0s autopkgtest [12:30:10]: starting date and time: 2026-02-06 12:30:10+0000 0s autopkgtest [12:30:10]: git checkout: 4b346b80 nova: make wait_reboot return success even when a no-op 0s autopkgtest [12:30:10]: host juju-7f2275-prod-proposed-migration-environment-20; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.unrh6zho/out --timeout-copy=6000 --needs-internet=try --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:pam --apt-upgrade libreswan --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 --env=ADT_TEST_TRIGGERS=pam/1.7.0-5ubuntu3 -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest-cpu2-ram4-disk20-amd64 --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-20@sto01-19.secgroup --name adt-resolute-amd64-libreswan-20260206-123010-juju-7f2275-prod-proposed-migration-environment-20-b0061ad4-adb4-46b2-ab10-f4b0e2840438 --image adt/ubuntu-resolute-amd64-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-20 --net-id=net_prod-autopkgtest-workers-amd64 -e TERM=linux --mirror=http://ftpmaster.internal/ubuntu/ 4s Creating nova instance adt-resolute-amd64-libreswan-20260206-123010-juju-7f2275-prod-proposed-migration-environment-20-b0061ad4-adb4-46b2-ab10-f4b0e2840438 from image adt/ubuntu-resolute-amd64-server-20260204.img (UUID fedf54b4-458b-493e-8072-6425c19717b4)... 84s autopkgtest [12:31:34]: testbed dpkg architecture: amd64 84s autopkgtest [12:31:34]: testbed apt version: 3.1.14 84s autopkgtest [12:31:34]: @@@@@@@@@@@@@@@@@@@@ test bed setup 85s autopkgtest [12:31:35]: testbed release detected to be: None 85s autopkgtest [12:31:35]: updating testbed package index (apt update) 85s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 85s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 86s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 86s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 86s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [9256 B] 86s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1492 kB] 86s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [30.8 kB] 86s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [194 kB] 86s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 Packages [253 kB] 86s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/main i386 Packages [185 kB] 86s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 c-n-f Metadata [7520 B] 86s Get:12 http://ftpmaster.internal/ubuntu resolute-proposed/restricted amd64 Packages [68.4 kB] 86s Get:13 http://ftpmaster.internal/ubuntu resolute-proposed/restricted i386 Packages [3692 B] 86s Get:14 http://ftpmaster.internal/ubuntu resolute-proposed/restricted amd64 c-n-f Metadata [336 B] 86s Get:15 http://ftpmaster.internal/ubuntu resolute-proposed/universe amd64 Packages [1362 kB] 86s Get:16 http://ftpmaster.internal/ubuntu resolute-proposed/universe i386 Packages [522 kB] 86s Get:17 http://ftpmaster.internal/ubuntu resolute-proposed/universe amd64 c-n-f Metadata [37.6 kB] 86s Get:18 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse i386 Packages [4320 B] 86s Get:19 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse amd64 Packages [26.7 kB] 86s Get:20 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse amd64 c-n-f Metadata [1060 B] 87s Fetched 4323 kB in 1s (4524 kB/s) 87s Reading package lists... 88s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 88s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 88s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 88s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 89s Reading package lists... 89s Reading package lists... 89s Building dependency tree... 89s Reading state information... 89s Calculating upgrade... 89s The following packages will be upgraded: 89s amd64-microcode busybox-initramfs busybox-static dmsetup findutils less 89s libattr1 libdevmapper1.02.1 libdrm-amdgpu1 libdrm-common libdrm2 libgpm2 89s libkeyutils1 libmaxminddb0 libnpth0t64 libpam-modules libpam-modules-bin 89s libpam-runtime libpam0g libsensors-config libsensors5 mawk patch pollinate 89s python3-linkify-it python3-markdown-it python3-referencing sed tar 89s 29 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 89s Need to get 3809 kB of archives. 89s After this operation, 291 kB disk space will be freed. 89s Get:1 http://ftpmaster.internal/ubuntu resolute/main amd64 findutils amd64 4.10.0-3build2 [307 kB] 89s Get:2 http://ftpmaster.internal/ubuntu resolute/main amd64 sed amd64 4.9-2build3 [195 kB] 89s Get:3 http://ftpmaster.internal/ubuntu resolute/main amd64 tar amd64 1.35+dfsg-3.1build2 [257 kB] 89s Get:4 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 libpam-runtime all 1.7.0-5ubuntu3 [149 kB] 89s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 libpam0g amd64 1.7.0-5ubuntu3 [69.9 kB] 89s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 libpam-modules-bin amd64 1.7.0-5ubuntu3 [45.6 kB] 89s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 libpam-modules amd64 1.7.0-5ubuntu3 [193 kB] 89s Get:8 http://ftpmaster.internal/ubuntu resolute/main amd64 libattr1 amd64 1:2.5.2-3build2 [11.4 kB] 89s Get:9 http://ftpmaster.internal/ubuntu resolute/main amd64 mawk amd64 1.3.4.20260129-1 [133 kB] 89s Get:10 http://ftpmaster.internal/ubuntu resolute/main amd64 libdevmapper1.02.1 amd64 2:1.02.205-2ubuntu3 [142 kB] 89s Get:11 http://ftpmaster.internal/ubuntu resolute/main amd64 dmsetup amd64 2:1.02.205-2ubuntu3 [79.4 kB] 89s Get:12 http://ftpmaster.internal/ubuntu resolute/main amd64 less amd64 668-1build1 [172 kB] 89s Get:13 http://ftpmaster.internal/ubuntu resolute/main amd64 libkeyutils1 amd64 1.6.3-6ubuntu3 [10.6 kB] 89s Get:14 http://ftpmaster.internal/ubuntu resolute/main amd64 python3-linkify-it all 2.0.3-1ubuntu3 [19.4 kB] 89s Get:15 http://ftpmaster.internal/ubuntu resolute/main amd64 python3-markdown-it all 3.0.0-3build1 [54.4 kB] 89s Get:16 http://ftpmaster.internal/ubuntu resolute/main amd64 busybox-static amd64 1:1.37.0-7ubuntu1 [1034 kB] 90s Get:17 http://ftpmaster.internal/ubuntu resolute/main amd64 libdrm-common all 2.4.131-1 [9774 B] 90s Get:18 http://ftpmaster.internal/ubuntu resolute/main amd64 libdrm2 amd64 2.4.131-1 [42.3 kB] 90s Get:19 http://ftpmaster.internal/ubuntu resolute/main amd64 libgpm2 amd64 1.20.7-12build1 [14.4 kB] 90s Get:20 http://ftpmaster.internal/ubuntu resolute/main amd64 libmaxminddb0 amd64 1.12.2-1build2 [18.9 kB] 90s Get:21 http://ftpmaster.internal/ubuntu resolute/main amd64 libsensors-config all 1:3.6.2-2build1 [6862 B] 90s Get:22 http://ftpmaster.internal/ubuntu resolute/main amd64 libsensors5 amd64 1:3.6.2-2build1 [28.9 kB] 90s Get:23 http://ftpmaster.internal/ubuntu resolute/main amd64 busybox-initramfs amd64 1:1.37.0-7ubuntu1 [191 kB] 90s Get:24 http://ftpmaster.internal/ubuntu resolute/main amd64 libdrm-amdgpu1 amd64 2.4.131-1 [23.2 kB] 90s Get:25 http://ftpmaster.internal/ubuntu resolute/main amd64 libnpth0t64 amd64 1.8-3build1 [9302 B] 90s Get:26 http://ftpmaster.internal/ubuntu resolute/main amd64 patch amd64 2.8-2build1 [95.7 kB] 90s Get:27 http://ftpmaster.internal/ubuntu resolute/main amd64 pollinate all 4.33-4ubuntu5 [14.0 kB] 90s Get:28 http://ftpmaster.internal/ubuntu resolute/main amd64 python3-referencing all 0.36.2-1ubuntu2 [22.2 kB] 90s Get:29 http://ftpmaster.internal/ubuntu resolute/main amd64 amd64-microcode amd64 3.20251202.1ubuntu1 [459 kB] 90s dpkg-preconfigure: unable to re-open stdin: No such file or directory 90s Fetched 3809 kB in 1s (6922 kB/s) 90s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 90s Preparing to unpack .../findutils_4.10.0-3build2_amd64.deb ... 90s Unpacking findutils (4.10.0-3build2) over (4.10.0-3build1) ... 90s Setting up findutils (4.10.0-3build2) ... 90s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 90s Preparing to unpack .../sed_4.9-2build3_amd64.deb ... 90s Unpacking sed (4.9-2build3) over (4.9-2build2) ... 90s Setting up sed (4.9-2build3) ... 90s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 90s Preparing to unpack .../tar_1.35+dfsg-3.1build2_amd64.deb ... 90s Unpacking tar (1.35+dfsg-3.1build2) over (1.35+dfsg-3.1build1) ... 90s Setting up tar (1.35+dfsg-3.1build2) ... 90s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 90s Preparing to unpack .../libpam-runtime_1.7.0-5ubuntu3_all.deb ... 90s Unpacking libpam-runtime (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 90s Setting up libpam-runtime (1.7.0-5ubuntu3) ... 91s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 91s Preparing to unpack .../libpam0g_1.7.0-5ubuntu3_amd64.deb ... 91s Unpacking libpam0g:amd64 (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 91s Setting up libpam0g:amd64 (1.7.0-5ubuntu3) ... 91s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 91s Preparing to unpack .../libpam-modules-bin_1.7.0-5ubuntu3_amd64.deb ... 91s Unpacking libpam-modules-bin (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 91s Setting up libpam-modules-bin (1.7.0-5ubuntu3) ... 91s pam_namespace.service is a disabled or a static unit not running, not starting it. 91s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 91s Preparing to unpack .../libpam-modules_1.7.0-5ubuntu3_amd64.deb ... 91s Unpacking libpam-modules:amd64 (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 91s Setting up libpam-modules:amd64 (1.7.0-5ubuntu3) ... 91s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 91s Preparing to unpack .../libattr1_1%3a2.5.2-3build2_amd64.deb ... 91s Unpacking libattr1:amd64 (1:2.5.2-3build2) over (1:2.5.2-3build1) ... 91s Setting up libattr1:amd64 (1:2.5.2-3build2) ... 91s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 91s Preparing to unpack .../00-mawk_1.3.4.20260129-1_amd64.deb ... 91s Unpacking mawk (1.3.4.20260129-1) over (1.3.4.20250131-2) ... 91s Preparing to unpack .../01-libdevmapper1.02.1_2%3a1.02.205-2ubuntu3_amd64.deb ... 91s Unpacking libdevmapper1.02.1:amd64 (2:1.02.205-2ubuntu3) over (2:1.02.205-2ubuntu2) ... 91s Preparing to unpack .../02-dmsetup_2%3a1.02.205-2ubuntu3_amd64.deb ... 91s Unpacking dmsetup (2:1.02.205-2ubuntu3) over (2:1.02.205-2ubuntu2) ... 91s Preparing to unpack .../03-less_668-1build1_amd64.deb ... 91s Unpacking less (668-1build1) over (668-1) ... 91s Preparing to unpack .../04-libkeyutils1_1.6.3-6ubuntu3_amd64.deb ... 91s Unpacking libkeyutils1:amd64 (1.6.3-6ubuntu3) over (1.6.3-6ubuntu2) ... 91s Preparing to unpack .../05-python3-linkify-it_2.0.3-1ubuntu3_all.deb ... 91s Unpacking python3-linkify-it (2.0.3-1ubuntu3) over (2.0.3-1ubuntu2) ... 92s Preparing to unpack .../06-python3-markdown-it_3.0.0-3build1_all.deb ... 92s Unpacking python3-markdown-it (3.0.0-3build1) over (3.0.0-3) ... 92s Preparing to unpack .../07-busybox-static_1%3a1.37.0-7ubuntu1_amd64.deb ... 92s Unpacking busybox-static (1:1.37.0-7ubuntu1) over (1:1.37.0-4ubuntu1) ... 92s Preparing to unpack .../08-libdrm-common_2.4.131-1_all.deb ... 92s Unpacking libdrm-common (2.4.131-1) over (2.4.129-1) ... 92s Preparing to unpack .../09-libdrm2_2.4.131-1_amd64.deb ... 92s Unpacking libdrm2:amd64 (2.4.131-1) over (2.4.129-1) ... 92s Preparing to unpack .../10-libgpm2_1.20.7-12build1_amd64.deb ... 92s Unpacking libgpm2:amd64 (1.20.7-12build1) over (1.20.7-12) ... 92s Preparing to unpack .../11-libmaxminddb0_1.12.2-1build2_amd64.deb ... 92s Unpacking libmaxminddb0:amd64 (1.12.2-1build2) over (1.12.2-1build1) ... 92s Preparing to unpack .../12-libsensors-config_1%3a3.6.2-2build1_all.deb ... 92s Unpacking libsensors-config (1:3.6.2-2build1) over (1:3.6.2-2) ... 92s Preparing to unpack .../13-libsensors5_1%3a3.6.2-2build1_amd64.deb ... 92s Unpacking libsensors5:amd64 (1:3.6.2-2build1) over (1:3.6.2-2) ... 92s Preparing to unpack .../14-busybox-initramfs_1%3a1.37.0-7ubuntu1_amd64.deb ... 92s Unpacking busybox-initramfs (1:1.37.0-7ubuntu1) over (1:1.37.0-4ubuntu1) ... 92s Preparing to unpack .../15-libdrm-amdgpu1_2.4.131-1_amd64.deb ... 92s Unpacking libdrm-amdgpu1:amd64 (2.4.131-1) over (2.4.129-1) ... 92s Preparing to unpack .../16-libnpth0t64_1.8-3build1_amd64.deb ... 92s Unpacking libnpth0t64:amd64 (1.8-3build1) over (1.8-3) ... 92s Preparing to unpack .../17-patch_2.8-2build1_amd64.deb ... 92s Unpacking patch (2.8-2build1) over (2.8-2) ... 92s Preparing to unpack .../18-pollinate_4.33-4ubuntu5_all.deb ... 92s Unpacking pollinate (4.33-4ubuntu5) over (4.33-4ubuntu4) ... 92s Preparing to unpack .../19-python3-referencing_0.36.2-1ubuntu2_all.deb ... 92s Unpacking python3-referencing (0.36.2-1ubuntu2) over (0.36.2-1ubuntu1) ... 92s Preparing to unpack .../20-amd64-microcode_3.20251202.1ubuntu1_amd64.deb ... 92s Unpacking amd64-microcode (3.20251202.1ubuntu1) over (3.20250708.1ubuntu1) ... 92s Setting up libnpth0t64:amd64 (1.8-3build1) ... 92s Setting up libkeyutils1:amd64 (1.6.3-6ubuntu3) ... 92s Setting up libgpm2:amd64 (1.20.7-12build1) ... 92s Setting up libmaxminddb0:amd64 (1.12.2-1build2) ... 92s Setting up libsensors-config (1:3.6.2-2build1) ... 92s Setting up less (668-1build1) ... 92s Setting up amd64-microcode (3.20251202.1ubuntu1) ... 92s amd64-microcode: microcode will be updated at next boot 92s Setting up pollinate (4.33-4ubuntu5) ... 103s Setting up busybox-static (1:1.37.0-7ubuntu1) ... 103s Setting up patch (2.8-2build1) ... 103s Setting up libsensors5:amd64 (1:3.6.2-2build1) ... 103s Setting up busybox-initramfs (1:1.37.0-7ubuntu1) ... 103s Setting up libdevmapper1.02.1:amd64 (2:1.02.205-2ubuntu3) ... 103s Setting up dmsetup (2:1.02.205-2ubuntu3) ... 103s Setting up python3-linkify-it (2.0.3-1ubuntu3) ... 103s Setting up mawk (1.3.4.20260129-1) ... 103s Setting up libdrm-common (2.4.131-1) ... 103s Setting up python3-referencing (0.36.2-1ubuntu2) ... 103s Setting up python3-markdown-it (3.0.0-3build1) ... 103s Setting up libdrm2:amd64 (2.4.131-1) ... 103s Setting up libdrm-amdgpu1:amd64 (2.4.131-1) ... 103s Processing triggers for libc-bin (2.42-2ubuntu4) ... 103s Processing triggers for man-db (2.13.1-1) ... 104s Processing triggers for install-info (7.2-5) ... 104s Processing triggers for initramfs-tools (0.150ubuntu7) ... 104s update-initramfs: Generating /boot/initrd.img-6.18.0-9-generic 109s autopkgtest [12:31:59]: upgrading testbed (apt dist-upgrade and autopurge) 109s Reading package lists... 110s Building dependency tree... 110s Reading state information... 110s Calculating upgrade... 110s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 110s Reading package lists... 110s Building dependency tree... 110s Reading state information... 110s Solving dependencies... 110s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 110s autopkgtest [12:32:00]: rebooting testbed after setup commands that affected boot 139s autopkgtest [12:32:29]: testbed running kernel: Linux 6.18.0-9-generic #9-Ubuntu SMP PREEMPT_DYNAMIC Mon Jan 12 16:49:02 UTC 2026 141s autopkgtest [12:32:31]: @@@@@@@@@@@@@@@@@@@@ apt-source libreswan 143s Get:1 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (dsc) [2735 B] 143s Get:2 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (tar) [4132 kB] 143s Get:3 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (asc) [862 B] 143s Get:4 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (diff) [16.7 kB] 143s gpgv: Signature made Thu Jul 31 14:30:12 2025 UTC 143s gpgv: using RSA key 25E3FF2D7F469DBE7D0D4E50AFCFEC8E669CE1C2 143s gpgv: Can't check signature: No public key 143s dpkg-source: warning: cannot verify inline signature for ./libreswan_5.2-2.2ubuntu1.dsc: no acceptable signature found 143s autopkgtest [12:32:33]: testing package libreswan version 5.2-2.2ubuntu1 143s autopkgtest [12:32:33]: build not needed 191s autopkgtest [12:33:21]: test opportunistic: preparing testbed 191s Reading package lists... 191s Building dependency tree... 191s Reading state information... 192s Solving dependencies... 192s The following NEW packages will be installed: 192s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 192s libnss3-tools libreswan libunbound8 192s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 192s Need to get 2953 kB of archives. 192s After this operation, 11.9 MB of additional disk space will be used. 192s Get:1 http://ftpmaster.internal/ubuntu resolute/main amd64 dns-root-data all 2025080400build1 [6022 B] 192s Get:2 http://ftpmaster.internal/ubuntu resolute/main amd64 libnss3-tools amd64 2:3.120-1 [626 kB] 192s Get:3 http://ftpmaster.internal/ubuntu resolute/main amd64 libevent-pthreads-2.1-7t64 amd64 2.1.12-stable-10build1 [8360 B] 192s Get:4 http://ftpmaster.internal/ubuntu resolute/universe amd64 libldns3t64 amd64 1.8.4-2build1 [173 kB] 192s Get:5 http://ftpmaster.internal/ubuntu resolute/main amd64 libevent-2.1-7t64 amd64 2.1.12-stable-10build1 [155 kB] 192s Get:6 http://ftpmaster.internal/ubuntu resolute/main amd64 libunbound8 amd64 1.24.2-1ubuntu1 [462 kB] 192s Get:7 http://ftpmaster.internal/ubuntu resolute/universe amd64 libreswan amd64 5.2-2.2ubuntu1 [1523 kB] 192s Fetched 2953 kB in 0s (11.0 MB/s) 192s Selecting previously unselected package dns-root-data. 192s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83962 files and directories currently installed.) 192s Preparing to unpack .../0-dns-root-data_2025080400build1_all.deb ... 192s Unpacking dns-root-data (2025080400build1) ... 192s Selecting previously unselected package libnss3-tools. 192s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_amd64.deb ... 192s Unpacking libnss3-tools (2:3.120-1) ... 192s Selecting previously unselected package libevent-pthreads-2.1-7t64:amd64. 192s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build1_amd64.deb ... 192s Unpacking libevent-pthreads-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 192s Selecting previously unselected package libldns3t64:amd64. 192s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_amd64.deb ... 192s Unpacking libldns3t64:amd64 (1.8.4-2build1) ... 192s Selecting previously unselected package libevent-2.1-7t64:amd64. 192s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build1_amd64.deb ... 192s Unpacking libevent-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 192s Selecting previously unselected package libunbound8:amd64. 192s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_amd64.deb ... 192s Unpacking libunbound8:amd64 (1.24.2-1ubuntu1) ... 192s Selecting previously unselected package libreswan. 192s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_amd64.deb ... 192s Unpacking libreswan (5.2-2.2ubuntu1) ... 192s Setting up libldns3t64:amd64 (1.8.4-2build1) ... 192s Setting up libevent-pthreads-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 192s Setting up libevent-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 192s Setting up dns-root-data (2025080400build1) ... 192s Setting up libunbound8:amd64 (1.24.2-1ubuntu1) ... 192s Setting up libnss3-tools (2:3.120-1) ... 192s Setting up libreswan (5.2-2.2ubuntu1) ... 193s ipsec.service is a disabled or a static unit, not starting it. 193s Processing triggers for man-db (2.13.1-1) ... 194s Processing triggers for libc-bin (2.42-2ubuntu4) ... 194s autopkgtest [12:33:24]: test opportunistic: [----------------------- 195s ping: oe.libreswan.org: No address associated with hostname 195s autopkgtest [12:33:25]: test opportunistic: -----------------------] 195s opportunistic SKIP exit status 77 and marked as skippable 195s autopkgtest [12:33:25]: test opportunistic: - - - - - - - - - - results - - - - - - - - - - 196s autopkgtest [12:33:26]: test cryptocheck: preparing testbed 216s Creating nova instance adt-resolute-amd64-libreswan-20260206-123010-juju-7f2275-prod-proposed-migration-environment-20-b0061ad4-adb4-46b2-ab10-f4b0e2840438 from image adt/ubuntu-resolute-amd64-server-20260204.img (UUID fedf54b4-458b-493e-8072-6425c19717b4)... 291s autopkgtest [12:35:01]: testbed dpkg architecture: amd64 291s autopkgtest [12:35:01]: testbed apt version: 3.1.14 291s autopkgtest [12:35:01]: @@@@@@@@@@@@@@@@@@@@ test bed setup 291s autopkgtest [12:35:01]: testbed release detected to be: resolute 292s autopkgtest [12:35:02]: updating testbed package index (apt update) 292s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 292s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 292s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 292s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 292s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [9256 B] 292s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [30.8 kB] 292s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [194 kB] 292s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1492 kB] 293s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 Packages [253 kB] 293s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/main i386 Packages [185 kB] 293s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 c-n-f Metadata [7520 B] 293s Get:12 http://ftpmaster.internal/ubuntu resolute-proposed/restricted amd64 Packages [68.4 kB] 293s Get:13 http://ftpmaster.internal/ubuntu resolute-proposed/restricted i386 Packages [3692 B] 293s Get:14 http://ftpmaster.internal/ubuntu resolute-proposed/restricted amd64 c-n-f Metadata [336 B] 293s Get:15 http://ftpmaster.internal/ubuntu resolute-proposed/universe amd64 Packages [1362 kB] 293s Get:16 http://ftpmaster.internal/ubuntu resolute-proposed/universe i386 Packages [522 kB] 293s Get:17 http://ftpmaster.internal/ubuntu resolute-proposed/universe amd64 c-n-f Metadata [37.6 kB] 293s Get:18 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse amd64 Packages [26.7 kB] 293s Get:19 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse i386 Packages [4320 B] 293s Get:20 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse amd64 c-n-f Metadata [1060 B] 294s Fetched 4323 kB in 1s (4370 kB/s) 294s Reading package lists... 295s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 295s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 295s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 295s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 296s Reading package lists... 296s Reading package lists... 296s Building dependency tree... 296s Reading state information... 296s Calculating upgrade... 296s The following packages will be upgraded: 296s amd64-microcode busybox-initramfs busybox-static dmsetup findutils less 296s libattr1 libdevmapper1.02.1 libdrm-amdgpu1 libdrm-common libdrm2 libgpm2 296s libkeyutils1 libmaxminddb0 libnpth0t64 libpam-modules libpam-modules-bin 296s libpam-runtime libpam0g libsensors-config libsensors5 mawk patch pollinate 296s python3-linkify-it python3-markdown-it python3-referencing sed tar 296s 29 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 296s Need to get 3809 kB of archives. 296s After this operation, 291 kB disk space will be freed. 296s Get:1 http://ftpmaster.internal/ubuntu resolute/main amd64 findutils amd64 4.10.0-3build2 [307 kB] 296s Get:2 http://ftpmaster.internal/ubuntu resolute/main amd64 sed amd64 4.9-2build3 [195 kB] 296s Get:3 http://ftpmaster.internal/ubuntu resolute/main amd64 tar amd64 1.35+dfsg-3.1build2 [257 kB] 296s Get:4 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 libpam-runtime all 1.7.0-5ubuntu3 [149 kB] 296s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 libpam0g amd64 1.7.0-5ubuntu3 [69.9 kB] 296s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 libpam-modules-bin amd64 1.7.0-5ubuntu3 [45.6 kB] 296s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 libpam-modules amd64 1.7.0-5ubuntu3 [193 kB] 296s Get:8 http://ftpmaster.internal/ubuntu resolute/main amd64 libattr1 amd64 1:2.5.2-3build2 [11.4 kB] 296s Get:9 http://ftpmaster.internal/ubuntu resolute/main amd64 mawk amd64 1.3.4.20260129-1 [133 kB] 296s Get:10 http://ftpmaster.internal/ubuntu resolute/main amd64 libdevmapper1.02.1 amd64 2:1.02.205-2ubuntu3 [142 kB] 296s Get:11 http://ftpmaster.internal/ubuntu resolute/main amd64 dmsetup amd64 2:1.02.205-2ubuntu3 [79.4 kB] 296s Get:12 http://ftpmaster.internal/ubuntu resolute/main amd64 less amd64 668-1build1 [172 kB] 296s Get:13 http://ftpmaster.internal/ubuntu resolute/main amd64 libkeyutils1 amd64 1.6.3-6ubuntu3 [10.6 kB] 296s Get:14 http://ftpmaster.internal/ubuntu resolute/main amd64 python3-linkify-it all 2.0.3-1ubuntu3 [19.4 kB] 296s Get:15 http://ftpmaster.internal/ubuntu resolute/main amd64 python3-markdown-it all 3.0.0-3build1 [54.4 kB] 296s Get:16 http://ftpmaster.internal/ubuntu resolute/main amd64 busybox-static amd64 1:1.37.0-7ubuntu1 [1034 kB] 296s Get:17 http://ftpmaster.internal/ubuntu resolute/main amd64 libdrm-common all 2.4.131-1 [9774 B] 296s Get:18 http://ftpmaster.internal/ubuntu resolute/main amd64 libdrm2 amd64 2.4.131-1 [42.3 kB] 296s Get:19 http://ftpmaster.internal/ubuntu resolute/main amd64 libgpm2 amd64 1.20.7-12build1 [14.4 kB] 296s Get:20 http://ftpmaster.internal/ubuntu resolute/main amd64 libmaxminddb0 amd64 1.12.2-1build2 [18.9 kB] 296s Get:21 http://ftpmaster.internal/ubuntu resolute/main amd64 libsensors-config all 1:3.6.2-2build1 [6862 B] 296s Get:22 http://ftpmaster.internal/ubuntu resolute/main amd64 libsensors5 amd64 1:3.6.2-2build1 [28.9 kB] 296s Get:23 http://ftpmaster.internal/ubuntu resolute/main amd64 busybox-initramfs amd64 1:1.37.0-7ubuntu1 [191 kB] 296s Get:24 http://ftpmaster.internal/ubuntu resolute/main amd64 libdrm-amdgpu1 amd64 2.4.131-1 [23.2 kB] 296s Get:25 http://ftpmaster.internal/ubuntu resolute/main amd64 libnpth0t64 amd64 1.8-3build1 [9302 B] 296s Get:26 http://ftpmaster.internal/ubuntu resolute/main amd64 patch amd64 2.8-2build1 [95.7 kB] 296s Get:27 http://ftpmaster.internal/ubuntu resolute/main amd64 pollinate all 4.33-4ubuntu5 [14.0 kB] 296s Get:28 http://ftpmaster.internal/ubuntu resolute/main amd64 python3-referencing all 0.36.2-1ubuntu2 [22.2 kB] 296s Get:29 http://ftpmaster.internal/ubuntu resolute/main amd64 amd64-microcode amd64 3.20251202.1ubuntu1 [459 kB] 296s dpkg-preconfigure: unable to re-open stdin: No such file or directory 297s Fetched 3809 kB in 0s (52.6 MB/s) 297s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 297s Preparing to unpack .../findutils_4.10.0-3build2_amd64.deb ... 297s Unpacking findutils (4.10.0-3build2) over (4.10.0-3build1) ... 297s Setting up findutils (4.10.0-3build2) ... 297s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 297s Preparing to unpack .../sed_4.9-2build3_amd64.deb ... 297s Unpacking sed (4.9-2build3) over (4.9-2build2) ... 297s Setting up sed (4.9-2build3) ... 297s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 297s Preparing to unpack .../tar_1.35+dfsg-3.1build2_amd64.deb ... 297s Unpacking tar (1.35+dfsg-3.1build2) over (1.35+dfsg-3.1build1) ... 297s Setting up tar (1.35+dfsg-3.1build2) ... 297s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 297s Preparing to unpack .../libpam-runtime_1.7.0-5ubuntu3_all.deb ... 297s Unpacking libpam-runtime (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 297s Setting up libpam-runtime (1.7.0-5ubuntu3) ... 297s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 297s Preparing to unpack .../libpam0g_1.7.0-5ubuntu3_amd64.deb ... 297s Unpacking libpam0g:amd64 (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 297s Setting up libpam0g:amd64 (1.7.0-5ubuntu3) ... 297s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 297s Preparing to unpack .../libpam-modules-bin_1.7.0-5ubuntu3_amd64.deb ... 297s Unpacking libpam-modules-bin (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 298s Setting up libpam-modules-bin (1.7.0-5ubuntu3) ... 298s pam_namespace.service is a disabled or a static unit not running, not starting it. 298s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 298s Preparing to unpack .../libpam-modules_1.7.0-5ubuntu3_amd64.deb ... 298s Unpacking libpam-modules:amd64 (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 298s Setting up libpam-modules:amd64 (1.7.0-5ubuntu3) ... 298s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 298s Preparing to unpack .../libattr1_1%3a2.5.2-3build2_amd64.deb ... 298s Unpacking libattr1:amd64 (1:2.5.2-3build2) over (1:2.5.2-3build1) ... 298s Setting up libattr1:amd64 (1:2.5.2-3build2) ... 298s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 298s Preparing to unpack .../00-mawk_1.3.4.20260129-1_amd64.deb ... 298s Unpacking mawk (1.3.4.20260129-1) over (1.3.4.20250131-2) ... 298s Preparing to unpack .../01-libdevmapper1.02.1_2%3a1.02.205-2ubuntu3_amd64.deb ... 298s Unpacking libdevmapper1.02.1:amd64 (2:1.02.205-2ubuntu3) over (2:1.02.205-2ubuntu2) ... 298s Preparing to unpack .../02-dmsetup_2%3a1.02.205-2ubuntu3_amd64.deb ... 298s Unpacking dmsetup (2:1.02.205-2ubuntu3) over (2:1.02.205-2ubuntu2) ... 298s Preparing to unpack .../03-less_668-1build1_amd64.deb ... 298s Unpacking less (668-1build1) over (668-1) ... 298s Preparing to unpack .../04-libkeyutils1_1.6.3-6ubuntu3_amd64.deb ... 298s Unpacking libkeyutils1:amd64 (1.6.3-6ubuntu3) over (1.6.3-6ubuntu2) ... 298s Preparing to unpack .../05-python3-linkify-it_2.0.3-1ubuntu3_all.deb ... 298s Unpacking python3-linkify-it (2.0.3-1ubuntu3) over (2.0.3-1ubuntu2) ... 298s Preparing to unpack .../06-python3-markdown-it_3.0.0-3build1_all.deb ... 298s Unpacking python3-markdown-it (3.0.0-3build1) over (3.0.0-3) ... 299s Preparing to unpack .../07-busybox-static_1%3a1.37.0-7ubuntu1_amd64.deb ... 299s Unpacking busybox-static (1:1.37.0-7ubuntu1) over (1:1.37.0-4ubuntu1) ... 299s Preparing to unpack .../08-libdrm-common_2.4.131-1_all.deb ... 299s Unpacking libdrm-common (2.4.131-1) over (2.4.129-1) ... 299s Preparing to unpack .../09-libdrm2_2.4.131-1_amd64.deb ... 299s Unpacking libdrm2:amd64 (2.4.131-1) over (2.4.129-1) ... 299s Preparing to unpack .../10-libgpm2_1.20.7-12build1_amd64.deb ... 299s Unpacking libgpm2:amd64 (1.20.7-12build1) over (1.20.7-12) ... 299s Preparing to unpack .../11-libmaxminddb0_1.12.2-1build2_amd64.deb ... 299s Unpacking libmaxminddb0:amd64 (1.12.2-1build2) over (1.12.2-1build1) ... 299s Preparing to unpack .../12-libsensors-config_1%3a3.6.2-2build1_all.deb ... 299s Unpacking libsensors-config (1:3.6.2-2build1) over (1:3.6.2-2) ... 299s Preparing to unpack .../13-libsensors5_1%3a3.6.2-2build1_amd64.deb ... 299s Unpacking libsensors5:amd64 (1:3.6.2-2build1) over (1:3.6.2-2) ... 299s Preparing to unpack .../14-busybox-initramfs_1%3a1.37.0-7ubuntu1_amd64.deb ... 299s Unpacking busybox-initramfs (1:1.37.0-7ubuntu1) over (1:1.37.0-4ubuntu1) ... 299s Preparing to unpack .../15-libdrm-amdgpu1_2.4.131-1_amd64.deb ... 299s Unpacking libdrm-amdgpu1:amd64 (2.4.131-1) over (2.4.129-1) ... 299s Preparing to unpack .../16-libnpth0t64_1.8-3build1_amd64.deb ... 299s Unpacking libnpth0t64:amd64 (1.8-3build1) over (1.8-3) ... 299s Preparing to unpack .../17-patch_2.8-2build1_amd64.deb ... 299s Unpacking patch (2.8-2build1) over (2.8-2) ... 299s Preparing to unpack .../18-pollinate_4.33-4ubuntu5_all.deb ... 299s Unpacking pollinate (4.33-4ubuntu5) over (4.33-4ubuntu4) ... 299s Preparing to unpack .../19-python3-referencing_0.36.2-1ubuntu2_all.deb ... 299s Unpacking python3-referencing (0.36.2-1ubuntu2) over (0.36.2-1ubuntu1) ... 299s Preparing to unpack .../20-amd64-microcode_3.20251202.1ubuntu1_amd64.deb ... 299s Unpacking amd64-microcode (3.20251202.1ubuntu1) over (3.20250708.1ubuntu1) ... 299s Setting up libnpth0t64:amd64 (1.8-3build1) ... 299s Setting up libkeyutils1:amd64 (1.6.3-6ubuntu3) ... 299s Setting up libgpm2:amd64 (1.20.7-12build1) ... 299s Setting up libmaxminddb0:amd64 (1.12.2-1build2) ... 299s Setting up libsensors-config (1:3.6.2-2build1) ... 299s Setting up less (668-1build1) ... 299s Setting up amd64-microcode (3.20251202.1ubuntu1) ... 299s amd64-microcode: microcode will be updated at next boot 299s Setting up pollinate (4.33-4ubuntu5) ... 310s Setting up busybox-static (1:1.37.0-7ubuntu1) ... 310s Setting up patch (2.8-2build1) ... 310s Setting up libsensors5:amd64 (1:3.6.2-2build1) ... 310s Setting up busybox-initramfs (1:1.37.0-7ubuntu1) ... 310s Setting up libdevmapper1.02.1:amd64 (2:1.02.205-2ubuntu3) ... 310s Setting up dmsetup (2:1.02.205-2ubuntu3) ... 310s Setting up python3-linkify-it (2.0.3-1ubuntu3) ... 310s Setting up mawk (1.3.4.20260129-1) ... 310s Setting up libdrm-common (2.4.131-1) ... 310s Setting up python3-referencing (0.36.2-1ubuntu2) ... 310s Setting up python3-markdown-it (3.0.0-3build1) ... 310s Setting up libdrm2:amd64 (2.4.131-1) ... 310s Setting up libdrm-amdgpu1:amd64 (2.4.131-1) ... 310s Processing triggers for libc-bin (2.42-2ubuntu4) ... 310s Processing triggers for man-db (2.13.1-1) ... 311s Processing triggers for install-info (7.2-5) ... 311s Processing triggers for initramfs-tools (0.150ubuntu7) ... 311s update-initramfs: Generating /boot/initrd.img-6.18.0-9-generic 316s autopkgtest [12:35:26]: upgrading testbed (apt dist-upgrade and autopurge) 316s Reading package lists... 316s Building dependency tree... 316s Reading state information... 316s Calculating upgrade... 316s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 317s Reading package lists... 317s Building dependency tree... 317s Reading state information... 317s Solving dependencies... 317s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 317s autopkgtest [12:35:27]: rebooting testbed after setup commands that affected boot 349s Reading package lists... 349s Building dependency tree... 349s Reading state information... 349s Solving dependencies... 349s The following NEW packages will be installed: 349s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 349s libnss3-tools libreswan libunbound8 349s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 349s Need to get 2953 kB of archives. 349s After this operation, 11.9 MB of additional disk space will be used. 349s Get:1 http://ftpmaster.internal/ubuntu resolute/main amd64 dns-root-data all 2025080400build1 [6022 B] 349s Get:2 http://ftpmaster.internal/ubuntu resolute/main amd64 libnss3-tools amd64 2:3.120-1 [626 kB] 350s Get:3 http://ftpmaster.internal/ubuntu resolute/main amd64 libevent-pthreads-2.1-7t64 amd64 2.1.12-stable-10build1 [8360 B] 350s Get:4 http://ftpmaster.internal/ubuntu resolute/universe amd64 libldns3t64 amd64 1.8.4-2build1 [173 kB] 350s Get:5 http://ftpmaster.internal/ubuntu resolute/main amd64 libevent-2.1-7t64 amd64 2.1.12-stable-10build1 [155 kB] 350s Get:6 http://ftpmaster.internal/ubuntu resolute/main amd64 libunbound8 amd64 1.24.2-1ubuntu1 [462 kB] 350s Get:7 http://ftpmaster.internal/ubuntu resolute/universe amd64 libreswan amd64 5.2-2.2ubuntu1 [1523 kB] 350s Fetched 2953 kB in 0s (13.0 MB/s) 350s Selecting previously unselected package dns-root-data. 350s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83962 files and directories currently installed.) 350s Preparing to unpack .../0-dns-root-data_2025080400build1_all.deb ... 350s Unpacking dns-root-data (2025080400build1) ... 350s Selecting previously unselected package libnss3-tools. 350s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_amd64.deb ... 350s Unpacking libnss3-tools (2:3.120-1) ... 350s Selecting previously unselected package libevent-pthreads-2.1-7t64:amd64. 350s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build1_amd64.deb ... 350s Unpacking libevent-pthreads-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 350s Selecting previously unselected package libldns3t64:amd64. 350s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_amd64.deb ... 350s Unpacking libldns3t64:amd64 (1.8.4-2build1) ... 350s Selecting previously unselected package libevent-2.1-7t64:amd64. 350s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build1_amd64.deb ... 350s Unpacking libevent-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 350s Selecting previously unselected package libunbound8:amd64. 350s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_amd64.deb ... 350s Unpacking libunbound8:amd64 (1.24.2-1ubuntu1) ... 350s Selecting previously unselected package libreswan. 350s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_amd64.deb ... 350s Unpacking libreswan (5.2-2.2ubuntu1) ... 350s Setting up libldns3t64:amd64 (1.8.4-2build1) ... 350s Setting up libevent-pthreads-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 350s Setting up libevent-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 350s Setting up dns-root-data (2025080400build1) ... 350s Setting up libunbound8:amd64 (1.24.2-1ubuntu1) ... 350s Setting up libnss3-tools (2:3.120-1) ... 350s Setting up libreswan (5.2-2.2ubuntu1) ... 350s ipsec.service is a disabled or a static unit, not starting it. 350s Processing triggers for man-db (2.13.1-1) ... 351s Processing triggers for libc-bin (2.42-2ubuntu4) ... 388s autopkgtest [12:36:38]: test cryptocheck: [----------------------- 388s Testing installed binary: /usr/libexec/ipsec/algparse 388s Testing installed binary: /usr/libexec/ipsec/pluto 388s testing -tp 388s algparse -v2 'esp' (expect SUCCESS) 388s AES_GCM_16_256-NONE 388s AES_GCM_16_128-NONE 388s CHACHA20_POLY1305-NONE 388s AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 388s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 388s algparse -v2 'esp=' (expect ERROR) 388s ERROR: ESP proposal is empty 388s algparse -v2 'esp=aes' (expect SUCCESS) 388s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 388s algparse -v2 'esp=aes;modp2048' (expect SUCCESS) 388s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 388s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 388s AES_CBC-HMAC_SHA1_96 388s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 388s AES_CBC-HMAC_SHA1_96 388s algparse -v2 'esp=aes-sha1-modp2048' (expect SUCCESS) 388s AES_CBC-HMAC_SHA1_96 388s algparse -v2 'esp=aes-128-sha1' (expect SUCCESS) 388s AES_CBC_128-HMAC_SHA1_96 388s algparse -v2 'esp=aes-128-sha1' (expect SUCCESS) 388s AES_CBC_128-HMAC_SHA1_96 388s algparse -v2 'esp=aes-128-sha1-modp2048' (expect SUCCESS) 388s AES_CBC_128-HMAC_SHA1_96 388s algparse -v2 'esp=aes-128' (expect SUCCESS) 388s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 388s algparse -v2 'esp=aes_gcm_a-128-null' (expect SUCCESS) 388s AES_GCM_8_128-NONE 388s algparse -v2 'esp=3des-sha1;modp1024' (expect ERROR) 388s ERROR: ESP DH algorithm 'modp1024' is not supported 388s algparse -v2 'esp=3des-sha1;modp1536' (expect SUCCESS) 388s 3DES_CBC-HMAC_SHA1_96 388s algparse -v2 'esp=3des-sha1;modp2048' (expect SUCCESS) 388s 3DES_CBC-HMAC_SHA1_96 388s algparse -v2 'esp=3des-sha1;dh21' (expect SUCCESS) 388s 3DES_CBC-HMAC_SHA1_96 388s algparse -v2 'esp=3des-sha1;ecp_521' (expect SUCCESS) 388s 3DES_CBC-HMAC_SHA1_96 388s algparse -v2 'esp=3des-sha1;dh23' (expect ERROR) 388s ERROR: ESP DH algorithm 'dh23' is not supported 388s algparse -v2 'esp=3des-sha1;dh24' (expect ERROR) 388s ERROR: ESP DH algorithm 'dh24' is not supported 388s algparse -v2 'esp=3des-sha1' (expect SUCCESS) 388s 3DES_CBC-HMAC_SHA1_96 388s algparse -v2 'esp=null-sha1' (expect SUCCESS) 388s NULL-HMAC_SHA1_96 388s algparse -v2 'esp=aes_cbc' (expect SUCCESS) 388s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 388s algparse -v2 'esp=aes-sha' (expect SUCCESS) 388s AES_CBC-HMAC_SHA1_96 388s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 388s AES_CBC-HMAC_SHA1_96 388s algparse -v2 'esp=aes128-sha1' (expect SUCCESS) 388s AES_CBC_128-HMAC_SHA1_96 388s algparse -v2 'esp=aes-sha2' (expect SUCCESS) 388s AES_CBC-HMAC_SHA2_256_128 388s algparse -v2 'esp=aes-sha256' (expect SUCCESS) 388s AES_CBC-HMAC_SHA2_256_128 388s algparse -v2 'esp=aes-sha384' (expect SUCCESS) 388s AES_CBC-HMAC_SHA2_384_192 388s algparse -v2 'esp=aes-sha512' (expect SUCCESS) 388s AES_CBC-HMAC_SHA2_512_256 388s algparse -v2 'esp=aes128-aes_xcbc' (expect SUCCESS) 388s AES_CBC_128-AES_XCBC_96 388s algparse -v2 'esp=aes192-sha1' (expect SUCCESS) 388s AES_CBC_192-HMAC_SHA1_96 388s algparse -v2 'esp=aes256-sha1' (expect SUCCESS) 388s AES_CBC_256-HMAC_SHA1_96 388s algparse -v2 'esp=aes256-sha' (expect SUCCESS) 388s AES_CBC_256-HMAC_SHA1_96 388s algparse -v2 'esp=aes256-sha2' (expect SUCCESS) 388s AES_CBC_256-HMAC_SHA2_256_128 388s algparse -v2 'esp=aes256-sha2_256' (expect SUCCESS) 388s AES_CBC_256-HMAC_SHA2_256_128 388s algparse -v2 'esp=aes256-sha2_384' (expect SUCCESS) 388s AES_CBC_256-HMAC_SHA2_384_192 388s algparse -v2 'esp=aes256-sha2_512' (expect SUCCESS) 388s AES_CBC_256-HMAC_SHA2_512_256 388s algparse -v2 'esp=camellia' (expect SUCCESS) 388s CAMELLIA_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 388s algparse -v2 'esp=camellia128' (expect SUCCESS) 388s CAMELLIA_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 388s algparse -v2 'esp=camellia192' (expect SUCCESS) 388s CAMELLIA_CBC_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 388s algparse -v2 'esp=camellia256' (expect SUCCESS) 388s CAMELLIA_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 388s algparse -v2 'esp=aes_ccm' (expect SUCCESS) 388s AES_CCM_16-NONE 388s algparse -v2 'esp=aes_ccm_a-128-null' (expect SUCCESS) 388s AES_CCM_8_128-NONE 388s algparse -v2 'esp=aes_ccm_a-192-null' (expect SUCCESS) 388s AES_CCM_8_192-NONE 388s algparse -v2 'esp=aes_ccm_a-256-null' (expect SUCCESS) 388s AES_CCM_8_256-NONE 388s algparse -v2 'esp=aes_ccm_b-128-null' (expect SUCCESS) 388s AES_CCM_12_128-NONE 388s algparse -v2 'esp=aes_ccm_b-192-null' (expect SUCCESS) 388s AES_CCM_12_192-NONE 388s algparse -v2 'esp=aes_ccm_b-256-null' (expect SUCCESS) 388s AES_CCM_12_256-NONE 388s algparse -v2 'esp=aes_ccm_c-128-null' (expect SUCCESS) 388s AES_CCM_16_128-NONE 388s algparse -v2 'esp=aes_ccm_c-192-null' (expect SUCCESS) 388s AES_CCM_16_192-NONE 388s algparse -v2 'esp=aes_ccm_c-256-null' (expect SUCCESS) 388s AES_CCM_16_256-NONE 388s algparse -v2 'esp=aes_gcm' (expect SUCCESS) 388s AES_GCM_16-NONE 388s algparse -v2 'esp=aes_gcm_a-128-null' (expect SUCCESS) 388s AES_GCM_8_128-NONE 388s algparse -v2 'esp=aes_gcm_a-192-null' (expect SUCCESS) 388s AES_GCM_8_192-NONE 388s algparse -v2 'esp=aes_gcm_a-256-null' (expect SUCCESS) 388s AES_GCM_8_256-NONE 388s algparse -v2 'esp=aes_gcm_b-128-null' (expect SUCCESS) 388s AES_GCM_12_128-NONE 388s algparse -v2 'esp=aes_gcm_b-192-null' (expect SUCCESS) 388s AES_GCM_12_192-NONE 388s algparse -v2 'esp=aes_gcm_b-256-null' (expect SUCCESS) 388s AES_GCM_12_256-NONE 388s algparse -v2 'esp=aes_gcm_c-128-null' (expect SUCCESS) 388s AES_GCM_16_128-NONE 388s algparse -v2 'esp=aes_gcm_c-192-null' (expect SUCCESS) 388s AES_GCM_16_192-NONE 388s algparse -v2 'esp=aes_gcm_c-256-null' (expect SUCCESS) 388s AES_GCM_16_256-NONE 388s algparse -v2 'esp=aes_ccm_a-null' (expect SUCCESS) 388s AES_CCM_8-NONE 388s algparse -v2 'esp=aes_ccm_b-null' (expect SUCCESS) 388s AES_CCM_12-NONE 388s algparse -v2 'esp=aes_ccm_c-null' (expect SUCCESS) 388s AES_CCM_16-NONE 388s algparse -v2 'esp=aes_gcm_a-null' (expect SUCCESS) 388s AES_GCM_8-NONE 388s algparse -v2 'esp=aes_gcm_b-null' (expect SUCCESS) 388s AES_GCM_12-NONE 388s algparse -v2 'esp=aes_gcm_c-null' (expect SUCCESS) 388s AES_GCM_16-NONE 388s algparse -v2 'esp=aes_ccm-null' (expect SUCCESS) 388s AES_CCM_16-NONE 388s algparse -v2 'esp=aes_gcm-null' (expect SUCCESS) 388s AES_GCM_16-NONE 388s algparse -v2 'esp=aes_ccm-256-null' (expect SUCCESS) 388s AES_CCM_16_256-NONE 388s algparse -v2 'esp=aes_gcm-192-null' (expect SUCCESS) 388s AES_GCM_16_192-NONE 388s algparse -v2 'esp=aes_ccm_256-null' (expect SUCCESS) 388s AES_CCM_16_256-NONE 388s algparse -v2 'esp=aes_gcm_192-null' (expect SUCCESS) 388s AES_GCM_16_192-NONE 388s algparse -v2 'esp=aes_ccm_8-null' (expect SUCCESS) 388s AES_CCM_8-NONE 388s algparse -v2 'esp=aes_ccm_12-null' (expect SUCCESS) 388s AES_CCM_12-NONE 388s algparse -v2 'esp=aes_ccm_16-null' (expect SUCCESS) 388s AES_CCM_16-NONE 388s algparse -v2 'esp=aes_gcm_8-null' (expect SUCCESS) 388s AES_GCM_8-NONE 388s algparse -v2 'esp=aes_gcm_12-null' (expect SUCCESS) 388s AES_GCM_12-NONE 388s algparse -v2 'esp=aes_gcm_16-null' (expect SUCCESS) 388s AES_GCM_16-NONE 388s algparse -v2 'esp=aes_ccm_8-128-null' (expect SUCCESS) 388s AES_CCM_8_128-NONE 388s algparse -v2 'esp=aes_ccm_12-192-null' (expect SUCCESS) 388s AES_CCM_12_192-NONE 388s algparse -v2 'esp=aes_ccm_16-256-null' (expect SUCCESS) 388s AES_CCM_16_256-NONE 388s algparse -v2 'esp=aes_gcm_8-128-null' (expect SUCCESS) 388s AES_GCM_8_128-NONE 388s algparse -v2 'esp=aes_gcm_12-192-null' (expect SUCCESS) 388s AES_GCM_12_192-NONE 388s algparse -v2 'esp=aes_gcm_16-256-null' (expect SUCCESS) 388s AES_GCM_16_256-NONE 388s algparse -v2 'esp=aes_ccm_8_128-null' (expect SUCCESS) 388s AES_CCM_8_128-NONE 388s algparse -v2 'esp=aes_ccm_12_192-null' (expect SUCCESS) 388s AES_CCM_12_192-NONE 388s algparse -v2 'esp=aes_ccm_16_256-null' (expect SUCCESS) 388s AES_CCM_16_256-NONE 388s algparse -v2 'esp=aes_gcm_8_128-null' (expect SUCCESS) 388s AES_GCM_8_128-NONE 388s algparse -v2 'esp=aes_gcm_12_192-null' (expect SUCCESS) 388s AES_GCM_12_192-NONE 388s algparse -v2 'esp=aes_gcm_16_256-null' (expect SUCCESS) 388s AES_GCM_16_256-NONE 388s algparse -v2 'esp=aes_ctr' (expect SUCCESS) 388s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 388s algparse -v2 'esp=aesctr' (expect SUCCESS) 388s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 388s algparse -v2 'esp=aes_ctr128' (expect SUCCESS) 388s AES_CTR_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 388s algparse -v2 'esp=aes_ctr192' (expect SUCCESS) 388s AES_CTR_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 388s algparse -v2 'esp=aes_ctr256' (expect SUCCESS) 388s AES_CTR_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 388s algparse -v2 'esp=camellia_cbc_256-hmac_sha2_512_256;modp8192' (expect SUCCESS) 388s CAMELLIA_CBC_256-HMAC_SHA2_512_256 388s algparse -v2 'esp=null_auth_aes_gmac_256-null;modp8192' (expect SUCCESS) 388s NULL_AUTH_AES_GMAC_256-NONE 388s algparse -v2 'esp=3des-sha1;modp8192' (expect SUCCESS) 388s 3DES_CBC-HMAC_SHA1_96 388s algparse -v2 'esp=3des-sha1-modp8192' (expect SUCCESS) 388s 3DES_CBC-HMAC_SHA1_96 388s algparse -v2 'esp=aes-sha1,3des-sha1;modp8192' (expect SUCCESS) 388s AES_CBC-HMAC_SHA1_96 388s 3DES_CBC-HMAC_SHA1_96 388s algparse -v2 'esp=aes-sha1-modp8192,3des-sha1-modp8192' (expect SUCCESS) 388s AES_CBC-HMAC_SHA1_96 388s 3DES_CBC-HMAC_SHA1_96 388s algparse -v2 'esp=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' (expect SUCCESS) 388s AES_CBC-HMAC_SHA1_96 388s algparse -v2 'esp=aes;none' (expect SUCCESS) 388s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 388s algparse -v2 'esp=aes;none,aes' (expect SUCCESS) 388s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 388s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 388s algparse -v2 'esp=aes;none,aes;modp2048' (expect SUCCESS) 388s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 388s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 388s algparse -v2 'esp=aes-sha1-none' (expect SUCCESS) 388s AES_CBC-HMAC_SHA1_96 388s algparse -v2 'esp=aes-sha1;none' (expect SUCCESS) 388s AES_CBC-HMAC_SHA1_96 388s algparse -v2 'esp=3des168-sha1' (expect ERROR) 388s ERROR: ESP encryption algorithm 3DES_CBC does not allow a key lengths 388s algparse -v2 'esp=3des-null' (expect ERROR) 388s ERROR: non-AEAD ESP encryption algorithm 3DES_CBC cannot have 'NONE' as the integrity algorithm 388s algparse -v2 'esp=aes128-null' (expect ERROR) 388s ERROR: non-AEAD ESP encryption algorithm AES_CBC cannot have 'NONE' as the integrity algorithm 388s algparse -v2 'esp=aes224-sha1' (expect ERROR) 388s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 388s algparse -v2 'esp=aes-224-sha1' (expect ERROR) 388s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 388s algparse -v2 'esp=aes0-sha1' (expect ERROR) 388s ERROR: ESP encryption key length is zero 388s algparse -v2 'esp=aes-0-sha1' (expect ERROR) 388s ERROR: ESP encryption key length is zero 388s algparse -v2 'esp=aes512-sha1' (expect ERROR) 388s ERROR: ESP encryption algorithm AES_CBC with key length 512 invalid; valid key lengths: 128, 192, 256 388s algparse -v2 'esp=aes-sha1555' (expect ERROR) 388s ERROR: ESP integrity algorithm 'sha1555' is not recognized 388s algparse -v2 'esp=camellia666-sha1' (expect ERROR) 388s ERROR: ESP encryption algorithm CAMELLIA_CBC with key length 666 invalid; valid key lengths: 128, 192, 256 388s algparse -v2 'esp=blowfish' (expect ERROR) 388s ERROR: ESP encryption algorithm 'blowfish' is not supported 388s algparse -v2 'esp=des-sha1' (expect ERROR) 388s ERROR: ESP encryption algorithm 'des' is not supported 388s algparse -v2 'esp=aes_ctr666' (expect ERROR) 388s ERROR: ESP encryption algorithm AES_CTR with key length 666 invalid; valid key lengths: 128, 192, 256 388s algparse -v2 'esp=aes128-sha2_128' (expect ERROR) 388s ERROR: ESP integrity algorithm 'sha2_128' is not recognized 388s algparse -v2 'esp=aes256-sha2_256-4096' (expect ERROR) 388s ERROR: ESP DH algorithm '4096' is not recognized 388s algparse -v2 'esp=aes256-sha2_256-128' (expect ERROR) 388s ERROR: ESP DH algorithm '128' is not recognized 388s algparse -v2 'esp=vanitycipher' (expect ERROR) 388s ERROR: ESP encryption algorithm 'vanitycipher' is not recognized 388s algparse -v2 'esp=ase-sah' (expect ERROR) 388s ERROR: ESP encryption algorithm 'ase' is not recognized 388s algparse -v2 'esp=aes-sah1' (expect ERROR) 388s ERROR: ESP integrity algorithm 'sah1' is not recognized 388s algparse -v2 'esp=id3' (expect ERROR) 388s ERROR: ESP encryption algorithm 'id3' is not recognized 388s algparse -v2 'esp=aes-id3' (expect ERROR) 388s ERROR: ESP integrity algorithm 'id3' is not recognized 388s algparse -v2 'esp=aes_gcm-md5' (expect ERROR) 388s ERROR: AEAD ESP encryption algorithm AES_GCM_16 must have 'NONE' as the integrity algorithm 388s algparse -v2 'esp=mars' (expect ERROR) 388s ERROR: ESP encryption algorithm 'mars' is not supported 388s algparse -v2 'esp=aes_gcm-16' (expect ERROR) 388s ERROR: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 388s algparse -v2 'esp=aes_gcm-0' (expect ERROR) 388s ERROR: ESP encryption key length is zero 388s algparse -v2 'esp=aes_gcm-123456789012345' (expect ERROR) 388s ERROR: ESP encryption algorithm 'aes_gcm-123456789012345' key length WAY too big 388s algparse -v2 'esp=3des-sha1;dh22' (expect ERROR) 388s ERROR: ESP DH algorithm 'dh22' is not supported 388s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2' (expect SUCCESS) 388s 3DES_CBC-HMAC_SHA1_96 388s 3DES_CBC-HMAC_SHA2_256_128 388s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2' (expect SUCCESS) 388s 3DES_CBC-HMAC_SHA1_96 388s 3DES_CBC-HMAC_SHA2_256_128 388s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2-modp8192' (expect SUCCESS) 388s 3DES_CBC-HMAC_SHA1_96 388s 3DES_CBC-HMAC_SHA2_256_128 388s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2;modp8192' (expect SUCCESS) 388s 3DES_CBC-HMAC_SHA1_96 388s 3DES_CBC-HMAC_SHA2_256_128 388s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2-modp8192' (expect SUCCESS) 388s 3DES_CBC-HMAC_SHA1_96 388s 3DES_CBC-HMAC_SHA2_256_128 388s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2;modp8192' (expect SUCCESS) 388s 3DES_CBC-HMAC_SHA1_96 388s 3DES_CBC-HMAC_SHA2_256_128 388s ipsec algparse: Encryption algorithms: 388s ipsec algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 388s ipsec algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 388s ipsec algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 388s ipsec algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 388s ipsec algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 388s ipsec algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 388s ipsec algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 388s ipsec algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 388s ipsec algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 388s ipsec algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 388s ipsec algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 388s ipsec algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 388s ipsec algparse: NULL [] IKEv1: ESP IKEv2: ESP NULL 388s ipsec algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 388s ipsec algparse: Hash algorithms: 388s ipsec algparse: MD5 IKEv1: IKE IKEv2: NSS 388s ipsec algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 388s ipsec algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 388s ipsec algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 388s ipsec algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 388s ipsec algparse: IDENTITY IKEv1: IKEv2: FIPS 388s ipsec algparse: PRF algorithms: 388s ipsec algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 388s ipsec algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 388s ipsec algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 388s ipsec algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 388s ipsec algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 388s ipsec algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 388s ipsec algparse: Integrity algorithms: 388s ipsec algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 388s ipsec algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 388s ipsec algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 388s ipsec algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 388s ipsec algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 388s ipsec algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 388s ipsec algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 388s ipsec algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 388s ipsec algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 388s ipsec algparse: DH algorithms: 388s ipsec algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 388s ipsec algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 388s ipsec algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 388s ipsec algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 388s ipsec algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 388s ipsec algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 388s ipsec algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 388s ipsec algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 388s ipsec algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 388s ipsec algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 388s ipsec algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 388s ipsec algparse: IPCOMP algorithms: 388s ipsec algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 388s ipsec algparse: LZS IKEv1: IKEv2: ESP AH FIPS 388s ipsec algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 388s | parsing 'AES_GCM_16_256,AES_GCM_16_128,CHACHA20_POLY1305,AES_CBC_256,AES_CBC_128' for ESP 388s | proposal: 'AES_GCM_16_256' 388s | token: '' '' "AES_GCM_16_256" '' 388s | token: '' "AES_GCM_16_256" '' '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_256' is not recognized 388s | token: '' '' '' 388s | appending ESP encryption algorithm AES_GCM_16[_256] 388s | appending ESP integrity algorithm NONE[_0] 388s | proposal: 'AES_GCM_16_128' 388s | token: '' '' "AES_GCM_16_128" '' 388s | token: '' "AES_GCM_16_128" '' '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_128' is not recognized 388s | token: '' '' '' 388s | appending ESP encryption algorithm AES_GCM_16[_128] 388s | appending ESP integrity algorithm NONE[_0] 388s | proposal: 'CHACHA20_POLY1305' 388s | token: '' '' "CHACHA20_POLY1305" '' 388s | token: '' "CHACHA20_POLY1305" '' '' 388s | token: '' '' '' 388s | appending ESP encryption algorithm CHACHA20_POLY1305[_0] 388s | appending ESP integrity algorithm NONE[_0] 388s | proposal: 'AES_CBC_256' 388s | token: '' '' "AES_CBC_256" '' 388s | token: '' "AES_CBC_256" '' '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_256' is not recognized 388s | token: '' '' '' 388s | appending ESP encryption algorithm AES_CBC[_256] 388s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 388s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 388s | proposal: 'AES_CBC_128' 388s | token: '' '' "AES_CBC_128" '' 388s | token: '' "AES_CBC_128" '' '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_128' is not recognized 388s | token: '' '' '' 388s | appending ESP encryption algorithm AES_CBC[_128] 388s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 388s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 388s | parsing '' for ESP 388s | parsing 'aes' for ESP 388s | proposal: 'aes' 388s | token: '' '' "aes" '' 388s | token: '' "aes" '' '' 388s | token: '' '' '' 388s | appending ESP encryption algorithm AES_CBC[_0] 388s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 388s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 388s | parsing 'aes;modp2048' for ESP 388s | proposal: 'aes;modp2048' 388s | token: '' '' "aes" ';' 388s | token: '' "aes" ';' "modp2048" '' 388s | token: ';' "modp2048" '' '' 388s | appending ESP encryption algorithm AES_CBC[_0] 388s | parsing dh: 388s | appending ESP DH algorithm MODP2048[_0] 388s | token: '' '' '' 388s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 388s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 388s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 388s | parsing 'aes-sha1' for ESP 388s | proposal: 'aes-sha1' 388s | token: '' '' "aes" '-' 388s | token: '' "aes" '-' "sha1" '' 388s | token: '-' "sha1" '' '' 388s | appending ESP encryption algorithm AES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: '' '' '' 388s | parsing 'aes-sha1' for ESP 388s | proposal: 'aes-sha1' 388s | token: '' '' "aes" '-' 388s | token: '' "aes" '-' "sha1" '' 388s | token: '-' "sha1" '' '' 388s | appending ESP encryption algorithm AES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: '' '' '' 388s | parsing 'aes-sha1-modp2048' for ESP 388s | proposal: 'aes-sha1-modp2048' 388s | token: '' '' "aes" '-' 388s | token: '' "aes" '-' "sha1" '-' 388s | token: '-' "sha1" '-' "modp2048" '' 388s | appending ESP encryption algorithm AES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: '-' "modp2048" '' '' 388s | parsing dh: 388s | appending ESP DH algorithm MODP2048[_0] 388s | token: '' '' '' 388s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 388s | parsing 'aes-128-sha1' for ESP 388s | proposal: 'aes-128-sha1' 388s | token: '' '' "aes" '-' 388s | token: '' "aes" '-' "128" '-' 388s | token: '-' "128" '-' "sha1" '' 388s | token: '-' "sha1" '' '' 388s | appending ESP encryption algorithm AES_CBC[_128] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: '' '' '' 388s | parsing 'aes-128-sha1' for ESP 388s | proposal: 'aes-128-sha1' 388s | token: '' '' "aes" '-' 388s | token: '' "aes" '-' "128" '-' 388s | token: '-' "128" '-' "sha1" '' 388s | token: '-' "sha1" '' '' 388s | appending ESP encryption algorithm AES_CBC[_128] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: '' '' '' 388s | parsing 'aes-128-sha1-modp2048' for ESP 388s | proposal: 'aes-128-sha1-modp2048' 388s | token: '' '' "aes" '-' 388s | token: '' "aes" '-' "128" '-' 388s | token: '-' "128" '-' "sha1" '-' 388s | token: '-' "sha1" '-' "modp2048" '' 388s | appending ESP encryption algorithm AES_CBC[_128] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: '-' "modp2048" '' '' 388s | parsing dh: 388s | appending ESP DH algorithm MODP2048[_0] 388s | token: '' '' '' 388s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 388s | parsing 'aes-128' for ESP 388s | proposal: 'aes-128' 388s | token: '' '' "aes" '-' 388s | token: '' "aes" '-' "128" '' 388s | token: '-' "128" '' '' 388s | token: '' '' '' 388s | appending ESP encryption algorithm AES_CBC[_128] 388s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 388s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 388s | parsing 'aes_gcm_a-128-null' for ESP 388s | proposal: 'aes_gcm_a-128-null' 388s | token: '' '' "aes_gcm_a" '-' 388s | token: '' "aes_gcm_a" '-' "128" '-' 388s | token: '-' "128" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_GCM_8[_128] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing '3des-sha1;modp1024' for ESP 388s | proposal: '3des-sha1;modp1024' 388s | token: '' '' "3des" '-' 388s | token: '' "3des" '-' "sha1" ';' 388s | token: '-' "sha1" ';' "modp1024" '' 388s | appending ESP encryption algorithm 3DES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: ';' "modp1024" '' '' 388s | parsing dh: 388s | ike_alg_byname() failed: ESP DH algorithm 'modp1024' is not supported 388s | lookup for DH algorithm 'modp1024' failed 388s | ... failed 'ESP DH algorithm 'modp1024' is not supported' 388s | parsing '3des-sha1;modp1536' for ESP 388s | proposal: '3des-sha1;modp1536' 388s | token: '' '' "3des" '-' 388s | token: '' "3des" '-' "sha1" ';' 388s | token: '-' "sha1" ';' "modp1536" '' 388s | appending ESP encryption algorithm 3DES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: ';' "modp1536" '' '' 388s | parsing dh: 388s | appending ESP DH algorithm MODP1536[_0] 388s | token: '' '' '' 388s ipsec algparse: ignoring ESP DH algorithm MODP1536 as PFS policy is disabled 388s | parsing '3des-sha1;modp2048' for ESP 388s | proposal: '3des-sha1;modp2048' 388s | token: '' '' "3des" '-' 388s | token: '' "3des" '-' "sha1" ';' 388s | token: '-' "sha1" ';' "modp2048" '' 388s | appending ESP encryption algorithm 3DES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: ';' "modp2048" '' '' 388s | parsing dh: 388s | appending ESP DH algorithm MODP2048[_0] 388s | token: '' '' '' 388s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 388s | parsing '3des-sha1;dh21' for ESP 388s | proposal: '3des-sha1;dh21' 388s | token: '' '' "3des" '-' 388s | token: '' "3des" '-' "sha1" ';' 388s | token: '-' "sha1" ';' "dh21" '' 388s | appending ESP encryption algorithm 3DES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: ';' "dh21" '' '' 388s | parsing dh: 388s | appending ESP DH algorithm DH21[_0] 388s | token: '' '' '' 388s ipsec algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 388s | parsing '3des-sha1;ecp_521' for ESP 388s | proposal: '3des-sha1;ecp_521' 388s | token: '' '' "3des" '-' 388s | token: '' "3des" '-' "sha1" ';' 388s | token: '-' "sha1" ';' "ecp_521" '' 388s | appending ESP encryption algorithm 3DES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: ';' "ecp_521" '' '' 388s | parsing dh: 388s | appending ESP DH algorithm DH21[_0] 388s | token: '' '' '' 388s ipsec algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 388s | parsing '3des-sha1;dh23' for ESP 388s | proposal: '3des-sha1;dh23' 388s | token: '' '' "3des" '-' 388s | token: '' "3des" '-' "sha1" ';' 388s | token: '-' "sha1" ';' "dh23" '' 388s | appending ESP encryption algorithm 3DES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: ';' "dh23" '' '' 388s | parsing dh: 388s | ike_alg_byname() failed: ESP DH algorithm 'dh23' is not supported 388s | lookup for DH algorithm 'dh23' failed 388s | ... failed 'ESP DH algorithm 'dh23' is not supported' 388s | parsing '3des-sha1;dh24' for ESP 388s | proposal: '3des-sha1;dh24' 388s | token: '' '' "3des" '-' 388s | token: '' "3des" '-' "sha1" ';' 388s | token: '-' "sha1" ';' "dh24" '' 388s | appending ESP encryption algorithm 3DES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: ';' "dh24" '' '' 388s | parsing dh: 388s | ike_alg_byname() failed: ESP DH algorithm 'dh24' is not supported 388s | lookup for DH algorithm 'dh24' failed 388s | ... failed 'ESP DH algorithm 'dh24' is not supported' 388s | parsing '3des-sha1' for ESP 388s | proposal: '3des-sha1' 388s | token: '' '' "3des" '-' 388s | token: '' "3des" '-' "sha1" '' 388s | token: '-' "sha1" '' '' 388s | appending ESP encryption algorithm 3DES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: '' '' '' 388s | parsing 'null-sha1' for ESP 388s | proposal: 'null-sha1' 388s | token: '' '' "null" '-' 388s | token: '' "null" '-' "sha1" '' 388s | token: '-' "sha1" '' '' 388s | appending ESP encryption algorithm NULL[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: '' '' '' 388s | parsing 'aes_cbc' for ESP 388s | proposal: 'aes_cbc' 388s | token: '' '' "aes_cbc" '' 388s | token: '' "aes_cbc" '' '' 388s | token: '' '' '' 388s | appending ESP encryption algorithm AES_CBC[_0] 388s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 388s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 388s | parsing 'aes-sha' for ESP 388s | proposal: 'aes-sha' 388s | token: '' '' "aes" '-' 388s | token: '' "aes" '-' "sha" '' 388s | token: '-' "sha" '' '' 388s | appending ESP encryption algorithm AES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: '' '' '' 388s | parsing 'aes-sha1' for ESP 388s | proposal: 'aes-sha1' 388s | token: '' '' "aes" '-' 388s | token: '' "aes" '-' "sha1" '' 388s | token: '-' "sha1" '' '' 388s | appending ESP encryption algorithm AES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: '' '' '' 388s | parsing 'aes128-sha1' for ESP 388s | proposal: 'aes128-sha1' 388s | token: '' '' "aes128" '-' 388s | token: '' "aes128" '-' "sha1" '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 388s | token: '-' "sha1" '' '' 388s | appending ESP encryption algorithm AES_CBC[_128] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: '' '' '' 388s | parsing 'aes-sha2' for ESP 388s | proposal: 'aes-sha2' 388s | token: '' '' "aes" '-' 388s | token: '' "aes" '-' "sha2" '' 388s | token: '-' "sha2" '' '' 388s | appending ESP encryption algorithm AES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 388s | token: '' '' '' 388s | parsing 'aes-sha256' for ESP 388s | proposal: 'aes-sha256' 388s | token: '' '' "aes" '-' 388s | token: '' "aes" '-' "sha256" '' 388s | token: '-' "sha256" '' '' 388s | appending ESP encryption algorithm AES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 388s | token: '' '' '' 388s | parsing 'aes-sha384' for ESP 388s | proposal: 'aes-sha384' 388s | token: '' '' "aes" '-' 388s | token: '' "aes" '-' "sha384" '' 388s | token: '-' "sha384" '' '' 388s | appending ESP encryption algorithm AES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 388s | token: '' '' '' 388s | parsing 'aes-sha512' for ESP 388s | proposal: 'aes-sha512' 388s | token: '' '' "aes" '-' 388s | token: '' "aes" '-' "sha512" '' 388s | token: '-' "sha512" '' '' 388s | appending ESP encryption algorithm AES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 388s | token: '' '' '' 388s | parsing 'aes128-aes_xcbc' for ESP 388s | proposal: 'aes128-aes_xcbc' 388s | token: '' '' "aes128" '-' 388s | token: '' "aes128" '-' "aes_xcbc" '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 388s | token: '-' "aes_xcbc" '' '' 388s | appending ESP encryption algorithm AES_CBC[_128] 388s | parsing integ: 388s | appending ESP integrity algorithm AES_XCBC_96[_0] 388s | token: '' '' '' 388s | parsing 'aes192-sha1' for ESP 388s | proposal: 'aes192-sha1' 388s | token: '' '' "aes192" '-' 388s | token: '' "aes192" '-' "sha1" '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'aes192' is not recognized 388s | token: '-' "sha1" '' '' 388s | appending ESP encryption algorithm AES_CBC[_192] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: '' '' '' 388s | parsing 'aes256-sha1' for ESP 388s | proposal: 'aes256-sha1' 388s | token: '' '' "aes256" '-' 388s | token: '' "aes256" '-' "sha1" '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 388s | token: '-' "sha1" '' '' 388s | appending ESP encryption algorithm AES_CBC[_256] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: '' '' '' 388s | parsing 'aes256-sha' for ESP 388s | proposal: 'aes256-sha' 388s | token: '' '' "aes256" '-' 388s | token: '' "aes256" '-' "sha" '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 388s | token: '-' "sha" '' '' 388s | appending ESP encryption algorithm AES_CBC[_256] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: '' '' '' 388s | parsing 'aes256-sha2' for ESP 388s | proposal: 'aes256-sha2' 388s | token: '' '' "aes256" '-' 388s | token: '' "aes256" '-' "sha2" '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 388s | token: '-' "sha2" '' '' 388s | appending ESP encryption algorithm AES_CBC[_256] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 388s | token: '' '' '' 388s | parsing 'aes256-sha2_256' for ESP 388s | proposal: 'aes256-sha2_256' 388s | token: '' '' "aes256" '-' 388s | token: '' "aes256" '-' "sha2_256" '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 388s | token: '-' "sha2_256" '' '' 388s | appending ESP encryption algorithm AES_CBC[_256] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 388s | token: '' '' '' 388s | parsing 'aes256-sha2_384' for ESP 388s | proposal: 'aes256-sha2_384' 388s | token: '' '' "aes256" '-' 388s | token: '' "aes256" '-' "sha2_384" '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 388s | token: '-' "sha2_384" '' '' 388s | appending ESP encryption algorithm AES_CBC[_256] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 388s | token: '' '' '' 388s | parsing 'aes256-sha2_512' for ESP 388s | proposal: 'aes256-sha2_512' 388s | token: '' '' "aes256" '-' 388s | token: '' "aes256" '-' "sha2_512" '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 388s | token: '-' "sha2_512" '' '' 388s | appending ESP encryption algorithm AES_CBC[_256] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 388s | token: '' '' '' 388s | parsing 'camellia' for ESP 388s | proposal: 'camellia' 388s | token: '' '' "camellia" '' 388s | token: '' "camellia" '' '' 388s | token: '' '' '' 388s | appending ESP encryption algorithm CAMELLIA_CBC[_0] 388s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 388s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 388s | parsing 'camellia128' for ESP 388s | proposal: 'camellia128' 388s | token: '' '' "camellia128" '' 388s | token: '' "camellia128" '' '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'camellia128' is not recognized 388s | token: '' '' '' 388s | appending ESP encryption algorithm CAMELLIA_CBC[_128] 388s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 388s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 388s | parsing 'camellia192' for ESP 388s | proposal: 'camellia192' 388s | token: '' '' "camellia192" '' 388s | token: '' "camellia192" '' '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'camellia192' is not recognized 388s | token: '' '' '' 388s | appending ESP encryption algorithm CAMELLIA_CBC[_192] 388s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 388s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 388s | parsing 'camellia256' for ESP 388s | proposal: 'camellia256' 388s | token: '' '' "camellia256" '' 388s | token: '' "camellia256" '' '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'camellia256' is not recognized 388s | token: '' '' '' 388s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 388s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 388s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 388s | parsing 'aes_ccm' for ESP 388s | proposal: 'aes_ccm' 388s | token: '' '' "aes_ccm" '' 388s | token: '' "aes_ccm" '' '' 388s | token: '' '' '' 388s | appending ESP encryption algorithm AES_CCM_16[_0] 388s | appending ESP integrity algorithm NONE[_0] 388s | parsing 'aes_ccm_a-128-null' for ESP 388s | proposal: 'aes_ccm_a-128-null' 388s | token: '' '' "aes_ccm_a" '-' 388s | token: '' "aes_ccm_a" '-' "128" '-' 388s | token: '-' "128" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_CCM_8[_128] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_ccm_a-192-null' for ESP 388s | proposal: 'aes_ccm_a-192-null' 388s | token: '' '' "aes_ccm_a" '-' 388s | token: '' "aes_ccm_a" '-' "192" '-' 388s | token: '-' "192" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_CCM_8[_192] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_ccm_a-256-null' for ESP 388s | proposal: 'aes_ccm_a-256-null' 388s | token: '' '' "aes_ccm_a" '-' 388s | token: '' "aes_ccm_a" '-' "256" '-' 388s | token: '-' "256" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_CCM_8[_256] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_ccm_b-128-null' for ESP 388s | proposal: 'aes_ccm_b-128-null' 388s | token: '' '' "aes_ccm_b" '-' 388s | token: '' "aes_ccm_b" '-' "128" '-' 388s | token: '-' "128" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_CCM_12[_128] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_ccm_b-192-null' for ESP 388s | proposal: 'aes_ccm_b-192-null' 388s | token: '' '' "aes_ccm_b" '-' 388s | token: '' "aes_ccm_b" '-' "192" '-' 388s | token: '-' "192" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_CCM_12[_192] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_ccm_b-256-null' for ESP 388s | proposal: 'aes_ccm_b-256-null' 388s | token: '' '' "aes_ccm_b" '-' 388s | token: '' "aes_ccm_b" '-' "256" '-' 388s | token: '-' "256" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_CCM_12[_256] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_ccm_c-128-null' for ESP 388s | proposal: 'aes_ccm_c-128-null' 388s | token: '' '' "aes_ccm_c" '-' 388s | token: '' "aes_ccm_c" '-' "128" '-' 388s | token: '-' "128" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_CCM_16[_128] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_ccm_c-192-null' for ESP 388s | proposal: 'aes_ccm_c-192-null' 388s | token: '' '' "aes_ccm_c" '-' 388s | token: '' "aes_ccm_c" '-' "192" '-' 388s | token: '-' "192" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_CCM_16[_192] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_ccm_c-256-null' for ESP 388s | proposal: 'aes_ccm_c-256-null' 388s | token: '' '' "aes_ccm_c" '-' 388s | token: '' "aes_ccm_c" '-' "256" '-' 388s | token: '-' "256" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_CCM_16[_256] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_gcm' for ESP 388s | proposal: 'aes_gcm' 388s | token: '' '' "aes_gcm" '' 388s | token: '' "aes_gcm" '' '' 388s | token: '' '' '' 388s | appending ESP encryption algorithm AES_GCM_16[_0] 388s | appending ESP integrity algorithm NONE[_0] 388s | parsing 'aes_gcm_a-128-null' for ESP 388s | proposal: 'aes_gcm_a-128-null' 388s | token: '' '' "aes_gcm_a" '-' 388s | token: '' "aes_gcm_a" '-' "128" '-' 388s | token: '-' "128" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_GCM_8[_128] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_gcm_a-192-null' for ESP 388s | proposal: 'aes_gcm_a-192-null' 388s | token: '' '' "aes_gcm_a" '-' 388s | token: '' "aes_gcm_a" '-' "192" '-' 388s | token: '-' "192" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_GCM_8[_192] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_gcm_a-256-null' for ESP 388s | proposal: 'aes_gcm_a-256-null' 388s | token: '' '' "aes_gcm_a" '-' 388s | token: '' "aes_gcm_a" '-' "256" '-' 388s | token: '-' "256" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_GCM_8[_256] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_gcm_b-128-null' for ESP 388s | proposal: 'aes_gcm_b-128-null' 388s | token: '' '' "aes_gcm_b" '-' 388s | token: '' "aes_gcm_b" '-' "128" '-' 388s | token: '-' "128" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_GCM_12[_128] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_gcm_b-192-null' for ESP 388s | proposal: 'aes_gcm_b-192-null' 388s | token: '' '' "aes_gcm_b" '-' 388s | token: '' "aes_gcm_b" '-' "192" '-' 388s | token: '-' "192" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_GCM_12[_192] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_gcm_b-256-null' for ESP 388s | proposal: 'aes_gcm_b-256-null' 388s | token: '' '' "aes_gcm_b" '-' 388s | token: '' "aes_gcm_b" '-' "256" '-' 388s | token: '-' "256" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_GCM_12[_256] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_gcm_c-128-null' for ESP 388s | proposal: 'aes_gcm_c-128-null' 388s | token: '' '' "aes_gcm_c" '-' 388s | token: '' "aes_gcm_c" '-' "128" '-' 388s | token: '-' "128" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_GCM_16[_128] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_gcm_c-192-null' for ESP 388s | proposal: 'aes_gcm_c-192-null' 388s | token: '' '' "aes_gcm_c" '-' 388s | token: '' "aes_gcm_c" '-' "192" '-' 388s | token: '-' "192" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_GCM_16[_192] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_gcm_c-256-null' for ESP 388s | proposal: 'aes_gcm_c-256-null' 388s | token: '' '' "aes_gcm_c" '-' 388s | token: '' "aes_gcm_c" '-' "256" '-' 388s | token: '-' "256" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_GCM_16[_256] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_ccm_a-null' for ESP 388s | proposal: 'aes_ccm_a-null' 388s | token: '' '' "aes_ccm_a" '-' 388s | token: '' "aes_ccm_a" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_CCM_8[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_ccm_b-null' for ESP 388s | proposal: 'aes_ccm_b-null' 388s | token: '' '' "aes_ccm_b" '-' 388s | token: '' "aes_ccm_b" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_CCM_12[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_ccm_c-null' for ESP 388s | proposal: 'aes_ccm_c-null' 388s | token: '' '' "aes_ccm_c" '-' 388s | token: '' "aes_ccm_c" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_CCM_16[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_gcm_a-null' for ESP 388s | proposal: 'aes_gcm_a-null' 388s | token: '' '' "aes_gcm_a" '-' 388s | token: '' "aes_gcm_a" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_GCM_8[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_gcm_b-null' for ESP 388s | proposal: 'aes_gcm_b-null' 388s | token: '' '' "aes_gcm_b" '-' 388s | token: '' "aes_gcm_b" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_GCM_12[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_gcm_c-null' for ESP 388s | proposal: 'aes_gcm_c-null' 388s | token: '' '' "aes_gcm_c" '-' 388s | token: '' "aes_gcm_c" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_GCM_16[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_ccm-null' for ESP 388s | proposal: 'aes_ccm-null' 388s | token: '' '' "aes_ccm" '-' 388s | token: '' "aes_ccm" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_CCM_16[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_gcm-null' for ESP 388s | proposal: 'aes_gcm-null' 388s | token: '' '' "aes_gcm" '-' 388s | token: '' "aes_gcm" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_GCM_16[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_ccm-256-null' for ESP 388s | proposal: 'aes_ccm-256-null' 388s | token: '' '' "aes_ccm" '-' 388s | token: '' "aes_ccm" '-' "256" '-' 388s | token: '-' "256" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_CCM_16[_256] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_gcm-192-null' for ESP 388s | proposal: 'aes_gcm-192-null' 388s | token: '' '' "aes_gcm" '-' 388s | token: '' "aes_gcm" '-' "192" '-' 388s | token: '-' "192" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_GCM_16[_192] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_ccm_256-null' for ESP 388s | proposal: 'aes_ccm_256-null' 388s | token: '' '' "aes_ccm_256" '-' 388s | token: '' "aes_ccm_256" '-' "null" '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_256' is not recognized 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_CCM_16[_256] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_gcm_192-null' for ESP 388s | proposal: 'aes_gcm_192-null' 388s | token: '' '' "aes_gcm_192" '-' 388s | token: '' "aes_gcm_192" '-' "null" '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_192' is not recognized 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_GCM_16[_192] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_ccm_8-null' for ESP 388s | proposal: 'aes_ccm_8-null' 388s | token: '' '' "aes_ccm_8" '-' 388s | token: '' "aes_ccm_8" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_CCM_8[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_ccm_12-null' for ESP 388s | proposal: 'aes_ccm_12-null' 388s | token: '' '' "aes_ccm_12" '-' 388s | token: '' "aes_ccm_12" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_CCM_12[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_ccm_16-null' for ESP 388s | proposal: 'aes_ccm_16-null' 388s | token: '' '' "aes_ccm_16" '-' 388s | token: '' "aes_ccm_16" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_CCM_16[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_gcm_8-null' for ESP 388s | proposal: 'aes_gcm_8-null' 388s | token: '' '' "aes_gcm_8" '-' 388s | token: '' "aes_gcm_8" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_GCM_8[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_gcm_12-null' for ESP 388s | proposal: 'aes_gcm_12-null' 388s | token: '' '' "aes_gcm_12" '-' 388s | token: '' "aes_gcm_12" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_GCM_12[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_gcm_16-null' for ESP 388s | proposal: 'aes_gcm_16-null' 388s | token: '' '' "aes_gcm_16" '-' 388s | token: '' "aes_gcm_16" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_GCM_16[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_ccm_8-128-null' for ESP 388s | proposal: 'aes_ccm_8-128-null' 388s | token: '' '' "aes_ccm_8" '-' 388s | token: '' "aes_ccm_8" '-' "128" '-' 388s | token: '-' "128" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_CCM_8[_128] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_ccm_12-192-null' for ESP 388s | proposal: 'aes_ccm_12-192-null' 388s | token: '' '' "aes_ccm_12" '-' 388s | token: '' "aes_ccm_12" '-' "192" '-' 388s | token: '-' "192" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_CCM_12[_192] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_ccm_16-256-null' for ESP 388s | proposal: 'aes_ccm_16-256-null' 388s | token: '' '' "aes_ccm_16" '-' 388s | token: '' "aes_ccm_16" '-' "256" '-' 388s | token: '-' "256" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_CCM_16[_256] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_gcm_8-128-null' for ESP 388s | proposal: 'aes_gcm_8-128-null' 388s | token: '' '' "aes_gcm_8" '-' 388s | token: '' "aes_gcm_8" '-' "128" '-' 388s | token: '-' "128" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_GCM_8[_128] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_gcm_12-192-null' for ESP 388s | proposal: 'aes_gcm_12-192-null' 388s | token: '' '' "aes_gcm_12" '-' 388s | token: '' "aes_gcm_12" '-' "192" '-' 388s | token: '-' "192" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_GCM_12[_192] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_gcm_16-256-null' for ESP 388s | proposal: 'aes_gcm_16-256-null' 388s | token: '' '' "aes_gcm_16" '-' 388s | token: '' "aes_gcm_16" '-' "256" '-' 388s | token: '-' "256" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_GCM_16[_256] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_ccm_8_128-null' for ESP 388s | proposal: 'aes_ccm_8_128-null' 388s | token: '' '' "aes_ccm_8_128" '-' 388s | token: '' "aes_ccm_8_128" '-' "null" '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_8_128' is not recognized 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_CCM_8[_128] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_ccm_12_192-null' for ESP 388s | proposal: 'aes_ccm_12_192-null' 388s | token: '' '' "aes_ccm_12_192" '-' 388s | token: '' "aes_ccm_12_192" '-' "null" '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_12_192' is not recognized 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_CCM_12[_192] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_ccm_16_256-null' for ESP 388s | proposal: 'aes_ccm_16_256-null' 388s | token: '' '' "aes_ccm_16_256" '-' 388s | token: '' "aes_ccm_16_256" '-' "null" '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_16_256' is not recognized 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_CCM_16[_256] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_gcm_8_128-null' for ESP 388s | proposal: 'aes_gcm_8_128-null' 388s | token: '' '' "aes_gcm_8_128" '-' 388s | token: '' "aes_gcm_8_128" '-' "null" '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_8_128' is not recognized 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_GCM_8[_128] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_gcm_12_192-null' for ESP 388s | proposal: 'aes_gcm_12_192-null' 388s | token: '' '' "aes_gcm_12_192" '-' 388s | token: '' "aes_gcm_12_192" '-' "null" '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_12_192' is not recognized 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_GCM_12[_192] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_gcm_16_256-null' for ESP 388s | proposal: 'aes_gcm_16_256-null' 388s | token: '' '' "aes_gcm_16_256" '-' 388s | token: '' "aes_gcm_16_256" '-' "null" '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_16_256' is not recognized 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_GCM_16[_256] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_ctr' for ESP 388s | proposal: 'aes_ctr' 388s | token: '' '' "aes_ctr" '' 388s | token: '' "aes_ctr" '' '' 388s | token: '' '' '' 388s | appending ESP encryption algorithm AES_CTR[_0] 388s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 388s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 388s | parsing 'aesctr' for ESP 388s | proposal: 'aesctr' 388s | token: '' '' "aesctr" '' 388s | token: '' "aesctr" '' '' 388s | token: '' '' '' 388s | appending ESP encryption algorithm AES_CTR[_0] 388s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 388s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 388s | parsing 'aes_ctr128' for ESP 388s | proposal: 'aes_ctr128' 388s | token: '' '' "aes_ctr128" '' 388s | token: '' "aes_ctr128" '' '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr128' is not recognized 388s | token: '' '' '' 388s | appending ESP encryption algorithm AES_CTR[_128] 388s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 388s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 388s | parsing 'aes_ctr192' for ESP 388s | proposal: 'aes_ctr192' 388s | token: '' '' "aes_ctr192" '' 388s | token: '' "aes_ctr192" '' '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr192' is not recognized 388s | token: '' '' '' 388s | appending ESP encryption algorithm AES_CTR[_192] 388s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 388s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 388s | parsing 'aes_ctr256' for ESP 388s | proposal: 'aes_ctr256' 388s | token: '' '' "aes_ctr256" '' 388s | token: '' "aes_ctr256" '' '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr256' is not recognized 388s | token: '' '' '' 388s | appending ESP encryption algorithm AES_CTR[_256] 388s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 388s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 388s | parsing 'camellia_cbc_256-hmac_sha2_512_256;modp8192' for ESP 388s | proposal: 'camellia_cbc_256-hmac_sha2_512_256;modp8192' 388s | token: '' '' "camellia_cbc_256" '-' 388s | token: '' "camellia_cbc_256" '-' "hmac_sha2_512_256" ';' 388s | ike_alg_byname() failed: ESP encryption algorithm 'camellia_cbc_256' is not recognized 388s | token: '-' "hmac_sha2_512_256" ';' "modp8192" '' 388s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 388s | token: ';' "modp8192" '' '' 388s | parsing dh: 388s | appending ESP DH algorithm MODP8192[_0] 388s | token: '' '' '' 388s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 388s | parsing 'null_auth_aes_gmac_256-null;modp8192' for ESP 388s | proposal: 'null_auth_aes_gmac_256-null;modp8192' 388s | token: '' '' "null_auth_aes_gmac_256" '-' 388s | token: '' "null_auth_aes_gmac_256" '-' "null" ';' 388s | ike_alg_byname() failed: ESP encryption algorithm 'null_auth_aes_gmac_256' is not recognized 388s | token: '-' "null" ';' "modp8192" '' 388s | appending ESP encryption algorithm NULL_AUTH_AES_GMAC[_256] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: ';' "modp8192" '' '' 388s | parsing dh: 388s | appending ESP DH algorithm MODP8192[_0] 388s | token: '' '' '' 388s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 388s | parsing '3des-sha1;modp8192' for ESP 388s | proposal: '3des-sha1;modp8192' 388s | token: '' '' "3des" '-' 388s | token: '' "3des" '-' "sha1" ';' 388s | token: '-' "sha1" ';' "modp8192" '' 388s | appending ESP encryption algorithm 3DES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: ';' "modp8192" '' '' 388s | parsing dh: 388s | appending ESP DH algorithm MODP8192[_0] 388s | token: '' '' '' 388s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 388s | parsing '3des-sha1-modp8192' for ESP 388s | proposal: '3des-sha1-modp8192' 388s | token: '' '' "3des" '-' 388s | token: '' "3des" '-' "sha1" '-' 388s | token: '-' "sha1" '-' "modp8192" '' 388s | appending ESP encryption algorithm 3DES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: '-' "modp8192" '' '' 388s | parsing dh: 388s | appending ESP DH algorithm MODP8192[_0] 388s | token: '' '' '' 388s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 388s | parsing 'aes-sha1,3des-sha1;modp8192' for ESP 388s | proposal: 'aes-sha1' 388s | token: '' '' "aes" '-' 388s | token: '' "aes" '-' "sha1" '' 388s | token: '-' "sha1" '' '' 388s | appending ESP encryption algorithm AES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: '' '' '' 388s | proposal: '3des-sha1;modp8192' 388s | token: '' '' "3des" '-' 388s | token: '' "3des" '-' "sha1" ';' 388s | token: '-' "sha1" ';' "modp8192" '' 388s | appending ESP encryption algorithm 3DES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: ';' "modp8192" '' '' 388s | parsing dh: 388s | appending ESP DH algorithm MODP8192[_0] 388s | token: '' '' '' 388s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 388s | parsing 'aes-sha1-modp8192,3des-sha1-modp8192' for ESP 388s | proposal: 'aes-sha1-modp8192' 388s | token: '' '' "aes" '-' 388s | token: '' "aes" '-' "sha1" '-' 388s | token: '-' "sha1" '-' "modp8192" '' 388s | appending ESP encryption algorithm AES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: '-' "modp8192" '' '' 388s | parsing dh: 388s | appending ESP DH algorithm MODP8192[_0] 388s | token: '' '' '' 388s | proposal: '3des-sha1-modp8192' 388s | token: '' '' "3des" '-' 388s | token: '' "3des" '-' "sha1" '-' 388s | token: '-' "sha1" '-' "modp8192" '' 388s | appending ESP encryption algorithm 3DES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: '-' "modp8192" '' '' 388s | parsing dh: 388s | appending ESP DH algorithm MODP8192[_0] 388s | token: '' '' '' 388s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 388s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 388s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for ESP 388s | proposal: 'aes-sha1-modp8192' 388s | token: '' '' "aes" '-' 388s | token: '' "aes" '-' "sha1" '-' 388s | token: '-' "sha1" '-' "modp8192" '' 388s | appending ESP encryption algorithm AES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: '-' "modp8192" '' '' 388s | parsing dh: 388s | appending ESP DH algorithm MODP8192[_0] 388s | token: '' '' '' 388s | proposal: 'aes-sha1-modp8192' 388s | token: '' '' "aes" '-' 388s | token: '' "aes" '-' "sha1" '-' 388s | token: '-' "sha1" '-' "modp8192" '' 388s | appending ESP encryption algorithm AES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: '-' "modp8192" '' '' 388s | parsing dh: 388s | appending ESP DH algorithm MODP8192[_0] 388s | token: '' '' '' 388s | proposal: 'aes-sha1-modp8192' 388s | token: '' '' "aes" '-' 388s | token: '' "aes" '-' "sha1" '-' 388s | token: '-' "sha1" '-' "modp8192" '' 388s | appending ESP encryption algorithm AES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: '-' "modp8192" '' '' 388s | parsing dh: 388s | appending ESP DH algorithm MODP8192[_0] 388s | token: '' '' '' 388s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 388s | parsing 'aes;none' for ESP 388s | proposal: 'aes;none' 388s | token: '' '' "aes" ';' 388s | token: '' "aes" ';' "none" '' 388s | token: ';' "none" '' '' 388s | appending ESP encryption algorithm AES_CBC[_0] 388s | parsing dh: 388s | appending ESP DH algorithm NONE[_0] 388s | token: '' '' '' 388s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 388s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 388s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 388s | parsing 'aes;none,aes' for ESP 388s | proposal: 'aes;none' 388s | token: '' '' "aes" ';' 388s | token: '' "aes" ';' "none" '' 388s | token: ';' "none" '' '' 388s | appending ESP encryption algorithm AES_CBC[_0] 388s | parsing dh: 388s | appending ESP DH algorithm NONE[_0] 388s | token: '' '' '' 388s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 388s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 388s | proposal: 'aes' 388s | token: '' '' "aes" '' 388s | token: '' "aes" '' '' 388s | token: '' '' '' 388s | appending ESP encryption algorithm AES_CBC[_0] 388s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 388s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 388s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 388s | parsing 'aes;none,aes;modp2048' for ESP 388s | proposal: 'aes;none' 388s | token: '' '' "aes" ';' 388s | token: '' "aes" ';' "none" '' 388s | token: ';' "none" '' '' 388s | appending ESP encryption algorithm AES_CBC[_0] 388s | parsing dh: 388s | appending ESP DH algorithm NONE[_0] 388s | token: '' '' '' 388s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 388s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 388s | proposal: 'aes;modp2048' 388s | token: '' '' "aes" ';' 388s | token: '' "aes" ';' "modp2048" '' 388s | token: ';' "modp2048" '' '' 388s | appending ESP encryption algorithm AES_CBC[_0] 388s | parsing dh: 388s | appending ESP DH algorithm MODP2048[_0] 388s | token: '' '' '' 388s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 388s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 388s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 388s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 388s | parsing 'aes-sha1-none' for ESP 388s | proposal: 'aes-sha1-none' 388s | token: '' '' "aes" '-' 388s | token: '' "aes" '-' "sha1" '-' 388s | token: '-' "sha1" '-' "none" '' 388s | appending ESP encryption algorithm AES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: '-' "none" '' '' 388s | parsing dh: 388s | appending ESP DH algorithm NONE[_0] 388s | token: '' '' '' 388s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 388s | parsing 'aes-sha1;none' for ESP 388s | proposal: 'aes-sha1;none' 388s | token: '' '' "aes" '-' 388s | token: '' "aes" '-' "sha1" ';' 388s | token: '-' "sha1" ';' "none" '' 388s | appending ESP encryption algorithm AES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: ';' "none" '' '' 388s | parsing dh: 388s | appending ESP DH algorithm NONE[_0] 388s | token: '' '' '' 388s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 388s | parsing '3des168-sha1' for ESP 388s | proposal: '3des168-sha1' 388s | token: '' '' "3des168" '-' 388s | token: '' "3des168" '-' "sha1" '' 388s | ike_alg_byname() failed: ESP encryption algorithm '3des168' is not recognized 388s | parsing '3des-null' for ESP 388s | proposal: '3des-null' 388s | token: '' '' "3des" '-' 388s | token: '' "3des" '-' "null" '' 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm 3DES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes128-null' for ESP 388s | proposal: 'aes128-null' 388s | token: '' '' "aes128" '-' 388s | token: '' "aes128" '-' "null" '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 388s | token: '-' "null" '' '' 388s | appending ESP encryption algorithm AES_CBC[_128] 388s | parsing integ: 388s | appending ESP integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes224-sha1' for ESP 388s | proposal: 'aes224-sha1' 388s | token: '' '' "aes224" '-' 388s | token: '' "aes224" '-' "sha1" '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'aes224' is not recognized 388s | parsing 'aes-224-sha1' for ESP 388s | proposal: 'aes-224-sha1' 388s | token: '' '' "aes" '-' 388s | token: '' "aes" '-' "224" '-' 388s | byname('aes') with ='224' failed: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 388s | parsing 'aes0-sha1' for ESP 388s | proposal: 'aes0-sha1' 388s | token: '' '' "aes0" '-' 388s | token: '' "aes0" '-' "sha1" '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'aes0' is not recognized 388s | parsing 'aes-0-sha1' for ESP 388s | proposal: 'aes-0-sha1' 388s | token: '' '' "aes" '-' 388s | token: '' "aes" '-' "0" '-' 388s | parsing 'aes512-sha1' for ESP 388s | proposal: 'aes512-sha1' 388s | token: '' '' "aes512" '-' 388s | token: '' "aes512" '-' "sha1" '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'aes512' is not recognized 388s | parsing 'aes-sha1555' for ESP 388s | proposal: 'aes-sha1555' 388s | token: '' '' "aes" '-' 388s | token: '' "aes" '-' "sha1555" '' 388s | token: '-' "sha1555" '' '' 388s | appending ESP encryption algorithm AES_CBC[_0] 388s | parsing integ: 388s | ike_alg_byname() failed: ESP integrity algorithm 'sha1555' is not recognized 388s | lookup for integrity algorithm 'sha1555' failed 388s | or - failed 'ESP integrity algorithm 'sha1555' is not recognized') 388s | parsing 'camellia666-sha1' for ESP 388s | proposal: 'camellia666-sha1' 388s | token: '' '' "camellia666" '-' 388s | token: '' "camellia666" '-' "sha1" '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'camellia666' is not recognized 388s | parsing 'blowfish' for ESP 388s | proposal: 'blowfish' 388s | token: '' '' "blowfish" '' 388s | token: '' "blowfish" '' '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'blowfish' is not supported 388s | parsing 'des-sha1' for ESP 388s | proposal: 'des-sha1' 388s | token: '' '' "des" '-' 388s | token: '' "des" '-' "sha1" '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'des' is not supported 388s | parsing 'aes_ctr666' for ESP 388s | proposal: 'aes_ctr666' 388s | token: '' '' "aes_ctr666" '' 388s | token: '' "aes_ctr666" '' '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr666' is not recognized 388s | parsing 'aes128-sha2_128' for ESP 388s | proposal: 'aes128-sha2_128' 388s | token: '' '' "aes128" '-' 388s | token: '' "aes128" '-' "sha2_128" '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 388s | token: '-' "sha2_128" '' '' 388s | appending ESP encryption algorithm AES_CBC[_128] 388s | parsing integ: 388s | ike_alg_byname() failed: ESP integrity algorithm 'sha2_128' is not recognized 388s | lookup for integrity algorithm 'sha2_128' failed 388s | or - failed 'ESP integrity algorithm 'sha2_128' is not recognized') 388s | parsing 'aes256-sha2_256-4096' for ESP 388s | proposal: 'aes256-sha2_256-4096' 388s | token: '' '' "aes256" '-' 388s | token: '' "aes256" '-' "sha2_256" '-' 388s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 388s | token: '-' "sha2_256" '-' "4096" '' 388s | appending ESP encryption algorithm AES_CBC[_256] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 388s | token: '-' "4096" '' '' 388s | parsing dh: 388s | ike_alg_byname() failed: ESP DH algorithm '4096' is not recognized 388s | lookup for DH algorithm '4096' failed 388s | ... failed 'ESP DH algorithm '4096' is not recognized' 388s | parsing 'aes256-sha2_256-128' for ESP 388s | proposal: 'aes256-sha2_256-128' 388s | token: '' '' "aes256" '-' 388s | token: '' "aes256" '-' "sha2_256" '-' 388s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 388s | token: '-' "sha2_256" '-' "128" '' 388s | appending ESP encryption algorithm AES_CBC[_256] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 388s | token: '-' "128" '' '' 388s | parsing dh: 388s | ike_alg_byname() failed: ESP DH algorithm '128' is not recognized 388s | lookup for DH algorithm '128' failed 388s | ... failed 'ESP DH algorithm '128' is not recognized' 388s | parsing 'vanitycipher' for ESP 388s | proposal: 'vanitycipher' 388s | token: '' '' "vanitycipher" '' 388s | token: '' "vanitycipher" '' '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'vanitycipher' is not recognized 388s | parsing 'ase-sah' for ESP 388s | proposal: 'ase-sah' 388s | token: '' '' "ase" '-' 388s | token: '' "ase" '-' "sah" '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'ase' is not recognized 388s | parsing 'aes-sah1' for ESP 388s | proposal: 'aes-sah1' 388s | token: '' '' "aes" '-' 388s | token: '' "aes" '-' "sah1" '' 388s | token: '-' "sah1" '' '' 388s | appending ESP encryption algorithm AES_CBC[_0] 388s | parsing integ: 388s | ike_alg_byname() failed: ESP integrity algorithm 'sah1' is not recognized 388s | lookup for integrity algorithm 'sah1' failed 388s | or - failed 'ESP integrity algorithm 'sah1' is not recognized') 388s | parsing 'id3' for ESP 388s | proposal: 'id3' 388s | token: '' '' "id3" '' 388s | token: '' "id3" '' '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 388s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 388s | parsing 'aes-id3' for ESP 388s | proposal: 'aes-id3' 388s | token: '' '' "aes" '-' 388s | token: '' "aes" '-' "id3" '' 388s | token: '-' "id3" '' '' 388s | appending ESP encryption algorithm AES_CBC[_0] 388s | parsing integ: 388s | ike_alg_byname() failed: ESP integrity algorithm 'id3' is not recognized 388s | lookup for integrity algorithm 'id3' failed 388s | or - failed 'ESP integrity algorithm 'id3' is not recognized') 388s | parsing 'aes_gcm-md5' for ESP 388s | proposal: 'aes_gcm-md5' 388s | token: '' '' "aes_gcm" '-' 388s | token: '' "aes_gcm" '-' "md5" '' 388s | token: '-' "md5" '' '' 388s | appending ESP encryption algorithm AES_GCM_16[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_MD5_96[_0] 388s | token: '' '' '' 388s | parsing 'mars' for ESP 388s | proposal: 'mars' 388s | token: '' '' "mars" '' 388s | token: '' "mars" '' '' 388s | ike_alg_byname() failed: ESP encryption algorithm 'mars' is not supported 388s | parsing 'aes_gcm-16' for ESP 388s | proposal: 'aes_gcm-16' 388s | token: '' '' "aes_gcm" '-' 388s | token: '' "aes_gcm" '-' "16" '' 388s | byname('aes_gcm') with ='16' failed: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 388s | parsing 'aes_gcm-0' for ESP 388s | proposal: 'aes_gcm-0' 388s | token: '' '' "aes_gcm" '-' 388s | token: '' "aes_gcm" '-' "0" '' 388s | parsing 'aes_gcm-123456789012345' for ESP 388s | proposal: 'aes_gcm-123456789012345' 388s | token: '' '' "aes_gcm" '-' 388s | token: '' "aes_gcm" '-' "123456789012345" '' 388s | parsing '3des-sha1;dh22' for ESP 388s | proposal: '3des-sha1;dh22' 388s | token: '' '' "3des" '-' 388s | token: '' "3des" '-' "sha1" ';' 388s | token: '-' "sha1" ';' "dh22" '' 388s | appending ESP encryption algorithm 3DES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: ';' "dh22" '' '' 388s | parsing dh: 388s | ike_alg_byname() failed: ESP DH algorithm 'dh22' is not supported 388s | lookup for DH algorithm 'dh22' failed 388s | ... failed 'ESP DH algorithm 'dh22' is not supported' 388s | parsing '3des-sha1;modp8192,3des-sha2' for ESP 388s | proposal: '3des-sha1;modp8192' 388s | token: '' '' "3des" '-' 388s | token: '' "3des" '-' "sha1" ';' 388s | token: '-' "sha1" ';' "modp8192" '' 388s | appending ESP encryption algorithm 3DES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: ';' "modp8192" '' '' 388s | parsing dh: 388s | appending ESP DH algorithm MODP8192[_0] 388s | token: '' '' '' 388s | proposal: '3des-sha2' 388s | token: '' '' "3des" '-' 388s | token: '' "3des" '-' "sha2" '' 388s | token: '-' "sha2" '' '' 388s | appending ESP encryption algorithm 3DES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 388s | token: '' '' '' 388s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 388s | parsing '3des-sha1-modp8192,3des-sha2' for ESP 388s | proposal: '3des-sha1-modp8192' 388s | token: '' '' "3des" '-' 388s | token: '' "3des" '-' "sha1" '-' 388s | token: '-' "sha1" '-' "modp8192" '' 388s | appending ESP encryption algorithm 3DES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: '-' "modp8192" '' '' 388s | parsing dh: 388s | appending ESP DH algorithm MODP8192[_0] 388s | token: '' '' '' 388s | proposal: '3des-sha2' 388s | token: '' '' "3des" '-' 388s | token: '' "3des" '-' "sha2" '' 388s | token: '-' "sha2" '' '' 388s | appending ESP encryption algorithm 3DES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 388s | token: '' '' '' 388s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 388s | parsing '3des-sha1-modp8192,3des-sha2-modp8192' for ESP 388s | proposal: '3des-sha1-modp8192' 388s | token: '' '' "3des" '-' 388s | token: '' "3des" '-' "sha1" '-' 388s | token: '-' "sha1" '-' "modp8192" '' 388s | appending ESP encryption algorithm 3DES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: '-' "modp8192" '' '' 388s | parsing dh: 388s | appending ESP DH algorithm MODP8192[_0] 388s | token: '' '' '' 388s | proposal: '3des-sha2-modp8192' 388s | token: '' '' "3des" '-' 388s | token: '' "3des" '-' "sha2" '-' 388s | token: '-' "sha2" '-' "modp8192" '' 388s | appending ESP encryption algorithm 3DES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 388s | token: '-' "modp8192" '' '' 388s | parsing dh: 388s | appending ESP DH algorithm MODP8192[_0] 388s | token: '' '' '' 388s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 388s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 388s | parsing '3des-sha1-modp8192,3des-sha2;modp8192' for ESP 388s | proposal: '3des-sha1-modp8192' 388s | token: '' '' "3des" '-' 388s | token: '' "3des" '-' "sha1" '-' 388s | token: '-' "sha1" '-' "modp8192" '' 388s | appending ESP encryption algorithm 3DES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: '-' "modp8192" '' '' 388s | parsing dh: 388s | appending ESP DH algorithm MODP8192[_0] 388s | token: '' '' '' 388s | proposal: '3des-sha2;modp8192' 388s | token: '' '' "3des" '-' 388s | token: '' "3des" '-' "sha2" ';' 388s | token: '-' "sha2" ';' "modp8192" '' 388s | appending ESP encryption algorithm 3DES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 388s | token: ';' "modp8192" '' '' 388s | parsing dh: 388s | appending ESP DH algorithm MODP8192[_0] 388s | token: '' '' '' 388s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 388s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 388s | parsing '3des-sha1;modp8192,3des-sha2-modp8192' for ESP 388s | proposal: '3des-sha1;modp8192' 388s | token: '' '' "3des" '-' 388s | token: '' "3des" '-' "sha1" ';' 388s | token: '-' "sha1" ';' "modp8192" '' 388s | appending ESP encryption algorithm 3DES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: ';' "modp8192" '' '' 388s | parsing dh: 388s | appending ESP DH algorithm MODP8192[_0] 388s | token: '' '' '' 388s | proposal: '3des-sha2-modp8192' 388s | token: '' '' "3des" '-' 388s | token: '' "3des" '-' "sha2" '-' 388s | token: '-' "sha2" '-' "modp8192" '' 388s | appending ESP encryption algorithm 3DES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 388s | token: '-' "modp8192" '' '' 388s | parsing dh: 388s | appending ESP DH algorithm MODP8192[_0] 388s | token: '' '' '' 388s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 388s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 388s | parsing '3des-sha1;modp8192,3des-sha2;modp8192' for ESP 388s | proposal: '3des-sha1;modp8192' 388s | token: '' '' "3des" '-' 388s | token: '' "3des" '-' "sha1" ';' 388s | token: '-' "sha1" ';' "modp8192" '' 388s | appending ESP encryption algorithm 3DES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: ';' "modp8192" '' '' 388s | parsing dh: 388s | appending ESP DH algorithm MODP8192[_0] 388s | token: '' '' '' 388s | proposal: '3des-sha2;modp8192' 388s | token: '' '' "3des" '-' 388s | token: '' "3des" '-' "sha2" ';' 388s | token: '-' "sha2" ';' "modp8192" '' 388s | appending ESP encryption algorithm 3DES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 388s | token: ';' "modp8192" '' '' 388s | parsing dh: 388s | appending ESP DH algorithm MODP8192[_0] 388s | token: '' '' '' 388s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 388s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 388s | parsing '3des-sha1-modp8192,3des-sha2-modp2048' for ESP 388s | proposal: '3des-sha1-modp8192' 388s | token: '' '' "3des" '-' 388s | token: '' "3des" '-' "sha1" '-' 388s | token: '-' "sha1" '-' "modp8192" '' 388s | appending ESP encryption algorithm 3DES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 388s | token: '-' "modp8192" '' '' 388s | parsing dh: 388s | appending ESP DH algorithm MODP8192[_0] 388s | token: '' '' '' 388s | proposal: '3des-sha2-modp2048' 388s | token: '' '' "3des" '-' 388s | token: '' "3des" '-' "sha2" '-' 388s | token: '-' "sha2" '-' "modp2048" '' 388s | appending ESP encryption algorithm 3DES_CBC[_0] 388s | parsing integ: 388s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 388s | token: '-' "modp2048" '' '' 388s | parsing dh: 388s | appending ESP DH algorithm MODP2048[_0] 388s | token: '' '' '' 388s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 388s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 388s | parsing 'SHA2_512_256,SHA2_256_128' for AH 388s | proposal: 'SHA2_512_256' 388s | token: '' '' "SHA2_512_256" '' 388s | token: '' "SHA2_512_256" '' '' 388s | parsing integ: 388s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 388s | token: '' '' '' 388s | proposal: 'SHA2_256_128' 388s | token: '' '' "SHA2_256_128" '' 388s | token: '' "SHA2_256_128" '' '' 388s | parsing integ: 388s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 388s | token: '' '' '' 388s | parsing '' for AH 388s | parsing 'md5' for AH 388s | proposal: 'md5' 388s | token: '' '' "md5" '' 388s | token: '' "md5" '' '' 388s | parsing integ: 388s | appending AH integrity algorithm HMAC_MD5_96[_0] 388s | token: '' '' '' 388s | parsing 'sha' for AH 388s | proposal: 'sha' 388s | token: '' '' "sha" '' 388s | token: '' "sha" '' '' 388s | parsing integ: 388s | appending AH integrity algorithm HMAC_SHA1_96[_0] 388s | token: '' '' '' 388s | parsing 'sha;modp2048' for AH 388s | proposal: 'sha;modp2048' 388s | token: '' '' "sha" ';' 388s | token: '' "sha" ';' "modp2048" '' 388s | parsing integ: 388s | appending AH integrity algorithm HMAC_SHA1_96[_0] 388s | token: ';' "modp2048" '' '' 388s | parsing dh: 388s | appending AH DH algorithm MODP2048[_0] 388s | token: '' '' '' 388s ipsec algparse: ignoring AH DH algorithm MODP2048 as PFS policy is disabled 388s | parsing 'sha1' for AH 388s | proposal: 'sha1' 388s | token: '' '' "sha1" '' 388s | token: '' "sha1" '' '' 388s | parsing integ: 388s | appending AH integrity algorithm HMAC_SHA1_96[_0] 388s | token: '' '' '' 388s | parsing 'sha2' for AH 388s | proposal: 'sha2' 388s | token: '' '' "sha2" '' 388s | token: '' "sha2" '' '' 388s | parsing integ: 388s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 388s | token: '' '' '' 388s | parsing 'sha256' for AH 388s | proposal: 'sha256' 388s | token: '' '' "sha256" '' 388s | token: '' "sha256" '' '' 388s | parsing integ: 388s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 388s | token: '' '' '' 388s | parsing 'sha384' for AH 388s | proposal: 'sha384' 388s | token: '' '' "sha384" '' 388s | token: '' "sha384" '' '' 388s | parsing integ: 388s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 388s | token: '' '' '' 388s | parsing 'sha512' for AH 388s | proposal: 'sha512' 388s | token: '' '' "sha512" '' 388s | token: '' "sha512" '' '' 388s | parsing integ: 388s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 388s | token: '' '' '' 388s | parsing 'sha2_256' for AH 388s | proposal: 'sha2_256' 388s | token: '' '' "sha2_256" '' 388s | token: '' "sha2_256" '' '' 388s | parsing integ: 388s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 388s | token: '' '' '' 388s | parsing 'sha2_384' for AH 388s | proposal: 'sha2_384' 388s | token: '' '' "sha2_384" '' 388s | token: '' "sha2_384" '' '' 388s | parsing integ: 388s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 388s | token: '' '' '' 388s | parsing 'sha2_512' for AH 388s | proposal: 'sha2_512' 388s | token: '' '' "sha2_512" '' 388s | token: '' "sha2_512" '' '' 388s | parsing integ: 388s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 388s | token: '' '' '' 388s | parsing 'aes_xcbc' for AH 388s | proposal: 'aes_xcbc' 388s | token: '' '' "aes_xcbc" '' 388s | token: '' "aes_xcbc" '' '' 388s | parsing integ: 388s | appending AH integrity algorithm AES_XCBC_96[_0] 388s | token: '' '' '' 388s | parsing 'sha2-none' for AH 388s | proposal: 'sha2-none' 388s | token: '' '' "sha2" '-' 388s | token: '' "sha2" '-' "none" '' 388s | parsing integ: 388s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 388s | token: '-' "none" '' '' 388s | parsing dh: 388s | appending AH DH algorithm NONE[_0] 388s | token: '' '' '' 388s ipsec algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 388s | parsing 'sha2;none' for AH 388s | proposal: 'sha2;none' 388s | token: '' '' "sha2" ';' 388s | token: '' "sha2" ';' "none" '' 388s | parsing integ: 388s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 388s | token: ';' "none" '' '' 388s | parsing dh: 388s | appending AH DH algorithm NONE[_0] 388s | token: '' '' '' 388s ipsec algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 388s | parsing 'sha1-modp8192,sha1-modp8192,sha1-modp8192' for AH 388s | proposal: 'sha1-modp8192' 388s | token: '' '' "sha1" '-' 388s | token: '' "sha1" '-' "modp8192" '' 388s | parsing integ: 388s | appending AH integrity algorithm HMAC_SHA1_96[_0] 388s | token: '-' "modp8192" '' '' 388s | parsing dh: 388s | appending AH DH algorithm MODP8192[_0] 388s | token: '' '' '' 388s | proposal: 'sha1-modp8192' 388s | token: '' '' "sha1" '-' 388s | token: '' "sha1" '-' "modp8192" '' 388s | parsing integ: 388s | appending AH integrity algorithm HMAC_SHA1_96[_0] 388s | token: '-' "modp8192" '' '' 388s | parsing dh: 388s | appending AH DH algorithm MODP8192[_0] 388s | token: '' '' '' 388s | proposal: 'sha1-modp8192' 388s | token: '' '' "sha1" '-' 388s | token: '' "sha1" '-' "modp8192" '' 388s | parsing integ: 388s | appending AH integrity algorithm HMAC_SHA1_96[_0] 388s | token: '-' "modp8192" '' '' 388s | parsing dh: 388s | appending AH DH algorithm MODP8192[_0] 388s | token: '' '' '' 388s ipsec algparse: ignoring AH DH algorithm MODP8192 as PFS policy is disabled 388s | parsing 'aes-sha1' for AH 388s | proposal: 'aes-sha1' 388s | token: '' '' "aes" '-' 388s | token: '' "aes" '-' "sha1" '' 388s | parsing integ: 388s | ike_alg_byname() failed: AH integrity algorithm 'aes' is not recognized 388s | lookup for integrity algorithm 'aes' failed 388s | or - failed 'AH integrity algorithm 'aes' is not recognized') 388s | parsing 'vanityhash1' for AH 388s | proposal: 'vanityhash1' 388s | token: '' '' "vanityhash1" '' 388s | token: '' "vanityhash1" '' '' 388s | parsing integ: 388s | ike_alg_byname() failed: AH integrity algorithm 'vanityhash1' is not recognized 388s | lookup for integrity algorithm 'vanityhash1' failed 388s | or - failed 'AH integrity algorithm 'vanityhash1' is not recognized') 388s | parsing 'aes_gcm_c-256' for AH 388s | proposal: 'aes_gcm_c-256' 388s | token: '' '' "aes_gcm_c" '-' 388s | token: '' "aes_gcm_c" '-' "256" '' 388s | parsing integ: 388s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm_c' is not recognized 388s | lookup for integrity algorithm 'aes_gcm_c' failed 388s | or - failed 'AH integrity algorithm 'aes_gcm_c' is not recognized') 388s | parsing 'id3' for AH 388s | proposal: 'id3' 388s | token: '' '' "id3" '' 388s | token: '' "id3" '' '' 388s | parsing integ: 388s | ike_alg_byname() failed: AH integrity algorithm 'id3' is not recognized 388s | lookup for integrity algorithm 'id3' failed 388s | or - failed 'AH integrity algorithm 'id3' is not recognized') 388s | parsing '3des' for AH 388s | proposal: '3des' 388s | token: '' '' "3des" '' 388s | token: '' "3des" '' '' 388s | parsing integ: 388s | ike_alg_byname() failed: AH integrity algorithm '3des' is not recognized 388s | lookup for integrity algorithm '3des' failed 388s | or - failed 'AH integrity algorithm '3des' is not recognized') 388s | parsing 'null' for AH 388s | proposal: 'null' 388s | token: '' '' "null" '' 388s | token: '' "null" '' '' 388s | parsing integ: 388s algparse -v2 'ah=aes_ccm' (expect ERROR) 388s ERROR: AH integrity algorithm 'aes_ccm' is not recognized 388s algparse -v2 'ah=ripemd' (expect ERROR) 388s ERROR: AH integrity algorithm 'ripemd' is not recognized 388s algparse -v2 'ike' (expect SUCCESS) 388s AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 388s AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 388s CHACHA20_POLY1305-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 388s AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 388s AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 388s algparse -v2 'ike=' (expect ERROR) 388s ERROR: IKE proposal is empty 388s algparse -v2 'ike=3des-sha1' (expect SUCCESS) 388s 3DES_CBC-HMAC_SHA1-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 388s algparse -v2 'ike=3des-sha1' (expect SUCCESS) 388s 3DES_CBC-HMAC_SHA1-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 388s algparse -v2 'ike=3des-sha1;modp1536' (expect SUCCESS) 388s 3DES_CBC-HMAC_SHA1-MODP1536 388s algparse -v2 'ike=3des;dh21' (expect SUCCESS) 388s 3DES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH21 388s algparse -v2 'ike=3des-sha1;dh21' (expect SUCCESS) 388s 3DES_CBC-HMAC_SHA1-DH21 388s algparse -v2 'ike=3des-sha1-ecp_521' (expect SUCCESS) 388s 3DES_CBC-HMAC_SHA1-DH21 388s algparse -v2 'ike=3des+aes' (expect SUCCESS) 388s 3DES_CBC+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 388s algparse -v2 'ike=aes;none' (expect ERROR) 388s ERROR: IKE DH algorithm 'none' not permitted 388s algparse -v2 'ike=id2' (expect ERROR) 388s ERROR: IKE encryption algorithm 'id2' is not recognized 388s algparse -v2 'ike=3des-id2' (expect ERROR) 388s ERROR: IKE PRF algorithm 'id2' is not recognized 388s algparse -v2 'ike=aes_ccm' (expect ERROR) 388s ERROR: IKE encryption algorithm 'aes_ccm' is not supported 388s algparse -v2 'ike=aes-sha1-sha2-ecp_521' (expect ERROR) 388s ERROR: IKE DH algorithm 'sha2' is not recognized 388s algparse -v2 'ike=aes-sha2-sha2;ecp_521' (expect ERROR) 388s ERROR: IKE DH algorithm 'sha2' is not recognized 388s algparse -v2 'ike=aes-sha1_96-sha2-ecp_521' (expect SUCCESS) 388s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 388s algparse -v2 'ike=aes-sha1_96-sha2;ecp_521' (expect SUCCESS) 388s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 388s algparse -v2 'ike=aes+aes-sha1+sha1-modp8192+modp8192' (expect SUCCESS) 388s AES_CBC-HMAC_SHA1-MODP8192 388s algparse -v2 'ike=3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' (expect SUCCESS) 388s 3DES_CBC+AES_CBC-HMAC_SHA2_256+HMAC_SHA1-MODP4096+MODP8192 388s algparse -v2 'ike=aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' (expect SUCCESS) 388s AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 388s algparse -v2 'ike=aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' (expect SUCCESS) 388s AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 388s algparse -v2 'ike=aes+aes128+aes256' (expect SUCCESS) 388s AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 388s algparse -v2 'ike=aes128+aes+aes256' (expect SUCCESS) 388s AES_CBC_128+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 388s algparse -v2 'ike=aes128+aes256+aes' (expect SUCCESS) 388s AES_CBC_128+AES_CBC_256+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 388s algparse -v2 'ike=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' (expect SUCCESS) 388s AES_CBC-HMAC_SHA1-MODP8192 388s algparse -v2 'ike=aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' (expect SUCCESS) 388s AES_CBC-HMAC_SHA1-MODP8192 388s AES_CBC-HMAC_SHA2_256-MODP8192 388s algparse -v2 'ike=aes_gcm' (expect SUCCESS) 388s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 388s algparse -v2 'ike=aes_gcm-sha2' (expect SUCCESS) 388s AES_GCM_16-HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 388s algparse -v2 'ike=aes_gcm-sha2-modp2048' (expect SUCCESS) 388s AES_GCM_16-HMAC_SHA2_256-MODP2048 388s algparse -v2 'ike=aes_gcm-sha2;modp2048' (expect SUCCESS) 388s AES_GCM_16-HMAC_SHA2_256-MODP2048 388s algparse -v2 'ike=aes_gcm-modp2048' (expect ERROR) 388s ERROR: IKE PRF algorithm 'modp2048' is not recognized 388s algparse -v2 'ike=aes_gcm;modp2048' (expect SUCCESS) 388s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 388s algparse -v2 'ike=aes_gcm-none' (expect SUCCESS) 388s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 388s algparse -v2 'ike=aes_gcm-none-sha2' (expect SUCCESS) 388s AES_GCM_16-HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 388s algparse -v2 'ike=aes_gcm-none-sha2-modp2048' (expect SUCCESS) 388s AES_GCM_16-HMAC_SHA2_256-MODP2048 388s algparse -v2 'ike=aes_gcm-none-sha2;modp2048' (expect SUCCESS) 388s AES_GCM_16-HMAC_SHA2_256-MODP2048 388s algparse -v2 'ike=aes_gcm-none-modp2048' (expect ERROR) 388s ERROR: IKE PRF algorithm 'modp2048' is not recognized 388s algparse -v2 'ike=aes_gcm-none;modp2048' (expect SUCCESS) 388s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 388s algparse -v2 'ike=aes_gcm-sha1-none-modp2048' (expect ERROR) 388s ERROR: IKE proposal contains unexpected 'modp2048' 388s algparse -v2 'ike=aes_gcm-sha1-none;modp2048' (expect ERROR) 388s ERROR: IKE proposal contains unexpected 'modp2048' 388s algparse -v2 'ike=aes+aes_gcm' (expect ERROR) 388s ERROR: AEAD and non-AEAD IKE encryption algorithm cannot be combined 388s algparse -v2 'ike=,' (expect ERROR) 388s ERROR: IKE encryption algorithm is empty 388s algparse -v2 'ike=aes,' (expect ERROR) 388s ERROR: IKE encryption algorithm is empty 388s algparse -v2 'ike=aes,,aes' (expect ERROR) 388s ERROR: IKE encryption algorithm is empty 388s algparse -v2 'ike=,aes' (expect ERROR) 388s ERROR: IKE encryption algorithm is empty 388s algparse -v2 'ike=-' (expect ERROR) 388s ERROR: IKE encryption algorithm is empty 388s algparse -v2 'ike=+' (expect ERROR) 388s ERROR: IKE encryption algorithm is empty 388s algparse -v2 'ike=;' (expect ERROR) 388s ERROR: IKE encryption algorithm is empty 388s algparse -v2 'ike=aes-' (expect ERROR) 388s ERROR: IKE PRF algorithm is empty 388s algparse -v2 'ike=aes+' (expect ERROR) 388s | appending AH integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | parsing 'aes_gcm' for AH 388s | proposal: 'aes_gcm' 388s | token: '' '' "aes_gcm" '' 388s | token: '' "aes_gcm" '' '' 388s | parsing integ: 388s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm' is not recognized 388s | lookup for integrity algorithm 'aes_gcm' failed 388s | or - failed 'AH integrity algorithm 'aes_gcm' is not recognized') 388s | parsing 'aes_ccm' for AH 388s | proposal: 'aes_ccm' 388s | token: '' '' "aes_ccm" '' 388s | token: '' "aes_ccm" '' '' 388s | parsing integ: 388s | ike_alg_byname() failed: AH integrity algorithm 'aes_ccm' is not recognized 388s | lookup for integrity algorithm 'aes_ccm' failed 388s | or - failed 'AH integrity algorithm 'aes_ccm' is not recognized') 388s | parsing 'ripemd' for AH 388s | proposal: 'ripemd' 388s | token: '' '' "ripemd" '' 388s | token: '' "ripemd" '' '' 388s | parsing integ: 388s | ike_alg_byname() failed: AH integrity algorithm 'ripemd' is not recognized 388s | lookup for integrity algorithm 'ripemd' failed 388s | or - failed 'AH integrity algorithm 'ripemd' is not recognized') 388s | parsing 'AES_GCM_16_256,AES_GCM_16_128,CHACHA20_POLY1305,AES_CBC_256,AES_CBC_128' for IKE 388s | proposal: 'AES_GCM_16_256' 388s | token: '' '' "AES_GCM_16_256" '' 388s | token: '' "AES_GCM_16_256" '' '' 388s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_256' is not recognized 388s | token: '' '' '' 388s | appending IKE encryption algorithm AES_GCM_16[_256] 388s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 388s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 388s | appending IKE integrity algorithm NONE[_0] 388s | appending IKE DH algorithm DH19[_0] 388s | appending IKE DH algorithm DH20[_0] 388s | appending IKE DH algorithm DH21[_0] 388s | appending IKE DH algorithm DH31[_0] 388s | appending IKE DH algorithm MODP4096[_0] 388s | appending IKE DH algorithm MODP3072[_0] 388s | appending IKE DH algorithm MODP2048[_0] 388s | appending IKE DH algorithm MODP8192[_0] 388s | proposal: 'AES_GCM_16_128' 388s | token: '' '' "AES_GCM_16_128" '' 388s | token: '' "AES_GCM_16_128" '' '' 388s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_128' is not recognized 388s | token: '' '' '' 388s | appending IKE encryption algorithm AES_GCM_16[_128] 388s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 388s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 388s | appending IKE integrity algorithm NONE[_0] 388s | appending IKE DH algorithm DH19[_0] 388s | appending IKE DH algorithm DH20[_0] 388s | appending IKE DH algorithm DH21[_0] 388s | appending IKE DH algorithm DH31[_0] 388s | appending IKE DH algorithm MODP4096[_0] 388s | appending IKE DH algorithm MODP3072[_0] 388s | appending IKE DH algorithm MODP2048[_0] 388s | appending IKE DH algorithm MODP8192[_0] 388s | proposal: 'CHACHA20_POLY1305' 388s | token: '' '' "CHACHA20_POLY1305" '' 388s | token: '' "CHACHA20_POLY1305" '' '' 388s | token: '' '' '' 388s | appending IKE encryption algorithm CHACHA20_POLY1305[_0] 388s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 388s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 388s | appending IKE integrity algorithm NONE[_0] 388s | appending IKE DH algorithm DH19[_0] 388s | appending IKE DH algorithm DH20[_0] 388s | appending IKE DH algorithm DH21[_0] 388s | appending IKE DH algorithm DH31[_0] 388s | appending IKE DH algorithm MODP4096[_0] 388s | appending IKE DH algorithm MODP3072[_0] 388s | appending IKE DH algorithm MODP2048[_0] 388s | appending IKE DH algorithm MODP8192[_0] 388s | proposal: 'AES_CBC_256' 388s | token: '' '' "AES_CBC_256" '' 388s | token: '' "AES_CBC_256" '' '' 388s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_256' is not recognized 388s | token: '' '' '' 388s | appending IKE encryption algorithm AES_CBC[_256] 388s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 388s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 388s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 388s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 388s | appending IKE DH algorithm DH19[_0] 388s | appending IKE DH algorithm DH20[_0] 388s | appending IKE DH algorithm DH21[_0] 388s | appending IKE DH algorithm DH31[_0] 388s | appending IKE DH algorithm MODP4096[_0] 388s | appending IKE DH algorithm MODP3072[_0] 388s | appending IKE DH algorithm MODP2048[_0] 388s | appending IKE DH algorithm MODP8192[_0] 388s | proposal: 'AES_CBC_128' 388s | token: '' '' "AES_CBC_128" '' 388s | token: '' "AES_CBC_128" '' '' 388s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_128' is not recognized 388s | token: '' '' '' 388s | appending IKE encryption algorithm AES_CBC[_128] 388s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 388s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 388s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 388s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 388s | appending IKE DH algorithm DH19[_0] 388s | appending IKE DH algorithm DH20[_0] 388s | appending IKE DH algorithm DH21[_0] 388s | appending IKE DH algorithm DH31[_0] 388s | appending IKE DH algorithm MODP4096[_0] 388s | appending IKE DH algorithm MODP3072[_0] 388s | appending IKE DH algorithm MODP2048[_0] 388s | appending IKE DH algorithm MODP8192[_0] 388s | parsing '' for IKE 388s | parsing '3des-sha1' for IKE 388s | proposal: '3des-sha1' 388s | token: '' '' "3des" '-' 388s | token: '' "3des" '-' "sha1" '' 388s | token: '-' "sha1" '' '' 388s | appending IKE encryption algorithm 3DES_CBC[_0] 388s | parsing prf: 388s | appending IKE PRF algorithm HMAC_SHA1[_0] 388s | token: '' '' '' 388s | - succeeded, advancing tokens 388s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 388s | appending IKE DH algorithm DH19[_0] 388s | appending IKE DH algorithm DH20[_0] 388s | appending IKE DH algorithm DH21[_0] 388s | appending IKE DH algorithm DH31[_0] 388s | appending IKE DH algorithm MODP4096[_0] 388s | appending IKE DH algorithm MODP3072[_0] 388s | appending IKE DH algorithm MODP2048[_0] 388s | appending IKE DH algorithm MODP8192[_0] 388s | parsing '3des-sha1' for IKE 388s | proposal: '3des-sha1' 388s | token: '' '' "3des" '-' 388s | token: '' "3des" '-' "sha1" '' 388s | token: '-' "sha1" '' '' 388s | appending IKE encryption algorithm 3DES_CBC[_0] 388s | parsing prf: 388s | appending IKE PRF algorithm HMAC_SHA1[_0] 388s | token: '' '' '' 388s | - succeeded, advancing tokens 388s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 388s | appending IKE DH algorithm DH19[_0] 388s | appending IKE DH algorithm DH20[_0] 388s | appending IKE DH algorithm DH21[_0] 388s | appending IKE DH algorithm DH31[_0] 388s | appending IKE DH algorithm MODP4096[_0] 388s | appending IKE DH algorithm MODP3072[_0] 388s | appending IKE DH algorithm MODP2048[_0] 388s | appending IKE DH algorithm MODP8192[_0] 388s | parsing '3des-sha1;modp1536' for IKE 388s | proposal: '3des-sha1;modp1536' 388s | token: '' '' "3des" '-' 388s | token: '' "3des" '-' "sha1" ';' 388s | token: '-' "sha1" ';' "modp1536" '' 388s | appending IKE encryption algorithm 3DES_CBC[_0] 388s | parsing prf: 388s | appending IKE PRF algorithm HMAC_SHA1[_0] 388s | token: ';' "modp1536" '' '' 388s | - succeeded, advancing tokens 388s | parsing dh: 388s | appending IKE DH algorithm MODP1536[_0] 388s | token: '' '' '' 388s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 388s | parsing '3des;dh21' for IKE 388s | proposal: '3des;dh21' 388s | token: '' '' "3des" ';' 388s | token: '' "3des" ';' "dh21" '' 388s | token: ';' "dh21" '' '' 388s | appending IKE encryption algorithm 3DES_CBC[_0] 388s | parsing dh: 388s | appending IKE DH algorithm DH21[_0] 388s | token: '' '' '' 388s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 388s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 388s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 388s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 388s | parsing '3des-sha1;dh21' for IKE 388s | proposal: '3des-sha1;dh21' 388s | token: '' '' "3des" '-' 388s | token: '' "3des" '-' "sha1" ';' 388s | token: '-' "sha1" ';' "dh21" '' 388s | appending IKE encryption algorithm 3DES_CBC[_0] 388s | parsing prf: 388s | appending IKE PRF algorithm HMAC_SHA1[_0] 388s | token: ';' "dh21" '' '' 388s | - succeeded, advancing tokens 388s | parsing dh: 388s | appending IKE DH algorithm DH21[_0] 388s | token: '' '' '' 388s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 388s | parsing '3des-sha1-ecp_521' for IKE 388s | proposal: '3des-sha1-ecp_521' 388s | token: '' '' "3des" '-' 388s | token: '' "3des" '-' "sha1" '-' 388s | token: '-' "sha1" '-' "ecp_521" '' 388s | appending IKE encryption algorithm 3DES_CBC[_0] 388s | parsing prf: 388s | appending IKE PRF algorithm HMAC_SHA1[_0] 388s | token: '-' "ecp_521" '' '' 388s | - succeeded, advancing tokens 388s | parsing dh: 388s | appending IKE DH algorithm DH21[_0] 388s | token: '' '' '' 388s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 388s | parsing '3des+aes' for IKE 388s | proposal: '3des+aes' 388s | token: '' '' "3des" '+' 388s | token: '' "3des" '+' "aes" '' 388s | token: '+' "aes" '' '' 388s | appending IKE encryption algorithm 3DES_CBC[_0] 388s | token: '' '' '' 388s | appending IKE encryption algorithm AES_CBC[_0] 388s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 388s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 388s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 388s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 388s | appending IKE DH algorithm DH19[_0] 388s | appending IKE DH algorithm DH20[_0] 388s | appending IKE DH algorithm DH21[_0] 388s | appending IKE DH algorithm DH31[_0] 388s | appending IKE DH algorithm MODP4096[_0] 388s | appending IKE DH algorithm MODP3072[_0] 388s | appending IKE DH algorithm MODP2048[_0] 388s | appending IKE DH algorithm MODP8192[_0] 388s | parsing 'aes;none' for IKE 388s | proposal: 'aes;none' 388s | token: '' '' "aes" ';' 388s | token: '' "aes" ';' "none" '' 388s | token: ';' "none" '' '' 388s | appending IKE encryption algorithm AES_CBC[_0] 388s | parsing dh: 388s | appending IKE DH algorithm NONE[_0] 388s | token: '' '' '' 388s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 388s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 388s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 388s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 388s | parsing 'id2' for IKE 388s | proposal: 'id2' 388s | token: '' '' "id2" '' 388s | token: '' "id2" '' '' 388s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 388s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 388s | parsing '3des-id2' for IKE 388s | proposal: '3des-id2' 388s | token: '' '' "3des" '-' 388s | token: '' "3des" '-' "id2" '' 388s | token: '-' "id2" '' '' 388s | appending IKE encryption algorithm 3DES_CBC[_0] 388s | parsing prf: 388s | ike_alg_byname() failed: IKE PRF algorithm 'id2' is not recognized 388s | lookup for PRF algorithm 'id2' failed 388s | - failed, saving error 'IKE PRF algorithm 'id2' is not recognized' and tossing result 388s | parsing integ: 388s | ike_alg_byname() failed: IKE integrity algorithm 'id2' is not recognized 388s | lookup for integrity algorithm 'id2' failed 388s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'id2' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'id2' is not recognized') 388s | parsing 'aes_ccm' for IKE 388s | proposal: 'aes_ccm' 388s | token: '' '' "aes_ccm" '' 388s | token: '' "aes_ccm" '' '' 388s | alg_byname_ok() failed: IKE encryption algorithm 'aes_ccm' is not supported 388s | parsing 'aes-sha1-sha2-ecp_521' for IKE 388s | proposal: 'aes-sha1-sha2-ecp_521' 388s | token: '' '' "aes" '-' 388s | token: '' "aes" '-' "sha1" '-' 388s | token: '-' "sha1" '-' "sha2" '-' 388s | appending IKE encryption algorithm AES_CBC[_0] 388s | parsing prf: 388s | appending IKE PRF algorithm HMAC_SHA1[_0] 388s | token: '-' "sha2" '-' "ecp_521" '' 388s | - succeeded, advancing tokens 388s | parsing dh: 388s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 388s | lookup for DH algorithm 'sha2' failed 388s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 388s | parsing 'aes-sha2-sha2;ecp_521' for IKE 388s | proposal: 'aes-sha2-sha2;ecp_521' 388s | token: '' '' "aes" '-' 388s | token: '' "aes" '-' "sha2" '-' 388s | token: '-' "sha2" '-' "sha2" ';' 388s | appending IKE encryption algorithm AES_CBC[_0] 388s | parsing prf: 388s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 388s | token: '-' "sha2" ';' "ecp_521" '' 388s | - succeeded, advancing tokens 388s | parsing dh: 388s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 388s | lookup for DH algorithm 'sha2' failed 388s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 388s | parsing 'aes-sha1_96-sha2-ecp_521' for IKE 388s | proposal: 'aes-sha1_96-sha2-ecp_521' 388s | token: '' '' "aes" '-' 388s | token: '' "aes" '-' "sha1_96" '-' 388s | token: '-' "sha1_96" '-' "sha2" '-' 388s | appending IKE encryption algorithm AES_CBC[_0] 388s | parsing prf: 388s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 388s | lookup for PRF algorithm 'sha1_96' failed 388s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 388s | parsing integ: 388s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 388s | token: '-' "sha2" '-' "ecp_521" '' 388s | parsing prf: 388s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 388s | token: '-' "ecp_521" '' '' 388s | parsing dh: 388s | appending IKE DH algorithm DH21[_0] 388s | token: '' '' '' 388s | parsing 'aes-sha1_96-sha2;ecp_521' for IKE 388s | proposal: 'aes-sha1_96-sha2;ecp_521' 388s | token: '' '' "aes" '-' 388s | token: '' "aes" '-' "sha1_96" '-' 388s | token: '-' "sha1_96" '-' "sha2" ';' 388s | appending IKE encryption algorithm AES_CBC[_0] 388s | parsing prf: 388s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 388s | lookup for PRF algorithm 'sha1_96' failed 388s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 388s | parsing integ: 388s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 388s | token: '-' "sha2" ';' "ecp_521" '' 388s | parsing prf: 388s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 388s | token: ';' "ecp_521" '' '' 388s | parsing dh: 388s | appending IKE DH algorithm DH21[_0] 388s | token: '' '' '' 388s | parsing 'aes+aes-sha1+sha1-modp8192+modp8192' for IKE 388s | proposal: 'aes+aes-sha1+sha1-modp8192+modp8192' 388s | token: '' '' "aes" '+' 388s | token: '' "aes" '+' "aes" '-' 388s | token: '+' "aes" '-' "sha1" '+' 388s | appending IKE encryption algorithm AES_CBC[_0] 388s | token: '-' "sha1" '+' "sha1" '-' 388s | appending IKE encryption algorithm AES_CBC[_0] 388s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 388s | parsing prf: 388s | appending IKE PRF algorithm HMAC_SHA1[_0] 388s | token: '+' "sha1" '-' "modp8192" '+' 388s | appending IKE PRF algorithm HMAC_SHA1[_0] 388s | token: '-' "modp8192" '+' "modp8192" '' 388s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 388s | - succeeded, advancing tokens 388s | parsing dh: 388s | appending IKE DH algorithm MODP8192[_0] 388s | token: '+' "modp8192" '' '' 388s | appending IKE DH algorithm MODP8192[_0] 388s | token: '' '' '' 388s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 388s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 388s | parsing '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' for IKE 388s | proposal: '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' 388s | token: '' '' "3des" '+' 388s | token: '' "3des" '+' "aes" '+' 388s | token: '+' "aes" '+' "aes" '-' 388s | appending IKE encryption algorithm 3DES_CBC[_0] 388s | token: '+' "aes" '-' "sha2" '+' 388s | appending IKE encryption algorithm AES_CBC[_0] 388s | token: '-' "sha2" '+' "sha1" '+' 388s | appending IKE encryption algorithm AES_CBC[_0] 388s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 388s | parsing prf: 388s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 388s | token: '+' "sha1" '+' "sha1" '-' 388s | appending IKE PRF algorithm HMAC_SHA1[_0] 388s | token: '+' "sha1" '-' "modp4096" '+' 388s | appending IKE PRF algorithm HMAC_SHA1[_0] 388s | token: '-' "modp4096" '+' "modp8192" '+' 388s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 388s | - succeeded, advancing tokens 388s | parsing dh: 388s | appending IKE DH algorithm MODP4096[_0] 388s | token: '+' "modp8192" '+' "modp8192" '' 388s | appending IKE DH algorithm MODP8192[_0] 388s | token: '+' "modp8192" '' '' 388s | appending IKE DH algorithm MODP8192[_0] 388s | token: '' '' '' 388s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 388s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 388s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 388s | parsing 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' for IKE 388s | proposal: 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' 388s | token: '' '' "aes" '+' 388s | token: '' "aes" '+' "3des" '+' 388s | token: '+' "3des" '+' "aes" '-' 388s | appending IKE encryption algorithm AES_CBC[_0] 388s | token: '+' "aes" '-' "sha1" '+' 388s | appending IKE encryption algorithm 3DES_CBC[_0] 388s | token: '-' "sha1" '+' "sha2" '+' 388s | appending IKE encryption algorithm AES_CBC[_0] 388s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 388s | parsing prf: 388s | appending IKE PRF algorithm HMAC_SHA1[_0] 388s | token: '+' "sha2" '+' "sha1" '-' 388s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 388s | token: '+' "sha1" '-' "modp8192" '+' 388s | appending IKE PRF algorithm HMAC_SHA1[_0] 388s | token: '-' "modp8192" '+' "modp4096" '+' 388s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 388s | - succeeded, advancing tokens 388s | parsing dh: 388s | appending IKE DH algorithm MODP8192[_0] 388s | token: '+' "modp4096" '+' "modp8192" '' 388s | appending IKE DH algorithm MODP4096[_0] 388s | token: '+' "modp8192" '' '' 388s | appending IKE DH algorithm MODP8192[_0] 388s | token: '' '' '' 388s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 388s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 388s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 388s | parsing 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' for IKE 388s | proposal: 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' 388s | token: '' '' "aes" '+' 388s | token: '' "aes" '+' "aes" '+' 388s | token: '+' "aes" '+' "3des" '-' 388s | appending IKE encryption algorithm AES_CBC[_0] 388s | token: '+' "3des" '-' "sha1" '+' 388s | appending IKE encryption algorithm AES_CBC[_0] 388s | token: '-' "sha1" '+' "sha1" '+' 388s | appending IKE encryption algorithm 3DES_CBC[_0] 388s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 388s | parsing prf: 388s | appending IKE PRF algorithm HMAC_SHA1[_0] 388s | token: '+' "sha1" '+' "sha2" '-' 388s | appending IKE PRF algorithm HMAC_SHA1[_0] 388s | token: '+' "sha2" '-' "modp8192" '+' 388s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 388s | token: '-' "modp8192" '+' "modp8192" '+' 388s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 388s | - succeeded, advancing tokens 388s | parsing dh: 388s | appending IKE DH algorithm MODP8192[_0] 388s | token: '+' "modp8192" '+' "modp4096" '' 388s | appending IKE DH algorithm MODP8192[_0] 388s | token: '+' "modp4096" '' '' 388s | appending IKE DH algorithm MODP4096[_0] 388s | token: '' '' '' 388s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 388s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 388s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 388s | parsing 'aes+aes128+aes256' for IKE 388s | proposal: 'aes+aes128+aes256' 388s | token: '' '' "aes" '+' 388s | token: '' "aes" '+' "aes128" '+' 388s | token: '+' "aes128" '+' "aes256" '' 388s | appending IKE encryption algorithm AES_CBC[_0] 388s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 388s | token: '+' "aes256" '' '' 388s | appending IKE encryption algorithm AES_CBC[_128] 388s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 388s | token: '' '' '' 388s | appending IKE encryption algorithm AES_CBC[_256] 388s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_128 388s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 388s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 388s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 388s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 388s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 388s | appending IKE DH algorithm DH19[_0] 388s | appending IKE DH algorithm DH20[_0] 388s | appending IKE DH algorithm DH21[_0] 388s | appending IKE DH algorithm DH31[_0] 388s | appending IKE DH algorithm MODP4096[_0] 388s | appending IKE DH algorithm MODP3072[_0] 388s | appending IKE DH algorithm MODP2048[_0] 388s | appending IKE DH algorithm MODP8192[_0] 388s | parsing 'aes128+aes+aes256' for IKE 388s | proposal: 'aes128+aes+aes256' 388s | token: '' '' "aes128" '+' 388s | token: '' "aes128" '+' "aes" '+' 388s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 388s | token: '+' "aes" '+' "aes256" '' 388s | appending IKE encryption algorithm AES_CBC[_128] 388s | token: '+' "aes256" '' '' 388s | appending IKE encryption algorithm AES_CBC[_0] 388s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 388s | token: '' '' '' 388s | appending IKE encryption algorithm AES_CBC[_256] 388s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 388s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 388s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 388s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 388s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 388s | appending IKE DH algorithm DH19[_0] 388s | appending IKE DH algorithm DH20[_0] 388s | appending IKE DH algorithm DH21[_0] 388s | appending IKE DH algorithm DH31[_0] 388s | appending IKE DH algorithm MODP4096[_0] 388s | appending IKE DH algorithm MODP3072[_0] 388s | appending IKE DH algorithm MODP2048[_0] 388s | appending IKE DH algorithm MODP8192[_0] 388s | parsing 'aes128+aes256+aes' for IKE 388s | proposal: 'aes128+aes256+aes' 388s | token: '' '' "aes128" '+' 388s | token: '' "aes128" '+' "aes256" '+' 388s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 388s | token: '+' "aes256" '+' "aes" '' 388s | appending IKE encryption algorithm AES_CBC[_128] 388s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 388s | token: '+' "aes" '' '' 388s | appending IKE encryption algorithm AES_CBC[_256] 388s | token: '' '' '' 388s | appending IKE encryption algorithm AES_CBC[_0] 388s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 388s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 388s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 388s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 388s | appending IKE DH algorithm DH19[_0] 388s | appending IKE DH algorithm DH20[_0] 388s | appending IKE DH algorithm DH21[_0] 388s | appending IKE DH algorithm DH31[_0] 388s | appending IKE DH algorithm MODP4096[_0] 388s | appending IKE DH algorithm MODP3072[_0] 388s | appending IKE DH algorithm MODP2048[_0] 388s | appending IKE DH algorithm MODP8192[_0] 388s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for IKE 388s | proposal: 'aes-sha1-modp8192' 388s | token: '' '' "aes" '-' 388s | token: '' "aes" '-' "sha1" '-' 388s | token: '-' "sha1" '-' "modp8192" '' 388s | appending IKE encryption algorithm AES_CBC[_0] 388s | parsing prf: 388s | appending IKE PRF algorithm HMAC_SHA1[_0] 388s | token: '-' "modp8192" '' '' 388s | - succeeded, advancing tokens 388s | parsing dh: 388s | appending IKE DH algorithm MODP8192[_0] 388s | token: '' '' '' 388s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 388s | proposal: 'aes-sha1-modp8192' 388s | token: '' '' "aes" '-' 388s | token: '' "aes" '-' "sha1" '-' 388s | token: '-' "sha1" '-' "modp8192" '' 388s | appending IKE encryption algorithm AES_CBC[_0] 388s | parsing prf: 388s | appending IKE PRF algorithm HMAC_SHA1[_0] 388s | token: '-' "modp8192" '' '' 388s | - succeeded, advancing tokens 388s | parsing dh: 388s | appending IKE DH algorithm MODP8192[_0] 388s | token: '' '' '' 388s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 388s | proposal: 'aes-sha1-modp8192' 388s | token: '' '' "aes" '-' 388s | token: '' "aes" '-' "sha1" '-' 388s | token: '-' "sha1" '-' "modp8192" '' 388s | appending IKE encryption algorithm AES_CBC[_0] 388s | parsing prf: 388s | appending IKE PRF algorithm HMAC_SHA1[_0] 388s | token: '-' "modp8192" '' '' 388s | - succeeded, advancing tokens 388s | parsing dh: 388s | appending IKE DH algorithm MODP8192[_0] 388s | token: '' '' '' 388s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 388s | parsing 'aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' for IKE 388s | proposal: 'aes-sha1-modp8192' 388s | token: '' '' "aes" '-' 388s | token: '' "aes" '-' "sha1" '-' 388s | token: '-' "sha1" '-' "modp8192" '' 388s | appending IKE encryption algorithm AES_CBC[_0] 388s | parsing prf: 388s | appending IKE PRF algorithm HMAC_SHA1[_0] 388s | token: '-' "modp8192" '' '' 388s | - succeeded, advancing tokens 388s | parsing dh: 388s | appending IKE DH algorithm MODP8192[_0] 388s | token: '' '' '' 388s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 388s | proposal: 'aes-sha2-modp8192' 388s | token: '' '' "aes" '-' 388s | token: '' "aes" '-' "sha2" '-' 388s | token: '-' "sha2" '-' "modp8192" '' 388s | appending IKE encryption algorithm AES_CBC[_0] 388s | parsing prf: 388s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 388s | token: '-' "modp8192" '' '' 388s | - succeeded, advancing tokens 388s | parsing dh: 388s | appending IKE DH algorithm MODP8192[_0] 388s | token: '' '' '' 388s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 388s | proposal: 'aes-sha1-modp8192' 388s | token: '' '' "aes" '-' 388s | token: '' "aes" '-' "sha1" '-' 388s | token: '-' "sha1" '-' "modp8192" '' 388s | appending IKE encryption algorithm AES_CBC[_0] 388s | parsing prf: 388s | appending IKE PRF algorithm HMAC_SHA1[_0] 388s | token: '-' "modp8192" '' '' 388s | - succeeded, advancing tokens 388s | parsing dh: 388s | appending IKE DH algorithm MODP8192[_0] 388s | token: '' '' '' 388s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 388s | parsing 'aes_gcm' for IKE 388s | proposal: 'aes_gcm' 388s | token: '' '' "aes_gcm" '' 388s | token: '' "aes_gcm" '' '' 388s | token: '' '' '' 388s | appending IKE encryption algorithm AES_GCM_16[_0] 388s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 388s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 388s | appending IKE integrity algorithm NONE[_0] 388s | appending IKE DH algorithm DH19[_0] 388s | appending IKE DH algorithm DH20[_0] 388s | appending IKE DH algorithm DH21[_0] 388s | appending IKE DH algorithm DH31[_0] 388s | appending IKE DH algorithm MODP4096[_0] 388s | appending IKE DH algorithm MODP3072[_0] 388s | appending IKE DH algorithm MODP2048[_0] 388s | appending IKE DH algorithm MODP8192[_0] 388s | parsing 'aes_gcm-sha2' for IKE 388s | proposal: 'aes_gcm-sha2' 388s | token: '' '' "aes_gcm" '-' 388s | token: '' "aes_gcm" '-' "sha2" '' 388s | token: '-' "sha2" '' '' 388s | appending IKE encryption algorithm AES_GCM_16[_0] 388s | parsing prf: 388s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 388s | token: '' '' '' 388s | - succeeded, advancing tokens 388s | appending IKE integrity algorithm NONE[_0] 388s | appending IKE DH algorithm DH19[_0] 388s | appending IKE DH algorithm DH20[_0] 388s | appending IKE DH algorithm DH21[_0] 388s | appending IKE DH algorithm DH31[_0] 388s | appending IKE DH algorithm MODP4096[_0] 388s | appending IKE DH algorithm MODP3072[_0] 388s | appending IKE DH algorithm MODP2048[_0] 388s | appending IKE DH algorithm MODP8192[_0] 388s | parsing 'aes_gcm-sha2-modp2048' for IKE 388s | proposal: 'aes_gcm-sha2-modp2048' 388s | token: '' '' "aes_gcm" '-' 388s | token: '' "aes_gcm" '-' "sha2" '-' 388s | token: '-' "sha2" '-' "modp2048" '' 388s | appending IKE encryption algorithm AES_GCM_16[_0] 388s | parsing prf: 388s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 388s | token: '-' "modp2048" '' '' 388s | - succeeded, advancing tokens 388s | parsing dh: 388s | appending IKE DH algorithm MODP2048[_0] 388s | token: '' '' '' 388s | appending IKE integrity algorithm NONE[_0] 388s | parsing 'aes_gcm-sha2;modp2048' for IKE 388s | proposal: 'aes_gcm-sha2;modp2048' 388s | token: '' '' "aes_gcm" '-' 388s | token: '' "aes_gcm" '-' "sha2" ';' 388s | token: '-' "sha2" ';' "modp2048" '' 388s | appending IKE encryption algorithm AES_GCM_16[_0] 388s | parsing prf: 388s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 388s | token: ';' "modp2048" '' '' 388s | - succeeded, advancing tokens 388s | parsing dh: 388s | appending IKE DH algorithm MODP2048[_0] 388s | token: '' '' '' 388s | appending IKE integrity algorithm NONE[_0] 388s | parsing 'aes_gcm-modp2048' for IKE 388s | proposal: 'aes_gcm-modp2048' 388s | token: '' '' "aes_gcm" '-' 388s | token: '' "aes_gcm" '-' "modp2048" '' 388s | token: '-' "modp2048" '' '' 388s | appending IKE encryption algorithm AES_GCM_16[_0] 388s | parsing prf: 388s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 388s | lookup for PRF algorithm 'modp2048' failed 388s | - failed, saving error 'IKE PRF algorithm 'modp2048' is not recognized' and tossing result 388s | parsing integ: 388s | ike_alg_byname() failed: IKE integrity algorithm 'modp2048' is not recognized 388s | lookup for integrity algorithm 'modp2048' failed 388s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'modp2048' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'modp2048' is not recognized') 388s | parsing 'aes_gcm;modp2048' for IKE 388s | proposal: 'aes_gcm;modp2048' 388s | token: '' '' "aes_gcm" ';' 388s | token: '' "aes_gcm" ';' "modp2048" '' 388s | token: ';' "modp2048" '' '' 388s | appending IKE encryption algorithm AES_GCM_16[_0] 388s | parsing dh: 388s | appending IKE DH algorithm MODP2048[_0] 388s | token: '' '' '' 388s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 388s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 388s | appending IKE integrity algorithm NONE[_0] 388s | parsing 'aes_gcm-none' for IKE 388s | proposal: 'aes_gcm-none' 388s | token: '' '' "aes_gcm" '-' 388s | token: '' "aes_gcm" '-' "none" '' 388s | token: '-' "none" '' '' 388s | appending IKE encryption algorithm AES_GCM_16[_0] 388s | parsing prf: 388s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 388s | lookup for PRF algorithm 'none' failed 388s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 388s | parsing integ: 388s | appending IKE integrity algorithm NONE[_0] 388s | token: '' '' '' 388s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 388s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 388s | appending IKE DH algorithm DH19[_0] 388s | appending IKE DH algorithm DH20[_0] 388s | appending IKE DH algorithm DH21[_0] 388s | appending IKE DH algorithm DH31[_0] 388s | appending IKE DH algorithm MODP4096[_0] 388s | appending IKE DH algorithm MODP3072[_0] 388s | appending IKE DH algorithm MODP2048[_0] 388s | appending IKE DH algorithm MODP8192[_0] 388s | parsing 'aes_gcm-none-sha2' for IKE 388s | proposal: 'aes_gcm-none-sha2' 388s | token: '' '' "aes_gcm" '-' 388s | token: '' "aes_gcm" '-' "none" '-' 388s | token: '-' "none" '-' "sha2" '' 388s | appending IKE encryption algorithm AES_GCM_16[_0] 388s | parsing prf: 388s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 388s | lookup for PRF algorithm 'none' failed 388s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 388s | parsing integ: 388s | appending IKE integrity algorithm NONE[_0] 388s | token: '-' "sha2" '' '' 388s | parsing prf: 388s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 388s | token: '' '' '' 388s | appending IKE DH algorithm DH19[_0] 388s | appending IKE DH algorithm DH20[_0] 388s | appending IKE DH algorithm DH21[_0] 388s | appending IKE DH algorithm DH31[_0] 388s | appending IKE DH algorithm MODP4096[_0] 388s | appending IKE DH algorithm MODP3072[_0] 388s | appending IKE DH algorithm MODP2048[_0] 388s | appending IKE DH algorithm MODP8192[_0] 388s | parsing 'aes_gcm-none-sha2-modp2048' for IKE 388s | proposal: 'aes_gcm-none-sha2-modp2048' 388s | token: '' '' "aes_gcm" '-' 388s | token: '' "aes_gcm" '-' "none" '-' 388s | token: '-' "none" '-' "sha2" '-' 388s | appending IKE encryption algorithm AES_GCM_16[_0] 388s | parsing prf: 388s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 388s | lookup for PRF algorithm 'none' failed 388s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 388s | parsing integ: 388s | appending IKE integrity algorithm NONE[_0] 388s | token: '-' "sha2" '-' "modp2048" '' 388s | parsing prf: 388s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 388s | token: '-' "modp2048" '' '' 388s | parsing dh: 388s | appending IKE DH algorithm MODP2048[_0] 388s | token: '' '' '' 388s | parsing 'aes_gcm-none-sha2;modp2048' for IKE 388s | proposal: 'aes_gcm-none-sha2;modp2048' 388s | token: '' '' "aes_gcm" '-' 388s | token: '' "aes_gcm" '-' "none" '-' 388s | token: '-' "none" '-' "sha2" ';' 388s | appending IKE encryption algorithm AES_GCM_16[_0] 388s | parsing prf: 388s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 388s | lookup for PRF algorithm 'none' failed 388s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 388s | parsing integ: 388s | appending IKE integrity algorithm NONE[_0] 388s | token: '-' "sha2" ';' "modp2048" '' 388s | parsing prf: 388s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 388s | token: ';' "modp2048" '' '' 388s | parsing dh: 388s | appending IKE DH algorithm MODP2048[_0] 388s | token: '' '' '' 388s | parsing 'aes_gcm-none-modp2048' for IKE 388s | proposal: 'aes_gcm-none-modp2048' 388s | token: '' '' "aes_gcm" '-' 388s | token: '' "aes_gcm" '-' "none" '-' 388s | token: '-' "none" '-' "modp2048" '' 388s | appending IKE encryption algorithm AES_GCM_16[_0] 388s | parsing prf: 388s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 388s | lookup for PRF algorithm 'none' failed 388s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 388s | parsing integ: 388s | appending IKE integrity algorithm NONE[_0] 388s | token: '-' "modp2048" '' '' 388s | parsing prf: 388s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 388s | lookup for PRF algorithm 'modp2048' failed 388s | -- failed 'IKE PRF algorithm 'modp2048' is not recognized' 388s | parsing 'aes_gcm-none;modp2048' for IKE 388s | proposal: 'aes_gcm-none;modp2048' 388s | token: '' '' "aes_gcm" '-' 388s | token: '' "aes_gcm" '-' "none" ';' 388s | token: '-' "none" ';' "modp2048" '' 388s | appending IKE encryption algorithm AES_GCM_16[_0] 388s | parsing prf: 388s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 388s | lookup for PRF algorithm 'none' failed 388s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 388s | parsing integ: 388s | appending IKE integrity algorithm NONE[_0] 388s | token: ';' "modp2048" '' '' 388s | parsing dh: 388s | appending IKE DH algorithm MODP2048[_0] 388s | token: '' '' '' 388s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 388s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 388s | parsing 'aes_gcm-sha1-none-modp2048' for IKE 388s | proposal: 'aes_gcm-sha1-none-modp2048' 388s | token: '' '' "aes_gcm" '-' 388s | token: '' "aes_gcm" '-' "sha1" '-' 388s | token: '-' "sha1" '-' "none" '-' 388s | appending IKE encryption algorithm AES_GCM_16[_0] 388s | parsing prf: 388s | appending IKE PRF algorithm HMAC_SHA1[_0] 388s | token: '-' "none" '-' "modp2048" '' 388s | - succeeded, advancing tokens 388s | parsing dh: 388s | appending IKE DH algorithm NONE[_0] 388s | token: '-' "modp2048" '' '' 388s | parsing 'aes_gcm-sha1-none;modp2048' for IKE 388s | proposal: 'aes_gcm-sha1-none;modp2048' 388s | token: '' '' "aes_gcm" '-' 388s | token: '' "aes_gcm" '-' "sha1" '-' 388s | token: '-' "sha1" '-' "none" ';' 388s | appending IKE encryption algorithm AES_GCM_16[_0] 388s | parsing prf: 388s | appending IKE PRF algorithm HMAC_SHA1[_0] 388s | token: '-' "none" ';' "modp2048" '' 388s | - succeeded, advancing tokens 388s | parsing dh: 388s | appending IKE DH algorithm NONE[_0] 388s | token: ';' "modp2048" '' '' 388s | parsing 'aes+aes_gcm' for IKE 388s | proposal: 'aes+aes_gcm' 388s | token: '' '' "aes" '+' 388s | token: '' "aes" '+' "aes_gcm" '' 388s | token: '+' "aes_gcm" '' '' 388s | appending IKE encryption algorithm AES_CBC[_0] 388s | token: '' '' '' 388s | appending IKE encryption algorithm AES_GCM_16[_0] 388s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 388s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 388s | appending IKE DH algorithm DH19[_0] 388s | appending IKE DH algorithm DH20[_0] 388s | appending IKE DH algorithm DH21[_0] 388s | appending IKE DH algorithm DH31[_0] 388s | appending IKE DH algorithm MODP4096[_0] 388s | appending IKE DH algorithm MODP3072[_0] 388s | appending IKE DH algorithm MODP2048[_0] 388s | appending IKE DH algorithm MODP8192[_0] 388s | parsing ',' for IKE 388s | proposal: '' 388s | token: '' '' "" '' 388s | token: '' "" '' '' 388s | parsing 'aes,' for IKE 388s | proposal: 'aes' 388s | token: '' '' "aes" '' 388s | token: '' "aes" '' '' 388s | token: '' '' '' 388s | appending IKE encryption algorithm AES_CBC[_0] 388s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 388s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 388s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 388s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 388s | appending IKE DH algorithm DH19[_0] 388s | appending IKE DH algorithm DH20[_0] 388s | appending IKE DH algorithm DH21[_0] 388s | appending IKE DH algorithm DH31[_0] 388s | appending IKE DH algorithm MODP4096[_0] 388s | appending IKE DH algorithm MODP3072[_0] 388s | appending IKE DH algorithm MODP2048[_0] 388s | appending IKE DH algorithm MODP8192[_0] 388s | proposal: '' 388s | token: '' '' "" '' 388s | token: '' "" '' '' 388s | parsing 'aes,,aes' for IKE 388s | proposal: 'aes' 388s | token: '' '' "aes" '' 388s | token: '' "aes" '' '' 388s | token: '' '' '' 388s | appending IKE encryption algorithm AES_CBC[_0] 388s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 388s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 388s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 388s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 388s | appending IKE DH algorithm DH19[_0] 388s | appending IKE DH algorithm DH20[_0] 388s | appending IKE DH algorithm DH21[_0] 388s | appending IKE DH algorithm DH31[_0] 388s | appending IKE DH algorithm MODP4096[_0] 388s | appending IKE DH algorithm MODP3072[_0] 388s | appending IKE DH algorithm MODP2048[_0] 388s | appending IKE DH algorithm MODP8192[_0] 388s | proposal: '' 388s | token: '' '' "" '' 388s | token: '' "" '' '' 388s | parsing ',aes' for IKE 388s | proposal: '' 388s | token: '' '' "" '' 388s | token: '' "" '' '' 388s | parsing '-' for IKE 388s | proposal: '-' 388s | token: '' '' "" '-' 388s | token: '' "" '-' "" '' 388s | parsing '+' for IKE 388s | proposal: '+' 388s | token: '' '' "" '+' 388s | token: '' "" '+' "" '' 388s | parsing ';' for IKE 388s | proposal: ';' 388s | token: '' '' "" ';' 388s | token: '' "" ';' "" '' 388s | parsing 'aes-' for IKE 388s | proposal: 'aes-' 388s | token: '' '' "aes" '-' 388s | token: '' "aes" '-' "" '' 388s | token: '-' "" '' '' 388s | appending IKE encryption algorithm AES_CBC[_0] 388s | parsing prf: 388s | - failed, saving error 'IKE PRF algorithm is empty' and tossing result 388s | parsing integ: 388s | - and - failed, returning earlier PRF error 'IKE PRF algorithm is empty' and discarding INTEG error 'IKE integrity algorithm is empty') 388s | parsing 'aes+' for IKE 388s | proposal: 'aes+' 388s | token: '' '' "aes" '+' 388s | token: '' "aes" '+' "" '' 388s | token: '+' "" '' '' 388s | appending IKE encryption algorithm AES_CBC[_0] 388s | parsing 'aes;' for IKE 388s | proposal: 'aes;' 388s | token: '' '' "aes" ';' 388s | token: '' "aes" ';' "" '' 388s | token: ';' "" '' '' 388s | appending IKE encryption algorithm AES_CBC[_0] 388s | parsing dh: 388s | ... failed 'IKE DH algorithm is empty' 388s | parsing '-aes' for IKE 388s | proposal: '-aes' 388s | token: '' '' "" '-' 388s | token: '' "" '-' "aes" '' 388s | parsing '+aes' for IKE 388s | proposal: '+aes' 388s | token: '' '' "" '+' 388s | token: '' "" '+' "aes" '' 388s | parsing ';aes' for IKE 388s | proposal: ';aes' 388s | token: '' '' "" ';' 388s ERROR: IKE encryption algorithm is empty 388s algparse -v2 'ike=aes;' (expect ERROR) 388s ERROR: IKE DH algorithm is empty 388s algparse -v2 'ike=-aes' (expect ERROR) 388s ERROR: IKE encryption algorithm is empty 388s algparse -v2 'ike=+aes' (expect ERROR) 388s ERROR: IKE encryption algorithm is empty 388s algparse -v2 'ike=;aes' (expect ERROR) 388s ERROR: IKE encryption algorithm is empty 388s algparse -v2 'ike=aes+-' (expect ERROR) 388s ERROR: IKE encryption algorithm is empty 388s algparse -v2 'ike=aes+;' (expect ERROR) 388s ERROR: IKE encryption algorithm is empty 388s algparse -v2 'ike=aes++' (expect ERROR) 388s ERROR: IKE encryption algorithm is empty 388s testing -ta 388s | token: '' "" ';' "aes" '' 388s | parsing 'aes+-' for IKE 388s | proposal: 'aes+-' 388s | token: '' '' "aes" '+' 388s | token: '' "aes" '+' "" '-' 388s | token: '+' "" '-' "" '' 388s | appending IKE encryption algorithm AES_CBC[_0] 388s | parsing 'aes+;' for IKE 388s | proposal: 'aes+;' 388s | token: '' '' "aes" '+' 388s | token: '' "aes" '+' "" ';' 388s | token: '+' "" ';' "" '' 388s | appending IKE encryption algorithm AES_CBC[_0] 388s | parsing 'aes++' for IKE 388s | proposal: 'aes++' 388s | token: '' '' "aes" '+' 388s | token: '' "aes" '+' "" '+' 388s | token: '+' "" '+' "" '' 388s | appending IKE encryption algorithm AES_CBC[_0] 388s ipsec algparse: leak detective found no leaks 388s ipsec algparse: Encryption algorithms: 388s ipsec algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 388s ipsec algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 388s ipsec algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 388s ipsec algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 388s ipsec algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 388s ipsec algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 388s ipsec algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 388s ipsec algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 388s ipsec algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 388s ipsec algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 388s ipsec algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 388s ipsec algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 388s ipsec algparse: NULL [] IKEv1: ESP IKEv2: ESP NULL 388s ipsec algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 388s ipsec algparse: Hash algorithms: 388s ipsec algparse: MD5 IKEv1: IKE IKEv2: NSS 388s ipsec algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 388s ipsec algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 388s ipsec algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 388s ipsec algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 388s ipsec algparse: IDENTITY IKEv1: IKEv2: FIPS 388s ipsec algparse: PRF algorithms: 388s ipsec algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 388s ipsec algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 388s ipsec algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 388s ipsec algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 388s ipsec algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 388s ipsec algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 388s ipsec algparse: Integrity algorithms: 388s ipsec algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 388s ipsec algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 388s ipsec algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 388s ipsec algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 388s ipsec algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 388s ipsec algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 388s ipsec algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 388s ipsec algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 388s ipsec algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 388s ipsec algparse: DH algorithms: 388s ipsec algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 388s ipsec algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 388s ipsec algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 388s ipsec algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 388s ipsec algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 388s ipsec algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 388s ipsec algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 388s ipsec algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 388s ipsec algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 388s ipsec algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 388s ipsec algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 388s ipsec algparse: IPCOMP algorithms: 388s ipsec algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 388s ipsec algparse: LZS IKEv1: IKEv2: ESP AH FIPS 388s ipsec algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 388s ipsec algparse: testing CAMELLIA_CBC: 388s ipsec algparse: Camellia: 16 bytes with 128-bit key 388s | decode_to_chunk() raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 388s | decode_to_chunk() output: 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55773b0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: CAMELLIA_CBC 388s | flags: ENCRYPT+DECRYPT 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923484d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577378 388s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 388s | decode_to_mac() output: 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | decode_to_chunk() new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 388s | decode_to_chunk() output: 388s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 388s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 388s | decode_to_chunk() output: 388s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | decode_to_chunk() ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 388s | decode_to_chunk() output: 388s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 388s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 388s | using IKEv1 IV 388s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 388s | verify_bytes() Camellia: 16 bytes with 128-bit key: encrypt: ok 388s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 388s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 388s | decode_to_mac() output: 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | decode_to_chunk() new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 388s | decode_to_chunk() output: 388s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 388s | decode_to_chunk() ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 388s | decode_to_chunk() output: 388s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 388s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 388s | decode_to_chunk() output: 388s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 388s | using IKEv1 IV 388s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 388s | verify_bytes() Camellia: 16 bytes with 128-bit key: decrypt: ok 388s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 388s ipsec algparse: Camellia: 16 bytes with 128-bit key 388s | decode_to_chunk() raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF" 388s | decode_to_chunk() output: 388s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55773b0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: CAMELLIA_CBC 388s | flags: ENCRYPT+DECRYPT 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923484d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577378 388s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 388s | decode_to_mac() output: 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | decode_to_chunk() new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 388s | decode_to_chunk() output: 388s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 388s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 388s | decode_to_chunk() output: 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 388s | decode_to_chunk() ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 388s | decode_to_chunk() output: 388s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 388s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 388s | using IKEv1 IV 388s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 388s | verify_bytes() Camellia: 16 bytes with 128-bit key: encrypt: ok 388s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 388s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 388s | decode_to_mac() output: 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | decode_to_chunk() new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 388s | decode_to_chunk() output: 388s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 388s | decode_to_chunk() ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 388s | decode_to_chunk() output: 388s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 388s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 388s | decode_to_chunk() output: 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 388s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 388s | using IKEv1 IV 388s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 388s | verify_bytes() Camellia: 16 bytes with 128-bit key: decrypt: ok 388s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 388s ipsec algparse: Camellia: 16 bytes with 256-bit key 388s | decode_to_chunk() raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 388s | decode_to_chunk() output: 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55773b0 388s | key-offset: 0, key-size: 32 388s | EXTRACT_KEY_FROM_KEY: 388s | target: CAMELLIA_CBC 388s | flags: ENCRYPT+DECRYPT 388s | key_size: 32-bytes 388s | base: base-key@0x5c71923484d0 (48-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577378 388s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 388s | decode_to_mac() output: 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | decode_to_chunk() new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 388s | decode_to_chunk() output: 388s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 388s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 388s | decode_to_chunk() output: 388s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | decode_to_chunk() ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 388s | decode_to_chunk() output: 388s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 388s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 388s | using IKEv1 IV 388s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 388s | verify_bytes() Camellia: 16 bytes with 256-bit key: encrypt: ok 388s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 388s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 388s | decode_to_mac() output: 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | decode_to_chunk() new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 388s | decode_to_chunk() output: 388s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 388s | decode_to_chunk() ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 388s | decode_to_chunk() output: 388s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 388s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 388s | decode_to_chunk() output: 388s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 388s | using IKEv1 IV 388s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 388s | verify_bytes() Camellia: 16 bytes with 256-bit key: decrypt: ok 388s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 388s ipsec algparse: Camellia: 16 bytes with 256-bit key 388s | decode_to_chunk() raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF FF EE DD CC BB AA 99 88 77 66 55 44 33 22 11 00" 388s | decode_to_chunk() output: 388s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 388s | ff ee dd cc bb aa 99 88 77 66 55 44 33 22 11 00 ........wfUD3".. 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55773b0 388s | key-offset: 0, key-size: 32 388s | EXTRACT_KEY_FROM_KEY: 388s | target: CAMELLIA_CBC 388s | flags: ENCRYPT+DECRYPT 388s | key_size: 32-bytes 388s | base: base-key@0x5c71923484d0 (48-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577378 388s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 388s | decode_to_mac() output: 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | decode_to_chunk() new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 388s | decode_to_chunk() output: 388s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 388s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 388s | decode_to_chunk() output: 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 388s | decode_to_chunk() ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 388s | decode_to_chunk() output: 388s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 388s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 388s | using IKEv1 IV 388s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 388s | verify_bytes() Camellia: 16 bytes with 256-bit key: encrypt: ok 388s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 388s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 388s | decode_to_mac() output: 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | decode_to_chunk() new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 388s | decode_to_chunk() output: 388s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 388s | decode_to_chunk() ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 388s | decode_to_chunk() output: 388s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 388s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 388s | decode_to_chunk() output: 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 388s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 388s | using IKEv1 IV 388s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 388s | verify_bytes() Camellia: 16 bytes with 256-bit key: decrypt: ok 388s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 388s ipsec algparse: testing AES_GCM_16: 388s ipsec algparse: empty string 388s | decode_to_chunk() raw_key: input "0xcf063a34d4a9a76c2c86787d3f96db71" 388s | decode_to_chunk() output: 388s | cf 06 3a 34 d4 a9 a7 6c 2c 86 78 7d 3f 96 db 71 ..:4...l,.x}?..q 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55772f0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_GCM 388s | flags: ENCRYPT+DECRYPT 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923484d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc55772b8 388s | decode_to_chunk() salted IV: input "0x113b9785971864c83b01c787" 388s | decode_to_chunk() output: 388s | 11 3b 97 85 97 18 64 c8 3b 01 c7 87 .;....d.;... 388s | decode_to_chunk() AAD: input "" 388s | decode_to_chunk() output: 388s | 388s | decode_to_chunk() plaintext: input "" 388s | decode_to_chunk() output: 388s | 388s | decode_to_chunk() ciphertext: input "" 388s | decode_to_chunk() output: 388s | 388s | decode_to_chunk() tag: input "0x72ac8493e3a5228b5d130a69d2510e42" 388s | decode_to_chunk() output: 388s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 388s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 text+tag in: 388s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 388s | verify_bytes() empty string: output ciphertext: ok 388s | verify_bytes() empty string: TAG: ok 388s | test_gcm_vector() text+tag out: 388s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 388s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 text+tag in: 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | verify_bytes() empty string: output ciphertext: ok 388s | verify_bytes() empty string: TAG: ok 388s | test_gcm_vector() text+tag out: 388s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 388s ipsec algparse: one block 388s | decode_to_chunk() raw_key: input "0xe98b72a9881a84ca6b76e0f43e68647a" 388s | decode_to_chunk() output: 388s | e9 8b 72 a9 88 1a 84 ca 6b 76 e0 f4 3e 68 64 7a ..r.....kv..>hdz 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55772f0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_GCM 388s | flags: ENCRYPT+DECRYPT 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923484d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc55772b8 388s | decode_to_chunk() salted IV: input "0x8b23299fde174053f3d652ba" 388s | decode_to_chunk() output: 388s | 8b 23 29 9f de 17 40 53 f3 d6 52 ba .#)...@S..R. 388s | decode_to_chunk() AAD: input "" 388s | decode_to_chunk() output: 388s | 388s | decode_to_chunk() plaintext: input "0x28286a321293253c3e0aa2704a278032" 388s | decode_to_chunk() output: 388s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 388s | decode_to_chunk() ciphertext: input "0x5a3c1cf1985dbb8bed818036fdd5ab42" 388s | decode_to_chunk() output: 388s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 388s | decode_to_chunk() tag: input "0x23c7ab0f952b7091cd324835043b5eb5" 388s | decode_to_chunk() output: 388s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 388s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 text+tag in: 388s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 388s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 388s | verify_bytes() one block: output ciphertext: ok 388s | verify_bytes() one block: TAG: ok 388s | test_gcm_vector() text+tag out: 388s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 388s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 388s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 text+tag in: 388s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | verify_bytes() one block: output ciphertext: ok 388s | verify_bytes() one block: TAG: ok 388s | test_gcm_vector() text+tag out: 388s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 388s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 388s ipsec algparse: two blocks 388s | decode_to_chunk() raw_key: input "0xbfd414a6212958a607a0f5d3ab48471d" 388s | decode_to_chunk() output: 388s | bf d4 14 a6 21 29 58 a6 07 a0 f5 d3 ab 48 47 1d ....!)X......HG. 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55772f0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_GCM 388s | flags: ENCRYPT+DECRYPT 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923484d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc55772b8 388s | decode_to_chunk() salted IV: input "0x86d8ea0ab8e40dcc481cd0e2" 388s | decode_to_chunk() output: 388s | 86 d8 ea 0a b8 e4 0d cc 48 1c d0 e2 ........H... 388s | decode_to_chunk() AAD: input "" 388s | decode_to_chunk() output: 388s | 388s | decode_to_chunk() plaintext: input "0xa6b76a066e63392c9443e60272ceaeb9d25c991b0f2e55e2804e168c05ea591a" 388s | decode_to_chunk() output: 388s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 388s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 388s | decode_to_chunk() ciphertext: input "0x62171db33193292d930bf6647347652c1ef33316d7feca99d54f1db4fcf513f8" 388s | decode_to_chunk() output: 388s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 388s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 388s | decode_to_chunk() tag: input "0xc28280aa5c6c7a8bd366f28c1cfd1f6e" 388s | decode_to_chunk() output: 388s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 388s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 388s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 388s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 388s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 388s | verify_bytes() two blocks: output ciphertext: ok 388s | verify_bytes() two blocks: TAG: ok 388s | test_gcm_vector() text+tag out: 388s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 388s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 388s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 388s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 388s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 388s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | verify_bytes() two blocks: output ciphertext: ok 388s | verify_bytes() two blocks: TAG: ok 388s | test_gcm_vector() text+tag out: 388s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 388s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 388s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 388s ipsec algparse: two blocks with associated data 388s | decode_to_chunk() raw_key: input "0x95bcde70c094f04e3dd8259cafd88ce8" 388s | decode_to_chunk() output: 388s | 95 bc de 70 c0 94 f0 4e 3d d8 25 9c af d8 8c e8 ...p...N=.%..... 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55772f0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_GCM 388s | flags: ENCRYPT+DECRYPT 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923484d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc55772b8 388s | decode_to_chunk() salted IV: input "0x12cf097ad22380432ff40a5c" 388s | decode_to_chunk() output: 388s | 12 cf 09 7a d2 23 80 43 2f f4 0a 5c ...z.#.C/..\ 388s | decode_to_chunk() AAD: input "0xc783a0cca10a8d9fb8d27d69659463f2" 388s | decode_to_chunk() output: 388s | c7 83 a0 cc a1 0a 8d 9f b8 d2 7d 69 65 94 63 f2 ..........}ie.c. 388s | decode_to_chunk() plaintext: input "0x32f51e837a9748838925066d69e87180f34a6437e6b396e5643b34cb2ee4f7b1" 388s | decode_to_chunk() output: 388s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 388s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 388s | decode_to_chunk() ciphertext: input "0x8a023ba477f5b809bddcda8f55e09064d6d88aaec99c1e141212ea5b08503660" 388s | decode_to_chunk() output: 388s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 388s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 388s | decode_to_chunk() tag: input "0x562f500dae635d60a769b466e15acd1e" 388s | decode_to_chunk() output: 388s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 388s | test_gcm_vector() DECRYPT: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 388s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 388s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 388s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 388s | verify_bytes() two blocks with associated data: output ciphertext: ok 388s | verify_bytes() two blocks with associated data: TAG: ok 388s | test_gcm_vector() text+tag out: 388s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 388s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 388s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 388s | test_gcm_vector() ENCRYPT: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 388s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 388s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | verify_bytes() two blocks with associated data: output ciphertext: ok 388s | verify_bytes() two blocks with associated data: TAG: ok 388s | test_gcm_vector() text+tag out: 388s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 388s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 388s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 388s ipsec algparse: testing AES_CTR: 388s ipsec algparse: Encrypting 16 octets using AES-CTR with 128-bit key 388s | decode_to_chunk() raw_key: input "0x AE 68 52 F8 12 10 67 CC 4B F7 A5 76 55 77 F3 9E" 388s | decode_to_chunk() output: 388s | ae 68 52 f8 12 10 67 cc 4b f7 a5 76 55 77 f3 9e .hR...g.K..vUw.. 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55773b0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_CTR 388s | flags: ENCRYPT+DECRYPT 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923484d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577378 388s | decode_to_mac() input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 388s | decode_to_mac() output: 388s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 388s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 388s | decode_to_chunk() output: 388s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 388s | decode_to_chunk() Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 388s | decode_to_chunk() output: 388s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 388s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 388s | decode_to_chunk() output: 388s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 388s | cipher_op_ctr_nss() enter AES_CTR 0x5c7192348d60 use IKEv1 IV wire_iv 0 count 0 388s | ctr_param: count 32 iv 00000030000000000000000000000001 388s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 388s | do_aes_ctr: exit 388s | cipher_op_context_destroy_ctr_nss() 388s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: encrypt: ok 388s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: counter-block: ok 388s | decode_to_mac() input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 388s | decode_to_mac() output: 388s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 388s | decode_to_chunk() Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 388s | decode_to_chunk() output: 388s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 388s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 388s | decode_to_chunk() output: 388s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 388s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 388s | decode_to_chunk() output: 388s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 388s | cipher_op_ctr_nss() enter AES_CTR 0x5c7192348d60 use IKEv1 IV wire_iv 0 count 0 388s | ctr_param: count 32 iv 00000030000000000000000000000001 388s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 388s | do_aes_ctr: exit 388s | cipher_op_context_destroy_ctr_nss() 388s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: decrypt: ok 388s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: counter-block: ok 388s ipsec algparse: Encrypting 32 octets using AES-CTR with 128-bit key 388s | decode_to_chunk() raw_key: input "0x 7E 24 06 78 17 FA E0 D7 43 D6 CE 1F 32 53 91 63" 388s | decode_to_chunk() output: 388s | 7e 24 06 78 17 fa e0 d7 43 d6 ce 1f 32 53 91 63 ~$.x....C...2S.c 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55773b0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_CTR 388s | flags: ENCRYPT+DECRYPT 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923484d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577378 388s | decode_to_mac() input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 388s | decode_to_mac() output: 388s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 388s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 388s | decode_to_chunk() output: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 388s | decode_to_chunk() Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 388s | decode_to_chunk() output: 388s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 388s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 388s | decode_to_chunk() expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 388s | decode_to_chunk() output: 388s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 .l...T;Y.H...... 388s | cipher_op_ctr_nss() enter AES_CTR 0x5c7192345390 use IKEv1 IV wire_iv 0 count 0 388s | ctr_param: count 32 iv 006cb6dbc0543b59da48d90b00000001 388s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 388s | do_aes_ctr: exit 388s | cipher_op_context_destroy_ctr_nss() 388s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: encrypt: ok 388s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: counter-block: ok 388s | decode_to_mac() input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 388s | decode_to_mac() output: 388s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 388s | decode_to_chunk() Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 388s | decode_to_chunk() output: 388s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 388s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 388s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 388s | decode_to_chunk() output: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 388s | decode_to_chunk() expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 388s | decode_to_chunk() output: 388s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 .l...T;Y.H...... 388s | cipher_op_ctr_nss() enter AES_CTR 0x5c7192345390 use IKEv1 IV wire_iv 0 count 0 388s | ctr_param: count 32 iv 006cb6dbc0543b59da48d90b00000001 388s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 388s | do_aes_ctr: exit 388s | cipher_op_context_destroy_ctr_nss() 388s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: decrypt: ok 388s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: counter-block: ok 388s ipsec algparse: Encrypting 36 octets using AES-CTR with 128-bit key 388s | decode_to_chunk() raw_key: input "0x 76 91 BE 03 5E 50 20 A8 AC 6E 61 85 29 F9 A0 DC" 388s | decode_to_chunk() output: 388s | 76 91 be 03 5e 50 20 a8 ac 6e 61 85 29 f9 a0 dc v...^P ..na.)... 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55773b0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_CTR 388s | flags: ENCRYPT+DECRYPT 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923484d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577378 388s | decode_to_mac() input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 388s | decode_to_mac() output: 388s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 388s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 388s | decode_to_chunk() output: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 388s | 20 21 22 23 !"# 388s | decode_to_chunk() Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 388s | decode_to_chunk() output: 388s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 388s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 388s | 25 b2 07 2f %../ 388s | decode_to_chunk() expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 388s | decode_to_chunk() output: 388s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 388s | cipher_op_ctr_nss() enter AES_CTR 0x5c71923451f0 use IKEv1 IV wire_iv 0 count 0 388s | ctr_param: count 32 iv 00e0017b27777f3f4a1786f000000001 388s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 388s | do_aes_ctr: exit 388s | cipher_op_context_destroy_ctr_nss() 388s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: encrypt: ok 388s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: counter-block: ok 388s | decode_to_mac() input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 388s | decode_to_mac() output: 388s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 388s | decode_to_chunk() Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 388s | decode_to_chunk() output: 388s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 388s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 388s | 25 b2 07 2f %../ 388s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 388s | decode_to_chunk() output: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 388s | 20 21 22 23 !"# 388s | decode_to_chunk() expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 388s | decode_to_chunk() output: 388s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 388s | cipher_op_ctr_nss() enter AES_CTR 0x5c71923451f0 use IKEv1 IV wire_iv 0 count 0 388s | ctr_param: count 32 iv 00e0017b27777f3f4a1786f000000001 388s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 388s | do_aes_ctr: exit 388s | cipher_op_context_destroy_ctr_nss() 388s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: decrypt: ok 388s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: counter-block: ok 388s ipsec algparse: Encrypting 16 octets using AES-CTR with 192-bit key 388s | decode_to_chunk() raw_key: input "0x16 AF 5B 14 5F C9 F5 79 C1 75 F9 3E 3B FB 0E ED86 3D 06 CC FD B7 85 15" 388s | decode_to_chunk() output: 388s | 16 af 5b 14 5f c9 f5 79 c1 75 f9 3e 3b fb 0e ed ..[._..y.u.>;... 388s | 86 3d 06 cc fd b7 85 15 .=...... 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55773b0 388s | key-offset: 0, key-size: 24 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_CTR 388s | flags: ENCRYPT+DECRYPT 388s | key_size: 24-bytes 388s | base: base-key@0x5c71923484d0 (40-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577378 388s | decode_to_mac() input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 388s | decode_to_mac() output: 388s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 388s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 388s | decode_to_chunk() output: 388s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 388s | decode_to_chunk() Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 388s | decode_to_chunk() output: 388s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 388s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 388s | decode_to_chunk() output: 388s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 388s | cipher_op_ctr_nss() enter AES_CTR 0x5c7192348d40 use IKEv1 IV wire_iv 0 count 0 388s | ctr_param: count 32 iv 0000004836733c147d6d93cb00000001 388s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 388s | do_aes_ctr: exit 388s | cipher_op_context_destroy_ctr_nss() 388s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: encrypt: ok 388s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: counter-block: ok 388s | decode_to_mac() input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 388s | decode_to_mac() output: 388s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 388s | decode_to_chunk() Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 388s | decode_to_chunk() output: 388s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 388s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 388s | decode_to_chunk() output: 388s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 388s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 388s | decode_to_chunk() output: 388s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 388s | cipher_op_ctr_nss() enter AES_CTR 0x5c7192348d40 use IKEv1 IV wire_iv 0 count 0 388s | ctr_param: count 32 iv 0000004836733c147d6d93cb00000001 388s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 388s | do_aes_ctr: exit 388s | cipher_op_context_destroy_ctr_nss() 388s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: decrypt: ok 388s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: counter-block: ok 388s ipsec algparse: Encrypting 32 octets using AES-CTR with 192-bit key 388s | decode_to_chunk() raw_key: input "0x7C 5C B2 40 1B 3D C3 3C 19 E7 34 08 19 E0 F6 9C67 8C 3D B8 E6 F6 A9 1A" 388s | decode_to_chunk() output: 388s | 7c 5c b2 40 1b 3d c3 3c 19 e7 34 08 19 e0 f6 9c |\.@.=.<..4..... 388s | 67 8c 3d b8 e6 f6 a9 1a g.=..... 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55773b0 388s | key-offset: 0, key-size: 24 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_CTR 388s | flags: ENCRYPT+DECRYPT 388s | key_size: 24-bytes 388s | base: base-key@0x5c71923484d0 (40-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577378 388s | decode_to_mac() input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 388s | decode_to_mac() output: 388s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 388s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 388s | decode_to_chunk() output: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 388s | decode_to_chunk() Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 388s | decode_to_chunk() output: 388s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 388s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 388s | decode_to_chunk() expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 388s | decode_to_chunk() output: 388s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 388s | cipher_op_ctr_nss() enter AES_CTR 0x5c71923451f0 use IKEv1 IV wire_iv 0 count 0 388s | ctr_param: count 32 iv 0096b03b020c6eadc2cb500d00000001 388s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 388s | do_aes_ctr: exit 388s | cipher_op_context_destroy_ctr_nss() 388s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: encrypt: ok 388s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: counter-block: ok 388s | decode_to_mac() input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 388s | decode_to_mac() output: 388s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 388s | decode_to_chunk() Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 388s | decode_to_chunk() output: 388s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 388s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 388s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 388s | decode_to_chunk() output: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 388s | decode_to_chunk() expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 388s | decode_to_chunk() output: 388s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 388s | cipher_op_ctr_nss() enter AES_CTR 0x5c71923451f0 use IKEv1 IV wire_iv 0 count 0 388s | ctr_param: count 32 iv 0096b03b020c6eadc2cb500d00000001 388s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 388s | do_aes_ctr: exit 388s | cipher_op_context_destroy_ctr_nss() 388s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: decrypt: ok 388s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: counter-block: ok 388s ipsec algparse: Encrypting 36 octets using AES-CTR with 192-bit key 388s | decode_to_chunk() raw_key: input "0x02 BF 39 1E E8 EC B1 59 B9 59 61 7B 09 65 27 9BF5 9B 60 A7 86 D3 E0 FE" 388s | decode_to_chunk() output: 388s | 02 bf 39 1e e8 ec b1 59 b9 59 61 7b 09 65 27 9b ..9....Y.Ya{.e'. 388s | f5 9b 60 a7 86 d3 e0 fe ..`..... 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55773b0 388s | key-offset: 0, key-size: 24 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_CTR 388s | flags: ENCRYPT+DECRYPT 388s | key_size: 24-bytes 388s | base: base-key@0x5c71923484d0 (40-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577378 388s | decode_to_mac() input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 388s | decode_to_mac() output: 388s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 388s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 388s | decode_to_chunk() output: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 388s | 20 21 22 23 !"# 388s | decode_to_chunk() Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 388s | decode_to_chunk() output: 388s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 388s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 388s | ab ee 09 35 ...5 388s | decode_to_chunk() expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 388s | decode_to_chunk() output: 388s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 388s | cipher_op_ctr_nss() enter AES_CTR 0x5c71923451f0 use IKEv1 IV wire_iv 0 count 0 388s | ctr_param: count 32 iv 0007bdfd5cbd60278dcc091200000001 388s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 388s | do_aes_ctr: exit 388s | cipher_op_context_destroy_ctr_nss() 388s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: encrypt: ok 388s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: counter-block: ok 388s | decode_to_mac() input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 388s | decode_to_mac() output: 388s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 388s | decode_to_chunk() Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 388s | decode_to_chunk() output: 388s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 388s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 388s | ab ee 09 35 ...5 388s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 388s | decode_to_chunk() output: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 388s | 20 21 22 23 !"# 388s | decode_to_chunk() expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 388s | decode_to_chunk() output: 388s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 388s | cipher_op_ctr_nss() enter AES_CTR 0x5c71923451f0 use IKEv1 IV wire_iv 0 count 0 388s | ctr_param: count 32 iv 0007bdfd5cbd60278dcc091200000001 388s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 388s | do_aes_ctr: exit 388s | cipher_op_context_destroy_ctr_nss() 388s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: decrypt: ok 388s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: counter-block: ok 388s ipsec algparse: Encrypting 16 octets using AES-CTR with 256-bit key 388s | decode_to_chunk() raw_key: input "0x77 6B EF F2 85 1D B0 6F 4C 8A 05 42 C8 69 6F 6C6A 81 AF 1E EC 96 B4 D3 7F C1 D6 89 E6 C1 C1 04" 388s | decode_to_chunk() output: 388s | 77 6b ef f2 85 1d b0 6f 4c 8a 05 42 c8 69 6f 6c wk.....oL..B.iol 388s | 6a 81 af 1e ec 96 b4 d3 7f c1 d6 89 e6 c1 c1 04 j............... 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55773b0 388s | key-offset: 0, key-size: 32 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_CTR 388s | flags: ENCRYPT+DECRYPT 388s | key_size: 32-bytes 388s | base: base-key@0x5c71923484d0 (48-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577378 388s | decode_to_mac() input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 388s | decode_to_mac() output: 388s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 388s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 388s | decode_to_chunk() output: 388s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 388s | decode_to_chunk() Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 388s | decode_to_chunk() output: 388s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 388s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 388s | decode_to_chunk() output: 388s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 388s | cipher_op_ctr_nss() enter AES_CTR 0x5c7192348d40 use IKEv1 IV wire_iv 0 count 0 388s | ctr_param: count 32 iv 00000060db5672c97aa8f0b200000001 388s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 388s | do_aes_ctr: exit 388s | cipher_op_context_destroy_ctr_nss() 388s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: encrypt: ok 388s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: counter-block: ok 388s | decode_to_mac() input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 388s | decode_to_mac() output: 388s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 388s | decode_to_chunk() Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 388s | decode_to_chunk() output: 388s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 388s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 388s | decode_to_chunk() output: 388s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 388s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 388s | decode_to_chunk() output: 388s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 388s | cipher_op_ctr_nss() enter AES_CTR 0x5c7192348d40 use IKEv1 IV wire_iv 0 count 0 388s | ctr_param: count 32 iv 00000060db5672c97aa8f0b200000001 388s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 388s | do_aes_ctr: exit 388s | cipher_op_context_destroy_ctr_nss() 388s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: decrypt: ok 388s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: counter-block: ok 388s ipsec algparse: Encrypting 32 octets using AES-CTR with 256-bit key 388s | decode_to_chunk() raw_key: input "0xF6 D6 6D 6B D5 2D 59 BB 07 96 36 58 79 EF F8 86C6 6D D5 1A 5B 6A 99 74 4B 50 59 0C 87 A2 38 84" 388s | decode_to_chunk() output: 388s | f6 d6 6d 6b d5 2d 59 bb 07 96 36 58 79 ef f8 86 ..mk.-Y...6Xy... 388s | c6 6d d5 1a 5b 6a 99 74 4b 50 59 0c 87 a2 38 84 .m..[j.tKPY...8. 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55773b0 388s | key-offset: 0, key-size: 32 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_CTR 388s | flags: ENCRYPT+DECRYPT 388s | key_size: 32-bytes 388s | base: base-key@0x5c71923484d0 (48-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577378 388s | decode_to_mac() input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 388s | decode_to_mac() output: 388s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 388s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 388s | decode_to_chunk() output: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 388s | decode_to_chunk() Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 388s | decode_to_chunk() output: 388s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 388s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 388s | decode_to_chunk() expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 388s | decode_to_chunk() output: 388s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 388s | cipher_op_ctr_nss() enter AES_CTR 0x5c71923451f0 use IKEv1 IV wire_iv 0 count 0 388s | ctr_param: count 32 iv 00faac24c1585ef15a43d87500000001 388s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 388s | do_aes_ctr: exit 388s | cipher_op_context_destroy_ctr_nss() 388s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: encrypt: ok 388s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: counter-block: ok 388s | decode_to_mac() input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 388s | decode_to_mac() output: 388s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 388s | decode_to_chunk() Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 388s | decode_to_chunk() output: 388s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 388s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 388s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 388s | decode_to_chunk() output: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 388s | decode_to_chunk() expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 388s | decode_to_chunk() output: 388s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 388s | cipher_op_ctr_nss() enter AES_CTR 0x5c71923451f0 use IKEv1 IV wire_iv 0 count 0 388s | ctr_param: count 32 iv 00faac24c1585ef15a43d87500000001 388s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 388s | do_aes_ctr: exit 388s | cipher_op_context_destroy_ctr_nss() 388s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: decrypt: ok 388s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: counter-block: ok 388s ipsec algparse: Encrypting 36 octets using AES-CTR with 256-bit key 388s | decode_to_chunk() raw_key: input "0xFF 7A 61 7C E6 91 48 E4 F1 72 6E 2F 43 58 1D E2AA 62 D9 F8 05 53 2E DF F1 EE D6 87 FB 54 15 3D" 388s | decode_to_chunk() output: 388s | ff 7a 61 7c e6 91 48 e4 f1 72 6e 2f 43 58 1d e2 .za|..H..rn/CX.. 388s | aa 62 d9 f8 05 53 2e df f1 ee d6 87 fb 54 15 3d .b...S.......T.= 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55773b0 388s | key-offset: 0, key-size: 32 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_CTR 388s | flags: ENCRYPT+DECRYPT 388s | key_size: 32-bytes 388s | base: base-key@0x5c71923484d0 (48-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577378 388s | decode_to_mac() input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 388s | decode_to_mac() output: 388s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 388s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 388s | decode_to_chunk() output: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 388s | 20 21 22 23 !"# 388s | decode_to_chunk() Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 388s | decode_to_chunk() output: 388s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 388s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 388s | 1e c0 e6 b8 .... 388s | decode_to_chunk() expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 388s | decode_to_chunk() output: 388s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 388s | cipher_op_ctr_nss() enter AES_CTR 0x5c71923451f0 use IKEv1 IV wire_iv 0 count 0 388s | ctr_param: count 32 iv 001cc5b751a51d70a1c1114800000001 388s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 388s | do_aes_ctr: exit 388s | cipher_op_context_destroy_ctr_nss() 388s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: encrypt: ok 388s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: counter-block: ok 388s | decode_to_mac() input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 388s | decode_to_mac() output: 388s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 388s | decode_to_chunk() Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 388s | decode_to_chunk() output: 388s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 388s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 388s | 1e c0 e6 b8 .... 388s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 388s | decode_to_chunk() output: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 388s | 20 21 22 23 !"# 388s | decode_to_chunk() expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 388s | decode_to_chunk() output: 388s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 388s | cipher_op_ctr_nss() enter AES_CTR 0x5c71923451f0 use IKEv1 IV wire_iv 0 count 0 388s | ctr_param: count 32 iv 001cc5b751a51d70a1c1114800000001 388s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 388s | do_aes_ctr: exit 388s | cipher_op_context_destroy_ctr_nss() 388s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: decrypt: ok 388s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: counter-block: ok 388s ipsec algparse: testing AES_CBC: 388s ipsec algparse: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 388s | decode_to_chunk() raw_key: input "0x06a9214036b8a15b512e03d534120006" 388s | decode_to_chunk() output: 388s | 06 a9 21 40 36 b8 a1 5b 51 2e 03 d5 34 12 00 06 ..!@6..[Q...4... 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55773b0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_CBC 388s | flags: ENCRYPT+DECRYPT 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923484d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577378 388s | decode_to_mac() IV: : input "0x3dafba429d9eb430b422da802c9fac41" 388s | decode_to_mac() output: 388s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 388s | decode_to_chunk() new IV: : input "0xe353779c1079aeb82708942dbe77181a" 388s | decode_to_chunk() output: 388s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 388s | decode_to_chunk() plaintext: : input "Single block msg" 388s | decode_to_chunk() output: 388s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 388s | decode_to_chunk() ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 388s | decode_to_chunk() output: 388s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 388s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 388s | using IKEv1 IV 388s | NSS ike_alg_nss_cbc: AES_CBC - exit 388s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: encrypt: ok 388s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: updated CBC IV: ok 388s | decode_to_mac() IV: : input "0x3dafba429d9eb430b422da802c9fac41" 388s | decode_to_mac() output: 388s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 388s | decode_to_chunk() new IV: : input "0xe353779c1079aeb82708942dbe77181a" 388s | decode_to_chunk() output: 388s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 388s | decode_to_chunk() ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 388s | decode_to_chunk() output: 388s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 388s | decode_to_chunk() plaintext: : input "Single block msg" 388s | decode_to_chunk() output: 388s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 388s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 388s | using IKEv1 IV 388s | NSS ike_alg_nss_cbc: AES_CBC - exit 388s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: decrypt: ok 388s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: updated CBC IV: ok 388s ipsec algparse: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 388s | decode_to_chunk() raw_key: input "0xc286696d887c9aa0611bbb3e2025a45a" 388s | decode_to_chunk() output: 388s | c2 86 69 6d 88 7c 9a a0 61 1b bb 3e 20 25 a4 5a ..im.|..a..> %.Z 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55773b0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_CBC 388s | flags: ENCRYPT+DECRYPT 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923484d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577378 388s | decode_to_mac() IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 388s | decode_to_mac() output: 388s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 388s | decode_to_chunk() new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 388s | decode_to_chunk() output: 388s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 388s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 388s | decode_to_chunk() plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 388s | decode_to_chunk() output: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 388s | decode_to_chunk() ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 388s | decode_to_chunk() output: 388s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 388s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 388s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 388s | using IKEv1 IV 388s | NSS ike_alg_nss_cbc: AES_CBC - exit 388s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: encrypt: ok 388s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 388s | decode_to_mac() IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 388s | decode_to_mac() output: 388s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 388s | decode_to_chunk() new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 388s | decode_to_chunk() output: 388s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 388s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 388s | decode_to_chunk() ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 388s | decode_to_chunk() output: 388s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 388s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 388s | decode_to_chunk() plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 388s | decode_to_chunk() output: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 388s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 388s | using IKEv1 IV 388s | NSS ike_alg_nss_cbc: AES_CBC - exit 388s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: decrypt: ok 388s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 388s ipsec algparse: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 388s | decode_to_chunk() raw_key: input "0x6c3ea0477630ce21a2ce334aa746c2cd" 388s | decode_to_chunk() output: 388s | 6c 3e a0 47 76 30 ce 21 a2 ce 33 4a a7 46 c2 cd l>.Gv0.!..3J.F.. 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55773b0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_CBC 388s | flags: ENCRYPT+DECRYPT 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923484d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577378 388s | decode_to_mac() IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 388s | decode_to_mac() output: 388s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 388s | decode_to_chunk() new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 388s | decode_to_chunk() output: 388s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 388s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 388s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 388s | decode_to_chunk() plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 388s | decode_to_chunk() output: 388s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 388s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 388s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 388s | decode_to_chunk() ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 388s | decode_to_chunk() output: 388s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 388s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 388s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 388s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 388s | using IKEv1 IV 388s | NSS ike_alg_nss_cbc: AES_CBC - exit 388s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: encrypt: ok 388s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 388s | decode_to_mac() IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 388s | decode_to_mac() output: 388s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 388s | decode_to_chunk() new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 388s | decode_to_chunk() output: 388s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 388s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 388s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 388s | decode_to_chunk() ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 388s | decode_to_chunk() output: 388s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 388s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 388s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 388s | decode_to_chunk() plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 388s | decode_to_chunk() output: 388s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 388s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 388s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 388s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 388s | using IKEv1 IV 388s | NSS ike_alg_nss_cbc: AES_CBC - exit 388s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: decrypt: ok 388s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 388s ipsec algparse: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 388s | decode_to_chunk() raw_key: input "0x56e47a38c5598974bc46903dba290349" 388s | decode_to_chunk() output: 388s | 56 e4 7a 38 c5 59 89 74 bc 46 90 3d ba 29 03 49 V.z8.Y.t.F.=.).I 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55773b0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_CBC 388s | flags: ENCRYPT+DECRYPT 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923484d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577378 388s | decode_to_mac() IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 388s | decode_to_mac() output: 388s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 388s | decode_to_chunk() plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 388s | decode_to_chunk() output: 388s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 388s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 388s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 388s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 388s | decode_to_chunk() ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 388s | decode_to_chunk() output: 388s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 388s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 388s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 388s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 388s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 388s | using IKEv1 IV 388s | NSS ike_alg_nss_cbc: AES_CBC - exit 388s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: encrypt: ok 388s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 388s | decode_to_mac() IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 388s | decode_to_mac() output: 388s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 388s | decode_to_chunk() ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 388s | decode_to_chunk() output: 388s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 388s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 388s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 388s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 388s | decode_to_chunk() plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 388s | decode_to_chunk() output: 388s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 388s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 388s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 388s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 388s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 388s | using IKEv1 IV 388s | NSS ike_alg_nss_cbc: AES_CBC - exit 388s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: decrypt: ok 388s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 388s ipsec algparse: testing AES_XCBC: 388s ipsec algparse: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 388s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 388s | decode_to_chunk() output: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | decode_to_chunk() test_prf_vector: input "" 388s | decode_to_chunk() output: 388s | 388s | decode_to_chunk() test_prf_vector: input "0x75f0251d528ac01c4573dfd584d79f29" 388s | decode_to_chunk() output: 388s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 388s | PRF chunk interface PRF AES_XCBC init key hunk 0x5c7192348800 (length 16) 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55772a0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923484d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577238 388s | XCBC: Key 16=16 just right 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c7192346de0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc55771e8 388s | PRF chunk interface PRF AES_XCBC 0x5c7192345460 388s | PRF chunk interface PRF AES_XCBC update message (0x5c7192346d10 length 0) 388s | 388s | XCBC: data 388s | 388s | K extracting all 16 bytes of key@0x5c71923484d0 388s | K: symkey-key@0x5c71923484d0 (16-bytes, AES_ECB) 388s | sizeof bytes 16 388s | wrapper: (SECItemType)538976288: 3e 80 fd 94 05 24 14 00 11 58 0d f8 09 19 74 b0 388s | K extracted len 16 bytes at 0x5c7192349010 388s | unwrapped: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | XCBC: K: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | XCBC: K1 388s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc5577150 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923491a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577138 388s | Computing E[0] using K3 388s | XCBC: K3 388s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 388s | XCBC: E[n-1] 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | XCBC: M[n] 388s | 388s | XCBC: M[n] 388s | 388s | XCBC: M[n]:80...^E[n-1]^K3 388s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 388s | XCBC: MAC 388s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 388s | PRF chunk interface PRF AES_XCBC final length 16 388s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 388s | chunk output 388s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 388s | verify_bytes() RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: prf OUT: ok 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc5577320 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 16-bytes 388s | base: base-key@0x5c7192346de0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc55772b8 388s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x5c71923484d0 (size 16) 388s | PRF symkey interface: key symkey-key@0x5c71923484d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | XCBC: Key 16=16 just right 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923484d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577228 388s | PRF symkey interface PRF AES_XCBC 0x5c7192345460 388s | PRF symkey interface PRF AES_XCBC update symkey message-key@(nil) (size 0) 388s | PRF symkey interface: symkey message-key@NULL 388s | symkey message NULL key has no bytes 388s | XCBC: data 388s | 388s | K extracting all 16 bytes of key@0x5c7192346de0 388s | K: symkey-key@0x5c7192346de0 (16-bytes, AES_ECB) 388s | sizeof bytes 16 388s | wrapper: (SECItemType)-984126048: 3e 80 fd 94 05 24 14 00 11 58 0d f8 09 19 74 b0 388s | K extracted len 16 bytes at 0x5c7192349010 388s | unwrapped: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | XCBC: K: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | XCBC: K1 388s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55771a0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923494e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577188 388s | Computing E[0] using K3 388s | XCBC: K3 388s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 388s | XCBC: E[n-1] 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | XCBC: M[n] 388s | 388s | XCBC: M[n] 388s | 388s | XCBC: M[n]:80...^E[n-1]^K3 388s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 388s | XCBC: MAC 388s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55772b0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923494e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577248 388s | PRF symkey interface PRF AES_XCBC final-key@0x5c71923491a0 (size 16) 388s | PRF symkey interface: key-key@0x5c71923491a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | output: symkey-key@0x5c71923491a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracting all 16 bytes of key@0x5c71923491a0 388s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: symkey-key@0x5c71923491a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | sizeof bytes 16 388s | wrapper: (SECItemType)976: bd e2 ba 8f fc 5c 1a 52 3c a2 5d 7a 17 cd 8c eb 388s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracted len 16 bytes at 0x5c7192349180 388s | unwrapped: 388s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 388s | verify_bytes() RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: symkey: ok 388s ipsec algparse: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 388s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 388s | decode_to_chunk() output: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | decode_to_chunk() test_prf_vector: input "0x000102" 388s | decode_to_chunk() output: 388s | 00 01 02 ... 388s | decode_to_chunk() test_prf_vector: input "0x5b376580ae2f19afe7219ceef172756f" 388s | decode_to_chunk() output: 388s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 388s | PRF chunk interface PRF AES_XCBC init key hunk 0x5c7192348800 (length 16) 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55772a0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923484d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577238 388s | XCBC: Key 16=16 just right 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923491a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc55771e8 388s | PRF chunk interface PRF AES_XCBC 0x5c7192345460 388s | PRF chunk interface PRF AES_XCBC update message (0x5c7192346d10 length 3) 388s | 00 01 02 ... 388s | XCBC: data 388s | 00 01 02 ... 388s | K extracting all 16 bytes of key@0x5c71923484d0 388s | K: symkey-key@0x5c71923484d0 (16-bytes, AES_ECB) 388s | sizeof bytes 16 388s | wrapper: (SECItemType)538976288: 3e 80 fd 94 05 24 14 00 11 58 0d f8 09 19 74 b0 388s | K extracted len 16 bytes at 0x5c7192348820 388s | unwrapped: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | XCBC: K: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | XCBC: K1 388s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc5577150 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c7192346de0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577138 388s | Computing E[1] using K3 388s | XCBC: K3 388s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 388s | XCBC: E[n-1] 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | XCBC: M[n] 388s | 00 01 02 ... 388s | XCBC: M[n] 388s | 00 01 02 ... 388s | XCBC: M[n]:80...^E[n-1]^K3 388s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 388s | XCBC: MAC 388s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 388s | PRF chunk interface PRF AES_XCBC final length 16 388s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 388s | chunk output 388s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 388s | verify_bytes() RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: prf OUT: ok 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc5577320 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923491a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc55772b8 388s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x5c71923484d0 (size 16) 388s | PRF symkey interface: key symkey-key@0x5c71923484d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | XCBC: Key 16=16 just right 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923484d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577228 388s | PRF symkey interface PRF AES_XCBC 0x5c7192345460 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc5577320 388s | key-offset: 0, key-size: 3 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 3-bytes 388s | base: base-key@0x5c71923494e0 (19-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc55772b8 388s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x5c7192346de0 (size 3) 388s | PRF symkey interface: symkey message-key@0x5c7192346de0 (3-bytes, EXTRACT_KEY_FROM_KEY) 388s | symkey message extracting all 3 bytes of key@0x5c7192346de0 388s | symkey message: symkey-key@0x5c7192346de0 (3-bytes, EXTRACT_KEY_FROM_KEY) 388s | sizeof bytes 16 388s | wrapper: (SECItemType)-984125776: aa 06 ad 1e c8 d8 27 e5 6a 62 03 d4 66 e1 9b 4d 388s | symkey message extracted len 16 bytes at 0x5c7192348820 388s | unwrapped: 388s | 00 01 02 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | XCBC: data 388s | 00 01 02 ... 388s | K extracting all 16 bytes of key@0x5c71923491a0 388s | K: symkey-key@0x5c71923491a0 (16-bytes, AES_ECB) 388s | sizeof bytes 16 388s | wrapper: (SECItemType)-984125984: 3e 80 fd 94 05 24 14 00 11 58 0d f8 09 19 74 b0 388s | K extracted len 16 bytes at 0x5c7192345390 388s | unwrapped: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | XCBC: K: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | XCBC: K1 388s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55771a0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c7192349840 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577188 388s | Computing E[1] using K3 388s | XCBC: K3 388s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 388s | XCBC: E[n-1] 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | XCBC: M[n] 388s | 00 01 02 ... 388s | XCBC: M[n] 388s | 00 01 02 ... 388s | XCBC: M[n]:80...^E[n-1]^K3 388s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 388s | XCBC: MAC 388s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55772b0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 16-bytes 388s | base: base-key@0x5c7192349840 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577248 388s | PRF symkey interface PRF AES_XCBC final-key@0x5c71923494e0 (size 16) 388s | PRF symkey interface: key-key@0x5c71923494e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | output: symkey-key@0x5c71923494e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracting all 16 bytes of key@0x5c71923494e0 388s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: symkey-key@0x5c71923494e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | sizeof bytes 16 388s | wrapper: (SECItemType)976: 3c 4d bf cf e7 5f 82 e3 13 f9 fc c7 21 6e 4d ff 388s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracted len 16 bytes at 0x5c7192345390 388s | unwrapped: 388s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 388s | verify_bytes() RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: symkey: ok 388s ipsec algparse: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 388s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 388s | decode_to_chunk() output: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 388s | decode_to_chunk() output: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | decode_to_chunk() test_prf_vector: input "0xd2a246fa349b68a79998a4394ff7a263" 388s | decode_to_chunk() output: 388s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 388s | PRF chunk interface PRF AES_XCBC init key hunk 0x5c7192348800 (length 16) 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55772a0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923484d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577238 388s | XCBC: Key 16=16 just right 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923494e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc55771e8 388s | PRF chunk interface PRF AES_XCBC 0x5c7192345460 388s | PRF chunk interface PRF AES_XCBC update message (0x5c7192346d10 length 16) 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | XCBC: data 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | K extracting all 16 bytes of key@0x5c71923484d0 388s | K: symkey-key@0x5c71923484d0 (16-bytes, AES_ECB) 388s | sizeof bytes 16 388s | wrapper: (SECItemType)543502368: 3e 80 fd 94 05 24 14 00 11 58 0d f8 09 19 74 b0 388s | K extracted len 16 bytes at 0x5c7192349010 388s | unwrapped: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | XCBC: K: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | XCBC: K1 388s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc5577150 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c7192346de0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577138 388s | XCBC: Computing E[1] using K2 388s | XCBC: K2 388s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 388s | XCBC: E[n-1] 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | XCBC: M[n] 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | XCBC: M[n]^E[n-1]^K2 388s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 388s | XCBC: MAC 388s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 388s | PRF chunk interface PRF AES_XCBC final length 16 388s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 388s | chunk output 388s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 388s | verify_bytes() RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: prf OUT: ok 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc5577320 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923494e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc55772b8 388s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x5c71923484d0 (size 16) 388s | PRF symkey interface: key symkey-key@0x5c71923484d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | XCBC: Key 16=16 just right 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923484d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577228 388s | PRF symkey interface PRF AES_XCBC 0x5c7192345460 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc5577320 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923491a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc55772b8 388s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x5c7192346de0 (size 16) 388s | PRF symkey interface: symkey message-key@0x5c7192346de0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | symkey message extracting all 16 bytes of key@0x5c7192346de0 388s | symkey message: symkey-key@0x5c7192346de0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | sizeof bytes 16 388s | wrapper: (SECItemType)-984125776: 3e 80 fd 94 05 24 14 00 11 58 0d f8 09 19 74 b0 388s | symkey message extracted len 16 bytes at 0x5c7192349010 388s | unwrapped: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | XCBC: data 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | K extracting all 16 bytes of key@0x5c71923494e0 388s | K: symkey-key@0x5c71923494e0 (16-bytes, AES_ECB) 388s | sizeof bytes 16 388s | wrapper: (SECItemType)-984125984: 3e 80 fd 94 05 24 14 00 11 58 0d f8 09 19 74 b0 388s | K extracted len 16 bytes at 0x5c71923451f0 388s | unwrapped: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | XCBC: K: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | XCBC: K1 388s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55771a0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c7192349840 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577188 388s | XCBC: Computing E[1] using K2 388s | XCBC: K2 388s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 388s | XCBC: E[n-1] 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | XCBC: M[n] 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | XCBC: M[n]^E[n-1]^K2 388s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 388s | XCBC: MAC 388s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55772b0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 16-bytes 388s | base: base-key@0x5c7192349840 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577248 388s | PRF symkey interface PRF AES_XCBC final-key@0x5c71923491a0 (size 16) 388s | PRF symkey interface: key-key@0x5c71923491a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | output: symkey-key@0x5c71923491a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracting all 16 bytes of key@0x5c71923491a0 388s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: symkey-key@0x5c71923491a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | sizeof bytes 16 388s | wrapper: (SECItemType)976: 44 92 2d de 02 22 23 39 71 f0 eb 8e 37 49 85 0d 388s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracted len 16 bytes at 0x5c71923451f0 388s | unwrapped: 388s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 388s | verify_bytes() RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: symkey: ok 388s ipsec algparse: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 388s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 388s | decode_to_chunk() output: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 388s | decode_to_chunk() output: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 .... 388s | decode_to_chunk() test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 388s | decode_to_chunk() output: 388s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 388s | PRF chunk interface PRF AES_XCBC init key hunk 0x5c7192348800 (length 16) 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55772a0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923484d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577238 388s | XCBC: Key 16=16 just right 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923491a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc55771e8 388s | PRF chunk interface PRF AES_XCBC 0x5c7192345460 388s | PRF chunk interface PRF AES_XCBC update message (0x5c7192346d10 length 20) 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 .... 388s | XCBC: data 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 .... 388s | K extracting all 16 bytes of key@0x5c71923484d0 388s | K: symkey-key@0x5c71923484d0 (16-bytes, AES_ECB) 388s | sizeof bytes 16 388s | wrapper: (SECItemType)538976288: 3e 80 fd 94 05 24 14 00 11 58 0d f8 09 19 74 b0 388s | K extracted len 16 bytes at 0x5c7192348b10 388s | unwrapped: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | XCBC: K: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | XCBC: K1 388s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc5577150 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c7192346de0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577138 388s | Computing E[2] using K3 388s | XCBC: K3 388s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 388s | XCBC: E[n-1] 388s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 388s | XCBC: M[n] 388s | 10 11 12 13 .... 388s | XCBC: M[n] 388s | 10 11 12 13 .... 388s | XCBC: M[n]:80...^E[n-1]^K3 388s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 388s | XCBC: MAC 388s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 388s | PRF chunk interface PRF AES_XCBC final length 16 388s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 388s | chunk output 388s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 388s | verify_bytes() RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: prf OUT: ok 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc5577320 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923491a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc55772b8 388s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x5c71923484d0 (size 16) 388s | PRF symkey interface: key symkey-key@0x5c71923484d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | XCBC: Key 16=16 just right 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923484d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577228 388s | PRF symkey interface PRF AES_XCBC 0x5c7192345460 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc5577320 388s | key-offset: 0, key-size: 20 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 20-bytes 388s | base: base-key@0x5c71923494e0 (36-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc55772b8 388s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x5c7192346de0 (size 20) 388s | PRF symkey interface: symkey message-key@0x5c7192346de0 (20-bytes, EXTRACT_KEY_FROM_KEY) 388s | symkey message extracting all 20 bytes of key@0x5c7192346de0 388s | symkey message: symkey-key@0x5c7192346de0 (20-bytes, EXTRACT_KEY_FROM_KEY) 388s | sizeof bytes 32 388s | wrapper: (SECItemType)-984125776: 3e 80 fd 94 05 24 14 00 11 58 0d f8 09 19 74 b0 8f 00 2d 22 44 66 a0 d7 41 12 58 b9 4f 46 b7 e3 388s | symkey message extracted len 32 bytes at 0x5c7192348d80 388s | unwrapped: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | XCBC: data 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 .... 388s | K extracting all 16 bytes of key@0x5c71923491a0 388s | K: symkey-key@0x5c71923491a0 (16-bytes, AES_ECB) 388s | sizeof bytes 16 388s | wrapper: (SECItemType)-984125984: 3e 80 fd 94 05 24 14 00 11 58 0d f8 09 19 74 b0 388s | K extracted len 16 bytes at 0x5c7192348820 388s | unwrapped: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | XCBC: K: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | XCBC: K1 388s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55771a0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c7192349840 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577188 388s | Computing E[2] using K3 388s | XCBC: K3 388s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 388s | XCBC: E[n-1] 388s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 388s | XCBC: M[n] 388s | 10 11 12 13 .... 388s | XCBC: M[n] 388s | 10 11 12 13 .... 388s | XCBC: M[n]:80...^E[n-1]^K3 388s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 388s | XCBC: MAC 388s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55772b0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 16-bytes 388s | base: base-key@0x5c7192349840 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577248 388s | PRF symkey interface PRF AES_XCBC final-key@0x5c71923494e0 (size 16) 388s | PRF symkey interface: key-key@0x5c71923494e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | output: symkey-key@0x5c71923494e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracting all 16 bytes of key@0x5c71923494e0 388s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: symkey-key@0x5c71923494e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | sizeof bytes 16 388s | wrapper: (SECItemType)976: 09 8f 26 16 f6 d5 21 e1 7c 1e 73 d3 5d 51 96 0a 388s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracted len 16 bytes at 0x5c7192348820 388s | unwrapped: 388s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 388s | verify_bytes() RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: symkey: ok 388s ipsec algparse: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 388s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 388s | decode_to_chunk() output: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 388s | decode_to_chunk() output: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 388s | decode_to_chunk() test_prf_vector: input "0xf54f0ec8d2b9f3d36807734bd5283fd4" 388s | decode_to_chunk() output: 388s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 388s | PRF chunk interface PRF AES_XCBC init key hunk 0x5c7192348800 (length 16) 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55772a0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923484d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577238 388s | XCBC: Key 16=16 just right 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923494e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc55771e8 388s | PRF chunk interface PRF AES_XCBC 0x5c7192348d80 388s | PRF chunk interface PRF AES_XCBC update message (0x5c7192345460 length 32) 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 388s | XCBC: data 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 388s | K extracting all 16 bytes of key@0x5c71923484d0 388s | K: symkey-key@0x5c71923484d0 (16-bytes, AES_ECB) 388s | sizeof bytes 16 388s | wrapper: (SECItemType)543502624: 3e 80 fd 94 05 24 14 00 11 58 0d f8 09 19 74 b0 388s | K extracted len 16 bytes at 0x5c7192345390 388s | unwrapped: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | XCBC: K: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | XCBC: K1 388s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc5577150 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c7192346de0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577138 388s | XCBC: Computing E[2] using K2 388s | XCBC: K2 388s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 388s | XCBC: E[n-1] 388s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 388s | XCBC: M[n] 388s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 388s | XCBC: M[n]^E[n-1]^K2 388s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 388s | XCBC: MAC 388s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 388s | PRF chunk interface PRF AES_XCBC final length 16 388s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 388s | chunk output 388s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 388s | verify_bytes() RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: prf OUT: ok 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc5577320 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923494e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc55772b8 388s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x5c71923484d0 (size 16) 388s | PRF symkey interface: key symkey-key@0x5c71923484d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | XCBC: Key 16=16 just right 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923484d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577228 388s | PRF symkey interface PRF AES_XCBC 0x5c7192348d80 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc5577320 388s | key-offset: 0, key-size: 32 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 32-bytes 388s | base: base-key@0x5c71923491a0 (48-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc55772b8 388s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x5c7192346de0 (size 32) 388s | PRF symkey interface: symkey message-key@0x5c7192346de0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | symkey message extracting all 32 bytes of key@0x5c7192346de0 388s | symkey message: symkey-key@0x5c7192346de0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | sizeof bytes 32 388s | wrapper: (SECItemType)-984125776: 3e 80 fd 94 05 24 14 00 11 58 0d f8 09 19 74 b0 49 b7 76 b2 78 da d8 88 7f 34 cd 47 20 d8 94 9b 388s | symkey message extracted len 32 bytes at 0x5c7192349b00 388s | unwrapped: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 388s | XCBC: data 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 388s | K extracting all 16 bytes of key@0x5c71923494e0 388s | K: symkey-key@0x5c71923494e0 (16-bytes, AES_ECB) 388s | sizeof bytes 16 388s | wrapper: (SECItemType)-984125984: 3e 80 fd 94 05 24 14 00 11 58 0d f8 09 19 74 b0 388s | K extracted len 16 bytes at 0x5c7192349010 388s | unwrapped: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | XCBC: K: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | XCBC: K1 388s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55771a0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c7192349840 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577188 388s | XCBC: Computing E[2] using K2 388s | XCBC: K2 388s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 388s | XCBC: E[n-1] 388s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 388s | XCBC: M[n] 388s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 388s | XCBC: M[n]^E[n-1]^K2 388s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 388s | XCBC: MAC 388s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55772b0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 16-bytes 388s | base: base-key@0x5c7192349840 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577248 388s | PRF symkey interface PRF AES_XCBC final-key@0x5c71923491a0 (size 16) 388s | PRF symkey interface: key-key@0x5c71923491a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | output: symkey-key@0x5c71923491a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracting all 16 bytes of key@0x5c71923491a0 388s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: symkey-key@0x5c71923491a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | sizeof bytes 16 388s | wrapper: (SECItemType)976: b8 d0 4b dd cf 1d 57 80 c5 16 13 6e 2d 84 6f 81 388s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracted len 16 bytes at 0x5c7192348b10 388s | unwrapped: 388s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 388s | verify_bytes() RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: symkey: ok 388s ipsec algparse: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 388s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 388s | decode_to_chunk() output: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f2021" 388s | decode_to_chunk() output: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 388s | 20 21 ! 388s | decode_to_chunk() test_prf_vector: input "0xbecbb3bccdb518a30677d5481fb6b4d8" 388s | decode_to_chunk() output: 388s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 388s | PRF chunk interface PRF AES_XCBC init key hunk 0x5c7192346d10 (length 16) 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55772a0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923484d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577238 388s | XCBC: Key 16=16 just right 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923491a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc55771e8 388s | PRF chunk interface PRF AES_XCBC 0x5c7192345460 388s | PRF chunk interface PRF AES_XCBC update message (0x5c7192345490 length 34) 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 388s | 20 21 ! 388s | XCBC: data 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 388s | 20 21 ! 388s | K extracting all 16 bytes of key@0x5c71923484d0 388s | K: symkey-key@0x5c71923484d0 (16-bytes, AES_ECB) 388s | sizeof bytes 16 388s | wrapper: (SECItemType)538976288: 3e 80 fd 94 05 24 14 00 11 58 0d f8 09 19 74 b0 388s | K extracted len 16 bytes at 0x5c7192349010 388s | unwrapped: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | XCBC: K: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | XCBC: K1 388s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc5577150 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c7192346de0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577138 388s | Computing E[3] using K3 388s | XCBC: K3 388s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 388s | XCBC: E[n-1] 388s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 388s | XCBC: M[n] 388s | 20 21 ! 388s | XCBC: M[n] 388s | 20 21 ! 388s | XCBC: M[n]:80...^E[n-1]^K3 388s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 388s | XCBC: MAC 388s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 388s | PRF chunk interface PRF AES_XCBC final length 16 388s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 388s | chunk output 388s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 388s | verify_bytes() RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: prf OUT: ok 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc5577320 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923491a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc55772b8 388s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x5c71923484d0 (size 16) 388s | PRF symkey interface: key symkey-key@0x5c71923484d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | XCBC: Key 16=16 just right 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923484d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577228 388s | PRF symkey interface PRF AES_XCBC 0x5c7192345460 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc5577320 388s | key-offset: 0, key-size: 34 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 34-bytes 388s | base: base-key@0x5c71923494e0 (50-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc55772b8 388s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x5c7192346de0 (size 34) 388s | PRF symkey interface: symkey message-key@0x5c7192346de0 (34-bytes, EXTRACT_KEY_FROM_KEY) 388s | symkey message extracting all 34 bytes of key@0x5c7192346de0 388s | symkey message: symkey-key@0x5c7192346de0 (34-bytes, EXTRACT_KEY_FROM_KEY) 388s | sizeof bytes 48 388s | wrapper: (SECItemType)-984125776: 3e 80 fd 94 05 24 14 00 11 58 0d f8 09 19 74 b0 49 b7 76 b2 78 da d8 88 7f 34 cd 47 20 d8 94 9b 76 59 cb c7 36 e8 cd d6 be ee 42 8f 7b fe 7e a0 388s | symkey message extracted len 48 bytes at 0x5c7192348b30 388s | unwrapped: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 388s | 20 21 00 00 00 00 00 00 00 00 00 00 00 00 00 00 !.............. 388s | XCBC: data 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 388s | 20 21 ! 388s | K extracting all 16 bytes of key@0x5c71923491a0 388s | K: symkey-key@0x5c71923491a0 (16-bytes, AES_ECB) 388s | sizeof bytes 16 388s | wrapper: (SECItemType)-984125984: 3e 80 fd 94 05 24 14 00 11 58 0d f8 09 19 74 b0 388s | K extracted len 16 bytes at 0x5c7192345390 388s | unwrapped: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | XCBC: K: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | XCBC: K1 388s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55771a0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c7192349840 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577188 388s | Computing E[3] using K3 388s | XCBC: K3 388s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 388s | XCBC: E[n-1] 388s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 388s | XCBC: M[n] 388s | 20 21 ! 388s | XCBC: M[n] 388s | 20 21 ! 388s | XCBC: M[n]:80...^E[n-1]^K3 388s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 388s | XCBC: MAC 388s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55772b0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 16-bytes 388s | base: base-key@0x5c7192349840 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577248 388s | PRF symkey interface PRF AES_XCBC final-key@0x5c71923494e0 (size 16) 388s | PRF symkey interface: key-key@0x5c71923494e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | output: symkey-key@0x5c71923494e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracting all 16 bytes of key@0x5c71923494e0 388s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: symkey-key@0x5c71923494e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | sizeof bytes 16 388s | wrapper: (SECItemType)976: f1 81 09 c2 c5 96 08 6a fc d1 50 05 1b 21 17 83 388s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracted len 16 bytes at 0x5c7192348700 388s | unwrapped: 388s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 388s | verify_bytes() RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: symkey: ok 388s ipsec algparse: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 388s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 388s | decode_to_chunk() output: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | decode_to_chunk() test_prf_vector: input "0xf0dafee895db30253761103b5d84528f" 388s | decode_to_chunk() output: 388s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 388s | PRF chunk interface PRF AES_XCBC init key hunk 0x5c7192348820 (length 16) 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55772a0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923484d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577238 388s | XCBC: Key 16=16 just right 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923494e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc55771e8 388s | PRF chunk interface PRF AES_XCBC 0x5c7192348d80 388s | PRF chunk interface PRF AES_XCBC update message (0x5c7192346f10 length 1000) 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 ........ 388s | XCBC: data 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 ........ 388s | K extracting all 16 bytes of key@0x5c71923484d0 388s | K: symkey-key@0x5c71923484d0 (16-bytes, AES_ECB) 388s | sizeof bytes 16 388s | wrapper: (SECItemType)538976288: 3e 80 fd 94 05 24 14 00 11 58 0d f8 09 19 74 b0 388s | K extracted len 16 bytes at 0x5c7192345390 388s | unwrapped: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | XCBC: K: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | XCBC: K1 388s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc5577150 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c7192346de0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577138 388s | Computing E[63] using K3 388s | XCBC: K3 388s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 388s | XCBC: E[n-1] 388s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 388s | XCBC: M[n] 388s | 00 00 00 00 00 00 00 00 ........ 388s | XCBC: M[n] 388s | 00 00 00 00 00 00 00 00 ........ 388s | XCBC: M[n]:80...^E[n-1]^K3 388s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 388s | XCBC: MAC 388s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 388s | PRF chunk interface PRF AES_XCBC final length 16 388s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 388s | chunk output 388s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 388s | verify_bytes() RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: prf OUT: ok 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc5577320 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923494e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc55772b8 388s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x5c71923484d0 (size 16) 388s | PRF symkey interface: key symkey-key@0x5c71923484d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | XCBC: Key 16=16 just right 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923484d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577228 388s | PRF symkey interface PRF AES_XCBC 0x5c7192348d80 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc5577320 388s | key-offset: 0, key-size: 1000 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 1000-bytes 388s | base: base-key@0x5c71923491a0 (1016-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc55772b8 388s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x5c7192346de0 (size 1000) 388s | PRF symkey interface: symkey message-key@0x5c7192346de0 (1000-bytes, EXTRACT_KEY_FROM_KEY) 388s | symkey message extracting all 1000 bytes of key@0x5c7192346de0 388s | symkey message: symkey-key@0x5c7192346de0 (1000-bytes, EXTRACT_KEY_FROM_KEY) 388s | sizeof bytes 1008 388s | wrapper: (SECItemType)-984125776: b3 10 47 15 d8 57 70 52 47 f3 f3 8d 7c fb 37 ae b3 10 47 15 d8 57 70 52 47 f3 f3 8d 7c fb 37 ae b3 10 47 15 d8 57 70 52 47 f3 f3 8d 7c fb 37 ae b3 10 47 15 d8 57 70 52 47 f3 f3 8d 7c fb 37 ae b3 10 47 15 d8 57 70 52 47 f3 f3 8d 7c fb 37 ae b3 10 47 15 d8 57 70 52 47 f3 f3 8d 7c fb 37 ae b3 10 47 15 d8 57 70 52 47 f3 f3 8d 7c fb 37 ae b3 10 47 15 d8 57 70 52 47 f3 f3 8d 7c fb 37 ae b3 10 47 15 d8 57 70 52 47 f3 f3 8d 7c fb 37 ae b3 10 47 15 d8 57 70 52 47 f3 f3 8d 7c fb 37 ae b3 10 47 15 d8 57 70 52 47 f3 f3 8d 7c fb 37 ae b3 10 47 15 d8 57 70 52 47 f3 f3 8d 7c fb 37 ae b3 10 47 15 d8 57 70 52 47 f3 f3 8d 7c fb 37 ae b3 10 47 15 d8 57 70 52 47 f3 f3 8d 7c fb 37 ae b3 10 47 15 d8 57 70 52 47 f3 f3 8d 7c fb 37 ae b3 10 47 15 d8 57 70 52 47 f3 f3 8d 7c fb 37 ae b3 10 47 15 d8 57 70 52 47 f3 f3 8d 7c fb 37 ae b3 10 47 15 d8 57 70 52 47 f3 f3 8d 7c fb 37 ae b3 10 47 15 d8 57 70 52 47 f3 f3 8d 7c fb 37... 388s | symkey message extracted len 1008 bytes at 0x5c7192347af0 388s | unwrapped: 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | XCBC: data 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | 00 00 00 00 00 00 00 00 ........ 388s | K extracting all 16 bytes of key@0x5c71923494e0 388s | K: symkey-key@0x5c71923494e0 (16-bytes, AES_ECB) 388s | sizeof bytes 16 388s | wrapper: (SECItemType)-984125984: 3e 80 fd 94 05 24 14 00 11 58 0d f8 09 19 74 b0 388s | K extracted len 16 bytes at 0x5c7192349010 388s | unwrapped: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | XCBC: K: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | XCBC: K1 388s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55771a0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c7192349840 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577188 388s | Computing E[63] using K3 388s | XCBC: K3 388s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 388s | XCBC: E[n-1] 388s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 388s | XCBC: M[n] 388s | 00 00 00 00 00 00 00 00 ........ 388s | XCBC: M[n] 388s | 00 00 00 00 00 00 00 00 ........ 388s | XCBC: M[n]:80...^E[n-1]^K3 388s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 388s | XCBC: MAC 388s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55772b0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 16-bytes 388s | base: base-key@0x5c7192349840 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577248 388s | PRF symkey interface PRF AES_XCBC final-key@0x5c71923491a0 (size 16) 388s | PRF symkey interface: key-key@0x5c71923491a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | output: symkey-key@0x5c71923491a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracting all 16 bytes of key@0x5c71923491a0 388s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: symkey-key@0x5c71923491a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | sizeof bytes 16 388s | wrapper: (SECItemType)976: a9 c7 0e 1b 6f c7 e6 92 6f e8 ae 6f c5 bd 44 0c 388s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracted len 16 bytes at 0x5c7192348b10 388s | unwrapped: 388s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 388s | verify_bytes() RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: symkey: ok 388s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 388s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 388s | decode_to_chunk() output: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 388s | decode_to_chunk() output: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 .... 388s | decode_to_chunk() test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 388s | decode_to_chunk() output: 388s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 388s | PRF chunk interface PRF AES_XCBC init key hunk 0x5c7192348800 (length 16) 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55772a0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923484d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577238 388s | XCBC: Key 16=16 just right 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923491a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc55771e8 388s | PRF chunk interface PRF AES_XCBC 0x5c7192348d80 388s | PRF chunk interface PRF AES_XCBC update message (0x5c7192346d10 length 20) 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 .... 388s | XCBC: data 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 .... 388s | K extracting all 16 bytes of key@0x5c71923484d0 388s | K: symkey-key@0x5c71923484d0 (16-bytes, AES_ECB) 388s | sizeof bytes 16 388s | wrapper: (SECItemType)538976288: 3e 80 fd 94 05 24 14 00 11 58 0d f8 09 19 74 b0 388s | K extracted len 16 bytes at 0x5c7192349820 388s | unwrapped: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | XCBC: K: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | XCBC: K1 388s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc5577150 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c7192346de0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577138 388s | Computing E[2] using K3 388s | XCBC: K3 388s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 388s | XCBC: E[n-1] 388s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 388s | XCBC: M[n] 388s | 10 11 12 13 .... 388s | XCBC: M[n] 388s | 10 11 12 13 .... 388s | XCBC: M[n]:80...^E[n-1]^K3 388s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 388s | XCBC: MAC 388s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 388s | PRF chunk interface PRF AES_XCBC final length 16 388s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 388s | chunk output 388s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 388s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): prf OUT: ok 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc5577320 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923491a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc55772b8 388s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x5c71923484d0 (size 16) 388s | PRF symkey interface: key symkey-key@0x5c71923484d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | XCBC: Key 16=16 just right 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923484d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577228 388s | PRF symkey interface PRF AES_XCBC 0x5c7192348d80 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc5577320 388s | key-offset: 0, key-size: 20 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 20-bytes 388s | base: base-key@0x5c71923494e0 (36-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc55772b8 388s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x5c7192346de0 (size 20) 388s | PRF symkey interface: symkey message-key@0x5c7192346de0 (20-bytes, EXTRACT_KEY_FROM_KEY) 388s | symkey message extracting all 20 bytes of key@0x5c7192346de0 388s | symkey message: symkey-key@0x5c7192346de0 (20-bytes, EXTRACT_KEY_FROM_KEY) 388s | sizeof bytes 32 388s | wrapper: (SECItemType)-984125776: 3e 80 fd 94 05 24 14 00 11 58 0d f8 09 19 74 b0 8f 00 2d 22 44 66 a0 d7 41 12 58 b9 4f 46 b7 e3 388s | symkey message extracted len 32 bytes at 0x5c7192345460 388s | unwrapped: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | XCBC: data 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 .... 388s | K extracting all 16 bytes of key@0x5c71923491a0 388s | K: symkey-key@0x5c71923491a0 (16-bytes, AES_ECB) 388s | sizeof bytes 16 388s | wrapper: (SECItemType)-984125984: 3e 80 fd 94 05 24 14 00 11 58 0d f8 09 19 74 b0 388s | K extracted len 16 bytes at 0x5c7192345390 388s | unwrapped: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | XCBC: K: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | XCBC: K1 388s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55771a0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c7192349840 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577188 388s | Computing E[2] using K3 388s | XCBC: K3 388s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 388s | XCBC: E[n-1] 388s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 388s | XCBC: M[n] 388s | 10 11 12 13 .... 388s | XCBC: M[n] 388s | 10 11 12 13 .... 388s | XCBC: M[n]:80...^E[n-1]^K3 388s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 388s | XCBC: MAC 388s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55772b0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 16-bytes 388s | base: base-key@0x5c7192349840 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577248 388s | PRF symkey interface PRF AES_XCBC final-key@0x5c71923494e0 (size 16) 388s | PRF symkey interface: key-key@0x5c71923494e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | output: symkey-key@0x5c71923494e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracting all 16 bytes of key@0x5c71923494e0 388s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): symkey-key@0x5c71923494e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | sizeof bytes 16 388s | wrapper: (SECItemType)976: 09 8f 26 16 f6 d5 21 e1 7c 1e 73 d3 5d 51 96 0a 388s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracted len 16 bytes at 0x5c7192345390 388s | unwrapped: 388s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 388s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): symkey: ok 388s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 388s | decode_to_chunk() test_prf_vector: input "0x00010203040506070809" 388s | decode_to_chunk() output: 388s | 00 01 02 03 04 05 06 07 08 09 .......... 388s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 388s | decode_to_chunk() output: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 .... 388s | decode_to_chunk() test_prf_vector: input "0x0fa087af7d866e7653434e602fdde835" 388s | decode_to_chunk() output: 388s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 388s | PRF chunk interface PRF AES_XCBC init key hunk 0x5c7192348800 (length 10) 388s | 00 01 02 03 04 05 06 07 08 09 .......... 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55772a0 388s | key-offset: 0, key-size: 10 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 10-bytes 388s | base: base-key@0x5c71923484d0 (26-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577238 388s | XCBC: Key 10<16 too small, padding with zeros 388s | CONCATENATE_BASE_AND_DATA: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923494e0 (10-bytes, EXTRACT_KEY_FROM_KEY) 388s | params: 16-bytes@0x7fffc55771e0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923484d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc55771e8 388s | PRF chunk interface PRF AES_XCBC 0x5c7192348d80 388s | PRF chunk interface PRF AES_XCBC update message (0x5c7192346d10 length 20) 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 .... 388s | XCBC: data 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 .... 388s | K extracting all 16 bytes of key@0x5c7192346de0 388s | K: symkey-key@0x5c7192346de0 (16-bytes, AES_ECB) 388s | sizeof bytes 16 388s | wrapper: (SECItemType)538976288: 27 8b 8f 61 6f 09 ca 52 3a fd 49 b4 7f 08 6b e0 388s | K extracted len 16 bytes at 0x5c7192348820 388s | unwrapped: 388s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 388s | XCBC: K: 388s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 388s | XCBC: K1 388s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc5577150 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923484d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577138 388s | Computing E[2] using K3 388s | XCBC: K3 388s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 388s | XCBC: E[n-1] 388s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 388s | XCBC: M[n] 388s | 10 11 12 13 .... 388s | XCBC: M[n] 388s | 10 11 12 13 .... 388s | XCBC: M[n]:80...^E[n-1]^K3 388s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 388s | XCBC: MAC 388s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 388s | PRF chunk interface PRF AES_XCBC final length 16 388s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 388s | chunk output 388s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 388s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): prf OUT: ok 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc5577320 388s | key-offset: 0, key-size: 10 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 10-bytes 388s | base: base-key@0x5c71923494e0 (26-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc55772b8 388s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x5c7192346de0 (size 10) 388s | PRF symkey interface: key symkey-key@0x5c7192346de0 (10-bytes, EXTRACT_KEY_FROM_KEY) 388s | XCBC: Key 10<16 too small, padding with zeros 388s | CONCATENATE_BASE_AND_DATA: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c7192346de0 (10-bytes, EXTRACT_KEY_FROM_KEY) 388s | params: 16-bytes@0x7fffc5577220 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923494e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577228 388s | PRF symkey interface PRF AES_XCBC 0x5c7192348d80 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc5577320 388s | key-offset: 0, key-size: 20 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 20-bytes 388s | base: base-key@0x5c71923491a0 (36-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc55772b8 388s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x5c71923494e0 (size 20) 388s | PRF symkey interface: symkey message-key@0x5c71923494e0 (20-bytes, EXTRACT_KEY_FROM_KEY) 388s | symkey message extracting all 20 bytes of key@0x5c71923494e0 388s | symkey message: symkey-key@0x5c71923494e0 (20-bytes, EXTRACT_KEY_FROM_KEY) 388s | sizeof bytes 32 388s | wrapper: (SECItemType)-984125776: 3e 80 fd 94 05 24 14 00 11 58 0d f8 09 19 74 b0 8f 00 2d 22 44 66 a0 d7 41 12 58 b9 4f 46 b7 e3 388s | symkey message extracted len 32 bytes at 0x5c7192345490 388s | unwrapped: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | XCBC: data 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 .... 388s | K extracting all 16 bytes of key@0x5c71923484d0 388s | K: symkey-key@0x5c71923484d0 (16-bytes, AES_ECB) 388s | sizeof bytes 16 388s | wrapper: (SECItemType)-984125984: 27 8b 8f 61 6f 09 ca 52 3a fd 49 b4 7f 08 6b e0 388s | K extracted len 16 bytes at 0x5c7192349180 388s | unwrapped: 388s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 388s | XCBC: K: 388s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 388s | XCBC: K1 388s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55771a0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c7192349840 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577188 388s | Computing E[2] using K3 388s | XCBC: K3 388s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 388s | XCBC: E[n-1] 388s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 388s | XCBC: M[n] 388s | 10 11 12 13 .... 388s | XCBC: M[n] 388s | 10 11 12 13 .... 388s | XCBC: M[n]:80...^E[n-1]^K3 388s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 388s | XCBC: MAC 388s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55772b0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 16-bytes 388s | base: base-key@0x5c7192349840 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577248 388s | PRF symkey interface PRF AES_XCBC final-key@0x5c71923491a0 (size 16) 388s | PRF symkey interface: key-key@0x5c71923491a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | output: symkey-key@0x5c71923491a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracting all 16 bytes of key@0x5c71923491a0 388s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): symkey-key@0x5c71923491a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | sizeof bytes 16 388s | wrapper: (SECItemType)976: bc ee 4e 29 c9 ff 73 8c a6 e3 95 37 5b 26 82 d6 388s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracted len 16 bytes at 0x5c7192349180 388s | unwrapped: 388s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 388s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): symkey: ok 388s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 388s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0fedcb" 388s | decode_to_chunk() output: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | ed cb .. 388s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 388s | decode_to_chunk() output: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | 10 11 12 13 .... 388s | decode_to_chunk() test_prf_vector: input "0x8cd3c93ae598a9803006ffb67c40e9e4" 388s | decode_to_chunk() output: 388s | 8c d3 c9 3a e5 98 a9 80 30 06 ff b6 7c 40 e9 e4 ...:....0...|@.. 388s | PRF chunk interface PRF AES_XCBC init key hunk 0x5c7192348800 (length 18) 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | ed cb .. 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55772a0 388s | key-offset: 0, key-size: 18 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 18-bytes 388s | base: base-key@0x5c7192346de0 (34-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577238 388s | XCBC: Key 18>16 too big, rehashing to size 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55771a0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923494e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577188 388s | draft_chunk extracting all 18 bytes of key@0x5c71923491a0 388s | draft_chunk: symkey-key@0x5c71923491a0 (18-bytes, EXTRACT_KEY_FROM_KEY) 388s | sizeof bytes 32 388s | wrapper: (SECItemType)1095914584: 3e 80 fd 94 05 24 14 00 11 58 0d f8 09 19 74 b0 26 67 ca b0 30 98 be bd 14 ac f5 8f 6f 3a fc ff 388s | draft_chunk extracted len 32 bytes at 0x5c7192345490 388s | unwrapped: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | XCBC: data 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | ed cb .. 388s | K extracting all 16 bytes of key@0x5c7192346de0 388s | K: symkey-key@0x5c7192346de0 (16-bytes, AES_ECB) 388s | sizeof bytes 16 388s | wrapper: (SECItemType)774778414: b3 10 47 15 d8 57 70 52 47 f3 f3 8d 7c fb 37 ae 388s | K extracted len 16 bytes at 0x5c7192349820 388s | unwrapped: 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | XCBC: K: 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | XCBC: K1 388s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55770d0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923484d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc55770b8 388s | Computing E[2] using K3 388s | XCBC: K3 388s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 388s | XCBC: E[n-1] 388s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 388s | XCBC: M[n] 388s | ed cb .. 388s | XCBC: M[n] 388s | ed cb .. 388s | XCBC: M[n]:80...^E[n-1]^K3 388s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.16 too big, rehashing to size 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55771e0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c7192346de0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc55771c8 388s | draft_chunk extracting all 18 bytes of key@0x5c71923494e0 388s | draft_chunk: symkey-key@0x5c71923494e0 (18-bytes, EXTRACT_KEY_FROM_KEY) 388s | sizeof bytes 32 388s | wrapper: (SECItemType)16: 3e 80 fd 94 05 24 14 00 11 58 0d f8 09 19 74 b0 26 67 ca b0 30 98 be bd 14 ac f5 8f 6f 3a fc ff 388s | draft_chunk extracted len 32 bytes at 0x5c7192348d80 388s | unwrapped: 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | XCBC: data 388s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 388s | ed cb .. 388s | K extracting all 16 bytes of key@0x5c71923491a0 388s | K: symkey-key@0x5c71923491a0 (16-bytes, AES_ECB) 388s | sizeof bytes 16 388s | wrapper: (SECItemType)774778414: b3 10 47 15 d8 57 70 52 47 f3 f3 8d 7c fb 37 ae 388s | K extracted len 16 bytes at 0x5c7192348700 388s | unwrapped: 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | XCBC: K: 388s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | XCBC: K1 388s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc5577110 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: AES_ECB 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923484d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc55770f8 388s | Computing E[2] using K3 388s | XCBC: K3 388s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 388s | XCBC: E[n-1] 388s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 388s | XCBC: M[n] 388s | ed cb .. 388s | XCBC: M[n] 388s | ed cb .. 388s | XCBC: M[n]:80...^E[n-1]^K3 388s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.j.....n1.].8 388s | PRF chunk interface PRF HMAC_MD5 init key hunk 0x5c7192346d10 (length 4) 388s | 4a 65 66 65 Jefe 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc5577250 388s | key-offset: 0, key-size: 4 388s | EXTRACT_KEY_FROM_KEY: 388s | target: MD5_HMAC 388s | flags: SIGN 388s | key_size: 4-bytes 388s | base: base-key@0x5c71923484d0 (20-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577238 388s | PRF chunk interface prf: created HMAC_MD5 context 0x5c7192348840 from key-key@0x5c71923494e0 388s | PRF chunk interface prf: begin HMAC_MD5 with context 0x5c7192348840 from key-key@0x5c71923494e0 388s | PRF chunk interface PRF HMAC_MD5 0x5c7192348e10 388s | PRF chunk interface PRF HMAC_MD5 update message (0x5c7192348d80 length 28) 388s | 77 68 61 74 20 64 6f 20 79 61 20 77 61 6e 74 20 what do ya want 388s | 66 6f 72 20 6e 6f 74 68 69 6e 67 3f for nothing? 388s | PRF chunk interface PRF HMAC_MD5 final length 16 388s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 388s | chunk output 388s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 388s | verify_bytes() RFC 2104: MD5_HMAC test 2: prf OUT: ok 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc5577320 388s | key-offset: 0, key-size: 4 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 4-bytes 388s | base: base-key@0x5c71923484d0 (20-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc55772b8 388s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0x5c71923494e0 (size 4) 388s | PRF symkey interface: key symkey-key@0x5c71923494e0 (4-bytes, EXTRACT_KEY_FROM_KEY) 388s | key-offset: 0, key-size: 4 388s | EXTRACT_KEY_FROM_KEY: 388s | target: MD5_HMAC 388s | flags: SIGN 388s | key_size: 4-bytes 388s | base: base-key@0x5c71923494e0 (4-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577298 388s | PRF symkey interface prf: created HMAC_MD5 context 0x5c71923492e0 from key symkey-key@0x5c71923484d0 388s | PRF symkey interface prf: begin HMAC_MD5 with context 0x5c71923492e0 from key symkey-key@0x5c71923484d0 388s | PRF symkey interface PRF HMAC_MD5 0x5c7192345460 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc5577320 388s | key-offset: 0, key-size: 28 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 28-bytes 388s | base: base-key@0x5c7192346de0 (44-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc55772b8 388s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0x5c71923491a0 (size 28) 388s | PRF symkey interface: symkey message-key@0x5c71923491a0 (28-bytes, EXTRACT_KEY_FROM_KEY) 388s | nss hmac digest hack extracting all 28 bytes of key@0x5c71923491a0 388s | nss hmac digest hack: symkey-key@0x5c71923491a0 (28-bytes, EXTRACT_KEY_FROM_KEY) 388s | sizeof bytes 32 388s | wrapper: (SECItemType)-984125776: 6f 01 e2 e4 9d a8 d0 6d d5 aa f5 55 cc 19 88 0e 4c f9 ca 87 0a bd cd ea bf 86 ef b2 13 cc de 11 388s | nss hmac digest hack extracted len 32 bytes at 0x5c719234ddd0 388s | unwrapped: 388s | 77 68 61 74 20 64 6f 20 79 61 20 77 61 6e 74 20 what do ya want 388s | 66 6f 72 20 6e 6f 74 68 69 6e 67 3f 00 00 00 00 for nothing?.... 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55772c0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 16-bytes 388s | base: base-key@0x5c7192346de0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577258 388s | PRF symkey interface PRF HMAC_MD5 final-key@0x5c71923484d0 (size 16) 388s | PRF symkey interface: key-key@0x5c71923484d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | output: symkey-key@0x5c71923484d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | RFC 2104: MD5_HMAC test 2 extracting all 16 bytes of key@0x5c71923484d0 388s | RFC 2104: MD5_HMAC test 2: symkey-key@0x5c71923484d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | sizeof bytes 16 388s | wrapper: (SECItemType)976: e3 aa d1 1a c2 99 69 46 39 dc ef 6a 23 48 cc 0a 388s | RFC 2104: MD5_HMAC test 2 extracted len 16 bytes at 0x5c7192348820 388s | unwrapped: 388s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 388s | verify_bytes() RFC 2104: MD5_HMAC test 2: symkey: ok 388s ipsec algparse: RFC 2104: MD5_HMAC test 3 388s | decode_to_chunk() test_prf_vector: input "0xAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" 388s | decode_to_chunk() output: 388s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 388s | decode_to_chunk() test_prf_vector: input "0xDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD" 388s | decode_to_chunk() output: 388s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 388s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 388s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 388s | dd dd .. 388s | decode_to_chunk() test_prf_vector: input "0x56be34521d144c88dbb8c733f0e8b3f6" 388s | decode_to_chunk() output: 388s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 388s | PRF chunk interface PRF HMAC_MD5 init key hunk 0x5c7192345390 (length 16) 388s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc5577250 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: MD5_HMAC 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923494e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577238 388s | PRF chunk interface prf: created HMAC_MD5 context 0x5c71923498d0 from key-key@0x5c71923484d0 388s | PRF chunk interface prf: begin HMAC_MD5 with context 0x5c71923498d0 from key-key@0x5c71923484d0 388s | PRF chunk interface PRF HMAC_MD5 0x5c7192345490 388s | PRF chunk interface PRF HMAC_MD5 update message (0x5c7192348d40 length 50) 388s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 388s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 388s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 388s | dd dd .. 388s | PRF chunk interface PRF HMAC_MD5 final length 16 388s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 388s | chunk output 388s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 388s | verify_bytes() RFC 2104: MD5_HMAC test 3: prf OUT: ok 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc5577320 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923494e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc55772b8 388s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0x5c71923484d0 (size 16) 388s | PRF symkey interface: key symkey-key@0x5c71923484d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: MD5_HMAC 388s | flags: SIGN 388s | key_size: 16-bytes 388s | base: base-key@0x5c71923484d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577298 388s | PRF symkey interface prf: created HMAC_MD5 context 0x5c7192348300 from key symkey-key@0x5c71923494e0 388s | PRF symkey interface prf: begin HMAC_MD5 with context 0x5c7192348300 from key symkey-key@0x5c71923494e0 388s | PRF symkey interface PRF HMAC_MD5 0x5c7192348d80 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc5577320 388s | key-offset: 0, key-size: 50 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 50-bytes 388s | base: base-key@0x5c7192346de0 (66-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc55772b8 388s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0x5c71923491a0 (size 50) 388s | PRF symkey interface: symkey message-key@0x5c71923491a0 (50-bytes, EXTRACT_KEY_FROM_KEY) 388s | nss hmac digest hack extracting all 50 bytes of key@0x5c71923491a0 388s | nss hmac digest hack: symkey-key@0x5c71923491a0 (50-bytes, EXTRACT_KEY_FROM_KEY) 388s | sizeof bytes 64 388s | wrapper: (SECItemType)-984125776: d0 6e 2e 6a bb 62 29 a7 a0 c2 d8 0b 75 78 52 78 d0 6e 2e 6a bb 62 29 a7 a0 c2 d8 0b 75 78 52 78 d0 6e 2e 6a bb 62 29 a7 a0 c2 d8 0b 75 78 52 78 b9 c4 e5 98 a8 0b 45 e7 fc bd 0f 98 f6 cc 1f 11 388s | nss hmac digest hack extracted len 64 bytes at 0x5c7192348e40 388s | unwrapped: 388s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 388s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 388s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 388s | dd dd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc55772c0 388s | key-offset: 0, key-size: 16 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 16-bytes 388s | base: base-key@0x5c7192346de0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577258 388s | PRF symkey interface PRF HMAC_MD5 final-key@0x5c71923494e0 (size 16) 388s | PRF symkey interface: key-key@0x5c71923494e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | output: symkey-key@0x5c71923494e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | RFC 2104: MD5_HMAC test 3 extracting all 16 bytes of key@0x5c71923494e0 388s | RFC 2104: MD5_HMAC test 3: symkey-key@0x5c71923494e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 388s | sizeof bytes 16 388s | wrapper: (SECItemType)976: e8 11 34 6f 79 90 fd 80 8e 15 e6 20 45 ed ec 5f 388s | RFC 2104: MD5_HMAC test 3 extracted len 16 bytes at 0x5c7192348b10 388s | unwrapped: 388s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 388s | verify_bytes() RFC 2104: MD5_HMAC test 3: symkey: ok 388s ipsec algparse: testing HMAC_SHA1: 388s ipsec algparse: CAVP: IKEv2 key derivation with HMAC-SHA1 388s | decode_to_chunk() test_kdf_vector: input "0x32b50d5f4a3763f3" 388s | decode_to_chunk() output: 388s | 32 b5 0d 5f 4a 37 63 f3 2.._J7c. 388s | decode_to_chunk() test_kdf_vector: input "0x9206a04b26564cb1" 388s | decode_to_chunk() output: 388s | 92 06 a0 4b 26 56 4c b1 ...K&VL. 388s | decode_to_chunk() test_kdf_vector: input "0x34c9e7c188868785" 388s | decode_to_chunk() output: 388s | 34 c9 e7 c1 88 86 87 85 4....... 388s | decode_to_chunk() test_kdf_vector: input "0x3ff77d760d2b2199" 388s | decode_to_chunk() output: 388s | 3f f7 7d 76 0d 2b 21 99 ?.}v.+!. 388s | decode_to_chunk() test_kdf_vector: input "0x4b2c1f971981a8ad8d0abeafabf38cf75fc8349c148142465ed9c8b516b8be52" 388s | decode_to_chunk() output: 388s | 4b 2c 1f 97 19 81 a8 ad 8d 0a be af ab f3 8c f7 K,.............. 388s | 5f c8 34 9c 14 81 42 46 5e d9 c8 b5 16 b8 be 52 _.4...BF^......R 388s | decode_to_chunk() test_kdf_vector: input "0x863f3c9d06efd39d2b907b97f8699e5dd5251ef64a2a176f36ee40c87d4f9330" 388s | decode_to_chunk() output: 388s | 86 3f 3c 9d 06 ef d3 9d 2b 90 7b 97 f8 69 9e 5d .?<.....+.{..i.] 388s | d5 25 1e f6 4a 2a 17 6f 36 ee 40 c8 7d 4f 93 30 .%..J*.o6.@.}O.0 388s | decode_to_chunk() test_kdf_vector: input "0xa9a7b222b59f8f48645f28a1db5b5f5d7479cba7" 388s | decode_to_chunk() output: 388s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 388s | 74 79 cb a7 ty.. 388s | decode_to_chunk() test_kdf_vector: input "0x63e81194946ebd05df7df5ebf5d8750056bf1f1d" 388s | decode_to_chunk() output: 388s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 388s | 56 bf 1f 1d V... 388s | decode_to_chunk() test_kdf_vector: input "0xa14293677cc80ff8f9cc0eee30d895da9d8f405666e30ef0dfcb63c634a46002a2a63080e514a062768b76606f9fa5e992204fc5a670bde3f10d6b027113936a5c55b648a194ae587b0088d52204b702c979fa280870d2ed41efa9c549fd11198af1670b143d384bd275c5f594cf266b05ebadca855e4249520a441a81157435a7a56cc4" 388s | decode_to_chunk() output: 388s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 388s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 388s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 388s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 388s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 388s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 388s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 388s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 388s | a7 a5 6c c4 ..l. 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc5577350 388s | key-offset: 0, key-size: 32 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 32-bytes 388s | base: base-key@0x5c71923484d0 (48-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc55772e8 388s | NSS_IKE_PRF_DERIVE: 388s | target: NSS_IKE_PRF_PLUS_DERIVE 388s | base: base-key@0x5c71923494e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 388s | params: 56-bytes@0x7fffc5577350 388s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0x5c71923484d0 388s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x5c71923484d0 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 388s | sizeof bytes 32 388s | wrapper: (SECItemType)538976380: 88 a2 9f 01 50 8b 56 11 a9 81 40 6e 71 05 33 3f 43 b8 9b 8d 26 bf c8 f3 71 b3 d0 58 f2 c0 00 eb 388s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0x5c7192348e10 388s | unwrapped: 388s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 388s | 74 79 cb a7 00 00 00 00 00 00 00 00 00 00 00 00 ty.............. 388s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: skeyseed: ok 388s | NSS_IKE_PRF_PLUS_DERIVE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 132-bytes 388s | base: base-key@0x5c71923484d0 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 388s | params: 40-bytes@0x7fffc5577290 388s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 132 bytes of key@0x5c71923491a0 388s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x5c71923491a0 (132-bytes, EXTRACT_KEY_FROM_KEY) 388s | sizeof bytes 144 388s | wrapper: (SECItemType)538976380: eb d2 f9 7c 19 0d dd 18 e5 50 b0 f7 82 23 8e ec 25 af f0 79 a4 7d c5 22 f2 1c 20 b6 c5 24 02 27 b0 5b 3a 8b c0 45 66 cd 6c 1e c7 87 43 4f 6c a2 e2 90 c7 f7 86 cc ce 83 83 a8 c2 ff 68 12 71 72 10 23 9e 26 a8 f1 bb 38 52 c0 49 02 86 89 c5 de 4f 62 92 44 36 1f 90 b8 a5 a4 5c c7 cd 82 b5 92 06 d6 5a 9b 8d 53 f0 f5 16 46 df 11 1a c8 81 36 e0 45 cb 2e cf 19 b4 de 4f e9 4e 2b fe ee 72 62 eb 52 10 a6 f0 d3 dd ec f4 9e 79 cb 04 08 3f 1b 388s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 144 bytes at 0x5c71923483b0 388s | unwrapped: 388s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 388s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 388s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 388s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 388s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 388s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 388s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 388s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 388s | a7 a5 6c c4 00 00 00 00 00 00 00 00 00 00 00 00 ..l............. 388s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: DKM: ok 388s | key-offset: 0, key-size: 20 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 20-bytes 388s | base: base-key@0x5c71923491a0 (132-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc5577368 388s | CONCATENATE_DATA_AND_BASE: 388s | target: EXTRACT_KEY_FROM_KEY 388s | base: base-key@0x5c71923454c0 (16-bytes, AES_KEY_GEN) 388s | params: 16-bytes@0x7fffc5577340 388s | key-offset: 0, key-size: 32 388s | EXTRACT_KEY_FROM_KEY: 388s | target: EXTRACT_KEY_FROM_KEY 388s | key_size: 32-bytes 388s | base: base-key@0x5c7192349230 (48-bytes, EXTRACT_KEY_FROM_KEY) 388s | operation: FLAGS_ONLY 388s | params: 8-bytes@0x7fffc55772d8 388s | NSS_IKE_PRF_DERIVE: 388s | target: NSS_IKE_PRF_PLUS_DERIVE 388s | base: base-key@0x5c7192346de0 (20-bytes, EXTRACT_KEY_FROM_KEY) 388s | params: 56-bytes@0x7fffc5577330 388s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0x5c7192349230 388s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x5c7192349230 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 388s | sizeof bytes 32 388s | wrapper: (SECItemType)858994487: b1 50 a3 a5 14 32 8b 5e c2 cb 34 5a 5d a1 b0 8c e8 b3 48 58 5a c0 7f 38 6f 46 3c 76 c0 cf 82 72 388s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0x5c7192345490 388s | unwrapped: 388s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 388s | 56 bf 1f 1d 00 00 00 00 00 00 00 00 00 00 00 00 V............... 388s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: skeyseed_rekey: ok 388s ipsec algparse: leak detective found no leaks 388s /usr/libexec/ipsec/pluto: adjusting nssdir to /tmp/tmp.RxjEp9BnfQ 388s /usr/libexec/ipsec/pluto: selftest: skipping lock 388s /usr/libexec/ipsec/pluto: selftest: skipping control socket 388s /usr/libexec/ipsec/pluto: selftest: skipping fork 388s Starting Pluto (Libreswan Version 5.2 IKEv2 IKEv1 XFRM XFRMI esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) (NSS-KDF) DNSSEC SYSTEMD_WATCHDOG LABELED_IPSEC (SELINUX) LIBCAP_NG LINUX_AUDIT AUTH_PAM NETWORKMANAGER CURL(non-NSS) LDAP(non-NSS) NFTABLES CAT NFLOG) pid:1530 388s operating system: Linux 6.18.0 [Linux 6.18.0-9-generic #9-Ubuntu SMP PREEMPT_DYNAMIC Mon Jan 12 16:49:02 UTC 2026 x86_64] 388s core dump dir: /run/pluto 388s secrets file: /etc/ipsec.secrets 388s Initializing NSS using read-only database "sql:/tmp/tmp.RxjEp9BnfQ" 388s FIPS Mode: OFF 388s NSS crypto library initialized 388s FIPS mode disabled for pluto daemon 388s FIPS HMAC integrity support [not required] 388s libcap-ng capng_apply failed to apply changes, err=-5. see: man capng_apply 388s libcap-ng support [enabled] 388s Linux audit support [enabled] 388s leak-detective disabled 388s NSS crypto [enabled] 388s XAUTH PAM support [enabled] 388s initializing libevent in pthreads mode: headers: 2.1.12-stable (2010c00); library: 2.1.12-stable (2010c00) 388s NAT-Traversal: keep-alive period 20s 388s ERROR: xfrmi is not supported, failed to create ipsec-interface ipsec1 bound to lo 388s ipsec-interface is not working: xfrmi is not supported 388s IPsec Interface [disabled] 388s refreshed session resume keys, issuing key 1 388s Encryption algorithms: 388s AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 388s AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 388s AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 388s 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 388s CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 388s CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 388s AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 388s AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 388s AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 388s AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 388s AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 388s NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 388s NULL [] IKEv1: ESP IKEv2: ESP NULL 388s CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 388s Hash algorithms: 388s MD5 IKEv1: IKE IKEv2: NSS 388s SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 388s SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 388s SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 388s SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 388s IDENTITY IKEv1: IKEv2: FIPS 388s PRF algorithms: 388s HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 388s HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 388s HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 388s HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 388s HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 388s AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 388s Integrity algorithms: 388s HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 388s HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 388s HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 388s HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 388s HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 388s HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 388s AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 388s AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 388s NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 388s DH algorithms: 388s NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 388s MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 388s MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 388s MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 388s MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 388s MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 388s MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 388s DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 388s DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 388s DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 388s DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 388s IPCOMP algorithms: 388s DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 388s LZS IKEv1: IKEv2: ESP AH FIPS 388s LZJH IKEv1: IKEv2: ESP AH FIPS 388s testing CAMELLIA_CBC: 388s Camellia: 16 bytes with 128-bit key 388s Camellia: 16 bytes with 128-bit key 388s Camellia: 16 bytes with 256-bit key 388s Camellia: 16 bytes with 256-bit key 388s testing AES_GCM_16: 388s empty string 388s one block 388s two blocks 388s two blocks with associated data 388s testing AES_CTR: 388s Encrypting 16 octets using AES-CTR with 128-bit key 388s Encrypting 32 octets using AES-CTR with 128-bit key 388s Encrypting 36 octets using AES-CTR with 128-bit key 388s Encrypting 16 octets using AES-CTR with 192-bit key 388s Encrypting 32 octets using AES-CTR with 192-bit key 388s Encrypting 36 octets using AES-CTR with 192-bit key 388s Encrypting 16 octets using AES-CTR with 256-bit key 388s Encrypting 32 octets using AES-CTR with 256-bit key 388s Encrypting 36 octets using AES-CTR with 256-bit key 388s testing AES_CBC: 388s Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 388s Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 388s Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 388s Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 388s testing AES_XCBC: 388s RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 388s RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 388s RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 388s RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 388s RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 388s RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 388s RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 388s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 388s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 388s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 388s testing HMAC_MD5: 388s RFC 2104: MD5_HMAC test 1 388s RFC 2104: MD5_HMAC test 2 388s RFC 2104: MD5_HMAC test 3 388s testing HMAC_SHA1: 388s CAVP: IKEv2 key derivation with HMAC-SHA1 388s selftest: exiting pluto 388s initializing NSS db 388s running pluto selftest 389s autopkgtest [12:36:39]: test cryptocheck: -----------------------] 389s autopkgtest [12:36:39]: test cryptocheck: - - - - - - - - - - results - - - - - - - - - - 389s cryptocheck PASS 389s autopkgtest [12:36:39]: test cavp: preparing testbed 408s Creating nova instance adt-resolute-amd64-libreswan-20260206-123010-juju-7f2275-prod-proposed-migration-environment-20-b0061ad4-adb4-46b2-ab10-f4b0e2840438 from image adt/ubuntu-resolute-amd64-server-20260204.img (UUID fedf54b4-458b-493e-8072-6425c19717b4)... 481s autopkgtest [12:38:11]: testbed dpkg architecture: amd64 481s autopkgtest [12:38:11]: testbed apt version: 3.1.14 481s autopkgtest [12:38:11]: @@@@@@@@@@@@@@@@@@@@ test bed setup 482s autopkgtest [12:38:12]: testbed release detected to be: resolute 482s autopkgtest [12:38:12]: updating testbed package index (apt update) 482s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 482s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 482s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 482s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 483s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [30.8 kB] 483s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [194 kB] 483s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [9256 B] 483s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1492 kB] 483s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main i386 Packages [185 kB] 483s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 Packages [253 kB] 483s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 c-n-f Metadata [7520 B] 483s Get:12 http://ftpmaster.internal/ubuntu resolute-proposed/restricted i386 Packages [3692 B] 483s Get:13 http://ftpmaster.internal/ubuntu resolute-proposed/restricted amd64 Packages [68.4 kB] 483s Get:14 http://ftpmaster.internal/ubuntu resolute-proposed/restricted amd64 c-n-f Metadata [336 B] 483s Get:15 http://ftpmaster.internal/ubuntu resolute-proposed/universe i386 Packages [522 kB] 483s Get:16 http://ftpmaster.internal/ubuntu resolute-proposed/universe amd64 Packages [1362 kB] 483s Get:17 http://ftpmaster.internal/ubuntu resolute-proposed/universe amd64 c-n-f Metadata [37.6 kB] 483s Get:18 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse i386 Packages [4320 B] 483s Get:19 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse amd64 Packages [26.7 kB] 483s Get:20 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse amd64 c-n-f Metadata [1060 B] 484s Fetched 4323 kB in 1s (4800 kB/s) 484s Reading package lists... 485s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 485s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 485s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 485s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 486s Reading package lists... 486s Reading package lists... 486s Building dependency tree... 486s Reading state information... 486s Calculating upgrade... 486s The following packages will be upgraded: 486s amd64-microcode busybox-initramfs busybox-static dmsetup findutils less 486s libattr1 libdevmapper1.02.1 libdrm-amdgpu1 libdrm-common libdrm2 libgpm2 486s libkeyutils1 libmaxminddb0 libnpth0t64 libpam-modules libpam-modules-bin 486s libpam-runtime libpam0g libsensors-config libsensors5 mawk patch pollinate 486s python3-linkify-it python3-markdown-it python3-referencing sed tar 486s 29 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 486s Need to get 3809 kB of archives. 486s After this operation, 291 kB disk space will be freed. 486s Get:1 http://ftpmaster.internal/ubuntu resolute/main amd64 findutils amd64 4.10.0-3build2 [307 kB] 486s Get:2 http://ftpmaster.internal/ubuntu resolute/main amd64 sed amd64 4.9-2build3 [195 kB] 486s Get:3 http://ftpmaster.internal/ubuntu resolute/main amd64 tar amd64 1.35+dfsg-3.1build2 [257 kB] 486s Get:4 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 libpam-runtime all 1.7.0-5ubuntu3 [149 kB] 486s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 libpam0g amd64 1.7.0-5ubuntu3 [69.9 kB] 486s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 libpam-modules-bin amd64 1.7.0-5ubuntu3 [45.6 kB] 486s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 libpam-modules amd64 1.7.0-5ubuntu3 [193 kB] 486s Get:8 http://ftpmaster.internal/ubuntu resolute/main amd64 libattr1 amd64 1:2.5.2-3build2 [11.4 kB] 486s Get:9 http://ftpmaster.internal/ubuntu resolute/main amd64 mawk amd64 1.3.4.20260129-1 [133 kB] 486s Get:10 http://ftpmaster.internal/ubuntu resolute/main amd64 libdevmapper1.02.1 amd64 2:1.02.205-2ubuntu3 [142 kB] 486s Get:11 http://ftpmaster.internal/ubuntu resolute/main amd64 dmsetup amd64 2:1.02.205-2ubuntu3 [79.4 kB] 486s Get:12 http://ftpmaster.internal/ubuntu resolute/main amd64 less amd64 668-1build1 [172 kB] 486s Get:13 http://ftpmaster.internal/ubuntu resolute/main amd64 libkeyutils1 amd64 1.6.3-6ubuntu3 [10.6 kB] 486s Get:14 http://ftpmaster.internal/ubuntu resolute/main amd64 python3-linkify-it all 2.0.3-1ubuntu3 [19.4 kB] 486s Get:15 http://ftpmaster.internal/ubuntu resolute/main amd64 python3-markdown-it all 3.0.0-3build1 [54.4 kB] 486s Get:16 http://ftpmaster.internal/ubuntu resolute/main amd64 busybox-static amd64 1:1.37.0-7ubuntu1 [1034 kB] 486s Get:17 http://ftpmaster.internal/ubuntu resolute/main amd64 libdrm-common all 2.4.131-1 [9774 B] 486s Get:18 http://ftpmaster.internal/ubuntu resolute/main amd64 libdrm2 amd64 2.4.131-1 [42.3 kB] 486s Get:19 http://ftpmaster.internal/ubuntu resolute/main amd64 libgpm2 amd64 1.20.7-12build1 [14.4 kB] 486s Get:20 http://ftpmaster.internal/ubuntu resolute/main amd64 libmaxminddb0 amd64 1.12.2-1build2 [18.9 kB] 486s Get:21 http://ftpmaster.internal/ubuntu resolute/main amd64 libsensors-config all 1:3.6.2-2build1 [6862 B] 486s Get:22 http://ftpmaster.internal/ubuntu resolute/main amd64 libsensors5 amd64 1:3.6.2-2build1 [28.9 kB] 486s Get:23 http://ftpmaster.internal/ubuntu resolute/main amd64 busybox-initramfs amd64 1:1.37.0-7ubuntu1 [191 kB] 486s Get:24 http://ftpmaster.internal/ubuntu resolute/main amd64 libdrm-amdgpu1 amd64 2.4.131-1 [23.2 kB] 486s Get:25 http://ftpmaster.internal/ubuntu resolute/main amd64 libnpth0t64 amd64 1.8-3build1 [9302 B] 486s Get:26 http://ftpmaster.internal/ubuntu resolute/main amd64 patch amd64 2.8-2build1 [95.7 kB] 486s Get:27 http://ftpmaster.internal/ubuntu resolute/main amd64 pollinate all 4.33-4ubuntu5 [14.0 kB] 486s Get:28 http://ftpmaster.internal/ubuntu resolute/main amd64 python3-referencing all 0.36.2-1ubuntu2 [22.2 kB] 486s Get:29 http://ftpmaster.internal/ubuntu resolute/main amd64 amd64-microcode amd64 3.20251202.1ubuntu1 [459 kB] 486s dpkg-preconfigure: unable to re-open stdin: No such file or directory 486s Fetched 3809 kB in 0s (19.1 MB/s) 487s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 487s Preparing to unpack .../findutils_4.10.0-3build2_amd64.deb ... 487s Unpacking findutils (4.10.0-3build2) over (4.10.0-3build1) ... 487s Setting up findutils (4.10.0-3build2) ... 487s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 487s Preparing to unpack .../sed_4.9-2build3_amd64.deb ... 487s Unpacking sed (4.9-2build3) over (4.9-2build2) ... 487s Setting up sed (4.9-2build3) ... 487s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 487s Preparing to unpack .../tar_1.35+dfsg-3.1build2_amd64.deb ... 487s Unpacking tar (1.35+dfsg-3.1build2) over (1.35+dfsg-3.1build1) ... 487s Setting up tar (1.35+dfsg-3.1build2) ... 487s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 487s Preparing to unpack .../libpam-runtime_1.7.0-5ubuntu3_all.deb ... 487s Unpacking libpam-runtime (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 487s Setting up libpam-runtime (1.7.0-5ubuntu3) ... 487s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 487s Preparing to unpack .../libpam0g_1.7.0-5ubuntu3_amd64.deb ... 487s Unpacking libpam0g:amd64 (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 487s Setting up libpam0g:amd64 (1.7.0-5ubuntu3) ... 487s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 487s Preparing to unpack .../libpam-modules-bin_1.7.0-5ubuntu3_amd64.deb ... 487s Unpacking libpam-modules-bin (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 487s Setting up libpam-modules-bin (1.7.0-5ubuntu3) ... 487s pam_namespace.service is a disabled or a static unit not running, not starting it. 487s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 487s Preparing to unpack .../libpam-modules_1.7.0-5ubuntu3_amd64.deb ... 488s Unpacking libpam-modules:amd64 (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 488s Setting up libpam-modules:amd64 (1.7.0-5ubuntu3) ... 488s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 488s Preparing to unpack .../libattr1_1%3a2.5.2-3build2_amd64.deb ... 488s Unpacking libattr1:amd64 (1:2.5.2-3build2) over (1:2.5.2-3build1) ... 488s Setting up libattr1:amd64 (1:2.5.2-3build2) ... 488s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 488s Preparing to unpack .../00-mawk_1.3.4.20260129-1_amd64.deb ... 488s Unpacking mawk (1.3.4.20260129-1) over (1.3.4.20250131-2) ... 488s Preparing to unpack .../01-libdevmapper1.02.1_2%3a1.02.205-2ubuntu3_amd64.deb ... 488s Unpacking libdevmapper1.02.1:amd64 (2:1.02.205-2ubuntu3) over (2:1.02.205-2ubuntu2) ... 488s Preparing to unpack .../02-dmsetup_2%3a1.02.205-2ubuntu3_amd64.deb ... 488s Unpacking dmsetup (2:1.02.205-2ubuntu3) over (2:1.02.205-2ubuntu2) ... 488s Preparing to unpack .../03-less_668-1build1_amd64.deb ... 488s Unpacking less (668-1build1) over (668-1) ... 488s Preparing to unpack .../04-libkeyutils1_1.6.3-6ubuntu3_amd64.deb ... 488s Unpacking libkeyutils1:amd64 (1.6.3-6ubuntu3) over (1.6.3-6ubuntu2) ... 488s Preparing to unpack .../05-python3-linkify-it_2.0.3-1ubuntu3_all.deb ... 488s Unpacking python3-linkify-it (2.0.3-1ubuntu3) over (2.0.3-1ubuntu2) ... 488s Preparing to unpack .../06-python3-markdown-it_3.0.0-3build1_all.deb ... 488s Unpacking python3-markdown-it (3.0.0-3build1) over (3.0.0-3) ... 488s Preparing to unpack .../07-busybox-static_1%3a1.37.0-7ubuntu1_amd64.deb ... 488s Unpacking busybox-static (1:1.37.0-7ubuntu1) over (1:1.37.0-4ubuntu1) ... 488s Preparing to unpack .../08-libdrm-common_2.4.131-1_all.deb ... 488s Unpacking libdrm-common (2.4.131-1) over (2.4.129-1) ... 488s Preparing to unpack .../09-libdrm2_2.4.131-1_amd64.deb ... 488s Unpacking libdrm2:amd64 (2.4.131-1) over (2.4.129-1) ... 488s Preparing to unpack .../10-libgpm2_1.20.7-12build1_amd64.deb ... 488s Unpacking libgpm2:amd64 (1.20.7-12build1) over (1.20.7-12) ... 488s Preparing to unpack .../11-libmaxminddb0_1.12.2-1build2_amd64.deb ... 488s Unpacking libmaxminddb0:amd64 (1.12.2-1build2) over (1.12.2-1build1) ... 488s Preparing to unpack .../12-libsensors-config_1%3a3.6.2-2build1_all.deb ... 488s Unpacking libsensors-config (1:3.6.2-2build1) over (1:3.6.2-2) ... 488s Preparing to unpack .../13-libsensors5_1%3a3.6.2-2build1_amd64.deb ... 488s Unpacking libsensors5:amd64 (1:3.6.2-2build1) over (1:3.6.2-2) ... 488s Preparing to unpack .../14-busybox-initramfs_1%3a1.37.0-7ubuntu1_amd64.deb ... 488s Unpacking busybox-initramfs (1:1.37.0-7ubuntu1) over (1:1.37.0-4ubuntu1) ... 488s Preparing to unpack .../15-libdrm-amdgpu1_2.4.131-1_amd64.deb ... 488s Unpacking libdrm-amdgpu1:amd64 (2.4.131-1) over (2.4.129-1) ... 488s Preparing to unpack .../16-libnpth0t64_1.8-3build1_amd64.deb ... 488s Unpacking libnpth0t64:amd64 (1.8-3build1) over (1.8-3) ... 488s Preparing to unpack .../17-patch_2.8-2build1_amd64.deb ... 488s Unpacking patch (2.8-2build1) over (2.8-2) ... 489s Preparing to unpack .../18-pollinate_4.33-4ubuntu5_all.deb ... 489s Unpacking pollinate (4.33-4ubuntu5) over (4.33-4ubuntu4) ... 489s Preparing to unpack .../19-python3-referencing_0.36.2-1ubuntu2_all.deb ... 489s Unpacking python3-referencing (0.36.2-1ubuntu2) over (0.36.2-1ubuntu1) ... 489s Preparing to unpack .../20-amd64-microcode_3.20251202.1ubuntu1_amd64.deb ... 489s Unpacking amd64-microcode (3.20251202.1ubuntu1) over (3.20250708.1ubuntu1) ... 489s Setting up libnpth0t64:amd64 (1.8-3build1) ... 489s Setting up libkeyutils1:amd64 (1.6.3-6ubuntu3) ... 489s Setting up libgpm2:amd64 (1.20.7-12build1) ... 489s Setting up libmaxminddb0:amd64 (1.12.2-1build2) ... 489s Setting up libsensors-config (1:3.6.2-2build1) ... 489s Setting up less (668-1build1) ... 489s Setting up amd64-microcode (3.20251202.1ubuntu1) ... 489s amd64-microcode: microcode will be updated at next boot 489s Setting up pollinate (4.33-4ubuntu5) ... 499s Setting up busybox-static (1:1.37.0-7ubuntu1) ... 499s Setting up patch (2.8-2build1) ... 499s Setting up libsensors5:amd64 (1:3.6.2-2build1) ... 499s Setting up busybox-initramfs (1:1.37.0-7ubuntu1) ... 499s Setting up libdevmapper1.02.1:amd64 (2:1.02.205-2ubuntu3) ... 499s Setting up dmsetup (2:1.02.205-2ubuntu3) ... 499s Setting up python3-linkify-it (2.0.3-1ubuntu3) ... 499s Setting up mawk (1.3.4.20260129-1) ... 499s Setting up libdrm-common (2.4.131-1) ... 499s Setting up python3-referencing (0.36.2-1ubuntu2) ... 499s Setting up python3-markdown-it (3.0.0-3build1) ... 499s Setting up libdrm2:amd64 (2.4.131-1) ... 499s Setting up libdrm-amdgpu1:amd64 (2.4.131-1) ... 499s Processing triggers for libc-bin (2.42-2ubuntu4) ... 499s Processing triggers for man-db (2.13.1-1) ... 500s Processing triggers for install-info (7.2-5) ... 500s Processing triggers for initramfs-tools (0.150ubuntu7) ... 500s update-initramfs: Generating /boot/initrd.img-6.18.0-9-generic 505s autopkgtest [12:38:35]: upgrading testbed (apt dist-upgrade and autopurge) 505s Reading package lists... 505s Building dependency tree... 505s Reading state information... 505s Calculating upgrade... 505s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 506s Reading package lists... 506s Building dependency tree... 506s Reading state information... 506s Solving dependencies... 506s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 506s autopkgtest [12:38:36]: rebooting testbed after setup commands that affected boot 537s Reading package lists... 537s Building dependency tree... 537s Reading state information... 537s Solving dependencies... 537s The following NEW packages will be installed: 537s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 537s libnss3-tools libreswan libunbound8 537s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 537s Need to get 2953 kB of archives. 537s After this operation, 11.9 MB of additional disk space will be used. 537s Get:1 http://ftpmaster.internal/ubuntu resolute/main amd64 dns-root-data all 2025080400build1 [6022 B] 537s Get:2 http://ftpmaster.internal/ubuntu resolute/main amd64 libnss3-tools amd64 2:3.120-1 [626 kB] 537s Get:3 http://ftpmaster.internal/ubuntu resolute/main amd64 libevent-pthreads-2.1-7t64 amd64 2.1.12-stable-10build1 [8360 B] 537s Get:4 http://ftpmaster.internal/ubuntu resolute/universe amd64 libldns3t64 amd64 1.8.4-2build1 [173 kB] 537s Get:5 http://ftpmaster.internal/ubuntu resolute/main amd64 libevent-2.1-7t64 amd64 2.1.12-stable-10build1 [155 kB] 537s Get:6 http://ftpmaster.internal/ubuntu resolute/main amd64 libunbound8 amd64 1.24.2-1ubuntu1 [462 kB] 537s Get:7 http://ftpmaster.internal/ubuntu resolute/universe amd64 libreswan amd64 5.2-2.2ubuntu1 [1523 kB] 538s Fetched 2953 kB in 0s (10.2 MB/s) 538s Selecting previously unselected package dns-root-data. 538s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83962 files and directories currently installed.) 538s Preparing to unpack .../0-dns-root-data_2025080400build1_all.deb ... 538s Unpacking dns-root-data (2025080400build1) ... 538s Selecting previously unselected package libnss3-tools. 538s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_amd64.deb ... 538s Unpacking libnss3-tools (2:3.120-1) ... 538s Selecting previously unselected package libevent-pthreads-2.1-7t64:amd64. 538s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build1_amd64.deb ... 538s Unpacking libevent-pthreads-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 538s Selecting previously unselected package libldns3t64:amd64. 538s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_amd64.deb ... 538s Unpacking libldns3t64:amd64 (1.8.4-2build1) ... 538s Selecting previously unselected package libevent-2.1-7t64:amd64. 538s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build1_amd64.deb ... 538s Unpacking libevent-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 538s Selecting previously unselected package libunbound8:amd64. 538s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_amd64.deb ... 538s Unpacking libunbound8:amd64 (1.24.2-1ubuntu1) ... 538s Selecting previously unselected package libreswan. 538s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_amd64.deb ... 538s Unpacking libreswan (5.2-2.2ubuntu1) ... 538s Setting up libldns3t64:amd64 (1.8.4-2build1) ... 538s Setting up libevent-pthreads-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 538s Setting up libevent-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 538s Setting up dns-root-data (2025080400build1) ... 538s Setting up libunbound8:amd64 (1.24.2-1ubuntu1) ... 538s Setting up libnss3-tools (2:3.120-1) ... 538s Setting up libreswan (5.2-2.2ubuntu1) ... 538s ipsec.service is a disabled or a static unit, not starting it. 538s Processing triggers for man-db (2.13.1-1) ... 539s Processing triggers for libc-bin (2.42-2ubuntu4) ... 569s autopkgtest [12:39:39]: test cavp: [----------------------- 569s Testing installed CAVP binary: /usr/libexec/ipsec/cavp 570s test: IKE v2 570s Reading from ikev2.fax 572s test: IKE v1 Digital Signature Authentication 572s Reading from ikev1_dsa.fax 574s test: IKE v1 Pre-shared Key Authentication 574s Reading from ikev1_psk.fax 576s /tmp/autopkgtest.XjjJBN/build.PZf/src 576s autopkgtest [12:39:46]: test cavp: -----------------------] 577s cavp PASS 577s autopkgtest [12:39:47]: test cavp: - - - - - - - - - - results - - - - - - - - - - 577s autopkgtest [12:39:47]: @@@@@@@@@@@@@@@@@@@@ summary 577s opportunistic SKIP exit status 77 and marked as skippable 577s cryptocheck PASS 577s cavp PASS