0s autopkgtest [19:34:17]: starting date and time: 2024-11-15 19:34:17+0000 0s autopkgtest [19:34:17]: git checkout: 6f3be7a8 Fix armhf LXD image generation for plucky 0s autopkgtest [19:34:17]: host juju-7f2275-prod-proposed-migration-environment-15; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.l5i4t8gy/out --timeout-copy=6000 --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:audit --apt-upgrade libreswan --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 --env=ADT_TEST_TRIGGERS=audit/1:4.0.2-2ubuntu1 -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest-s390x --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-15@bos03-s390x-3.secgroup --name adt-plucky-s390x-libreswan-20241115-193417-juju-7f2275-prod-proposed-migration-environment-15-92e2fef9-ca25-49fa-897e-5998c28ccf05 --image adt/ubuntu-plucky-s390x-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-15 --net-id=net_prod-proposed-migration-s390x -e TERM=linux -e ''"'"'http_proxy=http://squid.internal:3128'"'"'' -e ''"'"'https_proxy=http://squid.internal:3128'"'"'' -e ''"'"'no_proxy=127.0.0.1,127.0.1.1,login.ubuntu.com,localhost,localdomain,novalocal,internal,archive.ubuntu.com,ports.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,keyserver.ubuntu.com,launchpadlibrarian.net,launchpadcontent.net,launchpad.net,10.24.0.0/24,keystone.ps5.canonical.com,objectstorage.prodstack5.canonical.com'"'"'' --mirror=http://ftpmaster.internal/ubuntu/ 104s autopkgtest [19:36:01]: testbed dpkg architecture: s390x 104s autopkgtest [19:36:01]: testbed apt version: 2.9.8 104s autopkgtest [19:36:01]: @@@@@@@@@@@@@@@@@@@@ test bed setup 105s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease [73.9 kB] 105s Get:2 http://ftpmaster.internal/ubuntu plucky-proposed/main Sources [91.9 kB] 105s Get:3 http://ftpmaster.internal/ubuntu plucky-proposed/restricted Sources [7016 B] 105s Get:4 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse Sources [15.5 kB] 105s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/universe Sources [1054 kB] 105s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x Packages [151 kB] 105s Get:7 http://ftpmaster.internal/ubuntu plucky-proposed/universe s390x Packages [755 kB] 105s Get:8 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse s390x Packages [4940 B] 105s Fetched 2153 kB in 1s (2594 kB/s) 105s Reading package lists... 107s Reading package lists... 107s Building dependency tree... 107s Reading state information... 108s Calculating upgrade... 108s The following NEW packages will be installed: 108s libassuan9 108s The following packages will be upgraded: 108s libaudit-common libaudit1 libgpgme11t64 libseccomp2 python3-cffi-backend 108s python3-markupsafe 108s 6 upgraded, 1 newly installed, 0 to remove and 0 not upgraded. 108s Need to get 411 kB of archives. 108s After this operation, 352 kB of additional disk space will be used. 108s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libaudit-common all 1:4.0.2-2ubuntu1 [6578 B] 108s Get:2 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libaudit1 s390x 1:4.0.2-2ubuntu1 [52.5 kB] 108s Get:3 http://ftpmaster.internal/ubuntu plucky/main s390x libseccomp2 s390x 2.5.5-1ubuntu5 [52.1 kB] 108s Get:4 http://ftpmaster.internal/ubuntu plucky/main s390x python3-cffi-backend s390x 1.17.1-2build1 [91.3 kB] 108s Get:5 http://ftpmaster.internal/ubuntu plucky/main s390x libassuan9 s390x 3.0.1-2 [41.3 kB] 108s Get:6 http://ftpmaster.internal/ubuntu plucky/main s390x libgpgme11t64 s390x 1.24.0-2ubuntu1 [154 kB] 108s Get:7 http://ftpmaster.internal/ubuntu plucky/main s390x python3-markupsafe s390x 2.1.5-1build3 [12.9 kB] 108s Fetched 411 kB in 1s (762 kB/s) 109s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55517 files and directories currently installed.) 109s Preparing to unpack .../libaudit-common_1%3a4.0.2-2ubuntu1_all.deb ... 109s Unpacking libaudit-common (1:4.0.2-2ubuntu1) over (1:4.0.1-1ubuntu2) ... 109s Setting up libaudit-common (1:4.0.2-2ubuntu1) ... 109s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55517 files and directories currently installed.) 109s Preparing to unpack .../libaudit1_1%3a4.0.2-2ubuntu1_s390x.deb ... 109s Unpacking libaudit1:s390x (1:4.0.2-2ubuntu1) over (1:4.0.1-1ubuntu2) ... 109s Setting up libaudit1:s390x (1:4.0.2-2ubuntu1) ... 109s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55517 files and directories currently installed.) 109s Preparing to unpack .../libseccomp2_2.5.5-1ubuntu5_s390x.deb ... 109s Unpacking libseccomp2:s390x (2.5.5-1ubuntu5) over (2.5.5-1ubuntu4) ... 109s Setting up libseccomp2:s390x (2.5.5-1ubuntu5) ... 109s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55517 files and directories currently installed.) 109s Preparing to unpack .../python3-cffi-backend_1.17.1-2build1_s390x.deb ... 109s Unpacking python3-cffi-backend:s390x (1.17.1-2build1) over (1.17.1-2) ... 109s Selecting previously unselected package libassuan9:s390x. 109s Preparing to unpack .../libassuan9_3.0.1-2_s390x.deb ... 109s Unpacking libassuan9:s390x (3.0.1-2) ... 109s Preparing to unpack .../libgpgme11t64_1.24.0-2ubuntu1_s390x.deb ... 109s Unpacking libgpgme11t64:s390x (1.24.0-2ubuntu1) over (1.23.2-5ubuntu4) ... 109s Preparing to unpack .../python3-markupsafe_2.1.5-1build3_s390x.deb ... 109s Unpacking python3-markupsafe (2.1.5-1build3) over (2.1.5-1build2) ... 109s Setting up python3-markupsafe (2.1.5-1build3) ... 109s Setting up libassuan9:s390x (3.0.1-2) ... 109s Setting up libgpgme11t64:s390x (1.24.0-2ubuntu1) ... 109s Setting up python3-cffi-backend:s390x (1.17.1-2build1) ... 109s Processing triggers for man-db (2.13.0-1) ... 109s Processing triggers for libc-bin (2.40-1ubuntu3) ... 109s Reading package lists... 109s Building dependency tree... 109s Reading state information... 110s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 110s Hit:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease 110s Hit:2 http://ftpmaster.internal/ubuntu plucky InRelease 110s Hit:3 http://ftpmaster.internal/ubuntu plucky-updates InRelease 110s Hit:4 http://ftpmaster.internal/ubuntu plucky-security InRelease 111s Reading package lists... 111s Reading package lists... 111s Building dependency tree... 111s Reading state information... 111s Calculating upgrade... 111s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 111s Reading package lists... 111s Building dependency tree... 111s Reading state information... 112s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 114s autopkgtest [19:36:11]: testbed running kernel: Linux 6.11.0-8-generic #8-Ubuntu SMP Mon Sep 16 12:49:35 UTC 2024 114s autopkgtest [19:36:11]: @@@@@@@@@@@@@@@@@@@@ apt-source libreswan 116s Get:1 http://ftpmaster.internal/ubuntu plucky/universe libreswan 4.14-1ubuntu2 (dsc) [2781 B] 116s Get:2 http://ftpmaster.internal/ubuntu plucky/universe libreswan 4.14-1ubuntu2 (tar) [3721 kB] 116s Get:3 http://ftpmaster.internal/ubuntu plucky/universe libreswan 4.14-1ubuntu2 (asc) [862 B] 116s Get:4 http://ftpmaster.internal/ubuntu plucky/universe libreswan 4.14-1ubuntu2 (diff) [17.5 kB] 116s gpgv: Signature made Sun Mar 31 19:34:12 2024 UTC 116s gpgv: using RSA key AC483F68DE728F43F2202FCA568D30F321B2133D 116s gpgv: issuer "steve.langasek@ubuntu.com" 116s gpgv: Can't check signature: No public key 116s dpkg-source: warning: cannot verify inline signature for ./libreswan_4.14-1ubuntu2.dsc: no acceptable signature found 117s autopkgtest [19:36:14]: testing package libreswan version 4.14-1ubuntu2 117s autopkgtest [19:36:14]: build not needed 122s autopkgtest [19:36:19]: test opportunistic: preparing testbed 125s Reading package lists... 125s Building dependency tree... 125s Reading state information... 126s Starting pkgProblemResolver with broken count: 0 126s Starting 2 pkgProblemResolver with broken count: 0 126s Done 126s The following additional packages will be installed: 126s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 126s libnss3-tools libreswan libunbound8 126s The following NEW packages will be installed: 126s autopkgtest-satdep dns-root-data libevent-2.1-7t64 126s libevent-pthreads-2.1-7t64 libldns3t64 libnss3-tools libreswan libunbound8 126s 0 upgraded, 8 newly installed, 0 to remove and 0 not upgraded. 126s Need to get 2744 kB/2745 kB of archives. 126s After this operation, 10.8 MB of additional disk space will be used. 126s Get:1 /tmp/autopkgtest.hcjUJG/1-autopkgtest-satdep.deb autopkgtest-satdep s390x 0 [736 B] 126s Get:2 http://ftpmaster.internal/ubuntu plucky/main s390x dns-root-data all 2024071800 [4380 B] 126s Get:3 http://ftpmaster.internal/ubuntu plucky/main s390x libnss3-tools s390x 2:3.103-1 [629 kB] 126s Get:4 http://ftpmaster.internal/ubuntu plucky/main s390x libevent-pthreads-2.1-7t64 s390x 2.1.12-stable-10 [7870 B] 126s Get:5 http://ftpmaster.internal/ubuntu plucky/universe s390x libldns3t64 s390x 1.8.4-1 [169 kB] 126s Get:6 http://ftpmaster.internal/ubuntu plucky/main s390x libevent-2.1-7t64 s390x 2.1.12-stable-10 [145 kB] 126s Get:7 http://ftpmaster.internal/ubuntu plucky/main s390x libunbound8 s390x 1.20.0-1ubuntu2.1 [455 kB] 126s Get:8 http://ftpmaster.internal/ubuntu plucky/universe s390x libreswan s390x 4.14-1ubuntu2 [1335 kB] 127s Fetched 2744 kB in 1s (3923 kB/s) 127s Selecting previously unselected package dns-root-data. 127s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55524 files and directories currently installed.) 127s Preparing to unpack .../0-dns-root-data_2024071800_all.deb ... 127s Unpacking dns-root-data (2024071800) ... 127s Selecting previously unselected package libnss3-tools. 127s Preparing to unpack .../1-libnss3-tools_2%3a3.103-1_s390x.deb ... 127s Unpacking libnss3-tools (2:3.103-1) ... 127s Selecting previously unselected package libevent-pthreads-2.1-7t64:s390x. 127s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10_s390x.deb ... 127s Unpacking libevent-pthreads-2.1-7t64:s390x (2.1.12-stable-10) ... 127s Selecting previously unselected package libldns3t64:s390x. 127s Preparing to unpack .../3-libldns3t64_1.8.4-1_s390x.deb ... 127s Unpacking libldns3t64:s390x (1.8.4-1) ... 127s Selecting previously unselected package libevent-2.1-7t64:s390x. 127s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10_s390x.deb ... 127s Unpacking libevent-2.1-7t64:s390x (2.1.12-stable-10) ... 127s Selecting previously unselected package libunbound8:s390x. 127s Preparing to unpack .../5-libunbound8_1.20.0-1ubuntu2.1_s390x.deb ... 127s Unpacking libunbound8:s390x (1.20.0-1ubuntu2.1) ... 127s Selecting previously unselected package libreswan. 127s Preparing to unpack .../6-libreswan_4.14-1ubuntu2_s390x.deb ... 127s Unpacking libreswan (4.14-1ubuntu2) ... 127s Selecting previously unselected package autopkgtest-satdep. 127s Preparing to unpack .../7-1-autopkgtest-satdep.deb ... 127s Unpacking autopkgtest-satdep (0) ... 127s Setting up libldns3t64:s390x (1.8.4-1) ... 127s Setting up libevent-pthreads-2.1-7t64:s390x (2.1.12-stable-10) ... 127s Setting up libevent-2.1-7t64:s390x (2.1.12-stable-10) ... 127s Setting up dns-root-data (2024071800) ... 127s Setting up libunbound8:s390x (1.20.0-1ubuntu2.1) ... 127s Setting up libnss3-tools (2:3.103-1) ... 127s Setting up libreswan (4.14-1ubuntu2) ... 127s ipsec.service is a disabled or a static unit, not starting it. 127s Setting up autopkgtest-satdep (0) ... 127s Processing triggers for man-db (2.13.0-1) ... 128s Processing triggers for libc-bin (2.40-1ubuntu3) ... 130s (Reading database ... 55721 files and directories currently installed.) 130s Removing autopkgtest-satdep (0) ... 130s autopkgtest [19:36:27]: test opportunistic: [----------------------- 130s PING oe.libreswan.org (193.110.157.124) 56(84) bytes of data. 130s From 10.145.255.2 icmp_seq=1 Destination Port Unreachable 132s From 10.145.255.2 icmp_seq=2 Destination Port Unreachable 132s From 10.145.255.2 icmp_seq=3 Destination Port Unreachable 133s From 10.145.255.2 icmp_seq=4 Destination Port Unreachable 135s From 10.145.255.2 icmp_seq=5 Destination Port Unreachable 135s 135s --- oe.libreswan.org ping statistics --- 135s 5 packets transmitted, 0 received, +5 errors, 100% packet loss, time 4084ms 135s 135s autopkgtest [19:36:32]: test opportunistic: -----------------------] 135s autopkgtest [19:36:32]: test opportunistic: - - - - - - - - - - results - - - - - - - - - - 135s opportunistic SKIP exit status 77 and marked as skippable 136s autopkgtest [19:36:33]: test cryptocheck: preparing testbed 557s autopkgtest [19:43:34]: testbed dpkg architecture: s390x 557s autopkgtest [19:43:34]: testbed apt version: 2.9.8 557s autopkgtest [19:43:34]: @@@@@@@@@@@@@@@@@@@@ test bed setup 558s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease [73.9 kB] 558s Get:2 http://ftpmaster.internal/ubuntu plucky-proposed/restricted Sources [7016 B] 558s Get:3 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse Sources [15.5 kB] 558s Get:4 http://ftpmaster.internal/ubuntu plucky-proposed/main Sources [92.2 kB] 558s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/universe Sources [1043 kB] 558s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x Packages [150 kB] 558s Get:7 http://ftpmaster.internal/ubuntu plucky-proposed/universe s390x Packages [747 kB] 558s Get:8 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse s390x Packages [4940 B] 558s Fetched 2133 kB in 1s (2543 kB/s) 558s Reading package lists... 560s Reading package lists... 560s Building dependency tree... 560s Reading state information... 560s Calculating upgrade... 561s The following NEW packages will be installed: 561s libassuan9 561s The following packages will be upgraded: 561s libaudit-common libaudit1 libgpgme11t64 libseccomp2 python3-cffi-backend 561s python3-markupsafe 561s 6 upgraded, 1 newly installed, 0 to remove and 0 not upgraded. 561s Need to get 411 kB of archives. 561s After this operation, 352 kB of additional disk space will be used. 561s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libaudit-common all 1:4.0.2-2ubuntu1 [6578 B] 561s Get:2 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libaudit1 s390x 1:4.0.2-2ubuntu1 [52.5 kB] 561s Get:3 http://ftpmaster.internal/ubuntu plucky/main s390x libseccomp2 s390x 2.5.5-1ubuntu5 [52.1 kB] 561s Get:4 http://ftpmaster.internal/ubuntu plucky/main s390x python3-cffi-backend s390x 1.17.1-2build1 [91.3 kB] 561s Get:5 http://ftpmaster.internal/ubuntu plucky/main s390x libassuan9 s390x 3.0.1-2 [41.3 kB] 561s Get:6 http://ftpmaster.internal/ubuntu plucky/main s390x libgpgme11t64 s390x 1.24.0-2ubuntu1 [154 kB] 561s Get:7 http://ftpmaster.internal/ubuntu plucky/main s390x python3-markupsafe s390x 2.1.5-1build3 [12.9 kB] 561s Fetched 411 kB in 0s (877 kB/s) 561s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55517 files and directories currently installed.) 561s Preparing to unpack .../libaudit-common_1%3a4.0.2-2ubuntu1_all.deb ... 561s Unpacking libaudit-common (1:4.0.2-2ubuntu1) over (1:4.0.1-1ubuntu2) ... 561s Setting up libaudit-common (1:4.0.2-2ubuntu1) ... 562s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55517 files and directories currently installed.) 562s Preparing to unpack .../libaudit1_1%3a4.0.2-2ubuntu1_s390x.deb ... 562s Unpacking libaudit1:s390x (1:4.0.2-2ubuntu1) over (1:4.0.1-1ubuntu2) ... 562s Setting up libaudit1:s390x (1:4.0.2-2ubuntu1) ... 562s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55517 files and directories currently installed.) 562s Preparing to unpack .../libseccomp2_2.5.5-1ubuntu5_s390x.deb ... 562s Unpacking libseccomp2:s390x (2.5.5-1ubuntu5) over (2.5.5-1ubuntu4) ... 562s Setting up libseccomp2:s390x (2.5.5-1ubuntu5) ... 562s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55517 files and directories currently installed.) 562s Preparing to unpack .../python3-cffi-backend_1.17.1-2build1_s390x.deb ... 562s Unpacking python3-cffi-backend:s390x (1.17.1-2build1) over (1.17.1-2) ... 562s Selecting previously unselected package libassuan9:s390x. 562s Preparing to unpack .../libassuan9_3.0.1-2_s390x.deb ... 562s Unpacking libassuan9:s390x (3.0.1-2) ... 562s Preparing to unpack .../libgpgme11t64_1.24.0-2ubuntu1_s390x.deb ... 562s Unpacking libgpgme11t64:s390x (1.24.0-2ubuntu1) over (1.23.2-5ubuntu4) ... 562s Preparing to unpack .../python3-markupsafe_2.1.5-1build3_s390x.deb ... 562s Unpacking python3-markupsafe (2.1.5-1build3) over (2.1.5-1build2) ... 562s Setting up python3-markupsafe (2.1.5-1build3) ... 562s Setting up libassuan9:s390x (3.0.1-2) ... 562s Setting up libgpgme11t64:s390x (1.24.0-2ubuntu1) ... 562s Setting up python3-cffi-backend:s390x (1.17.1-2build1) ... 562s Processing triggers for man-db (2.13.0-1) ... 562s Processing triggers for libc-bin (2.40-1ubuntu3) ... 562s Reading package lists... 562s Building dependency tree... 562s Reading state information... 562s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 563s Hit:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease 563s Hit:2 http://ftpmaster.internal/ubuntu plucky InRelease 563s Hit:3 http://ftpmaster.internal/ubuntu plucky-updates InRelease 563s Hit:4 http://ftpmaster.internal/ubuntu plucky-security InRelease 564s Reading package lists... 564s Reading package lists... 564s Building dependency tree... 564s Reading state information... 564s Calculating upgrade... 564s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 564s Reading package lists... 564s Building dependency tree... 564s Reading state information... 565s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 574s Reading package lists... 574s Building dependency tree... 574s Reading state information... 574s Starting pkgProblemResolver with broken count: 0 574s Starting 2 pkgProblemResolver with broken count: 0 574s Done 574s The following additional packages will be installed: 574s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 574s libnss3-tools libreswan libunbound8 574s The following NEW packages will be installed: 574s autopkgtest-satdep dns-root-data libevent-2.1-7t64 574s libevent-pthreads-2.1-7t64 libldns3t64 libnss3-tools libreswan libunbound8 574s 0 upgraded, 8 newly installed, 0 to remove and 0 not upgraded. 574s Need to get 2744 kB/2745 kB of archives. 574s After this operation, 10.8 MB of additional disk space will be used. 574s Get:1 /tmp/autopkgtest.hcjUJG/2-autopkgtest-satdep.deb autopkgtest-satdep s390x 0 [716 B] 574s Get:2 http://ftpmaster.internal/ubuntu plucky/main s390x dns-root-data all 2024071800 [4380 B] 574s Get:3 http://ftpmaster.internal/ubuntu plucky/main s390x libnss3-tools s390x 2:3.103-1 [629 kB] 575s Get:4 http://ftpmaster.internal/ubuntu plucky/main s390x libevent-pthreads-2.1-7t64 s390x 2.1.12-stable-10 [7870 B] 575s Get:5 http://ftpmaster.internal/ubuntu plucky/universe s390x libldns3t64 s390x 1.8.4-1 [169 kB] 575s Get:6 http://ftpmaster.internal/ubuntu plucky/main s390x libevent-2.1-7t64 s390x 2.1.12-stable-10 [145 kB] 575s Get:7 http://ftpmaster.internal/ubuntu plucky/main s390x libunbound8 s390x 1.20.0-1ubuntu2.1 [455 kB] 575s Get:8 http://ftpmaster.internal/ubuntu plucky/universe s390x libreswan s390x 4.14-1ubuntu2 [1335 kB] 575s Fetched 2744 kB in 1s (4007 kB/s) 575s Selecting previously unselected package dns-root-data. 575s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55524 files and directories currently installed.) 575s Preparing to unpack .../0-dns-root-data_2024071800_all.deb ... 575s Unpacking dns-root-data (2024071800) ... 575s Selecting previously unselected package libnss3-tools. 575s Preparing to unpack .../1-libnss3-tools_2%3a3.103-1_s390x.deb ... 575s Unpacking libnss3-tools (2:3.103-1) ... 575s Selecting previously unselected package libevent-pthreads-2.1-7t64:s390x. 575s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10_s390x.deb ... 575s Unpacking libevent-pthreads-2.1-7t64:s390x (2.1.12-stable-10) ... 575s Selecting previously unselected package libldns3t64:s390x. 575s Preparing to unpack .../3-libldns3t64_1.8.4-1_s390x.deb ... 575s Unpacking libldns3t64:s390x (1.8.4-1) ... 575s Selecting previously unselected package libevent-2.1-7t64:s390x. 575s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10_s390x.deb ... 575s Unpacking libevent-2.1-7t64:s390x (2.1.12-stable-10) ... 575s Selecting previously unselected package libunbound8:s390x. 575s Preparing to unpack .../5-libunbound8_1.20.0-1ubuntu2.1_s390x.deb ... 575s Unpacking libunbound8:s390x (1.20.0-1ubuntu2.1) ... 575s Selecting previously unselected package libreswan. 575s Preparing to unpack .../6-libreswan_4.14-1ubuntu2_s390x.deb ... 575s Unpacking libreswan (4.14-1ubuntu2) ... 575s Selecting previously unselected package autopkgtest-satdep. 575s Preparing to unpack .../7-2-autopkgtest-satdep.deb ... 575s Unpacking autopkgtest-satdep (0) ... 575s Setting up libldns3t64:s390x (1.8.4-1) ... 575s Setting up libevent-pthreads-2.1-7t64:s390x (2.1.12-stable-10) ... 575s Setting up libevent-2.1-7t64:s390x (2.1.12-stable-10) ... 575s Setting up dns-root-data (2024071800) ... 575s Setting up libunbound8:s390x (1.20.0-1ubuntu2.1) ... 575s Setting up libnss3-tools (2:3.103-1) ... 575s Setting up libreswan (4.14-1ubuntu2) ... 575s ipsec.service is a disabled or a static unit, not starting it. 575s Setting up autopkgtest-satdep (0) ... 575s Processing triggers for man-db (2.13.0-1) ... 576s Processing triggers for libc-bin (2.40-1ubuntu3) ... 578s (Reading database ... 55721 files and directories currently installed.) 578s Removing autopkgtest-satdep (0) ... 626s autopkgtest [19:44:43]: test cryptocheck: [----------------------- 626s Testing installed binary: /usr/libexec/ipsec/algparse 626s Testing installed binary: /usr/libexec/ipsec/pluto 626s testing -tp 626s algparse -v2 'esp' 626s AES_GCM_16_256-NONE 626s AES_GCM_16_128-NONE 626s AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 626s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 626s algparse -v2 'esp=' 626s ERROR: ESP proposal is empty 626s algparse -v2 'esp=aes' 626s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 626s algparse -v2 'esp=aes;modp2048' 626s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 626s algparse -v2 'esp=aes-sha1' 626s AES_CBC-HMAC_SHA1_96 626s algparse -v2 'esp=aes-sha1' 626s AES_CBC-HMAC_SHA1_96 626s algparse -v2 'esp=aes-sha1-modp2048' 626s AES_CBC-HMAC_SHA1_96 626s algparse -v2 'esp=aes-128-sha1' 626s AES_CBC_128-HMAC_SHA1_96 626s algparse -v2 'esp=aes-128-sha1' 626s AES_CBC_128-HMAC_SHA1_96 626s algparse -v2 'esp=aes-128-sha1-modp2048' 626s AES_CBC_128-HMAC_SHA1_96 626s algparse -v2 'esp=aes-128' 626s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 626s algparse -v2 'esp=aes_gcm_a-128-null' 626s AES_GCM_8_128-NONE 626s algparse -v2 'esp=3des-sha1;modp1024' 626s ERROR: ESP DH algorithm 'modp1024' is not supported 626s algparse -v2 'esp=3des-sha1;modp1536' 626s 3DES_CBC-HMAC_SHA1_96 626s algparse -v2 'esp=3des-sha1;modp2048' 626s 3DES_CBC-HMAC_SHA1_96 626s algparse -v2 'esp=3des-sha1;dh21' 626s 3DES_CBC-HMAC_SHA1_96 626s algparse -v2 'esp=3des-sha1;ecp_521' 626s 3DES_CBC-HMAC_SHA1_96 626s algparse -v2 'esp=3des-sha1;dh23' 626s ERROR: ESP DH algorithm 'dh23' is not supported 626s algparse -v2 'esp=3des-sha1;dh24' 626s ERROR: ESP DH algorithm 'dh24' is not supported 626s algparse -v2 'esp=3des-sha1' 626s 3DES_CBC-HMAC_SHA1_96 626s algparse -v2 'esp=null-sha1' 626s NULL-HMAC_SHA1_96 626s algparse -v2 'esp=aes_cbc' 626s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 626s algparse -v2 'esp=aes-sha' 626s AES_CBC-HMAC_SHA1_96 626s algparse -v2 'esp=aes-sha1' 626s AES_CBC-HMAC_SHA1_96 626s algparse -v2 'esp=aes128-sha1' 626s AES_CBC_128-HMAC_SHA1_96 626s algparse -v2 'esp=aes-sha2' 626s AES_CBC-HMAC_SHA2_256_128 626s algparse -v2 'esp=aes-sha256' 626s AES_CBC-HMAC_SHA2_256_128 626s algparse -v2 'esp=aes-sha384' 626s AES_CBC-HMAC_SHA2_384_192 626s algparse -v2 'esp=aes-sha512' 626s AES_CBC-HMAC_SHA2_512_256 626s algparse -v2 'esp=aes128-aes_xcbc' 626s AES_CBC_128-AES_XCBC_96 626s algparse -v2 'esp=aes192-sha1' 626s AES_CBC_192-HMAC_SHA1_96 626s algparse -v2 'esp=aes256-sha1' 626s AES_CBC_256-HMAC_SHA1_96 626s algparse -v2 'esp=aes256-sha' 626s AES_CBC_256-HMAC_SHA1_96 626s algparse -v2 'esp=aes256-sha2' 626s AES_CBC_256-HMAC_SHA2_256_128 626s algparse -v2 'esp=aes256-sha2_256' 626s AES_CBC_256-HMAC_SHA2_256_128 626s algparse -v2 'esp=aes256-sha2_384' 626s AES_CBC_256-HMAC_SHA2_384_192 626s algparse -v2 'esp=aes256-sha2_512' 626s AES_CBC_256-HMAC_SHA2_512_256 626s algparse -v2 'esp=camellia' 626s CAMELLIA_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 626s algparse -v2 'esp=camellia128' 626s CAMELLIA_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 626s algparse -v2 'esp=camellia192' 626s CAMELLIA_CBC_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 626s algparse -v2 'esp=camellia256' 626s CAMELLIA_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 626s algparse -v2 'esp=aes_ccm' 626s AES_CCM_16-NONE 626s algparse -v2 'esp=aes_ccm_a-128-null' 626s AES_CCM_8_128-NONE 626s algparse -v2 'esp=aes_ccm_a-192-null' 626s AES_CCM_8_192-NONE 626s algparse -v2 'esp=aes_ccm_a-256-null' 626s AES_CCM_8_256-NONE 626s algparse -v2 'esp=aes_ccm_b-128-null' 626s AES_CCM_12_128-NONE 626s algparse -v2 'esp=aes_ccm_b-192-null' 626s AES_CCM_12_192-NONE 626s algparse -v2 'esp=aes_ccm_b-256-null' 626s AES_CCM_12_256-NONE 626s algparse -v2 'esp=aes_ccm_c-128-null' 626s AES_CCM_16_128-NONE 626s algparse -v2 'esp=aes_ccm_c-192-null' 626s AES_CCM_16_192-NONE 626s algparse -v2 'esp=aes_ccm_c-256-null' 626s AES_CCM_16_256-NONE 626s algparse -v2 'esp=aes_gcm' 626s AES_GCM_16-NONE 626s algparse -v2 'esp=aes_gcm_a-128-null' 626s AES_GCM_8_128-NONE 626s algparse -v2 'esp=aes_gcm_a-192-null' 626s AES_GCM_8_192-NONE 626s algparse -v2 'esp=aes_gcm_a-256-null' 626s AES_GCM_8_256-NONE 626s algparse -v2 'esp=aes_gcm_b-128-null' 626s AES_GCM_12_128-NONE 626s algparse -v2 'esp=aes_gcm_b-192-null' 626s AES_GCM_12_192-NONE 626s algparse -v2 'esp=aes_gcm_b-256-null' 626s AES_GCM_12_256-NONE 626s algparse -v2 'esp=aes_gcm_c-128-null' 626s AES_GCM_16_128-NONE 626s algparse -v2 'esp=aes_gcm_c-192-null' 626s AES_GCM_16_192-NONE 626s algparse -v2 'esp=aes_gcm_c-256-null' 626s AES_GCM_16_256-NONE 626s algparse -v2 'esp=aes_ccm_a-null' 626s AES_CCM_8-NONE 626s algparse -v2 'esp=aes_ccm_b-null' 626s AES_CCM_12-NONE 626s algparse -v2 'esp=aes_ccm_c-null' 626s AES_CCM_16-NONE 626s algparse -v2 'esp=aes_gcm_a-null' 626s AES_GCM_8-NONE 626s algparse -v2 'esp=aes_gcm_b-null' 626s AES_GCM_12-NONE 626s algparse -v2 'esp=aes_gcm_c-null' 626s AES_GCM_16-NONE 626s algparse -v2 'esp=aes_ccm-null' 626s AES_CCM_16-NONE 626s algparse -v2 'esp=aes_gcm-null' 626s AES_GCM_16-NONE 626s algparse -v2 'esp=aes_ccm-256-null' 626s AES_CCM_16_256-NONE 626s algparse -v2 'esp=aes_gcm-192-null' 626s AES_GCM_16_192-NONE 626s algparse -v2 'esp=aes_ccm_256-null' 626s AES_CCM_16_256-NONE 626s algparse -v2 'esp=aes_gcm_192-null' 626s AES_GCM_16_192-NONE 626s algparse -v2 'esp=aes_ccm_8-null' 626s AES_CCM_8-NONE 626s algparse -v2 'esp=aes_ccm_12-null' 626s AES_CCM_12-NONE 626s algparse -v2 'esp=aes_ccm_16-null' 626s AES_CCM_16-NONE 626s algparse -v2 'esp=aes_gcm_8-null' 626s AES_GCM_8-NONE 626s algparse -v2 'esp=aes_gcm_12-null' 626s AES_GCM_12-NONE 626s algparse -v2 'esp=aes_gcm_16-null' 626s AES_GCM_16-NONE 626s algparse -v2 'esp=aes_ccm_8-128-null' 626s AES_CCM_8_128-NONE 626s algparse -v2 'esp=aes_ccm_12-192-null' 626s AES_CCM_12_192-NONE 626s algparse -v2 'esp=aes_ccm_16-256-null' 626s AES_CCM_16_256-NONE 626s algparse -v2 'esp=aes_gcm_8-128-null' 626s AES_GCM_8_128-NONE 626s algparse -v2 'esp=aes_gcm_12-192-null' 626s AES_GCM_12_192-NONE 626s algparse -v2 'esp=aes_gcm_16-256-null' 626s AES_GCM_16_256-NONE 626s algparse -v2 'esp=aes_ccm_8_128-null' 626s AES_CCM_8_128-NONE 626s algparse -v2 'esp=aes_ccm_12_192-null' 626s AES_CCM_12_192-NONE 626s algparse -v2 'esp=aes_ccm_16_256-null' 626s AES_CCM_16_256-NONE 626s algparse -v2 'esp=aes_gcm_8_128-null' 626s AES_GCM_8_128-NONE 626s algparse -v2 'esp=aes_gcm_12_192-null' 626s AES_GCM_12_192-NONE 626s algparse -v2 'esp=aes_gcm_16_256-null' 626s AES_GCM_16_256-NONE 626s algparse -v2 'esp=aes_ctr' 626s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 626s algparse -v2 'esp=aesctr' 626s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 626s algparse -v2 'esp=aes_ctr128' 626s AES_CTR_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 626s algparse -v2 'esp=aes_ctr192' 626s AES_CTR_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 626s algparse -v2 'esp=aes_ctr256' 626s AES_CTR_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 626s algparse -v2 'esp=camellia_cbc_256-hmac_sha2_512_256;modp8192' 626s CAMELLIA_CBC_256-HMAC_SHA2_512_256 626s algparse -v2 'esp=null_auth_aes_gmac_256-null;modp8192' 626s NULL_AUTH_AES_GMAC_256-NONE 626s algparse -v2 'esp=3des-sha1;modp8192' 626s 3DES_CBC-HMAC_SHA1_96 626s algparse -v2 'esp=3des-sha1-modp8192' 626s 3DES_CBC-HMAC_SHA1_96 626s algparse -v2 'esp=aes-sha1,3des-sha1;modp8192' 626s AES_CBC-HMAC_SHA1_96 626s 3DES_CBC-HMAC_SHA1_96 626s algparse -v2 'esp=aes-sha1-modp8192,3des-sha1-modp8192' 626s AES_CBC-HMAC_SHA1_96 626s 3DES_CBC-HMAC_SHA1_96 626s algparse -v2 'esp=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' 626s AES_CBC-HMAC_SHA1_96 626s algparse -v2 'esp=aes;none' 626s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 626s algparse -v2 'esp=aes;none,aes' 626s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 626s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 626s algparse -v2 'esp=aes;none,aes;modp2048' 626s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 626s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 626s algparse -v2 'esp=aes-sha1-none' 626s AES_CBC-HMAC_SHA1_96 626s algparse -v2 'esp=aes-sha1;none' 626s AES_CBC-HMAC_SHA1_96 626s algparse -v2 'esp=3des168-sha1' 626s ERROR: ESP encryption algorithm 3DES_CBC does not allow a key lengths 626s algparse -v2 'esp=3des-null' 626s ERROR: non-AEAD ESP encryption algorithm 3DES_CBC cannot have 'NONE' as the integrity algorithm 626s algparse -v2 'esp=aes128-null' 626s ERROR: non-AEAD ESP encryption algorithm AES_CBC cannot have 'NONE' as the integrity algorithm 626s algparse -v2 'esp=aes224-sha1' 626s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 626s algparse -v2 'esp=aes-224-sha1' 626s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 626s algparse -v2 'esp=aes0-sha1' 626s ERROR: ESP encryption key length is zero 626s algparse -v2 'esp=aes-0-sha1' 626s ERROR: ESP encryption key length is zero 626s algparse -v2 'esp=aes512-sha1' 626s ERROR: ESP encryption algorithm AES_CBC with key length 512 invalid; valid key lengths: 128, 192, 256 626s algparse -v2 'esp=aes-sha1555' 626s ERROR: ESP integrity algorithm 'sha1555' is not recognized 626s algparse -v2 'esp=camellia666-sha1' 626s ERROR: ESP encryption algorithm CAMELLIA_CBC with key length 666 invalid; valid key lengths: 128, 192, 256 626s algparse -v2 'esp=blowfish' 626s ERROR: ESP encryption algorithm 'blowfish' is not supported 626s algparse -v2 'esp=des-sha1' 626s ERROR: ESP encryption algorithm 'des' is not supported 626s algparse -v2 'esp=aes_ctr666' 626s ERROR: ESP encryption algorithm AES_CTR with key length 666 invalid; valid key lengths: 128, 192, 256 626s algparse -v2 'esp=aes128-sha2_128' 626s ERROR: ESP integrity algorithm 'sha2_128' is not recognized 626s algparse -v2 'esp=aes256-sha2_256-4096' 626s ERROR: ESP DH algorithm '4096' is not recognized 626s algparse -v2 'esp=aes256-sha2_256-128' 626s ERROR: ESP DH algorithm '128' is not recognized 626s algparse -v2 'esp=vanitycipher' 626s ERROR: ESP encryption algorithm 'vanitycipher' is not recognized 626s algparse -v2 'esp=ase-sah' 626s ERROR: ESP encryption algorithm 'ase' is not recognized 626s algparse -v2 'esp=aes-sah1' 626s ERROR: ESP integrity algorithm 'sah1' is not recognized 626s algparse -v2 'esp=id3' 626s ERROR: ESP encryption algorithm 'id3' is not recognized 626s algparse -v2 'esp=aes-id3' 626s ERROR: ESP integrity algorithm 'id3' is not recognized 626s algparse -v2 'esp=aes_gcm-md5' 626s ERROR: AEAD ESP encryption algorithm AES_GCM_16 must have 'NONE' as the integrity algorithm 626s algparse -v2 'esp=mars' 626s ERROR: ESP encryption algorithm 'mars' is not supported 626s algparse -v2 'esp=aes_gcm-16' 626s ERROR: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 626s algparse -v2 'esp=aes_gcm-0' 626s ERROR: ESP encryption key length is zero 626s algparse -v2 'esp=aes_gcm-123456789012345' 626s ERROR: ESP encryption algorithm 'aes_gcm-123456789012345' key length WAY too big 626s algparse -v2 'esp=3des-sha1;dh22' 626s ERROR: ESP DH algorithm 'dh22' is not supported 626s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2' 626s 3DES_CBC-HMAC_SHA1_96 626s 3DES_CBC-HMAC_SHA2_256_128 626s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2' 626s 3DES_CBC-HMAC_SHA1_96 626s 3DES_CBC-HMAC_SHA2_256_128 626s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2-modp8192' 626s 3DES_CBC-HMAC_SHA1_96 626s 3DES_CBC-HMAC_SHA2_256_128 626s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2;modp8192' 626s 3DES_CBC-HMAC_SHA1_96 626s 3DES_CBC-HMAC_SHA2_256_128 626s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2-modp8192' 626s 3DES_CBC-HMAC_SHA1_96 626s 3DES_CBC-HMAC_SHA2_256_128 626s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2;modp8192' 626s 3DES_CBC-HMAC_SHA1_96 626s 3DES_CBC-HMAC_SHA2_256_128 626s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2-modp2048' 626s 3DES_CBC-HMAC_SHA1_96 626s 3DES_CBC-HMAC_SHA2_256_128 626s algparse -v2 'ah' 626s algparse: Encryption algorithms: 626s algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 626s algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 626s algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 626s algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 626s algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 626s algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 626s algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm, aes_gcm_c 626s algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_b 626s algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_a 626s algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 626s algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 626s algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 626s algparse: NULL [] IKEv1: ESP IKEv2: ESP 626s algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 626s algparse: Hash algorithms: 626s algparse: MD5 IKEv1: IKE IKEv2: NSS 626s algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 626s algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 626s algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 626s algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 626s algparse: IDENTITY IKEv1: IKEv2: FIPS 626s algparse: PRF algorithms: 626s algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE native(HMAC) md5 626s algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 626s algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 626s algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 626s algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 626s algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 626s algparse: Integrity algorithms: 626s algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH native(HMAC) md5, hmac_md5 626s algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 626s algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 626s algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 626s algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 626s algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 626s algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 626s algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 626s algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 626s algparse: DH algorithms: 626s algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 626s algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 626s algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 626s algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 626s algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 626s algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 626s algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 626s algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 626s algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 626s algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 626s algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 626s algparse: IPCOMP algorithms: 626s algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 626s algparse: LZS IKEv1: IKEv2: ESP AH FIPS 626s algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 626s | parsing 'AES_GCM_16_256,AES_GCM_16_128,AES_CBC_256,AES_CBC_128' for ESP 626s | proposal: 'AES_GCM_16_256' 626s | token: '' '' "AES_GCM_16_256" '' 626s | token: '' "AES_GCM_16_256" '' '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_256' is not recognized 626s | token: '' '' '' 626s | appending ESP encryption algorithm AES_GCM_16[_256] 626s | appending ESP integrity algorithm NONE[_0] 626s | proposal: 'AES_GCM_16_128' 626s | token: '' '' "AES_GCM_16_128" '' 626s | token: '' "AES_GCM_16_128" '' '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_128' is not recognized 626s | token: '' '' '' 626s | appending ESP encryption algorithm AES_GCM_16[_128] 626s | appending ESP integrity algorithm NONE[_0] 626s | proposal: 'AES_CBC_256' 626s | token: '' '' "AES_CBC_256" '' 626s | token: '' "AES_CBC_256" '' '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_256' is not recognized 626s | token: '' '' '' 626s | appending ESP encryption algorithm AES_CBC[_256] 626s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 626s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 626s | proposal: 'AES_CBC_128' 626s | token: '' '' "AES_CBC_128" '' 626s | token: '' "AES_CBC_128" '' '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_128' is not recognized 626s | token: '' '' '' 626s | appending ESP encryption algorithm AES_CBC[_128] 626s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 626s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 626s | parsing '' for ESP 626s | parsing 'aes' for ESP 626s | proposal: 'aes' 626s | token: '' '' "aes" '' 626s | token: '' "aes" '' '' 626s | token: '' '' '' 626s | appending ESP encryption algorithm AES_CBC[_0] 626s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 626s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 626s | parsing 'aes;modp2048' for ESP 626s | proposal: 'aes;modp2048' 626s | token: '' '' "aes" ';' 626s | token: '' "aes" ';' "modp2048" '' 626s | token: ';' "modp2048" '' '' 626s | appending ESP encryption algorithm AES_CBC[_0] 626s | parsing dh: 626s | appending ESP DH algorithm MODP2048[_0] 626s | token: '' '' '' 626s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 626s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 626s algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 626s | parsing 'aes-sha1' for ESP 626s | proposal: 'aes-sha1' 626s | token: '' '' "aes" '-' 626s | token: '' "aes" '-' "sha1" '' 626s | token: '-' "sha1" '' '' 626s | appending ESP encryption algorithm AES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: '' '' '' 626s | parsing 'aes-sha1' for ESP 626s | proposal: 'aes-sha1' 626s | token: '' '' "aes" '-' 626s | token: '' "aes" '-' "sha1" '' 626s | token: '-' "sha1" '' '' 626s | appending ESP encryption algorithm AES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: '' '' '' 626s | parsing 'aes-sha1-modp2048' for ESP 626s | proposal: 'aes-sha1-modp2048' 626s | token: '' '' "aes" '-' 626s | token: '' "aes" '-' "sha1" '-' 626s | token: '-' "sha1" '-' "modp2048" '' 626s | appending ESP encryption algorithm AES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: '-' "modp2048" '' '' 626s | parsing dh: 626s | appending ESP DH algorithm MODP2048[_0] 626s | token: '' '' '' 626s algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 626s | parsing 'aes-128-sha1' for ESP 626s | proposal: 'aes-128-sha1' 626s | token: '' '' "aes" '-' 626s | token: '' "aes" '-' "128" '-' 626s | token: '-' "128" '-' "sha1" '' 626s | token: '-' "sha1" '' '' 626s | appending ESP encryption algorithm AES_CBC[_128] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: '' '' '' 626s | parsing 'aes-128-sha1' for ESP 626s | proposal: 'aes-128-sha1' 626s | token: '' '' "aes" '-' 626s | token: '' "aes" '-' "128" '-' 626s | token: '-' "128" '-' "sha1" '' 626s | token: '-' "sha1" '' '' 626s | appending ESP encryption algorithm AES_CBC[_128] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: '' '' '' 626s | parsing 'aes-128-sha1-modp2048' for ESP 626s | proposal: 'aes-128-sha1-modp2048' 626s | token: '' '' "aes" '-' 626s | token: '' "aes" '-' "128" '-' 626s | token: '-' "128" '-' "sha1" '-' 626s | token: '-' "sha1" '-' "modp2048" '' 626s | appending ESP encryption algorithm AES_CBC[_128] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: '-' "modp2048" '' '' 626s | parsing dh: 626s | appending ESP DH algorithm MODP2048[_0] 626s | token: '' '' '' 626s algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 626s | parsing 'aes-128' for ESP 626s | proposal: 'aes-128' 626s | token: '' '' "aes" '-' 626s | token: '' "aes" '-' "128" '' 626s | token: '-' "128" '' '' 626s | token: '' '' '' 626s | appending ESP encryption algorithm AES_CBC[_128] 626s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 626s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 626s | parsing 'aes_gcm_a-128-null' for ESP 626s | proposal: 'aes_gcm_a-128-null' 626s | token: '' '' "aes_gcm_a" '-' 626s | token: '' "aes_gcm_a" '-' "128" '-' 626s | token: '-' "128" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_GCM_8[_128] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing '3des-sha1;modp1024' for ESP 626s | proposal: '3des-sha1;modp1024' 626s | token: '' '' "3des" '-' 626s | token: '' "3des" '-' "sha1" ';' 626s | token: '-' "sha1" ';' "modp1024" '' 626s | appending ESP encryption algorithm 3DES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: ';' "modp1024" '' '' 626s | parsing dh: 626s | ike_alg_byname() failed: ESP DH algorithm 'modp1024' is not supported 626s | lookup for DH algorithm 'modp1024' failed 626s | ... failed 'ESP DH algorithm 'modp1024' is not supported' 626s | parsing '3des-sha1;modp1536' for ESP 626s | proposal: '3des-sha1;modp1536' 626s | token: '' '' "3des" '-' 626s | token: '' "3des" '-' "sha1" ';' 626s | token: '-' "sha1" ';' "modp1536" '' 626s | appending ESP encryption algorithm 3DES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: ';' "modp1536" '' '' 626s | parsing dh: 626s | appending ESP DH algorithm MODP1536[_0] 626s | token: '' '' '' 626s algparse: ignoring ESP DH algorithm MODP1536 as PFS policy is disabled 626s | parsing '3des-sha1;modp2048' for ESP 626s | proposal: '3des-sha1;modp2048' 626s | token: '' '' "3des" '-' 626s | token: '' "3des" '-' "sha1" ';' 626s | token: '-' "sha1" ';' "modp2048" '' 626s | appending ESP encryption algorithm 3DES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: ';' "modp2048" '' '' 626s | parsing dh: 626s | appending ESP DH algorithm MODP2048[_0] 626s | token: '' '' '' 626s algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 626s | parsing '3des-sha1;dh21' for ESP 626s | proposal: '3des-sha1;dh21' 626s | token: '' '' "3des" '-' 626s | token: '' "3des" '-' "sha1" ';' 626s | token: '-' "sha1" ';' "dh21" '' 626s | appending ESP encryption algorithm 3DES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: ';' "dh21" '' '' 626s | parsing dh: 626s | appending ESP DH algorithm DH21[_0] 626s | token: '' '' '' 626s algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 626s | parsing '3des-sha1;ecp_521' for ESP 626s | proposal: '3des-sha1;ecp_521' 626s | token: '' '' "3des" '-' 626s | token: '' "3des" '-' "sha1" ';' 626s | token: '-' "sha1" ';' "ecp_521" '' 626s | appending ESP encryption algorithm 3DES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: ';' "ecp_521" '' '' 626s | parsing dh: 626s | appending ESP DH algorithm DH21[_0] 626s | token: '' '' '' 626s algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 626s | parsing '3des-sha1;dh23' for ESP 626s | proposal: '3des-sha1;dh23' 626s | token: '' '' "3des" '-' 626s | token: '' "3des" '-' "sha1" ';' 626s | token: '-' "sha1" ';' "dh23" '' 626s | appending ESP encryption algorithm 3DES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: ';' "dh23" '' '' 626s | parsing dh: 626s | ike_alg_byname() failed: ESP DH algorithm 'dh23' is not supported 626s | lookup for DH algorithm 'dh23' failed 626s | ... failed 'ESP DH algorithm 'dh23' is not supported' 626s | parsing '3des-sha1;dh24' for ESP 626s | proposal: '3des-sha1;dh24' 626s | token: '' '' "3des" '-' 626s | token: '' "3des" '-' "sha1" ';' 626s | token: '-' "sha1" ';' "dh24" '' 626s | appending ESP encryption algorithm 3DES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: ';' "dh24" '' '' 626s | parsing dh: 626s | ike_alg_byname() failed: ESP DH algorithm 'dh24' is not supported 626s | lookup for DH algorithm 'dh24' failed 626s | ... failed 'ESP DH algorithm 'dh24' is not supported' 626s | parsing '3des-sha1' for ESP 626s | proposal: '3des-sha1' 626s | token: '' '' "3des" '-' 626s | token: '' "3des" '-' "sha1" '' 626s | token: '-' "sha1" '' '' 626s | appending ESP encryption algorithm 3DES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: '' '' '' 626s | parsing 'null-sha1' for ESP 626s | proposal: 'null-sha1' 626s | token: '' '' "null" '-' 626s | token: '' "null" '-' "sha1" '' 626s | token: '-' "sha1" '' '' 626s | appending ESP encryption algorithm NULL[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: '' '' '' 626s | parsing 'aes_cbc' for ESP 626s | proposal: 'aes_cbc' 626s | token: '' '' "aes_cbc" '' 626s | token: '' "aes_cbc" '' '' 626s | token: '' '' '' 626s | appending ESP encryption algorithm AES_CBC[_0] 626s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 626s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 626s | parsing 'aes-sha' for ESP 626s | proposal: 'aes-sha' 626s | token: '' '' "aes" '-' 626s | token: '' "aes" '-' "sha" '' 626s | token: '-' "sha" '' '' 626s | appending ESP encryption algorithm AES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: '' '' '' 626s | parsing 'aes-sha1' for ESP 626s | proposal: 'aes-sha1' 626s | token: '' '' "aes" '-' 626s | token: '' "aes" '-' "sha1" '' 626s | token: '-' "sha1" '' '' 626s | appending ESP encryption algorithm AES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: '' '' '' 626s | parsing 'aes128-sha1' for ESP 626s | proposal: 'aes128-sha1' 626s | token: '' '' "aes128" '-' 626s | token: '' "aes128" '-' "sha1" '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 626s | token: '-' "sha1" '' '' 626s | appending ESP encryption algorithm AES_CBC[_128] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: '' '' '' 626s | parsing 'aes-sha2' for ESP 626s | proposal: 'aes-sha2' 626s | token: '' '' "aes" '-' 626s | token: '' "aes" '-' "sha2" '' 626s | token: '-' "sha2" '' '' 626s | appending ESP encryption algorithm AES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 626s | token: '' '' '' 626s | parsing 'aes-sha256' for ESP 626s | proposal: 'aes-sha256' 626s | token: '' '' "aes" '-' 626s | token: '' "aes" '-' "sha256" '' 626s | token: '-' "sha256" '' '' 626s | appending ESP encryption algorithm AES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 626s | token: '' '' '' 626s | parsing 'aes-sha384' for ESP 626s | proposal: 'aes-sha384' 626s | token: '' '' "aes" '-' 626s | token: '' "aes" '-' "sha384" '' 626s | token: '-' "sha384" '' '' 626s | appending ESP encryption algorithm AES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 626s | token: '' '' '' 626s | parsing 'aes-sha512' for ESP 626s | proposal: 'aes-sha512' 626s | token: '' '' "aes" '-' 626s | token: '' "aes" '-' "sha512" '' 626s | token: '-' "sha512" '' '' 626s | appending ESP encryption algorithm AES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 626s | token: '' '' '' 626s | parsing 'aes128-aes_xcbc' for ESP 626s | proposal: 'aes128-aes_xcbc' 626s | token: '' '' "aes128" '-' 626s | token: '' "aes128" '-' "aes_xcbc" '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 626s | token: '-' "aes_xcbc" '' '' 626s | appending ESP encryption algorithm AES_CBC[_128] 626s | parsing integ: 626s | appending ESP integrity algorithm AES_XCBC_96[_0] 626s | token: '' '' '' 626s | parsing 'aes192-sha1' for ESP 626s | proposal: 'aes192-sha1' 626s | token: '' '' "aes192" '-' 626s | token: '' "aes192" '-' "sha1" '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'aes192' is not recognized 626s | token: '-' "sha1" '' '' 626s | appending ESP encryption algorithm AES_CBC[_192] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: '' '' '' 626s | parsing 'aes256-sha1' for ESP 626s | proposal: 'aes256-sha1' 626s | token: '' '' "aes256" '-' 626s | token: '' "aes256" '-' "sha1" '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 626s | token: '-' "sha1" '' '' 626s | appending ESP encryption algorithm AES_CBC[_256] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: '' '' '' 626s | parsing 'aes256-sha' for ESP 626s | proposal: 'aes256-sha' 626s | token: '' '' "aes256" '-' 626s | token: '' "aes256" '-' "sha" '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 626s | token: '-' "sha" '' '' 626s | appending ESP encryption algorithm AES_CBC[_256] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: '' '' '' 626s | parsing 'aes256-sha2' for ESP 626s | proposal: 'aes256-sha2' 626s | token: '' '' "aes256" '-' 626s | token: '' "aes256" '-' "sha2" '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 626s | token: '-' "sha2" '' '' 626s | appending ESP encryption algorithm AES_CBC[_256] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 626s | token: '' '' '' 626s | parsing 'aes256-sha2_256' for ESP 626s | proposal: 'aes256-sha2_256' 626s | token: '' '' "aes256" '-' 626s | token: '' "aes256" '-' "sha2_256" '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 626s | token: '-' "sha2_256" '' '' 626s | appending ESP encryption algorithm AES_CBC[_256] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 626s | token: '' '' '' 626s | parsing 'aes256-sha2_384' for ESP 626s | proposal: 'aes256-sha2_384' 626s | token: '' '' "aes256" '-' 626s | token: '' "aes256" '-' "sha2_384" '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 626s | token: '-' "sha2_384" '' '' 626s | appending ESP encryption algorithm AES_CBC[_256] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 626s | token: '' '' '' 626s | parsing 'aes256-sha2_512' for ESP 626s | proposal: 'aes256-sha2_512' 626s | token: '' '' "aes256" '-' 626s | token: '' "aes256" '-' "sha2_512" '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 626s | token: '-' "sha2_512" '' '' 626s | appending ESP encryption algorithm AES_CBC[_256] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 626s | token: '' '' '' 626s | parsing 'camellia' for ESP 626s | proposal: 'camellia' 626s | token: '' '' "camellia" '' 626s | token: '' "camellia" '' '' 626s | token: '' '' '' 626s | appending ESP encryption algorithm CAMELLIA_CBC[_0] 626s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 626s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 626s | parsing 'camellia128' for ESP 626s | proposal: 'camellia128' 626s | token: '' '' "camellia128" '' 626s | token: '' "camellia128" '' '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'camellia128' is not recognized 626s | token: '' '' '' 626s | appending ESP encryption algorithm CAMELLIA_CBC[_128] 626s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 626s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 626s | parsing 'camellia192' for ESP 626s | proposal: 'camellia192' 626s | token: '' '' "camellia192" '' 626s | token: '' "camellia192" '' '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'camellia192' is not recognized 626s | token: '' '' '' 626s | appending ESP encryption algorithm CAMELLIA_CBC[_192] 626s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 626s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 626s | parsing 'camellia256' for ESP 626s | proposal: 'camellia256' 626s | token: '' '' "camellia256" '' 626s | token: '' "camellia256" '' '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'camellia256' is not recognized 626s | token: '' '' '' 626s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 626s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 626s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 626s | parsing 'aes_ccm' for ESP 626s | proposal: 'aes_ccm' 626s | token: '' '' "aes_ccm" '' 626s | token: '' "aes_ccm" '' '' 626s | token: '' '' '' 626s | appending ESP encryption algorithm AES_CCM_16[_0] 626s | appending ESP integrity algorithm NONE[_0] 626s | parsing 'aes_ccm_a-128-null' for ESP 626s | proposal: 'aes_ccm_a-128-null' 626s | token: '' '' "aes_ccm_a" '-' 626s | token: '' "aes_ccm_a" '-' "128" '-' 626s | token: '-' "128" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_CCM_8[_128] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_ccm_a-192-null' for ESP 626s | proposal: 'aes_ccm_a-192-null' 626s | token: '' '' "aes_ccm_a" '-' 626s | token: '' "aes_ccm_a" '-' "192" '-' 626s | token: '-' "192" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_CCM_8[_192] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_ccm_a-256-null' for ESP 626s | proposal: 'aes_ccm_a-256-null' 626s | token: '' '' "aes_ccm_a" '-' 626s | token: '' "aes_ccm_a" '-' "256" '-' 626s | token: '-' "256" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_CCM_8[_256] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_ccm_b-128-null' for ESP 626s | proposal: 'aes_ccm_b-128-null' 626s | token: '' '' "aes_ccm_b" '-' 626s | token: '' "aes_ccm_b" '-' "128" '-' 626s | token: '-' "128" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_CCM_12[_128] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_ccm_b-192-null' for ESP 626s | proposal: 'aes_ccm_b-192-null' 626s | token: '' '' "aes_ccm_b" '-' 626s | token: '' "aes_ccm_b" '-' "192" '-' 626s | token: '-' "192" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_CCM_12[_192] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_ccm_b-256-null' for ESP 626s | proposal: 'aes_ccm_b-256-null' 626s | token: '' '' "aes_ccm_b" '-' 626s | token: '' "aes_ccm_b" '-' "256" '-' 626s | token: '-' "256" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_CCM_12[_256] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_ccm_c-128-null' for ESP 626s | proposal: 'aes_ccm_c-128-null' 626s | token: '' '' "aes_ccm_c" '-' 626s | token: '' "aes_ccm_c" '-' "128" '-' 626s | token: '-' "128" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_CCM_16[_128] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_ccm_c-192-null' for ESP 626s | proposal: 'aes_ccm_c-192-null' 626s | token: '' '' "aes_ccm_c" '-' 626s | token: '' "aes_ccm_c" '-' "192" '-' 626s | token: '-' "192" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_CCM_16[_192] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_ccm_c-256-null' for ESP 626s | proposal: 'aes_ccm_c-256-null' 626s | token: '' '' "aes_ccm_c" '-' 626s | token: '' "aes_ccm_c" '-' "256" '-' 626s | token: '-' "256" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_CCM_16[_256] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_gcm' for ESP 626s | proposal: 'aes_gcm' 626s | token: '' '' "aes_gcm" '' 626s | token: '' "aes_gcm" '' '' 626s | token: '' '' '' 626s | appending ESP encryption algorithm AES_GCM_16[_0] 626s | appending ESP integrity algorithm NONE[_0] 626s | parsing 'aes_gcm_a-128-null' for ESP 626s | proposal: 'aes_gcm_a-128-null' 626s | token: '' '' "aes_gcm_a" '-' 626s | token: '' "aes_gcm_a" '-' "128" '-' 626s | token: '-' "128" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_GCM_8[_128] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_gcm_a-192-null' for ESP 626s | proposal: 'aes_gcm_a-192-null' 626s | token: '' '' "aes_gcm_a" '-' 626s | token: '' "aes_gcm_a" '-' "192" '-' 626s | token: '-' "192" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_GCM_8[_192] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_gcm_a-256-null' for ESP 626s | proposal: 'aes_gcm_a-256-null' 626s | token: '' '' "aes_gcm_a" '-' 626s | token: '' "aes_gcm_a" '-' "256" '-' 626s | token: '-' "256" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_GCM_8[_256] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_gcm_b-128-null' for ESP 626s | proposal: 'aes_gcm_b-128-null' 626s | token: '' '' "aes_gcm_b" '-' 626s | token: '' "aes_gcm_b" '-' "128" '-' 626s | token: '-' "128" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_GCM_12[_128] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_gcm_b-192-null' for ESP 626s | proposal: 'aes_gcm_b-192-null' 626s | token: '' '' "aes_gcm_b" '-' 626s | token: '' "aes_gcm_b" '-' "192" '-' 626s | token: '-' "192" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_GCM_12[_192] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_gcm_b-256-null' for ESP 626s | proposal: 'aes_gcm_b-256-null' 626s | token: '' '' "aes_gcm_b" '-' 626s | token: '' "aes_gcm_b" '-' "256" '-' 626s | token: '-' "256" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_GCM_12[_256] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_gcm_c-128-null' for ESP 626s | proposal: 'aes_gcm_c-128-null' 626s | token: '' '' "aes_gcm_c" '-' 626s | token: '' "aes_gcm_c" '-' "128" '-' 626s | token: '-' "128" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_GCM_16[_128] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_gcm_c-192-null' for ESP 626s | proposal: 'aes_gcm_c-192-null' 626s | token: '' '' "aes_gcm_c" '-' 626s | token: '' "aes_gcm_c" '-' "192" '-' 626s | token: '-' "192" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_GCM_16[_192] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_gcm_c-256-null' for ESP 626s | proposal: 'aes_gcm_c-256-null' 626s | token: '' '' "aes_gcm_c" '-' 626s | token: '' "aes_gcm_c" '-' "256" '-' 626s | token: '-' "256" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_GCM_16[_256] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_ccm_a-null' for ESP 626s | proposal: 'aes_ccm_a-null' 626s | token: '' '' "aes_ccm_a" '-' 626s | token: '' "aes_ccm_a" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_CCM_8[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_ccm_b-null' for ESP 626s | proposal: 'aes_ccm_b-null' 626s | token: '' '' "aes_ccm_b" '-' 626s | token: '' "aes_ccm_b" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_CCM_12[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_ccm_c-null' for ESP 626s | proposal: 'aes_ccm_c-null' 626s | token: '' '' "aes_ccm_c" '-' 626s | token: '' "aes_ccm_c" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_CCM_16[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_gcm_a-null' for ESP 626s | proposal: 'aes_gcm_a-null' 626s | token: '' '' "aes_gcm_a" '-' 626s | token: '' "aes_gcm_a" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_GCM_8[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_gcm_b-null' for ESP 626s | proposal: 'aes_gcm_b-null' 626s | token: '' '' "aes_gcm_b" '-' 626s | token: '' "aes_gcm_b" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_GCM_12[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_gcm_c-null' for ESP 626s | proposal: 'aes_gcm_c-null' 626s | token: '' '' "aes_gcm_c" '-' 626s | token: '' "aes_gcm_c" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_GCM_16[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_ccm-null' for ESP 626s | proposal: 'aes_ccm-null' 626s | token: '' '' "aes_ccm" '-' 626s | token: '' "aes_ccm" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_CCM_16[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_gcm-null' for ESP 626s | proposal: 'aes_gcm-null' 626s | token: '' '' "aes_gcm" '-' 626s | token: '' "aes_gcm" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_GCM_16[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_ccm-256-null' for ESP 626s | proposal: 'aes_ccm-256-null' 626s | token: '' '' "aes_ccm" '-' 626s | token: '' "aes_ccm" '-' "256" '-' 626s | token: '-' "256" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_CCM_16[_256] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_gcm-192-null' for ESP 626s | proposal: 'aes_gcm-192-null' 626s | token: '' '' "aes_gcm" '-' 626s | token: '' "aes_gcm" '-' "192" '-' 626s | token: '-' "192" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_GCM_16[_192] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_ccm_256-null' for ESP 626s | proposal: 'aes_ccm_256-null' 626s | token: '' '' "aes_ccm_256" '-' 626s | token: '' "aes_ccm_256" '-' "null" '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_256' is not recognized 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_CCM_16[_256] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_gcm_192-null' for ESP 626s | proposal: 'aes_gcm_192-null' 626s | token: '' '' "aes_gcm_192" '-' 626s | token: '' "aes_gcm_192" '-' "null" '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_192' is not recognized 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_GCM_16[_192] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_ccm_8-null' for ESP 626s | proposal: 'aes_ccm_8-null' 626s | token: '' '' "aes_ccm_8" '-' 626s | token: '' "aes_ccm_8" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_CCM_8[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_ccm_12-null' for ESP 626s | proposal: 'aes_ccm_12-null' 626s | token: '' '' "aes_ccm_12" '-' 626s | token: '' "aes_ccm_12" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_CCM_12[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_ccm_16-null' for ESP 626s | proposal: 'aes_ccm_16-null' 626s | token: '' '' "aes_ccm_16" '-' 626s | token: '' "aes_ccm_16" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_CCM_16[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_gcm_8-null' for ESP 626s | proposal: 'aes_gcm_8-null' 626s | token: '' '' "aes_gcm_8" '-' 626s | token: '' "aes_gcm_8" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_GCM_8[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_gcm_12-null' for ESP 626s | proposal: 'aes_gcm_12-null' 626s | token: '' '' "aes_gcm_12" '-' 626s | token: '' "aes_gcm_12" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_GCM_12[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_gcm_16-null' for ESP 626s | proposal: 'aes_gcm_16-null' 626s | token: '' '' "aes_gcm_16" '-' 626s | token: '' "aes_gcm_16" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_GCM_16[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_ccm_8-128-null' for ESP 626s | proposal: 'aes_ccm_8-128-null' 626s | token: '' '' "aes_ccm_8" '-' 626s | token: '' "aes_ccm_8" '-' "128" '-' 626s | token: '-' "128" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_CCM_8[_128] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_ccm_12-192-null' for ESP 626s | proposal: 'aes_ccm_12-192-null' 626s | token: '' '' "aes_ccm_12" '-' 626s | token: '' "aes_ccm_12" '-' "192" '-' 626s | token: '-' "192" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_CCM_12[_192] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_ccm_16-256-null' for ESP 626s | proposal: 'aes_ccm_16-256-null' 626s | token: '' '' "aes_ccm_16" '-' 626s | token: '' "aes_ccm_16" '-' "256" '-' 626s | token: '-' "256" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_CCM_16[_256] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_gcm_8-128-null' for ESP 626s | proposal: 'aes_gcm_8-128-null' 626s | token: '' '' "aes_gcm_8" '-' 626s | token: '' "aes_gcm_8" '-' "128" '-' 626s | token: '-' "128" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_GCM_8[_128] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_gcm_12-192-null' for ESP 626s | proposal: 'aes_gcm_12-192-null' 626s | token: '' '' "aes_gcm_12" '-' 626s | token: '' "aes_gcm_12" '-' "192" '-' 626s | token: '-' "192" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_GCM_12[_192] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_gcm_16-256-null' for ESP 626s | proposal: 'aes_gcm_16-256-null' 626s | token: '' '' "aes_gcm_16" '-' 626s | token: '' "aes_gcm_16" '-' "256" '-' 626s | token: '-' "256" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_GCM_16[_256] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_ccm_8_128-null' for ESP 626s | proposal: 'aes_ccm_8_128-null' 626s | token: '' '' "aes_ccm_8_128" '-' 626s | token: '' "aes_ccm_8_128" '-' "null" '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_8_128' is not recognized 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_CCM_8[_128] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_ccm_12_192-null' for ESP 626s | proposal: 'aes_ccm_12_192-null' 626s | token: '' '' "aes_ccm_12_192" '-' 626s | token: '' "aes_ccm_12_192" '-' "null" '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_12_192' is not recognized 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_CCM_12[_192] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_ccm_16_256-null' for ESP 626s | proposal: 'aes_ccm_16_256-null' 626s | token: '' '' "aes_ccm_16_256" '-' 626s | token: '' "aes_ccm_16_256" '-' "null" '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_16_256' is not recognized 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_CCM_16[_256] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_gcm_8_128-null' for ESP 626s | proposal: 'aes_gcm_8_128-null' 626s | token: '' '' "aes_gcm_8_128" '-' 626s | token: '' "aes_gcm_8_128" '-' "null" '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_8_128' is not recognized 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_GCM_8[_128] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_gcm_12_192-null' for ESP 626s | proposal: 'aes_gcm_12_192-null' 626s | token: '' '' "aes_gcm_12_192" '-' 626s | token: '' "aes_gcm_12_192" '-' "null" '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_12_192' is not recognized 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_GCM_12[_192] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_gcm_16_256-null' for ESP 626s | proposal: 'aes_gcm_16_256-null' 626s | token: '' '' "aes_gcm_16_256" '-' 626s | token: '' "aes_gcm_16_256" '-' "null" '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_16_256' is not recognized 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_GCM_16[_256] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_ctr' for ESP 626s | proposal: 'aes_ctr' 626s | token: '' '' "aes_ctr" '' 626s | token: '' "aes_ctr" '' '' 626s | token: '' '' '' 626s | appending ESP encryption algorithm AES_CTR[_0] 626s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 626s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 626s | parsing 'aesctr' for ESP 626s | proposal: 'aesctr' 626s | token: '' '' "aesctr" '' 626s | token: '' "aesctr" '' '' 626s | token: '' '' '' 626s | appending ESP encryption algorithm AES_CTR[_0] 626s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 626s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 626s | parsing 'aes_ctr128' for ESP 626s | proposal: 'aes_ctr128' 626s | token: '' '' "aes_ctr128" '' 626s | token: '' "aes_ctr128" '' '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr128' is not recognized 626s | token: '' '' '' 626s | appending ESP encryption algorithm AES_CTR[_128] 626s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 626s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 626s | parsing 'aes_ctr192' for ESP 626s | proposal: 'aes_ctr192' 626s | token: '' '' "aes_ctr192" '' 626s | token: '' "aes_ctr192" '' '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr192' is not recognized 626s | token: '' '' '' 626s | appending ESP encryption algorithm AES_CTR[_192] 626s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 626s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 626s | parsing 'aes_ctr256' for ESP 626s | proposal: 'aes_ctr256' 626s | token: '' '' "aes_ctr256" '' 626s | token: '' "aes_ctr256" '' '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr256' is not recognized 626s | token: '' '' '' 626s | appending ESP encryption algorithm AES_CTR[_256] 626s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 626s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 626s | parsing 'camellia_cbc_256-hmac_sha2_512_256;modp8192' for ESP 626s | proposal: 'camellia_cbc_256-hmac_sha2_512_256;modp8192' 626s | token: '' '' "camellia_cbc_256" '-' 626s | token: '' "camellia_cbc_256" '-' "hmac_sha2_512_256" ';' 626s | ike_alg_byname() failed: ESP encryption algorithm 'camellia_cbc_256' is not recognized 626s | token: '-' "hmac_sha2_512_256" ';' "modp8192" '' 626s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 626s | token: ';' "modp8192" '' '' 626s | parsing dh: 626s | appending ESP DH algorithm MODP8192[_0] 626s | token: '' '' '' 626s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 626s | parsing 'null_auth_aes_gmac_256-null;modp8192' for ESP 626s | proposal: 'null_auth_aes_gmac_256-null;modp8192' 626s | token: '' '' "null_auth_aes_gmac_256" '-' 626s | token: '' "null_auth_aes_gmac_256" '-' "null" ';' 626s | ike_alg_byname() failed: ESP encryption algorithm 'null_auth_aes_gmac_256' is not recognized 626s | token: '-' "null" ';' "modp8192" '' 626s | appending ESP encryption algorithm NULL_AUTH_AES_GMAC[_256] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: ';' "modp8192" '' '' 626s | parsing dh: 626s | appending ESP DH algorithm MODP8192[_0] 626s | token: '' '' '' 626s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 626s | parsing '3des-sha1;modp8192' for ESP 626s | proposal: '3des-sha1;modp8192' 626s | token: '' '' "3des" '-' 626s | token: '' "3des" '-' "sha1" ';' 626s | token: '-' "sha1" ';' "modp8192" '' 626s | appending ESP encryption algorithm 3DES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: ';' "modp8192" '' '' 626s | parsing dh: 626s | appending ESP DH algorithm MODP8192[_0] 626s | token: '' '' '' 626s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 626s | parsing '3des-sha1-modp8192' for ESP 626s | proposal: '3des-sha1-modp8192' 626s | token: '' '' "3des" '-' 626s | token: '' "3des" '-' "sha1" '-' 626s | token: '-' "sha1" '-' "modp8192" '' 626s | appending ESP encryption algorithm 3DES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: '-' "modp8192" '' '' 626s | parsing dh: 626s | appending ESP DH algorithm MODP8192[_0] 626s | token: '' '' '' 626s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 626s | parsing 'aes-sha1,3des-sha1;modp8192' for ESP 626s | proposal: 'aes-sha1' 626s | token: '' '' "aes" '-' 626s | token: '' "aes" '-' "sha1" '' 626s | token: '-' "sha1" '' '' 626s | appending ESP encryption algorithm AES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: '' '' '' 626s | proposal: '3des-sha1;modp8192' 626s | token: '' '' "3des" '-' 626s | token: '' "3des" '-' "sha1" ';' 626s | token: '-' "sha1" ';' "modp8192" '' 626s | appending ESP encryption algorithm 3DES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: ';' "modp8192" '' '' 626s | parsing dh: 626s | appending ESP DH algorithm MODP8192[_0] 626s | token: '' '' '' 626s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 626s | parsing 'aes-sha1-modp8192,3des-sha1-modp8192' for ESP 626s | proposal: 'aes-sha1-modp8192' 626s | token: '' '' "aes" '-' 626s | token: '' "aes" '-' "sha1" '-' 626s | token: '-' "sha1" '-' "modp8192" '' 626s | appending ESP encryption algorithm AES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: '-' "modp8192" '' '' 626s | parsing dh: 626s | appending ESP DH algorithm MODP8192[_0] 626s | token: '' '' '' 626s | proposal: '3des-sha1-modp8192' 626s | token: '' '' "3des" '-' 626s | token: '' "3des" '-' "sha1" '-' 626s | token: '-' "sha1" '-' "modp8192" '' 626s | appending ESP encryption algorithm 3DES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: '-' "modp8192" '' '' 626s | parsing dh: 626s | appending ESP DH algorithm MODP8192[_0] 626s | token: '' '' '' 626s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 626s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 626s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for ESP 626s | proposal: 'aes-sha1-modp8192' 626s | token: '' '' "aes" '-' 626s | token: '' "aes" '-' "sha1" '-' 626s | token: '-' "sha1" '-' "modp8192" '' 626s | appending ESP encryption algorithm AES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: '-' "modp8192" '' '' 626s | parsing dh: 626s | appending ESP DH algorithm MODP8192[_0] 626s | token: '' '' '' 626s | proposal: 'aes-sha1-modp8192' 626s | token: '' '' "aes" '-' 626s | token: '' "aes" '-' "sha1" '-' 626s | token: '-' "sha1" '-' "modp8192" '' 626s | appending ESP encryption algorithm AES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: '-' "modp8192" '' '' 626s | parsing dh: 626s | appending ESP DH algorithm MODP8192[_0] 626s | token: '' '' '' 626s | proposal: 'aes-sha1-modp8192' 626s | token: '' '' "aes" '-' 626s | token: '' "aes" '-' "sha1" '-' 626s | token: '-' "sha1" '-' "modp8192" '' 626s | appending ESP encryption algorithm AES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: '-' "modp8192" '' '' 626s | parsing dh: 626s | appending ESP DH algorithm MODP8192[_0] 626s | token: '' '' '' 626s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 626s | parsing 'aes;none' for ESP 626s | proposal: 'aes;none' 626s | token: '' '' "aes" ';' 626s | token: '' "aes" ';' "none" '' 626s | token: ';' "none" '' '' 626s | appending ESP encryption algorithm AES_CBC[_0] 626s | parsing dh: 626s | appending ESP DH algorithm NONE[_0] 626s | token: '' '' '' 626s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 626s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 626s algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 626s | parsing 'aes;none,aes' for ESP 626s | proposal: 'aes;none' 626s | token: '' '' "aes" ';' 626s | token: '' "aes" ';' "none" '' 626s | token: ';' "none" '' '' 626s | appending ESP encryption algorithm AES_CBC[_0] 626s | parsing dh: 626s | appending ESP DH algorithm NONE[_0] 626s | token: '' '' '' 626s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 626s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 626s | proposal: 'aes' 626s | token: '' '' "aes" '' 626s | token: '' "aes" '' '' 626s | token: '' '' '' 626s | appending ESP encryption algorithm AES_CBC[_0] 626s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 626s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 626s algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 626s | parsing 'aes;none,aes;modp2048' for ESP 626s | proposal: 'aes;none' 626s | token: '' '' "aes" ';' 626s | token: '' "aes" ';' "none" '' 626s | token: ';' "none" '' '' 626s | appending ESP encryption algorithm AES_CBC[_0] 626s | parsing dh: 626s | appending ESP DH algorithm NONE[_0] 626s | token: '' '' '' 626s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 626s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 626s | proposal: 'aes;modp2048' 626s | token: '' '' "aes" ';' 626s | token: '' "aes" ';' "modp2048" '' 626s | token: ';' "modp2048" '' '' 626s | appending ESP encryption algorithm AES_CBC[_0] 626s | parsing dh: 626s | appending ESP DH algorithm MODP2048[_0] 626s | token: '' '' '' 626s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 626s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 626s algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 626s algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 626s | parsing 'aes-sha1-none' for ESP 626s | proposal: 'aes-sha1-none' 626s | token: '' '' "aes" '-' 626s | token: '' "aes" '-' "sha1" '-' 626s | token: '-' "sha1" '-' "none" '' 626s | appending ESP encryption algorithm AES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: '-' "none" '' '' 626s | parsing dh: 626s | appending ESP DH algorithm NONE[_0] 626s | token: '' '' '' 626s algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 626s | parsing 'aes-sha1;none' for ESP 626s | proposal: 'aes-sha1;none' 626s | token: '' '' "aes" '-' 626s | token: '' "aes" '-' "sha1" ';' 626s | token: '-' "sha1" ';' "none" '' 626s | appending ESP encryption algorithm AES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: ';' "none" '' '' 626s | parsing dh: 626s | appending ESP DH algorithm NONE[_0] 626s | token: '' '' '' 626s algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 626s | parsing '3des168-sha1' for ESP 626s | proposal: '3des168-sha1' 626s | token: '' '' "3des168" '-' 626s | token: '' "3des168" '-' "sha1" '' 626s | ike_alg_byname() failed: ESP encryption algorithm '3des168' is not recognized 626s | parsing '3des-null' for ESP 626s | proposal: '3des-null' 626s | token: '' '' "3des" '-' 626s | token: '' "3des" '-' "null" '' 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm 3DES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes128-null' for ESP 626s | proposal: 'aes128-null' 626s | token: '' '' "aes128" '-' 626s | token: '' "aes128" '-' "null" '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 626s | token: '-' "null" '' '' 626s | appending ESP encryption algorithm AES_CBC[_128] 626s | parsing integ: 626s | appending ESP integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes224-sha1' for ESP 626s | proposal: 'aes224-sha1' 626s | token: '' '' "aes224" '-' 626s | token: '' "aes224" '-' "sha1" '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'aes224' is not recognized 626s | parsing 'aes-224-sha1' for ESP 626s | proposal: 'aes-224-sha1' 626s | token: '' '' "aes" '-' 626s | token: '' "aes" '-' "224" '-' 626s | byname('aes') with ='224' failed: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 626s | parsing 'aes0-sha1' for ESP 626s | proposal: 'aes0-sha1' 626s | token: '' '' "aes0" '-' 626s | token: '' "aes0" '-' "sha1" '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'aes0' is not recognized 626s | parsing 'aes-0-sha1' for ESP 626s | proposal: 'aes-0-sha1' 626s | token: '' '' "aes" '-' 626s | token: '' "aes" '-' "0" '-' 626s | parsing 'aes512-sha1' for ESP 626s | proposal: 'aes512-sha1' 626s | token: '' '' "aes512" '-' 626s | token: '' "aes512" '-' "sha1" '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'aes512' is not recognized 626s | parsing 'aes-sha1555' for ESP 626s | proposal: 'aes-sha1555' 626s | token: '' '' "aes" '-' 626s | token: '' "aes" '-' "sha1555" '' 626s | token: '-' "sha1555" '' '' 626s | appending ESP encryption algorithm AES_CBC[_0] 626s | parsing integ: 626s | ike_alg_byname() failed: ESP integrity algorithm 'sha1555' is not recognized 626s | lookup for integrity algorithm 'sha1555' failed 626s | or - failed 'ESP integrity algorithm 'sha1555' is not recognized') 626s | parsing 'camellia666-sha1' for ESP 626s | proposal: 'camellia666-sha1' 626s | token: '' '' "camellia666" '-' 626s | token: '' "camellia666" '-' "sha1" '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'camellia666' is not recognized 626s | parsing 'blowfish' for ESP 626s | proposal: 'blowfish' 626s | token: '' '' "blowfish" '' 626s | token: '' "blowfish" '' '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'blowfish' is not supported 626s | parsing 'des-sha1' for ESP 626s | proposal: 'des-sha1' 626s | token: '' '' "des" '-' 626s | token: '' "des" '-' "sha1" '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'des' is not supported 626s | parsing 'aes_ctr666' for ESP 626s | proposal: 'aes_ctr666' 626s | token: '' '' "aes_ctr666" '' 626s | token: '' "aes_ctr666" '' '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr666' is not recognized 626s | parsing 'aes128-sha2_128' for ESP 626s | proposal: 'aes128-sha2_128' 626s | token: '' '' "aes128" '-' 626s | token: '' "aes128" '-' "sha2_128" '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 626s | token: '-' "sha2_128" '' '' 626s | appending ESP encryption algorithm AES_CBC[_128] 626s | parsing integ: 626s | ike_alg_byname() failed: ESP integrity algorithm 'sha2_128' is not recognized 626s | lookup for integrity algorithm 'sha2_128' failed 626s | or - failed 'ESP integrity algorithm 'sha2_128' is not recognized') 626s | parsing 'aes256-sha2_256-4096' for ESP 626s | proposal: 'aes256-sha2_256-4096' 626s | token: '' '' "aes256" '-' 626s | token: '' "aes256" '-' "sha2_256" '-' 626s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 626s | token: '-' "sha2_256" '-' "4096" '' 626s | appending ESP encryption algorithm AES_CBC[_256] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 626s | token: '-' "4096" '' '' 626s | parsing dh: 626s | ike_alg_byname() failed: ESP DH algorithm '4096' is not recognized 626s | lookup for DH algorithm '4096' failed 626s | ... failed 'ESP DH algorithm '4096' is not recognized' 626s | parsing 'aes256-sha2_256-128' for ESP 626s | proposal: 'aes256-sha2_256-128' 626s | token: '' '' "aes256" '-' 626s | token: '' "aes256" '-' "sha2_256" '-' 626s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 626s | token: '-' "sha2_256" '-' "128" '' 626s | appending ESP encryption algorithm AES_CBC[_256] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 626s | token: '-' "128" '' '' 626s | parsing dh: 626s | ike_alg_byname() failed: ESP DH algorithm '128' is not recognized 626s | lookup for DH algorithm '128' failed 626s | ... failed 'ESP DH algorithm '128' is not recognized' 626s | parsing 'vanitycipher' for ESP 626s | proposal: 'vanitycipher' 626s | token: '' '' "vanitycipher" '' 626s | token: '' "vanitycipher" '' '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'vanitycipher' is not recognized 626s | parsing 'ase-sah' for ESP 626s | proposal: 'ase-sah' 626s | token: '' '' "ase" '-' 626s | token: '' "ase" '-' "sah" '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'ase' is not recognized 626s | parsing 'aes-sah1' for ESP 626s | proposal: 'aes-sah1' 626s | token: '' '' "aes" '-' 626s | token: '' "aes" '-' "sah1" '' 626s | token: '-' "sah1" '' '' 626s | appending ESP encryption algorithm AES_CBC[_0] 626s | parsing integ: 626s | ike_alg_byname() failed: ESP integrity algorithm 'sah1' is not recognized 626s | lookup for integrity algorithm 'sah1' failed 626s | or - failed 'ESP integrity algorithm 'sah1' is not recognized') 626s | parsing 'id3' for ESP 626s | proposal: 'id3' 626s | token: '' '' "id3" '' 626s | token: '' "id3" '' '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 626s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 626s | parsing 'aes-id3' for ESP 626s | proposal: 'aes-id3' 626s | token: '' '' "aes" '-' 626s | token: '' "aes" '-' "id3" '' 626s | token: '-' "id3" '' '' 626s | appending ESP encryption algorithm AES_CBC[_0] 626s | parsing integ: 626s | ike_alg_byname() failed: ESP integrity algorithm 'id3' is not recognized 626s | lookup for integrity algorithm 'id3' failed 626s | or - failed 'ESP integrity algorithm 'id3' is not recognized') 626s | parsing 'aes_gcm-md5' for ESP 626s | proposal: 'aes_gcm-md5' 626s | token: '' '' "aes_gcm" '-' 626s | token: '' "aes_gcm" '-' "md5" '' 626s | token: '-' "md5" '' '' 626s | appending ESP encryption algorithm AES_GCM_16[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_MD5_96[_0] 626s | token: '' '' '' 626s | parsing 'mars' for ESP 626s | proposal: 'mars' 626s | token: '' '' "mars" '' 626s | token: '' "mars" '' '' 626s | ike_alg_byname() failed: ESP encryption algorithm 'mars' is not supported 626s | parsing 'aes_gcm-16' for ESP 626s | proposal: 'aes_gcm-16' 626s | token: '' '' "aes_gcm" '-' 626s | token: '' "aes_gcm" '-' "16" '' 626s | byname('aes_gcm') with ='16' failed: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 626s | parsing 'aes_gcm-0' for ESP 626s | proposal: 'aes_gcm-0' 626s | token: '' '' "aes_gcm" '-' 626s | token: '' "aes_gcm" '-' "0" '' 626s | parsing 'aes_gcm-123456789012345' for ESP 626s | proposal: 'aes_gcm-123456789012345' 626s | token: '' '' "aes_gcm" '-' 626s | token: '' "aes_gcm" '-' "123456789012345" '' 626s | parsing '3des-sha1;dh22' for ESP 626s | proposal: '3des-sha1;dh22' 626s | token: '' '' "3des" '-' 626s | token: '' "3des" '-' "sha1" ';' 626s | token: '-' "sha1" ';' "dh22" '' 626s | appending ESP encryption algorithm 3DES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: ';' "dh22" '' '' 626s | parsing dh: 626s | ike_alg_byname() failed: ESP DH algorithm 'dh22' is not supported 626s | lookup for DH algorithm 'dh22' failed 626s | ... failed 'ESP DH algorithm 'dh22' is not supported' 626s | parsing '3des-sha1;modp8192,3des-sha2' for ESP 626s | proposal: '3des-sha1;modp8192' 626s | token: '' '' "3des" '-' 626s | token: '' "3des" '-' "sha1" ';' 626s | token: '-' "sha1" ';' "modp8192" '' 626s | appending ESP encryption algorithm 3DES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: ';' "modp8192" '' '' 626s | parsing dh: 626s | appending ESP DH algorithm MODP8192[_0] 626s | token: '' '' '' 626s | proposal: '3des-sha2' 626s | token: '' '' "3des" '-' 626s | token: '' "3des" '-' "sha2" '' 626s | token: '-' "sha2" '' '' 626s | appending ESP encryption algorithm 3DES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 626s | token: '' '' '' 626s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 626s | parsing '3des-sha1-modp8192,3des-sha2' for ESP 626s | proposal: '3des-sha1-modp8192' 626s | token: '' '' "3des" '-' 626s | token: '' "3des" '-' "sha1" '-' 626s | token: '-' "sha1" '-' "modp8192" '' 626s | appending ESP encryption algorithm 3DES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: '-' "modp8192" '' '' 626s | parsing dh: 626s | appending ESP DH algorithm MODP8192[_0] 626s | token: '' '' '' 626s | proposal: '3des-sha2' 626s | token: '' '' "3des" '-' 626s | token: '' "3des" '-' "sha2" '' 626s | token: '-' "sha2" '' '' 626s | appending ESP encryption algorithm 3DES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 626s | token: '' '' '' 626s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 626s | parsing '3des-sha1-modp8192,3des-sha2-modp8192' for ESP 626s | proposal: '3des-sha1-modp8192' 626s | token: '' '' "3des" '-' 626s | token: '' "3des" '-' "sha1" '-' 626s | token: '-' "sha1" '-' "modp8192" '' 626s | appending ESP encryption algorithm 3DES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: '-' "modp8192" '' '' 626s | parsing dh: 626s | appending ESP DH algorithm MODP8192[_0] 626s | token: '' '' '' 626s | proposal: '3des-sha2-modp8192' 626s | token: '' '' "3des" '-' 626s | token: '' "3des" '-' "sha2" '-' 626s | token: '-' "sha2" '-' "modp8192" '' 626s | appending ESP encryption algorithm 3DES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 626s | token: '-' "modp8192" '' '' 626s | parsing dh: 626s | appending ESP DH algorithm MODP8192[_0] 626s | token: '' '' '' 626s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 626s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 626s | parsing '3des-sha1-modp8192,3des-sha2;modp8192' for ESP 626s | proposal: '3des-sha1-modp8192' 626s | token: '' '' "3des" '-' 626s | token: '' "3des" '-' "sha1" '-' 626s | token: '-' "sha1" '-' "modp8192" '' 626s | appending ESP encryption algorithm 3DES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: '-' "modp8192" '' '' 626s | parsing dh: 626s | appending ESP DH algorithm MODP8192[_0] 626s | token: '' '' '' 626s | proposal: '3des-sha2;modp8192' 626s | token: '' '' "3des" '-' 626s | token: '' "3des" '-' "sha2" ';' 626s | token: '-' "sha2" ';' "modp8192" '' 626s | appending ESP encryption algorithm 3DES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 626s | token: ';' "modp8192" '' '' 626s | parsing dh: 626s | appending ESP DH algorithm MODP8192[_0] 626s | token: '' '' '' 626s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 626s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 626s | parsing '3des-sha1;modp8192,3des-sha2-modp8192' for ESP 626s | proposal: '3des-sha1;modp8192' 626s | token: '' '' "3des" '-' 626s | token: '' "3des" '-' "sha1" ';' 626s | token: '-' "sha1" ';' "modp8192" '' 626s | appending ESP encryption algorithm 3DES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: ';' "modp8192" '' '' 626s | parsing dh: 626s | appending ESP DH algorithm MODP8192[_0] 626s | token: '' '' '' 626s | proposal: '3des-sha2-modp8192' 626s | token: '' '' "3des" '-' 626s | token: '' "3des" '-' "sha2" '-' 626s | token: '-' "sha2" '-' "modp8192" '' 626s | appending ESP encryption algorithm 3DES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 626s | token: '-' "modp8192" '' '' 626s | parsing dh: 626s | appending ESP DH algorithm MODP8192[_0] 626s | token: '' '' '' 626s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 626s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 626s | parsing '3des-sha1;modp8192,3des-sha2;modp8192' for ESP 626s | proposal: '3des-sha1;modp8192' 626s | token: '' '' "3des" '-' 626s | token: '' "3des" '-' "sha1" ';' 626s | token: '-' "sha1" ';' "modp8192" '' 626s | appending ESP encryption algorithm 3DES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: ';' "modp8192" '' '' 626s | parsing dh: 626s | appending ESP DH algorithm MODP8192[_0] 626s | token: '' '' '' 626s | proposal: '3des-sha2;modp8192' 626s | token: '' '' "3des" '-' 626s | token: '' "3des" '-' "sha2" ';' 626s | token: '-' "sha2" ';' "modp8192" '' 626s | appending ESP encryption algorithm 3DES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 626s | token: ';' "modp8192" '' '' 626s | parsing dh: 626s | appending ESP DH algorithm MODP8192[_0] 626s | token: '' '' '' 626s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 626s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 626s | parsing '3des-sha1-modp8192,3des-sha2-modp2048' for ESP 626s | proposal: '3des-sha1-modp8192' 626s | token: '' '' "3des" '-' 626s | token: '' "3des" '-' "sha1" '-' 626s | token: '-' "sha1" '-' "modp8192" '' 626s | appending ESP encryption algorithm 3DES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 626s | token: '-' "modp8192" '' '' 626s | parsing dh: 626s | appending ESP DH algorithm MODP8192[_0] 626s | token: '' '' '' 626s | proposal: '3des-sha2-modp2048' 626s | token: '' '' "3des" '-' 626s | token: '' "3des" '-' "sha2" '-' 626s | token: '-' "sha2" '-' "modp2048" '' 626s | appending ESP encryption algorithm 3DES_CBC[_0] 626s | parsing integ: 626s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 626s | token: '-' "modp2048" '' '' 626s | parsing dh: 626s | appending ESP DH algorithm MODP2048[_0] 626s | token: '' '' '' 626s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 626s algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 626s | parsing 'SHA2_512_256,SHA2_256_128,SHA1_96' for AH 626s | proposal: 'SHA2_512_256' 626s | token: '' '' "SHA2_512_256" '' 626s | token: '' "SHA2_512_256" '' '' 626s | parsing integ: 626s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 626s | token: '' '' '' 626s | proposal: 'SHA2_256_128' 626s | token: '' '' "SHA2_256_128" '' 626s | token: '' "SHA2_256_128" '' '' 626s | parsing integ: 626s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 626s | token: '' '' '' 626s | proposal: 'SHA1_96' 626s | token: '' '' "SHA1_96" '' 626s | token: '' "SHA1_96" '' '' 626s | parsing integ: 626s | appending AH integrity algorithm HMAC_SHA1_96[_0] 626s | token: '' '' '' 626s | parsing '' for AH 626s | parsing 'md5' for AH 626s | proposal: 'md5' 626s | token: '' '' "md5" '' 626s | token: '' "md5" '' '' 626s | parsing integ: 626s | appending AH integrity algorithm HMAC_MD5_96[_0] 626s | token: '' '' '' 626s | parsing 'sha' for AH 626s | proposal: 'sha' 626s | token: '' '' "sha" '' 626s | token: '' "sha" '' '' 626s | parsing integ: 626s | appending AH integrity algorithm HMAC_SHA1_96[_0] 626s | token: '' '' '' 626s | parsing 'sha;modp2048' for AH 626s | proposal: 'sha;modp2048' 626s | token: '' '' "sha" ';' 626s | token: '' "sha" ';' "modp2048" '' 626s | parsing integ: 626s | appending AH integrity algorithm HMAC_SHA1_96[_0] 626s | token: ';' "modp2048" '' '' 626s | parsing dh: 626s | appending AH DH algorithm MODP2048[_0] 626s | token: '' '' '' 626s algparse: ignoring AH DH algorithm MODP2048 as PFS policy is disabled 626s | parsing 'sha1' for AH 626s | proposal: 'sha1' 626s | token: '' '' "sha1" '' 626s | token: '' "sha1" '' '' 626s | parsing integ: 626s | appending AH integrity algorithm HMAC_SHA1_96[_0] 626s | token: '' '' '' 626s | parsing 'sha2' for AH 626s | proposal: 'sha2' 626s | token: '' '' "sha2" '' 626s | token: '' "sha2" '' '' 626s | parsing integ: 626s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 626s | token: '' '' '' 626s | parsing 'sha256' for AH 626s | proposal: 'sha256' 626s | token: '' '' "sha256" '' 626s | token: '' "sha256" '' '' 626s | parsing integ: 626s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 626s | token: '' '' '' 626s | parsing 'sha384' for AH 626s | proposal: 'sha384' 626s | token: '' '' "sha384" '' 626s | token: '' "sha384" '' '' 626s | parsing integ: 626s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 626s | token: '' '' '' 626s | parsing 'sha512' for AH 626s | proposal: 'sha512' 626s | token: '' '' "sha512" '' 626s | token: '' "sha512" '' '' 626s | parsing integ: 626s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 626s | token: '' '' '' 626s | parsing 'sha2_256' for AH 626s | proposal: 'sha2_256' 626s | token: '' '' "sha2_256" '' 626s | token: '' "sha2_256" '' '' 626s | parsing integ: 626s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 626s | token: '' '' '' 626s | parsing 'sha2_384' for AH 626s | proposal: 'sha2_384' 626s | token: '' '' "sha2_384" '' 626s | token: '' "sha2_384" '' '' 626s | parsing integ: 626s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 626s | token: '' '' '' 626s | parsing 'sha2_512' for AH 626s | proposal: 'sha2_512' 626s | token: '' '' "sha2_512" '' 626s | token: '' "sha2_512" '' '' 626s | parsing integ: 626s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 626s | token: '' '' '' 626s | parsing 'aes_xcbc' for AH 626s | proposal: 'aes_xcbc' 626s | token: '' '' "aes_xcbc" '' 626s | token: '' "aes_xcbc" '' '' 626s | parsing integ: 626s | appending AH integrity algorithm AES_XCBC_96[_0] 626s | token: '' '' '' 626s | parsing 'sha2-none' for AH 626s | proposal: 'sha2-none' 626s | token: '' '' "sha2" '-' 626s | token: '' "sha2" '-' "none" '' 626s | parsing integ: 626s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 626s | token: '-' "none" '' '' 626s | parsing dh: 626s | appending AH DH algorithm NONE[_0] 626s | token: '' '' '' 626s algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 626s | parsing 'sha2;none' for AH 626s | proposal: 'sha2;none' 626s | token: '' '' "sha2" ';' 626s | token: '' "sha2" ';' "none" '' 626s | parsing integ: 626s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 626s | token: ';' "none" '' '' 626s | parsing dh: 626s | appending AH DH algorithm NONE[_0] 626s | token: '' '' '' 626s algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 626s | parsing 'sha1-modp8192,sha1-modp8192,sha1-modp8192' for AH 626s | proposal: 'sha1-modp8192' 626s | token: '' '' "sha1" '-' 626s | token: '' "sha1" '-' "modp8192" '' 626s | parsing integ: 626s | appending AH integrity algorithm HMAC_SHA1_96[_0] 626s | token: '-' "modp8192" '' '' 626s | parsing dh: 626s | appending AH DH algorithm MODP8192[_0] 626s | token: '' '' '' 626s | proposal: 'sha1-modp8192' 626s | token: '' '' "sha1" '-' 626s | token: '' "sha1" '-' "modp8192" '' 626s | parsing integ: 626s | appending AH integrity algorithm HMAC_SHA1_96[_0] 626s | token: '-' "modp8192" '' '' 626s | parsing dh: 626s | appending AH DH algorithm MODP8192[_0] 626s | token: '' '' '' 626s | proposal: 'sha1-modp8192' 626s | token: '' '' "sha1" '-' 626s | token: '' "sha1" '-' "modp8192" '' 626s | parsing integ: 626s | appending AH integrity algorithm HMAC_SHA1_96[_0] 626s | token: '-' "modp8192" '' '' 626s | parsing dh: 626s | appending AH DH algorithm MODP8192[_0] 626s | token: '' '' '' 626s algparse: ignoring AH DH algorithm MODP8192 as PFS policy is disabled 626s | parsing 'aes-sha1' for AH 626s | proposal: 'aes-sha1' 626s | token: '' '' "aes" '-' 626s | token: '' "aes" '-' "sha1" '' 626s | parsing integ: 626s | ike_alg_byname() failed: AH integrity algorithm 'aes' is not recognized 626s | lookup for integrity algorithm 'aes' failed 626s | or - failed 'AH integrity algorithm 'aes' is not recognized') 626s | parsing 'vanityhash1' for AH 626s | proposal: 'vanityhash1' 626s | token: '' '' "vanityhash1" '' 626s | token: '' "vanityhash1" '' '' 626s | parsing integ: 626s | ike_alg_byname() failed: AH integrity algorithm 'vanityhash1' is not recognized 626s | lookup for integrity algorithm 'vanityhash1' failed 626s | or - failed 'AH integrity algorithm 'vanityhash1' is not recognized') 626s | parsing 'aes_gcm_c-256' for AH 626s | proposal: 'aes_gcm_c-256' 626s | token: '' '' "aes_gcm_c" '-' 626s | token: '' "aes_gcm_c" '-' "256" '' 626s | parsing integ: 626s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm_c' is not recognized 626s | lookup for integrity algorithm 'aes_gcm_c' failed 626s | or - failed 'AH integrity algorithm 'aes_gcm_c' is not recognized') 626s | parsing 'id3' for AH 626s | proposal: 'id3' 626s HMAC_SHA2_512_256 626s HMAC_SHA2_256_128 626s HMAC_SHA1_96 626s algparse -v2 'ah=' 626s ERROR: AH proposal is empty 626s algparse -v2 'ah=md5' 626s HMAC_MD5_96 626s algparse -v2 'ah=sha' 626s HMAC_SHA1_96 626s algparse -v2 'ah=sha;modp2048' 626s HMAC_SHA1_96 626s algparse -v2 'ah=sha1' 626s HMAC_SHA1_96 626s algparse -v2 'ah=sha2' 626s HMAC_SHA2_256_128 626s algparse -v2 'ah=sha256' 626s HMAC_SHA2_256_128 626s algparse -v2 'ah=sha384' 626s HMAC_SHA2_384_192 626s algparse -v2 'ah=sha512' 626s HMAC_SHA2_512_256 626s algparse -v2 'ah=sha2_256' 626s HMAC_SHA2_256_128 626s algparse -v2 'ah=sha2_384' 626s HMAC_SHA2_384_192 626s algparse -v2 'ah=sha2_512' 626s HMAC_SHA2_512_256 626s algparse -v2 'ah=aes_xcbc' 626s AES_XCBC_96 626s algparse -v2 'ah=sha2-none' 626s HMAC_SHA2_256_128 626s algparse -v2 'ah=sha2;none' 626s HMAC_SHA2_256_128 626s algparse -v2 'ah=sha1-modp8192,sha1-modp8192,sha1-modp8192' 626s HMAC_SHA1_96 626s algparse -v2 'ah=aes-sha1' 626s ERROR: AH integrity algorithm 'aes' is not recognized 626s algparse -v2 'ah=vanityhash1' 626s ERROR: AH integrity algorithm 'vanityhash1' is not recognized 626s algparse -v2 'ah=aes_gcm_c-256' 626s ERROR: AH integrity algorithm 'aes_gcm_c' is not recognized 626s algparse -v2 'ah=id3' 626s | token: '' '' "id3" '' 626s | token: '' "id3" '' '' 626s | parsing integ: 626s | ike_alg_byname() failed: AH integrity algorithm 'id3' is not recognized 626s | lookup for integrity algorithm 'id3' failed 626s | or - failed 'AH integrity algorithm 'id3' is not recognized') 626s | parsing '3des' for AH 626s | proposal: '3des' 626s | token: '' '' "3des" '' 626s | token: '' "3des" '' '' 626s | parsing integ: 626s | ike_alg_byname() failed: AH integrity algorithm '3des' is not recognized 626s | lookup for integrity algorithm '3des' failed 626s | or - failed 'AH integrity algorithm '3des' is not recognized') 626s | parsing 'null' for AH 626s | proposal: 'null' 626s | token: '' '' "null" '' 626s | token: '' "null" '' '' 626s | parsing integ: 626s | appending AH integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | parsing 'aes_gcm' for AH 626s | proposal: 'aes_gcm' 626s | token: '' '' "aes_gcm" '' 626s | token: '' "aes_gcm" '' '' 626s | parsing integ: 626s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm' is not recognized 626s | lookup for integrity algorithm 'aes_gcm' failed 626s | or - failed 'AH integrity algorithm 'aes_gcm' is not recognized') 626s | parsing 'aes_ccm' for AH 626s | proposal: 'aes_ccm' 626s | token: '' '' "aes_ccm" '' 626s | token: '' "aes_ccm" '' '' 626s | parsing integ: 626s | ike_alg_byname() failed: AH integrity algorithm 'aes_ccm' is not recognized 626s | lookup for integrity algorithm 'aes_ccm' failed 626s | or - failed 'AH integrity algorithm 'aes_ccm' is not recognized') 626s | parsing 'ripemd' for AH 626s | proposal: 'ripemd' 626s | token: '' '' "ripemd" '' 626s | token: '' "ripemd" '' '' 626s | parsing integ: 626s | ike_alg_byname() failed: AH integrity algorithm 'ripemd' is not recognized 626s | lookup for integrity algorithm 'ripemd' failed 626s | or - failed 'AH integrity algorithm 'ripemd' is not recognized') 626s | parsing 'AES_GCM_16_256,AES_GCM_16_128,AES_CBC_256,AES_CBC_128' for IKE 626s | proposal: 'AES_GCM_16_256' 626s | token: '' '' "AES_GCM_16_256" '' 626s | token: '' "AES_GCM_16_256" '' '' 626s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_256' is not recognized 626s | token: '' '' '' 626s | appending IKE encryption algorithm AES_GCM_16[_256] 626s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 626s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 626s | appending IKE integrity algorithm NONE[_0] 626s | appending IKE DH algorithm MODP2048[_0] 626s | appending IKE DH algorithm MODP3072[_0] 626s | appending IKE DH algorithm MODP4096[_0] 626s | appending IKE DH algorithm MODP8192[_0] 626s | appending IKE DH algorithm DH19[_0] 626s | appending IKE DH algorithm DH20[_0] 626s | appending IKE DH algorithm DH21[_0] 626s | appending IKE DH algorithm DH31[_0] 626s | proposal: 'AES_GCM_16_128' 626s | token: '' '' "AES_GCM_16_128" '' 626s | token: '' "AES_GCM_16_128" '' '' 626s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_128' is not recognized 626s | token: '' '' '' 626s | appending IKE encryption algorithm AES_GCM_16[_128] 626s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 626s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 626s | appending IKE integrity algorithm NONE[_0] 626s | appending IKE DH algorithm MODP2048[_0] 626s | appending IKE DH algorithm MODP3072[_0] 626s | appending IKE DH algorithm MODP4096[_0] 626s | appending IKE DH algorithm MODP8192[_0] 626s | appending IKE DH algorithm DH19[_0] 626s | appending IKE DH algorithm DH20[_0] 626s | appending IKE DH algorithm DH21[_0] 626s | appending IKE DH algorithm DH31[_0] 626s | proposal: 'AES_CBC_256' 626s | token: '' '' "AES_CBC_256" '' 626s | token: '' "AES_CBC_256" '' '' 626s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_256' is not recognized 626s | token: '' '' '' 626s | appending IKE encryption algorithm AES_CBC[_256] 626s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 626s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 626s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 626s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 626s | appending IKE DH algorithm MODP2048[_0] 626s | appending IKE DH algorithm MODP3072[_0] 626s | appending IKE DH algorithm MODP4096[_0] 626s | appending IKE DH algorithm MODP8192[_0] 626s | appending IKE DH algorithm DH19[_0] 626s | appending IKE DH algorithm DH20[_0] 626s | appending IKE DH algorithm DH21[_0] 626s | appending IKE DH algorithm DH31[_0] 626s | proposal: 'AES_CBC_128' 626s | token: '' '' "AES_CBC_128" '' 626s | token: '' "AES_CBC_128" '' '' 626s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_128' is not recognized 626s | token: '' '' '' 626s | appending IKE encryption algorithm AES_CBC[_128] 626s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 626s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 626s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 626s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 626s | appending IKE DH algorithm MODP2048[_0] 626s | appending IKE DH algorithm MODP3072[_0] 626s | appending IKE DH algorithm MODP4096[_0] 626s | appending IKE DH algorithm MODP8192[_0] 626s | appending IKE DH algorithm DH19[_0] 626s | appending IKE DH algorithm DH20[_0] 626s | appending IKE DH algorithm DH21[_0] 626s | appending IKE DH algorithm DH31[_0] 626s | parsing '' for IKE 626s | parsing '3des-sha1' for IKE 626s | proposal: '3des-sha1' 626s | token: '' '' "3des" '-' 626s | token: '' "3des" '-' "sha1" '' 626s | token: '-' "sha1" '' '' 626s | appending IKE encryption algorithm 3DES_CBC[_0] 626s | parsing prf: 626s | appending IKE PRF algorithm HMAC_SHA1[_0] 626s | token: '' '' '' 626s | - succeeded, advancing tokens 626s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 626s | appending IKE DH algorithm MODP2048[_0] 626s | appending IKE DH algorithm MODP3072[_0] 626s | appending IKE DH algorithm MODP4096[_0] 626s | appending IKE DH algorithm MODP8192[_0] 626s | appending IKE DH algorithm DH19[_0] 626s | appending IKE DH algorithm DH20[_0] 626s | appending IKE DH algorithm DH21[_0] 626s | appending IKE DH algorithm DH31[_0] 626s | parsing '3des-sha1' for IKE 626s | proposal: '3des-sha1' 626s | token: '' '' "3des" '-' 626s | token: '' "3des" '-' "sha1" '' 626s | token: '-' "sha1" '' '' 626s | appending IKE encryption algorithm 3DES_CBC[_0] 626s | parsing prf: 626s | appending IKE PRF algorithm HMAC_SHA1[_0] 626s | token: '' '' '' 626s | - succeeded, advancing tokens 626s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 626s | appending IKE DH algorithm MODP2048[_0] 626s | appending IKE DH algorithm MODP3072[_0] 626s | appending IKE DH algorithm MODP4096[_0] 626s | appending IKE DH algorithm MODP8192[_0] 626s | appending IKE DH algorithm DH19[_0] 626s | appending IKE DH algorithm DH20[_0] 626s | appending IKE DH algorithm DH21[_0] 626s | appending IKE DH algorithm DH31[_0] 626s | parsing '3des-sha1;modp1536' for IKE 626s | proposal: '3des-sha1;modp1536' 626s | token: '' '' "3des" '-' 626s | token: '' "3des" '-' "sha1" ';' 626s | token: '-' "sha1" ';' "modp1536" '' 626s | appending IKE encryption algorithm 3DES_CBC[_0] 626s | parsing prf: 626s | appending IKE PRF algorithm HMAC_SHA1[_0] 626s | token: ';' "modp1536" '' '' 626s | - succeeded, advancing tokens 626s | parsing dh: 626s | appending IKE DH algorithm MODP1536[_0] 626s | token: '' '' '' 626s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 626s | parsing '3des;dh21' for IKE 626s | proposal: '3des;dh21' 626s | token: '' '' "3des" ';' 626s | token: '' "3des" ';' "dh21" '' 626s | token: ';' "dh21" '' '' 626s | appending IKE encryption algorithm 3DES_CBC[_0] 626s | parsing dh: 626s | appending IKE DH algorithm DH21[_0] 626s | token: '' '' '' 626s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 626s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 626s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 626s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 626s | parsing '3des-sha1;dh21' for IKE 626s | proposal: '3des-sha1;dh21' 626s | token: '' '' "3des" '-' 626s | token: '' "3des" '-' "sha1" ';' 626s | token: '-' "sha1" ';' "dh21" '' 626s | appending IKE encryption algorithm 3DES_CBC[_0] 626s | parsing prf: 626s | appending IKE PRF algorithm HMAC_SHA1[_0] 626s | token: ';' "dh21" '' '' 626s | - succeeded, advancing tokens 626s | parsing dh: 626s | appending IKE DH algorithm DH21[_0] 626s | token: '' '' '' 626s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 626s | parsing '3des-sha1-ecp_521' for IKE 626s | proposal: '3des-sha1-ecp_521' 626s | token: '' '' "3des" '-' 626s | token: '' "3des" '-' "sha1" '-' 626s | token: '-' "sha1" '-' "ecp_521" '' 626s | appending IKE encryption algorithm 3DES_ ERROR: AH integrity algorithm 'id3' is not recognized 626s algparse -v2 'ah=3des' 626s ERROR: AH integrity algorithm '3des' is not recognized 626s algparse -v2 'ah=null' 626s ERROR: AH cannot have 'none' as the integrity algorithm 626s algparse -v2 'ah=aes_gcm' 626s ERROR: AH integrity algorithm 'aes_gcm' is not recognized 626s algparse -v2 'ah=aes_ccm' 626s ERROR: AH integrity algorithm 'aes_ccm' is not recognized 626s algparse -v2 'ah=ripemd' 626s ERROR: AH integrity algorithm 'ripemd' is not recognized 626s algparse -v2 'ike' 626s AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 626s AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 626s AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 626s AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 626s algparse -v2 'ike=' 626s ERROR: IKE proposal is empty 626s algparse -v2 'ike=3des-sha1' 626s 3DES_CBC-HMAC_SHA1-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 626s algparse -v2 'ike=3des-sha1' 626s 3DES_CBC-HMAC_SHA1-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 626s algparse -v2 'ike=3des-sha1;modp1536' 626s 3DES_CBC-HMAC_SHA1-MODP1536 626s algparse -v2 'ike=3des;dh21' 626s 3DES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH21 626s algparse -v2 'ike=3des-sha1;dh21' 626s 3DES_CBC-HMAC_SHA1-DH21 626s algparse -v2 'ike=3des-sha1-ecp_521' 626s 3DES_CBC-HMAC_SHA1-DH21 626s algparse -v2 'ike=3des+aes' 626s 3DES_CBC+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 626s algparse -v2 'ike=aes;none' 626s ERROR: IKE DH algorithm 'none' not permitted 626s algparse -v2 'ike=id2' 626s ERROR: IKE encryption algorithm 'id2' is not recognized 626s algparse -v2 'ike=3des-id2' 626s ERROR: IKE PRF algorithm 'id2' is not recognized 626s algparse -v2 'ike=aes_ccm' 626s ERROR: IKE encryption algorithm 'aes_ccm' is not supported 626s algparse -v2 'ike=aes-sha1-sha2-ecp_521' 626s ERROR: IKE DH algorithm 'sha2' is not recognized 626s algparse -v2 'ike=aes-sha2-sha2;ecp_521' 626s ERROR: IKE DH algorithm 'sha2' is not recognized 626s algparse -v2 'ike=aes-sha1_96-sha2-ecp_521' 626s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 626s algparse -v2 'ike=aes-sha1_96-sha2;ecp_521' 626s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 626s algparse -v2 'ike=aes+aes-sha1+sha1-modp8192+modp8192' 626s AES_CBC-HMAC_SHA1-MODP8192 626s algparse -v2 'ike=3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' 626s 3DES_CBC+AES_CBC-HMAC_SHA2_256+HMAC_SHA1-MODP4096+MODP8192 626s algparse -v2 'ike=aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' 626s AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 626s algparse -v2 'ike=aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' 626s AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 626s algparse -v2 'ike=aes+aes128+aes256' 626s AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 626s algparse -v2 'ike=aes128+aes+aes256' 626s AES_CBC_128+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 626s algparse -v2 'ike=aes128+aes256+aes' 626s AES_CBC_128+AES_CBC_256+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 626s algparse -v2 'ike=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' 626s AES_CBC-HMAC_SHA1-MODP8192 626s algparse -v2 'ike=aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' 626s AES_CBC-HMAC_SHA1-MODP8192 626s AES_CBC-HMAC_SHA2_256-MODP8192 626s algparse -v2 'ike=aes_gcm' 626s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 626s algparse -v2 'ike=aes_gcm-sha2' 626s AES_GCM_16-HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 626s algparse -v2 'ike=aes_gcm-sha2-modp2048' 626s AES_GCM_16-HMAC_SHA2_256-MODP2048 626s algparse -v2 'ike=aes_gcm-sha2;modp2048' 626s AES_GCM_16-HMAC_SHA2_256-MODP2048 626s algparse -v2 'ike=aes_gcm-modp2048' 626s ERROR: IKE PRF algorithm 'modp2048' is not recognized 626s algparse -v2 'ike=aes_gcm;modp2048' 626s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 626s algparse -v2 'ike=aes_gcm-none' 626s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 626s algparse -v2 'ike=aes_gcm-none-sha2' 626s AES_GCM_16-HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 626s algparse -v2 'ike=aes_gcm-none-sha2-modp2048' 626s AES_GCM_16-HMAC_SHA2_256-MODP2048 626s algparse -v2 'ike=aes_gcm-none-sha2;modp2048' 626s AES_GCM_16-HMAC_SHA2_256-MODP2048 626s algparse -v2 'ike=aes_gcm-none-modp2048' 626s ERROR: IKE PRF algorithm 'modp2048' is not recognized 626s algparse -v2 'ike=aes_gcm-none;modp2048' 626s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 626s algparse -v2 'ike=aes_gcm-sha1-none-modp2048' 626s ERROR: IKE proposal contains unexpected 'modp2048' 626s algparse -v2 'ike=aes_gcm-sha1-none;modp2048' 626s ERROR: IKE proposal contains unexpected 'modp2048' 626s algparse -v2 'ike=aes+aes_gcm' 626s ERROR: AEAD and non-AEAD IKE encryption algorithm cannot be combined 626s algparse -v2 'ike=,' 626s ERROR: IKE encryption algorithm is empty 626s algparse -v2 'ike=aes,' 626s ERROR: IKE encryption algorithm is empty 626s algparse -v2 'ike=aes,,aes' 626s ERROR: IKE encryption algorithm is empty 626s algparse -v2 'ike=,aes' 626s ERROR: IKE encryption algorithm is empty 626s algparse -v2 'ike=-' 626s ERROR: IKE encryption algorithm is empty 626s algparse -v2 'ike=+' 626s ERROR: IKE encryption algorithm is empty 626s algparse -v2 'ike=;' 626s ERROR: IKE encryption algorithm is empty 626s algparse -v2 'ike=aes-' 626s ERROR: IKE PRF algorithm is empty 626s algparse -v2 'ike=aes+' 626s ERROR: IKE encryption algorithm is empty 626s algparse -v2 'ike=aes;' 626s ERROR: IKE DH algorithm is empty 626s algparse -v2 'ike=-aes' 626s ERROR: IKE encryption algorithm is empty 626s algparse -v2 'ike=+aes' 626s ERROR: IKE encryption algorithm is empty 626s algparse -v2 'ike=;aes' 626s ERROR: IKE encryption algorithm is empty 626s algparse -v2 'ike=aes+-' 626s ERROR: IKE encryption algorithm is empty 626s algparse -v2 'ike=aes+;' 626s ERROR: IKE encryption algorithm is empty 626s algparse -v2 'ike=aes++' 626s ERROR: IKE encryption algorithm is empty 626s testing -ta 626s CBC[_0] 626s | parsing prf: 626s | appending IKE PRF algorithm HMAC_SHA1[_0] 626s | token: '-' "ecp_521" '' '' 626s | - succeeded, advancing tokens 626s | parsing dh: 626s | appending IKE DH algorithm DH21[_0] 626s | token: '' '' '' 626s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 626s | parsing '3des+aes' for IKE 626s | proposal: '3des+aes' 626s | token: '' '' "3des" '+' 626s | token: '' "3des" '+' "aes" '' 626s | token: '+' "aes" '' '' 626s | appending IKE encryption algorithm 3DES_CBC[_0] 626s | token: '' '' '' 626s | appending IKE encryption algorithm AES_CBC[_0] 626s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 626s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 626s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 626s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 626s | appending IKE DH algorithm MODP2048[_0] 626s | appending IKE DH algorithm MODP3072[_0] 626s | appending IKE DH algorithm MODP4096[_0] 626s | appending IKE DH algorithm MODP8192[_0] 626s | appending IKE DH algorithm DH19[_0] 626s | appending IKE DH algorithm DH20[_0] 626s | appending IKE DH algorithm DH21[_0] 626s | appending IKE DH algorithm DH31[_0] 626s | parsing 'aes;none' for IKE 626s | proposal: 'aes;none' 626s | token: '' '' "aes" ';' 626s | token: '' "aes" ';' "none" '' 626s | token: ';' "none" '' '' 626s | appending IKE encryption algorithm AES_CBC[_0] 626s | parsing dh: 626s | appending IKE DH algorithm NONE[_0] 626s | token: '' '' '' 626s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 626s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 626s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 626s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 626s | parsing 'id2' for IKE 626s | proposal: 'id2' 626s | token: '' '' "id2" '' 626s | token: '' "id2" '' '' 626s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 626s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 626s | parsing '3des-id2' for IKE 626s | proposal: '3des-id2' 626s | token: '' '' "3des" '-' 626s | token: '' "3des" '-' "id2" '' 626s | token: '-' "id2" '' '' 626s | appending IKE encryption algorithm 3DES_CBC[_0] 626s | parsing prf: 626s | ike_alg_byname() failed: IKE PRF algorithm 'id2' is not recognized 626s | lookup for PRF algorithm 'id2' failed 626s | - failed, saving error 'IKE PRF algorithm 'id2' is not recognized' and tossing result 626s | parsing integ: 626s | ike_alg_byname() failed: IKE integrity algorithm 'id2' is not recognized 626s | lookup for integrity algorithm 'id2' failed 626s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'id2' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'id2' is not recognized') 626s | parsing 'aes_ccm' for IKE 626s | proposal: 'aes_ccm' 626s | token: '' '' "aes_ccm" '' 626s | token: '' "aes_ccm" '' '' 626s | alg_byname_ok() failed: IKE encryption algorithm 'aes_ccm' is not supported 626s | parsing 'aes-sha1-sha2-ecp_521' for IKE 626s | proposal: 'aes-sha1-sha2-ecp_521' 626s | token: '' '' "aes" '-' 626s | token: '' "aes" '-' "sha1" '-' 626s | token: '-' "sha1" '-' "sha2" '-' 626s | appending IKE encryption algorithm AES_CBC[_0] 626s | parsing prf: 626s | appending IKE PRF algorithm HMAC_SHA1[_0] 626s | token: '-' "sha2" '-' "ecp_521" '' 626s | - succeeded, advancing tokens 626s | parsing dh: 626s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 626s | lookup for DH algorithm 'sha2' failed 626s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 626s | parsing 'aes-sha2-sha2;ecp_521' for IKE 626s | proposal: 'aes-sha2-sha2;ecp_521' 626s | token: '' '' "aes" '-' 626s | token: '' "aes" '-' "sha2" '-' 626s | token: '-' "sha2" '-' "sha2" ';' 626s | appending IKE encryption algorithm AES_CBC[_0] 626s | parsing prf: 626s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 626s | token: '-' "sha2" ';' "ecp_521" '' 626s | - succeeded, advancing tokens 626s | parsing dh: 626s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 626s | lookup for DH algorithm 'sha2' failed 626s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 626s | parsing 'aes-sha1_96-sha2-ecp_521' for IKE 626s | proposal: 'aes-sha1_96-sha2-ecp_521' 626s | token: '' '' "aes" '-' 626s | token: '' "aes" '-' "sha1_96" '-' 626s | token: '-' "sha1_96" '-' "sha2" '-' 626s | appending IKE encryption algorithm AES_CBC[_0] 626s | parsing prf: 626s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 626s | lookup for PRF algorithm 'sha1_96' failed 626s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 626s | parsing integ: 626s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 626s | token: '-' "sha2" '-' "ecp_521" '' 626s | parsing prf: 626s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 626s | token: '-' "ecp_521" '' '' 626s | parsing dh: 626s | appending IKE DH algorithm DH21[_0] 626s | token: '' '' '' 626s | parsing 'aes-sha1_96-sha2;ecp_521' for IKE 626s | proposal: 'aes-sha1_96-sha2;ecp_521' 626s | token: '' '' "aes" '-' 626s | token: '' "aes" '-' "sha1_96" '-' 626s | token: '-' "sha1_96" '-' "sha2" ';' 626s | appending IKE encryption algorithm AES_CBC[_0] 626s | parsing prf: 626s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 626s | lookup for PRF algorithm 'sha1_96' failed 626s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 626s | parsing integ: 626s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 626s | token: '-' "sha2" ';' "ecp_521" '' 626s | parsing prf: 626s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 626s | token: ';' "ecp_521" '' '' 626s | parsing dh: 626s | appending IKE DH algorithm DH21[_0] 626s | token: '' '' '' 626s | parsing 'aes+aes-sha1+sha1-modp8192+modp8192' for IKE 626s | proposal: 'aes+aes-sha1+sha1-modp8192+modp8192' 626s | token: '' '' "aes" '+' 626s | token: '' "aes" '+' "aes" '-' 626s | token: '+' "aes" '-' "sha1" '+' 626s | appending IKE encryption algorithm AES_CBC[_0] 626s | token: '-' "sha1" '+' "sha1" '-' 626s | appending IKE encryption algorithm AES_CBC[_0] 626s algparse: discarding duplicate IKE encryption algorithm AES_CBC 626s | parsing prf: 626s | appending IKE PRF algorithm HMAC_SHA1[_0] 626s | token: '+' "sha1" '-' "modp8192" '+' 626s | appending IKE PRF algorithm HMAC_SHA1[_0] 626s | token: '-' "modp8192" '+' "modp8192" '' 626s algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 626s | - succeeded, advancing tokens 626s | parsing dh: 626s | appending IKE DH algorithm MODP8192[_0] 626s | token: '+' "modp8192" '' '' 626s | appending IKE DH algorithm MODP8192[_0] 626s | token: '' '' '' 626s algparse: discarding duplicate IKE DH algorithm MODP8192 626s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 626s | parsing '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' for IKE 626s | proposal: '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' 626s | token: '' '' "3des" '+' 626s | token: '' "3des" '+' "aes" '+' 626s | token: '+' "aes" '+' "aes" '-' 626s | appending IKE encryption algorithm 3DES_CBC[_0] 626s | token: '+' "aes" '-' "sha2" '+' 626s | appending IKE encryption algorithm AES_CBC[_0] 626s | token: '-' "sha2" '+' "sha1" '+' 626s | appending IKE encryption algorithm AES_CBC[_0] 626s algparse: discarding duplicate IKE encryption algorithm AES_CBC 626s | parsing prf: 626s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 626s | token: '+' "sha1" '+' "sha1" '-' 626s | appending IKE PRF algorithm HMAC_SHA1[_0] 626s | token: '+' "sha1" '-' "modp4096" '+' 626s | appending IKE PRF algorithm HMAC_SHA1[_0] 626s | token: '-' "modp4096" '+' "modp8192" '+' 626s algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 626s | - succeeded, advancing tokens 626s | parsing dh: 626s | appending IKE DH algorithm MODP4096[_0] 626s | token: '+' "modp8192" '+' "modp8192" '' 626s | appending IKE DH algorithm MODP8192[_0] 626s | token: '+' "modp8192" '' '' 626s | appending IKE DH algorithm MODP8192[_0] 626s | token: '' '' '' 626s algparse: discarding duplicate IKE DH algorithm MODP8192 626s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 626s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 626s | parsing 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' for IKE 626s | proposal: 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' 626s | token: '' '' "aes" '+' 626s | token: '' "aes" '+' "3des" '+' 626s | token: '+' "3des" '+' "aes" '-' 626s | appending IKE encryption algorithm AES_CBC[_0] 626s | token: '+' "aes" '-' "sha1" '+' 626s | appending IKE encryption algorithm 3DES_CBC[_0] 626s | token: '-' "sha1" '+' "sha2" '+' 626s | appending IKE encryption algorithm AES_CBC[_0] 626s algparse: discarding duplicate IKE encryption algorithm AES_CBC 626s | parsing prf: 626s | appending IKE PRF algorithm HMAC_SHA1[_0] 626s | token: '+' "sha2" '+' "sha1" '-' 626s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 626s | token: '+' "sha1" '-' "modp8192" '+' 626s | appending IKE PRF algorithm HMAC_SHA1[_0] 626s | token: '-' "modp8192" '+' "modp4096" '+' 626s algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 626s | - succeeded, advancing tokens 626s | parsing dh: 626s | appending IKE DH algorithm MODP8192[_0] 626s | token: '+' "modp4096" '+' "modp8192" '' 626s | appending IKE DH algorithm MODP4096[_0] 626s | token: '+' "modp8192" '' '' 626s | appending IKE DH algorithm MODP8192[_0] 626s | token: '' '' '' 626s algparse: discarding duplicate IKE DH algorithm MODP8192 626s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 626s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 626s | parsing 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' for IKE 626s | proposal: 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' 626s | token: '' '' "aes" '+' 626s | token: '' "aes" '+' "aes" '+' 626s | token: '+' "aes" '+' "3des" '-' 626s | appending IKE encryption algorithm AES_CBC[_0] 626s | token: '+' "3des" '-' "sha1" '+' 626s | appending IKE encryption algorithm AES_CBC[_0] 626s | token: '-' "sha1" '+' "sha1" '+' 626s | appending IKE encryption algorithm 3DES_CBC[_0] 626s algparse: discarding duplicate IKE encryption algorithm AES_CBC 626s | parsing prf: 626s | appending IKE PRF algorithm HMAC_SHA1[_0] 626s | token: '+' "sha1" '+' "sha2" '-' 626s | appending IKE PRF algorithm HMAC_SHA1[_0] 626s | token: '+' "sha2" '-' "modp8192" '+' 626s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 626s | token: '-' "modp8192" '+' "modp8192" '+' 626s algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 626s | - succeeded, advancing tokens 626s | parsing dh: 626s | appending IKE DH algorithm MODP8192[_0] 626s | token: '+' "modp8192" '+' "modp4096" '' 626s | appending IKE DH algorithm MODP8192[_0] 626s | token: '+' "modp4096" '' '' 626s | appending IKE DH algorithm MODP4096[_0] 626s | token: '' '' '' 626s algparse: discarding duplicate IKE DH algorithm MODP8192 626s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 626s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 626s | parsing 'aes+aes128+aes256' for IKE 626s | proposal: 'aes+aes128+aes256' 626s | token: '' '' "aes" '+' 626s | token: '' "aes" '+' "aes128" '+' 626s | token: '+' "aes128" '+' "aes256" '' 626s | appending IKE encryption algorithm AES_CBC[_0] 626s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 626s | token: '+' "aes256" '' '' 626s | appending IKE encryption algorithm AES_CBC[_128] 626s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 626s | token: '' '' '' 626s | appending IKE encryption algorithm AES_CBC[_256] 626s algparse: discarding duplicate IKE encryption algorithm AES_CBC_128 626s algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 626s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 626s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 626s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 626s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 626s | appending IKE DH algorithm MODP2048[_0] 626s | appending IKE DH algorithm MODP3072[_0] 626s | appending IKE DH algorithm MODP4096[_0] 626s | appending IKE DH algorithm MODP8192[_0] 626s | appending IKE DH algorithm DH19[_0] 626s | appending IKE DH algorithm DH20[_0] 626s | appending IKE DH algorithm DH21[_0] 626s | appending IKE DH algorithm DH31[_0] 626s | parsing 'aes128+aes+aes256' for IKE 626s | proposal: 'aes128+aes+aes256' 626s | token: '' '' "aes128" '+' 626s | token: '' "aes128" '+' "aes" '+' 626s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 626s | token: '+' "aes" '+' "aes256" '' 626s | appending IKE encryption algorithm AES_CBC[_128] 626s | token: '+' "aes256" '' '' 626s | appending IKE encryption algorithm AES_CBC[_0] 626s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 626s | token: '' '' '' 626s | appending IKE encryption algorithm AES_CBC[_256] 626s algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 626s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 626s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 626s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 626s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 626s | appending IKE DH algorithm MODP2048[_0] 626s | appending IKE DH algorithm MODP3072[_0] 626s | appending IKE DH algorithm MODP4096[_0] 626s | appending IKE DH algorithm MODP8192[_0] 626s | appending IKE DH algorithm DH19[_0] 626s | appending IKE DH algorithm DH20[_0] 626s | appending IKE DH algorithm DH21[_0] 626s | appending IKE DH algorithm DH31[_0] 626s | parsing 'aes128+aes256+aes' for IKE 626s | proposal: 'aes128+aes256+aes' 626s | token: '' '' "aes128" '+' 626s | token: '' "aes128" '+' "aes256" '+' 626s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 626s | token: '+' "aes256" '+' "aes" '' 626s | appending IKE encryption algorithm AES_CBC[_128] 626s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 626s | token: '+' "aes" '' '' 626s | appending IKE encryption algorithm AES_CBC[_256] 626s | token: '' '' '' 626s | appending IKE encryption algorithm AES_CBC[_0] 626s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 626s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 626s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 626s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 626s | appending IKE DH algorithm MODP2048[_0] 626s | appending IKE DH algorithm MODP3072[_0] 626s | appending IKE DH algorithm MODP4096[_0] 626s | appending IKE DH algorithm MODP8192[_0] 626s | appending IKE DH algorithm DH19[_0] 626s | appending IKE DH algorithm DH20[_0] 626s | appending IKE DH algorithm DH21[_0] 626s | appending IKE DH algorithm DH31[_0] 626s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for IKE 626s | proposal: 'aes-sha1-modp8192' 626s | token: '' '' "aes" '-' 626s | token: '' "aes" '-' "sha1" '-' 626s | token: '-' "sha1" '-' "modp8192" '' 626s | appending IKE encryption algorithm AES_CBC[_0] 626s | parsing prf: 626s | appending IKE PRF algorithm HMAC_SHA1[_0] 626s | token: '-' "modp8192" '' '' 626s | - succeeded, advancing tokens 626s | parsing dh: 626s | appending IKE DH algorithm MODP8192[_0] 626s | token: '' '' '' 626s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 626s | proposal: 'aes-sha1-modp8192' 626s | token: '' '' "aes" '-' 626s | token: '' "aes" '-' "sha1" '-' 626s | token: '-' "sha1" '-' "modp8192" '' 626s | appending IKE encryption algorithm AES_CBC[_0] 626s | parsing prf: 626s | appending IKE PRF algorithm HMAC_SHA1[_0] 626s | token: '-' "modp8192" '' '' 626s | - succeeded, advancing tokens 626s | parsing dh: 626s | appending IKE DH algorithm MODP8192[_0] 626s | token: '' '' '' 626s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 626s | proposal: 'aes-sha1-modp8192' 626s | token: '' '' "aes" '-' 626s | token: '' "aes" '-' "sha1" '-' 626s | token: '-' "sha1" '-' "modp8192" '' 626s | appending IKE encryption algorithm AES_CBC[_0] 626s | parsing prf: 626s | appending IKE PRF algorithm HMAC_SHA1[_0] 626s | token: '-' "modp8192" '' '' 626s | - succeeded, advancing tokens 626s | parsing dh: 626s | appending IKE DH algorithm MODP8192[_0] 626s | token: '' '' '' 626s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 626s | parsing 'aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' for IKE 626s | proposal: 'aes-sha1-modp8192' 626s | token: '' '' "aes" '-' 626s | token: '' "aes" '-' "sha1" '-' 626s | token: '-' "sha1" '-' "modp8192" '' 626s | appending IKE encryption algorithm AES_CBC[_0] 626s | parsing prf: 626s | appending IKE PRF algorithm HMAC_SHA1[_0] 626s | token: '-' "modp8192" '' '' 626s | - succeeded, advancing tokens 626s | parsing dh: 626s | appending IKE DH algorithm MODP8192[_0] 626s | token: '' '' '' 626s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 626s | proposal: 'aes-sha2-modp8192' 626s | token: '' '' "aes" '-' 626s | token: '' "aes" '-' "sha2" '-' 626s | token: '-' "sha2" '-' "modp8192" '' 626s | appending IKE encryption algorithm AES_CBC[_0] 626s | parsing prf: 626s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 626s | token: '-' "modp8192" '' '' 626s | - succeeded, advancing tokens 626s | parsing dh: 626s | appending IKE DH algorithm MODP8192[_0] 626s | token: '' '' '' 626s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 626s | proposal: 'aes-sha1-modp8192' 626s | token: '' '' "aes" '-' 626s | token: '' "aes" '-' "sha1" '-' 626s | token: '-' "sha1" '-' "modp8192" '' 626s | appending IKE encryption algorithm AES_CBC[_0] 626s | parsing prf: 626s | appending IKE PRF algorithm HMAC_SHA1[_0] 626s | token: '-' "modp8192" '' '' 626s | - succeeded, advancing tokens 626s | parsing dh: 626s | appending IKE DH algorithm MODP8192[_0] 626s | token: '' '' '' 626s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 626s | parsing 'aes_gcm' for IKE 626s | proposal: 'aes_gcm' 626s | token: '' '' "aes_gcm" '' 626s | token: '' "aes_gcm" '' '' 626s | token: '' '' '' 626s | appending IKE encryption algorithm AES_GCM_16[_0] 626s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 626s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 626s | appending IKE integrity algorithm NONE[_0] 626s | appending IKE DH algorithm MODP2048[_0] 626s | appending IKE DH algorithm MODP3072[_0] 626s | appending IKE DH algorithm MODP4096[_0] 626s | appending IKE DH algorithm MODP8192[_0] 626s | appending IKE DH algorithm DH19[_0] 626s | appending IKE DH algorithm DH20[_0] 626s | appending IKE DH algorithm DH21[_0] 626s | appending IKE DH algorithm DH31[_0] 626s | parsing 'aes_gcm-sha2' for IKE 626s | proposal: 'aes_gcm-sha2' 626s | token: '' '' "aes_gcm" '-' 626s | token: '' "aes_gcm" '-' "sha2" '' 626s | token: '-' "sha2" '' '' 626s | appending IKE encryption algorithm AES_GCM_16[_0] 626s | parsing prf: 626s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 626s | token: '' '' '' 626s | - succeeded, advancing tokens 626s | appending IKE integrity algorithm NONE[_0] 626s | appending IKE DH algorithm MODP2048[_0] 626s | appending IKE DH algorithm MODP3072[_0] 626s | appending IKE DH algorithm MODP4096[_0] 626s | appending IKE DH algorithm MODP8192[_0] 626s | appending IKE DH algorithm DH19[_0] 626s | appending IKE DH algorithm DH20[_0] 626s | appending IKE DH algorithm DH21[_0] 626s | appending IKE DH algorithm DH31[_0] 626s | parsing 'aes_gcm-sha2-modp2048' for IKE 626s | proposal: 'aes_gcm-sha2-modp2048' 626s | token: '' '' "aes_gcm" '-' 626s | token: '' "aes_gcm" '-' "sha2" '-' 626s | token: '-' "sha2" '-' "modp2048" '' 626s | appending IKE encryption algorithm AES_GCM_16[_0] 626s | parsing prf: 626s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 626s | token: '-' "modp2048" '' '' 626s | - succeeded, advancing tokens 626s | parsing dh: 626s | appending IKE DH algorithm MODP2048[_0] 626s | token: '' '' '' 626s | appending IKE integrity algorithm NONE[_0] 626s | parsing 'aes_gcm-sha2;modp2048' for IKE 626s | proposal: 'aes_gcm-sha2;modp2048' 626s | token: '' '' "aes_gcm" '-' 626s | token: '' "aes_gcm" '-' "sha2" ';' 626s | token: '-' "sha2" ';' "modp2048" '' 626s | appending IKE encryption algorithm AES_GCM_16[_0] 626s | parsing prf: 626s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 626s | token: ';' "modp2048" '' '' 626s | - succeeded, advancing tokens 626s | parsing dh: 626s | appending IKE DH algorithm MODP2048[_0] 626s | token: '' '' '' 626s | appending IKE integrity algorithm NONE[_0] 626s | parsing 'aes_gcm-modp2048' for IKE 626s | proposal: 'aes_gcm-modp2048' 626s | token: '' '' "aes_gcm" '-' 626s | token: '' "aes_gcm" '-' "modp2048" '' 626s | token: '-' "modp2048" '' '' 626s | appending IKE encryption algorithm AES_GCM_16[_0] 626s | parsing prf: 626s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 626s | lookup for PRF algorithm 'modp2048' failed 626s | - failed, saving error 'IKE PRF algorithm 'modp2048' is not recognized' and tossing result 626s | parsing integ: 626s | ike_alg_byname() failed: IKE integrity algorithm 'modp2048' is not recognized 626s | lookup for integrity algorithm 'modp2048' failed 626s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'modp2048' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'modp2048' is not recognized') 626s | parsing 'aes_gcm;modp2048' for IKE 626s | proposal: 'aes_gcm;modp2048' 626s | token: '' '' "aes_gcm" ';' 626s | token: '' "aes_gcm" ';' "modp2048" '' 626s | token: ';' "modp2048" '' '' 626s | appending IKE encryption algorithm AES_GCM_16[_0] 626s | parsing dh: 626s | appending IKE DH algorithm MODP2048[_0] 626s | token: '' '' '' 626s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 626s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 626s | appending IKE integrity algorithm NONE[_0] 626s | parsing 'aes_gcm-none' for IKE 626s | proposal: 'aes_gcm-none' 626s | token: '' '' "aes_gcm" '-' 626s | token: '' "aes_gcm" '-' "none" '' 626s | token: '-' "none" '' '' 626s | appending IKE encryption algorithm AES_GCM_16[_0] 626s | parsing prf: 626s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 626s | lookup for PRF algorithm 'none' failed 626s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 626s | parsing integ: 626s | appending IKE integrity algorithm NONE[_0] 626s | token: '' '' '' 626s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 626s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 626s | appending IKE DH algorithm MODP2048[_0] 626s | appending IKE DH algorithm MODP3072[_0] 626s | appending IKE DH algorithm MODP4096[_0] 626s | appending IKE DH algorithm MODP8192[_0] 626s | appending IKE DH algorithm DH19[_0] 626s | appending IKE DH algorithm DH20[_0] 626s | appending IKE DH algorithm DH21[_0] 626s | appending IKE DH algorithm DH31[_0] 626s | parsing 'aes_gcm-none-sha2' for IKE 626s | proposal: 'aes_gcm-none-sha2' 626s | token: '' '' "aes_gcm" '-' 626s | token: '' "aes_gcm" '-' "none" '-' 626s | token: '-' "none" '-' "sha2" '' 626s | appending IKE encryption algorithm AES_GCM_16[_0] 626s | parsing prf: 626s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 626s | lookup for PRF algorithm 'none' failed 626s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 626s | parsing integ: 626s | appending IKE integrity algorithm NONE[_0] 626s | token: '-' "sha2" '' '' 626s | parsing prf: 626s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 626s | token: '' '' '' 626s | appending IKE DH algorithm MODP2048[_0] 626s | appending IKE DH algorithm MODP3072[_0] 626s | appending IKE DH algorithm MODP4096[_0] 626s | appending IKE DH algorithm MODP8192[_0] 626s | appending IKE DH algorithm DH19[_0] 626s | appending IKE DH algorithm DH20[_0] 626s | appending IKE DH algorithm DH21[_0] 626s | appending IKE DH algorithm DH31[_0] 626s | parsing 'aes_gcm-none-sha2-modp2048' for IKE 626s | proposal: 'aes_gcm-none-sha2-modp2048' 626s | token: '' '' "aes_gcm" '-' 626s | token: '' "aes_gcm" '-' "none" '-' 626s | token: '-' "none" '-' "sha2" '-' 626s | appending IKE encryption algorithm AES_GCM_16[_0] 626s | parsing prf: 626s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 626s | lookup for PRF algorithm 'none' failed 626s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 626s | parsing integ: 626s | appending IKE integrity algorithm NONE[_0] 626s | token: '-' "sha2" '-' "modp2048" '' 626s | parsing prf: 626s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 626s | token: '-' "modp2048" '' '' 626s | parsing dh: 626s | appending IKE DH algorithm MODP2048[_0] 626s | token: '' '' '' 626s | parsing 'aes_gcm-none-sha2;modp2048' for IKE 626s | proposal: 'aes_gcm-none-sha2;modp2048' 626s | token: '' '' "aes_gcm" '-' 626s | token: '' "aes_gcm" '-' "none" '-' 626s | token: '-' "none" '-' "sha2" ';' 626s | appending IKE encryption algorithm AES_GCM_16[_0] 626s | parsing prf: 626s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 626s | lookup for PRF algorithm 'none' failed 626s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 626s | parsing integ: 626s | appending IKE integrity algorithm NONE[_0] 626s | token: '-' "sha2" ';' "modp2048" '' 626s | parsing prf: 626s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 626s | token: ';' "modp2048" '' '' 626s | parsing dh: 626s | appending IKE DH algorithm MODP2048[_0] 626s | token: '' '' '' 626s | parsing 'aes_gcm-none-modp2048' for IKE 626s | proposal: 'aes_gcm-none-modp2048' 626s | token: '' '' "aes_gcm" '-' 626s | token: '' "aes_gcm" '-' "none" '-' 626s | token: '-' "none" '-' "modp2048" '' 626s | appending IKE encryption algorithm AES_GCM_16[_0] 626s | parsing prf: 626s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 626s | lookup for PRF algorithm 'none' failed 626s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 626s | parsing integ: 626s | appending IKE integrity algorithm NONE[_0] 626s | token: '-' "modp2048" '' '' 626s | parsing prf: 626s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 626s | lookup for PRF algorithm 'modp2048' failed 626s | -- failed 'IKE PRF algorithm 'modp2048' is not recognized' 626s | parsing 'aes_gcm-none;modp2048' for IKE 626s | proposal: 'aes_gcm-none;modp2048' 626s | token: '' '' "aes_gcm" '-' 626s | token: '' "aes_gcm" '-' "none" ';' 626s | token: '-' "none" ';' "modp2048" '' 626s | appending IKE encryption algorithm AES_GCM_16[_0] 626s | parsing prf: 626s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 626s | lookup for PRF algorithm 'none' failed 626s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 626s | parsing integ: 626s | appending IKE integrity algorithm NONE[_0] 626s | token: ';' "modp2048" '' '' 626s | parsing dh: 626s | appending IKE DH algorithm MODP2048[_0] 626s | token: '' '' '' 626s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 626s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 626s | parsing 'aes_gcm-sha1-none-modp2048' for IKE 626s | proposal: 'aes_gcm-sha1-none-modp2048' 626s | token: '' '' "aes_gcm" '-' 626s | token: '' "aes_gcm" '-' "sha1" '-' 626s | token: '-' "sha1" '-' "none" '-' 626s | appending IKE encryption algorithm AES_GCM_16[_0] 626s | parsing prf: 626s | appending IKE PRF algorithm HMAC_SHA1[_0] 626s | token: '-' "none" '-' "modp2048" '' 626s | - succeeded, advancing tokens 626s | parsing dh: 626s | appending IKE DH algorithm NONE[_0] 626s | token: '-' "modp2048" '' '' 626s | parsing 'aes_gcm-sha1-none;modp2048' for IKE 626s | proposal: 'aes_gcm-sha1-none;modp2048' 626s | token: '' '' "aes_gcm" '-' 626s | token: '' "aes_gcm" '-' "sha1" '-' 626s | token: '-' "sha1" '-' "none" ';' 626s | appending IKE encryption algorithm AES_GCM_16[_0] 626s | parsing prf: 626s | appending IKE PRF algorithm HMAC_SHA1[_0] 626s | token: '-' "none" ';' "modp2048" '' 626s | - succeeded, advancing tokens 626s | parsing dh: 626s | appending IKE DH algorithm NONE[_0] 626s | token: ';' "modp2048" '' '' 626s | parsing 'aes+aes_gcm' for IKE 626s | proposal: 'aes+aes_gcm' 626s | token: '' '' "aes" '+' 626s | token: '' "aes" '+' "aes_gcm" '' 626s | token: '+' "aes_gcm" '' '' 626s | appending IKE encryption algorithm AES_CBC[_0] 626s | token: '' '' '' 626s | appending IKE encryption algorithm AES_GCM_16[_0] 626s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 626s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 626s | appending IKE DH algorithm MODP2048[_0] 626s | appending IKE DH algorithm MODP3072[_0] 626s | appending IKE DH algorithm MODP4096[_0] 626s | appending IKE DH algorithm MODP8192[_0] 626s | appending IKE DH algorithm DH19[_0] 626s | appending IKE DH algorithm DH20[_0] 626s | appending IKE DH algorithm DH21[_0] 626s | appending IKE DH algorithm DH31[_0] 626s | parsing ',' for IKE 626s | proposal: '' 626s | token: '' '' "" '' 626s | token: '' "" '' '' 626s | parsing 'aes,' for IKE 626s | proposal: 'aes' 626s | token: '' '' "aes" '' 626s | token: '' "aes" '' '' 626s | token: '' '' '' 626s | appending IKE encryption algorithm AES_CBC[_0] 626s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 626s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 626s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 626s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 626s | appending IKE DH algorithm MODP2048[_0] 626s | appending IKE DH algorithm MODP3072[_0] 626s | appending IKE DH algorithm MODP4096[_0] 626s | appending IKE DH algorithm MODP8192[_0] 626s | appending IKE DH algorithm DH19[_0] 626s | appending IKE DH algorithm DH20[_0] 626s | appending IKE DH algorithm DH21[_0] 626s | appending IKE DH algorithm DH31[_0] 626s | proposal: '' 626s | token: '' '' "" '' 626s | token: '' "" '' '' 626s | parsing 'aes,,aes' for IKE 626s | proposal: 'aes' 626s | token: '' '' "aes" '' 626s | token: '' "aes" '' '' 626s | token: '' '' '' 626s | appending IKE encryption algorithm AES_CBC[_0] 626s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 626s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 626s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 626s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 626s | appending IKE DH algorithm MODP2048[_0] 626s | appending IKE DH algorithm MODP3072[_0] 626s | appending IKE DH algorithm MODP4096[_0] 626s | appending IKE DH algorithm MODP8192[_0] 626s | appending IKE DH algorithm DH19[_0] 626s | appending IKE DH algorithm DH20[_0] 626s | appending IKE DH algorithm DH21[_0] 626s | appending IKE DH algorithm DH31[_0] 626s | proposal: '' 626s | token: '' '' "" '' 626s | token: '' "" '' '' 626s | parsing ',aes' for IKE 626s | proposal: '' 626s | token: '' '' "" '' 626s | token: '' "" '' '' 626s | parsing '-' for IKE 626s | proposal: '-' 626s | token: '' '' "" '-' 626s | token: '' "" '-' "" '' 626s | parsing '+' for IKE 626s | proposal: '+' 626s | token: '' '' "" '+' 626s | token: '' "" '+' "" '' 626s | parsing ';' for IKE 626s | proposal: ';' 626s | token: '' '' "" ';' 626s | token: '' "" ';' "" '' 626s | parsing 'aes-' for IKE 626s | proposal: 'aes-' 626s | token: '' '' "aes" '-' 626s | token: '' "aes" '-' "" '' 626s | token: '-' "" '' '' 626s | appending IKE encryption algorithm AES_CBC[_0] 626s | parsing prf: 626s | - failed, saving error 'IKE PRF algorithm is empty' and tossing result 626s | parsing integ: 626s | - and - failed, returning earlier PRF error 'IKE PRF algorithm is empty' and discarding INTEG error 'IKE integrity algorithm is empty') 626s | parsing 'aes+' for IKE 626s | proposal: 'aes+' 626s | token: '' '' "aes" '+' 626s | token: '' "aes" '+' "" '' 626s | token: '+' "" '' '' 626s | appending IKE encryption algorithm AES_CBC[_0] 626s | parsing 'aes;' for IKE 626s | proposal: 'aes;' 626s | token: '' '' "aes" ';' 626s | token: '' "aes" ';' "" '' 626s | token: ';' "" '' '' 626s | appending IKE encryption algorithm AES_CBC[_0] 626s | parsing dh: 626s | ... failed 'IKE DH algorithm is empty' 626s | parsing '-aes' for IKE 626s | proposal: '-aes' 626s | token: '' '' "" '-' 626s | token: '' "" '-' "aes" '' 626s | parsing '+aes' for IKE 626s | proposal: '+aes' 626s | token: '' '' "" '+' 626s | token: '' "" '+' "aes" '' 626s | parsing ';aes' for IKE 626s | proposal: ';aes' 626s | token: '' '' "" ';' 626s | token: '' "" ';' "aes" '' 626s | parsing 'aes+-' for IKE 626s | proposal: 'aes+-' 626s | token: '' '' "aes" '+' 626s | token: '' "aes" '+' "" '-' 626s | token: '+' "" '-' "" '' 626s | appending IKE encryption algorithm AES_CBC[_0] 626s | parsing 'aes+;' for IKE 626s | proposal: 'aes+;' 626s | token: '' '' "aes" '+' 626s | token: '' "aes" '+' "" ';' 626s | token: '+' "" ';' "" '' 626s | appending IKE encryption algorithm AES_CBC[_0] 626s | parsing 'aes++' for IKE 626s | proposal: 'aes++' 626s | token: '' '' "aes" '+' 626s | token: '' "aes" '+' "" '+' 626s | token: '+' "" '+' "" '' 626s | appending IKE encryption algorithm AES_CBC[_0] 626s algparse: leak detective found no leaks 626s algparse: Encryption algorithms: 626s algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 626s algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 626s algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 626s algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 626s algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 626s algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 626s algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm, aes_gcm_c 626s algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_b 626s algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_a 626s algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 626s algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 626s algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 626s algparse: NULL [] IKEv1: ESP IKEv2: ESP 626s algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 626s algparse: Hash algorithms: 626s algparse: MD5 IKEv1: IKE IKEv2: NSS 626s algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 626s algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 626s algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 626s algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 626s algparse: IDENTITY IKEv1: IKEv2: FIPS 626s algparse: PRF algorithms: 626s algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE native(HMAC) md5 626s algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 626s algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 626s algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 626s algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 626s algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 626s algparse: Integrity algorithms: 626s algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH native(HMAC) md5, hmac_md5 626s algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 626s algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 626s algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 626s algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 626s algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 626s algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 626s algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 626s algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 626s algparse: DH algorithms: 626s algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 626s algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 626s algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 626s algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 626s algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 626s algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 626s algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 626s algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 626s algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 626s algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 626s algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 626s algparse: IPCOMP algorithms: 626s algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 626s algparse: LZS IKEv1: IKEv2: ESP AH FIPS 626s algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 626s algparse: testing CAMELLIA_CBC: 626s algparse: Camellia: 16 bytes with 128-bit key 626s | decode_to_chunk: raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 626s | decode_to_chunk: output: 626s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 626s | CONCATENATE_DATA_AND_BASE: 626s | target: EXTRACT_KEY_FROM_KEY 626s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 626s | params: 16-bytes@0x3fff0979050 626s | key-offset: 0, key-size: 16 626s | EXTRACT_KEY_FROM_KEY: 626s | target: CAMELLIA_CBC 626s | flags: ENCRYPT+DECRYPT 626s | key_size: 16-bytes 626s | base: base-key@0x2aa1372d0d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 626s | operation: FLAGS_ONLY 626s | params: 8-bytes@0x3fff0979048 626s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 626s | decode_to_chunk: output: 626s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 626s | decode_to_chunk: new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 626s | decode_to_chunk: output: 626s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 626s | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 626s | decode_to_chunk: output: 626s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 626s | decode_to_chunk: ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 626s | decode_to_chunk: output: 626s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 626s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 626s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 626s | verify_chunk_data: encrypt: ok 626s | verify_chunk_data: updated CBC IV: ok 626s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 626s | decode_to_chunk: output: 626s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 626s | decode_to_chunk: new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 626s | decode_to_chunk: output: 626s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 626s | decode_to_chunk: ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 626s | decode_to_chunk: output: 626s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 626s | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 626s | decode_to_chunk: output: 626s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 626s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 626s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 626s | verify_chunk_data: decrypt: ok 626s | verify_chunk_data: updated CBC IV: ok 626s | test_ctr_vector: Camellia: 16 bytes with 128-bit key passed 626s algparse: Camellia: 16 bytes with 128-bit key 626s | decode_to_chunk: raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF" 626s | decode_to_chunk: output: 626s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 626s | CONCATENATE_DATA_AND_BASE: 626s | target: EXTRACT_KEY_FROM_KEY 626s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 626s | params: 16-bytes@0x3fff0979050 626s | key-offset: 0, key-size: 16 626s | EXTRACT_KEY_FROM_KEY: 626s | target: CAMELLIA_CBC 626s | flags: ENCRYPT+DECRYPT 626s | key_size: 16-bytes 626s | base: base-key@0x2aa1372d0d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 626s | operation: FLAGS_ONLY 626s | params: 8-bytes@0x3fff0979048 626s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 626s | decode_to_chunk: output: 626s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 626s | decode_to_chunk: new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 626s | decode_to_chunk: output: 626s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 626s | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 626s | decode_to_chunk: output: 626s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 626s | decode_to_chunk: ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 626s | decode_to_chunk: output: 626s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 626s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 626s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 626s | verify_chunk_data: encrypt: ok 626s | verify_chunk_data: updated CBC IV: ok 626s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 626s | decode_to_chunk: output: 626s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 626s | decode_to_chunk: new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 626s | decode_to_chunk: output: 626s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 626s | decode_to_chunk: ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 626s | decode_to_chunk: output: 626s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 626s | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 626s | decode_to_chunk: output: 626s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 626s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 626s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 626s | verify_chunk_data: decrypt: ok 626s | verify_chunk_data: updated CBC IV: ok 626s | test_ctr_vector: Camellia: 16 bytes with 128-bit key passed 626s algparse: Camellia: 16 bytes with 256-bit key 626s | decode_to_chunk: raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 626s | decode_to_chunk: output: 626s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 626s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 626s | CONCATENATE_DATA_AND_BASE: 626s | target: EXTRACT_KEY_FROM_KEY 626s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 626s | params: 16-bytes@0x3fff0979050 626s | key-offset: 0, key-size: 32 626s | EXTRACT_KEY_FROM_KEY: 626s | target: CAMELLIA_CBC 626s | flags: ENCRYPT+DECRYPT 626s | key_size: 32-bytes 626s | base: base-key@0x2aa1372d0d0 (48-bytes, EXTRACT_KEY_FROM_KEY) 626s | operation: FLAGS_ONLY 626s | params: 8-bytes@0x3fff0979048 626s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 626s | decode_to_chunk: output: 626s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 626s | decode_to_chunk: new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 626s | decode_to_chunk: output: 626s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 626s | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 626s | decode_to_chunk: output: 626s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 626s | decode_to_chunk: ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 626s | decode_to_chunk: output: 626s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 626s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 626s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 626s | verify_chunk_data: encrypt: ok 626s | verify_chunk_data: updated CBC IV: ok 626s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 626s | decode_to_chunk: output: 626s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 626s | decode_to_chunk: new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 626s | decode_to_chunk: output: 626s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 626s | decode_to_chunk: ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 626s | decode_to_chunk: output: 626s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 626s | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 626s | decode_to_chunk: output: 626s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 626s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 626s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 626s | verify_chunk_data: decrypt: ok 626s | verify_chunk_data: updated CBC IV: ok 626s | test_ctr_vector: Camellia: 16 bytes with 256-bit key passed 626s algparse: Camellia: 16 bytes with 256-bit key 626s | decode_to_chunk: raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF FF EE DD CC BB AA 99 88 77 66 55 44 33 22 11 00" 626s | decode_to_chunk: output: 626s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 626s | ff ee dd cc bb aa 99 88 77 66 55 44 33 22 11 00 ........wfUD3".. 626s | CONCATENATE_DATA_AND_BASE: 626s | target: EXTRACT_KEY_FROM_KEY 626s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 626s | params: 16-bytes@0x3fff0979050 626s | key-offset: 0, key-size: 32 626s | EXTRACT_KEY_FROM_KEY: 626s | target: CAMELLIA_CBC 626s | flags: ENCRYPT+DECRYPT 626s | key_size: 32-bytes 626s | base: base-key@0x2aa1372d0d0 (48-bytes, EXTRACT_KEY_FROM_KEY) 626s | operation: FLAGS_ONLY 626s | params: 8-bytes@0x3fff0979048 626s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 626s | decode_to_chunk: output: 626s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 626s | decode_to_chunk: new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 626s | decode_to_chunk: output: 626s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 626s | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 626s | decode_to_chunk: output: 626s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 626s | decode_to_chunk: ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 626s | decode_to_chunk: output: 626s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 626s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 626s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 626s | verify_chunk_data: encrypt: ok 626s | verify_chunk_data: updated CBC IV: ok 626s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 626s | decode_to_chunk: output: 626s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 626s | decode_to_chunk: new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 626s | decode_to_chunk: output: 626s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 626s | decode_to_chunk: ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 626s | decode_to_chunk: output: 626s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 626s | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 626s | decode_to_chunk: output: 626s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 626s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 626s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 626s | verify_chunk_data: decrypt: ok 626s | verify_chunk_data: updated CBC IV: ok 626s | test_ctr_vector: Camellia: 16 bytes with 256-bit key passed 626s algparse: testing AES_GCM_16: 626s algparse: empty string 626s | decode_to_chunk: raw_key: input "0xcf063a34d4a9a76c2c86787d3f96db71" 626s | decode_to_chunk: output: 626s | cf 06 3a 34 d4 a9 a7 6c 2c 86 78 7d 3f 96 db 71 ..:4...l,.x}?..q 626s | CONCATENATE_DATA_AND_BASE: 626s | target: EXTRACT_KEY_FROM_KEY 626s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 626s | params: 16-bytes@0x3fff0978f98 626s | key-offset: 0, key-size: 16 626s | EXTRACT_KEY_FROM_KEY: 626s | target: AES_GCM 626s | flags: ENCRYPT+DECRYPT 626s | key_size: 16-bytes 626s | base: base-key@0x2aa1372d0d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 626s | operation: FLAGS_ONLY 626s | params: 8-bytes@0x3fff0978f90 626s | decode_to_chunk: salted IV: input "0x113b9785971864c83b01c787" 626s | decode_to_chunk: output: 626s | 11 3b 97 85 97 18 64 c8 3b 01 c7 87 .;....d.;... 626s | decode_to_chunk: AAD: input "" 626s | decode_to_chunk: output: 626s | 626s | decode_to_chunk: plaintext: input "" 626s | decode_to_chunk: output: 626s | 626s | decode_to_chunk: ciphertext: input "" 626s | decode_to_chunk: output: 626s | 626s | decode_to_chunk: tag: input "0x72ac8493e3a5228b5d130a69d2510e42" 626s | decode_to_chunk: output: 626s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 626s | test_gcm_vector: decrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 626s | test_gcm_vector: text+tag on call 626s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 626s | verify_chunk_data: output ciphertext: ok 626s | verify_chunk_data: TAG: ok 626s | test_gcm_vector: text+tag on return 626s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 626s | test_gcm_vector: encrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 626s | test_gcm_vector: text+tag on call 626s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 626s | verify_chunk_data: output ciphertext: ok 626s | verify_chunk_data: TAG: ok 626s | test_gcm_vector: text+tag on return 626s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 626s | test_gcm_vector: passed 626s algparse: one block 626s | decode_to_chunk: raw_key: input "0xe98b72a9881a84ca6b76e0f43e68647a" 626s | decode_to_chunk: output: 626s | e9 8b 72 a9 88 1a 84 ca 6b 76 e0 f4 3e 68 64 7a ..r.....kv..>hdz 626s | CONCATENATE_DATA_AND_BASE: 626s | target: EXTRACT_KEY_FROM_KEY 626s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 626s | params: 16-bytes@0x3fff0978f98 626s | key-offset: 0, key-size: 16 626s | EXTRACT_KEY_FROM_KEY: 626s | target: AES_GCM 626s | flags: ENCRYPT+DECRYPT 626s | key_size: 16-bytes 626s | base: base-key@0x2aa1372d0d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 626s | operation: FLAGS_ONLY 626s | params: 8-bytes@0x3fff0978f90 626s | decode_to_chunk: salted IV: input "0x8b23299fde174053f3d652ba" 626s | decode_to_chunk: output: 626s | 8b 23 29 9f de 17 40 53 f3 d6 52 ba .#)...@S..R. 626s | decode_to_chunk: AAD: input "" 626s | decode_to_chunk: output: 626s | 626s | decode_to_chunk: plaintext: input "0x28286a321293253c3e0aa2704a278032" 626s | decode_to_chunk: output: 626s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 626s | decode_to_chunk: ciphertext: input "0x5a3c1cf1985dbb8bed818036fdd5ab42" 626s | decode_to_chunk: output: 626s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 626s | decode_to_chunk: tag: input "0x23c7ab0f952b7091cd324835043b5eb5" 626s | decode_to_chunk: output: 626s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 626s | test_gcm_vector: decrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 626s | test_gcm_vector: text+tag on call 626s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 626s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 626s | verify_chunk_data: output ciphertext: ok 626s | verify_chunk_data: TAG: ok 626s | test_gcm_vector: text+tag on return 626s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 626s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 626s | test_gcm_vector: encrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 626s | test_gcm_vector: text+tag on call 626s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 626s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 626s | verify_chunk_data: output ciphertext: ok 626s | verify_chunk_data: TAG: ok 626s | test_gcm_vector: text+tag on return 626s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 626s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 626s | test_gcm_vector: passed 626s algparse: two blocks 626s | decode_to_chunk: raw_key: input "0xbfd414a6212958a607a0f5d3ab48471d" 626s | decode_to_chunk: output: 626s | bf d4 14 a6 21 29 58 a6 07 a0 f5 d3 ab 48 47 1d ....!)X......HG. 626s | CONCATENATE_DATA_AND_BASE: 626s | target: EXTRACT_KEY_FROM_KEY 626s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 626s | params: 16-bytes@0x3fff0978f98 626s | key-offset: 0, key-size: 16 626s | EXTRACT_KEY_FROM_KEY: 626s | target: AES_GCM 626s | flags: ENCRYPT+DECRYPT 626s | key_size: 16-bytes 626s | base: base-key@0x2aa1372d0d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 626s | operation: FLAGS_ONLY 626s | params: 8-bytes@0x3fff0978f90 626s | decode_to_chunk: salted IV: input "0x86d8ea0ab8e40dcc481cd0e2" 626s | decode_to_chunk: output: 626s | 86 d8 ea 0a b8 e4 0d cc 48 1c d0 e2 ........H... 626s | decode_to_chunk: AAD: input "" 626s | decode_to_chunk: output: 626s | 626s | decode_to_chunk: plaintext: input "0xa6b76a066e63392c9443e60272ceaeb9d25c991b0f2e55e2804e168c05ea591a" 626s | decode_to_chunk: output: 626s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 626s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 626s | decode_to_chunk: ciphertext: input "0x62171db33193292d930bf6647347652c1ef33316d7feca99d54f1db4fcf513f8" 626s | decode_to_chunk: output: 626s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 626s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 626s | decode_to_chunk: tag: input "0xc28280aa5c6c7a8bd366f28c1cfd1f6e" 626s | decode_to_chunk: output: 626s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 626s | test_gcm_vector: decrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 626s | test_gcm_vector: text+tag on call 626s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 626s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 626s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 626s | verify_chunk_data: output ciphertext: ok 626s | verify_chunk_data: TAG: ok 626s | test_gcm_vector: text+tag on return 626s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 626s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 626s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 626s | test_gcm_vector: encrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 626s | test_gcm_vector: text+tag on call 626s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 626s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 626s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 626s | verify_chunk_data: output ciphertext: ok 626s | verify_chunk_data: TAG: ok 626s | test_gcm_vector: text+tag on return 626s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 626s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 626s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 626s | test_gcm_vector: passed 626s algparse: two blocks with associated data 626s | decode_to_chunk: raw_key: input "0x006c458100fc5f4d62949d2c833b82d1" 626s | decode_to_chunk: output: 626s | 00 6c 45 81 00 fc 5f 4d 62 94 9d 2c 83 3b 82 d1 .lE..._Mb..,.;.. 626s | CONCATENATE_DATA_AND_BASE: 626s | target: EXTRACT_KEY_FROM_KEY 626s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 626s | params: 16-bytes@0x3fff0978f98 626s | key-offset: 0, key-size: 16 626s | EXTRACT_KEY_FROM_KEY: 626s | target: AES_GCM 626s | flags: ENCRYPT+DECRYPT 626s | key_size: 16-bytes 626s | base: base-key@0x2aa1372d0d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 626s | operation: FLAGS_ONLY 626s | params: 8-bytes@0x3fff0978f90 626s | decode_to_chunk: salted IV: input "0xa4e9c4bc5725a21ff42c82b2" 626s | decode_to_chunk: output: 626s | a4 e9 c4 bc 57 25 a2 1f f4 2c 82 b2 ....W%...,.. 626s | decode_to_chunk: AAD: input "0x2efb14fb3657cdd6b9a8ff1a5f5a39b9" 626s | decode_to_chunk: output: 626s | 2e fb 14 fb 36 57 cd d6 b9 a8 ff 1a 5f 5a 39 b9 ....6W......_Z9. 626s | decode_to_chunk: plaintext: input "0xf381d3bfbee0a879f7a4e17b623278cedd6978053dd313530a18f1a836100950" 626s | decode_to_chunk: output: 626s | f3 81 d3 bf be e0 a8 79 f7 a4 e1 7b 62 32 78 ce .......y...{b2x. 626s | dd 69 78 05 3d d3 13 53 0a 18 f1 a8 36 10 09 50 .ix.=..S....6..P 626s | decode_to_chunk: ciphertext: input "0xf39b4db3542d8542fb73fd2d66be568f26d7f814b3f87d1eceac3dd09a8d697e" 626s | decode_to_chunk: output: 626s | f3 9b 4d b3 54 2d 85 42 fb 73 fd 2d 66 be 56 8f ..M.T-.B.s.-f.V. 626s | 26 d7 f8 14 b3 f8 7d 1e ce ac 3d d0 9a 8d 69 7e &.....}...=...i~ 626s | decode_to_chunk: tag: input "0x39f045cb23b698c925db134d56c5" 626s | decode_to_chunk: output: 626s | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 9.E.#...%..MV. 626s | test_gcm_vector: decrypt: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=14 626s | test_gcm_vector: text+tag on call 626s | f3 9b 4d b3 54 2d 85 42 fb 73 fd 2d 66 be 56 8f ..M.T-.B.s.-f.V. 626s | 26 d7 f8 14 b3 f8 7d 1e ce ac 3d d0 9a 8d 69 7e &.....}...=...i~ 626s | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 9.E.#...%..MV. 626s | verify_chunk_data: output ciphertext: ok 626s | verify_chunk_data: TAG: ok 626s | test_gcm_vector: text+tag on return 626s | f3 81 d3 bf be e0 a8 79 f7 a4 e1 7b 62 32 78 ce .......y...{b2x. 626s | dd 69 78 05 3d d3 13 53 0a 18 f1 a8 36 10 09 50 .ix.=..S....6..P 626s | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 9.E.#...%..MV. 626s | test_gcm_vector: encrypt: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=14 626s | test_gcm_vector: text+tag on call 626s | f3 81 d3 bf be e0 a8 79 f7 a4 e1 7b 62 32 78 ce .......y...{b2x. 626s | dd 69 78 05 3d d3 13 53 0a 18 f1 a8 36 10 09 50 .ix.=..S....6..P 626s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .............. 626s | verify_chunk_data: output ciphertext: ok 626s | verify_chunk_data: TAG: ok 626s | test_gcm_vector: text+tag on return 626s | f3 9b 4d b3 54 2d 85 42 fb 73 fd 2d 66 be 56 8f ..M.T-.B.s.-f.V. 626s | 26 d7 f8 14 b3 f8 7d 1e ce ac 3d d0 9a 8d 69 7e &.....}...=...i~ 626s | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 9.E.#...%..MV. 626s | test_gcm_vector: passed 626s algparse: testing AES_CTR: 626s algparse: Encrypting 16 octets using AES-CTR with 128-bit key 626s | decode_to_chunk: raw_key: input "0x AE 68 52 F8 12 10 67 CC 4B F7 A5 76 55 77 F3 9E" 626s | decode_to_chunk: output: 626s | ae 68 52 f8 12 10 67 cc 4b f7 a5 76 55 77 f3 9e .hR...g.K..vUw.. 626s | CONCATENATE_DATA_AND_BASE: 626s | target: EXTRACT_KEY_FROM_KEY 626s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 626s | params: 16-bytes@0x3fff0979048 626s | key-offset: 0, key-size: 16 626s | EXTRACT_KEY_FROM_KEY: 626s | target: AES_CTR 626s | flags: ENCRYPT+DECRYPT 626s | key_size: 16-bytes 626s | base: base-key@0x2aa1372d0d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 626s | operation: FLAGS_ONLY 626s | params: 8-bytes@0x3fff0979040 626s | decode_to_chunk: input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 626s | decode_to_chunk: output: 626s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 626s | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 626s | decode_to_chunk: output: 626s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 626s | decode_to_chunk: Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 626s | decode_to_chunk: output: 626s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 626s | decode_to_chunk: expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 626s | decode_to_chunk: output: 626s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 626s | do_aes_ctr: enter 626s | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes 626s | do_aes_ctr: exit 626s | verify_chunk_data: encrypt: ok 626s | verify_chunk_data: counter-block: ok 626s | decode_to_chunk: input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 626s | decode_to_chunk: output: 626s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 626s | decode_to_chunk: Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 626s | decode_to_chunk: output: 626s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 626s | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 626s | decode_to_chunk: output: 626s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 626s | decode_to_chunk: expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 626s | decode_to_chunk: output: 626s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 626s | do_aes_ctr: enter 626s | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes 626s | do_aes_ctr: exit 626s | verify_chunk_data: decrypt: ok 626s | verify_chunk_data: counter-block: ok 626s | test_ctr_vector: Encrypting 16 octets using AES-CTR with 128-bit key passed 626s algparse: Encrypting 32 octets using AES-CTR with 128-bit key 626s | decode_to_chunk: raw_key: input "0x 7E 24 06 78 17 FA E0 D7 43 D6 CE 1F 32 53 91 63" 626s | decode_to_chunk: output: 626s | 7e 24 06 78 17 fa e0 d7 43 d6 ce 1f 32 53 91 63 ~$.x....C...2S.c 626s | CONCATENATE_DATA_AND_BASE: 626s | target: EXTRACT_KEY_FROM_KEY 626s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 626s | params: 16-bytes@0x3fff0979048 626s | key-offset: 0, key-size: 16 626s | EXTRACT_KEY_FROM_KEY: 626s | target: AES_CTR 626s | flags: ENCRYPT+DECRYPT 626s | key_size: 16-bytes 626s | base: base-key@0x2aa1372d0d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 626s | operation: FLAGS_ONLY 626s | params: 8-bytes@0x3fff0979040 626s | decode_to_chunk: input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 626s | decode_to_chunk: output: 626s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 626s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 626s | decode_to_chunk: output: 626s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 626s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 626s | decode_to_chunk: Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 626s | decode_to_chunk: output: 626s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 626s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 626s | decode_to_chunk: expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 626s | decode_to_chunk: output: 626s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 .l...T;Y.H...... 626s | do_aes_ctr: enter 626s | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes 626s | do_aes_ctr: exit 626s | verify_chunk_data: encrypt: ok 626s | verify_chunk_data: counter-block: ok 626s | decode_to_chunk: input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 626s | decode_to_chunk: output: 626s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 626s | decode_to_chunk: Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 626s | decode_to_chunk: output: 626s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 626s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 626s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 626s | decode_to_chunk: output: 626s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 626s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 626s | decode_to_chunk: expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 626s | decode_to_chunk: output: 626s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 .l...T;Y.H...... 626s | do_aes_ctr: enter 626s | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes 626s | do_aes_ctr: exit 626s | verify_chunk_data: decrypt: ok 626s | verify_chunk_data: counter-block: ok 626s | test_ctr_vector: Encrypting 32 octets using AES-CTR with 128-bit key passed 626s algparse: Encrypting 36 octets using AES-CTR with 128-bit key 626s | decode_to_chunk: raw_key: input "0x 76 91 BE 03 5E 50 20 A8 AC 6E 61 85 29 F9 A0 DC" 626s | decode_to_chunk: output: 626s | 76 91 be 03 5e 50 20 a8 ac 6e 61 85 29 f9 a0 dc v...^P ..na.)... 626s | CONCATENATE_DATA_AND_BASE: 626s | target: EXTRACT_KEY_FROM_KEY 626s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 626s | params: 16-bytes@0x3fff0979048 626s | key-offset: 0, key-size: 16 626s | EXTRACT_KEY_FROM_KEY: 626s | target: AES_CTR 626s | flags: ENCRYPT+DECRYPT 626s | key_size: 16-bytes 626s | base: base-key@0x2aa1372d0d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 626s | operation: FLAGS_ONLY 626s | params: 8-bytes@0x3fff0979040 626s | decode_to_chunk: input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 626s | decode_to_chunk: output: 626s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 626s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 626s | decode_to_chunk: output: 626s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 626s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 626s | 20 21 22 23 !"# 626s | decode_to_chunk: Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 626s | decode_to_chunk: output: 626s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 626s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 626s | 25 b2 07 2f %../ 626s | decode_to_chunk: expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 626s | decode_to_chunk: output: 626s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 626s | do_aes_ctr: enter 626s | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes 626s | do_aes_ctr: exit 626s | verify_chunk_data: encrypt: ok 626s | verify_chunk_data: counter-block: ok 626s | decode_to_chunk: input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 626s | decode_to_chunk: output: 626s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 626s | decode_to_chunk: Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 626s | decode_to_chunk: output: 626s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 626s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 626s | 25 b2 07 2f %../ 626s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 626s | decode_to_chunk: output: 626s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 626s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 626s | 20 21 22 23 !"# 626s | decode_to_chunk: expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 626s | decode_to_chunk: output: 626s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 626s | do_aes_ctr: enter 626s | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes 626s | do_aes_ctr: exit 626s | verify_chunk_data: decrypt: ok 626s | verify_chunk_data: counter-block: ok 626s | test_ctr_vector: Encrypting 36 octets using AES-CTR with 128-bit key passed 626s algparse: Encrypting 16 octets using AES-CTR with 192-bit key 626s | decode_to_chunk: raw_key: input "0x16 AF 5B 14 5F C9 F5 79 C1 75 F9 3E 3B FB 0E ED86 3D 06 CC FD B7 85 15" 626s | decode_to_chunk: output: 626s | 16 af 5b 14 5f c9 f5 79 c1 75 f9 3e 3b fb 0e ed ..[._..y.u.>;... 626s | 86 3d 06 cc fd b7 85 15 .=...... 626s | CONCATENATE_DATA_AND_BASE: 626s | target: EXTRACT_KEY_FROM_KEY 626s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 626s | params: 16-bytes@0x3fff0979048 626s | key-offset: 0, key-size: 24 626s | EXTRACT_KEY_FROM_KEY: 626s | target: AES_CTR 626s | flags: ENCRYPT+DECRYPT 626s | key_size: 24-bytes 626s | base: base-key@0x2aa1372d0d0 (40-bytes, EXTRACT_KEY_FROM_KEY) 626s | operation: FLAGS_ONLY 626s | params: 8-bytes@0x3fff0979040 626s | decode_to_chunk: input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 626s | decode_to_chunk: output: 626s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 626s | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 626s | decode_to_chunk: output: 626s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 626s | decode_to_chunk: Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 626s | decode_to_chunk: output: 626s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 626s | decode_to_chunk: expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 626s | decode_to_chunk: output: 626s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 626s | do_aes_ctr: enter 626s | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes 626s | do_aes_ctr: exit 626s | verify_chunk_data: encrypt: ok 626s | verify_chunk_data: counter-block: ok 626s | decode_to_chunk: input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 626s | decode_to_chunk: output: 626s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 626s | decode_to_chunk: Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 626s | decode_to_chunk: output: 626s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 626s | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 626s | decode_to_chunk: output: 626s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 626s | decode_to_chunk: expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 626s | decode_to_chunk: output: 626s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 626s | do_aes_ctr: enter 626s | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes 626s | do_aes_ctr: exit 626s | verify_chunk_data: decrypt: ok 626s | verify_chunk_data: counter-block: ok 626s | test_ctr_vector: Encrypting 16 octets using AES-CTR with 192-bit key passed 626s algparse: Encrypting 32 octets using AES-CTR with 192-bit key 626s | decode_to_chunk: raw_key: input "0x7C 5C B2 40 1B 3D C3 3C 19 E7 34 08 19 E0 F6 9C67 8C 3D B8 E6 F6 A9 1A" 626s | decode_to_chunk: output: 626s | 7c 5c b2 40 1b 3d c3 3c 19 e7 34 08 19 e0 f6 9c |\.@.=.<..4..... 626s | 67 8c 3d b8 e6 f6 a9 1a g.=..... 626s | CONCATENATE_DATA_AND_BASE: 626s | target: EXTRACT_KEY_FROM_KEY 626s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 626s | params: 16-bytes@0x3fff0979048 626s | key-offset: 0, key-size: 24 626s | EXTRACT_KEY_FROM_KEY: 626s | target: AES_CTR 626s | flags: ENCRYPT+DECRYPT 626s | key_size: 24-bytes 626s | base: base-key@0x2aa1372d0d0 (40-bytes, EXTRACT_KEY_FROM_KEY) 626s | operation: FLAGS_ONLY 626s | params: 8-bytes@0x3fff0979040 626s | decode_to_chunk: input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 626s | decode_to_chunk: output: 626s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 626s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 626s | decode_to_chunk: output: 626s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 626s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 626s | decode_to_chunk: Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 626s | decode_to_chunk: output: 626s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 626s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 626s | decode_to_chunk: expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 626s | decode_to_chunk: output: 626s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 626s | do_aes_ctr: enter 626s | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes 626s | do_aes_ctr: exit 626s |initializing NSS db 626s running pluto selftest 626s verify_chunk_data: encrypt: ok 626s | verify_chunk_data: counter-block: ok 626s | decode_to_chunk: input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 626s | decode_to_chunk: output: 626s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 626s | decode_to_chunk: Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 626s | decode_to_chunk: output: 626s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 626s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 626s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 626s | decode_to_chunk: output: 626s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 626s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 626s | decode_to_chunk: expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 626s | decode_to_chunk: output: 626s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 626s | do_aes_ctr: enter 626s | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes 626s | do_aes_ctr: exit 626s | verify_chunk_data: decrypt: ok 626s | verify_chunk_data: counter-block: ok 626s | test_ctr_vector: Encrypting 32 octets using AES-CTR with 192-bit key passed 626s algparse: Encrypting 36 octets using AES-CTR with 192-bit key 626s | decode_to_chunk: raw_key: input "0x02 BF 39 1E E8 EC B1 59 B9 59 61 7B 09 65 27 9BF5 9B 60 A7 86 D3 E0 FE" 626s | decode_to_chunk: output: 626s | 02 bf 39 1e e8 ec b1 59 b9 59 61 7b 09 65 27 9b ..9....Y.Ya{.e'. 626s | f5 9b 60 a7 86 d3 e0 fe ..`..... 626s | CONCATENATE_DATA_AND_BASE: 626s | target: EXTRACT_KEY_FROM_KEY 626s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 626s | params: 16-bytes@0x3fff0979048 626s | key-offset: 0, key-size: 24 626s | EXTRACT_KEY_FROM_KEY: 626s | target: AES_CTR 626s | flags: ENCRYPT+DECRYPT 626s | key_size: 24-bytes 626s | base: base-key@0x2aa1372d0d0 (40-bytes, EXTRACT_KEY_FROM_KEY) 626s | operation: FLAGS_ONLY 626s | params: 8-bytes@0x3fff0979040 626s | decode_to_chunk: input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 626s | decode_to_chunk: output: 626s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 626s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 626s | decode_to_chunk: output: 626s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 626s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 626s | 20 21 22 23 !"# 626s | decode_to_chunk: Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 626s | decode_to_chunk: output: 626s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 626s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 626s | ab ee 09 35 ...5 626s | decode_to_chunk: expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 626s | decode_to_chunk: output: 626s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 626s | do_aes_ctr: enter 626s | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes 626s | do_aes_ctr: exit 626s | verify_chunk_data: encrypt: ok 626s | verify_chunk_data: counter-block: ok 626s | decode_to_chunk: input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 626s | decode_to_chunk: output: 626s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 626s | decode_to_chunk: Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 626s | decode_to_chunk: output: 626s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 626s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 626s | ab ee 09 35 ...5 626s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 626s | decode_to_chunk: output: 626s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 626s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 626s | 20 21 22 23 !"# 626s | decode_to_chunk: expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 626s | decode_to_chunk: output: 626s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 626s | do_aes_ctr: enter 626s | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes 626s | do_aes_ctr: exit 626s | verify_chunk_data: decrypt: ok 626s | verify_chunk_data: counter-block: ok 626s | test_ctr_vector: Encrypting 36 octets using AES-CTR with 192-bit key passed 626s algparse: Encrypting 16 octets using AES-CTR with 256-bit key 626s | decode_to_chunk: raw_key: input "0x77 6B EF F2 85 1D B0 6F 4C 8A 05 42 C8 69 6F 6C6A 81 AF 1E EC 96 B4 D3 7F C1 D6 89 E6 C1 C1 04" 626s | decode_to_chunk: output: 626s | 77 6b ef f2 85 1d b0 6f 4c 8a 05 42 c8 69 6f 6c wk.....oL..B.iol 626s | 6a 81 af 1e ec 96 b4 d3 7f c1 d6 89 e6 c1 c1 04 j............... 626s | CONCATENATE_DATA_AND_BASE: 626s | target: EXTRACT_KEY_FROM_KEY 626s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 626s | params: 16-bytes@0x3fff0979048 626s | key-offset: 0, key-size: 32 626s | EXTRACT_KEY_FROM_KEY: 626s | target: AES_CTR 626s | flags: ENCRYPT+DECRYPT 626s | key_size: 32-bytes 626s | base: base-key@0x2aa1372d0d0 (48-bytes, EXTRACT_KEY_FROM_KEY) 626s | operation: FLAGS_ONLY 626s | params: 8-bytes@0x3fff0979040 626s | decode_to_chunk: input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 626s | decode_to_chunk: output: 626s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 626s | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 626s | decode_to_chunk: output: 626s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 626s | decode_to_chunk: Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 626s | decode_to_chunk: output: 626s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 626s | decode_to_chunk: expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 626s | decode_to_chunk: output: 626s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 626s | do_aes_ctr: enter 626s | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes 626s | do_aes_ctr: exit 626s | verify_chunk_data: encrypt: ok 626s | verify_chunk_data: counter-block: ok 626s | decode_to_chunk: input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 626s | decode_to_chunk: output: 626s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 626s | decode_to_chunk: Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 626s | decode_to_chunk: output: 626s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 626s | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 626s | decode_to_chunk: output: 626s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 626s | decode_to_chunk: expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 626s | decode_to_chunk: output: 626s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 626s | do_aes_ctr: enter 626s | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes 626s | do_aes_ctr: exit 626s | verify_chunk_data: decrypt: ok 626s | verify_chunk_data: counter-block: ok 626s | test_ctr_vector: Encrypting 16 octets using AES-CTR with 256-bit key passed 626s algparse: Encrypting 32 octets using AES-CTR with 256-bit key 626s | decode_to_chunk: raw_key: input "0xF6 D6 6D 6B D5 2D 59 BB 07 96 36 58 79 EF F8 86C6 6D D5 1A 5B 6A 99 74 4B 50 59 0C 87 A2 38 84" 626s | decode_to_chunk: output: 626s | f6 d6 6d 6b d5 2d 59 bb 07 96 36 58 79 ef f8 86 ..mk.-Y...6Xy... 626s | c6 6d d5 1a 5b 6a 99 74 4b 50 59 0c 87 a2 38 84 .m..[j.tKPY...8. 626s | CONCATENATE_DATA_AND_BASE: 626s | target: EXTRACT_KEY_FROM_KEY 626s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 626s | params: 16-bytes@0x3fff0979048 626s | key-offset: 0, key-size: 32 626s | EXTRACT_KEY_FROM_KEY: 626s | target: AES_CTR 626s | flags: ENCRYPT+DECRYPT 626s | key_size: 32-bytes 626s | base: base-key@0x2aa1372d0d0 (48-bytes, EXTRACT_KEY_FROM_KEY) 626s | operation: FLAGS_ONLY 626s | params: 8-bytes@0x3fff0979040 626s | decode_to_chunk: input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 626s | decode_to_chunk: output: 626s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 626s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 626s | decode_to_chunk: output: 626s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 626s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 626s | decode_to_chunk: Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 626s | decode_to_chunk: output: 626s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 626s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 626s | decode_to_chunk: expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 626s | decode_to_chunk: output: 626s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 626s | do_aes_ctr: enter 626s | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes 626s | do_aes_ctr: exit 626s | verify_chunk_data: encrypt: ok 626s | verify_chunk_data: counter-block: ok 626s | decode_to_chunk: input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 626s | decode_to_chunk: output: 626s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 626s | decode_to_chunk: Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 626s | decode_to_chunk: output: 626s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 626s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 626s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 626s | decode_to_chunk: output: 626s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 626s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 626s | decode_to_chunk: expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 626s | decode_to_chunk: output: 626s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 626s | do_aes_ctr: enter 626s | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes 626s | do_aes_ctr: exit 626s | verify_chunk_data: decrypt: ok 626s | verify_chunk_data: counter-block: ok 626s | test_ctr_vector: Encrypting 32 octets using AES-CTR with 256-bit key passed 626s algparse: Encrypting 36 octets using AES-CTR with 256-bit key 626s | decode_to_chunk: raw_key: input "0xFF 7A 61 7C E6 91 48 E4 F1 72 6E 2F 43 58 1D E2AA 62 D9 F8 05 53 2E DF F1 EE D6 87 FB 54 15 3D" 626s | decode_to_chunk: output: 626s | ff 7a 61 7c e6 91 48 e4 f1 72 6e 2f 43 58 1d e2 .za|..H..rn/CX.. 626s | aa 62 d9 f8 05 53 2e df f1 ee d6 87 fb 54 15 3d .b...S.......T.= 626s | CONCATENATE_DATA_AND_BASE: 626s | target: EXTRACT_KEY_FROM_KEY 626s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 626s | params: 16-bytes@0x3fff0979048 626s | key-offset: 0, key-size: 32 626s | EXTRACT_KEY_FROM_KEY: 626s | target: AES_CTR 626s | flags: ENCRYPT+DECRYPT 626s | key_size: 32-bytes 626s | base: base-key@0x2aa1372d0d0 (48-bytes, EXTRACT_KEY_FROM_KEY) 626s | operation: FLAGS_ONLY 626s | params: 8-bytes@0x3fff0979040 626s | decode_to_chunk: input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 626s | decode_to_chunk: output: 626s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 626s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 626s | decode_to_chunk: output: 626s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 626s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 626s | 20 21 22 23 !"# 626s | decode_to_chunk: Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 626s | decode_to_chunk: output: 626s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 626s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 626s | 1e c0 e6 b8 .... 626s | decode_to_chunk: expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 626s | decode_to_chunk: output: 626s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 626s | do_aes_ctr: enter 627s | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes 627s | do_aes_ctr: exit 627s | verify_chunk_data: encrypt: ok 627s | verify_chunk_data: counter-block: ok 627s | decode_to_chunk: input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 627s | decode_to_chunk: output: 627s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 627s | decode_to_chunk: Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 627s | decode_to_chunk: output: 627s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 627s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 627s | 1e c0 e6 b8 .... 627s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 627s | decode_to_chunk: output: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 627s | 20 21 22 23 !"# 627s | decode_to_chunk: expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 627s | decode_to_chunk: output: 627s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 627s | do_aes_ctr: enter 627s | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes 627s | do_aes_ctr: exit 627s | verify_chunk_data: decrypt: ok 627s | verify_chunk_data: counter-block: ok 627s | test_ctr_vector: Encrypting 36 octets using AES-CTR with 256-bit key passed 627s algparse: testing AES_CBC: 627s algparse: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 627s | decode_to_chunk: raw_key: input "0x06a9214036b8a15b512e03d534120006" 627s | decode_to_chunk: output: 627s | 06 a9 21 40 36 b8 a1 5b 51 2e 03 d5 34 12 00 06 ..!@6..[Q...4... 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0979050 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_CBC 627s | flags: ENCRYPT+DECRYPT 627s | key_size: 16-bytes 627s | base: base-key@0x2aa1372d0d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0979048 627s | decode_to_chunk: IV: : input "0x3dafba429d9eb430b422da802c9fac41" 627s | decode_to_chunk: output: 627s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 627s | decode_to_chunk: new IV: : input "0xe353779c1079aeb82708942dbe77181a" 627s | decode_to_chunk: output: 627s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 627s | decode_to_chunk: plaintext: : input "Single block msg" 627s | decode_to_chunk: output: 627s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 627s | decode_to_chunk: ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 627s | decode_to_chunk: output: 627s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 627s | NSS ike_alg_nss_cbc: AES_CBC - enter 627s | NSS ike_alg_nss_cbc: AES_CBC - exit 627s | verify_chunk_data: encrypt: ok 627s | verify_chunk_data: updated CBC IV: ok 627s | decode_to_chunk: IV: : input "0x3dafba429d9eb430b422da802c9fac41" 627s | decode_to_chunk: output: 627s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 627s | decode_to_chunk: new IV: : input "0xe353779c1079aeb82708942dbe77181a" 627s | decode_to_chunk: output: 627s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 627s | decode_to_chunk: ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 627s | decode_to_chunk: output: 627s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 627s | decode_to_chunk: plaintext: : input "Single block msg" 627s | decode_to_chunk: output: 627s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 627s | NSS ike_alg_nss_cbc: AES_CBC - enter 627s | NSS ike_alg_nss_cbc: AES_CBC - exit 627s | verify_chunk_data: decrypt: ok 627s | verify_chunk_data: updated CBC IV: ok 627s | test_ctr_vector: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key passed 627s algparse: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 627s | decode_to_chunk: raw_key: input "0xc286696d887c9aa0611bbb3e2025a45a" 627s | decode_to_chunk: output: 627s | c2 86 69 6d 88 7c 9a a0 61 1b bb 3e 20 25 a4 5a ..im.|..a..> %.Z 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0979050 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_CBC 627s | flags: ENCRYPT+DECRYPT 627s | key_size: 16-bytes 627s | base: base-key@0x2aa1372d0d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0979048 627s | decode_to_chunk: IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 627s | decode_to_chunk: output: 627s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 627s | decode_to_chunk: new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 627s | decode_to_chunk: output: 627s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 627s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 627s | decode_to_chunk: plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 627s | decode_to_chunk: output: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 627s | decode_to_chunk: ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 627s | decode_to_chunk: output: 627s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 627s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 627s | NSS ike_alg_nss_cbc: AES_CBC - enter 627s | NSS ike_alg_nss_cbc: AES_CBC - exit 627s | verify_chunk_data: encrypt: ok 627s | verify_chunk_data: updated CBC IV: ok 627s | decode_to_chunk: IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 627s | decode_to_chunk: output: 627s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 627s | decode_to_chunk: new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 627s | decode_to_chunk: output: 627s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 627s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 627s | decode_to_chunk: ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 627s | decode_to_chunk: output: 627s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 627s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 627s | decode_to_chunk: plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 627s | decode_to_chunk: output: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 627s | NSS ike_alg_nss_cbc: AES_CBC - enter 627s | NSS ike_alg_nss_cbc: AES_CBC - exit 627s | verify_chunk_data: decrypt: ok 627s | verify_chunk_data: updated CBC IV: ok 627s | test_ctr_vector: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key passed 627s algparse: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 627s | decode_to_chunk: raw_key: input "0x6c3ea0477630ce21a2ce334aa746c2cd" 627s | decode_to_chunk: output: 627s | 6c 3e a0 47 76 30 ce 21 a2 ce 33 4a a7 46 c2 cd l>.Gv0.!..3J.F.. 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0979050 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_CBC 627s | flags: ENCRYPT+DECRYPT 627s | key_size: 16-bytes 627s | base: base-key@0x2aa1372d0d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0979048 627s | decode_to_chunk: IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 627s | decode_to_chunk: output: 627s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 627s | decode_to_chunk: new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 627s | decode_to_chunk: output: 627s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 627s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 627s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 627s | decode_to_chunk: plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 627s | decode_to_chunk: output: 627s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 627s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 627s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 627s | decode_to_chunk: ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 627s | decode_to_chunk: output: 627s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 627s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 627s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 627s | NSS ike_alg_nss_cbc: AES_CBC - enter 627s | NSS ike_alg_nss_cbc: AES_CBC - exit 627s | verify_chunk_data: encrypt: ok 627s | verify_chunk_data: updated CBC IV: ok 627s | decode_to_chunk: IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 627s | decode_to_chunk: output: 627s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 627s | decode_to_chunk: new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 627s | decode_to_chunk: output: 627s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 627s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 627s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 627s | decode_to_chunk: ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 627s | decode_to_chunk: output: 627s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 627s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 627s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 627s | decode_to_chunk: plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 627s | decode_to_chunk: output: 627s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 627s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 627s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 627s | NSS ike_alg_nss_cbc: AES_CBC - enter 627s | NSS ike_alg_nss_cbc: AES_CBC - exit 627s | verify_chunk_data: decrypt: ok 627s | verify_chunk_data: updated CBC IV: ok 627s | test_ctr_vector: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key passed 627s algparse: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 627s | decode_to_chunk: raw_key: input "0x56e47a38c5598974bc46903dba290349" 627s | decode_to_chunk: output: 627s | 56 e4 7a 38 c5 59 89 74 bc 46 90 3d ba 29 03 49 V.z8.Y.t.F.=.).I 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0979050 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_CBC 627s | flags: ENCRYPT+DECRYPT 627s | key_size: 16-bytes 627s | base: base-key@0x2aa1372d0d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0979048 627s | decode_to_chunk: IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 627s | decode_to_chunk: output: 627s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 627s | decode_to_chunk: plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 627s | decode_to_chunk: output: 627s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 627s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 627s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 627s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 627s | decode_to_chunk: ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 627s | decode_to_chunk: output: 627s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 627s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 627s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 627s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 627s | NSS ike_alg_nss_cbc: AES_CBC - enter 627s | NSS ike_alg_nss_cbc: AES_CBC - exit 627s | verify_chunk_data: encrypt: ok 627s | verify_chunk_data: updated CBC IV: ok 627s | decode_to_chunk: IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 627s | decode_to_chunk: output: 627s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 627s | decode_to_chunk: ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 627s | decode_to_chunk: output: 627s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 627s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 627s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 627s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 627s | decode_to_chunk: plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 627s | decode_to_chunk: output: 627s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 627s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 627s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 627s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 627s | NSS ike_alg_nss_cbc: AES_CBC - enter 627s | NSS ike_alg_nss_cbc: AES_CBC - exit 627s | verify_chunk_data: decrypt: ok 627s | verify_chunk_data: updated CBC IV: ok 627s | test_ctr_vector: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key passed 627s algparse: testing AES_XCBC: 627s algparse: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 627s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 627s | decode_to_chunk: output: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | decode_to_chunk: test_prf_vector: input "" 627s | decode_to_chunk: output: 627s | 627s | decode_to_chunk: test_prf_vector: input "0x75f0251d528ac01c4573dfd584d79f29" 627s | decode_to_chunk: output: 627s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 627s | PRF chunk interface PRF AES_XCBC init key-chunk@0x2aa1372d080 (length 16) 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978ed0 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 16-bytes 627s | base: base-key@0x2aa1372d0d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978ec8 627s | XCBC: Key 16=16 just right 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa1372b6c0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978e48 627s | PRF chunk interface PRF AES_XCBC 0x2aa1372db50 627s | PRF chunk interface PRF AES_XCBC update message (0x2aa1372d2b0 length 0) 627s | 627s | XCBC: data 627s | 627s | K extracting all 16 bytes of key@0x2aa1372d0d0 627s | K: symkey-key@0x2aa1372d0d0 (16-bytes, AES_ECB) 627s | sizeof bytes 16 627s | wrapper: (SECItemType)1023: 7e f8 97 d8 f2 5e a1 bd ed 1f ed f5 72 f4 29 78 627s | K extracted len 16 bytes at 0x2aa1372cfc0 627s | unwrapped: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | XCBC: K: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | XCBC: K1 627s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978d00 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa137306c0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978cf8 627s | Computing E[0] using K3 627s | XCBC: K3 627s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 627s | XCBC: E[n-1] 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | XCBC: M[n] 627s | 627s | XCBC: M[n] 627s | 627s | XCBC: M[n]:80...^E[n-1]^K3 627s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 627s | XCBC: MAC 627s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 627s | PRF chunk interface PRF AES_XCBC final length 16 627s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 627s | chunk output 627s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 627s | verify_chunk_data: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: ok 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0979030 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 16-bytes 627s | base: base-key@0x2aa1372b6c0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0979028 627s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa1372d0d0 (size 16) 627s | PRF symkey interface: key symkey-key@0x2aa1372d0d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | XCBC: Key 16=16 just right 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa1372d0d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978ef8 627s | PRF symkey interface PRF AES_XCBC 0x2aa1372db50 627s | PRF symkey interface PRF AES_XCBC update symkey message-key@(nil) (size 0) 627s | PRF symkey interface: symkey message-key@NULL 627s | symkey message NULL key has no bytes 627s | XCBC: data 627s | 627s | K extracting all 16 bytes of key@0x2aa1372b6c0 627s | K: symkey-key@0x2aa1372b6c0 (16-bytes, AES_ECB) 627s | sizeof bytes 16 627s | wrapper: (SECItemType)1023: 7e f8 97 d8 f2 5e a1 bd ed 1f ed f5 72 f4 29 78 627s | K extracted len 16 bytes at 0x2aa1372eb40 627s | unwrapped: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | XCBC: K: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | XCBC: K1 627s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978d50 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa13731f50 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978d48 627s | Computing E[0] using K3 627s | XCBC: K3 627s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 627s | XCBC: E[n-1] 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | XCBC: M[n] 627s | 627s | XCBC: M[n] 627s | 627s | XCBC: M[n]:80...^E[n-1]^K3 627s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 627s | XCBC: MAC 627s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978ec8 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 16-bytes 627s | base: base-key@0x2aa13731f50 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978ec0 627s | PRF symkey interface PRF AES_XCBC final-key@0x2aa137306c0 (size 16) 627s | PRF symkey interface: key-key@0x2aa137306c0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | output: symkey-key@0x2aa137306c0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracting all 16 bytes of key@0x2aa137306c0 627s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: symkey-key@0x2aa137306c0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | sizeof bytes 16 627s | wrapper: (SECItemType)1023: f1 50 b1 61 c2 52 87 7e a7 2f ff eb 27 d1 a0 30 627s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracted len 16 bytes at 0x2aa1372db50 627s | unwrapped: 627s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 627s | verify_chunk_data: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: ok 627s | test_prf_vector: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input passed 627s algparse: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 627s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 627s | decode_to_chunk: output: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | decode_to_chunk: test_prf_vector: input "0x000102" 627s | decode_to_chunk: output: 627s | 00 01 02 ... 627s | decode_to_chunk: test_prf_vector: input "0x5b376580ae2f19afe7219ceef172756f" 627s | decode_to_chunk: output: 627s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 627s | PRF chunk interface PRF AES_XCBC init key-chunk@0x2aa1372d4c0 (length 16) 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978ed0 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 16-bytes 627s | base: base-key@0x2aa1372d0d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978ec8 627s | XCBC: Key 16=16 just right 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa137306c0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978e48 627s | PRF chunk interface PRF AES_XCBC 0x2aa1372db50 627s | PRF chunk interface PRF AES_XCBC update message (0x2aa1372e9e0 length 3) 627s | 00 01 02 ... 627s | XCBC: data 627s | 00 01 02 ... 627s | K extracting all 16 bytes of key@0x2aa1372d0d0 627s | K: symkey-key@0x2aa1372d0d0 (16-bytes, AES_ECB) 627s | sizeof bytes 16 627s | wrapper: (SECItemType)1023: 7e f8 97 d8 f2 5e a1 bd ed 1f ed f5 72 f4 29 78 627s | K extracted len 16 bytes at 0x2aa1372ee10 627s | unwrapped: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | XCBC: K: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | XCBC: K1 627s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978d00 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa1372b6c0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978cf8 627s | Computing E[1] using K3 627s | XCBC: K3 627s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 627s | XCBC: E[n-1] 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | XCBC: M[n] 627s | 00 01 02 ... 627s | XCBC: M[n] 627s | 00 01 02 ... 627s | XCBC: M[n]:80...^E[n-1]^K3 627s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 627s | XCBC: MAC 627s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 627s | PRF chunk interface PRF AES_XCBC final length 16 627s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 627s | chunk output 627s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 627s | verify_chunk_data: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: ok 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0979030 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 16-bytes 627s | base: base-key@0x2aa137306c0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0979028 627s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa1372d0d0 (size 16) 627s | PRF symkey interface: key symkey-key@0x2aa1372d0d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | XCBC: Key 16=16 just right 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa1372d0d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978ef8 627s | PRF symkey interface PRF AES_XCBC 0x2aa1372db50 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0979030 627s | key-offset: 0, key-size: 3 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 3-bytes 627s | base: base-key@0x2aa13731f50 (19-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0979028 627s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa1372b6c0 (size 3) 627s | PRF symkey interface: symkey message-key@0x2aa1372b6c0 (3-bytes, EXTRACT_KEY_FROM_KEY) 627s | symkey message extracting all 3 bytes of key@0x2aa1372b6c0 627s | symkey message: symkey-key@0x2aa1372b6c0 (3-bytes, EXTRACT_KEY_FROM_KEY) 627s | sizeof bytes 16 627s | wrapper: (SECItemType)682: e2 fc 84 bc 4b 09 3d 01 0d d6 0c 51 30 11 43 6d 627s | symkey message extracted len 16 bytes at 0x2aa1372ea00 627s | unwrapped: 627s | 00 01 02 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | XCBC: data 627s | 00 01 02 ... 627s | K extracting all 16 bytes of key@0x2aa137306c0 627s | K: symkey-key@0x2aa137306c0 (16-bytes, AES_ECB) 627s | sizeof bytes 16 627s | wrapper: (SECItemType)1023: 7e f8 97 d8 f2 5e a1 bd ed 1f ed f5 72 f4 29 78 627s | K extracted len 16 bytes at 0x2aa1372cfe0 627s | unwrapped: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | XCBC: K: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | XCBC: K1 627s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978d50 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa137337e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978d48 627s | Computing E[1] using K3 627s | XCBC: K3 627s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 627s | XCBC: E[n-1] 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | XCBC: M[n] 627s | 00 01 02 ... 627s | XCBC: M[n] 627s | 00 01 02 ... 627s | XCBC: M[n]:80...^E[n-1]^K3 627s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 627s | XCBC: MAC 627s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978ec8 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 16-bytes 627s | base: base-key@0x2aa137337e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978ec0 627s | PRF symkey interface PRF AES_XCBC final-key@0x2aa13731f50 (size 16) 627s | PRF symkey interface: key-key@0x2aa13731f50 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | output: symkey-key@0x2aa13731f50 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracting all 16 bytes of key@0x2aa13731f50 627s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: symkey-key@0x2aa13731f50 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | sizeof bytes 16 627s | wrapper: (SECItemType)1023: f7 57 93 ce 35 2e 28 6d 44 1e 5a d4 d5 66 4f 8a 627s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracted len 16 bytes at 0x2aa1372db50 627s | unwrapped: 627s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 627s | verify_chunk_data: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: ok 627s | test_prf_vector: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input passed 627s algparse: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 627s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 627s | decode_to_chunk: output: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 627s | decode_to_chunk: output: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | decode_to_chunk: test_prf_vector: input "0xd2a246fa349b68a79998a4394ff7a263" 627s | decode_to_chunk: output: 627s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 627s | PRF chunk interface PRF AES_XCBC init key-chunk@0x2aa1372d080 (length 16) 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978ed0 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 16-bytes 627s | base: base-key@0x2aa1372d0d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978ec8 627s | XCBC: Key 16=16 just right 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa13731f50 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978e48 627s | PRF chunk interface PRF AES_XCBC 0x2aa1372db50 627s | PRF chunk interface PRF AES_XCBC update message (0x2aa1372b6a0 length 16) 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | XCBC: data 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | K extracting all 16 bytes of key@0x2aa1372d0d0 627s | K: symkey-key@0x2aa1372d0d0 (16-bytes, AES_ECB) 627s | sizeof bytes 16 627s | wrapper: (SECItemType)1023: 7e f8 97 d8 f2 5e a1 bd ed 1f ed f5 72 f4 29 78 627s | K extracted len 16 bytes at 0x2aa1372d4c0 627s | unwrapped: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | XCBC: K: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | XCBC: K1 627s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978d00 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa1372b6c0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978cf8 627s | XCBC: Computing E[1] using K2 627s | XCBC: K2 627s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 627s | XCBC: E[n-1] 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | XCBC: M[n] 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | XCBC: M[n]^E[n-1]^K2 627s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 627s | XCBC: MAC 627s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 627s | PRF chunk interface PRF AES_XCBC final length 16 627s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 627s | chunk output 627s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 627s | verify_chunk_data: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: ok 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0979030 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 16-bytes 627s | base: base-key@0x2aa13731f50 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0979028 627s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa1372d0d0 (size 16) 627s | PRF symkey interface: key symkey-key@0x2aa1372d0d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | XCBC: Key 16=16 just right 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa1372d0d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978ef8 627s | PRF symkey interface PRF AES_XCBC 0x2aa1372db50 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0979030 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 16-bytes 627s | base: base-key@0x2aa137306c0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0979028 627s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa1372b6c0 (size 16) 627s | PRF symkey interface: symkey message-key@0x2aa1372b6c0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | symkey message extracting all 16 bytes of key@0x2aa1372b6c0 627s | symkey message: symkey-key@0x2aa1372b6c0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | sizeof bytes 16 627s | wrapper: (SECItemType)682: 7e f8 97 d8 f2 5e a1 bd ed 1f ed f5 72 f4 29 78 627s | symkey message extracted len 16 bytes at 0x2aa1372ee10 627s | unwrapped: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | XCBC: data 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | K extracting all 16 bytes of key@0x2aa13731f50 627s | K: symkey-key@0x2aa13731f50 (16-bytes, AES_ECB) 627s | sizeof bytes 16 627s | wrapper: (SECItemType)1023: 7e f8 97 d8 f2 5e a1 bd ed 1f ed f5 72 f4 29 78 627s | K extracted len 16 bytes at 0x2aa1372ee30 627s | unwrapped: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | XCBC: K: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | XCBC: K1 627s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978d50 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa137337e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978d48 627s | XCBC: Computing E[1] using K2 627s | XCBC: K2 627s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 627s | XCBC: E[n-1] 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | XCBC: M[n] 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | XCBC: M[n]^E[n-1]^K2 627s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 627s | XCBC: MAC 627s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978ec8 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 16-bytes 627s | base: base-key@0x2aa137337e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978ec0 627s | PRF symkey interface PRF AES_XCBC final-key@0x2aa137306c0 (size 16) 627s | PRF symkey interface: key-key@0x2aa137306c0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | output: symkey-key@0x2aa137306c0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracting all 16 bytes of key@0x2aa137306c0 627s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: symkey-key@0x2aa137306c0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | sizeof bytes 16 627s | wrapper: (SECItemType)1023: 60 1b 3d 9b 67 e6 2b d9 fe cd 6d 41 00 d4 50 cb 627s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracted len 16 bytes at 0x2aa1372db50 627s | unwrapped: 627s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 627s | verify_chunk_data: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: ok 627s | test_prf_vector: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input passed 627s algparse: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 627s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 627s | decode_to_chunk: output: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 627s | decode_to_chunk: output: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | 10 11 12 13 .... 627s | decode_to_chunk: test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 627s | decode_to_chunk: output: 627s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 627s | PRF chunk interface PRF AES_XCBC init key-chunk@0x2aa1372d2b0 (length 16) 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978ed0 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 16-bytes 627s | base: base-key@0x2aa1372d0d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978ec8 627s | XCBC: Key 16=16 just right 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa137306c0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978e48 627s | PRF chunk interface PRF AES_XCBC 0x2aa1372db50 627s | PRF chunk interface PRF AES_XCBC update message (0x2aa137128a0 length 20) 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | 10 11 12 13 .... 627s | XCBC: data 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | 10 11 12 13 .... 627s | K extracting all 16 bytes of key@0x2aa1372d0d0 627s | K: symkey-key@0x2aa1372d0d0 (16-bytes, AES_ECB) 627s | sizeof bytes 16 627s | wrapper: (SECItemType)1023: 7e f8 97 d8 f2 5e a1 bd ed 1f ed f5 72 f4 29 78 627s | K extracted len 16 bytes at 0x2aa1372eb40 627s | unwrapped: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | XCBC: K: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | XCBC: K1 627s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978d00 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa1372b6c0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978cf8 627s | Computing E[2] using K3 627s | XCBC: K3 627s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 627s | XCBC: E[n-1] 627s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 627s | XCBC: M[n] 627s | 10 11 12 13 .... 627s | XCBC: M[n] 627s | 10 11 12 13 .... 627s | XCBC: M[n]:80...^E[n-1]^K3 627s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 627s | XCBC: MAC 627s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 627s | PRF chunk interface PRF AES_XCBC final length 16 627s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 627s | chunk output 627s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 627s | verify_chunk_data: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: ok 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0979030 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 16-bytes 627s | base: base-key@0x2aa137306c0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0979028 627s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa1372d0d0 (size 16) 627s | PRF symkey interface: key symkey-key@0x2aa1372d0d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | XCBC: Key 16=16 just right 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa1372d0d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978ef8 627s | PRF symkey interface PRF AES_XCBC 0x2aa1372db50 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0979030 627s | key-offset: 0, key-size: 20 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 20-bytes 627s | base: base-key@0x2aa13731f50 (36-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0979028 627s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa1372b6c0 (size 20) 627s | PRF symkey interface: symkey message-key@0x2aa1372b6c0 (20-bytes, EXTRACT_KEY_FROM_KEY) 627s | symkey message extracting all 20 bytes of key@0x2aa1372b6c0 627s | symkey message: symkey-key@0x2aa1372b6c0 (20-bytes, EXTRACT_KEY_FROM_KEY) 627s | sizeof bytes 32 627s | wrapper: (SECItemType)682: 7e f8 97 d8 f2 5e a1 bd ed 1f ed f5 72 f4 29 78 25 94 01 8c 82 58 f3 e2 b8 20 5d 49 9c 58 20 09 627s | symkey message extracted len 32 bytes at 0x2aa1372eb40 627s | unwrapped: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | XCBC: data 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | 10 11 12 13 .... 627s | K extracting all 16 bytes of key@0x2aa137306c0 627s | K: symkey-key@0x2aa137306c0 (16-bytes, AES_ECB) 627s | sizeof bytes 16 627s | wrapper: (SECItemType)1023: 7e f8 97 d8 f2 5e a1 bd ed 1f ed f5 72 f4 29 78 627s | K extracted len 16 bytes at 0x2aa1372cfc0 627s | unwrapped: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | XCBC: K: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | XCBC: K1 627s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978d50 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa137337e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978d48 627s | Computing E[2] using K3 627s | XCBC: K3 627s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 627s | XCBC: E[n-1] 627s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 627s | XCBC: M[n] 627s | 10 11 12 13 .... 627s | XCBC: M[n] 627s | 10 11 12 13 .... 627s | XCBC: M[n]:80...^E[n-1]^K3 627s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 627s | XCBC: MAC 627s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978ec8 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 16-bytes 627s | base: base-key@0x2aa137337e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978ec0 627s | PRF symkey interface PRF AES_XCBC final-key@0x2aa13731f50 (size 16) 627s | PRF symkey interface: key-key@0x2aa13731f50 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | output: symkey-key@0x2aa13731f50 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracting all 16 bytes of key@0x2aa13731f50 627s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: symkey-key@0x2aa13731f50 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | sizeof bytes 16 627s | wrapper: (SECItemType)1023: 64 af 97 e9 1a 45 b2 9b b0 bb dc 41 de fe 74 c5 627s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracted len 16 bytes at 0x2aa1372db50 627s | unwrapped: 627s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 627s | verify_chunk_data: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: ok 627s | test_prf_vector: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input passed 627s algparse: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 627s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 627s | decode_to_chunk: output: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 627s | decode_to_chunk: output: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 627s | decode_to_chunk: test_prf_vector: input "0xf54f0ec8d2b9f3d36807734bd5283fd4" 627s | decode_to_chunk: output: 627s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 627s | PRF chunk interface PRF AES_XCBC init key-chunk@0x2aa1372d4c0 (length 16) 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978ed0 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 16-bytes 627s | base: base-key@0x2aa1372d0d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978ec8 627s | XCBC: Key 16=16 just right 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa13731f50 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978e48 627s | PRF chunk interface PRF AES_XCBC 0x2aa1372e750 627s | PRF chunk interface PRF AES_XCBC update message (0x2aa1372db50 length 32) 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 627s | XCBC: data 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 627s | K extracting all 16 bytes of key@0x2aa1372d0d0 627s | K: symkey-key@0x2aa1372d0d0 (16-bytes, AES_ECB) 627s | sizeof bytes 16 627s | wrapper: (SECItemType)1023: 7e f8 97 d8 f2 5e a1 bd ed 1f ed f5 72 f4 29 78 627s | K extracted len 16 bytes at 0x2aa1372cfc0 627s | unwrapped: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | XCBC: K: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | XCBC: K1 627s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978d00 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa1372b6c0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978cf8 627s | XCBC: Computing E[2] using K2 627s | XCBC: K2 627s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 627s | XCBC: E[n-1] 627s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 627s | XCBC: M[n] 627s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 627s | XCBC: M[n]^E[n-1]^K2 627s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 627s | XCBC: MAC 627s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 627s | PRF chunk interface PRF AES_XCBC final length 16 627s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 627s | chunk output 627s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 627s | verify_chunk_data: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: ok 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0979030 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 16-bytes 627s | base: base-key@0x2aa13731f50 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0979028 627s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa1372d0d0 (size 16) 627s | PRF symkey interface: key symkey-key@0x2aa1372d0d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | XCBC: Key 16=16 just right 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa1372d0d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978ef8 627s | PRF symkey interface PRF AES_XCBC 0x2aa1372e750 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0979030 627s | key-offset: 0, key-size: 32 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 32-bytes 627s | base: base-key@0x2aa137306c0 (48-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0979028 627s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa1372b6c0 (size 32) 627s | PRF symkey interface: symkey message-key@0x2aa1372b6c0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | symkey message extracting all 32 bytes of key@0x2aa1372b6c0 627s | symkey message: symkey-key@0x2aa1372b6c0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | sizeof bytes 32 627s | wrapper: (SECItemType)682: 7e f8 97 d8 f2 5e a1 bd ed 1f ed f5 72 f4 29 78 f0 ee 1a d8 21 b6 dd fb 57 0e d3 6e 2e 14 8f 76 627s | symkey message extracted len 32 bytes at 0x2aa1372eb70 627s | unwrapped: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 627s | XCBC: data 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 627s | K extracting all 16 bytes of key@0x2aa13731f50 627s | K: symkey-key@0x2aa13731f50 (16-bytes, AES_ECB) 627s | sizeof bytes 16 627s | wrapper: (SECItemType)1023: 7e f8 97 d8 f2 5e a1 bd ed 1f ed f5 72 f4 29 78 627s | K extracted len 16 bytes at 0x2aa1372d080 627s | unwrapped: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | XCBC: K: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | XCBC: K1 627s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978d50 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa137337e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978d48 627s | XCBC: Computing E[2] using K2 627s | XCBC: K2 627s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 627s | XCBC: E[n-1] 627s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 627s | XCBC: M[n] 627s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 627s | XCBC: M[n]^E[n-1]^K2 627s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 627s | XCBC: MAC 627s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978ec8 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 16-bytes 627s | base: base-key@0x2aa137337e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978ec0 627s | PRF symkey interface PRF AES_XCBC final-key@0x2aa137306c0 (size 16) 627s | PRF symkey interface: key-key@0x2aa137306c0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | output: symkey-key@0x2aa137306c0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracting all 16 bytes of key@0x2aa137306c0 627s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: symkey-key@0x2aa137306c0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | sizeof bytes 16 627s | wrapper: (SECItemType)1023: 89 0f 58 9d c9 9d 30 1b 16 29 bb 95 88 9f 48 de 627s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracted len 16 bytes at 0x2aa1372d2b0 627s | unwrapped: 627s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 627s | verify_chunk_data: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: ok 627s | test_prf_vector: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input passed 627s algparse: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 627s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 627s | decode_to_chunk: output: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f2021" 627s | decode_to_chunk: output: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 627s | 20 21 ! 627s | decode_to_chunk: test_prf_vector: input "0xbecbb3bccdb518a30677d5481fb6b4d8" 627s | decode_to_chunk: output: 627s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 627s | PRF chunk interface PRF AES_XCBC init key-chunk@0x2aa1372cfe0 (length 16) 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978ed0 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 16-bytes 627s | base: base-key@0x2aa1372d0d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978ec8 627s | XCBC: Key 16=16 just right 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa137306c0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978e48 627s | PRF chunk interface PRF AES_XCBC 0x2aa1372db50 627s | PRF chunk interface PRF AES_XCBC update message (0x2aa1372d050 length 34) 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 627s | 20 21 ! 627s | XCBC: data 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 627s | 20 21 ! 627s | K extracting all 16 bytes of key@0x2aa1372d0d0 627s | K: symkey-key@0x2aa1372d0d0 (16-bytes, AES_ECB) 627s | sizeof bytes 16 627s | wrapper: (SECItemType)1023: 7e f8 97 d8 f2 5e a1 bd ed 1f ed f5 72 f4 29 78 627s | K extracted len 16 bytes at 0x2aa1372d080 627s | unwrapped: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | XCBC: K: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | XCBC: K1 627s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978d00 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa1372b6c0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978cf8 627s | Computing E[3] using K3 627s | XCBC: K3 627s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 627s | XCBC: E[n-1] 627s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 627s | XCBC: M[n] 627s | 20 21 ! 627s | XCBC: M[n] 627s | 20 21 ! 627s | XCBC: M[n]:80...^E[n-1]^K3 627s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 627s | XCBC: MAC 627s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 627s | PRF chunk interface PRF AES_XCBC final length 16 627s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 627s | chunk output 627s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 627s | verify_chunk_data: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: ok 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0979030 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 16-bytes 627s | base: base-key@0x2aa137306c0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0979028 627s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa1372d0d0 (size 16) 627s | PRF symkey interface: key symkey-key@0x2aa1372d0d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | XCBC: Key 16=16 just right 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa1372d0d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978ef8 627s | PRF symkey interface PRF AES_XCBC 0x2aa1372db50 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0979030 627s | key-offset: 0, key-size: 34 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 34-bytes 627s | base: base-key@0x2aa13731f50 (50-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0979028 627s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa1372b6c0 (size 34) 627s | PRF symkey interface: symkey message-key@0x2aa1372b6c0 (34-bytes, EXTRACT_KEY_FROM_KEY) 627s | symkey message extracting all 34 bytes of key@0x2aa1372b6c0 627s | symkey message: symkey-key@0x2aa1372b6c0 (34-bytes, EXTRACT_KEY_FROM_KEY) 627s | sizeof bytes 48 627s | wrapper: (SECItemType)682: 7e f8 97 d8 f2 5e a1 bd ed 1f ed f5 72 f4 29 78 f0 ee 1a d8 21 b6 dd fb 57 0e d3 6e 2e 14 8f 76 77 ab 9f 66 92 b3 58 cc c2 1d e6 3a 23 29 e7 cf 627s | symkey message extracted len 48 bytes at 0x2aa1372ee10 627s | unwrapped: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 627s | 20 21 00 00 00 00 00 00 00 00 00 00 00 00 00 00 !.............. 627s | XCBC: data 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 627s | 20 21 ! 627s | K extracting all 16 bytes of key@0x2aa137306c0 627s | K: symkey-key@0x2aa137306c0 (16-bytes, AES_ECB) 627s | sizeof bytes 16 627s | wrapper: (SECItemType)1023: 7e f8 97 d8 f2 5e a1 bd ed 1f ed f5 72 f4 29 78 627s | K extracted len 16 bytes at 0x2aa1372d4c0 627s | unwrapped: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | XCBC: K: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | XCBC: K1 627s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978d50 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa137337e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978d48 627s | Computing E[3] using K3 627s | XCBC: K3 627s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 627s | XCBC: E[n-1] 627s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 627s | XCBC: M[n] 627s | 20 21 ! 627s | XCBC: M[n] 627s | 20 21 ! 627s | XCBC: M[n]:80...^E[n-1]^K3 627s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 627s | XCBC: MAC 627s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978ec8 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 16-bytes 627s | base: base-key@0x2aa137337e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978ec0 627s | PRF symkey interface PRF AES_XCBC final-key@0x2aa13731f50 (size 16) 627s | PRF symkey interface: key-key@0x2aa13731f50 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | output: symkey-key@0x2aa13731f50 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracting all 16 bytes of key@0x2aa13731f50 627s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: symkey-key@0x2aa13731f50 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | sizeof bytes 16 627s | wrapper: (SECItemType)1023: 6d 85 c6 b0 43 04 e3 ee 38 a7 f9 05 73 c3 4f 5b 627s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracted len 16 bytes at 0x2aa1372d2b0 627s | unwrapped: 627s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 627s | verify_chunk_data: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: ok 627s | test_prf_vector: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input passed 627s algparse: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 627s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 627s | decode_to_chunk: output: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | decode_to_chunk: test_prf_vector: input "0xf0dafee895db30253761103b5d84528f" 627s | decode_to_chunk: output: 627s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 627s | PRF chunk interface PRF AES_XCBC init key-chunk@0x2aa1372b6a0 (length 16) 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978ed0 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 16-bytes 627s | base: base-key@0x2aa1372d0d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978ec8 627s | XCBC: Key 16=16 just right 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa13731f50 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978e48 627s | PRF chunk interface PRF AES_XCBC 0x2aa1372eb70 627s | PRF chunk interface PRF AES_XCBC update message (0x2aa1372ba20 length 1000) 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 ........ 627s | XCBC: data 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 ........ 627s | K extracting all 16 bytes of key@0x2aa1372d0d0 627s | K: symkey-key@0x2aa1372d0d0 (16-bytes, AES_ECB) 627s | sizeof bytes 16 627s | wrapper: (SECItemType)1023: 7e f8 97 d8 f2 5e a1 bd ed 1f ed f5 72 f4 29 78 627s | K extracted len 16 bytes at 0x2aa1372d050 627s | unwrapped: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | XCBC: K: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | XCBC: K1 627s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978d00 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa1372b6c0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978cf8 627s | Computing E[63] using K3 627s | XCBC: K3 627s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 627s | XCBC: E[n-1] 627s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 627s | XCBC: M[n] 627s | 00 00 00 00 00 00 00 00 ........ 627s | XCBC: M[n] 627s | 00 00 00 00 00 00 00 00 ........ 627s | XCBC: M[n]:80...^E[n-1]^K3 627s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 627s | XCBC: MAC 627s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 627s | PRF chunk interface PRF AES_XCBC final length 16 627s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 627s | chunk output 627s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 627s | verify_chunk_data: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: ok 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0979030 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 16-bytes 627s | base: base-key@0x2aa13731f50 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0979028 627s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa1372d0d0 (size 16) 627s | PRF symkey interface: key symkey-key@0x2aa1372d0d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | XCBC: Key 16=16 just right 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa1372d0d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978ef8 627s | PRF symkey interface PRF AES_XCBC 0x2aa1372eb70 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0979030 627s | key-offset: 0, key-size: 1000 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 1000-bytes 627s | base: base-key@0x2aa137306c0 (1016-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0979028 627s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa1372b6c0 (size 1000) 627s | PRF symkey interface: symkey message-key@0x2aa1372b6c0 (1000-bytes, EXTRACT_KEY_FROM_KEY) 627s | symkey message extracting all 1000 bytes of key@0x2aa1372b6c0 627s | symkey message: symkey-key@0x2aa1372b6c0 (1000-bytes, EXTRACT_KEY_FROM_KEY) 627s | sizeof bytes 1008 627s | wrapper: (SECItemType)682: 9a 81 56 23 1d b2 a3 4f fb 39 b4 ab 80 2d 58 8b 9a 81 56 23 1d b2 a3 4f fb 39 b4 ab 80 2d 58 8b 9a 81 56 23 1d b2 a3 4f fb 39 b4 ab 80 2d 58 8b 9a 81 56 23 1d b2 a3 4f fb 39 b4 ab 80 2d 58 8b 9a 81 56 23 1d b2 a3 4f fb 39 b4 ab 80 2d 58 8b 9a 81 56 23 1d b2 a3 4f fb 39 b4 ab 80 2d 58 8b 9a 81 56 23 1d b2 a3 4f fb 39 b4 ab 80 2d 58 8b 9a 81 56 23 1d b2 a3 4f fb 39 b4 ab 80 2d 58 8b 9a 81 56 23 1d b2 a3 4f fb 39 b4 ab 80 2d 58 8b 9a 81 56 23 1d b2 a3 4f fb 39 b4 ab 80 2d 58 8b 9a 81 56 23 1d b2 a3 4f fb 39 b4 ab 80 2d 58 8b 9a 81 56 23 1d b2 a3 4f fb 39 b4 ab 80 2d 58 8b 9a 81 56 23 1d b2 a3 4f fb 39 b4 ab 80 2d 58 8b 9a 81 56 23 1d b2 a3 4f fb 39 b4 ab 80 2d 58 8b 9a 81 56 23 1d b2 a3 4f fb 39 b4 ab 80 2d 58 8b 9a 81 56 23 1d b2 a3 4f fb 39 b4 ab 80 2d 58 8b 9a 81 56 23 1d b2 a3 4f fb 39 b4 ab 80 2d 58 8b 9a 81 56 23 1d b2 a3 4f fb 39 b4 ab 80 2d 58 8b 9a 81 56 23 1d b2 a3 4f fb 39 b4 ab 80 2d 58 8b 9a 8... 627s | symkey message extracted len 1008 bytes at 0x2aa13735ef0 627s | unwrapped: 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | XCBC: data 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | 00 00 00 00 00 00 00 00 ........ 627s | K extracting all 16 bytes of key@0x2aa13731f50 627s | K: symkey-key@0x2aa13731f50 (16-bytes, AES_ECB) 627s | sizeof bytes 16 627s | wrapper: (SECItemType)1023: 7e f8 97 d8 f2 5e a1 bd ed 1f ed f5 72 f4 29 78 627s | K extracted len 16 bytes at 0x2aa1372d050 627s | unwrapped: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | XCBC: K: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | XCBC: K1 627s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978d50 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa137337e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978d48 627s | Computing E[63] using K3 627s | XCBC: K3 627s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 627s | XCBC: E[n-1] 627s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 627s | XCBC: M[n] 627s | 00 00 00 00 00 00 00 00 ........ 627s | XCBC: M[n] 627s | 00 00 00 00 00 00 00 00 ........ 627s | XCBC: M[n]:80...^E[n-1]^K3 627s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 627s | XCBC: MAC 627s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978ec8 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 16-bytes 627s | base: base-key@0x2aa137337e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978ec0 627s | PRF symkey interface PRF AES_XCBC final-key@0x2aa137306c0 (size 16) 627s | PRF symkey interface: key-key@0x2aa137306c0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | output: symkey-key@0x2aa137306c0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracting all 16 bytes of key@0x2aa137306c0 627s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: symkey-key@0x2aa137306c0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | sizeof bytes 16 627s | wrapper: (SECItemType)1023: 03 84 76 51 d6 e9 52 45 d8 18 49 92 45 d7 45 8f 627s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracted len 16 bytes at 0x2aa1372d050 627s | unwrapped: 627s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 627s | verify_chunk_data: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: ok 627s | test_prf_vector: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input passed 627s algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 627s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 627s | decode_to_chunk: output: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 627s | decode_to_chunk: output: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | 10 11 12 13 .... 627s | decode_to_chunk: test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 627s | decode_to_chunk: output: 627s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 627s | PRF chunk interface PRF AES_XCBC init key-chunk@0x2aa1372d080 (length 16) 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978ed0 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 16-bytes 627s | base: base-key@0x2aa1372d0d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978ec8 627s | XCBC: Key 16=16 just right 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa137306c0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978e48 627s | PRF chunk interface PRF AES_XCBC 0x2aa1372eb70 627s | PRF chunk interface PRF AES_XCBC update message (0x2aa1372d9a0 length 20) 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | 10 11 12 13 .... 627s | XCBC: data 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | 10 11 12 13 .... 627s | K extracting all 16 bytes of key@0x2aa1372d0d0 627s | K: symkey-key@0x2aa1372d0d0 (16-bytes, AES_ECB) 627s | sizeof bytes 16 627s | wrapper: (SECItemType)1023: 7e f8 97 d8 f2 5e a1 bd ed 1f ed f5 72 f4 29 78 627s | K extracted len 16 bytes at 0x2aa1372d050 627s | unwrapped: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | XCBC: K: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | XCBC: K1 627s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978d00 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa1372b6c0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978cf8 627s | Computing E[2] using K3 627s | XCBC: K3 627s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 627s | XCBC: E[n-1] 627s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 627s | XCBC: M[n] 627s | 10 11 12 13 .... 627s | XCBC: M[n] 627s | 10 11 12 13 .... 627s | XCBC: M[n]:80...^E[n-1]^K3 627s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 627s | XCBC: MAC 627s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 627s | PRF chunk interface PRF AES_XCBC final length 16 627s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 627s | chunk output 627s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 627s | verify_chunk_data: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): ok 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0979030 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 16-bytes 627s | base: base-key@0x2aa137306c0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0979028 627s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa1372d0d0 (size 16) 627s | PRF symkey interface: key symkey-key@0x2aa1372d0d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | XCBC: Key 16=16 just right 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa1372d0d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978ef8 627s | PRF symkey interface PRF AES_XCBC 0x2aa1372eb70 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0979030 627s | key-offset: 0, key-size: 20 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 20-bytes 627s | base: base-key@0x2aa13731f50 (36-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0979028 627s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa1372b6c0 (size 20) 627s | PRF symkey interface: symkey message-key@0x2aa1372b6c0 (20-bytes, EXTRACT_KEY_FROM_KEY) 627s | symkey message extracting all 20 bytes of key@0x2aa1372b6c0 627s | symkey message: symkey-key@0x2aa1372b6c0 (20-bytes, EXTRACT_KEY_FROM_KEY) 627s | sizeof bytes 32 627s | wrapper: (SECItemType)682: 7e f8 97 d8 f2 5e a1 bd ed 1f ed f5 72 f4 29 78 25 94 01 8c 82 58 f3 e2 b8 20 5d 49 9c 58 20 09 627s | symkey message extracted len 32 bytes at 0x2aa1372cea0 627s | unwrapped: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | XCBC: data 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | 10 11 12 13 .... 627s | K extracting all 16 bytes of key@0x2aa137306c0 627s | K: symkey-key@0x2aa137306c0 (16-bytes, AES_ECB) 627s | sizeof bytes 16 627s | wrapper: (SECItemType)1023: 7e f8 97 d8 f2 5e a1 bd ed 1f ed f5 72 f4 29 78 627s | K extracted len 16 bytes at 0x2aa1372d050 627s | unwrapped: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | XCBC: K: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | XCBC: K1 627s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978d50 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa137337e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978d48 627s | Computing E[2] using K3 627s | XCBC: K3 627s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 627s | XCBC: E[n-1] 627s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 627s | XCBC: M[n] 627s | 10 11 12 13 .... 627s | XCBC: M[n] 627s | 10 11 12 13 .... 627s | XCBC: M[n]:80...^E[n-1]^K3 627s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 627s | XCBC: MAC 627s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978ec8 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 16-bytes 627s | base: base-key@0x2aa137337e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978ec0 627s | PRF symkey interface PRF AES_XCBC final-key@0x2aa13731f50 (size 16) 627s | PRF symkey interface: key-key@0x2aa13731f50 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | output: symkey-key@0x2aa13731f50 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracting all 16 bytes of key@0x2aa13731f50 627s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): symkey-key@0x2aa13731f50 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | sizeof bytes 16 627s | wrapper: (SECItemType)1023: 64 af 97 e9 1a 45 b2 9b b0 bb dc 41 de fe 74 c5 627s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracted len 16 bytes at 0x2aa1372d050 627s | unwrapped: 627s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 627s | verify_chunk_data: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): ok 627s | test_prf_vector: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) passed 627s algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 627s | decode_to_chunk: test_prf_vector: input "0x00010203040506070809" 627s | decode_to_chunk: output: 627s | 00 01 02 03 04 05 06 07 08 09 .......... 627s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 627s | decode_to_chunk: output: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | 10 11 12 13 .... 627s | decode_to_chunk: test_prf_vector: input "0x0fa087af7d866e7653434e602fdde835" 627s | decode_to_chunk: output: 627s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 627s | PRF chunk interface PRF AES_XCBC init key-chunk@0x2aa1372b6a0 (length 10) 627s | 00 01 02 03 04 05 06 07 08 09 .......... 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978ed0 627s | key-offset: 0, key-size: 10 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 10-bytes 627s | base: base-key@0x2aa1372d0d0 (26-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978ec8 627s | XCBC: Key 10<16 too small, padding with zeros 627s | CONCATENATE_BASE_AND_DATA: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13731f50 (10-bytes, EXTRACT_KEY_FROM_KEY) 627s | params: 16-bytes@0x3fff0978da0 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa1372d0d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978e48 627s | PRF chunk interface PRF AES_XCBC 0x2aa1372eb70 627s | PRF chunk interface PRF AES_XCBC update message (0x2aa1372d4e0 length 20) 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | 10 11 12 13 .... 627s | XCBC: data 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | 10 11 12 13 .... 627s | K extracting all 16 bytes of key@0x2aa1372b6c0 627s | K: symkey-key@0x2aa1372b6c0 (16-bytes, AES_ECB) 627s | sizeof bytes 16 627s | wrapper: (SECItemType)1023: 16 41 44 6e 11 8d ad db 5c 3c 18 77 44 7c 36 b2 627s | K extracted len 16 bytes at 0x2aa1372d9a0 627s | unwrapped: 627s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 627s | XCBC: K: 627s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 627s | XCBC: K1 627s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978d00 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa1372d0d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978cf8 627s | Computing E[2] using K3 627s | XCBC: K3 627s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 627s | XCBC: E[n-1] 627s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 627s | XCBC: M[n] 627s | 10 11 12 13 .... 627s | XCBC: M[n] 627s | 10 11 12 13 .... 627s | XCBC: M[n]:80...^E[n-1]^K3 627s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 627s | XCBC: MAC 627s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 627s | PRF chunk interface PRF AES_XCBC final length 16 627s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 627s | chunk output 627s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 627s | verify_chunk_data: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): ok 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0979030 627s | key-offset: 0, key-size: 10 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 10-bytes 627s | base: base-key@0x2aa13731f50 (26-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0979028 627s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa1372b6c0 (size 10) 627s | PRF symkey interface: key symkey-key@0x2aa1372b6c0 (10-bytes, EXTRACT_KEY_FROM_KEY) 627s | XCBC: Key 10<16 too small, padding with zeros 627s | CONCATENATE_BASE_AND_DATA: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa1372b6c0 (10-bytes, EXTRACT_KEY_FROM_KEY) 627s | params: 16-bytes@0x3fff0978e50 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa13731f50 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978ef8 627s | PRF symkey interface PRF AES_XCBC 0x2aa1372eb70 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0979030 627s | key-offset: 0, key-size: 20 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 20-bytes 627s | base: base-key@0x2aa137306c0 (36-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0979028 627s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa13731f50 (size 20) 627s | PRF symkey interface: symkey message-key@0x2aa13731f50 (20-bytes, EXTRACT_KEY_FROM_KEY) 627s | symkey message extracting all 20 bytes of key@0x2aa13731f50 627s | symkey message: symkey-key@0x2aa13731f50 (20-bytes, EXTRACT_KEY_FROM_KEY) 627s | sizeof bytes 32 627s | wrapper: (SECItemType)682: 7e f8 97 d8 f2 5e a1 bd ed 1f ed f5 72 f4 29 78 25 94 01 8c 82 58 f3 e2 b8 20 5d 49 9c 58 20 09 627s | symkey message extracted len 32 bytes at 0x2aa1372cea0 627s | unwrapped: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | XCBC: data 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | 10 11 12 13 .... 627s | K extracting all 16 bytes of key@0x2aa1372d0d0 627s | K: symkey-key@0x2aa1372d0d0 (16-bytes, AES_ECB) 627s | sizeof bytes 16 627s | wrapper: (SECItemType)1023: 16 41 44 6e 11 8d ad db 5c 3c 18 77 44 7c 36 b2 627s | K extracted len 16 bytes at 0x2aa1372d050 627s | unwrapped: 627s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 627s | XCBC: K: 627s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 627s | XCBC: K1 627s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978d50 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa137337e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978d48 627s | Computing E[2] using K3 627s | XCBC: K3 627s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 627s | XCBC: E[n-1] 627s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 627s | XCBC: M[n] 627s | 10 11 12 13 .... 627s | XCBC: M[n] 627s | 10 11 12 13 .... 627s | XCBC: M[n]:80...^E[n-1]^K3 627s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 627s | XCBC: MAC 627s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978ec8 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 16-bytes 627s | base: base-key@0x2aa137337e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978ec0 627s | PRF symkey interface PRF AES_XCBC final-key@0x2aa137306c0 (size 16) 627s | PRF symkey interface: key-key@0x2aa137306c0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | output: symkey-key@0x2aa137306c0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracting all 16 bytes of key@0x2aa137306c0 627s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): symkey-key@0x2aa137306c0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | sizeof bytes 16 627s | wrapper: (SECItemType)1023: 88 cf ed 4a 5f aa d4 9d 5a a8 6c de 29 59 25 74 627s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracted len 16 bytes at 0x2aa1372d070 627s | unwrapped: 627s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 627s | verify_chunk_data: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): ok 627s | test_prf_vector: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) passed 627s algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 627s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0fedcb" 627s | decode_to_chunk: output: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | ed cb .. 627s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 627s | decode_to_chunk: output: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | 10 11 12 13 .... 627s | decode_to_chunk: test_prf_vector: input "0x8cd3c93ae598a9803006ffb67c40e9e4" 627s | decode_to_chunk: output: 627s | 8c d3 c9 3a e5 98 a9 80 30 06 ff b6 7c 40 e9 e4 ...:....0...|@.. 627s | PRF chunk interface PRF AES_XCBC init key-chunk@0x2aa1372e9e0 (length 18) 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | ed cb .. 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978ed0 627s | key-offset: 0, key-size: 18 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 18-bytes 627s | base: base-key@0x2aa1372b6c0 (34-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978ec8 627s | XCBC: Key 18>16 too big, rehashing to size 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978d78 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa13731f50 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978d70 627s | draft_chunk extracting all 18 bytes of key@0x2aa137306c0 627s | draft_chunk: symkey-key@0x2aa137306c0 (18-bytes, EXTRACT_KEY_FROM_KEY) 627s | sizeof bytes 32 627s | wrapper: siBuffer: 7e f8 97 d8 f2 5e a1 bd ed 1f ed f5 72 f4 29 78 e2 8a a3 6d dc ea 58 09 fa 42 d5 71 32 b3 ee 70 627s | draft_chunk extracted len 32 bytes at 0x2aa1372d070 627s | unwrapped: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | XCBC: data 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | ed cb .. 627s | K extracting all 16 bytes of key@0x2aa1372b6c0 627s | K: symkey-key@0x2aa1372b6c0 (16-bytes, AES_ECB) 627s | sizeof bytes 16 627s | wrapper: (SECItemType)1023: 9a 81 56 23 1d b2 a3 4f fb 39 b4 ab 80 2d 58 8b 627s | K extracted len 16 bytes at 0x2aa1372eb70 627s | unwrapped: 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | XCBC: K: 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | XCBC: K1 627s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978c10 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa1372d0d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978c08 627s | Computing E[2] using K3 627s | XCBC: K3 627s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 627s | XCBC: E[n-1] 627s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 627s | XCBC: M[n] 627s | ed cb .. 627s | XCBC: M[n] 627s | ed cb .. 627s | XCBC: M[n]:80...^E[n-1]^K3 627s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.16 too big, rehashing to size 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978e28 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa1372b6c0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978e20 627s | draft_chunk extracting all 18 bytes of key@0x2aa13731f50 627s | draft_chunk: symkey-key@0x2aa13731f50 (18-bytes, EXTRACT_KEY_FROM_KEY) 627s | sizeof bytes 32 627s | wrapper: siBuffer: 7e f8 97 d8 f2 5e a1 bd ed 1f ed f5 72 f4 29 78 e2 8a a3 6d dc ea 58 09 fa 42 d5 71 32 b3 ee 70 627s | draft_chunk extracted len 32 bytes at 0x2aa1372eb70 627s | unwrapped: 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | XCBC: data 627s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 627s | ed cb .. 627s | K extracting all 16 bytes of key@0x2aa137306c0 627s | K: symkey-key@0x2aa137306c0 (16-bytes, AES_ECB) 627s | sizeof bytes 16 627s | wrapper: (SECItemType)1023: 9a 81 56 23 1d b2 a3 4f fb 39 b4 ab 80 2d 58 8b 627s | K extracted len 16 bytes at 0x2aa1372d4c0 627s | unwrapped: 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | XCBC: K: 627s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 627s | XCBC: K1 627s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978cc0 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: AES_ECB 627s | flags: SIGN 627s | key_size: 16-bytes 627s | base: base-key@0x2aa1372d0d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978cb8 627s | Computing E[2] using K3 627s | XCBC: K3 627s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 627s | XCBC: E[n-1] 627s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 627s | XCBC: M[n] 627s | ed cb .. 627s | XCBC: M[n] 627s | ed cb .. 627s | XCBC: M[n]:80...^E[n-1]^K3 627s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.j.....n1.].8 627s | PRF chunk interface PRF HMAC_MD5 init key-chunk@0x2aa1372ea00 (length 4) 627s | 4a 65 66 65 Jefe 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978eb0 627s | key-offset: 0, key-size: 4 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 4-bytes 627s | base: base-key@0x2aa1372b6c0 (20-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978ea8 627s | CONCATENATE_BASE_AND_DATA: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13731f50 (4-bytes, EXTRACT_KEY_FROM_KEY) 627s | params: 16-bytes@0x3fff0978d90 627s | XOR_BASE_AND_DATA: 627s | target: CONCATENATE_BASE_AND_DATA 627s | base: base-key@0x2aa1372b6c0 (64-bytes, EXTRACT_KEY_FROM_KEY) 627s | params: 16-bytes@0x3fff0978e40 627s | PRF chunk interface PRF HMAC_MD5 0x2aa1372cf40 627s | PRF chunk interface PRF HMAC_MD5 update message (0x2aa1372eb70 length 28) 627s | 77 68 61 74 20 64 6f 20 79 61 20 77 61 6e 74 20 what do ya want 627s | 66 6f 72 20 6e 6f 74 68 69 6e 67 3f for nothing? 627s | CONCATENATE_BASE_AND_DATA: 627s | target: CONCATENATE_BASE_AND_DATA 627s | base: base-key@0x2aa13731f50 (64-bytes, CONCATENATE_BASE_AND_DATA) 627s | params: 16-bytes@0x3fff0978fa8 627s | PRF HMAC inner hash hash MD5 inner-key@0x2aa137306c0 (size 92) 627s | PRF HMAC inner hash hash MD5 init 627s | PRF HMAC inner hash hash MD5 digest inner-key@0x2aa137306c0 (size 92) 627s | PRF HMAC inner hash: inner-key@0x2aa137306c0 (92-bytes, CONCATENATE_BASE_AND_DATA) 627s | PRF HMAC inner hash hash MD5 final length 16 627s | c3 db 14 c0 65 f5 52 03 b0 33 c8 1a 69 7b 97 c5 ....e.R..3..i{.. 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978c38 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 16-bytes 627s | base: base-key@0x2aa13737840 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978c30 627s | XOR_BASE_AND_DATA: 627s | target: CONCATENATE_BASE_AND_DATA 627s | base: base-key@0x2aa1372b6c0 (64-bytes, EXTRACT_KEY_FROM_KEY) 627s | params: 16-bytes@0x3fff0978e08 627s | CONCATENATE_BASE_AND_KEY: 627s | target: CONCATENATE_BASE_AND_DATA 627s | base: base-key@0x2aa137306c0 (64-bytes, CONCATENATE_BASE_AND_DATA) 627s | params: 8-bytes@0x3fff0978e10 627s | PRF HMAC outer hash hash MD5 init 627s | PRF HMAC outer hash hash MD5 digest outer-key@0x2aa13737840 (size 80) 627s | PRF HMAC outer hash: outer-key@0x2aa13737840 (80-bytes, CONCATENATE_BASE_AND_DATA) 627s | PRF HMAC outer hash hash MD5 final bytes@0x3fff09790e0 (length 16) 627s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 627s | PRF chunk interface PRF HMAC_MD5 final length 16 627s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 627s | chunk output 627s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 627s | verify_chunk_data: RFC 2104: MD5_HMAC test 2: ok 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0979030 627s | key-offset: 0, key-size: 4 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 4-bytes 627s | base: base-key@0x2aa1372b6c0 (20-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0979028 627s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0x2aa13737840 (size 4) 627s | PRF symkey interface: key symkey-key@0x2aa13737840 (4-bytes, EXTRACT_KEY_FROM_KEY) 627s | CONCATENATE_BASE_AND_DATA: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13737840 (4-bytes, EXTRACT_KEY_FROM_KEY) 627s | params: 16-bytes@0x3fff0978d90 627s | XOR_BASE_AND_DATA: 627s | target: CONCATENATE_BASE_AND_DATA 627s | base: base-key@0x2aa1372b6c0 (64-bytes, EXTRACT_KEY_FROM_KEY) 627s | params: 16-bytes@0x3fff0978e40 627s | PRF symkey interface PRF HMAC_MD5 0x2aa1372cf40 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0979030 627s | key-offset: 0, key-size: 28 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 28-bytes 627s | base: base-key@0x2aa1372d0d0 (44-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0979028 627s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0x2aa137306c0 (size 28) 627s | PRF symkey interface: symkey message-key@0x2aa137306c0 (28-bytes, EXTRACT_KEY_FROM_KEY) 627s | CONCATENATE_BASE_AND_KEY: 627s | target: CONCATENATE_BASE_AND_DATA 627s | base: base-key@0x2aa13731f50 (64-bytes, CONCATENATE_BASE_AND_DATA) 627s | params: 8-bytes@0x3fff0979100 627s | PRF HMAC inner hash hash MD5 inner-key@0x2aa1372d0d0 (size 92) 627s | PRF HMAC inner hash hash MD5 init 627s | PRF HMAC inner hash hash MD5 digest inner-key@0x2aa1372d0d0 (size 92) 627s | PRF HMAC inner hash: inner-key@0x2aa1372d0d0 (92-bytes, CONCATENATE_BASE_AND_DATA) 627s | PRF HMAC inner hash hash MD5 final length 16 627s | c3 db 14 c0 65 f5 52 03 b0 33 c8 1a 69 7b 97 c5 ....e.R..3..i{.. 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978c90 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 16-bytes 627s | base: base-key@0x2aa137337e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978c88 627s | XOR_BASE_AND_DATA: 627s | target: CONCATENATE_BASE_AND_DATA 627s | base: base-key@0x2aa1372b6c0 (64-bytes, EXTRACT_KEY_FROM_KEY) 627s | params: 16-bytes@0x3fff0978e60 627s | CONCATENATE_BASE_AND_KEY: 627s | target: CONCATENATE_BASE_AND_DATA 627s | base: base-key@0x2aa1372d0d0 (64-bytes, CONCATENATE_BASE_AND_DATA) 627s | params: 8-bytes@0x3fff0978e68 627s | PRF HMAC outer hash hash MD5 outer-key@0x2aa137337e0 (size 80) 627s | PRF HMAC outer hash hash MD5 init 627s | PRF HMAC outer hash hash MD5 digest outer-key@0x2aa137337e0 (size 80) 627s | PRF HMAC outer hash: outer-key@0x2aa137337e0 (80-bytes, CONCATENATE_BASE_AND_DATA) 627s | PRF HMAC outer hash hash MD5 final length 16 627s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978dd8 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 16-bytes 627s | base: base-key@0x2aa13731f50 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978dd0 627s | : hashed-outer-key@0x2aa1372b6c0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | PRF symkey interface PRF HMAC_MD5 final-key@0x2aa1372b6c0 (size 16) 627s | PRF symkey interface: key-key@0x2aa1372b6c0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | output: symkey-key@0x2aa1372b6c0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | RFC 2104: MD5_HMAC test 2 extracting all 16 bytes of key@0x2aa1372b6c0 627s | RFC 2104: MD5_HMAC test 2: symkey-key@0x2aa1372b6c0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | sizeof bytes 16 627s | wrapper: (SECItemType)1023: f2 e9 f2 12 69 20 f6 84 6f 28 78 31 35 03 61 5e 627s | RFC 2104: MD5_HMAC test 2 extracted len 16 bytes at 0x2aa1372cf40 627s | unwrapped: 627s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 627s | verify_chunk_data: RFC 2104: MD5_HMAC test 2: ok 627s | test_prf_vector: RFC 2104: MD5_HMAC test 2 passed 627s algparse: RFC 2104: MD5_HMAC test 3 627s | decode_to_chunk: test_prf_vector: input "0xAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" 627s | decode_to_chunk: output: 627s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 627s | decode_to_chunk: test_prf_vector: input "0xDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD" 627s | decode_to_chunk: output: 627s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 627s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 627s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 627s | dd dd .. 627s | decode_to_chunk: test_prf_vector: input "0x56be34521d144c88dbb8c733f0e8b3f6" 627s | decode_to_chunk: output: 627s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 627s | PRF chunk interface PRF HMAC_MD5 init key-chunk@0x2aa1372e770 (length 16) 627s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978eb0 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 16-bytes 627s | base: base-key@0x2aa13737840 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978ea8 627s | CONCATENATE_BASE_AND_DATA: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa1372b6c0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | params: 16-bytes@0x3fff0978d90 627s | XOR_BASE_AND_DATA: 627s | target: CONCATENATE_BASE_AND_DATA 627s | base: base-key@0x2aa13737840 (64-bytes, EXTRACT_KEY_FROM_KEY) 627s | params: 16-bytes@0x3fff0978e40 627s | PRF chunk interface PRF HMAC_MD5 0x2aa1372eb70 627s | PRF chunk interface PRF HMAC_MD5 update message (0x2aa1372d4c0 length 50) 627s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 627s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 627s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 627s | dd dd .. 627s | CONCATENATE_BASE_AND_DATA: 627s | target: CONCATENATE_BASE_AND_DATA 627s | base: base-key@0x2aa1372b6c0 (64-bytes, CONCATENATE_BASE_AND_DATA) 627s | params: 16-bytes@0x3fff0978fa8 627s | PRF HMAC inner hash hash MD5 inner-key@0x2aa137306c0 (size 114) 627s | PRF HMAC inner hash hash MD5 init 627s | PRF HMAC inner hash hash MD5 digest inner-key@0x2aa137306c0 (size 114) 627s | PRF HMAC inner hash: inner-key@0x2aa137306c0 (114-bytes, CONCATENATE_BASE_AND_DATA) 627s | PRF HMAC inner hash hash MD5 final length 16 627s | 82 0a 6b 33 5d 18 7b 90 dc ba b1 7e f5 b4 26 ff ..k3].{....~..&. 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978c38 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 16-bytes 627s | base: base-key@0x2aa137337e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978c30 627s | XOR_BASE_AND_DATA: 627s | target: CONCATENATE_BASE_AND_DATA 627s | base: base-key@0x2aa13737840 (64-bytes, EXTRACT_KEY_FROM_KEY) 627s | params: 16-bytes@0x3fff0978e08 627s | CONCATENATE_BASE_AND_KEY: 627s | target: CONCATENATE_BASE_AND_DATA 627s | base: base-key@0x2aa137306c0 (64-bytes, CONCATENATE_BASE_AND_DATA) 627s | params: 8-bytes@0x3fff0978e10 627s | PRF HMAC outer hash hash MD5 init 627s | PRF HMAC outer hash hash MD5 digest outer-key@0x2aa137337e0 (size 80) 627s | PRF HMAC outer hash: outer-key@0x2aa137337e0 (80-bytes, CONCATENATE_BASE_AND_DATA) 627s | PRF HMAC outer hash hash MD5 final bytes@0x3fff09790e0 (length 16) 627s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 627s | PRF chunk interface PRF HMAC_MD5 final length 16 627s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 627s | chunk output 627s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 627s | verify_chunk_data: RFC 2104: MD5_HMAC test 3: ok 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0979030 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 16-bytes 627s | base: base-key@0x2aa13737840 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0979028 627s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0x2aa137337e0 (size 16) 627s | PRF symkey interface: key symkey-key@0x2aa137337e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | CONCATENATE_BASE_AND_DATA: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa137337e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | params: 16-bytes@0x3fff0978d90 627s | XOR_BASE_AND_DATA: 627s | target: CONCATENATE_BASE_AND_DATA 627s | base: base-key@0x2aa13737840 (64-bytes, EXTRACT_KEY_FROM_KEY) 627s | params: 16-bytes@0x3fff0978e40 627s | PRF symkey interface PRF HMAC_MD5 0x2aa1372eb70 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0979030 627s | key-offset: 0, key-size: 50 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 50-bytes 627s | base: base-key@0x2aa13731f50 (66-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0979028 627s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0x2aa137306c0 (size 50) 627s | PRF symkey interface: symkey message-key@0x2aa137306c0 (50-bytes, EXTRACT_KEY_FROM_KEY) 627s | CONCATENATE_BASE_AND_KEY: 627s | target: CONCATENATE_BASE_AND_DATA 627s | base: base-key@0x2aa1372b6c0 (64-bytes, CONCATENATE_BASE_AND_DATA) 627s | params: 8-bytes@0x3fff0979100 627s | PRF HMAC inner hash hash MD5 inner-key@0x2aa13731f50 (size 114) 627s | PRF HMAC inner hash hash MD5 init 627s | PRF HMAC inner hash hash MD5 digest inner-key@0x2aa13731f50 (size 114) 627s | PRF HMAC inner hash: inner-key@0x2aa13731f50 (114-bytes, CONCATENATE_BASE_AND_DATA) 627s | PRF HMAC inner hash hash MD5 final length 16 627s | 82 0a 6b 33 5d 18 7b 90 dc ba b1 7e f5 b4 26 ff ..k3].{....~..&. 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978c90 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 16-bytes 627s | base: base-key@0x2aa1372d0d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978c88 627s | XOR_BASE_AND_DATA: 627s | target: CONCATENATE_BASE_AND_DATA 627s | base: base-key@0x2aa13737840 (64-bytes, EXTRACT_KEY_FROM_KEY) 627s | params: 16-bytes@0x3fff0978e60 627s | CONCATENATE_BASE_AND_KEY: 627s | target: CONCATENATE_BASE_AND_DATA 627s | base: base-key@0x2aa13731f50 (64-bytes, CONCATENATE_BASE_AND_DATA) 627s | params: 8-bytes@0x3fff0978e68 627s | PRF HMAC outer hash hash MD5 outer-key@0x2aa1372d0d0 (size 80) 627s | PRF HMAC outer hash hash MD5 init 627s | PRF HMAC outer hash hash MD5 digest outer-key@0x2aa1372d0d0 (size 80) 627s | PRF HMAC outer hash: outer-key@0x2aa1372d0d0 (80-bytes, CONCATENATE_BASE_AND_DATA) 627s | PRF HMAC outer hash hash MD5 final length 16 627s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0978dd8 627s | key-offset: 0, key-size: 16 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 16-bytes 627s | base: base-key@0x2aa1372b6c0 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0978dd0 627s | : hashed-outer-key@0x2aa13737840 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | PRF symkey interface PRF HMAC_MD5 final-key@0x2aa13737840 (size 16) 627s | PRF symkey interface: key-key@0x2aa13737840 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | output: symkey-key@0x2aa13737840 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | RFC 2104: MD5_HMAC test 3 extracting all 16 bytes of key@0x2aa13737840 627s | RFC 2104: MD5_HMAC test 3: symkey-key@0x2aa13737840 (16-bytes, EXTRACT_KEY_FROM_KEY) 627s | sizeof bytes 16 627s | wrapper: (SECItemType)1023: 65 38 d6 ce 14 36 54 20 4b 83 e0 57 28 0f af 6e 627s | RFC 2104: MD5_HMAC test 3 extracted len 16 bytes at 0x2aa13733730 627s | unwrapped: 627s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 627s | verify_chunk_data: RFC 2104: MD5_HMAC test 3: ok 627s | test_prf_vector: RFC 2104: MD5_HMAC test 3 passed 627s algparse: testing HMAC_SHA1: 627s algparse: CAVP: IKEv2 key derivation with HMAC-SHA1 627s | decode_to_chunk: test_kdf_vector: input "0x32b50d5f4a3763f3" 627s | decode_to_chunk: output: 627s | 32 b5 0d 5f 4a 37 63 f3 2.._J7c. 627s | decode_to_chunk: test_kdf_vector: input "0x9206a04b26564cb1" 627s | decode_to_chunk: output: 627s | 92 06 a0 4b 26 56 4c b1 ...K&VL. 627s | decode_to_chunk: test_kdf_vector: input "0x34c9e7c188868785" 627s | decode_to_chunk: output: 627s | 34 c9 e7 c1 88 86 87 85 4....... 627s | decode_to_chunk: test_kdf_vector: input "0x3ff77d760d2b2199" 627s | decode_to_chunk: output: 627s | 3f f7 7d 76 0d 2b 21 99 ?.}v.+!. 627s | decode_to_chunk: test_kdf_vector: input "0x4b2c1f971981a8ad8d0abeafabf38cf75fc8349c148142465ed9c8b516b8be52" 627s | decode_to_chunk: output: 627s | 4b 2c 1f 97 19 81 a8 ad 8d 0a be af ab f3 8c f7 K,.............. 627s | 5f c8 34 9c 14 81 42 46 5e d9 c8 b5 16 b8 be 52 _.4...BF^......R 627s | decode_to_chunk: test_kdf_vector: input "0x863f3c9d06efd39d2b907b97f8699e5dd5251ef64a2a176f36ee40c87d4f9330" 627s | decode_to_chunk: output: 627s | 86 3f 3c 9d 06 ef d3 9d 2b 90 7b 97 f8 69 9e 5d .?<.....+.{..i.] 627s | d5 25 1e f6 4a 2a 17 6f 36 ee 40 c8 7d 4f 93 30 .%..J*.o6.@.}O.0 627s | decode_to_chunk: test_kdf_vector: input "0xa9a7b222b59f8f48645f28a1db5b5f5d7479cba7" 627s | decode_to_chunk: output: 627s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 627s | 74 79 cb a7 ty.. 627s | decode_to_chunk: test_kdf_vector: input "0x63e81194946ebd05df7df5ebf5d8750056bf1f1d" 627s | decode_to_chunk: output: 627s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 627s | 56 bf 1f 1d V... 627s | decode_to_chunk: test_kdf_vector: input "0xa14293677cc80ff8f9cc0eee30d895da9d8f405666e30ef0dfcb63c634a46002a2a63080e514a062768b76606f9fa5e992204fc5a670bde3f10d6b027113936a5c55b648a194ae587b0088d52204b702c979fa280870d2ed41efa9c549fd11198af1670b143d384bd275c5f594cf266b05ebadca855e4249520a441a81157435a7a56cc4" 627s | decode_to_chunk: output: 627s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 627s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 627s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 627s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 627s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 627s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 627s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 627s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 627s | a7 a5 6c c4 ..l. 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0979008 627s | key-offset: 0, key-size: 32 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 32-bytes 627s | base: base-key@0x2aa137337e0 (48-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0979000 627s | NSS_IKE_PRF_DERIVE: 627s | target: NSS_IKE_PRF_PLUS_DERIVE 627s | base: base-key@0x2aa13737840 (32-bytes, EXTRACT_KEY_FROM_KEY) 627s | params: 56-bytes@0x3fff0979000 627s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0x2aa137337e0 627s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x2aa137337e0 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 627s | sizeof bytes 32 627s | wrapper: (SECItemType)682: e1 83 5d 9b 3e 44 57 f6 3f 4d 81 a5 cf 43 80 03 b5 e7 53 ff 47 c9 1c 2d f4 c5 64 4e 57 9a de d4 627s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0x2aa13730e00 627s | unwrapped: 627s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 627s | 74 79 cb a7 00 00 00 00 00 00 00 00 00 00 00 00 ty.............. 627s | verify_chunk_data: CAVP: IKEv2 key derivation with HMAC-SHA1: ok 627s | NSS_IKE_PRF_PLUS_DERIVE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 132-bytes 627s | base: base-key@0x2aa137337e0 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 627s | params: 40-bytes@0x3fff0978f98 627s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 132 bytes of key@0x2aa137306c0 627s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x2aa137306c0 (132-bytes, EXTRACT_KEY_FROM_KEY) 627s | sizeof bytes 144 627s | wrapper: (SECItemType)682: 4a e8 48 9d 54 ea a2 33 dd df c4 a0 f7 bc 68 4a 12 fa 99 42 17 6e 58 ad 38 18 f1 cf 1c 70 6f 90 2b e5 ff eb 86 c5 79 48 2e 24 60 07 5e 9b 13 ba 6b 86 90 65 ce 69 f2 57 ba ee b5 51 85 8f 38 49 73 c4 03 18 a2 f1 ec b2 5a 6b 97 f4 a1 45 79 2a a8 dd e1 f3 5b 7c 91 b4 fe 32 9d 4d 4b d0 6e d2 68 0e 64 ac 2e 60 be 24 ff 40 0f c8 48 32 ed ac dd af af df 5c e0 f8 c6 da 5b 59 5c ee c4 d5 cb 14 84 4f 5b f9 af ef fa d3 83 41 7c 06 ec 5c e7 627s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 144 bytes at 0x2aa13730f10 627s | unwrapped: 627s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 627s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 627s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 627s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 627s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 627s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 627s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 627s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 627s | a7 a5 6c c4 00 00 00 00 00 00 00 00 00 00 00 00 ..l............. 627s | verify_chunk_data: CAVP: IKEv2 key derivation with HMAC-SHA1: ok 627s | key-offset: 0, key-size: 20 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 20-bytes 627s | base: base-key@0x2aa137306c0 (132-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff09790d0 627s | CONCATENATE_DATA_AND_BASE: 627s | target: EXTRACT_KEY_FROM_KEY 627s | base: base-key@0x2aa13729eb0 (16-bytes, AES_KEY_GEN) 627s | params: 16-bytes@0x3fff0979008 627s | key-offset: 0, key-size: 32 627s | EXTRACT_KEY_FROM_KEY: 627s | target: EXTRACT_KEY_FROM_KEY 627s | key_size: 32-bytes 627s | base: base-key@0x2aa13731f50 (48-bytes, EXTRACT_KEY_FROM_KEY) 627s | operation: FLAGS_ONLY 627s | params: 8-bytes@0x3fff0979000 627s | NSS_IKE_PRF_DERIVE: 627s | target: NSS_IKE_PRF_PLUS_DERIVE 627s | base: base-key@0x2aa1372d0d0 (20-bytes, EXTRACT_KEY_FROM_KEY) 627s | params: 56-bytes@0x3fff0978ff8 627s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0x2aa13731f50 627s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x2aa13731f50 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 627s | sizeof bytes 32 627s | wrapper: (SECItemType)682: a2 c0 fa 02 f5 e8 98 64 89 4f d8 e8 8c 42 f7 6c 2c 2a 50 ba 2d 6a 98 de 60 5f 53 b4 e0 ef 77 c3 627s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0x2aa137314b0 627s | unwrapped: 627s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 627s | 56 bf 1f 1d 00 00 00 00 00 00 00 00 00 00 00 00 V............... 627s | verify_chunk_data: CAVP: IKEv2 key derivation with HMAC-SHA1: ok 627s | test_kdf_vector: CAVP: IKEv2 key derivation with HMAC-SHA1 passed 627s algparse: leak detective found no leaks 627s /usr/libexec/ipsec/pluto: adjusting nssdir to /tmp/tmp.5I7KSjQkQT 627s /usr/libexec/ipsec/pluto: selftest: skipping lock 627s /usr/libexec/ipsec/pluto: selftest: skipping control socket 627s /usr/libexec/ipsec/pluto: selftest: skipping fork 627s Initializing NSS using read-write database "sql:/tmp/tmp.5I7KSjQkQT" 627s FIPS Mode: NO 627s NSS crypto library initialized 627s FIPS mode disabled for pluto daemon 627s FIPS HMAC integrity support [disabled] 627s libcap-ng capng_apply failed to apply changes, err=-5. see: man capng_apply 627s libcap-ng support [enabled] 627s Linux audit support [enabled] 627s Starting Pluto (Libreswan Version 4.14 IKEv2 IKEv1 XFRM XFRMI esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) (NSS-KDF) DNSSEC SYSTEMD_WATCHDOG LABELED_IPSEC (SELINUX) LIBCAP_NG LINUX_AUDIT AUTH_PAM NETWORKMANAGER CURL(non-NSS) LDAP(non-NSS)) pid:2137 627s core dump dir: /run/pluto 627s secrets file: /etc/ipsec.secrets 627s leak-detective disabled 627s NSS crypto [enabled] 627s XAUTH PAM support [enabled] 627s initializing libevent in pthreads mode: headers: 2.1.12-stable (2010c00); library: 2.1.12-stable (2010c00) 627s NAT-Traversal support [enabled] 627s Encryption algorithms: 627s AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 627s AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 627s AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 627s 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 627s CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 627s CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 627s AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm, aes_gcm_c 627s AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_b 627s AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_a 627s AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 627s AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 627s NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 627s NULL [] IKEv1: ESP IKEv2: ESP 627s CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 627s Hash algorithms: 627s MD5 IKEv1: IKE IKEv2: NSS 627s SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 627s SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 627s SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 627s SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 627s IDENTITY IKEv1: IKEv2: FIPS 627s PRF algorithms: 627s HMAC_MD5 IKEv1: IKE IKEv2: IKE native(HMAC) md5 627s HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 627s HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 627s HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 627s HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 627s AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 627s Integrity algorithms: 627s HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH native(HMAC) md5, hmac_md5 627s HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 627s HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 627s HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 627s HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 627s HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 627s AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 627s AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 627s NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 627s DH algorithms: 627s NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 627s MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 627s MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 627s MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 627s MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 627s MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 627s MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 627s DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 627s DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 627s DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 627s DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 627s IPCOMP algorithms: 627s DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 627s LZS IKEv1: IKEv2: ESP AH FIPS 627s LZJH IKEv1: IKEv2: ESP AH FIPS 627s testing CAMELLIA_CBC: 627s Camellia: 16 bytes with 128-bit key 627s Camellia: 16 bytes with 128-bit key 627s Camellia: 16 bytes with 256-bit key 627s Camellia: 16 bytes with 256-bit key 627s testing AES_GCM_16: 627s empty string 627s one block 627s two blocks 627s two blocks with associated data 627s testing AES_CTR: 627s Encrypting 16 octets using AES-CTR with 128-bit key 627s Encrypting 32 octets using AES-CTR with 128-bit key 627s Encrypting 36 octets using AES-CTR with 128-bit key 627s Encrypting 16 octets using AES-CTR with 192-bit key 627s Encrypting 32 octets using AES-CTR with 192-bit key 627s Encrypting 36 octets using AES-CTR with 192-bit key 627s Encrypting 16 octets using AES-CTR with 256-bit key 627s Encrypting 32 octets using AES-CTR with 256-bit key 627s Encrypting 36 octets using AES-CTR with 256-bit key 627s testing AES_CBC: 627s Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 627s Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 627s Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 627s Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 627s testing AES_XCBC: 627s RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 627s RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 627s RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 627s RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 627s RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 627s RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 627s RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 627s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 627s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 627s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 627s testing HMAC_MD5: 627s RFC 2104: MD5_HMAC test 1 627s RFC 2104: MD5_HMAC test 2 627s RFC 2104: MD5_HMAC test 3 627s testing HMAC_SHA1: 627s CAVP: IKEv2 key derivation with HMAC-SHA1 627s selftest: exiting pluto 627s autopkgtest [19:44:44]: test cryptocheck: -----------------------] 627s autopkgtest [19:44:44]: test cryptocheck: - - - - - - - - - - results - - - - - - - - - - 627s cryptocheck PASS 628s autopkgtest [19:44:45]: test cavp: preparing testbed 748s autopkgtest [19:46:45]: testbed dpkg architecture: s390x 748s autopkgtest [19:46:45]: testbed apt version: 2.9.8 748s autopkgtest [19:46:45]: @@@@@@@@@@@@@@@@@@@@ test bed setup 749s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease [73.9 kB] 749s Get:2 http://ftpmaster.internal/ubuntu plucky-proposed/main Sources [92.2 kB] 749s Get:3 http://ftpmaster.internal/ubuntu plucky-proposed/universe Sources [1043 kB] 749s Get:4 http://ftpmaster.internal/ubuntu plucky-proposed/restricted Sources [7016 B] 749s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse Sources [15.5 kB] 749s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x Packages [150 kB] 749s Get:7 http://ftpmaster.internal/ubuntu plucky-proposed/universe s390x Packages [747 kB] 749s Get:8 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse s390x Packages [4940 B] 749s Fetched 2133 kB in 1s (2593 kB/s) 749s Reading package lists... 751s Reading package lists... 751s Building dependency tree... 751s Reading state information... 751s Calculating upgrade... 752s The following NEW packages will be installed: 752s libassuan9 752s The following packages will be upgraded: 752s libaudit-common libaudit1 libgpgme11t64 libseccomp2 python3-cffi-backend 752s python3-markupsafe 752s 6 upgraded, 1 newly installed, 0 to remove and 0 not upgraded. 752s Need to get 411 kB of archives. 752s After this operation, 352 kB of additional disk space will be used. 752s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libaudit-common all 1:4.0.2-2ubuntu1 [6578 B] 752s Get:2 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libaudit1 s390x 1:4.0.2-2ubuntu1 [52.5 kB] 752s Get:3 http://ftpmaster.internal/ubuntu plucky/main s390x libseccomp2 s390x 2.5.5-1ubuntu5 [52.1 kB] 752s Get:4 http://ftpmaster.internal/ubuntu plucky/main s390x python3-cffi-backend s390x 1.17.1-2build1 [91.3 kB] 752s Get:5 http://ftpmaster.internal/ubuntu plucky/main s390x libassuan9 s390x 3.0.1-2 [41.3 kB] 752s Get:6 http://ftpmaster.internal/ubuntu plucky/main s390x libgpgme11t64 s390x 1.24.0-2ubuntu1 [154 kB] 752s Get:7 http://ftpmaster.internal/ubuntu plucky/main s390x python3-markupsafe s390x 2.1.5-1build3 [12.9 kB] 752s Fetched 411 kB in 0s (889 kB/s) 752s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55517 files and directories currently installed.) 752s Preparing to unpack .../libaudit-common_1%3a4.0.2-2ubuntu1_all.deb ... 752s Unpacking libaudit-common (1:4.0.2-2ubuntu1) over (1:4.0.1-1ubuntu2) ... 752s Setting up libaudit-common (1:4.0.2-2ubuntu1) ... 752s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55517 files and directories currently installed.) 752s Preparing to unpack .../libaudit1_1%3a4.0.2-2ubuntu1_s390x.deb ... 752s Unpacking libaudit1:s390x (1:4.0.2-2ubuntu1) over (1:4.0.1-1ubuntu2) ... 752s Setting up libaudit1:s390x (1:4.0.2-2ubuntu1) ... 752s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55517 files and directories currently installed.) 752s Preparing to unpack .../libseccomp2_2.5.5-1ubuntu5_s390x.deb ... 752s Unpacking libseccomp2:s390x (2.5.5-1ubuntu5) over (2.5.5-1ubuntu4) ... 752s Setting up libseccomp2:s390x (2.5.5-1ubuntu5) ... 752s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55517 files and directories currently installed.) 752s Preparing to unpack .../python3-cffi-backend_1.17.1-2build1_s390x.deb ... 752s Unpacking python3-cffi-backend:s390x (1.17.1-2build1) over (1.17.1-2) ... 752s Selecting previously unselected package libassuan9:s390x. 752s Preparing to unpack .../libassuan9_3.0.1-2_s390x.deb ... 752s Unpacking libassuan9:s390x (3.0.1-2) ... 752s Preparing to unpack .../libgpgme11t64_1.24.0-2ubuntu1_s390x.deb ... 752s Unpacking libgpgme11t64:s390x (1.24.0-2ubuntu1) over (1.23.2-5ubuntu4) ... 752s Preparing to unpack .../python3-markupsafe_2.1.5-1build3_s390x.deb ... 753s Unpacking python3-markupsafe (2.1.5-1build3) over (2.1.5-1build2) ... 753s Setting up python3-markupsafe (2.1.5-1build3) ... 753s Setting up libassuan9:s390x (3.0.1-2) ... 753s Setting up libgpgme11t64:s390x (1.24.0-2ubuntu1) ... 753s Setting up python3-cffi-backend:s390x (1.17.1-2build1) ... 753s Processing triggers for man-db (2.13.0-1) ... 753s Processing triggers for libc-bin (2.40-1ubuntu3) ... 753s Reading package lists... 753s Building dependency tree... 753s Reading state information... 753s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 754s Hit:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease 754s Hit:2 http://ftpmaster.internal/ubuntu plucky InRelease 754s Hit:3 http://ftpmaster.internal/ubuntu plucky-updates InRelease 754s Hit:4 http://ftpmaster.internal/ubuntu plucky-security InRelease 754s Reading package lists... 754s Reading package lists... 755s Building dependency tree... 755s Reading state information... 755s Calculating upgrade... 755s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 755s Reading package lists... 755s Building dependency tree... 755s Reading state information... 755s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 759s Reading package lists... 760s Building dependency tree... 760s Reading state information... 760s Starting pkgProblemResolver with broken count: 0 760s Starting 2 pkgProblemResolver with broken count: 0 760s Done 760s The following additional packages will be installed: 760s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 760s libnss3-tools libreswan libunbound8 760s The following NEW packages will be installed: 760s autopkgtest-satdep dns-root-data libevent-2.1-7t64 760s libevent-pthreads-2.1-7t64 libldns3t64 libnss3-tools libreswan libunbound8 760s 0 upgraded, 8 newly installed, 0 to remove and 0 not upgraded. 760s Need to get 2744 kB/2745 kB of archives. 760s After this operation, 10.8 MB of additional disk space will be used. 760s Get:1 /tmp/autopkgtest.hcjUJG/3-autopkgtest-satdep.deb autopkgtest-satdep s390x 0 [736 B] 760s Get:2 http://ftpmaster.internal/ubuntu plucky/main s390x dns-root-data all 2024071800 [4380 B] 760s Get:3 http://ftpmaster.internal/ubuntu plucky/main s390x libnss3-tools s390x 2:3.103-1 [629 kB] 760s Get:4 http://ftpmaster.internal/ubuntu plucky/main s390x libevent-pthreads-2.1-7t64 s390x 2.1.12-stable-10 [7870 B] 760s Get:5 http://ftpmaster.internal/ubuntu plucky/universe s390x libldns3t64 s390x 1.8.4-1 [169 kB] 760s Get:6 http://ftpmaster.internal/ubuntu plucky/main s390x libevent-2.1-7t64 s390x 2.1.12-stable-10 [145 kB] 760s Get:7 http://ftpmaster.internal/ubuntu plucky/main s390x libunbound8 s390x 1.20.0-1ubuntu2.1 [455 kB] 760s Get:8 http://ftpmaster.internal/ubuntu plucky/universe s390x libreswan s390x 4.14-1ubuntu2 [1335 kB] 761s Fetched 2744 kB in 1s (4040 kB/s) 761s Selecting previously unselected package dns-root-data. 761s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55524 files and directories currently installed.) 761s Preparing to unpack .../0-dns-root-data_2024071800_all.deb ... 761s Unpacking dns-root-data (2024071800) ... 761s Selecting previously unselected package libnss3-tools. 761s Preparing to unpack .../1-libnss3-tools_2%3a3.103-1_s390x.deb ... 761s Unpacking libnss3-tools (2:3.103-1) ... 761s Selecting previously unselected package libevent-pthreads-2.1-7t64:s390x. 761s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10_s390x.deb ... 761s Unpacking libevent-pthreads-2.1-7t64:s390x (2.1.12-stable-10) ... 761s Selecting previously unselected package libldns3t64:s390x. 761s Preparing to unpack .../3-libldns3t64_1.8.4-1_s390x.deb ... 761s Unpacking libldns3t64:s390x (1.8.4-1) ... 761s Selecting previously unselected package libevent-2.1-7t64:s390x. 761s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10_s390x.deb ... 761s Unpacking libevent-2.1-7t64:s390x (2.1.12-stable-10) ... 761s Selecting previously unselected package libunbound8:s390x. 761s Preparing to unpack .../5-libunbound8_1.20.0-1ubuntu2.1_s390x.deb ... 761s Unpacking libunbound8:s390x (1.20.0-1ubuntu2.1) ... 761s Selecting previously unselected package libreswan. 761s Preparing to unpack .../6-libreswan_4.14-1ubuntu2_s390x.deb ... 761s Unpacking libreswan (4.14-1ubuntu2) ... 761s Selecting previously unselected package autopkgtest-satdep. 761s Preparing to unpack .../7-3-autopkgtest-satdep.deb ... 761s Unpacking autopkgtest-satdep (0) ... 761s Setting up libldns3t64:s390x (1.8.4-1) ... 761s Setting up libevent-pthreads-2.1-7t64:s390x (2.1.12-stable-10) ... 761s Setting up libevent-2.1-7t64:s390x (2.1.12-stable-10) ... 761s Setting up dns-root-data (2024071800) ... 761s Setting up libunbound8:s390x (1.20.0-1ubuntu2.1) ... 761s Setting up libnss3-tools (2:3.103-1) ... 761s Setting up libreswan (4.14-1ubuntu2) ... 761s ipsec.service is a disabled or a static unit, not starting it. 761s Setting up autopkgtest-satdep (0) ... 761s Processing triggers for man-db (2.13.0-1) ... 762s Processing triggers for libc-bin (2.40-1ubuntu3) ... 764s (Reading database ... 55721 files and directories currently installed.) 764s Removing autopkgtest-satdep (0) ... 791s autopkgtest [19:47:28]: test cavp: [----------------------- 792s Testing installed CAVP binary: /usr/libexec/ipsec/cavp 794s test: IKE v2 794s Reading from ikev2.fax 796s test: IKE v1 Digital Signature Authentication 796s Reading from ikev1_dsa.fax 798s test: IKE v1 Pre-shared Key Authentication 798s Reading from ikev1_psk.fax 800s /tmp/autopkgtest.hcjUJG/build.MS1/src 800s autopkgtest [19:47:37]: test cavp: -----------------------] 800s cavp PASS 800s autopkgtest [19:47:37]: test cavp: - - - - - - - - - - results - - - - - - - - - - 801s autopkgtest [19:47:38]: @@@@@@@@@@@@@@@@@@@@ summary 801s opportunistic SKIP exit status 77 and marked as skippable 801s cryptocheck PASS 801s cavp PASS 813s nova [W] Using flock in prodstack6-s390x 813s Creating nova instance adt-plucky-s390x-libreswan-20241115-193417-juju-7f2275-prod-proposed-migration-environment-15-92e2fef9-ca25-49fa-897e-5998c28ccf05 from image adt/ubuntu-plucky-s390x-server-20241115.img (UUID c94000c6-8e8d-4693-8d37-fa9d34cd2414)... 813s nova [W] Using flock in prodstack6-s390x 813s flock: timeout while waiting to get lock 813s Creating nova instance adt-plucky-s390x-libreswan-20241115-193417-juju-7f2275-prod-proposed-migration-environment-15-92e2fef9-ca25-49fa-897e-5998c28ccf05 from image adt/ubuntu-plucky-s390x-server-20241115.img (UUID c94000c6-8e8d-4693-8d37-fa9d34cd2414)... 813s nova [W] nova quota exceeded (attempt #0) 813s nova [W] Using flock in prodstack6-s390x 813s Creating nova instance adt-plucky-s390x-libreswan-20241115-193417-juju-7f2275-prod-proposed-migration-environment-15-92e2fef9-ca25-49fa-897e-5998c28ccf05 from image adt/ubuntu-plucky-s390x-server-20241115.img (UUID c94000c6-8e8d-4693-8d37-fa9d34cd2414)...