0s autopkgtest [05:47:06]: starting date and time: 2026-02-04 05:47:06+0000 0s autopkgtest [05:47:06]: git checkout: 4b346b80 nova: make wait_reboot return success even when a no-op 0s autopkgtest [05:47:06]: host juju-7f2275-prod-proposed-migration-environment-15; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.ksqcprq_/out --timeout-copy=6000 --needs-internet=try --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:debconf --apt-upgrade libreswan --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 --env=ADT_TEST_TRIGGERS=debconf/1.5.91build1 -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest-cpu2-ram4-disk20-amd64 --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-15@sto01-12.secgroup --name adt-resolute-amd64-libreswan-20260204-054705-juju-7f2275-prod-proposed-migration-environment-15-cf0735ba-cd31-484a-b314-437613070b5d --image adt/ubuntu-resolute-amd64-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-15 --net-id=net_prod-autopkgtest-workers-amd64 -e TERM=linux --mirror=http://ftpmaster.internal/ubuntu/ 3s Creating nova instance adt-resolute-amd64-libreswan-20260204-054705-juju-7f2275-prod-proposed-migration-environment-15-cf0735ba-cd31-484a-b314-437613070b5d from image adt/ubuntu-resolute-amd64-server-20260203.img (UUID 74b0e1d0-93d1-4a18-9efb-95495079a2d9)... 71s autopkgtest [05:48:17]: testbed dpkg architecture: amd64 71s autopkgtest [05:48:17]: testbed apt version: 3.1.14 71s autopkgtest [05:48:17]: @@@@@@@@@@@@@@@@@@@@ test bed setup 71s autopkgtest [05:48:17]: testbed release detected to be: None 72s autopkgtest [05:48:18]: updating testbed package index (apt update) 72s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 72s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 72s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 72s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 72s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1714 kB] 72s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [5260 B] 72s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [234 kB] 73s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [35.1 kB] 73s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main i386 Packages [231 kB] 73s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 Packages [302 kB] 73s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 c-n-f Metadata [7160 B] 73s Get:12 http://ftpmaster.internal/ubuntu resolute-proposed/restricted amd64 Packages [32.9 kB] 73s Get:13 http://ftpmaster.internal/ubuntu resolute-proposed/restricted i386 Packages [3692 B] 73s Get:14 http://ftpmaster.internal/ubuntu resolute-proposed/restricted amd64 c-n-f Metadata [336 B] 73s Get:15 http://ftpmaster.internal/ubuntu resolute-proposed/universe i386 Packages [571 kB] 74s Get:16 http://ftpmaster.internal/ubuntu resolute-proposed/universe amd64 Packages [1567 kB] 74s Get:17 http://ftpmaster.internal/ubuntu resolute-proposed/universe amd64 c-n-f Metadata [32.7 kB] 74s Get:18 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse amd64 Packages [30.0 kB] 74s Get:19 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse i386 Packages [4480 B] 74s Get:20 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse amd64 c-n-f Metadata [1060 B] 74s Fetched 4896 kB in 1s (4555 kB/s) 74s Reading package lists... 75s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 75s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 75s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 75s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 75s Reading package lists... 75s Reading package lists... 76s Building dependency tree... 76s Reading state information... 76s Calculating upgrade... 76s The following packages will be upgraded: 76s debconf debconf-i18n firmware-sof-signed htop libzstd1 powermgmt-base 76s python3-debconf python3-lazr.restfulclient zstd 76s 9 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 76s Need to get 3269 kB of archives. 76s After this operation, 24.6 kB disk space will be freed. 76s Get:1 http://ftpmaster.internal/ubuntu resolute/main amd64 firmware-sof-signed all 2025.05.1-1build1 [1696 kB] 76s Get:2 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 python3-debconf all 1.5.91build1 [4174 B] 76s Get:3 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 debconf-i18n all 1.5.91build1 [227 kB] 76s Get:4 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 debconf all 1.5.91build1 [126 kB] 76s Get:5 http://ftpmaster.internal/ubuntu resolute/main amd64 libzstd1 amd64 1.5.7+dfsg-3 [308 kB] 76s Get:6 http://ftpmaster.internal/ubuntu resolute/main amd64 powermgmt-base all 1.38ubuntu2 [7878 B] 76s Get:7 http://ftpmaster.internal/ubuntu resolute/main amd64 htop amd64 3.4.1-5build2 [177 kB] 76s Get:8 http://ftpmaster.internal/ubuntu resolute/main amd64 python3-lazr.restfulclient all 0.14.6-3build1 [51.1 kB] 76s Get:9 http://ftpmaster.internal/ubuntu resolute/main amd64 zstd amd64 1.5.7+dfsg-3 [672 kB] 76s dpkg-preconfigure: unable to re-open stdin: No such file or directory 76s Fetched 3269 kB in 0s (10.7 MB/s) 76s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 76s Preparing to unpack .../firmware-sof-signed_2025.05.1-1build1_all.deb ... 76s Unpacking firmware-sof-signed (2025.05.1-1build1) over (2025.05.1-1) ... 77s Preparing to unpack .../python3-debconf_1.5.91build1_all.deb ... 77s Unpacking python3-debconf (1.5.91build1) over (1.5.91) ... 77s Preparing to unpack .../debconf-i18n_1.5.91build1_all.deb ... 77s Unpacking debconf-i18n (1.5.91build1) over (1.5.91) ... 77s Preparing to unpack .../debconf_1.5.91build1_all.deb ... 77s Unpacking debconf (1.5.91build1) over (1.5.91) ... 77s Setting up debconf (1.5.91build1) ... 77s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 77s Preparing to unpack .../libzstd1_1.5.7+dfsg-3_amd64.deb ... 77s Unpacking libzstd1:amd64 (1.5.7+dfsg-3) over (1.5.7+dfsg-2) ... 77s Setting up libzstd1:amd64 (1.5.7+dfsg-3) ... 77s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 77s Preparing to unpack .../powermgmt-base_1.38ubuntu2_all.deb ... 77s Unpacking powermgmt-base (1.38ubuntu2) over (1.38ubuntu1) ... 77s Preparing to unpack .../htop_3.4.1-5build2_amd64.deb ... 77s Unpacking htop (3.4.1-5build2) over (3.4.1-5build1) ... 77s Preparing to unpack .../python3-lazr.restfulclient_0.14.6-3build1_all.deb ... 77s Unpacking python3-lazr.restfulclient (0.14.6-3build1) over (0.14.6-3) ... 77s Preparing to unpack .../zstd_1.5.7+dfsg-3_amd64.deb ... 77s Unpacking zstd (1.5.7+dfsg-3) over (1.5.7+dfsg-2) ... 77s Setting up powermgmt-base (1.38ubuntu2) ... 77s Setting up htop (3.4.1-5build2) ... 77s Setting up firmware-sof-signed (2025.05.1-1build1) ... 77s Setting up python3-debconf (1.5.91build1) ... 77s Setting up debconf-i18n (1.5.91build1) ... 77s Setting up python3-lazr.restfulclient (0.14.6-3build1) ... 77s Setting up zstd (1.5.7+dfsg-3) ... 77s Processing triggers for man-db (2.13.1-1) ... 79s Processing triggers for libc-bin (2.42-2ubuntu4) ... 79s autopkgtest [05:48:24]: upgrading testbed (apt dist-upgrade and autopurge) 79s Reading package lists... 79s Building dependency tree... 79s Reading state information... 79s Calculating upgrade... 79s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 79s Reading package lists... 79s Building dependency tree... 79s Reading state information... 79s Solving dependencies... 79s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 81s autopkgtest [05:48:27]: testbed running kernel: Linux 6.18.0-9-generic #9-Ubuntu SMP PREEMPT_DYNAMIC Mon Jan 12 16:49:02 UTC 2026 81s autopkgtest [05:48:27]: @@@@@@@@@@@@@@@@@@@@ apt-source libreswan 83s Get:1 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (dsc) [2735 B] 83s Get:2 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (tar) [4132 kB] 83s Get:3 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (asc) [862 B] 83s Get:4 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (diff) [16.7 kB] 83s gpgv: Signature made Thu Jul 31 14:30:12 2025 UTC 83s gpgv: using RSA key 25E3FF2D7F469DBE7D0D4E50AFCFEC8E669CE1C2 83s gpgv: Can't check signature: No public key 83s dpkg-source: warning: cannot verify inline signature for ./libreswan_5.2-2.2ubuntu1.dsc: no acceptable signature found 84s autopkgtest [05:48:30]: testing package libreswan version 5.2-2.2ubuntu1 84s autopkgtest [05:48:30]: build not needed 85s autopkgtest [05:48:31]: test opportunistic: preparing testbed 85s Reading package lists... 86s Building dependency tree... 86s Reading state information... 86s Solving dependencies... 86s The following NEW packages will be installed: 86s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 86s libnss3-tools libreswan libunbound8 86s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 86s Need to get 2953 kB of archives. 86s After this operation, 11.9 MB of additional disk space will be used. 86s Get:1 http://ftpmaster.internal/ubuntu resolute/main amd64 dns-root-data all 2025080400build1 [6022 B] 86s Get:2 http://ftpmaster.internal/ubuntu resolute/main amd64 libnss3-tools amd64 2:3.120-1 [626 kB] 86s Get:3 http://ftpmaster.internal/ubuntu resolute/main amd64 libevent-pthreads-2.1-7t64 amd64 2.1.12-stable-10build1 [8360 B] 86s Get:4 http://ftpmaster.internal/ubuntu resolute/universe amd64 libldns3t64 amd64 1.8.4-2build1 [173 kB] 86s Get:5 http://ftpmaster.internal/ubuntu resolute/main amd64 libevent-2.1-7t64 amd64 2.1.12-stable-10build1 [155 kB] 86s Get:6 http://ftpmaster.internal/ubuntu resolute/main amd64 libunbound8 amd64 1.24.2-1ubuntu1 [462 kB] 86s Get:7 http://ftpmaster.internal/ubuntu resolute/universe amd64 libreswan amd64 5.2-2.2ubuntu1 [1523 kB] 86s Fetched 2953 kB in 0s (6255 kB/s) 86s Selecting previously unselected package dns-root-data. 86s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 86s Preparing to unpack .../0-dns-root-data_2025080400build1_all.deb ... 86s Unpacking dns-root-data (2025080400build1) ... 86s Selecting previously unselected package libnss3-tools. 86s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_amd64.deb ... 86s Unpacking libnss3-tools (2:3.120-1) ... 86s Selecting previously unselected package libevent-pthreads-2.1-7t64:amd64. 86s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build1_amd64.deb ... 86s Unpacking libevent-pthreads-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 86s Selecting previously unselected package libldns3t64:amd64. 86s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_amd64.deb ... 86s Unpacking libldns3t64:amd64 (1.8.4-2build1) ... 86s Selecting previously unselected package libevent-2.1-7t64:amd64. 86s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build1_amd64.deb ... 86s Unpacking libevent-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 86s Selecting previously unselected package libunbound8:amd64. 86s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_amd64.deb ... 86s Unpacking libunbound8:amd64 (1.24.2-1ubuntu1) ... 86s Selecting previously unselected package libreswan. 86s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_amd64.deb ... 86s Unpacking libreswan (5.2-2.2ubuntu1) ... 86s Setting up libldns3t64:amd64 (1.8.4-2build1) ... 86s Setting up libevent-pthreads-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 86s Setting up libevent-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 86s Setting up dns-root-data (2025080400build1) ... 86s Setting up libunbound8:amd64 (1.24.2-1ubuntu1) ... 86s Setting up libnss3-tools (2:3.120-1) ... 86s Setting up libreswan (5.2-2.2ubuntu1) ... 87s ipsec.service is a disabled or a static unit, not starting it. 87s Processing triggers for man-db (2.13.1-1) ... 87s Processing triggers for libc-bin (2.42-2ubuntu4) ... 88s autopkgtest [05:48:34]: test opportunistic: [----------------------- 88s ping: oe.libreswan.org: No address associated with hostname 89s autopkgtest [05:48:35]: test opportunistic: -----------------------] 89s autopkgtest [05:48:35]: test opportunistic: - - - - - - - - - - results - - - - - - - - - - 89s opportunistic SKIP exit status 77 and marked as skippable 89s autopkgtest [05:48:35]: test cryptocheck: preparing testbed 107s Creating nova instance adt-resolute-amd64-libreswan-20260204-054705-juju-7f2275-prod-proposed-migration-environment-15-cf0735ba-cd31-484a-b314-437613070b5d from image adt/ubuntu-resolute-amd64-server-20260203.img (UUID 74b0e1d0-93d1-4a18-9efb-95495079a2d9)... 176s autopkgtest [05:50:02]: testbed dpkg architecture: amd64 176s autopkgtest [05:50:02]: testbed apt version: 3.1.14 177s autopkgtest [05:50:03]: @@@@@@@@@@@@@@@@@@@@ test bed setup 177s autopkgtest [05:50:03]: testbed release detected to be: resolute 177s autopkgtest [05:50:03]: updating testbed package index (apt update) 178s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 178s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 178s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 178s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 178s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [35.1 kB] 178s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [5260 B] 178s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [234 kB] 178s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1714 kB] 178s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 Packages [302 kB] 178s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/main i386 Packages [231 kB] 178s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 c-n-f Metadata [7160 B] 178s Get:12 http://ftpmaster.internal/ubuntu resolute-proposed/restricted i386 Packages [3692 B] 178s Get:13 http://ftpmaster.internal/ubuntu resolute-proposed/restricted amd64 Packages [32.9 kB] 178s Get:14 http://ftpmaster.internal/ubuntu resolute-proposed/restricted amd64 c-n-f Metadata [336 B] 178s Get:15 http://ftpmaster.internal/ubuntu resolute-proposed/universe amd64 Packages [1567 kB] 178s Get:16 http://ftpmaster.internal/ubuntu resolute-proposed/universe i386 Packages [571 kB] 178s Get:17 http://ftpmaster.internal/ubuntu resolute-proposed/universe amd64 c-n-f Metadata [32.7 kB] 178s Get:18 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse i386 Packages [4480 B] 178s Get:19 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse amd64 Packages [30.0 kB] 178s Get:20 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse amd64 c-n-f Metadata [1060 B] 179s Fetched 4896 kB in 1s (5335 kB/s) 180s Reading package lists... 180s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 180s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 180s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 180s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 181s Reading package lists... 181s Reading package lists... 181s Building dependency tree... 181s Reading state information... 181s Calculating upgrade... 181s The following packages will be upgraded: 181s debconf debconf-i18n firmware-sof-signed htop libzstd1 powermgmt-base 181s python3-debconf python3-lazr.restfulclient zstd 181s 9 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 181s Need to get 3269 kB of archives. 181s After this operation, 24.6 kB disk space will be freed. 181s Get:1 http://ftpmaster.internal/ubuntu resolute/main amd64 firmware-sof-signed all 2025.05.1-1build1 [1696 kB] 182s Get:2 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 python3-debconf all 1.5.91build1 [4174 B] 182s Get:3 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 debconf-i18n all 1.5.91build1 [227 kB] 182s Get:4 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 debconf all 1.5.91build1 [126 kB] 182s Get:5 http://ftpmaster.internal/ubuntu resolute/main amd64 libzstd1 amd64 1.5.7+dfsg-3 [308 kB] 182s Get:6 http://ftpmaster.internal/ubuntu resolute/main amd64 powermgmt-base all 1.38ubuntu2 [7878 B] 182s Get:7 http://ftpmaster.internal/ubuntu resolute/main amd64 htop amd64 3.4.1-5build2 [177 kB] 182s Get:8 http://ftpmaster.internal/ubuntu resolute/main amd64 python3-lazr.restfulclient all 0.14.6-3build1 [51.1 kB] 182s Get:9 http://ftpmaster.internal/ubuntu resolute/main amd64 zstd amd64 1.5.7+dfsg-3 [672 kB] 182s dpkg-preconfigure: unable to re-open stdin: No such file or directory 182s Fetched 3269 kB in 0s (8279 kB/s) 182s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 182s Preparing to unpack .../firmware-sof-signed_2025.05.1-1build1_all.deb ... 182s Unpacking firmware-sof-signed (2025.05.1-1build1) over (2025.05.1-1) ... 182s Preparing to unpack .../python3-debconf_1.5.91build1_all.deb ... 182s Unpacking python3-debconf (1.5.91build1) over (1.5.91) ... 182s Preparing to unpack .../debconf-i18n_1.5.91build1_all.deb ... 182s Unpacking debconf-i18n (1.5.91build1) over (1.5.91) ... 182s Preparing to unpack .../debconf_1.5.91build1_all.deb ... 182s Unpacking debconf (1.5.91build1) over (1.5.91) ... 182s Setting up debconf (1.5.91build1) ... 182s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 182s Preparing to unpack .../libzstd1_1.5.7+dfsg-3_amd64.deb ... 182s Unpacking libzstd1:amd64 (1.5.7+dfsg-3) over (1.5.7+dfsg-2) ... 182s Setting up libzstd1:amd64 (1.5.7+dfsg-3) ... 182s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 182s Preparing to unpack .../powermgmt-base_1.38ubuntu2_all.deb ... 182s Unpacking powermgmt-base (1.38ubuntu2) over (1.38ubuntu1) ... 183s Preparing to unpack .../htop_3.4.1-5build2_amd64.deb ... 183s Unpacking htop (3.4.1-5build2) over (3.4.1-5build1) ... 183s Preparing to unpack .../python3-lazr.restfulclient_0.14.6-3build1_all.deb ... 183s Unpacking python3-lazr.restfulclient (0.14.6-3build1) over (0.14.6-3) ... 183s Preparing to unpack .../zstd_1.5.7+dfsg-3_amd64.deb ... 183s Unpacking zstd (1.5.7+dfsg-3) over (1.5.7+dfsg-2) ... 183s Setting up powermgmt-base (1.38ubuntu2) ... 183s Setting up htop (3.4.1-5build2) ... 183s Setting up firmware-sof-signed (2025.05.1-1build1) ... 183s Setting up python3-debconf (1.5.91build1) ... 183s Setting up debconf-i18n (1.5.91build1) ... 183s Setting up python3-lazr.restfulclient (0.14.6-3build1) ... 183s Setting up zstd (1.5.7+dfsg-3) ... 183s Processing triggers for man-db (2.13.1-1) ... 184s Processing triggers for libc-bin (2.42-2ubuntu4) ... 184s autopkgtest [05:50:10]: upgrading testbed (apt dist-upgrade and autopurge) 184s Reading package lists... 184s Building dependency tree... 184s Reading state information... 184s Calculating upgrade... 184s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 184s Reading package lists... 184s Building dependency tree... 184s Reading state information... 184s Solving dependencies... 185s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 187s Reading package lists... 187s Building dependency tree... 187s Reading state information... 187s Solving dependencies... 187s The following NEW packages will be installed: 187s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 187s libnss3-tools libreswan libunbound8 187s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 187s Need to get 2953 kB of archives. 187s After this operation, 11.9 MB of additional disk space will be used. 187s Get:1 http://ftpmaster.internal/ubuntu resolute/main amd64 dns-root-data all 2025080400build1 [6022 B] 187s Get:2 http://ftpmaster.internal/ubuntu resolute/main amd64 libnss3-tools amd64 2:3.120-1 [626 kB] 187s Get:3 http://ftpmaster.internal/ubuntu resolute/main amd64 libevent-pthreads-2.1-7t64 amd64 2.1.12-stable-10build1 [8360 B] 187s Get:4 http://ftpmaster.internal/ubuntu resolute/universe amd64 libldns3t64 amd64 1.8.4-2build1 [173 kB] 187s Get:5 http://ftpmaster.internal/ubuntu resolute/main amd64 libevent-2.1-7t64 amd64 2.1.12-stable-10build1 [155 kB] 187s Get:6 http://ftpmaster.internal/ubuntu resolute/main amd64 libunbound8 amd64 1.24.2-1ubuntu1 [462 kB] 187s Get:7 http://ftpmaster.internal/ubuntu resolute/universe amd64 libreswan amd64 5.2-2.2ubuntu1 [1523 kB] 188s Fetched 2953 kB in 1s (4589 kB/s) 188s Selecting previously unselected package dns-root-data. 188s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 188s Preparing to unpack .../0-dns-root-data_2025080400build1_all.deb ... 188s Unpacking dns-root-data (2025080400build1) ... 188s Selecting previously unselected package libnss3-tools. 188s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_amd64.deb ... 188s Unpacking libnss3-tools (2:3.120-1) ... 188s Selecting previously unselected package libevent-pthreads-2.1-7t64:amd64. 188s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build1_amd64.deb ... 188s Unpacking libevent-pthreads-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 188s Selecting previously unselected package libldns3t64:amd64. 188s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_amd64.deb ... 188s Unpacking libldns3t64:amd64 (1.8.4-2build1) ... 188s Selecting previously unselected package libevent-2.1-7t64:amd64. 188s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build1_amd64.deb ... 188s Unpacking libevent-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 188s Selecting previously unselected package libunbound8:amd64. 188s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_amd64.deb ... 188s Unpacking libunbound8:amd64 (1.24.2-1ubuntu1) ... 188s Selecting previously unselected package libreswan. 188s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_amd64.deb ... 188s Unpacking libreswan (5.2-2.2ubuntu1) ... 188s Setting up libldns3t64:amd64 (1.8.4-2build1) ... 188s Setting up libevent-pthreads-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 188s Setting up libevent-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 188s Setting up dns-root-data (2025080400build1) ... 188s Setting up libunbound8:amd64 (1.24.2-1ubuntu1) ... 188s Setting up libnss3-tools (2:3.120-1) ... 188s Setting up libreswan (5.2-2.2ubuntu1) ... 188s ipsec.service is a disabled or a static unit, not starting it. 188s Processing triggers for man-db (2.13.1-1) ... 189s Processing triggers for libc-bin (2.42-2ubuntu4) ... 192s autopkgtest [05:50:18]: test cryptocheck: [----------------------- 192s Testing installed binary: /usr/libexec/ipsec/algparse 192s Testing installed binary: /usr/libexec/ipsec/pluto 192s testing -tp 192s ipsec algparse: Encryption algorithms: 192s ipsec algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 192s ipsec algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 192s ipsec algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 192s ipsec algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 192s ipsec algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 192s ipsec algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 192s ipsec algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 192s ipsec algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 192s ipsec algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 192s ipsec algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 192s ipsec algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 192s ipsec algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 192s ipsec algparse: NULL [] IKEv1: ESP IKEv2: ESP NULL 192s ipsec algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 192s ipsec algparse: Hash algorithms: 192s ipsec algparse: MD5 IKEv1: IKE IKEv2: NSS 192s ipsec algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 192s ipsec algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 192s ipsec algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 192s ipsec algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 192s ipsec algparse: IDENTITY IKEv1: IKEv2: FIPS 192s ipsec algparse: PRF algorithms: 192s ipsec algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 192s ipsec algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 192s ipsec algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 192s ipsec algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 192s ipsec algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 192s ipsec algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 192s ipsec algparse: Integrity algorithms: 192s ipsec algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 192s ipsec algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 192s ipsec algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 192s ipsec algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 192s ipsec algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 192s ipsec algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 192s ipsec algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 192s ipsec algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 192s ipsec algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 192s ipsec algparse: DH algorithms: 192s ipsec algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 192s ipsec algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 192s ipsec algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 192s ipsec algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 192s ipsec algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 192s ipsec algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 192s ipsec algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 192s ipsec algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 192s ipsec algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 192s ipsec algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 192s ipsec algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 192s ipsec algparse: IPCOMP algorithms: 192s ipsec algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 192s ipsec algparse: LZS IKEv1: IKEv2: ESP AH FIPS 192s ipsec algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 192s algparse -v2 'esp' (expect SUCCESS) 192s AES_GCM_16_256-NONE 192s AES_GCM_16_128-NONE 192s CHACHA20_POLY1305-NONE 192s AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 192s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 192s algparse -v2 'esp=' (expect ERROR) 192s ERROR: ESP proposal is empty 192s algparse -v2 'esp=aes' (expect SUCCESS) 192s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 192s algparse -v2 'esp=aes;modp2048' (expect SUCCESS) 192s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 192s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 192s AES_CBC-HMAC_SHA1_96 192s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 192s AES_CBC-HMAC_SHA1_96 192s algparse -v2 'esp=aes-sha1-modp2048' (expect SUCCESS) 192s AES_CBC-HMAC_SHA1_96 192s algparse -v2 'esp=aes-128-sha1' (expect SUCCESS) 192s AES_CBC_128-HMAC_SHA1_96 192s algparse -v2 'esp=aes-128-sha1' (expect SUCCESS) 192s AES_CBC_128-HMAC_SHA1_96 192s algparse -v2 'esp=aes-128-sha1-modp2048' (expect SUCCESS) 192s AES_CBC_128-HMAC_SHA1_96 192s algparse -v2 'esp=aes-128' (expect SUCCESS) 192s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 192s algparse -v2 'esp=aes_gcm_a-128-null' (expect SUCCESS) 192s AES_GCM_8_128-NONE 192s algparse -v2 'esp=3des-sha1;modp1024' (expect ERROR) 192s ERROR: ESP DH algorithm 'modp1024' is not supported 192s | parsing 'AES_GCM_16_256,AES_GCM_16_128,CHACHA20_POLY1305,AES_CBC_256,AES_CBC_128' for ESP 192s | proposal: 'AES_GCM_16_256' 192s | token: '' '' "AES_GCM_16_256" '' 192s | token: '' "AES_GCM_16_256" '' '' 192s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_256' is not recognized 192s | token: '' '' '' 192s | appending ESP encryption algorithm AES_GCM_16[_256] 192s | appending ESP integrity algorithm NONE[_0] 192s | proposal: 'AES_GCM_16_128' 192s | token: '' '' "AES_GCM_16_128" '' 192s | token: '' "AES_GCM_16_128" '' '' 192s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_128' is not recognized 192s | token: '' '' '' 192s | appending ESP encryption algorithm AES_GCM_16[_128] 192s | appending ESP integrity algorithm NONE[_0] 192s | proposal: 'CHACHA20_POLY1305' 192s | token: '' '' "CHACHA20_POLY1305" '' 192s | token: '' "CHACHA20_POLY1305" '' '' 192s | token: '' '' '' 192s | appending ESP encryption algorithm CHACHA20_POLY1305[_0] 192s | appending ESP integrity algorithm NONE[_0] 192s | proposal: 'AES_CBC_256' 192s | token: '' '' "AES_CBC_256" '' 192s | token: '' "AES_CBC_256" '' '' 192s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_256' is not recognized 192s | token: '' '' '' 192s | appending ESP encryption algorithm AES_CBC[_256] 192s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 192s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 192s | proposal: 'AES_CBC_128' 192s | token: '' '' "AES_CBC_128" '' 192s | token: '' "AES_CBC_128" '' '' 192s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_128' is not recognized 192s | token: '' '' '' 192s | appending ESP encryption algorithm AES_CBC[_128] 192s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 192s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 192s | parsing '' for ESP 192s | parsing 'aes' for ESP 192s | proposal: 'aes' 192s | token: '' '' "aes" '' 192s | token: '' "aes" '' '' 192s | token: '' '' '' 192s | appending ESP encryption algorithm AES_CBC[_0] 192s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 192s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 192s | parsing 'aes;modp2048' for ESP 192s | proposal: 'aes;modp2048' 192s | token: '' '' "aes" ';' 192s | token: '' "aes" ';' "modp2048" '' 192s | token: ';' "modp2048" '' '' 192s | appending ESP encryption algorithm AES_CBC[_0] 192s | parsing dh: 192s | appending ESP DH algorithm MODP2048[_0] 192s | token: '' '' '' 192s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 192s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 192s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 192s | parsing 'aes-sha1' for ESP 192s | proposal: 'aes-sha1' 192s | token: '' '' "aes" '-' 192s | token: '' "aes" '-' "sha1" '' 192s | token: '-' "sha1" '' '' 192s | appending ESP encryption algorithm AES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: '' '' '' 192s | parsing 'aes-sha1' for ESP 192s | proposal: 'aes-sha1' 192s | token: '' '' "aes" '-' 192s | token: '' "aes" '-' "sha1" '' 192s | token: '-' "sha1" '' '' 192s | appending ESP encryption algorithm AES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: '' '' '' 192s | parsing 'aes-sha1-modp2048' for ESP 192s | proposal: 'aes-sha1-modp2048' 192s | token: '' '' "aes" '-' 192s | token: '' "aes" '-' "sha1" '-' 192s | token: '-' "sha1" '-' "modp2048" '' 192s | appending ESP encryption algorithm AES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: '-' "modp2048" '' '' 192s | parsing dh: 192s | appending ESP DH algorithm MODP2048[_0] 192s | token: '' '' '' 192s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 192s | parsing 'aes-128-sha1' for ESP 192s | proposal: 'aes-128-sha1' 192s | token: '' '' "aes" '-' 192s | token: '' "aes" '-' "128" '-' 192s | token: '-' "128" '-' "sha1" '' 192s | token: '-' "sha1" '' '' 192s | appending ESP encryption algorithm AES_CBC[_128] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: '' '' '' 192s | parsing 'aes-128-sha1' for ESP 192s | proposal: 'aes-128-sha1' 192s | token: '' '' "aes" '-' 192s | token: '' "aes" '-' "128" '-' 192s | token: '-' "128" '-' "sha1" '' 192s | token: '-' "sha1" '' '' 192s | appending ESP encryption algorithm AES_CBC[_128] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: '' '' '' 192s | parsing 'aes-128-sha1-modp2048' for ESP 192s | proposal: 'aes-128-sha1-modp2048' 192s | token: '' '' "aes" '-' 192s | token: '' "aes" '-' "128" '-' 192s | token: '-' "128" '-' "sha1" '-' 192s | token: '-' "sha1" '-' "modp2048" '' 192s | appending ESP encryption algorithm AES_CBC[_128] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: '-' "modp2048" '' '' 192s | parsing dh: 192s | appending ESP DH algorithm MODP2048[_0] 192s | token: '' '' '' 192s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 192s | parsing 'aes-128' for ESP 192s | proposal: 'aes-128' 192s | token: '' '' "aes" '-' 192s | token: '' "aes" '-' "128" '' 192s | token: '-' "128" '' '' 192s | token: '' '' '' 192s | appending ESP encryption algorithm AES_CBC[_128] 192s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 192s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 192s | parsing 'aes_gcm_a-128-null' for ESP 192s | proposal: 'aes_gcm_a-128-null' 192s | token: '' '' "aes_gcm_a" '-' 192s | token: '' "aes_gcm_a" '-' "128" '-' 192s | token: '-' "128" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_GCM_8[_128] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing '3des-sha1;modp1024' for ESP 192s | proposal: '3des-sha1;modp1024' 192s | token: '' '' "3des" '-' 192s | token: '' "3des" '-' "sha1" ';' 192s | token: '-' "sha1" ';' "modp1024" '' 192s | appending ESP encryption algorithm 3DES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: ';' "modp1024" '' '' 192s | parsing dh: 192s | ike_alg_byname() failed: ESP DH algorithm 'modp1024' is not supported 192s | lookup for DH algorithm 'modp1024' failed 192s | ... failed 'ESP DH algorithm 'modp1024' is not supported' 192s algparse -v2 'esp=3des-sha1;modp1536' (expect SUCCESS) 192s 3DES_CBC-HMAC_SHA1_96 192s algparse -v2 'esp=3des-sha1;modp2048' (expect SUCCESS) 192s 3DES_CBC-HMAC_SHA1_96 192s algparse -v2 'esp=3des-sha1;dh21' (expect SUCCESS) 192s 3DES_CBC-HMAC_SHA1_96 192s algparse -v2 'esp=3des-sha1;ecp_521' (expect SUCCESS) 192s 3DES_CBC-HMAC_SHA1_96 192s algparse -v2 'esp=3des-sha1;dh23' (expect ERROR) 192s | parsing '3des-sha1;modp1536' for ESP 192s | proposal: '3des-sha1;modp1536' 192s | token: '' '' "3des" '-' 192s | token: '' "3des" '-' "sha1" ';' 192s | token: '-' "sha1" ';' "modp1536" '' 192s | appending ESP encryption algorithm 3DES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: ';' "modp1536" '' '' 192s | parsing dh: 192s | appending ESP DH algorithm MODP1536[_0] 192s | token: '' '' '' 192s ipsec algparse: ignoring ESP DH algorithm MODP1536 as PFS policy is disabled 192s | parsing '3des-sha1;modp2048' for ESP 192s | proposal: '3des-sha1;modp2048' 192s | token: '' '' "3des" '-' 192s | token: '' "3des" '-' "sha1" ';' 192s | token: '-' "sha1" ';' "modp2048" '' 192s | appending ESP encryption algorithm 3DES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: ';' "modp2048" '' '' 192s | parsing dh: 192s | appending ESP DH algorithm MODP2048[_0] 192s | token: '' '' '' 192s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 192s | parsing '3des-sha1;dh21' for ESP 192s | proposal: '3des-sha1;dh21' 192s | token: '' '' "3des" '-' 192s | token: '' "3des" '-' "sha1" ';' 192s | token: '-' "sha1" ';' "dh21" '' 192s | appending ESP encryption algorithm 3DES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: ';' "dh21" '' '' 192s | parsing dh: 192s | appending ESP DH algorithm DH21[_0] 192s | token: '' '' '' 192s ipsec algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 192s | parsing '3des-sha1;ecp_521' for ESP 192s | proposal: '3des-sha1;ecp_521' 192s | token: '' '' "3des" '-' 192s | token: '' "3des" '-' "sha1" ';' 192s | token: '-' "sha1" ';' "ecp_521" '' 192s | appending ESP encryption algorithm 3DES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: ';' "ecp_521" '' '' 192s | parsing dh: 192s | appending ESP DH algorithm DH21[_0] 192s | token: '' '' '' 192s ERROR: ESP DH algorithm 'dh23' is not supported 192s algparse -v2 'esp=3des-sha1;dh24' (expect ERROR) 192s ERROR: ESP DH algorithm 'dh24' is not supported 192s algparse -v2 'esp=3des-sha1' (expect SUCCESS) 192s 3DES_CBC-HMAC_SHA1_96 192s algparse -v2 'esp=null-sha1' (expect SUCCESS) 192s NULL-HMAC_SHA1_96 192s algparse -v2 'esp=aes_cbc' (expect SUCCESS) 192s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 192s algparse -v2 'esp=aes-sha' (expect SUCCESS) 192s AES_CBC-HMAC_SHA1_96 192s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 192s AES_CBC-HMAC_SHA1_96 192s algparse -v2 'esp=aes128-sha1' (expect SUCCESS) 192s AES_CBC_128-HMAC_SHA1_96 192s algparse -v2 'esp=aes-sha2' (expect SUCCESS) 192s AES_CBC-HMAC_SHA2_256_128 192s algparse -v2 'esp=aes-sha256' (expect SUCCESS) 192s ipsec algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 192s | parsing '3des-sha1;dh23' for ESP 192s | proposal: '3des-sha1;dh23' 192s | token: '' '' "3des" '-' 192s | token: '' "3des" '-' "sha1" ';' 192s | token: '-' "sha1" ';' "dh23" '' 192s | appending ESP encryption algorithm 3DES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: ';' "dh23" '' '' 192s | parsing dh: 192s | ike_alg_byname() failed: ESP DH algorithm 'dh23' is not supported 192s | lookup for DH algorithm 'dh23' failed 192s | ... failed 'ESP DH algorithm 'dh23' is not supported' 192s | parsing '3des-sha1;dh24' for ESP 192s | proposal: '3des-sha1;dh24' 192s | token: '' '' "3des" '-' 192s | token: '' "3des" '-' "sha1" ';' 192s | token: '-' "sha1" ';' "dh24" '' 192s | appending ESP encryption algorithm 3DES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: ';' "dh24" '' '' 192s | parsing dh: 192s | ike_alg_byname() failed: ESP DH algorithm 'dh24' is not supported 192s | lookup for DH algorithm 'dh24' failed 192s | ... failed 'ESP DH algorithm 'dh24' is not supported' 192s | parsing '3des-sha1' for ESP 192s | proposal: '3des-sha1' 192s | token: '' '' "3des" '-' 192s | token: '' "3des" '-' "sha1" '' 192s | token: '-' "sha1" '' '' 192s | appending ESP encryption algorithm 3DES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: '' '' '' 192s | parsing 'null-sha1' for ESP 192s | proposal: 'null-sha1' 192s | token: '' '' "null" '-' 192s | token: '' "null" '-' "sha1" '' 192s | token: '-' "sha1" '' '' 192s | appending ESP encryption algorithm NULL[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: '' '' '' 192s | parsing 'aes_cbc' for ESP 192s | proposal: 'aes_cbc' 192s | token: '' '' "aes_cbc" '' 192s | token: '' "aes_cbc" '' '' 192s | token: '' '' '' 192s | appending ESP encryption algorithm AES_CBC[_0] 192s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 192s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 192s | parsing 'aes-sha' for ESP 192s | proposal: 'aes-sha' 192s | token: '' '' "aes" '-' 192s | token: '' "aes" '-' "sha" '' 192s | token: '-' "sha" '' '' 192s | appending ESP encryption algorithm AES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: '' '' '' 192s | parsing 'aes-sha1' for ESP 192s | proposal: 'aes-sha1' 192s | token: '' '' "aes" '-' 192s | token: '' "aes" '-' "sha1" '' 192s | token: '-' "sha1" '' '' 192s | appending ESP encryption algorithm AES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: '' '' '' 192s | parsing 'aes128-sha1' for ESP 192s | proposal: 'aes128-sha1' 192s | token: '' '' "aes128" '-' 192s | token: '' "aes128" '-' "sha1" '' 192s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 192s | token: '-' "sha1" '' '' 192s | appending ESP encryption algorithm AES_CBC[_128] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: '' '' '' 192s | parsing 'aes-sha2' for ESP 192s | proposal: 'aes-sha2' 192s | token: '' '' "aes" '-' 192s | token: '' "aes" '-' "sha2" '' 192s | token: '-' "sha2" '' '' 192s | appending ESP encryption algorithm AES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 192s | token: '' '' '' 192s | parsing 'aes-sha256' for ESP 192s | proposal: 'aes-sha256' 192s | token: '' '' "aes" '-' 192s | token: '' "aes" '-' "sha256" '' 192s | token: '-' "sha256" '' '' 192s | appending ESP encryption algorithm AES_CBC[_0] 192s | parsing integ: 192s AES_CBC-HMAC_SHA2_256_128 192s algparse -v2 'esp=aes-sha384' (expect SUCCESS) 192s AES_CBC-HMAC_SHA2_384_192 192s algparse -v2 'esp=aes-sha512' (expect SUCCESS) 192s AES_CBC-HMAC_SHA2_512_256 192s algparse -v2 'esp=aes128-aes_xcbc' (expect SUCCESS) 192s AES_CBC_128-AES_XCBC_96 192s algparse -v2 'esp=aes192-sha1' (expect SUCCESS) 192s AES_CBC_192-HMAC_SHA1_96 192s algparse -v2 'esp=aes256-sha1' (expect SUCCESS) 192s AES_CBC_256-HMAC_SHA1_96 192s algparse -v2 'esp=aes256-sha' (expect SUCCESS) 192s AES_CBC_256-HMAC_SHA1_96 192s algparse -v2 'esp=aes256-sha2' (expect SUCCESS) 192s AES_CBC_256-HMAC_SHA2_256_128 192s algparse -v2 'esp=aes256-sha2_256' (expect SUCCESS) 192s AES_CBC_256-HMAC_SHA2_256_128 192s algparse -v2 'esp=aes256-sha2_384' (expect SUCCESS) 192s AES_CBC_256-HMAC_SHA2_384_192 192s algparse -v2 'esp=aes256-sha2_512' (expect SUCCESS) 192s AES_CBC_256-HMAC_SHA2_512_256 192s algparse -v2 'esp=camellia' (expect SUCCESS) 192s CAMELLIA_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 192s algparse -v2 'esp=camellia128' (expect SUCCESS) 192s CAMELLIA_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 192s algparse -v2 'esp=camellia192' (expect SUCCESS) 192s CAMELLIA_CBC_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 192s algparse -v2 'esp=camellia256' (expect SUCCESS) 192s CAMELLIA_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 192s algparse -v2 'esp=aes_ccm' (expect SUCCESS) 192s AES_CCM_16-NONE 192s algparse -v2 'esp=aes_ccm_a-128-null' (expect SUCCESS) 192s AES_CCM_8_128-NONE 192s algparse -v2 'esp=aes_ccm_a-192-null' (expect SUCCESS) 192s AES_CCM_8_192-NONE 192s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 192s | token: '' '' '' 192s | parsing 'aes-sha384' for ESP 192s | proposal: 'aes-sha384' 192s | token: '' '' "aes" '-' 192s | token: '' "aes" '-' "sha384" '' 192s | token: '-' "sha384" '' '' 192s | appending ESP encryption algorithm AES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 192s | token: '' '' '' 192s | parsing 'aes-sha512' for ESP 192s | proposal: 'aes-sha512' 192s | token: '' '' "aes" '-' 192s | token: '' "aes" '-' "sha512" '' 192s | token: '-' "sha512" '' '' 192s | appending ESP encryption algorithm AES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 192s | token: '' '' '' 192s | parsing 'aes128-aes_xcbc' for ESP 192s | proposal: 'aes128-aes_xcbc' 192s | token: '' '' "aes128" '-' 192s | token: '' "aes128" '-' "aes_xcbc" '' 192s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 192s | token: '-' "aes_xcbc" '' '' 192s | appending ESP encryption algorithm AES_CBC[_128] 192s | parsing integ: 192s | appending ESP integrity algorithm AES_XCBC_96[_0] 192s | token: '' '' '' 192s | parsing 'aes192-sha1' for ESP 192s | proposal: 'aes192-sha1' 192s | token: '' '' "aes192" '-' 192s | token: '' "aes192" '-' "sha1" '' 192s | ike_alg_byname() failed: ESP encryption algorithm 'aes192' is not recognized 192s | token: '-' "sha1" '' '' 192s | appending ESP encryption algorithm AES_CBC[_192] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: '' '' '' 192s | parsing 'aes256-sha1' for ESP 192s | proposal: 'aes256-sha1' 192s | token: '' '' "aes256" '-' 192s | token: '' "aes256" '-' "sha1" '' 192s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 192s | token: '-' "sha1" '' '' 192s | appending ESP encryption algorithm AES_CBC[_256] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: '' '' '' 192s | parsing 'aes256-sha' for ESP 192s | proposal: 'aes256-sha' 192s | token: '' '' "aes256" '-' 192s | token: '' "aes256" '-' "sha" '' 192s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 192s | token: '-' "sha" '' '' 192s | appending ESP encryption algorithm AES_CBC[_256] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: '' '' '' 192s | parsing 'aes256-sha2' for ESP 192s | proposal: 'aes256-sha2' 192s | token: '' '' "aes256" '-' 192s | token: '' "aes256" '-' "sha2" '' 192s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 192s | token: '-' "sha2" '' '' 192s | appending ESP encryption algorithm AES_CBC[_256] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 192s | token: '' '' '' 192s | parsing 'aes256-sha2_256' for ESP 192s | proposal: 'aes256-sha2_256' 192s | token: '' '' "aes256" '-' 192s | token: '' "aes256" '-' "sha2_256" '' 192s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 192s | token: '-' "sha2_256" '' '' 192s | appending ESP encryption algorithm AES_CBC[_256] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 192s | token: '' '' '' 192s | parsing 'aes256-sha2_384' for ESP 192s | proposal: 'aes256-sha2_384' 192s | token: '' '' "aes256" '-' 192s | token: '' "aes256" '-' "sha2_384" '' 192s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 192s | token: '-' "sha2_384" '' '' 192s | appending ESP encryption algorithm AES_CBC[_256] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 192s | token: '' '' '' 192s | parsing 'aes256-sha2_512' for ESP 192s | proposal: 'aes256-sha2_512' 192s | token: '' '' "aes256" '-' 192s | token: '' "aes256" '-' "sha2_512" '' 192s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 192s | token: '-' "sha2_512" '' '' 192s | appending ESP encryption algorithm AES_CBC[_256] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 192s | token: '' '' '' 192s | parsing 'camellia' for ESP 192s | proposal: 'camellia' 192s | token: '' '' "camellia" '' 192s | token: '' "camellia" '' '' 192s | token: '' '' '' 192s | appending ESP encryption algorithm CAMELLIA_CBC[_0] 192s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 192s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 192s | parsing 'camellia128' for ESP 192s | proposal: 'camellia128' 192s | token: '' '' "camellia128" '' 192s | token: '' "camellia128" '' '' 192s | ike_alg_byname() failed: ESP encryption algorithm 'camellia128' is not recognized 192s | token: '' '' '' 192s | appending ESP encryption algorithm CAMELLIA_CBC[_128] 192s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 192s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 192s | parsing 'camellia192' for ESP 192s | proposal: 'camellia192' 192s | token: '' '' "camellia192" '' 192s | token: '' "camellia192" '' '' 192s | ike_alg_byname() failed: ESP encryption algorithm 'camellia192' is not recognized 192s | token: '' '' '' 192s | appending ESP encryption algorithm CAMELLIA_CBC[_192] 192s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 192s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 192s | parsing 'camellia256' for ESP 192s | proposal: 'camellia256' 192s | token: '' '' "camellia256" '' 192s | token: '' "camellia256" '' '' 192s | ike_alg_byname() failed: ESP encryption algorithm 'camellia256' is not recognized 192s | token: '' '' '' 192s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 192s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 192s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 192s | parsing 'aes_ccm' for ESP 192s | proposal: 'aes_ccm' 192s | token: '' '' "aes_ccm" '' 192s | token: '' "aes_ccm" '' '' 192s | token: '' '' '' 192s | appending ESP encryption algorithm AES_CCM_16[_0] 192s | appending ESP integrity algorithm NONE[_0] 192s | parsing 'aes_ccm_a-128-null' for ESP 192s | proposal: 'aes_ccm_a-128-null' 192s | token: '' '' "aes_ccm_a" '-' 192s | token: '' "aes_ccm_a" '-' "128" '-' 192s | token: '-' "128" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_CCM_8[_128] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_ccm_a-192-null' for ESP 192s | proposal: 'aes_ccm_a-192-null' 192s | token: '' '' "aes_ccm_a" '-' 192s | token: '' "aes_ccm_a" '-' "192" '-' 192s | token: '-' "192" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_CCM_8[_192] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s algparse -v2 'esp=aes_ccm_a-256-null' (expect SUCCESS) 192s AES_CCM_8_256-NONE 192s algparse -v2 'esp=aes_ccm_b-128-null' (expect SUCCESS) 192s | parsing 'aes_ccm_a-256-null' for ESP 192s | proposal: 'aes_ccm_a-256-null' 192s | token: '' '' "aes_ccm_a" '-' 192s | token: '' "aes_ccm_a" '-' "256" '-' 192s | token: '-' "256" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_CCM_8[_256] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_ccm_b-128-null' for ESP 192s | proposal: 'aes_ccm_b-128-null' 192s | token: '' '' "aes_ccm_b" '-' 192s | token: '' "aes_ccm_b" '-' "128" '-' 192s | token: '-' "128" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_CCM_12[_128] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_ccm_b-192-null' for ESP 192s | proposal: 'aes_ccm_b-192-null' 192s | token: '' '' "aes_ccm_b" '-' 192s | token: '' "aes_ccm_b" '-' "192" '-' 192s | token: '-' "192" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_CCM_12[_192] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_ccm_b-256-null' for ESP 192s | proposal: 'aes_ccm_b-256-null' 192s | token: '' '' "aes_ccm_b" '-' 192s | token: '' "aes_ccm_b" '-' "256" '-' 192s | token: '-' "256" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_CCM_12[_256] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_ccm_c-128-null' for ESP 192s | proposal: 'aes_ccm_c-128-null' 192s | token: '' '' "aes_ccm_c" '-' 192s | token: '' "aes_ccm_c" '-' "128" '-' 192s | token: '-' "128" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_CCM_16[_128] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_ccm_c-192-null' for ESP 192s | proposal: 'aes_ccm_c-192-null' 192s | token: '' '' "aes_ccm_c" '-' 192s | token: '' "aes_ccm_c" '-' "192" '-' 192s | token: '-' "192" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_CCM_16[_192] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_ccm_c-256-null' for ESP 192s | proposal: 'aes_ccm_c-256-null' 192s | token: '' '' "aes_ccm_c" '-' 192s | token: '' "aes_ccm_c" '-' "256" '-' 192s | token: '-' "256" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_CCM_16[_256] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_gcm' for ESP 192s | proposal: 'aes_gcm' 192s | token: '' '' "aes_gcm" '' 192s | token: '' "aes_gcm" '' '' 192s AES_CCM_12_128-NONE 192s algparse -v2 'esp=aes_ccm_b-192-null' (expect SUCCESS) 192s AES_CCM_12_192-NONE 192s algparse -v2 'esp=aes_ccm_b-256-null' (expect SUCCESS) 192s AES_CCM_12_256-NONE 192s algparse -v2 'esp=aes_ccm_c-128-null' (expect SUCCESS) 192s AES_CCM_16_128-NONE 192s algparse -v2 'esp=aes_ccm_c-192-null' (expect SUCCESS) 192s AES_CCM_16_192-NONE 192s algparse -v2 'esp=aes_ccm_c-256-null' (expect SUCCESS) 192s AES_CCM_16_256-NONE 192s algparse -v2 'esp=aes_gcm' (expect SUCCESS) 192s AES_GCM_16-NONE 192s algparse -v2 'esp=aes_gcm_a-128-null' (expect SUCCESS) 192s AES_GCM_8_128-NONE 192s algparse -v2 'esp=aes_gcm_a-192-null' (expect SUCCESS) 192s AES_GCM_8_192-NONE 192s algparse -v2 'esp=aes_gcm_a-256-null' (expect SUCCESS) 192s AES_GCM_8_256-NONE 192s algparse -v2 'esp=aes_gcm_b-128-null' (expect SUCCESS) 192s AES_GCM_12_128-NONE 192s algparse -v2 'esp=aes_gcm_b-192-null' (expect SUCCESS) 192s AES_GCM_12_192-NONE 192s algparse -v2 'esp=aes_gcm_b-256-null' (expect SUCCESS) 192s AES_GCM_12_256-NONE 192s algparse -v2 'esp=aes_gcm_c-128-null' (expect SUCCESS) 192s AES_GCM_16_128-NONE 192s algparse -v2 'esp=aes_gcm_c-192-null' (expect SUCCESS) 192s AES_GCM_16_192-NONE 192s algparse -v2 'esp=aes_gcm_c-256-null' (expect SUCCESS) 192s | token: '' '' '' 192s | appending ESP encryption algorithm AES_GCM_16[_0] 192s | appending ESP integrity algorithm NONE[_0] 192s | parsing 'aes_gcm_a-128-null' for ESP 192s | proposal: 'aes_gcm_a-128-null' 192s | token: '' '' "aes_gcm_a" '-' 192s | token: '' "aes_gcm_a" '-' "128" '-' 192s | token: '-' "128" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_GCM_8[_128] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_gcm_a-192-null' for ESP 192s | proposal: 'aes_gcm_a-192-null' 192s | token: '' '' "aes_gcm_a" '-' 192s | token: '' "aes_gcm_a" '-' "192" '-' 192s | token: '-' "192" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_GCM_8[_192] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_gcm_a-256-null' for ESP 192s | proposal: 'aes_gcm_a-256-null' 192s | token: '' '' "aes_gcm_a" '-' 192s | token: '' "aes_gcm_a" '-' "256" '-' 192s | token: '-' "256" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_GCM_8[_256] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_gcm_b-128-null' for ESP 192s | proposal: 'aes_gcm_b-128-null' 192s | token: '' '' "aes_gcm_b" '-' 192s | token: '' "aes_gcm_b" '-' "128" '-' 192s | token: '-' "128" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_GCM_12[_128] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_gcm_b-192-null' for ESP 192s | proposal: 'aes_gcm_b-192-null' 192s | token: '' '' "aes_gcm_b" '-' 192s | token: '' "aes_gcm_b" '-' "192" '-' 192s | token: '-' "192" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_GCM_12[_192] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_gcm_b-256-null' for ESP 192s | proposal: 'aes_gcm_b-256-null' 192s | token: '' '' "aes_gcm_b" '-' 192s | token: '' "aes_gcm_b" '-' "256" '-' 192s | token: '-' "256" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_GCM_12[_256] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_gcm_c-128-null' for ESP 192s | proposal: 'aes_gcm_c-128-null' 192s | token: '' '' "aes_gcm_c" '-' 192s | token: '' "aes_gcm_c" '-' "128" '-' 192s | token: '-' "128" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_GCM_16[_128] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_gcm_c-192-null' for ESP 192s | proposal: 'aes_gcm_c-192-null' 192s | token: '' '' "aes_gcm_c" '-' 192s | token: '' "aes_gcm_c" '-' "192" '-' 192s | token: '-' "192" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_GCM_16[_192] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_gcm_c-256-null' for ESP 192s | proposal: 'aes_gcm_c-256-null' 192s | token: '' '' "aes_gcm_c" '-' 192s | token: '' "aes_gcm_c" '-' "256" '-' 192s | token: '-' "256" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_GCM_16[_256] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_ccm_a-null' for ESP 192s | proposal: 'aes_ccm_a-null' 192s | token: '' '' "aes_ccm_a" '-' 192s | token: '' "aes_ccm_a" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_CCM_8[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_ccm_b-null' for ESP 192s | proposal: 'aes_ccm_b-null' 192s | token: '' '' "aes_ccm_b" '-' 192s | token: '' "aes_ccm_b" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_CCM_12[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_ccm_c-null' for ESP 192s | proposal: 'aes_ccm_c-null' 192s | token: '' '' "aes_ccm_c" '-' 192s | token: '' "aes_ccm_c" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_CCM_16[_0] 192s | parsing integ: 192s AES_GCM_16_256-NONE 192s algparse -v2 'esp=aes_ccm_a-null' (expect SUCCESS) 192s AES_CCM_8-NONE 192s algparse -v2 'esp=aes_ccm_b-null' (expect SUCCESS) 192s AES_CCM_12-NONE 192s algparse -v2 'esp=aes_ccm_c-null' (expect SUCCESS) 192s AES_CCM_16-NONE 192s algparse -v2 'esp=aes_gcm_a-null' (expect SUCCESS) 192s AES_GCM_8-NONE 192s algparse -v2 'esp=aes_gcm_b-null' (expect SUCCESS) 192s AES_GCM_12-NONE 192s algparse -v2 'esp=aes_gcm_c-null' (expect SUCCESS) 192s AES_GCM_16-NONE 192s algparse -v2 'esp=aes_ccm-null' (expect SUCCESS) 192s AES_CCM_16-NONE 192s algparse -v2 'esp=aes_gcm-null' (expect SUCCESS) 192s AES_GCM_16-NONE 192s algparse -v2 'esp=aes_ccm-256-null' (expect SUCCESS) 192s AES_CCM_16_256-NONE 192s algparse -v2 'esp=aes_gcm-192-null' (expect SUCCESS) 192s AES_GCM_16_192-NONE 192s algparse -v2 'esp=aes_ccm_256-null' (expect SUCCESS) 192s AES_CCM_16_256-NONE 192s algparse -v2 'esp=aes_gcm_192-null' (expect SUCCESS) 192s AES_GCM_16_192-NONE 192s algparse -v2 'esp=aes_ccm_8-null' (expect SUCCESS) 192s AES_CCM_8-NONE 192s algparse -v2 'esp=aes_ccm_12-null' (expect SUCCESS) 192s AES_CCM_12-NONE 192s algparse -v2 'esp=aes_ccm_16-null' (expect SUCCESS) 192s AES_CCM_16-NONE 192s algparse -v2 'esp=aes_gcm_8-null' (expect SUCCESS) 192s AES_GCM_8-NONE 192s algparse -v2 'esp=aes_gcm_12-null' (expect SUCCESS) 192s AES_GCM_12-NONE 192s algparse -v2 'esp=aes_gcm_16-null' (expect SUCCESS) 192s AES_GCM_16-NONE 192s algparse -v2 'esp=aes_ccm_8-128-null' (expect SUCCESS) 192s AES_CCM_8_128-NONE 192s algparse -v2 'esp=aes_ccm_12-192-null' (expect SUCCESS) 192s AES_CCM_12_192-NONE 192s algparse -v2 'esp=aes_ccm_16-256-null' (expect SUCCESS) 192s AES_CCM_16_256-NONE 192s algparse -v2 'esp=aes_gcm_8-128-null' (expect SUCCESS) 192s AES_GCM_8_128-NONE 192s algparse -v2 'esp=aes_gcm_12-192-null' (expect SUCCESS) 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_gcm_a-null' for ESP 192s | proposal: 'aes_gcm_a-null' 192s | token: '' '' "aes_gcm_a" '-' 192s | token: '' "aes_gcm_a" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_GCM_8[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_gcm_b-null' for ESP 192s | proposal: 'aes_gcm_b-null' 192s | token: '' '' "aes_gcm_b" '-' 192s | token: '' "aes_gcm_b" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_GCM_12[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_gcm_c-null' for ESP 192s | proposal: 'aes_gcm_c-null' 192s | token: '' '' "aes_gcm_c" '-' 192s | token: '' "aes_gcm_c" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_GCM_16[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_ccm-null' for ESP 192s | proposal: 'aes_ccm-null' 192s | token: '' '' "aes_ccm" '-' 192s | token: '' "aes_ccm" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_CCM_16[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_gcm-null' for ESP 192s | proposal: 'aes_gcm-null' 192s | token: '' '' "aes_gcm" '-' 192s | token: '' "aes_gcm" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_GCM_16[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_ccm-256-null' for ESP 192s | proposal: 'aes_ccm-256-null' 192s | token: '' '' "aes_ccm" '-' 192s | token: '' "aes_ccm" '-' "256" '-' 192s | token: '-' "256" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_CCM_16[_256] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_gcm-192-null' for ESP 192s | proposal: 'aes_gcm-192-null' 192s | token: '' '' "aes_gcm" '-' 192s | token: '' "aes_gcm" '-' "192" '-' 192s | token: '-' "192" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_GCM_16[_192] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_ccm_256-null' for ESP 192s | proposal: 'aes_ccm_256-null' 192s | token: '' '' "aes_ccm_256" '-' 192s | token: '' "aes_ccm_256" '-' "null" '' 192s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_256' is not recognized 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_CCM_16[_256] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_gcm_192-null' for ESP 192s | proposal: 'aes_gcm_192-null' 192s | token: '' '' "aes_gcm_192" '-' 192s | token: '' "aes_gcm_192" '-' "null" '' 192s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_192' is not recognized 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_GCM_16[_192] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_ccm_8-null' for ESP 192s | proposal: 'aes_ccm_8-null' 192s | token: '' '' "aes_ccm_8" '-' 192s | token: '' "aes_ccm_8" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_CCM_8[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_ccm_12-null' for ESP 192s | proposal: 'aes_ccm_12-null' 192s | token: '' '' "aes_ccm_12" '-' 192s | token: '' "aes_ccm_12" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_CCM_12[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_ccm_16-null' for ESP 192s | proposal: 'aes_ccm_16-null' 192s | token: '' '' "aes_ccm_16" '-' 192s | token: '' "aes_ccm_16" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_CCM_16[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_gcm_8-null' for ESP 192s | proposal: 'aes_gcm_8-null' 192s | token: '' '' "aes_gcm_8" '-' 192s | token: '' "aes_gcm_8" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_GCM_8[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_gcm_12-null' for ESP 192s | proposal: 'aes_gcm_12-null' 192s | token: '' '' "aes_gcm_12" '-' 192s | token: '' "aes_gcm_12" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_GCM_12[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_gcm_16-null' for ESP 192s | proposal: 'aes_gcm_16-null' 192s | token: '' '' "aes_gcm_16" '-' 192s | token: '' "aes_gcm_16" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_GCM_16[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_ccm_8-128-null' for ESP 192s | proposal: 'aes_ccm_8-128-null' 192s | token: '' '' "aes_ccm_8" '-' 192s | token: '' "aes_ccm_8" '-' "128" '-' 192s | token: '-' "128" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_CCM_8[_128] 192s | parsing integ: 192s AES_GCM_12_192-NONE 192s algparse -v2 'esp=aes_gcm_16-256-null' (expect SUCCESS) 192s AES_GCM_16_256-NONE 192s algparse -v2 'esp=aes_ccm_8_128-null' (expect SUCCESS) 192s AES_CCM_8_128-NONE 192s algparse -v2 'esp=aes_ccm_12_192-null' (expect SUCCESS) 192s AES_CCM_12_192-NONE 192s algparse -v2 'esp=aes_ccm_16_256-null' (expect SUCCESS) 192s AES_CCM_16_256-NONE 192s algparse -v2 'esp=aes_gcm_8_128-null' (expect SUCCESS) 192s AES_GCM_8_128-NONE 192s algparse -v2 'esp=aes_gcm_12_192-null' (expect SUCCESS) 192s AES_GCM_12_192-NONE 192s algparse -v2 'esp=aes_gcm_16_256-null' (expect SUCCESS) 192s AES_GCM_16_256-NONE 192s algparse -v2 'esp=aes_ctr' (expect SUCCESS) 192s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 192s algparse -v2 'esp=aesctr' (expect SUCCESS) 192s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 192s algparse -v2 'esp=aes_ctr128' (expect SUCCESS) 192s AES_CTR_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 192s algparse -v2 'esp=aes_ctr192' (expect SUCCESS) 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_ccm_12-192-null' for ESP 192s | proposal: 'aes_ccm_12-192-null' 192s | token: '' '' "aes_ccm_12" '-' 192s | token: '' "aes_ccm_12" '-' "192" '-' 192s | token: '-' "192" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_CCM_12[_192] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_ccm_16-256-null' for ESP 192s | proposal: 'aes_ccm_16-256-null' 192s | token: '' '' "aes_ccm_16" '-' 192s | token: '' "aes_ccm_16" '-' "256" '-' 192s | token: '-' "256" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_CCM_16[_256] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_gcm_8-128-null' for ESP 192s | proposal: 'aes_gcm_8-128-null' 192s | token: '' '' "aes_gcm_8" '-' 192s | token: '' "aes_gcm_8" '-' "128" '-' 192s | token: '-' "128" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_GCM_8[_128] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_gcm_12-192-null' for ESP 192s | proposal: 'aes_gcm_12-192-null' 192s | token: '' '' "aes_gcm_12" '-' 192s | token: '' "aes_gcm_12" '-' "192" '-' 192s | token: '-' "192" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_GCM_12[_192] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_gcm_16-256-null' for ESP 192s | proposal: 'aes_gcm_16-256-null' 192s | token: '' '' "aes_gcm_16" '-' 192s | token: '' "aes_gcm_16" '-' "256" '-' 192s | token: '-' "256" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_GCM_16[_256] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_ccm_8_128-null' for ESP 192s | proposal: 'aes_ccm_8_128-null' 192s | token: '' '' "aes_ccm_8_128" '-' 192s | token: '' "aes_ccm_8_128" '-' "null" '' 192s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_8_128' is not recognized 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_CCM_8[_128] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_ccm_12_192-null' for ESP 192s | proposal: 'aes_ccm_12_192-null' 192s | token: '' '' "aes_ccm_12_192" '-' 192s | token: '' "aes_ccm_12_192" '-' "null" '' 192s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_12_192' is not recognized 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_CCM_12[_192] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_ccm_16_256-null' for ESP 192s | proposal: 'aes_ccm_16_256-null' 192s | token: '' '' "aes_ccm_16_256" '-' 192s | token: '' "aes_ccm_16_256" '-' "null" '' 192s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_16_256' is not recognized 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_CCM_16[_256] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_gcm_8_128-null' for ESP 192s | proposal: 'aes_gcm_8_128-null' 192s | token: '' '' "aes_gcm_8_128" '-' 192s | token: '' "aes_gcm_8_128" '-' "null" '' 192s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_8_128' is not recognized 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_GCM_8[_128] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_gcm_12_192-null' for ESP 192s | proposal: 'aes_gcm_12_192-null' 192s | token: '' '' "aes_gcm_12_192" '-' 192s | token: '' "aes_gcm_12_192" '-' "null" '' 192s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_12_192' is not recognized 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_GCM_12[_192] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_gcm_16_256-null' for ESP 192s | proposal: 'aes_gcm_16_256-null' 192s | token: '' '' "aes_gcm_16_256" '-' 192s | token: '' "aes_gcm_16_256" '-' "null" '' 192s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_16_256' is not recognized 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_GCM_16[_256] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_ctr' for ESP 192s | proposal: 'aes_ctr' 192s | token: '' '' "aes_ctr" '' 192s | token: '' "aes_ctr" '' '' 192s | token: '' '' '' 192s | appending ESP encryption algorithm AES_CTR[_0] 192s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 192s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 192s | parsing 'aesctr' for ESP 192s | proposal: 'aesctr' 192s | token: '' '' "aesctr" '' 192s | token: '' "aesctr" '' '' 192s | token: '' '' '' 192s | appending ESP encryption algorithm AES_CTR[_0] 192s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 192s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 192s | parsing 'aes_ctr128' for ESP 192s | proposal: 'aes_ctr128' 192s | token: '' '' "aes_ctr128" '' 192s | token: '' "aes_ctr128" '' '' 192s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr128' is not recognized 192s | token: '' '' '' 192s | appending ESP encryption algorithm AES_CTR[_128] 192s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 192s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 192s AES_CTR_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 192s algparse -v2 'esp=aes_ctr256' (expect SUCCESS) 192s AES_CTR_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 192s algparse -v2 'esp=camellia_cbc_256-hmac_sha2_512_256;modp8192' (expect SUCCESS) 192s CAMELLIA_CBC_256-HMAC_SHA2_512_256 192s algparse -v2 'esp=null_auth_aes_gmac_256-null;modp8192' (expect SUCCESS) 192s NULL_AUTH_AES_GMAC_256-NONE 192s algparse -v2 'esp=3des-sha1;modp8192' (expect SUCCESS) 192s 3DES_CBC-HMAC_SHA1_96 192s algparse -v2 'esp=3des-sha1-modp8192' (expect SUCCESS) 192s 3DES_CBC-HMAC_SHA1_96 192s algparse -v2 'esp=aes-sha1,3des-sha1;modp8192' (expect SUCCESS) 192s AES_CBC-HMAC_SHA1_96 192s 3DES_CBC-HMAC_SHA1_96 192s algparse -v2 'esp=aes-sha1-modp8192,3des-sha1-modp8192' (expect SUCCESS) 192s AES_CBC-HMAC_SHA1_96 192s 3DES_CBC-HMAC_SHA1_96 192s algparse -v2 'esp=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' (expect SUCCESS) 192s AES_CBC-HMAC_SHA1_96 192s algparse -v2 'esp=aes;none' (expect SUCCESS) 192s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 192s algparse -v2 'esp=aes;none,aes' (expect SUCCESS) 192s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 192s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 192s algparse -v2 'esp=aes;none,aes;modp2048' (expect SUCCESS) 192s | parsing 'aes_ctr192' for ESP 192s | proposal: 'aes_ctr192' 192s | token: '' '' "aes_ctr192" '' 192s | token: '' "aes_ctr192" '' '' 192s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr192' is not recognized 192s | token: '' '' '' 192s | appending ESP encryption algorithm AES_CTR[_192] 192s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 192s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 192s | parsing 'aes_ctr256' for ESP 192s | proposal: 'aes_ctr256' 192s | token: '' '' "aes_ctr256" '' 192s | token: '' "aes_ctr256" '' '' 192s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr256' is not recognized 192s | token: '' '' '' 192s | appending ESP encryption algorithm AES_CTR[_256] 192s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 192s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 192s | parsing 'camellia_cbc_256-hmac_sha2_512_256;modp8192' for ESP 192s | proposal: 'camellia_cbc_256-hmac_sha2_512_256;modp8192' 192s | token: '' '' "camellia_cbc_256" '-' 192s | token: '' "camellia_cbc_256" '-' "hmac_sha2_512_256" ';' 192s | ike_alg_byname() failed: ESP encryption algorithm 'camellia_cbc_256' is not recognized 192s | token: '-' "hmac_sha2_512_256" ';' "modp8192" '' 192s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 192s | token: ';' "modp8192" '' '' 192s | parsing dh: 192s | appending ESP DH algorithm MODP8192[_0] 192s | token: '' '' '' 192s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 192s | parsing 'null_auth_aes_gmac_256-null;modp8192' for ESP 192s | proposal: 'null_auth_aes_gmac_256-null;modp8192' 192s | token: '' '' "null_auth_aes_gmac_256" '-' 192s | token: '' "null_auth_aes_gmac_256" '-' "null" ';' 192s | ike_alg_byname() failed: ESP encryption algorithm 'null_auth_aes_gmac_256' is not recognized 192s | token: '-' "null" ';' "modp8192" '' 192s | appending ESP encryption algorithm NULL_AUTH_AES_GMAC[_256] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: ';' "modp8192" '' '' 192s | parsing dh: 192s | appending ESP DH algorithm MODP8192[_0] 192s | token: '' '' '' 192s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 192s | parsing '3des-sha1;modp8192' for ESP 192s | proposal: '3des-sha1;modp8192' 192s | token: '' '' "3des" '-' 192s | token: '' "3des" '-' "sha1" ';' 192s | token: '-' "sha1" ';' "modp8192" '' 192s | appending ESP encryption algorithm 3DES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: ';' "modp8192" '' '' 192s | parsing dh: 192s | appending ESP DH algorithm MODP8192[_0] 192s | token: '' '' '' 192s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 192s | parsing '3des-sha1-modp8192' for ESP 192s | proposal: '3des-sha1-modp8192' 192s | token: '' '' "3des" '-' 192s | token: '' "3des" '-' "sha1" '-' 192s | token: '-' "sha1" '-' "modp8192" '' 192s | appending ESP encryption algorithm 3DES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: '-' "modp8192" '' '' 192s | parsing dh: 192s | appending ESP DH algorithm MODP8192[_0] 192s | token: '' '' '' 192s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 192s | parsing 'aes-sha1,3des-sha1;modp8192' for ESP 192s | proposal: 'aes-sha1' 192s | token: '' '' "aes" '-' 192s | token: '' "aes" '-' "sha1" '' 192s | token: '-' "sha1" '' '' 192s | appending ESP encryption algorithm AES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: '' '' '' 192s | proposal: '3des-sha1;modp8192' 192s | token: '' '' "3des" '-' 192s | token: '' "3des" '-' "sha1" ';' 192s | token: '-' "sha1" ';' "modp8192" '' 192s | appending ESP encryption algorithm 3DES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: ';' "modp8192" '' '' 192s | parsing dh: 192s | appending ESP DH algorithm MODP8192[_0] 192s | token: '' '' '' 192s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 192s | parsing 'aes-sha1-modp8192,3des-sha1-modp8192' for ESP 192s | proposal: 'aes-sha1-modp8192' 192s | token: '' '' "aes" '-' 192s | token: '' "aes" '-' "sha1" '-' 192s | token: '-' "sha1" '-' "modp8192" '' 192s | appending ESP encryption algorithm AES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: '-' "modp8192" '' '' 192s | parsing dh: 192s | appending ESP DH algorithm MODP8192[_0] 192s | token: '' '' '' 192s | proposal: '3des-sha1-modp8192' 192s | token: '' '' "3des" '-' 192s | token: '' "3des" '-' "sha1" '-' 192s | token: '-' "sha1" '-' "modp8192" '' 192s | appending ESP encryption algorithm 3DES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: '-' "modp8192" '' '' 192s | parsing dh: 192s | appending ESP DH algorithm MODP8192[_0] 192s | token: '' '' '' 192s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 192s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 192s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for ESP 192s | proposal: 'aes-sha1-modp8192' 192s | token: '' '' "aes" '-' 192s | token: '' "aes" '-' "sha1" '-' 192s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 192s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 192s algparse -v2 'esp=aes-sha1-none' (expect SUCCESS) 192s AES_CBC-HMAC_SHA1_96 192s algparse -v2 'esp=aes-sha1;none' (expect SUCCESS) 192s AES_CBC-HMAC_SHA1_96 192s algparse -v2 'esp=3des168-sha1' (expect ERROR) 192s ERROR: ESP encryption algorithm 3DES_CBC does not allow a key lengths 192s algparse -v2 'esp=3des-null' (expect ERROR) 192s ERROR: non-AEAD ESP encryption algorithm 3DES_CBC cannot have 'NONE' as the integrity algorithm 192s algparse -v2 'esp=aes128-null' (expect ERROR) 192s | token: '-' "sha1" '-' "modp8192" '' 192s | appending ESP encryption algorithm AES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: '-' "modp8192" '' '' 192s | parsing dh: 192s | appending ESP DH algorithm MODP8192[_0] 192s | token: '' '' '' 192s | proposal: 'aes-sha1-modp8192' 192s | token: '' '' "aes" '-' 192s | token: '' "aes" '-' "sha1" '-' 192s | token: '-' "sha1" '-' "modp8192" '' 192s | appending ESP encryption algorithm AES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: '-' "modp8192" '' '' 192s | parsing dh: 192s | appending ESP DH algorithm MODP8192[_0] 192s | token: '' '' '' 192s | proposal: 'aes-sha1-modp8192' 192s | token: '' '' "aes" '-' 192s | token: '' "aes" '-' "sha1" '-' 192s | token: '-' "sha1" '-' "modp8192" '' 192s | appending ESP encryption algorithm AES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: '-' "modp8192" '' '' 192s | parsing dh: 192s | appending ESP DH algorithm MODP8192[_0] 192s | token: '' '' '' 192s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 192s | parsing 'aes;none' for ESP 192s | proposal: 'aes;none' 192s | token: '' '' "aes" ';' 192s | token: '' "aes" ';' "none" '' 192s | token: ';' "none" '' '' 192s | appending ESP encryption algorithm AES_CBC[_0] 192s | parsing dh: 192s | appending ESP DH algorithm NONE[_0] 192s | token: '' '' '' 192s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 192s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 192s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 192s | parsing 'aes;none,aes' for ESP 192s | proposal: 'aes;none' 192s | token: '' '' "aes" ';' 192s | token: '' "aes" ';' "none" '' 192s | token: ';' "none" '' '' 192s | appending ESP encryption algorithm AES_CBC[_0] 192s | parsing dh: 192s | appending ESP DH algorithm NONE[_0] 192s | token: '' '' '' 192s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 192s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 192s | proposal: 'aes' 192s | token: '' '' "aes" '' 192s | token: '' "aes" '' '' 192s | token: '' '' '' 192s | appending ESP encryption algorithm AES_CBC[_0] 192s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 192s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 192s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 192s | parsing 'aes;none,aes;modp2048' for ESP 192s | proposal: 'aes;none' 192s | token: '' '' "aes" ';' 192s | token: '' "aes" ';' "none" '' 192s | token: ';' "none" '' '' 192s | appending ESP encryption algorithm AES_CBC[_0] 192s | parsing dh: 192s | appending ESP DH algorithm NONE[_0] 192s | token: '' '' '' 192s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 192s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 192s | proposal: 'aes;modp2048' 192s | token: '' '' "aes" ';' 192s | token: '' "aes" ';' "modp2048" '' 192s | token: ';' "modp2048" '' '' 192s | appending ESP encryption algorithm AES_CBC[_0] 192s | parsing dh: 192s | appending ESP DH algorithm MODP2048[_0] 192s | token: '' '' '' 192s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 192s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 192s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 192s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 192s | parsing 'aes-sha1-none' for ESP 192s | proposal: 'aes-sha1-none' 192s | token: '' '' "aes" '-' 192s | token: '' "aes" '-' "sha1" '-' 192s | token: '-' "sha1" '-' "none" '' 192s | appending ESP encryption algorithm AES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: '-' "none" '' '' 192s | parsing dh: 192s | appending ESP DH algorithm NONE[_0] 192s | token: '' '' '' 192s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 192s | parsing 'aes-sha1;none' for ESP 192s | proposal: 'aes-sha1;none' 192s | token: '' '' "aes" '-' 192s | token: '' "aes" '-' "sha1" ';' 192s | token: '-' "sha1" ';' "none" '' 192s | appending ESP encryption algorithm AES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: ';' "none" '' '' 192s | parsing dh: 192s | appending ESP DH algorithm NONE[_0] 192s | token: '' '' '' 192s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 192s ERROR: non-AEAD ESP encryption algorithm AES_CBC cannot have 'NONE' as the integrity algorithm 192s algparse -v2 'esp=aes224-sha1' (expect ERROR) 192s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 192s algparse -v2 'esp=aes-224-sha1' (expect ERROR) 192s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 192s algparse -v2 'esp=aes0-sha1' (expect ERROR) 192s ERROR: ESP encryption key length is zero 192s algparse -v2 'esp=aes-0-sha1' (expect ERROR) 192s ERROR: ESP encryption key length is zero 192s algparse -v2 'esp=aes512-sha1' (expect ERROR) 192s ERROR: ESP encryption algorithm AES_CBC with key length 512 invalid; valid key lengths: 128, 192, 256 192s algparse -v2 'esp=aes-sha1555' (expect ERROR) 192s ERROR: ESP integrity algorithm 'sha1555' is not recognized 192s algparse -v2 'esp=camellia666-sha1' (expect ERROR) 192s ERROR: ESP encryption algorithm CAMELLIA_CBC with key length 666 invalid; valid key lengths: 128, 192, 256 192s algparse -v2 'esp=blowfish' (expect ERROR) 192s ERROR: ESP encryption algorithm 'blowfish' is not supported 192s algparse -v2 'esp=des-sha1' (expect ERROR) 192s ERROR: ESP encryption algorithm 'des' is not supported 192s algparse -v2 'esp=aes_ctr666' (expect ERROR) 192s ERROR: ESP encryption algorithm AES_CTR with key length 666 invalid; valid key lengths: 128, 192, 256 192s algparse -v2 'esp=aes128-sha2_128' (expect ERROR) 192s ERROR: ESP integrity algorithm 'sha2_128' is not recognized 192s algparse -v2 'esp=aes256-sha2_256-4096' (expect ERROR) 192s ERROR: ESP DH algorithm '4096' is not recognized 192s algparse -v2 'esp=aes256-sha2_256-128' (expect ERROR) 192s ERROR: ESP DH algorithm '128' is not recognized 192s algparse -v2 'esp=vanitycipher' (expect ERROR) 192s ERROR: ESP encryption algorithm 'vanitycipher' is not recognized 192s algparse -v2 'esp=ase-sah' (expect ERROR) 192s ERROR: ESP encryption algorithm 'ase' is not recognized 192s algparse -v2 'esp=aes-sah1' (expect ERROR) 192s ERROR: ESP integrity algorithm 'sah1' is not recognized 192s algparse -v2 'esp=id3' (expect ERROR) 192s ERROR: ESP encryption algorithm 'id3' is not recognized 192s algparse -v2 'esp=aes-id3' (expect ERROR) 192s ERROR: ESP integrity algorithm 'id3' is not recognized 192s algparse -v2 'esp=aes_gcm-md5' (expect ERROR) 192s ERROR: AEAD ESP encryption algorithm AES_GCM_16 must have 'NONE' as the integrity algorithm 192s algparse -v2 'esp=mars' (expect ERROR) 192s ERROR: ESP encryption algorithm 'mars' is not supported 192s algparse -v2 'esp=aes_gcm-16' (expect ERROR) 192s ERROR: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 192s algparse -v2 'esp=aes_gcm-0' (expect ERROR) 192s ERROR: ESP encryption key length is zero 192s algparse -v2 'esp=aes_gcm-123456789012345' (expect ERROR) 192s ERROR: ESP encryption algorithm 'aes_gcm-123456789012345' key length WAY too big 192s algparse -v2 'esp=3des-sha1;dh22' (expect ERROR) 192s | parsing '3des168-sha1' for ESP 192s | proposal: '3des168-sha1' 192s | token: '' '' "3des168" '-' 192s | token: '' "3des168" '-' "sha1" '' 192s | ike_alg_byname() failed: ESP encryption algorithm '3des168' is not recognized 192s | parsing '3des-null' for ESP 192s | proposal: '3des-null' 192s | token: '' '' "3des" '-' 192s | token: '' "3des" '-' "null" '' 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm 3DES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes128-null' for ESP 192s | proposal: 'aes128-null' 192s | token: '' '' "aes128" '-' 192s | token: '' "aes128" '-' "null" '' 192s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 192s | token: '-' "null" '' '' 192s | appending ESP encryption algorithm AES_CBC[_128] 192s | parsing integ: 192s | appending ESP integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes224-sha1' for ESP 192s | proposal: 'aes224-sha1' 192s | token: '' '' "aes224" '-' 192s | token: '' "aes224" '-' "sha1" '' 192s | ike_alg_byname() failed: ESP encryption algorithm 'aes224' is not recognized 192s | parsing 'aes-224-sha1' for ESP 192s | proposal: 'aes-224-sha1' 192s | token: '' '' "aes" '-' 192s | token: '' "aes" '-' "224" '-' 192s | byname('aes') with ='224' failed: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 192s | parsing 'aes0-sha1' for ESP 192s | proposal: 'aes0-sha1' 192s | token: '' '' "aes0" '-' 192s | token: '' "aes0" '-' "sha1" '' 192s | ike_alg_byname() failed: ESP encryption algorithm 'aes0' is not recognized 192s | parsing 'aes-0-sha1' for ESP 192s | proposal: 'aes-0-sha1' 192s | token: '' '' "aes" '-' 192s | token: '' "aes" '-' "0" '-' 192s | parsing 'aes512-sha1' for ESP 192s | proposal: 'aes512-sha1' 192s | token: '' '' "aes512" '-' 192s | token: '' "aes512" '-' "sha1" '' 192s | ike_alg_byname() failed: ESP encryption algorithm 'aes512' is not recognized 192s | parsing 'aes-sha1555' for ESP 192s | proposal: 'aes-sha1555' 192s | token: '' '' "aes" '-' 192s | token: '' "aes" '-' "sha1555" '' 192s | token: '-' "sha1555" '' '' 192s | appending ESP encryption algorithm AES_CBC[_0] 192s | parsing integ: 192s | ike_alg_byname() failed: ESP integrity algorithm 'sha1555' is not recognized 192s | lookup for integrity algorithm 'sha1555' failed 192s | or - failed 'ESP integrity algorithm 'sha1555' is not recognized') 192s | parsing 'camellia666-sha1' for ESP 192s | proposal: 'camellia666-sha1' 192s | token: '' '' "camellia666" '-' 192s | token: '' "camellia666" '-' "sha1" '' 192s | ike_alg_byname() failed: ESP encryption algorithm 'camellia666' is not recognized 192s | parsing 'blowfish' for ESP 192s | proposal: 'blowfish' 192s | token: '' '' "blowfish" '' 192s | token: '' "blowfish" '' '' 192s | ike_alg_byname() failed: ESP encryption algorithm 'blowfish' is not supported 192s | parsing 'des-sha1' for ESP 192s | proposal: 'des-sha1' 192s | token: '' '' "des" '-' 192s | token: '' "des" '-' "sha1" '' 192s | ike_alg_byname() failed: ESP encryption algorithm 'des' is not supported 192s | parsing 'aes_ctr666' for ESP 192s | proposal: 'aes_ctr666' 192s | token: '' '' "aes_ctr666" '' 192s | token: '' "aes_ctr666" '' '' 192s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr666' is not recognized 192s | parsing 'aes128-sha2_128' for ESP 192s | proposal: 'aes128-sha2_128' 192s | token: '' '' "aes128" '-' 192s | token: '' "aes128" '-' "sha2_128" '' 192s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 192s | token: '-' "sha2_128" '' '' 192s | appending ESP encryption algorithm AES_CBC[_128] 192s | parsing integ: 192s | ike_alg_byname() failed: ESP integrity algorithm 'sha2_128' is not recognized 192s | lookup for integrity algorithm 'sha2_128' failed 192s | or - failed 'ESP integrity algorithm 'sha2_128' is not recognized') 192s | parsing 'aes256-sha2_256-4096' for ESP 192s | proposal: 'aes256-sha2_256-4096' 192s | token: '' '' "aes256" '-' 192s | token: '' "aes256" '-' "sha2_256" '-' 192s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 192s | token: '-' "sha2_256" '-' "4096" '' 192s | appending ESP encryption algorithm AES_CBC[_256] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 192s | token: '-' "4096" '' '' 192s | parsing dh: 192s | ike_alg_byname() failed: ESP DH algorithm '4096' is not recognized 192s | lookup for DH algorithm '4096' failed 192s | ... failed 'ESP DH algorithm '4096' is not recognized' 192s | parsing 'aes256-sha2_256-128' for ESP 192s | proposal: 'aes256-sha2_256-128' 192s | token: '' '' "aes256" '-' 192s | token: '' "aes256" '-' "sha2_256" '-' 192s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 192s | token: '-' "sha2_256" '-' "128" '' 192s | appending ESP encryption algorithm AES_CBC[_256] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 192s | token: '-' "128" '' '' 192s | parsing dh: 192s | ike_alg_byname() failed: ESP DH algorithm '128' is not recognized 192s | lookup for DH algorithm '128' failed 192s | ... failed 'ESP DH algorithm '128' is not recognized' 192s | parsing 'vanitycipher' for ESP 192s | proposal: 'vanitycipher' 192s | token: '' '' "vanitycipher" '' 192s | token: '' "vanitycipher" '' '' 192s | ike_alg_byname() failed: ESP encryption algorithm 'vanitycipher' is not recognized 192s | parsing 'ase-sah' for ESP 192s | proposal: 'ase-sah' 192s | token: '' '' "ase" '-' 192s | token: '' "ase" '-' "sah" '' 192s | ike_alg_byname() failed: ESP encryption algorithm 'ase' is not recognized 192s | parsing 'aes-sah1' for ESP 192s | proposal: 'aes-sah1' 192s | token: '' '' "aes" '-' 192s | token: '' "aes" '-' "sah1" '' 192s | token: '-' "sah1" '' '' 192s | appending ESP encryption algorithm AES_CBC[_0] 192s | parsing integ: 192s | ike_alg_byname() failed: ESP integrity algorithm 'sah1' is not recognized 192s | lookup for integrity algorithm 'sah1' failed 192s | or - failed 'ESP integrity algorithm 'sah1' is not recognized') 192s | parsing 'id3' for ESP 192s | proposal: 'id3' 192s | token: '' '' "id3" '' 192s | token: '' "id3" '' '' 192s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 192s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 192s | parsing 'aes-id3' for ESP 192s | proposal: 'aes-id3' 192s | token: '' '' "aes" '-' 192s | token: '' "aes" '-' "id3" '' 192s | token: '-' "id3" '' '' 192s | appending ESP encryption algorithm AES_CBC[_0] 192s | parsing integ: 192s | ike_alg_byname() failed: ESP integrity algorithm 'id3' is not recognized 192s | lookup for integrity algorithm 'id3' failed 192s | or - failed 'ESP integrity algorithm 'id3' is not recognized') 192s | parsing 'aes_gcm-md5' for ESP 192s | proposal: 'aes_gcm-md5' 192s | token: '' '' "aes_gcm" '-' 192s | token: '' "aes_gcm" '-' "md5" '' 192s | token: '-' "md5" '' '' 192s | appending ESP encryption algorithm AES_GCM_16[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_MD5_96[_0] 192s | token: '' '' '' 192s | parsing 'mars' for ESP 192s | proposal: 'mars' 192s | token: '' '' "mars" '' 192s | token: '' "mars" '' '' 192s ERROR: ESP DH algorithm 'dh22' is not supported 192s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2' (expect SUCCESS) 192s 3DES_CBC-HMAC_SHA1_96 192s 3DES_CBC-HMAC_SHA2_256_128 192s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2' (expect SUCCESS) 192s 3DES_CBC-HMAC_SHA1_96 192s 3DES_CBC-HMAC_SHA2_256_128 192s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2-modp8192' (expect SUCCESS) 192s 3DES_CBC-HMAC_SHA1_96 192s 3DES_CBC-HMAC_SHA2_256_128 192s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2;modp8192' (expect SUCCESS) 192s 3DES_CBC-HMAC_SHA1_96 192s 3DES_CBC-HMAC_SHA2_256_128 192s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2-modp8192' (expect SUCCESS) 192s 3DES_CBC-HMAC_SHA1_96 192s 3DES_CBC-HMAC_SHA2_256_128 192s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2;modp8192' (expect SUCCESS) 192s 3DES_CBC-HMAC_SHA1_96 192s 3DES_CBC-HMAC_SHA2_256_128 192s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2-modp2048' (expect SUCCESS) 192s 3DES_CBC-HMAC_SHA1_96 192s 3DES_CBC-HMAC_SHA2_256_128 192s algparse -v2 'ah' (expect SUCCESS) 192s | ike_alg_byname() failed: ESP encryption algorithm 'mars' is not supported 192s | parsing 'aes_gcm-16' for ESP 192s | proposal: 'aes_gcm-16' 192s | token: '' '' "aes_gcm" '-' 192s | token: '' "aes_gcm" '-' "16" '' 192s | byname('aes_gcm') with ='16' failed: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 192s | parsing 'aes_gcm-0' for ESP 192s | proposal: 'aes_gcm-0' 192s | token: '' '' "aes_gcm" '-' 192s | token: '' "aes_gcm" '-' "0" '' 192s | parsing 'aes_gcm-123456789012345' for ESP 192s | proposal: 'aes_gcm-123456789012345' 192s | token: '' '' "aes_gcm" '-' 192s | token: '' "aes_gcm" '-' "123456789012345" '' 192s | parsing '3des-sha1;dh22' for ESP 192s | proposal: '3des-sha1;dh22' 192s | token: '' '' "3des" '-' 192s | token: '' "3des" '-' "sha1" ';' 192s | token: '-' "sha1" ';' "dh22" '' 192s | appending ESP encryption algorithm 3DES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: ';' "dh22" '' '' 192s | parsing dh: 192s | ike_alg_byname() failed: ESP DH algorithm 'dh22' is not supported 192s | lookup for DH algorithm 'dh22' failed 192s | ... failed 'ESP DH algorithm 'dh22' is not supported' 192s | parsing '3des-sha1;modp8192,3des-sha2' for ESP 192s | proposal: '3des-sha1;modp8192' 192s | token: '' '' "3des" '-' 192s | token: '' "3des" '-' "sha1" ';' 192s | token: '-' "sha1" ';' "modp8192" '' 192s | appending ESP encryption algorithm 3DES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: ';' "modp8192" '' '' 192s | parsing dh: 192s | appending ESP DH algorithm MODP8192[_0] 192s | token: '' '' '' 192s | proposal: '3des-sha2' 192s | token: '' '' "3des" '-' 192s | token: '' "3des" '-' "sha2" '' 192s | token: '-' "sha2" '' '' 192s | appending ESP encryption algorithm 3DES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 192s | token: '' '' '' 192s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 192s | parsing '3des-sha1-modp8192,3des-sha2' for ESP 192s | proposal: '3des-sha1-modp8192' 192s | token: '' '' "3des" '-' 192s | token: '' "3des" '-' "sha1" '-' 192s | token: '-' "sha1" '-' "modp8192" '' 192s | appending ESP encryption algorithm 3DES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: '-' "modp8192" '' '' 192s | parsing dh: 192s | appending ESP DH algorithm MODP8192[_0] 192s | token: '' '' '' 192s | proposal: '3des-sha2' 192s | token: '' '' "3des" '-' 192s | token: '' "3des" '-' "sha2" '' 192s | token: '-' "sha2" '' '' 192s | appending ESP encryption algorithm 3DES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 192s | token: '' '' '' 192s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 192s | parsing '3des-sha1-modp8192,3des-sha2-modp8192' for ESP 192s | proposal: '3des-sha1-modp8192' 192s | token: '' '' "3des" '-' 192s | token: '' "3des" '-' "sha1" '-' 192s | token: '-' "sha1" '-' "modp8192" '' 192s | appending ESP encryption algorithm 3DES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: '-' "modp8192" '' '' 192s | parsing dh: 192s | appending ESP DH algorithm MODP8192[_0] 192s | token: '' '' '' 192s | proposal: '3des-sha2-modp8192' 192s | token: '' '' "3des" '-' 192s | token: '' "3des" '-' "sha2" '-' 192s | token: '-' "sha2" '-' "modp8192" '' 192s | appending ESP encryption algorithm 3DES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 192s | token: '-' "modp8192" '' '' 192s | parsing dh: 192s | appending ESP DH algorithm MODP8192[_0] 192s | token: '' '' '' 192s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 192s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 192s | parsing '3des-sha1-modp8192,3des-sha2;modp8192' for ESP 192s | proposal: '3des-sha1-modp8192' 192s | token: '' '' "3des" '-' 192s | token: '' "3des" '-' "sha1" '-' 192s | token: '-' "sha1" '-' "modp8192" '' 192s | appending ESP encryption algorithm 3DES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: '-' "modp8192" '' '' 192s | parsing dh: 192s | appending ESP DH algorithm MODP8192[_0] 192s | token: '' '' '' 192s | proposal: '3des-sha2;modp8192' 192s | token: '' '' "3des" '-' 192s | token: '' "3des" '-' "sha2" ';' 192s | token: '-' "sha2" ';' "modp8192" '' 192s | appending ESP encryption algorithm 3DES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 192s | token: ';' "modp8192" '' '' 192s | parsing dh: 192s | appending ESP DH algorithm MODP8192[_0] 192s | token: '' '' '' 192s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 192s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 192s | parsing '3des-sha1;modp8192,3des-sha2-modp8192' for ESP 192s | proposal: '3des-sha1;modp8192' 192s | token: '' '' "3des" '-' 192s | token: '' "3des" '-' "sha1" ';' 192s | token: '-' "sha1" ';' "modp8192" '' 192s | appending ESP encryption algorithm 3DES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: ';' "modp8192" '' '' 192s | parsing dh: 192s | appending ESP DH algorithm MODP8192[_0] 192s | token: '' '' '' 192s | proposal: '3des-sha2-modp8192' 192s | token: '' '' "3des" '-' 192s | token: '' "3des" '-' "sha2" '-' 192s | token: '-' "sha2" '-' "modp8192" '' 192s | appending ESP encryption algorithm 3DES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 192s | token: '-' "modp8192" '' '' 192s | parsing dh: 192s | appending ESP DH algorithm MODP8192[_0] 192s | token: '' '' '' 192s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 192s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 192s | parsing '3des-sha1;modp8192,3des-sha2;modp8192' for ESP 192s | proposal: '3des-sha1;modp8192' 192s | token: '' '' "3des" '-' 192s | token: '' "3des" '-' "sha1" ';' 192s | token: '-' "sha1" ';' "modp8192" '' 192s | appending ESP encryption algorithm 3DES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: ';' "modp8192" '' '' 192s | parsing dh: 192s | appending ESP DH algorithm MODP8192[_0] 192s | token: '' '' '' 192s | proposal: '3des-sha2;modp8192' 192s | token: '' '' "3des" '-' 192s | token: '' "3des" '-' "sha2" ';' 192s | token: '-' "sha2" ';' "modp8192" '' 192s | appending ESP encryption algorithm 3DES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 192s | token: ';' "modp8192" '' '' 192s | parsing dh: 192s | appending ESP DH algorithm MODP8192[_0] 192s | token: '' '' '' 192s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 192s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 192s | parsing '3des-sha1-modp8192,3des-sha2-modp2048' for ESP 192s | proposal: '3des-sha1-modp8192' 192s | token: '' '' "3des" '-' 192s | token: '' "3des" '-' "sha1" '-' 192s | token: '-' "sha1" '-' "modp8192" '' 192s | appending ESP encryption algorithm 3DES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 192s | token: '-' "modp8192" '' '' 192s | parsing dh: 192s | appending ESP DH algorithm MODP8192[_0] 192s | token: '' '' '' 192s | proposal: '3des-sha2-modp2048' 192s | token: '' '' "3des" '-' 192s | token: '' "3des" '-' "sha2" '-' 192s | token: '-' "sha2" '-' "modp2048" '' 192s | appending ESP encryption algorithm 3DES_CBC[_0] 192s | parsing integ: 192s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 192s | token: '-' "modp2048" '' '' 192s | parsing dh: 192s | appending ESP DH algorithm MODP2048[_0] 192s | token: '' '' '' 192s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 192s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 192s | parsing 'SHA2_512_256,SHA2_256_128' for AH 192s | proposal: 'SHA2_512_256' 192s | token: '' '' "SHA2_512_256" '' 192s | token: '' "SHA2_512_256" '' '' 192s | parsing integ: 192s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 192s | token: '' '' '' 192s | proposal: 'SHA2_256_128' 192s | token: '' '' "SHA2_256_128" '' 192s | token: '' "SHA2_256_128" '' '' 192s | parsing integ: 192s HMAC_SHA2_512_256 192s HMAC_SHA2_256_128 192s algparse -v2 'ah=' (expect ERROR) 192s ERROR: AH proposal is empty 192s algparse -v2 'ah=md5' (expect SUCCESS) 192s HMAC_MD5_96 192s algparse -v2 'ah=sha' (expect SUCCESS) 192s HMAC_SHA1_96 192s algparse -v2 'ah=sha;modp2048' (expect SUCCESS) 192s HMAC_SHA1_96 192s algparse -v2 'ah=sha1' (expect SUCCESS) 192s HMAC_SHA1_96 192s algparse -v2 'ah=sha2' (expect SUCCESS) 192s HMAC_SHA2_256_128 192s algparse -v2 'ah=sha256' (expect SUCCESS) 192s HMAC_SHA2_256_128 192s algparse -v2 'ah=sha384' (expect SUCCESS) 192s HMAC_SHA2_384_192 192s algparse -v2 'ah=sha512' (expect SUCCESS) 192s HMAC_SHA2_512_256 192s algparse -v2 'ah=sha2_256' (expect SUCCESS) 192s HMAC_SHA2_256_128 192s algparse -v2 'ah=sha2_384' (expect SUCCESS) 192s HMAC_SHA2_384_192 192s algparse -v2 'ah=sha2_512' (expect SUCCESS) 192s HMAC_SHA2_512_256 192s algparse -v2 'ah=aes_xcbc' (expect SUCCESS) 192s AES_XCBC_96 192s algparse -v2 'ah=sha2-none' (expect SUCCESS) 192s HMAC_SHA2_256_128 192s algparse -v2 'ah=sha2;none' (expect SUCCESS) 192s HMAC_SHA2_256_128 192s algparse -v2 'ah=sha1-modp8192,sha1-modp8192,sha1-modp8192' (expect SUCCESS) 192s HMAC_SHA1_96 192s algparse -v2 'ah=aes-sha1' (expect ERROR) 192s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 192s | token: '' '' '' 192s | parsing '' for AH 192s | parsing 'md5' for AH 192s | proposal: 'md5' 192s | token: '' '' "md5" '' 192s | token: '' "md5" '' '' 192s | parsing integ: 192s | appending AH integrity algorithm HMAC_MD5_96[_0] 192s | token: '' '' '' 192s | parsing 'sha' for AH 192s | proposal: 'sha' 192s | token: '' '' "sha" '' 192s | token: '' "sha" '' '' 192s | parsing integ: 192s | appending AH integrity algorithm HMAC_SHA1_96[_0] 192s | token: '' '' '' 192s | parsing 'sha;modp2048' for AH 192s | proposal: 'sha;modp2048' 192s | token: '' '' "sha" ';' 192s | token: '' "sha" ';' "modp2048" '' 192s | parsing integ: 192s | appending AH integrity algorithm HMAC_SHA1_96[_0] 192s | token: ';' "modp2048" '' '' 192s | parsing dh: 192s | appending AH DH algorithm MODP2048[_0] 192s | token: '' '' '' 192s ipsec algparse: ignoring AH DH algorithm MODP2048 as PFS policy is disabled 192s | parsing 'sha1' for AH 192s | proposal: 'sha1' 192s | token: '' '' "sha1" '' 192s | token: '' "sha1" '' '' 192s | parsing integ: 192s | appending AH integrity algorithm HMAC_SHA1_96[_0] 192s | token: '' '' '' 192s | parsing 'sha2' for AH 192s | proposal: 'sha2' 192s | token: '' '' "sha2" '' 192s | token: '' "sha2" '' '' 192s | parsing integ: 192s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 192s | token: '' '' '' 192s | parsing 'sha256' for AH 192s | proposal: 'sha256' 192s | token: '' '' "sha256" '' 192s | token: '' "sha256" '' '' 192s | parsing integ: 192s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 192s | token: '' '' '' 192s | parsing 'sha384' for AH 192s | proposal: 'sha384' 192s | token: '' '' "sha384" '' 192s | token: '' "sha384" '' '' 192s | parsing integ: 192s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 192s | token: '' '' '' 192s | parsing 'sha512' for AH 192s | proposal: 'sha512' 192s | token: '' '' "sha512" '' 192s | token: '' "sha512" '' '' 192s | parsing integ: 192s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 192s | token: '' '' '' 192s | parsing 'sha2_256' for AH 192s | proposal: 'sha2_256' 192s | token: '' '' "sha2_256" '' 192s | token: '' "sha2_256" '' '' 192s | parsing integ: 192s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 192s | token: '' '' '' 192s | parsing 'sha2_384' for AH 192s | proposal: 'sha2_384' 192s | token: '' '' "sha2_384" '' 192s | token: '' "sha2_384" '' '' 192s | parsing integ: 192s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 192s | token: '' '' '' 192s | parsing 'sha2_512' for AH 192s | proposal: 'sha2_512' 192s | token: '' '' "sha2_512" '' 192s | token: '' "sha2_512" '' '' 192s | parsing integ: 192s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 192s | token: '' '' '' 192s | parsing 'aes_xcbc' for AH 192s | proposal: 'aes_xcbc' 192s | token: '' '' "aes_xcbc" '' 192s | token: '' "aes_xcbc" '' '' 192s | parsing integ: 192s | appending AH integrity algorithm AES_XCBC_96[_0] 192s | token: '' '' '' 192s | parsing 'sha2-none' for AH 192s | proposal: 'sha2-none' 192s | token: '' '' "sha2" '-' 192s | token: '' "sha2" '-' "none" '' 192s | parsing integ: 192s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 192s | token: '-' "none" '' '' 192s | parsing dh: 192s | appending AH DH algorithm NONE[_0] 192s | token: '' '' '' 192s ipsec algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 192s | parsing 'sha2;none' for AH 192s | proposal: 'sha2;none' 192s | token: '' '' "sha2" ';' 192s | token: '' "sha2" ';' "none" '' 192s | parsing integ: 192s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 192s | token: ';' "none" '' '' 192s | parsing dh: 192s | appending AH DH algorithm NONE[_0] 192s | token: '' '' '' 192s ipsec algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 192s | parsing 'sha1-modp8192,sha1-modp8192,sha1-modp8192' for AH 192s | proposal: 'sha1-modp8192' 192s | token: '' '' "sha1" '-' 192s | token: '' "sha1" '-' "modp8192" '' 192s | parsing integ: 192s | appending AH integrity algorithm HMAC_SHA1_96[_0] 192s | token: '-' "modp8192" '' '' 192s | parsing dh: 192s | appending AH DH algorithm MODP8192[_0] 192s | token: '' '' '' 192s | proposal: 'sha1-modp8192' 192s | token: '' '' "sha1" '-' 192s | token: '' "sha1" '-' "modp8192" '' 192s | parsing integ: 192s | appending AH integrity algorithm HMAC_SHA1_96[_0] 192s | token: '-' "modp8192" '' '' 192s | parsing dh: 192s | appending AH DH algorithm MODP8192[_0] 192s | token: '' '' '' 192s | proposal: 'sha1-modp8192' 192s | token: '' '' "sha1" '-' 192s | token: '' "sha1" '-' "modp8192" '' 192s | parsing integ: 192s | appending AH integrity algorithm HMAC_SHA1_96[_0] 192s | token: '-' "modp8192" '' '' 192s | parsing dh: 192s | appending AH DH algorithm MODP8192[_0] 192s | token: '' '' '' 192s ipsec algparse: ignoring AH DH algorithm MODP8192 as PFS policy is disabled 192s ERROR: AH integrity algorithm 'aes' is not recognized 192s algparse -v2 'ah=vanityhash1' (expect ERROR) 192s ERROR: AH integrity algorithm 'vanityhash1' is not recognized 192s algparse -v2 'ah=aes_gcm_c-256' (expect ERROR) 192s ERROR: AH integrity algorithm 'aes_gcm_c' is not recognized 192s algparse -v2 'ah=id3' (expect ERROR) 192s ERROR: AH integrity algorithm 'id3' is not recognized 192s algparse -v2 'ah=3des' (expect ERROR) 192s ERROR: AH integrity algorithm '3des' is not recognized 192s algparse -v2 'ah=null' (expect ERROR) 192s ERROR: AH cannot have 'none' as the integrity algorithm 192s algparse -v2 'ah=aes_gcm' (expect ERROR) 192s ERROR: AH integrity algorithm 'aes_gcm' is not recognized 192s algparse -v2 'ah=aes_ccm' (expect ERROR) 192s ERROR: AH integrity algorithm 'aes_ccm' is not recognized 192s algparse -v2 'ah=ripemd' (expect ERROR) 192s ERROR: AH integrity algorithm 'ripemd' is not recognized 192s algparse -v2 'ike' (expect SUCCESS) 192s | parsing 'aes-sha1' for AH 192s | proposal: 'aes-sha1' 192s | token: '' '' "aes" '-' 192s | token: '' "aes" '-' "sha1" '' 192s | parsing integ: 192s | ike_alg_byname() failed: AH integrity algorithm 'aes' is not recognized 192s | lookup for integrity algorithm 'aes' failed 192s | or - failed 'AH integrity algorithm 'aes' is not recognized') 192s | parsing 'vanityhash1' for AH 192s | proposal: 'vanityhash1' 192s | token: '' '' "vanityhash1" '' 192s | token: '' "vanityhash1" '' '' 192s | parsing integ: 192s | ike_alg_byname() failed: AH integrity algorithm 'vanityhash1' is not recognized 192s | lookup for integrity algorithm 'vanityhash1' failed 192s | or - failed 'AH integrity algorithm 'vanityhash1' is not recognized') 192s | parsing 'aes_gcm_c-256' for AH 192s | proposal: 'aes_gcm_c-256' 192s | token: '' '' "aes_gcm_c" '-' 192s | token: '' "aes_gcm_c" '-' "256" '' 192s | parsing integ: 192s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm_c' is not recognized 192s | lookup for integrity algorithm 'aes_gcm_c' failed 192s | or - failed 'AH integrity algorithm 'aes_gcm_c' is not recognized') 192s | parsing 'id3' for AH 192s | proposal: 'id3' 192s | token: '' '' "id3" '' 192s | token: '' "id3" '' '' 192s | parsing integ: 192s | ike_alg_byname() failed: AH integrity algorithm 'id3' is not recognized 192s | lookup for integrity algorithm 'id3' failed 192s | or - failed 'AH integrity algorithm 'id3' is not recognized') 192s | parsing '3des' for AH 192s | proposal: '3des' 192s | token: '' '' "3des" '' 192s | token: '' "3des" '' '' 192s | parsing integ: 192s | ike_alg_byname() failed: AH integrity algorithm '3des' is not recognized 192s | lookup for integrity algorithm '3des' failed 192s | or - failed 'AH integrity algorithm '3des' is not recognized') 192s | parsing 'null' for AH 192s | proposal: 'null' 192s | token: '' '' "null" '' 192s | token: '' "null" '' '' 192s | parsing integ: 192s | appending AH integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | parsing 'aes_gcm' for AH 192s | proposal: 'aes_gcm' 192s | token: '' '' "aes_gcm" '' 192s | token: '' "aes_gcm" '' '' 192s | parsing integ: 192s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm' is not recognized 192s | lookup for integrity algorithm 'aes_gcm' failed 192s | or - failed 'AH integrity algorithm 'aes_gcm' is not recognized') 192s | parsing 'aes_ccm' for AH 192s | proposal: 'aes_ccm' 192s | token: '' '' "aes_ccm" '' 192s | token: '' "aes_ccm" '' '' 192s | parsing integ: 192s | ike_alg_byname() failed: AH integrity algorithm 'aes_ccm' is not recognized 192s | lookup for integrity algorithm 'aes_ccm' failed 192s | or - failed 'AH integrity algorithm 'aes_ccm' is not recognized') 192s | parsing 'ripemd' for AH 192s | proposal: 'ripemd' 192s | token: '' '' "ripemd" '' 192s | token: '' "ripemd" '' '' 192s | parsing integ: 192s | ike_alg_byname() failed: AH integrity algorithm 'ripemd' is not recognized 192s | lookup for integrity algorithm 'ripemd' failed 192s | or - failed 'AH integrity algorithm 'ripemd' is not recognized') 192s | parsing 'AES_GCM_16_256,AES_GCM_16_128,CHACHA20_POLY1305,AES_CBC_256,AES_CBC_128' for IKE 192s | proposal: 'AES_GCM_16_256' 192s | token: '' '' "AES_GCM_16_256" '' 192s | token: '' "AES_GCM_16_256" '' '' 192s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_256' is not recognized 192s | token: '' '' '' 192s | appending IKE encryption algorithm AES_GCM_16[_256] 192s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 192s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 192s | appending IKE integrity algorithm NONE[_0] 192s | appending IKE DH algorithm DH19[_0] 192s | appending IKE DH algorithm DH20[_0] 192s | appending IKE DH algorithm DH21[_0] 192s | appending IKE DH algorithm DH31[_0] 192s | appending IKE DH algorithm MODP4096[_0] 192s | appending IKE DH algorithm MODP3072[_0] 192s | appending IKE DH algorithm MODP2048[_0] 192s | appending IKE DH algorithm MODP8192[_0] 192s | proposal: 'AES_GCM_16_128' 192s | token: '' '' "AES_GCM_16_128" '' 192s | token: '' "AES_GCM_16_128" '' '' 192s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_128' is not recognized 192s | token: '' '' '' 192s | appending IKE encryption algorithm AES_GCM_16[_128] 192s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 192s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 192s | appending IKE integrity algorithm NONE[_0] 192s | appending IKE DH algorithm DH19[_0] 192s | appending IKE DH algorithm DH20[_0] 192s | appending IKE DH algorithm DH21[_0] 192s | appending IKE DH algorithm DH31[_0] 192s | appending IKE DH algorithm MODP4096[_0] 192s | appending IKE DH algorithm MODP3072[_0] 192s | appending IKE DH algorithm MODP2048[_0] 192s | appending IKE DH algorithm MODP8192[_0] 192s | proposal: 'CHACHA20_POLY1305' 192s | token: '' '' "CHACHA20_POLY1305" '' 192s | token: '' "CHACHA20_POLY1305" '' '' 192s | token: '' '' '' 192s | appending IKE encryption algorithm CHACHA20_POLY1305[_0] 192s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 192s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 192s | appending IKE integrity algorithm NONE[_0] 192s | appending IKE DH algorithm DH19[_0] 192s | appending IKE DH algorithm DH20[_0] 192s | appending IKE DH algorithm DH21[_0] 192s | appending IKE DH algorithm DH31[_0] 192s | appending IKE DH algorithm MODP4096[_0] 192s | appending IKE DH algorithm MODP3072[_0] 192s | appending IKE DH algorithm MODP2048[_0] 192s | appending IKE DH algorithm MODP8192[_0] 192s | proposal: 'AES_CBC_256' 192s | token: '' '' "AES_CBC_256" '' 192s | token: '' "AES_CBC_256" '' '' 192s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_256' is not recognized 192s | token: '' '' '' 192s | appending IKE encryption algorithm AES_CBC[_256] 192s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 192s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 192s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 192s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 192s | appending IKE DH algorithm DH19[_0] 192s | appending IKE DH algorithm DH20[_0] 192s | appending IKE DH algorithm DH21[_0] 192s | appending IKE DH algorithm DH31[_0] 192s | appending IKE DH algorithm MODP4096[_0] 192s | appending IKE DH algorithm MODP3072[_0] 192s | appending IKE DH algorithm MODP2048[_0] 192s | appending IKE DH algorithm MODP8192[_0] 192s | proposal: 'AES_CBC_128' 192s | token: '' '' "AES_CBC_128" '' 192s | token: '' "AES_CBC_128" '' '' 192s AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 192s AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 192s CHACHA20_POLY1305-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 192s AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 192s AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 192s algparse -v2 'ike=' (expect ERROR) 192s ERROR: IKE proposal is empty 192s algparse -v2 'ike=3des-sha1' (expect SUCCESS) 192s 3DES_CBC-HMAC_SHA1-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 192s algparse -v2 'ike=3des-sha1' (expect SUCCESS) 192s 3DES_CBC-HMAC_SHA1-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 192s algparse -v2 'ike=3des-sha1;modp1536' (expect SUCCESS) 192s 3DES_CBC-HMAC_SHA1-MODP1536 192s algparse -v2 'ike=3des;dh21' (expect SUCCESS) 192s 3DES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH21 192s algparse -v2 'ike=3des-sha1;dh21' (expect SUCCESS) 192s 3DES_CBC-HMAC_SHA1-DH21 192s algparse -v2 'ike=3des-sha1-ecp_521' (expect SUCCESS) 192s 3DES_CBC-HMAC_SHA1-DH21 192s algparse -v2 'ike=3des+aes' (expect SUCCESS) 192s 3DES_CBC+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 192s algparse -v2 'ike=aes;none' (expect ERROR) 192s ERROR: IKE DH algorithm 'none' not permitted 192s algparse -v2 'ike=id2' (expect ERROR) 192s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_128' is not recognized 192s | token: '' '' '' 192s | appending IKE encryption algorithm AES_CBC[_128] 192s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 192s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 192s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 192s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 192s | appending IKE DH algorithm DH19[_0] 192s | appending IKE DH algorithm DH20[_0] 192s | appending IKE DH algorithm DH21[_0] 192s | appending IKE DH algorithm DH31[_0] 192s | appending IKE DH algorithm MODP4096[_0] 192s | appending IKE DH algorithm MODP3072[_0] 192s | appending IKE DH algorithm MODP2048[_0] 192s | appending IKE DH algorithm MODP8192[_0] 192s | parsing '' for IKE 192s | parsing '3des-sha1' for IKE 192s | proposal: '3des-sha1' 192s | token: '' '' "3des" '-' 192s | token: '' "3des" '-' "sha1" '' 192s | token: '-' "sha1" '' '' 192s | appending IKE encryption algorithm 3DES_CBC[_0] 192s | parsing prf: 192s | appending IKE PRF algorithm HMAC_SHA1[_0] 192s | token: '' '' '' 192s | - succeeded, advancing tokens 192s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 192s | appending IKE DH algorithm DH19[_0] 192s | appending IKE DH algorithm DH20[_0] 192s | appending IKE DH algorithm DH21[_0] 192s | appending IKE DH algorithm DH31[_0] 192s | appending IKE DH algorithm MODP4096[_0] 192s | appending IKE DH algorithm MODP3072[_0] 192s | appending IKE DH algorithm MODP2048[_0] 192s | appending IKE DH algorithm MODP8192[_0] 192s | parsing '3des-sha1' for IKE 192s | proposal: '3des-sha1' 192s | token: '' '' "3des" '-' 192s | token: '' "3des" '-' "sha1" '' 192s | token: '-' "sha1" '' '' 192s | appending IKE encryption algorithm 3DES_CBC[_0] 192s | parsing prf: 192s | appending IKE PRF algorithm HMAC_SHA1[_0] 192s | token: '' '' '' 192s | - succeeded, advancing tokens 192s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 192s | appending IKE DH algorithm DH19[_0] 192s | appending IKE DH algorithm DH20[_0] 192s | appending IKE DH algorithm DH21[_0] 192s | appending IKE DH algorithm DH31[_0] 192s | appending IKE DH algorithm MODP4096[_0] 192s | appending IKE DH algorithm MODP3072[_0] 192s | appending IKE DH algorithm MODP2048[_0] 192s | appending IKE DH algorithm MODP8192[_0] 192s | parsing '3des-sha1;modp1536' for IKE 192s | proposal: '3des-sha1;modp1536' 192s | token: '' '' "3des" '-' 192s | token: '' "3des" '-' "sha1" ';' 192s | token: '-' "sha1" ';' "modp1536" '' 192s | appending IKE encryption algorithm 3DES_CBC[_0] 192s | parsing prf: 192s | appending IKE PRF algorithm HMAC_SHA1[_0] 192s | token: ';' "modp1536" '' '' 192s | - succeeded, advancing tokens 192s | parsing dh: 192s | appending IKE DH algorithm MODP1536[_0] 192s | token: '' '' '' 192s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 192s | parsing '3des;dh21' for IKE 192s | proposal: '3des;dh21' 192s | token: '' '' "3des" ';' 192s | token: '' "3des" ';' "dh21" '' 192s | token: ';' "dh21" '' '' 192s | appending IKE encryption algorithm 3DES_CBC[_0] 192s | parsing dh: 192s | appending IKE DH algorithm DH21[_0] 192s | token: '' '' '' 192s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 192s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 192s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 192s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 192s | parsing '3des-sha1;dh21' for IKE 192s | proposal: '3des-sha1;dh21' 192s | token: '' '' "3des" '-' 192s | token: '' "3des" '-' "sha1" ';' 192s | token: '-' "sha1" ';' "dh21" '' 192s | appending IKE encryption algorithm 3DES_CBC[_0] 192s | parsing prf: 192s | appending IKE PRF algorithm HMAC_SHA1[_0] 192s | token: ';' "dh21" '' '' 192s | - succeeded, advancing tokens 192s | parsing dh: 192s | appending IKE DH algorithm DH21[_0] 192s | token: '' '' '' 192s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 192s | parsing '3des-sha1-ecp_521' for IKE 192s | proposal: '3des-sha1-ecp_521' 192s | token: '' '' "3des" '-' 192s | token: '' "3des" '-' "sha1" '-' 192s | token: '-' "sha1" '-' "ecp_521" '' 192s | appending IKE encryption algorithm 3DES_CBC[_0] 192s | parsing prf: 192s | appending IKE PRF algorithm HMAC_SHA1[_0] 192s | token: '-' "ecp_521" '' '' 192s | - succeeded, advancing tokens 192s | parsing dh: 192s | appending IKE DH algorithm DH21[_0] 192s | token: '' '' '' 192s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 192s | parsing '3des+aes' for IKE 192s | proposal: '3des+aes' 192s | token: '' '' "3des" '+' 192s | token: '' "3des" '+' "aes" '' 192s | token: '+' "aes" '' '' 192s | appending IKE encryption algorithm 3DES_CBC[_0] 192s | token: '' '' '' 192s | appending IKE encryption algorithm AES_CBC[_0] 192s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 192s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 192s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 192s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 192s | appending IKE DH algorithm DH19[_0] 192s | appending IKE DH algorithm DH20[_0] 192s | appending IKE DH algorithm DH21[_0] 192s | appending IKE DH algorithm DH31[_0] 192s | appending IKE DH algorithm MODP4096[_0] 192s | appending IKE DH algorithm MODP3072[_0] 192s | appending IKE DH algorithm MODP2048[_0] 192s | appending IKE DH algorithm MODP8192[_0] 192s | parsing 'aes;none' for IKE 192s | proposal: 'aes;none' 192s | token: '' '' "aes" ';' 192s | token: '' "aes" ';' "none" '' 192s | token: ';' "none" '' '' 192s | appending IKE encryption algorithm AES_CBC[_0] 192s | parsing dh: 192s | appending IKE DH algorithm NONE[_0] 192s | token: '' '' '' 192s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 192s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 192s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 192s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 192s | parsing 'id2' for IKE 192s | proposal: 'id2' 192s | token: '' '' "id2" '' 192s | token: '' "id2" '' '' 192s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 192s ERROR: IKE encryption algorithm 'id2' is not recognized 192s algparse -v2 'ike=3des-id2' (expect ERROR) 192s ERROR: IKE PRF algorithm 'id2' is not recognized 192s algparse -v2 'ike=aes_ccm' (expect ERROR) 192s ERROR: IKE encryption algorithm 'aes_ccm' is not supported 192s algparse -v2 'ike=aes-sha1-sha2-ecp_521' (expect ERROR) 192s ERROR: IKE DH algorithm 'sha2' is not recognized 192s algparse -v2 'ike=aes-sha2-sha2;ecp_521' (expect ERROR) 192s ERROR: IKE DH algorithm 'sha2' is not recognized 192s algparse -v2 'ike=aes-sha1_96-sha2-ecp_521' (expect SUCCESS) 192s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 192s algparse -v2 'ike=aes-sha1_96-sha2;ecp_521' (expect SUCCESS) 192s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 192s algparse -v2 'ike=aes+aes-sha1+sha1-modp8192+modp8192' (expect SUCCESS) 192s AES_CBC-HMAC_SHA1-MODP8192 192s algparse -v2 'ike=3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' (expect SUCCESS) 192s 3DES_CBC+AES_CBC-HMAC_SHA2_256+HMAC_SHA1-MODP4096+MODP8192 192s algparse -v2 'ike=aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' (expect SUCCESS) 192s AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 192s algparse -v2 'ike=aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' (expect SUCCESS) 192s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 192s | parsing '3des-id2' for IKE 192s | proposal: '3des-id2' 192s | token: '' '' "3des" '-' 192s | token: '' "3des" '-' "id2" '' 192s | token: '-' "id2" '' '' 192s | appending IKE encryption algorithm 3DES_CBC[_0] 192s | parsing prf: 192s | ike_alg_byname() failed: IKE PRF algorithm 'id2' is not recognized 192s | lookup for PRF algorithm 'id2' failed 192s | - failed, saving error 'IKE PRF algorithm 'id2' is not recognized' and tossing result 192s | parsing integ: 192s | ike_alg_byname() failed: IKE integrity algorithm 'id2' is not recognized 192s | lookup for integrity algorithm 'id2' failed 192s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'id2' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'id2' is not recognized') 192s | parsing 'aes_ccm' for IKE 192s | proposal: 'aes_ccm' 192s | token: '' '' "aes_ccm" '' 192s | token: '' "aes_ccm" '' '' 192s | alg_byname_ok() failed: IKE encryption algorithm 'aes_ccm' is not supported 192s | parsing 'aes-sha1-sha2-ecp_521' for IKE 192s | proposal: 'aes-sha1-sha2-ecp_521' 192s | token: '' '' "aes" '-' 192s | token: '' "aes" '-' "sha1" '-' 192s | token: '-' "sha1" '-' "sha2" '-' 192s | appending IKE encryption algorithm AES_CBC[_0] 192s | parsing prf: 192s | appending IKE PRF algorithm HMAC_SHA1[_0] 192s | token: '-' "sha2" '-' "ecp_521" '' 192s | - succeeded, advancing tokens 192s | parsing dh: 192s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 192s | lookup for DH algorithm 'sha2' failed 192s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 192s | parsing 'aes-sha2-sha2;ecp_521' for IKE 192s | proposal: 'aes-sha2-sha2;ecp_521' 192s | token: '' '' "aes" '-' 192s | token: '' "aes" '-' "sha2" '-' 192s | token: '-' "sha2" '-' "sha2" ';' 192s | appending IKE encryption algorithm AES_CBC[_0] 192s | parsing prf: 192s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 192s | token: '-' "sha2" ';' "ecp_521" '' 192s | - succeeded, advancing tokens 192s | parsing dh: 192s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 192s | lookup for DH algorithm 'sha2' failed 192s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 192s | parsing 'aes-sha1_96-sha2-ecp_521' for IKE 192s | proposal: 'aes-sha1_96-sha2-ecp_521' 192s | token: '' '' "aes" '-' 192s | token: '' "aes" '-' "sha1_96" '-' 192s | token: '-' "sha1_96" '-' "sha2" '-' 192s | appending IKE encryption algorithm AES_CBC[_0] 192s | parsing prf: 192s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 192s | lookup for PRF algorithm 'sha1_96' failed 192s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 192s | parsing integ: 192s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 192s | token: '-' "sha2" '-' "ecp_521" '' 192s | parsing prf: 192s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 192s | token: '-' "ecp_521" '' '' 192s | parsing dh: 192s | appending IKE DH algorithm DH21[_0] 192s | token: '' '' '' 192s | parsing 'aes-sha1_96-sha2;ecp_521' for IKE 192s | proposal: 'aes-sha1_96-sha2;ecp_521' 192s | token: '' '' "aes" '-' 192s | token: '' "aes" '-' "sha1_96" '-' 192s | token: '-' "sha1_96" '-' "sha2" ';' 192s | appending IKE encryption algorithm AES_CBC[_0] 192s | parsing prf: 192s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 192s | lookup for PRF algorithm 'sha1_96' failed 192s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 192s | parsing integ: 192s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 192s | token: '-' "sha2" ';' "ecp_521" '' 192s | parsing prf: 192s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 192s | token: ';' "ecp_521" '' '' 192s | parsing dh: 192s | appending IKE DH algorithm DH21[_0] 192s | token: '' '' '' 192s | parsing 'aes+aes-sha1+sha1-modp8192+modp8192' for IKE 192s | proposal: 'aes+aes-sha1+sha1-modp8192+modp8192' 192s | token: '' '' "aes" '+' 192s | token: '' "aes" '+' "aes" '-' 192s | token: '+' "aes" '-' "sha1" '+' 192s | appending IKE encryption algorithm AES_CBC[_0] 192s | token: '-' "sha1" '+' "sha1" '-' 192s | appending IKE encryption algorithm AES_CBC[_0] 192s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 192s | parsing prf: 192s | appending IKE PRF algorithm HMAC_SHA1[_0] 192s | token: '+' "sha1" '-' "modp8192" '+' 192s | appending IKE PRF algorithm HMAC_SHA1[_0] 192s | token: '-' "modp8192" '+' "modp8192" '' 192s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 192s | - succeeded, advancing tokens 192s | parsing dh: 192s | appending IKE DH algorithm MODP8192[_0] 192s | token: '+' "modp8192" '' '' 192s | appending IKE DH algorithm MODP8192[_0] 192s | token: '' '' '' 192s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 192s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 192s | parsing '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' for IKE 192s | proposal: '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' 192s | token: '' '' "3des" '+' 192s | token: '' "3des" '+' "aes" '+' 192s | token: '+' "aes" '+' "aes" '-' 192s | appending IKE encryption algorithm 3DES_CBC[_0] 192s | token: '+' "aes" '-' "sha2" '+' 192s | appending IKE encryption algorithm AES_CBC[_0] 192s | token: '-' "sha2" '+' "sha1" '+' 192s | appending IKE encryption algorithm AES_CBC[_0] 192s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 192s | parsing prf: 192s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 192s | token: '+' "sha1" '+' "sha1" '-' 192s | appending IKE PRF algorithm HMAC_SHA1[_0] 192s | token: '+' "sha1" '-' "modp4096" '+' 192s | appending IKE PRF algorithm HMAC_SHA1[_0] 192s | token: '-' "modp4096" '+' "modp8192" '+' 192s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 192s | - succeeded, advancing tokens 192s | parsing dh: 192s | appending IKE DH algorithm MODP4096[_0] 192s | token: '+' "modp8192" '+' "modp8192" '' 192s | appending IKE DH algorithm MODP8192[_0] 192s | token: '+' "modp8192" '' '' 192s | appending IKE DH algorithm MODP8192[_0] 192s | token: '' '' '' 192s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 192s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 192s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 192s AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 192s algparse -v2 'ike=aes+aes128+aes256' (expect SUCCESS) 192s AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 192s algparse -v2 'ike=aes128+aes+aes256' (expect SUCCESS) 192s AES_CBC_128+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 192s algparse -v2 'ike=aes128+aes256+aes' (expect SUCCESS) 192s AES_CBC_128+AES_CBC_256+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 192s algparse -v2 'ike=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' (expect SUCCESS) 192s AES_CBC-HMAC_SHA1-MODP8192 192s algparse -v2 'ike=aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' (expect SUCCESS) 192s | parsing 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' for IKE 192s | proposal: 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' 192s | token: '' '' "aes" '+' 192s | token: '' "aes" '+' "3des" '+' 192s | token: '+' "3des" '+' "aes" '-' 192s | appending IKE encryption algorithm AES_CBC[_0] 192s | token: '+' "aes" '-' "sha1" '+' 192s | appending IKE encryption algorithm 3DES_CBC[_0] 192s | token: '-' "sha1" '+' "sha2" '+' 192s | appending IKE encryption algorithm AES_CBC[_0] 192s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 192s | parsing prf: 192s | appending IKE PRF algorithm HMAC_SHA1[_0] 192s | token: '+' "sha2" '+' "sha1" '-' 192s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 192s | token: '+' "sha1" '-' "modp8192" '+' 192s | appending IKE PRF algorithm HMAC_SHA1[_0] 192s | token: '-' "modp8192" '+' "modp4096" '+' 192s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 192s | - succeeded, advancing tokens 192s | parsing dh: 192s | appending IKE DH algorithm MODP8192[_0] 192s | token: '+' "modp4096" '+' "modp8192" '' 192s | appending IKE DH algorithm MODP4096[_0] 192s | token: '+' "modp8192" '' '' 192s | appending IKE DH algorithm MODP8192[_0] 192s | token: '' '' '' 192s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 192s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 192s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 192s | parsing 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' for IKE 192s | proposal: 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' 192s | token: '' '' "aes" '+' 192s | token: '' "aes" '+' "aes" '+' 192s | token: '+' "aes" '+' "3des" '-' 192s | appending IKE encryption algorithm AES_CBC[_0] 192s | token: '+' "3des" '-' "sha1" '+' 192s | appending IKE encryption algorithm AES_CBC[_0] 192s | token: '-' "sha1" '+' "sha1" '+' 192s | appending IKE encryption algorithm 3DES_CBC[_0] 192s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 192s | parsing prf: 192s | appending IKE PRF algorithm HMAC_SHA1[_0] 192s | token: '+' "sha1" '+' "sha2" '-' 192s | appending IKE PRF algorithm HMAC_SHA1[_0] 192s | token: '+' "sha2" '-' "modp8192" '+' 192s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 192s | token: '-' "modp8192" '+' "modp8192" '+' 192s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 192s | - succeeded, advancing tokens 192s | parsing dh: 192s | appending IKE DH algorithm MODP8192[_0] 192s | token: '+' "modp8192" '+' "modp4096" '' 192s | appending IKE DH algorithm MODP8192[_0] 192s | token: '+' "modp4096" '' '' 192s | appending IKE DH algorithm MODP4096[_0] 192s | token: '' '' '' 192s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 192s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 192s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 192s | parsing 'aes+aes128+aes256' for IKE 192s | proposal: 'aes+aes128+aes256' 192s | token: '' '' "aes" '+' 192s | token: '' "aes" '+' "aes128" '+' 192s | token: '+' "aes128" '+' "aes256" '' 192s | appending IKE encryption algorithm AES_CBC[_0] 192s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 192s | token: '+' "aes256" '' '' 192s | appending IKE encryption algorithm AES_CBC[_128] 192s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 192s | token: '' '' '' 192s | appending IKE encryption algorithm AES_CBC[_256] 192s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_128 192s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 192s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 192s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 192s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 192s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 192s | appending IKE DH algorithm DH19[_0] 192s | appending IKE DH algorithm DH20[_0] 192s | appending IKE DH algorithm DH21[_0] 192s | appending IKE DH algorithm DH31[_0] 192s | appending IKE DH algorithm MODP4096[_0] 192s | appending IKE DH algorithm MODP3072[_0] 192s | appending IKE DH algorithm MODP2048[_0] 192s | appending IKE DH algorithm MODP8192[_0] 192s | parsing 'aes128+aes+aes256' for IKE 192s | proposal: 'aes128+aes+aes256' 192s | token: '' '' "aes128" '+' 192s | token: '' "aes128" '+' "aes" '+' 192s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 192s | token: '+' "aes" '+' "aes256" '' 192s | appending IKE encryption algorithm AES_CBC[_128] 192s | token: '+' "aes256" '' '' 192s | appending IKE encryption algorithm AES_CBC[_0] 192s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 192s | token: '' '' '' 192s | appending IKE encryption algorithm AES_CBC[_256] 192s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 192s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 192s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 192s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 192s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 192s | appending IKE DH algorithm DH19[_0] 192s | appending IKE DH algorithm DH20[_0] 192s | appending IKE DH algorithm DH21[_0] 192s | appending IKE DH algorithm DH31[_0] 192s | appending IKE DH algorithm MODP4096[_0] 192s | appending IKE DH algorithm MODP3072[_0] 192s | appending IKE DH algorithm MODP2048[_0] 192s | appending IKE DH algorithm MODP8192[_0] 192s | parsing 'aes128+aes256+aes' for IKE 192s | proposal: 'aes128+aes256+aes' 192s | token: '' '' "aes128" '+' 192s | token: '' "aes128" '+' "aes256" '+' 192s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 192s | token: '+' "aes256" '+' "aes" '' 192s | appending IKE encryption algorithm AES_CBC[_128] 192s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 192s | token: '+' "aes" '' '' 192s | appending IKE encryption algorithm AES_CBC[_256] 192s | token: '' '' '' 192s | appending IKE encryption algorithm AES_CBC[_0] 192s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 192s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 192s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 192s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 192s | appending IKE DH algorithm DH19[_0] 192s | appending IKE DH algorithm DH20[_0] 192s | appending IKE DH algorithm DH21[_0] 192s | appending IKE DH algorithm DH31[_0] 192s | appending IKE DH algorithm MODP4096[_0] 192s | appending IKE DH algorithm MODP3072[_0] 192s | appending IKE DH algorithm MODP2048[_0] 192s | appending IKE DH algorithm MODP8192[_0] 192s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for IKE 192s | proposal: 'aes-sha1-modp8192' 192s | token: '' '' "aes" '-' 192s | token: '' "aes" '-' "sha1" '-' 192s | token: '-' "sha1" '-' "modp8192" '' 192s | appending IKE encryption algorithm AES_CBC[_0] 192s | parsing prf: 192s | appending IKE PRF algorithm HMAC_SHA1[_0] 192s | token: '-' "modp8192" '' '' 192s | - succeeded, advancing tokens 192s | parsing dh: 192s | appending IKE DH algorithm MODP8192[_0] 192s | token: '' '' '' 192s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 192s | proposal: 'aes-sha1-modp8192' 192s | token: '' '' "aes" '-' 192s | token: '' "aes" '-' "sha1" '-' 192s | token: '-' "sha1" '-' "modp8192" '' 192s | appending IKE encryption algorithm AES_CBC[_0] 192s | parsing prf: 192s | appending IKE PRF algorithm HMAC_SHA1[_0] 192s | token: '-' "modp8192" '' '' 192s | - succeeded, advancing tokens 192s | parsing dh: 192s | appending IKE DH algorithm MODP8192[_0] 192s | token: '' '' '' 192s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 192s | proposal: 'aes-sha1-modp8192' 192s | token: '' '' "aes" '-' 192s | token: '' "aes" '-' "sha1" '-' 192s | token: '-' "sha1" '-' "modp8192" '' 192s | appending IKE encryption algorithm AES_CBC[_0] 192s | parsing prf: 192s | appending IKE PRF algorithm HMAC_SHA1[_0] 192s | token: '-' "modp8192" '' '' 192s | - succeeded, advancing tokens 192s | parsing dh: 192s | appending IKE DH algorithm MODP8192[_0] 192s | token: '' '' '' 192s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 192s AES_CBC-HMAC_SHA1-MODP8192 192s AES_CBC-HMAC_SHA2_256-MODP8192 192s algparse -v2 'ike=aes_gcm' (expect SUCCESS) 192s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 192s algparse -v2 'ike=aes_gcm-sha2' (expect SUCCESS) 192s AES_GCM_16-HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 192s algparse -v2 'ike=aes_gcm-sha2-modp2048' (expect SUCCESS) 192s AES_GCM_16-HMAC_SHA2_256-MODP2048 192s algparse -v2 'ike=aes_gcm-sha2;modp2048' (expect SUCCESS) 192s AES_GCM_16-HMAC_SHA2_256-MODP2048 192s algparse -v2 'ike=aes_gcm-modp2048' (expect ERROR) 192s ERROR: IKE PRF algorithm 'modp2048' is not recognized 192s algparse -v2 'ike=aes_gcm;modp2048' (expect SUCCESS) 192s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 192s algparse -v2 'ike=aes_gcm-none' (expect SUCCESS) 192s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 192s algparse -v2 'ike=aes_gcm-none-sha2' (expect SUCCESS) 192s AES_GCM_16-HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 192s algparse -v2 'ike=aes_gcm-none-sha2-modp2048' (expect SUCCESS) 192s AES_GCM_16-HMAC_SHA2_256-MODP2048 192s algparse -v2 'ike=aes_gcm-none-sha2;modp2048' (expect SUCCESS) 192s AES_GCM_16-HMAC_SHA2_256-MODP2048 192s algparse -v2 'ike=aes_gcm-none-modp2048' (expect ERROR) 192s | parsing 'aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' for IKE 192s | proposal: 'aes-sha1-modp8192' 192s | token: '' '' "aes" '-' 192s | token: '' "aes" '-' "sha1" '-' 192s | token: '-' "sha1" '-' "modp8192" '' 192s | appending IKE encryption algorithm AES_CBC[_0] 192s | parsing prf: 192s | appending IKE PRF algorithm HMAC_SHA1[_0] 192s | token: '-' "modp8192" '' '' 192s | - succeeded, advancing tokens 192s | parsing dh: 192s | appending IKE DH algorithm MODP8192[_0] 192s | token: '' '' '' 192s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 192s | proposal: 'aes-sha2-modp8192' 192s | token: '' '' "aes" '-' 192s | token: '' "aes" '-' "sha2" '-' 192s | token: '-' "sha2" '-' "modp8192" '' 192s | appending IKE encryption algorithm AES_CBC[_0] 192s | parsing prf: 192s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 192s | token: '-' "modp8192" '' '' 192s | - succeeded, advancing tokens 192s | parsing dh: 192s | appending IKE DH algorithm MODP8192[_0] 192s | token: '' '' '' 192s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 192s | proposal: 'aes-sha1-modp8192' 192s | token: '' '' "aes" '-' 192s | token: '' "aes" '-' "sha1" '-' 192s | token: '-' "sha1" '-' "modp8192" '' 192s | appending IKE encryption algorithm AES_CBC[_0] 192s | parsing prf: 192s | appending IKE PRF algorithm HMAC_SHA1[_0] 192s | token: '-' "modp8192" '' '' 192s | - succeeded, advancing tokens 192s | parsing dh: 192s | appending IKE DH algorithm MODP8192[_0] 192s | token: '' '' '' 192s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 192s | parsing 'aes_gcm' for IKE 192s | proposal: 'aes_gcm' 192s | token: '' '' "aes_gcm" '' 192s | token: '' "aes_gcm" '' '' 192s | token: '' '' '' 192s | appending IKE encryption algorithm AES_GCM_16[_0] 192s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 192s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 192s | appending IKE integrity algorithm NONE[_0] 192s | appending IKE DH algorithm DH19[_0] 192s | appending IKE DH algorithm DH20[_0] 192s | appending IKE DH algorithm DH21[_0] 192s | appending IKE DH algorithm DH31[_0] 192s | appending IKE DH algorithm MODP4096[_0] 192s | appending IKE DH algorithm MODP3072[_0] 192s | appending IKE DH algorithm MODP2048[_0] 192s | appending IKE DH algorithm MODP8192[_0] 192s | parsing 'aes_gcm-sha2' for IKE 192s | proposal: 'aes_gcm-sha2' 192s | token: '' '' "aes_gcm" '-' 192s | token: '' "aes_gcm" '-' "sha2" '' 192s | token: '-' "sha2" '' '' 192s | appending IKE encryption algorithm AES_GCM_16[_0] 192s | parsing prf: 192s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 192s | token: '' '' '' 192s | - succeeded, advancing tokens 192s | appending IKE integrity algorithm NONE[_0] 192s | appending IKE DH algorithm DH19[_0] 192s | appending IKE DH algorithm DH20[_0] 192s | appending IKE DH algorithm DH21[_0] 192s | appending IKE DH algorithm DH31[_0] 192s | appending IKE DH algorithm MODP4096[_0] 192s | appending IKE DH algorithm MODP3072[_0] 192s | appending IKE DH algorithm MODP2048[_0] 192s | appending IKE DH algorithm MODP8192[_0] 192s | parsing 'aes_gcm-sha2-modp2048' for IKE 192s | proposal: 'aes_gcm-sha2-modp2048' 192s | token: '' '' "aes_gcm" '-' 192s | token: '' "aes_gcm" '-' "sha2" '-' 192s | token: '-' "sha2" '-' "modp2048" '' 192s | appending IKE encryption algorithm AES_GCM_16[_0] 192s | parsing prf: 192s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 192s | token: '-' "modp2048" '' '' 192s | - succeeded, advancing tokens 192s | parsing dh: 192s | appending IKE DH algorithm MODP2048[_0] 192s | token: '' '' '' 192s | appending IKE integrity algorithm NONE[_0] 192s | parsing 'aes_gcm-sha2;modp2048' for IKE 192s | proposal: 'aes_gcm-sha2;modp2048' 192s | token: '' '' "aes_gcm" '-' 192s | token: '' "aes_gcm" '-' "sha2" ';' 192s | token: '-' "sha2" ';' "modp2048" '' 192s | appending IKE encryption algorithm AES_GCM_16[_0] 192s | parsing prf: 192s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 192s | token: ';' "modp2048" '' '' 192s | - succeeded, advancing tokens 192s | parsing dh: 192s | appending IKE DH algorithm MODP2048[_0] 192s | token: '' '' '' 192s | appending IKE integrity algorithm NONE[_0] 192s | parsing 'aes_gcm-modp2048' for IKE 192s | proposal: 'aes_gcm-modp2048' 192s | token: '' '' "aes_gcm" '-' 192s | token: '' "aes_gcm" '-' "modp2048" '' 192s | token: '-' "modp2048" '' '' 192s | appending IKE encryption algorithm AES_GCM_16[_0] 192s | parsing prf: 192s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 192s | lookup for PRF algorithm 'modp2048' failed 192s | - failed, saving error 'IKE PRF algorithm 'modp2048' is not recognized' and tossing result 192s | parsing integ: 192s | ike_alg_byname() failed: IKE integrity algorithm 'modp2048' is not recognized 192s | lookup for integrity algorithm 'modp2048' failed 192s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'modp2048' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'modp2048' is not recognized') 192s | parsing 'aes_gcm;modp2048' for IKE 192s | proposal: 'aes_gcm;modp2048' 192s | token: '' '' "aes_gcm" ';' 192s | token: '' "aes_gcm" ';' "modp2048" '' 192s | token: ';' "modp2048" '' '' 192s | appending IKE encryption algorithm AES_GCM_16[_0] 192s | parsing dh: 192s | appending IKE DH algorithm MODP2048[_0] 192s | token: '' '' '' 192s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 192s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 192s | appending IKE integrity algorithm NONE[_0] 192s | parsing 'aes_gcm-none' for IKE 192s | proposal: 'aes_gcm-none' 192s | token: '' '' "aes_gcm" '-' 192s | token: '' "aes_gcm" '-' "none" '' 192s | token: '-' "none" '' '' 192s | appending IKE encryption algorithm AES_GCM_16[_0] 192s | parsing prf: 192s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 192s | lookup for PRF algorithm 'none' failed 192s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 192s | parsing integ: 192s | appending IKE integrity algorithm NONE[_0] 192s | token: '' '' '' 192s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 192s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 192s | appending IKE DH algorithm DH19[_0] 192s | appending IKE DH algorithm DH20[_0] 192s | appending IKE DH algorithm DH21[_0] 192s | appending IKE DH algorithm DH31[_0] 192s | appending IKE DH algorithm MODP4096[_0] 192s | appending IKE DH algorithm MODP3072[_0] 192s | appending IKE DH algorithm MODP2048[_0] 192s | appending IKE DH algorithm MODP8192[_0] 192s | parsing 'aes_gcm-none-sha2' for IKE 192s | proposal: 'aes_gcm-none-sha2' 192s | token: '' '' "aes_gcm" '-' 192s | token: '' "aes_gcm" '-' "none" '-' 192s | token: '-' "none" '-' "sha2" '' 192s | appending IKE encryption algorithm AES_GCM_16[_0] 192s | parsing prf: 192s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 192s | lookup for PRF algorithm 'none' failed 192s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 192s | parsing integ: 192s | appending IKE integrity algorithm NONE[_0] 192s | token: '-' "sha2" '' '' 192s | parsing prf: 192s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 192s | token: '' '' '' 192s | appending IKE DH algorithm DH19[_0] 192s | appending IKE DH algorithm DH20[_0] 192s | appending IKE DH algorithm DH21[_0] 192s | appending IKE DH algorithm DH31[_0] 192s | appending IKE DH algorithm MODP4096[_0] 192s | appending IKE DH algorithm MODP3072[_0] 192s | appending IKE DH algorithm MODP2048[_0] 192s | appending IKE DH algorithm MODP8192[_0] 192s ERROR: IKE PRF algorithm 'modp2048' is not recognized 192s algparse -v2 'ike=aes_gcm-none;modp2048' (expect SUCCESS) 192s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 192s algparse -v2 'ike=aes_gcm-sha1-none-modp2048' (expect ERROR) 192s ERROR: IKE proposal contains unexpected 'modp2048' 192s algparse -v2 'ike=aes_gcm-sha1-none;modp2048' (expect ERROR) 192s ERROR: IKE proposal contains unexpected 'modp2048' 192s algparse -v2 'ike=aes+aes_gcm' (expect ERROR) 192s ERROR: AEAD and non-AEAD IKE encryption algorithm cannot be combined 192s algparse -v2 'ike=,' (expect ERROR) 192s ERROR: IKE encryption algorithm is empty 192s algparse -v2 'ike=aes,' (expect ERROR) 192s ERROR: IKE encryption algorithm is empty 192s algparse -v2 'ike=aes,,aes' (expect ERROR) 192s ERROR: IKE encryption algorithm is empty 192s algparse -v2 'ike=,aes' (expect ERROR) 192s ERROR: IKE encryption algorithm is empty 192s algparse -v2 'ike=-' (expect ERROR) 192s ERROR: IKE encryption algorithm is empty 192s algparse -v2 'ike=+' (expect ERROR) 192s ERROR: IKE encryption algorithm is empty 192s algparse -v2 'ike=;' (expect ERROR) 192s ERROR: IKE encryption algorithm is empty 192s algparse -v2 'ike=aes-' (expect ERROR) 192s ERROR: IKE PRF algorithm is empty 192s algparse -v2 'ike=aes+' (expect ERROR) 192s ERROR: IKE encryption algorithm is empty 192s algparse -v2 'ike=aes;' (expect ERROR) 192s ERROR: IKE DH algorithm is empty 192s algparse -v2 'ike=-aes' (expect ERROR) 192s ERROR: IKE encryption algorithm is empty 192s algparse -v2 'ike=+aes' (expect ERROR) 192s ERROR: IKE encryption algorithm is empty 192s algparse -v2 'ike=;aes' (expect ERROR) 192s ERROR: IKE encryption algorithm is empty 192s algparse -v2 'ike=aes+-' (expect ERROR) 192s ERROR: IKE encryption algorithm is empty 192s algparse -v2 'ike=aes+;' (expect ERROR) 192s ERROR: IKE encryption algorithm is empty 192s algparse -v2 'ike=aes++' (expect ERROR) 192s | parsing 'aes_gcm-none-sha2-modp2048' for IKE 192s | proposal: 'aes_gcm-none-sha2-modp2048' 192s | token: '' '' "aes_gcm" '-' 192s | token: '' "aes_gcm" '-' "none" '-' 192s | token: '-' "none" '-' "sha2" '-' 192s | appending IKE encryption algorithm AES_GCM_16[_0] 192s | parsing prf: 192s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 192s | lookup for PRF algorithm 'none' failed 192s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 192s | parsing integ: 192s | appending IKE integrity algorithm NONE[_0] 192s | token: '-' "sha2" '-' "modp2048" '' 192s | parsing prf: 192s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 192s | token: '-' "modp2048" '' '' 192s | parsing dh: 192s | appending IKE DH algorithm MODP2048[_0] 192s | token: '' '' '' 192s | parsing 'aes_gcm-none-sha2;modp2048' for IKE 192s | proposal: 'aes_gcm-none-sha2;modp2048' 192s | token: '' '' "aes_gcm" '-' 192s | token: '' "aes_gcm" '-' "none" '-' 192s | token: '-' "none" '-' "sha2" ';' 192s | appending IKE encryption algorithm AES_GCM_16[_0] 192s | parsing prf: 192s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 192s | lookup for PRF algorithm 'none' failed 192s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 192s | parsing integ: 192s | appending IKE integrity algorithm NONE[_0] 192s | token: '-' "sha2" ';' "modp2048" '' 192s | parsing prf: 192s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 192s | token: ';' "modp2048" '' '' 192s | parsing dh: 192s | appending IKE DH algorithm MODP2048[_0] 192s | token: '' '' '' 192s | parsing 'aes_gcm-none-modp2048' for IKE 192s | proposal: 'aes_gcm-none-modp2048' 192s | token: '' '' "aes_gcm" '-' 192s | token: '' "aes_gcm" '-' "none" '-' 192s | token: '-' "none" '-' "modp2048" '' 192s | appending IKE encryption algorithm AES_GCM_16[_0] 192s | parsing prf: 192s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 192s | lookup for PRF algorithm 'none' failed 192s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 192s | parsing integ: 192s | appending IKE integrity algorithm NONE[_0] 192s | token: '-' "modp2048" '' '' 192s | parsing prf: 192s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 192s | lookup for PRF algorithm 'modp2048' failed 192s | -- failed 'IKE PRF algorithm 'modp2048' is not recognized' 192s | parsing 'aes_gcm-none;modp2048' for IKE 192s | proposal: 'aes_gcm-none;modp2048' 192s | token: '' '' "aes_gcm" '-' 192s | token: '' "aes_gcm" '-' "none" ';' 192s | token: '-' "none" ';' "modp2048" '' 192s | appending IKE encryption algorithm AES_GCM_16[_0] 192s | parsing prf: 192s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 192s | lookup for PRF algorithm 'none' failed 192s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 192s | parsing integ: 192s | appending IKE integrity algorithm NONE[_0] 192s | token: ';' "modp2048" '' '' 192s | parsing dh: 192s | appending IKE DH algorithm MODP2048[_0] 192s | token: '' '' '' 192s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 192s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 192s | parsing 'aes_gcm-sha1-none-modp2048' for IKE 192s | proposal: 'aes_gcm-sha1-none-modp2048' 192s | token: '' '' "aes_gcm" '-' 192s | token: '' "aes_gcm" '-' "sha1" '-' 192s | token: '-' "sha1" '-' "none" '-' 192s | appending IKE encryption algorithm AES_GCM_16[_0] 192s | parsing prf: 192s | appending IKE PRF algorithm HMAC_SHA1[_0] 192s | token: '-' "none" '-' "modp2048" '' 192s | - succeeded, advancing tokens 192s | parsing dh: 192s | appending IKE DH algorithm NONE[_0] 192s | token: '-' "modp2048" '' '' 192s | parsing 'aes_gcm-sha1-none;modp2048' for IKE 192s | proposal: 'aes_gcm-sha1-none;modp2048' 192s | token: '' '' "aes_gcm" '-' 192s | token: '' "aes_gcm" '-' "sha1" '-' 192s | token: '-' "sha1" '-' "none" ';' 192s | appending IKE encryption algorithm AES_GCM_16[_0] 192s | parsing prf: 192s | appending IKE PRF algorithm HMAC_SHA1[_0] 192s | token: '-' "none" ';' "modp2048" '' 192s | - succeeded, advancing tokens 192s | parsing dh: 192s | appending IKE DH algorithm NONE[_0] 192s | token: ';' "modp2048" '' '' 192s | parsing 'aes+aes_gcm' for IKE 192s | proposal: 'aes+aes_gcm' 192s | token: '' '' "aes" '+' 192s | token: '' "aes" '+' "aes_gcm" '' 192s | token: '+' "aes_gcm" '' '' 192s | appending IKE encryption algorithm AES_CBC[_0] 192s | token: '' '' '' 192s | appending IKE encryption algorithm AES_GCM_16[_0] 192s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 192s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 192s | appending IKE DH algorithm DH19[_0] 192s | appending IKE DH algorithm DH20[_0] 192s | appending IKE DH algorithm DH21[_0] 192s | appending IKE DH algorithm DH31[_0] 192s | appending IKE DH algorithm MODP4096[_0] 192s | appending IKE DH algorithm MODP3072[_0] 192s | appending IKE DH algorithm MODP2048[_0] 192s | appending IKE DH algorithm MODP8192[_0] 192s ERROR: IKE encryption algorithm is empty 192s testing -ta 192s | parsing ',' for IKE 192s | proposal: '' 192s | token: '' '' "" '' 192s | token: '' "" '' '' 192s | parsing 'aes,' for IKE 192s | proposal: 'aes' 192s | token: '' '' "aes" '' 192s | token: '' "aes" '' '' 192s | token: '' '' '' 192s | appending IKE encryption algorithm AES_CBC[_0] 192s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 192s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 192s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 192s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 192s | appending IKE DH algorithm DH19[_0] 192s | appending IKE DH algorithm DH20[_0] 192s | appending IKE DH algorithm DH21[_0] 192s | appending IKE DH algorithm DH31[_0] 192s | appending IKE DH algorithm MODP4096[_0] 192s | appending IKE DH algorithm MODP3072[_0] 192s | appending IKE DH algorithm MODP2048[_0] 192s | appending IKE DH algorithm MODP8192[_0] 192s | proposal: '' 192s | token: '' '' "" '' 192s | token: '' "" '' '' 192s | parsing 'aes,,aes' for IKE 192s | proposal: 'aes' 192s | token: '' '' "aes" '' 192s | token: '' "aes" '' '' 192s | token: '' '' '' 192s | appending IKE encryption algorithm AES_CBC[_0] 192s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 192s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 192s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 192s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 192s | appending IKE DH algorithm DH19[_0] 192s | appending IKE DH algorithm DH20[_0] 192s | appending IKE DH algorithm DH21[_0] 192s | appending IKE DH algorithm DH31[_0] 192s | appending IKE DH algorithm MODP4096[_0] 192s | appending IKE DH algorithm MODP3072[_0] 192s | appending IKE DH algorithm MODP2048[_0] 192s | appending IKE DH algorithm MODP8192[_0] 192s | proposal: '' 192s | token: '' '' "" '' 192s | token: '' "" '' '' 192s | parsing ',aes' for IKE 192s | proposal: '' 192s | token: '' '' "" '' 192s | token: '' "" '' '' 192s | parsing '-' for IKE 192s | proposal: '-' 192s | token: '' '' "" '-' 192s | token: '' "" '-' "" '' 192s | parsing '+' for IKE 192s | proposal: '+' 192s | token: '' '' "" '+' 192s | token: '' "" '+' "" '' 192s | parsing ';' for IKE 192s | proposal: ';' 192s | token: '' '' "" ';' 192s | token: '' "" ';' "" '' 192s | parsing 'aes-' for IKE 192s | proposal: 'aes-' 192s | token: '' '' "aes" '-' 192s | token: '' "aes" '-' "" '' 192s | token: '-' "" '' '' 192s | appending IKE encryption algorithm AES_CBC[_0] 192s | parsing prf: 192s | - failed, saving error 'IKE PRF algorithm is empty' and tossing result 192s | parsing integ: 192s | - and - failed, returning earlier PRF error 'IKE PRF algorithm is empty' and discarding INTEG error 'IKE integrity algorithm is empty') 192s | parsing 'aes+' for IKE 192s | proposal: 'aes+' 192s | token: '' '' "aes" '+' 192s | token: '' "aes" '+' "" '' 192s | token: '+' "" '' '' 192s | appending IKE encryption algorithm AES_CBC[_0] 192s | parsing 'aes;' for IKE 192s | proposal: 'aes;' 192s | token: '' '' "aes" ';' 192s | token: '' "aes" ';' "" '' 192s | token: ';' "" '' '' 192s | appending IKE encryption algorithm AES_CBC[_0] 192s | parsing dh: 192s | ... failed 'IKE DH algorithm is empty' 192s | parsing '-aes' for IKE 192s | proposal: '-aes' 192s | token: '' '' "" '-' 192s | token: '' "" '-' "aes" '' 192s | parsing '+aes' for IKE 192s | proposal: '+aes' 192s | token: '' '' "" '+' 192s | token: '' "" '+' "aes" '' 192s | parsing ';aes' for IKE 192s | proposal: ';aes' 192s | token: '' '' "" ';' 192s | token: '' "" ';' "aes" '' 192s | parsing 'aes+-' for IKE 192s | proposal: 'aes+-' 192s | token: '' '' "aes" '+' 192s | token: '' "aes" '+' "" '-' 192s | token: '+' "" '-' "" '' 192s | appending IKE encryption algorithm AES_CBC[_0] 192s | parsing 'aes+;' for IKE 192s | proposal: 'aes+;' 192s | token: '' '' "aes" '+' 192s | token: '' "aes" '+' "" ';' 192s | token: '+' "" ';' "" '' 192s | appending IKE encryption algorithm AES_CBC[_0] 192s | parsing 'aes++' for IKE 192s | proposal: 'aes++' 192s | token: '' '' "aes" '+' 192s | token: '' "aes" '+' "" '+' 192s | token: '+' "" '+' "" '' 192s | appending IKE encryption algorithm AES_CBC[_0] 192s ipsec algparse: leak detective found no leaks 192s ipsec algparse: Encryption algorithms: 192s ipsec algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 192s ipsec algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 192s ipsec algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 192s ipsec algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 192s ipsec algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 192s ipsec algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 192s ipsec algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 192s ipsec algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 192s ipsec algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 192s ipsec algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 192s ipsec algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 192s ipsec algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 192s ipsec algparse: NULL [] IKEv1: ESP IKEv2: ESP NULL 192s ipsec algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 192s ipsec algparse: Hash algorithms: 192s ipsec algparse: MD5 IKEv1: IKE IKEv2: NSS 192s ipsec algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 192s ipsec algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 192s ipsec algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 192s ipsec algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 192s ipsec algparse: IDENTITY IKEv1: IKEv2: FIPS 192s ipsec algparse: PRF algorithms: 192s ipsec algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 192s ipsec algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 192s ipsec algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 192s ipsec algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 192s ipsec algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 192s ipsec algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 192s ipsec algparse: Integrity algorithms: 192s ipsec algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 192s ipsec algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 192s ipsec algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 192s ipsec algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 192s ipsec algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 192s ipsec algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 192s ipsec algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 192s ipsec algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 192s ipsec algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 192s ipsec algparse: DH algorithms: 192s ipsec algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 192s ipsec algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 192s ipsec algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 192s ipsec algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 192s ipsec algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 192s ipsec algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 192s ipsec algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 192s ipsec algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 192s ipsec algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 192s ipsec algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 192s ipsec algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 192s ipsec algparse: IPCOMP algorithms: 192s ipsec algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 192s ipsec algparse: LZS IKEv1: IKEv2: ESP AH FIPS 192s ipsec algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 192s ipsec algparse: testing CAMELLIA_CBC: 192s ipsec algparse: Camellia: 16 bytes with 128-bit key 192s | decode_to_chunk() raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 192s | decode_to_chunk() output: 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d03090 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: CAMELLIA_CBC 192s | flags: ENCRYPT+DECRYPT 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3eb4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d03058 192s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 192s | decode_to_mac() output: 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | decode_to_chunk() new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 192s | decode_to_chunk() output: 192s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 192s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 192s | decode_to_chunk() output: 192s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | decode_to_chunk() ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 192s | decode_to_chunk() output: 192s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 192s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 192s | using IKEv1 IV 192s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 192s | verify_bytes() Camellia: 16 bytes with 128-bit key: encrypt: ok 192s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 192s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 192s | decode_to_mac() output: 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | decode_to_chunk() new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 192s | decode_to_chunk() output: 192s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 192s | decode_to_chunk() ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 192s | decode_to_chunk() output: 192s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 192s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 192s | decode_to_chunk() output: 192s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 192s | using IKEv1 IV 192s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 192s | verify_bytes() Camellia: 16 bytes with 128-bit key: decrypt: ok 192s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 192s ipsec algparse: Camellia: 16 bytes with 128-bit key 192s | decode_to_chunk() raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF" 192s | decode_to_chunk() output: 192s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d03090 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: CAMELLIA_CBC 192s | flags: ENCRYPT+DECRYPT 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3eb4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d03058 192s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 192s | decode_to_mac() output: 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | decode_to_chunk() new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 192s | decode_to_chunk() output: 192s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 192s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 192s | decode_to_chunk() output: 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 192s | decode_to_chunk() ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 192s | decode_to_chunk() output: 192s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 192s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 192s | using IKEv1 IV 192s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 192s | verify_bytes() Camellia: 16 bytes with 128-bit key: encrypt: ok 192s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 192s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 192s | decode_to_mac() output: 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | decode_to_chunk() new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 192s | decode_to_chunk() output: 192s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 192s | decode_to_chunk() ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 192s | decode_to_chunk() output: 192s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 192s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 192s | decode_to_chunk() output: 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 192s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 192s | using IKEv1 IV 192s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 192s | verify_bytes() Camellia: 16 bytes with 128-bit key: decrypt: ok 192s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 192s ipsec algparse: Camellia: 16 bytes with 256-bit key 192s | decode_to_chunk() raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 192s | decode_to_chunk() output: 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d03090 192s | key-offset: 0, key-size: 32 192s | EXTRACT_KEY_FROM_KEY: 192s | target: CAMELLIA_CBC 192s | flags: ENCRYPT+DECRYPT 192s | key_size: 32-bytes 192s | base: base-key@0x55ac0e3eb4d0 (48-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d03058 192s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 192s | decode_to_mac() output: 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | decode_to_chunk() new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 192s | decode_to_chunk() output: 192s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 192s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 192s | decode_to_chunk() output: 192s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | decode_to_chunk() ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 192s | decode_to_chunk() output: 192s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 192s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 192s | using IKEv1 IV 192s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 192s | verify_bytes() Camellia: 16 bytes with 256-bit key: encrypt: ok 192s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 192s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 192s | decode_to_mac() output: 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | decode_to_chunk() new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 192s | decode_to_chunk() output: 192s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 192s | decode_to_chunk() ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 192s | decode_to_chunk() output: 192s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 192s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 192s | decode_to_chunk() output: 192s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 192s | using IKEv1 IV 192s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 192s | verify_bytes() Camellia: 16 bytes with 256-bit key: decrypt: ok 192s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 192s ipsec algparse: Camellia: 16 bytes with 256-bit key 192s | decode_to_chunk() raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF FF EE DD CC BB AA 99 88 77 66 55 44 33 22 11 00" 192s | decode_to_chunk() output: 192s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 192s | ff ee dd cc bb aa 99 88 77 66 55 44 33 22 11 00 ........wfUD3".. 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d03090 192s | key-offset: 0, key-size: 32 192s | EXTRACT_KEY_FROM_KEY: 192s | target: CAMELLIA_CBC 192s | flags: ENCRYPT+DECRYPT 192s | key_size: 32-bytes 192s | base: base-key@0x55ac0e3eb4d0 (48-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d03058 192s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 192s | decode_to_mac() output: 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | decode_to_chunk() new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 192s | decode_to_chunk() output: 192s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 192s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 192s | decode_to_chunk() output: 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 192s | decode_to_chunk() ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 192s | decode_to_chunk() output: 192s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 192s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 192s | using IKEv1 IV 192s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 192s | verify_bytes() Camellia: 16 bytes with 256-bit key: encrypt: ok 192s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 192s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 192s | decode_to_mac() output: 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | decode_to_chunk() new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 192s | decode_to_chunk() output: 192s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 192s | decode_to_chunk() ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 192s | decode_to_chunk() output: 192s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 192s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 192s | decode_to_chunk() output: 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 192s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 192s | using IKEv1 IV 192s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 192s | verify_bytes() Camellia: 16 bytes with 256-bit key: decrypt: ok 192s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 192s ipsec algparse: testing AES_GCM_16: 192s ipsec algparse: empty string 192s | decode_to_chunk() raw_key: input "0xcf063a34d4a9a76c2c86787d3f96db71" 192s | decode_to_chunk() output: 192s | cf 06 3a 34 d4 a9 a7 6c 2c 86 78 7d 3f 96 db 71 ..:4...l,.x}?..q 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02fd0 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_GCM 192s | flags: ENCRYPT+DECRYPT 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3eb4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f98 192s | decode_to_chunk() salted IV: input "0x113b9785971864c83b01c787" 192s | decode_to_chunk() output: 192s | 11 3b 97 85 97 18 64 c8 3b 01 c7 87 .;....d.;... 192s | decode_to_chunk() AAD: input "" 192s | decode_to_chunk() output: 192s | 192s | decode_to_chunk() plaintext: input "" 192s | decode_to_chunk() output: 192s | 192s | decode_to_chunk() ciphertext: input "" 192s | decode_to_chunk() output: 192s | 192s | decode_to_chunk() tag: input "0x72ac8493e3a5228b5d130a69d2510e42" 192s | decode_to_chunk() output: 192s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 192s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 text+tag in: 192s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 192s | verify_bytes() empty string: output ciphertext: ok 192s | verify_bytes() empty string: TAG: ok 192s | test_gcm_vector() text+tag out: 192s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 192s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 text+tag in: 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | verify_bytes() empty string: output ciphertext: ok 192s | verify_bytes() empty string: TAG: ok 192s | test_gcm_vector() text+tag out: 192s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 192s ipsec algparse: one block 192s | decode_to_chunk() raw_key: input "0xe98b72a9881a84ca6b76e0f43e68647a" 192s | decode_to_chunk() output: 192s | e9 8b 72 a9 88 1a 84 ca 6b 76 e0 f4 3e 68 64 7a ..r.....kv..>hdz 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02fd0 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_GCM 192s | flags: ENCRYPT+DECRYPT 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3eb4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f98 192s | decode_to_chunk() salted IV: input "0x8b23299fde174053f3d652ba" 192s | decode_to_chunk() output: 192s | 8b 23 29 9f de 17 40 53 f3 d6 52 ba .#)...@S..R. 192s | decode_to_chunk() AAD: input "" 192s | decode_to_chunk() output: 192s | 192s | decode_to_chunk() plaintext: input "0x28286a321293253c3e0aa2704a278032" 192s | decode_to_chunk() output: 192s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 192s | decode_to_chunk() ciphertext: input "0x5a3c1cf1985dbb8bed818036fdd5ab42" 192s | decode_to_chunk() output: 192s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 192s | decode_to_chunk() tag: input "0x23c7ab0f952b7091cd324835043b5eb5" 192s | decode_to_chunk() output: 192s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 192s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 text+tag in: 192s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 192s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 192s | verify_bytes() one block: output ciphertext: ok 192s | verify_bytes() one block: TAG: ok 192s | test_gcm_vector() text+tag out: 192s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 192s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 192s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 text+tag in: 192s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | verify_bytes() one block: output ciphertext: ok 192s | verify_bytes() one block: TAG: ok 192s | test_gcm_vector() text+tag out: 192s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 192s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 192s ipsec algparse: two blocks 192s | decode_to_chunk() raw_key: input "0xbfd414a6212958a607a0f5d3ab48471d" 192s | decode_to_chunk() output: 192s | bf d4 14 a6 21 29 58 a6 07 a0 f5 d3 ab 48 47 1d ....!)X......HG. 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02fd0 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_GCM 192s | flags: ENCRYPT+DECRYPT 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3eb4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f98 192s | decode_to_chunk() salted IV: input "0x86d8ea0ab8e40dcc481cd0e2" 192s | decode_to_chunk() output: 192s | 86 d8 ea 0a b8 e4 0d cc 48 1c d0 e2 ........H... 192s | decode_to_chunk() AAD: input "" 192s | decode_to_chunk() output: 192s | 192s | decode_to_chunk() plaintext: input "0xa6b76a066e63392c9443e60272ceaeb9d25c991b0f2e55e2804e168c05ea591a" 192s | decode_to_chunk() output: 192s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 192s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 192s | decode_to_chunk() ciphertext: input "0x62171db33193292d930bf6647347652c1ef33316d7feca99d54f1db4fcf513f8" 192s | decode_to_chunk() output: 192s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 192s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 192s | decode_to_chunk() tag: input "0xc28280aa5c6c7a8bd366f28c1cfd1f6e" 192s | decode_to_chunk() output: 192s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 192s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 192s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 192s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 192s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 192s | verify_bytes() two blocks: output ciphertext: ok 192s | verify_bytes() two blocks: TAG: ok 192s | test_gcm_vector() text+tag out: 192s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 192s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 192s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 192s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 192s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 192s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | verify_bytes() two blocks: output ciphertext: ok 192s | verify_bytes() two blocks: TAG: ok 192s | test_gcm_vector() text+tag out: 192s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 192s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 192s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 192s ipsec algparse: two blocks with associated data 192s | decode_to_chunk() raw_key: input "0x95bcde70c094f04e3dd8259cafd88ce8" 192s | decode_to_chunk() output: 192s | 95 bc de 70 c0 94 f0 4e 3d d8 25 9c af d8 8c e8 ...p...N=.%..... 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02fd0 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_GCM 192s | flags: ENCRYPT+DECRYPT 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3eb4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f98 192s | decode_to_chunk() salted IV: input "0x12cf097ad22380432ff40a5c" 192s | decode_to_chunk() output: 192s | 12 cf 09 7a d2 23 80 43 2f f4 0a 5c ...z.#.C/..\ 192s | decode_to_chunk() AAD: input "0xc783a0cca10a8d9fb8d27d69659463f2" 192s | decode_to_chunk() output: 192s | c7 83 a0 cc a1 0a 8d 9f b8 d2 7d 69 65 94 63 f2 ..........}ie.c. 192s | decode_to_chunk() plaintext: input "0x32f51e837a9748838925066d69e87180f34a6437e6b396e5643b34cb2ee4f7b1" 192s | decode_to_chunk() output: 192s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 192s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 192s | decode_to_chunk() ciphertext: input "0x8a023ba477f5b809bddcda8f55e09064d6d88aaec99c1e141212ea5b08503660" 192s | decode_to_chunk() output: 192s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 192s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 192s | decode_to_chunk() tag: input "0x562f500dae635d60a769b466e15acd1e" 192s | decode_to_chunk() output: 192s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 192s | test_gcm_vector() DECRYPT: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 192s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 192s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 192s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 192s | verify_bytes() two blocks with associated data: output ciphertext: ok 192s | verify_bytes() two blocks with associated data: TAG: ok 192s | test_gcm_vector() text+tag out: 192s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 192s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 192s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 192s | test_gcm_vector() ENCRYPT: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 192s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 192s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | verify_bytes() two blocks with associated data: output ciphertext: ok 192s | verify_bytes() two blocks with associated data: TAG: ok 192s | test_gcm_vector() text+tag out: 192s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 192s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 192s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 192s ipsec algparse: testing AES_CTR: 192s ipsec algparse: Encrypting 16 octets using AES-CTR with 128-bit key 192s | decode_to_chunk() raw_key: input "0x AE 68 52 F8 12 10 67 CC 4B F7 A5 76 55 77 F3 9E" 192s | decode_to_chunk() output: 192s | ae 68 52 f8 12 10 67 cc 4b f7 a5 76 55 77 f3 9e .hR...g.K..vUw.. 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d03090 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_CTR 192s | flags: ENCRYPT+DECRYPT 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3eb4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d03058 192s | decode_to_mac() input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 192s | decode_to_mac() output: 192s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 192s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 192s | decode_to_chunk() output: 192s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 192s | decode_to_chunk() Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 192s | decode_to_chunk() output: 192s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 192s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 192s | decode_to_chunk() output: 192s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 192s | cipher_op_ctr_nss() enter AES_CTR 0x55ac0e3ebd60 use IKEv1 IV wire_iv 0 count 0 192s | ctr_param: count 32 iv 00000030000000000000000000000001 192s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 192s | do_aes_ctr: exit 192s | cipher_op_context_destroy_ctr_nss() 192s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: encrypt: ok 192s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: counter-block: ok 192s | decode_to_mac() input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 192s | decode_to_mac() output: 192s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 192s | decode_to_chunk() Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 192s | decode_to_chunk() output: 192s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 192s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 192s | decode_to_chunk() output: 192s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 192s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 192s | decode_to_chunk() output: 192s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 192s | cipher_op_ctr_nss() enter AES_CTR 0x55ac0e3ebd60 use IKEv1 IV wire_iv 0 count 0 192s | ctr_param: count 32 iv 00000030000000000000000000000001 192s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 192s | do_aes_ctr: exit 192s | cipher_op_context_destroy_ctr_nss() 192s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: decrypt: ok 192s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: counter-block: ok 192s ipsec algparse: Encrypting 32 octets using AES-CTR with 128-bit key 192s | decode_to_chunk() raw_key: input "0x 7E 24 06 78 17 FA E0 D7 43 D6 CE 1F 32 53 91 63" 192s | decode_to_chunk() output: 192s | 7e 24 06 78 17 fa e0 d7 43 d6 ce 1f 32 53 91 63 ~$.x....C...2S.c 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d03090 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_CTR 192s | flags: ENCRYPT+DECRYPT 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3eb4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d03058 192s | decode_to_mac() input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 192s | decode_to_mac() output: 192s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 192s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 192s | decode_to_chunk() output: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 192s | decode_to_chunk() Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 192s | decode_to_chunk() output: 192s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 192s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 192s | decode_to_chunk() expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 192s | decode_to_chunk() output: 192s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 .l...T;Y.H...... 192s | cipher_op_ctr_nss() enter AES_CTR 0x55ac0e3e8390 use IKEv1 IV wire_iv 0 count 0 192s | ctr_param: count 32 iv 006cb6dbc0543b59da48d90b00000001 192s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 192s | do_aes_ctr: exit 192s | cipher_op_context_destroy_ctr_nss() 192s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: encrypt: ok 192s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: counter-block: ok 192s | decode_to_mac() input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 192s | decode_to_mac() output: 192s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 192s | decode_to_chunk() Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 192s | decode_to_chunk() output: 192s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 192s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 192s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 192s | decode_to_chunk() output: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 192s | decode_to_chunk() expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 192s | decode_to_chunk() output: 192s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 .l...T;Y.H...... 192s | cipher_op_ctr_nss() enter AES_CTR 0x55ac0e3e8390 use IKEv1 IV wire_iv 0 count 0 192s | ctr_param: count 32 iv 006cb6dbc0543b59da48d90b00000001 192s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 192s | do_aes_ctr: exit 192s | cipher_op_context_destroy_ctr_nss() 192s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: decrypt: ok 192s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: counter-block: ok 192s ipsec algparse: Encrypting 36 octets using AES-CTR with 128-bit key 192s | decode_to_chunk() raw_key: input "0x 76 91 BE 03 5E 50 20 A8 AC 6E 61 85 29 F9 A0 DC" 192s | decode_to_chunk() output: 192s | 76 91 be 03 5e 50 20 a8 ac 6e 61 85 29 f9 a0 dc v...^P ..na.)... 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d03090 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_CTR 192s | flags: ENCRYPT+DECRYPT 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3eb4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d03058 192s | decode_to_mac() input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 192s | decode_to_mac() output: 192s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 192s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 192s | decode_to_chunk() output: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 192s | 20 21 22 23 !"# 192s | decode_to_chunk() Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 192s | decode_to_chunk() output: 192s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 192s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 192s | 25 b2 07 2f %../ 192s | decode_to_chunk() expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 192s | decode_to_chunk() output: 192s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 192s | cipher_op_ctr_nss() enter AES_CTR 0x55ac0e3e81f0 use IKEv1 IV wire_iv 0 count 0 192s | ctr_param: count 32 iv 00e0017b27777f3f4a1786f000000001 192s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 192s | do_aes_ctr: exit 192s | cipher_op_context_destroy_ctr_nss() 192s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: encrypt: ok 192s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: counter-block: ok 192s | decode_to_mac() input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 192s | decode_to_mac() output: 192s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 192s | decode_to_chunk() Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 192s | decode_to_chunk() output: 192s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 192s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 192s | 25 b2 07 2f %../ 192s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 192s | decode_to_chunk() output: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 192s | 20 21 22 23 !"# 192s | decode_to_chunk() expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 192s | decode_to_chunk() output: 192s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 192s | cipher_op_ctr_nss() enter AES_CTR 0x55ac0e3e81f0 use IKEv1 IV wire_iv 0 count 0 192s | ctr_param: count 32 iv 00e0017b27777f3f4a1786f000000001 192s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 192s | do_aes_ctr: exit 192s | cipher_op_context_destroy_ctr_nss() 192s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: decrypt: ok 192s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: counter-block: ok 192s ipsec algparse: Encrypting 16 octets using AES-CTR with 192-bit key 192s | decode_to_chunk() raw_key: input "0x16 AF 5B 14 5F C9 F5 79 C1 75 F9 3E 3B FB 0E ED86 3D 06 CC FD B7 85 15" 192s | decode_to_chunk() output: 192s | 16 af 5b 14 5f c9 f5 79 c1 75 f9 3e 3b fb 0e ed ..[._..y.u.>;... 192s | 86 3d 06 cc fd b7 85 15 .=...... 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d03090 192s | key-offset: 0, key-size: 24 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_CTR 192s | flags: ENCRYPT+DECRYPT 192s | key_size: 24-bytes 192s | base: base-key@0x55ac0e3eb4d0 (40-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d03058 192s | decode_to_mac() input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 192s | decode_to_mac() output: 192s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 192s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 192s | decode_to_chunk() output: 192s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 192s | decode_to_chunk() Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 192s | decode_to_chunk() output: 192s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 192s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 192s | decode_to_chunk() output: 192s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 192s | cipher_op_ctr_nss() enter AES_CTR 0x55ac0e3ebd40 use IKEv1 IV wire_iv 0 count 0 192s | ctr_param: count 32 iv 0000004836733c147d6d93cb00000001 192s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 192s | do_aes_ctr: exit 192s | cipher_op_context_destroy_ctr_nss() 192s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: encrypt: ok 192s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: counter-block: ok 192s | decode_to_mac() input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 192s | decode_to_mac() output: 192s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 192s | decode_to_chunk() Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 192s | decode_to_chunk() output: 192s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 192s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 192s | decode_to_chunk() output: 192s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 192s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 192s | decode_to_chunk() output: 192s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 192s | cipher_op_ctr_nss() enter AES_CTR 0x55ac0e3ebd40 use IKEv1 IV wire_iv 0 count 0 192s | ctr_param: count 32 iv 0000004836733c147d6d93cb00000001 192s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 192s | do_aes_ctr: exit 192s | cipher_op_context_destroy_ctr_nss() 192s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: decrypt: ok 192s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: counter-block: ok 192s ipsec algparse: Encrypting 32 octets using AES-CTR with 192-bit key 192s | decode_to_chunk() raw_key: input "0x7C 5C B2 40 1B 3D C3 3C 19 E7 34 08 19 E0 F6 9C67 8C 3D B8 E6 F6 A9 1A" 192s | decode_to_chunk() output: 192s | 7c 5c b2 40 1b 3d c3 3c 19 e7 34 08 19 e0 f6 9c |\.@.=.<..4..... 192s | 67 8c 3d b8 e6 f6 a9 1a g.=..... 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d03090 192s | key-offset: 0, key-size: 24 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_CTR 192s | flags: ENCRYPT+DECRYPT 192s | key_size: 24-bytes 192s | base: base-key@0x55ac0e3eb4d0 (40-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d03058 192s | decode_to_mac() input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 192s | decode_to_mac() output: 192s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 192s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 192s | decode_to_chunk() output: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 192s | decode_to_chunk() Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 192s | decode_to_chunk() output: 192s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 192s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 192s | decode_to_chunk() expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 192s | decode_to_chunk() output: 192s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 192s | cipher_op_ctr_nss() enter AES_CTR 0x55ac0e3e81f0 use IKEv1 IV wire_iv 0 count 0 192s | ctr_param: count 32 iv 0096b03b020c6eadc2cb500d00000001 192s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 192s | do_aes_ctr: exit 192s | cipher_op_context_destroy_ctr_nss() 192s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: encrypt: ok 192s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: counter-block: ok 192s | decode_to_mac() input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 192s | decode_to_mac() output: 192s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 192s | decode_to_chunk() Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 192s | decode_to_chunk() output: 192s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 192s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 192s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 192s | decode_to_chunk() output: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 192s | decode_to_chunk() expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 192s | decode_to_chunk() output: 192s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 192s | cipher_op_ctr_nss() enter AES_CTR 0x55ac0e3e81f0 use IKEv1 IV wire_iv 0 count 0 192s | ctr_param: count 32 iv 0096b03b020c6eadc2cb500d00000001 192s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 192s | do_aes_ctr: exit 192s | cipher_op_context_destroy_ctr_nss() 192s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: decrypt: ok 192s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: counter-block: ok 192s ipsec algparse: Encrypting 36 octets using AES-CTR with 192-bit key 192s | decode_to_chunk() raw_key: input "0x02 BF 39 1E E8 EC B1 59 B9 59 61 7B 09 65 27 9BF5 9B 60 A7 86 D3 E0 FE" 192s | decode_to_chunk() output: 192s | 02 bf 39 1e e8 ec b1 59 b9 59 61 7b 09 65 27 9b ..9....Y.Ya{.e'. 192s | f5 9b 60 a7 86 d3 e0 fe ..`..... 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d03090 192s | key-offset: 0, key-size: 24 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_CTR 192s | flags: ENCRYPT+DECRYPT 192s | key_size: 24-bytes 192s | base: base-key@0x55ac0e3eb4d0 (40-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d03058 192s | decode_to_mac() input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 192s | decode_to_mac() output: 192s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 192s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 192s | decode_to_chunk() output: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 192s | 20 21 22 23 !"# 192s | decode_to_chunk() Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 192s | decode_to_chunk() output: 192s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 192s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 192s | ab ee 09 35 ...5 192s | decode_to_chunk() expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 192s | decode_to_chunk() output: 192s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 192s | cipher_op_ctr_nss() enter AES_CTR 0x55ac0e3e81f0 use IKEv1 IV wire_iv 0 count 0 192s | ctr_param: count 32 iv 0007bdfd5cbd60278dcc091200000001 192s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 192s | do_aes_ctr: exit 192s | cipher_op_context_destroy_ctr_nss() 192s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: encrypt: ok 192s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: counter-block: ok 192s | decode_to_mac() input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 192s | decode_to_mac() output: 192s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 192s | decode_to_chunk() Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 192s | decode_to_chunk() output: 192s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 192s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 192s | ab ee 09 35 ...5 192s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 192s | decode_to_chunk() output: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 192s | 20 21 22 23 !"# 192s | decode_to_chunk() expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 192s | decode_to_chunk() output: 192s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 192s | cipher_op_ctr_nss() enter AES_CTR 0x55ac0e3e81f0 use IKEv1 IV wire_iv 0 count 0 192s | ctr_param: count 32 iv 0007bdfd5cbd60278dcc091200000001 192s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 192s | do_aes_ctr: exit 192s | cipher_op_context_destroy_ctr_nss() 192s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: decrypt: ok 192s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: counter-block: ok 192s ipsec algparse: Encrypting 16 octets using AES-CTR with 256-bit key 192s | decode_to_chunk() raw_key: input "0x77 6B EF F2 85 1D B0 6F 4C 8A 05 42 C8 69 6F 6C6A 81 AF 1E EC 96 B4 D3 7F C1 D6 89 E6 C1 C1 04" 192s | decode_to_chunk() output: 192s | 77 6b ef f2 85 1d b0 6f 4c 8a 05 42 c8 69 6f 6c wk.....oL..B.iol 192s | 6a 81 af 1e ec 96 b4 d3 7f c1 d6 89 e6 c1 c1 04 j............... 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d03090 192s | key-offset: 0, key-size: 32 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_CTR 192s | flags: ENCRYPT+DECRYPT 192s | key_size: 32-bytes 192s | base: base-key@0x55ac0e3eb4d0 (48-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d03058 192s | decode_to_mac() input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 192s | decode_to_mac() output: 192s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 192s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 192s | decode_to_chunk() output: 192s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 192s | decode_to_chunk() Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 192s | decode_to_chunk() output: 192s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 192s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 192s | decode_to_chunk() output: 192s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 192s | cipher_op_ctr_nss() enter AES_CTR 0x55ac0e3ebd40 use IKEv1 IV wire_iv 0 count 0 192s | ctr_param: count 32 iv 00000060db5672c97aa8f0b200000001 192s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 192s | do_aes_ctr: exit 192s | cipher_op_context_destroy_ctr_nss() 192s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: encrypt: ok 192s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: counter-block: ok 192s | decode_to_mac() input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 192s | decode_to_mac() output: 192s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 192s | decode_to_chunk() Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 192s | decode_to_chunk() output: 192s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 192s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 192s | decode_to_chunk() output: 192s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 192s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 192s | decode_to_chunk() output: 192s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 192s | cipher_op_ctr_nss() enter AES_CTR 0x55ac0e3ebd40 use IKEv1 IV wire_iv 0 count 0 192s | ctr_param: count 32 iv 00000060db5672c97aa8f0b200000001 192s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 192s | do_aes_ctr: exit 192s | cipher_op_context_destroy_ctr_nss() 192s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: decrypt: ok 192s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: counter-block: ok 192s ipsec algparse: Encrypting 32 octets using AES-CTR with 256-bit key 192s | decode_to_chunk() raw_key: input "0xF6 D6 6D 6B D5 2D 59 BB 07 96 36 58 79 EF F8 86C6 6D D5 1A 5B 6A 99 74 4B 50 59 0C 87 A2 38 84" 192s | decode_to_chunk() output: 192s | f6 d6 6d 6b d5 2d 59 bb 07 96 36 58 79 ef f8 86 ..mk.-Y...6Xy... 192s | c6 6d d5 1a 5b 6a 99 74 4b 50 59 0c 87 a2 38 84 .m..[j.tKPY...8. 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d03090 192s | key-offset: 0, key-size: 32 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_CTR 192s | flags: ENCRYPT+DECRYPT 192s | key_size: 32-bytes 192s | base: base-key@0x55ac0e3eb4d0 (48-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d03058 192s | decode_to_mac() input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 192s | decode_to_mac() output: 192s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 192s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 192s | decode_to_chunk() output: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 192s | decode_to_chunk() Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 192s | decode_to_chunk() output: 192s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 192s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 192s | decode_to_chunk() expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 192s | decode_to_chunk() output: 192s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 192s | cipher_op_ctr_nss() enter AES_CTR 0x55ac0e3e81f0 use IKEv1 IV wire_iv 0 count 0 192s | ctr_param: count 32 iv 00faac24c1585ef15a43d87500000001 192s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 192s | do_aes_ctr: exit 192s | cipher_op_context_destroy_ctr_nss() 192s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: encrypt: ok 192s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: counter-block: ok 192s | decode_to_mac() input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 192s | decode_to_mac() output: 192s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 192s | decode_to_chunk() Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 192s | decode_to_chunk() output: 192s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 192s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 192s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 192s | decode_to_chunk() output: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 192s | decode_to_chunk() expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 192s | decode_to_chunk() output: 192s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 192s | cipher_op_ctr_nss() enter AES_CTR 0x55ac0e3e81f0 use IKEv1 IV wire_iv 0 count 0 192s | ctr_param: count 32 iv 00faac24c1585ef15a43d87500000001 192s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 192s | do_aes_ctr: exit 192s | cipher_op_context_destroy_ctr_nss() 192s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: decrypt: ok 192s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: counter-block: ok 192s ipsec algparse: Encrypting 36 octets using AES-CTR with 256-bit key 192s | decode_to_chunk() raw_key: input "0xFF 7A 61 7C E6 91 48 E4 F1 72 6E 2F 43 58 1D E2AA 62 D9 F8 05 53 2E DF F1 EE D6 87 FB 54 15 3D" 192s | decode_to_chunk() output: 192s | ff 7a 61 7c e6 91 48 e4 f1 72 6e 2f 43 58 1d e2 .za|..H..rn/CX.. 192s | aa 62 d9 f8 05 53 2e df f1 ee d6 87 fb 54 15 3d .b...S.......T.= 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d03090 192s | key-offset: 0, key-size: 32 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_CTR 192s | flags: ENCRYPT+DECRYPT 192s | key_size: 32-bytes 192s | base: base-key@0x55ac0e3eb4d0 (48-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d03058 192s | decode_to_mac() input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 192s | decode_to_mac() output: 192s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 192s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 192s | decode_to_chunk() output: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 192s | 20 21 22 23 !"# 192s | decode_to_chunk() Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 192s | decode_to_chunk() output: 192s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 192s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 192s | 1e c0 e6 b8 .... 192s | decode_to_chunk() expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 192s | decode_to_chunk() output: 192s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 192s | cipher_op_ctr_nss() enter AES_CTR 0x55ac0e3e81f0 use IKEv1 IV wire_iv 0 count 0 192s | ctr_param: count 32 iv 001cc5b751a51d70a1c1114800000001 192s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 192s | do_aes_ctr: exit 192s | cipher_op_context_destroy_ctr_nss() 192s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: encrypt: ok 192s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: counter-block: ok 192s | decode_to_mac() input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 192s | decode_to_mac() output: 192s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 192s | decode_to_chunk() Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 192s | decode_to_chunk() output: 192s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 192s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 192s | 1e c0 e6 b8 .... 192s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 192s | decode_to_chunk() output: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 192s | 20 21 22 23 !"# 192s | decode_to_chunk() expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 192s | decode_to_chunk() output: 192s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 192s | cipher_op_ctr_nss() enter AES_CTR 0x55ac0e3e81f0 use IKEv1 IV wire_iv 0 count 0 192s | ctr_param: count 32 iv 001cc5b751a51d70a1c1114800000001 192s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 192s | do_aes_ctr: exit 192s | cipher_op_context_destroy_ctr_nss() 192s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: decrypt: ok 192s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: counter-block: ok 192s ipsec algparse: testing AES_CBC: 192s ipsec algparse: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 192s | decode_to_chunk() raw_key: input "0x06a9214036b8a15b512e03d534120006" 192s | decode_to_chunk() output: 192s | 06 a9 21 40 36 b8 a1 5b 51 2e 03 d5 34 12 00 06 ..!@6..[Q...4... 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d03090 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_CBC 192s | flags: ENCRYPT+DECRYPT 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3eb4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d03058 192s | decode_to_mac() IV: : input "0x3dafba429d9eb430b422da802c9fac41" 192s | decode_to_mac() output: 192s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 192s | decode_to_chunk() new IV: : input "0xe353779c1079aeb82708942dbe77181a" 192s | decode_to_chunk() output: 192s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 192s | decode_to_chunk() plaintext: : input "Single block msg" 192s | decode_to_chunk() output: 192s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 192s | decode_to_chunk() ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 192s | decode_to_chunk() output: 192s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 192s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 192s | using IKEv1 IV 192s | NSS ike_alg_nss_cbc: AES_CBC - exit 192s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: encrypt: ok 192s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: updated CBC IV: ok 192s | decode_to_mac() IV: : input "0x3dafba429d9eb430b422da802c9fac41" 192s | decode_to_mac() output: 192s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 192s | decode_to_chunk() new IV: : input "0xe353779c1079aeb82708942dbe77181a" 192s | decode_to_chunk() output: 192s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 192s | decode_to_chunk() ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 192s | decode_to_chunk() output: 192s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 192s | decode_to_chunk() plaintext: : input "Single block msg" 192s | decode_to_chunk() output: 192s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 192s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 192s | using IKEv1 IV 192s | NSS ike_alg_nss_cbc: AES_CBC - exit 192s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: decrypt: ok 192s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: updated CBC IV: ok 192s ipsec algparse: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 192s | decode_to_chunk() raw_key: input "0xc286696d887c9aa0611bbb3e2025a45a" 192s | decode_to_chunk() output: 192s | c2 86 69 6d 88 7c 9a a0 61 1b bb 3e 20 25 a4 5a ..im.|..a..> %.Z 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d03090 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_CBC 192s | flags: ENCRYPT+DECRYPT 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3eb4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d03058 192s | decode_to_mac() IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 192s | decode_to_mac() output: 192s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 192s | decode_to_chunk() new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 192s | decode_to_chunk() output: 192s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 192s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 192s | decode_to_chunk() plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 192s | decode_to_chunk() output: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 192s | decode_to_chunk() ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 192s | decode_to_chunk() output: 192s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 192s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 192s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 192s | using IKEv1 IV 192s | NSS ike_alg_nss_cbc: AES_CBC - exit 192s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: encrypt: ok 192s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 192s | decode_to_mac() IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 192s | decode_to_mac() output: 192s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 192s | decode_to_chunk() new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 192s | decode_to_chunk() output: 192s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 192s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 192s | decode_to_chunk() ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 192s | decode_to_chunk() output: 192s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 192s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 192s | decode_to_chunk() plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 192s | decode_to_chunk() output: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 192s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 192s | using IKEv1 IV 192s | NSS ike_alg_nss_cbc: AES_CBC - exit 192s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: decrypt: ok 192s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 192s ipsec algparse: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 192s | decode_to_chunk() raw_key: input "0x6c3ea0477630ce21a2ce334aa746c2cd" 192s | decode_to_chunk() output: 192s | 6c 3e a0 47 76 30 ce 21 a2 ce 33 4a a7 46 c2 cd l>.Gv0.!..3J.F.. 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d03090 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_CBC 192s | flags: ENCRYPT+DECRYPT 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3eb4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d03058 192s | decode_to_mac() IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 192s | decode_to_mac() output: 192s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 192s | decode_to_chunk() new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 192s | decode_to_chunk() output: 192s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 192s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 192s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 192s | decode_to_chunk() plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 192s | decode_to_chunk() output: 192s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 192s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 192s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 192s | decode_to_chunk() ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 192s | decode_to_chunk() output: 192s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 192s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 192s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 192s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 192s | using IKEv1 IV 192s | NSS ike_alg_nss_cbc: AES_CBC - exit 192s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: encrypt: ok 192s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 192s | decode_to_mac() IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 192s | decode_to_mac() output: 192s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 192s | decode_to_chunk() new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 192s | decode_to_chunk() output: 192s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 192s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 192s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 192s | decode_to_chunk() ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 192s | decode_to_chunk() output: 192s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 192s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 192s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 192s | decode_to_chunk() plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 192s | decode_to_chunk() output: 192s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 192s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 192s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 192s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 192s | using IKEv1 IV 192s | NSS ike_alg_nss_cbc: AES_CBC - exit 192s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: decrypt: ok 192s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 192s ipsec algparse: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 192s | decode_to_chunk() raw_key: input "0x56e47a38c5598974bc46903dba290349" 192s | decode_to_chunk() output: 192s | 56 e4 7a 38 c5 59 89 74 bc 46 90 3d ba 29 03 49 V.z8.Y.t.F.=.).I 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d03090 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_CBC 192s | flags: ENCRYPT+DECRYPT 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3eb4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d03058 192s | decode_to_mac() IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 192s | decode_to_mac() output: 192s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 192s | decode_to_chunk() plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 192s | decode_to_chunk() output: 192s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 192s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 192s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 192s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 192s | decode_to_chunk() ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 192s | decode_to_chunk() output: 192s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 192s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 192s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 192s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 192s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 192s | using IKEv1 IV 192s | NSS ike_alg_nss_cbc: AES_CBC - exit 192s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: encrypt: ok 192s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 192s | decode_to_mac() IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 192s | decode_to_mac() output: 192s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 192s | decode_to_chunk() ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 192s | decode_to_chunk() output: 192s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 192s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 192s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 192s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 192s | decode_to_chunk() plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 192s | decode_to_chunk() output: 192s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 192s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 192s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 192s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 192s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 192s | using IKEv1 IV 192s | NSS ike_alg_nss_cbc: AES_CBC - exit 192s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: decrypt: ok 192s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 192s ipsec algparse: testing AES_XCBC: 192s ipsec algparse: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 192s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 192s | decode_to_chunk() output: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | decode_to_chunk() test_prf_vector: input "" 192s | decode_to_chunk() output: 192s | 192s | decode_to_chunk() test_prf_vector: input "0x75f0251d528ac01c4573dfd584d79f29" 192s | decode_to_chunk() output: 192s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 192s | PRF chunk interface PRF AES_XCBC init key hunk 0x55ac0e3eb800 (length 16) 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02f80 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: EXTRACT_KEY_FROM_KEY 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3eb4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f18 192s | XCBC: Key 16=16 just right 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3e9de0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02ec8 192s | PRF chunk interface PRF AES_XCBC 0x55ac0e3e8460 192s | PRF chunk interface PRF AES_XCBC update message (0x55ac0e3e9d10 length 0) 192s | 192s | XCBC: data 192s | 192s | K extracting all 16 bytes of key@0x55ac0e3eb4d0 192s | K: symkey-key@0x55ac0e3eb4d0 (16-bytes, AES_ECB) 192s | sizeof bytes 16 192s | wrapper: (SECItemType)538976288: 90 0d d4 37 72 ec e4 85 bb 1c c8 ac f3 54 47 0e 192s | K extracted len 16 bytes at 0x55ac0e3ec010 192s | unwrapped: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | XCBC: K: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | XCBC: K1 192s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02e30 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3ec1a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02e18 192s | Computing E[0] using K3 192s | XCBC: K3 192s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 192s | XCBC: E[n-1] 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | XCBC: M[n] 192s | 192s | XCBC: M[n] 192s | 192s | XCBC: M[n]:80...^E[n-1]^K3 192s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 192s | XCBC: MAC 192s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 192s | PRF chunk interface PRF AES_XCBC final length 16 192s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 192s | chunk output 192s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 192s | verify_bytes() RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: prf OUT: ok 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d03000 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: EXTRACT_KEY_FROM_KEY 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3e9de0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f98 192s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x55ac0e3eb4d0 (size 16) 192s | PRF symkey interface: key symkey-key@0x55ac0e3eb4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | XCBC: Key 16=16 just right 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3eb4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f08 192s | PRF symkey interface PRF AES_XCBC 0x55ac0e3e8460 192s | PRF symkey interface PRF AES_XCBC update symkey message-key@(nil) (size 0) 192s | PRF symkey interface: symkey message-key@NULL 192s | symkey message NULL key has no bytes 192s | XCBC: data 192s | 192s | K extracting all 16 bytes of key@0x55ac0e3e9de0 192s | K: symkey-key@0x55ac0e3e9de0 (16-bytes, AES_ECB) 192s | sizeof bytes 16 192s | wrapper: (SECItemType)-976213376: 90 0d d4 37 72 ec e4 85 bb 1c c8 ac f3 54 47 0e 192s | K extracted len 16 bytes at 0x55ac0e3ec010 192s | unwrapped: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | XCBC: K: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | XCBC: K1 192s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02e80 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3ec4e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02e68 192s | Computing E[0] using K3 192s | XCBC: K3 192s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 192s | XCBC: E[n-1] 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | XCBC: M[n] 192s | 192s | XCBC: M[n] 192s | 192s | XCBC: M[n]:80...^E[n-1]^K3 192s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 192s | XCBC: MAC 192s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02f90 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: EXTRACT_KEY_FROM_KEY 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3ec4e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f28 192s | PRF symkey interface PRF AES_XCBC final-key@0x55ac0e3ec1a0 (size 16) 192s | PRF symkey interface: key-key@0x55ac0e3ec1a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | output: symkey-key@0x55ac0e3ec1a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracting all 16 bytes of key@0x55ac0e3ec1a0 192s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: symkey-key@0x55ac0e3ec1a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | sizeof bytes 16 192s | wrapper: (SECItemType)976: 06 a2 a4 2c 3f f4 e7 d2 12 dc 67 8b d1 6e bc 5a 192s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracted len 16 bytes at 0x55ac0e3ec180 192s | unwrapped: 192s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 192s | verify_bytes() RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: symkey: ok 192s ipsec algparse: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 192s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 192s | decode_to_chunk() output: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | decode_to_chunk() test_prf_vector: input "0x000102" 192s | decode_to_chunk() output: 192s | 00 01 02 ... 192s | decode_to_chunk() test_prf_vector: input "0x5b376580ae2f19afe7219ceef172756f" 192s | decode_to_chunk() output: 192s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 192s | PRF chunk interface PRF AES_XCBC init key hunk 0x55ac0e3eb800 (length 16) 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02f80 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: EXTRACT_KEY_FROM_KEY 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3eb4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f18 192s | XCBC: Key 16=16 just right 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3ec1a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02ec8 192s | PRF chunk interface PRF AES_XCBC 0x55ac0e3e8460 192s | PRF chunk interface PRF AES_XCBC update message (0x55ac0e3e9d10 length 3) 192s | 00 01 02 ... 192s | XCBC: data 192s | 00 01 02 ... 192s | K extracting all 16 bytes of key@0x55ac0e3eb4d0 192s | K: symkey-key@0x55ac0e3eb4d0 (16-bytes, AES_ECB) 192s | sizeof bytes 16 192s | wrapper: (SECItemType)538976288: 90 0d d4 37 72 ec e4 85 bb 1c c8 ac f3 54 47 0e 192s | K extracted len 16 bytes at 0x55ac0e3eb820 192s | unwrapped: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | XCBC: K: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | XCBC: K1 192s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02e30 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3e9de0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02e18 192s | Computing E[1] using K3 192s | XCBC: K3 192s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 192s | XCBC: E[n-1] 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | XCBC: M[n] 192s | 00 01 02 ... 192s | XCBC: M[n] 192s | 00 01 02 ... 192s | XCBC: M[n]:80...^E[n-1]^K3 192s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 192s | XCBC: MAC 192s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 192s | PRF chunk interface PRF AES_XCBC final length 16 192s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 192s | chunk output 192s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 192s | verify_bytes() RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: prf OUT: ok 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d03000 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: EXTRACT_KEY_FROM_KEY 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3ec1a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f98 192s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x55ac0e3eb4d0 (size 16) 192s | PRF symkey interface: key symkey-key@0x55ac0e3eb4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | XCBC: Key 16=16 just right 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3eb4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f08 192s | PRF symkey interface PRF AES_XCBC 0x55ac0e3e8460 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d03000 192s | key-offset: 0, key-size: 3 192s | EXTRACT_KEY_FROM_KEY: 192s | target: EXTRACT_KEY_FROM_KEY 192s | key_size: 3-bytes 192s | base: base-key@0x55ac0e3ec4e0 (19-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f98 192s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x55ac0e3e9de0 (size 3) 192s | PRF symkey interface: symkey message-key@0x55ac0e3e9de0 (3-bytes, EXTRACT_KEY_FROM_KEY) 192s | symkey message extracting all 3 bytes of key@0x55ac0e3e9de0 192s | symkey message: symkey-key@0x55ac0e3e9de0 (3-bytes, EXTRACT_KEY_FROM_KEY) 192s | sizeof bytes 16 192s | wrapper: (SECItemType)-976213104: 68 6f cc 7a 0a d5 70 58 d5 c8 11 74 ae 65 50 09 192s | symkey message extracted len 16 bytes at 0x55ac0e3eb820 192s | unwrapped: 192s | 00 01 02 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | XCBC: data 192s | 00 01 02 ... 192s | K extracting all 16 bytes of key@0x55ac0e3ec1a0 192s | K: symkey-key@0x55ac0e3ec1a0 (16-bytes, AES_ECB) 192s | sizeof bytes 16 192s | wrapper: (SECItemType)-976213312: 90 0d d4 37 72 ec e4 85 bb 1c c8 ac f3 54 47 0e 192s | K extracted len 16 bytes at 0x55ac0e3e8390 192s | unwrapped: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | XCBC: K: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | XCBC: K1 192s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02e80 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3ec840 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02e68 192s | Computing E[1] using K3 192s | XCBC: K3 192s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 192s | XCBC: E[n-1] 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | XCBC: M[n] 192s | 00 01 02 ... 192s | XCBC: M[n] 192s | 00 01 02 ... 192s | XCBC: M[n]:80...^E[n-1]^K3 192s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 192s | XCBC: MAC 192s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02f90 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: EXTRACT_KEY_FROM_KEY 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3ec840 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f28 192s | PRF symkey interface PRF AES_XCBC final-key@0x55ac0e3ec4e0 (size 16) 192s | PRF symkey interface: key-key@0x55ac0e3ec4e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | output: symkey-key@0x55ac0e3ec4e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracting all 16 bytes of key@0x55ac0e3ec4e0 192s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: symkey-key@0x55ac0e3ec4e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | sizeof bytes 16 192s | wrapper: (SECItemType)976: 0a 2f cd 9e d0 12 8e ae 73 40 dc 9f 3e e9 85 f0 192s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracted len 16 bytes at 0x55ac0e3e8390 192s | unwrapped: 192s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 192s | verify_bytes() RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: symkey: ok 192s ipsec algparse: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 192s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 192s | decode_to_chunk() output: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 192s | decode_to_chunk() output: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | decode_to_chunk() test_prf_vector: input "0xd2a246fa349b68a79998a4394ff7a263" 192s | decode_to_chunk() output: 192s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 192s | PRF chunk interface PRF AES_XCBC init key hunk 0x55ac0e3eb800 (length 16) 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02f80 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: EXTRACT_KEY_FROM_KEY 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3eb4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f18 192s | XCBC: Key 16=16 just right 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3ec4e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02ec8 192s | PRF chunk interface PRF AES_XCBC 0x55ac0e3e8460 192s | PRF chunk interface PRF AES_XCBC update message (0x55ac0e3e9d10 length 16) 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | XCBC: data 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | K extracting all 16 bytes of key@0x55ac0e3eb4d0 192s | K: symkey-key@0x55ac0e3eb4d0 (16-bytes, AES_ECB) 192s | sizeof bytes 16 192s | wrapper: (SECItemType)543502368: 90 0d d4 37 72 ec e4 85 bb 1c c8 ac f3 54 47 0e 192s | K extracted len 16 bytes at 0x55ac0e3ec010 192s | unwrapped: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | XCBC: K: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | XCBC: K1 192s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02e30 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3e9de0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02e18 192s | XCBC: Computing E[1] using K2 192s | XCBC: K2 192s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 192s | XCBC: E[n-1] 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | XCBC: M[n] 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | XCBC: M[n]^E[n-1]^K2 192s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 192s | XCBC: MAC 192s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 192s | PRF chunk interface PRF AES_XCBC final length 16 192s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 192s | chunk output 192s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 192s | verify_bytes() RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: prf OUT: ok 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d03000 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: EXTRACT_KEY_FROM_KEY 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3ec4e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f98 192s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x55ac0e3eb4d0 (size 16) 192s | PRF symkey interface: key symkey-key@0x55ac0e3eb4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | XCBC: Key 16=16 just right 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3eb4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f08 192s | PRF symkey interface PRF AES_XCBC 0x55ac0e3e8460 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d03000 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: EXTRACT_KEY_FROM_KEY 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3ec1a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f98 192s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x55ac0e3e9de0 (size 16) 192s | PRF symkey interface: symkey message-key@0x55ac0e3e9de0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | symkey message extracting all 16 bytes of key@0x55ac0e3e9de0 192s | symkey message: symkey-key@0x55ac0e3e9de0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | sizeof bytes 16 192s | wrapper: (SECItemType)-976213104: 90 0d d4 37 72 ec e4 85 bb 1c c8 ac f3 54 47 0e 192s | symkey message extracted len 16 bytes at 0x55ac0e3ec010 192s | unwrapped: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | XCBC: data 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | K extracting all 16 bytes of key@0x55ac0e3ec4e0 192s | K: symkey-key@0x55ac0e3ec4e0 (16-bytes, AES_ECB) 192s | sizeof bytes 16 192s | wrapper: (SECItemType)-976213312: 90 0d d4 37 72 ec e4 85 bb 1c c8 ac f3 54 47 0e 192s | K extracted len 16 bytes at 0x55ac0e3e81f0 192s | unwrapped: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | XCBC: K: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | XCBC: K1 192s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02e80 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3ec840 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02e68 192s | XCBC: Computing E[1] using K2 192s | XCBC: K2 192s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 192s | XCBC: E[n-1] 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | XCBC: M[n] 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | XCBC: M[n]^E[n-1]^K2 192s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 192s | XCBC: MAC 192s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02f90 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: EXTRACT_KEY_FROM_KEY 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3ec840 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f28 192s | PRF symkey interface PRF AES_XCBC final-key@0x55ac0e3ec1a0 (size 16) 192s | PRF symkey interface: key-key@0x55ac0e3ec1a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | output: symkey-key@0x55ac0e3ec1a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracting all 16 bytes of key@0x55ac0e3ec1a0 192s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: symkey-key@0x55ac0e3ec1a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | sizeof bytes 16 192s | wrapper: (SECItemType)976: 8e 18 58 a7 d5 02 4d 70 f8 54 79 1e 66 18 35 b2 192s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracted len 16 bytes at 0x55ac0e3e81f0 192s | unwrapped: 192s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 192s | verify_bytes() RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: symkey: ok 192s ipsec algparse: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 192s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 192s | decode_to_chunk() output: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 192s | decode_to_chunk() output: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 .... 192s | decode_to_chunk() test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 192s | decode_to_chunk() output: 192s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 192s | PRF chunk interface PRF AES_XCBC init key hunk 0x55ac0e3eb800 (length 16) 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02f80 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: EXTRACT_KEY_FROM_KEY 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3eb4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f18 192s | XCBC: Key 16=16 just right 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3ec1a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02ec8 192s | PRF chunk interface PRF AES_XCBC 0x55ac0e3e8460 192s | PRF chunk interface PRF AES_XCBC update message (0x55ac0e3e9d10 length 20) 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 .... 192s | XCBC: data 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 .... 192s | K extracting all 16 bytes of key@0x55ac0e3eb4d0 192s | K: symkey-key@0x55ac0e3eb4d0 (16-bytes, AES_ECB) 192s | sizeof bytes 16 192s | wrapper: (SECItemType)538976288: 90 0d d4 37 72 ec e4 85 bb 1c c8 ac f3 54 47 0e 192s | K extracted len 16 bytes at 0x55ac0e3ebb10 192s | unwrapped: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | XCBC: K: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | XCBC: K1 192s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02e30 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3e9de0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02e18 192s | Computing E[2] using K3 192s | XCBC: K3 192s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 192s | XCBC: E[n-1] 192s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 192s | XCBC: M[n] 192s | 10 11 12 13 .... 192s | XCBC: M[n] 192s | 10 11 12 13 .... 192s | XCBC: M[n]:80...^E[n-1]^K3 192s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 192s | XCBC: MAC 192s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 192s | PRF chunk interface PRF AES_XCBC final length 16 192s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 192s | chunk output 192s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 192s | verify_bytes() RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: prf OUT: ok 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d03000 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: EXTRACT_KEY_FROM_KEY 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3ec1a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f98 192s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x55ac0e3eb4d0 (size 16) 192s | PRF symkey interface: key symkey-key@0x55ac0e3eb4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | XCBC: Key 16=16 just right 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3eb4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f08 192s | PRF symkey interface PRF AES_XCBC 0x55ac0e3e8460 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d03000 192s | key-offset: 0, key-size: 20 192s | EXTRACT_KEY_FROM_KEY: 192s | target: EXTRACT_KEY_FROM_KEY 192s | key_size: 20-bytes 192s | base: base-key@0x55ac0e3ec4e0 (36-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f98 192s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x55ac0e3e9de0 (size 20) 192s | PRF symkey interface: symkey message-key@0x55ac0e3e9de0 (20-bytes, EXTRACT_KEY_FROM_KEY) 192s | symkey message extracting all 20 bytes of key@0x55ac0e3e9de0 192s | symkey message: symkey-key@0x55ac0e3e9de0 (20-bytes, EXTRACT_KEY_FROM_KEY) 192s | sizeof bytes 32 192s | wrapper: (SECItemType)-976213104: 90 0d d4 37 72 ec e4 85 bb 1c c8 ac f3 54 47 0e 39 82 f5 d7 ac d8 5a 56 5e 11 ef 54 b9 b9 6c 1b 192s | symkey message extracted len 32 bytes at 0x55ac0e3ebd80 192s | unwrapped: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | XCBC: data 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 .... 192s | K extracting all 16 bytes of key@0x55ac0e3ec1a0 192s | K: symkey-key@0x55ac0e3ec1a0 (16-bytes, AES_ECB) 192s | sizeof bytes 16 192s | wrapper: (SECItemType)-976213312: 90 0d d4 37 72 ec e4 85 bb 1c c8 ac f3 54 47 0e 192s | K extracted len 16 bytes at 0x55ac0e3eb820 192s | unwrapped: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | XCBC: K: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | XCBC: K1 192s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02e80 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3ec840 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02e68 192s | Computing E[2] using K3 192s | XCBC: K3 192s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 192s | XCBC: E[n-1] 192s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 192s | XCBC: M[n] 192s | 10 11 12 13 .... 192s | XCBC: M[n] 192s | 10 11 12 13 .... 192s | XCBC: M[n]:80...^E[n-1]^K3 192s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 192s | XCBC: MAC 192s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02f90 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: EXTRACT_KEY_FROM_KEY 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3ec840 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f28 192s | PRF symkey interface PRF AES_XCBC final-key@0x55ac0e3ec4e0 (size 16) 192s | PRF symkey interface: key-key@0x55ac0e3ec4e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | output: symkey-key@0x55ac0e3ec4e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracting all 16 bytes of key@0x55ac0e3ec4e0 192s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: symkey-key@0x55ac0e3ec4e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | sizeof bytes 16 192s | wrapper: (SECItemType)976: a9 61 5e 2e 1b f1 22 25 65 83 22 1e 92 ce 53 54 192s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracted len 16 bytes at 0x55ac0e3eb820 192s | unwrapped: 192s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 192s | verify_bytes() RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: symkey: ok 192s ipsec algparse: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 192s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 192s | decode_to_chunk() output: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 192s | decode_to_chunk() output: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 192s | decode_to_chunk() test_prf_vector: input "0xf54f0ec8d2b9f3d36807734bd5283fd4" 192s | decode_to_chunk() output: 192s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 192s | PRF chunk interface PRF AES_XCBC init key hunk 0x55ac0e3eb800 (length 16) 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02f80 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: EXTRACT_KEY_FROM_KEY 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3eb4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f18 192s | XCBC: Key 16=16 just right 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3ec4e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02ec8 192s | PRF chunk interface PRF AES_XCBC 0x55ac0e3ebd80 192s | PRF chunk interface PRF AES_XCBC update message (0x55ac0e3e8460 length 32) 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 192s | XCBC: data 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 192s | K extracting all 16 bytes of key@0x55ac0e3eb4d0 192s | K: symkey-key@0x55ac0e3eb4d0 (16-bytes, AES_ECB) 192s | sizeof bytes 16 192s | wrapper: (SECItemType)543502624: 90 0d d4 37 72 ec e4 85 bb 1c c8 ac f3 54 47 0e 192s | K extracted len 16 bytes at 0x55ac0e3e8390 192s | unwrapped: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | XCBC: K: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | XCBC: K1 192s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02e30 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3e9de0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02e18 192s | XCBC: Computing E[2] using K2 192s | XCBC: K2 192s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 192s | XCBC: E[n-1] 192s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 192s | XCBC: M[n] 192s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 192s | XCBC: M[n]^E[n-1]^K2 192s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 192s | XCBC: MAC 192s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 192s | PRF chunk interface PRF AES_XCBC final length 16 192s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 192s | chunk output 192s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 192s | verify_bytes() RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: prf OUT: ok 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d03000 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: EXTRACT_KEY_FROM_KEY 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3ec4e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f98 192s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x55ac0e3eb4d0 (size 16) 192s | PRF symkey interface: key symkey-key@0x55ac0e3eb4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | XCBC: Key 16=16 just right 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3eb4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f08 192s | PRF symkey interface PRF AES_XCBC 0x55ac0e3ebd80 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d03000 192s | key-offset: 0, key-size: 32 192s | EXTRACT_KEY_FROM_KEY: 192s | target: EXTRACT_KEY_FROM_KEY 192s | key_size: 32-bytes 192s | base: base-key@0x55ac0e3ec1a0 (48-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f98 192s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x55ac0e3e9de0 (size 32) 192s | PRF symkey interface: symkey message-key@0x55ac0e3e9de0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | symkey message extracting all 32 bytes of key@0x55ac0e3e9de0 192s | symkey message: symkey-key@0x55ac0e3e9de0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | sizeof bytes 32 192s | wrapper: (SECItemType)-976213104: 90 0d d4 37 72 ec e4 85 bb 1c c8 ac f3 54 47 0e 27 2b 67 4c 10 8b cc 1b ec 24 f5 9c cd e0 67 0d 192s | symkey message extracted len 32 bytes at 0x55ac0e3ecb00 192s | unwrapped: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 192s | XCBC: data 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 192s | K extracting all 16 bytes of key@0x55ac0e3ec4e0 192s | K: symkey-key@0x55ac0e3ec4e0 (16-bytes, AES_ECB) 192s | sizeof bytes 16 192s | wrapper: (SECItemType)-976213312: 90 0d d4 37 72 ec e4 85 bb 1c c8 ac f3 54 47 0e 192s | K extracted len 16 bytes at 0x55ac0e3ec010 192s | unwrapped: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | XCBC: K: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | XCBC: K1 192s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02e80 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3ec840 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02e68 192s | XCBC: Computing E[2] using K2 192s | XCBC: K2 192s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 192s | XCBC: E[n-1] 192s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 192s | XCBC: M[n] 192s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 192s | XCBC: M[n]^E[n-1]^K2 192s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 192s | XCBC: MAC 192s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02f90 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: EXTRACT_KEY_FROM_KEY 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3ec840 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f28 192s | PRF symkey interface PRF AES_XCBC final-key@0x55ac0e3ec1a0 (size 16) 192s | PRF symkey interface: key-key@0x55ac0e3ec1a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | output: symkey-key@0x55ac0e3ec1a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracting all 16 bytes of key@0x55ac0e3ec1a0 192s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: symkey-key@0x55ac0e3ec1a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | sizeof bytes 16 192s | wrapper: (SECItemType)976: 14 52 15 17 89 f5 64 96 17 c8 cc 49 57 8f 4b 91 192s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracted len 16 bytes at 0x55ac0e3ebb10 192s | unwrapped: 192s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 192s | verify_bytes() RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: symkey: ok 192s ipsec algparse: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 192s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 192s | decode_to_chunk() output: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f2021" 192s | decode_to_chunk() output: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 192s | 20 21 ! 192s | decode_to_chunk() test_prf_vector: input "0xbecbb3bccdb518a30677d5481fb6b4d8" 192s | decode_to_chunk() output: 192s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 192s | PRF chunk interface PRF AES_XCBC init key hunk 0x55ac0e3e9d10 (length 16) 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02f80 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: EXTRACT_KEY_FROM_KEY 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3eb4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f18 192s | XCBC: Key 16=16 just right 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3ec1a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02ec8 192s | PRF chunk interface PRF AES_XCBC 0x55ac0e3e8460 192s | PRF chunk interface PRF AES_XCBC update message (0x55ac0e3e8490 length 34) 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 192s | 20 21 ! 192s | XCBC: data 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 192s | 20 21 ! 192s | K extracting all 16 bytes of key@0x55ac0e3eb4d0 192s | K: symkey-key@0x55ac0e3eb4d0 (16-bytes, AES_ECB) 192s | sizeof bytes 16 192s | wrapper: (SECItemType)538976288: 90 0d d4 37 72 ec e4 85 bb 1c c8 ac f3 54 47 0e 192s | K extracted len 16 bytes at 0x55ac0e3ec010 192s | unwrapped: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | XCBC: K: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | XCBC: K1 192s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02e30 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3e9de0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02e18 192s | Computing E[3] using K3 192s | XCBC: K3 192s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 192s | XCBC: E[n-1] 192s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 192s | XCBC: M[n] 192s | 20 21 ! 192s | XCBC: M[n] 192s | 20 21 ! 192s | XCBC: M[n]:80...^E[n-1]^K3 192s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 192s | XCBC: MAC 192s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 192s | PRF chunk interface PRF AES_XCBC final length 16 192s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 192s | chunk output 192s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 192s | verify_bytes() RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: prf OUT: ok 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d03000 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: EXTRACT_KEY_FROM_KEY 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3ec1a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f98 192s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x55ac0e3eb4d0 (size 16) 192s | PRF symkey interface: key symkey-key@0x55ac0e3eb4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | XCBC: Key 16=16 just right 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3eb4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f08 192s | PRF symkey interface PRF AES_XCBC 0x55ac0e3e8460 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d03000 192s | key-offset: 0, key-size: 34 192s | EXTRACT_KEY_FROM_KEY: 192s | target: EXTRACT_KEY_FROM_KEY 192s | key_size: 34-bytes 192s | base: base-key@0x55ac0e3ec4e0 (50-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f98 192s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x55ac0e3e9de0 (size 34) 192s | PRF symkey interface: symkey message-key@0x55ac0e3e9de0 (34-bytes, EXTRACT_KEY_FROM_KEY) 192s | symkey message extracting all 34 bytes of key@0x55ac0e3e9de0 192s | symkey message: symkey-key@0x55ac0e3e9de0 (34-bytes, EXTRACT_KEY_FROM_KEY) 192s | sizeof bytes 48 192s | wrapper: (SECItemType)-976213104: 90 0d d4 37 72 ec e4 85 bb 1c c8 ac f3 54 47 0e 27 2b 67 4c 10 8b cc 1b ec 24 f5 9c cd e0 67 0d 5b 51 19 fc 13 65 85 9b 47 77 6a ad e2 96 c4 67 192s | symkey message extracted len 48 bytes at 0x55ac0e3ebb30 192s | unwrapped: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 192s | 20 21 00 00 00 00 00 00 00 00 00 00 00 00 00 00 !.............. 192s | XCBC: data 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 192s | 20 21 ! 192s | K extracting all 16 bytes of key@0x55ac0e3ec1a0 192s | K: symkey-key@0x55ac0e3ec1a0 (16-bytes, AES_ECB) 192s | sizeof bytes 16 192s | wrapper: (SECItemType)-976213312: 90 0d d4 37 72 ec e4 85 bb 1c c8 ac f3 54 47 0e 192s | K extracted len 16 bytes at 0x55ac0e3e8390 192s | unwrapped: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | XCBC: K: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | XCBC: K1 192s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02e80 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3ec840 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02e68 192s | Computing E[3] using K3 192s | XCBC: K3 192s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 192s | XCBC: E[n-1] 192s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 192s | XCBC: M[n] 192s | 20 21 ! 192s | XCBC: M[n] 192s | 20 21 ! 192s | XCBC: M[n]:80...^E[n-1]^K3 192s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 192s | XCBC: MAC 192s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02f90 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: EXTRACT_KEY_FROM_KEY 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3ec840 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f28 192s | PRF symkey interface PRF AES_XCBC final-key@0x55ac0e3ec4e0 (size 16) 192s | PRF symkey interface: key-key@0x55ac0e3ec4e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | output: symkey-key@0x55ac0e3ec4e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracting all 16 bytes of key@0x55ac0e3ec4e0 192s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: symkey-key@0x55ac0e3ec4e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | sizeof bytes 16 192s | wrapper: (SECItemType)976: 11 62 18 57 9d b6 e5 72 f7 e2 8f 6c 08 7e 6b 13 192s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracted len 16 bytes at 0x55ac0e3eb700 192s | unwrapped: 192s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 192s | verify_bytes() RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: symkey: ok 192s ipsec algparse: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 192s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 192s | decode_to_chunk() output: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | decode_to_chunk() test_prf_vector: input "0xf0dafee895db30253761103b5d84528f" 192s | decode_to_chunk() output: 192s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 192s | PRF chunk interface PRF AES_XCBC init key hunk 0x55ac0e3eb820 (length 16) 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02f80 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: EXTRACT_KEY_FROM_KEY 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3eb4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f18 192s | XCBC: Key 16=16 just right 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3ec4e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02ec8 192s | PRF chunk interface PRF AES_XCBC 0x55ac0e3ebd80 192s | PRF chunk interface PRF AES_XCBC update message (0x55ac0e3e9f10 length 1000) 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 ........ 192s | XCBC: data 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 ........ 192s | K extracting all 16 bytes of key@0x55ac0e3eb4d0 192s | K: symkey-key@0x55ac0e3eb4d0 (16-bytes, AES_ECB) 192s | sizeof bytes 16 192s | wrapper: (SECItemType)538976288: 90 0d d4 37 72 ec e4 85 bb 1c c8 ac f3 54 47 0e 192s | K extracted len 16 bytes at 0x55ac0e3e8390 192s | unwrapped: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | XCBC: K: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | XCBC: K1 192s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02e30 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3e9de0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02e18 192s | Computing E[63] using K3 192s | XCBC: K3 192s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 192s | XCBC: E[n-1] 192s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 192s | XCBC: M[n] 192s | 00 00 00 00 00 00 00 00 ........ 192s | XCBC: M[n] 192s | 00 00 00 00 00 00 00 00 ........ 192s | XCBC: M[n]:80...^E[n-1]^K3 192s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 192s | XCBC: MAC 192s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 192s | PRF chunk interface PRF AES_XCBC final length 16 192s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 192s | chunk output 192s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 192s | verify_bytes() RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: prf OUT: ok 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d03000 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: EXTRACT_KEY_FROM_KEY 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3ec4e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f98 192s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x55ac0e3eb4d0 (size 16) 192s | PRF symkey interface: key symkey-key@0x55ac0e3eb4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | XCBC: Key 16=16 just right 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3eb4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f08 192s | PRF symkey interface PRF AES_XCBC 0x55ac0e3ebd80 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d03000 192s | key-offset: 0, key-size: 1000 192s | EXTRACT_KEY_FROM_KEY: 192s | target: EXTRACT_KEY_FROM_KEY 192s | key_size: 1000-bytes 192s | base: base-key@0x55ac0e3ec1a0 (1016-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f98 192s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x55ac0e3e9de0 (size 1000) 192s | PRF symkey interface: symkey message-key@0x55ac0e3e9de0 (1000-bytes, EXTRACT_KEY_FROM_KEY) 192s | symkey message extracting all 1000 bytes of key@0x55ac0e3e9de0 192s | symkey message: symkey-key@0x55ac0e3e9de0 (1000-bytes, EXTRACT_KEY_FROM_KEY) 192s | sizeof bytes 1008 192s | wrapper: (SECItemType)-976213104: 0d 7e fb cf 73 e0 ff 62 98 86 f1 58 2f 92 6a a3 0d 7e fb cf 73 e0 ff 62 98 86 f1 58 2f 92 6a a3 0d 7e fb cf 73 e0 ff 62 98 86 f1 58 2f 92 6a a3 0d 7e fb cf 73 e0 ff 62 98 86 f1 58 2f 92 6a a3 0d 7e fb cf 73 e0 ff 62 98 86 f1 58 2f 92 6a a3 0d 7e fb cf 73 e0 ff 62 98 86 f1 58 2f 92 6a a3 0d 7e fb cf 73 e0 ff 62 98 86 f1 58 2f 92 6a a3 0d 7e fb cf 73 e0 ff 62 98 86 f1 58 2f 92 6a a3 0d 7e fb cf 73 e0 ff 62 98 86 f1 58 2f 92 6a a3 0d 7e fb cf 73 e0 ff 62 98 86 f1 58 2f 92 6a a3 0d 7e fb cf 73 e0 ff 62 98 86 f1 58 2f 92 6a a3 0d 7e fb cf 73 e0 ff 62 98 86 f1 58 2f 92 6a a3 0d 7e fb cf 73 e0 ff 62 98 86 f1 58 2f 92 6a a3 0d 7e fb cf 73 e0 ff 62 98 86 f1 58 2f 92 6a a3 0d 7e fb cf 73 e0 ff 62 98 86 f1 58 2f 92 6a a3 0d 7e fb cf 73 e0 ff 62 98 86 f1 58 2f 92 6a a3 0d 7e fb cf 73 e0 ff 62 98 86 f1 58 2f 92 6a a3 0d 7e fb cf 73 e0 ff 62 98 86 f1 58 2f 92 6a a3 0d 7e fb cf 73 e0 ff 62 98 86 f1 58 2f 92 6a... 192s | symkey message extracted len 1008 bytes at 0x55ac0e3eaaf0 192s | unwrapped: 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | XCBC: data 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | 00 00 00 00 00 00 00 00 ........ 192s | K extracting all 16 bytes of key@0x55ac0e3ec4e0 192s | K: symkey-key@0x55ac0e3ec4e0 (16-bytes, AES_ECB) 192s | sizeof bytes 16 192s | wrapper: (SECItemType)-976213312: 90 0d d4 37 72 ec e4 85 bb 1c c8 ac f3 54 47 0e 192s | K extracted len 16 bytes at 0x55ac0e3ec010 192s | unwrapped: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | XCBC: K: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | XCBC: K1 192s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02e80 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3ec840 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02e68 192s | Computing E[63] using K3 192s | XCBC: K3 192s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 192s | XCBC: E[n-1] 192s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 192s | XCBC: M[n] 192s | 00 00 00 00 00 00 00 00 ........ 192s | XCBC: M[n] 192s | 00 00 00 00 00 00 00 00 ........ 192s | XCBC: M[n]:80...^E[n-1]^K3 192s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 192s | XCBC: MAC 192s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02f90 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: EXTRACT_KEY_FROM_KEY 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3ec840 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f28 192s | PRF symkey interface PRF AES_XCBC final-key@0x55ac0e3ec1a0 (size 16) 192s | PRF symkey interface: key-key@0x55ac0e3ec1a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | output: symkey-key@0x55ac0e3ec1a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracting all 16 bytes of key@0x55ac0e3ec1a0 192s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: symkey-key@0x55ac0e3ec1a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | sizeof bytes 16 192s | wrapper: (SECItemType)976: 91 94 7b 4a 43 bb a3 8a c9 ee 4a 5b b6 47 8f 3b 192s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracted len 16 bytes at 0x55ac0e3ebb10 192s | unwrapped: 192s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 192s | verify_bytes() RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: symkey: ok 192s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 192s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 192s | decode_to_chunk() output: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 192s | decode_to_chunk() output: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 .... 192s | decode_to_chunk() test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 192s | decode_to_chunk() output: 192s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 192s | PRF chunk interface PRF AES_XCBC init key hunk 0x55ac0e3eb800 (length 16) 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02f80 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: EXTRACT_KEY_FROM_KEY 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3eb4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f18 192s | XCBC: Key 16=16 just right 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3ec1a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02ec8 192s | PRF chunk interface PRF AES_XCBC 0x55ac0e3ebd80 192s | PRF chunk interface PRF AES_XCBC update message (0x55ac0e3e9d10 length 20) 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 .... 192s | XCBC: data 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 .... 192s | K extracting all 16 bytes of key@0x55ac0e3eb4d0 192s | K: symkey-key@0x55ac0e3eb4d0 (16-bytes, AES_ECB) 192s | sizeof bytes 16 192s | wrapper: (SECItemType)538976288: 90 0d d4 37 72 ec e4 85 bb 1c c8 ac f3 54 47 0e 192s | K extracted len 16 bytes at 0x55ac0e3ec820 192s | unwrapped: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | XCBC: K: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | XCBC: K1 192s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02e30 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3e9de0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02e18 192s | Computing E[2] using K3 192s | XCBC: K3 192s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 192s | XCBC: E[n-1] 192s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 192s | XCBC: M[n] 192s | 10 11 12 13 .... 192s | XCBC: M[n] 192s | 10 11 12 13 .... 192s | XCBC: M[n]:80...^E[n-1]^K3 192s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 192s | XCBC: MAC 192s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 192s | PRF chunk interface PRF AES_XCBC final length 16 192s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 192s | chunk output 192s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 192s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): prf OUT: ok 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d03000 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: EXTRACT_KEY_FROM_KEY 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3ec1a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f98 192s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x55ac0e3eb4d0 (size 16) 192s | PRF symkey interface: key symkey-key@0x55ac0e3eb4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | XCBC: Key 16=16 just right 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3eb4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f08 192s | PRF symkey interface PRF AES_XCBC 0x55ac0e3ebd80 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d03000 192s | key-offset: 0, key-size: 20 192s | EXTRACT_KEY_FROM_KEY: 192s | target: EXTRACT_KEY_FROM_KEY 192s | key_size: 20-bytes 192s | base: base-key@0x55ac0e3ec4e0 (36-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f98 192s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x55ac0e3e9de0 (size 20) 192s | PRF symkey interface: symkey message-key@0x55ac0e3e9de0 (20-bytes, EXTRACT_KEY_FROM_KEY) 192s | symkey message extracting all 20 bytes of key@0x55ac0e3e9de0 192s | symkey message: symkey-key@0x55ac0e3e9de0 (20-bytes, EXTRACT_KEY_FROM_KEY) 192s | sizeof bytes 32 192s | wrapper: (SECItemType)-976213104: 90 0d d4 37 72 ec e4 85 bb 1c c8 ac f3 54 47 0e 39 82 f5 d7 ac d8 5a 56 5e 11 ef 54 b9 b9 6c 1b 192s | symkey message extracted len 32 bytes at 0x55ac0e3e8460 192s | unwrapped: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | XCBC: data 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 .... 192s | K extracting all 16 bytes of key@0x55ac0e3ec1a0 192s | K: symkey-key@0x55ac0e3ec1a0 (16-bytes, AES_ECB) 192s | sizeof bytes 16 192s | wrapper: (SECItemType)-976213312: 90 0d d4 37 72 ec e4 85 bb 1c c8 ac f3 54 47 0e 192s | K extracted len 16 bytes at 0x55ac0e3e8390 192s | unwrapped: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | XCBC: K: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | XCBC: K1 192s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02e80 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3ec840 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02e68 192s | Computing E[2] using K3 192s | XCBC: K3 192s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 192s | XCBC: E[n-1] 192s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 192s | XCBC: M[n] 192s | 10 11 12 13 .... 192s | XCBC: M[n] 192s | 10 11 12 13 .... 192s | XCBC: M[n]:80...^E[n-1]^K3 192s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 192s | XCBC: MAC 192s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02f90 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: EXTRACT_KEY_FROM_KEY 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3ec840 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f28 192s | PRF symkey interface PRF AES_XCBC final-key@0x55ac0e3ec4e0 (size 16) 192s | PRF symkey interface: key-key@0x55ac0e3ec4e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | output: symkey-key@0x55ac0e3ec4e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracting all 16 bytes of key@0x55ac0e3ec4e0 192s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): symkey-key@0x55ac0e3ec4e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | sizeof bytes 16 192s | wrapper: (SECItemType)976: a9 61 5e 2e 1b f1 22 25 65 83 22 1e 92 ce 53 54 192s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracted len 16 bytes at 0x55ac0e3e8390 192s | unwrapped: 192s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 192s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): symkey: ok 192s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 192s | decode_to_chunk() test_prf_vector: input "0x00010203040506070809" 192s | decode_to_chunk() output: 192s | 00 01 02 03 04 05 06 07 08 09 .......... 192s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 192s | decode_to_chunk() output: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 .... 192s | decode_to_chunk() test_prf_vector: input "0x0fa087af7d866e7653434e602fdde835" 192s | decode_to_chunk() output: 192s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 192s | PRF chunk interface PRF AES_XCBC init key hunk 0x55ac0e3eb800 (length 10) 192s | 00 01 02 03 04 05 06 07 08 09 .......... 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02f80 192s | key-offset: 0, key-size: 10 192s | EXTRACT_KEY_FROM_KEY: 192s | target: EXTRACT_KEY_FROM_KEY 192s | key_size: 10-bytes 192s | base: base-key@0x55ac0e3eb4d0 (26-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f18 192s | XCBC: Key 10<16 too small, padding with zeros 192s | CONCATENATE_BASE_AND_DATA: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3ec4e0 (10-bytes, EXTRACT_KEY_FROM_KEY) 192s | params: 16-bytes@0x7ffdc5d02ec0 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3eb4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02ec8 192s | PRF chunk interface PRF AES_XCBC 0x55ac0e3ebd80 192s | PRF chunk interface PRF AES_XCBC update message (0x55ac0e3e9d10 length 20) 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 .... 192s | XCBC: data 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 .... 192s | K extracting all 16 bytes of key@0x55ac0e3e9de0 192s | K: symkey-key@0x55ac0e3e9de0 (16-bytes, AES_ECB) 192s | sizeof bytes 16 192s | wrapper: (SECItemType)538976288: c2 b1 2c d3 31 e9 bd f5 94 d4 c3 92 8e 16 46 2f 192s | K extracted len 16 bytes at 0x55ac0e3eb820 192s | unwrapped: 192s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 192s | XCBC: K: 192s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 192s | XCBC: K1 192s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02e30 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3eb4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02e18 192s | Computing E[2] using K3 192s | XCBC: K3 192s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 192s | XCBC: E[n-1] 192s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 192s | XCBC: M[n] 192s | 10 11 12 13 .... 192s | XCBC: M[n] 192s | 10 11 12 13 .... 192s | XCBC: M[n]:80...^E[n-1]^K3 192s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 192s | XCBC: MAC 192s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 192s | PRF chunk interface PRF AES_XCBC final length 16 192s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 192s | chunk output 192s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 192s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): prf OUT: ok 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d03000 192s | key-offset: 0, key-size: 10 192s | EXTRACT_KEY_FROM_KEY: 192s | target: EXTRACT_KEY_FROM_KEY 192s | key_size: 10-bytes 192s | base: base-key@0x55ac0e3ec4e0 (26-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f98 192s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x55ac0e3e9de0 (size 10) 192s | PRF symkey interface: key symkey-key@0x55ac0e3e9de0 (10-bytes, EXTRACT_KEY_FROM_KEY) 192s | XCBC: Key 10<16 too small, padding with zeros 192s | CONCATENATE_BASE_AND_DATA: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e9de0 (10-bytes, EXTRACT_KEY_FROM_KEY) 192s | params: 16-bytes@0x7ffdc5d02f00 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3ec4e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f08 192s | PRF symkey interface PRF AES_XCBC 0x55ac0e3ebd80 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d03000 192s | key-offset: 0, key-size: 20 192s | EXTRACT_KEY_FROM_KEY: 192s | target: EXTRACT_KEY_FROM_KEY 192s | key_size: 20-bytes 192s | base: base-key@0x55ac0e3ec1a0 (36-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f98 192s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x55ac0e3ec4e0 (size 20) 192s | PRF symkey interface: symkey message-key@0x55ac0e3ec4e0 (20-bytes, EXTRACT_KEY_FROM_KEY) 192s | symkey message extracting all 20 bytes of key@0x55ac0e3ec4e0 192s | symkey message: symkey-key@0x55ac0e3ec4e0 (20-bytes, EXTRACT_KEY_FROM_KEY) 192s | sizeof bytes 32 192s | wrapper: (SECItemType)-976213104: 90 0d d4 37 72 ec e4 85 bb 1c c8 ac f3 54 47 0e 39 82 f5 d7 ac d8 5a 56 5e 11 ef 54 b9 b9 6c 1b 192s | symkey message extracted len 32 bytes at 0x55ac0e3e8490 192s | unwrapped: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | XCBC: data 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 .... 192s | K extracting all 16 bytes of key@0x55ac0e3eb4d0 192s | K: symkey-key@0x55ac0e3eb4d0 (16-bytes, AES_ECB) 192s | sizeof bytes 16 192s | wrapper: (SECItemType)-976213312: c2 b1 2c d3 31 e9 bd f5 94 d4 c3 92 8e 16 46 2f 192s | K extracted len 16 bytes at 0x55ac0e3ec180 192s | unwrapped: 192s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 192s | XCBC: K: 192s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 192s | XCBC: K1 192s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02e80 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3ec840 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02e68 192s | Computing E[2] using K3 192s | XCBC: K3 192s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 192s | XCBC: E[n-1] 192s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 192s | XCBC: M[n] 192s | 10 11 12 13 .... 192s | XCBC: M[n] 192s | 10 11 12 13 .... 192s | XCBC: M[n]:80...^E[n-1]^K3 192s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 192s | XCBC: MAC 192s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02f90 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: EXTRACT_KEY_FROM_KEY 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3ec840 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f28 192s | PRF symkey interface PRF AES_XCBC final-key@0x55ac0e3ec1a0 (size 16) 192s | PRF symkey interface: key-key@0x55ac0e3ec1a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | output: symkey-key@0x55ac0e3ec1a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracting all 16 bytes of key@0x55ac0e3ec1a0 192s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): symkey-key@0x55ac0e3ec1a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 192s | sizeof bytes 16 192s | wrapper: (SECItemType)976: 8c 41 73 fe 4a 34 4b 3c cf 36 d0 96 39 9b 81 16 192s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracted len 16 bytes at 0x55ac0e3ec180 192s | unwrapped: 192s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 192s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): symkey: ok 192s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 192s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0fedcb" 192s | decode_to_chunk() output: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | ed cb .. 192s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 192s | decode_to_chunk() output: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | 10 11 12 13 .... 192s | decode_to_chunk() test_prf_vector: input "0x8cd3c93ae598a9803006ffb67c40e9e4" 192s | decode_to_chunk() output: 192s | 8c d3 c9 3a e5 98 a9 80 30 06 ff b6 7c 40 e9 e4 ...:....0...|@.. 192s | PRF chunk interface PRF AES_XCBC init key hunk 0x55ac0e3eb800 (length 18) 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | ed cb .. 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02f80 192s | key-offset: 0, key-size: 18 192s | EXTRACT_KEY_FROM_KEY: 192s | target: EXTRACT_KEY_FROM_KEY 192s | key_size: 18-bytes 192s | base: base-key@0x55ac0e3e9de0 (34-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02f18 192s | XCBC: Key 18>16 too big, rehashing to size 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02e80 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3ec4e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02e68 192s | draft_chunk extracting all 18 bytes of key@0x55ac0e3ec1a0 192s | draft_chunk: symkey-key@0x55ac0e3ec1a0 (18-bytes, EXTRACT_KEY_FROM_KEY) 192s | sizeof bytes 32 192s | wrapper: (SECItemType)1095914584: 90 0d d4 37 72 ec e4 85 bb 1c c8 ac f3 54 47 0e f1 59 65 8e d5 53 d0 3a 4e 29 c2 72 74 37 1c e7 192s | draft_chunk extracted len 32 bytes at 0x55ac0e3e8490 192s | unwrapped: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | XCBC: data 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | ed cb .. 192s | K extracting all 16 bytes of key@0x55ac0e3e9de0 192s | K: symkey-key@0x55ac0e3e9de0 (16-bytes, AES_ECB) 192s | sizeof bytes 16 192s | wrapper: (SECItemType)774778414: 0d 7e fb cf 73 e0 ff 62 98 86 f1 58 2f 92 6a a3 192s | K extracted len 16 bytes at 0x55ac0e3ec820 192s | unwrapped: 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | XCBC: K: 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | XCBC: K1 192s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02db0 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3eb4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02d98 192s | Computing E[2] using K3 192s | XCBC: K3 192s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 192s | XCBC: E[n-1] 192s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 192s | XCBC: M[n] 192s | ed cb .. 192s | XCBC: M[n] 192s | ed cb .. 192s | XCBC: M[n]:80...^E[n-1]^K3 192s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.16 too big, rehashing to size 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02ec0 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3e9de0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02ea8 192s | draft_chunk extracting all 18 bytes of key@0x55ac0e3ec4e0 192s | draft_chunk: symkey-key@0x55ac0e3ec4e0 (18-bytes, EXTRACT_KEY_FROM_KEY) 192s | sizeof bytes 32 192s | wrapper: (SECItemType)16: 90 0d d4 37 72 ec e4 85 bb 1c c8 ac f3 54 47 0e f1 59 65 8e d5 53 d0 3a 4e 29 c2 72 74 37 1c e7 192s | draft_chunk extracted len 32 bytes at 0x55ac0e3ebd80 192s | unwrapped: 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | XCBC: data 192s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 192s | ed cb .. 192s | K extracting all 16 bytes of key@0x55ac0e3ec1a0 192s | K: symkey-key@0x55ac0e3ec1a0 (16-bytes, AES_ECB) 192s | sizeof bytes 16 192s | wrapper: (SECItemType)774778414: 0d 7e fb cf 73 e0 ff 62 98 86 f1 58 2f 92 6a a3 192s | K extracted len 16 bytes at 0x55ac0e3eb700 192s | unwrapped: 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | XCBC: K: 192s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 192s | XCBC: K1 192s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 192s | CONCATENATE_DATA_AND_BASE: 192s | target: EXTRACT_KEY_FROM_KEY 192s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 192s | params: 16-bytes@0x7ffdc5d02df0 192s | key-offset: 0, key-size: 16 192s | EXTRACT_KEY_FROM_KEY: 192s | target: AES_ECB 192s | flags: SIGN 192s | key_size: 16-bytes 192s | base: base-key@0x55ac0e3eb4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 192s | operation: FLAGS_ONLY 192s | params: 8-bytes@0x7ffdc5d02dd8 192s | Computing E[2] using K3 192s | XCBC: K3 192s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 192s | XCBC: E[n-1] 192s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 192s | XCBC: M[n] 192s | ed cb .. 192s | XCBC: M[n] 192s | ed cb .. 192s | XCBC: M[n]:80...^E[n-1]^K3 192s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.j.....n1.].8 193s | PRF chunk interface PRF HMAC_MD5 init key hunk 0x55ac0e3e9d10 (length 4) 193s | 4a 65 66 65 Jefe 193s | CONCATENATE_DATA_AND_BASE: 193s | target: EXTRACT_KEY_FROM_KEY 193s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 193s | params: 16-bytes@0x7ffdc5d02f30 193s | key-offset: 0, key-size: 4 193s | EXTRACT_KEY_FROM_KEY: 193s | target: MD5_HMAC 193s | flags: SIGN 193s | key_size: 4-bytes 193s | base: base-key@0x55ac0e3eb4d0 (20-bytes, EXTRACT_KEY_FROM_KEY) 193s | operation: FLAGS_ONLY 193s | params: 8-bytes@0x7ffdc5d02f18 193s | PRF chunk interface prf: created HMAC_MD5 context 0x55ac0e3eb840 from key-key@0x55ac0e3ec4e0 193s | PRF chunk interface prf: begin HMAC_MD5 with context 0x55ac0e3eb840 from key-key@0x55ac0e3ec4e0 193s | PRF chunk interface PRF HMAC_MD5 0x55ac0e3ebe10 193s | PRF chunk interface PRF HMAC_MD5 update message (0x55ac0e3ebd80 length 28) 193s | 77 68 61 74 20 64 6f 20 79 61 20 77 61 6e 74 20 what do ya want 193s | 66 6f 72 20 6e 6f 74 68 69 6e 67 3f for nothing? 193s | PRF chunk interface PRF HMAC_MD5 final length 16 193s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 193s | chunk output 193s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 193s | verify_bytes() RFC 2104: MD5_HMAC test 2: prf OUT: ok 193s | CONCATENATE_DATA_AND_BASE: 193s | target: EXTRACT_KEY_FROM_KEY 193s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 193s | params: 16-bytes@0x7ffdc5d03000 193s | key-offset: 0, key-size: 4 193s | EXTRACT_KEY_FROM_KEY: 193s | target: EXTRACT_KEY_FROM_KEY 193s | key_size: 4-bytes 193s | base: base-key@0x55ac0e3eb4d0 (20-bytes, EXTRACT_KEY_FROM_KEY) 193s | operation: FLAGS_ONLY 193s | params: 8-bytes@0x7ffdc5d02f98 193s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0x55ac0e3ec4e0 (size 4) 193s | PRF symkey interface: key symkey-key@0x55ac0e3ec4e0 (4-bytes, EXTRACT_KEY_FROM_KEY) 193s | key-offset: 0, key-size: 4 193s | EXTRACT_KEY_FROM_KEY: 193s | target: MD5_HMAC 193s | flags: SIGN 193s | key_size: 4-bytes 193s | base: base-key@0x55ac0e3ec4e0 (4-bytes, EXTRACT_KEY_FROM_KEY) 193s | operation: FLAGS_ONLY 193s | params: 8-bytes@0x7ffdc5d02f78 193s | PRF symkey interface prf: created HMAC_MD5 context 0x55ac0e3ec2e0 from key symkey-key@0x55ac0e3eb4d0 193s | PRF symkey interface prf: begin HMAC_MD5 with context 0x55ac0e3ec2e0 from key symkey-key@0x55ac0e3eb4d0 193s | PRF symkey interface PRF HMAC_MD5 0x55ac0e3e8460 193s | CONCATENATE_DATA_AND_BASE: 193s | target: EXTRACT_KEY_FROM_KEY 193s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 193s | params: 16-bytes@0x7ffdc5d03000 193s | key-offset: 0, key-size: 28 193s | EXTRACT_KEY_FROM_KEY: 193s | target: EXTRACT_KEY_FROM_KEY 193s | key_size: 28-bytes 193s | base: base-key@0x55ac0e3e9de0 (44-bytes, EXTRACT_KEY_FROM_KEY) 193s | operation: FLAGS_ONLY 193s | params: 8-bytes@0x7ffdc5d02f98 193s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0x55ac0e3ec1a0 (size 28) 193s | PRF symkey interface: symkey message-key@0x55ac0e3ec1a0 (28-bytes, EXTRACT_KEY_FROM_KEY) 193s | nss hmac digest hack extracting all 28 bytes of key@0x55ac0e3ec1a0 193s | nss hmac digest hack: symkey-key@0x55ac0e3ec1a0 (28-bytes, EXTRACT_KEY_FROM_KEY) 193s | sizeof bytes 32 193s | wrapper: (SECItemType)-976213104: a6 c6 49 28 3f 51 55 d8 9b 9e c4 4f 8f 32 27 90 bc 1d 9f 8e f5 8a 12 8b 09 f0 eb f9 ea 69 c9 3c 193s | nss hmac digest hack extracted len 32 bytes at 0x55ac0e3f0dd0 193s | unwrapped: 193s | 77 68 61 74 20 64 6f 20 79 61 20 77 61 6e 74 20 what do ya want 193s | 66 6f 72 20 6e 6f 74 68 69 6e 67 3f 00 00 00 00 for nothing?.... 193s | CONCATENATE_DATA_AND_BASE: 193s | target: EXTRACT_KEY_FROM_KEY 193s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 193s | params: 16-bytes@0x7ffdc5d02fa0 193s | key-offset: 0, key-size: 16 193s | EXTRACT_KEY_FROM_KEY: 193s | target: EXTRACT_KEY_FROM_KEY 193s | key_size: 16-bytes 193s | base: base-key@0x55ac0e3e9de0 (32-bytes, EXTRACT_KEY_FROM_KEY) 193s | operation: FLAGS_ONLY 193s | params: 8-bytes@0x7ffdc5d02f38 193s | PRF symkey interface PRF HMAC_MD5 final-key@0x55ac0e3eb4d0 (size 16) 193s | PRF symkey interface: key-key@0x55ac0e3eb4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 193s | output: symkey-key@0x55ac0e3eb4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 193s | RFC 2104: MD5_HMAC test 2 extracting all 16 bytes of key@0x55ac0e3eb4d0 193s | RFC 2104: MD5_HMAC test 2: symkey-key@0x55ac0e3eb4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 193s | sizeof bytes 16 193s | wrapper: (SECItemType)976: f2 d9 6e 75 e6 5e 10 35 5d 83 fd 7f 96 3e d5 93 193s | RFC 2104: MD5_HMAC test 2 extracted len 16 bytes at 0x55ac0e3eb820 193s | unwrapped: 193s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 193s | verify_bytes() RFC 2104: MD5_HMAC test 2: symkey: ok 193s ipsec algparse: RFC 2104: MD5_HMAC test 3 193s | decode_to_chunk() test_prf_vector: input "0xAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" 193s | decode_to_chunk() output: 193s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 193s | decode_to_chunk() test_prf_vector: input "0xDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD" 193s | decode_to_chunk() output: 193s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 193s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 193s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 193s | dd dd .. 193s | decode_to_chunk() test_prf_vector: input "0x56be34521d144c88dbb8c733f0e8b3f6" 193s | decode_to_chunk() output: 193s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 193s | PRF chunk interface PRF HMAC_MD5 init key hunk 0x55ac0e3e8390 (length 16) 193s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 193s | CONCATENATE_DATA_AND_BASE: 193s | target: EXTRACT_KEY_FROM_KEY 193s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 193s | params: 16-bytes@0x7ffdc5d02f30 193s | key-offset: 0, key-size: 16 193s | EXTRACT_KEY_FROM_KEY: 193s | target: MD5_HMAC 193s | flags: SIGN 193s | key_size: 16-bytes 193s | base: base-key@0x55ac0e3ec4e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 193s | operation: FLAGS_ONLY 193s | params: 8-bytes@0x7ffdc5d02f18 193s | PRF chunk interface prf: created HMAC_MD5 context 0x55ac0e3ec8d0 from key-key@0x55ac0e3eb4d0 193s | PRF chunk interface prf: begin HMAC_MD5 with context 0x55ac0e3ec8d0 from key-key@0x55ac0e3eb4d0 193s | PRF chunk interface PRF HMAC_MD5 0x55ac0e3e8490 193s | PRF chunk interface PRF HMAC_MD5 update message (0x55ac0e3ebd40 length 50) 193s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 193s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 193s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 193s | dd dd .. 193s | PRF chunk interface PRF HMAC_MD5 final length 16 193s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 193s | chunk output 193s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 193s | verify_bytes() RFC 2104: MD5_HMAC test 3: prf OUT: ok 193s | CONCATENATE_DATA_AND_BASE: 193s | target: EXTRACT_KEY_FROM_KEY 193s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 193s | params: 16-bytes@0x7ffdc5d03000 193s | key-offset: 0, key-size: 16 193s | EXTRACT_KEY_FROM_KEY: 193s | target: EXTRACT_KEY_FROM_KEY 193s | key_size: 16-bytes 193s | base: base-key@0x55ac0e3ec4e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 193s | operation: FLAGS_ONLY 193s | params: 8-bytes@0x7ffdc5d02f98 193s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0x55ac0e3eb4d0 (size 16) 193s | PRF symkey interface: key symkey-key@0x55ac0e3eb4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 193s | key-offset: 0, key-size: 16 193s | EXTRACT_KEY_FROM_KEY: 193s | target: MD5_HMAC 193s | flags: SIGN 193s | key_size: 16-bytes 193s | base: base-key@0x55ac0e3eb4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 193s | operation: FLAGS_ONLY 193s | params: 8-bytes@0x7ffdc5d02f78 193s | PRF symkey interface prf: created HMAC_MD5 context 0x55ac0e3eb300 from key symkey-key@0x55ac0e3ec4e0 193s | PRF symkey interface prf: begin HMAC_MD5 with context 0x55ac0e3eb300 from key symkey-key@0x55ac0e3ec4e0 193s | PRF symkey interface PRF HMAC_MD5 0x55ac0e3ebd80 193s | CONCATENATE_DATA_AND_BASE: 193s | target: EXTRACT_KEY_FROM_KEY 193s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 193s | params: 16-bytes@0x7ffdc5d03000 193s | key-offset: 0, key-size: 50 193s | EXTRACT_KEY_FROM_KEY: 193s | target: EXTRACT_KEY_FROM_KEY 193s | key_size: 50-bytes 193s | base: base-key@0x55ac0e3e9de0 (66-bytes, EXTRACT_KEY_FROM_KEY) 193s | operation: FLAGS_ONLY 193s | params: 8-bytes@0x7ffdc5d02f98 193s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0x55ac0e3ec1a0 (size 50) 193s | PRF symkey interface: symkey message-key@0x55ac0e3ec1a0 (50-bytes, EXTRACT_KEY_FROM_KEY) 193s | nss hmac digest hack extracting all 50 bytes of key@0x55ac0e3ec1a0 193s | nss hmac digest hack: symkey-key@0x55ac0e3ec1a0 (50-bytes, EXTRACT_KEY_FROM_KEY) 193s | sizeof bytes 64 193s | wrapper: (SECItemType)-976213104: 47 6c 18 11 c6 9f 92 75 e4 60 83 a1 21 b0 f2 ba 47 6c 18 11 c6 9f 92 75 e4 60 83 a1 21 b0 f2 ba 47 6c 18 11 c6 9f 92 75 e4 60 83 a1 21 b0 f2 ba e8 61 4d 5e 4f e2 36 20 c8 bf 4f a0 91 31 59 1d 193s | nss hmac digest hack extracted len 64 bytes at 0x55ac0e3ebe40 193s | unwrapped: 193s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 193s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 193s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 193s | dd dd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 193s | CONCATENATE_DATA_AND_BASE: 193s | target: EXTRACT_KEY_FROM_KEY 193s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 193s | params: 16-bytes@0x7ffdc5d02fa0 193s | key-offset: 0, key-size: 16 193s | EXTRACT_KEY_FROM_KEY: 193s | target: EXTRACT_KEY_FROM_KEY 193s | key_size: 16-bytes 193s | base: base-key@0x55ac0e3e9de0 (32-bytes, EXTRACT_KEY_FROM_KEY) 193s | operation: FLAGS_ONLY 193s | params: 8-bytes@0x7ffdc5d02f38 193s | PRF symkey interface PRF HMAC_MD5 final-key@0x55ac0e3ec4e0 (size 16) 193s | PRF symkey interface: key-key@0x55ac0e3ec4e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 193s | output: symkey-key@0x55ac0e3ec4e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 193s | RFC 2104: MD5_HMAC test 3 extracting all 16 bytes of key@0x55ac0e3ec4e0 193s | RFC 2104: MD5_HMAC test 3: symkey-key@0x55ac0e3ec4e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 193s | sizeof bytes 16 193s | wrapper: (SECItemType)976: f4 f0 43 e8 e0 a0 ad 93 7b 8e 96 80 49 be 30 4a 193s | RFC 2104: MD5_HMAC test 3 extracted len 16 bytes at 0x55ac0e3ebb10 193s | unwrapped: 193s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 193s | verify_bytes() RFC 2104: MD5_HMAC test 3: symkey: ok 193s ipsec algparse: testing HMAC_SHA1: 193s ipsec algparse: CAVP: IKEv2 key derivation with HMAC-SHA1 193s | decode_to_chunk() test_kdf_vector: input "0x32b50d5f4a3763f3" 193s | decode_to_chunk() output: 193s | 32 b5 0d 5f 4a 37 63 f3 2.._J7c. 193s | decode_to_chunk() test_kdf_vector: input "0x9206a04b26564cb1" 193s | decode_to_chunk() output: 193s | 92 06 a0 4b 26 56 4c b1 ...K&VL. 193s | decode_to_chunk() test_kdf_vector: input "0x34c9e7c188868785" 193s | decode_to_chunk() output: 193s | 34 c9 e7 c1 88 86 87 85 4....... 193s | decode_to_chunk() test_kdf_vector: input "0x3ff77d760d2b2199" 193s | decode_to_chunk() output: 193s | 3f f7 7d 76 0d 2b 21 99 ?.}v.+!. 193s | decode_to_chunk() test_kdf_vector: input "0x4b2c1f971981a8ad8d0abeafabf38cf75fc8349c148142465ed9c8b516b8be52" 193s | decode_to_chunk() output: 193s | 4b 2c 1f 97 19 81 a8 ad 8d 0a be af ab f3 8c f7 K,.............. 193s | 5f c8 34 9c 14 81 42 46 5e d9 c8 b5 16 b8 be 52 _.4...BF^......R 193s | decode_to_chunk() test_kdf_vector: input "0x863f3c9d06efd39d2b907b97f8699e5dd5251ef64a2a176f36ee40c87d4f9330" 193s | decode_to_chunk() output: 193s | 86 3f 3c 9d 06 ef d3 9d 2b 90 7b 97 f8 69 9e 5d .?<.....+.{..i.] 193s | d5 25 1e f6 4a 2a 17 6f 36 ee 40 c8 7d 4f 93 30 .%..J*.o6.@.}O.0 193s | decode_to_chunk() test_kdf_vector: input "0xa9a7b222b59f8f48645f28a1db5b5f5d7479cba7" 193s | decode_to_chunk() output: 193s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 193s | 74 79 cb a7 ty.. 193s | decode_to_chunk() test_kdf_vector: input "0x63e81194946ebd05df7df5ebf5d8750056bf1f1d" 193s | decode_to_chunk() output: 193s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 193s | 56 bf 1f 1d V... 193s initializing NSS db 193s running pluto selftest 193s | decode_to_chunk() test_kdf_vector: input "0xa14293677cc80ff8f9cc0eee30d895da9d8f405666e30ef0dfcb63c634a46002a2a63080e514a062768b76606f9fa5e992204fc5a670bde3f10d6b027113936a5c55b648a194ae587b0088d52204b702c979fa280870d2ed41efa9c549fd11198af1670b143d384bd275c5f594cf266b05ebadca855e4249520a441a81157435a7a56cc4" 193s | decode_to_chunk() output: 193s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 193s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 193s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 193s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 193s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 193s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 193s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 193s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 193s | a7 a5 6c c4 ..l. 193s | CONCATENATE_DATA_AND_BASE: 193s | target: EXTRACT_KEY_FROM_KEY 193s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 193s | params: 16-bytes@0x7ffdc5d03030 193s | key-offset: 0, key-size: 32 193s | EXTRACT_KEY_FROM_KEY: 193s | target: EXTRACT_KEY_FROM_KEY 193s | key_size: 32-bytes 193s | base: base-key@0x55ac0e3eb4d0 (48-bytes, EXTRACT_KEY_FROM_KEY) 193s | operation: FLAGS_ONLY 193s | params: 8-bytes@0x7ffdc5d02fc8 193s | NSS_IKE_PRF_DERIVE: 193s | target: NSS_IKE_PRF_PLUS_DERIVE 193s | base: base-key@0x55ac0e3ec4e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 193s | params: 56-bytes@0x7ffdc5d03030 193s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0x55ac0e3eb4d0 193s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x55ac0e3eb4d0 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 193s | sizeof bytes 32 193s | wrapper: (SECItemType)538976380: 3e c2 5d 61 f8 71 fe fc dd ac 38 bc a1 e0 5a 24 16 76 a4 f9 3b c8 60 9f 66 97 09 73 df 3f 66 66 193s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0x55ac0e3ebe10 193s | unwrapped: 193s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 193s | 74 79 cb a7 00 00 00 00 00 00 00 00 00 00 00 00 ty.............. 193s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: skeyseed: ok 193s | NSS_IKE_PRF_PLUS_DERIVE: 193s | target: EXTRACT_KEY_FROM_KEY 193s | key_size: 132-bytes 193s | base: base-key@0x55ac0e3eb4d0 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 193s | params: 40-bytes@0x7ffdc5d02f70 193s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 132 bytes of key@0x55ac0e3ec1a0 193s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x55ac0e3ec1a0 (132-bytes, EXTRACT_KEY_FROM_KEY) 193s | sizeof bytes 144 193s | wrapper: (SECItemType)538976380: 7f 72 e6 b6 d8 4b 34 4d 83 4c cb b2 fa 5a 9c d0 d1 92 af 75 1f f9 08 d1 f8 fe 9c 86 6e f5 04 17 a4 de 03 e0 5f c8 be 3a 76 dc c7 f4 a8 86 e1 35 13 46 19 e3 c7 a4 bb dc 6a c3 fe 7a 8b ec 0b 0b e6 ba 81 20 63 27 12 ca d3 53 d0 fd 0b 73 06 4c 00 a7 d4 e7 cc 20 c9 60 93 7f 88 90 1f 0d 68 40 b2 6b a8 75 4c d2 e3 99 85 7d 1e d4 b1 be 0f 0e 57 d3 e4 b2 15 48 84 a0 b2 bc e6 1a 92 c6 bd 33 a2 3d 62 62 52 06 7f 13 d4 b8 1f 0f f3 23 7f be 193s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 144 bytes at 0x55ac0e3eb3b0 193s | unwrapped: 193s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 193s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 193s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 193s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 193s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 193s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 193s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 193s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 193s | a7 a5 6c c4 00 00 00 00 00 00 00 00 00 00 00 00 ..l............. 193s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: DKM: ok 193s | key-offset: 0, key-size: 20 193s | EXTRACT_KEY_FROM_KEY: 193s | target: EXTRACT_KEY_FROM_KEY 193s | key_size: 20-bytes 193s | base: base-key@0x55ac0e3ec1a0 (132-bytes, EXTRACT_KEY_FROM_KEY) 193s | operation: FLAGS_ONLY 193s | params: 8-bytes@0x7ffdc5d03048 193s | CONCATENATE_DATA_AND_BASE: 193s | target: EXTRACT_KEY_FROM_KEY 193s | base: base-key@0x55ac0e3e84c0 (16-bytes, AES_KEY_GEN) 193s | params: 16-bytes@0x7ffdc5d03020 193s | key-offset: 0, key-size: 32 193s | EXTRACT_KEY_FROM_KEY: 193s | target: EXTRACT_KEY_FROM_KEY 193s | key_size: 32-bytes 193s | base: base-key@0x55ac0e3ec230 (48-bytes, EXTRACT_KEY_FROM_KEY) 193s | operation: FLAGS_ONLY 193s | params: 8-bytes@0x7ffdc5d02fb8 193s | NSS_IKE_PRF_DERIVE: 193s | target: NSS_IKE_PRF_PLUS_DERIVE 193s | base: base-key@0x55ac0e3e9de0 (20-bytes, EXTRACT_KEY_FROM_KEY) 193s | params: 56-bytes@0x7ffdc5d03010 193s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0x55ac0e3ec230 193s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x55ac0e3ec230 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 193s | sizeof bytes 32 193s | wrapper: (SECItemType)825242416: fa 33 2b d0 d7 da 01 ff 5f 40 db 59 25 98 29 b2 6f ee df b4 58 d5 65 71 0c a9 d2 c9 7c f6 3a 53 193s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0x55ac0e3e8490 193s | unwrapped: 193s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 193s | 56 bf 1f 1d 00 00 00 00 00 00 00 00 00 00 00 00 V............... 193s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: skeyseed_rekey: ok 193s ipsec algparse: leak detective found no leaks 193s /usr/libexec/ipsec/pluto: adjusting nssdir to /tmp/tmp.P60ZcZIr4L 193s /usr/libexec/ipsec/pluto: selftest: skipping lock 193s /usr/libexec/ipsec/pluto: selftest: skipping control socket 193s /usr/libexec/ipsec/pluto: selftest: skipping fork 193s Starting Pluto (Libreswan Version 5.2 IKEv2 IKEv1 XFRM XFRMI esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) (NSS-KDF) DNSSEC SYSTEMD_WATCHDOG LABELED_IPSEC (SELINUX) LIBCAP_NG LINUX_AUDIT AUTH_PAM NETWORKMANAGER CURL(non-NSS) LDAP(non-NSS) NFTABLES CAT NFLOG) pid:2107 193s operating system: Linux 6.18.0 [Linux 6.18.0-9-generic #9-Ubuntu SMP PREEMPT_DYNAMIC Mon Jan 12 16:49:02 UTC 2026 x86_64] 193s core dump dir: /run/pluto 193s secrets file: /etc/ipsec.secrets 193s Initializing NSS using read-only database "sql:/tmp/tmp.P60ZcZIr4L" 193s FIPS Mode: OFF 193s NSS crypto library initialized 193s FIPS mode disabled for pluto daemon 193s FIPS HMAC integrity support [not required] 193s libcap-ng capng_apply failed to apply changes, err=-5. see: man capng_apply 193s libcap-ng support [enabled] 193s Linux audit support [enabled] 193s leak-detective disabled 193s NSS crypto [enabled] 193s XAUTH PAM support [enabled] 193s initializing libevent in pthreads mode: headers: 2.1.12-stable (2010c00); library: 2.1.12-stable (2010c00) 193s NAT-Traversal: keep-alive period 20s 193s ERROR: xfrmi is not supported, failed to create ipsec-interface ipsec1 bound to lo 193s ipsec-interface is not working: xfrmi is not supported 193s IPsec Interface [disabled] 193s refreshed session resume keys, issuing key 1 193s Encryption algorithms: 193s AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 193s AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 193s AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 193s 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 193s CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 193s CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 193s AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 193s AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 193s AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 193s AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 193s AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 193s NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 193s NULL [] IKEv1: ESP IKEv2: ESP NULL 193s CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 193s Hash algorithms: 193s MD5 IKEv1: IKE IKEv2: NSS 193s SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 193s SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 193s SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 193s SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 193s IDENTITY IKEv1: IKEv2: FIPS 193s PRF algorithms: 193s HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 193s HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 193s HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 193s HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 193s HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 193s AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 193s Integrity algorithms: 193s HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 193s HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 193s HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 193s HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 193s HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 193s HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 193s AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 193s AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 193s NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 193s DH algorithms: 193s NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 193s MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 193s MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 193s MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 193s MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 193s MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 193s MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 193s DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 193s DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 193s DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 193s DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 193s IPCOMP algorithms: 193s DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 193s LZS IKEv1: IKEv2: ESP AH FIPS 193s LZJH IKEv1: IKEv2: ESP AH FIPS 193s testing CAMELLIA_CBC: 193s Camellia: 16 bytes with 128-bit key 193s Camellia: 16 bytes with 128-bit key 193s Camellia: 16 bytes with 256-bit key 193s Camellia: 16 bytes with 256-bit key 193s testing AES_GCM_16: 193s empty string 193s one block 193s two blocks 193s two blocks with associated data 193s testing AES_CTR: 193s Encrypting 16 octets using AES-CTR with 128-bit key 193s Encrypting 32 octets using AES-CTR with 128-bit key 193s Encrypting 36 octets using AES-CTR with 128-bit key 193s Encrypting 16 octets using AES-CTR with 192-bit key 193s Encrypting 32 octets using AES-CTR with 192-bit key 193s Encrypting 36 octets using AES-CTR with 192-bit key 193s Encrypting 16 octets using AES-CTR with 256-bit key 193s Encrypting 32 octets using AES-CTR with 256-bit key 193s Encrypting 36 octets using AES-CTR with 256-bit key 193s testing AES_CBC: 193s Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 193s Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 193s Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 193s Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 193s testing AES_XCBC: 193s RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 193s RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 193s RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 193s RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 193s RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 193s RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 193s RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 193s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 193s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 193s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 193s testing HMAC_MD5: 193s RFC 2104: MD5_HMAC test 1 193s RFC 2104: MD5_HMAC test 2 193s RFC 2104: MD5_HMAC test 3 193s testing HMAC_SHA1: 193s CAVP: IKEv2 key derivation with HMAC-SHA1 193s selftest: exiting pluto 193s autopkgtest [05:50:19]: test cryptocheck: -----------------------] 193s autopkgtest [05:50:19]: test cryptocheck: - - - - - - - - - - results - - - - - - - - - - 193s cryptocheck PASS 194s autopkgtest [05:50:20]: test cavp: preparing testbed 212s Creating nova instance adt-resolute-amd64-libreswan-20260204-054705-juju-7f2275-prod-proposed-migration-environment-15-cf0735ba-cd31-484a-b314-437613070b5d from image adt/ubuntu-resolute-amd64-server-20260203.img (UUID 74b0e1d0-93d1-4a18-9efb-95495079a2d9)... 293s autopkgtest [05:51:59]: testbed dpkg architecture: amd64 293s autopkgtest [05:51:59]: testbed apt version: 3.1.14 293s autopkgtest [05:51:59]: @@@@@@@@@@@@@@@@@@@@ test bed setup 294s autopkgtest [05:52:00]: testbed release detected to be: resolute 294s autopkgtest [05:52:00]: updating testbed package index (apt update) 295s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 295s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 295s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 295s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 295s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [35.1 kB] 295s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [5260 B] 295s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [233 kB] 295s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1711 kB] 295s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 Packages [301 kB] 295s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/main i386 Packages [231 kB] 295s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 c-n-f Metadata [7128 B] 296s Get:12 http://ftpmaster.internal/ubuntu resolute-proposed/restricted amd64 Packages [32.9 kB] 296s Get:13 http://ftpmaster.internal/ubuntu resolute-proposed/restricted i386 Packages [3692 B] 296s Get:14 http://ftpmaster.internal/ubuntu resolute-proposed/restricted amd64 c-n-f Metadata [336 B] 296s Get:15 http://ftpmaster.internal/ubuntu resolute-proposed/universe amd64 Packages [1566 kB] 296s Get:16 http://ftpmaster.internal/ubuntu resolute-proposed/universe i386 Packages [571 kB] 296s Get:17 http://ftpmaster.internal/ubuntu resolute-proposed/universe amd64 c-n-f Metadata [37.3 kB] 296s Get:18 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse i386 Packages [4480 B] 296s Get:19 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse amd64 Packages [30.0 kB] 296s Get:20 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse amd64 c-n-f Metadata [1060 B] 297s Fetched 4894 kB in 1s (3276 kB/s) 298s Reading package lists... 299s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 299s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 299s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 299s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 300s Reading package lists... 300s Reading package lists... 300s Building dependency tree... 300s Reading state information... 300s Calculating upgrade... 301s The following packages will be upgraded: 301s debconf debconf-i18n firmware-sof-signed htop libzstd1 powermgmt-base 301s python3-debconf python3-lazr.restfulclient zstd 301s 9 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 301s Need to get 3269 kB of archives. 301s After this operation, 24.6 kB disk space will be freed. 301s Get:1 http://ftpmaster.internal/ubuntu resolute/main amd64 firmware-sof-signed all 2025.05.1-1build1 [1696 kB] 301s Get:2 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 python3-debconf all 1.5.91build1 [4174 B] 301s Get:3 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 debconf-i18n all 1.5.91build1 [227 kB] 301s Get:4 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 debconf all 1.5.91build1 [126 kB] 301s Get:5 http://ftpmaster.internal/ubuntu resolute/main amd64 libzstd1 amd64 1.5.7+dfsg-3 [308 kB] 301s Get:6 http://ftpmaster.internal/ubuntu resolute/main amd64 powermgmt-base all 1.38ubuntu2 [7878 B] 301s Get:7 http://ftpmaster.internal/ubuntu resolute/main amd64 htop amd64 3.4.1-5build2 [177 kB] 301s Get:8 http://ftpmaster.internal/ubuntu resolute/main amd64 python3-lazr.restfulclient all 0.14.6-3build1 [51.1 kB] 301s Get:9 http://ftpmaster.internal/ubuntu resolute/main amd64 zstd amd64 1.5.7+dfsg-3 [672 kB] 301s dpkg-preconfigure: unable to re-open stdin: No such file or directory 301s Fetched 3269 kB in 0s (9708 kB/s) 302s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 302s Preparing to unpack .../firmware-sof-signed_2025.05.1-1build1_all.deb ... 302s Unpacking firmware-sof-signed (2025.05.1-1build1) over (2025.05.1-1) ... 302s Preparing to unpack .../python3-debconf_1.5.91build1_all.deb ... 302s Unpacking python3-debconf (1.5.91build1) over (1.5.91) ... 302s Preparing to unpack .../debconf-i18n_1.5.91build1_all.deb ... 302s Unpacking debconf-i18n (1.5.91build1) over (1.5.91) ... 302s Preparing to unpack .../debconf_1.5.91build1_all.deb ... 302s Unpacking debconf (1.5.91build1) over (1.5.91) ... 302s Setting up debconf (1.5.91build1) ... 302s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 302s Preparing to unpack .../libzstd1_1.5.7+dfsg-3_amd64.deb ... 302s Unpacking libzstd1:amd64 (1.5.7+dfsg-3) over (1.5.7+dfsg-2) ... 303s Setting up libzstd1:amd64 (1.5.7+dfsg-3) ... 303s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 303s Preparing to unpack .../powermgmt-base_1.38ubuntu2_all.deb ... 303s Unpacking powermgmt-base (1.38ubuntu2) over (1.38ubuntu1) ... 303s Preparing to unpack .../htop_3.4.1-5build2_amd64.deb ... 303s Unpacking htop (3.4.1-5build2) over (3.4.1-5build1) ... 303s Preparing to unpack .../python3-lazr.restfulclient_0.14.6-3build1_all.deb ... 303s Unpacking python3-lazr.restfulclient (0.14.6-3build1) over (0.14.6-3) ... 303s Preparing to unpack .../zstd_1.5.7+dfsg-3_amd64.deb ... 303s Unpacking zstd (1.5.7+dfsg-3) over (1.5.7+dfsg-2) ... 303s Setting up powermgmt-base (1.38ubuntu2) ... 303s Setting up htop (3.4.1-5build2) ... 303s Setting up firmware-sof-signed (2025.05.1-1build1) ... 303s Setting up python3-debconf (1.5.91build1) ... 303s Setting up debconf-i18n (1.5.91build1) ... 303s Setting up python3-lazr.restfulclient (0.14.6-3build1) ... 303s Setting up zstd (1.5.7+dfsg-3) ... 303s Processing triggers for man-db (2.13.1-1) ... 305s Processing triggers for libc-bin (2.42-2ubuntu4) ... 305s autopkgtest [05:52:11]: upgrading testbed (apt dist-upgrade and autopurge) 305s Reading package lists... 305s Building dependency tree... 305s Reading state information... 305s Calculating upgrade... 306s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 306s Reading package lists... 306s Building dependency tree... 306s Reading state information... 306s Solving dependencies... 306s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 309s Reading package lists... 309s Building dependency tree... 309s Reading state information... 309s Solving dependencies... 309s The following NEW packages will be installed: 309s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 309s libnss3-tools libreswan libunbound8 309s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 309s Need to get 2953 kB of archives. 309s After this operation, 11.9 MB of additional disk space will be used. 309s Get:1 http://ftpmaster.internal/ubuntu resolute/main amd64 dns-root-data all 2025080400build1 [6022 B] 309s Get:2 http://ftpmaster.internal/ubuntu resolute/main amd64 libnss3-tools amd64 2:3.120-1 [626 kB] 310s Get:3 http://ftpmaster.internal/ubuntu resolute/main amd64 libevent-pthreads-2.1-7t64 amd64 2.1.12-stable-10build1 [8360 B] 310s Get:4 http://ftpmaster.internal/ubuntu resolute/universe amd64 libldns3t64 amd64 1.8.4-2build1 [173 kB] 310s Get:5 http://ftpmaster.internal/ubuntu resolute/main amd64 libevent-2.1-7t64 amd64 2.1.12-stable-10build1 [155 kB] 310s Get:6 http://ftpmaster.internal/ubuntu resolute/main amd64 libunbound8 amd64 1.24.2-1ubuntu1 [462 kB] 310s Get:7 http://ftpmaster.internal/ubuntu resolute/universe amd64 libreswan amd64 5.2-2.2ubuntu1 [1523 kB] 310s Fetched 2953 kB in 0s (7924 kB/s) 310s Selecting previously unselected package dns-root-data. 310s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 310s Preparing to unpack .../0-dns-root-data_2025080400build1_all.deb ... 310s Unpacking dns-root-data (2025080400build1) ... 310s Selecting previously unselected package libnss3-tools. 310s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_amd64.deb ... 310s Unpacking libnss3-tools (2:3.120-1) ... 310s Selecting previously unselected package libevent-pthreads-2.1-7t64:amd64. 310s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build1_amd64.deb ... 310s Unpacking libevent-pthreads-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 310s Selecting previously unselected package libldns3t64:amd64. 310s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_amd64.deb ... 310s Unpacking libldns3t64:amd64 (1.8.4-2build1) ... 310s Selecting previously unselected package libevent-2.1-7t64:amd64. 310s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build1_amd64.deb ... 310s Unpacking libevent-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 310s Selecting previously unselected package libunbound8:amd64. 310s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_amd64.deb ... 310s Unpacking libunbound8:amd64 (1.24.2-1ubuntu1) ... 310s Selecting previously unselected package libreswan. 310s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_amd64.deb ... 310s Unpacking libreswan (5.2-2.2ubuntu1) ... 310s Setting up libldns3t64:amd64 (1.8.4-2build1) ... 310s Setting up libevent-pthreads-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 310s Setting up libevent-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 310s Setting up dns-root-data (2025080400build1) ... 310s Setting up libunbound8:amd64 (1.24.2-1ubuntu1) ... 310s Setting up libnss3-tools (2:3.120-1) ... 310s Setting up libreswan (5.2-2.2ubuntu1) ... 311s ipsec.service is a disabled or a static unit, not starting it. 311s Processing triggers for man-db (2.13.1-1) ... 312s Processing triggers for libc-bin (2.42-2ubuntu4) ... 314s autopkgtest [05:52:20]: test cavp: [----------------------- 314s Testing installed CAVP binary: /usr/libexec/ipsec/cavp 316s test: IKE v2 316s Reading from ikev2.fax 319s test: IKE v1 Digital Signature Authentication 319s Reading from ikev1_dsa.fax 320s test: IKE v1 Pre-shared Key Authentication 320s Reading from ikev1_psk.fax 322s /tmp/autopkgtest.OmfZHk/build.uH1/src 322s autopkgtest [05:52:28]: test cavp: -----------------------] 323s cavp PASS 323s autopkgtest [05:52:29]: test cavp: - - - - - - - - - - results - - - - - - - - - - 323s autopkgtest [05:52:29]: @@@@@@@@@@@@@@@@@@@@ summary 323s opportunistic SKIP exit status 77 and marked as skippable 323s cryptocheck PASS 323s cavp PASS