0s autopkgtest [01:10:05]: starting date and time: 2026-02-06 01:10:05+0000 0s autopkgtest [01:10:05]: git checkout: 4b346b80 nova: make wait_reboot return success even when a no-op 0s autopkgtest [01:10:05]: host juju-7f2275-prod-proposed-migration-environment-2; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.5psi49oi/out --timeout-copy=6000 --needs-internet=try --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:ca-certificates --apt-upgrade libreswan --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 --env=ADT_TEST_TRIGGERS=ca-certificates/20250419build1 -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest-cpu2-ram4-disk20-amd64 --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-2@sto01-17.secgroup --name adt-resolute-amd64-libreswan-20260206-011004-juju-7f2275-prod-proposed-migration-environment-2-08f635ba-cac8-4370-9a32-b2ae71de4d9c --image adt/ubuntu-resolute-amd64-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-2 --net-id=net_prod-autopkgtest-workers-amd64 -e TERM=linux --mirror=http://ftpmaster.internal/ubuntu/ 4s Creating nova instance adt-resolute-amd64-libreswan-20260206-011004-juju-7f2275-prod-proposed-migration-environment-2-08f635ba-cac8-4370-9a32-b2ae71de4d9c from image adt/ubuntu-resolute-amd64-server-20260204.img (UUID fedf54b4-458b-493e-8072-6425c19717b4)... 74s autopkgtest [01:11:19]: testbed dpkg architecture: amd64 74s autopkgtest [01:11:19]: testbed apt version: 3.1.14 75s autopkgtest [01:11:20]: @@@@@@@@@@@@@@@@@@@@ test bed setup 75s autopkgtest [01:11:20]: testbed release detected to be: None 76s autopkgtest [01:11:21]: updating testbed package index (apt update) 76s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 76s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 76s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 76s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 76s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [31.4 kB] 76s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1631 kB] 76s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [5260 B] 76s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [221 kB] 76s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 Packages [277 kB] 77s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/main i386 Packages [212 kB] 77s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 c-n-f Metadata [7304 B] 77s Get:12 http://ftpmaster.internal/ubuntu resolute-proposed/restricted amd64 Packages [32.9 kB] 77s Get:13 http://ftpmaster.internal/ubuntu resolute-proposed/restricted i386 Packages [3692 B] 77s Get:14 http://ftpmaster.internal/ubuntu resolute-proposed/restricted amd64 c-n-f Metadata [336 B] 77s Get:15 http://ftpmaster.internal/ubuntu resolute-proposed/universe amd64 Packages [1475 kB] 77s Get:16 http://ftpmaster.internal/ubuntu resolute-proposed/universe i386 Packages [569 kB] 77s Get:17 http://ftpmaster.internal/ubuntu resolute-proposed/universe amd64 c-n-f Metadata [43.2 kB] 77s Get:18 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse i386 Packages [4896 B] 77s Get:19 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse amd64 Packages [27.5 kB] 77s Get:20 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse amd64 c-n-f Metadata [1092 B] 78s Fetched 4667 kB in 1s (4358 kB/s) 78s Reading package lists... 79s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 79s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 79s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 79s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 80s Reading package lists... 80s Reading package lists... 80s Building dependency tree... 80s Reading state information... 80s Calculating upgrade... 80s The following packages will be upgraded: 80s amd64-microcode ca-certificates libdrm-amdgpu1 libdrm-common libdrm2 mawk 80s pollinate python3-linkify-it python3-referencing sed 80s 10 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 80s Need to get 933 kB of archives. 80s After this operation, 0 B of additional disk space will be used. 80s Get:1 http://ftpmaster.internal/ubuntu resolute/main amd64 sed amd64 4.9-2build3 [195 kB] 80s Get:2 http://ftpmaster.internal/ubuntu resolute/main amd64 mawk amd64 1.3.4.20260129-1 [133 kB] 80s Get:3 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 ca-certificates all 20250419build1 [163 kB] 80s Get:4 http://ftpmaster.internal/ubuntu resolute/main amd64 python3-linkify-it all 2.0.3-1ubuntu3 [19.4 kB] 80s Get:5 http://ftpmaster.internal/ubuntu resolute/main amd64 libdrm-common all 2.4.131-1 [9774 B] 80s Get:6 http://ftpmaster.internal/ubuntu resolute/main amd64 libdrm2 amd64 2.4.131-1 [42.3 kB] 80s Get:7 http://ftpmaster.internal/ubuntu resolute/main amd64 libdrm-amdgpu1 amd64 2.4.131-1 [23.2 kB] 80s Get:8 http://ftpmaster.internal/ubuntu resolute/main amd64 pollinate all 4.33-4ubuntu5 [14.0 kB] 80s Get:9 http://ftpmaster.internal/ubuntu resolute/main amd64 python3-referencing all 0.36.2-1ubuntu2 [22.2 kB] 80s Get:10 http://ftpmaster.internal/ubuntu resolute/main amd64 amd64-microcode amd64 3.20250708.1ubuntu2 [310 kB] 80s dpkg-preconfigure: unable to re-open stdin: No such file or directory 80s Fetched 933 kB in 0s (66.7 MB/s) 80s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 80s Preparing to unpack .../sed_4.9-2build3_amd64.deb ... 80s Unpacking sed (4.9-2build3) over (4.9-2build2) ... 80s Setting up sed (4.9-2build3) ... 80s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 80s Preparing to unpack .../0-mawk_1.3.4.20260129-1_amd64.deb ... 80s Unpacking mawk (1.3.4.20260129-1) over (1.3.4.20250131-2) ... 81s Preparing to unpack .../1-ca-certificates_20250419build1_all.deb ... 81s Unpacking ca-certificates (20250419build1) over (20250419) ... 81s Preparing to unpack .../2-python3-linkify-it_2.0.3-1ubuntu3_all.deb ... 81s Unpacking python3-linkify-it (2.0.3-1ubuntu3) over (2.0.3-1ubuntu2) ... 81s Preparing to unpack .../3-libdrm-common_2.4.131-1_all.deb ... 81s Unpacking libdrm-common (2.4.131-1) over (2.4.129-1) ... 81s Preparing to unpack .../4-libdrm2_2.4.131-1_amd64.deb ... 81s Unpacking libdrm2:amd64 (2.4.131-1) over (2.4.129-1) ... 81s Preparing to unpack .../5-libdrm-amdgpu1_2.4.131-1_amd64.deb ... 81s Unpacking libdrm-amdgpu1:amd64 (2.4.131-1) over (2.4.129-1) ... 81s Preparing to unpack .../6-pollinate_4.33-4ubuntu5_all.deb ... 81s Unpacking pollinate (4.33-4ubuntu5) over (4.33-4ubuntu4) ... 81s Preparing to unpack .../7-python3-referencing_0.36.2-1ubuntu2_all.deb ... 81s Unpacking python3-referencing (0.36.2-1ubuntu2) over (0.36.2-1ubuntu1) ... 81s Preparing to unpack .../8-amd64-microcode_3.20250708.1ubuntu2_amd64.deb ... 81s Unpacking amd64-microcode (3.20250708.1ubuntu2) over (3.20250708.1ubuntu1) ... 81s Setting up amd64-microcode (3.20250708.1ubuntu2) ... 81s amd64-microcode: microcode will be updated at next boot 81s Setting up ca-certificates (20250419build1) ... 82s Updating certificates in /etc/ssl/certs... 83s 0 added, 0 removed; done. 83s Setting up pollinate (4.33-4ubuntu5) ... 93s Setting up python3-linkify-it (2.0.3-1ubuntu3) ... 93s Setting up mawk (1.3.4.20260129-1) ... 93s Setting up libdrm-common (2.4.131-1) ... 93s Setting up python3-referencing (0.36.2-1ubuntu2) ... 93s Setting up libdrm2:amd64 (2.4.131-1) ... 93s Setting up libdrm-amdgpu1:amd64 (2.4.131-1) ... 93s Processing triggers for man-db (2.13.1-1) ... 94s Processing triggers for install-info (7.2-5) ... 94s Processing triggers for libc-bin (2.42-2ubuntu4) ... 94s Processing triggers for initramfs-tools (0.150ubuntu7) ... 94s update-initramfs: Generating /boot/initrd.img-6.18.0-9-generic 99s Processing triggers for ca-certificates (20250419build1) ... 99s Updating certificates in /etc/ssl/certs... 99s 0 added, 0 removed; done. 99s Running hooks in /etc/ca-certificates/update.d... 99s done. 99s autopkgtest [01:11:44]: upgrading testbed (apt dist-upgrade and autopurge) 99s Reading package lists... 100s Building dependency tree... 100s Reading state information... 100s Calculating upgrade... 100s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 100s Reading package lists... 100s Building dependency tree... 100s Reading state information... 100s Solving dependencies... 100s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 101s autopkgtest [01:11:46]: rebooting testbed after setup commands that affected boot 130s autopkgtest [01:12:15]: testbed running kernel: Linux 6.18.0-9-generic #9-Ubuntu SMP PREEMPT_DYNAMIC Mon Jan 12 16:49:02 UTC 2026 133s autopkgtest [01:12:18]: @@@@@@@@@@@@@@@@@@@@ apt-source libreswan 135s Get:1 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (dsc) [2735 B] 135s Get:2 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (tar) [4132 kB] 135s Get:3 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (asc) [862 B] 135s Get:4 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (diff) [16.7 kB] 135s gpgv: Signature made Thu Jul 31 14:30:12 2025 UTC 135s gpgv: using RSA key 25E3FF2D7F469DBE7D0D4E50AFCFEC8E669CE1C2 135s gpgv: Can't check signature: No public key 135s dpkg-source: warning: cannot verify inline signature for ./libreswan_5.2-2.2ubuntu1.dsc: no acceptable signature found 135s autopkgtest [01:12:20]: testing package libreswan version 5.2-2.2ubuntu1 136s autopkgtest [01:12:21]: build not needed 139s autopkgtest [01:12:24]: test opportunistic: preparing testbed 139s Reading package lists... 139s Building dependency tree... 139s Reading state information... 139s Solving dependencies... 139s The following NEW packages will be installed: 139s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 139s libnss3-tools libreswan libunbound8 139s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 139s Need to get 2953 kB of archives. 139s After this operation, 11.9 MB of additional disk space will be used. 139s Get:1 http://ftpmaster.internal/ubuntu resolute/main amd64 dns-root-data all 2025080400build1 [6022 B] 139s Get:2 http://ftpmaster.internal/ubuntu resolute/main amd64 libnss3-tools amd64 2:3.120-1 [626 kB] 139s Get:3 http://ftpmaster.internal/ubuntu resolute/main amd64 libevent-pthreads-2.1-7t64 amd64 2.1.12-stable-10build1 [8360 B] 139s Get:4 http://ftpmaster.internal/ubuntu resolute/universe amd64 libldns3t64 amd64 1.8.4-2build1 [173 kB] 139s Get:5 http://ftpmaster.internal/ubuntu resolute/main amd64 libevent-2.1-7t64 amd64 2.1.12-stable-10build1 [155 kB] 139s Get:6 http://ftpmaster.internal/ubuntu resolute/main amd64 libunbound8 amd64 1.24.2-1ubuntu1 [462 kB] 139s Get:7 http://ftpmaster.internal/ubuntu resolute/universe amd64 libreswan amd64 5.2-2.2ubuntu1 [1523 kB] 140s Fetched 2953 kB in 0s (9444 kB/s) 140s Selecting previously unselected package dns-root-data. 140s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 140s Preparing to unpack .../0-dns-root-data_2025080400build1_all.deb ... 140s Unpacking dns-root-data (2025080400build1) ... 140s Selecting previously unselected package libnss3-tools. 140s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_amd64.deb ... 140s Unpacking libnss3-tools (2:3.120-1) ... 140s Selecting previously unselected package libevent-pthreads-2.1-7t64:amd64. 140s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build1_amd64.deb ... 140s Unpacking libevent-pthreads-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 140s Selecting previously unselected package libldns3t64:amd64. 140s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_amd64.deb ... 140s Unpacking libldns3t64:amd64 (1.8.4-2build1) ... 140s Selecting previously unselected package libevent-2.1-7t64:amd64. 140s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build1_amd64.deb ... 140s Unpacking libevent-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 140s Selecting previously unselected package libunbound8:amd64. 140s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_amd64.deb ... 140s Unpacking libunbound8:amd64 (1.24.2-1ubuntu1) ... 140s Selecting previously unselected package libreswan. 140s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_amd64.deb ... 140s Unpacking libreswan (5.2-2.2ubuntu1) ... 140s Setting up libldns3t64:amd64 (1.8.4-2build1) ... 140s Setting up libevent-pthreads-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 140s Setting up libevent-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 140s Setting up dns-root-data (2025080400build1) ... 140s Setting up libunbound8:amd64 (1.24.2-1ubuntu1) ... 140s Setting up libnss3-tools (2:3.120-1) ... 140s Setting up libreswan (5.2-2.2ubuntu1) ... 140s ipsec.service is a disabled or a static unit, not starting it. 140s Processing triggers for man-db (2.13.1-1) ... 141s Processing triggers for libc-bin (2.42-2ubuntu4) ... 142s autopkgtest [01:12:27]: test opportunistic: [----------------------- 142s ping: oe.libreswan.org: No address associated with hostname 142s autopkgtest [01:12:27]: test opportunistic: -----------------------] 143s opportunistic SKIP exit status 77 and marked as skippable 143s autopkgtest [01:12:28]: test opportunistic: - - - - - - - - - - results - - - - - - - - - - 143s autopkgtest [01:12:28]: test cryptocheck: preparing testbed 151s Creating nova instance adt-resolute-amd64-libreswan-20260206-011004-juju-7f2275-prod-proposed-migration-environment-2-08f635ba-cac8-4370-9a32-b2ae71de4d9c from image adt/ubuntu-resolute-amd64-server-20260204.img (UUID fedf54b4-458b-493e-8072-6425c19717b4)... 226s autopkgtest [01:13:51]: testbed dpkg architecture: amd64 226s autopkgtest [01:13:51]: testbed apt version: 3.1.14 226s autopkgtest [01:13:51]: @@@@@@@@@@@@@@@@@@@@ test bed setup 227s autopkgtest [01:13:52]: testbed release detected to be: resolute 227s autopkgtest [01:13:52]: updating testbed package index (apt update) 227s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 227s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 227s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 227s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 227s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [221 kB] 227s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1631 kB] 228s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [31.4 kB] 228s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [5260 B] 228s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main i386 Packages [212 kB] 228s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 Packages [277 kB] 228s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 c-n-f Metadata [7304 B] 228s Get:12 http://ftpmaster.internal/ubuntu resolute-proposed/restricted i386 Packages [3692 B] 228s Get:13 http://ftpmaster.internal/ubuntu resolute-proposed/restricted amd64 Packages [32.9 kB] 228s Get:14 http://ftpmaster.internal/ubuntu resolute-proposed/restricted amd64 c-n-f Metadata [336 B] 228s Get:15 http://ftpmaster.internal/ubuntu resolute-proposed/universe amd64 Packages [1475 kB] 228s Get:16 http://ftpmaster.internal/ubuntu resolute-proposed/universe i386 Packages [569 kB] 228s Get:17 http://ftpmaster.internal/ubuntu resolute-proposed/universe amd64 c-n-f Metadata [43.2 kB] 228s Get:18 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse i386 Packages [4896 B] 228s Get:19 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse amd64 Packages [27.5 kB] 228s Get:20 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse amd64 c-n-f Metadata [1092 B] 229s Fetched 4667 kB in 1s (5372 kB/s) 229s Reading package lists... 230s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 230s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 230s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 230s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 230s Reading package lists... 230s Reading package lists... 231s Building dependency tree... 231s Reading state information... 231s Calculating upgrade... 231s The following packages will be upgraded: 231s amd64-microcode ca-certificates libdrm-amdgpu1 libdrm-common libdrm2 mawk 231s pollinate python3-linkify-it python3-referencing sed 231s 10 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 231s Need to get 933 kB of archives. 231s After this operation, 0 B of additional disk space will be used. 231s Get:1 http://ftpmaster.internal/ubuntu resolute/main amd64 sed amd64 4.9-2build3 [195 kB] 231s Get:2 http://ftpmaster.internal/ubuntu resolute/main amd64 mawk amd64 1.3.4.20260129-1 [133 kB] 231s Get:3 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 ca-certificates all 20250419build1 [163 kB] 231s Get:4 http://ftpmaster.internal/ubuntu resolute/main amd64 python3-linkify-it all 2.0.3-1ubuntu3 [19.4 kB] 231s Get:5 http://ftpmaster.internal/ubuntu resolute/main amd64 libdrm-common all 2.4.131-1 [9774 B] 231s Get:6 http://ftpmaster.internal/ubuntu resolute/main amd64 libdrm2 amd64 2.4.131-1 [42.3 kB] 231s Get:7 http://ftpmaster.internal/ubuntu resolute/main amd64 libdrm-amdgpu1 amd64 2.4.131-1 [23.2 kB] 231s Get:8 http://ftpmaster.internal/ubuntu resolute/main amd64 pollinate all 4.33-4ubuntu5 [14.0 kB] 231s Get:9 http://ftpmaster.internal/ubuntu resolute/main amd64 python3-referencing all 0.36.2-1ubuntu2 [22.2 kB] 231s Get:10 http://ftpmaster.internal/ubuntu resolute/main amd64 amd64-microcode amd64 3.20250708.1ubuntu2 [310 kB] 231s dpkg-preconfigure: unable to re-open stdin: No such file or directory 231s Fetched 933 kB in 0s (82.3 MB/s) 231s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 231s Preparing to unpack .../sed_4.9-2build3_amd64.deb ... 231s Unpacking sed (4.9-2build3) over (4.9-2build2) ... 231s Setting up sed (4.9-2build3) ... 231s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 231s Preparing to unpack .../0-mawk_1.3.4.20260129-1_amd64.deb ... 231s Unpacking mawk (1.3.4.20260129-1) over (1.3.4.20250131-2) ... 231s Preparing to unpack .../1-ca-certificates_20250419build1_all.deb ... 231s Unpacking ca-certificates (20250419build1) over (20250419) ... 231s Preparing to unpack .../2-python3-linkify-it_2.0.3-1ubuntu3_all.deb ... 231s Unpacking python3-linkify-it (2.0.3-1ubuntu3) over (2.0.3-1ubuntu2) ... 231s Preparing to unpack .../3-libdrm-common_2.4.131-1_all.deb ... 231s Unpacking libdrm-common (2.4.131-1) over (2.4.129-1) ... 232s Preparing to unpack .../4-libdrm2_2.4.131-1_amd64.deb ... 232s Unpacking libdrm2:amd64 (2.4.131-1) over (2.4.129-1) ... 232s Preparing to unpack .../5-libdrm-amdgpu1_2.4.131-1_amd64.deb ... 232s Unpacking libdrm-amdgpu1:amd64 (2.4.131-1) over (2.4.129-1) ... 232s Preparing to unpack .../6-pollinate_4.33-4ubuntu5_all.deb ... 232s Unpacking pollinate (4.33-4ubuntu5) over (4.33-4ubuntu4) ... 232s Preparing to unpack .../7-python3-referencing_0.36.2-1ubuntu2_all.deb ... 232s Unpacking python3-referencing (0.36.2-1ubuntu2) over (0.36.2-1ubuntu1) ... 232s Preparing to unpack .../8-amd64-microcode_3.20250708.1ubuntu2_amd64.deb ... 232s Unpacking amd64-microcode (3.20250708.1ubuntu2) over (3.20250708.1ubuntu1) ... 232s Setting up amd64-microcode (3.20250708.1ubuntu2) ... 232s amd64-microcode: microcode will be updated at next boot 232s Setting up ca-certificates (20250419build1) ... 233s Updating certificates in /etc/ssl/certs... 233s 0 added, 0 removed; done. 233s Setting up pollinate (4.33-4ubuntu5) ... 244s Setting up python3-linkify-it (2.0.3-1ubuntu3) ... 244s Setting up mawk (1.3.4.20260129-1) ... 244s Setting up libdrm-common (2.4.131-1) ... 244s Setting up python3-referencing (0.36.2-1ubuntu2) ... 244s Setting up libdrm2:amd64 (2.4.131-1) ... 244s Setting up libdrm-amdgpu1:amd64 (2.4.131-1) ... 244s Processing triggers for man-db (2.13.1-1) ... 245s Processing triggers for install-info (7.2-5) ... 245s Processing triggers for libc-bin (2.42-2ubuntu4) ... 245s Processing triggers for initramfs-tools (0.150ubuntu7) ... 245s update-initramfs: Generating /boot/initrd.img-6.18.0-9-generic 249s Processing triggers for ca-certificates (20250419build1) ... 249s Updating certificates in /etc/ssl/certs... 249s 0 added, 0 removed; done. 249s Running hooks in /etc/ca-certificates/update.d... 249s done. 250s autopkgtest [01:14:15]: upgrading testbed (apt dist-upgrade and autopurge) 250s Reading package lists... 250s Building dependency tree... 250s Reading state information... 250s Calculating upgrade... 250s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 250s Reading package lists... 250s Building dependency tree... 250s Reading state information... 250s Solving dependencies... 250s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 251s autopkgtest [01:14:16]: rebooting testbed after setup commands that affected boot 282s Reading package lists... 282s Building dependency tree... 282s Reading state information... 282s Solving dependencies... 283s The following NEW packages will be installed: 283s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 283s libnss3-tools libreswan libunbound8 283s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 283s Need to get 2953 kB of archives. 283s After this operation, 11.9 MB of additional disk space will be used. 283s Get:1 http://ftpmaster.internal/ubuntu resolute/main amd64 dns-root-data all 2025080400build1 [6022 B] 283s Get:2 http://ftpmaster.internal/ubuntu resolute/main amd64 libnss3-tools amd64 2:3.120-1 [626 kB] 283s Get:3 http://ftpmaster.internal/ubuntu resolute/main amd64 libevent-pthreads-2.1-7t64 amd64 2.1.12-stable-10build1 [8360 B] 283s Get:4 http://ftpmaster.internal/ubuntu resolute/universe amd64 libldns3t64 amd64 1.8.4-2build1 [173 kB] 283s Get:5 http://ftpmaster.internal/ubuntu resolute/main amd64 libevent-2.1-7t64 amd64 2.1.12-stable-10build1 [155 kB] 283s Get:6 http://ftpmaster.internal/ubuntu resolute/main amd64 libunbound8 amd64 1.24.2-1ubuntu1 [462 kB] 283s Get:7 http://ftpmaster.internal/ubuntu resolute/universe amd64 libreswan amd64 5.2-2.2ubuntu1 [1523 kB] 283s Fetched 2953 kB in 0s (6724 kB/s) 283s Selecting previously unselected package dns-root-data. 283s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 283s Preparing to unpack .../0-dns-root-data_2025080400build1_all.deb ... 283s Unpacking dns-root-data (2025080400build1) ... 283s Selecting previously unselected package libnss3-tools. 283s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_amd64.deb ... 283s Unpacking libnss3-tools (2:3.120-1) ... 283s Selecting previously unselected package libevent-pthreads-2.1-7t64:amd64. 283s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build1_amd64.deb ... 283s Unpacking libevent-pthreads-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 283s Selecting previously unselected package libldns3t64:amd64. 283s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_amd64.deb ... 283s Unpacking libldns3t64:amd64 (1.8.4-2build1) ... 283s Selecting previously unselected package libevent-2.1-7t64:amd64. 283s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build1_amd64.deb ... 283s Unpacking libevent-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 283s Selecting previously unselected package libunbound8:amd64. 283s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_amd64.deb ... 283s Unpacking libunbound8:amd64 (1.24.2-1ubuntu1) ... 283s Selecting previously unselected package libreswan. 283s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_amd64.deb ... 283s Unpacking libreswan (5.2-2.2ubuntu1) ... 283s Setting up libldns3t64:amd64 (1.8.4-2build1) ... 283s Setting up libevent-pthreads-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 283s Setting up libevent-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 283s Setting up dns-root-data (2025080400build1) ... 283s Setting up libunbound8:amd64 (1.24.2-1ubuntu1) ... 283s Setting up libnss3-tools (2:3.120-1) ... 283s Setting up libreswan (5.2-2.2ubuntu1) ... 284s ipsec.service is a disabled or a static unit, not starting it. 284s Processing triggers for man-db (2.13.1-1) ... 284s Processing triggers for libc-bin (2.42-2ubuntu4) ... 354s autopkgtest [01:15:59]: test cryptocheck: [----------------------- 354s Testing installed binary: /usr/libexec/ipsec/algparse 354s Testing installed binary: /usr/libexec/ipsec/pluto 354s testing -tp 354s ipsec algparse: Encryption algorithms: 354s ipsec algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 354s ipsec algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 354s ipsec algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 354s ipsec algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 354s ipsec algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 354s ipsec algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 354s ipsec algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 354s ipsec algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 354s ipsec algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 354s ipsec algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 354s ipsec algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 354s ipsec algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 354s ipsec algparse: NULL [] IKEv1: ESP IKEv2: ESP NULL 354s ipsec algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 354s ipsec algparse: Hash algorithms: 354s ipsec algparse: MD5 IKEv1: IKE IKEv2: NSS 354s ipsec algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 354s ipsec algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 354s ipsec algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 354s ipsec algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 354s ipsec algparse: IDENTITY IKEv1: IKEv2: FIPS 354s ipsec algparse: PRF algorithms: 354s ipsec algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 354s ipsec algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 354s ipsec algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 354s ipsec algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 354s ipsec algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 354s ipsec algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 354s ipsec algparse: Integrity algorithms: 354s ipsec algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 354s ipsec algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 354s ipsec algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 354s ipsec algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 354s ipsec algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 354s ipsec algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 354s ipsec algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 354s ipsec algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 354s ipsec algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 354s ipsec algparse: DH algorithms: 354s ipsec algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 354s ipsec algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 354s ipsec algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 354s ipsec algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 354s ipsec algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 354s ipsec algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 354s ipsec algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 354s ipsec algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 354s ipsec algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 354s ipsec algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 354s ipsec algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 354s ipsec algparse: IPCOMP algorithms: 354s ipsec algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 354s ipsec algparse: LZS IKEv1: IKEv2: ESP AH FIPS 354s ipsec algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 354s algparse -v2 'esp' (expect SUCCESS) 354s AES_GCM_16_256-NONE 354s AES_GCM_16_128-NONE 354s CHACHA20_POLY1305-NONE 354s AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 354s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 354s algparse -v2 'esp=' (expect ERROR) 354s ERROR: ESP proposal is empty 354s algparse -v2 'esp=aes' (expect SUCCESS) 354s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 354s algparse -v2 'esp=aes;modp2048' (expect SUCCESS) 354s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 354s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 354s AES_CBC-HMAC_SHA1_96 354s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 354s AES_CBC-HMAC_SHA1_96 354s algparse -v2 'esp=aes-sha1-modp2048' (expect SUCCESS) 354s AES_CBC-HMAC_SHA1_96 354s algparse -v2 'esp=aes-128-sha1' (expect SUCCESS) 354s AES_CBC_128-HMAC_SHA1_96 354s algparse -v2 'esp=aes-128-sha1' (expect SUCCESS) 354s AES_CBC_128-HMAC_SHA1_96 354s algparse -v2 'esp=aes-128-sha1-modp2048' (expect SUCCESS) 354s AES_CBC_128-HMAC_SHA1_96 354s algparse -v2 'esp=aes-128' (expect SUCCESS) 354s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 354s algparse -v2 'esp=aes_gcm_a-128-null' (expect SUCCESS) 354s AES_GCM_8_128-NONE 354s algparse -v2 'esp=3des-sha1;modp1024' (expect ERROR) 354s ERROR: ESP DH algorithm 'modp1024' is not supported 354s algparse -v2 'esp=3des-sha1;modp1536' (expect SUCCESS) 354s 3DES_CBC-HMAC_SHA1_96 354s algparse -v2 'esp=3des-sha1;modp2048' (expect SUCCESS) 354s 3DES_CBC-HMAC_SHA1_96 354s algparse -v2 'esp=3des-sha1;dh21' (expect SUCCESS) 354s 3DES_CBC-HMAC_SHA1_96 354s algparse -v2 'esp=3des-sha1;ecp_521' (expect SUCCESS) 354s 3DES_CBC-HMAC_SHA1_96 354s algparse -v2 'esp=3des-sha1;dh23' (expect ERROR) 354s ERROR: ESP DH algorithm 'dh23' is not supported 354s algparse -v2 'esp=3des-sha1;dh24' (expect ERROR) 354s ERROR: ESP DH algorithm 'dh24' is not supported 354s algparse -v2 'esp=3des-sha1' (expect SUCCESS) 354s 3DES_CBC-HMAC_SHA1_96 354s algparse -v2 'esp=null-sha1' (expect SUCCESS) 354s NULL-HMAC_SHA1_96 354s algparse -v2 'esp=aes_cbc' (expect SUCCESS) 354s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 354s algparse -v2 'esp=aes-sha' (expect SUCCESS) 354s | parsing 'AES_GCM_16_256,AES_GCM_16_128,CHACHA20_POLY1305,AES_CBC_256,AES_CBC_128' for ESP 354s | proposal: 'AES_GCM_16_256' 354s | token: '' '' "AES_GCM_16_256" '' 354s | token: '' "AES_GCM_16_256" '' '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_256' is not recognized 354s | token: '' '' '' 354s | appending ESP encryption algorithm AES_GCM_16[_256] 354s | appending ESP integrity algorithm NONE[_0] 354s | proposal: 'AES_GCM_16_128' 354s | token: '' '' "AES_GCM_16_128" '' 354s | token: '' "AES_GCM_16_128" '' '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_128' is not recognized 354s | token: '' '' '' 354s | appending ESP encryption algorithm AES_GCM_16[_128] 354s | appending ESP integrity algorithm NONE[_0] 354s | proposal: 'CHACHA20_POLY1305' 354s | token: '' '' "CHACHA20_POLY1305" '' 354s | token: '' "CHACHA20_POLY1305" '' '' 354s | token: '' '' '' 354s | appending ESP encryption algorithm CHACHA20_POLY1305[_0] 354s | appending ESP integrity algorithm NONE[_0] 354s | proposal: 'AES_CBC_256' 354s | token: '' '' "AES_CBC_256" '' 354s | token: '' "AES_CBC_256" '' '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_256' is not recognized 354s | token: '' '' '' 354s | appending ESP encryption algorithm AES_CBC[_256] 354s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 354s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 354s | proposal: 'AES_CBC_128' 354s | token: '' '' "AES_CBC_128" '' 354s | token: '' "AES_CBC_128" '' '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_128' is not recognized 354s | token: '' '' '' 354s | appending ESP encryption algorithm AES_CBC[_128] 354s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 354s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 354s | parsing '' for ESP 354s | parsing 'aes' for ESP 354s | proposal: 'aes' 354s | token: '' '' "aes" '' 354s | token: '' "aes" '' '' 354s | token: '' '' '' 354s | appending ESP encryption algorithm AES_CBC[_0] 354s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 354s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 354s | parsing 'aes;modp2048' for ESP 354s | proposal: 'aes;modp2048' 354s | token: '' '' "aes" ';' 354s | token: '' "aes" ';' "modp2048" '' 354s | token: ';' "modp2048" '' '' 354s | appending ESP encryption algorithm AES_CBC[_0] 354s | parsing dh: 354s | appending ESP DH algorithm MODP2048[_0] 354s | token: '' '' '' 354s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 354s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 354s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 354s | parsing 'aes-sha1' for ESP 354s | proposal: 'aes-sha1' 354s | token: '' '' "aes" '-' 354s | token: '' "aes" '-' "sha1" '' 354s | token: '-' "sha1" '' '' 354s | appending ESP encryption algorithm AES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: '' '' '' 354s | parsing 'aes-sha1' for ESP 354s | proposal: 'aes-sha1' 354s | token: '' '' "aes" '-' 354s | token: '' "aes" '-' "sha1" '' 354s | token: '-' "sha1" '' '' 354s | appending ESP encryption algorithm AES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: '' '' '' 354s | parsing 'aes-sha1-modp2048' for ESP 354s | proposal: 'aes-sha1-modp2048' 354s | token: '' '' "aes" '-' 354s | token: '' "aes" '-' "sha1" '-' 354s | token: '-' "sha1" '-' "modp2048" '' 354s | appending ESP encryption algorithm AES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: '-' "modp2048" '' '' 354s | parsing dh: 354s | appending ESP DH algorithm MODP2048[_0] 354s | token: '' '' '' 354s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 354s | parsing 'aes-128-sha1' for ESP 354s | proposal: 'aes-128-sha1' 354s | token: '' '' "aes" '-' 354s | token: '' "aes" '-' "128" '-' 354s | token: '-' "128" '-' "sha1" '' 354s | token: '-' "sha1" '' '' 354s | appending ESP encryption algorithm AES_CBC[_128] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: '' '' '' 354s | parsing 'aes-128-sha1' for ESP 354s | proposal: 'aes-128-sha1' 354s | token: '' '' "aes" '-' 354s | token: '' "aes" '-' "128" '-' 354s | token: '-' "128" '-' "sha1" '' 354s | token: '-' "sha1" '' '' 354s | appending ESP encryption algorithm AES_CBC[_128] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: '' '' '' 354s | parsing 'aes-128-sha1-modp2048' for ESP 354s | proposal: 'aes-128-sha1-modp2048' 354s | token: '' '' "aes" '-' 354s | token: '' "aes" '-' "128" '-' 354s | token: '-' "128" '-' "sha1" '-' 354s | token: '-' "sha1" '-' "modp2048" '' 354s | appending ESP encryption algorithm AES_CBC[_128] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: '-' "modp2048" '' '' 354s | parsing dh: 354s | appending ESP DH algorithm MODP2048[_0] 354s | token: '' '' '' 354s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 354s | parsing 'aes-128' for ESP 354s | proposal: 'aes-128' 354s | token: '' '' "aes" '-' 354s | token: '' "aes" '-' "128" '' 354s | token: '-' "128" '' '' 354s | token: '' '' '' 354s | appending ESP encryption algorithm AES_CBC[_128] 354s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 354s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 354s | parsing 'aes_gcm_a-128-null' for ESP 354s | proposal: 'aes_gcm_a-128-null' 354s | token: '' '' "aes_gcm_a" '-' 354s | token: '' "aes_gcm_a" '-' "128" '-' 354s | token: '-' "128" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_GCM_8[_128] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing '3des-sha1;modp1024' for ESP 354s | proposal: '3des-sha1;modp1024' 354s | token: '' '' "3des" '-' 354s | token: '' "3des" '-' "sha1" ';' 354s | token: '-' "sha1" ';' "modp1024" '' 354s | appending ESP encryption algorithm 3DES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: ';' "modp1024" '' '' 354s | parsing dh: 354s | ike_alg_byname() failed: ESP DH algorithm 'modp1024' is not supported 354s | lookup for DH algorithm 'modp1024' failed 354s | ... failed 'ESP DH algorithm 'modp1024' is not supported' 354s | parsing '3des-sha1;modp1536' for ESP 354s | proposal: '3des-sha1;modp1536' 354s | token: '' '' "3des" '-' 354s | token: '' "3des" '-' "sha1" ';' 354s | token: '-' "sha1" ';' "modp1536" '' 354s | appending ESP encryption algorithm 3DES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: ';' "modp1536" '' '' 354s | parsing dh: 354s | appending ESP DH algorithm MODP1536[_0] 354s | token: '' '' '' 354s ipsec algparse: ignoring ESP DH algorithm MODP1536 as PFS policy is disabled 354s | parsing '3des-sha1;modp2048' for ESP 354s | proposal: '3des-sha1;modp2048' 354s | token: '' '' "3des" '-' 354s | token: '' "3des" '-' "sha1" ';' 354s | token: '-' "sha1" ';' "modp2048" '' 354s | appending ESP encryption algorithm 3DES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: ';' "modp2048" '' '' 354s | parsing dh: 354s | appending ESP DH algorithm MODP2048[_0] 354s | token: '' '' '' 354s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 354s | parsing '3des-sha1;dh21' for ESP 354s | proposal: '3des-sha1;dh21' 354s | token: '' '' "3des" '-' 354s | token: '' "3des" '-' "sha1" ';' 354s | token: '-' "sha1" ';' "dh21" '' 354s | appending ESP encryption algorithm 3DES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: ';' "dh21" '' '' 354s | parsing dh: 354s | appending ESP DH algorithm DH21[_0] 354s | token: '' '' '' 354s ipsec algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 354s | parsing '3des-sha1;ecp_521' for ESP 354s | proposal: '3des-sha1;ecp_521' 354s | token: '' '' "3des" '-' 354s | token: '' "3des" '-' "sha1" ';' 354s | token: '-' "sha1" ';' "ecp_521" '' 354s | appending ESP encryption algorithm 3DES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: ';' "ecp_521" '' '' 354s | parsing dh: 354s | appending ESP DH algorithm DH21[_0] 354s | token: '' '' '' 354s ipsec algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 354s | parsing '3des-sha1;dh23' for ESP 354s | proposal: '3des-sha1;dh23' 354s | token: '' '' "3des" '-' 354s | token: '' "3des" '-' "sha1" ';' 354s | token: '-' "sha1" ';' "dh23" '' 354s | appending ESP encryption algorithm 3DES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: ';' "dh23" '' '' 354s | parsing dh: 354s | ike_alg_byname() failed: ESP DH algorithm 'dh23' is not supported 354s | lookup for DH algorithm 'dh23' failed 354s | ... failed 'ESP DH algorithm 'dh23' is not supported' 354s | parsing '3des-sha1;dh24' for ESP 354s | proposal: '3des-sha1;dh24' 354s | token: '' '' "3des" '-' 354s | token: '' "3des" '-' "sha1" ';' 354s | token: '-' "sha1" ';' "dh24" '' 354s | appending ESP encryption algorithm 3DES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: ';' "dh24" '' '' 354s | parsing dh: 354s | ike_alg_byname() failed: ESP DH algorithm 'dh24' is not supported 354s | lookup for DH algorithm 'dh24' failed 354s | ... failed 'ESP DH algorithm 'dh24' is not supported' 354s | parsing '3des-sha1' for ESP 354s | proposal: '3des-sha1' 354s | token: '' '' "3des" '-' 354s | token: '' "3des" '-' "sha1" '' 354s | token: '-' "sha1" '' '' 354s | appending ESP encryption algorithm 3DES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: '' '' '' 354s | parsing 'null-sha1' for ESP 354s | proposal: 'null-sha1' 354s | token: '' '' "null" '-' 354s | token: '' "null" '-' "sha1" '' 354s | token: '-' "sha1" '' '' 354s | appending ESP encryption algorithm NULL[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: '' '' '' 354s | parsing 'aes_cbc' for ESP 354s | proposal: 'aes_cbc' 354s | token: '' '' "aes_cbc" '' 354s | token: '' "aes_cbc" '' '' 354s | token: '' '' '' 354s | appending ESP encryption algorithm AES_CBC[_0] 354s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 354s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 354s AES_CBC-HMAC_SHA1_96 354s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 354s AES_CBC-HMAC_SHA1_96 354s algparse -v2 'esp=aes128-sha1' (expect SUCCESS) 354s AES_CBC_128-HMAC_SHA1_96 354s algparse -v2 'esp=aes-sha2' (expect SUCCESS) 354s AES_CBC-HMAC_SHA2_256_128 354s algparse -v2 'esp=aes-sha256' (expect SUCCESS) 354s AES_CBC-HMAC_SHA2_256_128 354s algparse -v2 'esp=aes-sha384' (expect SUCCESS) 354s AES_CBC-HMAC_SHA2_384_192 354s algparse -v2 'esp=aes-sha512' (expect SUCCESS) 354s AES_CBC-HMAC_SHA2_512_256 354s algparse -v2 'esp=aes128-aes_xcbc' (expect SUCCESS) 354s AES_CBC_128-AES_XCBC_96 354s algparse -v2 'esp=aes192-sha1' (expect SUCCESS) 354s AES_CBC_192-HMAC_SHA1_96 354s algparse -v2 'esp=aes256-sha1' (expect SUCCESS) 354s AES_CBC_256-HMAC_SHA1_96 354s algparse -v2 'esp=aes256-sha' (expect SUCCESS) 354s AES_CBC_256-HMAC_SHA1_96 354s algparse -v2 'esp=aes256-sha2' (expect SUCCESS) 354s AES_CBC_256-HMAC_SHA2_256_128 354s algparse -v2 'esp=aes256-sha2_256' (expect SUCCESS) 354s AES_CBC_256-HMAC_SHA2_256_128 354s algparse -v2 'esp=aes256-sha2_384' (expect SUCCESS) 354s AES_CBC_256-HMAC_SHA2_384_192 354s algparse -v2 'esp=aes256-sha2_512' (expect SUCCESS) 354s AES_CBC_256-HMAC_SHA2_512_256 354s algparse -v2 'esp=camellia' (expect SUCCESS) 354s CAMELLIA_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 354s algparse -v2 'esp=camellia128' (expect SUCCESS) 354s CAMELLIA_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 354s algparse -v2 'esp=camellia192' (expect SUCCESS) 354s CAMELLIA_CBC_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 354s algparse -v2 'esp=camellia256' (expect SUCCESS) 354s CAMELLIA_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 354s algparse -v2 'esp=aes_ccm' (expect SUCCESS) 354s AES_CCM_16-NONE 354s algparse -v2 'esp=aes_ccm_a-128-null' (expect SUCCESS) 354s | parsing 'aes-sha' for ESP 354s | proposal: 'aes-sha' 354s | token: '' '' "aes" '-' 354s | token: '' "aes" '-' "sha" '' 354s | token: '-' "sha" '' '' 354s | appending ESP encryption algorithm AES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: '' '' '' 354s | parsing 'aes-sha1' for ESP 354s | proposal: 'aes-sha1' 354s | token: '' '' "aes" '-' 354s | token: '' "aes" '-' "sha1" '' 354s | token: '-' "sha1" '' '' 354s | appending ESP encryption algorithm AES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: '' '' '' 354s | parsing 'aes128-sha1' for ESP 354s | proposal: 'aes128-sha1' 354s | token: '' '' "aes128" '-' 354s | token: '' "aes128" '-' "sha1" '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 354s | token: '-' "sha1" '' '' 354s | appending ESP encryption algorithm AES_CBC[_128] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: '' '' '' 354s | parsing 'aes-sha2' for ESP 354s | proposal: 'aes-sha2' 354s | token: '' '' "aes" '-' 354s | token: '' "aes" '-' "sha2" '' 354s | token: '-' "sha2" '' '' 354s | appending ESP encryption algorithm AES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 354s | token: '' '' '' 354s | parsing 'aes-sha256' for ESP 354s | proposal: 'aes-sha256' 354s | token: '' '' "aes" '-' 354s | token: '' "aes" '-' "sha256" '' 354s | token: '-' "sha256" '' '' 354s | appending ESP encryption algorithm AES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 354s | token: '' '' '' 354s | parsing 'aes-sha384' for ESP 354s | proposal: 'aes-sha384' 354s | token: '' '' "aes" '-' 354s | token: '' "aes" '-' "sha384" '' 354s | token: '-' "sha384" '' '' 354s | appending ESP encryption algorithm AES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 354s | token: '' '' '' 354s | parsing 'aes-sha512' for ESP 354s | proposal: 'aes-sha512' 354s | token: '' '' "aes" '-' 354s | token: '' "aes" '-' "sha512" '' 354s | token: '-' "sha512" '' '' 354s | appending ESP encryption algorithm AES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 354s | token: '' '' '' 354s | parsing 'aes128-aes_xcbc' for ESP 354s | proposal: 'aes128-aes_xcbc' 354s | token: '' '' "aes128" '-' 354s | token: '' "aes128" '-' "aes_xcbc" '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 354s | token: '-' "aes_xcbc" '' '' 354s | appending ESP encryption algorithm AES_CBC[_128] 354s | parsing integ: 354s | appending ESP integrity algorithm AES_XCBC_96[_0] 354s | token: '' '' '' 354s | parsing 'aes192-sha1' for ESP 354s | proposal: 'aes192-sha1' 354s | token: '' '' "aes192" '-' 354s | token: '' "aes192" '-' "sha1" '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'aes192' is not recognized 354s | token: '-' "sha1" '' '' 354s | appending ESP encryption algorithm AES_CBC[_192] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: '' '' '' 354s | parsing 'aes256-sha1' for ESP 354s | proposal: 'aes256-sha1' 354s | token: '' '' "aes256" '-' 354s | token: '' "aes256" '-' "sha1" '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 354s | token: '-' "sha1" '' '' 354s | appending ESP encryption algorithm AES_CBC[_256] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: '' '' '' 354s | parsing 'aes256-sha' for ESP 354s | proposal: 'aes256-sha' 354s | token: '' '' "aes256" '-' 354s | token: '' "aes256" '-' "sha" '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 354s | token: '-' "sha" '' '' 354s | appending ESP encryption algorithm AES_CBC[_256] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: '' '' '' 354s | parsing 'aes256-sha2' for ESP 354s | proposal: 'aes256-sha2' 354s | token: '' '' "aes256" '-' 354s | token: '' "aes256" '-' "sha2" '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 354s | token: '-' "sha2" '' '' 354s | appending ESP encryption algorithm AES_CBC[_256] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 354s | token: '' '' '' 354s | parsing 'aes256-sha2_256' for ESP 354s | proposal: 'aes256-sha2_256' 354s | token: '' '' "aes256" '-' 354s | token: '' "aes256" '-' "sha2_256" '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 354s | token: '-' "sha2_256" '' '' 354s | appending ESP encryption algorithm AES_CBC[_256] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 354s | token: '' '' '' 354s | parsing 'aes256-sha2_384' for ESP 354s | proposal: 'aes256-sha2_384' 354s | token: '' '' "aes256" '-' 354s | token: '' "aes256" '-' "sha2_384" '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 354s | token: '-' "sha2_384" '' '' 354s | appending ESP encryption algorithm AES_CBC[_256] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 354s | token: '' '' '' 354s | parsing 'aes256-sha2_512' for ESP 354s | proposal: 'aes256-sha2_512' 354s | token: '' '' "aes256" '-' 354s | token: '' "aes256" '-' "sha2_512" '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 354s | token: '-' "sha2_512" '' '' 354s | appending ESP encryption algorithm AES_CBC[_256] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 354s | token: '' '' '' 354s | parsing 'camellia' for ESP 354s | proposal: 'camellia' 354s | token: '' '' "camellia" '' 354s | token: '' "camellia" '' '' 354s | token: '' '' '' 354s | appending ESP encryption algorithm CAMELLIA_CBC[_0] 354s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 354s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 354s | parsing 'camellia128' for ESP 354s | proposal: 'camellia128' 354s | token: '' '' "camellia128" '' 354s | token: '' "camellia128" '' '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'camellia128' is not recognized 354s | token: '' '' '' 354s | appending ESP encryption algorithm CAMELLIA_CBC[_128] 354s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 354s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 354s | parsing 'camellia192' for ESP 354s | proposal: 'camellia192' 354s | token: '' '' "camellia192" '' 354s | token: '' "camellia192" '' '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'camellia192' is not recognized 354s | token: '' '' '' 354s | appending ESP encryption algorithm CAMELLIA_CBC[_192] 354s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 354s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 354s | parsing 'camellia256' for ESP 354s | proposal: 'camellia256' 354s | token: '' '' "camellia256" '' 354s | token: '' "camellia256" '' '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'camellia256' is not recognized 354s | token: '' '' '' 354s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 354s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 354s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 354s | parsing 'aes_ccm' for ESP 354s | proposal: 'aes_ccm' 354s | token: '' '' "aes_ccm" '' 354s | token: '' "aes_ccm" '' '' 354s | token: '' '' '' 354s | appending ESP encryption algorithm AES_CCM_16[_0] 354s | appending ESP integrity algorithm NONE[_0] 354s | parsing 'aes_ccm_a-128-null' for ESP 354s | proposal: 'aes_ccm_a-128-null' 354s | token: '' '' "aes_ccm_a" '-' 354s | token: '' "aes_ccm_a" '-' "128" '-' 354s | token: '-' "128" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_CCM_8[_128] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_ccm_a-192-null' for ESP 354s | proposal: 'aes_ccm_a-192-null' 354s | token: '' '' "aes_ccm_a" '-' 354s | token: '' "aes_ccm_a" '-' "192" '-' 354s | token: '-' "192" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_CCM_8[_192] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_ccm_a-256-null' for ESP 354s | proposal: 'aes_ccm_a-256-null' 354s | token: '' '' "aes_ccm_a" '-' 354s | token: '' "aes_ccm_a" '-' "256" '-' 354s | token: '-' "256" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_CCM_8[_256] 354s | parsing integ: 354s AES_CCM_8_128-NONE 354s algparse -v2 'esp=aes_ccm_a-192-null' (expect SUCCESS) 354s AES_CCM_8_192-NONE 354s algparse -v2 'esp=aes_ccm_a-256-null' (expect SUCCESS) 354s AES_CCM_8_256-NONE 354s algparse -v2 'esp=aes_ccm_b-128-null' (expect SUCCESS) 354s AES_CCM_12_128-NONE 354s algparse -v2 'esp=aes_ccm_b-192-null' (expect SUCCESS) 354s AES_CCM_12_192-NONE 354s algparse -v2 'esp=aes_ccm_b-256-null' (expect SUCCESS) 354s AES_CCM_12_256-NONE 354s algparse -v2 'esp=aes_ccm_c-128-null' (expect SUCCESS) 354s AES_CCM_16_128-NONE 354s algparse -v2 'esp=aes_ccm_c-192-null' (expect SUCCESS) 354s AES_CCM_16_192-NONE 354s algparse -v2 'esp=aes_ccm_c-256-null' (expect SUCCESS) 354s AES_CCM_16_256-NONE 354s algparse -v2 'esp=aes_gcm' (expect SUCCESS) 354s AES_GCM_16-NONE 354s algparse -v2 'esp=aes_gcm_a-128-null' (expect SUCCESS) 354s AES_GCM_8_128-NONE 354s algparse -v2 'esp=aes_gcm_a-192-null' (expect SUCCESS) 354s AES_GCM_8_192-NONE 354s algparse -v2 'esp=aes_gcm_a-256-null' (expect SUCCESS) 354s AES_GCM_8_256-NONE 354s algparse -v2 'esp=aes_gcm_b-128-null' (expect SUCCESS) 354s AES_GCM_12_128-NONE 354s algparse -v2 'esp=aes_gcm_b-192-null' (expect SUCCESS) 354s AES_GCM_12_192-NONE 354s algparse -v2 'esp=aes_gcm_b-256-null' (expect SUCCESS) 354s AES_GCM_12_256-NONE 354s algparse -v2 'esp=aes_gcm_c-128-null' (expect SUCCESS) 354s AES_GCM_16_128-NONE 354s algparse -v2 'esp=aes_gcm_c-192-null' (expect SUCCESS) 354s AES_GCM_16_192-NONE 354s algparse -v2 'esp=aes_gcm_c-256-null' (expect SUCCESS) 354s AES_GCM_16_256-NONE 354s algparse -v2 'esp=aes_ccm_a-null' (expect SUCCESS) 354s AES_CCM_8-NONE 354s algparse -v2 'esp=aes_ccm_b-null' (expect SUCCESS) 354s AES_CCM_12-NONE 354s algparse -v2 'esp=aes_ccm_c-null' (expect SUCCESS) 354s AES_CCM_16-NONE 354s algparse -v2 'esp=aes_gcm_a-null' (expect SUCCESS) 354s AES_GCM_8-NONE 354s algparse -v2 'esp=aes_gcm_b-null' (expect SUCCESS) 354s AES_GCM_12-NONE 354s algparse -v2 'esp=aes_gcm_c-null' (expect SUCCESS) 354s AES_GCM_16-NONE 354s algparse -v2 'esp=aes_ccm-null' (expect SUCCESS) 354s AES_CCM_16-NONE 354s algparse -v2 'esp=aes_gcm-null' (expect SUCCESS) 354s AES_GCM_16-NONE 354s algparse -v2 'esp=aes_ccm-256-null' (expect SUCCESS) 354s AES_CCM_16_256-NONE 354s algparse -v2 'esp=aes_gcm-192-null' (expect SUCCESS) 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_ccm_b-128-null' for ESP 354s | proposal: 'aes_ccm_b-128-null' 354s | token: '' '' "aes_ccm_b" '-' 354s | token: '' "aes_ccm_b" '-' "128" '-' 354s | token: '-' "128" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_CCM_12[_128] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_ccm_b-192-null' for ESP 354s | proposal: 'aes_ccm_b-192-null' 354s | token: '' '' "aes_ccm_b" '-' 354s | token: '' "aes_ccm_b" '-' "192" '-' 354s | token: '-' "192" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_CCM_12[_192] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_ccm_b-256-null' for ESP 354s | proposal: 'aes_ccm_b-256-null' 354s | token: '' '' "aes_ccm_b" '-' 354s | token: '' "aes_ccm_b" '-' "256" '-' 354s | token: '-' "256" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_CCM_12[_256] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_ccm_c-128-null' for ESP 354s | proposal: 'aes_ccm_c-128-null' 354s | token: '' '' "aes_ccm_c" '-' 354s | token: '' "aes_ccm_c" '-' "128" '-' 354s | token: '-' "128" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_CCM_16[_128] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_ccm_c-192-null' for ESP 354s | proposal: 'aes_ccm_c-192-null' 354s | token: '' '' "aes_ccm_c" '-' 354s | token: '' "aes_ccm_c" '-' "192" '-' 354s | token: '-' "192" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_CCM_16[_192] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_ccm_c-256-null' for ESP 354s | proposal: 'aes_ccm_c-256-null' 354s | token: '' '' "aes_ccm_c" '-' 354s | token: '' "aes_ccm_c" '-' "256" '-' 354s | token: '-' "256" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_CCM_16[_256] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_gcm' for ESP 354s | proposal: 'aes_gcm' 354s | token: '' '' "aes_gcm" '' 354s | token: '' "aes_gcm" '' '' 354s | token: '' '' '' 354s | appending ESP encryption algorithm AES_GCM_16[_0] 354s | appending ESP integrity algorithm NONE[_0] 354s | parsing 'aes_gcm_a-128-null' for ESP 354s | proposal: 'aes_gcm_a-128-null' 354s | token: '' '' "aes_gcm_a" '-' 354s | token: '' "aes_gcm_a" '-' "128" '-' 354s | token: '-' "128" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_GCM_8[_128] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_gcm_a-192-null' for ESP 354s | proposal: 'aes_gcm_a-192-null' 354s | token: '' '' "aes_gcm_a" '-' 354s | token: '' "aes_gcm_a" '-' "192" '-' 354s | token: '-' "192" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_GCM_8[_192] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_gcm_a-256-null' for ESP 354s | proposal: 'aes_gcm_a-256-null' 354s | token: '' '' "aes_gcm_a" '-' 354s | token: '' "aes_gcm_a" '-' "256" '-' 354s | token: '-' "256" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_GCM_8[_256] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_gcm_b-128-null' for ESP 354s | proposal: 'aes_gcm_b-128-null' 354s | token: '' '' "aes_gcm_b" '-' 354s | token: '' "aes_gcm_b" '-' "128" '-' 354s | token: '-' "128" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_GCM_12[_128] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_gcm_b-192-null' for ESP 354s | proposal: 'aes_gcm_b-192-null' 354s | token: '' '' "aes_gcm_b" '-' 354s | token: '' "aes_gcm_b" '-' "192" '-' 354s | token: '-' "192" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_GCM_12[_192] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_gcm_b-256-null' for ESP 354s | proposal: 'aes_gcm_b-256-null' 354s | token: '' '' "aes_gcm_b" '-' 354s | token: '' "aes_gcm_b" '-' "256" '-' 354s | token: '-' "256" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_GCM_12[_256] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_gcm_c-128-null' for ESP 354s | proposal: 'aes_gcm_c-128-null' 354s | token: '' '' "aes_gcm_c" '-' 354s | token: '' "aes_gcm_c" '-' "128" '-' 354s | token: '-' "128" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_GCM_16[_128] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_gcm_c-192-null' for ESP 354s | proposal: 'aes_gcm_c-192-null' 354s | token: '' '' "aes_gcm_c" '-' 354s | token: '' "aes_gcm_c" '-' "192" '-' 354s | token: '-' "192" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_GCM_16[_192] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_gcm_c-256-null' for ESP 354s | proposal: 'aes_gcm_c-256-null' 354s | token: '' '' "aes_gcm_c" '-' 354s | token: '' "aes_gcm_c" '-' "256" '-' 354s | token: '-' "256" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_GCM_16[_256] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_ccm_a-null' for ESP 354s | proposal: 'aes_ccm_a-null' 354s | token: '' '' "aes_ccm_a" '-' 354s | token: '' "aes_ccm_a" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_CCM_8[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_ccm_b-null' for ESP 354s | proposal: 'aes_ccm_b-null' 354s | token: '' '' "aes_ccm_b" '-' 354s | token: '' "aes_ccm_b" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_CCM_12[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_ccm_c-null' for ESP 354s | proposal: 'aes_ccm_c-null' 354s | token: '' '' "aes_ccm_c" '-' 354s | token: '' "aes_ccm_c" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_CCM_16[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_gcm_a-null' for ESP 354s | proposal: 'aes_gcm_a-null' 354s | token: '' '' "aes_gcm_a" '-' 354s | token: '' "aes_gcm_a" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_GCM_8[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_gcm_b-null' for ESP 354s | proposal: 'aes_gcm_b-null' 354s | token: '' '' "aes_gcm_b" '-' 354s | token: '' "aes_gcm_b" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_GCM_12[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_gcm_c-null' for ESP 354s | proposal: 'aes_gcm_c-null' 354s | token: '' '' "aes_gcm_c" '-' 354s | token: '' "aes_gcm_c" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_GCM_16[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_ccm-null' for ESP 354s | proposal: 'aes_ccm-null' 354s | token: '' '' "aes_ccm" '-' 354s | token: '' "aes_ccm" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_CCM_16[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_gcm-null' for ESP 354s | proposal: 'aes_gcm-null' 354s | token: '' '' "aes_gcm" '-' 354s | token: '' "aes_gcm" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_GCM_16[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_ccm-256-null' for ESP 354s | proposal: 'aes_ccm-256-null' 354s | token: '' '' "aes_ccm" '-' 354s | token: '' "aes_ccm" '-' "256" '-' 354s | token: '-' "256" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_CCM_16[_256] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s AES_GCM_16_192-NONE 354s algparse -v2 'esp=aes_ccm_256-null' (expect SUCCESS) 354s AES_CCM_16_256-NONE 354s algparse -v2 'esp=aes_gcm_192-null' (expect SUCCESS) 354s AES_GCM_16_192-NONE 354s algparse -v2 'esp=aes_ccm_8-null' (expect SUCCESS) 354s AES_CCM_8-NONE 354s algparse -v2 'esp=aes_ccm_12-null' (expect SUCCESS) 354s AES_CCM_12-NONE 354s algparse -v2 'esp=aes_ccm_16-null' (expect SUCCESS) 354s AES_CCM_16-NONE 354s algparse -v2 'esp=aes_gcm_8-null' (expect SUCCESS) 354s AES_GCM_8-NONE 354s algparse -v2 'esp=aes_gcm_12-null' (expect SUCCESS) 354s AES_GCM_12-NONE 354s algparse -v2 'esp=aes_gcm_16-null' (expect SUCCESS) 354s AES_GCM_16-NONE 354s algparse -v2 'esp=aes_ccm_8-128-null' (expect SUCCESS) 354s AES_CCM_8_128-NONE 354s algparse -v2 'esp=aes_ccm_12-192-null' (expect SUCCESS) 354s AES_CCM_12_192-NONE 354s algparse -v2 'esp=aes_ccm_16-256-null' (expect SUCCESS) 354s AES_CCM_16_256-NONE 354s algparse -v2 'esp=aes_gcm_8-128-null' (expect SUCCESS) 354s AES_GCM_8_128-NONE 354s algparse -v2 'esp=aes_gcm_12-192-null' (expect SUCCESS) 354s AES_GCM_12_192-NONE 354s algparse -v2 'esp=aes_gcm_16-256-null' (expect SUCCESS) 354s AES_GCM_16_256-NONE 354s algparse -v2 'esp=aes_ccm_8_128-null' (expect SUCCESS) 354s | parsing 'aes_gcm-192-null' for ESP 354s | proposal: 'aes_gcm-192-null' 354s | token: '' '' "aes_gcm" '-' 354s | token: '' "aes_gcm" '-' "192" '-' 354s | token: '-' "192" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_GCM_16[_192] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_ccm_256-null' for ESP 354s | proposal: 'aes_ccm_256-null' 354s | token: '' '' "aes_ccm_256" '-' 354s | token: '' "aes_ccm_256" '-' "null" '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_256' is not recognized 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_CCM_16[_256] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_gcm_192-null' for ESP 354s | proposal: 'aes_gcm_192-null' 354s | token: '' '' "aes_gcm_192" '-' 354s | token: '' "aes_gcm_192" '-' "null" '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_192' is not recognized 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_GCM_16[_192] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_ccm_8-null' for ESP 354s | proposal: 'aes_ccm_8-null' 354s | token: '' '' "aes_ccm_8" '-' 354s | token: '' "aes_ccm_8" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_CCM_8[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_ccm_12-null' for ESP 354s | proposal: 'aes_ccm_12-null' 354s | token: '' '' "aes_ccm_12" '-' 354s | token: '' "aes_ccm_12" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_CCM_12[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_ccm_16-null' for ESP 354s | proposal: 'aes_ccm_16-null' 354s | token: '' '' "aes_ccm_16" '-' 354s | token: '' "aes_ccm_16" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_CCM_16[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_gcm_8-null' for ESP 354s | proposal: 'aes_gcm_8-null' 354s | token: '' '' "aes_gcm_8" '-' 354s | token: '' "aes_gcm_8" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_GCM_8[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_gcm_12-null' for ESP 354s | proposal: 'aes_gcm_12-null' 354s | token: '' '' "aes_gcm_12" '-' 354s | token: '' "aes_gcm_12" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_GCM_12[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_gcm_16-null' for ESP 354s | proposal: 'aes_gcm_16-null' 354s | token: '' '' "aes_gcm_16" '-' 354s | token: '' "aes_gcm_16" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_GCM_16[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_ccm_8-128-null' for ESP 354s | proposal: 'aes_ccm_8-128-null' 354s | token: '' '' "aes_ccm_8" '-' 354s | token: '' "aes_ccm_8" '-' "128" '-' 354s | token: '-' "128" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_CCM_8[_128] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_ccm_12-192-null' for ESP 354s | proposal: 'aes_ccm_12-192-null' 354s | token: '' '' "aes_ccm_12" '-' 354s | token: '' "aes_ccm_12" '-' "192" '-' 354s | token: '-' "192" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_CCM_12[_192] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_ccm_16-256-null' for ESP 354s | proposal: 'aes_ccm_16-256-null' 354s | token: '' '' "aes_ccm_16" '-' 354s | token: '' "aes_ccm_16" '-' "256" '-' 354s | token: '-' "256" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_CCM_16[_256] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_gcm_8-128-null' for ESP 354s | proposal: 'aes_gcm_8-128-null' 354s | token: '' '' "aes_gcm_8" '-' 354s | token: '' "aes_gcm_8" '-' "128" '-' 354s | token: '-' "128" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_GCM_8[_128] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_gcm_12-192-null' for ESP 354s | proposal: 'aes_gcm_12-192-null' 354s | token: '' '' "aes_gcm_12" '-' 354s | token: '' "aes_gcm_12" '-' "192" '-' 354s | token: '-' "192" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_GCM_12[_192] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_gcm_16-256-null' for ESP 354s | proposal: 'aes_gcm_16-256-null' 354s | token: '' '' "aes_gcm_16" '-' 354s | token: '' "aes_gcm_16" '-' "256" '-' 354s | token: '-' "256" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_GCM_16[_256] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s AES_CCM_8_128-NONE 354s algparse -v2 'esp=aes_ccm_12_192-null' (expect SUCCESS) 354s AES_CCM_12_192-NONE 354s algparse -v2 'esp=aes_ccm_16_256-null' (expect SUCCESS) 354s AES_CCM_16_256-NONE 354s algparse -v2 'esp=aes_gcm_8_128-null' (expect SUCCESS) 354s AES_GCM_8_128-NONE 354s algparse -v2 'esp=aes_gcm_12_192-null' (expect SUCCESS) 354s AES_GCM_12_192-NONE 354s algparse -v2 'esp=aes_gcm_16_256-null' (expect SUCCESS) 354s AES_GCM_16_256-NONE 354s algparse -v2 'esp=aes_ctr' (expect SUCCESS) 354s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 354s algparse -v2 'esp=aesctr' (expect SUCCESS) 354s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 354s algparse -v2 'esp=aes_ctr128' (expect SUCCESS) 354s AES_CTR_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 354s algparse -v2 'esp=aes_ctr192' (expect SUCCESS) 354s AES_CTR_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 354s algparse -v2 'esp=aes_ctr256' (expect SUCCESS) 354s AES_CTR_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 354s algparse -v2 'esp=camellia_cbc_256-hmac_sha2_512_256;modp8192' (expect SUCCESS) 354s | parsing 'aes_ccm_8_128-null' for ESP 354s | proposal: 'aes_ccm_8_128-null' 354s | token: '' '' "aes_ccm_8_128" '-' 354s | token: '' "aes_ccm_8_128" '-' "null" '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_8_128' is not recognized 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_CCM_8[_128] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_ccm_12_192-null' for ESP 354s | proposal: 'aes_ccm_12_192-null' 354s | token: '' '' "aes_ccm_12_192" '-' 354s | token: '' "aes_ccm_12_192" '-' "null" '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_12_192' is not recognized 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_CCM_12[_192] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_ccm_16_256-null' for ESP 354s | proposal: 'aes_ccm_16_256-null' 354s | token: '' '' "aes_ccm_16_256" '-' 354s | token: '' "aes_ccm_16_256" '-' "null" '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_16_256' is not recognized 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_CCM_16[_256] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_gcm_8_128-null' for ESP 354s | proposal: 'aes_gcm_8_128-null' 354s | token: '' '' "aes_gcm_8_128" '-' 354s | token: '' "aes_gcm_8_128" '-' "null" '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_8_128' is not recognized 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_GCM_8[_128] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_gcm_12_192-null' for ESP 354s | proposal: 'aes_gcm_12_192-null' 354s | token: '' '' "aes_gcm_12_192" '-' 354s | token: '' "aes_gcm_12_192" '-' "null" '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_12_192' is not recognized 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_GCM_12[_192] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_gcm_16_256-null' for ESP 354s | proposal: 'aes_gcm_16_256-null' 354s | token: '' '' "aes_gcm_16_256" '-' 354s | token: '' "aes_gcm_16_256" '-' "null" '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_16_256' is not recognized 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_GCM_16[_256] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_ctr' for ESP 354s | proposal: 'aes_ctr' 354s | token: '' '' "aes_ctr" '' 354s | token: '' "aes_ctr" '' '' 354s | token: '' '' '' 354s | appending ESP encryption algorithm AES_CTR[_0] 354s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 354s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 354s | parsing 'aesctr' for ESP 354s | proposal: 'aesctr' 354s | token: '' '' "aesctr" '' 354s | token: '' "aesctr" '' '' 354s | token: '' '' '' 354s | appending ESP encryption algorithm AES_CTR[_0] 354s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 354s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 354s | parsing 'aes_ctr128' for ESP 354s | proposal: 'aes_ctr128' 354s | token: '' '' "aes_ctr128" '' 354s | token: '' "aes_ctr128" '' '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr128' is not recognized 354s | token: '' '' '' 354s | appending ESP encryption algorithm AES_CTR[_128] 354s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 354s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 354s | parsing 'aes_ctr192' for ESP 354s | proposal: 'aes_ctr192' 354s | token: '' '' "aes_ctr192" '' 354s | token: '' "aes_ctr192" '' '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr192' is not recognized 354s | token: '' '' '' 354s | appending ESP encryption algorithm AES_CTR[_192] 354s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 354s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 354s CAMELLIA_CBC_256-HMAC_SHA2_512_256 354s algparse -v2 'esp=null_auth_aes_gmac_256-null;modp8192' (expect SUCCESS) 354s NULL_AUTH_AES_GMAC_256-NONE 354s algparse -v2 'esp=3des-sha1;modp8192' (expect SUCCESS) 354s 3DES_CBC-HMAC_SHA1_96 354s algparse -v2 'esp=3des-sha1-modp8192' (expect SUCCESS) 354s 3DES_CBC-HMAC_SHA1_96 354s algparse -v2 'esp=aes-sha1,3des-sha1;modp8192' (expect SUCCESS) 354s AES_CBC-HMAC_SHA1_96 354s 3DES_CBC-HMAC_SHA1_96 354s algparse -v2 'esp=aes-sha1-modp8192,3des-sha1-modp8192' (expect SUCCESS) 354s AES_CBC-HMAC_SHA1_96 354s 3DES_CBC-HMAC_SHA1_96 354s algparse -v2 'esp=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' (expect SUCCESS) 354s | parsing 'aes_ctr256' for ESP 354s | proposal: 'aes_ctr256' 354s | token: '' '' "aes_ctr256" '' 354s | token: '' "aes_ctr256" '' '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr256' is not recognized 354s | token: '' '' '' 354s | appending ESP encryption algorithm AES_CTR[_256] 354s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 354s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 354s | parsing 'camellia_cbc_256-hmac_sha2_512_256;modp8192' for ESP 354s | proposal: 'camellia_cbc_256-hmac_sha2_512_256;modp8192' 354s | token: '' '' "camellia_cbc_256" '-' 354s | token: '' "camellia_cbc_256" '-' "hmac_sha2_512_256" ';' 354s | ike_alg_byname() failed: ESP encryption algorithm 'camellia_cbc_256' is not recognized 354s | token: '-' "hmac_sha2_512_256" ';' "modp8192" '' 354s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 354s | token: ';' "modp8192" '' '' 354s | parsing dh: 354s | appending ESP DH algorithm MODP8192[_0] 354s | token: '' '' '' 354s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 354s | parsing 'null_auth_aes_gmac_256-null;modp8192' for ESP 354s | proposal: 'null_auth_aes_gmac_256-null;modp8192' 354s | token: '' '' "null_auth_aes_gmac_256" '-' 354s | token: '' "null_auth_aes_gmac_256" '-' "null" ';' 354s | ike_alg_byname() failed: ESP encryption algorithm 'null_auth_aes_gmac_256' is not recognized 354s | token: '-' "null" ';' "modp8192" '' 354s | appending ESP encryption algorithm NULL_AUTH_AES_GMAC[_256] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: ';' "modp8192" '' '' 354s | parsing dh: 354s | appending ESP DH algorithm MODP8192[_0] 354s | token: '' '' '' 354s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 354s | parsing '3des-sha1;modp8192' for ESP 354s | proposal: '3des-sha1;modp8192' 354s | token: '' '' "3des" '-' 354s | token: '' "3des" '-' "sha1" ';' 354s | token: '-' "sha1" ';' "modp8192" '' 354s | appending ESP encryption algorithm 3DES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: ';' "modp8192" '' '' 354s | parsing dh: 354s | appending ESP DH algorithm MODP8192[_0] 354s | token: '' '' '' 354s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 354s | parsing '3des-sha1-modp8192' for ESP 354s | proposal: '3des-sha1-modp8192' 354s | token: '' '' "3des" '-' 354s | token: '' "3des" '-' "sha1" '-' 354s | token: '-' "sha1" '-' "modp8192" '' 354s | appending ESP encryption algorithm 3DES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: '-' "modp8192" '' '' 354s | parsing dh: 354s | appending ESP DH algorithm MODP8192[_0] 354s | token: '' '' '' 354s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 354s | parsing 'aes-sha1,3des-sha1;modp8192' for ESP 354s | proposal: 'aes-sha1' 354s | token: '' '' "aes" '-' 354s | token: '' "aes" '-' "sha1" '' 354s | token: '-' "sha1" '' '' 354s | appending ESP encryption algorithm AES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: '' '' '' 354s | proposal: '3des-sha1;modp8192' 354s | token: '' '' "3des" '-' 354s | token: '' "3des" '-' "sha1" ';' 354s | token: '-' "sha1" ';' "modp8192" '' 354s | appending ESP encryption algorithm 3DES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: ';' "modp8192" '' '' 354s | parsing dh: 354s | appending ESP DH algorithm MODP8192[_0] 354s | token: '' '' '' 354s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 354s | parsing 'aes-sha1-modp8192,3des-sha1-modp8192' for ESP 354s | proposal: 'aes-sha1-modp8192' 354s | token: '' '' "aes" '-' 354s | token: '' "aes" '-' "sha1" '-' 354s | token: '-' "sha1" '-' "modp8192" '' 354s | appending ESP encryption algorithm AES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: '-' "modp8192" '' '' 354s | parsing dh: 354s | appending ESP DH algorithm MODP8192[_0] 354s | token: '' '' '' 354s | proposal: '3des-sha1-modp8192' 354s | token: '' '' "3des" '-' 354s | token: '' "3des" '-' "sha1" '-' 354s | token: '-' "sha1" '-' "modp8192" '' 354s | appending ESP encryption algorithm 3DES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: '-' "modp8192" '' '' 354s | parsing dh: 354s | appending ESP DH algorithm MODP8192[_0] 354s | token: '' '' '' 354s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 354s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 354s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for ESP 354s | proposal: 'aes-sha1-modp8192' 354s | token: '' '' "aes" '-' 354s | token: '' "aes" '-' "sha1" '-' 354s | token: '-' "sha1" '-' "modp8192" '' 354s | appending ESP encryption algorithm AES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: '-' "modp8192" '' '' 354s | parsing dh: 354s | appending ESP DH algorithm MODP8192[_0] 354s | token: '' '' '' 354s | proposal: 'aes-sha1-modp8192' 354s | token: '' '' "aes" '-' 354s | token: '' "aes" '-' "sha1" '-' 354s | token: '-' "sha1" '-' "modp8192" '' 354s | appending ESP encryption algorithm AES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: '-' "modp8192" '' '' 354s | parsing dh: 354s | appending ESP DH algorithm MODP8192[_0] 354s | token: '' '' '' 354s | proposal: 'aes-sha1-modp8192' 354s | token: '' '' "aes" '-' 354s | token: '' "aes" '-' "sha1" '-' 354s | token: '-' "sha1" '-' "modp8192" '' 354s | appending ESP encryption algorithm AES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: '-' "modp8192" '' '' 354s | parsing dh: 354s | appending ESP DH algorithm MODP8192[_0] 354s | token: '' '' '' 354s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 354s | parsing 'aes;none' for ESP 354s | proposal: 'aes;none' 354s | token: '' '' "aes" ';' 354s | token: '' "aes" ';' "none" '' 354s AES_CBC-HMAC_SHA1_96 354s algparse -v2 'esp=aes;none' (expect SUCCESS) 354s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 354s algparse -v2 'esp=aes;none,aes' (expect SUCCESS) 354s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 354s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 354s algparse -v2 'esp=aes;none,aes;modp2048' (expect SUCCESS) 354s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 354s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 354s algparse -v2 'esp=aes-sha1-none' (expect SUCCESS) 354s AES_CBC-HMAC_SHA1_96 354s algparse -v2 'esp=aes-sha1;none' (expect SUCCESS) 354s | token: ';' "none" '' '' 354s | appending ESP encryption algorithm AES_CBC[_0] 354s | parsing dh: 354s | appending ESP DH algorithm NONE[_0] 354s | token: '' '' '' 354s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 354s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 354s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 354s | parsing 'aes;none,aes' for ESP 354s | proposal: 'aes;none' 354s | token: '' '' "aes" ';' 354s | token: '' "aes" ';' "none" '' 354s | token: ';' "none" '' '' 354s | appending ESP encryption algorithm AES_CBC[_0] 354s | parsing dh: 354s | appending ESP DH algorithm NONE[_0] 354s | token: '' '' '' 354s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 354s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 354s | proposal: 'aes' 354s | token: '' '' "aes" '' 354s | token: '' "aes" '' '' 354s | token: '' '' '' 354s | appending ESP encryption algorithm AES_CBC[_0] 354s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 354s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 354s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 354s | parsing 'aes;none,aes;modp2048' for ESP 354s | proposal: 'aes;none' 354s | token: '' '' "aes" ';' 354s | token: '' "aes" ';' "none" '' 354s | token: ';' "none" '' '' 354s | appending ESP encryption algorithm AES_CBC[_0] 354s | parsing dh: 354s | appending ESP DH algorithm NONE[_0] 354s | token: '' '' '' 354s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 354s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 354s | proposal: 'aes;modp2048' 354s | token: '' '' "aes" ';' 354s | token: '' "aes" ';' "modp2048" '' 354s | token: ';' "modp2048" '' '' 354s | appending ESP encryption algorithm AES_CBC[_0] 354s | parsing dh: 354s | appending ESP DH algorithm MODP2048[_0] 354s | token: '' '' '' 354s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 354s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 354s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 354s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 354s | parsing 'aes-sha1-none' for ESP 354s | proposal: 'aes-sha1-none' 354s | token: '' '' "aes" '-' 354s | token: '' "aes" '-' "sha1" '-' 354s | token: '-' "sha1" '-' "none" '' 354s | appending ESP encryption algorithm AES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: '-' "none" '' '' 354s | parsing dh: 354s | appending ESP DH algorithm NONE[_0] 354s | token: '' '' '' 354s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 354s | parsing 'aes-sha1;none' for ESP 354s | proposal: 'aes-sha1;none' 354s | token: '' '' "aes" '-' 354s | token: '' "aes" '-' "sha1" ';' 354s | token: '-' "sha1" ';' "none" '' 354s | appending ESP encryption algorithm AES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: ';' "none" '' '' 354s | parsing dh: 354s | appending ESP DH algorithm NONE[_0] 354s | token: '' '' '' 354s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 354s | parsing '3des168-sha1' for ESP 354s | proposal: '3des168-sha1' 354s | token: '' '' "3des168" '-' 354s | token: '' "3des168" '-' "sha1" '' 354s AES_CBC-HMAC_SHA1_96 354s algparse -v2 'esp=3des168-sha1' (expect ERROR) 354s ERROR: ESP encryption algorithm 3DES_CBC does not allow a key lengths 354s algparse -v2 'esp=3des-null' (expect ERROR) 354s ERROR: non-AEAD ESP encryption algorithm 3DES_CBC cannot have 'NONE' as the integrity algorithm 354s algparse -v2 'esp=aes128-null' (expect ERROR) 354s ERROR: non-AEAD ESP encryption algorithm AES_CBC cannot have 'NONE' as the integrity algorithm 354s algparse -v2 'esp=aes224-sha1' (expect ERROR) 354s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 354s algparse -v2 'esp=aes-224-sha1' (expect ERROR) 354s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 354s algparse -v2 'esp=aes0-sha1' (expect ERROR) 354s ERROR: ESP encryption key length is zero 354s algparse -v2 'esp=aes-0-sha1' (expect ERROR) 354s ERROR: ESP encryption key length is zero 354s algparse -v2 'esp=aes512-sha1' (expect ERROR) 354s ERROR: ESP encryption algorithm AES_CBC with key length 512 invalid; valid key lengths: 128, 192, 256 354s algparse -v2 'esp=aes-sha1555' (expect ERROR) 354s ERROR: ESP integrity algorithm 'sha1555' is not recognized 354s algparse -v2 'esp=camellia666-sha1' (expect ERROR) 354s ERROR: ESP encryption algorithm CAMELLIA_CBC with key length 666 invalid; valid key lengths: 128, 192, 256 354s algparse -v2 'esp=blowfish' (expect ERROR) 354s ERROR: ESP encryption algorithm 'blowfish' is not supported 354s algparse -v2 'esp=des-sha1' (expect ERROR) 354s ERROR: ESP encryption algorithm 'des' is not supported 354s algparse -v2 'esp=aes_ctr666' (expect ERROR) 354s ERROR: ESP encryption algorithm AES_CTR with key length 666 invalid; valid key lengths: 128, 192, 256 354s algparse -v2 'esp=aes128-sha2_128' (expect ERROR) 354s ERROR: ESP integrity algorithm 'sha2_128' is not recognized 354s algparse -v2 'esp=aes256-sha2_256-4096' (expect ERROR) 354s ERROR: ESP DH algorithm '4096' is not recognized 354s algparse -v2 'esp=aes256-sha2_256-128' (expect ERROR) 354s ERROR: ESP DH algorithm '128' is not recognized 354s algparse -v2 'esp=vanitycipher' (expect ERROR) 354s ERROR: ESP encryption algorithm 'vanitycipher' is not recognized 354s algparse -v2 'esp=ase-sah' (expect ERROR) 354s | ike_alg_byname() failed: ESP encryption algorithm '3des168' is not recognized 354s | parsing '3des-null' for ESP 354s | proposal: '3des-null' 354s | token: '' '' "3des" '-' 354s | token: '' "3des" '-' "null" '' 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm 3DES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes128-null' for ESP 354s | proposal: 'aes128-null' 354s | token: '' '' "aes128" '-' 354s | token: '' "aes128" '-' "null" '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 354s | token: '-' "null" '' '' 354s | appending ESP encryption algorithm AES_CBC[_128] 354s | parsing integ: 354s | appending ESP integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes224-sha1' for ESP 354s | proposal: 'aes224-sha1' 354s | token: '' '' "aes224" '-' 354s | token: '' "aes224" '-' "sha1" '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'aes224' is not recognized 354s | parsing 'aes-224-sha1' for ESP 354s | proposal: 'aes-224-sha1' 354s | token: '' '' "aes" '-' 354s | token: '' "aes" '-' "224" '-' 354s | byname('aes') with ='224' failed: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 354s | parsing 'aes0-sha1' for ESP 354s | proposal: 'aes0-sha1' 354s | token: '' '' "aes0" '-' 354s | token: '' "aes0" '-' "sha1" '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'aes0' is not recognized 354s | parsing 'aes-0-sha1' for ESP 354s | proposal: 'aes-0-sha1' 354s | token: '' '' "aes" '-' 354s | token: '' "aes" '-' "0" '-' 354s | parsing 'aes512-sha1' for ESP 354s | proposal: 'aes512-sha1' 354s | token: '' '' "aes512" '-' 354s | token: '' "aes512" '-' "sha1" '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'aes512' is not recognized 354s | parsing 'aes-sha1555' for ESP 354s | proposal: 'aes-sha1555' 354s | token: '' '' "aes" '-' 354s | token: '' "aes" '-' "sha1555" '' 354s | token: '-' "sha1555" '' '' 354s | appending ESP encryption algorithm AES_CBC[_0] 354s | parsing integ: 354s | ike_alg_byname() failed: ESP integrity algorithm 'sha1555' is not recognized 354s | lookup for integrity algorithm 'sha1555' failed 354s | or - failed 'ESP integrity algorithm 'sha1555' is not recognized') 354s | parsing 'camellia666-sha1' for ESP 354s | proposal: 'camellia666-sha1' 354s | token: '' '' "camellia666" '-' 354s | token: '' "camellia666" '-' "sha1" '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'camellia666' is not recognized 354s | parsing 'blowfish' for ESP 354s | proposal: 'blowfish' 354s | token: '' '' "blowfish" '' 354s | token: '' "blowfish" '' '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'blowfish' is not supported 354s | parsing 'des-sha1' for ESP 354s | proposal: 'des-sha1' 354s | token: '' '' "des" '-' 354s | token: '' "des" '-' "sha1" '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'des' is not supported 354s | parsing 'aes_ctr666' for ESP 354s | proposal: 'aes_ctr666' 354s | token: '' '' "aes_ctr666" '' 354s | token: '' "aes_ctr666" '' '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr666' is not recognized 354s | parsing 'aes128-sha2_128' for ESP 354s | proposal: 'aes128-sha2_128' 354s | token: '' '' "aes128" '-' 354s | token: '' "aes128" '-' "sha2_128" '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 354s | token: '-' "sha2_128" '' '' 354s | appending ESP encryption algorithm AES_CBC[_128] 354s | parsing integ: 354s | ike_alg_byname() failed: ESP integrity algorithm 'sha2_128' is not recognized 354s | lookup for integrity algorithm 'sha2_128' failed 354s | or - failed 'ESP integrity algorithm 'sha2_128' is not recognized') 354s | parsing 'aes256-sha2_256-4096' for ESP 354s | proposal: 'aes256-sha2_256-4096' 354s | token: '' '' "aes256" '-' 354s | token: '' "aes256" '-' "sha2_256" '-' 354s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 354s | token: '-' "sha2_256" '-' "4096" '' 354s | appending ESP encryption algorithm AES_CBC[_256] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 354s | token: '-' "4096" '' '' 354s | parsing dh: 354s | ike_alg_byname() failed: ESP DH algorithm '4096' is not recognized 354s | lookup for DH algorithm '4096' failed 354s | ... failed 'ESP DH algorithm '4096' is not recognized' 354s | parsing 'aes256-sha2_256-128' for ESP 354s | proposal: 'aes256-sha2_256-128' 354s | token: '' '' "aes256" '-' 354s | token: '' "aes256" '-' "sha2_256" '-' 354s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 354s | token: '-' "sha2_256" '-' "128" '' 354s | appending ESP encryption algorithm AES_CBC[_256] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 354s | token: '-' "128" '' '' 354s | parsing dh: 354s | ike_alg_byname() failed: ESP DH algorithm '128' is not recognized 354s | lookup for DH algorithm '128' failed 354s | ... failed 'ESP DH algorithm '128' is not recognized' 354s | parsing 'vanitycipher' for ESP 354s | proposal: 'vanitycipher' 354s | token: '' '' "vanitycipher" '' 354s | token: '' "vanitycipher" '' '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'vanitycipher' is not recognized 354s | parsing 'ase-sah' for ESP 354s | proposal: 'ase-sah' 354s | token: '' '' "ase" '-' 354s | token: '' "ase" '-' "sah" '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'ase' is not recognized 354s | parsing 'aes-sah1' for ESP 354s | proposal: 'aes-sah1' 354s | token: '' '' "aes" '-' 354s | token: '' "aes" '-' "sah1" '' 354s | token: '-' "sah1" '' '' 354s | appending ESP encryption algorithm AES_CBC[_0] 354s | parsing integ: 354s | ike_alg_byname() failed: ESP integrity algorithm 'sah1' is not recognized 354s | lookup for integrity algorithm 'sah1' failed 354s | or - failed 'ESP integrity algorithm 'sah1' is not recognized') 354s | parsing 'id3' for ESP 354s | proposal: 'id3' 354s | token: '' '' "id3" '' 354s | token: '' "id3" '' '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 354s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 354s | parsing 'aes-id3' for ESP 354s | proposal: 'aes-id3' 354s | token: '' '' "aes" '-' 354s | token: '' "aes" '-' "id3" '' 354s | token: '-' "id3" '' '' 354s | appending ESP encryption algorithm AES_CBC[_0] 354s | parsing integ: 354s | ike_alg_byname() failed: ESP integrity algorithm 'id3' is not recognized 354s | lookup for integrity algorithm 'id3' failed 354s | or - failed 'ESP integrity algorithm 'id3' is not recognized') 354s | parsing 'aes_gcm-md5' for ESP 354s | proposal: 'aes_gcm-md5' 354s | token: '' '' "aes_gcm" '-' 354s | token: '' "aes_gcm" '-' "md5" '' 354s | token: '-' "md5" '' '' 354s | appending ESP encryption algorithm AES_GCM_16[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_MD5_96[_0] 354s | token: '' '' '' 354s | parsing 'mars' for ESP 354s | proposal: 'mars' 354s | token: '' '' "mars" '' 354s | token: '' "mars" '' '' 354s | ike_alg_byname() failed: ESP encryption algorithm 'mars' is not supported 354s | parsing 'aes_gcm-16' for ESP 354s | proposal: 'aes_gcm-16' 354s | token: '' '' "aes_gcm" '-' 354s | token: '' "aes_gcm" '-' "16" '' 354s | byname('aes_gcm') with ='16' failed: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 354s | parsing 'aes_gcm-0' for ESP 354s | proposal: 'aes_gcm-0' 354s | token: '' '' "aes_gcm" '-' 354s | token: '' "aes_gcm" '-' "0" '' 354s | parsing 'aes_gcm-123456789012345' for ESP 354s | proposal: 'aes_gcm-123456789012345' 354s | token: '' '' "aes_gcm" '-' 354s | token: '' "aes_gcm" '-' "123456789012345" '' 354s | parsing '3des-sha1;dh22' for ESP 354s | proposal: '3des-sha1;dh22' 354s | token: '' '' "3des" '-' 354s | token: '' "3des" '-' "sha1" ';' 354s | token: '-' "sha1" ';' "dh22" '' 354s | appending ESP encryption algorithm 3DES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: ';' "dh22" '' '' 354s | parsing dh: 354s | ike_alg_byname() failed: ESP DH algorithm 'dh22' is not supported 354s | lookup for DH algorithm 'dh22' failed 354s | ... failed 'ESP DH algorithm 'dh22' is not supported' 354s | parsing '3des-sha1;modp8192,3des-sha2' for ESP 354s | proposal: '3des-sha1;modp8192' 354s | token: '' '' "3des" '-' 354s | token: '' "3des" '-' "sha1" ';' 354s | token: '-' "sha1" ';' "modp8192" '' 354s | appending ESP encryption algorithm 3DES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: ';' "modp8192" '' '' 354s | parsing dh: 354s | appending ESP DH algorithm MODP8192[_0] 354s | token: '' '' '' 354s | proposal: '3des-sha2' 354s | token: '' '' "3des" '-' 354s | token: '' "3des" '-' "sha2" '' 354s | token: '-' "sha2" '' '' 354s | appending ESP encryption algorithm 3DES_CBC[_0] 354s | parsing integ: 354s ERROR: ESP encryption algorithm 'ase' is not recognized 354s algparse -v2 'esp=aes-sah1' (expect ERROR) 354s ERROR: ESP integrity algorithm 'sah1' is not recognized 354s algparse -v2 'esp=id3' (expect ERROR) 354s ERROR: ESP encryption algorithm 'id3' is not recognized 354s algparse -v2 'esp=aes-id3' (expect ERROR) 354s ERROR: ESP integrity algorithm 'id3' is not recognized 354s algparse -v2 'esp=aes_gcm-md5' (expect ERROR) 354s ERROR: AEAD ESP encryption algorithm AES_GCM_16 must have 'NONE' as the integrity algorithm 354s algparse -v2 'esp=mars' (expect ERROR) 354s ERROR: ESP encryption algorithm 'mars' is not supported 354s algparse -v2 'esp=aes_gcm-16' (expect ERROR) 354s ERROR: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 354s algparse -v2 'esp=aes_gcm-0' (expect ERROR) 354s ERROR: ESP encryption key length is zero 354s algparse -v2 'esp=aes_gcm-123456789012345' (expect ERROR) 354s ERROR: ESP encryption algorithm 'aes_gcm-123456789012345' key length WAY too big 354s algparse -v2 'esp=3des-sha1;dh22' (expect ERROR) 354s ERROR: ESP DH algorithm 'dh22' is not supported 354s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2' (expect SUCCESS) 354s 3DES_CBC-HMAC_SHA1_96 354s 3DES_CBC-HMAC_SHA2_256_128 354s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2' (expect SUCCESS) 354s 3DES_CBC-HMAC_SHA1_96 354s 3DES_CBC-HMAC_SHA2_256_128 354s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2-modp8192' (expect SUCCESS) 354s 3DES_CBC-HMAC_SHA1_96 354s 3DES_CBC-HMAC_SHA2_256_128 354s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2;modp8192' (expect SUCCESS) 354s 3DES_CBC-HMAC_SHA1_96 354s 3DES_CBC-HMAC_SHA2_256_128 354s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2-modp8192' (expect SUCCESS) 354s 3DES_CBC-HMAC_SHA1_96 354s 3DES_CBC-HMAC_SHA2_256_128 354s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2;modp8192' (expect SUCCESS) 354s 3DES_CBC-HMAC_SHA1_96 354s 3DES_CBC-HMAC_SHA2_256_128 354s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2-modp2048' (expect SUCCESS) 354s 3DES_CBC-HMAC_SHA1_96 354s 3DES_CBC-HMAC_SHA2_256_128 354s algparse -v2 'ah' (expect SUCCESS) 354s HMAC_SHA2_512_256 354s HMAC_SHA2_256_128 354s algparse -v2 'ah=' (expect ERROR) 354s ERROR: AH proposal is empty 354s algparse -v2 'ah=md5' (expect SUCCESS) 354s HMAC_MD5_96 354s algparse -v2 'ah=sha' (expect SUCCESS) 354s HMAC_SHA1_96 354s algparse -v2 'ah=sha;modp2048' (expect SUCCESS) 354s HMAC_SHA1_96 354s algparse -v2 'ah=sha1' (expect SUCCESS) 354s HMAC_SHA1_96 354s algparse -v2 'ah=sha2' (expect SUCCESS) 354s HMAC_SHA2_256_128 354s algparse -v2 'ah=sha256' (expect SUCCESS) 354s HMAC_SHA2_256_128 354s algparse -v2 'ah=sha384' (expect SUCCESS) 354s HMAC_SHA2_384_192 354s algparse -v2 'ah=sha512' (expect SUCCESS) 354s HMAC_SHA2_512_256 354s algparse -v2 'ah=sha2_256' (expect SUCCESS) 354s HMAC_SHA2_256_128 354s algparse -v2 'ah=sha2_384' (expect SUCCESS) 354s HMAC_SHA2_384_192 354s algparse -v2 'ah=sha2_512' (expect SUCCESS) 354s HMAC_SHA2_512_256 354s algparse -v2 'ah=aes_xcbc' (expect SUCCESS) 354s AES_XCBC_96 354s algparse -v2 'ah=sha2-none' (expect SUCCESS) 354s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 354s | token: '' '' '' 354s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 354s | parsing '3des-sha1-modp8192,3des-sha2' for ESP 354s | proposal: '3des-sha1-modp8192' 354s | token: '' '' "3des" '-' 354s | token: '' "3des" '-' "sha1" '-' 354s | token: '-' "sha1" '-' "modp8192" '' 354s | appending ESP encryption algorithm 3DES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: '-' "modp8192" '' '' 354s | parsing dh: 354s | appending ESP DH algorithm MODP8192[_0] 354s | token: '' '' '' 354s | proposal: '3des-sha2' 354s | token: '' '' "3des" '-' 354s | token: '' "3des" '-' "sha2" '' 354s | token: '-' "sha2" '' '' 354s | appending ESP encryption algorithm 3DES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 354s | token: '' '' '' 354s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 354s | parsing '3des-sha1-modp8192,3des-sha2-modp8192' for ESP 354s | proposal: '3des-sha1-modp8192' 354s | token: '' '' "3des" '-' 354s | token: '' "3des" '-' "sha1" '-' 354s | token: '-' "sha1" '-' "modp8192" '' 354s | appending ESP encryption algorithm 3DES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: '-' "modp8192" '' '' 354s | parsing dh: 354s | appending ESP DH algorithm MODP8192[_0] 354s | token: '' '' '' 354s | proposal: '3des-sha2-modp8192' 354s | token: '' '' "3des" '-' 354s | token: '' "3des" '-' "sha2" '-' 354s | token: '-' "sha2" '-' "modp8192" '' 354s | appending ESP encryption algorithm 3DES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 354s | token: '-' "modp8192" '' '' 354s | parsing dh: 354s | appending ESP DH algorithm MODP8192[_0] 354s | token: '' '' '' 354s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 354s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 354s | parsing '3des-sha1-modp8192,3des-sha2;modp8192' for ESP 354s | proposal: '3des-sha1-modp8192' 354s | token: '' '' "3des" '-' 354s | token: '' "3des" '-' "sha1" '-' 354s | token: '-' "sha1" '-' "modp8192" '' 354s | appending ESP encryption algorithm 3DES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: '-' "modp8192" '' '' 354s | parsing dh: 354s | appending ESP DH algorithm MODP8192[_0] 354s | token: '' '' '' 354s | proposal: '3des-sha2;modp8192' 354s | token: '' '' "3des" '-' 354s | token: '' "3des" '-' "sha2" ';' 354s | token: '-' "sha2" ';' "modp8192" '' 354s | appending ESP encryption algorithm 3DES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 354s | token: ';' "modp8192" '' '' 354s | parsing dh: 354s | appending ESP DH algorithm MODP8192[_0] 354s | token: '' '' '' 354s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 354s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 354s | parsing '3des-sha1;modp8192,3des-sha2-modp8192' for ESP 354s | proposal: '3des-sha1;modp8192' 354s | token: '' '' "3des" '-' 354s | token: '' "3des" '-' "sha1" ';' 354s | token: '-' "sha1" ';' "modp8192" '' 354s | appending ESP encryption algorithm 3DES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: ';' "modp8192" '' '' 354s | parsing dh: 354s | appending ESP DH algorithm MODP8192[_0] 354s | token: '' '' '' 354s | proposal: '3des-sha2-modp8192' 354s | token: '' '' "3des" '-' 354s | token: '' "3des" '-' "sha2" '-' 354s | token: '-' "sha2" '-' "modp8192" '' 354s | appending ESP encryption algorithm 3DES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 354s | token: '-' "modp8192" '' '' 354s | parsing dh: 354s | appending ESP DH algorithm MODP8192[_0] 354s | token: '' '' '' 354s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 354s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 354s | parsing '3des-sha1;modp8192,3des-sha2;modp8192' for ESP 354s | proposal: '3des-sha1;modp8192' 354s | token: '' '' "3des" '-' 354s | token: '' "3des" '-' "sha1" ';' 354s | token: '-' "sha1" ';' "modp8192" '' 354s | appending ESP encryption algorithm 3DES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: ';' "modp8192" '' '' 354s | parsing dh: 354s | appending ESP DH algorithm MODP8192[_0] 354s | token: '' '' '' 354s | proposal: '3des-sha2;modp8192' 354s | token: '' '' "3des" '-' 354s | token: '' "3des" '-' "sha2" ';' 354s | token: '-' "sha2" ';' "modp8192" '' 354s | appending ESP encryption algorithm 3DES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 354s | token: ';' "modp8192" '' '' 354s | parsing dh: 354s | appending ESP DH algorithm MODP8192[_0] 354s | token: '' '' '' 354s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 354s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 354s | parsing '3des-sha1-modp8192,3des-sha2-modp2048' for ESP 354s | proposal: '3des-sha1-modp8192' 354s | token: '' '' "3des" '-' 354s | token: '' "3des" '-' "sha1" '-' 354s | token: '-' "sha1" '-' "modp8192" '' 354s | appending ESP encryption algorithm 3DES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 354s | token: '-' "modp8192" '' '' 354s | parsing dh: 354s | appending ESP DH algorithm MODP8192[_0] 354s | token: '' '' '' 354s | proposal: '3des-sha2-modp2048' 354s | token: '' '' "3des" '-' 354s | token: '' "3des" '-' "sha2" '-' 354s | token: '-' "sha2" '-' "modp2048" '' 354s | appending ESP encryption algorithm 3DES_CBC[_0] 354s | parsing integ: 354s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 354s | token: '-' "modp2048" '' '' 354s | parsing dh: 354s | appending ESP DH algorithm MODP2048[_0] 354s | token: '' '' '' 354s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 354s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 354s | parsing 'SHA2_512_256,SHA2_256_128' for AH 354s | proposal: 'SHA2_512_256' 354s | token: '' '' "SHA2_512_256" '' 354s | token: '' "SHA2_512_256" '' '' 354s | parsing integ: 354s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 354s | token: '' '' '' 354s | proposal: 'SHA2_256_128' 354s | token: '' '' "SHA2_256_128" '' 354s | token: '' "SHA2_256_128" '' '' 354s | parsing integ: 354s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 354s | token: '' '' '' 354s | parsing '' for AH 354s | parsing 'md5' for AH 354s | proposal: 'md5' 354s | token: '' '' "md5" '' 354s | token: '' "md5" '' '' 354s | parsing integ: 354s | appending AH integrity algorithm HMAC_MD5_96[_0] 354s | token: '' '' '' 354s | parsing 'sha' for AH 354s | proposal: 'sha' 354s | token: '' '' "sha" '' 354s | token: '' "sha" '' '' 354s | parsing integ: 354s | appending AH integrity algorithm HMAC_SHA1_96[_0] 354s | token: '' '' '' 354s | parsing 'sha;modp2048' for AH 354s | proposal: 'sha;modp2048' 354s | token: '' '' "sha" ';' 354s | token: '' "sha" ';' "modp2048" '' 354s | parsing integ: 354s | appending AH integrity algorithm HMAC_SHA1_96[_0] 354s | token: ';' "modp2048" '' '' 354s | parsing dh: 354s | appending AH DH algorithm MODP2048[_0] 354s | token: '' '' '' 354s ipsec algparse: ignoring AH DH algorithm MODP2048 as PFS policy is disabled 354s | parsing 'sha1' for AH 354s | proposal: 'sha1' 354s | token: '' '' "sha1" '' 354s | token: '' "sha1" '' '' 354s | parsing integ: 354s | appending AH integrity algorithm HMAC_SHA1_96[_0] 354s | token: '' '' '' 354s | parsing 'sha2' for AH 354s | proposal: 'sha2' 354s | token: '' '' "sha2" '' 354s | token: '' "sha2" '' '' 354s | parsing integ: 354s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 354s | token: '' '' '' 354s | parsing 'sha256' for AH 354s | proposal: 'sha256' 354s | token: '' '' "sha256" '' 354s | token: '' "sha256" '' '' 354s | parsing integ: 354s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 354s | token: '' '' '' 354s HMAC_SHA2_256_128 354s algparse -v2 'ah=sha2;none' (expect SUCCESS) 354s HMAC_SHA2_256_128 354s algparse -v2 'ah=sha1-modp8192,sha1-modp8192,sha1-modp8192' (expect SUCCESS) 354s HMAC_SHA1_96 354s algparse -v2 'ah=aes-sha1' (expect ERROR) 354s ERROR: AH integrity algorithm 'aes' is not recognized 354s algparse -v2 'ah=vanityhash1' (expect ERROR) 354s ERROR: AH integrity algorithm 'vanityhash1' is not recognized 354s algparse -v2 'ah=aes_gcm_c-256' (expect ERROR) 354s ERROR: AH integrity algorithm 'aes_gcm_c' is not recognized 354s algparse -v2 'ah=id3' (expect ERROR) 354s ERROR: AH integrity algorithm 'id3' is not recognized 354s algparse -v2 'ah=3des' (expect ERROR) 354s | parsing 'sha384' for AH 354s | proposal: 'sha384' 354s | token: '' '' "sha384" '' 354s | token: '' "sha384" '' '' 354s | parsing integ: 354s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 354s | token: '' '' '' 354s | parsing 'sha512' for AH 354s | proposal: 'sha512' 354s | token: '' '' "sha512" '' 354s | token: '' "sha512" '' '' 354s | parsing integ: 354s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 354s | token: '' '' '' 354s | parsing 'sha2_256' for AH 354s | proposal: 'sha2_256' 354s | token: '' '' "sha2_256" '' 354s | token: '' "sha2_256" '' '' 354s | parsing integ: 354s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 354s | token: '' '' '' 354s | parsing 'sha2_384' for AH 354s | proposal: 'sha2_384' 354s | token: '' '' "sha2_384" '' 354s | token: '' "sha2_384" '' '' 354s | parsing integ: 354s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 354s | token: '' '' '' 354s | parsing 'sha2_512' for AH 354s | proposal: 'sha2_512' 354s | token: '' '' "sha2_512" '' 354s | token: '' "sha2_512" '' '' 354s | parsing integ: 354s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 354s | token: '' '' '' 354s | parsing 'aes_xcbc' for AH 354s | proposal: 'aes_xcbc' 354s | token: '' '' "aes_xcbc" '' 354s | token: '' "aes_xcbc" '' '' 354s | parsing integ: 354s | appending AH integrity algorithm AES_XCBC_96[_0] 354s | token: '' '' '' 354s | parsing 'sha2-none' for AH 354s | proposal: 'sha2-none' 354s | token: '' '' "sha2" '-' 354s | token: '' "sha2" '-' "none" '' 354s | parsing integ: 354s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 354s | token: '-' "none" '' '' 354s | parsing dh: 354s | appending AH DH algorithm NONE[_0] 354s | token: '' '' '' 354s ipsec algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 354s | parsing 'sha2;none' for AH 354s | proposal: 'sha2;none' 354s | token: '' '' "sha2" ';' 354s | token: '' "sha2" ';' "none" '' 354s | parsing integ: 354s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 354s | token: ';' "none" '' '' 354s | parsing dh: 354s | appending AH DH algorithm NONE[_0] 354s | token: '' '' '' 354s ipsec algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 354s | parsing 'sha1-modp8192,sha1-modp8192,sha1-modp8192' for AH 354s | proposal: 'sha1-modp8192' 354s | token: '' '' "sha1" '-' 354s | token: '' "sha1" '-' "modp8192" '' 354s | parsing integ: 354s | appending AH integrity algorithm HMAC_SHA1_96[_0] 354s | token: '-' "modp8192" '' '' 354s | parsing dh: 354s | appending AH DH algorithm MODP8192[_0] 354s | token: '' '' '' 354s | proposal: 'sha1-modp8192' 354s | token: '' '' "sha1" '-' 354s | token: '' "sha1" '-' "modp8192" '' 354s | parsing integ: 354s | appending AH integrity algorithm HMAC_SHA1_96[_0] 354s | token: '-' "modp8192" '' '' 354s | parsing dh: 354s | appending AH DH algorithm MODP8192[_0] 354s | token: '' '' '' 354s | proposal: 'sha1-modp8192' 354s | token: '' '' "sha1" '-' 354s | token: '' "sha1" '-' "modp8192" '' 354s | parsing integ: 354s | appending AH integrity algorithm HMAC_SHA1_96[_0] 354s | token: '-' "modp8192" '' '' 354s | parsing dh: 354s | appending AH DH algorithm MODP8192[_0] 354s | token: '' '' '' 354s ipsec algparse: ignoring AH DH algorithm MODP8192 as PFS policy is disabled 354s | parsing 'aes-sha1' for AH 354s | proposal: 'aes-sha1' 354s | token: '' '' "aes" '-' 354s | token: '' "aes" '-' "sha1" '' 354s | parsing integ: 354s | ike_alg_byname() failed: AH integrity algorithm 'aes' is not recognized 354s | lookup for integrity algorithm 'aes' failed 354s | or - failed 'AH integrity algorithm 'aes' is not recognized') 354s | parsing 'vanityhash1' for AH 354s | proposal: 'vanityhash1' 354s | token: '' '' "vanityhash1" '' 354s | token: '' "vanityhash1" '' '' 354s | parsing integ: 354s | ike_alg_byname() failed: AH integrity algorithm 'vanityhash1' is not recognized 354s | lookup for integrity algorithm 'vanityhash1' failed 354s | or - failed 'AH integrity algorithm 'vanityhash1' is not recognized') 354s | parsing 'aes_gcm_c-256' for AH 354s | proposal: 'aes_gcm_c-256' 354s | token: '' '' "aes_gcm_c" '-' 354s | token: '' "aes_gcm_c" '-' "256" '' 354s | parsing integ: 354s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm_c' is not recognized 354s | lookup for integrity algorithm 'aes_gcm_c' failed 354s | or - failed 'AH integrity algorithm 'aes_gcm_c' is not recognized') 354s | parsing 'id3' for AH 354s | proposal: 'id3' 354s | token: '' '' "id3" '' 354s | token: '' "id3" '' '' 354s | parsing integ: 354s | ike_alg_byname() failed: AH integrity algorithm 'id3' is not recognized 354s | lookup for integrity algorithm 'id3' failed 354s | or - failed 'AH integrity algorithm 'id3' is not recognized') 354s | parsing '3des' for AH 354s | proposal: '3des' 354s | token: '' '' "3des" '' 354s | token: '' "3des" '' '' 354s | parsing integ: 354s | ike_alg_byname() failed: AH integrity algorithm '3des' is not recognized 354s | lookup for integrity algorithm '3des' failed 354s | or - failed 'AH integrity algorithm '3des' is not recognized') 354s | parsing 'null' for AH 354s | proposal: 'null' 354s | token: '' '' "null" '' 354s | token: '' "null" '' '' 354s | parsing integ: 354s | appending AH integrity algorithm NONE[_0] 354s | token: '' '' '' 354s | parsing 'aes_gcm' for AH 354s | proposal: 'aes_gcm' 354s | token: '' '' "aes_gcm" '' 354s | token: '' "aes_gcm" '' '' 354s | parsing integ: 354s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm' is not recognized 354s | lookup for integrity algorithm 'aes_gcm' failed 354s | or - failed 'AH integrity algorithm 'aes_gcm' is not recognized') 354s | parsing 'aes_ccm' for AH 354s | proposal: 'aes_ccm' 354s | token: '' '' "aes_ccm" '' 354s | token: '' "aes_ccm" '' '' 354s | parsing integ: 354s | ike_alg_byname() failed: AH integrity algorithm 'aes_ccm' is not recognized 354s | lookup for integrity algorithm 'aes_ccm' failed 354s | or - failed 'AH integrity algorithm 'aes_ccm' is not recognized') 354s | parsing 'ripemd' for AH 354s | proposal: 'ripemd' 354s | token: '' '' "ripemd" '' 354s | token: '' "ripemd" '' '' 354s | parsing integ: 354s | ike_alg_byname() failed: AH integrity algorithm 'ripemd' is not recognized 354s | lookup for integrity algorithm 'ripemd' failed 354s | or - failed 'AH integrity algorithm 'ripemd' is not recognized') 354s | parsing 'AES_GCM_16_256,AES_GCM_16_128,CHACHA20_POLY1305,AES_CBC_256,AES_CBC_128' for IKE 354s | proposal: 'AES_GCM_16_256' 354s | token: '' '' "AES_GCM_16_256" '' 354s | token: '' "AES_GCM_16_256" '' '' 354s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_256' is not recognized 354s | token: '' '' '' 354s | appending IKE encryption algorithm AES_GCM_16[_256] 354s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 354s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 354s | appending IKE integrity algorithm NONE[_0] 354s | appending IKE DH algorithm DH19[_0] 354s | appending IKE DH algorithm DH20[_0] 354s | appending IKE DH algorithm DH21[_0] 354s | appending IKE DH algorithm DH31[_0] 354s | appending IKE DH algorithm MODP4096[_0] 354s | appending IKE DH algorithm MODP3072[_0] 354s | appending IKE DH algorithm MODP2048[_0] 354s | appending IKE DH algorithm MODP8192[_0] 354s | proposal: 'AES_GCM_16_128' 354s | token: '' '' "AES_GCM_16_128" '' 354s | token: '' "AES_GCM_16_128" '' '' 354s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_128' is not recognized 354s | token: '' '' '' 354s | appending IKE encryption algorithm AES_GCM_16[_128] 354s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 354s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 354s | appending IKE integrity algorithm NONE[_0] 354s | appending IKE DH algorithm DH19[_0] 354s | appending IKE DH algorithm DH20[_0] 354s | appending IKE DH algorithm DH21[_0] 354s | appending IKE DH algorithm DH31[_0] 354s | appending IKE DH algorithm MODP4096[_0] 354s | appending IKE DH algorithm MODP3072[_0] 354s | appending IKE DH algorithm MODP2048[_0] 354s | appending IKE DH algorithm MODP8192[_0] 354s | proposal: 'CHACHA20_POLY1305' 354s | token: '' '' "CHACHA20_POLY1305" '' 354s | token: '' "CHACHA20_POLY1305" '' '' 354s | token: '' '' '' 354s | appending IKE encryption algorithm CHACHA20_POLY1305[_0] 354s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 354s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 354s | appending IKE integrity algorithm NONE[_0] 354s | appending IKE DH algorithm DH19[_0] 354s | appending IKE DH algorithm DH20[_0] 354s | appending IKE DH algorithm DH21[_0] 354s | appending IKE DH algorithm DH31[_0] 354s | appending IKE DH algorithm MODP4096[_0] 354s | appending IKE DH algorithm MODP3072[_0] 354s | appending IKE DH algorithm MODP2048[_0] 354s | appending IKE DH algorithm MODP8192[_0] 354s | proposal: 'AES_CBC_256' 354s | token: '' '' "AES_CBC_256" '' 354s | token: '' "AES_CBC_256" '' '' 354s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_256' is not recognized 354s | token: '' '' '' 354s | appending IKE encryption algorithm AES_CBC[_256] 354s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 354s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 354s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 354s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 354s | appending IKE DH algorithm DH19[_0] 354s | appending IKE DH algorithm DH20[_0] 354s | appending IKE DH algorithm DH21[_0] 354s | appending IKE DH algorithm DH31[_0] 354s | appending IKE DH algorithm MODP4096[_0] 354s | appending IKE DH algorithm MODP3072[_0] 354s | appending IKE DH algorithm MODP2048[_0] 354s | appending IKE DH algorithm MODP8192[_0] 354s | proposal: 'AES_CBC_128' 354s | token: '' '' "AES_CBC_128" '' 354s | token: '' "AES_CBC_128" '' '' 354s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_128' is not recognized 354s | token: '' '' '' 354s | appending IKE encryption algorithm AES_CBC[_128] 354s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 354s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 354s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 354s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 354s | appending IKE DH algorithm DH19[_0] 354s | appending IKE DH algorithm DH20[_0] 354s | appending IKE DH algorithm DH21[_0] 354s | appending IKE DH algorithm DH31[_0] 354s | appending IKE DH algorithm MODP4096[_0] 354s | appending IKE DH algorithm MODP3072[_0] 354s | appending IKE DH algorithm MODP2048[_0] 354s | appending IKE DH algorithm MODP8192[_0] 354s | parsing '' for IKE 354s | parsing '3des-sha1' for IKE 354s | proposal: '3des-sha1' 354s | token: '' '' "3des" '-' 354s | token: '' "3des" '-' "sha1" '' 354s | token: '-' "sha1" '' '' 354s | appending IKE encryption algorithm 3DES_CBC[_0] 354s | parsing prf: 354s | appending IKE PRF algorithm HMAC_SHA1[_0] 354s | token: '' '' '' 354s | - succeeded, advancing tokens 354s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 354s | appending IKE DH algorithm DH19[_0] 354s | appending IKE DH algorithm DH20[_0] 354s | appending IKE DH algorithm DH21[_0] 354s | appending IKE DH algorithm DH31[_0] 354s | appending IKE DH algorithm MODP4096[_0] 354s | appending IKE DH algorithm MODP3072[_0] 354s | appending IKE DH algorithm MODP2048[_0] 354s | appending IKE DH algorithm MODP8192[_0] 354s ERROR: AH integrity algorithm '3des' is not recognized 354s algparse -v2 'ah=null' (expect ERROR) 354s ERROR: AH cannot have 'none' as the integrity algorithm 354s algparse -v2 'ah=aes_gcm' (expect ERROR) 354s ERROR: AH integrity algorithm 'aes_gcm' is not recognized 354s algparse -v2 'ah=aes_ccm' (expect ERROR) 354s ERROR: AH integrity algorithm 'aes_ccm' is not recognized 354s algparse -v2 'ah=ripemd' (expect ERROR) 354s ERROR: AH integrity algorithm 'ripemd' is not recognized 354s algparse -v2 'ike' (expect SUCCESS) 354s AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 354s AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 354s CHACHA20_POLY1305-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 354s AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 354s AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 354s algparse -v2 'ike=' (expect ERROR) 354s ERROR: IKE proposal is empty 354s algparse -v2 'ike=3des-sha1' (expect SUCCESS) 354s 3DES_CBC-HMAC_SHA1-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 354s algparse -v2 'ike=3des-sha1' (expect SUCCESS) 354s 3DES_CBC-HMAC_SHA1-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 354s algparse -v2 'ike=3des-sha1;modp1536' (expect SUCCESS) 354s 3DES_CBC-HMAC_SHA1-MODP1536 354s algparse -v2 'ike=3des;dh21' (expect SUCCESS) 354s 3DES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH21 354s algparse -v2 'ike=3des-sha1;dh21' (expect SUCCESS) 354s 3DES_CBC-HMAC_SHA1-DH21 354s algparse -v2 'ike=3des-sha1-ecp_521' (expect SUCCESS) 354s 3DES_CBC-HMAC_SHA1-DH21 354s algparse -v2 'ike=3des+aes' (expect SUCCESS) 354s 3DES_CBC+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 354s algparse -v2 'ike=aes;none' (expect ERROR) 354s ERROR: IKE DH algorithm 'none' not permitted 354s algparse -v2 'ike=id2' (expect ERROR) 354s ERROR: IKE encryption algorithm 'id2' is not recognized 354s algparse -v2 'ike=3des-id2' (expect ERROR) 354s | parsing '3des-sha1' for IKE 354s | proposal: '3des-sha1' 354s | token: '' '' "3des" '-' 354s | token: '' "3des" '-' "sha1" '' 354s | token: '-' "sha1" '' '' 354s | appending IKE encryption algorithm 3DES_CBC[_0] 354s | parsing prf: 354s | appending IKE PRF algorithm HMAC_SHA1[_0] 354s | token: '' '' '' 354s | - succeeded, advancing tokens 354s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 354s | appending IKE DH algorithm DH19[_0] 354s | appending IKE DH algorithm DH20[_0] 354s | appending IKE DH algorithm DH21[_0] 354s | appending IKE DH algorithm DH31[_0] 354s | appending IKE DH algorithm MODP4096[_0] 354s | appending IKE DH algorithm MODP3072[_0] 354s | appending IKE DH algorithm MODP2048[_0] 354s | appending IKE DH algorithm MODP8192[_0] 354s | parsing '3des-sha1;modp1536' for IKE 354s | proposal: '3des-sha1;modp1536' 354s | token: '' '' "3des" '-' 354s | token: '' "3des" '-' "sha1" ';' 354s | token: '-' "sha1" ';' "modp1536" '' 354s | appending IKE encryption algorithm 3DES_CBC[_0] 354s | parsing prf: 354s | appending IKE PRF algorithm HMAC_SHA1[_0] 354s | token: ';' "modp1536" '' '' 354s | - succeeded, advancing tokens 354s | parsing dh: 354s | appending IKE DH algorithm MODP1536[_0] 354s | token: '' '' '' 354s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 354s | parsing '3des;dh21' for IKE 354s | proposal: '3des;dh21' 354s | token: '' '' "3des" ';' 354s | token: '' "3des" ';' "dh21" '' 354s | token: ';' "dh21" '' '' 354s | appending IKE encryption algorithm 3DES_CBC[_0] 354s | parsing dh: 354s | appending IKE DH algorithm DH21[_0] 354s | token: '' '' '' 354s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 354s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 354s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 354s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 354s | parsing '3des-sha1;dh21' for IKE 354s | proposal: '3des-sha1;dh21' 354s | token: '' '' "3des" '-' 354s | token: '' "3des" '-' "sha1" ';' 354s | token: '-' "sha1" ';' "dh21" '' 354s | appending IKE encryption algorithm 3DES_CBC[_0] 354s | parsing prf: 354s | appending IKE PRF algorithm HMAC_SHA1[_0] 354s | token: ';' "dh21" '' '' 354s | - succeeded, advancing tokens 354s | parsing dh: 354s | appending IKE DH algorithm DH21[_0] 354s | token: '' '' '' 354s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 354s | parsing '3des-sha1-ecp_521' for IKE 354s | proposal: '3des-sha1-ecp_521' 354s | token: '' '' "3des" '-' 354s | token: '' "3des" '-' "sha1" '-' 354s | token: '-' "sha1" '-' "ecp_521" '' 354s | appending IKE encryption algorithm 3DES_CBC[_0] 354s | parsing prf: 354s | appending IKE PRF algorithm HMAC_SHA1[_0] 354s | token: '-' "ecp_521" '' '' 354s | - succeeded, advancing tokens 354s | parsing dh: 354s | appending IKE DH algorithm DH21[_0] 354s | token: '' '' '' 354s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 354s | parsing '3des+aes' for IKE 354s | proposal: '3des+aes' 354s | token: '' '' "3des" '+' 354s | token: '' "3des" '+' "aes" '' 354s | token: '+' "aes" '' '' 354s | appending IKE encryption algorithm 3DES_CBC[_0] 354s | token: '' '' '' 354s | appending IKE encryption algorithm AES_CBC[_0] 354s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 354s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 354s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 354s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 354s | appending IKE DH algorithm DH19[_0] 354s | appending IKE DH algorithm DH20[_0] 354s | appending IKE DH algorithm DH21[_0] 354s | appending IKE DH algorithm DH31[_0] 354s | appending IKE DH algorithm MODP4096[_0] 354s | appending IKE DH algorithm MODP3072[_0] 354s | appending IKE DH algorithm MODP2048[_0] 354s | appending IKE DH algorithm MODP8192[_0] 354s | parsing 'aes;none' for IKE 354s | proposal: 'aes;none' 354s | token: '' '' "aes" ';' 354s | token: '' "aes" ';' "none" '' 354s | token: ';' "none" '' '' 354s | appending IKE encryption algorithm AES_CBC[_0] 354s | parsing dh: 354s | appending IKE DH algorithm NONE[_0] 354s | token: '' '' '' 354s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 354s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 354s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 354s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 354s | parsing 'id2' for IKE 354s | proposal: 'id2' 354s | token: '' '' "id2" '' 354s | token: '' "id2" '' '' 354s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 355s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 355s | parsing '3des-id2' for IKE 355s | proposal: '3des-id2' 355s | token: '' '' "3des" '-' 355s | token: '' "3des" '-' "id2" '' 355s | token: '-' "id2" '' '' 355s | appending IKE encryption algorithm 3DES_CBC[_0] 355s | parsing prf: 355s | ike_alg_byname() failed: IKE PRF algorithm 'id2' is not recognized 355s | lookup for PRF algorithm 'id2' failed 355s | - failed, saving error 'IKE PRF algorithm 'id2' is not recognized' and tossing result 355s | parsing integ: 355s | ike_alg_byname() failed: IKE integrity algorithm 'id2' is not recognized 355s | lookup for integrity algorithm 'id2' failed 355s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'id2' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'id2' is not recognized') 355s | parsing 'aes_ccm' for IKE 355s | proposal: 'aes_ccm' 355s | token: '' '' "aes_ccm" '' 355s | token: '' "aes_ccm" '' '' 355s | alg_byname_ok() failed: IKE encryption algorithm 'aes_ccm' is not supported 355s | parsing 'aes-sha1-sha2-ecp_521' for IKE 355s | proposal: 'aes-sha1-sha2-ecp_521' 355s | token: '' '' "aes" '-' 355s | token: '' "aes" '-' "sha1" '-' 355s | token: '-' "sha1" '-' "sha2" '-' 355s | appending IKE encryption algorithm AES_CBC[_0] 355s | parsing prf: 355s | appending IKE PRF algorithm HMAC_SHA1[_0] 355s | token: '-' "sha2" '-' "ecp_521" '' 355s | - succeeded, advancing tokens 355s | parsing dh: 355s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 355s | lookup for DH algorithm 'sha2' failed 355s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 355s | parsing 'aes-sha2-sha2;ecp_521' for IKE 355s | proposal: 'aes-sha2-sha2;ecp_521' 355s | token: '' '' "aes" '-' 355s | token: '' "aes" '-' "sha2" '-' 355s | token: '-' "sha2" '-' "sha2" ';' 355s | appending IKE encryption algorithm AES_CBC[_0] 355s | parsing prf: 355s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 355s | token: '-' "sha2" ';' "ecp_521" '' 355s | - succeeded, advancing tokens 355s | parsing dh: 355s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 355s | lookup for DH algorithm 'sha2' failed 355s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 355s | parsing 'aes-sha1_96-sha2-ecp_521' for IKE 355s | proposal: 'aes-sha1_96-sha2-ecp_521' 355s | token: '' '' "aes" '-' 355s | token: '' "aes" '-' "sha1_96" '-' 355s | token: '-' "sha1_96" '-' "sha2" '-' 355s | appending IKE encryption algorithm AES_CBC[_0] 355s | parsing prf: 355s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 355s | lookup for PRF algorithm 'sha1_96' failed 355s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 355s | parsing integ: 355s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 355s | token: '-' "sha2" '-' "ecp_521" '' 355s | parsing prf: 355s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 355s | token: '-' "ecp_521" '' '' 355s | parsing dh: 355s | appending IKE DH algorithm DH21[_0] 355s | token: '' '' '' 355s | parsing 'aes-sha1_96-sha2;ecp_521' for IKE 355s | proposal: 'aes-sha1_96-sha2;ecp_521' 355s | token: '' '' "aes" '-' 355s | token: '' "aes" '-' "sha1_96" '-' 355s | token: '-' "sha1_96" '-' "sha2" ';' 355s | appending IKE encryption algorithm AES_CBC[_0] 355s | parsing prf: 355s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 355s | lookup for PRF algorithm 'sha1_96' failed 355s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 355s | parsing integ: 355s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 355s | token: '-' "sha2" ';' "ecp_521" '' 355s | parsing prf: 355s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 355s | token: ';' "ecp_521" '' '' 355s | parsing dh: 355s | appending IKE DH algorithm DH21[_0] 355s | token: '' '' '' 355s | parsing 'aes+aes-sha1+sha1-modp8192+modp8192' for IKE 355s | proposal: 'aes+aes-sha1+sha1-modp8192+modp8192' 355s | token: '' '' "aes" '+' 355s | token: '' "aes" '+' "aes" '-' 355s | token: '+' "aes" '-' "sha1" '+' 355s | appending IKE encryption algorithm AES_CBC[_0] 355s | token: '-' "sha1" '+' "sha1" '-' 355s | appending IKE encryption algorithm AES_CBC[_0] 355s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 355s | parsing prf: 355s | appending IKE PRF algorithm HMAC_SHA1[_0] 355s | token: '+' "sha1" '-' "modp8192" '+' 355s | appending IKE PRF algorithm HMAC_SHA1[_0] 355s | token: '-' "modp8192" '+' "modp8192" '' 355s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 355s | - succeeded, advancing tokens 355s | parsing dh: 355s | appending IKE DH algorithm MODP8192[_0] 355s | token: '+' "modp8192" '' '' 355s | appending IKE DH algorithm MODP8192[_0] 355s | token: '' '' '' 355s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 355s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 355s | parsing '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' for IKE 355s | proposal: '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' 355s | token: '' '' "3des" '+' 355s | token: '' "3des" '+' "aes" '+' 355s | token: '+' "aes" '+' "aes" '-' 355s | appending IKE encryption algorithm 3DES_CBC[_0] 355s | token: '+' "aes" '-' "sha2" '+' 355s | appending IKE encryption algorithm AES_CBC[_0] 355s | token: '-' "sha2" '+' "sha1" '+' 355s | appending IKE encryption algorithm AES_CBC[_0] 355s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 355s | parsing prf: 355s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 355s | token: '+' "sha1" '+' "sha1" '-' 355s | appending IKE PRF algorithm HMAC_SHA1[_0] 355s | token: '+' "sha1" '-' "modp4096" '+' 355s | appending IKE PRF algorithm HMAC_SHA1[_0] 355s | token: '-' "modp4096" '+' "modp8192" '+' 355s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 355s | - succeeded, advancing tokens 355s | parsing dh: 355s | appending IKE DH algorithm MODP4096[_0] 355s | token: '+' "modp8192" '+' "modp8192" '' 355s | appending IKE DH algorithm MODP8192[_0] 355s | token: '+' "modp8192" '' '' 355s | appending IKE DH algorithm MODP8192[_0] 355s | token: '' '' '' 355s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 355s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 355s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 355s | parsing 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' for IKE 355s | proposal: 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' 355s | token: '' '' "aes" '+' 355s | token: '' "aes" '+' "3des" '+' 355s | token: '+' "3des" '+' "aes" '-' 355s | appending IKE encryption algorithm AES_CBC[_0] 355s | token: '+' "aes" '-' "sha1" '+' 355s | appending IKE encryption algorithm 3DES_CBC[_0] 355s | token: '-' "sha1" '+' "sha2" '+' 355s | appending IKE encryption algorithm AES_CBC[_0] 355s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 355s | parsing prf: 355s | appending IKE PRF algorithm HMAC_SHA1[_0] 355s | token: '+' "sha2" '+' "sha1" '-' 355s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 355s | token: '+' "sha1" '-' "modp8192" '+' 355s | appending IKE PRF algorithm HMAC_SHA1[_0] 355s | token: '-' "modp8192" '+' "modp4096" '+' 355s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 355s | - succeeded, advancing tokens 355s | parsing dh: 355s | appending IKE DH algorithm MODP8192[_0] 355s | token: '+' "modp4096" '+' "modp8192" '' 355s | appending IKE DH algorithm MODP4096[_0] 355s | token: '+' "modp8192" '' '' 355s | appending IKE DH algorithm MODP8192[_0] 355s | token: '' '' '' 355s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 355s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 355s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 355s | parsing 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' for IKE 355s | proposal: 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' 355s | token: '' '' "aes" '+' 355s | token: '' "aes" '+' "aes" '+' 355s | token: '+' "aes" '+' "3des" '-' 355s | appending IKE encryption algorithm AES_CBC[_0] 355s | token: '+' "3des" '-' "sha1" '+' 355s | appending IKE encryption algorithm AES_CBC[_0] 355s | token: '-' "sha1" '+' "sha1" '+' 355s | appending IKE encryption algorithm 3DES_CBC[_0] 355s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 355s | parsing prf: 355s | appending IKE PRF algorithm HMAC_SHA1[_0] 355s | token: '+' "sha1" '+' "sha2" '-' 355s | appending IKE PRF algorithm HMAC_SHA1[_0] 355s | token: '+' "sha2" '-' "modp8192" '+' 355s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 355s | token: '-' "modp8192" '+' "modp8192" '+' 355s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 355s | - succeeded, advancing tokens 355s | parsing dh: 355s | appending IKE DH algorithm MODP8192[_0] 355s | token: '+' "modp8192" '+' "modp4096" '' 355s | appending IKE DH algorithm MODP8192[_0] 355s | token: '+' "modp4096" '' '' 355s | appending IKE DH algorithm MODP4096[_0] 355s | token: '' '' '' 355s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 355s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 355s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 355s | parsing 'aes+aes128+aes256' for IKE 355s | proposal: 'aes+aes128+aes256' 355s | token: '' '' "aes" '+' 355s | token: '' "aes" '+' "aes128" '+' 355s | token: '+' "aes128" '+' "aes256" '' 355s | appending IKE encryption algorithm AES_CBC[_0] 355s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 355s | token: '+' "aes256" '' '' 355s | appending IKE encryption algorithm AES_CBC[_128] 355s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 355s | token: '' '' '' 355s | appending IKE encryption algorithm AES_CBC[_256] 355s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_128 355s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 355s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 355s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 355s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 355s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 355s | appending IKE DH algorithm DH19[_0] 355s | appending IKE DH algorithm DH20[_0] 355s | appending IKE DH algorithm DH21[_0] 355s | appending IKE DH algorithm DH31[_0] 355s | appending IKE DH algorithm MODP4096[_0] 355s | appending IKE DH algorithm MODP3072[_0] 355s | appending IKE DH algorithm MODP2048[_0] 355s | appending IKE DH algorithm MODP8192[_0] 355s | parsing 'aes128+aes+aes256' for IKE 355s | proposal: 'aes128+aes+aes256' 355s | token: '' '' "aes128" '+' 355s | token: '' "aes128" '+' "aes" '+' 355s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 355s | token: '+' "aes" '+' "aes256" '' 355s | appending IKE encryption algorithm AES_CBC[_128] 355s ERROR: IKE PRF algorithm 'id2' is not recognized 355s algparse -v2 'ike=aes_ccm' (expect ERROR) 355s ERROR: IKE encryption algorithm 'aes_ccm' is not supported 355s algparse -v2 'ike=aes-sha1-sha2-ecp_521' (expect ERROR) 355s ERROR: IKE DH algorithm 'sha2' is not recognized 355s algparse -v2 'ike=aes-sha2-sha2;ecp_521' (expect ERROR) 355s ERROR: IKE DH algorithm 'sha2' is not recognized 355s algparse -v2 'ike=aes-sha1_96-sha2-ecp_521' (expect SUCCESS) 355s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 355s algparse -v2 'ike=aes-sha1_96-sha2;ecp_521' (expect SUCCESS) 355s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 355s algparse -v2 'ike=aes+aes-sha1+sha1-modp8192+modp8192' (expect SUCCESS) 355s AES_CBC-HMAC_SHA1-MODP8192 355s algparse -v2 'ike=3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' (expect SUCCESS) 355s 3DES_CBC+AES_CBC-HMAC_SHA2_256+HMAC_SHA1-MODP4096+MODP8192 355s algparse -v2 'ike=aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' (expect SUCCESS) 355s AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 355s algparse -v2 'ike=aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' (expect SUCCESS) 355s AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 355s algparse -v2 'ike=aes+aes128+aes256' (expect SUCCESS) 355s AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 355s algparse -v2 'ike=aes128+aes+aes256' (expect SUCCESS) 355s AES_CBC_128+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 355s algparse -v2 'ike=aes128+aes256+aes' (expect SUCCESS) 355s AES_CBC_128+AES_CBC_256+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 355s algparse -v2 'ike=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' (expect SUCCESS) 355s AES_CBC-HMAC_SHA1-MODP8192 355s algparse -v2 'ike=aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' (expect SUCCESS) 355s AES_CBC-HMAC_SHA1-MODP8192 355s AES_CBC-HMAC_SHA2_256-MODP8192 355s algparse -v2 'ike=aes_gcm' (expect SUCCESS) 355s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 355s algparse -v2 'ike=aes_gcm-sha2' (expect SUCCESS) 355s | token: '+' "aes256" '' '' 355s | appending IKE encryption algorithm AES_CBC[_0] 355s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 355s | token: '' '' '' 355s | appending IKE encryption algorithm AES_CBC[_256] 355s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 355s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 355s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 355s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 355s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 355s | appending IKE DH algorithm DH19[_0] 355s | appending IKE DH algorithm DH20[_0] 355s | appending IKE DH algorithm DH21[_0] 355s | appending IKE DH algorithm DH31[_0] 355s | appending IKE DH algorithm MODP4096[_0] 355s | appending IKE DH algorithm MODP3072[_0] 355s | appending IKE DH algorithm MODP2048[_0] 355s | appending IKE DH algorithm MODP8192[_0] 355s | parsing 'aes128+aes256+aes' for IKE 355s | proposal: 'aes128+aes256+aes' 355s | token: '' '' "aes128" '+' 355s | token: '' "aes128" '+' "aes256" '+' 355s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 355s | token: '+' "aes256" '+' "aes" '' 355s | appending IKE encryption algorithm AES_CBC[_128] 355s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 355s | token: '+' "aes" '' '' 355s | appending IKE encryption algorithm AES_CBC[_256] 355s | token: '' '' '' 355s | appending IKE encryption algorithm AES_CBC[_0] 355s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 355s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 355s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 355s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 355s | appending IKE DH algorithm DH19[_0] 355s | appending IKE DH algorithm DH20[_0] 355s | appending IKE DH algorithm DH21[_0] 355s | appending IKE DH algorithm DH31[_0] 355s | appending IKE DH algorithm MODP4096[_0] 355s | appending IKE DH algorithm MODP3072[_0] 355s | appending IKE DH algorithm MODP2048[_0] 355s | appending IKE DH algorithm MODP8192[_0] 355s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for IKE 355s | proposal: 'aes-sha1-modp8192' 355s | token: '' '' "aes" '-' 355s | token: '' "aes" '-' "sha1" '-' 355s | token: '-' "sha1" '-' "modp8192" '' 355s | appending IKE encryption algorithm AES_CBC[_0] 355s | parsing prf: 355s | appending IKE PRF algorithm HMAC_SHA1[_0] 355s | token: '-' "modp8192" '' '' 355s | - succeeded, advancing tokens 355s | parsing dh: 355s | appending IKE DH algorithm MODP8192[_0] 355s | token: '' '' '' 355s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 355s | proposal: 'aes-sha1-modp8192' 355s | token: '' '' "aes" '-' 355s | token: '' "aes" '-' "sha1" '-' 355s | token: '-' "sha1" '-' "modp8192" '' 355s | appending IKE encryption algorithm AES_CBC[_0] 355s | parsing prf: 355s | appending IKE PRF algorithm HMAC_SHA1[_0] 355s | token: '-' "modp8192" '' '' 355s | - succeeded, advancing tokens 355s | parsing dh: 355s | appending IKE DH algorithm MODP8192[_0] 355s | token: '' '' '' 355s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 355s | proposal: 'aes-sha1-modp8192' 355s | token: '' '' "aes" '-' 355s | token: '' "aes" '-' "sha1" '-' 355s | token: '-' "sha1" '-' "modp8192" '' 355s | appending IKE encryption algorithm AES_CBC[_0] 355s | parsing prf: 355s | appending IKE PRF algorithm HMAC_SHA1[_0] 355s | token: '-' "modp8192" '' '' 355s | - succeeded, advancing tokens 355s | parsing dh: 355s | appending IKE DH algorithm MODP8192[_0] 355s | token: '' '' '' 355s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 355s | parsing 'aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' for IKE 355s | proposal: 'aes-sha1-modp8192' 355s | token: '' '' "aes" '-' 355s | token: '' "aes" '-' "sha1" '-' 355s | token: '-' "sha1" '-' "modp8192" '' 355s | appending IKE encryption algorithm AES_CBC[_0] 355s | parsing prf: 355s | appending IKE PRF algorithm HMAC_SHA1[_0] 355s | token: '-' "modp8192" '' '' 355s | - succeeded, advancing tokens 355s | parsing dh: 355s | appending IKE DH algorithm MODP8192[_0] 355s | token: '' '' '' 355s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 355s | proposal: 'aes-sha2-modp8192' 355s | token: '' '' "aes" '-' 355s | token: '' "aes" '-' "sha2" '-' 355s | token: '-' "sha2" '-' "modp8192" '' 355s | appending IKE encryption algorithm AES_CBC[_0] 355s | parsing prf: 355s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 355s | token: '-' "modp8192" '' '' 355s | - succeeded, advancing tokens 355s | parsing dh: 355s | appending IKE DH algorithm MODP8192[_0] 355s | token: '' '' '' 355s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 355s | proposal: 'aes-sha1-modp8192' 355s | token: '' '' "aes" '-' 355s | token: '' "aes" '-' "sha1" '-' 355s | token: '-' "sha1" '-' "modp8192" '' 355s | appending IKE encryption algorithm AES_CBC[_0] 355s | parsing prf: 355s | appending IKE PRF algorithm HMAC_SHA1[_0] 355s | token: '-' "modp8192" '' '' 355s | - succeeded, advancing tokens 355s | parsing dh: 355s | appending IKE DH algorithm MODP8192[_0] 355s | token: '' '' '' 355s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 355s | parsing 'aes_gcm' for IKE 355s | proposal: 'aes_gcm' 355s | token: '' '' "aes_gcm" '' 355s | token: '' "aes_gcm" '' '' 355s | token: '' '' '' 355s | appending IKE encryption algorithm AES_GCM_16[_0] 355s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 355s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 355s | appending IKE integrity algorithm NONE[_0] 355s | appending IKE DH algorithm DH19[_0] 355s | appending IKE DH algorithm DH20[_0] 355s | appending IKE DH algorithm DH21[_0] 355s | appending IKE DH algorithm DH31[_0] 355s | appending IKE DH algorithm MODP4096[_0] 355s | appending IKE DH algorithm MODP3072[_0] 355s | appending IKE DH algorithm MODP2048[_0] 355s | appending IKE DH algorithm MODP8192[_0] 355s | parsing 'aes_gcm-sha2' for IKE 355s | proposal: 'aes_gcm-sha2' 355s | token: '' '' "aes_gcm" '-' 355s | token: '' "aes_gcm" '-' "sha2" '' 355s | token: '-' "sha2" '' '' 355s | appending IKE encryption algorithm AES_GCM_16[_0] 355s | parsing prf: 355s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 355s | token: '' '' '' 355s | - succeeded, advancing tokens 355s | appending IKE integrity algorithm NONE[_0] 355s | appending IKE DH algorithm DH19[_0] 355s | appending IKE DH algorithm DH20[_0] 355s | appending IKE DH algorithm DH21[_0] 355s | appending IKE DH algorithm DH31[_0] 355s | appending IKE DH algorithm MODP4096[_0] 355s | appending IKE DH algorithm MODP3072[_0] 355s | appending IKE DH algorithm MODP2048[_0] 355s | appending IKE DH algorithm MODP8192[_0] 355s | parsing 'aes_gcm-sha2-modp2048' for IKE 355s | proposal: 'aes_gcm-sha2-modp2048' 355s | token: '' '' "aes_gcm" '-' 355s | token: '' "aes_gcm" '-' "sha2" '-' 355s | token: '-' "sha2" '-' "modp2048" '' 355s | appending IKE encryption algorithm AES_GCM_16[_0] 355s | parsing prf: 355s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 355s | token: '-' "modp2048" '' '' 355s | - succeeded, advancing tokens 355s | parsing dh: 355s | appending IKE DH algorithm MODP2048[_0] 355s | token: '' '' '' 355s | appending IKE integrity algorithm NONE[_0] 355s | parsing 'aes_gcm-sha2;modp2048' for IKE 355s | proposal: 'aes_gcm-sha2;modp2048' 355s | token: '' '' "aes_gcm" '-' 355s | token: '' "aes_gcm" '-' "sha2" ';' 355s | token: '-' "sha2" ';' "modp2048" '' 355s | appending IKE encryption algorithm AES_GCM_16[_0] 355s | parsing prf: 355s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 355s | token: ';' "modp2048" '' '' 355s | - succeeded, advancing tokens 355s | parsing dh: 355s | appending IKE DH algorithm MODP2048[_0] 355s | token: '' '' '' 355s | appending IKE integrity algorithm NONE[_0] 355s | parsing 'aes_gcm-modp2048' for IKE 355s | proposal: 'aes_gcm-modp2048' 355s | token: '' '' "aes_gcm" '-' 355s | token: '' "aes_gcm" '-' "modp2048" '' 355s | token: '-' "modp2048" '' '' 355s | appending IKE encryption algorithm AES_GCM_16[_0] 355s | parsing prf: 355s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 355s | lookup for PRF algorithm 'modp2048' failed 355s | - failed, saving error 'IKE PRF algorithm 'modp2048' is not recognized' and tossing result 355s | parsing integ: 355s | ike_alg_byname() failed: IKE integrity algorithm 'modp2048' is not recognized 355s | lookup for integrity algorithm 'modp2048' failed 355s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'modp2048' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'modp2048' is not recognized') 355s AES_GCM_16-HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 355s algparse -v2 'ike=aes_gcm-sha2-modp2048' (expect SUCCESS) 355s AES_GCM_16-HMAC_SHA2_256-MODP2048 355s algparse -v2 'ike=aes_gcm-sha2;modp2048' (expect SUCCESS) 355s AES_GCM_16-HMAC_SHA2_256-MODP2048 355s algparse -v2 'ike=aes_gcm-modp2048' (expect ERROR) 355s ERROR: IKE PRF algorithm 'modp2048' is not recognized 355s algparse -v2 'ike=aes_gcm;modp2048' (expect SUCCESS) 355s | parsing 'aes_gcm;modp2048' for IKE 355s | proposal: 'aes_gcm;modp2048' 355s | token: '' '' "aes_gcm" ';' 355s | token: '' "aes_gcm" ';' "modp2048" '' 355s | token: ';' "modp2048" '' '' 355s | appending IKE encryption algorithm AES_GCM_16[_0] 355s | parsing dh: 355s | appending IKE DH algorithm MODP2048[_0] 355s | token: '' '' '' 355s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 355s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 355s | appending IKE integrity algorithm NONE[_0] 355s | parsing 'aes_gcm-none' for IKE 355s | proposal: 'aes_gcm-none' 355s | token: '' '' "aes_gcm" '-' 355s | token: '' "aes_gcm" '-' "none" '' 355s | token: '-' "none" '' '' 355s | appending IKE encryption algorithm AES_GCM_16[_0] 355s | parsing prf: 355s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 355s | lookup for PRF algorithm 'none' failed 355s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 355s | parsing integ: 355s | appending IKE integrity algorithm NONE[_0] 355s | token: '' '' '' 355s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 355s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 355s | appending IKE DH algorithm DH19[_0] 355s | appending IKE DH algorithm DH20[_0] 355s | appending IKE DH algorithm DH21[_0] 355s | appending IKE DH algorithm DH31[_0] 355s | appending IKE DH algorithm MODP4096[_0] 355s | appending IKE DH algorithm MODP3072[_0] 355s | appending IKE DH algorithm MODP2048[_0] 355s | appending IKE DH algorithm MODP8192[_0] 355s | parsing 'aes_gcm-none-sha2' for IKE 355s | proposal: 'aes_gcm-none-sha2' 355s | token: '' '' "aes_gcm" '-' 355s | token: '' "aes_gcm" '-' "none" '-' 355s | token: '-' "none" '-' "sha2" '' 355s | appending IKE encryption algorithm AES_GCM_16[_0] 355s | parsing prf: 355s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 355s | lookup for PRF algorithm 'none' failed 355s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 355s | parsing integ: 355s | appending IKE integrity algorithm NONE[_0] 355s | token: '-' "sha2" '' '' 355s | parsing prf: 355s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 355s | token: '' '' '' 355s | appending IKE DH algorithm DH19[_0] 355s | appending IKE DH algorithm DH20[_0] 355s | appending IKE DH algorithm DH21[_0] 355s | appending IKE DH algorithm DH31[_0] 355s | appending IKE DH algorithm MODP4096[_0] 355s | appending IKE DH algorithm MODP3072[_0] 355s | appending IKE DH algorithm MODP2048[_0] 355s | appending IKE DH algorithm MODP8192[_0] 355s | parsing 'aes_gcm-none-sha2-modp2048' for IKE 355s | proposal: 'aes_gcm-none-sha2-modp2048' 355s | token: '' '' "aes_gcm" '-' 355s | token: '' "aes_gcm" '-' "none" '-' 355s | token: '-' "none" '-' "sha2" '-' 355s | appending IKE encryption algorithm AES_GCM_16[_0] 355s | parsing prf: 355s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 355s | lookup for PRF algorithm 'none' failed 355s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 355s | parsing integ: 355s | appending IKE integrity algorithm NONE[_0] 355s | token: '-' "sha2" '-' "modp2048" '' 355s | parsing prf: 355s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 355s | token: '-' "modp2048" '' '' 355s | parsing dh: 355s | appending IKE DH algorithm MODP2048[_0] 355s | token: '' '' '' 355s | parsing 'aes_gcm-none-sha2;modp2048' for IKE 355s | proposal: 'aes_gcm-none-sha2;modp2048' 355s | token: '' '' "aes_gcm" '-' 355s | token: '' "aes_gcm" '-' "none" '-' 355s | token: '-' "none" '-' "sha2" ';' 355s | appending IKE encryption algorithm AES_GCM_16[_0] 355s | parsing prf: 355s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 355s | lookup for PRF algorithm 'none' failed 355s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 355s | parsing integ: 355s | appending IKE integrity algorithm NONE[_0] 355s | token: '-' "sha2" ';' "modp2048" '' 355s | parsing prf: 355s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 355s | token: ';' "modp2048" '' '' 355s | parsing dh: 355s | appending IKE DH algorithm MODP2048[_0] 355s | token: '' '' '' 355s | parsing 'aes_gcm-none-modp2048' for IKE 355s | proposal: 'aes_gcm-none-modp2048' 355s | token: '' '' "aes_gcm" '-' 355s | token: '' "aes_gcm" '-' "none" '-' 355s | token: '-' "none" '-' "modp2048" '' 355s | appending IKE encryption algorithm AES_GCM_16[_0] 355s | parsing prf: 355s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 355s | lookup for PRF algorithm 'none' failed 355s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 355s | parsing integ: 355s | appending IKE integrity algorithm NONE[_0] 355s | token: '-' "modp2048" '' '' 355s | parsing prf: 355s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 355s | lookup for PRF algorithm 'modp2048' failed 355s | -- failed 'IKE PRF algorithm 'modp2048' is not recognized' 355s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 355s algparse -v2 'ike=aes_gcm-none' (expect SUCCESS) 355s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 355s algparse -v2 'ike=aes_gcm-none-sha2' (expect SUCCESS) 355s AES_GCM_16-HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 355s algparse -v2 'ike=aes_gcm-none-sha2-modp2048' (expect SUCCESS) 355s AES_GCM_16-HMAC_SHA2_256-MODP2048 355s algparse -v2 'ike=aes_gcm-none-sha2;modp2048' (expect SUCCESS) 355s AES_GCM_16-HMAC_SHA2_256-MODP2048 355s algparse -v2 'ike=aes_gcm-none-modp2048' (expect ERROR) 355s ERROR: IKE PRF algorithm 'modp2048' is not recognized 355s algparse -v2 'ike=aes_gcm-none;modp2048' (expect SUCCESS) 355s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 355s algparse -v2 'ike=aes_gcm-sha1-none-modp2048' (expect ERROR) 355s ERROR: IKE proposal contains unexpected 'modp2048' 355s algparse -v2 'ike=aes_gcm-sha1-none;modp2048' (expect ERROR) 355s ERROR: IKE proposal contains unexpected 'modp2048' 355s algparse -v2 'ike=aes+aes_gcm' (expect ERROR) 355s ERROR: AEAD and non-AEAD IKE encryption algorithm cannot be combined 355s algparse -v2 'ike=,' (expect ERROR) 355s ERROR: IKE encryption algorithm is empty 355s algparse -v2 'ike=aes,' (expect ERROR) 355s ERROR: IKE encryption algorithm is empty 355s algparse -v2 'ike=aes,,aes' (expect ERROR) 355s ERROR: IKE encryption algorithm is empty 355s algparse -v2 'ike=,aes' (expect ERROR) 355s ERROR: IKE encryption algorithm is empty 355s algparse -v2 'ike=-' (expect ERROR) 355s ERROR: IKE encryption algorithm is empty 355s algparse -v2 'ike=+' (expect ERROR) 355s ERROR: IKE encryption algorithm is empty 355s algparse -v2 'ike=;' (expect ERROR) 355s ERROR: IKE encryption algorithm is empty 355s algparse -v2 'ike=aes-' (expect ERROR) 355s ERROR: IKE PRF algorithm is empty 355s algparse -v2 'ike=aes+' (expect ERROR) 355s ERROR: IKE encryption algorithm is empty 355s algparse -v2 'ike=aes;' (expect ERROR) 355s ERROR: IKE DH algorithm is empty 355s algparse -v2 'ike=-aes' (expect ERROR) 355s ERROR: IKE encryption algorithm is empty 355s algparse -v2 'ike=+aes' (expect ERROR) 355s ERROR: IKE encryption algorithm is empty 355s algparse -v2 'ike=;aes' (expect ERROR) 355s ERROR: IKE encryption algorithm is empty 355s algparse -v2 'ike=aes+-' (expect ERROR) 355s ERROR: IKE encryption algorithm is empty 355s algparse -v2 'ike=aes+;' (expect ERROR) 355s ERROR: IKE encryption algorithm is empty 355s algparse -v2 'ike=aes++' (expect ERROR) 355s ERROR: IKE encryption algorithm is empty 355s testing -ta 355s | parsing 'aes_gcm-none;modp2048' for IKE 355s | proposal: 'aes_gcm-none;modp2048' 355s | token: '' '' "aes_gcm" '-' 355s | token: '' "aes_gcm" '-' "none" ';' 355s | token: '-' "none" ';' "modp2048" '' 355s | appending IKE encryption algorithm AES_GCM_16[_0] 355s | parsing prf: 355s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 355s | lookup for PRF algorithm 'none' failed 355s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 355s | parsing integ: 355s | appending IKE integrity algorithm NONE[_0] 355s | token: ';' "modp2048" '' '' 355s | parsing dh: 355s | appending IKE DH algorithm MODP2048[_0] 355s | token: '' '' '' 355s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 355s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 355s | parsing 'aes_gcm-sha1-none-modp2048' for IKE 355s | proposal: 'aes_gcm-sha1-none-modp2048' 355s | token: '' '' "aes_gcm" '-' 355s | token: '' "aes_gcm" '-' "sha1" '-' 355s | token: '-' "sha1" '-' "none" '-' 355s | appending IKE encryption algorithm AES_GCM_16[_0] 355s | parsing prf: 355s | appending IKE PRF algorithm HMAC_SHA1[_0] 355s | token: '-' "none" '-' "modp2048" '' 355s | - succeeded, advancing tokens 355s | parsing dh: 355s | appending IKE DH algorithm NONE[_0] 355s | token: '-' "modp2048" '' '' 355s | parsing 'aes_gcm-sha1-none;modp2048' for IKE 355s | proposal: 'aes_gcm-sha1-none;modp2048' 355s | token: '' '' "aes_gcm" '-' 355s | token: '' "aes_gcm" '-' "sha1" '-' 355s | token: '-' "sha1" '-' "none" ';' 355s | appending IKE encryption algorithm AES_GCM_16[_0] 355s | parsing prf: 355s | appending IKE PRF algorithm HMAC_SHA1[_0] 355s | token: '-' "none" ';' "modp2048" '' 355s | - succeeded, advancing tokens 355s | parsing dh: 355s | appending IKE DH algorithm NONE[_0] 355s | token: ';' "modp2048" '' '' 355s | parsing 'aes+aes_gcm' for IKE 355s | proposal: 'aes+aes_gcm' 355s | token: '' '' "aes" '+' 355s | token: '' "aes" '+' "aes_gcm" '' 355s | token: '+' "aes_gcm" '' '' 355s | appending IKE encryption algorithm AES_CBC[_0] 355s | token: '' '' '' 355s | appending IKE encryption algorithm AES_GCM_16[_0] 355s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 355s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 355s | appending IKE DH algorithm DH19[_0] 355s | appending IKE DH algorithm DH20[_0] 355s | appending IKE DH algorithm DH21[_0] 355s | appending IKE DH algorithm DH31[_0] 355s | appending IKE DH algorithm MODP4096[_0] 355s | appending IKE DH algorithm MODP3072[_0] 355s | appending IKE DH algorithm MODP2048[_0] 355s | appending IKE DH algorithm MODP8192[_0] 355s | parsing ',' for IKE 355s | proposal: '' 355s | token: '' '' "" '' 355s | token: '' "" '' '' 355s | parsing 'aes,' for IKE 355s | proposal: 'aes' 355s | token: '' '' "aes" '' 355s | token: '' "aes" '' '' 355s | token: '' '' '' 355s | appending IKE encryption algorithm AES_CBC[_0] 355s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 355s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 355s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 355s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 355s | appending IKE DH algorithm DH19[_0] 355s | appending IKE DH algorithm DH20[_0] 355s | appending IKE DH algorithm DH21[_0] 355s | appending IKE DH algorithm DH31[_0] 355s | appending IKE DH algorithm MODP4096[_0] 355s | appending IKE DH algorithm MODP3072[_0] 355s | appending IKE DH algorithm MODP2048[_0] 355s | appending IKE DH algorithm MODP8192[_0] 355s | proposal: '' 355s | token: '' '' "" '' 355s | token: '' "" '' '' 355s | parsing 'aes,,aes' for IKE 355s | proposal: 'aes' 355s | token: '' '' "aes" '' 355s | token: '' "aes" '' '' 355s | token: '' '' '' 355s | appending IKE encryption algorithm AES_CBC[_0] 355s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 355s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 355s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 355s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 355s | appending IKE DH algorithm DH19[_0] 355s | appending IKE DH algorithm DH20[_0] 355s | appending IKE DH algorithm DH21[_0] 355s | appending IKE DH algorithm DH31[_0] 355s | appending IKE DH algorithm MODP4096[_0] 355s | appending IKE DH algorithm MODP3072[_0] 355s | appending IKE DH algorithm MODP2048[_0] 355s | appending IKE DH algorithm MODP8192[_0] 355s | proposal: '' 355s | token: '' '' "" '' 355s | token: '' "" '' '' 355s | parsing ',aes' for IKE 355s | proposal: '' 355s | token: '' '' "" '' 355s | token: '' "" '' '' 355s | parsing '-' for IKE 355s | proposal: '-' 355s | token: '' '' "" '-' 355s | token: '' "" '-' "" '' 355s | parsing '+' for IKE 355s | proposal: '+' 355s | token: '' '' "" '+' 355s | token: '' "" '+' "" '' 355s | parsing ';' for IKE 355s | proposal: ';' 355s | token: '' '' "" ';' 355s | token: '' "" ';' "" '' 355s | parsing 'aes-' for IKE 355s | proposal: 'aes-' 355s | token: '' '' "aes" '-' 355s | token: '' "aes" '-' "" '' 355s | token: '-' "" '' '' 355s | appending IKE encryption algorithm AES_CBC[_0] 355s | parsing prf: 355s | - failed, saving error 'IKE PRF algorithm is empty' and tossing result 355s | parsing integ: 355s | - and - failed, returning earlier PRF error 'IKE PRF algorithm is empty' and discarding INTEG error 'IKE integrity algorithm is empty') 355s | parsing 'aes+' for IKE 355s | proposal: 'aes+' 355s | token: '' '' "aes" '+' 355s | token: '' "aes" '+' "" '' 355s | token: '+' "" '' '' 355s | appending IKE encryption algorithm AES_CBC[_0] 355s | parsing 'aes;' for IKE 355s | proposal: 'aes;' 355s | token: '' '' "aes" ';' 355s | token: '' "aes" ';' "" '' 355s | token: ';' "" '' '' 355s | appending IKE encryption algorithm AES_CBC[_0] 355s | parsing dh: 355s | ... failed 'IKE DH algorithm is empty' 355s | parsing '-aes' for IKE 355s | proposal: '-aes' 355s | token: '' '' "" '-' 355s | token: '' "" '-' "aes" '' 355s | parsing '+aes' for IKE 355s | proposal: '+aes' 355s | token: '' '' "" '+' 355s | token: '' "" '+' "aes" '' 355s | parsing ';aes' for IKE 355s | proposal: ';aes' 355s | token: '' '' "" ';' 355s | token: '' "" ';' "aes" '' 355s | parsing 'aes+-' for IKE 355s | proposal: 'aes+-' 355s | token: '' '' "aes" '+' 355s | token: '' "aes" '+' "" '-' 355s | token: '+' "" '-' "" '' 355s | appending IKE encryption algorithm AES_CBC[_0] 355s | parsing 'aes+;' for IKE 355s | proposal: 'aes+;' 355s | token: '' '' "aes" '+' 355s | token: '' "aes" '+' "" ';' 355s | token: '+' "" ';' "" '' 355s | appending IKE encryption algorithm AES_CBC[_0] 355s | parsing 'aes++' for IKE 355s | proposal: 'aes++' 355s | token: '' '' "aes" '+' 355s | token: '' "aes" '+' "" '+' 355s | token: '+' "" '+' "" '' 355s | appending IKE encryption algorithm AES_CBC[_0] 355s ipsec algparse: leak detective found no leaks 355s ipsec algparse: Encryption algorithms: 355s ipsec algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 355s ipsec algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 355s ipsec algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 355s ipsec algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 355s ipsec algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 355s ipsec algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 355s ipsec algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 355s ipsec algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 355s ipsec algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 355s ipsec algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 355s ipsec algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 355s ipsec algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 355s ipsec algparse: NULL [] IKEv1: ESP IKEv2: ESP NULL 355s ipsec algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 355s ipsec algparse: Hash algorithms: 355s ipsec algparse: MD5 IKEv1: IKE IKEv2: NSS 355s ipsec algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 355s ipsec algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 355s ipsec algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 355s ipsec algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 355s ipsec algparse: IDENTITY IKEv1: IKEv2: FIPS 355s ipsec algparse: PRF algorithms: 355s ipsec algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 355s ipsec algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 355s ipsec algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 355s ipsec algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 355s ipsec algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 355s ipsec algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 355s ipsec algparse: Integrity algorithms: 355s ipsec algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 355s ipsec algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 355s ipsec algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 355s ipsec algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 355s ipsec algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 355s ipsec algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 355s ipsec algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 355s ipsec algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 355s ipsec algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 355s ipsec algparse: DH algorithms: 355s ipsec algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 355s ipsec algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 355s ipsec algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 355s ipsec algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 355s ipsec algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 355s ipsec algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 355s ipsec algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 355s ipsec algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 355s ipsec algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 355s ipsec algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 355s ipsec algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 355s ipsec algparse: IPCOMP algorithms: 355s ipsec algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 355s ipsec algparse: LZS IKEv1: IKEv2: ESP AH FIPS 355s ipsec algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 355s ipsec algparse: testing CAMELLIA_CBC: 355s ipsec algparse: Camellia: 16 bytes with 128-bit key 355s | decode_to_chunk() raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 355s | decode_to_chunk() output: 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13f50 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: CAMELLIA_CBC 355s | flags: ENCRYPT+DECRYPT 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6f4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13f18 355s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 355s | decode_to_mac() output: 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | decode_to_chunk() new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 355s | decode_to_chunk() output: 355s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 355s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 355s | decode_to_chunk() output: 355s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | decode_to_chunk() ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 355s | decode_to_chunk() output: 355s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 355s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 355s | using IKEv1 IV 355s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 355s | verify_bytes() Camellia: 16 bytes with 128-bit key: encrypt: ok 355s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 355s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 355s | decode_to_mac() output: 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | decode_to_chunk() new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 355s | decode_to_chunk() output: 355s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 355s | decode_to_chunk() ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 355s | decode_to_chunk() output: 355s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 355s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 355s | decode_to_chunk() output: 355s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 355s | using IKEv1 IV 355s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 355s | verify_bytes() Camellia: 16 bytes with 128-bit key: decrypt: ok 355s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 355s ipsec algparse: Camellia: 16 bytes with 128-bit key 355s | decode_to_chunk() raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF" 355s | decode_to_chunk() output: 355s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13f50 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: CAMELLIA_CBC 355s | flags: ENCRYPT+DECRYPT 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6f4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13f18 355s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 355s | decode_to_mac() output: 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | decode_to_chunk() new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 355s | decode_to_chunk() output: 355s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 355s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 355s | decode_to_chunk() output: 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 355s | decode_to_chunk() ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 355s | decode_to_chunk() output: 355s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 355s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 355s | using IKEv1 IV 355s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 355s | verify_bytes() Camellia: 16 bytes with 128-bit key: encrypt: ok 355s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 355s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 355s | decode_to_mac() output: 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | decode_to_chunk() new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 355s | decode_to_chunk() output: 355s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 355s | decode_to_chunk() ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 355s | decode_to_chunk() output: 355s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 355s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 355s | decode_to_chunk() output: 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 355s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 355s | using IKEv1 IV 355s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 355s | verify_bytes() Camellia: 16 bytes with 128-bit key: decrypt: ok 355s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 355s ipsec algparse: Camellia: 16 bytes with 256-bit key 355s | decode_to_chunk() raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 355s | decode_to_chunk() output: 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13f50 355s | key-offset: 0, key-size: 32 355s | EXTRACT_KEY_FROM_KEY: 355s | target: CAMELLIA_CBC 355s | flags: ENCRYPT+DECRYPT 355s | key_size: 32-bytes 355s | base: base-key@0x64028df6f4d0 (48-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13f18 355s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 355s | decode_to_mac() output: 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | decode_to_chunk() new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 355s | decode_to_chunk() output: 355s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 355s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 355s | decode_to_chunk() output: 355s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | decode_to_chunk() ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 355s | decode_to_chunk() output: 355s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 355s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 355s | using IKEv1 IV 355s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 355s | verify_bytes() Camellia: 16 bytes with 256-bit key: encrypt: ok 355s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 355s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 355s | decode_to_mac() output: 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | decode_to_chunk() new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 355s | decode_to_chunk() output: 355s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 355s | decode_to_chunk() ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 355s | decode_to_chunk() output: 355s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 355s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 355s | decode_to_chunk() output: 355s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 355s | using IKEv1 IV 355s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 355s | verify_bytes() Camellia: 16 bytes with 256-bit key: decrypt: ok 355s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 355s ipsec algparse: Camellia: 16 bytes with 256-bit key 355s | decode_to_chunk() raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF FF EE DD CC BB AA 99 88 77 66 55 44 33 22 11 00" 355s | decode_to_chunk() output: 355s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 355s | ff ee dd cc bb aa 99 88 77 66 55 44 33 22 11 00 ........wfUD3".. 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13f50 355s | key-offset: 0, key-size: 32 355s | EXTRACT_KEY_FROM_KEY: 355s | target: CAMELLIA_CBC 355s | flags: ENCRYPT+DECRYPT 355s | key_size: 32-bytes 355s | base: base-key@0x64028df6f4d0 (48-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13f18 355s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 355s | decode_to_mac() output: 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | decode_to_chunk() new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 355s | decode_to_chunk() output: 355s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 355s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 355s | decode_to_chunk() output: 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 355s | decode_to_chunk() ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 355s | decode_to_chunk() output: 355s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 355s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 355s | using IKEv1 IV 355s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 355s | verify_bytes() Camellia: 16 bytes with 256-bit key: encrypt: ok 355s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 355s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 355s | decode_to_mac() output: 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | decode_to_chunk() new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 355s | decode_to_chunk() output: 355s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 355s | decode_to_chunk() ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 355s | decode_to_chunk() output: 355s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 355s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 355s | decode_to_chunk() output: 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 355s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 355s | using IKEv1 IV 355s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 355s | verify_bytes() Camellia: 16 bytes with 256-bit key: decrypt: ok 355s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 355s ipsec algparse: testing AES_GCM_16: 355s ipsec algparse: empty string 355s | decode_to_chunk() raw_key: input "0xcf063a34d4a9a76c2c86787d3f96db71" 355s | decode_to_chunk() output: 355s | cf 06 3a 34 d4 a9 a7 6c 2c 86 78 7d 3f 96 db 71 ..:4...l,.x}?..q 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13e90 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_GCM 355s | flags: ENCRYPT+DECRYPT 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6f4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13e58 355s | decode_to_chunk() salted IV: input "0x113b9785971864c83b01c787" 355s | decode_to_chunk() output: 355s | 11 3b 97 85 97 18 64 c8 3b 01 c7 87 .;....d.;... 355s | decode_to_chunk() AAD: input "" 355s | decode_to_chunk() output: 355s | 355s | decode_to_chunk() plaintext: input "" 355s | decode_to_chunk() output: 355s | 355s | decode_to_chunk() ciphertext: input "" 355s | decode_to_chunk() output: 355s | 355s | decode_to_chunk() tag: input "0x72ac8493e3a5228b5d130a69d2510e42" 355s | decode_to_chunk() output: 355s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 355s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 text+tag in: 355s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 355s | verify_bytes() empty string: output ciphertext: ok 355s | verify_bytes() empty string: TAG: ok 355s | test_gcm_vector() text+tag out: 355s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 355s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 text+tag in: 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | verify_bytes() empty string: output ciphertext: ok 355s | verify_bytes() empty string: TAG: ok 355s | test_gcm_vector() text+tag out: 355s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 355s ipsec algparse: one block 355s | decode_to_chunk() raw_key: input "0xe98b72a9881a84ca6b76e0f43e68647a" 355s | decode_to_chunk() output: 355s | e9 8b 72 a9 88 1a 84 ca 6b 76 e0 f4 3e 68 64 7a ..r.....kv..>hdz 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13e90 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_GCM 355s | flags: ENCRYPT+DECRYPT 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6f4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13e58 355s | decode_to_chunk() salted IV: input "0x8b23299fde174053f3d652ba" 355s | decode_to_chunk() output: 355s | 8b 23 29 9f de 17 40 53 f3 d6 52 ba .#)...@S..R. 355s | decode_to_chunk() AAD: input "" 355s | decode_to_chunk() output: 355s | 355s | decode_to_chunk() plaintext: input "0x28286a321293253c3e0aa2704a278032" 355s | decode_to_chunk() output: 355s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 355s | decode_to_chunk() ciphertext: input "0x5a3c1cf1985dbb8bed818036fdd5ab42" 355s | decode_to_chunk() output: 355s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 355s | decode_to_chunk() tag: input "0x23c7ab0f952b7091cd324835043b5eb5" 355s | decode_to_chunk() output: 355s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 355s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 text+tag in: 355s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 355s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 355s | verify_bytes() one block: output ciphertext: ok 355s | verify_bytes() one block: TAG: ok 355s | test_gcm_vector() text+tag out: 355s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 355s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 355s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 text+tag in: 355s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | verify_bytes() one block: output ciphertext: ok 355s | verify_bytes() one block: TAG: ok 355s | test_gcm_vector() text+tag out: 355s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 355s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 355s ipsec algparse: two blocks 355s | decode_to_chunk() raw_key: input "0xbfd414a6212958a607a0f5d3ab48471d" 355s | decode_to_chunk() output: 355s | bf d4 14 a6 21 29 58 a6 07 a0 f5 d3 ab 48 47 1d ....!)X......HG. 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13e90 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_GCM 355s | flags: ENCRYPT+DECRYPT 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6f4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13e58 355s | decode_to_chunk() salted IV: input "0x86d8ea0ab8e40dcc481cd0e2" 355s | decode_to_chunk() output: 355s | 86 d8 ea 0a b8 e4 0d cc 48 1c d0 e2 ........H... 355s | decode_to_chunk() AAD: input "" 355s | decode_to_chunk() output: 355s | 355s | decode_to_chunk() plaintext: input "0xa6b76a066e63392c9443e60272ceaeb9d25c991b0f2e55e2804e168c05ea591a" 355s | decode_to_chunk() output: 355s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 355s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 355s | decode_to_chunk() ciphertext: input "0x62171db33193292d930bf6647347652c1ef33316d7feca99d54f1db4fcf513f8" 355s | decode_to_chunk() output: 355s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 355s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 355s | decode_to_chunk() tag: input "0xc28280aa5c6c7a8bd366f28c1cfd1f6e" 355s | decode_to_chunk() output: 355s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 355s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 355s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 355s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 355s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 355s | verify_bytes() two blocks: output ciphertext: ok 355s | verify_bytes() two blocks: TAG: ok 355s | test_gcm_vector() text+tag out: 355s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 355s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 355s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 355s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 355s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 355s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | verify_bytes() two blocks: output ciphertext: ok 355s | verify_bytes() two blocks: TAG: ok 355s | test_gcm_vector() text+tag out: 355s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 355s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 355s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 355s ipsec algparse: two blocks with associated data 355s | decode_to_chunk() raw_key: input "0x95bcde70c094f04e3dd8259cafd88ce8" 355s | decode_to_chunk() output: 355s | 95 bc de 70 c0 94 f0 4e 3d d8 25 9c af d8 8c e8 ...p...N=.%..... 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13e90 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_GCM 355s | flags: ENCRYPT+DECRYPT 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6f4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13e58 355s | decode_to_chunk() salted IV: input "0x12cf097ad22380432ff40a5c" 355s | decode_to_chunk() output: 355s | 12 cf 09 7a d2 23 80 43 2f f4 0a 5c ...z.#.C/..\ 355s | decode_to_chunk() AAD: input "0xc783a0cca10a8d9fb8d27d69659463f2" 355s | decode_to_chunk() output: 355s | c7 83 a0 cc a1 0a 8d 9f b8 d2 7d 69 65 94 63 f2 ..........}ie.c. 355s | decode_to_chunk() plaintext: input "0x32f51e837a9748838925066d69e87180f34a6437e6b396e5643b34cb2ee4f7b1" 355s | decode_to_chunk() output: 355s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 355s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 355s | decode_to_chunk() ciphertext: input "0x8a023ba477f5b809bddcda8f55e09064d6d88aaec99c1e141212ea5b08503660" 355s | decode_to_chunk() output: 355s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 355s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 355s | decode_to_chunk() tag: input "0x562f500dae635d60a769b466e15acd1e" 355s | decode_to_chunk() output: 355s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 355s | test_gcm_vector() DECRYPT: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 355s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 355s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 355s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 355s | verify_bytes() two blocks with associated data: output ciphertext: ok 355s | verify_bytes() two blocks with associated data: TAG: ok 355s | test_gcm_vector() text+tag out: 355s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 355s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 355s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 355s | test_gcm_vector() ENCRYPT: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 355s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 355s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | verify_bytes() two blocks with associated data: output ciphertext: ok 355s | verify_bytes() two blocks with associated data: TAG: ok 355s | test_gcm_vector() text+tag out: 355s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 355s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 355s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 355s ipsec algparse: testing AES_CTR: 355s ipsec algparse: Encrypting 16 octets using AES-CTR with 128-bit key 355s | decode_to_chunk() raw_key: input "0x AE 68 52 F8 12 10 67 CC 4B F7 A5 76 55 77 F3 9E" 355s | decode_to_chunk() output: 355s | ae 68 52 f8 12 10 67 cc 4b f7 a5 76 55 77 f3 9e .hR...g.K..vUw.. 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13f50 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_CTR 355s | flags: ENCRYPT+DECRYPT 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6f4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13f18 355s | decode_to_mac() input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 355s | decode_to_mac() output: 355s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 355s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 355s | decode_to_chunk() output: 355s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 355s | decode_to_chunk() Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 355s | decode_to_chunk() output: 355s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 355s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 355s | decode_to_chunk() output: 355s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 355s | cipher_op_ctr_nss() enter AES_CTR 0x64028df6fd60 use IKEv1 IV wire_iv 0 count 0 355s | ctr_param: count 32 iv 00000030000000000000000000000001 355s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 355s | do_aes_ctr: exit 355s | cipher_op_context_destroy_ctr_nss() 355s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: encrypt: ok 355s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: counter-block: ok 355s | decode_to_mac() input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 355s | decode_to_mac() output: 355s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 355s | decode_to_chunk() Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 355s | decode_to_chunk() output: 355s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 355s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 355s | decode_to_chunk() output: 355s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 355s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 355s | decode_to_chunk() output: 355s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 355s | cipher_op_ctr_nss() enter AES_CTR 0x64028df6fd60 use IKEv1 IV wire_iv 0 count 0 355s | ctr_param: count 32 iv 00000030000000000000000000000001 355s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 355s | do_aes_ctr: exit 355s | cipher_op_context_destroy_ctr_nss() 355s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: decrypt: ok 355s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: counter-block: ok 355s ipsec algparse: Encrypting 32 octets using AES-CTR with 128-bit key 355s | decode_to_chunk() raw_key: input "0x 7E 24 06 78 17 FA E0 D7 43 D6 CE 1F 32 53 91 63" 355s | decode_to_chunk() output: 355s | 7e 24 06 78 17 fa e0 d7 43 d6 ce 1f 32 53 91 63 ~$.x....C...2S.c 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13f50 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_CTR 355s | flags: ENCRYPT+DECRYPT 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6f4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13f18 355s | decode_to_mac() input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 355s | decode_to_mac() output: 355s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 355s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 355s | decode_to_chunk() output: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 355s | decode_to_chunk() Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 355s | decode_to_chunk() output: 355s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 355s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 355s | decode_to_chunk() expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 355s | decode_to_chunk() output: 355s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 .l...T;Y.H...... 355s | cipher_op_ctr_nss() enter AES_CTR 0x64028df6c390 use IKEv1 IV wire_iv 0 count 0 355s | ctr_param: count 32 iv 006cb6dbc0543b59da48d90b00000001 355s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 355s | do_aes_ctr: exit 355s | cipher_op_context_destroy_ctr_nss() 355s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: encrypt: ok 355s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: counter-block: ok 355s | decode_to_mac() input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 355s | decode_to_mac() output: 355s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 355s | decode_to_chunk() Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 355s | decode_to_chunk() output: 355s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 355s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 355s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 355s | decode_to_chunk() output: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 355s | decode_to_chunk() expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 355s | decode_to_chunk() output: 355s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 .l...T;Y.H...... 355s | cipher_op_ctr_nss() enter AES_CTR 0x64028df6c390 use IKEv1 IV wire_iv 0 count 0 355s | ctr_param: count 32 iv 006cb6dbc0543b59da48d90b00000001 355s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 355s | do_aes_ctr: exit 355s | cipher_op_context_destroy_ctr_nss() 355s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: decrypt: ok 355s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: counter-block: ok 355s ipsec algparse: Encrypting 36 octets using AES-CTR with 128-bit key 355s | decode_to_chunk() raw_key: input "0x 76 91 BE 03 5E 50 20 A8 AC 6E 61 85 29 F9 A0 DC" 355s | decode_to_chunk() output: 355s | 76 91 be 03 5e 50 20 a8 ac 6e 61 85 29 f9 a0 dc v...^P ..na.)... 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13f50 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_CTR 355s | flags: ENCRYPT+DECRYPT 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6f4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13f18 355s | decode_to_mac() input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 355s | decode_to_mac() output: 355s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 355s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 355s | decode_to_chunk() output: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 355s | 20 21 22 23 !"# 355s | decode_to_chunk() Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 355s | decode_to_chunk() output: 355s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 355s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 355s | 25 b2 07 2f %../ 355s | decode_to_chunk() expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 355s | decode_to_chunk() output: 355s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 355s | cipher_op_ctr_nss() enter AES_CTR 0x64028df6c1f0 use IKEv1 IV wire_iv 0 count 0 355s | ctr_param: count 32 iv 00e0017b27777f3f4a1786f000000001 355s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 355s | do_aes_ctr: exit 355s | cipher_op_context_destroy_ctr_nss() 355s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: encrypt: ok 355s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: counter-block: ok 355s | decode_to_mac() input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 355s | decode_to_mac() output: 355s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 355s | decode_to_chunk() Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 355s | decode_to_chunk() output: 355s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 355s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 355s | 25 b2 07 2f %../ 355s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 355s | decode_to_chunk() output: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 355s | 20 21 22 23 !"# 355s | decode_to_chunk() expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 355s | decode_to_chunk() output: 355s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 355s | cipher_op_ctr_nss() enter AES_CTR 0x64028df6c1f0 use IKEv1 IV wire_iv 0 count 0 355s | ctr_param: count 32 iv 00e0017b27777f3f4a1786f000000001 355s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 355s | do_aes_ctr: exit 355s | cipher_op_context_destroy_ctr_nss() 355s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: decrypt: ok 355s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: counter-block: ok 355s ipsec algparse: Encrypting 16 octets using AES-CTR with 192-bit key 355s | decode_to_chunk() raw_key: input "0x16 AF 5B 14 5F C9 F5 79 C1 75 F9 3E 3B FB 0E ED86 3D 06 CC FD B7 85 15" 355s | decode_to_chunk() output: 355s | 16 af 5b 14 5f c9 f5 79 c1 75 f9 3e 3b fb 0e ed ..[._..y.u.>;... 355s | 86 3d 06 cc fd b7 85 15 .=...... 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13f50 355s | key-offset: 0, key-size: 24 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_CTR 355s | flags: ENCRYPT+DECRYPT 355s | key_size: 24-bytes 355s | base: base-key@0x64028df6f4d0 (40-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13f18 355s | decode_to_mac() input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 355s | decode_to_mac() output: 355s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 355s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 355s | decode_to_chunk() output: 355s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 355s | decode_to_chunk() Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 355s | decode_to_chunk() output: 355s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 355s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 355s | decode_to_chunk() output: 355s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 355s | cipher_op_ctr_nss() enter AES_CTR 0x64028df6fd40 use IKEv1 IV wire_iv 0 count 0 355s | ctr_param: count 32 iv 0000004836733c147d6d93cb00000001 355s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 355s | do_aes_ctr: exit 355s | cipher_op_context_destroy_ctr_nss() 355s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: encrypt: ok 355s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: counter-block: ok 355s | decode_to_mac() input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 355s | decode_to_mac() output: 355s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 355s | decode_to_chunk() Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 355s | decode_to_chunk() output: 355s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 355s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 355s | decode_to_chunk() output: 355s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 355s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 355s | decode_to_chunk() output: 355s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 355s | cipher_op_ctr_nss() enter AES_CTR 0x64028df6fd40 use IKEv1 IV wire_iv 0 count 0 355s | ctr_param: count 32 iv 0000004836733c147d6d93cb00000001 355s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 355s | do_aes_ctr: exit 355s | cipher_op_context_destroy_ctr_nss() 355s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: decrypt: ok 355s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: counter-block: ok 355s ipsec algparse: Encrypting 32 octets using AES-CTR with 192-bit key 355s | decode_to_chunk() raw_key: input "0x7C 5C B2 40 1B 3D C3 3C 19 E7 34 08 19 E0 F6 9C67 8C 3D B8 E6 F6 A9 1A" 355s | decode_to_chunk() output: 355s | 7c 5c b2 40 1b 3d c3 3c 19 e7 34 08 19 e0 f6 9c |\.@.=.<..4..... 355s | 67 8c 3d b8 e6 f6 a9 1a g.=..... 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13f50 355s | key-offset: 0, key-size: 24 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_CTR 355s | flags: ENCRYPT+DECRYPT 355s | key_size: 24-bytes 355s | base: base-key@0x64028df6f4d0 (40-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13f18 355s | decode_to_mac() input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 355s | decode_to_mac() output: 355s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 355s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 355s | decode_to_chunk() output: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 355s | decode_to_chunk() Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 355s | decode_to_chunk() output: 355s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 355s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 355s | decode_to_chunk() expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 355s | decode_to_chunk() output: 355s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 355s | cipher_op_ctr_nss() enter AES_CTR 0x64028df6c1f0 use IKEv1 IV wire_iv 0 count 0 355s | ctr_param: count 32 iv 0096b03b020c6eadc2cb500d00000001 355s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 355s | do_aes_ctr: exit 355s | cipher_op_context_destroy_ctr_nss() 355s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: encrypt: ok 355s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: counter-block: ok 355s | decode_to_mac() input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 355s | decode_to_mac() output: 355s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 355s | decode_to_chunk() Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 355s | decode_to_chunk() output: 355s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 355s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 355s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 355s | decode_to_chunk() output: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 355s | decode_to_chunk() expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 355s | decode_to_chunk() output: 355s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 355s | cipher_op_ctr_nss() enter AES_CTR 0x64028df6c1f0 use IKEv1 IV wire_iv 0 count 0 355s | ctr_param: count 32 iv 0096b03b020c6eadc2cb500d00000001 355s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 355s | do_aes_ctr: exit 355s | cipher_op_context_destroy_ctr_nss() 355s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: decrypt: ok 355s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: counter-block: ok 355s ipsec algparse: Encrypting 36 octets using AES-CTR with 192-bit key 355s | decode_to_chunk() raw_key: input "0x02 BF 39 1E E8 EC B1 59 B9 59 61 7B 09 65 27 9BF5 9B 60 A7 86 D3 E0 FE" 355s | decode_to_chunk() output: 355s | 02 bf 39 1e e8 ec b1 59 b9 59 61 7b 09 65 27 9b ..9....Y.Ya{.e'. 355s | f5 9b 60 a7 86 d3 e0 fe ..`..... 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13f50 355s | key-offset: 0, key-size: 24 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_CTR 355s | flags: ENCRYPT+DECRYPT 355s | key_size: 24-bytes 355s | base: base-key@0x64028df6f4d0 (40-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13f18 355s | decode_to_mac() input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 355s | decode_to_mac() output: 355s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 355s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 355s | decode_to_chunk() output: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 355s | 20 21 22 23 !"# 355s | decode_to_chunk() Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 355s | decode_to_chunk() output: 355s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 355s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 355s | ab ee 09 35 ...5 355s | decode_to_chunk() expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 355s | decode_to_chunk() output: 355s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 355s | cipher_op_ctr_nss() enter AES_CTR 0x64028df6c1f0 use IKEv1 IV wire_iv 0 count 0 355s | ctr_param: count 32 iv 0007bdfd5cbd60278dcc091200000001 355s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 355s | do_aes_ctr: exit 355s | cipher_op_context_destroy_ctr_nss() 355s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: encrypt: ok 355s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: counter-block: ok 355s | decode_to_mac() input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 355s | decode_to_mac() output: 355s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 355s | decode_to_chunk() Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 355s | decode_to_chunk() output: 355s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 355s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 355s | ab ee 09 35 ...5 355s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 355s | decode_to_chunk() output: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 355s | 20 21 22 23 !"# 355s | decode_to_chunk() expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 355s | decode_to_chunk() output: 355s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 355s | cipher_op_ctr_nss() enter AES_CTR 0x64028df6c1f0 use IKEv1 IV wire_iv 0 count 0 355s | ctr_param: count 32 iv 0007bdfd5cbd60278dcc091200000001 355s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 355s | do_aes_ctr: exit 355s | cipher_op_context_destroy_ctr_nss() 355s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: decrypt: ok 355s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: counter-block: ok 355s ipsec algparse: Encrypting 16 octets using AES-CTR with 256-bit key 355s | decode_to_chunk() raw_key: input "0x77 6B EF F2 85 1D B0 6F 4C 8A 05 42 C8 69 6F 6C6A 81 AF 1E EC 96 B4 D3 7F C1 D6 89 E6 C1 C1 04" 355s | decode_to_chunk() output: 355s | 77 6b ef f2 85 1d b0 6f 4c 8a 05 42 c8 69 6f 6c wk.....oL..B.iol 355s | 6a 81 af 1e ec 96 b4 d3 7f c1 d6 89 e6 c1 c1 04 j............... 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13f50 355s | key-offset: 0, key-size: 32 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_CTR 355s | flags: ENCRYPT+DECRYPT 355s | key_size: 32-bytes 355s | base: base-key@0x64028df6f4d0 (48-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13f18 355s | decode_to_mac() input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 355s | decode_to_mac() output: 355s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 355s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 355s | decode_to_chunk() output: 355s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 355s | decode_to_chunk() Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 355s | decode_to_chunk() output: 355s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 355s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 355s | decode_to_chunk() output: 355s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 355s | cipher_op_ctr_nss() enter AES_CTR 0x64028df6fd40 use IKEv1 IV wire_iv 0 count 0 355s | ctr_param: count 32 iv 00000060db5672c97aa8f0b200000001 355s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 355s | do_aes_ctr: exit 355s | cipher_op_context_destroy_ctr_nss() 355s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: encrypt: ok 355s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: counter-block: ok 355s | decode_to_mac() input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 355s | decode_to_mac() output: 355s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 355s | decode_to_chunk() Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 355s | decode_to_chunk() output: 355s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 355s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 355s | decode_to_chunk() output: 355s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 355s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 355s | decode_to_chunk() output: 355s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 355s | cipher_op_ctr_nss() enter AES_CTR 0x64028df6fd40 use IKEv1 IV wire_iv 0 count 0 355s | ctr_param: count 32 iv 00000060db5672c97aa8f0b200000001 355s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 355s | do_aes_ctr: exit 355s | cipher_op_context_destroy_ctr_nss() 355s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: decrypt: ok 355s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: counter-block: ok 355s ipsec algparse: Encrypting 32 octets using AES-CTR with 256-bit key 355s | decode_to_chunk() raw_key: input "0xF6 D6 6D 6B D5 2D 59 BB 07 96 36 58 79 EF F8 86C6 6D D5 1A 5B 6A 99 74 4B 50 59 0C 87 A2 38 84" 355s | decode_to_chunk() output: 355s | f6 d6 6d 6b d5 2d 59 bb 07 96 36 58 79 ef f8 86 ..mk.-Y...6Xy... 355s | c6 6d d5 1a 5b 6a 99 74 4b 50 59 0c 87 a2 38 84 .m..[j.tKPY...8. 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13f50 355s | key-offset: 0, key-size: 32 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_CTR 355s | flags: ENCRYPT+DECRYPT 355s | key_size: 32-bytes 355s | base: base-key@0x64028df6f4d0 (48-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13f18 355s | decode_to_mac() input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 355s | decode_to_mac() output: 355s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 355s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 355s | decode_to_chunk() output: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 355s | decode_to_chunk() Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 355s | decode_to_chunk() output: 355s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 355s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 355s | decode_to_chunk() expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 355s | decode_to_chunk() output: 355s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 355s | cipher_op_ctr_nss() enter AES_CTR 0x64028df6c1f0 use IKEv1 IV wire_iv 0 count 0 355s | ctr_param: count 32 iv 00faac24c1585ef15a43d87500000001 355s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 355s | do_aes_ctr: exit 355s | cipher_op_context_destroy_ctr_nss() 355s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: encrypt: ok 355s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: counter-block: ok 355s | decode_to_mac() input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 355s | decode_to_mac() output: 355s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 355s | decode_to_chunk() Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 355s | decode_to_chunk() output: 355s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 355s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 355s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 355s | decode_to_chunk() output: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 355s | decode_to_chunk() expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 355s | decode_to_chunk() output: 355s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 355s | cipher_op_ctr_nss() enter AES_CTR 0x64028df6c1f0 use IKEv1 IV wire_iv 0 count 0 355s | ctr_param: count 32 iv 00faac24c1585ef15a43d87500000001 355s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 355s | do_aes_ctr: exit 355s | cipher_op_context_destroy_ctr_nss() 355s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: decrypt: ok 355s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: counter-block: ok 355s ipsec algparse: Encrypting 36 octets using AES-CTR with 256-bit key 355s | decode_to_chunk() raw_key: input "0xFF 7A 61 7C E6 91 48 E4 F1 72 6E 2F 43 58 1D E2AA 62 D9 F8 05 53 2E DF F1 EE D6 87 FB 54 15 3D" 355s | decode_to_chunk() output: 355s | ff 7a 61 7c e6 91 48 e4 f1 72 6e 2f 43 58 1d e2 .za|..H..rn/CX.. 355s | aa 62 d9 f8 05 53 2e df f1 ee d6 87 fb 54 15 3d .b...S.......T.= 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13f50 355s | key-offset: 0, key-size: 32 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_CTR 355s | flags: ENCRYPT+DECRYPT 355s | key_size: 32-bytes 355s | base: base-key@0x64028df6f4d0 (48-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13f18 355s | decode_to_mac() input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 355s | decode_to_mac() output: 355s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 355s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 355s | decode_to_chunk() output: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 355s | 20 21 22 23 !"# 355s | decode_to_chunk() Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 355s | decode_to_chunk() output: 355s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 355s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 355s | 1e c0 e6 b8 .... 355s | decode_to_chunk() expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 355s | decode_to_chunk() output: 355s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 355s | cipher_op_ctr_nss() enter AES_CTR 0x64028df6c1f0 use IKEv1 IV wire_iv 0 count 0 355s | ctr_param: count 32 iv 001cc5b751a51d70a1c1114800000001 355s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 355s | do_aes_ctr: exit 355s | cipher_op_context_destroy_ctr_nss() 355s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: encrypt: ok 355s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: counter-block: ok 355s | decode_to_mac() input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 355s | decode_to_mac() output: 355s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 355s | decode_to_chunk() Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 355s | decode_to_chunk() output: 355s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 355s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 355s | 1e c0 e6 b8 .... 355s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 355s | decode_to_chunk() output: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 355s | 20 21 22 23 !"# 355s | decode_to_chunk() expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 355s | decode_to_chunk() output: 355s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 355s | cipher_op_ctr_nss() enter AES_CTR 0x64028df6c1f0 use IKEv1 IV wire_iv 0 count 0 355s | ctr_param: count 32 iv 001cc5b751a51d70a1c1114800000001 355s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 355s | do_aes_ctr: exit 355s | cipher_op_context_destroy_ctr_nss() 355s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: decrypt: ok 355s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: counter-block: ok 355s ipsec algparse: testing AES_CBC: 355s ipsec algparse: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 355s | decode_to_chunk() raw_key: input "0x06a9214036b8a15b512e03d534120006" 355s | decode_to_chunk() output: 355s | 06 a9 21 40 36 b8 a1 5b 51 2e 03 d5 34 12 00 06 ..!@6..[Q...4... 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13f50 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_CBC 355s | flags: ENCRYPT+DECRYPT 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6f4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13f18 355s | decode_to_mac() IV: : input "0x3dafba429d9eb430b422da802c9fac41" 355s | decode_to_mac() output: 355s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 355s | decode_to_chunk() new IV: : input "0xe353779c1079aeb82708942dbe77181a" 355s | decode_to_chunk() output: 355s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 355s | decode_to_chunk() plaintext: : input "Single block msg" 355s | decode_to_chunk() output: 355s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 355s | decode_to_chunk() ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 355s | decode_to_chunk() output: 355s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 355s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 355s | using IKEv1 IV 355s | NSS ike_alg_nss_cbc: AES_CBC - exit 355s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: encrypt: ok 355s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: updated CBC IV: ok 355s | decode_to_mac() IV: : input "0x3dafba429d9eb430b422da802c9fac41" 355s | decode_to_mac() output: 355s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 355s | decode_to_chunk() new IV: : input "0xe353779c1079aeb82708942dbe77181a" 355s | decode_to_chunk() output: 355s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 355s | decode_to_chunk() ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 355s | decode_to_chunk() output: 355s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 355s | decode_to_chunk() plaintext: : input "Single block msg" 355s | decode_to_chunk() output: 355s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 355s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 355s | using IKEv1 IV 355s | NSS ike_alg_nss_cbc: AES_CBC - exit 355s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: decrypt: ok 355s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: updated CBC IV: ok 355s ipsec algparse: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 355s | decode_to_chunk() raw_key: input "0xc286696d887c9aa0611bbb3e2025a45a" 355s | decode_to_chunk() output: 355s | c2 86 69 6d 88 7c 9a a0 61 1b bb 3e 20 25 a4 5a ..im.|..a..> %.Z 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13f50 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_CBC 355s | flags: ENCRYPT+DECRYPT 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6f4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13f18 355s | decode_to_mac() IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 355s | decode_to_mac() output: 355s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 355s | decode_to_chunk() new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 355s | decode_to_chunk() output: 355s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 355s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 355s | decode_to_chunk() plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 355s | decode_to_chunk() output: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 355s | decode_to_chunk() ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 355s | decode_to_chunk() output: 355s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 355s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 355s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 355s | using IKEv1 IV 355s | NSS ike_alg_nss_cbc: AES_CBC - exit 355s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: encrypt: ok 355s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 355s | decode_to_mac() IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 355s | decode_to_mac() output: 355s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 355s | decode_to_chunk() new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 355s | decode_to_chunk() output: 355s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 355s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 355s | decode_to_chunk() ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 355s | decode_to_chunk() output: 355s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 355s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 355s | decode_to_chunk() plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 355s | decode_to_chunk() output: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 355s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 355s | using IKEv1 IV 355s | NSS ike_alg_nss_cbc: AES_CBC - exit 355s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: decrypt: ok 355s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 355s ipsec algparse: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 355s | decode_to_chunk() raw_key: input "0x6c3ea0477630ce21a2ce334aa746c2cd" 355s | decode_to_chunk() output: 355s | 6c 3e a0 47 76 30 ce 21 a2 ce 33 4a a7 46 c2 cd l>.Gv0.!..3J.F.. 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13f50 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_CBC 355s | flags: ENCRYPT+DECRYPT 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6f4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13f18 355s | decode_to_mac() IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 355s | decode_to_mac() output: 355s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 355s | decode_to_chunk() new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 355s | decode_to_chunk() output: 355s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 355s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 355s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 355s | decode_to_chunk() plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 355s | decode_to_chunk() output: 355s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 355s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 355s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 355s | decode_to_chunk() ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 355s | decode_to_chunk() output: 355s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 355s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 355s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 355s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 355s | using IKEv1 IV 355s | NSS ike_alg_nss_cbc: AES_CBC - exit 355s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: encrypt: ok 355s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 355s | decode_to_mac() IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 355s | decode_to_mac() output: 355s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 355s | decode_to_chunk() new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 355s | decode_to_chunk() output: 355s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 355s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 355s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 355s | decode_to_chunk() ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 355s | decode_to_chunk() output: 355s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 355s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 355s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 355s | decode_to_chunk() plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 355s | decode_to_chunk() output: 355s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 355s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 355s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 355s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 355s | using IKEv1 IV 355s | NSS ike_alg_nss_cbc: AES_CBC - exit 355s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: decrypt: ok 355s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 355s ipsec algparse: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 355s | decode_to_chunk() raw_key: input "0x56e47a38c5598974bc46903dba290349" 355s | decode_to_chunk() output: 355s | 56 e4 7a 38 c5 59 89 74 bc 46 90 3d ba 29 03 49 V.z8.Y.t.F.=.).I 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13f50 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_CBC 355s | flags: ENCRYPT+DECRYPT 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6f4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13f18 355s | decode_to_mac() IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 355s | decode_to_mac() output: 355s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 355s | decode_to_chunk() plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 355s | decode_to_chunk() output: 355s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 355s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 355s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 355s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 355s | decode_to_chunk() ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 355s | decode_to_chunk() output: 355s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 355s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 355s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 355s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 355s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 355s | using IKEv1 IV 355s | NSS ike_alg_nss_cbc: AES_CBC - exit 355s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: encrypt: ok 355s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 355s | decode_to_mac() IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 355s | decode_to_mac() output: 355s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 355s | decode_to_chunk() ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 355s | decode_to_chunk() output: 355s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 355s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 355s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 355s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 355s | decode_to_chunk() plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 355s | decode_to_chunk() output: 355s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 355s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 355s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 355s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 355s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 355s | using IKEv1 IV 355s | NSS ike_alg_nss_cbc: AES_CBC - exit 355s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: decrypt: ok 355s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 355s ipsec algparse: testing AES_XCBC: 355s ipsec algparse: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 355s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 355s | decode_to_chunk() output: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | decode_to_chunk() test_prf_vector: input "" 355s | decode_to_chunk() output: 355s | 355s | decode_to_chunk() test_prf_vector: input "0x75f0251d528ac01c4573dfd584d79f29" 355s | decode_to_chunk() output: 355s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 355s | PRF chunk interface PRF AES_XCBC init key hunk 0x64028df6f800 (length 16) 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13e40 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6f4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13dd8 355s | XCBC: Key 16=16 just right 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6dde0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13d88 355s | PRF chunk interface PRF AES_XCBC 0x64028df6c460 355s | PRF chunk interface PRF AES_XCBC update message (0x64028df6dd10 length 0) 355s | 355s | XCBC: data 355s | 355s | K extracting all 16 bytes of key@0x64028df6f4d0 355s | K: symkey-key@0x64028df6f4d0 (16-bytes, AES_ECB) 355s | sizeof bytes 16 355s | wrapper: (SECItemType)538976288: 73 8d 63 cf 4a 63 82 45 05 54 87 62 f2 3d 05 ee 355s | K extracted len 16 bytes at 0x64028df70010 355s | unwrapped: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | XCBC: K: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | XCBC: K1 355s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13cf0 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df701a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13cd8 355s | Computing E[0] using K3 355s | XCBC: K3 355s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 355s | XCBC: E[n-1] 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | XCBC: M[n] 355s | 355s | XCBC: M[n] 355s | 355s | XCBC: M[n]:80...^E[n-1]^K3 355s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 355s | XCBC: MAC 355s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 355s | PRF chunk interface PRF AES_XCBC final length 16 355s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 355s | chunk output 355s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 355s | verify_bytes() RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: prf OUT: ok 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13ec0 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6dde0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13e58 355s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x64028df6f4d0 (size 16) 355s | PRF symkey interface: key symkey-key@0x64028df6f4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | XCBC: Key 16=16 just right 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6f4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13dc8 355s | PRF symkey interface PRF AES_XCBC 0x64028df6c460 355s | PRF symkey interface PRF AES_XCBC update symkey message-key@(nil) (size 0) 355s | PRF symkey interface: symkey message-key@NULL 355s | symkey message NULL key has no bytes 355s | XCBC: data 355s | 355s | K extracting all 16 bytes of key@0x64028df6dde0 355s | K: symkey-key@0x64028df6dde0 (16-bytes, AES_ECB) 355s | sizeof bytes 16 355s | wrapper: (SECItemType)-1363068608: 73 8d 63 cf 4a 63 82 45 05 54 87 62 f2 3d 05 ee 355s | K extracted len 16 bytes at 0x64028df70010 355s | unwrapped: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | XCBC: K: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | XCBC: K1 355s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13d40 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df704e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13d28 355s | Computing E[0] using K3 355s | XCBC: K3 355s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 355s | XCBC: E[n-1] 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | XCBC: M[n] 355s | 355s | XCBC: M[n] 355s | 355s | XCBC: M[n]:80...^E[n-1]^K3 355s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 355s | XCBC: MAC 355s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13e50 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 16-bytes 355s | base: base-key@0x64028df704e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13de8 355s | PRF symkey interface PRF AES_XCBC final-key@0x64028df701a0 (size 16) 355s | PRF symkey interface: key-key@0x64028df701a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | output: symkey-key@0x64028df701a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracting all 16 bytes of key@0x64028df701a0 355s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: symkey-key@0x64028df701a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | sizeof bytes 16 355s | wrapper: (SECItemType)976: 97 e8 7f d8 e5 a5 a2 72 32 c7 bc ae 80 fa 5c 6c 355s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracted len 16 bytes at 0x64028df70180 355s | unwrapped: 355s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 355s | verify_bytes() RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: symkey: ok 355s ipsec algparse: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 355s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 355s | decode_to_chunk() output: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | decode_to_chunk() test_prf_vector: input "0x000102" 355s | decode_to_chunk() output: 355s | 00 01 02 ... 355s | decode_to_chunk() test_prf_vector: input "0x5b376580ae2f19afe7219ceef172756f" 355s | decode_to_chunk() output: 355s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 355s | PRF chunk interface PRF AES_XCBC init key hunk 0x64028df6f800 (length 16) 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13e40 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6f4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13dd8 355s | XCBC: Key 16=16 just right 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df701a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13d88 355s | PRF chunk interface PRF AES_XCBC 0x64028df6c460 355s | PRF chunk interface PRF AES_XCBC update message (0x64028df6dd10 length 3) 355s | 00 01 02 ... 355s | XCBC: data 355s | 00 01 02 ... 355s | K extracting all 16 bytes of key@0x64028df6f4d0 355s | K: symkey-key@0x64028df6f4d0 (16-bytes, AES_ECB) 355s | sizeof bytes 16 355s | wrapper: (SECItemType)538976288: 73 8d 63 cf 4a 63 82 45 05 54 87 62 f2 3d 05 ee 355s | K extracted len 16 bytes at 0x64028df6f820 355s | unwrapped: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | XCBC: K: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | XCBC: K1 355s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13cf0 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6dde0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13cd8 355s | Computing E[1] using K3 355s | XCBC: K3 355s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 355s | XCBC: E[n-1] 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | XCBC: M[n] 355s | 00 01 02 ... 355s | XCBC: M[n] 355s | 00 01 02 ... 355s | XCBC: M[n]:80...^E[n-1]^K3 355s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 355s | XCBC: MAC 355s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 355s | PRF chunk interface PRF AES_XCBC final length 16 355s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 355s | chunk output 355s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 355s | verify_bytes() RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: prf OUT: ok 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13ec0 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 16-bytes 355s | base: base-key@0x64028df701a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13e58 355s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x64028df6f4d0 (size 16) 355s | PRF symkey interface: key symkey-key@0x64028df6f4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | XCBC: Key 16=16 just right 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6f4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13dc8 355s | PRF symkey interface PRF AES_XCBC 0x64028df6c460 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13ec0 355s | key-offset: 0, key-size: 3 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 3-bytes 355s | base: base-key@0x64028df704e0 (19-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13e58 355s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x64028df6dde0 (size 3) 355s | PRF symkey interface: symkey message-key@0x64028df6dde0 (3-bytes, EXTRACT_KEY_FROM_KEY) 355s | symkey message extracting all 3 bytes of key@0x64028df6dde0 355s | symkey message: symkey-key@0x64028df6dde0 (3-bytes, EXTRACT_KEY_FROM_KEY) 355s | sizeof bytes 16 355s | wrapper: (SECItemType)-1363068336: d3 ab 1a 77 53 07 e7 e4 ce 32 48 5c 9c 19 43 83 355s | symkey message extracted len 16 bytes at 0x64028df6f820 355s | unwrapped: 355s | 00 01 02 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | XCBC: data 355s | 00 01 02 ... 355s | K extracting all 16 bytes of key@0x64028df701a0 355s | K: symkey-key@0x64028df701a0 (16-bytes, AES_ECB) 355s | sizeof bytes 16 355s | wrapper: (SECItemType)-1363068544: 73 8d 63 cf 4a 63 82 45 05 54 87 62 f2 3d 05 ee 355s | K extracted len 16 bytes at 0x64028df6c390 355s | unwrapped: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | XCBC: K: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | XCBC: K1 355s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13d40 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df70840 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13d28 355s | Computing E[1] using K3 355s | XCBC: K3 355s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 355s | XCBC: E[n-1] 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | XCBC: M[n] 355s | 00 01 02 ... 355s | XCBC: M[n] 355s | 00 01 02 ... 355s | XCBC: M[n]:80...^E[n-1]^K3 355s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 355s | XCBC: MAC 355s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13e50 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 16-bytes 355s | base: base-key@0x64028df70840 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13de8 355s | PRF symkey interface PRF AES_XCBC final-key@0x64028df704e0 (size 16) 355s | PRF symkey interface: key-key@0x64028df704e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | output: symkey-key@0x64028df704e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracting all 16 bytes of key@0x64028df704e0 355s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: symkey-key@0x64028df704e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | sizeof bytes 16 355s | wrapper: (SECItemType)976: eb 6e 73 ef d3 47 e0 7c d9 cb f6 85 4d d6 6e a7 355s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracted len 16 bytes at 0x64028df6c390 355s | unwrapped: 355s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 355s | verify_bytes() RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: symkey: ok 355s ipsec algparse: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 355s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 355s | decode_to_chunk() output: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 355s | decode_to_chunk() output: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | decode_to_chunk() test_prf_vector: input "0xd2a246fa349b68a79998a4394ff7a263" 355s | decode_to_chunk() output: 355s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 355s | PRF chunk interface PRF AES_XCBC init key hunk 0x64028df6f800 (length 16) 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13e40 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6f4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13dd8 355s | XCBC: Key 16=16 just right 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df704e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13d88 355s | PRF chunk interface PRF AES_XCBC 0x64028df6c460 355s | PRF chunk interface PRF AES_XCBC update message (0x64028df6dd10 length 16) 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | XCBC: data 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | K extracting all 16 bytes of key@0x64028df6f4d0 355s | K: symkey-key@0x64028df6f4d0 (16-bytes, AES_ECB) 355s | sizeof bytes 16 355s | wrapper: (SECItemType)543502368: 73 8d 63 cf 4a 63 82 45 05 54 87 62 f2 3d 05 ee 355s | K extracted len 16 bytes at 0x64028df70010 355s | unwrapped: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | XCBC: K: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | XCBC: K1 355s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13cf0 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6dde0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13cd8 355s | XCBC: Computing E[1] using K2 355s | XCBC: K2 355s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 355s | XCBC: E[n-1] 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | XCBC: M[n] 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | XCBC: M[n]^E[n-1]^K2 355s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 355s | XCBC: MAC 355s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 355s | PRF chunk interface PRF AES_XCBC final length 16 355s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 355s | chunk output 355s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 355s | verify_bytes() RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: prf OUT: ok 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13ec0 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 16-bytes 355s | base: base-key@0x64028df704e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13e58 355s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x64028df6f4d0 (size 16) 355s | PRF symkey interface: key symkey-key@0x64028df6f4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | XCBC: Key 16=16 just right 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6f4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13dc8 355s | PRF symkey interface PRF AES_XCBC 0x64028df6c460 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13ec0 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 16-bytes 355s | base: base-key@0x64028df701a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13e58 355s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x64028df6dde0 (size 16) 355s | PRF symkey interface: symkey message-key@0x64028df6dde0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | symkey message extracting all 16 bytes of key@0x64028df6dde0 355s | symkey message: symkey-key@0x64028df6dde0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | sizeof bytes 16 355s | wrapper: (SECItemType)-1363068336: 73 8d 63 cf 4a 63 82 45 05 54 87 62 f2 3d 05 ee 355s | symkey message extracted len 16 bytes at 0x64028df70010 355s | unwrapped: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | XCBC: data 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | K extracting all 16 bytes of key@0x64028df704e0 355s | K: symkey-key@0x64028df704e0 (16-bytes, AES_ECB) 355s | sizeof bytes 16 355s | wrapper: (SECItemType)-1363068544: 73 8d 63 cf 4a 63 82 45 05 54 87 62 f2 3d 05 ee 355s | K extracted len 16 bytes at 0x64028df6c1f0 355s | unwrapped: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | XCBC: K: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | XCBC: K1 355s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13d40 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df70840 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13d28 355s | XCBC: Computing E[1] using K2 355s | XCBC: K2 355s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 355s | XCBC: E[n-1] 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | XCBC: M[n] 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | XCBC: M[n]^E[n-1]^K2 355s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 355s | XCBC: MAC 355s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13e50 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 16-bytes 355s | base: base-key@0x64028df70840 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13de8 355s | PRF symkey interface PRF AES_XCBC final-key@0x64028df701a0 (size 16) 355s | PRF symkey interface: key-key@0x64028df701a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | output: symkey-key@0x64028df701a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracting all 16 bytes of key@0x64028df701a0 355s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: symkey-key@0x64028df701a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | sizeof bytes 16 355s | wrapper: (SECItemType)976: 27 fd 32 d7 ec 15 e5 6d 21 1d 7f 61 2f e5 cd 04 355s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracted len 16 bytes at 0x64028df6c1f0 355s | unwrapped: 355s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 355s | verify_bytes() RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: symkey: ok 355s ipsec algparse: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 355s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 355s | decode_to_chunk() output: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 355s | decode_to_chunk() output: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 .... 355s | decode_to_chunk() test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 355s | decode_to_chunk() output: 355s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 355s | PRF chunk interface PRF AES_XCBC init key hunk 0x64028df6f800 (length 16) 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13e40 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6f4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13dd8 355s | XCBC: Key 16=16 just right 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df701a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13d88 355s | PRF chunk interface PRF AES_XCBC 0x64028df6c460 355s | PRF chunk interface PRF AES_XCBC update message (0x64028df6dd10 length 20) 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 .... 355s | XCBC: data 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 .... 355s | K extracting all 16 bytes of key@0x64028df6f4d0 355s | K: symkey-key@0x64028df6f4d0 (16-bytes, AES_ECB) 355s | sizeof bytes 16 355s | wrapper: (SECItemType)538976288: 73 8d 63 cf 4a 63 82 45 05 54 87 62 f2 3d 05 ee 355s | K extracted len 16 bytes at 0x64028df6fb10 355s | unwrapped: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | XCBC: K: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | XCBC: K1 355s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13cf0 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6dde0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13cd8 355s | Computing E[2] using K3 355s | XCBC: K3 355s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 355s | XCBC: E[n-1] 355s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 355s | XCBC: M[n] 355s | 10 11 12 13 .... 355s | XCBC: M[n] 355s | 10 11 12 13 .... 355s | XCBC: M[n]:80...^E[n-1]^K3 355s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 355s | XCBC: MAC 355s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 355s | PRF chunk interface PRF AES_XCBC final length 16 355s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 355s | chunk output 355s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 355s | verify_bytes() RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: prf OUT: ok 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13ec0 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 16-bytes 355s | base: base-key@0x64028df701a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13e58 355s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x64028df6f4d0 (size 16) 355s | PRF symkey interface: key symkey-key@0x64028df6f4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | XCBC: Key 16=16 just right 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6f4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13dc8 355s | PRF symkey interface PRF AES_XCBC 0x64028df6c460 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13ec0 355s | key-offset: 0, key-size: 20 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 20-bytes 355s | base: base-key@0x64028df704e0 (36-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13e58 355s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x64028df6dde0 (size 20) 355s | PRF symkey interface: symkey message-key@0x64028df6dde0 (20-bytes, EXTRACT_KEY_FROM_KEY) 355s | symkey message extracting all 20 bytes of key@0x64028df6dde0 355s | symkey message: symkey-key@0x64028df6dde0 (20-bytes, EXTRACT_KEY_FROM_KEY) 355s | sizeof bytes 32 355s | wrapper: (SECItemType)-1363068336: 73 8d 63 cf 4a 63 82 45 05 54 87 62 f2 3d 05 ee 10 35 50 de 70 72 2f 1c 64 f0 17 fd 7d 99 c2 48 355s | symkey message extracted len 32 bytes at 0x64028df6fd80 355s | unwrapped: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | XCBC: data 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 .... 355s | K extracting all 16 bytes of key@0x64028df701a0 355s | K: symkey-key@0x64028df701a0 (16-bytes, AES_ECB) 355s | sizeof bytes 16 355s | wrapper: (SECItemType)-1363068544: 73 8d 63 cf 4a 63 82 45 05 54 87 62 f2 3d 05 ee 355s | K extracted len 16 bytes at 0x64028df6f820 355s | unwrapped: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | XCBC: K: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | XCBC: K1 355s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13d40 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df70840 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13d28 355s | Computing E[2] using K3 355s | XCBC: K3 355s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 355s | XCBC: E[n-1] 355s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 355s | XCBC: M[n] 355s | 10 11 12 13 .... 355s | XCBC: M[n] 355s | 10 11 12 13 .... 355s | XCBC: M[n]:80...^E[n-1]^K3 355s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 355s | XCBC: MAC 355s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13e50 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 16-bytes 355s | base: base-key@0x64028df70840 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13de8 355s | PRF symkey interface PRF AES_XCBC final-key@0x64028df704e0 (size 16) 355s | PRF symkey interface: key-key@0x64028df704e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | output: symkey-key@0x64028df704e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracting all 16 bytes of key@0x64028df704e0 355s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: symkey-key@0x64028df704e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | sizeof bytes 16 355s | wrapper: (SECItemType)976: fc a7 2f d9 44 71 e3 b0 b5 ea 3b d0 21 5e cc 31 355s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracted len 16 bytes at 0x64028df6f820 355s | unwrapped: 355s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 355s | verify_bytes() RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: symkey: ok 355s ipsec algparse: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 355s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 355s | decode_to_chunk() output: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 355s | decode_to_chunk() output: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 355s | decode_to_chunk() test_prf_vector: input "0xf54f0ec8d2b9f3d36807734bd5283fd4" 355s | decode_to_chunk() output: 355s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 355s | PRF chunk interface PRF AES_XCBC init key hunk 0x64028df6f800 (length 16) 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13e40 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6f4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13dd8 355s | XCBC: Key 16=16 just right 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df704e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13d88 355s | PRF chunk interface PRF AES_XCBC 0x64028df6fd80 355s | PRF chunk interface PRF AES_XCBC update message (0x64028df6c460 length 32) 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 355s | XCBC: data 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 355s | K extracting all 16 bytes of key@0x64028df6f4d0 355s | K: symkey-key@0x64028df6f4d0 (16-bytes, AES_ECB) 355s | sizeof bytes 16 355s | wrapper: (SECItemType)543502624: 73 8d 63 cf 4a 63 82 45 05 54 87 62 f2 3d 05 ee 355s | K extracted len 16 bytes at 0x64028df6c390 355s | unwrapped: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | XCBC: K: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | XCBC: K1 355s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13cf0 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6dde0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13cd8 355s | XCBC: Computing E[2] using K2 355s | XCBC: K2 355s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 355s | XCBC: E[n-1] 355s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 355s | XCBC: M[n] 355s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 355s | XCBC: M[n]^E[n-1]^K2 355s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 355s | XCBC: MAC 355s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 355s | PRF chunk interface PRF AES_XCBC final length 16 355s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 355s | chunk output 355s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 355s | verify_bytes() RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: prf OUT: ok 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13ec0 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 16-bytes 355s | base: base-key@0x64028df704e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13e58 355s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x64028df6f4d0 (size 16) 355s | PRF symkey interface: key symkey-key@0x64028df6f4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | XCBC: Key 16=16 just right 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6f4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13dc8 355s | PRF symkey interface PRF AES_XCBC 0x64028df6fd80 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13ec0 355s | key-offset: 0, key-size: 32 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 32-bytes 355s | base: base-key@0x64028df701a0 (48-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13e58 355s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x64028df6dde0 (size 32) 355s | PRF symkey interface: symkey message-key@0x64028df6dde0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | symkey message extracting all 32 bytes of key@0x64028df6dde0 355s | symkey message: symkey-key@0x64028df6dde0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | sizeof bytes 32 355s | wrapper: (SECItemType)-1363068336: 73 8d 63 cf 4a 63 82 45 05 54 87 62 f2 3d 05 ee e2 70 45 7b d6 fa 55 f3 47 7b 04 b7 b0 c0 83 e7 355s | symkey message extracted len 32 bytes at 0x64028df70b00 355s | unwrapped: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 355s | XCBC: data 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 355s | K extracting all 16 bytes of key@0x64028df704e0 355s | K: symkey-key@0x64028df704e0 (16-bytes, AES_ECB) 355s | sizeof bytes 16 355s | wrapper: (SECItemType)-1363068544: 73 8d 63 cf 4a 63 82 45 05 54 87 62 f2 3d 05 ee 355s | K extracted len 16 bytes at 0x64028df70010 355s | unwrapped: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | XCBC: K: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | XCBC: K1 355s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13d40 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df70840 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13d28 355s | XCBC: Computing E[2] using K2 355s | XCBC: K2 355s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 355s | XCBC: E[n-1] 355s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 355s | XCBC: M[n] 355s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 355s | XCBC: M[n]^E[n-1]^K2 355s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 355s | XCBC: MAC 355s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13e50 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 16-bytes 355s | base: base-key@0x64028df70840 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13de8 355s | PRF symkey interface PRF AES_XCBC final-key@0x64028df701a0 (size 16) 355s | PRF symkey interface: key-key@0x64028df701a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | output: symkey-key@0x64028df701a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracting all 16 bytes of key@0x64028df701a0 355s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: symkey-key@0x64028df701a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | sizeof bytes 16 355s | wrapper: (SECItemType)976: ea 88 46 c9 5c 6f 93 4b 4f d1 8c 37 3f 66 61 4f 355s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracted len 16 bytes at 0x64028df6fb10 355s | unwrapped: 355s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 355s | verify_bytes() RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: symkey: ok 355s ipsec algparse: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 355s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 355s | decode_to_chunk() output: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f2021" 355s | decode_to_chunk() output: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 355s | 20 21 ! 355s | decode_to_chunk() test_prf_vector: input "0xbecbb3bccdb518a30677d5481fb6b4d8" 355s | decode_to_chunk() output: 355s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 355s | PRF chunk interface PRF AES_XCBC init key hunk 0x64028df6dd10 (length 16) 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13e40 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6f4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13dd8 355s | XCBC: Key 16=16 just right 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df701a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13d88 355s | PRF chunk interface PRF AES_XCBC 0x64028df6c460 355s | PRF chunk interface PRF AES_XCBC update message (0x64028df6c490 length 34) 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 355s | 20 21 ! 355s | XCBC: data 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 355s | 20 21 ! 355s | K extracting all 16 bytes of key@0x64028df6f4d0 355s | K: symkey-key@0x64028df6f4d0 (16-bytes, AES_ECB) 355s | sizeof bytes 16 355s | wrapper: (SECItemType)538976288: 73 8d 63 cf 4a 63 82 45 05 54 87 62 f2 3d 05 ee 355s | K extracted len 16 bytes at 0x64028df70010 355s | unwrapped: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | XCBC: K: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | XCBC: K1 355s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13cf0 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6dde0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13cd8 355s | Computing E[3] using K3 355s | XCBC: K3 355s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 355s | XCBC: E[n-1] 355s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 355s | XCBC: M[n] 355s | 20 21 ! 355s | XCBC: M[n] 355s | 20 21 ! 355s | XCBC: M[n]:80...^E[n-1]^K3 355s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 355s | XCBC: MAC 355s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 355s | PRF chunk interface PRF AES_XCBC final length 16 355s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 355s | chunk output 355s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 355s | verify_bytes() RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: prf OUT: ok 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13ec0 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 16-bytes 355s | base: base-key@0x64028df701a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13e58 355s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x64028df6f4d0 (size 16) 355s | PRF symkey interface: key symkey-key@0x64028df6f4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | XCBC: Key 16=16 just right 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6f4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13dc8 355s | PRF symkey interface PRF AES_XCBC 0x64028df6c460 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13ec0 355s | key-offset: 0, key-size: 34 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 34-bytes 355s | base: base-key@0x64028df704e0 (50-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13e58 355s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x64028df6dde0 (size 34) 355s | PRF symkey interface: symkey message-key@0x64028df6dde0 (34-bytes, EXTRACT_KEY_FROM_KEY) 355s | symkey message extracting all 34 bytes of key@0x64028df6dde0 355s | symkey message: symkey-key@0x64028df6dde0 (34-bytes, EXTRACT_KEY_FROM_KEY) 355s | sizeof bytes 48 355s | wrapper: (SECItemType)-1363068336: 73 8d 63 cf 4a 63 82 45 05 54 87 62 f2 3d 05 ee e2 70 45 7b d6 fa 55 f3 47 7b 04 b7 b0 c0 83 e7 3f 17 f3 75 21 cc fa 86 48 9c 26 92 5d 1b 47 ba 355s | symkey message extracted len 48 bytes at 0x64028df6fb30 355s | unwrapped: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 355s | 20 21 00 00 00 00 00 00 00 00 00 00 00 00 00 00 !.............. 355s | XCBC: data 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 355s | 20 21 ! 355s | K extracting all 16 bytes of key@0x64028df701a0 355s | K: symkey-key@0x64028df701a0 (16-bytes, AES_ECB) 355s | sizeof bytes 16 355s | wrapper: (SECItemType)-1363068544: 73 8d 63 cf 4a 63 82 45 05 54 87 62 f2 3d 05 ee 355s | K extracted len 16 bytes at 0x64028df6c390 355s | unwrapped: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | XCBC: K: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | XCBC: K1 355s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13d40 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df70840 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13d28 355s | Computing E[3] using K3 355s | XCBC: K3 355s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 355s | XCBC: E[n-1] 355s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 355s | XCBC: M[n] 355s | 20 21 ! 355s | XCBC: M[n] 355s | 20 21 ! 355s | XCBC: M[n]:80...^E[n-1]^K3 355s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 355s | XCBC: MAC 355s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13e50 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 16-bytes 355s | base: base-key@0x64028df70840 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13de8 355s | PRF symkey interface PRF AES_XCBC final-key@0x64028df704e0 (size 16) 355s | PRF symkey interface: key-key@0x64028df704e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | output: symkey-key@0x64028df704e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracting all 16 bytes of key@0x64028df704e0 355s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: symkey-key@0x64028df704e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | sizeof bytes 16 355s | wrapper: (SECItemType)976: e8 5d 0f 40 1f d8 36 08 1c e2 3d 43 c2 19 e0 0e 355s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracted len 16 bytes at 0x64028df6f700 355s | unwrapped: 355s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 355s | verify_bytes() RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: symkey: ok 355s ipsec algparse: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 355s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 355s | decode_to_chunk() output: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | decode_to_chunk() test_prf_vector: input "0xf0dafee895db30253761103b5d84528f" 355s | decode_to_chunk() output: 355s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 355s | PRF chunk interface PRF AES_XCBC init key hunk 0x64028df6f820 (length 16) 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13e40 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6f4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13dd8 355s | XCBC: Key 16=16 just right 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df704e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13d88 355s | PRF chunk interface PRF AES_XCBC 0x64028df6fd80 355s | PRF chunk interface PRF AES_XCBC update message (0x64028df6df10 length 1000) 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 ........ 355s | XCBC: data 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 ........ 355s | K extracting all 16 bytes of key@0x64028df6f4d0 355s | K: symkey-key@0x64028df6f4d0 (16-bytes, AES_ECB) 355s | sizeof bytes 16 355s | wrapper: (SECItemType)538976288: 73 8d 63 cf 4a 63 82 45 05 54 87 62 f2 3d 05 ee 355s | K extracted len 16 bytes at 0x64028df6c390 355s | unwrapped: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | XCBC: K: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | XCBC: K1 355s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13cf0 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6dde0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13cd8 355s | Computing E[63] using K3 355s | XCBC: K3 355s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 355s | XCBC: E[n-1] 355s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 355s | XCBC: M[n] 355s | 00 00 00 00 00 00 00 00 ........ 355s | XCBC: M[n] 355s | 00 00 00 00 00 00 00 00 ........ 355s | XCBC: M[n]:80...^E[n-1]^K3 355s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 355s | XCBC: MAC 355s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 355s | PRF chunk interface PRF AES_XCBC final length 16 355s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 355s | chunk output 355s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 355s | verify_bytes() RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: prf OUT: ok 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13ec0 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 16-bytes 355s | base: base-key@0x64028df704e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13e58 355s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x64028df6f4d0 (size 16) 355s | PRF symkey interface: key symkey-key@0x64028df6f4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | XCBC: Key 16=16 just right 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6f4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13dc8 355s | PRF symkey interface PRF AES_XCBC 0x64028df6fd80 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13ec0 355s | key-offset: 0, key-size: 1000 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 1000-bytes 355s | base: base-key@0x64028df701a0 (1016-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13e58 355s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x64028df6dde0 (size 1000) 355s | PRF symkey interface: symkey message-key@0x64028df6dde0 (1000-bytes, EXTRACT_KEY_FROM_KEY) 355s | symkey message extracting all 1000 bytes of key@0x64028df6dde0 355s | symkey message: symkey-key@0x64028df6dde0 (1000-bytes, EXTRACT_KEY_FROM_KEY) 355s | sizeof bytes 1008 355s | wrapper: (SECItemType)-1363068336: 2a 58 1c e8 a7 39 db b8 02 4c eb 81 1c b1 e1 cb 2a 58 1c e8 a7 39 db b8 02 4c eb 81 1c b1 e1 cb 2a 58 1c e8 a7 39 db b8 02 4c eb 81 1c b1 e1 cb 2a 58 1c e8 a7 39 db b8 02 4c eb 81 1c b1 e1 cb 2a 58 1c e8 a7 39 db b8 02 4c eb 81 1c b1 e1 cb 2a 58 1c e8 a7 39 db b8 02 4c eb 81 1c b1 e1 cb 2a 58 1c e8 a7 39 db b8 02 4c eb 81 1c b1 e1 cb 2a 58 1c e8 a7 39 db b8 02 4c eb 81 1c b1 e1 cb 2a 58 1c e8 a7 39 db b8 02 4c eb 81 1c b1 e1 cb 2a 58 1c e8 a7 39 db b8 02 4c eb 81 1c b1 e1 cb 2a 58 1c e8 a7 39 db b8 02 4c eb 81 1c b1 e1 cb 2a 58 1c e8 a7 39 db b8 02 4c eb 81 1c b1 e1 cb 2a 58 1c e8 a7 39 db b8 02 4c eb 81 1c b1 e1 cb 2a 58 1c e8 a7 39 db b8 02 4c eb 81 1c b1 e1 cb 2a 58 1c e8 a7 39 db b8 02 4c eb 81 1c b1 e1 cb 2a 58 1c e8 a7 39 db b8 02 4c eb 81 1c b1 e1 cb 2a 58 1c e8 a7 39 db b8 02 4c eb 81 1c b1 e1 cb 2a 58 1c e8 a7 39 db b8 02 4c eb 81 1c b1 e1 cb 2a 58 1c e8 a7 39 db b8 02 4c eb 81 1c b1 e... 355s | symkey message extracted len 1008 bytes at 0x64028df6eaf0 355s | unwrapped: 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | XCBC: data 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | 00 00 00 00 00 00 00 00 ........ 355s | K extracting all 16 bytes of key@0x64028df704e0 355s | K: symkey-key@0x64028df704e0 (16-bytes, AES_ECB) 355s | sizeof bytes 16 355s | wrapper: (SECItemType)-1363068544: 73 8d 63 cf 4a 63 82 45 05 54 87 62 f2 3d 05 ee 355s | K extracted len 16 bytes at 0x64028df70010 355s | unwrapped: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | XCBC: K: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | XCBC: K1 355s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13d40 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df70840 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13d28 355s | Computing E[63] using K3 355s | XCBC: K3 355s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 355s | XCBC: E[n-1] 355s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 355s | XCBC: M[n] 355s | 00 00 00 00 00 00 00 00 ........ 355s | XCBC: M[n] 355s | 00 00 00 00 00 00 00 00 ........ 355s | XCBC: M[n]:80...^E[n-1]^K3 355s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 355s | XCBC: MAC 355s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13e50 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 16-bytes 355s | base: base-key@0x64028df70840 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13de8 355s | PRF symkey interface PRF AES_XCBC final-key@0x64028df701a0 (size 16) 355s | PRF symkey interface: key-key@0x64028df701a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | output: symkey-key@0x64028df701a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracting all 16 bytes of key@0x64028df701a0 355s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: symkey-key@0x64028df701a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | sizeof bytes 16 355s | wrapper: (SECItemType)976: a1 f5 6d b7 a0 23 16 93 41 c4 fc ab a7 70 27 15 355s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracted len 16 bytes at 0x64028df6fb10 355s | unwrapped: 355s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 355s | verify_bytes() RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: symkey: ok 355s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 355s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 355s | decode_to_chunk() output: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 355s | decode_to_chunk() output: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 .... 355s | decode_to_chunk() test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 355s | decode_to_chunk() output: 355s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 355s | PRF chunk interface PRF AES_XCBC init key hunk 0x64028df6f800 (length 16) 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13e40 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6f4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13dd8 355s | XCBC: Key 16=16 just right 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df701a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13d88 355s | PRF chunk interface PRF AES_XCBC 0x64028df6fd80 355s | PRF chunk interface PRF AES_XCBC update message (0x64028df6dd10 length 20) 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 .... 355s | XCBC: data 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 .... 355s | K extracting all 16 bytes of key@0x64028df6f4d0 355s | K: symkey-key@0x64028df6f4d0 (16-bytes, AES_ECB) 355s | sizeof bytes 16 355s | wrapper: (SECItemType)538976288: 73 8d 63 cf 4a 63 82 45 05 54 87 62 f2 3d 05 ee 355s | K extracted len 16 bytes at 0x64028df70820 355s | unwrapped: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | XCBC: K: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | XCBC: K1 355s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13cf0 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6dde0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13cd8 355s | Computing E[2] using K3 355s | XCBC: K3 355s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 355s | XCBC: E[n-1] 355s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 355s | XCBC: M[n] 355s | 10 11 12 13 .... 355s | XCBC: M[n] 355s | 10 11 12 13 .... 355s | XCBC: M[n]:80...^E[n-1]^K3 355s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 355s | XCBC: MAC 355s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 355s | PRF chunk interface PRF AES_XCBC final length 16 355s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 355s | chunk output 355s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 355s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): prf OUT: ok 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13ec0 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 16-bytes 355s | base: base-key@0x64028df701a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13e58 355s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x64028df6f4d0 (size 16) 355s | PRF symkey interface: key symkey-key@0x64028df6f4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | XCBC: Key 16=16 just right 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6f4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13dc8 355s | PRF symkey interface PRF AES_XCBC 0x64028df6fd80 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13ec0 355s | key-offset: 0, key-size: 20 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 20-bytes 355s | base: base-key@0x64028df704e0 (36-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13e58 355s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x64028df6dde0 (size 20) 355s | PRF symkey interface: symkey message-key@0x64028df6dde0 (20-bytes, EXTRACT_KEY_FROM_KEY) 355s | symkey message extracting all 20 bytes of key@0x64028df6dde0 355s | symkey message: symkey-key@0x64028df6dde0 (20-bytes, EXTRACT_KEY_FROM_KEY) 355s | sizeof bytes 32 355s | wrapper: (SECItemType)-1363068336: 73 8d 63 cf 4a 63 82 45 05 54 87 62 f2 3d 05 ee 10 35 50 de 70 72 2f 1c 64 f0 17 fd 7d 99 c2 48 355s | symkey message extracted len 32 bytes at 0x64028df6c460 355s | unwrapped: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | XCBC: data 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 .... 355s | K extracting all 16 bytes of key@0x64028df701a0 355s | K: symkey-key@0x64028df701a0 (16-bytes, AES_ECB) 355s | sizeof bytes 16 355s | wrapper: (SECItemType)-1363068544: 73 8d 63 cf 4a 63 82 45 05 54 87 62 f2 3d 05 ee 355s | K extracted len 16 bytes at 0x64028df6c390 355s | unwrapped: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | XCBC: K: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | XCBC: K1 355s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13d40 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df70840 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13d28 355s | Computing E[2] using K3 355s | XCBC: K3 355s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 355s | XCBC: E[n-1] 355s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 355s | XCBC: M[n] 355s | 10 11 12 13 .... 355s | XCBC: M[n] 355s | 10 11 12 13 .... 355s | XCBC: M[n]:80...^E[n-1]^K3 355s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 355s | XCBC: MAC 355s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13e50 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 16-bytes 355s | base: base-key@0x64028df70840 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13de8 355s | PRF symkey interface PRF AES_XCBC final-key@0x64028df704e0 (size 16) 355s | PRF symkey interface: key-key@0x64028df704e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | output: symkey-key@0x64028df704e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracting all 16 bytes of key@0x64028df704e0 355s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): symkey-key@0x64028df704e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | sizeof bytes 16 355s | wrapper: (SECItemType)976: fc a7 2f d9 44 71 e3 b0 b5 ea 3b d0 21 5e cc 31 355s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracted len 16 bytes at 0x64028df6c390 355s | unwrapped: 355s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 355s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): symkey: ok 355s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 355s | decode_to_chunk() test_prf_vector: input "0x00010203040506070809" 355s | decode_to_chunk() output: 355s | 00 01 02 03 04 05 06 07 08 09 .......... 355s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 355s | decode_to_chunk() output: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 .... 355s | decode_to_chunk() test_prf_vector: input "0x0fa087af7d866e7653434e602fdde835" 355s | decode_to_chunk() output: 355s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 355s | PRF chunk interface PRF AES_XCBC init key hunk 0x64028df6f800 (length 10) 355s | 00 01 02 03 04 05 06 07 08 09 .......... 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13e40 355s | key-offset: 0, key-size: 10 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 10-bytes 355s | base: base-key@0x64028df6f4d0 (26-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13dd8 355s | XCBC: Key 10<16 too small, padding with zeros 355s | CONCATENATE_BASE_AND_DATA: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df704e0 (10-bytes, EXTRACT_KEY_FROM_KEY) 355s | params: 16-bytes@0x7ffeaec13d80 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6f4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13d88 355s | PRF chunk interface PRF AES_XCBC 0x64028df6fd80 355s | PRF chunk interface PRF AES_XCBC update message (0x64028df6dd10 length 20) 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 .... 355s | XCBC: data 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 .... 355s | K extracting all 16 bytes of key@0x64028df6dde0 355s | K: symkey-key@0x64028df6dde0 (16-bytes, AES_ECB) 355s | sizeof bytes 16 355s | wrapper: (SECItemType)538976288: 6b e0 02 4f 4b 95 2b fd 56 cf 88 88 79 8d 04 1b 355s | K extracted len 16 bytes at 0x64028df6f820 355s | unwrapped: 355s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 355s | XCBC: K: 355s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 355s | XCBC: K1 355s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13cf0 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6f4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13cd8 355s | Computing E[2] using K3 355s | XCBC: K3 355s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 355s | XCBC: E[n-1] 355s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 355s | XCBC: M[n] 355s | 10 11 12 13 .... 355s | XCBC: M[n] 355s | 10 11 12 13 .... 355s | XCBC: M[n]:80...^E[n-1]^K3 355s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 355s | XCBC: MAC 355s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 355s | PRF chunk interface PRF AES_XCBC final length 16 355s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 355s | chunk output 355s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 355s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): prf OUT: ok 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13ec0 355s | key-offset: 0, key-size: 10 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 10-bytes 355s | base: base-key@0x64028df704e0 (26-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13e58 355s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x64028df6dde0 (size 10) 355s | PRF symkey interface: key symkey-key@0x64028df6dde0 (10-bytes, EXTRACT_KEY_FROM_KEY) 355s | XCBC: Key 10<16 too small, padding with zeros 355s | CONCATENATE_BASE_AND_DATA: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6dde0 (10-bytes, EXTRACT_KEY_FROM_KEY) 355s | params: 16-bytes@0x7ffeaec13dc0 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df704e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13dc8 355s | PRF symkey interface PRF AES_XCBC 0x64028df6fd80 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13ec0 355s | key-offset: 0, key-size: 20 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 20-bytes 355s | base: base-key@0x64028df701a0 (36-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13e58 355s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x64028df704e0 (size 20) 355s | PRF symkey interface: symkey message-key@0x64028df704e0 (20-bytes, EXTRACT_KEY_FROM_KEY) 355s | symkey message extracting all 20 bytes of key@0x64028df704e0 355s | symkey message: symkey-key@0x64028df704e0 (20-bytes, EXTRACT_KEY_FROM_KEY) 355s | sizeof bytes 32 355s | wrapper: (SECItemType)-1363068336: 73 8d 63 cf 4a 63 82 45 05 54 87 62 f2 3d 05 ee 10 35 50 de 70 72 2f 1c 64 f0 17 fd 7d 99 c2 48 355s | symkey message extracted len 32 bytes at 0x64028df6c490 355s | unwrapped: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | XCBC: data 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 .... 355s | K extracting all 16 bytes of key@0x64028df6f4d0 355s | K: symkey-key@0x64028df6f4d0 (16-bytes, AES_ECB) 355s | sizeof bytes 16 355s | wrapper: (SECItemType)-1363068544: 6b e0 02 4f 4b 95 2b fd 56 cf 88 88 79 8d 04 1b 355s | K extracted len 16 bytes at 0x64028df70180 355s | unwrapped: 355s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 355s | XCBC: K: 355s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 355s | XCBC: K1 355s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13d40 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df70840 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13d28 355s | Computing E[2] using K3 355s | XCBC: K3 355s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 355s | XCBC: E[n-1] 355s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 355s | XCBC: M[n] 355s | 10 11 12 13 .... 355s | XCBC: M[n] 355s | 10 11 12 13 .... 355s | XCBC: M[n]:80...^E[n-1]^K3 355s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 355s | XCBC: MAC 355s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13e50 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 16-bytes 355s | base: base-key@0x64028df70840 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13de8 355s | PRF symkey interface PRF AES_XCBC final-key@0x64028df701a0 (size 16) 355s | PRF symkey interface: key-key@0x64028df701a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | output: symkey-key@0x64028df701a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracting all 16 bytes of key@0x64028df701a0 355s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): symkey-key@0x64028df701a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | sizeof bytes 16 355s | wrapper: (SECItemType)976: 8e 4b 08 c1 09 24 13 f2 6d ae db dd bd 7f ea 48 355s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracted len 16 bytes at 0x64028df70180 355s | unwrapped: 355s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 355s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): symkey: ok 355s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 355s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0fedcb" 355s | decode_to_chunk() output: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | ed cb .. 355s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 355s | decode_to_chunk() output: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | 10 11 12 13 .... 355s | decode_to_chunk() test_prf_vector: input "0x8cd3c93ae598a9803006ffb67c40e9e4" 355s | decode_to_chunk() output: 355s | 8c d3 c9 3a e5 98 a9 80 30 06 ff b6 7c 40 e9 e4 ...:....0...|@.. 355s | PRF chunk interface PRF AES_XCBC init key hunk 0x64028df6f800 (length 18) 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | ed cb .. 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13e40 355s | key-offset: 0, key-size: 18 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 18-bytes 355s | base: base-key@0x64028df6dde0 (34-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13dd8 355s | XCBC: Key 18>16 too big, rehashing to size 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13d40 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df704e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13d28 355s | draft_chunk extracting all 18 bytes of key@0x64028df701a0 355s | draft_chunk: symkey-key@0x64028df701a0 (18-bytes, EXTRACT_KEY_FROM_KEY) 355s | sizeof bytes 32 355s | wrapper: (SECItemType)1095914584: 73 8d 63 cf 4a 63 82 45 05 54 87 62 f2 3d 05 ee 43 90 89 95 b9 e0 d0 03 5b 71 e7 ca 5c f0 6f a5 355s | draft_chunk extracted len 32 bytes at 0x64028df6c490 355s | unwrapped: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | XCBC: data 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | ed cb .. 355s | K extracting all 16 bytes of key@0x64028df6dde0 355s | K: symkey-key@0x64028df6dde0 (16-bytes, AES_ECB) 355s | sizeof bytes 16 355s | wrapper: (SECItemType)774778414: 2a 58 1c e8 a7 39 db b8 02 4c eb 81 1c b1 e1 cb 355s | K extracted len 16 bytes at 0x64028df70820 355s | unwrapped: 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | XCBC: K: 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | XCBC: K1 355s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13c70 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6f4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13c58 355s | Computing E[2] using K3 355s | XCBC: K3 355s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 355s | XCBC: E[n-1] 355s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 355s | XCBC: M[n] 355s | ed cb .. 355s | XCBC: M[n] 355s | ed cb .. 355s | XCBC: M[n]:80...^E[n-1]^K3 355s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.16 too big, rehashing to size 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13d80 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6dde0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13d68 355s | draft_chunk extracting all 18 bytes of key@0x64028df704e0 355s | draft_chunk: symkey-key@0x64028df704e0 (18-bytes, EXTRACT_KEY_FROM_KEY) 355s | sizeof bytes 32 355s | wrapper: (SECItemType)16: 73 8d 63 cf 4a 63 82 45 05 54 87 62 f2 3d 05 ee 43 90 89 95 b9 e0 d0 03 5b 71 e7 ca 5c f0 6f a5 355s | draft_chunk extracted len 32 bytes at 0x64028df6fd80 355s | unwrapped: 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | XCBC: data 355s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 355s | ed cb .. 355s | K extracting all 16 bytes of key@0x64028df701a0 355s | K: symkey-key@0x64028df701a0 (16-bytes, AES_ECB) 355s | sizeof bytes 16 355s | wrapper: (SECItemType)774778414: 2a 58 1c e8 a7 39 db b8 02 4c eb 81 1c b1 e1 cb 355s | K extracted len 16 bytes at 0x64028df6f700 355s | unwrapped: 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | XCBC: K: 355s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | XCBC: K1 355s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13cb0 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: AES_ECB 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6f4d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13c98 355s | Computing E[2] using K3 355s | XCBC: K3 355s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 355s | XCBC: E[n-1] 355s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 355s | XCBC: M[n] 355s | ed cb .. 355s | XCBC: M[n] 355s | ed cb .. 355s | XCBC: M[n]:80...^E[n-1]^K3 355s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.j.....n1.].8 355s | PRF chunk interface PRF HMAC_MD5 init key hunk 0x64028df6dd10 (length 4) 355s | 4a 65 66 65 Jefe 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13df0 355s | key-offset: 0, key-size: 4 355s | EXTRACT_KEY_FROM_KEY: 355s | target: MD5_HMAC 355s | flags: SIGN 355s | key_size: 4-bytes 355s | base: base-key@0x64028df6f4d0 (20-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13dd8 355s | PRF chunk interface prf: created HMAC_MD5 context 0x64028df6f840 from key-key@0x64028df704e0 355s | PRF chunk interface prf: begin HMAC_MD5 with context 0x64028df6f840 from key-key@0x64028df704e0 355s | PRF chunk interface PRF HMAC_MD5 0x64028df6fe10 355s | PRF chunk interface PRF HMAC_MD5 update message (0x64028df6fd80 length 28) 355s | 77 68 61 74 20 64 6f 20 79 61 20 77 61 6e 74 20 what do ya want 355s | 66 6f 72 20 6e 6f 74 68 69 6e 67 3f for nothing? 355s | PRF chunk interface PRF HMAC_MD5 final length 16 355s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 355s | chunk output 355s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 355s | verify_bytes() RFC 2104: MD5_HMAC test 2: prf OUT: ok 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13ec0 355s | key-offset: 0, key-size: 4 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 4-bytes 355s | base: base-key@0x64028df6f4d0 (20-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13e58 355s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0x64028df704e0 (size 4) 355s | PRF symkey interface: key symkey-key@0x64028df704e0 (4-bytes, EXTRACT_KEY_FROM_KEY) 355s | key-offset: 0, key-size: 4 355s | EXTRACT_KEY_FROM_KEY: 355s | target: MD5_HMAC 355s | flags: SIGN 355s | key_size: 4-bytes 355s | base: base-key@0x64028df704e0 (4-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13e38 355s | PRF symkey interface prf: created HMAC_MD5 context 0x64028df702e0 from key symkey-key@0x64028df6f4d0 355s | PRF symkey interface prf: begin HMAC_MD5 with context 0x64028df702e0 from key symkey-key@0x64028df6f4d0 355s | PRF symkey interface PRF HMAC_MD5 0x64028df6c460 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13ec0 355s | key-offset: 0, key-size: 28 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 28-bytes 355s | base: base-key@0x64028df6dde0 (44-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13e58 355s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0x64028df701a0 (size 28) 355s | PRF symkey interface: symkey message-key@0x64028df701a0 (28-bytes, EXTRACT_KEY_FROM_KEY) 355s | nss hmac digest hack extracting all 28 bytes of key@0x64028df701a0 355s | nss hmac digest hack: symkey-key@0x64028df701a0 (28-bytes, EXTRACT_KEY_FROM_KEY) 355s | sizeof bytes 32 355s | wrapper: (SECItemType)-1363068336: 0a e5 31 38 56 f0 20 31 c0 15 33 94 ba d0 3c 33 bf c2 85 f6 7a a2 08 cb 4b ef 8c 99 1f 76 7b f1 355s | nss hmac digest hack extracted len 32 bytes at 0x64028df74dd0 355s | unwrapped: 355s | 77 68 61 74 20 64 6f 20 79 61 20 77 61 6e 74 20 what do ya want 355s | 66 6f 72 20 6e 6f 74 68 69 6e 67 3f 00 00 00 00 for nothing?.... 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13e60 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6dde0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13df8 355s | PRF symkey interface PRF HMAC_MD5 final-key@0x64028df6f4d0 (size 16) 355s | PRF symkey interface: key-key@0x64028df6f4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | output: symkey-key@0x64028df6f4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | RFC 2104: MD5_HMAC test 2 extracting all 16 bytes of key@0x64028df6f4d0 355s | RFC 2104: MD5_HMAC test 2: symkey-key@0x64028df6f4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | sizeof bytes 16 355s | wrapper: (SECItemType)976: 87 64 93 54 5a 9e 75 0c 22 ba c7 a3 4d 3f 1e 11 355s | RFC 2104: MD5_HMAC test 2 extracted len 16 bytes at 0x64028df6f820 355s | unwrapped: 355s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 355s | verify_bytes() RFC 2104: MD5_HMAC test 2: symkey: ok 355s ipsec algparse: RFC 2104: MD5_HMAC test 3 355s | decode_to_chunk() test_prf_vector: input "0xAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" 355s | decode_to_chunk() output: 355s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 355s | decode_to_chunk() test_prf_vector: input "0xDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD" 355s | decode_to_chunk() output: 355s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 355s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 355s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 355s | dd dd .. 355s | decode_to_chunk() test_prf_vector: input "0x56be34521d144c88dbb8c733f0e8b3f6" 355s | decode_to_chunk() output: 355s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 355s | PRF chunk interface PRF HMAC_MD5 init key hunk 0x64028df6c390 (length 16) 355s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13df0 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: MD5_HMAC 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df704e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13dd8 355s | PRF chunk interface prf: created HMAC_MD5 context 0x64028df708d0 from key-key@0x64028df6f4d0 355s | PRF chunk interface prf: begin HMAC_MD5 with context 0x64028df708d0 from key-key@0x64028df6f4d0 355s | PRF chunk interface PRF HMAC_MD5 0x64028df6c490 355s | PRF chunk interface PRF HMAC_MD5 update message (0x64028df6fd40 length 50) 355s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 355s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 355s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 355s | dd dd .. 355s | PRF chunk interface PRF HMAC_MD5 final length 16 355s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 355s | chunk output 355s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 355s | verify_bytes() RFC 2104: MD5_HMAC test 3: prf OUT: ok 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13ec0 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 16-bytes 355s | base: base-key@0x64028df704e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13e58 355s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0x64028df6f4d0 (size 16) 355s | PRF symkey interface: key symkey-key@0x64028df6f4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: MD5_HMAC 355s | flags: SIGN 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6f4d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13e38 355s | PRF symkey interface prf: created HMAC_MD5 context 0x64028df6f300 from key symkey-key@0x64028df704e0 355s | PRF symkey interface prf: begin HMAC_MD5 with context 0x64028df6f300 from key symkey-key@0x64028df704e0 355s | PRF symkey interface PRF HMAC_MD5 0x64028df6fd80 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13ec0 355s | key-offset: 0, key-size: 50 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 50-bytes 355s | base: base-key@0x64028df6dde0 (66-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13e58 355s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0x64028df701a0 (size 50) 355s | PRF symkey interface: symkey message-key@0x64028df701a0 (50-bytes, EXTRACT_KEY_FROM_KEY) 355s | nss hmac digest hack extracting all 50 bytes of key@0x64028df701a0 355s | nss hmac digest hack: symkey-key@0x64028df701a0 (50-bytes, EXTRACT_KEY_FROM_KEY) 355s | sizeof bytes 64 355s | wrapper: (SECItemType)-1363068336: ce 6f ca 5d 9b dc 77 7b 30 3d 6d 0c ac 6b 94 c0 ce 6f ca 5d 9b dc 77 7b 30 3d 6d 0c ac 6b 94 c0 ce 6f ca 5d 9b dc 77 7b 30 3d 6d 0c ac 6b 94 c0 55 ca 2c 84 26 a7 b1 0e 89 87 68 84 5e ea 61 2a 355s | nss hmac digest hack extracted len 64 bytes at 0x64028df6fe40 355s | unwrapped: 355s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 355s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 355s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 355s | dd dd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13e60 355s | key-offset: 0, key-size: 16 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 16-bytes 355s | base: base-key@0x64028df6dde0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13df8 355s | PRF symkey interface PRF HMAC_MD5 final-key@0x64028df704e0 (size 16) 355s | PRF symkey interface: key-key@0x64028df704e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | output: symkey-key@0x64028df704e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | RFC 2104: MD5_HMAC test 3 extracting all 16 bytes of key@0x64028df704e0 355s | RFC 2104: MD5_HMAC test 3: symkey-key@0x64028df704e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 355s | sizeof bytes 16 355s | wrapper: (SECItemType)976: 28 87 ba 5f ff b2 d5 08 5c da e7 f8 01 91 45 b9 355s | RFC 2104: MD5_HMAC test 3 extracted len 16 bytes at 0x64028df6fb10 355s | unwrapped: 355s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 355s | verify_bytes() RFC 2104: MD5_HMAC test 3: symkey: ok 355s ipsec algparse: testing HMAC_SHA1: 355s ipsec algparse: CAVP: IKEv2 key derivation with HMAC-SHA1 355s | decode_to_chunk() test_kdf_vector: input "0x32b50d5f4a3763f3" 355s | decode_to_chunk() output: 355s | 32 b5 0d 5f 4a 37 63 f3 2.._J7c. 355s | decode_to_chunk() test_kdf_vector: input "0x9206a04b26564cb1" 355s | decode_to_chunk() output: 355s | 92 06 a0 4b 26 56 4c b1 ...K&VL. 355s | decode_to_chunk() test_kdf_vector: input "0x34c9e7c188868785" 355s | decode_to_chunk() output: 355s | 34 c9 e7 c1 88 86 87 85 4....... 355s | decode_to_chunk() test_kdf_vector: input "0x3ff77d760d2b2199" 355s | decode_to_chunk() output: 355s | 3f f7 7d 76 0d 2b 21 99 ?.}v.+!. 355s | decode_to_chunk() test_kdf_vector: input "0x4b2c1f971981a8ad8d0abeafabf38cf75fc8349c148142465ed9c8b516b8be52" 355s | decode_to_chunk() output: 355s | 4b 2c 1f 97 19 81 a8 ad 8d 0a be af ab f3 8c f7 K,.............. 355s | 5f c8 34 9c 14 81 42 46 5e d9 c8 b5 16 b8 be 52 _.4...BF^......R 355s | decode_to_chunk() test_kdf_vector: input "0x863f3c9d06efd39d2b907b97f8699e5dd5251ef64a2a176f36ee40c87d4f9330" 355s | decode_to_chunk() output: 355s | 86 3f 3c 9d 06 ef d3 9d 2b 90 7b 97 f8 69 9e 5d .?<.....+.{..i.] 355s | d5 25 1e f6 4a 2a 17 6f 36 ee 40 c8 7d 4f 93 30 .%..J*.o6.@.}O.0 355s | decode_to_chunk() test_kdf_vector: input "0xa9a7b222b59f8f48645f28a1db5b5f5d7479cba7" 355s | decode_to_chunk() output: 355s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 355s | 74 79 cb a7 ty.. 355s | decode_to_chunk() test_kdf_vector: input "0x63e81194946ebd05df7df5ebf5d8750056bf1f1d" 355s | decode_to_chunk() output: 355s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 355s | 56 bf 1f 1d V... 355s | decode_to_chunk() test_kdf_vector: input "0xa14293677cc80ff8f9cc0eee30d895da9d8f405666e30ef0dfcb63c634a46002a2a63080e514a062768b76606f9fa5e992204fc5a670bde3f10d6b027113936a5c55b648a194ae587b0088d52204b702c979fa280870d2ed41efa9c549fd11198af1670b143d384bd275c5f594cf266b05ebadca855e4249520a441a81157435a7a56cc4" 355s | decode_to_chunk() output: 355s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 355s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 355s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 355s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 355s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 355s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 355s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 355s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 355s | a7 a5 6c c4 ..l. 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13ef0 355s | key-offset: 0, key-size: 32 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 32-bytes 355s | base: base-key@0x64028df6f4d0 (48-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13e88 355s | NSS_IKE_PRF_DERIVE: 355s | target: NSS_IKE_PRF_PLUS_DERIVE 355s | base: base-key@0x64028df704e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 355s | params: 56-bytes@0x7ffeaec13ef0 355s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0x64028df6f4d0 355s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x64028df6f4d0 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 355s | sizeof bytes 32 355s | wrapper: (SECItemType)538976380: 5e 16 3b 7d ba 3b f6 4d c2 68 c0 82 4c 5c 6b e9 07 ab 23 1d 00 a6 f3 12 7c 29 dd 81 c2 f4 0a 51 355s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0x64028df6fe10 355s | unwrapped: 355s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 355s | 74 79 cb a7 00 00 00 00 00 00 00 00 00 00 00 00 ty.............. 355s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: skeyseed: ok 355s | NSS_IKE_PRF_PLUS_DERIVE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 132-bytes 355s | base: base-key@0x64028df6f4d0 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 355s | params: 40-bytes@0x7ffeaec13e30 355s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 132 bytes of key@0x64028df701a0 355s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x64028df701a0 (132-bytes, EXTRACT_KEY_FROM_KEY) 355s | sizeof bytes 144 355s | wrapper: (SECItemType)538976380: 5e 6d 0b 59 0b 3d ff 71 2d bf 86 a7 41 07 be 18 77 34 41 3e 15 fe 42 ac ed 21 f4 45 eb da 28 42 96 e3 ad 27 56 d4 56 39 37 fa c4 9d 6b ce fc 1f 8f 92 ad 04 ce a4 ac 46 63 68 76 0e 39 71 e2 21 09 a6 01 e3 3d 06 3d e0 fd e0 23 48 d8 48 37 c6 7b 4c 4a 97 8c ba 1b 24 42 e3 08 66 0f 75 ef 6e ac 88 a0 6b 57 93 96 58 7a e8 29 25 a2 b4 fc 57 ad 02 c2 e8 e8 4f 94 c1 dc 2f fd 65 fb 57 77 28 e9 d0 3e c3 23 a5 75 fe 44 78 e6 66 00 0c b4 84 355s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 144 bytes at 0x64028df6f3b0 355s | unwrapped: 355s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 355s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 355s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 355s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 355s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 355s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 355s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 355s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 355s | a7 a5 6c c4 00 00 00 00 00 00 00 00 00 00 00 00 ..l............. 355s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: DKM: ok 355s | key-offset: 0, key-size: 20 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 20-bytes 355s | base: base-key@0x64028df701a0 (132-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13f08 355s | CONCATENATE_DATA_AND_BASE: 355s | target: EXTRACT_KEY_FROM_KEY 355s | base: base-key@0x64028df6c4c0 (16-bytes, AES_KEY_GEN) 355s | params: 16-bytes@0x7ffeaec13ee0 355s | key-offset: 0, key-size: 32 355s | EXTRACT_KEY_FROM_KEY: 355s | target: EXTRACT_KEY_FROM_KEY 355s | key_size: 32-bytes 355s | base: base-key@0x64028df70230 (48-bytes, EXTRACT_KEY_FROM_KEY) 355s | operation: FLAGS_ONLY 355s | params: 8-bytes@0x7ffeaec13e78 355s | NSS_IKE_PRF_DERIVE: 355s | target: NSS_IKE_PRF_PLUS_DERIVE 355s | base: base-key@0x64028df6dde0 (20-bytes, EXTRACT_KEY_FROM_KEY) 355s | params: 56-bytes@0x7ffeaec13ed0 355s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0x64028df70230 355s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x64028df70230 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 355s | sizeof bytes 32 355s | wrapper: (SECItemType)1684353841: c0 d9 6e 06 b4 53 72 a8 22 32 cb ab 5d b6 f2 96 a1 cb 95 4e 3f d6 0e 3c af 2c b2 09 9a d9 63 04 355s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0x64028df6c490 355s | unwrapped: 355s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 355s | 56 bf 1f 1d 00 00 00 00 00 00 00 00 00 00 00 00 V............... 355s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: skeyseed_rekey: ok 355s ipsec algparse: leak detective found no leaks 355s /usr/libexec/ipsec/pluto: adjusting nssdir to /tmp/tmp.UtFFeoa1Ja 355s /usr/libexec/ipsec/pluto: selftest: skipping lock 355s /usr/libexec/ipsec/pluto: selftest: skipping control socket 355s /usr/libexec/ipsec/pluto: selftest: skipping fork 355s Starting Pluto (Libreswan Version 5.2 IKEv2 IKEv1 XFRM XFRMI esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) (NSS-KDF) DNSSEC SYSTEMD_WATCHDOG LABELED_IPSEC (SELINUX) LIBCAP_NG LINUX_AUDIT AUTH_PAM NETWORKMANAGER CURL(non-NSS) LDAP(non-NSS) NFTABLES CAT NFLOG) pid:1539 355s operating system: Linux 6.18.0 [Linux 6.18.0-9-generic #9-Ubuntu SMP PREEMPT_DYNAMIC Mon Jan 12 16:49:02 UTC 2026 x86_64] 355s core dump dir: /run/pluto 355s secrets file: /etc/ipsec.secrets 355s Initializing NSS using read-only database "sql:/tmp/tmp.UtFFeoa1Ja" 355s FIPS Mode: OFF 355s NSS crypto library initialized 355s FIPS mode disabled for pluto daemon 355s FIPS HMAC integrity support [not required] 355s libcap-ng capng_apply failed to apply changes, err=-5. see: man capng_apply 355s libcap-ng support [enabled] 355s Linux audit support [enabled] 355s leak-detective disabled 355s NSS crypto [enabled] 355s XAUTH PAM support [enabled] 355s initializing libevent in pthreads mode: headers: 2.1.12-stable (2010c00); library: 2.1.12-stable (2010c00) 355s NAT-Traversal: keep-alive period 20s 355s ERROR: xfrmi is not supported, failed to create ipsec-interface ipsec1 bound to lo 355s initializing NSS db 355s running pluto selftest 355s ipsec-interface is not working: xfrmi is not supported 355s IPsec Interface [disabled] 355s refreshed session resume keys, issuing key 1 355s Encryption algorithms: 355s AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 355s AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 355s AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 355s 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 355s CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 355s CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 355s AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 355s AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 355s AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 355s AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 355s AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 355s NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 355s NULL [] IKEv1: ESP IKEv2: ESP NULL 355s CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 355s Hash algorithms: 355s MD5 IKEv1: IKE IKEv2: NSS 355s SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 355s SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 355s SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 355s SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 355s IDENTITY IKEv1: IKEv2: FIPS 355s PRF algorithms: 355s HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 355s HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 355s HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 355s HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 355s HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 355s AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 355s Integrity algorithms: 355s HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 355s HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 355s HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 355s HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 355s HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 355s HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 355s AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 355s AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 355s NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 355s DH algorithms: 355s NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 355s MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 355s MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 355s MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 355s MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 355s MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 355s MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 355s DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 355s DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 355s DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 355s DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 355s IPCOMP algorithms: 355s DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 355s LZS IKEv1: IKEv2: ESP AH FIPS 355s LZJH IKEv1: IKEv2: ESP AH FIPS 355s testing CAMELLIA_CBC: 355s Camellia: 16 bytes with 128-bit key 355s Camellia: 16 bytes with 128-bit key 355s Camellia: 16 bytes with 256-bit key 355s Camellia: 16 bytes with 256-bit key 355s testing AES_GCM_16: 355s empty string 355s one block 355s two blocks 355s two blocks with associated data 355s testing AES_CTR: 355s Encrypting 16 octets using AES-CTR with 128-bit key 355s Encrypting 32 octets using AES-CTR with 128-bit key 355s Encrypting 36 octets using AES-CTR with 128-bit key 355s Encrypting 16 octets using AES-CTR with 192-bit key 355s Encrypting 32 octets using AES-CTR with 192-bit key 355s Encrypting 36 octets using AES-CTR with 192-bit key 355s Encrypting 16 octets using AES-CTR with 256-bit key 355s Encrypting 32 octets using AES-CTR with 256-bit key 355s Encrypting 36 octets using AES-CTR with 256-bit key 355s testing AES_CBC: 355s Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 355s Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 355s Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 355s Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 355s testing AES_XCBC: 355s RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 355s RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 355s RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 355s RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 355s RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 355s RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 355s RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 355s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 355s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 355s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 355s testing HMAC_MD5: 355s RFC 2104: MD5_HMAC test 1 355s RFC 2104: MD5_HMAC test 2 355s RFC 2104: MD5_HMAC test 3 355s testing HMAC_SHA1: 355s CAVP: IKEv2 key derivation with HMAC-SHA1 355s selftest: exiting pluto 355s autopkgtest [01:16:00]: test cryptocheck: -----------------------] 356s autopkgtest [01:16:01]: test cryptocheck: - - - - - - - - - - results - - - - - - - - - - 356s cryptocheck PASS 357s autopkgtest [01:16:02]: test cavp: preparing testbed 366s Creating nova instance adt-resolute-amd64-libreswan-20260206-011004-juju-7f2275-prod-proposed-migration-environment-2-08f635ba-cac8-4370-9a32-b2ae71de4d9c from image adt/ubuntu-resolute-amd64-server-20260204.img (UUID fedf54b4-458b-493e-8072-6425c19717b4)... 437s autopkgtest [01:17:22]: testbed dpkg architecture: amd64 437s autopkgtest [01:17:22]: testbed apt version: 3.1.14 438s autopkgtest [01:17:23]: @@@@@@@@@@@@@@@@@@@@ test bed setup 438s autopkgtest [01:17:23]: testbed release detected to be: resolute 438s autopkgtest [01:17:23]: updating testbed package index (apt update) 439s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 439s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 439s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 439s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 439s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1631 kB] 439s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [221 kB] 439s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [5260 B] 439s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [31.4 kB] 439s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 Packages [277 kB] 440s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/main i386 Packages [212 kB] 440s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 c-n-f Metadata [7304 B] 440s Get:12 http://ftpmaster.internal/ubuntu resolute-proposed/restricted amd64 Packages [32.9 kB] 440s Get:13 http://ftpmaster.internal/ubuntu resolute-proposed/restricted i386 Packages [3692 B] 440s Get:14 http://ftpmaster.internal/ubuntu resolute-proposed/restricted amd64 c-n-f Metadata [336 B] 440s Get:15 http://ftpmaster.internal/ubuntu resolute-proposed/universe i386 Packages [569 kB] 440s Get:16 http://ftpmaster.internal/ubuntu resolute-proposed/universe amd64 Packages [1475 kB] 440s Get:17 http://ftpmaster.internal/ubuntu resolute-proposed/universe amd64 c-n-f Metadata [43.2 kB] 440s Get:18 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse i386 Packages [4896 B] 440s Get:19 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse amd64 Packages [27.5 kB] 440s Get:20 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse amd64 c-n-f Metadata [1092 B] 441s Fetched 4667 kB in 2s (2988 kB/s) 441s Reading package lists... 442s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 442s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 442s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 442s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 443s Reading package lists... 443s Reading package lists... 443s Building dependency tree... 443s Reading state information... 443s Calculating upgrade... 443s The following packages will be upgraded: 443s amd64-microcode ca-certificates libdrm-amdgpu1 libdrm-common libdrm2 mawk 443s pollinate python3-linkify-it python3-referencing sed 443s 10 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 443s Need to get 933 kB of archives. 443s After this operation, 0 B of additional disk space will be used. 443s Get:1 http://ftpmaster.internal/ubuntu resolute/main amd64 sed amd64 4.9-2build3 [195 kB] 443s Get:2 http://ftpmaster.internal/ubuntu resolute/main amd64 mawk amd64 1.3.4.20260129-1 [133 kB] 443s Get:3 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 ca-certificates all 20250419build1 [163 kB] 443s Get:4 http://ftpmaster.internal/ubuntu resolute/main amd64 python3-linkify-it all 2.0.3-1ubuntu3 [19.4 kB] 443s Get:5 http://ftpmaster.internal/ubuntu resolute/main amd64 libdrm-common all 2.4.131-1 [9774 B] 443s Get:6 http://ftpmaster.internal/ubuntu resolute/main amd64 libdrm2 amd64 2.4.131-1 [42.3 kB] 443s Get:7 http://ftpmaster.internal/ubuntu resolute/main amd64 libdrm-amdgpu1 amd64 2.4.131-1 [23.2 kB] 443s Get:8 http://ftpmaster.internal/ubuntu resolute/main amd64 pollinate all 4.33-4ubuntu5 [14.0 kB] 443s Get:9 http://ftpmaster.internal/ubuntu resolute/main amd64 python3-referencing all 0.36.2-1ubuntu2 [22.2 kB] 443s Get:10 http://ftpmaster.internal/ubuntu resolute/main amd64 amd64-microcode amd64 3.20250708.1ubuntu2 [310 kB] 443s dpkg-preconfigure: unable to re-open stdin: No such file or directory 443s Fetched 933 kB in 0s (71.5 MB/s) 444s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 444s Preparing to unpack .../sed_4.9-2build3_amd64.deb ... 444s Unpacking sed (4.9-2build3) over (4.9-2build2) ... 444s Setting up sed (4.9-2build3) ... 444s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 444s Preparing to unpack .../0-mawk_1.3.4.20260129-1_amd64.deb ... 444s Unpacking mawk (1.3.4.20260129-1) over (1.3.4.20250131-2) ... 444s Preparing to unpack .../1-ca-certificates_20250419build1_all.deb ... 444s Unpacking ca-certificates (20250419build1) over (20250419) ... 444s Preparing to unpack .../2-python3-linkify-it_2.0.3-1ubuntu3_all.deb ... 444s Unpacking python3-linkify-it (2.0.3-1ubuntu3) over (2.0.3-1ubuntu2) ... 444s Preparing to unpack .../3-libdrm-common_2.4.131-1_all.deb ... 444s Unpacking libdrm-common (2.4.131-1) over (2.4.129-1) ... 444s Preparing to unpack .../4-libdrm2_2.4.131-1_amd64.deb ... 444s Unpacking libdrm2:amd64 (2.4.131-1) over (2.4.129-1) ... 444s Preparing to unpack .../5-libdrm-amdgpu1_2.4.131-1_amd64.deb ... 444s Unpacking libdrm-amdgpu1:amd64 (2.4.131-1) over (2.4.129-1) ... 444s Preparing to unpack .../6-pollinate_4.33-4ubuntu5_all.deb ... 444s Unpacking pollinate (4.33-4ubuntu5) over (4.33-4ubuntu4) ... 444s Preparing to unpack .../7-python3-referencing_0.36.2-1ubuntu2_all.deb ... 444s Unpacking python3-referencing (0.36.2-1ubuntu2) over (0.36.2-1ubuntu1) ... 444s Preparing to unpack .../8-amd64-microcode_3.20250708.1ubuntu2_amd64.deb ... 444s Unpacking amd64-microcode (3.20250708.1ubuntu2) over (3.20250708.1ubuntu1) ... 444s Setting up amd64-microcode (3.20250708.1ubuntu2) ... 444s amd64-microcode: microcode will be updated at next boot 444s Setting up ca-certificates (20250419build1) ... 445s Updating certificates in /etc/ssl/certs... 446s 0 added, 0 removed; done. 446s Setting up pollinate (4.33-4ubuntu5) ... 456s Setting up python3-linkify-it (2.0.3-1ubuntu3) ... 456s Setting up mawk (1.3.4.20260129-1) ... 456s Setting up libdrm-common (2.4.131-1) ... 456s Setting up python3-referencing (0.36.2-1ubuntu2) ... 456s Setting up libdrm2:amd64 (2.4.131-1) ... 456s Setting up libdrm-amdgpu1:amd64 (2.4.131-1) ... 456s Processing triggers for man-db (2.13.1-1) ... 457s Processing triggers for install-info (7.2-5) ... 457s Processing triggers for libc-bin (2.42-2ubuntu4) ... 457s Processing triggers for initramfs-tools (0.150ubuntu7) ... 457s update-initramfs: Generating /boot/initrd.img-6.18.0-9-generic 462s Processing triggers for ca-certificates (20250419build1) ... 462s Updating certificates in /etc/ssl/certs... 462s 0 added, 0 removed; done. 462s Running hooks in /etc/ca-certificates/update.d... 462s done. 462s autopkgtest [01:17:47]: upgrading testbed (apt dist-upgrade and autopurge) 462s Reading package lists... 463s Building dependency tree... 463s Reading state information... 463s Calculating upgrade... 463s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 463s Reading package lists... 463s Building dependency tree... 463s Reading state information... 463s Solving dependencies... 463s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 463s autopkgtest [01:17:48]: rebooting testbed after setup commands that affected boot 494s Reading package lists... 494s Building dependency tree... 494s Reading state information... 495s Solving dependencies... 495s The following NEW packages will be installed: 495s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 495s libnss3-tools libreswan libunbound8 495s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 495s Need to get 2953 kB of archives. 495s After this operation, 11.9 MB of additional disk space will be used. 495s Get:1 http://ftpmaster.internal/ubuntu resolute/main amd64 dns-root-data all 2025080400build1 [6022 B] 495s Get:2 http://ftpmaster.internal/ubuntu resolute/main amd64 libnss3-tools amd64 2:3.120-1 [626 kB] 495s Get:3 http://ftpmaster.internal/ubuntu resolute/main amd64 libevent-pthreads-2.1-7t64 amd64 2.1.12-stable-10build1 [8360 B] 495s Get:4 http://ftpmaster.internal/ubuntu resolute/universe amd64 libldns3t64 amd64 1.8.4-2build1 [173 kB] 495s Get:5 http://ftpmaster.internal/ubuntu resolute/main amd64 libevent-2.1-7t64 amd64 2.1.12-stable-10build1 [155 kB] 495s Get:6 http://ftpmaster.internal/ubuntu resolute/main amd64 libunbound8 amd64 1.24.2-1ubuntu1 [462 kB] 495s Get:7 http://ftpmaster.internal/ubuntu resolute/universe amd64 libreswan amd64 5.2-2.2ubuntu1 [1523 kB] 495s Fetched 2953 kB in 1s (5112 kB/s) 495s Selecting previously unselected package dns-root-data. 496s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 496s Preparing to unpack .../0-dns-root-data_2025080400build1_all.deb ... 496s Unpacking dns-root-data (2025080400build1) ... 496s Selecting previously unselected package libnss3-tools. 496s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_amd64.deb ... 496s Unpacking libnss3-tools (2:3.120-1) ... 496s Selecting previously unselected package libevent-pthreads-2.1-7t64:amd64. 496s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build1_amd64.deb ... 496s Unpacking libevent-pthreads-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 496s Selecting previously unselected package libldns3t64:amd64. 496s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_amd64.deb ... 496s Unpacking libldns3t64:amd64 (1.8.4-2build1) ... 496s Selecting previously unselected package libevent-2.1-7t64:amd64. 496s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build1_amd64.deb ... 496s Unpacking libevent-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 496s Selecting previously unselected package libunbound8:amd64. 496s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_amd64.deb ... 496s Unpacking libunbound8:amd64 (1.24.2-1ubuntu1) ... 496s Selecting previously unselected package libreswan. 496s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_amd64.deb ... 496s Unpacking libreswan (5.2-2.2ubuntu1) ... 496s Setting up libldns3t64:amd64 (1.8.4-2build1) ... 496s Setting up libevent-pthreads-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 496s Setting up libevent-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 496s Setting up dns-root-data (2025080400build1) ... 496s Setting up libunbound8:amd64 (1.24.2-1ubuntu1) ... 496s Setting up libnss3-tools (2:3.120-1) ... 496s Setting up libreswan (5.2-2.2ubuntu1) ... 496s ipsec.service is a disabled or a static unit, not starting it. 496s Processing triggers for man-db (2.13.1-1) ... 497s Processing triggers for libc-bin (2.42-2ubuntu4) ... 586s autopkgtest [01:19:51]: test cavp: [----------------------- 587s Testing installed CAVP binary: /usr/libexec/ipsec/cavp 588s test: IKE v2 588s Reading from ikev2.fax 589s test: IKE v1 Digital Signature Authentication 589s Reading from ikev1_dsa.fax 590s test: IKE v1 Pre-shared Key Authentication 590s Reading from ikev1_psk.fax 592s /tmp/autopkgtest.UkleWV/build.KSu/src 592s autopkgtest [01:19:57]: test cavp: -----------------------] 592s autopkgtest [01:19:57]: test cavp: - - - - - - - - - - results - - - - - - - - - - 592s cavp PASS 592s autopkgtest [01:19:57]: @@@@@@@@@@@@@@@@@@@@ summary 592s opportunistic SKIP exit status 77 and marked as skippable 592s cryptocheck PASS 592s cavp PASS