0s autopkgtest [11:50:25]: starting date and time: 2025-01-17 11:50:25+0000 0s autopkgtest [11:50:25]: git checkout: 325255d2 Merge branch 'pin-any-arch' into 'ubuntu/production' 0s autopkgtest [11:50:25]: host juju-7f2275-prod-proposed-migration-environment-15; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.uc35pthz/out --timeout-copy=6000 --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:libxcrypt --apt-upgrade libreswan --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 --env=ADT_TEST_TRIGGERS=libxcrypt/1:4.4.38-1 -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest-s390x --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-15@bos03-s390x-10.secgroup --name adt-plucky-s390x-libreswan-20250117-104018-juju-7f2275-prod-proposed-migration-environment-15-f30a0833-d384-494a-8367-743e6f4c1a0a --image adt/ubuntu-plucky-s390x-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-15 --net-id=net_prod-proposed-migration-s390x -e TERM=linux -e ''"'"'http_proxy=http://squid.internal:3128'"'"'' -e ''"'"'https_proxy=http://squid.internal:3128'"'"'' -e ''"'"'no_proxy=127.0.0.1,127.0.1.1,login.ubuntu.com,localhost,localdomain,novalocal,internal,archive.ubuntu.com,ports.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,keyserver.ubuntu.com,launchpadlibrarian.net,launchpadcontent.net,launchpad.net,10.24.0.0/24,keystone.ps5.canonical.com,objectstorage.prodstack5.canonical.com,radosgw.ps5.canonical.com'"'"'' --mirror=http://ftpmaster.internal/ubuntu/ 62s autopkgtest [11:51:27]: testbed dpkg architecture: s390x 62s autopkgtest [11:51:27]: testbed apt version: 2.9.18 62s autopkgtest [11:51:27]: @@@@@@@@@@@@@@@@@@@@ test bed setup 62s autopkgtest [11:51:27]: testbed release detected to be: None 63s autopkgtest [11:51:28]: updating testbed package index (apt update) 63s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease [73.9 kB] 63s Hit:2 http://ftpmaster.internal/ubuntu plucky InRelease 64s Hit:3 http://ftpmaster.internal/ubuntu plucky-updates InRelease 64s Hit:4 http://ftpmaster.internal/ubuntu plucky-security InRelease 64s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/main Sources [177 kB] 64s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/universe Sources [877 kB] 64s Get:7 http://ftpmaster.internal/ubuntu plucky-proposed/restricted Sources [9708 B] 64s Get:8 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse Sources [15.7 kB] 64s Get:9 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x Packages [289 kB] 64s Get:10 http://ftpmaster.internal/ubuntu plucky-proposed/restricted s390x Packages [756 B] 64s Get:11 http://ftpmaster.internal/ubuntu plucky-proposed/universe s390x Packages [974 kB] 64s Get:12 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse s390x Packages [5408 B] 64s Fetched 2423 kB in 1s (2530 kB/s) 65s Reading package lists... 65s Reading package lists... 65s Building dependency tree... 65s Reading state information... 65s Calculating upgrade... 66s The following packages will be upgraded: 66s usb.ids 66s 1 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 66s Need to get 223 kB of archives. 66s After this operation, 0 B of additional disk space will be used. 66s Get:1 http://ftpmaster.internal/ubuntu plucky/main s390x usb.ids all 2025.01.14-1 [223 kB] 66s Fetched 223 kB in 0s (551 kB/s) 66s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55658 files and directories currently installed.) 66s Preparing to unpack .../usb.ids_2025.01.14-1_all.deb ... 66s Unpacking usb.ids (2025.01.14-1) over (2024.12.04-1) ... 66s Setting up usb.ids (2025.01.14-1) ... 67s Reading package lists... 67s Building dependency tree... 67s Reading state information... 67s 0 upgraded, 0 newly installed, 0 to remove and 2 not upgraded. 67s autopkgtest [11:51:32]: upgrading testbed (apt dist-upgrade and autopurge) 67s Reading package lists... 67s Building dependency tree... 67s Reading state information... 67s Calculating upgrade...Starting pkgProblemResolver with broken count: 0 67s Starting 2 pkgProblemResolver with broken count: 0 67s Done 67s Entering ResolveByKeep 68s 68s The following packages will be upgraded: 68s libcrypt-dev libcrypt1 68s 2 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 68s Need to get 205 kB of archives. 68s After this operation, 2048 B of additional disk space will be used. 68s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libcrypt-dev s390x 1:4.4.38-1 [117 kB] 68s Get:2 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libcrypt1 s390x 1:4.4.38-1 [88.0 kB] 69s Fetched 205 kB in 0s (436 kB/s) 69s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55658 files and directories currently installed.) 69s Preparing to unpack .../libcrypt-dev_1%3a4.4.38-1_s390x.deb ... 69s Unpacking libcrypt-dev:s390x (1:4.4.38-1) over (1:4.4.36-5) ... 69s Preparing to unpack .../libcrypt1_1%3a4.4.38-1_s390x.deb ... 69s Unpacking libcrypt1:s390x (1:4.4.38-1) over (1:4.4.36-5) ... 69s Setting up libcrypt1:s390x (1:4.4.38-1) ... 69s Setting up libcrypt-dev:s390x (1:4.4.38-1) ... 69s Processing triggers for man-db (2.13.0-1) ... 69s Processing triggers for libc-bin (2.40-4ubuntu1) ... 69s Reading package lists... 69s Building dependency tree... 69s Reading state information... 69s Starting pkgProblemResolver with broken count: 0 69s Starting 2 pkgProblemResolver with broken count: 0 69s Done 69s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 72s autopkgtest [11:51:37]: testbed running kernel: Linux 6.11.0-8-generic #8-Ubuntu SMP Mon Sep 16 12:49:35 UTC 2024 72s autopkgtest [11:51:37]: @@@@@@@@@@@@@@@@@@@@ apt-source libreswan 74s Get:1 http://ftpmaster.internal/ubuntu plucky/universe libreswan 4.14-1ubuntu2 (dsc) [2781 B] 74s Get:2 http://ftpmaster.internal/ubuntu plucky/universe libreswan 4.14-1ubuntu2 (tar) [3721 kB] 74s Get:3 http://ftpmaster.internal/ubuntu plucky/universe libreswan 4.14-1ubuntu2 (asc) [862 B] 74s Get:4 http://ftpmaster.internal/ubuntu plucky/universe libreswan 4.14-1ubuntu2 (diff) [17.5 kB] 74s gpgv: Signature made Sun Mar 31 19:34:12 2024 UTC 74s gpgv: using RSA key AC483F68DE728F43F2202FCA568D30F321B2133D 74s gpgv: issuer "steve.langasek@ubuntu.com" 74s gpgv: Can't check signature: No public key 74s dpkg-source: warning: cannot verify inline signature for ./libreswan_4.14-1ubuntu2.dsc: no acceptable signature found 74s autopkgtest [11:51:39]: testing package libreswan version 4.14-1ubuntu2 75s autopkgtest [11:51:40]: build not needed 76s autopkgtest [11:51:41]: test opportunistic: preparing testbed 76s Reading package lists... 77s Building dependency tree... 77s Reading state information... 77s Starting pkgProblemResolver with broken count: 0 77s Starting 2 pkgProblemResolver with broken count: 0 77s Done 77s The following NEW packages will be installed: 77s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 77s libnss3-tools libreswan libunbound8 77s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 77s Need to get 2750 kB of archives. 77s After this operation, 10.8 MB of additional disk space will be used. 77s Get:1 http://ftpmaster.internal/ubuntu plucky/main s390x dns-root-data all 2024071801 [5802 B] 77s Get:2 http://ftpmaster.internal/ubuntu plucky/main s390x libnss3-tools s390x 2:3.106-1ubuntu1 [632 kB] 77s Get:3 http://ftpmaster.internal/ubuntu plucky/main s390x libevent-pthreads-2.1-7t64 s390x 2.1.12-stable-10 [7870 B] 77s Get:4 http://ftpmaster.internal/ubuntu plucky/universe s390x libldns3t64 s390x 1.8.4-2 [169 kB] 77s Get:5 http://ftpmaster.internal/ubuntu plucky/main s390x libevent-2.1-7t64 s390x 2.1.12-stable-10 [145 kB] 78s Get:6 http://ftpmaster.internal/ubuntu plucky/main s390x libunbound8 s390x 1.20.0-1ubuntu2.1 [455 kB] 78s Get:7 http://ftpmaster.internal/ubuntu plucky/universe s390x libreswan s390x 4.14-1ubuntu2 [1335 kB] 78s Fetched 2750 kB in 1s (3773 kB/s) 78s Selecting previously unselected package dns-root-data. 78s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55658 files and directories currently installed.) 78s Preparing to unpack .../0-dns-root-data_2024071801_all.deb ... 78s Unpacking dns-root-data (2024071801) ... 78s Selecting previously unselected package libnss3-tools. 78s Preparing to unpack .../1-libnss3-tools_2%3a3.106-1ubuntu1_s390x.deb ... 78s Unpacking libnss3-tools (2:3.106-1ubuntu1) ... 78s Selecting previously unselected package libevent-pthreads-2.1-7t64:s390x. 78s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10_s390x.deb ... 78s Unpacking libevent-pthreads-2.1-7t64:s390x (2.1.12-stable-10) ... 78s Selecting previously unselected package libldns3t64:s390x. 78s Preparing to unpack .../3-libldns3t64_1.8.4-2_s390x.deb ... 78s Unpacking libldns3t64:s390x (1.8.4-2) ... 78s Selecting previously unselected package libevent-2.1-7t64:s390x. 78s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10_s390x.deb ... 78s Unpacking libevent-2.1-7t64:s390x (2.1.12-stable-10) ... 78s Selecting previously unselected package libunbound8:s390x. 78s Preparing to unpack .../5-libunbound8_1.20.0-1ubuntu2.1_s390x.deb ... 78s Unpacking libunbound8:s390x (1.20.0-1ubuntu2.1) ... 78s Selecting previously unselected package libreswan. 78s Preparing to unpack .../6-libreswan_4.14-1ubuntu2_s390x.deb ... 78s Unpacking libreswan (4.14-1ubuntu2) ... 78s Setting up libldns3t64:s390x (1.8.4-2) ... 78s Setting up libevent-pthreads-2.1-7t64:s390x (2.1.12-stable-10) ... 78s Setting up libevent-2.1-7t64:s390x (2.1.12-stable-10) ... 78s Setting up dns-root-data (2024071801) ... 78s Setting up libunbound8:s390x (1.20.0-1ubuntu2.1) ... 78s Setting up libnss3-tools (2:3.106-1ubuntu1) ... 78s Setting up libreswan (4.14-1ubuntu2) ... 78s ipsec.service is a disabled or a static unit, not starting it. 78s Processing triggers for man-db (2.13.0-1) ... 79s Processing triggers for libc-bin (2.40-4ubuntu1) ... 80s autopkgtest [11:51:45]: test opportunistic: [----------------------- 80s PING oe.libreswan.org (193.110.157.124) 56(84) bytes of data. 80s From 10.145.255.2 icmp_seq=1 Destination Port Unreachable 81s From 10.145.255.2 icmp_seq=2 Destination Port Unreachable 82s From 10.145.255.2 icmp_seq=3 Destination Port Unreachable 83s From 10.145.255.2 icmp_seq=4 Destination Port Unreachable 85s From 10.145.255.2 icmp_seq=5 Destination Port Unreachable 85s 85s --- oe.libreswan.org ping statistics --- 85s 5 packets transmitted, 0 received, +5 errors, 100% packet loss, time 4102ms 85s 85s autopkgtest [11:51:50]: test opportunistic: -----------------------] 85s opportunistic SKIP exit status 77 and marked as skippable 85s autopkgtest [11:51:50]: test opportunistic: - - - - - - - - - - results - - - - - - - - - - 85s autopkgtest [11:51:50]: test cryptocheck: preparing testbed 162s autopkgtest [11:53:07]: testbed dpkg architecture: s390x 162s autopkgtest [11:53:07]: testbed apt version: 2.9.18 163s autopkgtest [11:53:07]: @@@@@@@@@@@@@@@@@@@@ test bed setup 163s autopkgtest [11:53:08]: testbed release detected to be: plucky 163s autopkgtest [11:53:08]: updating testbed package index (apt update) 164s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease [73.9 kB] 164s Hit:2 http://ftpmaster.internal/ubuntu plucky InRelease 164s Hit:3 http://ftpmaster.internal/ubuntu plucky-updates InRelease 164s Hit:4 http://ftpmaster.internal/ubuntu plucky-security InRelease 164s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/main Sources [177 kB] 164s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/restricted Sources [9708 B] 164s Get:7 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse Sources [15.7 kB] 164s Get:8 http://ftpmaster.internal/ubuntu plucky-proposed/universe Sources [877 kB] 164s Get:9 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x Packages [289 kB] 164s Get:10 http://ftpmaster.internal/ubuntu plucky-proposed/restricted s390x Packages [756 B] 164s Get:11 http://ftpmaster.internal/ubuntu plucky-proposed/universe s390x Packages [974 kB] 164s Get:12 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse s390x Packages [5408 B] 165s Fetched 2423 kB in 1s (2553 kB/s) 165s Reading package lists... 166s Reading package lists... 166s Building dependency tree... 166s Reading state information... 166s Calculating upgrade... 166s The following packages will be upgraded: 166s usb.ids 166s 1 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 166s Need to get 223 kB of archives. 166s After this operation, 0 B of additional disk space will be used. 166s Get:1 http://ftpmaster.internal/ubuntu plucky/main s390x usb.ids all 2025.01.14-1 [223 kB] 167s Fetched 223 kB in 0s (544 kB/s) 167s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55658 files and directories currently installed.) 167s Preparing to unpack .../usb.ids_2025.01.14-1_all.deb ... 167s Unpacking usb.ids (2025.01.14-1) over (2024.12.04-1) ... 167s Setting up usb.ids (2025.01.14-1) ... 167s Reading package lists... 167s Building dependency tree... 167s Reading state information... 167s 0 upgraded, 0 newly installed, 0 to remove and 2 not upgraded. 167s autopkgtest [11:53:12]: upgrading testbed (apt dist-upgrade and autopurge) 167s Reading package lists... 168s Building dependency tree... 168s Reading state information... 168s Calculating upgrade...Starting pkgProblemResolver with broken count: 0 168s Starting 2 pkgProblemResolver with broken count: 0 168s Done 168s Entering ResolveByKeep 168s 168s The following packages will be upgraded: 168s libcrypt-dev libcrypt1 168s 2 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 168s Need to get 205 kB of archives. 168s After this operation, 2048 B of additional disk space will be used. 168s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libcrypt-dev s390x 1:4.4.38-1 [117 kB] 168s Get:2 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libcrypt1 s390x 1:4.4.38-1 [88.0 kB] 169s Fetched 205 kB in 0s (495 kB/s) 169s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55658 files and directories currently installed.) 169s Preparing to unpack .../libcrypt-dev_1%3a4.4.38-1_s390x.deb ... 169s Unpacking libcrypt-dev:s390x (1:4.4.38-1) over (1:4.4.36-5) ... 169s Preparing to unpack .../libcrypt1_1%3a4.4.38-1_s390x.deb ... 169s Unpacking libcrypt1:s390x (1:4.4.38-1) over (1:4.4.36-5) ... 169s Setting up libcrypt1:s390x (1:4.4.38-1) ... 169s Setting up libcrypt-dev:s390x (1:4.4.38-1) ... 169s Processing triggers for man-db (2.13.0-1) ... 169s Processing triggers for libc-bin (2.40-4ubuntu1) ... 169s Reading package lists... 169s Building dependency tree... 169s Reading state information... 170s Starting pkgProblemResolver with broken count: 0 170s Starting 2 pkgProblemResolver with broken count: 0 170s Done 170s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 172s Reading package lists... 172s Building dependency tree... 172s Reading state information... 172s Starting pkgProblemResolver with broken count: 0 173s Starting 2 pkgProblemResolver with broken count: 0 173s Done 173s The following NEW packages will be installed: 173s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 173s libnss3-tools libreswan libunbound8 173s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 173s Need to get 2750 kB of archives. 173s After this operation, 10.8 MB of additional disk space will be used. 173s Get:1 http://ftpmaster.internal/ubuntu plucky/main s390x dns-root-data all 2024071801 [5802 B] 173s Get:2 http://ftpmaster.internal/ubuntu plucky/main s390x libnss3-tools s390x 2:3.106-1ubuntu1 [632 kB] 173s Get:3 http://ftpmaster.internal/ubuntu plucky/main s390x libevent-pthreads-2.1-7t64 s390x 2.1.12-stable-10 [7870 B] 173s Get:4 http://ftpmaster.internal/ubuntu plucky/universe s390x libldns3t64 s390x 1.8.4-2 [169 kB] 173s Get:5 http://ftpmaster.internal/ubuntu plucky/main s390x libevent-2.1-7t64 s390x 2.1.12-stable-10 [145 kB] 173s Get:6 http://ftpmaster.internal/ubuntu plucky/main s390x libunbound8 s390x 1.20.0-1ubuntu2.1 [455 kB] 173s Get:7 http://ftpmaster.internal/ubuntu plucky/universe s390x libreswan s390x 4.14-1ubuntu2 [1335 kB] 174s Fetched 2750 kB in 1s (3934 kB/s) 174s Selecting previously unselected package dns-root-data. 174s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55658 files and directories currently installed.) 174s Preparing to unpack .../0-dns-root-data_2024071801_all.deb ... 174s Unpacking dns-root-data (2024071801) ... 174s Selecting previously unselected package libnss3-tools. 174s Preparing to unpack .../1-libnss3-tools_2%3a3.106-1ubuntu1_s390x.deb ... 174s Unpacking libnss3-tools (2:3.106-1ubuntu1) ... 174s Selecting previously unselected package libevent-pthreads-2.1-7t64:s390x. 174s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10_s390x.deb ... 174s Unpacking libevent-pthreads-2.1-7t64:s390x (2.1.12-stable-10) ... 174s Selecting previously unselected package libldns3t64:s390x. 174s Preparing to unpack .../3-libldns3t64_1.8.4-2_s390x.deb ... 174s Unpacking libldns3t64:s390x (1.8.4-2) ... 174s Selecting previously unselected package libevent-2.1-7t64:s390x. 174s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10_s390x.deb ... 174s Unpacking libevent-2.1-7t64:s390x (2.1.12-stable-10) ... 174s Selecting previously unselected package libunbound8:s390x. 174s Preparing to unpack .../5-libunbound8_1.20.0-1ubuntu2.1_s390x.deb ... 174s Unpacking libunbound8:s390x (1.20.0-1ubuntu2.1) ... 174s Selecting previously unselected package libreswan. 174s Preparing to unpack .../6-libreswan_4.14-1ubuntu2_s390x.deb ... 174s Unpacking libreswan (4.14-1ubuntu2) ... 174s Setting up libldns3t64:s390x (1.8.4-2) ... 174s Setting up libevent-pthreads-2.1-7t64:s390x (2.1.12-stable-10) ... 174s Setting up libevent-2.1-7t64:s390x (2.1.12-stable-10) ... 174s Setting up dns-root-data (2024071801) ... 174s Setting up libunbound8:s390x (1.20.0-1ubuntu2.1) ... 174s Setting up libnss3-tools (2:3.106-1ubuntu1) ... 174s Setting up libreswan (4.14-1ubuntu2) ... 174s ipsec.service is a disabled or a static unit, not starting it. 174s Processing triggers for man-db (2.13.0-1) ... 175s Processing triggers for libc-bin (2.40-4ubuntu1) ... 183s autopkgtest [11:53:28]: test cryptocheck: [----------------------- 183s Testing installed binary: /usr/libexec/ipsec/algparse 183s Testing installed binary: /usr/libexec/ipsec/pluto 183s testing -tp 183s algparse: Encryption algorithms: 183s algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 183s algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 183s algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 183s algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 183s algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 183s algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 183s algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm, aes_gcm_c 183s algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_b 183s algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_a 183s algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 183s algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 183s algparse -v2 'esp' 183s AES_GCM_16_256-NONE 183s AES_GCM_16_128-NONE 183s AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 183s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 183s algparse -v2 'esp=' 183s ERROR: ESP proposal is empty 183s algparse -v2 'esp=aes' 183s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 183s algparse -v2 'esp=aes;modp2048' 183s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 183s algparse -v2 'esp=aes-sha1' 183s AES_CBC-HMAC_SHA1_96 183s algparse -v2 'esp=aes-sha1' 183s AES_CBC-HMAC_SHA1_96 183s algparse -v2 'esp=aes-sha1-modp2048' 183s AES_CBC-HMAC_SHA1_96 183s algparse -v2 'esp=aes-128-sha1' 183s AES_CBC_128-HMAC_SHA1_96 183s algparse -v2 'esp=aes-128-sha1' 183s AES_CBC_128-HMAC_SHA1_96 183s algparse -v2 'esp=aes-128-sha1-modp2048' 183s AES_CBC_128-HMAC_SHA1_96 183s algparse -v2 'esp=aes-128' 183s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 183s algparse -v2 'esp=aes_gcm_a-128-null' 183s AES_GCM_8_128-NONE 183s algparse -v2 'esp=3des-sha1;modp1024' 183s ERROR: ESP DH algorithm 'modp1024' is not supported 183s algparse -v2 'esp=3des-sha1;modp1536' 183s 3DES_CBC-HMAC_SHA1_96 183s algparse -v2 'esp=3des-sha1;modp2048' 183s 3DES_CBC-HMAC_SHA1_96 183s algparse -v2 'esp=3des-sha1;dh21' 183s 3DES_CBC-HMAC_SHA1_96 183s algparse -v2 'esp=3des-sha1;ecp_521' 183s 3DES_CBC-HMAC_SHA1_96 183s algparse -v2 'esp=3des-sha1;dh23' 183s ERROR: ESP DH algorithm 'dh23' is not supported 183s algparse -v2 'esp=3des-sha1;dh24' 183s ERROR: ESP DH algorithm 'dh24' is not supported 183s algparse -v2 'esp=3des-sha1' 183s 3DES_CBC-HMAC_SHA1_96 183s algparse -v2 'esp=null-sha1' 183s NULL-HMAC_SHA1_96 183s algparse -v2 'esp=aes_cbc' 183s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 183s algparse -v2 'esp=aes-sha' 183s AES_CBC-HMAC_SHA1_96 183s algparse -v2 'esp=aes-sha1' 183s AES_CBC-HMAC_SHA1_96 183s algparse -v2 'esp=aes128-sha1' 183s AES_CBC_128-HMAC_SHA1_96 183s algparse -v2 'esp=aes-sha2' 183s AES_CBC-HMAC_SHA2_256_128 183s algparse -v2 'esp=aes-sha256' 183s AES_CBC-HMAC_SHA2_256_128 183s algparse -v2 'esp=aes-sha384' 183s AES_CBC-HMAC_SHA2_384_192 183s algparse -v2 'esp=aes-sha512' 183s AES_CBC-HMAC_SHA2_512_256 183s algparse -v2 'esp=aes128-aes_xcbc' 183s AES_CBC_128-AES_XCBC_96 183s algparse -v2 'esp=aes192-sha1' 183s AES_CBC_192-HMAC_SHA1_96 183s algparse -v2 'esp=aes256-sha1' 183s AES_CBC_256-HMAC_SHA1_96 183s algparse -v2 'esp=aes256-sha' 183s AES_CBC_256-HMAC_SHA1_96 183s algparse -v2 'esp=aes256-sha2' 183s AES_CBC_256-HMAC_SHA2_256_128 183s algparse -v2 'esp=aes256-sha2_256' 183s AES_CBC_256-HMAC_SHA2_256_128 183s algparse -v2 'esp=aes256-sha2_384' 183s AES_CBC_256-HMAC_SHA2_384_192 183s algparse -v2 'esp=aes256-sha2_512' 183s AES_CBC_256-HMAC_SHA2_512_256 183s algparse -v2 'esp=camellia' 183s CAMELLIA_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 183s algparse -v2 'esp=camellia128' 183s CAMELLIA_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 183s algparse -v2 'esp=camellia192' 183s CAMELLIA_CBC_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 183s algparse -v2 'esp=camellia256' 183s CAMELLIA_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 183s algparse -v2 'esp=aes_ccm' 183s AES_CCM_16-NONE 183s algparse -v2 'esp=aes_ccm_a-128-null' 183s AES_CCM_8_128-NONE 183s algparse -v2 'esp=aes_ccm_a-192-null' 183s AES_CCM_8_192-NONE 183s algparse -v2 'esp=aes_ccm_a-256-null' 183s AES_CCM_8_256-NONE 183s algparse -v2 'esp=aes_ccm_b-128-null' 183s AES_CCM_12_128-NONE 183s algparse -v2 'esp=aes_ccm_b-192-null' 183s AES_CCM_12_192-NONE 183s algparse -v2 'esp=aes_ccm_b-256-null' 183s AES_CCM_12_256-NONE 183s algparse -v2 'esp=aes_ccm_c-128-null' 183s AES_CCM_16_128-NONE 183s algparse -v2 'esp=aes_ccm_c-192-null' 183s AES_CCM_16_192-NONE 183s algparse -v2 'esp=aes_ccm_c-256-null' 183s AES_CCM_16_256-NONE 183s algparse -v2 'esp=aes_gcm' 183s AES_GCM_16-NONE 183s algparse -v2 'esp=aes_gcm_a-128-null' 183s AES_GCM_8_128-NONE 183s algparse -v2 'esp=aes_gcm_a-192-null' 183s AES_GCM_8_192-NONE 183s algparse -v2 'esp=aes_gcm_a-256-null' 183s AES_GCM_8_256-NONE 183s algparse -v2 'esp=aes_gcm_b-128-null' 183s AES_GCM_12_128-NONE 183s algparse -v2 'esp=aes_gcm_b-192-null' 183s AES_GCM_12_192-NONE 183s algparse -v2 'esp=aes_gcm_b-256-null' 183s AES_GCM_12_256-NONE 183s algparse -v2 'esp=aes_gcm_c-128-null' 183s AES_GCM_16_128-NONE 183s algparse -v2 'esp=aes_gcm_c-192-null' 183s AES_GCM_16_192-NONE 183s algparse -v2 'esp=aes_gcm_c-256-null' 183s AES_GCM_16_256-NONE 183s algparse -v2 'esp=aes_ccm_a-null' 183s AES_CCM_8-NONE 183s algparse -v2 'esp=aes_ccm_b-null' 183s AES_CCM_12-NONE 183s algparse -v2 'esp=aes_ccm_c-null' 183s AES_CCM_16-NONE 183s algparse -v2 'esp=aes_gcm_a-null' 183s AES_GCM_8-NONE 183s algparse -v2 'esp=aes_gcm_b-null' 183s AES_GCM_12-NONE 183s algparse -v2 'esp=aes_gcm_c-null' 183s AES_GCM_16-NONE 183s algparse -v2 'esp=aes_ccm-null' 183s AES_CCM_16-NONE 183s algparse -v2 'esp=aes_gcm-null' 183s AES_GCM_16-NONE 183s algparse -v2 'esp=aes_ccm-256-null' 183s AES_CCM_16_256-NONE 183s algparse -v2 'esp=aes_gcm-192-null' 183s AES_GCM_16_192-NONE 183s algparse -v2 'esp=aes_ccm_256-null' 183s AES_CCM_16_256-NONE 183s algparse -v2 'esp=aes_gcm_192-null' 183s AES_GCM_16_192-NONE 183s algparse -v2 'esp=aes_ccm_8-null' 183s AES_CCM_8-NONE 183s algparse -v2 'esp=aes_ccm_12-null' 183s AES_CCM_12-NONE 183s algparse -v2 'esp=aes_ccm_16-null' 183s AES_CCM_16-NONE 183s algparse -v2 'esp=aes_gcm_8-null' 183s AES_GCM_8-NONE 183s algparse -v2 'esp=aes_gcm_12-null' 183s AES_GCM_12-NONE 183s algparse -v2 'esp=aes_gcm_16-null' 183s AES_GCM_16-NONE 183s algparse -v2 'esp=aes_ccm_8-128-null' 183s AES_CCM_8_128-NONE 183s algparse -v2 'esp=aes_ccm_12-192-null' 183s AES_CCM_12_192-NONE 183s algparse -v2 'esp=aes_ccm_16-256-null' 183s AES_CCM_16_256-NONE 183s algparse -v2 'esp=aes_gcm_8-128-null' 183s AES_GCM_8_128-NONE 183s algparse -v2 'esp=aes_gcm_12-192-null' 183s AES_GCM_12_192-NONE 183s algparse -v2 'esp=aes_gcm_16-256-null' 183s AES_GCM_16_256-NONE 183s algparse -v2 'esp=aes_ccm_8_128-null' 183s AES_CCM_8_128-NONE 183s algparse -v2 'esp=aes_ccm_12_192-null' 183s AES_CCM_12_192-NONE 183s algparse -v2 'esp=aes_ccm_16_256-null' 183s AES_CCM_16_256-NONE 183s algparse -v2 'esp=aes_gcm_8_128-null' 183s AES_GCM_8_128-NONE 183s algparse -v2 'esp=aes_gcm_12_192-null' 183s AES_GCM_12_192-NONE 183s algparse -v2 'esp=aes_gcm_16_256-null' 183s AES_GCM_16_256-NONE 183s algparse -v2 'esp=aes_ctr' 183s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 183s algparse -v2 'esp=aesctr' 183s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 183s algparse -v2 'esp=aes_ctr128' 183s AES_CTR_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 183s algparse -v2 'esp=aes_ctr192' 183s AES_CTR_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 183s algparse -v2 'esp=aes_ctr256' 183s AES_CTR_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 183s algparse -v2 'esp=camellia_cbc_256-hmac_sha2_512_256;modp8192' 183s CAMELLIA_CBC_256-HMAC_SHA2_512_256 183s algparse -v2 'esp=null_auth_aes_gmac_256-null;modp8192' 183s NULL_AUTH_AES_GMAC_256-NONE 183s algparse -v2 'esp=3des-sha1;modp8192' 183s 3DES_CBC-HMAC_SHA1_96 183s algparse -v2 'esp=3des-sha1-modp8192' 183s 3DES_CBC-HMAC_SHA1_96 183s algparse -v2 'esp=aes-sha1,3des-sha1;modp8192' 183s AES_CBC-HMAC_SHA1_96 183s 3DES_CBC-HMAC_SHA1_96 183s algparse -v2 'esp=aes-sha1-modp8192,3des-sha1-modp8192' 183s AES_CBC-HMAC_SHA1_96 183s 3DES_CBC-HMAC_SHA1_96 183s algparse -v2 'esp=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' 183s AES_CBC-HMAC_SHA1_96 183s algparse -v2 'esp=aes;none' 183s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 183s algparse -v2 'esp=aes;none,aes' 183s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 183s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 183s algparse -v2 'esp=aes;none,aes;modp2048' 183s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 183s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 183s algparse -v2 'esp=aes-sha1-none' 183s AES_CBC-HMAC_SHA1_96 183s algparse -v2 'esp=aes-sha1;none' 183s AES_CBC-HMAC_SHA1_96 183s algparse -v2 'esp=3des168-sha1' 183s ERROR: ESP encryption algorithm 3DES_CBC does not allow a key lengths 183s algparse -v2 'esp=3des-null' 183s ERROR: non-AEAD ESP encryption algorithm 3DES_CBC cannot have 'NONE' as the integrity algorithm 183s algparse -v2 'esp=aes128-null' 183s ERROR: non-AEAD ESP encryption algorithm AES_CBC cannot have 'NONE' as the integrity algorithm 183s algparse -v2 'esp=aes224-sha1' 183s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 183s algparse -v2 'esp=aes-224-sha1' 183s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 183s algparse -v2 'esp=aes0-sha1' 183s ERROR: ESP encryption key length is zero 183s algparse -v2 'esp=aes-0-sha1' 183s ERROR: ESP encryption key length is zero 183s algparse -v2 'esp=aes512-sha1' 183s ERROR: ESP encryption algorithm AES_CBC with key length 512 invalid; valid key lengths: 128, 192, 256 183s algparse -v2 'esp=aes-sha1555' 183s ERROR: ESP integrity algorithm 'sha1555' is not recognized 183s algparse -v2 'esp=camellia666-sha1' 183s ERROR: ESP encryption algorithm CAMELLIA_CBC with key length 666 invalid; valid key lengths: 128, 192, 256 183s algparse -v2 'esp=blowfish' 183s ERROR: ESP encryption algorithm 'blowfish' is not supported 183s algparse -v2 'esp=des-sha1' 183s ERROR: ESP encryption algorithm 'des' is not supported 183s algparse -v2 'esp=aes_ctr666' 183s ERROR: ESP encryption algorithm AES_CTR with key length 666 invalid; valid key lengths: 128, 192, 256 183s algparse -v2 'esp=aes128-sha2_128' 183s ERROR: ESP integrity algorithm 'sha2_128' is not recognized 183s algparse -v2 'esp=aes256-sha2_256-4096' 183s ERROR: ESP DH algorithm '4096' is not recognized 183s algparse -v2 'esp=aes256-sha2_256-128' 183s ERROR: ESP DH algorithm '128' is not recognized 183s algparse -v2 'esp=vanitycipher' 183s ERROR: ESP encryption algorithm 'vanitycipher' is not recognized 183s algparse -v2 'esp=ase-sah' 183s ERROR: ESP encryption algorithm 'ase' is not recognized 183s algparse -v2 'esp=aes-sah1' 183s ERROR: ESP integrity algorithm 'sah1' is not recognized 183s algparse -v2 'esp=id3' 183s ERROR: ESP encryption algorithm 'id3' is not recognized 183s algparse -v2 'esp=aes-id3' 183s ERROR: ESP integrity algorithm 'id3' is not recognized 183s algparse -v2 'esp=aes_gcm-md5' 183s ERROR: AEAD ESP encryption algorithm AES_GCM_16 must have 'NONE' as the integrity algorithm 183s algparse -v2 'esp=mars' 183s ERROR: ESP encryption algorithm 'mars' is not supported 183s algparse -v2 'esp=aes_gcm-16' 183s ERROR: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 183s algparse -v2 'esp=aes_gcm-0' 183s ERROR: ESP encryption key length is zero 183s algparse -v2 'esp=aes_gcm-123456789012345' 183s ERROR: ESP encryption algorithm 'aes_gcm-123456789012345' key length WAY too big 183s algparse -v2 'esp=3des-sha1;dh22' 183s ERROR: ESP DH algorithm 'dh22' is not supported 183s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2' 183s 3DES_CBC-HMAC_SHA1_96 183s 3DES_CBC-HMAC_SHA2_256_128 183s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2' 183s 3DES_CBC-HMAC_SHA1_96 183s 3DES_CBC-HMAC_SHA2_256_128 183s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2-modp8192' 183s 3DES_CBC-HMAC_SHA1_96 183s 3DES_CBC-HMAC_SHA2_256_128 183s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2;modp8192' 183s 3DES_CBC-HMAC_SHA1_96 183s 3DES_CBC-HMAC_SHA2_256_128 183s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2-modp8192' 183s 3DES_CBC-HMAC_SHA1_96 183s 3DES_CBC-HMAC_SHA2_256_128 183s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2;modp8192' 183s 3DES_CBC-HMAC_SHA1_96 183s 3DES_CBC-HMAC_SHA2_256_128 183s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2-modp2048' 183s 3DES_CBC-HMAC_SHA1_96 183s 3DES_CBC-HMAC_SHA2_256_128 183s algparse -v2 'ah' 183s HMAC_SHA2_512_256 183s HMAC_SHA2_256_128 183s HMAC_SHA1_96 183s algparse -v2 'ah=' 183s ERROR: AH proposal is empty 183s algparse -v2 'ah=md5' 183s HMAC_MD5_96 183s algparse -v2 'ah=sha' 183s HMAC_SHA1_96 183s algparse -v2 'ah=sha;modp2048' 183s algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 183s algparse: NULL [] IKEv1: ESP IKEv2: ESP 183s algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 183s algparse: Hash algorithms: 183s algparse: MD5 IKEv1: IKE IKEv2: NSS 183s algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 183s algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 183s algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 183s algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 183s algparse: IDENTITY IKEv1: IKEv2: FIPS 183s algparse: PRF algorithms: 183s algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE native(HMAC) md5 183s algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 183s algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 183s algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 183s algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 183s algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 183s algparse: Integrity algorithms: 183s algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH native(HMAC) md5, hmac_md5 183s algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 183s algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 183s algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 183s algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 183s algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 183s algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 183s algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 183s algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 183s algparse: DH algorithms: 183s algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 183s algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 183s algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 183s algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 183s algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 183s algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 183s algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 183s algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 183s algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 183s algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 183s algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 183s algparse: IPCOMP algorithms: 183s algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 183s algparse: LZS IKEv1: IKEv2: ESP AH FIPS 183s algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 183s | parsing 'AES_GCM_16_256,AES_GCM_16_128,AES_CBC_256,AES_CBC_128' for ESP 183s | proposal: 'AES_GCM_16_256' 183s | token: '' '' "AES_GCM_16_256" '' 183s | token: '' "AES_GCM_16_256" '' '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_256' is not recognized 183s | token: '' '' '' 183s | appending ESP encryption algorithm AES_GCM_16[_256] 183s | appending ESP integrity algorithm NONE[_0] 183s | proposal: 'AES_GCM_16_128' 183s | token: '' '' "AES_GCM_16_128" '' 183s | token: '' "AES_GCM_16_128" '' '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_128' is not recognized 183s | token: '' '' '' 183s | appending ESP encryption algorithm AES_GCM_16[_128] 183s | appending ESP integrity algorithm NONE[_0] 183s | proposal: 'AES_CBC_256' 183s | token: '' '' "AES_CBC_256" '' 183s | token: '' "AES_CBC_256" '' '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_256' is not recognized 183s | token: '' '' '' 183s | appending ESP encryption algorithm AES_CBC[_256] 183s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 183s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 183s | proposal: 'AES_CBC_128' 183s | token: '' '' "AES_CBC_128" '' 183s | token: '' "AES_CBC_128" '' '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_128' is not recognized 183s | token: '' '' '' 183s | appending ESP encryption algorithm AES_CBC[_128] 183s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 183s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 183s | parsing '' for ESP 183s | parsing 'aes' for ESP 183s | proposal: 'aes' 183s | token: '' '' "aes" '' 183s | token: '' "aes" '' '' 183s | token: '' '' '' 183s | appending ESP encryption algorithm AES_CBC[_0] 183s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 183s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 183s | parsing 'aes;modp2048' for ESP 183s | proposal: 'aes;modp2048' 183s | token: '' '' "aes" ';' 183s | token: '' "aes" ';' "modp2048" '' 183s | token: ';' "modp2048" '' '' 183s | appending ESP encryption algorithm AES_CBC[_0] 183s | parsing dh: 183s | appending ESP DH algorithm MODP2048[_0] 183s | token: '' '' '' 183s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 183s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 183s algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 183s | parsing 'aes-sha1' for ESP 183s | proposal: 'aes-sha1' 183s | token: '' '' "aes" '-' 183s | token: '' "aes" '-' "sha1" '' 183s | token: '-' "sha1" '' '' 183s | appending ESP encryption algorithm AES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: '' '' '' 183s | parsing 'aes-sha1' for ESP 183s | proposal: 'aes-sha1' 183s | token: '' '' "aes" '-' 183s | token: '' "aes" '-' "sha1" '' 183s | token: '-' "sha1" '' '' 183s | appending ESP encryption algorithm AES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: '' '' '' 183s | parsing 'aes-sha1-modp2048' for ESP 183s | proposal: 'aes-sha1-modp2048' 183s | token: '' '' "aes" '-' 183s | token: '' "aes" '-' "sha1" '-' 183s | token: '-' "sha1" '-' "modp2048" '' 183s | appending ESP encryption algorithm AES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: '-' "modp2048" '' '' 183s | parsing dh: 183s | appending ESP DH algorithm MODP2048[_0] 183s | token: '' '' '' 183s algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 183s | parsing 'aes-128-sha1' for ESP 183s | proposal: 'aes-128-sha1' 183s | token: '' '' "aes" '-' 183s | token: '' "aes" '-' "128" '-' 183s | token: '-' "128" '-' "sha1" '' 183s | token: '-' "sha1" '' '' 183s | appending ESP encryption algorithm AES_CBC[_128] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: '' '' '' 183s | parsing 'aes-128-sha1' for ESP 183s | proposal: 'aes-128-sha1' 183s | token: '' '' "aes" '-' 183s | token: '' "aes" '-' "128" '-' 183s | token: '-' "128" '-' "sha1" '' 183s | token: '-' "sha1" '' '' 183s | appending ESP encryption algorithm AES_CBC[_128] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: '' '' '' 183s | parsing 'aes-128-sha1-modp2048' for ESP 183s | proposal: 'aes-128-sha1-modp2048' 183s | token: '' '' "aes" '-' 183s | token: '' "aes" '-' "128" '-' 183s | token: '-' "128" '-' "sha1" '-' 183s | token: '-' "sha1" '-' "modp2048" '' 183s | appending ESP encryption algorithm AES_CBC[_128] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: '-' "modp2048" '' '' 183s | parsing dh: 183s | appending ESP DH algorithm MODP2048[_0] 183s | token: '' '' '' 183s algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 183s | parsing 'aes-128' for ESP 183s | proposal: 'aes-128' 183s | token: '' '' "aes" '-' 183s | token: '' "aes" '-' "128" '' 183s | token: '-' "128" '' '' 183s | token: '' '' '' 183s | appending ESP encryption algorithm AES_CBC[_128] 183s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 183s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 183s | parsing 'aes_gcm_a-128-null' for ESP 183s | proposal: 'aes_gcm_a-128-null' 183s | token: '' '' "aes_gcm_a" '-' 183s | token: '' "aes_gcm_a" '-' "128" '-' 183s | token: '-' "128" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_GCM_8[_128] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing '3des-sha1;modp1024' for ESP 183s | proposal: '3des-sha1;modp1024' 183s | token: '' '' "3des" '-' 183s | token: '' "3des" '-' "sha1" ';' 183s | token: '-' "sha1" ';' "modp1024" '' 183s | appending ESP encryption algorithm 3DES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: ';' "modp1024" '' '' 183s | parsing dh: 183s | ike_alg_byname() failed: ESP DH algorithm 'modp1024' is not supported 183s | lookup for DH algorithm 'modp1024' failed 183s | ... failed 'ESP DH algorithm 'modp1024' is not supported' 183s | parsing '3des-sha1;modp1536' for ESP 183s | proposal: '3des-sha1;modp1536' 183s | token: '' '' "3des" '-' 183s | token: '' "3des" '-' "sha1" ';' 183s | token: '-' "sha1" ';' "modp1536" '' 183s | appending ESP encryption algorithm 3DES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: ';' "modp1536" '' '' 183s | parsing dh: 183s | appending ESP DH algorithm MODP1536[_0] 183s | token: '' '' '' 183s algparse: ignoring ESP DH algorithm MODP1536 as PFS policy is disabled 183s | parsing '3des-sha1;modp2048' for ESP 183s | proposal: '3des-sha1;modp2048' 183s | token: '' '' "3des" '-' 183s | token: '' "3des" '-' "sha1" ';' 183s | token: '-' "sha1" ';' "modp2048" '' 183s | appending ESP encryption algorithm 3DES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: ';' "modp2048" '' '' 183s | parsing dh: 183s | appending ESP DH algorithm MODP2048[_0] 183s | token: '' '' '' 183s algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 183s | parsing '3des-sha1;dh21' for ESP 183s | proposal: '3des-sha1;dh21' 183s | token: '' '' "3des" '-' 183s | token: '' "3des" '-' "sha1" ';' 183s | token: '-' "sha1" ';' "dh21" '' 183s | appending ESP encryption algorithm 3DES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: ';' "dh21" '' '' 183s | parsing dh: 183s | appending ESP DH algorithm DH21[_0] 183s | token: '' '' '' 183s algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 183s | parsing '3des-sha1;ecp_521' for ESP 183s | proposal: '3des-sha1;ecp_521' 183s | token: '' '' "3des" '-' 183s | token: '' "3des" '-' "sha1" ';' 183s | token: '-' "sha1" ';' "ecp_521" '' 183s | appending ESP encryption algorithm 3DES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: ';' "ecp_521" '' '' 183s | parsing dh: 183s | appending ESP DH algorithm DH21[_0] 183s | token: '' '' '' 183s algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 183s | parsing '3des-sha1;dh23' for ESP 183s | proposal: '3des-sha1;dh23' 183s | token: '' '' "3des" '-' 183s | token: '' "3des" '-' "sha1" ';' 183s | token: '-' "sha1" ';' "dh23" '' 183s | appending ESP encryption algorithm 3DES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: ';' "dh23" '' '' 183s | parsing dh: 183s | ike_alg_byname() failed: ESP DH algorithm 'dh23' is not supported 183s | lookup for DH algorithm 'dh23' failed 183s | ... failed 'ESP DH algorithm 'dh23' is not supported' 183s | parsing '3des-sha1;dh24' for ESP 183s | proposal: '3des-sha1;dh24' 183s | token: '' '' "3des" '-' 183s | token: '' "3des" '-' "sha1" ';' 183s | token: '-' "sha1" ';' "dh24" '' 183s | appending ESP encryption algorithm 3DES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: ';' "dh24" '' '' 183s | parsing dh: 183s | ike_alg_byname() failed: ESP DH algorithm 'dh24' is not supported 183s | lookup for DH algorithm 'dh24' failed 183s | ... failed 'ESP DH algorithm 'dh24' is not supported' 183s | parsing '3des-sha1' for ESP 183s | proposal: '3des-sha1' 183s | token: '' '' "3des" '-' 183s | token: '' "3des" '-' "sha1" '' 183s | token: '-' "sha1" '' '' 183s | appending ESP encryption algorithm 3DES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: '' '' '' 183s | parsing 'null-sha1' for ESP 183s | proposal: 'null-sha1' 183s | token: '' '' "null" '-' 183s | token: '' "null" '-' "sha1" '' 183s | token: '-' "sha1" '' '' 183s | appending ESP encryption algorithm NULL[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: '' '' '' 183s | parsing 'aes_cbc' for ESP 183s | proposal: 'aes_cbc' 183s | token: '' '' "aes_cbc" '' 183s | token: '' "aes_cbc" '' '' 183s | token: '' '' '' 183s | appending ESP encryption algorithm AES_CBC[_0] 183s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 183s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 183s | parsing 'aes-sha' for ESP 183s | proposal: 'aes-sha' 183s | token: '' '' "aes" '-' 183s | token: '' "aes" '-' "sha" '' 183s | token: '-' "sha" '' '' 183s | appending ESP encryption algorithm AES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: '' '' '' 183s | parsing 'aes-sha1' for ESP 183s | proposal: 'aes-sha1' 183s | token: '' '' "aes" '-' 183s | token: '' "aes" '-' "sha1" '' 183s | token: '-' "sha1" '' '' 183s | appending ESP encryption algorithm AES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: '' '' '' 183s | parsing 'aes128-sha1' for ESP 183s | proposal: 'aes128-sha1' 183s | token: '' '' "aes128" '-' 183s | token: '' "aes128" '-' "sha1" '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 183s | token: '-' "sha1" '' '' 183s | appending ESP encryption algorithm AES_CBC[_128] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: '' '' '' 183s | parsing 'aes-sha2' for ESP 183s | proposal: 'aes-sha2' 183s | token: '' '' "aes" '-' 183s | token: '' "aes" '-' "sha2" '' 183s | token: '-' "sha2" '' '' 183s | appending ESP encryption algorithm AES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 183s | token: '' '' '' 183s | parsing 'aes-sha256' for ESP 183s | proposal: 'aes-sha256' 183s | token: '' '' "aes" '-' 183s | token: '' "aes" '-' "sha256" '' 183s | token: '-' "sha256" '' '' 183s | appending ESP encryption algorithm AES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 183s | token: '' '' '' 183s | parsing 'aes-sha384' for ESP 183s | proposal: 'aes-sha384' 183s | token: '' '' "aes" '-' 183s | token: '' "aes" '-' "sha384" '' 183s | token: '-' "sha384" '' '' 183s | appending ESP encryption algorithm AES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 183s | token: '' '' '' 183s | parsing 'aes-sha512' for ESP 183s | proposal: 'aes-sha512' 183s | token: '' '' "aes" '-' 183s | token: '' "aes" '-' "sha512" '' 183s | token: '-' "sha512" '' '' 183s | appending ESP encryption algorithm AES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 183s | token: '' '' '' 183s | parsing 'aes128-aes_xcbc' for ESP 183s | proposal: 'aes128-aes_xcbc' 183s | token: '' '' "aes128" '-' 183s | token: '' "aes128" '-' "aes_xcbc" '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 183s | token: '-' "aes_xcbc" '' '' 183s | appending ESP encryption algorithm AES_CBC[_128] 183s | parsing integ: 183s | appending ESP integrity algorithm AES_XCBC_96[_0] 183s | token: '' '' '' 183s | parsing 'aes192-sha1' for ESP 183s | proposal: 'aes192-sha1' 183s | token: '' '' "aes192" '-' 183s | token: '' "aes192" '-' "sha1" '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'aes192' is not recognized 183s | token: '-' "sha1" '' '' 183s | appending ESP encryption algorithm AES_CBC[_192] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: '' '' '' 183s | parsing 'aes256-sha1' for ESP 183s | proposal: 'aes256-sha1' 183s | token: '' '' "aes256" '-' 183s | token: '' "aes256" '-' "sha1" '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 183s | token: '-' "sha1" '' '' 183s | appending ESP encryption algorithm AES_CBC[_256] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: '' '' '' 183s | parsing 'aes256-sha' for ESP 183s | proposal: 'aes256-sha' 183s | token: '' '' "aes256" '-' 183s | token: '' "aes256" '-' "sha" '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 183s | token: '-' "sha" '' '' 183s | appending ESP encryption algorithm AES_CBC[_256] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: '' '' '' 183s | parsing 'aes256-sha2' for ESP 183s | proposal: 'aes256-sha2' 183s | token: '' '' "aes256" '-' 183s | token: '' "aes256" '-' "sha2" '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 183s | token: '-' "sha2" '' '' 183s | appending ESP encryption algorithm AES_CBC[_256] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 183s | token: '' '' '' 183s | parsing 'aes256-sha2_256' for ESP 183s | proposal: 'aes256-sha2_256' 183s | token: '' '' "aes256" '-' 183s | token: '' "aes256" '-' "sha2_256" '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 183s | token: '-' "sha2_256" '' '' 183s | appending ESP encryption algorithm AES_CBC[_256] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 183s | token: '' '' '' 183s | parsing 'aes256-sha2_384' for ESP 183s | proposal: 'aes256-sha2_384' 183s | token: '' '' "aes256" '-' 183s | token: '' "aes256" '-' "sha2_384" '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 183s | token: '-' "sha2_384" '' '' 183s | appending ESP encryption algorithm AES_CBC[_256] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 183s | token: '' '' '' 183s | parsing 'aes256-sha2_512' for ESP 183s | proposal: 'aes256-sha2_512' 183s | token: '' '' "aes256" '-' 183s | token: '' "aes256" '-' "sha2_512" '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 183s | token: '-' "sha2_512" '' '' 183s | appending ESP encryption algorithm AES_CBC[_256] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 183s | token: '' '' '' 183s | parsing 'camellia' for ESP 183s | proposal: 'camellia' 183s | token: '' '' "camellia" '' 183s | token: '' "camellia" '' '' 183s | token: '' '' '' 183s | appending ESP encryption algorithm CAMELLIA_CBC[_0] 183s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 183s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 183s | parsing 'camellia128' for ESP 183s | proposal: 'camellia128' 183s | token: '' '' "camellia128" '' 183s | token: '' "camellia128" '' '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'camellia128' is not recognized 183s | token: '' '' '' 183s | appending ESP encryption algorithm CAMELLIA_CBC[_128] 183s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 183s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 183s | parsing 'camellia192' for ESP 183s | proposal: 'camellia192' 183s | token: '' '' "camellia192" '' 183s | token: '' "camellia192" '' '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'camellia192' is not recognized 183s | token: '' '' '' 183s | appending ESP encryption algorithm CAMELLIA_CBC[_192] 183s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 183s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 183s | parsing 'camellia256' for ESP 183s | proposal: 'camellia256' 183s | token: '' '' "camellia256" '' 183s | token: '' "camellia256" '' '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'camellia256' is not recognized 183s | token: '' '' '' 183s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 183s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 183s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 183s | parsing 'aes_ccm' for ESP 183s | proposal: 'aes_ccm' 183s | token: '' '' "aes_ccm" '' 183s | token: '' "aes_ccm" '' '' 183s | token: '' '' '' 183s | appending ESP encryption algorithm AES_CCM_16[_0] 183s | appending ESP integrity algorithm NONE[_0] 183s | parsing 'aes_ccm_a-128-null' for ESP 183s | proposal: 'aes_ccm_a-128-null' 183s | token: '' '' "aes_ccm_a" '-' 183s | token: '' "aes_ccm_a" '-' "128" '-' 183s | token: '-' "128" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_CCM_8[_128] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_ccm_a-192-null' for ESP 183s | proposal: 'aes_ccm_a-192-null' 183s | token: '' '' "aes_ccm_a" '-' 183s | token: '' "aes_ccm_a" '-' "192" '-' 183s | token: '-' "192" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_CCM_8[_192] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_ccm_a-256-null' for ESP 183s | proposal: 'aes_ccm_a-256-null' 183s | token: '' '' "aes_ccm_a" '-' 183s | token: '' "aes_ccm_a" '-' "256" '-' 183s | token: '-' "256" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_CCM_8[_256] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_ccm_b-128-null' for ESP 183s | proposal: 'aes_ccm_b-128-null' 183s | token: '' '' "aes_ccm_b" '-' 183s | token: '' "aes_ccm_b" '-' "128" '-' 183s | token: '-' "128" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_CCM_12[_128] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_ccm_b-192-null' for ESP 183s | proposal: 'aes_ccm_b-192-null' 183s | token: '' '' "aes_ccm_b" '-' 183s | token: '' "aes_ccm_b" '-' "192" '-' 183s | token: '-' "192" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_CCM_12[_192] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_ccm_b-256-null' for ESP 183s | proposal: 'aes_ccm_b-256-null' 183s | token: '' '' "aes_ccm_b" '-' 183s | token: '' "aes_ccm_b" '-' "256" '-' 183s | token: '-' "256" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_CCM_12[_256] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_ccm_c-128-null' for ESP 183s | proposal: 'aes_ccm_c-128-null' 183s | token: '' '' "aes_ccm_c" '-' 183s | token: '' "aes_ccm_c" '-' "128" '-' 183s | token: '-' "128" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_CCM_16[_128] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_ccm_c-192-null' for ESP 183s | proposal: 'aes_ccm_c-192-null' 183s | token: '' '' "aes_ccm_c" '-' 183s | token: '' "aes_ccm_c" '-' "192" '-' 183s | token: '-' "192" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_CCM_16[_192] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_ccm_c-256-null' for ESP 183s | proposal: 'aes_ccm_c-256-null' 183s | token: '' '' "aes_ccm_c" '-' 183s | token: '' "aes_ccm_c" '-' "256" '-' 183s | token: '-' "256" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_CCM_16[_256] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_gcm' for ESP 183s | proposal: 'aes_gcm' 183s | token: '' '' "aes_gcm" '' 183s | token: '' "aes_gcm" '' '' 183s | token: '' '' '' 183s | appending ESP encryption algorithm AES_GCM_16[_0] 183s | appending ESP integrity algorithm NONE[_0] 183s | parsing 'aes_gcm_a-128-null' for ESP 183s | proposal: 'aes_gcm_a-128-null' 183s | token: '' '' "aes_gcm_a" '-' 183s | token: '' "aes_gcm_a" '-' "128" '-' 183s | token: '-' "128" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_GCM_8[_128] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_gcm_a-192-null' for ESP 183s | proposal: 'aes_gcm_a-192-null' 183s | token: '' '' "aes_gcm_a" '-' 183s | token: '' "aes_gcm_a" '-' "192" '-' 183s | token: '-' "192" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_GCM_8[_192] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_gcm_a-256-null' for ESP 183s | proposal: 'aes_gcm_a-256-null' 183s | token: '' '' "aes_gcm_a" '-' 183s | token: '' "aes_gcm_a" '-' "256" '-' 183s | token: '-' "256" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_GCM_8[_256] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_gcm_b-128-null' for ESP 183s | proposal: 'aes_gcm_b-128-null' 183s | token: '' '' "aes_gcm_b" '-' 183s | token: '' "aes_gcm_b" '-' "128" '-' 183s | token: '-' "128" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_GCM_12[_128] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_gcm_b-192-null' for ESP 183s | proposal: 'aes_gcm_b-192-null' 183s | token: '' '' "aes_gcm_b" '-' 183s | token: '' "aes_gcm_b" '-' "192" '-' 183s | token: '-' "192" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_GCM_12[_192] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_gcm_b-256-null' for ESP 183s | proposal: 'aes_gcm_b-256-null' 183s | token: '' '' "aes_gcm_b" '-' 183s | token: '' "aes_gcm_b" '-' "256" '-' 183s | token: '-' "256" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_GCM_12[_256] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_gcm_c-128-null' for ESP 183s | proposal: 'aes_gcm_c-128-null' 183s | token: '' '' "aes_gcm_c" '-' 183s | token: '' "aes_gcm_c" '-' "128" '-' 183s | token: '-' "128" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_GCM_16[_128] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_gcm_c-192-null' for ESP 183s | proposal: 'aes_gcm_c-192-null' 183s | token: '' '' "aes_gcm_c" '-' 183s | token: '' "aes_gcm_c" '-' "192" '-' 183s | token: '-' "192" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_GCM_16[_192] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_gcm_c-256-null' for ESP 183s | proposal: 'aes_gcm_c-256-null' 183s | token: '' '' "aes_gcm_c" '-' 183s | token: '' "aes_gcm_c" '-' "256" '-' 183s | token: '-' "256" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_GCM_16[_256] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_ccm_a-null' for ESP 183s | proposal: 'aes_ccm_a-null' 183s | token: '' '' "aes_ccm_a" '-' 183s | token: '' "aes_ccm_a" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_CCM_8[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_ccm_b-null' for ESP 183s | proposal: 'aes_ccm_b-null' 183s | token: '' '' "aes_ccm_b" '-' 183s | token: '' "aes_ccm_b" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_CCM_12[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_ccm_c-null' for ESP 183s | proposal: 'aes_ccm_c-null' 183s | token: '' '' "aes_ccm_c" '-' 183s | token: '' "aes_ccm_c" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_CCM_16[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_gcm_a-null' for ESP 183s | proposal: 'aes_gcm_a-null' 183s | token: '' '' "aes_gcm_a" '-' 183s | token: '' "aes_gcm_a" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_GCM_8[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_gcm_b-null' for ESP 183s | proposal: 'aes_gcm_b-null' 183s | token: '' '' "aes_gcm_b" '-' 183s | token: '' "aes_gcm_b" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_GCM_12[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_gcm_c-null' for ESP 183s | proposal: 'aes_gcm_c-null' 183s | token: '' '' "aes_gcm_c" '-' 183s | token: '' "aes_gcm_c" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_GCM_16[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_ccm-null' for ESP 183s | proposal: 'aes_ccm-null' 183s | token: '' '' "aes_ccm" '-' 183s | token: '' "aes_ccm" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_CCM_16[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_gcm-null' for ESP 183s | proposal: 'aes_gcm-null' 183s | token: '' '' "aes_gcm" '-' 183s | token: '' "aes_gcm" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_GCM_16[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_ccm-256-null' for ESP 183s | proposal: 'aes_ccm-256-null' 183s | token: '' '' "aes_ccm" '-' 183s | token: '' "aes_ccm" '-' "256" '-' 183s | token: '-' "256" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_CCM_16[_256] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_gcm-192-null' for ESP 183s | proposal: 'aes_gcm-192-null' 183s | token: '' '' "aes_gcm" '-' 183s | token: '' "aes_gcm" '-' "192" '-' 183s | token: '-' "192" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_GCM_16[_192] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_ccm_256-null' for ESP 183s | proposal: 'aes_ccm_256-null' 183s | token: '' '' "aes_ccm_256" '-' 183s | token: '' "aes_ccm_256" '-' "null" '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_256' is not recognized 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_CCM_16[_256] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_gcm_192-null' for ESP 183s | proposal: 'aes_gcm_192-null' 183s | token: '' '' "aes_gcm_192" '-' 183s | token: '' "aes_gcm_192" '-' "null" '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_192' is not recognized 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_GCM_16[_192] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_ccm_8-null' for ESP 183s | proposal: 'aes_ccm_8-null' 183s | token: '' '' "aes_ccm_8" '-' 183s | token: '' "aes_ccm_8" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_CCM_8[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_ccm_12-null' for ESP 183s | proposal: 'aes_ccm_12-null' 183s | token: '' '' "aes_ccm_12" '-' 183s | to HMAC_SHA1_96 183s algparse -v2 'ah=sha1' 183s HMAC_SHA1_96 183s algparse -v2 'ah=sha2' 183s HMAC_SHA2_256_128 183s algparse -v2 'ah=sha256' 183s ken: '' "aes_ccm_12" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_CCM_12[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_ccm_16-null' for ESP 183s | proposal: 'aes_ccm_16-null' 183s | token: '' '' "aes_ccm_16" '-' 183s | token: '' "aes_ccm_16" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_CCM_16[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_gcm_8-null' for ESP 183s | proposal: 'aes_gcm_8-null' 183s | token: '' '' "aes_gcm_8" '-' 183s | token: '' "aes_gcm_8" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_GCM_8[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_gcm_12-null' for ESP 183s | proposal: 'aes_gcm_12-null' 183s | token: '' '' "aes_gcm_12" '-' 183s | token: '' "aes_gcm_12" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_GCM_12[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_gcm_16-null' for ESP 183s | proposal: 'aes_gcm_16-null' 183s | token: '' '' "aes_gcm_16" '-' 183s | token: '' "aes_gcm_16" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_GCM_16[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_ccm_8-128-null' for ESP 183s | proposal: 'aes_ccm_8-128-null' 183s | token: '' '' "aes_ccm_8" '-' 183s | token: '' "aes_ccm_8" '-' "128" '-' 183s | token: '-' "128" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_CCM_8[_128] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_ccm_12-192-null' for ESP 183s | proposal: 'aes_ccm_12-192-null' 183s | token: '' '' "aes_ccm_12" '-' 183s | token: '' "aes_ccm_12" '-' "192" '-' 183s | token: '-' "192" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_CCM_12[_192] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_ccm_16-256-null' for ESP 183s | proposal: 'aes_ccm_16-256-null' 183s | token: '' '' "aes_ccm_16" '-' 183s | token: '' "aes_ccm_16" '-' "256" '-' 183s | token: '-' "256" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_CCM_16[_256] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_gcm_8-128-null' for ESP 183s | proposal: 'aes_gcm_8-128-null' 183s | token: '' '' "aes_gcm_8" '-' 183s | token: '' "aes_gcm_8" '-' "128" '-' 183s | token: '-' "128" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_GCM_8[_128] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_gcm_12-192-null' for ESP 183s | proposal: 'aes_gcm_12-192-null' 183s | token: '' '' "aes_gcm_12" '-' 183s | token: '' "aes_gcm_12" '-' "192" '-' 183s | token: '-' "192" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_GCM_12[_192] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_gcm_16-256-null' for ESP 183s | proposal: 'aes_gcm_16-256-null' 183s | token: '' '' "aes_gcm_16" '-' 183s | token: '' "aes_gcm_16" '-' "256" '-' 183s | token: '-' "256" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_GCM_16[_256] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_ccm_8_128-null' for ESP 183s | proposal: 'aes_ccm_8_128-null' 183s | token: '' '' "aes_ccm_8_128" '-' 183s | token: '' "aes_ccm_8_128" '-' "null" '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_8_128' is not recognized 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_CCM_8[_128] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_ccm_12_192-null' for ESP 183s | proposal: 'aes_ccm_12_192-null' 183s | token: '' '' "aes_ccm_12_192" '-' 183s | token: '' "aes_ccm_12_192" '-' "null" '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_12_192' is not recognized 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_CCM_12[_192] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_ccm_16_256-null' for ESP 183s | proposal: 'aes_ccm_16_256-null' 183s | token: '' '' "aes_ccm_16_256" '-' 183s | token: '' "aes_ccm_16_256" '-' "null" '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_16_256' is not recognized 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_CCM_16[_256] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_gcm_8_128-null' for ESP 183s | proposal: 'aes_gcm_8_128-null' 183s | token: '' '' "aes_gcm_8_128" '-' 183s | token: '' "aes_gcm_8_128" '-' "null" '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_8_128' is not recognized 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_GCM_8[_128] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_gcm_12_192-null' for ESP 183s | proposal: 'aes_gcm_12_192-null' 183s | token: '' '' "aes_gcm_12_192" '-' 183s | token: '' "aes_gcm_12_192" '-' "null" '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_12_192' is not recognized 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_GCM_12[_192] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_gcm_16_256-null' for ESP 183s | proposal: 'aes_gcm_16_256-null' 183s | token: '' '' "aes_gcm_16_256" '-' 183s | token: '' "aes_gcm_16_256" '-' "null" '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_16_256' is not recognized 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_GCM_16[_256] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_ctr' for ESP 183s | proposal: 'aes_ctr' 183s | token: '' '' "aes_ctr" '' 183s | token: '' "aes_ctr" '' '' 183s | token: '' '' '' 183s | appending ESP encryption algorithm AES_CTR[_0] 183s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 183s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 183s | parsing 'aesctr' for ESP 183s | proposal: 'aesctr' 183s | token: '' '' "aesctr" '' 183s | token: '' "aesctr" '' '' 183s | token: '' '' '' 183s | appending ESP encryption algorithm AES_CTR[_0] 183s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 183s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 183s | parsing 'aes_ctr128' for ESP 183s | proposal: 'aes_ctr128' 183s | token: '' '' "aes_ctr128" '' 183s | token: '' "aes_ctr128" '' '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr128' is not recognized 183s | token: '' '' '' 183s | appending ESP encryption algorithm AES_CTR[_128] 183s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 183s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 183s | parsing 'aes_ctr192' for ESP 183s | proposal: 'aes_ctr192' 183s | token: '' '' "aes_ctr192" '' 183s | token: '' "aes_ctr192" '' '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr192' is not recognized 183s | token: '' '' '' 183s | appending ESP encryption algorithm AES_CTR[_192] 183s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 183s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 183s | parsing 'aes_ctr256' for ESP 183s | proposal: 'aes_ctr256' 183s | token: '' '' "aes_ctr256" '' 183s | token: '' "aes_ctr256" '' '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr256' is not recognized 183s | token: '' '' '' 183s | appending ESP encryption algorithm AES_CTR[_256] 183s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 183s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 183s | parsing 'camellia_cbc_256-hmac_sha2_512_256;modp8192' for ESP 183s | proposal: 'camellia_cbc_256-hmac_sha2_512_256;modp8192' 183s | token: '' '' "camellia_cbc_256" '-' 183s | token: '' "camellia_cbc_256" '-' "hmac_sha2_512_256" ';' 183s | ike_alg_byname() failed: ESP encryption algorithm 'camellia_cbc_256' is not recognized 183s | token: '-' "hmac_sha2_512_256" ';' "modp8192" '' 183s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 183s | token: ';' "modp8192" '' '' 183s | parsing dh: 183s | appending ESP DH algorithm MODP8192[_0] 183s | token: '' '' '' 183s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 183s | parsing 'null_auth_aes_gmac_256-null;modp8192' for ESP 183s | proposal: 'null_auth_aes_gmac_256-null;modp8192' 183s | token: '' '' "null_auth_aes_gmac_256" '-' 183s | token: '' "null_auth_aes_gmac_256" '-' "null" ';' 183s | ike_alg_byname() failed: ESP encryption algorithm 'null_auth_aes_gmac_256' is not recognized 183s | token: '-' "null" ';' "modp8192" '' 183s | appending ESP encryption algorithm NULL_AUTH_AES_GMAC[_256] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: ';' "modp8192" '' '' 183s | parsing dh: 183s | appending ESP DH algorithm MODP8192[_0] 183s | token: '' '' '' 183s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 183s | parsing '3des-sha1;modp8192' for ESP 183s | proposal: '3des-sha1;modp8192' 183s | token: '' '' "3des" '-' 183s | token: '' "3des" '-' "sha1" ';' 183s | token: '-' "sha1" ';' "modp8192" '' 183s | appending ESP encryption algorithm 3DES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: ';' "modp8192" '' '' 183s | parsing dh: 183s | appending ESP DH algorithm MODP8192[_0] 183s | token: '' '' '' 183s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 183s | parsing '3des-sha1-modp8192' for ESP 183s | proposal: '3des-sha1-modp8192' 183s | token: '' '' "3des" '-' 183s | token: '' "3des" '-' "sha1" '-' 183s | token: '-' "sha1" '-' "modp8192" '' 183s | appending ESP encryption algorithm 3DES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: '-' "modp8192" '' '' 183s | parsing dh: 183s | appending ESP DH algorithm MODP8192[_0] 183s | token: '' '' '' 183s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 183s | parsing 'aes-sha1,3des-sha1;modp8192' for ESP 183s | proposal: 'aes-sha1' 183s | token: '' '' "aes" '-' 183s | token: '' "aes" '-' "sha1" '' 183s | token: '-' "sha1" '' '' 183s | appending ESP encryption algorithm AES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: '' '' '' 183s | proposal: '3des-sha1;modp8192' 183s | token: '' '' "3des" '-' 183s | token: '' "3des" '-' "sha1" ';' 183s | token: '-' "sha1" ';' "modp8192" '' 183s | appending ESP encryption algorithm 3DES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: ';' "modp8192" '' '' 183s | parsing dh: 183s | appending ESP DH algorithm MODP8192[_0] 183s | token: '' '' '' 183s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 183s | parsing 'aes-sha1-modp8192,3des-sha1-modp8192' for ESP 183s | proposal: 'aes-sha1-modp8192' 183s | token: '' '' "aes" '-' 183s | token: '' "aes" '-' "sha1" '-' 183s | token: '-' "sha1" '-' "modp8192" '' 183s | appending ESP encryption algorithm AES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: '-' "modp8192" '' '' 183s | parsing dh: 183s | appending ESP DH algorithm MODP8192[_0] 183s | token: '' '' '' 183s | proposal: '3des-sha1-modp8192' 183s | token: '' '' "3des" '-' 183s | token: '' "3des" '-' "sha1" '-' 183s | token: '-' "sha1" '-' "modp8192" '' 183s | appending ESP encryption algorithm 3DES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: '-' "modp8192" '' '' 183s | parsing dh: 183s | appending ESP DH algorithm MODP8192[_0] 183s | token: '' '' '' 183s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 183s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 183s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for ESP 183s | proposal: 'aes-sha1-modp8192' 183s | token: '' '' "aes" '-' 183s | token: '' "aes" '-' "sha1" '-' 183s | token: '-' "sha1" '-' "modp8192" '' 183s | appending ESP encryption algorithm AES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: '-' "modp8192" '' '' 183s | parsing dh: 183s | appending ESP DH algorithm MODP8192[_0] 183s | token: '' '' '' 183s | proposal: 'aes-sha1-modp8192' 183s | token: '' '' "aes" '-' 183s | token: '' "aes" '-' "sha1" '-' 183s | token: '-' "sha1" '-' "modp8192" '' 183s | appending ESP encryption algorithm AES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: '-' "modp8192" '' '' 183s | parsing dh: 183s | appending ESP DH algorithm MODP8192[_0] 183s | token: '' '' '' 183s | proposal: 'aes-sha1-modp8192' 183s | token: '' '' "aes" '-' 183s | token: '' "aes" '-' "sha1" '-' 183s | token: '-' "sha1" '-' "modp8192" '' 183s | appending ESP encryption algorithm AES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: '-' "modp8192" '' '' 183s | parsing dh: 183s | appending ESP DH algorithm MODP8192[_0] 183s | token: '' '' '' 183s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 183s | parsing 'aes;none' for ESP 183s | proposal: 'aes;none' 183s | token: '' '' "aes" ';' 183s | token: '' "aes" ';' "none" '' 183s | token: ';' "none" '' '' 183s | appending ESP encryption algorithm AES_CBC[_0] 183s | parsing dh: 183s | appending ESP DH algorithm NONE[_0] 183s | token: '' '' '' 183s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 183s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 183s algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 183s | parsing 'aes;none,aes' for ESP 183s | proposal: 'aes;none' 183s | token: '' '' "aes" ';' 183s | token: '' "aes" ';' "none" '' 183s | token: ';' "none" '' '' 183s | appending ESP encryption algorithm AES_CBC[_0] 183s | parsing dh: 183s | appending ESP DH algorithm NONE[_0] 183s | token: '' '' '' 183s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 183s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 183s | proposal: 'aes' 183s | token: '' '' "aes" '' 183s | token: '' "aes" '' '' 183s | token: '' '' '' 183s | appending ESP encryption algorithm AES_CBC[_0] 183s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 183s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 183s algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 183s | parsing 'aes;none,aes;modp2048' for ESP 183s | proposal: 'aes;none' 183s | token: '' '' "aes" ';' 183s | token: '' "aes" ';' "none" '' 183s | token: ';' "none" '' '' 183s | appending ESP encryption algorithm AES_CBC[_0] 183s | parsing dh: 183s | appending ESP DH algorithm NONE[_0] 183s | token: '' '' '' 183s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 183s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 183s | proposal: 'aes;modp2048' 183s | token: '' '' "aes" ';' 183s | token: '' "aes" ';' "modp2048" '' 183s | token: ';' "modp2048" '' '' 183s | appending ESP encryption algorithm AES_CBC[_0] 183s | parsing dh: 183s | appending ESP DH algorithm MODP2048[_0] 183s | token: '' '' '' 183s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 183s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 183s algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 183s algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 183s | parsing 'aes-sha1-none' for ESP 183s | proposal: 'aes-sha1-none' 183s | token: '' '' "aes" '-' 183s | token: '' "aes" '-' "sha1" '-' 183s | token: '-' "sha1" '-' "none" '' 183s | appending ESP encryption algorithm AES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: '-' "none" '' '' 183s | parsing dh: 183s | appending ESP DH algorithm NONE[_0] 183s | token: '' '' '' 183s algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 183s | parsing 'aes-sha1;none' for ESP 183s | proposal: 'aes-sha1;none' 183s | token: '' '' "aes" '-' 183s | token: '' "aes" '-' "sha1" ';' 183s | token: '-' "sha1" ';' "none" '' 183s | appending ESP encryption algorithm AES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: ';' "none" '' '' 183s | parsing dh: 183s | appending ESP DH algorithm NONE[_0] 183s | token: '' '' '' 183s algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 183s | parsing '3des168-sha1' for ESP 183s | proposal: '3des168-sha1' 183s | token: '' '' "3des168" '-' 183s | token: '' "3des168" '-' "sha1" '' 183s | ike_alg_byname() failed: ESP encryption algorithm '3des168' is not recognized 183s | parsing '3des-null' for ESP 183s | proposal: '3des-null' 183s | token: '' '' "3des" '-' 183s | token: '' "3des" '-' "null" '' 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm 3DES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes128-null' for ESP 183s | proposal: 'aes128-null' 183s | token: '' '' "aes128" '-' 183s | token: '' "aes128" '-' "null" '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 183s | token: '-' "null" '' '' 183s | appending ESP encryption algorithm AES_CBC[_128] 183s | parsing integ: 183s | appending ESP integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes224-sha1' for ESP 183s | proposal: 'aes224-sha1' 183s | token: '' '' "aes224" '-' 183s | token: '' "aes224" '-' "sha1" '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'aes224' is not recognized 183s | parsing 'aes-224-sha1' for ESP 183s | proposal: 'aes-224-sha1' 183s | token: '' '' "aes" '-' 183s | token: '' "aes" '-' "224" '-' 183s | byname('aes') with ='224' failed: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 183s | parsing 'aes0-sha1' for ESP 183s | proposal: 'aes0-sha1' 183s | token: '' '' "aes0" '-' 183s | token: '' "aes0" '-' "sha1" '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'aes0' is not recognized 183s | parsing 'aes-0-sha1' for ESP 183s | proposal: 'aes-0-sha1' 183s | token: '' '' "aes" '-' 183s | token: '' "aes" '-' "0" '-' 183s | parsing 'aes512-sha1' for ESP 183s | proposal: 'aes512-sha1' 183s | token: '' '' "aes512" '-' 183s | token: '' "aes512" '-' "sha1" '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'aes512' is not recognized 183s | parsing 'aes-sha1555' for ESP 183s | proposal: 'aes-sha1555' 183s | token: '' '' "aes" '-' 183s | token: '' "aes" '-' "sha1555" '' 183s | token: '-' "sha1555" '' '' 183s | appending ESP encryption algorithm AES_CBC[_0] 183s | parsing integ: 183s | ike_alg_byname() failed: ESP integrity algorithm 'sha1555' is not recognized 183s | lookup for integrity algorithm 'sha1555' failed 183s | or - failed 'ESP integrity algorithm 'sha1555' is not recognized') 183s | parsing 'camellia666-sha1' for ESP 183s | proposal: 'camellia666-sha1' 183s | token: '' '' "camellia666" '-' 183s | token: '' "camellia666" '-' "sha1" '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'camellia666' is not recognized 183s | parsing 'blowfish' for ESP 183s | proposal: 'blowfish' 183s | token: '' '' "blowfish" '' 183s | token: '' "blowfish" '' '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'blowfish' is not supported 183s | parsing 'des-sha1' for ESP 183s | proposal: 'des-sha1' 183s | token: '' '' "des" '-' 183s | token: '' "des" '-' "sha1" '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'des' is not supported 183s | parsing 'aes_ctr666' for ESP 183s | proposal: 'aes_ctr666' 183s | token: '' '' "aes_ctr666" '' 183s | token: '' "aes_ctr666" '' '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr666' is not recognized 183s | parsing 'aes128-sha2_128' for ESP 183s | proposal: 'aes128-sha2_128' 183s | token: '' '' "aes128" '-' 183s | token: '' "aes128" '-' "sha2_128" '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 183s | token: '-' "sha2_128" '' '' 183s | appending ESP encryption algorithm AES_CBC[_128] 183s | parsing integ: 183s | ike_alg_byname() failed: ESP integrity algorithm 'sha2_128' is not recognized 183s | lookup for integrity algorithm 'sha2_128' failed 183s | or - failed 'ESP integrity algorithm 'sha2_128' is not recognized') 183s | parsing 'aes256-sha2_256-4096' for ESP 183s | proposal: 'aes256-sha2_256-4096' 183s | token: '' '' "aes256" '-' 183s | token: '' "aes256" '-' "sha2_256" '-' 183s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 183s | token: '-' "sha2_256" '-' "4096" '' 183s | appending ESP encryption algorithm AES_CBC[_256] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 183s | token: '-' "4096" '' '' 183s | parsing dh: 183s | ike_alg_byname() failed: ESP DH algorithm '4096' is not recognized 183s | lookup for DH algorithm '4096' failed 183s | ... failed 'ESP DH algorithm '4096' is not recognized' 183s | parsing 'aes256-sha2_256-128' for ESP 183s | proposal: 'aes256-sha2_256-128' 183s | token: '' '' "aes256" '-' 183s | token: '' "aes256" '-' "sha2_256" '-' 183s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 183s | token: '-' "sha2_256" '-' "128" '' 183s | appending ESP encryption algorithm AES_CBC[_256] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 183s | token: '-' "128" '' '' 183s | parsing dh: 183s | ike_alg_byname() failed: ESP DH algorithm '128' is not recognized 183s | lookup for DH algorithm '128' failed 183s | ... failed 'ESP DH algorithm '128' is not recognized' 183s | parsing 'vanitycipher' for ESP 183s | proposal: 'vanitycipher' 183s | token: '' '' "vanitycipher" '' 183s | token: '' "vanitycipher" '' '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'vanitycipher' is not recognized 183s | parsing 'ase-sah' for ESP 183s | proposal: 'ase-sah' 183s | token: '' '' "ase" '-' 183s | token: '' "ase" '-' "sah" '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'ase' is not recognized 183s | parsing 'aes-sah1' for ESP 183s | proposal: 'aes-sah1' 183s | token: '' '' "aes" '-' 183s | token: '' "aes" '-' "sah1" '' 183s | token: '-' "sah1" '' '' 183s | appending ESP encryption algorithm AES_CBC[_0] 183s | parsing integ: 183s | ike_alg_byname() failed: ESP integrity algorithm 'sah1' is not recognized 183s | lookup for integrity algorithm 'sah1' failed 183s | or - failed 'ESP integrity algorithm 'sah1' is not recognized') 183s | parsing 'id3' for ESP 183s | proposal: 'id3' 183s | token: '' '' "id3" '' 183s | token: '' "id3" '' '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 183s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 183s | parsing 'aes-id3' for ESP 183s | proposal: 'aes-id3' 183s | token: '' '' "aes" '-' 183s | token: '' "aes" '-' "id3" '' 183s | token: '-' "id3" '' '' 183s | appending ESP encryption algorithm AES_CBC[_0] 183s | parsing integ: 183s | ike_alg_byname() failed: ESP integrity algorithm 'id3' is not recognized 183s | lookup for integrity algorithm 'id3' failed 183s | or - failed 'ESP integrity algorithm 'id3' is not recognized') 183s | parsing 'aes_gcm-md5' for ESP 183s | proposal: 'aes_gcm-md5' 183s | token: '' '' "aes_gcm" '-' 183s | token: '' "aes_gcm" '-' "md5" '' 183s | token: '-' "md5" '' '' 183s | appending ESP encryption algorithm AES_GCM_16[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_MD5_96[_0] 183s | token: '' '' '' 183s | parsing 'mars' for ESP 183s | proposal: 'mars' 183s | token: '' '' "mars" '' 183s | token: '' "mars" '' '' 183s | ike_alg_byname() failed: ESP encryption algorithm 'mars' is not supported 183s | parsing 'aes_gcm-16' for ESP 183s | proposal: 'aes_gcm-16' 183s | token: '' '' "aes_gcm" '-' 183s | token: '' "aes_gcm" '-' "16" '' 183s | byname('aes_gcm') with ='16' failed: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 183s | parsing 'aes_gcm-0' for ESP 183s | proposal: 'aes_gcm-0' 183s | token: '' '' "aes_gcm" '-' 183s | token: '' "aes_gcm" '-' "0" '' 183s | parsing 'aes_gcm-123456789012345' for ESP 183s | proposal: 'aes_gcm-123456789012345' 183s | token: '' '' "aes_gcm" '-' 183s | token: '' "aes_gcm" '-' "123456789012345" '' 183s | parsing '3des-sha1;dh22' for ESP 183s | proposal: '3des-sha1;dh22' 183s | token: '' '' "3des" '-' 183s | token: '' "3des" '-' "sha1" ';' 183s | token: '-' "sha1" ';' "dh22" '' 183s | appending ESP encryption algorithm 3DES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: ';' "dh22" '' '' 183s | parsing dh: 183s | ike_alg_byname() failed: ESP DH algorithm 'dh22' is not supported 183s | lookup for DH algorithm 'dh22' failed 183s | ... failed 'ESP DH algorithm 'dh22' is not supported' 183s | parsing '3des-sha1;modp8192,3des-sha2' for ESP 183s | proposal: '3des-sha1;modp8192' 183s | token: '' '' "3des" '-' 183s | token: '' "3des" '-' "sha1" ';' 183s | token: '-' "sha1" ';' "modp8192" '' 183s | appending ESP encryption algorithm 3DES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: ';' "modp8192" '' '' 183s | parsing dh: 183s | appending ESP DH algorithm MODP8192[_0] 183s | token: '' '' '' 183s | proposal: '3des-sha2' 183s | token: '' '' "3des" '-' 183s | token: '' "3des" '-' "sha2" '' 183s | token: '-' "sha2" '' '' 183s | appending ESP encryption algorithm 3DES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 183s | token: '' '' '' 183s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 183s | parsing '3des-sha1-modp8192,3des-sha2' for ESP 183s | proposal: '3des-sha1-modp8192' 183s | token: '' '' "3des" '-' 183s | token: '' "3des" '-' "sha1" '-' 183s | token: '-' "sha1" '-' "modp8192" '' 183s | appending ESP encryption algorithm 3DES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: '-' "modp8192" '' '' 183s | parsing dh: 183s | appending ESP DH algorithm MODP8192[_0] 183s | token: '' '' '' 183s | proposal: '3des-sha2' 183s | token: '' '' "3des" '-' 183s | token: '' "3des" '-' "sha2" '' 183s | token: '-' "sha2" '' '' 183s | appending ESP encryption algorithm 3DES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 183s | token: '' '' '' 183s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 183s | parsing '3des-sha1-modp8192,3des-sha2-modp8192' for ESP 183s | proposal: '3des-sha1-modp8192' 183s | token: '' '' "3des" '-' 183s | token: '' "3des" '-' "sha1" '-' 183s | token: '-' "sha1" '-' "modp8192" '' 183s | appending ESP encryption algorithm 3DES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: '-' "modp8192" '' '' 183s | parsing dh: 183s | appending ESP DH algorithm MODP8192[_0] 183s | token: '' '' '' 183s | proposal: '3des-sha2-modp8192' 183s | token: '' '' "3des" '-' 183s | token: '' "3des" '-' "sha2" '-' 183s | token: '-' "sha2" '-' "modp8192" '' 183s | appending ESP encryption algorithm 3DES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 183s | token: '-' "modp8192" '' '' 183s | parsing dh: 183s | appending ESP DH algorithm MODP8192[_0] 183s | token: '' '' '' 183s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 183s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 183s | parsing '3des-sha1-modp8192,3des-sha2;modp8192' for ESP 183s | proposal: '3des-sha1-modp8192' 183s | token: '' '' "3des" '-' 183s | token: '' "3des" '-' "sha1" '-' 183s | token: '-' "sha1" '-' "modp8192" '' 183s | appending ESP encryption algorithm 3DES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: '-' "modp8192" '' '' 183s | parsing dh: 183s | appending ESP DH algorithm MODP8192[_0] 183s | token: '' '' '' 183s | proposal: '3des-sha2;modp8192' 183s | token: '' '' "3des" '-' 183s | token: '' "3des" '-' "sha2" ';' 183s | token: '-' "sha2" ';' "modp8192" '' 183s | appending ESP encryption algorithm 3DES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 183s | token: ';' "modp8192" '' '' 183s | parsing dh: 183s | appending ESP DH algorithm MODP8192[_0] 183s | token: '' '' '' 183s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 183s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 183s | parsing '3des-sha1;modp8192,3des-sha2-modp8192' for ESP 183s | proposal: '3des-sha1;modp8192' 183s | token: '' '' "3des" '-' 183s | token: '' "3des" '-' "sha1" ';' 183s | token: '-' "sha1" ';' "modp8192" '' 183s | appending ESP encryption algorithm 3DES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: ';' "modp8192" '' '' 183s | parsing dh: 183s | appending ESP DH algorithm MODP8192[_0] 183s | token: '' '' '' 183s | proposal: '3des-sha2-modp8192' 183s | token: '' '' "3des" '-' 183s | token: '' "3des" '-' "sha2" '-' 183s | token: '-' "sha2" '-' "modp8192" '' 183s | appending ESP encryption algorithm 3DES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 183s | token: '-' "modp8192" '' '' 183s | parsing dh: 183s | appending ESP DH algorithm MODP8192[_0] 183s | token: '' '' '' 183s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 183s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 183s | parsing '3des-sha1;modp8192,3des-sha2;modp8192' for ESP 183s | proposal: '3des-sha1;modp8192' 183s | token: '' '' "3des" '-' 183s | token: '' "3des" '-' "sha1" ';' 183s | token: '-' "sha1" ';' "modp8192" '' 183s | appending ESP encryption algorithm 3DES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: ';' "modp8192" '' '' 183s | parsing dh: 183s | appending ESP DH algorithm MODP8192[_0] 183s | token: '' '' '' 183s | proposal: '3des-sha2;modp8192' 183s | token: '' '' "3des" '-' 183s | token: '' "3des" '-' "sha2" ';' 183s | token: '-' "sha2" ';' "modp8192" '' 183s | appending ESP encryption algorithm 3DES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 183s | token: ';' "modp8192" '' '' 183s | parsing dh: 183s | appending ESP DH algorithm MODP8192[_0] 183s | token: '' '' '' 183s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 183s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 183s | parsing '3des-sha1-modp8192,3des-sha2-modp2048' for ESP 183s | proposal: '3des-sha1-modp8192' 183s | token: '' '' "3des" '-' 183s | token: '' "3des" '-' "sha1" '-' 183s | token: '-' "sha1" '-' "modp8192" '' 183s | appending ESP encryption algorithm 3DES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 183s | token: '-' "modp8192" '' '' 183s | parsing dh: 183s | appending ESP DH algorithm MODP8192[_0] 183s | token: '' '' '' 183s | proposal: '3des-sha2-modp2048' 183s | token: '' '' "3des" '-' 183s | token: '' "3des" '-' "sha2" '-' 183s | token: '-' "sha2" '-' "modp2048" '' 183s | appending ESP encryption algorithm 3DES_CBC[_0] 183s | parsing integ: 183s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 183s | token: '-' "modp2048" '' '' 183s | parsing dh: 183s | appending ESP DH algorithm MODP2048[_0] 183s | token: '' '' '' 183s algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 183s algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 183s | parsing 'SHA2_512_256,SHA2_256_128,SHA1_96' for AH 183s | proposal: 'SHA2_512_256' 183s | token: '' '' "SHA2_512_256" '' 183s | token: '' "SHA2_512_256" '' '' 183s | parsing integ: 183s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 183s | token: '' '' '' 183s | proposal: 'SHA2_256_128' 183s | token: '' '' "SHA2_256_128" '' 183s | token: '' "SHA2_256_128" '' '' 183s | parsing integ: 183s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 183s | token: '' '' '' 183s | proposal: 'SHA1_96' 183s | token: '' '' "SHA1_96" '' 183s | token: '' "SHA1_96" '' '' 183s | parsing integ: 183s | appending AH integrity algorithm HMAC_SHA1_96[_0] 183s | token: '' '' '' 183s | parsing '' for AH 183s | parsing 'md5' for AH 183s | proposal: 'md5' 183s | token: '' '' "md5" '' 183s | token: '' "md5" '' '' 183s | parsing integ: 183s | appending AH integrity algorithm HMAC_MD5_96[_0] 183s | token: '' '' '' 183s | parsing 'sha' for AH 183s | proposal: 'sha' 183s | token: '' '' "sha" '' 183s | token: '' "sha" '' '' 183s | parsing integ: 183s | appending AH integrity algorithm HMAC_SHA1_96[_0] 183s | token: '' '' '' 183s | parsing 'sha;modp2048' for AH 183s | proposal: 'sha;modp2048' 183s | token: '' '' "sha" ';' 183s | token: '' "sha" ';' "modp2048" '' 183s | parsing integ: 183s | appending AH integrity algorithm HMAC_SHA1_96[_0] 183s | token: ';' "modp2048" '' '' 183s | parsing dh: 183s | appending AH DH algorithm MODP2048[_0] 183s | token: '' '' '' 183s algparse: ignoring AH DH algorithm MODP2048 as PFS policy is disabled 183s | parsing 'sha1' for AH 183s | proposal: 'sha1' 183s | token: '' '' "sha1" '' 183s | token: '' "sha1" '' '' 183s | parsing integ: 183s | appending AH integrity algorithm HMAC_SHA1_96[_0] 183s | token: '' '' '' 183s | parsing 'sha2' for AH 183s | proposal: 'sha2' 183s | token: '' '' "sha2" '' 183s | token: '' "sha2" '' '' 183s | parsing integ: 183s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 183s | token: '' '' '' 183s | parsing 'sha256' for AH 183s | proposal: 'sha256' 183s | token: '' '' "sha256" '' 183s | token: '' "sha256" '' '' 183s | parsing integ: 183s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 183s | token: '' '' '' 183s | parsing 'sha384' for AH 183s | proposal: 'sha384' 183s | token: '' '' "sha384" '' 183s | token: '' "sha384" '' '' 183s | parsing integ: 183s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 183s | token: '' '' '' 183s | parsing 'sha512' for AH 183s | proposal: 'sha512' 183s | token: '' '' "sha512" '' 183s | token: '' "sha512" '' '' 183s | parsing integ: 183s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 183s | token: '' '' '' 183s | parsing 'sha2_256' for AH 183s | proposal: 'sha2_256' 183s | token: '' '' "sha2_256" '' 183s | token: '' "sha2_256" '' '' 183s | parsing integ: 183s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 183s | token: '' '' '' 183s | parsing 'sha2_384' for AH 183s | proposal: 'sha2_384' 183s | token: '' '' "sha2_384" '' 183s | token: '' "sha2_384" '' '' 183s | parsing integ: 183s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 183s | token: '' '' '' 183s | parsing 'sha2_512' for AH 183s | proposal: 'sha2_512' 183s | token: '' '' "sha2_512" '' 183s | token: '' "sha2_512" '' '' 183s | parsing integ: 183s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 183s | token: '' '' '' 183s | parsing 'aes_xcbc' for AH 183s | proposal: 'aes_xcbc' 183s | token: '' '' "aes_xcbc" '' 183s | token: '' "aes_xcbc" '' '' 183s | parsing integ: 183s | appending AH integrity algorithm AES_XCBC_96[_0] 183s | token: '' '' '' 183s | parsing 'sha2-none' for AH 183s | proposal: 'sha2-none' 183s | token: '' '' "sha2" '-' 183s | token: '' "sha2" '-' "none" '' 183s | parsing integ: 183s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 183s | token: '-' "none" '' '' 183s | parsing dh: 183s | appending AH DH algorithm NONE[_0] 183s | token: '' '' '' 183s algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 183s | parsing 'sha2;none' for AH 183s | proposal: 'sha2;none' 183s | token: '' '' "sha2" ';' 183s | token: '' "sha2" ';' "none" '' 183s | parsing integ: 183s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 183s | token: ';' "none" '' '' 183s | parsing dh: 183s | appending AH DH algorithm NONE[_0] 183s | token: '' '' '' 183s algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 183s | parsing 'sha1-modp8192,sha1-modp8192,sha1-modp8192' for AH 183s | proposal: 'sha1-modp8192' 183s | token: '' '' "sha1" '-' 183s | token: '' "sha1" '-' "modp8192" '' 183s | parsing integ: 183s | appending AH integrity algorithm HMAC_SHA1_96[_0] 183s | token: '-' "modp8192" '' '' 183s | parsing dh: 183s | appending AH DH algorithm MODP8192[_0] 183s | token: '' '' '' 183s | proposal: 'sha1-modp8192' 183s | token: '' '' "sha1" '-' 183s | token: '' "sha1" '-' "modp8192" '' 183s | parsing integ: 183s | appending AH integrity algorithm HMAC_SHA1_96[_0] 183s | token: '-' "modp8192" '' '' 183s | parsing dh: 183s | appending AH DH algorithm MODP8192[_0] 183s | token: '' '' '' 183s | proposal: 'sha1-modp8192' 183s | token: '' '' "sha1" '-' 183s | token: '' "sha1" '-' "modp8192" '' 183s | parsing integ: 183s | appending AH integrity algorithm HMAC_SHA1_96[_0] 183s | token: '-' "modp8192" '' '' 183s | parsing dh: 183s | appending AH DH algorithm MODP8192[_0] 183s | token: '' '' '' 183s algparse: ignoring AH DH algorithm MODP8192 as PFS policy is disabled 183s | parsing 'aes-sha1' for AH 183s | proposal: 'aes-sha1' 183s | token: '' '' "aes" '-' 183s | token: '' "aes" '-' "sha1" '' 183s | parsing integ: 183s | ike_alg_byname() failed: AH integrity algorithm 'aes' is not recognized 183s | lookup for integrity algorithm 'aes' failed 183s | or - failed 'AH integrity algorithm 'aes' is not recognized') 183s | parsing 'vanityhash1' for AH 183s | proposal: 'vanityhash1' 183s | token: '' '' "vanityhash1" '' 183s | token: '' "vanityhash1" '' '' 183s | parsing integ: 183s | ike_alg_byname() failed: AH integrity algorithm 'vanityhash1' is not recognized 183s | lookup for integrity algorithm 'vanityhash1' failed 183s | or - failed 'AH integrity algorithm 'vanityhash1' is not recognized') 183s | parsing 'aes_gcm_c-256' for AH 183s | proposal: 'aes_gcm_c-256' 183s | token: '' '' "aes_gcm_c" '-' 183s | token: '' "aes_gcm_c" '-' "256" '' 183s | parsing integ: 183s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm_c' is not recognized 183s | lookup for integrity algorithm 'aes_gcm_c' failed 183s | or - failed 'AH integrity algorithm 'aes_gcm_c' is not recognized') 183s | parsing 'id3' for AH 183s | proposal: 'id3' 183s | token: '' '' "id3" '' 183s | token: '' "id3" '' '' 183s | parsing integ: 183s | ike_alg_byname() failed: AH integrity algorithm 'id3' is not recognized 183s | lookup for integrity algorithm 'id3' failed 183s | or - failed 'AH integrity algorithm 'id3' is not recognized') 183s | parsing '3des' for AH 183s | proposal: '3des' 183s | token: '' '' "3des" '' 183s | token: '' "3des" '' '' 183s | parsing integ: 183s | ike_alg_byname() failed: AH integrity algorithm '3des' is not recognized 183s | lookup for integrity algorithm '3des' failed 183s | or - failed 'AH integrity algorithm '3des' is not recognized') 183s | parsing 'null' for AH 183s | proposal: 'null' 183s | token: '' '' "null" '' 183s | token: '' "null" '' '' 183s | parsing integ: 183s | appending AH integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | parsing 'aes_gcm' for AH 183s | proposal: 'aes_gcm' 183s | token: '' '' "aes_gcm" '' 183s | token: '' "aes_gcm" '' '' 183s | parsing integ: 183s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm' is not recognized 183s | lookup for integrity algorithm 'aes_gcm' failed 183s | or - failed 'AH integrity algorithm 'aes_gcm' is not recognized') 183s | parsing 'aes_ccm' for AH 183s | proposal: 'aes_ccm' 183s | token: '' '' "aes_ccm" '' 183s | token: '' "aes_ccm" '' '' 183s | parsing integ: 183s | ike_alg_byname() failed: AH integrity algorithm 'aes_ccm' is not recognized 183s | lookup for integrity algorithm 'aes_ccm' failed 183s | or - failed 'AH integrity algorithm 'aes_ccm' is not recognized') 183s | parsing 'ripemd' for AH 183s | proposal: 'ripemd' 183s | token: '' '' "ripemd" '' 183s | token: '' "ripemd" '' '' 183s | parsing integ: 183s | ike_alg_byname() failed: AH integrity algorithm 'ripemd' is not recognized 183s | lookup for integrity algorithm 'ripemd' failed 183s | or - failed 'AH integrity algorithm 'ripemd' is not recognized') 183s | parsing 'AES_GCM_16_256,AES_GCM_16_128,AES_CBC_256,AES_CBC_128' for IKE 183s | proposal: 'AES_GCM_16_256' 183s | token: '' '' "AES_GCM_16_256" '' 183s | token: '' "AES_GCM_16_256" '' '' 183s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_256' is not recognized 183s | token: '' '' '' 183s | appending IKE encryption algorithm AES_GCM_16[_256] 183s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 183s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 183s | appending IKE integrity algorithm NONE[_0] 183s | appending IKE DH algorithm MODP2048[_0] 183s | appending IKE DH algorithm MODP3072[_0] 183s | appending IKE DH algorithm MODP4096[_0] 183s | appending IKE DH algorithm MODP8192[_0] 183s | appending IKE DH algorithm DH19[_0] 183s | appending IKE DH algorithm DH20[_0] 183s | appending IKE DH algorithm DH21[_0] 183s | appending IKE DH algorithm DH31[_0] 183s | proposal: 'AES_GCM_16_128' 183s | token: '' '' "AES_GCM_16_128" '' 183s | token: '' "AES_GCM_16_128" '' '' 183s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_128' is not recognized 183s | token: '' '' '' 183s | appending IKE encryption algorithm AES_GCM_16[_128] 183s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 183s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 183s | appending IKE integrity algorithm NONE[_0] 183s | appending IKE DH algorithm MODP2048[_0] 183s | appending IKE DH algorithm MODP3072[_0] 183s | appending IKE DH algorithm MODP4096[_0] 183s | appending IKE DH algorithm MODP8192[_0] 183s | appending IKE DH algorithm DH19[_0] 183s | appending IKE DH algorithm DH20[_0] 183s | appending IKE DH algorithm DH21[_0] 183s | appending IKE DH algorithm DH31[_0] 183s | proposal: 'AES_CBC_256' 183s | token: '' '' "AES_CBC_256" '' 183s | token: '' "AES_CBC_256" '' '' 183s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_256' is not recognized 183s | token: '' '' '' 183s | appending IKE encryption algorithm AES_CBC[_256] 183s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 183s | HMAC_SHA2_256_128 183s algparse -v2 'ah=sha384' 183s HMAC_SHA2_384_192 183s algparse -v2 'ah=sha512' 183s HMAC_SHA2_512_256 183s algparse -v2 'ah=sha2_256' 183s HMAC_SHA2_256_128 183s algparse -v2 'ah=sha2_384' 183s HMAC_SHA2_384_192 183s algparse -v2 'ah=sha2_512' 183s HMAC_SHA2_512_256 183s algparse -v2 'ah=aes_xcbc' 183s AES_XCBC_96 183s algparse -v2 'ah=sha2-none' 183s HMAC_SHA2_256_128 183s algparse -v2 'ah=sha2;none' 183s HMAC_SHA2_256_128 183s algparse -v2 'ah=sha1-modp8192,sha1-modp8192,sha1-modp8192' 183s HMAC_SHA1_96 183s algparse -v2 'ah=aes-sha1' 183s ERROR: AH integrity algorithm 'aes' is not recognized 183s algparse -v2 'ah=vanityhash1' 183s ERROR: AH integrity algorithm 'vanityhash1' is not recognized 183s algparse -v2 'ah=aes_gcm_c-256' 183s ERROR: AH integrity algorithm 'aes_gcm_c' is not recognized 183s algparse -v2 'ah=id3' 183s ERROR: AH integrity algorithm 'id3' is not recognized 183s algparse -v2 'ah=3des' 183s ERROR: AH integrity algorithm '3des' is not recognized 183s algparse -v2 'ah=null' 183s ERROR: AH cannot have 'none' as the integrity algorithm 183s algparse -v2 'ah=aes_gcm' 183s ERROR: AH integrity algorithm 'aes_gcm' is not recognized 183s algparse -v2 'ah=aes_ccm' 183s ERROR: AH integrity algorithm 'aes_ccm' is not recognized 183s algparse -v2 'ah=ripemd' 183s ERROR: AH integrity algorithm 'ripemd' is not recognized 183s algparse -v2 'ike' 183s AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 183s AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 183s AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 183s AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 183s algparse -v2 'ike=' 183s ERROR: IKE proposal is empty 183s algparse -v2 'ike=3des-sha1' 183s 3DES_CBC-HMAC_SHA1-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 183s algparse -v2 'ike=3des-sha1' 183s 3DES_CBC-HMAC_SHA1-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 183s algparse -v2 'ike=3des-sha1;modp1536' 183s 3DES_CBC-HMAC_SHA1-MODP1536 183s algparse -v2 'ike=3des;dh21' 183s 3DES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH21 183s algparse -v2 'ike=3des-sha1;dh21' 183s 3DES_CBC-HMAC_SHA1-DH21 183s algparse -v2 'ike=3des-sha1-ecp_521' 183s 3DES_CBC-HMAC_SHA1-DH21 183s algparse -v2 'ike=3des+aes' 183s 3DES_CBC+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 183s algparse -v2 'ike=aes;none' 183s ERROR: IKE DH algorithm 'none' not permitted 183s algparse -v2 'ike=id2' 183s ERROR: IKE encryption algorithm 'id2' is not recognized 183s algparse -v2 'ike=3des-id2' 183s ERROR: IKE PRF algorithm 'id2' is not recognized 183s algparse -v2 'ike=aes_ccm' 183s ERROR: IKE encryption algorithm 'aes_ccm' is not supported 183s algparse -v2 'ike=aes-sha1-sha2-ecp_521' 183s ERROR: IKE DH algorithm 'sha2' is not recognized 183s algparse -v2 'ike=aes-sha2-sha2;ecp_521' 183s ERROR: IKE DH algorithm 'sha2' is not recognized 183s algparse -v2 'ike=aes-sha1_96-sha2-ecp_521' 183s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 183s algparse -v2 'ike=aes-sha1_96-sha2;ecp_521' 183s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 183s algparse -v2 'ike=aes+aes-sha1+sha1-modp8192+modp8192' 183s AES_CBC-HMAC_SHA1-MODP8192 183s algparse -v2 'ike=3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' 183s 3DES_CBC+AES_CBC-HMAC_SHA2_256+HMAC_SHA1-MODP4096+MODP8192 183s algparse -v2 'ike=aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' 183s AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 183s algparse -v2 'ike=aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' 183s AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 183s algparse -v2 'ike=aes+aes128+aes256' 183s AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 183s algparse -v2 'ike=aes128+aes+aes256' 183s AES_CBC_128+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 183s algparse -v2 'ike=aes128+aes256+aes' 183s AES_CBC_128+AES_CBC_256+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 183s algparse -v2 'ike=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' 183s AES_CBC-HMAC_SHA1-MODP8192 183s algparse -v2 'ike=aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' 183s AES_CBC-HMAC_SHA1-MODP8192 183s AES_CBC-HMAC_SHA2_256-MODP8192 183s algparse -v2 'ike=aes_gcm' 183s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 183s algparse -v2 'ike=aes_gcm-sha2' 183s AES_GCM_16-HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 183s algparse -v2 'ike=aes_gcm-sha2-modp2048' 183s AES_GCM_16-HMAC_SHA2_256-MODP2048 183s algparse -v2 'ike=aes_gcm-sha2;modp2048' 183s AES_GCM_16-HMAC_SHA2_256-MODP2048 183s algparse -v2 'ike=aes_gcm-modp2048' 183s ERROR: IKE PRF algorithm 'modp2048' is not recognized 183s algparse -v2 'ike=aes_gcm;modp2048' 183s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 183s algparse -v2 'ike=aes_gcm-none' 183s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 183s algparse -v2 'ike=aes_gcm-none-sha2' 183s AES_GCM_16-HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 183s algparse -v2 'ike=aes_gcm-none-sha2-modp2048' 183s AES_GCM_16-HMAC_SHA2_256-MODP2048 183s algparse -v2 'ike=aes_gcm-none-sha2;modp2048' 183s AES_GCM_16-HMAC_SHA2_256-MODP2048 183s algparse -v2 'ike=aes_gcm-none-modp2048' 183s ERROR: IKE PRF algorithm 'modp2048' is not recognized 183s algparse -v2 'ike=aes_gcm-none;modp2048' 183s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 183s algparse -v2 'ike=aes_gcm-sha1-none-modp2048' 183s ERROR: IKE proposal contains unexpected 'modp2048' 183s algparse -v2 'ike=aes_gcm-sha1-none;modp2048' 183s ERROR: IKE proposal contains unexpected 'modp2048' 183s algparse -v2 'ike=aes+aes_gcm' 183s ERROR: AEAD and non-AEAD IKE encryption algorithm cannot be combined 183s algparse -v2 'ike=,' 183s ERROR: IKE encryption algorithm is empty 183s algparse -v2 'ike=aes,' 183s ERROR: IKE encryption algorithm is empty 183s algparse -v2 'ike=aes,,aes' 183s ERROR: IKE encryption algorithm is empty 183s algparse -v2 'ike=,aes' 183s ERROR: IKE encryption algorithm is empty 183s algparse -v2 'ike=-' 183s ERROR: IKE encryption algorithm is empty 183s algparse -v2 'ike=+' 183s ERROR: IKE encryption algorithm is empty 183s algparse -v2 'ike=;' 183s ERROR: IKE encryption algorithm is empty 183s algparse -v2 'ike=aes-' 183s ERROR: IKE PRF algorithm is empty 183s algparse -v2 'ike=aes+' 183s ERROR: IKE encryption algorithm is empty 183s algparse -v2 'ike=aes;' 183s ERROR: IKE DH algorithm is empty 183s algparse -v2 'ike=-aes' 183s ERROR: IKE encryption algorithm is empty 183s algparse -v2 'ike=+aes' 183s ERROR: IKE encryption algorithm is empty 183s algparse -v2 'ike=;aes' 183s ERROR: IKE encryption algorithm is empty 183s algparse -v2 'ike=aes+-' 183s ERROR: IKE encryption algorithm is empty 183s algparse -v2 'ike=aes+;' 183s ERROR: IKE encryption algorithm is empty 183s algparse -v2 'ike=aes++' 183s ERROR: IKE encryption algorithm is empty 183s testing -ta 183s appending IKE PRF algorithm HMAC_SHA2_256[_0] 183s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 183s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 183s | appending IKE DH algorithm MODP2048[_0] 183s | appending IKE DH algorithm MODP3072[_0] 183s | appending IKE DH algorithm MODP4096[_0] 183s | appending IKE DH algorithm MODP8192[_0] 183s | appending IKE DH algorithm DH19[_0] 183s | appending IKE DH algorithm DH20[_0] 183s | appending IKE DH algorithm DH21[_0] 183s | appending IKE DH algorithm DH31[_0] 183s | proposal: 'AES_CBC_128' 183s | token: '' '' "AES_CBC_128" '' 183s | token: '' "AES_CBC_128" '' '' 183s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_128' is not recognized 183s | token: '' '' '' 183s | appending IKE encryption algorithm AES_CBC[_128] 183s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 183s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 183s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 183s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 183s | appending IKE DH algorithm MODP2048[_0] 183s | appending IKE DH algorithm MODP3072[_0] 183s | appending IKE DH algorithm MODP4096[_0] 183s | appending IKE DH algorithm MODP8192[_0] 183s | appending IKE DH algorithm DH19[_0] 183s | appending IKE DH algorithm DH20[_0] 183s | appending IKE DH algorithm DH21[_0] 183s | appending IKE DH algorithm DH31[_0] 183s | parsing '' for IKE 183s | parsing '3des-sha1' for IKE 183s | proposal: '3des-sha1' 183s | token: '' '' "3des" '-' 183s | token: '' "3des" '-' "sha1" '' 183s | token: '-' "sha1" '' '' 183s | appending IKE encryption algorithm 3DES_CBC[_0] 183s | parsing prf: 183s | appending IKE PRF algorithm HMAC_SHA1[_0] 183s | token: '' '' '' 183s | - succeeded, advancing tokens 183s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 183s | appending IKE DH algorithm MODP2048[_0] 183s | appending IKE DH algorithm MODP3072[_0] 183s | appending IKE DH algorithm MODP4096[_0] 183s | appending IKE DH algorithm MODP8192[_0] 183s | appending IKE DH algorithm DH19[_0] 183s | appending IKE DH algorithm DH20[_0] 183s | appending IKE DH algorithm DH21[_0] 183s | appending IKE DH algorithm DH31[_0] 183s | parsing '3des-sha1' for IKE 183s | proposal: '3des-sha1' 183s | token: '' '' "3des" '-' 183s | token: '' "3des" '-' "sha1" '' 183s | token: '-' "sha1" '' '' 183s | appending IKE encryption algorithm 3DES_CBC[_0] 183s | parsing prf: 183s | appending IKE PRF algorithm HMAC_SHA1[_0] 183s | token: '' '' '' 183s | - succeeded, advancing tokens 183s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 183s | appending IKE DH algorithm MODP2048[_0] 183s | appending IKE DH algorithm MODP3072[_0] 183s | appending IKE DH algorithm MODP4096[_0] 183s | appending IKE DH algorithm MODP8192[_0] 183s | appending IKE DH algorithm DH19[_0] 183s | appending IKE DH algorithm DH20[_0] 183s | appending IKE DH algorithm DH21[_0] 183s | appending IKE DH algorithm DH31[_0] 183s | parsing '3des-sha1;modp1536' for IKE 183s | proposal: '3des-sha1;modp1536' 183s | token: '' '' "3des" '-' 183s | token: '' "3des" '-' "sha1" ';' 183s | token: '-' "sha1" ';' "modp1536" '' 183s | appending IKE encryption algorithm 3DES_CBC[_0] 183s | parsing prf: 183s | appending IKE PRF algorithm HMAC_SHA1[_0] 183s | token: ';' "modp1536" '' '' 183s | - succeeded, advancing tokens 183s | parsing dh: 183s | appending IKE DH algorithm MODP1536[_0] 183s | token: '' '' '' 183s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 183s | parsing '3des;dh21' for IKE 183s | proposal: '3des;dh21' 183s | token: '' '' "3des" ';' 183s | token: '' "3des" ';' "dh21" '' 183s | token: ';' "dh21" '' '' 183s | appending IKE encryption algorithm 3DES_CBC[_0] 183s | parsing dh: 183s | appending IKE DH algorithm DH21[_0] 183s | token: '' '' '' 183s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 183s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 183s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 183s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 183s | parsing '3des-sha1;dh21' for IKE 183s | proposal: '3des-sha1;dh21' 183s | token: '' '' "3des" '-' 183s | token: '' "3des" '-' "sha1" ';' 183s | token: '-' "sha1" ';' "dh21" '' 183s | appending IKE encryption algorithm 3DES_CBC[_0] 183s | parsing prf: 183s | appending IKE PRF algorithm HMAC_SHA1[_0] 183s | token: ';' "dh21" '' '' 183s | - succeeded, advancing tokens 183s | parsing dh: 183s | appending IKE DH algorithm DH21[_0] 183s | token: '' '' '' 183s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 183s | parsing '3des-sha1-ecp_521' for IKE 183s | proposal: '3des-sha1-ecp_521' 183s | token: '' '' "3des" '-' 183s | token: '' "3des" '-' "sha1" '-' 183s | token: '-' "sha1" '-' "ecp_521" '' 183s | appending IKE encryption algorithm 3DES_CBC[_0] 183s | parsing prf: 183s | appending IKE PRF algorithm HMAC_SHA1[_0] 183s | token: '-' "ecp_521" '' '' 183s | - succeeded, advancing tokens 183s | parsing dh: 183s | appending IKE DH algorithm DH21[_0] 183s | token: '' '' '' 183s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 183s | parsing '3des+aes' for IKE 183s | proposal: '3des+aes' 183s | token: '' '' "3des" '+' 183s | token: '' "3des" '+' "aes" '' 183s | token: '+' "aes" '' '' 183s | appending IKE encryption algorithm 3DES_CBC[_0] 183s | token: '' '' '' 183s | appending IKE encryption algorithm AES_CBC[_0] 183s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 183s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 183s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 183s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 183s | appending IKE DH algorithm MODP2048[_0] 183s | appending IKE DH algorithm MODP3072[_0] 183s | appending IKE DH algorithm MODP4096[_0] 183s | appending IKE DH algorithm MODP8192[_0] 183s | appending IKE DH algorithm DH19[_0] 183s | appending IKE DH algorithm DH20[_0] 183s | appending IKE DH algorithm DH21[_0] 183s | appending IKE DH algorithm DH31[_0] 183s | parsing 'aes;none' for IKE 183s | proposal: 'aes;none' 183s | token: '' '' "aes" ';' 183s | token: '' "aes" ';' "none" '' 183s | token: ';' "none" '' '' 183s | appending IKE encryption algorithm AES_CBC[_0] 183s | parsing dh: 183s | appending IKE DH algorithm NONE[_0] 183s | token: '' '' '' 183s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 183s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 183s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 183s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 183s | parsing 'id2' for IKE 183s | proposal: 'id2' 183s | token: '' '' "id2" '' 183s | token: '' "id2" '' '' 183s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 183s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 183s | parsing '3des-id2' for IKE 183s | proposal: '3des-id2' 183s | token: '' '' "3des" '-' 183s | token: '' "3des" '-' "id2" '' 183s | token: '-' "id2" '' '' 183s | appending IKE encryption algorithm 3DES_CBC[_0] 183s | parsing prf: 183s | ike_alg_byname() failed: IKE PRF algorithm 'id2' is not recognized 183s | lookup for PRF algorithm 'id2' failed 183s | - failed, saving error 'IKE PRF algorithm 'id2' is not recognized' and tossing result 183s | parsing integ: 183s | ike_alg_byname() failed: IKE integrity algorithm 'id2' is not recognized 183s | lookup for integrity algorithm 'id2' failed 183s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'id2' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'id2' is not recognized') 183s | parsing 'aes_ccm' for IKE 183s | proposal: 'aes_ccm' 183s | token: '' '' "aes_ccm" '' 183s | token: '' "aes_ccm" '' '' 183s | alg_byname_ok() failed: IKE encryption algorithm 'aes_ccm' is not supported 183s | parsing 'aes-sha1-sha2-ecp_521' for IKE 183s | proposal: 'aes-sha1-sha2-ecp_521' 183s | token: '' '' "aes" '-' 183s | token: '' "aes" '-' "sha1" '-' 183s | token: '-' "sha1" '-' "sha2" '-' 183s | appending IKE encryption algorithm AES_CBC[_0] 183s | parsing prf: 183s | appending IKE PRF algorithm HMAC_SHA1[_0] 183s | token: '-' "sha2" '-' "ecp_521" '' 183s | - succeeded, advancing tokens 183s | parsing dh: 183s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 183s | lookup for DH algorithm 'sha2' failed 183s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 183s | parsing 'aes-sha2-sha2;ecp_521' for IKE 183s | proposal: 'aes-sha2-sha2;ecp_521' 183s | token: '' '' "aes" '-' 183s | token: '' "aes" '-' "sha2" '-' 183s | token: '-' "sha2" '-' "sha2" ';' 183s | appending IKE encryption algorithm AES_CBC[_0] 183s | parsing prf: 183s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 183s | token: '-' "sha2" ';' "ecp_521" '' 183s | - succeeded, advancing tokens 183s | parsing dh: 183s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 183s | lookup for DH algorithm 'sha2' failed 183s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 183s | parsing 'aes-sha1_96-sha2-ecp_521' for IKE 183s | proposal: 'aes-sha1_96-sha2-ecp_521' 183s | token: '' '' "aes" '-' 183s | token: '' "aes" '-' "sha1_96" '-' 183s | token: '-' "sha1_96" '-' "sha2" '-' 183s | appending IKE encryption algorithm AES_CBC[_0] 183s | parsing prf: 183s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 183s | lookup for PRF algorithm 'sha1_96' failed 183s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 183s | parsing integ: 183s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 183s | token: '-' "sha2" '-' "ecp_521" '' 183s | parsing prf: 183s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 183s | token: '-' "ecp_521" '' '' 183s | parsing dh: 183s | appending IKE DH algorithm DH21[_0] 183s | token: '' '' '' 183s | parsing 'aes-sha1_96-sha2;ecp_521' for IKE 183s | proposal: 'aes-sha1_96-sha2;ecp_521' 183s | token: '' '' "aes" '-' 183s | token: '' "aes" '-' "sha1_96" '-' 183s | token: '-' "sha1_96" '-' "sha2" ';' 183s | appending IKE encryption algorithm AES_CBC[_0] 183s | parsing prf: 183s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 183s | lookup for PRF algorithm 'sha1_96' failed 183s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 183s | parsing integ: 183s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 183s | token: '-' "sha2" ';' "ecp_521" '' 183s | parsing prf: 183s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 183s | token: ';' "ecp_521" '' '' 183s | parsing dh: 183s | appending IKE DH algorithm DH21[_0] 183s | token: '' '' '' 183s | parsing 'aes+aes-sha1+sha1-modp8192+modp8192' for IKE 183s | proposal: 'aes+aes-sha1+sha1-modp8192+modp8192' 183s | token: '' '' "aes" '+' 183s | token: '' "aes" '+' "aes" '-' 183s | token: '+' "aes" '-' "sha1" '+' 183s | appending IKE encryption algorithm AES_CBC[_0] 183s | token: '-' "sha1" '+' "sha1" '-' 183s | appending IKE encryption algorithm AES_CBC[_0] 183s algparse: discarding duplicate IKE encryption algorithm AES_CBC 183s | parsing prf: 183s | appending IKE PRF algorithm HMAC_SHA1[_0] 183s | token: '+' "sha1" '-' "modp8192" '+' 183s | appending IKE PRF algorithm HMAC_SHA1[_0] 183s | token: '-' "modp8192" '+' "modp8192" '' 183s algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 183s | - succeeded, advancing tokens 183s | parsing dh: 183s | appending IKE DH algorithm MODP8192[_0] 183s | token: '+' "modp8192" '' '' 183s | appending IKE DH algorithm MODP8192[_0] 183s | token: '' '' '' 183s algparse: discarding duplicate IKE DH algorithm MODP8192 183s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 183s | parsing '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' for IKE 183s | proposal: '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' 183s | token: '' '' "3des" '+' 183s | token: '' "3des" '+' "aes" '+' 183s | token: '+' "aes" '+' "aes" '-' 183s | appending IKE encryption algorithm 3DES_CBC[_0] 183s | token: '+' "aes" '-' "sha2" '+' 183s | appending IKE encryption algorithm AES_CBC[_0] 183s | token: '-' "sha2" '+' "sha1" '+' 183s | appending IKE encryption algorithm AES_CBC[_0] 183s algparse: discarding duplicate IKE encryption algorithm AES_CBC 183s | parsing prf: 183s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 183s | token: '+' "sha1" '+' "sha1" '-' 183s | appending IKE PRF algorithm HMAC_SHA1[_0] 183s | token: '+' "sha1" '-' "modp4096" '+' 183s | appending IKE PRF algorithm HMAC_SHA1[_0] 183s | token: '-' "modp4096" '+' "modp8192" '+' 183s algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 183s | - succeeded, advancing tokens 183s | parsing dh: 183s | appending IKE DH algorithm MODP4096[_0] 183s | token: '+' "modp8192" '+' "modp8192" '' 183s | appending IKE DH algorithm MODP8192[_0] 183s | token: '+' "modp8192" '' '' 183s | appending IKE DH algorithm MODP8192[_0] 183s | token: '' '' '' 183s algparse: discarding duplicate IKE DH algorithm MODP8192 183s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 183s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 183s | parsing 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' for IKE 183s | proposal: 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' 183s | token: '' '' "aes" '+' 183s | token: '' "aes" '+' "3des" '+' 183s | token: '+' "3des" '+' "aes" '-' 183s | appending IKE encryption algorithm AES_CBC[_0] 183s | token: '+' "aes" '-' "sha1" '+' 183s | appending IKE encryption algorithm 3DES_CBC[_0] 183s | token: '-' "sha1" '+' "sha2" '+' 183s | appending IKE encryption algorithm AES_CBC[_0] 183s algparse: discarding duplicate IKE encryption algorithm AES_CBC 183s | parsing prf: 183s | appending IKE PRF algorithm HMAC_SHA1[_0] 183s | token: '+' "sha2" '+' "sha1" '-' 183s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 183s | token: '+' "sha1" '-' "modp8192" '+' 183s | appending IKE PRF algorithm HMAC_SHA1[_0] 183s | token: '-' "modp8192" '+' "modp4096" '+' 183s algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 183s | - succeeded, advancing tokens 183s | parsing dh: 183s | appending IKE DH algorithm MODP8192[_0] 183s | token: '+' "modp4096" '+' "modp8192" '' 183s | appending IKE DH algorithm MODP4096[_0] 183s | token: '+' "modp8192" '' '' 183s | appending IKE DH algorithm MODP8192[_0] 183s | token: '' '' '' 183s algparse: discarding duplicate IKE DH algorithm MODP8192 183s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 183s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 183s | parsing 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' for IKE 183s | proposal: 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' 183s | token: '' '' "aes" '+' 183s | token: '' "aes" '+' "aes" '+' 183s | token: '+' "aes" '+' "3des" '-' 183s | appending IKE encryption algorithm AES_CBC[_0] 183s | token: '+' "3des" '-' "sha1" '+' 183s | appending IKE encryption algorithm AES_CBC[_0] 183s | token: '-' "sha1" '+' "sha1" '+' 183s | appending IKE encryption algorithm 3DES_CBC[_0] 183s algparse: discarding duplicate IKE encryption algorithm AES_CBC 183s | parsing prf: 183s | appending IKE PRF algorithm HMAC_SHA1[_0] 183s | token: '+' "sha1" '+' "sha2" '-' 183s | appending IKE PRF algorithm HMAC_SHA1[_0] 183s | token: '+' "sha2" '-' "modp8192" '+' 183s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 183s | token: '-' "modp8192" '+' "modp8192" '+' 183s algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 183s | - succeeded, advancing tokens 183s | parsing dh: 183s | appending IKE DH algorithm MODP8192[_0] 183s | token: '+' "modp8192" '+' "modp4096" '' 183s | appending IKE DH algorithm MODP8192[_0] 183s | token: '+' "modp4096" '' '' 183s | appending IKE DH algorithm MODP4096[_0] 183s | token: '' '' '' 183s algparse: discarding duplicate IKE DH algorithm MODP8192 183s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 183s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 183s | parsing 'aes+aes128+aes256' for IKE 183s | proposal: 'aes+aes128+aes256' 183s | token: '' '' "aes" '+' 183s | token: '' "aes" '+' "aes128" '+' 183s | token: '+' "aes128" '+' "aes256" '' 183s | appending IKE encryption algorithm AES_CBC[_0] 183s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 183s | token: '+' "aes256" '' '' 183s | appending IKE encryption algorithm AES_CBC[_128] 183s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 183s | token: '' '' '' 183s | appending IKE encryption algorithm AES_CBC[_256] 183s algparse: discarding duplicate IKE encryption algorithm AES_CBC_128 183s algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 183s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 183s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 183s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 183s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 183s | appending IKE DH algorithm MODP2048[_0] 183s | appending IKE DH algorithm MODP3072[_0] 183s | appending IKE DH algorithm MODP4096[_0] 183s | appending IKE DH algorithm MODP8192[_0] 183s | appending IKE DH algorithm DH19[_0] 183s | appending IKE DH algorithm DH20[_0] 183s | appending IKE DH algorithm DH21[_0] 183s | appending IKE DH algorithm DH31[_0] 183s | parsing 'aes128+aes+aes256' for IKE 183s | proposal: 'aes128+aes+aes256' 183s | token: '' '' "aes128" '+' 183s | token: '' "aes128" '+' "aes" '+' 183s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 183s | token: '+' "aes" '+' "aes256" '' 183s | appending IKE encryption algorithm AES_CBC[_128] 183s | token: '+' "aes256" '' '' 183s | appending IKE encryption algorithm AES_CBC[_0] 183s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 183s | token: '' '' '' 183s | appending IKE encryption algorithm AES_CBC[_256] 183s algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 183s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 183s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 183s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 183s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 183s | appending IKE DH algorithm MODP2048[_0] 183s | appending IKE DH algorithm MODP3072[_0] 183s | appending IKE DH algorithm MODP4096[_0] 183s | appending IKE DH algorithm MODP8192[_0] 183s | appending IKE DH algorithm DH19[_0] 183s | appending IKE DH algorithm DH20[_0] 183s | appending IKE DH algorithm DH21[_0] 183s | appending IKE DH algorithm DH31[_0] 183s | parsing 'aes128+aes256+aes' for IKE 183s | proposal: 'aes128+aes256+aes' 183s | token: '' '' "aes128" '+' 183s | token: '' "aes128" '+' "aes256" '+' 183s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 183s | token: '+' "aes256" '+' "aes" '' 183s | appending IKE encryption algorithm AES_CBC[_128] 183s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 183s | token: '+' "aes" '' '' 183s | appending IKE encryption algorithm AES_CBC[_256] 183s | token: '' '' '' 183s | appending IKE encryption algorithm AES_CBC[_0] 183s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 183s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 183s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 183s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 183s | appending IKE DH algorithm MODP2048[_0] 183s | appending IKE DH algorithm MODP3072[_0] 183s | appending IKE DH algorithm MODP4096[_0] 183s | appending IKE DH algorithm MODP8192[_0] 183s | appending IKE DH algorithm DH19[_0] 183s | appending IKE DH algorithm DH20[_0] 183s | appending IKE DH algorithm DH21[_0] 183s | appending IKE DH algorithm DH31[_0] 183s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for IKE 183s | proposal: 'aes-sha1-modp8192' 183s | token: '' '' "aes" '-' 183s | token: '' "aes" '-' "sha1" '-' 183s | token: '-' "sha1" '-' "modp8192" '' 183s | appending IKE encryption algorithm AES_CBC[_0] 183s | parsing prf: 183s | appending IKE PRF algorithm HMAC_SHA1[_0] 183s | token: '-' "modp8192" '' '' 183s | - succeeded, advancing tokens 183s | parsing dh: 183s | appending IKE DH algorithm MODP8192[_0] 183s | token: '' '' '' 183s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 183s | proposal: 'aes-sha1-modp8192' 183s | token: '' '' "aes" '-' 183s | token: '' "aes" '-' "sha1" '-' 183s | token: '-' "sha1" '-' "modp8192" '' 183s | appending IKE encryption algorithm AES_CBC[_0] 183s | parsing prf: 183s | appending IKE PRF algorithm HMAC_SHA1[_0] 183s | token: '-' "modp8192" '' '' 183s | - succeeded, advancing tokens 183s | parsing dh: 183s | appending IKE DH algorithm MODP8192[_0] 183s | token: '' '' '' 183s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 183s | proposal: 'aes-sha1-modp8192' 183s | token: '' '' "aes" '-' 183s | token: '' "aes" '-' "sha1" '-' 183s | token: '-' "sha1" '-' "modp8192" '' 183s | appending IKE encryption algorithm AES_CBC[_0] 183s | parsing prf: 183s | appending IKE PRF algorithm HMAC_SHA1[_0] 183s | token: '-' "modp8192" '' '' 183s | - succeeded, advancing tokens 183s | parsing dh: 183s | appending IKE DH algorithm MODP8192[_0] 183s | token: '' '' '' 183s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 183s | parsing 'aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' for IKE 183s | proposal: 'aes-sha1-modp8192' 183s | token: '' '' "aes" '-' 183s | token: '' "aes" '-' "sha1" '-' 183s | token: '-' "sha1" '-' "modp8192" '' 183s | appending IKE encryption algorithm AES_CBC[_0] 183s | parsing prf: 183s | appending IKE PRF algorithm HMAC_SHA1[_0] 183s | token: '-' "modp8192" '' '' 183s | - succeeded, advancing tokens 183s | parsing dh: 183s | appending IKE DH algorithm MODP8192[_0] 183s | token: '' '' '' 183s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 183s | proposal: 'aes-sha2-modp8192' 183s | token: '' '' "aes" '-' 183s | token: '' "aes" '-' "sha2" '-' 183s | token: '-' "sha2" '-' "modp8192" '' 183s | appending IKE encryption algorithm AES_CBC[_0] 183s | parsing prf: 183s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 183s | token: '-' "modp8192" '' '' 183s | - succeeded, advancing tokens 183s | parsing dh: 183s | appending IKE DH algorithm MODP8192[_0] 183s | token: '' '' '' 183s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 183s | proposal: 'aes-sha1-modp8192' 183s | token: '' '' "aes" '-' 183s | token: '' "aes" '-' "sha1" '-' 183s | token: '-' "sha1" '-' "modp8192" '' 183s | appending IKE encryption algorithm AES_CBC[_0] 183s | parsing prf: 183s | appending IKE PRF algorithm HMAC_SHA1[_0] 183s | token: '-' "modp8192" '' '' 183s | - succeeded, advancing tokens 183s | parsing dh: 183s | appending IKE DH algorithm MODP8192[_0] 183s | token: '' '' '' 183s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 183s | parsing 'aes_gcm' for IKE 183s | proposal: 'aes_gcm' 183s | token: '' '' "aes_gcm" '' 183s | token: '' "aes_gcm" '' '' 183s | token: '' '' '' 183s | appending IKE encryption algorithm AES_GCM_16[_0] 183s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 183s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 183s | appending IKE integrity algorithm NONE[_0] 183s | appending IKE DH algorithm MODP2048[_0] 183s | appending IKE DH algorithm MODP3072[_0] 183s | appending IKE DH algorithm MODP4096[_0] 183s | appending IKE DH algorithm MODP8192[_0] 183s | appending IKE DH algorithm DH19[_0] 183s | appending IKE DH algorithm DH20[_0] 183s | appending IKE DH algorithm DH21[_0] 183s | appending IKE DH algorithm DH31[_0] 183s | parsing 'aes_gcm-sha2' for IKE 183s | proposal: 'aes_gcm-sha2' 183s | token: '' '' "aes_gcm" '-' 183s | token: '' "aes_gcm" '-' "sha2" '' 183s | token: '-' "sha2" '' '' 183s | appending IKE encryption algorithm AES_GCM_16[_0] 183s | parsing prf: 183s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 183s | token: '' '' '' 183s | - succeeded, advancing tokens 183s | appending IKE integrity algorithm NONE[_0] 183s | appending IKE DH algorithm MODP2048[_0] 183s | appending IKE DH algorithm MODP3072[_0] 183s | appending IKE DH algorithm MODP4096[_0] 183s | appending IKE DH algorithm MODP8192[_0] 183s | appending IKE DH algorithm DH19[_0] 183s | appending IKE DH algorithm DH20[_0] 183s | appending IKE DH algorithm DH21[_0] 183s | appending IKE DH algorithm DH31[_0] 183s | parsing 'aes_gcm-sha2-modp2048' for IKE 183s | proposal: 'aes_gcm-sha2-modp2048' 183s | token: '' '' "aes_gcm" '-' 183s | token: '' "aes_gcm" '-' "sha2" '-' 183s | token: '-' "sha2" '-' "modp2048" '' 183s | appending IKE encryption algorithm AES_GCM_16[_0] 183s | parsing prf: 183s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 183s | token: '-' "modp2048" '' '' 183s | - succeeded, advancing tokens 183s | parsing dh: 183s | appending IKE DH algorithm MODP2048[_0] 183s | token: '' '' '' 183s | appending IKE integrity algorithm NONE[_0] 183s | parsing 'aes_gcm-sha2;modp2048' for IKE 183s | proposal: 'aes_gcm-sha2;modp2048' 183s | token: '' '' "aes_gcm" '-' 183s | token: '' "aes_gcm" '-' "sha2" ';' 183s | token: '-' "sha2" ';' "modp2048" '' 183s | appending IKE encryption algorithm AES_GCM_16[_0] 183s | parsing prf: 183s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 183s | token: ';' "modp2048" '' '' 183s | - succeeded, advancing tokens 183s | parsing dh: 183s | appending IKE DH algorithm MODP2048[_0] 183s | token: '' '' '' 183s | appending IKE integrity algorithm NONE[_0] 183s | parsing 'aes_gcm-modp2048' for IKE 183s | proposal: 'aes_gcm-modp2048' 183s | token: '' '' "aes_gcm" '-' 183s | token: '' "aes_gcm" '-' "modp2048" '' 183s | token: '-' "modp2048" '' '' 183s | appending IKE encryption algorithm AES_GCM_16[_0] 183s | parsing prf: 183s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 183s | lookup for PRF algorithm 'modp2048' failed 183s | - failed, saving error 'IKE PRF algorithm 'modp2048' is not recognized' and tossing result 183s | parsing integ: 183s | ike_alg_byname() failed: IKE integrity algorithm 'modp2048' is not recognized 183s | lookup for integrity algorithm 'modp2048' failed 183s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'modp2048' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'modp2048' is not recognized') 183s | parsing 'aes_gcm;modp2048' for IKE 183s | proposal: 'aes_gcm;modp2048' 183s | token: '' '' "aes_gcm" ';' 183s | token: '' "aes_gcm" ';' "modp2048" '' 183s | token: ';' "modp2048" '' '' 183s | appending IKE encryption algorithm AES_GCM_16[_0] 183s | parsing dh: 183s | appending IKE DH algorithm MODP2048[_0] 183s | token: '' '' '' 183s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 183s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 183s | appending IKE integrity algorithm NONE[_0] 183s | parsing 'aes_gcm-none' for IKE 183s | proposal: 'aes_gcm-none' 183s | token: '' '' "aes_gcm" '-' 183s | token: '' "aes_gcm" '-' "none" '' 183s | token: '-' "none" '' '' 183s | appending IKE encryption algorithm AES_GCM_16[_0] 183s | parsing prf: 183s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 183s | lookup for PRF algorithm 'none' failed 183s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 183s | parsing integ: 183s | appending IKE integrity algorithm NONE[_0] 183s | token: '' '' '' 183s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 183s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 183s | appending IKE DH algorithm MODP2048[_0] 183s | appending IKE DH algorithm MODP3072[_0] 183s | appending IKE DH algorithm MODP4096[_0] 183s | appending IKE DH algorithm MODP8192[_0] 183s | appending IKE DH algorithm DH19[_0] 183s | appending IKE DH algorithm DH20[_0] 183s | appending IKE DH algorithm DH21[_0] 183s | appending IKE DH algorithm DH31[_0] 183s | parsing 'aes_gcm-none-sha2' for IKE 183s | proposal: 'aes_gcm-none-sha2' 183s | token: '' '' "aes_gcm" '-' 183s | token: '' "aes_gcm" '-' "none" '-' 183s | token: '-' "none" '-' "sha2" '' 183s | appending IKE encryption algorithm AES_GCM_16[_0] 183s | parsing prf: 183s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 183s | lookup for PRF algorithm 'none' failed 183s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 183s | parsing integ: 183s | appending IKE integrity algorithm NONE[_0] 183s | token: '-' "sha2" '' '' 183s | parsing prf: 183s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 183s | token: '' '' '' 183s | appending IKE DH algorithm MODP2048[_0] 183s | appending IKE DH algorithm MODP3072[_0] 183s | appending IKE DH algorithm MODP4096[_0] 183s | appending IKE DH algorithm MODP8192[_0] 183s | appending IKE DH algorithm DH19[_0] 183s | appending IKE DH algorithm DH20[_0] 183s | appending IKE DH algorithm DH21[_0] 183s | appending IKE DH algorithm DH31[_0] 183s | parsing 'aes_gcm-none-sha2-modp2048' for IKE 183s | proposal: 'aes_gcm-none-sha2-modp2048' 183s | token: '' '' "aes_gcm" '-' 183s | token: '' "aes_gcm" '-' "none" '-' 183s | token: '-' "none" '-' "sha2" '-' 183s | appending IKE encryption algorithm AES_GCM_16[_0] 183s | parsing prf: 183s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 183s | lookup for PRF algorithm 'none' failed 183s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 183s | parsing integ: 183s | appending IKE integrity algorithm NONE[_0] 183s | token: '-' "sha2" '-' "modp2048" '' 183s | parsing prf: 183s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 183s | token: '-' "modp2048" '' '' 183s | parsing dh: 183s | appending IKE DH algorithm MODP2048[_0] 183s | token: '' '' '' 183s | parsing 'aes_gcm-none-sha2;modp2048' for IKE 183s | proposal: 'aes_gcm-none-sha2;modp2048' 183s | token: '' '' "aes_gcm" '-' 183s | token: '' "aes_gcm" '-' "none" '-' 183s | token: '-' "none" '-' "sha2" ';' 183s | appending IKE encryption algorithm AES_GCM_16[_0] 183s | parsing prf: 183s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 183s | lookup for PRF algorithm 'none' failed 183s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 183s | parsing integ: 183s | appending IKE integrity algorithm NONE[_0] 183s | token: '-' "sha2" ';' "modp2048" '' 183s | parsing prf: 183s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 183s | token: ';' "modp2048" '' '' 183s | parsing dh: 183s | appending IKE DH algorithm MODP2048[_0] 183s | token: '' '' '' 183s | parsing 'aes_gcm-none-modp2048' for IKE 183s | proposal: 'aes_gcm-none-modp2048' 183s | token: '' '' "aes_gcm" '-' 183s | token: '' "aes_gcm" '-' "none" '-' 183s | token: '-' "none" '-' "modp2048" '' 183s | appending IKE encryption algorithm AES_GCM_16[_0] 183s | parsing prf: 183s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 183s | lookup for PRF algorithm 'none' failed 183s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 183s | parsing integ: 183s | appending IKE integrity algorithm NONE[_0] 183s | token: '-' "modp2048" '' '' 183s | parsing prf: 183s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 183s | lookup for PRF algorithm 'modp2048' failed 183s | -- failed 'IKE PRF algorithm 'modp2048' is not recognized' 183s | parsing 'aes_gcm-none;modp2048' for IKE 183s | proposal: 'aes_gcm-none;modp2048' 183s | token: '' '' "aes_gcm" '-' 183s | token: '' "aes_gcm" '-' "none" ';' 183s | token: '-' "none" ';' "modp2048" '' 183s | appending IKE encryption algorithm AES_GCM_16[_0] 183s | parsing prf: 183s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 183s | lookup for PRF algorithm 'none' failed 183s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 183s | parsing integ: 183s | appending IKE integrity algorithm NONE[_0] 183s | token: ';' "modp2048" '' '' 183s | parsing dh: 183s | appending IKE DH algorithm MODP2048[_0] 183s | token: '' '' '' 183s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 183s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 183s | parsing 'aes_gcm-sha1-none-modp2048' for IKE 183s | proposal: 'aes_gcm-sha1-none-modp2048' 183s | token: '' '' "aes_gcm" '-' 183s | token: '' "aes_gcm" '-' "sha1" '-' 183s | token: '-' "sha1" '-' "none" '-' 183s | appending IKE encryption algorithm AES_GCM_16[_0] 183s | parsing prf: 183s | appending IKE PRF algorithm HMAC_SHA1[_0] 183s | token: '-' "none" '-' "modp2048" '' 183s | - succeeded, advancing tokens 183s | parsing dh: 183s | appending IKE DH algorithm NONE[_0] 183s | token: '-' "modp2048" '' '' 183s | parsing 'aes_gcm-sha1-none;modp2048' for IKE 183s | proposal: 'aes_gcm-sha1-none;modp2048' 183s | token: '' '' "aes_gcm" '-' 183s | token: '' "aes_gcm" '-' "sha1" '-' 183s | token: '-' "sha1" '-' "none" ';' 183s | appending IKE encryption algorithm AES_GCM_16[_0] 183s | parsing prf: 183s | appending IKE PRF algorithm HMAC_SHA1[_0] 183s | token: '-' "none" ';' "modp2048" '' 183s | - succeeded, advancing tokens 183s | parsing dh: 183s | appending IKE DH algorithm NONE[_0] 183s | token: ';' "modp2048" '' '' 183s | parsing 'aes+aes_gcm' for IKE 183s | proposal: 'aes+aes_gcm' 183s | token: '' '' "aes" '+' 183s | token: '' "aes" '+' "aes_gcm" '' 183s | token: '+' "aes_gcm" '' '' 183s | appending IKE encryption algorithm AES_CBC[_0] 183s | token: '' '' '' 183s | appending IKE encryption algorithm AES_GCM_16[_0] 183s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 183s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 183s | appending IKE DH algorithm MODP2048[_0] 183s | appending IKE DH algorithm MODP3072[_0] 183s | appending IKE DH algorithm MODP4096[_0] 183s | appending IKE DH algorithm MODP8192[_0] 183s | appending IKE DH algorithm DH19[_0] 183s | appending IKE DH algorithm DH20[_0] 183s | appending IKE DH algorithm DH21[_0] 183s | appending IKE DH algorithm DH31[_0] 183s | parsing ',' for IKE 183s | proposal: '' 183s | token: '' '' "" '' 183s | token: '' "" '' '' 183s | parsing 'aes,' for IKE 183s | proposal: 'aes' 183s | token: '' '' "aes" '' 183s | token: '' "aes" '' '' 183s | token: '' '' '' 183s | appending IKE encryption algorithm AES_CBC[_0] 183s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 183s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 183s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 183s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 183s | appending IKE DH algorithm MODP2048[_0] 183s | appending IKE DH algorithm MODP3072[_0] 183s | appending IKE DH algorithm MODP4096[_0] 183s | appending IKE DH algorithm MODP8192[_0] 183s | appending IKE DH algorithm DH19[_0] 183s | appending IKE DH algorithm DH20[_0] 183s | appending IKE DH algorithm DH21[_0] 183s | appending IKE DH algorithm DH31[_0] 183s | proposal: '' 183s | token: '' '' "" '' 183s | token: '' "" '' '' 183s | parsing 'aes,,aes' for IKE 183s | proposal: 'aes' 183s | token: '' '' "aes" '' 183s | token: '' "aes" '' '' 183s | token: '' '' '' 183s | appending IKE encryption algorithm AES_CBC[_0] 183s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 183s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 183s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 183s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 183s | appending IKE DH algorithm MODP2048[_0] 183s | appending IKE DH algorithm MODP3072[_0] 183s | appending IKE DH algorithm MODP4096[_0] 183s | appending IKE DH algorithm MODP8192[_0] 183s | appending IKE DH algorithm DH19[_0] 183s | appending IKE DH algorithm DH20[_0] 183s | appending IKE DH algorithm DH21[_0] 183s | appending IKE DH algorithm DH31[_0] 183s | proposal: '' 183s | token: '' '' "" '' 183s | token: '' "" '' '' 183s | parsing ',aes' for IKE 183s | proposal: '' 183s | token: '' '' "" '' 183s | token: '' "" '' '' 183s | parsing '-' for IKE 183s | proposal: '-' 183s | token: '' '' "" '-' 183s | token: '' "" '-' "" '' 183s | parsing '+' for IKE 183s | proposal: '+' 183s | token: '' '' "" '+' 183s | token: '' "" '+' "" '' 183s | parsing ';' for IKE 183s | proposal: ';' 183s | token: '' '' "" ';' 183s | token: '' "" ';' "" '' 183s | parsing 'aes-' for IKE 183s | proposal: 'aes-' 183s | token: '' '' "aes" '-' 183s | token: '' "aes" '-' "" '' 183s | token: '-' "" '' '' 183s | appending IKE encryption algorithm AES_CBC[_0] 183s | parsing prf: 183s | - failed, saving error 'IKE PRF algorithm is empty' and tossing result 183s | parsing integ: 183s | - and - failed, returning earlier PRF error 'IKE PRF algorithm is empty' and discarding INTEG error 'IKE integrity algorithm is empty') 183s | parsing 'aes+' for IKE 183s | proposal: 'aes+' 183s | token: '' '' "aes" '+' 183s | token: '' "aes" '+' "" '' 183s | token: '+' "" '' '' 183s | appending IKE encryption algorithm AES_CBC[_0] 183s | parsing 'aes;' for IKE 183s | proposal: 'aes;' 183s | token: '' '' "aes" ';' 183s | token: '' "aes" ';' "" '' 183s | token: ';' "" '' '' 183s | appending IKE encryption algorithm AES_CBC[_0] 183s | parsing dh: 183s | ... failed 'IKE DH algorithm is empty' 183s | parsing '-aes' for IKE 183s | proposal: '-aes' 183s | token: '' '' "" '-' 183s | token: '' "" '-' "aes" '' 183s | parsing '+aes' for IKE 183s | proposal: '+aes' 183s | token: '' '' "" '+' 183s | token: '' "" '+' "aes" '' 183s | parsing ';aes' for IKE 183s | proposal: ';aes' 183s | token: '' '' "" ';' 183s | token: '' "" ';' "aes" '' 183s | parsing 'aes+-' for IKE 183s | proposal: 'aes+-' 183s | token: '' '' "aes" '+' 183s | token: '' "aes" '+' "" '-' 183s | token: '+' "" '-' "" '' 183s | appending IKE encryption algorithm AES_CBC[_0] 183s | parsing 'aes+;' for IKE 183s | proposal: 'aes+;' 183s | token: '' '' "aes" '+' 183s | token: '' "aes" '+' "" ';' 183s | token: '+' "" ';' "" '' 183s | appending IKE encryption algorithm AES_CBC[_0] 183s | parsing 'aes++' for IKE 183s | proposal: 'aes++' 183s | token: '' '' "aes" '+' 183s | token: '' "aes" '+' "" '+' 183s | token: '+' "" '+' "" '' 183s | appending IKE encryption algorithm AES_CBC[_0] 183s algparse: leak detective found no leaks 183s algparse: Encryption algorithms: 183s algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 183s algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 183s algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 183s algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 183s algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 183s algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 183s algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm, aes_gcm_c 183s algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_b 183s algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_a 183s algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 183s algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 183s algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 183s algparse: NULL [] IKEv1: ESP IKEv2: ESP 183s algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 183s algparse: Hash algorithms: 183s algparse: MD5 IKEv1: IKE IKEv2: NSS 183s algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 183s algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 183s algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 183s algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 183s algparse: IDENTITY IKEv1: IKEv2: FIPS 183s algparse: PRF algorithms: 183s algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE native(HMAC) md5 183s algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 183s algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 183s algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 183s algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 183s algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 183s algparse: Integrity algorithms: 183s algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH native(HMAC) md5, hmac_md5 183s algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 183s algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 183s algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 183s algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 183s algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 183s algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 183s algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 183s algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 183s algparse: DH algorithms: 183s algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 183s algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 183s algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 183s algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 183s algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 183s algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 183s algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 183s algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 183s algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 183s algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 183s algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 183s algparse: IPCOMP algorithms: 183s algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 183s algparse: LZS IKEv1: IKEv2: ESP AH FIPS 183s algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 183s algparse: testing CAMELLIA_CBC: 183s algparse: Camellia: 16 bytes with 128-bit key 183s | decode_to_chunk: raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 183s | decode_to_chunk: output: 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379b20 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: CAMELLIA_CBC 183s | flags: ENCRYPT+DECRYPT 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06175100 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379b18 183s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 183s | decode_to_chunk: output: 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | decode_to_chunk: new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 183s | decode_to_chunk: output: 183s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 183s | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 183s | decode_to_chunk: output: 183s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | decode_to_chunk: ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 183s | decode_to_chunk: output: 183s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 183s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 183s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 183s | verify_chunk_data: encrypt: ok 183s | verify_chunk_data: updated CBC IV: ok 183s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 183s | decode_to_chunk: output: 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | decode_to_chunk: new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 183s | decode_to_chunk: output: 183s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 183s | decode_to_chunk: ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 183s | decode_to_chunk: output: 183s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 183s | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 183s | decode_to_chunk: output: 183s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 183s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 183s | verify_chunk_data: decrypt: ok 183s | verify_chunk_data: updated CBC IV: ok 183s | test_ctr_vector: Camellia: 16 bytes with 128-bit key passed 183s algparse: Camellia: 16 bytes with 128-bit key 183s | decode_to_chunk: raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF" 183s | decode_to_chunk: output: 183s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379b20 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: CAMELLIA_CBC 183s | flags: ENCRYPT+DECRYPT 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06175100 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379b18 183s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 183s | decode_to_chunk: output: 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | decode_to_chunk: new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 183s | decode_to_chunk: output: 183s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 183s | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 183s | decode_to_chunk: output: 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 183s | decode_to_chunk: ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 183s | decode_to_chunk: output: 183s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 183s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 183s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 183s | verify_chunk_data: encrypt: ok 183s | verify_chunk_data: updated CBC IV: ok 183s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 183s | decode_to_chunk: output: 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | decode_to_chunk: new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 183s | decode_to_chunk: output: 183s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 183s | decode_to_chunk: ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 183s | decode_to_chunk: output: 183s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 183s | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 183s | decode_to_chunk: output: 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 183s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 183s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 183s | verify_chunk_data: decrypt: ok 183s | verify_chunk_data: updated CBC IV: ok 183s | test_ctr_vector: Camellia: 16 bytes with 128-bit key passed 183s algparse: Camellia: 16 bytes with 256-bit key 183s | decode_to_chunk: raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 183s | decode_to_chunk: output: 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379b20 183s | key-offset: 0, key-size: 32 183s | EXTRACT_KEY_FROM_KEY: 183s | target: CAMELLIA_CBC 183s | flags: ENCRYPT+DECRYPT 183s | key_size: 32-bytes 183s | base: base-key@0x2aa06175100 (48-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379b18 183s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 183s | decode_to_chunk: output: 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | decode_to_chunk: new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 183s | decode_to_chunk: output: 183s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 183s | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 183s | decode_to_chunk: output: 183s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | decode_to_chunk: ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 183s | decode_to_chunk: output: 183s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 183s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 183s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 183s | verify_chunk_data: encrypt: ok 183s | verify_chunk_data: updated CBC IV: ok 183s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 183s | decode_to_chunk: output: 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | decode_to_chunk: new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 183s | decode_to_chunk: output: 183s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 183s | decode_to_chunk: ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 183s | decode_to_chunk: output: 183s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 183s | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 183s | decode_to_chunk: output: 183s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 183s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 183s | verify_chunk_data: decrypt: ok 183s | verify_chunk_data: updated CBC IV: ok 183s | test_ctr_vector: Camellia: 16 bytes with 256-bit key passed 183s algparse: Camellia: 16 bytes with 256-bit key 183s | decode_to_chunk: raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF FF EE DD CC BB AA 99 88 77 66 55 44 33 22 11 00" 183s | decode_to_chunk: output: 183s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 183s | ff ee dd cc bb aa 99 88 77 66 55 44 33 22 11 00 ........wfUD3".. 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379b20 183s | key-offset: 0, key-size: 32 183s | EXTRACT_KEY_FROM_KEY: 183s | target: CAMELLIA_CBC 183s | flags: ENCRYPT+DECRYPT 183s | key_size: 32-bytes 183s | base: base-key@0x2aa06175100 (48-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379b18 183s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 183s | decode_to_chunk: output: 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | decode_to_chunk: new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 183s | decode_to_chunk: output: 183s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 183s | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 183s | decode_to_chunk: output: 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 183s | decode_to_chunk: ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 183s | decode_to_chunk: output: 183s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 183s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 183s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 183s | verify_chunk_data: encrypt: ok 183s | verify_chunk_data: updated CBC IV: ok 183s | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 183s | decode_to_chunk: output: 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | decode_to_chunk: new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 183s | decode_to_chunk: output: 183s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 183s | decode_to_chunk: ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 183s | decode_to_chunk: output: 183s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 183s | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 183s | decode_to_chunk: output: 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 183s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter 183s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 183s | verify_chunk_data: decrypt: ok 183s | verify_chunk_data: updated CBC IV: ok 183s | test_ctr_vector: Camellia: 16 bytes with 256-bit key passed 183s algparse: testing AES_GCM_16: 183s algparse: empty string 183s | decode_to_chunk: raw_key: input "0xcf063a34d4a9a76c2c86787d3f96db71" 183s | decode_to_chunk: output: 183s | cf 06 3a 34 d4 a9 a7 6c 2c 86 78 7d 3f 96 db 71 ..:4...l,.x}?..q 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379a68 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_GCM 183s | flags: ENCRYPT+DECRYPT 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06175100 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379a60 183s | decode_to_chunk: salted IV: input "0x113b9785971864c83b01c787" 183s | decode_to_chunk: output: 183s | 11 3b 97 85 97 18 64 c8 3b 01 c7 87 .;....d.;... 183s | decode_to_chunk: AAD: input "" 183s | decode_to_chunk: output: 183s | 183s | decode_to_chunk: plaintext: input "" 183s | decode_to_chunk: output: 183s | 183s | decode_to_chunk: ciphertext: input "" 183s | decode_to_chunk: output: 183s | 183s | decode_to_chunk: tag: input "0x72ac8493e3a5228b5d130a69d2510e42" 183s | decode_to_chunk: output: 183s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 183s | test_gcm_vector: decrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 183s | test_gcm_vector: text+tag on call 183s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 183s | verify_chunk_data: output ciphertext: ok 183s | verify_chunk_data: TAG: ok 183s | test_gcm_vector: text+tag on return 183s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 183s | test_gcm_vector: encrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 183s | test_gcm_vector: text+tag on call 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | verify_chunk_data: output ciphertext: ok 183s | verify_chunk_data: TAG: ok 183s | test_gcm_vector: text+tag on return 183s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 183s | test_gcm_vector: passed 183s algparse: one block 183s | decode_to_chunk: raw_key: input "0xe98b72a9881a84ca6b76e0f43e68647a" 183s | decode_to_chunk: output: 183s | e9 8b 72 a9 88 1a 84 ca 6b 76 e0 f4 3e 68 64 7a ..r.....kv..>hdz 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379a68 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_GCM 183s | flags: ENCRYPT+DECRYPT 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06175100 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379a60 183s | decode_to_chunk: salted IV: input "0x8b23299fde174053f3d652ba" 183s | decode_to_chunk: output: 183s | 8b 23 29 9f de 17 40 53 f3 d6 52 ba .#)...@S..R. 183s | decode_to_chunk: AAD: input "" 183s | decode_to_chunk: output: 183s | 183s | decode_to_chunk: plaintext: input "0x28286a321293253c3e0aa2704a278032" 183s | decode_to_chunk: output: 183s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 183s | decode_to_chunk: ciphertext: input "0x5a3c1cf1985dbb8bed818036fdd5ab42" 183s | decode_to_chunk: output: 183s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 183s | decode_to_chunk: tag: input "0x23c7ab0f952b7091cd324835043b5eb5" 183s | decode_to_chunk: output: 183s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 183s | test_gcm_vector: decrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 183s | test_gcm_vector: text+tag on call 183s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 183s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 183s | verify_chunk_data: output ciphertext: ok 183s | verify_chunk_data: TAG: ok 183s | test_gcm_vector: text+tag on return 183s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 183s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 183s | test_gcm_vector: encrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 183s | test_gcm_vector: text+tag on call 183s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | verify_chunk_data: output ciphertext: ok 183s | verify_chunk_data: TAG: ok 183s | test_gcm_vector: text+tag on return 183s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 183s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 183s | test_gcm_vector: passed 183s algparse: two blocks 183s | decode_to_chunk: raw_key: input "0xbfd414a6212958a607a0f5d3ab48471d" 183s | decode_to_chunk: output: 183s | bf d4 14 a6 21 29 58 a6 07 a0 f5 d3 ab 48 47 1d ....!)X......HG. 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379a68 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_GCM 183s | flags: ENCRYPT+DECRYPT 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06175100 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379a60 183s | decode_to_chunk: salted IV: input "0x86d8ea0ab8e40dcc481cd0e2" 183s | decode_to_chunk: output: 183s | 86 d8 ea 0a b8 e4 0d cc 48 1c d0 e2 ........H... 183s | decode_to_chunk: AAD: input "" 183s | decode_to_chunk: output: 183s | 183s | decode_to_chunk: plaintext: input "0xa6b76a066e63392c9443e60272ceaeb9d25c991b0f2e55e2804e168c05ea591a" 183s | decode_to_chunk: output: 183s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 183s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 183s | decode_to_chunk: ciphertext: input "0x62171db33193292d930bf6647347652c1ef33316d7feca99d54f1db4fcf513f8" 183s | decode_to_chunk: output: 183s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 183s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 183s | decode_to_chunk: tag: input "0xc28280aa5c6c7a8bd366f28c1cfd1f6e" 183s | decode_to_chunk: output: 183s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 183s | test_gcm_vector: decrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 183s | test_gcm_vector: text+tag on call 183s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 183s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 183s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 183s | verify_chunk_data: output ciphertext: ok 183s | verify_chunk_data: TAG: ok 183s | test_gcm_vector: text+tag on return 183s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 183s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 183s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 183s | test_gcm_vector: encrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 183s | test_gcm_vector: text+tag on call 183s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 183s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | verify_chunk_data: output ciphertext: ok 183s | verify_chunk_data: TAG: ok 183s | test_gcm_vector: text+tag on return 183s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 183s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 183s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 183s | test_gcm_vector: passed 183s algparse: two blocks with associated data 183s | decode_to_chunk: raw_key: input "0x006c458100fc5f4d62949d2c833b82d1" 183s | decode_to_chunk: output: 183s | 00 6c 45 81 00 fc 5f 4d 62 94 9d 2c 83 3b 82 d1 .lE..._Mb..,.;.. 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379a68 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_GCM 183s | flags: ENCRYPT+DECRYPT 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06175100 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379a60 183s | decode_to_chunk: salted IV: input "0xa4e9c4bc5725a21ff42c82b2" 183s | decode_to_chunk: output: 183s | a4 e9 c4 bc 57 25 a2 1f f4 2c 82 b2 ....W%...,.. 183s | decode_to_chunk: AAD: input "0x2efb14fb3657cdd6b9a8ff1a5f5a39b9" 183s | decode_to_chunk: output: 183s | 2e fb 14 fb 36 57 cd d6 b9 a8 ff 1a 5f 5a 39 b9 ....6W......_Z9. 183s | decode_to_chunk: plaintext: input "0xf381d3bfbee0a879f7a4e17b623278cedd6978053dd313530a18f1a836100950" 183s | decode_to_chunk: output: 183s | f3 81 d3 bf be e0 a8 79 f7 a4 e1 7b 62 32 78 ce .......y...{b2x. 183s | dd 69 78 05 3d d3 13 53 0a 18 f1 a8 36 10 09 50 .ix.=..S....6..P 183s | decode_to_chunk: ciphertext: input "0xf39b4db3542d8542fb73fd2d66be568f26d7f814b3f87d1eceac3dd09a8d697e" 183s | decode_to_chunk: output: 183s | f3 9b 4d b3 54 2d 85 42 fb 73 fd 2d 66 be 56 8f ..M.T-.B.s.-f.V. 183s | 26 d7 f8 14 b3 f8 7d 1e ce ac 3d d0 9a 8d 69 7e &.....}...=...i~ 183s | decode_to_chunk: tag: input "0x39f045cb23b698c925db134d56c5" 183s | decode_to_chunk: output: 183s | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 9.E.#...%..MV. 183s | test_gcm_vector: decrypt: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=14 183s | test_gcm_vector: text+tag on call 183s | f3 9b 4d b3 54 2d 85 42 fb 73 fd 2d 66 be 56 8f ..M.T-.B.s.-f.V. 183s | 26 d7 f8 14 b3 f8 7d 1e ce ac 3d d0 9a 8d 69 7e &.....}...=...i~ 183s | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 9.E.#...%..MV. 183s | verify_chunk_data: output ciphertext: ok 183s | verify_chunk_data: TAG: ok 183s | test_gcm_vector: text+tag on return 183s | f3 81 d3 bf be e0 a8 79 f7 a4 e1 7b 62 32 78 ce .......y...{b2x. 183s | dd 69 78 05 3d d3 13 53 0a 18 f1 a8 36 10 09 50 .ix.=..S....6..P 183s | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 9.E.#...%..MV. 183s | test_gcm_vector: encrypt: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=14 183s | test_gcm_vector: text+tag on call 183s | f3 81 d3 bf be e0 a8 79 f7 a4 e1 7b 62 32 78 ce .......y...{b2x. 183s | dd 69 78 05 3d d3 13 53 0a 18 f1 a8 36 10 09 50 .ix.=..S....6..P 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .............. 183s | verify_chunk_data: output ciphertext: ok 183s | verify_chunk_data: TAG: ok 183s | test_gcm_vector: text+tag on return 183s | f3 9b 4d b3 54 2d 85 42 fb 73 fd 2d 66 be 56 8f ..M.T-.B.s.-f.V. 183s | 26 d7 f8 14 b3 f8 7d 1e ce ac 3d d0 9a 8d 69 7e &.....}...=...i~ 183s | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 9.E.#...%..MV. 183s | test_gcm_vector: passed 183s algparse: testing AES_CTR: 183s algparse: Encrypting 16 octets using AES-CTR with 128-bit key 183s | decode_to_chunk: raw_key: input "0x AE 68 52 F8 12 10 67 CC 4B F7 A5 76 55 77 F3 9E" 183s | decode_to_chunk: output: 183s | ae 68 52 f8 12 10 67 cc 4b f7 a5 76 55 77 f3 9e .hR...g.K..vUw.. 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379b18 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_CTR 183s | flags: ENCRYPT+DECRYPT 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06175100 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379b10 183s | decode_to_chunk: input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 183s | decode_to_chunk: output: 183s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 183s | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 183s | decode_to_chunk: output: 183s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 183s | decode_to_chunk: Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 183s | decode_to_chunk: output: 183s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 183s | decode_to_chunk: expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 183s | decode_to_chunk: output: 183s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 183s | do_aes_ctr: enter 183s | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes 183s | do_aes_ctr: exit 183s | verify_chunk_data: encrypt: ok 183s | verify_chunk_data: counter-block: ok 183s | decode_to_chunk: input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 183s | decode_to_chunk: output: 183s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 183s | decode_to_chunk: Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 183s | decode_to_chunk: output: 183s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 183s | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 183s | decode_to_chunk: output: 183s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 183s | decode_to_chunk: expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 183s | decode_to_chunk: output: 183s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 183s | do_aes_ctr: enter 183s | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes 183s | do_aes_ctr: exit 183s | verify_chunk_data: decrypt: ok 183s | verify_chunk_data: counter-block: ok 183s | test_ctr_vector: Encrypting 16 octets using AES-CTR with 128-bit key passed 183s algparse: Encrypting 32 octets using AES-CTR with 128-bit key 183s | decode_to_chunk: raw_key: input "0x 7E 24 06 78 17 FA E0 D7 43 D6 CE 1F 32 53 91 63" 183s | decode_to_chunk: output: 183s | 7e 24 06 78 17 fa e0 d7 43 d6 ce 1f 32 53 91 63 ~$.x....C...2S.c 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379b18 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_CTR 183s | flags: ENCRYPT+DECRYPT 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06175100 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379b10 183s | decode_to_chunk: input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 183s | decode_to_chunk: output: 183s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 183s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 183s | decode_to_chunk: output: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 183s | decode_to_chunk: Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 183s | decode_to_chunk: output: 183s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 183s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 183s | decode_to_chunk: expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 183s | decode_to_chunk: output: 183s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 .l...T;Y.H...... 183s | do_aes_ctr: enter 183s | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes 183s | do_aes_ctr: exit 183s | verify_chunk_data: encrypt: ok 183s | verify_chunk_data: counter-block: ok 183s | decode_to_chunk: input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 183s | decode_to_chunk: output: 183s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 183s | decode_to_chunk: Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 183s | decode_to_chunk: output: 183s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 183s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 183s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 183s | decode_to_chunk: output: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 183s | decode_to_chunk: expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 183s | decode_to_chunk: output: 183s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 .l...T;Y.H...... 183s | do_aes_ctr: enter 183s | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes 183s | do_aes_ctr: exit 183s | verify_chunk_data: decrypt: ok 183s | verify_chunk_data: counter-block: ok 183s | test_ctr_vector: Encrypting 32 octets using AES-CTR with 128-bit key passed 183s algparse: Encrypting 36 octets using AES-CTR with 128-bit key 183s | decode_to_chunk: raw_key: input "0x 76 91 BE 03 5E 50 20 A8 AC 6E 61 85 29 F9 A0 DC" 183s | decode_to_chunk: output: 183s | 76 91 be 03 5e 50 20 a8 ac 6e 61 85 29 f9 a0 dc v...^P ..na.)... 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379b18 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_CTR 183s | flags: ENCRYPT+DECRYPT 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06175100 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379b10 183s | decode_to_chunk: input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 183s | decode_to_chunk: output: 183s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 183s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 183s | decode_to_chunk: output: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 183s | 20 21 22 23 !"# 183s | decode_to_chunk: Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 183s | decode_to_chunk: output: 183s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 183s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 183s | 25 b2 07 2f %../ 183s | decode_to_chunk: expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 183s | decode_to_chunk: output: 183s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 183s | do_aes_ctr: enter 183s | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes 183s | do_aes_ctr: exit 183s | verify_chunk_data: encrypt: ok 183s | verify_chunk_data: counter-block: ok 183s | decode_to_chunk: input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 183s | decode_to_chunk: output: 183s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 183s | decode_to_chunk: Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 183s | decode_to_chunk: output: 183s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 183s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 183s | 25 b2 07 2f %../ 183s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 183s | decode_to_chunk: output: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 183s | 20 21 22 23 !"# 183s | decode_to_chunk: expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 183s | decode_to_chunk: output: 183s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 183s | do_aes_ctr: enter 183s | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes 183s | do_aes_ctr: exit 183s | verify_chunk_data: decrypt: ok 183s | verify_chunk_data: counter-block: ok 183s | test_ctr_vector: Encrypting 36 octets using AES-CTR with 128-bit key passed 183s algparse: Encrypting 16 octets using AES-CTR with 192-bit key 183s | decode_to_chunk: raw_key: input "0x16 AF 5B 14 5F C9 F5 79 C1 75 F9 3E 3B FB 0E ED86 3D 06 CC FD B7 85 15" 183s | decode_to_chunk: output: 183s | 16 af 5b 14 5f c9 f5 79 c1 75 f9 3e 3b fb 0e ed ..[._..y.u.>;... 183s | 86 3d 06 cc fd b7 85 15 .=...... 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379b18 183s | key-offset: 0, key-size: 24 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_CTR 183s | flags: ENCRYPT+DECRYPT 183s | key_size: 24-bytes 183s | base: base-key@0x2aa06175100 (40-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379b10 183s | decode_to_chunk: input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 183s | decode_to_chunk: output: 183s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 183s | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 183s | decode_to_chunk: output: 183s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 183s | decode_to_chunk: Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 183s | decode_to_chunk: output: 183s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 183s | decode_to_chunk: expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 183s | decode_to_chunk: output: 183s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 183s | do_aes_ctr: enter 183s | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes 183s | do_aes_ctr: exit 183s | verify_chunk_data: encrypt: ok 183s | verify_chunk_data: counter-block: ok 183s | decode_to_chunk: input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 183s | decode_to_chunk: output: 183s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 183s | decode_to_chunk: Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 183s | decode_to_chunk: output: 183s initializing NSS db 183s running pluto selftest 183s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 183s | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 183s | decode_to_chunk: output: 183s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 183s | decode_to_chunk: expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 183s | decode_to_chunk: output: 183s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 183s | do_aes_ctr: enter 183s | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes 183s | do_aes_ctr: exit 183s | verify_chunk_data: decrypt: ok 183s | verify_chunk_data: counter-block: ok 183s | test_ctr_vector: Encrypting 16 octets using AES-CTR with 192-bit key passed 183s algparse: Encrypting 32 octets using AES-CTR with 192-bit key 183s | decode_to_chunk: raw_key: input "0x7C 5C B2 40 1B 3D C3 3C 19 E7 34 08 19 E0 F6 9C67 8C 3D B8 E6 F6 A9 1A" 183s | decode_to_chunk: output: 183s | 7c 5c b2 40 1b 3d c3 3c 19 e7 34 08 19 e0 f6 9c |\.@.=.<..4..... 183s | 67 8c 3d b8 e6 f6 a9 1a g.=..... 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379b18 183s | key-offset: 0, key-size: 24 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_CTR 183s | flags: ENCRYPT+DECRYPT 183s | key_size: 24-bytes 183s | base: base-key@0x2aa06175100 (40-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379b10 183s | decode_to_chunk: input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 183s | decode_to_chunk: output: 183s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 183s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 183s | decode_to_chunk: output: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 183s | decode_to_chunk: Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 183s | decode_to_chunk: output: 183s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 183s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 183s | decode_to_chunk: expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 183s | decode_to_chunk: output: 183s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 183s | do_aes_ctr: enter 183s | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes 183s | do_aes_ctr: exit 183s | verify_chunk_data: encrypt: ok 183s | verify_chunk_data: counter-block: ok 183s | decode_to_chunk: input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 183s | decode_to_chunk: output: 183s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 183s | decode_to_chunk: Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 183s | decode_to_chunk: output: 183s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 183s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 183s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 183s | decode_to_chunk: output: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 183s | decode_to_chunk: expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 183s | decode_to_chunk: output: 183s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 183s | do_aes_ctr: enter 183s | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes 183s | do_aes_ctr: exit 183s | verify_chunk_data: decrypt: ok 183s | verify_chunk_data: counter-block: ok 183s | test_ctr_vector: Encrypting 32 octets using AES-CTR with 192-bit key passed 183s algparse: Encrypting 36 octets using AES-CTR with 192-bit key 183s | decode_to_chunk: raw_key: input "0x02 BF 39 1E E8 EC B1 59 B9 59 61 7B 09 65 27 9BF5 9B 60 A7 86 D3 E0 FE" 183s | decode_to_chunk: output: 183s | 02 bf 39 1e e8 ec b1 59 b9 59 61 7b 09 65 27 9b ..9....Y.Ya{.e'. 183s | f5 9b 60 a7 86 d3 e0 fe ..`..... 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379b18 183s | key-offset: 0, key-size: 24 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_CTR 183s | flags: ENCRYPT+DECRYPT 183s | key_size: 24-bytes 183s | base: base-key@0x2aa06175100 (40-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379b10 183s | decode_to_chunk: input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 183s | decode_to_chunk: output: 183s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 183s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 183s | decode_to_chunk: output: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 183s | 20 21 22 23 !"# 183s | decode_to_chunk: Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 183s | decode_to_chunk: output: 183s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 183s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 183s | ab ee 09 35 ...5 183s | decode_to_chunk: expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 183s | decode_to_chunk: output: 183s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 183s | do_aes_ctr: enter 183s | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes 183s | do_aes_ctr: exit 183s | verify_chunk_data: encrypt: ok 183s | verify_chunk_data: counter-block: ok 183s | decode_to_chunk: input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 183s | decode_to_chunk: output: 183s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 183s | decode_to_chunk: Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 183s | decode_to_chunk: output: 183s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 183s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 183s | ab ee 09 35 ...5 183s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 183s | decode_to_chunk: output: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 183s | 20 21 22 23 !"# 183s | decode_to_chunk: expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 183s | decode_to_chunk: output: 183s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 183s | do_aes_ctr: enter 183s | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes 183s | do_aes_ctr: exit 183s | verify_chunk_data: decrypt: ok 183s | verify_chunk_data: counter-block: ok 183s | test_ctr_vector: Encrypting 36 octets using AES-CTR with 192-bit key passed 183s algparse: Encrypting 16 octets using AES-CTR with 256-bit key 183s | decode_to_chunk: raw_key: input "0x77 6B EF F2 85 1D B0 6F 4C 8A 05 42 C8 69 6F 6C6A 81 AF 1E EC 96 B4 D3 7F C1 D6 89 E6 C1 C1 04" 183s | decode_to_chunk: output: 183s | 77 6b ef f2 85 1d b0 6f 4c 8a 05 42 c8 69 6f 6c wk.....oL..B.iol 183s | 6a 81 af 1e ec 96 b4 d3 7f c1 d6 89 e6 c1 c1 04 j............... 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379b18 183s | key-offset: 0, key-size: 32 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_CTR 183s | flags: ENCRYPT+DECRYPT 183s | key_size: 32-bytes 183s | base: base-key@0x2aa06175100 (48-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379b10 183s | decode_to_chunk: input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 183s | decode_to_chunk: output: 183s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 183s | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 183s | decode_to_chunk: output: 183s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 183s | decode_to_chunk: Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 183s | decode_to_chunk: output: 183s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 183s | decode_to_chunk: expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 183s | decode_to_chunk: output: 183s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 183s | do_aes_ctr: enter 183s | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes 183s | do_aes_ctr: exit 183s | verify_chunk_data: encrypt: ok 183s | verify_chunk_data: counter-block: ok 183s | decode_to_chunk: input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 183s | decode_to_chunk: output: 183s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 183s | decode_to_chunk: Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 183s | decode_to_chunk: output: 183s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 183s | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 183s | decode_to_chunk: output: 183s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 183s | decode_to_chunk: expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 183s | decode_to_chunk: output: 183s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 183s | do_aes_ctr: enter 183s | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes 183s | do_aes_ctr: exit 183s | verify_chunk_data: decrypt: ok 183s | verify_chunk_data: counter-block: ok 183s | test_ctr_vector: Encrypting 16 octets using AES-CTR with 256-bit key passed 183s algparse: Encrypting 32 octets using AES-CTR with 256-bit key 183s | decode_to_chunk: raw_key: input "0xF6 D6 6D 6B D5 2D 59 BB 07 96 36 58 79 EF F8 86C6 6D D5 1A 5B 6A 99 74 4B 50 59 0C 87 A2 38 84" 183s | decode_to_chunk: output: 183s | f6 d6 6d 6b d5 2d 59 bb 07 96 36 58 79 ef f8 86 ..mk.-Y...6Xy... 183s | c6 6d d5 1a 5b 6a 99 74 4b 50 59 0c 87 a2 38 84 .m..[j.tKPY...8. 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379b18 183s | key-offset: 0, key-size: 32 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_CTR 183s | flags: ENCRYPT+DECRYPT 183s | key_size: 32-bytes 183s | base: base-key@0x2aa06175100 (48-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379b10 183s | decode_to_chunk: input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 183s | decode_to_chunk: output: 183s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 183s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 183s | decode_to_chunk: output: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 183s | decode_to_chunk: Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 183s | decode_to_chunk: output: 183s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 183s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 183s | decode_to_chunk: expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 183s | decode_to_chunk: output: 183s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 183s | do_aes_ctr: enter 183s | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes 183s | do_aes_ctr: exit 183s | verify_chunk_data: encrypt: ok 183s | verify_chunk_data: counter-block: ok 183s | decode_to_chunk: input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 183s | decode_to_chunk: output: 183s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 183s | decode_to_chunk: Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 183s | decode_to_chunk: output: 183s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 183s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 183s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 183s | decode_to_chunk: output: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 183s | decode_to_chunk: expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 183s | decode_to_chunk: output: 183s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 183s | do_aes_ctr: enter 183s | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes 183s | do_aes_ctr: exit 183s | verify_chunk_data: decrypt: ok 183s | verify_chunk_data: counter-block: ok 183s | test_ctr_vector: Encrypting 32 octets using AES-CTR with 256-bit key passed 183s algparse: Encrypting 36 octets using AES-CTR with 256-bit key 183s | decode_to_chunk: raw_key: input "0xFF 7A 61 7C E6 91 48 E4 F1 72 6E 2F 43 58 1D E2AA 62 D9 F8 05 53 2E DF F1 EE D6 87 FB 54 15 3D" 183s | decode_to_chunk: output: 183s | ff 7a 61 7c e6 91 48 e4 f1 72 6e 2f 43 58 1d e2 .za|..H..rn/CX.. 183s | aa 62 d9 f8 05 53 2e df f1 ee d6 87 fb 54 15 3d .b...S.......T.= 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379b18 183s | key-offset: 0, key-size: 32 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_CTR 183s | flags: ENCRYPT+DECRYPT 183s | key_size: 32-bytes 183s | base: base-key@0x2aa06175100 (48-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379b10 183s | decode_to_chunk: input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 183s | decode_to_chunk: output: 183s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 183s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 183s | decode_to_chunk: output: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 183s | 20 21 22 23 !"# 183s | decode_to_chunk: Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 183s | decode_to_chunk: output: 183s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 183s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 183s | 1e c0 e6 b8 .... 183s | decode_to_chunk: expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 183s | decode_to_chunk: output: 183s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 183s | do_aes_ctr: enter 183s | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes 183s | do_aes_ctr: exit 183s | verify_chunk_data: encrypt: ok 183s | verify_chunk_data: counter-block: ok 183s | decode_to_chunk: input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 183s | decode_to_chunk: output: 183s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 183s | decode_to_chunk: Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 183s | decode_to_chunk: output: 183s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 183s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 183s | 1e c0 e6 b8 .... 183s | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 183s | decode_to_chunk: output: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 183s | 20 21 22 23 !"# 183s | decode_to_chunk: expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 183s | decode_to_chunk: output: 183s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 183s | do_aes_ctr: enter 183s | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes 183s | do_aes_ctr: exit 183s | verify_chunk_data: decrypt: ok 183s | verify_chunk_data: counter-block: ok 183s | test_ctr_vector: Encrypting 36 octets using AES-CTR with 256-bit key passed 183s algparse: testing AES_CBC: 183s algparse: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 183s | decode_to_chunk: raw_key: input "0x06a9214036b8a15b512e03d534120006" 183s | decode_to_chunk: output: 183s | 06 a9 21 40 36 b8 a1 5b 51 2e 03 d5 34 12 00 06 ..!@6..[Q...4... 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379b20 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_CBC 183s | flags: ENCRYPT+DECRYPT 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06175100 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379b18 183s | decode_to_chunk: IV: : input "0x3dafba429d9eb430b422da802c9fac41" 183s | decode_to_chunk: output: 183s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 183s | decode_to_chunk: new IV: : input "0xe353779c1079aeb82708942dbe77181a" 183s | decode_to_chunk: output: 183s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 183s | decode_to_chunk: plaintext: : input "Single block msg" 183s | decode_to_chunk: output: 183s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 183s | decode_to_chunk: ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 183s | decode_to_chunk: output: 183s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 183s | NSS ike_alg_nss_cbc: AES_CBC - enter 183s | NSS ike_alg_nss_cbc: AES_CBC - exit 183s | verify_chunk_data: encrypt: ok 183s | verify_chunk_data: updated CBC IV: ok 183s | decode_to_chunk: IV: : input "0x3dafba429d9eb430b422da802c9fac41" 183s | decode_to_chunk: output: 183s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 183s | decode_to_chunk: new IV: : input "0xe353779c1079aeb82708942dbe77181a" 183s | decode_to_chunk: output: 183s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 183s | decode_to_chunk: ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 183s | decode_to_chunk: output: 183s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 183s | decode_to_chunk: plaintext: : input "Single block msg" 183s | decode_to_chunk: output: 183s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 183s | NSS ike_alg_nss_cbc: AES_CBC - enter 183s | NSS ike_alg_nss_cbc: AES_CBC - exit 183s | verify_chunk_data: decrypt: ok 183s | verify_chunk_data: updated CBC IV: ok 183s | test_ctr_vector: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key passed 183s algparse: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 183s | decode_to_chunk: raw_key: input "0xc286696d887c9aa0611bbb3e2025a45a" 183s | decode_to_chunk: output: 183s | c2 86 69 6d 88 7c 9a a0 61 1b bb 3e 20 25 a4 5a ..im.|..a..> %.Z 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379b20 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_CBC 183s | flags: ENCRYPT+DECRYPT 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06175100 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379b18 183s | decode_to_chunk: IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 183s | decode_to_chunk: output: 183s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 183s | decode_to_chunk: new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 183s | decode_to_chunk: output: 183s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 183s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 183s | decode_to_chunk: plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 183s | decode_to_chunk: output: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 183s | decode_to_chunk: ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 183s | decode_to_chunk: output: 183s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 183s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 183s | NSS ike_alg_nss_cbc: AES_CBC - enter 183s | NSS ike_alg_nss_cbc: AES_CBC - exit 183s | verify_chunk_data: encrypt: ok 183s | verify_chunk_data: updated CBC IV: ok 183s | decode_to_chunk: IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 183s | decode_to_chunk: output: 183s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 183s | decode_to_chunk: new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 183s | decode_to_chunk: output: 183s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 183s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 183s | decode_to_chunk: ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 183s | decode_to_chunk: output: 183s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 183s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 183s | decode_to_chunk: plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 183s | decode_to_chunk: output: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 183s | NSS ike_alg_nss_cbc: AES_CBC - enter 183s | NSS ike_alg_nss_cbc: AES_CBC - exit 183s | verify_chunk_data: decrypt: ok 183s | verify_chunk_data: updated CBC IV: ok 183s | test_ctr_vector: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key passed 183s algparse: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 183s | decode_to_chunk: raw_key: input "0x6c3ea0477630ce21a2ce334aa746c2cd" 183s | decode_to_chunk: output: 183s | 6c 3e a0 47 76 30 ce 21 a2 ce 33 4a a7 46 c2 cd l>.Gv0.!..3J.F.. 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379b20 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_CBC 183s | flags: ENCRYPT+DECRYPT 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06175100 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379b18 183s | decode_to_chunk: IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 183s | decode_to_chunk: output: 183s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 183s | decode_to_chunk: new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 183s | decode_to_chunk: output: 183s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 183s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 183s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 183s | decode_to_chunk: plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 183s | decode_to_chunk: output: 183s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 183s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 183s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 183s | decode_to_chunk: ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 183s | decode_to_chunk: output: 183s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 183s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 183s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 183s | NSS ike_alg_nss_cbc: AES_CBC - enter 183s | NSS ike_alg_nss_cbc: AES_CBC - exit 183s | verify_chunk_data: encrypt: ok 183s | verify_chunk_data: updated CBC IV: ok 183s | decode_to_chunk: IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 183s | decode_to_chunk: output: 183s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 183s | decode_to_chunk: new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 183s | decode_to_chunk: output: 183s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 183s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 183s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 183s | decode_to_chunk: ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 183s | decode_to_chunk: output: 183s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 183s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 183s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 183s | decode_to_chunk: plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 183s | decode_to_chunk: output: 183s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 183s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 183s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 183s | NSS ike_alg_nss_cbc: AES_CBC - enter 183s | NSS ike_alg_nss_cbc: AES_CBC - exit 183s | verify_chunk_data: decrypt: ok 183s | verify_chunk_data: updated CBC IV: ok 183s | test_ctr_vector: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key passed 183s algparse: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 183s | decode_to_chunk: raw_key: input "0x56e47a38c5598974bc46903dba290349" 183s | decode_to_chunk: output: 183s | 56 e4 7a 38 c5 59 89 74 bc 46 90 3d ba 29 03 49 V.z8.Y.t.F.=.).I 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379b20 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_CBC 183s | flags: ENCRYPT+DECRYPT 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06175100 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379b18 183s | decode_to_chunk: IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 183s | decode_to_chunk: output: 183s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 183s | decode_to_chunk: plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 183s | decode_to_chunk: output: 183s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 183s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 183s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 183s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 183s | decode_to_chunk: ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 183s | decode_to_chunk: output: 183s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 183s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 183s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 183s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 183s | NSS ike_alg_nss_cbc: AES_CBC - enter 183s | NSS ike_alg_nss_cbc: AES_CBC - exit 183s | verify_chunk_data: encrypt: ok 183s | verify_chunk_data: updated CBC IV: ok 183s | decode_to_chunk: IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 183s | decode_to_chunk: output: 183s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 183s | decode_to_chunk: ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 183s | decode_to_chunk: output: 183s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 183s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 183s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 183s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 183s | decode_to_chunk: plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 183s | decode_to_chunk: output: 183s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 183s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 183s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 183s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 183s | NSS ike_alg_nss_cbc: AES_CBC - enter 183s | NSS ike_alg_nss_cbc: AES_CBC - exit 183s | verify_chunk_data: decrypt: ok 183s | verify_chunk_data: updated CBC IV: ok 183s | test_ctr_vector: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key passed 183s algparse: testing AES_XCBC: 183s algparse: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 183s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 183s | decode_to_chunk: output: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | decode_to_chunk: test_prf_vector: input "" 183s | decode_to_chunk: output: 183s | 183s | decode_to_chunk: test_prf_vector: input "0x75f0251d528ac01c4573dfd584d79f29" 183s | decode_to_chunk: output: 183s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 183s | PRF chunk interface PRF AES_XCBC init key-chunk@0x2aa061750b0 (length 16) 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc23799a0 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06175100 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379998 183s | XCBC: Key 16=16 just right 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa061736f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379918 183s | PRF chunk interface PRF AES_XCBC 0x2aa06175b80 183s | PRF chunk interface PRF AES_XCBC update message (0x2aa061752e0 length 0) 183s | 183s | XCBC: data 183s | 183s | K extracting all 16 bytes of key@0x2aa06175100 183s | K: symkey-key@0x2aa06175100 (16-bytes, AES_ECB) 183s | sizeof bytes 16 183s | wrapper: (SECItemType)1023: 99 59 15 08 7f c4 55 8d 2d 27 5f e2 3c ca 1e fa 183s | K extracted len 16 bytes at 0x2aa06174ff0 183s | unwrapped: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | XCBC: K: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | XCBC: K1 183s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc23797d0 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa061786f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc23797c8 183s | Computing E[0] using K3 183s | XCBC: K3 183s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 183s | XCBC: E[n-1] 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | XCBC: M[n] 183s | 183s | XCBC: M[n] 183s | 183s | XCBC: M[n]:80...^E[n-1]^K3 183s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 183s | XCBC: MAC 183s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 183s | PRF chunk interface PRF AES_XCBC final length 16 183s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 183s | chunk output 183s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 183s | verify_chunk_data: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: ok 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379b00 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 16-bytes 183s | base: base-key@0x2aa061736f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379af8 183s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa06175100 (size 16) 183s | PRF symkey interface: key symkey-key@0x2aa06175100 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | XCBC: Key 16=16 just right 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06175100 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc23799c8 183s | PRF symkey interface PRF AES_XCBC 0x2aa06175b80 183s | PRF symkey interface PRF AES_XCBC update symkey message-key@(nil) (size 0) 183s | PRF symkey interface: symkey message-key@NULL 183s | symkey message NULL key has no bytes 183s | XCBC: data 183s | 183s | K extracting all 16 bytes of key@0x2aa061736f0 183s | K: symkey-key@0x2aa061736f0 (16-bytes, AES_ECB) 183s | sizeof bytes 16 183s | wrapper: (SECItemType)1023: 99 59 15 08 7f c4 55 8d 2d 27 5f e2 3c ca 1e fa 183s | K extracted len 16 bytes at 0x2aa06176b70 183s | unwrapped: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | XCBC: K: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | XCBC: K1 183s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379820 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06179f80 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379818 183s | Computing E[0] using K3 183s | XCBC: K3 183s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 183s | XCBC: E[n-1] 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | XCBC: M[n] 183s | 183s | XCBC: M[n] 183s | 183s | XCBC: M[n]:80...^E[n-1]^K3 183s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 183s | XCBC: MAC 183s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379998 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06179f80 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379990 183s | PRF symkey interface PRF AES_XCBC final-key@0x2aa061786f0 (size 16) 183s | PRF symkey interface: key-key@0x2aa061786f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | output: symkey-key@0x2aa061786f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracting all 16 bytes of key@0x2aa061786f0 183s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: symkey-key@0x2aa061786f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | sizeof bytes 16 183s | wrapper: (SECItemType)1023: e6 12 69 db 15 33 f8 6a 6b e6 4d 8e 33 b2 84 d1 183s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracted len 16 bytes at 0x2aa06175b80 183s | unwrapped: 183s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 183s | verify_chunk_data: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: ok 183s | test_prf_vector: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input passed 183s algparse: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 183s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 183s | decode_to_chunk: output: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | decode_to_chunk: test_prf_vector: input "0x000102" 183s | decode_to_chunk: output: 183s | 00 01 02 ... 183s | decode_to_chunk: test_prf_vector: input "0x5b376580ae2f19afe7219ceef172756f" 183s | decode_to_chunk: output: 183s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 183s | PRF chunk interface PRF AES_XCBC init key-chunk@0x2aa061754f0 (length 16) 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc23799a0 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06175100 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379998 183s | XCBC: Key 16=16 just right 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa061786f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379918 183s | PRF chunk interface PRF AES_XCBC 0x2aa06175b80 183s | PRF chunk interface PRF AES_XCBC update message (0x2aa06176a10 length 3) 183s | 00 01 02 ... 183s | XCBC: data 183s | 00 01 02 ... 183s | K extracting all 16 bytes of key@0x2aa06175100 183s | K: symkey-key@0x2aa06175100 (16-bytes, AES_ECB) 183s | sizeof bytes 16 183s | wrapper: (SECItemType)1023: 99 59 15 08 7f c4 55 8d 2d 27 5f e2 3c ca 1e fa 183s | K extracted len 16 bytes at 0x2aa06176e40 183s | unwrapped: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | XCBC: K: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | XCBC: K1 183s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc23797d0 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa061736f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc23797c8 183s | Computing E[1] using K3 183s | XCBC: K3 183s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 183s | XCBC: E[n-1] 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | XCBC: M[n] 183s | 00 01 02 ... 183s | XCBC: M[n] 183s | 00 01 02 ... 183s | XCBC: M[n]:80...^E[n-1]^K3 183s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 183s | XCBC: MAC 183s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 183s | PRF chunk interface PRF AES_XCBC final length 16 183s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 183s | chunk output 183s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 183s | verify_chunk_data: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: ok 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379b00 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 16-bytes 183s | base: base-key@0x2aa061786f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379af8 183s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa06175100 (size 16) 183s | PRF symkey interface: key symkey-key@0x2aa06175100 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | XCBC: Key 16=16 just right 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06175100 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc23799c8 183s | PRF symkey interface PRF AES_XCBC 0x2aa06175b80 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379b00 183s | key-offset: 0, key-size: 3 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 3-bytes 183s | base: base-key@0x2aa06179f80 (19-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379af8 183s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa061736f0 (size 3) 183s | PRF symkey interface: symkey message-key@0x2aa061736f0 (3-bytes, EXTRACT_KEY_FROM_KEY) 183s | symkey message extracting all 3 bytes of key@0x2aa061736f0 183s | symkey message: symkey-key@0x2aa061736f0 (3-bytes, EXTRACT_KEY_FROM_KEY) 183s | sizeof bytes 16 183s | wrapper: (SECItemType)682: cf 86 20 b6 2f 4c 9f 56 da 34 b9 3e ed 42 a2 3a 183s | symkey message extracted len 16 bytes at 0x2aa06176a30 183s | unwrapped: 183s | 00 01 02 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | XCBC: data 183s | 00 01 02 ... 183s | K extracting all 16 bytes of key@0x2aa061786f0 183s | K: symkey-key@0x2aa061786f0 (16-bytes, AES_ECB) 183s | sizeof bytes 16 183s | wrapper: (SECItemType)1023: 99 59 15 08 7f c4 55 8d 2d 27 5f e2 3c ca 1e fa 183s | K extracted len 16 bytes at 0x2aa06175010 183s | unwrapped: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | XCBC: K: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | XCBC: K1 183s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379820 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa0617b810 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379818 183s | Computing E[1] using K3 183s | XCBC: K3 183s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 183s | XCBC: E[n-1] 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | XCBC: M[n] 183s | 00 01 02 ... 183s | XCBC: M[n] 183s | 00 01 02 ... 183s | XCBC: M[n]:80...^E[n-1]^K3 183s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 183s | XCBC: MAC 183s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379998 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 16-bytes 183s | base: base-key@0x2aa0617b810 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379990 183s | PRF symkey interface PRF AES_XCBC final-key@0x2aa06179f80 (size 16) 183s | PRF symkey interface: key-key@0x2aa06179f80 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | output: symkey-key@0x2aa06179f80 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracting all 16 bytes of key@0x2aa06179f80 183s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: symkey-key@0x2aa06179f80 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | sizeof bytes 16 183s | wrapper: (SECItemType)1023: 5a 0e 58 ee 60 a2 26 13 4c b4 3d 44 26 40 61 ac 183s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracted len 16 bytes at 0x2aa06175b80 183s | unwrapped: 183s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 183s | verify_chunk_data: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: ok 183s | test_prf_vector: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input passed 183s algparse: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 183s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 183s | decode_to_chunk: output: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 183s | decode_to_chunk: output: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | decode_to_chunk: test_prf_vector: input "0xd2a246fa349b68a79998a4394ff7a263" 183s | decode_to_chunk: output: 183s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 183s | PRF chunk interface PRF AES_XCBC init key-chunk@0x2aa061750b0 (length 16) 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc23799a0 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06175100 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379998 183s | XCBC: Key 16=16 just right 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06179f80 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379918 183s | PRF chunk interface PRF AES_XCBC 0x2aa06175b80 183s | PRF chunk interface PRF AES_XCBC update message (0x2aa061736d0 length 16) 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | XCBC: data 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | K extracting all 16 bytes of key@0x2aa06175100 183s | K: symkey-key@0x2aa06175100 (16-bytes, AES_ECB) 183s | sizeof bytes 16 183s | wrapper: (SECItemType)1023: 99 59 15 08 7f c4 55 8d 2d 27 5f e2 3c ca 1e fa 183s | K extracted len 16 bytes at 0x2aa061754f0 183s | unwrapped: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | XCBC: K: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | XCBC: K1 183s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc23797d0 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa061736f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc23797c8 183s | XCBC: Computing E[1] using K2 183s | XCBC: K2 183s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 183s | XCBC: E[n-1] 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | XCBC: M[n] 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | XCBC: M[n]^E[n-1]^K2 183s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 183s | XCBC: MAC 183s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 183s | PRF chunk interface PRF AES_XCBC final length 16 183s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 183s | chunk output 183s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 183s | verify_chunk_data: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: ok 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379b00 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06179f80 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379af8 183s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa06175100 (size 16) 183s | PRF symkey interface: key symkey-key@0x2aa06175100 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | XCBC: Key 16=16 just right 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06175100 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc23799c8 183s | PRF symkey interface PRF AES_XCBC 0x2aa06175b80 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379b00 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 16-bytes 183s | base: base-key@0x2aa061786f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379af8 183s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa061736f0 (size 16) 183s | PRF symkey interface: symkey message-key@0x2aa061736f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | symkey message extracting all 16 bytes of key@0x2aa061736f0 183s | symkey message: symkey-key@0x2aa061736f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | sizeof bytes 16 183s | wrapper: (SECItemType)682: 99 59 15 08 7f c4 55 8d 2d 27 5f e2 3c ca 1e fa 183s | symkey message extracted len 16 bytes at 0x2aa06176e40 183s | unwrapped: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | XCBC: data 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | K extracting all 16 bytes of key@0x2aa06179f80 183s | K: symkey-key@0x2aa06179f80 (16-bytes, AES_ECB) 183s | sizeof bytes 16 183s | wrapper: (SECItemType)1023: 99 59 15 08 7f c4 55 8d 2d 27 5f e2 3c ca 1e fa 183s | K extracted len 16 bytes at 0x2aa06176e60 183s | unwrapped: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | XCBC: K: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | XCBC: K1 183s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379820 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa0617b810 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379818 183s | XCBC: Computing E[1] using K2 183s | XCBC: K2 183s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 183s | XCBC: E[n-1] 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | XCBC: M[n] 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | XCBC: M[n]^E[n-1]^K2 183s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 183s | XCBC: MAC 183s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379998 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 16-bytes 183s | base: base-key@0x2aa0617b810 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379990 183s | PRF symkey interface PRF AES_XCBC final-key@0x2aa061786f0 (size 16) 183s | PRF symkey interface: key-key@0x2aa061786f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | output: symkey-key@0x2aa061786f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracting all 16 bytes of key@0x2aa061786f0 183s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: symkey-key@0x2aa061786f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | sizeof bytes 16 183s | wrapper: (SECItemType)1023: b8 ba 41 20 f5 24 8a f6 76 83 80 04 6a 91 df 1a 183s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracted len 16 bytes at 0x2aa06175b80 183s | unwrapped: 183s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 183s | verify_chunk_data: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: ok 183s | test_prf_vector: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input passed 183s algparse: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 183s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 183s | decode_to_chunk: output: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 183s | decode_to_chunk: output: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 .... 183s | decode_to_chunk: test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 183s | decode_to_chunk: output: 183s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 183s | PRF chunk interface PRF AES_XCBC init key-chunk@0x2aa061752e0 (length 16) 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc23799a0 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06175100 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379998 183s | XCBC: Key 16=16 just right 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa061786f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379918 183s | PRF chunk interface PRF AES_XCBC 0x2aa06175b80 183s | PRF chunk interface PRF AES_XCBC update message (0x2aa0615a8a0 length 20) 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 .... 183s | XCBC: data 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 .... 183s | K extracting all 16 bytes of key@0x2aa06175100 183s | K: symkey-key@0x2aa06175100 (16-bytes, AES_ECB) 183s | sizeof bytes 16 183s | wrapper: (SECItemType)1023: 99 59 15 08 7f c4 55 8d 2d 27 5f e2 3c ca 1e fa 183s | K extracted len 16 bytes at 0x2aa06176b70 183s | unwrapped: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | XCBC: K: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | XCBC: K1 183s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc23797d0 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa061736f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc23797c8 183s | Computing E[2] using K3 183s | XCBC: K3 183s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 183s | XCBC: E[n-1] 183s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 183s | XCBC: M[n] 183s | 10 11 12 13 .... 183s | XCBC: M[n] 183s | 10 11 12 13 .... 183s | XCBC: M[n]:80...^E[n-1]^K3 183s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 183s | XCBC: MAC 183s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 183s | PRF chunk interface PRF AES_XCBC final length 16 183s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 183s | chunk output 183s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 183s | verify_chunk_data: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: ok 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379b00 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 16-bytes 183s | base: base-key@0x2aa061786f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379af8 183s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa06175100 (size 16) 183s | PRF symkey interface: key symkey-key@0x2aa06175100 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | XCBC: Key 16=16 just right 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06175100 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc23799c8 183s | PRF symkey interface PRF AES_XCBC 0x2aa06175b80 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379b00 183s | key-offset: 0, key-size: 20 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 20-bytes 183s | base: base-key@0x2aa06179f80 (36-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379af8 183s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa061736f0 (size 20) 183s | PRF symkey interface: symkey message-key@0x2aa061736f0 (20-bytes, EXTRACT_KEY_FROM_KEY) 183s | symkey message extracting all 20 bytes of key@0x2aa061736f0 183s | symkey message: symkey-key@0x2aa061736f0 (20-bytes, EXTRACT_KEY_FROM_KEY) 183s | sizeof bytes 32 183s | wrapper: (SECItemType)682: 99 59 15 08 7f c4 55 8d 2d 27 5f e2 3c ca 1e fa 32 cb 0d ab c4 21 d3 07 9a a6 e7 d4 a7 2a c8 f4 183s | symkey message extracted len 32 bytes at 0x2aa06176b70 183s | unwrapped: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | XCBC: data 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 .... 183s | K extracting all 16 bytes of key@0x2aa061786f0 183s | K: symkey-key@0x2aa061786f0 (16-bytes, AES_ECB) 183s | sizeof bytes 16 183s | wrapper: (SECItemType)1023: 99 59 15 08 7f c4 55 8d 2d 27 5f e2 3c ca 1e fa 183s | K extracted len 16 bytes at 0x2aa06174ff0 183s | unwrapped: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | XCBC: K: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | XCBC: K1 183s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379820 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa0617b810 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379818 183s | Computing E[2] using K3 183s | XCBC: K3 183s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 183s | XCBC: E[n-1] 183s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 183s | XCBC: M[n] 183s | 10 11 12 13 .... 183s | XCBC: M[n] 183s | 10 11 12 13 .... 183s | XCBC: M[n]:80...^E[n-1]^K3 183s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 183s | XCBC: MAC 183s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379998 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 16-bytes 183s | base: base-key@0x2aa0617b810 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379990 183s | PRF symkey interface PRF AES_XCBC final-key@0x2aa06179f80 (size 16) 183s | PRF symkey interface: key-key@0x2aa06179f80 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | output: symkey-key@0x2aa06179f80 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracting all 16 bytes of key@0x2aa06179f80 183s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: symkey-key@0x2aa06179f80 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | sizeof bytes 16 183s | wrapper: (SECItemType)1023: ba de 75 89 9d 32 0c 29 40 2a 01 62 77 61 3d 5f 183s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracted len 16 bytes at 0x2aa06175b80 183s | unwrapped: 183s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 183s | verify_chunk_data: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: ok 183s | test_prf_vector: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input passed 183s algparse: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 183s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 183s | decode_to_chunk: output: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 183s | decode_to_chunk: output: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 183s | decode_to_chunk: test_prf_vector: input "0xf54f0ec8d2b9f3d36807734bd5283fd4" 183s | decode_to_chunk: output: 183s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 183s | PRF chunk interface PRF AES_XCBC init key-chunk@0x2aa061754f0 (length 16) 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc23799a0 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06175100 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379998 183s | XCBC: Key 16=16 just right 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06179f80 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379918 183s | PRF chunk interface PRF AES_XCBC 0x2aa06176780 183s | PRF chunk interface PRF AES_XCBC update message (0x2aa06175b80 length 32) 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 183s | XCBC: data 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 183s | K extracting all 16 bytes of key@0x2aa06175100 183s | K: symkey-key@0x2aa06175100 (16-bytes, AES_ECB) 183s | sizeof bytes 16 183s | wrapper: (SECItemType)1023: 99 59 15 08 7f c4 55 8d 2d 27 5f e2 3c ca 1e fa 183s | K extracted len 16 bytes at 0x2aa06174ff0 183s | unwrapped: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | XCBC: K: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | XCBC: K1 183s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc23797d0 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa061736f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc23797c8 183s | XCBC: Computing E[2] using K2 183s | XCBC: K2 183s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 183s | XCBC: E[n-1] 183s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 183s | XCBC: M[n] 183s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 183s | XCBC: M[n]^E[n-1]^K2 183s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 183s | XCBC: MAC 183s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 183s | PRF chunk interface PRF AES_XCBC final length 16 183s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 183s | chunk output 183s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 183s | verify_chunk_data: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: ok 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379b00 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06179f80 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379af8 183s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa06175100 (size 16) 183s | PRF symkey interface: key symkey-key@0x2aa06175100 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | XCBC: Key 16=16 just right 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06175100 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc23799c8 183s | PRF symkey interface PRF AES_XCBC 0x2aa06176780 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379b00 183s | key-offset: 0, key-size: 32 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 32-bytes 183s | base: base-key@0x2aa061786f0 (48-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379af8 183s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa061736f0 (size 32) 183s | PRF symkey interface: symkey message-key@0x2aa061736f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | symkey message extracting all 32 bytes of key@0x2aa061736f0 183s | symkey message: symkey-key@0x2aa061736f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | sizeof bytes 32 183s | wrapper: (SECItemType)682: 99 59 15 08 7f c4 55 8d 2d 27 5f e2 3c ca 1e fa 17 7b f9 7a db 33 99 05 38 32 fc b7 13 00 bc 4e 183s | symkey message extracted len 32 bytes at 0x2aa06176ba0 183s | unwrapped: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 183s | XCBC: data 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 183s | K extracting all 16 bytes of key@0x2aa06179f80 183s | K: symkey-key@0x2aa06179f80 (16-bytes, AES_ECB) 183s | sizeof bytes 16 183s | wrapper: (SECItemType)1023: 99 59 15 08 7f c4 55 8d 2d 27 5f e2 3c ca 1e fa 183s | K extracted len 16 bytes at 0x2aa061750b0 183s | unwrapped: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | XCBC: K: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | XCBC: K1 183s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379820 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa0617b810 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379818 183s | XCBC: Computing E[2] using K2 183s | XCBC: K2 183s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 183s | XCBC: E[n-1] 183s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 183s | XCBC: M[n] 183s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 183s | XCBC: M[n]^E[n-1]^K2 183s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 183s | XCBC: MAC 183s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379998 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 16-bytes 183s | base: base-key@0x2aa0617b810 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379990 183s | PRF symkey interface PRF AES_XCBC final-key@0x2aa061786f0 (size 16) 183s | PRF symkey interface: key-key@0x2aa061786f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | output: symkey-key@0x2aa061786f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracting all 16 bytes of key@0x2aa061786f0 183s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: symkey-key@0x2aa061786f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | sizeof bytes 16 183s | wrapper: (SECItemType)1023: a6 0f bd 09 76 d8 8b bb c6 b3 e4 e9 44 80 e4 94 183s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracted len 16 bytes at 0x2aa061752e0 183s | unwrapped: 183s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 183s | verify_chunk_data: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: ok 183s | test_prf_vector: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input passed 183s algparse: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 183s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 183s | decode_to_chunk: output: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f2021" 183s | decode_to_chunk: output: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 183s | 20 21 ! 183s | decode_to_chunk: test_prf_vector: input "0xbecbb3bccdb518a30677d5481fb6b4d8" 183s | decode_to_chunk: output: 183s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 183s | PRF chunk interface PRF AES_XCBC init key-chunk@0x2aa06175010 (length 16) 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc23799a0 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06175100 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379998 183s | XCBC: Key 16=16 just right 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa061786f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379918 183s | PRF chunk interface PRF AES_XCBC 0x2aa06175b80 183s | PRF chunk interface PRF AES_XCBC update message (0x2aa06175080 length 34) 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 183s | 20 21 ! 183s | XCBC: data 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 183s | 20 21 ! 183s | K extracting all 16 bytes of key@0x2aa06175100 183s | K: symkey-key@0x2aa06175100 (16-bytes, AES_ECB) 183s | sizeof bytes 16 183s | wrapper: (SECItemType)1023: 99 59 15 08 7f c4 55 8d 2d 27 5f e2 3c ca 1e fa 183s | K extracted len 16 bytes at 0x2aa061750b0 183s | unwrapped: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | XCBC: K: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | XCBC: K1 183s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc23797d0 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa061736f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc23797c8 183s | Computing E[3] using K3 183s | XCBC: K3 183s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 183s | XCBC: E[n-1] 183s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 183s | XCBC: M[n] 183s | 20 21 ! 183s | XCBC: M[n] 183s | 20 21 ! 183s | XCBC: M[n]:80...^E[n-1]^K3 183s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 183s | XCBC: MAC 183s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 183s | PRF chunk interface PRF AES_XCBC final length 16 183s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 183s | chunk output 183s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 183s | verify_chunk_data: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: ok 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379b00 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 16-bytes 183s | base: base-key@0x2aa061786f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379af8 183s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa06175100 (size 16) 183s | PRF symkey interface: key symkey-key@0x2aa06175100 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | XCBC: Key 16=16 just right 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06175100 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc23799c8 183s | PRF symkey interface PRF AES_XCBC 0x2aa06175b80 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379b00 183s | key-offset: 0, key-size: 34 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 34-bytes 183s | base: base-key@0x2aa06179f80 (50-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379af8 183s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa061736f0 (size 34) 183s | PRF symkey interface: symkey message-key@0x2aa061736f0 (34-bytes, EXTRACT_KEY_FROM_KEY) 183s | symkey message extracting all 34 bytes of key@0x2aa061736f0 183s | symkey message: symkey-key@0x2aa061736f0 (34-bytes, EXTRACT_KEY_FROM_KEY) 183s | sizeof bytes 48 183s | wrapper: (SECItemType)682: 99 59 15 08 7f c4 55 8d 2d 27 5f e2 3c ca 1e fa 17 7b f9 7a db 33 99 05 38 32 fc b7 13 00 bc 4e 25 2e bd a5 e9 26 0b b7 0d 89 43 be d4 17 77 dc 183s | symkey message extracted len 48 bytes at 0x2aa06176e40 183s | unwrapped: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 183s | 20 21 00 00 00 00 00 00 00 00 00 00 00 00 00 00 !.............. 183s | XCBC: data 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 183s | 20 21 ! 183s | K extracting all 16 bytes of key@0x2aa061786f0 183s | K: symkey-key@0x2aa061786f0 (16-bytes, AES_ECB) 183s | sizeof bytes 16 183s | wrapper: (SECItemType)1023: 99 59 15 08 7f c4 55 8d 2d 27 5f e2 3c ca 1e fa 183s | K extracted len 16 bytes at 0x2aa061754f0 183s | unwrapped: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | XCBC: K: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | XCBC: K1 183s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379820 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa0617b810 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379818 183s | Computing E[3] using K3 183s | XCBC: K3 183s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 183s | XCBC: E[n-1] 183s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 183s | XCBC: M[n] 183s | 20 21 ! 183s | XCBC: M[n] 183s | 20 21 ! 183s | XCBC: M[n]:80...^E[n-1]^K3 183s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 183s | XCBC: MAC 183s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379998 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 16-bytes 183s | base: base-key@0x2aa0617b810 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379990 183s | PRF symkey interface PRF AES_XCBC final-key@0x2aa06179f80 (size 16) 183s | PRF symkey interface: key-key@0x2aa06179f80 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | output: symkey-key@0x2aa06179f80 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracting all 16 bytes of key@0x2aa06179f80 183s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: symkey-key@0x2aa06179f80 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | sizeof bytes 16 183s | wrapper: (SECItemType)1023: 5c 57 33 f4 7a a4 92 66 d3 d5 fd 2b 8a 34 b9 e8 183s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracted len 16 bytes at 0x2aa061752e0 183s | unwrapped: 183s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 183s | verify_chunk_data: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: ok 183s | test_prf_vector: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input passed 183s algparse: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 183s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 183s | decode_to_chunk: output: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | decode_to_chunk: test_prf_vector: input "0xf0dafee895db30253761103b5d84528f" 183s | decode_to_chunk: output: 183s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 183s | PRF chunk interface PRF AES_XCBC init key-chunk@0x2aa061736d0 (length 16) 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc23799a0 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06175100 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379998 183s | XCBC: Key 16=16 just right 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06179f80 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379918 183s | PRF chunk interface PRF AES_XCBC 0x2aa06176ba0 183s | PRF chunk interface PRF AES_XCBC update message (0x2aa06173a50 length 1000) 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 ........ 183s | XCBC: data 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 ........ 183s | K extracting all 16 bytes of key@0x2aa06175100 183s | K: symkey-key@0x2aa06175100 (16-bytes, AES_ECB) 183s | sizeof bytes 16 183s | wrapper: (SECItemType)1023: 99 59 15 08 7f c4 55 8d 2d 27 5f e2 3c ca 1e fa 183s | K extracted len 16 bytes at 0x2aa06175080 183s | unwrapped: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | XCBC: K: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | XCBC: K1 183s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc23797d0 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa061736f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc23797c8 183s | Computing E[63] using K3 183s | XCBC: K3 183s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 183s | XCBC: E[n-1] 183s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 183s | XCBC: M[n] 183s | 00 00 00 00 00 00 00 00 ........ 183s | XCBC: M[n] 183s | 00 00 00 00 00 00 00 00 ........ 183s | XCBC: M[n]:80...^E[n-1]^K3 183s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 183s | XCBC: MAC 183s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 183s | PRF chunk interface PRF AES_XCBC final length 16 183s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 183s | chunk output 183s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 183s | verify_chunk_data: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: ok 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379b00 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06179f80 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379af8 183s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa06175100 (size 16) 183s | PRF symkey interface: key symkey-key@0x2aa06175100 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | XCBC: Key 16=16 just right 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06175100 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc23799c8 183s | PRF symkey interface PRF AES_XCBC 0x2aa06176ba0 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379b00 183s | key-offset: 0, key-size: 1000 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 1000-bytes 183s | base: base-key@0x2aa061786f0 (1016-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379af8 183s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa061736f0 (size 1000) 183s | PRF symkey interface: symkey message-key@0x2aa061736f0 (1000-bytes, EXTRACT_KEY_FROM_KEY) 183s | symkey message extracting all 1000 bytes of key@0x2aa061736f0 183s | symkey message: symkey-key@0x2aa061736f0 (1000-bytes, EXTRACT_KEY_FROM_KEY) 183s | sizeof bytes 1008 183s | wrapper: (SECItemType)682: 77 c5 be 42 1c ae 73 08 03 51 0d 93 e8 0e 1d 5e 77 c5 be 42 1c ae 73 08 03 51 0d 93 e8 0e 1d 5e 77 c5 be 42 1c ae 73 08 03 51 0d 93 e8 0e 1d 5e 77 c5 be 42 1c ae 73 08 03 51 0d 93 e8 0e 1d 5e 77 c5 be 42 1c ae 73 08 03 51 0d 93 e8 0e 1d 5e 77 c5 be 42 1c ae 73 08 03 51 0d 93 e8 0e 1d 5e 77 c5 be 42 1c ae 73 08 03 51 0d 93 e8 0e 1d 5e 77 c5 be 42 1c ae 73 08 03 51 0d 93 e8 0e 1d 5e 77 c5 be 42 1c ae 73 08 03 51 0d 93 e8 0e 1d 5e 77 c5 be 42 1c ae 73 08 03 51 0d 93 e8 0e 1d 5e 77 c5 be 42 1c ae 73 08 03 51 0d 93 e8 0e 1d 5e 77 c5 be 42 1c ae 73 08 03 51 0d 93 e8 0e 1d 5e 77 c5 be 42 1c ae 73 08 03 51 0d 93 e8 0e 1d 5e 77 c5 be 42 1c ae 73 08 03 51 0d 93 e8 0e 1d 5e 77 c5 be 42 1c ae 73 08 03 51 0d 93 e8 0e 1d 5e 77 c5 be 42 1c ae 73 08 03 51 0d 93 e8 0e 1d 5e 77 c5 be 42 1c ae 73 08 03 51 0d 93 e8 0e 1d 5e 77 c5 be 42 1c ae 73 08 03 51 0d 93 e8 0e 1d 5e 77 c5 be 42 1c ae 73 08 03 51 0d 93 e8 0e 1d 5e 77 c... 183s | symkey message extracted len 1008 bytes at 0x2aa0617df20 183s | unwrapped: 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | XCBC: data 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | 00 00 00 00 00 00 00 00 ........ 183s | K extracting all 16 bytes of key@0x2aa06179f80 183s | K: symkey-key@0x2aa06179f80 (16-bytes, AES_ECB) 183s | sizeof bytes 16 183s | wrapper: (SECItemType)1023: 99 59 15 08 7f c4 55 8d 2d 27 5f e2 3c ca 1e fa 183s | K extracted len 16 bytes at 0x2aa06175080 183s | unwrapped: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | XCBC: K: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | XCBC: K1 183s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379820 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa0617b810 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379818 183s | Computing E[63] using K3 183s | XCBC: K3 183s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 183s | XCBC: E[n-1] 183s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 183s | XCBC: M[n] 183s | 00 00 00 00 00 00 00 00 ........ 183s | XCBC: M[n] 183s | 00 00 00 00 00 00 00 00 ........ 183s | XCBC: M[n]:80...^E[n-1]^K3 183s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 183s | XCBC: MAC 183s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379998 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 16-bytes 183s | base: base-key@0x2aa0617b810 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379990 183s | PRF symkey interface PRF AES_XCBC final-key@0x2aa061786f0 (size 16) 183s | PRF symkey interface: key-key@0x2aa061786f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | output: symkey-key@0x2aa061786f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracting all 16 bytes of key@0x2aa061786f0 183s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: symkey-key@0x2aa061786f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | sizeof bytes 16 183s | wrapper: (SECItemType)1023: 48 bc cd c5 17 0f ff f1 99 80 09 be bb 2b 88 9e 183s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracted len 16 bytes at 0x2aa06175080 183s | unwrapped: 183s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 183s | verify_chunk_data: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: ok 183s | test_prf_vector: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input passed 183s algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 183s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 183s | decode_to_chunk: output: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 183s | decode_to_chunk: output: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 .... 183s | decode_to_chunk: test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 183s | decode_to_chunk: output: 183s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 183s | PRF chunk interface PRF AES_XCBC init key-chunk@0x2aa061750b0 (length 16) 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc23799a0 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06175100 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379998 183s | XCBC: Key 16=16 just right 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa061786f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379918 183s | PRF chunk interface PRF AES_XCBC 0x2aa06176ba0 183s | PRF chunk interface PRF AES_XCBC update message (0x2aa061759d0 length 20) 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 .... 183s | XCBC: data 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 .... 183s | K extracting all 16 bytes of key@0x2aa06175100 183s | K: symkey-key@0x2aa06175100 (16-bytes, AES_ECB) 183s | sizeof bytes 16 183s | wrapper: (SECItemType)1023: 99 59 15 08 7f c4 55 8d 2d 27 5f e2 3c ca 1e fa 183s | K extracted len 16 bytes at 0x2aa06175080 183s | unwrapped: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | XCBC: K: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | XCBC: K1 183s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc23797d0 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa061736f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc23797c8 183s | Computing E[2] using K3 183s | XCBC: K3 183s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 183s | XCBC: E[n-1] 183s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 183s | XCBC: M[n] 183s | 10 11 12 13 .... 183s | XCBC: M[n] 183s | 10 11 12 13 .... 183s | XCBC: M[n]:80...^E[n-1]^K3 183s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 183s | XCBC: MAC 183s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 183s | PRF chunk interface PRF AES_XCBC final length 16 183s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 183s | chunk output 183s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 183s | verify_chunk_data: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): ok 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379b00 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 16-bytes 183s | base: base-key@0x2aa061786f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379af8 183s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa06175100 (size 16) 183s | PRF symkey interface: key symkey-key@0x2aa06175100 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | XCBC: Key 16=16 just right 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06175100 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc23799c8 183s | PRF symkey interface PRF AES_XCBC 0x2aa06176ba0 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379b00 183s | key-offset: 0, key-size: 20 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 20-bytes 183s | base: base-key@0x2aa06179f80 (36-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379af8 183s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa061736f0 (size 20) 183s | PRF symkey interface: symkey message-key@0x2aa061736f0 (20-bytes, EXTRACT_KEY_FROM_KEY) 183s | symkey message extracting all 20 bytes of key@0x2aa061736f0 183s | symkey message: symkey-key@0x2aa061736f0 (20-bytes, EXTRACT_KEY_FROM_KEY) 183s | sizeof bytes 32 183s | wrapper: (SECItemType)682: 99 59 15 08 7f c4 55 8d 2d 27 5f e2 3c ca 1e fa 32 cb 0d ab c4 21 d3 07 9a a6 e7 d4 a7 2a c8 f4 183s | symkey message extracted len 32 bytes at 0x2aa06174ed0 183s | unwrapped: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | XCBC: data 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 .... 183s | K extracting all 16 bytes of key@0x2aa061786f0 183s | K: symkey-key@0x2aa061786f0 (16-bytes, AES_ECB) 183s | sizeof bytes 16 183s | wrapper: (SECItemType)1023: 99 59 15 08 7f c4 55 8d 2d 27 5f e2 3c ca 1e fa 183s | K extracted len 16 bytes at 0x2aa06175080 183s | unwrapped: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | XCBC: K: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | XCBC: K1 183s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379820 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa0617b810 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379818 183s | Computing E[2] using K3 183s | XCBC: K3 183s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 183s | XCBC: E[n-1] 183s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 183s | XCBC: M[n] 183s | 10 11 12 13 .... 183s | XCBC: M[n] 183s | 10 11 12 13 .... 183s | XCBC: M[n]:80...^E[n-1]^K3 183s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 183s | XCBC: MAC 183s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379998 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 16-bytes 183s | base: base-key@0x2aa0617b810 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379990 183s | PRF symkey interface PRF AES_XCBC final-key@0x2aa06179f80 (size 16) 183s | PRF symkey interface: key-key@0x2aa06179f80 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | output: symkey-key@0x2aa06179f80 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracting all 16 bytes of key@0x2aa06179f80 183s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): symkey-key@0x2aa06179f80 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | sizeof bytes 16 183s | wrapper: (SECItemType)1023: ba de 75 89 9d 32 0c 29 40 2a 01 62 77 61 3d 5f 183s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracted len 16 bytes at 0x2aa06175080 183s | unwrapped: 183s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 183s | verify_chunk_data: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): ok 183s | test_prf_vector: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) passed 183s algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 183s | decode_to_chunk: test_prf_vector: input "0x00010203040506070809" 183s | decode_to_chunk: output: 183s | 00 01 02 03 04 05 06 07 08 09 .......... 183s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 183s | decode_to_chunk: output: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 .... 183s | decode_to_chunk: test_prf_vector: input "0x0fa087af7d866e7653434e602fdde835" 183s | decode_to_chunk: output: 183s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 183s | PRF chunk interface PRF AES_XCBC init key-chunk@0x2aa061736d0 (length 10) 183s | 00 01 02 03 04 05 06 07 08 09 .......... 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc23799a0 183s | key-offset: 0, key-size: 10 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 10-bytes 183s | base: base-key@0x2aa06175100 (26-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379998 183s | XCBC: Key 10<16 too small, padding with zeros 183s | CONCATENATE_BASE_AND_DATA: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06179f80 (10-bytes, EXTRACT_KEY_FROM_KEY) 183s | params: 16-bytes@0x3ffc2379870 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06175100 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379918 183s | PRF chunk interface PRF AES_XCBC 0x2aa06176ba0 183s | PRF chunk interface PRF AES_XCBC update message (0x2aa06175510 length 20) 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 .... 183s | XCBC: data 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 .... 183s | K extracting all 16 bytes of key@0x2aa061736f0 183s | K: symkey-key@0x2aa061736f0 (16-bytes, AES_ECB) 183s | sizeof bytes 16 183s | wrapper: (SECItemType)1023: 8f ec 0b e3 2f 6a 87 84 33 3f 4d 83 b9 ea 45 31 183s | K extracted len 16 bytes at 0x2aa061759d0 183s | unwrapped: 183s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 183s | XCBC: K: 183s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 183s | XCBC: K1 183s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc23797d0 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06175100 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc23797c8 183s | Computing E[2] using K3 183s | XCBC: K3 183s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 183s | XCBC: E[n-1] 183s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 183s | XCBC: M[n] 183s | 10 11 12 13 .... 183s | XCBC: M[n] 183s | 10 11 12 13 .... 183s | XCBC: M[n]:80...^E[n-1]^K3 183s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 183s | XCBC: MAC 183s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 183s | PRF chunk interface PRF AES_XCBC final length 16 183s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 183s | chunk output 183s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 183s | verify_chunk_data: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): ok 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379b00 183s | key-offset: 0, key-size: 10 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 10-bytes 183s | base: base-key@0x2aa06179f80 (26-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379af8 183s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa061736f0 (size 10) 183s | PRF symkey interface: key symkey-key@0x2aa061736f0 (10-bytes, EXTRACT_KEY_FROM_KEY) 183s | XCBC: Key 10<16 too small, padding with zeros 183s | CONCATENATE_BASE_AND_DATA: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa061736f0 (10-bytes, EXTRACT_KEY_FROM_KEY) 183s | params: 16-bytes@0x3ffc2379920 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06179f80 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc23799c8 183s | PRF symkey interface PRF AES_XCBC 0x2aa06176ba0 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379b00 183s | key-offset: 0, key-size: 20 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 20-bytes 183s | base: base-key@0x2aa061786f0 (36-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379af8 183s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa06179f80 (size 20) 183s | PRF symkey interface: symkey message-key@0x2aa06179f80 (20-bytes, EXTRACT_KEY_FROM_KEY) 183s | symkey message extracting all 20 bytes of key@0x2aa06179f80 183s | symkey message: symkey-key@0x2aa06179f80 (20-bytes, EXTRACT_KEY_FROM_KEY) 183s | sizeof bytes 32 183s | wrapper: (SECItemType)682: 99 59 15 08 7f c4 55 8d 2d 27 5f e2 3c ca 1e fa 32 cb 0d ab c4 21 d3 07 9a a6 e7 d4 a7 2a c8 f4 183s | symkey message extracted len 32 bytes at 0x2aa06174ed0 183s | unwrapped: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | XCBC: data 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 .... 183s | K extracting all 16 bytes of key@0x2aa06175100 183s | K: symkey-key@0x2aa06175100 (16-bytes, AES_ECB) 183s | sizeof bytes 16 183s | wrapper: (SECItemType)1023: 8f ec 0b e3 2f 6a 87 84 33 3f 4d 83 b9 ea 45 31 183s | K extracted len 16 bytes at 0x2aa06175080 183s | unwrapped: 183s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 183s | XCBC: K: 183s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 183s | XCBC: K1 183s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379820 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa0617b810 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379818 183s | Computing E[2] using K3 183s | XCBC: K3 183s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 183s | XCBC: E[n-1] 183s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 183s | XCBC: M[n] 183s | 10 11 12 13 .... 183s | XCBC: M[n] 183s | 10 11 12 13 .... 183s | XCBC: M[n]:80...^E[n-1]^K3 183s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 183s | XCBC: MAC 183s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379998 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 16-bytes 183s | base: base-key@0x2aa0617b810 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379990 183s | PRF symkey interface PRF AES_XCBC final-key@0x2aa061786f0 (size 16) 183s | PRF symkey interface: key-key@0x2aa061786f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | output: symkey-key@0x2aa061786f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracting all 16 bytes of key@0x2aa061786f0 183s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): symkey-key@0x2aa061786f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | sizeof bytes 16 183s | wrapper: (SECItemType)1023: 7f 33 9f 49 a6 7c 22 40 30 c0 8f 51 0c 62 f7 81 183s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracted len 16 bytes at 0x2aa061750a0 183s | unwrapped: 183s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 183s | verify_chunk_data: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): ok 183s | test_prf_vector: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) passed 183s algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 183s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0fedcb" 183s | decode_to_chunk: output: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | ed cb .. 183s | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 183s | decode_to_chunk: output: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | 10 11 12 13 .... 183s | decode_to_chunk: test_prf_vector: input "0x8cd3c93ae598a9803006ffb67c40e9e4" 183s | decode_to_chunk: output: 183s | 8c d3 c9 3a e5 98 a9 80 30 06 ff b6 7c 40 e9 e4 ...:....0...|@.. 183s | PRF chunk interface PRF AES_XCBC init key-chunk@0x2aa06176a10 (length 18) 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | ed cb .. 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc23799a0 183s | key-offset: 0, key-size: 18 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 18-bytes 183s | base: base-key@0x2aa061736f0 (34-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379998 183s | XCBC: Key 18>16 too big, rehashing to size 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379848 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06179f80 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379840 183s | draft_chunk extracting all 18 bytes of key@0x2aa061786f0 183s | draft_chunk: symkey-key@0x2aa061786f0 (18-bytes, EXTRACT_KEY_FROM_KEY) 183s | sizeof bytes 32 183s | wrapper: siBuffer: 99 59 15 08 7f c4 55 8d 2d 27 5f e2 3c ca 1e fa 20 22 7b 4f 96 e3 97 82 9c 50 b2 7c 0e eb cb 95 183s | draft_chunk extracted len 32 bytes at 0x2aa061750a0 183s | unwrapped: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | XCBC: data 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | ed cb .. 183s | K extracting all 16 bytes of key@0x2aa061736f0 183s | K: symkey-key@0x2aa061736f0 (16-bytes, AES_ECB) 183s | sizeof bytes 16 183s | wrapper: (SECItemType)1023: 77 c5 be 42 1c ae 73 08 03 51 0d 93 e8 0e 1d 5e 183s | K extracted len 16 bytes at 0x2aa06176ba0 183s | unwrapped: 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | XCBC: K: 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | XCBC: K1 183s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc23796e0 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06175100 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc23796d8 183s | Computing E[2] using K3 183s | XCBC: K3 183s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 183s | XCBC: E[n-1] 183s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 183s | XCBC: M[n] 183s | ed cb .. 183s | XCBC: M[n] 183s | ed cb .. 183s | XCBC: M[n]:80...^E[n-1]^K3 183s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.16 too big, rehashing to size 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc23798f8 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa061736f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc23798f0 183s | draft_chunk extracting all 18 bytes of key@0x2aa06179f80 183s | draft_chunk: symkey-key@0x2aa06179f80 (18-bytes, EXTRACT_KEY_FROM_KEY) 183s | sizeof bytes 32 183s | wrapper: siBuffer: 99 59 15 08 7f c4 55 8d 2d 27 5f e2 3c ca 1e fa 20 22 7b 4f 96 e3 97 82 9c 50 b2 7c 0e eb cb 95 183s | draft_chunk extracted len 32 bytes at 0x2aa06176ba0 183s | unwrapped: 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | XCBC: data 183s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 183s | ed cb .. 183s | K extracting all 16 bytes of key@0x2aa061786f0 183s | K: symkey-key@0x2aa061786f0 (16-bytes, AES_ECB) 183s | sizeof bytes 16 183s | wrapper: (SECItemType)1023: 77 c5 be 42 1c ae 73 08 03 51 0d 93 e8 0e 1d 5e 183s | K extracted len 16 bytes at 0x2aa061754f0 183s | unwrapped: 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | XCBC: K: 183s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 183s | XCBC: K1 183s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379790 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: AES_ECB 183s | flags: SIGN 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06175100 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379788 183s | Computing E[2] using K3 183s | XCBC: K3 183s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 183s | XCBC: E[n-1] 183s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 183s | XCBC: M[n] 183s | ed cb .. 183s | XCBC: M[n] 183s | ed cb .. 183s | XCBC: M[n]:80...^E[n-1]^K3 183s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.j.....n1.].8 183s | PRF chunk interface PRF HMAC_MD5 init key-chunk@0x2aa06176a30 (length 4) 183s | 4a 65 66 65 Jefe 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379980 183s | key-offset: 0, key-size: 4 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 4-bytes 183s | base: base-key@0x2aa061736f0 (20-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379978 183s | CONCATENATE_BASE_AND_DATA: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06179f80 (4-bytes, EXTRACT_KEY_FROM_KEY) 183s | params: 16-bytes@0x3ffc2379860 183s | XOR_BASE_AND_DATA: 183s | target: CONCATENATE_BASE_AND_DATA 183s | base: base-key@0x2aa061736f0 (64-bytes, EXTRACT_KEY_FROM_KEY) 183s | params: 16-bytes@0x3ffc2379910 183s | PRF chunk interface PRF HMAC_MD5 0x2aa06174f70 183s | PRF chunk interface PRF HMAC_MD5 update message (0x2aa06176ba0 length 28) 183s | 77 68 61 74 20 64 6f 20 79 61 20 77 61 6e 74 20 what do ya want 183s | 66 6f 72 20 6e 6f 74 68 69 6e 67 3f for nothing? 183s | CONCATENATE_BASE_AND_DATA: 183s | target: CONCATENATE_BASE_AND_DATA 183s | base: base-key@0x2aa06179f80 (64-bytes, CONCATENATE_BASE_AND_DATA) 183s | params: 16-bytes@0x3ffc2379a78 183s | PRF HMAC inner hash hash MD5 inner-key@0x2aa061786f0 (size 92) 183s | PRF HMAC inner hash hash MD5 init 183s | PRF HMAC inner hash hash MD5 digest inner-key@0x2aa061786f0 (size 92) 183s | PRF HMAC inner hash: inner-key@0x2aa061786f0 (92-bytes, CONCATENATE_BASE_AND_DATA) 183s | PRF HMAC inner hash hash MD5 final length 16 183s | c3 db 14 c0 65 f5 52 03 b0 33 c8 1a 69 7b 97 c5 ....e.R..3..i{.. 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379708 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 16-bytes 183s | base: base-key@0x2aa0617f870 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379700 183s | XOR_BASE_AND_DATA: 183s | target: CONCATENATE_BASE_AND_DATA 183s | base: base-key@0x2aa061736f0 (64-bytes, EXTRACT_KEY_FROM_KEY) 183s | params: 16-bytes@0x3ffc23798d8 183s | CONCATENATE_BASE_AND_KEY: 183s | target: CONCATENATE_BASE_AND_DATA 183s | base: base-key@0x2aa061786f0 (64-bytes, CONCATENATE_BASE_AND_DATA) 183s | params: 8-bytes@0x3ffc23798e0 183s | PRF HMAC outer hash hash MD5 init 183s | PRF HMAC outer hash hash MD5 digest outer-key@0x2aa0617f870 (size 80) 183s | PRF HMAC outer hash: outer-key@0x2aa0617f870 (80-bytes, CONCATENATE_BASE_AND_DATA) 183s | PRF HMAC outer hash hash MD5 final bytes@0x3ffc2379bb0 (length 16) 183s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 183s | PRF chunk interface PRF HMAC_MD5 final length 16 183s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 183s | chunk output 183s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 183s | verify_chunk_data: RFC 2104: MD5_HMAC test 2: ok 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379b00 183s | key-offset: 0, key-size: 4 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 4-bytes 183s | base: base-key@0x2aa061736f0 (20-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379af8 183s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0x2aa0617f870 (size 4) 183s | PRF symkey interface: key symkey-key@0x2aa0617f870 (4-bytes, EXTRACT_KEY_FROM_KEY) 183s | CONCATENATE_BASE_AND_DATA: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa0617f870 (4-bytes, EXTRACT_KEY_FROM_KEY) 183s | params: 16-bytes@0x3ffc2379860 183s | XOR_BASE_AND_DATA: 183s | target: CONCATENATE_BASE_AND_DATA 183s | base: base-key@0x2aa061736f0 (64-bytes, EXTRACT_KEY_FROM_KEY) 183s | params: 16-bytes@0x3ffc2379910 183s | PRF symkey interface PRF HMAC_MD5 0x2aa06174f70 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379b00 183s | key-offset: 0, key-size: 28 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 28-bytes 183s | base: base-key@0x2aa06175100 (44-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379af8 183s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0x2aa061786f0 (size 28) 183s | PRF symkey interface: symkey message-key@0x2aa061786f0 (28-bytes, EXTRACT_KEY_FROM_KEY) 183s | CONCATENATE_BASE_AND_KEY: 183s | target: CONCATENATE_BASE_AND_DATA 183s | base: base-key@0x2aa06179f80 (64-bytes, CONCATENATE_BASE_AND_DATA) 183s | params: 8-bytes@0x3ffc2379bd0 183s | PRF HMAC inner hash hash MD5 inner-key@0x2aa06175100 (size 92) 183s | PRF HMAC inner hash hash MD5 init 183s | PRF HMAC inner hash hash MD5 digest inner-key@0x2aa06175100 (size 92) 183s | PRF HMAC inner hash: inner-key@0x2aa06175100 (92-bytes, CONCATENATE_BASE_AND_DATA) 183s | PRF HMAC inner hash hash MD5 final length 16 183s | c3 db 14 c0 65 f5 52 03 b0 33 c8 1a 69 7b 97 c5 ....e.R..3..i{.. 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379760 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 16-bytes 183s | base: base-key@0x2aa0617b810 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379758 183s | XOR_BASE_AND_DATA: 183s | target: CONCATENATE_BASE_AND_DATA 183s | base: base-key@0x2aa061736f0 (64-bytes, EXTRACT_KEY_FROM_KEY) 183s | params: 16-bytes@0x3ffc2379930 183s | CONCATENATE_BASE_AND_KEY: 183s | target: CONCATENATE_BASE_AND_DATA 183s | base: base-key@0x2aa06175100 (64-bytes, CONCATENATE_BASE_AND_DATA) 183s | params: 8-bytes@0x3ffc2379938 183s | PRF HMAC outer hash hash MD5 outer-key@0x2aa0617b810 (size 80) 183s | PRF HMAC outer hash hash MD5 init 183s | PRF HMAC outer hash hash MD5 digest outer-key@0x2aa0617b810 (size 80) 183s | PRF HMAC outer hash: outer-key@0x2aa0617b810 (80-bytes, CONCATENATE_BASE_AND_DATA) 183s | PRF HMAC outer hash hash MD5 final length 16 183s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc23798a8 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06179f80 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc23798a0 183s | : hashed-outer-key@0x2aa061736f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | PRF symkey interface PRF HMAC_MD5 final-key@0x2aa061736f0 (size 16) 183s | PRF symkey interface: key-key@0x2aa061736f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | output: symkey-key@0x2aa061736f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | RFC 2104: MD5_HMAC test 2 extracting all 16 bytes of key@0x2aa061736f0 183s | RFC 2104: MD5_HMAC test 2: symkey-key@0x2aa061736f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | sizeof bytes 16 183s | wrapper: (SECItemType)1023: c7 76 85 39 e2 40 1c a5 31 16 6d 79 88 31 ea 37 183s | RFC 2104: MD5_HMAC test 2 extracted len 16 bytes at 0x2aa06174f70 183s | unwrapped: 183s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 183s | verify_chunk_data: RFC 2104: MD5_HMAC test 2: ok 183s | test_prf_vector: RFC 2104: MD5_HMAC test 2 passed 183s algparse: RFC 2104: MD5_HMAC test 3 183s | decode_to_chunk: test_prf_vector: input "0xAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" 183s | decode_to_chunk: output: 183s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 183s | decode_to_chunk: test_prf_vector: input "0xDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD" 183s | decode_to_chunk: output: 183s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 183s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 183s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 183s | dd dd .. 183s | decode_to_chunk: test_prf_vector: input "0x56be34521d144c88dbb8c733f0e8b3f6" 183s | decode_to_chunk: output: 183s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 183s | PRF chunk interface PRF HMAC_MD5 init key-chunk@0x2aa061767a0 (length 16) 183s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379980 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 16-bytes 183s | base: base-key@0x2aa0617f870 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379978 183s | CONCATENATE_BASE_AND_DATA: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa061736f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | params: 16-bytes@0x3ffc2379860 183s | XOR_BASE_AND_DATA: 183s | target: CONCATENATE_BASE_AND_DATA 183s | base: base-key@0x2aa0617f870 (64-bytes, EXTRACT_KEY_FROM_KEY) 183s | params: 16-bytes@0x3ffc2379910 183s | PRF chunk interface PRF HMAC_MD5 0x2aa06176ba0 183s | PRF chunk interface PRF HMAC_MD5 update message (0x2aa061754f0 length 50) 183s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 183s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 183s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 183s | dd dd .. 183s | CONCATENATE_BASE_AND_DATA: 183s | target: CONCATENATE_BASE_AND_DATA 183s | base: base-key@0x2aa061736f0 (64-bytes, CONCATENATE_BASE_AND_DATA) 183s | params: 16-bytes@0x3ffc2379a78 183s | PRF HMAC inner hash hash MD5 inner-key@0x2aa061786f0 (size 114) 183s | PRF HMAC inner hash hash MD5 init 183s | PRF HMAC inner hash hash MD5 digest inner-key@0x2aa061786f0 (size 114) 183s | PRF HMAC inner hash: inner-key@0x2aa061786f0 (114-bytes, CONCATENATE_BASE_AND_DATA) 183s | PRF HMAC inner hash hash MD5 final length 16 183s | 82 0a 6b 33 5d 18 7b 90 dc ba b1 7e f5 b4 26 ff ..k3].{....~..&. 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379708 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 16-bytes 183s | base: base-key@0x2aa0617b810 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379700 183s | XOR_BASE_AND_DATA: 183s | target: CONCATENATE_BASE_AND_DATA 183s | base: base-key@0x2aa0617f870 (64-bytes, EXTRACT_KEY_FROM_KEY) 183s | params: 16-bytes@0x3ffc23798d8 183s | CONCATENATE_BASE_AND_KEY: 183s | target: CONCATENATE_BASE_AND_DATA 183s | base: base-key@0x2aa061786f0 (64-bytes, CONCATENATE_BASE_AND_DATA) 183s | params: 8-bytes@0x3ffc23798e0 183s | PRF HMAC outer hash hash MD5 init 183s | PRF HMAC outer hash hash MD5 digest outer-key@0x2aa0617b810 (size 80) 183s | PRF HMAC outer hash: outer-key@0x2aa0617b810 (80-bytes, CONCATENATE_BASE_AND_DATA) 183s | PRF HMAC outer hash hash MD5 final bytes@0x3ffc2379bb0 (length 16) 183s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 183s | PRF chunk interface PRF HMAC_MD5 final length 16 183s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 183s | chunk output 183s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 183s | verify_chunk_data: RFC 2104: MD5_HMAC test 3: ok 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379b00 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 16-bytes 183s | base: base-key@0x2aa0617f870 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379af8 183s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0x2aa0617b810 (size 16) 183s | PRF symkey interface: key symkey-key@0x2aa0617b810 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | CONCATENATE_BASE_AND_DATA: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa0617b810 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | params: 16-bytes@0x3ffc2379860 183s | XOR_BASE_AND_DATA: 183s | target: CONCATENATE_BASE_AND_DATA 183s | base: base-key@0x2aa0617f870 (64-bytes, EXTRACT_KEY_FROM_KEY) 183s | params: 16-bytes@0x3ffc2379910 183s | PRF symkey interface PRF HMAC_MD5 0x2aa06176ba0 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379b00 183s | key-offset: 0, key-size: 50 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 50-bytes 183s | base: base-key@0x2aa06179f80 (66-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379af8 183s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0x2aa061786f0 (size 50) 183s | PRF symkey interface: symkey message-key@0x2aa061786f0 (50-bytes, EXTRACT_KEY_FROM_KEY) 183s | CONCATENATE_BASE_AND_KEY: 183s | target: CONCATENATE_BASE_AND_DATA 183s | base: base-key@0x2aa061736f0 (64-bytes, CONCATENATE_BASE_AND_DATA) 183s | params: 8-bytes@0x3ffc2379bd0 183s | PRF HMAC inner hash hash MD5 inner-key@0x2aa06179f80 (size 114) 183s | PRF HMAC inner hash hash MD5 init 183s | PRF HMAC inner hash hash MD5 digest inner-key@0x2aa06179f80 (size 114) 183s | PRF HMAC inner hash: inner-key@0x2aa06179f80 (114-bytes, CONCATENATE_BASE_AND_DATA) 183s | PRF HMAC inner hash hash MD5 final length 16 183s | 82 0a 6b 33 5d 18 7b 90 dc ba b1 7e f5 b4 26 ff ..k3].{....~..&. 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379760 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 16-bytes 183s | base: base-key@0x2aa06175100 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379758 183s | XOR_BASE_AND_DATA: 183s | target: CONCATENATE_BASE_AND_DATA 183s | base: base-key@0x2aa0617f870 (64-bytes, EXTRACT_KEY_FROM_KEY) 183s | params: 16-bytes@0x3ffc2379930 183s | CONCATENATE_BASE_AND_KEY: 183s | target: CONCATENATE_BASE_AND_DATA 183s | base: base-key@0x2aa06179f80 (64-bytes, CONCATENATE_BASE_AND_DATA) 183s | params: 8-bytes@0x3ffc2379938 183s | PRF HMAC outer hash hash MD5 outer-key@0x2aa06175100 (size 80) 183s | PRF HMAC outer hash hash MD5 init 183s | PRF HMAC outer hash hash MD5 digest outer-key@0x2aa06175100 (size 80) 183s | PRF HMAC outer hash: outer-key@0x2aa06175100 (80-bytes, CONCATENATE_BASE_AND_DATA) 183s | PRF HMAC outer hash hash MD5 final length 16 183s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc23798a8 183s | key-offset: 0, key-size: 16 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 16-bytes 183s | base: base-key@0x2aa061736f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc23798a0 183s | : hashed-outer-key@0x2aa0617f870 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | PRF symkey interface PRF HMAC_MD5 final-key@0x2aa0617f870 (size 16) 183s | PRF symkey interface: key-key@0x2aa0617f870 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | output: symkey-key@0x2aa0617f870 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | RFC 2104: MD5_HMAC test 3 extracting all 16 bytes of key@0x2aa0617f870 183s | RFC 2104: MD5_HMAC test 3: symkey-key@0x2aa0617f870 (16-bytes, EXTRACT_KEY_FROM_KEY) 183s | sizeof bytes 16 183s | wrapper: (SECItemType)1023: 35 bc d9 a9 81 a0 45 a1 de f0 ec f5 14 f7 97 1a 183s | RFC 2104: MD5_HMAC test 3 extracted len 16 bytes at 0x2aa0617b760 183s | unwrapped: 183s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 183s | verify_chunk_data: RFC 2104: MD5_HMAC test 3: ok 183s | test_prf_vector: RFC 2104: MD5_HMAC test 3 passed 183s algparse: testing HMAC_SHA1: 183s algparse: CAVP: IKEv2 key derivation with HMAC-SHA1 183s | decode_to_chunk: test_kdf_vector: input "0x32b50d5f4a3763f3" 183s | decode_to_chunk: output: 183s | 32 b5 0d 5f 4a 37 63 f3 2.._J7c. 183s | decode_to_chunk: test_kdf_vector: input "0x9206a04b26564cb1" 183s | decode_to_chunk: output: 183s | 92 06 a0 4b 26 56 4c b1 ...K&VL. 183s | decode_to_chunk: test_kdf_vector: input "0x34c9e7c188868785" 183s | decode_to_chunk: output: 183s | 34 c9 e7 c1 88 86 87 85 4....... 183s | decode_to_chunk: test_kdf_vector: input "0x3ff77d760d2b2199" 183s | decode_to_chunk: output: 183s | 3f f7 7d 76 0d 2b 21 99 ?.}v.+!. 183s | decode_to_chunk: test_kdf_vector: input "0x4b2c1f971981a8ad8d0abeafabf38cf75fc8349c148142465ed9c8b516b8be52" 183s | decode_to_chunk: output: 183s | 4b 2c 1f 97 19 81 a8 ad 8d 0a be af ab f3 8c f7 K,.............. 183s | 5f c8 34 9c 14 81 42 46 5e d9 c8 b5 16 b8 be 52 _.4...BF^......R 183s | decode_to_chunk: test_kdf_vector: input "0x863f3c9d06efd39d2b907b97f8699e5dd5251ef64a2a176f36ee40c87d4f9330" 183s | decode_to_chunk: output: 183s | 86 3f 3c 9d 06 ef d3 9d 2b 90 7b 97 f8 69 9e 5d .?<.....+.{..i.] 183s | d5 25 1e f6 4a 2a 17 6f 36 ee 40 c8 7d 4f 93 30 .%..J*.o6.@.}O.0 183s | decode_to_chunk: test_kdf_vector: input "0xa9a7b222b59f8f48645f28a1db5b5f5d7479cba7" 183s | decode_to_chunk: output: 183s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 183s | 74 79 cb a7 ty.. 183s | decode_to_chunk: test_kdf_vector: input "0x63e81194946ebd05df7df5ebf5d8750056bf1f1d" 183s | decode_to_chunk: output: 183s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 183s | 56 bf 1f 1d V... 183s | decode_to_chunk: test_kdf_vector: input "0xa14293677cc80ff8f9cc0eee30d895da9d8f405666e30ef0dfcb63c634a46002a2a63080e514a062768b76606f9fa5e992204fc5a670bde3f10d6b027113936a5c55b648a194ae587b0088d52204b702c979fa280870d2ed41efa9c549fd11198af1670b143d384bd275c5f594cf266b05ebadca855e4249520a441a81157435a7a56cc4" 183s | decode_to_chunk: output: 183s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 183s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 183s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 183s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 183s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 183s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 183s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 183s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 183s | a7 a5 6c c4 ..l. 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379ad8 183s | key-offset: 0, key-size: 32 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 32-bytes 183s | base: base-key@0x2aa0617b810 (48-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379ad0 183s | NSS_IKE_PRF_DERIVE: 183s | target: NSS_IKE_PRF_PLUS_DERIVE 183s | base: base-key@0x2aa0617f870 (32-bytes, EXTRACT_KEY_FROM_KEY) 183s | params: 56-bytes@0x3ffc2379ad0 183s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0x2aa0617b810 183s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x2aa0617b810 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 183s | sizeof bytes 32 183s | wrapper: (SECItemType)682: 46 d4 27 99 35 b2 ca 00 f7 8b ce 38 5f 37 51 80 af dd 69 1e fd 83 2d ac da 2f 80 86 31 02 f8 f5 183s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0x2aa06178e30 183s | unwrapped: 183s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 183s | 74 79 cb a7 00 00 00 00 00 00 00 00 00 00 00 00 ty.............. 183s | verify_chunk_data: CAVP: IKEv2 key derivation with HMAC-SHA1: ok 183s | NSS_IKE_PRF_PLUS_DERIVE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 132-bytes 183s | base: base-key@0x2aa0617b810 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 183s | params: 40-bytes@0x3ffc2379a68 183s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 132 bytes of key@0x2aa061786f0 183s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x2aa061786f0 (132-bytes, EXTRACT_KEY_FROM_KEY) 183s | sizeof bytes 144 183s | wrapper: (SECItemType)682: 6c 46 48 bd fe f8 7b 6c e6 23 99 29 5f 72 60 22 a3 7f 8b 05 0b c4 24 5f ea 46 b6 29 03 7b ae 80 a3 fd 94 9d c8 eb 49 62 a7 72 53 57 7b c5 f0 1c 00 06 2e 50 ce 17 6e a0 85 65 0e 88 09 96 63 7b f6 1c 28 79 86 d3 f6 94 d3 d4 c2 ee 14 99 35 70 e5 71 63 67 42 14 29 f3 3e 0f c7 33 1d e0 f3 9d c1 31 d5 70 58 5d 48 e8 3f fb 82 9f 1d a1 ae 7f ea 56 7c e6 d7 0e 53 d7 c6 bd 05 0a ff 58 b2 c6 f6 57 54 de de 28 c3 57 37 29 1d c9 eb 2f a7 d2 183s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 144 bytes at 0x2aa06178f40 183s | unwrapped: 183s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 183s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 183s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 183s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 183s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 183s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 183s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 183s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 183s | a7 a5 6c c4 00 00 00 00 00 00 00 00 00 00 00 00 ..l............. 183s | verify_chunk_data: CAVP: IKEv2 key derivation with HMAC-SHA1: ok 183s | key-offset: 0, key-size: 20 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 20-bytes 183s | base: base-key@0x2aa061786f0 (132-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379ba0 183s | CONCATENATE_DATA_AND_BASE: 183s | target: EXTRACT_KEY_FROM_KEY 183s | base: base-key@0x2aa06171ee0 (16-bytes, AES_KEY_GEN) 183s | params: 16-bytes@0x3ffc2379ad8 183s | key-offset: 0, key-size: 32 183s | EXTRACT_KEY_FROM_KEY: 183s | target: EXTRACT_KEY_FROM_KEY 183s | key_size: 32-bytes 183s | base: base-key@0x2aa06179f80 (48-bytes, EXTRACT_KEY_FROM_KEY) 183s | operation: FLAGS_ONLY 183s | params: 8-bytes@0x3ffc2379ad0 183s | NSS_IKE_PRF_DERIVE: 183s | target: NSS_IKE_PRF_PLUS_DERIVE 183s | base: base-key@0x2aa06175100 (20-bytes, EXTRACT_KEY_FROM_KEY) 183s | params: 56-bytes@0x3ffc2379ac8 183s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0x2aa06179f80 183s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x2aa06179f80 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 183s | sizeof bytes 32 183s | wrapper: (SECItemType)682: b4 e3 f9 a7 69 2e e8 85 82 0d b9 03 d1 f6 24 a3 59 cd 92 58 bd cd 83 83 40 94 3c 63 d7 5d 66 33 183s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0x2aa061794e0 183s | unwrapped: 183s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 183s | 56 bf 1f 1d 00 00 00 00 00 00 00 00 00 00 00 00 V............... 183s | verify_chunk_data: CAVP: IKEv2 key derivation with HMAC-SHA1: ok 183s | test_kdf_vector: CAVP: IKEv2 key derivation with HMAC-SHA1 passed 183s algparse: leak detective found no leaks 183s /usr/libexec/ipsec/pluto: adjusting nssdir to /tmp/tmp.KVBPgiGW2g 183s /usr/libexec/ipsec/pluto: selftest: skipping lock 183s /usr/libexec/ipsec/pluto: selftest: skipping control socket 183s /usr/libexec/ipsec/pluto: selftest: skipping fork 183s Initializing NSS using read-write database "sql:/tmp/tmp.KVBPgiGW2g" 183s FIPS Mode: NO 183s NSS crypto library initialized 183s FIPS mode disabled for pluto daemon 183s FIPS HMAC integrity support [disabled] 183s libcap-ng capng_apply failed to apply changes, err=-5. see: man capng_apply 183s libcap-ng support [enabled] 183s Linux audit support [enabled] 183s Starting Pluto (Libreswan Version 4.14 IKEv2 IKEv1 XFRM XFRMI esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) (NSS-KDF) DNSSEC SYSTEMD_WATCHDOG LABELED_IPSEC (SELINUX) LIBCAP_NG LINUX_AUDIT AUTH_PAM NETWORKMANAGER CURL(non-NSS) LDAP(non-NSS)) pid:1789 183s core dump dir: /run/pluto 183s secrets file: /etc/ipsec.secrets 183s leak-detective disabled 183s NSS crypto [enabled] 183s XAUTH PAM support [enabled] 183s initializing libevent in pthreads mode: headers: 2.1.12-stable (2010c00); library: 2.1.12-stable (2010c00) 183s NAT-Traversal support [enabled] 183s Encryption algorithms: 183s AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 183s AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 183s AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 183s 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 183s CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 183s CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 183s AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm, aes_gcm_c 183s AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_b 183s AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_a 183s AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 183s AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 183s NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 183s NULL [] IKEv1: ESP IKEv2: ESP 183s CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 183s Hash algorithms: 183s MD5 IKEv1: IKE IKEv2: NSS 183s SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 183s SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 183s SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 183s SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 183s IDENTITY IKEv1: IKEv2: FIPS 183s PRF algorithms: 183s HMAC_MD5 IKEv1: IKE IKEv2: IKE native(HMAC) md5 183s HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 183s HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 183s HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 183s HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 183s AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 183s Integrity algorithms: 183s HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH native(HMAC) md5, hmac_md5 183s HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 183s HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 183s HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 183s HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 183s HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 183s AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 183s AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 183s NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 183s DH algorithms: 183s NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 183s MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 183s MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 183s MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 183s MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 183s MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 183s MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 183s DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 183s DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 183s DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 183s DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 183s IPCOMP algorithms: 183s DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 183s LZS IKEv1: IKEv2: ESP AH FIPS 183s LZJH IKEv1: IKEv2: ESP AH FIPS 183s testing CAMELLIA_CBC: 183s Camellia: 16 bytes with 128-bit key 183s Camellia: 16 bytes with 128-bit key 183s Camellia: 16 bytes with 256-bit key 183s Camellia: 16 bytes with 256-bit key 183s testing AES_GCM_16: 183s empty string 183s one block 183s two blocks 183s two blocks with associated data 183s testing AES_CTR: 183s Encrypting 16 octets using AES-CTR with 128-bit key 183s Encrypting 32 octets using AES-CTR with 128-bit key 183s Encrypting 36 octets using AES-CTR with 128-bit key 183s Encrypting 16 octets using AES-CTR with 192-bit key 183s Encrypting 32 octets using AES-CTR with 192-bit key 183s Encrypting 36 octets using AES-CTR with 192-bit key 183s Encrypting 16 octets using AES-CTR with 256-bit key 183s Encrypting 32 octets using AES-CTR with 256-bit key 183s Encrypting 36 octets using AES-CTR with 256-bit key 183s testing AES_CBC: 183s Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 183s Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 183s Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 183s Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 183s testing AES_XCBC: 183s RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 183s RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 183s RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 183s RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 183s RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 183s RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 183s RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 183s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 183s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 183s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 183s testing HMAC_MD5: 183s RFC 2104: MD5_HMAC test 1 183s RFC 2104: MD5_HMAC test 2 183s RFC 2104: MD5_HMAC test 3 183s testing HMAC_SHA1: 183s CAVP: IKEv2 key derivation with HMAC-SHA1 183s selftest: exiting pluto 184s autopkgtest [11:53:29]: test cryptocheck: -----------------------] 184s autopkgtest [11:53:29]: test cryptocheck: - - - - - - - - - - results - - - - - - - - - - 184s cryptocheck PASS 185s autopkgtest [11:53:30]: test cavp: preparing testbed 242s autopkgtest [11:54:27]: testbed dpkg architecture: s390x 242s autopkgtest [11:54:27]: testbed apt version: 2.9.18 243s autopkgtest [11:54:28]: @@@@@@@@@@@@@@@@@@@@ test bed setup 243s autopkgtest [11:54:28]: testbed release detected to be: plucky 243s autopkgtest [11:54:28]: updating testbed package index (apt update) 244s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease [73.9 kB] 244s Hit:2 http://ftpmaster.internal/ubuntu plucky InRelease 244s Hit:3 http://ftpmaster.internal/ubuntu plucky-updates InRelease 244s Hit:4 http://ftpmaster.internal/ubuntu plucky-security InRelease 244s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/main Sources [177 kB] 244s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse Sources [15.7 kB] 244s Get:7 http://ftpmaster.internal/ubuntu plucky-proposed/universe Sources [877 kB] 244s Get:8 http://ftpmaster.internal/ubuntu plucky-proposed/restricted Sources [9708 B] 244s Get:9 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x Packages [289 kB] 244s Get:10 http://ftpmaster.internal/ubuntu plucky-proposed/restricted s390x Packages [756 B] 244s Get:11 http://ftpmaster.internal/ubuntu plucky-proposed/universe s390x Packages [974 kB] 244s Get:12 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse s390x Packages [5408 B] 245s Fetched 2423 kB in 1s (2553 kB/s) 245s Reading package lists... 246s Reading package lists... 246s Building dependency tree... 246s Reading state information... 246s Calculating upgrade... 246s The following packages will be upgraded: 246s usb.ids 246s 1 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 246s Need to get 223 kB of archives. 246s After this operation, 0 B of additional disk space will be used. 246s Get:1 http://ftpmaster.internal/ubuntu plucky/main s390x usb.ids all 2025.01.14-1 [223 kB] 247s Fetched 223 kB in 0s (557 kB/s) 247s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55658 files and directories currently installed.) 247s Preparing to unpack .../usb.ids_2025.01.14-1_all.deb ... 247s Unpacking usb.ids (2025.01.14-1) over (2024.12.04-1) ... 247s Setting up usb.ids (2025.01.14-1) ... 247s Reading package lists... 247s Building dependency tree... 247s Reading state information... 247s 0 upgraded, 0 newly installed, 0 to remove and 2 not upgraded. 247s autopkgtest [11:54:32]: upgrading testbed (apt dist-upgrade and autopurge) 248s Reading package lists... 248s Building dependency tree... 248s Reading state information... 248s Calculating upgrade...Starting pkgProblemResolver with broken count: 0 248s Starting 2 pkgProblemResolver with broken count: 0 248s Done 248s Entering ResolveByKeep 248s 248s The following packages will be upgraded: 248s libcrypt-dev libcrypt1 248s 2 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 248s Need to get 205 kB of archives. 248s After this operation, 2048 B of additional disk space will be used. 248s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libcrypt-dev s390x 1:4.4.38-1 [117 kB] 249s Get:2 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libcrypt1 s390x 1:4.4.38-1 [88.0 kB] 249s Fetched 205 kB in 0s (501 kB/s) 249s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55658 files and directories currently installed.) 249s Preparing to unpack .../libcrypt-dev_1%3a4.4.38-1_s390x.deb ... 249s Unpacking libcrypt-dev:s390x (1:4.4.38-1) over (1:4.4.36-5) ... 249s Preparing to unpack .../libcrypt1_1%3a4.4.38-1_s390x.deb ... 249s Unpacking libcrypt1:s390x (1:4.4.38-1) over (1:4.4.36-5) ... 249s Setting up libcrypt1:s390x (1:4.4.38-1) ... 249s Setting up libcrypt-dev:s390x (1:4.4.38-1) ... 249s Processing triggers for man-db (2.13.0-1) ... 249s Processing triggers for libc-bin (2.40-4ubuntu1) ... 249s Reading package lists... 250s Building dependency tree... 250s Reading state information... 250s Starting pkgProblemResolver with broken count: 0 250s Starting 2 pkgProblemResolver with broken count: 0 250s Done 250s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 252s Reading package lists... 252s Building dependency tree... 252s Reading state information... 253s Starting pkgProblemResolver with broken count: 0 253s Starting 2 pkgProblemResolver with broken count: 0 253s Done 253s The following NEW packages will be installed: 253s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 253s libnss3-tools libreswan libunbound8 253s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 253s Need to get 2750 kB of archives. 253s After this operation, 10.8 MB of additional disk space will be used. 253s Get:1 http://ftpmaster.internal/ubuntu plucky/main s390x dns-root-data all 2024071801 [5802 B] 253s Get:2 http://ftpmaster.internal/ubuntu plucky/main s390x libnss3-tools s390x 2:3.106-1ubuntu1 [632 kB] 253s Get:3 http://ftpmaster.internal/ubuntu plucky/main s390x libevent-pthreads-2.1-7t64 s390x 2.1.12-stable-10 [7870 B] 253s Get:4 http://ftpmaster.internal/ubuntu plucky/universe s390x libldns3t64 s390x 1.8.4-2 [169 kB] 253s Get:5 http://ftpmaster.internal/ubuntu plucky/main s390x libevent-2.1-7t64 s390x 2.1.12-stable-10 [145 kB] 253s Get:6 http://ftpmaster.internal/ubuntu plucky/main s390x libunbound8 s390x 1.20.0-1ubuntu2.1 [455 kB] 253s Get:7 http://ftpmaster.internal/ubuntu plucky/universe s390x libreswan s390x 4.14-1ubuntu2 [1335 kB] 254s Fetched 2750 kB in 1s (4035 kB/s) 254s Selecting previously unselected package dns-root-data. 254s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55658 files and directories currently installed.) 254s Preparing to unpack .../0-dns-root-data_2024071801_all.deb ... 254s Unpacking dns-root-data (2024071801) ... 254s Selecting previously unselected package libnss3-tools. 254s Preparing to unpack .../1-libnss3-tools_2%3a3.106-1ubuntu1_s390x.deb ... 254s Unpacking libnss3-tools (2:3.106-1ubuntu1) ... 254s Selecting previously unselected package libevent-pthreads-2.1-7t64:s390x. 254s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10_s390x.deb ... 254s Unpacking libevent-pthreads-2.1-7t64:s390x (2.1.12-stable-10) ... 254s Selecting previously unselected package libldns3t64:s390x. 254s Preparing to unpack .../3-libldns3t64_1.8.4-2_s390x.deb ... 254s Unpacking libldns3t64:s390x (1.8.4-2) ... 254s Selecting previously unselected package libevent-2.1-7t64:s390x. 254s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10_s390x.deb ... 254s Unpacking libevent-2.1-7t64:s390x (2.1.12-stable-10) ... 254s Selecting previously unselected package libunbound8:s390x. 254s Preparing to unpack .../5-libunbound8_1.20.0-1ubuntu2.1_s390x.deb ... 254s Unpacking libunbound8:s390x (1.20.0-1ubuntu2.1) ... 254s Selecting previously unselected package libreswan. 254s Preparing to unpack .../6-libreswan_4.14-1ubuntu2_s390x.deb ... 254s Unpacking libreswan (4.14-1ubuntu2) ... 254s Setting up libldns3t64:s390x (1.8.4-2) ... 254s Setting up libevent-pthreads-2.1-7t64:s390x (2.1.12-stable-10) ... 254s Setting up libevent-2.1-7t64:s390x (2.1.12-stable-10) ... 254s Setting up dns-root-data (2024071801) ... 254s Setting up libunbound8:s390x (1.20.0-1ubuntu2.1) ... 254s Setting up libnss3-tools (2:3.106-1ubuntu1) ... 254s Setting up libreswan (4.14-1ubuntu2) ... 254s ipsec.service is a disabled or a static unit, not starting it. 254s Processing triggers for man-db (2.13.0-1) ... 255s Processing triggers for libc-bin (2.40-4ubuntu1) ... 258s autopkgtest [11:54:43]: test cavp: [----------------------- 258s Testing installed CAVP binary: /usr/libexec/ipsec/cavp 261s test: IKE v2 261s Reading from ikev2.fax 264s test: IKE v1 Digital Signature Authentication 264s Reading from ikev1_dsa.fax 265s test: IKE v1 Pre-shared Key Authentication 265s Reading from ikev1_psk.fax 267s /tmp/autopkgtest.PBrhZM/build.WAz/src 268s autopkgtest [11:54:53]: test cavp: -----------------------] 268s autopkgtest [11:54:53]: test cavp: - - - - - - - - - - results - - - - - - - - - - 268s cavp PASS 268s autopkgtest [11:54:53]: @@@@@@@@@@@@@@@@@@@@ summary 268s opportunistic SKIP exit status 77 and marked as skippable 268s cryptocheck PASS 268s cavp PASS 286s nova [W] Using flock in prodstack6-s390x 286s Creating nova instance adt-plucky-s390x-libreswan-20250117-104018-juju-7f2275-prod-proposed-migration-environment-15-f30a0833-d384-494a-8367-743e6f4c1a0a from image adt/ubuntu-plucky-s390x-server-20250117.img (UUID 77043c30-ce55-43c6-ae27-2590a56e9de9)... 286s nova [W] Timed out waiting for 8350dae1-8c48-46d2-ba73-f97ed80b0877 to get deleted. 286s nova [W] Using flock in prodstack6-s390x 286s Creating nova instance adt-plucky-s390x-libreswan-20250117-104018-juju-7f2275-prod-proposed-migration-environment-15-f30a0833-d384-494a-8367-743e6f4c1a0a from image adt/ubuntu-plucky-s390x-server-20250117.img (UUID 77043c30-ce55-43c6-ae27-2590a56e9de9)... 286s nova [W] Timed out waiting for 11d1f5d0-cc01-42ae-897c-426a4993e3f9 to get deleted. 286s nova [W] Using flock in prodstack6-s390x 286s Creating nova instance adt-plucky-s390x-libreswan-20250117-104018-juju-7f2275-prod-proposed-migration-environment-15-f30a0833-d384-494a-8367-743e6f4c1a0a from image adt/ubuntu-plucky-s390x-server-20250117.img (UUID 77043c30-ce55-43c6-ae27-2590a56e9de9)... 286s nova [W] Timed out waiting for b901ad0e-e00d-40bd-ba9f-a0eededa88ef to get deleted.