271s algparse -v2 'esp=aes_ccm-256-null' 271s AES_CCM_16_256-NONE 271s algparse -v2 'esp=aes_gcm-192-null' 271s AES_GCM_16_192-NONE 271s algparse -v2 'esp=aes_ccm_256-null' 271s -' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_CCM_12[_192] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_ccm_b-256-null' for ESP 271s | proposal: 'aes_ccm_b-256-null' 271s | token: '' '' "aes_ccm_b" '-' 271s | token: '' "aes_ccm_b" '-' "256" '-' 271s | token: '-' "256" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_CCM_12[_256] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_ccm_c-128-null' for ESP 271s | proposal: 'aes_ccm_c-128-null' 271s | token: '' '' "aes_ccm_c" '-' 271s | token: '' "aes_ccm_c" '-' "128" '-' 271s | token: '-' "128" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_CCM_16[_128] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_ccm_c-192-null' for ESP 271s | proposal: 'aes_ccm_c-192-null' 271s | token: '' '' "aes_ccm_c" '-' 271s | token: '' "aes_ccm_c" '-' "192" '-' 271s | token: '-' "192" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_CCM_16[_192] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_ccm_c-256-null' for ESP 271s | proposal: 'aes_ccm_c-256-null' 271s | token: '' '' "aes_ccm_c" '-' 271s | token: '' "aes_ccm_c" '-' "256" '-' 271s | token: '-' "256" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_CCM_16[_256] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_gcm' for ESP 271s | proposal: 'aes_gcm' 271s | token: '' '' "aes_gcm" '' 271s | token: '' "aes_gcm" '' '' 271s | token: '' '' '' 271s | appending ESP encryption algorithm AES_GCM_16[_0] 271s | appending ESP integrity algorithm NONE[_0] 271s | parsing 'aes_gcm_a-128-null' for ESP 271s | proposal: 'aes_gcm_a-128-null' 271s | token: '' '' "aes_gcm_a" '-' 271s | token: '' "aes_gcm_a" '-' "128" '-' 271s | token: '-' "128" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_GCM_8[_128] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_gcm_a-192-null' for ESP 271s | proposal: 'aes_gcm_a-192-null' 271s | token: '' '' "aes_gcm_a" '-' 271s | token: '' "aes_gcm_a" '-' "192" '-' 271s | token: '-' "192" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_GCM_8[_192] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_gcm_a-256-null' for ESP 271s | proposal: 'aes_gcm_a-256-null' 271s | token: '' '' "aes_gcm_a" '-' 271s | token: '' "aes_gcm_a" '-' "256" '-' 271s | token: '-' "256" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_GCM_8[_256] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_gcm_b-128-null' for ESP 271s | proposal: 'aes_gcm_b-128-null' 271s | token: '' '' "aes_gcm_b" '-' 271s | token: '' "aes_gcm_b" '-' "128" '-' 271s | token: '-' "128" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_GCM_12[_128] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_gcm_b-192-null' for ESP 271s | proposal: 'aes_gcm_b-192-null' 271s | token: '' '' "aes_gcm_b" '-' 271s | token: '' "aes_gcm_b" '-' "192" '-' 271s | token: '-' "192" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_GCM_12[_192] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_gcm_b-256-null' for ESP 271s | proposal: 'aes_gcm_b-256-null' 271s | token: '' '' "aes_gcm_b" '-' 271s | token: '' "aes_gcm_b" '-' "256" '-' 271s | token: '-' "256" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_GCM_12[_256] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_gcm_c-128-null' for ESP 271s | proposal: 'aes_gcm_c-128-null' 271s | token: '' '' "aes_gcm_c" '-' 271s | token: '' "aes_gcm_c" '-' "128" '-' 271s | token: '-' "128" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_GCM_16[_128] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_gcm_c-192-null' for ESP 271s | proposal: 'aes_gcm_c-192-null' 271s | token: '' '' "aes_gcm_c" '-' 271s | token: '' "aes_gcm_c" '-' "192" '-' 271s | token: '-' "192" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_GCM_16[_192] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_gcm_c-256-null' for ESP 271s | proposal: 'aes_gcm_c-256-null' 271s | token: '' '' "aes_gcm_c" '-' 271s | token: '' "aes_gcm_c" '-' "256" '-' 271s | token: '-' "256" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_GCM_16[_256] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_ccm_a-null' for ESP 271s | proposal: 'aes_ccm_a-null' 271s | token: '' '' "aes_ccm_a" '-' 271s | token: '' "aes_ccm_a" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_CCM_8[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_ccm_b-null' for ESP 271s | proposal: 'aes_ccm_b-null' 271s | token: '' '' "aes_ccm_b" '-' 271s | token: '' "aes_ccm_b" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_CCM_12[_0] 271s | parsing integ: 271s AES_CCM_16_256-NONE 271s algparse -v2 'esp=aes_gcm_192-null' 271s AES_GCM_16_192-NONE 271s algparse -v2 'esp=aes_ccm_8-null' 271s AES_CCM_8-NONE 271s algparse -v2 'esp=aes_ccm_12-null' 271s AES_CCM_12-NONE 271s algparse -v2 'esp=aes_ccm_16-null' 271s AES_CCM_16-NONE 271s algparse -v2 'esp=aes_gcm_8-null' 271s AES_GCM_8-NONE 271s algparse -v2 'esp=aes_gcm_12-null' 271s AES_GCM_12-NONE 271s algparse -v2 'esp=aes_gcm_16-null' 271s AES_GCM_16-NONE 271s algparse -v2 'esp=aes_ccm_8-128-null' 271s AES_CCM_8_128-NONE 271s algparse -v2 'esp=aes_ccm_12-192-null' 271s AES_CCM_12_192-NONE 271s algparse -v2 'esp=aes_ccm_16-256-null' 271s AES_CCM_16_256-NONE 271s algparse -v2 'esp=aes_gcm_8-128-null' 271s AES_GCM_8_128-NONE 271s algparse -v2 'esp=aes_gcm_12-192-null' 271s AES_GCM_12_192-NONE 271s algparse -v2 'esp=aes_gcm_16-256-null' 271s AES_GCM_16_256-NONE 271s algparse -v2 'esp=aes_ccm_8_128-null' 271s AES_CCM_8_128-NONE 271s algparse -v2 'esp=aes_ccm_12_192-null' 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_ccm_c-null' for ESP 271s | proposal: 'aes_ccm_c-null' 271s | token: '' '' "aes_ccm_c" '-' 271s | token: '' "aes_ccm_c" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_CCM_16[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_gcm_a-null' for ESP 271s | proposal: 'aes_gcm_a-null' 271s | token: '' '' "aes_gcm_a" '-' 271s | token: '' "aes_gcm_a" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_GCM_8[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_gcm_b-null' for ESP 271s | proposal: 'aes_gcm_b-null' 271s | token: '' '' "aes_gcm_b" '-' 271s | token: '' "aes_gcm_b" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_GCM_12[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_gcm_c-null' for ESP 271s | proposal: 'aes_gcm_c-null' 271s | token: '' '' "aes_gcm_c" '-' 271s | token: '' "aes_gcm_c" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_GCM_16[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_ccm-null' for ESP 271s | proposal: 'aes_ccm-null' 271s | token: '' '' "aes_ccm" '-' 271s | token: '' "aes_ccm" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_CCM_16[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_gcm-null' for ESP 271s | proposal: 'aes_gcm-null' 271s | token: '' '' "aes_gcm" '-' 271s | token: '' "aes_gcm" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_GCM_16[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_ccm-256-null' for ESP 271s | proposal: 'aes_ccm-256-null' 271s | token: '' '' "aes_ccm" '-' 271s | token: '' "aes_ccm" '-' "256" '-' 271s | token: '-' "256" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_CCM_16[_256] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_gcm-192-null' for ESP 271s | proposal: 'aes_gcm-192-null' 271s | token: '' '' "aes_gcm" '-' 271s | token: '' "aes_gcm" '-' "192" '-' 271s | token: '-' "192" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_GCM_16[_192] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_ccm_256-null' for ESP 271s | proposal: 'aes_ccm_256-null' 271s | token: '' '' "aes_ccm_256" '-' 271s | token: '' "aes_ccm_256" '-' "null" '' 271s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_256' is not recognized 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_CCM_16[_256] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_gcm_192-null' for ESP 271s | proposal: 'aes_gcm_192-null' 271s | token: '' '' "aes_gcm_192" '-' 271s | token: '' "aes_gcm_192" '-' "null" '' 271s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_192' is not recognized 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_GCM_16[_192] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_ccm_8-null' for ESP 271s | proposal: 'aes_ccm_8-null' 271s | token: '' '' "aes_ccm_8" '-' 271s | token: '' "aes_ccm_8" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_CCM_8[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_ccm_12-null' for ESP 271s | proposal: 'aes_ccm_12-null' 271s | token: '' '' "aes_ccm_12" '-' 271s | token: '' "aes_ccm_12" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_CCM_12[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_ccm_16-null' for ESP 271s | proposal: 'aes_ccm_16-null' 271s | token: '' '' "aes_ccm_16" '-' 271s | token: '' "aes_ccm_16" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_CCM_16[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_gcm_8-null' for ESP 271s | proposal: 'aes_gcm_8-null' 271s | token: '' '' "aes_gcm_8" '-' 271s | token: '' "aes_gcm_8" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_GCM_8[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_gcm_12-null' for ESP 271s | proposal: 'aes_gcm_12-null' 271s | token: '' '' "aes_gcm_12" '-' 271s | token: '' "aes_gcm_12" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_GCM_12[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_gcm_16-null' for ESP 271s | proposal: 'aes_gcm_16-null' 271s | token: '' '' "aes_gcm_16" '-' 271s | token: '' "aes_gcm_16" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_GCM_16[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_ccm_8-128-null' for ESP 271s | proposal: 'aes_ccm_8-128-null' 271s | token: '' '' "aes_ccm_8" '-' 271s | token: '' "aes_ccm_8" '-' "128" '-' 271s | token: '-' "128" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_CCM_8[_128] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s AES_CCM_12_192-NONE 271s algparse -v2 'esp=aes_ccm_16_256-null' 271s AES_CCM_16_256-NONE 271s algparse -v2 'esp=aes_gcm_8_128-null' 271s AES_GCM_8_128-NONE 271s algparse -v2 'esp=aes_gcm_12_192-null' 271s AES_GCM_12_192-NONE 271s algparse -v2 'esp=aes_gcm_16_256-null' 271s AES_GCM_16_256-NONE 271s algparse -v2 'esp=aes_ctr' 271s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 271s algparse -v2 'esp=aesctr' 271s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 271s algparse -v2 'esp=aes_ctr128' 271s AES_CTR_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 271s algparse -v2 'esp=aes_ctr192' 271s AES_CTR_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 271s algparse -v2 'esp=aes_ctr256' 271s AES_CTR_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 271s algparse -v2 'esp=camellia_cbc_256-hmac_sha2_512_256;modp8192' 271s CAMELLIA_CBC_256-HMAC_SHA2_512_256 271s algparse -v2 'esp=null_auth_aes_gmac_256-null;modp8192' 271s NULL_AUTH_AES_GMAC_256-NONE 271s algparse -v2 'esp=3des-sha1;modp8192' 271s 3DES_CBC-HMAC_SHA1_96 271s algparse -v2 'esp=3des-sha1-modp8192' 271s 3DES_CBC-HMAC_SHA1_96 271s algparse -v2 'esp=aes-sha1,3des-sha1;modp8192' 271s AES_CBC-HMAC_SHA1_96 271s 3DES_CBC-HMAC_SHA1_96 271s algparse -v2 'esp=aes-sha1-modp8192,3des-sha1-modp8192' 271s AES_CBC-HMAC_SHA1_96 271s 3DES_CBC-HMAC_SHA1_96 271s algparse -v2 'esp=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' 271s AES_CBC-HMAC_SHA1_96 271s algparse -v2 'esp=aes;none' 271s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 271s algparse -v2 'esp=aes;none,aes' 271s | parsing 'aes_ccm_12-192-null' for ESP 271s | proposal: 'aes_ccm_12-192-null' 271s | token: '' '' "aes_ccm_12" '-' 271s | token: '' "aes_ccm_12" '-' "192" '-' 271s | token: '-' "192" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_CCM_12[_192] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_ccm_16-256-null' for ESP 271s | proposal: 'aes_ccm_16-256-null' 271s | token: '' '' "aes_ccm_16" '-' 271s | token: '' "aes_ccm_16" '-' "256" '-' 271s | token: '-' "256" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_CCM_16[_256] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_gcm_8-128-null' for ESP 271s | proposal: 'aes_gcm_8-128-null' 271s | token: '' '' "aes_gcm_8" '-' 271s | token: '' "aes_gcm_8" '-' "128" '-' 271s | token: '-' "128" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_GCM_8[_128] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_gcm_12-192-null' for ESP 271s | proposal: 'aes_gcm_12-192-null' 271s | token: '' '' "aes_gcm_12" '-' 271s | token: '' "aes_gcm_12" '-' "192" '-' 271s | token: '-' "192" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_GCM_12[_192] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_gcm_16-256-null' for ESP 271s | proposal: 'aes_gcm_16-256-null' 271s | token: '' '' "aes_gcm_16" '-' 271s | token: '' "aes_gcm_16" '-' "256" '-' 271s | token: '-' "256" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_GCM_16[_256] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_ccm_8_128-null' for ESP 271s | proposal: 'aes_ccm_8_128-null' 271s | token: '' '' "aes_ccm_8_128" '-' 271s | token: '' "aes_ccm_8_128" '-' "null" '' 271s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_8_128' is not recognized 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_CCM_8[_128] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_ccm_12_192-null' for ESP 271s | proposal: 'aes_ccm_12_192-null' 271s | token: '' '' "aes_ccm_12_192" '-' 271s | token: '' "aes_ccm_12_192" '-' "null" '' 271s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_12_192' is not recognized 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_CCM_12[_192] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_ccm_16_256-null' for ESP 271s | proposal: 'aes_ccm_16_256-null' 271s | token: '' '' "aes_ccm_16_256" '-' 271s | token: '' "aes_ccm_16_256" '-' "null" '' 271s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_16_256' is not recognized 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_CCM_16[_256] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_gcm_8_128-null' for ESP 271s | proposal: 'aes_gcm_8_128-null' 271s | token: '' '' "aes_gcm_8_128" '-' 271s | token: '' "aes_gcm_8_128" '-' "null" '' 271s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_8_128' is not recognized 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_GCM_8[_128] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_gcm_12_192-null' for ESP 271s | proposal: 'aes_gcm_12_192-null' 271s | token: '' '' "aes_gcm_12_192" '-' 271s | token: '' "aes_gcm_12_192" '-' "null" '' 271s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_12_192' is not recognized 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_GCM_12[_192] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_gcm_16_256-null' for ESP 271s | proposal: 'aes_gcm_16_256-null' 271s | token: '' '' "aes_gcm_16_256" '-' 271s | token: '' "aes_gcm_16_256" '-' "null" '' 271s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_16_256' is not recognized 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_GCM_16[_256] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_ctr' for ESP 271s | proposal: 'aes_ctr' 271s | token: '' '' "aes_ctr" '' 271s | token: '' "aes_ctr" '' '' 271s | token: '' '' '' 271s | appending ESP encryption algorithm AES_CTR[_0] 271s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 271s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 271s | parsing 'aesctr' for ESP 271s | proposal: 'aesctr' 271s | token: '' '' "aesctr" '' 271s | token: '' "aesctr" '' '' 271s | token: '' '' '' 271s | appending ESP encryption algorithm AES_CTR[_0] 271s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 271s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 271s | parsing 'aes_ctr128' for ESP 271s | proposal: 'aes_ctr128' 271s | token: '' '' "aes_ctr128" '' 271s | token: '' "aes_ctr128" '' '' 271s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr128' is not recognized 271s | token: '' '' '' 271s | appending ESP encryption algorithm AES_CTR[_128] 271s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 271s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 271s | parsing 'aes_ctr192' for ESP 271s | proposal: 'aes_ctr192' 271s | token: '' '' "aes_ctr192" '' 271s | token: '' "aes_ctr192" '' '' 271s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr192' is not recognized 271s | token: '' '' '' 271s | appending ESP encryption algorithm AES_CTR[_192] 271s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 271s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 271s | parsing 'aes_ctr256' for ESP 271s | proposal: 'aes_ctr256' 271s | token: '' '' "aes_ctr256" '' 271s | token: '' "aes_ctr256" '' '' 271s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr256' is not recognized 271s | token: '' '' '' 271s | appending ESP encryption algorithm AES_CTR[_256] 271s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 271s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 271s | parsing 'camellia_cbc_256-hmac_sha2_512_256;modp8192' for ESP 271s | proposal: 'camellia_cbc_256-hmac_sha2_512_256;modp8192' 271s | token: '' '' "camellia_cbc_256" '-' 271s | token: '' "camellia_cbc_256" '-' "hmac_sha2_512_256" ';' 271s | ike_alg_byname() failed: ESP encryption algorithm 'camellia_cbc_256' is not recognized 271s | token: '-' "hmac_sha2_512_256" ';' "modp8192" '' 271s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 271s | token: ';' "modp8192" '' '' 271s | parsing dh: 271s | appending ESP DH algorithm MODP8192[_0] 271s | token: '' '' '' 271s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 271s | parsing 'null_auth_aes_gmac_256-null;modp8192' for ESP 271s | proposal: 'null_auth_aes_gmac_256-null;modp8192' 271s | token: '' '' "null_auth_aes_gmac_256" '-' 271s | token: '' "null_auth_aes_gmac_256" '-' "null" ';' 271s | ike_alg_byname() failed: ESP encryption algorithm 'null_auth_aes_gmac_256' is not recognized 271s | token: '-' "null" ';' "modp8192" '' 271s | appending ESP encryption algorithm NULL_AUTH_AES_GMAC[_256] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: ';' "modp8192" '' '' 271s | parsing dh: 271s | appending ESP DH algorithm MODP8192[_0] 271s | token: '' '' '' 271s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 271s | parsing '3des-sha1;modp8192' for ESP 271s | proposal: '3des-sha1;modp8192' 271s | token: '' '' "3des" '-' 271s | token: '' "3des" '-' "sha1" ';' 271s | token: '-' "sha1" ';' "modp8192" '' 271s | appending ESP encryption algorithm 3DES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: ';' "modp8192" '' '' 271s | parsing dh: 271s | appending ESP DH algorithm MODP8192[_0] 271s | token: '' '' '' 271s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 271s | parsing '3des-sha1-modp8192' for ESP 271s | proposal: '3des-sha1-modp8192' 271s | token: '' '' "3des" '-' 271s | token: '' "3des" '-' "sha1" '-' 271s | token: '-' "sha1" '-' "modp8192" '' 271s | appending ESP encryption algorithm 3DES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: '-' "modp8192" '' '' 271s | parsing dh: 271s | appending ESP DH algorithm MODP8192[_0] 271s | token: '' '' '' 271s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 271s | parsing 'aes-sha1,3des-sha1;modp8192' for ESP 271s | proposal: 'aes-sha1' 271s | token: '' '' "aes" '-' 271s | token: '' "aes" '-' "sha1" '' 271s | token: '-' "sha1" '' '' 271s | appending ESP encryption algorithm AES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: '' '' '' 271s | proposal: '3des-sha1;modp8192' 271s | token: '' '' "3des" '-' 271s | token: '' "3des" '-' "sha1" ';' 271s | token: '-' "sha1" ';' "modp8192" '' 271s | appending ESP encryption algorithm 3DES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: ';' "modp8192" '' '' 271s | parsing dh: 271s | appending ESP DH algorithm MODP8192[_0] 271s | token: '' '' '' 271s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 271s | parsing 'aes-sha1-modp8192,3des-sha1-modp8192' for ESP 271s | proposal: 'aes-sha1-modp8192' 271s | token: '' '' "aes" '-' 271s | token: '' "aes" '-' "sha1" '-' 271s | token: '-' "sha1" '-' "modp8192" '' 271s | appending ESP encryption algorithm AES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: '-' "modp8192" '' '' 271s | parsing dh: 271s | appending ESP DH algorithm MODP8192[_0] 271s | token: '' '' '' 271s | proposal: '3des-sha1-modp8192' 271s | token: '' '' "3des" '-' 271s | token: '' "3des" '-' "sha1" '-' 271s | token: '-' "sha1" '-' "modp8192" '' 271s | appending ESP encryption algorithm 3DES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: '-' "modp8192" '' '' 271s | parsing dh: 271s | appending ESP DH algorithm MODP8192[_0] 271s | token: '' '' '' 271s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 271s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 271s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for ESP 271s | proposal: 'aes-sha1-modp8192' 271s | token: '' '' "aes" '-' 271s | token: '' "aes" '-' "sha1" '-' 271s | token: '-' "sha1" '-' "modp8192" '' 271s | appending ESP encryption algorithm AES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: '-' "modp8192" '' '' 271s | parsing dh: 271s | appending ESP DH algorithm MODP8192[_0] 271s | token: '' '' '' 271s | proposal: 'aes-sha1-modp8192' 271s | token: '' '' "aes" '-' 271s | token: '' "aes" '-' "sha1" '-' 271s | token: '-' "sha1" '-' "modp8192" '' 271s | appending ESP encryption algorithm AES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: '-' "modp8192" '' '' 271s | parsing dh: 271s | appending ESP DH algorithm MODP8192[_0] 271s | token: '' '' '' 271s | proposal: 'aes-sha1-modp8192' 271s | token: '' '' "aes" '-' 271s | token: '' "aes" '-' "sha1" '-' 271s | token: '-' "sha1" '-' "modp8192" '' 271s | appending ESP encryption algorithm AES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: '-' "modp8192" '' '' 271s | parsing dh: 271s | appending ESP DH algorithm MODP8192[_0] 271s | token: '' '' '' 271s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 271s | parsing 'aes;none' for ESP 271s | proposal: 'aes;none' 271s | token: '' '' "aes" ';' 271s | token: '' "aes" ';' "none" '' 271s | token: ';' "none" '' '' 271s | appending ESP encryption algorithm AES_CBC[_0] 271s | parsing dh: 271s | appending ESP DH algorithm NONE[_0] 271s | token: '' '' '' 271s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 271s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 271s algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 271s | parsing 'aes;none,aes' for ESP 271s | proposal: 'aes;none' 271s | token: '' '' "aes" ';' 271s | token: '' "aes" ';' "none" '' 271s | token: ';' "none" '' '' 271s | appending ESP encryption algorithm AES_CBC[_0] 271s | parsing dh: 271s | appending ESP DH algorithm NONE[_0] 271s | token: '' '' '' 271s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 271s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 271s | proposal: 'aes' 271s | token: '' '' "aes" '' 271s | token: '' "aes" '' '' 271s | token: '' '' '' 271s | appending ESP encryption algorithm AES_CBC[_0] 271s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 271s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 271s algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 271s | parsing 'aes;none,aes;modp2048' for ESP 271s | proposal: 'aes;none' 271s | token: '' '' "aes" ';' 271s | token: '' "aes" ';' "none" '' 271s | token: ';' "none" '' '' 271s | appending ESP encryption algorithm AES_CBC[_0] 271s | parsing dh: 271s | appending ESP DH algorithm NONE[_0] 271s | token: '' '' '' 271s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 271s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 271s | proposal: 'aes;modp2048' 271s | token: '' '' "aes" ';' 271s | token: '' "aes" ';' "modp2048" '' 271s | token: ';' "modp2048" '' '' 271s | appending ESP encryption algorithm AES_CBC[_0] 271s | parsing dh: 271s | appending ESP DH algorithm MODP2048[_0] 271s | token: '' '' '' 271s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 271s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 271s algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 271s algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 271s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 271s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 271s algparse -v2 'esp=aes;none,aes;modp2048' 271s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 271s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 271s algparse -v2 'esp=aes-sha1-none' 271s AES_CBC-HMAC_SHA1_96 271s algparse -v2 'esp=aes-sha1;none' 271s AES_CBC-HMAC_SHA1_96 271s algparse -v2 'esp=3des168-sha1' 271s ERROR: ESP encryption algorithm 3DES_CBC does not allow a key lengths 271s algparse -v2 'esp=3des-null' 271s ERROR: non-AEAD ESP encryption algorithm 3DES_CBC cannot have 'NONE' as the integrity algorithm 271s algparse -v2 'esp=aes128-null' 271s ERROR: non-AEAD ESP encryption algorithm AES_CBC cannot have 'NONE' as the integrity algorithm 271s algparse -v2 'esp=aes224-sha1' 271s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 271s algparse -v2 'esp=aes-224-sha1' 271s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 271s algparse -v2 'esp=aes0-sha1' 271s ERROR: ESP encryption key length is zero 271s algparse -v2 'esp=aes-0-sha1' 271s ERROR: ESP encryption key length is zero 271s algparse -v2 'esp=aes512-sha1' 271s ERROR: ESP encryption algorithm AES_CBC with key length 512 invalid; valid key lengths: 128, 192, 256 271s algparse -v2 'esp=aes-sha1555' 271s | parsing 'aes-sha1-none' for ESP 271s | proposal: 'aes-sha1-none' 271s | token: '' '' "aes" '-' 271s | token: '' "aes" '-' "sha1" '-' 271s | token: '-' "sha1" '-' "none" '' 271s | appending ESP encryption algorithm AES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: '-' "none" '' '' 271s | parsing dh: 271s | appending ESP DH algorithm NONE[_0] 271s | token: '' '' '' 271s algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 271s | parsing 'aes-sha1;none' for ESP 271s | proposal: 'aes-sha1;none' 271s | token: '' '' "aes" '-' 271s | token: '' "aes" '-' "sha1" ';' 271s | token: '-' "sha1" ';' "none" '' 271s | appending ESP encryption algorithm AES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: ';' "none" '' '' 271s | parsing dh: 271s | appending ESP DH algorithm NONE[_0] 271s | token: '' '' '' 271s algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 271s | parsing '3des168-sha1' for ESP 271s | proposal: '3des168-sha1' 271s | token: '' '' "3des168" '-' 271s | token: '' "3des168" '-' "sha1" '' 271s | ike_alg_byname() failed: ESP encryption algorithm '3des168' is not recognized 271s | parsing '3des-null' for ESP 271s | proposal: '3des-null' 271s | token: '' '' "3des" '-' 271s | token: '' "3des" '-' "null" '' 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm 3DES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes128-null' for ESP 271s | proposal: 'aes128-null' 271s | token: '' '' "aes128" '-' 271s | token: '' "aes128" '-' "null" '' 271s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 271s | token: '-' "null" '' '' 271s | appending ESP encryption algorithm AES_CBC[_128] 271s | parsing integ: 271s | appending ESP integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes224-sha1' for ESP 271s | proposal: 'aes224-sha1' 271s | token: '' '' "aes224" '-' 271s | token: '' "aes224" '-' "sha1" '' 271s | ike_alg_byname() failed: ESP encryption algorithm 'aes224' is not recognized 271s | parsing 'aes-224-sha1' for ESP 271s | proposal: 'aes-224-sha1' 271s | token: '' '' "aes" '-' 271s | token: '' "aes" '-' "224" '-' 271s | byname('aes') with ='224' failed: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 271s | parsing 'aes0-sha1' for ESP 271s | proposal: 'aes0-sha1' 271s | token: '' '' "aes0" '-' 271s | token: '' "aes0" '-' "sha1" '' 271s | ike_alg_byname() failed: ESP encryption algorithm 'aes0' is not recognized 271s | parsing 'aes-0-sha1' for ESP 271s | proposal: 'aes-0-sha1' 271s | token: '' '' "aes" '-' 271s | token: '' "aes" '-' "0" '-' 271s | parsing 'aes512-sha1' for ESP 271s | proposal: 'aes512-sha1' 271s | token: '' '' "aes512" '-' 271s | token: '' "aes512" '-' "sha1" '' 271s | ike_alg_byname() failed: ESP encryption algorithm 'aes512' is not recognized 271s | parsing 'aes-sha1555' for ESP 271s | proposal: 'aes-sha1555' 271s | token: '' '' "aes" '-' 271s | token: '' "aes" '-' "sha1555" '' 271s | token: '-' "sha1555" '' '' 271s | appending ESP encryption algorithm AES_CBC[_0] 271s | parsing integ: 271s | ike_alg_byname() failed: ESP integrity algorithm 'sha1555' is not recognized 271s | lookup for integrity algorithm 'sha1555' failed 271s | or - failed 'ESP integrity algorithm 'sha1555' is not recognized') 271s | parsing 'camellia666-sha1' for ESP 271s | proposal: 'camellia666-sha1' 271s | token: '' '' "camellia666" '-' 271s | token: '' "camellia666" '-' "sha1" '' 271s | ike_alg_byname() failed: ESP encryption algorithm 'camellia666' is not recognized 271s | parsing 'blowfish' for ESP 271s | proposal: 'blowfish' 271s | token: '' '' "blowfish" '' 271s | token: '' "blowfish" '' '' 271s | ike_alg_byname() failed: ESP encryption algorithm 'blowfish' is not supported 271s | parsing 'des-sha1' for ESP 271s | proposal: 'des-sha1' 271s | token: '' '' "des" '-' 271s | token: '' "des" '-' "sha1" '' 271s | ike_alg_byname() failed: ESP encryption algorithm 'des' is not supported 271s | parsing 'aes_ctr666' for ESP 271s | proposal: 'aes_ctr666' 271s | token: '' '' "aes_ctr666" '' 271s | token: '' "aes_ctr666" '' '' 271s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr666' is not recognized 271s | parsing 'aes128-sha2_128' for ESP 271s | proposal: 'aes128-sha2_128' 271s | token: '' '' "aes128" '-' 271s | token: '' "aes128" '-' "sha2_128" '' 271s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 271s | token: '-' "sha2_128" '' '' 271s | appending ESP encryption algorithm AES_CBC[_128] 271s | parsing integ: 271s | ike_alg_byname() failed: ESP integrity algorithm 'sha2_128' is not recognized 271s | lookup for integrity algorithm 'sha2_128' failed 271s | or - failed 'ESP integrity algorithm 'sha2_128' is not recognized') 271s | parsing 'aes256-sha2_256-4096' for ESP 271s | proposal: 'aes256-sha2_256-4096' 271s | token: '' '' "aes256" '-' 271s | token: '' "aes256" '-' "sha2_256" '-' 271s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 271s | token: '-' "sha2_256" '-' "4096" '' 271s | appending ESP encryption algorithm AES_CBC[_256] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 271s | token: '-' "4096" '' '' 271s | parsing dh: 271s ERROR: ESP integrity algorithm 'sha1555' is not recognized 271s algparse -v2 'esp=camellia666-sha1' 271s ERROR: ESP encryption algorithm CAMELLIA_CBC with key length 666 invalid; valid key lengths: 128, 192, 256 271s algparse -v2 'esp=blowfish' 271s ERROR: ESP encryption algorithm 'blowfish' is not supported 271s algparse -v2 'esp=des-sha1' 271s ERROR: ESP encryption algorithm 'des' is not supported 271s algparse -v2 'esp=aes_ctr666' 271s ERROR: ESP encryption algorithm AES_CTR with key length 666 invalid; valid key lengths: 128, 192, 256 271s algparse -v2 'esp=aes128-sha2_128' 271s ERROR: ESP integrity algorithm 'sha2_128' is not recognized 271s algparse -v2 'esp=aes256-sha2_256-4096' 271s ERROR: ESP DH algorithm '4096' is not recognized 271s algparse -v2 'esp=aes256-sha2_256-128' 271s | ike_alg_byname() failed: ESP DH algorithm '4096' is not recognized 271s | lookup for DH algorithm '4096' failed 271s | ... failed 'ESP DH algorithm '4096' is not recognized' 271s | parsing 'aes256-sha2_256-128' for ESP 271s | proposal: 'aes256-sha2_256-128' 271s | token: '' '' "aes256" '-' 271s | token: '' "aes256" '-' "sha2_256" '-' 271s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 271s | token: '-' "sha2_256" '-' "128" '' 271s | appending ESP encryption algorithm AES_CBC[_256] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 271s | token: '-' "128" '' '' 271s | parsing dh: 271s | ike_alg_byname() failed: ESP DH algorithm '128' is not recognized 271s | lookup for DH algorithm '128' failed 271s | ... failed 'ESP DH algorithm '128' is not recognized' 271s | parsing 'vanitycipher' for ESP 271s | proposal: 'vanitycipher' 271s | token: '' '' "vanitycipher" '' 271s | token: '' "vanitycipher" '' '' 271s | ike_alg_byname() failed: ESP encryption algorithm 'vanitycipher' is not recognized 271s | parsing 'ase-sah' for ESP 271s | proposal: 'ase-sah' 271s | token: '' '' "ase" '-' 271s | token: '' "ase" '-' "sah" '' 271s | ike_alg_byname() failed: ESP encryption algorithm 'ase' is not recognized 271s | parsing 'aes-sah1' for ESP 271s | proposal: 'aes-sah1' 271s | token: '' '' "aes" '-' 271s | token: '' "aes" '-' "sah1" '' 271s | token: '-' "sah1" '' '' 271s | appending ESP encryption algorithm AES_CBC[_0] 271s | parsing integ: 271s | ike_alg_byname() failed: ESP integrity algorithm 'sah1' is not recognized 271s | lookup for integrity algorithm 'sah1' failed 271s | or - failed 'ESP integrity algorithm 'sah1' is not recognized') 271s | parsing 'id3' for ESP 271s | proposal: 'id3' 271s | token: '' '' "id3" '' 271s | token: '' "id3" '' '' 271s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 271s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 271s | parsing 'aes-id3' for ESP 271s | proposal: 'aes-id3' 271s | token: '' '' "aes" '-' 271s | token: '' "aes" '-' "id3" '' 271s | token: '-' "id3" '' '' 271s | appending ESP encryption algorithm AES_CBC[_0] 271s | parsing integ: 271s | ike_alg_byname() failed: ESP integrity algorithm 'id3' is not recognized 271s | lookup for integrity algorithm 'id3' failed 271s | or - failed 'ESP integrity algorithm 'id3' is not recognized') 271s | parsing 'aes_gcm-md5' for ESP 271s | proposal: 'aes_gcm-md5' 271s | token: '' '' "aes_gcm" '-' 271s | token: '' "aes_gcm" '-' "md5" '' 271s | token: '-' "md5" '' '' 271s | appending ESP encryption algorithm AES_GCM_16[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_MD5_96[_0] 271s ERROR: ESP DH algorithm '128' is not recognized 271s algparse -v2 'esp=vanitycipher' 271s ERROR: ESP encryption algorithm 'vanitycipher' is not recognized 271s algparse -v2 'esp=ase-sah' 271s ERROR: ESP encryption algorithm 'ase' is not recognized 271s algparse -v2 'esp=aes-sah1' 271s ERROR: ESP integrity algorithm 'sah1' is not recognized 271s algparse -v2 'esp=id3' 271s ERROR: ESP encryption algorithm 'id3' is not recognized 271s algparse -v2 'esp=aes-id3' 271s ERROR: ESP integrity algorithm 'id3' is not recognized 271s algparse -v2 'esp=aes_gcm-md5' 271s ERROR: AEAD ESP encryption algorithm AES_GCM_16 must have 'NONE' as the integrity algorithm 271s algparse -v2 'esp=mars' 271s ERROR: ESP encryption algorithm 'mars' is not supported 271s algparse -v2 'esp=aes_gcm-16' 271s ERROR: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 271s algparse -v2 'esp=aes_gcm-0' 271s ERROR: ESP encryption key length is zero 271s algparse -v2 'esp=aes_gcm-123456789012345' 271s ERROR: ESP encryption algorithm 'aes_gcm-123456789012345' key length WAY too big 271s algparse -v2 'esp=3des-sha1;dh22' 271s ERROR: ESP DH algorithm 'dh22' is not supported 271s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2' 271s 3DES_CBC-HMAC_SHA1_96 271s 3DES_CBC-HMAC_SHA2_256_128 271s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2' 271s | token: '' '' '' 271s | parsing 'mars' for ESP 271s | proposal: 'mars' 271s | token: '' '' "mars" '' 271s | token: '' "mars" '' '' 271s | ike_alg_byname() failed: ESP encryption algorithm 'mars' is not supported 271s | parsing 'aes_gcm-16' for ESP 271s | proposal: 'aes_gcm-16' 271s | token: '' '' "aes_gcm" '-' 271s | token: '' "aes_gcm" '-' "16" '' 271s | byname('aes_gcm') with ='16' failed: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 271s | parsing 'aes_gcm-0' for ESP 271s | proposal: 'aes_gcm-0' 271s | token: '' '' "aes_gcm" '-' 271s | token: '' "aes_gcm" '-' "0" '' 271s | parsing 'aes_gcm-123456789012345' for ESP 271s | proposal: 'aes_gcm-123456789012345' 271s | token: '' '' "aes_gcm" '-' 271s | token: '' "aes_gcm" '-' "123456789012345" '' 271s | parsing '3des-sha1;dh22' for ESP 271s | proposal: '3des-sha1;dh22' 271s | token: '' '' "3des" '-' 271s | token: '' "3des" '-' "sha1" ';' 271s | token: '-' "sha1" ';' "dh22" '' 271s | appending ESP encryption algorithm 3DES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: ';' "dh22" '' '' 271s | parsing dh: 271s | ike_alg_byname() failed: ESP DH algorithm 'dh22' is not supported 271s | lookup for DH algorithm 'dh22' failed 271s | ... failed 'ESP DH algorithm 'dh22' is not supported' 271s | parsing '3des-sha1;modp8192,3des-sha2' for ESP 271s | proposal: '3des-sha1;modp8192' 271s | token: '' '' "3des" '-' 271s | token: '' "3des" '-' "sha1" ';' 271s | token: '-' "sha1" ';' "modp8192" '' 271s | appending ESP encryption algorithm 3DES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: ';' "modp8192" '' '' 271s | parsing dh: 271s | appending ESP DH algorithm MODP8192[_0] 271s | token: '' '' '' 271s | proposal: '3des-sha2' 271s | token: '' '' "3des" '-' 271s | token: '' "3des" '-' "sha2" '' 271s | token: '-' "sha2" '' '' 271s | appending ESP encryption algorithm 3DES_CBC[_0] 271s | parsing integ: 271s 3DES_CBC-HMAC_SHA1_96 271s 3DES_CBC-HMAC_SHA2_256_128 271s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2-modp8192' 271s 3DES_CBC-HMAC_SHA1_96 271s 3DES_CBC-HMAC_SHA2_256_128 271s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2;modp8192' 271s 3DES_CBC-HMAC_SHA1_96 271s 3DES_CBC-HMAC_SHA2_256_128 271s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2-modp8192' 271s 3DES_CBC-HMAC_SHA1_96 271s 3DES_CBC-HMAC_SHA2_256_128 271s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2;modp8192' 271s 3DES_CBC-HMAC_SHA1_96 271s 3DES_CBC-HMAC_SHA2_256_128 271s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2-modp2048' 271s 3DES_CBC-HMAC_SHA1_96 271s 3DES_CBC-HMAC_SHA2_256_128 271s algparse -v2 'ah' 271s HMAC_SHA2_512_256 271s HMAC_SHA2_256_128 271s HMAC_SHA1_96 271s algparse -v2 'ah=' 271s ERROR: AH proposal is empty 271s algparse -v2 'ah=md5' 271s HMAC_MD5_96 271s algparse -v2 'ah=sha' 271s HMAC_SHA1_96 271s algparse -v2 'ah=sha;modp2048' 271s HMAC_SHA1_96 271s algparse -v2 'ah=sha1' 271s HMAC_SHA1_96 271s algparse -v2 'ah=sha2' 271s HMAC_SHA2_256_128 271s algparse -v2 'ah=sha256' 271s HMAC_SHA2_256_128 271s algparse -v2 'ah=sha384' 271s HMAC_SHA2_384_192 271s algparse -v2 'ah=sha512' 271s HMAC_SHA2_512_256 271s algparse -v2 'ah=sha2_256' 271s HMAC_SHA2_256_128 271s algparse -v2 'ah=sha2_384' 271s HMAC_SHA2_384_192 271s algparse -v2 'ah=sha2_512' 271s HMAC_SHA2_512_256 271s algparse -v2 'ah=aes_xcbc' 271s AES_XCBC_96 271s algparse -v2 'ah=sha2-none' 271s HMAC_SHA2_256_128 271s algparse -v2 'ah=sha2;none' 271s HMAC_SHA2_256_128 271s algparse -v2 'ah=sha1-modp8192,sha1-modp8192,sha1-modp8192' 271s HMAC_SHA1_96 271s algparse -v2 'ah=aes-sha1' 271s ERROR: AH integrity algorithm 'aes' is not recognized 271s algparse -v2 'ah=vanityhash1' 271s ERROR: AH integrity algorithm 'vanityhash1' is not recognized 271s algparse -v2 'ah=aes_gcm_c-256' 271s ERROR: AH integrity algorithm 'aes_gcm_c' is not recognized 271s algparse -v2 'ah=id3' 271s ERROR: AH integrity algorithm 'id3' is not recognized 271s algparse -v2 'ah=3des' 271s ERROR: AH integrity algorithm '3des' is not recognized 271s algparse -v2 'ah=null' 271s ERROR: AH cannot have 'none' as the integrity algorithm 271s algparse -v2 'ah=aes_gcm' 271s ERROR: AH integrity algorithm 'aes_gcm' is not recognized 271s algparse -v2 'ah=aes_ccm' 271s ERROR: AH integrity algorithm 'aes_ccm' is not recognized 271s algparse -v2 'ah=ripemd' 271s ERROR: AH integrity algorithm 'ripemd' is not recognized 271s algparse -v2 'ike' 271s AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 271s AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 271s AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 271s AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 271s algparse -v2 'ike=' 271s ERROR: IKE proposal is empty 271s algparse -v2 'ike=3des-sha1' 271s 3DES_CBC-HMAC_SHA1-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 271s algparse -v2 'ike=3des-sha1' 271s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 271s | token: '' '' '' 271s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 271s | parsing '3des-sha1-modp8192,3des-sha2' for ESP 271s | proposal: '3des-sha1-modp8192' 271s | token: '' '' "3des" '-' 271s | token: '' "3des" '-' "sha1" '-' 271s | token: '-' "sha1" '-' "modp8192" '' 271s | appending ESP encryption algorithm 3DES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: '-' "modp8192" '' '' 271s | parsing dh: 271s | appending ESP DH algorithm MODP8192[_0] 271s | token: '' '' '' 271s | proposal: '3des-sha2' 271s | token: '' '' "3des" '-' 271s | token: '' "3des" '-' "sha2" '' 271s | token: '-' "sha2" '' '' 271s | appending ESP encryption algorithm 3DES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 271s | token: '' '' '' 271s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 271s | parsing '3des-sha1-modp8192,3des-sha2-modp8192' for ESP 271s | proposal: '3des-sha1-modp8192' 271s | token: '' '' "3des" '-' 271s | token: '' "3des" '-' "sha1" '-' 271s | token: '-' "sha1" '-' "modp8192" '' 271s | appending ESP encryption algorithm 3DES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: '-' "modp8192" '' '' 271s | parsing dh: 271s | appending ESP DH algorithm MODP8192[_0] 271s | token: '' '' '' 271s | proposal: '3des-sha2-modp8192' 271s | token: '' '' "3des" '-' 271s | token: '' "3des" '-' "sha2" '-' 271s | token: '-' "sha2" '-' "modp8192" '' 271s | appending ESP encryption algorithm 3DES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 271s | token: '-' "modp8192" '' '' 271s | parsing dh: 271s | appending ESP DH algorithm MODP8192[_0] 271s | token: '' '' '' 271s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 271s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 271s | parsing '3des-sha1-modp8192,3des-sha2;modp8192' for ESP 271s | proposal: '3des-sha1-modp8192' 271s | token: '' '' "3des" '-' 271s | token: '' "3des" '-' "sha1" '-' 271s | token: '-' "sha1" '-' "modp8192" '' 271s | appending ESP encryption algorithm 3DES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: '-' "modp8192" '' '' 271s | parsing dh: 271s | appending ESP DH algorithm MODP8192[_0] 271s | token: '' '' '' 271s | proposal: '3des-sha2;modp8192' 271s | token: '' '' "3des" '-' 271s | token: '' "3des" '-' "sha2" ';' 271s | token: '-' "sha2" ';' "modp8192" '' 271s | appending ESP encryption algorithm 3DES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 271s | token: ';' "modp8192" '' '' 271s | parsing dh: 271s | appending ESP DH algorithm MODP8192[_0] 271s | token: '' '' '' 271s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 271s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 271s | parsing '3des-sha1;modp8192,3des-sha2-modp8192' for ESP 271s | proposal: '3des-sha1;modp8192' 271s | token: '' '' "3des" '-' 271s | token: '' "3des" '-' "sha1" ';' 271s | token: '-' "sha1" ';' "modp8192" '' 271s | appending ESP encryption algorithm 3DES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: ';' "modp8192" '' '' 271s | parsing dh: 271s | appending ESP DH algorithm MODP8192[_0] 271s | token: '' '' '' 271s | proposal: '3des-sha2-modp8192' 271s | token: '' '' "3des" '-' 271s | token: '' "3des" '-' "sha2" '-' 271s | token: '-' "sha2" '-' "modp8192" '' 271s | appending ESP encryption algorithm 3DES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 271s | token: '-' "modp8192" '' '' 271s | parsing dh: 271s | appending ESP DH algorithm MODP8192[_0] 271s | token: '' '' '' 271s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 271s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 271s | parsing '3des-sha1;modp8192,3des-sha2;modp8192' for ESP 271s | proposal: '3des-sha1;modp8192' 271s | token: '' '' "3des" '-' 271s | token: '' "3des" '-' "sha1" ';' 271s | token: '-' "sha1" ';' "modp8192" '' 271s | appending ESP encryption algorithm 3DES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: ';' "modp8192" '' '' 271s | parsing dh: 271s | appending ESP DH algorithm MODP8192[_0] 271s | token: '' '' '' 271s | proposal: '3des-sha2;modp8192' 271s | token: '' '' "3des" '-' 271s | token: '' "3des" '-' "sha2" ';' 271s | token: '-' "sha2" ';' "modp8192" '' 271s | appending ESP encryption algorithm 3DES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 271s | token: ';' "modp8192" '' '' 271s | parsing dh: 271s | appending ESP DH algorithm MODP8192[_0] 271s | token: '' '' '' 271s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 271s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 271s | parsing '3des-sha1-modp8192,3des-sha2-modp2048' for ESP 271s | proposal: '3des-sha1-modp8192' 271s | token: '' '' "3des" '-' 271s | token: '' "3des" '-' "sha1" '-' 271s | token: '-' "sha1" '-' "modp8192" '' 271s | appending ESP encryption algorithm 3DES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 271s | token: '-' "modp8192" '' '' 271s | parsing dh: 271s | appending ESP DH algorithm MODP8192[_0] 271s | token: '' '' '' 271s | proposal: '3des-sha2-modp2048' 271s | token: '' '' "3des" '-' 271s | token: '' "3des" '-' "sha2" '-' 271s | token: '-' "sha2" '-' "modp2048" '' 271s | appending ESP encryption algorithm 3DES_CBC[_0] 271s | parsing integ: 271s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 271s | token: '-' "modp2048" '' '' 271s | parsing dh: 271s | appending ESP DH algorithm MODP2048[_0] 271s | token: '' '' '' 271s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 271s algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 271s | parsing 'SHA2_512_256,SHA2_256_128,SHA1_96' for AH 271s | proposal: 'SHA2_512_256' 271s | token: '' '' "SHA2_512_256" '' 271s | token: '' "SHA2_512_256" '' '' 271s | parsing integ: 271s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 271s | token: '' '' '' 271s | proposal: 'SHA2_256_128' 271s | token: '' '' "SHA2_256_128" '' 271s | token: '' "SHA2_256_128" '' '' 271s | parsing integ: 271s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 271s | token: '' '' '' 271s | proposal: 'SHA1_96' 271s | token: '' '' "SHA1_96" '' 271s | token: '' "SHA1_96" '' '' 271s | parsing integ: 271s | appending AH integrity algorithm HMAC_SHA1_96[_0] 271s | token: '' '' '' 271s | parsing '' for AH 271s | parsing 'md5' for AH 271s | proposal: 'md5' 271s | token: '' '' "md5" '' 271s | token: '' "md5" '' '' 271s | parsing integ: 271s | appending AH integrity algorithm HMAC_MD5_96[_0] 271s | token: '' '' '' 271s | parsing 'sha' for AH 271s | proposal: 'sha' 271s | token: '' '' "sha" '' 271s | token: '' "sha" '' '' 271s | parsing integ: 271s | appending AH integrity algorithm HMAC_SHA1_96[_0] 271s | token: '' '' '' 271s | parsing 'sha;modp2048' for AH 271s | proposal: 'sha;modp2048' 271s | token: '' '' "sha" ';' 271s | token: '' "sha" ';' "modp2048" '' 271s | parsing integ: 271s | appending AH integrity algorithm HMAC_SHA1_96[_0] 271s | token: ';' "modp2048" '' '' 271s | parsing dh: 271s | appending AH DH algorithm MODP2048[_0] 271s | token: '' '' '' 271s algparse: ignoring AH DH algorithm MODP2048 as PFS policy is disabled 271s | parsing 'sha1' for AH 271s | proposal: 'sha1' 271s | token: '' '' "sha1" '' 271s | token: '' "sha1" '' '' 271s | parsing integ: 271s | appending AH integrity algorithm HMAC_SHA1_96[_0] 271s | token: '' '' '' 271s | parsing 'sha2' for AH 271s | proposal: 'sha2' 271s | token: '' '' "sha2" '' 271s | token: '' "sha2" '' '' 271s | parsing integ: 271s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 271s | token: '' '' '' 271s | parsing 'sha256' for AH 271s | proposal: 'sha256' 271s | token: '' '' "sha256" '' 271s | token: '' "sha256" '' '' 271s | parsing integ: 271s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 271s | token: '' '' '' 271s | parsing 'sha384' for AH 271s | proposal: 'sha384' 271s | token: '' '' "sha384" '' 271s | token: '' "sha384" '' '' 271s | parsing integ: 271s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 271s | token: '' '' '' 271s | parsing 'sha512' for AH 271s | proposal: 'sha512' 271s | token: '' '' "sha512" '' 271s | token: '' "sha512" '' '' 271s | parsing integ: 271s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 271s | token: '' '' '' 271s | parsing 'sha2_256' for AH 271s | proposal: 'sha2_256' 271s | token: '' '' "sha2_256" '' 271s | token: '' "sha2_256" '' '' 271s | parsing integ: 271s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 271s | token: '' '' '' 271s | parsing 'sha2_384' for AH 271s | proposal: 'sha2_384' 271s | token: '' '' "sha2_384" '' 271s | token: '' "sha2_384" '' '' 271s | parsing integ: 271s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 271s | token: '' '' '' 271s | parsing 'sha2_512' for AH 271s | proposal: 'sha2_512' 271s | token: '' '' "sha2_512" '' 271s | token: '' "sha2_512" '' '' 271s | parsing integ: 271s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 271s | token: '' '' '' 271s | parsing 'aes_xcbc' for AH 271s | proposal: 'aes_xcbc' 271s | token: '' '' "aes_xcbc" '' 271s | token: '' "aes_xcbc" '' '' 271s | parsing integ: 271s | appending AH integrity algorithm AES_XCBC_96[_0] 271s | token: '' '' '' 271s | parsing 'sha2-none' for AH 271s | proposal: 'sha2-none' 271s | token: '' '' "sha2" '-' 271s | token: '' "sha2" '-' "none" '' 271s | parsing integ: 271s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 271s | token: '-' "none" '' '' 271s | parsing dh: 271s | appending AH DH algorithm NONE[_0] 271s | token: '' '' '' 271s algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 271s | parsing 'sha2;none' for AH 271s | proposal: 'sha2;none' 271s | token: '' '' "sha2" ';' 271s | token: '' "sha2" ';' "none" '' 271s | parsing integ: 271s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 271s | token: ';' "none" '' '' 271s | parsing dh: 271s | appending AH DH algorithm NONE[_0] 271s | token: '' '' '' 271s algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 271s | parsing 'sha1-modp8192,sha1-modp8192,sha1-modp8192' for AH 271s | proposal: 'sha1-modp8192' 271s | token: '' '' "sha1" '-' 271s | token: '' "sha1" '-' "modp8192" '' 271s | parsing integ: 271s | appending AH integrity algorithm HMAC_SHA1_96[_0] 271s | token: '-' "modp8192" '' '' 271s | parsing dh: 271s | appending AH DH algorithm MODP8192[_0] 271s | token: '' '' '' 271s | proposal: 'sha1-modp8192' 271s | token: '' '' "sha1" '-' 271s | token: '' "sha1" '-' "modp8192" '' 271s | parsing integ: 271s | appending AH integrity algorithm HMAC_SHA1_96[_0] 271s | token: '-' "modp8192" '' '' 271s | parsing dh: 271s | appending AH DH algorithm MODP8192[_0] 271s | token: '' '' '' 271s | proposal: 'sha1-modp8192' 271s | token: '' '' "sha1" '-' 271s | token: '' "sha1" '-' "modp8192" '' 271s | parsing integ: 271s | appending AH integrity algorithm HMAC_SHA1_96[_0] 271s | token: '-' "modp8192" '' '' 271s | parsing dh: 271s | appending AH DH algorithm MODP8192[_0] 271s | token: '' '' '' 271s algparse: ignoring AH DH algorithm MODP8192 as PFS policy is disabled 271s | parsing 'aes-sha1' for AH 271s | proposal: 'aes-sha1' 271s | token: '' '' "aes" '-' 271s | token: '' "aes" '-' "sha1" '' 271s | parsing integ: 271s | ike_alg_byname() failed: AH integrity algorithm 'aes' is not recognized 271s | lookup for integrity algorithm 'aes' failed 271s | or - failed 'AH integrity algorithm 'aes' is not recognized') 271s | parsing 'vanityhash1' for AH 271s | proposal: 'vanityhash1' 271s | token: '' '' "vanityhash1" '' 271s | token: '' "vanityhash1" '' '' 271s | parsing integ: 271s | ike_alg_byname() failed: AH integrity algorithm 'vanityhash1' is not recognized 271s | lookup for integrity algorithm 'vanityhash1' failed 271s | or - failed 'AH integrity algorithm 'vanityhash1' is not recognized') 271s | parsing 'aes_gcm_c-256' for AH 271s | proposal: 'aes_gcm_c-256' 271s | token: '' '' "aes_gcm_c" '-' 271s | token: '' "aes_gcm_c" '-' "256" '' 271s | parsing integ: 271s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm_c' is not recognized 271s | lookup for integrity algorithm 'aes_gcm_c' failed 271s | or - failed 'AH integrity algorithm 'aes_gcm_c' is not recognized') 271s | parsing 'id3' for AH 271s | proposal: 'id3' 271s | token: '' '' "id3" '' 271s | token: '' "id3" '' '' 271s | parsing integ: 271s | ike_alg_byname() failed: AH integrity algorithm 'id3' is not recognized 271s | lookup for integrity algorithm 'id3' failed 271s | or - failed 'AH integrity algorithm 'id3' is not recognized') 271s | parsing '3des' for AH 271s | proposal: '3des' 271s | token: '' '' "3des" '' 271s | token: '' "3des" '' '' 271s | parsing integ: 271s | ike_alg_byname() failed: AH integrity algorithm '3des' is not recognized 271s | lookup for integrity algorithm '3des' failed 271s | or - failed 'AH integrity algorithm '3des' is not recognized') 271s | parsing 'null' for AH 271s | proposal: 'null' 271s | token: '' '' "null" '' 271s | token: '' "null" '' '' 271s | parsing integ: 271s | appending AH integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | parsing 'aes_gcm' for AH 271s | proposal: 'aes_gcm' 271s | token: '' '' "aes_gcm" '' 271s | token: '' "aes_gcm" '' '' 271s | parsing integ: 271s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm' is not recognized 271s | lookup for integrity algorithm 'aes_gcm' failed 271s | or - failed 'AH integrity algorithm 'aes_gcm' is not recognized') 271s | parsing 'aes_ccm' for AH 271s | proposal: 'aes_ccm' 271s | token: '' '' "aes_ccm" '' 271s | token: '' "aes_ccm" '' '' 271s | parsing integ: 271s | ike_alg_byname() failed: AH integrity algorithm 'aes_ccm' is not recognized 271s | lookup for integrity algorithm 'aes_ccm' failed 271s | or - failed 'AH integrity algorithm 'aes_ccm' is not recognized') 271s | parsing 'ripemd' for AH 271s | proposal: 'ripemd' 271s | token: '' '' "ripemd" '' 271s | token: '' "ripemd" '' '' 271s | parsing integ: 271s | ike_alg_byname() failed: AH integrity algorithm 'ripemd' is not recognized 271s | lookup for integrity algorithm 'ripemd' failed 271s | or - failed 'AH integrity algorithm 'ripemd' is not recognized') 271s | parsing 'AES_GCM_16_256,AES_GCM_16_128,AES_CBC_256,AES_CBC_128' for IKE 271s | proposal: 'AES_GCM_16_256' 271s | token: '' '' "AES_GCM_16_256" '' 271s | token: '' "AES_GCM_16_256" '' '' 271s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_256' is not recognized 271s | token: '' '' '' 271s | appending IKE encryption algorithm AES_GCM_16[_256] 271s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 271s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 271s | appending IKE integrity algorithm NONE[_0] 271s | appending IKE DH algorithm MODP2048[_0] 271s | appending IKE DH algorithm MODP3072[_0] 271s | appending IKE DH algorithm MODP4096[_0] 271s | appending IKE DH algorithm MODP8192[_0] 271s | appending IKE DH algorithm DH19[_0] 271s | appending IKE DH algorithm DH20[_0] 271s | appending IKE DH algorithm DH21[_0] 271s | appending IKE DH algorithm DH31[_0] 271s | proposal: 'AES_GCM_16_128' 271s | token: '' '' "AES_GCM_16_128" '' 271s | token: '' "AES_GCM_16_128" '' '' 271s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_128' is not recognized 271s | token: '' '' '' 271s | appending IKE encryption algorithm AES_GCM_16[_128] 271s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 271s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 271s | appending IKE integrity algorithm NONE[_0] 271s | appending IKE DH algorithm MODP2048[_0] 271s | appending IKE DH algorithm MODP3072[_0] 271s | appending IKE DH algorithm MODP4096[_0] 271s | appending IKE DH algorithm MODP8192[_0] 271s | appending IKE DH algorithm DH19[_0] 271s | appending IKE DH algorithm DH20[_0] 271s | appending IKE DH algorithm DH21[_0] 271s | appending IKE DH algorithm DH31[_0] 271s | proposal: 'AES_CBC_256' 271s | token: '' '' "AES_CBC_256" '' 271s | token: '' "AES_CBC_256" '' '' 271s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_256' is not recognized 271s | token: '' '' '' 271s | appending IKE encryption algorithm AES_CBC[_256] 271s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 271s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 271s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 271s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 271s | appending IKE DH algorithm MODP2048[_0] 271s | appending IKE DH algorithm MODP3072[_0] 271s | appending IKE DH algorithm MODP4096[_0] 271s | appending IKE DH algorithm MODP8192[_0] 271s | appending IKE DH algorithm DH19[_0] 271s | appending IKE DH algorithm DH20[_0] 271s | appending IKE DH algorithm DH21[_0] 271s | appending IKE DH algorithm DH31[_0] 271s | proposal: 'AES_CBC_128' 271s | token: '' '' "AES_CBC_128" '' 271s | token: '' "AES_CBC_128" '' '' 271s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_128' is not recognized 271s | token: '' '' '' 271s | appending IKE encryption algorithm AES_CBC[_128] 271s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 271s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 271s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 271s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 271s | appending IKE DH algorithm MODP2048[_0] 271s | appending IKE DH algorithm MODP3072[_0] 271s | appending IKE DH algorithm MODP4096[_0] 271s | appending IKE DH algorithm MODP8192[_0] 271s | appending IKE DH algorithm DH19[_0] 271s 3DES_CBC-HMAC_SHA1-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 271s algparse -v2 'ike=3des-sha1;modp1536' 271s 3DES_CBC-HMAC_SHA1-MODP1536 271s algparse -v2 'ike=3des;dh21' 271s 3DES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH21 271s algparse -v2 'ike=3des-sha1;dh21' 271s 3DES_CBC-HMAC_SHA1-DH21 271s algparse -v2 'ike=3des-sha1-ecp_521' 271s 3DES_CBC-HMAC_SHA1-DH21 271s algparse -v2 'ike=3des+aes' 271s 3DES_CBC+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 271s algparse -v2 'ike=aes;none' 271s ERROR: IKE DH algorithm 'none' not permitted 271s algparse -v2 'ike=id2' 271s | appending IKE DH algorithm DH20[_0] 271s | appending IKE DH algorithm DH21[_0] 271s | appending IKE DH algorithm DH31[_0] 271s | parsing '' for IKE 271s | parsing '3des-sha1' for IKE 271s | proposal: '3des-sha1' 271s | token: '' '' "3des" '-' 271s | token: '' "3des" '-' "sha1" '' 271s | token: '-' "sha1" '' '' 271s | appending IKE encryption algorithm 3DES_CBC[_0] 271s | parsing prf: 271s | appending IKE PRF algorithm HMAC_SHA1[_0] 271s | token: '' '' '' 271s | - succeeded, advancing tokens 271s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 271s | appending IKE DH algorithm MODP2048[_0] 271s | appending IKE DH algorithm MODP3072[_0] 271s | appending IKE DH algorithm MODP4096[_0] 271s | appending IKE DH algorithm MODP8192[_0] 271s | appending IKE DH algorithm DH19[_0] 271s | appending IKE DH algorithm DH20[_0] 271s | appending IKE DH algorithm DH21[_0] 271s | appending IKE DH algorithm DH31[_0] 271s | parsing '3des-sha1' for IKE 271s | proposal: '3des-sha1' 271s | token: '' '' "3des" '-' 271s | token: '' "3des" '-' "sha1" '' 271s | token: '-' "sha1" '' '' 271s | appending IKE encryption algorithm 3DES_CBC[_0] 271s | parsing prf: 271s | appending IKE PRF algorithm HMAC_SHA1[_0] 271s | token: '' '' '' 271s | - succeeded, advancing tokens 271s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 271s | appending IKE DH algorithm MODP2048[_0] 271s | appending IKE DH algorithm MODP3072[_0] 271s | appending IKE DH algorithm MODP4096[_0] 271s | appending IKE DH algorithm MODP8192[_0] 271s | appending IKE DH algorithm DH19[_0] 271s | appending IKE DH algorithm DH20[_0] 271s | appending IKE DH algorithm DH21[_0] 271s | appending IKE DH algorithm DH31[_0] 271s | parsing '3des-sha1;modp1536' for IKE 271s | proposal: '3des-sha1;modp1536' 271s | token: '' '' "3des" '-' 271s | token: '' "3des" '-' "sha1" ';' 271s | token: '-' "sha1" ';' "modp1536" '' 271s | appending IKE encryption algorithm 3DES_CBC[_0] 271s | parsing prf: 271s | appending IKE PRF algorithm HMAC_SHA1[_0] 271s | token: ';' "modp1536" '' '' 271s | - succeeded, advancing tokens 271s | parsing dh: 271s | appending IKE DH algorithm MODP1536[_0] 271s | token: '' '' '' 271s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 271s | parsing '3des;dh21' for IKE 271s | proposal: '3des;dh21' 271s | token: '' '' "3des" ';' 271s | token: '' "3des" ';' "dh21" '' 271s | token: ';' "dh21" '' '' 271s | appending IKE encryption algorithm 3DES_CBC[_0] 271s | parsing dh: 271s | appending IKE DH algorithm DH21[_0] 271s | token: '' '' '' 271s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 271s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 271s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 271s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 271s | parsing '3des-sha1;dh21' for IKE 271s | proposal: '3des-sha1;dh21' 271s | token: '' '' "3des" '-' 271s | token: '' "3des" '-' "sha1" ';' 271s | token: '-' "sha1" ';' "dh21" '' 271s | appending IKE encryption algorithm 3DES_CBC[_0] 271s | parsing prf: 271s | appending IKE PRF algorithm HMAC_SHA1[_0] 271s | token: ';' "dh21" '' '' 271s | - succeeded, advancing tokens 271s | parsing dh: 271s | appending IKE DH algorithm DH21[_0] 271s | token: '' '' '' 271s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 271s | parsing '3des-sha1-ecp_521' for IKE 271s | proposal: '3des-sha1-ecp_521' 271s | token: '' '' "3des" '-' 271s | token: '' "3des" '-' "sha1" '-' 271s | token: '-' "sha1" '-' "ecp_521" '' 271s | appending IKE encryption algorithm 3DES_CBC[_0] 271s | parsing prf: 271s | appending IKE PRF algorithm HMAC_SHA1[_0] 271s | token: '-' "ecp_521" '' '' 271s | - succeeded, advancing tokens 271s | parsing dh: 271s | appending IKE DH algorithm DH21[_0] 271s | token: '' '' '' 271s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 271s | parsing '3des+aes' for IKE 271s | proposal: '3des+aes' 271s | token: '' '' "3des" '+' 271s | token: '' "3des" '+' "aes" '' 271s | token: '+' "aes" '' '' 271s | appending IKE encryption algorithm 3DES_CBC[_0] 271s | token: '' '' '' 271s | appending IKE encryption algorithm AES_CBC[_0] 271s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 271s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 271s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 271s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 271s | appending IKE DH algorithm MODP2048[_0] 271s | appending IKE DH algorithm MODP3072[_0] 271s | appending IKE DH algorithm MODP4096[_0] 271s | appending IKE DH algorithm MODP8192[_0] 271s | appending IKE DH algorithm DH19[_0] 271s | appending IKE DH algorithm DH20[_0] 271s | appending IKE DH algorithm DH21[_0] 271s | appending IKE DH algorithm DH31[_0] 271s | parsing 'aes;none' for IKE 271s | proposal: 'aes;none' 271s | token: '' '' "aes" ';' 271s | token: '' "aes" ';' "none" '' 271s | token: ';' "none" '' '' 271s | appending IKE encryption algorithm AES_CBC[_0] 271s | parsing dh: 271s | appending IKE DH algorithm NONE[_0] 271s | token: '' '' '' 271s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 271s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 271s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 271s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 271s | parsing 'id2' for IKE 271s | proposal: 'id2' 271s | token: '' '' "id2" '' 271s | token: '' "id2" '' '' 271s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 271s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 271s | parsing '3des-id2' for IKE 271s | proposal: '3des-id2' 271s | token: '' '' "3des" '-' 271s | token: '' "3des" '-' "id2" '' 271s | token: '-' "id2" '' '' 271s | appending IKE encryption algorithm 3DES_CBC[_0] 271s | parsing prf: 271s | ike_alg_byname() failed: IKE PRF algorithm 'id2' is not recognized 271s | lookup for PRF algorithm 'id2' failed 271s | - failed, saving error 'IKE PRF algorithm 'id2' is not recognized' and tossing result 271s | parsing integ: 271s | ike_alg_byname() failed: IKE integrity algorithm 'id2' is not recognized 271s | lookup for integrity algorithm 'id2' failed 271s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'id2' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'id2' is not recognized') 271s ERROR: IKE encryption algorithm 'id2' is not recognized 271s algparse -v2 'ike=3des-id2' 271s ERROR: IKE PRF algorithm 'id2' is not recognized 271s algparse -v2 'ike=aes_ccm' 271s ERROR: IKE encryption algorithm 'aes_ccm' is not supported 271s algparse -v2 'ike=aes-sha1-sha2-ecp_521' 271s ERROR: IKE DH algorithm 'sha2' is not recognized 271s algparse -v2 'ike=aes-sha2-sha2;ecp_521' 271s ERROR: IKE DH algorithm 'sha2' is not recognized 271s algparse -v2 'ike=aes-sha1_96-sha2-ecp_521' 271s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 271s algparse -v2 'ike=aes-sha1_96-sha2;ecp_521' 271s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 271s algparse -v2 'ike=aes+aes-sha1+sha1-modp8192+modp8192' 271s AES_CBC-HMAC_SHA1-MODP8192 271s algparse -v2 'ike=3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' 271s 3DES_CBC+AES_CBC-HMAC_SHA2_256+HMAC_SHA1-MODP4096+MODP8192 271s algparse -v2 'ike=aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' 271s | parsing 'aes_ccm' for IKE 271s | proposal: 'aes_ccm' 271s | token: '' '' "aes_ccm" '' 271s | token: '' "aes_ccm" '' '' 271s | alg_byname_ok() failed: IKE encryption algorithm 'aes_ccm' is not supported 271s | parsing 'aes-sha1-sha2-ecp_521' for IKE 271s | proposal: 'aes-sha1-sha2-ecp_521' 271s | token: '' '' "aes" '-' 271s | token: '' "aes" '-' "sha1" '-' 271s | token: '-' "sha1" '-' "sha2" '-' 271s | appending IKE encryption algorithm AES_CBC[_0] 271s | parsing prf: 271s | appending IKE PRF algorithm HMAC_SHA1[_0] 271s | token: '-' "sha2" '-' "ecp_521" '' 271s | - succeeded, advancing tokens 271s | parsing dh: 271s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 271s | lookup for DH algorithm 'sha2' failed 271s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 271s | parsing 'aes-sha2-sha2;ecp_521' for IKE 271s | proposal: 'aes-sha2-sha2;ecp_521' 271s | token: '' '' "aes" '-' 271s | token: '' "aes" '-' "sha2" '-' 271s | token: '-' "sha2" '-' "sha2" ';' 271s | appending IKE encryption algorithm AES_CBC[_0] 271s | parsing prf: 271s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 271s | token: '-' "sha2" ';' "ecp_521" '' 271s | - succeeded, advancing tokens 271s | parsing dh: 271s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 271s | lookup for DH algorithm 'sha2' failed 271s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 271s | parsing 'aes-sha1_96-sha2-ecp_521' for IKE 271s | proposal: 'aes-sha1_96-sha2-ecp_521' 271s | token: '' '' "aes" '-' 271s | token: '' "aes" '-' "sha1_96" '-' 271s | token: '-' "sha1_96" '-' "sha2" '-' 271s | appending IKE encryption algorithm AES_CBC[_0] 271s | parsing prf: 271s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 271s | lookup for PRF algorithm 'sha1_96' failed 271s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 271s | parsing integ: 271s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 271s | token: '-' "sha2" '-' "ecp_521" '' 271s | parsing prf: 271s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 271s | token: '-' "ecp_521" '' '' 271s | parsing dh: 271s | appending IKE DH algorithm DH21[_0] 271s | token: '' '' '' 271s | parsing 'aes-sha1_96-sha2;ecp_521' for IKE 271s | proposal: 'aes-sha1_96-sha2;ecp_521' 271s | token: '' '' "aes" '-' 271s | token: '' "aes" '-' "sha1_96" '-' 271s | token: '-' "sha1_96" '-' "sha2" ';' 271s | appending IKE encryption algorithm AES_CBC[_0] 271s | parsing prf: 271s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 271s | lookup for PRF algorithm 'sha1_96' failed 271s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 271s | parsing integ: 271s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 271s | token: '-' "sha2" ';' "ecp_521" '' 271s | parsing prf: 271s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 271s | token: ';' "ecp_521" '' '' 271s | parsing dh: 271s | appending IKE DH algorithm DH21[_0] 271s | token: '' '' '' 271s | parsing 'aes+aes-sha1+sha1-modp8192+modp8192' for IKE 271s | proposal: 'aes+aes-sha1+sha1-modp8192+modp8192' 271s | token: '' '' "aes" '+' 271s | token: '' "aes" '+' "aes" '-' 271s | token: '+' "aes" '-' "sha1" '+' 271s | appending IKE encryption algorithm AES_CBC[_0] 271s | token: '-' "sha1" '+' "sha1" '-' 271s | appending IKE encryption algorithm AES_CBC[_0] 271s algparse: discarding duplicate IKE encryption algorithm AES_CBC 271s | parsing prf: 271s | appending IKE PRF algorithm HMAC_SHA1[_0] 271s | token: '+' "sha1" '-' "modp8192" '+' 271s | appending IKE PRF algorithm HMAC_SHA1[_0] 271s | token: '-' "modp8192" '+' "modp8192" '' 271s algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 271s | - succeeded, advancing tokens 271s | parsing dh: 271s | appending IKE DH algorithm MODP8192[_0] 271s | token: '+' "modp8192" '' '' 271s | appending IKE DH algorithm MODP8192[_0] 271s | token: '' '' '' 271s algparse: discarding duplicate IKE DH algorithm MODP8192 271s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 271s | parsing '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' for IKE 271s | proposal: '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' 271s | token: '' '' "3des" '+' 271s | token: '' "3des" '+' "aes" '+' 271s | token: '+' "aes" '+' "aes" '-' 271s | appending IKE encryption algorithm 3DES_CBC[_0] 271s | token: '+' "aes" '-' "sha2" '+' 271s | appending IKE encryption algorithm AES_CBC[_0] 271s | token: '-' "sha2" '+' "sha1" '+' 271s | appending IKE encryption algorithm AES_CBC[_0] 271s algparse: discarding duplicate IKE encryption algorithm AES_CBC 271s | parsing prf: 271s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 271s | token: '+' "sha1" '+' "sha1" '-' 271s | appending IKE PRF algorithm HMAC_SHA1[_0] 271s | token: '+' "sha1" '-' "modp4096" '+' 271s | appending IKE PRF algorithm HMAC_SHA1[_0] 271s | token: '-' "modp4096" '+' "modp8192" '+' 271s algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 271s | - succeeded, advancing tokens 271s | parsing dh: 271s | appending IKE DH algorithm MODP4096[_0] 271s | token: '+' "modp8192" '+' "modp8192" '' 271s | appending IKE DH algorithm MODP8192[_0] 271s | token: '+' "modp8192" '' '' 271s | appending IKE DH algorithm MODP8192[_0] 271s | token: '' '' '' 271s algparse: discarding duplicate IKE DH algorithm MODP8192 271s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 271s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 271s | parsing 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' for IKE 271s | proposal: 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' 271s | token: '' '' "aes" '+' 271s | token: '' "aes" '+' "3des" '+' 271s | token: '+' "3des" '+' "aes" '-' 271s | appending IKE encryption algorithm AES_CBC[_0] 271s | token: '+' "aes" '-' "sha1" '+' 271s | appending IKE encryption algorithm 3DES_CBC[_0] 271s | token: '-' "sha1" '+' "sha2" '+' 271s | appending IKE encryption algorithm AES_CBC[_0] 271s algparse: discarding duplicate IKE encryption algorithm AES_CBC 271s | parsing prf: 271s | appending IKE PRF algorithm HMAC_SHA1[_0] 271s | token: '+' "sha2" '+' "sha1" '-' 271s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 271s | token: '+' "sha1" '-' "modp8192" '+' 271s | appending IKE PRF algorithm HMAC_SHA1[_0] 271s | token: '-' "modp8192" '+' "modp4096" '+' 271s algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 271s | - succeeded, advancing tokens 271s | parsing dh: 271s | appending IKE DH algorithm MODP8192[_0] 271s | token: '+' "modp4096" '+' "modp8192" '' 271s | appending IKE DH algorithm MODP4096[_0] 271s | token: '+' "modp8192" '' '' 271s | appending IKE DH algorithm MODP8192[_0] 271s | token: '' '' '' 271s algparse: discarding duplicate IKE DH algorithm MODP8192 271s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 271s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 271s | parsing 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' for IKE 271s | proposal: 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' 271s | token: '' '' "aes" '+' 271s | token: '' "aes" '+' "aes" '+' 271s | token: '+' "aes" '+' "3des" '-' 271s | appending IKE encryption algorithm AES_CBC[_0] 271s | token: '+' "3des" '-' "sha1" '+' 271s | appending IKE encryption algorithm AES_CBC[_0] 271s | token: '-' "sha1" '+' "sha1" '+' 271s | appending IKE encryption algorithm 3DES_CBC[_0] 271s algparse: discarding duplicate IKE encryption algorithm AES_CBC 271s | parsing prf: 271s | appending IKE PRF algorithm HMAC_SHA1[_0] 271s | token: '+' "sha1" '+' "sha2" '-' 271s | appending IKE PRF algorithm HMAC_SHA1[_0] 271s | token: '+' "sha2" '-' "modp8192" '+' 271s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 271s | token: '-' "modp8192" '+' "modp8192" '+' 271s algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 271s | - succeeded, advancing tokens 271s | parsing dh: 271s | appending IKE DH algorithm MODP8192[_0] 271s | token: '+' "modp8192" '+' "modp4096" '' 271s | appending IKE DH algorithm MODP8192[_0] 271s | token: '+' "modp4096" '' '' 271s | appending IKE DH algorithm MODP4096[_0] 271s | token: '' '' '' 271s algparse: discarding duplicate IKE DH algorithm MODP8192 271s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 271s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 271s | parsing 'aes+aes128+aes256' for IKE 271s | proposal: 'aes+aes128+aes256' 271s | token: '' '' "aes" '+' 271s | token: '' "aes" '+' "aes128" '+' 271s | token: '+' "aes128" '+' "aes256" '' 271s | appending IKE encryption algorithm AES_CBC[_0] 271s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 271s | token: '+' "aes256" '' '' 271s | appending IKE encryption algorithm AES_CBC[_128] 271s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 271s | token: '' '' '' 271s | appending IKE encryption algorithm AES_CBC[_256] 271s algparse: discarding duplicate IKE encryption algorithm AES_CBC_128 271s algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 271s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 271s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 271s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 271s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 271s | appending IKE DH algorithm MODP2048[_0] 271s | appending IKE DH algorithm MODP3072[_0] 271s | appending IKE DH algorithm MODP4096[_0] 271s | appending IKE DH algorithm MODP8192[_0] 271s | appending IKE DH algorithm DH19[_0] 271s | appending IKE DH algorithm DH20[_0] 271s | appending IKE DH algorithm DH21[_0] 271s | appending IKE DH algorithm DH31[_0] 271s | parsing 'aes128+aes+aes256' for IKE 271s | proposal: 'aes128+aes+aes256' 271s | token: '' '' "aes128" '+' 271s | token: '' "aes128" '+' "aes" '+' 271s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 271s | token: '+' "aes" '+' "aes256" '' 271s | appending IKE encryption algorithm AES_CBC[_128] 271s | token: '+' "aes256" '' '' 271s | appending IKE encryption algorithm AES_CBC[_0] 271s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 271s | token: '' '' '' 271s | appending IKE encryption algorithm AES_CBC[_256] 271s algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 271s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 271s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 271s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 271s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 271s | appending IKE DH algorithm MODP2048[_0] 271s | appending IKE DH algorithm MODP3072[_0] 271s | appending IKE DH algorithm MODP4096[_0] 271s | appending IKE DH algorithm MODP8192[_0] 271s | appending IKE DH algorithm DH19[_0] 271s | appending IKE DH algorithm DH20[_0] 271s | appending IKE DH algorithm DH21[_0] 271s | appending IKE DH algorithm DH31[_0] 271s | parsing 'aes128+aes256+aes' for IKE 271s | proposal: 'aes128+aes256+aes' 271s | token: '' '' "aes128" '+' 271s | token: '' "aes128" '+' "aes256" '+' 271s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 271s | token: '+' "aes256" '+' "aes" '' 271s | appending IKE encryption algorithm AES_CBC[_128] 271s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 271s | token: '+' "aes" '' '' 271s | appending IKE encryption algorithm AES_CBC[_256] 271s | token: '' '' '' 271s | appending IKE encryption algorithm AES_CBC[_0] 271s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 271s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 271s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 271s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 271s | appending IKE DH algorithm MODP2048[_0] 271s | appending IKE DH algorithm MODP3072[_0] 271s | appending IKE DH algorithm MODP4096[_0] 271s | appending IKE DH algorithm MODP8192[_0] 271s | appending IKE DH algorithm DH19[_0] 271s | appending IKE DH algorithm DH20[_0] 271s | appending IKE DH algorithm DH21[_0] 271s | appending IKE DH algorithm DH31[_0] 271s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for IKE 271s | proposal: 'aes-sha1-modp8192' 271s | token: '' '' "aes" '-' 271s | token: '' "aes" '-' "sha1" '-' 271s | token: '-' "sha1" '-' "modp8192" '' 271s | appending IKE encryption algorithm AES_CBC[_0] 271s | parsing prf: 271s | appending IKE PRF algorithm HMAC_SHA1[_0] 271s | token: '-' "modp8192" '' '' 271s | - succeeded, advancing tokens 271s | parsing dh: 271s | appending IKE DH algorithm MODP8192[_0] 271s | token: '' '' '' 271s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 271s | proposal: 'aes-sha1-modp8192' 271s | token: '' '' "aes" '-' 271s | token: '' "aes" '-' "sha1" '-' 271s | token: '-' "sha1" '-' "modp8192" '' 271s | appending IKE encryption algorithm AES_CBC[_0] 271s | parsing prf: 271s | appending IKE PRF algorithm HMAC_SHA1[_0] 271s | token: '-' "modp8192" '' '' 271s | - succeeded, advancing tokens 271s | parsing dh: 271s | appending IKE DH algorithm MODP8192[_0] 271s | token: '' '' '' 271s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 271s | proposal: 'aes-sha1-modp8192' 271s | token: '' '' "aes" '-' 271s | token: '' "aes" '-' "sha1" '-' 271s | token: '-' "sha1" '-' "modp8192" '' 271s | appending IKE encryption algorithm AES_CBC[_0] 271s | parsing prf: 271s | appending IKE PRF algorithm HMAC_SHA1[_0] 271s | token: '-' "modp8192" '' '' 271s | - succeeded, advancing tokens 271s | parsing dh: 271s | appending IKE DH algorithm MODP8192[_0] 271s | token: '' '' '' 271s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 271s | parsing 'aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' for IKE 271s | proposal: 'aes-sha1-modp8192' 271s | token: '' '' "aes" '-' 271s | token: '' "aes" '-' "sha1" '-' 271s | token: '-' "sha1" '-' "modp8192" '' 271s | appending IKE encryption algorithm AES_CBC[_0] 271s | parsing prf: 271s | appending IKE PRF algorithm HMAC_SHA1[_0] 271s | token: '-' "modp8192" '' '' 271s | - succeeded, advancing tokens 271s | parsing dh: 271s | appending IKE DH algorithm MODP8192[_0] 271s | token: '' '' '' 271s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 271s | proposal: 'aes-sha2-modp8192' 271s | token: '' '' "aes" '-' 271s | token: '' "aes" '-' "sha2" '-' 271s | token: '-' "sha2" '-' "modp8192" '' 271s | appending IKE encryption algorithm AES_CBC[_0] 271s | parsing prf: 271s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 271s | token: '-' "modp8192" '' '' 271s | - succeeded, advancing tokens 271s | parsing dh: 271s | appending IKE DH algorithm MODP8192[_0] 271s | token: '' '' '' 271s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 271s | proposal: 'aes-sha1-modp8192' 271s | token: '' '' "aes" '-' 271s | token: '' "aes" '-' "sha1" '-' 271s | token: '-' "sha1" '-' "modp8192" '' 271s | appending IKE encryption algorithm AES_CBC[_0] 271s | parsing prf: 271s | appending IKE PRF algorithm HMAC_SHA1[_0] 271s | token: '-' "modp8192" '' '' 271s | - succeeded, advancing tokens 271s | parsing dh: 271s | appending IKE DH algorithm MODP8192[_0] 271s | token: '' '' '' 271s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 271s | parsing 'aes_gcm' for IKE 271s | proposal: 'aes_gcm' 271s | token: '' '' "aes_gcm" '' 271s | token: '' "aes_gcm" '' '' 271s | token: '' '' '' 271s | appending IKE encryption algorithm AES_GCM_16[_0] 271s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 271s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 271s | appending IKE integrity algorithm NONE[_0] 271s | appending IKE DH algorithm MODP2048[_0] 271s | appending IKE DH algorithm MODP3072[_0] 271s | appending IKE DH algorithm MODP4096[_0] 271s | appending IKE DH algorithm MODP8192[_0] 271s | appending IKE DH algorithm DH19[_0] 271s | appending IKE DH algorithm DH20[_0] 271s | appending IKE DH algorithm DH21[_0] 271s | appending IKE DH algorithm DH31[_0] 271s | parsing 'aes_gcm-sha2' for IKE 271s | proposal: 'aes_gcm-sha2' 271s | token: '' '' "aes_gcm" '-' 271s | token: '' "aes_gcm" '-' "sha2" '' 271s | token: '-' "sha2" '' '' 271s | appending IKE encryption algorithm AES_GCM_16[_0] 271s | parsing prf: 271s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 271s | token: '' '' '' 271s | - succeeded, advancing tokens 271s | appending IKE integrity algorithm NONE[_0] 271s | appending IKE DH algorithm MODP2048[_0] 271s | appending IKE DH algorithm MODP3072[_0] 271s | appending IKE DH algorithm MODP4096[_0] 271s | appending IKE DH algorithm MODP8192[_0] 271s | appending IKE DH algorithm DH19[_0] 271s | appending IKE DH algorithm DH20[_0] 271s | appending IKE DH algorithm DH21[_0] 271s | appending IKE DH algorithm DH31[_0] 271s | parsing 'aes_gcm-sha2-modp2048' for IKE 271s | proposal: 'aes_gcm-sha2-modp2048' 271s | token: '' '' "aes_gcm" '-' 271s | token: '' "aes_gcm" '-' "sha2" '-' 271s | token: '-' "sha2" '-' "modp2048" '' 271s | appending IKE encryption algorithm AES_GCM_16[_0] 271s | parsing prf: 271s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 271s | token: '-' "modp2048" '' '' 271s | - succeeded, advancing tokens 271s | parsing dh: 271s | appending IKE DH algorithm MODP2048[_0] 271s | token: '' '' '' 271s | appending IKE integrity algorithm NONE[_0] 271s | parsing 'aes_gcm-sha2;modp2048' for IKE 271s | proposal: 'aes_gcm-sha2;modp2048' 271s | token: '' '' "aes_gcm" '-' 271s | token: '' "aes_gcm" '-' "sha2" ';' 271s | token: '-' "sha2" ';' "modp2048" '' 271s | appending IKE encryption algorithm AES_GCM_16[_0] 271s | parsing prf: 271s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 271s | token: ';' "modp2048" '' '' 271s | - succeeded, advancing tokens 271s | parsing dh: 271s | appending IKE DH algorithm MODP2048[_0] 271s | token: '' '' '' 271s | appending IKE integrity algorithm NONE[_0] 271s | parsing 'aes_gcm-modp2048' for IKE 271s | proposal: 'aes_gcm-modp2048' 271s | token: '' '' "aes_gcm" '-' 271s | token: '' "aes_gcm" '-' "modp2048" '' 271s | token: '-' "modp2048" '' '' 271s | appending IKE encryption algorithm AES_GCM_16[_0] 271s | parsing prf: 271s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 271s | lookup for PRF algorithm 'modp2048' failed 271s | - failed, saving error 'IKE PRF algorithm 'modp2048' is not recognized' and tossing result 271s | parsing integ: 271s | ike_alg_byname() failed: IKE integrity algorithm 'modp2048' is not recognized 271s | lookup for integrity algorithm 'modp2048' failed 271s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'modp2048' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'modp2048' is not recognized') 271s | parsing 'aes_gcm;modp2048' for IKE 271s | proposal: 'aes_gcm;modp2048' 271s | token: '' '' "aes_gcm" ';' 271s | token: '' "aes_gcm" ';' "modp2048" '' 271s | token: ';' "modp2048" '' '' 271s | appending IKE encryption algorithm AES_GCM_16[_0] 271s | parsing dh: 271s | appending IKE DH algorithm MODP2048[_0] 271s | token: '' '' '' 271s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 271s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 271s | appending IKE integrity algorithm NONE[_0] 271s | parsing 'aes_gcm-none' for IKE 271s | proposal: 'aes_gcm-none' 271s | token: '' '' "aes_gcm" '-' 271s | token: '' "aes_gcm" '-' "none" '' 271s | token: '-' "none" '' '' 271s | appending IKE encryption algorithm AES_GCM_16[_0] 271s | parsing prf: 271s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 271s | lookup for PRF algorithm 'none' failed 271s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 271s | parsing integ: 271s | appending IKE integrity algorithm NONE[_0] 271s | token: '' '' '' 271s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 271s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 271s | appending IKE DH algorithm MODP2048[_0] 271s | appending IKE DH algorithm MODP3072[_0] 271s | appending IKE DH algorithm MODP4096[_0] 271s | appending IKE DH algorithm MODP8192[_0] 271s | appending IKE DH algorithm DH19[_0] 271s | appending IKE DH algorithm DH20[_0] 271s | appending IKE DH algorithm DH21[_0] 271s | appending IKE DH algorithm DH31[_0] 271s | parsing 'aes_gcm-none-sha2' for IKE 271s | proposal: 'aes_gcm-none-sha2' 271s | token: '' '' "aes_gcm" '-' 271s | token: '' "aes_gcm" '-' "none" '-' 271s | token: '-' "none" '-' "sha2" '' 271s | appending IKE encryption algorithm AES_GCM_16[_0] 271s | parsing prf: 271s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 271s | lookup for PRF algorithm 'none' failed 271s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 271s | parsing integ: 271s | appending IKE integrity algorithm NONE[_0] 271s | token: '-' "sha2" '' '' 271s | parsing prf: 271s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 271s | token: '' '' '' 271s | appending IKE DH algorithm MODP2048[_0] 271s | appending IKE DH algorithm MODP3072[_0] 271s | appending IKE DH algorithm MODP4096[_0] 271s | appending IKE DH algorithm MODP8192[_0] 271s | appending IKE DH algorithm DH19[_0] 271s | appending IKE DH algorithm DH20[_0] 271s | appending IKE DH algorithm DH21[_0] 271s | appending IKE DH algorithm DH31[_0] 271s | parsing 'aes_gcm-none-sha2-modp2048' for IKE 271s | proposal: 'aes_gcm-none-sha2-modp2048' 271s | token: '' '' "aes_gcm" '-' 271s | token: '' "aes_gcm" '-' "none" '-' 271s | token: '-' "none" '-' "sha2" '-' 271s | appending IKE encryption algorithm AES_GCM_16[_0] 271s | parsing prf: 271s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 271s | lookup for PRF algorithm 'none' failed 271s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 271s | parsing integ: 271s | appending IKE integrity algorithm NONE[_0] 271s | token: '-' "sha2" '-' "modp2048" '' 271s | parsing prf: 271s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 271s | token: '-' "modp2048" '' '' 271s | parsing dh: 271s | appending IKE DH algorithm MODP2048[_0] 271s | token: '' '' '' 271s | parsing 'aes_gcm-none-sha2;modp2048' for IKE 271s | proposal: 'aes_gcm-none-sha2;modp2048' 271s | token: '' '' "aes_gcm" '-' 271s | token: '' "aes_gcm" '-' "none" '-' 271s | token: '-' "none" '-' "sha2" ';' 271s | appending IKE encryption algorithm AES_GCM_16[_0] 271s | parsing prf: 271s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 271s | lookup for PRF algorithm 'none' failed 271s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 271s | parsing integ: 271s | appending IKE integrity algorithm NONE[_0] 271s | token: '-' "sha2" ';' "modp2048" '' 271s | parsing prf: 271s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 271s | token: ';' "modp2048" '' '' 271s | parsing dh: 271s | appending IKE DH algorithm MODP2048[_0] 271s | token: '' '' '' 271s | parsing 'aes_gcm-none-modp2048' for IKE 271s | proposal: 'aes_gcm-none-modp2048' 271s | token: '' '' "aes_gcm" '-' 271s | token: '' "aes_gcm" '-' "none" '-' 271s | token: '-' "none" '-' "modp2048" '' 271s | appending IKE encryption algorithm AES_GCM_16[_0] 271s | parsing prf: 271s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 271s | lookup for PRF algorithm 'none' failed 271s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 271s | parsing integ: 271s | appending IKE integrity algorithm NONE[_0] 271s | token: '-' "modp2048" '' '' 271s | parsing prf: 271s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 271s | lookup for PRF algorithm 'modp2048' failed 271s | -- failed 'IKE PRF algorithm 'modp2048' is not recognized' 271s | parsing 'aes_gcm-none;modp2048' for IKE 271s | proposal: 'aes_gcm-none;modp2048' 271s | token: '' '' "aes_gcm" '-' 271s | token: '' "aes_gcm" '-' "none" ';' 271s | token: '-' "none" ';' "modp2048" '' 271s | appending IKE encryption algorithm AES_GCM_16[_0] 271s | parsing prf: 271s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 271s | lookup for PRF algorithm 'none' failed 271s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 271s | parsing integ: 271s | appending IKE integrity algorithm NONE[_0] 271s | token: ';' "modp2048" '' '' 271s | parsing dh: 271s | appending IKE DH algorithm MODP2048[_0] 271s | token: '' '' '' 271s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 271s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 271s | parsing 'aes_gcm-sha1-none-modp2048' for IKE 271s | proposal: 'aes_gcm-sha1-none-modp2048' 271s | token: '' '' "aes_gcm" '-' 271s | token: '' "aes_gcm" '-' "sha1" '-' 271s | token: '-' "sha1" '-' "none" '-' 271s | appending IKE encryption algorithm AES_GCM_16[_0] 271s | parsing prf: 271s | appending IKE PRF algorithm HMAC_SHA1[_0] 271s | token: '-' "none" '-' "modp2048" '' 271s | - succeeded, advancing tokens 271s | parsing dh: 271s | appending IKE DH algorithm NONE[_0] 271s | token: '-' "modp2048" '' '' 271s | parsing 'aes_gcm-sha1-none;modp2048' for IKE 271s | proposal: 'aes_gcm-sha1-none;modp2048' 271s | token: '' '' "aes_gcm" '-' 271s | token: '' "aes_gcm" '-' "sha1" '-' 271s | token: '-' "sha1" '-' "none" ';' 271s | appending IKE encryption algorithm AES_GCM_16[_0] 271s | parsing prf: 271s | appending IKE PRF algorithm HMAC_SHA1[_0] 271s | token: '-' "none" ';' "modp2048" '' 271s | - succeeded, advancing tokens 271s | parsing dh: 271s | appending IKE DH algorithm NONE[_0] 271s | token: ';' "modp2048" '' '' 271s | parsing 'aes+aes_gcm' for IKE 271s | proposal: 'aes+aes_gcm' 271s | token: '' '' "aes" '+' 271s | token: '' "aes" '+' "aes_gcm" '' 271s | token: '+' "aes_gcm" '' '' 271s | appending IKE encryption algorithm AES_CBC[_0] 271s | token: '' '' '' 271s | appending IKE encryption algorithm AES_GCM_16[_0] 271s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 271s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 271s | appending IKE DH algorithm MODP2048[_0] 271s | appending IKE DH algorithm MODP3072[_0] 271s | appending IKE DH algorithm MODP4096[_0] 271s | appending IKE DH algorithm MODP8192[_0] 271s | appending IKE DH algorithm DH19[_0] 271s | appending IKE DH algorithm DH20[_0] 271s | appending IKE DH algorithm DH21[_0] 271s | appending IKE DH algorithm DH31[_0] 271s | parsing ',' for IKE 271s | proposal: '' 271s | token: '' '' "" '' 271s | token: '' "" '' '' 271s | parsing 'aes,' for IKE 271s | proposal: 'aes' 271s | token: '' '' "aes" '' 271s | token: '' "aes" '' '' 271s | token: '' '' '' 271s | appending IKE encryption algorithm AES_CBC[_0] 271s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 271s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 271s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 271s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 271s | appending IKE DH algorithm MODP2048[_0] 271s | appending IKE DH algorithm MODP3072[_0] 271s | appending IKE DH algorithm MODP4096[_0] 271s | appending IKE DH algorithm MODP8192[_0] 271s | appending IKE DH algorithm DH19[_0] 271s | appending IKE DH algorithm DH20[_0] 271s | appending IKE DH algorithm DH21[_0] 271s | appending IKE DH algorithm DH31[_0] 271s | proposal: '' 271s | token: '' '' "" '' 271s | token: '' "" '' '' 271s | parsing 'aes,,aes' for IKE 271s | proposal: 'aes' 271s | token: '' '' "aes" '' 271s | token: '' "aes" '' '' 271s | token: '' '' '' 271s | appending IKE encryption algorithm AES_CBC[_0] 271s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 271s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 271s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 271s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 271s | appending IKE DH algorithm MODP2048[_0] 271s | appending IKE DH algorithm MODP3072[_0] 271s | appending IKE DH algorithm MODP4096[_0] 271s | appending IKE DH algorithm MODP8192[_0] 271s | appending IKE DH algorithm DH19[_0] 271s | appending IKE DH algorithm DH20[_0] 271s | appending IKE DH algorithm DH21[_0] 271s | appending IKE DH algorithm DH31[_0] 271s | proposal: '' 271s | token: '' '' "" '' 271s | token: '' "" '' '' 271s | parsing ',aes' for IKE 271s | proposal: '' 271s | token: '' '' "" '' 271s | token: '' "" '' '' 271s | parsing '-' for IKE 271s | proposal: '-' 271s | token: '' '' "" '-' 271s | token: '' "" '-' "" '' 271s | parsing '+' for IKE 271s | proposal: '+' 271s | token: '' '' "" '+' 271s | token: '' "" '+' "" '' 271s | parsing ';' for IKE 271s | proposal: ';' 271s | token: '' '' "" ';' 271s | token: '' "" ';' "" '' 271s | parsing 'aes-' for IKE 271s | proposal: 'aes-' 271s | token: '' '' "aes" '-' 271s | token: '' "aes" '-' "" '' 271s | token: '-' "" '' '' 271s | appending IKE encryption algorithm AES_CBC[_0] 271s | parsing prf: 271s | - failed, saving error 'IKE PRF algorithm is empty' and tossing result 271s | parsing integ: 271s | - and - failed, returning earlier PRF error 'IKE PRF algorithm is empty' and discarding INTEG error 'IKE integrity algorithm is empty') 271s | parsing 'aes+' for IKE 271s | proposal: 'aes+' 271s | token: '' '' "aes" '+' 271s | token: '' "aes" '+' "" '' 271s | token: '+' "" '' '' 271s | appending IKE encryption algorithm AES_CBC[_0] 271s | parsing 'aes;' for IKE 271s | proposal: 'aes;' 271s | token: '' '' "aes" ';' 271s | token: '' "aes" ';' "" '' 271s | token: ';' "" '' '' 271s | appending IKE encryption algorithm AES_CBC[_0] 271s | parsing dh: 271s | ... failed 'IKE DH algorithm is empty' 271s | parsing '-aes' for IKE 271s | proposal: '-aes' 271s | token: '' '' "" '-' 271s | token: '' "" '-' "aes" '' 271s | parsing '+aes' for IKE 271s | proposal: '+aes' 271s | token: '' '' "" '+' 271s | token: '' "" '+' "aes" '' 271s | parsing ';aes' for IKE 271s | proposal: ';aes' 271s | token: '' '' "" ';' 271s | token: '' "" ';' "aes" '' 271s | parsing 'aes+-' for IKE 271s | proposal: 'aes+-' 271s | token: '' '' "aes" '+' 271s | token: '' "aes" '+' "" '-' 271s | token: '+' "" '-' "" '' 271s | appending IKE encryption algorithm AES_CBC[_0] 271s | parsing 'aes+;' for IKE 271s | proposal: 'aes+;' 271s | token: '' '' "aes" '+' 271s | token: '' "aes" '+' "" ';' 271s | token: '+' "" ';' "" '' 271s | appending IKE encryption algorithm AES_CBC[_0] 271s | parsing 'aes++' for IKE 271s | proposal: 'aes++' 271s | token: '' '' "aes" '+' 271s | token: '' "aes" '+' "" '+' 271s | token: '+' "" '+' "" '' 271s | appending IKE encryption algorithm AES_CBC[_0] 271s algparse: leak detective found no leaks 271s algparse: Encryption algorithms: 271s algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 271s algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 271s algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 271s algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 271s algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 271s algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 271s algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm, aes_gcm_c 271s algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_b 271s algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_a 271s algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 271s algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 271s algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 271s algparse: NULL [] IKEv1: ESP IKEv2: ESP 271s algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 271s algparse: Hash algorithms: 271s algparse: MD5 IKEv1: IKE IKEv2: NSS 271s algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 271s algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 271s algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 271s algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 271s algparse: IDENTITY IKEv1: IKEv2: FIPS 271s algparse: PRF algorithms: 271s algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE native(HMAC) md5 271s algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 271s algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 271s algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 271s algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 271s algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 271s algparse: Integrity algorithms: 271s algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH native(HMAC) md5, hmac_md5 271s algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 271s algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 271s algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 271s algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 271s algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 271s algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 271s algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 271s algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 271s algparse: DH algorithms: 271s algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 271s algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 271s algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 271s algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 271s algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 271s algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 271s algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 271s algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 271s algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 271s algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 271s algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 271s algparse: IPCOMP algorithms: 271s algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 271s algparse: LZS IKEv1: IKEv2: ESP AH FIPS 271s algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 271s algparse: testing CAMELLIA_CBC: 271s algparse: Camellia: 16 bytes with 128-bit key 271s | decode_to_chunk: raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 271s | decode_to_chunk: output: 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbee0 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: CAMELLIA_CBC 271s | flags: ENCRYPT+DECRYPT 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ad100 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbee0 271s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 271s | decode_to_chunk: output: 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | decode_to_chunk: new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 271s | decode_to_chunk: output: 271s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 271s | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 271s | decode_to_chunk: output: 271s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | decode_to_chunk: ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 271s | decode_to_chunk: output: 271s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 271s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 271s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 271s | verify_chunk_data: encrypt: ok 271s | verify_chunk_data: updated CBC IV: ok 271s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 271s | decode_to_chunk: output: 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | decode_to_chunk: new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 271s | decode_to_chunk: output: 271s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 271s | decode_to_chunk: ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 271s | decode_to_chunk: output: 271s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 271s | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 271s | decode_to_chunk: output: 271s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 271s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 271s | verify_chunk_data: decrypt: ok 271s | verify_chunk_data: updated CBC IV: ok 271s | test_ctr_vector: Camellia: 16 bytes with 128-bit key passed 271s algparse: Camellia: 16 bytes with 128-bit key 271s | decode_to_chunk: raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF" 271s | decode_to_chunk: output: 271s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbee0 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: CAMELLIA_CBC 271s | flags: ENCRYPT+DECRYPT 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ad100 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbee0 271s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 271s | decode_to_chunk: output: 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | decode_to_chunk: new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 271s | decode_to_chunk: output: 271s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 271s | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 271s | decode_to_chunk: output: 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 271s | decode_to_chunk: ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 271s | decode_to_chunk: output: 271s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 271s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 271s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 271s | verify_chunk_data: encrypt: ok 271s | verify_chunk_data: updated CBC IV: ok 271s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 271s | decode_to_chunk: output: 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | decode_to_chunk: new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 271s | decode_to_chunk: output: 271s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 271s | decode_to_chunk: ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 271s | decode_to_chunk: output: 271s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 271s | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 271s | decode_to_chunk: output: 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 271s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 271s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 271s | verify_chunk_data: decrypt: ok 271s | verify_chunk_data: updated CBC IV: ok 271s | test_ctr_vector: Camellia: 16 bytes with 128-bit key passed 271s algparse: Camellia: 16 bytes with 256-bit key 271s | decode_to_chunk: raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 271s | decode_to_chunk: output: 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbee0 271s | key-offset: 0, key-size: 32 271s | EXTRACT_KEY_FROM_KEY: 271s | target: CAMELLIA_CBC 271s | flags: ENCRYPT+DECRYPT 271s | key_size: 32-bytes 271s | base: base-key@0x7d49c9ad100 (48-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbee0 271s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 271s | decode_to_chunk: output: 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | decode_to_chunk: new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 271s | decode_to_chunk: output: 271s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 271s | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 271s | decode_to_chunk: output: 271s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | decode_to_chunk: ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 271s | decode_to_chunk: output: 271s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 271s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 271s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 271s | verify_chunk_data: encrypt: ok 271s | verify_chunk_data: updated CBC IV: ok 271s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 271s | decode_to_chunk: output: 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | decode_to_chunk: new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 271s | decode_to_chunk: output: 271s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 271s | decode_to_chunk: ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 271s | decode_to_chunk: output: 271s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 271s | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 271s | decode_to_chunk: output: 271s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 271s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 271s | verify_chunk_data: decrypt: ok 271s | verify_chunk_data: updated CBC IV: ok 271s | test_ctr_vector: Camellia: 16 bytes with 256-bit key passed 271s algparse: Camellia: 16 bytes with 256-bit key 271s | decode_to_chunk: raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF FF EE DD CC BB AA 99 88 77 66 55 44 33 22 11 00" 271s | decode_to_chunk: output: 271s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 271s | ff ee dd cc bb aa 99 88 77 66 55 44 33 22 11 00 ........wfUD3".. 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbee0 271s | key-offset: 0, key-size: 32 271s | EXTRACT_KEY_FROM_KEY: 271s | target: CAMELLIA_CBC 271s | flags: ENCRYPT+DECRYPT 271s | key_size: 32-bytes 271s | base: base-key@0x7d49c9ad100 (48-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbee0 271s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 271s | decode_to_chunk: output: 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | decode_to_chunk: new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 271s | decode_to_chunk: output: 271s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 271s | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 271s | decode_to_chunk: output: 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 271s | decode_to_chunk: ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 271s | decode_to_chunk: output: 271s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 271s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 271s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 271s | verify_chunk_data: encrypt: ok 271s | verify_chunk_data: updated CBC IV: ok 271s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 271s | decode_to_chunk: output: 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | decode_to_chunk: new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 271s | decode_to_chunk: output: 271s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 271s | decode_to_chunk: ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 271s | decode_to_chunk: output: 271s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 271s | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 271s | decode_to_chunk: output: 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 271s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 271s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 271s | verify_chunk_data: decrypt: ok 271s | verify_chunk_data: updated CBC IV: ok 271s | test_ctr_vector: Camellia: 16 bytes with 256-bit key passed 271s algparse: testing AES_GCM_16: 271s algparse: empty string 271s | decode_to_chunk: raw_key: input "0xcf063a34d4a9a76c2c86787d3f96db71" 271s | decode_to_chunk: output: 271s | cf 06 3a 34 d4 a9 a7 6c 2c 86 78 7d 3f 96 db 71 ..:4...l,.x}?..q 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbe40 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_GCM 271s | flags: ENCRYPT+DECRYPT 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ad100 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbe40 271s | decode_to_chunk: salted IV: input "0x113b9785971864c83b01c787" 271s | decode_to_chunk: output: 271s | 11 3b 97 85 97 18 64 c8 3b 01 c7 87 .;....d.;... 271s | decode_to_chunk: AAD: input "" 271s | decode_to_chunk: output: 271s | 271s | decode_to_chunk: plaintext: input "" 271s | decode_to_chunk: output: 271s | 271s | decode_to_chunk: ciphertext: input "" 271s | decode_to_chunk: output: 271s | 271s | decode_to_chunk: tag: input "0x72ac8493e3a5228b5d130a69d2510e42" 271s | decode_to_chunk: output: 271s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 271s | test_gcm_vector: decrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 271s | test_gcm_vector: text+tag on call 271s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 271s | verify_chunk_data: output ciphertext: ok 271s | verify_chunk_data: TAG: ok 271s | test_gcm_vector: text+tag on return 271s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 271s | test_gcm_vector: encrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 271s | test_gcm_vector: text+tag on call 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | verify_chunk_data: output ciphertext: ok 271s | verify_chunk_data: TAG: ok 271s | test_gcm_vector: text+tag on return 271s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 271s | test_gcm_vector: passed 271s algparse: one block 271s | decode_to_chunk: raw_key: input "0xe98b72a9881a84ca6b76e0f43e68647a" 271s | decode_to_chunk: output: 271s | e9 8b 72 a9 88 1a 84 ca 6b 76 e0 f4 3e 68 64 7a ..r.....kv..>hdz 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbe40 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_GCM 271s | flags: ENCRYPT+DECRYPT 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ad100 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbe40 271s | decode_to_chunk: salted IV: input "0x8b23299fde174053f3d652ba" 271s | decode_to_chunk: output: 271s | 8b 23 29 9f de 17 40 53 f3 d6 52 ba .#)...@S..R. 271s | decode_to_chunk: AAD: input "" 271s | decode_to_chunk: output: 271s | 271s | decode_to_chunk: plaintext: input "0x28286a321293253c3e0aa2704a278032" 271s | decode_to_chunk: output: 271s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 271s | decode_to_chunk: ciphertext: input "0x5a3c1cf1985dbb8bed818036fdd5ab42" 271s | decode_to_chunk: output: 271s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 271s | decode_to_chunk: tag: input "0x23c7ab0f952b7091cd324835043b5eb5" 271s | decode_to_chunk: output: 271s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 271s | test_gcm_vector: decrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 271s | test_gcm_vector: text+tag on call 271s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 271s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 271s | verify_chunk_data: output ciphertext: ok 271s | verify_chunk_data: TAG: ok 271s | test_gcm_vector: text+tag on return 271s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 271s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 271s | test_gcm_vector: encrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 271s | test_gcm_vector: text+tag on call 271s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | verify_chunk_data: output ciphertext: ok 271s | verify_chunk_data: TAG: ok 271s | test_gcm_vector: text+tag on return 271s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 271s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 271s | test_gcm_vector: passed 271s algparse: two blocks 271s | decode_to_chunk: raw_key: input "0xbfd414a6212958a607a0f5d3ab48471d" 271s | decode_to_chunk: output: 271s | bf d4 14 a6 21 29 58 a6 07 a0 f5 d3 ab 48 47 1d ....!)X......HG. 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbe40 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_GCM 271s | flags: ENCRYPT+DECRYPT 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ad100 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbe40 271s | decode_to_chunk: salted IV: input "0x86d8ea0ab8e40dcc481cd0e2" 271s | decode_to_chunk: output: 271s | 86 d8 ea 0a b8 e4 0d cc 48 1c d0 e2 ........H... 271s | decode_to_chunk: AAD: input "" 271s | decode_to_chunk: output: 271s | 271s | decode_to_chunk: plaintext: input "0xa6b76a066e63392c9443e60272ceaeb9d25c991b0f2e55e2804e168c05ea591a" 271s | decode_to_chunk: output: 271s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 271s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 271s | decode_to_chunk: ciphertext: input "0x62171db33193292d930bf6647347652c1ef33316d7feca99d54f1db4fcf513f8" 271s | decode_to_chunk: output: 271s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 271s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 271s | decode_to_chunk: tag: input "0xc28280aa5c6c7a8bd366f28c1cfd1f6e" 271s | decode_to_chunk: output: 271s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 271s | test_gcm_vector: decrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 271s | test_gcm_vector: text+tag on call 271s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 271s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 271s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 271s | verify_chunk_data: output ciphertext: ok 271s | verify_chunk_data: TAG: ok 271s | test_gcm_vector: text+tag on return 271s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 271s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 271s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 271s | test_gcm_vector: encrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 271s | test_gcm_vector: text+tag on call 271s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 271s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | verify_chunk_data: output ciphertext: ok 271s | verify_chunk_data: TAG: ok 271s | test_gcm_vector: text+tag on return 271s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 271s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 271s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 271s | test_gcm_vector: passed 271s algparse: two blocks with associated data 271s | decode_to_chunk: raw_key: input "0x006c458100fc5f4d62949d2c833b82d1" 271s | decode_to_chunk: output: 271s | 00 6c 45 81 00 fc 5f 4d 62 94 9d 2c 83 3b 82 d1 .lE..._Mb..,.;.. 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbe40 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_GCM 271s | flags: ENCRYPT+DECRYPT 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ad100 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbe40 271s | decode_to_chunk: salted IV: input "0xa4e9c4bc5725a21ff42c82b2" 271s | decode_to_chunk: output: 271s | a4 e9 c4 bc 57 25 a2 1f f4 2c 82 b2 ....W%...,.. 271s | decode_to_chunk: AAD: input "0x2efb14fb3657cdd6b9a8ff1a5f5a39b9" 271s | decode_to_chunk: output: 271s | 2e fb 14 fb 36 57 cd d6 b9 a8 ff 1a 5f 5a 39 b9 ....6W......_Z9. 271s | decode_to_chunk: plaintext: input "0xf381d3bfbee0a879f7a4e17b623278cedd6978053dd313530a18f1a836100950" 271s | decode_to_chunk: output: 271s | f3 81 d3 bf be e0 a8 79 f7 a4 e1 7b 62 32 78 ce .......y...{b2x. 271s | dd 69 78 05 3d d3 13 53 0a 18 f1 a8 36 10 09 50 .ix.=..S....6..P 271s | decode_to_chunk: ciphertext: input "0xf39b4db3542d8542fb73fd2d66be568f26d7f814b3f87d1eceac3dd09a8d697e" 271s | decode_to_chunk: output: 271s | f3 9b 4d b3 54 2d 85 42 fb 73 fd 2d 66 be 56 8f ..M.T-.B.s.-f.V. 271s | 26 d7 f8 14 b3 f8 7d 1e ce ac 3d d0 9a 8d 69 7e &.....}...=...i~ 271s | decode_to_chunk: tag: input "0x39f045cb23b698c925db134d56c5" 271s | decode_to_chunk: output: 271s | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 9.E.#...%..MV. 271s | test_gcm_vector: decrypt: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=14 271s | test_gcm_vector: text+tag on call 271s | f3 9b 4d b3 54 2d 85 42 fb 73 fd 2d 66 be 56 8f ..M.T-.B.s.-f.V. 271s | 26 d7 f8 14 b3 f8 7d 1e ce ac 3d d0 9a 8d 69 7e &.....}...=...i~ 271s | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 9.E.#...%..MV. 271s | verify_chunk_data: output ciphertext: ok 271s | verify_chunk_data: TAG: ok 271s | test_gcm_vector: text+tag on return 271s | f3 81 d3 bf be e0 a8 79 f7 a4 e1 7b 62 32 78 ce .......y...{b2x. 271s | dd 69 78 05 3d d3 13 53 0a 18 f1 a8 36 10 09 50 .ix.=..S....6..P 271s | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 9.E.#...%..MV. 271s | test_gcm_vector: encrypt: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=14 271s | test_gcm_vector: text+tag on call 271s | f3 81 d3 bf be e0 a8 79 f7 a4 e1 7b 62 32 78 ce .......y...{b2x. 271s | dd 69 78 05 3d d3 13 53 0a 18 f1 a8 36 10 09 50 .ix.=..S....6..P 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .............. 271s | verify_chunk_data: output ciphertext: ok 271s | verify_chunk_data: TAG: ok 271s | test_gcm_vector: text+tag on return 271s | f3 9b 4d b3 54 2d 85 42 fb 73 fd 2d 66 be 56 8f ..M.T-.B.s.-f.V. 271s | 26 d7 f8 14 b3 f8 7d 1e ce ac 3d d0 9a 8d 69 7e &.....}...=...i~ 271s | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 9.E.#...%..MV. 271s | test_gcm_vector: passed 271s algparse: testing AES_CTR: 271s algparse: Encrypting 16 octets using AES-CTR with 128-bit key 271s | decode_to_chunk: raw_key: input "0x AE 68 52 F8 12 10 67 CC 4B F7 A5 76 55 77 F3 9E" 271s | decode_to_chunk: output: 271s | ae 68 52 f8 12 10 67 cc 4b f7 a5 76 55 77 f3 9e .hR...g.K..vUw.. 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbed0 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_CTR 271s | flags: ENCRYPT+DECRYPT 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ad100 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbed0 271s | decode_to_chunk: input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 271s | decode_to_chunk: output: 271s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 271s | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 271s | decode_to_chunk: output: 271s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 271s | decode_to_chunk: Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 271s | decode_to_chunk: output: 271s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 271s | decode_to_chunk: expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 271s | decode_to_chunk: output: 271s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 271s | do_aes_ctr: enter 271s | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes 271s | do_aes_ctr: exit 271s | verify_chunk_data: encrypt: ok 271s | verify_chunk_data: counter-block: ok 271s | decode_to_chunk: input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 271s | decode_to_chunk: output: 271s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 271s | decode_to_chunk: Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 271s | decode_to_chunk: output: 271s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 271s | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 271s | decode_to_chunk: output: 271s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 271s | decode_to_chunk: expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 271s | decode_to_chunk: output: 271s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 271s | do_aes_ctr: enter 271s | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes 271s | do_aes_ctr: exit 271s | verify_chunk_data: decrypt: ok 271s | verify_chunk_data: counter-block: ok 271s | test_ctr_vector: Encrypting 16 octets using AES-CTR with 128-bit key passed 271s algparse: Encrypting 32 octets using AES-CTR with 128-bit key 271s | decode_to_chunk: raw_key: input "0x 7E 24 06 78 17 FA E0 D7 43 D6 CE 1F 32 53 91 63" 271s | decode_to_chunk: output: 271s | 7e 24 06 78 17 fa e0 d7 43 d6 ce 1f 32 53 91 63 ~$.x....C...2S.c 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbed0 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_CTR 271s | flags: ENCRYPT+DECRYPT 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ad100 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbed0 271s | decode_to_chunk: input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 271s | decode_to_chunk: output: 271s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 271s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 271s | decode_to_chunk: output: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 271s | decode_to_chunk: Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 271s | decode_to_chunk: output: 271s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 271s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 271s | decode_to_chunk: expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 271s | decode_to_chunk: output: 271s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 .l...T;Y.H...... 271s | do_aes_ctr: enter 271s | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes 271s | do_aes_ctr: exit 271s | verify_chunk_data: encrypt: ok 271s | verify_chunk_data: counter-block: ok 271s | decode_to_chunk: input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 271s | decode_to_chunk: output: 271s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 271s | decode_to_chunk: Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 271s | decode_to_chunk: output: 271s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 271s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 271s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 271s | decode_to_chunk: output: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 271s | decode_to_chunk: expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 271s | decode_to_chunk: output: 271s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 .l...T;Y.H...... 271s | do_aes_ctr: enter 271s | do_aes_ctr AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 271s algparse -v2 'ike=aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' 271s AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 271s algparse -v2 'ike=aes+aes128+aes256' 271s AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 271s algparse -v2 'ike=aes128+aes+aes256' 271s AES_CBC_128+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 271s algparse -v2 'ike=aes128+aes256+aes' 271s AES_CBC_128+AES_CBC_256+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 271s algparse -v2 'ike=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' 271s AES_CBC-HMAC_SHA1-MODP8192 271s algparse -v2 'ike=aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' 271s AES_CBC-HMAC_SHA1-MODP8192 271s AES_CBC-HMAC_SHA2_256-MODP8192 271s algparse -v2 'ike=aes_gcm' 271s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 271s algparse -v2 'ike=aes_gcm-sha2' 271s AES_GCM_16-HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 271s algparse -v2 'ike=aes_gcm-sha2-modp2048' 271s AES_GCM_16-HMAC_SHA2_256-MODP2048 271s algparse -v2 'ike=aes_gcm-sha2;modp2048' 271s AES_GCM_16-HMAC_SHA2_256-MODP2048 271s algparse -v2 'ike=aes_gcm-modp2048' 271s ERROR: IKE PRF algorithm 'modp2048' is not recognized 271s algparse -v2 'ike=aes_gcm;modp2048' 271s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 271s algparse -v2 'ike=aes_gcm-none' 271s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 271s algparse -v2 'ike=aes_gcm-none-sha2' 271s AES_GCM_16-HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 271s algparse -v2 'ike=aes_gcm-none-sha2-modp2048' 271s AES_GCM_16-HMAC_SHA2_256-MODP2048 271s algparse -v2 'ike=aes_gcm-none-sha2;modp2048' 271s AES_GCM_16-HMAC_SHA2_256-MODP2048 271s algparse -v2 'ike=aes_gcm-none-modp2048' 271s ERROR: IKE PRF algorithm 'modp2048' is not recognized 271s algparse -v2 'ike=aes_gcm-none;modp2048' 271s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 271s algparse -v2 'ike=aes_gcm-sha1-none-modp2048' 271s ERROR: IKE proposal contains unexpected 'modp2048' 271s algparse -v2 'ike=aes_gcm-sha1-none;modp2048' 271s ERROR: IKE proposal contains unexpected 'modp2048' 271s algparse -v2 'ike=aes+aes_gcm' 271s ERROR: AEAD and non-AEAD IKE encryption algorithm cannot be combined 271s algparse -v2 'ike=,' 271s ERROR: IKE encryption algorithm is empty 271s algparse -v2 'ike=aes,' 271s ERROR: IKE encryption algorithm is empty 271s algparse -v2 'ike=aes,,aes' 271s ERROR: IKE encryption algorithm is empty 271s algparse -v2 'ike=,aes' 271s ERROR: IKE encryption algorithm is empty 271s algparse -v2 'ike=-' 271s ERROR: IKE encryption algorithm is empty 271s algparse -v2 'ike=+' 271s ERROR: IKE encryption algorithm is empty 271s algparse -v2 'ike=;' 271s ERROR: IKE encryption algorithm is empty 271s algparse -v2 'ike=aes-' 271s ERROR: IKE PRF algorithm is empty 271s algparse -v2 'ike=aes+' 271s ERROR: IKE encryption algorithm is empty 271s algparse -v2 'ike=aes;' 271s ERROR: IKE DH algorithm is empty 271s algparse -v2 'ike=-aes' 271s ERROR: IKE encryption algorithm is empty 271s algparse -v2 'ike=+aes' 271s ERROR: IKE encryption algorithm is empty 271s algparse -v2 'ike=;aes' 271s ERROR: IKE encryption algorithm is empty 271s algparse -v2 'ike=aes+-' 271s ERROR: IKE encryption algorithm is empty 271s algparse -v2 'ike=aes+;' 271s ERROR: IKE encryption algorithm is empty 271s algparse -v2 'ike=aes++' 271s ERROR: IKE encryption algorithm is empty 271s testing -ta 271s initializing NSS db 271s running pluto selftest 271s : counter-block updated from 0x1 to 0x3 for 32 bytes 271s | do_aes_ctr: exit 271s | verify_chunk_data: decrypt: ok 271s | verify_chunk_data: counter-block: ok 271s | test_ctr_vector: Encrypting 32 octets using AES-CTR with 128-bit key passed 271s algparse: Encrypting 36 octets using AES-CTR with 128-bit key 271s | decode_to_chunk: raw_key: input "0x 76 91 BE 03 5E 50 20 A8 AC 6E 61 85 29 F9 A0 DC" 271s | decode_to_chunk: output: 271s | 76 91 be 03 5e 50 20 a8 ac 6e 61 85 29 f9 a0 dc v...^P ..na.)... 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbed0 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_CTR 271s | flags: ENCRYPT+DECRYPT 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ad100 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbed0 271s | decode_to_chunk: input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 271s | decode_to_chunk: output: 271s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 271s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 271s | decode_to_chunk: output: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 271s | 20 21 22 23 !"# 271s | decode_to_chunk: Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 271s | decode_to_chunk: output: 271s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 271s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 271s | 25 b2 07 2f %../ 271s | decode_to_chunk: expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 271s | decode_to_chunk: output: 271s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 271s | do_aes_ctr: enter 271s | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes 271s | do_aes_ctr: exit 271s | verify_chunk_data: encrypt: ok 271s | verify_chunk_data: counter-block: ok 271s | decode_to_chunk: input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 271s | decode_to_chunk: output: 271s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 271s | decode_to_chunk: Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 271s | decode_to_chunk: output: 271s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 271s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 271s | 25 b2 07 2f %../ 271s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 271s | decode_to_chunk: output: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 271s | 20 21 22 23 !"# 271s | decode_to_chunk: expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 271s | decode_to_chunk: output: 271s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 271s | do_aes_ctr: enter 271s | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes 271s | do_aes_ctr: exit 271s | verify_chunk_data: decrypt: ok 271s | verify_chunk_data: counter-block: ok 271s | test_ctr_vector: Encrypting 36 octets using AES-CTR with 128-bit key passed 271s algparse: Encrypting 16 octets using AES-CTR with 192-bit key 271s | decode_to_chunk: raw_key: input "0x16 AF 5B 14 5F C9 F5 79 C1 75 F9 3E 3B FB 0E ED86 3D 06 CC FD B7 85 15" 271s | decode_to_chunk: output: 271s | 16 af 5b 14 5f c9 f5 79 c1 75 f9 3e 3b fb 0e ed ..[._..y.u.>;... 271s | 86 3d 06 cc fd b7 85 15 .=...... 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbed0 271s | key-offset: 0, key-size: 24 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_CTR 271s | flags: ENCRYPT+DECRYPT 271s | key_size: 24-bytes 271s | base: base-key@0x7d49c9ad100 (40-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbed0 271s | decode_to_chunk: input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 271s | decode_to_chunk: output: 271s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 271s | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 271s | decode_to_chunk: output: 271s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 271s | decode_to_chunk: Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 271s | decode_to_chunk: output: 271s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 271s | decode_to_chunk: expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 271s | decode_to_chunk: output: 271s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 271s | do_aes_ctr: enter 271s | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes 271s | do_aes_ctr: exit 271s | verify_chunk_data: encrypt: ok 271s | verify_chunk_data: counter-block: ok 271s | decode_to_chunk: input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 271s | decode_to_chunk: output: 271s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 271s | decode_to_chunk: Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 271s | decode_to_chunk: output: 271s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 271s | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 271s | decode_to_chunk: output: 271s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 271s | decode_to_chunk: expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 271s | decode_to_chunk: output: 271s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 271s | do_aes_ctr: enter 271s | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes 271s | do_aes_ctr: exit 271s | verify_chunk_data: decrypt: ok 271s | verify_chunk_data: counter-block: ok 271s | test_ctr_vector: Encrypting 16 octets using AES-CTR with 192-bit key passed 271s algparse: Encrypting 32 octets using AES-CTR with 192-bit key 271s | decode_to_chunk: raw_key: input "0x7C 5C B2 40 1B 3D C3 3C 19 E7 34 08 19 E0 F6 9C67 8C 3D B8 E6 F6 A9 1A" 271s | decode_to_chunk: output: 271s | 7c 5c b2 40 1b 3d c3 3c 19 e7 34 08 19 e0 f6 9c |\.@.=.<..4..... 271s | 67 8c 3d b8 e6 f6 a9 1a g.=..... 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbed0 271s | key-offset: 0, key-size: 24 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_CTR 271s | flags: ENCRYPT+DECRYPT 271s | key_size: 24-bytes 271s | base: base-key@0x7d49c9ad100 (40-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbed0 271s | decode_to_chunk: input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 271s | decode_to_chunk: output: 271s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 271s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 271s | decode_to_chunk: output: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 271s | decode_to_chunk: Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 271s | decode_to_chunk: output: 271s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 271s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 271s | decode_to_chunk: expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 271s | decode_to_chunk: output: 271s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 271s | do_aes_ctr: enter 271s | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes 271s | do_aes_ctr: exit 271s | verify_chunk_data: encrypt: ok 271s | verify_chunk_data: counter-block: ok 271s | decode_to_chunk: input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 271s | decode_to_chunk: output: 271s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 271s | decode_to_chunk: Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 271s | decode_to_chunk: output: 271s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 271s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 271s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 271s | decode_to_chunk: output: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 271s | decode_to_chunk: expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 271s | decode_to_chunk: output: 271s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 271s | do_aes_ctr: enter 271s | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes 271s | do_aes_ctr: exit 271s | verify_chunk_data: decrypt: ok 271s | verify_chunk_data: counter-block: ok 271s | test_ctr_vector: Encrypting 32 octets using AES-CTR with 192-bit key passed 271s algparse: Encrypting 36 octets using AES-CTR with 192-bit key 271s | decode_to_chunk: raw_key: input "0x02 BF 39 1E E8 EC B1 59 B9 59 61 7B 09 65 27 9BF5 9B 60 A7 86 D3 E0 FE" 271s | decode_to_chunk: output: 271s | 02 bf 39 1e e8 ec b1 59 b9 59 61 7b 09 65 27 9b ..9....Y.Ya{.e'. 271s | f5 9b 60 a7 86 d3 e0 fe ..`..... 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbed0 271s | key-offset: 0, key-size: 24 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_CTR 271s | flags: ENCRYPT+DECRYPT 271s | key_size: 24-bytes 271s | base: base-key@0x7d49c9ad100 (40-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbed0 271s | decode_to_chunk: input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 271s | decode_to_chunk: output: 271s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 271s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 271s | decode_to_chunk: output: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 271s | 20 21 22 23 !"# 271s | decode_to_chunk: Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 271s | decode_to_chunk: output: 271s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 271s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 271s | ab ee 09 35 ...5 271s | decode_to_chunk: expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 271s | decode_to_chunk: output: 271s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 271s | do_aes_ctr: enter 271s | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes 271s | do_aes_ctr: exit 271s | verify_chunk_data: encrypt: ok 271s | verify_chunk_data: counter-block: ok 271s | decode_to_chunk: input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 271s | decode_to_chunk: output: 271s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 271s | decode_to_chunk: Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 271s | decode_to_chunk: output: 271s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 271s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 271s | ab ee 09 35 ...5 271s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 271s | decode_to_chunk: output: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 271s | 20 21 22 23 !"# 271s | decode_to_chunk: expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 271s | decode_to_chunk: output: 271s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 271s | do_aes_ctr: enter 271s | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes 271s | do_aes_ctr: exit 271s | verify_chunk_data: decrypt: ok 271s | verify_chunk_data: counter-block: ok 271s | test_ctr_vector: Encrypting 36 octets using AES-CTR with 192-bit key passed 271s algparse: Encrypting 16 octets using AES-CTR with 256-bit key 271s | decode_to_chunk: raw_key: input "0x77 6B EF F2 85 1D B0 6F 4C 8A 05 42 C8 69 6F 6C6A 81 AF 1E EC 96 B4 D3 7F C1 D6 89 E6 C1 C1 04" 271s | decode_to_chunk: output: 271s | 77 6b ef f2 85 1d b0 6f 4c 8a 05 42 c8 69 6f 6c wk.....oL..B.iol 271s | 6a 81 af 1e ec 96 b4 d3 7f c1 d6 89 e6 c1 c1 04 j............... 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbed0 271s | key-offset: 0, key-size: 32 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_CTR 271s | flags: ENCRYPT+DECRYPT 271s | key_size: 32-bytes 271s | base: base-key@0x7d49c9ad100 (48-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbed0 271s | decode_to_chunk: input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 271s | decode_to_chunk: output: 271s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 271s | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 271s | decode_to_chunk: output: 271s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 271s | decode_to_chunk: Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 271s | decode_to_chunk: output: 271s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 271s | decode_to_chunk: expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 271s | decode_to_chunk: output: 271s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 271s | do_aes_ctr: enter 271s | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes 271s | do_aes_ctr: exit 271s | verify_chunk_data: encrypt: ok 271s | verify_chunk_data: counter-block: ok 271s | decode_to_chunk: input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 271s | decode_to_chunk: output: 271s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 271s | decode_to_chunk: Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 271s | decode_to_chunk: output: 271s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 271s | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 271s | decode_to_chunk: output: 271s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 271s | decode_to_chunk: expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 271s | decode_to_chunk: output: 271s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 271s | do_aes_ctr: enter 271s | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes 271s | do_aes_ctr: exit 271s | verify_chunk_data: decrypt: ok 271s | verify_chunk_data: counter-block: ok 271s | test_ctr_vector: Encrypting 16 octets using AES-CTR with 256-bit key passed 271s algparse: Encrypting 32 octets using AES-CTR with 256-bit key 271s | decode_to_chunk: raw_key: input "0xF6 D6 6D 6B D5 2D 59 BB 07 96 36 58 79 EF F8 86C6 6D D5 1A 5B 6A 99 74 4B 50 59 0C 87 A2 38 84" 271s | decode_to_chunk: output: 271s | f6 d6 6d 6b d5 2d 59 bb 07 96 36 58 79 ef f8 86 ..mk.-Y...6Xy... 271s | c6 6d d5 1a 5b 6a 99 74 4b 50 59 0c 87 a2 38 84 .m..[j.tKPY...8. 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbed0 271s | key-offset: 0, key-size: 32 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_CTR 271s | flags: ENCRYPT+DECRYPT 271s | key_size: 32-bytes 271s | base: base-key@0x7d49c9ad100 (48-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbed0 271s | decode_to_chunk: input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 271s | decode_to_chunk: output: 271s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 271s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 271s | decode_to_chunk: output: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 271s | decode_to_chunk: Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 271s | decode_to_chunk: output: 271s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 271s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 271s | decode_to_chunk: expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 271s | decode_to_chunk: output: 271s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 271s | do_aes_ctr: enter 271s | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes 271s | do_aes_ctr: exit 271s | verify_chunk_data: encrypt: ok 271s | verify_chunk_data: counter-block: ok 271s | decode_to_chunk: input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 271s | decode_to_chunk: output: 271s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 271s | decode_to_chunk: Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 271s | decode_to_chunk: output: 271s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 271s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 271s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 271s | decode_to_chunk: output: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 271s | decode_to_chunk: expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 271s | decode_to_chunk: output: 271s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 271s | do_aes_ctr: enter 271s | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes 271s | do_aes_ctr: exit 271s | verify_chunk_data: decrypt: ok 271s | verify_chunk_data: counter-block: ok 271s | test_ctr_vector: Encrypting 32 octets using AES-CTR with 256-bit key passed 271s algparse: Encrypting 36 octets using AES-CTR with 256-bit key 271s | decode_to_chunk: raw_key: input "0xFF 7A 61 7C E6 91 48 E4 F1 72 6E 2F 43 58 1D E2AA 62 D9 F8 05 53 2E DF F1 EE D6 87 FB 54 15 3D" 271s | decode_to_chunk: output: 271s | ff 7a 61 7c e6 91 48 e4 f1 72 6e 2f 43 58 1d e2 .za|..H..rn/CX.. 271s | aa 62 d9 f8 05 53 2e df f1 ee d6 87 fb 54 15 3d .b...S.......T.= 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbed0 271s | key-offset: 0, key-size: 32 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_CTR 271s | flags: ENCRYPT+DECRYPT 271s | key_size: 32-bytes 271s | base: base-key@0x7d49c9ad100 (48-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbed0 271s | decode_to_chunk: input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 271s | decode_to_chunk: output: 271s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 271s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 271s | decode_to_chunk: output: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 271s | 20 21 22 23 !"# 271s | decode_to_chunk: Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 271s | decode_to_chunk: output: 271s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 271s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 271s | 1e c0 e6 b8 .... 271s | decode_to_chunk: expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 271s | decode_to_chunk: output: 271s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 271s | do_aes_ctr: enter 271s | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes 271s | do_aes_ctr: exit 271s | verify_chunk_data: encrypt: ok 271s | verify_chunk_data: counter-block: ok 271s | decode_to_chunk: input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 271s | decode_to_chunk: output: 271s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 271s | decode_to_chunk: Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 271s | decode_to_chunk: output: 271s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 271s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 271s | 1e c0 e6 b8 .... 271s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 271s | decode_to_chunk: output: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 271s | 20 21 22 23 !"# 271s | decode_to_chunk: expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 271s | decode_to_chunk: output: 271s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 271s | do_aes_ctr: enter 271s | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes 271s | do_aes_ctr: exit 271s | verify_chunk_data: decrypt: ok 271s | verify_chunk_data: counter-block: ok 271s | test_ctr_vector: Encrypting 36 octets using AES-CTR with 256-bit key passed 271s algparse: testing AES_CBC: 271s algparse: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 271s | decode_to_chunk: raw_key: input "0x06a9214036b8a15b512e03d534120006" 271s | decode_to_chunk: output: 271s | 06 a9 21 40 36 b8 a1 5b 51 2e 03 d5 34 12 00 06 ..!@6..[Q...4... 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbee0 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_CBC 271s | flags: ENCRYPT+DECRYPT 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ad100 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbee0 271s | decode_to_chunk: IV: : input "0x3dafba429d9eb430b422da802c9fac41" 271s | decode_to_chunk: output: 271s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 271s | decode_to_chunk: new IV: : input "0xe353779c1079aeb82708942dbe77181a" 271s | decode_to_chunk: output: 271s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 271s | decode_to_chunk: plaintext: : input "Single block msg" 271s | decode_to_chunk: output: 271s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 271s | decode_to_chunk: ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 271s | decode_to_chunk: output: 271s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 271s | NSS ike_alg_nss_cbc: AES_CBC - enter 271s | NSS ike_alg_nss_cbc: AES_CBC - exit 271s | verify_chunk_data: encrypt: ok 271s | verify_chunk_data: updated CBC IV: ok 271s | decode_to_chunk: IV: : input "0x3dafba429d9eb430b422da802c9fac41" 271s | decode_to_chunk: output: 271s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 271s | decode_to_chunk: new IV: : input "0xe353779c1079aeb82708942dbe77181a" 271s | decode_to_chunk: output: 271s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 271s | decode_to_chunk: ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 271s | decode_to_chunk: output: 271s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 271s | decode_to_chunk: plaintext: : input "Single block msg" 271s | decode_to_chunk: output: 271s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 271s | NSS ike_alg_nss_cbc: AES_CBC - enter 271s | NSS ike_alg_nss_cbc: AES_CBC - exit 271s | verify_chunk_data: decrypt: ok 271s | verify_chunk_data: updated CBC IV: ok 271s | test_ctr_vector: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key passed 271s algparse: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 271s | decode_to_chunk: raw_key: input "0xc286696d887c9aa0611bbb3e2025a45a" 271s | decode_to_chunk: output: 271s | c2 86 69 6d 88 7c 9a a0 61 1b bb 3e 20 25 a4 5a ..im.|..a..> %.Z 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbee0 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_CBC 271s | flags: ENCRYPT+DECRYPT 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ad100 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbee0 271s | decode_to_chunk: IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 271s | decode_to_chunk: output: 271s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 271s | decode_to_chunk: new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 271s | decode_to_chunk: output: 271s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 271s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 271s | decode_to_chunk: plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 271s | decode_to_chunk: output: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 271s | decode_to_chunk: ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 271s | decode_to_chunk: output: 271s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 271s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 271s | NSS ike_alg_nss_cbc: AES_CBC - enter 271s | NSS ike_alg_nss_cbc: AES_CBC - exit 271s | verify_chunk_data: encrypt: ok 271s | verify_chunk_data: updated CBC IV: ok 271s | decode_to_chunk: IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 271s | decode_to_chunk: output: 271s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 271s | decode_to_chunk: new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 271s | decode_to_chunk: output: 271s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 271s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 271s | decode_to_chunk: ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 271s | decode_to_chunk: output: 271s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 271s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 271s | decode_to_chunk: plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 271s | decode_to_chunk: output: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 271s | NSS ike_alg_nss_cbc: AES_CBC - enter 271s | NSS ike_alg_nss_cbc: AES_CBC - exit 271s | verify_chunk_data: decrypt: ok 271s | verify_chunk_data: updated CBC IV: ok 271s | test_ctr_vector: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key passed 271s algparse: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 271s | decode_to_chunk: raw_key: input "0x6c3ea0477630ce21a2ce334aa746c2cd" 271s | decode_to_chunk: output: 271s | 6c 3e a0 47 76 30 ce 21 a2 ce 33 4a a7 46 c2 cd l>.Gv0.!..3J.F.. 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbee0 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_CBC 271s | flags: ENCRYPT+DECRYPT 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ad100 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbee0 271s | decode_to_chunk: IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 271s | decode_to_chunk: output: 271s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 271s | decode_to_chunk: new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 271s | decode_to_chunk: output: 271s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 271s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 271s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 271s | decode_to_chunk: plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 271s | decode_to_chunk: output: 271s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 271s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 271s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 271s | decode_to_chunk: ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 271s | decode_to_chunk: output: 271s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 271s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 271s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 271s | NSS ike_alg_nss_cbc: AES_CBC - enter 271s | NSS ike_alg_nss_cbc: AES_CBC - exit 271s | verify_chunk_data: encrypt: ok 271s | verify_chunk_data: updated CBC IV: ok 271s | decode_to_chunk: IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 271s | decode_to_chunk: output: 271s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 271s | decode_to_chunk: new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 271s | decode_to_chunk: output: 271s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 271s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 271s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 271s | decode_to_chunk: ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 271s | decode_to_chunk: output: 271s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 271s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 271s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 271s | decode_to_chunk: plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 271s | decode_to_chunk: output: 271s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 271s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 271s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 271s | NSS ike_alg_nss_cbc: AES_CBC - enter 271s | NSS ike_alg_nss_cbc: AES_CBC - exit 271s | verify_chunk_data: decrypt: ok 271s | verify_chunk_data: updated CBC IV: ok 271s | test_ctr_vector: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key passed 271s algparse: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 271s | decode_to_chunk: raw_key: input "0x56e47a38c5598974bc46903dba290349" 271s | decode_to_chunk: output: 271s | 56 e4 7a 38 c5 59 89 74 bc 46 90 3d ba 29 03 49 V.z8.Y.t.F.=.).I 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbee0 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_CBC 271s | flags: ENCRYPT+DECRYPT 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ad100 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbee0 271s | decode_to_chunk: IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 271s | decode_to_chunk: output: 271s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 271s | decode_to_chunk: plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 271s | decode_to_chunk: output: 271s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 271s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 271s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 271s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 271s | decode_to_chunk: ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 271s | decode_to_chunk: output: 271s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 271s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 271s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 271s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 271s | NSS ike_alg_nss_cbc: AES_CBC - enter 271s | NSS ike_alg_nss_cbc: AES_CBC - exit 271s | verify_chunk_data: encrypt: ok 271s | verify_chunk_data: updated CBC IV: ok 271s | decode_to_chunk: IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 271s | decode_to_chunk: output: 271s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 271s | decode_to_chunk: ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 271s | decode_to_chunk: output: 271s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 271s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 271s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 271s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 271s | decode_to_chunk: plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 271s | decode_to_chunk: output: 271s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 271s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 271s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 271s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 271s | NSS ike_alg_nss_cbc: AES_CBC - enter 271s | NSS ike_alg_nss_cbc: AES_CBC - exit 271s | verify_chunk_data: decrypt: ok 271s | verify_chunk_data: updated CBC IV: ok 271s | test_ctr_vector: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key passed 271s algparse: testing AES_XCBC: 271s algparse: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 271s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 271s | decode_to_chunk: output: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | decode_to_chunk: test_prf_vector: input "" 271s | decode_to_chunk: output: 271s | 271s | decode_to_chunk: test_prf_vector: input "0x75f0251d528ac01c4573dfd584d79f29" 271s | decode_to_chunk: output: 271s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 271s | PRF chunk interface PRF AES_XCBC init key-chunk@0x7d49c9ad9f0 (length 16) 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbd40 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ad100 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbd40 271s | XCBC: Key 16=16 just right 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ab6f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbc68 271s | PRF chunk interface PRF AES_XCBC 0x7d49c9adb80 271s | PRF chunk interface PRF AES_XCBC update message (0x7d49c9ad2e0 length 0) 271s | 271s | XCBC: data 271s | 271s | K extracting all 16 bytes of key@0x7d49c9ad100 271s | K: symkey-key@0x7d49c9ad100 (16-bytes, AES_ECB) 271s | sizeof bytes 16 271s | wrapper: (SECItemType)55: c9 b1 32 e9 67 b8 8d 37 86 72 85 97 7e b8 39 5c 271s | K extracted len 16 bytes at 0x7d49c9ab820 271s | unwrapped: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | XCBC: K: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | XCBC: K1 271s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbbe0 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b0f40 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbbe0 271s | Computing E[0] using K3 271s | XCBC: K3 271s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 271s | XCBC: E[n-1] 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | XCBC: M[n] 271s | 271s | XCBC: M[n] 271s | 271s | XCBC: M[n]:80...^E[n-1]^K3 271s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 271s | XCBC: MAC 271s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 271s | PRF chunk interface PRF AES_XCBC final length 16 271s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 271s | chunk output 271s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 271s | verify_chunk_data: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: ok 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbe40 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ab6f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbe40 271s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x7d49c9ad100 (size 16) 271s | PRF symkey interface: key symkey-key@0x7d49c9ad100 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | XCBC: Key 16=16 just right 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ad100 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbcc8 271s | PRF symkey interface PRF AES_XCBC 0x7d49c9adb80 271s | PRF symkey interface PRF AES_XCBC update symkey message-key@(nil) (size 0) 271s | PRF symkey interface: symkey message-key@NULL 271s | symkey message NULL key has no bytes 271s | XCBC: data 271s | 271s | K extracting all 16 bytes of key@0x7d49c9ab6f0 271s | K: symkey-key@0x7d49c9ab6f0 (16-bytes, AES_ECB) 271s | sizeof bytes 16 271s | wrapper: (SECItemType)-842024904: c9 b1 32 e9 67 b8 8d 37 86 72 85 97 7e b8 39 5c 271s | K extracted len 16 bytes at 0x7d49c9ad4f0 271s | unwrapped: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | XCBC: K: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | XCBC: K1 271s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbc20 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b27d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbc20 271s | Computing E[0] using K3 271s | XCBC: K3 271s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 271s | XCBC: E[n-1] 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | XCBC: M[n] 271s | 271s | XCBC: M[n] 271s | 271s | XCBC: M[n]:80...^E[n-1]^K3 271s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 271s | XCBC: MAC 271s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbd50 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b27d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbd50 271s | PRF symkey interface PRF AES_XCBC final-key@0x7d49c9b0f40 (size 16) 271s | PRF symkey interface: key-key@0x7d49c9b0f40 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | output: symkey-key@0x7d49c9b0f40 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracting all 16 bytes of key@0x7d49c9b0f40 271s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: symkey-key@0x7d49c9b0f40 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | sizeof bytes 16 271s | wrapper: (SECItemType)-842024544: 43 e5 42 e1 f8 13 02 81 00 6f 54 73 dd 40 f0 91 271s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracted len 16 bytes at 0x7d49c9ab820 271s | unwrapped: 271s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 271s | verify_chunk_data: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: ok 271s | test_prf_vector: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input passed 271s algparse: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 271s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 271s | decode_to_chunk: output: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | decode_to_chunk: test_prf_vector: input "0x000102" 271s | decode_to_chunk: output: 271s | 00 01 02 ... 271s | decode_to_chunk: test_prf_vector: input "0x5b376580ae2f19afe7219ceef172756f" 271s | decode_to_chunk: output: 271s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 271s | PRF chunk interface PRF AES_XCBC init key-chunk@0x7d49c9ad0b0 (length 16) 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbd40 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ad100 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbd40 271s | XCBC: Key 16=16 just right 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b0f40 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbc68 271s | PRF chunk interface PRF AES_XCBC 0x7d49c9adb80 271s | PRF chunk interface PRF AES_XCBC update message (0x7d49c9ad4f0 length 3) 271s | 00 01 02 ... 271s | XCBC: data 271s | 00 01 02 ... 271s | K extracting all 16 bytes of key@0x7d49c9ad100 271s | K: symkey-key@0x7d49c9ad100 (16-bytes, AES_ECB) 271s | sizeof bytes 16 271s | wrapper: (SECItemType)58: c9 b1 32 e9 67 b8 8d 37 86 72 85 97 7e b8 39 5c 271s | K extracted len 16 bytes at 0x7d49c9ab820 271s | unwrapped: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | XCBC: K: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | XCBC: K1 271s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbbe0 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ab6f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbbe0 271s | Computing E[1] using K3 271s | XCBC: K3 271s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 271s | XCBC: E[n-1] 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | XCBC: M[n] 271s | 00 01 02 ... 271s | XCBC: M[n] 271s | 00 01 02 ... 271s | XCBC: M[n]:80...^E[n-1]^K3 271s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 271s | XCBC: MAC 271s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 271s | PRF chunk interface PRF AES_XCBC final length 16 271s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 271s | chunk output 271s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 271s | verify_chunk_data: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: ok 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbe40 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b0f40 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbe40 271s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x7d49c9ad100 (size 16) 271s | PRF symkey interface: key symkey-key@0x7d49c9ad100 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | XCBC: Key 16=16 just right 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ad100 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbcc8 271s | PRF symkey interface PRF AES_XCBC 0x7d49c9adb80 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbe40 271s | key-offset: 0, key-size: 3 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 3-bytes 271s | base: base-key@0x7d49c9b27d0 (19-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbe40 271s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x7d49c9ab6f0 (size 3) 271s | PRF symkey interface: symkey message-key@0x7d49c9ab6f0 (3-bytes, EXTRACT_KEY_FROM_KEY) 271s | symkey message extracting all 3 bytes of key@0x7d49c9ab6f0 271s | symkey message: symkey-key@0x7d49c9ab6f0 (3-bytes, EXTRACT_KEY_FROM_KEY) 271s | sizeof bytes 16 271s | wrapper: siClearDataBuffer: 6e 8f a2 fa 3a ac a9 9f ed 85 c3 f8 06 66 64 91 271s | symkey message extracted len 16 bytes at 0x7d49c9af390 271s | unwrapped: 271s | 00 01 02 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | XCBC: data 271s | 00 01 02 ... 271s | K extracting all 16 bytes of key@0x7d49c9b0f40 271s | K: symkey-key@0x7d49c9b0f40 (16-bytes, AES_ECB) 271s | sizeof bytes 16 271s | wrapper: siDERCertBuffer: c9 b1 32 e9 67 b8 8d 37 86 72 85 97 7e b8 39 5c 271s | K extracted len 16 bytes at 0x7d49c9ab820 271s | unwrapped: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | XCBC: K: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | XCBC: K1 271s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbc20 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b4060 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbc20 271s | Computing E[1] using K3 271s | XCBC: K3 271s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 271s | XCBC: E[n-1] 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | XCBC: M[n] 271s | 00 01 02 ... 271s | XCBC: M[n] 271s | 00 01 02 ... 271s | XCBC: M[n]:80...^E[n-1]^K3 271s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 271s | XCBC: MAC 271s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbd50 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b4060 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbd50 271s | PRF symkey interface PRF AES_XCBC final-key@0x7d49c9b27d0 (size 16) 271s | PRF symkey interface: key-key@0x7d49c9b27d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | output: symkey-key@0x7d49c9b27d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracting all 16 bytes of key@0x7d49c9b27d0 271s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: symkey-key@0x7d49c9b27d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | sizeof bytes 16 271s | wrapper: (SECItemType)-842024544: aa b2 d5 5c 31 70 04 0a e1 dd 4f bf 69 a2 46 71 271s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracted len 16 bytes at 0x7d49c9ab820 271s | unwrapped: 271s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 271s | verify_chunk_data: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: ok 271s | test_prf_vector: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input passed 271s algparse: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 271s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 271s | decode_to_chunk: output: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 271s | decode_to_chunk: output: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | decode_to_chunk: test_prf_vector: input "0xd2a246fa349b68a79998a4394ff7a263" 271s | decode_to_chunk: output: 271s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 271s | PRF chunk interface PRF AES_XCBC init key-chunk@0x7d49c9ad9f0 (length 16) 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbd40 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ad100 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbd40 271s | XCBC: Key 16=16 just right 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b27d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbc68 271s | PRF chunk interface PRF AES_XCBC 0x7d49c9adb80 271s | PRF chunk interface PRF AES_XCBC update message (0x7d49c9af3b0 length 16) 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | XCBC: data 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | K extracting all 16 bytes of key@0x7d49c9ad100 271s | K: symkey-key@0x7d49c9ad100 (16-bytes, AES_ECB) 271s | sizeof bytes 16 271s | wrapper: (SECItemType)71: c9 b1 32 e9 67 b8 8d 37 86 72 85 97 7e b8 39 5c 271s | K extracted len 16 bytes at 0x7d49c9ab820 271s | unwrapped: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | XCBC: K: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | XCBC: K1 271s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbbe0 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ab6f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbbe0 271s | XCBC: Computing E[1] using K2 271s | XCBC: K2 271s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 271s | XCBC: E[n-1] 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | XCBC: M[n] 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | XCBC: M[n]^E[n-1]^K2 271s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 271s | XCBC: MAC 271s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 271s | PRF chunk interface PRF AES_XCBC final length 16 271s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 271s | chunk output 271s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 271s | verify_chunk_data: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: ok 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbe40 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b27d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbe40 271s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x7d49c9ad100 (size 16) 271s | PRF symkey interface: key symkey-key@0x7d49c9ad100 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | XCBC: Key 16=16 just right 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ad100 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbcc8 271s | PRF symkey interface PRF AES_XCBC 0x7d49c9adb80 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbe40 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b0f40 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbe40 271s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x7d49c9ab6f0 (size 16) 271s | PRF symkey interface: symkey message-key@0x7d49c9ab6f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | symkey message extracting all 16 bytes of key@0x7d49c9ab6f0 271s | symkey message: symkey-key@0x7d49c9ab6f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | sizeof bytes 16 271s | wrapper: siClearDataBuffer: c9 b1 32 e9 67 b8 8d 37 86 72 85 97 7e b8 39 5c 271s | symkey message extracted len 16 bytes at 0x7d49c9ab820 271s | unwrapped: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | XCBC: data 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | K extracting all 16 bytes of key@0x7d49c9b27d0 271s | K: symkey-key@0x7d49c9b27d0 (16-bytes, AES_ECB) 271s | sizeof bytes 16 271s | wrapper: (SECItemType)16: c9 b1 32 e9 67 b8 8d 37 86 72 85 97 7e b8 39 5c 271s | K extracted len 16 bytes at 0x7d49c9ab820 271s | unwrapped: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | XCBC: K: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | XCBC: K1 271s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbc20 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b4060 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbc20 271s | XCBC: Computing E[1] using K2 271s | XCBC: K2 271s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 271s | XCBC: E[n-1] 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | XCBC: M[n] 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | XCBC: M[n]^E[n-1]^K2 271s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 271s | XCBC: MAC 271s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbd50 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b4060 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbd50 271s | PRF symkey interface PRF AES_XCBC final-key@0x7d49c9b0f40 (size 16) 271s | PRF symkey interface: key-key@0x7d49c9b0f40 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | output: symkey-key@0x7d49c9b0f40 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracting all 16 bytes of key@0x7d49c9b0f40 271s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: symkey-key@0x7d49c9b0f40 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | sizeof bytes 16 271s | wrapper: (SECItemType)-842024544: a8 1e 6c 73 5e e7 b6 fd ad 0e 17 a8 e4 e3 b1 1c 271s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracted len 16 bytes at 0x7d49c9ab820 271s | unwrapped: 271s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 271s | verify_chunk_data: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: ok 271s | test_prf_vector: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input passed 271s algparse: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 271s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 271s | decode_to_chunk: output: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 271s | decode_to_chunk: output: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 .... 271s | decode_to_chunk: test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 271s | decode_to_chunk: output: 271s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 271s | PRF chunk interface PRF AES_XCBC init key-chunk@0x7d49c9ab6d0 (length 16) 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbd40 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ad100 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbd40 271s | XCBC: Key 16=16 just right 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b0f40 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbc68 271s | PRF chunk interface PRF AES_XCBC 0x7d49c9adb80 271s | PRF chunk interface PRF AES_XCBC update message (0x7d49c9ad4f0 length 20) 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 .... 271s | XCBC: data 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 .... 271s | K extracting all 16 bytes of key@0x7d49c9ad100 271s | K: symkey-key@0x7d49c9ad100 (16-bytes, AES_ECB) 271s | sizeof bytes 16 271s | wrapper: (SECItemType)59: c9 b1 32 e9 67 b8 8d 37 86 72 85 97 7e b8 39 5c 271s | K extracted len 16 bytes at 0x7d49c9ab820 271s | unwrapped: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | XCBC: K: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | XCBC: K1 271s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbbe0 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ab6f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbbe0 271s | Computing E[2] using K3 271s | XCBC: K3 271s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 271s | XCBC: E[n-1] 271s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 271s | XCBC: M[n] 271s | 10 11 12 13 .... 271s | XCBC: M[n] 271s | 10 11 12 13 .... 271s | XCBC: M[n]:80...^E[n-1]^K3 271s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 271s | XCBC: MAC 271s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 271s | PRF chunk interface PRF AES_XCBC final length 16 271s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 271s | chunk output 271s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 271s | verify_chunk_data: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: ok 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbe40 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b0f40 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbe40 271s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x7d49c9ad100 (size 16) 271s | PRF symkey interface: key symkey-key@0x7d49c9ad100 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | XCBC: Key 16=16 just right 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ad100 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbcc8 271s | PRF symkey interface PRF AES_XCBC 0x7d49c9adb80 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbe40 271s | key-offset: 0, key-size: 20 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 20-bytes 271s | base: base-key@0x7d49c9b27d0 (36-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbe40 271s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x7d49c9ab6f0 (size 20) 271s | PRF symkey interface: symkey message-key@0x7d49c9ab6f0 (20-bytes, EXTRACT_KEY_FROM_KEY) 271s | symkey message extracting all 20 bytes of key@0x7d49c9ab6f0 271s | symkey message: symkey-key@0x7d49c9ab6f0 (20-bytes, EXTRACT_KEY_FROM_KEY) 271s | sizeof bytes 32 271s | wrapper: siClearDataBuffer: c9 b1 32 e9 67 b8 8d 37 86 72 85 97 7e b8 39 5c b9 c6 15 32 bb 05 46 0c e7 9e b6 c3 e0 93 fc 8e 271s | symkey message extracted len 32 bytes at 0x7d49c9af2d0 271s | unwrapped: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | XCBC: data 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 .... 271s | K extracting all 16 bytes of key@0x7d49c9b0f40 271s | K: symkey-key@0x7d49c9b0f40 (16-bytes, AES_ECB) 271s | sizeof bytes 16 271s | wrapper: (SECItemType)20: c9 b1 32 e9 67 b8 8d 37 86 72 85 97 7e b8 39 5c 271s | K extracted len 16 bytes at 0x7d49c9ab820 271s | unwrapped: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | XCBC: K: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | XCBC: K1 271s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbc20 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b4060 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbc20 271s | Computing E[2] using K3 271s | XCBC: K3 271s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 271s | XCBC: E[n-1] 271s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 271s | XCBC: M[n] 271s | 10 11 12 13 .... 271s | XCBC: M[n] 271s | 10 11 12 13 .... 271s | XCBC: M[n]:80...^E[n-1]^K3 271s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 271s | XCBC: MAC 271s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbd50 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b4060 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbd50 271s | PRF symkey interface PRF AES_XCBC final-key@0x7d49c9b27d0 (size 16) 271s | PRF symkey interface: key-key@0x7d49c9b27d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | output: symkey-key@0x7d49c9b27d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracting all 16 bytes of key@0x7d49c9b27d0 271s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: symkey-key@0x7d49c9b27d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | sizeof bytes 16 271s | wrapper: (SECItemType)-842024544: 5e d5 05 57 83 30 46 35 1d f4 d6 b4 c4 cd 22 61 271s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracted len 16 bytes at 0x7d49c9ab820 271s | unwrapped: 271s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 271s | verify_chunk_data: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: ok 271s | test_prf_vector: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input passed 271s algparse: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 271s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 271s | decode_to_chunk: output: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 271s | decode_to_chunk: output: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 271s | decode_to_chunk: test_prf_vector: input "0xf54f0ec8d2b9f3d36807734bd5283fd4" 271s | decode_to_chunk: output: 271s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 271s | PRF chunk interface PRF AES_XCBC init key-chunk@0x7d49c992860 (length 16) 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbd40 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ad100 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbd40 271s | XCBC: Key 16=16 just right 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b27d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbc68 271s | PRF chunk interface PRF AES_XCBC 0x7d49c9adb80 271s | PRF chunk interface PRF AES_XCBC update message (0x7d49c9ab820 length 32) 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 271s | XCBC: data 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 271s | K extracting all 16 bytes of key@0x7d49c9ad100 271s | K: symkey-key@0x7d49c9ad100 (16-bytes, AES_ECB) 271s | sizeof bytes 16 271s | wrapper: (SECItemType)71: c9 b1 32 e9 67 b8 8d 37 86 72 85 97 7e b8 39 5c 271s | K extracted len 16 bytes at 0x7d49c9ad0b0 271s | unwrapped: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | XCBC: K: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | XCBC: K1 271s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbbe0 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ab6f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbbe0 271s | XCBC: Computing E[2] using K2 271s | XCBC: K2 271s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 271s | XCBC: E[n-1] 271s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 271s | XCBC: M[n] 271s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 271s | XCBC: M[n]^E[n-1]^K2 271s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 271s | XCBC: MAC 271s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 271s | PRF chunk interface PRF AES_XCBC final length 16 271s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 271s | chunk output 271s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 271s | verify_chunk_data: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: ok 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbe40 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b27d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbe40 271s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x7d49c9ad100 (size 16) 271s | PRF symkey interface: key symkey-key@0x7d49c9ad100 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | XCBC: Key 16=16 just right 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ad100 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbcc8 271s | PRF symkey interface PRF AES_XCBC 0x7d49c9adb80 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbe40 271s | key-offset: 0, key-size: 32 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 32-bytes 271s | base: base-key@0x7d49c9b0f40 (48-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbe40 271s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x7d49c9ab6f0 (size 32) 271s | PRF symkey interface: symkey message-key@0x7d49c9ab6f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | symkey message extracting all 32 bytes of key@0x7d49c9ab6f0 271s | symkey message: symkey-key@0x7d49c9ab6f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | sizeof bytes 32 271s | wrapper: siClearDataBuffer: c9 b1 32 e9 67 b8 8d 37 86 72 85 97 7e b8 39 5c f9 11 52 50 dc c7 2b 4d 54 26 0c 2c 43 e3 12 53 271s | symkey message extracted len 32 bytes at 0x7d49c9af300 271s | unwrapped: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 271s | XCBC: data 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 271s | K extracting all 16 bytes of key@0x7d49c9b27d0 271s | K: symkey-key@0x7d49c9b27d0 (16-bytes, AES_ECB) 271s | sizeof bytes 16 271s | wrapper: (SECItemType)32: c9 b1 32 e9 67 b8 8d 37 86 72 85 97 7e b8 39 5c 271s | K extracted len 16 bytes at 0x7d49c9ad470 271s | unwrapped: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | XCBC: K: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | XCBC: K1 271s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbc20 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b4060 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbc20 271s | XCBC: Computing E[2] using K2 271s | XCBC: K2 271s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 271s | XCBC: E[n-1] 271s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 271s | XCBC: M[n] 271s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 271s | XCBC: M[n]^E[n-1]^K2 271s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 271s | XCBC: MAC 271s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbd50 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b4060 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbd50 271s | PRF symkey interface PRF AES_XCBC final-key@0x7d49c9b0f40 (size 16) 271s | PRF symkey interface: key-key@0x7d49c9b0f40 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | output: symkey-key@0x7d49c9b0f40 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracting all 16 bytes of key@0x7d49c9b0f40 271s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: symkey-key@0x7d49c9b0f40 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | sizeof bytes 16 271s | wrapper: (SECItemType)-842024544: 5f 17 ba 84 38 b2 97 b9 d5 49 42 8c e1 60 57 b5 271s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracted len 16 bytes at 0x7d49c9ad4f0 271s | unwrapped: 271s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 271s | verify_chunk_data: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: ok 271s | test_prf_vector: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input passed 271s algparse: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 271s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 271s | decode_to_chunk: output: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f2021" 271s | decode_to_chunk: output: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 271s | 20 21 ! 271s | decode_to_chunk: test_prf_vector: input "0xbecbb3bccdb518a30677d5481fb6b4d8" 271s | decode_to_chunk: output: 271s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 271s | PRF chunk interface PRF AES_XCBC init key-chunk@0x7d49c9af390 (length 16) 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbd40 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ad100 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbd40 271s | XCBC: Key 16=16 just right 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b0f40 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbc68 271s | PRF chunk interface PRF AES_XCBC 0x7d49c9adb80 271s | PRF chunk interface PRF AES_XCBC update message (0x7d49c9ad080 length 34) 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 271s | 20 21 ! 271s | XCBC: data 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 271s | 20 21 ! 271s | K extracting all 16 bytes of key@0x7d49c9ad100 271s | K: symkey-key@0x7d49c9ad100 (16-bytes, AES_ECB) 271s | sizeof bytes 16 271s | wrapper: (SECItemType)57: c9 b1 32 e9 67 b8 8d 37 86 72 85 97 7e b8 39 5c 271s | K extracted len 16 bytes at 0x7d49c9af3b0 271s | unwrapped: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | XCBC: K: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | XCBC: K1 271s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbbe0 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ab6f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbbe0 271s | Computing E[3] using K3 271s | XCBC: K3 271s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 271s | XCBC: E[n-1] 271s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 271s | XCBC: M[n] 271s | 20 21 ! 271s | XCBC: M[n] 271s | 20 21 ! 271s | XCBC: M[n]:80...^E[n-1]^K3 271s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 271s | XCBC: MAC 271s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 271s | PRF chunk interface PRF AES_XCBC final length 16 271s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 271s | chunk output 271s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 271s | verify_chunk_data: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: ok 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbe40 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b0f40 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbe40 271s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x7d49c9ad100 (size 16) 271s | PRF symkey interface: key symkey-key@0x7d49c9ad100 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | XCBC: Key 16=16 just right 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ad100 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbcc8 271s | PRF symkey interface PRF AES_XCBC 0x7d49c9ab820 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbe40 271s | key-offset: 0, key-size: 34 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 34-bytes 271s | base: base-key@0x7d49c9b27d0 (50-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbe40 271s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x7d49c9ab6f0 (size 34) 271s | PRF symkey interface: symkey message-key@0x7d49c9ab6f0 (34-bytes, EXTRACT_KEY_FROM_KEY) 271s | symkey message extracting all 34 bytes of key@0x7d49c9ab6f0 271s | symkey message: symkey-key@0x7d49c9ab6f0 (34-bytes, EXTRACT_KEY_FROM_KEY) 271s | sizeof bytes 48 271s | wrapper: siClearDataBuffer: c9 b1 32 e9 67 b8 8d 37 86 72 85 97 7e b8 39 5c f9 11 52 50 dc c7 2b 4d 54 26 0c 2c 43 e3 12 53 af 4b ed 1d c6 c5 50 8a 3e 0b 4a da d4 a0 97 ff 271s | symkey message extracted len 48 bytes at 0x7d49c9b4240 271s | unwrapped: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 271s | 20 21 00 00 00 00 00 00 00 00 00 00 00 00 00 00 !.............. 271s | XCBC: data 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 271s | 20 21 ! 271s | K extracting all 16 bytes of key@0x7d49c9b0f40 271s | K: symkey-key@0x7d49c9b0f40 (16-bytes, AES_ECB) 271s | sizeof bytes 16 271s | wrapper: (SECItemType)34: c9 b1 32 e9 67 b8 8d 37 86 72 85 97 7e b8 39 5c 271s | K extracted len 16 bytes at 0x7d49c9ab6d0 271s | unwrapped: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | XCBC: K: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | XCBC: K1 271s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbc20 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b4060 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbc20 271s | Computing E[3] using K3 271s | XCBC: K3 271s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 271s | XCBC: E[n-1] 271s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 271s | XCBC: M[n] 271s | 20 21 ! 271s | XCBC: M[n] 271s | 20 21 ! 271s | XCBC: M[n]:80...^E[n-1]^K3 271s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 271s | XCBC: MAC 271s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbd50 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b4060 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbd50 271s | PRF symkey interface PRF AES_XCBC final-key@0x7d49c9b27d0 (size 16) 271s | PRF symkey interface: key-key@0x7d49c9b27d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | output: symkey-key@0x7d49c9b27d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracting all 16 bytes of key@0x7d49c9b27d0 271s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: symkey-key@0x7d49c9b27d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | sizeof bytes 16 271s | wrapper: (SECItemType)-842024544: d9 77 9e 26 c7 29 3f d1 65 26 67 5c 00 31 4b 52 271s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracted len 16 bytes at 0x7d49c9ad4f0 271s | unwrapped: 271s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 271s | verify_chunk_data: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: ok 271s | test_prf_vector: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input passed 271s algparse: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 271s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 271s | decode_to_chunk: output: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | decode_to_chunk: test_prf_vector: input "0xf0dafee895db30253761103b5d84528f" 271s | decode_to_chunk: output: 271s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 271s | PRF chunk interface PRF AES_XCBC init key-chunk@0x7d49c9ad9d0 (length 16) 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbd40 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ad100 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbd40 271s | XCBC: Key 16=16 just right 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b27d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbc68 271s | PRF chunk interface PRF AES_XCBC 0x7d49c9adb80 271s | PRF chunk interface PRF AES_XCBC update message (0x7d49c9aba50 length 1000) 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 ........ 271s | XCBC: data 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 ........ 271s | K extracting all 16 bytes of key@0x7d49c9ad100 271s | K: symkey-key@0x7d49c9ad100 (16-bytes, AES_ECB) 271s | sizeof bytes 16 271s | wrapper: (SECItemType)63: c9 b1 32 e9 67 b8 8d 37 86 72 85 97 7e b8 39 5c 271s | K extracted len 16 bytes at 0x7d49c9af300 271s | unwrapped: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | XCBC: K: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | XCBC: K1 271s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbbe0 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ab6f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbbe0 271s | Computing E[63] using K3 271s | XCBC: K3 271s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 271s | XCBC: E[n-1] 271s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 271s | XCBC: M[n] 271s | 00 00 00 00 00 00 00 00 ........ 271s | XCBC: M[n] 271s | 00 00 00 00 00 00 00 00 ........ 271s | XCBC: M[n]:80...^E[n-1]^K3 271s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 271s | XCBC: MAC 271s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 271s | PRF chunk interface PRF AES_XCBC final length 16 271s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 271s | chunk output 271s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 271s | verify_chunk_data: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: ok 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbe40 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b27d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbe40 271s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x7d49c9ad100 (size 16) 271s | PRF symkey interface: key symkey-key@0x7d49c9ad100 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | XCBC: Key 16=16 just right 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ad100 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbcc8 271s | PRF symkey interface PRF AES_XCBC 0x7d49c9adb80 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbe40 271s | key-offset: 0, key-size: 1000 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 1000-bytes 271s | base: base-key@0x7d49c9b0f40 (1016-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbe40 271s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x7d49c9ab6f0 (size 1000) 271s | PRF symkey interface: symkey message-key@0x7d49c9ab6f0 (1000-bytes, EXTRACT_KEY_FROM_KEY) 271s | symkey message extracting all 1000 bytes of key@0x7d49c9ab6f0 271s | symkey message: symkey-key@0x7d49c9ab6f0 (1000-bytes, EXTRACT_KEY_FROM_KEY) 271s | sizeof bytes 1008 271s | wrapper: siClearDataBuffer: 11 21 d5 13 3e 99 ad 1a 99 7b e9 46 0d 81 ff 22 11 21 d5 13 3e 99 ad 1a 99 7b e9 46 0d 81 ff 22 11 21 d5 13 3e 99 ad 1a 99 7b e9 46 0d 81 ff 22 11 21 d5 13 3e 99 ad 1a 99 7b e9 46 0d 81 ff 22 11 21 d5 13 3e 99 ad 1a 99 7b e9 46 0d 81 ff 22 11 21 d5 13 3e 99 ad 1a 99 7b e9 46 0d 81 ff 22 11 21 d5 13 3e 99 ad 1a 99 7b e9 46 0d 81 ff 22 11 21 d5 13 3e 99 ad 1a 99 7b e9 46 0d 81 ff 22 11 21 d5 13 3e 99 ad 1a 99 7b e9 46 0d 81 ff 22 11 21 d5 13 3e 99 ad 1a 99 7b e9 46 0d 81 ff 22 11 21 d5 13 3e 99 ad 1a 99 7b e9 46 0d 81 ff 22 11 21 d5 13 3e 99 ad 1a 99 7b e9 46 0d 81 ff 22 11 21 d5 13 3e 99 ad 1a 99 7b e9 46 0d 81 ff 22 11 21 d5 13 3e 99 ad 1a 99 7b e9 46 0d 81 ff 22 11 21 d5 13 3e 99 ad 1a 99 7b e9 46 0d 81 ff 22 11 21 d5 13 3e 99 ad 1a 99 7b e9 46 0d 81 ff 22 11 21 d5 13 3e 99 ad 1a 99 7b e9 46 0d 81 ff 22 11 21 d5 13 3e 99 ad 1a 99 7b e9 46 0d 81 ff 22 11 21 d5 13 3e 99 ad 1a 99 7b e9 46 0d 81 ff 22 11 ... 271s | symkey message extracted len 1008 bytes at 0x7d49c9b68c0 271s | unwrapped: 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | XCBC: data 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | 00 00 00 00 00 00 00 00 ........ 271s | K extracting all 16 bytes of key@0x7d49c9b27d0 271s | K: symkey-key@0x7d49c9b27d0 (16-bytes, AES_ECB) 271s | sizeof bytes 16 271s | wrapper: (SECItemType)1000: c9 b1 32 e9 67 b8 8d 37 86 72 85 97 7e b8 39 5c 271s | K extracted len 16 bytes at 0x7d49c9af300 271s | unwrapped: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | XCBC: K: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | XCBC: K1 271s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbc20 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b4060 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbc20 271s | Computing E[63] using K3 271s | XCBC: K3 271s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 271s | XCBC: E[n-1] 271s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 271s | XCBC: M[n] 271s | 00 00 00 00 00 00 00 00 ........ 271s | XCBC: M[n] 271s | 00 00 00 00 00 00 00 00 ........ 271s | XCBC: M[n]:80...^E[n-1]^K3 271s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 271s | XCBC: MAC 271s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbd50 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b4060 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbd50 271s | PRF symkey interface PRF AES_XCBC final-key@0x7d49c9b0f40 (size 16) 271s | PRF symkey interface: key-key@0x7d49c9b0f40 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | output: symkey-key@0x7d49c9b0f40 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracting all 16 bytes of key@0x7d49c9b0f40 271s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: symkey-key@0x7d49c9b0f40 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | sizeof bytes 16 271s | wrapper: (SECItemType)-842024544: 8f 72 ab ad 0a 6d a2 19 44 c7 35 07 6c b6 bb f1 271s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracted len 16 bytes at 0x7d49c9af300 271s | unwrapped: 271s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 271s | verify_chunk_data: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: ok 271s | test_prf_vector: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input passed 271s algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 271s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 271s | decode_to_chunk: output: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 271s | decode_to_chunk: output: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 .... 271s | decode_to_chunk: test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 271s | decode_to_chunk: output: 271s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 271s | PRF chunk interface PRF AES_XCBC init key-chunk@0x7d49c9ad0b0 (length 16) 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbd40 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ad100 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbd40 271s | XCBC: Key 16=16 just right 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b0f40 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbc68 271s | PRF chunk interface PRF AES_XCBC 0x7d49c9ad080 271s | PRF chunk interface PRF AES_XCBC update message (0x7d49c9ad470 length 20) 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 .... 271s | XCBC: data 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 .... 271s | K extracting all 16 bytes of key@0x7d49c9ad100 271s | K: symkey-key@0x7d49c9ad100 (16-bytes, AES_ECB) 271s | sizeof bytes 16 271s | wrapper: (SECItemType)59: c9 b1 32 e9 67 b8 8d 37 86 72 85 97 7e b8 39 5c 271s | K extracted len 16 bytes at 0x7d49c9acf80 271s | unwrapped: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | XCBC: K: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | XCBC: K1 271s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbbe0 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ab6f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbbe0 271s | Computing E[2] using K3 271s | XCBC: K3 271s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 271s | XCBC: E[n-1] 271s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 271s | XCBC: M[n] 271s | 10 11 12 13 .... 271s | XCBC: M[n] 271s | 10 11 12 13 .... 271s | XCBC: M[n]:80...^E[n-1]^K3 271s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 271s | XCBC: MAC 271s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 271s | PRF chunk interface PRF AES_XCBC final length 16 271s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 271s | chunk output 271s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 271s | verify_chunk_data: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): ok 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbe40 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b0f40 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbe40 271s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x7d49c9ad100 (size 16) 271s | PRF symkey interface: key symkey-key@0x7d49c9ad100 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | XCBC: Key 16=16 just right 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ad100 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbcc8 271s | PRF symkey interface PRF AES_XCBC 0x7d49c9ad080 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbe40 271s | key-offset: 0, key-size: 20 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 20-bytes 271s | base: base-key@0x7d49c9b27d0 (36-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbe40 271s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x7d49c9ab6f0 (size 20) 271s | PRF symkey interface: symkey message-key@0x7d49c9ab6f0 (20-bytes, EXTRACT_KEY_FROM_KEY) 271s | symkey message extracting all 20 bytes of key@0x7d49c9ab6f0 271s | symkey message: symkey-key@0x7d49c9ab6f0 (20-bytes, EXTRACT_KEY_FROM_KEY) 271s | sizeof bytes 32 271s | wrapper: siClearDataBuffer: c9 b1 32 e9 67 b8 8d 37 86 72 85 97 7e b8 39 5c b9 c6 15 32 bb 05 46 0c e7 9e b6 c3 e0 93 fc 8e 271s | symkey message extracted len 32 bytes at 0x7d49c9adb80 271s | unwrapped: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | XCBC: data 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 .... 271s | K extracting all 16 bytes of key@0x7d49c9b0f40 271s | K: symkey-key@0x7d49c9b0f40 (16-bytes, AES_ECB) 271s | sizeof bytes 16 271s | wrapper: (SECItemType)20: c9 b1 32 e9 67 b8 8d 37 86 72 85 97 7e b8 39 5c 271s | K extracted len 16 bytes at 0x7d49c9adb80 271s | unwrapped: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | XCBC: K: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | XCBC: K1 271s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbc20 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b4060 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbc20 271s | Computing E[2] using K3 271s | XCBC: K3 271s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 271s | XCBC: E[n-1] 271s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 271s | XCBC: M[n] 271s | 10 11 12 13 .... 271s | XCBC: M[n] 271s | 10 11 12 13 .... 271s | XCBC: M[n]:80...^E[n-1]^K3 271s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 271s | XCBC: MAC 271s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbd50 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b4060 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbd50 271s | PRF symkey interface PRF AES_XCBC final-key@0x7d49c9b27d0 (size 16) 271s | PRF symkey interface: key-key@0x7d49c9b27d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | output: symkey-key@0x7d49c9b27d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracting all 16 bytes of key@0x7d49c9b27d0 271s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): symkey-key@0x7d49c9b27d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | sizeof bytes 16 271s | wrapper: (SECItemType)-842024544: 5e d5 05 57 83 30 46 35 1d f4 d6 b4 c4 cd 22 61 271s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracted len 16 bytes at 0x7d49c9adb80 271s | unwrapped: 271s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 271s | verify_chunk_data: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): ok 271s | test_prf_vector: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) passed 271s algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 271s | decode_to_chunk: test_prf_vector: input "0x00010203040506070809" 271s | decode_to_chunk: output: 271s | 00 01 02 03 04 05 06 07 08 09 .......... 271s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 271s | decode_to_chunk: output: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 .... 271s | decode_to_chunk: test_prf_vector: input "0x0fa087af7d866e7653434e602fdde835" 271s | decode_to_chunk: output: 271s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 271s | PRF chunk interface PRF AES_XCBC init key-chunk@0x7d49c9ad9d0 (length 10) 271s | 00 01 02 03 04 05 06 07 08 09 .......... 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbd40 271s | key-offset: 0, key-size: 10 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 10-bytes 271s | base: base-key@0x7d49c9ad100 (26-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbd40 271s | XCBC: Key 10<16 too small, padding with zeros 271s | CONCATENATE_BASE_AND_DATA: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9b27d0 (10-bytes, EXTRACT_KEY_FROM_KEY) 271s | params: 16-bytes@0x7fffcdcfbc50 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ad100 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbc68 271s | PRF chunk interface PRF AES_XCBC 0x7d49c9af300 271s | PRF chunk interface PRF AES_XCBC update message (0x7d49c9ad510 length 20) 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 .... 271s | XCBC: data 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 .... 271s | K extracting all 16 bytes of key@0x7d49c9ab6f0 271s | K: symkey-key@0x7d49c9ab6f0 (16-bytes, AES_ECB) 271s | sizeof bytes 16 271s | wrapper: (SECItemType)59: 88 0c d6 cd 2d e1 b6 69 c4 cb 88 1d 27 e1 2f e1 271s | K extracted len 16 bytes at 0x7d49c9ad470 271s | unwrapped: 271s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 271s | XCBC: K: 271s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 271s | XCBC: K1 271s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbbe0 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ad100 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbbe0 271s | Computing E[2] using K3 271s | XCBC: K3 271s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 271s | XCBC: E[n-1] 271s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 271s | XCBC: M[n] 271s | 10 11 12 13 .... 271s | XCBC: M[n] 271s | 10 11 12 13 .... 271s | XCBC: M[n]:80...^E[n-1]^K3 271s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 271s | XCBC: MAC 271s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 271s | PRF chunk interface PRF AES_XCBC final length 16 271s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 271s | chunk output 271s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 271s | verify_chunk_data: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): ok 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbe40 271s | key-offset: 0, key-size: 10 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 10-bytes 271s | base: base-key@0x7d49c9b27d0 (26-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbe40 271s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x7d49c9ab6f0 (size 10) 271s | PRF symkey interface: key symkey-key@0x7d49c9ab6f0 (10-bytes, EXTRACT_KEY_FROM_KEY) 271s | XCBC: Key 10<16 too small, padding with zeros 271s | CONCATENATE_BASE_AND_DATA: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9ab6f0 (10-bytes, EXTRACT_KEY_FROM_KEY) 271s | params: 16-bytes@0x7fffcdcfbcb0 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b27d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbcc8 271s | PRF symkey interface PRF AES_XCBC 0x7d49c9af300 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbe40 271s | key-offset: 0, key-size: 20 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 20-bytes 271s | base: base-key@0x7d49c9b0f40 (36-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbe40 271s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x7d49c9b27d0 (size 20) 271s | PRF symkey interface: symkey message-key@0x7d49c9b27d0 (20-bytes, EXTRACT_KEY_FROM_KEY) 271s | symkey message extracting all 20 bytes of key@0x7d49c9b27d0 271s | symkey message: symkey-key@0x7d49c9b27d0 (20-bytes, EXTRACT_KEY_FROM_KEY) 271s | sizeof bytes 32 271s | wrapper: siClearDataBuffer: c9 b1 32 e9 67 b8 8d 37 86 72 85 97 7e b8 39 5c b9 c6 15 32 bb 05 46 0c e7 9e b6 c3 e0 93 fc 8e 271s | symkey message extracted len 32 bytes at 0x7d49c9af390 271s | unwrapped: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | XCBC: data 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 .... 271s | K extracting all 16 bytes of key@0x7d49c9ad100 271s | K: symkey-key@0x7d49c9ad100 (16-bytes, AES_ECB) 271s | sizeof bytes 16 271s | wrapper: (SECItemType)20: 88 0c d6 cd 2d e1 b6 69 c4 cb 88 1d 27 e1 2f e1 271s | K extracted len 16 bytes at 0x7d49c9adb80 271s | unwrapped: 271s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 271s | XCBC: K: 271s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 271s | XCBC: K1 271s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbc20 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b4060 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbc20 271s | Computing E[2] using K3 271s | XCBC: K3 271s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 271s | XCBC: E[n-1] 271s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 271s | XCBC: M[n] 271s | 10 11 12 13 .... 271s | XCBC: M[n] 271s | 10 11 12 13 .... 271s | XCBC: M[n]:80...^E[n-1]^K3 271s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 271s | XCBC: MAC 271s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbd50 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b4060 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbd50 271s | PRF symkey interface PRF AES_XCBC final-key@0x7d49c9b0f40 (size 16) 271s | PRF symkey interface: key-key@0x7d49c9b0f40 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | output: symkey-key@0x7d49c9b0f40 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracting all 16 bytes of key@0x7d49c9b0f40 271s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): symkey-key@0x7d49c9b0f40 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | sizeof bytes 16 271s | wrapper: (SECItemType)-842024544: dc 9e 08 4b 77 16 bf 19 14 11 3e fb cc c5 9e 92 271s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracted len 16 bytes at 0x7d49c9adb80 271s | unwrapped: 271s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 271s | verify_chunk_data: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): ok 271s | test_prf_vector: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) passed 271s algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 271s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0fedcb" 271s | decode_to_chunk: output: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | ed cb .. 271s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 271s | decode_to_chunk: output: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | 10 11 12 13 .... 271s | decode_to_chunk: test_prf_vector: input "0x8cd3c93ae598a9803006ffb67c40e9e4" 271s | decode_to_chunk: output: 271s | 8c d3 c9 3a e5 98 a9 80 30 06 ff b6 7c 40 e9 e4 ...:....0...|@.. 271s | PRF chunk interface PRF AES_XCBC init key-chunk@0x7d49c9ad9f0 (length 18) 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | ed cb .. 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbd40 271s | key-offset: 0, key-size: 18 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 18-bytes 271s | base: base-key@0x7d49c9ab6f0 (34-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbd40 271s | XCBC: Key 18>16 too big, rehashing to size 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbc40 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b27d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbc40 271s | draft_chunk extracting all 18 bytes of key@0x7d49c9b0f40 271s | draft_chunk: symkey-key@0x7d49c9b0f40 (18-bytes, EXTRACT_KEY_FROM_KEY) 271s | sizeof bytes 32 271s | wrapper: (SECItemType)-1385752448: c9 b1 32 e9 67 b8 8d 37 86 72 85 97 7e b8 39 5c b9 e1 91 a0 e3 f0 19 c8 3b 93 73 e1 8c 96 f8 18 271s | draft_chunk extracted len 32 bytes at 0x7d49c9adb80 271s | unwrapped: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | XCBC: data 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | ed cb .. 271s | K extracting all 16 bytes of key@0x7d49c9ab6f0 271s | K: symkey-key@0x7d49c9ab6f0 (16-bytes, AES_ECB) 271s | sizeof bytes 16 271s | wrapper: (SECItemType)18: 11 21 d5 13 3e 99 ad 1a 99 7b e9 46 0d 81 ff 22 271s | K extracted len 16 bytes at 0x7d49c9af300 271s | unwrapped: 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | XCBC: K: 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | XCBC: K1 271s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbb00 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ad100 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbb00 271s | Computing E[2] using K3 271s | XCBC: K3 271s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 271s | XCBC: E[n-1] 271s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 271s | XCBC: M[n] 271s | ed cb .. 271s | XCBC: M[n] 271s | ed cb .. 271s | XCBC: M[n]:80...^E[n-1]^K3 271s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.16 too big, rehashing to size 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbca0 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ab6f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbca0 271s | draft_chunk extracting all 18 bytes of key@0x7d49c9b27d0 271s | draft_chunk: symkey-key@0x7d49c9b27d0 (18-bytes, EXTRACT_KEY_FROM_KEY) 271s | sizeof bytes 32 271s | wrapper: (SECItemType)-1385752448: c9 b1 32 e9 67 b8 8d 37 86 72 85 97 7e b8 39 5c b9 e1 91 a0 e3 f0 19 c8 3b 93 73 e1 8c 96 f8 18 271s | draft_chunk extracted len 32 bytes at 0x7d49c9af300 271s | unwrapped: 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | XCBC: data 271s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 271s | ed cb .. 271s | K extracting all 16 bytes of key@0x7d49c9b0f40 271s | K: symkey-key@0x7d49c9b0f40 (16-bytes, AES_ECB) 271s | sizeof bytes 16 271s | wrapper: (SECItemType)18: 11 21 d5 13 3e 99 ad 1a 99 7b e9 46 0d 81 ff 22 271s | K extracted len 16 bytes at 0x7d49c9adb80 271s | unwrapped: 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | XCBC: K: 271s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 271s | XCBC: K1 271s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbb60 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: AES_ECB 271s | flags: SIGN 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ad100 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbb60 271s | Computing E[2] using K3 271s | XCBC: K3 271s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 271s | XCBC: E[n-1] 271s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 271s | XCBC: M[n] 271s | ed cb .. 271s | XCBC: M[n] 271s | ed cb .. 271s | XCBC: M[n]:80...^E[n-1]^K3 271s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.j.....n1.].8 271s | PRF chunk interface PRF HMAC_MD5 init key-chunk@0x7d49c9ad4f0 (length 4) 271s | 4a 65 66 65 Jefe 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbd20 271s | key-offset: 0, key-size: 4 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 4-bytes 271s | base: base-key@0x7d49c9ab6f0 (20-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbd20 271s | CONCATENATE_BASE_AND_DATA: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9b27d0 (4-bytes, EXTRACT_KEY_FROM_KEY) 271s | params: 16-bytes@0x7fffcdcfbc30 271s | XOR_BASE_AND_DATA: 271s | target: CONCATENATE_BASE_AND_DATA 271s | base: base-key@0x7d49c9ab6f0 (64-bytes, EXTRACT_KEY_FROM_KEY) 271s | params: 16-bytes@0x7fffcdcfbc50 271s | PRF chunk interface PRF HMAC_MD5 0x7d49c9adb80 271s | PRF chunk interface PRF HMAC_MD5 update message (0x7d49c9af300 length 28) 271s | 77 68 61 74 20 64 6f 20 79 61 20 77 61 6e 74 20 what do ya want 271s | 66 6f 72 20 6e 6f 74 68 69 6e 67 3f for nothing? 271s | CONCATENATE_BASE_AND_DATA: 271s | target: CONCATENATE_BASE_AND_DATA 271s | base: base-key@0x7d49c9b27d0 (64-bytes, CONCATENATE_BASE_AND_DATA) 271s | params: 16-bytes@0x7fffcdcfbd60 271s | PRF HMAC inner hash hash MD5 inner-key@0x7d49c9b0f40 (size 92) 271s | PRF HMAC inner hash hash MD5 init 271s | PRF HMAC inner hash hash MD5 digest inner-key@0x7d49c9b0f40 (size 92) 271s | PRF HMAC inner hash: inner-key@0x7d49c9b0f40 (92-bytes, CONCATENATE_BASE_AND_DATA) 271s | PRF HMAC inner hash hash MD5 final length 16 271s | c3 db 14 c0 65 f5 52 03 b0 33 c8 1a 69 7b 97 c5 ....e.R..3..i{.. 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfba80 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b6420 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfba80 271s | XOR_BASE_AND_DATA: 271s | target: CONCATENATE_BASE_AND_DATA 271s | base: base-key@0x7d49c9ab6f0 (64-bytes, EXTRACT_KEY_FROM_KEY) 271s | params: 16-bytes@0x7fffcdcfbbe0 271s | CONCATENATE_BASE_AND_KEY: 271s | target: CONCATENATE_BASE_AND_DATA 271s | base: base-key@0x7d49c9b0f40 (64-bytes, CONCATENATE_BASE_AND_DATA) 271s | params: 8-bytes@0x7fffcdcfbbd8 271s | PRF HMAC outer hash hash MD5 init 271s | PRF HMAC outer hash hash MD5 digest outer-key@0x7d49c9b6420 (size 80) 271s | PRF HMAC outer hash: outer-key@0x7d49c9b6420 (80-bytes, CONCATENATE_BASE_AND_DATA) 271s | PRF HMAC outer hash hash MD5 final bytes@0x7fffcdcfbe68 (length 16) 271s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 271s | PRF chunk interface PRF HMAC_MD5 final length 16 271s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 271s | chunk output 271s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 271s | verify_chunk_data: RFC 2104: MD5_HMAC test 2: ok 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbe40 271s | key-offset: 0, key-size: 4 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 4-bytes 271s | base: base-key@0x7d49c9ab6f0 (20-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbe40 271s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0x7d49c9b6420 (size 4) 271s | PRF symkey interface: key symkey-key@0x7d49c9b6420 (4-bytes, EXTRACT_KEY_FROM_KEY) 271s | CONCATENATE_BASE_AND_DATA: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9b6420 (4-bytes, EXTRACT_KEY_FROM_KEY) 271s | params: 16-bytes@0x7fffcdcfbc40 271s | XOR_BASE_AND_DATA: 271s | target: CONCATENATE_BASE_AND_DATA 271s | base: base-key@0x7d49c9ab6f0 (64-bytes, EXTRACT_KEY_FROM_KEY) 271s | params: 16-bytes@0x7fffcdcfbc60 271s | PRF symkey interface PRF HMAC_MD5 0x7d49c9adb80 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbe40 271s | key-offset: 0, key-size: 28 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 28-bytes 271s | base: base-key@0x7d49c9ad100 (44-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbe40 271s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0x7d49c9b0f40 (size 28) 271s | PRF symkey interface: symkey message-key@0x7d49c9b0f40 (28-bytes, EXTRACT_KEY_FROM_KEY) 271s | CONCATENATE_BASE_AND_KEY: 271s | target: CONCATENATE_BASE_AND_DATA 271s | base: base-key@0x7d49c9b27d0 (64-bytes, CONCATENATE_BASE_AND_DATA) 271s | params: 8-bytes@0x7fffcdcfbd78 271s | PRF HMAC inner hash hash MD5 inner-key@0x7d49c9ad100 (size 92) 271s | PRF HMAC inner hash hash MD5 init 271s | PRF HMAC inner hash hash MD5 digest inner-key@0x7d49c9ad100 (size 92) 271s | PRF HMAC inner hash: inner-key@0x7d49c9ad100 (92-bytes, CONCATENATE_BASE_AND_DATA) 271s | PRF HMAC inner hash hash MD5 final length 16 271s | c3 db 14 c0 65 f5 52 03 b0 33 c8 1a 69 7b 97 c5 ....e.R..3..i{.. 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbae0 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b4060 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbae0 271s | XOR_BASE_AND_DATA: 271s | target: CONCATENATE_BASE_AND_DATA 271s | base: base-key@0x7d49c9ab6f0 (64-bytes, EXTRACT_KEY_FROM_KEY) 271s | params: 16-bytes@0x7fffcdcfbc40 271s | CONCATENATE_BASE_AND_KEY: 271s | target: CONCATENATE_BASE_AND_DATA 271s | base: base-key@0x7d49c9ad100 (64-bytes, CONCATENATE_BASE_AND_DATA) 271s | params: 8-bytes@0x7fffcdcfbc38 271s | PRF HMAC outer hash hash MD5 outer-key@0x7d49c9b4060 (size 80) 271s | PRF HMAC outer hash hash MD5 init 271s | PRF HMAC outer hash hash MD5 digest outer-key@0x7d49c9b4060 (size 80) 271s | PRF HMAC outer hash: outer-key@0x7d49c9b4060 (80-bytes, CONCATENATE_BASE_AND_DATA) 271s | PRF HMAC outer hash hash MD5 final length 16 271s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbc00 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b27d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbc00 271s | : hashed-outer-key@0x7d49c9ab6f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | PRF symkey interface PRF HMAC_MD5 final-key@0x7d49c9ab6f0 (size 16) 271s | PRF symkey interface: key-key@0x7d49c9ab6f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | output: symkey-key@0x7d49c9ab6f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | RFC 2104: MD5_HMAC test 2 extracting all 16 bytes of key@0x7d49c9ab6f0 271s | RFC 2104: MD5_HMAC test 2: symkey-key@0x7d49c9ab6f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | sizeof bytes 16 271s | wrapper: (SECItemType)-842024544: 09 f4 55 3d 02 b1 51 82 cf 09 c5 8b 44 cd 58 80 271s | RFC 2104: MD5_HMAC test 2 extracted len 16 bytes at 0x7d49c9adb80 271s | unwrapped: 271s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 271s | verify_chunk_data: RFC 2104: MD5_HMAC test 2: ok 271s | test_prf_vector: RFC 2104: MD5_HMAC test 2 passed 271s algparse: RFC 2104: MD5_HMAC test 3 271s | decode_to_chunk: test_prf_vector: input "0xAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" 271s | decode_to_chunk: output: 271s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 271s | decode_to_chunk: test_prf_vector: input "0xDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD" 271s | decode_to_chunk: output: 271s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 271s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 271s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 271s | dd dd .. 271s | decode_to_chunk: test_prf_vector: input "0x56be34521d144c88dbb8c733f0e8b3f6" 271s | decode_to_chunk: output: 271s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 271s | PRF chunk interface PRF HMAC_MD5 init key-chunk@0x7d49c9ab6d0 (length 16) 271s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbd20 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b6420 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbd20 271s | CONCATENATE_BASE_AND_DATA: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9ab6f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | params: 16-bytes@0x7fffcdcfbc30 271s | XOR_BASE_AND_DATA: 271s | target: CONCATENATE_BASE_AND_DATA 271s | base: base-key@0x7d49c9b6420 (64-bytes, EXTRACT_KEY_FROM_KEY) 271s | params: 16-bytes@0x7fffcdcfbc50 271s | PRF chunk interface PRF HMAC_MD5 0x7d49c9af300 271s | PRF chunk interface PRF HMAC_MD5 update message (0x7d49c9aef70 length 50) 271s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 271s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 271s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 271s | dd dd .. 271s | CONCATENATE_BASE_AND_DATA: 271s | target: CONCATENATE_BASE_AND_DATA 271s | base: base-key@0x7d49c9ab6f0 (64-bytes, CONCATENATE_BASE_AND_DATA) 271s | params: 16-bytes@0x7fffcdcfbd60 271s | PRF HMAC inner hash hash MD5 inner-key@0x7d49c9b0f40 (size 114) 271s | PRF HMAC inner hash hash MD5 init 271s | PRF HMAC inner hash hash MD5 digest inner-key@0x7d49c9b0f40 (size 114) 271s | PRF HMAC inner hash: inner-key@0x7d49c9b0f40 (114-bytes, CONCATENATE_BASE_AND_DATA) 271s | PRF HMAC inner hash hash MD5 final length 16 271s | 82 0a 6b 33 5d 18 7b 90 dc ba b1 7e f5 b4 26 ff ..k3].{....~..&. 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfba80 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b4060 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfba80 271s | XOR_BASE_AND_DATA: 271s | target: CONCATENATE_BASE_AND_DATA 271s | base: base-key@0x7d49c9b6420 (64-bytes, EXTRACT_KEY_FROM_KEY) 271s | params: 16-bytes@0x7fffcdcfbbe0 271s | CONCATENATE_BASE_AND_KEY: 271s | target: CONCATENATE_BASE_AND_DATA 271s | base: base-key@0x7d49c9b0f40 (64-bytes, CONCATENATE_BASE_AND_DATA) 271s | params: 8-bytes@0x7fffcdcfbbd8 271s | PRF HMAC outer hash hash MD5 init 271s | PRF HMAC outer hash hash MD5 digest outer-key@0x7d49c9b4060 (size 80) 271s | PRF HMAC outer hash: outer-key@0x7d49c9b4060 (80-bytes, CONCATENATE_BASE_AND_DATA) 271s | PRF HMAC outer hash hash MD5 final bytes@0x7fffcdcfbe68 (length 16) 271s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 271s | PRF chunk interface PRF HMAC_MD5 final length 16 271s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 271s | chunk output 271s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 271s | verify_chunk_data: RFC 2104: MD5_HMAC test 3: ok 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbe40 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9b6420 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbe40 271s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0x7d49c9b4060 (size 16) 271s | PRF symkey interface: key symkey-key@0x7d49c9b4060 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | CONCATENATE_BASE_AND_DATA: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9b4060 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | params: 16-bytes@0x7fffcdcfbc40 271s | XOR_BASE_AND_DATA: 271s | target: CONCATENATE_BASE_AND_DATA 271s | base: base-key@0x7d49c9b6420 (64-bytes, EXTRACT_KEY_FROM_KEY) 271s | params: 16-bytes@0x7fffcdcfbc60 271s | PRF symkey interface PRF HMAC_MD5 0x7d49c9af300 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbe40 271s | key-offset: 0, key-size: 50 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 50-bytes 271s | base: base-key@0x7d49c9b27d0 (66-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbe40 271s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0x7d49c9b0f40 (size 50) 271s | PRF symkey interface: symkey message-key@0x7d49c9b0f40 (50-bytes, EXTRACT_KEY_FROM_KEY) 271s | CONCATENATE_BASE_AND_KEY: 271s | target: CONCATENATE_BASE_AND_DATA 271s | base: base-key@0x7d49c9ab6f0 (64-bytes, CONCATENATE_BASE_AND_DATA) 271s | params: 8-bytes@0x7fffcdcfbd78 271s | PRF HMAC inner hash hash MD5 inner-key@0x7d49c9b27d0 (size 114) 271s | PRF HMAC inner hash hash MD5 init 271s | PRF HMAC inner hash hash MD5 digest inner-key@0x7d49c9b27d0 (size 114) 271s | PRF HMAC inner hash: inner-key@0x7d49c9b27d0 (114-bytes, CONCATENATE_BASE_AND_DATA) 271s | PRF HMAC inner hash hash MD5 final length 16 271s | 82 0a 6b 33 5d 18 7b 90 dc ba b1 7e f5 b4 26 ff ..k3].{....~..&. 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbae0 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ad100 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbae0 271s | XOR_BASE_AND_DATA: 271s | target: CONCATENATE_BASE_AND_DATA 271s | base: base-key@0x7d49c9b6420 (64-bytes, EXTRACT_KEY_FROM_KEY) 271s | params: 16-bytes@0x7fffcdcfbc40 271s | CONCATENATE_BASE_AND_KEY: 271s | target: CONCATENATE_BASE_AND_DATA 271s | base: base-key@0x7d49c9b27d0 (64-bytes, CONCATENATE_BASE_AND_DATA) 271s | params: 8-bytes@0x7fffcdcfbc38 271s | PRF HMAC outer hash hash MD5 outer-key@0x7d49c9ad100 (size 80) 271s | PRF HMAC outer hash hash MD5 init 271s | PRF HMAC outer hash hash MD5 digest outer-key@0x7d49c9ad100 (size 80) 271s | PRF HMAC outer hash: outer-key@0x7d49c9ad100 (80-bytes, CONCATENATE_BASE_AND_DATA) 271s | PRF HMAC outer hash hash MD5 final length 16 271s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbc00 271s | key-offset: 0, key-size: 16 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 16-bytes 271s | base: base-key@0x7d49c9ab6f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbc00 271s | : hashed-outer-key@0x7d49c9b6420 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | PRF symkey interface PRF HMAC_MD5 final-key@0x7d49c9b6420 (size 16) 271s | PRF symkey interface: key-key@0x7d49c9b6420 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | output: symkey-key@0x7d49c9b6420 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | RFC 2104: MD5_HMAC test 3 extracting all 16 bytes of key@0x7d49c9b6420 271s | RFC 2104: MD5_HMAC test 3: symkey-key@0x7d49c9b6420 (16-bytes, EXTRACT_KEY_FROM_KEY) 271s | sizeof bytes 16 271s | wrapper: (SECItemType)-842024544: 72 2a 44 46 50 83 71 27 2b 71 68 57 a8 b7 b4 94 271s | RFC 2104: MD5_HMAC test 3 extracted len 16 bytes at 0x7d49c9b2a60 271s | unwrapped: 271s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 271s | verify_chunk_data: RFC 2104: MD5_HMAC test 3: ok 271s | test_prf_vector: RFC 2104: MD5_HMAC test 3 passed 271s algparse: testing HMAC_SHA1: 271s algparse: CAVP: IKEv2 key derivation with HMAC-SHA1 271s | decode_to_chunk: test_kdf_vector: input "0x32b50d5f4a3763f3" 271s | decode_to_chunk: output: 271s | 32 b5 0d 5f 4a 37 63 f3 2.._J7c. 271s | decode_to_chunk: test_kdf_vector: input "0x9206a04b26564cb1" 271s | decode_to_chunk: output: 271s | 92 06 a0 4b 26 56 4c b1 ...K&VL. 271s | decode_to_chunk: test_kdf_vector: input "0x34c9e7c188868785" 271s | decode_to_chunk: output: 271s | 34 c9 e7 c1 88 86 87 85 4....... 271s | decode_to_chunk: test_kdf_vector: input "0x3ff77d760d2b2199" 271s | decode_to_chunk: output: 271s | 3f f7 7d 76 0d 2b 21 99 ?.}v.+!. 271s | decode_to_chunk: test_kdf_vector: input "0x4b2c1f971981a8ad8d0abeafabf38cf75fc8349c148142465ed9c8b516b8be52" 271s | decode_to_chunk: output: 271s | 4b 2c 1f 97 19 81 a8 ad 8d 0a be af ab f3 8c f7 K,.............. 271s | 5f c8 34 9c 14 81 42 46 5e d9 c8 b5 16 b8 be 52 _.4...BF^......R 271s | decode_to_chunk: test_kdf_vector: input "0x863f3c9d06efd39d2b907b97f8699e5dd5251ef64a2a176f36ee40c87d4f9330" 271s | decode_to_chunk: output: 271s | 86 3f 3c 9d 06 ef d3 9d 2b 90 7b 97 f8 69 9e 5d .?<.....+.{..i.] 271s | d5 25 1e f6 4a 2a 17 6f 36 ee 40 c8 7d 4f 93 30 .%..J*.o6.@.}O.0 271s | decode_to_chunk: test_kdf_vector: input "0xa9a7b222b59f8f48645f28a1db5b5f5d7479cba7" 271s | decode_to_chunk: output: 271s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 271s | 74 79 cb a7 ty.. 271s | decode_to_chunk: test_kdf_vector: input "0x63e81194946ebd05df7df5ebf5d8750056bf1f1d" 271s | decode_to_chunk: output: 271s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 271s | 56 bf 1f 1d V... 271s | decode_to_chunk: test_kdf_vector: input "0xa14293677cc80ff8f9cc0eee30d895da9d8f405666e30ef0dfcb63c634a46002a2a63080e514a062768b76606f9fa5e992204fc5a670bde3f10d6b027113936a5c55b648a194ae587b0088d52204b702c979fa280870d2ed41efa9c549fd11198af1670b143d384bd275c5f594cf266b05ebadca855e4249520a441a81157435a7a56cc4" 271s | decode_to_chunk: output: 271s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 271s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 271s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 271s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 271s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 271s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 271s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 271s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 271s | a7 a5 6c c4 ..l. 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbe40 271s | key-offset: 0, key-size: 32 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 32-bytes 271s | base: base-key@0x7d49c9b4060 (48-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbe40 271s | NSS_IKE_PRF_DERIVE: 271s | target: NSS_IKE_PRF_PLUS_DERIVE 271s | base: base-key@0x7d49c9b6420 (32-bytes, EXTRACT_KEY_FROM_KEY) 271s | params: 56-bytes@0x7fffcdcfbe40 271s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0x7d49c9b4060 271s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x7d49c9b4060 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 271s | sizeof bytes 32 271s | wrapper: (SECItemType)539784037: ef 85 78 f7 53 da 10 7b d6 7b 8e 23 9c 18 7a 61 55 61 c9 f5 c2 91 33 66 3d ca d8 29 a7 ce f2 4f 271s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0x7d49c9b3170 271s | unwrapped: 271s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 271s | 74 79 cb a7 00 00 00 00 00 00 00 00 00 00 00 00 ty.............. 271s | verify_chunk_data: CAVP: IKEv2 key derivation with HMAC-SHA1: ok 271s | NSS_IKE_PRF_PLUS_DERIVE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 132-bytes 271s | base: base-key@0x7d49c9b4060 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 271s | params: 40-bytes@0x7fffcdcfbd70 271s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 132 bytes of key@0x7d49c9b0f40 271s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x7d49c9b0f40 (132-bytes, EXTRACT_KEY_FROM_KEY) 271s | sizeof bytes 144 271s | wrapper: (SECItemType)1802401128: 31 e0 79 36 5f b3 c3 5c 5f 01 c4 b8 e0 2a 14 8a de b0 27 cf d6 71 46 91 6a fc f3 c6 f5 6c 8b 97 89 af ec b2 47 94 18 63 6f 86 57 2c ce 14 72 75 f4 21 df cc 23 9e 18 24 bc 4a 81 34 a3 f7 64 5c b6 2a c4 49 23 5d 7e f2 9f ee 26 99 c8 7e 63 7e 07 9f ae 1f 76 fe dd 03 30 58 97 50 d7 ca 13 81 68 4e 1c e1 96 de 8d 3d 38 1a a0 76 f7 19 b8 dc f5 bf d7 70 28 a0 bc fa 4a 7a ec c1 52 07 50 e1 23 b1 be 02 24 9e e3 9a e4 00 db ff 9a 5b 55 1a 271s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 144 bytes at 0x7d49c9b3190 271s | unwrapped: 271s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 271s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 271s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 271s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 271s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 271s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 271s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 271s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 271s | a7 a5 6c c4 00 00 00 00 00 00 00 00 00 00 00 00 ..l............. 271s | verify_chunk_data: CAVP: IKEv2 key derivation with HMAC-SHA1: ok 271s | key-offset: 0, key-size: 20 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 20-bytes 271s | base: base-key@0x7d49c9b0f40 (132-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbe88 271s | CONCATENATE_DATA_AND_BASE: 271s | target: EXTRACT_KEY_FROM_KEY 271s | base: base-key@0x7d49c9a9ee0 (16-bytes, AES_KEY_GEN) 271s | params: 16-bytes@0x7fffcdcfbe40 271s | key-offset: 0, key-size: 32 271s | EXTRACT_KEY_FROM_KEY: 271s | target: EXTRACT_KEY_FROM_KEY 271s | key_size: 32-bytes 271s | base: base-key@0x7d49c9b27d0 (48-bytes, EXTRACT_KEY_FROM_KEY) 271s | operation: FLAGS_ONLY 271s | params: 8-bytes@0x7fffcdcfbe40 271s | NSS_IKE_PRF_DERIVE: 271s | target: NSS_IKE_PRF_PLUS_DERIVE 271s | base: base-key@0x7d49c9ad100 (20-bytes, EXTRACT_KEY_FROM_KEY) 271s | params: 56-bytes@0x7fffcdcfbe40 271s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0x7d49c9b27d0 271s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x7d49c9b27d0 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 271s | sizeof bytes 32 271s | wrapper: (SECItemType)539784037: dd 54 db 50 2c 3d 19 d8 da 7c 8b e2 67 45 bd 47 e5 63 0a 7e 43 8d d2 a2 04 c5 7d 27 af cb 09 8d 271s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0x7d49c9b3920 271s | unwrapped: 271s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 271s | 56 bf 1f 1d 00 00 00 00 00 00 00 00 00 00 00 00 V............... 271s | verify_chunk_data: CAVP: IKEv2 key derivation with HMAC-SHA1: ok 271s | test_kdf_vector: CAVP: IKEv2 key derivation with HMAC-SHA1 passed 271s algparse: leak detective found no leaks 271s /usr/libexec/ipsec/pluto: adjusting nssdir to /tmp/tmp.VtzO9bbiwy 271s /usr/libexec/ipsec/pluto: selftest: skipping lock 271s /usr/libexec/ipsec/pluto: selftest: skipping control socket 271s /usr/libexec/ipsec/pluto: selftest: skipping fork 271s Initializing NSS using read-write database "sql:/tmp/tmp.VtzO9bbiwy" 271s FIPS Mode: NO 271s NSS crypto library initialized 271s FIPS mode disabled for pluto daemon 271s FIPS HMAC integrity support [disabled] 271s libcap-ng capng_apply failed to apply changes, err=-5. see: man capng_apply 271s libcap-ng support [enabled] 271s Linux audit support [enabled] 271s Starting Pluto (Libreswan Version 4.14 IKEv2 IKEv1 XFRM XFRMI esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) (NSS-KDF) DNSSEC SYSTEMD_WATCHDOG LABELED_IPSEC (SELINUX) LIBCAP_NG LINUX_AUDIT AUTH_PAM NETWORKMANAGER CURL(non-NSS) LDAP(non-NSS)) pid:1953 271s core dump dir: /run/pluto 271s secrets file: /etc/ipsec.secrets 271s leak-detective disabled 271s NSS crypto [enabled] 271s XAUTH PAM support [enabled] 271s initializing libevent in pthreads mode: headers: 2.1.12-stable (2010c00); library: 2.1.12-stable (2010c00) 271s NAT-Traversal support [enabled] 271s Encryption algorithms: 271s AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 271s AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 271s AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 271s 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 271s CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 271s CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 271s AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm, aes_gcm_c 271s AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_b 271s AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_a 271s AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 271s AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 271s NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 271s NULL [] IKEv1: ESP IKEv2: ESP 271s CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 271s Hash algorithms: 271s MD5 IKEv1: IKE IKEv2: NSS 271s SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 271s SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 271s SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 271s SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 271s IDENTITY IKEv1: IKEv2: FIPS 271s PRF algorithms: 271s HMAC_MD5 IKEv1: IKE IKEv2: IKE native(HMAC) md5 271s HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 271s HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 271s HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 271s HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 271s AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 271s Integrity algorithms: 271s HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH native(HMAC) md5, hmac_md5 271s HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 271s HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 271s HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 271s HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 271s HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 271s AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 271s AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 271s NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 271s DH algorithms: 271s NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 271s MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 271s MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 271s MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 271s MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 271s MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 271s MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 271s DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 271s DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 271s DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 271s DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 271s IPCOMP algorithms: 271s DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 271s LZS IKEv1: IKEv2: ESP AH FIPS 271s LZJH IKEv1: IKEv2: ESP AH FIPS 271s testing CAMELLIA_CBC: 271s Camellia: 16 bytes with 128-bit key 271s Camellia: 16 bytes with 128-bit key 271s Camellia: 16 bytes with 256-bit key 271s Camellia: 16 bytes with 256-bit key 271s testing AES_GCM_16: 271s empty string 271s one block 271s two blocks 271s two blocks with associated data 271s testing AES_CTR: 271s Encrypting 16 octets using AES-CTR with 128-bit key 271s Encrypting 32 octets using AES-CTR with 128-bit key 271s Encrypting 36 octets using AES-CTR with 128-bit key 271s Encrypting 16 octets using AES-CTR with 192-bit key 271s Encrypting 32 octets using AES-CTR with 192-bit key 271s Encrypting 36 octets using AES-CTR with 192-bit key 271s Encrypting 16 octets using AES-CTR with 256-bit key 271s Encrypting 32 octets using AES-CTR with 256-bit key 271s Encrypting 36 octets using AES-CTR with 256-bit key 271s testing AES_CBC: 271s Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 271s Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 271s Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 271s Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 271s testing AES_XCBC: 271s RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 271s RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 271s RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 271s RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 271s RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 271s RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 271s RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 271s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 271s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 271s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 271s testing HMAC_MD5: 271s RFC 2104: MD5_HMAC test 1 271s RFC 2104: MD5_HMAC test 2 271s RFC 2104: MD5_HMAC test 3 271s testing HMAC_SHA1: 271s CAVP: IKEv2 key derivation with HMAC-SHA1 271s selftest: exiting pluto 271s autopkgtest [10:46:47]: test cryptocheck: -----------------------] 272s autopkgtest [10:46:48]: test cryptocheck: - - - - - - - - - - results - - - - - - - - - - 272s cryptocheck PASS 272s autopkgtest [10:46:48]: test cavp: preparing testbed 361s autopkgtest [10:48:17]: testbed dpkg architecture: ppc64el 361s autopkgtest [10:48:17]: testbed apt version: 2.9.18 361s autopkgtest [10:48:17]: @@@@@@@@@@@@@@@@@@@@ test bed setup 361s autopkgtest [10:48:17]: testbed release detected to be: plucky 362s autopkgtest [10:48:18]: updating testbed package index (apt update) 362s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease [73.9 kB] 363s Hit:2 http://ftpmaster.internal/ubuntu plucky InRelease 363s Hit:3 http://ftpmaster.internal/ubuntu plucky-updates InRelease 363s Hit:4 http://ftpmaster.internal/ubuntu plucky-security InRelease 363s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/main Sources [172 kB] 363s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse Sources [16.4 kB] 363s Get:7 http://ftpmaster.internal/ubuntu plucky-proposed/restricted Sources [9708 B] 363s Get:8 http://ftpmaster.internal/ubuntu plucky-proposed/universe Sources [887 kB] 363s Get:9 http://ftpmaster.internal/ubuntu plucky-proposed/main ppc64el Packages [295 kB] 363s Get:10 http://ftpmaster.internal/ubuntu plucky-proposed/restricted ppc64el Packages [756 B] 363s Get:11 http://ftpmaster.internal/ubuntu plucky-proposed/universe ppc64el Packages [1059 kB] 363s Get:12 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse ppc64el Packages [17.1 kB] 363s Fetched 2531 kB in 1s (2352 kB/s) 364s Reading package lists... 365s + lsb_release --codename --short 365s + RELEASE=plucky 365s + cat 365s + [ plucky != trusty ] 365s + DEBIAN_FRONTEND=noninteractive eatmydata apt-get -y --allow-downgrades -o Dpkg::Options::=--force-confnew dist-upgrade 365s Reading package lists... 365s Building dependency tree... 365s Reading state information... 365s Calculating upgrade... 365s The following packages will be upgraded: 365s libgudev-1.0-0 usb.ids 365s 2 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 365s Need to get 239 kB of archives. 365s After this operation, 1024 B of additional disk space will be used. 365s Get:1 http://ftpmaster.internal/ubuntu plucky/main ppc64el usb.ids all 2025.01.14-1 [223 kB] 366s Get:2 http://ftpmaster.internal/ubuntu plucky/main ppc64el libgudev-1.0-0 ppc64el 1:238-6 [15.7 kB] 366s Fetched 239 kB in 0s (501 kB/s) 366s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74045 files and directories currently installed.) 366s Preparing to unpack .../usb.ids_2025.01.14-1_all.deb ... 366s Unpacking usb.ids (2025.01.14-1) over (2024.12.04-1) ... 366s Preparing to unpack .../libgudev-1.0-0_1%3a238-6_ppc64el.deb ... 366s Unpacking libgudev-1.0-0:ppc64el (1:238-6) over (1:238-5ubuntu1) ... 366s Setting up usb.ids (2025.01.14-1) ... 366s Setting up libgudev-1.0-0:ppc64el (1:238-6) ... 366s Processing triggers for libc-bin (2.40-4ubuntu1) ... 367s + rm /etc/apt/preferences.d/force-downgrade-to-release.pref 367s + /usr/lib/apt/apt-helper analyze-pattern ?true 367s + DEBIAN_FRONTEND=noninteractive eatmydata apt-get -y purge --autoremove ?obsolete 367s Reading package lists... 367s Building dependency tree... 367s Reading state information... 367s 0 upgraded, 0 newly installed, 0 to remove and 2 not upgraded. 367s + grep -q trusty /etc/lsb-release 367s + [ ! -d /usr/share/doc/unattended-upgrades ] 367s + [ ! -d /usr/share/doc/lxd ] 367s + [ ! -d /usr/share/doc/lxd-client ] 367s + [ ! -d /usr/share/doc/snapd ] 367s + type iptables 367s + cat 367s + chmod 755 /etc/rc.local 367s + . /etc/rc.local 367s + iptables -w -t mangle -A FORWARD -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu 367s + iptables -A OUTPUT -d 10.255.255.1/32 -p tcp -j DROP 367s + iptables -A OUTPUT -d 10.255.255.2/32 -p tcp -j DROP 367s + uname -m 367s + [ ppc64le = ppc64le ] 367s + systemctl is-active keyboard-setup.service 367s + [ active = failed ] 367s + [ -d /run/systemd/system ] 367s + systemd-detect-virt --quiet --vm 367s + mkdir -p /etc/systemd/system/systemd-random-seed.service.d/ 367s + cat 367s + grep -q lz4 /etc/initramfs-tools/initramfs.conf 367s + echo COMPRESS=lz4 367s + sync 367s autopkgtest [10:48:23]: upgrading testbed (apt dist-upgrade and autopurge) 367s Reading package lists... 368s Building dependency tree... 368s Reading state information... 368s Calculating upgrade...Starting pkgProblemResolver with broken count: 0 368s Starting 2 pkgProblemResolver with broken count: 0 368s Done 368s Entering ResolveByKeep 368s 368s The following packages will be upgraded: 368s libcrypt-dev libcrypt1 369s 2 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 369s Need to get 265 kB of archives. 369s After this operation, 1024 B of additional disk space will be used. 369s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed/main ppc64el libcrypt-dev ppc64el 1:4.4.38-1 [150 kB] 369s Get:2 http://ftpmaster.internal/ubuntu plucky-proposed/main ppc64el libcrypt1 ppc64el 1:4.4.38-1 [115 kB] 369s Fetched 265 kB in 0s (623 kB/s) 369s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74045 files and directories currently installed.) 369s Preparing to unpack .../libcrypt-dev_1%3a4.4.38-1_ppc64el.deb ... 369s Unpacking libcrypt-dev:ppc64el (1:4.4.38-1) over (1:4.4.36-5) ... 369s Preparing to unpack .../libcrypt1_1%3a4.4.38-1_ppc64el.deb ... 369s Unpacking libcrypt1:ppc64el (1:4.4.38-1) over (1:4.4.36-5) ... 369s Setting up libcrypt1:ppc64el (1:4.4.38-1) ... 369s Setting up libcrypt-dev:ppc64el (1:4.4.38-1) ... 369s Processing triggers for man-db (2.13.0-1) ... 370s Processing triggers for libc-bin (2.40-4ubuntu1) ... 370s Reading package lists... 370s Building dependency tree... 370s Reading state information... 370s Starting pkgProblemResolver with broken count: 0 370s Starting 2 pkgProblemResolver with broken count: 0 370s Done 371s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 373s Reading package lists... 374s Building dependency tree... 374s Reading state information... 374s Starting pkgProblemResolver with broken count: 0 374s Starting 2 pkgProblemResolver with broken count: 0 374s Done 374s The following NEW packages will be installed: 374s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 374s libnss3-tools libreswan libunbound8 374s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 374s Need to get 3084 kB of archives. 374s After this operation, 14.9 MB of additional disk space will be used. 374s Get:1 http://ftpmaster.internal/ubuntu plucky/main ppc64el dns-root-data all 2024071801 [5802 B] 374s Get:2 http://ftpmaster.internal/ubuntu plucky/main ppc64el libnss3-tools ppc64el 2:3.106-1ubuntu1 [727 kB] 375s Get:3 http://ftpmaster.internal/ubuntu plucky/main ppc64el libevent-pthreads-2.1-7t64 ppc64el 2.1.12-stable-10 [8026 B] 375s Get:4 http://ftpmaster.internal/ubuntu plucky/universe ppc64el libldns3t64 ppc64el 1.8.4-2 [200 kB] 375s Get:5 http://ftpmaster.internal/ubuntu plucky/main ppc64el libevent-2.1-7t64 ppc64el 2.1.12-stable-10 [172 kB] 375s Get:6 http://ftpmaster.internal/ubuntu plucky/main ppc64el libunbound8 ppc64el 1.20.0-1ubuntu2.1 [546 kB] 375s Get:7 http://ftpmaster.internal/ubuntu plucky/universe ppc64el libreswan ppc64el 4.14-1ubuntu2 [1426 kB] 375s Fetched 3084 kB in 1s (4229 kB/s) 375s Selecting previously unselected package dns-root-data. 375s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74045 files and directories currently installed.) 375s Preparing to unpack .../0-dns-root-data_2024071801_all.deb ... 375s Unpacking dns-root-data (2024071801) ... 375s Selecting previously unselected package libnss3-tools. 375s Preparing to unpack .../1-libnss3-tools_2%3a3.106-1ubuntu1_ppc64el.deb ... 375s Unpacking libnss3-tools (2:3.106-1ubuntu1) ... 375s Selecting previously unselected package libevent-pthreads-2.1-7t64:ppc64el. 375s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10_ppc64el.deb ... 375s Unpacking libevent-pthreads-2.1-7t64:ppc64el (2.1.12-stable-10) ... 375s Selecting previously unselected package libldns3t64:ppc64el. 375s Preparing to unpack .../3-libldns3t64_1.8.4-2_ppc64el.deb ... 375s Unpacking libldns3t64:ppc64el (1.8.4-2) ... 375s Selecting previously unselected package libevent-2.1-7t64:ppc64el. 375s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10_ppc64el.deb ... 375s Unpacking libevent-2.1-7t64:ppc64el (2.1.12-stable-10) ... 375s Selecting previously unselected package libunbound8:ppc64el. 375s Preparing to unpack .../5-libunbound8_1.20.0-1ubuntu2.1_ppc64el.deb ... 375s Unpacking libunbound8:ppc64el (1.20.0-1ubuntu2.1) ... 375s Selecting previously unselected package libreswan. 375s Preparing to unpack .../6-libreswan_4.14-1ubuntu2_ppc64el.deb ... 375s Unpacking libreswan (4.14-1ubuntu2) ... 375s Setting up libldns3t64:ppc64el (1.8.4-2) ... 375s Setting up libevent-pthreads-2.1-7t64:ppc64el (2.1.12-stable-10) ... 375s Setting up libevent-2.1-7t64:ppc64el (2.1.12-stable-10) ... 375s Setting up dns-root-data (2024071801) ... 375s Setting up libunbound8:ppc64el (1.20.0-1ubuntu2.1) ... 375s Setting up libnss3-tools (2:3.106-1ubuntu1) ... 375s Setting up libreswan (4.14-1ubuntu2) ... 376s ipsec.service is a disabled or a static unit, not starting it. 376s Processing triggers for man-db (2.13.0-1) ... 377s Processing triggers for libc-bin (2.40-4ubuntu1) ... 401s autopkgtest [10:48:57]: test cavp: [----------------------- 401s Testing installed CAVP binary: /usr/libexec/ipsec/cavp 403s test: IKE v2 403s Reading from ikev2.fax 408s test: IKE v1 Digital Signature Authentication 408s Reading from ikev1_dsa.fax 411s test: IKE v1 Pre-shared Key Authentication 411s Reading from ikev1_psk.fax 413s /tmp/autopkgtest.O5t2yb/build.Oep/src 414s autopkgtest [10:49:10]: test cavp: -----------------------] 414s autopkgtest [10:49:10]: test cavp: - - - - - - - - - - results - - - - - - - - - - 414s cavp PASS 415s autopkgtest [10:49:11]: @@@@@@@@@@@@@@@@@@@@ summary 415s opportunistic SKIP exit status 77 and marked as skippable 415s cryptocheck PASS 415s cavp PASS 420s nova [W] Using flock in prodstack6-ppc64el 420s Creating nova instance adt-plucky-ppc64el-libreswan-20250117-104216-juju-7f2275-prod-proposed-migration-environment-2-3bc96660-dab7-45d6-9a36-e6b4caf80535 from image adt/ubuntu-plucky-ppc64el-server-20250117.img (UUID fc4495f7-ff1c-4a92-a3fe-ee8c580d771a)... 420s nova [W] Timed out waiting for 5d9e4c05-a3a3-43c4-b7cc-4d5ff6506ee3 to get deleted. 420s nova [W] Using flock in prodstack6-ppc64el 420s Creating nova instance adt-plucky-ppc64el-libreswan-20250117-104216-juju-7f2275-prod-proposed-migration-environment-2-3bc96660-dab7-45d6-9a36-e6b4caf80535 from image adt/ubuntu-plucky-ppc64el-server-20250117.img (UUID fc4495f7-ff1c-4a92-a3fe-ee8c580d771a)... 420s nova [W] Timed out waiting for 51c4b208-9b06-460b-841a-c190f7c0a7f3 to get deleted. 420s nova [W] Using flock in prodstack6-ppc64el 420s Creating nova instance adt-plucky-ppc64el-libreswan-20250117-104216-juju-7f2275-prod-proposed-migration-environment-2-3bc96660-dab7-45d6-9a36-e6b4caf80535 from image adt/ubuntu-plucky-ppc64el-server-20250117.img (UUID fc4495f7-ff1c-4a92-a3fe-ee8c580d771a)... 420s nova [W] Timed out waiting for 9a55928d-c00c-4af3-8ba1-92e1dc8a3548 to get deleted.